mirror of
https://github.com/arkenfox/user.js.git
synced 2025-09-01 01:18:30 +02:00
Compare commits
31 Commits
Author | SHA1 | Date | |
---|---|---|---|
94c83519f2 | |||
e7d20867cb | |||
55ae994972 | |||
f0945743b7 | |||
ee35d7c70d | |||
fe1b03bd2a | |||
187692af66 | |||
b6e2a3f64f | |||
6f7e09ad43 | |||
4ddf60cf32 | |||
24777c9ac2 | |||
615ebeda2f | |||
4139630635 | |||
a542701ba5 | |||
e67a0c868d | |||
1afd52de6e | |||
64f34f1471 | |||
5f3e3b2691 | |||
1ce1f74494 | |||
03f558b09c | |||
cd9fc110b0 | |||
7619e312de | |||
5d2c5de11c | |||
e1022c2e72 | |||
e431b324c8 | |||
18ad40a5c6 | |||
315de066ec | |||
85273d0f19 | |||
ef293b57a7 | |||
79d316fd22 | |||
ed60588473 |
@ -8,11 +8,11 @@ assignees: ''
|
||||
---
|
||||
|
||||
Before you proceed...
|
||||
- Keep reading this. Seriously.
|
||||
- Note that we do not support forks (i.e. IceCat, Pale Moon, WaterFox, etc).
|
||||
- Make sure you searched for the `[Setup` tags in the `user.js`.
|
||||
- Issues will be closed as invalid if you do not [troubleshoot](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.4-Troubleshooting), including
|
||||
- confirming the problem is caused by the `user.js`
|
||||
- searching the `[Setup` tags in the `user.js`
|
||||
- Search the GitHub repository. The information you need is most likely here already.
|
||||
- Check out our [troubleshooting](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.4-Troubleshooting) wiki page, including steps to see if the problem is caused by the `user.js` or an extension.
|
||||
- Note: We do not support forks
|
||||
|
||||
See also:
|
||||
- Extension breakage due to prefs [issue 391](https://github.com/ghacksuserjs/ghacks-user.js/issues/391)
|
||||
|
@ -2,7 +2,7 @@
|
||||
|
||||
## prefs.js cleaner for Linux/Mac
|
||||
## author: @claustromaniac
|
||||
## version: 1.1
|
||||
## version: 1.2
|
||||
|
||||
## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
|
||||
|
||||
@ -27,7 +27,7 @@ fQuit() {
|
||||
fFF_check() {
|
||||
# there are many ways to see if firefox is running or not, some more reliable than others
|
||||
# this isn't elegant and might not be future-proof but should at least be compatible with any environment
|
||||
while [ -e webappsstore.sqlite-shm ]; do
|
||||
while [ -e lock ]; do
|
||||
echo -e "\nThis Firefox profile seems to be in use. Close Firefox and try again.\n"
|
||||
read -p "Press any key to continue."
|
||||
done
|
||||
@ -58,7 +58,7 @@ echo -e "\n\n"
|
||||
echo " ╔══════════════════════════╗"
|
||||
echo " ║ prefs.js cleaner ║"
|
||||
echo " ║ by claustromaniac ║"
|
||||
echo " ║ v1.1 ║"
|
||||
echo " ║ v1.2 ║"
|
||||
echo " ╚══════════════════════════╝"
|
||||
echo -e "\nThis script should be run from your Firefox profile directory.\n"
|
||||
echo "It will remove any entries from prefs.js that also exist in user.js."
