mirror of
				https://github.com/arkenfox/user.js.git
				synced 2025-11-03 23:35:26 +01:00 
			
		
		
		
	flip from FPI to dFPI
I will tidy and expand 2700 entries later
This commit is contained in:
		
				
					committed by
					
						
						GitHub
					
				
			
			
				
	
			
			
			
						parent
						
							5d508e4242
						
					
				
				
					commit
					de28689e76
				
			
							
								
								
									
										52
									
								
								user.js
									
									
									
									
									
								
							
							
						
						
									
										52
									
								
								user.js
									
									
									
									
									
								
							@@ -56,7 +56,6 @@
 | 
				
			|||||||
  2600: MISCELLANEOUS
 | 
					  2600: MISCELLANEOUS
 | 
				
			||||||
  2700: ETP (ENHANCED TRACKING PROTECTION)
 | 
					  2700: ETP (ENHANCED TRACKING PROTECTION)
 | 
				
			||||||
  2800: SHUTDOWN & SANITIZING
 | 
					  2800: SHUTDOWN & SANITIZING
 | 
				
			||||||
  4000: FPI (FIRST PARTY ISOLATION)
 | 
					 | 
				
			||||||
  4500: RFP (RESIST FINGERPRINTING)
 | 
					  4500: RFP (RESIST FINGERPRINTING)
 | 
				
			||||||
  5000: OPTIONAL OPSEC
 | 
					  5000: OPTIONAL OPSEC
 | 
				
			||||||
  5500: OPTIONAL HARDENING
 | 
					  5500: OPTIONAL HARDENING
 | 
				
			||||||
@@ -819,31 +818,14 @@ user_pref("extensions.postDownloadThirdPartyPrompt", false);
 | 
				
			|||||||
 * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
 | 
					 * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
 | 
				
			||||||
   // user_pref("extensions.webextensions.restrictedDomains", "");
 | 
					   // user_pref("extensions.webextensions.restrictedDomains", "");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/*** [SECTION 2700]: ETP (Enhanced Tracking Protection) ***/
 | 
					/*** [SECTION 2700]: ETP (ENHANCED TRACKING PROTECTION) ***/
 | 
				
			||||||
user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 | 
					user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 | 
				
			||||||
/* 2701: disable or isolate 3rd-party cookies and site-data [SETUP-WEB]
 | 
					/* 2701: enable Enhanced Tracking Protection's (ETP) Strict Mode [FF86+]
 | 
				
			||||||
 * 0 = Accept cookies and site data
 | 
					 * Strict Mode enables Total Cookie Protection (dFPI /dynamic FPI)
 | 
				
			||||||
 * 1 = (Block) All third-party cookies
 | 
					 * [1] https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/
 | 
				
			||||||
 * 2 = (Block) All cookies
 | 
					 | 
				
			||||||
 * 3 = (Block) Cookies from unvisited websites
 | 
					 | 
				
			||||||
 * 4 = (Block) Cross-site tracking cookies (default)
 | 
					 | 
				
			||||||
 * 5 = (Isolate All) Cross-site cookies (TCP: Total Cookie Protection / dFPI: dynamic FPI) [1] (FF86+)
 | 
					 | 
				
			||||||
 * Option 5 with FPI enabled (4001) is ignored and not shown, and option 4 used instead
 | 
					 | 
				
			||||||
 * [NOTE] You can set cookie exceptions under site permissions or use an extension
 | 
					 | 
				
			||||||
 * [NOTE] Enforcing category to custom ensures ETP related prefs are always honored
 | 
					 | 
				
			||||||
 * [SETTING] Privacy & Security>Enhanced Tracking Protection>Custom>Cookies
 | 
					 | 
				
			||||||
 * [1] https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/ ***/
 | 
					 | 
				
