mirror of
https://github.com/arkenfox/user.js.git
synced 2025-09-01 09:28:31 +02:00
Compare commits
35 Commits
Author | SHA1 | Date | |
---|---|---|---|
226af6f679 | |||
7f2c92f654 | |||
5b82afd5bd | |||
d7b1877a1f | |||
1b6239eab8 | |||
ad0187122d | |||
624e50faac | |||
a9e9392172 | |||
201210111e | |||
53f8578749 | |||
dc4d9e4dae | |||
e1b0eae740 | |||
be0ccf6460 | |||
7c0a327b06 | |||
a35cba3914 | |||
e16425310f | |||
d503d96db0 | |||
335299a0cf | |||
7311cfdf84 | |||
3a9440aeea | |||
3210ab0ca8 | |||
2c734612f6 | |||
a12dd83b1f | |||
44d9ceaf05 | |||
be9d9ac9ca | |||
66cdb72927 | |||
953b96431e | |||
4d72ad90b0 | |||
cccb5b10b4 | |||
810045eb39 | |||
b47982bb9a | |||
0691b8babe | |||
8d1c95c650 | |||
19484e1a56 | |||
755ebf88fb |
@ -1,7 +1,7 @@
|
||||
/***
|
||||
This will reset the preferences that have been removed completely from the ghacks user.js.
|
||||
|
||||
Last updated: 16-July-2019
|
||||
Last updated: 15-October-2019
|
||||
|
||||
For instructions see:
|
||||
https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
|
||||
@ -168,14 +168,9 @@
|
||||
'signon.storeWhenAutocompleteOff',
|
||||
'xpinstall.whitelist.required',
|
||||
/* 67-beta: Blocklist, SB & TP cleanup: these were all inactive */
|
||||
'browser.safebrowsing.downloads.enabled',
|
||||
'browser.safebrowsing.downloads.remote.block_dangerous',
|
||||
'browser.safebrowsing.downloads.remote.block_dangerous_host',
|
||||
'browser.safebrowsing.downloads.remote.block_potentially_unwanted',
|
||||
'browser.safebrowsing.downloads.remote.block_uncommon',
|
||||
'browser.safebrowsing.blockedURIs.enabled',
|
||||
'browser.safebrowsing.malware.enabled',
|
||||
'browser.safebrowsing.phishing.enabled',
|
||||
'browser.safebrowsing.provider.google.gethashURL',
|
||||
'browser.safebrowsing.provider.google.updateURL',
|
||||
'browser.safebrowsing.provider.google4.gethashURL',
|
||||
@ -204,6 +199,19 @@
|
||||
'font.name.serif.x-western',
|
||||
'layout.css.font-loading-api.enabled',
|
||||
'toolkit.telemetry.cachedClientID',
|
||||
/* 69-beta */
|
||||
'plugin.sessionPermissionNow.intervalInMinutes',
|
||||
/* 70-beta */
|
||||
'browser.cache.disk_cache_ssl',
|
||||
'browser.sessionhistory.max_entries',
|
||||
'extensions.getAddons.discovery.api_url',
|
||||
'extensions.htmlaboutaddons.discover.enabled',
|
||||
'extensions.webservice.discoverURL',
|
||||
'intl.locale.requested',
|
||||
'intl.regional_prefs.use_os_locales',
|
||||
'dom.push.connection.enabled',
|
||||
'dom.push.serverURL',
|
||||
'webgl.dxgl.enabled',
|
||||
/* reset parrot: check your open about:config after running the script */
|
||||
'_user.js.parrot'
|
||||
]
|
||||
|
306
user.js
306
user.js
@ -1,8 +1,8 @@
|
||||
/******
|
||||
* name: ghacks user.js
|
||||
* date: 31 August 2019
|
||||
* version 68: Knock on Pants
|
||||
* "It's like thunder, lightning... the way you wear me is frightening"
|
||||
* date: 20 September 2019
|
||||
* version 69: Pants One More Time
|
||||
* "When I'm not with pants I lose my mind. Give me a sign. Hit me, pants, one more time."
|
||||
* authors: v52+ github | v51- www.ghacks.net
|
||||
* url: https://github.com/ghacksuserjs/ghacks-user.js
|
||||
* license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
|
||||
@ -20,13 +20,13 @@
|
||||
2. READ this
|
||||
* https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.3-Implementation
|
||||
3. If you skipped steps 1 and 2 above (shame on you), then here is the absolute minimum
|
||||
* Real time binary checks with Google services are disabled (0402)
|
||||
* Real time binary checks with Google services are disabled (0412)
|
||||
* You will still get prompts to update Firefox, but auto-installing them is disabled (0302a)
|
||||
* Some user data is erased on close (section 2800). Change this to suit your needs
|
||||
* EACH RELEASE check:
|
||||
- 4600s: reset prefs made redundant due to privacy.resistFingerprinting (RPF)
|
||||
or enable them as an alternative to RFP or for ESR users
|
||||
- 9999s: reset deprecated prefs in about:config or enable relevant section(s) for ESR
|
||||
or enable them as an alternative to RFP (or some of them for ESR users)
|
||||
- 9999s: reset deprecated prefs in about:config or enable the relevant section for ESR
|
||||
* Site breakage WILL happen
|
||||
- There are often trade-offs and conflicts between Security vs Privacy vs Anti-Fingerprinting
|
||||
and these need to be balanced against Functionality & Convenience & Breakage
|
||||
@ -45,7 +45,7 @@
|
||||
* INDEX:
|
||||
|
||||
0100: STARTUP
|
||||
0200: GEOLOCATION
|
||||
0200: GEOLOCATION / LANGUAGE / LOCALE
|
||||
0300: QUIET FOX
|
||||
0400: BLOCKLISTS / SAFE BROWSING
|
||||
0500: SYSTEM ADD-ONS / EXPERIMENTS
|
||||
@ -112,8 +112,8 @@ user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
|
||||
/* 0105b: disable Activity Stream Snippets
|
||||
* Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
|
||||
* [1] https://abouthome-snippets-service.readthedocs.io/ ***/
|
||||
user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
|
||||
user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
|
||||
user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
|
||||
/* 0105c: disable Activity Stream Top Stories, Pocket-based and/or sponsored content ***/
|
||||
user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
|
||||
user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
|
||||
@ -133,49 +133,52 @@ user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false)
|
||||
* [2] https://spreadprivacy.com/is-private-browsing-really-private/ ***/
|
||||
// user_pref("browser.privatebrowsing.autostart", true);
|
||||
|
||||
/*** [SECTION 0200]: GEOLOCATION ***/
|
||||
/*** [SECTION 0200]: GEOLOCATION / LANGUAGE / LOCALE ***/
|
||||
user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");
|
||||
/** GEOLOCATION ***/
|
||||
/* 0201: disable Location-Aware Browsing
|
||||
* [NOTE] Best left at default "true", fingerprintable, is already behind a prompt (see 0202)
|
||||
* [1] https://www.mozilla.org/firefox/geolocation/ ***/
|
||||
// user_pref("geo.enabled", false);
|
||||
/* 0201b: set a default permission for Location [FF58+]
|
||||
/* 0202: set a default permission for Location (see 0201) [FF58+]
|
||||
* 0=always ask (default), 1=allow, 2=block
|
||||
* [NOTE] Best left at default "always ask", fingerprintable via Permissions API
|
||||
* [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
|
||||
* [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
|
||||
// user_pref("permissions.default.geo", 2);
|
||||
/* 0202: disable GeoIP-based search results
|
||||