|
||||
|
244
user.js
244
user.js
@ -1,8 +1,7 @@
|
||||
/******
|
||||
* name: ghacks user.js
|
||||
* date: 19 December 2019
|
||||
* version 71: Dancing Pants
|
||||
* "Ooh-ooh, see that girl, watch that scene, dig in the dancing pants"
|
||||
* date: 07 April 2020
|
||||
* version 74
|
||||
* authors: v52+ github | v51- www.ghacks.net
|
||||
* url: https://github.com/ghacksuserjs/ghacks-user.js
|
||||
* license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
|
||||
@ -84,10 +83,10 @@
|
||||
user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong with it?");
|
||||
|
||||
/* 0000: disable about:config warning
|
||||
* The XUL version can still be accessed in FF71+ @ chrome://global/content/config.xul
|
||||
* and in FF73+ @ chrome://global/content/config.xhtml ***/
|
||||
user_pref("general.warnOnAboutConfig", false); // for the XUL version
|
||||
user_pref("browser.aboutConfig.showWarning", false); // for the new HTML version [FF71+]
|
||||
* FF71-72: chrome://global/content/config.xul
|
||||
* FF73+: chrome://global/content/config.xhtml ***/
|
||||
user_pref("general.warnOnAboutConfig", false); // XUL/XHTML version
|
||||
user_pref("browser.aboutConfig.showWarning", false); // HTML version [FF71+]
|
||||
|
||||
/*** [SECTION 0100]: STARTUP ***/
|
||||
user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
|
||||
@ -114,7 +113,6 @@ user_pref("browser.newtab.preload", false);
|
||||
/* 0105a: disable Activity Stream telemetry ***/
|
||||
user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
|
||||
user_pref("browser.newtabpage.activity-stream.telemetry", false);
|
||||
user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
|
||||
/* 0105b: disable Activity Stream Snippets
|
||||
* Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
|
||||
* [1] https://abouthome-snippets-service.readthedocs.io/ ***/
|
||||
@ -152,10 +150,10 @@ user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely decease
|
||||
* [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
|
||||
* [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
|
||||
// user_pref("permissions.default.geo", 2);
|
||||
/* 0203: use Mozilla geolocation service instead of Google when geolocation is enabled
|
||||
/* 0203: use Mozilla geolocation service instead of Google when geolocation is enabled [FF74+]
|
||||
* Optionally enable logging to the console (defaults to false) ***/
|
||||
user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
|
||||
// user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
|
||||
user_pref("geo.provider.network.url", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
|
||||
// user_pref("geo.provider.network.logging.enabled", true); // [HIDDEN PREF]
|
||||
/* 0204: disable using the OS's geolocation service ***/
|
||||
user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
|
||||
user_pref("geo.provider.use_corelocation", false); // [MAC]
|
||||
@ -206,8 +204,8 @@ user_pref("app.update.auto", false);
|
||||
* [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
|
||||
// user_pref("extensions.update.autoUpdateDefault", false);
|
||||
/* 0306: disable extension metadata
|
||||
* used when installing/updating an extension, and in daily background update checks: if false, it
|
||||
* hides the expanded text description (if it exists) when you "show more details about an addon" ***/
|
||||
* used when installing/updating an extension, and in daily background update checks:
|
||||
* when false, extension detail tabs will have no description ***/
|
||||
// user_pref("extensions.getAddons.cache.enabled", false);
|
||||
/* 0308: disable search engine updates (e.g. OpenSearch)
|
||||
* [NOTE] This does not affect Mozilla's built-in or Web Extension search engines
|
||||
@ -239,7 +237,6 @@ user_pref("toolkit.telemetry.shutdownPingSender.enabled", false); // [FF55+]
|
||||
user_pref("toolkit.telemetry.updatePing.enabled", false); // [FF56+]
|
||||
user_pref("toolkit.telemetry.bhrPing.enabled", false); // [FF57+] Background Hang Reporter
|
||||
user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // [FF57+]
|
||||
user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+]
|
||||
/* 0331: disable Telemetry Coverage
|
||||
* [1] https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/ ***/
