diff --git a/user.js b/user.js index 5fee46a..55c805e 100644 --- a/user.js +++ b/user.js @@ -216,7 +216,7 @@ user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!"); * [NOTE] It includes updates for "revoked certificates" * [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/ * [2] https://trac.torproject.org/projects/tor/ticket/16931 ***/ -user_pref("extensions.blocklist.enabled", true); +user_pref("extensions.blocklist.enabled", true); // default: true user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/"); /* 0402: enable Kinto blocklist updates (FF50+) * What is Kinto?: https://wiki.mozilla.org/Firefox/Kinto#Specifications @@ -424,7 +424,7 @@ user_pref("network.predictor.enable-prefetch", false); user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!"); /* 0701: disable IPv6 * IPv6 can be abused, especially regarding MAC addresses. They also do not play nice - * with VPNs. That's even assuming your ISP and/or router and/or website can hande it + * with VPNs. That's even assuming your ISP and/or router and/or website can handle it * [WARNING] This is just an application level fallback. Disabling IPv6 is best done * at an OS/network level, and/or configured properly in VPN setups * [TEST] http://ipv6leak.com/ @@ -781,7 +781,7 @@ user_pref("security.cert_pinning.enforcement_level", 2); /** MIXED CONTENT ***/ /* 1240: disable insecure active content on https pages - mixed content * [1] https://trac.torproject.org/projects/tor/ticket/21323 ***/ -user_pref("security.mixed_content.block_active_content", true); +user_pref("security.mixed_content.block_active_content", true); // default: true /* 1241: disable insecure passive content (such as images) on https pages - mixed context ***/ user_pref("security.mixed_content.block_display_content", true); @@ -939,7 +939,7 @@ user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!"); * [SETTING] Privacy & Security>Tabs>Enable Container Tabs ***/ // user_pref("privacy.userContext.enabled", true); /* 1703: enable a private container for thumbnail loads (FF51+) ***/ - // user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); + // user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // default: true in FF61+ /* 1704: set long press behaviour on "+ Tab" button to display container menu (FF53+) * 0=disables long press, 1=when clicked, the menu is shown * 2=the menu is shown after X milliseconds @@ -1336,7 +1336,7 @@ user_pref("security.csp.experimentalEnabled", true); * [1] https://bugzilla.mozilla.org/1331351 * [2] https://www.wordfence.com/blog/2017/01/gmail-phishing-data-uri/ * [3] https://www.fxsitecompat.com/en-CA/docs/2017/data-url-navigations-on-top-level-window-will-be-blocked/ ***/ -user_pref("security.data_uri.block_toplevel_data_uri_navigations", true); +user_pref("security.data_uri.block_toplevel_data_uri_navigations", true); // default: true in FF59+ /* 2684: enforce a security delay on some confirmation dialogs such as install, open/save * [1] http://kb.mozillazine.org/Disable_extension_install_delay_-_Firefox * [2] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/ @@ -1382,7 +1382,7 @@ user_pref("network.cookie.leave-secure-alone", true); // default: true * [3] https://www.sjoerdlangkemper.nl/2016/04/14/preventing-csrf-with-samesite-cookie-attribute/ ***/ // user_pref("network.cookie.same-site.enabled", true); // default: true /* 2710: disable DOM (Document Object Model) Storage - * [WARNING] This will break a LOT of sites' functionality. + * [WARNING] This will break a LOT of sites' functionality AND extensions! * You are better off using an extension for more granular control ***/ // user_pref("dom.storage.enabled", false); /* 2720: enforce IndexedDB (IDB) as enabled @@ -1398,7 +1398,7 @@ user_pref("dom.indexedDB.enabled", true); // default: true user_pref("browser.cache.offline.enable", false); /* 2730b: disable offline cache on insecure sites (FF60+) * [1] https://blog.mozilla.org/security/2018/02/12/restricting-appcache-secure-contexts/ ***/ -user_pref("browser.cache.offline.insecure.enable", false); +user_pref("browser.cache.offline.insecure.enable", false); // default: false in FF62+ /* 2731: enforce websites to ask to store data for offline use * [1] https://support.mozilla.org/questions/1098540 * [2] https://bugzilla.mozilla.org/959985 ***/