1
0
mirror of https://github.com/arkenfox/user.js.git synced 2025-07-05 04:51:58 +02:00

Compare commits

..

1852 Commits

Author SHA1 Message Date
7f852e94fc media.ondevicechange.enabled 2025-04-21 15:04:04 +00:00
3d76c74c80 v135 () 2025-03-06 02:52:08 +00:00
9bba5788aa legacy sanitizing prefs
In FF128 these were used to migrate to
- clearOnShutdown to clearOnShutdown_v2
- cpd to clearHistory

They are then no longer used.

The migration can be checked with
- privacy.sanitize.clearOnShutdown.hasMigratedToNewPrefs2
- privacy.sanitize.cpd.hasMigratedToNewPrefs2

Note: in FF136 there was another migration, where it changes the `ToNewPrefs2` to false
- privacy.sanitize.clearOnShutdown.hasMigratedToNewPrefs3
- privacy.sanitize.cpd.hasMigratedToNewPrefs3

AFAICT, cpd.hasMigrated* doesn't migrate until you open the clear history dialog.
2025-03-05 07:21:39 +00:00
c25187332e fix the year 2025-01-12 19:02:07 +00:00
80fa110f49 dom.securecontext.allowlist_onions 2025-01-12 19:01:32 +00:00
b8f18a3d91 v133 () 2025-01-12 15:49:26 +00:00
eae5762d29 Add missing -command argument in powershell call ()
* updater: add missing PowerShell argument

* prefcleaner: add missing PowerShell argument
2024-11-09 12:55:49 +00:00
c6cfa10c0b webchannel.allowObject.urlWhitelist 2024-11-07 09:50:47 +00:00
bc6a2ba145 network.http.referer.hideOnionSource
since it was flipped to true for TB, not much point keeping it
2024-11-06 15:24:03 +00:00
f906f7f3b4 v128 () 2024-08-26 08:41:28 +00:00
11582f905a geo.provider.use_gpsd
https://bugzilla.mozilla.org/show_bug.cgi?id=1803234 - removed in FF131

and it doesn't work: https://bugzilla.mozilla.org/show_bug.cgi?id=1763347
2024-08-06 04:37:00 +00:00
ff5c959cb9 geo.provider* 2024-07-09 05:49:23 +00:00
23caf69614 v127 deprecated 2024-06-22 15:44:54 +00:00
6446d73cf5 add deprecated since FF119 2024-06-14 06:14:26 +00:00
47cbf5b974 fixup sysntax, tidy 2024-06-07 21:36:53 +00:00
9655743d8c fixup missing semicolon () 2024-06-07 20:53:34 +00:00
c2f191448c v126 () 2024-06-06 20:21:14 +00:00
33a84b608c v122 () 2024-02-04 20:09:30 +00:00
4a510a4b4c prefsCleaner.sh v2.1
- remove group root/wheel check
2023-11-24 13:38:25 +00:00
e4dd5aa428 updater.sh v4.0
- removed group root/wheel check
2023-11-24 13:35:14 +00:00
fd72683abe v119 () 2023-11-20 02:49:16 +00:00
f95c6829fe fixup date/reference 2023-11-19 09:56:47 +00:00
fc25163763 Correct archived version link in arkenfox-cleanup.js () 2023-11-10 23:52:23 +00:00
29bb5a35f0 rename/add icons () 2023-11-02 21:17:15 +00:00
96210522d8 Add favicon for LibreWolf 2023-11-02 20:36:12 +00:00
Tad
d94d68245f Add favicon for Mull
Signed-off-by: Tad <tad@spotco.us>
2023-11-02 16:18:47 -04:00
e2681baec3 javascript.use_us_english_locale
https://bugzilla.mozilla.org/1846224
2023-11-01 22:02:55 +00:00
35e8def0b1 network.dns.skipTRR-when-parental-control-enabled 2023-10-18 14:59:33 +00:00
3fdcb28b8f v118 () 2023-10-18 14:03:40 +00:00
f54d632da5 v2.0 - improve root check 2023-10-07 10:33:49 +00:00
6e79d1bba6 deprecated v118 2023-09-29 10:52:55 +00:00
56f51203bf point to archived version 2023-09-21 12:36:35 +00:00
bd2e5b8d1d undo encryption
they're not default false since 108, that was nightly only
2023-09-18 11:47:49 +00:00
f0513b7e64 inactive prefs no longer needed
encryption prefs false since FF109, taskbar since jesus or whatever
2023-09-18 11:41:47 +00:00
336300a274 v118 removed
these are all at default now as of at least ESR115
2023-09-18 08:39:50 +00:00
50af4b9af4 remove old prefs 2023-09-18 08:34:35 +00:00
3f6fcc13f0 permissions.delegation.enabled 2023-09-18 08:31:22 +00:00
1e6e211a06 v117 () 2023-09-17 07:17:40 +00:00
dfd5589c3d v117 deprecated 2023-09-16 07:08:33 +00:00
ba173d4920 layout.css.font-visibility.resistFingerprinting 2023-08-28 04:15:07 +00:00
61a9f9d37a v115.1 ()
The .1 refers to arkenfox, and has nothing to do with Firefox's versioning. This will better align ESR115 users' defaults with AF moving forward
2023-08-27 01:49:42 +00:00
576da2e236 Delete smartReferer.png 2023-08-26 07:08:23 +00:00
f1831e947b media.gmp-widevinecdm.enabled
this adds nothing, users can use `media.eme.enabled` if this is their threat model
2023-08-26 06:45:37 +00:00
915f39959c external.ms-windows-store, fixes 2023-08-14 03:27:30 +00:00
4d78abf2bf v115 () 2023-07-26 04:37:00 +00:00
6151d664ac middlemouse.contentLoadURL 2023-07-19 20:38:31 +00:00
47f152ac90 browser.cache.offline.enable 2023-07-10 13:35:52 +00:00
84d515abfc extensions.formautofill.heuristics.enabled 2023-07-10 12:44:53 +00:00
c34531b67e 114 deprecated 2023-06-21 03:29:51 +00:00
04e6e77439 v3.9 - fix 2023-05-05 10:56:08 +00:00
bc5add9450 v112 () 2023-05-04 23:31:33 +00:00
b117916207 Update prefsCleaner.sh 2023-04-24 16:58:19 +00:00
2f4b93a18f fix escape character, should close () 2023-04-24 16:56:29 +00:00
d50c772d7d v1.8 - fix syntax error 2023-04-23 09:14:03 +00:00
7a1d0a92af v3.7 - fix syntax error 2023-04-23 09:13:13 +00:00
f2e4a79ca0 updater.sh/prefsCleaner.sh: Check for root and abort ()
* updater.sh/prefsCleaner.sh: Check for root and abort

Check if running as root and if any files have the owner/group as root|wheel.
Abort on both.

Should (hopefully) prevent stuff like: https://github.com/arkenfox/user.js/issues/1587
Discussion: https://github.com/arkenfox/user.js/pull/1595

---------

Co-authored-by: Mohammed Anas <triallax@tutanota.com>
Co-authored-by: earthlng <earthlng@users.noreply.github.com>
2023-04-22 11:52:26 +00:00
c84c419544 v111 () 2023-03-30 04:50:25 +00:00
bdaa2867b9 v2.7 - use Powershell for locale-independent TS
fixes 
2023-03-19 11:16:40 +00:00
e2e8c4ea8f add arkenfox/gui 2023-03-13 07:13:07 +00:00
d13f39d9f9 v110 () 2023-03-12 03:26:12 +00:00
ca022d8c2d v4.19 - use Powershell for locale-independent TS 2023-03-10 09:21:21 +00:00
7388485063 v109 () 2023-02-07 00:02:45 +00:00
8259191167 prefsCleaner.bat: add -unattended flag ()
* prefsCleaner.bat: add -unattended flag

Usage:
  prefsCleaner.bat -unattended

Skips the prompt for user input and proceeds when -unattended is specified. If omitted, default behaviour is unchanged.

---------

Signed-off-by: Keith Harrison <keithh@protonmail.com>
Co-authored-by: earthlng <earthlng@users.noreply.github.com>
2023-02-05 14:06:49 +00:00
b99dd27de8 browser.startup.blankWindow, 2023-01-27 01:07:25 +00:00
62a68f0814 v108 ()
nit: add a ';' to the end of line 1040
2023-01-08 16:48:25 +00:00
be376afc1e v108 () 2023-01-08 15:20:22 +00:00
f5e54b4a70 revert security.tls.version.enable-deprecated
we kept it in the user js
2023-01-02 17:15:24 +00:00
7135907b2f Update prefsCleaner.sh 2022-12-10 14:35:48 +00:00
12ca83b550 v1.6 - autoupdate 2022-12-10 14:00:23 +00:00
e4a85c30c1 security.tls.version.enable-deprecated
the UI for downgrading was removed in FF94, default is false
2022-12-05 18:48:51 +00:00
45d23f8d75 region prefs, 2022-12-02 10:19:29 +00:00
40e8e1acbe beacon.enabled, see 2022-11-28 08:11:40 +00:00
6789dc7fef fix typo 2022-11-22 19:50:50 +00:00
5eaa8196e2 v4.18 - fix backup filename 2022-11-22 19:00:47 +00:00
cc0f05388f v107 () 2022-11-21 00:36:37 +00:00
5a366493e0 dom.disable_open_during_load
default true since at least FF60
2022-11-19 04:04:59 +00:00
365e76bc9f Format date and time consistently. ()
* Format date and time consistently.

Co-authored-by: junos <junos.lukan@ijs.si>
Co-authored-by: earthlng <earthlng@users.noreply.github.com>
2022-11-13 14:37:26 +00:00
a93047e6c9 Improves usability by clarifying desired action () 2022-11-13 14:31:17 +00:00
8a65c5a7ba v106 () 2022-11-06 13:28:40 +00:00
60dd839081 dom.disable_beforeunload, 2022-11-04 16:03:29 +00:00
f4187632fa browser.ssl_override_behavior
the code behind it was removed in FF68 - https://bugzilla.mozilla.org/show_bug.cgi?id=1530348
2022-10-08 19:38:05 +00:00
51f3fdbd87 devtools.chrome.enabled
default false in stable, dev, beta, nightly
2022-10-08 14:08:55 +00:00
db04bc44f2 some inactive prefs at default since 102+
- dom.vr.enabled - false FF97+
- network.http.altsvc.oe - false FF94+
- dom.netinfo.enabled - android joined desktop as false FF99+
- browser.tabs.warnOnClose - falsefalse FF94+
2022-10-04 17:34:45 +00:00
4e3a64b5a1 v105 () 2022-10-04 17:15:19 +00:00
958acf9c2e activity-stream.feeds.discoverystreamfeed 2022-10-03 13:47:30 +00:00
95ecd3e328 browser.newtab.preload 2022-10-03 07:18:30 +00:00
4bc98005ec activity-stream.feeds.snippets 2022-10-01 20:33:58 +00:00
3f09afdee0 Merge pull request from arkenfox/Thorin-Oakenpants-patch-1
v104
2022-09-11 12:46:23 +02:00
3c73bc1e56 2720: add APS 2022-09-11 02:39:08 +00:00
e38f02bc22 add extra bugzilla 2022-08-28 00:31:59 +00:00
74be763f60 add OCSP hard-fail error code 2022-08-24 05:53:46 +00:00
5780b6d197 move Form Autofill to 5000s 2022-08-23 17:51:35 +00:00
06bfef8fd1 extensions.formautofill
add migrated prefs for completeness - see comment in d040b95ed2
2022-08-23 17:33:55 +00:00
d040b95ed2 also reset the prefs migrated to
.supported also hides/shows the UI. There is no need for this, it is overkill (and users might never be able to work out how to get them back). The .enabled prefs are enough to toggle the checkboxes IF they show based on .supportedCountries (which relies on browser.search.region)
2022-08-23 17:29:47 +00:00
61f01f81fd tidy 2022-08-23 16:53:27 +00:00
2b2e151f45 extensions.formautofill
https://bugzilla.mozilla.org/1745248 - migrated to .supported in FF99
2022-08-23 16:52:38 +00:00
ff8d63f7e4 remove dead prefs
https://bugzilla.mozilla.org/show_bug.cgi?id=1745248 - they migrated to `.supported` prefs (values detect or off)
2022-08-23 16:42:32 +00:00
848290898d svg opentype fonts -> optional, see 2022-08-22 16:02:07 +00:00
05abe82136 v105
partition SWers by default: https://bugzilla.mozilla.org/show_bug.cgi?id=1784900
2022-08-18 20:12:42 +00:00
0dba33688f v103 () 2022-08-17 19:24:38 +00:00
6e53e841f7 security.pki.sha1_enforcement_level 2022-07-31 10:50:24 +00:00
ecb63e82c9 Update prefsCleaner.sh 2022-07-30 12:23:27 +00:00
ded7c01a08 Back up prefs.js to prefsjs_backups directory () 2022-07-30 12:22:32 +00:00
996881aef1 Update updater.sh 2022-07-24 13:11:28 +00:00
4b4248157a make updater.sh check explicitly for Y/y instead of N/n ()
thanks @infinitewarp
2022-07-24 13:10:06 +00:00
a5e75c4bd3 fixup network.cookie.lifetimePolicy
migration code was backed out in FF102.1
2022-07-18 11:27:05 +00:00
c6ab6c4b48 v102.1 ()
revert back to relying on network.cookie.lifetimePolicy
2022-07-18 10:38:43 +00:00
ceacc9dd74 v102 () 2022-07-02 00:43:25 +00:00
d466cf694e two password prefs
https://bugzilla.mozilla.org/1767099
2022-07-01 08:15:39 +00:00
3fcc711c5a network.cookie.lifetimePolicy
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1681493,1681495,1681498,1759665
2022-07-01 02:42:16 +00:00
c21b9faefc dom.storage.next_gen 2022-06-14 07:01:01 +00:00
1a899966a9 v101 () 2022-06-12 13:38:27 +00:00
36c942e887 browser.urlbar.trimURLs
see 
2022-06-12 12:45:13 +00:00
662eddbc21 network.cookie.thirdparty 2022-06-01 13:51:19 +00:00
ea139e3ef8 long standing defaults
- FF79+ dom.targetBlankNoOpener.enabled - https://bugzilla.mozilla.org/show_bug.cgi?id=1522083
- FF86+ privacy.window.name.update.enabled - https://bugzilla.mozilla.org/show_bug.cgi?id=1685089
2022-05-09 19:25:18 +00:00
d6b26e7558 v100 () 2022-05-09 18:49:38 +00:00
7ff46e02dd v100 deprecated
https://bugzilla.mozilla.org/1752621 - replaced with network.http.http2* prefs
2022-05-05 23:33:44 +00:00
4ff931781a Merge pull request from arkenfox/v99
v99
2022-04-09 09:45:45 +00:00
9aae0a62b0 tidy deprecated, misc RFP changes 2022-04-08 21:30:22 +00:00
eb98f06d69 security.csp.enable
https://bugzilla.mozilla.org/1754301
2022-04-08 21:28:16 +00:00
81561840a1 deprecate security.csp.enable 2022-04-08 11:43:39 +02:00
64bc683c3f Made prefsCleaner.sh executable ()
Changed permissions of prefsCleaner.sh from 644 to 755 to be able to run it via "./prefsCleaner.sh" with out first executing "chmod +x prefsCleaner.sh".
2022-04-08 07:03:43 +00:00
b4225baaf2 Update updater.sh 2022-03-19 07:47:46 +00:00
e00497fd51 Fix newline issue when downloading files in updater.sh () 2022-03-19 07:46:08 +00:00
d9af90d05f v98 () 2022-03-10 00:44:10 +00:00
0d83307b14 Update troubleshooting-help.md 2022-02-27 10:44:04 +00:00
4f3f789f28 Add files via upload 2022-02-25 23:15:01 +13:00
6b6ed86b6c Update troubleshooting-help.md 2022-02-24 00:26:15 +00:00
382b9181df Add files via upload 2022-02-20 19:00:32 +13:00
ba052105de Add files via upload 2022-02-14 05:38:13 +13:00
4bd17611df Update troubleshooting-help.md 2022-02-13 13:11:55 +00:00
41468d0d0b Update troubleshooting-help.md 2022-02-13 13:11:26 +00:00
a98b73c64e v97 () 2022-02-13 11:15:00 +00:00
58e2618b9d dom.securecontext.whitelist_onions
replaced by dom.securecontext.allowlist_onions - https://bugzilla.mozilla.org/1744006
2022-02-09 20:00:43 +00:00
d61da93aad Update troubleshooting-help.md 2022-02-06 15:30:25 +00:00
562127be87 Update troubleshooting-help.md 2022-02-06 15:27:50 +00:00
917e3fe1aa Update wiki link for updater options () 2022-02-06 12:23:20 +00:00
89bee0e361 Add files via upload 2022-01-31 03:08:22 +13:00
4c74f1bffb Update README.md 2022-01-30 08:53:08 +00:00
0d9de9174a Update README.md 2022-01-30 03:23:06 +00:00
45043537d8 Update README.md 2022-01-30 03:20:59 +00:00
cc7ca9d0fa cleanup dead images () 2022-01-29 05:24:41 +00:00
10044fcaf7 typos () 2022-01-22 01:49:48 +00:00
ac0820a5dc add last bits about ETP Strict/dFPI, closes 2022-01-21 03:48:06 +00:00
83b6d64e67 security.insecure_connection_text.enabled
AF has been using HTTPS-Only mode since v84, the interstitial is more than ample, padlock is still marked as insecure
2022-01-16 02:36:08 +00:00
b5bf2ee017 oophs, add removed item from last commit to 6050 2022-01-16 02:34:21 +00:00
09d62d2302 remove 1273: "not Secure" text on insecure sites
AF has been using HTTPS-Only mode since v84, the interstitial is more than ample, padlock is still marked as insecure
2022-01-16 02:31:57 +00:00
7a4676fe2d make 1601 setup tag more explicit, closes 2022-01-15 05:25:11 +00:00
bc2aba3829 move last update pref to personal 2022-01-12 05:25:31 +00:00
926a2d4ac8 v96 deprecated,
also tidy the description to reflect that the setting is hidden
2022-01-12 05:09:17 +00:00
ab7380c93b HoM: tweak background request info 2022-01-11 09:21:37 +00:00
06b8d8bfa3 move 0362 to don't touch 2022-01-07 17:29:26 +00:00
7016c2050d move TLS 1.0/1.1 downgrades to don't bother
https://bugzilla.mozilla.org/show_bug.cgi?id=1745678
2021-12-30 03:15:56 +00:00
2787da7f90 Update README.md 2021-12-24 06:04:38 +00:00
7e18f8b473 tweak 2011
- FF85+ switched to using application regional locale
   - go to about:support > Internationalization & Localization (almost at the very end)
   - look at Application > Regional Preferences
- add test
2021-12-24 06:01:41 +00:00
d2510b014d move updates to personal
updating (app, extensions, ext cache) is not a privacy issue
- if you're willing to use Firefox but not trust updating, then I have two bricks to sell you: users who wish to disable it (to check changes first etc) and update in a timely manner, then that is on them - including any prompt fatigue
- same goes for extensions: the end-user installed them (and arkenfox only recommends a very select few) - the onus is on the end-user

The remaining ones I will deal with later
2021-12-23 23:42:28 +00:00
87bd8683fa 2022: add browser.eme.ui.enabled
for those who want to remove DRM prompts and have no intention of enabling it
2021-12-23 21:22:41 +00:00
d48d3ad29a remove browser.eme.ui.enabled 2021-12-23 21:20:28 +00:00
6675225ec4 make 0301 inactive
auto-updating is not a security nor a privacy risk, by default it should be enabled and it's on end-users if they want to disable it - does not affect windows users
2021-12-23 06:36:39 +00:00
bb56056a68 explain 0-RTT 2021-12-15 19:23:03 +00:00
93f0ff89c8 move web notifcations to don't bother 2021-12-15 00:05:03 +00:00
7811e912f4 make push notifications inactive
- they require SWers which are already blocked by virtue of permissions being session only
- also remove "dom.push.userAgentID" as this means prefsCleaner resets it and would wipe user's subscriptions
   - not adding "dom.push.userAgentID" to the cleanup script for the same reason
2021-12-14 13:25:46 +00:00
238f1545f4 fixup thanks #fxbrit have a 🍥 fish cake 2021-12-13 14:15:25 +00:00
c269ac9f7d remove duplicate 2021-12-13 03:49:42 +00:00
78297132b4 fix syntax 2021-12-12 15:44:39 +00:00
8de87de050 update 0704: GIO, closes ()
https://bugzilla.mozilla.org/show_bug.cgi?id=1666725
2021-12-12 15:41:55 +00:00
8bc25b552d expand 0650 to include any removed item
this should reduce any dependency on the scratchpad script
2021-12-12 15:30:53 +00:00
c8c86262d7 enforce SmartBlock shims 2021-12-12 13:51:25 +00:00
f836e55363 tidy ETP stuff 2021-12-12 13:31:01 +00:00
8cdb30cc08 make cookie pref active
@SkewedZeppelin ... https://github.com/arkenfox/user.js/issues/1051#issuecomment-991806497
2021-12-12 00:26:12 +00:00
54810e333f typo 2021-12-11 19:17:43 +00:00
7ec13c0323 sharedWorkers tweak
tested in FF91+. Seems as if sharedWorkers no longer requires an explicit `Allow`
2021-12-11 12:22:00 +00:00
af109d4696 tweak 7016 2021-12-11 11:15:34 +00:00
460951df9e tidy, add instructions 2021-12-11 09:37:45 +00:00
93874bda43 rename 2021-12-11 09:14:59 +00:00
4ebabbb569 Delete arkenfox-clear-deprecated.js 2021-12-11 09:13:51 +00:00
1f0dc1853d merge scratchpads into one 2021-12-11 09:13:09 +00:00
13e5fe17b1 remove rfpalts () 2021-12-11 06:56:43 +00:00
ec7cb6a491 2702: partition service workers 2021-12-09 17:17:52 +00:00
d9f49bdf1f make 7017 clearer 2021-12-09 16:17:53 +00:00
d5bc6715cd remove web workers section
farewell parrot
2021-12-09 16:14:36 +00:00
8860c90abf make service workers inactive
currently 3rd party service workers are blocked in FF95 when dFPI is enabled (which this version has should anyone update to 96-alpha)
   - but I get an error even on first party - https://arkenfox.github.io/TZP/tzp.html#storage
   - I get : service worker | test : enabled | failed: SecurityError
in FF96+ service workers they are covered by dFPI
  - see https://bugzilla.mozilla.org/show_bug.cgi?id=1731999
2021-12-09 14:31:41 +00:00
4d5abd6cc3 tweak 8000 title
lets not encourage non-RFP users to see this as a sign to use them
2021-12-09 14:18:25 +00:00
de28689e76 flip from FPI to dFPI
I will tidy and expand 2700 entries later
2021-12-09 14:13:39 +00:00
5d508e4242 move LSNG to don't touch 2021-12-09 14:05:47 +00:00
1fc43574d6 move "cookie" permission info into 2801 2021-12-09 14:00:21 +00:00
83602baa38 misc site storage/data prefs
been inactive since jesus was a baby
2021-12-09 13:47:57 +00:00
0634a568ef remove redundant site data prefs
we've never used these
- service workers are disabled (or soon to be covered by dFPI when enabled) and sanitizing is already done (or will be done via enhanced cookie cleaning)
- storage API, storage access API: we sanitize on close, and sites are isolated by eTLD+1
2021-12-09 13:45:46 +00:00
97322d6e8b various inactive FPI prefs 2021-12-09 12:31:38 +00:00
f7bba92c71 cleanout FPI section
farewell parrot
2021-12-09 12:28:45 +00:00
fe75baa79f move DNT to DON'T BOTHER 2021-12-09 11:44:51 +00:00
72cc4d176e 0706: network.proxy.allow_bypass, closes 2021-12-09 11:41:18 +00:00
7e1b92567c 95 final 2021-12-08 12:13:47 +00:00
fec5168203 95 deprecated 2021-12-08 04:28:47 +00:00
b60a888da3 update WebRTC, closes 2021-12-06 14:45:47 +00:00
ec595c3b95 fixup duplicate line 2021-12-05 19:59:33 +00:00
9d61992c8c don't clear offlineApps on shutdown,
- in v94 we switched to cookies lifetime as session, so users could use site exceptions to retain selected cookies (to stay logged in one assumes)
- that mean not deleting all cookies on shutdown
- but some login methods/types require more than cookies and also need the "site data" part of "cookies + site data" - that's the offlineApps part
- note: all site data (and cookies) is still cleared on close except site exceptions
2021-12-05 19:49:32 +00:00
fd860e6c69 flip RFP newwin max values, closes 2021-12-04 10:23:59 +00:00
d1d20b897a wiki cleanup () 2021-12-04 09:36:09 +00:00
cf0102f71e fixup: from being flogged to death by overseers
thanks @dngray, also save some precious bytes .. polar bears know about scarce resources
2021-12-02 09:34:34 +00:00
4dc5372257 0603: network.predictor.enable-prefetch
make active for Nighty users - see https://bugzilla.mozilla.org/show_bug.cgi?id=1506194
2021-11-30 13:29:19 +00:00
c2ddfd60bf tidy 79-91 removed items 2021-11-28 13:22:46 +00:00
47de4f520b tidy 5505 2021-11-28 09:01:39 +00:00
27977a16ad 2652: browser.download.alwaysOpenPanel
FYI: https://bugzilla.mozilla.org/1738372

There is a small privacy issue with shoulder surfers, but in reality, this just needs to happen IMO
- we already prompt where to save, but even if we didn't, we also know we clicked or initiated a download
   - unless it's a drive by or user-gesture trickery - which is why we prompt
- the download icon is shown (if hidden) and the throbber/accent color go to work
- users can always click the icon to show entries (and open folder etc)
- this maintains the current behavior in FF94
2021-11-25 06:49:38 +00:00
4b393b9b12 start 95-alpha 2021-11-24 01:09:10 +00:00
6027aaa45d fixup warnOnQuitShortcut 2021-11-23 12:02:50 +00:00
cbfb8abf15 94 final 2021-11-23 07:11:43 +00:00
58d0161b67 add warnOnQuitShortcut, closes 2021-11-23 07:05:01 +00:00
6b351a9458 fixup trade-offs
anti-fingerprinting doesn't fit here: it's not a major component or priority of this user.js, and only a few prefs outside RFP (as a robust built-in browser solution that defeats naive scripts) have anything to do with it
2021-11-22 18:15:53 +00:00
c9e4cac618 tweak webRTC
webRTC will be overhauled... but not today... in the meantime
- remove dead link before @dngray has a hernia
- correctly refer to the type of IP leak
2021-11-22 18:08:07 +00:00
34bd3c5a04 consolidate/simplify sanitizing, fixes
move all sanitizing on exit prefs into 2800

switch to cookie lifetime as session
- now users can utilize exceptions (as allow)
- session cookies still block service workers (which we disable anyway)
- we still block 3rd party cookies (until we move to dFPI)
- we still have defense in depth for 3rd party cookies with 2803
- we still bulk sanitize offlineApps on exit: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
   - i.e you get to keep the cookies only IF you add an exception

add `privacy.clearsitedata.cache.enabled`
2021-11-22 05:40:49 +00:00
2f88ca2e40 misc
- move DoH so it has room to grow
- tidy privacy.clearOnShutdown, privacy.cpd
2021-11-18 01:28:21 +00:00
e2e7f9c647 font vis changes () 2021-11-16 11:56:20 +00:00
f8932dced1 remove ambiguous line
The point was that google have said (stated in policy, but fuck knows where that is located these days) that it is anonymized and not used for tracking. It's an API used by **_4 billion devices_** - the API has privacy policies for use. If a whistleblower or someone else found out that google was using this to enhance their user profiling, then all hell would break loose. And they don't even need this to fuel their ad revenue. It is provided, gratis, to the web to help ensure security - they wouldn't dare taint it and get it caught up in a privacy scandal involving **+4 billion devices_**. And in all this time (since 2007), there has been no such whistleblower or proof it is used to track or announcements by google of changes to the contrary.

Anyway, a quick search brings up
- Here is their policy - https://www.google.com/intl/en_us/privacy/browsing.html - it's empty and points to
- https://www.google.com/intl/en/chrome/privacy/
   - and if you scroll down to "Safe Browsing practices" it doesn't say anything about privacy policies for the API itself (or the owner of the API) - it just spells out what happens in chrome
- I'm not going to bother to look any further and find a history of policy changes

Anyway, this is Firefox and hashes are part hashes bundled with other real hashes - and we turned off real time binary checks. So this line can fuck the fuck off. It was meant to reassure those who want the security of real-time binary checks, that privacy "shouldn't" be an issue, but I'm not going to expand on it
2021-11-07 06:48:45 +00:00
17beb468f1 tweak 1510 default info 2021-11-04 22:44:23 +00:00
bd59131d3e default changes, missed one 2021-11-04 22:38:16 +00:00
0f8217ad60 cleanup sanitizing-on-close prefs 2021-11-04 16:18:35 +00:00
1515897449 default changes 2021-11-02 16:07:42 +00:00
ba92918d38 don't disable system addon updates, closes 2021-10-26 10:16:42 +00:00
094356e073 0706: add reference 2021-10-25 20:56:18 +00:00
7d68a32971 start 94-alpha
- and remove obsolete ESR78 notations
- note: we leave the deprecated ESR78.x section and item 6050 until v95 so users upgrading to ESR91 can easily reset those prefs with prefsCleaner
2021-10-25 17:41:16 +00:00
85438d00e4 v93 deprecated 2021-10-12 08:23:46 +00:00
a764149520 v92 2021-10-11 13:56:38 +00:00
535346df87 Delete arkenfox-clear-RFP-alternatives.js 2021-10-10 23:55:39 +00:00
412c8f9f94 0807 urlbar contextual suggestions, 2021-10-09 07:14:20 +00:00
380a88ee57 oophs 2021-10-05 11:14:16 +00:00
8404e8a59c tidy, closes 2021-10-05 03:04:14 +00:00
6381b1aeb9 prefsCleaner.sh: Fix invalid regular expression () 2021-09-28 19:24:54 +00:00
5cdea955e7 Simple maintenance improvements ()
* Use direct check for existence of file

* Fix shellcheck warnings

* Unify codestyle in scripts

* Trim excess whitespace
2021-09-27 15:23:12 +00:00
b37df0bcfe embiggen 4500, 2021-09-25 02:32:48 +00:00
044e3e76e8 make 0706 more cromulent 2021-09-25 01:47:54 +00:00
1c6d633144 more nits 2021-09-11 05:35:39 +00:00
278336196c nit 2021-09-11 05:31:21 +00:00
76c1aad4be grammar 2021-09-10 13:07:04 +00:00
e5c128804c remove locale in link 2021-09-10 05:09:05 +00:00
c9956d85b1 92-alpha 2021-09-10 04:32:09 +00:00
524823fd05 proxy direct failover () 2021-09-07 13:35:32 +00:00
283bfd744a fixup missing 1022 reference 2021-08-29 14:32:37 +00:00
a1b4aa6000 add DoH rollout pref, closes 2021-08-29 07:42:24 +00:00
a308878b11 finish removal of 500s and cleanup of 300s 2021-08-29 04:50:36 +00:00
453fcd32cb remove 2003, fixes 2021-08-29 04:10:48 +00:00
a264eebcb5 screensharing etc 2021-08-29 03:27:46 +00:00
908638c9dc security.mixed_content.block_active_content
default true since at least FF60
2021-08-28 08:39:44 +00:00
7e80231ac5 was 6005: remove mixed active 2021-08-28 08:38:31 +00:00
6df03e1a74 add removed from arkenfox section
- this helps mitigate the need for scratchpad for those who use prefsCleaner
- in future, if anything was active during the ESR cycle, then it goes in here when removed
- similar to deprecated items: clean out after ESR EOL
2021-08-28 08:30:12 +00:00
4b437771fa oophs, thanks @eleius
fixup 3b52557143
2021-08-28 07:11:44 +00:00
4043467ad9 tidy 2021-08-28 06:03:13 +00:00
5ac8fd8f70 0906: tweak, 2021-08-28 05:57:19 +00:00
2cf20c56a7 standardize cross origin/domain 2021-08-28 05:48:54 +00:00
3b52557143 start removal of section 0500s
- I am no longer short one parrot
- move inactive screenshots to personal
- move FORM autofill to `0800... FORMS` - can't find it now, but this is slated to cease being a system addon and instead be "built-in"
- the rest will get swallowed into a revamped, split QUIETER FOX
2021-08-28 05:19:13 +00:00
2a9cf32f45 security.insecure_connection_icon.enabled
inactive and default true
2021-08-27 10:39:40 +00:00
08395de188 1273: remove inactive pref 2021-08-27 10:37:54 +00:00
4ac17eaf78 tidy last commit 2021-08-26 06:50:46 +00:00
b5a3b54d3f clipboard to don't bother 2021-08-26 06:43:28 +00:00
38dc90a947 dom.allow_cut_copy
80f69a6f3d
2021-08-26 06:27:32 +00:00
80f69a6f3d 2406: remove
This doesn't achieve anything. AFAICT, it's an old gecko only API, not used on the web: superseded by the Clipboard API (added in FF21+)
2021-08-26 06:26:41 +00:00
498a25c759 0806: remove confusing line 2021-08-26 06:04:57 +00:00
64e8dfad0a 1004: remove setup tag
IDK if this is true: no one has ever complained, and I'm not interested in maintaining/testing it
2021-08-26 05:55:11 +00:00
5ec4fef4ed dedupe 0808 2021-08-26 05:40:59 +00:00
881a2d22eb cleanup tags
- there was only one perf left
- warning is down to 5: two in section headers, 3 on inactive prefs: no need to mention it, people will see them if they read each item/section
2021-08-25 16:14:59 +00:00
76c8ecd10d tidy 2021-08-25 15:56:57 +00:00
677b81765f tidy webgl 2021-08-25 15:36:15 +00:00
9f43d48a32 targetBlankNoOpener -> don't touch 2021-08-25 14:09:39 +00:00
6077d09b9f window.name -> don't touch
Also FPI FF65+ patch is not part of FPI, it is part of 4002 which is a separate pref
2021-08-25 14:04:50 +00:00
7144f8b7f8 cleanup continued,
More minor tweaks to come. This isn't final
- 0102: ambiguous that the clearing was related to PB mode
- 0900s:
   - get rid of 0901, it has no pref, stick link in header
   - 0905: values on multi-lines use spaces = more readable
- 1000s:
   - rename as disk avoidance and remove sub-section headers
   - remove the outdated section header
- 4001: it will never be perfected, it's doing it's job
- 5500s: optional hardening
   - legit security measures, but commonality in caveats, so I made them a separate section
   - this flips graphite, asm.js and wasm from active to inactive: these are overkill: exhibit A: hundreds of millions of Firefox users
   - e.g. graphite and wasm are enabled on Tor Browser
   - new CVE keyword links
- 7000s: don't bother - two more items added
- 5000s: optional opsec and cleanout 0800s header
- re-number
   - 0900s, 1000s, 1400s, 2400s

