diff --git a/_includes/sections/browser-tweaks.html b/_includes/sections/browser-tweaks.html
index a4847ece..3c860c36 100644
--- a/_includes/sections/browser-tweaks.html
+++ b/_includes/sections/browser-tweaks.html
@@ -13,11 +13,13 @@
Firefox Desktop:
First Party Isolation
+These settings should be safe, however first party isolation may break some third party login systems.
- privacy.firstparty.isolate = true
- A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)
Resist Fingerprinting
+One of the features of resist fingerprinting is to set the reported browser timezone to UTC. If you depend on having your real time zone reported to the websites you visit, this setting may break that.
- privacy.resistFingerprinting = true
- A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting.
@@ -49,9 +51,11 @@
- media.gmp-widevinecdm.enabled = false
- Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. Details
+
Hardware Fingerprinting
- media.navigator.enabled = false
- Websites can track the microphone and camera status of your device.
+
Persistent Storage
- network.cookie.cookieBehavior = 1
-
@@ -83,7 +87,9 @@
- 2 = Only send scheme, host, and port in
Referer
+
+This may break some websites which use VOIP based features.
- webgl.disabled = true
- WebGL is a potential security risk. Source
@@ -97,27 +103,32 @@
2 = Never store extra session data.
+
Miscellaneous
beacon.enabled = false
Disables sending additional analytics to web servers. Details
network.IDN_show_punycode = true
Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice. Source
+
Safe Browsing
browser.safebrowsing.downloads.remote.enabled = false
Prevents Firefox from sending information about downloaded executable files to Google Safe Browsing to determine whether it should be blocked for safety reasons. Details
- Looking for TRR, DoH or ESNI?
- They have moved to our DNS page.
-
Firefox Android (Fenix):
+
First Party Isolation
+These settings should be safe, however first party isolation may break some third party login systems.
privacy.firstparty.isolate = true
A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)
+
Resist Fingerprinting
+One of the features of resist fingerprinting is to set the reported browser timezone to UTC. If you depend on having your real time zone reported to the websites you visit, this setting may break that.
privacy.resistFingerprinting = true
A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting.
+
+This may break some websites which use VOIP based features.
webgl.disabled = true
WebGL is a potential security risk. Source