Key all browser content

This commit is contained in:
djoate 2019-11-24 17:49:37 -05:00
parent 158ee60161
commit 27faa55c01
No known key found for this signature in database
GPG Key ID: E8366E2E207EFB0E
9 changed files with 1370 additions and 146 deletions

View File

@ -5,6 +5,12 @@ About_PrivacyTools_KEY: |
About_the_PrivacyTools_organization_and_contributors_to_the_PrivacyTools_website_communities_and_services._KEY: |
ZZ
Web_Browsers_KEY: |
ZZ
These_are_our_current_web_browser_recommendations_and_some_tweaks_you_can_use_to_preserve_your_privacy._KEY: |
ZZ
DNS__Domain_Providers_KEY: |
ZZ
@ -368,6 +374,9 @@ View_our_privacy_statement_KEY: |
Learn_More_KEY: |
ZZ
Browser_Recommendations_For_Desktop_KEY: |
ZZ
Firefox_KEY: |
ZZ
@ -422,9 +431,8 @@ httpswww.torproject.orgdownload_KEY: |
httpstrac.torproject.orgprojectstor_KEY: |
ZZ
Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Dont_forget_to_adjust_the_settings_according_to_ourrecommendations_a_hrefwebr_KEY: |
Browser_Recommendations_For_Android_KEY: |
ZZ
recommendations: <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> and <a href="#about_config"><i class="fas fa-link"></i> about:config</a> and get the <a href="#addons"><i class="fas fa-link"></i> privacy add-ons</a>.
httpswww.mozilla.orgenUSfirefoxmobile_KEY: |
ZZ
@ -471,6 +479,30 @@ httpswww.bromite.orgdownloadbromite_KEY: |
httpsgithub.combromitebromite_KEY: |
ZZ
Worth_Mentioning_for_Android_KEY: |
ZZ
httpswww.stoutner.comprivacybrowser_KEY: |
ZZ
Privacy_Browser_KEY: |
ZZ
An_opensource_web_browser_focused_on_user_privacy._Features_include_integrated_ad_blocking_with_a_hrefhttpseasylist.toEasyLista_a_href_KEY: |
ZZ
httpsplay.google.comstoreappsdetails?idcom.google.android.webviewhlen_US_KEY: |
ZZ
Privacy_Browser_relies_on_the_Android_System_WebView_which_needs_to_be_kept_up_to_date_to_fix_security_issues._One_can_update_WebView_by_either_install_KEY: |
ZZ
Keep_Android_WebView_uptodate_KEY: |
ZZ
Browser_Recommendations_For_iOS_KEY: |
ZZ
Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Note_Because_of_limitations_set_by_Apple_in_iOS_our_recommended_tweaks_cannot_be_a_KEY: |
ZZ
@ -510,6 +542,135 @@ httpsapps.apple.comusappduckduckgoprivacybrowserid663592361_KEY: |
httpsgithub.comduckduckgoiOS_KEY: |
ZZ
Worth_Mentioning_for_iOS_KEY: |
ZZ
httpssnowhaze.comenindex.html_KEY: |
ZZ
SnowHaze_KEY: |
ZZ
An_opensource_web_browser_with_builtin_ad_tracker_cookie_and_fingerprint_blocking_all_customizable_on_a_persite_basis._KEY: |
ZZ
Browser_Fingerprint__Is_your_browser_configuration_unique?_KEY: |
ZZ
Your_Browser_sends_information_that_makes_you_unique_amongst_millions_of_users_and_therefore_easy_to_identify._KEY: |
ZZ
When_you_visit_a_web_page_your_browser_voluntarily_sends_information_about_its_configuration_such_as_available_fonts_browser_type_and_addons._If_t_KEY: |
ZZ
httpspanopticlick.eff.org_KEY: |
ZZ
Test_your_Browser_now_KEY: |
ZZ
You_need_to_find_what_strongmost_browsersstrong_are_reporting_and_then_use_those_variables_to_bring_your_browser_in_the_same_population._This_mea_KEY: |
ZZ
Modern_web_browsers_have_not_been_architected_to_assure_personal_web_privacy._Rather_than_worrying_about_being_fingerprinted_it_seems_more_practical_t_KEY: |
ZZ
Firefox_Addon_CanvasBlocker_KEY: |
ZZ
httpsaddons.mozilla.orgfirefoxaddoncanvasblocker_KEY: |
ZZ
addons.mozilla.org_KEY: |
ZZ
strongCanvasBlockerstrong_allows_users_to_prevent_websites_from_using_some_Javascript_APIs_to_fingerprint_them._Users_can_choose_to_block_the_APIs_KEY: |
ZZ
Related_Information_KEY: |
ZZ
httpspanopticlick.eff.orgstaticbrowseruniqueness.pdf_KEY: |
ZZ
How_Unique_Is_Your_Web_Browser?_Peter_Eckersley_EFF._KEY: |
ZZ
Our_Firefox_privacy_addons_section._KEY: |
ZZ
httpswww.browserleaks.com_KEY: |
ZZ
Web_browser_security_testing_tools_that_tell_you_what_exactly_personal_identity_data_may_be_leaked_without_any_permissions_when_you_surf_the_Internet._KEY: |
ZZ
WebRTC_IP_Leak_Test__Is_your_IP_address_leaking?_KEY: |
ZZ
WebRTC_is_a_new_communication_protocol_that_relies_on_JavaScript_that_can_leak_your_actual_IP_address_from_behind_your_VPN._KEY: |
ZZ
While_software_like_NoScript_prevents_this_its_probably_a_good_idea_to_block_this_protocol_directly_as_well_just_to_be_safe._KEY: |
ZZ
httpsipleak.net_KEY: |
ZZ
How_to_disable_WebRTC_in_Firefox?_KEY: |
ZZ
In_short_Set_media.peerconnection.enabled_to_false_in_aboutconfig._KEY: |
ZZ
Explained_KEY: |
ZZ
Enter_aboutconfig_in_the_firefox_address_bar_and_press_enter._KEY: |
ZZ
Press_the_button_Ill_be_careful_I_promise!_KEY: |
ZZ
Search_for_media.peerconnection.enabled_KEY: |
ZZ
Double_click_the_entry_the_column_Value_should_now_be_false_KEY: |
ZZ
Done._Do_the_WebRTC_leak_test_again._KEY: |
ZZ
If_you_want_to_make_sure_every_single_WebRTCrelated_setting_is_really_disabled_change_these_settings_KEY: |
ZZ
Now_you_can_be_100_sure_WebRTC_is_disabled._KEY: |
ZZ
Test_your_Browser_again_KEY: |
ZZ
How_to_fix_the_WebRTC_Leak_in_Google_Chrome?_KEY: |
ZZ
WebRTC_cannot_be_fully_disabled_in_Chrome_however_it_is_possible_to_change_its_routing_settings_and_prevent_leaks_using_an_extension._Two_opensour_KEY: |
ZZ
What_about_other_browsers?_KEY: |
ZZ
Chrome_on_iOS_Internet_Explorer_and_Safari_does_not_implement_WebRTC_yet._KEY: |
ZZ
But_we_recommend_using_Firefox_on_all_devices._KEY: |
ZZ
Recommended_Browser_Addons_KEY: |
ZZ
Improve_your_privacy_with_these_browser_addons._KEY: |
ZZ
uBlock_Origin_Block_Ads_and_Trackers_KEY: |
ZZ
@ -654,6 +815,12 @@ httpsaddons.opera.comenextensionsdetailsprivacybadger_KEY: |
httpsgithub.comEFForgprivacybadger_KEY: |
ZZ
For_Power_Users_Only_KEY: |
ZZ
These_addons_require_quite_a_lot_of_interaction_from_the_user._Some_sites_will_not_work_properly_until_you_have_configured_the_addons._KEY: |
ZZ
uMatrix_Stop_CrossSite_Requests_KEY: |
ZZ
@ -693,6 +860,204 @@ httpschrome.google.comwebstoredetailnoscriptdoojmbjmlfjjnbmnoijecmcbfeoakpjm_KEY
httpsgithub.comhackademixnoscript_KEY: |
ZZ
Firefox_Privacy_Related_aboutconfig_Tweaks_KEY: |
ZZ
This_is_a_collection_of_privacyrelated_strongaboutconfigstrong_tweaks._Well_show_you_how_to_enhance_the_privacy_of_your_Firefox_browser._KEY: |
ZZ
Preparation_KEY: |
ZZ
Follow_the_instructions_below..._KEY: |
ZZ
Getting_started_KEY: |
ZZ
A_result_of_the_a_hrefhttpswiki.mozilla.orgSecurityTor_UpliftTor_Uplifta_effort_this_preference_isolates_all_browser_identifier_sources__KEY: |
ZZ
A_result_of_the_a_hrefhttpswiki.mozilla.orgSecurityTor_UpliftTor_Uplifta_effort_this_preference_makes_Firefox_more_resistant_to_browser_f_KEY: |
ZZ
FF67_Blocks_Fingerprinting_KEY: |
ZZ
FF67_Blocks_CryptoMining_KEY: |
ZZ
This_is_Mozillas_new_builtin_tracking_protection._It_uses_Disconnect.me_filter_list_which_is_redundant_if_you_are_already_using_uBlock_Origin_3rd_pa_KEY: |
ZZ
The_attribute_would_be_useful_for_letting_websites_track_visitors_clicks._KEY: |
ZZ
Even_with_Firefox_set_to_not_remember_history_your_closed_tabs_are_stored_temporarily_at_Menu_gt_History_gt_Recently_Closed_Tabs._KEY: |
ZZ
Disable_preloading_of_autocomplete_URLs._Firefox_preloads_URLs_that_autocomplete_when_a_user_types_into_the_address_bar_which_is_a_concern_if_URLs_are_KEY: |
ZZ
httpswww.ghacks.net20170724disablepreloadingfirefoxautocompleteurls_KEY: |
ZZ
Source_KEY: |
ZZ
Disable_that_websites_can_get_notifications_if_you_copy_paste_or_cut_something_from_a_web_page_and_it_lets_them_know_which_part_of_the_page_had_been_KEY: |
ZZ
Disables_playback_of_DRMcontrolled_HTML5_content_which_if_enabled_automatically_downloads_the_Widevine_Content_Decryption_Module_provided_by_Google_KEY: |
ZZ
httpssupport.mozilla.orgkbenabledrmw_optoutofcdmplaybackuninstallcdmsandstopallcdmdownloads_KEY: |
ZZ
Details_KEY: |
ZZ
DRMcontrolled_content_that_requires_the_Adobe_Flash_or_Microsoft_Silverlight_NPAPI_plugins_will_still_play_if_installed_and_enabled_in_Firefox._KEY: |
ZZ
Disables_the_Widevine_Content_Decryption_Module_provided_by_Google_Inc._used_for_the_playback_of_DRMcontrolled_HTML5_content._KEY: |
ZZ
httpssupport.mozilla.orgkbenabledrmw_disablethegooglewidevinecdmwithoutuninstalling_KEY: |
ZZ
Websites_can_track_the_microphone_and_camera_status_of_your_device._KEY: |
ZZ
Disable_cookies_KEY: |
ZZ
Accept_all_cookies_by_default_KEY: |
ZZ
Only_accept_from_the_originating_site_block_thirdparty_cookies_KEY: |
ZZ
Block_all_cookies_by_default_KEY: |
ZZ
Only_send_codeReferercode_header_when_the_full_hostnames_match._Note_if_you_notice_significant_breakage_you_might_try_code1code_combined_w_KEY: |
ZZ
httpsfeeding.cloud.geek.nzpoststweakingreferrerforprivacyinfirefox_KEY: |
ZZ
Send_codeReferercode_in_all_cases_KEY: |
ZZ
Send_codeReferercode_to_same_eTLD_sites_KEY: |
ZZ
Send_codeReferercode_only_when_the_full_hostnames_match_KEY: |
ZZ
When_sending_codeReferercode_across_origins_only_send_scheme_host_and_port_in_the_codeReferercode_header_of_crossorigin_requests._KEY: |
ZZ
Send_full_url_in_codeReferercode_KEY: |
ZZ
Send_url_without_query_string_in_codeReferercode_KEY: |
ZZ
Only_send_scheme_host_and_port_in_codeReferercode_KEY: |
ZZ
Looking_for_TRR_DoH_or_ESNI?_KEY: |
ZZ
They_have_moved_to_a_href_providersdnsicanndns__translate_page_our_DNS_pagea._KEY: |
ZZ
WebGL_is_a_potential_security_risk._KEY: |
ZZ
httpssecurity.stackexchange.comquestions13799iswebglasecurityconcern_KEY: |
ZZ
This_preference_controls_when_to_store_extra_information_about_a_session_contents_of_forms_scrollbar_positions_cookies_and_POST_data._KEY: |
ZZ
httpkb.mozillazine.orgBrowser.sessionstore.privacy_level_KEY: |
ZZ
Store_extra_session_data_for_any_site._Default_starting_with_Firefox_4._KEY: |
ZZ
Store_extra_session_data_for_unencrypted_nonHTTPS_sites_only._Default_before_Firefox_4._KEY: |
ZZ
Never_store_extra_session_data._KEY: |
ZZ
Not_rendering_IDNs_as_their_Punycode_equivalent_leaves_you_open_to_phishing_attacks_that_can_be_very_difficult_to_notice._KEY: |
ZZ
httpskrebsonsecurity.com201803lookalikedomainsandvisualconfusionmore42636_KEY: |
ZZ
Firefox_user.js_Templates_KEY: |
ZZ
httpsgithub.comghacksuserjsghacksuser.js_KEY: |
ZZ
ghacksuser.js_KEY: |
ZZ
An_ongoing_comprehensive_user.js_template_for_configuring_and_hardening_Firefox_privacy_security_and_antifingerprinting._KEY: |
ZZ
httpsblog.privacytools.iofirefoxprivacyanintroductiontosafe_KEY: |
ZZ
Firefox_Privacy_Tips_and_Tricks_for_Better_Browsing_KEY: |
ZZ
A_good_starting_guide_for_users_looking_to_keep_their_data_private_and_secure._KEY: |
ZZ
httpsffprofile.com_KEY: |
ZZ
ffprofile.com_KEY: |
ZZ
Helps_you_to_create_a_Firefox_profile_with_the_defaults_you_like._KEY: |
ZZ
httpkb.mozillazine.orgCategorySecurity_and_privacyrelated_preferences_KEY: |
ZZ
mozillazine.org_KEY: |
ZZ
Security_and_privacyrelated_preferences._KEY: |
ZZ
httpsaddons.mozilla.orgfirefoxaddonprivacysettings_KEY: |
ZZ
Privacy_Settings_KEY: |
ZZ
A_Firefox_addon_to_alter_builtin_privacy_settings_easily_with_a_toolbar_panel._KEY: |
ZZ
https12bytes.orgarticlestechfirefoxthefirefoxprivacyguidefordummies_KEY: |
ZZ
Firefox_Privacy_Guide_For_Dummies_KEY: |
ZZ
Guide_on_ways_already_discussed_and_others_to_improve_your_privacy_and_safety_on_Firefox._KEY: |
ZZ
Nextcloud_KEY: |
ZZ
@ -1647,9 +2012,6 @@ Take_it_a_step_further_and_get_control_of_your_email_with_this_easytodeploy_mail
More_KEY: |
ZZ
Related_Information_KEY: |
ZZ
httpswww.wired.com201110ecpaturnstwentyfive_KEY: |
ZZ
@ -1911,9 +2273,6 @@ Prefer_the_classic_site?_View_a_singlepage_layout._KEY: |
Discover_privacycentric_online_services_including_email_providers_VPN_operators_DNS_administrators_and_more!_KEY: |
ZZ
Web_Browsers_KEY: |
ZZ
Find_a_web_browser_that_respects_your_privacy_and_discover_how_to_harden_your_browser_against_tracking_and_leaks._KEY: |
ZZ
@ -2145,9 +2504,6 @@ Critique_and_information_on_why_to_avoid_Cloudflare_a_big_company_with_a_huge_po
Tools_KEY: |
ZZ
httpsipleak.net_KEY: |
ZZ
ipleak.net_KEY: |
ZZ
@ -2892,6 +3248,30 @@ httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: |
httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
ZZ
httpsplay.google.comstoreappsdetails?idcom.google.android.webviewhlen_US_KEY: |
ZZ
Browser_Fingerprint__Is_your_browser_configuration_unique?_KEY: |
ZZ
How_Unique_Is_Your_Web_Browser?_Peter_Eckersley_EFF._KEY: |
ZZ
WebRTC_IP_Leak_Test__Is_your_IP_address_leaking?_KEY: |
ZZ
How_to_disable_WebRTC_in_Firefox?_KEY: |
ZZ
How_to_fix_the_WebRTC_Leak_in_Google_Chrome?_KEY: |
ZZ
What_about_other_browsers?_KEY: |
ZZ
Looking_for_TRR_DoH_or_ESNI?_KEY: |
ZZ
httpswww.clawsmail.orgdownloads.php?sectiondownloads_KEY: |
ZZ