/* 0203: use Mozilla geolocation service instead of Google when geolocation is enabled
|
||||
* Optionally enable logging to the console (defaults to false) ***/
|
||||
user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
|
||||
// user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
|
||||
/* 0204: disable using the OS's geolocation service ***/
|
||||
user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
|
||||
user_pref("geo.provider.use_corelocation", false); // [MAC]
|
||||
user_pref("geo.provider.use_gpsd", false); // [LINUX]
|
||||
/* 0205: disable GeoIP-based search results
|
||||
* [NOTE] May not be hidden if Firefox has changed your settings due to your locale
|
||||
* [1] https://trac.torproject.org/projects/tor/ticket/16254
|
||||
* [2] https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections#w_geolocation-for-default-search-engine ***/
|
||||
user_pref("browser.search.region", "US"); // [HIDDEN PREF]
|
||||
user_pref("browser.search.geoip.url", "");
|
||||
/* 0205: set Firefox language [FF59+] [RESTART]
|
||||
* Go to the end of about:support to view Internationalization & Localization settings
|
||||
* If set to empty, the OS locales are used. If not set at all, default locale is used
|
||||
* This is the language used in menus, about pages, messages, and notifications from Firefox ***/
|
||||
// user_pref("intl.locale.requested", "en-US"); // [HIDDEN PREF]
|
||||
/* 0206: disable geographically specific results/search engines e.g. "browser.search.*.US"
|
||||
* i.e. ignore all of Mozilla's various search engines in multiple locales ***/
|
||||
user_pref("browser.search.geoSpecificDefaults", false);
|
||||
user_pref("browser.search.geoSpecificDefaults.url", "");
|
||||
/* 0207: set preferred language for diplaying web pages
|
||||
|
||||
/** LANGUAGE / LOCALE ***/
|
||||
/* 0210: set preferred language for displaying web pages
|
||||
* [TEST] https://addons.mozilla.org/about ***/
|
||||
user_pref("intl.accept_languages", "en-US, en");
|
||||
/* 0208: enforce US English locale regardless of the system locale
|
||||
/* 0211: enforce US English locale regardless of the system locale
|
||||
* [1] https://bugzilla.mozilla.org/867501 ***/
|
||||
user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
|
||||
/* 0209: use APP locale over OS locale in regional preferences [FF56+]
|
||||
* [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1379420,1364789 ***/
|
||||
user_pref("intl.regional_prefs.use_os_locales", false);
|
||||
/* 0210: use Mozilla geolocation service instead of Google when geolocation is enabled
|
||||
* Optionally enable logging to the console (defaults to false) ***/
|
||||
user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
|
||||
// user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
|
||||
/* 0211: disable using the OS's geolocation service ***/
|
||||
user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
|
||||
user_pref("geo.provider.use_corelocation", false); // [MAC]
|
||||
user_pref("geo.provider.use_gpsd", false); // [LINUX]
|
||||
/* 0212: enforce fallback text encoding to match en-US
|
||||
* When the content or server doesn't declare a charset the browser will
|
||||
* fallback to the "Current locale" based on your application language
|
||||
* [SETTING] General>Language and Appearance>Fonts and Colors>Advanced>Text Encoding for Legacy Content
|
||||
* [TEST] https://hsivonen.com/test/moz/check-charset.htm
|
||||
* [1] https://trac.torproject.org/projects/tor/ticket/20025 ***/
|
||||
user_pref("intl.charset.fallback.override", "windows-1252");
|
||||
|
||||
/*** [SECTION 0300]: QUIET FOX
|
||||
Starting in user.js v67, we only disable the auto-INSTALL of Firefox. You still get prompts
|
||||
@ -209,17 +212,14 @@ user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
|
||||
user_pref("dom.ipc.plugins.reportCrashURL", false);
|
||||
/* 0320: disable about:addons' Recommendations pane (uses Google Analytics) ***/
|
||||
user_pref("extensions.getAddons.showPane", false); // [HIDDEN PREF]
|
||||
user_pref("extensions.webservice.discoverURL", "");
|
||||
/* 0321: disable recommendations in about:addons' Extensions and Themes panes [FF68+] ***/
|
||||
user_pref("extensions.getAddons.discovery.api_url", "");
|
||||
user_pref("extensions.htmlaboutaddons.discover.enabled", false);
|
||||
user_pref("extensions.htmlaboutaddons.recommendations.enabled", false);
|
||||
/* 0330: disable telemetry
|
||||
* the pref (.unified) affects the behaviour of the pref (.enabled)
|
||||
* IF unified=false then .enabled controls the telemetry module
|
||||
* IF unified=true then .enabled ONLY controls whether to record extended data
|
||||
* so make sure to have both set as false
|
||||
* [NOTE] FF58+ `toolkit.telemetry.enabled` is now LOCKED to reflect prerelease
|
||||
* [NOTE] FF58+ 'toolkit.telemetry.enabled' is now LOCKED to reflect prerelease
|
||||
* or release builds (true and false respectively), see [2]
|
||||
* [1] https://firefox-source-docs.mozilla.org/toolkit/components/telemetry/telemetry/internals/preferences.html
|
||||
* [2] https://medium.com/georg-fritzsche/data-preference-changes-in-firefox-58-2d5df9c428b5 ***/
|
||||
@ -261,11 +261,6 @@ user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // [FF51+]
|
||||
/* 0351: disable backlogged Crash Reports
|
||||
* [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send backlogged crash reports ***/
|
||||
user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [FF58+]
|
||||
/* 0370: disable Pocket [FF46+]
|
||||
* Pocket is a third party (now owned by Mozilla) "save for later" cloud service
|
||||
* [1] https://en.wikipedia.org/wiki/Pocket_(application)
|
||||
* [2] https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/ ***/
|
||||
user_pref("extensions.pocket.enabled", false);
|
||||
/* 0390: disable Captive Portal detection
|
||||
* [1] https://www.eff.org/deeplinks/2017/08/how-captive-portals-interfere-wireless-security-and-privacy
|
||||
* [2] https://wiki.mozilla.org/Necko/CaptivePortal ***/
|
||||
@ -275,28 +270,48 @@ user_pref("network.captive-portal-service.enabled", false); // [FF52+]
|
||||
* [1] https://bugzilla.mozilla.org/1460537 ***/
|
||||
user_pref("network.connectivity-service.enabled", false);
|
||||
|
||||
/*** [SECTION 0400]: BLOCKLISTS / SAFE BROWSING (SB)
|
||||
Safe Browsing has taken many steps to preserve privacy. *IF* required, a full url is never
|
||||
sent to Google, only a PART-hash of the prefix, and this is hidden with noise of other real
|
||||
PART-hashes. Google also swear it is anonymized and only used to flag malicious sites.
