Compare commits

...

418 Commits
85.0 ... master

Author SHA1 Message Date
Thorin-Oakenpants
23caf69614
v127 deprecated 2024-06-22 15:44:54 +00:00
Thorin-Oakenpants
6446d73cf5
add deprecated since FF119 2024-06-14 06:14:26 +00:00
Thorin-Oakenpants
47cbf5b974
fixup sysntax, tidy 2024-06-07 21:36:53 +00:00
eleius
9655743d8c
fixup missing semicolon (#1850) 2024-06-07 20:53:34 +00:00
Thorin-Oakenpants
c2f191448c
v126 (#1816) 2024-06-06 20:21:14 +00:00
Thorin-Oakenpants
33a84b608c
v122 (#1764) 2024-02-04 20:09:30 +00:00
earthlng
4a510a4b4c
prefsCleaner.sh v2.1
- remove group root/wheel check
2023-11-24 13:38:25 +00:00
earthlng
e4dd5aa428
updater.sh v4.0
- removed group root/wheel check
2023-11-24 13:35:14 +00:00
Thorin-Oakenpants
fd72683abe
v119 (#1757) 2023-11-20 02:49:16 +00:00
Thorin-Oakenpants
f95c6829fe
fixup date/reference 2023-11-19 09:56:47 +00:00
Tiagoquix
fc25163763
Correct archived version link in arkenfox-cleanup.js (#1763) 2023-11-10 23:52:23 +00:00
Thorin-Oakenpants
29bb5a35f0
rename/add icons (#1760) 2023-11-02 21:17:15 +00:00
Thorin-Oakenpants
96210522d8
Add favicon for LibreWolf 2023-11-02 20:36:12 +00:00
Tad
d94d68245f
Add favicon for Mull
Signed-off-by: Tad <tad@spotco.us>
2023-11-02 16:18:47 -04:00
Thorin-Oakenpants
e2681baec3
javascript.use_us_english_locale
https://bugzilla.mozilla.org/1846224
2023-11-01 22:02:55 +00:00
Thorin-Oakenpants
35e8def0b1
network.dns.skipTRR-when-parental-control-enabled 2023-10-18 14:59:33 +00:00
Thorin-Oakenpants
3fdcb28b8f
v118 (#1724) 2023-10-18 14:03:40 +00:00
earthlng
f54d632da5
v2.0 - improve root check 2023-10-07 10:33:49 +00:00
Thorin-Oakenpants
6e79d1bba6
deprecated v118 2023-09-29 10:52:55 +00:00
Thorin-Oakenpants
56f51203bf
point to archived version 2023-09-21 12:36:35 +00:00
Thorin-Oakenpants
bd2e5b8d1d
undo encryption
they're not default false since 108, that was nightly only
2023-09-18 11:47:49 +00:00
Thorin-Oakenpants
f0513b7e64
inactive prefs no longer needed
encryption prefs false since FF109, taskbar since jesus or whatever
2023-09-18 11:41:47 +00:00
Thorin-Oakenpants
336300a274
v118 removed
these are all at default now as of at least ESR115
2023-09-18 08:39:50 +00:00
Thorin-Oakenpants
50af4b9af4
remove old prefs 2023-09-18 08:34:35 +00:00
Thorin-Oakenpants
3f6fcc13f0
permissions.delegation.enabled 2023-09-18 08:31:22 +00:00
Thorin-Oakenpants
1e6e211a06
v117 (#1710) 2023-09-17 07:17:40 +00:00
Thorin-Oakenpants
dfd5589c3d
v117 deprecated 2023-09-16 07:08:33 +00:00
Thorin-Oakenpants
ba173d4920
layout.css.font-visibility.resistFingerprinting 2023-08-28 04:15:07 +00:00
Thorin-Oakenpants
61a9f9d37a
v115.1 (#1703)
The .1 refers to arkenfox, and has nothing to do with Firefox's versioning. This will better align ESR115 users' defaults with AF moving forward
2023-08-27 01:49:42 +00:00
Thorin-Oakenpants
576da2e236
Delete smartReferer.png 2023-08-26 07:08:23 +00:00
Thorin-Oakenpants
f1831e947b
media.gmp-widevinecdm.enabled
this adds nothing, users can use `media.eme.enabled` if this is their threat model
2023-08-26 06:45:37 +00:00
Thorin-Oakenpants
915f39959c
external.ms-windows-store, fixes #1142 2023-08-14 03:27:30 +00:00
Thorin-Oakenpants
4d78abf2bf
v115 (#1680) 2023-07-26 04:37:00 +00:00
Thorin-Oakenpants
6151d664ac
middlemouse.contentLoadURL 2023-07-19 20:38:31 +00:00
Thorin-Oakenpants
47f152ac90
browser.cache.offline.enable 2023-07-10 13:35:52 +00:00
Thorin-Oakenpants
84d515abfc
extensions.formautofill.heuristics.enabled 2023-07-10 12:44:53 +00:00
Thorin-Oakenpants
c34531b67e
114 deprecated 2023-06-21 03:29:51 +00:00
earthlng
04e6e77439
v3.9 - fix #1670 2023-05-05 10:56:08 +00:00
Thorin-Oakenpants
bc5add9450
v112 (#1654) 2023-05-04 23:31:33 +00:00
earthlng
b117916207
Update prefsCleaner.sh 2023-04-24 16:58:19 +00:00
bol0gna
2f4b93a18f
fix escape character, should close #1667 (#1668) 2023-04-24 16:56:29 +00:00
earthlng
d50c772d7d
v1.8 - fix syntax error 2023-04-23 09:14:03 +00:00
earthlng
7a1d0a92af
v3.7 - fix syntax error 2023-04-23 09:13:13 +00:00
Celestial Nebula
f2e4a79ca0
updater.sh/prefsCleaner.sh: Check for root and abort (#1651)
* updater.sh/prefsCleaner.sh: Check for root and abort

Check if running as root and if any files have the owner/group as root|wheel.
Abort on both.

Should (hopefully) prevent stuff like: https://github.com/arkenfox/user.js/issues/1587
Discussion: https://github.com/arkenfox/user.js/pull/1595

---------

Co-authored-by: Mohammed Anas <triallax@tutanota.com>
Co-authored-by: earthlng <earthlng@users.noreply.github.com>
2023-04-22 11:52:26 +00:00
Thorin-Oakenpants
c84c419544
v111 (#1650) 2023-03-30 04:50:25 +00:00
earthlng
bdaa2867b9
v2.7 - use Powershell for locale-independent TS
fixes #1624
2023-03-19 11:16:40 +00:00
Thorin-Oakenpants
e2e8c4ea8f
add arkenfox/gui 2023-03-13 07:13:07 +00:00
Thorin-Oakenpants
d13f39d9f9
v110 (#1629) 2023-03-12 03:26:12 +00:00
earthlng
ca022d8c2d
v4.19 - use Powershell for locale-independent TS 2023-03-10 09:21:21 +00:00
Thorin-Oakenpants
7388485063
v109 (#1614) 2023-02-07 00:02:45 +00:00
Keith Harrison
8259191167
prefsCleaner.bat: add -unattended flag (#1616)
* prefsCleaner.bat: add -unattended flag

Usage:
  prefsCleaner.bat -unattended

Skips the prompt for user input and proceeds when -unattended is specified. If omitted, default behaviour is unchanged.

---------

Signed-off-by: Keith Harrison <keithh@protonmail.com>
Co-authored-by: earthlng <earthlng@users.noreply.github.com>
2023-02-05 14:06:49 +00:00
Thorin-Oakenpants
b99dd27de8
browser.startup.blankWindow, #1618 2023-01-27 01:07:25 +00:00
icpantsparti2
62a68f0814
v108 (#1613)
nit: add a ';' to the end of line 1040
2023-01-08 16:48:25 +00:00
Thorin-Oakenpants
be376afc1e
v108 (#1606) 2023-01-08 15:20:22 +00:00
Thorin-Oakenpants
f5e54b4a70
revert security.tls.version.enable-deprecated
we kept it in the user js
2023-01-02 17:15:24 +00:00
earthlng
7135907b2f
Update prefsCleaner.sh 2022-12-10 14:35:48 +00:00
earthlng
12ca83b550
v1.6 - autoupdate 2022-12-10 14:00:23 +00:00
Thorin-Oakenpants
e4a85c30c1
security.tls.version.enable-deprecated
the UI for downgrading was removed in FF94, default is false
2022-12-05 18:48:51 +00:00
Thorin-Oakenpants
45d23f8d75
region prefs, #1590 2022-12-02 10:19:29 +00:00
Thorin-Oakenpants
40e8e1acbe
beacon.enabled, see #1586 2022-11-28 08:11:40 +00:00
earthlng
6789dc7fef
fix typo 2022-11-22 19:50:50 +00:00
earthlng
5eaa8196e2
v4.18 - fix backup filename 2022-11-22 19:00:47 +00:00
Thorin-Oakenpants
cc0f05388f
v107 (#1579) 2022-11-21 00:36:37 +00:00
Thorin-Oakenpants
5a366493e0
dom.disable_open_during_load
default true since at least FF60
2022-11-19 04:04:59 +00:00
junoslukan
365e76bc9f
Format date and time consistently. (#1580)
* Format date and time consistently.

Co-authored-by: junos <junos.lukan@ijs.si>
Co-authored-by: earthlng <earthlng@users.noreply.github.com>
2022-11-13 14:37:26 +00:00
iTawkins
a93047e6c9
Improves usability by clarifying desired action (#1583) 2022-11-13 14:31:17 +00:00
Thorin-Oakenpants
8a65c5a7ba
v106 (#1558) 2022-11-06 13:28:40 +00:00
Thorin-Oakenpants
60dd839081
dom.disable_beforeunload, #1575 2022-11-04 16:03:29 +00:00
Thorin-Oakenpants
f4187632fa
browser.ssl_override_behavior
the code behind it was removed in FF68 - https://bugzilla.mozilla.org/show_bug.cgi?id=1530348
2022-10-08 19:38:05 +00:00
Thorin-Oakenpants
51f3fdbd87
devtools.chrome.enabled
default false in stable, dev, beta, nightly
2022-10-08 14:08:55 +00:00
Thorin-Oakenpants
db04bc44f2
some inactive prefs at default since 102+
- dom.vr.enabled - false FF97+
- network.http.altsvc.oe - false FF94+
- dom.netinfo.enabled - android joined desktop as false FF99+
- browser.tabs.warnOnClose - falsefalse FF94+
2022-10-04 17:34:45 +00:00
Thorin-Oakenpants
4e3a64b5a1
v105 (#1541) 2022-10-04 17:15:19 +00:00
Thorin-Oakenpants
958acf9c2e
activity-stream.feeds.discoverystreamfeed 2022-10-03 13:47:30 +00:00
Thorin-Oakenpants
95ecd3e328
browser.newtab.preload 2022-10-03 07:18:30 +00:00
Thorin-Oakenpants
4bc98005ec
activity-stream.feeds.snippets 2022-10-01 20:33:58 +00:00
fxbrit
3f09afdee0
Merge pull request #1527 from arkenfox/Thorin-Oakenpants-patch-1
v104
2022-09-11 12:46:23 +02:00
Thorin-Oakenpants
3c73bc1e56
2720: add APS 2022-09-11 02:39:08 +00:00
Thorin-Oakenpants
e38f02bc22
add extra bugzilla 2022-08-28 00:31:59 +00:00
Thorin-Oakenpants
74be763f60
add OCSP hard-fail error code 2022-08-24 05:53:46 +00:00
Thorin-Oakenpants
5780b6d197
move Form Autofill to 5000s 2022-08-23 17:51:35 +00:00
Thorin-Oakenpants
06bfef8fd1
extensions.formautofill
add migrated prefs for completeness - see comment in d040b95ed2
2022-08-23 17:33:55 +00:00
Thorin-Oakenpants
d040b95ed2
also reset the prefs migrated to
.supported also hides/shows the UI. There is no need for this, it is overkill (and users might never be able to work out how to get them back). The .enabled prefs are enough to toggle the checkboxes IF they show based on .supportedCountries (which relies on browser.search.region)
2022-08-23 17:29:47 +00:00
Thorin-Oakenpants
61f01f81fd
tidy 2022-08-23 16:53:27 +00:00
Thorin-Oakenpants
2b2e151f45
extensions.formautofill
https://bugzilla.mozilla.org/1745248 - migrated to .supported in FF99
2022-08-23 16:52:38 +00:00
Thorin-Oakenpants
ff8d63f7e4
remove dead prefs
https://bugzilla.mozilla.org/show_bug.cgi?id=1745248 - they migrated to `.supported` prefs (values detect or off)
2022-08-23 16:42:32 +00:00
Thorin-Oakenpants
848290898d
svg opentype fonts -> optional, see #1529 2022-08-22 16:02:07 +00:00
Thorin-Oakenpants
05abe82136
v105
partition SWers by default: https://bugzilla.mozilla.org/show_bug.cgi?id=1784900
2022-08-18 20:12:42 +00:00
Thorin-Oakenpants
0dba33688f
v103 (#1508) 2022-08-17 19:24:38 +00:00
Thorin-Oakenpants
6e53e841f7
security.pki.sha1_enforcement_level 2022-07-31 10:50:24 +00:00
earthlng
ecb63e82c9
Update prefsCleaner.sh 2022-07-30 12:23:27 +00:00
xfzv
ded7c01a08
Back up prefs.js to prefsjs_backups directory (#1514) 2022-07-30 12:22:32 +00:00
earthlng
996881aef1
Update updater.sh 2022-07-24 13:11:28 +00:00
Brad Smith
4b4248157a
make updater.sh check explicitly for Y/y instead of N/n (#1511)
thanks @infinitewarp
2022-07-24 13:10:06 +00:00
Thorin-Oakenpants
a5e75c4bd3
fixup network.cookie.lifetimePolicy
migration code was backed out in FF102.1
2022-07-18 11:27:05 +00:00
Thorin-Oakenpants
c6ab6c4b48
v102.1 (#1507)
revert back to relying on network.cookie.lifetimePolicy
2022-07-18 10:38:43 +00:00
Thorin-Oakenpants
ceacc9dd74
v102 (#1477) 2022-07-02 00:43:25 +00:00
Thorin-Oakenpants
d466cf694e
two password prefs
https://bugzilla.mozilla.org/1767099
2022-07-01 08:15:39 +00:00
Thorin-Oakenpants
3fcc711c5a
network.cookie.lifetimePolicy
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1681493,1681495,1681498,1759665
2022-07-01 02:42:16 +00:00
Thorin-Oakenpants
c21b9faefc
dom.storage.next_gen 2022-06-14 07:01:01 +00:00
Thorin-Oakenpants
1a899966a9
v101 (#1443) 2022-06-12 13:38:27 +00:00
Thorin-Oakenpants
36c942e887
browser.urlbar.trimURLs
see #1473
2022-06-12 12:45:13 +00:00
Thorin-Oakenpants
662eddbc21
network.cookie.thirdparty 2022-06-01 13:51:19 +00:00
Thorin-Oakenpants
ea139e3ef8
long standing defaults
- FF79+ dom.targetBlankNoOpener.enabled - https://bugzilla.mozilla.org/show_bug.cgi?id=1522083
- FF86+ privacy.window.name.update.enabled - https://bugzilla.mozilla.org/show_bug.cgi?id=1685089
2022-05-09 19:25:18 +00:00
Thorin-Oakenpants
d6b26e7558
v100 (#1423) 2022-05-09 18:49:38 +00:00
Thorin-Oakenpants
7ff46e02dd
v100 deprecated
https://bugzilla.mozilla.org/1752621 - replaced with network.http.http2* prefs
2022-05-05 23:33:44 +00:00
fabrizio
4ff931781a
Merge pull request #1419 from arkenfox/v99
v99
2022-04-09 09:45:45 +00:00
Thorin-Oakenpants
9aae0a62b0
tidy deprecated, misc RFP changes 2022-04-08 21:30:22 +00:00
Thorin-Oakenpants
eb98f06d69
security.csp.enable
https://bugzilla.mozilla.org/1754301
2022-04-08 21:28:16 +00:00
fxbrit
81561840a1 deprecate security.csp.enable 2022-04-08 11:43:39 +02:00
i-c-u-p
64bc683c3f
Made prefsCleaner.sh executable (#1416)
Changed permissions of prefsCleaner.sh from 644 to 755 to be able to run it via "./prefsCleaner.sh" with out first executing "chmod +x prefsCleaner.sh".
2022-04-08 07:03:43 +00:00
earthlng
b4225baaf2
Update updater.sh 2022-03-19 07:47:46 +00:00
matthias-z
e00497fd51
Fix newline issue when downloading files in updater.sh (#1397) 2022-03-19 07:46:08 +00:00
Thorin-Oakenpants
d9af90d05f
v98 (#1372) 2022-03-10 00:44:10 +00:00
Thorin-Oakenpants
0d83307b14
Update troubleshooting-help.md 2022-02-27 10:44:04 +00:00
Thorin-Oakenpants
4f3f789f28
Add files via upload 2022-02-25 23:15:01 +13:00
Thorin-Oakenpants
6b6ed86b6c
Update troubleshooting-help.md 2022-02-24 00:26:15 +00:00
Thorin-Oakenpants
382b9181df
Add files via upload 2022-02-20 19:00:32 +13:00
Thorin-Oakenpants
ba052105de
Add files via upload 2022-02-14 05:38:13 +13:00
Thorin-Oakenpants
4bd17611df
Update troubleshooting-help.md 2022-02-13 13:11:55 +00:00
Thorin-Oakenpants
41468d0d0b
Update troubleshooting-help.md 2022-02-13 13:11:26 +00:00
Thorin-Oakenpants
a98b73c64e
v97 (#1346) 2022-02-13 11:15:00 +00:00
Thorin-Oakenpants
58e2618b9d
dom.securecontext.whitelist_onions
replaced by dom.securecontext.allowlist_onions - https://bugzilla.mozilla.org/1744006
2022-02-09 20:00:43 +00:00
Thorin-Oakenpants
d61da93aad
Update troubleshooting-help.md 2022-02-06 15:30:25 +00:00
Thorin-Oakenpants
562127be87
Update troubleshooting-help.md 2022-02-06 15:27:50 +00:00
xfzv
917e3fe1aa
Update wiki link for updater options (#1364) 2022-02-06 12:23:20 +00:00
Thorin-Oakenpants
89bee0e361
Add files via upload 2022-01-31 03:08:22 +13:00
Thorin-Oakenpants
4c74f1bffb
Update README.md 2022-01-30 08:53:08 +00:00
Thorin-Oakenpants
0d9de9174a
Update README.md 2022-01-30 03:23:06 +00:00
Thorin-Oakenpants
45043537d8
Update README.md 2022-01-30 03:20:59 +00:00
Thorin-Oakenpants
cc7ca9d0fa
cleanup dead images (#1353) 2022-01-29 05:24:41 +00:00
fabrizio
10044fcaf7
typos #1342 (#1343) 2022-01-22 01:49:48 +00:00
Thorin-Oakenpants
ac0820a5dc
add last bits about ETP Strict/dFPI, closes #1337 2022-01-21 03:48:06 +00:00
Thorin-Oakenpants
83b6d64e67
security.insecure_connection_text.enabled
AF has been using HTTPS-Only mode since v84, the interstitial is more than ample, padlock is still marked as insecure
2022-01-16 02:36:08 +00:00
Thorin-Oakenpants
b5bf2ee017
oophs, add removed item from last commit to 6050 2022-01-16 02:34:21 +00:00
Thorin-Oakenpants
09d62d2302
remove 1273: "not Secure" text on insecure sites
AF has been using HTTPS-Only mode since v84, the interstitial is more than ample, padlock is still marked as insecure
2022-01-16 02:31:57 +00:00
Thorin-Oakenpants
7a4676fe2d
make 1601 setup tag more explicit, closes #1326 2022-01-15 05:25:11 +00:00
Thorin-Oakenpants
bc2aba3829
move last update pref to personal 2022-01-12 05:25:31 +00:00
Thorin-Oakenpants
926a2d4ac8
v96 deprecated, #1325
also tidy the description to reflect that the setting is hidden
2022-01-12 05:09:17 +00:00
Thorin-Oakenpants
ab7380c93b
HoM: tweak background request info 2022-01-11 09:21:37 +00:00
Thorin-Oakenpants
06b8d8bfa3
move 0362 to don't touch 2022-01-07 17:29:26 +00:00
Thorin-Oakenpants
7016c2050d
move TLS 1.0/1.1 downgrades to don't bother
https://bugzilla.mozilla.org/show_bug.cgi?id=1745678
2021-12-30 03:15:56 +00:00
Thorin-Oakenpants
2787da7f90
Update README.md 2021-12-24 06:04:38 +00:00
Thorin-Oakenpants
7e18f8b473
tweak 2011
- FF85+ switched to using application regional locale
   - go to about:support > Internationalization & Localization (almost at the very end)
   - look at Application > Regional Preferences
- add test
2021-12-24 06:01:41 +00:00
Thorin-Oakenpants
d2510b014d
move updates to personal
updating (app, extensions, ext cache) is not a privacy issue
- if you're willing to use Firefox but not trust updating, then I have two bricks to sell you: users who wish to disable it (to check changes first etc) and update in a timely manner, then that is on them - including any prompt fatigue
- same goes for extensions: the end-user installed them (and arkenfox only recommends a very select few) - the onus is on the end-user

