From 622f5a1e1e1ebda4cf228192230ea055f40d2aaa Mon Sep 17 00:00:00 2001 From: Thorin-Oakenpants Date: Sat, 29 Jan 2022 05:40:54 +0000 Subject: [PATCH] Created 1.1 To Arkenfox or Not (markdown) --- 1.1-To-Arkenfox-or-Not.md | 41 +++++++++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) create mode 100644 1.1-To-Arkenfox-or-Not.md diff --git a/1.1-To-Arkenfox-or-Not.md b/1.1-To-Arkenfox-or-Not.md new file mode 100644 index 0000000..81990bd --- /dev/null +++ b/1.1-To-Arkenfox-or-Not.md @@ -0,0 +1,41 @@ +🟩 FOREWORD + +Arkenfox is a resource, feel free to use any, all or none of it - just **HEED** the warnings, notes and documentation + +🟪 TOR BROWSER + +If your threat model calls for anonymity and advanced fingerprinting protection, **[USE TOR BROWSER](https://www.torproject.org/)**. You can also use Tor Browser for [everyday browsing](https://2019.www.torproject.org/about/torusers.html) as another secondary browser. However, you're going to want a non-Tor Browser browser too, which is Firefox, so carry on reading :) + +🟪 A FEW SETTINGS & EXTENSIONS + +**For most people, this is all you really need** + +In the _Before Times_, mankind suffered ... but nowadays, together with a [select few extensions](https://github.com/arkenfox/user.js/wiki/4.1-Extensions), you will get most of the privacy possible with Firefox's built-in solutions: such as + - [HTTPS-Only Mode](https://blog.mozilla.org/security/2020/11/17/firefox-83-introduces-https-only-mode/) + - [State Partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) + - [Network Partitioning](https://blog.mozilla.org/security/2021/01/26/supercookie-protections/) + - [Total Cookie Protection](https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/) (dFPI / Dynamic First Party Isolation) + - [Enhanced Cookie Clearing](https://blog.mozilla.org/security/2021/08/10/firefox-91-introduces-enhanced-cookie-clearing/) along with sanitizing1 on close + - [Site Isolation](https://blog.mozilla.org/security/2021/05/18/introducing-site-isolation-in-firefox/) (Fission) + - [CRLite](https://blog.mozilla.org/security/tag/crlite/) + - and [many more](https://blog.mozilla.org/security/) + +Some of these solutions are the default, or will be. Others are easily set in Firefox's Settings. You do still need to configure some of them, but it is quick and painless - see the [Privacy Guides'](https://www.privacyguides.org/browsers/#desktop-only-recommendations) Firefox Desktop card + +After that, the benefits get incrementally smaller, but they do add up: your mileage will vary depending on your needs. Each arkenfox release generally sees the number of prefs flipped decrease, and we've been doing this since the _Before Times_. We hope that arkenfox will one day become obsolete. + +1 Sanitizing refers to clearing site and other data such as caches and histories + +🟪 FINGERPRINTING + +Most of the above deals with [state](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) and other linkability mechanisms such as navigational tracking + +Stateless tracking, or fingerprinting, is complex. If your threat model calls for anonymity and advanced fingerprinting protection, **THEN USE TOR BROWSER**. Otherwise you can read more about it later in the wiki where arkenfox helps mitigate it, but you have options. + +🟪 EXPECTATIONS + +If you're going to use arkenfox's user.js, then don't expect to just start using it as is. You **WILL NEED TO CREATE OVERRIDES**, and read this wiki **FULLY** + +--- + +🟩 Next: [User.js](https://github.com/arkenfox/user.js/wiki/2.1-Userjs)