mirror of
https://github.com/arkenfox/user.js.git
synced 2025-09-01 09:28:31 +02:00
Compare commits
27 Commits
v60.0-beta
...
60.0
Author | SHA1 | Date | |
---|---|---|---|
3264fbd9c3 | |||
b8b3a4f7ed | |||
7f1f9e124b | |||
9b1cf28e89 | |||
acc5a1c2df | |||
9a4032f4cd | |||
f113cf84c3 | |||
c92ece7960 | |||
3e5667fb34 | |||
2bf238f384 | |||
3edf7af85e | |||
4b8b2d81a0 | |||
fde8035332 | |||
01bd2a4f6d | |||
6d4b49d061 | |||
8e60f412e4 | |||
f60a87f97f | |||
449e32a8ca | |||
35a9d3d1e1 | |||
c66d1b08e7 | |||
0a63b6545d | |||
a8051b88e4 | |||
87ce12925d | |||
d6a7531c67 | |||
3a77e18ae8 | |||
a635ae5dfb | |||
02bac31e6a |
@ -1,6 +1,7 @@
|
||||
/***
|
||||
This will reset the preferences that have been removed completely
|
||||
from the ghacks user.js up to and including release 60-beta
|
||||
This will reset the preferences that have been removed completely from the ghacks user.js.
|
||||
|
||||
Last updated: 27-May-2018
|
||||
|
||||
For instructions see:
|
||||
https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
|
||||
@ -85,6 +86,17 @@
|
||||
'security.block_script_with_wrong_mime',
|
||||
'security.fileuri.strict_origin_policy',
|
||||
'security.sri.enable',
|
||||
/* 61-beta */
|
||||
'browser.laterrun.enabled',
|
||||
'browser.offline-apps.notify',
|
||||
'browser.rights.3.shown',
|
||||
'browser.slowStartup.maxSamples'
|
||||
'browser.slowStartup.notificationDisabled',
|
||||
'browser.slowStartup.samples',
|
||||
'dom.allow_scripts_to_close_windows',
|
||||
'dom.disable_window_flip',
|
||||
'network.http.fast-fallback-to-IPv4',
|
||||
'offline-apps.quota.warn',
|
||||
/* reset parrot: check your open about:config after running the script */
|
||||
'_user.js.parrot'
|
||||
]
|
91
user.js
91
user.js
@ -1,7 +1,7 @@
|
||||
/******
|
||||
* name: ghacks user.js
|
||||
* date: 15 May 2018
|
||||
* version 60-beta: Call Me Pants, Maybe
|
||||
* date: 30 May 2018
|
||||
* version 60: Call Me Pants, Maybe
|
||||
* "Your stare was holding, ripped JEANS, skin was showin'"
|
||||
* authors: v52+ github | v51- www.ghacks.net
|
||||
* url: https://github.com/ghacksuserjs/ghacks-user.js
|
||||
@ -65,17 +65,8 @@ user_pref("general.warnOnAboutConfig", false);
|
||||
|
||||
/*** 0100: STARTUP ***/
|
||||
user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
|
||||
/* 0101: disable "slow startup" options
|
||||
* warnings, disk history, welcomes, intros, EULA, default browser check ***/
|
||||
user_pref("browser.slowStartup.notificationDisabled", true);
|
||||
user_pref("browser.slowStartup.maxSamples", 0);
|
||||
user_pref("browser.slowStartup.samples", 0);
|
||||
user_pref("browser.rights.3.shown", true);
|
||||
user_pref("browser.startup.homepage_override.mstone", "ignore");
|
||||
user_pref("startup.homepage_welcome_url", "");
|
||||
user_pref("startup.homepage_welcome_url.additional", "");
|
||||
user_pref("startup.homepage_override_url", ""); // what's new page after updates
|
||||
user_pref("browser.laterrun.enabled", false);
|
||||
/* 0101: disable default browser check
|
||||
* [SETTING] General>Startup>Always check if Firefox is your default browser ***/
|
||||
user_pref("browser.shell.checkDefaultBrowser", false);
|
||||
/* 0102: set start page (0=blank, 1=home, 2=last visited page, 3=resume previous session)
|
||||
* [SETTING] General>Startup>When Firefox starts ***/
|
||||
@ -90,7 +81,7 @@ user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely decease
|
||||
// user_pref("geo.enabled", false);
|
||||
/* 0201b: set a default permission for Location (FF58+)
|
||||
* [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
