mirror of
https://github.com/arkenfox/user.js.git
synced 2025-09-01 09:28:31 +02:00
Compare commits
27 Commits
v59.0-alph
...
59.0
Author | SHA1 | Date | |
---|---|---|---|
c62bff5c70 | |||
3bae3ed5ba | |||
aa91ea1680 | |||
d244198438 | |||
871e7ed87b | |||
48901d156a | |||
8b4e6c95aa | |||
fd1aa74ff3 | |||
b3e92ab7cc | |||
30fbaba4df | |||
72e1858926 | |||
3ad6ed465e | |||
3fcad90996 | |||
383b8ca943 | |||
6a98aa7ba0 | |||
2037449fbd | |||
e18bd0f32c | |||
715fff06cf | |||
3675a68009 | |||
062dd6c023 | |||
bc17b4e450 | |||
682e12fe57 | |||
6cb27ca78c | |||
c38ae56232 | |||
04f1449003 | |||
53a69ff5bc | |||
e8c02278eb |
276
user.js
276
user.js
@ -1,6 +1,6 @@
|
||||
/******
|
||||
* name: ghacks user.js
|
||||
* date: 16 March 2018
|
||||
* date: 4 April 2018
|
||||
* version 59: Sweet Dreams (Are Made of Pants)
|
||||
* "Sweet dreams are made of pants. Who are you to disagree?"
|
||||
* authors: v52+ github | v51- www.ghacks.net
|
||||
@ -49,8 +49,8 @@ user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong
|
||||
user_pref("general.warnOnAboutConfig", false);
|
||||
|
||||
/* 0001: start Firefox in PB (Private Browsing) mode
|
||||
* [SETTING-56+] Options>Privacy & Security>History>Custom Settings>Always use private browsing mode
|
||||
* [SETTING-ESR] Options>Privacy>History>Custom Settings>Always use private browsing mode
|
||||
* [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
|
||||
* [SETTING-ESR52] Privacy>History>Custom Settings>Always use private browsing mode
|
||||
* [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed
|
||||
* [NOTE] The P in PB mode is misleading: it means no "persistent" local storage of history,
|
||||
* caches, searches or cookies (which you can achieve in normal mode). In fact, it limits or
|
||||
@ -77,7 +77,7 @@ user_pref("startup.homepage_override_url", ""); // what's new page after updates
|
||||
user_pref("browser.laterrun.enabled", false);
|
||||
user_pref("browser.shell.checkDefaultBrowser", false);
|
||||
/* 0102: set start page (0=blank, 1=home, 2=last visited page, 3=resume previous session)
|
||||
* [SETTING] Options>General>Startup>When Firefox starts ***/
|
||||
* [SETTING] General>Startup>When Firefox starts ***/
|
||||
// user_pref("browser.startup.page", 0);
|
||||
/* 0103: set your "home" page (see 0102) ***/
|
||||
// user_pref("browser.startup.homepage", "https://www.example.com/");
|
||||
@ -115,7 +115,7 @@ user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?ke
|
||||
// user_pref("geo.wifi.logging.enabled", true); // (hidden pref)
|
||||
/* 0211: set a default permission for Location (FF58+)
|
||||
* [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
|
||||
* [SETTING] to manage site exceptions: Options>Privacy>Permissions>Location>Settings ***/
|
||||
* [SETTING] to manage site exceptions: Privacy & Security>Permissions>Location>Settings ***/
|
||||
// user_pref("permissions.default.geo", 2); // 0=always ask (default), 1=allow, 2=block
|
||||
|
||||
/*** 0300: QUIET FOX
|
||||
@ -126,23 +126,23 @@ user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?ke
|
||||
user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
|
||||
/* 0301a: disable auto-update checks for Firefox
|
||||
* [NOTE] Firefox currently checks every 12 hrs and allows 8 day notification dismissal
|
||||
* [SETTING-56+] Options>General>Firefox Updates>Never check for updates
|
||||
* [SETTING-ESR] Options>Advanced>Update>Never check for updates ***/
|
||||
* [SETTING] General>Firefox Updates>Never check for updates
|
||||
* [SETTING-ESR52] Advanced>Update>Never check for updates ***/
|
||||
// user_pref("app.update.enabled", false);
|
||||
/* 0301b: disable auto-update checks for extensions
|
||||
* [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
|
||||
// user_pref("extensions.update.enabled", false);
|
||||
/* 0302a: disable auto update installing for Firefox (after the check in 0301a)
|
||||
* [SETTING-56+] Options>General>Firefox Updates>Check for updates but let you choose...
|
||||
* [SETTING-ESR] Options>Advanced>Update>Check for updates but let you choose...
|
||||
* [SETTING] General>Firefox Updates>Check for updates but let you choose...
|
||||
* [SETTING-ESR52] Advanced>Update>Check for updates but let you choose...
