Key all browser content
This commit is contained in:
@ -1,7 +1,7 @@
|
||||
<h1 id="addons" class="anchor"><a href="#addons"><i class="fas fa-link anchor-icon"></i></a> Recommended Browser Add-ons</h1>
|
||||
<h1 id="addons" class="anchor"><a href="#addons"><i class="fas fa-link anchor-icon"></i></a> {% t Recommended Browser Add-ons %}</h1>
|
||||
|
||||
<div class="alert alert-primary" role="alert">
|
||||
<strong>Improve your privacy with these browser add-ons.</strong>
|
||||
<strong>{% t Improve your privacy with these browser add-ons. %}</strong>
|
||||
</div>
|
||||
|
||||
{% include cardv2.html
|
||||
@ -87,10 +87,10 @@ chrome="https://chrome.google.com/webstore/detail/privacy-badger/pkehgijcmpdhfbd
|
||||
opera="https://addons.opera.com/en/extensions/details/privacy-badger/"
|
||||
%}
|
||||
|
||||
<h2>For Power Users Only</h2>
|
||||
<h2>{% t For Power Users Only %}</h2>
|
||||
|
||||
<div class="alert alert-warning" role="alert">
|
||||
<strong>These addons require quite a lot of interaction from the user. Some sites will not work properly until you have configured the add-ons.</strong>
|
||||
<strong>{% t These addons require quite a lot of interaction from the user. Some sites will not work properly until you have configured the add-ons. %}</strong>
|
||||
</div>
|
||||
|
||||
{% include cardv2.html
|
||||
|
@ -1,31 +1,31 @@
|
||||
<h1 id="fingerprint" class="anchor"><a href="#fingerprint"><i class="fas fa-link anchor-icon"></i></a> Browser Fingerprint - Is your browser configuration unique?</h1>
|
||||
<h1 id="fingerprint" class="anchor"><a href="#fingerprint"><i class="fas fa-link anchor-icon"></i></a> {% t Browser Fingerprint - Is your browser configuration unique? %}</h1>
|
||||
|
||||
<div class="alert alert-warning" role="alert">
|
||||
<strong>Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.</strong>
|
||||
<strong>{% t Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify. %}</strong>
|
||||
</div>
|
||||
|
||||
<p>When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called <a href="https://panopticlick.eff.org/">Panopticlick</a> to test your browser to see how unique it is.</p>
|
||||
<p>{% t When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called <a href="https://panopticlick.eff.org/">Panopticlick</a> to test your browser to see how unique it is. %}</p>
|
||||
|
||||
<p>
|
||||
<a class="btn btn-warning" href="https://panopticlick.eff.org/">
|
||||
Test your Browser now
|
||||
<a class="btn btn-warning" href="{% t https://panopticlick.eff.org/ %}">
|
||||
{% t Test your Browser now %}
|
||||
</a>
|
||||
</p>
|
||||
|
||||
<p>You need to find what <strong>most browsers</strong> are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a <a href="https://addons.mozilla.org/firefox/addon/uaswitcher/">spoofed user-agent string</a> to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.</p>
|
||||
<p>{% t You need to find what <strong>most browsers</strong> are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a <a href="https://addons.mozilla.org/firefox/addon/uaswitcher/">spoofed user-agent string</a> to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses. %}</p>
|
||||
|
||||
<p>Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use <a href="#addons"><i class="fas fa-link"></i> free software plugins</a> like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.</p>
|
||||
<p>{% t Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use <a href="#addons"><i class="fas fa-link"></i> free software plugins</a> like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint. %}</p>
|
||||
|
||||
|
||||
<h3>Firefox Addon: CanvasBlocker</h3>
|
||||
<h3>{% t Firefox Addon: CanvasBlocker %}</h3>
|
||||
<ul>
|
||||
<li><a href="https://addons.mozilla.org/firefox/addon/canvasblocker/">addons.mozilla.org</a> - <strong>CanvasBlocker</strong> allows users to prevent websites from using some Javascript APIs to fingerprint them. Users can choose to block the APIs entirely on some or all websites (which may break some websites) or just block or fake its fingerprinting-friendly readout API.</li>