View File

@ -5,6 +5,12 @@ About_PrivacyTools_KEY: |
About_the_PrivacyTools_organization_and_contributors_to_the_PrivacyTools_website_communities_and_services._KEY: |
About the PrivacyTools organization, and contributors to the PrivacyTools website, communities, and services.
Web_Browsers_KEY: |
Web Browsers
These_are_our_current_web_browser_recommendations_and_some_tweaks_you_can_use_to_preserve_your_privacy._KEY: |
These are our current web browser recommendations and some tweaks you can use to preserve your privacy.
DNS__Domain_Providers_KEY: |
DNS / Domain Providers
@ -221,6 +227,54 @@ We_take_the_operation_of_our_various_a_href_services__translate_page_servicesa_v
Core_Contributors_KEY: |
Core Contributors
Founder_KEY: |
Founder
I_founded_PrivacyTools_in_2015_to_share_resources_and_tools_allowing_users_to_avoid_international_masssurveillance_programs._KEY: |
I founded PrivacyTools in 2015 to share resources and tools, allowing users to avoid international mass-surveillance programs.
Administrator_KEY: |
Administrator
I_run_the_website_and_services_for_PrivacyTools._My_goal_is_to_spread_the_word_about_data_privacy_as_widely_as_possible._KEY: |
I run the website and services for PrivacyTools. My goal is to spread the word about data privacy as widely as possible.
Community_Manager_KEY: |
Community Manager
I_research_new_privacy_recommendations_and_moderate_our_communities._My_expertise_is_endpoint_security_and_networking._KEY: |
I research new privacy recommendations and moderate our communities. My expertise is endpoint security and networking.
ThinkPrivacy_Editor_KEY: |
ThinkPrivacy Editor
Im_an_author_columnist_and_privacy_advocate_whose_work_has_appeared_in_Time_Huff_Post_OpenSource_and_more._KEY: |
I'm an author, columnist, and privacy advocate whose work has appeared in Time, Huff Post, OpenSource, and more.
Developer_KEY: |
Developer
Im_a_student_interested_in_software_development._I_help_improve_PrivacyTools_and_promote_using_free_libre_software._KEY: |
I'm a student interested in software development. I help improve PrivacyTools and promote using free libre software.
Contributor_KEY: |
Contributor
I_liaise_with_and_research_privacyfocused_services_to_refine_our_recommendations._My_background_is_infosec_and_network_security._KEY: |
I liaise with and research privacy-focused services to refine our recommendations. My background is infosec and network security.
I_am_interested_in_instant_messengers._I_review_privacy_tools_and_participate_in_our_forum_Matrix_room_and_issue_tracker._KEY: |
I am interested in instant messengers. I review privacy tools, and participate in our forum, Matrix room, and issue tracker.
Im_a_privacy_advocate_and_software_developer._I_write_web_extensions_help_research_and_make_updates_to_the_site._KEY: |
I'm a privacy advocate and software developer. I write web extensions, help research, and make updates to the site.
Subreddit_Mod_KEY: |
Subreddit Mod
Im_the_moderator_at_rPrivacy_and_rprivacytoolsIO._Day_to_day_I_am_also__iirony_alerti__an_ethical_digital_marketer._KEY: |
I'm the moderator at r/Privacy and r/privacytoolsIO. Day to day, I am also <i>irony alert</i> an (ethical) digital marketer.
Of_course_we_couldnt_do_any_of_this_without_our_very_generous_a_hrefhttpsopencollective.comprivacytoolsiofinancial_contributorsa_a_hre_KEY: |
Of course, we couldn't do any of this without our very generous <a href="https://opencollective.com/privacytoolsio/">financial contributors</a>, <a href="https://github.com/privacytoolsIO/privacytools.io/graphs/contributors">website contributors</a>, and the countless community members that help share new ideas and spread the word!
@ -320,6 +374,9 @@ View_our_privacy_statement_KEY: |
Learn_More_KEY: |
Learn More
Browser_Recommendations_For_Desktop_KEY: |
Browser Recommendations For Desktop
Firefox_KEY: |
Firefox
@ -374,9 +431,8 @@ httpswww.torproject.orgdownload_KEY: |
httpstrac.torproject.orgprojectstor_KEY: |
https://trac.torproject.org/projects/tor
Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Dont_forget_to_adjust_the_settings_according_to_ourrecommendations_a_hrefwebr_KEY: |
Firefox is fast, reliable, open-source, and respects your privacy. Don't forget to adjust the settings according to our
recommendations: <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> and <a href="#about_config"><i class="fas fa-link"></i> about:config</a> and get the <a href="#addons"><i class="fas fa-link"></i> privacy add-ons</a>.
Browser_Recommendations_For_Android_KEY: |
Browser Recommendations For Android
httpswww.mozilla.orgenUSfirefoxmobile_KEY: |
https://www.mozilla.org/en-US/firefox/mobile/
@ -423,6 +479,30 @@ httpswww.bromite.orgdownloadbromite_KEY: |
httpsgithub.combromitebromite_KEY: |
https://github.com/bromite/bromite
Worth_Mentioning_for_Android_KEY: |
Worth Mentioning for Android
httpswww.stoutner.comprivacybrowser_KEY: |
https://www.stoutner.com/privacy-browser/
Privacy_Browser_KEY: |
Privacy Browser
An_opensource_web_browser_focused_on_user_privacy._Features_include_integrated_ad_blocking_with_a_hrefhttpseasylist.toEasyLista_a_href_KEY: |
An open-source web browser focused on user privacy. Features include integrated ad blocking with <a href="https://easylist.to/">EasyList</a>, <a href="https://www.stoutner.com/privacy-browser-2-5/">SSL certificate pinning</a>, and <a href='https://guardianproject.info/apps/orbot/'>Tor Orbot proxy support.
httpsplay.google.comstoreappsdetails?idcom.google.android.webviewhlen_US_KEY: |
https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US
Privacy_Browser_relies_on_the_Android_System_WebView_which_needs_to_be_kept_up_to_date_to_fix_security_issues._One_can_update_WebView_by_either_install_KEY: |
Privacy Browser relies on the Android System WebView which needs to be kept up to date to fix security issues. One can update WebView by either installing it from Google Play or Aurora Store which you can get from F-Droid.
Keep_Android_WebView_uptodate_KEY: |
Keep Android WebView up-to-date
Browser_Recommendations_For_iOS_KEY: |
Browser Recommendations For iOS
Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Note_Because_of_limitations_set_by_Apple_in_iOS_our_recommended_tweaks_cannot_be_a_KEY: |
Firefox is fast, reliable, open-source, and respects your privacy. Note: Because of limitations set by Apple in iOS, our recommended tweaks cannot be applied. However, Firefox for iOS has an <a href="https://support.mozilla.org/en-US/kb/enhanced-tracking-protection-firefox-ios">Enhanced Tracking Protection</a> feature that uses a list provided by <a href="https://disconnect.me/trackerprotection">Disconnect</a> to identify and block ad, social, and analytics trackers, as well as cryptominers and fingerprinters.
@ -462,6 +542,135 @@ httpsapps.apple.comusappduckduckgoprivacybrowserid663592361_KEY: |
httpsgithub.comduckduckgoiOS_KEY: |
https://github.com/duckduckgo/iOS
Worth_Mentioning_for_iOS_KEY: |
Worth Mentioning for iOS
httpssnowhaze.comenindex.html_KEY: |
https://snowhaze.com/en/index.html
SnowHaze_KEY: |
SnowHaze
An_opensource_web_browser_with_builtin_ad_tracker_cookie_and_fingerprint_blocking_all_customizable_on_a_persite_basis._KEY: |
An open-source web browser with built-in ad, tracker, cookie, and fingerprint blocking, all customizable on a per-site basis.
Browser_Fingerprint__Is_your_browser_configuration_unique?_KEY: |
Browser Fingerprint - Is your browser configuration unique?
Your_Browser_sends_information_that_makes_you_unique_amongst_millions_of_users_and_therefore_easy_to_identify._KEY: |
Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.
When_you_visit_a_web_page_your_browser_voluntarily_sends_information_about_its_configuration_such_as_available_fonts_browser_type_and_addons._If_t_KEY: |
When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called <a href="https://panopticlick.eff.org/">Panopticlick</a> to test your browser to see how unique it is.
httpspanopticlick.eff.org_KEY: |
https://panopticlick.eff.org/
Test_your_Browser_now_KEY: |
Test your Browser now
You_need_to_find_what_strongmost_browsersstrong_are_reporting_and_then_use_those_variables_to_bring_your_browser_in_the_same_population._This_mea_KEY: |
You need to find what <strong>most browsers</strong> are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a <a href="https://addons.mozilla.org/firefox/addon/uaswitcher/">spoofed user-agent string</a> to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.
Modern_web_browsers_have_not_been_architected_to_assure_personal_web_privacy._Rather_than_worrying_about_being_fingerprinted_it_seems_more_practical_t_KEY: |
Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use <a href="#addons"><i class="fas fa-link"></i> free software plugins</a> like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.
Firefox_Addon_CanvasBlocker_KEY: |
Firefox Addon: CanvasBlocker
httpsaddons.mozilla.orgfirefoxaddoncanvasblocker_KEY: |
https://addons.mozilla.org/firefox/addon/canvasblocker/
addons.mozilla.org_KEY: |
addons.mozilla.org
strongCanvasBlockerstrong_allows_users_to_prevent_websites_from_using_some_Javascript_APIs_to_fingerprint_them._Users_can_choose_to_block_the_APIs_KEY: |