|
||||
Firefox also takes measures such as striping out identifying parameters and since SBv4 (FF57+)
|
||||
doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
|
||||
|
||||
#Required reading [#] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
|
||||
[1] https://wiki.mozilla.org/Security/Safe_Browsing
|
||||
***/
|
||||
/*** [SECTION 0400]: BLOCKLISTS / SAFE BROWSING (SB) ***/
|
||||
user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
|
||||
/** BLOCKLISTS ***/
|
||||
/* 0401: enforce Firefox blocklist, but sanitize blocklist url
|
||||
* [NOTE] It includes updates for "revoked certificates"
|
||||
* [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/
|
||||
* [2] https://trac.torproject.org/projects/tor/ticket/16931 ***/
|
||||
user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
|
||||
user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
|
||||
/* 0402: disable binaries NOT in Safe Browsing local lists being checked
|
||||
* This is a real-time check with Google services
|
||||
* [SETUP-SECURITY] If you do not understand this, or if you want this protection, then override it ***/
|
||||
|
||||
/** SAFE BROWSING (SB)
|
||||
Safe Browsing has taken many steps to preserve privacy. *IF* required, a full url is never
|
||||
sent to Google, only a PART-hash of the prefix, and this is hidden with noise of other real
|
||||
PART-hashes. Google also swear it is anonymized and only used to flag malicious sites.
|
||||
Firefox also takes measures such as striping out identifying parameters and since SBv4 (FF57+)
|
||||
doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
|
||||
|
||||
#Required reading [#] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
|
||||
[1] https://wiki.mozilla.org/Security/Safe_Browsing
|
||||
[2] https://support.mozilla.org/en-US/kb/how-does-phishing-and-malware-protection-work
|
||||
***/
|
||||
/* 0410: disable SB (Safe Browsing)
|
||||
* [WARNING] Do this at your own risk! These are the master switches.
|
||||
* [SETTING] Privacy & Security>Security>... "Block dangerous and deceptive content" ***/
|
||||
// user_pref("browser.safebrowsing.malware.enabled", false);
|
||||
// user_pref("browser.safebrowsing.phishing.enabled", false);
|
||||
/* 0411: disable SB checks for downloads (both local lookups + remote)
|
||||
* This is the master switch for the safebrowsing.downloads* prefs (0412, 0413)
|
||||
* [SETTING] Privacy & Security>Security>... "Block dangerous downloads" ***/
|
||||
// user_pref("browser.safebrowsing.downloads.enabled", false);
|
||||
/* 0412: disable SB checks for downloads (remote)
|
||||
* To verify the safety of certain executable files, Firefox may submit some information about the
|
||||
* file, including the name, origin, size and a cryptographic hash of the contents, to the Google
|
||||
* Safe Browsing service which helps Firefox determine whether or not the file should be blocked
|
||||
* [SETUP-SECURITY] If you do not understand this, or you want this protection, then override it ***/
|
||||
user_pref("browser.safebrowsing.downloads.remote.enabled", false);
|
||||
/* 0403: disable 'ignore this warning' on Safe Browsing warnings
|
||||
user_pref("browser.safebrowsing.downloads.remote.url", "");
|
||||
/* 0413: disable SB checks for unwanted software
|
||||
* [SETTING] Privacy & Security>Security>... "Warn you about unwanted and uncommon software" ***/
|
||||
// user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
|
||||
// user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
|
||||
/* 0419: disable 'ignore this warning' on SB warnings
|
||||
* If clicked, it bypasses the block for that session. This is a means for admins to enforce SB
|
||||
* [TEST] see github wiki APPENDIX A: Test Sites: Section 5
|
||||
* [1] https://bugzilla.mozilla.org/1226490 ***/
|
||||
@ -368,9 +383,8 @@ user_pref("network.predictor.enable-prefetch", false); // [FF48+]
|
||||
* [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests
|
||||
* [2] https://www.ghacks.net/2015/08/16/block-firefox-from-connecting-to-sites-when-you-hover-over-links/ ***/
|
||||
user_pref("network.http.speculative-parallel-limit", 0);
|
||||
/* 0606: disable pings (but enforce same host in case)
|
||||
* [1] http://kb.mozillazine.org/Browser.send_pings
|
||||
* [2] http://kb.mozillazine.org/Browser.send_pings.require_same_host ***/
|
||||
/* 0606: disable "Hyperlink Auditing" (click tracking) and enforce same host in case
|
||||
* [1] https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ***/
|
||||
user_pref("browser.send_pings", false); // [DEFAULT: false]
|
||||
user_pref("browser.send_pings.require_same_host", true);
|
||||
|
||||
@ -382,8 +396,8 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
|
||||
* Firefox telemetry (April 2019) shows only 5% of all connections are IPv6.