The remaining ones I will deal with later
2021-12-23 23:42:28 +00:00
Thorin-Oakenpants
87bd8683fa
2022: add browser.eme.ui.enabled
for those who want to remove DRM prompts and have no intention of enabling it
2021-12-23 21:22:41 +00:00
Thorin-Oakenpants
d48d3ad29a
remove browser.eme.ui.enabled 2021-12-23 21:20:28 +00:00
Thorin-Oakenpants
6675225ec4
make 0301 inactive
auto-updating is not a security nor a privacy risk, by default it should be enabled and it's on end-users if they want to disable it - does not affect windows users
2021-12-23 06:36:39 +00:00
Thorin-Oakenpants
bb56056a68
explain 0-RTT 2021-12-15 19:23:03 +00:00
Thorin-Oakenpants
93f0ff89c8
move web notifcations to don't bother 2021-12-15 00:05:03 +00:00
Thorin-Oakenpants
7811e912f4
make push notifications inactive
- they require SWers which are already blocked by virtue of permissions being session only
- also remove "dom.push.userAgentID" as this means prefsCleaner resets it and would wipe user's subscriptions
   - not adding "dom.push.userAgentID" to the cleanup script for the same reason
2021-12-14 13:25:46 +00:00
Thorin-Oakenpants
238f1545f4
fixup thanks #fxbrit have a 🍥 fish cake 2021-12-13 14:15:25 +00:00
Thorin-Oakenpants
c269ac9f7d
remove duplicate 2021-12-13 03:49:42 +00:00
Thorin-Oakenpants
78297132b4
fix syntax 2021-12-12 15:44:39 +00:00
Thorin-Oakenpants
8de87de050
update 0704: GIO, closes #1050 (#1300)
https://bugzilla.mozilla.org/show_bug.cgi?id=1666725
2021-12-12 15:41:55 +00:00
Thorin-Oakenpants
8bc25b552d
expand 0650 to include any removed item
this should reduce any dependency on the scratchpad script
2021-12-12 15:30:53 +00:00
Thorin-Oakenpants
c8c86262d7
enforce SmartBlock shims 2021-12-12 13:51:25 +00:00
Thorin-Oakenpants
f836e55363
tidy ETP stuff 2021-12-12 13:31:01 +00:00
Thorin-Oakenpants
8cdb30cc08
make cookie pref active
@SkewedZeppelin ... https://github.com/arkenfox/user.js/issues/1051#issuecomment-991806497
2021-12-12 00:26:12 +00:00
Thorin-Oakenpants
54810e333f
typo 2021-12-11 19:17:43 +00:00
Thorin-Oakenpants
7ec13c0323
sharedWorkers tweak
tested in FF91+. Seems as if sharedWorkers no longer requires an explicit `Allow`
2021-12-11 12:22:00 +00:00
Thorin-Oakenpants
af109d4696
tweak 7016 2021-12-11 11:15:34 +00:00
Thorin-Oakenpants
460951df9e
tidy, add instructions 2021-12-11 09:37:45 +00:00
Thorin-Oakenpants
93874bda43
rename 2021-12-11 09:14:59 +00:00
Thorin-Oakenpants
4ebabbb569
Delete arkenfox-clear-deprecated.js 2021-12-11 09:13:51 +00:00
Thorin-Oakenpants
1f0dc1853d
merge scratchpads into one 2021-12-11 09:13:09 +00:00
Thorin-Oakenpants
13e5fe17b1
remove rfpalts (#1288) 2021-12-11 06:56:43 +00:00
Thorin-Oakenpants
ec7cb6a491
2702: partition service workers 2021-12-09 17:17:52 +00:00
Thorin-Oakenpants
d9f49bdf1f
make 7017 clearer 2021-12-09 16:17:53 +00:00
Thorin-Oakenpants
d5bc6715cd
remove web workers section
farewell parrot
2021-12-09 16:14:36 +00:00
Thorin-Oakenpants
8860c90abf
make service workers inactive
currently 3rd party service workers are blocked in FF95 when dFPI is enabled (which this version has should anyone update to 96-alpha)
   - but I get an error even on first party - https://arkenfox.github.io/TZP/tzp.html#storage
   - I get : service worker | test : enabled | failed: SecurityError
in FF96+ service workers they are covered by dFPI
  - see https://bugzilla.mozilla.org/show_bug.cgi?id=1731999
2021-12-09 14:31:41 +00:00
Thorin-Oakenpants
4d5abd6cc3
tweak 8000 title
lets not encourage non-RFP users to see this as a sign to use them
2021-12-09 14:18:25 +00:00
Thorin-Oakenpants
de28689e76
flip from FPI to dFPI
I will tidy and expand 2700 entries later
2021-12-09 14:13:39 +00:00
Thorin-Oakenpants
5d508e4242
move LSNG to don't touch 2021-12-09 14:05:47 +00:00
Thorin-Oakenpants
1fc43574d6
move "cookie" permission info into 2801 2021-12-09 14:00:21 +00:00
Thorin-Oakenpants
83602baa38
misc site storage/data prefs
been inactive since jesus was a baby
2021-12-09 13:47:57 +00:00
Thorin-Oakenpants
0634a568ef
remove redundant site data prefs
we've never used these
- service workers are disabled (or soon to be covered by dFPI when enabled) and sanitizing is already done (or will be done via enhanced cookie cleaning)
- storage API, storage access API: we sanitize on close, and sites are isolated by eTLD+1
2021-12-09 13:45:46 +00:00
Thorin-Oakenpants
97322d6e8b
various inactive FPI prefs 2021-12-09 12:31:38 +00:00
Thorin-Oakenpants
f7bba92c71
cleanout FPI section
farewell parrot
2021-12-09 12:28:45 +00:00
Thorin-Oakenpants
fe75baa79f
move DNT to DON'T BOTHER 2021-12-09 11:44:51 +00:00
Thorin-Oakenpants
72cc4d176e
0706: network.proxy.allow_bypass, closes #1292 2021-12-09 11:41:18 +00:00
Thorin-Oakenpants
7e1b92567c
95 final 2021-12-08 12:13:47 +00:00
Thorin-Oakenpants
fec5168203
95 deprecated 2021-12-08 04:28:47 +00:00
Thorin-Oakenpants
b60a888da3
update WebRTC, closes #1282 2021-12-06 14:45:47 +00:00
Thorin-Oakenpants
ec595c3b95
fixup duplicate line 2021-12-05 19:59:33 +00:00
Thorin-Oakenpants
9d61992c8c
don't clear offlineApps on shutdown, #1291
- in v94 we switched to cookies lifetime as session, so users could use site exceptions to retain selected cookies (to stay logged in one assumes)
- that mean not deleting all cookies on shutdown
- but some login methods/types require more than cookies and also need the "site data" part of "cookies + site data" - that's the offlineApps part
- note: all site data (and cookies) is still cleared on close except site exceptions
2021-12-05 19:49:32 +00:00
Thorin-Oakenpants
fd860e6c69
flip RFP newwin max values, closes #1286 2021-12-04 10:23:59 +00:00
Thorin-Oakenpants
d1d20b897a
wiki cleanup (#1289) 2021-12-04 09:36:09 +00:00
Thorin-Oakenpants
cf0102f71e
fixup: from being flogged to death by overseers
thanks @dngray, also save some precious bytes .. polar bears know about scarce resources
2021-12-02 09:34:34 +00:00
Thorin-Oakenpants
4dc5372257
0603: network.predictor.enable-prefetch
make active for Nighty users - see https://bugzilla.mozilla.org/show_bug.cgi?id=1506194
2021-11-30 13:29:19 +00:00
Thorin-Oakenpants
c2ddfd60bf
tidy 79-91 removed items 2021-11-28 13:22:46 +00:00
Thorin-Oakenpants
47de4f520b
tidy 5505 2021-11-28 09:01:39 +00:00
Thorin-Oakenpants
27977a16ad
2652: browser.download.alwaysOpenPanel
FYI: https://bugzilla.mozilla.org/1738372

There is a small privacy issue with shoulder surfers, but in reality, this just needs to happen IMO
- we already prompt where to save, but even if we didn't, we also know we clicked or initiated a download
   - unless it's a drive by or user-gesture trickery - which is why we prompt
- the download icon is shown (if hidden) and the throbber/accent color go to work
- users can always click the icon to show entries (and open folder etc)
- this maintains the current behavior in FF94
2021-11-25 06:49:38 +00:00
Thorin-Oakenpants
4b393b9b12
start 95-alpha 2021-11-24 01:09:10 +00:00
Thorin-Oakenpants
6027aaa45d
fixup warnOnQuitShortcut 2021-11-23 12:02:50 +00:00
Thorin-Oakenpants
cbfb8abf15
94 final 2021-11-23 07:11:43 +00:00
Thorin-Oakenpants
58d0161b67
add warnOnQuitShortcut, closes #1270 2021-11-23 07:05:01 +00:00
Thorin-Oakenpants
6b351a9458
fixup trade-offs
anti-fingerprinting doesn't fit here: it's not a major component or priority of this user.js, and only a few prefs outside RFP (as a robust built-in browser solution that defeats naive scripts) have anything to do with it
2021-11-22 18:15:53 +00:00
Thorin-Oakenpants
c9e4cac618
tweak webRTC
webRTC will be overhauled... but not today... in the meantime
- remove dead link before @dngray has a hernia
- correctly refer to the type of IP leak
2021-11-22 18:08:07 +00:00
Thorin-Oakenpants
34bd3c5a04
consolidate/simplify sanitizing, fixes #1256
move all sanitizing on exit prefs into 2800

switch to cookie lifetime as session
- now users can utilize exceptions (as allow)
- session cookies still block service workers (which we disable anyway)
- we still block 3rd party cookies (until we move to dFPI)
- we still have defense in depth for 3rd party cookies with 2803
- we still bulk sanitize offlineApps on exit: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
   - i.e you get to keep the cookies only IF you add an exception

add `privacy.clearsitedata.cache.enabled`
2021-11-22 05:40:49 +00:00
Thorin-Oakenpants
2f88ca2e40
misc
- move DoH so it has room to grow
- tidy privacy.clearOnShutdown, privacy.cpd
2021-11-18 01:28:21 +00:00
Thorin-Oakenpants
e2e7f9c647
font vis changes (#1275) 2021-11-16 11:56:20 +00:00
Thorin-Oakenpants
f8932dced1
remove ambiguous line
The point was that google have said (stated in policy, but fuck knows where that is located these days) that it is anonymized and not used for tracking. It's an API used by **_4 billion devices_** - the API has privacy policies for use. If a whistleblower or someone else found out that google was using this to enhance their user profiling, then all hell would break loose. And they don't even need this to fuel their ad revenue. It is provided, gratis, to the web to help ensure security - they wouldn't dare taint it and get it caught up in a privacy scandal involving **+4 billion devices_**. And in all this time (since 2007), there has been no such whistleblower or proof it is used to track or announcements by google of changes to the contrary.

