Browser migration from legacy (#309)

Co-Authored-By: Daniel Gray <dng@disroot.org>
This commit is contained in:
Tommy 2021-11-17 05:47:00 +00:00 committed by Daniel Gray
parent daadf50d28
commit e78a8a4d89
No known key found for this signature in database
GPG Key ID: 41911F722B0F9AE3
39 changed files with 219 additions and 490 deletions

View File

@ -0,0 +1,43 @@
title: Firefox Desktop
type: Recommendation
logo: /assets/img/browsers/firefox.svg
description: |
<strong>Firefox</strong> has some really strong privacy settings such as <a href="https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop">Enhanced Tracking Protection</a> which can help block various <a href="https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks">types of tracking</a>.
These options can be found in the <em>Privacy & Security</em> settings page ( ≡ → Settings → Privacy & Security).
<h5><strong>Enhanced Tracking Protection (ETP)</strong>.</h5>
<ul style="list-style-type:none;padding-left:0;">
<li>Select: <strong>Strict</strong></li>
</ul>
<h5><strong>HTTPS-Only Mode</strong></h5>
<ul style="list-style-type:none;padding-left:0;">
<li>Select: <strong>Enable HTTPS-Only Mode in all windows</strong>.</li>
</ul>
<h5><strong>Sanitizing on close</strong></h5>
<ul style="list-style-type:none;padding-left:0;">
<li>Select: <strong>Delete cookies and site data when Firefox is closed</strong></li>
</ul>
You can still stay logged into websites by allowing exceptions.
<h4>Extensions</h4>
We normally do not recommend installing any extensions, as they have privileged access within your browser. We make an exception for <a href="/browsers/#additional-resources">uBlock Origin</a>,
a popular content blocker and 🏆️ <a href="https://support.mozilla.org/kb/add-on-badges#w_recommended-extensions">Recommended Extension</a> by Mozilla.
<h4>Arkenfox (advanced)</h4>
The <a href="https://github.com/arkenfox/user.js">Arkenfox project</a> provides a set of carefully considered options for Firefox. These options are quite strict but a few are subjective and can sometimes cause a website to not work properly. You can easily change these settings to suit your needs. We <strong>strongly recommend</strong> reading through the <a href="https://github.com/arkenfox/user.js/wiki">basics</a> section. Arkenfox also enables <a href="https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users">container</a> support.
website: 'https://firefox.com/'
privacy_policy: 'https://www.mozilla.org/privacy/firefox/'
downloads:
- icon: fab fa-windows
url: 'https://www.mozilla.org/firefox/windows/'
- icon: fab fa-apple
url: 'https://www.mozilla.org/firefox/mac/'
- icon: fab fa-linux
url: 'https://www.mozilla.org/firefox/linux/'
- icon: fab fa-freebsd
url: 'https://www.freshports.org/www/firefox'
- icon: fab fa-git
url: 'https://hg.mozilla.org/mozilla-central/'

View File

@ -0,0 +1,27 @@
title: Bromite
type: Recommendation
logo: /assets/img/browsers/bromite.svg
description: |
<strong>Bromite</strong> is a Chromium-based browser with privacy and security enhancements, built-in ad blocking and some fingerprinting randomization.
These options can be found in <em>Privacy and Security</em> ( ⁝ → ⚙️ Settings → Privacy and Security)
<h5><strong>HTTPS-Only Mode</strong></h5>
<ul style="list-style-type:none;padding-left:0;">
<li>Select: <strong>Always use secure connections</strong>.</li>
</ul>
<h5><strong>Always on Incognito mode</strong></h5>
<ul style="list-style-type:none;padding-left:0;">
<li>Select: <strong>Open links in incognito tabs always</strong>.</li>
<li>Select: <strong>Close all open tabs on exit</strong>.</li>
<li>Select: <strong>Open external links in incognito</strong>.</li>
</ul>
website: 'https://www.bromite.org/'
privacy_policy: 'https://www.bromite.org/privacy'
downloads:
- icon: fab fa-android
url: 'https://www.bromite.org/fdroid'
- icon: fab fa-github
url: 'https://github.com/bromite/bromite'

View File

@ -0,0 +1,14 @@
title: Onion Browser
type: Recommendation
logo: /assets/img/browsers/onion_browser.svg
description: |
<strong>Onion Browser</strong> is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the <a href="https://support.torproject.org/glossary/onion-browser/">Tor Project</a>.
Note that there are some anonymity-related <a href="https://onionbrowser.com/about">issues</a> with Onion Browser due to iOS limitations.
website: 'https://onionbrowser.com/'
privacy_policy: 'https://onionbrowser.com/privacy-policy'
downloads:
- icon: fab fa-app-store-ios
url: 'https://apps.apple.com/app/id519296448'
- icon: fab fa-github
url: 'https://github.com/OnionBrowser/OnionBrowser'

View File

@ -0,0 +1,21 @@
title: Firefox iOS
type: Recommendation
logo: /assets/img/browsers/firefox-ios.svg
description: |
<strong>Firefox</strong> iOS includes <a href="https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop">Tracking Protection</a> which lets you select the blocklists Cookies, Tracking Content, Cryptominers, Fingerprinters and Redirect trackers.
<h5><strong>Tracking Protection</strong></h5>
<ul style="list-style-type:none;padding-left:0;">
<li>Select: <strong>Strict</strong> ( ≡ → ⚙️ Settings → Tracking Protection).</li>
</ul>
<h5><strong>Sanitizing on close</strong></h5>
Firefox iOS does not have have an option to clear cache on quit so you must do it manually. ( ≡ → ⚙️ Settings → Data Management).
website: 'https://firefox.com/'
privacy_policy: 'https://www.mozilla.org/privacy/firefox/'
downloads:
- icon: fab fa-app-store-ios
url: 'https://apps.apple.com/id989804926'
- icon: fab fa-github
url: 'https://github.com/mozilla-mobile/firefox-ios'

View File

@ -0,0 +1,21 @@
title: Firefox Focus iOS
type: Recommendation
logo: /assets/img/browsers/firefox_focus.svg
description: |
<strong>Firefox</strong> Focus iOS includes <a href="https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-ios">Tracking Protection</a> which lets you select the blocklists ad trackers, analytic trackers, social trackers and other content tracking.
Focus also destroys browsing history on quit automatically which is a good way of automatically clearing cookies and website data regularly which is helpful to prevent tracking.
<h5><strong>Sanitizing on close</strong></h5>
Focus sanitizies all data on close by default. Pressing on the <img alt="iOS Garbage Bin icon" width="16" height="16" src="/assets/img/browsers/ios-trash.svg"/> will immediately destroy all cookies and website data for the entire session.
<h4>Notes</h4>
Focus only lets you open one tab at a time.
website: 'https://firefox.com/'
privacy_policy: 'https://www.mozilla.org/privacy/firefox/'
downloads:
- icon: fab fa-app-store-ios
url: 'https://apps.apple.com/id1055677337'
- icon: fab fa-github
url: 'https://github.com/mozilla-mobile/focus-ios'

View File

@ -0,0 +1,13 @@
title: uBlock Origin
type: Recommendation
logo: /assets/img/browsers/ublock_origin.svg
description: |
<strong>uBlock Origin</strong> is a popular content blocker that could help you block ads, trackers, and fingerprinting scripts.
We suggest enabling all of the <a href="https://github.com/gorhill/uBlock/wiki/Dashboard:-Filter-lists">filters lists</a> under the "Ads", "Privacy" and "Malware domains". The "Annoyances" and "Multipurpose" lists can also be enabled, but they may break some social media functions. The <em>AdGuard URL Tracking Protection</em> filter list makes extensions like CleanURLs and NeatURLs redundant.
We also suggest adding the <a href="https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt">Actually Legitimate URL Shortener Tool</a> list and any of the regional lists that might apply to your browsing habits. Additional filter lists do slow things down, so only apply the languages that you use.
uBlock Origin also has different <a href="https://github.com/gorhill/uBlock/wiki/Blocking-mode">blocking modes</a>. The easy mode <a href="https://www.ranum.com/security/computer_security/editorials/dumb/">might not</a> necessarily keep you safe from every tracker out there, whereas the more advanced modes let you control exactly what needs to run.
website: 'https://addons.mozilla.org/firefox/addon/ublock-origin/'
privacy_policy: 'https://github.com/gorhill/uBlock/wiki/Privacy-policy'

View File

@ -0,0 +1,9 @@
title: Terms of Service; Didn't Read
type: Recommendation
logo: /assets/img/browsers/terms_of_service_didnt_read.svg
description: |
<strong>Terms of Service; Didn't Read</strong> grades websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are published transparently by a community of reviewers.
We do not recommend installing ToS;DR as a browser extension. The same information is provided on their website.
website: 'https://tosdr.org/'
privacy_policy: 'https://addons.mozilla.org/firefox/addon/terms-of-service-didnt-read/privacy/'

View File

@ -1,5 +0,0 @@
title: Google Chrome
type: "Anti-Recommendation"
description: |
Chrome is completely controlled by Google, and taps into your browsing history to track you across the web and serve you targeted advertisements. Because of Google's interest in increased ad revenues, Google Chrome offers [no privacy protections](https://www.washingtonpost.com/technology/2019/06/21/google-chrome-has-become-surveillance-software-its-time-switch/) out of the box compared to Firefox, and has taken anti-consumer steps to [block common extensions like adblockers](https://www.wired.com/story/google-chrome-ad-blockers-extensions-api/). <mark>It's best to avoid this browser at all costs.</mark>
order: 1

