forked from d3cim/mobile_user.js
Update 'user.js'
This commit is contained in:
parent
7d0c33d89f
commit
f877564292
68
user.js
68
user.js
|
@ -501,30 +501,6 @@ user_pref("network.http.speculative-parallel-limit", 0);
|
|||
// https://www.internetsociety.org/tag/ipv6-security/
|
||||
user_pref("network.dns.disableIPv6", true);
|
||||
// -------------------------------------
|
||||
// Disable HTTP2
|
||||
// HTTP2 raises concerns with "multiplexing" and "server push", does nothing to
|
||||
// enhance privacy, and opens up a number of server-side fingerprinting opportunities
|
||||
// [WARNING] Don't disable HTTP2. Don't be that one person using HTTP1.1 on HTTP2 sites
|
||||
// [STATS] ~46% of sites (July 2021)
|
||||
// https://http2.github.io/faq/
|
||||
// https://blog.scottlogic.com/2014/11/07/http-2-a-quick-look.html
|
||||
// https://datatracker.ietf.org/doc/html/rfc7540#section-10.8
|
||||
// https://queue.acm.org/detail.cfm?id=2716278
|
||||
// https://w3techs.com/technologies/details/ce-http2/all/all
|
||||
// user_pref("network.http.spdy.enabled", false);
|
||||
// user_pref("network.http.spdy.enabled.deps", false);
|
||||
// user_pref("network.http.spdy.enabled.http2", false);
|
||||
// user_pref("network.http.spdy.websockets", false); // [FF65+]
|
||||
// -------------------------------------
|
||||
// Disable HTTP Alternative Services [FF37+]
|
||||
// [SETUP-PERF] Relax this if you have FPI enabled and you understand the
|
||||
// consequences. FPI isolates these, but it was designed with the Tor protocol in mind,
|
||||
// and the Tor Browser has extra protection, including enhanced sanitizing per Identity.
|
||||
// https://tools.ietf.org/html/rfc7838#section-9
|
||||
// https://www.mnot.net/blog/2016/03/09/alt-svc
|
||||
user_pref("network.http.altsvc.enabled", false);
|
||||
user_pref("network.http.altsvc.oe", false);
|
||||
// -------------------------------------
|
||||
// Set the proxy server to do any DNS lookups when using SOCKS
|
||||
// e.g. in Tor, this stops your local DNS server from knowing your Tor destination
|
||||
// as a remote Tor node will handle the DNS request
|
||||
|
@ -580,7 +556,7 @@ user_pref("browser.fixup.alternate.enabled", false);
|
|||
// Display all parts of the url in the location bar
|
||||
user_pref("browser.urlbar.trimURLs", false);
|
||||
// -------------------------------------
|
||||
// Disable coloring of visited links - CSS history leak
|
||||
// Disable coloring of visited links
|
||||
// Bulk rapid history sniffing was mitigated in 2010. Slower and more expensive
|
||||
// redraw timing attacks were largely mitigated in FF77+. Using RFP further hampers timing
|
||||
// attacks. Don't forget clearing history on close. However, social engineering
|
||||
|
@ -662,11 +638,12 @@ user_pref("signon.management.page.breachAlertUrl", "");
|
|||
// There are no preferences for this. It is all handled internally
|
||||
// [SETTING] Privacy & Security>Logins and Passwords>Use a Primary Password
|
||||
// https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas
|
||||
// Set how often Firefox should ask for the primary password
|
||||
// Set when Firefox should prompt for the primary password
|
||||
// 0=the first time (default), 1=every time it's needed, 2=every n minutes
|
||||
user_pref("security.ask_for_password", 2);
|
||||
// -------------------------------------
|
||||
// Set how often in minutes Firefox should ask for the primary password
|
||||
// Set how long in minutes Firefox should remember the primary password
|
||||
// in minutes, default is 30 ***/
|
||||
user_pref("security.password_lifetime", 5); // [DEFAULT: 30]
|
||||
// -------------------------------------
|
||||
// Disable auto-filling username & password form fields
|
||||
|
@ -923,7 +900,7 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
|
|||