PS: I need a new parrot: "9000 syntax error: I ran out of parrots"
2021-08-24 22:51:48 +00:00
778421cad4 2021-08-24 08:59:11 +00:00
35ccaff58e calrify password prompt, 2021-08-24 08:52:12 +00:00
69132b588f 7000s: mathml, svg, 2021-08-24 05:43:38 +00:00
51748ea25a leverage cve keyword 2021-08-24 03:09:33 +00:00
269cf965bd renumber 1700s 2021-08-23 10:03:13 +00:00
b177c73f0d typo
technically it's "or" - FPI overrides network partitioning
2021-08-23 09:47:34 +00:00
613e55ae8c 7000s: add MOAR; renumber 0700s, 2021-08-23 09:42:21 +00:00
3697bd8d3a 1603 -> inactive
Yes it's pretty much useless. Yes it's fingerprintable, and what that entropy is, who knows. Since it's sent regardless with ETP, which we enable in all windows, then who cares. And if you don't use ETP in all windows, then I don't care either - just saying
2021-08-23 06:26:45 +00:00
9f08c7c0f4 7000s: referer policy
and re-number 1600s
2021-08-23 06:04:19 +00:00
05b7d61735 7000s: non cross origin referers 2021-08-23 04:54:49 +00:00
e31a6876e6 section 6000 2021-08-23 04:40:29 +00:00
47be7ba42f 1203 is a reset not enforce 2021-08-23 04:08:49 +00:00
033977fe10 move personal to last
probably more professional to keep it at the end since it isn't strictly project related. It also opens up space for `DON'T TOUCH` and `OPTIONAL OPSEC`
2021-08-23 03:39:15 +00:00
ab42deb541 Four more items to 7000s, 2021-08-23 02:55:36 +00:00
8a22a90804 colon insertion () 2021-08-22 16:23:51 +00:00
c55e6dcd68 flip order, order within groups
- note: keeping 91 separate for now for the easy info factpr
2021-08-22 08:27:15 +00:00
cf379bcce0 typos 2021-08-22 05:45:08 +00:00
2b26cd4f41 7000s: ciphers,
- merged 3DES cipher to bottom: it is still the same order of [1]
- 3DES pref will be deprecated: pref name changes, and the cipher slated to be unavailable unless you downgrade to < TLS1.2 - see https://bugzilla.mozilla.org/show_bug.cgi?id=1724072
   - FYI: we reset TLS downgrades to session only by resetting the pref currently in 1203
- "Minimal/non-existent threat of downgrade attacks"
   - FYI: these old ciphers are about 1-2% of traffic (from memory) - but that's still significant breakage
   - So the only reason to do this would be to harden against downgrade attacks (and inadvertently use weak sites = breakage): but that doesn't fit most user's threat model: and is probably never going to happen for them. Not sure if I can word that much better and just as succinct
2021-08-22 05:18:54 +00:00
8bfee5b59f hardware acceleration
see 04d648d55b
2021-08-22 01:55:28 +00:00
04d648d55b remove 2508
- inactive in user.js since
   - v55: gfx.direct2d.disabled
   - v67: layers.acceleration.disabled
- the way to counter hardware fingerprinting is within each API that may expose it
- this may have made some sense way back in the day, when there were less options/protections, but not any more
- [are we web render yet](https://arewewebrenderyet.com/) - yes, 100% - there is no need to cripple your browser's perf
2021-08-22 01:53:01 +00:00
7cdc76ecf9 dom.vibrator.enabled
see aded0707a4
2021-08-21 04:40:11 +00:00
aded0707a4 misc
- renumber 0200s, 2500s
- remove 2414: doesn't apply to desktop, and I think it has been neutered in android
2021-08-21 04:39:08 +00:00
2a011f1053 media.media-capabilities.enabled
see 213467d91b
2021-08-21 03:23:17 +00:00
213467d91b remove 2517
- inactive since we added it in v63
- this is not how you defeat fingerprinting (unless done in an enforced set)
- for the record: not even tor browser disable this
- fingerprinting this is not cheap in gecko (for now)
- from [2]
   - decoding/encoding capabilities: "it is expected that the entropy ... isn’t going to be significant"
   - HDR detection: "... has the potential to add significant entropy .. however .. but ... thus minimizing effective entropy" - it is what it is
   - note that RFP has some mitigations in FF82+ 1461454
2021-08-21 03:21:32 +00:00
da0c291127 update to ESR91 2021-08-21 02:26:17 +00:00
27ce48f319 trim fluff 2021-08-21 02:00:43 +00:00
37ded2a519 remove redundant warning 2021-08-20 14:10:09 +00:00
c9bdceb8d6 1244: fix no upgrade test 2021-08-20 13:23:59 +00:00
95136382e1 improve 1244, closes again 2021-08-20 13:18:43 +00:00
78d953bfda remove 1032
dead wood: marked as default false since at least v68, inactive since at least v78, and web notifications are controlled in 2300s
2021-08-20 03:16:25 +00:00
2d3d8ae5b0 alerts.showFavicons 2021-08-20 03:12:59 +00:00
cef08b63f1 4520 -> personal 2021-08-20 02:52:55 +00:00
a8e95e7310 dexter would be proud
- just to be clear, this section is not supported: not interested in references or explanations or  FF version numbers or default info etc
- "do more harm than good" - ambiguous, not interested in explaining why exactly: but FYI
  - some leak
  - most break shit
  - almost all are easily fingerprinted and the combo of them would make you really stand out
- removed the duplicate `ui.prefersReducedMotion` - this should move to personal as well
- moved `ui.systemUsesDarkTheme` to personal
2021-08-20 02:13:53 +00:00
5ab3c47b6b 7001: tweak
F11 has nothing to do with the API or why
2021-08-19 15:26:22 +00:00
45c52b6620 start section 7000s 2021-08-19 14:44:06 +00:00
93f6aea06a 1605: change to active enforced 2021-08-19 13:17:07 +00:00
00fa8f1b50 general.warnOnAboutConfig
ac84da2af4
2021-08-19 02:14:23 +00:00
ac84da2af4 remove XHTML config warning
dead weight: ESR users will already be aware of and ticked the warning box by now
2021-08-19 02:07:03 +00:00
f19d850845 tidy
8000s (was 4600s)
- move below personal, so user-relevant part is shorter
- swap out font vis with document fonts + font whitelist
   - font vis still has usability/visual purposes: it just won't really help much with fingerprinting
   - ESR78 users (who can't use font vis), sorry, but we made doc fonts inactive for a while now, and now recommend you don't use it anyway
2021-08-19 01:46:47 +00:00
7264271063 rusty-snake improvements, 2021-08-19 00:15:30 +00:00
dc63a752a5 tidy 0300 + 0301 2021-08-18 13:55:41 +00:00
a70c312938 goodbye battery
- dead weight since 2017-06-13 when ESR45 reached EOL .. good riddance
- if someone does use it, it's not going to do any harm, so no need to carry it for prefsCleaner
2021-08-18 12:46:24 +00:00
2ce269362e dom.battery.enabled 2021-08-18 12:40:27 +00:00
29ad768a22 RFP tweak
letterboxing is not part of RFP, it is a separate pref: bugzilla and FF version info is in 4504
2021-08-18 09:08:36 +00:00
679648b33e RFP info tweak 2021-08-18 09:03:16 +00:00
783786290d tidy
- geo -> warning
- merge container prefs
- remove redundant "see"s
- remove corresponding 4600's item number in RFP mitigations
   - it's pretty clear by the preference names in 4600
   - could be misconstrued that the 4600 pref is the same result
- RFP's language prompt only checks for en*, not en-US (so en-GB, en-CA etc do not get prompted)
   - https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPHelper.jsm#196
2021-08-18 08:24:44 +00:00
e7e6cfffe8 0503: tidy 2021-08-18 07:30:55 +00:00
08e9fb35fd update some references 2021-08-18 07:16:19 +00:00
fdc9376c69 tidy
- 0105*: merge into a single block
- 1220: make values more readable with spaces, like 2701 (no need for value 2), add default, update advise (get a new AV, SHA1 is dead baby)
- 2619: remove fluff
2021-08-18 01:50:09 +00:00
41c3c0ec26 tweak 2522: webgl
- we already disable webgl, that's enough
- the other two prefs are not going to provide much protection if a user decides they want webgl
- "disable-fail-if-major-performance-caveat" only applies to ESR78 and will removed in the future
- one (or two) less pref(2) for users to troubleshoot/flip
2021-08-17 03:47:33 +00:00
d7208ccf34 tidy 2021-08-17 03:41:56 +00:00
77410bf86d musical chairs part 2
merge plugins with webrtc (camera + mic) and "media"
2021-08-17 03:08:48 +00:00
1d63e836ee musical chairs part 1
- move 2200s into respective sections
- move FPing items into 2500s
2021-08-17 02:52:19 +00:00
668e843fce misc
- remove 2720
   - this is a very old pref, been inactive since at least our first github release: v51
   - disabling the API is not how you control client side state: you do that by blocking cookies which also controls other state such as IDB etc
- 2700 section header
  - history/downloads is redundant
  - Offline Website Data info -> relevant item number with Active Logins info
  - ^ technically it still includes appCache for ESR78 users, but that will be moot in less than three months
- tidy RFP
  - update to FF91 userAgent spoofing: there is no Android ESR so we don't need to mention "Android 9"
  - we don't need to say if the API is enabled for mediaDevices
2021-08-16 15:34:57 +00:00
51e388ae86 dom.storage.enabled 2021-08-16 15:06:06 +00:00
e7872b193b !yoda
no bytes were harmed in the making of this commit
2021-08-16 04:22:46 +00:00
8d6ee7c0c7 oophs 2021-08-16 04:18:12 +00:00
7d1e244f5a 0506: clarify
oh noes! what's blocked, the pref or the ping? .. also save MOAR bytes
2021-08-16 04:10:20 +00:00
dcc736bb85 I meant 14 lines, u lucky bastards 2021-08-16 04:03:56 +00:00
68568c1abf trim 1198 bytes (u lucky bastards!) + 13 lines 2021-08-16 04:02:15 +00:00
1b33f574bb RFP stuff 2021-08-14 04:44:50 +00:00
568a05ad7d 2502: trim
this info is useless .. save three lines
2021-08-14 04:18:04 +00:00
c45094fdd9 nits! (edit 2 typos) () 2021-08-11 20:56:51 +00:00
c3b7f7538c i do not like mixed case lists 2021-08-10 01:21:04 +00:00
4b38e20f14 change 4600s into do not use, ()
see https://github.com/arkenfox/user.js/issues/1221#issuecomment-895623028
2021-08-10 00:18:19 +00:00
d19d4ba784 final update
in hindsight, the original name is more accurate
2021-08-09 20:42:51 +00:00
dd112a167d final update 2021-08-09 20:39:47 +00:00
92b7fb81d0 fixup STATS year 2021-08-04 18:45:15 +00:00
404d1d466a update [STATS]
- just in time for ESR91
2021-08-04 17:23:38 +00:00
06e5de4332 tweak windows SSO info/reference 2021-08-04 10:32:33 +00:00
eb4363dc18 tweak info in section 2800 header, 2021-08-01 17:36:04 +00:00
5c93ebb54f misc, closes 2021-07-30 05:48:17 +00:00
b8f3d93a5c v90 2021-07-26 03:11:09 +00:00
f53f01823f 1203 default info 2021-07-24 12:56:27 +00:00
18dbb56a3d put 1203 back
see 3bb9fc713f
2021-07-24 12:51:15 +00:00
cc8674c16d revert last commit 2021-07-24 12:49:39 +00:00
f394fd0290 move webgl to hardware fingerprinting
- merge into a single number, update the alt pref number
- update RFP info to reflect that it is not a cure-all
2021-07-24 01:56:46 +00:00
f24899fcac cleanup language specific links 2021-07-24 01:04:03 +00:00
a7ba61c0d4 0304: background service app update [windows]
- the service implies a check is done first, I'm more concerned with the actual updating: not that updates are bad, it's about controlling when (if ever e.g. my test suite)
- since 0301 has to be done manually in Windows, 0302 is a good fallback **IF** the background service is applicable (read the link)
- clean up the numbering
2021-07-24 00:52:38 +00:00
babb9f3682 4612: remove outdated confusing line 2021-07-22 03:41:39 +00:00
b22e349d44 make 4620 more accurate and match RFP section info 2021-07-20 03:38:49 +00:00
bb48fe4ebe RFP: 4612 is not disabled (by default) 2021-07-20 03:34:49 +00:00
44a8088481 tidy
- "enforce" is for when we set the default value
- use [WARNING] for inactive (they're inactive for a reason and people really do not need to turn them on) but less scary [NOTE] for active (tweak away at your own risk)
  - seems neater, easier and less scary for users setting up the first time: i.e they only need to initially look at active items
  - FYI: I was going to add something to LSNG (2760) that it is required for Fission, but will wait, and it struck me that 2680 was the only active item with a warning: seems inconsistent
- 2684: security delay .. make enforce mean enforce (default) ... not worth occasionally saving .3 seconds
   - for now it's one less item in differences/flips
   - might make this inactive in 91+, and add a warning
   - it has been a very long time since we added this due to bad advise/references on the internet on how to speed up Firefox
2021-07-20 02:51:52 +00:00
4c8c9bc01f security.tls.version.enable-deprecated
default false since it was added in FF71 - see https://bugzilla.mozilla.org/1579285
2021-07-20 02:02:26 +00:00
3bb9fc713f remove 1203
default false since it was added in FF71 - see https://bugzilla.mozilla.org/1579285
2021-07-20 02:00:33 +00:00
b761a9dd32 4505: experimental RFP prefs
and tidy up all instances (eight) of "do not use": all caps, no asterisks, immediately after [warning]
2021-07-08 07:08:38 +00:00
0da2ecdb4d keep current rather than every ESR 2021-07-08 06:41:59 +00:00
31e864c16c 0913: disable windows SSO FF91+
- and make 2730 more accurate and add bugzilla
- future RFP additions will be FF91+
2021-07-08 06:21:53 +00:00
acc1376c37 Update arkenfox-clear-deprecated.js 2021-07-07 14:33:20 +00:00
939d75e5eb Update arkenfox-clear-removed.js 2021-07-07 14:25:08 +00:00
3b573bf9f0 Update arkenfox-clear-RFP-alternatives.js 2021-07-07 14:15:51 +00:00
a231c1e90e Update arkenfox-clear-RFP-alternatives.js 2021-07-07 14:10:24 +00:00
f229a3cb75 fixup FF90 deprecated () 2021-07-07 11:51:44 +00:00
981462ee54 FF90 deprecated 2021-07-06 13:26:44 +00:00
d940ffb3c6 105c: add "sponsored shortcuts" 2021-07-06 06:32:58 +00:00
a6d20eaf5b 1264: update ciphers, fixes () 2021-06-23 16:22:10 +00:00
b93a5e334c 2510 webaudio -> inactive RFP alts, closes 2021-06-20 12:49:57 +00:00
c98606430c move 2505 to RFP alts, closes 2021-06-20 09:29:38 +00:00
12c0631900 4501: remove confusing RFP line 2021-06-16 16:48:14 +00:00
efcceaf2c3 enforce non-native widget theme 2021-06-15 09:55:42 +00:00
9018577a3e v1.4 ()
- add -s parameter to start immediately / skip prompt / run non-interactive

This is useful if the user wants to automate the process of updating the user.js and cleaning prefs.

- fQuit: error messages to stderr
- fFF_check: info msg to stderr

Better support for suppressing/redirecting stdout while still showing any error messages in the console, useful for example with `prefsCleaner.sh -s >/dev/null`
2021-06-07 11:18:40 +00:00
6968b9a369 v3.2 - proper fix for the diff issue
- re-arrange the match patterns to fix the remaining issue of dropping lines after the 9999 block
- make it work on Mac too
- use `|` where possible so we don't need to escape the forward-slashes. That saves a few bytes and makes the pattern easier to read
2021-06-06 21:30:14 +00:00
ada31d4f50 v3.1 - (mostly) fix diff functionality
see  

this should fix the issue that "All prefs after a multi-line comment declaration, on a single line, are deleted with the remove_comments function from the updater."
2021-06-06 18:01:56 +00:00
d973e11714 add instagram word, closes 2021-06-05 17:36:56 +00:00
b6d7b2bff5 RFP info tweak 2021-06-01 11:02:30 +00:00
74f804a056 1243: more dead flash 2021-05-25 18:19:22 +00:00
f0b5e3649d tidy 2021-05-25 17:46:45 +00:00
9cc132e69d security.ssl.enable_ocsp_stapling
default true since FF26
2021-05-25 17:32:07 +00:00
9419e2faab remove 1210
been default true since FF26 - thanks earthlng
2021-05-25 17:30:40 +00:00
0566ded651 fixup, closes 2021-05-09 17:52:38 +00:00
ba9b3c217b tweak 4600s: closes 2021-05-08 14:45:32 +00:00
79c5539edb goodbye flash
The prefs still exist, but won't do anything since most of the NPAPI code has been removed
2021-05-05 16:41:43 +00:00
cfd7cd01d1 cleanup 0500s,
- they all have on/off switches
- dxr no longer exists: update URL
- don't recommend users delete files
   - saves two lines
   - they poses zero threat (they have prefs)
   - deleting them can causes unwanted console errors/noise
2021-04-25 11:18:39 +00:00
da9f912862 2620: disable pdfjs scripting, v88 final 2021-04-23 14:25:54 +00:00
9930cfbc07 0102: add setup tag 2021-04-17 07:12:20 +00:00
7738e320d5 RFP & Presentation API 2021-04-15 07:10:54 +00:00
9b8735a87a webgl.min_capability_mode 2021-04-08 01:21:14 +00:00
6c10e03ce5 2012: remove webgl.min_capability_mode
as promised in 4596d721e6
2021-04-08 01:19:42 +00:00
7ad3bb9e61 0702: use a [STATS] tag 2021-04-07 09:44:24 +00:00
5dcf639d33 oophs .. and start 88-alpha 2021-04-07 09:36:56 +00:00
2da3b0192f update HTTP2 stats 2021-04-07 09:36:01 +00:00
ada8158caf v87 2021-04-04 20:33:23 +00:00
2071939c5e use [TOR] tags, add 1247
not that we recommend using tor over firefox: but at least the info is there for fiddlers
2021-04-04 14:21:24 +00:00
f082278217 1607: save one line and some bytes
and make it even MOAR clear we do NOT support tor over firefox
2021-04-04 14:15:53 +00:00
abe37add6e save some overrides, closes
I do not think anyone will bemoan these four "personal" choices
2021-04-04 12:54:17 +00:00
bc07ca94c0 1830: add [TEST] 2021-04-04 12:37:17 +00:00
728c962684 2402: potential clipboard leak fixed in FF89+
Thanks @gwarser for testing, creating the bugzilla, being patient, and confirming the fix
2021-04-04 12:01:49 +00:00
ca99add006 turn ETP on everywhere
It literally cannot hurt [1], and makes it easier for users to use custom mode with TCP/dFPI. Turning on socialtracking helps gain parity with strict mode

[1] gorhill: https://old.reddit.com/r/firefox/comments/l7xetb/network_priority_for_firefoxs_enhanced_tracking/gl9rn9n/
> All extensions and ETP work in parallel, they all inspect network requests and all make the decision to block or not, hence if they all decide to block, they will all report that they block something. ETP is a bit different than normal extension in that it will give precedence to an extension trying to redirect to a local resource, this ensures ETP works harmoniously with normal extensions.
> 
> Once something is not blocked, it then goes through a DNS query, and the browser waits for the response.
> 
> I will add examples of how ETP + multiple blocker extensions work together when dealing with a network request; let's say "A" and "B" are two different blockers:
> 
>   - ETP=block, A=allow, B=allow: result=block
>   - ETP=allow, A=block, B=allow: result=block
>   - ETP=allow, A=allow, B=redirect: result=redirect
>   - ETP=allow, A=block, B=redirect: result=block
>   - ETP=block, A=allow, B=redirect: result=redirect
> 
> So as you can see, ETP is a bit different than a normal extension in that it won't prevent redirection from happening if ever a network request is redirected by one of the normal extension.
2021-04-04 11:49:07 +00:00
f771027138 2720 was removed in FF72
https://bugzilla.mozilla.org/1488583
2021-04-04 11:18:54 +00:00
8f1c0044b9 2701: add cookie behavior 5 2021-04-04 11:07:39 +00:00
87cd828b5b browser.send_pings.require_same_host
redundant/defense-in-depth pref for `browser.send_pings` which is still at default false after six years of watching it (false is what we want)
2021-04-03 14:25:46 +00:00
46ccd9f654 cleanup 0600s
three prefs are default since at least 78, and one pref is redundant for a pref that has been at our default since it was added
2021-04-03 14:20:39 +00:00
b1927f9de1 1607 make inactive
Useless, since Firefox doesn't use Tor (and which we don't recommend). It was added for the info factor.
2021-03-27 18:42:52 +00:00
b592e0e592 87 deprecated
It is simpler to leave the PointerEvent pref where it is, until ESR78 is EOL
- FF87+ users who use RFP Alts simply add a dead pref, no harm
- This way ESR78 users don't have to worry about extra char flipping: it's the same as before: 1 flip for ESR, 1 flip for RFP Alts
2021-03-27 07:49:14 +00:00
3b6cd93749 1606: default Referrer Policy default 2021-03-27 07:32:19 +00:00
3a24c01f03 0518: enforce no Web Compat Reporter
only stable is false, at the time of writing. but enforcing this for all channels is good, so no-one ends up wasting mozilla resources reporting a compat problem when they've got 200 odd prefs flipped
2021-03-17 14:01:16 +00:00
b7c80841a9 tweak defaults ()
- don't differentiate between channels
- both can be made inactive
   - webcompat requires user action: and I don't see this as a bad thing to have in non-stable
   - unsubmitted crashReports on Nightly is probably already covered by killing the URL, so no big deal
2021-03-14 11:21:13 +00:00
95645f59a3 Add files via upload 2021-03-11 14:06:38 +00:00
9138e342fd misc ()
- 0000: remove old XUL info, dropped in FF73+
- 0201: save 3 chars
- 0350: add default status for unsubmittedCheck
- 0351: change to enforce: has been default false going back to at least FF60, including current Beta/Dev/Nightly
   - along with 0602 `network.dns.disablePrefetchFromHTTPS` and 0603 `network.predictor.enable-prefetch`, I considered making them inactive, but decided it was good to leave them active for non-stable users just in case they get flipped
- 0515: add default status
- 0850c: remove info: out of date: doesn't work lilke that anymore and can't be assed figuring it out what with megabar and urlbar2 changes
- 0871: make inactive: default false since at least FF60
   - no need to enforce for non-stable in case it is flipped. It's a pretty minor shoulder-surfer privacy issue and the previews are small. If you're not sure what this pref does. On false you get one tab shown, on true you get as many as can fit across your screen. I squeezed in 15, and after that it became a list
- fixup `***/`
- shave off six lines and almost 400 bytes for you bastards
2021-03-10 00:06:30 +00:00
692ed70ea9 remove maintenance of this comment 2021-03-08 01:49:21 +00:00
3430507ae4 v3.0 - improve readIniFile() ()
- grep -c equals grep | wc -l
- make output prettier
- work with variable instead of temporary file

+ a few minor changes/cleanup
2021-03-07 13:29:33 +00:00
844f3ce9c8 tidy 2021-03-05 10:15:26 +00:00
03ffb90186 start 87-alpha, also fixes
make all inactive permissions.default = same, blocked
2021-03-02 20:02:41 +00:00
5f9bb59b95 86 final 2021-02-28 20:49:57 +00:00
7163efdd1e 1825: inactive: it is redundant, fixes 2021-02-28 15:57:27 +00:00
65fb24ff1b layout.css.visited_links_enabled
added back to the user.js in 612cfbf313
2021-02-27 21:20:00 +00:00
612cfbf313 0805: re-add visited links
It can still be used to mitigate social engineering attacks (e.g. using visibility and user clicks), and advanced/targeted scripts
2021-02-27 21:18:17 +00:00
4596d721e6 2012: make webgl.min_capability_mode inactive
- This is too minimal to be of any use, breaks too much (e.g. zoom video)
- Tor browser stopped flipping this (I *think*) about 5 years ago: it certainly hasn't been used in ESR60+ based TB builds, I checked
- we already disable webgl, so making this inactive removes yet another pref users need to flip/troubleshoot
- I will leave it in the user js for a few releases so prefsCleaner will pick it up
2021-02-26 11:39:52 +00:00
911206eed5 5000s: disable ctrl-q quit shortcut FF87+
https://bugzilla.mozilla.org/show_bug.cgi?id=52821 .. 21 years, old enough to drink and vote
2021-02-25 01:22:08 +00:00
cb5cdca99d update adding site exceptions
- https://bugzilla.mozilla.org/show_bug.cgi?id=1692553
- also HoM is not Page Info
2021-02-24 22:10:29 +00:00
e54ae46537 1204: ssl session ids inactive, closes 2021-02-24 15:11:59 +00:00
7c978d4e70 0708: FTP default FF88+
https://bugzilla.mozilla.org/show_bug.cgi?id=1691890
2021-02-22 20:05:25 +00:00
d905b4387d deprecated: put FF86 items in the right place 2021-02-21 20:52:20 +00:00
c31c825a74 2212: popup events, fixes DDG
https://bugzilla.mozilla.org/show_bug.cgi?id=1686045
2021-02-18 15:50:37 +00:00
6505a9fefd FF86 deprecated 2021-02-18 15:30:58 +00:00
de74f812ee 2012: webgl default FF86+ 2021-02-18 15:00:06 +00:00
82bb3f987d 2604, closes 2021-02-08 07:20:06 +00:00
a35a616de7 highlight 1603 (cross origin referer), fixes 1108
especially since we recently hardened it: also added it to the few things highlighted in the wiki
2021-02-04 07:19:28 +00:00
ecf99bf9e7 0603: add default value
AFAICT:  false 48-51: true 52-55.0.1/ESR52.1: false ever since
2021-02-03 16:45:34 +00:00
cfaf354fe3 oophs, better start 86-alpha 2021-02-02 04:09:50 +00:00
0b51e98d91 media.gmp-widevinecdm.visible, see 2021-02-01 17:25:00 +00:00
fa51251235 remove widevine vis pref, see
- It is controlled in both runtime and via user.js by the state of `media.eme.enabled`. Also, who cares about the vis of a ui option
- note, there is no need to add this to the removed scratchpad list
2021-02-01 17:17:16 +00:00
21fcd0bd35 update xul/xhtml config info
- the XUL version is also pre FF71
- the XHTML version was removed in FF87+
2021-02-01 05:14:46 +00:00
96d558dd0c add window.name test 2021-01-31 07:28:05 +00:00
b6e8dcab81 fixup spelling mistake 2021-01-30 00:28:28 +00:00
fa78c53114 v85 2021-01-28 03:13:36 +00:00
2f6b14ab6e 1201: add error code, fixes 2021-01-26 19:58:57 +00:00
2dd455ef83 network.http.redirection-limit, fixes 2021-01-26 19:39:33 +00:00
306610da8e remove 2614, see 2021-01-26 19:37:54 +00:00
59ac1727f7 v4.14 - check for TLS1.2 () 2021-01-22 12:15:12 +00:00
c974b3252d move [STATS] from 1270 to 1201, 2021-01-22 12:10:15 +00:00
480933484f 2624: windows.name default FF86+
https://bugzilla.mozilla.org/1685089
2021-01-21 11:17:16 +00:00
0cbd8a13a3 Update updater.bat 2021-01-19 17:17:03 +00:00
ae6c76fe54 v4.13 - fix TLS issue with PowerShell 2021-01-19 17:07:39 +00:00
1f098f2eaf start 85-alpha, also fix 2021-01-17 23:04:37 +00:00
11977e7017 v2.4 - add strlen check for prefs.js
cmd.exe has a command line length limit of 8192 characters. Abort if prefs.js contains strings that would get dropped while recreating the new prefs.js.
2021-01-17 15:27:50 +00:00
27dd6aa62d 84 final 2021-01-05 13:13:52 +00:00
c570e4fdbd Update troubleshooter.js 2020-12-30 15:12:07 +00:00
da58f84fa6 Update troubleshooter.js 2020-12-30 15:06:49 +00:00
755a45505f snippets providers
`browser.newtabpage.activity-stream.asrouter.providers.snippets`

These (which landed in FF64 with snippets above) are not in the user.js, so why bother with the snippet one
- `browser.newtabpage.activity-stream.asrouter.providers.cfr`
- `browser.newtabpage.activity-stream.asrouter.providers.onboarding`

also these aren't in the user.js
- `browser.newtabpage.activity-stream.asrouter.providers.cfr-fxa`
- `browser.newtabpage.activity-stream.asrouter.providers.message-groups`
- `browser.newtabpage.activity-stream.asrouter.providers.messaging-experiments`
- `browser.newtabpage.activity-stream.asrouter.providers.whats-new-panel`

There are no privacy concerns here. At the end of the day, what Firefox connects to and sends is E2EE and only used locally in non-web content: and you have other prefs and a UI to disable them from being displayed
2020-12-30 10:25:26 +00:00
9d74cb9526 remove useless snippet pref 2020-12-30 10:17:35 +00:00
8c9d0bbe72 harden cross-domain referers, closes 2020-12-27 05:01:33 +00:00
0152b38b8b add override recipes link to readme steps 2020-12-25 16:06:32 +00:00
e6cf90146a add override recipes 2020-12-25 15:55:01 +00:00
63d1258f2e updater.sh v2.9
rollout the latest changes
2020-12-25 14:03:40 +00:00
46bab27f94 updater.sh: support custom script names ()
thanks @ray851107
2020-12-25 14:02:35 +00:00
2cfbba1472 search-to-tab: FF85+ 2020-12-19 07:23:13 +00:00
c980bda695 Update troubleshooter.js
oops
2020-12-16 14:43:46 +00:00
feaa1c3e99 prefs update
`browser.storageManager.enabled` -- removed in FF61 (1428306)
`security.csp.experimentalEnabled` -- removed in FF68 (1386214)
`gfx.downloadable_fonts.woff2.enabled` -- removed in FF69 (1556991)
`plugin.sessionPermissionNow.intervalInMinutes` -- removed in FF70 (1581664)
`plugin.defaultXpi.state` -- removed in FF72 (1596090)
`geo.wifi.uri` -- renamed to `geo.provider.network.url` in FF74 (1613627)
`browser.tabs.remote.allowLinkedWebInFileUriProcess` -- removed in FF77 (1603007)
2020-12-16 14:40:42 +00:00
aa1c2145bb layout.css.visited_links_enabled 2020-12-09 09:30:21 +00:00
335ee84540 remove layout.css.visited_links_enabled,
This no longer has any affect since FF77+: see https://bugzilla.mozilla.org/1632765
2020-12-09 09:26:50 +00:00
5c37d50f4e tidy
- remove useless `see` word for reference links
- fixup 0701
   - "do not play nice" is not measurable
   - don't reference to self as a source: people can just search "VPN leak Ipv6" or something
2020-12-07 19:34:14 +00:00
77abf35761 tidy
- shrink and remove outdated info from section 0300 header
- combine some bugzillas
- drop some references
   - 1647829 for HTTPS-Only mode
   - hardware metrics: not going to implicitly encourage users to use this pref or tell them what sizes to use
- update [STATS]
   - also remove TLS [STATS].. stats on TLS 1.0 and 1.1 are irrelevant: the default is now TLS 1.2+
- single CRLite reference for all blog articles
- save 588 bytes so all you bastards can theoretically load Firefox just that tiny bit faster
2020-12-06 21:09:07 +00:00
fa85c9da5b fixup double word 2020-11-23 10:46:30 +00:00
cf53982086 1244: CRLite, closes 2020-11-22 18:15:25 +00:00
91cbc1e09a HTTPS-Only mode, closes 2020-11-22 17:59:44 +00:00
a7e4268d8b 2730 appCache, closes 2020-11-22 17:25:33 +00:00
699eacf1fd add FPI scheme, closes () 2020-11-22 17:21:31 +00:00
0189438e46 start 84-alpha 2020-11-22 17:11:31 +00:00
94712f59a3 83 final 2020-11-22 17:05:34 +00:00
ef93a754ce warnings always come after notes 2020-11-21 01:49:19 +00:00
c6ddda1aa3 Update troubleshooter.js
- add `privacy.window.name.update.enabled`
- remove `media.autoplay.enabled` (removed in FF63)
- remove `dom.indexedDB.enabled` (removed in FF72)
2020-11-17 19:17:59 +00:00
ccbca41e2d start 83 alpha, fixup 1244 setting info
`browser.preferences.exposeHTTPSOnly` is now default true
2020-11-13 01:03:29 +00:00
5b0d173078 82 final 2020-11-13 00:55:45 +00:00
d6186819f4 domIntersectionObserver
it was removed after 81-beta was released
2020-11-11 18:42:29 +00:00
ea0eb85404 82-beta 2020-11-11 18:23:00 +00:00
8dc43cfdc2 RFP 82+ changes
Note
 - this is not the same as 2517 which disables the API
 - RFP does not determine what is supported or not supported: so that entropy remains
 - with or without RFP, if the media config is not supported it returns false,false (so there is nothing to spoof here)
2020-11-11 18:20:13 +00:00
f7bee988de 0517: add creditCards.available / defense-in-depth
see https://github.com/arkenfox/user.js/issues/1038#issuecomment-713643850
2020-11-11 18:08:06 +00:00
f2fe7f02b0 add 2624: window.name protection, fixes 2020-11-11 16:59:27 +00:00
accef19af4 add LSNG, fixes 2020-11-11 16:27:43 +00:00
910d7004c6 release info, fixes
now we have somewhere to add things like HTTPS-Only Mode, appCache, secure downloads when we make changes that impact ESR
2020-11-11 16:12:57 +00:00
07cccd5386 remove 4003: partition, see () 2020-11-02 17:05:40 +00:00
ac52886ea8 2422 WASM, add reason for disabling, fixes () 2020-10-26 10:37:49 +00:00
c45780d79b 0701 PHP localhost + IPv6, fixes 2020-10-26 10:34:54 +00:00
e14732aad3 2031: better reference: closes () 2020-10-23 23:29:31 +00:00
26d4768447 add media.autoplay.blocking_policy 2020-10-21 13:44:21 +00:00
9f99885272 clean up acknowledgments 2020-10-20 12:57:00 +00:00
0adfddd1e2 misc ()
* misc

- cleanup of old release notation in comments: e.g. if it's not applicable to ESR78+
- same with default version info
- simplify and save bytes on section 4700
- update 4500 header
  - and unify the message about using extensions as counterproductive
- letterboxing
   - provide info on stepped ranged (and drop crap about FF67)
   - don't judge users who dislike seeing margins (I don't like them either, but I force my window to exact dimensions and stay there)
- screenshots uploading was disabled in FF67+ : [67 release notes](https://www.mozilla.org/en-US/firefox/67.0/releasenotes/)
   - the pref is still there (default false) but so far I'm 99% sure this pref now does anything
   - I will add it to the scatchpad script if this change sticks

* simplify 4500 RFP, see 

* update removed script

* tidy readme, see 

- also put readme before releases

* RIP FX Site Compat

* clean out RFP Alts info: the information is redundant: it's already in the readme
2020-10-20 11:58:20 +00:00
f591a8adf8 82-alpha, 82 deprecated, remove old deprecated 2020-10-13 14:12:53 +00:00
0e10a820d9 81 final 2020-10-13 14:01:41 +00:00
c90341dded 1244: HTTPS-Only mode update () 2020-10-07 12:10:24 +00:00
d5ccf4693b fixup font prefs vs RFP, fixes ()
- make 1401 inactive: it affects RFP's FPing
- remove old warning/setup-web: we do not care about documenting breakage or FPing risks when we have a warning and they are inactive. If someone uses them, that's on them
- new warnings
2020-10-06 13:43:51 +00:00
e89f9a5d89 dom.IntersectionObserver.enabled
commit: a56ba85936
issue: 
2020-10-02 08:36:15 +00:00
a56ba85936 remove dom.IntersectionObserver.enabled
- this was made inactive in v68
- since at least FF79, when active as false, it breaks the web and browser consoles
- it breaks websites
- it breaks extensions: e.g. uBO panel functionality
- it does nothing to mitigate possible fingerprinting (which was why it was initially added as a concern) - i.e the API only provided a standardized method, it does not stop previous/earlier workarounds
2020-10-02 08:33:27 +00:00
421f1e361c [ ] are for for prefs only 2020-09-29 06:10:57 +00:00
2391874e04 UI setting change in 81
https://bugzilla.mozilla.org/show_bug.cgi?id=1613468
2020-09-28 19:04:08 +00:00
4779ea7850 remove CSP issue, closes 2020-09-27 00:47:09 +00:00
c367beabe3 81-beta 2020-09-23 12:20:59 +00:00
e1d336a178 standardize some error codes
* 0 : successful termination
* 2 : command line syntax error
* 1 : catchall for general errors

Plus a few text improvements based on unmerged PR 4fbb2be98d
2020-09-15 13:36:39 +00:00
ee3e5f0186 v4.12: arkenfox 2020-09-15 12:04:54 +00:00
42b7650d42 v2.8: arkenfox 2020-09-15 11:58:52 +00:00
f61d4a0d38 Update prefsCleaner.sh 2020-09-15 11:55:28 +00:00
7fe9784bf8 we no longer have github pages 2020-09-15 06:18:54 +00:00
ed05c64482 we no longer have github pages 2020-09-15 06:18:33 +00:00
16c3658040 align look with TZP 2020-09-15 06:17:44 +00:00
515d6ff874 v2.3: update repo name 2020-09-15 06:11:35 +00:00
fc65052286 migration: cleanup code references 2020-09-15 06:07:32 +00:00
6a107d4d2f migration: cleanup code references 2020-09-15 06:06:32 +00:00
eff4b74130 migration: cleanup code references 2020-09-15 06:05:33 +00:00
2532ddcc18 update name 2020-09-15 05:59:51 +00:00
44e22835c1 update name 2020-09-15 05:58:39 +00:00
1f545312fd update names + links 2020-09-15 05:57:30 +00:00
637e5964db update links 2020-09-15 05:56:00 +00:00
26bca612d7 rename as arkenfox 2020-09-15 05:54:22 +00:00
6fdda5fb62 rename as arkenfox 2020-09-15 05:53:09 +00:00
ed5b158777 Rename ghacks-clear-RFP-alternatives.js to arkenfox-clear-RFP-alternatives.js 2020-09-15 05:52:28 +00:00
4c4270f1d7 migration changes 2020-09-15 04:33:50 +00:00
af51631597 Update LICENSE.txt 2020-09-15 04:19:03 +00:00
ae0c980d25 migration 2020-09-15 04:15:03 +00:00
3e4c56cf27 arkenfox support
also fixes mixed line endings
2020-09-13 12:16:21 +00:00
18112f9ae8 last F time :) update TZP links 2020-09-11 21:55:12 +00:00
c8eee094e0 update links 2020-09-11 03:23:55 +00:00
78a7c194eb update ref links 2020-09-10 07:33:50 +00:00
f606c8b866 2203 values
see https://bugzilla.mozilla.org/show_bug.cgi?id=1663500 where they reverted https://bugzilla.mozilla.org/show_bug.cgi?id=1661643 where they said value 1 didn't do anything - all changes in FF82, so nothing to see here folks ... move along
2020-09-08 23:49:22 +00:00
9c98972d14 misc2 ()
* forceMediaMemoryCache breakage

* add back ESR68-EOL for prefsCleaner users
2020-09-05 15:42:34 +00:00
75a03df0f7 miscellaneous ()
- less active prefs
   - now that ESR68 is EOL, at least a whopping two (0602, 1273)
   - also I don't know when the default changed - another whopping whole one (1240)
   - and where we do enforce/reset a pref to default, lets say that
   - this is not a definitive list, sing out if there is anything else
- IPv6 info
   - especially for Iron Heart who likes to claim that this pref breaks 5% of sites
- cleanup of settings tags now we only care abut ESR78+
2020-09-05 15:20:46 +00:00
76019e6fbe ESR78 unhidden prefs
also, the note about WebExt + SVG only applies to people using outdated versions .. so that can go too
2020-09-03 13:27:25 +00:00
3c2bd930c3 start 81-alpha, EOL for ESR68 2020-09-03 13:11:16 +00:00
ed993d5502 80 final 2020-09-03 13:04:31 +00:00
22d2d702be 1409: obsolete RFP mention 2020-09-03 13:02:09 +00:00
8dacf6e91f fix typo () 2020-08-31 21:47:57 +00:00
fbe1d48fe2 2203: open_newwindow values
- FYI: https://bugzilla.mozilla.org/show_bug.cgi?id=1661643
- https://hg.mozilla.org/integration/autoland/rev/12d62b074178
2020-08-31 19:49:00 +00:00
5fd7f6de7e 80-alpha 2020-08-28 18:27:20 +00:00
592b959c24 Updater.sh rework 2 ()
* rework DOWNLOAD_METHOD, download_file, open_file

* remove legacy command leftover line

* return empty string if download fails and return/exit if this happens and show error message