View File

@ -0,0 +1,26 @@
title: Tor Browser
type: Recommendation
info: Provides Anonymity
logo: /assets/img/browsers/tor.svg
description: |
<strong>Tor Browser</strong> is the choice if you need anonymity. This browser provides you with access to the Tor Bridges and Tor Network, along with extensions that can be automatically configured to fit its three security levels - <em>Standard</em>, <em>Safer</em> and <em>Safest</em>. We recommend that you do not change any of Tor Browser's default configurations outside of the standard security levels.
<h4>Extensions</h4>
You should <strong>never</strong> install any additional extensions on Tor Browser, including the ones we suggest for Firefox. Browser extensions make you stand out from other Tor users and your browser easier to <a href="https://support.torproject.org/glossary/browser-fingerprinting">fingerprint</a>.
website: 'https://www.torproject.org/'
website_tor: 'http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/'
privacy_policy: 'https://support.torproject.org/tbb/tbb-3/'
downloads:
- icon: fab fa-windows
url: 'https://www.torproject.org/download/'
- icon: fab fa-apple
url: 'https://www.torproject.org/download/'
- icon: fab fa-linux
url: 'https://www.torproject.org/download/'
- icon: fab fa-android
url: 'https://guardianproject.info/fdroid/'
- icon: fab fa-google-play
url: 'https://play.google.com/store/apps/details?id=org.torproject.torbrowser'
- icon: fab fa-git
url: 'https://trac.torproject.org/projects/tor'

View File

@ -1,4 +0,0 @@
title: Chromium
type: Anti-Recommendation
description: |
Without signing into a Google Account, the open-source builds of Chromium do relatively well in terms of security and privacy. However, Chromium still does have a number of integrations with Google hardcoded into the source, and because it is designed to be as user-friendly as possible, it operates in a way that compromises transparency and user-control. And, Chromium is still directly developed by Google, who have attempted to introduce anti-consumer measures in the past as mentioned in the Google Chrome section.

View File

@ -1,5 +0,0 @@
title: Brave Browser
type: Anti-Recommendation
description: |
Despite being widely touted as a privacy-friendly Chromium browser, we have a number of concerns with Brave's business practices and future business model that prevents us from recommending them. The Brave team [has publicly stated](https://www.reddit.com/r/privacytoolsIO/comments/cs8foq/update_delisting_brave/) they do not want to be associated with privacy-focused groups like PrivacyTools ([PrivacyTools PR #657](https://github.com/privacytools/privacytools.io/pull/657)), which causes us to believe the Brave team does not wish to be under too much scrutiny from the privacy community as they continue to develop their product ([Reddit discussion](http://archive.today/2020.05.13-035943/https://www.removeddit.com/r/brave_browser/comments/csapsy/brave_browser_is_being_delisted_from/exf6i0f/)).
order: 3

View File

@ -1,33 +0,0 @@
title: Firefox
type: Recommendation
logo: /assets/img/browsers/firefox-logo.svg
description: |
Firefox is a fast, reliable, open-source, privacy-respecting browser developed by Mozilla.
Unlike Google Chrome, Firefox wont track your data and send it to various companies. Firefox also allows you to simply install a number of add-ons that will improve your privacy online.
website: 'https://firefox.com/'
privacy_policy: 'https://www.mozilla.org/en-US/privacy/firefox/'
downloads:
- name: Windows
icon: fab fa-windows
url: 'https://www.mozilla.org/firefox/windows/'
- name: macOS
icon: fab fa-apple
url: 'https://www.mozilla.org/firefox/mac/'
- name: Linux
icon: fab fa-linux
url: 'https://www.mozilla.org/firefox/linux/'
- name: FreeBSD
icon: fab fa-freebsd
url: 'https://www.freshports.org/www/firefox'
- name: Google Play
icon: fab fa-google-play
url: 'https://play.google.com/store/apps/details?id=org.mozilla.firefox'
- name: Android
icon: fab fa-android
url: 'https://f-droid.org/en/packages/org.mozilla.fennec_fdroid/'
- name: iOS
icon: fab fa-app-store-ios
url: 'https://apps.apple.com/us/app/firefox-private-safe-browser/id989804926'
source: 'https://hg.mozilla.org/mozilla-central/'
order: 1

View File

@ -1,4 +0,0 @@
title: Safari
type: Worth Mentioning
description: |
A browser option on macOS and iOS with a strong focus on security and [privacy](https://www.apple.com/safari/docs/Safari_White_Paper_Nov_2019.pdf). <mark>We believe Safari is an acceptable choice for Apple users,</mark> despite Safari being a proprietary browser, because Apple users are already trusting a proprietary operating system to run their programs on. We do not recommend using iCloud Sync, which saves your bookmarks and history in a way which allows Apple to view them. Additionally, [WebKit](https://webkit.org), the browser engine powering Safari *is* open source.

View File

@ -1,22 +0,0 @@
title: Tor Browser
type: Recommendation
info: Provides Anonymity
logo: /assets/img/browsers/tor-logo.svg
description: |
The choice if you need an extra layer of anonymity. Tor Browser is a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption, and an advanced proxy.
website: 'https://www.torproject.org/'
website_tor: 'http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/'
privacy_policy: 'https://support.torproject.org/tbb/tbb-3/'
downloads:
- icon: fab fa-windows
url: 'https://www.torproject.org/download/'
- icon: fab fa-apple
url: 'https://www.torproject.org/download/'
- icon: fab fa-linux
url: 'https://www.torproject.org/download/'
- icon: fab fa-android
url: 'https://play.google.com/store/apps/details?id=org.torproject.torbrowser'
- icon: fab fa-app-store-ios
url: 'https://guardianproject.info/fdroid/'
source: 'https://trac.torproject.org/projects/tor'
order: 2

View File

@ -1,6 +0,0 @@
title: Ungoogled Chromium
type: Worth Mentioning
description: |
A desktop browser based on Chromium which removes all Google integrations, while adding features which seek to enhance your security, privacy, and control of your browser. However, <mark>we do not strongly recommend the use of Ungoogled Chromium for most users</mark> at this time, because of a lack of official builds and updates from the developer. We strongly believe that auto-updating apps are key for maintaining security, lest you browse the web with outdated builds of your browser which may be susceptible to any number of live exploits.
order: 2
website: 'https://github.com/Eloston/ungoogled-chromium/'