|
||||
* [NOTE] The UI checkbox also controls the behavior for checking, the pref only controls auto installing ***/
|
||||
user_pref("app.update.auto", false);
|
||||
/* 0302b: disable auto update installing for extensions (after the check in 0301b)
|
||||
* [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
|
||||
user_pref("extensions.update.autoUpdateDefault", false);
|
||||
/* 0303: disable background update service [WINDOWS]
|
||||
* [SETTING-56+] Options>General>Firefox Updates>Use a background service to install updates
|
||||
* [SETTING-ESR] Options>Advanced>Update>Use a background service to install updates ***/
|
||||
* [SETTING] General>Firefox Updates>Use a background service to install updates
|
||||
* [SETTING-ESR52] Advanced>Update>Use a background service to install updates ***/
|
||||
user_pref("app.update.service.enabled", false);
|
||||
/* 0304: disable background update staging ***/
|
||||
user_pref("app.update.staging.enabled", false);
|
||||
@ -155,8 +155,8 @@ user_pref("extensions.getAddons.cache.enabled", false);
|
||||
/* 0307: disable auto updating of personas (themes) ***/
|
||||
user_pref("lightweightThemes.update.enabled", false);
|
||||
/* 0308: disable search update
|
||||
* [SETTING-56+] Options>General>Firefox Update>Automatically update search engines
|
||||
* [SETTING-ESR] Options>Advanced>Update>Automatically update: Search Engines ***/
|
||||
* [SETTING] General>Firefox Update>Automatically update search engines
|
||||
* [SETTING-ESR52] Advanced>Update>Automatically update: Search Engines ***/
|
||||
user_pref("browser.search.update", false);
|
||||
/* 0309: disable sending Flash crash reports ***/
|
||||
user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
|
||||
@ -185,7 +185,8 @@ user_pref("toolkit.telemetry.updatePing.enabled", false); // (FF56+)
|
||||
user_pref("toolkit.telemetry.bhrPing.enabled", false); // (FF57+) Background Hang Reporter
|
||||
user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // (FF57+)
|
||||
user_pref("toolkit.telemetry.hybridContent.enabled", false); // (FF59+)
|
||||
/* 0333: disable health report ***/
|
||||
/* 0333: disable health report
|
||||
* [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send technical... data ***/
|
||||
user_pref("datareporting.healthreport.uploadEnabled", false);
|
||||
/* 0334: disable new data submission, master kill switch (FF41+)
|
||||
* If disabled, no policy is shown or upload takes place, ever
|
||||
@ -193,7 +194,8 @@ user_pref("datareporting.healthreport.uploadEnabled", false);
|
||||
user_pref("datareporting.policy.dataSubmissionEnabled", false);
|
||||
/* 0350: disable crash reports ***/
|
||||
user_pref("breakpad.reportURL", "");
|
||||
/* 0351: disable sending of crash reports (FF44+) ***/
|
||||
/* 0351: disable sending of crash reports (FF44+)
|
||||
* [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send crash reports ***/
|
||||
user_pref("browser.tabs.crashReporting.sendReport", false);
|
||||
user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // (FF51+)
|
||||
user_pref("browser.crashReports.unsubmittedCheck.autoSubmit", false); // (FF51-57)
|
||||
@ -247,14 +249,14 @@ user_pref("services.blocklist.signing.enforced", true);
|
||||
cookies in a separate jar. (#Turn on browser.safebrowsing.debug to monitor this activity)
|
||||
#Required reading [#] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
|
||||
[1] https://wiki.mozilla.org/Security/Safe_Browsing ***/
|
||||
/* 0410: disable "Block dangerous and deceptive content" (under Options>Security)
|
||||
/* 0410: disable "Block dangerous and deceptive content" (under Options>Privacy & Security)
|
||||
* This covers deceptive sites such as phishing and social engineering ***/
|
||||
// user_pref("browser.safebrowsing.malware.enabled", false);
|
||||
// user_pref("browser.safebrowsing.phishing.enabled", false); // (FF50+)
|
||||
/* 0411: disable "Block dangerous downloads" (under Options>Security)
|
||||
/* 0411: disable "Block dangerous downloads" (under Options>Privacy & Security)
|
||||
* This covers malware and PUPs (potentially unwanted programs) ***/
|
||||
// user_pref("browser.safebrowsing.downloads.enabled", false);
|
||||
/* 0412: disable "Warn me about unwanted and uncommon software" (under Options>Security) (FF48+) ***/
|
||||
/* 0412: disable "Warn me about unwanted and uncommon software" (under Options>Privacy & Security) (FF48+) ***/
|
||||
// user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
|
||||
// user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
|
||||
// user_pref("browser.safebrowsing.downloads.remote.block_dangerous", false); // (FF49+)
|
||||
@ -290,14 +292,14 @@ user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
|
||||
* [NOTE] TP sends DNT headers regardless of the DNT pref (see 1610)
|
||||
* [1] https://wiki.mozilla.org/Security/Tracking_protection
|
||||
* [2] https://support.mozilla.org/kb/tracking-protection-firefox ***/
|
||||
// user_pref("privacy.trackingprotection.pbmode.enabled", true); // default true
|
||||
// user_pref("privacy.trackingprotection.enabled", true); // default false
|
||||
/* 0421: enable more Tracking Protection choices under Options>Privacy>Use Tracking Protection
|
||||
// user_pref("privacy.trackingprotection.pbmode.enabled", true); // default: true
|
||||
// user_pref("privacy.trackingprotection.enabled", true);
|
||||
/* 0421: enable more Tracking Protection choices under Options>Privacy & Security>Use Tracking Protection
|
||||
* Displays three choices: "Always", "Only in private windows", "Never" ***/
|
||||
user_pref("privacy.trackingprotection.ui.enabled", true);
|
||||
/* 0422: enable "basic" or "strict" tracking protecting list - ONLY USE ONE!
|
||||
* [SETTING-56+] Options>Privacy & Security>Tracking Protection>Change Block List
|
||||
* [SETTING-ESR] Options>Privacy>Use Tracking Protection>Change Block List ***/
|
||||
* [SETTING] Privacy & Security>Tracking Protection>Change Block List
|
||||
* [SETTING-ESR52] Privacy>Use Tracking Protection>Change Block List ***/
|
||||
// user_pref("urlclassifier.trackingTable", "test-track-simple,base-track-digest256"); // basic
|
||||
// user_pref("urlclassifier.trackingTable", "test-track-simple,base-track-digest256,content-track-digest256"); // strict
|
||||
/* 0423: disable Mozilla's blocklist for known Flash tracking/fingerprinting (FF48+)
|
||||
@ -315,12 +317,12 @@ user_pref("privacy.trackingprotection.ui.enabled", true);
|
||||
// user_pref("privacy.trackingprotection.annotate_channels", false);
|
||||
// user_pref("privacy.trackingprotection.lower_network_priority", false);
|
||||
|
||||
/*** 0500: SYSTEM EXTENSIONS / EXPERIMENTS
|
||||
System extensions are a method for shipping extensions, considered to be
|
||||
/*** 0500: SYSTEM ADD-ONS / EXPERIMENTS
|
||||
System Add-ons are a method for shipping extensions, considered to be
|
||||
built-in features to Firefox, that are hidden from the about:addons UI.
