Commit Graph

1013 Commits

Author SHA1 Message Date
Thorin-Oakenpants
59930d4697
0402, remove redundant pref, see #709 2019-04-29 05:29:53 +00:00
Thorin-Oakenpants
579aa3aa9c
0402: tidy up, see #710 2019-04-29 05:27:16 +00:00
Thorin-Oakenpants
ed687fc7ca
1820: update -> inactive, see #709
At best disabling the background update of gmp means not only an extra item for those who wish to use it (e.g widevine, netflix) to have to deal with, but also a time delay in getting the actual download. At worst, it could cause users to use an old dll (security risk).

I will leave it in, for now, but am seriously considering removing it, so don't cry if I do.
2019-04-29 05:06:43 +00:00
Thorin-Oakenpants
8ffbd81813
remove SB & TP see #710
- SB: disabling it nothing to enhance privacy/security etc if changed from default
- SB: I will not provide the prefs or encourage users to disable these, especially given that there is a UI
- SB: the urls are redundant
- SB: note: the binary checks stays
- TP section is out of date (or soon will be), I'm not maintaining it, it has a UI and is best handled there
2019-04-29 04:30:59 +00:00
Thorin-Oakenpants
4119be3a86
typo 2019-04-28 13:10:04 +00:00
Thorin-Oakenpants
8d874401fa
pre FF61 deprecated -> archive
This is all archived in the sticky at the end of the first post
2019-04-28 12:56:27 +00:00
Thorin-Oakenpants
8a86097997
1820s: GMP: remove three prefs, see #709 2019-04-28 11:10:15 +00:00
Thorin-Oakenpants
7a9763d129
2740: add setup tag etc, closes #706 2019-04-28 04:30:38 +00:00
Thorin-Oakenpants
a39516ff0e
case consistency when using service worker* 2019-04-28 04:02:19 +00:00
Thorin-Oakenpants
3e5e1bfdd2
2740 -> inactive, see #706 2019-04-28 03:48:55 +00:00
Thorin-Oakenpants
7b667db766
2304 + 2305 -> inactive, see #706 2019-04-28 03:37:07 +00:00
Thorin-Oakenpants
6f8d0263df
0303 + 0304 + 0305: remove, closes #708 2019-04-28 02:55:45 +00:00
Thorin-Oakenpants
25b8b404fb
2305+2306: musical chairs #706 2019-04-27 19:02:14 +00:00
Thorin-Oakenpants
528d0de6b4
2305: permission also applies to push 2019-04-27 17:39:53 +00:00
Thorin-Oakenpants
c9c1671e4a
2010+2012: simplify WebGL, closes #699 2019-04-27 16:18:48 +00:00
Thorin-Oakenpants
8765231de0
0801: keyword.enabled, closes #702
- explain pitfalls, add keyword tip, add setup tag
- given the searchbar is hidden by default in new FF installs, a lot of people could find this incredibly annoying (not being able to hit enter), including users who have changed their search engine - hence the setup tag
2019-04-27 16:12:25 +00:00
Thorin-Oakenpants
053808ba97
1001: remove dead wood
- these are not needed, you can view your cache in about:cache, or look at your `profile/cache2` folder (at least for portable Firefox), the remaining pref is enough to achieve the desired result
- browser.cache.disk.smart_size.first_run is set internally (for me it got automatically reset to modified false)
- the other two prefs are just more things for users to have deal with if they want to use disk cache
2019-04-27 14:03:02 +00:00
Thorin-Oakenpants
2d0182ce6e
1001: add setup tag
- remove tag from section header (chrome)
- add tag to pref (perf)
- mention that we clear on close
2019-04-27 13:53:02 +00:00
Thorin-Oakenpants
98f65da430
remove dead setup tags 2019-04-27 07:33:30 +00:00
Thorin-Oakenpants
6a0c44d0a4
2517: should be warning, not setup
If it's inactive then it's a warning. We can still go through the js and add setup-harden tags for a few inactive items, which I will do
2019-04-27 07:03:28 +00:00
Thorin-Oakenpants
882d25f725
2610: SVG: should be warning, not setup 2019-04-27 07:00:40 +00:00
Thorin-Oakenpants
c3210d1be9
1241: insecure passive: add setup tag 2019-04-27 06:55:58 +00:00
Thorin-Oakenpants
d4f7590c83
2212: add setup tag
- doesn't need any more than that. users can fiddle with it to find what works for them: I'm sure this breaks a lot of website "features"
2019-04-24 08:39:11 +00:00
Thorin-Oakenpants
d6ccf7ba64
0860 form history: add setup tag / warning
- Used setup-web since it relates to actual web pages, even though it doesn't break them
- Added the tag because it's an item that is likely to get attention / troubleshooting
- Added a warning tag to make the risk more apparent.
- Slight edit to the 2803 references
2019-04-24 08:12:31 +00:00
Thorin-Oakenpants
0922215670
1840 openh264 -> inactive
WebRTC is already disabled
2019-04-24 07:46:47 +00:00