|
||||
user_pref("toolkit.telemetry.coverage.opt-out", true); // [HIDDEN PREF]
|
||||
@ -361,6 +358,7 @@ user_pref("browser.ping-centre.telemetry", false);
|
||||
/* 0517: disable Form Autofill
|
||||
* [NOTE] Stored data is NOT secure (uses a JSON file)
|
||||
* [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
|
||||
* [SETTING] Privacy & Security>Forms and Autofill>Autofill addresses (FF74+)
|
||||
* [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill
|
||||
* [2] https://www.ghacks.net/2017/05/24/firefoxs-new-form-autofill-is-awesome/ ***/
|
||||
user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
|
||||
@ -660,7 +658,9 @@ user_pref("security.ssl.require_safe_negotiation", true);
|
||||
* [1] https://www.ssllabs.com/ssl-pulse/ ***/
|
||||
// user_pref("security.tls.version.min", 3);
|
||||
// user_pref("security.tls.version.max", 4);
|
||||
/* 1203: disable SSL session tracking [FF36+]
|
||||
/* 1203: enforce TLS 1.0 and 1.1 downgrades as session only */
|
||||
user_pref("security.tls.version.enable-deprecated", false);
|
||||
/* 1204: disable SSL session tracking [FF36+]
|
||||
* SSL Session IDs are unique, last up to 24hrs in Firefox, and can be used for tracking
|
||||
* [SETUP-PERF] Relax this if you have FPI enabled (see 4000) *AND* you understand the
|
||||
* consequences. FPI isolates these, but it was designed with the Tor protocol in mind,
|
||||
@ -669,12 +669,12 @@ user_pref("security.ssl.require_safe_negotiation", true);
|
||||
* [2] https://bugzilla.mozilla.org/967977
|
||||
* [3] https://arxiv.org/abs/1810.07304 ***/
|
||||
user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
|
||||
/* 1204: disable SSL Error Reporting
|
||||
/* 1205: disable SSL Error Reporting
|
||||
* [1] https://firefox-source-docs.mozilla.org/browser/base/sslerrorreport/preferences.html ***/
|
||||
user_pref("security.ssl.errorReporting.automatic", false);
|
||||
user_pref("security.ssl.errorReporting.enabled", false);
|
||||
user_pref("security.ssl.errorReporting.url", "");
|
||||
/* 1205: disable TLS1.3 0-RTT (round-trip time) [FF51+]
|
||||
/* 1206: disable TLS1.3 0-RTT (round-trip time) [FF51+]
|
||||
* [1] https://github.com/tlswg/tls13-spec/issues/1001
|
||||
* [2] https://blog.cloudflare.com/tls-1-3-overview-and-q-and-a/ ***/
|
||||
user_pref("security.tls.enable_0rtt_data", false);
|
||||
@ -869,10 +869,10 @@ user_pref("privacy.userContext.ui.enabled", true);
|
||||
/* 1702: enable Container Tabs [FF50+]
|
||||
* [SETTING] General>Tabs>Enable Container Tabs ***/
|
||||
user_pref("privacy.userContext.enabled", true);
|
||||
/* 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
|
||||
* 0=no menu (default), 1=show when clicked, 2=show on long press
|
||||
* [1] https://bugzilla.mozilla.org/1328756 ***/
|
||||
user_pref("privacy.userContext.longPressBehavior", 2);
|
||||
/* 1703: set behaviour on "+ Tab" button to display container menu on left click [FF74+]
|
||||
* [NOTE] The menu is always shown on long press and right click
|
||||
* [SETTING] General>Tabs>Enable Container Tabs>Settings>Select a container for each new tab ***/
|
||||
// user_pref("privacy.userContext.newTabContainerOnLeftClick.enabled", true);
|
||||
|
||||
/*** [SECTION 1800]: PLUGINS ***/
|
||||
user_pref("_user.js.parrot", "1800 syntax error: the parrot's pushing up daisies!");
|
||||
@ -920,7 +920,6 @@ user_pref("webgl.disabled", true);
|
||||
user_pref("webgl.enable-webgl2", false);
|
||||
/* 2012: limit WebGL ***/
|
||||
user_pref("webgl.min_capability_mode", true);
|
||||
user_pref("webgl.disable-extensions", true);
|
||||
user_pref("webgl.disable-fail-if-major-performance-caveat", true);
|
||||
/* 2022: disable screensharing ***/
|
||||
user_pref("media.getusermedia.screensharing.enabled", false);
|
||||
@ -1056,7 +1055,7 @@ user_pref("dom.vibrator.enabled", false);
|
||||
* [6] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
|
||||
user_pref("javascript.options.asmjs", false);
|
||||
/* 2421: disable Ion and baseline JIT to help harden JS against exploits
|
||||
* [WARNING] If false, causes the odd site issue and there is also a performance loss
|
||||
* [WARNING] Disabling Ion/JIT can cause some site issues and performance loss
|
||||
