diff --git a/docs/desktop-browsers.md b/docs/desktop-browsers.md index 6e27656a..c85f6591 100644 --- a/docs/desktop-browsers.md +++ b/docs/desktop-browsers.md @@ -141,7 +141,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug ### Recommended Firefox Configuration -These options can be found in :material-menu: → **Settings** +These options can be found in :material-menu: → **Settings**. #### Search @@ -271,7 +271,7 @@ Shields' options can be downgraded on a per-site basis as needed, but by default
- [x] Select **Prevent sites from fingerprinting me based on my language preferences** -- [x] Select **Aggressive** under Trackers & ads blocking +- [x] Select **Aggressive** under *Trackers & ads blocking*
Use default filter lists @@ -280,9 +280,9 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Strict** under **Upgrade connections to HTTPS** +- [x] Select **Strict** under *Upgrade connections to HTTPS* - [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Strict, may break sites** under Block fingerprinting +- [x] Select **Strict, may break sites** under *Block fingerprinting* - [x] Check **Forget me when I close this site** (2) - [ ] Uncheck all social media components @@ -309,7 +309,7 @@ Brave allows you to select additional content filters within the internal `brave

Sanitizing on close

-- [x] In the *Sites and Shields Settings* menu, under Content, after clicking on the *On-device site data* menu, select **Delete data sites have saved to your device when you close all windows** +- [x] In the *Sites and Shields Settings* menu, under Content, after clicking on the *On-device site data* menu, select **Delete data sites have saved to your device when you close all windows**. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section. @@ -317,17 +317,14 @@ If you wish to stay logged in to a particular site you visit often, you can set ##### Extensions -Disable built-in extensions you do not use in **Extensions** - -- [ ] Uncheck **Hangouts** -- [ ] Uncheck **WebTorrent** +- [ ] Uncheck all built-in extensions you do not use ##### Web3 Brave's Web3 features can potentially add to your browser fingerprint and attack surface. Unless you use any of features, they should be disabled. -- Select **Extensions (no fallback)** under Default Ethereum wallet and Default Solana wallet -- Set **Method to resolve IPFS resources** to **Disabled** +- Select **Extensions (no fallback)** under *Default Ethereum wallet* and *Default Solana wallet* +- Set *Method to resolve IPFS resources* to **Disabled** ##### System @@ -345,7 +342,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Brave Rewards and Wallet -**Brave Rewards** lets you recieve Basic Attention Token (BAT) cryptocurrency for performing certain actions within Brave. It relies on a custodial account and KYC from a select number of providers. We do not recommend BAT as a [private cryptocurrency](cryptocurrency.md), nor do we recommend using a [custodial wallet](advanced/payments.md#wallet-custody), so we would discourage using this feature. +**Brave Rewards** lets you receive Basic Attention Token (BAT) cryptocurrency for performing certain actions within Brave. It relies on a custodial account and KYC from a select number of providers. We do not recommend BAT as a [private cryptocurrency](cryptocurrency.md), nor do we recommend using a [custodial wallet](advanced/payments.md#wallet-custody), so we would discourage using this feature. **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. @@ -358,24 +355,24 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack ### Minimum Requirements - Must be open-source software. -- Supports automatic updates. -- Receives engine updates in 0-1 days from upstream release. -- Available on Linux, macOS, and Windows. -- Any changes required to make the browser more privacy-respecting should not negatively impact user experience. -- Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^1] +- Must support automatic updates. +- Must receive engine updates in 0-1 days from upstream release. +- Must be available on Linux, macOS, and Windows. +- Any changes required to make the browser more privacy-respecting must not negatively impact user experience. +- Must block third-party cookies by default. +- Must support [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^1] ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). -- Supports Progressive Web Apps. - PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. -- Does not include add-on functionality (bloatware) that does not impact user privacy. -- Does not collect telemetry by default. -- Provides open-source sync server implementation. -- Defaults to a [private search engine](search-engines.md). +- Should include built-in content blocking functionality. +- Should support cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). +- Should support Progressive Web Apps. + PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because PWAs benefit from your browser's regular security updates. +- Should not include add-on functionality (bloatware) that does not impact user privacy. +- Should not collect telemetry by default. +- Should provide an open-source sync server implementation. +- Should default to a [private search engine](search-engines.md). [^1]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state).