From 9f3e4f5c3df3eb64a093f51e8e3e205af88af856 Mon Sep 17 00:00:00 2001 From: Narsil Date: Tue, 12 Mar 2024 19:10:06 +0000 Subject: [PATCH] Upload files to "/" --- README.md | 45 ++++++++++++++------------------------------- user.js | 45 +++++++++++++++++++++++++-------------------- 2 files changed, 39 insertions(+), 51 deletions(-) diff --git a/README.md b/README.md index 9fe8dbf..9f0301f 100644 --- a/README.md +++ b/README.md @@ -26,11 +26,11 @@ If you are running IcecatMobile or old Fennec (version 68) use [Quindecim user.j -## How to install: +## How to install (only rooted devices) -### **ROOT METHOD 1** *(file manager)* -I would like to suggest the use of [Amaze](https://github.com/TeamAmaze/AmazeFileManager), [Simple File Manager Pro](https://f-droid.org/en/packages/com.simplemobiletools.filemanager.pro/), [Material Files](https://f-droid.org/packages/me.zhanghai.android.files/) or [TWRP File Manager](https://twrp.me/Devices/) before proceed. +I would like to suggest the use of [Amaze](https://github.com/TeamAmaze/AmazeFileManager) or [TWRP File Manager](https://twrp.me/Devices/) before proceed. +As for the first one, make sure you enable "Use legacy listing for root" in Settings/Behavior/Advanced. - Download and install the browsers from their official websites (see above) - Start the browser for the first time (offline mode/no data connections) and wait about 5 sec. - Close it. @@ -46,45 +46,28 @@ I would like to suggest the use of [Amaze](https://github.com/TeamAmaze/AmazeFil ✳️ Mull `data/data/us.spotco.fennec_dos/files/mozilla/[xxxxxxx].default` -- Copy the extracted `user.js` file to the above installation directory. +- Copy the extracted `user.js` file to the above installation directory. If you are using Amaze, once the file is copied, tap the three dots, properties/permissions and enable all the "read" ones and "write" for owner and group. Finally, tap Set and Ok. - Delete `prefs.js` file inside the above directory - Start the browser and test if `user.js` was applied : - browse to `about:config` (put it in search bar) and look if `config.applied` is `true`. + browse to `about:config` and look if `_config.is.applied` is `true`. -If this doesn't work I suggest you to use the **ROOT METHOD 2** below. - -### **ROOT METHOD 2** *(app)* - -- Download and install the browser from their official websites. -- Download and install [User.js Updater](https://github.com/v1nc/user.js-updater/releases) -- Start the browser for the first time (offline mode/no data connections) and wait about 5 sec. -- Close it. -- Open `User.js Updater` app and grant storage permission. -- Choose Custom and write the following: - - https://git.nixnet.services/Narsil/mobile_user.js/src/branch/master/user.js - -- Tap `UPDATE` at the bottom and grant root permission. -- Start the browser and test if `user.js` was applied : - browse to `about:config` (put it in search bar) and look if `config.applied` is `true`. - -- **AFWall+ USERS:** You can disable `Use Download Manager` option into `Settings` and enable data connection just to the app itself. ## Installing Iceraven addons in Fennec/Mull/Firefox Nightly +First of all, take into account automatic addons updates are blocked in order to avoid all the Mozilla connections. Go to Settings, about Fennec/Mull/Firefox Nightly, tap 5 times over its logo, Debug mode will enable. -Back to Settings, the new Custom Add-on collection and add the Iceraven one: -16201230 -What-I-want-on-Fenix - -If you still need more of them you will have to create your own Collection: -https://www.ghacks.net/2020/10/01/you-can-now-install-any-add-on-in-firefox-nightly-for-android-but-it-is-complicated/ +Back to Settings, Install add-on from file and select your .xpi files. +Anyway, if you wish automatic updates, edit these files adding // this way -> user_pref -> // user_pref +user_pref("extensions.update.enabled", false); +user_pref("extensions.update.url", ""); +user_pref("extensions.autoupdate.enabled", false); +user_pref("extensions.update.background.url", ""); ## Considerations -Once installed go to Settings, ETP and select Strict. +Once installed, go to Settings, ETP and select Strict. Some automatic connections could not be blocked so you will have to add them to your host list. @@ -92,7 +75,7 @@ firefox.settings.services.mozilla.com https://bugzilla.mozilla.org/show_bug.cgi?id=1598562#c13 -content-signature-2.cdn.mozilla.net +gitlab.com (Fennec), in order to install [wallpapers](https://gitlab.com/relan/fennecbuild/-/merge_requests/40) safebrowsing.googleapis.com, safebrowsing.google.com, malware-error.mozilla.com, phish-error.mozilla.com and developers.google.com (safebrowsing is active and not changeable) diff --git a/user.js b/user.js index ea8bc05..fbef1dc 100644 --- a/user.js +++ b/user.js @@ -219,8 +219,8 @@ user_pref("services.settings.server", ""); // >>>>>>>>>>>>>>>>>>>>> // // Disable SB (Safe Browsing) -user_pref("browser.safebrowsing.malware.enabled", false); // [NOT WORKING YET] -user_pref("browser.safebrowsing.phishing.enabled", false); // [NOT WORKING YET] +user_pref("browser.safebrowsing.malware.enabled", false); // [DOES NOT WORK ON FENIX] +user_pref("browser.safebrowsing.phishing.enabled", false); // [DOES NOT WORK ON