|
||||
* [NOTE] This is just an application level fallback. Disabling IPv6 is best done at an
|
||||
* OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
|
||||
* then this won't make much difference. If you are maksing your IP, then it can only help.
|
||||
* [TEST] http://ipv6leak.com/
|
||||
* then this won't make much difference. If you are masking your IP, then it can only help.
|
||||
* [TEST] https://ipleak.org/
|
||||
* [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/437#issuecomment-403740626
|
||||
* [2] https://www.internetsociety.org/tag/ipv6-security/ (see Myths 2,4,5,6) ***/
|
||||
user_pref("network.dns.disableIPv6", true);
|
||||
@ -412,12 +426,12 @@ user_pref("network.http.altsvc.oe", false);
|
||||
/* 0704: enforce the proxy server to do any DNS lookups when using SOCKS
|
||||
* e.g. in Tor, this stops your local DNS server from knowing your Tor destination
|
||||
* as a remote Tor node will handle the DNS request
|
||||
* [1] http://kb.mozillazine.org/Network.proxy.socks_remote_dns
|
||||
* [2] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
|
||||
* [1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
|
||||
user_pref("network.proxy.socks_remote_dns", true);
|
||||
/* 0707: disable (or setup) DNS-over-HTTPS (DoH) [FF60+]
|
||||
* TRR = Trusted Recursive Resolver
|
||||
* .mode: 0=off, 1=race, 2=TRR first, 3=TRR only, 4=race for stats but always use native result
|
||||
* 0=off by default, 1=race (removed in FF69), 2=TRR first, 3=TRR only,
|
||||
* 4=race for stats but always use native result (removed in FF69), 5=explicitly off
|
||||
* [WARNING] DoH bypasses hosts and gives info to yet another party (e.g. Cloudflare)
|
||||
* [1] https://www.ghacks.net/2018/04/02/configure-dns-over-https-in-firefox/
|
||||
* [2] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/ ***/
|
||||
@ -468,15 +482,10 @@ user_pref("keyword.enabled", false);
|
||||
user_pref("browser.fixup.alternate.enabled", false);
|
||||
/* 0803: display all parts of the url in the location bar ***/
|
||||
user_pref("browser.urlbar.trimURLs", false);
|
||||
/* 0804: limit history leaks via enumeration (PER TAB: back/forward)
|
||||
* This is a PER TAB session history. You still have a full history stored under all history
|
||||
* default=50, minimum=1=currentpage, 2 is the recommended minimum as some pages
|
||||
* use it as a means of referral (e.g. hotlinking), 4 or 6 or 10 may be more practical ***/
|
||||
user_pref("browser.sessionhistory.max_entries", 10);
|
||||
/* 0805: disable CSS querying page history - CSS history leak
|
||||
/* 0805: disable coloring of visited links - CSS history leak
|
||||
* [NOTE] This has NEVER been fully "resolved": in Mozilla/docs it is stated it's
|
||||
* only in 'certain circumstances', also see latest comments in [2]
|
||||
* [TEST] http://lcamtuf.coredump.cx/yahh/ (see github wiki APPENDIX A on how to use)
|
||||
* [TEST] https://earthlng.github.io/testpages/visited_links.html (see github wiki APPENDIX A on how to use)
|
||||
* [1] https://dbaron.org/mozilla/visited-privacy
|
||||
* [2] https://bugzilla.mozilla.org/147777
|
||||
* [3] https://developer.mozilla.org/docs/Web/CSS/Privacy_and_the_:visited_selector ***/
|
||||
@ -508,7 +517,7 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
|
||||
* (i.e. at least one of 0850a suggestion types must be true) but you want to *limit* suggestions shown ***/
|
||||
// user_pref("browser.urlbar.maxRichResults", 0);
|
||||
/* 0850d: disable location bar autofill
|
||||
* [1] http://kb.mozillazine.org/Inline_autocomplete ***/
|
||||
* [1] https://support.mozilla.org/en-US/kb/address-bar-autocomplete-firefox#w_url-autocomplete ***/
|
||||
// user_pref("browser.urlbar.autoFill", false);
|
||||
/* 0850e: disable location bar one-off searches [FF51+]
|
||||
* [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/ ***/
|
||||
@ -548,9 +557,8 @@ user_pref("security.ask_for_password", 2);
|
||||
* in minutes, default is 30 ***/
|
||||
user_pref("security.password_lifetime", 5);
|
||||
/* 0905: disable auto-filling username & password form fields
|
||||
* can leak in cross-site forms AND be spoofed
|
||||
* [NOTE] Password will still be auto-filled after a user name is manually entered
|
||||
* [1] http://kb.mozillazine.org/Signon.autofillForms ***/
|
||||
* can leak in cross-site forms *and* be spoofed
|
||||
* [NOTE] Username & password is still available when you enter the field ***/
|
||||
user_pref("signon.autofillForms", false);
|
||||
/* 0909: disable formless login capture for Password Manager [FF51+] ***/
|
||||
user_pref("signon.formlessCapture.enabled", false);
|
||||
@ -563,16 +571,20 @@ user_pref("signon.formlessCapture.enabled", false);
|
||||
user_pref("network.auth.subresource-http-auth-allow", 1);
|
||||
|
||||
/*** [SECTION 1000]: CACHE / SESSION (RE)STORE / FAVICONS
|
||||
ETAG [1] and other [2][3] cache tracking/fingerprinting techniques can be averted by
|
||||
disabling *BOTH* disk (1001) and memory (1003) cache. ETAGs can also be neutralized
|
||||
by modifying response headers [4]. Another solution is to use a hardened configuration
|
||||
with Temporary Containers [5]. Alternatively, you can *LIMIT* exposure by clearing
|
||||
cache on close (2803). or on a regular basis manually or with an extension.
|
||||
Cache tracking/fingerprinting techniques [1][2][3] require a cache. Disabling disk (1001)
|
||||
*and* memory (1003) caches is one solution; but that's extreme and fingerprintable. A hardened
|
||||
Temporary Containers configuration can effectively do the same thing, by isolating every tab [4].
