Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:runa-chin
LibreWolf
_service:obs_scm:settings-master.obscpio
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _service:obs_scm:settings-master.obscpio of Package LibreWolf
07070100000000000041ED0000000000000000000000036701641700000000000000000000000000000000000000000000001800000000settings-master/.gitlab07070100000001000081A40000000000000000000000016701641700000051000000000000000000000000000000000000001F00000000settings-master/.gitlab-ci.ymlstages: - dummy dummy-job: stage: dummy script: - echo "Hello, world!" 07070100000002000041ED0000000000000000000000026701641700000000000000000000000000000000000000000000002800000000settings-master/.gitlab/issue_templates07070100000003000081A40000000000000000000000016701641700000361000000000000000000000000000000000000003300000000settings-master/.gitlab/issue_templates/Default.md### pre-requisites <!-- if you ignore the pre-requisites and the template the issue might be closed. issues that have the `provide info` label need user input or they will be quarantined after a week, and closed after ten days. suggestions are appreciated in the form of merge requests or alternatively well documented issues. make sure you are in the right repository: https://librewolf.net/docs/faq/#i-have-a-problem-where-do-i-open-a-new-issue --> - [ ] I've read and followed the [contribution guidelines](https://librewolf.net/docs/faq/#do-you-have-any-contribution-guidelines); - [ ] I've reproduced the issue in a new LibreWolf profile; - [ ] I've checked that the problem is not present in a stock Firefox profile; ### details - browser version & OS: - steps to reproduce: - expected result: - actual result: - console errors and warnings: - others: 07070100000004000081A40000000000000000000000016701641700004155000000000000000000000000000000000000001C00000000settings-master/LICENSE.txtMozilla Public License Version 2.0 ================================== 1. Definitions -------------- 1.1. "Contributor" means each individual or legal entity that creates, contributes to the creation of, or owns Covered Software. 1.2. "Contributor Version" means the combination of the Contributions of others (if any) used by a Contributor and that particular Contributor's Contribution. 1.3. "Contribution" means Covered Software of a particular Contributor. 1.4. "Covered Software" means Source Code Form to which the initial Contributor has attached the notice in Exhibit A, the Executable Form of such Source Code Form, and Modifications of such Source Code Form, in each case including portions thereof. 1.5. "Incompatible With Secondary Licenses" means (a) that the initial Contributor has attached the notice described in Exhibit B to the Covered Software; or (b) that the Covered Software was made available under the terms of version 1.1 or earlier of the License, but not also under the terms of a Secondary License. 1.6. "Executable Form" means any form of the work other than Source Code Form. 1.7. "Larger Work" means a work that combines Covered Software with other material, in a separate file or files, that is not Covered Software. 1.8. "License" means this document. 1.9. "Licensable" means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently, any and all of the rights conveyed by this License. 1.10. "Modifications" means any of the following: (a) any file in Source Code Form that results from an addition to, deletion from, or modification of the contents of Covered Software; or (b) any new file in Source Code Form that contains any Covered Software. 1.11. "Patent Claims" of a Contributor means any patent claim(s), including without limitation, method, process, and apparatus claims, in any patent Licensable by such Contributor that would be infringed, but for the grant of the License, by the making, using, selling, offering for sale, having made, import, or transfer of either its Contributions or its Contributor Version. 1.12. "Secondary License" means either the GNU General Public License, Version 2.0, the GNU Lesser General Public License, Version 2.1, the GNU Affero General Public License, Version 3.0, or any later versions of those licenses. 1.13. "Source Code Form" means the form of the work preferred for making modifications. 1.14. "You" (or "Your") means an individual or a legal entity exercising rights under this License. For legal entities, "You" includes any entity that controls, is controlled by, or is under common control with You. For purposes of this definition, "control" means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity. 2. License Grants and Conditions -------------------------------- 2.1. Grants Each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license: (a) under intellectual property rights (other than patent or trademark) Licensable by such Contributor to use, reproduce, make available, modify, display, perform, distribute, and otherwise exploit its Contributions, either on an unmodified basis, with Modifications, or as part of a Larger Work; and (b) under Patent Claims of such Contributor to make, use, sell, offer for sale, have made, import, and otherwise transfer either its Contributions or its Contributor Version. 2.2. Effective Date The licenses granted in Section 2.1 with respect to any Contribution become effective for each Contribution on the date the Contributor first distributes such Contribution. 2.3. Limitations on Grant Scope The licenses granted in this Section 2 are the only rights granted under this License. No additional rights or licenses will be implied from the distribution or licensing of Covered Software under this License. Notwithstanding Section 2.1(b) above, no patent license is granted by a Contributor: (a) for any code that a Contributor has removed from Covered Software; or (b) for infringements caused by: (i) Your and any other third party's modifications of Covered Software, or (ii) the combination of its Contributions with other software (except as part of its Contributor Version); or (c) under Patent Claims infringed by Covered Software in the absence of its Contributions. This License does not grant any rights in the trademarks, service marks, or logos of any Contributor (except as may be necessary to comply with the notice requirements in Section 3.4). 2.4. Subsequent Licenses No Contributor makes additional grants as a result of Your choice to distribute the Covered Software under a subsequent version of this License (see Section 10.2) or under the terms of a Secondary License (if permitted under the terms of Section 3.3). 2.5. Representation Each Contributor represents that the Contributor believes its Contributions are its original creation(s) or it has sufficient rights to grant the rights to its Contributions conveyed by this License. 2.6. Fair Use This License is not intended to limit any rights You have under applicable copyright doctrines of fair use, fair dealing, or other equivalents. 2.7. Conditions Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted in Section 2.1. 3. Responsibilities ------------------- 3.1. Distribution of Source Form All distribution of Covered Software in Source Code Form, including any Modifications that You create or to which You contribute, must be under the terms of this License. You must inform recipients that the Source Code Form of the Covered Software is governed by the terms of this License, and how they can obtain a copy of this License. You may not attempt to alter or restrict the recipients' rights in the Source Code Form. 3.2. Distribution of Executable Form If You distribute Covered Software in Executable Form then: (a) such Covered Software must also be made available in Source Code Form, as described in Section 3.1, and You must inform recipients of the Executable Form how they can obtain a copy of such Source Code Form by reasonable means in a timely manner, at a charge no more than the cost of distribution to the recipient; and (b) You may distribute such Executable Form under the terms of this License, or sublicense it under different terms, provided that the license for the Executable Form does not attempt to limit or alter the recipients' rights in the Source Code Form under this License. 3.3. Distribution of a Larger Work You may create and distribute a Larger Work under terms of Your choice, provided that You also comply with the requirements of this License for the Covered Software. If the Larger Work is a combination of Covered Software with a work governed by one or more Secondary Licenses, and the Covered Software is not Incompatible With Secondary Licenses, this License permits You to additionally distribute such Covered Software under the terms of such Secondary License(s), so that the recipient of the Larger Work may, at their option, further distribute the Covered Software under the terms of either this License or such Secondary License(s). 