|
||||
* [SETTING] to manage site exceptions: Privacy & Security>Permissions>Location>Settings ***/
|
||||
* [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
|
||||
user_pref("permissions.default.geo", 2); // 0=always ask (default), 1=allow, 2=block
|
||||
/* 0202: disable GeoIP-based search results
|
||||
* [NOTE] May not be hidden if Firefox has changed your settings due to your locale
|
||||
@ -300,11 +291,11 @@ user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
|
||||
/* 0421: enable more Tracking Protection choices under Options>Privacy & Security>Use Tracking Protection
|
||||
* Displays three choices: "Always", "Only in private windows", "Never" ***/
|
||||
user_pref("privacy.trackingprotection.ui.enabled", true);
|
||||
/* 0422: enable "basic" or "strict" tracking protecting list - ONLY USE ONE!
|
||||
/* 0422: set which Tracking Protection block list to use
|
||||
* [WARNING] We don't recommend enforcing this from here, as available block lists can change
|
||||
* [SETTING] Privacy & Security>Tracking Protection>Change Block List
|
||||
* [SETTING-ESR52] Privacy>Use Tracking Protection>Change Block List ***/
|
||||
// user_pref("urlclassifier.trackingTable", "test-track-simple,base-track-digest256"); // basic
|
||||
// user_pref("urlclassifier.trackingTable", "test-track-simple,base-track-digest256,content-track-digest256"); // strict
|
||||
/* 0423: disable Mozilla's blocklist for known Flash tracking/fingerprinting (FF48+)
|
||||
* [1] https://www.ghacks.net/2016/07/18/firefox-48-blocklist-against-plugin-fingerprinting/
|
||||
* [2] https://bugzilla.mozilla.org/1237198 ***/
|
||||
@ -352,8 +343,9 @@ user_pref("network.allow-experiments", false);
|
||||
user_pref("app.normandy.enabled", false);
|
||||
user_pref("app.normandy.api_url", "");
|
||||
user_pref("app.shield.optoutstudies.enabled", false);
|
||||
/* 0505: block URL used for System Add-on updates (FF44+)
|
||||
* [NOTE] You will not get any System Add-on updates except when you update Firefox ***/
|
||||
/* 0505: disable System Add-on updates
|
||||
* [NOTE] In FF61 and lower, you will not get any System Add-on updates except when you update Firefox ***/
|
||||
// user_pref("extensions.systemAddon.update.enabled", false); // (FF62+)
|
||||
// user_pref("extensions.systemAddon.update.url", "");
|
||||
/* 0506: disable PingCentre telemetry (used in several System Add-ons) (FF57+)
|
||||
* Currently blocked by 'datareporting.healthreport.uploadEnabled' (see 0333) ***/
|
||||
@ -450,7 +442,6 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
|
||||
* [NOTE] It is a myth that disabling IPv6 will speed up your internet connection
|
||||
* [1] https://www.howtogeek.com/195062/no-disabling-ipv6-probably-wont-speed-up-your-internet-connection/ ***/
|
||||
// user_pref("network.dns.disableIPv6", true);
|
||||
// user_pref("network.http.fast-fallback-to-IPv4", true); // default: true
|
||||
/* 0702: disable HTTP2 (which was based on SPDY which is now deprecated)
|
||||
* HTTP2 raises concerns with "multiplexing" and "server push", does nothing to enhance
|
||||
* privacy, and in fact opens up a number of server-side fingerprinting opportunities
|
||||
@ -475,7 +466,7 @@ user_pref("network.proxy.socks_remote_dns", true);
|
||||
/* 0706: remove paths when sending URLs to PAC scripts (FF51+)
|
||||
* CVE-2017-5384: Information disclosure via Proxy Auto-Config (PAC)
|
||||
* [1] https://bugzilla.mozilla.org/1255474 ***/
|
||||
user_pref("network.proxy.autoconfig_url.include_path", false);
|
||||
user_pref("network.proxy.autoconfig_url.include_path", false); // default: false
