Commit Graph

735 Commits

Author SHA1 Message Date
Thorin-Oakenpants
31adbba774
5000s: disable CFR 2018-12-12 16:34:27 +00:00
Thorin-Oakenpants
879f0abf28
2201: more garbage 2018-12-12 13:21:24 +00:00
earthlng
3916e38681 taking out the garbage (#590) 2018-12-13 02:02:38 +13:00
Thorin-Oakenpants
51ac69874b
0105* remove // has setting 2018-12-12 11:58:48 +00:00
earthlng
2d956d04f3 move 1260 to 122x (#591)
* move 1260 to 122x

"disable or limit SHA-1 certificates" is about certs, not ciphers.
Because CERTS is 1st in the title I moved it to the 1st item there because it's arguably also the most important of the lot (and renumbered the rest)
We can also drop HSTS from the subgroup title because there's nothing HSTS left atm.
2018-12-13 00:52:49 +13:00
Thorin-Oakenpants
9d6bfb650c
disable Telemetry Coverage (#589) 2018-12-13 00:29:29 +13:00
Thorin-Oakenpants
ccdd4decf0
Pocket: 0510->0370
Pocket is no longer a System Add-on in FF64+
2018-12-12 08:25:25 +00:00
Thorin-Oakenpants
88b747ef36
0911: remove it, #585
it is default false in FF59+
2018-12-11 17:42:19 +00:00
Thorin-Oakenpants
c6ebe36165
1022: resume from crash=>inactive, closes #575 2018-12-11 17:28:21 +00:00
Thorin-Oakenpants
7684e83aba
0102 add SR info #575 2018-12-11 17:18:26 +00:00
Thorin-Oakenpants
26b874bed7
1020: remove max_windows #575 2018-12-11 16:43:11 +00:00
earthlng
61be5ae563 all Deprecations + new ADB extension prefs (#587) 2018-12-12 05:07:28 +13:00
Thorin-Oakenpants
ef1e61ebcd
start 64-alpha 2018-12-11 16:05:07 +00:00
Thorin-Oakenpants
205c48d9d3
final 63 release 2018-12-11 15:49:31 +00:00
earthlng
0e1b0a4b6e move 0370 to 0105b (#586) 2018-12-12 04:40:29 +13:00
Thorin-Oakenpants
778dc89bb6
2002 WebRTC tests #580
FYI, the https://www.privacytools.io/webrtc.html test in our wiki is 404, so I gave it a strikethru and added this one. This is also handy for 2001, but do we need to double up on it? We're only disabling WebRTC because of IP leaks, so I don't see the point in testing if WebRTC is disabled.
2018-12-11 00:40:03 +00:00
Thorin-Oakenpants
23733097a9
2302 FF version 2018-12-11 00:13:07 +00:00
earthlng
71a2d393f3 minor wording changes (#583) 2018-12-11 11:23:00 +13:00
Thorin-Oakenpants
74ebacc0dd
obey rules for [setting] tag location #578
all setting tags must be between `/* ... ***/`
2018-12-10 19:52:48 +00:00
Thorin-Oakenpants
45e3b3a0e0
2682: put correct version back
0a67cdec8b (comments)
2018-12-10 19:35:41 +00:00
Thorin-Oakenpants
5c85e61bb4 4000: remove old FPI notes (#581) 2018-12-10 18:36:07 +00:00
Thorin-Oakenpants
0a67cdec8b
#578 cleanups (#576)
- cleanup of tags placement, order consistency, and to use square brackets (allows usage elsewhere to not get tagged, eg 1402)
- other bits and bobs
2018-12-11 07:18:26 +13:00
Thorin-Oakenpants
b85668c2cd
make description & info & notes concurrent #574 2018-12-08 04:10:13 +13:00
Thorin-Oakenpants
786839ffc1
2701: fix split multi-[notes] 2018-12-06 08:16:01 +00:00
Thorin-Oakenpants
8313f2e01a
1020: fix description
Session Restore cannot be disabled in Normal mode, it is also used internally. FYI: PB Mode does not use Session Restore. The description is still not 100%, as it refers to what is restored, not what is kept in the recovery.jsonlz4 (at least for tabs)
2018-12-06 05:41:25 +00:00
Thorin-Oakenpants
0a87c99a0e
1203: ssl session ids are 24hrs 2018-12-05 20:58:07 +00:00
Thorin-Oakenpants
91fed43fc7
0703 atl-svc, better ref, #571 2018-12-05 20:36:20 +00:00
Thorin-Oakenpants
74f029566e