|
||||
To view your system extensions go to about:support, they are listed under "Firefox Features"
|
||||
To view your System Add-ons go to about:support, they are listed under "Firefox Features"
|
||||
|
||||
Some system extensions have no on-off prefs. Instead you can manually remove them. Note that app
|
||||
Some System Add-ons have no on-off prefs. Instead you can manually remove them. Note that app
|
||||
updates will restore them. They may also be updated and possibly restored automatically (see 0505)
|
||||
* Portable: "...\App\Firefox64\browser\features\" (or "App\Firefox\etc" for 32bit)
|
||||
* Windows: "...\Program Files\Mozilla\browser\features" (or "Program Files (X86)\etc" for 32bit)
|
||||
@ -340,10 +342,17 @@ user_pref("experiments.supported", false);
|
||||
user_pref("experiments.activeExperiment", false);
|
||||
/* 0502: disable Mozilla permission to silently opt you into tests ***/
|
||||
user_pref("network.allow-experiments", false);
|
||||
/* 0505: block URL used for system extension updates (FF44+)
|
||||
* [NOTE] You will not get any system extension updates except when you update Firefox ***/
|
||||
/* 0503: disable Normandy/Shield (FF60+)
|
||||
* Shield is an telemetry system (including Heartbeat) that can also push and test "recipes"
|
||||
* [1] https://wiki.mozilla.org/Firefox/Shield
|
||||
* [2] https://github.com/mozilla/normandy ***/
|
||||
user_pref("app.normandy.enabled", false);
|
||||
user_pref("app.normandy.api_url", "");
|
||||
user_pref("app.shield.optoutstudies.enabled", false);
|
||||
/* 0505: block URL used for System Add-on updates (FF44+)
|
||||
* [NOTE] You will not get any System Add-on updates except when you update Firefox ***/
|
||||
// user_pref("extensions.systemAddon.update.url", "");
|
||||
/* 0506: disable PingCentre telemetry (used in several system extensions) (FF57+)
|
||||
/* 0506: disable PingCentre telemetry (used in several System Add-ons) (FF57+)
|
||||
* Currently blocked by 'datareporting.healthreport.uploadEnabled' (see 0333) ***/
|
||||
user_pref("browser.ping-centre.telemetry", false);
|
||||
/* 0510: disable Pocket (FF39+)
|
||||
@ -351,14 +360,14 @@ user_pref("browser.ping-centre.telemetry", false);
|
||||
* [1] https://en.wikipedia.org/wiki/Pocket_(application)
|
||||
* [2] https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/ ***/
|
||||
user_pref("extensions.pocket.enabled", false);
|
||||
/* 0512: disable Shield (FF53+)
|
||||
/* 0512: disable Shield (FF53-FF59) - replaced internally by Normandy (see 0503)
|
||||
* Shield is an telemetry system (including Heartbeat) that can also push and test "recipes"
|
||||
* [1] https://wiki.mozilla.org/Firefox/Shield
|
||||
* [2] https://github.com/mozilla/normandy ***/
|
||||
user_pref("extensions.shield-recipe-client.enabled", false);
|
||||
user_pref("extensions.shield-recipe-client.api_url", "");
|
||||
/* 0513: disable Follow On Search (FF53+)
|
||||
* Just DELETE the XPI file in your system extensions directory
|
||||
* Just DELETE the XPI file in your System Add-ons directory
|
||||
* [1] https://blog.mozilla.org/data/2017/06/05/measuring-search-in-firefox/ ***/
|
||||
/* 0514: disable Activity Stream (FF54+)
|
||||
* Activity Stream replaces "New Tab" with one based on metadata and browsing behavior,
|
||||
@ -380,8 +389,8 @@ user_pref("browser.library.activity-stream.enabled", false); // (FF57+)
|
||||
* [3] https://bugzilla.mozilla.org/863246#c154 ***/
|
||||
user_pref("browser.onboarding.enabled", false);
|
||||
/* 0517: disable Form Autofill (FF55+)
|
||||
* [SETTING-56+] Options>Privacy & Security>Forms & Passwords>Enable Profile Autofill
|
||||
* [SETTING-ESR] Options>Privacy>Forms & Passwords>Enable Profile Autofill
|
||||
* [SETTING] Privacy & Security>Forms & Passwords>Enable Profile Autofill
|
||||
* [SETTING-ESR52] Privacy>Forms & Passwords>Enable Profile Autofill
|
||||
* [NOTE] Stored data is NOT secure (uses a JSON file)
|
||||
* [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
|
||||
* [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill
|
||||
@ -508,11 +517,11 @@ user_pref("layout.css.visited_links_enabled", false);
|
||||
/* 0806: disable displaying javascript in history URLs - SECURITY ***/
|
||||
user_pref("browser.urlbar.filter.javascript", true);
|
||||
/* 0807: disable search bar LIVE search suggestions - PRIVACY
|
||||
* [SETTING] Options>Search>Provide search suggestions ***/
|
||||
* [SETTING] Search>Provide search suggestions ***/
|
||||
user_pref("browser.search.suggest.enabled", false);
|
||||
/* 0808: disable location bar LIVE search suggestions (requires 0807 = true) - PRIVACY
|
||||
* Also disable the location bar prompt to enable/disable or learn more about it.
|
||||
* [SETTING] Options>Search>Show search suggestions in address bar results ***/
|
||||
* [SETTING] Search>Show search suggestions in address bar results ***/
|
||||
user_pref("browser.urlbar.suggest.searches", false);
|
||||
user_pref("browser.urlbar.userMadeSearchSuggestionsChoice", true); // (FF41+)
|
||||
/* 0809: disable location bar suggesting "preloaded" top websites (FF54+)
|
||||
@ -525,8 +534,8 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
|
||||
* If you enforce any of the suggestion types, you MUST enforce 'autocomplete'
|
||||
* - If *ALL* of the suggestion types are false, 'autocomplete' must also be false
|
||||
* - If *ANY* of the suggestion types are true, 'autocomplete' must also be true
|
||||
* [SETTING-56+] Options>Privacy & Security>Address Bar>When using the address bar, suggest
|
||||
* [SETTING-ESR] Options>Privacy>Location Bar>When using the location bar, suggest
|
||||
* [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest
|
||||
* [SETTING-ESR52] Privacy>Location Bar>When using the location bar, suggest
|
||||
* [WARNING] If all three suggestion types are false, search engine keywords are disabled ***/
|
||||
user_pref("browser.urlbar.autocomplete.enabled", false);
|
||||
user_pref("browser.urlbar.suggest.history", false);
|
||||
@ -551,13 +560,13 @@ user_pref("browser.urlbar.oneOffSearches", false);
|
||||
* [1] https://bugzilla.mozilla.org/1181644 ***/
|
||||
user_pref("browser.urlbar.maxHistoricalSearchSuggestions", 0); // max. number of search suggestions
|
||||
/* 0860: disable search and form history
|
||||
* [SETTING-56+] Options>Privacy & Security>History>Custom Settings>Remember search and form history
|
||||
* [SETTING-ESR] Options>Privacy>History>Custom Settings>Remember search and form history
|
||||
* [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
|
||||
* [SETTING-ESR52] Privacy>History>Custom Settings>Remember search and form history
|
||||
* [NOTE] You can clear formdata on exiting Firefox (see 2803) ***/
|
||||
user_pref("browser.formfill.enable", false);
|
||||
/* 0862: disable browsing and download history
|
||||
* [SETTING-56+] Options>Privacy & Security>History>Custom Settings>Remember my browsing and download history
|
||||
* [SETTING-ESR] Options>Privacy>History>Custom Settings>Remember my browsing and download history
|
||||
* [SETTING] Privacy & Security>History>Custom Settings>Remember my browsing and download history
|
||||
* [SETTING-ESR52] Privacy>History>Custom Settings>Remember my browsing and download history
|
||||
* [NOTE] You can clear history and downloads on exiting Firefox (see 2803) ***/
|
||||
// user_pref("places.history.enabled", false);
|
||||
/* 0870: disable Windows jumplist [WINDOWS] ***/
|
||||
@ -571,14 +580,14 @@ user_pref("browser.taskbar.previews.enable", false);
|
||||
/*** 0900: PASSWORDS ***/
|
||||
user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
|
||||
/* 0901: disable saving passwords
|
||||
* [SETTING-56+] Options>Privacy & Security>Forms & Passwords>Remember logins and passwords for sites
|
||||
* [SETTING-ESR] Options>Security>Logins>Remember logins for sites
|
||||
* [SETTING] Privacy & Security>Forms & Passwords>Remember logins and passwords for sites
|
||||
* [SETTING-ESR52] Security>Logins>Remember logins for sites
|
||||
* [NOTE] This does not clear any passwords already saved ***/
|
||||
// user_pref("signon.rememberSignons", false);
|
||||
/* 0902: use a master password (recommended if you save passwords)
|
||||
* There are no preferences for this. It is all handled internally.