View File

@ -1,122 +0,0 @@
<h2 id="addons" class="anchor"><a href="#addons"><i class="fas fa-link anchor-icon"></i></a> Recommended Browser Add-ons</h2>
<div class="alert alert-secondary" role="alert">
Not all of these add-ons are necessary, and many provide redundant functionality. Choose the ones you need, and <a class="alert-link" href="/blog/2019/11/09/firefox-privacy/">learn more with our guide to Firefox Privacy</a>.
</div>
{% include legacy/cardv2.html
title="uBlock Origin: Block Ads and Trackers"
image="/assets/img/legacy_svg/3rd-party/ublock_origin.svg"
description="<strong>uBlock Origin</strong> is an efficient <a href=https://github.com/gorhill/uBlock/wiki/Blocking-mode>wide-spectrum blocker</a> that is easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source. <a href=https://github.com/gorhill/uBlock/wiki/Advanced-user-features>Advanced mode</a> allows for <a href=https://github.com/gorhill/uBlock/wiki/Dynamic-filtering:-quick-guide>dynamic filtering</a>. Dynamic filtering allows for extended blocking similar to NoScript and uMatrix (E.g. <a href=https://github.com/gorhill/uBlock/wiki/Blocking-mode:-medium-mode>medium</a> or <a href=https://github.com/gorhill/uBlock/wiki/Blocking-mode:-hard-mode>hard</a>) blocking."
website="https://addons.mozilla.org/firefox/addon/ublock-origin/"
privacy-policy="https://github.com/gorhill/uBlock/wiki/Privacy-policy"
github="https://github.com/gorhill/uBlock/"
firefox="https://addons.mozilla.org/firefox/addon/ublock-origin/"
chrome="https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm"
opera="https://addons.opera.com/en/extensions/details/ublock/"
edge="https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak"
%}
{% include legacy/cardv2.html
title="ClearURLs"
image="/assets/img/legacy_svg/3rd-party/clearurls.svg"
description="<strong>ClearURLs</strong> will automatically remove tracking elements from URLs to help protect your privacy when browsing through the Internet."
website="https://gitlab.com/KevinRoebert/ClearUrls"
privacy-policy="https://gitlab.com/KevinRoebert/ClearUrls/-/blob/master/PRIVACY.md"
gitlab="https://gitlab.com/KevinRoebert/ClearUrls"
firefox="https://addons.mozilla.org/firefox/addon/clearurls/"
chrome="https://chrome.google.com/webstore/detail/clearurls/lckanjgmijmafbedllaakclkaicjfmnk"
edge="https://microsoftedge.microsoft.com/addons/detail/mdkdmaickkfdekbjdoojfalpbkgaddei"
%}
{% include legacy/cardv2.html
title="xBrowserSync"
image="/assets/img/legacy_svg/3rd-party/xbrowsersync.svg"
description='<strong>xBrowserSync</strong> synchronizes bookmarks across devices and browsers with end-to-end encryption. Data is encrypted and decrypted on the device, no one but you can read it. No registration is needed, just enter a randomly generated id or QR code on all devices. <a href="https://www.xbrowsersync.org/#status">Different servers</a> are available, and it can also be <a href="https://github.com/xbrowsersync/api-docker">self-hosted</a>.'
website="https://www.xbrowsersync.org/"
privacy-policy="https://www.xbrowsersync.org/privacypolicy"
github="https://github.com/xbrowsersync"
firefox="https://addons.mozilla.org/firefox/addon/xbs/"
chrome="https://chrome.google.com/webstore/detail/xbrowsersync/lcbjdhceifofjlpecfpeimnnphbcjgnc"
googleplay="https://play.google.com/store/apps/details?id=com.xBrowserSync.android"
%}
<h3>Worth Mentioning</h3>
<ul>
<li><a href="https://floccus.org/">floccus</a> - Synchronize bookmarks across browsers via Nextcloud, WebDAV or a local file (and thus any file sync solution). For <a href="https://addons.mozilla.org/firefox/addon/floccus/">Firefox</a>, <a href="https://chrome.google.com/webstore/detail/floccus-bookmarks-sync/fnaicdffflnofjppbagibeoednhnbjhg">Chrome</a>, <a href="https://microsoftedge.microsoft.com/addons/detail/gjkddcofhiifldbllobcamllmanombji">Edge</a>.</li>
</ul>
<h3>Additional Functionality</h3>
<div class="alert alert-secondary" role="alert">
These add-ons don't necessarily add to your privacy when browsing the web, but add additional functionality to your browser you may find useful.
</div>
{% include legacy/cardv2.html
title="Terms of Service; Didnt Read: Be Informed"
image="/assets/img/legacy_svg/3rd-party/terms_of_service_didnt_read.svg"
description='<strong>Terms of Service; Didnt Read</strong> is an addon that believes "I have read and agree to the Terms of Service" is the biggest lie on the web, and wants to fix it by grading websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are published transparently by a community of reviewers.'
website="https://tosdr.org/"
privacy-policy="https://addons.mozilla.org/firefox/addon/terms-of-service-didnt-read/privacy/"
github="https://github.com/tosdr/"
firefox="https://addons.mozilla.org/firefox/addon/terms-of-service-didnt-read/"
chrome="https://chrome.google.com/webstore/detail/terms-of-service-didn%E2%80%99t-r/hjdoplcnndgiblooccencgcggcoihigg"
opera="https://addons.opera.com/extensions/details/terms-of-service-didnt-read"
edge="https://microsoftedge.microsoft.com/addons/detail/terms-of-service-didn%E2%80%99t-/oaaecoiolcpocebdnakfpfjegbmmpkjn"
%}
{% include legacy/cardv2.html
title="Snowflake"
image="/assets/img/legacy_svg/3rd-party/snowflake.svg"
description="<strong>Snowflake</strong> is a new <a href=https://2019.www.torproject.org/docs/pluggable-transports.html.en>pluggable transport</a> from the Tor Project. If you have an uncensored connection, running this extension volunteers your connection to be used as a Snowflake proxy to help users unable to connect to the Tor network. Your IP will not be visible to the sites users visit using your proxy, as this extension will not make you an exit node. If your access to the Tor network is blocked, this extension will not assist you, and you should use the <a href=https://www.torproject.org>Tor Browser</a> instead. <strong>Note:</strong> This add-on does not work with WebRTC disabled."
website="https://snowflake.torproject.org"
git="https://gitweb.torproject.org/pluggable-transports/snowflake.git"
firefox="https://addons.mozilla.org/firefox/addon/torproject-snowflake"
chrome="https://chrome.google.com/webstore/detail/snowflake/mafpmfcccpbjnhfhjnllmmalhifmlcie"
%}
<h3>Persistent storage management</h3>
<h4>Desktop</h4>
<div class="alert alert-warning" role="alert">
These add-ons are the preferred method for controlling persistent storage data that various websites and web-apps may create on your computer.
</div>
{% include legacy/cardv2.html
title="Temporary Containers"
image="/assets/img/legacy_svg/3rd-party/temporary_containers.svg"
image-dark="/assets/img/legacy_svg/3rd-party/temporary_containers-dark.svg"
description="<strong>Temporary Containers</strong> allow you to open tabs, websites, and links in automatically managed disposable containers. Containers isolate data websites store (cookies, storage, and more) from each other, enhancing your privacy and security while you browse: <a href=https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21>Enhance your privacy in Firefox with Temporary Containers.</a>"
website="https://addons.mozilla.org/firefox/addon/temporary-containers/"
privacy-policy="https://addons.mozilla.org/firefox/addon/temporary-containers/privacy/"
github="https://github.com/stoically/temporary-containers"
firefox="https://addons.mozilla.org/firefox/addon/temporary-containers/"
%}
{% include legacy/cardv2.html
title="Firefox Multi-Account Containers"
image="/assets/img/legacy_svg/3rd-party/firefox_multi_account_containers.svg"
description="<strong>Firefox Multi-Account Containers</strong> allow you to create containers for specific websites. These containers are isolated from eachother. This add-on can be used in conjunctiuon with Temporary Containers to allow persistent logins to websites you specify."
website="https://support.mozilla.org/kb/containers"
github="https://github.com/mozilla/multi-account-containers"
firefox="https://addons.mozilla.org/firefox/addon/multi-account-containers/"
%}
<h3>Android</h3>
<div class="alert alert-warning" role="alert">
Unfortunately the Android version of Firefox <a href="https://github.com/stoically/temporary-containers/issues/465">doesn't yet have Temporary Container support</a>. The recommended extensions below are a substitute, however as APIs do not exist for clearing <a href="https://en.wikipedia.org/wiki/Indexed_Database_API">IndexedDB</a>, <a href="https://en.wikipedia.org/wiki/Progressive_web_application#Service_workers">Service Workers</a> cache, <a href="https://en.wikipedia.org/wiki/Progressive_web_application#AppCache_(obsolete)">appCache</a>, or cache by host. As a result they are not as good as the above Temporary Container suggestions.
</div>
{% include legacy/cardv2.html
title="Cookie AutoDelete: Automatically Delete Cookies"
image="/assets/img/legacy_png/3rd-party/cookie_autodelete.png"
description="<strong>Cookie AutoDelete</strong> automatically removes cookies, lingering sessions, and other information that can be used to spy on you when they are no longer used by open browser tabs."
website="https://addons.mozilla.org/firefox/addon/cookie-autodelete/"
github="https://github.com/Cookie-AutoDelete/Cookie-AutoDelete"
firefox="https://addons.mozilla.org/firefox/addon/cookie-autodelete"
chrome="https://chrome.google.com/webstore/detail/cookie-autodelete/fhcgjolkccmbidfldomjliifgaodjagh"
edge="https://microsoftedge.microsoft.com/addons/detail/cookie-autodelete/djkjpnciiommncecmdefpdllknjdmmmo"
%}