FENIX] user_pref("browser.safebrowsing.passwords.enabled", false); user_pref("browser.safebrowsing.allowOverride", false); // ------------------------------------- @@ -248,22 +248,23 @@ user_pref("browser.safebrowsing.features.trackingProtection.update", false); user_pref("browser.safebrowsing.downloads.remote.block_dangerous", false); user_pref("browser.safebrowsing.downloads.remote.block_dangerous_host", false); user_pref("browser.safebrowsing.provider.google.updateURL", ""); -user_pref("browser.safebrowsing.provider.google.gethashURL", ""); -user_pref("browser.safebrowsing.provider.google4.updateURL", ""); +user_pref("browser.safebrowsing.provider.google.gethashURL", ""); // [DOES NOT WORK ON FENIX] +user_pref("browser.safebrowsing.provider.google4.updateURL", ""); // [DOES NOT WORK ON FENIX] user_pref("browser.safebrowsing.provider.google4.gethashURL", ""); -user_pref("browser.safebrowsing.provider.google.reportURL", ""); +user_pref("browser.safebrowsing.provider.google.reportURL", ""); // [DOES NOT WORK ON FENIX] user_pref("browser.safebrowsing.reportPhishURL", ""); -user_pref("browser.safebrowsing.provider.google4.reportURL", ""); -user_pref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", ""); -user_pref("browser.safebrowsing.provider.google.reportPhishMistakeURL", ""); -user_pref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", ""); -user_pref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", ""); +user_pref("browser.safebrowsing.provider.google4.reportURL", ""); // [DOES NOT WORK ON FENIX] +user_pref("browser.safebrowsing.provider.google4.lists", ""); // [DOES NOT WORK ON FENIX] +user_pref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", ""); // [DOES NOT WORK ON FENIX] +user_pref("browser.safebrowsing.provider.google.reportPhishMistakeURL", ""); // [DOES NOT WORK ON FENIX] +user_pref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", "") // [DOES NOT WORK ON FENIX] +user_pref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", ""); // [DOES NOT WORK ON FENIX] user_pref("browser.safebrowsing.provider.google4.dataSharing.enabled", false); -user_pref("browser.safebrowsing.provider.google4.dataSharingURL", ""); +user_pref("browser.safebrowsing.provider.google4.dataSharingURL", ""); // [DOES NOT WORK ON FENIX] user_pref("browser.safebrowsing.provider.google.advisory", ""); -user_pref("browser.safebrowsing.provider.google.advisoryURL", ""); -user_pref("browser.safebrowsing.provider.google.gethashURL", ""); -user_pref("browser.safebrowsing.provider.google4.advisoryURL", ""); +user_pref("browser.safebrowsing.provider.google.advisoryURL", ""); // [DOES NOT WORK ON FENIX] +user_pref("browser.safebrowsing.provider.google.gethashURL", ""); // [DOES NOT WORK ON FENIX] +user_pref("browser.safebrowsing.provider.google4.advisoryURL", ""); // [DOES NOT WORK ON FENIX] user_pref("browser.safebrowsing.blockedURIs.enabled", false); user_pref("browser.safebrowsing.provider.mozilla.gethashURL", ""); user_pref("browser.safebrowsing.provider.mozilla.updateURL", ""); @@ -1002,12 +1003,12 @@ user_pref("media.peerconnection.enabled", false); // user_pref("general.buildID.override", "20181001000000"); // [HIDDEN PREF] // user_pref("general.oscpu.override", ""); // [HIDDEN PREF] // user_pref("general.platform.override", ""); // [HIDDEN PREF] -// user_pref("general.useragent.override", "Mozilla/5.0 (Android 10; Mobile; rv:102.0) Gecko/102.0 Firefox/102.0"); // [HIDDEN PREF] +// user_pref("general.useragent.override", "Mozilla/5.0 (Android 10; Mobile; rv:115.0) Gecko/102.0 Firefox/115.0"); // [HIDDEN PREF] // user_pref("media.ondevicechange.enabled", false); // user_pref("media.video_stats.enabled", false); // user_pref("webgl.enable-debug-renderer-info", false); user_pref("ui.use_standins_for_native_colors", true); -user_pref("browser.display.use_document_fonts", 0); // [NOT WORKING YET] +user_pref("browser.display.use_document_fonts", 0); // [DOES NOT WORK ON FENIX] user_pref("device.sensors.enabled", false); user_pref("dom.gamepad.enabled", false); user_pref("dom.netinfo.enabled", false); @@ -1050,11 +1051,13 @@ user_pref("browser.warnOnQuit", false); user_pref("app.update.auto", false); // ------------------------------------- // Disable auto-CHECKING for extension and theme updates -// user_pref("extensions.update.enabled", false); -// user_pref("extensions.autoupdate.enabled", false); +user_pref("extensions.update.enabled", false); +user_pref("extensions.update.url", ""); +user_pref("extensions.autoupdate.enabled", false); +user_pref("extensions.update.background.url", ""); // ------------------------------------- // Disable auto-INSTALLING extension and theme updates -// user_pref("extensions.update.autoUpdateDefault", false); +user_pref("extensions.update.autoUpdateDefault", false); // ------------------------------------- // Disable extension metadata user_pref("extensions.getAddons.cache.enabled", false); @@ -1143,4 +1146,6 @@ user_pref("security.family_safety.mode", 0); // ------------------------------------- // Disable skipping DoH when parental controls are enabled [FF70+] user_pref("network.dns.skipTRR-when-parental-control-enabled", false); -// \ No newline at end of file +// +// Check the prefs are applied +user_pref("_config.is.applied", true); \ No newline at end of file