|
||||
* [SETTING-56+] Options>Privacy & Security>Forms & Passwords>Use a master password
|
||||
* [SETTING-ESR] Options>Security>Logins>Use a master password
|
||||
* [SETTING] Privacy & Security>Forms & Passwords>Use a master password
|
||||
* [SETTING-ESR52] Security>Logins>Use a master password
|
||||
* [1] https://support.mozilla.org/kb/use-master-password-protect-stored-logins ***/
|
||||
/* 0903: set how often Firefox should ask for the master password
|
||||
* 0=the first time (default), 1=every time it's needed, 2=every n minutes (as per the next pref) ***/
|
||||
@ -827,20 +836,20 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
|
||||
/* 1401: disable websites choosing fonts (0=block, 1=allow)
|
||||
* If you disallow fonts, this drastically limits/reduces font
|
||||
* enumeration (by JS) which is a high entropy fingerprinting vector.
|
||||
* [SETTING-56+] Options>General>Language and Appearance>Advanced>Allow pages to choose...
|
||||
* [SETTING-ESR] Options>Content>Font & Colors>Advanced>Allow pages to choose...
|
||||
* [SETTING] General>Language and Appearance>Advanced>Allow pages to choose...
|
||||
* [SETTING-ESR52] Content>Font & Colors>Advanced>Allow pages to choose...
|
||||
* [SETUP] Disabling fonts can uglify the web a fair bit. ***/
|
||||
user_pref("browser.display.use_document_fonts", 0);
|
||||
/* 1402: set more legible default fonts [SETUP]
|
||||
* [SETTING-56+] Options>General>Language and Appearance>Fonts & Colors>Advanced>Serif|Sans-serif|Monospace
|
||||
* [SETTING-ESR] Options>Fonts & Colors>Advanced>Serif|Sans-serif|Monospace
|
||||
* [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Serif|Sans-serif|Monospace
|
||||
* [SETTING-ESR52] Content>Fonts & Colors>Advanced>Serif|Sans-serif|Monospace
|
||||
* [NOTE] Example below for Windows/Western only ***/
|
||||
// user_pref("font.name.serif.x-unicode", "Georgia");
|
||||
// user_pref("font.name.serif.x-western", "Georgia"); // default Times New Roman
|
||||
// user_pref("font.name.serif.x-western", "Georgia"); // default: Times New Roman
|
||||
// user_pref("font.name.sans-serif.x-unicode", "Arial");
|
||||
// user_pref("font.name.sans-serif.x-western", "Arial"); // default Arial
|
||||
// user_pref("font.name.sans-serif.x-western", "Arial"); // default: Arial
|
||||
// user_pref("font.name.monospace.x-unicode", "Lucida Console");
|
||||
// user_pref("font.name.monospace.x-western", "Lucida Console"); // default Courier New
|
||||
// user_pref("font.name.monospace.x-western", "Lucida Console"); // default: Courier New
|
||||
/* 1403: enable icon fonts (glyphs) (FF41+)
|
||||
* [1] https://bugzilla.mozilla.org/789788 ***/
|
||||
user_pref("gfx.downloadable_fonts.enabled", true); // default: true
|
||||
@ -916,8 +925,8 @@ user_pref("network.http.referer.hideOnionSource", true);
|
||||
* It is voluntary and most ad networks do not honor it. DNT is *NOT* how you stop being data mined.
|
||||
* Don't encourage a setting that gives any legitimacy to 3rd parties being in control of your privacy.
|
||||
* Sending a DNT header *highly likely* raises entropy, especially in standard windows.
|
||||
* [SETTING-56+] Options>Privacy & Security>Tracking Protecting>Send websites a "Do Not Track"...
|
||||
* [SETTING-ESR] Options>Privacy>Use Tracking Protecting>manage your Do Not Track settings
|
||||
* [SETTING] Privacy & Security>Tracking Protecting>Send websites a "Do Not Track"...