Thorin-Oakenpants
f849e1c602
WOFF2 -> inactive 2019-04-24 06:39:59 +00:00
Thorin-Oakenpants
986c900193
RFP tidy up 2019-04-23 05:50:35 +00:00
Thorin-Oakenpants
b8367959da
mathml: a better test 2019-04-23 05:33:06 +00:00
Thorin-Oakenpants
b05cfc32de
HTTP2 tweak 2019-04-23 04:04:22 +00:00
Thorin-Oakenpants
358ddfdfce
pdfjs - add setup tag 2019-04-22 15:38:26 +00:00
Thorin-Oakenpants
87959d621c
2010: remove pdf webgl
it's default false, and I want to simplify webgl 2010+2012
2019-04-22 15:20:16 +00:00
Thorin-Oakenpants
4989928c1e
2026: remove (canvas.capture*)
Disabled back when first added as a stop gap measure, never checked on since. TB has this at true, so I think we can get rid of it
2019-04-22 14:34:07 +00:00
Thorin-Oakenpants
c2775a3441
0860 form history info, closes #691 2019-04-22 14:15:58 +00:00
Thorin-Oakenpants
50d31a7aa2
2701 cookies add setup-web tag 2019-04-22 13:31:15 +00:00
Thorin-Oakenpants
9fbe3080c5
2651: add setup-chrome tag 2019-04-22 13:28:07 +00:00
Thorin-Oakenpants
8a98cd1890
tidying up 2019-04-22 13:12:47 +00:00
Thorin-Oakenpants
2d62b9f729
2654 (open with) -> inactive 2019-04-22 12:23:39 +00:00
Thorin-Oakenpants
bb7f8df647
2650 -> inactive 2019-04-22 12:16:33 +00:00
Thorin-Oakenpants
373602f0f0
mathml -> inactive 2019-04-22 12:12:30 +00:00
Thorin-Oakenpants
e56665ecd1
HWA -> inactive 2019-04-22 12:05:21 +00:00
Thorin-Oakenpants
59d056de27
document fonts -> inactive 2019-04-22 12:00:46 +00:00
Thorin-Oakenpants
d41372a7f0
2421 should be a warning
it's not setup tag, because any change (it is inactive) does not help performance, in fact the opposite
2019-04-22 11:50:01 +00:00
Thorin-Oakenpants
f62f781645
HTTP2 -> inactive 2019-04-22 11:41:34 +00:00
Thorin-Oakenpants
408d1d0e26
FPI 68+ change 2019-04-19 05:54:57 +00:00
Thorin-Oakenpants
d491cf1e89
readme changes 2019-04-19 02:11:21 +00:00
Thorin-Oakenpants
ca0f2a5a88
0302b-> inactive: ext auto-updates closes #690 2019-04-19 01:39:07 +00:00
Thorin-Oakenpants
fd10c35049
0606 some default info 2019-04-17 03:31:27 +00:00
Thorin-Oakenpants
6ed3581cb0
5000s: CRF 67+ 2019-04-15 16:31:17 +00:00
Thorin-Oakenpants
c2034617f0
2429 default true 67+ 2019-04-15 14:59:23 +00:00
Thorin-Oakenpants
6231d6ebed
5000s add new about:config warning pref 2019-04-15 14:54:55 +00:00
Thorin-Oakenpants
411805b05c
2618 no longer hidden 67+ 2019-04-15 14:49:22 +00:00
Thorin-Oakenpants
8c12f4bb14
1840 no longer hidden 67+ 2019-04-15 14:46:39 +00:00
Thorin-Oakenpants
e3349d0f07
2212 defaults [67+ change] 2019-04-15 14:17:52 +00:00
Thorin-Oakenpants
92082621d6
start 67 commits 2019-04-15 14:15:54 +00:00
Thorin-Oakenpants
54f86f4be6
Update user.js 2019-04-15 12:55:15 +00:00
Thorin-Oakenpants
585415b534
RFP: prefers-color-scheme 67+ 2019-04-11 02:02:26 +00:00
Thorin-Oakenpants
99586c4a3b
enabled scopes breakage info, closes #674 2019-04-08 14:24:41 +00:00
earthlng
8419b4d71b autoplay option "Prompt" was removed in FF66 (#686)
* autoplay option "Prompt" was removed in FF66
source: https://hg.mozilla.org/integration/autoland/rev/2e48b6769911
2019-04-09 01:44:11 +12:00
Thorin-Oakenpants
79e316a26f
2618: better info, #682 2019-04-03 10:50:59 +00:00
Thorin-Oakenpants
26a70f3cd7
2618: setup-chrome tag, closes #682 2019-04-03 10:43:44 +00:00
Thorin-Oakenpants
bee47f33cd
66-beta 2019-03-27 04:35:42 +00:00
earthlng
2fcec590b4
Update user.js (#676)
- to avoid confusion with the setting tag, split the prefs into separate numbers, thus shove 2031->2031, reuse 2031
- remove the default value notation as Mozilla will roll out default change gradually to users
2019-03-26 19:05:55 +00:00
Thorin-Oakenpants
3c4b312cc7
2030: default didn't change
not putting the setup-web tag back in, as users now have site exceptions
2019-03-19 19:58:15 +00:00
Thorin-Oakenpants
0354895a2e
2030: add [setting] for autoplay 2019-03-19 09:00:39 +00:00
Thorin-Oakenpants
462db2062c
2030: remove setup tag
If Firefox see fit to set this as 1 by now, then breakage is probably rare, and I'm not encouraging users to reduce security/privacy etc from default
2019-03-17 22:43:27 +00:00
earthlng
d9e24e5095 Update user.js (#667) 2019-03-18 07:07:15 +13:00
Thorin-Oakenpants
b1aa1f5619
2030: default change 2019-03-16 22:51:58 +00:00
Thorin-Oakenpants
a349662f69
66 deprecated prefs 2019-03-16 22:44:24 +00:00
Thorin-Oakenpants
28a7226235
4510: clarify this is the chrome 2019-03-16 22:36:31 +00:00
Thorin-Oakenpants