<strong>CanvasBlocker</strong> allows users to prevent websites from using some Javascript APIs to fingerprint them. Users can choose to block the APIs entirely on some or all websites (which may break some websites) or just block or fake its fingerprinting-friendly readout API.
Related_Information_KEY: |
Related Information
httpspanopticlick.eff.orgstaticbrowseruniqueness.pdf_KEY: |
https://panopticlick.eff.org/static/browser-uniqueness.pdf
How_Unique_Is_Your_Web_Browser?_Peter_Eckersley_EFF._KEY: |
How Unique Is Your Web Browser? Peter Eckersley, EFF.
Our_Firefox_privacy_addons_section._KEY: |
Our Firefox privacy add-ons section.
httpswww.browserleaks.com_KEY: |
https://www.browserleaks.com/
Web_browser_security_testing_tools_that_tell_you_what_exactly_personal_identity_data_may_be_leaked_without_any_permissions_when_you_surf_the_Internet._KEY: |
Web browser security testing tools that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet.
WebRTC_IP_Leak_Test__Is_your_IP_address_leaking?_KEY: |
WebRTC IP Leak Test - Is your IP address leaking?
WebRTC_is_a_new_communication_protocol_that_relies_on_JavaScript_that_can_leak_your_actual_IP_address_from_behind_your_VPN._KEY: |
WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN.
While_software_like_NoScript_prevents_this_its_probably_a_good_idea_to_block_this_protocol_directly_as_well_just_to_be_safe._KEY: |
While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.
httpsipleak.net_KEY: |
https://ipleak.net
How_to_disable_WebRTC_in_Firefox?_KEY: |
How to disable WebRTC in Firefox?
In_short_Set_media.peerconnection.enabled_to_false_in_aboutconfig._KEY: |
In short: Set "media.peerconnection.enabled" to "false" in "about:config".
Explained_KEY: |
Explained:
Enter_aboutconfig_in_the_firefox_address_bar_and_press_enter._KEY: |
Enter "about:config" in the firefox address bar and press enter.
Press_the_button_Ill_be_careful_I_promise!_KEY: |
Press the button "I'll be careful, I promise!"
Search_for_media.peerconnection.enabled_KEY: |
Search for "media.peerconnection.enabled"
Double_click_the_entry_the_column_Value_should_now_be_false_KEY: |
Double click the entry, the column "Value" should now be "false"
Done._Do_the_WebRTC_leak_test_again._KEY: |
Done. Do the WebRTC leak test again.
If_you_want_to_make_sure_every_single_WebRTCrelated_setting_is_really_disabled_change_these_settings_KEY: |
If you want to make sure every single WebRTC-related setting is really disabled, change these settings:
Now_you_can_be_100_sure_WebRTC_is_disabled._KEY: |
Now you can be 100% sure WebRTC is disabled.
Test_your_Browser_again_KEY: |
Test your Browser again
How_to_fix_the_WebRTC_Leak_in_Google_Chrome?_KEY: |
How to fix the WebRTC Leak in Google Chrome?
WebRTC_cannot_be_fully_disabled_in_Chrome_however_it_is_possible_to_change_its_routing_settings_and_prevent_leaks_using_an_extension._Two_opensour_KEY: |
WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include <a href="https://chrome.google.com/webstore/detail/webrtc-leak-prevent/eiadekoaikejlgdbkbdfeijglgfdalml">WebRTC Leak Prevent</a> (options may need to be changed depending on the scenario), and <a href="https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm">uBlock Origin</a> (select "Prevent WebRTC from leaking local IP addresses" in Settings).
What_about_other_browsers?_KEY: |
What about other browsers?
Chrome_on_iOS_Internet_Explorer_and_Safari_does_not_implement_WebRTC_yet._KEY: |
Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet.
But_we_recommend_using_Firefox_on_all_devices._KEY: |
But we recommend using Firefox on all devices.
Recommended_Browser_Addons_KEY: |
Recommended Browser Add-ons
Improve_your_privacy_with_these_browser_addons._KEY: |
Improve your privacy with these browser add-ons.
uBlock_Origin_Block_Ads_and_Trackers_KEY: |
uBlock Origin: Block Ads and Trackers
@ -606,6 +815,12 @@ httpsaddons.opera.comenextensionsdetailsprivacybadger_KEY: |
httpsgithub.comEFForgprivacybadger_KEY: |
https://github.com/EFForg/privacybadger
For_Power_Users_Only_KEY: |
For Power Users Only
These_addons_require_quite_a_lot_of_interaction_from_the_user._Some_sites_will_not_work_properly_until_you_have_configured_the_addons._KEY: |
These addons require quite a lot of interaction from the user. Some sites will not work properly until you have configured the add-ons.
uMatrix_Stop_CrossSite_Requests_KEY: |
uMatrix: Stop Cross-Site Requests
@ -645,6 +860,204 @@ httpschrome.google.comwebstoredetailnoscriptdoojmbjmlfjjnbmnoijecmcbfeoakpjm_KEY
httpsgithub.comhackademixnoscript_KEY: |
https://github.com/hackademix/noscript
Firefox_Privacy_Related_aboutconfig_Tweaks_KEY: |
Firefox: Privacy Related "about:config" Tweaks
This_is_a_collection_of_privacyrelated_strongaboutconfigstrong_tweaks._Well_show_you_how_to_enhance_the_privacy_of_your_Firefox_browser._KEY: |
This is a collection of privacy-related <strong>about:config</strong> tweaks. We'll show you how to enhance the privacy of your Firefox browser.
Preparation_KEY: |
Preparation:
Follow_the_instructions_below..._KEY: |
Follow the instructions below...
Getting_started_KEY: |
Getting started:
A_result_of_the_a_hrefhttpswiki.mozilla.orgSecurityTor_UpliftTor_Uplifta_effort_this_preference_isolates_all_browser_identifier_sources__KEY: |
A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)
A_result_of_the_a_hrefhttpswiki.mozilla.orgSecurityTor_UpliftTor_Uplifta_effort_this_preference_makes_Firefox_more_resistant_to_browser_f_KEY: |
A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference makes Firefox more resistant to browser fingerprinting.
FF67_Blocks_Fingerprinting_KEY: |
[FF67+] Blocks Fingerprinting
FF67_Blocks_CryptoMining_KEY: |
[FF67+] Blocks CryptoMining
This_is_Mozillas_new_builtin_tracking_protection._It_uses_Disconnect.me_filter_list_which_is_redundant_if_you_are_already_using_uBlock_Origin_3rd_pa_KEY: |
This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.
The_attribute_would_be_useful_for_letting_websites_track_visitors_clicks._KEY: |
The attribute would be useful for letting websites track visitors' clicks.
Even_with_Firefox_set_to_not_remember_history_your_closed_tabs_are_stored_temporarily_at_Menu_gt_History_gt_Recently_Closed_Tabs._KEY: |
Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -&gt; History -&gt; Recently Closed Tabs.
Disable_preloading_of_autocomplete_URLs._Firefox_preloads_URLs_that_autocomplete_when_a_user_types_into_the_address_bar_which_is_a_concern_if_URLs_are_KEY: |
Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to.
httpswww.ghacks.net20170724disablepreloadingfirefoxautocompleteurls_KEY: |
https://www.ghacks.net/2017/07/24/disable-preloading-firefox-autocomplete-urls/
Source_KEY: |
Source
Disable_that_websites_can_get_notifications_if_you_copy_paste_or_cut_something_from_a_web_page_and_it_lets_them_know_which_part_of_the_page_had_been_KEY: |
Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.
Disables_playback_of_DRMcontrolled_HTML5_content_which_if_enabled_automatically_downloads_the_Widevine_Content_Decryption_Module_provided_by_Google_KEY: |
Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc.
httpssupport.mozilla.orgkbenabledrmw_optoutofcdmplaybackuninstallcdmsandstopallcdmdownloads_KEY: |
https://support.mozilla.org/kb/enable-drm#w_opt-out-of-cdm-playback-uninstall-cdms-and-stop-all-cdm-downloads
Details_KEY: |
Details
DRMcontrolled_content_that_requires_the_Adobe_Flash_or_Microsoft_Silverlight_NPAPI_plugins_will_still_play_if_installed_and_enabled_in_Firefox._KEY: |
DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox.
Disables_the_Widevine_Content_Decryption_Module_provided_by_Google_Inc._used_for_the_playback_of_DRMcontrolled_HTML5_content._KEY: |
Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content.
httpssupport.mozilla.orgkbenabledrmw_disablethegooglewidevinecdmwithoutuninstalling_KEY: |
https://support.mozilla.org/kb/enable-drm#w_disable-the-google-widevine-cdm-without-uninstalling
Websites_can_track_the_microphone_and_camera_status_of_your_device._KEY: |
Websites can track the microphone and camera status of your device.
Disable_cookies_KEY: |
Disable cookies
Accept_all_cookies_by_default_KEY: |
Accept all cookies by default
Only_accept_from_the_originating_site_block_thirdparty_cookies_KEY: |
Only accept from the originating site (block third-party cookies)
Block_all_cookies_by_default_KEY: |
Block all cookies by default
Only_send_codeReferercode_header_when_the_full_hostnames_match._Note_if_you_notice_significant_breakage_you_might_try_code1code_combined_w_KEY: |
Only send <code>Referer</code> header when the full hostnames match. (Note: if you notice significant breakage, you might try <code>1</code> combined with an <code>XOriginTrimmingPolicy</code> tweak below.)
httpsfeeding.cloud.geek.nzpoststweakingreferrerforprivacyinfirefox_KEY: |
https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
Send_codeReferercode_in_all_cases_KEY: |
Send <code>Referer</code> in all cases
Send_codeReferercode_to_same_eTLD_sites_KEY: |
Send <code>Referer</code> to same eTLD sites
Send_codeReferercode_only_when_the_full_hostnames_match_KEY: |
Send <code>Referer</code> only when the full hostnames match
When_sending_codeReferercode_across_origins_only_send_scheme_host_and_port_in_the_codeReferercode_header_of_crossorigin_requests._KEY: |
When sending <code>Referer</code> across origins, only send scheme, host, and port in the <code>Referer</code> header of cross-origin requests.