|
||||
<li><a href="{% t https://addons.mozilla.org/firefox/addon/canvasblocker/ %}">{% t addons.mozilla.org %}</a> - {% t <strong>CanvasBlocker</strong> allows users to prevent websites from using some Javascript APIs to fingerprint them. Users can choose to block the APIs entirely on some or all websites (which may break some websites) or just block or fake its fingerprinting-friendly readout API. %}</li>
|
||||
</ul>
|
||||
|
||||
<h3>Related Information</h3>
|
||||
<h3>{% t Related Information %}</h3>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://panopticlick.eff.org/static/browser-uniqueness.pdf">How Unique Is Your Web Browser? Peter Eckersley, EFF.</a></li>
|
||||
<li><a href="#addons"><i class="fas fa-link"></i> Our Firefox privacy add-ons section.</a></li>
|
||||
<li><a href="https://www.browserleaks.com/">BrowserLeaks.com</a> - Web browser security testing tools that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet.</li>
|
||||
<li><a href="{% t https://panopticlick.eff.org/static/browser-uniqueness.pdf %}">{% t How Unique Is Your Web Browser? Peter Eckersley, EFF. %}</a></li>
|
||||
<li><a href="#addons"><i class="fas fa-link"></i> {% t Our Firefox privacy add-ons section. %}</a></li>
|
||||
<li><a href="{% t https://www.browserleaks.com/ %}">BrowserLeaks.com</a> - {% t Web browser security testing tools that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet.%}</li>
|
||||
</ul>
|
||||
|
@ -1,6 +1,6 @@
|
||||
<h1 id="browser" class="anchor">
|
||||
<a href="#browser"><span class="fas fa-link anchor-icon"></span></a>
|
||||
Browser Recommendations For Desktop
|
||||
{% t Browser Recommendations For Desktop %}
|
||||
</h1>
|
||||
|
||||
{% include cardv2.html
|
||||
@ -33,14 +33,13 @@ linux="https://www.torproject.org/download/"
|
||||
|
||||
<h1 id="browser-android" class="anchor">
|
||||
<a href="#browser-android"><span class="fas fa-link anchor-icon"></span></a>
|
||||
Browser Recommendations For Android
|
||||
{% t Browser Recommendations For Android %}
|
||||
</h1>
|
||||
|
||||
{% include cardv2.html
|
||||
title="Firefox"
|
||||
image="/assets/img/tools/Firefox.png"
|
||||
description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our
|
||||
recommendations: <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> and <a href="#about_config"><i class="fas fa-link"></i> about:config</a> and get the <a href="#addons"><i class="fas fa-link"></i> privacy add-ons</a>.'
|
||||
description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our recommendations: <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> and <a href="#about_config"><i class="fas fa-link"></i> about:config</a> and get the <a href="#addons"><i class="fas fa-link"></i> privacy add-ons</a>.'
|
||||
website="https://www.mozilla.org/en-US/firefox/mobile/"
|
||||
forum="https://forum.privacytools.io/t/discussion-firefox/279"
|
||||
source="https://github.com/mozilla-mobile"
|
||||
@ -73,23 +72,23 @@ fdroid="https://www.bromite.org/fdroid"
|
||||
android="https://www.bromite.org/#download-bromite"
|
||||
%}
|
||||
|
||||
<h3>Worth Mentioning for Android</h3>
|
||||
<h3>{% t Worth Mentioning for Android %}</h3>
|
||||
|
||||
<ul>
|
||||
<li>
|
||||
<a href="https://www.stoutner.com/privacy-browser/">Privacy Browser</a>
|
||||
- An open-source web browser focused on user privacy. Features include integrated ad blocking with <a href="https://easylist.to/">EasyList</a>, <a href="https://www.stoutner.com/privacy-browser-2-5/">SSL certificate pinning</a>, and <a href='https://guardianproject.info/apps/orbot/'>Tor Orbot proxy support.</a>
|
||||
<a href="https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US">
|
||||
