mirror of
https://github.com/arkenfox/user.js.git
synced 2025-09-01 09:28:31 +02:00
Compare commits
18 Commits
v68.0-beta
...
v69.0-beta
Author | SHA1 | Date | |
---|---|---|---|
2c734612f6 | |||
a12dd83b1f | |||
44d9ceaf05 | |||
be9d9ac9ca | |||
66cdb72927 | |||
953b96431e | |||
4d72ad90b0 | |||
cccb5b10b4 | |||
810045eb39 | |||
b47982bb9a | |||
0691b8babe | |||
8d1c95c650 | |||
19484e1a56 | |||
755ebf88fb | |||
d26ea4f39e | |||
a0f3da208f | |||
5166811bd5 | |||
86bfdd1470 |
@ -1,7 +1,7 @@
|
||||
/***
|
||||
This will reset the preferences that have been removed completely from the ghacks user.js.
|
||||
|
||||
Last updated: 16-July-2019
|
||||
Last updated: 01-September-2019
|
||||
|
||||
For instructions see:
|
||||
https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
|
||||
@ -204,6 +204,8 @@
|
||||
'font.name.serif.x-western',
|
||||
'layout.css.font-loading-api.enabled',
|
||||
'toolkit.telemetry.cachedClientID',
|
||||
/* 69-beta */
|
||||
'plugin.sessionPermissionNow.intervalInMinutes',
|
||||
/* reset parrot: check your open about:config after running the script */
|
||||
'_user.js.parrot'
|
||||
]
|
||||
|
83
user.js
83
user.js
@ -1,8 +1,8 @@
|
||||
/******
|
||||
* name: ghacks user.js
|
||||
* date: 18 August 2019
|
||||
* version 68-beta: Knock on Pants
|
||||
* "It's like thunder, lightning... the way you wear me is frightening"
|
||||
* date: 4 September 2019
|
||||
* version 69-beta: Pants One More Time
|
||||
* "When I'm not with pants I lose my mind. Give me a sign. Hit me, pants, one more time."
|
||||
* authors: v52+ github | v51- www.ghacks.net
|
||||
* url: https://github.com/ghacksuserjs/ghacks-user.js
|
||||
* license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
|
||||
@ -112,8 +112,8 @@ user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
|
||||
/* 0105b: disable Activity Stream Snippets
|
||||
* Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
|
||||
* [1] https://abouthome-snippets-service.readthedocs.io/ ***/
|
||||
user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
|
||||
user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
|
||||
user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
|
||||
/* 0105c: disable Activity Stream Top Stories, Pocket-based and/or sponsored content ***/
|
||||
user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
|
||||
user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
|
||||
@ -267,9 +267,8 @@ user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [FF58+
|
||||
* [2] https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/ ***/
|
||||
user_pref("extensions.pocket.enabled", false);
|
||||
/* 0390: disable Captive Portal detection
|
||||
* [1] https://en.wikipedia.org/wiki/Captive_portal
|
||||
* [2] https://wiki.mozilla.org/Necko/CaptivePortal
|
||||
* [3] https://trac.torproject.org/projects/tor/ticket/21790 ***/
|
||||
* [1] https://www.eff.org/deeplinks/2017/08/how-captive-portals-interfere-wireless-security-and-privacy
|
||||
* [2] https://wiki.mozilla.org/Necko/CaptivePortal ***/
|
||||
user_pref("captivedetect.canonicalURL", "");
|
||||
user_pref("network.captive-portal-service.enabled", false); // [FF52+]
|
||||
/* 0391: disable Network Connectivity checks [FF65+]
|
||||
@ -418,7 +417,8 @@ user_pref("network.http.altsvc.oe", false);
|
||||
user_pref("network.proxy.socks_remote_dns", true);
|
||||
/* 0707: disable (or setup) DNS-over-HTTPS (DoH) [FF60+]
|
||||
* TRR = Trusted Recursive Resolver
|
||||
* .mode: 0=off, 1=race, 2=TRR first, 3=TRR only, 4=race for stats but always use native result
|
||||
* 0=off, 1=race (removed in FF69), 2=TRR first, 3=TRR only,
|
||||
* 4=race for stats but always use native result (removed in FF69)
|
||||
* [WARNING] DoH bypasses hosts and gives info to yet another party (e.g. Cloudflare)
