diff --git a/_includes/sections/browser-tweaks.html b/_includes/sections/browser-tweaks.html index 90b0faf8..a4847ece 100644 --- a/_includes/sections/browser-tweaks.html +++ b/_includes/sections/browser-tweaks.html @@ -12,32 +12,35 @@

Firefox Desktop:

+
First Party Isolation
privacy.firstparty.isolate = true
A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)
+
Resist Fingerprinting
privacy.resistFingerprinting = true
A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting.
-
privacy.trackingprotection.fingerprinting.enabled = true
-
[FF67+] Blocks Fingerprinting
- -
privacy.trackingprotection.cryptomining.enabled = true
-
[FF67+] Blocks CryptoMining
- -
privacy.trackingprotection.enabled = true
-
This is Mozilla's new built-in tracking protection. One of it's benefits is blocking tracking (i.e. Google Analytics) on privileged pages where add-ons that usually do that are disabled.
- +
Block outbound
browser.send_pings = false
The attribute would be useful for letting websites track visitors' clicks.
+
Disable Firefox prefetching pages it thinks you will visit next:
+
+ Prefetching causes cookies from the prefetched site to be loaded and other potentially unwanted behavior. Details here and here. +
+ +
Location bar
browser.urlbar.speculativeConnect.enabled = false
Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. Source
- -
dom.event.clipboardevents.enabled = false
-
Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.
- +
Plugins
media.eme.enabled = false

Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. Details

@@ -46,10 +49,10 @@
media.gmp-widevinecdm.enabled = false
Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. Details
- +
Hardware Fingerprinting
media.navigator.enabled = false
Websites can track the microphone and camera status of your device.
- +
Persistent Storage
network.cookie.cookieBehavior = 1
Disable cookies. 2 is likely to break some sites. 4 is the default default. 1 is more strict than 4. @@ -60,6 +63,7 @@
+
Headers/Referers
network.http.referer.XOriginPolicy = 2
Only send Referer header when the full hostnames match. (Note: if you notice significant breakage, you might try 1 combined with an XOriginTrimmingPolicy tweak below.) Source @@ -79,10 +83,11 @@
  • 2 = Only send scheme, host, and port in Referer
  • - +
    Media
    webgl.disabled = true
    WebGL is a potential security risk. Source
    +
    Sessions and session restoration
    browser.sessionstore.privacy_level = 2
    This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data. Details @@ -92,39 +97,27 @@
  • 2 = Never store extra session data.
  • - +
    Miscellaneous
    beacon.enabled = false
    Disables sending additional analytics to web servers. Details
    -
    browser.safebrowsing.downloads.remote.enabled = false
    -
    Prevents Firefox from sending information about downloaded executable files to Google Safe Browsing to determine whether it should be blocked for safety reasons. Details
    - -
    Disable Firefox prefetching pages it thinks you will visit next:
    -
    - Prefetching causes cookies from the prefetched site to be loaded and other potentially unwanted behavior. Details here and here. -
    -
    network.IDN_show_punycode = true
    Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice. Source
    +
    Safe Browsing
    +
    browser.safebrowsing.downloads.remote.enabled = false
    +
    Prevents Firefox from sending information about downloaded executable files to Google Safe Browsing to determine whether it should be blocked for safety reasons. Details
    Looking for TRR, DoH or ESNI?
    They have moved to our DNS page.
    -

    Firefox Android (Fenix):

    - +
    First Party Isolation
    privacy.firstparty.isolate = true
    A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)
    - +
    Resist Fingerprinting
    privacy.resistFingerprinting = true
    A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting.
    - +
    Media
    webgl.disabled = true
    WebGL is a potential security risk. Source