View File

@ -1,136 +0,0 @@
<h2 id="about_config" class="anchor"><a href="#about_config"><i class="fas fa-link anchor-icon"></i></a> Firefox: Privacy Related "about:config" Tweaks</h2>
<div class="alert alert-success" role="alert">This is a collection of privacy-related <strong>about:config</strong> tweaks. We'll show you how to enhance the privacy of your Firefox browser.</div>
<h3>Preparation:</h3>
<ol>
<li>Enter "about:config" in the firefox address bar and press enter.</li>
<li>Press the button "Accept the Risk and Continue" [FF71+] or "I accept the risk".</li>
<li>Copy and paste each of the preferences below (for example "webgl.disabled") into the search bar, and set each of them to the stated value (such as "true").</li>
</ol>
<h3>Getting started:</h3>
<dl class="long-string-list">
<dt>privacy.firstparty.isolate = true</dt>
<dd>A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)</dd>
<dt>privacy.resistFingerprinting = true</dt>
<dd>A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference makes Firefox more resistant to browser fingerprinting.</dd>
<dt>privacy.trackingprotection.fingerprinting.enabled = true</dt>
<dd>[FF67+] Blocks Fingerprinting</dd>
<dt>privacy.trackingprotection.cryptomining.enabled = true</dt>
<dd>[FF67+] Blocks CryptoMining</dd>
<dt>privacy.trackingprotection.enabled = true</dt>
<dd>This is Mozilla's new built-in tracking protection. One of it's benefits is blocking tracking (i.e. Google Analytics) on <a href="https://github.com/gorhill/uMatrix/wiki/Privileged-Pages">privileged pages</a> where add-ons that usually do that are disabled.</dd>
<dt>browser.send_pings = false</dt>
<dd>The attribute would be useful for letting websites track visitors' clicks.</dd>
<dt>browser.urlbar.speculativeConnect.enabled = false</dt>
<dd>Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. <a href="https://www.ghacks.net/2017/07/24/disable-preloading-firefox-autocomplete-urls/">Source</a></dd>
<dt>dom.event.clipboardevents.enabled = false</dt>
<dd>Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.</dd>
<dt>media.eme.enabled = false</dt>
<dd>
<p>Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. <a href="https://support.mozilla.org/kb/enable-drm#w_opt-out-of-cdm-playback-uninstall-cdms-and-stop-all-cdm-downloads">Details</a></p>
<p>DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox.</p>
</dd>
<dt>media.gmp-widevinecdm.enabled = false</dt>
<dd>Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. <a href="https://support.mozilla.org/kb/enable-drm#w_disable-the-google-widevine-cdm-without-uninstalling">Details</a></dd>
<dt>media.navigator.enabled = false</dt>
<dd>Websites can track the microphone and camera status of your device.</dd>
<dt>network.cookie.cookieBehavior = 1</dt>
<dd>
Disable cookies
<ul>
<li>0 = Accept all cookies by default</li>
<li>1 = Only accept from the originating site (block third-party cookies)</li>
<li>2 = Block all cookies by default</li>
</ul>
</dd>
<dt>network.http.referer.XOriginPolicy = 2</dt>
<dd>
Only send <code>Referer</code> header when the full hostnames match. (Note: if you notice significant breakage, you might try <code>1</code> combined with an <code>XOriginTrimmingPolicy</code> tweak below.) <a href="https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/">Source</a>
<ul>
<li>0 = Send <code>Referer</code> in all cases</li>
<li>1 = Send <code>Referer</code> to same eTLD sites</li>
<li>2 = Send <code>Referer</code> only when the full hostnames match</li>
</ul>
</dd>
<dt>network.http.referer.XOriginTrimmingPolicy = 2</dt>
<dd>
When sending <code>Referer</code> across origins, only send scheme, host, and port in the <code>Referer</code> header of cross-origin requests. <a href="https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/">Source</a>
<ul>
<li>0 = Send full url in <code>Referer</code></li>
<li>1 = Send url without query string in <code>Referer</code></li>
<li>2 = Only send scheme, host, and port in <code>Referer</code></li>
</ul>
</dd>
<dt>webgl.disabled = true</dt>
<dd>WebGL is a potential security risk. <a href="https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern">Source</a></dd>
<dt>browser.sessionstore.privacy_level = 2</dt>
<dd>
This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data. <a href="http://kb.mozillazine.org/Browser.sessionstore.privacy_level">Details</a>
<ul>
<li>0 = Store extra session data for any site. (Default starting with Firefox 4.)</li>
<li>1 = Store extra session data for unencrypted (non-HTTPS) sites only. (Default before Firefox 4.)</li>
<li>2 = Never store extra session data.</li>
</ul>
</dd>
<dt>beacon.enabled = false</dt>
<dd>Disables sending additional analytics to web servers. <a href="https://developer.mozilla.org/en-US/docs/Web/API/Navigator/sendBeacon">Details</a></dd>
<dt>browser.safebrowsing.downloads.remote.enabled = false</dt>
<dd>Prevents Firefox from sending information about downloaded executable files to Google Safe Browsing to determine whether it should be blocked for safety reasons. <a href="https://support.mozilla.org/en-US/kb/how-does-phishing-and-malware-protection-work#w_what-information-is-sent-to-mozilla-or-its-partners-when-phishing-and-malware-protection-are-enabled">Details</a></dd>
<dt>Disable Firefox prefetching pages it thinks you will visit next:</dt>
<dd>
Prefetching causes cookies from the prefetched site to be loaded and other potentially unwanted behavior. Details <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Link_prefetching_FAQ">here</a> and <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control">here</a>.
<ul>
<li>network.dns.disablePrefetch = true</li>
<li>network.dns.disablePrefetchFromHTTPS = true</li>
<li>network.predictor.enabled = false</li>
<li>network.predictor.enable-prefetch = false</li>
<li>network.prefetch-next = false</li>
</ul>
</dd>
<dt>network.IDN_show_punycode = true</dt>
<dd>Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice. <a href="https://krebsonsecurity.com/2018/03/look-alike-domains-and-visual-confusion/#more-42636">Source</a></dd>
<dt>Looking for TRR, DoH or ESNI?</dt>
<dd>They have moved to <a href="/providers/dns/#dns">our DNS page</a>.</dd>
</dl>
<h3 id="user.js">Firefox user.js Templates</h3>
<ul>
<li><a href="https://github.com/arkenfox/user.js">arkenfox user.js</a> (formerly ghacks-user.js) - An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting.</li>
</ul>
<h3>Related Information</h3>
<ul>
<li><a href="/blog/2019/11/09/firefox-privacy/">Firefox Privacy: Tips and Tricks for Better Browsing</a> - A good starting guide for users looking to keep their data private and secure.</li>
<li><a href="https://ffprofile.com/">ffprofile.com</a> - Helps you to create a Firefox profile with the defaults you like.</li>
<li><a href="https://addons.mozilla.org/firefox/addon/privacy-settings/">Privacy Settings</a> - A Firefox add-on to alter built-in privacy settings easily with a toolbar panel.</li>
<li><a href="https://12bytes.org/articles/tech/firefox/the-firefox-privacy-guide-for-dummies/">Firefox Privacy Guide For Dummies</a> - Guide on ways (already discussed and others) to improve your privacy and safety on Firefox.</li>
</ul>

View File

Before

Width:  |  Height:  |  Size: 2.2 KiB

After

Width:  |  Height:  |  Size: 2.2 KiB

File diff suppressed because one or more lines are too long

After

Width:  |  Height:  |  Size: 13 KiB

View File

Before

Width:  |  Height:  |  Size: 13 KiB

After

Width:  |  Height:  |  Size: 13 KiB

File diff suppressed because one or more lines are too long

After

Width:  |  Height:  |  Size: 14 KiB

View File

@ -0,0 +1,2 @@
<?xml version="1.0" encoding="UTF-8"?>
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><defs><linearGradient id="linearGradient5472"><stop stop-color="#fff" offset="0"/></linearGradient><linearGradient id="linearGradient5474" x1="60.097" x2="71.645" y1="201.62" y2="201.62" gradientUnits="userSpaceOnUse" xlink:href="#linearGradient5472"/><linearGradient id="linearGradient5480" x1="49.996" x2="81.746" y1="205.62" y2="205.62" gradientUnits="userSpaceOnUse" xlink:href="#linearGradient5472"/><linearGradient id="linearGradient5486" x1="53.418" x2="78.324" y1="218.03" y2="218.03" gradientUnits="userSpaceOnUse" xlink:href="#linearGradient5472"/><linearGradient id="linearGradient5492" x1="69.192" x2="70.78" y1="217.16" y2="217.16" gradientUnits="userSpaceOnUse" xlink:href="#linearGradient5472"/><linearGradient id="linearGradient7461" x1="60.962" x2="62.549" y1="217.16" y2="217.16" gradientUnits="userSpaceOnUse" xlink:href="#linearGradient5472"/></defs><g transform="translate(-48.938 -197.1)" stroke-linecap="round" stroke-linejoin="round" stroke-miterlimit="2" stroke-width="1.5875"><path d="m77.53 205.88v22.187a2.1167 2.1167 135 0 1-2.1167 2.1167h-19.086a2.1167 2.1167 45 0 1-2.1167-2.1167v-22.187" fill="none" stroke="url(#linearGradient5486)" style="paint-order:fill markers stroke"/><g fill="#fff" fill-rule="evenodd"><path d="m61.756 210.99v12.346" stroke="url(#linearGradient7461)" style="paint-order:fill markers stroke"/><path d="m69.986 210.99v12.346" stroke="url(#linearGradient5492)" style="paint-order:fill markers stroke"/><path d="m50.79 205.62h30.162" stroke="url(#linearGradient5480)" style="paint-order:fill markers stroke"/></g><path d="m60.89 205.37v-5.4277a2.0677 2.0677 0 0 1 2.0677-2.0677h5.8255a2.0677 2.0677 0 0 1 2.0677 2.0677v5.4277" fill="none" stroke="url(#linearGradient5474)" style="paint-order:fill markers stroke"/></g></svg>

After

Width:  |  Height:  |  Size: 1.9 KiB

View File

@ -0,0 +1,2 @@
<?xml version="1.0" encoding="UTF-8"?>
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g transform="translate(-48.938 -197.1)"><rect x="48.938" y="197.1" width="33.867" height="33.867" fill="#fff" style="paint-order:fill markers stroke"/><g transform="translate(.026243)" fill="none" stroke="#000" stroke-linecap="round" stroke-linejoin="round" stroke-miterlimit="2" stroke-width="1.5875"><path d="m61.729 210.99v12.346" style="paint-order:fill markers stroke"/><path d="m69.96 210.99v12.346" style="paint-order:fill markers stroke"/></g><g stroke="#000" stroke-linecap="round" stroke-linejoin="round" stroke-miterlimit="2" stroke-width="1.5875"><path d="m50.79 205.62h30.162" fill="#fff" fill-rule="evenodd" style="paint-order:fill markers stroke"/><path d="m77.53 205.88v22.187a2.1167 2.1167 135 0 1-2.1167 2.1167h-19.086a2.1167 2.1167 45 0 1-2.1167-2.1167v-22.187" fill="none" style="paint-order:fill markers stroke"/><path d="m60.89 205.37v-5.4277a2.0677 2.0677 0 0 1 2.0677-2.0677h5.8255a2.0677 2.0677 0 0 1 2.0677 2.0677v5.4277" fill="none" style="paint-order:fill markers stroke"/></g></g></svg>

