mirror of
https://github.com/arkenfox/user.js.git
synced 2025-09-04 02:48:31 +02:00
Compare commits
27 Commits
v60.0-beta
...
60.0
Author | SHA1 | Date | |
---|---|---|---|
3264fbd9c3 | |||
b8b3a4f7ed | |||
7f1f9e124b | |||
9b1cf28e89 | |||
acc5a1c2df | |||
9a4032f4cd | |||
f113cf84c3 | |||
c92ece7960 | |||
3e5667fb34 | |||
2bf238f384 | |||
3edf7af85e | |||
4b8b2d81a0 | |||
fde8035332 | |||
01bd2a4f6d | |||
6d4b49d061 | |||
8e60f412e4 | |||
f60a87f97f | |||
449e32a8ca | |||
35a9d3d1e1 | |||
c66d1b08e7 | |||
0a63b6545d | |||
a8051b88e4 | |||
87ce12925d | |||
d6a7531c67 | |||
3a77e18ae8 | |||
a635ae5dfb | |||
02bac31e6a |
@ -1,6 +1,7 @@
|
|||||||
/***
|
/***
|
||||||
This will reset the preferences that have been removed completely
|
This will reset the preferences that have been removed completely from the ghacks user.js.
|
||||||
from the ghacks user.js up to and including release 60-beta
|
|
||||||
|
Last updated: 27-May-2018
|
||||||
|
|
||||||
For instructions see:
|
For instructions see:
|
||||||
https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
|
https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
|
||||||
@ -85,6 +86,17 @@
|
|||||||
'security.block_script_with_wrong_mime',
|
'security.block_script_with_wrong_mime',
|
||||||
'security.fileuri.strict_origin_policy',
|
'security.fileuri.strict_origin_policy',
|
||||||
'security.sri.enable',
|
'security.sri.enable',
|
||||||
|
/* 61-beta */
|
||||||
|
'browser.laterrun.enabled',
|
||||||
|
'browser.offline-apps.notify',
|
||||||
|
'browser.rights.3.shown',
|
||||||
|
'browser.slowStartup.maxSamples'
|
||||||
|
'browser.slowStartup.notificationDisabled',
|
||||||
|
'browser.slowStartup.samples',
|
||||||
|
'dom.allow_scripts_to_close_windows',
|
||||||
|
'dom.disable_window_flip',
|
||||||
|
'network.http.fast-fallback-to-IPv4',
|
||||||
|
'offline-apps.quota.warn',
|
||||||
/* reset parrot: check your open about:config after running the script */
|
/* reset parrot: check your open about:config after running the script */
|
||||||
'_user.js.parrot'
|
'_user.js.parrot'
|
||||||
]
|
]
|
91
user.js
91
user.js
@ -1,7 +1,7 @@
|
|||||||
/******
|
/******
|
||||||
* name: ghacks user.js
|
* name: ghacks user.js
|
||||||
* date: 15 May 2018
|
* date: 30 May 2018
|
||||||
* version 60-beta: Call Me Pants, Maybe
|
* version 60: Call Me Pants, Maybe
|
||||||
* "Your stare was holding, ripped JEANS, skin was showin'"
|
* "Your stare was holding, ripped JEANS, skin was showin'"
|
||||||
* authors: v52+ github | v51- www.ghacks.net
|
* authors: v52+ github | v51- www.ghacks.net
|
||||||
* url: https://github.com/ghacksuserjs/ghacks-user.js
|
* url: https://github.com/ghacksuserjs/ghacks-user.js
|
||||||
@ -65,17 +65,8 @@ user_pref("general.warnOnAboutConfig", false);
|
|||||||
|
|
||||||
/*** 0100: STARTUP ***/
|
/*** 0100: STARTUP ***/
|
||||||
user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
|
user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
|
||||||
/* 0101: disable "slow startup" options
|
/* 0101: disable default browser check
|
||||||
* warnings, disk history, welcomes, intros, EULA, default browser check ***/
|
* [SETTING] General>Startup>Always check if Firefox is your default browser ***/
|
||||||
user_pref("browser.slowStartup.notificationDisabled", true);
|
|
||||||
user_pref("browser.slowStartup.maxSamples", 0);
|
|
||||||
user_pref("browser.slowStartup.samples", 0);
|
|
||||||
user_pref("browser.rights.3.shown", true);
|
|
||||||
user_pref("browser.startup.homepage_override.mstone", "ignore");
|
|
||||||
user_pref("startup.homepage_welcome_url", "");
|
|
||||||
user_pref("startup.homepage_welcome_url.additional", "");
|
|
||||||
user_pref("startup.homepage_override_url", ""); // what's new page after updates
|
|
||||||
user_pref("browser.laterrun.enabled", false);
|
|
||||||
user_pref("browser.shell.checkDefaultBrowser", false);
|