|
||||
/* 0707: disable (or setup) DNS-over-HTTPS (DoH) (FF60+)
|
||||
* TRR = Trusted Recursive Resolver
|
||||
* .mode: 0=off, 1=race, 2=TRR first, 3=TRR only, 4=race for stats, but always use native result
|
||||
@ -613,7 +604,7 @@ user_pref("signon.autofillForms", false);
|
||||
* Don't let sites dictate use of saved logins and passwords. Increase security through
|
||||
* stronger password use. The trade-off is the convenience. Some sites should never be
|
||||
* saved (such as banking sites). Set at true, informed users can make their own choice. ***/
|
||||
user_pref("signon.storeWhenAutocompleteOff", true);
|
||||
user_pref("signon.storeWhenAutocompleteOff", true); // default: true
|
||||
/* 0907: display warnings for logins on non-secure (non HTTPS) pages
|
||||
* [1] https://bugzilla.mozilla.org/1217156 ***/
|
||||
user_pref("security.insecure_password.ui.enabled", true);
|
||||
@ -927,15 +918,11 @@ user_pref("network.http.referer.defaultPolicy.pbmode", 2); // (FF59+) default: 2
|
||||
* TBB (Tor Browser Bundle) which is specifically designed for the dark web
|
||||
* [1] https://bugzilla.mozilla.org/1305144 ***/
|
||||
user_pref("network.http.referer.hideOnionSource", true);
|
||||
/* 1610: ALL: disable the DNT HTTP header, which is essentially USELESS
|
||||
* It is voluntary and most ad networks do not honor it. DNT is *NOT* how you stop being data mined.
|
||||
* Don't encourage a setting that gives any legitimacy to 3rd parties being in control of your privacy.
|
||||
* Sending a DNT header *highly likely* raises entropy, especially in standard windows.
|
||||
/* 1610: ALL: enable the DNT (Do Not Track) HTTP header
|
||||
* [SETTING] Privacy & Security>Tracking Protecting>Send websites a "Do Not Track"...
|
||||
* [SETTING-ESR52] Privacy>Use Tracking Protecting>manage your Do Not Track settings
|
||||
* [NOTE] DNT is enforced with TP (see 0420) regardless of this pref (e.g. in default PB Mode)
|
||||
* [NOTE] If you use NoScript MAKE SURE to set the pref noscript.doNotTrack.enabled to match ***/
|
||||
user_pref("privacy.donottrackheader.enabled", false);
|
||||
* [NOTE] DNT is enforced with TP (see 0420) regardless of this pref ***/
|
||||
user_pref("privacy.donottrackheader.enabled", true);
|
||||
|
||||
/*** 1700: CONTAINERS [SETUP]
|
||||
[1] https://support.mozilla.org/kb/containers-experiment
|
||||
@ -968,11 +955,14 @@ user_pref("plugin.defaultXpi.state", 0);
|
||||
/* 1802: enable click to play and set to 0 minutes ***/
|
||||
user_pref("plugins.click_to_play", true);
|
||||
user_pref("plugin.sessionPermissionNow.intervalInMinutes", 0);
|
||||
/* 1803: set a plugin state: 0=deactivated 1=ask 2=enabled (Flash example)
|
||||
* you can set all these plugin.state's via Add-ons>Plugins or search for plugin.state in about:config
|
||||
/* 1803: disable NPAPI plugins (Add-ons>Plugins)
|
||||
* 0=deactivated, 1=ask, 2=enabled
|
||||
* ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash
|
||||
* [NOTE] ESR52 users should check plugin.state* for other installed NPAPI plugins
|
||||
* [NOTE] You can still over-ride individual sites e.g. youtube via site permissions
|
||||
* [1] https://www.ghacks.net/2013/07/09/how-to-make-sure-that-a-firefox-plugin-never-activates-again/ ***/
|
||||
// user_pref("plugin.state.flash", 0);
|
||||
user_pref("plugin.state.flash", 0);
|
||||
user_pref("plugin.state.java", 0);
|
||||
/* 1805: disable scanning for plugins [WINDOWS]
|
||||
* [1] http://kb.mozillazine.org/Plugin_scanning
|
||||
* plid.all = whether to scan the directories specified in the Windows registry for PLIDs.