|
||||
* [SETTING-ESR52] Privacy>Use Tracking Protecting>manage your Do Not Track settings
|
||||
* [NOTE] DNT is enforced with TP (see 0420) regardless of this pref (e.g. in default PB Mode)
|
||||
* [NOTE] If you use NoScript MAKE SURE to set the pref noscript.doNotTrack.enabled to match ***/
|
||||
user_pref("privacy.donottrackheader.enabled", false);
|
||||
@ -932,8 +941,8 @@ user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
|
||||
* [1] https://bugzilla.mozilla.org/1279029 ***/
|
||||
// user_pref("privacy.userContext.ui.enabled", true);
|
||||
/* 1702: enable Container Tabs (FF50+)
|
||||
* [SETTING-56+] Options>Privacy & Security>Tabs>Enable Container Tabs
|
||||
* [SETTING-ESR] Options>Privacy>Container Tabs>Enable Container Tabs ***/
|
||||
* [SETTING] Privacy & Security>Tabs>Enable Container Tabs
|
||||
* [SETTING-ESR52] Privacy>Container Tabs>Enable Container Tabs ***/
|
||||
// user_pref("privacy.userContext.enabled", true);
|
||||
/* 1703: enable a private container for thumbnail loads (FF51+) ***/
|
||||
// user_pref("privacy.usercontext.about_newtab_segregation.enabled", true);
|
||||
@ -976,8 +985,8 @@ user_pref("media.gmp-widevinecdm.enabled", false);
|
||||
user_pref("media.gmp-widevinecdm.autoupdate", false);
|
||||
/* 1830: disable all DRM content (EME: Encryption Media Extension) [SETUP]
|
||||
* [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
|
||||
user_pref("media.eme.enabled", false); // Options>Content>Play DRM Content
|
||||
user_pref("browser.eme.ui.enabled", false); // hides "Play DRM Content" checkbox [RESTART]
|
||||
user_pref("media.eme.enabled", false); // [SETTING] General>DRM Content>Play DRM-controlled content
|
||||
user_pref("browser.eme.ui.enabled", false); // hides "Play DRM-controlled content" checkbox [RESTART]
|
||||
/* 1840: disable the OpenH264 Video Codec by Cisco to "Never Activate"
|
||||
* This is the bundled codec used for video chat in WebRTC ***/
|
||||
user_pref("media.gmp-gmpopenh264.enabled", false); // (hidden pref)
|
||||
@ -1022,7 +1031,7 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
|
||||
/* 2024: set a default permission for Camera/Microphone (FF58+)
|
||||
* 0=always ask (default), 1=allow, 2=block
|
||||
* [SETTING] to add site exceptions: Page Info>Permissions>Use the Camera/Microphone
|
||||
* [SETTING] to manage site exceptions: Options>Privacy>Permissions>Camera/Microphone>Settings ***/
|
||||
* [SETTING] to manage site exceptions: Privacy & Security>Permissions>Camera/Microphone>Settings ***/
|
||||
// user_pref("permissions.default.camera", 2);
|
||||
// user_pref("permissions.default.microphone", 2);
|
||||
/* 2026: disable canvas capture stream
|
||||
@ -1041,42 +1050,45 @@ user_pref("media.autoplay.enabled", false);
|
||||
* [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
|
||||
user_pref("media.block-autoplay-until-in-foreground", true);
|
||||
|
||||
/*** 2200: UI MEDDLING
|
||||
see http://kb.mozillazine.org/Prevent_websites_from_disabling_new_window_features ***/
|
||||
/*** 2200: WINDOW MEDDLING & LEAKS / POPUPS ***/
|
||||
user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
|
||||
/* 2201: disable website control over browser right-click context menu
|
||||
* [NOTE] Shift-Right-Click will always bring up the browser right-click context menu ***/
|
||||
// user_pref("dom.event.contextmenu.enabled", false);
|
||||
/* 2202: disable [new window] scripts hiding or disabling the following ***/
|
||||
user_pref("dom.disable_window_open_feature.location", true);
|
||||
user_pref("dom.disable_window_open_feature.menubar", true);
|
||||
user_pref("dom.disable_window_open_feature.resizable", true);
|
||||
user_pref("dom.disable_window_open_feature.status", true);
|
||||
user_pref("dom.disable_window_open_feature.toolbar", true);
|
||||
/* 2203: disable [popup window] scripts hiding or disabling the following ***/
|
||||
user_pref("dom.disable_window_flip", true); // window z-order
|
||||
user_pref("dom.disable_window_move_resize", true);
|
||||
/* 2201: prevent websites from disabling new window features
|
||||
* [1] http://kb.mozillazine.org/Prevent_websites_from_disabling_new_window_features ***/
|
||||
user_pref("dom.disable_window_open_feature.close", true);
|
||||
user_pref("dom.disable_window_open_feature.location", true); // default: true
|
||||
user_pref("dom.disable_window_open_feature.menubar", true);
|
||||
user_pref("dom.disable_window_open_feature.minimizable", true);
|
||||
user_pref("dom.disable_window_open_feature.personalbar", true); // bookmarks toolbar
|
||||
user_pref("dom.disable_window_open_feature.resizable", true); // default: true
|
||||
user_pref("dom.disable_window_open_feature.status", true); // status bar - default: true
|
||||
user_pref("dom.disable_window_open_feature.titlebar", true);
|
||||
user_pref("dom.allow_scripts_to_close_windows", false);
|
||||
/* 2204: disable links opening in a new window
|
||||
* This is to stop malicious window sizes and screen res leaks etc in conjunction
|
||||
* with 2203 dom.disable_window_move_resize=true | 2418 full-screen-api.enabled=false
|
||||
* [NOTE] You can still right click a link and select open in a new window
|
||||
user_pref("dom.disable_window_open_feature.toolbar", true);
|
||||
/* 2202: disable meddling with open windows ***/
|
||||
user_pref("dom.allow_scripts_to_close_windows", false); // default: false
|
||||
user_pref("dom.disable_window_flip", true); // window z-order - default: true
|
||||
user_pref("dom.disable_window_move_resize", true);
|
||||
/* 2203: open links targeting new windows in a new tab instead
|
||||
* This stops malicious window sizes and some screen resolution leaks.
|
||||
* You can still right-click a link and open in a new window.
|
||||
* [TEST] https://people.torproject.org/~gk/misc/entire_desktop.html
|
||||
* [1] https://trac.torproject.org/projects/tor/ticket/9881 ***/
|
||||
user_pref("browser.link.open_newwindow.restriction", 0);
|
||||
/* 2205: disable "Confirm you want to leave" dialog on page close
|
||||
* Does not prevent JS leaks of the page close event.
