From 67998eb4aff851bcc5ceacf7a0415cc18fbed723 Mon Sep 17 00:00:00 2001 From: Thorin-Oakenpants Date: Tue, 4 Dec 2018 08:27:52 +0000 Subject: [PATCH] section naming convention consistency --- user.js | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/user.js b/user.js index f25edff..14966cd 100644 --- a/user.js +++ b/user.js @@ -51,7 +51,7 @@ 0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS 0900: PASSWORDS 1000: CACHE - 1200: HTTPS ( SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS ) + 1200: HTTPS (SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS) 1400: FONTS 1600: HEADERS / REFERERS 1700: CONTAINERS @@ -64,10 +64,10 @@ 2600: MISCELLANEOUS 2700: PERSISTENT STORAGE 2800: SHUTDOWN - 4000: FIRST PARTY ISOLATION - 4500: privacy.resistFingerprinting - 4600: RFP (4500) ALTERNATIVES - 4700: RFP (4500) ALTERNATIVES - NAVIGATOR / USER AGENT (UA) SPOOFING + 4000: FPI (FIRST PARTY ISOLATION) + 4500: RFP (RESIST FINGERPRINTING) + 4600: RFP ALTERNATIVES + 4700: RFP ALTERNATIVES (NAVIGATOR / USER AGENT (UA) SPOOFING) 5000: PERSONAL 9999: DEPRECATED / REMOVED / LEGACY / RENAMED @@ -727,7 +727,7 @@ user_pref("browser.shell.shortcutFavicons", false); /* 1032: disable favicons in web notifications ***/ user_pref("alerts.showFavicons", false); // default: false -/*** [SECTION 1200]: HTTPS ( SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS ) +/*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS) Note that your cipher and other settings can be used server side as a fingerprint attack vector, see [1] (It's quite technical but the first part is easy to understand and you can stop reading when you reach the second section titled "Enter Bro") @@ -1508,7 +1508,7 @@ user_pref("privacy.cpd.siteSettings", false); // Site Preferences * blank value if they are used, but they do work as advertised ***/ user_pref("privacy.sanitize.timeSpan", 0); -/*** [SECTION 4000]: FIRST PARTY ISOLATION (FPI) +/*** [SECTION 4000]: FPI (FIRST PARTY ISOLATION) ** 1278037 - isolate indexedDB (FF51+) ** 1277803 - isolate favicons (FF52+) ** 1264562 - isolate OCSP cache (FF52+) @@ -1545,7 +1545,7 @@ user_pref("privacy.firstparty.isolate", true); user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // default: true // user_pref("privacy.firstparty.isolate.block_post_message", true); // (hidden pref) -/*** [SECTION 4500]: privacy.resistFingerprinting (RFP) +/*** [SECTION 4500]: RFP (RESIST FINGERPRINTING) This master switch will be used for a wide range of items, many of which will **override** existing prefs from FF55+, often providing a **better** solution @@ -1623,7 +1623,7 @@ user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // (hidde * [1] https://bugzilla.mozilla.org/1448423 ***/ user_pref("browser.startup.blankWindow", false); -/*** [SECTION 4600]: RFP (4500) ALTERNATIVES +/*** [SECTION 4600]: RFP ALTERNATIVES * IF you DO use RFP (see 4500) then you DO NOT need these redundant prefs. In fact, some even cause RFP to not behave as you would expect and alter your fingerprint. Make sure they are RESET in about:config as per your Firefox version @@ -1700,7 +1700,7 @@ user_pref("webgl.enable-debug-renderer-info", false); // * * * / // ***/ -/*** [SECTION 4700]: RFP (4500) ALTERNATIVES - NAVIGATOR / USER AGENT (UA) SPOOFING +/*** [SECTION 4700]: RFP ALTERNATIVES (NAVIGATOR / USER AGENT (UA) SPOOFING) This is FYI ONLY. These prefs are INSUFFICIENT(a) on their own, you need to use RFP (4500) or an extension, in which case they become POINTLESS. (a) Many of the components that make up your UA can be derived by other means.