Anyway, a quick search brings up
- Here is their policy - https://www.google.com/intl/en_us/privacy/browsing.html - it's empty and points to
- https://www.google.com/intl/en/chrome/privacy/
   - and if you scroll down to "Safe Browsing practices" it doesn't say anything about privacy policies for the API itself (or the owner of the API) - it just spells out what happens in chrome
- I'm not going to bother to look any further and find a history of policy changes

Anyway, this is Firefox and hashes are part hashes bundled with other real hashes - and we turned off real time binary checks. So this line can fuck the fuck off. It was meant to reassure those who want the security of real-time binary checks, that privacy "shouldn't" be an issue, but I'm not going to expand on it
2021-11-07 06:48:45 +00:00
Thorin-Oakenpants
17beb468f1
tweak 1510 default info 2021-11-04 22:44:23 +00:00
Thorin-Oakenpants
bd59131d3e
default changes, missed one 2021-11-04 22:38:16 +00:00
Thorin-Oakenpants
0f8217ad60
cleanup sanitizing-on-close prefs 2021-11-04 16:18:35 +00:00
Thorin-Oakenpants
1515897449
default changes 2021-11-02 16:07:42 +00:00
Thorin-Oakenpants
ba92918d38
don't disable system addon updates, closes #1251 2021-10-26 10:16:42 +00:00
Thorin-Oakenpants
094356e073
0706: add reference 2021-10-25 20:56:18 +00:00
Thorin-Oakenpants
7d68a32971
start 94-alpha
- and remove obsolete ESR78 notations
- note: we leave the deprecated ESR78.x section and item 6050 until v95 so users upgrading to ESR91 can easily reset those prefs with prefsCleaner
2021-10-25 17:41:16 +00:00
Thorin-Oakenpants
85438d00e4
v93 deprecated 2021-10-12 08:23:46 +00:00
Thorin-Oakenpants
a764149520
v92 2021-10-11 13:56:38 +00:00
Thorin-Oakenpants
535346df87
Delete arkenfox-clear-RFP-alternatives.js 2021-10-10 23:55:39 +00:00
Thorin-Oakenpants
412c8f9f94
0807 urlbar contextual suggestions, #1257 2021-10-09 07:14:20 +00:00
Thorin-Oakenpants
380a88ee57
oophs 2021-10-05 11:14:16 +00:00
Thorin-Oakenpants
8404e8a59c
tidy, closes #1260 2021-10-05 03:04:14 +00:00
a1346054
6381b1aeb9
prefsCleaner.sh: Fix invalid regular expression (#1258) 2021-09-28 19:24:54 +00:00
a1346054
5cdea955e7
Simple maintenance improvements (#1255)
* Use direct check for existence of file

* Fix shellcheck warnings

* Unify codestyle in scripts

* Trim excess whitespace
2021-09-27 15:23:12 +00:00
Thorin-Oakenpants
b37df0bcfe
embiggen 4500, #1218 2021-09-25 02:32:48 +00:00
Thorin-Oakenpants
044e3e76e8
make 0706 more cromulent 2021-09-25 01:47:54 +00:00
Thorin-Oakenpants
1c6d633144
more nits 2021-09-11 05:35:39 +00:00
Thorin-Oakenpants
278336196c
nit 2021-09-11 05:31:21 +00:00
Thorin-Oakenpants
76c1aad4be
grammar 2021-09-10 13:07:04 +00:00
Thorin-Oakenpants
e5c128804c
remove locale in link 2021-09-10 05:09:05 +00:00
Thorin-Oakenpants
c9956d85b1
92-alpha 2021-09-10 04:32:09 +00:00
Thorin-Oakenpants
524823fd05
proxy direct failover (#1247) 2021-09-07 13:35:32 +00:00
Thorin-Oakenpants
283bfd744a
fixup missing 1022 reference 2021-08-29 14:32:37 +00:00
Thorin-Oakenpants
a1b4aa6000
add DoH rollout pref, closes #1027 2021-08-29 07:42:24 +00:00
Thorin-Oakenpants
a308878b11
finish removal of 500s and cleanup of 300s 2021-08-29 04:50:36 +00:00
Thorin-Oakenpants
453fcd32cb
remove 2003, fixes #1245 2021-08-29 04:10:48 +00:00
Thorin-Oakenpants
a264eebcb5
screensharing etc 2021-08-29 03:27:46 +00:00
Thorin-Oakenpants
908638c9dc
security.mixed_content.block_active_content
default true since at least FF60
2021-08-28 08:39:44 +00:00
Thorin-Oakenpants
7e80231ac5
was 6005: remove mixed active 2021-08-28 08:38:31 +00:00
Thorin-Oakenpants
6df03e1a74
add removed from arkenfox section
- this helps mitigate the need for scratchpad for those who use prefsCleaner
- in future, if anything was active during the ESR cycle, then it goes in here when removed
- similar to deprecated items: clean out after ESR EOL
2021-08-28 08:30:12 +00:00
Thorin-Oakenpants
4b437771fa
oophs, thanks @eleius
fixup 3b52557143
2021-08-28 07:11:44 +00:00
Thorin-Oakenpants
4043467ad9
tidy 2021-08-28 06:03:13 +00:00
Thorin-Oakenpants
5ac8fd8f70
0906: tweak, #1243 2021-08-28 05:57:19 +00:00
Thorin-Oakenpants
2cf20c56a7
standardize cross origin/domain 2021-08-28 05:48:54 +00:00
Thorin-Oakenpants
3b52557143
start removal of section 0500s
- I am no longer short one parrot
- move inactive screenshots to personal
- move FORM autofill to `0800... FORMS` - can't find it now, but this is slated to cease being a system addon and instead be "built-in"
- the rest will get swallowed into a revamped, split QUIETER FOX
2021-08-28 05:19:13 +00:00
Thorin-Oakenpants
2a9cf32f45
security.insecure_connection_icon.enabled
inactive and default true
2021-08-27 10:39:40 +00:00
Thorin-Oakenpants
08395de188
1273: remove inactive pref 2021-08-27 10:37:54 +00:00
Thorin-Oakenpants
4ac17eaf78
tidy last commit 2021-08-26 06:50:46 +00:00
Thorin-Oakenpants
b5a3b54d3f
clipboard to don't bother 2021-08-26 06:43:28 +00:00
Thorin-Oakenpants
38dc90a947
dom.allow_cut_copy
80f69a6f3d
2021-08-26 06:27:32 +00:00
Thorin-Oakenpants
80f69a6f3d
2406: remove
This doesn't achieve anything. AFAICT, it's an old gecko only API, not used on the web: superseded by the Clipboard API (added in FF21+)
2021-08-26 06:26:41 +00:00
Thorin-Oakenpants
498a25c759
0806: remove confusing line 2021-08-26 06:04:57 +00:00
Thorin-Oakenpants
64e8dfad0a
1004: remove setup tag
IDK if this is true: no one has ever complained, and I'm not interested in maintaining/testing it
2021-08-26 05:55:11 +00:00
Thorin-Oakenpants
5ec4fef4ed
dedupe 0808 2021-08-26 05:40:59 +00:00
Thorin-Oakenpants
881a2d22eb
cleanup tags
- there was only one perf left
- warning is down to 5: two in section headers, 3 on inactive prefs: no need to mention it, people will see them if they read each item/section
2021-08-25 16:14:59 +00:00
Thorin-Oakenpants
76c8ecd10d
tidy 2021-08-25 15:56:57 +00:00
Thorin-Oakenpants
677b81765f
tidy webgl 2021-08-25 15:36:15 +00:00
Thorin-Oakenpants
9f43d48a32
targetBlankNoOpener -> don't touch 2021-08-25 14:09:39 +00:00
Thorin-Oakenpants
6077d09b9f
window.name -> don't touch
Also FPI FF65+ patch is not part of FPI, it is part of 4002 which is a separate pref
2021-08-25 14:04:50 +00:00
Thorin-Oakenpants
7144f8b7f8
cleanup continued, #1239
More minor tweaks to come. This isn't final
- 0102: ambiguous that the clearing was related to PB mode
- 0900s:
   - get rid of 0901, it has no pref, stick link in header
   - 0905: values on multi-lines use spaces = more readable
- 1000s:
   - rename as disk avoidance and remove sub-section headers
   - remove the outdated section header
- 4001: it will never be perfected, it's doing it's job
- 5500s: optional hardening
   - legit security measures, but commonality in caveats, so I made them a separate section
   - this flips graphite, asm.js and wasm from active to inactive: these are overkill: exhibit A: hundreds of millions of Firefox users
   - e.g. graphite and wasm are enabled on Tor Browser
   - new CVE keyword links
- 7000s: don't bother - two more items added
- 5000s: optional opsec and cleanout 0800s header
- re-number
   - 0900s, 1000s, 1400s, 2400s