enforce DOMHighResTimeStamp API #491
flipped true in FF54: https://bugzilla.mozilla.org/show_bug.cgi?id=1026804 but unsure when the pref itself was introduced. note: other timing prefs were always in 2400's see 4602: [2411] disable resource/navigation timing / 4603: [2412] disable timing attacks
2018-12-04 10:34:02 +00:00
Thorin-Oakenpants
571be93ae0
proper case convention after tags
Can't believe I did this. Out of 32 `[setup*` and  9 `[warning]` tags (excluding the readme), I let one capital letter get past me, the bastard!
2018-12-04 10:26:44 +00:00
Thorin-Oakenpants
11b16c9c6d
move PB mode into STARTUP section #567 2018-12-04 08:51:19 +00:00
Thorin-Oakenpants
c4ec4dbc77
move 0000 to personal #567
it has zero to do with privacy etc, and in fact most users will only ever encounter it once (and check the box) when they first go to about:config, so it's not even useful as an override or a new profile IMO. This removes one of three numbers that don't have a section
2018-12-04 08:34:36 +00:00
Thorin-Oakenpants
67998eb4af
section naming convention consistency 2018-12-04 08:27:52 +00:00
Thorin-Oakenpants
834857b564
tag sections #567 2018-12-04 20:03:19 +13:00
Thorin-Oakenpants
25923f1acd
add index #567 2018-12-04 06:03:11 +00:00
Thorin-Oakenpants
85eaba2571
TAG! You're it! #545 2018-12-04 18:36:03 +13:00
earthlng
db56940422
typos 2018-11-29 14:10:08 +00:00
claustromaniac
b182946ae4
Tor-related warnings (#551)
Also reworded some stuff.
2018-11-24 05:19:24 +00:00
Thorin-Oakenpants
2ae3a3e4e1
1700s: enable containers, #438
AFAIK there's no technical reasons for containers to be disabled in FF63+
2018-11-21 23:53:00 +00:00
Thorin-Oakenpants
0ff610c056
there is no spoon 2018-11-20 18:14:23 +00:00
Thorin-Oakenpants
661a314e28
RFP: pointerEvent.pointerid 2018-11-20 17:36:04 +00:00
Thorin-Oakenpants
643cba63cf
Activity Stream is no longer a System Add-on 2018-11-19 03:00:40 +00:00
Thorin-Oakenpants
36b90cd5e6
1830: remove hiding the DRM UI
out of interest, it no longer requires a restart
2018-11-19 00:34:56 +00:00
Thorin-Oakenpants
299a03663f
0351: move *autoSubmit to deprecated
https://github.com/ghacksuserjs/ghacks-user.js/issues/302#issuecomment-359245047
2018-11-19 00:12:07 +00:00
Thorin-Oakenpants
13550d18a1
update [SETTING] info (#538) 2018-11-19 12:56:12 +13:00
Thorin-Oakenpants
c12eb0fdc6
0201b+2305 Permissions API info 2018-11-18 12:56:51 +00:00
Thorin-Oakenpants
acbf881b1f
saving the world bytes at a time 2018-11-15 15:47:21 +00:00
Thorin-Oakenpants
7351e561c4
1243: mixed OBJECT_SUBREQUESTS 2018-11-15 07:06:34 +00:00
Thorin-Oakenpants
4e42bad6a1
0201: default geo=> inactive, #533 2018-11-14 17:12:03 +00:00
Thorin-Oakenpants
b85e748b53
2204: FS API=>inactive, #533 2018-11-13 18:56:51 +00:00
Thorin-Oakenpants
0cc4007eda
1202: tls.min => inactive #533
TLS 1.0 and 1.1 are still secure. Sure, later versions are more secure, but 98% of the web is already upgraded - less than 2% of sites use < v1.2. So it's not very likely you would come across a site that requires it, but if you did, what's the point in breaking it. Mozilla and Chrome already have plans to deprecate TLS 1.0 & 1.1, and force that last 2% of sites.

TLS settings can be FP'ed without JS. By sticking with the defaults, I do not see any security issues, but an increase in potential anti-FPing. TBH, the chances of either (i.e being FP'ed with TLS as a entropy point, or being compromised due to TLS<1.2) are slim to non anyway.

Any arguments, please see @earthlng
2018-11-13 16:19:23 +00:00