3.4. Notices You may not remove or alter the substance of any license notices (including copyright notices, patent notices, disclaimers of warranty, or limitations of liability) contained within the Source Code Form of the Covered Software, except that You may alter any license notices to the extent required to remedy known factual inaccuracies. 3.5. Application of Additional Terms You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Software. However, You may do so only on Your own behalf, and not on behalf of any Contributor. You must make it absolutely clear that any such warranty, support, indemnity, or liability obligation is offered by You alone, and You hereby agree to indemnify every Contributor for any liability incurred by such Contributor as a result of warranty, support, indemnity or liability terms You offer. You may include additional disclaimers of warranty and limitations of liability specific to any jurisdiction. 4. Inability to Comply Due to Statute or Regulation --------------------------------------------------- If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Software due to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they affect. Such description must be placed in a text file included with all distributions of the Covered Software under this License. Except to the extent prohibited by statute or regulation, such description must be sufficiently detailed for a recipient of ordinary skill to be able to understand it. 5. Termination -------------- 5.1. The rights granted under this License will terminate automatically if You fail to comply with any of its terms. However, if You become compliant, then the rights granted under this License from a particular Contributor are reinstated (a) provisionally, unless and until such Contributor explicitly and finally terminates Your grants, and (b) on an ongoing basis, if such Contributor fails to notify You of the non-compliance by some reasonable means prior to 60 days after You have come back into compliance. Moreover, Your grants from a particular Contributor are reinstated on an ongoing basis if such Contributor notifies You of the non-compliance by some reasonable means, this is the first time You have received notice of non-compliance with this License from such Contributor, and You become compliant prior to 30 days after Your receipt of the notice. 5.2. If You initiate litigation against any entity by asserting a patent infringement claim (excluding declaratory judgment actions, counter-claims, and cross-claims) alleging that a Contributor Version directly or indirectly infringes any patent, then the rights granted to You by any and all Contributors for the Covered Software under Section 2.1 of this License shall terminate. 5.3. In the event of termination under Sections 5.1 or 5.2 above, all end user license agreements (excluding distributors and resellers) which have been validly granted by You or Your distributors under this License prior to termination shall survive termination. ************************************************************************ * * * 6. Disclaimer of Warranty * * ------------------------- * * * * Covered Software is provided under this License on an "as is" * * basis, without warranty of any kind, either expressed, implied, or * * statutory, including, without limitation, warranties that the * * Covered Software is free of defects, merchantable, fit for a * * particular purpose or non-infringing. The entire risk as to the * * quality and performance of the Covered Software is with You. * * Should any Covered Software prove defective in any respect, You * * (not any Contributor) assume the cost of any necessary servicing, * * repair, or correction. This disclaimer of warranty constitutes an * * essential part of this License. No use of any Covered Software is * * authorized under this License except under this disclaimer. * * * ************************************************************************ ************************************************************************ * * * 7. Limitation of Liability * * -------------------------- * * * * Under no circumstances and under no legal theory, whether tort * * (including negligence), contract, or otherwise, shall any * * Contributor, or anyone who distributes Covered Software as * * permitted above, be liable to You for any direct, indirect, * * special, incidental, or consequential damages of any character * * including, without limitation, damages for lost profits, loss of * * goodwill, work stoppage, computer failure or malfunction, or any * * and all other commercial damages or losses, even if such party * * shall have been informed of the possibility of such damages. This * * limitation of liability shall not apply to liability for death or * * personal injury resulting from such party's negligence to the * * extent applicable law prohibits such limitation. Some * * jurisdictions do not allow the exclusion or limitation of * * incidental or consequential damages, so this exclusion and * * limitation may not apply to You. * * * ************************************************************************ 8. Litigation ------------- Any litigation relating to this License may be brought only in the courts of a jurisdiction where the defendant maintains its principal place of business and such litigation shall be governed by laws of that jurisdiction, without reference to its conflict-of-law provisions. Nothing in this Section shall prevent a party's ability to bring cross-claims or counter-claims. 9. Miscellaneous ---------------- This License represents the complete agreement concerning the subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not be used to construe this License against a Contributor. 10. Versions of the License --------------------------- 10.1. New Versions Mozilla Foundation is the license steward. Except as provided in Section 10.3, no one other than the license steward has the right to modify or publish new versions of this License. Each version will be given a distinguishing version number. 10.2. Effect of New Versions You may distribute the Covered Software under the terms of the version of the License under which You originally received the Covered Software, or under the terms of any subsequent version published by the license steward. 10.3. Modified Versions If you create software not governed by this License, and you want to create a new license for such software, you may create and use a modified version of this License if you rename the license and remove any references to the name of the license steward (except to note that such modified license differs from this License). 10.4. Distributing Source Code Form that is Incompatible With Secondary Licenses If You choose to distribute Source Code Form that is Incompatible With Secondary Licenses under the terms of this version of the License, the notice described in Exhibit B of this License must be attached. Exhibit A - Source Code Form License Notice ------------------------------------------- This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at http://mozilla.org/MPL/2.0/. If it is not possible or desirable to put the notice in a particular file, then You may include the notice in a location (such as a LICENSE file in a relevant directory) where a recipient would be likely to look for such a notice. You may add additional accurate notices of copyright ownership. Exhibit B - "Incompatible With Secondary Licenses" Notice --------------------------------------------------------- This Source Code Form is "Incompatible With Secondary Licenses", as defined by the Mozilla Public License, v. 2.0. 