<span class="badge badge-warning" data-toggle="tooltip" title="Privacy Browser relies on the Android System WebView which needs to be kept up to date to fix security issues. One can update WebView by either installing it from Google Play or Aurora Store which you can get from F-Droid.">
|
||||
<a href="{% t https://www.stoutner.com/privacy-browser/ %}">{% t Privacy Browser %}</a>
|
||||
- {% t An open-source web browser focused on user privacy. Features include integrated ad blocking with <a href="https://easylist.to/">EasyList</a>, <a href="https://www.stoutner.com/privacy-browser-2-5/">SSL certificate pinning</a>, and <a href='https://guardianproject.info/apps/orbot/'>Tor Orbot proxy support. %}</a>
|
||||
<a href="{% t https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US %}">
|
||||
<span class="badge badge-warning" data-toggle="tooltip" title="{% t Privacy Browser relies on the Android System WebView which needs to be kept up to date to fix security issues. One can update WebView by either installing it from Google Play or Aurora Store which you can get from F-Droid. %}">
|
||||
<span class="fas fa-exclamation-triangle"></span>
|
||||
Keep Android WebView up-to-date
|
||||
{% t Keep Android WebView up-to-date %}
|
||||
</span>
|
||||
</a>
|
||||
</li>
|
||||
</ul>
|
||||
|
||||
|
||||
<h1 id="browser-ios" class="anchor"><a href="#browser-ios"><i class="fas fa-link anchor-icon"></i></a> Browser Recommendations For iOS</h1>
|
||||
<h1 id="browser-ios" class="anchor"><a href="#browser-ios"><i class="fas fa-link anchor-icon"></i></a> {% t Browser Recommendations For iOS %}</h1>
|
||||
|
||||
{% include cardv2.html
|
||||
title="Firefox"
|
||||
@ -124,11 +123,11 @@ github="https://github.com/duckduckgo/iOS"
|
||||
ios="https://apps.apple.com/us/app/duckduckgo-privacy-browser/id663592361"
|
||||
%}
|
||||
|
||||
<h3>Worth Mentioning for iOS</h3>
|
||||
<h3>{% t Worth Mentioning for iOS %}</h3>
|
||||
|
||||
<ul>
|
||||
<li>
|
||||
<a href="https://snowhaze.com/en/index.html">SnowHaze</a>
|
||||
- An open-source web browser with built-in ad, tracker, cookie, and fingerprint blocking, all customizable on a per-site basis.
|
||||
<a href="{% t https://snowhaze.com/en/index.html %}">{% t SnowHaze %}</a>
|
||||
- {% t An open-source web browser with built-in ad, tracker, cookie, and fingerprint blocking, all customizable on a per-site basis. %}
|
||||
</li>
|
||||
</ul>
|
||||
|
@ -1,65 +1,65 @@
|
||||
<h1 id="about_config" class="anchor"><a href="#about_config"><i class="fas fa-link anchor-icon"></i></a> Firefox: Privacy Related "about:config" Tweaks</h1>
|
||||
<h1 id="about_config" class="anchor"><a href="#about_config"><i class="fas fa-link anchor-icon"></i></a> {% t Firefox: Privacy Related "about:config" Tweaks %}</h1>
|
||||
|
||||
<div class="alert alert-success" role="alert">This is a collection of privacy-related <strong>about:config</strong> tweaks. We'll show you how to enhance the privacy of your Firefox browser.</div>
|
||||
<div class="alert alert-success" role="alert">{% t This is a collection of privacy-related <strong>about:config</strong> tweaks. We'll show you how to enhance the privacy of your Firefox browser. %}</div>
|
||||
|
||||
<h3>Preparation:</h3>
|
||||
<h3>{% t Preparation: %}</h3>
|
||||
|
||||
<ol>
|
||||
<li>Enter "about:config" in the firefox address bar and press enter.</li>
|
||||
<li>Press the button "I'll be careful, I promise!"</li>
|
||||
<li>Follow the instructions below...</li>
|
||||
<li>{% t Enter "about:config" in the firefox address bar and press enter. %}</li>
|
||||
<li>{% t Press the button "I'll be careful, I promise!" %}</li>
|
||||
<li>{% t Follow the instructions below... %}</li>
|
||||
</ol>
|
||||
|
||||
<h3>Getting started:</h3>
|
||||
<h3>{% t Getting started: %}</h3>
|
||||
|
||||
<dl class="long-string-list">
|
||||
<dt>privacy.firstparty.isolate = true</dt>
|
||||
<dd>A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)</dd>
|
||||
<dd>{% t A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.) %}</dd>
|
||||
|
||||
<dt>privacy.resistFingerprinting = true</dt>