* [1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817 ***/
|
||||
// user_pref("javascript.options.ion", false);
|
||||
// user_pref("javascript.options.baselinejit", false);
|
||||
@ -1082,10 +1081,6 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
|
||||
* [NOTE] From FF52+ Battery Status API is only available in chrome/privileged code. see [1]
|
||||
* [1] https://bugzilla.mozilla.org/1313580 ***/
|
||||
// user_pref("dom.battery.enabled", false);
|
||||
/* 2504: disable virtual reality devices
|
||||
* Optional protection depending on your connected devices
|
||||
* [1] https://developer.mozilla.org/docs/Web/API/WebVR_API ***/
|
||||
// user_pref("dom.vr.enabled", false);
|
||||
/* 2505: disable media device enumeration [FF29+]
|
||||
* [NOTE] media.peerconnection.enabled should also be set to false (see 2001)
|
||||
* [1] https://wiki.mozilla.org/Media/getUserMedia
|
||||
@ -1106,6 +1101,15 @@ user_pref("dom.webaudio.enabled", false);
|
||||
* [1] https://github.com/WICG/media-capabilities
|
||||
* [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
|
||||
// user_pref("media.media-capabilities.enabled", false);
|
||||
/* 2520: disable virtual reality devices
|
||||
* Optional protection depending on your connected devices
|
||||
* [1] https://developer.mozilla.org/docs/Web/API/WebVR_API ***/
|
||||
// user_pref("dom.vr.enabled", false);
|
||||
/* 2521: set a default permission for Virtual Reality (see 2520) [FF73+]
|
||||
* 0=always ask (default), 1=allow, 2=block
|
||||
* [SETTING] to add site exceptions: Page Info>Permissions>Access Virtual Reality Devices
|
||||
* [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Virtual Reality>Settings ***/
|
||||
// user_pref("permissions.default.xr", 0);
|
||||
|
||||
/*** [SECTION 2600]: MISCELLANEOUS ***/
|
||||
user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
|
||||
@ -1184,6 +1188,15 @@ user_pref("pdfjs.disabled", false); // [DEFAULT: false]
|
||||
/* 2621: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS]
|
||||
* [1] https://www.ghacks.net/2016/03/25/block-firefox-chrome-windows-store/ ***/
|
||||
user_pref("network.protocol-handler.external.ms-windows-store", false);
|
||||
/* 2622: enforce no system colors; they can be fingerprinted
|
||||
* [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
|
||||
user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
|
||||
/* 2623: disable permissions delegation [FF73+]
|
||||
* Currently applies to cross-origin geolocation, camera, mic and screen-sharing
|
||||
* permissions, and fullscreen requests. Disabling delegation means any prompts
|
||||
* for these will show/use their correct 3rd party origin
|
||||
* [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion */
|
||||
user_pref("permissions.delegation.enabled", false);
|
||||
|
||||
/** DOWNLOADS ***/
|
||||
/* 2650: discourage downloading to desktop
|
||||
@ -1213,7 +1226,7 @@ user_pref("browser.download.hide_plugins_without_extensions", false);
|
||||
* [1] archived: https://archive.is/DYjAM ***/
|
||||
user_pref("extensions.enabledScopes", 5); // [HIDDEN PREF]
|
||||
user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
|
||||
/* 2662: disable webextension restrictions on certain mozilla domains (also see 4503) [FF60+]
|
||||
/* 2662: disable webextension restrictions on certain mozilla domains (you also need 4503) [FF60+]
|
||||
* [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
|
||||
// user_pref("extensions.webextensions.restrictedDomains", "");
|
||||
|
||||
@ -1265,14 +1278,6 @@ user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
|
||||
* [WARNING] This will break a LOT of sites' functionality AND extensions!
|
||||
* You are better off using an extension for more granular control ***/
|
||||
// user_pref("dom.storage.enabled", false);
|
||||
/* 2720: enforce IndexedDB (IDB) as enabled
|
||||
* IDB is required for extensions and Firefox internals (even before FF63 in [1])
|
||||
* To control *website* IDB data, control allowing cookies and service workers, or use
|
||||
* Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize
|
||||
* on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically
|
||||
* via an extension. Note that IDB currently cannot be sanitized by host.