07070100000005000081A4000000000000000000000001670164170000004D000000000000000000000000000000000000001900000000settings-master/Makefile.PHONY : all all : sudo cp librewolf.cfg /usr/lib/librewolf/librewolf.cfg 07070100000006000081A40000000000000000000000016701641700000626000000000000000000000000000000000000001A00000000settings-master/README.md# LibreWolf settings LibreWolf settings for all platforms. we encourage users to find **their own setup** and to use our default configuration as something to build on top of. this is now easier thanks to the [overrides](https://librewolf.net/docs/settings/#where-do-i-find-my-librewolfoverridescfg). ## Useful links - [website](https://librewolf.net/): read the docs. - [faq](https://librewolf.net/docs/faq/): for any question you might have, and to help you creating your own pref file. - [all releases](https://gitlab.com/librewolf-community/browser). - [issue tracker](https://gitlab.com/librewolf-community/settings/-/issues). - if you ignore the pre-requisites and the template the issues might be closed. - issues that have the `provide info` label need user input or they will be quarantined after a week, and closed after ten days. - find us on [gitter](https://gitter.im/librewolf-community/librewolf) / [matrix](https://matrix.to/#/#librewolf:matrix.org) / [reddit](https://www.reddit.com/r/LibreWolf/) / [lemmy](https://lemmy.ml/c/librewolf). ## Notes and thanks - this repository benefits from the knowledge and research provided by [arkenfox](https://github.com/arkenfox), so special thanks to the project. we do not use arkenfox's `user.js` but we try to keep up with it, and we also consider it a great resource for users who want to find their own setup. - many thanks to the firefox team and to the people working on [bugzilla](https://bugzilla.mozilla.org/home); - thanks to the whole LibreWolf community and to all the contributors of this repo. 07070100000007000041ED0000000000000000000000036701641700000000000000000000000000000000000000000000001900000000settings-master/defaults07070100000008000041ED0000000000000000000000026701641700000000000000000000000000000000000000000000001E00000000settings-master/defaults/pref07070100000009000081A400000000000000000000000167016417000000F2000000000000000000000000000000000000003000000000settings-master/defaults/pref/local-settings.js// Sets up the .cfg file. //Specifies the .cfg filename (path cannot be changed) pref("general.config.filename", "librewolf.cfg"); //Allows .cfg file to be stored in plain text without obfuscation pref("general.config.obscure_value", 0); 0707010000000A000041ED0000000000000000000000026701641700000000000000000000000000000000000000000000001D00000000settings-master/distribution0707010000000B000081A4000000000000000000000001670164170000000C000000000000000000000000000000000000002C00000000settings-master/distribution/.gitattributes* text=auto 0707010000000C000081A40000000000000000000000016701641700005B10000000000000000000000000000000000000002B00000000settings-master/distribution/policies.json{ "__COMMENT__ More Information": "https://github.com/mozilla/policy-templates/blob/master/README.md", "policies": { "AppUpdateURL": "https://localhost", "DisableAppUpdate": true, "OverrideFirstRunPage": "", "OverridePostUpdatePage": "", "DisableSystemAddonUpdate": true, "DisableProfileImport": false, "DisableFirefoxStudies": true, "DisableTelemetry": true, "DisableFeedbackCommands": true, "DisablePocket": true, "DisableSetDesktopBackground": false, "DisableDeveloperTools": false, "NoDefaultBookmarks": true, "WebsiteFilter": { "Block": [ "https://localhost/*" ], "Exceptions": [ "https://localhost/*" ] }, "Extensions": { "Install": [ "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi" ], "Uninstall": [ "google@search.mozilla.org", "bing@search.mozilla.org", "amazondotcom@search.mozilla.org", "ebay@search.mozilla.org", "twitter@search.mozilla.org" ] }, "SearchEngines": { "PreventInstalls": false, "Remove": [ "Google", "Bing", "Amazon.com", "eBay", "Twitter" ], "Default": "DuckDuckGo", "Add": [ { "Name": "DuckDuckGo Lite", "Description": "Minimal, ad-free version of DuckDuckGo", "Alias": "", "Method": "POST", "URLTemplate": "https://start.duckduckgo.com/lite/?q={searchTerms}", "PostData": "q={searchTerms}", "IconURL": "data:image/x-icon;base64,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" }, { "Name": "SearXNG - searx.be", "Description": "A privacy-respecting, hackable metasearch engine", "Alias": "", "Method": "POST", "URLTemplate": "https://searx.be/?q={searchTerms}", "PostData": "q={searchTerms}&category_general=on", "IconURL": "data:image/svg+xml;base64,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" }, { "Name": "MetaGer", "Description": "MetaGer: Privacy Protected Search & Find", "Alias": "", "Method": "GET", "URLTemplate": "https://metager.org/meta/meta.ger3?eingabe={searchTerms}", "IconURL": "data:image/x-icon;base64,AAABAAEAQEAAAAEACAAoFgAAFgAAACgAAABAAAAAgAAAAAEACAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgP4AAYD+AACA/wADgf4ABIH+AAWC/gAGgv4ACYT+AAuF/gAMhf4ADYb+AA6G/gAPh/4AEIf+ABGI/gATif4AFIn+ABWK/gAWiv4AF4v+ABmM/gAajP4AG43+AByN/gAejv4AIZD+ACSR/gAmkv4AJ5L+ACmU/gAqlP4ALJX+AC2W/gAulv4AMpj+ADSZ/gA5m/4AO5z+AD6e/gA/n/4AQJ/+AEKg/gBDof4ARKH+AEWi/gBGov4ASKP+AEyl/gBPpv4AU6j+AFWq/gBXq/4AWKv+AFut/gBcrf4AX6/+AGGw/gBksf4AZ7L+AGq0/gBvtv4Acbf+AHO4/gB0uf4Adrr+AHe6/gB4u/4Afr7+AIC//gCBwP4Ah8P+AIjD/gCJxP4AisT+AIvF/gCNxv4AkMf+AJHI/gCSyP4Ak8n+AJTJ/gCVyv4Alsr+AJjL/gCazP4AnM3+AJ7O/gCgz/4AodD+AKLQ/gCk0f4AptL+AKjT/gCq1P4ArdX+AK7W/gCv1v4AsNf+ALXZ/gC22v4At9r+ALjb/gC52/4AvN3+AMPg/gDE4f4AxuL+AMrk/gDM5f4Azub+AM/m/gDQ5/4A0ef+ANLo/gDU6f4A1ur+ANnr/gDb7P4A3+7+AOHv/gDk8f4A5fH+AOby/gDn8v4A6PP+AOnz/gDq9P4A6/T+AO31/gDv9v4A8/j+APX5/gD2+v4A9/r+APj7/gD5+/4A+vz+APv8/gD8/f4A/f3+AP///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnyMjIyMHgICAgICAgICAgICAgIDhYyMjIwSAgICAgICAgIEMlVxfoiEfXJeRSYDAgICAgICAgICAgICAgICAgJmjIyMjDQCAgICAgICAgICAgICAm2MjIyMKwICAgICAgIzeIyMjIyMjIyMjIyMgU8dAgICAgICAgICAgICAgICSoyMjIxGAgICAgICAgICAgICAgJXjIyMjD4CAgICAgJMjIyMjIyMjIyMjIyMjIyMhQUCAgICAgICAgICAgICAjaMjIyMYwICAgICAgICAgICAgICPYyMjIxYAgICAgJAjIyMjIyMjIyMjIyMjIyMjIwjAgICAgICAgICAgICAgIhjIyMjHkCAgICAjtoaGIIAgICAiqMjIyMbwICAgIWg4yMjIyMXCoOAQMPJWmMjIyMOwICAgICAgICAgICAgICBYeMjIyMEAICAgJtjIyMUgICAgIQjIyMjIYEAgICQ4yMjIyMOAICAgICAgJCjIyMjFcCAgICAgICAgICAgICAgJwjIyMjCkCAgIVjIyMjIwrAgICAnqMjIyMIAICAmqMjIyMWgICAgICAgICKoyMjIxzAgICAgICAgICAgICAgICWYyMjIw9AgICOYyMjIyMdwsCAgJljIyMjDUCAgJ9jIyMjCcCAgICAgICAgyLjIyMiwoCAgICAgICAgICAgICAj+MjIyMVwICAmCMjIyMjIxWAgICSYyMjIxJAgICh4yMjIwMAgICAgJkjIyMjIyMjIwpAgICAgICAgICAgICAgIsjIyMjG4CAgaCjIyMjIyMjC8CAjWMjIyMZQICAn+MjIyMBAICAgICRoyMjIyMjIyMQgICAgICAgICAgICAgICEoyMjIyGBAIsjIyMjGiMjIx6DgIgjIyMjHsCAgJzjIyMjBMCAgICAjOMjIyMjIyMjF8CAgICAgICAgICAgICAgJ8jIyMjB8CTIyMjHYNeIyMjFsCBIeMjIyMEgICXYyMjIwnAgICAgIcjIyMjIyMjIx4AgICAgICAgICAgICAgICZoyMjIw1AnWMjIxQAi6MjIyMMQJvjIyMjCsCAjqMjIyMRwICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkqMjIyMSRuMjIyMLgICVIyMjH4RWYyMjIw+AgIXiIyMjH8KAgICAgICAgICAgICAgICAgICAgICAgICAgICAgI2jIyMjGY9jIyMggYCAgl2jIyMXj+MjIyMWAICAlmMjIyMUQICAgICAgICAgICAgICAgICAgICAgICAgICAgICIYyMjIx8Z4yMjGECAgICKIuMjIxZjIyMjG8CAgIchYyMjIw8AgICAgICAgICAgICAgICAgICAgICAgICAgICAgWHjIyMjImMjIw5AgICAgJOjIyMiYyMjIyGBAICAjyMjIyMjFMMAgICAgICAgIBMGwYAgICAgICAgICAgICAgICcIyMjIyMjIyLFAICAgICB3SMjIyMjIyMjCACAgICXYyMjIyMgUstFgYJGTFNeYyMMwICAgICAgICAgICAgICAlmMjIyMjIyMbAICAgICAgIkioyMjIyMjIw1AgICAgRdjIyMjIyMjIyMjIyMjIyMjE0CAgICAgICAgICAgICAgI/jIyMjIyMjEQCAgICAgICAkiMjIyMjIyMSQICAgICAEGFjIyMjIyMjIyMjIyMjIxrAgICAgICAgICAgICAgICLIyMjIyMjIwjAgICAgICAgIGcoyMjIyMjGUCAgICAgICGliHjIyMjIyMjIyMjIx/TAICAgICAgICAgICAgICAhKMjIyMjIx6AAICAgICAgICAiKIjIyMjIx7AgICAgICAgICDjdWa32FiIBzYEMmBAICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" }, { "Name": "StartPage", "Description": "The world's most private search engine", "Alias": "", "Method": "GET", "URLTemplate": "https://www.startpage.com/sp/search?query={searchTerms}&cat=web&pl=opensearch", "IconURL": "data:image/png;base64,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" }, { "Name": "Mojeek", "Description": "The world's alternative search engine", "Alias": "", "Method": "GET", "URLTemplate": "https://www.mojeek.com/search?q={searchTerms}", "IconURL": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAIAAAD8GO2jAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAA8pJREFUeNrsVk1vG0UY3tnvtb3+SJpgO01cmkQKUhURqBCC8iE+EoSKED1QBBUKB0r7AzjwB+BSUX4AXDkhFATHCJAKKpSegDZqRVFpGtLETmI72fV+zvDsDnV2VwUu4ZY52KN55n2feZ953rEJY0z4PwfZJ9gn2EOCle7StY2Lf3ave6EzYNRnai80ytNYv7F5+ee1xXXrD8bCoXzjsdFXa+YkD7m+8cNS88K6dTMIPVMbmK7OTt/37D0I2s7qZ1feRyI3tEUiEYGELNCk3Nzk2Q17+cfbCyH1JSJjd8C8vFKef+j8oDHy+dUPlprfURZGIYRQGlKBPnXo1MtT72YJtr2ND78/aftdviSLKj6ZQP3QxUSRdCEqkyFRxEG9onZAEpWWdUuTczQWQCRiHMIcf/vNmXMPVmf7BBFgqoOPjp7oBd1qYXykOIXUEbMgqpKB7H7oYIJcPnVjem3H22o7a1iBmJpsaJLBIZQO4ku3F5IVyPzrkYOvDOcPQ0Gc4qOLr7fsZYkomEOB2Yl3jtaPEyIu3vj40sqCIuooBRBknJs4c3TkJcbo4u+f/LTyBSAZldm3nGBHlwspgopeq9Rq8ZThjJEkRPBC+4nGG8+Pn+Z7ZifO/LL+NQpCcYCebJx6bvxtDs1NnP117RufOigDGqIgXSjsSpQcvWDb9tvQFELpsvn42Mk+pMo6bp6iKoEacvFY47VdSNJ1OY9ScD6oqop66g6Sw/a3ncCCICENhnJjg7mDfcjxLS/sifAYoPwYrLwLBRYciGyQtKBWcD3/SGB5W14kAsHWslHFJA31BBJlKWrDQgLa8TbdwI7MymgpDWUJsBWuj+1Li9pQEoKboS/hkJ6G3BaHwF0xakkoS9B1W9jETV1KE3TdZkjvDXXcJo0uIPbLfxE0/+5AQkr6cCqLsx4lj/2egeIo3nFSWa/+K4HTRGq+1dQOZAj4lYiinFXPbcUQQ6MV01FZAggNm0MERdRMdSBzTBLZF42iovnT1ugQ/lowyrViAks1WtIq0cPCqCLnc2q5v44A3H/UHwz9UcgnIAx09V1dxa+una8YdUMxTzzwXrYCj/YsPzoLFRiyGLLZh+BCy2uT6JGghlJAfDKwolc5h0yU5c7VyytfXln71vY7WQLb67R7q8gFDBKhPxOVbW45dzwOSbqS6FWMh+sv4kF0AwuPBErE/eE1XN35LSsRxH36/nnoEfdqI9kvSPrM4bdI3MbDhUMZYUdLR+Znzl24+SkeWkMp1s3JqaFjY6Uje/+TyX9/9v9V7BPs7fhLgAEAm6sRCKh1afsAAAAASUVORK5CYII=" } ] }, "SupportMenu": { "Title": "LibreWolf Issue Tracker", "URL": "https://codeberg.org/librewolf/issues" } } } 