			||||||
user_pref("network.cookie.cookieBehavior", 1);
 | 
					 | 
				
			||||||
user_pref("browser.contentblocking.category", "custom");
 | 
					 | 
				
			||||||
/* 2710: enable Enhanced Tracking Protection (ETP) in all windows
 | 
					 | 
				
			||||||
 * [SETTING] Privacy & Security>Enhanced Tracking Protection>Custom>Tracking content
 | 
					 | 
				
			||||||
 * [SETTING] to add site exceptions: Urlbar>ETP Shield
 | 
					 * [SETTING] to add site exceptions: Urlbar>ETP Shield
 | 
				
			||||||
 * [SETTING] to manage site exceptions: Options>Privacy & Security>Enhanced Tracking Protection>Manage Exceptions ***/
 | 
					 * [SETTING] to manage site exceptions: Options>Privacy & Security>Enhanced Tracking Protection>Manage Exceptions ***/
 | 
				
			||||||
user_pref("privacy.trackingprotection.enabled", true);
 | 
					user_pref("browser.contentblocking.category", "strict");
 | 
				
			||||||
/* 2711: enable various ETP lists ***/
 | 
					 | 
				
			||||||
user_pref("privacy.trackingprotection.socialtracking.enabled", true);
 | 
					 | 
				
			||||||
   // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
 | 
					 | 
				
			||||||
   // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
/*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 | 
					/*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 | 
				
			||||||
user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
 | 
					user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
 | 
				
			||||||
@@ -914,11 +896,6 @@ user_pref("privacy.cpd.cookies", false);
 | 
				
			|||||||
 * which will display a blank value, and are not guaranteed to work ***/
 | 
					 * which will display a blank value, and are not guaranteed to work ***/
 | 
				
			||||||
user_pref("privacy.sanitize.timeSpan", 0);
 | 
					user_pref("privacy.sanitize.timeSpan", 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/*** [SECTION 4000]: FPI (FIRST PARTY ISOLATION) ***/
 | 
					 | 
				
			||||||
user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 | 
					 | 
				
			||||||
/* 4001: enable First Party Isolation [FF51+] ***/
 | 
					 | 
				
			||||||
user_pref("privacy.firstparty.isolate", true);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
 | 
					/*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
 | 
				
			||||||
   RFP covers a wide range of ongoing fingerprinting solutions.
 | 
					   RFP covers a wide range of ongoing fingerprinting solutions.
 | 
				
			||||||
   It is an all-or-nothing buy in: you cannot pick and choose what parts you want
 | 
					   It is an all-or-nothing buy in: you cannot pick and choose what parts you want
 | 
				
			||||||
@@ -1169,6 +1146,10 @@ user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true]
 | 
				
			|||||||
user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true]
 | 
					user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true]
 | 
				
			||||||
/* 0607: enforce Local Storage Next Generation (LSNG) [FF65+] ***/
 | 
					/* 0607: enforce Local Storage Next Generation (LSNG) [FF65+] ***/
 | 
				
			||||||
user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 | 
					user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 | 
				
			||||||
 | 
					/* 6008: enforce no First Party Isolation [FF51+]
 | 
				
			||||||
 | 
					 * [WARNING] FPI is no longer supported and is replaced by network partitioning (FF85+)
 | 
				
			||||||
 | 
					 * and dFPI (2701), and enabling FPI disables those ***/
 | 
				
			||||||
 | 
					user_pref("privacy.firstparty.isolate", false); // [DEFAULT: false]
 | 
				
			||||||
/* 6050: prefsCleaner: reset previously active items removed from arkenfox FF92+ ***/
 | 
					/* 6050: prefsCleaner: reset previously active items removed from arkenfox FF92+ ***/
 | 
				
			||||||
   // placeholder
 | 
					   // placeholder
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -1210,8 +1191,8 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
 | 
				
			|||||||
   // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
 | 
					   // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
 | 
				
			||||||
   // user_pref("security.tls.version.max", 4);
 | 
					   // user_pref("security.tls.version.max", 4);
 | 
				