|
||||
|
||||
We consider avoiding disk cache (1001) so cache is session/memory only (like Private Browsing
|
||||
mode), and isolating cache to first party (4001) is sufficient and a good balance between
|
||||
risk and performance. ETAGs can also be neutralized by modifying response headers [5], and
|
||||
you can clear the cache manually or on a regular basis with an extension.
|
||||
|
||||
[1] https://en.wikipedia.org/wiki/HTTP_ETag#Tracking_using_ETags
|
||||
[2] https://robertheaton.com/2014/01/20/cookieless-user-tracking-for-douchebags/
|
||||
[3] https://www.grepular.com/Preventing_Web_Tracking_via_the_Browser_Cache
|
||||
[4] https://github.com/ghacksuserjs/ghacks-user.js/wiki/4.2.4-Header-Editor
|
||||
[5] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
|
||||
[4] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
|
||||
[5] https://github.com/ghacksuserjs/ghacks-user.js/wiki/4.2.4-Header-Editor
|
||||
***/
|
||||
user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
|
||||
/** CACHE ***/
|
||||
@ -581,12 +593,8 @@ user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is m
|
||||
* or you use a hardened Temporary Containers, then feel free to override this
|
||||
* [NOTE] We also clear cache on exiting Firefox (see 2803) ***/
|
||||
user_pref("browser.cache.disk.enable", false);
|
||||
/* 1002: disable disk cache for SSL pages
|
||||
* [1] http://kb.mozillazine.org/Browser.cache.disk_cache_ssl ***/
|
||||
user_pref("browser.cache.disk_cache_ssl", false);
|
||||
/* 1003: disable memory cache
|
||||
/* capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kilobytes
|
||||
* [NOTE] Not recommended due to performance issues ***/
|
||||
/* capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kilobytes ***/
|
||||
// user_pref("browser.cache.memory.enable", false);
|
||||
// user_pref("browser.cache.memory.capacity", 0); // [HIDDEN PREF]
|
||||
/* 1006: disable permissions manager from writing to disk [RESTART]
|
||||
@ -710,12 +718,10 @@ user_pref("security.pki.sha1_enforcement_level", 1);
|
||||
* 2=detect Family Safety mode and import the root
|
||||
* [1] https://trac.torproject.org/projects/tor/ticket/21686 ***/
|
||||
user_pref("security.family_safety.mode", 0);
|
||||
/* 1222: disable intermediate certificate caching (fingerprinting attack vector) [RESTART]
|
||||
/* 1222: disable intermediate certificate caching (fingerprinting attack vector) [FF41+] [RESTART]
|
||||
* [NOTE] This affects login/cert/key dbs. The effect is all credentials are session-only.
|
||||
* Saved logins and passwords are not available. Reset the pref and restart to return them.
|
||||
* [TEST] https://fiprinca.0x90.eu/poc/
|
||||
* [1] https://bugzilla.mozilla.org/1334485 - related bug
|
||||
* [2] https://bugzilla.mozilla.org/1216882 - related bug (see comment 9) ***/
|
||||
* [1] https://shiftordie.de/blog/2017/02/21/fingerprinting-firefox-users-with-cached-intermediate-ca-certificates-fiprinca/ ***/
|
||||
// user_pref("security.nocertdb", true); // [HIDDEN PREF]
|
||||
/* 1223: enforce strict pinning
|
||||
* PKP (Public Key Pinning) 0=disabled 1=allow user MiTM (such as your antivirus), 2=strict
|
||||
@ -737,7 +743,7 @@ user_pref("security.mixed_content.block_object_subrequest", true);
|
||||
/** CIPHERS [see the section 1200 intro] ***/
|
||||
/* 1261: disable 3DES (effective key size < 128)
|
||||
* [1] https://en.wikipedia.org/wiki/3des#Security
|
||||
* [2] http://en.citizendium.org/wiki/Meet-in-the-middle_attack
|
||||
* [2] https://en.wikipedia.org/wiki/Meet-in-the-middle_attack
|
||||
* [3] https://www-archive.mozilla.org/projects/security/pki/nss/ssl/fips-ssl-ciphersuites.html ***/
|
||||
// user_pref("security.ssl3.rsa_des_ede3_sha", false);
|
||||
/* 1262: disable 128 bits ***/
|
||||
@ -785,8 +791,6 @@ user_pref("browser.display.use_document_fonts", 0);
|
||||
/* 1404: disable rendering of SVG OpenType fonts
|
||||
* [1] https://wiki.mozilla.org/SVGOpenTypeFonts - iSECPartnersReport recommends to disable this ***/
|
||||
user_pref("gfx.font_rendering.opentype_svg.enabled", false);
|
||||
/* 1405: disable WOFF2 (Web Open Font Format) [FF35+] ***/
|
||||
// user_pref("gfx.downloadable_fonts.woff2.enabled", false);
|
||||
/* 1408: disable graphite which FF49 turned back on by default
|
||||
* In the past it had security issues. Update: This continues to be the case, see [1]
|
||||
* [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778 ***/
|
||||
@ -874,9 +878,6 @@ user_pref("privacy.userContext.longPressBehavior", 2);
|
||||
|
||||
/*** [SECTION 1800]: PLUGINS ***/
|
||||
user_pref("_user.js.parrot", "1800 syntax error: the parrot's pushing up daisies!");
|
||||
/* 1802: enable click to play and set to 0 minutes ***/
|
||||
user_pref("plugins.click_to_play", true);
|
||||
user_pref("plugin.sessionPermissionNow.intervalInMinutes", 0);
|
||||
/* 1803: disable Flash plugin
|
||||
* 0=deactivated, 1=ask, 2=enabled
|
||||
* ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash
|
||||
@ -915,7 +916,6 @@ user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
|
||||
* [1] https://www.contextis.com/resources/blog/webgl-new-dimension-browser-exploitation/
|
||||
* [2] https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern ***/
|
||||
user_pref("webgl.disabled", true);
|
||||
user_pref("webgl.dxgl.enabled", false); // [WINDOWS]
|
||||
user_pref("webgl.enable-webgl2", false);
|
||||
/* 2012: limit WebGL ***/
|
||||
user_pref("webgl.min_capability_mode", true);
|
||||
@ -932,22 +932,19 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
|
||||
// user_pref("permissions.default.camera", 2);
|
||||
// user_pref("permissions.default.microphone", 2);