user_pref("browser.shell.checkDefaultBrowser", false);
|
||||||
/* 0102: set start page (0=blank, 1=home, 2=last visited page, 3=resume previous session)
|
/* 0102: set start page (0=blank, 1=home, 2=last visited page, 3=resume previous session)
|
||||||
* [SETTING] General>Startup>When Firefox starts ***/
|
* [SETTING] General>Startup>When Firefox starts ***/
|
||||||
@ -90,7 +81,7 @@ user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely decease
|
|||||||
// user_pref("geo.enabled", false);
|
// user_pref("geo.enabled", false);
|
||||||
/* 0201b: set a default permission for Location (FF58+)
|
/* 0201b: set a default permission for Location (FF58+)
|
||||||
* [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
|
* [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
|
||||||
* [SETTING] to manage site exceptions: Privacy & Security>Permissions>Location>Settings ***/
|
* [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
|
||||||
user_pref("permissions.default.geo", 2); // 0=always ask (default), 1=allow, 2=block
|
user_pref("permissions.default.geo", 2); // 0=always ask (default), 1=allow, 2=block
|
||||||
/* 0202: disable GeoIP-based search results
|
/* 0202: disable GeoIP-based search results
|
||||||
* [NOTE] May not be hidden if Firefox has changed your settings due to your locale
|
* [NOTE] May not be hidden if Firefox has changed your settings due to your locale
|
||||||
@ -300,11 +291,11 @@ user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
|
|||||||
/* 0421: enable more Tracking Protection choices under Options>Privacy & Security>Use Tracking Protection
|
/* 0421: enable more Tracking Protection choices under Options>Privacy & Security>Use Tracking Protection
|
||||||
* Displays three choices: "Always", "Only in private windows", "Never" ***/
|
* Displays three choices: "Always", "Only in private windows", "Never" ***/
|
||||||
user_pref("privacy.trackingprotection.ui.enabled", true);
|
user_pref("privacy.trackingprotection.ui.enabled", true);
|
||||||
/* 0422: enable "basic" or "strict" tracking protecting list - ONLY USE ONE!
|
/* 0422: set which Tracking Protection block list to use
|
||||||
|
* [WARNING] We don't recommend enforcing this from here, as available block lists can change
|
||||||
* [SETTING] Privacy & Security>Tracking Protection>Change Block List
|
* [SETTING] Privacy & Security>Tracking Protection>Change Block List
|
||||||
* [SETTING-ESR52] Privacy>Use Tracking Protection>Change Block List ***/
|
* [SETTING-ESR52] Privacy>Use Tracking Protection>Change Block List ***/
|
||||||
// user_pref("urlclassifier.trackingTable", "test-track-simple,base-track-digest256"); // basic
|
// user_pref("urlclassifier.trackingTable", "test-track-simple,base-track-digest256"); // basic
|
||||||
// user_pref("urlclassifier.trackingTable", "test-track-simple,base-track-digest256,content-track-digest256"); // strict
|
|
||||||
/* 0423: disable Mozilla's blocklist for known Flash tracking/fingerprinting (FF48+)
|
/* 0423: disable Mozilla's blocklist for known Flash tracking/fingerprinting (FF48+)
|
||||||
* [1] https://www.ghacks.net/2016/07/18/firefox-48-blocklist-against-plugin-fingerprinting/
|
* [1] https://www.ghacks.net/2016/07/18/firefox-48-blocklist-against-plugin-fingerprinting/
|
||||||
* [2] https://bugzilla.mozilla.org/1237198 ***/
|
* [2] https://bugzilla.mozilla.org/1237198 ***/
|
||||||
@ -352,8 +343,9 @@ user_pref("network.allow-experiments", false);
|
|||||||
user_pref("app.normandy.enabled", false);
|
user_pref("app.normandy.enabled", false);
|
||||||
user_pref("app.normandy.api_url", "");
|
user_pref("app.normandy.api_url", "");
|
||||||
user_pref("app.shield.optoutstudies.enabled", false);
|
user_pref("app.shield.optoutstudies.enabled", false);
|
||||||
/* 0505: block URL used for System Add-on updates (FF44+)
|
/* 0505: disable System Add-on updates
|
||||||