|
||||
* [1] https://www.ghacks.net/2018/04/02/configure-dns-over-https-in-firefox/
|
||||
* [2] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/ ***/
|
||||
@ -586,6 +586,7 @@ user_pref("browser.cache.disk.enable", false);
|
||||
* [1] http://kb.mozillazine.org/Browser.cache.disk_cache_ssl ***/
|
||||
user_pref("browser.cache.disk_cache_ssl", false);
|
||||
/* 1003: disable memory cache
|
||||
/* capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kilobytes
|
||||
* [NOTE] Not recommended due to performance issues ***/
|
||||
// user_pref("browser.cache.memory.enable", false);
|
||||
// user_pref("browser.cache.memory.capacity", 0); // [HIDDEN PREF]
|
||||
@ -785,8 +786,6 @@ user_pref("browser.display.use_document_fonts", 0);
|
||||
/* 1404: disable rendering of SVG OpenType fonts
|
||||
* [1] https://wiki.mozilla.org/SVGOpenTypeFonts - iSECPartnersReport recommends to disable this ***/
|
||||
user_pref("gfx.font_rendering.opentype_svg.enabled", false);
|
||||
/* 1405: disable WOFF2 (Web Open Font Format) [FF35+] ***/
|
||||
// user_pref("gfx.downloadable_fonts.woff2.enabled", false);
|
||||
/* 1408: disable graphite which FF49 turned back on by default
|
||||
* In the past it had security issues. Update: This continues to be the case, see [1]
|
||||
* [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778 ***/
|
||||
@ -874,9 +873,6 @@ user_pref("privacy.userContext.longPressBehavior", 2);
|
||||
|
||||
/*** [SECTION 1800]: PLUGINS ***/
|
||||
user_pref("_user.js.parrot", "1800 syntax error: the parrot's pushing up daisies!");
|
||||
/* 1802: enable click to play and set to 0 minutes ***/
|
||||
user_pref("plugins.click_to_play", true);
|
||||
user_pref("plugin.sessionPermissionNow.intervalInMinutes", 0);
|
||||
/* 1803: disable Flash plugin
|
||||
* 0=deactivated, 1=ask, 2=enabled
|
||||
* ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash
|
||||
@ -932,17 +928,15 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
|
||||
// user_pref("permissions.default.camera", 2);
|
||||
// user_pref("permissions.default.microphone", 2);
|
||||
/* 2030: disable autoplay of HTML5 media [FF63+]
|
||||
* 0=Allowed, 1=Blocked (2=Prompt - removed in FF66)
|
||||
* 0=Allow all, 1=Block non-muted media (default in FF67+), 2=Prompt (removed in FF66), 5=Block all (FF69+)
|
||||
* [NOTE] You can set exceptions under site permissions
|
||||
* [SETTING] Privacy & Security>Permissions>Block websites from automatically playing sound ***/
|
||||
user_pref("media.autoplay.default", 1); // [DEFAULT: 1 in FF67+]
|
||||
* [SETTING] Privacy & Security>Permissions>Autoplay>Settings>Default for all websites ***/
|
||||
// user_pref("media.autoplay.default", 5);
|
||||
/* 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] ***/
|
||||
user_pref("media.autoplay.enabled.user-gestures-needed", false);
|
||||
/* 2032: disable audio autoplay in non-active tabs [FF51+]
|
||||
/* 2032: disable autoplay of HTML5 media in non-active tabs [FF51+]
|
||||
* [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
|
||||
user_pref("media.block-autoplay-until-in-foreground", true); // [DEFAULT: true]
|
||||
/* 2033: disable autoplay for muted videos [FF63+] ***/
|
||||
// user_pref("media.autoplay.allow-muted", false);
|
||||
|
||||
/*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/
|
||||
user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
|
||||
@ -1020,7 +1014,7 @@ user_pref("dom.serviceWorkers.enabled", false);
|
||||
// user_pref("dom.push.connection.enabled", false);
|
||||
// user_pref("dom.push.serverURL", "");
|
||||
// user_pref("dom.push.userAgentID", "");
|
||||
/* 2306: set a default permission for Notifications (both 2305 and 2306) [FF58+]
|
||||
/* 2306: set a default permission for Notifications (both 2304 and 2305) [FF58+]
