|
|
@ -1,8 +1,7 @@
|
|
|
|
/******
|
|
|
|
/******
|
|
|
|
* name: ghacks user.js
|
|
|
|
* name: ghacks user.js
|
|
|
|
* date: 20 September 2019
|
|
|
|
* date: 20 January 2020
|
|
|
|
* version 69: Pants One More Time
|
|
|
|
* version 72-beta
|
|
|
|
* "When I'm not with pants I lose my mind. Give me a sign. Hit me, pants, one more time."
|
|
|
|
|
|
|
|
* authors: v52+ github | v51- www.ghacks.net
|
|
|
|
* authors: v52+ github | v51- www.ghacks.net
|
|
|
|
* url: https://github.com/ghacksuserjs/ghacks-user.js
|
|
|
|
* url: https://github.com/ghacksuserjs/ghacks-user.js
|
|
|
|
* license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
|
|
|
|
* license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
|
|
|
@ -83,6 +82,12 @@
|
|
|
|
* [1] https://blog.mozilla.org/nnethercote/2018/03/09/a-new-preferences-parser-for-firefox/ ***/
|
|
|
|
* [1] https://blog.mozilla.org/nnethercote/2018/03/09/a-new-preferences-parser-for-firefox/ ***/
|
|
|
|
user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong with it?");
|
|
|
|
user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong with it?");
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* 0000: disable about:config warning
|
|
|
|
|
|
|
|
* The XUL version can still be accessed in FF71+ @ chrome://global/content/config.xul
|
|
|
|
|
|
|
|
* and in FF73+ @ chrome://global/content/config.xhtml ***/
|
|
|
|
|
|
|
|
user_pref("general.warnOnAboutConfig", false); // for the XUL version
|
|
|
|
|
|
|
|
user_pref("browser.aboutConfig.showWarning", false); // for the new HTML version [FF71+]
|
|
|
|
|
|
|
|
|
|
|
|
/*** [SECTION 0100]: STARTUP ***/
|
|
|
|
/*** [SECTION 0100]: STARTUP ***/
|
|
|
|
user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
|
|
|
|
user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
|
|
|
|
/* 0101: disable default browser check
|
|
|
|
/* 0101: disable default browser check
|
|
|
@ -108,7 +113,6 @@ user_pref("browser.newtab.preload", false);
|
|
|
|
/* 0105a: disable Activity Stream telemetry ***/
|
|
|
|
/* 0105a: disable Activity Stream telemetry ***/
|
|
|
|
user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
|
|
|
|
user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
|
|
|
|
user_pref("browser.newtabpage.activity-stream.telemetry", false);
|
|
|
|
user_pref("browser.newtabpage.activity-stream.telemetry", false);
|
|
|
|
user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
|
|
|
|
|
|
|
|
/* 0105b: disable Activity Stream Snippets
|
|
|
|
/* 0105b: disable Activity Stream Snippets
|
|
|
|
* Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
|
|
|
|
* Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
|
|
|
|
* [1] https://abouthome-snippets-service.readthedocs.io/ ***/
|
|
|
|
* [1] https://abouthome-snippets-service.readthedocs.io/ ***/
|
|
|
@ -194,7 +198,7 @@ user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the
|
|
|
|
// user_pref("extensions.update.enabled", false);
|
|
|
|
// user_pref("extensions.update.enabled", false);
|
|
|
|
/* 0302a: disable auto-INSTALLING Firefox updates [NON-WINDOWS FF65+]
|
|
|
|
/* 0302a: disable auto-INSTALLING Firefox updates [NON-WINDOWS FF65+]
|
|
|
|
* [NOTE] In FF65+ on Windows this SETTING (below) is now stored in a file and the pref was removed
|
|
|
|
* [NOTE] In FF65+ on Windows this SETTING (below) is now stored in a file and the pref was removed
|
|
|
|
* [SETTING] General>Firefox Updates>Check for updates but let you choose... ***/
|
|
|
|
* [SETTING] General>Firefox Updates>Check for updates but let you choose to install them ***/
|
|
|
|
user_pref("app.update.auto", false);
|
|
|
|
user_pref("app.update.auto", false);
|
|
|
|
/* 0302b: disable auto-INSTALLING extension and theme updates (after the check in 0301b)
|
|
|
|
/* 0302b: disable auto-INSTALLING extension and theme updates (after the check in 0301b)
|
|
|
|
* [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
|
|
|
|
* [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
|
|
|
@ -203,7 +207,8 @@ user_pref("app.update.auto", false);
|
|
|
|
* used when installing/updating an extension, and in daily background update checks: if false, it
|
|
|
|
* used when installing/updating an extension, and in daily background update checks: if false, it
|
|
|
|
* hides the expanded text description (if it exists) when you "show more details about an addon" ***/
|
|
|
|
* hides the expanded text description (if it exists) when you "show more details about an addon" ***/
|
|
|
|
// user_pref("extensions.getAddons.cache.enabled", false);
|
|
|
|
// user_pref("extensions.getAddons.cache.enabled", false);
|
|
|
|
/* 0308: disable search update
|
|
|
|
/* 0308: disable search engine updates (e.g. OpenSearch)
|
|
|
|
|
|
|
|
* [NOTE] This does not affect Mozilla's built-in or Web Extension search engines
|
|
|
|
* [SETTING] General>Firefox Updates>Automatically update search engines ***/
|
|
|
|
* [SETTING] General>Firefox Updates>Automatically update search engines ***/
|
|
|
|
user_pref("browser.search.update", false);
|
|
|
|
user_pref("browser.search.update", false);
|
|
|
|
/* 0309: disable sending Flash crash reports ***/
|
|
|
|
/* 0309: disable sending Flash crash reports ***/
|
|
|
@ -232,7 +237,6 @@ user_pref("toolkit.telemetry.shutdownPingSender.enabled", false); // [FF55+]
|
|
|
|
user_pref("toolkit.telemetry.updatePing.enabled", false); // [FF56+]
|
|
|
|
user_pref("toolkit.telemetry.updatePing.enabled", false); // [FF56+]
|
|
|
|
user_pref("toolkit.telemetry.bhrPing.enabled", false); // [FF57+] Background Hang Reporter
|
|
|
|
user_pref("toolkit.telemetry.bhrPing.enabled", false); // [FF57+] Background Hang Reporter
|
|
|
|
user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // [FF57+]
|
|
|
|
user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // [FF57+]
|
|
|
|
user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+]
|
|
|
|
|
|
|
|
/* 0331: disable Telemetry Coverage
|
|
|
|
/* 0331: disable Telemetry Coverage
|
|
|
|
* [1] https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/ ***/
|
|
|
|
* [1] https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/ ***/
|
|
|
|
user_pref("toolkit.telemetry.coverage.opt-out", true); // [HIDDEN PREF]
|
|
|
|
user_pref("toolkit.telemetry.coverage.opt-out", true); // [HIDDEN PREF]
|
|
|
@ -246,12 +250,11 @@ user_pref("datareporting.healthreport.uploadEnabled", false);
|
|
|
|
* [1] https://bugzilla.mozilla.org/1195552 ***/
|
|
|
|
* [1] https://bugzilla.mozilla.org/1195552 ***/
|
|
|
|
user_pref("datareporting.policy.dataSubmissionEnabled", false);
|
|
|
|
user_pref("datareporting.policy.dataSubmissionEnabled", false);
|
|
|
|
/* 0342: disable Studies (see 0503)
|
|
|
|
/* 0342: disable Studies (see 0503)
|
|
|
|
* [NOTE] This pref has no effect when Health Reports (0340) are disabled
|
|
|
|
* [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to install and run studies ***/
|
|
|
|
* [SETTING] Privacy & Security>Firefox Data Collection & Use>...>Allow Firefox to install and run studies ***/
|
|
|
|
|
|
|
|
user_pref("app.shield.optoutstudies.enabled", false);
|
|
|
|
user_pref("app.shield.optoutstudies.enabled", false);
|
|
|
|
/* 0343: disable personalized Extension Recommendations in about:addons and AMO [FF65+]
|
|
|
|
/* 0343: disable personalized Extension Recommendations in about:addons and AMO [FF65+]
|
|
|
|
* [NOTE] This pref has no effect when Health Reports (0340) are disabled
|
|
|
|
* [NOTE] This pref has no effect when Health Reports (0340) are disabled
|
|
|
|
* [SETTING] Privacy & Security>Firefox Data Collection & Use>...>Allow Firefox to make personalized extension rec.