97f08ad3cd
4504: RFP letterboxing, closes #659 2019-03-16 22:34:45 +00:00
Thorin-Oakenpants
68584a3397
some 2505+RFP clarity, closes #661 2019-03-13 15:15:23 +00:00
Thorin-Oakenpants
8b4f45774a
4607+RFP clarity, closes #656 2019-03-13 14:46:33 +00:00
Thorin-Oakenpants
f8428dcc0a
a better test
- more metrics covered/displayed
- test page site is https
2019-03-07 14:55:03 +00:00
Thorin-Oakenpants
6d6cd5f410
2802 applies to 2803, closes #658 2019-03-05 03:26:39 +00:00
Thorin-Oakenpants
eae8434853
start 66 commits 2019-02-26 07:53:21 +00:00
Thorin-Oakenpants
2cff24f12e
65 final 2019-02-26 05:42:32 +00:00
Thorin-Oakenpants
60be8be5ec
UNC and extensions, closes #651 2019-02-17 03:51:44 +00:00
Thorin-Oakenpants
981dd83c15
clarify themes info, closes #648 2019-02-17 16:34:34 +13:00
Thorin-Oakenpants
5c703f0262
65-beta 2019-02-09 10:05:45 +00:00
Thorin-Oakenpants
de0ebbed21
0343: even MOAR clarification 2019-02-08 11:38:17 +00:00
Thorin-Oakenpants
e448015704
0343: clarify where
TAAR is extension recommendations in the "Add-ons Manager" (not sure how it's displayed)
CFR is extension recommendations as you browse the web, via a drop down panel
2019-02-07 16:55:04 +00:00
Thorin-Oakenpants
d3b1ed45ad
RFP: UA spoof is now 60+8's 2019-02-07 15:14:08 +00:00
earthlng
ed140425ea move shit around 2019-02-08 03:41:23 +13:00
Thorin-Oakenpants
3847f97f41
some more 65+ diffs, #610 2019-02-07 13:41:15 +00:00
Thorin-Oakenpants
d81e8ae583
i need a break 2019-02-07 11:11:16 +00:00
Thorin-Oakenpants
7a8381d894
typo 2019-02-07 11:01:31 +00:00
Thorin-Oakenpants
649699ad22
0609: disable connectivity service #610 2019-02-07 11:00:07 +00:00
Thorin-Oakenpants
1d5289dd94
RFP 67+ 2019-02-06 16:59:28 +00:00
Thorin-Oakenpants
74c8f294d6
0306: extension metadata, closes #615 2019-02-05 04:51:07 +00:00
Thorin-Oakenpants
a0508eccf6
capital letter after [note] 2019-02-04 13:41:56 +00:00
Thorin-Oakenpants
25acd9f63e
2703 again
- description needs to stay changed from just cookies since it also clears site data
- keep the info about n days out of it, it's just messy (ESR users should be on version 60)
- get the values correct (I mixed them up earlier)
- fixup [setting] path
- leave in one (of two) extra [notes] I previously added
2019-02-04 13:40:45 +00:00
Thorin-Oakenpants
74a08114a8
2701: refix setting 2019-02-04 13:28:29 +00:00
Thorin-Oakenpants
71ffc661b2
2701 again 2019-02-04 13:26:19 +00:00
Thorin-Oakenpants
e432a22693
0306: moar info #615
see https://github.com/ghacksuserjs/ghacks-user.js/issues/615#issuecomment-460243162 - checking for updates is not a trigger, having an update **and** applying it is
2019-02-04 13:08:41 +00:00
Thorin-Oakenpants
f06c78f897
update cookie settings info 2019-02-05 02:00:19 +13:00
Thorin-Oakenpants
847eb80877
0306 => inactive, closes #615
whatever we thought it may have done in the past, it doesn't do that now as far as we know. And it's not an issue since we allow extension update-CHECKs anyway.
2019-02-04 06:39:29 +00:00
Thorin-Oakenpants
ec0e58099f
pointer events -> RFP ALTS 2019-02-01 13:53:04 +00:00
Thorin-Oakenpants
e6eb473071
dom.storage_access.enabled
regardless of this pref setting: the permissions.sqlite file will still be abused to store a flag for this for every single site you connect to (as third party?) - fun.
2019-02-01 13:41:00 +00:00
Thorin-Oakenpants
f1b892bc1c
clean up "Firefox Data Collection & Use" (#627)
* clean up "Firefox Data Collection & Use"
  - telemetry prefs to 330's
  - Firefox Data Collection & Use prefs to 340's (but leave crash reports in 350s)
  - move `app.shield.optoutstudies.enabled` to 330's - this is an internal pref which controls if you get the system addon
  - make notes that `datareporting.healthreport.uploadEnabled` controls studies and ext recommendations
  - split crash reports better to reflex the UI setting
2019-02-02 00:57:22 +13:00
Thorin-Oakenpants
524b5f79dc
setting changes re cookies 2019-01-31 18:42:59 +00:00
Thorin-Oakenpants
24f2e1d982
disable storage access api
see: https://old.reddit.com/r/firefox/comments/alnn3f/storageaccessapi_permissions/effg5tp/
2019-01-31 16:16:59 +00:00
Thorin-Oakenpants
c6060e5645
storage access api 2019-01-31 16:03:39 +00:00
Thorin-Oakenpants
f047fe93c0
remove 0850f
`browser.urlbar.maxHistoricalSearchSuggestions` is default 0 is FF60 thru to FF66. It is also default 0 in ESR60.1 thru 60.5. (at least on Windows)