|
||||
@ -1033,7 +1023,7 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
|
||||
/* 2024: set a default permission for Camera/Microphone (FF58+)
|
||||
* 0=always ask (default), 1=allow, 2=block
|
||||
* [SETTING] to add site exceptions: Page Info>Permissions>Use the Camera/Microphone
|
||||
* [SETTING] to manage site exceptions: Privacy & Security>Permissions>Camera/Microphone>Settings ***/
|
||||
* [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Camera/Microphone>Settings ***/
|
||||
// user_pref("permissions.default.camera", 2);
|
||||
// user_pref("permissions.default.microphone", 2);
|
||||
/* 2026: disable canvas capture stream
|
||||
@ -1065,9 +1055,7 @@ user_pref("dom.disable_window_open_feature.resizable", true); // default: true
|
||||
user_pref("dom.disable_window_open_feature.status", true); // status bar - default: true
|
||||
user_pref("dom.disable_window_open_feature.titlebar", true);
|
||||
user_pref("dom.disable_window_open_feature.toolbar", true);
|
||||
/* 2202: disable meddling with open windows ***/
|
||||
user_pref("dom.allow_scripts_to_close_windows", false); // default: false
|
||||
user_pref("dom.disable_window_flip", true); // window z-order - default: true
|
||||
/* 2202: prevent scripts moving and resizing open windows ***/
|
||||
user_pref("dom.disable_window_move_resize", true);
|
||||
/* 2203: open links targeting new windows in a new tab instead
|
||||
* This stops malicious window sizes and some screen resolution leaks.
|
||||
@ -1123,7 +1111,7 @@ user_pref("dom.webnotifications.enabled", false); // (FF22+)
|
||||
user_pref("dom.webnotifications.serviceworker.enabled", false); // (FF44+)
|
||||
/* 2305: set a default permission for Notifications (see 2304) (FF58+)
|
||||
* [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
|
||||
* [SETTING] to manage site exceptions: Privacy & Security>Permissions>Notifications>Settings ***/
|
||||
* [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Notifications>Settings ***/
|
||||
// user_pref("permissions.default.desktop-notification", 2); // 0=always ask (default), 1=allow, 2=block
|
||||
/* 2306: disable push notifications (FF44+)
|
||||
* web apps can receive messages pushed to them from a server, whether or
|
||||
@ -1303,7 +1291,9 @@ user_pref("pdfjs.disabled", false);
|
||||
/* 2650: discourage downloading to desktop (0=desktop 1=downloads 2=last used)
|
||||
* [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
|
||||
user_pref("browser.download.folderList", 2);
|
||||
/* 2651: enforce user interaction for security by always asking the user where to download ***/
|
||||
/* 2651: enforce user interaction for security by always asking the user where to download
|
||||
* [SETTING] General>Downloads>Always ask you where to save files
|
||||
* [SETTING-ESR52] General>Downloads>Always ask me where to save files ***/