|
||||
<dd>A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference makes Firefox more resistant to browser fingerprinting.</dd>
|
||||
<dd>{% t A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference makes Firefox more resistant to browser fingerprinting. %}</dd>
|
||||
|
||||
<dt>privacy.trackingprotection.fingerprinting.enabled = true</dt>
|
||||
<dd>[FF67+] Blocks Fingerprinting</dd>
|
||||
<dd>{% t [FF67+] Blocks Fingerprinting %}</dd>
|
||||
|
||||
<dt>privacy.trackingprotection.cryptomining.enabled = true</dt>
|
||||
<dd>[FF67+] Blocks CryptoMining</dd>
|
||||
<dd>{% t [FF67+] Blocks CryptoMining %}</dd>
|
||||
|
||||
<dt>privacy.trackingprotection.enabled = true</dt>
|
||||
<dd>This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.</dd>
|
||||
<dd>{% t This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities. %}</dd>
|
||||
|
||||
<dt>browser.send_pings = false</dt>
|
||||
<dd>The attribute would be useful for letting websites track visitors' clicks.</dd>
|
||||
<dd>{% t The attribute would be useful for letting websites track visitors' clicks. %}</dd>
|
||||
|
||||
<dt>browser.sessionstore.max_tabs_undo = 0</dt>
|
||||
<dd>Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs.</dd>
|
||||
<dd>{% t Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs. %}</dd>
|
||||
|
||||
<dt>browser.urlbar.speculativeConnect.enabled = false</dt>
|
||||
<dd>Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. <a href="https://www.ghacks.net/2017/07/24/disable-preloading-firefox-autocomplete-urls/">Source</a></dd>
|
||||
<dd>{% t Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to.%} <a href="{% t https://www.ghacks.net/2017/07/24/disable-preloading-firefox-autocomplete-urls/%}">{% t Source %}</a></dd>
|
||||
|
||||
|
||||
<dt>dom.event.clipboardevents.enabled = false</dt>
|
||||
<dd>Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.</dd>
|
||||
<dd>{% t Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected. %}</dd>
|
||||
|
||||
<dt>media.eme.enabled = false</dt>
|
||||
<dd>
|
||||
<p>Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. <a href="https://support.mozilla.org/kb/enable-drm#w_opt-out-of-cdm-playback-uninstall-cdms-and-stop-all-cdm-downloads">Details</a></p>
|
||||
<p>DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox.</p>
|
||||
<p>{% t Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc.%} <a href="{% t https://support.mozilla.org/kb/enable-drm#w_opt-out-of-cdm-playback-uninstall-cdms-and-stop-all-cdm-downloads %}">{% t Details %}</a></p>
|
||||
<p>{% t DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox. %}</p>
|
||||
</dd>
|
||||
|
||||
<dt>media.gmp-widevinecdm.enabled = false</dt>
|
||||
<dd>Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. <a href="https://support.mozilla.org/kb/enable-drm#w_disable-the-google-widevine-cdm-without-uninstalling">Details</a></dd>
|
||||
<dd>{% t Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content.%} <a href="{% t https://support.mozilla.org/kb/enable-drm#w_disable-the-google-widevine-cdm-without-uninstalling %}">{% t Details %}</a></dd>
|
||||
|
||||
<dt>media.navigator.enabled = false</dt>
|
||||
<dd>Websites can track the microphone and camera status of your device.</dd>
|
||||
<dd>{% t Websites can track the microphone and camera status of your device. %}</dd>
|
||||
|
||||
<dt>network.cookie.cookieBehavior = 1</dt>
|
||||
<dd>
|
||||
Disable cookies
|
||||
{% t Disable cookies %}
|
||||
<ul>
|
||||
<li>0 = Accept all cookies by default</li>
|
||||
<li>1 = Only accept from the originating site (block third-party cookies)</li>
|
||||
<li>2 = Block all cookies by default</li>
|
||||
<li>0 = {% t Accept all cookies by default %}</li>
|
||||
<li>1 = {% t Only accept from the originating site (block third-party cookies) %}</li>
|
||||
<li>2 = {% t Block all cookies by default %}</li>
|
||||
</ul>
|
||||
</dd>
|
||||
|
||||
@ -67,57 +67,57 @@
|
||||
|
||||