|
||||
* [1] https://developer.mozilla.org/docs/Web/Events/beforeunload
|
||||
* [2] https://support.mozilla.org/questions/1043508 ***/
|
||||
user_pref("dom.disable_beforeunload", true);
|
||||
/* 2206: open new windows in a new tab instead
|
||||
* 1=current window, 2=new window, 3=most recent window
|
||||
* [SETTING] Options>General>Tabs>Open new windows in a new tab instead ***/
|
||||
user_pref("browser.link.open_newwindow", 3);
|
||||
user_pref("browser.link.open_newwindow.restriction", 0);
|
||||
/* 2204: disable Fullscreen API to prevent screen-resolution leaks [SETUP]
|
||||
* [NOTE] You can still manually toggle the browser's fullscreen state (F11),
|
||||
* but this pref will disable embedded video/game fullscreen controls, e.g. youtube
|
||||
* [TEST] https://developer.mozilla.org/samples/domref/fullscreen.html ***/
|
||||
user_pref("full-screen-api.enabled", false);
|
||||
/* 2210: block popup windows
|
||||
* [SETTING] Privacy & Security>Permissions>Block pop-up windows
|
||||
* [SETTING-ESR52] Content>Pop-ups>Block pop-up windows ***/
|
||||
user_pref("dom.disable_open_during_load", true);
|
||||
/* 2211: set max popups from a single non-click event - default is 20! ***/
|
||||
user_pref("dom.popup_maximum", 3);
|
||||
/* 2212: limit events that can cause a popup
|
||||
* default is "change click dblclick mouseup pointerup notificationclick reset submit touchend"
|
||||
* [1] http://kb.mozillazine.org/Dom.popup_allowed_events ***/
|
||||
user_pref("dom.popup_allowed_events", "click dblclick");
|
||||
|
||||
/*** 2300: WEB WORKERS [SETUP]
|
||||
A worker is a JS "background task" running in a global context, i.e. it is different from
|
||||
@ -1112,7 +1124,7 @@ user_pref("dom.webnotifications.enabled", false); // (FF22+)
|
||||
user_pref("dom.webnotifications.serviceworker.enabled", false); // (FF44+)
|
||||
/* 2305: set a default permission for Notifications (see 2304) (FF58+)
|
||||
* [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
|
||||
* [SETTING] to manage site exceptions: Options>Privacy>Permissions>Notifications>Settings ***/
|
||||
* [SETTING] to manage site exceptions: Privacy & Security>Permissions>Notifications>Settings ***/
|
||||
// user_pref("permissions.default.desktop-notification", 2); // 0=always ask (default), 1=allow, 2=block
|
||||
/* 2306: disable push notifications (FF44+)
|
||||
* web apps can receive messages pushed to them from a server, whether or
|
||||
@ -1125,6 +1137,9 @@ user_pref("dom.push.userAgentID", "");
|
||||
|
||||
/*** 2400: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT ***/
|
||||
user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");
|
||||
/* 2401: disable website control over browser right-click context menu
|
||||
* [NOTE] Shift-Right-Click will always bring up the browser right-click context menu ***/
|
||||
// user_pref("dom.event.contextmenu.enabled", false);
|
||||
/* 2402: disable website access to clipboard events/content
|
||||
* [WARNING] This will break some sites functionality such as pasting into facebook, wordpress
|
||||
* this applies to onCut, onCopy, onPaste events - i.e. you have to interact with
|
||||
@ -1135,17 +1150,13 @@ user_pref("dom.event.clipboardevents.enabled", false);
|
||||
* this disables document.execCommand("cut"/"copy") to protect your clipboard
|
||||
* [1] https://bugzilla.mozilla.org/1170911 ***/
|
||||
user_pref("dom.allow_cut_copy", false); // (hidden pref)
|
||||
/* 2404: disable "Confirm you want to leave" dialog on page close
|
||||
* Does not prevent JS leaks of the page close event.
|
||||
* [1] https://developer.mozilla.org/docs/Web/Events/beforeunload
|
||||
* [2] https://support.mozilla.org/questions/1043508 ***/
|
||||
user_pref("dom.disable_beforeunload", true);
|
||||
/* 2414: disable shaking the screen ***/
|
||||
user_pref("dom.vibrator.enabled", false);
|
||||
/* 2415: set max popups from a single non-click event - default is 20! ***/
|
||||
user_pref("dom.popup_maximum", 3);
|
||||
/* 2415b: limit events that can cause a popup
|
||||
* default is "change click dblclick mouseup pointerup notificationclick reset submit touchend"
|
||||
* [1] http://kb.mozillazine.org/Dom.popup_allowed_events ***/
|
||||
user_pref("dom.popup_allowed_events", "click dblclick");
|
||||
/* 2418: disable full-screen API
|
||||
* false=block, true=ask ***/
|
||||
user_pref("full-screen-api.enabled", false);
|
||||
/* 2420: disable asm.js (FF22+)
|
||||
* [1] http://asmjs.org/
|
||||
* [2] https://www.mozilla.org/security/advisories/mfsa2015-29/
|
||||
@ -1187,7 +1198,8 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
|
||||
* [2] https://developer.mozilla.org/docs/Web/API/MediaDevices/enumerateDevices ***/
|
||||
user_pref("media.navigator.enabled", false);
|
||||
/* 2508: disable hardware acceleration to reduce graphics fingerprinting
|
||||
* [SETTING] Options>General>Performance>Custom>Use hardware acceleration when available
|
||||
* [SETTING] General>Performance>Custom>Use hardware acceleration when available
|
||||
* [SETTING-ESR52] Advanced>General>Use hardware acceleration when available
|
||||
* [WARNING] [SETUP] Affects text rendering (fonts will look different), impacts video performance,
|
||||
* and parts of Quantum that utilize the GPU will also be affected as they are rolled out
|
||||
* [1] https://wiki.mozilla.org/Platform/GFX/HardwareAcceleration ***/
|
||||
@ -1206,7 +1218,7 @@ user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curta
|
||||
* [1] https://developer.mozilla.org/docs/Web/API/Navigator/sendBeacon ***/
|
||||
user_pref("beacon.enabled", false);
|
||||
/* 2602: discourage downloading to desktop (0=desktop 1=downloads 2=last used)
|
||||
* [NOTE] To set your default "downloads": Options>General>Downloads>Save files to ***/
|
||||
* [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
|
||||
user_pref("browser.download.folderList", 2);
|
||||
/* 2603: enforce user interaction for security by always asking the user where to download ***/
|
||||
user_pref("browser.download.useDownloadDir", false);
|
||||
@ -1215,7 +1227,7 @@ user_pref("browser.download.useDownloadDir", false);
|
||||
user_pref("browser.helperApps.deleteTempFileOnExit", true);
|
||||
/* 2605: disable adding downloads to the system's "recent documents" list ***/
|
||||
user_pref("browser.download.manager.addToRecentDocs", false);
|
||||
/* 2606: disable hiding mime types (Options>Applications) not associated with a plugin ***/
|
||||
/* 2606: disable hiding mime types (Options>General>Applications) not associated with a plugin ***/
|
||||
user_pref("browser.download.hide_plugins_without_extensions", false);
|
||||
/* 2607: disable page thumbnail collection
|
||||
* look in profile/thumbnails directory - you may want to clean that out ***/
|
||||
@ -1235,8 +1247,8 @@ user_pref("devtools.webide.autoinstallADBHelper", false);
|
||||
user_pref("devtools.debugger.remote-enabled", false);
|
||||
user_pref("devtools.webide.enabled", false);
|
||||
/* 2617: enable Firefox's built-in PDF reader [SETUP]
|
||||
* [SETTING-56+] Options>General>Applications>Portable Document Format (PDF)
|
||||
* [SETTING-ESR] Options>Applications>Portable Document Format (PDF)
|
||||
* [SETTING] General>Applications>Portable Document Format (PDF)
|
||||
* [SETTING-ESR52] Applications>Portable Document Format (PDF)
|
||||
* This setting controls if the option "Display in Firefox" in the above setting is available
|
||||
* and by effect controls whether PDFs are handled in-browser or externally ("Ask" or "Open With")
|
||||
* [WHY USE false=default=view PDFs in Firefox]
|
||||
@ -1257,6 +1269,10 @@ user_pref("network.http.redirection-limit", 10);
|
||||
* [1] https://trac.torproject.org/projects/tor/ticket/10089
|
||||
* [2] http://kb.mozillazine.org/Middlemouse.contentLoadURL ***/
|
||||
user_pref("middlemouse.contentLoadURL", false);
|
||||
/* 2621: enable warning when websites try to install extensions
|
||||
* [SETTING] Privacy & Security>Permissions>Warn you when websites try to install add-ons
|
||||
* [SETTING-ESR52] Security>General>Warn me when sites try to install add-ons ***/
|
||||
user_pref("xpinstall.whitelist.required", true); // default: true
|
||||
/* 2622: enforce a security delay when installing extensions (milliseconds)
|
||||
* default=1000, This also covers the delay in "Save" on downloading files.