IDK if this has ever been used, maybe android, in which case it's probably useful?
2019-01-30 16:14:39 +00:00
Thorin-Oakenpants
6147fed61c
and the rest of the 0850's
The location bar dropdown cannot be disabled via prefs except with css, in which case the whole thing is hidden regardless of he above prefs. So there is no point in making any of them active. This is also in line with what we can achieve with relaxed and hardened tags / sticky issues - that is we can find a better balance, Shoulder surfers is a low risk, not even Tor Browser disables this stuff. People need to take responsibility and/or use common sense. Sure, we can leave em in for users to know about and enable if they want. End of story.

userChrome.css code is
```css
/* locationbar dropdown FF65+ */
#PopupAutoCompleteRichResult {display: none!important;}
```
2019-01-30 15:44:08 +00:00
Thorin-Oakenpants
54f79604da Make Firefox Great Again (#626)
* location bar changes
* if the dropdown is going to be used, then no point hiding search engines on the bottom line
2019-01-30 15:06:32 +00:00
Thorin-Oakenpants
2f351fa5ce
0702: http2 websockets
might as well add it: needs t be taken into consideration when looking at the whole http2 thing. Will be interesting to see what Tor Browser does with it in ESR68
2019-01-30 14:09:39 +00:00
earthlng
d9a87b3ac4
FF65 removals (#624) 2019-01-30 12:27:53 +00:00
Thorin-Oakenpants
95b75a065d
up date info on what cookies control #622 2019-01-30 10:23:42 +00:00
Thorin-Oakenpants
1c09ec36e3
0306: extra info, closes #615 2019-01-18 04:24:13 +00:00
Thorin-Oakenpants
f1e6d164f7
start 65 commits 2019-01-17 05:19:11 +00:00
Thorin-Oakenpants
3b90e6e592
end of v64 2019-01-17 05:11:29 +00:00
Thorin-Oakenpants
45bd5ccc02
PB Mode: ref added 2019-01-16 02:07:06 +00:00
Thorin-Oakenpants
7bf5790f2b
RFP: FF66 changes to UA HTTP Headers 2019-01-11 05:14:59 +00:00
Thorin-Oakenpants
075d6fe6e4
2615: s/cut keys: bug fix in 66+ 2019-01-11 05:09:14 +00:00
Thorin-Oakenpants
4604cf0d4e
references to other prefs s/be explicit 2018-12-21 11:02:40 +00:00
Thorin-Oakenpants
ac4e764c37
http2, altsvc, ssl session ids vs FPI vs TB #571 2018-12-18 15:54:57 +00:00
Thorin-Oakenpants
5bd5f6b28e
0912: HTTP Auth sub-resources #585 (#602) 2018-12-18 01:41:37 +13:00
earthlng
55c2cacbce 0335: toolkit.telemetry.coverage.opt-out (#600) 2018-12-17 22:43:45 +13:00
Thorin-Oakenpants
4badc42879
0105b: kill snippets endpoint #528
it's too hard to follow AS changes, and work out if disabling showing items (basic toggling of show/hide sections etc) actually stops downloading a localized local copy etc. For items we actually want to block, let the endpoint slaughter begin.
2018-12-17 09:36:26 +00:00
Thorin-Oakenpants
da80e39064
0105s: description s/be self explanatory #578
when filtered and 0105a is not shown, AS doesn't mean anything
2018-12-16 17:37:42 +00:00
Thorin-Oakenpants
c1d6d81528
add PERF tags to wasm, asm.js, closes #599 2018-12-16 14:10:32 +00:00
Thorin-Oakenpants
d5ece0f6f4 1700s: revamp Containers header #585 (#596) 2018-12-14 07:05:43 +00:00
Thorin-Oakenpants
f6ea20a8b0
0335: Telemetry Coverage endpoint
let's just coverage-our-ass on this one