* [NOTE] You will not get any System Add-on updates except when you update Firefox ***/
|
* [NOTE] In FF61 and lower, you will not get any System Add-on updates except when you update Firefox ***/
|
||||||
|
// user_pref("extensions.systemAddon.update.enabled", false); // (FF62+)
|
||||||
// user_pref("extensions.systemAddon.update.url", "");
|
// user_pref("extensions.systemAddon.update.url", "");
|
||||||
/* 0506: disable PingCentre telemetry (used in several System Add-ons) (FF57+)
|
/* 0506: disable PingCentre telemetry (used in several System Add-ons) (FF57+)
|
||||||
* Currently blocked by 'datareporting.healthreport.uploadEnabled' (see 0333) ***/
|
* Currently blocked by 'datareporting.healthreport.uploadEnabled' (see 0333) ***/
|
||||||
@ -450,7 +442,6 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
|
|||||||
* [NOTE] It is a myth that disabling IPv6 will speed up your internet connection
|
* [NOTE] It is a myth that disabling IPv6 will speed up your internet connection
|
||||||
* [1] https://www.howtogeek.com/195062/no-disabling-ipv6-probably-wont-speed-up-your-internet-connection/ ***/
|
* [1] https://www.howtogeek.com/195062/no-disabling-ipv6-probably-wont-speed-up-your-internet-connection/ ***/
|
||||||
// user_pref("network.dns.disableIPv6", true);
|
// user_pref("network.dns.disableIPv6", true);
|
||||||
// user_pref("network.http.fast-fallback-to-IPv4", true); // default: true
|
|
||||||
/* 0702: disable HTTP2 (which was based on SPDY which is now deprecated)
|
/* 0702: disable HTTP2 (which was based on SPDY which is now deprecated)
|
||||||
* HTTP2 raises concerns with "multiplexing" and "server push", does nothing to enhance
|
* HTTP2 raises concerns with "multiplexing" and "server push", does nothing to enhance
|
||||||
* privacy, and in fact opens up a number of server-side fingerprinting opportunities
|
* privacy, and in fact opens up a number of server-side fingerprinting opportunities
|
||||||
@ -475,7 +466,7 @@ user_pref("network.proxy.socks_remote_dns", true);
|
|||||||
/* 0706: remove paths when sending URLs to PAC scripts (FF51+)
|
/* 0706: remove paths when sending URLs to PAC scripts (FF51+)
|
||||||
* CVE-2017-5384: Information disclosure via Proxy Auto-Config (PAC)
|
* CVE-2017-5384: Information disclosure via Proxy Auto-Config (PAC)
|
||||||
* [1] https://bugzilla.mozilla.org/1255474 ***/
|
* [1] https://bugzilla.mozilla.org/1255474 ***/
|
||||||
user_pref("network.proxy.autoconfig_url.include_path", false);
|
user_pref("network.proxy.autoconfig_url.include_path", false); // default: false
|
||||||
/* 0707: disable (or setup) DNS-over-HTTPS (DoH) (FF60+)
|
/* 0707: disable (or setup) DNS-over-HTTPS (DoH) (FF60+)
|
||||||
* TRR = Trusted Recursive Resolver
|
* TRR = Trusted Recursive Resolver
|
||||||
* .mode: 0=off, 1=race, 2=TRR first, 3=TRR only, 4=race for stats, but always use native result
|
* .mode: 0=off, 1=race, 2=TRR first, 3=TRR only, 4=race for stats, but always use native result
|
||||||
@ -613,7 +604,7 @@ user_pref("signon.autofillForms", false);
|
|||||||
* Don't let sites dictate use of saved logins and passwords. Increase security through
|
* Don't let sites dictate use of saved logins and passwords. Increase security through
|
||||||
* stronger password use. The trade-off is the convenience. Some sites should never be
|
* stronger password use. The trade-off is the convenience. Some sites should never be
|
||||||
* saved (such as banking sites). Set at true, informed users can make their own choice. ***/
|
* saved (such as banking sites). Set at true, informed users can make their own choice. ***/
|
||||||
user_pref("signon.storeWhenAutocompleteOff", true);
|
user_pref("signon.storeWhenAutocompleteOff", true); // default: true
|
||||||
/* 0907: display warnings for logins on non-secure (non HTTPS) pages
|
/* 0907: display warnings for logins on non-secure (non HTTPS) pages
|