PS: I need a new parrot: "9000 syntax error: I ran out of parrots"
2021-08-24 22:51:48 +00:00
Thorin-Oakenpants
778421cad4
#1241 2021-08-24 08:59:11 +00:00
Thorin-Oakenpants
35ccaff58e
calrify password prompt, #1241 2021-08-24 08:52:12 +00:00
Thorin-Oakenpants
69132b588f
7000s: mathml, svg, #1235 2021-08-24 05:43:38 +00:00
Thorin-Oakenpants
51748ea25a
leverage cve keyword 2021-08-24 03:09:33 +00:00
Thorin-Oakenpants
269cf965bd
renumber 1700s 2021-08-23 10:03:13 +00:00
Thorin-Oakenpants
b177c73f0d
typo
technically it's "or" - FPI overrides network partitioning
2021-08-23 09:47:34 +00:00
Thorin-Oakenpants
613e55ae8c
7000s: add MOAR; renumber 0700s, #1235 2021-08-23 09:42:21 +00:00
Thorin-Oakenpants
3697bd8d3a
1603 -> inactive
Yes it's pretty much useless. Yes it's fingerprintable, and what that entropy is, who knows. Since it's sent regardless with ETP, which we enable in all windows, then who cares. And if you don't use ETP in all windows, then I don't care either - just saying
2021-08-23 06:26:45 +00:00
Thorin-Oakenpants
9f08c7c0f4
7000s: referer policy #1235
and re-number 1600s
2021-08-23 06:04:19 +00:00
Thorin-Oakenpants
05b7d61735
7000s: non cross origin referers 2021-08-23 04:54:49 +00:00
Thorin-Oakenpants
e31a6876e6
section 6000 2021-08-23 04:40:29 +00:00
Thorin-Oakenpants
47be7ba42f
1203 is a reset not enforce 2021-08-23 04:08:49 +00:00
Thorin-Oakenpants
033977fe10
move personal to last
probably more professional to keep it at the end since it isn't strictly project related. It also opens up space for `DON'T TOUCH` and `OPTIONAL OPSEC`
2021-08-23 03:39:15 +00:00
Thorin-Oakenpants
ab42deb541
Four more items to 7000s, #1235 2021-08-23 02:55:36 +00:00
icpantsparti
8a22a90804
colon insertion (#1238) 2021-08-22 16:23:51 +00:00
Thorin-Oakenpants
c55e6dcd68
flip order, order within groups
- note: keeping 91 separate for now for the easy info factpr
2021-08-22 08:27:15 +00:00
Thorin-Oakenpants
cf379bcce0
typos 2021-08-22 05:45:08 +00:00
Thorin-Oakenpants
2b26cd4f41
7000s: ciphers, #1235
- merged 3DES cipher to bottom: it is still the same order of [1]
- 3DES pref will be deprecated: pref name changes, and the cipher slated to be unavailable unless you downgrade to < TLS1.2 - see https://bugzilla.mozilla.org/show_bug.cgi?id=1724072
   - FYI: we reset TLS downgrades to session only by resetting the pref currently in 1203
- "Minimal/non-existent threat of downgrade attacks"
   - FYI: these old ciphers are about 1-2% of traffic (from memory) - but that's still significant breakage
   - So the only reason to do this would be to harden against downgrade attacks (and inadvertently use weak sites = breakage): but that doesn't fit most user's threat model: and is probably never going to happen for them. Not sure if I can word that much better and just as succinct
2021-08-22 05:18:54 +00:00
Thorin-Oakenpants
8bfee5b59f
hardware acceleration
see 04d648d55b
2021-08-22 01:55:28 +00:00
Thorin-Oakenpants
04d648d55b
remove 2508
- inactive in user.js since
   - v55: gfx.direct2d.disabled
   - v67: layers.acceleration.disabled
- the way to counter hardware fingerprinting is within each API that may expose it
- this may have made some sense way back in the day, when there were less options/protections, but not any more
- [are we web render yet](https://arewewebrenderyet.com/) - yes, 100% - there is no need to cripple your browser's perf
2021-08-22 01:53:01 +00:00
Thorin-Oakenpants
7cdc76ecf9
dom.vibrator.enabled
see aded0707a4
2021-08-21 04:40:11 +00:00
Thorin-Oakenpants
aded0707a4
misc
- renumber 0200s, 2500s
- remove 2414: doesn't apply to desktop, and I think it has been neutered in android
2021-08-21 04:39:08 +00:00
Thorin-Oakenpants
2a011f1053
media.media-capabilities.enabled
see 213467d91b
2021-08-21 03:23:17 +00:00
Thorin-Oakenpants
213467d91b
remove 2517
- inactive since we added it in v63
- this is not how you defeat fingerprinting (unless done in an enforced set)
- for the record: not even tor browser disable this
- fingerprinting this is not cheap in gecko (for now)
- from [2]
   - decoding/encoding capabilities: "it is expected that the entropy ... isn’t going to be significant"
   - HDR detection: "... has the potential to add significant entropy .. however .. but ... thus minimizing effective entropy" - it is what it is
   - note that RFP has some mitigations in FF82+ 1461454
2021-08-21 03:21:32 +00:00
Thorin-Oakenpants
da0c291127
update to ESR91 2021-08-21 02:26:17 +00:00
Thorin-Oakenpants
27ce48f319
trim fluff 2021-08-21 02:00:43 +00:00
Thorin-Oakenpants
37ded2a519
remove redundant warning 2021-08-20 14:10:09 +00:00
Thorin-Oakenpants
c9bdceb8d6
1244: fix no upgrade test 2021-08-20 13:23:59 +00:00
Thorin-Oakenpants
95136382e1
improve 1244, closes #1047 again 2021-08-20 13:18:43 +00:00
Thorin-Oakenpants
78d953bfda
remove 1032
dead wood: marked as default false since at least v68, inactive since at least v78, and web notifications are controlled in 2300s
2021-08-20 03:16:25 +00:00
Thorin-Oakenpants
2d3d8ae5b0
alerts.showFavicons 2021-08-20 03:12:59 +00:00
Thorin-Oakenpants
cef08b63f1
4520 -> personal 2021-08-20 02:52:55 +00:00
Thorin-Oakenpants
a8e95e7310
dexter would be proud #1235
- just to be clear, this section is not supported: not interested in references or explanations or  FF version numbers or default info etc
- "do more harm than good" - ambiguous, not interested in explaining why exactly: but FYI
  - some leak
  - most break shit
  - almost all are easily fingerprinted and the combo of them would make you really stand out
- removed the duplicate `ui.prefersReducedMotion` - this should move to personal as well
- moved `ui.systemUsesDarkTheme` to personal
2021-08-20 02:13:53 +00:00
Thorin-Oakenpants
5ab3c47b6b
7001: tweak
F11 has nothing to do with the API or why
2021-08-19 15:26:22 +00:00
Thorin-Oakenpants
45c52b6620
start section 7000s 2021-08-19 14:44:06 +00:00
Thorin-Oakenpants
93f6aea06a
1605: change to active enforced 2021-08-19 13:17:07 +00:00
Thorin-Oakenpants
00fa8f1b50
general.warnOnAboutConfig
ac84da2af4
2021-08-19 02:14:23 +00:00
Thorin-Oakenpants
ac84da2af4
remove XHTML config warning
dead weight: ESR users will already be aware of and ticked the warning box by now
2021-08-19 02:07:03 +00:00
Thorin-Oakenpants
f19d850845
tidy #1235
8000s (was 4600s)
- move below personal, so user-relevant part is shorter
- swap out font vis with document fonts + font whitelist
   - font vis still has usability/visual purposes: it just won't really help much with fingerprinting
   - ESR78 users (who can't use font vis), sorry, but we made doc fonts inactive for a while now, and now recommend you don't use it anyway
2021-08-19 01:46:47 +00:00
Thorin-Oakenpants
7264271063
rusty-snake improvements, #1235 2021-08-19 00:15:30 +00:00
Thorin-Oakenpants
dc63a752a5
tidy 0300 + 0301 2021-08-18 13:55:41 +00:00
Thorin-Oakenpants
a70c312938
goodbye battery
- dead weight since 2017-06-13 when ESR45 reached EOL .. good riddance
- if someone does use it, it's not going to do any harm, so no need to carry it for prefsCleaner
2021-08-18 12:46:24 +00:00
Thorin-Oakenpants
2ce269362e
dom.battery.enabled 2021-08-18 12:40:27 +00:00
Thorin-Oakenpants
29ad768a22
RFP tweak
letterboxing is not part of RFP, it is a separate pref: bugzilla and FF version info is in 4504
2021-08-18 09:08:36 +00:00
Thorin-Oakenpants
679648b33e
RFP info tweak 2021-08-18 09:03:16 +00:00
Thorin-Oakenpants
783786290d
tidy
- geo -> warning
- merge container prefs
- remove redundant "see"s
- remove corresponding 4600's item number in RFP mitigations
   - it's pretty clear by the preference names in 4600
   - could be misconstrued that the 4600 pref is the same result
- RFP's language prompt only checks for en*, not en-US (so en-GB, en-CA etc do not get prompted)
   - https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPHelper.jsm#196
2021-08-18 08:24:44 +00:00
Thorin-Oakenpants
e7e6cfffe8
0503: tidy 2021-08-18 07:30:55 +00:00
Thorin-Oakenpants
08e9fb35fd
update some references 2021-08-18 07:16:19 +00:00
Thorin-Oakenpants
fdc9376c69
tidy
- 0105*: merge into a single block
- 1220: make values more readable with spaces, like 2701 (no need for value 2), add default, update advise (get a new AV, SHA1 is dead baby)
- 2619: remove fluff
2021-08-18 01:50:09 +00:00
Thorin-Oakenpants
41c3c0ec26
tweak 2522: webgl
- we already disable webgl, that's enough
- the other two prefs are not going to provide much protection if a user decides they want webgl
- "disable-fail-if-major-performance-caveat" only applies to ESR78 and will removed in the future
- one (or two) less pref(2) for users to troubleshoot/flip
2021-08-17 03:47:33 +00:00
Thorin-Oakenpants
d7208ccf34
tidy 2021-08-17 03:41:56 +00:00
Thorin-Oakenpants
77410bf86d
musical chairs part 2
merge plugins with webrtc (camera + mic) and "media"
2021-08-17 03:08:48 +00:00
Thorin-Oakenpants
1d63e836ee
musical chairs part 1
- move 2200s into respective sections
- move FPing items into 2500s
2021-08-17 02:52:19 +00:00
Thorin-Oakenpants
668e843fce
misc
- remove 2720
   - this is a very old pref, been inactive since at least our first github release: v51
   - disabling the API is not how you control client side state: you do that by blocking cookies which also controls other state such as IDB etc
- 2700 section header
  - history/downloads is redundant
  - Offline Website Data info -> relevant item number with Active Logins info
  - ^ technically it still includes appCache for ESR78 users, but that will be moot in less than three months
- tidy RFP
  - update to FF91 userAgent spoofing: there is no Android ESR so we don't need to mention "Android 9"
  - we don't need to say if the API is enabled for mediaDevices
2021-08-16 15:34:57 +00:00
Thorin-Oakenpants
51e388ae86
dom.storage.enabled 2021-08-16 15:06:06 +00:00
Thorin-Oakenpants
e7872b193b
!yoda
no bytes were harmed in the making of this commit
2021-08-16 04:22:46 +00:00
Thorin-Oakenpants
8d6ee7c0c7
oophs 2021-08-16 04:18:12 +00:00
Thorin-Oakenpants
7d1e244f5a
0506: clarify
oh noes! what's blocked, the pref or the ping? .. also save MOAR bytes
2021-08-16 04:10:20 +00:00
Thorin-Oakenpants
dcc736bb85
I meant 14 lines, u lucky bastards 2021-08-16 04:03:56 +00:00
Thorin-Oakenpants
68568c1abf
trim 1198 bytes (u lucky bastards!) + 13 lines 2021-08-16 04:02:15 +00:00
Thorin-Oakenpants
1b33f574bb
RFP stuff 2021-08-14 04:44:50 +00:00
Thorin-Oakenpants
568a05ad7d
2502: trim
this info is useless .. save three lines
2021-08-14 04:18:04 +00:00
icpantsparti
c45094fdd9
nits! (edit 2 typos) (#1232) 2021-08-11 20:56:51 +00:00
Thorin-Oakenpants
c3b7f7538c
i do not like mixed case lists 2021-08-10 01:21:04 +00:00
Thorin-Oakenpants
4b38e20f14
change 4600s into do not use, #1221 (#1225)
see https://github.com/arkenfox/user.js/issues/1221#issuecomment-895623028
2021-08-10 00:18:19 +00:00
Thorin-Oakenpants
d19d4ba784
final update
in hindsight, the original name is more accurate
2021-08-09 20:42:51 +00:00
Thorin-Oakenpants
dd112a167d
final update 2021-08-09 20:39:47 +00:00
Thorin-Oakenpants
92b7fb81d0
fixup STATS year 2021-08-04 18:45:15 +00:00
Thorin-Oakenpants
404d1d466a
update [STATS]
- just in time for ESR91
2021-08-04 17:23:38 +00:00
Thorin-Oakenpants
06e5de4332
tweak windows SSO info/reference 2021-08-04 10:32:33 +00:00
Thorin-Oakenpants
eb4363dc18
tweak info in section 2800 header, #1223 2021-08-01 17:36:04 +00:00
Thorin-Oakenpants
5c93ebb54f
misc, closes #1220 2021-07-30 05:48:17 +00:00
Thorin-Oakenpants
b8f3d93a5c
v90 2021-07-26 03:11:09 +00:00
Thorin-Oakenpants
f53f01823f
1203 default info 2021-07-24 12:56:27 +00:00
Thorin-Oakenpants
18dbb56a3d
put 1203 back
see 3bb9fc713f
2021-07-24 12:51:15 +00:00
Thorin-Oakenpants
cc8674c16d
revert last commit 2021-07-24 12:49:39 +00:00
Thorin-Oakenpants
f394fd0290
move webgl to hardware fingerprinting
- merge into a single number, update the alt pref number
- update RFP info to reflect that it is not a cure-all
2021-07-24 01:56:46 +00:00
Thorin-Oakenpants
f24899fcac
cleanup language specific links 2021-07-24 01:04:03 +00:00
Thorin-Oakenpants
a7ba61c0d4
0304: background service app update [windows]
- the service implies a check is done first, I'm more concerned with the actual updating: not that updates are bad, it's about controlling when (if ever e.g. my test suite)
- since 0301 has to be done manually in Windows, 0302 is a good fallback **IF** the background service is applicable (read the link)
- clean up the numbering
2021-07-24 00:52:38 +00:00
Thorin-Oakenpants
babb9f3682
4612: remove outdated confusing line 2021-07-22 03:41:39 +00:00
Thorin-Oakenpants
b22e349d44
make 4620 more accurate and match RFP section info 2021-07-20 03:38:49 +00:00
Thorin-Oakenpants
bb48fe4ebe
RFP: 4612 is not disabled (by default) 2021-07-20 03:34:49 +00:00
Thorin-Oakenpants
44a8088481
tidy
- "enforce" is for when we set the default value
- use [WARNING] for inactive (they're inactive for a reason and people really do not need to turn them on) but less scary [NOTE] for active (tweak away at your own risk)
  - seems neater, easier and less scary for users setting up the first time: i.e they only need to initially look at active items
  - FYI: I was going to add something to LSNG (2760) that it is required for Fission, but will wait, and it struck me that 2680 was the only active item with a warning: seems inconsistent
- 2684: security delay .. make enforce mean enforce (default) ... not worth occasionally saving .3 seconds
   - for now it's one less item in differences/flips
   - might make this inactive in 91+, and add a warning
   - it has been a very long time since we added this due to bad advise/references on the internet on how to speed up Firefox
2021-07-20 02:51:52 +00:00
Thorin-Oakenpants
4c8c9bc01f
security.tls.version.enable-deprecated
default false since it was added in FF71 - see https://bugzilla.mozilla.org/1579285
2021-07-20 02:02:26 +00:00
Thorin-Oakenpants
3bb9fc713f
remove 1203
default false since it was added in FF71 - see https://bugzilla.mozilla.org/1579285
2021-07-20 02:00:33 +00:00
Thorin-Oakenpants
b761a9dd32
4505: experimental RFP prefs
and tidy up all instances (eight) of "do not use": all caps, no asterisks, immediately after [warning]
2021-07-08 07:08:38 +00:00
Thorin-Oakenpants
0da2ecdb4d
keep current rather than every ESR 2021-07-08 06:41:59 +00:00
Thorin-Oakenpants
31e864c16c
0913: disable windows SSO FF91+
- and make 2730 more accurate and add bugzilla
- future RFP additions will be FF91+
2021-07-08 06:21:53 +00:00
earthlng
acc1376c37
Update arkenfox-clear-deprecated.js 2021-07-07 14:33:20 +00:00
earthlng
939d75e5eb
Update arkenfox-clear-removed.js 2021-07-07 14:25:08 +00:00
earthlng
3b573bf9f0
Update arkenfox-clear-RFP-alternatives.js 2021-07-07 14:15:51 +00:00
earthlng
a231c1e90e
Update arkenfox-clear-RFP-alternatives.js 2021-07-07 14:10:24 +00:00
Thorin-Oakenpants
f229a3cb75
fixup FF90 deprecated (#1207) 2021-07-07 11:51:44 +00:00
Thorin-Oakenpants
981462ee54
FF90 deprecated 2021-07-06 13:26:44 +00:00
Thorin-Oakenpants
d940ffb3c6
105c: add "sponsored shortcuts" 2021-07-06 06:32:58 +00:00
Thorin-Oakenpants
a6d20eaf5b
1264: update ciphers, fixes #1196 (#1197) 2021-06-23 16:22:10 +00:00
Thorin-Oakenpants
b93a5e334c
2510 webaudio -> inactive RFP alts, closes #1194 2021-06-20 12:49:57 +00:00
Thorin-Oakenpants
c98606430c
move 2505 to RFP alts, closes #1099 2021-06-20 09:29:38 +00:00
Thorin-Oakenpants
12c0631900
4501: remove confusing RFP line 2021-06-16 16:48:14 +00:00
Thorin-Oakenpants
efcceaf2c3
enforce non-native widget theme 2021-06-15 09:55:42 +00:00
earthlng
9018577a3e
v1.4 (#1189)
- add -s parameter to start immediately / skip prompt / run non-interactive

This is useful if the user wants to automate the process of updating the user.js and cleaning prefs.

- fQuit: error messages to stderr
- fFF_check: info msg to stderr

Better support for suppressing/redirecting stdout while still showing any error messages in the console, useful for example with `prefsCleaner.sh -s >/dev/null`
2021-06-07 11:18:40 +00:00
earthlng
6968b9a369
v3.2 - proper fix for the diff issue
- re-arrange the match patterns to fix the remaining issue of dropping lines after the 9999 block
- make it work on Mac too
- use `|` where possible so we don't need to escape the forward-slashes. That saves a few bytes and makes the pattern easier to read
2021-06-06 21:30:14 +00:00
earthlng
ada31d4f50
v3.1 - (mostly) fix diff functionality
see #1188 

this should fix the issue that "All prefs after a multi-line comment declaration, on a single line, are deleted with the remove_comments function from the updater."
2021-06-06 18:01:56 +00:00
Thorin-Oakenpants
d973e11714
add instagram word, closes #1184 2021-06-05 17:36:56 +00:00
Thorin-Oakenpants
b6d7b2bff5
RFP info tweak 2021-06-01 11:02:30 +00:00
Thorin-Oakenpants
74f804a056
1243: more dead flash 2021-05-25 18:19:22 +00:00
Thorin-Oakenpants
f0b5e3649d
tidy 2021-05-25 17:46:45 +00:00
Thorin-Oakenpants
9cc132e69d
security.ssl.enable_ocsp_stapling
default true since FF26
2021-05-25 17:32:07 +00:00
Thorin-Oakenpants
9419e2faab
remove 1210
been default true since FF26 - thanks earthlng
2021-05-25 17:30:40 +00:00
Thorin-Oakenpants
0566ded651
fixup, closes #1174 2021-05-09 17:52:38 +00:00
Thorin-Oakenpants
ba9b3c217b
tweak 4600s: closes #1172 2021-05-08 14:45:32 +00:00
Thorin-Oakenpants
79c5539edb
goodbye flash
The prefs still exist, but won't do anything since most of the NPAPI code has been removed
2021-05-05 16:41:43 +00:00
Thorin-Oakenpants
cfd7cd01d1
cleanup 0500s, #1170
- they all have on/off switches
- dxr no longer exists: update URL
- don't recommend users delete files
   - saves two lines
   - they poses zero threat (they have prefs)
   - deleting them can causes unwanted console errors/noise
2021-04-25 11:18:39 +00:00
Thorin-Oakenpants
da9f912862
2620: disable pdfjs scripting, v88 final 2021-04-23 14:25:54 +00:00
Thorin-Oakenpants
9930cfbc07
0102: add setup tag #1166 2021-04-17 07:12:20 +00:00
Thorin-Oakenpants
7738e320d5
RFP & Presentation API 2021-04-15 07:10:54 +00:00
Thorin-Oakenpants
9b8735a87a
webgl.min_capability_mode 2021-04-08 01:21:14 +00:00
Thorin-Oakenpants
6c10e03ce5
2012: remove webgl.min_capability_mode
as promised in 4596d721e6
2021-04-08 01:19:42 +00:00
Thorin-Oakenpants
7ad3bb9e61
0702: use a [STATS] tag 2021-04-07 09:44:24 +00:00
Thorin-Oakenpants
5dcf639d33
oophs .. and start 88-alpha 2021-04-07 09:36:56 +00:00
Thorin-Oakenpants
2da3b0192f
update HTTP2 stats 2021-04-07 09:36:01 +00:00
Thorin-Oakenpants
ada8158caf
v87 2021-04-04 20:33:23 +00:00
Thorin-Oakenpants
2071939c5e
use [TOR] tags, add 1247
not that we recommend using tor over firefox: but at least the info is there for fiddlers
2021-04-04 14:21:24 +00:00
Thorin-Oakenpants
f082278217
1607: save one line and some bytes
and make it even MOAR clear we do NOT support tor over firefox
2021-04-04 14:15:53 +00:00
Thorin-Oakenpants
abe37add6e
save some overrides, closes #1157
I do not think anyone will bemoan these four "personal" choices
2021-04-04 12:54:17 +00:00
Thorin-Oakenpants
bc07ca94c0
1830: add [TEST] 2021-04-04 12:37:17 +00:00
Thorin-Oakenpants
728c962684
2402: potential clipboard leak fixed in FF89+
Thanks @gwarser for testing, creating the bugzilla, being patient, and confirming the fix
2021-04-04 12:01:49 +00:00
Thorin-Oakenpants
ca99add006
turn ETP on everywhere
It literally cannot hurt [1], and makes it easier for users to use custom mode with TCP/dFPI. Turning on socialtracking helps gain parity with strict mode