While I don't mind telemetry (development needs meaningful feedback to better the product), and I trust the data is not PII, and/or anonymized into buckets etc (you can check this you know), and I understand this one needs to be outside the Telemetry pref in order to gather the one-time ping ... and I trust Mozilla's motives ... I'm starting to get a little annoyed at the non-stop incessant increasing telemetry bullshittery and ass-fuckery around sending data home, and the lengths some Mozilla devs will go to, to hide this info (hidden prefs, access denied tickets to hide discussion of what should be public, and even **not even adhering to their own documentation**).

I will also be killing as many Activity Stream endpoints as well - as long as they are in line with our js - pocket, snippets, onboarding etc. And I will add those from personal as inactive for end-users - eg cfr
2018-12-13 17:28:16 +00:00
Thorin-Oakenpants
645492e82f
grammar, case, etc, closes #594
thanks @Just-me-ghacks
2018-12-14 04:49:50 +13:00
earthlng
15c68dc344 disable System Add-on updates (#595)
remember the new Coverage Telemetry shit? with a **hidden** opt-out pref? guess what, they are already collecting for 3 months ...

https://bugzilla.mozilla.org/show_bug.cgi?id=1487578 - **3 months ago**: "I see data coming in that looks reasonable"

guess what else ...

"It has also replaced the previous version that was there (from bug 1480194)" and oh, surprise surprise, 1480194 is ACCESS DENIED!

they're not just using private tickets to hide security critical information from potential hackers and blackhats, no they also use it to hide shady AF things. Things that they fully know are shady as fuck and that they absolutely know a lot of people would not like. There's simply no other reason why they'd do that

but wait, that's not all. If you think an opt-out pref that 99% of people wouldn't know about even if it showed up in about:config BUT ALSO HAPPENS TO BE HIDDEN is kind of questionable, well ... the system addon that they use for this shit apparently looked or still looks for `toolkit.telemetry.coverage.opt-out` [1] instead of `toolkit.coverage.opt-out` as their documentation [2] claims