After

Width:  |  Height:  |  Size: 1.1 KiB

View File

@ -0,0 +1,2 @@
<?xml version="1.0" encoding="UTF-8"?>
<svg version="1.1" viewBox="0 0 128 128" xmlns="http://www.w3.org/2000/svg"><g transform="matrix(.256 0 0 .256 -1.534 -1.5359)"><path d="m506 256a250 250 0 0 1-248.51 250 250 250 0 0 1-251.48-247.01 250 250 0 0 1 245.5-252.95 250 250 0 0 1 254.41 243.98" fill="#f3f3f3"/><path d="m430.55 116.36v-8.7273c0-24.087-19.549-43.636-43.636-43.636s-43.636 19.549-43.636 43.636v8.7273c-9.6 0-17.455 7.8545-17.455 17.455v69.818c0 9.6 7.8546 17.455 17.455 17.455h87.273c9.6 0 17.455-7.8546 17.455-17.455v-69.818c0-9.6-7.8546-17.455-17.455-17.455zm-13.964 0h-59.345v-8.7273c0-16.407 13.265-29.673 29.673-29.673s29.673 13.265 29.673 29.673zm-39.796 139.64c0.69819 5.76 1.3964 11.52 1.3964 17.455 0 36.305-13.964 69.295-36.655 94.08-4.5382-14.138-17.455-24.262-33.164-24.262h-17.455v-52.364c0-9.6-7.8545-17.455-17.455-17.455h-104.73v-34.909h34.909c9.6 0 17.455-7.8545 17.455-17.455v-34.909h34.909c19.2 0 34.909-15.709 34.909-34.909v-44.335c-16.582-5.2364-34.036-8.0291-52.364-8.0291-96.349 0-174.55 78.196-174.55 174.55 0 96.349 78.196 174.55 174.55 174.55 96.349 0 174.55-78.196 174.55-174.55 0-5.9346-0.34909-11.695-0.87273-17.455zm-155.69 155.87c-68.945-8.5527-122.18-67.2-122.18-138.41 0-10.822 1.3964-21.12 3.6655-31.244l83.607 83.607v17.455c0 19.2 15.709 34.909 34.909 34.909z" fill="#e91e63" stroke-width="17.454"/></g></svg>

After

Width:  |  Height:  |  Size: 1.3 KiB

View File

Before

Width:  |  Height:  |  Size: 1.7 KiB

After

Width:  |  Height:  |  Size: 1.7 KiB

View File

Before

Width:  |  Height:  |  Size: 1.1 KiB

After

Width:  |  Height:  |  Size: 1.1 KiB

View File

Before

Width:  |  Height:  |  Size: 2.2 KiB

After

Width:  |  Height:  |  Size: 2.2 KiB

View File

Before

Width:  |  Height:  |  Size: 998 B

After

Width:  |  Height:  |  Size: 998 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.8 KiB

View File

@ -1,2 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<svg width="128" height="128" version="1.1" viewBox="0 0 33.866 33.866" xmlns="http://www.w3.org/2000/svg"><defs><linearGradient id="linearGradient848" x1="-25" x2="225" y1="100.28" y2="99.812" gradientTransform="translate(-100,41.421)" gradientUnits="userSpaceOnUse"><stop stop-color="#e64640" offset="0"/><stop stop-color="#f39a48" offset="1"/></linearGradient></defs><g transform="matrix(2 0 0 2 -9.9112e-6 -560.13)"><g transform="matrix(.067733 0 0 .067733 1.6934 281.76)"><circle transform="rotate(-45)" cx="-9.3051e-7" cy="141.42" r="125" fill="url(#linearGradient848)" stroke-width="1.1308"/><path d="m99.998 32.281c-4.7093 0-8.5586 3.8724-8.5586 8.6074-3e-5 0.0052-3e-5 0.01042 0 0.01563l0.41016 39.424-27.623-28.201c-0.0032-0.0039-0.0065-0.0078-0.0098-0.01172-1.5818-1.583-3.7761-2.459-6.0547-2.459-2.2781 0-4.4677 0.87608-6.0469 2.457-1.6117 1.6105-2.5114 3.7811-2.5078 6.0586 0.0024 2.2771 0.91303 4.4521 2.541 6.0801 0.0039 0.0033 0.0078 0.0066 0.01172 0.0098l28.172 27.59-39.479-0.41016c-0.0052-2e-5 -0.01042-2e-5 -0.01563 0-4.706 0-8.5586 3.8552-8.5586 8.5625 0 4.7078 3.8729 8.5566 8.6074 8.5566 0.0052 3e-5 0.01042 3e-5 0.01563 0l39.424-0.4082-28.197 27.617c-0.0033 3e-3 -0.0065 7e-3 -0.0098 0.01-1.6099 1.6063-2.5105 3.7747-2.5117 6.0488-0.0024 2.282 0.8979 4.453 2.5098 6.0625l2e-3 2e-3c1.6068 1.6007 3.7684 2.498 6.0391 2.498 2.2815 0 4.4621-0.90969 6.0918-2.543 0.0033-3e-3 0.0065-7e-3 0.0098-0.01l27.59-28.17-0.41015 39.48c-3e-5 5e-3 -3e-5 0.0104 0 0.0156 0 4.7057 3.8521 8.5606 8.5586 8.5606 4.707 0 8.5566-3.8734 8.5566-8.6074 2e-5 -5e-3 2e-5 -0.0104 0-0.0156l-0.40625-39.43 27.463 28.039 0.15039 0.1582c9e-3 9e-3 0.0181 0.0171 0.0273 0.0254 1.6083 1.5998 3.7709 2.4961 6.041 2.4961 2.2725 0 4.443-0.89674 6.0605-2.5059l6e-3 -6e-3c3.3126-3.3344 3.2914-8.7868-0.0508-12.129-3e-3 -4e-3 -7e-3 -8e-3 -0.01-0.0117l-28.166-27.586 39.475 0.4082c5e-3 3e-5 0.0104 3e-5 0.0156 0 4.7038 0 8.5556-3.8512 8.5566-8.5547 1e-3 -4.7109-3.8698-8.5645-8.6035-8.5645-5e-3 -3e-5 -0.0104-3e-5 -0.0156 0l-39.432 0.41211 28.043-27.467 0.14844-0.14062c0.0112-0.01025 0.0223-0.02067 0.0332-0.03125 3.3186-3.3271 3.3167-8.771-4e-3 -12.098l-2e-3 -2e-3c-1.5827-1.5814-3.7711-2.459-6.0449-2.459-2.2863 0-4.4908 0.89074-6.0938 2.4961-3e-3 0.0033-7e-3 0.0065-0.01 0.0098l-27.588 28.166 0.40625-39.473c2e-5 -0.0052 2e-5 -0.01042 0-0.01563 0-4.7055-3.8528-8.5586-8.5566-8.5586z" color="#000000" color-rendering="auto" dominant-baseline="auto" fill="#fff" image-rendering="auto" shape-rendering="auto" solid-color="#000000" style="font-feature-settings:normal;font-variant-alternates:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-position:normal;isolation:auto;mix-blend-mode:normal;shape-padding:0;text-decoration-color:#000000;text-decoration-line:none;text-decoration-style:solid;text-indent:0;text-orientation:mixed;text-transform:none;white-space:normal"/><path d="m100-9.168c-61.837 0-109.17 47.333-109.17 109.17 0 61.835 47.334 109.17 109.17 109.17s109.17-47.331 109.17-109.17c0-61.837-47.33-109.17-109.17-109.17zm0 19.652c49.374 0 89.52 40.145 89.52 89.52-9.8e-4 49.373-40.145 89.518-89.52 89.518s-89.521-40.144-89.521-89.518 40.146-89.52 89.521-89.52z" color="#000000" color-rendering="auto" dominant-baseline="auto" fill="#fff" image-rendering="auto" shape-rendering="auto" solid-color="#000000" style="font-feature-settings:normal;font-variant-alternates:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-position:normal;isolation:auto;mix-blend-mode:normal;shape-padding:0;text-decoration-color:#000000;text-decoration-line:none;text-decoration-style:solid;text-indent:0;text-orientation:mixed;text-transform:none;white-space:normal"/></g></g></svg>