|
||||
user_pref("browser.download.useDownloadDir", false);
|
||||
/* 2652: disable adding downloads to the system's "recent documents" list ***/
|
||||
user_pref("browser.download.manager.addToRecentDocs", false);
|
||||
@ -1408,7 +1398,7 @@ user_pref("network.cookie.leave-secure-alone", true); // default: true
|
||||
* [WARNING] This *will* break other extensions including legacy, and *will* break some sites ***/
|
||||
// user_pref("dom.indexedDB.enabled", false);
|
||||
/* 2730: disable offline cache
|
||||
* [NOTE] This is required 'true' for Storage API (2750) ***/
|
||||
* [NOTE] For FF60 and under, this is required 'true' for Storage API (2750) ***/
|
||||
// user_pref("browser.cache.offline.enable", false);
|
||||
/* 2730b: disable offline cache on insecure sites (FF60+)
|
||||
* [1] https://blog.mozilla.org/security/2018/02/12/restricting-appcache-secure-contexts/ ***/
|
||||
@ -1417,13 +1407,6 @@ user_pref("browser.cache.offline.insecure.enable", false);
|
||||
* [1] https://support.mozilla.org/questions/1098540
|
||||
* [2] https://bugzilla.mozilla.org/959985 ***/
|
||||
user_pref("offline-apps.allow_by_default", false);
|
||||
/* 2732: display a notification when websites ask to store data for offline use
|
||||
* [SETTING-ESR52] Advanced>Network>Tell me when a website asks to store data for offline use ***/
|
||||
user_pref("browser.offline-apps.notify", true);
|
||||
/* 2733: set size of warning quota for offline cache (default 51200)
|
||||
* Offline cache is only used in rare cases to store data locally. FF will store small amounts
|
||||
* (default <50MB) of data in the offline (application) cache without asking for permission. ***/
|
||||
// user_pref("offline-apps.quota.warn", 51200);
|
||||
/* 2740: disable service workers cache and cache storage
|
||||
* [1] https://w3c.github.io/ServiceWorker/#privacy ***/
|
||||
user_pref("dom.caches.enabled", false);
|
||||
@ -1431,7 +1414,7 @@ user_pref("dom.caches.enabled", false);
|
||||
* The API gives sites the ability to find out how much space they can use, how much
|
||||
* they are already using, and even control whether or not they need to be alerted
|
||||
* before the user agent disposes of site data in order to make room for other things.
|
||||
* [NOTE] If Storage API is enabled, then Offline Cache (2730) must be also be enabled
|
||||
* [NOTE] For FF60 and under, if Storage API is enabled, then Offline Cache (2730) must be also be enabled
|
||||
* [1] https://developer.mozilla.org/docs/Web/API/StorageManager
|
||||
* [2] https://developer.mozilla.org/docs/Web/API/Storage_API
|
||||
* [3] https://blog.mozilla.org/l10n/2017/03/07/firefox-l10n-report-aurora-54/ ***/
|
||||
@ -1574,6 +1557,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true);
|
||||
Modifier events suppressed are SHIFT and both ALT keys. Chrome is not affected.
