diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md index a27d59e..b8c876b 100644 --- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md +++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md @@ -1,7 +1,7 @@ --- name: Troubleshooting help about: Ask for help to solve problems with user.js -title: '' +title: 'follow instructions or this will be closed as invalid' labels: '' assignees: '' @@ -9,16 +9,18 @@ assignees: '' + 🟥 https://github.com/arkenfox/user.js/wiki/5.2-Troubleshooting - [ ] I have read the troubleshooting guide, done the checks and confirmed this is caused by arkenfox + - _unchecked issues ~~may~~ will be closed as invalid_ -🟪 INFO +🟪 REQUIRED INFO - Browser version & OS: - Steps to Reproduce (STR): - Expected result: diff --git a/updater.sh b/updater.sh index 57a1e96..e8bb155 100755 --- a/updater.sh +++ b/updater.sh @@ -2,7 +2,7 @@ ## arkenfox user.js updater for macOS and Linux -## version: 3.3 +## version: 3.4 ## Author: Pat Johnson (@overdodactyl) ## Additional contributors: @earthlng, @ema-pe, @claustromaniac @@ -106,7 +106,7 @@ Optional Arguments: download_file() { # expects URL as argument ($1) declare -r tf=$(mktemp) - $DOWNLOAD_METHOD "${tf}" "$1" && echo "$tf" || echo '' # return the temp-filename or empty string on error + $DOWNLOAD_METHOD "${tf}" "$1" &>/dev/null && echo "$tf" || echo '' # return the temp-filename or empty string on error } open_file() { # expects one argument: file_path diff --git a/user.js b/user.js index 9098913..e3944d8 100644 --- a/user.js +++ b/user.js @@ -1,7 +1,7 @@ /****** * name: arkenfox user.js -* date: 12 February 2022 -* version: 97 +* date: 10 March 2022 +* version: 98 * url: https://github.com/arkenfox/user.js * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt @@ -514,8 +514,11 @@ user_pref("security.family_safety.mode", 0); * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16206 ***/ user_pref("security.cert_pinning.enforcement_level", 2); /* 1224: enable CRLite [FF73+] - * In FF84+ it covers valid certs and in mode 2 doesn't fall back to OCSP - * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1429800,1670985 + * 0 = disabled + * 1 = consult CRLite but only collect telemetry (default) + * 2 = consult CRLite and enforce both "Revoked" and "Not Revoked" results + * 3 = consult CRLite and enforce "Not Revoked" results, but defer to OCSP for "Revoked" (FF99+) + * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1429800,1670985,1753071 * [2] https://blog.mozilla.org/security/tag/crlite/ ***/ user_pref("security.remote_settings.crlite_filters.enabled", true); user_pref("security.pki.crlite_mode", 2); @@ -646,7 +649,7 @@ user_pref("media.eme.enabled", false); // user_pref("media.autoplay.default", 5); /* 2031: disable autoplay of HTML5 media if you interacted with the site [FF78+] * 0=sticky (default), 1=transient, 2=user - * Firefox's Autoplay Policy Documentation [PDF] is linked below via SUMO + * Firefox's Autoplay Policy Documentation (PDF) is linked below via SUMO * [NOTE] If you have trouble with some video sites, then add an exception (2030) * [1] https://support.mozilla.org/questions/1293231 ***/ user_pref("media.autoplay.blocking_policy", 2); @@ -851,6 +854,8 @@ user_pref("privacy.sanitize.timeSpan", 0); 418986 - limit window.screen & CSS media queries (FF41) [TEST] https://arkenfox.github.io/TZP/tzp.html#screen 1281949 - spoof screen orientation (FF50) + 1281963 - hide the contents of navigator.plugins and navigator.mimeTypes (FF50) + FF53: fixes GetSupportedNames in nsMimeTypeArray and nsPluginArray (1324044) 1330890 - spoof timezone as UTC0 (FF55) 1360039 - spoof navigator.hardwareConcurrency as 2 (FF55) 1217238 - reduce precision of time exposed by javascript (FF55) @@ -1076,9 +1081,6 @@ user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true] /* 6002: enforce no referer spoofing * [WHY] Spoofing can affect CSRF (Cross-Site Request Forgery) protections ***/ user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false] -/* 6003: enforce CSP (Content Security Policy) - * [1] https://developer.mozilla.org/docs/Web/HTTP/CSP ***/ -user_pref("security.csp.enable", true); // [DEFAULT: true] /* 6004: enforce a security delay on some confirmation dialogs such as install, open/save * [1] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/ user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000] @@ -1211,7 +1213,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies // user_pref("privacy.trackingprotection.socialtracking.enabled", true); // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true] // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true] -/* 7017: disable service workers [FF32, FF44-compat] +/* 7017: disable service workers * [WHY] Already isolated (FF96+) with TCP (2701) behind a pref (2710) * or blocked with TCP in 3rd parties (FF95 or lower) ***/ // user_pref("dom.serviceWorkers.enabled", false); @@ -1236,7 +1238,7 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's crossed the Jordan // user_pref("dom.enable_performance", false); // user_pref("dom.enable_resource_timing", false); // user_pref("dom.gamepad.enabled", false); - // user_pref("dom.netinfo.enabled", false); + // user_pref("dom.netinfo.enabled", false); // [DEFAULT: false NON-ANDROID: false ANDROID FF99+] // user_pref("dom.webaudio.enabled", false); /* 8002: disable other ***/ // user_pref("browser.display.use_document_fonts", 0); @@ -1303,7 +1305,7 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see bugzilla 1320061 [FF53+] // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [DEFAULT: false on Linux] // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART] - // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+, FF59 and under] + // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+] /* UX FEATURES ***/ user_pref("browser.messaging-system.whatsNewPanel.enabled", false); // What's New toolbar icon [FF69+] // user_pref("extensions.pocket.enabled", false); // Pocket Account [FF46+] diff --git a/wikipiki/rfpCanvasException.png b/wikipiki/rfpCanvasException.png new file mode 100644 index 0000000..6889f80 Binary files /dev/null and b/wikipiki/rfpCanvasException.png differ diff --git a/wikipiki/smartReferer.png b/wikipiki/smartReferer.png new file mode 100644 index 0000000..c64b93a Binary files /dev/null and b/wikipiki/smartReferer.png differ diff --git a/wikipiki/uboCustom.png b/wikipiki/uboCustom.png new file mode 100644 index 0000000..2b8c443 Binary files /dev/null and b/wikipiki/uboCustom.png differ