|
||||
/* 2030: disable autoplay of HTML5 media [FF63+]
|
||||
* 0=Allowed, 1=Blocked (2=Prompt - removed in FF66)
|
||||
* 0=Allow all, 1=Block non-muted media (default in FF67+), 2=Prompt (removed in FF66), 5=Block all (FF69+)
|
||||
* [NOTE] You can set exceptions under site permissions
|
||||
* [SETTING] Privacy & Security>Permissions>Block websites from automatically playing sound ***/
|
||||
user_pref("media.autoplay.default", 1); // [DEFAULT: 1 in FF67+]
|
||||
* [SETTING] Privacy & Security>Permissions>Autoplay>Settings>Default for all websites ***/
|
||||
// user_pref("media.autoplay.default", 5);
|
||||
/* 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] ***/
|
||||
user_pref("media.autoplay.enabled.user-gestures-needed", false);
|
||||
/* 2032: disable audio autoplay in non-active tabs [FF51+]
|
||||
/* 2032: disable autoplay of HTML5 media in non-active tabs [FF51+]
|
||||
* [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
|
||||
user_pref("media.block-autoplay-until-in-foreground", true); // [DEFAULT: true]
|
||||
/* 2033: disable autoplay for muted videos [FF63+] ***/
|
||||
// user_pref("media.autoplay.allow-muted", false);
|
||||
|
||||
/*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/
|
||||
user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
|
||||
/* 2201: prevent websites from disabling new window features
|
||||
* [1] http://kb.mozillazine.org/Prevent_websites_from_disabling_new_window_features ***/
|
||||
/* 2201: prevent websites from disabling new window features ***/
|
||||
user_pref("dom.disable_window_open_feature.close", true);
|
||||
user_pref("dom.disable_window_open_feature.location", true); // [DEFAULT: true]
|
||||
user_pref("dom.disable_window_open_feature.menubar", true);
|
||||
@ -975,8 +972,7 @@ user_pref("browser.link.open_newwindow.restriction", 0);
|
||||
* [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
|
||||
user_pref("dom.disable_open_during_load", true);
|
||||
/* 2212: limit events that can cause a popup [SETUP-WEB]
|
||||
* default is "change click dblclick auxclick mouseup pointerup notificationclick reset submit touchend contextmenu"
|
||||
* [1] http://kb.mozillazine.org/Dom.popup_allowed_events ***/
|
||||
* default is "change click dblclick auxclick mouseup pointerup notificationclick reset submit touchend contextmenu" ***/
|
||||
user_pref("dom.popup_allowed_events", "click dblclick");
|
||||
|
||||
/*** [SECTION 2300]: WEB WORKERS
|
||||
@ -997,30 +993,32 @@ user_pref("dom.popup_allowed_events", "click dblclick");
|
||||
***/
|
||||
user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
|
||||
/* 2302: disable service workers [FF32, FF44-compat]
|
||||
* Service workers essentially act as proxy servers that sit between web apps, and the browser
|
||||
* and network, are event driven, and can control the web page/site it is associated with,
|
||||
* intercepting and modifying navigation and resource requests, and caching resources.
|
||||
* Service workers essentially act as proxy servers that sit between web apps, and the
|
||||
* browser and network, are event driven, and can control the web page/site it is associated
|
||||
* with, intercepting and modifying navigation and resource requests, and caching resources.
|
||||
* [NOTE] Service worker APIs are hidden (in Firefox) and cannot be used when in PB mode.
|
||||
* [NOTE] Service workers only run over HTTPS. Service workers have no DOM access.
|
||||
* [SETUP-WEB] Disabling service workers will break some sites. This pref is a master switch, and controls
|
||||
* notifications (2304, 2305) and service worker cache (2740) - all three are inactive. Notifications are
|
||||
* behind a prompt (2306). If you enable service workers, then you may want to look at those as well ***/
|
||||
* [SETUP-WEB] Disabling service workers will break some sites. This pref is required true for
|
||||
* service worker notifications (2304), push notifications (disabled, 2305) and service worker
|
||||
* cache (2740). If you enable this pref, then check those settings as well ***/
|
||||
user_pref("dom.serviceWorkers.enabled", false);
|
||||
/* 2304: disable Web Notifications
|
||||
* [NOTE] Web Notifications require service workers (2302) and are behind a prompt (2306)
|
||||
* [NOTE] Web Notifications can also use service workers (2302) and are behind a prompt (2306)
|
||||
* [1] https://developer.mozilla.org/docs/Web/API/Notifications_API ***/
|
||||
// user_pref("dom.webnotifications.enabled", false); // [FF22+]
|
||||
// user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
|
||||
/* 2305: disable Push Notifications [FF44+]
|
||||
* web apps can receive messages pushed to them from a server, whether or
|
||||
* not the web app is in the foreground, or even currently loaded
|
||||
* [NOTE] Push Notifications require service workers (2302) and are behind a prompt (2306)
|
||||
* [1] https://developer.mozilla.org/docs/Web/API/Push_API ***/
|
||||
// user_pref("dom.push.enabled", false);
|
||||
// user_pref("dom.push.connection.enabled", false);
|
||||
// user_pref("dom.push.serverURL", "");
|
||||
* Push is an API that allows websites to send you (subscribed) messages even when the site
|
||||
* isn't loaded, by pushing messages to your userAgentID through Mozilla's Push Server.
|
||||
* [NOTE] Push requires service workers (2302) to subscribe to and display, and is behind
|
||||
* a prompt (2306). Disabling service workers alone doesn't stop Firefox polling the
|
||||
* Mozilla Push Server. To remove all subscriptions, reset your userAgentID (in about:config
|
||||
* or on start), and you will get a new one within a few seconds.
