diff --git a/user.js b/user.js index 162fbbb..5a0068b 100644 --- a/user.js +++ b/user.js @@ -1584,12 +1584,12 @@ user_pref("security.mixed_content.block_object_subrequest", true); // https://en.wikipedia.org/wiki/3des#Security // https://en.wikipedia.org/wiki/Meet-in-the-middle_attack // https://www-archive.mozilla.org/projects/security/pki/nss/ssl/fips-ssl-ciphersuites.html -// user_pref("security.ssl3.rsa_des_ede3_sha", false); +user_pref("security.ssl3.rsa_des_ede3_sha", false); // ------------------------------------- // Pref: Disable the remaining non-modern cipher suites as of FF78 (in order of preferred by FF) ***/ // user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false); -// user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false); -// user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false); +user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false); +user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false); // user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false); // user_pref("security.ssl3.rsa_aes_128_sha", false); // no PFS // user_pref("security.ssl3.rsa_aes_256_sha", false); // no PFS @@ -2132,6 +2132,14 @@ user_pref("browser.safebrowsing.features.pishing.update", false); user_pref("browser.safebrowsing.features.trackingAnnotation.update", false); user_pref("browser.safebrowsing.features.trackingProtection.update", false); // ------------------------------------- +// Pref : Disable SB checks for downloads (remote) +// To verify the safety of certain executable files, Firefox may submit some information about the +// file, including the name, origin, size and a cryptographic hash of the contents, to the Google +// Safe Browsing service which helps Firefox determine whether or not the file should be blocked +// [SETUP-SECURITY] If you do not understand this, or you want this protection, then override it ***/ +user_pref("browser.safebrowsing.downloads.remote.enabled", false); +user_pref("browser.safebrowsing.downloads.remote.url", ""); + // ------------------------------------- // Pref : Disable passive Tracking Protection // Passive TP annotates channels to lower the priority of network loads for resources on the tracking protection list. // [NOTE] It has no effect if TP is enabled, but keep in mind that by default TP is only enabled in Private Windows @@ -2422,7 +2430,7 @@ user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDE // [WARNING] The dimension pref is only meant for testing, and we recommend you DO NOT USE it // https://bugzilla.mozilla.org/1407366 // https://hg.mozilla.org/mozilla-central/rev/6d2d7856e468#l2.32 ***/ -// user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF] // [DESKTOP] +user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF] // [DESKTOP] // user_pref("privacy.resistFingerprinting.letterboxing.dimensions", ""); // [HIDDEN PREF] // [DESKTOP] // ------------------------------------- // Pref : Disable WebRTC, getUserMedia, screen sharing, audio capture, video capture