|
|
|
|
* [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to make personalized extension recommendations
|
|
|
|
* [1] https://support.mozilla.org/kb/personalized-extension-recommendations ***/
|
|
|
|
* [1] https://support.mozilla.org/kb/personalized-extension-recommendations ***/
|
|
|
|
user_pref("browser.discovery.enabled", false);
|
|
|
|
user_pref("browser.discovery.enabled", false);
|
|
|
|
/* 0350: disable Crash Reports ***/
|
|
|
|
/* 0350: disable Crash Reports ***/
|
|
|
@ -355,7 +358,7 @@ user_pref("browser.ping-centre.telemetry", false);
|
|
|
|
/* 0517: disable Form Autofill
|
|
|
|
/* 0517: disable Form Autofill
|
|
|
|
* [NOTE] Stored data is NOT secure (uses a JSON file)
|
|
|
|
* [NOTE] Stored data is NOT secure (uses a JSON file)
|
|
|
|
* [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
|
|
|
|
* [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
|
|
|
|
* [SETTING] Privacy & Security>Forms & Passwords>Autofill addresses
|
|
|
|
* [SETTING] Options>Privacy&Security>Forms and Autofill>Autofill addresses (FF73+)
|
|
|
|
* [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill
|
|
|
|
* [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill
|
|
|
|
* [2] https://www.ghacks.net/2017/05/24/firefoxs-new-form-autofill-is-awesome/ ***/
|
|
|
|
* [2] https://www.ghacks.net/2017/05/24/firefoxs-new-form-autofill-is-awesome/ ***/
|
|
|
|
user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
|
|
|
|
user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
|
|
|
@ -375,7 +378,7 @@ user_pref("network.prefetch-next", false);
|
|
|
|
* [1] https://www.ghacks.net/2013/04/27/firefox-prefetching-what-you-need-to-know/
|
|
|
|
* [1] https://www.ghacks.net/2013/04/27/firefox-prefetching-what-you-need-to-know/
|
|
|
|
* [2] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
|
|
|
|
* [2] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
|
|
|
|
user_pref("network.dns.disablePrefetch", true);
|
|
|
|
user_pref("network.dns.disablePrefetch", true);
|
|
|
|
user_pref("network.dns.disablePrefetchFromHTTPS", true); // [HIDDEN PREF]
|
|
|
|
user_pref("network.dns.disablePrefetchFromHTTPS", true); // [HIDDEN PREF ESR] [DEFAULT: true FF70+]
|
|
|
|
/* 0603: disable predictor / prefetching ***/
|
|
|
|
/* 0603: disable predictor / prefetching ***/
|
|
|
|
user_pref("network.predictor.enabled", false);
|
|
|
|
user_pref("network.predictor.enabled", false);
|
|
|
|
user_pref("network.predictor.enable-prefetch", false); // [FF48+]
|
|
|
|
user_pref("network.predictor.enable-prefetch", false); // [FF48+]
|
|
|
@ -405,7 +408,7 @@ user_pref("network.dns.disableIPv6", true);
|
|
|
|
* HTTP2 raises concerns with "multiplexing" and "server push", does nothing to
|
|
|
|
* HTTP2 raises concerns with "multiplexing" and "server push", does nothing to
|
|
|
|
* enhance privacy, and opens up a number of server-side fingerprinting opportunities.
|
|
|
|
* enhance privacy, and opens up a number of server-side fingerprinting opportunities.
|
|
|
|
* [WARNING] Disabling this made sense in the past, and doesn't break anything, but HTTP2 is
|
|
|
|
* [WARNING] Disabling this made sense in the past, and doesn't break anything, but HTTP2 is
|
|
|
|
* at 35% (April 2019) and growing [5]. Don't be that one person using HTTP1.1 on HTTP2 sites
|
|
|
|
* at 40% (December 2019) and growing [5]. Don't be that one person using HTTP1.1 on HTTP2 sites
|
|
|
|
* [1] https://http2.github.io/faq/
|
|
|
|
* [1] https://http2.github.io/faq/
|
|
|
|
* [2] https://blog.scottlogic.com/2014/11/07/http-2-a-quick-look.html
|
|
|
|
* [2] https://blog.scottlogic.com/2014/11/07/http-2-a-quick-look.html
|
|
|
|
* [3] https://http2.github.io/http2-spec/#rfc.section.10.8
|
|
|
|
* [3] https://http2.github.io/http2-spec/#rfc.section.10.8
|
|
|
@ -428,16 +431,6 @@ user_pref("network.http.altsvc.oe", false);
|
|
|
|
* as a remote Tor node will handle the DNS request
|
|
|
|
* as a remote Tor node will handle the DNS request
|
|
|
|
* [1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
|
|
|
|
* [1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
|
|
|
|
user_pref("network.proxy.socks_remote_dns", true);
|
|
|
|
user_pref("network.proxy.socks_remote_dns", true);
|
|
|
|
/* 0707: disable (or setup) DNS-over-HTTPS (DoH) [FF60+]
|
|
|
|
|
|
|
|
* TRR = Trusted Recursive Resolver
|
|
|
|
|
|
|
|
* 0=off by default, 1=race (removed in FF69), 2=TRR first, 3=TRR only,
|
|
|
|
|
|
|
|
* 4=race for stats but always use native result (removed in FF69), 5=explicitly off
|
|
|
|
|
|
|
|
* [WARNING] DoH bypasses hosts and gives info to yet another party (e.g. Cloudflare)
|
|
|
|
|
|
|
|
* [1] https://www.ghacks.net/2018/04/02/configure-dns-over-https-in-firefox/
|
|
|
|
|
|
|
|
* [2] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/ ***/
|
|
|
|
|
|
|
|
// user_pref("network.trr.mode", 0);
|
|
|
|
|
|
|
|
// user_pref("network.trr.bootstrapAddress", "");
|
|
|
|
|
|
|
|
// user_pref("network.trr.uri", "");
|
|
|
|
|
|
|
|
/* 0708: disable FTP [FF60+]
|
|
|
|
/* 0708: disable FTP [FF60+]
|
|
|
|
* [1] https://www.ghacks.net/2018/02/20/firefox-60-with-new-preference-to-disable-ftp/ ***/
|
|
|
|
* [1] https://www.ghacks.net/2018/02/20/firefox-60-with-new-preference-to-disable-ftp/ ***/
|
|
|
|
// user_pref("network.ftp.enabled", false);
|
|
|
|
// user_pref("network.ftp.enabled", false);
|
|
|
@ -522,11 +515,12 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
|
|
|
|
/* 0850e: disable location bar one-off searches [FF51+]
|
|
|
|
/* 0850e: disable location bar one-off searches [FF51+]
|
|
|
|
* [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/ ***/
|
|
|
|
* [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/ ***/
|
|
|
|
// user_pref("browser.urlbar.oneOffSearches", false);
|
|
|
|
// user_pref("browser.urlbar.oneOffSearches", false);
|
|
|
|
/* 0860: disable search and form history [SETUP-WEB]
|
|
|
|
/* 0860: disable search and form history
|
|
|
|
* [WARNING] Autocomplete form data is still (in April 2019) easily read by third parties, see [1]
|
|
|
|
* [SETUP-WEB] Be aware thet autocomplete form data can be read by third parties, see [1] [2]
|
|
|
|
* [NOTE] We also clear formdata on exiting Firefox (see 2803)
|
|
|
|
* [NOTE] We also clear formdata on exit (see 2803)
|
|
|
|
* [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
|
|
|
|
* [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
|
|
|
|
* [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html ***/
|
|
|
|
* [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
|
|
|
|
|
|
|
|
* [2] https://bugzilla.mozilla.org/381681 ***/
|
|
|
|
user_pref("browser.formfill.enable", false);
|
|
|
|
user_pref("browser.formfill.enable", false);
|
|
|
|
/* 0862: disable browsing and download history
|
|
|
|
/* 0862: disable browsing and download history
|
|
|
|
* [NOTE] We also clear history and downloads on exiting Firefox (see 2803)
|
|
|
|
* [NOTE] We also clear history and downloads on exiting Firefox (see 2803)
|
|
|
@ -544,11 +538,11 @@ user_pref("browser.taskbar.previews.enable", false);
|
|
|
|
user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
|
|
|
|
user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
|
|
|
|
/* 0901: disable saving passwords
|
|
|
|
/* 0901: disable saving passwords
|
|
|
|
* [NOTE] This does not clear any passwords already saved
|
|
|
|
* [NOTE] This does not clear any passwords already saved
|
|
|
|
* [SETTING] Privacy & Security>Forms & Passwords>Ask to save logins and passwords for websites ***/
|
|
|
|
* [SETTING] Privacy & Security>Logins and Passwords>Ask to save logins and passwords for websites ***/
|
|
|
|
// user_pref("signon.rememberSignons", false);
|
|
|
|
// user_pref("signon.rememberSignons", false);
|
|
|
|
/* 0902: use a master password (recommended if you save passwords)
|
|
|
|
/* 0902: use a master password
|
|
|
|
* There are no preferences for this. It is all handled internally.
|
|
|
|
* There are no preferences for this. It is all handled internally.
|
|
|
|
* [SETTING] Privacy & Security>Forms & Passwords>Use a master password
|
|
|
|
* [SETTING] Privacy & Security>Logins and Passwords>Use a master password
|
|
|
|
* [1] https://support.mozilla.org/kb/use-master-password-protect-stored-logins ***/
|
|
|
|
* [1] https://support.mozilla.org/kb/use-master-password-protect-stored-logins ***/
|
|
|
|
/* 0903: set how often Firefox should ask for the master password
|
|
|
|
/* 0903: set how often Firefox should ask for the master password
|
|
|
|
* 0=the first time (default), 1=every time it's needed, 2=every n minutes (see 0904) ***/
|
|
|
|
* 0=the first time (default), 1=every time it's needed, 2=every n minutes (see 0904) ***/
|
|
|
@ -558,7 +552,8 @@ user_pref("security.ask_for_password", 2);
|
|
|
|
user_pref("security.password_lifetime", 5);
|
|
|
|
user_pref("security.password_lifetime", 5);
|
|
|
|
/* 0905: disable auto-filling username & password form fields
|
|
|
|
/* 0905: disable auto-filling username & password form fields
|
|
|
|
* can leak in cross-site forms *and* be spoofed
|
|
|
|
* can leak in cross-site forms *and* be spoofed
|
|
|
|
* [NOTE] Username & password is still available when you enter the field ***/
|
|
|
|
* [NOTE] Username & password is still available when you enter the field
|
|
|
|
|
|
|
|
* [SETTING] Privacy & Security>Logins and Passwords>Autofill logins and passwords ***/
|
|
|
|
user_pref("signon.autofillForms", false);
|
|
|
|
user_pref("signon.autofillForms", false);
|
|
|
|
/* 0909: disable formless login capture for Password Manager [FF51+] ***/
|
|
|
|
/* 0909: disable formless login capture for Password Manager [FF51+] ***/
|
|
|
|
user_pref("signon.formlessCapture.enabled", false);
|
|
|
|
user_pref("signon.formlessCapture.enabled", false);
|
|
|
@ -596,7 +591,7 @@ user_pref("browser.cache.disk.enable", false);
|
|
|
|
/* 1003: disable memory cache
|
|
|
|
/* 1003: disable memory cache
|
|
|
|
/* capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kilobytes ***/
|
|
|
|
/* capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kilobytes ***/
|
|
|
|
// user_pref("browser.cache.memory.enable", false);
|
|
|
|
// user_pref("browser.cache.memory.enable", false);
|
|
|
|
// user_pref("browser.cache.memory.capacity", 0); // [HIDDEN PREF]
|
|
|
|
// user_pref("browser.cache.memory.capacity", 0); // [HIDDEN PREF ESR]
|
|
|
|
/* 1006: disable permissions manager from writing to disk [RESTART]
|
|
|
|
/* 1006: disable permissions manager from writing to disk [RESTART]
|
|
|
|
* [NOTE] This means any permission changes are session only
|
|
|
|
* [NOTE] This means any permission changes are session only
|
|
|
|
* [1] https://bugzilla.mozilla.org/967812 ***/
|
|
|
|
* [1] https://bugzilla.mozilla.org/967812 ***/
|
|
|
@ -630,35 +625,37 @@ user_pref("toolkit.winRegisterApplicationRestart", false);
|
|
|
|
* profile/shortcutCache directory. The .ico remains after the shortcut is deleted.