[1] gorhill: https://old.reddit.com/r/firefox/comments/l7xetb/network_priority_for_firefoxs_enhanced_tracking/gl9rn9n/
> All extensions and ETP work in parallel, they all inspect network requests and all make the decision to block or not, hence if they all decide to block, they will all report that they block something. ETP is a bit different than normal extension in that it will give precedence to an extension trying to redirect to a local resource, this ensures ETP works harmoniously with normal extensions.
> 
> Once something is not blocked, it then goes through a DNS query, and the browser waits for the response.
> 
> I will add examples of how ETP + multiple blocker extensions work together when dealing with a network request; let's say "A" and "B" are two different blockers:
> 
>   - ETP=block, A=allow, B=allow: result=block
>   - ETP=allow, A=block, B=allow: result=block
>   - ETP=allow, A=allow, B=redirect: result=redirect
>   - ETP=allow, A=block, B=redirect: result=block
>   - ETP=block, A=allow, B=redirect: result=redirect
> 
> So as you can see, ETP is a bit different than a normal extension in that it won't prevent redirection from happening if ever a network request is redirected by one of the normal extension.
2021-04-04 11:49:07 +00:00
Thorin-Oakenpants
f771027138
2720 was removed in FF72
https://bugzilla.mozilla.org/1488583
2021-04-04 11:18:54 +00:00
Thorin-Oakenpants
8f1c0044b9
2701: add cookie behavior 5 2021-04-04 11:07:39 +00:00
Thorin-Oakenpants
87cd828b5b
browser.send_pings.require_same_host
redundant/defense-in-depth pref for `browser.send_pings` which is still at default false after six years of watching it (false is what we want)
2021-04-03 14:25:46 +00:00
Thorin-Oakenpants
46ccd9f654
cleanup 0600s
three prefs are default since at least 78, and one pref is redundant for a pref that has been at our default since it was added
2021-04-03 14:20:39 +00:00
Thorin-Oakenpants
b1927f9de1
1607 make inactive
Useless, since Firefox doesn't use Tor (and which we don't recommend). It was added for the info factor.
2021-03-27 18:42:52 +00:00
Thorin-Oakenpants
b592e0e592
87 deprecated
It is simpler to leave the PointerEvent pref where it is, until ESR78 is EOL
- FF87+ users who use RFP Alts simply add a dead pref, no harm
- This way ESR78 users don't have to worry about extra char flipping: it's the same as before: 1 flip for ESR, 1 flip for RFP Alts
2021-03-27 07:49:14 +00:00
Thorin-Oakenpants
3b6cd93749
1606: default Referrer Policy default 2021-03-27 07:32:19 +00:00
Thorin-Oakenpants
3a24c01f03
0518: enforce no Web Compat Reporter
only stable is false, at the time of writing. but enforcing this for all channels is good, so no-one ends up wasting mozilla resources reporting a compat problem when they've got 200 odd prefs flipped
2021-03-17 14:01:16 +00:00
Thorin-Oakenpants
b7c80841a9
tweak defaults (#1140)
- don't differentiate between channels
- both can be made inactive
   - webcompat requires user action: and I don't see this as a bad thing to have in non-stable
   - unsubmitted crashReports on Nightly is probably already covered by killing the URL, so no big deal
2021-03-14 11:21:13 +00:00
earthlng
95645f59a3
Add files via upload 2021-03-11 14:06:38 +00:00
Thorin-Oakenpants
9138e342fd
misc (#1136)
- 0000: remove old XUL info, dropped in FF73+
- 0201: save 3 chars
- 0350: add default status for unsubmittedCheck
- 0351: change to enforce: has been default false going back to at least FF60, including current Beta/Dev/Nightly
   - along with 0602 `network.dns.disablePrefetchFromHTTPS` and 0603 `network.predictor.enable-prefetch`, I considered making them inactive, but decided it was good to leave them active for non-stable users just in case they get flipped
- 0515: add default status
- 0850c: remove info: out of date: doesn't work lilke that anymore and can't be assed figuring it out what with megabar and urlbar2 changes
- 0871: make inactive: default false since at least FF60
   - no need to enforce for non-stable in case it is flipped. It's a pretty minor shoulder-surfer privacy issue and the previews are small. If you're not sure what this pref does. On false you get one tab shown, on true you get as many as can fit across your screen. I squeezed in 15, and after that it became a list
- fixup `***/`
- shave off six lines and almost 400 bytes for you bastards
2021-03-10 00:06:30 +00:00
Thorin-Oakenpants
692ed70ea9
remove maintenance of this comment 2021-03-08 01:49:21 +00:00
earthlng
3430507ae4
v3.0 - improve readIniFile() (#1128)
- grep -c equals grep | wc -l
- make output prettier
- work with variable instead of temporary file

+ a few minor changes/cleanup
2021-03-07 13:29:33 +00:00
Thorin-Oakenpants
844f3ce9c8
tidy 2021-03-05 10:15:26 +00:00
Thorin-Oakenpants
03ffb90186
start 87-alpha, also fixes #1129
make all inactive permissions.default = same, blocked
2021-03-02 20:02:41 +00:00
Thorin-Oakenpants
5f9bb59b95
86 final 2021-02-28 20:49:57 +00:00
Thorin-Oakenpants
7163efdd1e
1825: inactive: it is redundant, fixes #1107 2021-02-28 15:57:27 +00:00
Thorin-Oakenpants
65fb24ff1b
layout.css.visited_links_enabled
added back to the user.js in 612cfbf313
2021-02-27 21:20:00 +00:00
Thorin-Oakenpants
612cfbf313
0805: re-add visited links
It can still be used to mitigate social engineering attacks (e.g. using visibility and user clicks), and advanced/targeted scripts
2021-02-27 21:18:17 +00:00
Thorin-Oakenpants
4596d721e6
2012: make webgl.min_capability_mode inactive
- This is too minimal to be of any use, breaks too much (e.g. zoom video)
- Tor browser stopped flipping this (I *think*) about 5 years ago: it certainly hasn't been used in ESR60+ based TB builds, I checked
- we already disable webgl, so making this inactive removes yet another pref users need to flip/troubleshoot
- I will leave it in the user js for a few releases so prefsCleaner will pick it up
2021-02-26 11:39:52 +00:00
Thorin-Oakenpants
911206eed5
5000s: disable ctrl-q quit shortcut FF87+
https://bugzilla.mozilla.org/show_bug.cgi?id=52821 .. 21 years, old enough to drink and vote
2021-02-25 01:22:08 +00:00
Thorin-Oakenpants
cb5cdca99d
update adding site exceptions
- https://bugzilla.mozilla.org/show_bug.cgi?id=1692553
- also HoM is not Page Info
2021-02-24 22:10:29 +00:00
Thorin-Oakenpants
e54ae46537
1204: ssl session ids inactive, closes #1110 2021-02-24 15:11:59 +00:00
Thorin-Oakenpants
7c978d4e70
0708: FTP default FF88+
https://bugzilla.mozilla.org/show_bug.cgi?id=1691890
2021-02-22 20:05:25 +00:00
Thorin-Oakenpants
d905b4387d
deprecated: put FF86 items in the right place 2021-02-21 20:52:20 +00:00
Thorin-Oakenpants
c31c825a74
2212: popup events, fixes DDG
https://bugzilla.mozilla.org/show_bug.cgi?id=1686045
2021-02-18 15:50:37 +00:00
Thorin-Oakenpants
6505a9fefd
FF86 deprecated 2021-02-18 15:30:58 +00:00
Thorin-Oakenpants
de74f812ee
2012: webgl default FF86+ 2021-02-18 15:00:06 +00:00
Thorin-Oakenpants
82bb3f987d
2604, closes #1111 2021-02-08 07:20:06 +00:00
Thorin-Oakenpants
a35a616de7
highlight 1603 (cross origin referer), fixes 1108
especially since we recently hardened it: also added it to the few things highlighted in the wiki
2021-02-04 07:19:28 +00:00
Thorin-Oakenpants
ecf99bf9e7
0603: add default value
AFAICT:  false 48-51: true 52-55.0.1/ESR52.1: false ever since
2021-02-03 16:45:34 +00:00
Thorin-Oakenpants
cfaf354fe3
oophs, better start 86-alpha 2021-02-02 04:09:50 +00:00
Thorin-Oakenpants
0b51e98d91
media.gmp-widevinecdm.visible, see #1107 2021-02-01 17:25:00 +00:00
Thorin-Oakenpants
fa51251235
remove widevine vis pref, see #1107
- It is controlled in both runtime and via user.js by the state of `media.eme.enabled`. Also, who cares about the vis of a ui option
- note, there is no need to add this to the removed scratchpad list
2021-02-01 17:17:16 +00:00
Thorin-Oakenpants
21fcd0bd35
update xul/xhtml config info
- the XUL version is also pre FF71
- the XHTML version was removed in FF87+
2021-02-01 05:14:46 +00:00
Thorin-Oakenpants
96d558dd0c
add window.name test 2021-01-31 07:28:05 +00:00
Thorin-Oakenpants
b6e8dcab81
fixup spelling mistake 2021-01-30 00:28:28 +00:00
30 changed files with 1333 additions and 2080 deletions

View File

@ -1,29 +1,31 @@
---
name: Troubleshooting help
about: Ask for help to solve problems with user.js
title: ''
title: 'follow instructions or this will be closed as invalid'
labels: ''
assignees: ''
---
Before you proceed...
- Issues will be closed as invalid if you do not [troubleshoot](https://github.com/arkenfox/user.js/wiki/1.4-Troubleshooting), including
- confirming the problem is caused by the `user.js`
- searching the `[Setup` tags in the `user.js`
- Search the GitHub repository. The information you need is most likely here already.
- Note: We do not support forks
<!--
See also:
- Override Recipes [issue 1080](https://github.com/arkenfox/user.js/issues/1080)
- Extension breakage due to prefs [issue 391](https://github.com/arkenfox/user.js/issues/391)
- Prefs vs Recommended Extensions: Co-Existance+Enhancement | Conflicts [issue 350](https://github.com/arkenfox/user.js/issues/350)
Issues will be closed as invalid if you do not troubleshoot first, or if you ignore the required info in the template.
If you still need help, help us help you by providing relevant information:
- browser version
- Steps to Reproduce (STR)
- actual result
- expected result
- anything else you deem worth mentioning
We do not support forks or no-longer supported releases.
Clear all of this when you're ready to type.
-->
🟥 https://github.com/arkenfox/user.js/wiki/5.2-Troubleshooting
- [ ] I have read the troubleshooting guide, done the checks and confirmed this is caused by arkenfox
- _unchecked issues ~~may~~ will be closed as invalid_
🟪 REQUIRED INFO
- Browser version & OS:
- Steps to Reproduce (STR):
- Expected result:
- Actual result:
- Console errors and warnings:
- Anything else you deem worth mentioning:
---

View File

@ -1,5 +1,5 @@
### 🟪 user.js
A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/arkenfox/user.js/wiki/1.1-Overview) wiki page.
A `user.js` is a configuration file that can control Firefox settings - for a more technical breakdown and explanation, you can read more in the [wiki](https://github.com/arkenfox/user.js/wiki/2.1-User.js)
### 🟩 the arkenfox user.js
@ -7,21 +7,20 @@ A `user.js` is a configuration file that can control hundreds of Firefox setting
The `arkenfox user.js` is a **template** which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).
Everyone, experts included, should at least read the [implementation](https://github.com/arkenfox/user.js/wiki/1.3-Implementation) wiki page, as it contains important information regarding a few `user.js` settings.
Everyone, experts included, should at least read the [wiki](https://github.com/arkenfox/user.js/wiki), as it contains important information regarding a few `user.js` settings. There is also an [interactive current release](https://arkenfox.github.io/gui/), thanks to [icpantsparti2](https://github.com/icpantsparti2).
Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) if your [threat model](https://www.torproject.org/about/torusers.html.en) calls for it, or for accessing hidden services.
Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) if your [threat model](https://2019.www.torproject.org/about/torusers.html) calls for it, or for accessing hidden services.
Also be aware that the `arkenfox user.js` is made specifically for desktop Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.
### 🟧 sitemap
- [Releases](https://github.com/arkenfox/user.js/releases)
- [releases](https://github.com/arkenfox/user.js/releases)
- [changelogs](https://github.com/arkenfox/user.js/issues?utf8=%E2%9C%93&q=is%3Aissue+label%3Achangelog)
- [Wiki](https://github.com/arkenfox/user.js/wiki)
- [wiki](https://github.com/arkenfox/user.js/wiki)
- [stickies](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+is%3Aopen+label%3A%22sticky+topic%22)
- [diffs](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+label%3Adiffs)
- [common questions and answers](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+label%3Aanswered)
### 🟥 acknowledgments
Literally thousands of sources, references and suggestions. Many thanks, and much appreciated.

View File

@ -3,17 +3,19 @@ TITLE prefs.js cleaner
REM ### prefs.js cleaner for Windows
REM ## author: @claustromaniac
REM ## version: 2.4
REM ## version: 2.7
CD /D "%~dp0"
IF /I "%~1"=="-unattended" (SET _ua=1)
:begin
ECHO:
ECHO:
ECHO ########################################
ECHO #### prefs.js cleaner for Windows ####
ECHO #### by claustromaniac ####
ECHO #### v2.4 ####
ECHO #### v2.7 ####
ECHO ########################################
ECHO:
CALL :message "This script should be run from your Firefox profile directory."
@ -22,17 +24,22 @@ CALL :message "This will allow inactive preferences to be reset to their default
ECHO This Firefox profile shouldn't be in use during the process.
CALL :message ""
TIMEOUT 1 /nobreak >nul
CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
CLS
IF ERRORLEVEL 3 (EXIT /B)
IF ERRORLEVEL 2 (GOTO :showhelp)
IF NOT DEFINED _ua (
CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
CLS
IF ERRORLEVEL 3 (EXIT /B)
IF ERRORLEVEL 2 (GOTO :showhelp)
)
IF NOT EXIST "user.js" (CALL :abort "user.js not found in the current directory." 30)
IF NOT EXIST "prefs.js" (CALL :abort "prefs.js not found in the current directory." 30)
CALL :strlenCheck
CALL :FFcheck
CALL :message "Backing up prefs.js..."
SET "_time=%time: =0%"
COPY /B /V /Y prefs.js "prefs-backup-%date:/=-%_%_time::=.%.js"
FOR /F "delims=" %%# IN ('powershell get-date -format "{yyyyMMdd_HHmmss}"') DO @SET ldt=%%#
COPY /B /V /Y prefs.js "prefs-backup-%ldt%.js"
CALL :message "Cleaning prefs.js..."
CALL :cleanup
CALL :message "All done!"