<dt>network.http.referer.XOriginPolicy = 2</dt>
|
||||
<dd>
|
||||
Only send <code>Referer</code> header when the full hostnames match. (Note: if you notice significant breakage, you might try <code>1</code> combined with an <code>XOriginTrimmingPolicy</code> tweak below.) <a href="https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/">Source</a>
|
||||
{% t Only send <code>Referer</code> header when the full hostnames match. (Note: if you notice significant breakage, you might try <code>1</code> combined with an <code>XOriginTrimmingPolicy</code> tweak below.)%} <a href="{% t https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/ %}">{% t Source %}</a>
|
||||
<ul>
|
||||
<li>0 = Send <code>Referer</code> in all cases</li>
|
||||
<li>1 = Send <code>Referer</code> to same eTLD sites</li>
|
||||
<li>2 = Send <code>Referer</code> only when the full hostnames match</li>
|
||||
<li>0 = {% t Send <code>Referer</code> in all cases %}</li>
|
||||
<li>1 = {% t Send <code>Referer</code> to same eTLD sites %}</li>
|
||||
<li>2 = {% t Send <code>Referer</code> only when the full hostnames match %}</li>
|
||||
</ul>
|
||||
</dd>
|
||||
|
||||
<dt>network.http.referer.XOriginTrimmingPolicy = 2</dt>
|
||||
<dd>
|
||||
When sending <code>Referer</code> across origins, only send scheme, host, and port in the <code>Referer</code> header of cross-origin requests. <a href="https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/">Source</a>
|
||||
{% t When sending <code>Referer</code> across origins, only send scheme, host, and port in the <code>Referer</code> header of cross-origin requests.%} <a href="{% t https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/ %}">{% t Source %}</a>
|
||||
<ul>
|
||||
<li>0 = Send full url in <code>Referer</code></li>
|
||||
<li>1 = Send url without query string in <code>Referer</code></li>
|
||||
<li>2 = Only send scheme, host, and port in <code>Referer</code></li>
|
||||
<li>0 = {% t Send full url in <code>Referer</code> %}</li>
|
||||
<li>1 = {% t Send url without query string in <code>Referer</code> %}</li>
|
||||
<li>2 = {% t Only send scheme, host, and port in <code>Referer</code> %}</li>
|
||||
</ul>
|
||||
</dd>
|
||||
|
||||
<dt>Looking for TRR, DoH or ESNI?</dt>
|
||||
<dd>They have moved to <a href="/providers/dns/#icanndns">our DNS page</a>.</dd>
|
||||
<dt>{% t Looking for TRR, DoH or ESNI? %}</dt>
|
||||
<dd>{% t They have moved to <a href="{{ '/providers/dns/#icanndns' | translate_page }}">our DNS page</a>. %}</dd>
|
||||
|
||||
<dt>webgl.disabled = true</dt>
|
||||
<dd>WebGL is a potential security risk. <a href="https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern">Source</a></dd>
|
||||
<dd>{% t WebGL is a potential security risk.%} <a href="{% t https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern %}">{% t Source %}</a></dd>
|
||||
|
||||
<dt>browser.sessionstore.privacy_level = 2</dt>
|
||||
<dd>
|
||||
This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data. <a href="http://kb.mozillazine.org/Browser.sessionstore.privacy_level">Details</a>
|
||||
{% t This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data.%} <a href="{% t http://kb.mozillazine.org/Browser.sessionstore.privacy_level %}">{% t Details %}</a>
|
||||
<ul>
|
||||
<li>0 = Store extra session data for any site. (Default starting with Firefox 4.)</li>
|
||||
<li>1 = Store extra session data for unencrypted (non-HTTPS) sites only. (Default before Firefox 4.)</li>
|
||||
<li>2 = Never store extra session data.</li>
|
||||
<li>0 = {% t Store extra session data for any site. (Default starting with Firefox 4.) %}</li>
|
||||
<li>1 = {% t Store extra session data for unencrypted (non-HTTPS) sites only. (Default before Firefox 4.) %}</li>
|
||||
<li>2 = {% t Never store extra session data. %}</li>
|
||||
</ul>
|
||||
</dd>
|
||||
|
||||
|
||||
<dt>network.IDN_show_punycode = true</dt>
|
||||