* fix IFS var typo

* bump version

* add quotes

Co-authored-by: TotallyLeGIT <bbkqx24kxlgvgbss@mailban.de>
2020-08-28 10:51:15 +00:00
c6f53c8768 2201 deprecated (dead prefs removed in 82), () 2020-08-26 11:28:47 +00:00
38d772e4c8 https-only mode updates () 2020-08-25 14:59:41 +00:00
cfce521919 1409: RFP changes in FF81+ () 2020-08-23 14:37:18 +00:00
a5ab3e23d6 Update README.md 2020-08-22 22:16:27 +00:00
b3eee6c9fd improve readability, remove lots of unnecessary echo commands, remove legacy arguments ()
Co-authored-by: TotallyLeGIT <bbkqx24kxlgvgbss@mailban.de>
2020-08-22 12:07:13 +00:00
8d6d17d46b 1244: HTTPS-only mode: FF80+ site exceptions
The option is not shown if https-only-mode is not being applied. I tested with `http://asmjs.org/` since it doesn't redirect/upgrade to secure.
2020-08-21 21:05:08 +00:00
9a37e1340c 0905: add reference, 2020-08-20 17:18:22 +00:00
f1e0203ef4 0105b, cleaner value, see 2020-08-15 01:56:01 +00:00
726d5bde30 0105b: stop console error, closes 2020-08-14 14:12:28 +00:00
f9f0fffd27 Update README.md 2020-08-14 09:01:14 +00:00
93840ca181 0602 not hidden in ESR78 2020-08-13 15:37:25 +00:00
99aa5af356 password master->primary 2020-08-13 15:34:26 +00:00
0358fdac8b 80-alpha 2020-08-13 15:32:45 +00:00
815c3026b5 79 final 2020-08-13 15:30:36 +00:00
5ed3047b7a references cleanup 2020-08-13 15:22:38 +00:00
e16ede1cdf 79-beta 2020-08-13 14:44:27 +00:00
6905187b3e 0207/0208: region/search () 2020-08-13 04:39:38 +00:00
172118e61b RFP+Alts: fixup sequential numbering, see 2020-08-05 01:35:10 +00:00
8452edb94b 4600: see 2020-08-04 10:25:29 +00:00
0f6957bbd4 4600: add missing version section 2020-08-04 10:18:29 +00:00
8c2bcc0352 1007: bump to 64mb, see 2020-08-03 22:50:58 +00:00
bc832575d8 1003: kibibytes 2020-08-03 14:52:21 +00:00
c4b7e07691 4500: site partitioning 2020-08-02 01:47:48 +00:00
58fb1db838 HTTPS-Only Mode UI 2020-08-02 01:27:30 +00:00
2809854802 font visibility / RFP () 2020-08-01 11:03:17 +00:00
091a71aade browser.urlbar.usepreloadedtopurls.enabled 2020-07-29 02:22:09 +00:00
117ab133b1 remove 0809
not deprecated, just hidden: default is false anyway
2020-07-29 02:19:20 +00:00
c4a06c4689 missing comma 2020-07-23 12:23:14 +00:00
0d27689c64 update to ESR78
and this time add the file extension
2020-07-23 12:22:20 +00:00
771e57480a Delete ghacks-clear-RFP-alternatives 2020-07-23 12:21:10 +00:00
f8fd03482d 79 deprecated 2020-07-23 11:19:49 +00:00
10cc1224d0 Create ghacks-clear-removed.js 2020-07-23 11:00:23 +00:00
52926cca7a Delete ghacks-clear-[removed].js 2020-07-23 10:59:19 +00:00
be64819ce7 update to ESR78 2020-07-23 10:58:22 +00:00
24c228df92 update to ESR78 2020-07-23 10:57:12 +00:00
892b3d9d69 Delete ghacks-clear-FF68inclusive-[deprecated].js 2020-07-23 10:53:38 +00:00
df21798b81 Delete ghacks-clear-FF68inclusive-[RFP-alternatives].js 2020-07-23 10:53:25 +00:00
46d03279d3 79 start, fixup 2429 default info 2020-07-22 12:35:13 +00:00
fe0af3bb34 remove 0709 duplicate, 78 final 2020-07-21 10:40:01 +00:00
84997386c1 78-beta 2020-07-20 05:24:18 +00:00
1a389c0214 dnsResolveSingleWordsAfterSearch () 2020-07-10 10:09:13 +00:00
d0060fed3c 2031: use exceptions if you need to, 2020-07-08 13:18:38 +00:00
3d18af19e3 various, ()
Co-authored-by: rusty-snake
2020-07-05 14:02:25 +00:00
b5b04454e0 0850a search keywords fixup 2020-07-01 03:46:52 +00:00
618f7bed3f 0850a: add top sites FF78+ 2020-06-29 15:49:11 +00:00
488a825626 update weak ciphers/tests etc, closes ()
- adds the new tests including the non-JS JA3

Co-authored-by: rusty-snake <41237666+rusty-snake@users.noreply.github.com>
Co-authored-by: earthlng <earthlng@users.noreply.github.com>
2020-06-28 15:48:13 +00:00
aaf6cb33d7 4617 restart
- at least for disabling chrome animations
2020-06-27 12:37:32 +00:00
77ecef8be3 78 deprecated, add 2032 () 2020-06-27 12:16:57 +00:00
4be0a80720 update trac tor tickets ()
and some other minor tweaks
2020-06-24 17:26:25 +00:00
f573200aa8 ciphers in ESR78
[1496639](https://bugzilla.mozilla.org/show_bug.cgi?id=1496639)
2020-06-18 02:29:54 +00:00
48f258ff53 start 78-alpha 2020-06-14 10:28:32 +00:00
b9100488cb 77 final 2020-06-14 10:26:10 +00:00
9d78e050ee 77-beta 2020-06-12 17:39:28 +00:00
b07cf1f03d remove extra line from last commit, save one byte 2020-06-05 03:10:09 +00:00
683ef63b37 RFP alts: prefers-reduced-motion 2020-06-05 03:08:16 +00:00
05580f5e99 0709 hotfix, , 2020-06-02 20:48:41 +00:00
ecc62554e5 2608: remote debugging: default value, closes 2020-06-01 15:27:38 +00:00
f6e6de8444 77 deprecated 2020-05-29 12:41:59 +00:00
f69d92e6dd 1244: https upgrade local 2020-05-29 12:23:17 +00:00
3edc48da56 fix updater.sh when dealing with multiple overrides ()
thanks @mloberg !
2020-05-26 11:54:55 +00:00
868882ae33 start 77-alpha 2020-05-24 18:11:55 +00:00
ff9bf76e52 76 final, save some bytes in RFP section 2020-05-24 18:09:46 +00:00
4bc5b89cfe 4500: RFP changes 78+ re canvas 2020-05-15 23:18:11 +00:00
bb1e5bfd54 76-beta 2020-05-07 14:56:49 +00:00
27d72eda9e 1244: https-only-mode 2020-05-07 06:20:10 +00:00
07117c65c1 RFP spoofs FF78+ 2020-05-07 05:13:19 +00:00
919d4bfe96 godamnit, also move related reference 2020-05-04 10:52:25 +00:00
e38e253c25 oophs, forgot deprecation source 2020-05-04 10:49:07 +00:00
14aaec71fb 76 deprecated 2020-05-04 07:34:23 +00:00
c0780df24d 1401: PDF breakage, closes 2020-04-30 21:50:50 +00:00
0ea1605642 start 76-alpha, 2605 default 2020-04-30 18:52:27 +00:00
bd384622db Update troubleshooter.js ()
extensions.blocklist.pingCountTotal is not used anymore in FF76+
2020-04-29 12:00:10 +00:00
3366e0aa16 75 final 2020-04-23 08:52:48 +00:00
W
dff5bb478a 0211: add possible breakage for CJK input methods 2020-04-16 04:04:13 +00:00
d455c500a6 75-beta 2020-04-15 14:44:14 +00:00
b90e72370c 1007 fixup what FF75+ applies to 2020-04-14 00:28:00 +00:00
dd162d9f48 1007 fixups 2020-04-14 00:16:03 +00:00
d7c276b3fe 2402: clipboardevents -> inactive, 2020-04-13 06:17:54 +00:00
394b691599 2421: grammar fix 2020-04-13 04:55:10 +00:00
ba83c555cc geo default search engines
browser.search.geoip.url is deprecated in 75, the prefs are only used on first run, and we don't mess with search engines as that is a user choice
2020-04-12 18:10:34 +00:00
b695468c7e remove 0205 2020-04-12 18:07:12 +00:00
deae6e14f9 75 deprecated 2020-04-12 16:38:12 +00:00
97c5378e52 1007: *forceMediaMemoryCache PB mode 2020-04-12 16:23:48 +00:00
d2dd0c2ab4 tls stats update
- Go to https://telemetry.mozilla.org/
- click `measurement dashboard`
- select `SSL_HANDSHAKE_VERSION`

I looked at Nightly 75 (0.26 and 0.01) and Nightly 76 (0.2 and 0)
2020-04-11 02:51:17 +00:00
8c7149c6a5 2421: Ion/JIT trusted principals, closes 2020-04-09 06:07:13 +00:00
d2da48c215 revert top sites, see 2020-04-08 08:01:07 +00:00
7e71b6663c 75-alpha, add 105e, closes 2020-04-08 07:12:14 +00:00
94c83519f2 74 final 2020-04-08 07:08:36 +00:00
e7d20867cb 2623 delegation 2421 ion/jit tweak 2020-04-06 00:39:52 +00:00
55ae994972 2421 fixup Ion/Jit note 2020-03-28 13:18:34 +00:00
f0945743b7 2662: clarify 4503 needed, 2020-03-27 16:20:41 +00:00
ee35d7c70d 2421: ion/jit and extensions note 2020-03-27 12:44:06 +00:00
fe1b03bd2a tls downgrades -> session only 2020-03-27 12:36:16 +00:00
187692af66 enforce disabled system + prefixed colors 2020-03-19 11:36:03 +00:00
b6e2a3f64f one of the 2012 webgl prefs deprecated 2020-03-12 14:44:14 +00:00
6f7e09ad43 1704 deprecated, add 1703 2020-03-12 05:23:57 +00:00
4ddf60cf32 0203: make sure users know these are 74+ prefs 2020-03-12 03:56:13 +00:00
24777c9ac2 FF74: 0203 updates () 2020-03-12 03:44:52 +00:00
615ebeda2f start 74-alpha 2020-03-12 03:43:31 +00:00
4139630635 73 final 2020-03-12 03:37:46 +00:00
a542701ba5 Update troubleshooting-help.md 2020-02-25 00:21:42 +00:00
e67a0c868d Update troubleshooting-help.md 2020-02-25 00:20:19 +00:00
1afd52de6e 0306: minor tweak
There is no "show more details about an addon" anymore since they moved to the new html/card layout
2020-02-22 13:56:30 +00:00
64f34f1471 73-beta 2020-02-15 12:55:59 +00:00
5f3e3b2691 VR default prompt, RFP info, start 73-alpha 2020-02-14 01:00:02 +00:00
1ce1f74494 Update user.js 2020-02-12 12:03:29 +00:00
03f558b09c nit: 0517 SETTING
we don't include `Options>` in [SETTING] lines
2020-02-10 17:12:08 +00:00
cd9fc110b0 v1.2
look for `lock` file instead of `webappsstore.sqlite-shm` to detect if firefox is running or not (with this profile)

see https://github.com/ghacksuserjs/ghacks-user.js/pull/405#issuecomment-581447586 and follow-up comments.

Thanks @atomGit for reporting the issue and @rusty-snake for confirming it.
2020-02-10 16:47:17 +00:00
7619e312de 72 final 2020-01-24 16:48:16 +00:00
5d2c5de11c fixup deprecated ESR-cycle version 2020-01-15 02:53:07 +00:00
e1022c2e72 72-beta 2020-01-14 17:38:22 +00:00
e431b324c8 FF72 deprecated 2020-01-08 02:53:25 +00:00
18ad40a5c6 systemUsesDarkTheme -> RFP Alts 2019-12-25 02:14:49 +00:00
315de066ec typo () 2019-12-24 11:49:19 +00:00
85273d0f19 0517: setting tag 2019-12-22 07:13:48 +00:00
ef293b57a7 5000s: add ui.systemUsesDarkTheme 2019-12-22 06:14:25 +00:00
79d316fd22 remove old deprecations 2019-12-19 16:37:19 +00:00
ed60588473 72-alpha start 2019-12-19 16:34:44 +00:00
07c128a190 71 final 2019-12-19 16:31:51 +00:00
5b1d56933b middlemouse.paste, see 2019-12-19 16:21:21 +00:00
34cfcedc1b 2402+2403, finally closes 2019-12-19 16:19:39 +00:00
f9146fdf24 update setting tags, minor tweaks 2019-12-18 09:46:21 +00:00
a1cdbc8324 1408 graphite, closes and 2619 puncyode 2019-12-18 07:46:44 +00:00
cd07641a9d 2701: make sure cookieBehavior is always honored ()
see 
2019-12-18 05:02:25 +00:00
9c02949e04 0000: config.xhtml in FF73+ () 2019-12-17 15:00:34 +00:00
1ef62a1036 media.block-autoplay-until-in-foreground 2019-12-12 01:24:12 +00:00
5672bc8cc8 2032 removed, 4002 inactive, closes 2019-12-12 01:21:17 +00:00
df1732745d 0308: seach engine updates: better info 2019-12-10 22:07:23 +00:00
30daf8640c FPI stuff 2019-12-09 20:18:42 +00:00
4074a37e1d 1201 + 1270 update ()
trim by a line, remove extra space, fixup on red, indicate it only applies if 1201 is false
2019-12-07 18:26:39 +00:00
97043b0ce1 71-beta 2019-12-06 12:19:21 +00:00
42ea484017 71 deprecated () 2019-12-04 14:13:49 +13:00
3f6340b69c OMG!! 2019-12-03 14:51:44 +00:00
884e84a4cb about:config warning back to the top + active () 2019-12-04 03:44:59 +13:00
560acfc94f 70 final 2019-12-03 07:31:47 +00:00
fb263f5624 favicons: 1031 better info, 1032 inactive () 2019-12-02 23:04:09 +13:00
19b392b83d 70-beta 2019-11-24 05:23:10 +00:00
2db76c95c3 1603: breaks icloud, closes 2019-11-23 16:19:09 +00:00
b6fbf77dde Create ghacks-clear-FF68inclusive-[RFP-alternatives].js 2019-11-23 03:04:14 +00:00
a4ba22e912 Delete ghacks-clear-FF60inclusive-[RFP-alternatives].js 2019-11-23 03:02:59 +00:00
163e18ce6d Create ghacks-clear-FF68inclusive-[deprecated].js 2019-11-23 02:57:26 +00:00
a13027905e Delete ghacks-clear-FF60inclusive-[deprecated].js 2019-11-23 02:56:30 +00:00
8f76d9439f 2002: add FF70 bugzilla link 2019-11-22 15:26:38 +00:00
f0980b5cb8 2002: add proxy_only_if_behind_proxy 2019-11-22 15:19:37 +00:00
450c9a9e0f simplify ciphers, closes ()
* simplify ciphers

- let's not encourage (remove options 1, 2) changing your cipher suite FP
- remove "it's quite technical ..." (everything is technical to someone), trim to one line
- add test link so users can just see that it's FP'able
- reinforce not to fuck with the cipher suite in the cipher's sub-section
2019-11-23 03:23:08 +13:00
6acfdaccbd RFP stuff 2019-11-20 04:48:15 +00:00
a0e0a2a6c9 2680 tweak 2019-11-19 16:26:14 +00:00
f67e729197 whatsNewPanel correct version 2019-11-19 06:39:08 +00:00
19526b573c 2805 note, FPI change () 2019-11-19 16:31:48 +13:00
b0221ec838 1576254 version fixup 2019-11-17 10:33:02 +00:00
a3611b7cf8 changes to prefs affecting extensions
also first word on pdfjs.disabled, to be consistent
2019-11-14 02:39:48 +00:00
bff1e84afa v1.6.0 2019-11-11 15:10:14 +00:00
1d31da40ec missing comma
thanks @sebp  - 0d57cfc44a (commitcomment-35890867)
2019-11-11 13:00:01 +00:00
0d57cfc44a about_newtab_segregation.enabled 2019-11-09 23:25:52 +00:00
0cfb2fb06d 1703: remove
default true since FF61, and ESR60 is now EOL
2019-11-09 23:23:34 +00:00
d5f297ed42 5000s: disable what's new 2019-11-08 18:06:35 +00:00
c13dbdf40d 1201 update ()
https://wiki.mozilla.org/Security:Renegotiation describes

> **the new default behaviour** that was introduced in experimental mozilla-central nightly versions on 2010-02-08

where the last step is

> - should the server (or a MITM) request **renegotiation**, Mozilla will terminate the connection with an error message

and then after talking about breakage ...

> The above defaults may break some client/server environments where a Server is still using old software and requires renegotiation.

mentions workarounds to reduce said breakage:

> In order to give such environments a way to keep using Firefox (et.al.) to connect to their vulnerable server infrastructure, the following preferences are available:

specifically talking about the first 2 prefs listed there, one allowing to specify a list of hosts "where renegotiation may be performed" and the 2nd one "completely disables the new protection mechanisms".
But both those prefs were removed in FF38, meaning that since then it's no longer possible to disable the default behaviour that is "should the server (or a MITM) request **renegotiation**, Mozilla will terminate the connection with an error message".

But all of this is about the **re**-negotiation part and not negotiation. And nowhere does it say "insecure" renegotiation, which, as I read it, means that FF will terminate the connection for any kind of **renegotiation**, safe or unsafe.

1201 controls the negotiation part:

> This pref controls the behaviour during the initial negotiation between client and server.
> If set to true, a Mozilla client will reject all connection attempts to servers that are still using the old SSL/TLS protocol and which might be vulnerable to the attack.
> Setting this preference to “true” is the only way to guarantee full protection against the attack.

I think "servers that are still using the old SSL/TLS protocol" actually means servers that **only** support the old protocols.
Servers still supporting those old protocols in addition to some new protocol versions should not be affected by this pref because FF will be able to negotiate to use one of the newer protocol versions.

Ergo lets fix the title and remove the line about renegotiation support because I think that's irrelevant.


ps. the sslpulse link is nice and I'd like to keep it somewhere but it doesn't really fit in 1201 IMO so I moved it to 1202.
2019-11-09 05:42:21 +13:00
6173104a9e re-add relevant deprecated items for ESR users ()
makes the prefsCleaner scripts useful again for users updating from ESR60 to ESR68
2019-11-09 05:30:03 +13:00
0c79b8b45b Update README.md 2019-11-08 13:46:20 +00:00
895f8d01d5 FF70+: shield studies no longer tied to FHR ()
https://bugzilla.mozilla.org/1569330
2019-11-09 02:01:33 +13:00
65dfad5c76 2701: UI changes 2019-11-06 11:37:24 +00:00
fdaf22780f Update README.md 2019-11-02 16:00:12 +00:00
16756646bb remove DoH, closes 2019-10-31 09:49:12 +00:00
e4f80225d8 FF72: FPI & IPv6 2019-10-28 12:12:52 +00:00
67eec9c85c pbmode insecure text/icon
see `1273`
- we already make **all** windows do this (which overrides the pb mode setting), and these were inactive
- in FF70+ the icon pref (for PB mode and all windows) is now default true
2019-10-27 04:50:59 +00:00
539750d2f2 FF70 hidden/default changes 2019-10-27 04:41:27 +00:00
d91226ed55 tweakin' 2019-10-20 23:59:16 +00:00
301fcd059d 1003: capacity no longer hidden 2019-10-20 23:36:48 +00:00
1cc9a08a18 remove ESR60.x deprecated
These are archived in 
2019-10-20 22:40:53 +00:00
5d1857ddd8 start 70 commits 2019-10-20 22:32:37 +00:00
226af6f679 69 final 2019-10-20 22:20:50 +00:00
7f2c92f654 webgl.dxgl.enabled 2019-10-15 09:28:52 +00:00
5b82afd5bd webgl.dxgl.enabled, closes 2019-10-15 09:27:44 +00:00
d7b1877a1f browser.sessionhistory.max_entries see 2019-10-14 01:14:50 +00:00
1b6239eab8 remove 0804, closes
if anyone can show me how this stops history leaks, then I'll put it back with a note saying it's been broken since FF61
2019-10-14 01:13:27 +00:00
ad0187122d some SB were reinstated, closes 2019-10-07 16:20:03 +00:00
624e50faac replace ` with ' 2019-10-05 17:51:34 +00:00
a9e9392172 add some SB back, see 2019-10-05 17:47:25 +00:00
201210111e char fix 2019-10-05 15:12:21 +00:00
53f8578749 see 2019-10-05 15:09:19 +00:00
dc4d9e4dae revamp 0200s (), closes
- split geo related vs language/locale related
- rip out intl.locale.requested
- rip out intl.regional_prefs.use_os_locales
- add intl.charset.fallback.override
2019-10-06 04:04:41 +13:00
e1b0eae740 goodbye http and other stuff ()
* goodbye http and other stuff

* dead link

* put back asmjs [1] ref

* 0805 test

* typo

* 1222 refs

* 1222 FF version

FYI: https://bugzilla.mozilla.org/show_bug.cgi?id=629558

* 2684: security delay ref

* ESR stuff

* ping ref

* 2684 ref

* 0606: give the standard it's correct name

https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing

* 0805 test instructions

* tweakin'
2019-09-21 16:20:10 +00:00
be0ccf6460 2300: service workers, closes 2019-09-17 12:43:50 +12:00
7c0a327b06 cache, closes 2019-09-16 15:25:30 +00:00
a35cba3914 2651: android UI breakage, closes 2019-09-12 16:22:09 +00:00
e16425310f 0320+0321: redundant prefs, 2019-09-12 15:52:46 +00:00
d503d96db0 0320+0321: redundant prefs, closes 2019-09-12 15:50:54 +00:00
335299a0cf browser.cache.disk_cache_ssl 2019-09-09 21:45:33 +00:00
7311cfdf84 remove 1002, closes 2019-09-09 21:43:50 +00:00
3a9440aeea 0707: Add mode 5 () 2019-09-08 11:38:37 +00:00
3210ab0ca8 370: pocket -> 5000s, closes 2019-09-07 07:22:32 +00:00
2c734612f6 ummm .. beta
OK, did that all back to front... alpha is when we're working on the diffs .. beta is when we finished it
2019-09-04 21:40:04 +00:00
a12dd83b1f 69-alpha, fixes 2019-09-04 21:36:50 +00:00
44d9ceaf05 various tidyups 2019-09-04 01:40:33 +12:00
be9d9ac9ca 2701: tidyup 2019-09-03 03:34:16 +00:00
66cdb72927 FF69: deprecated 2019-09-02 07:07:50 +00:00
953b96431e 4000: RFP info re 1330467
it rode the train in 69... after a bumpy ride in 68 where it was backed out. Note: it still has some issues. Suggest users wipe the site permissions once upgraded to 69
2019-09-02 06:45:30 +00:00
4d72ad90b0 2701: cookies default FF69+ 2019-09-02 18:33:00 +12:00
cccb5b10b4 plugin.sessionPermissionNow.intervalInMinutes 2019-09-01 21:06:10 +00:00
810045eb39 1802: remove intervalInMinues
with `plugins.click_to_play` deprecated in FF69, no-one here is sure if `intervalInMinutes` still applies to Flash or even works, and no-one here cares about Flash. Happy to let Mozilla just keep restricting it more and more until it's deprecated in early 2020. Note: we already disable flash anyway in pref 1803.
2019-09-01 21:03:53 +00:00
b47982bb9a 2030: again 2019-09-01 20:32:53 +00:00
0691b8babe 2032: fix description
from earthlng 
> it blocks **all media** autoplay "until in foreground", not just audio.
> Source: https://dxr.mozilla.org/mozilla-central/source/toolkit/content/widgets/browser-custom-element.js#1141
2019-09-01 19:22:28 +00:00
8d1c95c650 2030: autoplay changes
When ESR60 hits end of life, we should remove that value 2
2019-09-01 19:16:36 +00:00
19484e1a56 2805: see 2019-09-01 14:47:17 +00:00
755ebf88fb start 69 commits 2019-09-01 06:27:24 +00:00
d26ea4f39e 68 final 2019-08-31 14:51:08 +00:00
a0f3da208f 0390: better reference
- EFF has pretty pictures and stuff and explains the issues (replaces wikipedia which people can still search for)
- tor issue doesn't hold anything important (out it goes)
- moz wiki page I'll leave in for the bugzilla links if someone wants to research how it's all meant to work
2019-08-28 16:33:06 +00:00
5166811bd5 1003: closes 2019-08-21 13:01:12 +00:00
86bfdd1470 tweak: middlemouse.paste for Linux 2019-08-21 04:08:40 +00:00
90ef9e63eb oophs I meant 68-beta 2019-08-19 04:54:30 +00:00
f2200fd442 68-alpha (for earthlng diffs) 2019-08-19 04:52:53 +00:00
aff595b6ea 1704: remove the obvious 2019-08-04 19:17:38 +00:00
6618bf5f76 media.autoplay.allow-muted, closes 2019-07-23 14:02:26 +00:00
9aa8e27ef4 68 deprecated 2019-07-17 10:09:39 +00:00
9c782fbf57 2032: add default 2019-07-15 17:07:35 +00:00
931462b30b RFP stuff
https://hg.mozilla.org/mozilla-central/rev/c96e81ba64f3#l1.14
2019-07-15 16:16:39 +00:00
217553b367 dom.forms.datetime
https://bugzilla.mozilla.org/show_bug.cgi?id=1492587
2019-07-15 15:54:23 +00:00
469bbc1ab3 remove 0864 ()
https://bugzilla.mozilla.org/show_bug.cgi?id=1492587
2019-07-16 03:49:14 +12:00
11dcc54b61 0321 tweak
`url` and `discover` prefs stop the recommendations, the `enabled` pref hides the leftover recommended section and "Find more add-ons" button
2019-07-09 03:16:40 +00:00
d40d7dbabd 0805 test info 2019-06-30 10:32:38 -03:00
b80c515e88 2010: WebGL setup tag 2019-06-29 02:52:41 +00:00
ed735f875c 2001: WebRTC setup tag 2019-06-29 02:44:37 +00:00
55b720faec letterboxing, add setup tag see 2019-06-28 05:30:43 +00:00
31567c7938 0321: recommendations discovery in about:addons 2019-06-28 05:00:19 +00:00
8f939c91fe 0320: UI change : get add-ons->recommendations 2019-06-28 04:47:55 +00:00
27bd07d496 5000s: userChrome / userContent 2019-06-28 04:22:50 +00:00
42281a9e52 2212: popup events 2019-06-28 04:15:54 +00:00
8f40c97fd1 the return of the jedi
https://bugzilla.mozilla.org/show_bug.cgi?id=1444133
2019-06-28 04:11:46 +00:00
9642452c48 Update troubleshooting-help.md () 2019-06-28 02:30:10 +12:00
8f1c3018ca Update user-js.md () 2019-06-28 02:29:58 +12:00
f85eb9d0c2 update issue templates 2019-06-26 23:09:01 -03:00
408a992893 Update .gitattributes 2019-06-26 13:32:12 +00:00
23c884a5f8 prefs no longer hidden 2019-06-26 10:14:24 +00:00
51089fbad9 start 68-alpha 2019-06-26 10:12:48 +00:00
83b4ada670 67 archive 2019-06-26 09:05:08 +00:00
7df6c676be Update issue templates 2019-06-25 18:59:58 -03:00
e338186953 4500 fix alignment 2019-06-15 16:47:25 +00:00
fa61a7c25b 1202: cleanup
I don't think we need a 4 yr old article to explain the concept of `.min` (or `.max`), it's pretty self explanatory (and SSL 3 is obsolete). Three lines of text culled, and one of the remaining http links eliminated as a bonus. Enjoy the saved bytes and mouse-scrolling.
2019-06-15 16:34:29 +00:00
dafd0894e6 refactoring, mostly
De-duplicates many lines because the -ESR and -RFPalts options require too much boilerplate garbage. The script was unreadable enough without repeating code.

I don't think these changes deserve opening yet another PR, but please let me know if you disagree.
2019-06-12 18:30:08 -03:00
06cf53d63e layout.css.font-loading-api.enabled , 2019-06-12 13:35:05 +00:00
fc545b4d27 remove 1406 css font loading api , 2019-06-12 13:33:58 +00:00
3c5f58b812 Update updater.bat 2019-06-12 10:52:46 +00:00
7d7f580bfc add -RFPalts option () 2019-06-12 10:51:25 +00:00
ca5d6b3317 1402: inactive prefs for default fonts, 2019-06-11 15:50:08 +00:00
9e7f9de56f remove 1402, see 2019-06-11 15:47:34 +00:00
8a204b5db0 font.blacklist.underline_offset, 2019-06-11 15:10:44 +00:00
690a93b71d remove: 1407, see 2019-06-11 15:09:24 +00:00
0da3835a49 updater.bat -ESR option () 2019-06-11 12:43:27 +00:00
a92c4086bb 2622: middlemouse.paste, closes 2019-06-10 00:38:20 +00:00
9b7771fe76 1401: document fonts => active, see
- https://github.com/ghacksuserjs/ghacks-user.js/issues/731#issuecomment-500255686
- reverting my change from last release
2019-06-10 00:06:15 +00:00
2265b73521 1406: css.font-loading-api=> inactive, closes 2019-06-09 23:56:40 +00:00
01aae1b346 2426: IntersectionObserver=> inactive, closes 2019-06-09 23:29:58 +00:00
c2dbdcd4ec toolkit.telemetry.cachedClientID, 2019-06-07 17:51:49 +00:00
f53b996cfa toolkit.telemetry.cachedClientID, closes
Read the linked issue
2019-06-07 17:49:42 +00:00
a633622d11 67-beta 2019-05-28 14:45:07 +00:00
caaf76e3fb remove 2705 2019-05-28 14:42:44 +00:00
8811a28c56 2705: document.cookie max lifetime
https://bugzilla.mozilla.org/show_bug.cgi?id=1529836
2019-05-28 14:04:09 +00:00
fdc9db9a08 1600s revamp
- no need to enforce defaults (except the second cross-origin) = less items in prefs and about:support
- simplify header info
- add in that you need an extension for real control: i.e for most people, e.g I use uMatrix and have never can to whitelist anything. Kolanich has been on settings of 2 for years and only found one broken site: these are anecdotal and don;t reflect the real world: which is why the settings are pretty relaxed
- move the broken info out of header and onto the pref in a setup tag
- reference: https://github.com/ghacksuserjs/ghacks-user.js/issues/716#issuecomment-488527274
- thanks Kolanich and 🐈
2019-05-26 08:43:12 +00:00
c079c3c632 0110: clean up 2019-05-26 06:07:41 +00:00
6f76a9bfd2 2030 new default 2019-05-26 05:51:13 +00:00
dfab1516ef FF67+ deprecated 2019-05-26 05:33:57 +00:00
57339d09b1 2618 -> RFP ALTs 2019-05-26 05:16:17 +00:00
ed23a88c08 save 87bytes 2019-05-24 22:50:24 +00:00
dae1087082 2660 enabledScopes, closes 2019-05-23 21:11:45 +00:00
7a103b0c23 FPI: 1330467 backed out
now that stable has landed.. I'll leave the text in place
2019-05-21 22:23:23 +00:00
5d5a9acaa4 FPI: 69+ isolate pdfjs range-based requests 2019-05-14 06:48:49 +00:00
76c476ee3c 2204: replace [test]
old test: https://developer.mozilla.org/samples/domref/fullscreen.html
- for me the video comes up as "no video with supported format and mime type", so may not be practical for all users
2019-05-12 13:52:53 +00:00
b3c6561ba8 2203: change [test]
It's the same test (thanks gk)
2019-05-12 13:44:12 +00:00
a4c2bb80aa 2429 remove default tag 2019-05-12 02:48:06 +00:00
a173d30d4e RFP 68+ isolate site permissions 2019-05-10 22:34:24 +00:00
fc801db06a RFP stuff 2019-05-08 15:43:41 +00:00
61ce537f20 Delete exceptions03.png 2019-05-08 09:19:55 +00:00
7a766cd2a7 Delete exceptions02.png 2019-05-08 09:19:45 +00:00
842a78692e Delete exceptions01.png 2019-05-08 09:19:32 +00:00
540f5ce868 FF68+ letterboxing changes 2019-05-08 05:18:16 +00:00
be7c50c198 spring cleaning, part 3: closes 2019-05-05 17:33:16 +00:00
473e88c784 spring cleaning, part 3: see 2019-05-05 17:28:47 +00:00
da4cfce10f RFP: OS spoof changes FF68+ 2019-05-03 13:19:55 +00:00
2a30436905 moar fixups 2019-05-03 07:49:47 +00:00
7f6d7c6a52 fixups 2019-05-03 07:48:12 +00:00
720253eca3 dom.imagecapture.enabled 2019-05-03 07:36:55 +00:00
7394f2f553 2027: remove,
default false since forever
2019-05-03 07:36:04 +00:00
ccec62f66b SB reporting URLs, closes
- the two reportURLs required the user to actively opt to send a report
- the other five reporting URLs use Mozilla domains, which is not a problem. Not entirely sure if they get used or how, don't care
- the dataSharingURL is not needed, the corresponding .enabled pref is sufficent
2019-05-03 02:09:35 +00:00
329719fe25 0400s: more cleanup, see 2019-05-03 02:03:56 +00:00
57f4bd46e9 spring cleaning, closes 2019-05-03 00:41:08 +00:00
59a85bcdda spring cleaning, part 2: see
- 0910 same as default for desktop. Android is the opposite, must be for a reason. Android is not really my concern.
- 1005: always been inactive: one less warning to deal with
- 1008: always been inactive. defaults are 60, 60
2019-05-03 00:35:04 +00:00
dab27cd143 spring cleaning, part 1: see
All of these are the same as default, checked back to ESR60 and Ff60. Except 2211 which is not considered an issue by TB for example, and it doesn't enhance anything IMO
2019-05-03 00:09:05 +00:00
1ff14e31c0 1201: TLS max -> inactive
Lets be consistent, we don't make min active as it alters your FP, and the risk is super low (updated the telemetry stat: down from 2% to 0.5%). Default max is now 4 anyway (don't care about ESR - they should be using the v60 archive).
2019-05-02 00:47:14 +00:00
c55ecbd8b2 0701: IPv6, MOAR info 2019-05-02 00:30:27 +00:00
99eb835e7a merge 0603 + 0608
- also remove reference which is pretty much useless
2019-04-30 14:26:48 +00:00
1e0b3d74f9 browser.urlbar.userMadeSearchSuggestionsChoice
- a user can click the one-off prompt when they first see it
- it's also set when you go changing search suggestions in options
2019-04-30 13:51:13 +00:00
7bb0bfefe1 combine search suggestions, add tag, see
also remove `browser.urlbar.userMadeSearchSuggestionsChoice`
2019-04-30 13:46:41 +00:00
f1d28f3878 pedantic aphabetical sorting 2019-04-30 10:10:59 +00:00
57618a31dc fixups 2019-04-30 10:05:03 +00:00
600f9677e9 1820+1825+1830 changes, closes 2019-04-30 09:10:42 +00:00
0d40613268 2 x update prefs, see 2019-04-30 08:26:59 +00:00
11f40f8a84 1800s remove: gmp/cdm update prefs, see 2019-04-30 08:25:06 +00:00
c3a74a7c6e 2615: remove obsolete note
1445942 was resolved in FF66
2019-04-30 07:21:08 +00:00
4dd40bddcc 2 x gmp openh264 2019-04-29 18:22:39 +00:00
9da3cf4be8 1840: openh264: remove, see
Instead of being inactive, remove this. WebRTC is already blocked. And it can also be controlled by 1820. Redundant and does nothing extra for privacy, security etc
2019-04-29 18:21:01 +00:00
50869a734f [setup-*] always goes after [notes] 2019-04-29 18:13:47 +00:00
bb788682c9 fixup: remove duplicate pref 2019-04-29 17:44:53 +00:00
50afeb1861 0205: -> inactive, closes 2019-04-29 17:14:23 +00:00
0eb107abf3 3 x plugin prefs, see 2019-04-29 11:14:50 +00:00
675577fb8d 1800: remove redundant flash prefs, closes 2019-04-29 11:12:05 +00:00
b28677a594 1825: widevine update to inactive, see
- at worse, the update pref causes a security risk. I'll leave it in for now
2019-04-29 06:32:47 +00:00
48f3dfec84 browser.safebrowsing.downloads.remote.url 2019-04-29 05:31:17 +00:00
59930d4697 0402, remove redundant pref, see 2019-04-29 05:29:53 +00:00
579aa3aa9c 0402: tidy up, see 2019-04-29 05:27:16 +00:00
ed687fc7ca 1820: update -> inactive, see
At best disabling the background update of gmp means not only an extra item for those who wish to use it (e.g widevine, netflix) to have to deal with, but also a time delay in getting the actual download. At worst, it could cause users to use an old dll (security risk).