||||||
* [1] https://bugzilla.mozilla.org/1217156 ***/
|
* [1] https://bugzilla.mozilla.org/1217156 ***/
|
||||||
user_pref("security.insecure_password.ui.enabled", true);
|
user_pref("security.insecure_password.ui.enabled", true);
|
||||||
@ -927,15 +918,11 @@ user_pref("network.http.referer.defaultPolicy.pbmode", 2); // (FF59+) default: 2
|
|||||||
* TBB (Tor Browser Bundle) which is specifically designed for the dark web
|
* TBB (Tor Browser Bundle) which is specifically designed for the dark web
|
||||||
* [1] https://bugzilla.mozilla.org/1305144 ***/
|
* [1] https://bugzilla.mozilla.org/1305144 ***/
|
||||||
user_pref("network.http.referer.hideOnionSource", true);
|
user_pref("network.http.referer.hideOnionSource", true);
|
||||||
/* 1610: ALL: disable the DNT HTTP header, which is essentially USELESS
|
/* 1610: ALL: enable the DNT (Do Not Track) HTTP header
|
||||||
* It is voluntary and most ad networks do not honor it. DNT is *NOT* how you stop being data mined.
|
|
||||||
* Don't encourage a setting that gives any legitimacy to 3rd parties being in control of your privacy.
|
|
||||||
* Sending a DNT header *highly likely* raises entropy, especially in standard windows.
|
|
||||||
* [SETTING] Privacy & Security>Tracking Protecting>Send websites a "Do Not Track"...
|
* [SETTING] Privacy & Security>Tracking Protecting>Send websites a "Do Not Track"...
|
||||||
* [SETTING-ESR52] Privacy>Use Tracking Protecting>manage your Do Not Track settings
|
* [SETTING-ESR52] Privacy>Use Tracking Protecting>manage your Do Not Track settings
|
||||||
* [NOTE] DNT is enforced with TP (see 0420) regardless of this pref (e.g. in default PB Mode)
|
* [NOTE] DNT is enforced with TP (see 0420) regardless of this pref ***/
|
||||||
* [NOTE] If you use NoScript MAKE SURE to set the pref noscript.doNotTrack.enabled to match ***/
|
user_pref("privacy.donottrackheader.enabled", true);
|
||||||
user_pref("privacy.donottrackheader.enabled", false);
|
|
||||||
|
|
||||||
/*** 1700: CONTAINERS [SETUP]
|
/*** 1700: CONTAINERS [SETUP]
|
||||||
[1] https://support.mozilla.org/kb/containers-experiment
|
[1] https://support.mozilla.org/kb/containers-experiment
|
||||||
@ -968,11 +955,14 @@ user_pref("plugin.defaultXpi.state", 0);
|
|||||||
/* 1802: enable click to play and set to 0 minutes ***/
|
/* 1802: enable click to play and set to 0 minutes ***/
|
||||||
user_pref("plugins.click_to_play", true);
|
user_pref("plugins.click_to_play", true);
|
||||||
user_pref("plugin.sessionPermissionNow.intervalInMinutes", 0);
|
user_pref("plugin.sessionPermissionNow.intervalInMinutes", 0);
|
||||||
/* 1803: set a plugin state: 0=deactivated 1=ask 2=enabled (Flash example)
|
/* 1803: disable NPAPI plugins (Add-ons>Plugins)
|
||||||
* you can set all these plugin.state's via Add-ons>Plugins or search for plugin.state in about:config
|
* 0=deactivated, 1=ask, 2=enabled
|
||||||
|
* ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash
|
||||||
|
* [NOTE] ESR52 users should check plugin.state* for other installed NPAPI plugins
|
||||||
* [NOTE] You can still over-ride individual sites e.g. youtube via site permissions
|
* [NOTE] You can still over-ride individual sites e.g. youtube via site permissions
|
||||||
* [1] https://www.ghacks.net/2013/07/09/how-to-make-sure-that-a-firefox-plugin-never-activates-again/ ***/
|
* [1] https://www.ghacks.net/2013/07/09/how-to-make-sure-that-a-firefox-plugin-never-activates-again/ ***/
|
||||||
// user_pref("plugin.state.flash", 0);
|
user_pref("plugin.state.flash", 0);
|
||||||
|
user_pref("plugin.state.java", 0);
|
||||||
/* 1805: disable scanning for plugins [WINDOWS]
|
/* 1805: disable scanning for plugins [WINDOWS]
|
||||||
* [1] http://kb.mozillazine.org/Plugin_scanning
|
* [1] http://kb.mozillazine.org/Plugin_scanning
|
||||||
* plid.all = whether to scan the directories specified in the Windows registry for PLIDs.