|
||||
* [1] http://kb.mozillazine.org/Disable_extension_install_delay_-_Firefox
|
||||
@ -1269,6 +1285,12 @@ user_pref("security.fileuri.strict_origin_policy", true);
|
||||
* [1] https://developer.mozilla.org/docs/Web/Security/Subresource_Integrity
|
||||
* [2] https://wiki.mozilla.org/Security/Subresource_Integrity ***/
|
||||
user_pref("security.sri.enable", true); // default: true
|
||||
/* 2625: clear localStorage and UUID when an extension is uninstalled
|
||||
* [NOTE] Both preferences must be the same
|
||||
* [1] https://developer.mozilla.org/Add-ons/WebExtensions/API/storage/local
|
||||
* [2] https://bugzilla.mozilla.org/1213990 ***/
|
||||
user_pref("extensions.webextensions.keepStorageOnUninstall", false);
|
||||
user_pref("extensions.webextensions.keepUuidOnUninstall", false);
|
||||
/* 2626: disable optional user agent token
|
||||
* [1] https://developer.mozilla.org/docs/Web/HTTP/Headers/User-Agent/Firefox ***/
|
||||
user_pref("general.useragent.compatMode.firefox", false); // default: false
|
||||
@ -1280,7 +1302,7 @@ user_pref("browser.uitour.url", "");
|
||||
* [2] https://www.fxsitecompat.com/en-CA/docs/2015/jar-protocol-support-has-been-disabled-by-default/ ***/
|
||||
user_pref("network.jar.block-remote-files", true);
|
||||
/* 2630: prevent accessibility services from accessing your browser [RESTART]
|
||||
* [SETTING] Options>Privacy & Security>Permissions>Prevent accessibility services from accessing your browser
|
||||
* [SETTING] Privacy & Security>Permissions>Prevent accessibility services from accessing your browser
|
||||
* [1] https://support.mozilla.org/kb/accessibility-services ***/
|
||||
user_pref("accessibility.force_disabled", 1);
|
||||
/* 2631: block web content in file processes (FF55+)
|
||||
@ -1346,7 +1368,7 @@ user_pref("security.csp.experimentalEnabled", true);
|
||||
* [2] https://www.wordfence.com/blog/2017/01/gmail-phishing-data-uri/
|
||||
* [3] https://www.fxsitecompat.com/en-CA/docs/2017/data-url-navigations-on-top-level-window-will-be-blocked/ ***/
|
||||
user_pref("security.data_uri.block_toplevel_data_uri_navigations", true);
|
||||
/* 2676: disable CSP violation events
|
||||
/* 2676: disable CSP violation events (FF59+)
|
||||
* [1] https://developer.mozilla.org/docs/Web/API/SecurityPolicyViolationEvent ***/
|
||||
user_pref("security.csp.enable_violation_events", false);
|
||||
|
||||
@ -1362,8 +1384,8 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
|
||||
/* 2701: disable cookies on all sites [SETUP]
|
||||
* You can set exceptions under site permissions or use an extension
|
||||
* 0=allow all 1=allow same host 2=disallow all 3=allow 3rd party if it already set a cookie
|
||||
* [SETTING-56+] Options>Privacy & Security>History>Custom Settings>Accept cookies from sites
|
||||
* [SETTING-ESR] Options>Privacy>History>Custom Settings>Accept cookies from sites
|
||||
* [SETTING] Privacy & Security>History>Custom Settings>Accept cookies from sites
|
||||
* [SETTING-ESR52] Privacy>History>Custom Settings>Accept cookies from sites
|
||||
* [NOTE] This also controls access to 3rd party Web Storage, IndexedDB, Cache API and Service Worker Cache
|
||||
* [1] https://www.fxsitecompat.com/en-CA/docs/2015/web-storage-indexeddb-cache-api-now-obey-third-party-cookies-preference/ ***/
|
||||
user_pref("network.cookie.cookieBehavior", 2);
|
||||
@ -1377,8 +1399,8 @@ user_pref("network.cookie.thirdparty.sessionOnly", true);
|
||||
user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // (FF58+)
|
||||
/* 2703: set cookie lifetime policy
|
||||
* 0=until they expire (default), 2=until you close Firefox, 3=for n days (see next pref)
|
||||
* [SETTING-56+] Options>Privacy & Security>History>Custom Settings>Accept cookies from sites>Keep until
|
||||
* [SETTING-ESR] Options>Privacy>History>Custom Settings>Accept cookies from sites>Keep until ***/
|
||||
* [SETTING] Privacy & Security>History>Custom Settings>Accept cookies from sites>Keep until
|
||||
* [SETTING-ESR52] Privacy>History>Custom Settings>Accept cookies from sites>Keep until ***/
|
||||
// user_pref("network.cookie.lifetimePolicy", 0);
|
||||
/* 2704: set cookie lifetime in days (see above pref) - default is 90 days ***/
|
||||
// user_pref("network.cookie.lifetime.days", 90);
|
||||
@ -1389,26 +1411,20 @@ user_pref("network.cookie.leave-secure-alone", true); // default: true
|
||||
* [WARNING] This will break a LOT of sites' functionality.