Send_full_url_in_codeReferercode_KEY: |
Send full url in <code>Referer</code>
Send_url_without_query_string_in_codeReferercode_KEY: |
Send url without query string in <code>Referer</code>
Only_send_scheme_host_and_port_in_codeReferercode_KEY: |
Only send scheme, host, and port in <code>Referer</code>
Looking_for_TRR_DoH_or_ESNI?_KEY: |
Looking for TRR, DoH or ESNI?
They_have_moved_to_a_href_providersdnsicanndns__translate_page_our_DNS_pagea._KEY: |
They have moved to <a href="{{ '/providers/dns/#icanndns' | translate_page }}">our DNS page</a>.
WebGL_is_a_potential_security_risk._KEY: |
WebGL is a potential security risk.
httpssecurity.stackexchange.comquestions13799iswebglasecurityconcern_KEY: |
https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern
This_preference_controls_when_to_store_extra_information_about_a_session_contents_of_forms_scrollbar_positions_cookies_and_POST_data._KEY: |
This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data.
httpkb.mozillazine.orgBrowser.sessionstore.privacy_level_KEY: |
http://kb.mozillazine.org/Browser.sessionstore.privacy_level
Store_extra_session_data_for_any_site._Default_starting_with_Firefox_4._KEY: |
Store extra session data for any site. (Default starting with Firefox 4.)
Store_extra_session_data_for_unencrypted_nonHTTPS_sites_only._Default_before_Firefox_4._KEY: |
Store extra session data for unencrypted (non-HTTPS) sites only. (Default before Firefox 4.)
Never_store_extra_session_data._KEY: |
Never store extra session data.
Not_rendering_IDNs_as_their_Punycode_equivalent_leaves_you_open_to_phishing_attacks_that_can_be_very_difficult_to_notice._KEY: |
Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice.
httpskrebsonsecurity.com201803lookalikedomainsandvisualconfusionmore42636_KEY: |
https://krebsonsecurity.com/2018/03/look-alike-domains-and-visual-confusion/#more-42636
Firefox_user.js_Templates_KEY: |
Firefox user.js Templates
httpsgithub.comghacksuserjsghacksuser.js_KEY: |
https://github.com/ghacksuserjs/ghacks-user.js
ghacksuser.js_KEY: |
ghacks-user.js
An_ongoing_comprehensive_user.js_template_for_configuring_and_hardening_Firefox_privacy_security_and_antifingerprinting._KEY: |
An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting.
httpsblog.privacytools.iofirefoxprivacyanintroductiontosafe_KEY: |
https://blog.privacytools.io/firefox-privacy-an-introduction-to-safe/
Firefox_Privacy_Tips_and_Tricks_for_Better_Browsing_KEY: |
Firefox Privacy: Tips and Tricks for Better Browsing
A_good_starting_guide_for_users_looking_to_keep_their_data_private_and_secure._KEY: |
A good starting guide for users looking to keep their data private and secure.
httpsffprofile.com_KEY: |
https://ffprofile.com/
ffprofile.com_KEY: |
ffprofile.com
Helps_you_to_create_a_Firefox_profile_with_the_defaults_you_like._KEY: |
Helps you to create a Firefox profile with the defaults you like.
httpkb.mozillazine.orgCategorySecurity_and_privacyrelated_preferences_KEY: |
http://kb.mozillazine.org/Category:Security_and_privacy-related_preferences
mozillazine.org_KEY: |
mozillazine.org
Security_and_privacyrelated_preferences._KEY: |
Security and privacy-related preferences.
httpsaddons.mozilla.orgfirefoxaddonprivacysettings_KEY: |
https://addons.mozilla.org/firefox/addon/privacy-settings/
Privacy_Settings_KEY: |
Privacy Settings
A_Firefox_addon_to_alter_builtin_privacy_settings_easily_with_a_toolbar_panel._KEY: |
A Firefox add-on to alter built-in privacy settings easily with a toolbar panel.
https12bytes.orgarticlestechfirefoxthefirefoxprivacyguidefordummies_KEY: |
https://12bytes.org/articles/tech/firefox/the-firefox-privacy-guide-for-dummies/
Firefox_Privacy_Guide_For_Dummies_KEY: |
Firefox Privacy Guide For Dummies
Guide_on_ways_already_discussed_and_others_to_improve_your_privacy_and_safety_on_Firefox._KEY: |
Guide on ways (already discussed and others) to improve your privacy and safety on Firefox.
Nextcloud_KEY: |
Nextcloud
@ -1344,6 +1757,51 @@ httpswww.isc.orgdnssec_KEY: |
DNSSEC_and_BIND_9a_by_the_ISC_KEY: |
DNSSEC and BIND 9</a> by the ISC
Donate_via_OpenCollective_KEY: |
Donate via OpenCollective
If_you_are_able_please_consider_contributing_to_our_development_and_outreach_programs._KEY: |
If you are able, please consider contributing to our development and outreach programs.
Contributions_via_OpenCollective_to__site.name__are_tax_deductible_for_US_taxpayers._KEY: |
Contributions via OpenCollective to {{ site.name }} are tax deductible for US taxpayers.
These_funds_are_transparently_and_primarily_used_to_cover_server_costs._KEY: |
These funds are transparently and primarily used to cover server costs.
Contribute_KEY: |
Contribute
More_Info_KEY: |
More Info
Please_Donate_KEY: |
Please Donate
Our_website_is_free_of_advertisements_and_not_affiliated_with_any_listed_providers._KEY: |
Our website is free of advertisements and not affiliated with any listed providers.
Your_donation_will_cover_our_costs_for_servers_domains_coffee_beer_and_pizza._KEY: |
Your donation will cover our costs for servers, domains, coffee, beer, and pizza.
You_may_also_contribute_via_the_cryptocurrencies_below_however_we_will_not_be_able_to_provide_a_receipt_for_your_contribution._KEY: |
You may also contribute via the cryptocurrencies below; however, we will not be able to provide a receipt for your contribution.
Your_contribution_will_be_considered_an_anonymous_unrestricted_contribution_and_paid_to_our_Fiscal_Host_at_OpenCollective_when_we_convert_to_currency._KEY: |
Your contribution will be considered an anonymous, unrestricted contribution and paid to our Fiscal Host at OpenCollective when we convert to currency.
We_prefer_Bitcoin_donations_to_be_above_5_due_to_the_state_of_the_networks_transaction_fees._You_are_welcome_to_donate_any_smaller_or_larger_amount_o_KEY: |
We prefer Bitcoin donations to be above $5 due to the state of the network's transaction fees. You are welcome to donate any smaller or larger amount on any other cryptocurrency, such as Bitcoin Cash, Ethereum, or Stellar.
More_Cryptocurrencies_KEY: |
More Cryptocurrencies
The_a_href_contact__translate_page__site.name__teama_does_not_necessarily_endorse_all_of_the_cryptocurrencies_listed_on_this_page._KEY: |
The <a href="{{ '/contact/' | translate_page }}">{{ site.name }} team</a> does not necessarily endorse all of the cryptocurrencies listed on this page. Please conduct your own research before purchasing any cryptocurrencies.
Thanks_for_your_support._You_are_awesome!_KEY: |
Thanks for your support. You are awesome!
Thunderbird_KEY: |
Thunderbird
@ -1554,9 +2012,6 @@ Take_it_a_step_further_and_get_control_of_your_email_with_this_easytodeploy_mail
More_KEY: |
More:
Related_Information_KEY: |
Related Information
httpswww.wired.com201110ecpaturnstwentyfive_KEY: |
https://www.wired.com/2011/10/ecpa-turns-twenty-five/
@ -1818,9 +2273,6 @@ Prefer_the_classic_site?_View_a_singlepage_layout._KEY: |
Discover_privacycentric_online_services_including_email_providers_VPN_operators_DNS_administrators_and_more!_KEY: |
Discover privacy-centric online services, including email providers, VPN operators, DNS administrators, and more!
Web_Browsers_KEY: |
Web Browsers
Find_a_web_browser_that_respects_your_privacy_and_discover_how_to_harden_your_browser_against_tracking_and_leaks._KEY: |
Find a web browser that respects your privacy, and discover how to harden your browser against tracking and leaks.
@ -2052,9 +2504,6 @@ Critique_and_information_on_why_to_avoid_Cloudflare_a_big_company_with_a_huge_po
Tools_KEY: |
Tools
httpsipleak.net_KEY: |
https://ipleak.net/
ipleak.net_KEY: |
ipleak.net
@ -2799,6 +3248,30 @@ httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: |
httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
https://play.google.com/store/apps/details?id=org.torproject.torbrowser
httpsplay.google.comstoreappsdetails?idcom.google.android.webviewhlen_US_KEY: |
https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US
Browser_Fingerprint__Is_your_browser_configuration_unique?_KEY: |
Browser Fingerprint - Is your browser configuration unique?
How_Unique_Is_Your_Web_Browser?_Peter_Eckersley_EFF._KEY: |
How Unique Is Your Web Browser? Peter Eckersley, EFF.
WebRTC_IP_Leak_Test__Is_your_IP_address_leaking?_KEY: |
WebRTC IP Leak Test - Is your IP address leaking?
How_to_disable_WebRTC_in_Firefox?_KEY: |
How to disable WebRTC in Firefox?
How_to_fix_the_WebRTC_Leak_in_Google_Chrome?_KEY: |
How to fix the WebRTC Leak in Google Chrome?
What_about_other_browsers?_KEY: |
What about other browsers?
Looking_for_TRR_DoH_or_ESNI?_KEY: |
Looking for TRR, DoH or ESNI?
httpswww.clawsmail.orgdownloads.php?sectiondownloads_KEY: |
https://www.claws-mail.org/downloads.php?section=downloads
@ -3993,9 +4466,6 @@ Tor_Myths_KEY: |
FAQ_KEY: |
FAQ
More_Info_KEY: |
More Info
Our_VPN_Provider_Criteria_KEY: |
Our VPN Provider Criteria
@ -4260,9 +4730,3 @@ httpsgist.github.comkennwhite1f3bc4d889b02b35d8aa_KEY: |
Dont_use_LT2P_IPSec_use_other_protocols._KEY: |
Don't use LT2P IPSec, use other protocols.
httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: |
https://play.google.com/store/apps/details?id=org.mozilla.firefox
httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
https://play.google.com/store/apps/details?id=org.torproject.torbrowser