|
||||
* [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/ ***/
|
||||
user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
|
||||
/* 2730: disable offline cache ***/
|
||||
user_pref("browser.cache.offline.enable", false);
|
||||
/* 2740: disable service worker cache and cache storage
|
||||
@ -1439,10 +1444,11 @@ user_pref("privacy.firstparty.isolate", true);
|
||||
FF65: pointerEvent.pointerid (1492766)
|
||||
** 1485266 - disable exposure of system colors to CSS or canvas (see 4615) (FF67+)
|
||||
** 1407366 - enable inner window letterboxing (see 4504) (FF67+)
|
||||
** 1540726 - return "light" with prefers-color-scheme (FF67+)
|
||||
** 1494034 - return "light" with prefers-color-scheme (see 4616) (FF67+)
|
||||
[1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
|
||||
** 1564422 - spoof audioContext outputLatency (FF70+)
|
||||
** 1595823 - spoof audioContext sampleRate (FF72+)
|
||||
** 1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74+)
|
||||
***/
|
||||
user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
|
||||
/* 4501: enable privacy.resistFingerprinting [FF41+]
|
||||
@ -1565,10 +1571,13 @@ user_pref("dom.w3c_pointer_events.enabled", false);
|
||||
// * * * /
|
||||
// FF67+
|
||||
// 4615: [2618] disable exposure of system colors to CSS or canvas [FF44+]
|
||||
// [NOTE] See second listed bug: may cause black on black for elements with undefined colors
|
||||
// [SETUP-CHROME] Might affect CSS in themes and extensions
|
||||
// [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876
|
||||
// [NOTE] See second listed bug: may cause black on black for elements with undefined colors
|
||||
// [SETUP-CHROME] Might affect CSS in themes and extensions
|
||||
// [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876
|
||||
user_pref("ui.use_standins_for_native_colors", true);
|
||||
// 4616: enforce prefers-color-scheme as light [FF67+]
|
||||
// 0=light, 1=dark : This overrides your OS value
|
||||
user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
|
||||
// * * * /
|
||||
// ***/
|
||||
|
||||
@ -1644,130 +1653,11 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
|
||||
// user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
|
||||
|
||||
/*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
|
||||
Documentation denoted as [-]. Items deprecated prior to FF61 have been archived at [1], which
|
||||
also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
|
||||
Documentation denoted as [-]. Items deprecated in FF68 or earlier have been archived at [1],
|
||||
which also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
|
||||
[1] https://github.com/ghacksuserjs/ghacks-user.js/issues/123
|
||||
***/
|
||||
user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
|
||||
/* FF61
|
||||
// 0501: disable experiments
|
||||
// [1] https://wiki.mozilla.org/Telemetry/Experiments
|
||||
// [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1420908,1450801
|
||||
user_pref("experiments.enabled", false);
|
||||
user_pref("experiments.manifest.uri", "");
|
||||
user_pref("experiments.supported", false);
|
||||
user_pref("experiments.activeExperiment", false);
|
||||
// 2612: disable remote JAR files being opened, regardless of content type [FF42+]
|
||||
// [1] https://bugzilla.mozilla.org/1173171
|
||||
// [2] https://www.fxsitecompat.com/en-CA/docs/2015/jar-protocol-support-has-been-disabled-by-default/
|
||||
// [-] https://bugzilla.mozilla.org/1427726
|
||||
user_pref("network.jar.block-remote-files", true);
|
||||
// 2613: disable JAR from opening Unsafe File Types
|
||||
// [-] https://bugzilla.mozilla.org/1427726
|
||||
user_pref("network.jar.open-unsafe-types", false);
|
||||
// ***/
|
||||
/* FF62
|
||||
// 1803: disable Java plugin
|
||||
// [-] (part5) https://bugzilla.mozilla.org/1461243
|
||||
user_pref("plugin.state.java", 0);
|
||||
// ***/
|
||||
/* FF63
|
||||
// 0205: disable GeoIP-based search results
|
||||
// [NOTE] May not be hidden if Firefox has changed your settings due to your locale