0707010000000D000041ED0000000000000000000000026701641700000000000000000000000000000000000000000000001500000000settings-master/docs0707010000000E000081A4000000000000000000000001670164170000AAFB000000000000000000000000000000000000002200000000settings-master/docs/ChangeLog.mdThis changelog will be used from now on to document changes in a precise manner, with a list of changes for each setting version. Setting versions are documented using the pref `librewolf.cfg.version`, available in about:config. # 8.5 * Explicitly disable weather feed in new tab page (ticket #2048) * Handle google safebrowsing stuff, ticket #1879 # 8.4 Changes to librewolf.cfg: DoH: * Disable DoH by default. The short of it is that we can't decide for the user which DoH server is best to use. * Provide much better default for when DoH is enabled. Mostly contributed by @Acideburn. Other: * [#69](https://codeberg.org/librewolf/settings/pulls/69) - DNS-over-HTTPS breaks IPv6 preference * [#71](https://codeberg.org/librewolf/settings/pulls/71) - initial ML setup To policies.json: * Remove the DNSoverHTTP stuff from there as per Acideburn's find. We now disable it more visibly from the config file instead. # 8.3 * Enable DoH by default, this caused unanticipated problems. * First version by @threadpanic, at Arkenfox v119, ships with LibreWolf v113.0-3. # 8.2 - v7.10 was the last version by @fxbrit, at Arkenfox v119. This version ships with LibreWolf v113.0-1. # 7.10 **base librewolf version**: 122.x **References**: - Disabled the new Fakespot shopping sidebar #### Added preferences ```js defaultPref("browser.shopping.experience2023.optedIn", 2); defaultPref("browser.shopping.experience2023.active", false); ``` # 7.9 **base librewolf version**: 121.x **References**: - Added 4get.ca to the list of default search engines - https://codeberg.org/librewolf/issues/issues/1711 - Added default list of DoH providers containing Cloudflare and Quad9 - https://codeberg.org/librewolf/issues/issues/1683 #### Added preferences ```js pref("doh-rollout.provider-list", '[{"UIName":"Mozilla Cloudflare","uri":"https://mozilla.cloudflare-dns.com/dns-query"},{"UIName":"Quad9","uri":"https://dns.quad9.net/dns-query"}]'); ``` # 7.8 **base librewolf version**: 119.x - 120.x #### Changed preferences ```diff -lockPref("security.family_safety.mode", 0); // disable win8.1 family safety cert +lockPref("security.family_safety.mode", 2); // Remove pre-Win10-specific codepath ``` #### Added preferences ```js defaultPref("network.dns.skipTRR-when-parental-control-enabled", false); // Arkenfox user.js v117 defaultPref("browser.search.separatePrivateDefault", true); // [FF70+] // Arkenfox user.js v119 defaultPref("browser.search.separatePrivateDefault.ui.enabled", true); // [FF71+] // Arkenfox user.js v119 defaultPref("browser.urlbar.suggest.mdn", true); defaultPref("browser.urlbar.addons.featureGate", false); defaultPref("browser.urlbar.mdn.featureGate", false); defaultPref("browser.urlbar.pocket.featureGate", false); defaultPref("browser.urlbar.trending.featureGate", false); defaultPref("browser.urlbar.weather.featureGate", false); defaultPref("browser.download.start_downloads_in_tmp_dir", true); // Arkenfox user.js v118 defaultPref("browser.shopping.experience2023.enabled", false); // Arkenfox user.js v118 ``` # 7.7 **base librewolf version**: 115.x - 118.x **References**: - https://gitlab.com/librewolf-community/settings/-/issues/262 #### Added preferences ``` defaultPref("browser.urlbar.suggest.weather", false); defaultPref("extensions.quarantinedDomains.enabled", false); ``` # 7.6 **base librewolf version**: 111.x - 114.x **References**: - the prefs added in the `LOGGING` section are off by default in the official Mozilla builds, so we are just acting like Firefox here; #### Removed preferences ``` defaultPref("browser.contentblocking.report.monitor.enabled", false); // default ``` #### Changed preferences ``` defaultPref("app.support.baseURL", "https://support.librewolf.net/"); ``` #### Added preferences ``` pref("browser.dom.window.dump.enabled", false); pref("devtools.console.stdout.chrome", false); ``` # 7.5 **target commit**: from 71a20c6fff90e7fbcb216f1d644ca1b40b32b8e2 to 6fe09c63cbfb83ebfb6a17f5e624248f2501b97e **base librewolf version**: 109.x and 110.x **References**: - thumbnails are only used in privileged code to populate New Tab Page and Ctrl+Tab previews. - the startup blank window doesn't break anything and the perceived performance boost is irrelevant on modern hardware. - reset popup events to default as it's mostly a non-issue. #### Removed preferences ``` defaultPref("browser.pagethumbnails.capturing_disabled", true); defaultPref("browser.startup.blankWindow", false); defaultPref("dom.popup_allowed_events", "click dblclick mousedown pointerdown"); ``` # 7.4 **target commit**: b0d277a77b36e3bcc5c0f7a1b0eca7a54a388d9d **base librewolf version**: 108.x **References**: - win7/8.x don't need this pref thanks to Firefox's own implementation of mDNS. #### Removed preferences ``` defaultPref("media.peerconnection.ice.no_host", true); // don't use any private IPs for ICE candidate ``` # 7.3 **target commit**: from 9395f5c0e061250acbcbcb523d2270d57136d411 to 240e184b785e4e46c09ca6881111f7c2d4d31a3f **base librewolf version**: 107.x **References**: - mixed content is already covered by HTTPS-only-mode; - [dom.disable_beforeunload is no longer necessary](https://github.com/arkenfox/user.js/issues/1575); - [beacon API is fine](https://gitlab.com/librewolf-community/settings/-/issues/229); - [Firefox Vew pref was removed in previous commit](https://gitlab.com/librewolf-community/settings/-/commit/9395f5c0e061250acbcbcb523d2270d57136d411), adding reference to the changelog; #### Removed preferences ``` defaultPref("security.mixed_content.block_display_content", true); // block insecure passive content defaultPref("dom.disable_beforeunload", true); defaultPref("dom.disable_open_during_load", true); // default defaultPref("browser.tabs.firefox-view", false); pref("beacon.enabled", false); ``` # 7.2 **target commit**: from 7211e954b82da3cde5c5cf2d613fe1f84288e635 to eb51b4785e5b67fc388bcbd06a8324d5a54f5850 **base librewolf version**: 106.x **References**: - hide Firefox View til reviewed, see https://gitlab.com/librewolf-community/browser/source/-/issues/78; - hotfix for syntax error; #### Removed preferences ``` defaultPref("browser.ssl_override_behavior", 1); // deprecated ``` #### Added preferences ``` defaultPref("browser.tabs.firefox-view", false); ``` # 7.1 **target commit**: 33e1ec1cb97d1f16a696057fe9007ae8391def6b **base librewolf version**: 106.x **References**: - change most `lockPref()` to `pref()` or `defaultPref()`, see https://gitlab.com/librewolf-community/settings/-/issues/204; - offline autodetection is mature enough and it is used by some APIs; - if someone wants to get the mozilla extension for USB debugging, that's fine. #### Removed preferences ``` defaultPref("network.manage-offline-status", false); defaultPref("devtools.remote.adb.extensionURL", ""); defaultPref("devtools.chrome.enabled", false); // default ``` # 7.0 **target commit**: from ed9334d258d20830deafe1a02b87b0cea678236d to 1bdfd333e31c3d119c0bf5506a56b2026ead3583 **base librewolf version**: 105.x **References**: - [enable APS](https://github.com/arkenfox/user.js/issues/1530#issuecomment-1242850653); - trim unnecessary or default NTP prefs, then tidy existing ones; - stick to default session restore interval for writes; - remove a bunch of default prefs that have been that way for the longest; - offer accessibility by default; - remove hardcore svg security pref since CVEs are very old and irrelevant, see [this discussion](https://github.com/arkenfox/user.js/issues/1529); - improve [autoplay behavior](https://gitlab.com/librewolf-community/settings/-/issues/213). #### Added preferences ``` defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage", true); defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", false); ``` #### Removed preferences ``` defaultPref("browser.newtab.preload", false); lockPref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false); lockPref("browser.newtabpage.activity-stream.discoverystream.enabled", false); lockPref("browser.newtabpage.activity-stream.feeds.snippets", false); // default lockPref("browser.newtabpage.activity-stream.feeds.system.topstories", false); defaultPref("browser.sessionstore.interval", 60000); // increase time between session saves defaultPref("network.http.windows-sso.enabled", false); // default defaultPref("privacy.partition.serviceWorkers", true); // default v105+ defaultPref("accessibility.force_disabled", 1); // block accessibility services lockPref("toolkit.telemetry.shutdownPingSender.enabledFirstSession", false); // default