[1] https://github.com/mozilla/one-off-system-add-ons/pull/131/files#diff-6e0cbf76986d04383ccb32a29ef27a7aR25
[2] https://hg.mozilla.org/mozilla-central/file/tip/toolkit/components/telemetry/docs/data/coverage-ping.rst#l32

It's time to opt out of all that shit for good. Disable system addon updates and kill it at the root

> In FF61 and lower, you will not get any System Add-on updates except when you update Firefox

on its own that's not true. You will get SA updates unless you disable app update checks + auto install. Let's just remove that as well.
2018-12-14 03:21:57 +13:00
Thorin-Oakenpants
04b797f1aa
0209: remove trailing space
@Just-me-ghacks 💋
2018-12-13 11:14:44 +00:00
Thorin-Oakenpants
e60abd6c44
64-beta 2018-12-12 17:17:33 +00:00
Thorin-Oakenpants
d55b8176ad
dyslexia and/or dementia 2018-12-12 16:52:12 +00:00
Thorin-Oakenpants
31adbba774
5000s: disable CFR 2018-12-12 16:34:27 +00:00
Thorin-Oakenpants
879f0abf28
2201: more garbage 2018-12-12 13:21:24 +00:00
earthlng
3916e38681 taking out the garbage (#590) 2018-12-13 02:02:38 +13:00
Thorin-Oakenpants
51ac69874b
0105* remove // has setting 2018-12-12 11:58:48 +00:00
earthlng
2d956d04f3 move 1260 to 122x (#591)
* move 1260 to 122x