|
* plid.all = whether to scan the directories specified in the Windows registry for PLIDs.
|
||||||
@ -1033,7 +1023,7 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
|
|||||||
/* 2024: set a default permission for Camera/Microphone (FF58+)
|
/* 2024: set a default permission for Camera/Microphone (FF58+)
|
||||||
* 0=always ask (default), 1=allow, 2=block
|
* 0=always ask (default), 1=allow, 2=block
|
||||||
* [SETTING] to add site exceptions: Page Info>Permissions>Use the Camera/Microphone
|
* [SETTING] to add site exceptions: Page Info>Permissions>Use the Camera/Microphone
|
||||||
* [SETTING] to manage site exceptions: Privacy & Security>Permissions>Camera/Microphone>Settings ***/
|
* [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Camera/Microphone>Settings ***/
|
||||||
// user_pref("permissions.default.camera", 2);
|
// user_pref("permissions.default.camera", 2);
|
||||||
// user_pref("permissions.default.microphone", 2);
|
// user_pref("permissions.default.microphone", 2);
|
||||||
/* 2026: disable canvas capture stream
|
/* 2026: disable canvas capture stream
|
||||||
@ -1065,9 +1055,7 @@ user_pref("dom.disable_window_open_feature.resizable", true); // default: true
|
|||||||
user_pref("dom.disable_window_open_feature.status", true); // status bar - default: true
|
user_pref("dom.disable_window_open_feature.status", true); // status bar - default: true
|
||||||
user_pref("dom.disable_window_open_feature.titlebar", true);
|
user_pref("dom.disable_window_open_feature.titlebar", true);
|
||||||
user_pref("dom.disable_window_open_feature.toolbar", true);
|
user_pref("dom.disable_window_open_feature.toolbar", true);
|
||||||
/* 2202: disable meddling with open windows ***/
|
/* 2202: prevent scripts moving and resizing open windows ***/
|
||||||
user_pref("dom.allow_scripts_to_close_windows", false); // default: false
|
|
||||||
user_pref("dom.disable_window_flip", true); // window z-order - default: true
|
|
||||||
user_pref("dom.disable_window_move_resize", true);
|
user_pref("dom.disable_window_move_resize", true);
|
||||||
/* 2203: open links targeting new windows in a new tab instead
|
/* 2203: open links targeting new windows in a new tab instead
|
||||||
* This stops malicious window sizes and some screen resolution leaks.
|
* This stops malicious window sizes and some screen resolution leaks.