|
||||
// [-] https://bugzilla.mozilla.org/1462015
|
||||
user_pref("browser.search.countryCode", "US"); // [HIDDEN PREF]
|
||||
// 0301a: disable auto-update checks for Firefox
|
||||
// [SETTING] General>Firefox Updates>Never check for updates
|
||||
// [-] https://bugzilla.mozilla.org/1420514
|
||||
// user_pref("app.update.enabled", false);
|
||||
// 0503: disable "Savant" Shield study [FF61+]
|
||||
// [-] https://bugzilla.mozilla.org/1457226
|
||||
user_pref("shield.savant.enabled", false);
|
||||
// 1031: disable favicons in tabs and new bookmarks - merged into browser.chrome.site_icons
|
||||
// [-] https://bugzilla.mozilla.org/1453751
|
||||
// user_pref("browser.chrome.favicons", false);
|
||||
// 2030: disable autoplay of HTML5 media - replaced by media.autoplay.default
|
||||
// This may break video playback on various sites
|
||||
// [-] https://bugzilla.mozilla.org/1470082
|
||||
user_pref("media.autoplay.enabled", false);
|
||||
// 2704: set cookie lifetime in days (see 2703)
|
||||
// [-] https://bugzilla.mozilla.org/1457170
|
||||
// user_pref("network.cookie.lifetime.days", 90); // [DEFAULT: 90]
|
||||
// 5000's: enable "Ctrl+Tab cycles through tabs in recently used order" - replaced by browser.ctrlTab.recentlyUsedOrder
|
||||
// [-] https://bugzilla.mozilla.org/1473595
|
||||
// user_pref("browser.ctrlTab.previews", true);
|
||||
// ***/
|
||||
/* FF64
|
||||
// 0516: disable Onboarding [FF55+]
|
||||
// Onboarding is an interactive tour/setup for new installs/profiles and features. Every time
|
||||
// about:home or about:newtab is opened, the onboarding overlay is injected into that page
|
||||
// [NOTE] Onboarding uses Google Analytics [2], and leaks resource://URIs [3]
|
||||
// [1] https://wiki.mozilla.org/Firefox/Onboarding
|
||||
// [2] https://github.com/mozilla/onboard/commit/db4d6c8726c89a5d6a241c1b1065827b525c5baf
|
||||
// [3] https://bugzilla.mozilla.org/863246#c154
|
||||
// [-] https://bugzilla.mozilla.org/1462415
|
||||
user_pref("browser.onboarding.enabled", false);
|
||||
// 2608: disable WebIDE ADB extension downloads - both renamed
|
||||
// [1] https://trac.torproject.org/projects/tor/ticket/16222
|
||||
// [-] https://bugzilla.mozilla.org/1491315
|
||||
user_pref("devtools.webide.autoinstallADBHelper", false);
|
||||
user_pref("devtools.webide.adbAddonURL", "");
|
||||
// 2681: disable CSP violation events [FF59+]
|
||||
// [1] https://developer.mozilla.org/docs/Web/API/SecurityPolicyViolationEvent
|
||||
// [-] https://bugzilla.mozilla.org/1488165
|
||||
user_pref("security.csp.enable_violation_events", false);
|
||||
// ***/
|
||||
/* FF65
|
||||
// 0850a: disable location bar autocomplete and suggestion types
|
||||
// If you enforce any of the suggestion types (see the other 0850a), you MUST enforce 'autocomplete'
|
||||
// - If *ALL* of the suggestion types are false, 'autocomplete' must also be false
|
||||
// - If *ANY* of the suggestion types are true, 'autocomplete' must also be true
|
||||
// [-] https://bugzilla.mozilla.org/1502392
|
||||
user_pref("browser.urlbar.autocomplete.enabled", false);
|
||||
// 0908: remove user & password info when attempting to fix an entered URL (i.e. 0802 is true)
|
||||
// e.g. //user:password@foo -> //user@(prefix)foo(suffix) NOT //user:password@(prefix)foo(suffix)
|
||||
// [-] https://bugzilla.mozilla.org/1510580
|
||||
user_pref("browser.fixup.hide_user_pass", true); // [DEFAULT: true]
|
||||
// ***/
|
||||
/* FF66
|
||||
// 0380: disable Browser Error Reporter [FF60+]
|
||||
// [1] https://support.mozilla.org/en-US/kb/firefox-nightly-error-collection
|
||||
// [2] https://firefox-source-docs.mozilla.org/browser/browser/BrowserErrorReporter.html
|
||||
// [-] https://bugzilla.mozilla.org/1509888
|
||||
user_pref("browser.chrome.errorReporter.enabled", false);
|
||||
user_pref("browser.chrome.errorReporter.submitUrl", "");
|
||||
// 0502: disable Mozilla permission to silently opt you into tests
|
||||
// [-] https://bugzilla.mozilla.org/1415625
|
||||