lockPref("toolkit.telemetry.reportingpolicy.firstRun", false); // default defaultPref("network.http.referer.XOriginPolicy", 0); // default lockPref("browser.safebrowsing.passwords.enabled", false); // default lockPref("browser.safebrowsing.provider.google4.dataSharing.enabled", false); // default defaultPref("gfx.font_rendering.opentype_svg.enabled", false); // disale svg opentype fonts defaultPref("media.autoplay.blocking_policy", 2); ``` # 6.9 **target commit**: 49a705f835e1438372fbdf1a779fbc5846212a68 **base librewolf version**: 104.x **References**: - autofill prefs have been replaced in a migration, we now only keep the bare minimum; #### Removed preferences ``` defaultPref("browser.fixup.alternate.enabled", false); // default v104+ defaultPref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0); // default v104+ defaultPref("extensions.formautofill.available", "off"); // deprecated defaultPref("extensions.formautofill.creditCards.available", false); // deprecated defaultPref("extensions.formautofill.heuristics.enabled", false); ``` # 6.8 **target commit**: 381cbed42c98d2376faf7e4ec449623bb99b0be1 **base librewolf version**: 103.x **References**: - [geoclue](https://github.com/arkenfox/user.js/issues/1504); #### Added preferences ``` defaultPref("geo.provider.use_geoclue", false); // [LINUX] ``` #### Removed preferences ``` defaultPref("network.cookie.cookieBehavior", 5); // default ``` # 6.7 **target commit**: from e505ddbf0242aec1017a565a74ff9ff5aa458fe5 to 02212c3f44e7aa68b22c8febd9158580d7e4b74f **base librewolf version**: 103.x **References**: - the cookie lifetime policy pref has been deprecated, see https://gitlab.com/librewolf-community/settings/-/issues/199; - stop disabling IPv6, see https://gitlab.com/librewolf-community/settings/-/issues/96; - discussion about domain guessing is available at https://gitlab.com/librewolf-community/settings/-/issues/197. #### Removed preferences ``` defaultPref("network.cookie.lifetimePolicy", 2); // deprecated defaultPref("network.dns.disableIPv6", true); ``` #### Unlocked preferences ``` defaultPref("browser.fixup.alternate.enabled", false); // default v104+ ``` # 6.6 **target commit**: from bc16f4f14185e8791d819a69b7d798082ace67f8 to c983fcc8bea8fab31265bc345217b59ce5128de2 **base librewolf version**: 102.x **References**: - sha1 certificates: https://bugzilla.mozilla.org/1767489 and https://bugzilla.mozilla.org/1766687. - trimming only applies to http websites so it's very minimal. - crlite: https://bugzilla.mozilla.org/show_bug.cgi?id=1773371, we can stick to default 3 till v103, then the value will be changed to 2 which is the best possible if mozilla feels like it's ready usability wise. - add more entries to the native query stripping list, to [get in line with brave](https://github.com/brave/brave-core/blob/master/browser/net/brave_site_hacks_network_delegate_helper.cc). - `services.settings.server` can now be used as a pref, see: https://gitlab.com/librewolf-community/browser/source/-/merge_requests/37 #### Added preferences ``` defaultPref("services.settings.server", "https://%.invalid") // set the remote settings URL (REMOTE_SETTINGS_SERVER_URL in the code) ``` #### Removed preferences ``` defaultPref("security.pki.sha1_enforcement_level", 1); // default defaultPref("browser.urlbar.trimURLs", false); defaultPref("security.pki.crlite_mode", 3); // default defaultPref("security.OCSP.enabled", 1); // default ``` #### Changed preferences ``` defaultPref("privacy.query_stripping.strip_list", "__hsfp __hssc __hstc __s _hsenc _openstat dclid fbclid gbraid gclid hsCtaTracking igshid mc_eid ml_subscriber ml_subscriber_hash msclkid oft_c oft_ck oft_d oft_id oft_ids oft_k oft_lk oft_sk oly_anon_id oly_enc_id rb_clickid s_cid twclid vero_conv vero_id wbraid wickedid yclid"); ``` # 6.5 **target commit**: b10dcbdd84e63787c4f2f6d34d41724b437df5be **base librewolf version**: 101.x **References**: - query stripping is now [part of strict mode](https://hg.mozilla.org/mozilla-central/rev/9d9425eb1ded). - session cookie prefs are useless given that we sanitize on close, [more details at arkenfox](https://github.com/arkenfox/user.js/pull/1443/commits/3207478033fefc19e933dab4eef6445125341ec4). - fission has been a default for the longest now. #### Removed preferences ``` defaultPref("privacy.query_stripping.enabled", true); defaultPref("network.cookie.thirdparty.sessionOnly", true); defaultPref("network.cookie.thirdparty.nonsecureSessionOnly", true); defaultPref("fission.autostart", true); ``` # 6.4 **target commit**: eea09ca07333dc166213fa9c873e4916d979e97f **base librewolf version**: 100.x **References**: - hide Firefox Focus promo in private tabs. - double checking revoked certificates with both CRL and OCSP allows to detect false positives and it is also [the default](https://hg.mozilla.org/mozilla-central/rev/a6ba7b4ee17). - [clearOnShutdown prefs now respect exceptions](https://github.com/arkenfox/user.js/issues/1441) so we can tick all boxes in that UI as well. #### Added preferences ``` lockPref("browser.promo.focus.enabled", false); defaultPref("privacy.clearOnShutdown.offlineApps", true); ``` #### Changed preferences ``` defaultPref("security.pki.crlite_mode", 3); // prev 2 ``` #### Removed preferences ``` defaultPref("privacy.clearOnShutdown.cookies", false); ``` # 6.3 **target commit**: e84fc950bfd7c3542cb974e9d545b9b8e18c010d **base librewolf version**: 99.x **References**: - Fixes the uBlock Origin installation URL # 6.2 **target commit**: ac95f5195ed82ca6bcec48acf9d1241e3c683b25 **base librewolf version**: 99.x **References**: - vpn pref was set to the wrong value by mistake. - offscreencanvas cannot be read back using JS, plus it is being tracked upstream. see [this comment](https://github.com/arkenfox/user.js/issues/1418#issuecomment-1093390017), which solves doubts from 6.1 changelog. #### Removed preferences ``` defaultPref("gfx.offscreencanvas.domain-enabled", false); ``` #### Changed preferences ``` lockPref("browser.vpn_promo.enabled", false); ``` # 6.1 **target commit**: 465257e5993893cd7896ef1533d37e245f206fb9 **base librewolf version**: 99.x **References**: - csp pref has been deprecated. - quicksuggest prefs are redundant as it has a master switch. the master switch is now force applied on each restart of the browser. - do not whitelist offscreencanvas for now, we need to first check how it is tied to the "normal" canvas. **Notes**: using the vpn pref should allow us to get rid of one patch. #### Added preferences ``` lockPref("browser.vpn_promo.enabled", true); defaultPref("gfx.offscreencanvas.domain-enabled", false); ``` #### Removed preferences ``` lockPref("security.csp.enable", true); // enforce csp, default lockPref("browser.urlbar.suggest.quicksuggest.nonsponsored", false); lockPref("browser.urlbar.suggest.quicksuggest.sponsored", false); lockPref("browser.urlbar.quicksuggest.dataCollection.enabled", false); // default lockPref("browser.urlbar.quicksuggest.scenario", "history"); ``` #### Changed preferences ``` pref("browser.urlbar.quicksuggest.enabled", false); ``` # 6.0 **target commit**: 0822d491d2b377b5cd7f0429cee5aa916538fa50 **base librewolf version**: 98.x **References**: - we are going to force history to custom mode and hide the UI for always on PB mode, a bunch of pointers are collected in [this MR](https://gitlab.com/librewolf-community/browser/source/-/merge_requests/21). - [handlers prefs are deprecated](https://bugzilla.mozilla.org/show_bug.cgi?id=1733497). - for OCSP see [this issue](https://gitlab.com/librewolf-community/settings/-/issues/150). #### Added preferences ``` pref("privacy.history.custom", true); pref("browser.privatebrowsing.autostart", false); defaultPref("browser.preferences.moreFromMozilla", false); // hide about:preferences#moreFromMozilla defaultPref("security.OCSP.require", true); // set to hard-fail ``` #### Removed preferences ``` /** [SECTION] HANDLERS * remove the default handlers for several tipe of files and services. */ lockPref("gecko.handlerService.schemes.mailto.0.uriTemplate", ""); lockPref("gecko.handlerService.schemes.mailto.0.name", ""); lockPref("gecko.handlerService.schemes.mailto.1.uriTemplate", ""); lockPref("gecko.handlerService.schemes.mailto.1.name", ""); lockPref("gecko.handlerService.schemes.irc.0.uriTemplate", ""); lockPref("gecko.handlerService.schemes.irc.0.name", ""); lockPref("gecko.handlerService.schemes.ircs.0.uriTemplate", ""); lockPref("gecko.handlerService.schemes.ircs.0.name", ""); ``` #### Changed preferences ``` defaultPref("security.OCSP.enabled", 1); ``` # 5.5 **target commit**: 0fc1ff53c99379d9d4625de65ea51287d57a0a3a **base librewolf version**: 97.x **References**: - showing the insecure connection text is redundant as there's already the lock UI for http