|
|
|
|
* profile/shortcutCache directory. The .ico remains after the shortcut is deleted.
|
|
|
|
* If set to false then the shortcuts use a generic Firefox icon ***/
|
|
|
|
* If set to false then the shortcuts use a generic Firefox icon ***/
|
|
|
|
user_pref("browser.shell.shortcutFavicons", false);
|
|
|
|
user_pref("browser.shell.shortcutFavicons", false);
|
|
|
|
/* 1031: disable favicons in tabs and new bookmarks
|
|
|
|
/* 1031: disable favicons in history and bookmarks
|
|
|
|
* bookmark favicons are stored as data blobs in favicons.sqlite ***/
|
|
|
|
* Stored as data blobs in favicons.sqlite, these don't reveal anything that your
|
|
|
|
|
|
|
|
* actual history (and bookmarks) already do. Your history is more detailed, so
|
|
|
|
|
|
|
|
* control that instead; e.g. disable history, clear history on close, use PB mode
|
|
|
|
|
|
|
|
* [NOTE] favicons.sqlite is sanitized on Firefox close, not in-session ***/
|
|
|
|
// user_pref("browser.chrome.site_icons", false);
|
|
|
|
// user_pref("browser.chrome.site_icons", false);
|
|
|
|
/* 1032: disable favicons in web notifications ***/
|
|
|
|
/* 1032: disable favicons in web notifications ***/
|
|
|
|
user_pref("alerts.showFavicons", false); // [DEFAULT: false]
|
|
|
|
// user_pref("alerts.showFavicons", false); // [DEFAULT: false]
|
|
|
|
|
|
|
|
|
|
|
|
/*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
|
|
|
|
/*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
|
|
|
|
Note that your cipher and other settings can be used server side as a fingerprint attack
|
|
|
|
Your cipher and other settings can be used in server side fingerprinting
|
|
|
|
vector, see [1] (It's quite technical but the first part is easy to understand
|
|
|
|
[TEST] https://www.ssllabs.com/ssltest/viewMyClient.html
|
|
|
|
and you can stop reading when you reach the second section titled "Enter Bro")
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Option 1: Use defaults for ciphers (1260's). There is nothing *weak* about these, but
|
|
|
|
|
|
|
|
due to breakage, browsers can't deprecate them until the web stops using them
|
|
|
|
|
|
|
|
Option 2: Disable the ciphers in 1261, 1262 and 1263. These shouldn't break anything.
|
|
|
|
|
|
|
|
Optionally, disable the ciphers in 1264.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
[1] https://www.securityartwork.es/2017/02/02/tls-client-fingerprinting-with-bro/
|
|
|
|
[1] https://www.securityartwork.es/2017/02/02/tls-client-fingerprinting-with-bro/
|
|
|
|
***/
|
|
|
|
***/
|
|
|
|
user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
|
|
|
|
user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
|
|
|
|
/** SSL (Secure Sockets Layer) / TLS (Transport Layer Security) ***/
|
|
|
|
/** SSL (Secure Sockets Layer) / TLS (Transport Layer Security) ***/
|
|
|
|
/* 1201: disable old SSL/TLS "insecure" renegotiation (vulnerable to a MiTM attack)
|
|
|
|
/* 1201: require safe negotiation
|
|
|
|
* [SETUP-WEB] <2% of secure sites do NOT support the newer "secure" renegotiation, see [2]
|
|
|
|
* Blocks connections to servers that don't support RFC 5746 [2] as they're potentially
|
|
|
|
|
|
|
|
* vulnerable to a MiTM attack [3]. A server *without* RFC 5746 can be safe from the attack
|
|
|
|
|
|
|
|
* if it disables renegotiations but the problem is that the browser can't know that.
|
|
|
|
|
|
|
|
* Setting this pref to true is the only way for the browser to ensure there will be
|
|
|
|
|
|
|
|
* no unsafe renegotiations on the channel between the browser and the server.
|
|
|
|
* [1] https://wiki.mozilla.org/Security:Renegotiation
|
|
|
|
* [1] https://wiki.mozilla.org/Security:Renegotiation
|
|
|
|
* [2] https://www.ssllabs.com/ssl-pulse/ ***/
|
|
|
|
* [2] https://tools.ietf.org/html/rfc5746
|
|
|
|
|
|
|
|
* [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 ***/
|
|
|
|
user_pref("security.ssl.require_safe_negotiation", true);
|
|
|
|
user_pref("security.ssl.require_safe_negotiation", true);
|
|
|
|
/* 1202: control TLS versions with min and max
|
|
|
|
/* 1202: control TLS versions with min and max
|
|
|
|
* 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
|
|
|
|
* 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
|
|
|
|
* [WARNING] Leave these at default, otherwise you alter your TLS fingerprint.
|
|
|
|
* [WARNING] Leave these at default, otherwise you alter your TLS fingerprint.
|
|
|
|
* Firefox telemetry (April 2019) shows only 0.5% of TLS web traffic uses 1.0 or 1.1 ***/
|
|
|
|
* Firefox telemetry (April 2019) shows only 0.5% of TLS web traffic uses 1.0 or 1.1
|
|
|
|
|
|
|
|
* [1] https://www.ssllabs.com/ssl-pulse/ ***/
|
|
|
|
// user_pref("security.tls.version.min", 3);
|
|
|
|
// user_pref("security.tls.version.min", 3);
|
|
|
|
// user_pref("security.tls.version.max", 4);
|
|
|
|
// user_pref("security.tls.version.max", 4);
|
|
|
|
/* 1203: disable SSL session tracking [FF36+]
|
|
|
|
/* 1203: disable SSL session tracking [FF36+]
|
|
|
@ -725,7 +722,7 @@ user_pref("security.family_safety.mode", 0);
|
|
|
|
// user_pref("security.nocertdb", true); // [HIDDEN PREF]
|
|
|
|
// user_pref("security.nocertdb", true); // [HIDDEN PREF]
|
|
|
|
/* 1223: enforce strict pinning
|
|
|
|
/* 1223: enforce strict pinning
|
|
|
|
* PKP (Public Key Pinning) 0=disabled 1=allow user MiTM (such as your antivirus), 2=strict
|
|
|
|
* PKP (Public Key Pinning) 0=disabled 1=allow user MiTM (such as your antivirus), 2=strict
|
|
|
|
* [WARNING] If you rely on an AV (antivirus) to protect your web browsing
|
|
|
|
* [SETUP-WEB] If you rely on an AV (antivirus) to protect your web browsing
|
|
|
|
* by inspecting ALL your web traffic, then leave at current default=1
|
|
|
|
* by inspecting ALL your web traffic, then leave at current default=1
|
|
|
|
* [1] https://trac.torproject.org/projects/tor/ticket/16206 ***/
|
|
|
|
* [1] https://trac.torproject.org/projects/tor/ticket/16206 ***/
|
|
|
|
user_pref("security.cert_pinning.enforcement_level", 2);
|
|
|
|
user_pref("security.cert_pinning.enforcement_level", 2);
|
|
|
@ -740,7 +737,7 @@ user_pref("security.mixed_content.block_display_content", true);
|
|
|
|
* [1] https://bugzilla.mozilla.org/1190623 ***/
|
|
|
|
* [1] https://bugzilla.mozilla.org/1190623 ***/
|
|
|
|
user_pref("security.mixed_content.block_object_subrequest", true);
|
|
|
|
user_pref("security.mixed_content.block_object_subrequest", true);
|
|
|
|
|
|
|
|
|
|
|
|
/** CIPHERS [see the section 1200 intro] ***/
|
|
|
|
/** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro] ***/
|
|
|
|
/* 1261: disable 3DES (effective key size < 128)
|
|
|
|
/* 1261: disable 3DES (effective key size < 128)
|
|
|
|
* [1] https://en.wikipedia.org/wiki/3des#Security
|
|
|
|
* [1] https://en.wikipedia.org/wiki/3des#Security
|
|
|
|
* [2] https://en.wikipedia.org/wiki/Meet-in-the-middle_attack
|
|
|
|
* [2] https://en.wikipedia.org/wiki/Meet-in-the-middle_attack
|
|
|
@ -758,8 +755,10 @@ user_pref("security.mixed_content.block_object_subrequest", true);
|
|
|
|
// user_pref("security.ssl3.rsa_aes_256_sha", false);
|
|
|
|
// user_pref("security.ssl3.rsa_aes_256_sha", false);
|
|
|
|
|
|
|
|
|
|
|
|
/** UI (User Interface) ***/
|
|
|
|
/** UI (User Interface) ***/
|
|
|
|
/* 1270: display warning (red padlock) for "broken security" (see 1201)
|
|
|
|
/* 1270: display warning on the padlock for "broken security" (if 1201 is false)
|
|
|
|
* [1] https://wiki.mozilla.org/Security:Renegotiation ***/
|
|
|
|
* Bug: warning padlock not indicated for subresources on a secure page! [2]
|
|
|
|
|
|
|
|
* [1] https://wiki.mozilla.org/Security:Renegotiation
|
|
|
|
|
|
|
|
* [2] https://bugzilla.mozilla.org/1353705 ***/
|
|
|
|
user_pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
|
|
|
|
user_pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
|
|
|
|
/* 1271: control "Add Security Exception" dialog on SSL warnings
|
|
|
|
/* 1271: control "Add Security Exception" dialog on SSL warnings
|
|
|
|
* 0=do neither 1=pre-populate url 2=pre-populate url + pre-fetch cert (default)
|
|
|
|
* 0=do neither 1=pre-populate url 2=pre-populate url + pre-fetch cert (default)
|
|
|
@ -771,10 +770,8 @@ user_pref("browser.ssl_override_behavior", 1);
|
|
|
|
* [TEST] https://expired.badssl.com/ ***/
|
|
|
|
* [TEST] https://expired.badssl.com/ ***/
|
|
|
|
user_pref("browser.xul.error_pages.expert_bad_cert", true);
|
|
|
|