// -------------------------------------
|
||||
// Disable graphite
|
||||
// Graphite has had many critical security issues in the past
|
||||
// https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778
|
||||
// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+graphite
|
||||
// https://en.wikipedia.org/wiki/Graphite_(SIL)
|
||||
user_pref("gfx.font_rendering.graphite.enabled", false);
|
||||
// -------------------------------------
|
||||
|
@ -1104,7 +1081,7 @@ user_pref("javascript.options.asmjs", false);
|
|||
// [NOTE] In FF75+, when **both** Ion and JIT are disabled, **and** the new
|
||||
// hidden pref is enabled, then Ion can still be used by extensions (1599226)
|
||||
// [WARNING] Disabling Ion/JIT can cause some site issues and performance loss
|
||||
// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Firefox+JIT
|
||||
// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+jit
|
||||
user_pref("javascript.options.ion", false);
|
||||
user_pref("javascript.options.baselinejit", false);
|
||||
user_pref("javascript.options.native_regexp", false);
|
||||
|
@ -1197,16 +1174,6 @@ user_pref("devtools.remote.adb.extensionURL", ""); // [FF64+]
|
|||
user_pref("devtools.remote.adb.extensionID", "");
|
||||
user_pref("devtools.selfxss.count", 0);
|
||||
// -------------------------------------
|
||||
// Disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
|
||||
// [TEST] https://arkenfox.github.io/TZP/tzp.html#misc
|
||||
// https://bugzilla.mozilla.org/1173199
|
||||
user_pref("mathml.disabled", true);
|
||||
// -------------------------------------
|
||||
// Disable in-content SVG (Scalable Vector Graphics) [FF53+]
|
||||
// [WARNING] Expect breakage including youtube player controls
|
||||
// https://bugzilla.mozilla.org/1216893
|
||||
// user_pref("svg.disabled", true);
|
||||
// -------------------------------------
|
||||
// Disable middle mouse click opening links from clipboard
|
||||
// https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/10089
|
||||
user_pref("middlemouse.contentLoadURL", false);
|
||||
|
@ -1582,6 +1549,29 @@ user_pref("permissions.default.xr", 0); // Virtual Reality
|
|||
// [WHY] Defaults are fine. They can be overridden by a site-controlled Referrer Policy
|
||||
// user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2 FF87+]
|
||||
// user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2
|
||||
// -------------------------------------
|
||||
// Disable HTTP2
|
||||
// [WHY] Passive fingerprinting. ~50% of sites use HTTP2
|
||||
// https://w3techs.com/technologies/details/ce-http2/all/all
|
||||
// user_pref("network.http.spdy.enabled", false);
|
||||
// user_pref("network.http.spdy.enabled.deps", false);
|
||||
// user_pref("network.http.spdy.enabled.http2", false);
|
||||
// user_pref("network.http.spdy.websockets", false); // [FF65+]
|
||||
// -------------------------------------
|
||||
// Disable HTTP Alternative Services [FF37+]
|
||||
// [WHY] Already isolated by network partitioning (FF85+) or FPI
|
||||
// user_pref("network.http.altsvc.enabled", false);
|
||||
// user_pref("network.http.altsvc.oe", false);
|
||||
// -------------------------------------
|
||||
// Disable MathML (Mathematical Markup Language) [FF51+]
|
||||
// [WHY] Fingerprintable, breakage, threat model
|
||||
// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=mathml
|
||||
user_pref("mathml.disabled", true);
|
||||
// -------------------------------------
|
||||
// Disable in-content SVG (Scalable Vector Graphics) [FF53+]
|
||||
// [WHY] Fingerprintable, breakage, threat model
|
||||
// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+svg
|
||||
// user_pref("svg.disabled", true);
|
||||
//
|
||||
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
|
||||
// DON'T BOTHER: NON-RFP
|
||||
|
|
Loading…
Reference in New Issue