I will leave it in, for now, but am seriously considering removing it, so don't cry if I do.
2019-04-29 05:06:43 +00:00
ce3d5a8cbe 24 inactive SB+TP prefs, see 2019-04-29 04:52:58 +00:00
8ffbd81813 remove SB & TP see
- SB: disabling it nothing to enhance privacy/security etc if changed from default
- SB: I will not provide the prefs or encourage users to disable these, especially given that there is a UI
- SB: the urls are redundant
- SB: note: the binary checks stays
- TP section is out of date (or soon will be), I'm not maintaining it, it has a UI and is best handled there
2019-04-29 04:30:59 +00:00
4119be3a86 typo 2019-04-28 13:10:04 +00:00
8d874401fa pre FF61 deprecated -> archive
This is all archived in the sticky at the end of the first post
2019-04-28 12:56:27 +00:00
b4a4856223 3 x GMP prefs, see 2019-04-28 11:12:11 +00:00
8a86097997 1820s: GMP: remove three prefs, see 2019-04-28 11:10:15 +00:00
7a9763d129 2740: add setup tag etc, closes 2019-04-28 04:30:38 +00:00
a39516ff0e case consistency when using service worker* 2019-04-28 04:02:19 +00:00
3e5e1bfdd2 2740 -> inactive, see 2019-04-28 03:48:55 +00:00
7b667db766 2304 + 2305 -> inactive, see 2019-04-28 03:37:07 +00:00
8f1a489e36 3 update prefs, see 2019-04-28 02:58:35 +00:00
6f8d0263df 0303 + 0304 + 0305: remove, closes 2019-04-28 02:55:45 +00:00
25b8b404fb 2305+2306: musical chairs 2019-04-27 19:02:14 +00:00
528d0de6b4 2305: permission also applies to push 2019-04-27 17:39:53 +00:00
c9c1671e4a 2010+2012: simplify WebGL, closes 2019-04-27 16:18:48 +00:00
8765231de0 0801: keyword.enabled, closes
- explain pitfalls, add keyword tip, add setup tag
- given the searchbar is hidden by default in new FF installs, a lot of people could find this incredibly annoying (not being able to hit enter), including users who have changed their search engine - hence the setup tag
2019-04-27 16:12:25 +00:00
e6017af4bd 3 disk cache prefs
see 053808ba97
2019-04-27 14:06:48 +00:00
053808ba97 1001: remove dead wood
- these are not needed, you can view your cache in about:cache, or look at your `profile/cache2` folder (at least for portable Firefox), the remaining pref is enough to achieve the desired result
- browser.cache.disk.smart_size.first_run is set internally (for me it got automatically reset to modified false)
- the other two prefs are just more things for users to have deal with if they want to use disk cache
2019-04-27 14:03:02 +00:00
2d0182ce6e 1001: add setup tag
- remove tag from section header (chrome)
- add tag to pref (perf)
- mention that we clear on close
2019-04-27 13:53:02 +00:00
98f65da430 remove dead setup tags 2019-04-27 07:33:30 +00:00
6a0c44d0a4 2517: should be warning, not setup
If it's inactive then it's a warning. We can still go through the js and add setup-harden tags for a few inactive items, which I will do
2019-04-27 07:03:28 +00:00
882d25f725 2610: SVG: should be warning, not setup 2019-04-27 07:00:40 +00:00
c3210d1be9 1241: insecure passive: add setup tag 2019-04-27 06:55:58 +00:00
d4f7590c83 2212: add setup tag
- doesn't need any more than that. users can fiddle with it to find what works for them: I'm sure this breaks a lot of website "features"
2019-04-24 08:39:11 +00:00
d6ccf7ba64 0860 form history: add setup tag / warning
- Used setup-web since it relates to actual web pages, even though it doesn't break them
- Added the tag because it's an item that is likely to get attention / troubleshooting
- Added a warning tag to make the risk more apparent.
- Slight edit to the 2803 references
2019-04-24 08:12:31 +00:00
0922215670 1840 openh264 -> inactive
WebRTC is already disabled
2019-04-24 07:46:47 +00:00
f849e1c602 WOFF2 -> inactive 2019-04-24 06:39:59 +00:00
986c900193 RFP tidy up 2019-04-23 05:50:35 +00:00
b8367959da mathml: a better test 2019-04-23 05:33:06 +00:00
b05cfc32de HTTP2 tweak 2019-04-23 04:04:22 +00:00
358ddfdfce pdfjs - add setup tag 2019-04-22 15:38:26 +00:00
8a68fc48c5 pdfjs.enableWebGL 2019-04-22 15:21:16 +00:00
87959d621c 2010: remove pdf webgl
it's default false, and I want to simplify webgl 2010+2012
2019-04-22 15:20:16 +00:00
8b07fd57d0 canvas.capturestream.enabled 2019-04-22 14:35:51 +00:00
4989928c1e 2026: remove (canvas.capture*)
Disabled back when first added as a stop gap measure, never checked on since. TB has this at true, so I think we can get rid of it
2019-04-22 14:34:07 +00:00
c2775a3441 0860 form history info, closes 2019-04-22 14:15:58 +00:00
50d31a7aa2 2701 cookies add setup-web tag 2019-04-22 13:31:15 +00:00
9fbe3080c5 2651: add setup-chrome tag 2019-04-22 13:28:07 +00:00
8a98cd1890 tidying up 2019-04-22 13:12:47 +00:00
2d62b9f729 2654 (open with) -> inactive 2019-04-22 12:23:39 +00:00
bb7f8df647 2650 -> inactive 2019-04-22 12:16:33 +00:00
373602f0f0 mathml -> inactive 2019-04-22 12:12:30 +00:00
e56665ecd1 HWA -> inactive 2019-04-22 12:05:21 +00:00
59d056de27 document fonts -> inactive 2019-04-22 12:00:46 +00:00
d41372a7f0 2421 should be a warning
it's not setup tag, because any change (it is inactive) does not help performance, in fact the opposite
2019-04-22 11:50:01 +00:00
f62f781645 HTTP2 -> inactive 2019-04-22 11:41:34 +00:00
408d1d0e26 FPI 68+ change 2019-04-19 05:54:57 +00:00
d491cf1e89 readme changes 2019-04-19 02:11:21 +00:00
ca0f2a5a88 0302b-> inactive: ext auto-updates closes 2019-04-19 01:39:07 +00:00
fd10c35049 0606 some default info 2019-04-17 03:31:27 +00:00
6ed3581cb0 5000s: CRF 67+ 2019-04-15 16:31:17 +00:00
c2034617f0 2429 default true 67+ 2019-04-15 14:59:23 +00:00
6231d6ebed 5000s add new about:config warning pref 2019-04-15 14:54:55 +00:00
411805b05c 2618 no longer hidden 67+ 2019-04-15 14:49:22 +00:00
8c12f4bb14 1840 no longer hidden 67+ 2019-04-15 14:46:39 +00:00
e3349d0f07 2212 defaults [67+ change] 2019-04-15 14:17:52 +00:00
92082621d6 start 67 commits 2019-04-15 14:15:54 +00:00
54f86f4be6 Update user.js 2019-04-15 12:55:15 +00:00
585415b534 RFP: prefers-color-scheme 67+ 2019-04-11 02:02:26 +00:00
99586c4a3b enabled scopes breakage info, closes 2019-04-08 14:24:41 +00:00
8419b4d71b autoplay option "Prompt" was removed in FF66 ()
* autoplay option "Prompt" was removed in FF66
source: https://hg.mozilla.org/integration/autoland/rev/2e48b6769911
2019-04-09 01:44:11 +12:00
79e316a26f 2618: better info, 2019-04-03 10:50:59 +00:00
26a70f3cd7 2618: setup-chrome tag, closes 2019-04-03 10:43:44 +00:00
bee47f33cd 66-beta 2019-03-27 04:35:42 +00:00
2fcec590b4 Update user.js ()
- to avoid confusion with the setting tag, split the prefs into separate numbers, thus shove 2031->2031, reuse 2031
- remove the default value notation as Mozilla will roll out default change gradually to users
2019-03-26 19:05:55 +00:00
3c4b312cc7 2030: default didn't change
not putting the setup-web tag back in, as users now have site exceptions
2019-03-19 19:58:15 +00:00
0354895a2e 2030: add [setting] for autoplay 2019-03-19 09:00:39 +00:00
462db2062c 2030: remove setup tag
If Firefox see fit to set this as 1 by now, then breakage is probably rare, and I'm not encouraging users to reduce security/privacy etc from default
2019-03-17 22:43:27 +00:00
d9e24e5095 Update user.js () 2019-03-18 07:07:15 +13:00
b1aa1f5619 2030: default change 2019-03-16 22:51:58 +00:00
a349662f69 66 deprecated prefs 2019-03-16 22:44:24 +00:00
28a7226235 4510: clarify this is the chrome 2019-03-16 22:36:31 +00:00
97f08ad3cd 4504: RFP letterboxing, closes 2019-03-16 22:34:45 +00:00
68584a3397 some 2505+RFP clarity, closes 2019-03-13 15:15:23 +00:00
8b4f45774a 4607+RFP clarity, closes 2019-03-13 14:46:33 +00:00
f8428dcc0a a better test
- more metrics covered/displayed
- test page site is https
2019-03-07 14:55:03 +00:00
6d6cd5f410 2802 applies to 2803, closes 2019-03-05 03:26:39 +00:00
eae8434853 start 66 commits 2019-02-26 07:53:21 +00:00
2cff24f12e 65 final 2019-02-26 05:42:32 +00:00
60be8be5ec UNC and extensions, closes 2019-02-17 03:51:44 +00:00
981dd83c15 clarify themes info, closes 2019-02-17 16:34:34 +13:00
5c703f0262 65-beta 2019-02-09 10:05:45 +00:00
de0ebbed21 0343: even MOAR clarification 2019-02-08 11:38:17 +00:00
e448015704 0343: clarify where
TAAR is extension recommendations in the "Add-ons Manager" (not sure how it's displayed)
CFR is extension recommendations as you browse the web, via a drop down panel
2019-02-07 16:55:04 +00:00
d3b1ed45ad RFP: UA spoof is now 60+8's 2019-02-07 15:14:08 +00:00
ed140425ea move shit around 2019-02-08 03:41:23 +13:00
3847f97f41 some more 65+ diffs, 2019-02-07 13:41:15 +00:00
d81e8ae583 i need a break 2019-02-07 11:11:16 +00:00
7a8381d894 typo 2019-02-07 11:01:31 +00:00
649699ad22 0609: disable connectivity service 2019-02-07 11:00:07 +00:00
1d5289dd94 RFP 67+ 2019-02-06 16:59:28 +00:00
74c8f294d6 0306: extension metadata, closes 2019-02-05 04:51:07 +00:00
a0508eccf6 capital letter after [note] 2019-02-04 13:41:56 +00:00
25acd9f63e 2703 again
- description needs to stay changed from just cookies since it also clears site data
- keep the info about n days out of it, it's just messy (ESR users should be on version 60)
- get the values correct (I mixed them up earlier)
- fixup [setting] path
- leave in one (of two) extra [notes] I previously added
2019-02-04 13:40:45 +00:00
74a08114a8 2701: refix setting 2019-02-04 13:28:29 +00:00
71ffc661b2 2701 again 2019-02-04 13:26:19 +00:00
e432a22693 0306: moar info
see https://github.com/ghacksuserjs/ghacks-user.js/issues/615#issuecomment-460243162 - checking for updates is not a trigger, having an update **and** applying it is
2019-02-04 13:08:41 +00:00
f06c78f897 update cookie settings info 2019-02-05 02:00:19 +13:00
847eb80877 0306 => inactive, closes
whatever we thought it may have done in the past, it doesn't do that now as far as we know. And it's not an issue since we allow extension update-CHECKs anyway.
2019-02-04 06:39:29 +00:00
ec0e58099f pointer events -> RFP ALTS 2019-02-01 13:53:04 +00:00
e6eb473071 dom.storage_access.enabled
regardless of this pref setting: the permissions.sqlite file will still be abused to store a flag for this for every single site you connect to (as third party?) - fun.
2019-02-01 13:41:00 +00:00
f1b892bc1c clean up "Firefox Data Collection & Use" ()
* clean up "Firefox Data Collection & Use"
  - telemetry prefs to 330's
  - Firefox Data Collection & Use prefs to 340's (but leave crash reports in 350s)
  - move `app.shield.optoutstudies.enabled` to 330's - this is an internal pref which controls if you get the system addon
  - make notes that `datareporting.healthreport.uploadEnabled` controls studies and ext recommendations
  - split crash reports better to reflex the UI setting
2019-02-02 00:57:22 +13:00
524b5f79dc setting changes re cookies 2019-01-31 18:42:59 +00:00
24f2e1d982 disable storage access api
see: https://old.reddit.com/r/firefox/comments/alnn3f/storageaccessapi_permissions/effg5tp/
2019-01-31 16:16:59 +00:00
c6060e5645 storage access api 2019-01-31 16:03:39 +00:00
d0b8a08a4b browser.urlbar.maxHistoricalSearchSuggestions
default 0 in ESR60 and FF60+
2019-01-30 16:16:12 +00:00
f047fe93c0 remove 0850f
`browser.urlbar.maxHistoricalSearchSuggestions` is default 0 is FF60 thru to FF66. It is also default 0 in ESR60.1 thru 60.5. (at least on Windows)

IDK if this has ever been used, maybe android, in which case it's probably useful?
2019-01-30 16:14:39 +00:00
6147fed61c and the rest of the 0850's
The location bar dropdown cannot be disabled via prefs except with css, in which case the whole thing is hidden regardless of he above prefs. So there is no point in making any of them active. This is also in line with what we can achieve with relaxed and hardened tags / sticky issues - that is we can find a better balance, Shoulder surfers is a low risk, not even Tor Browser disables this stuff. People need to take responsibility and/or use common sense. Sure, we can leave em in for users to know about and enable if they want. End of story.

userChrome.css code is
```css
/* locationbar dropdown FF65+ */
#PopupAutoCompleteRichResult {display: none!important;}
```
2019-01-30 15:44:08 +00:00
54f79604da Make Firefox Great Again ()
* location bar changes
* if the dropdown is going to be used, then no point hiding search engines on the bottom line
2019-01-30 15:06:32 +00:00
2f351fa5ce 0702: http2 websockets
might as well add it: needs t be taken into consideration when looking at the whole http2 thing. Will be interesting to see what Tor Browser does with it in ESR68
2019-01-30 14:09:39 +00:00
5dc3ea66cd browser.contentblocking.enabled
only existed for FF63+64, default true anyway
2019-01-30 12:38:07 +00:00
d9a87b3ac4 FF65 removals () 2019-01-30 12:27:53 +00:00
95b75a065d up date info on what cookies control 2019-01-30 10:23:42 +00:00
8c96432eb8 Update updater.sh ()
Closes  + 
2019-01-25 14:28:00 +00:00
1c09ec36e3 0306: extra info, closes 2019-01-18 04:24:13 +00:00
f1e6d164f7 start 65 commits 2019-01-17 05:19:11 +00:00
3b90e6e592 end of v64 2019-01-17 05:11:29 +00:00
45bd5ccc02 PB Mode: ref added 2019-01-16 02:07:06 +00:00
7bf5790f2b RFP: FF66 changes to UA HTTP Headers 2019-01-11 05:14:59 +00:00
075d6fe6e4 2615: s/cut keys: bug fix in 66+ 2019-01-11 05:09:14 +00:00
4604cf0d4e references to other prefs s/be explicit 2018-12-21 11:02:40 +00:00
b845f8fe3a Update README.md
OK, I give up. I would've removed those commits by force-pushing, but the branch is protected. #NotMyFault
2018-12-20 19:53:48 +00:00
96063027ba Update README.md
second attempt at fixing the weird title...
2018-12-20 19:44:27 +00:00
186fb1c9be Update README.md
fix for the weird page title ![][b]
https://ghacksuserjs.github.io/ghacks-user.js/
2018-12-20 19:42:28 +00:00
ac4e764c37 http2, altsvc, ssl session ids vs FPI vs TB 2018-12-18 15:54:57 +00:00
5b0952f60a network.auth.subresource-http-auth-allow 2018-12-17 13:00:27 +00:00
5bd5f6b28e 0912: HTTP Auth sub-resources () 2018-12-18 01:41:37 +13:00
55c2cacbce 0335: toolkit.telemetry.coverage.opt-out () 2018-12-17 22:43:45 +13:00
4badc42879 0105b: kill snippets endpoint
it's too hard to follow AS changes, and work out if disabling showing items (basic toggling of show/hide sections etc) actually stops downloading a localized local copy etc. For items we actually want to block, let the endpoint slaughter begin.
2018-12-17 09:36:26 +00:00
6946a01232 Update troubleshooter.js 2018-12-17 08:19:14 +00:00
da80e39064 0105s: description s/be self explanatory
when filtered and 0105a is not shown, AS doesn't mean anything
2018-12-16 17:37:42 +00:00
c1d6d81528 add PERF tags to wasm, asm.js, closes 2018-12-16 14:10:32 +00:00
d5ece0f6f4 1700s: revamp Containers header () 2018-12-14 07:05:43 +00:00
f6ea20a8b0 0335: Telemetry Coverage endpoint
let's just coverage-our-ass on this one

While I don't mind telemetry (development needs meaningful feedback to better the product), and I trust the data is not PII, and/or anonymized into buckets etc (you can check this you know), and I understand this one needs to be outside the Telemetry pref in order to gather the one-time ping ... and I trust Mozilla's motives ... I'm starting to get a little annoyed at the non-stop incessant increasing telemetry bullshittery and ass-fuckery around sending data home, and the lengths some Mozilla devs will go to, to hide this info (hidden prefs, access denied tickets to hide discussion of what should be public, and even **not even adhering to their own documentation**).

I will also be killing as many Activity Stream endpoints as well - as long as they are in line with our js - pocket, snippets, onboarding etc. And I will add those from personal as inactive for end-users - eg cfr
2018-12-13 17:28:16 +00:00
645492e82f grammar, case, etc, closes
thanks @Just-me-ghacks
2018-12-14 04:49:50 +13:00
15c68dc344 disable System Add-on updates ()
remember the new Coverage Telemetry shit? with a **hidden** opt-out pref? guess what, they are already collecting for 3 months ...

https://bugzilla.mozilla.org/show_bug.cgi?id=1487578 - **3 months ago**: "I see data coming in that looks reasonable"

guess what else ...

"It has also replaced the previous version that was there (from bug 1480194)" and oh, surprise surprise, 1480194 is ACCESS DENIED!

they're not just using private tickets to hide security critical information from potential hackers and blackhats, no they also use it to hide shady AF things. Things that they fully know are shady as fuck and that they absolutely know a lot of people would not like. There's simply no other reason why they'd do that

but wait, that's not all. If you think an opt-out pref that 99% of people wouldn't know about even if it showed up in about:config BUT ALSO HAPPENS TO BE HIDDEN is kind of questionable, well ... the system addon that they use for this shit apparently looked or still looks for `toolkit.telemetry.coverage.opt-out` [1] instead of `toolkit.coverage.opt-out` as their documentation [2] claims

[1] https://github.com/mozilla/one-off-system-add-ons/pull/131/files#diff-6e0cbf76986d04383ccb32a29ef27a7aR25
[2] https://hg.mozilla.org/mozilla-central/file/tip/toolkit/components/telemetry/docs/data/coverage-ping.rst#l32

It's time to opt out of all that shit for good. Disable system addon updates and kill it at the root

> In FF61 and lower, you will not get any System Add-on updates except when you update Firefox

on its own that's not true. You will get SA updates unless you disable app update checks + auto install. Let's just remove that as well.
2018-12-14 03:21:57 +13:00
04b797f1aa 0209: remove trailing space
@Just-me-ghacks 💋
2018-12-13 11:14:44 +00:00
e60abd6c44 64-beta 2018-12-12 17:17:33 +00:00
d55b8176ad dyslexia and/or dementia 2018-12-12 16:52:12 +00:00
31adbba774 5000s: disable CFR 2018-12-12 16:34:27 +00:00
3c247a2c5b Update ghacks-clear-[removed].js 2018-12-12 13:22:58 +00:00
879f0abf28 2201: more garbage 2018-12-12 13:21:24 +00:00
d97d0ec0f5 media.peerconnection*
covered by user_pref("media.peerconnection.enabled", false);
2018-12-12 13:09:03 +00:00
3916e38681 taking out the garbage () 2018-12-13 02:02:38 +13:00
51ac69874b 0105* remove // has setting 2018-12-12 11:58:48 +00:00
2d956d04f3 move 1260 to 122x ()
* move 1260 to 122x

"disable or limit SHA-1 certificates" is about certs, not ciphers.
Because CERTS is 1st in the title I moved it to the 1st item there because it's arguably also the most important of the lot (and renumbered the rest)
We can also drop HSTS from the subgroup title because there's nothing HSTS left atm.
2018-12-13 00:52:49 +13:00
9d6bfb650c disable Telemetry Coverage () 2018-12-13 00:29:29 +13:00
ccdd4decf0 Pocket: 0510->0370
Pocket is no longer a System Add-on in FF64+
2018-12-12 08:25:25 +00:00
f0fbfd3086 network.auth.subresource-img-cross-origin-http-auth-allow 2018-12-11 17:44:19 +00:00
88b747ef36 0911: remove it,
it is default false in FF59+
2018-12-11 17:42:19 +00:00
c6ebe36165 1022: resume from crash=>inactive, closes 2018-12-11 17:28:21 +00:00
7684e83aba 0102 add SR info 2018-12-11 17:18:26 +00:00
4f37975566 browser.sessionstore.max_windows_undo 2018-12-11 16:49:38 +00:00
26b874bed7 1020: remove max_windows 2018-12-11 16:43:11 +00:00
61be5ae563 all Deprecations + new ADB extension prefs () 2018-12-12 05:07:28 +13:00
ef1e61ebcd start 64-alpha 2018-12-11 16:05:07 +00:00
205c48d9d3 final 63 release 2018-12-11 15:49:31 +00:00
0e1b0a4b6e move 0370 to 0105b () 2018-12-12 04:40:29 +13:00
778dc89bb6 2002 WebRTC tests
FYI, the https://www.privacytools.io/webrtc.html test in our wiki is 404, so I gave it a strikethru and added this one. This is also handy for 2001, but do we need to double up on it? We're only disabling WebRTC because of IP leaks, so I don't see the point in testing if WebRTC is disabled.
2018-12-11 00:40:03 +00:00
23733097a9 2302 FF version 2018-12-11 00:13:07 +00:00
71a2d393f3 minor wording changes () 2018-12-11 11:23:00 +13:00
74ebacc0dd obey rules for [setting] tag location
all setting tags must be between `/* ... ***/`
2018-12-10 19:52:48 +00:00
45e3b3a0e0 2682: put correct version back
0a67cdec8b (comments)
2018-12-10 19:35:41 +00:00
8172f730d3 Update README.md 2018-12-10 19:26:17 +00:00
5c85e61bb4 4000: remove old FPI notes () 2018-12-10 18:36:07 +00:00
0a67cdec8b cleanups ()
- cleanup of tags placement, order consistency, and to use square brackets (allows usage elsewhere to not get tagged, eg 1402)
- other bits and bobs
2018-12-11 07:18:26 +13:00
b85668c2cd make description & info & notes concurrent 2018-12-08 04:10:13 +13:00
786839ffc1 2701: fix split multi-[notes] 2018-12-06 08:16:01 +00:00
8313f2e01a 1020: fix description
Session Restore cannot be disabled in Normal mode, it is also used internally. FYI: PB Mode does not use Session Restore. The description is still not 100%, as it refers to what is restored, not what is kept in the recovery.jsonlz4 (at least for tabs)
2018-12-06 05:41:25 +00:00
0a87c99a0e 1203: ssl session ids are 24hrs 2018-12-05 20:58:07 +00:00
91fed43fc7 0703 atl-svc, better ref, 2018-12-05 20:36:20 +00:00
74f029566e enforce DOMHighResTimeStamp API
flipped true in FF54: https://bugzilla.mozilla.org/show_bug.cgi?id=1026804 but unsure when the pref itself was introduced. note: other timing prefs were always in 2400's see 4602: [2411] disable resource/navigation timing / 4603: [2412] disable timing attacks
2018-12-04 10:34:02 +00:00
571be93ae0 proper case convention after tags
Can't believe I did this. Out of 32 `[setup*` and  9 `[warning]` tags (excluding the readme), I let one capital letter get past me, the bastard!
2018-12-04 10:26:44 +00:00
11b16c9c6d move PB mode into STARTUP section 2018-12-04 08:51:19 +00:00
c4ec4dbc77 move 0000 to personal
it has zero to do with privacy etc, and in fact most users will only ever encounter it once (and check the box) when they first go to about:config, so it's not even useful as an override or a new profile IMO. This removes one of three numbers that don't have a section
2018-12-04 08:34:36 +00:00
67998eb4af section naming convention consistency 2018-12-04 08:27:52 +00:00
834857b564 tag sections 2018-12-04 20:03:19 +13:00
25923f1acd add index 2018-12-04 06:03:11 +00:00
85eaba2571 TAG! You're it! 2018-12-04 18:36:03 +13:00
51237f6889 updater.sh: add -e option for ESR users () 2018-12-01 14:47:58 +00:00
74e753d0c5 fix profile check () 2018-12-01 14:18:38 +00:00
db56940422 typos 2018-11-29 14:10:08 +00:00
400d764a93 Update updater.sh ()
* just some polishing
2018-11-27 16:57:51 +00:00
f3e2bfa76d browser.crashReports.unsubmittedCheck.autoSubmit 2018-11-26 15:33:36 +00:00
d4907faa8e updater.sh v2.1 ()
when argument `-l` is used, parse profiles.ini instead of just listing folders in the default profiles dir.
This allows to select profiles located outside of the default profiles directory and makes selection easier because it also shows the profile name (and selection is by number instead of having to copy-paste a path)
2018-11-26 14:44:52 +00:00
62351bfbf5 updater.sh v2.0 ()
* lots of new arguments

`usage: ./updater.sh [-h] [-p PROFILE] [-u] [-d] [-s] [-n] [-b] [-c] [-v] [-r] [-o OVERRIDE]`

Args can be written separately or together. Examples:

```txt
./updater.sh -sdc
./updater.sh -sd -o relaxed.js
./updater.sh -s -d
```

Deprecated arguments still work (for now!)
2018-11-25 17:16:05 +00:00
b182946ae4 Tor-related warnings ()
Also reworded some stuff.
2018-11-24 05:19:24 +00:00
2ae3a3e4e1 1700s: enable containers,
AFAIK there's no technical reasons for containers to be disabled in FF63+
2018-11-21 23:53:00 +00:00
0ff610c056 there is no spoon 2018-11-20 18:14:23 +00:00
661a314e28 RFP: pointerEvent.pointerid 2018-11-20 17:36:04 +00:00
106f46d053 updater.sh restructuring/re-write ()
* Uses `perl` as a last resort if `curl` and `wget`  are not available (fixes )
* Aborts and notifies user if none of the above are installed 
* Better use of functions
* When version numbers are checked, the contents are immediately saved to a temp dir.  This allows us to skip using wget/curl/perl a second time
* Improved messages for users
* Added various font colors for ease of use and aesthetics
2018-11-19 17:34:14 +00:00
643cba63cf Activity Stream is no longer a System Add-on 2018-11-19 03:00:40 +00:00
b5c5d8e9d1 removed browser.eme.ui.enabled 2018-11-19 00:37:42 +00:00
36b90cd5e6 1830: remove hiding the DRM UI
out of interest, it no longer requires a restart
2018-11-19 00:34:56 +00:00
299a03663f 0351: move *autoSubmit to deprecated
https://github.com/ghacksuserjs/ghacks-user.js/issues/302#issuecomment-359245047
2018-11-19 00:12:07 +00:00
13550d18a1 update [SETTING] info () 2018-11-19 12:56:12 +13:00
c12eb0fdc6 0201b+2305 Permissions API info 2018-11-18 12:56:51 +00:00
acbf881b1f saving the world bytes at a time 2018-11-15 15:47:21 +00:00
7351e561c4 1243: mixed OBJECT_SUBREQUESTS 2018-11-15 07:06:34 +00:00
4e42bad6a1 0201: default geo=> inactive, 2018-11-14 17:12:03 +00:00
b85e748b53 2204: FS API=>inactive, 2018-11-13 18:56:51 +00:00
0cc4007eda 1202: tls.min => inactive
TLS 1.0 and 1.1 are still secure. Sure, later versions are more secure, but 98% of the web is already upgraded - less than 2% of sites use < v1.2. So it's not very likely you would come across a site that requires it, but if you did, what's the point in breaking it. Mozilla and Chrome already have plans to deprecate TLS 1.0 & 1.1, and force that last 2% of sites.

TLS settings can be FP'ed without JS. By sticking with the defaults, I do not see any security issues, but an increase in potential anti-FPing. TBH, the chances of either (i.e being FP'ed with TLS as a entropy point, or being compromised due to TLS<1.2) are slim to non anyway.

Any arguments, please see @earthlng
2018-11-13 16:19:23 +00:00
3003f2dd85 make up yer mind
stick it back in for two releases - pref gets removed in FF65 anyway
2018-11-13 15:30:39 +00:00
ce48306a0d finalize beta 2018-11-13 15:12:20 +00:00
3423d39fa9 2517 Media Capabilities => inactive
see f214e4bc4e (comments)
2018-11-13 15:11:01 +00:00
4834472107 remove 0426 content blocking 2018-11-13 15:01:35 +00:00
f214e4bc4e 2517: disable Media Capabilities API (for now) 2018-11-13 08:42:49 +00:00
8fd6061bcc 0426: enforce CB 2018-11-13 08:19:19 +00:00
92acb6b2f7 saving the world, one byte at a time 2018-11-12 00:06:19 +00:00
b6b9733afa remove old information ()
Pants said "We do not need to keep anything for ESR users. ESR users are on v60, and we have an archived 60 for them."
This isn't even affecting ESR60 but only older versions.
2018-11-08 04:14:32 +13:00
89bc0bee16 scheme+host+path+port -> scheme+host+port+path () 2018-11-04 14:44:20 +00:00
f8fc465d0a 2701: add new descriptions and new value () 2018-10-30 04:40:24 +13:00
58fa4e9b6d 0514: disable snippets, top stories, telemetry 2018-10-29 14:26:49 +00:00
afee555045 FPI: isolate postMessage... 2018-10-28 16:46:22 +00:00
5a36b4e016 Update README.md 2018-10-28 15:58:47 +00:00
7b3e6f5143 Update README.md 2018-10-28 15:20:41 +00:00
452c717502 Update README.md 2018-10-28 11:09:47 +00:00
661af196d9 Update README.md 2018-10-28 11:08:18 +00:00
39a30d710b Update README.md 2018-10-27 16:30:38 +00:00
8f10300c15 Update _config.yml 2018-10-27 16:29:34 +00:00
806d047729 Update README.md 2018-10-27 16:28:15 +00:00
0efebe3e83 Update README.md 2018-10-27 16:17:25 +00:00
49d9314b0a Update README.md 2018-10-27 15:00:10 +00:00
b4b5e3a068 Add files via upload 2018-10-28 03:57:54 +13:00
29d832e350 Update README.md 2018-10-27 14:55:15 +00:00
Mtq
68e44285c5 Update README.md ()
+ compressed
2018-10-28 03:52:19 +13:00
e8bfa93696 0410s: SBv4 & cookies, 2018-10-25 00:13:50 +00:00
1abe1fd4df 4702: buildID cleanup, closes 518 2018-10-24 10:15:37 +00:00
24f7847f73 2703: make value 3 info clearer 2018-10-23 16:13:23 +00:00
56206f77ba removed, renamed or hidden in v63.0 ()
* removed, renamed or hidden in v63.0

- 0301a - do you want to add the `[NOTE] Firefox currently checks every 12 hrs  ...` to `0302a` ? The problem is it also checks for updates every time you open/reload about:preferences and in Menu>Help>About Firefox regardless of when the last check was.

- 0513 - removed because follow-on-search is no longer a deletable system addon

- 2703 - do we just remove `3=for n days` or add a [NOTE] that value 3 was remove in FF63 or something?

- `browser.ctrlTab.recentlyUsedOrder` replaces `browser.ctrlTab.previews` but it now defaults to true. No need to list the new one under 5000 IMO

* Update user.js

* 1031 add more info

https://bugzilla.mozilla.org/show_bug.cgi?id=1453751#c28

* 0301a: remove update-check timing info

* 2703: add version deprecation for value 3
2018-10-24 04:45:31 +13:00
587194ce84 1403: icon fonts: flip, make inactive, closes 2018-10-20 01:35:37 +00:00
7aac6d476a 1270: link to 1201, 2018-10-16 12:01:42 +00:00
9e073ea5d5 1201: SSL renegotiation -> active, closes 2018-10-16 11:57:32 +00:00
732c438148 0710: disable GIO... 2018-10-14 12:11:56 +00:00
58931bc15d start 63 commits 2018-10-11 11:25:03 +00:00
21b18cbe49 finalize 62 2018-10-11 10:46:35 +00:00
cbcd293e68 RFP: spoof/suppress Pointer Events
https://bugzilla.mozilla.org/show_bug.cgi?id=1363508
2018-10-11 05:50:09 +00:00
aacf5d4a0b update 1031 description 2018-09-30 15:30:32 +00:00
ec5fb6e3a1 removed privacy.trackingprotection.ui.enabled 2018-09-30 15:24:33 +00:00
b2fc9bc266 remove 0421: privacy.trackingprotection.ui.enabled
- pref removed in FF63 (https://bugzilla.mozilla.org/1476879)
- when we added it the default was false
- default is true since FF57
- it's only an UI thing

ergo we don't need to move it to 9999
2018-09-30 15:20:36 +00:00
ca1cc2001f Update README.md 2018-09-20 23:40:29 +00:00
f88af1dac6 Update README.md 2018-09-20 23:39:44 +00:00
1c6c5ea2ff 1000s: cache header section 2018-09-13 05:09:07 +00:00
2d316ceedd removed *webextensions.keep* 2018-09-12 22:27:26 +00:00
36c791c4bc remove 2661: *webextensions.keep*
Added in FF51 with defaults false and never changed since
2018-09-12 22:23:59 +00:00
ee213f2bab infos about default values ()
* more infos

* add colons

not all EOL comments for defaults start with `// default` (23). The common string is `default:` (27 incl. these ones) with or without preceding or trailing spaces
2018-09-13 10:17:56 +12:00
01a978e33a add 0864: dom.forms.datetime, closes 2018-09-11 16:43:18 +00:00
6717bc0674 1024: toolkit.winRegisterApplicationRestart 2018-09-09 20:46:35 +00:00
11a94c7e32 4503: add bugzilla 2018-09-09 20:43:56 +00:00
b7c0e816a0 remove ESR52 grouping in 9999 () 2018-09-10 08:33:43 +12:00
8b5547a973 4504: browser.startup.blankWindow 2018-09-08 17:23:48 +00:00
f0c29cf8a6 62-beta 2018-09-08 16:37:12 +00:00
e7a71143a8 oophs
these two prefs were moved to deprecated, not removed from the user.js itself
2018-09-08 14:14:46 +00:00
9e342deaf2 update 1803 after Java removal () 2018-09-06 04:59:04 +12:00
109d4cf916 removed plugin.state.java 2018-09-05 09:33:29 +00:00
c805dd8b3b 62 deprecated/removed prefs 2018-09-05 09:30:42 +00:00
a89e8fc1e0 removed browser.cache.frecency_experiment 2018-08-29 17:12:13 +00:00
f2065a463c move 1007 to 9999 ()
`browser.cache.frecency_experiment` is a dead pref since FF59: https://bugzilla.mozilla.org/1430197

proof: https://dxr.mozilla.org/mozilla-esr60/search?q=frecency_experiment
 - the pref still exists but is not used anymore ie dead pref
2018-08-30 05:10:28 +12:00
299489c701 1000s: cache description/info, closes 2018-08-28 08:27:45 +00:00
50a578c32a remove extra spaces 2018-08-28 07:57:21 +00:00
7d417da5fd 0701: IPv6 info tweak, closes 2018-08-25 06:09:28 +00:00
e6a13e5a93 removed security.tls.version.fallback-limit 2018-08-20 14:54:47 +00:00
9a46fafb53 1203: remove TLS fallback-limit
Currently enforcing the default at 3, it gets changed to 4 for FF62, and will get deprecated some stage soon - https://bugzilla.mozilla.org/show_bug.cgi?id=1479501
2018-08-20 14:52:06 +00:00
6fb2f25e65 4700: revamp, closes 2018-08-17 09:09:01 +00:00
9e67f982ab 2720: enforce IDB=enabled 2018-08-17 07:50:33 +00:00
5b6ed92da4 0701: disable IPv6, closes 2018-08-17 07:15:47 +00:00
2969c6660f removed browser.urlbar.autoFill.typed 2018-08-16 14:36:48 +00:00
776e32c27f 0850d: remove browser.urlbar.autoFill.typed
It is deprecated in FF62 ( https://bugzilla.mozilla.org/show_bug.cgi?id=1239708 ), and is already covered by the other pref in 0850d (for ESR60.x users)
2018-08-16 14:34:32 +00:00
9e1c368cd9 move dom.battery.enabled back to 2500 from 9999 ()
* move dom.battery.enabled back to 2500 from 9999

* make it inactive, clear out old links
2018-08-16 07:04:25 +12:00
572d16d5a5 change cookies from block all to allow 1st party ()
* change cookies from block all to allow 1st party

see https://github.com/ghacksuserjs/ghacks-user.js/issues/439

* and fixup readme as well
2018-08-15 17:56:40 +12:00
29e2461cd1 fix -updatebatch () 2018-08-13 12:39:24 +00:00
f39112f914 P*tches for B*tches ()
* replace /V with global VERIFY ON

* change working dir to script dir
The working dir doesn't necessarily match the script's path, depending on how the script is called. All relative paths and conditional statements using EXIST will fail whenever the working dir is not the script's own location. This fixes that.

* minimal stuff, mostly cosmetic

* prompt to run prefsCleaner under very specific circumstances

* improve -updatebatch option

* add version variable + display new script version on update
2018-08-12 11:56:47 +00:00
0145ccfec3 add empty lines for subgroups in 0400 + 1200 () 2018-08-12 15:11:23 +12:00
c2c8e6227c more info for 2026-28 () 2018-08-12 15:01:03 +12:00
ab404680df remove [SETTING-ESR52] lines () 2018-08-09 15:30:57 +12:00
cfa2da8fea start 62 commits 2018-08-09 03:28:54 +00:00
b3b3ae4660 finalize 61 2018-08-08 14:34:08 +00:00
c4d131aaf9 Add files via upload () 2018-08-06 23:33:07 +00:00
9c975b318a store file with CRLF
I think there's no way to get rid of ^M but hopefully with `*.bat -text` in `.gitattributes` it shouldn't be a problem because git won't do any line conversion on check-in/out.
This way the raw link as well as the file within the zip download should be in proper MSDOS CRLF format, and git status shouldn't report the file as modified either. ***fingerscrossed!!***
2018-08-06 23:27:41 +00:00
a1638868ea Update .gitattributes 2018-08-06 22:31:21 +00:00
3806ccc68c Introduce end-of-line normalization ()
fix for 
2018-08-06 22:06:30 +00:00
06b69bb95a Delete test-LF.bat 2018-08-06 19:34:33 +00:00
d8bfdaa058 Delete test-CRLF.bat 2018-08-06 19:34:26 +00:00
03efb99754 Delete test-CR.bat 2018-08-06 19:34:18 +00:00
b390d9787b Add files via upload 2018-08-06 19:27:07 +00:00
2e908f38d2 Update prefsCleaner.bat 2018-08-06 19:25:25 +00:00
f973422581 Delete prefsCleaner2.bat 2018-08-06 19:23:36 +00:00
5bcbe56f4b Add files via upload 2018-08-06 19:19:22 +00:00
833f816b99 Add files via upload 2018-08-06 19:17:48 +00:00
5ccea3262f Update updater.bat 2018-08-06 19:14:56 +00:00
9611eac1cf test
test
2018-08-06 18:52:30 +00:00
43119694fb Update .gitattributes 2018-08-05 13:02:34 +00:00
cbea3adc7e FPI & IP addresses FF63+ 2018-07-17 02:58:51 +00:00
4813aa549b Update user.js 2018-07-11 13:59:52 +02:00
96706cf11e ghacks-clear-[removed].js : Fix JS syntax ()
* Fix syntax

* updated 06-July-2018
2018-07-07 01:44:53 +12:00
a81d013e45 61-beta 2018-07-06 12:25:41 +00:00
857cbd8c24 Use wget if curl is not available ()
* Use wget if curl is not available
On most GNU/Linux distributions wget is often preinstalled, while curl
is not.
* Bump updater.sh version
2018-07-06 14:06:01 +02:00
c9543519c7 0100s: startpage, home+newwindow, newtab
FF61 introduced quite a few changes, including removing the ability to set a blank startpage in the UI, and a new Home options tab with unified Activity Stream (AS) defaults and dropdown options. Because the only way to stop AS on startup is to enforce a blank page (pref 0102), and setting this auto changes `home+newwindow` (0103) and `newtab` (0104) to a blank page, then we're just going to go ahead and enforce that on all of them.

