1
0
Go to file
Thorin-Oakenpants 2b26cd4f41
7000s: ciphers, #1235
- merged 3DES cipher to bottom: it is still the same order of [1]
- 3DES pref will be deprecated: pref name changes, and the cipher slated to be unavailable unless you downgrade to < TLS1.2 - see https://bugzilla.mozilla.org/show_bug.cgi?id=1724072
   - FYI: we reset TLS downgrades to session only by resetting the pref currently in 1203
- "Minimal/non-existent threat of downgrade attacks"
   - FYI: these old ciphers are about 1-2% of traffic (from memory) - but that's still significant breakage
   - So the only reason to do this would be to harden against downgrade attacks (and inadvertently use weak sites = breakage): but that doesn't fit most user's threat model: and is probably never going to happen for them. Not sure if I can word that much better and just as succinct
2021-08-22 05:18:54 +00:00
.github/ISSUE_TEMPLATE add override recipes 2020-12-25 15:55:01 +00:00
scratchpad-scripts hardware acceleration 2021-08-22 01:55:28 +00:00
wikipiki Add files via upload 2021-03-11 14:06:38 +00:00
_config.yml migration: cleanup code references 2020-09-15 06:07:32 +00:00
.gitattributes Update .gitattributes 2019-06-26 13:32:12 +00:00
.travis.yml Added Travis CI configuration 2017-03-01 00:11:05 +02:00
LICENSE.txt Update LICENSE.txt 2020-09-15 04:19:03 +00:00
prefsCleaner.bat v2.4 - add strlen check for prefs.js 2021-01-17 15:27:50 +00:00
prefsCleaner.sh v1.4 (#1189) 2021-06-07 11:18:40 +00:00
README.md i do not like mixed case lists 2021-08-10 01:21:04 +00:00
updater.bat v4.14 - check for TLS1.2 (#1097) 2021-01-22 12:15:12 +00:00
updater.sh v3.2 - proper fix for the diff issue 2021-06-06 21:30:14 +00:00
user.js 7000s: ciphers, #1235 2021-08-22 05:18:54 +00:00

🟪 user.js

A user.js is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the overview wiki page.

🟩 the arkenfox user.js

License: MIT

The arkenfox user.js is a template which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).

Everyone, experts included, should at least read the implementation wiki page, as it contains important information regarding a few user.js settings.

Note that we do not recommend connecting over Tor on Firefox. Use the Tor Browser if your threat model calls for it, or for accessing hidden services.

Also be aware that the arkenfox user.js is made specifically for desktop Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.

🟧 sitemap

🟥 acknowledgments

Literally thousands of sources, references and suggestions. Many thanks, and much appreciated.