user_pref("browser.xul.error_pages.expert_bad_cert", true);
|
|
|
|
/* 1273: display "insecure" icon and "Not Secure" text on HTTP sites ***/
|
|
|
|
/* 1273: display "insecure" icon and "Not Secure" text on HTTP sites ***/
|
|
|
|
user_pref("security.insecure_connection_icon.enabled", true); // [FF59+]
|
|
|
|
user_pref("security.insecure_connection_icon.enabled", true); // [FF59+] [DEFAULT: true FF70+]
|
|
|
|
user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
|
|
|
|
user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
|
|
|
|
// user_pref("security.insecure_connection_icon.pbmode.enabled", true); // [FF59+] private windows only
|
|
|
|
|
|
|
|
// user_pref("security.insecure_connection_text.pbmode.enabled", true); // [FF60+] private windows only
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/*** [SECTION 1400]: FONTS ***/
|
|
|
|
/*** [SECTION 1400]: FONTS ***/
|
|
|
|
user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
|
|
|
|
user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
|
|
|
@ -791,9 +788,10 @@ user_pref("browser.display.use_document_fonts", 0);
|
|
|
|
/* 1404: disable rendering of SVG OpenType fonts
|
|
|
|
/* 1404: disable rendering of SVG OpenType fonts
|
|
|
|
* [1] https://wiki.mozilla.org/SVGOpenTypeFonts - iSECPartnersReport recommends to disable this ***/
|
|
|
|
* [1] https://wiki.mozilla.org/SVGOpenTypeFonts - iSECPartnersReport recommends to disable this ***/
|
|
|
|
user_pref("gfx.font_rendering.opentype_svg.enabled", false);
|
|
|
|
user_pref("gfx.font_rendering.opentype_svg.enabled", false);
|
|
|
|
/* 1408: disable graphite which FF49 turned back on by default
|
|
|
|
/* 1408: disable graphite
|
|
|
|
* In the past it had security issues. Update: This continues to be the case, see [1]
|
|
|
|
* Graphite has had many critical security issues in the past, see [1]
|
|
|
|
* [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778 ***/
|
|
|
|
* [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778
|
|
|
|
|
|
|
|
* [2] https://en.wikipedia.org/wiki/Graphite_(SIL) ***/
|
|
|
|
user_pref("gfx.font_rendering.graphite.enabled", false);
|
|
|
|
user_pref("gfx.font_rendering.graphite.enabled", false);
|
|
|
|
/* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
|
|
|
|
/* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
|
|
|
|
* If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed.
|
|
|
|
* If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed.
|
|
|
@ -827,7 +825,7 @@ user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
|
|
|
|
// user_pref("network.http.referer.trimmingPolicy", 0); // [DEFAULT: 0]
|
|
|
|
// user_pref("network.http.referer.trimmingPolicy", 0); // [DEFAULT: 0]
|
|
|
|
/* 1603: CROSS ORIGIN: control when to send a referer
|
|
|
|
/* 1603: CROSS ORIGIN: control when to send a referer
|
|
|
|
* 0=always (default), 1=only if base domains match, 2=only if hosts match
|
|
|
|
* 0=always (default), 1=only if base domains match, 2=only if hosts match
|
|
|
|
* [SETUP-WEB] Known to cause issues with older modems/routers and some sites e.g vimeo ***/
|
|
|
|
* [SETUP-WEB] Known to cause issues with older modems/routers and some sites e.g vimeo, icloud ***/
|
|
|
|
user_pref("network.http.referer.XOriginPolicy", 1);
|
|
|
|
user_pref("network.http.referer.XOriginPolicy", 1);
|
|
|
|
/* 1604: CROSS ORIGIN: control the amount of information to send [FF52+]
|
|
|
|
/* 1604: CROSS ORIGIN: control the amount of information to send [FF52+]
|
|
|
|
* 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
|
|
|
|
* 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
|
|
|
@ -850,8 +848,8 @@ user_pref("network.http.referer.XOriginTrimmingPolicy", 0); // [DEFAULT: 0]
|
|
|
|
* [1] https://bugzilla.mozilla.org/1305144 ***/
|
|
|
|
* [1] https://bugzilla.mozilla.org/1305144 ***/
|
|
|
|
user_pref("network.http.referer.hideOnionSource", true);
|
|
|
|
user_pref("network.http.referer.hideOnionSource", true);
|
|
|
|
/* 1610: ALL: enable the DNT (Do Not Track) HTTP header
|
|
|
|
/* 1610: ALL: enable the DNT (Do Not Track) HTTP header
|
|
|
|
* [NOTE] DNT is enforced with Tracking Protection regardless of this pref
|
|
|
|
* [NOTE] DNT is enforced with Enhanced Tracking Protection regardless of this pref
|
|
|
|
* [SETTING] Privacy & Security>Content Blocking>Send websites a "Do Not Track"... ***/
|
|
|
|
* [SETTING] Privacy & Security>Enhanced Tracking Protection>Send websites a "Do Not Track" signal... ***/
|
|
|
|
user_pref("privacy.donottrackheader.enabled", true);
|
|
|
|
user_pref("privacy.donottrackheader.enabled", true);
|
|
|
|
|
|
|
|
|
|
|
|
/*** [SECTION 1700]: CONTAINERS
|
|
|
|
/*** [SECTION 1700]: CONTAINERS
|
|
|
@ -869,8 +867,6 @@ user_pref("privacy.userContext.ui.enabled", true);
|
|
|
|
/* 1702: enable Container Tabs [FF50+]
|
|
|
|
/* 1702: enable Container Tabs [FF50+]
|
|
|
|
* [SETTING] General>Tabs>Enable Container Tabs ***/
|
|
|
|
* [SETTING] General>Tabs>Enable Container Tabs ***/
|
|
|
|
user_pref("privacy.userContext.enabled", true);
|
|
|
|
user_pref("privacy.userContext.enabled", true);
|
|
|
|
/* 1703: enable a private container for thumbnail loads [FF51+] ***/
|
|
|
|
|
|
|
|
user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // [DEFAULT: true in FF61+]
|
|
|
|
|
|
|
|
/* 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
|
|
|
|
/* 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
|
|
|
|
* 0=no menu (default), 1=show when clicked, 2=show on long press
|
|
|
|
* 0=no menu (default), 1=show when clicked, 2=show on long press
|
|
|
|
* [1] https://bugzilla.mozilla.org/1328756 ***/
|
|
|
|
* [1] https://bugzilla.mozilla.org/1328756 ***/
|
|
|
@ -905,11 +901,14 @@ user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
|
|
|
|
* [1] https://www.privacytools.io/#webrtc ***/
|
|
|
|
* [1] https://www.privacytools.io/#webrtc ***/
|
|
|
|
user_pref("media.peerconnection.enabled", false);
|
|
|
|
user_pref("media.peerconnection.enabled", false);
|
|
|
|
/* 2002: limit WebRTC IP leaks if using WebRTC
|
|
|
|
/* 2002: limit WebRTC IP leaks if using WebRTC
|
|
|
|
|
|
|
|
* In FF70+ these settings match Mode 4 (Mode 3 in older versions) (see [3])
|
|
|
|
* [TEST] https://browserleaks.com/webrtc
|
|
|
|
* [TEST] https://browserleaks.com/webrtc
|
|
|
|
* [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1189041,1297416
|
|
|
|
* [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1189041,1297416,1452713
|
|
|
|
* [2] https://wiki.mozilla.org/Media/WebRTC/Privacy ***/
|
|
|
|
* [2] https://wiki.mozilla.org/Media/WebRTC/Privacy
|
|
|
|
|
|
|
|
* [3] https://tools.ietf.org/html/draft-ietf-rtcweb-ip-handling-12#section-5.2 ***/
|
|
|
|
user_pref("media.peerconnection.ice.default_address_only", true);
|
|
|
|
user_pref("media.peerconnection.ice.default_address_only", true);
|
|
|
|
user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
|
|
|
|
user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
|
|
|
|
|
|
|
|
user_pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true); // [FF70+]
|
|
|
|
/* 2010: disable WebGL (Web Graphics Library)
|
|
|
|
/* 2010: disable WebGL (Web Graphics Library)
|
|
|
|
* [SETUP-WEB] When disabled, may break some websites. When enabled, provides high entropy,
|
|
|
|
* [SETUP-WEB] When disabled, may break some websites. When enabled, provides high entropy,
|
|
|
|
* especially with readPixels(). Some of the other entropy is lessened with RFP (see 4501)
|
|
|
|
* especially with readPixels(). Some of the other entropy is lessened with RFP (see 4501)
|
|
|
@ -938,9 +937,6 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
|
|
|
|
// user_pref("media.autoplay.default", 5);
|
|
|
|
// user_pref("media.autoplay.default", 5);
|
|
|
|
/* 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] ***/
|
|
|
|
/* 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] ***/
|
|
|
|
user_pref("media.autoplay.enabled.user-gestures-needed", false);
|
|
|
|
user_pref("media.autoplay.enabled.user-gestures-needed", false);
|
|
|
|
/* 2032: disable autoplay of HTML5 media in non-active tabs [FF51+]
|
|
|
|
|
|
|
|
* [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
|
|
|
|
|
|
|
|
user_pref("media.block-autoplay-until-in-foreground", true); // [DEFAULT: true]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/
|
|
|
|
/*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/
|
|