For more info see the discussion in 
2018-07-05 15:32:19 +00:00
d34894e965 2730 + 2750: Storage API + Offline Cache
ESR52.x doesn't use the new site storage UI. FF61+ the issue is resolved, so let's enforce offline cache (2730) as false again
2018-07-05 10:16:20 +00:00
70abeda9d4 2730 + 2750: Storage API + Offline Cache
https://bugzilla.mozilla.org/show_bug.cgi?id=1450448#c20
2018-07-04 16:49:26 +00:00
dceef9d1db 0503: disable savant 2018-07-04 12:53:21 +00:00
9386fb5581 61 deprecated/removed prefs 2018-07-04 09:41:30 +00:00
56acb4cff5 disable UNC paths 2018-07-04 09:15:44 +00:00
1eac4185d2 4500: RFP geo reverted 63+ 2018-06-26 03:48:47 +00:00
05021ac62e 2300: workers, fixes 2018-06-20 05:05:48 +00:00
a2b5e1e7cf updated 03-Jun-2018 2018-06-04 00:28:43 +00:00
d9a1c83300 updated 03-Jun-2018 2018-06-04 00:27:20 +00:00
a4a9b9a675 cleanup
Both deprecated in FF61, but we'll remove them from the user.js
- `services.blocklist.signing.enforced` is default true since FF50
- `browser.storageManager.enabled` only controls "Site Data" UI visibility
2018-06-04 00:23:16 +00:00
c61e633236 0707: added ref link 2018-06-01 04:32:52 +00:00
8783ae9ce8 start 61 commits 2018-05-31 01:35:51 +00:00
3264fbd9c3 finalize 60 2018-05-31 01:27:20 +00:00
b8b3a4f7ed enable DNT header by default
pros and cons: see https://github.com/ghacksuserjs/ghacks-user.js/issues/422#issuecomment-392789507 + follow-up comments
2018-05-29 19:06:06 +02:00
7f1f9e124b updated 29-May-2018 2018-05-29 16:12:07 +00:00
9b1cf28e89 0101: cleanup laterrun 2018-05-29 16:09:02 +00:00
acc5a1c2df 0101 welcomes+whatsnew -> 5000s 2018-05-29 02:25:54 +00:00
9a4032f4cd updated 27-May-2018 2018-05-27 21:43:38 +00:00
f113cf84c3 0101: cleanup rights.3 2018-05-27 21:40:47 +00:00
c92ece7960 updated 26-May-2018 2018-05-26 18:49:44 +00:00
3e5667fb34 0101: more cleanup, 2018-05-26 18:48:38 +00:00
2bf238f384 updated to 26-May-2018 2018-05-26 16:49:39 +00:00
3edf7af85e 0101: cleanup, see 2018-05-26 16:45:46 +00:00
4b8b2d81a0 Create ghacks-clear-[removed].js 2018-05-26 05:00:04 +12:00
fde8035332 Delete ghacks-clear-FF60inclusive-[removed].js 2018-05-26 04:58:53 +12:00
01bd2a4f6d 0422: TP block lists: deduplicate, fixes 2018-05-25 15:44:27 +00:00
6d4b49d061 Update ghacks-clear-FF60inclusive-[removed].js 2018-05-25 14:53:11 +00:00
8e60f412e4 Update ghacks-clear-FF60inclusive-[removed].js 2018-05-25 14:52:22 +00:00
f60a87f97f 2730s: cleanup/removal
2732 was just enforcing default since at least FF52, and 2733 has never been used, was only there for info. Offline Cache or appCache (2730) is already behind a prompt (2731), and is already limited (in FF60+) to HTTPS (2730b).
2018-05-25 14:44:44 +00:00
449e32a8ca 2202: cleanup
both these removed prefs are enforcing the default in ESR52.x and FF60+ (and I assume FF52+) branches
2018-05-25 04:28:03 +00:00
35a9d3d1e1 0505: system add-on updates, fixes
Note: I am not 100% sure what happens with an app update. If this is divorced from that check now, you should be able to get FF updated without any system addons. We'll have to wait until 62 needs an update to test it. In the meantime I've edited the [NOTE]. I've also left this inactive (eg imagine if they pushed a critical update for formfill), so this is an end-user decision. Added to sticky to revisit this pref
2018-05-25 04:03:59 +00:00
c66d1b08e7 remove network.http.fast-fallback-to-IPv4
the default is true anyway for ESR52.x and FF60+ (and I assume for FF52+) branches
2018-05-25 02:07:10 +00:00
0a63b6545d 4500: tweak 2018-05-23 17:53:16 +00:00
a8051b88e4 1803: 3rd time's a charm 2018-05-23 17:41:25 +00:00
87ce12925d 1803: tweak 2018-05-23 17:21:49 +00:00
d6a7531c67 1803: flash/java/npapi fixes 2018-05-23 17:05:29 +00:00
3a77e18ae8 RFP: OS locale & HTTP Accept-Language header
https://bugzilla.mozilla.org/show_bug.cgi?id=1459089 . When/if it gets uplifted to 61, I'll update.
2018-05-23 11:07:06 +00:00
a635ae5dfb 2730 + 2750: Storage API + Offline Cache
https://bugzilla.mozilla.org/show_bug.cgi?id=1450448
2018-05-23 08:55:19 +00:00
02bac31e6a nits () 2018-05-17 04:31:28 +12:00
e5d23f6b40 60-beta 2018-05-15 20:40:12 +00:00
5fc48a1027 Create ghacks-clear-FF60inclusive-[RFP-alternatives].js 2018-05-16 07:29:33 +12:00
de7a8650f7 Create ghacks-clear-FF60inclusive-[removed].js 2018-05-16 07:29:11 +12:00
9c7170fc26 Create ghacks-clear-FF60inclusive-[deprecated].js 2018-05-16 07:28:32 +12:00
9406f32194 Delete ghacks-clear-all-up-to-57-[the-rest-inactive].js 2018-05-15 17:43:01 +00:00
33759ab604 Delete ghacks-clear-all-up-to-57-[the-rest-active].js 2018-05-15 17:42:46 +00:00
f97c9a05a9 Delete ghacks-clear-all-up-to-57-[removed].js 2018-05-15 17:42:30 +00:00
94abd71787 Delete ghacks-clear-all-up-to-57-[deprecated].js 2018-05-15 17:42:13 +00:00
45f1dfa912 Delete ghacks-clear-57-[changes-only].js 2018-05-15 17:42:00 +00:00
d6280d2d7a Delete ghacks-clear-all-up-to-57-[RFP-alternatives].js 2018-05-15 17:41:43 +00:00
67360332ab FF60+ parrot info 2018-05-15 15:44:37 +00:00
b880c9da61 add network.ftp.enabled 2018-05-11 18:14:40 +02:00
1b0c9f66d9 2600s renumber/reorder 2018-05-08 04:13:53 +12:00
7eda26a1d0 2600s numbering part1 2018-05-07 15:51:50 +00:00
b89e247263 0707: DoH, fixes 2018-05-07 14:57:42 +00:00
35fd4e343c 2671 cleanup 2018-05-06 20:41:14 +00:00
47cf0e1640 2617 pdfjs tweak
that trims 3 lines off with a little formatting
2018-05-06 18:41:10 +00:00
5e7258ba2d remove 0705, fixes 2018-05-06 17:07:09 +00:00
6e6a993494 2672 punycode tweak 2018-05-06 16:57:00 +00:00
772fa4e06e geo changes, fixes
NOTE: RFP still blocks geo, but this will be reverted at some stage: see https://bugzilla.mozilla.org/show_bug.cgi?id=1441295
2018-05-06 13:10:30 +00:00
78dc31f6d6 remove 5 prefs 2018-05-06 12:30:40 +00:00
459396ed5b 2626: remove useragent.compatMode
I see no point in keeping this to enforce a default that FF itself doesn't use - see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent/Firefox
-  "... is an optional compatibility token that some Gecko-based browsers may choose to incorporate, to achieve maximum compatibility with websites that expect Firefox"
2018-05-06 10:00:13 +00:00
88b08c79cd 2685 tweak 2018-05-05 18:44:52 +00:00
cf269c982b fixup number ref 2018-05-05 18:26:33 +00:00
36c11cb5d4 2600: downloads + extensions regroup ()
* 2600: downloads + extensions regroup

* fixup
2018-05-06 06:14:57 +12:00
517b8665c0 2685 fixup 2018-05-05 17:01:09 +00:00
149aab6b1e 2600: security regroup ()
* 2600: security regroup

* fixup
2018-05-06 04:21:21 +12:00
c5a1a038d2 5000: remove view_source.tab (moved to 9999) 2018-05-05 14:40:20 +02:00
cd322f39a4 2613: restrictedDomains 2018-05-04 21:55:51 +00:00
8f2b674910 60 deprecated/removed part2 2018-05-04 21:42:47 +00:00
7d65d8c173 4503 mozAddonManager => active 2018-05-04 21:18:45 +00:00
8b6eec2b46 RFP ESR version spoof info
The last one-off ESR cycle of 8 releases is now behind us, new algorithm for FF60+ is back to 7 releases per ESR numbering, starting at 60... 67... etc. Note: This does not do anything for Aurora or Nightly spoofing the next ESR early (but we have until Nightly 67 before this becomes a problem). The ticket 1418162 was meant to cover this but instead was just used for the new algorithm. There is currently no ticket for the Aurora/Nightly issue - but never fear, Pants is here!! It is not forgotten, and I have emails with Tom Ritter et al on it
2018-05-04 18:30:44 +00:00
13164a2d0d 4500s: RFP disable WebGL debug renderer info (60+) 2018-05-04 17:23:26 +00:00
c4a1583e99 60 RFP Alternatives 2018-05-04 17:11:34 +00:00
d10c8598f7 60 deprecated/removed prefs 2018-05-04 16:56:14 +00:00
40db113d07 2706: same-site cookies 2018-05-04 16:08:20 +00:00
041e14a4d5 ghacks-user.js updater for Mac/Linux v1.3 ()
* updated shebang

* The script now compares its version number to the one online.  If there is a newer version of `updater.sh` online it ask the user if he wants to download and run it.
   * 2 parameters are supported: `-donotupdate` to disable the update-check and `-update` to auto-download and run the new version without asking

* Backup files are now saved to the directory `userjs_backups` instead of causing more bloat in the profile directory.
2018-05-03 14:49:43 +02:00
e67fdc2ce4 5000s: ui.key.menuAccessKey 2018-04-29 19:21:58 +00:00
75534b4e6c 0515: uploading to Screenshots server 2018-04-29 13:42:02 +00:00
94c0665343 fix wiki test info on SB 2018-04-28 07:30:47 +00:00
71adc43d17 v1.1 regex fix () 2018-04-25 22:56:54 +02:00
94f86465e6 updater for Windows v4.5 ()
support commenting-out active user-prefs with the merge function
2018-04-25 21:28:09 +02:00
bb4bf835b0 v2.1 - fix TABs in regex
for some unknown reason the tabs got replaced with spaces
2018-04-25 02:22:14 +02:00
b4f1b4dbbf prefsCleaner.sh (for Linux/Mac) ()
Port of the prefsCleaner.bat for anything(?) with a bash shell.
2018-04-24 14:47:50 +02:00
f90c17f748 prefsCleaner 2.0
- massive speed improvement !! m-a-s-s-i-v-e !
- small fix to the time format used in backup filenames (replace space with zeros)
- better tolerance for special characters within preference names (which counters [the one downside that v1.2 brought along](https://github.com/ghacksuserjs/ghacks-user.js/pull/321#issuecomment-354394222)).
- other minor things, mostly to do with Delayed Expansion and the removal of it

known issue (but not really an issue):
- it skips instances of `user_pref` that have any quote or double-quote before `user_pref` (like `// "this" user_pref`)
2018-04-22 14:16:05 +02:00
fdac8fba6a Update prefsCleaner.bat 2018-04-22 01:34:48 +00:00
d055560f6f 0514: tweak 2018-04-21 17:26:12 +00:00
27f87240ec 0514: Activity Stream, fixes
AS is out of control. No master switch in FF60+, and in order to 100% sure nothing is collected locally (or external connections made), there are now some 28 prefs (including those coming in FF61). This is re-DICK-ulous. We're not going to bother tracking all that, let alone the labyrinth of code. All users are advised to just make sure they remove the XPI every time they update FF.
2018-04-21 16:33:35 +00:00
17d83c1a1a 1600 info: fixes , refixes 2018-04-21 16:22:04 +00:00
8fa3a9db6b fix for missing empty lines 2018-04-21 14:34:08 +00:00
b0fb59f735 shit is so fast I can't even read 2018-04-18 22:42:06 +00:00
64d08dd6bc Update updater.bat 2018-04-18 20:33:39 +00:00
824dec4f9e Update prefsCleaner.bat 2018-04-18 20:29:39 +00:00
3d2b0703be actually working v2 2018-04-18 18:49:36 +00:00
e25137ce94 v2
Mostly a bump in performance.
2018-04-18 16:18:43 +00:00
6ee25c2bf5 change last commit to number 0380
note to self: listen to earthlng more
2018-04-13 17:27:45 +00:00
6309822d33 0352: browser error reporter 2018-04-13 17:19:31 +00:00
d04ff8457e 2730b: disable appCache on insecure sites FF60+ 2018-04-12 17:38:22 +00:00
c6e3c013e0 4500: RFP info on plugins/mimetypes 2018-04-10 17:25:23 +00:00
e373a0f6e1 1273: add "Not Secure" text on HTTP
https://bugzilla.mozilla.org/show_bug.cgi?id=1335970
2018-04-05 18:57:08 +00:00
acce871308 2701: cookies role in persistent data, fixes 2018-04-04 10:42:52 +00:00
61e706641e 2800 section header info 2018-04-04 10:21:40 +00:00
1e5e2ca418 start 60 commits 2018-04-04 10:18:23 +00:00
c62bff5c70 end of v59 2018-04-04 10:14:15 +00:00
3bae3ed5ba move 2711 to 2600s
2711 is about web extension data and does not fit in the 2700s is all about websites' persistent data, i.e items that sanitizing and Storage Manager deal with. Dumping in 2600's which is getting a revamp later
2018-03-30 16:20:56 +00:00
aa91ea1680 4000: FPI indexedDB info 2018-03-27 23:03:53 +00:00
d244198438 RFP: CTRL key fix backported to 59.0.2 2018-03-27 17:03:36 +00:00
871e7ed87b minor edits, settings info 2018-03-27 10:08:20 +13:00
48901d156a 2621: add [SETTING-ESR] 2018-03-26 21:03:53 +00:00
8b4e6c95aa xpinstall.whitelist.required, fixes 2018-03-26 20:23:06 +00:00
fd1aa74ff3 Options> and [settings] ()
* Options> and [settings]

While I'm at it, I'm changing the 21 instances of
- `[SETTING-56+]` to just `[SETTING]`
- `[SETTING-ESR]` to `[SETTING-ESR52]` because we'll leave those in until 62 (yes I know they may apply to earlier ESRs, but people should be upgraded). Thus no ambiguity with ESR60 vs ESR52 users for the overlap
2018-03-27 08:49:39 +13:00
b3e92ab7cc fixup // default syntax 2018-03-26 19:44:15 +00:00
30fbaba4df 2203: undo sh*t
This is so wrong: It is better to inform users that 3 **must** be used than rely on zero info as well as removing useful info on what the values do. All future issues with this will be directed to earthlng. Remove RFP info as RFP users should know this stuff if they turned it on. Non RFP users, who we told they can bypass it, will not have a reference to RFP now. Enforce will now be banned as a word because, "reasons".
2018-03-26 19:33:46 +00:00
72e1858926 how did this get left behind 2018-03-26 17:13:46 +00:00
3ad6ed465e 2200s: more tweaks 2018-03-27 06:04:31 +13:00
3fcad90996 2200s: tweaks 2018-03-27 05:01:30 +13:00
383b8ca943 revamp 2400s: fixes 2018-03-26 20:34:02 +13:00
6a98aa7ba0 2750+2730: enable appcache + storage 2018-03-25 12:59:49 +00:00
2037449fbd 2750: rethinking it
add `browser.storageManager.enabled` back but enforce it as true - otherwise people may never pick up on the fact we dropped it and may never reset it, and never see their shiny new UI section. When it's deprecated, *then* we can remove it
2018-03-25 10:56:49 +00:00
e18bd0f32c 2750: stop hiding Storage Manager UI
pref will be removed, 99% sure it was just a pref used internally to hide it from stable during testing in beta/nightly - see https://bugzilla.mozilla.org/show_bug.cgi?id=1428306. Makes zero sense to hide this new UI section since we will be turning SM on anyway (the section is important for end users to exist and be working esp thru QuotaManager and Storage v2 changes etc).
2018-03-25 10:50:52 +00:00
715fff06cf clean up 2202+2203 2018-03-25 10:07:27 +00:00
3675a68009 2201+2205=>2400's
new numbers 2401 and 2404 do not exist anymore in the user.js so safe to use
2018-03-25 09:53:52 +00:00
062dd6c023 0500s: System Add-ons not system extensions
they're still called System Add-ons: https://firefox-source-docs.mozilla.org/toolkit/mozapps/extensions/addon-manager/SystemAddons.html
Thanks!
2018-03-21 04:53:53 +13:00
bc17b4e450 0500s: shield->normandy info, fixes 2018-03-20 15:29:37 +00:00
682e12fe57 4500: RFP ctrl key info
Sorry, the patch for 59 was backed out, so RFP users will have to put up with CTRL key issues until 60 lands
2018-03-20 12:54:10 +00:00
6cb27ca78c 0351: [setting] info 2018-03-20 05:47:04 +00:00
c38ae56232 0333: [setting] info 2018-03-20 05:42:05 +00:00
04f1449003 0512: shield pref name changes 60+
https://bugzilla.mozilla.org/show_bug.cgi?id=1436113
2018-03-20 03:57:18 +00:00
53a69ff5bc [SETTING] fixups 2018-03-19 14:13:00 +00:00
e8c02278eb 2676: forgot FF version 2018-03-17 06:36:08 +00:00
457611f079 59-alpha release 2018-03-17 05:06:15 +00:00
09aca71822 2676 fixup 2018-03-17 05:32:40 +01:00
f90193ab76 1600s: vimeo reference fixes 2018-03-17 02:56:36 +00:00
ffced9b4c0 2676: disable CSP security violation events 2018-03-17 02:27:39 +00:00
0b3395b520 2516: disable PointerEvents 2018-03-17 01:53:23 +00:00
d4a20165ef 0330: telemetry fixup 2018-03-14 15:08:33 +00:00
089f0826cf 0330: more telemetry 2018-03-14 15:00:13 +00:00
b83d53e681 bugzilla ref changes fixups 2018-03-14 14:03:04 +00:00
14456b5a29 bugzilla ref changes
note: picked up a leading space on 2206. Please double check for any errors or missed opportunities (I scanned it three times), 1221 is about the only one that's a bit messy I think
2018-03-15 02:22:58 +13:00
517e40703f reference: http->https 2018-03-14 11:19:09 +00:00
7f7282a975 59 deprecated tweaks 2018-03-14 11:05:37 +00:00
6fd415eab2 59 RFP Alternatives 2018-03-13 19:26:39 +00:00
d4083e6a3e 59 deprecated/removed prefs [part 2]
Note: I moved the (part`x`) bit to the end of the bugzilla from previous commit as I like the https* bit to all be in line = visually easier to parse IMO
2018-03-13 18:56:22 +00:00
3192027f52 59 deprecated/removed prefs [part 1] 2018-03-14 05:52:14 +13:00
2a402310cc fixup: missing line break 2018-03-13 09:23:17 +00:00
1469e13df8 section 0700
This is a start to reducing section 2600 (which I renamed it to just miscellaneous). We can always revisit this new section and add to it down the track if required. Note: added a second ref [2] under 0703. Note: re-numbered & re-positioned deprecated prefs for SPDY
2018-03-13 09:04:54 +00:00
92585ecd93 browser.link.open_newwindow
adding this back in (so it is not missing for release changes), section will get a makeover, see linked issue
2018-03-13 08:00:20 +00:00
205d64ab29 4500: RFP keyboard ctrl key 2018-03-08 00:54:47 +00:00
3812aed9e9 Update troubleshooter.js 2018-03-05 14:19:34 +01:00
a83f5a0f5f Merge pull request from claustromaniac/patch-2
Update updater.bat
2018-03-02 12:19:43 +01:00
19c40eeb18 fixup 2018-03-02 05:10:11 +00:00
61d2b46a02 5000: identity.fxaccounts.enabled, fixes 2018-03-02 05:09:29 +00:00
b93c7e026c revamp 5000 fixes 2018-03-02 16:53:39 +13:00
ec687cad75 remove 5020
"remove 5020 because the values we set are the default values in Mac + Windows. Linux sets it the other way around: false+true instead of true+false"
2018-03-02 03:13:39 +00:00
6b691ae7e3 remove 5016
covered by 5015 and only designed as a temporary pref AFAIK until issues with its timing and use (too distracting) are sorted
2018-03-02 02:39:45 +00:00
40da3653d3 remove 5007
the default value is 3 anyway, and there it has a UI checkbox setting - don't ask me why a checkbox which only allows two values (2 or 3)
2018-03-01 21:12:40 +00:00
77a5894fa0 remove 5021*
These are all at default values, no need to enforce. As for removing them, we're de-cluttering the section and these just aren't that important. Anyone who wants to play with tab ordering/focus/etc could probably use an extension (API's?) and/or easily find these and look them up
2018-03-01 20:57:45 +00:00
11bcf46063 Update updater.bat 2018-03-01 19:15:10 +00:00
2dd2f5febe 0409: it is now 0201: see previous commit
whoops .. missed removing this part: overworked, underpaid, poor pants needs a beer
2018-03-01 12:48:31 +00:00
2de13258ff 4609 + 4612: move back to 0200s
geolocation blocking via RFP will be removed (see https://bugzilla.mozilla.org/show_bug.cgi?id=1441295), and since either way you look at it (those who use RFP or not) the user.js blocks geo, so we might as well move this stuff back to section 0200
2018-03-01 12:26:10 +00:00
40391a26a2 2629 - link added
link [1] is the ticket where the pref was initially added in FF42 with default `false`. The new link details the changes to the pref since then.
2018-03-01 12:12:24 +01:00
50186412e4 2621 - default info added
default is true in all current versions (ESR, Release, Beta, Nightly) and OSes
2018-03-01 12:09:09 +01:00
9892c3cbb7 4500: RFP canvas
1376865 was back ported to 59, so canvas prompt fatigue will be reduced. Note: the default for non-prompts is the same as if you clicked "Don't Allow" - i.e it serves up a 10x10px white square
2018-03-01 04:32:12 +00:00
887e93a4f2 4500: RFP WebGL stuff 2018-02-28 12:19:36 +00:00
7f1a82365c 4500: RFP UA spoof stuff
Cleaning up the UA spoof stuff in the sticky, as a ticket was just closed (52 is now a temporary hard-coded value: 1418672 - I guess they're running out of time), so also cleaning up the info, and consistent layout

Two issues: The code to determine the ESR number is out of whack (by one) since the next ESR is 60. 59 stable is almost here. So they have decided to hard-code the value as 52, for now. The second issue is that Aurora/Nightly are ahead of stable/ESR and can thus unmask themselves as Aurora/Nightly. The hard-coded value for now also solves this.

If you follow the sticky for RFP, you will see there is a ticket for using the update channel information (eg stable, beta, dev, nightly etc) to determine when and how calculate the version spoof in future, and they'll also rejig the numbering algorithm to account for ESR being out by one. These are tickets https://bugzilla.mozilla.org/show_bug.cgi?id=1418162 and https://bugzilla.mozilla.org/show_bug.cgi?id=1428111
2018-02-28 12:10:05 +00:00
8996071cd0 start 59 commits 2018-02-27 13:56:08 +00:00
cc166b8091 4500 RFP keyboard stuff 2018-02-27 12:47:06 +00:00
0260176fef 4500: RFP canvas stuff 2018-02-27 11:59:37 +00:00
09e2b181e4 4500 RFP stuff 2018-02-27 11:31:03 +00:00
4dafbb89df 0330: missing comma 2018-02-24 10:54:16 +00:00
5e08ad8c60 0330: use data:, for toolkit.telemetry.server
see 3d5276484a (commitcomment-27760142)
2018-02-24 10:53:04 +00:00
6366ab8afc Merge pull request from claustromaniac/patch-1
Fix updater URLs before someone bitches about it
2018-02-24 08:07:52 +01:00
2980073bca increased revision number
OK that's it. This time it's for reals.
2018-02-23 07:02:11 +00:00
e8b9f72885 Fix updater URLs before someone bitches about it
/raw/master/ URLs are no longer working on my end. 

That's it.

Yes, really.
2018-02-23 06:47:38 +00:00
b502317caf Merge pull request from ghacksuserjs/earthlng-patch-1
default values cleanup
2018-02-19 12:34:48 +00:00
5385b8c4ab remove 5017: ui.submenuDelay 2018-02-19 12:24:28 +00:00
17fe261170 default values cleanup
These default values are the same in all OSes and all current Firefox versions (ESR, Release, Beta, Nightly).
Apart from alerts.showFavicons these defaults are most likely never gonna change
2018-02-19 11:49:40 +01:00
3d5276484a 0370 fixup
data: works perfectly fine here. No need to use https and no need to connect to localhost because something could be listening there.
data is the fastest and best solution.
2018-02-19 11:40:53 +01:00
542b814814 remove 5024+5025: media.* 2018-02-17 02:19:20 +00:00
0473c73860 2420 + 2421 2018-02-16 18:39:01 +01:00
a6fd4d1db1 2421: baseline JIT update info 2018-02-13 07:13:59 +00:00
95251e98da spelling mistake 2018-02-08 15:33:05 +00:00
08a5410b88 1407: restart info duplicity 2018-02-07 00:49:58 +00:00
93a8f89191 Merge pull request from ghacksuserjs/earthlng-patch-1
1600 cleanup and header-rewrite
2018-02-07 00:11:47 +00:00
4fdf322193 CSRF acronym 2018-02-06 23:57:34 +00:00
ca11a88189 minor edits 2018-02-06 23:50:30 +00:00
a290b3ad3d 1600 cleanup and header-rewrite 2018-02-06 20:09:11 +01:00
d924c01518 ESR deprecated rewording 2018-02-06 01:10:45 +00:00
1738f9efb1 58-alpha release 2018-02-04 00:20:36 +00:00
3ef5ba3ac7 v1.4
- removed `network.cookie.thirdparty.sessionOnly` because it can't break sites
- added `permissions.default.shortcuts`
2018-02-03 14:21:57 +01:00
2969ab5b13 added 2305: default permission Notifications 2018-02-03 03:56:16 +00:00
3405bae6d8 added 2632: block sites overriding FF KB shortcuts
Note: I tested the value of 1 when changing from 2-block to make sure that it actually changed to allow in the panel. Am keeping my eye on the delete and backspace keys and will remove the line when it is fixed
2018-02-03 03:38:06 +00:00
a4eaf9494e added 4612: default permission location 2018-02-03 02:32:51 +00:00
ea6e9be787 added 2024: default permissions camera/mic 2018-02-03 02:17:20 +00:00
0ebe5d0fa8 1405: WOFF2 info
https://developer.mozilla.org/en-US/docs/Web/CSS/@font-face - see Compat table
2018-01-31 13:57:34 +00:00
ff77f7260c remove 2513: Presentaion API fixes 2018-01-29 14:37:36 +00:00
93c3457d18 2427: js shared memory
MZ are flipping and a flopping on the value for a while now, lets enforce as false, specially since Spectre
2018-01-29 13:35:20 +00:00
bc371c8c9d Update user.js 2018-01-29 14:05:13 +01:00
622b70aa37 whoops.. relocate old 1108 to 2600's not 2400s 2018-01-29 12:55:01 +00:00
c83670f708 1100's: goodbye e10s section 2018-01-30 01:25:14 +13:00
c399bb1d2d Update README.md 2018-01-25 04:25:39 +13:00
0a11a87fd0 Update README.md 2018-01-25 04:06:00 +13:00
91521dbc84 1106: fix mistake
default is 1! https://dxr.mozilla.org/mozilla-release/source/modules/libpref/init/all.js#3327

>1 breaks extensions apparently: https://github.com/ghacksuserjs/ghacks-user.js/issues/346
2018-01-24 00:31:01 +01:00
14c1620994 0205: intl.locale.requested FF59+ 2018-01-22 18:49:39 +13:00
0da73d606b 0351: crash reports pref name change 2018-01-22 10:13:28 +13:00
6a0f162d64 Update troubleshooter.js
dom.idle-observers-api.enabled not used anymore since at least FF38
security.xpconnect.plugin.unrestricted not used anymore since at least FF10
2018-01-19 11:06:02 +01:00
038201fb07 Updater for Windows v4.3
Changes:
- The script doesn't touch the `user.js` file until it really has to.
- The merge function is a bit smarter parsing files, at no significant cost.
- Fixed a minor issue with the version check.
- Minor syntactic changes here and there.
- creates timestamped backup files rather than always overwriting user.js.bak.
(use -singlebackup if you prefer a single backup file)
2018-01-18 17:17:47 +01:00
91c8da5f12 2706->2702 merge: 3rd party cookies + sessionOnly 2018-01-18 20:26:49 +13:00
22198d420a forgot to update the showhelp function 2018-01-18 01:18:05 -03:00
6becf50fe6 4500: RFP keyboard events FF59+ 2018-01-18 15:55:57 +13:00
4fb3040042 replaced -multibackups with -singlebackup
also minor changes to the merge function.
2018-01-17 12:30:02 -03:00
5005376742 0417: disable SB data sharing 2018-01-17 17:33:45 +13:00
48f95f2ac7 2706: set 3rd party HTTP cookies as session-only 2018-01-17 17:21:06 +13:00
e5c14eb700 tidy up info on prefs that require a restart
this is not all prefs, just some that we already documented
2018-01-17 16:40:39 +13:00
7a3810f6ca Update troubleshooter.js 2018-01-16 16:52:24 +01:00
c8d7694fd3 I really don't like the online editor 2018-01-16 11:13:07 -03:00
343f77c5e9 minor fix on the version check
'IF !_line! GEQ 4 (' is not reliable.
2018-01-16 10:46:57 -03:00
a0ec17955d tiny change 2018-01-16 01:27:36 -03:00
e195aceb54 Updater 4.3
Changes:
	-The script doesn't touch the user.js file until it really has to.
	-The merge function is a bit smarter parsing files, at no significant cost. See examples below.
	-Minor syntactic changes here and there.
Additions:
	-New -multiBackups argument. I personally intend to use it to compare files and quickly review changes.
2018-01-15 22:15:30 -03:00
6882a64bf2 troubleshooter v1.2 2018-01-15 20:19:34 +01:00
806d6edc6d 1211+1212: clarify things better, fixes 2018-01-16 06:51:21 +13:00
d1ab8fd10c troubleshooter v1.1 2018-01-15 17:06:22 +01:00
db97478cd1 1106: number of processes default 2018-01-16 04:11:31 +13:00
48ec3da18d 0000: about:config warning
Ready... Steady... turn off about:config warning... GO!! Welcome to Firefox prefs 101 :)
2018-01-15 05:32:51 +13:00
8c35bf5d11 1212: note about pointlessness of soft-fail 2018-01-14 10:41:16 +01:00
a3bffb83bd Update troubleshooter.js
https://github.com/ghacksuserjs/ghacks-user.js/issues/339
2018-01-14 09:41:30 +01:00
b30b988137 1211+1212: OCSP info tweaking, fixes 2018-01-12 05:26:42 +13:00
f820ecbacb 2420: asm.js info tweak, fixes 2018-01-12 05:08:36 +13:00
3acef78f59 4500: RFP UA spoof add 1404608 info (OS spoof) 2018-01-11 12:44:52 +13:00
ac16b9c77b Update troubleshooter.js
adding 'privacy.trackingprotection.enabled'. see https://github.com/ghacksuserjs/ghacks-user.js/issues/327
2018-01-09 16:20:06 +01:00
1069915372 Create troubleshooter.js 2018-01-09 16:03:46 +01:00
978e51b515 1603: add warning, fixes 2018-01-08 02:24:16 +13:00
c5374b60d8 workers/service workers uM workaround 2018-01-06 12:09:30 +13:00
2a2b80902a fixes/info to issues in FF58+59
FYI, the bugzilla for the fix in the header about cookies being needed for extensions + IDB is https://bugzilla.mozilla.org/show_bug.cgi?id=1406675
2018-01-05 12:23:56 +13:00
d82791a933 1241->active: block mixed passive content 2018-01-05 09:02:59 +13:00
d89e9834ff Update README.md 2018-01-05 00:29:24 +13:00
04c7ed94da add license 2018-01-02 13:30:59 +13:00
c82d6f70fe start 58 commits 2018-01-02 12:56:16 +13:00
dd29583735 Update .gitattributes 2017-12-30 19:33:25 +01:00
e3ad7055dd prefsCleaner 1.2
- Search string made case-sensitive, because Firefox preferences are.
- The script now uses regex, which allows it to understand `user.js` files formatted using single quotes, spaces and/or tabs in `user_pref` lines.

Trade-off: it can no longer reset preferences that include some special characters in their names. Not an issue for now, just something to remember.

See full discussion [here](https://github.com/ghacksuserjs/ghacks-user.js/pull/321).
2017-12-30 19:25:57 +01:00
c1c368bce9 1.2
- Search string made case-sensitive, because Firefox preferences are.
- The script now uses regex, which allows it to understand user.js files formatted using single quotes, spaces, or tabs.

Trade-off: it can no longer reset preferences that include some special characters in their names. Not an issue for now, just something to remember.
2017-12-29 20:14:08 +00:00
73f03c449f Merge pull request from ghacksuserjs/2700-renumber
2700's section revamp 
2017-12-27 16:49:00 +01:00
31ec621d3f typos 2017-12-27 20:23:27 +13:00
8f02a5bc40 2720->2730 reference 2017-12-27 20:21:54 +13:00
73811e49be 2700's section revamp 2017-12-27 20:13:41 +13:00
d7ab2f83e4 updates to prefsCleaner + updater.bat
Daily round of tweaks
2017-12-27 05:01:21 +01:00
c0f9e6ab2b Update prefsCleaner.bat 2017-12-27 04:59:24 +01:00
7cd2c650cb fix for previous commit
Take it or leave it. Up to you, as always.
2017-12-27 03:32:58 +00:00
a1f10513ea 1.2 2017-12-26 20:06:41 +00:00
74f18db85a 1.1 2017-12-26 20:04:57 +00:00
2ad3fbdbd3 Update updater.bat 2017-12-26 19:37:39 +00:00
68a44bcbb4 cosmetic fix
for calls to :message before the script begins logging (with -log)
2017-12-26 17:29:11 +00:00
1f15e287fb Updater for Windows 4.1 2017-12-26 00:30:49 +01:00
65b64f44b6 Update updater.bat 2017-12-26 00:16:27 +01:00
643206a3da autoparrot - second try 2017-12-25 15:30:09 +00:00
05ac6dd0ec autoparrot 2017-12-25 08:18:41 +00:00
daff5f6fa6 cosmetic fix + formatting
the fix in question just removes the extra space in the version + date output (line 91)
2017-12-25 03:48:39 +00:00
018fb2a321 cosmetic stuff 2017-12-25 03:33:36 +00:00
4f22afac7f rewording 2017-12-25 00:51:56 +00:00
94bbb6bab4 minor change 2017-12-24 16:55:17 +00:00
b9266bba1d 4.1
- added missing -unattended switch to the list of switches
- other minor changes
2017-12-24 16:49:33 +00:00
68efac4cc8 url change 2017-12-24 16:30:53 +13:00
db5706d949 url change 2017-12-24 16:29:36 +13:00
3ffdd67904 url change 2017-12-24 16:29:18 +13:00
83de87b18d url change 2017-12-24 16:28:58 +13:00
99016960fa url change 2017-12-24 16:28:33 +13:00
52efb2af7a url change 2017-12-24 16:27:47 +13:00
dbe0056c95 4500: canvas site permissions 2017-12-23 03:32:02 +13:00
987c996cce Update README.md 2017-12-22 02:04:37 +13:00
a1cae1ae74 Update README.md 2017-12-22 02:03:42 +13:00
0938d7bab2 add license 2017-12-22 02:02:57 +13:00
490d81657f Update README.md 2017-12-19 18:37:24 +01:00
4170529e39 Add files via upload 2017-12-19 17:31:49 +01:00
ffae671b27 Delete prefsCleaner.bat 2017-12-19 17:29:36 +01:00
48861e57e1 Add files via upload 2017-12-19 17:26:58 +01:00
b74b79f11c Delete prefsCleaner.bat 2017-12-19 17:26:39 +01:00
13534e33bc Add files via upload 2017-12-19 17:25:14 +01:00
148daa94cf Delete updater2.bat 2017-12-19 17:24:36 +01:00
88b08d4ac5 Delete updater.bat 2017-12-19 17:24:19 +01:00
ea76ea91af Add files via upload 2017-12-19 17:22:32 +01:00
8af0d4fa7a Update .gitattributes 2017-12-18 17:27:51 +01:00
877d6a5af2 Delete test.bat 2017-12-18 16:58:02 +01:00
e0cd64391c Create test.bat 2017-12-18 16:56:28 +01:00
464ffcd7e6 Update .gitattributes 2017-12-18 16:54:38 +01:00
16e8d6ca7a Update updater.bat 2017-12-18 16:48:15 +01:00
21b21d2adb Update .gitattributes 2017-12-18 16:44:36 +01:00
6973bb459c FIND instead of MORE
to keep TABS intact
2017-12-18 16:33:21 +01:00
1571e067e7 convert to CRLF on the fly
MORE also converts TABs to spaces, by default to 8 but I changed it to 4
2017-12-18 16:01:46 +01:00
1789fd902b Delete test.bat 2017-12-18 15:39:01 +01:00
8f4ab83301 Create test.bat 2017-12-18 15:38:18 +01:00
eeef37154d Update updater.bat 2017-12-18 15:10:35 +01:00
be563241d6 Update updater.bat 2017-12-18 15:10:18 +01:00
002780df8c Convert BAT line-endings to CRLF 2017-12-18 15:07:20 +01:00
901670fffc Convert BAT line-endings to CRLF
LF is messing with calls to :message in the updater, at least on my end.
2017-12-18 12:26:03 +00:00
3a403cd120 Updater for Windows v4.0
Fixes:
	- Merge function:
		*no longer has the potential to truncate super long lines. (8KB per line still IS the max!)
		*no more issues with exclamation marks in user_pref lines.

Improvements:
	- Overall better performance due to ECHO syntax changes.
	- Merge function on steroids! Faster than ever

Changes, Additions, Substractions:
	- Leading spaces are no longer ignored by the merge function. Lines to be merged must begin with user_pref.
	- Added header with name, author, version.
	- Added help sub-menu.
	- Added special message when no override files are found when using -multiOverrides.
	- Formatting changes.
2017-12-17 17:13:18 +01:00
25321e7262 4.0? 2017-12-17 15:59:55 +00:00
ca947c6ae4 4.0b3 - ignore the previous commit lol 2017-12-17 15:02:52 +00:00
c9f62822a6 4.0b3
- Fix for empty lines.
- Went back to using FIND in the main loop for the good reasons stated by @earthing
2017-12-17 15:01:06 +00:00
240bcbfbee 4.0b2
Not all issues fixed yet.
2017-12-17 13:46:39 +00:00
1262edee61 tiny issues
space instead of TAB, missing quotation marks and suppressing the error message when no *.js files are found in the OR-folder
2017-12-17 13:02:34 +01:00
2f5ae9b294 v4.0b
Fixes:
	- Merge function:
		*no longer has the potential to truncate super long lines.
		*no more issues with exclamation marks in user_pref lines.

