1
0
Commit Graph

1967 Commits

Author SHA1 Message Date
Thorin-Oakenpants
fd860e6c69
flip RFP newwin max values, closes #1286 2021-12-04 10:23:59 +00:00
Thorin-Oakenpants
d1d20b897a
wiki cleanup (#1289) 2021-12-04 09:36:09 +00:00
Thorin-Oakenpants
cf0102f71e
fixup: from being flogged to death by overseers
thanks @dngray, also save some precious bytes .. polar bears know about scarce resources
2021-12-02 09:34:34 +00:00
Thorin-Oakenpants
4dc5372257
0603: network.predictor.enable-prefetch
make active for Nighty users - see https://bugzilla.mozilla.org/show_bug.cgi?id=1506194
2021-11-30 13:29:19 +00:00
Thorin-Oakenpants
c2ddfd60bf
tidy 79-91 removed items 2021-11-28 13:22:46 +00:00
Thorin-Oakenpants
47de4f520b
tidy 5505 2021-11-28 09:01:39 +00:00
Thorin-Oakenpants
27977a16ad
2652: browser.download.alwaysOpenPanel
FYI: https://bugzilla.mozilla.org/1738372

There is a small privacy issue with shoulder surfers, but in reality, this just needs to happen IMO
- we already prompt where to save, but even if we didn't, we also know we clicked or initiated a download
   - unless it's a drive by or user-gesture trickery - which is why we prompt
- the download icon is shown (if hidden) and the throbber/accent color go to work
- users can always click the icon to show entries (and open folder etc)
- this maintains the current behavior in FF94
2021-11-25 06:49:38 +00:00
Thorin-Oakenpants
4b393b9b12
start 95-alpha 2021-11-24 01:09:10 +00:00
Thorin-Oakenpants
6027aaa45d
fixup warnOnQuitShortcut 2021-11-23 12:02:50 +00:00
Thorin-Oakenpants
cbfb8abf15
94 final 2021-11-23 07:11:43 +00:00
Thorin-Oakenpants
58d0161b67
add warnOnQuitShortcut, closes #1270 2021-11-23 07:05:01 +00:00
Thorin-Oakenpants
6b351a9458
fixup trade-offs
anti-fingerprinting doesn't fit here: it's not a major component or priority of this user.js, and only a few prefs outside RFP (as a robust built-in browser solution that defeats naive scripts) have anything to do with it
2021-11-22 18:15:53 +00:00
Thorin-Oakenpants
c9e4cac618
tweak webRTC
webRTC will be overhauled... but not today... in the meantime
- remove dead link before @dngray has a hernia
- correctly refer to the type of IP leak
2021-11-22 18:08:07 +00:00
Thorin-Oakenpants
34bd3c5a04
consolidate/simplify sanitizing, fixes #1256
move all sanitizing on exit prefs into 2800

switch to cookie lifetime as session
- now users can utilize exceptions (as allow)
- session cookies still block service workers (which we disable anyway)
- we still block 3rd party cookies (until we move to dFPI)
- we still have defense in depth for 3rd party cookies with 2803
- we still bulk sanitize offlineApps on exit: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
   - i.e you get to keep the cookies only IF you add an exception

add `privacy.clearsitedata.cache.enabled`
2021-11-22 05:40:49 +00:00
Thorin-Oakenpants
2f88ca2e40
misc
- move DoH so it has room to grow
- tidy privacy.clearOnShutdown, privacy.cpd
2021-11-18 01:28:21 +00:00
Thorin-Oakenpants
e2e7f9c647
font vis changes (#1275) 2021-11-16 11:56:20 +00:00
Thorin-Oakenpants
f8932dced1
remove ambiguous line
The point was that google have said (stated in policy, but fuck knows where that is located these days) that it is anonymized and not used for tracking. It's an API used by **_4 billion devices_** - the API has privacy policies for use. If a whistleblower or someone else found out that google was using this to enhance their user profiling, then all hell would break loose. And they don't even need this to fuel their ad revenue. It is provided, gratis, to the web to help ensure security - they wouldn't dare taint it and get it caught up in a privacy scandal involving **+4 billion devices_**. And in all this time (since 2007), there has been no such whistleblower or proof it is used to track or announcements by google of changes to the contrary.