|
|
user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
|
|
|
|
user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
|
|
|
@ -1032,14 +1028,12 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
|
|
|
|
// user_pref("dom.event.contextmenu.enabled", false);
|
|
|
|
// user_pref("dom.event.contextmenu.enabled", false);
|
|
|
|
/* 2402: disable website access to clipboard events/content
|
|
|
|
/* 2402: disable website access to clipboard events/content
|
|
|
|
* [SETUP-WEB] This will break some sites functionality such as pasting into facebook, wordpress
|
|
|
|
* [SETUP-WEB] This will break some sites functionality such as pasting into facebook, wordpress
|
|
|
|
* this applies to onCut, onCopy, onPaste events - i.e. you have to interact with
|
|
|
|
* This applies to onCut/onCopy/onPaste events - i.e. it requires interaction with the website
|
|
|
|
* the website for it to look at the clipboard
|
|
|
|
* [WARNING] If both 'middlemouse.paste' and 'general.autoScroll' are true (at least one
|
|
|
|
* [1] https://www.ghacks.net/2014/01/08/block-websites-reading-modifying-clipboard-contents-firefox/ ***/
|
|
|
|
* is default false) then enabling this pref can leak clipboard content, see [2]
|
|
|
|
|
|
|
|
* [1] https://www.ghacks.net/2014/01/08/block-websites-reading-modifying-clipboard-contents-firefox/
|
|
|
|
|
|
|
|
* [2] https://bugzilla.mozilla.org/1528289 */
|
|
|
|
user_pref("dom.event.clipboardevents.enabled", false);
|
|
|
|
user_pref("dom.event.clipboardevents.enabled", false);
|
|
|
|
/* 2403: disable middlemouse paste leaking clipboard content on Linux after autoscroll
|
|
|
|
|
|
|
|
* Defense in depth if clipboard events are enabled (see 2402)
|
|
|
|
|
|
|
|
* [1] https://bugzilla.mozilla.org/1528289 */
|
|
|
|
|
|
|
|
user_pref("middlemouse.paste", false); // [DEFAULT: false on Windows]
|
|
|
|
|
|
|
|
/* 2404: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
|
|
|
|
/* 2404: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
|
|
|
|
* this disables document.execCommand("cut"/"copy") to protect your clipboard
|
|
|
|
* this disables document.execCommand("cut"/"copy") to protect your clipboard
|
|
|
|
* [1] https://bugzilla.mozilla.org/1170911 ***/
|
|
|
|
* [1] https://bugzilla.mozilla.org/1170911 ***/
|
|
|
@ -1065,6 +1059,7 @@ user_pref("javascript.options.asmjs", false);
|
|
|
|
// user_pref("javascript.options.ion", false);
|
|
|
|
// user_pref("javascript.options.ion", false);
|
|
|
|
// user_pref("javascript.options.baselinejit", false);
|
|
|
|
// user_pref("javascript.options.baselinejit", false);
|
|
|
|
/* 2422: disable WebAssembly [FF52+] [SETUP-PERF]
|
|
|
|
/* 2422: disable WebAssembly [FF52+] [SETUP-PERF]
|
|
|
|
|
|
|
|
* [NOTE] In FF71+ this no longer affects extensions (1576254)
|
|
|
|
* [1] https://developer.mozilla.org/docs/WebAssembly ***/
|
|
|
|
* [1] https://developer.mozilla.org/docs/WebAssembly ***/
|
|
|
|
user_pref("javascript.options.wasm", false);
|
|
|
|
user_pref("javascript.options.wasm", false);
|
|
|
|
/* 2426: disable Intersection Observer API [FF55+]
|
|
|
|
/* 2426: disable Intersection Observer API [FF55+]
|
|
|
@ -1136,16 +1131,15 @@ user_pref("browser.uitour.url", "");
|
|
|
|
* [SETTING] Devtools>Advanced Settings>Enable browser chrome and add-on debugging toolboxes
|
|
|
|
* [SETTING] Devtools>Advanced Settings>Enable browser chrome and add-on debugging toolboxes
|
|
|
|
* [1] https://github.com/pyllyukko/user.js/issues/179#issuecomment-246468676 ***/
|
|
|
|
* [1] https://github.com/pyllyukko/user.js/issues/179#issuecomment-246468676 ***/
|
|
|
|
user_pref("devtools.chrome.enabled", false);
|
|
|
|
user_pref("devtools.chrome.enabled", false);
|
|
|
|
/* 2608: disable WebIDE to prevent remote debugging and ADB extension download
|
|
|
|
/* 2608: disable remote debugging
|
|
|
|
* [1] https://trac.torproject.org/projects/tor/ticket/16222 ***/
|
|
|
|
* [1] https://trac.torproject.org/projects/tor/ticket/16222 ***/
|
|
|
|
user_pref("devtools.debugger.remote-enabled", false);
|
|
|
|
user_pref("devtools.debugger.remote-enabled", false);
|
|
|
|
user_pref("devtools.webide.enabled", false);
|
|
|
|
|
|
|
|
user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
|
|
|
|
|
|
|
|
/* 2609: disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
|
|
|
|
/* 2609: disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
|
|
|
|
* [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#misc
|
|
|
|
* [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#misc
|
|
|
|
* [1] https://bugzilla.mozilla.org/1173199 ***/
|
|
|
|
* [1] https://bugzilla.mozilla.org/1173199 ***/
|
|
|
|
// user_pref("mathml.disabled", true);
|
|
|
|
// user_pref("mathml.disabled", true);
|
|
|
|
/* 2610: disable in-content SVG (Scalable Vector Graphics) [FF53+]
|
|
|
|
/* 2610: disable in-content SVG (Scalable Vector Graphics) [FF53+]
|
|
|
|
|
|
|
|
* [NOTE] In FF70+ and ESR68.1.0+ this no longer affects extensions (1564208)
|
|
|
|
* [WARNING] Expect breakage incl. youtube player controls. Best left for a "hardened" profile.
|
|
|
|
* [WARNING] Expect breakage incl. youtube player controls. Best left for a "hardened" profile.
|
|
|
|
* [1] https://bugzilla.mozilla.org/1216893 ***/
|
|
|
|
* [1] https://bugzilla.mozilla.org/1216893 ***/
|
|
|
|
// user_pref("svg.disabled", true);
|
|
|
|
// user_pref("svg.disabled", true);
|
|
|
@ -1166,15 +1160,15 @@ user_pref("permissions.manager.defaultsUrl", "");
|
|
|
|
/* 2617: remove webchannel whitelist ***/
|
|
|
|
/* 2617: remove webchannel whitelist ***/
|
|
|
|
user_pref("webchannel.allowObject.urlWhitelist", "");
|
|
|
|
user_pref("webchannel.allowObject.urlWhitelist", "");
|
|
|
|
/* 2619: enforce Punycode for Internationalized Domain Names to eliminate possible spoofing
|
|
|
|
/* 2619: enforce Punycode for Internationalized Domain Names to eliminate possible spoofing
|
|
|
|
* Firefox has *some* protections, but it is better to be safe than sorry. The downside: it will also
|
|
|
|
* Firefox has *some* protections, but it is better to be safe than sorry
|
|
|
|
* display legitimate IDN's punycoded, which might be undesirable for users of non-latin alphabets
|
|
|
|
* [SETUP-WEB] Might be undesirable for non-latin alphabet users since legitimate IDN's are also punycoded
|
|
|
|
* [TEST] https://www.xn--80ak6aa92e.com/ (www.apple.com)
|
|
|
|
* [TEST] https://www.xn--80ak6aa92e.com/ (www.apple.com)
|
|
|
|
* [1] https://wiki.mozilla.org/IDN_Display_Algorithm
|
|
|
|
* [1] https://wiki.mozilla.org/IDN_Display_Algorithm
|
|
|
|
* [2] https://en.wikipedia.org/wiki/IDN_homograph_attack
|
|
|
|
* [2] https://en.wikipedia.org/wiki/IDN_homograph_attack
|
|
|
|
* [3] CVE-2017-5383: https://www.mozilla.org/security/advisories/mfsa2017-02/
|
|
|
|
* [3] CVE-2017-5383: https://www.mozilla.org/security/advisories/mfsa2017-02/
|
|
|
|
* [4] https://www.xudongz.com/blog/2017/idn-phishing/ ***/
|
|
|
|
* [4] https://www.xudongz.com/blog/2017/idn-phishing/ ***/
|
|
|
|
user_pref("network.IDN_show_punycode", true);
|
|
|
|
user_pref("network.IDN_show_punycode", true);
|
|
|
|
/* 2620: enable Firefox's built-in PDF reader [SETUP-CHROME]
|
|
|
|
/* 2620: enforce Firefox's built-in PDF reader [SETUP-CHROME]
|
|
|
|
* This setting controls if the option "Display in Firefox" is available in the setting below
|
|
|
|
* This setting controls if the option "Display in Firefox" is available in the setting below
|
|
|
|
* and by effect controls whether PDFs are handled in-browser or externally ("Ask" or "Open With")
|
|
|
|
* and by effect controls whether PDFs are handled in-browser or externally ("Ask" or "Open With")
|
|
|
|
* PROS: pdfjs is lightweight, open source, and as secure/vetted as any pdf reader out there (more than most)
|
|
|
|
* PROS: pdfjs is lightweight, open source, and as secure/vetted as any pdf reader out there (more than most)
|
|
|
@ -1222,7 +1216,8 @@ user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
|
|
|
|
// user_pref("extensions.webextensions.restrictedDomains", "");
|
|
|
|
// user_pref("extensions.webextensions.restrictedDomains", "");
|
|
|
|
|
|
|
|
|
|
|
|
/** SECURITY ***/
|
|
|
|
/** SECURITY ***/
|
|
|
|
/* 2680: enable CSP (Content Security Policy)
|
|
|
|
/* 2680: enforce CSP (Content Security Policy)
|
|
|
|
|
|
|
|
* [WARNING] CSP is a very important and widespread security feature. Don't disable it!