View File

@ -1,7 +1,7 @@
<h1 id="addons" class="anchor"><a href="#addons"><i class="fas fa-link anchor-icon"></i></a> Recommended Browser Add-ons</h1>
<h1 id="addons" class="anchor"><a href="#addons"><i class="fas fa-link anchor-icon"></i></a> {% t Recommended Browser Add-ons %}</h1>
<div class="alert alert-primary" role="alert">
<strong>Improve your privacy with these browser add-ons.</strong>
<strong>{% t Improve your privacy with these browser add-ons. %}</strong>
</div>
{% include cardv2.html
@ -87,10 +87,10 @@ chrome="https://chrome.google.com/webstore/detail/privacy-badger/pkehgijcmpdhfbd
opera="https://addons.opera.com/en/extensions/details/privacy-badger/"
%}
<h2>For Power Users Only</h2>
<h2>{% t For Power Users Only %}</h2>
<div class="alert alert-warning" role="alert">
<strong>These addons require quite a lot of interaction from the user. Some sites will not work properly until you have configured the add-ons.</strong>
<strong>{% t These addons require quite a lot of interaction from the user. Some sites will not work properly until you have configured the add-ons. %}</strong>
</div>
{% include cardv2.html

View File

@ -1,31 +1,31 @@
<h1 id="fingerprint" class="anchor"><a href="#fingerprint"><i class="fas fa-link anchor-icon"></i></a> Browser Fingerprint - Is your browser configuration unique?</h1>
<h1 id="fingerprint" class="anchor"><a href="#fingerprint"><i class="fas fa-link anchor-icon"></i></a> {% t Browser Fingerprint - Is your browser configuration unique? %}</h1>
<div class="alert alert-warning" role="alert">
<strong>Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.</strong>
<strong>{% t Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify. %}</strong>
</div>
<p>When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called <a href="https://panopticlick.eff.org/">Panopticlick</a> to test your browser to see how unique it is.</p>
<p>{% t When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called <a href="https://panopticlick.eff.org/">Panopticlick</a> to test your browser to see how unique it is. %}</p>
<p>
<a class="btn btn-warning" href="https://panopticlick.eff.org/">
Test your Browser now
<a class="btn btn-warning" href="{% t https://panopticlick.eff.org/ %}">
{% t Test your Browser now %}
</a>
</p>
<p>You need to find what <strong>most browsers</strong> are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a <a href="https://addons.mozilla.org/firefox/addon/uaswitcher/">spoofed user-agent string</a> to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.</p>
<p>{% t You need to find what <strong>most browsers</strong> are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a <a href="https://addons.mozilla.org/firefox/addon/uaswitcher/">spoofed user-agent string</a> to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses. %}</p>
<p>Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use <a href="#addons"><i class="fas fa-link"></i> free software plugins</a> like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.</p>
<p>{% t Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use <a href="#addons"><i class="fas fa-link"></i> free software plugins</a> like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint. %}</p>
<h3>Firefox Addon: CanvasBlocker</h3>
<h3>{% t Firefox Addon: CanvasBlocker %}</h3>
<ul>
<li><a href="https://addons.mozilla.org/firefox/addon/canvasblocker/">addons.mozilla.org</a> - <strong>CanvasBlocker</strong> allows users to prevent websites from using some Javascript APIs to fingerprint them. Users can choose to block the APIs entirely on some or all websites (which may break some websites) or just block or fake its fingerprinting-friendly readout API.</li>
<li><a href="{% t https://addons.mozilla.org/firefox/addon/canvasblocker/ %}">{% t addons.mozilla.org %}</a> - {% t <strong>CanvasBlocker</strong> allows users to prevent websites from using some Javascript APIs to fingerprint them. Users can choose to block the APIs entirely on some or all websites (which may break some websites) or just block or fake its fingerprinting-friendly readout API. %}</li>
</ul>
<h3>Related Information</h3>
<h3>{% t Related Information %}</h3>
<ul>
<li><a href="https://panopticlick.eff.org/static/browser-uniqueness.pdf">How Unique Is Your Web Browser? Peter Eckersley, EFF.</a></li>
<li><a href="#addons"><i class="fas fa-link"></i> Our Firefox privacy add-ons section.</a></li>
<li><a href="https://www.browserleaks.com/">BrowserLeaks.com</a> - Web browser security testing tools that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet.</li>
<li><a href="{% t https://panopticlick.eff.org/static/browser-uniqueness.pdf %}">{% t How Unique Is Your Web Browser? Peter Eckersley, EFF. %}</a></li>
<li><a href="#addons"><i class="fas fa-link"></i> {% t Our Firefox privacy add-ons section. %}</a></li>
<li><a href="{% t https://www.browserleaks.com/ %}">BrowserLeaks.com</a> - {% t Web browser security testing tools that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet.%}</li>
</ul>

View File

@ -1,6 +1,6 @@
<h1 id="browser" class="anchor">
<a href="#browser"><span class="fas fa-link anchor-icon"></span></a>
Browser Recommendations For Desktop
{% t Browser Recommendations For Desktop %}
</h1>
{% include cardv2.html
@ -33,14 +33,13 @@ linux="https://www.torproject.org/download/"
<h1 id="browser-android" class="anchor">
<a href="#browser-android"><span class="fas fa-link anchor-icon"></span></a>
Browser Recommendations For Android
{% t Browser Recommendations For Android %}
</h1>
{% include cardv2.html
title="Firefox"
image="/assets/img/tools/Firefox.png"
description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our
recommendations: <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> and <a href="#about_config"><i class="fas fa-link"></i> about:config</a> and get the <a href="#addons"><i class="fas fa-link"></i> privacy add-ons</a>.'
description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our recommendations: <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> and <a href="#about_config"><i class="fas fa-link"></i> about:config</a> and get the <a href="#addons"><i class="fas fa-link"></i> privacy add-ons</a>.'
website="https://www.mozilla.org/en-US/firefox/mobile/"
forum="https://forum.privacytools.io/t/discussion-firefox/279"
source="https://github.com/mozilla-mobile"
@ -73,23 +72,23 @@ fdroid="https://www.bromite.org/fdroid"
android="https://www.bromite.org/#download-bromite"
%}
<h3>Worth Mentioning for Android</h3>
<h3>{% t Worth Mentioning for Android %}</h3>
<ul>
<li>
<a href="https://www.stoutner.com/privacy-browser/">Privacy Browser</a>
- An open-source web browser focused on user privacy. Features include integrated ad blocking with <a href="https://easylist.to/">EasyList</a>, <a href="https://www.stoutner.com/privacy-browser-2-5/">SSL certificate pinning</a>, and <a href='https://guardianproject.info/apps/orbot/'>Tor Orbot proxy support.</a>
<a href="https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US">
<span class="badge badge-warning" data-toggle="tooltip" title="Privacy Browser relies on the Android System WebView which needs to be kept up to date to fix security issues. One can update WebView by either installing it from Google Play or Aurora Store which you can get from F-Droid.">
<a href="{% t https://www.stoutner.com/privacy-browser/ %}">{% t Privacy Browser %}</a>
- {% t An open-source web browser focused on user privacy. Features include integrated ad blocking with <a href="https://easylist.to/">EasyList</a>, <a href="https://www.stoutner.com/privacy-browser-2-5/">SSL certificate pinning</a>, and <a href='https://guardianproject.info/apps/orbot/'>Tor Orbot proxy support. %}</a>
<a href="{% t https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US %}">
<span class="badge badge-warning" data-toggle="tooltip" title="{% t Privacy Browser relies on the Android System WebView which needs to be kept up to date to fix security issues. One can update WebView by either installing it from Google Play or Aurora Store which you can get from F-Droid. %}">
<span class="fas fa-exclamation-triangle"></span>
Keep Android WebView up-to-date
{% t Keep Android WebView up-to-date %}
</span>
</a>
</li>
</ul>
<h1 id="browser-ios" class="anchor"><a href="#browser-ios"><i class="fas fa-link anchor-icon"></i></a> Browser Recommendations For iOS</h1>
<h1 id="browser-ios" class="anchor"><a href="#browser-ios"><i class="fas fa-link anchor-icon"></i></a> {% t Browser Recommendations For iOS %}</h1>
{% include cardv2.html
title="Firefox"
@ -124,11 +123,11 @@ github="https://github.com/duckduckgo/iOS"
ios="https://apps.apple.com/us/app/duckduckgo-privacy-browser/id663592361"
%}
<h3>Worth Mentioning for iOS</h3>
<h3>{% t Worth Mentioning for iOS %}</h3>
<ul>
<li>
<a href="https://snowhaze.com/en/index.html">SnowHaze</a>
- An open-source web browser with built-in ad, tracker, cookie, and fingerprint blocking, all customizable on a per-site basis.
<a href="{% t https://snowhaze.com/en/index.html %}">{% t SnowHaze %}</a>
- {% t An open-source web browser with built-in ad, tracker, cookie, and fingerprint blocking, all customizable on a per-site basis. %}
</li>
</ul>