136
prefsCleaner.sh Normal file → Executable file
View File

@ -2,37 +2,83 @@
## prefs.js cleaner for Linux/Mac
## author: @claustromaniac
## version: 1.3
## version: 2.1
## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
currdir=$(pwd)
## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_prefsCleaner() )
readonly CURRDIR=$(pwd)
## get the full path of this script (readlink for Linux, greadlink for Mac with coreutils installed)
sfp=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
SCRIPT_FILE=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
## fallback for Macs without coreutils
if [ -z "$sfp" ]; then sfp=${BASH_SOURCE[0]}; fi
[ -z "$SCRIPT_FILE" ] && SCRIPT_FILE=${BASH_SOURCE[0]}
## change directory to the Firefox profile directory
cd "$(dirname "${sfp}")"
AUTOUPDATE=true
QUICKSTART=false
## download method priority: curl -> wget
DOWNLOAD_METHOD=''
if command -v curl >/dev/null; then
DOWNLOAD_METHOD='curl --max-redirs 3 -so'
elif command -v wget >/dev/null; then
DOWNLOAD_METHOD='wget --max-redirect 3 --quiet -O'
else
AUTOUPDATE=false
echo -e "No curl or wget detected.\nAutomatic self-update disabled!"
fi
fQuit() {
## change directory back to the original working directory
cd "${currdir}"
echo -e "\n$2"
cd "${CURRDIR}"
[ "$1" -eq 0 ] && echo -e "\n$2" || echo -e "\n$2" >&2
exit $1
}
fUsage() {
echo -e "\nUsage: $0 [-ds]"
echo -e "
Optional Arguments:
-s Start immediately
-d Don't auto-update prefsCleaner.sh"
}
download_file() { # expects URL as argument ($1)
declare -r tf=$(mktemp)
$DOWNLOAD_METHOD "${tf}" "$1" &>/dev/null && echo "$tf" || echo '' # return the temp-filename or empty string on error
}
fFF_check() {
# there are many ways to see if firefox is running or not, some more reliable than others
# this isn't elegant and might not be future-proof but should at least be compatible with any environment
while [ -e lock ]; do
echo -e "\nThis Firefox profile seems to be in use. Close Firefox and try again.\n"
read -p "Press any key to continue."
echo -e "\nThis Firefox profile seems to be in use. Close Firefox and try again.\n" >&2
read -r -p "Press any key to continue."
done
}
## returns the version number of a prefsCleaner.sh file
get_prefsCleaner_version() {
echo "$(sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p' "$1")"
}
## updates the prefsCleaner.sh file based on the latest public version
update_prefsCleaner() {
declare -r tmpfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/prefsCleaner.sh')"
[ -z "$tmpfile" ] && echo -e "Error! Could not download prefsCleaner.sh" && return 1 # check if download failed
[[ $(get_prefsCleaner_version "$SCRIPT_FILE") == $(get_prefsCleaner_version "$tmpfile") ]] && return 0
mv "$tmpfile" "$SCRIPT_FILE"
chmod u+x "$SCRIPT_FILE"
"$SCRIPT_FILE" "$@" -d
exit 0
}
fClean() {
# the magic happens here
prefs="@@"
@ -41,7 +87,7 @@ fClean() {
if [[ "$line" =~ $prefexp && $prefs != *"@@${BASH_REMATCH[1]}@@"* ]]; then
prefs="${prefs}${BASH_REMATCH[1]}@@"
fi
done <<< "`grep -E \"$prefexp\" user.js`"
done <<< "$(grep -E "$prefexp" user.js)"
while IFS='' read -r line || [[ -n "$line" ]]; do
if [[ "$line" =~ ^$prefexp ]]; then
@ -54,34 +100,72 @@ fClean() {
done < "$1" > prefs.js
}
fStart() {
if [ ! -e user.js ]; then
fQuit 1 "user.js not found in the current directory."
elif [ ! -e prefs.js ]; then
fQuit 1 "prefs.js not found in the current directory."
fi
fFF_check
mkdir -p prefsjs_backups
bakfile="prefsjs_backups/prefs.js.backup.$(date +"%Y-%m-%d_%H%M")"
mv prefs.js "${bakfile}" || fQuit 1 "Operation aborted.\nReason: Could not create backup file $bakfile"
echo -e "\nprefs.js backed up: $bakfile"
echo "Cleaning prefs.js..."
fClean "$bakfile"
fQuit 0 "All done!"
}
while getopts "sd" opt; do
case $opt in
s)
QUICKSTART=true
;;
d)
AUTOUPDATE=false
;;
esac
done
## change directory to the Firefox profile directory
cd "$(dirname "${SCRIPT_FILE}")"
# Check if running as root and if any files have the owner as root/wheel.
if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
fQuit 1 "You shouldn't run this with elevated privileges (such as with doas/sudo)."
elif [ -n "$(find ./ -user 0)" ]; then
printf 'It looks like this script was previously run with elevated privileges,
you will need to change ownership of the following files to your user:\n'
find . -user 0
fQuit 1
fi
[ "$AUTOUPDATE" = true ] && update_prefsCleaner "$@"
echo -e "\n\n"
echo " ╔══════════════════════════╗"
echo " ║ prefs.js cleaner ║"
echo " ║ by claustromaniac ║"
echo " ║ v1.3 ║"
echo " ║ v2.1 ║"
echo " ╚══════════════════════════╝"
echo -e "\nThis script should be run from your Firefox profile directory.\n"
echo "It will remove any entries from prefs.js that also exist in user.js."
echo "This will allow inactive preferences to be reset to their default values."
echo -e "\nThis Firefox profile shouldn't be in use during the process.\n"
[ "$QUICKSTART" = true ] && fStart
echo -e "\nIn order to proceed, select a command below by entering its corresponding number.\n"
select option in Start Help Exit; do
case $option in
Start)
if [ ! -e user.js ]; then
fQuit 1 "user.js not found in the current directory."
elif [ ! -e prefs.js ]; then
fQuit 1 "prefs.js not found in the current directory."
fi
fFF_check
bakfile="prefs.js.backup.$(date +"%Y-%m-%d_%H%M")"
mv prefs.js "${bakfile}" || fQuit 1 "Operation aborted.\nReason: Could not create backup file $bakfile"
echo -e "\nprefs.js backed up: $bakfile"
echo "Cleaning prefs.js..."
fClean "$bakfile"
fQuit 0 "All done!"
fStart
;;
Help)
fUsage
echo -e "\nThis script creates a backup of your prefs.js file before doing anything."
echo -e "It should be safe, but you can follow these steps if something goes wrong:\n"
echo "1. Make sure Firefox is closed."
@ -97,3 +181,5 @@ select option in Start Help Exit; do
;;
esac
done
fQuit 0

View File

@ -0,0 +1,144 @@
/***
This will reset the preferences that since FF91 have been
- removed from the arkenfox user.js
- deprecated by Mozilla but listed in the arkenfox user.js in the past
There is an archived version at https://github.com/arkenfox/user.js/issues/123
if you want the full list since jesus
Last updated: 23-June-2024
Instructions:
- [optional] close Firefox and backup your profile
- [optional] disable your network connection [1]
- start Firefox
- load about:config and press Ctrl+Shift+K to open the Web Console for about:config
- using about:config is important, so the script has the right permissions
- paste this script
- if you edited the list of prefs in the script, make sure the last pref does not have a trailing comma
- hit enter
- check the Info output to see which prefs were reset
- restart
- some prefs require a restart
- a restart will reapply your user.js
- [optional] re-enable your network connection
[1] Blocking Firefox from the internet ensures it cannot act on your reset preferences in the
period before you restart it, such as app and extension auto-updating, or downloading unwanted
components (GMP etc). It depends on what you're resetting and how long before you restart.
***/
(() => {
if ('undefined' === typeof(Services)) return alert('about:config needs to be the active tab!');
const aPREFS = [
/* DEPRECATED */
/* 116-128 */
'browser.contentanalysis.default_allow', // 127
'browser.messaging-system.whatsNewPanel.enabled', // 126
'browser.ping-centre.telemetry', // 123
'dom.webnotifications.serviceworker.enabled', // 117
'javascript.use_us_english_locale', // 119
'layout.css.font-visibility.private', // 118
'layout.css.font-visibility.resistFingerprinting', // 116
'layout.css.font-visibility.standard', // 118
'layout.css.font-visibility.trackingprotection', // 118
'network.dns.skipTRR-when-parental-control-enabled', // 119
'permissions.delegation.enabled', // 118
'security.family_safety.mode', // 117
'widget.non-native-theme.enabled', // 127
/* 103-115 */
'browser.cache.offline.enable', // 115
'extensions.formautofill.heuristics.enabled', // 114
'network.cookie.lifetimePolicy', // 103 [technically removed in 104]
'privacy.clearsitedata.cache.enabled', // 114
'privacy.resistFingerprinting.testGranularityMask', // 114
'security.pki.sha1_enforcement_level', // 103
/* 92-102 */
'browser.urlbar.suggest.quicksuggest', // 95
'dom.securecontext.whitelist_onions', // 97
'dom.storage.next_gen', // 102
'network.http.spdy.enabled', // 100
'network.http.spdy.enabled.deps',
'network.http.spdy.enabled.http2',
'network.http.spdy.websockets',
'layout.css.font-visibility.level', // 94
'security.ask_for_password', // 102
'security.csp.enable', // 99
'security.password_lifetime', // 102
'security.ssl3.rsa_des_ede3_sha', // 93
/* REMOVED */
/* 116-128 */
'browser.fixup.alternate.enabled',
'browser.taskbar.previews.enable',
'browser.urlbar.dnsResolveSingleWordsAfterSearch',
'media.gmp-widevinecdm.enabled',
'network.protocol-handler.external.ms-windows-store',
'privacy.partition.always_partition_third_party_non_cookie_storage',
'privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage',
'privacy.partition.serviceWorkers',
/* 103-115 */
'beacon.enabled',
'browser.startup.blankWindow',
'browser.newtab.preload',
'browser.newtabpage.activity-stream.feeds.discoverystreamfeed',
'browser.newtabpage.activity-stream.feeds.snippets',
'browser.region.network.url',
'browser.region.update.enabled',
'browser.search.region',
'browser.ssl_override_behavior',
'browser.tabs.warnOnClose',
'devtools.chrome.enabled',
'dom.disable_beforeunload',
'dom.disable_open_during_load',
'dom.netinfo.enabled',
'dom.vr.enabled',
'extensions.formautofill.addresses.supported',
'extensions.formautofill.available',
'extensions.formautofill.creditCards.available',
'extensions.formautofill.creditCards.supported',
'middlemouse.contentLoadURL',
'network.http.altsvc.oe',
/* 92-102 */
'browser.urlbar.trimURLs',
'dom.caches.enabled',
'dom.storageManager.enabled',
'dom.storage_access.enabled',
'dom.targetBlankNoOpener.enabled',
'network.cookie.thirdparty.sessionOnly',
'network.cookie.thirdparty.nonsecureSessionOnly',
'privacy.firstparty.isolate.block_post_message',
'privacy.firstparty.isolate.restrict_opener_access',
'privacy.firstparty.isolate.use_site',
'privacy.window.name.update.enabled',
'security.insecure_connection_text.enabled',
/* IMPORTANT: last active pref must not have a trailing comma */
/* reset parrot: check your open about:config after running the script */
'_user.js.parrot'
];
console.clear();
let c = 0;
for (const sPname of aPREFS) {
if (Services.prefs.prefHasUserValue(sPname)) {
Services.prefs.clearUserPref(sPname);
if (!Services.prefs.prefHasUserValue(sPname)) {
console.info('reset', sPname);
c++;
} else console.warn('failed to reset', sPname);
}
}
focus();
const d = (c==1) ? ' pref' : ' prefs';
alert(c ? 'successfully reset ' + c + d + "\n\nfor details check the console" : 'nothing to reset');
return 'all done';
})();

View File

@ -1,65 +0,0 @@
/***
Version: up to and including FF/ESR78
This will reset the preferences that are under sections 4600 & 4700 in the
arkenfox user.js. These are the prefs that are no longer necessary, or they
conflict with, privacy.resistFingerprinting if you have that enabled.
For instructions see:
https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
***/
(function() {
let ops = [
/* section 4600 */
'dom.maxHardwareConcurrency',
'dom.enable_resource_timing',
'dom.enable_performance',
'device.sensors.enabled',
'browser.zoom.siteSpecific',
'dom.gamepad.enabled',
'dom.netinfo.enabled',
'media.webspeech.synth.enabled',
'media.video_stats.enabled',
'dom.w3c_touch_events.enabled',
'media.ondevicechange.enabled',
'webgl.enable-debug-renderer-info',
'dom.w3c_pointer_events.enabled',
'ui.use_standins_for_native_colors',
'ui.systemUsesDarkTheme',
'ui.prefersReducedMotion',
/* section 4700 */
'general.useragent.override',
'general.buildID.override',
'general.appname.override',
'general.appversion.override',
'general.platform.override',
'general.oscpu.override',
/* reset parrot: check your open about:config after running the script */
'_user.js.parrot'
]
if("undefined" === typeof(Services)) {
alert("about:config needs to be the active tab!");
return;
}
let c = 0;
for (let i = 0, len = ops.length; i < len; i++) {
if (Services.prefs.prefHasUserValue(ops[i])) {
Services.prefs.clearUserPref(ops[i]);
if (!Services.prefs.prefHasUserValue(ops[i])) {
console.log("reset", ops[i]);
c++;
} else { console.log("failed to reset", ops[i]); }
}
}
focus();
let d = (c==1) ? " pref" : " prefs";
if (c > 0) {
alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
} else { alert("nothing to reset"); }
})();