|
|
|
|
* [1] https://developer.mozilla.org/docs/Web/HTTP/CSP ***/
|
|
|
|
* [1] https://developer.mozilla.org/docs/Web/HTTP/CSP ***/
|
|
|
|
user_pref("security.csp.enable", true); // [DEFAULT: true]
|
|
|
|
user_pref("security.csp.enable", true); // [DEFAULT: true]
|
|
|
|
/* 2684: enforce a security delay on some confirmation dialogs such as install, open/save
|
|
|
|
/* 2684: enforce a security delay on some confirmation dialogs such as install, open/save
|
|
|
@ -1246,10 +1241,12 @@ user_pref("security.dialog_enable_delay", 700);
|
|
|
|
user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
|
|
|
|
user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
|
|
|
|
/* 2701: disable 3rd-party cookies and site-data [SETUP-WEB]
|
|
|
|
/* 2701: disable 3rd-party cookies and site-data [SETUP-WEB]
|
|
|
|
* 0=Accept cookies and site data, 1=(Block) All third-party cookies, 2=(Block) All cookies,
|
|
|
|
* 0=Accept cookies and site data, 1=(Block) All third-party cookies, 2=(Block) All cookies,
|
|
|
|
* 3=(Block) Cookies from unvisited sites, 4=(Block) Third-party trackers (FF63+) (default FF69+)
|
|
|
|
* 3=(Block) Cookies from unvisited websites, 4=(Block) Cross-site and social media trackers (FF63+) (default FF69+)
|
|
|
|
* [NOTE] You can set exceptions under site permissions or use an extension
|
|
|
|
* [NOTE] You can set exceptions under site permissions or use an extension
|
|
|
|
* [SETTING] Privacy & Security>Content Blocking>Custom>Choose what to block>Cookies ***/
|
|
|
|
* [NOTE] Enforcing category to custom ensures ETP related prefs are always honored
|
|
|
|
|
|
|
|
* [SETTING] Privacy & Security>Enhanced Tracking Protection>Custom>Cookies ***/
|
|
|
|
user_pref("network.cookie.cookieBehavior", 1);
|
|
|
|
user_pref("network.cookie.cookieBehavior", 1);
|
|
|
|
|
|
|
|
user_pref("browser.contentblocking.category", "custom");
|
|
|
|
/* 2702: set third-party cookies (i.e ALL) (if enabled, see 2701) to session-only
|
|
|
|
/* 2702: set third-party cookies (i.e ALL) (if enabled, see 2701) to session-only
|
|
|
|
and (FF58+) set third-party non-secure (i.e HTTP) cookies to session-only
|
|
|
|
and (FF58+) set third-party non-secure (i.e HTTP) cookies to session-only
|
|
|
|
[NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and
|
|
|
|
[NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and
|
|
|
@ -1266,20 +1263,8 @@ user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
|
|
|
|
* [WARNING] This will break a LOT of sites' functionality AND extensions!
|
|
|
|
* [WARNING] This will break a LOT of sites' functionality AND extensions!
|
|
|
|
* You are better off using an extension for more granular control ***/
|
|
|
|
* You are better off using an extension for more granular control ***/
|
|
|
|
// user_pref("dom.storage.enabled", false);
|
|
|
|
// user_pref("dom.storage.enabled", false);
|
|
|
|
/* 2720: enforce IndexedDB (IDB) as enabled
|
|
|
|
|
|
|
|
* IDB is required for extensions and Firefox internals (even before FF63 in [1])
|
|
|
|
|
|
|
|
* To control *website* IDB data, control allowing cookies and service workers, or use
|
|
|
|
|
|
|
|
* Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize
|
|
|
|
|
|
|
|
* on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically
|
|
|
|
|
|
|
|
* via an extension. Note that IDB currently cannot be sanitized by host.
|
|
|
|
|
|
|
|
* [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/ ***/
|
|
|
|
|
|
|
|
user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
|
|
|
|
|
|
|
|
/* 2730: disable offline cache ***/
|
|
|
|
/* 2730: disable offline cache ***/
|
|
|
|
user_pref("browser.cache.offline.enable", false);
|
|
|
|
user_pref("browser.cache.offline.enable", false);
|
|
|
|
/* 2731: enforce websites to ask to store data for offline use
|
|
|
|
|
|
|
|
* [1] https://support.mozilla.org/questions/1098540
|
|
|
|
|
|
|
|
* [2] https://bugzilla.mozilla.org/959985 ***/
|
|
|
|
|
|
|
|
user_pref("offline-apps.allow_by_default", false);
|
|
|
|
|
|
|
|
/* 2740: disable service worker cache and cache storage
|
|
|
|
/* 2740: disable service worker cache and cache storage
|
|
|
|
* [NOTE] We clear service worker cache on exiting Firefox (see 2803)
|
|
|
|
* [NOTE] We clear service worker cache on exiting Firefox (see 2803)
|
|
|
|
* [1] https://w3c.github.io/ServiceWorker/#privacy ***/
|
|
|
|
* [1] https://w3c.github.io/ServiceWorker/#privacy ***/
|
|
|
@ -1337,6 +1322,7 @@ user_pref("privacy.cpd.sessions", true); // Active Logins
|
|
|
|
user_pref("privacy.cpd.siteSettings", false); // Site Preferences
|
|
|
|
user_pref("privacy.cpd.siteSettings", false); // Site Preferences
|
|
|
|
/* 2805: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
|
|
|
|
/* 2805: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
|
|
|
|
* [NOTE] Not needed if Session Restore is not used (see 0102) or is already cleared with history (see 2803)
|
|
|
|
* [NOTE] Not needed if Session Restore is not used (see 0102) or is already cleared with history (see 2803)
|
|
|
|
|
|
|
|
* [NOTE] privacy.clearOnShutdown.openWindows prevents resuming from crashes (see 1022)
|
|
|
|
* [NOTE] privacy.cpd.openWindows has a bug that causes an additional window to open ***/
|
|
|
|
* [NOTE] privacy.cpd.openWindows has a bug that causes an additional window to open ***/
|
|
|
|
// user_pref("privacy.clearOnShutdown.openWindows", true);
|
|
|
|
// user_pref("privacy.clearOnShutdown.openWindows", true);
|
|
|
|
// user_pref("privacy.cpd.openWindows", true);
|
|
|
|
// user_pref("privacy.cpd.openWindows", true);
|
|
|
@ -1366,6 +1352,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
|
|
|
|
** 1542309 - isolate top-level domain URLs when host is in the public suffix list (FF68+)
|
|
|
|
** 1542309 - isolate top-level domain URLs when host is in the public suffix list (FF68+)
|
|
|
|
** 1506693 - isolate pdfjs range-based requests (FF68+)
|
|
|
|
** 1506693 - isolate pdfjs range-based requests (FF68+)
|
|
|
|
** 1330467 - isolate site permissions (FF69+)
|
|
|
|
** 1330467 - isolate site permissions (FF69+)
|
|
|
|
|
|
|
|
** 1534339 - isolate IPv6 (FF73+)
|
|
|
|
***/
|
|
|
|
***/
|
|
|
|
user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
|
|
|
|
user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
|
|
|
|
/* 4001: enable First Party Isolation [FF51+]
|
|
|
|
/* 4001: enable First Party Isolation [FF51+]
|
|
|
@ -1380,8 +1367,8 @@ user_pref("privacy.firstparty.isolate", true);
|
|
|
|
* [1] https://bugzilla.mozilla.org/1319773#c22
|
|
|
|
* [1] https://bugzilla.mozilla.org/1319773#c22
|
|
|
|
* [2] https://bugzilla.mozilla.org/1492607
|
|
|
|
* [2] https://bugzilla.mozilla.org/1492607
|
|
|
|
* [3] https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage ***/
|
|
|
|
* [3] https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage ***/
|
|
|
|
user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAULT: true]
|
|
|
|
// user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAULT: true]
|
|
|
|
// user_pref("privacy.firstparty.isolate.block_post_message", true); // [HIDDEN PREF]
|
|
|
|
// user_pref("privacy.firstparty.isolate.block_post_message", true); // [HIDDEN PREF ESR]
|
|
|
|
|
|
|
|
|
|
|
|
/*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
|
|
|
|
/*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
|
|
|
|
This master switch will be used for a wide range of items, many of which will
|
|
|
|
This master switch will be used for a wide range of items, many of which will
|
|
|
@ -1442,9 +1429,10 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
|
|
|
|
FF65: pointerEvent.pointerid (1492766)
|
|
|
|
FF65: pointerEvent.pointerid (1492766)
|
|
|
|
** 1485266 - disable exposure of system colors to CSS or canvas (see 4615) (FF67+)
|
|
|
|
** 1485266 - disable exposure of system colors to CSS or canvas (see 4615) (FF67+)
|
|
|
|
** 1407366 - enable inner window letterboxing (see 4504) (FF67+)
|
|
|
|
** 1407366 - enable inner window letterboxing (see 4504) (FF67+)
|
|
|
|
** 1540726 - return "light" with prefers-color-scheme (FF67+)
|
|
|
|
** 1540726 - return "light" with prefers-color-scheme (see 4616) (FF67+)
|
|
|
|
[1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
|
|
|
|
[1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
|
|
|
|
** 1564422 - spoof audioContext outputLatency (FF70+)
|
|
|
|
** 1564422 - spoof audioContext outputLatency (FF70+)
|
|
|
|
|
|
|
|
** 1595823 - spoof audioContext sampleRate (FF72+)
|
|
|
|
***/
|
|
|
|
***/
|
|
|
|
user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
|
|
|
|
user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
|
|
|
|
