Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening
Go to file
Thorin-Oakenpants 213467d91b
remove 2517
- inactive since we added it in v63
- this is not how you defeat fingerprinting (unless done in an enforced set)
- for the record: not even tor browser disable this
- fingerprinting this is not cheap in gecko (for now)
- from [2]
   - decoding/encoding capabilities: "it is expected that the entropy ... isn’t going to be significant"
   - HDR detection: "... has the potential to add significant entropy .. however .. but ... thus minimizing effective entropy" - it is what it is
   - note that RFP has some mitigations in FF82+ 1461454
2021-08-21 03:21:32 +00:00
.github/ISSUE_TEMPLATE add override recipes 2020-12-25 15:55:01 +00:00
scratchpad-scripts update to ESR91 2021-08-21 02:26:17 +00:00
wikipiki Add files via upload 2021-03-11 14:06:38 +00:00
_config.yml migration: cleanup code references 2020-09-15 06:07:32 +00:00
.gitattributes Update .gitattributes 2019-06-26 13:32:12 +00:00
.travis.yml Added Travis CI configuration 2017-03-01 00:11:05 +02:00
LICENSE.txt Update LICENSE.txt 2020-09-15 04:19:03 +00:00
prefsCleaner.bat v2.4 - add strlen check for prefs.js 2021-01-17 15:27:50 +00:00
prefsCleaner.sh v1.4 (#1189) 2021-06-07 11:18:40 +00:00
README.md i do not like mixed case lists 2021-08-10 01:21:04 +00:00
updater.bat v4.14 - check for TLS1.2 (#1097) 2021-01-22 12:15:12 +00:00
updater.sh v3.2 - proper fix for the diff issue 2021-06-06 21:30:14 +00:00
user.js remove 2517 2021-08-21 03:21:32 +00:00

🟪 user.js

A user.js is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the overview wiki page.

🟩 the arkenfox user.js

License: MIT

The arkenfox user.js is a template which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).

Everyone, experts included, should at least read the implementation wiki page, as it contains important information regarding a few user.js settings.

Note that we do not recommend connecting over Tor on Firefox. Use the Tor Browser if your threat model calls for it, or for accessing hidden services.

Also be aware that the arkenfox user.js is made specifically for desktop Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.

🟧 sitemap

🟥 acknowledgments

Literally thousands of sources, references and suggestions. Many thanks, and much appreciated.