Improvements:
	- Overall better performance due to ECHO syntax changes.
	- Merge function on steroids! Faster than ever, and no longer generates temporary files at all. As it always should have been.

Changes, Additions, Substractions:
	- Leading spaces are no longer ignored by the merge function. Lines to be merged must begin with user_pref.
	- Added header with name, author, version.
	- Added help sub-menu.
	- Added special message when no override files are found when using -multiOverrides.
	- Formatting changes.
2017-12-16 17:55:08 +00:00
fbd9f344af prefs.js cleaner for Windows v1.0
thanks @claustromaniac!
2017-12-15 21:11:53 +01:00
323da46204 4500: RFP warn if language set to non en-US
fixes 
2017-12-16 05:21:08 +13:00
28f06b41e3 Merge pull request from claustromaniac/master
Updater for Windows 3.2
2017-12-10 15:55:15 +01:00
77ca6af2d9 I said 3.2.
I'm not me if I don't miss something.
2017-12-10 01:20:39 +00:00
e663b8a968 3.2
Prevent issues handling the script when the name includes spaces.

+ Formatting.
2017-12-09 16:49:42 +00:00
f8ec9cebdd fix url 2017-12-09 10:31:09 +13:00
24df3274f1 fix url 2017-12-09 10:29:29 +13:00
f5a4ec0cbd fix url 2017-12-09 10:28:58 +13:00
abbbf8ef0e fix url 2017-12-09 10:28:28 +13:00
b9c8329778 fix url 2017-12-09 10:27:58 +13:00
8f68ee3e9e fix url 2017-12-09 10:27:21 +13:00
4d2c26790f wiki link changes 2017-12-09 07:51:35 +13:00
ab492c58c3 0850a: remove cruff 2017-12-09 07:05:15 +13:00
4fc7490405 comment out three items see 2017-12-09 06:20:16 +13:00
11b0b779b8 fixes 2017-12-09 06:13:40 +13:00
4ae5967e09 Update ghacks-clear-all-up-to-57-[the-rest-inactive].js 2017-12-09 02:02:04 +13:00
ebd233bf6e Create ghacks-clear-all-up-to-57-[the-rest-active].js 2017-12-09 02:00:56 +13:00
f2ed64c576 Update ghacks-clear-all-up-to-57-[the-rest-inactive].js 2017-12-09 01:58:27 +13:00
f09c860d96 clear inactive: move parrot to end 2017-12-09 01:33:38 +13:00
753c4695a6 oophs 2017-12-09 01:28:50 +13:00
7655648174 clear removed: move parrot to end 2017-12-09 01:28:16 +13:00
f8472fe501 clear deprecated: move parrot to end 2017-12-09 01:27:05 +13:00
d82475a7c3 clear RFP-alts: move parrot to end 2017-12-09 01:25:14 +13:00
008257283b 2508: hardware acceleration
I guess we can revisit this when Tor ESR59 lands or even later when WebRender is fully implemented. For now, users can override it if they wish
2017-12-09 00:56:53 +13:00
d9e935de3c syntax fix 2017-12-08 12:47:31 +01:00
e73eeefa64 Update ghacks-clear-all-up-to-57-[the-rest-inactive].js 2017-12-08 21:01:28 +13:00
744944a9ab Create ghacks-clear-all-up-to-57-[the-rest-inactive].js 2017-12-08 20:26:49 +13:00
5631fadd4a Update ghacks-clear-all-up-to-57-[RFP-alternatives].js 2017-12-08 19:38:08 +13:00
ea54827582 Create ghacks-clear-all-up-to-57-[RFP-alternatives].js 2017-12-08 19:24:32 +13:00
28ba2a705a Create ghacks-clear-all-up-to-57-[deprecated].js 2017-12-08 19:14:53 +13:00
a9def5992f Create ghacks-clear-all-up-to-57-[removed].js 2017-12-08 19:13:45 +13:00
9aa9752dc4 Update README.md 2017-12-08 00:07:18 +13:00
eb2a9b2493 Update README.md 2017-12-07 23:35:58 +13:00
60cfacadb3 Update README.md 2017-12-07 23:20:11 +13:00
85e633dc60 Update README.md 2017-12-07 23:18:15 +13:00
61aeaa4714 Update README.md 2017-12-07 23:10:21 +13:00
b802ecb18f Update README.md 2017-12-07 23:09:19 +13:00
9b5d4521d1 Update README.md 2017-12-07 23:01:40 +13:00
8f34f8e0ff Update user.js 2017-12-07 17:12:13 +13:00
f683383ba3 Update user.js 2017-12-07 17:10:31 +13:00
83aa56e353 Update README.md 2017-12-07 16:52:51 +13:00
467b3d8602 1273: FF59+ show HTTP with negative indicator 2017-12-07 14:08:23 +13:00
183a62448f 1110: updated URL 2017-12-03 19:01:24 +01:00
ac751a74f2 Updater for Windows 3.1
more polishing and some changes to prevent potential issues when the user closes the console window too soon.
2017-12-03 16:17:24 +01:00
457ef9ec2f 3.1 tidy up 2017-12-03 15:07:15 +00:00
a6c93b3982 Revert "3.1"
This reverts commit ccaf06973b.
2017-12-03 15:04:41 +00:00
ccaf06973b 3.1
Minor change suggested by earthing.
2017-12-03 15:01:45 +00:00
ce3c077d06 3.1 2017-12-03 13:35:41 +00:00
edec5cc366 Update README.md 2017-12-03 06:35:08 +13:00
8a99bb350c 3.1a2 2017-12-01 01:05:24 -03:00
fc47792df2 3.1a1 2017-11-30 22:17:58 +00:00
e5d00be8f0 Revert "3.1a1"
This reverts commit ac7ad78d1d.
2017-11-30 22:11:42 +00:00
ac7ad78d1d 3.1a1
Just added a few lines to make batch updates more visible - which helps with testing.
2017-11-30 18:22:18 +00:00
cf6f614f5b 2706: Storage API => active, disabled 2017-11-30 14:12:53 +13:00
00e17281dc Updater 3.1a
-updatebatch now will (or at least should):
*Download new batch and name it [updater]*.bat
*Open that script in a new CMD window.
*Exit

The [updated]*.bat script should:
*Copy itself overwriting the original batch (without renaming).
*Start that script in a new CMD instance.
*Exit.

The new script, with the original name, should:
*Delete the [updated]*.bat script
*Begin the normal script routine.

@earthing do you think I should still rename the scripts to .old or something before overwriting/deleting?
2017-11-30 00:10:01 +00:00
9a4982ec0e updater.bat v3.0 FINAL
THE REAL FUCKING DEAL this time - finally! THANKS @claustromaniac !!
2017-11-29 23:23:57 +01:00
0a97660506 updater.bat v3.0 FINAL
THE REAL FUCKING DEAL this time - finally! THANKS @claustromaniac !!
2017-11-29 23:20:00 +01:00
3737b65f53 Fixed issue with commented-out user_pref lines
It ended up being a mixture of the previous commit and the fix. It writes a temporary file on the go that only holds preferences, and generates the target file at once at the end. It's slower than before, but it works.
2017-11-29 16:15:20 +00:00
635cacfe54 Replace PING with TIMEOUT
Otherwise earthing's nosy firewall bitches about it.
2017-11-29 15:49:21 +00:00
a126a32109 Revert "2nd merge optimisation"
This reverts commit c9e7f1ccfa.
2017-11-29 15:18:23 +00:00
c9e7f1ccfa 2nd merge optimisation
While I figure out a fix for the missing characters...

Enclosing the whole merging loop in parentheses and replacing the source file with the entire output at once is more efficient than appending individual lines with >>%~2. The script doesn't have to wait for the HD to continue processing.
2017-11-29 12:08:15 +00:00
ff9370b714 fix for hiding powershell output
Everything in a line after a powershell call is considered as being called from PowerShell.

>nul didn't work because of that. Enclosing the line in brackets should fix it.
2017-11-29 04:56:33 +00:00
b1fd2ba48b minor fix
What would we want a warning that we can't get to read for?
2017-11-29 04:50:01 +00:00
bdf69cd198 misc
To account for the possibility of the user running the script silently in the background. PAUSE would leave an instance in memory doing nothing indefinitely.

I was going to use TIMEOUT but PING performs better.
2017-11-29 04:33:02 +00:00
22695f464b 2303->2700s serviceWorker cache 2017-11-29 16:21:17 +13:00
44e129ea3d 1830: ref for DRM / EME 2017-11-29 13:32:48 +13:00
6ff3d1eb36 Fix for the self-update feature and misc
Also minor but significant improvement to the merge function: it no longer writes temp files to the disk while processing data.
2017-11-28 21:53:20 +00:00
a389572243 loops forever - fuck it 2017-11-28 18:33:31 +01:00
51d98fac09 last attempt
if this doesn't work I'll remove the damn -updatebatch part for good
2017-11-28 18:27:55 +01:00
d71321027b updater.bat v3.0 the real deal
updater auto-update part - let's give this a shot - volunteers?
2017-11-28 18:17:47 +01:00
ed4c9202b9 updater.bat v3.0 the real deal
hopefully :fingers_crossed:
2017-11-28 18:15:14 +01:00
5b931b06e8 updater.bat auto-update part 2017-11-28 17:34:14 +01:00
d3eda589bb Update updater.bat 2017-11-28 17:32:32 +01:00
0be33e2408 4700: UA Spoof fix ref link 2017-11-28 13:53:15 +13:00
eba3470a81 2700: header fiddling 2017-11-28 13:32:49 +13:00
1c997693ff merging improvements
- keeps all user.js.parrot lines intact
- keeps empty lines intact
- fix for keeping `!` and `^` in non-"user_pref" lines intact

+ some other minor changes + streamlining
2017-11-27 14:02:12 +01:00
76b24fa6aa 2700: header formatting 2017-11-27 10:22:55 +13:00
3b95e04b56 2700: header info 2017-11-27 10:14:55 +13:00
3ec7dae496 Update updater.bat
merge functionality and some cleanup
2017-11-26 21:47:30 +01:00
a269e53f88 Update updater.bat
- multioverrides support
- formatting changes
2017-11-26 15:57:32 +01:00
1789fea4f1 updater.sh - next attempt
... at fixing the script path detection. should hopefully fix  (comment)
2017-11-25 18:58:10 +01:00
679ca59233 Update updater.sh 2017-11-25 18:56:49 +01:00
82d20c328d 4000: PSA on FPI 2017-11-26 03:23:35 +13:00
41a55ad5f2 Update updater.sh 2017-11-25 14:37:25 +01:00
2c1e4ae542 updater.sh - next attempt
... at fixing the script path detection. should hopefully fix https://github.com/ghacksuserjs/ghacks-user.js/issues/264#issuecomment-346891526
2017-11-25 14:31:17 +01:00
910d4e2e59 2700s: numbers fixup
stop overworking me guys! crssi - thanks!
2017-11-25 23:35:14 +13:00
2bf9e6a773 0103: fixup lets try that again 2017-11-25 22:14:28 +13:00
d279839ba6 0103: fixup - thanks Forsaked 2017-11-25 22:11:49 +13:00
98bb8ad203 Update ghacks-clear-57-[changes-only].js 2017-11-25 17:33:32 +13:00
a281090cdc Delete test.js 2017-11-25 17:30:53 +13:00
44316934f3 release date & version fixup
You had it right the first time earthlng. Eg Start commits for 55-beta date shown is 9-July. 55-alpha release is dated 18-Aug and we drop the "-beta" part (look inside the release downloads). Start commits for 56-beta date shown is 12-Sept. 56-alpha release is dated 2-Oct and we drop the "-beta" part. And because you created the 57-alpha release before you reversed the date+version, that too is all good.
2017-11-25 16:47:12 +13:00
18048832da various => 2700 section
section 2700 will get a revamp, so not worried about numbering for now. Slight header tweak until we revamp
2017-11-25 16:12:29 +13:00
497f6ed58c 0103: home page 2017-11-25 15:33:07 +13:00
63b924f101 Create ghacks-clear-57-[changes-only].js
https://github.com/ghacksuserjs/ghacks-user.js/issues/276
https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.6-Bulk-Pref-Resetting-%5BScratchpad%5D
2017-11-20 15:35:52 +01:00
e1e40847e0 ooops, that's not how Pants usually does it
nobody saw that, right?
2017-11-20 14:01:57 +01:00
5743fe303c 57 release 2017-11-20 13:55:02 +01:00
89e0aed652 4600: redundant prefs due to RFP 2017-11-20 13:49:19 +01:00
59ae0b1028 2706: *.storageManager.enabled;false => inactive
Controls the visibility of the "Options>Privacy & Security>Site Data" section.
I'd prefer to remove this completely because it only adds to the confusion about all the different storage types.
This is just an extension for localStorage (2705) with 3 methods: estimate(), persist() and persisted(). A site can ask for permission (?) to persist data which when granted basically just means that "Storage will not be cleared except by explicit user action" whereas otherwise when not persisted "Storage may be cleared by the UA under storage pressure." - I don't see a problem with that.
We'll keep 2706 inactive for now but might remove it in a future commit.
2017-11-20 13:11:55 +01:00
69c278c3ba 2630: accessibility.force_disabled => 1
Prevent accessibility services from accessing your browser
2017-11-20 11:26:03 +01:00
4290b4e882 Merge pull request from claustromaniac/claustromaniac-patch-1
Just some polishing
2017-11-19 22:32:06 +01:00
efcaa3de8a Just some polishing 2017-11-19 17:41:19 +00:00
cdeb0abe79 update to v2.0
https://github.com/ghacksuserjs/ghacks-user.js/issues/264#issuecomment-345462158

- It can now handle read-only files.
- it is somewhat more explicit regarding what it's doing in some circumstances. For example, it now informs the user when no changes are made.
- It now accepts two parameters: `-unattended` and `-log`
- Minor improvements here and there.
2017-11-19 08:58:47 +01:00
450adab519 2706: Storage API => active false
Sorry, but AFAIK, with this enabled it clears web extension storage when clear "offsite website data" is checked on close or manually (which we do in the user.js). Note also that even with this enabled, the UI settings are disabled, and the data-on-disk calculation never finishes, so at this point, its a bit useless to enable it until we figure that out. Will be back in 7 days
2017-11-19 08:21:18 +13:00
500c129d48 fix for profile detection
this should now work no matter how the script is called (including symlinks) on both Mac and Linux.
+ Storing and restoring the original working directory to prevent problems in certain circumstances.
2017-11-18 13:39:29 +01:00
7ae034a23c 2706: Storage API => inactive 2017-11-18 18:01:01 +13:00
754ec610d1 typo 2017-11-17 15:48:39 +01:00
fe752c8be3 Create updater.bat
thanks @claustromaniac
2017-11-17 15:45:16 +01:00
da3ba2a97f Create updater.sh
thanks @overdodactyl !!
2017-11-17 15:26:27 +01:00
22e51e2a08 0506: disable PingCenter telemetry 2017-11-17 04:06:04 +13:00
c6d55296fb typo
used to be 2021 not 2012, see 908a8d66f4
2017-11-16 06:46:35 +01:00
f89bb3f1c2 9999: deprecated FF57 2017-11-16 17:03:08 +13:00
64a6eb794a 0850f: disable local search history in locationbar
kinda moot considering 0860 disables all search history :) Added for completeness so users can tweak their awesomebar to their little hearts content
2017-11-16 16:27:54 +13:00
fe46ea79ce 4500: RFP MediaDevices API FF59+ 2017-11-15 16:03:42 +13:00
d256908a5f 0330: telemetry changes 58+ 2017-11-15 13:51:20 +13:00
dedfbf04b6 5008: syntax fixup 2017-11-14 10:00:31 +13:00
e080becba5 2610: permissions.manager.defaultsUrl
FYI: https://bugzilla.mozilla.org/show_bug.cgi?id=506446 - FF35
2017-11-12 00:14:36 +13:00
76bc2bce25 5008: open bookmarks in a new tab 2017-11-11 23:04:30 +13:00
7f4a671b09 fixup spacing 2017-11-09 12:15:02 +13:00
b373fe2a58 5014: download button visibility 2017-11-09 10:54:52 +13:00
95f1d6ecf6 0514: activity stream fixup
`browser.newtabpage.activity-stream.aboutHome.enabled` is not needed, as it is controlled by `browser.newtabpage.activity-stream.enabled`
2017-11-09 10:31:08 +13:00
3028a7a61a 5025: another media type 2017-11-09 07:58:21 +13:00
06d9d61558 0514: more activity stream 2017-11-09 07:05:08 +13:00
1dd683c81f 0330: more telemetry pings 2017-11-09 03:13:42 +13:00
2c56d90a6f Create test.js 2017-11-01 02:28:23 +13:00
df01fb87ce 2300: *workers info fixup
"Push and web notifications require service workers, which in turn require workers." - this is clearly not (or no longer) true. See  where workers are disabled, but service workers enabled, and service workers create IDB entries on Youtube
2017-10-31 20:17:26 +13:00
ce66da10a4 start 57 commits 2017-10-31 16:51:44 +13:00
e1034faf1f readme: extension cookie exceptions 2017-10-31 16:29:46 +13:00
d4cfd1e885 4500: canvas extraction 967895 2017-10-29 05:11:43 +13:00
6cdfd1a443 Add files via upload 2017-10-09 17:24:42 +13:00
ca16792723 4600s: add ref to old numbers 2017-10-06 21:44:19 +13:00
6e2479dc0f 0210 tweak 2017-10-04 07:53:12 +13:00
bbb29237cc 4609 + 02xx cleanup
Only `geo.enabled` is covered by RFP, keep the other prefs under 0200 and do some cleanup

- 0202: the /en-US/ in link [2] is necessary for the anchor to work!
- `browser.search.geoip.timeout;1` is unnecessary when `browser.search.geoip.url` is empty string:
https://dxr.mozilla.org/mozilla-central/source/toolkit/components/search/nsSearchService.js#576
2017-10-03 17:37:50 +02:00
fec0c99287 4608 - remove media.webspeech.recognition.enable
the 2nd part of the Web Speech API, SpeechRecognition, is not yet implemented on Desktop Firefox:

https://developer.mozilla.org/en-US/docs/Web/API/SpeechRecognition#Browser_compatibility

> * [2] Can be enabled via the `media.webspeech.recognition.enable` flag in about:config **on mobile**. **Not implemented at all on Desktop Firefox** — see [bug 1248897](https://bugzilla.mozilla.org/show_bug.cgi?id=1248897).
2017-10-03 17:00:11 +02:00
258e8ff805 4700 fixup
remove mention of ESR, fix current TBB platform as 32bit - not that it matters, it's all inactive
2017-10-02 17:53:24 +13:00
a74170e2b0 5005: clipboard.autocopy
this is a linux only pref, does nothing in Windows or Mac, as per tagging convention => [LINUX]. Here's a 15 year old ticket - https://bugzilla.mozilla.org/show_bug.cgi?id=160200 .. enjoy! PS: Trying to find an autocopy text (excluding form fields) that auto trims, auto removes multi-spaces, auto trims, and auto removes double blank lines .. I had one, but its legacy. Best I can find is https://addons.mozilla.org/en-US/firefox/addon/autocopy-webextension/ - a wee timer in options lets you control when you copy (that's ok), but it gives a notification every time which is annoying as f - anyone got any ideas
2017-10-02 11:46:34 +13:00
e29a301578 56 release 2017-10-02 09:39:03 +13:00
1031312f82 FF56+ redesigned preferences UI + [SETTING] tags 2017-10-02 09:32:27 +13:00
ddfdf7cb47 oophs 2017-10-02 06:00:28 +13:00
649e49e0fa 4600: redundant prefs FF55 due to RFP [Part2] 2017-10-02 05:58:13 +13:00
908a8d66f4 4600: redundant prefs FF55 due to RFP [Part1] 2017-09-30 20:15:41 +13:00
4a91b866a4 4500: clarify RFP Geo API
This is not the same as disabling the API with `geo.enabled` - see https://bugzilla.mozilla.org/show_bug.cgi?id=1403813
2017-09-30 19:05:30 +13:00
0912b03f62 2675: block top level data: URIs
note: I changed `data://` to `data:` in section 4000's 1300671 description
2017-09-29 03:06:22 +13:00
12f80bdf65 FF56 deprecation 2017-09-28 21:27:40 +13:00
88216743a5 2508: gfx h/w
- In FF55 (windows) this no longer changes both prefs, only `layers.acceleration.disabled`
- `gfx.direct2d.disabled` => inactive (I do not think it is used much if at all anymore - do a DXR search)
2017-09-28 06:12:19 +13:00
fa94f9b3c1 0001: PB breaks Extensions+IDB
Mozilla should really exempt moz-extensions from being blocked by indexedDB=false
2017-09-27 12:38:02 +13:00
620a0ee29c 5016: reload/stop animation FF56+
[1355924](https://bugzilla.mozilla.org/show_bug.cgi?id=1355924) and for some fixes in 57 see [1384180](https://bugzilla.mozilla.org/show_bug.cgi?id=1384180)
2017-09-27 03:40:04 +13:00
a25df4c942 0209: fixup regional pref OS locale
I think I need a break
2017-09-20 03:23:10 +12:00
7fa0025baf 2804: clarify Clear Recent History 2017-09-19 05:22:25 +12:00
80ac9dfa1f 1404->1402: default fonts => inactive
Inactive as this actually can cause problems on Linux with tofu (I think arial on debian causes tofu - ask nodiscc) . Also incomplete with non-Western settings
2017-09-19 04:54:52 +12:00
a93ce5d9f1 2024 MSE => 5024 => inactive 2017-09-19 03:49:51 +12:00
367972155a 2509: tidy up Touch API 2017-09-19 03:25:07 +12:00
985c164cd0 tiny update 2017-09-18 16:07:43 +02:00
f5ffeff971 4503: RFP mozAddonManager
Inactive: 1: currently only three sites (hard-coded) can access this, all run by Mozilla 2: it is likely to be used on the new AMO site to determine your Firefox version
2017-09-18 18:40:15 +12:00
31e7c72f64 0209: add regional pref OS locale 2017-09-18 02:38:09 +12:00
2f6deda172 readme: add RFP alt / deprecated info 2017-09-17 22:29:05 +12:00
39594629e5 2513: presentation API => inactive 2017-09-17 20:31:42 +12:00
ca30ba4994 0500: add Linux path
Looks weird: portable, windows, mac using `\` and Linux using `/` :)
2017-09-17 19:58:54 +12:00
5338b6fb60 4500: add our acronym RFP 2017-09-16 10:36:30 +12:00
bdf0e5ed56 parrot pref name change 2017-09-16 10:28:22 +12:00
89474d014f 1200s: ciphers=>inactive 2017-09-16 06:20:00 +12:00
c84a59fd95 ESR parrot
a deprecated parrot.. seems apt... and that's it, no more parrots, please.. I'm all parroted out
2017-09-16 05:43:45 +12:00
598ee751f5 2500s: 4 h/w prefs=>inactive 2017-09-16 05:26:07 +12:00
2e4e0a6327 Bwooooarrkkk .. missing parrots
For the four new sections .. hopefully no more parrots need be harmed in the making of this js. PS: The origin of popping clogs is interesting
2017-09-16 02:33:29 +12:00
4d35be7ccb 0517: *.formautofill.available
replaces `extensions.formautofill.experimental`
2017-09-16 01:32:22 +12:00
f3bd095fe9 5015 - add version info (FF55+) 2017-09-15 14:56:24 +02:00
e794611920 4502 - will always round down ... 2017-09-15 14:46:31 +02:00
f450c2172b 1221 - test site works again 2017-09-15 14:44:05 +02:00
6a7dac32cc 4601: => inactive
Are the possible/unknown downsides of this one FP measure really worth it for ESR users? - see earthlng
2017-09-15 18:39:43 +12:00
6900924aa6 0320 - disable Get Add-ons panel 2017-09-15 01:47:54 +02:00
7c2be97879 2418 full-screen site permission fix
site permission no longer has a full screen override - no idea when it was removed
2017-09-14 22:54:55 +12:00
5e414ff5cb 4600: redundant prefs FF55 due to RFP 2017-09-14 17:43:24 +12:00
13aa4a0290 create 4600s: RFP alternatives 2017-09-14 17:28:52 +12:00
76672ed767 2697 spoofing -> 4700s 2017-09-14 17:00:55 +12:00
a5ae7d17a3 oophs 2017-09-14 16:39:05 +12:00
54b64e3f3c 2699 RFP -> 4500s 2017-09-14 15:57:42 +12:00
17ba1401cf 2698 FPI -> 4000s 2017-09-14 15:25:32 +12:00
e09e5ab8db 2699: FP resistance for Presentation API 2017-09-14 12:12:09 +12:00
caed9d833c shove 3000s personal out to 5000s
couple of number changes to get rid of alphabet soup: 3001a->5002, 3002->5003
2017-09-13 04:56:21 +12:00
d9f76d3add start 56 commits 2017-09-13 03:14:56 +12:00
bb2325cad2 2699: fixup 1333641 description
bug 1333641 does not disable the WebSpeech API
2017-09-11 17:03:52 +12:00
9a0edfe887 0330: another ping bites the dust 2017-09-10 01:43:02 +12:00
0277ba8102 2699: more UA spoofing stuff
move along people, nothing to see: added 1396468 which fixes a leak, it will probably be pushed to beta (FF56)
2017-09-09 16:49:26 +12:00
b907dd7e83 new terminology
https://wiki.mozilla.org/Add-ons/Terminology . The only "Web Extension" or "WebExtension" or "Add-on" references left are due to UI wording or links or pref names
2017-09-09 16:18:16 +12:00
83bb51b988 Update README.md 2017-09-09 15:35:14 +12:00
f3c87367fb 2699: spoof FF version changes 2017-09-07 14:46:31 +12:00
ffc8280c0c 9999: 2502 cleanup 2017-09-02 19:07:28 +02:00
346b945ee3 2699: limit MediaError.message 2017-09-03 00:44:23 +12:00
b86f625b02 URL changes Part3
check: 49 items as per issue comment
2017-08-31 17:27:04 +12:00
431b55f47f 2404: indexedDB=>inactive, required for uBo 1.14.0+
Not just uBo but many web exts are using indexedDB for storage. Users will have to deal with indexedDB persistent storage via other means.
2017-08-31 16:51:38 +12:00
4120419cd5 URL changes ##224 Part2
[Ch-ch-ch-ch-changes](https://en.wikipedia.org/wiki/Changes_(David_Bowie_song))
2017-08-30 18:17:06 +12:00
9f30adee64 URL changes
Thanks Theemim. Double check, so far: 27 changes, 27 items checked in Theemim's list
2017-08-30 17:07:43 +12:00
a19a3d2a35 worlds tiniest typo } -> ]
Sidenote: Not sure if this is true anymore. Since I ditched CTR and I have the hamburger menu back, it loves to annoy me with a doorhanger ALL THE F**kng TIME - certainly not 8 days grace. Seems more like 12 hours (but I swear it also comes up soon after a restart as well)
2017-08-29 17:27:18 +12:00
b6533689cf 2699: add Animation API, description fixups 2017-08-28 07:20:45 +12:00
ae83b83590 0517: formautofill.creditCards.enabled 2017-08-27 15:46:12 +12:00
4977d01fec 0517: add .creditCards.enabled;false (FF56+)
it's most likely covered by disabling extensions.formautofill but is nice to know for people who want to enable form-autofill but may want to disable creditCards autofill
2017-08-26 16:27:48 +02:00
eab3a0b714 2699: enable fingerprinting resistance for WebGL 2017-08-25 16:11:03 +12:00
dd25413c98 all-round -> all-around 2017-08-24 16:00:05 +02:00
3d109664bb couple of [SETTING] updates 2017-08-19 18:12:08 +12:00
595eaf540c 0425: passive TP 2017-08-19 13:35:27 +12:00
31b1f6624e subresource-img-cross-origin-http-auth-allow;false
https://github.com/ghacksuserjs/ghacks-user.js/issues/144#issuecomment-321980962
https://github.com/ghacksuserjs/ghacks-user.js/issues/144#issuecomment-322903835
2017-08-18 12:28:12 +02:00
e95d2afc95 1205: disable TLS1.3 0-RTT 2017-08-18 13:58:30 +12:00
996e760f8c 2699: spoof navigator platform as win64
While the change has just landed, it is being pushed with 56, same as the rest of the resistFP UA/Nav spoofing
2017-08-15 15:09:34 +12:00
6c2f3ad33a 2699: reduce screen co-ordinate FP in Touch API 2017-08-15 14:21:28 +12:00
f7dea0a1e9 2699: spoof media statistics to 0 2017-08-12 13:55:17 +12:00
911a98c675 1108: block web content in file processes 2017-08-11 08:30:52 +12:00
cda46d8342 1107: dom.ipc.processCount.file
FYI: https://bugzilla.mozilla.org/show_bug.cgi?id=1352359
2017-08-11 06:38:59 +12:00
2182bdfbe8 1840 - fixup 2017-08-10 14:24:13 +02:00
21b5c5dea7 9999: one-char-switch for ESR
thanks earthlng
2017-08-10 23:30:39 +12:00
b527e5c65e 9999 - tweak for JS-comment re-grouping for ESR 2017-08-10 23:28:03 +12:00
1755543594 1800s: move gmp update prefs to 1820 2017-08-10 22:52:59 +12:00
cf2a6fd554 fixup 2017-08-09 00:48:05 +12:00
bc58c10f34 3015: toolkit.cosmeticAnimations.enabled 2017-08-09 00:42:53 +12:00
3e3acd5897 9999 - JS-comment re-grouping for ESR users
makes it even easier for ESR users to re-enable the prefs they still need
2017-08-08 13:15:45 +02:00
6be84b8516 0500s" fix Mac directory info 2017-08-08 14:43:39 +12:00
7a05580c62 2507: remove dom.keyboardevent.dispatch_during_composition
The bulk of 2507 with `dom.keyboardevent.code.enabled` (links, description etc) is now deprecated in section 9999 under FF55+. This leaves `dom.keyboardevent.dispatch_during_composition` as a valid pref. It's default is false, so rather than leave it hanging out on it's own with no info, lets remove it. [If it ever becomes true we will pick up in diffs]
2017-08-08 06:28:36 +12:00
48511d1f9b FF55+ deprecation 2017-08-08 06:10:31 +12:00
69449f8593 Update user.js
- should check if 0360 `user_pref("browser.newtabpage.directory.source", "data:text/plain,");` is still around since the ping pref is gone.
- A bit iffy about 2507 - this spilts two prefs and there's a lot of text. Not sure if FF38+ refers to the second one. We should investigate the still active 2507 and fix that up with some info and version
2017-08-07 18:43:47 +12:00
09ccb74d69 0209: fix bugzilla ref
https://bugzilla.mozilla.org/show_bug.cgi?id=1072859 is the one for removing it in 55+
2017-08-07 10:44:20 +12:00
ebcf5bec9e 1830: add media.eme.chromium-api.enabled 2017-08-07 10:33:16 +12:00
3970c1db9e 2699: Navigator API spoof correction
See: https://bugzilla.mozilla.org/show_bug.cgi?id=1383495#c8 - the comment in code is incorrect and hopefully will be fixed. Version is always rounded DOWN
2017-08-07 10:03:32 +12:00
0861490d39 2699b: privacy.window.maxInner* fix descriptions 2017-08-07 07:33:07 +12:00
80c95cbac4 0500s: system add-ons: add Mac info 2017-08-07 05:33:26 +12:00
f18197c22e 0860+0861: disable form history => Active 2017-08-06 04:40:49 +12:00
98698c8e68 0201: geo.wifi.uri fixup
This description should cover everyone. No longer care if and when Mozilla push the change
2017-08-06 04:25:46 +12:00
ea713abfc6 0325: add media.wmf.vp9.enabled 2017-08-05 09:13:11 +12:00
eb532d61be 1104: now active at default 55+ 2017-08-05 09:09:44 +12:00
29ce831774 0201: remove mozilla API as it is now default 55+ 2017-08-05 09:07:09 +12:00
c7cd524f21 2504: simplify VR to master switch 2017-08-05 08:30:21 +12:00
8538685685 Merge pull request from ghacksuserjs/earthlng-patch-1
3009 - remove it
2017-07-30 07:46:01 +12:00
9e573ea97f 3009 - remove it
the default value in 54 is true. It's not in my OS diff for 54 either so it's true on Linux and Mac as well. I don't think anyone would want to disable this anyway, and we have it as "enable APZ". It's only wasting space, let's remove it. class discuss xD
2017-07-29 21:24:58 +02:00
f8cdfbcd93 3029: removed - now 0515 system add-ons 2017-07-29 08:17:42 +12:00
0e2e54238c nits 2017-07-28 21:15:25 +02:00
ed2f829af9 2699: disable WebSpeech API 2017-07-29 06:18:02 +12:00
7e92f86244 fixup extensions.screenshots.system-disabled 2017-07-29 05:55:11 +12:00
66cf6b7641 2699: streamline resistFP meta references 2017-07-29 05:37:59 +12:00
dcf4ebfbad 2698: streamline FPI meta references 2017-07-29 05:28:59 +12:00
b24539cc25 Merge pull request from ghacksuserjs/earthlng-patch-2
0515+0516 - screenshots already bundled with FF54
2017-07-29 05:13:24 +12:00
f52cb0e334 0515+0516: screenshots already bundled with FF54
swap 515+516 to keep FF version order, screenshot is 54 (tag 55 pref as 55, but add deprecated 54 pref to section 9999)
2017-07-29 05:10:40 +12:00
4d0c29672b Merge pull request from ghacksuserjs/earthlng-patch-1
1840 - add override url + disable local fallback
2017-07-29 04:54:33 +12:00
a6fe71d24a 1840: add override url + disable local fallback
fixup: consistent data:*
2017-07-29 04:47:43 +12:00
fa778f2a87 0515+0516 - screenshots already bundled with FF54
moved screenshots up to 0515 and added the FF54 pref. I know I said we can remove that pref but the item needs to be for FF54+ regardless. To make it less confusing I added the pref back in.
2017-07-28 18:31:46 +02:00
12e25652e6 1840 PR - add hidden pref tags 2017-07-28 18:20:57 +02:00
cb5593f09e 1840 - add override url + disable local fallback
they are both in Tor 7.0.2.
With .url.override set, media.gmp-manager.url is never used (but let's keep it anyway)
source: https://dxr.mozilla.org/mozilla-central/source/toolkit/modules/GMPInstallManager.jsm#66

Since ESR52 it is not enough anymore to block pinging the GMP update/download server.
There is a local fallback that must be blocked now as well. See: https://bugzilla.mozilla.org/show_bug.cgi?id=1267495.
2017-07-28 18:15:10 +02:00
63ed779776 0513: disable Follow On Search 2017-07-28 21:06:38 +12:00
998069f440 remove 0864
default is false has been since FF32, if it ever changes (eg maybe for auto formfill?) then we will pick up on it from diffs
2017-07-28 21:02:10 +12:00
63ba049ccb 0864: syntax missing trailing ; - oophs 2017-07-27 00:03:30 +12:00
8081967187 0517: disable Form Autofill 2017-07-26 23:37:45 +12:00
f00cc290b4 0864: disable form @autocomplete
The default is false in FF54 (and also in FF55 beta), so there should be no downsides. Not sure how this will affect AutoFormFill system addon, and don't care since we'll disable that as well
2017-07-26 23:24:18 +12:00
8c3cb3a834 2506: add bugzilla ref + 2203: grammar for nerds 2017-07-26 20:46:52 +12:00
4397bc9137 0330: amalgamate telemetry prefs, add two new ones 2017-07-25 06:43:12 +12:00
71fd837308 0515: correct reference notation 2017-07-25 06:29:20 +12:00
bb07b0e78c remove references to specific extensions
Non e10s and non WebExtension = out the door. NoRedirect & Disable IndexedDB were not e10s, and Cookie Controller is not WE (and besides, there are lots of cookie alternatives). I think that's all of them. In fact I think the only extensions left mentioned are uBlock Origin and NoScript

Also `addon-ons` typo not picked up by Just-me-ghacks - I am bitterly disappointed.
2017-07-25 05:36:32 +12:00
8d7fceb6da misc grammar for nerds
Thanks Just-me-ghacks
2017-07-25 05:15:37 +12:00
aeb7846200 typo: missed one
2017-07-24 06:57:33 +12:00
4fac8f71c4 misc typos
Thanks Just-me-ghacks
2017-07-24 06:50:55 +12:00
e4002913d9 0515: some onboarding truths 2017-07-24 03:32:57 +12:00
9499122d96 0505: system add-on update tweak 2017-07-24 03:15:58 +12:00
656b755a34 0505: system add-on URL 2017-07-23 09:01:36 +12:00
0bf6323e6f typo + fix comment
thanks @Forsaked
2017-07-22 22:25:07 +02:00
dc955fb846 renumber 0513 to 0514
in order to keep system add-ons in order of first appearance
2017-07-23 04:02:33 +12:00
0eb7a927e6 0810: disable speculative connects 2017-07-23 03:11:56 +12:00
989a5816b1 indexedDB 2017-07-22 04:14:51 +12:00
049841acb1 0518: disable Web Compatibility Reporter 2017-07-21 18:23:14 +12:00
16499e9611 0516: Screenshots 2017-07-21 18:18:47 +12:00
4e36051192 0515: disable Onboarding 2017-07-21 18:14:05 +12:00
bcf38ca80b 0512: disable Shield system add-on 2017-07-19 06:00:34 +12:00
71c81992f5 add 0500s system add-ons / experiments
new items will have their own commits
2017-07-19 05:55:03 +12:00
b6567f3de9 miscellaneous
Add missing parrot for 1100s, replace parrot for 1700 with a unique euphemism, a readme tweak (so it's technically correct), and deprecated pocket  number change in prep for new system add-on section
2017-07-19 05:35:00 +12:00
3cdc4a93d7 2699: disable geolocation API 2017-07-15 19:37:27 +12:00
34d0054d95 tweak readme section 2017-07-15 02:20:40 +12:00
7d89436f27 1003: add browser.cache.memory.capacity 2017-07-14 04:39:31 +12:00
54cf998f78 2300: add notifications ref 2017-07-13 20:34:34 +12:00
35fd208af9 Update README.md 2017-07-10 11:39:30 +12:00
40a62aa38d 2415b: FF55+ pointerup added to default 2017-07-10 07:33:56 +12:00
1ed4c45051 55-beta date 2017-07-10 06:47:57 +12:00
4a0074d1ab start 55 commits 2017-07-10 06:47:23 +12:00
132e0fa503 1202: aaaaaaand actually change the pref this time 2017-07-10 06:26:55 +12:00
c864c8ebb0 1202: TLS min raised to 1.2 2017-07-10 06:22:52 +12:00
063b731054 nits 2017-07-10 05:52:44 +12:00
d7c282c0fa Merge pull request from ghacksuserjs/earthlng-patch-1
update ghacks.net links to use https
2017-07-09 18:51:32 +02:00
b24dd123d0 update ghacks.net links to use https 2017-07-09 18:49:39 +02:00
8b0bc463c5 2001: link update
www.privacytools.io redirects to https://privacytoolsio.github.io/privacytools.io/ and in the process drops the anchor info (#webrtc)
2017-07-09 17:58:05 +02:00
4d31983e06 0420: TP fixup default values 2017-07-09 22:58:57 +12:00
e018583082 2701: cookies & 3rd party info 2017-07-08 05:24:33 +12:00
6348826519 1212: turn on OCSP 2017-07-08 05:12:52 +12:00
b55a986d52 1210's: OCSP add reference 2017-07-07 00:09:54 +12:00
ba78702686 1610 DNT & 0420 TP clarify conflicts 2017-07-06 19:03:36 +12:00
32327e15c1 2699: spoof network info API 2017-07-01 03:05:45 +12:00
d1306aee26 2699: gamepad API 2017-06-30 03:10:39 +12:00
ac77e65d82 2699: site specific zoom 2017-06-30 03:09:19 +12:00
6b7032ccaf 2699: device sensor API 2017-06-29 04:48:56 +12:00
6ef86fbde6 0209 FF version fix, 2699a hidden pref info
I removed the "(hidden pref)" info when we revamped 2699, as it will no longer be hidden. In hindsight, that info needs to stay (we haven't archived off end-of-life 54, and it's good information for backwards compatibility).
2017-06-22 05:37:47 +12:00
0176d8676c 2698: isolate data://, about: 2017-06-21 18:37:27 +12:00
da1b9054ad 2629: fix ref source 2017-06-21 18:31:00 +12:00
fba479944d spacing nit 2017-06-21 17:17:15 +12:00
791b4114c6 2699: spoof Navigator API
https://reviewboard.mozilla.org/r/147474/diff/4#index_header

I would have thought rounding DOWN to the nearest multiple of 10 would be better. Imagine being on FF61 and claiming to be 70 = might cause site issues
2017-06-21 17:15:56 +12:00
8cdc6e766c 2699 revamp 2017-06-20 10:47:11 +12:00
319db71e82 nits 2017-06-20 03:56:15 +12:00
907e0aaa24 1408: graphite: update & add ref 2017-06-20 03:25:31 +12:00
5e0f37c925 2698 revamp & FPI=>active 2017-06-20 03:05:51 +12:00
06018367a1 Merge pull request from carmenbianca/line-endings
Convert line endings to LF
2017-06-19 09:11:20 +12:00
7b2d67976c Convert line endings to LF
Added .gitattributes file to prevent CRLF from being committed in the
future.