|
||||
* 0=always ask (default), 1=allow, 2=block
|
||||
* [NOTE] Best left at default "always ask", fingerprintable via Permissions API
|
||||
* [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
|
||||
@ -1038,11 +1032,15 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
|
||||
* the website for it to look at the clipboard
|
||||
* [1] https://www.ghacks.net/2014/01/08/block-websites-reading-modifying-clipboard-contents-firefox/ ***/
|
||||
user_pref("dom.event.clipboardevents.enabled", false);
|
||||
/* 2403: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
|
||||
/* 2403: disable middlemouse paste leaking clipboard content on Linux after autoscroll
|
||||
* Defense in depth if clipboard events are enabled (see 2402)
|
||||
* [1] https://bugzilla.mozilla.org/1528289 */
|
||||
user_pref("middlemouse.paste", false); // [DEFAULT: false on Windows]
|
||||
/* 2404: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
|
||||
* this disables document.execCommand("cut"/"copy") to protect your clipboard
|
||||
* [1] https://bugzilla.mozilla.org/1170911 ***/
|
||||
user_pref("dom.allow_cut_copy", false);
|
||||
/* 2404: disable "Confirm you want to leave" dialog on page close
|
||||
/* 2405: disable "Confirm you want to leave" dialog on page close
|
||||
* Does not prevent JS leaks of the page close event.
|
||||
* [1] https://developer.mozilla.org/docs/Web/Events/beforeunload
|
||||
* [2] https://support.mozilla.org/questions/1043508 ***/
|
||||
@ -1187,13 +1185,10 @@ user_pref("pdfjs.disabled", false); // [DEFAULT: false]
|
||||
/* 2621: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS]
|
||||
* [1] https://www.ghacks.net/2016/03/25/block-firefox-chrome-windows-store/ ***/
|
||||
user_pref("network.protocol-handler.external.ms-windows-store", false);
|
||||
/* 2622: disable middlemouse paste leaking on Linux
|
||||
* [1] https://bugzilla.mozilla.org/1528289 */
|
||||
user_pref("middlemouse.paste", false); // [DEFAULT: false on Windows]
|
||||
|
||||
/** DOWNLOADS ***/
|
||||
/* 2650: discourage downloading to desktop
|
||||
* 0=desktop 1=downloads 2=last used
|
||||
* 0=desktop, 1=downloads (default), 2=last used
|
||||
* [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
|
||||
// user_pref("browser.download.folderList", 2);
|
||||
/* 2651: enforce user interaction for security by always asking where to download [SETUP-CHROME]
|
||||
@ -1247,9 +1242,8 @@ user_pref("security.dialog_enable_delay", 700);
|
||||
***/
|
||||
user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
|
||||
/* 2701: disable 3rd-party cookies and site-data [SETUP-WEB]
|
||||
* 0=Accept cookies and site data (default), 1=(Block) All third-party cookies, 2=(Block) All cookies,
|
||||
* 3=(Block) Cookies from unvisited sites, 4=(Block) Third-party trackers (FF63+)
|
||||
* [NOTE] Value 4 is tied to the Tracking Protection lists
|
||||
* 0=Accept cookies and site data, 1=(Block) All third-party cookies, 2=(Block) All cookies,
|
||||
* 3=(Block) Cookies from unvisited sites, 4=(Block) Third-party trackers (FF63+) (default FF69+)
|
||||
* [NOTE] You can set exceptions under site permissions or use an extension
|
||||
* [SETTING] Privacy & Security>Content Blocking>Custom>Choose what to block>Cookies ***/
|
||||
user_pref("network.cookie.cookieBehavior", 1);
|
||||
@ -1339,9 +1333,9 @@ user_pref("privacy.cpd.offlineApps", true); // Offline Website Data
|
||||
user_pref("privacy.cpd.passwords", false); // this is not listed
|
||||
user_pref("privacy.cpd.sessions", true); // Active Logins
|
||||
user_pref("privacy.cpd.siteSettings", false); // Site Preferences
|
||||
/* 2805: privacy.*.openWindows (clear session restore data) [FF34+]
|
||||
* [NOTE] There is a years-old bug that these cause two windows when Firefox restarts.