View File

@ -1,65 +1,65 @@
<h1 id="about_config" class="anchor"><a href="#about_config"><i class="fas fa-link anchor-icon"></i></a> Firefox: Privacy Related "about:config" Tweaks</h1>
<h1 id="about_config" class="anchor"><a href="#about_config"><i class="fas fa-link anchor-icon"></i></a> {% t Firefox: Privacy Related "about:config" Tweaks %}</h1>
<div class="alert alert-success" role="alert">This is a collection of privacy-related <strong>about:config</strong> tweaks. We'll show you how to enhance the privacy of your Firefox browser.</div>
<div class="alert alert-success" role="alert">{% t This is a collection of privacy-related <strong>about:config</strong> tweaks. We'll show you how to enhance the privacy of your Firefox browser. %}</div>
<h3>Preparation:</h3>
<h3>{% t Preparation: %}</h3>
<ol>
<li>Enter "about:config" in the firefox address bar and press enter.</li>
<li>Press the button "I'll be careful, I promise!"</li>
<li>Follow the instructions below...</li>
<li>{% t Enter "about:config" in the firefox address bar and press enter. %}</li>
<li>{% t Press the button "I'll be careful, I promise!" %}</li>
<li>{% t Follow the instructions below... %}</li>
</ol>
<h3>Getting started:</h3>
<h3>{% t Getting started: %}</h3>
<dl class="long-string-list">
<dt>privacy.firstparty.isolate = true</dt>
<dd>A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)</dd>
<dd>{% t A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.) %}</dd>
<dt>privacy.resistFingerprinting = true</dt>
<dd>A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference makes Firefox more resistant to browser fingerprinting.</dd>
<dd>{% t A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference makes Firefox more resistant to browser fingerprinting. %}</dd>
<dt>privacy.trackingprotection.fingerprinting.enabled = true</dt>
<dd>[FF67+] Blocks Fingerprinting</dd>
<dd>{% t [FF67+] Blocks Fingerprinting %}</dd>
<dt>privacy.trackingprotection.cryptomining.enabled = true</dt>
<dd>[FF67+] Blocks CryptoMining</dd>
<dd>{% t [FF67+] Blocks CryptoMining %}</dd>
<dt>privacy.trackingprotection.enabled = true</dt>
<dd>This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.</dd>
<dd>{% t This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities. %}</dd>
<dt>browser.send_pings = false</dt>
<dd>The attribute would be useful for letting websites track visitors' clicks.</dd>
<dd>{% t The attribute would be useful for letting websites track visitors' clicks. %}</dd>
<dt>browser.sessionstore.max_tabs_undo = 0</dt>
<dd>Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -&gt; History -&gt; Recently Closed Tabs.</dd>
<dd>{% t Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -&gt; History -&gt; Recently Closed Tabs. %}</dd>
<dt>browser.urlbar.speculativeConnect.enabled = false</dt>
<dd>Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. <a href="https://www.ghacks.net/2017/07/24/disable-preloading-firefox-autocomplete-urls/">Source</a></dd>
<dd>{% t Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to.%} <a href="{% t https://www.ghacks.net/2017/07/24/disable-preloading-firefox-autocomplete-urls/%}">{% t Source %}</a></dd>
<dt>dom.event.clipboardevents.enabled = false</dt>
<dd>Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.</dd>
<dd>{% t Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected. %}</dd>
<dt>media.eme.enabled = false</dt>
<dd>
<p>Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. <a href="https://support.mozilla.org/kb/enable-drm#w_opt-out-of-cdm-playback-uninstall-cdms-and-stop-all-cdm-downloads">Details</a></p>
<p>DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox.</p>
<p>{% t Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc.%} <a href="{% t https://support.mozilla.org/kb/enable-drm#w_opt-out-of-cdm-playback-uninstall-cdms-and-stop-all-cdm-downloads %}">{% t Details %}</a></p>
<p>{% t DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox. %}</p>
</dd>
<dt>media.gmp-widevinecdm.enabled = false</dt>
<dd>Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. <a href="https://support.mozilla.org/kb/enable-drm#w_disable-the-google-widevine-cdm-without-uninstalling">Details</a></dd>
<dd>{% t Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content.%} <a href="{% t https://support.mozilla.org/kb/enable-drm#w_disable-the-google-widevine-cdm-without-uninstalling %}">{% t Details %}</a></dd>
<dt>media.navigator.enabled = false</dt>
<dd>Websites can track the microphone and camera status of your device.</dd>
<dd>{% t Websites can track the microphone and camera status of your device. %}</dd>
<dt>network.cookie.cookieBehavior = 1</dt>
<dd>
Disable cookies
{% t Disable cookies %}
<ul>
<li>0 = Accept all cookies by default</li>
<li>1 = Only accept from the originating site (block third-party cookies)</li>
<li>2 = Block all cookies by default</li>
<li>0 = {% t Accept all cookies by default %}</li>
<li>1 = {% t Only accept from the originating site (block third-party cookies) %}</li>
<li>2 = {% t Block all cookies by default %}</li>
</ul>
</dd>
@ -67,57 +67,57 @@
<dt>network.http.referer.XOriginPolicy = 2</dt>
<dd>
Only send <code>Referer</code> header when the full hostnames match. (Note: if you notice significant breakage, you might try <code>1</code> combined with an <code>XOriginTrimmingPolicy</code> tweak below.) <a href="https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/">Source</a>
{% t Only send <code>Referer</code> header when the full hostnames match. (Note: if you notice significant breakage, you might try <code>1</code> combined with an <code>XOriginTrimmingPolicy</code> tweak below.)%} <a href="{% t https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/ %}">{% t Source %}</a>
<ul>
<li>0 = Send <code>Referer</code> in all cases</li>
<li>1 = Send <code>Referer</code> to same eTLD sites</li>
<li>2 = Send <code>Referer</code> only when the full hostnames match</li>
<li>0 = {% t Send <code>Referer</code> in all cases %}</li>
<li>1 = {% t Send <code>Referer</code> to same eTLD sites %}</li>
<li>2 = {% t Send <code>Referer</code> only when the full hostnames match %}</li>
</ul>
</dd>
<dt>network.http.referer.XOriginTrimmingPolicy = 2</dt>
<dd>
When sending <code>Referer</code> across origins, only send scheme, host, and port in the <code>Referer</code> header of cross-origin requests. <a href="https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/">Source</a>
{% t When sending <code>Referer</code> across origins, only send scheme, host, and port in the <code>Referer</code> header of cross-origin requests.%} <a href="{% t https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/ %}">{% t Source %}</a>
<ul>
<li>0 = Send full url in <code>Referer</code></li>
<li>1 = Send url without query string in <code>Referer</code></li>
<li>2 = Only send scheme, host, and port in <code>Referer</code></li>
<li>0 = {% t Send full url in <code>Referer</code> %}</li>
<li>1 = {% t Send url without query string in <code>Referer</code> %}</li>
<li>2 = {% t Only send scheme, host, and port in <code>Referer</code> %}</li>
</ul>
</dd>
<dt>Looking for TRR, DoH or ESNI?</dt>
<dd>They have moved to <a href="/providers/dns/#icanndns">our DNS page</a>.</dd>
<dt>{% t Looking for TRR, DoH or ESNI? %}</dt>
<dd>{% t They have moved to <a href="{{ '/providers/dns/#icanndns' | translate_page }}">our DNS page</a>. %}</dd>
<dt>webgl.disabled = true</dt>
<dd>WebGL is a potential security risk. <a href="https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern">Source</a></dd>
<dd>{% t WebGL is a potential security risk.%} <a href="{% t https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern %}">{% t Source %}</a></dd>
<dt>browser.sessionstore.privacy_level = 2</dt>
<dd>
This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data. <a href="http://kb.mozillazine.org/Browser.sessionstore.privacy_level">Details</a>
{% t This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data.%} <a href="{% t http://kb.mozillazine.org/Browser.sessionstore.privacy_level %}">{% t Details %}</a>
<ul>
<li>0 = Store extra session data for any site. (Default starting with Firefox 4.)</li>
<li>1 = Store extra session data for unencrypted (non-HTTPS) sites only. (Default before Firefox 4.)</li>
<li>2 = Never store extra session data.</li>
<li>0 = {% t Store extra session data for any site. (Default starting with Firefox 4.) %}</li>
<li>1 = {% t Store extra session data for unencrypted (non-HTTPS) sites only. (Default before Firefox 4.) %}</li>
<li>2 = {% t Never store extra session data. %}</li>
</ul>
</dd>
<dt>network.IDN_show_punycode = true</dt>
<dd>Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice. <a href="https://krebsonsecurity.com/2018/03/look-alike-domains-and-visual-confusion/#more-42636">Source</a></dd>
<dd>{% t Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice.%} <a href="{% t https://krebsonsecurity.com/2018/03/look-alike-domains-and-visual-confusion/#more-42636 %}">{% t Source %}</a></dd>
<h3 id="user.js">Firefox user.js Templates</h3>
<h3 id="user.js">{% t Firefox user.js Templates %}</h3>
<ul>
<li><a href="https://github.com/ghacksuserjs/ghacks-user.js">ghacks-user.js</a> - An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting.</li>
<li><a href="{% t https://github.com/ghacksuserjs/ghacks-user.js %}">{% t ghacks-user.js %}</a> - {% t An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting. %}</li>
</ul>
<h3>Related Information</h3>
<h3>{% t Related Information %}</h3>
<ul>
<li><a href="https://blog.privacytools.io/firefox-privacy-an-introduction-to-safe/">Firefox Privacy: Tips and Tricks for Better Browsing</a> - A good starting guide for users looking to keep their data private and secure.</li>
<li><a href="https://ffprofile.com/">ffprofile.com</a> - Helps you to create a Firefox profile with the defaults you like.</li>
<li><a href="http://kb.mozillazine.org/Category:Security_and_privacy-related_preferences">mozillazine.org</a> - Security and privacy-related preferences. </li>
<li><a href="https://addons.mozilla.org/firefox/addon/privacy-settings/">Privacy Settings</a> - A Firefox add-on to alter built-in privacy settings easily with a toolbar panel.</li>
<li><a href="https://12bytes.org/articles/tech/firefox/the-firefox-privacy-guide-for-dummies/">Firefox Privacy Guide For Dummies</a> - Guide on ways (already discussed and others) to improve your privacy and safety on Firefox.</li>
<li><a href="{% t https://blog.privacytools.io/firefox-privacy-an-introduction-to-safe/ %}">{% t Firefox Privacy: Tips and Tricks for Better Browsing %}</a> - {% t A good starting guide for users looking to keep their data private and secure. %}</li>
<li><a href="{% t https://ffprofile.com/ %}">{% t ffprofile.com %}</a> - {% t Helps you to create a Firefox profile with the defaults you like. %}</li>
<li><a href="{% t http://kb.mozillazine.org/Category:Security_and_privacy-related_preferences %}">{% t mozillazine.org %}</a> - {% t Security and privacy-related preferences. %}</li>
<li><a href="{% t https://addons.mozilla.org/firefox/addon/privacy-settings/ %}">{% t Privacy Settings %}</a> - {% t A Firefox add-on to alter built-in privacy settings easily with a toolbar panel. %}</li>
<li><a href="{% t https://12bytes.org/articles/tech/firefox/the-firefox-privacy-guide-for-dummies/ %}">{% t Firefox Privacy Guide For Dummies %}</a> - {% t Guide on ways (already discussed and others) to improve your privacy and safety on Firefox. %}</li>
</ul>

View File

@ -1,47 +1,47 @@
<h1 id="webrtc" class="anchor"><a href="#webrtc"><i class="fas fa-link anchor-icon"></i></a> WebRTC IP Leak Test - Is your IP address leaking?</h1>
<h1 id="webrtc" class="anchor"><a href="#webrtc"><i class="fas fa-link anchor-icon"></i></a> {% t WebRTC IP Leak Test - Is your IP address leaking? %}</h1>
<div class="alert alert-danger" role="alert">
<strong>WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN.</strong>
<strong>{% t WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN. %}</strong>
</div>
<p>While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.</p>
<p>{% t While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe. %}</p>
<p>
<a class="btn btn-warning" target="_blank" rel="noopener noreferrer" href="https://ipleak.net">Test your Browser now</a>
<a class="btn btn-warning" target="_blank" rel="noopener noreferrer" href="{% t https://ipleak.net %}">{% t Test your Browser now %}</a>
</p>
<h3>How to disable WebRTC in Firefox?</h3>
<h3>{% t How to disable WebRTC in Firefox? %}</h3>
<p>In short: Set "media.peerconnection.enabled" to "false" in "about:config".</p>
<p><strong>Explained:</strong></p>
<p>{% t In short: Set "media.peerconnection.enabled" to "false" in "about:config".%}</p>
<p><strong>{% t Explained: %}</strong></p>
<ol class="long-string-list">
<li>Enter "about:config" in the firefox address bar and press enter.</li>
<li>Press the button "I'll be careful, I promise!"</li>
<li>Search for "media.peerconnection.enabled"</li>
<li>Double click the entry, the column "Value" should now be "false"</li>
<li>Done. Do the WebRTC leak test again.</li>
<li>{% t Enter "about:config" in the firefox address bar and press enter. %}
<li>{% t Press the button "I'll be careful, I promise!" %}
<li>{% t Search for "media.peerconnection.enabled" %}
<li>{% t Double click the entry, the column "Value" should now be "false" %}
<li>{% t Done. Do the WebRTC leak test again. %}
</ol>
<p>If you want to make sure every single WebRTC-related setting is really disabled change these settings:</p>
<p>{% t If you want to make sure every single WebRTC-related setting is really disabled, change these settings: %}</p>
<ol class="long-string-list">
<li>media.peerconnection.turn.disable = true</li>
<li>media.peerconnection.use_document_iceservers = false</li>
<li>media.peerconnection.video.enabled = false</li>
<li>media.peerconnection.identity.timeout = 1</li>
<li>media.peerconnection.turn.disable = true
<li>media.peerconnection.use_document_iceservers = false
<li>media.peerconnection.video.enabled = false
<li>media.peerconnection.identity.timeout = 1
</ol>
<p>Now you can be 100% sure WebRTC is disabled.</p>
<p>{% t Now you can be 100% sure WebRTC is disabled. %}</p>
<p>
<a class="btn btn-primary" target="_blank" rel="noopener noreferrer" href="https://ipleak.net">Test your Browser again</a>
<a class="btn btn-primary" target="_blank" rel="noopener noreferrer" href="{% t https://ipleak.net %}">{% t Test your Browser again %}</a>
</p>
<h3>How to fix the WebRTC Leak in Google Chrome?</h3>
<h3>{% t How to fix the WebRTC Leak in Google Chrome? %}</h3>
<p>WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include <a href="https://chrome.google.com/webstore/detail/webrtc-leak-prevent/eiadekoaikejlgdbkbdfeijglgfdalml">WebRTC Leak Prevent</a> (options may need to be changed depending on the scenario), and <a href="https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm">uBlock Origin</a> (select "Prevent WebRTC from leaking local IP addresses" in Settings).</p>
<p>{% t WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include <a href="https://chrome.google.com/webstore/detail/webrtc-leak-prevent/eiadekoaikejlgdbkbdfeijglgfdalml">WebRTC Leak Prevent</a> (options may need to be changed depending on the scenario), and <a href="https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm">uBlock Origin</a> (select "Prevent WebRTC from leaking local IP addresses" in Settings).%}</p>
<h3>What about other browsers?</h3>
<h3>{% t What about other browsers? %}</h3>
<p>Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet. <a href="#browser"><i class="fas fa-link"></i> But we recommend using Firefox on all devices.</a></p>
<p>{% t Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet.%} <a href="#browser"><i class="fas fa-link"></i> {% t But we recommend using Firefox on all devices. %}</a></p>