<dd>Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice. <a href="https://krebsonsecurity.com/2018/03/look-alike-domains-and-visual-confusion/#more-42636">Source</a></dd>
|
||||
<dd>{% t Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice.%} <a href="{% t https://krebsonsecurity.com/2018/03/look-alike-domains-and-visual-confusion/#more-42636 %}">{% t Source %}</a></dd>
|
||||
|
||||
|
||||
<h3 id="user.js">Firefox user.js Templates</h3>
|
||||
<h3 id="user.js">{% t Firefox user.js Templates %}</h3>
|
||||
<ul>
|
||||
<li><a href="https://github.com/ghacksuserjs/ghacks-user.js">ghacks-user.js</a> - An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting.</li>
|
||||
<li><a href="{% t https://github.com/ghacksuserjs/ghacks-user.js %}">{% t ghacks-user.js %}</a> - {% t An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting. %}</li>
|
||||
</ul>
|
||||
|
||||
|
||||
<h3>Related Information</h3>
|
||||
<h3>{% t Related Information %}</h3>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://blog.privacytools.io/firefox-privacy-an-introduction-to-safe/">Firefox Privacy: Tips and Tricks for Better Browsing</a> - A good starting guide for users looking to keep their data private and secure.</li>
|
||||
<li><a href="https://ffprofile.com/">ffprofile.com</a> - Helps you to create a Firefox profile with the defaults you like.</li>
|
||||
<li><a href="http://kb.mozillazine.org/Category:Security_and_privacy-related_preferences">mozillazine.org</a> - Security and privacy-related preferences. </li>
|
||||
<li><a href="https://addons.mozilla.org/firefox/addon/privacy-settings/">Privacy Settings</a> - A Firefox add-on to alter built-in privacy settings easily with a toolbar panel.</li>
|
||||
<li><a href="https://12bytes.org/articles/tech/firefox/the-firefox-privacy-guide-for-dummies/">Firefox Privacy Guide For Dummies</a> - Guide on ways (already discussed and others) to improve your privacy and safety on Firefox.</li>
|
||||
<li><a href="{% t https://blog.privacytools.io/firefox-privacy-an-introduction-to-safe/ %}">{% t Firefox Privacy: Tips and Tricks for Better Browsing %}</a> - {% t A good starting guide for users looking to keep their data private and secure. %}</li>
|
||||
<li><a href="{% t https://ffprofile.com/ %}">{% t ffprofile.com %}</a> - {% t Helps you to create a Firefox profile with the defaults you like. %}</li>
|
||||
<li><a href="{% t http://kb.mozillazine.org/Category:Security_and_privacy-related_preferences %}">{% t mozillazine.org %}</a> - {% t Security and privacy-related preferences. %}</li>
|
||||
<li><a href="{% t https://addons.mozilla.org/firefox/addon/privacy-settings/ %}">{% t Privacy Settings %}</a> - {% t A Firefox add-on to alter built-in privacy settings easily with a toolbar panel. %}</li>
|
||||
<li><a href="{% t https://12bytes.org/articles/tech/firefox/the-firefox-privacy-guide-for-dummies/ %}">{% t Firefox Privacy Guide For Dummies %}</a> - {% t Guide on ways (already discussed and others) to improve your privacy and safety on Firefox. %}</li>
|
||||
</ul>
|
||||
|
@ -1,47 +1,47 @@
|
||||
<h1 id="webrtc" class="anchor"><a href="#webrtc"><i class="fas fa-link anchor-icon"></i></a> WebRTC IP Leak Test - Is your IP address leaking?</h1>
|
||||
<h1 id="webrtc" class="anchor"><a href="#webrtc"><i class="fas fa-link anchor-icon"></i></a> {% t WebRTC IP Leak Test - Is your IP address leaking? %}</h1>
|
||||
|
||||
<div class="alert alert-danger" role="alert">
|
||||
<strong>WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN.</strong>
|
||||
<strong>{% t WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN. %}</strong>
|
||||
</div>
|
||||
|
||||
<p>While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.</p>
|
||||
<p>{% t While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe. %}</p>
|
||||
|
||||
<p>
|
||||
<a class="btn btn-warning" target="_blank" rel="noopener noreferrer" href="https://ipleak.net">Test your Browser now</a>
|
||||