|
||||
* [1] https://support.mozilla.org/en-US/kb/push-notifications-firefox
|
||||
* [2] https://developer.mozilla.org/en-US/docs/Web/API/Push_API ***/
|
||||
user_pref("dom.push.enabled", false);
|
||||
// user_pref("dom.push.userAgentID", "");
|
||||
/* 2306: set a default permission for Notifications (both 2305 and 2306) [FF58+]
|
||||
/* 2306: set a default permission for Notifications (both 2304 and 2305) [FF58+]
|
||||
* 0=always ask (default), 1=allow, 2=block
|
||||
* [NOTE] Best left at default "always ask", fingerprintable via Permissions API
|
||||
* [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
|
||||
@ -1152,8 +1150,7 @@ user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
|
||||
* [1] https://bugzilla.mozilla.org/1216893 ***/
|
||||
// user_pref("svg.disabled", true);
|
||||
/* 2611: disable middle mouse click opening links from clipboard
|
||||
* [1] https://trac.torproject.org/projects/tor/ticket/10089
|
||||
* [2] http://kb.mozillazine.org/Middlemouse.contentLoadURL ***/
|
||||
* [1] https://trac.torproject.org/projects/tor/ticket/10089 ***/
|
||||
user_pref("middlemouse.contentLoadURL", false);
|
||||
/* 2614: limit HTTP redirects (this does not control redirects with HTML meta tags or JS)
|
||||
* [NOTE] A low setting of 5 or under will probably break some sites (e.g. gmail logins)
|
||||
@ -1194,10 +1191,11 @@ user_pref("network.protocol-handler.external.ms-windows-store", false);
|
||||
|
||||
/** DOWNLOADS ***/
|
||||
/* 2650: discourage downloading to desktop
|
||||
* 0=desktop 1=downloads 2=last used
|
||||
* 0=desktop, 1=downloads (default), 2=last used
|
||||
* [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
|
||||
// user_pref("browser.download.folderList", 2);
|
||||
/* 2651: enforce user interaction for security by always asking where to download [SETUP-CHROME]
|
||||
/* 2651: enforce user interaction for security by always asking where to download
|
||||
* [SETUP-CHROME] On Android this blocks longtapping and saving images
|
||||
* [SETTING] General>Downloads>Always ask you where to save files ***/
|
||||
user_pref("browser.download.useDownloadDir", false);
|
||||
/* 2652: disable adding downloads to the system's "recent documents" list ***/
|
||||
@ -1228,8 +1226,7 @@ user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
|
||||
* [1] https://developer.mozilla.org/docs/Web/HTTP/CSP ***/
|
||||
user_pref("security.csp.enable", true); // [DEFAULT: true]
|
||||
/* 2684: enforce a security delay on some confirmation dialogs such as install, open/save
|
||||
* [1] http://kb.mozillazine.org/Disable_extension_install_delay_-_Firefox
|
||||
* [2] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
|
||||
* [1] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
|
||||
user_pref("security.dialog_enable_delay", 700);
|
||||
|
||||
/*** [SECTION 2700]: PERSISTENT STORAGE
|
||||
@ -1248,9 +1245,8 @@ user_pref("security.dialog_enable_delay", 700);
|
||||
***/
|
||||
user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
|
||||
/* 2701: disable 3rd-party cookies and site-data [SETUP-WEB]
|
||||
* 0=Accept cookies and site data (default), 1=(Block) All third-party cookies, 2=(Block) All cookies,
|
||||
* 3=(Block) Cookies from unvisited sites, 4=(Block) Third-party trackers (FF63+)
|
||||
* [NOTE] Value 4 is tied to the Tracking Protection lists
|
||||
* 0=Accept cookies and site data, 1=(Block) All third-party cookies, 2=(Block) All cookies,
|
||||
* 3=(Block) Cookies from unvisited sites, 4=(Block) Third-party trackers (FF63+) (default FF69+)
|
||||
* [NOTE] You can set exceptions under site permissions or use an extension
|
||||
* [SETTING] Privacy & Security>Content Blocking>Custom>Choose what to block>Cookies ***/
|
||||
user_pref("network.cookie.cookieBehavior", 1);
|
||||
@ -1258,8 +1254,7 @@ user_pref("network.cookie.cookieBehavior", 1);
|
||||
and (FF58+) set third-party non-secure (i.e HTTP) cookies to session-only
|
||||
[NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and
|
||||
.nonsecureSessionOnly=true. This allows you to keep HTTPS cookies, but session-only HTTP ones
|
||||
* [1] https://feeding.cloud.geek.nz/posts/tweaking-cookies-for-privacy-in-firefox/
|
||||
* [2] http://kb.mozillazine.org/Network.cookie.thirdparty.sessionOnly ***/
|
||||
* [1] https://feeding.cloud.geek.nz/posts/tweaking-cookies-for-privacy-in-firefox/ ***/
|
||||
user_pref("network.cookie.thirdparty.sessionOnly", true);
|
||||
user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
|
||||
/* 2703: delete cookies and site data on close
|
||||
@ -1340,9 +1335,9 @@ user_pref("privacy.cpd.offlineApps", true); // Offline Website Data
|
||||
user_pref("privacy.cpd.passwords", false); // this is not listed
|
||||
user_pref("privacy.cpd.sessions", true); // Active Logins
|
||||
user_pref("privacy.cpd.siteSettings", false); // Site Preferences
|
||||
/* 2805: privacy.*.openWindows (clear session restore data) [FF34+]
|
||||
* [NOTE] There is a years-old bug that these cause two windows when Firefox restarts.