Before

Width:  |  Height:  |  Size: 3.7 KiB

View File

@ -1,2 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><defs><linearGradient id="linearGradient4509" x1="-397.31" x2="-1652" y1="831.3" y2="-525.36" gradientTransform="matrix(.0508 0 0 .0508 55.984 -22.686)" gradientUnits="userSpaceOnUse"><stop stop-color="#f47721" offset="0"/><stop stop-color="#f47721" stop-opacity="0" offset="1"/></linearGradient><linearGradient id="linearGradient4517" x1="884.47" x2="-407.03" y1="1018.2" y2="-326.92" gradientTransform="matrix(.0508 0 0 .0508 -7.718 -29.976)" gradientUnits="userSpaceOnUse"><stop stop-color="#fca" offset="0"/><stop stop-color="#fca" stop-opacity="0" offset="1"/></linearGradient></defs><g transform="translate(-2.7214 16.933)"><path d="m14.363-12.7v-2.1167c0-1.0583 1.0583-2.1167 2.1167-2.1167h6.35c1.0583 0 2.1167 1.0583 2.1167 2.1167v2.1167h6.35c1.0583 0 2.1167 1.0583 2.1167 2.1167v4.2333h-2.1167l-1.3229 19.844c-0.26459 1.852-1.8521 3.4395-3.7042 3.4395h-13.176c-2.1167 0-3.7042-1.5875-3.7042-3.4395l-1.3758-19.844h-2.1167v-4.2333c0-1.3758 1.0583-2.1167 2.1167-2.1167z" fill="#fff" stroke-width="0"/><path d="m14.363-12.7v-2.1167c0-1.0583 1.0583-2.1167 2.1167-2.1167h6.35c1.0583 0 2.1167 1.0583 2.1167 2.1167v2.1167h6.35c1.0583 0 2.1167 1.0583 2.1167 2.1167v4.2333h-2.1167l-1.3229 19.844c-0.26459 1.852-1.8521 3.4395-3.7042 3.4395h-13.176c-2.1167 0-3.7042-1.5875-3.7042-3.4395l-1.3758-19.844h-2.1167v-4.2333c0-1.3758 1.0583-2.1167 2.1167-2.1167z" fill="url(#linearGradient4509)" stroke-width="0"/><path d="m18.614-2.6346h1.9911l0.10763 13.525h-2.1167zm-2.6638 13.631-2.1167 0.15882-0.79375-13.758h2.1167zm7.5671 0 1.9579 0.15882 0.79375-13.758h-2.1167z" fill="url(#linearGradient4517)" stroke-width=".52917"/></g></svg>

Before

Width:  |  Height:  |  Size: 1.8 KiB

View File

@ -1,2 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><defs><linearGradient id="a" x2="500" y2="500" gradientUnits="userSpaceOnUse"><stop stop-color="#3186c7" offset="0"/><stop stop-color="#4c5eb0" offset="1"/></linearGradient></defs><g transform="scale(.067733)"><path d="m0 0h500v500h-500z" fill="url(#a)"/><path d="m393.32 106.68v-52.802c0-12.498-10.132-22.629-22.629-22.629-12.498 0-22.629 10.131-22.629 22.629v52.802h-52.802c-12.498 0-22.629 10.131-22.629 22.629 0 12.498 10.131 22.629 22.629 22.629h52.802v52.802c0 12.498 10.132 22.629 22.629 22.629 12.498 0 22.629-10.131 22.629-22.629v-52.802h52.802c12.498 0 22.629-10.131 22.629-22.629 0-12.498-10.132-22.629-22.629-22.629zm-362.07 194.89c0-15.982 12.868-28.938 28.938-28.938h138.24c15.982 0 28.938 12.868 28.938 28.938v138.24c0 15.982-12.868 28.938-28.938 28.938h-138.24c-15.982 0-28.938-12.868-28.938-28.938zm241.38 0c0-15.982 12.868-28.938 28.938-28.938h138.24c15.982 0 28.938 12.868 28.938 28.938v138.24c0 15.982-12.868 28.938-28.938 28.938h-138.24c-15.982 0-28.938-12.868-28.938-28.938zm-241.38-241.38c0-15.982 12.868-28.938 28.938-28.938h138.24c15.982 0 28.938 12.868 28.938 28.938v138.24c0 15.982-12.868 28.938-28.938 28.938h-138.24c-15.982 0-28.938-12.868-28.938-28.938z" fill="#ebf0f8" stroke-width="29.167"/></g></svg>

Before

Width:  |  Height:  |  Size: 1.3 KiB

File diff suppressed because one or more lines are too long

Before

Width:  |  Height:  |  Size: 5.1 KiB

View File

@ -1,2 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g fill="#fff"><path d="m10.059 2.6825-2.1795-2.5149-7.7122 6.371 2.1795 2.5149zm23.64 3.8561-7.7122-6.5386-2.1795 2.5149 7.7122 6.5386zm-16.766-2.8502c-8.3828 0-15.089 6.7063-15.089 15.089s6.7063 15.089 15.089 15.089c8.3828 0 15.089-6.7063 15.089-15.089s-6.7063-15.089-15.089-15.089zm0 26.825c-6.5386 0-11.736-5.1974-11.736-11.736s5.1974-11.736 11.736-11.736c6.5386 0 11.736 5.1974 11.736 11.736s-5.1974 11.736-11.736 11.736zm1.6766-18.442h-3.3531v5.0297h-5.0297v3.3531h5.0297v5.0297h3.3531v-5.0297h5.0297v-3.3531h-5.0297z" fill-rule="evenodd" stroke-width="1.6766"/><path d="m15.008 33.713c-5.0456-0.64895-9.4614-3.8378-11.644-8.4085-1.9677-4.1212-1.9644-8.9637 0.008894-13.053 0.73828-1.5298 1.5335-2.6803 2.6994-3.9055 5.0082-5.2627 13.194-6.1307 19.29-2.0454 5.0399 3.3779 7.524 9.4838 6.3115 15.513-1.0007 4.9758-4.5419 9.1656-9.2983 11.001-1.0333 0.39877-2.2173 0.70467-3.3513 0.86587-0.86505 0.12297-3.1655 0.14112-4.0163 0.03169zm4.2738-3.3964c5.8515-1.1902 9.8262-6.4603 9.3732-12.428-0.0844-1.1118-0.2386-1.888-0.57834-2.911-0.57626-1.7353-1.479-3.1814-2.8273-4.529-1.7714-1.7706-3.8506-2.8459-6.3175-3.2673-0.8001-0.13667-1.1484-0.15416-2.3726-0.11912-1.5785 0.04518-2.4375 0.19986-3.737 0.67295-5.6372 2.0523-8.7688 8.0784-7.2782 14.005 1.1622 4.6211 5.03 8.0479 9.8408 8.7187 0.8176 0.11402 3.034 0.03291 3.8969-0.14259z" stroke-width=".13229"/></g></svg>

Before

Width:  |  Height:  |  Size: 1.5 KiB

View File

@ -1,2 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g transform="translate(3.698 25.515)"><path d="m6.3614-22.832-2.1795-2.5149-7.7122 6.371 2.1795 2.5149zm23.64 3.8561-7.7122-6.5386-2.1795 2.5149 7.7122 6.5386zm-16.766-2.8502c-8.3828 0-15.089 6.7063-15.089 15.089 0 8.3828 6.7063 15.089 15.089 15.089 8.3828 0 15.089-6.7063 15.089-15.089 0-8.3828-6.7063-15.089-15.089-15.089zm0 26.825c-6.5386 0-11.736-5.1974-11.736-11.736 0-6.5386 5.1974-11.736 11.736-11.736 6.5386 0 11.736 5.1974 11.736 11.736 0 6.5386-5.1974 11.736-11.736 11.736zm1.6766-18.442h-3.3531v5.0297h-5.0297v3.3531h5.0297v5.0297h3.3531v-5.0297h5.0297v-3.3531h-5.0297z" fill-rule="evenodd" stroke-width="1.6766"/><path d="m11.31 8.1983c-5.0456-0.64895-9.4614-3.8378-11.644-8.4085-1.9677-4.1212-1.9644-8.9637 0.008894-13.053 0.73828-1.5298 1.5335-2.6803 2.6994-3.9055 5.0082-5.2627 13.194-6.1307 19.29-2.0454 5.0399 3.3779 7.524 9.4838 6.3115 15.513-1.0007 4.9758-4.5419 9.1656-9.2983 11.001-1.0333 0.39877-2.2173 0.70467-3.3513 0.86587-0.86505 0.12297-3.1655 0.14112-4.0163 0.031695zm4.2738-3.3964c5.8515-1.1902 9.8262-6.4603 9.3732-12.428-0.0844-1.1118-0.2386-1.888-0.57834-2.911-0.57626-1.7353-1.479-3.1814-2.8273-4.529-1.7714-1.7706-3.8506-2.8459-6.3175-3.2673-0.8001-0.13667-1.1484-0.15416-2.3726-0.11912-1.5785 0.04518-2.4375 0.19986-3.737 0.67295-5.6372 2.0523-8.7688 8.0784-7.2782 14.005 1.1622 4.6211 5.03 8.0479 9.8408 8.7187 0.8176 0.11401 3.034 0.032915 3.8969-0.14259z" stroke-width=".13229"/></g></svg>