Fixes 
2017-06-17 09:13:14 +02:00
7a0fbb6a31 end of 54 commits
ready for alpha release and changelog
2017-06-15 02:48:55 +12:00
1f18162d56 Merge pull request from ghacksuserjs/138-patch
 add notes to some inactive prefs
2017-06-15 02:06:26 +12:00
eba592c7e5 minor edit 2017-06-14 06:08:25 +12:00
46bfeca8c2
These all seem kinda lame TBH
2017-06-14 06:04:32 +12:00
eeedf0db72 1032: favicons in web notifications=>active
enforce default
2017-06-14 04:56:00 +12:00
1ad970741c 1606: default Referrer Policy=>active 2017-06-14 04:37:46 +12:00
f61c951ca0 3029: disable Firefox Screenshots 2017-06-14 04:13:53 +12:00
b9e321c45a 2805: privacy.*.openWindows 2017-06-14 04:09:31 +12:00
8a9a4fe427 2515: disable site specific zoom 2017-06-14 03:38:45 +12:00
44c4a62820 fix syntax from last commit 2017-06-13 19:24:23 +12:00
ab7dfb7f43 2001: disable WebRTC over TCP 2017-06-13 19:12:34 +12:00
3c7789defc 2300 revamp 2017-06-13 00:11:26 +12:00
82432a3d40 FF54 deprecated 2017-06-12 23:55:17 +12:00
75f6bc8b5d 2699g: reduce precision of time exposed by JS 2017-06-10 07:33:04 +12:00
b53b4832d4 1220: add reference 2017-06-09 01:11:55 +12:00
9719fc319d 0603b: add reference 2017-06-09 01:08:19 +12:00
9340f8ba04 1240: add reference 2017-06-09 01:05:56 +12:00
dd01dd54c6 1100s: add 2 process/sandbox prefs => inactive 2017-06-06 06:22:19 +12:00
1a04c1314e 0809: disable preloaded top website suggestions 2017-06-06 05:11:59 +12:00
ec03969d98 0863: disable Form Autofill 2017-06-06 05:07:48 +12:00
1621cd5e48 0361: disable Activity Stream 2017-06-06 04:38:38 +12:00
0006ee04b4 1202: TLS max+fallback=>active
regardless of default, time to turn it on in 54
2017-06-06 04:08:24 +12:00
08fbc37870 1266: add ref link 2017-06-05 16:12:55 +12:00
9859cc8889 9999 nits 2017-06-04 18:11:46 +02:00
a4be5471f1 0607 [WINDOWS] tag 2017-06-04 09:15:09 +12:00
d1e02e407b start 54 commits
10 days to go guys and gals
2017-06-04 08:08:26 +12:00
ed9bc336fa 9999 revamp fixups 2017-06-04 07:08:16 +12:00
f84f9b7c44 Merge pull request from ghacksuserjs/9999-revamp
9999 revamp
2017-06-03 20:21:43 +12:00
f74b327403 9999 revamp
Nits, review syntax etc. Note: 2 items missing deprecation bugzilla tickets, we can get those in time. Note if each section number is made active, the prefs are also - except those which either match the current js (eg TP/SB not active but we do block reporting) or they make no sense or were inactive originally (eg personal 3000 settings etc) - might want to review those choices as well. Also, a few numbers etc changed to match current numbers (eg replaced by items etc, new sections)
2017-06-03 16:33:00 +12:00
e4a8dcf0dc 0333a: two health report prefs->deprecated 2017-06-02 01:21:01 +12:00
9eee26bc35 0330b: unifiedIsOptIn->deprecated 2017-06-02 00:57:36 +12:00
76293cab6a 3006: add-on signing url fix 2017-06-01 01:56:23 +12:00
4a0ff9ea33 3006: add-on signing move back from deprecated 2017-06-01 01:46:09 +12:00
8b2b0898c0 typo 2017-05-31 14:04:13 +12:00
956c94f812 2617 pdfjs.disabled better info 2017-05-30 04:05:10 +12:00
2336d0a20b 0910 add bugzilla tickets 2017-05-30 02:01:08 +12:00
a4a0ec5cee black-on-black system colors 2017-05-29 13:11:34 +12:00
8abe26083c punycode test
and the PoC/article by Xudong Zheng that re-sparked the conversation early this year
2017-05-28 12:49:27 +12:00
c4bba2258e Merge pull request from ghacksuserjs/earthlng-patch-1
extensions.blocklist.url
2017-05-28 12:41:39 +12:00
f84e051b50 extensions.blocklist.url
https://blocklist.addons.mozilla.org/blocklist/3/{ec8030f7-c20a-464f-9b0e-13a3a9e97384}/53.0.3/
... already redirects to ...
https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%7Bec8030f7-c20a-464f-9b0e-13a3a9e97384%7D/53.0.3/
... in FF53.0.3 so we can already commit this FF54 change that uses the direct URL
2017-05-27 16:14:05 +02:00
caa1d2c22e don't disable update checks
i.e change the prefs to inactive - FF nerds can then easily flip the two prefs to achieve the section purpose = "quiet"
2017-05-27 15:18:20 +12:00
b72c6f57c0 Merge pull request from ghacksuserjs/Standardize-Part3
Standardize Part3 
2017-05-26 02:11:24 +12:00
7c87abbe78 Standardize Part3 2017-05-25 07:40:40 +12:00
e6628e56df ui.use_standins_for_native_colors 2017-05-25 06:35:50 +12:00
c7b34d3b26 0850a+b+c urlbar+maxRichResults
clarifies usage of maxRichResults and cases of aberrant number of items displayed
2017-05-24 05:44:49 +12:00
147e02379a dom.maxHardwareConcurrency 2017-05-24 04:50:44 +12:00
05bbd88f95 2605 windows->system since GTK could be anything 2017-05-24 02:41:06 +12:00
e080614c30 Merge pull request from ghacksuserjs/Standardize-Part2
Standardize Part2 
2017-05-24 02:14:05 +12:00
a0aca310e9 2605 confirmed windows only (and gtk) 2017-05-24 02:02:51 +12:00
b5c072dc18 2604 remove [MAC] tag 2017-05-23 07:17:49 +12:00
31d3aec893 Update user.js 2017-05-22 08:33:25 +12:00
1c82abf074 Update user.js 2017-05-22 07:36:39 +12:00
1c5988c770 Standardize Part2 2017-05-22 07:33:04 +12:00
b8a6f2a7ad Merge pull request from ghacksuserjs/Standardize-Part1
Standardize Part1 
2017-05-21 03:19:50 +12:00
ec9f9fcea8 remove left over line 2017-05-18 06:31:04 +12:00
7fcb3ce836 Standardize Part1 2017-05-18 06:15:40 +12:00
8f5305f383 0001: add PB mode info 2017-05-16 05:42:58 +12:00
9d6da7199d 0401 better wording for extension.blocklist 2017-05-14 23:17:16 +12:00
83cf157178 Update user.js 2017-05-13 14:33:46 +12:00
21f5333723 Update user.js 2017-05-13 14:13:42 +12:00
d5c92cd548 Update user.js 2017-05-13 14:11:45 +12:00
ce90d07e0e Update user.js 2017-05-13 14:07:42 +12:00
903ba2d2b4 0400s: tidy up sub-section SB 2017-05-13 14:04:14 +12:00
64351a0c19 minor edits 2017-05-13 13:53:24 +12:00
0d09e9c9b5 minor comment edits 2017-05-13 13:00:14 +12:00
ad51e00c8f 0400s: tidy up sub-section TP 2017-05-13 12:44:29 +12:00
195ec514c3 bye bye scary warnings
Now TP+SB is not disabled by the js, goodbye big scary warnings - we still have our advisory remarks in the section and wiki and readme.md
2017-05-13 12:32:58 +12:00
436db6c02d splinter part of 0402 kinto into 0403 2017-05-13 12:04:45 +12:00
cd13d479ee whoops 2017-05-13 11:52:37 +12:00
6516eadc60 0400s: tidy up sub-section Blocklists 2017-05-13 11:50:50 +12:00
dce198c405 move 0440->1204 SSL Error Reporting 2017-05-13 11:25:54 +12:00
2a240b4a10 0401 extension.blocklist
No effective changes made, i.e extensions.blocklist.enabled is not disabled, just not enforced.
2017-05-13 10:01:27 +12:00
9249fc6ed0 0402 kinto + 0400 title 2017-05-13 09:38:17 +12:00
9a42dfe73d whoops .. put back 0430
inadvertently removed 0430 when doing some rearranging
2017-05-12 17:38:17 +12:00
84ea69411b remove redundant line 2017-05-12 09:18:52 +12:00
dc15fe7db8 fixup TP/Flash blocklist URL prefs
See comment https://github.com/ghacksuserjs/ghacks-user.js/issues/103#issuecomment-300911966 - `*safebrowsing.provider.mozilla.*` is for Flash & TP ONLY (original article by francois had a *slight!!* error since fixed)

This means that 0410d was not shared by TP and SB and to clear it all up .. 0410d is moved to 0420's. 0420's also gets the flash pref 0440 moved into the 0420's.

Now it's all tidy: 0410's = google and SB, 0420's = mozilla & TP+Flash
2017-05-12 09:11:45 +12:00
6cda4ebc14 2699f: spoof navigator.hardwareConcurrency 2017-05-12 01:44:04 +12:00
d3e1fe3a1c 0410f: FF54 report mistake urls 2017-05-12 01:18:51 +12:00
9a76ccbfda weird spacing 2017-05-11 19:22:32 +12:00
b6c17138bf HTTP2 cleanup 2017-05-11 19:11:55 +12:00
382adf1042 Update README.md 2017-05-11 19:06:08 +12:00
870f9503c2 Add files via upload 2017-05-11 18:58:05 +12:00
b67f98141b tidy up
single warning line, not taking responsibility for people who don't read now that the js by default no longer disables these
2017-05-11 18:54:49 +12:00
2a609fc85d TP prefs=>inactive i.e js will NOT disable TP
Exception: I am enforcing TP in ALL windows (default is PB Mode only). I have also added the info for which block list to use in TP. Also clarified that 0440 (flash blocklist) uses prefs in 0410d. Also made flash tracking blocklist pref (0440) inactive. Now all TP and SB is allowed, only real time google binary checks and reporting is disabled.
2017-05-11 18:34:10 +12:00
2b52bf895c tidy up 2017-05-11 17:20:28 +12:00
eaaecd128c SB prefs=>inactive i.e js will NOT disable SB
Exceptions: real time binary checks not in local lists are still blocked. Reporting URLs still blocked.
2017-05-11 17:13:23 +12:00
78bf49adb4 1222: typo 2017-05-09 17:31:27 +02:00
f024e9bd43 0805: fix link reference
it was "see latest comments in the bug link" before the change - [2] is the bug link, [1] + [3] don't have comments
2017-05-09 16:56:03 +02:00
1b73cb828e 0201: geo.wifi.uri 2017-05-10 01:39:02 +12:00
7600d06651 0908: reinforcing that 0802=required
making it crystal clear that "When attempting to fix an entered URL" means pref 0802
2017-05-10 01:26:22 +12:00
b365a88a52 emphasis on TBB for dark web 2017-05-10 01:04:46 +12:00
fa74bcaa4a add FF55 resistFingerprinting new items 2017-05-10 00:54:36 +12:00
ad56e58330 undo last change 2017-05-06 01:36:53 +12:00
66e807623b add 2698k isolate blob: URI
FF55 looks like it might be almost ready for FPI
2017-05-06 00:30:22 +12:00
553d1aedde geo.wifi.uri - use mozilla_api_key not google's
Instead of `geo.wifi.uri` using 127.0.0.1, for those who do use geo (`geo.enabled` is the master switch), enforce Mozilla's service over Google's.

- Default in stable, beta: https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_API_KEY%
- Nightly defaults to mozilla (not usre of the exact string)
- I do not know if this is a telemetry thing for mozilla for non-stable or if this will roll down from nightly
2017-05-05 19:11:44 +12:00
9ffc3b0d9a add 3028 general.autoScroll=>inactive 2017-05-04 14:50:37 +12:00
02283833a1 remove 2032 browser.migrate.automigrate.enabled
This is a pref to hide a UI doorhanger which allows an end user to KEEP or UNDO auto-migrated "stuff" from another browser (eg from IE etc). This is part of funnelweb, which is an upcoming makeover of the "onboarding experience" (to retain users in a new FF) - this includes auto-importing their bookmarks etc from another browser in the background and THEN asking if they want to keep them or undo. We cannot block the UI to this for obvious reasons. Funnelweb also includes this like a new Tour UI, activity streams etc

https://bugzilla.mozilla.org/show_bug.cgi?id=1297479
https://bugzilla.mozilla.org/show_bug.cgi?id=1322718#c1

Tour thingy: https://www.ghacks.net/2017/03/31/firefox-photon-new-design-mockups-show-interface-and-more/
Activity Streams: https://www.ghacks.net/2017/04/09/firefox-57-photon-mockups-activity-stream-library-compact-mode-more/
2017-05-03 00:54:22 +12:00
acb22ac368 uBo is now REQUIRED
Have also modified the readme.md and will do so to the wiki implementation page
2017-05-02 15:20:46 +12:00
e1a3d681c8 Update README.md 2017-05-02 15:14:50 +12:00
fc0a045069 tiniest typo ever - != = 2017-05-02 13:52:50 +12:00
8f0569f3fd 2403 add FF versioning 2017-05-02 05:06:44 +12:00
3a39425ab2 kinto: do not block any of it in the template
there are no privacy/security issues here - by default we should not block any of these, but if end-users wish to, then it's up to them
2017-05-02 03:14:06 +12:00
49d229b90f remove sync 2017-05-02 01:26:59 +12:00
f5670636f6 add 2513 dom.presentation.* 2017-05-02 01:16:22 +12:00
9d3c7949fd add 1700s containers 2017-04-30 16:09:14 +12:00
4852318ece Merge pull request from ghacksuserjs/earthlng-patch-1
fix syntax errors in 1110
2017-04-30 14:42:04 +12:00
6fdbcd7fae fix syntax errors in 1110 2017-04-29 14:30:45 +02:00
0bdca802eb typo 2017-04-29 11:22:17 +12:00
9b65d9788d typos 2017-04-29 11:20:38 +12:00
b3af6c1f5f syntax/typo 2017-04-28 10:17:29 +12:00
f3a0e8d88c add 0209: geo.security.allowinsecure
mozilla intend to flip the switch in 55, but the pref is available in FF54 (but no idea if its fully working) - see https://webcache.googleusercontent.com/search?q=cache:yfO0BMezyGcJ:https://groups.google.com/d/msg/mozilla.dev.platform/8BsF76gNhDE/XhsZXcueBAAJ+&cd=2&hl=en&ct=clnk&gl=nz
2017-04-28 05:43:45 +12:00
ffd89807bf 1607: network.http.referer.hideOnionSource 2017-04-28 04:44:23 +12:00
da73ca1759 privacy.firstparty.isolate.restrict_opener_access
FF54 - inactive as is FPI
2017-04-28 04:33:51 +12:00
34 changed files with 2776 additions and 1717 deletions

16
.gitattributes vendored Normal file

@ -0,0 +1,16 @@
* text=auto
*.js text
*.md text
*.yml text
*.txt text
*.sh text
## *.bat text eol=crlf
*.bat -text
*.png binary
.gitattributes export-ignore
*.yml export-ignore
/wikipiki export-ignore
/.github export-ignore

18
.github/ISSUE_TEMPLATE/tools.md vendored Normal file

@ -0,0 +1,18 @@
---
name: Tools
about: Report issues with the updaters, the troubleshooter, or any other tools.
title: ''
labels: ''
assignees: ''
---
<!--
Please specify:
- the name of the file (i.e. updater.bat, updater.sh)
- steps to reproduce the issue
- actual result
- expected result
Blank out this field before typing, or start typing after the next line.
-->

@ -0,0 +1,31 @@
---
name: Troubleshooting help
about: Ask for help to solve problems with user.js
title: 'follow instructions or this will be closed as invalid'
labels: ''
assignees: ''
---
<!--
Issues will be closed as invalid if you do not troubleshoot first, or if you ignore the required info in the template.
We do not support forks or no-longer supported releases.
-->
🟥 https://github.com/arkenfox/user.js/wiki/5.2-Troubleshooting
- [ ] I have read the troubleshooting guide, done the checks and confirmed this is caused by arkenfox
- _unchecked issues ~~may~~ will be closed as invalid_
🟪 REQUIRED INFO
- Browser version & OS:
- Steps to Reproduce (STR):
- Expected result:
- Actual result:
- Console errors and warnings:
- Anything else you deem worth mentioning:
---

15
.github/ISSUE_TEMPLATE/user-js.md vendored Normal file

@ -0,0 +1,15 @@
---
name: user.js
about: Suggest changes to user.js
title: ''
labels: ''
assignees: ''
---
We value feedback in general, but we value feedback from informed users more. There is no need for you to be an expert to participate (most of us aren't), but we hope that you at least understand our decisions before questioning them. We discuss all changes openly, and we do not make changes lightly. So, if you don't understand why we decided to add/remove/change a certain pref, search the repo. The answer is most certainly here.
If some change we made took you by surprise (in the wrong way), remember that keeping track of changes is your responsibility. Watch the repo, read the [changelogs](https://github.com/arkenfox/user.js/issues?utf8=✓&q=is%3Aissue+label%3Achangelog), compare [releases](https://github.com/arkenfox/user.js/releases) as you update your copy of user.js, or use any other method you prefer.
Clear all of this when you're ready to type.

@ -1,6 +1,6 @@
MIT License MIT License
Copyright (c) 2017 ghacksuserjs Copyright (c) 2020 arkenfox
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal of this software and associated documentation files (the "Software"), to deal

@ -1,35 +1,26 @@
### ![](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/bullet01.png) user.js ### 🟪 user.js
A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.1-Overview) wiki page. A `user.js` is a configuration file that can control Firefox settings - for a more technical breakdown and explanation, you can read more in the [wiki](https://github.com/arkenfox/user.js/wiki/2.1-User.js)
### ![](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/bullet01.png) ghacks user.js ### 🟩 the arkenfox user.js
The [ghacks user.js](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js) is a template, which, as provided, aims (with [add-ons](https://github.com/ghacksuserjs/ghacks-user.js/wiki/Appendix-B:-Firefox-Add-ons)) to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).
We aim to INFORM and give you CHOICES. No one size fits all, so customize it! And not all sites have the same requirements, so use [profiles](https://github.com/ghacksuserjs/ghacks-user.js/wiki/2.3-Concurrent-Profiles) with custom versions. We won't set you wrong. [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
INFORMATION IS POWER. So you can make informed decisions to better protect yourself online, we aim to be: The `arkenfox user.js` is a **template** which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).
* Accessible (provide information and simpler, less-technical descriptions if possible) Everyone, experts included, should at least read the [wiki](https://github.com/arkenfox/user.js/wiki), as it contains important information regarding a few `user.js` settings. There is also an [interactive current release](https://arkenfox.github.io/gui/), thanks to [icpantsparti2](https://github.com/icpantsparti2).
* Accountable (provide reputable references/sources, [test sites](https://github.com/ghacksuserjs/ghacks-user.js/wiki/Appendix-C:-Test-Sites), dispel bad advice)
* Change trackable (yay! we're on github now, with commits)
* Compatible (including a deprecated section, [releases](https://github.com/ghacksuserjs/ghacks-user.js/releases))
* Comprehensive (including enforcing defaults and future-proofing)
* Current and up-to-date with stable (including [changelogs](https://github.com/ghacksuserjs/ghacks-user.js/search?q=label%3Achangelog&type=Issues&utf8=%E2%9C%93))
* Detailed (preference versioning, hidden preference information, explanations, and more)
* Easy to use and discuss (sections, sub-sections, numbering)
* Helpful (including a [wiki](https://github.com/ghacksuserjs/ghacks-user.js/wiki) with features such as [add-ons](https://github.com/ghacksuserjs/ghacks-user.js/wiki/Appendix-B:-Firefox-Add-ons), [user scripts](https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-User-Scripts), [references](https://github.com/ghacksuserjs/ghacks-user.js/wiki/Appendix-D:-References) and more)
* Innovative (formatting, special tags, and future plans such as branches)
### ![](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/bullet01.png) usage Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) if your [threat model](https://2019.www.torproject.org/about/torusers.html) calls for it, or for accessing hidden services.
Everyone, experts included, should at least read the [implementation](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.3-Implementation) wiki page, as it contains important information regarding a few default settings we use. The rest of the [wiki](https://github.com/ghacksuserjs/ghacks-user.js/wiki) is helpful as well.
### ![](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/bullet01.png) acknowledgments Also be aware that the `arkenfox user.js` is made specifically for desktop Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.
Literally thousands of sources, references and suggestions. That said...
* Martin Brinkmann at [ghacks](https://www.ghacks.net/) <sup>1</sup> ### 🟧 sitemap
* 100% genuine super-nice all-round good guy
* The ghacks community and commentators
* Special mentions to [earthlng](https://github.com/earthlng), Tom Hawack, Just me, Conker, Rockin Jerry, Ainatar, Parker Lewis
* [12bytes](http://12bytes.org/articles/tech/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs)
* The 12bytes article now uses this user.js and supplements it with an additonal JS hosted right [here](https://github.com/atomGit/Firefox-user.js) at github
<sup>1</sup> The ghacks user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015 and was [first published](https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/) at ghacks in August 2015. It was kept up-to-date and expanded by the original author with three major updates and articles. With Martin Brinkmann's blessing, it will keep the ghacks name. - [releases](https://github.com/arkenfox/user.js/releases)
- [changelogs](https://github.com/arkenfox/user.js/issues?utf8=%E2%9C%93&q=is%3Aissue+label%3Achangelog)
- [wiki](https://github.com/arkenfox/user.js/wiki)
- [stickies](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+is%3Aopen+label%3A%22sticky+topic%22)
- [diffs](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+label%3Adiffs)
- [common questions and answers](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+label%3Aanswered)
### 🟥 acknowledgments
Literally thousands of sources, references and suggestions. Many thanks, and much appreciated.

@ -1 +1,3 @@
theme: jekyll-theme-midnight theme: jekyll-theme-midnight
title: user.js
description: An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting

133
prefsCleaner.bat Normal file

@ -0,0 +1,133 @@
@ECHO OFF & SETLOCAL DisableDelayedExpansion
TITLE prefs.js cleaner
REM ### prefs.js cleaner for Windows
REM ## author: @claustromaniac
REM ## version: 2.8
CD /D "%~dp0"
IF /I "%~1"=="-unattended" (SET _ua=1)
:begin
ECHO:
ECHO:
ECHO ########################################
ECHO #### prefs.js cleaner for Windows ####
ECHO #### by claustromaniac ####
ECHO #### v2.8 ####
ECHO ########################################
ECHO:
CALL :message "This script should be run from your Firefox profile directory."
ECHO It will remove any entries from prefs.js that also exist in user.js.
CALL :message "This will allow inactive preferences to be reset to their default values."
ECHO This Firefox profile shouldn't be in use during the process.
CALL :message ""
TIMEOUT 1 /nobreak >nul
IF NOT DEFINED _ua (
CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
CLS
IF ERRORLEVEL 3 (EXIT /B)
IF ERRORLEVEL 2 (GOTO :showhelp)
)
IF NOT EXIST "user.js" (CALL :abort "user.js not found in the current directory." 30)
IF NOT EXIST "prefs.js" (CALL :abort "prefs.js not found in the current directory." 30)
CALL :strlenCheck
CALL :FFcheck
CALL :message "Backing up prefs.js..."
FOR /F "delims=" %%# IN ('powershell -command get-date -format "{yyyyMMdd_HHmmss}"') DO @SET ldt=%%#
COPY /B /V /Y prefs.js "prefs-backup-%ldt%.js"
CALL :message "Cleaning prefs.js..."
CALL :cleanup
CALL :message "All done!"
TIMEOUT 5 >nul
ENDLOCAL
EXIT /B
REM ########## Abort Function ###########
:abort
CALL :message %1
TIMEOUT %~2 >nul
EXIT
REM ########## Message Function #########
:message
ECHO:
ECHO: %~1
ECHO:
GOTO :EOF
REM ### string length Check Function ####
:strlenCheck
SET /a cnt=0
setlocal ENABLEDELAYEDEXPANSION
FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" prefs.js') DO (
ECHO:%%H >nul
SET /a cnt += 1
IF /I "%%G" NEQ "!cnt!" (
ECHO:
CALL :message "ERROR: line !cnt! in prefs.js is too long."
(CALL :abort "Aborting ..." 30)
)
)
endlocal
GOTO :EOF
REM ####### Firefox Check Function ######
:FFcheck
TASKLIST /FI "IMAGENAME eq firefox.exe" 2>NUL | FIND /I /N "firefox.exe">NUL
IF NOT ERRORLEVEL 1 (
CLS
CALL :message "Firefox is still running."
ECHO If you're not currently using this profile you can continue, otherwise
CALL :message "close Firefox first!"
ECHO:
PAUSE
CLS
CALL :message "Resuming..."
TIMEOUT 5 /nobreak >nul
)
GOTO :EOF
REM ######### Cleanup Function ##########
:cleanup
FOR /F tokens^=2^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^[^\"']*user_pref[ ]*\([ ]*[\"'][^\"']*[\"'][ ]*," user.js') DO (
IF NOT ""=="%%G" (SET "[%%G]=1")
)
(
FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" prefs.js') DO (
IF ""=="%%H" (
ECHO:
) ELSE (
FOR /F tokens^=1^,2^ delims^=^"^' %%I IN ("%%H") DO (
IF NOT DEFINED [%%J] (ECHO:%%H)
)
)
)
)>tempcleanedprefs
MOVE /Y tempcleanedprefs prefs.js
GOTO :EOF
REM ############### Help ##################
:showhelp
MODE 80,34
CLS
CALL :message "This script creates a backup of your prefs.js file before doing anything."
ECHO It should be safe, but you can follow these steps if something goes wrong:
ECHO:
CALL :message " 1. Make sure Firefox is closed."
ECHO 2. Delete prefs.js in your profile folder.
CALL :message " 3. Delete Invalidprefs.js if you have one in the same folder."
ECHO 4. Rename or copy your latest backup to prefs.js.
CALL :message " 5. Run Firefox and see if you notice anything wrong with it."
ECHO 6. If you do notice something wrong, especially with your extensions,
CALL :message " and/or with the UI, go to about:support, and restart Firefox with"
ECHO add-ons disabled. Then, restart it again normally, and see if the
CALL :message " problems were solved."
ECHO:
CALL :message "If you are able to identify the cause of your issues, please bring it up"
ECHO on arkenfox user.js GitHub repository.
ECHO:
ECHO:
PAUSE
CLS
GOTO :begin
REM #####################################

185
prefsCleaner.sh Executable file

@ -0,0 +1,185 @@
#!/usr/bin/env bash
## prefs.js cleaner for Linux/Mac
## author: @claustromaniac
## version: 2.1
## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_prefsCleaner() )
readonly CURRDIR=$(pwd)
## get the full path of this script (readlink for Linux, greadlink for Mac with coreutils installed)
SCRIPT_FILE=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
## fallback for Macs without coreutils
[ -z "$SCRIPT_FILE" ] && SCRIPT_FILE=${BASH_SOURCE[0]}
AUTOUPDATE=true
QUICKSTART=false
## download method priority: curl -> wget
DOWNLOAD_METHOD=''
if command -v curl >/dev/null; then
DOWNLOAD_METHOD='curl --max-redirs 3 -so'
elif command -v wget >/dev/null; then
DOWNLOAD_METHOD='wget --max-redirect 3 --quiet -O'
else
AUTOUPDATE=false
echo -e "No curl or wget detected.\nAutomatic self-update disabled!"
fi
fQuit() {
## change directory back to the original working directory
cd "${CURRDIR}"
[ "$1" -eq 0 ] && echo -e "\n$2" || echo -e "\n$2" >&2
exit $1
}
fUsage() {
echo -e "\nUsage: $0 [-ds]"
echo -e "
Optional Arguments:
-s Start immediately
-d Don't auto-update prefsCleaner.sh"
}
download_file() { # expects URL as argument ($1)
declare -r tf=$(mktemp)
$DOWNLOAD_METHOD "${tf}" "$1" &>/dev/null && echo "$tf" || echo '' # return the temp-filename or empty string on error
}
fFF_check() {
# there are many ways to see if firefox is running or not, some more reliable than others
# this isn't elegant and might not be future-proof but should at least be compatible with any environment
while [ -e lock ]; do
echo -e "\nThis Firefox profile seems to be in use. Close Firefox and try again.\n" >&2
read -r -p "Press any key to continue."
done
}
## returns the version number of a prefsCleaner.sh file
get_prefsCleaner_version() {
echo "$(sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p' "$1")"
}
## updates the prefsCleaner.sh file based on the latest public version
update_prefsCleaner() {
declare -r tmpfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/prefsCleaner.sh')"
[ -z "$tmpfile" ] && echo -e "Error! Could not download prefsCleaner.sh" && return 1 # check if download failed
[[ $(get_prefsCleaner_version "$SCRIPT_FILE") == $(get_prefsCleaner_version "$tmpfile") ]] && return 0
mv "$tmpfile" "$SCRIPT_FILE"
chmod u+x "$SCRIPT_FILE"
"$SCRIPT_FILE" "$@" -d
exit 0
}
fClean() {
# the magic happens here
prefs="@@"
prefexp="user_pref[ ]*\([ ]*[\"']([^\"']+)[\"'][ ]*,"
while read -r line; do
if [[ "$line" =~ $prefexp && $prefs != *"@@${BASH_REMATCH[1]}@@"* ]]; then
prefs="${prefs}${BASH_REMATCH[1]}@@"
fi
done <<< "$(grep -E "$prefexp" user.js)"
while IFS='' read -r line || [[ -n "$line" ]]; do
if [[ "$line" =~ ^$prefexp ]]; then
if [[ $prefs != *"@@${BASH_REMATCH[1]}@@"* ]]; then
echo "$line"
fi
else
echo "$line"
fi
done < "$1" > prefs.js
}
fStart() {
if [ ! -e user.js ]; then
fQuit 1 "user.js not found in the current directory."
elif [ ! -e prefs.js ]; then
fQuit 1 "prefs.js not found in the current directory."
fi
fFF_check
mkdir -p prefsjs_backups
bakfile="prefsjs_backups/prefs.js.backup.$(date +"%Y-%m-%d_%H%M")"
mv prefs.js "${bakfile}" || fQuit 1 "Operation aborted.\nReason: Could not create backup file $bakfile"
echo -e "\nprefs.js backed up: $bakfile"
echo "Cleaning prefs.js..."
fClean "$bakfile"
fQuit 0 "All done!"
}
while getopts "sd" opt; do
case $opt in
s)
QUICKSTART=true
;;
d)
AUTOUPDATE=false
;;
esac
done
## change directory to the Firefox profile directory
cd "$(dirname "${SCRIPT_FILE}")"
# Check if running as root and if any files have the owner as root/wheel.
if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
fQuit 1 "You shouldn't run this with elevated privileges (such as with doas/sudo)."
elif [ -n "$(find ./ -user 0)" ]; then
printf 'It looks like this script was previously run with elevated privileges,
you will need to change ownership of the following files to your user:\n'
find . -user 0
fQuit 1
fi
[ "$AUTOUPDATE" = true ] && update_prefsCleaner "$@"
echo -e "\n\n"
echo " ╔══════════════════════════╗"
echo " ║ prefs.js cleaner ║"
echo " ║ by claustromaniac ║"
echo " ║ v2.1 ║"
echo " ╚══════════════════════════╝"
echo -e "\nThis script should be run from your Firefox profile directory.\n"
echo "It will remove any entries from prefs.js that also exist in user.js."
echo "This will allow inactive preferences to be reset to their default values."
echo -e "\nThis Firefox profile shouldn't be in use during the process.\n"
[ "$QUICKSTART" = true ] && fStart
echo -e "\nIn order to proceed, select a command below by entering its corresponding number.\n"
select option in Start Help Exit; do
case $option in
Start)
fStart
;;
Help)
fUsage
echo -e "\nThis script creates a backup of your prefs.js file before doing anything."
echo -e "It should be safe, but you can follow these steps if something goes wrong:\n"
echo "1. Make sure Firefox is closed."
echo "2. Delete prefs.js in your profile folder."
echo "3. Delete Invalidprefs.js if you have one in the same folder."
echo "4. Rename or copy your latest backup to prefs.js."
echo "5. Run Firefox and see if you notice anything wrong with it."
echo "6. If you do notice something wrong, especially with your extensions, and/or with the UI, go to about:support, and restart Firefox with add-ons disabled. Then, restart it again normally, and see if the problems were solved."
echo -e "If you are able to identify the cause of your issues, please bring it up on the arkenfox user.js GitHub repository.\n"
;;
Exit)
fQuit 0
;;
esac
done
fQuit 0

@ -0,0 +1,166 @@
/***
This will reset the preferences that since FF91 have been
- removed from the arkenfox user.js
- deprecated by Mozilla but listed in the arkenfox user.js in the past
There is an archived version at https://github.com/arkenfox/user.js/issues/123
if you want the full list since jesus
Last updated: 21-April-2025
Instructions:
- [optional] close Firefox and backup your profile
- [optional] disable your network connection [1]
- start Firefox
- load about:config and press Ctrl+Shift+K to open the Web Console for about:config
- using about:config is important, so the script has the right permissions
- paste this script
- if you edited the list of prefs in the script, make sure the last pref does not have a trailing comma
- hit enter
- check the Info output to see which prefs were reset
- restart
- some prefs require a restart
- a restart will reapply your user.js
- [optional] re-enable your network connection
[1] Blocking Firefox from the internet ensures it cannot act on your reset preferences in the
period before you restart it, such as app and extension auto-updating, or downloading unwanted
components (GMP etc). It depends on what you're resetting and how long before you restart.
***/
(() => {
if ('undefined' === typeof(Services)) return alert('about:config needs to be the active tab!');
const aPREFS = [
/* DEPRECATED */
/* 129-140 */
'media.ondevicechange.enabled', // 137
'webchannel.allowObject.urlWhitelist', // 132
/* 116-128 */
'browser.contentanalysis.default_allow', // 127
'browser.messaging-system.whatsNewPanel.enabled', // 126
'browser.ping-centre.telemetry', // 123
'dom.webnotifications.serviceworker.enabled', // 117
'javascript.use_us_english_locale', // 119
'layout.css.font-visibility.private', // 118
'layout.css.font-visibility.resistFingerprinting', // 116
'layout.css.font-visibility.standard', // 118
'layout.css.font-visibility.trackingprotection', // 118
'network.dns.skipTRR-when-parental-control-enabled', // 119
'permissions.delegation.enabled', // 118
'security.family_safety.mode', // 117
'widget.non-native-theme.enabled', // 127
/* 103-115 */
'browser.cache.offline.enable', // 115
'extensions.formautofill.heuristics.enabled', // 114
'network.cookie.lifetimePolicy', // 103 [technically removed in 104]
'privacy.clearsitedata.cache.enabled', // 114
'privacy.resistFingerprinting.testGranularityMask', // 114
'security.pki.sha1_enforcement_level', // 103
/* 92-102 */
'browser.urlbar.suggest.quicksuggest', // 95
'dom.securecontext.whitelist_onions', // 97
'dom.storage.next_gen', // 102
'network.http.spdy.enabled', // 100
'network.http.spdy.enabled.deps',
'network.http.spdy.enabled.http2',
'network.http.spdy.websockets',
'layout.css.font-visibility.level', // 94
'security.ask_for_password', // 102
'security.csp.enable', // 99
'security.password_lifetime', // 102
'security.ssl3.rsa_des_ede3_sha', // 93
/* REMOVED */
/* 129-140 */
'dom.securecontext.allowlist_onions',
'network.http.referer.hideOnionSource',
'privacy.clearOnShutdown.cache',
'privacy.clearOnShutdown.cookies',
'privacy.clearOnShutdown.downloads',
'privacy.clearOnShutdown.formdata',
'privacy.clearOnShutdown.history',
'privacy.clearOnShutdown.offlineApps',
'privacy.clearOnShutdown.sessions',
'privacy.cpd.cache',
'privacy.cpd.cookies',
'privacy.cpd.formdata',
'privacy.cpd.history',
'privacy.cpd.offlineApps',
'privacy.cpd.sessions',
/* 116-128 */
'browser.fixup.alternate.enabled',
'browser.taskbar.previews.enable',
'browser.urlbar.dnsResolveSingleWordsAfterSearch',
'geo.provider.network.url',
'geo.provider.network.logging.enabled',
'geo.provider.use_gpsd',
'media.gmp-widevinecdm.enabled',
'network.protocol-handler.external.ms-windows-store',
'privacy.partition.always_partition_third_party_non_cookie_storage',
'privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage',
'privacy.partition.serviceWorkers',
/* 103-115 */
'beacon.enabled',
'browser.startup.blankWindow',
'browser.newtab.preload',
'browser.newtabpage.activity-stream.feeds.discoverystreamfeed',
'browser.newtabpage.activity-stream.feeds.snippets',
'browser.region.network.url',
'browser.region.update.enabled',
'browser.search.region',
'browser.ssl_override_behavior',
'browser.tabs.warnOnClose',
'devtools.chrome.enabled',
'dom.disable_beforeunload',
'dom.disable_open_during_load',
'dom.netinfo.enabled',
'dom.vr.enabled',
'extensions.formautofill.addresses.supported',
'extensions.formautofill.available',
'extensions.formautofill.creditCards.available',
'extensions.formautofill.creditCards.supported',
'middlemouse.contentLoadURL',
'network.http.altsvc.oe',
/* 92-102 */
'browser.urlbar.trimURLs',
'dom.caches.enabled',
'dom.storageManager.enabled',
'dom.storage_access.enabled',
'dom.targetBlankNoOpener.enabled',
'network.cookie.thirdparty.sessionOnly',
'network.cookie.thirdparty.nonsecureSessionOnly',
'privacy.firstparty.isolate.block_post_message',
'privacy.firstparty.isolate.restrict_opener_access',
'privacy.firstparty.isolate.use_site',
'privacy.window.name.update.enabled',
'security.insecure_connection_text.enabled',
/* IMPORTANT: last active pref must not have a trailing comma */
/* reset parrot: check your open about:config after running the script */
'_user.js.parrot'
];
console.clear();
let c = 0;
for (const sPname of aPREFS) {
if (Services.prefs.prefHasUserValue(sPname)) {
Services.prefs.clearUserPref(sPname);
if (!Services.prefs.prefHasUserValue(sPname)) {
console.info('reset', sPname);
c++;
} else console.warn('failed to reset', sPname);
}
}
focus();
const d = (c==1) ? ' pref' : ' prefs';
alert(c ? 'successfully reset ' + c + d + "\n\nfor details check the console" : 'nothing to reset');
return 'all done';
})();