Anyway, a quick search brings up
- Here is their policy - https://www.google.com/intl/en_us/privacy/browsing.html - it's empty and points to
- https://www.google.com/intl/en/chrome/privacy/
   - and if you scroll down to "Safe Browsing practices" it doesn't say anything about privacy policies for the API itself (or the owner of the API) - it just spells out what happens in chrome
- I'm not going to bother to look any further and find a history of policy changes

Anyway, this is Firefox and hashes are part hashes bundled with other real hashes - and we turned off real time binary checks. So this line can fuck the fuck off. It was meant to reassure those who want the security of real-time binary checks, that privacy "shouldn't" be an issue, but I'm not going to expand on it
2021-11-07 06:48:45 +00:00
Thorin-Oakenpants
17beb468f1
tweak 1510 default info 2021-11-04 22:44:23 +00:00
Thorin-Oakenpants
bd59131d3e
default changes, missed one 2021-11-04 22:38:16 +00:00
Thorin-Oakenpants
0f8217ad60
cleanup sanitizing-on-close prefs 2021-11-04 16:18:35 +00:00
Thorin-Oakenpants
1515897449
default changes 2021-11-02 16:07:42 +00:00
Thorin-Oakenpants
ba92918d38
don't disable system addon updates, closes #1251 2021-10-26 10:16:42 +00:00
Thorin-Oakenpants
094356e073
0706: add reference 2021-10-25 20:56:18 +00:00
Thorin-Oakenpants
7d68a32971
start 94-alpha
- and remove obsolete ESR78 notations
- note: we leave the deprecated ESR78.x section and item 6050 until v95 so users upgrading to ESR91 can easily reset those prefs with prefsCleaner
2021-10-25 17:41:16 +00:00
Thorin-Oakenpants
85438d00e4
v93 deprecated 2021-10-12 08:23:46 +00:00
Thorin-Oakenpants
a764149520
v92 2021-10-11 13:56:38 +00:00
Thorin-Oakenpants
535346df87
Delete arkenfox-clear-RFP-alternatives.js 2021-10-10 23:55:39 +00:00
Thorin-Oakenpants
412c8f9f94
0807 urlbar contextual suggestions, #1257 2021-10-09 07:14:20 +00:00
Thorin-Oakenpants
380a88ee57
oophs 2021-10-05 11:14:16 +00:00
Thorin-Oakenpants
8404e8a59c
tidy, closes #1260 2021-10-05 03:04:14 +00:00
a1346054
6381b1aeb9
prefsCleaner.sh: Fix invalid regular expression (#1258) 2021-09-28 19:24:54 +00:00
a1346054
5cdea955e7
Simple maintenance improvements (#1255)
* Use direct check for existence of file

* Fix shellcheck warnings

* Unify codestyle in scripts

* Trim excess whitespace
2021-09-27 15:23:12 +00:00
Thorin-Oakenpants
b37df0bcfe
embiggen 4500, #1218 2021-09-25 02:32:48 +00:00
Thorin-Oakenpants
044e3e76e8
make 0706 more cromulent 2021-09-25 01:47:54 +00:00
Thorin-Oakenpants
1c6d633144
more nits 2021-09-11 05:35:39 +00:00
Thorin-Oakenpants
278336196c
nit 2021-09-11 05:31:21 +00:00
Thorin-Oakenpants
76c1aad4be
grammar 2021-09-10 13:07:04 +00:00
Thorin-Oakenpants
e5c128804c
remove locale in link 2021-09-10 05:09:05 +00:00
Thorin-Oakenpants
c9956d85b1
92-alpha 2021-09-10 04:32:09 +00:00
Thorin-Oakenpants
524823fd05
proxy direct failover (#1247) 2021-09-07 13:35:32 +00:00
Thorin-Oakenpants
283bfd744a
fixup missing 1022 reference 2021-08-29 14:32:37 +00:00
Thorin-Oakenpants
a1b4aa6000
add DoH rollout pref, closes #1027 2021-08-29 07:42:24 +00:00
Thorin-Oakenpants
a308878b11
finish removal of 500s and cleanup of 300s 2021-08-29 04:50:36 +00:00
Thorin-Oakenpants
453fcd32cb
remove 2003, fixes #1245 2021-08-29 04:10:48 +00:00
Thorin-Oakenpants
a264eebcb5
screensharing etc 2021-08-29 03:27:46 +00:00
Thorin-Oakenpants
908638c9dc
security.mixed_content.block_active_content
default true since at least FF60
2021-08-28 08:39:44 +00:00
Thorin-Oakenpants
7e80231ac5
was 6005: remove mixed active 2021-08-28 08:38:31 +00:00
Thorin-Oakenpants
6df03e1a74
add removed from arkenfox section
- this helps mitigate the need for scratchpad for those who use prefsCleaner
- in future, if anything was active during the ESR cycle, then it goes in here when removed
- similar to deprecated items: clean out after ESR EOL
2021-08-28 08:30:12 +00:00
Thorin-Oakenpants
4b437771fa
oophs, thanks @eleius
fixup 3b52557143
2021-08-28 07:11:44 +00:00
Thorin-Oakenpants
4043467ad9
tidy 2021-08-28 06:03:13 +00:00