|
||||
* You are better off using an extension for more granular control ***/
|
||||
// user_pref("dom.storage.enabled", false);
|
||||
/* 2711: clear localStorage and UUID when an extension is uninstalled
|
||||
* [NOTE] Both preferences must be the same
|
||||
* [1] https://developer.mozilla.org/Add-ons/WebExtensions/API/storage/local
|
||||
* [2] https://bugzilla.mozilla.org/1213990 ***/
|
||||
user_pref("extensions.webextensions.keepStorageOnUninstall", false);
|
||||
user_pref("extensions.webextensions.keepUuidOnUninstall", false);
|
||||
/* 2720: disable JS storing data permanently [SETUP]
|
||||
* [WARNING] This BREAKS uBlock Origin [1.14.0+] and other extensions that require IndexedDB
|
||||
* [1] https://github.com/gorhill/uBlock/releases/tag/1.14.0
|
||||
* [WARNING] This *will* break other extensions including legacy, and *will* break some sites ***/
|
||||
// user_pref("dom.indexedDB.enabled", false);
|
||||
/* 2730: disable offline cache ***/
|
||||
user_pref("browser.cache.offline.enable", false);
|
||||
/* 2730: disable offline cache
|
||||
* [NOTE] This is required 'true' for Storage API (2750) ***/
|
||||
// user_pref("browser.cache.offline.enable", false);
|
||||
/* 2731: enforce websites to ask to store data for offline use
|
||||
* [1] https://support.mozilla.org/questions/1098540
|
||||
* [2] https://bugzilla.mozilla.org/959985 ***/
|
||||
user_pref("offline-apps.allow_by_default", false);
|
||||
/* 2732: display a notification when websites ask to store data for offline use
|
||||
* [SETTING-56+] Options>Privacy & Security>Offline Web Content and User Data>Tell you when a website asks...
|
||||
* [SETTING-ESR] Options>Advanced>Network>Tell me when a website asks to store data for offline use ***/
|
||||
* [SETTING-ESR52] Advanced>Network>Tell me when a website asks to store data for offline use ***/
|
||||
user_pref("browser.offline-apps.notify", true);
|
||||
/* 2733: set size of warning quota for offline cache (default 51200)
|
||||
* Offline cache is only used in rare cases to store data locally. FF will store small amounts
|
||||
@ -1421,13 +1437,12 @@ user_pref("dom.caches.enabled", false);
|
||||
* The API gives sites the ability to find out how much space they can use, how much
|
||||
* they are already using, and even control whether or not they need to be alerted
|
||||
* before the user agent disposes of site data in order to make room for other things.
|
||||
* [NOTE] This also controls the visibility of the "Options>Privacy & Security>Site Data"
|
||||
* section, which also requires Offline Cache (2730) enabled to function
|
||||
* [NOTE] If Storage API is enabled, then Offline Cache (2730) must be also be enabled
|
||||
* [1] https://developer.mozilla.org/docs/Web/API/StorageManager
|
||||
* [2] https://developer.mozilla.org/docs/Web/API/Storage_API
|
||||
* [3] https://blog.mozilla.org/l10n/2017/03/07/firefox-l10n-report-aurora-54/ ***/
|
||||
user_pref("dom.storageManager.enabled", false); // (FF51+)
|
||||
user_pref("browser.storageManager.enabled", false); // (FF53+)
|
||||
// user_pref("dom.storageManager.enabled", false); // (FF51+)
|
||||
// user_pref("browser.storageManager.enabled", false); // controls "Site Data" UI visibility (FF53+)
|
||||
|
||||
/*** 2800: SHUTDOWN [SETUP]
|
||||
You should set the values to what suits you best. Be aware that the settings below clear
|
||||
@ -1437,12 +1452,12 @@ user_pref("browser.storageManager.enabled", false); // (FF53+)
|
||||
***/
|
||||
user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
|
||||
/* 2802: enable Firefox to clear history items on shutdown
|
||||
* [SETTING-56+] Options>Privacy & Security>History>Clear history when Firefox closes
|
||||
* [SETTING-ESR] Options>Privacy>Clear history when Firefox closes ***/
|
||||
* [SETTING] Privacy & Security>History>Clear history when Firefox closes
|
||||
* [SETTING-ESR52] Privacy>Clear history when Firefox closes ***/
|
||||
user_pref("privacy.sanitize.sanitizeOnShutdown", true);
|
||||
/* 2803: set what history items to clear on shutdown
|
||||
* [SETTING-56+] Options>Privacy & Security>History>Clear history when Firefox closes>Settings
|
||||
* [SETTING-ESR] Options>Privacy>Clear history when Firefox closes>Settings
|
||||
* [SETTING] Privacy & Security>History>Clear history when Firefox closes>Settings
|
||||
* [SETTING-ESR52] Privacy>Clear history when Firefox closes>Settings
|
||||
* [NOTE] If 'history' is true, downloads will also be cleared regardless of the value
|
||||
* but if 'history' is false, downloads can still be cleared independently
|
||||
* However, this may not always be the case. The interface combines and syncs these
|
||||
@ -1483,6 +1498,7 @@ user_pref("privacy.cpd.siteSettings", false); // Site Preferences
|
||||
user_pref("privacy.sanitize.timeSpan", 0);
|
||||
|
||||
/*** 4000: FIRST PARTY ISOLATION (FPI)
|
||||
** 1278037 - isolate indexedDB (FF51+)
|
||||
** 1277803 - isolate favicons (FF52+)
|
||||
** 1264562 - isolate OCSP cache (FF52+)
|
||||
** 1268726 - isolate Shared Workers (FF52+)
|
||||
@ -1559,7 +1575,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true);
|
||||
** 1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events (FF59+)
|
||||
Spoofing mimics the content language of the document. Currently it only supports en-US.
|
||||
Modifier events suppressed are SHIFT and both ALT keys. Chrome is not affected.
|
||||
FF60: Fixes keydown/keyup events (1438795)
|
||||
FF60: Fix keydown/keyup events (1438795)
|
||||
***/
|
||||
user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
|
||||
/* 4501: enable privacy.resistFingerprinting (FF41+)
|
||||
@ -1856,7 +1872,7 @@ user_pref("loop.facebook.enabled", false);
|
||||
user_pref("loop.facebook.fallbackUrl", "");
|
||||
user_pref("loop.facebook.shareUrl", "");
|
||||
user_pref("loop.logDomains", false);
|
||||
// 2202: disable new window scrollbars being hidden
|
||||
// 2201: disable new window scrollbars being hidden
|
||||
// [-] https://bugzilla.mozilla.org/1257887
|
||||
user_pref("dom.disable_window_open_feature.scrollbars", true);
|
||||
// 2303: disable push notification (UDP wake-up)
|
||||
@ -2069,7 +2085,7 @@ user_pref("media.getusermedia.screensharing.allowed_domains", "");
|
||||
// 2023: disable camera stuff
|
||||
// [-] (part7) https://bugzilla.mozilla.org/1416703#c21
|
||||
user_pref("camera.control.face_detection.enabled", false);
|
||||
// 2203: disable [popup window] scripts hiding or disabling the following
|
||||
// 2202: prevent scripts from changing the status text
|
||||
// [-] https://bugzilla.mozilla.org/1425999
|
||||
user_pref("dom.disable_window_status_change", true);
|
||||
// 2416: disable idle observation
|
||||
|
Reference in New Issue
Block a user