|
||||
* You do not need these anyway if session restore is cleared with history (see 2803) ***/
|
||||
/* 2805: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
|
||||
* [NOTE] Not needed if Session Restore is not used (see 0102) or is already cleared with history (see 2803)
|
||||
* [NOTE] privacy.cpd.openWindows has a bug that causes an additional window to open ***/
|
||||
// user_pref("privacy.clearOnShutdown.openWindows", true);
|
||||
// user_pref("privacy.cpd.openWindows", true);
|
||||
/* 2806: reset default 'Time range to clear' for 'Clear Recent History' (see 2804)
|
||||
@ -1368,9 +1363,9 @@ user_pref("privacy.sanitize.timeSpan", 0);
|
||||
** 1300671 - isolate data:, about: URLs (FF55+)
|
||||
** 1473247 - isolate IP addresses (FF63+)
|
||||
** 1492607 - isolate postMessage with targetOrigin "*" (requires 4002) (FF65+)
|
||||
** 1542309 - isolate top-level domain URLs (FF68+)
|
||||
** 1542309 - isolate top-level domain URLs when host is in the public suffix list (FF68+)
|
||||
** 1506693 - isolate pdfjs range-based requests (FF68+)
|
||||
** 1330467 - isolate site permissions (coming)
|
||||
** 1330467 - isolate site permissions (FF69+)
|
||||
***/
|
||||
user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
|
||||
/* 4001: enable First Party Isolation [FF51+]
|
||||
@ -1421,7 +1416,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
|
||||
** 1337161 - hide gamepads from content (see 4606) (FF56+)
|
||||
** 1372072 - spoof network information API as "unknown" when dom.netinfo.enabled = true (see 4607) (FF56+)
|
||||
** 1333641 - reduce fingerprinting in WebSpeech API (see 4608) (FF56+)
|
||||
** 1372069 & 1403813 & 1441295 - block geolocation requests (same as denying a site permission) (see 0201, 0201b) (FF56-62)
|
||||
** 1372069 & 1403813 & 1441295 - block geolocation requests (same as denying a site permission) (see 0201, 0202) (FF56-62)
|
||||
** 1369309 - spoof media statistics (see 4610) (FF57+)
|
||||
** 1382499 - reduce screen co-ordinate fingerprinting in Touch API (see 4611) (FF57+)
|
||||
** 1217290 & 1409677 - enable fingerprinting resistance for WebGL (see 2010-12) (FF57+)
|
||||
@ -1435,7 +1430,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
|
||||
Spoof: enumerate devices reports one "Internal Camera" and one "Internal Microphone" if
|
||||
media.navigator.enabled is true (see 2505 which we chose to keep disabled)
|
||||
Block: suppresses the ondevicechange event (see 4612)
|
||||
** 1039069 - warn when language prefs are set to non en-US (see 0207, 0208) (FF59+)
|
||||
** 1039069 - warn when language prefs are set to non en-US (see 0210, 0211) (FF59+)
|
||||
** 1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events (FF59+)
|
||||
Spoofing mimics the content language of the document. Currently it only supports en-US.
|
||||
Modifier events suppressed are SHIFT and both ALT keys. Chrome is not affected.
|
||||
@ -1486,10 +1481,15 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
|
||||
user_pref("browser.startup.blankWindow", false);
|
||||
|
||||
/*** [SECTION 4600]: RFP ALTERNATIVES
|
||||
* IF you DO use RFP (see 4500) then you DO NOT need these redundant prefs. In fact,
|
||||
some even cause RFP to not behave as you would expect and alter your fingerprint.
|
||||
Make sure they are RESET in about:config as per your Firefox version
|
||||
* IF you DO NOT use RFP or are on ESR... then turn on each ESR section below
|
||||
* non-RFP users:
|
||||
Enable the whole section (see the SETUP tag below)
|
||||
* RFP users:
|
||||
Make sure these are reset in about:config. They are redundant. In fact, some
|
||||
even cause RFP to not behave as you would expect and alter your fingerprint
|
||||
* ESR RFP users:
|
||||
Reset those *up to and including* your version. Add those *after* your version
|
||||
as active prefs in your overrides. This is assuming that the patch wasn't also
|
||||
backported to Firefox ESR. Backporting RFP patches to ESR is rare.
|
||||
***/
|
||||
user_pref("_user.js.parrot", "4600 syntax error: the parrot's crossed the Jordan");
|
||||
/* [SETUP-non-RFP] Non-RFP users replace the * with a slash on this line to enable these
|
||||
@ -1639,6 +1639,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
|
||||
// [SETTING] General>Browsing>Recommend extensions as you browse
|
||||
// user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
|
||||
// [SETTING] General>Browsing>Recommend features as you browse
|
||||
// user_pref("extensions.pocket.enabled", false); // disable and hide Pocket [FF46+]
|
||||
// user_pref("identity.fxaccounts.enabled", false); // disable and hide Firefox Accounts and Sync [FF60+] [RESTART]
|
||||
// user_pref("network.manage-offline-status", false); // see bugzilla 620472
|
||||
// user_pref("reader.parse-on-load.enabled", false); // "Reader View"
|
||||
@ -1675,7 +1676,7 @@ user_pref("network.jar.open-unsafe-types", false);
|
||||
user_pref("plugin.state.java", 0);
|
||||
// * * * /
|
||||
// FF63
|
||||
// 0202: disable GeoIP-based search results
|
||||
// 0205: disable GeoIP-based search results
|
||||
// [NOTE] May not be hidden if Firefox has changed your settings due to your locale
|
||||
// [-] https://bugzilla.mozilla.org/1462015
|
||||
user_pref("browser.search.countryCode", "US"); // [HIDDEN PREF]
|
||||
@ -1755,10 +1756,10 @@ user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
|
||||
// user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false);
|
||||
// * * * /
|
||||
// FF68
|
||||
// 0105b: disable Activity Stream Snippets
|
||||
// [-] https://bugzilla.mozilla.org/1540939
|
||||
user_pref("browser.aboutHomeSnippets.updateUrl", "");
|
||||
// 0105b: disable Activity Stream Legacy Snippets
|
||||
// [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1546190,1540939
|
||||
user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
|
||||
user_pref("browser.aboutHomeSnippets.updateUrl", "");
|
||||
// 0307: disable auto updating of lightweight themes (LWT)
|
||||
// Not to be confused with themes in 0301* + 0302*, which use the FF55+ Theme API
|
||||
// Mozilla plan to convert existing LWTs and remove LWT support in the future, see [1]
|
||||
@ -1772,5 +1773,20 @@ user_pref("security.csp.experimentalEnabled", true);
|
||||
// * * * /
|
||||
// ***/
|
||||
|
||||
/* ESR68.x still uses all the following prefs
|
||||
// [NOTE] replace the * with a slash in the line above to re-enable them
|
||||
// FF69
|
||||
// 1405: disable WOFF2 (Web Open Font Format) [FF35+]
|
||||
// [-] https://bugzilla.mozilla.org/1556991
|
||||
// user_pref("gfx.downloadable_fonts.woff2.enabled", false);
|
||||
// 1802: enforce click-to-play for plugins
|
||||
// [-] https://bugzilla.mozilla.org/1519434
|
||||
user_pref("plugins.click_to_play", true); // [DEFAULT: true in FF25+]
|
||||
// 2033: disable autoplay for muted videos [FF63+] - replaced by 'media.autoplay.default' options (2030)
|
||||
// [-] https://bugzilla.mozilla.org/1562331
|
||||
// user_pref("media.autoplay.allow-muted", false);
|
||||
// * * * /
|
||||
// ***/
|
||||
|
||||
/* END: internal custom pref to test for syntax errors ***/
|
||||
user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");
|
||||
|
Reference in New Issue
Block a user