<a class="btn btn-warning" target="_blank" rel="noopener noreferrer" href="{% t https://ipleak.net %}">{% t Test your Browser now %}</a>
|
||||
</p>
|
||||
|
||||
<h3>How to disable WebRTC in Firefox?</h3>
|
||||
<h3>{% t How to disable WebRTC in Firefox? %}</h3>
|
||||
|
||||
<p>In short: Set "media.peerconnection.enabled" to "false" in "about:config".</p>
|
||||
<p><strong>Explained:</strong></p>
|
||||
<p>{% t In short: Set "media.peerconnection.enabled" to "false" in "about:config".%}</p>
|
||||
<p><strong>{% t Explained: %}</strong></p>
|
||||
|
||||
<ol class="long-string-list">
|
||||
<li>Enter "about:config" in the firefox address bar and press enter.</li>
|
||||
<li>Press the button "I'll be careful, I promise!"</li>
|
||||
<li>Search for "media.peerconnection.enabled"</li>
|
||||
<li>Double click the entry, the column "Value" should now be "false"</li>
|
||||
<li>Done. Do the WebRTC leak test again.</li>
|
||||
<li>{% t Enter "about:config" in the firefox address bar and press enter. %}
|
||||
<li>{% t Press the button "I'll be careful, I promise!" %}
|
||||
<li>{% t Search for "media.peerconnection.enabled" %}
|
||||
<li>{% t Double click the entry, the column "Value" should now be "false" %}
|
||||
<li>{% t Done. Do the WebRTC leak test again. %}
|
||||
</ol>
|
||||
|
||||
<p>If you want to make sure every single WebRTC-related setting is really disabled change these settings:</p>
|
||||
<p>{% t If you want to make sure every single WebRTC-related setting is really disabled, change these settings: %}</p>
|
||||
|
||||
<ol class="long-string-list">
|
||||
<li>media.peerconnection.turn.disable = true</li>
|
||||
<li>media.peerconnection.use_document_iceservers = false</li>
|
||||
<li>media.peerconnection.video.enabled = false</li>
|
||||
<li>media.peerconnection.identity.timeout = 1</li>
|
||||
<li>media.peerconnection.turn.disable = true
|
||||
<li>media.peerconnection.use_document_iceservers = false
|
||||
<li>media.peerconnection.video.enabled = false
|
||||
<li>media.peerconnection.identity.timeout = 1
|
||||
</ol>
|
||||
|
||||
<p>Now you can be 100% sure WebRTC is disabled.</p>
|
||||
<p>{% t Now you can be 100% sure WebRTC is disabled. %}</p>
|
||||
|
||||
<p>
|
||||
<a class="btn btn-primary" target="_blank" rel="noopener noreferrer" href="https://ipleak.net">Test your Browser again</a>
|
||||
<a class="btn btn-primary" target="_blank" rel="noopener noreferrer" href="{% t https://ipleak.net %}">{% t Test your Browser again %}</a>
|
||||
</p>
|
||||
|
||||
<h3>How to fix the WebRTC Leak in Google Chrome?</h3>
|
||||
<h3>{% t How to fix the WebRTC Leak in Google Chrome? %}</h3>
|
||||
|
||||
<p>WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include <a href="https://chrome.google.com/webstore/detail/webrtc-leak-prevent/eiadekoaikejlgdbkbdfeijglgfdalml">WebRTC Leak Prevent</a> (options may need to be changed depending on the scenario), and <a href="https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm">uBlock Origin</a> (select "Prevent WebRTC from leaking local IP addresses" in Settings).</p>
|
||||
<p>{% t WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include <a href="https://chrome.google.com/webstore/detail/webrtc-leak-prevent/eiadekoaikejlgdbkbdfeijglgfdalml">WebRTC Leak Prevent</a> (options may need to be changed depending on the scenario), and <a href="https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm">uBlock Origin</a> (select "Prevent WebRTC from leaking local IP addresses" in Settings).%}</p>
|
||||
|
||||
<h3>What about other browsers?</h3>
|
||||
<h3>{% t What about other browsers? %}</h3>
|
||||
|
||||
<p>Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet. <a href="#browser"><i class="fas fa-link"></i> But we recommend using Firefox on all devices.</a></p>
|
||||
<p>{% t Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet.%} <a href="#browser"><i class="fas fa-link"></i> {% t But we recommend using Firefox on all devices. %}</a></p>
|
||||
|
Reference in New Issue
Block a user