websites. - `browser.places.speculativeConnect.enabled` controls speculative connections for bookmarks and will be fully effective only once we hit v98. - we will no longer disable history but we'll clear it on close. [reasoning](https://gitlab.com/librewolf-community/settings/-/issues/135). - [download annoyances](https://gitlab.com/librewolf-community/settings/-/issues/144). **Notes**: the settings have been re-organized and they should also be documented a bit better now. #### Removed preferences ``` defaultPref("security.insecure_connection_text.enabled", true); // display http websites as insecure in the ui defaultPref("places.history.enabled", true); ``` #### Added preferences ``` defaultPref("browser.places.speculativeConnect.enabled", false); defaultPref("browser.download.alwaysOpenPanel", false); // do not expand toolbar menu for every download, we already have enough interaction ``` #### Changed preferences ``` pref("security.tls.version.enable-deprecated", false); // make TLS downgrades session only by enforcing it with pref() ``` ## 5.4 **target commit**: **base librewolf version**: 96.x **References**: - [serve custom uBO assets](https://gitlab.com/librewolf-community/settings/-/issues/134) #### Added preferences ``` defaultPref("librewolf.uBO.assetsBootstrapLocation", "https://gitlab.com/librewolf-community/browser/source/-/raw/main/assets/uBOAssets.json"); ``` #### Changed preferences ``` defaultPref("privacy.query_stripping.strip_list", "__hsfp __hssc __hstc __s _hsenc _openstat dclid fbclid gbraid gclid hsCtaTracking igshid mc_eid ml_subscriber ml_subscriber_hash msclkid oly_anon_id oly_enc_id rb_clickid s_cid twclid vero_conv vero_id wbraid wickedid yclid"); ``` ## 5.3 **target commit**: c256656f377d3c15a8c7537c65f45dc802904df7 **base librewolf version**: 96.x **References**: - [disable sync differently](https://gitlab.com/librewolf-community/settings/-/issues/132); - [remove tracking query params](https://gitlab.com/librewolf-community/settings/-/issues/128); #### Added preferences ``` defaultPref("identity.fxaccounts.enabled", false); // sync and firefox account defaultPref("privacy.query_stripping.enabled", true); defaultPref("privacy.query_stripping.strip_list", "__hsfp __hssc __hstc __s _hsenc _openstat dclid fbclid gclid hsCtaTracking igshid mc_eid ml_subscriber ml_subscriber_hash msclkid oly_anon_id oly_enc_id rb_clickid s_cid vero_conv vero_id wickedid yclid"); ``` ## 5.2 **target commit**: f3b4414d30953d1ea3eb64a9d75c62c242ee991b **base librewolf version**: 96.x **References**: - [fix console issue](https://gitlab.com/librewolf-community/settings/-/issues/129) #### Added preferences ``` defaultPref("devtools.selfxss.count", 0); ``` ## 5.1 **target commit**: f28b218e97acec8935c0c868863a9f4b6a061a39 and 60221803c46bf5cf2cbc5d77035927f9fd249e6a **base librewolf version**: 96.x **References**: - [fix language issue](https://gitlab.com/librewolf-community/settings/-/issues/125) #### Added preferences ``` pref("intl.accept_languages", "en-US, en"); ``` #### Removed preferences ``` defaultPref("intl.locale.requested", "en-US"); defaultPref("privacy.spoof_english", 2); defaultPref("browser.search.region", "US"); // set a default search region for all users defaultPref("extensions.getAddons.langpacks.url", ""); // prevent users from adding lang packs, which would cause leaks ``` #### Changed preferences ``` pref("javascript.use_us_english_locale", true); ``` ## 5.0 **target commit**: from 8a98176400e2e44ae1138ea8bdc1991250f75b8e to b219a75b4a0d72b519ce386406f45acead940c9a **base librewolf version**: 96.x **References**: - [extension auto-updates](https://gitlab.com/librewolf-community/settings/-/issues/116) - [remove all the OS specific prefs](https://gitlab.com/librewolf-community/settings/-/issues/124) - [service workers and push](https://gitlab.com/librewolf-community/settings/-/issues/115) #### Added preferences ``` defaultPref("privacy.partition.serviceWorkers", true); // isolate service workers ``` #### Removed preferences ``` defaultPref("extensions.update.enabled", false); // disable automatic checks for extension updates defaultPref("extensions.update.autoUpdateDefault", false); // disable automatic installs of extension updates defaultPref("browser.tabs.loadBookmarksInTabs", true); defaultPref("clipboard.autocopy", false); defaultPref("dom.popup_maximum", 4); defaultPref("general.autoScroll", false); defaultPref("devtools.selfxss.count", 0); // was set because of https://gitlab.com/librewolf-community/browser/linux/-/issues/80 defaultPref("dom.push.enabled", false); // disable push notifications defaultPref("dom.push.serverURL", ""); // default "wss://push.services.mozilla.com/" defaultPref("dom.serviceWorkers.enabled", false); // disable service workers, must enable for push notifications ``` ## 4.0 **target commit**: 9003f029f8fe087cde5bb081d51ab82340948874 **base librewolf version**: 95.x **References**: - [review webrtc](https://gitlab.com/librewolf-community/settings/-/issues/108). - [stop disabling geo api](https://gitlab.com/librewolf-community/settings/-/issues/102). - [deprecate RFP dark mode](https://gitlab.com/librewolf-community/browser/common/-/issues/56). - `offlineApps` change in 3.1 did not respect exceptions, so revert it. - uncomment prefs to enable CRL without OCSP fallback, although they will fully work only when [this issue is closed](https://gitlab.com/librewolf-community/browser/common/-/issues/57). - we decided to force a larger new window size by default, to improve usability for RFP users while still keeping a rounded value. see [this comment](https://gitlab.com/librewolf-community/settings/-/issues/104#note_752186737). #### Added preferences ``` defaultPref("privacy.window.maxInnerWidth", 1600); defaultPref("privacy.window.maxInnerHeight", 900); ``` #### Removed preferences ``` defaultPref("media.peerconnection.enabled", false); lockPref("privacy.override_rfp_for_color_scheme", false); defaultPref("geo.enabled", false); defaultPref("permissions.default.geo", 2); defaultPref("privacy.clearOnShutdown.offlineApps", true); defaultPref("privacy.cpd.offlineApps", true); ``` #### Changed preferences ``` defaultPref("security.remote_settings.crlite_filters.enabled", true); defaultPref("security.pki.crlite_mode", 2); ``` ## 3.2 **target commit**: 19e59813ed483de7ffc8a219da96eb18a942eb01 **base librewolf version**: 94.x **References**: - block the new firefox suggests feature in full. - enforce a sane value for manual sanitizing. **Notes**: the suggest prefs might be overkill, we should try to trim to the bare minimum in the next release. #### Added preferences ``` lockPref("browser.urlbar.quicksuggest.enabled", false); // disable suggest and hide its ui lockPref("browser.urlbar.suggest.quicksuggest.nonsponsored", false); // disable suggestions from firefox lockPref("browser.urlbar.suggest.quicksuggest.sponsored", false); // disable sponsored suggestions lockPref("browser.urlbar.quicksuggest.dataCollection.enabled", false); // default defaultPref("privacy.sanitize.timeSpan", 0); ``` #### Changed preferences ``` lockPref("browser.urlbar.quicksuggest.scenario", "history"); // prevent opt-in, doesn't work alone ``` ## 3.1 **target commit**: 6844d4ad1c9ad8bb3ffdc29e0a607c21c0559da4 and 67e6a00b719ecd52782a724cd09a9f08fa4577c0 **base librewolf version**: 94.x **References**: - the added prefs are all defense in depth. - `drawInTitlebar` was causing errors for some users, the bug was reproduced. Linux users might experience a different toolbar behavior because of this change. - the default value for scopes seems like a better choice than changing it. - `offlineApps` can be safely cleared without using logins, in fact it was most likely cleared by other sanitazion techniques regardless. **Notes**: please notify users about the new website, thanks to @maltejur for helping with the migration. #### Added preferences ``` defaultPref("webchannel.allowObject.urlWhitelist", ""); // remove webchannel whitelist lockPref("toolkit.telemetry.coverage.opt-out", true); // hidden defaultPref("privacy.cpd.offlineApps", true); // for consistency with clearOnShutdown prefs ``` #### Removed preferences ``` defaultPref("extensions.autoDisableScopes", 11); // bring back to default defaultPref("browser.tabs.drawInTitlebar", true); // bring back to default ``` #### Changed preferences ``` defaultPref("privacy.clearOnShutdown.offlineApps", true); // can be cleared defaultPref("app.support.baseURL", "https://librewolf.net/docs/faq/#"); defaultPref("browser.search.searchEnginesURL", "https://librewolf.net/docs/faq/#how-do-i-add-a-search-engine"); defaultPref("browser.geolocation.warning.infoURL", "https://librewolf.net/docs/faq/#how-do-i-enable-location-aware-browsing"); defaultPref("app.feedback.baseURL", "https://librewolf.net/#questions"); ``` ## 