			||||||
/* 7005: disable SSL session IDs [FF36+]
 | 
					/* 7005: disable SSL session IDs [FF36+]
 | 
				
			||||||
 * [WHY] Passive fingerprinting and perf costs. These are session-only and isolated
 | 
					 * [WHY] Passive fingerprinting and perf costs. These are session-only
 | 
				
			||||||
 * with network partitioning (FF85+) or when using FPI and/or containers ***/
 | 
					 * and isolated with network partitioning (FF85+) and/or containers ***/
 | 
				
			||||||
   // user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
 | 
					   // user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
 | 
				
			||||||
/* 7006: onions
 | 
					/* 7006: onions
 | 
				
			||||||
 * [WHY] Firefox doesn't support hidden services. Use Tor Browser ***/
 | 
					 * [WHY] Firefox doesn't support hidden services. Use Tor Browser ***/
 | 
				
			||||||
@@ -1234,7 +1215,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
 | 
				
			|||||||
   // user_pref("network.http.spdy.enabled.http2", false);
 | 
					   // user_pref("network.http.spdy.enabled.http2", false);
 | 
				
			||||||
   // user_pref("network.http.spdy.websockets", false); // [FF65+]
 | 
					   // user_pref("network.http.spdy.websockets", false); // [FF65+]
 | 
				
			||||||
/* 7010: disable HTTP Alternative Services [FF37+]
 | 
					/* 7010: disable HTTP Alternative Services [FF37+]
 | 
				
			||||||
 * [WHY] Already isolated by network partitioning (FF85+) or FPI ***/
 | 
					 * [WHY] Already isolated by network partitioning (FF85+) ***/
 | 
				
			||||||
   // user_pref("network.http.altsvc.enabled", false);
 | 
					   // user_pref("network.http.altsvc.enabled", false);
 | 
				
			||||||
   // user_pref("network.http.altsvc.oe", false); // [DEFAULT: false FF94+]
 | 
					   // user_pref("network.http.altsvc.oe", false); // [DEFAULT: false FF94+]
 | 
				
			||||||
/* 7011: disable website control over browser right-click context menu
 | 
					/* 7011: disable website control over browser right-click context menu
 | 
				
			||||||
@@ -1255,8 +1236,15 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
 | 
				
			|||||||
   // user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
 | 
					   // user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
 | 
				
			||||||
   // user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
 | 
					   // user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
 | 
				
			||||||
/* 7015: enable the DNT (Do Not Track) HTTP header
 | 
					/* 7015: enable the DNT (Do Not Track) HTTP header
 | 
				
			||||||
 * [WHY] DNT is enforced with Tracking Protection (2710) ***/
 | 
					 * [WHY] DNT is enforced with Tracking Protection which is used in ETP Strict (2701) ***/
 | 
				
			||||||
   // user_pref("privacy.donottrackheader.enabled", true);
 | 
					   // user_pref("privacy.donottrackheader.enabled", true);
 | 
				
			||||||
 | 
					/* 7016: customize ETP settings
 | 
				
			||||||
 | 
					 * [WHY] Just use strict which sets these at runtime (2701) ***/
 | 
				
			||||||
 | 
					   // user_pref("network.cookie.cookieBehavior", 5);
 | 
				
			||||||
 | 
					   // user_pref("privacy.trackingprotection.enabled", true);
 | 
				
			||||||
 | 
					   // user_pref("privacy.trackingprotection.socialtracking.enabled", true);
 | 
				
			||||||
 | 
					   // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
 | 
				
			||||||
 | 
					   // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/*** [SECTION 8000]: DON'T BOTHER: NON-RFP
 | 
					/*** [SECTION 8000]: DON'T BOTHER: NON-RFP
 | 
				
			||||||
   [WHY] They are insufficient to help anti-fingerprinting and do more harm than good
 | 
					   [WHY] They are insufficient to help anti-fingerprinting and do more harm than good
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user