diff --git a/3.3-Overrides-[To-RFP-or-Not].md b/3.3-Overrides-[To-RFP-or-Not].md index 99c59a8..fe190d1 100644 --- a/3.3-Overrides-[To-RFP-or-Not].md +++ b/3.3-Overrides-[To-RFP-or-Not].md @@ -1,4 +1,4 @@ -🟩 Previous: [Overrides [Common]](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-[Common]) +🟩 Previous: [Overrides [Common]](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) 🟥 Summary: **The best any browser can confidently do, excluding Tor Browser, is fool naive scripts. In Firefox the best tool for that is RFP - it is performant, does not leak real values, and has timing mitigations against side channel attacks**. If you can handle a few RFP side-effects, cool - if not, then consider using Canvas Blocker if your threat model fits @@ -81,4 +81,4 @@ If you can live with that, and you should have a secondary browser for the occas --- -🟩 Next: [Apply + Update + Maintain](https://github.com/arkenfox/user.js/wiki/3.4-Apply---Update--Maintain) \ No newline at end of file +🟩 Next: [Apply & Update & Maintain](https://github.com/arkenfox/user.js/wiki/3.4-Apply-&-Update-&-Maintain) \ No newline at end of file