|
||||
FF60: Fix keydown/keyup events (1438795)
|
||||
** 1337157 - disable WebGL debug renderer info (see 4613) (FF60+)
|
||||
** 1459089 - disable OS locale in HTTP Accept-Language headers [ANDROID] (FF62+)
|
||||
***/
|
||||
user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
|
||||
/* 4501: enable privacy.resistFingerprinting (FF41+)
|
||||
@ -1704,6 +1688,11 @@ user_pref("_user.js.parrot", "4700 syntax error: the parrot's taken 'is last bow
|
||||
/*** 5000: PERSONAL [SETUP]
|
||||
Non-project related but useful. If any of these interest you, add them to your overrides ***/
|
||||
user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
|
||||
/* WELCOME & WHAT's NEW NOTICES ***/
|
||||
// user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switch
|
||||
// user_pref("startup.homepage_welcome_url", "");
|
||||
// user_pref("startup.homepage_welcome_url.additional", "");
|
||||
// user_pref("startup.homepage_override_url", ""); // What's New page after updates
|
||||
/* WARNINGS ***/
|
||||
// user_pref("browser.tabs.warnOnClose", false);
|
||||
// user_pref("browser.tabs.warnOnCloseOtherTabs", false);
|
||||
@ -1748,7 +1737,7 @@ user_pref("pageThumbs.enabled", false);
|
||||
// 2503: (31+) disable network API - replaced by dom.netinfo.enabled
|
||||
// [-] https://bugzilla.mozilla.org/960426
|
||||
user_pref("dom.network.enabled", false);
|
||||
// 2600s: (35+) disable WebSockets
|
||||
// 2600's: (35+) disable WebSockets
|
||||
// [-] https://bugzilla.mozilla.org/1091016
|
||||
user_pref("network.websocket.enabled", false);
|
||||
// 1610: (36+) set DNT "value" to "not be tracked" (FF21+)
|
||||
@ -1806,7 +1795,7 @@ user_pref("browser.safebrowsing.provider.google.appRepURL", ""); // browser.safe
|
||||
// 1200's: block rc4 whitelist
|
||||
// [-] https://bugzilla.mozilla.org/1215796
|
||||
user_pref("security.tls.insecure_fallback_hosts.use_static_list", false);
|
||||
// 2300s: disable SharedWorkers
|
||||
// 2300's: disable SharedWorkers
|
||||
// [1] https://trac.torproject.org/projects/tor/ticket/15562
|
||||
// [-] https://bugzilla.mozilla.org/1207635
|
||||
user_pref("dom.workers.sharedWorkers.enabled", false);
|
||||
@ -2043,7 +2032,7 @@ user_pref("media.eme.chromium-api.enabled", false); // (FF55+)
|
||||
// [1] https://trac.torproject.org/projects/tor/ticket/16222
|
||||
// [-] https://bugzilla.mozilla.org/1393497
|
||||
user_pref("devtools.webide.autoinstallFxdtAdapters", false);
|
||||
// 2600s: disable SimpleServiceDiscovery - which can bypass proxy settings - e.g. Roku
|
||||
// 2600's: disable SimpleServiceDiscovery - which can bypass proxy settings - e.g. Roku
|
||||
// [1] https://trac.torproject.org/projects/tor/ticket/16222
|
||||
// [-] https://bugzilla.mozilla.org/1393582
|
||||
user_pref("browser.casting.enabled", false);
|
||||
@ -2104,7 +2093,7 @@ user_pref("dom.idle-observers-api.enabled", false);
|
||||
user_pref("browser.newtabpage.directory.source", "data:text/plain,");
|
||||
user_pref("browser.newtabpage.enhanced", false);
|
||||
user_pref("browser.newtabpage.introShown", true);
|
||||
// 0512: disable Shield (FF53-FF59) - replaced internally by Normandy (see 0503)
|
||||
// 0512: disable Shield (FF53+) - replaced internally by Normandy (see 0503)
|
||||
// Shield is an telemetry system (including Heartbeat) that can also push and test "recipes"
|
||||
// [1] https://wiki.mozilla.org/Firefox/Shield
|
||||
// [2] https://github.com/mozilla/normandy
|
||||
@ -2118,7 +2107,7 @@ user_pref("browser.newtabpage.activity-stream.enabled", false);
|
||||
// [NOTE] CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed)
|
||||
// [-] https://bugzilla.mozilla.org/1434934
|
||||
user_pref("dom.workers.enabled", false);
|
||||
// 5000s: open "page/selection source" in a new window
|
||||
// 5000's: open "page/selection source" in a new window
|
||||
// [-] https://bugzilla.mozilla.org/1418403
|
||||
// user_pref("view_source.tab", false);
|
||||
// * * * /
|
||||
|
Reference in New Issue
Block a user