Before

Width:  |  Height:  |  Size: 1.5 KiB

View File

@ -1,2 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<svg version="1.1" viewBox="0 0 128 128" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><defs><linearGradient id="linearGradient-1" x1=".5" x2=".5" y1="1"><stop stop-color="#420C5D" offset="0"/><stop stop-color="#951AD1" offset="1"/></linearGradient><path id="path-2" d="m25 29c127.58 0 231 102.97 231 230s-103.42 230-231 230z"/><filter id="filter-3" x="-.182" y="-.074" width="1.294" height="1.148"><feOffset dx="-8" dy="0" in="SourceAlpha" result="shadowOffsetOuter1"/><feGaussianBlur in="shadowOffsetOuter1" result="shadowBlurOuter1" stdDeviation="10"/><feColorMatrix in="shadowBlurOuter1" values="0 0 0 0 0.250980392 0 0 0 0 0.250980392 0 0 0 0 0.250980392 0 0 0 0.2 0"/></filter><linearGradient id="linearGradient9148" x1="256" x2="256" y1="512" gradientUnits="userSpaceOnUse" xlink:href="#linearGradient-1"/><linearGradient id="linearGradient9150" x1="198.27" x2="198.27" y1="346.53" y2="20.551" gradientTransform="scale(.70864 1.4111)" gradientUnits="userSpaceOnUse" xlink:href="#linearGradient-1"/></defs><g id="Assets" transform="matrix(.24957 0 0 .24957 .21762 .22232)" fill="none" fill-rule="evenodd"><g id="Group"><g id="tb_icon/Stable"><g id="Stable"><circle id="background" cx="256" cy="256" r="246" fill="#f2e4ff" fill-rule="nonzero"/><path id="center" d="m256.53 465.44v-31.033c98.301-0.28386 177.9-80.042 177.9-178.41 0-98.365-79.595-178.12-177.9-178.41v-31.033c115.44 0.29096 208.92 93.937 208.92 209.44 0 115.51-93.482 209.16-208.92 209.45zm0-108.62c55.445-0.29095 100.32-45.304 100.32-100.83 0-55.516-44.878-100.53-100.32-100.82v-31.026c72.59 0.28386 131.36 59.192 131.36 131.85 0 72.661-58.766 131.57-131.36 131.85zm0-155.1c29.742 0.28386 53.777 24.462 53.777 54.274 0 29.82-24.036 53.997-53.777 54.281zm-256.53 54.274c0 141.39 114.61 256.01 256 256.01 141.38 0 256-114.62 256-256.01 0-141.38-114.62-255.99-256-255.99-141.39 0-256 114.61-256 255.99z" fill="url(#linearGradient9148)"/><g id="half" transform="matrix(-1,0,0,1,281,0)"><use width="100%" height="100%" fill="#000000" filter="url(#filter-3)" xlink:href="#path-2"/><use width="100%" height="100%" fill="url(#linearGradient9150)" fill-rule="evenodd" xlink:href="#path-2"/></g></g></g></g></g></svg>

Before

Width:  |  Height:  |  Size: 2.2 KiB

View File

@ -1,2 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<svg width="128" height="128" version="1.1" viewBox="0 0 33.866 33.866" xmlns="http://www.w3.org/2000/svg"><g stroke-width=".26458"><path id="area-white" d="m16.933 33.337h-5.8207v-1.0583l-0.52916-0.52916-2.6458-0.52916h-3.1749v-1.0583l-1.0583-1.0583h-1.0583v-1.0583l-0.52916-0.52916-1.0583-0.52916-1.0583-1.5875v-2.6458c15.279-2.8661 16.79-2.8661 33.866 0v2.6458l-1.0583 1.5875-1.0583 0.52916-0.52916 0.52916v1.0583h-1.0583l-1.0583 1.0583v1.0583h-3.1749l-2.6458 0.52916-0.52916 0.52916v1.0583z" fill="#fff"/><path id="area-green" d="m16.933 26.675h-7.8051v-2.0759h-4.1671v-2.0759h-4.1671l-0.52916-3.6227 0.52916-3.6227h2.0836v-4.1518h2.0836v-4.1518h2.0836v-2.0759h2.0836v-2.0759h4.1671v-2.0759l3.6379-0.52916 3.6379 0.52916v2.0759h4.1671v2.0759h2.0836v2.0759h2.0836v4.1518h2.0836v4.1518h2.0836l0.52916 3.6227-0.52916 3.6227h-4.1671v2.0759h-4.1671v2.0759z" fill="#8fc46a"/><path id="area-black" d="m16.933 33.866h-6.3499v-2.1166h-6.3499v-2.1166h-2.1166v-2.1166h-2.1166v-2.1166h2.1166v2.1166h2.1166v2.1166h6.3499v2.1166h12.7v-2.1166h6.3499v-2.1166h2.1166v-2.1166h2.1166v2.1166h-2.1166v2.1166h-2.1166v2.1166h-6.3499v2.1166zm0-6.3499h-8.4665v-2.1166h-4.2332v-2.1166h-4.2332v-8.4665h2.1166v-4.2332h2.1166v-4.2332h2.1166v-2.1166h2.1166v-2.1166h4.2332v-2.1166h8.4665v2.1166h4.2332v2.1166h2.1166v2.1166h2.1166v4.2332h2.1166v4.2332h2.1166v8.4665h-4.2332v2.1166h-4.2332v2.1166zm0-2.1166h6.3499v-4.2332h2.1166v2.1166h2.1166v-2.1166h4.2332v-4.2332h-6.3499v-2.1166h4.2332v-2.1166h-2.1166v-4.2332h-2.1166v-2.1166h-4.2332v-2.1166h-2.1166v-2.1166h-4.2332v2.1166h-2.1166v2.1166h-4.2332v2.1166h-2.1166v4.2332h-2.1166v2.1166h4.2332v2.1166h-6.3499v4.2332h4.2332v2.1166h2.1166v-2.1166h2.1166v4.2332zm-5.2916-4.2332h-1.0583v-2.1166h2.1166v-2.1166h-2.1166v-2.1166h-2.1166v-4.2332h2.1166v-2.1166h2.1166v-2.1166h8.4665v2.1166h2.1166v2.1166h2.1166v4.2332h-2.1166v2.1166h-2.1166v2.1166h2.1166v2.1166h-2.1166v-2.1166h-8.4665v2.1166zm5.2916-4.2332h4.2332v-2.1166h2.1166v-4.2332h-2.1166v-2.1166h-8.4665v2.1166h-2.1166v4.2332h2.1166v2.1166z"/></g></svg>

Before

Width:  |  Height:  |  Size: 2.0 KiB

View File

@ -1,2 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g id="XMLID_1_" transform="matrix(.22578 0 0 .22578 3.8879 -1.6667e-7)"><g id="XMLID_44_" fill="#0a323d"><polygon id="XMLID_37_" points="0 41.667 0 58.333 43.334 83.333 43.334 66.667"/><polygon id="XMLID_38_" points="14.445 83.333 14.445 100 57.778 125 57.778 108.33"/><polygon id="XMLID_39_" points="0 108.33 0 125 43.334 150 43.334 133.33"/><polygon id="XMLID_40_" points="43.334 33.333 43.334 50 86.667 75 86.667 58.333"/><polygon id="XMLID_41_" points="57.778 8.333 57.778 25.038 101.11 50 101.11 33.333"/><polygon id="XMLID_42_" points="57.778 74.995 57.778 91.661 101.11 116.66 101.11 99.995"/><polygon id="XMLID_43_" points="28.889 58.333 28.889 75 72.223 100 72.223 83.333"/></g><g id="XMLID_36_" fill="#267d91"><polygon id="XMLID_26_" points="0 41.667 14.445 33.333 57.778 58.333 43.334 66.667"/><polygon id="XMLID_28_" points="14.39 49.971 28.835 41.638 72.168 66.638 57.724 74.971"/><polygon id="XMLID_29_" points="28.889 58.333 43.334 50 86.667 75 72.223 83.333"/><polygon id="XMLID_30_" points="43.333 33.371 57.778 25.038 101.11 50 86.667 58.371"/><polygon id="XMLID_31_" points="57.778 8.333 72.223 0 115.56 25 101.11 33.333"/><polygon id="XMLID_32_" points="43.279 66.638 57.724 58.305 101.06 83.305 86.613 91.638"/><polygon id="XMLID_33_" points="57.778 75 72.223 66.667 115.56 91.667 101.11 100"/><polygon id="XMLID_34_" points="14.445 83.333 28.889 75 72.223 100 57.778 108.33"/><polygon id="XMLID_35_" points="0 108.33 14.445 100 57.778 125 43.334 133.33"/></g><g id="XMLID_17_" fill="#71d2e2"><polygon id="XMLID_18_" points="57.778 58.333 57.778 75 43.334 83.333 43.334 66.667"/><polygon id="XMLID_19_" points="72.223 66.667 72.223 83.333 57.778 91.667 57.778 75"/><polygon id="XMLID_20_" points="86.667 75 86.667 91.667 72.223 100 72.223 83.333"/><polygon id="XMLID_21_" points="101.11 50 101.11 66.667 86.667 75 86.667 58.333"/><polygon id="XMLID_22_" points="115.56 25 115.56 41.667 101.11 50 101.11 33.333"/><polygon id="XMLID_23_" points="101.12 83.328 101.12 99.995 86.677 108.33 86.677 91.661"/><polygon id="XMLID_24_" points="115.56 91.667 115.56 108.33 101.11 116.67 101.11 100"/><polygon id="XMLID_25_" points="72.223 100 72.223 116.67 57.778 125 57.778 108.33"/><polygon id="XMLID_64_" points="57.778 125 57.778 141.67 43.334 150 43.334 133.33"/></g></g></svg>