user_pref("network.allow-experiments", false);
|
||||
// ***/
|
||||
/* FF67
|
||||
// 2428: enforce DOMHighResTimeStamp API
|
||||
// [WARNING] Required for normalization of timestamps and any timer resolution mitigations
|
||||
// [-] https://bugzilla.mozilla.org/1485264
|
||||
user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
|
||||
// 5000's: disable CFR [FF64+] - split into two new prefs: *cfr.addons, *cfr.features
|
||||
// [SETTING] General>Browsing>Recommend extensions as you browse
|
||||
// [1] https://support.mozilla.org/en-US/kb/extension-recommendations
|
||||
// [-] https://bugzilla.mozilla.org/1528953
|
||||
// user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false);
|
||||
// ***/
|
||||
/* FF68
|
||||
// 0105b: disable Activity Stream Legacy Snippets
|
||||
// [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1546190,1540939
|
||||
user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
|
||||
user_pref("browser.aboutHomeSnippets.updateUrl", "");
|
||||
// 0307: disable auto updating of lightweight themes (LWT)
|
||||
// Not to be confused with themes in 0301* + 0302*, which use the FF55+ Theme API
|
||||
// Mozilla plan to convert existing LWTs and remove LWT support in the future, see [1]
|
||||
// [1] https://blog.mozilla.org/addons/2018/09/20/future-themes-here/
|
||||
// [-] (part3b) https://bugzilla.mozilla.org/1525762
|
||||
user_pref("lightweightThemes.update.enabled", false);
|
||||
// 2682: enable CSP 1.1 experimental hash-source directive [FF29+]
|
||||
// [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=855326,883975
|
||||
// [-] https://bugzilla.mozilla.org/1386214
|
||||
user_pref("security.csp.experimentalEnabled", true);
|
||||
// ***/
|
||||
|
||||
/* ESR68.x still uses all the following prefs
|
||||
// [NOTE] replace the * with a slash in the line above to re-enable them
|
||||
// FF69
|
||||
@ -1793,6 +1683,38 @@ user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
|
||||
// [-] https://bugzilla.mozilla.org/1574480
|
||||
user_pref("offline-apps.allow_by_default", false);
|
||||
// * * * /
|
||||
// FF72
|
||||
// 0105a: disable Activity Stream telemetry
|
||||
// [-] https://bugzilla.mozilla.org/1597697
|
||||
user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
|
||||
// 0330: disable Hybdrid Content telemetry
|
||||
// [-] https://bugzilla.mozilla.org/1520491
|
||||
user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+]
|
||||
// 2720: enforce IndexedDB (IDB) as enabled
|
||||
// IDB is required for extensions and Firefox internals (even before FF63 in [1])
|
||||
// To control *website* IDB data, control allowing cookies and service workers, or use
|
||||
// Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize
|
||||
// on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically
|
||||
// via an extension. Note that IDB currently cannot be sanitized by host.
|
||||
// [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/
|
||||
// [-] https://bugzilla.mozilla.org/1488583
|
||||
user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
|
||||
// * * * /
|
||||
// FF74
|
||||
// 0203: use Mozilla geolocation service instead of Google when geolocation is enabled
|
||||
// Optionally enable logging to the console (defaults to false)
|
||||
// [-] https://bugzilla.mozilla.org/1613627
|
||||
user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
|
||||
// user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
|
||||
// 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
|
||||
// 0=no menu (default), 1=show when clicked, 2=show on long press
|
||||
// [1] https://bugzilla.mozilla.org/1328756
|
||||
// [-] https://bugzilla.mozilla.org/1606265
|
||||
user_pref("privacy.userContext.longPressBehavior", 2);
|
||||
// 2012: limit WebGL
|
||||
// [-] https://bugzilla.mozilla.org/1477756
|
||||
user_pref("webgl.disable-extensions", true);
|
||||
// * * * /
|
||||
// ***/
|
||||
|
||||
/* END: internal custom pref to test for syntax errors ***/
|
||||
|
Reference in New Issue
Block a user