|
||||||
@ -1123,7 +1111,7 @@ user_pref("dom.webnotifications.enabled", false); // (FF22+)
|
|||||||
user_pref("dom.webnotifications.serviceworker.enabled", false); // (FF44+)
|
user_pref("dom.webnotifications.serviceworker.enabled", false); // (FF44+)
|
||||||
/* 2305: set a default permission for Notifications (see 2304) (FF58+)
|
/* 2305: set a default permission for Notifications (see 2304) (FF58+)
|
||||||
* [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
|
* [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
|
||||||
* [SETTING] to manage site exceptions: Privacy & Security>Permissions>Notifications>Settings ***/
|
* [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Notifications>Settings ***/
|
||||||
// user_pref("permissions.default.desktop-notification", 2); // 0=always ask (default), 1=allow, 2=block
|
// user_pref("permissions.default.desktop-notification", 2); // 0=always ask (default), 1=allow, 2=block
|
||||||
/* 2306: disable push notifications (FF44+)
|
/* 2306: disable push notifications (FF44+)
|
||||||
* web apps can receive messages pushed to them from a server, whether or
|
* web apps can receive messages pushed to them from a server, whether or
|
||||||
@ -1303,7 +1291,9 @@ user_pref("pdfjs.disabled", false);
|
|||||||
/* 2650: discourage downloading to desktop (0=desktop 1=downloads 2=last used)
|
/* 2650: discourage downloading to desktop (0=desktop 1=downloads 2=last used)
|
||||||
* [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
|
* [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
|
||||||
user_pref("browser.download.folderList", 2);
|
user_pref("browser.download.folderList", 2);
|
||||||
/* 2651: enforce user interaction for security by always asking the user where to download ***/
|
/* 2651: enforce user interaction for security by always asking the user where to download
|
||||||
|
* [SETTING] General>Downloads>Always ask you where to save files
|
||||||
|
* [SETTING-ESR52] General>Downloads>Always ask me where to save files ***/
|
||||||
user_pref("browser.download.useDownloadDir", false);
|
user_pref("browser.download.useDownloadDir", false);
|
||||||
/* 2652: disable adding downloads to the system's "recent documents" list ***/
|
/* 2652: disable adding downloads to the system's "recent documents" list ***/
|
||||||
user_pref("browser.download.manager.addToRecentDocs", false);
|
user_pref("browser.download.manager.addToRecentDocs", false);
|
||||||
@ -1408,7 +1398,7 @@ user_pref("network.cookie.leave-secure-alone", true); // default: true
|
|||||||
* [WARNING] This *will* break other extensions including legacy, and *will* break some sites ***/
|
* [WARNING] This *will* break other extensions including legacy, and *will* break some sites ***/
|
||||||
// user_pref("dom.indexedDB.enabled", false);
|
// user_pref("dom.indexedDB.enabled", false);
|
||||||
/* 2730: disable offline cache
|
/* 2730: disable offline cache
|
||||||
* [NOTE] This is required 'true' for Storage API (2750) ***/
|
* [NOTE] For FF60 and under, this is required 'true' for Storage API (2750) ***/
|
||||||
// user_pref("browser.cache.offline.enable", false);
|
// user_pref("browser.cache.offline.enable", false);
|
||||||
/* 2730b: disable offline cache on insecure sites (FF60+)
|
/* 2730b: disable offline cache on insecure sites (FF60+)
|
||||||
* [1] https://blog.mozilla.org/security/2018/02/12/restricting-appcache-secure-contexts/ ***/
|
* [1] https://blog.mozilla.org/security/2018/02/12/restricting-appcache-secure-contexts/ ***/
|
||||||
@ -1417,13 +1407,6 @@ user_pref("browser.cache.offline.insecure.enable", false);
|
|||||||
* [1] https://support.mozilla.org/questions/1098540
|
* [1] https://support.mozilla.org/questions/1098540
|
||||||
* [2] https://bugzilla.mozilla.org/959985 ***/
|
* [2] https://bugzilla.mozilla.org/959985 ***/
|
||||||
user_pref("offline-apps.allow_by_default", false);
|
user_pref("offline-apps.allow_by_default", false);
|
||||||
/* 2732: display a notification when websites ask to store data for offline use
|
|
||||||
* [SETTING-ESR52] Advanced>Network>Tell me when a website asks to store data for offline use ***/
|
|
||||||
user_pref("browser.offline-apps.notify", true);
|
|
||||||
/* 2733: set size of warning quota for offline cache (default 51200)
|
|
||||||
* Offline cache is only used in rare cases to store data locally. FF will store small amounts
|
|
||||||
* (default <50MB) of data in the offline (application) cache without asking for permission. ***/
|
|
||||||
// user_pref("offline-apps.quota.warn", 51200);
|
|
||||||
/* 2740: disable service workers cache and cache storage
|
/* 2740: disable service workers cache and cache storage
|
||||||
* [1] https://w3c.github.io/ServiceWorker/#privacy ***/
|
* [1] https://w3c.github.io/ServiceWorker/#privacy ***/
|
||||||
user_pref("dom.caches.enabled", false);
|
user_pref("dom.caches.enabled", false);
|
||||||
@ -1431,7 +1414,7 @@ user_pref("dom.caches.enabled", false);
|
|||||||
* The API gives sites the ability to find out how much space they can use, how much
|
* The API gives sites the ability to find out how much space they can use, how much
|
||||||
* they are already using, and even control whether or not they need to be alerted
|
* they are already using, and even control whether or not they need to be alerted
|
||||||
* before the user agent disposes of site data in order to make room for other things.