|
||||
* You do not need these anyway if session restore is cleared with history (see 2803) ***/
|
||||
/* 2805: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
|
||||
* [NOTE] Not needed if Session Restore is not used (see 0102) or is already cleared with history (see 2803)
|
||||
* [NOTE] privacy.cpd.openWindows has a bug that causes an additional window to open ***/
|
||||
// user_pref("privacy.clearOnShutdown.openWindows", true);
|
||||
// user_pref("privacy.cpd.openWindows", true);
|
||||
/* 2806: reset default 'Time range to clear' for 'Clear Recent History' (see 2804)
|
||||
@ -1367,9 +1361,9 @@ user_pref("privacy.sanitize.timeSpan", 0);
|
||||
** 1300671 - isolate data:, about: URLs (FF55+)
|
||||
** 1473247 - isolate IP addresses (FF63+)
|
||||
** 1492607 - isolate postMessage with targetOrigin "*" (requires 4002) (FF65+)
|
||||
** 1542309 - isolate top-level domain URLs (FF68+)
|
||||
** 1542309 - isolate top-level domain URLs when host is in the public suffix list (FF68+)
|
||||
** 1506693 - isolate pdfjs range-based requests (FF68+)
|
||||
** 1330467 - isolate site permissions (coming)
|
||||
** 1330467 - isolate site permissions (FF69+)
|
||||
***/
|
||||
user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
|
||||
/* 4001: enable First Party Isolation [FF51+]
|
||||
@ -1754,10 +1748,10 @@ user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
|
||||
// user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false);
|
||||
// * * * /
|
||||
// FF68
|
||||
// 0105b: disable Activity Stream Snippets
|
||||
// [-] https://bugzilla.mozilla.org/1540939
|
||||
user_pref("browser.aboutHomeSnippets.updateUrl", "");
|
||||
// 0105b: disable Activity Stream Legacy Snippets
|
||||
// [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1546190,1540939
|
||||
user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
|
||||
user_pref("browser.aboutHomeSnippets.updateUrl", "");
|
||||
// 0307: disable auto updating of lightweight themes (LWT)
|
||||
// Not to be confused with themes in 0301* + 0302*, which use the FF55+ Theme API
|
||||
// Mozilla plan to convert existing LWTs and remove LWT support in the future, see [1]
|
||||
@ -1771,5 +1765,20 @@ user_pref("security.csp.experimentalEnabled", true);
|
||||
// * * * /
|
||||
// ***/
|
||||
|
||||
/* ESR68.x still uses all the following prefs
|
||||
// [NOTE] replace the * with a slash in the line above to re-enable them
|
||||
// FF69
|
||||
// 1405: disable WOFF2 (Web Open Font Format) [FF35+]
|
||||
// [-] https://bugzilla.mozilla.org/1556991
|
||||
// user_pref("gfx.downloadable_fonts.woff2.enabled", false);
|
||||
// 1802: enforce click-to-play for plugins
|
||||
// [-] https://bugzilla.mozilla.org/1519434
|
||||
user_pref("plugins.click_to_play", true); // [DEFAULT: true in FF25+]
|
||||
// 2033: disable autoplay for muted videos [FF63+] - replaced by `media.autoplay.default` options (2030)
|
||||
// [-] https://bugzilla.mozilla.org/1562331
|
||||
// user_pref("media.autoplay.allow-muted", false);
|
||||
// * * * /
|
||||
// ***/
|
||||
|
||||
/* END: internal custom pref to test for syntax errors ***/
|
||||
user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");
|
||||
|
Reference in New Issue
Block a user