@ -0,0 +1,210 @@
/*** arkenfox user.js troubleshooter.js v1.6.3 ***/
(function() {
if ("undefined" === typeof(Services)) return alert('about:config needs to be the active tab!');
const aPREFS = [
/* known culprits */
'network.cookie.cookieBehavior',
'network.http.referer.XOriginPolicy',
'privacy.firstparty.isolate',
'privacy.resistFingerprinting',
'security.mixed_content.block_display_content',
'svg.disabled',
/* Storage + Cache */
'browser.cache.offline.enable',
'dom.storage.enabled',
'dom.storageManager.enabled',
/* Workers, Web + Push Notifications */
'dom.caches.enabled',
'dom.push.connection.enabled',
'dom.push.enabled',
'dom.push.serverURL',
'dom.serviceWorkers.enabled',
'dom.webnotifications.enabled',
'dom.webnotifications.serviceworker.enabled',
/* Fonts */
'browser.display.use_document_fonts',
'font.blacklist.underline_offset',
'gfx.font_rendering.graphite.enabled',
'gfx.font_rendering.opentype_svg.enabled',
'layout.css.font-loading-api.enabled',
/* Misc */
'browser.link.open_newwindow.restriction',
'canvas.capturestream.enabled',
'dom.event.clipboardevents.enabled',
'dom.event.contextmenu.enabled',
'dom.IntersectionObserver.enabled',
'dom.popup_allowed_events',
'full-screen-api.enabled',
'intl.accept_languages',
'javascript.options.asmjs',
'javascript.options.wasm',
'permissions.default.shortcuts',
/* Hardware */
'dom.vr.enabled',
'media.ondevicechange.enabled',
/* Audio + Video */
'dom.webaudio.enabled',
'media.autoplay.default', // FF63+
'media.autoplay.blocking_policy', // FF78+
/* Forms */
'browser.formfill.enable',
'signon.autofillForms',
'signon.formlessCapture.enabled',
/* HTTPS */
'security.cert_pinning.enforcement_level',
'security.family_safety.mode',
'security.OCSP.require',
'security.pki.sha1_enforcement_level',
'security.ssl.require_safe_negotiation',
'security.ssl.treat_unsafe_negotiation_as_broken',
'security.ssl3.dhe_rsa_aes_128_sha',
'security.ssl3.dhe_rsa_aes_256_sha',
'security.ssl3.ecdhe_ecdsa_aes_128_sha',
'security.ssl3.ecdhe_rsa_aes_128_sha',
'security.ssl3.rsa_aes_128_sha',
'security.ssl3.rsa_aes_256_sha',
'security.ssl3.rsa_des_ede3_sha',
'security.tls.enable_0rtt_data',
'security.tls.version.max',
'security.tls.version.min',
/* Plugins + Flash */
'plugin.default.state',
'plugin.state.flash',
/* unlikely to cause problems */
'dom.popup_maximum',
'geo.provider.network.url',
'layout.css.visited_links_enabled',
'mathml.disabled',
'network.auth.subresource-http-auth-allow',
'network.http.redirection-limit',
'network.protocol-handler.external.ms-windows-store',
'privacy.trackingprotection.enabled',
'security.data_uri.block_toplevel_data_uri_navigations',
'privacy.window.name.update.enabled', // FF82+
'last.one.without.comma'
]
// any runtime-set pref that everyone will have and that can be safely reset
const oFILLER = { type: 64, name: 'app.update.lastUpdateTime.browser-cleanup-thumbnails', value: 1580000000 };
function getMyList(arr) {
const aRet = [];
for (const sPname of arr) {
if (Services.prefs.prefHasUserValue(sPname)) {
const ptype = Services.prefs.getPrefType(sPname);
switch (ptype) {
case 32: // string (see https://dxr.mozilla.org/mozilla-central/source/modules/libpref/nsIPrefBranch.idl#31)
aRet.push({'type':ptype,'name':sPname,'value':Services.prefs.getCharPref(sPname)});
break;
case 64: // int
aRet.push({'type':ptype,'name':sPname,'value':Services.prefs.getIntPref(sPname)});
break;
case 128: // boolean
aRet.push({'type':ptype,'name':sPname,'value':Services.prefs.getBoolPref(sPname)});
break;
default:
console.log("error detecting pref-type for '"+sPname+"' !");
}
}
}
return aRet;
}
function reapply(arr) {
for (const oPref of arr) {
switch (oPref.type) {
case 32: // string
Services.prefs.setCharPref(oPref.name, oPref.value);
break;
case 64: // int
Services.prefs.setIntPref(oPref.name, oPref.value);
break;
case 128: // boolean
Services.prefs.setBoolPref(oPref.name, oPref.value);
break;
default:
console.log("error re-appyling value for '"+oPref.name+"' !"); // should never happen
}
}
}
function myreset(arr) {
for (const oPref of arr) Services.prefs.clearUserPref(oPref.name);
}
function resetAllMatchingDefault(arr) {
const aTmp = getMyList(arr);
myreset(aTmp);
reapply(aTmp);
}
function _main(aALL) {
const _h = (arr) => Math.ceil(arr.length/2);
let aTmp = aALL, aDbg = aALL;
reapply(aALL);
myreset(aTmp.slice(0, _h(aTmp)));
while (aTmp.length) {
alert('NOW TEST AGAIN !');
if (confirm('if the problem still exists click OK, otherwise click Cancel.')) {
aTmp = aTmp.slice(_h(aTmp));
} else {
aTmp = aTmp.slice(0, _h(aTmp));
aDbg = aTmp; // update narrowed down list
if (aDbg.length == 1) break;
}
reapply(aALL);
myreset(aTmp.slice(0, _h(aTmp))); // reset half of the remaining prefs
}
reapply(aALL);
if (aDbg.length == 1) return alert("narrowed it down to:\n\n"+aDbg[0].name+"\n");
if (aDbg.length == aALL.length) {
const msg = "Failed to narrow it down beyond the initial "+aALL.length+" prefs. The problem is most likely caused by at least 2 prefs!\n\n" +
"Either those prefs are too far apart in the list or there are exactly 2 culprits and they just happen to be at the wrong place.\n\n" +
"In case it's the latter, the script can add a dummy pref and you can try again - Try again?";
if (confirm(msg)) return _main([...aALL, oFILLER]);
} else if (aDbg.length > 10 && confirm("Narrowed it down to "+aDbg.length+" prefs. Try narrowing it down further?")) {
return _main(aDbg.reverse());
}
alert("Narrowed it down to "+ aDbg.length.toString() +" prefs, check the console ...");
console.log('The problem is caused by 2 or more of these prefs:');
for (const oPref of aDbg) console.log(oPref.name);
}
resetAllMatchingDefault(aPREFS); // reset user-set prefs matching FFs default value
const aBAK = getMyList(aPREFS);
//console.log(aBAK.length, "user-set prefs from our list detected and their values stored.");
const sMsg = "all detected prefs reset.\n\n" +
"!! KEEP THIS PROMPT OPEN AND TEST THE SITE IN ANOTHER TAB !!\n\n" +
"IF the problem still exists, this script can't help you - click Cancel to re-apply your values and exit.\n\n" +
"Click OK if your problem is fixed.";
focus();
myreset(aBAK);
if (!confirm(sMsg)) {
reapply(aBAK);
return;
}
_main(aBAK);
})();

323
updater.bat Normal file

@ -0,0 +1,323 @@
@ECHO OFF & SETLOCAL EnableDelayedExpansion
TITLE arkenfox user.js updater
REM ## arkenfox user.js updater for Windows
REM ## author: @claustromaniac
REM ## version: 4.20
REM ## instructions: https://github.com/arkenfox/user.js/wiki/5.1-Updater-[Options]#-windows
SET v=4.19
VERIFY ON
CD /D "%~dp0"
SET _myname=%~n0
SET _myparams=%*
:parse
IF "%~1"=="" (GOTO endparse)
IF /I "%~1"=="-unattended" (SET _ua=1)
IF /I "%~1"=="-log" (SET _log=1)
IF /I "%~1"=="-logp" (SET _log=1 & SET _logp=1)
IF /I "%~1"=="-multioverrides" (SET _multi=1)
IF /I "%~1"=="-merge" (SET _merge=1)
IF /I "%~1"=="-updatebatch" (SET _updateb=1)
IF /I "%~1"=="-singlebackup" (SET _singlebackup=1)
IF /I "%~1"=="-esr" (SET _esr=1)
SHIFT
GOTO parse
:endparse
FOR /F %%i IN ('PowerShell -Command "[Enum]::GetNames([Net.SecurityProtocolType]) -contains 'Tls12'"') DO (
IF "%%i" == "False" (
CALL :message "Your PowerShell version doesn't support TLS1.2 ^!"
ECHO: Instructions to update PowerShell are on the arkenfox wiki
PAUSE
EXIT
)
)
IF DEFINED _updateb (
REM The normal flow here goes from phase 1 to phase 2 and then phase 3.
IF NOT "!_myname:~0,9!"=="[updated]" (
IF EXIST "[updated]!_myname!.bat" (
REM ## Phase 3 ##: The new script, with the original name, will:
REM * Delete the [updated]*.bat and *.bat.old scripts
REM * Begin the normal routine
FC "[updated]!_myname!.bat" "!_myname!.bat.old" >nul
IF NOT "!errorlevel!"=="0" (
CALL :message "Script updated to version !v!"
TIMEOUT 3 >nul
)
REN "[updated]!_myname!.bat" "[updated]!_myname!.bat.old"
DEL /F "!_myname!.bat.old" "[updated]!_myname!.bat.old"
GOTO begin
)
REM ## Phase 1 ##
REM * Download new batch and name it [updated]*.bat
REM * Start that script in a new CMD window
REM * Exit
CALL :message "Updating script..."
REM Uncomment the next line and comment out the PowerShell call for testing.
REM COPY /B /Y "!_myname!.bat" "[updated]!_myname!.bat" >nul
CALL :psdownload https://raw.githubusercontent.com/arkenfox/user.js/master/updater.bat "[updated]!_myname!.bat"
IF EXIST "[updated]!_myname!.bat" (
START /min CMD /C "[updated]!_myname!.bat" !_myparams!
) ELSE (
CALL :message "Failed. Make sure PowerShell is allowed internet access."
TIMEOUT 120 >nul
)
) ELSE (
IF "!_myname!"=="[updated]" (
CALL :message "The [updated] label is reserved. Rename this script and try again."
TIMEOUT 300 >nul
) ELSE (
REM ## Phase 2 ##: The [updated]*.bat script will:
REM * Rename the old script and make a copy of itself with the original name.
REM * Run that copy in a new CMD instance
REM * Exit
IF EXIST "!_myname:~9!.bat" ( REN "!_myname:~9!.bat" "!_myname:~9!.bat.old" )
COPY /B /Y "!_myname!.bat" "!_myname:~9!.bat"
START CMD /C "!_myname:~9!.bat" !_myparams!
)
)
EXIT /B
)
:begin
CLS
ECHO:
ECHO:
ECHO: ########################################
ECHO: #### user.js Updater for Windows ####
ECHO: #### by claustromaniac ####
ECHO: #### v!v! ####
ECHO: ########################################
ECHO:
SET /A "_line=0"
IF NOT EXIST user.js (
CALL :message "user.js not detected in the current directory."
) ELSE (
FOR /F "skip=1 tokens=1,* delims=:" %%G IN (user.js) DO (
SET /A "_line+=1"
IF !_line! GEQ 4 (GOTO exitloop)
IF !_line! EQU 1 (SET _name=%%H)
IF !_line! EQU 2 (SET _date=%%H)
IF !_line! EQU 3 (SET _version=%%G)
)
:exitloop
IF NOT "!_name!"=="" (
SET "_tempvar="
IF /I NOT "!_name!"=="!_name:ghacks=!" SET _tempvar=1
IF /I NOT "!_name!"=="!_name:arkenfox=!" SET _tempvar=1
IF !_tempvar! EQU 1 (
CALL :message "!_name! !_version:~2!,!_date!"
) ELSE (CALL :message "Current user.js version not recognised.")
) ELSE (CALL :message "Current user.js version not recognised.")
)
ECHO:
IF NOT DEFINED _ua (
CALL :message "This batch should be run from your Firefox profile directory."
ECHO: It will download the latest version of arkenfox user.js from github and then
CALL :message "append any of your own changes from user-overrides.js to it."
CALL :message "Visit the wiki for more detailed information."
ECHO:
TIMEOUT 1 /nobreak >nul
CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
CLS
IF ERRORLEVEL 3 (EXIT /B)
IF ERRORLEVEL 2 (GOTO :showhelp)
)
IF DEFINED _log (
CALL :log >>user.js-update-log.txt 2>&1
IF DEFINED _logp (START user.js-update-log.txt)
EXIT /B
:log
SET _log=2
ECHO:##################################################################
ECHO: %date%, %time%
)
IF EXIST user.js.new (DEL /F "user.js.new")
CALL :message "Retrieving latest user.js file from github repository..."
CALL :psdownload https://raw.githubusercontent.com/arkenfox/user.js/master/user.js "user.js.new"
IF EXIST user.js.new (
IF DEFINED _esr (
CALL :message "Activating ESR section..."
CALL :activate user.js.new ".x still uses all the following prefs"
)
IF DEFINED _multi (
FORFILES /P user.js-overrides /M *.js >nul 2>&1
IF NOT ERRORLEVEL 1 (
IF DEFINED _merge (
CALL :message "Merging..."
COPY /B /Y user.js-overrides\*.js user-overrides-merged.js
CALL :merge user-overrides-merged.js
COPY /B /Y user.js.new+user-overrides-merged.js user.js.new
CALL :merge user.js.new
) ELSE (
CALL :message "Appending..."
COPY /B /Y user.js.new+"user.js-overrides\*.js" user.js.new
)
) ELSE (CALL :message "No override files found.")
) ELSE (
IF EXIST "user-overrides.js" (
COPY /B /Y user.js.new+"user-overrides.js" "user.js.new"
IF DEFINED _merge (
CALL :message "Merging user-overrides.js..."
CALL :merge user.js.new
) ELSE (
CALL :message "user-overrides.js appended."
)
) ELSE (CALL :message "user-overrides.js not found.")
)
IF EXIST user.js (
FC user.js.new user.js >nul && SET "_changed=false" || SET "_changed=true"
)
IF "!_changed!"=="true" (
CALL :message "Backing up..."
IF DEFINED _singlebackup (
MOVE /Y user.js user.js.bak >nul
) ELSE (
FOR /F "delims=" %%# IN ('powershell -command get-date -format "{yyyyMMdd_HHmmss}"') DO @SET ldt=%%#
MOVE /Y user.js "user-backup-!ldt!.js" >nul
)
REN user.js.new user.js
CALL :message "Update complete."
) ELSE (
IF "!_changed!"=="false" (
DEL /F user.js.new >nul
CALL :message "Update completed without changes."
) ELSE (
REN user.js.new user.js
CALL :message "Update complete."
SET "_changed=true"
)
)
) ELSE (
CALL :message "Update failed. Make sure PowerShell is allowed internet access."
ECHO: No changes were made.
)
IF NOT DEFINED _log (
IF NOT DEFINED _ua (
IF EXIST prefsCleaner.bat (
IF "!_changed!"=="true" (
CALL :message "Would you like to run the prefsCleaner now?"
CHOICE /C YN /N /M "(Y/N) "
IF "1"=="!errorlevel!" ( START "" cmd.exe /C "prefsCleaner.bat" )
) ELSE (PAUSE)
) ELSE (PAUSE)
)
)
EXIT /B
::::::::::::::: Message :::::::::::::::
:message
SETLOCAL DisableDelayedExpansion
IF NOT "2"=="%_log%" (ECHO:)
ECHO: %~1
IF NOT "2"=="%_log%" (ECHO:)
ENDLOCAL
GOTO :EOF
::::::::::::::: Download :::::::::::::::
:psdownload
(
PowerShell -Command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object Net.WebClient).DownloadFile('%~1', '%~2')"
) >nul 2>&1
GOTO :EOF
::::::::::::::: Activate Section :::::::::::::::
:activate
:: arg1 = file
:: arg2 = line substring
SETLOCAL DisableDelayedExpansion
(
FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" "%~1"') DO (
SET "_temp=%%H"
SETLOCAL EnableDelayedExpansion
IF "!_temp:%~2=!"=="!_temp!" (
ENDLOCAL & ECHO:%%H
) ELSE (
ECHO://!_temp:~2!
ENDLOCAL
)
)
)>updatertempfile
MOVE /Y updatertempfile "%~1" >nul
ENDLOCAL
GOTO :EOF
::::::::::::::: Merge :::::::::::::::
:merge
SETLOCAL DisableDelayedExpansion
FOR /F tokens^=2^,^*^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^user_pref[ ]*\([ ]*[\"'].*[\"'][ ]*,.*\)[ ]*;" "%~1"') DO (SET "[%%G]=%%H")
FOR /F tokens^=2^,^*^ delims^=^' %%G IN ('FINDSTR /R /C:"^//// --- comment-out --- '[^'][^']*'.*" "%~1"') DO (SET "__unset__%%G=1")
(
FOR /F "tokens=1,* delims=:" %%I IN ('FINDSTR /N "^" "%~1"') DO (
SET "_temp=%%J"
SETLOCAL EnableDelayedExpansion
IF NOT "!_temp:~0,9!"=="user_pref" (
ENDLOCAL & ECHO:%%J
) ELSE (
IF "!_temp:;=!"=="!_temp!" (
ENDLOCAL & ECHO:%%J
) ELSE (
ENDLOCAL
FOR /F tokens^=2^ delims^=^'^" %%K IN ("%%J") DO (
IF NOT "_user.js.parrot"=="%%K" (
IF DEFINED __unset__%%K (
ECHO://%%J
) ELSE (
IF DEFINED [%%K] (
SETLOCAL EnableDelayedExpansion
FOR /F "delims=" %%L IN ("![%%K]!") DO (
ENDLOCAL & ECHO:user_pref("%%K"%%L
SET "[%%K]="
)
)
)
) ELSE (ECHO:%%J)
)
)
)
)
)>updatertempfile
MOVE /Y updatertempfile "%~1" >nul
ENDLOCAL
GOTO :EOF
::::::::::::::: Help :::::::::::::::
:showhelp
MODE 80,54
CLS
CALL :message "Available arguments (case-insensitive):"
CALL :message " -esr"
ECHO: Activate ESR related preferences
CALL :message " -log"
ECHO: Write the console output to a logfile (user.js-update-log.txt)
CALL :message " -logP"
ECHO: Like -log, but also open the logfile after updating.
CALL :message " -merge"
ECHO: Merge overrides instead of appending them. Single-line comments and
ECHO: _user.js.parrot lines are appended normally. Overrides for inactive
ECHO: user.js prefs will be appended. When -Merge and -MultiOverrides are used
ECHO: together, a user-overrides-merged.js file is also generated in the root
ECHO: directory for quick reference. It contains only the merged data from
ECHO: override files and can be safely discarded after updating, or used as the
ECHO: new user-overrides.js. When there are conflicting records for the same
ECHO: pref, the value of the last one declared will be used. Visit the wiki
ECHO: for usage examples and more detailed information.
CALL :message " -multiOverrides"
ECHO: Use any and all .js files in a user.js-overrides sub-folder as overrides
ECHO: instead of the default user-overrides.js file. Files are appended in
ECHO: alphabetical order.
CALL :message " -unattended"
ECHO: Run without user input.
CALL :message " -singleBackup"
ECHO: Use a single backup file and overwrite it on new updates, instead of
ECHO: cumulative backups. This was the default behaviour before v4.3.
CALL :message " -updateBatch"
ECHO: Update the script itself on execution, before the normal routine.
CALL :message ""
PAUSE
MODE 80,25
GOTO :begin

407
updater.sh Executable file

@ -0,0 +1,407 @@
#!/usr/bin/env bash
## arkenfox user.js updater for macOS and Linux
## version: 4.0
## Author: Pat Johnson (@overdodactyl)
## Additional contributors: @earthlng, @ema-pe, @claustromaniac, @infinitewarp
## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_updater() )
# Check if running as root
if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
printf "You shouldn't run this with elevated privileges (such as with doas/sudo).\n"
exit 1
fi
readonly CURRDIR=$(pwd)
SCRIPT_FILE=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
[ -z "$SCRIPT_FILE" ] && SCRIPT_FILE=${BASH_SOURCE[0]}
readonly SCRIPT_DIR=$(dirname "${SCRIPT_FILE}")
#########################
# Base variables #
#########################
# Colors used for printing
RED='\033[0;31m'
BLUE='\033[0;34m'
BBLUE='\033[1;34m'
GREEN='\033[0;32m'
ORANGE='\033[0;33m'
CYAN='\033[0;36m'
NC='\033[0m' # No Color
# Argument defaults
UPDATE='check'
CONFIRM='yes'
OVERRIDE='user-overrides.js'
BACKUP='multiple'
COMPARE=false
SKIPOVERRIDE=false
VIEW=false
PROFILE_PATH=false
ESR=false
# Download method priority: curl -> wget
DOWNLOAD_METHOD=''
if command -v curl >/dev/null; then
DOWNLOAD_METHOD='curl --max-redirs 3 -so'
elif command -v wget >/dev/null; then
DOWNLOAD_METHOD='wget --max-redirect 3 --quiet -O'
else
echo -e "${RED}This script requires curl or wget.\nProcess aborted${NC}"
exit 1
fi
show_banner() {
echo -e "${BBLUE}
############################################################################
#### ####
#### arkenfox user.js ####
#### Hardening the Privacy and Security Settings of Firefox ####
#### Maintained by @Thorin-Oakenpants and @earthlng ####
#### Updater for macOS and Linux by @overdodactyl ####
#### ####
############################################################################"
echo -e "${NC}\n"
echo -e "Documentation for this script is available here: ${CYAN}https://github.com/arkenfox/user.js/wiki/5.1-Updater-[Options]#-maclinux${NC}\n"
}
#########################
# Arguments #
#########################
usage() {
echo
echo -e "${BLUE}Usage: $0 [-bcdehlnrsuv] [-p PROFILE] [-o OVERRIDE]${NC}" 1>&2 # Echo usage string to standard error
echo -e "
Optional Arguments:
-h Show this help message and exit.
-p PROFILE Path to your Firefox profile (if different than the dir of this script)
IMPORTANT: If the path contains spaces, wrap the entire argument in quotes.
-l Choose your Firefox profile from a list
-u Update updater.sh and execute silently. Do not seek confirmation.
-d Do not look for updates to updater.sh.
-s Silently update user.js. Do not seek confirmation.
-b Only keep one backup of each file.
-c Create a diff file comparing old and new user.js within userjs_diffs.
-o OVERRIDE Filename or path to overrides file (if different than user-overrides.js).
If used with -p, paths should be relative to PROFILE or absolute paths
If given a directory, all files inside will be appended recursively.
You can pass multiple files or directories by passing a comma separated list.
Note: If a directory is given, only files inside ending in the extension .js are appended
IMPORTANT: Do not add spaces between files/paths. Ex: -o file1.js,file2.js,dir1
IMPORTANT: If any file/path contains spaces, wrap the entire argument in quotes.
Ex: -o \"override folder\"
-n Do not append any overrides, even if user-overrides.js exists.
-v Open the resulting user.js file.
-r Only download user.js to a temporary file and open it.
-e Activate ESR related preferences."
echo
exit 1
}
#########################
# File Handling #
#########################
download_file() { # expects URL as argument ($1)
declare -r tf=$(mktemp)
$DOWNLOAD_METHOD "${tf}" "$1" &>/dev/null && echo "$tf" || echo '' # return the temp-filename or empty string on error
}
open_file() { # expects one argument: file_path
if [ "$(uname)" == 'Darwin' ]; then
open "$1"
elif [ "$(uname -s | cut -c -5)" == "Linux" ]; then
xdg-open "$1"
else
echo -e "${RED}Error: Sorry, opening files is not supported for your OS.${NC}"
fi
}
readIniFile() { # expects one argument: absolute path of profiles.ini
declare -r inifile="$1"
# tempIni will contain: [ProfileX], Name=, IsRelative= and Path= (and Default= if present) of the only (if) or the selected (else) profile
if [ "$(grep -c '^\[Profile' "${inifile}")" -eq "1" ]; then ### only 1 profile found
tempIni="$(grep '^\[Profile' -A 4 "${inifile}")"
else
echo -e "Profiles found:\n"
## cmd-substitution to strip trailing newlines and in quotes to keep internal ones:
echo "$(grep --color=never -E 'Default=[^1]|\[Profile[0-9]*\]|Name=|Path=|^$' "${inifile}")"
echo ''
read -p 'Select the profile number ( 0 for Profile0, 1 for Profile1, etc ) : ' -r
echo -e "\n"
if [[ $REPLY =~ ^(0|[1-9][0-9]*)$ ]]; then
tempIni="$(grep "^\[Profile${REPLY}" -A 4 "${inifile}")" || {
echo -e "${RED}Profile${REPLY} does not exist!${NC}" && exit 1
}
else
echo -e "${RED}Invalid selection!${NC}" && exit 1
fi
fi
# extracting 0 or 1 from the "IsRelative=" line
declare -r pathisrel=$(sed -n 's/^IsRelative=\([01]\)$/\1/p' <<< "${tempIni}")
# extracting only the path itself, excluding "Path="
PROFILE_PATH=$(sed -n 's/^Path=\(.*\)$/\1/p' <<< "${tempIni}")
# update global variable if path is relative
[[ ${pathisrel} == "1" ]] && PROFILE_PATH="$(dirname "${inifile}")/${PROFILE_PATH}"
}
getProfilePath() {
declare -r f1=~/Library/Application\ Support/Firefox/profiles.ini
declare -r f2=~/.mozilla/firefox/profiles.ini
if [ "$PROFILE_PATH" = false ]; then
PROFILE_PATH="$SCRIPT_DIR"
elif [ "$PROFILE_PATH" = 'list' ]; then
if [[ -f "$f1" ]]; then
readIniFile "$f1" # updates PROFILE_PATH or exits on error
elif [[ -f "$f2" ]]; then
readIniFile "$f2"
else
echo -e "${RED}Error: Sorry, -l is not supported for your OS${NC}"
exit 1
fi
#else
# PROFILE_PATH already set by user with -p
fi
}
#########################
# Update updater.sh #
#########################
# Returns the version number of a updater.sh file
get_updater_version() {
echo "$(sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p' "$1")"
}
# Update updater.sh
# Default: Check for update, if available, ask user if they want to execute it
# Args:
# -d: New version will not be looked for and update will not occur
# -u: Check for update, if available, execute without asking
update_updater() {
[ "$UPDATE" = 'no' ] && return 0 # User signified not to check for updates
declare -r tmpfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/updater.sh')"
[ -z "${tmpfile}" ] && echo -e "${RED}Error! Could not download updater.sh${NC}" && return 1 # check if download failed
if [[ $(get_updater_version "$SCRIPT_FILE") < $(get_updater_version "${tmpfile}") ]]; then
if [ "$UPDATE" = 'check' ]; then
echo -e "There is a newer version of updater.sh available. ${RED}Update and execute Y/N?${NC}"
read -p "" -n 1 -r
echo -e "\n\n"
[[ $REPLY =~ ^[Yy]$ ]] || return 0 # Update available, but user chooses not to update
fi
else
return 0 # No update available
fi
mv "${tmpfile}" "$SCRIPT_FILE"
chmod u+x "$SCRIPT_FILE"
"$SCRIPT_FILE" "$@" -d
exit 0
}
#########################
# Update user.js #
#########################
# Returns version number of a user.js file
get_userjs_version() {
[ -e "$1" ] && echo "$(sed -n '4p' "$1")" || echo "Not detected."
}
add_override() {
input=$1
if [ -f "$input" ]; then
echo "" >> user.js
cat "$input" >> user.js
echo -e "Status: ${GREEN}Override file appended:${NC} ${input}"
elif [ -d "$input" ]; then
SAVEIFS=$IFS
IFS=$'\n\b' # Set IFS
FILES="${input}"/*.js
for f in $FILES
do
add_override "$f"
done
IFS=$SAVEIFS # restore $IFS
else
echo -e "${ORANGE}Warning: Could not find override file:${NC} ${input}"
fi
}
remove_comments() { # expects 2 arguments: from-file and to-file
sed -e '/^\/\*.*\*\/[[:space:]]*$/d' -e '/^\/\*/,/\*\//d' -e 's|^[[:space:]]*//.*$||' -e '/^[[:space:]]*$/d' -e 's|);[[:space:]]*//.*|);|' "$1" > "$2"
}
# Applies latest version of user.js and any custom overrides
update_userjs() {
declare -r newfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/user.js')"
[ -z "${newfile}" ] && echo -e "${RED}Error! Could not download user.js${NC}" && return 1 # check if download failed
echo -e "Please observe the following information:
Firefox profile: ${ORANGE}$(pwd)${NC}
Available online: ${ORANGE}$(get_userjs_version "$newfile")${NC}
Currently using: ${ORANGE}$(get_userjs_version user.js)${NC}\n\n"
if [ "$CONFIRM" = 'yes' ]; then
echo -e "This script will update to the latest user.js file and append any custom configurations from user-overrides.js. ${RED}Continue Y/N? ${NC}"
read -p "" -n 1 -r
echo -e "\n"
if ! [[ $REPLY =~ ^[Yy]$ ]]; then
echo -e "${RED}Process aborted${NC}"
rm "$newfile"
return 1
fi
fi
# Copy a version of user.js to diffs folder for later comparison
if [ "$COMPARE" = true ]; then
mkdir -p userjs_diffs
cp user.js userjs_diffs/past_user.js &>/dev/null
fi
# backup user.js
mkdir -p userjs_backups
local bakname="userjs_backups/user.js.backup.$(date +"%Y-%m-%d_%H%M")"
[ "$BACKUP" = 'single' ] && bakname='userjs_backups/user.js.backup'
cp user.js "$bakname" &>/dev/null
mv "${newfile}" user.js
echo -e "Status: ${GREEN}user.js has been backed up and replaced with the latest version!${NC}"
if [ "$ESR" = true ]; then
sed -e 's/\/\* \(ESR[0-9]\{2,\}\.x still uses all.*\)/\/\/ \1/' user.js > user.js.tmp && mv user.js.tmp user.js
echo -e "Status: ${GREEN}ESR related preferences have been activated!${NC}"
fi
# apply overrides
if [ "$SKIPOVERRIDE" = false ]; then
while IFS=',' read -ra FILES; do
for FILE in "${FILES[@]}"; do
add_override "$FILE"
done
done <<< "$OVERRIDE"
fi
# create diff
if [ "$COMPARE" = true ]; then
pastuserjs='userjs_diffs/past_user.js'
past_nocomments='userjs_diffs/past_userjs.txt'
current_nocomments='userjs_diffs/current_userjs.txt'
remove_comments "$pastuserjs" "$past_nocomments"
remove_comments user.js "$current_nocomments"
diffname="userjs_diffs/diff_$(date +"%Y-%m-%d_%H%M").txt"
diff=$(diff -w -B -U 0 "$past_nocomments" "$current_nocomments")
if [ -n "$diff" ]; then
echo "$diff" > "$diffname"
echo -e "Status: ${GREEN}A diff file was created:${NC} ${PWD}/${diffname}"
else
echo -e "Warning: ${ORANGE}Your new user.js file appears to be identical. No diff file was created.${NC}"
[ "$BACKUP" = 'multiple' ] && rm "$bakname" &>/dev/null
fi
rm "$past_nocomments" "$current_nocomments" "$pastuserjs" &>/dev/null
fi
[ "$VIEW" = true ] && open_file "${PWD}/user.js"
}
#########################
# Execute #
#########################
if [ $# != 0 ]; then
# Display usage if first argument is -help or --help
if [ "$1" = '--help' ] || [ "$1" = '-help' ]; then
usage
else
while getopts ":hp:ludsno:bcvre" opt; do
case $opt in
h)
usage
;;
p)
PROFILE_PATH=${OPTARG}
;;
l)
PROFILE_PATH='list'
;;
u)
UPDATE='yes'
;;
d)
UPDATE='no'
;;
s)
CONFIRM='no'
;;
n)
SKIPOVERRIDE=true
;;
o)
OVERRIDE=${OPTARG}
;;
b)
BACKUP='single'
;;
c)
COMPARE=true
;;
v)
VIEW=true
;;
e)
ESR=true
;;
r)
tfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/user.js')"
[ -z "${tfile}" ] && echo -e "${RED}Error! Could not download user.js${NC}" && exit 1 # check if download failed
mv "$tfile" "${tfile}.js"
echo -e "${ORANGE}Warning: user.js was saved to temporary file ${tfile}.js${NC}"
open_file "${tfile}.js"
exit 0
;;
\?)
echo -e "${RED}\n Error! Invalid option: -$OPTARG${NC}" >&2
usage
;;
:)
echo -e "${RED}Error! Option -$OPTARG requires an argument.${NC}" >&2
exit 2
;;
esac
done
fi
fi
show_banner
update_updater "$@"
getProfilePath # updates PROFILE_PATH or exits on error
cd "$PROFILE_PATH" || exit 1
# Check if any files have the owner as root/wheel.
if [ -n "$(find ./ -user 0)" ]; then
printf 'It looks like this script was previously run with elevated privileges,
you will need to change ownership of the following files to your user:\n'
find . -user 0
cd "$CURRDIR"
exit 1
fi
update_userjs
cd "$CURRDIR"

2793
user.js

File diff suppressed because it is too large Load Diff

@ -0,0 +1 @@
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="78" height="20"><linearGradient id="b" x2="0" y2="100%"><stop offset="0" stop-color="#bbb" stop-opacity=".1"/><stop offset="1" stop-opacity=".1"/></linearGradient><clipPath id="a"><rect width="78" height="20" rx="3" fill="#fff"/></clipPath><g clip-path="url(#a)"><path fill="#555" d="M0 0h47v20H0z"/><path fill="#dfb317" d="M47 0h31v20H47z"/><path fill="url(#b)" d="M0 0h78v20H0z"/></g><g fill="#fff" text-anchor="middle" font-family="DejaVu Sans,Verdana,Geneva,sans-serif" font-size="110"> <text x="245" y="150" fill="#010101" fill-opacity=".3" transform="scale(.1)" textLength="370">license</text><text x="245" y="140" transform="scale(.1)" textLength="370">license</text><text x="615" y="150" fill="#010101" fill-opacity=".3" transform="scale(.1)" textLength="210">MIT</text><text x="615" y="140" transform="scale(.1)" textLength="210">MIT</text></g> </svg>

After

(image error) Size: 950 B

Binary file not shown.

Before

(image error) Size: 5.5 KiB

Binary file not shown.

Before

(image error) Size: 3.3 KiB

Binary file not shown.

Before

(image error) Size: 32 KiB

Binary file not shown.

Before

(image error) Size: 104 KiB

Binary file not shown.

Before

(image error) Size: 28 KiB

Binary file not shown.

Before

(image error) Size: 28 KiB

BIN
wikipiki/icon-librewolf.png Normal file

Binary file not shown.

After

(image error) Size: 1.2 KiB

BIN
wikipiki/icon-mull.png Normal file

Binary file not shown.

After

(image error) Size: 1.5 KiB

Binary file not shown.

After

(image error) Size: 1.2 KiB

Binary file not shown.

After

(image error) Size: 2.0 KiB

Binary file not shown.

Before

(image error) Size: 19 KiB

Binary file not shown.

Before

(image error) Size: 11 KiB

Binary file not shown.

Before

(image error) Size: 18 KiB

BIN
wikipiki/parseError.png Normal file

Binary file not shown.

After

(image error) Size: 3.4 KiB

Binary file not shown.

Before

(image error) Size: 32 KiB

Binary file not shown.

Before

(image error) Size: 26 KiB

BIN
wikipiki/rfpCanvas.png Normal file

Binary file not shown.

After

(image error) Size: 5.4 KiB

Binary file not shown.

After

(image error) Size: 7.6 KiB

BIN
wikipiki/uboCustom.png Normal file

Binary file not shown.

After

(image error) Size: 12 KiB