"disable or limit SHA-1 certificates" is about certs, not ciphers.
Because CERTS is 1st in the title I moved it to the 1st item there because it's arguably also the most important of the lot (and renumbered the rest)
We can also drop HSTS from the subgroup title because there's nothing HSTS left atm.
2018-12-13 00:52:49 +13:00
Thorin-Oakenpants
9d6bfb650c
disable Telemetry Coverage (#589) 2018-12-13 00:29:29 +13:00
Thorin-Oakenpants
ccdd4decf0
Pocket: 0510->0370
Pocket is no longer a System Add-on in FF64+
2018-12-12 08:25:25 +00:00
Thorin-Oakenpants
88b747ef36
0911: remove it, #585
it is default false in FF59+
2018-12-11 17:42:19 +00:00
Thorin-Oakenpants
c6ebe36165
1022: resume from crash=>inactive, closes #575 2018-12-11 17:28:21 +00:00
Thorin-Oakenpants
7684e83aba
0102 add SR info #575 2018-12-11 17:18:26 +00:00
Thorin-Oakenpants
26b874bed7
1020: remove max_windows #575 2018-12-11 16:43:11 +00:00
earthlng
61be5ae563 all Deprecations + new ADB extension prefs (#587) 2018-12-12 05:07:28 +13:00
Thorin-Oakenpants
ef1e61ebcd
start 64-alpha 2018-12-11 16:05:07 +00:00
Thorin-Oakenpants
205c48d9d3
final 63 release 2018-12-11 15:49:31 +00:00
earthlng
0e1b0a4b6e move 0370 to 0105b (#586) 2018-12-12 04:40:29 +13:00
Thorin-Oakenpants
778dc89bb6
2002 WebRTC tests #580
FYI, the https://www.privacytools.io/webrtc.html test in our wiki is 404, so I gave it a strikethru and added this one. This is also handy for 2001, but do we need to double up on it? We're only disabling WebRTC because of IP leaks, so I don't see the point in testing if WebRTC is disabled.
2018-12-11 00:40:03 +00:00
Thorin-Oakenpants
23733097a9
2302 FF version 2018-12-11 00:13:07 +00:00
earthlng
71a2d393f3 minor wording changes (#583) 2018-12-11 11:23:00 +13:00
Thorin-Oakenpants
74ebacc0dd
obey rules for [setting] tag location #578
all setting tags must be between `/* ... ***/`
2018-12-10 19:52:48 +00:00
Thorin-Oakenpants
45e3b3a0e0
2682: put correct version back
0a67cdec8b (comments)
2018-12-10 19:35:41 +00:00
Thorin-Oakenpants
5c85e61bb4 4000: remove old FPI notes (#581) 2018-12-10 18:36:07 +00:00
Thorin-Oakenpants
0a67cdec8b
#578 cleanups (#576)
- cleanup of tags placement, order consistency, and to use square brackets (allows usage elsewhere to not get tagged, eg 1402)
- other bits and bobs
2018-12-11 07:18:26 +13:00
Thorin-Oakenpants
b85668c2cd
make description & info & notes concurrent #574 2018-12-08 04:10:13 +13:00
Thorin-Oakenpants
786839ffc1
2701: fix split multi-[notes] 2018-12-06 08:16:01 +00:00
Thorin-Oakenpants
8313f2e01a
1020: fix description
Session Restore cannot be disabled in Normal mode, it is also used internally. FYI: PB Mode does not use Session Restore. The description is still not 100%, as it refers to what is restored, not what is kept in the recovery.jsonlz4 (at least for tabs)
2018-12-06 05:41:25 +00:00
Thorin-Oakenpants
0a87c99a0e
1203: ssl session ids are 24hrs 2018-12-05 20:58:07 +00:00
Thorin-Oakenpants
91fed43fc7
0703 atl-svc, better ref, #571 2018-12-05 20:36:20 +00:00
Thorin-Oakenpants
74f029566e
enforce DOMHighResTimeStamp API #491
flipped true in FF54: https://bugzilla.mozilla.org/show_bug.cgi?id=1026804 but unsure when the pref itself was introduced. note: other timing prefs were always in 2400's see 4602: [2411] disable resource/navigation timing / 4603: [2412] disable timing attacks
2018-12-04 10:34:02 +00:00
Thorin-Oakenpants
571be93ae0
proper case convention after tags
Can't believe I did this. Out of 32 `[setup*` and  9 `[warning]` tags (excluding the readme), I let one capital letter get past me, the bastard!
2018-12-04 10:26:44 +00:00
Thorin-Oakenpants
11b16c9c6d
move PB mode into STARTUP section #567 2018-12-04 08:51:19 +00:00
Thorin-Oakenpants
c4ec4dbc77
move 0000 to personal #567
it has zero to do with privacy etc, and in fact most users will only ever encounter it once (and check the box) when they first go to about:config, so it's not even useful as an override or a new profile IMO. This removes one of three numbers that don't have a section
2018-12-04 08:34:36 +00:00
Thorin-Oakenpants
67998eb4af
section naming convention consistency 2018-12-04 08:27:52 +00:00
Thorin-Oakenpants
834857b564
tag sections #567 2018-12-04 20:03:19 +13:00
Thorin-Oakenpants
25923f1acd
add index #567 2018-12-04 06:03:11 +00:00
Thorin-Oakenpants
85eaba2571
TAG! You're it! #545 2018-12-04 18:36:03 +13:00
earthlng
db56940422
typos 2018-11-29 14:10:08 +00:00
claustromaniac
b182946ae4
Tor-related warnings (#551)
Also reworded some stuff.
2018-11-24 05:19:24 +00:00
Thorin-Oakenpants
2ae3a3e4e1
1700s: enable containers, #438
AFAIK there's no technical reasons for containers to be disabled in FF63+
2018-11-21 23:53:00 +00:00
Thorin-Oakenpants
0ff610c056
there is no spoon 2018-11-20 18:14:23 +00:00
Thorin-Oakenpants
661a314e28
RFP: pointerEvent.pointerid 2018-11-20 17:36:04 +00:00
Thorin-Oakenpants
643cba63cf
Activity Stream is no longer a System Add-on 2018-11-19 03:00:40 +00:00
Thorin-Oakenpants
36b90cd5e6
1830: remove hiding the DRM UI
out of interest, it no longer requires a restart
2018-11-19 00:34:56 +00:00
Thorin-Oakenpants
299a03663f
0351: move *autoSubmit to deprecated
https://github.com/ghacksuserjs/ghacks-user.js/issues/302#issuecomment-359245047
2018-11-19 00:12:07 +00:00
Thorin-Oakenpants
13550d18a1
update [SETTING] info (#538) 2018-11-19 12:56:12 +13:00
Thorin-Oakenpants
c12eb0fdc6
0201b+2305 Permissions API info 2018-11-18 12:56:51 +00:00
Thorin-Oakenpants
acbf881b1f
saving the world bytes at a time 2018-11-15 15:47:21 +00:00
Thorin-Oakenpants
7351e561c4
1243: mixed OBJECT_SUBREQUESTS 2018-11-15 07:06:34 +00:00
Thorin-Oakenpants
4e42bad6a1
0201: default geo=> inactive, #533 2018-11-14 17:12:03 +00:00
Thorin-Oakenpants
b85e748b53
2204: FS API=>inactive, #533 2018-11-13 18:56:51 +00:00
Thorin-Oakenpants
0cc4007eda
1202: tls.min => inactive #533
TLS 1.0 and 1.1 are still secure. Sure, later versions are more secure, but 98% of the web is already upgraded - less than 2% of sites use < v1.2. So it's not very likely you would come across a site that requires it, but if you did, what's the point in breaking it. Mozilla and Chrome already have plans to deprecate TLS 1.0 & 1.1, and force that last 2% of sites.

