1
0

Bwooooarrkkk .. missing parrots

For the four new sections .. hopefully no more parrots need be harmed in the making of this js. PS: The origin of popping clogs is interesting
This commit is contained in:
Thorin-Oakenpants 2017-09-16 02:33:29 +12:00 committed by GitHub
parent 4d35be7ccb
commit 2e4e0a6327

View File

@ -1523,6 +1523,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
** 1344170 - isolate blob: URI (FF55+) ** 1344170 - isolate blob: URI (FF55+)
** 1300671 - isolate data://, about: URLs (FF55+) ** 1300671 - isolate data://, about: URLs (FF55+)
***/ ***/
user_pref("ghacks_user.js.parrot", "4000 syntax error: the parrot's pegged out");
/* 4001: enable First Party Isolation (FF51+) /* 4001: enable First Party Isolation (FF51+)
* [WARNING] May break cross-domain logins and site functionality until perfected * [WARNING] May break cross-domain logins and site functionality until perfected
* [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1260931 ***/ * [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1260931 ***/
@ -1572,6 +1573,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true);
** 1382533 - enable fingerprinting resistance for Presentation API (see 2513) (FF57+) ** 1382533 - enable fingerprinting resistance for Presentation API (see 2513) (FF57+)
This blocks exposure of local IP Addresses via mDNS (Multicast DNS) This blocks exposure of local IP Addresses via mDNS (Multicast DNS)
***/ ***/
user_pref("ghacks_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
/* 4501: enable privacy.resistFingerprinting (FF41+) /* 4501: enable privacy.resistFingerprinting (FF41+)
* [1] https://bugzilla.mozilla.org/show_bug.cgi?id=418986 ***/ * [1] https://bugzilla.mozilla.org/show_bug.cgi?id=418986 ***/
user_pref("privacy.resistFingerprinting", true); // (hidden pref) (not hidden FF55+) user_pref("privacy.resistFingerprinting", true); // (hidden pref) (not hidden FF55+)
@ -1589,6 +1591,7 @@ user_pref("privacy.window.maxInnerHeight", 900); // (hidden pref)
Make sure they are RESET in about:config as per your Firefox version Make sure they are RESET in about:config as per your Firefox version
* IF you DO NOT use RFP or are on ESR... then turn on each ESR section below * IF you DO NOT use RFP or are on ESR... then turn on each ESR section below
***/ ***/
user_pref("ghacks_user.js.parrot", "4600 syntax error: the parrot's crossed the Jordan");
/* [NOTE] ESR52.x and non-RFP users replace the * with a slash on this line to enable these /* [NOTE] ESR52.x and non-RFP users replace the * with a slash on this line to enable these
// FF55+ // FF55+
// 4601: spoof (or limit?) number of CPU cores (FF48+) // 4601: spoof (or limit?) number of CPU cores (FF48+)
@ -1615,6 +1618,7 @@ user_pref("privacy.window.maxInnerHeight", 900); // (hidden pref)
which is already plugging leaks (see 2 above) the prefs below do not address which is already plugging leaks (see 2 above) the prefs below do not address
* Values below are for example only based on the current ESR/TBB at the time of writing * Values below are for example only based on the current ESR/TBB at the time of writing
***/ ***/
user_pref("ghacks_user.js.parrot", "4700 syntax error: the parrot's taken 'is last bow");
/* 4701: navigator.userAgent leaks in JS /* 4701: navigator.userAgent leaks in JS
* [NOTE] Setting this will break any UA spoofing extension whitelisting ***/ * [NOTE] Setting this will break any UA spoofing extension whitelisting ***/
// user_pref("general.useragent.override", "Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0"); // (hidden pref) // user_pref("general.useragent.override", "Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0"); // (hidden pref)