/* 4501: enable privacy.resistFingerprinting [FF41+]
|
|
|
|
/* 4501: enable privacy.resistFingerprinting [FF41+]
|
|
|
@ -1571,6 +1559,9 @@ user_pref("dom.w3c_pointer_events.enabled", false);
|
|
|
|
// [SETUP-CHROME] Might affect CSS in themes and extensions
|
|
|
|
// [SETUP-CHROME] Might affect CSS in themes and extensions
|
|
|
|
// [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876
|
|
|
|
// [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876
|
|
|
|
user_pref("ui.use_standins_for_native_colors", true);
|
|
|
|
user_pref("ui.use_standins_for_native_colors", true);
|
|
|
|
|
|
|
|
// 4616: enforce prefers-color-scheme as light [FF67+]
|
|
|
|
|
|
|
|
// 0=light, 1=dark : This overrides your OS value
|
|
|
|
|
|
|
|
user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
|
|
|
|
// * * * /
|
|
|
|
// * * * /
|
|
|
|
// ***/
|
|
|
|
// ***/
|
|
|
|
|
|
|
|
|
|
|
@ -1615,8 +1606,6 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
|
|
|
|
// user_pref("browser.tabs.warnOnOpen", false);
|
|
|
|
// user_pref("browser.tabs.warnOnOpen", false);
|
|
|
|
// user_pref("full-screen-api.warning.delay", 0);
|
|
|
|
// user_pref("full-screen-api.warning.delay", 0);
|
|
|
|
// user_pref("full-screen-api.warning.timeout", 0);
|
|
|
|
// user_pref("full-screen-api.warning.timeout", 0);
|
|
|
|
// user_pref("general.warnOnAboutConfig", false);
|
|
|
|
|
|
|
|
// user_pref("browser.aboutConfig.showWarning", false); // [FF67+]
|
|
|
|
|
|
|
|
/* APPEARANCE ***/
|
|
|
|
/* APPEARANCE ***/
|
|
|
|
// user_pref("browser.download.autohideButton", false); // [FF57+]
|
|
|
|
// user_pref("browser.download.autohideButton", false); // [FF57+]
|
|
|
|
// user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
|
|
|
|
// user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
|
|
|
@ -1630,149 +1619,29 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
|
|
|
|
// user_pref("browser.tabs.closeWindowWithLastTab", false);
|
|
|
|
// user_pref("browser.tabs.closeWindowWithLastTab", false);
|
|
|
|
// user_pref("browser.tabs.loadBookmarksInTabs", true); // open bookmarks in a new tab [FF57+]
|
|
|
|
// user_pref("browser.tabs.loadBookmarksInTabs", true); // open bookmarks in a new tab [FF57+]
|
|
|
|
// user_pref("browser.urlbar.decodeURLsOnCopy", true); // see bugzilla 1320061 [FF53+]
|
|
|
|
// user_pref("browser.urlbar.decodeURLsOnCopy", true); // see bugzilla 1320061 [FF53+]
|
|
|
|
// user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [WINDOWS] [MAC]
|
|
|
|
// user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [DEFAULT: false on Linux]
|
|
|
|
// user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
|
|
|
|
// user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
|
|
|
|
// user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+, FF59 and under]
|
|
|
|
// user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+, FF59 and under]
|
|
|
|
|
|
|
|
/* UX FEATURES: disable and hide the icons and menus ***/
|
|
|
|
|
|
|
|
// user_pref("browser.messaging-system.whatsNewPanel.enabled", false); // What's New [FF69+]
|
|
|
|
|
|
|
|
// user_pref("extensions.pocket.enabled", false); // Pocket Account [FF46+]
|
|
|
|
|
|
|
|
// user_pref("identity.fxaccounts.enabled", false); // Firefox Accounts & Sync [FF60+] [RESTART]
|
|
|
|
|
|
|
|
// user_pref("reader.parse-on-load.enabled", false); // Reader View
|
|
|
|
/* OTHER ***/
|
|
|
|
/* OTHER ***/
|
|
|
|
// user_pref("browser.bookmarks.max_backups", 2);
|
|
|
|
// user_pref("browser.bookmarks.max_backups", 2);
|
|
|
|
// user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+]
|
|
|
|
// user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+]
|
|
|
|
// [SETTING] General>Browsing>Recommend extensions as you browse
|
|
|
|
// [SETTING] General>Browsing>Recommend extensions as you browse
|
|
|
|
// user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
|
|
|
|
// user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
|
|
|
|
// [SETTING] General>Browsing>Recommend features as you browse
|
|
|
|
// [SETTING] General>Browsing>Recommend features as you browse
|
|
|
|
// user_pref("extensions.pocket.enabled", false); // disable and hide Pocket [FF46+]
|
|
|
|
|
|
|
|
// user_pref("identity.fxaccounts.enabled", false); // disable and hide Firefox Accounts and Sync [FF60+] [RESTART]
|
|
|
|
|
|
|
|
// user_pref("network.manage-offline-status", false); // see bugzilla 620472
|
|
|
|
// user_pref("network.manage-offline-status", false); // see bugzilla 620472
|
|
|
|
// user_pref("reader.parse-on-load.enabled", false); // "Reader View"
|
|
|
|
|
|
|
|
// user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
|
|
|
|
// user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
|
|
|
|
|
|
|
|
|
|
|
|
/*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
|
|
|
|
/*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
|
|
|
|
Documentation denoted as [-]. Items deprecated prior to FF61 have been archived at [1], which
|
|
|
|
Documentation denoted as [-]. Items deprecated prior to FF68 have been archived at [1], which
|
|
|
|
also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
|
|
|
|
also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
|
|
|
|
[1] https://github.com/ghacksuserjs/ghacks-user.js/issues/123
|
|
|
|
[1] https://github.com/ghacksuserjs/ghacks-user.js/issues/123
|
|
|
|
***/
|
|
|
|
***/
|
|
|
|
user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
|
|
|
|
user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
|
|
|
|
/* ESR60.x still uses all the following prefs
|
|
|
|
|
|
|
|
// [NOTE] replace the * with a slash in the line above to re-enable them
|
|
|
|
|
|
|
|
// FF61
|
|
|
|
|
|
|
|
// 0501: disable experiments
|
|
|
|
|
|
|
|
// [1] https://wiki.mozilla.org/Telemetry/Experiments
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1420908,1450801
|
|
|
|
|
|
|
|
user_pref("experiments.enabled", false);
|
|
|
|
|
|
|
|
user_pref("experiments.manifest.uri", "");
|
|
|
|
|
|
|
|
user_pref("experiments.supported", false);
|
|
|
|
|
|
|
|
user_pref("experiments.activeExperiment", false);
|
|
|
|
|
|
|
|
// 2612: disable remote JAR files being opened, regardless of content type [FF42+]
|
|
|
|
|
|
|
|
// [1] https://bugzilla.mozilla.org/1173171
|
|
|
|
|
|
|
|
// [2] https://www.fxsitecompat.com/en-CA/docs/2015/jar-protocol-support-has-been-disabled-by-default/
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1427726
|
|
|
|
|
|
|
|
user_pref("network.jar.block-remote-files", true);
|
|
|
|
|
|
|
|
// 2613: disable JAR from opening Unsafe File Types
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1427726
|
|
|
|
|
|
|
|
user_pref("network.jar.open-unsafe-types", false);
|
|
|
|
|
|
|
|
// * * * /
|
|
|
|
|
|
|
|
// FF62
|
|
|
|
|
|
|
|
// 1803: disable Java plugin
|
|
|
|
|
|
|
|
// [-] (part5) https://bugzilla.mozilla.org/1461243
|
|
|
|
|
|
|
|
user_pref("plugin.state.java", 0);
|
|
|
|
|
|
|
|
// * * * /
|
|
|
|
|
|
|
|
// FF63
|
|
|
|
|
|
|
|
// 0205: disable GeoIP-based search results
|
|
|
|
|
|
|
|
// [NOTE] May not be hidden if Firefox has changed your settings due to your locale
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1462015
|
|
|
|
|
|
|
|
user_pref("browser.search.countryCode", "US"); // [HIDDEN PREF]
|
|
|
|
|
|
|
|
// 0301a: disable auto-update checks for Firefox
|
|
|
|
|
|
|
|
// [SETTING] General>Firefox Updates>Never check for updates
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1420514
|
|
|
|
|
|
|
|
// user_pref("app.update.enabled", false);
|
|
|
|
|
|
|
|
// 0503: disable "Savant" Shield study [FF61+]
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1457226
|
|
|
|
|
|
|
|
user_pref("shield.savant.enabled", false);
|
|
|
|
|
|
|
|
// 1031: disable favicons in tabs and new bookmarks - merged into browser.chrome.site_icons
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1453751
|
|
|
|
|
|
|
|
// user_pref("browser.chrome.favicons", false);
|
|
|
|
|
|
|
|
// 2030: disable autoplay of HTML5 media - replaced by media.autoplay.default
|
|
|
|
|
|
|
|
// This may break video playback on various sites
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1470082
|
|
|
|
|
|
|
|
user_pref("media.autoplay.enabled", false);
|
|
|
|
|
|
|
|
// 2704: set cookie lifetime in days (see 2703)
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1457170
|
|
|
|
|
|
|
|
// user_pref("network.cookie.lifetime.days", 90); // [DEFAULT: 90]
|
|
|
|
|
|
|
|
// 5000's: enable "Ctrl+Tab cycles through tabs in recently used order" - replaced by browser.ctrlTab.recentlyUsedOrder
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1473595