TLS settings can be FP'ed without JS. By sticking with the defaults, I do not see any security issues, but an increase in potential anti-FPing. TBH, the chances of either (i.e being FP'ed with TLS as a entropy point, or being compromised due to TLS<1.2) are slim to non anyway.

Any arguments, please see @earthlng
2018-11-13 16:19:23 +00:00
Thorin-Oakenpants
3003f2dd85
make up yer mind
stick it back in for two releases - pref gets removed in FF65 anyway
2018-11-13 15:30:39 +00:00
Thorin-Oakenpants
ce48306a0d
finalize beta 2018-11-13 15:12:20 +00:00
Thorin-Oakenpants
3423d39fa9
2517 Media Capabilities => inactive
see f214e4bc4e (comments)
2018-11-13 15:11:01 +00:00
Thorin-Oakenpants
4834472107
remove 0426 content blocking 2018-11-13 15:01:35 +00:00
Thorin-Oakenpants
f214e4bc4e
2517: disable Media Capabilities API (for now) 2018-11-13 08:42:49 +00:00
Thorin-Oakenpants
8fd6061bcc
0426: enforce CB 2018-11-13 08:19:19 +00:00
Thorin-Oakenpants
92acb6b2f7
saving the world, one byte at a time 2018-11-12 00:06:19 +00:00
earthlng
b6b9733afa remove old information (#531)
Pants said "We do not need to keep anything for ESR users. ESR users are on v60, and we have an archived 60 for them."
This isn't even affecting ESR60 but only older versions.
2018-11-08 04:14:32 +13:00
claustromaniac
89bc0bee16 scheme+host+path+port -> scheme+host+port+path (#530) 2018-11-04 14:44:20 +00:00
earthlng
f8fc465d0a 2701: add new descriptions and new value (#527) 2018-10-30 04:40:24 +13:00
earthlng
58fa4e9b6d
0514: disable snippets, top stories, telemetry 2018-10-29 14:26:49 +00:00
Thorin-Oakenpants
afee555045
FPI: isolate postMessage... 2018-10-28 16:46:22 +00:00
Thorin-Oakenpants
e8bfa93696
0410s: SBv4 & cookies, #520 2018-10-25 00:13:50 +00:00
Thorin-Oakenpants
1abe1fd4df
4702: buildID cleanup, closes 518 2018-10-24 10:15:37 +00:00
Thorin-Oakenpants
24f7847f73
2703: make value 3 info clearer 2018-10-23 16:13:23 +00:00
earthlng
56206f77ba removed, renamed or hidden in v63.0 (#523)
* removed, renamed or hidden in v63.0

- 0301a - do you want to add the `[NOTE] Firefox currently checks every 12 hrs  ...` to `0302a` ? The problem is it also checks for updates every time you open/reload about:preferences and in Menu>Help>About Firefox regardless of when the last check was.

- 0513 - removed because follow-on-search is no longer a deletable system addon

- 2703 - do we just remove `3=for n days` or add a [NOTE] that value 3 was remove in FF63 or something?

- `browser.ctrlTab.recentlyUsedOrder` replaces `browser.ctrlTab.previews` but it now defaults to true. No need to list the new one under 5000 IMO

* Update user.js

* 1031 add more info

https://bugzilla.mozilla.org/show_bug.cgi?id=1453751#c28

* 0301a: remove update-check timing info

* 2703: add version deprecation for value 3
2018-10-24 04:45:31 +13:00
Thorin-Oakenpants
587194ce84
1403: icon fonts: flip, make inactive, closes #521 2018-10-20 01:35:37 +00:00
Thorin-Oakenpants
7aac6d476a
1270: link to 1201, #519 2018-10-16 12:01:42 +00:00
Thorin-Oakenpants
9e073ea5d5
1201: SSL renegotiation -> active, closes #519 2018-10-16 11:57:32 +00:00
Thorin-Oakenpants
732c438148
0710: disable GIO... #442 2018-10-14 12:11:56 +00:00
Thorin-Oakenpants
58931bc15d
start 63 commits 2018-10-11 11:25:03 +00:00
Thorin-Oakenpants
21b18cbe49
finalize 62 2018-10-11 10:46:35 +00:00