forked from d3cim/mobile_user.js
Update 'user.js'
This commit is contained in:
parent
415574fd4e
commit
cbfaa7270e
16
user.js
16
user.js
|
@ -1584,12 +1584,12 @@ user_pref("security.mixed_content.block_object_subrequest", true);
|
|||
// https://en.wikipedia.org/wiki/3des#Security
|
||||
// https://en.wikipedia.org/wiki/Meet-in-the-middle_attack
|
||||
// https://www-archive.mozilla.org/projects/security/pki/nss/ssl/fips-ssl-ciphersuites.html
|
||||
// user_pref("security.ssl3.rsa_des_ede3_sha", false);
|
||||
user_pref("security.ssl3.rsa_des_ede3_sha", false);
|
||||
// -------------------------------------
|
||||
// Pref: Disable the remaining non-modern cipher suites as of FF78 (in order of preferred by FF) ***/
|
||||
// user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false);
|
||||
// user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
|
||||
// user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
|
||||
user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
|
||||
user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
|
||||
// user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false);
|
||||
// user_pref("security.ssl3.rsa_aes_128_sha", false); // no PFS
|
||||
// user_pref("security.ssl3.rsa_aes_256_sha", false); // no PFS
|
||||
|
@ -2132,6 +2132,14 @@ user_pref("browser.safebrowsing.features.pishing.update", false);
|
|||
user_pref("browser.safebrowsing.features.trackingAnnotation.update", false);
|
||||
user_pref("browser.safebrowsing.features.trackingProtection.update", false);
|
||||
// -------------------------------------
|
||||
// Pref : Disable SB checks for downloads (remote)
|
||||
// To verify the safety of certain executable files, Firefox may submit some information about the
|
||||
// file, including the name, origin, size and a cryptographic hash of the contents, to the Google
|
||||
// Safe Browsing service which helps Firefox determine whether or not the file should be blocked
|
||||
// [SETUP-SECURITY] If you do not understand this, or you want this protection, then override it ***/
|
||||
user_pref("browser.safebrowsing.downloads.remote.enabled", false);
|
||||
user_pref("browser.safebrowsing.downloads.remote.url", "");
|
||||
// -------------------------------------
|
||||
// Pref : Disable passive Tracking Protection
|
||||
// Passive TP annotates channels to lower the priority of network loads for resources on the tracking protection list.
|
||||
// [NOTE] It has no effect if TP is enabled, but keep in mind that by default TP is only enabled in Private Windows
|
||||
|
@ -2422,7 +2430,7 @@ user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDE
|
|||
// [WARNING] The dimension pref is only meant for testing, and we recommend you DO NOT USE it
|
||||
// https://bugzilla.mozilla.org/1407366
|
||||
// https://hg.mozilla.org/mozilla-central/rev/6d2d7856e468#l2.32 ***/
|
||||
// user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF] // [DESKTOP]
|
||||
user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF] // [DESKTOP]
|
||||
// user_pref("privacy.resistFingerprinting.letterboxing.dimensions", ""); // [HIDDEN PREF] // [DESKTOP]
|
||||
// -------------------------------------
|
||||
// Pref : Disable WebRTC, getUserMedia, screen sharing, audio capture, video capture
|
||||
|
|
Loading…
Reference in New Issue