|
* before the user agent disposes of site data in order to make room for other things.
|
||||||
* [NOTE] If Storage API is enabled, then Offline Cache (2730) must be also be enabled
|
* [NOTE] For FF60 and under, if Storage API is enabled, then Offline Cache (2730) must be also be enabled
|
||||||
* [1] https://developer.mozilla.org/docs/Web/API/StorageManager
|
* [1] https://developer.mozilla.org/docs/Web/API/StorageManager
|
||||||
* [2] https://developer.mozilla.org/docs/Web/API/Storage_API
|
* [2] https://developer.mozilla.org/docs/Web/API/Storage_API
|
||||||
* [3] https://blog.mozilla.org/l10n/2017/03/07/firefox-l10n-report-aurora-54/ ***/
|
* [3] https://blog.mozilla.org/l10n/2017/03/07/firefox-l10n-report-aurora-54/ ***/
|
||||||
@ -1574,6 +1557,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true);
|
|||||||
Modifier events suppressed are SHIFT and both ALT keys. Chrome is not affected.
|
Modifier events suppressed are SHIFT and both ALT keys. Chrome is not affected.
|
||||||
FF60: Fix keydown/keyup events (1438795)
|
FF60: Fix keydown/keyup events (1438795)
|
||||||
** 1337157 - disable WebGL debug renderer info (see 4613) (FF60+)
|
** 1337157 - disable WebGL debug renderer info (see 4613) (FF60+)
|
||||||
|
** 1459089 - disable OS locale in HTTP Accept-Language headers [ANDROID] (FF62+)
|
||||||
***/
|
***/
|
||||||
user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
|
user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
|
||||||
/* 4501: enable privacy.resistFingerprinting (FF41+)
|
/* 4501: enable privacy.resistFingerprinting (FF41+)
|
||||||
@ -1704,6 +1688,11 @@ user_pref("_user.js.parrot", "4700 syntax error: the parrot's taken 'is last bow
|
|||||||
/*** 5000: PERSONAL [SETUP]
|
/*** 5000: PERSONAL [SETUP]
|
||||||
Non-project related but useful. If any of these interest you, add them to your overrides ***/
|
Non-project related but useful. If any of these interest you, add them to your overrides ***/
|
||||||
user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
|
user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
|
||||||
|
/* WELCOME & WHAT's NEW NOTICES ***/
|
||||||
|
// user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switch
|
||||||
|
// user_pref("startup.homepage_welcome_url", "");
|
||||||
|
// user_pref("startup.homepage_welcome_url.additional", "");
|
||||||
|
// user_pref("startup.homepage_override_url", ""); // What's New page after updates
|
||||||
/* WARNINGS ***/
|
/* WARNINGS ***/
|
||||||
// user_pref("browser.tabs.warnOnClose", false);
|
// user_pref("browser.tabs.warnOnClose", false);
|
||||||
// user_pref("browser.tabs.warnOnCloseOtherTabs", false);
|
// user_pref("browser.tabs.warnOnCloseOtherTabs", false);
|
||||||
@ -1748,7 +1737,7 @@ user_pref("pageThumbs.enabled", false);
|
|||||||
// 2503: (31+) disable network API - replaced by dom.netinfo.enabled
|
// 2503: (31+) disable network API - replaced by dom.netinfo.enabled
|
||||||
// [-] https://bugzilla.mozilla.org/960426
|
// [-] https://bugzilla.mozilla.org/960426
|
||||||
user_pref("dom.network.enabled", false);
|
user_pref("dom.network.enabled", false);
|
||||||
// 2600s: (35+) disable WebSockets
|
// 2600's: (35+) disable WebSockets
|
||||||
// [-] https://bugzilla.mozilla.org/1091016
|
// [-] https://bugzilla.mozilla.org/1091016
|
||||||
user_pref("network.websocket.enabled", false);
|
user_pref("network.websocket.enabled", false);
|
||||||
// 1610: (36+) set DNT "value" to "not be tracked" (FF21+)
|
// 1610: (36+) set DNT "value" to "not be tracked" (FF21+)
|
||||||
@ -1806,7 +1795,7 @@ user_pref("browser.safebrowsing.provider.google.appRepURL", ""); // browser.safe