View File

@ -3,6 +3,7 @@ layout: page
permalink: /browsers/
title: "Web Browsers"
description: "These are our current web browser recommendations and some tweaks you can use to preserve your privacy."
translate: true
---
{% include sections/browser-recommendation.html %}

View File

@ -5,6 +5,12 @@ About_PrivacyTools_KEY: |
About_the_PrivacyTools_organization_and_contributors_to_the_PrivacyTools_website_communities_and_services._KEY: |
About the PrivacyTools organization, and contributors to the PrivacyTools website, communities, and services.
Web_Browsers_KEY: |
Web Browsers
These_are_our_current_web_browser_recommendations_and_some_tweaks_you_can_use_to_preserve_your_privacy._KEY: |
These are our current web browser recommendations and some tweaks you can use to preserve your privacy.
DNS__Domain_Providers_KEY: |
DNS / Domain Providers
@ -368,6 +374,9 @@ View_our_privacy_statement_KEY: |
Learn_More_KEY: |
Learn More
Browser_Recommendations_For_Desktop_KEY: |
Browser Recommendations For Desktop
Firefox_KEY: |
Firefox
@ -422,9 +431,8 @@ httpswww.torproject.orgdownload_KEY: |
httpstrac.torproject.orgprojectstor_KEY: |
https://trac.torproject.org/projects/tor
Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Dont_forget_to_adjust_the_settings_according_to_ourrecommendations_a_hrefwebr_KEY: |
Firefox is fast, reliable, open-source, and respects your privacy. Don't forget to adjust the settings according to our
recommendations: <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> and <a href="#about_config"><i class="fas fa-link"></i> about:config</a> and get the <a href="#addons"><i class="fas fa-link"></i> privacy add-ons</a>.
Browser_Recommendations_For_Android_KEY: |
Browser Recommendations For Android
httpswww.mozilla.orgenUSfirefoxmobile_KEY: |
https://www.mozilla.org/en-US/firefox/mobile/
@ -471,6 +479,30 @@ httpswww.bromite.orgdownloadbromite_KEY: |
httpsgithub.combromitebromite_KEY: |
https://github.com/bromite/bromite
Worth_Mentioning_for_Android_KEY: |
Worth Mentioning for Android
httpswww.stoutner.comprivacybrowser_KEY: |
https://www.stoutner.com/privacy-browser/
Privacy_Browser_KEY: |
Privacy Browser
An_opensource_web_browser_focused_on_user_privacy._Features_include_integrated_ad_blocking_with_a_hrefhttpseasylist.toEasyLista_a_href_KEY: |
An open-source web browser focused on user privacy. Features include integrated ad blocking with <a href="https://easylist.to/">EasyList</a>, <a href="https://www.stoutner.com/privacy-browser-2-5/">SSL certificate pinning</a>, and <a href='https://guardianproject.info/apps/orbot/'>Tor Orbot proxy support.
httpsplay.google.comstoreappsdetails?idcom.google.android.webviewhlen_US_KEY: |
https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US
Privacy_Browser_relies_on_the_Android_System_WebView_which_needs_to_be_kept_up_to_date_to_fix_security_issues._One_can_update_WebView_by_either_install_KEY: |
Privacy Browser relies on the Android System WebView which needs to be kept up to date to fix security issues. One can update WebView by either installing it from Google Play or Aurora Store which you can get from F-Droid.
Keep_Android_WebView_uptodate_KEY: |
Keep Android WebView up-to-date
Browser_Recommendations_For_iOS_KEY: |
Browser Recommendations For iOS
Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Note_Because_of_limitations_set_by_Apple_in_iOS_our_recommended_tweaks_cannot_be_a_KEY: |
Firefox is fast, reliable, open-source, and respects your privacy. Note: Because of limitations set by Apple in iOS, our recommended tweaks cannot be applied. However, Firefox for iOS has an <a href="https://support.mozilla.org/en-US/kb/enhanced-tracking-protection-firefox-ios">Enhanced Tracking Protection</a> feature that uses a list provided by <a href="https://disconnect.me/trackerprotection">Disconnect</a> to identify and block ad, social, and analytics trackers, as well as cryptominers and fingerprinters.
@ -510,6 +542,135 @@ httpsapps.apple.comusappduckduckgoprivacybrowserid663592361_KEY: |
httpsgithub.comduckduckgoiOS_KEY: |
https://github.com/duckduckgo/iOS
Worth_Mentioning_for_iOS_KEY: |
Worth Mentioning for iOS
httpssnowhaze.comenindex.html_KEY: |
https://snowhaze.com/en/index.html
SnowHaze_KEY: |
SnowHaze
An_opensource_web_browser_with_builtin_ad_tracker_cookie_and_fingerprint_blocking_all_customizable_on_a_persite_basis._KEY: |
An open-source web browser with built-in ad, tracker, cookie, and fingerprint blocking, all customizable on a per-site basis.
Browser_Fingerprint__Is_your_browser_configuration_unique?_KEY: |
Browser Fingerprint - Is your browser configuration unique?
Your_Browser_sends_information_that_makes_you_unique_amongst_millions_of_users_and_therefore_easy_to_identify._KEY: |
Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.
When_you_visit_a_web_page_your_browser_voluntarily_sends_information_about_its_configuration_such_as_available_fonts_browser_type_and_addons._If_t_KEY: |
When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called <a href="https://panopticlick.eff.org/">Panopticlick</a> to test your browser to see how unique it is.
httpspanopticlick.eff.org_KEY: |
https://panopticlick.eff.org/
Test_your_Browser_now_KEY: |
Test your Browser now
You_need_to_find_what_strongmost_browsersstrong_are_reporting_and_then_use_those_variables_to_bring_your_browser_in_the_same_population._This_mea_KEY: |
You need to find what <strong>most browsers</strong> are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a <a href="https://addons.mozilla.org/firefox/addon/uaswitcher/">spoofed user-agent string</a> to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.
Modern_web_browsers_have_not_been_architected_to_assure_personal_web_privacy._Rather_than_worrying_about_being_fingerprinted_it_seems_more_practical_t_KEY: |
Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use <a href="#addons"><i class="fas fa-link"></i> free software plugins</a> like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.
Firefox_Addon_CanvasBlocker_KEY: |
Firefox Addon: CanvasBlocker
httpsaddons.mozilla.orgfirefoxaddoncanvasblocker_KEY: |
https://addons.mozilla.org/firefox/addon/canvasblocker/
addons.mozilla.org_KEY: |
addons.mozilla.org
strongCanvasBlockerstrong_allows_users_to_prevent_websites_from_using_some_Javascript_APIs_to_fingerprint_them._Users_can_choose_to_block_the_APIs_KEY: |
<strong>CanvasBlocker</strong> allows users to prevent websites from using some Javascript APIs to fingerprint them. Users can choose to block the APIs entirely on some or all websites (which may break some websites) or just block or fake its fingerprinting-friendly readout API.
Related_Information_KEY: |
Related Information
httpspanopticlick.eff.orgstaticbrowseruniqueness.pdf_KEY: |
https://panopticlick.eff.org/static/browser-uniqueness.pdf
How_Unique_Is_Your_Web_Browser?_Peter_Eckersley_EFF._KEY: |
How Unique Is Your Web Browser? Peter Eckersley, EFF.
Our_Firefox_privacy_addons_section._KEY: |
Our Firefox privacy add-ons section.
httpswww.browserleaks.com_KEY: |
https://www.browserleaks.com/
Web_browser_security_testing_tools_that_tell_you_what_exactly_personal_identity_data_may_be_leaked_without_any_permissions_when_you_surf_the_Internet._KEY: |
Web browser security testing tools that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet.
WebRTC_IP_Leak_Test__Is_your_IP_address_leaking?_KEY: |
WebRTC IP Leak Test - Is your IP address leaking?
WebRTC_is_a_new_communication_protocol_that_relies_on_JavaScript_that_can_leak_your_actual_IP_address_from_behind_your_VPN._KEY: |
WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN.
While_software_like_NoScript_prevents_this_its_probably_a_good_idea_to_block_this_protocol_directly_as_well_just_to_be_safe._KEY: |
While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.
httpsipleak.net_KEY: |
https://ipleak.net
How_to_disable_WebRTC_in_Firefox?_KEY: |
How to disable WebRTC in Firefox?
In_short_Set_media.peerconnection.enabled_to_false_in_aboutconfig._KEY: |
In short: Set "media.peerconnection.enabled" to "false" in "about:config".
Explained_KEY: |
Explained:
Enter_aboutconfig_in_the_firefox_address_bar_and_press_enter._KEY: |
Enter "about:config" in the firefox address bar and press enter.
Press_the_button_Ill_be_careful_I_promise!_KEY: |
Press the button "I'll be careful, I promise!"
Search_for_media.peerconnection.enabled_KEY: |
Search for "media.peerconnection.enabled"
Double_click_the_entry_the_column_Value_should_now_be_false_KEY: |
Double click the entry, the column "Value" should now be "false"
Done._Do_the_WebRTC_leak_test_again._KEY: |
Done. Do the WebRTC leak test again.
If_you_want_to_make_sure_every_single_WebRTCrelated_setting_is_really_disabled_change_these_settings_KEY: |
If you want to make sure every single WebRTC-related setting is really disabled, change these settings:
Now_you_can_be_100_sure_WebRTC_is_disabled._KEY: |
Now you can be 100% sure WebRTC is disabled.
Test_your_Browser_again_KEY: |
Test your Browser again
How_to_fix_the_WebRTC_Leak_in_Google_Chrome?_KEY: |
How to fix the WebRTC Leak in Google Chrome?
WebRTC_cannot_be_fully_disabled_in_Chrome_however_it_is_possible_to_change_its_routing_settings_and_prevent_leaks_using_an_extension._Two_opensour_KEY: |
WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include <a href="https://chrome.google.com/webstore/detail/webrtc-leak-prevent/eiadekoaikejlgdbkbdfeijglgfdalml">WebRTC Leak Prevent</a> (options may need to be changed depending on the scenario), and <a href="https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm">uBlock Origin</a> (select "Prevent WebRTC from leaking local IP addresses" in Settings).
What_about_other_browsers?_KEY: |
What about other browsers?
Chrome_on_iOS_Internet_Explorer_and_Safari_does_not_implement_WebRTC_yet._KEY: |
Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet.
But_we_recommend_using_Firefox_on_all_devices._KEY: |
But we recommend using Firefox on all devices.
Recommended_Browser_Addons_KEY: |
Recommended Browser Add-ons
Improve_your_privacy_with_these_browser_addons._KEY: |
Improve your privacy with these browser add-ons.
uBlock_Origin_Block_Ads_and_Trackers_KEY: |
uBlock Origin: Block Ads and Trackers
@ -654,6 +815,12 @@ httpsaddons.opera.comenextensionsdetailsprivacybadger_KEY: |
httpsgithub.comEFForgprivacybadger_KEY: |
https://github.com/EFForg/privacybadger
For_Power_Users_Only_KEY: |
For Power Users Only
These_addons_require_quite_a_lot_of_interaction_from_the_user._Some_sites_will_not_work_properly_until_you_have_configured_the_addons._KEY: |
These addons require quite a lot of interaction from the user. Some sites will not work properly until you have configured the add-ons.
uMatrix_Stop_CrossSite_Requests_KEY: |
uMatrix: Stop Cross-Site Requests
@ -693,6 +860,204 @@ httpschrome.google.comwebstoredetailnoscriptdoojmbjmlfjjnbmnoijecmcbfeoakpjm_KEY
httpsgithub.comhackademixnoscript_KEY: |
https://github.com/hackademix/noscript