View File

@ -1,248 +0,0 @@
/***
Version: up to and including FF/ESR78
This will reset the preferences that have been deprecated by Mozilla
and used in the arkenfox user.js
It is in reverse order, so feel free to remove sections that do not apply
For instructions see:
https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
***/
(function() {
let ops = [
/* deprecated */
/* 78 */
'media.autoplay.enabled.user-gestures-needed',
'toolkit.cosmeticAnimations.enabled',
/* 77 */
'browser.urlbar.oneOffSearches',
'browser.tabs.remote.allowLinkedWebInFileUriProcess',
/* 76 */
'extensions.blocklist.url',
/* 74 */
'geo.wifi.uri',
'geo.wifi.logging.enabled',
'privacy.userContext.longPressBehavior',
'webgl.disable-extensions',
/* 72 */
'browser.newtabpage.activity-stream.telemetry.ping.endpoint',
'toolkit.telemetry.hybridContent.enabled',
'dom.indexedDB.enabled',
/* 71 */
'devtools.webide.enabled',
'devtools.webide.autoinstallADBExtension',
'offline-apps.allow_by_default',
/* 69 */
'gfx.downloadable_fonts.woff2.enabled',
'plugins.click_to_play',
'media.autoplay.allow-muted',
/* 68 */
'browser.newtabpage.activity-stream.disableSnippets',
'browser.aboutHomeSnippets.updateUrl',
'lightweightThemes.update.enabled',
'security.csp.experimentalEnabled',
/* F67 */
'dom.event.highrestimestamp.enabled',
'browser.newtabpage.activity-stream.asrouter.userprefs.cfr',
/* 66 */
'browser.chrome.errorReporter.enabled',
'browser.chrome.errorReporter.submitUrl',
'network.allow-experiments',
/* 65 */
'browser.urlbar.autocomplete.enabled',
'browser.fixup.hide_user_pass',
/* 64 */
'browser.onboarding.enabled',
'devtools.webide.autoinstallADBHelper',
'devtools.webide.adbAddonURL',
'security.csp.enable_violation_events',
/* 63 */
'browser.search.countryCode',
'app.update.enabled',
'shield.savant.enabled',
'browser.chrome.favicons',
'media.autoplay.enabled',
'network.cookie.lifetime.days',
'browser.ctrlTab.previews',
/* 62 */
'plugin.state.java',
/* 61 */
'experiments.enabled',
'experiments.manifest.uri',
'experiments.supported',
'experiments.activeExperiment',
'network.jar.block-remote-files',
'network.jar.open-unsafe-types',
/* 60 */
'browser.newtabpage.directory.source',
'browser.newtabpage.enhanced',
'browser.newtabpage.introShown',
'extensions.shield-recipe-client.enabled',
'extensions.shield-recipe-client.api_url',
'browser.newtabpage.activity-stream.enabled',
'dom.workers.enabled',
/* 59 */
'intl.locale.matchOS',
'general.useragent.locale',
'datareporting.healthreport.about.reportUrl',
'dom.flyweb.enabled',
'security.mixed_content.use_hsts',
'security.mixed_content.send_hsts_priming',
'network.http.referer.userControlPolicy',
'security.xpconnect.plugin.unrestricted',
'media.getusermedia.screensharing.allowed_domains',
'camera.control.face_detection.enabled',
'dom.disable_window_status_change',
'dom.idle-observers-api.enabled',
/* 58 */
'browser.crashReports.unsubmittedCheck.autoSubmit',
/* 57 */
'social.whitelist',
'social.toast-notifications.enabled',
'social.shareDirectory',
'social.remote-install.enabled',
'social.directories',
'social.share.activationPanelEnabled',
'social.enabled',
'media.eme.chromium-api.enabled',
'devtools.webide.autoinstallFxdtAdapters',
'browser.casting.enabled',
'browser.bookmarks.showRecentlyBookmarked',
/* 56 */
'extensions.screenshots.system-disabled',
'extensions.formautofill.experimental',
/* 55 */
'geo.security.allowinsecure',
'browser.selfsupport.enabled',
'browser.selfsupport.url',
'browser.newtabpage.directory.ping',
'browser.formfill.saveHttpsForms',
'browser.formautofill.enabled',
'dom.enable_user_timing',
'dom.keyboardevent.code.enabled',
'browser.tabs.animate',
'browser.fullscreen.animate',
/* 54 */
'browser.safebrowsing.reportMalwareMistakeURL',
'browser.safebrowsing.reportPhishMistakeURL',
'media.eme.apiVisible',
'dom.archivereader.enabled',
/* 53 */
'security.tls.unrestricted_rc4_fallback',
'plugin.scan.Acrobat',
'plugin.scan.Quicktime',
'plugin.scan.WindowsMediaPlayer',
'media.getusermedia.screensharing.allow_on_old_platforms',
'dom.beforeAfterKeyboardEvent.enabled',
/* 52 */
'network.http.sendSecureXSiteReferrer',
'media.gmp-eme-adobe.enabled',
'media.gmp-eme-adobe.visible',
'media.gmp-eme-adobe.autoupdate',
'dom.telephony.enabled',
'dom.battery.enabled',
/* 51 */
'media.block-play-until-visible',
'dom.vr.oculus050.enabled',
'network.http.spdy.enabled.v3-1',
/* 50 */
'browser.usedOnWindows10.introURL',
'plugins.update.notifyUser',
'browser.safebrowsing.enabled',
'security.ssl3.ecdhe_ecdsa_rc4_128_sha',
'security.ssl3.ecdhe_rsa_rc4_128_sha',
'security.ssl3.rsa_rc4_128_md5',
'security.ssl3.rsa_rc4_128_sha',
'plugins.update.url',
/* 49 */
'loop.enabled',
'loop.server',
'loop.feedback.formURL',
'loop.feedback.manualFormURL',
'loop.facebook.appId',
'loop.facebook.enabled',
'loop.facebook.fallbackUrl',
'loop.facebook.shareUrl',
'loop.logDomains',
'dom.disable_window_open_feature.scrollbars',
'dom.push.udp.wakeupEnabled',
/* 48 */
'browser.urlbar.unifiedcomplete',
/* 47 */
'toolkit.telemetry.unifiedIsOptIn',
'datareporting.healthreport.about.reportUrlUnified',
'browser.history.allowPopState',
'browser.history.allowPushState',
'browser.history.allowReplaceState',
/* 46 */
'datareporting.healthreport.service.enabled',
'datareporting.healthreport.documentServerURI',
'datareporting.policy.dataSubmissionEnabled.v2',
'browser.safebrowsing.appRepURL',
'browser.polaris.enabled',
'browser.pocket.enabled',
'browser.pocket.api',
'browser.pocket.site',
'browser.pocket.oAuthConsumerKey',
/* 45 */
'browser.sessionstore.privacy_level_deferred',
/* 44 */
'browser.safebrowsing.provider.google.appRepURL',
'security.tls.insecure_fallback_hosts.use_static_list',
'dom.workers.sharedWorkers.enabled',
'dom.disable_image_src_set',
/* 43 */
'browser.safebrowsing.gethashURL',
'browser.safebrowsing.updateURL',
'browser.safebrowsing.malware.reportURL',
'browser.trackingprotection.gethashURL',
'browser.trackingprotection.updateURL',
'pfs.datasource.url',
'browser.search.showOneOffButtons',
/* 42 and earlier */
'privacy.clearOnShutdown.passwords', // 42
'full-screen-api.approval-required', // 42
'browser.safebrowsing.reportErrorURL', // 41
'browser.safebrowsing.reportGenericURL', // 41
'browser.safebrowsing.reportMalwareErrorURL', // 41
'browser.safebrowsing.reportMalwareURL', // 41
'browser.safebrowsing.reportURL', // 41
'plugins.enumerable_names', // 41
'network.http.spdy.enabled.http2draft', // 41
'camera.control.autofocus_moving_callback.enabled', // 37
'privacy.donottrackheader.value', // 36
'network.websocket.enabled', // 35
'dom.network.enabled', // 31
'pageThumbs.enabled', // 25
/* reset parrot: check your open about:config after running the script */
'_user.js.parrot'
]
if("undefined" === typeof(Services)) {
alert("about:config needs to be the active tab!");
return;
}
let c = 0;
for (let i = 0, len = ops.length; i < len; i++) {
if (Services.prefs.prefHasUserValue(ops[i])) {
Services.prefs.clearUserPref(ops[i]);
if (!Services.prefs.prefHasUserValue(ops[i])) {
console.log("reset", ops[i]);
c++;
} else { console.log("failed to reset", ops[i]); }
}
}
focus();
let d = (c==1) ? " pref" : " prefs";
if (c > 0) {
alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
} else { alert("nothing to reset"); }
})();

View File

@ -1,264 +0,0 @@
/***
This will reset the preferences that have been removed completely from the arkenfox user.js.
Last updated: 26-Jan-2021
For instructions see:
https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
***/
(function() {
let ops = [
/* removed in arkenfox user.js v52-57 */
/* 52-alpha */
'browser.search.reset.enabled',
'browser.search.reset.whitelist',
/* 54-alpha */
'browser.migrate.automigrate.enabled',
'services.sync.enabled',
'webextensions.storage.sync.enabled',
'webextensions.storage.sync.serverURL',
/* 55-alpha */
'dom.keyboardevent.dispatch_during_composition', // default is false anyway
'dom.vr.oculus.enabled', // covered by dom.vr.enabled
'dom.vr.openvr.enabled', // ditto
'dom.vr.osvr.enabled', // ditto
'extensions.pocket.api', // covered by extensions.pocket.enabled
'extensions.pocket.oAuthConsumerKey', // ditto
'extensions.pocket.site', // ditto
/* 56-alpha: none */
/* 57-alpha */
'geo.wifi.xhr.timeout', // covered by geo.enabled
'browser.search.geoip.timeout', // ditto
'media.webspeech.recognition.enable', // default is false anyway
'gfx.layerscope.enabled', // default is false anyway
/* 58-alpha */
// excluding these e10 settings
// 'browser.tabs.remote.autostart',
// 'browser.tabs.remote.autostart.2',
// 'browser.tabs.remote.force-enable',
// 'browser.tabs.remote.separateFileUriProcess',
// 'extensions.e10sBlocksEnabling',
// 'extensions.webextensions.remote',
// 'dom.ipc.processCount',
// 'dom.ipc.shims.enabledWarnings',
// 'dom.ipc.processCount.extension',
// 'dom.ipc.processCount.file',
// 'security.sandbox.content.level',
// 'dom.ipc.plugins.sandbox-level.default',
// 'dom.ipc.plugins.sandbox-level.flash',
// 'security.sandbox.logging.enabled',
'dom.presentation.controller.enabled',
'dom.presentation.discoverable',
'dom.presentation.discovery.enabled',
'dom.presentation.enabled',
'dom.presentation.receiver.enabled',
'dom.presentation.session_transport.data_channel.enable',
/* 59-alpha */
'browser.stopReloadAnimation.enabled',
'browser.tabs.insertRelatedAfterCurrent',
'browser.tabs.loadDivertedInBackground',
'browser.tabs.loadInBackground',
'browser.tabs.selectOwnerOnClose',
'browser.urlbar.clickSelectsAll',
'browser.urlbar.doubleClickSelectsAll',
'media.flac.enabled',
'media.mediasource.enabled',
'media.mediasource.mp4.enabled',
'media.mediasource.webm.audio.enabled',
'media.mediasource.webm.enabled',
'media.mp4.enabled',
'media.ogg.enabled',
'media.ogg.flac.enabled',
'media.opus.enabled',
'media.raw.enabled',
'media.wave.enabled',
'media.webm.enabled',
'media.wmf.amd.vp9.enabled',
'media.wmf.enabled',
'media.wmf.vp9.enabled',
'ui.submenuDelay',
/* 60-beta - these were all at default anyway */
'device.storage.enabled',
'general.useragent.compatMode.firefox',
'network.dns.blockDotOnion',
'network.stricttransportsecurity.preloadlist',
'security.block_script_with_wrong_mime',
'security.fileuri.strict_origin_policy',
'security.sri.enable',
/* 61-beta */
'browser.laterrun.enabled',
'browser.offline-apps.notify',
'browser.rights.3.shown',
'browser.slowStartup.maxSamples',
'browser.slowStartup.notificationDisabled',
'browser.slowStartup.samples',
'browser.storageManager.enabled',
'dom.allow_scripts_to_close_windows',
'dom.disable_window_flip',
'network.http.fast-fallback-to-IPv4',
'offline-apps.quota.warn',
'services.blocklist.signing.enforced',
/* 62-beta */
'browser.urlbar.autoFill.typed',
'security.tls.version.fallback-limit',
/* 63-beta */
'extensions.webextensions.keepStorageOnUninstall',
'extensions.webextensions.keepUuidOnUninstall',
'privacy.trackingprotection.ui.enabled',
/* 64-beta */
'browser.eme.ui.enabled',
'browser.sessionstore.max_windows_undo',
'network.auth.subresource-img-cross-origin-http-auth-allow',
'media.peerconnection.ice.tcp',
'media.peerconnection.identity.enabled',
'media.peerconnection.identity.timeout',
'media.peerconnection.turn.disable',
'media.peerconnection.use_document_iceservers',
'media.peerconnection.video.enabled',
'media.navigator.video.enabled',
/* 65-beta */
'browser.contentblocking.enabled',
'browser.urlbar.maxHistoricalSearchSuggestions',
/* 67-beta */
'app.update.service.enabled',
'app.update.silent',
'app.update.staging.enabled',
'browser.cache.disk.capacity',
'browser.cache.disk.smart_size.enabled',
'browser.cache.disk.smart_size.first_run',
'browser.cache.offline.insecure.enable',
'browser.safebrowsing.downloads.remote.url',
'browser.safebrowsing.provider.google.reportMalwareMistakeURL',
'browser.safebrowsing.provider.google.reportPhishMistakeURL',
'browser.safebrowsing.provider.google.reportURL',
'browser.safebrowsing.provider.google4.dataSharing.enabled',
'browser.safebrowsing.provider.google4.dataSharingURL',
'browser.safebrowsing.provider.google4.reportMalwareMistakeURL',
'browser.safebrowsing.provider.google4.reportPhishMistakeURL',
'browser.safebrowsing.provider.google4.reportURL',
'browser.safebrowsing.reportPhishURL',
'browser.sessionhistory.max_total_viewers',
'browser.urlbar.filter.javascript',
'canvas.capturestream.enabled',
'dom.imagecapture.enabled',
'dom.popup_maximum',
'gfx.offscreencanvas.enabled',
'javascript.options.shared_memory',
'media.gmp-gmpopenh264.autoupdate',
'media.gmp-gmpopenh264.enabled',
'media.gmp-manager.updateEnabled',
'media.gmp-manager.url',
'media.gmp-manager.url.override',
'media.gmp.trial-create.enabled',
'media.gmp-widevinecdm.autoupdate',
'network.cookie.leave-secure-alone',
'network.cookie.same-site.enabled',
'network.dnsCacheEntries',
'network.dnsCacheExpiration',
'network.proxy.autoconfig_url.include_path',
'pdfjs.enableWebGL',
'plugin.default.state',
'plugin.defaultXpi.state',
'plugin.scan.plid.all',
'security.data_uri.block_toplevel_data_uri_navigations',
'security.insecure_field_warning.contextual.enabled',
'security.insecure_password.ui.enabled',
'signon.autofillForms.http',
'signon.storeWhenAutocompleteOff',
'xpinstall.whitelist.required',
/* 67-beta: Blocklist, SB & TP cleanup: these were all inactive */
'browser.safebrowsing.downloads.remote.block_dangerous',
'browser.safebrowsing.downloads.remote.block_dangerous_host',
'browser.safebrowsing.blockedURIs.enabled',
'browser.safebrowsing.provider.google.gethashURL',
'browser.safebrowsing.provider.google.updateURL',
'browser.safebrowsing.provider.google4.gethashURL',
'browser.safebrowsing.provider.google4.updateURL',
'browser.safebrowsing.provider.mozilla.gethashURL',
'browser.safebrowsing.provider.mozilla.updateURL',
'browser.urlbar.userMadeSearchSuggestionsChoice',
'privacy.trackingprotection.annotate_channels',
'privacy.trackingprotection.enabled',
'privacy.trackingprotection.lower_network_priority',
'privacy.trackingprotection.pbmode.enabled',
'services.blocklist.addons.collection',
'services.blocklist.gfx.collection',
'services.blocklist.onecrl.collection',
'services.blocklist.plugins.collection',
'services.blocklist.update_enabled',
'urlclassifier.trackingTable',
/* 68-beta */
'dom.forms.datetime',
'font.blacklist.underline_offset',
'font.name.monospace.x-unicode',
'font.name.monospace.x-western',
'font.name.sans-serif.x-unicode',
'font.name.sans-serif.x-western',
'font.name.serif.x-unicode',
'font.name.serif.x-western',
'layout.css.font-loading-api.enabled',
'toolkit.telemetry.cachedClientID',
/* 69-beta */
'plugin.sessionPermissionNow.intervalInMinutes',
/* 70-beta */
'browser.cache.disk_cache_ssl',
'browser.sessionhistory.max_entries',
'dom.push.connection.enabled',
'dom.push.serverURL',
'extensions.getAddons.discovery.api_url',
'extensions.htmlaboutaddons.discover.enabled',
'extensions.webservice.discoverURL',
'intl.locale.requested',
'intl.regional_prefs.use_os_locales',
'privacy.usercontext.about_newtab_segregation.enabled',
'security.insecure_connection_icon.pbmode.enabled',
'security.insecure_connection_text.pbmode.enabled',
'webgl.dxgl.enabled',
/* 71-beta */
'media.block-autoplay-until-in-foreground',
'middlemouse.paste',
/* 75-beta */
'browser.search.geoip.url',
'browser.search.region',
/* 79-beta */
'browser.urlbar.usepreloadedtopurls.enabled',
/* 82-beta */
'dom.IntersectionObserver.enabled',
'extensions.screenshots.upload-disabled',
'privacy.partition.network_state',
'security.ssl3.dhe_rsa_aes_128_sha',
'security.ssl3.dhe_rsa_aes_256_sha',
/* 84-beta */
'browser.newtabpage.activity-stream.asrouter.providers.snippets',
'layout.css.visited_links_enabled',
/* 85-beta */
'network.http.redirection-limit',
/* reset parrot: check your open about:config after running the script */
'_user.js.parrot'
]
if("undefined" === typeof(Services)) {
alert("about:config needs to be the active tab!");
return;
}
let c = 0;
for (let i = 0, len = ops.length; i < len; i++) {
if (Services.prefs.prefHasUserValue(ops[i])) {
Services.prefs.clearUserPref(ops[i]);
if (!Services.prefs.prefHasUserValue(ops[i])) {
console.log("reset", ops[i]);
c++;
} else { console.log("failed to reset", ops[i]); }
}
}
focus();
let d = (c==1) ? " pref" : " prefs";
if (c > 0) {
alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
} else { alert("nothing to reset"); }
})();

View File

@ -1,4 +1,3 @@
/*** arkenfox user.js troubleshooter.js v1.6.3 ***/
(function() {
@ -194,7 +193,7 @@
const aBAK = getMyList(aPREFS);
//console.log(aBAK.length, "user-set prefs from our list detected and their values stored.");
const sMsg = "all detected prefs reset.\n\n" +
"!! KEEP THIS PROMPT OPEN AND TEST THE SITE IN ANOTHER TAB !!\n\n" +
"IF the problem still exists, this script can't help you - click Cancel to re-apply your values and exit.\n\n" +

