Commit Graph

1108 Commits

Author SHA1 Message Date
Thorin-Oakenpants
462db2062c
2030: remove setup tag
If Firefox see fit to set this as 1 by now, then breakage is probably rare, and I'm not encouraging users to reduce security/privacy etc from default
2019-03-17 22:43:27 +00:00
earthlng
d9e24e5095 Update user.js (#667) 2019-03-18 07:07:15 +13:00
Thorin-Oakenpants
b1aa1f5619
2030: default change 2019-03-16 22:51:58 +00:00
Thorin-Oakenpants
a349662f69
66 deprecated prefs 2019-03-16 22:44:24 +00:00
Thorin-Oakenpants
28a7226235
4510: clarify this is the chrome 2019-03-16 22:36:31 +00:00
Thorin-Oakenpants
97f08ad3cd
4504: RFP letterboxing, closes #659 2019-03-16 22:34:45 +00:00
Thorin-Oakenpants
68584a3397
some 2505+RFP clarity, closes #661 2019-03-13 15:15:23 +00:00
Thorin-Oakenpants
8b4f45774a
4607+RFP clarity, closes #656 2019-03-13 14:46:33 +00:00
Thorin-Oakenpants
f8428dcc0a
a better test
- more metrics covered/displayed
- test page site is https
2019-03-07 14:55:03 +00:00
Thorin-Oakenpants
6d6cd5f410
2802 applies to 2803, closes #658 2019-03-05 03:26:39 +00:00
Thorin-Oakenpants
eae8434853
start 66 commits 2019-02-26 07:53:21 +00:00
Thorin-Oakenpants
2cff24f12e
65 final 2019-02-26 05:42:32 +00:00
Thorin-Oakenpants
60be8be5ec
UNC and extensions, closes #651 2019-02-17 03:51:44 +00:00
Thorin-Oakenpants
981dd83c15
clarify themes info, closes #648 2019-02-17 16:34:34 +13:00
Thorin-Oakenpants
5c703f0262
65-beta 2019-02-09 10:05:45 +00:00
Thorin-Oakenpants
de0ebbed21
0343: even MOAR clarification 2019-02-08 11:38:17 +00:00
Thorin-Oakenpants
e448015704
0343: clarify where
TAAR is extension recommendations in the "Add-ons Manager" (not sure how it's displayed)
CFR is extension recommendations as you browse the web, via a drop down panel
2019-02-07 16:55:04 +00:00
Thorin-Oakenpants
d3b1ed45ad
RFP: UA spoof is now 60+8's 2019-02-07 15:14:08 +00:00
earthlng
ed140425ea move shit around 2019-02-08 03:41:23 +13:00
Thorin-Oakenpants
3847f97f41
some more 65+ diffs, #610 2019-02-07 13:41:15 +00:00
Thorin-Oakenpants
d81e8ae583
i need a break 2019-02-07 11:11:16 +00:00
Thorin-Oakenpants
7a8381d894
typo 2019-02-07 11:01:31 +00:00
Thorin-Oakenpants
649699ad22
0609: disable connectivity service #610 2019-02-07 11:00:07 +00:00
Thorin-Oakenpants
1d5289dd94
RFP 67+ 2019-02-06 16:59:28 +00:00
Thorin-Oakenpants
74c8f294d6
0306: extension metadata, closes #615 2019-02-05 04:51:07 +00:00
Thorin-Oakenpants
a0508eccf6
capital letter after [note] 2019-02-04 13:41:56 +00:00
Thorin-Oakenpants
25acd9f63e
2703 again
- description needs to stay changed from just cookies since it also clears site data
- keep the info about n days out of it, it's just messy (ESR users should be on version 60)
- get the values correct (I mixed them up earlier)
- fixup [setting] path
- leave in one (of two) extra [notes] I previously added
2019-02-04 13:40:45 +00:00
Thorin-Oakenpants
74a08114a8
2701: refix setting 2019-02-04 13:28:29 +00:00
Thorin-Oakenpants
71ffc661b2
2701 again 2019-02-04 13:26:19 +00:00
Thorin-Oakenpants
e432a22693
0306: moar info #615
see https://github.com/ghacksuserjs/ghacks-user.js/issues/615#issuecomment-460243162 - checking for updates is not a trigger, having an update **and** applying it is
2019-02-04 13:08:41 +00:00
Thorin-Oakenpants
f06c78f897
update cookie settings info 2019-02-05 02:00:19 +13:00
Thorin-Oakenpants
847eb80877
0306 => inactive, closes #615
whatever we thought it may have done in the past, it doesn't do that now as far as we know. And it's not an issue since we allow extension update-CHECKs anyway.
2019-02-04 06:39:29 +00:00
Thorin-Oakenpants
ec0e58099f
pointer events -> RFP ALTS 2019-02-01 13:53:04 +00:00
Thorin-Oakenpants
e6eb473071
dom.storage_access.enabled
regardless of this pref setting: the permissions.sqlite file will still be abused to store a flag for this for every single site you connect to (as third party?) - fun.
2019-02-01 13:41:00 +00:00
Thorin-Oakenpants
f1b892bc1c
clean up "Firefox Data Collection & Use" (#627)
* clean up "Firefox Data Collection & Use"
  - telemetry prefs to 330's
  - Firefox Data Collection & Use prefs to 340's (but leave crash reports in 350s)
  - move `app.shield.optoutstudies.enabled` to 330's - this is an internal pref which controls if you get the system addon
  - make notes that `datareporting.healthreport.uploadEnabled` controls studies and ext recommendations
  - split crash reports better to reflex the UI setting
2019-02-02 00:57:22 +13:00
Thorin-Oakenpants
524b5f79dc
setting changes re cookies 2019-01-31 18:42:59 +00:00
Thorin-Oakenpants
24f2e1d982
disable storage access api
see: https://old.reddit.com/r/firefox/comments/alnn3f/storageaccessapi_permissions/effg5tp/
2019-01-31 16:16:59 +00:00
Thorin-Oakenpants
c6060e5645
storage access api 2019-01-31 16:03:39 +00:00
Thorin-Oakenpants
d0b8a08a4b
browser.urlbar.maxHistoricalSearchSuggestions
default 0 in ESR60 and FF60+
2019-01-30 16:16:12 +00:00
Thorin-Oakenpants
f047fe93c0
remove 0850f
`browser.urlbar.maxHistoricalSearchSuggestions` is default 0 is FF60 thru to FF66. It is also default 0 in ESR60.1 thru 60.5. (at least on Windows)