Firefox_Privacy_Related_aboutconfig_Tweaks_KEY: |
Firefox: Privacy Related "about:config" Tweaks
This_is_a_collection_of_privacyrelated_strongaboutconfigstrong_tweaks._Well_show_you_how_to_enhance_the_privacy_of_your_Firefox_browser._KEY: |
This is a collection of privacy-related <strong>about:config</strong> tweaks. We'll show you how to enhance the privacy of your Firefox browser.
Preparation_KEY: |
Preparation:
Follow_the_instructions_below..._KEY: |
Follow the instructions below...
Getting_started_KEY: |
Getting started:
A_result_of_the_a_hrefhttpswiki.mozilla.orgSecurityTor_UpliftTor_Uplifta_effort_this_preference_isolates_all_browser_identifier_sources__KEY: |
A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)
A_result_of_the_a_hrefhttpswiki.mozilla.orgSecurityTor_UpliftTor_Uplifta_effort_this_preference_makes_Firefox_more_resistant_to_browser_f_KEY: |
A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference makes Firefox more resistant to browser fingerprinting.
FF67_Blocks_Fingerprinting_KEY: |
[FF67+] Blocks Fingerprinting
FF67_Blocks_CryptoMining_KEY: |
[FF67+] Blocks CryptoMining
This_is_Mozillas_new_builtin_tracking_protection._It_uses_Disconnect.me_filter_list_which_is_redundant_if_you_are_already_using_uBlock_Origin_3rd_pa_KEY: |
This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.
The_attribute_would_be_useful_for_letting_websites_track_visitors_clicks._KEY: |
The attribute would be useful for letting websites track visitors' clicks.
Even_with_Firefox_set_to_not_remember_history_your_closed_tabs_are_stored_temporarily_at_Menu_gt_History_gt_Recently_Closed_Tabs._KEY: |
Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -&gt; History -&gt; Recently Closed Tabs.
Disable_preloading_of_autocomplete_URLs._Firefox_preloads_URLs_that_autocomplete_when_a_user_types_into_the_address_bar_which_is_a_concern_if_URLs_are_KEY: |
Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to.
httpswww.ghacks.net20170724disablepreloadingfirefoxautocompleteurls_KEY: |
https://www.ghacks.net/2017/07/24/disable-preloading-firefox-autocomplete-urls/
Source_KEY: |
Source
Disable_that_websites_can_get_notifications_if_you_copy_paste_or_cut_something_from_a_web_page_and_it_lets_them_know_which_part_of_the_page_had_been_KEY: |
Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.
Disables_playback_of_DRMcontrolled_HTML5_content_which_if_enabled_automatically_downloads_the_Widevine_Content_Decryption_Module_provided_by_Google_KEY: |
Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc.
httpssupport.mozilla.orgkbenabledrmw_optoutofcdmplaybackuninstallcdmsandstopallcdmdownloads_KEY: |
https://support.mozilla.org/kb/enable-drm#w_opt-out-of-cdm-playback-uninstall-cdms-and-stop-all-cdm-downloads
Details_KEY: |
Details
DRMcontrolled_content_that_requires_the_Adobe_Flash_or_Microsoft_Silverlight_NPAPI_plugins_will_still_play_if_installed_and_enabled_in_Firefox._KEY: |
DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox.
Disables_the_Widevine_Content_Decryption_Module_provided_by_Google_Inc._used_for_the_playback_of_DRMcontrolled_HTML5_content._KEY: |
Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content.
httpssupport.mozilla.orgkbenabledrmw_disablethegooglewidevinecdmwithoutuninstalling_KEY: |
https://support.mozilla.org/kb/enable-drm#w_disable-the-google-widevine-cdm-without-uninstalling
Websites_can_track_the_microphone_and_camera_status_of_your_device._KEY: |
Websites can track the microphone and camera status of your device.
Disable_cookies_KEY: |
Disable cookies
Accept_all_cookies_by_default_KEY: |
Accept all cookies by default
Only_accept_from_the_originating_site_block_thirdparty_cookies_KEY: |
Only accept from the originating site (block third-party cookies)
Block_all_cookies_by_default_KEY: |
Block all cookies by default
Only_send_codeReferercode_header_when_the_full_hostnames_match._Note_if_you_notice_significant_breakage_you_might_try_code1code_combined_w_KEY: |
Only send <code>Referer</code> header when the full hostnames match. (Note: if you notice significant breakage, you might try <code>1</code> combined with an <code>XOriginTrimmingPolicy</code> tweak below.)
httpsfeeding.cloud.geek.nzpoststweakingreferrerforprivacyinfirefox_KEY: |
https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
Send_codeReferercode_in_all_cases_KEY: |
Send <code>Referer</code> in all cases
Send_codeReferercode_to_same_eTLD_sites_KEY: |
Send <code>Referer</code> to same eTLD sites
Send_codeReferercode_only_when_the_full_hostnames_match_KEY: |
Send <code>Referer</code> only when the full hostnames match
When_sending_codeReferercode_across_origins_only_send_scheme_host_and_port_in_the_codeReferercode_header_of_crossorigin_requests._KEY: |
When sending <code>Referer</code> across origins, only send scheme, host, and port in the <code>Referer</code> header of cross-origin requests.
Send_full_url_in_codeReferercode_KEY: |
Send full url in <code>Referer</code>
Send_url_without_query_string_in_codeReferercode_KEY: |
Send url without query string in <code>Referer</code>
Only_send_scheme_host_and_port_in_codeReferercode_KEY: |
Only send scheme, host, and port in <code>Referer</code>
Looking_for_TRR_DoH_or_ESNI?_KEY: |
Looking for TRR, DoH or ESNI?
They_have_moved_to_a_href_providersdnsicanndns__translate_page_our_DNS_pagea._KEY: |
They have moved to <a href="{{ '/providers/dns/#icanndns' | translate_page }}">our DNS page</a>.
WebGL_is_a_potential_security_risk._KEY: |
WebGL is a potential security risk.
httpssecurity.stackexchange.comquestions13799iswebglasecurityconcern_KEY: |
https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern
This_preference_controls_when_to_store_extra_information_about_a_session_contents_of_forms_scrollbar_positions_cookies_and_POST_data._KEY: |
This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data.
httpkb.mozillazine.orgBrowser.sessionstore.privacy_level_KEY: |
http://kb.mozillazine.org/Browser.sessionstore.privacy_level
Store_extra_session_data_for_any_site._Default_starting_with_Firefox_4._KEY: |
Store extra session data for any site. (Default starting with Firefox 4.)
Store_extra_session_data_for_unencrypted_nonHTTPS_sites_only._Default_before_Firefox_4._KEY: |
Store extra session data for unencrypted (non-HTTPS) sites only. (Default before Firefox 4.)
Never_store_extra_session_data._KEY: |
Never store extra session data.
Not_rendering_IDNs_as_their_Punycode_equivalent_leaves_you_open_to_phishing_attacks_that_can_be_very_difficult_to_notice._KEY: |
Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice.
httpskrebsonsecurity.com201803lookalikedomainsandvisualconfusionmore42636_KEY: |
https://krebsonsecurity.com/2018/03/look-alike-domains-and-visual-confusion/#more-42636
Firefox_user.js_Templates_KEY: |
Firefox user.js Templates
httpsgithub.comghacksuserjsghacksuser.js_KEY: |
https://github.com/ghacksuserjs/ghacks-user.js
ghacksuser.js_KEY: |
ghacks-user.js
An_ongoing_comprehensive_user.js_template_for_configuring_and_hardening_Firefox_privacy_security_and_antifingerprinting._KEY: |
An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting.
httpsblog.privacytools.iofirefoxprivacyanintroductiontosafe_KEY: |
https://blog.privacytools.io/firefox-privacy-an-introduction-to-safe/
Firefox_Privacy_Tips_and_Tricks_for_Better_Browsing_KEY: |
Firefox Privacy: Tips and Tricks for Better Browsing
A_good_starting_guide_for_users_looking_to_keep_their_data_private_and_secure._KEY: |
A good starting guide for users looking to keep their data private and secure.
httpsffprofile.com_KEY: |
https://ffprofile.com/
ffprofile.com_KEY: |
ffprofile.com
Helps_you_to_create_a_Firefox_profile_with_the_defaults_you_like._KEY: |
Helps you to create a Firefox profile with the defaults you like.
httpkb.mozillazine.orgCategorySecurity_and_privacyrelated_preferences_KEY: |
http://kb.mozillazine.org/Category:Security_and_privacy-related_preferences
mozillazine.org_KEY: |
mozillazine.org
Security_and_privacyrelated_preferences._KEY: |
Security and privacy-related preferences.
httpsaddons.mozilla.orgfirefoxaddonprivacysettings_KEY: |
https://addons.mozilla.org/firefox/addon/privacy-settings/
Privacy_Settings_KEY: |
Privacy Settings
A_Firefox_addon_to_alter_builtin_privacy_settings_easily_with_a_toolbar_panel._KEY: |
A Firefox add-on to alter built-in privacy settings easily with a toolbar panel.
https12bytes.orgarticlestechfirefoxthefirefoxprivacyguidefordummies_KEY: |
https://12bytes.org/articles/tech/firefox/the-firefox-privacy-guide-for-dummies/
Firefox_Privacy_Guide_For_Dummies_KEY: |
Firefox Privacy Guide For Dummies
Guide_on_ways_already_discussed_and_others_to_improve_your_privacy_and_safety_on_Firefox._KEY: |
Guide on ways (already discussed and others) to improve your privacy and safety on Firefox.
Nextcloud_KEY: |
Nextcloud
@ -1647,9 +2012,6 @@ Take_it_a_step_further_and_get_control_of_your_email_with_this_easytodeploy_mail
More_KEY: |
More:
Related_Information_KEY: |
Related Information
httpswww.wired.com201110ecpaturnstwentyfive_KEY: |
https://www.wired.com/2011/10/ecpa-turns-twenty-five/
@ -1911,9 +2273,6 @@ Prefer_the_classic_site?_View_a_singlepage_layout._KEY: |
Discover_privacycentric_online_services_including_email_providers_VPN_operators_DNS_administrators_and_more!_KEY: |
Discover privacy-centric online services, including email providers, VPN operators, DNS administrators, and more!
Web_Browsers_KEY: |
Web Browsers
Find_a_web_browser_that_respects_your_privacy_and_discover_how_to_harden_your_browser_against_tracking_and_leaks._KEY: |
Find a web browser that respects your privacy, and discover how to harden your browser against tracking and leaks.
@ -2145,9 +2504,6 @@ Critique_and_information_on_why_to_avoid_Cloudflare_a_big_company_with_a_huge_po
Tools_KEY: |
Tools
httpsipleak.net_KEY: |
https://ipleak.net/
ipleak.net_KEY: |
ipleak.net
@ -2892,6 +3248,30 @@ httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: |
httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
https://play.google.com/store/apps/details?id=org.torproject.torbrowser
httpsplay.google.comstoreappsdetails?idcom.google.android.webviewhlen_US_KEY: |
https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US
Browser_Fingerprint__Is_your_browser_configuration_unique?_KEY: |
Browser Fingerprint - Is your browser configuration unique?
How_Unique_Is_Your_Web_Browser?_Peter_Eckersley_EFF._KEY: |
How Unique Is Your Web Browser? Peter Eckersley, EFF.
WebRTC_IP_Leak_Test__Is_your_IP_address_leaking?_KEY: |
WebRTC IP Leak Test - Is your IP address leaking?
How_to_disable_WebRTC_in_Firefox?_KEY: |
How to disable WebRTC in Firefox?
How_to_fix_the_WebRTC_Leak_in_Google_Chrome?_KEY: |
How to fix the WebRTC Leak in Google Chrome?
What_about_other_browsers?_KEY: |
What about other browsers?
Looking_for_TRR_DoH_or_ESNI?_KEY: |
Looking for TRR, DoH or ESNI?
httpswww.clawsmail.orgdownloads.php?sectiondownloads_KEY: |
https://www.claws-mail.org/downloads.php?section=downloads