View File

@ -3,10 +3,10 @@ TITLE arkenfox user.js updater
REM ## arkenfox user.js updater for Windows
REM ## author: @claustromaniac
REM ## version: 4.14
REM ## instructions: https://github.com/arkenfox/user.js/wiki/3.3-Updater-Scripts
REM ## version: 4.19
REM ## instructions: https://github.com/arkenfox/user.js/wiki/5.1-Updater-[Options]#-windows
SET v=4.14
SET v=4.19
VERIFY ON
CD /D "%~dp0"
@ -23,7 +23,6 @@ IF /I "%~1"=="-merge" (SET _merge=1)
IF /I "%~1"=="-updatebatch" (SET _updateb=1)
IF /I "%~1"=="-singlebackup" (SET _singlebackup=1)
IF /I "%~1"=="-esr" (SET _esr=1)
IF /I "%~1"=="-rfpalts" (SET _rfpalts=1)
SHIFT
GOTO parse
:endparse
@ -141,10 +140,6 @@ IF EXIST user.js.new (DEL /F "user.js.new")
CALL :message "Retrieving latest user.js file from github repository..."
CALL :psdownload https://raw.githubusercontent.com/arkenfox/user.js/master/user.js "user.js.new"
IF EXIST user.js.new (
IF DEFINED _rfpalts (
CALL :message "Activating RFP Alternatives section..."
CALL :activate user.js.new "[SETUP-non-RFP]"
)
IF DEFINED _esr (
CALL :message "Activating ESR section..."
CALL :activate user.js.new ".x still uses all the following prefs"
@ -182,8 +177,8 @@ IF EXIST user.js.new (
IF DEFINED _singlebackup (
MOVE /Y user.js user.js.bak >nul
) ELSE (
SET "_time=!time: =0!"
MOVE /Y user.js "user-backup-!date:/=-!_!_time::=.!.js" >nul
FOR /F "delims=" %%# IN ('powershell get-date -format "{yyyyMMdd_HHmmss}"') DO @SET ldt=%%#
MOVE /Y user.js "user-backup-!ldt!.js" >nul
)
REN user.js.new user.js
CALL :message "Update complete."
@ -320,8 +315,6 @@ ECHO: Run without user input.
CALL :message " -singleBackup"
ECHO: Use a single backup file and overwrite it on new updates, instead of
ECHO: cumulative backups. This was the default behaviour before v4.3.
CALL :message " -rfpAlts"
ECHO: Activate RFP Alternatives section
CALL :message " -updateBatch"
ECHO: Update the script itself on execution, before the normal routine.
CALL :message ""

View File

@ -2,12 +2,18 @@
## arkenfox user.js updater for macOS and Linux
## version: 2.9
## version: 4.0
## Author: Pat Johnson (@overdodactyl)
## Additional contributors: @earthlng, @ema-pe, @claustromaniac
## Additional contributors: @earthlng, @ema-pe, @claustromaniac, @infinitewarp
## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_updater() )
# Check if running as root
if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
printf "You shouldn't run this with elevated privileges (such as with doas/sudo).\n"
exit 1
fi
readonly CURRDIR=$(pwd)
SCRIPT_FILE=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
@ -41,9 +47,9 @@ ESR=false
# Download method priority: curl -> wget
DOWNLOAD_METHOD=''
if [[ $(command -v 'curl') ]]; then
if command -v curl >/dev/null; then
DOWNLOAD_METHOD='curl --max-redirs 3 -so'
elif [[ $(command -v 'wget') ]]; then
elif command -v wget >/dev/null; then
DOWNLOAD_METHOD='wget --max-redirect 3 --quiet -O'
else
echo -e "${RED}This script requires curl or wget.\nProcess aborted${NC}"
@ -51,7 +57,7 @@ else
fi
show_banner () {
show_banner() {
echo -e "${BBLUE}
############################################################################
#### ####
@ -62,7 +68,7 @@ show_banner () {
#### ####
############################################################################"
echo -e "${NC}\n"
echo -e "Documentation for this script is available here: ${CYAN}https://github.com/arkenfox/user.js/wiki/3.3-Updater-Scripts${NC}\n"
echo -e "Documentation for this script is available here: ${CYAN}https://github.com/arkenfox/user.js/wiki/5.1-Updater-[Options]#-maclinux${NC}\n"
}
#########################
@ -103,14 +109,13 @@ Optional Arguments:
# File Handling #
#########################
# Download files
download_file () { # expects URL as argument ($1)
download_file() { # expects URL as argument ($1)
declare -r tf=$(mktemp)
$DOWNLOAD_METHOD "${tf}" "$1" && echo "$tf" || echo '' # return the temp-filename or empty string on error
$DOWNLOAD_METHOD "${tf}" "$1" &>/dev/null && echo "$tf" || echo '' # return the temp-filename or empty string on error
}
open_file () { # expects one argument: file_path
open_file() { # expects one argument: file_path
if [ "$(uname)" == 'Darwin' ]; then
open "$1"
elif [ "$(uname -s | cut -c -5)" == "Linux" ]; then
@ -120,57 +125,52 @@ open_file () { # expects one argument: file_path
fi
}
readIniFile () { # expects one argument: absolute path of profiles.ini
readIniFile() { # expects one argument: absolute path of profiles.ini
declare -r inifile="$1"
declare -r tfile=$(mktemp)
if [ $(grep '^\[Profile' "$inifile" | wc -l) == "1" ]; then ### only 1 profile found
grep '^\[Profile' -A 4 "$inifile" | grep -v '^\[Profile' > $tfile
# tempIni will contain: [ProfileX], Name=, IsRelative= and Path= (and Default= if present) of the only (if) or the selected (else) profile
if [ "$(grep -c '^\[Profile' "${inifile}")" -eq "1" ]; then ### only 1 profile found
tempIni="$(grep '^\[Profile' -A 4 "${inifile}")"
else
grep -E -v '^\[General\]|^StartWithLastProfile=|^IsRelative=' "$inifile"
echo ''
echo -e "Profiles found:\n"
## cmd-substitution to strip trailing newlines and in quotes to keep internal ones:
echo "$(grep --color=never -E 'Default=[^1]|\[Profile[0-9]*\]|Name=|Path=|^$' "${inifile}")"
echo ''
read -p 'Select the profile number ( 0 for Profile0, 1 for Profile1, etc ) : ' -r
echo -e "\n"
if [[ $REPLY =~ ^(0|[1-9][0-9]*)$ ]]; then
grep '^\[Profile'${REPLY} -A 4 "$inifile" | grep -v '^\[Profile'${REPLY} > $tfile
if [[ "$?" != "0" ]]; then
echo "Profile${REPLY} does not exist!" && exit 1
fi
tempIni="$(grep "^\[Profile${REPLY}" -A 4 "${inifile}")" || {
echo -e "${RED}Profile${REPLY} does not exist!${NC}" && exit 1
}
else
echo "Invalid selection!" && exit 1
echo -e "${RED}Invalid selection!${NC}" && exit 1
fi
fi
declare -r profpath=$(grep '^Path=' $tfile)
declare -r pathisrel=$(grep '^IsRelative=' $tfile)
# extracting 0 or 1 from the "IsRelative=" line
declare -r pathisrel=$(sed -n 's/^IsRelative=\([01]\)$/\1/p' <<< "${tempIni}")
rm "$tfile"
# update global variable
if [[ ${pathisrel#*=} == "1" ]]; then
PROFILE_PATH="$(dirname "$inifile")/${profpath#*=}"
else
PROFILE_PATH="${profpath#*=}"
fi
# extracting only the path itself, excluding "Path="
PROFILE_PATH=$(sed -n 's/^Path=\(.*\)$/\1/p' <<< "${tempIni}")
# update global variable if path is relative
[[ ${pathisrel} == "1" ]] && PROFILE_PATH="$(dirname "${inifile}")/${PROFILE_PATH}"
}
getProfilePath () {
getProfilePath() {
declare -r f1=~/Library/Application\ Support/Firefox/profiles.ini
declare -r f2=~/.mozilla/firefox/profiles.ini
if [ "$PROFILE_PATH" = false ]; then
PROFILE_PATH="$SCRIPT_DIR"
elif [ "$PROFILE_PATH" = 'list' ]; then
local ini=''
if [[ -f "$f1" ]]; then
ini="$f1"
readIniFile "$f1" # updates PROFILE_PATH or exits on error
elif [[ -f "$f2" ]]; then
ini="$f2"
readIniFile "$f2"
else
echo -e "${RED}Error: Sorry, -l is not supported for your OS${NC}"
exit 1
fi
readIniFile "$ini" # updates PROFILE_PATH or exits on error
#else
# PROFILE_PATH already set by user with -p
fi
@ -181,8 +181,8 @@ getProfilePath () {
#########################
# Returns the version number of a updater.sh file
get_updater_version () {
echo $(sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p' "$1")
get_updater_version() {
echo "$(sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p' "$1")"
}
# Update updater.sh
@ -190,23 +190,21 @@ get_updater_version () {
# Args:
# -d: New version will not be looked for and update will not occur
# -u: Check for update, if available, execute without asking
update_updater () {
if [ $UPDATE = 'no' ]; then
return 0 # User signified not to check for updates
fi
update_updater() {
[ "$UPDATE" = 'no' ] && return 0 # User signified not to check for updates
declare -r tmpfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/updater.sh')"
[ -z "${tmpfile}" ] && echo -e "${RED}Error! Could not download updater.sh${NC}" && return 1 # check if download failed
if [[ $(get_updater_version "$SCRIPT_FILE") < $(get_updater_version "${tmpfile}") ]]; then
if [ $UPDATE = 'check' ]; then
if [ "$UPDATE" = 'check' ]; then
echo -e "There is a newer version of updater.sh available. ${RED}Update and execute Y/N?${NC}"
read -p "" -n 1 -r
echo -e "\n\n"
[[ $REPLY =~ ^[Nn]$ ]] && return 0 # Update available, but user chooses not to update
[[ $REPLY =~ ^[Yy]$ ]] || return 0 # Update available, but user chooses not to update
fi
else
return 0 # No update available
return 0 # No update available
fi
mv "${tmpfile}" "$SCRIPT_FILE"
chmod u+x "$SCRIPT_FILE"
@ -214,17 +212,16 @@ update_updater () {
exit 0
}
#########################
# Update user.js #
#########################
# Returns version number of a user.js file
get_userjs_version () {
[ -e $1 ] && echo "$(sed -n '4p' "$1")" || echo "Not detected."
get_userjs_version() {
[ -e "$1" ] && echo "$(sed -n '4p' "$1")" || echo "Not detected."
}
add_override () {
add_override() {
input=$1
if [ -f "$input" ]; then
echo "" >> user.js
@ -244,27 +241,27 @@ add_override () {
fi
}
remove_comments () { # expects 2 arguments: from-file and to-file
sed -e 's/^[[:space:]]*\/\/.*$//' -e '/^\/\*/,/\*\//d' -e '/^[[:space:]]*$/d' -e 's/);[[:space:]]*\/\/.*/);/' "$1" > "$2"
remove_comments() { # expects 2 arguments: from-file and to-file
sed -e '/^\/\*.*\*\/[[:space:]]*$/d' -e '/^\/\*/,/\*\//d' -e 's|^[[:space:]]*//.*$||' -e '/^[[:space:]]*$/d' -e 's|);[[:space:]]*//.*|);|' "$1" > "$2"
}
# Applies latest version of user.js and any custom overrides
update_userjs () {
update_userjs() {
declare -r newfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/user.js')"
[ -z "${newfile}" ] && echo -e "${RED}Error! Could not download user.js${NC}" && return 1 # check if download failed
echo -e "Please observe the following information:
Firefox profile: ${ORANGE}$(pwd)${NC}
Available online: ${ORANGE}$(get_userjs_version $newfile)${NC}
Available online: ${ORANGE}$(get_userjs_version "$newfile")${NC}
Currently using: ${ORANGE}$(get_userjs_version user.js)${NC}\n\n"
if [ $CONFIRM = 'yes' ]; then
if [ "$CONFIRM" = 'yes' ]; then
echo -e "This script will update to the latest user.js file and append any custom configurations from user-overrides.js. ${RED}Continue Y/N? ${NC}"
read -p "" -n 1 -r
echo -e "\n"
if [[ $REPLY =~ ^[Nn]$ ]]; then
if ! [[ $REPLY =~ ^[Yy]$ ]]; then
echo -e "${RED}Process aborted${NC}"
rm $newfile
rm "$newfile"
return 1
fi
fi
@ -278,7 +275,7 @@ update_userjs () {
# backup user.js
mkdir -p userjs_backups
local bakname="userjs_backups/user.js.backup.$(date +"%Y-%m-%d_%H%M")"
[ $BACKUP = 'single' ] && bakname='userjs_backups/user.js.backup'
[ "$BACKUP" = 'single' ] && bakname='userjs_backups/user.js.backup'
cp user.js "$bakname" &>/dev/null
mv "${newfile}" user.js
@ -304,19 +301,19 @@ update_userjs () {
past_nocomments='userjs_diffs/past_userjs.txt'
current_nocomments='userjs_diffs/current_userjs.txt'
remove_comments $pastuserjs $past_nocomments
remove_comments user.js $current_nocomments
remove_comments "$pastuserjs" "$past_nocomments"
remove_comments user.js "$current_nocomments"
diffname="userjs_diffs/diff_$(date +"%Y-%m-%d_%H%M").txt"
diff=$(diff -w -B -U 0 $past_nocomments $current_nocomments)
if [ ! -z "$diff" ]; then
diff=$(diff -w -B -U 0 "$past_nocomments" "$current_nocomments")
if [ -n "$diff" ]; then
echo "$diff" > "$diffname"
echo -e "Status: ${GREEN}A diff file was created:${NC} ${PWD}/${diffname}"
else
echo -e "Warning: ${ORANGE}Your new user.js file appears to be identical. No diff file was created.${NC}"
[ $BACKUP = 'multiple' ] && rm $bakname &>/dev/null
[ "$BACKUP" = 'multiple' ] && rm "$bakname" &>/dev/null
fi
rm $past_nocomments $current_nocomments $pastuserjs &>/dev/null
rm "$past_nocomments" "$current_nocomments" "$pastuserjs" &>/dev/null
fi
[ "$VIEW" = true ] && open_file "${PWD}/user.js"
@ -328,7 +325,7 @@ update_userjs () {
if [ $# != 0 ]; then
# Display usage if first argument is -help or --help
if [ $1 = '--help' ] || [ $1 = '-help' ]; then
if [ "$1" = '--help' ] || [ "$1" = '-help' ]; then
usage
else
while getopts ":hp:ludsno:bcvre" opt; do
@ -372,7 +369,7 @@ if [ $# != 0 ]; then
r)
tfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/user.js')"
[ -z "${tfile}" ] && echo -e "${RED}Error! Could not download user.js${NC}" && exit 1 # check if download failed
mv $tfile "${tfile}.js"
mv "$tfile" "${tfile}.js"
echo -e "${ORANGE}Warning: user.js was saved to temporary file ${tfile}.js${NC}"
open_file "${tfile}.js"
exit 0
@ -391,9 +388,20 @@ if [ $# != 0 ]; then
fi
show_banner
update_updater $@
update_updater "$@"
getProfilePath # updates PROFILE_PATH or exits on error
cd "$PROFILE_PATH" && update_userjs
cd "$PROFILE_PATH" || exit 1
# Check if any files have the owner as root/wheel.
if [ -n "$(find ./ -user 0)" ]; then
printf 'It looks like this script was previously run with elevated privileges,
you will need to change ownership of the following files to your user:\n'
find . -user 0
cd "$CURRDIR"
exit 1
fi
update_userjs
cd "$CURRDIR"

2320
user.js

File diff suppressed because it is too large Load Diff

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.5 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 32 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 104 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 28 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 28 KiB

BIN
wikipiki/icon-librewolf.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.2 KiB

BIN
wikipiki/icon-mull.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.5 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.2 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.0 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 19 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 11 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 18 KiB

BIN
wikipiki/parseError.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 3.4 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 32 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 26 KiB

BIN
wikipiki/rfpCanvas.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 5.4 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.6 KiB

BIN
wikipiki/uboCustom.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 12 KiB