|
|
|
|
|
|
|
|
// user_pref("browser.ctrlTab.previews", true);
|
|
|
|
|
|
|
|
// * * * /
|
|
|
|
|
|
|
|
// FF64
|
|
|
|
|
|
|
|
// 0516: disable Onboarding [FF55+]
|
|
|
|
|
|
|
|
// Onboarding is an interactive tour/setup for new installs/profiles and features. Every time
|
|
|
|
|
|
|
|
// about:home or about:newtab is opened, the onboarding overlay is injected into that page
|
|
|
|
|
|
|
|
// [NOTE] Onboarding uses Google Analytics [2], and leaks resource://URIs [3]
|
|
|
|
|
|
|
|
// [1] https://wiki.mozilla.org/Firefox/Onboarding
|
|
|
|
|
|
|
|
// [2] https://github.com/mozilla/onboard/commit/db4d6c8726c89a5d6a241c1b1065827b525c5baf
|
|
|
|
|
|
|
|
// [3] https://bugzilla.mozilla.org/863246#c154
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1462415
|
|
|
|
|
|
|
|
user_pref("browser.onboarding.enabled", false);
|
|
|
|
|
|
|
|
// 2608: disable WebIDE ADB extension downloads - both renamed
|
|
|
|
|
|
|
|
// [1] https://trac.torproject.org/projects/tor/ticket/16222
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1491315
|
|
|
|
|
|
|
|
user_pref("devtools.webide.autoinstallADBHelper", false);
|
|
|
|
|
|
|
|
user_pref("devtools.webide.adbAddonURL", "");
|
|
|
|
|
|
|
|
// 2681: disable CSP violation events [FF59+]
|
|
|
|
|
|
|
|
// [1] https://developer.mozilla.org/docs/Web/API/SecurityPolicyViolationEvent
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1488165
|
|
|
|
|
|
|
|
user_pref("security.csp.enable_violation_events", false);
|
|
|
|
|
|
|
|
// * * * /
|
|
|
|
|
|
|
|
// FF65
|
|
|
|
|
|
|
|
// 0850a: disable location bar autocomplete and suggestion types
|
|
|
|
|
|
|
|
// If you enforce any of the suggestion types (see the other 0850a), you MUST enforce 'autocomplete'
|
|
|
|
|
|
|
|
// - If *ALL* of the suggestion types are false, 'autocomplete' must also be false
|
|
|
|
|
|
|
|
// - If *ANY* of the suggestion types are true, 'autocomplete' must also be true
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1502392
|
|
|
|
|
|
|
|
user_pref("browser.urlbar.autocomplete.enabled", false);
|
|
|
|
|
|
|
|
// 0908: remove user & password info when attempting to fix an entered URL (i.e. 0802 is true)
|
|
|
|
|
|
|
|
// e.g. //user:password@foo -> //user@(prefix)foo(suffix) NOT //user:password@(prefix)foo(suffix)
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1510580
|
|
|
|
|
|
|
|
user_pref("browser.fixup.hide_user_pass", true); // [DEFAULT: true]
|
|
|
|
|
|
|
|
// * * * /
|
|
|
|
|
|
|
|
// FF66
|
|
|
|
|
|
|
|
// 0380: disable Browser Error Reporter [FF60+]
|
|
|
|
|
|
|
|
// [1] https://support.mozilla.org/en-US/kb/firefox-nightly-error-collection
|
|
|
|
|
|
|
|
// [2] https://firefox-source-docs.mozilla.org/browser/browser/BrowserErrorReporter.html
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1509888
|
|
|
|
|
|
|
|
user_pref("browser.chrome.errorReporter.enabled", false);
|
|
|
|
|
|
|
|
user_pref("browser.chrome.errorReporter.submitUrl", "");
|
|
|
|
|
|
|
|
// 0502: disable Mozilla permission to silently opt you into tests
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1415625
|
|
|
|
|
|
|
|
user_pref("network.allow-experiments", false);
|
|
|
|
|
|
|
|
// * * * /
|
|
|
|
|
|
|
|
// FF67
|
|
|
|
|
|
|
|
// 2428: enforce DOMHighResTimeStamp API
|
|
|
|
|
|
|
|
// [WARNING] Required for normalization of timestamps and any timer resolution mitigations
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1485264
|
|
|
|
|
|
|
|
user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
|
|
|
|
|
|
|
|
// 5000's: disable CFR [FF64+] - split into two new prefs: *cfr.addons, *cfr.features
|
|
|
|
|
|
|
|
// [SETTING] General>Browsing>Recommend extensions as you browse
|
|
|
|
|
|
|
|
// [1] https://support.mozilla.org/en-US/kb/extension-recommendations
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1528953
|
|
|
|
|
|
|
|
// user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false);
|
|
|
|
|
|
|
|
// * * * /
|
|
|
|
|
|
|
|
// FF68
|
|
|
|
|
|
|
|
// 0105b: disable Activity Stream Legacy Snippets
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1546190,1540939
|
|
|
|
|
|
|
|
user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
|
|
|
|
|
|
|
|
user_pref("browser.aboutHomeSnippets.updateUrl", "");
|
|
|
|
|
|
|
|
// 0307: disable auto updating of lightweight themes (LWT)
|
|
|
|
|
|
|
|
// Not to be confused with themes in 0301* + 0302*, which use the FF55+ Theme API
|
|
|
|
|
|
|
|
// Mozilla plan to convert existing LWTs and remove LWT support in the future, see [1]
|
|
|
|
|
|
|
|
// [1] https://blog.mozilla.org/addons/2018/09/20/future-themes-here/
|
|
|
|
|
|
|
|
// [-] (part3b) https://bugzilla.mozilla.org/1525762
|
|
|
|
|
|
|
|
user_pref("lightweightThemes.update.enabled", false);
|
|
|
|
|
|
|
|
// 2682: enable CSP 1.1 experimental hash-source directive [FF29+]
|
|
|
|
|
|
|
|
// [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=855326,883975
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1386214
|
|
|
|
|
|
|
|
user_pref("security.csp.experimentalEnabled", true);
|
|
|
|
|
|
|
|
// * * * /
|
|
|
|
|
|
|
|
// ***/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* ESR68.x still uses all the following prefs
|
|
|
|
/* ESR68.x still uses all the following prefs
|
|
|
|
// [NOTE] replace the * with a slash in the line above to re-enable them
|
|
|
|
// [NOTE] replace the * with a slash in the line above to re-enable them
|
|
|
|
// FF69
|
|
|
|
// FF69
|
|
|
@ -1781,11 +1650,40 @@ user_pref("security.csp.experimentalEnabled", true);
|
|
|
|
// user_pref("gfx.downloadable_fonts.woff2.enabled", false);
|
|
|
|
// user_pref("gfx.downloadable_fonts.woff2.enabled", false);
|
|
|
|
// 1802: enforce click-to-play for plugins
|
|
|
|
// 1802: enforce click-to-play for plugins
|
|
|
|
// [-] https://bugzilla.mozilla.org/1519434
|
|
|
|
// [-] https://bugzilla.mozilla.org/1519434
|
|
|
|
user_pref("plugins.click_to_play", true); // [DEFAULT: true in FF25+]
|
|
|
|
user_pref("plugins.click_to_play", true); // [DEFAULT: true FF25+]
|
|
|
|
// 2033: disable autoplay for muted videos [FF63+] - replaced by 'media.autoplay.default' options (2030)
|
|
|
|
// 2033: disable autoplay for muted videos [FF63+] - replaced by 'media.autoplay.default' options (2030)
|
|
|
|
// [-] https://bugzilla.mozilla.org/1562331
|
|
|
|
// [-] https://bugzilla.mozilla.org/1562331
|
|
|
|
// user_pref("media.autoplay.allow-muted", false);
|
|
|
|
// user_pref("media.autoplay.allow-muted", false);
|
|
|
|
// * * * /
|
|
|
|
// * * * /
|
|
|
|
|
|
|
|
// FF71
|
|
|
|
|
|
|
|
// 2608: disable WebIDE and ADB extension download
|
|
|
|
|
|
|
|
// [1] https://trac.torproject.org/projects/tor/ticket/16222
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1539462
|
|
|
|
|
|
|
|
user_pref("devtools.webide.enabled", false); // [DEFAULT: false FF70+]
|
|
|
|
|
|
|
|
user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
|
|
|
|
|
|
|
|
// 2731: enforce websites to ask to store data for offline use
|
|
|
|
|
|
|
|
// [1] https://support.mozilla.org/questions/1098540
|
|
|
|
|
|
|
|
// [2] https://bugzilla.mozilla.org/959985
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1574480
|
|
|
|
|
|
|
|
user_pref("offline-apps.allow_by_default", false);
|
|
|
|
|
|
|
|
// * * * /
|
|
|
|
|
|
|
|
// FF72
|
|
|
|
|
|
|
|
// 0105a: disable Activity Stream telemetry
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1597697
|
|
|
|
|
|
|
|
user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
|
|
|
|
|
|
|
|
// 0330: disable Hybdrid Content telemetry
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1520491
|
|
|
|
|
|
|
|
user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+]
|
|
|
|
|
|
|
|
// 2720: enforce IndexedDB (IDB) as enabled
|
|
|
|
|
|
|
|
// IDB is required for extensions and Firefox internals (even before FF63 in [1])
|
|
|
|
|
|
|
|
// To control *website* IDB data, control allowing cookies and service workers, or use
|
|
|
|
|
|
|
|
// Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize
|
|
|
|
|
|
|
|
// on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically
|
|
|
|
|
|
|
|
// via an extension. Note that IDB currently cannot be sanitized by host.
|
|
|
|
|
|
|
|
// [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/
|
|
|
|
|
|
|
|
// [-] https://bugzilla.mozilla.org/1488583
|
|
|
|
|
|
|
|
user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
|
|
|
|
|
|
|
|
// * * * /
|
|
|
|
// ***/
|
|
|
|
// ***/
|
|
|
|
|
|
|
|
|
|
|
|
/* END: internal custom pref to test for syntax errors ***/
|
|
|
|
/* END: internal custom pref to test for syntax errors ***/
|
|
|
|