|
|||||||
// 1200's: block rc4 whitelist
|
// 1200's: block rc4 whitelist
|
||||||
// [-] https://bugzilla.mozilla.org/1215796
|
// [-] https://bugzilla.mozilla.org/1215796
|
||||||
user_pref("security.tls.insecure_fallback_hosts.use_static_list", false);
|
user_pref("security.tls.insecure_fallback_hosts.use_static_list", false);
|
||||||
// 2300s: disable SharedWorkers
|
// 2300's: disable SharedWorkers
|
||||||
// [1] https://trac.torproject.org/projects/tor/ticket/15562
|
// [1] https://trac.torproject.org/projects/tor/ticket/15562
|
||||||
// [-] https://bugzilla.mozilla.org/1207635
|
// [-] https://bugzilla.mozilla.org/1207635
|
||||||
user_pref("dom.workers.sharedWorkers.enabled", false);
|
user_pref("dom.workers.sharedWorkers.enabled", false);
|
||||||
@ -2043,7 +2032,7 @@ user_pref("media.eme.chromium-api.enabled", false); // (FF55+)
|
|||||||
// [1] https://trac.torproject.org/projects/tor/ticket/16222
|
// [1] https://trac.torproject.org/projects/tor/ticket/16222
|
||||||
// [-] https://bugzilla.mozilla.org/1393497
|
// [-] https://bugzilla.mozilla.org/1393497
|
||||||
user_pref("devtools.webide.autoinstallFxdtAdapters", false);
|
user_pref("devtools.webide.autoinstallFxdtAdapters", false);
|
||||||
// 2600s: disable SimpleServiceDiscovery - which can bypass proxy settings - e.g. Roku
|
// 2600's: disable SimpleServiceDiscovery - which can bypass proxy settings - e.g. Roku
|
||||||
// [1] https://trac.torproject.org/projects/tor/ticket/16222
|
// [1] https://trac.torproject.org/projects/tor/ticket/16222
|
||||||
// [-] https://bugzilla.mozilla.org/1393582
|
// [-] https://bugzilla.mozilla.org/1393582
|
||||||
user_pref("browser.casting.enabled", false);
|
user_pref("browser.casting.enabled", false);
|
||||||
@ -2104,7 +2093,7 @@ user_pref("dom.idle-observers-api.enabled", false);
|
|||||||
user_pref("browser.newtabpage.directory.source", "data:text/plain,");
|
user_pref("browser.newtabpage.directory.source", "data:text/plain,");
|
||||||
user_pref("browser.newtabpage.enhanced", false);
|
user_pref("browser.newtabpage.enhanced", false);
|
||||||
user_pref("browser.newtabpage.introShown", true);
|
user_pref("browser.newtabpage.introShown", true);
|
||||||
// 0512: disable Shield (FF53-FF59) - replaced internally by Normandy (see 0503)
|
// 0512: disable Shield (FF53+) - replaced internally by Normandy (see 0503)
|
||||||
// Shield is an telemetry system (including Heartbeat) that can also push and test "recipes"
|
// Shield is an telemetry system (including Heartbeat) that can also push and test "recipes"
|
||||||
// [1] https://wiki.mozilla.org/Firefox/Shield
|
// [1] https://wiki.mozilla.org/Firefox/Shield
|
||||||
// [2] https://github.com/mozilla/normandy
|
// [2] https://github.com/mozilla/normandy
|
||||||
@ -2118,7 +2107,7 @@ user_pref("browser.newtabpage.activity-stream.enabled", false);
|
|||||||
// [NOTE] CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed)
|
// [NOTE] CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed)
|
||||||
// [-] https://bugzilla.mozilla.org/1434934
|
// [-] https://bugzilla.mozilla.org/1434934
|
||||||
user_pref("dom.workers.enabled", false);
|
user_pref("dom.workers.enabled", false);
|
||||||
// 5000s: open "page/selection source" in a new window
|
// 5000's: open "page/selection source" in a new window
|
||||||
// [-] https://bugzilla.mozilla.org/1418403
|
// [-] https://bugzilla.mozilla.org/1418403
|
||||||
// user_pref("view_source.tab", false);
|
// user_pref("view_source.tab", false);
|
||||||
// * * * /
|
// * * * /
|
||||||
|
Reference in New Issue
Block a user