From 9a8e42bd58adc650d6fdb2dc95dade8b72e0dd65 Mon Sep 17 00:00:00 2001 From: Narsil Date: Sun, 28 Mar 2021 06:09:56 -0400 Subject: [PATCH] Update 'user.js' --- user.js | 18 +++++++++++------- 1 file changed, 11 insertions(+), 7 deletions(-) diff --git a/user.js b/user.js index aa27484..9dcb289 100644 --- a/user.js +++ b/user.js @@ -69,9 +69,6 @@ user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", user_pref("browser.newtabpage.activity-stream.showSponsored", false); user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false); // [FF66+] // ------------------------------------- -// Disable Activity Stream recent Highlights in the Library [FF57+] ***/ -user_pref("browser.library.activity-stream.enabled", false); -// ------------------------------------- // Clear default topsites // [NOTE] This does not block you from adding your own ***/ user_pref("browser.newtabpage.activity-stream.default.sites", ""); @@ -966,15 +963,16 @@ user_pref("network.http.referer.XOriginTrimmingPolicy", 2); // [NOTE] This is only a default, it can be overridden by a site-controlled Referrer Policy // https://www.w3.org/TR/referrer-policy/ // https://developer.mozilla.org/docs/Web/HTTP/Headers/Referrer-Policy -// https://blog.mozilla.org/security/2018/01/31/preventing-data-leaks-by-stripping-path-information-in-http-referrers/ ***/ -// user_pref("network.http.referer.defaultPolicy", 3); // [DEFAULT: 3] +// https://blog.mozilla.org/security/2018/01/31/preventing-data-leaks-by-stripping-path-information-in-http-referrers/ +// https://blog.mozilla.org/security/2021/03/22/firefox-87-trims-http-referrers-by-default-to-protect-user-privacy/ +// user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2 FF87+] // user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2] // ------------------------------------- // Hide (not spoof) referrer when leaving a .onion domain [FF54+] // [NOTE] Firefox cannot access .onion sites by default. We recommend you use // the Tor Browser which is specifically designed for hidden services // https://bugzilla.mozilla.org/1305144 ***/ -user_pref("network.http.referer.hideOnionSource", true); +// user_pref("network.http.referer.hideOnionSource", true); // ------------------------------------- // Enable the DNT (Do Not Track) HTTP header // [NOTE] DNT is enforced with Enhanced Tracking Protection regardless of this pref @@ -1673,8 +1671,9 @@ user_pref("webgl.enable-debug-renderer-info", false); // 0=no-preference, 1=reduce user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF] // ------------------------------------- -// Disable PointerEvents +// Disable PointerEvents [FF86 or lower] // https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent +// https://bugzilla.mozilla.org/1688105 user_pref("dom.w3c_pointer_events.enabled", false); // ------------------------------------- // Disable exposure of system colors to CSS or canvas [FF44+] @@ -1800,5 +1799,10 @@ user_pref("security.ssl.errorReporting.url", ""); // Disable hiding mime types (Options>General>Applications) not associated with a plugin // https://bugzilla.mozilla.org/1581678 user_pref("browser.download.hide_plugins_without_extensions", false); +// ------------------------------------- +// FF87 +// Disable Activity Stream recent Highlights in the Library [FF57+] +// https://bugzilla.mozilla.org/1689405 +user_pref("browser.library.activity-stream.enabled", false); // >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> // \ No newline at end of file