IDK if this has ever been used, maybe android, in which case it's probably useful?
2019-01-30 16:14:39 +00:00
Thorin-Oakenpants
6147fed61c
and the rest of the 0850's
The location bar dropdown cannot be disabled via prefs except with css, in which case the whole thing is hidden regardless of he above prefs. So there is no point in making any of them active. This is also in line with what we can achieve with relaxed and hardened tags / sticky issues - that is we can find a better balance, Shoulder surfers is a low risk, not even Tor Browser disables this stuff. People need to take responsibility and/or use common sense. Sure, we can leave em in for users to know about and enable if they want. End of story.

userChrome.css code is
```css
/* locationbar dropdown FF65+ */
#PopupAutoCompleteRichResult {display: none!important;}
```
2019-01-30 15:44:08 +00:00
Thorin-Oakenpants
54f79604da Make Firefox Great Again (#626)
* location bar changes
* if the dropdown is going to be used, then no point hiding search engines on the bottom line
2019-01-30 15:06:32 +00:00
Thorin-Oakenpants
2f351fa5ce
0702: http2 websockets
might as well add it: needs t be taken into consideration when looking at the whole http2 thing. Will be interesting to see what Tor Browser does with it in ESR68
2019-01-30 14:09:39 +00:00
Thorin-Oakenpants
5dc3ea66cd
browser.contentblocking.enabled
only existed for FF63+64, default true anyway
2019-01-30 12:38:07 +00:00
earthlng
d9a87b3ac4
FF65 removals (#624) 2019-01-30 12:27:53 +00:00
Thorin-Oakenpants
95b75a065d
up date info on what cookies control #622 2019-01-30 10:23:42 +00:00
claustromaniac
8c96432eb8 Update updater.sh (#618)
Closes #616 + #617
2019-01-25 14:28:00 +00:00
Thorin-Oakenpants
1c09ec36e3
0306: extra info, closes #615 2019-01-18 04:24:13 +00:00
Thorin-Oakenpants
f1e6d164f7
start 65 commits 2019-01-17 05:19:11 +00:00
Thorin-Oakenpants
3b90e6e592
end of v64 2019-01-17 05:11:29 +00:00