Before

Width:  |  Height:  |  Size: 2.4 KiB

View File

@ -1,9 +1,14 @@
---
layout: evergreen
title: Browser Recommendations
description: "These are our current web browser recommendations, settings, and add-ons you can use to preserve your privacy."
description: "These are our current web browser recommendations and settings you can use to preserve your privacy. We recommend keeping extensions to a minimum: they have privileged access within your browser, require you to trust the developer, can make you <a href='https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint'>stand out</a>, and <a href='https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ'>weaken</a> site isolation."
---
<h2 id="general-recommendations" class="anchor">
<a href="#general-recommendations"><i class="fas fa-link anchor-icon"></i></a>
General Recommendations
</h2>
{% for item_hash in site.data.software.browsers %}
{% assign item = item_hash[1] %}
@ -13,153 +18,48 @@ description: "These are our current web browser recommendations, settings, and a
{% endfor %}
<h2>Worth Mentioning</h2>
<h2 id="desktop-only-recommendations" class="anchor">
<a href="#destop-only-recommendations"><i class="fas fa-link anchor-icon"></i></a>
Desktop Only Recommendations
</h2>
{% for item_hash in site.data.software.browsers %}
{% for item_hash in site.data.software.browsers-desktop %}
{% assign item = item_hash[1] %}
{% if item.type == "Worth Mentioning" %}
{% include recommendation-text.html %}
{% if item.type == "Recommendation" %}
{% include recommendation-card.html %}
{% endif %}
{% endfor %}
<h2>Anti-Recommendations</h2>
<h2 id="mobile-only-recommendations" class="anchor">
<a href="#mobile-only-recommendations"><i class="fas fa-link anchor-icon"></i></a>
Mobile Only Recommendations
</h2>
{% for item_hash in site.data.software.browsers %}
<p>On Android, Mozilla's engine <a href="https://mozilla.github.io/geckoview/">GeckoView</a> has yet to support <a href="https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture">site isolation</a> or enable <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1565196">isolatedProcess</a>. It also doesn't yet have <a href="https://github.com/mozilla-mobile/fenix/issues/16952#issuecomment-907960218">HTTPS-Only mode</a>. These features are supported in Bromite as it uses <a href="https://developer.android.com/reference/android/webkit/WebView">Chromium WebView</a> which is included in all Android operating systems. We do not recommend Firefox or any Gecko based browsers at this time.</p>
<p>On iOS all web browsers use the <a href="https://en.wikipedia.org/wiki/WebKit">WebKit</a> browser engine, including Firefox. However, Firefox includes a few extra features like Tracking Protection and the ability to add search engines.</p>
{% for item_hash in site.data.software.browsers-mobile %}
{% assign item = item_hash[1] %}
{% if item.type == "Anti-Recommendation" %}
{% include recommendation-text.html %}
{% if item.type == "Recommendation" %}
{% include recommendation-card.html %}
{% endif %}
{% endfor %}
{% include hr.html %}
<h2 id="additional-resources" class="anchor">
<a href="#additional-resources"><i class="fas fa-link anchor-icon"></i></a>
Additional Resources
</h2>
<h2>Additional Mobile Recommendations</h2>
{% for item_hash in site.data.software.browsers-resources %}
{% assign item = item_hash[1] %}
{% include legacy/cardv2.html
title="Bromite"
image="/assets/img/legacy_svg/3rd-party/bromite.svg"
description='Bromite is a Chromium-based browser with privacy and security enhancements, built-in adblocking and DNS over HTTPS support; it includes patches from ungoogled-chromium and other privacy-focused projects. More info can be found <a href="https://www.bromite.org/#main-features">on the official website</a>.'
website="https://www.bromite.org/"
github="https://github.com/bromite/bromite"
privacy-policy="https://www.bromite.org/privacy"
fdroid="https://www.bromite.org/fdroid"
android="https://www.bromite.org/#download-bromite"
%}
{% if item.type == "Recommendation" %}
{% include recommendation-card.html %}
{% endif %}
{% include legacy/cardv2.html
title="Onion Browser"
image="/assets/img/legacy_svg/3rd-party/onion_browser.svg"
description='Onion Browser is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the <a href="https://support.torproject.org/glossary/onion-browser/">Tor Project</a>. Warning: there are certain anonymity-related <a href="https://onionbrowser.com/about">issues</a> with Onion Browser due to iOS limitations.'
website="https://onionbrowser.com/"
privacy-policy="https://onionbrowser.com/privacy-policy"
github="https://github.com/OnionBrowser/OnionBrowser"
ios="https://apps.apple.com/us/app/onion-browser/id519296448"
%}
{% include legacy/cardv2.html
title="DuckDuckGo Privacy Browser"
image="/assets/img/legacy_svg/3rd-party/duckduckgo.svg"
description='DuckDuckGo Privacy Browser is an open-source web browser that has built-in ad and tracker blocking and utilizes <a href="https://tosdr.org/">ToS;DR</a> to rate the privacy policies of the sites you visit.'
website="https://duckduckgo.com/app"
privacy-policy="https://duckduckgo.com/privacy"
tor="https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/app"
github="https://github.com/duckduckgo/iOS"
ios="https://apps.apple.com/us/app/duckduckgo-privacy-browser/id663592361"
%}
<h2>Browser Fingerprinting - Is your browser configuration unique?</h2>
<div class="alert alert-info" role="alert">
Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.
</div>
<p>When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called <a href="https://coveryourtracks.eff.org/" target="_blank">Cover Your Tracks</a> to test your browser to see how unique it is.</p>
<p>
<a class="btn btn-warning" target="_blank" href="https://coveryourtracks.eff.org/">
Test your Browser now
</a>
</p>
<p>You need to find what <strong>most browsers</strong> are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a <a href="https://addons.mozilla.org/firefox/addon/uaswitcher/">spoofed user-agent string</a> to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.</p>
<p>Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use <a href="#addons"><i class="fas fa-link"></i> free software plugins</a> to regain control. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.</p>
<h3>Related Information</h3>
<ul>
<li><a href="https://coveryourtracks.eff.org/static/browser-uniqueness.pdf">How Unique Is Your Web Browser? Peter Eckersley, EFF.</a></li>
<li><a href="#addons"><i class="fas fa-link"></i> Our Firefox privacy add-ons section.</a></li>
<li><a href="https://www.browserleaks.com/">BrowserLeaks.com</a> - Web browser security testing tools that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet.</li>
</ul>
{% include hr.html %}
<h2 id="webrtc" class="anchor">WebRTC IP Leak Test - Is your IP address leaking?</h2>
<div class="alert alert-info" role="alert">
WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN.
</div>
<p>While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe. <strong>Note:</strong> This disables browser-based call functionality that is used for webapps like Discord, Hangouts, Jitsi, etc.</p>
<p>
<a class="btn btn-warning" target="_blank" rel="noopener noreferrer" href="https://ipleak.net">Test your Browser now</a>
</p>
<h3>How to disable WebRTC in Firefox?</h3>
<p>In short: Set "media.peerconnection.enabled" to "false" in "about:config".</p>
<p><strong>Explained:</strong></p>
<ol class="long-string-list">
<li>Enter "about:config" in the firefox address bar and press enter.</li>
<li>Press the button "I'll be careful, I promise!"</li>
<li>Search for "media.peerconnection.enabled"</li>
<li>Double click the entry, the column "Value" should now be "false"</li>
<li>Done. Do the WebRTC leak test again.</li>
</ol>
<p>If you want to make sure every single WebRTC-related setting is really disabled change these settings:</p>
<ol class="long-string-list">
<li>media.peerconnection.turn.disable = true</li>
<li>media.peerconnection.use_document_iceservers = false</li>
<li>media.peerconnection.video.enabled = false</li>
<li>media.peerconnection.identity.timeout = 1</li>
</ol>
<p>Now you can be 100% sure WebRTC is disabled.</p>
<p>
<a class="btn btn-primary" target="_blank" rel="noopener noreferrer" href="https://ipleak.net">Test your Browser again</a>
</p>
<h3>How to disable WebRTC in Safari?</h3>
<p>Safari is far stricter with WebRTC than other major browsers, and it does not leak your IP address in its default configuration. If you'd like, you can follow these steps just to double-check your browser:</p>
<ol class="long-string-list">
<li>Choose "Preferences" under the Safari menu in your menu bar.</li>
<li>Select the Advanced tab and check the "Show Develop menu in menu bar" box.</li>
<li>Exit Preferences and open the Develop menu in your menu bar.</li>
<li>In the drop-down menu, open the "WebRTC" submenu and ensure "Enable Legacy WebRTC API" is unchecked. If it's grayed out, even better.</li>
</ol>
<h3>How to disable WebRTC in Google Chrome?</h3>
<p>WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include <a href="https://chrome.google.com/webstore/detail/webrtc-leak-prevent/eiadekoaikejlgdbkbdfeijglgfdalml">WebRTC Leak Prevent</a> (options may need to be changed depending on the scenario), and <a href="https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm">uBlock Origin</a> (select "Prevent WebRTC from leaking local IP addresses" in Settings).</p>
<h3>What about other browsers?</h3>
<p>Chrome on macOS and Internet Explorer do not yet implement WebRTC.</p>
{% include hr.html %}
{% include legacy/sections/browser-addons.html %}
{% include legacy/sections/browser-tweaks.html %}
{% endfor %}