diff --git a/user.js b/user.js index 85b59f4..603d0ef 100644 --- a/user.js +++ b/user.js @@ -586,7 +586,8 @@ user_pref("browser.cache.disk.enable", false); * [1] https://bugzilla.mozilla.org/967812 ***/ // user_pref("permissions.memory_only", true); // [HIDDEN PREF] /* 1007: disable media cache from writing to disk in Private Browsing - * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB ***/ + * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB + * [SETUP-WEB] ESR78: playback might break on subsequent loading (1650281) ***/ user_pref("browser.privatebrowsing.forceMediaMemoryCache", true); // [FF75+] user_pref("media.memory_cache_max_size", 65536); @@ -735,9 +736,11 @@ user_pref("security.mixed_content.block_display_content", true); user_pref("security.mixed_content.block_object_subrequest", true); /* 1244: enable HTTPS-Only mode [FF76+] * When "https_only_mode" (all windows) is true, "https_only_mode_pbm" (private windows only) is ignored + * [WARNING] This is experimental, see [1] and you can't set exceptions if FPI is enabled, see [2] * [SETTING] to add site exceptions: Page Info>Permissions>Use insecure HTTP (FF80+) * [SETTING] Privacy & Security>HTTPS-Only Mode (FF80+ with browser.preferences.exposeHTTPSOnly = true) - * [1] https://bugzilla.mozilla.org/1613063 ***/ + * [1] https://bugzilla.mozilla.org/1613063 [META] + * [2] https://bugzilla.mozilla.org/1647829 ***/ // user_pref("dom.security.https_only_mode", true); // [FF76+] // user_pref("dom.security.https_only_mode_pbm", true); // [FF80+] // user_pref("dom.security.https_only_mode.upgrade_local", true); // [FF77+] @@ -1696,5 +1699,99 @@ user_pref("intl.charset.fallback.override", "windows-1252"); // * * * / // ***/ +/* ESR68.x still uses all the following prefs +// [NOTE] replace the * with a slash in the line above to re-enable them +// FF69 +// 1405: disable WOFF2 (Web Open Font Format) [FF35+] + // [-] https://bugzilla.mozilla.org/1556991 + // user_pref("gfx.downloadable_fonts.woff2.enabled", false); +// 1802: enforce click-to-play for plugins + // [-] https://bugzilla.mozilla.org/1519434 +user_pref("plugins.click_to_play", true); // [DEFAULT: true FF25+] +// 2033: disable autoplay for muted videos [FF63+] - replaced by 'media.autoplay.default' options (2030) + // [-] https://bugzilla.mozilla.org/1562331 + // user_pref("media.autoplay.allow-muted", false); +// * * * / +// FF71 +// 2608: disable WebIDE and ADB extension download + // [1] https://trac.torproject.org/projects/tor/ticket/16222 + // [-] https://bugzilla.mozilla.org/1539462 +user_pref("devtools.webide.enabled", false); // [DEFAULT: false FF70+] +user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+] +// 2731: enforce websites to ask to store data for offline use + // [1] https://support.mozilla.org/questions/1098540 + // [2] https://bugzilla.mozilla.org/959985 + // [-] https://bugzilla.mozilla.org/1574480 +user_pref("offline-apps.allow_by_default", false); +// * * * / +// FF72 +// 0105a: disable Activity Stream telemetry + // [-] https://bugzilla.mozilla.org/1597697 +user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", ""); +// 0330: disable Hybdrid Content telemetry + // [-] https://bugzilla.mozilla.org/1520491 +user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+] +// 2720: enforce IndexedDB (IDB) as enabled + // IDB is required for extensions and Firefox internals (even before FF63 in [1]) + // To control *website* IDB data, control allowing cookies and service workers, or use + // Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize + // on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically + // via an extension. Note that IDB currently cannot be sanitized by host. + // [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/ + // [-] https://bugzilla.mozilla.org/1488583 +user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true] +// * * * / +// FF74 +// 0203: use Mozilla geolocation service instead of Google when geolocation is enabled + // Optionally enable logging to the console (defaults to false) + // [-] https://bugzilla.mozilla.org/1613627 +user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%"); + // user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF] +// 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME] + // 0=no menu (default), 1=show when clicked, 2=show on long press + // [1] https://bugzilla.mozilla.org/1328756 + // [-] https://bugzilla.mozilla.org/1606265 +user_pref("privacy.userContext.longPressBehavior", 2); +// 2012: limit WebGL + // [-] https://bugzilla.mozilla.org/1477756 +user_pref("webgl.disable-extensions", true); +// * * * / +// FF76 +// 0401: sanitize blocklist url + // [2] https://trac.torproject.org/projects/tor/ticket/16931 + // [-] https://bugzilla.mozilla.org/1618188 +user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/"); +// 2201: prevent websites from disabling new window features + // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507375,1660524 +user_pref("dom.disable_window_open_feature.close", true); +user_pref("dom.disable_window_open_feature.location", true); // [DEFAULT: true] +user_pref("dom.disable_window_open_feature.menubar", true); +user_pref("dom.disable_window_open_feature.minimizable", true); +user_pref("dom.disable_window_open_feature.personalbar", true); // bookmarks toolbar +user_pref("dom.disable_window_open_feature.resizable", true); // [DEFAULT: true] +user_pref("dom.disable_window_open_feature.status", true); // [DEFAULT: true] +user_pref("dom.disable_window_open_feature.titlebar", true); +user_pref("dom.disable_window_open_feature.toolbar", true); +// * * * / +// FF77 +// 0850e: disable location bar one-off searches [FF51+] + // [-] https://bugzilla.mozilla.org/1628926 + // user_pref("browser.urlbar.oneOffSearches", false); +// 2605: block web content in file processes [FF55+] + // [SETUP-WEB] You may want to disable this for corporate or developer environments + // [1] https://bugzilla.mozilla.org/1343184 + // [-] https://bugzilla.mozilla.org/1603007 +user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false); +// * * * / +// FF78 +// 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] - replaced by 'media.autoplay.blocking_policy' + // [-] https://bugzilla.mozilla.org/1509933 +user_pref("media.autoplay.enabled.user-gestures-needed", false); +// 5000's: disable chrome animations - replaced FF77+ by 'ui.prefersReducedMotion' (4520) + // [-] https://bugzilla.mozilla.org/1640501 + // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+] +// * * * / +// ***/ + /* END: internal custom pref to test for syntax errors ***/ user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");