3.0 **target commit**: f0a2d5d70657cc87348282d6faaf72edff8bf304 and 4e0895a299ec99066f119d8ce1a2923fc91aa465 **base librewolf version**: 94.x **References**: - as reported in #95 and discussed [here](https://gitlab.com/librewolf-community/browser/linux/-/issues/246) we are re-enabling TP by default, setting it to strict. - the sponsored shortcuts in about:preferences#home were already locked, now they are properly hidden. - enable fission as it is being [rolled out to stable](https://bugzilla.mozilla.org/show_bug.cgi?id=1732206). **Notes**: all the removed preferences were either related to disabling TP, or unecessary when using strict mode. as a result of this trimming the tracking protection section of the .cfg file doesn't need to exist anymore. #### Added preferences ``` defaultPref("browser.topsites.useRemoteSetting", false); // hide sponsored shortcuts button from about:preferences#home defaultPref("privacy.resistFingerprinting.letterboxing", false); // expose hidden letterboxing pref, but do not enable by default defaultPref("fission.autostart", true); // enable fission by default ``` #### Removed preferences ``` lockPref("privacy.trackingprotection.enabled", false); lockPref("privacy.trackingprotection.pbmode.enabled", false); lockPref("privacy.trackingprotection.annotate_channels", false); defaultPref("browser.safebrowsing.provider.mozilla.updateURL", ""); defaultPref("browser.safebrowsing.provider.mozilla.gethashURL", ""); defaultPref("privacy.trackingprotection.cryptomining.enabled", false); defaultPref("privacy.trackingprotection.fingerprinting.enabled", false); defaultPref("browser.contentblocking.cryptomining.preferences.ui.enabled", false); defaultPref("browser.contentblocking.fingerprinting.preferences.ui.enabled", false); ``` #### Changed preferences ``` pref("browser.contentblocking.category", "strict"); ``` ## 2.0 **target commit**: from 6451faa167568313e5ed065fcb3ee2bb76132063 to b17a1ed657e22ac61b4399699223d36724b842e7 **base librewolf version**: 92.x **References**: - [web content can no longer access the battery api](https://bugzilla.mozilla.org/show_bug.cgi?id=1313580). - http alternative services are [isolated by network partitioning and FPI](https://github.com/arkenfox/user.js/blob/269cf965bd51022ca69823f8f66a8e402280d856/user.js#L1350) and they are unchanged even in tor browser. from a security standpoint, the alternate service will need to provide the certificate of the origin in order to be considered trusthworthy. - let the user decide what to manually clear, including the timespan. - drm prefs have been trimmed as a quality of life improvement. the end result is the same, with less hassle for users who want to access drm-protected content. - DNT header has been proved to not work and it is used to fingerprint. - VR access is behind a prompt and, despite being unlikely, it could be fingerprinted. with all this on the table it's just not worth and overkill. - vibrator API is so nieche that even tor does not change it. best to trim where possible. - `extensions.getAddons.link.url"` is showed only when no extension is installed and it's not a bad suggestion to get addons from addons.mozilla.org so we can remove it. - `browser.safebrowsing.downloads.remote.*` are all controlled by the prefs already in the .cfg, which is the same approach taken by tor browser. - graphite [is no longer as concerning](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+graphite) and blocking it is likely fingerprintable. - the pdf prefs and the bookmark backup are not really relevant to librewolf. - as reported [here](https://bugzilla.mozilla.org/show_bug.cgi?id=1606624) the shared memory pref is no longer needed, so we can switch it back to default. - new tab page section now includes a new design and no longer an empty page. all the unnecessary preferences have been removed and users can also customize as the most essential ones have been unlocked. - UI bug in tracking protection section is fixed. - a bunch of dead links are fixed. - for screensharing see [testing provided at this link](https://github.com/arkenfox/user.js/issues/1245) - disable new firefox suggests feature **Notes** Recent changes in the category `MISC > set librewolf support and releases urls` require to create a couple header for the landing page. #### Removed preferences ``` defaultPref("general.warnOnAboutConfig", false); // deprecated defaultPref("dom.battery.enabled", false); lockPref("network.http.altsvc.enabled", false); lockPref("network.http.altsvc.oe", false); lockPref("signon.storeWhenAutocompleteOff", false); // we do not suggest lockwise in the first place defaultPref("signon.management.page.breach-alerts.enabled", false); // no harm for lockwise users defaultPref("signon.management.page.breachAlertUrl", ""); // no harm for lockwise users defaultPref("privacy.history.custom", true); // redundant defaultPref("privacy.cpd.cookies", false); defaultPref("privacy.cpd.offlineApps", false); // default defaultPref("privacy.sanitize.timeSpan", 0); defaultPref("media.gmp-widevinecdm.visible", false); defaultPref("media.gmp-widevinecdm.enabled", false); defaultPref("privacy.donottrackheader.enabled", true); defaultPref("dom.vr.enabled", false); defaultPref("dom.vibrator.enabled", false); defaultPref("dom.push.connection.enabled", false); // redundant defaultPref("dom.security.https_only_mode_pbm", true); // redundant defaultPref("security.tls.version.fallback-limit", 3); // default is for, no need to enforce further lockPref("extensions.webextensions.identity.redirectDomain", ""); // outdated and unchanged even in tor defaultPref("extensions.getAddons.link.url", ""); // https://addons.mozilla.org/%LOCALE%/firefox/ defaultPref("extensions.getAddons.get.url", ""); // redundant lockPref("extensions.getAddons.discovery.api_url", ""); // redundant lockPref("webextensions.storage.sync.serverURL", ""); // sync not supported lockPref("extensions.webservice.discoverURL", ""); // deprecated defaultPref("xpinstall.signatures.devInfoURL", ""); // link to wiki page lockPref("app.normandy.user_id", ""); // redundant lockPref("app.normandy.shieldLearnMoreUrl", ""); // redundant lockPref("security.mixed_content.block_active_content", true); // default defaultPref("security.insecure_connection_text.pbmode.enabled", true); // redundant lockPref("browser.safebrowsing.downloads.remote.block_dangerous", false); lockPref("browser.safebrowsing.downloads.remote.block_dangerous_host", false); lockPref("gfx.font_rendering.graphite.enabled", false); // consider removing defaultPref("pdfjs.previousHandler.alwaysAskBeforeHandling", true); defaultPref("pdfjs.enabledCache.state", false); lockPref("remote.enabled", false); // removed in FF90 lockPref("browser.shell.didSkipDefaultBrowserCheckOnFirstRun", true); // redundant defaultPref("browser.bookmarks.max_backups", 2); defaultPref("devtools.performance.recording.ui-base-url", "http://localhost:55555"); // unharmful defaultPref("devtools.devices.url", ""); // unharmful lockPref("media.decoder-doctor.new-issue-endpoint", ""); // redundant lockPref("identity.sync.tokenserver.uri", ""); // redundant defaultPref("accessibility.support.url", ""); // redundant lockPref("browser.dictionaries.download.url", ""); // dictionaries are hidden already lockPref("browser.uitour.themeOrigin", ""); // redundant lockPref("toolkit.datacollection.infoURL", ""); // redundant lockPref("identity.mobilepromo.android", ""); // redundant lockPref("identity.mobilepromo.ios", ""); // redundant defaultPref("identity.sendtabpromo.url", ""); // redundant lockPref("datareporting.healthreport.infoURL", ""); // redundant lockPref("browser.chrome.errorReporter.infoURL", ""); // redundant lockPref("datareporting.policy.firstRunURL", ""); // redundant lockPref("javascript.options.shared_memory", false); lockPref("app.update.staging.enabled", false); // not relevant lockPref("app.update.lastUpdateTime.telemetry_modules_ping", 0); // redundant lockPref("network.connectivity-service.IPv6.url", "http://0.0.0.0"); // redundant lockPref("network.connectivity-service.IPv4.url", "http://0.0.0.0"); // redundant lockPref("network.connectivity-service.DNSv6.domain", ""); // redundant lockPref("network.connectivity-service.DNSv4.domain", ""); // redundant lockPref("browser.crashReports.unsubmittedCheck.enabled", false); // default lockPref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // default lockPref("browser.newtabpage.activity-stream.feeds.newtabinit", false); lockPref("browser.newtabpage.activity-stream.feeds.places", false); lockPref("browser.newtabpage.activity-stream.feeds.systemtick", false); lockPref("browser.newtabpage.activity-stream.feeds.system.topsites", false); lockPref("browser.newtabpage.activity-stream.asrouter.providers.messaging-experiments", ""); lockPref("browser.newtabpage.activity-stream.asrouter.providers.message-groups", ""); lockPref("browser.newtabpage.activity-stream.asrouter.providers.cfr-fxa", ""); lockPref("browser.newtabpage.activity-stream.asrouter.providers.cfr", ""); lockPref("browser.newtabpage.activity-stream.asrouter.providers.whats-new-panel", "{\"id\":\"whats-new-panel\",\"enabled\":false}"); lockPref("browser.newtabpage.activity-stream.asrouter.devtoolsEnableds", true); lockPref("browser.newtabpage.activity-stream.telemetry.structuredIngestion.endpoint", ""); lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts", false); lockPref("browser.newtabpage.activity-stream.improvesearch.handoffToAwesomebar", false); lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts.searchEngines", ""); lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts.havePinned", ""); defaultPref("dom.push.userAgentID", ""); // push notifications are already disabled lockPref("services.settings.server", ""); // redundant with patches lockPref("webchannel.allowObject.urlWhitelist", ""); // deprecated defaultPref("media.getusermedia.browser.enabled", false); defaultPref("media.getusermedia.screensharing.enabled", false); defaultPref("media.getusermedia.audiocapture.enabled", false); defaultPref("dom.storage.next_gen", true); // default from v92.0 ``` #### Added preferences ``` defaultPref("browser.download.useDownloadDir", false); // force user interaction on downloads, by always asking location // defaultPref("security.remote_settings.crlite_filters.enabled", true); // defaultPref("security.pki.crlite_mode", 2); pref("browser.urlbar.quicksuggest.scenario", ""); // disable firefox suggests and hide its UI ``` #### Commented preferences ``` // pref("network.trr.mode", 2); // previously uncommented defaultPref with value 5 // pref("network.trr.uri", "https://dns.quad9.net/dns-query"); // previously uncommented defaultPref with empty value ``` #### Changed preferences previously empty, set to proper value ``` defaultPref("network.trr.confirmationNS", "skip"); defaultPref("browser.search.searchEnginesURL", "https://gitlab.com/librewolf-community/settings/-/wikis/support#search"); defaultPref("browser.geolocation.warning.infoURL", "https://gitlab.com/librewolf-community/settings/-/wikis/support#location"); defaultPref("app.feedback.baseURL", "https://gitlab.com/librewolf-community/settings/-/wikis/support"); defaultPref("app.releaseNotesURL", "https://gitlab.com/librewolf-community/browser"); defaultPref("app.releaseNotesURL.aboutDialog", "https://gitlab.com/librewolf-community/browser"); ``` #### Unlocked preferences ``` defaultPref("signon.rememberSignons", false); defaultPref("signon.autofillForms", false); defaultPref("signon.formlessCapture.enabled", false); defaultPref("browser.urlbar.speculativeConnect.enabled", false); defaultPref("browser.contentblocking.report.lockwise.enabled", false); defaultPref("browser.contentblocking.report.monitor.enabled", false); defaultPref("network.dns.disablePrefetch", true); defaultPref("security.ssl.treat_unsafe_negotiation_as_broken", true); defaultPref("browser.startup.blankWindow", false); defaultPref("extensions.htmlaboutaddons.recommendations.enabled", false); defaultPref("extensions.systemAddon.update.enabled", false); defaultPref("extensions.systemAddon.update.url", ""); defaultPref("security.mixed_content.block_display_content", true); defaultPref("security.insecure_connection_text.enabled", true); defaultPref("gfx.font_rendering.opentype_svg.enabled", false); defaultPref("browser.shell.shortcutFavicons", false); defaultPref("network.gio.supported-protocols", ""); defaultPref("network.IDN_show_punycode", true); defaultPref("browser.shell.checkDefaultBrowser", false); defaultPref("middlemouse.contentLoadURL", false); defaultPref("browser.pagethumbnails.capturing_disabled", true); defaultPref("browser.privatebrowsing.forceMediaMemoryCache", true); defaultPref("app.update.url.details", "https://gitlab.com/librewolf-community/browser"); defaultPref("app.update.url.manual", "https://gitlab.com/librewolf-community/browser"); defaultPref("network.protocol-handler.external.ms-windows-store", false); defaultPref("browser.newtab.preload", false); defaultPref("browser.newtabpage.activity-stream.section.highlights.includeDownloads", false); defaultPref("browser.newtabpage.activity-stream.section.highlights.includeVisited", false); defaultPref("browser.newtabpage.activity-stream.feeds.topsites", false); defaultPref("browser.safebrowsing.downloads.enabled", false); ``` ## 1.6 **target commit**: 192f51abe21e9aeb9b01d396079e9b8533cab7bb **base librewolf version**: 91.x **References**: - [reasoning on webgl2](https://github.com/arkenfox/user.js/commit/41c3c0ec26ef4392169fa1d04fd5783ac03bfc8e) from arkenfox's maintainer, basically disabling webgl is enough for those who don't need it. users who want it have one less pref to change. #### Removed preferences ``` defaultPref("dom.targetBlankNoOpener.enabled", true); // default since v79.0 defaultPref("webgl.enable-webgl2", false); lockPref("browser.newtabpage.activity-stream.feeds.section.highlights", false); // default ``` ## 1.5 **target commit**: 23d1bff4f4ae3456df8e50e67f657ea6288eef29 **base librewolf version**: 91.x **References**: - [comment](https://github.com/arkenfox/user.js/commit/3bb9fc713f141d794fc4adfb38d3fcf86c9307ab#commitcomment-53916786) from arkenfox's maintainer regarding tls version pref - [mozilla update service](https://support.mozilla.org/en-US/kb/enable-background-updates-firefox-windows) - extension firewall has been revisited #### Removed preferences ``` lockPref("security.dialog_enable_delay", 700); // default 1000, no need to enforce this ``` #### Added preferences ``` defaultPref("app.update.background.scheduling.enabled", false); // Win specific update service defaultPref("security.tls.version.enable-deprecated", false); // default but helps resetting the preference // defaultPref("extensions.webextensions.base-content-security-policy.v3", "default-src 'none'; script-src 'none'; object-src 'none';"); ``` #### Changed preferences ``` // defaultPref("extensions.webextensions.base-content-security-policy", "default-src 'none'; script-src 'none'; object-src 'none';"); ``` ## 1.4 **target commit**: 2e21db4c3018321a077d9af2ec44b29675c57adf **base librewolf version**: 90.x #### Removed preferences ``` lockPref("security.tls.version.enable-deprecated", false); // default ``` ## 1.3 **target commit**: 60e75e30c6018a5c909a2f00f40831ed3f1948a6 **base librewolf version**: 90.x #### Added preferences ``` defaultPref("network.http.windows-sso.enabled", false); ``` #### Removed preferences ``` lockPref("browser.cache.offline.storage.enable", false); // pref does not exist anymore as it became default behavior ``` ## 1.2 **target commit**: 294724fae38ffa4ebcf6dfb0854787fb7022d1e6 **base librewolf version**: 89.x **References**: - issue [#65](https://gitlab.com/librewolf-community/settings/-/issues/65) from settings - issue [#22](https://gitlab.com/librewolf-community/browser/common/-/issues/22) from common #### Removed preferences ``` defaultPref("dom.webaudio.enabled", false); defaultPref("media.navigator.enabled", false); ``` #### Changed preferences ``` defaultPref("app.support.baseURL", "https://gitlab.com/librewolf-community/settings/-/wikis/support#"); ``` ## 1.1 **target commit**: cf0a2cc88acdbc51b138228353a0d7c9ea0db7c3 **base librewolf version**: 89.x **References**: - issue [#54](https://gitlab.com/librewolf-community/settings/-/issues/54) from settings - merge request [#5](https://gitlab.com/librewolf-community/browser/common/-/merge_requests/5) from common #### Removed preferences ``` defaultPref("security.OCSP.require", false); // default value defaultPref("extensions.update.url", ""); defaultPref("extensions.update.background.url", ""); defaultPref("extensions.getAddons.search.browseURL", ""); ``` #### Changed preferences ``` defaultPref("geo.provider.network.url", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%"); ``` #### Added preferences ``` lockPref("privacy.override_rfp_for_color_scheme", false); ``` ## 1.0 **target commit**: 2b8dc4ac6d7fb6fdf8f172d04c27912098268257 **base librewolf version**: 89.x This is the initial release from which we start tagging and versioning settings. For previous changes see [here](https://gitlab.com/librewolf-community/settings/-/blob/master/docs/changelog-legacy.md). 0707010000000F000081A4000000000000000000000001670164170000009D000000000000000000000000000000000000002C00000000settings-master/docs/cfg-lw-version-map.txtSettings version | LibreWolf version -----------------+------------------ 8.3 | 130.0-3 8.4 | 130.0.1-1 8.5 | 131.0-1 07070100000010000081A4000000000000000000000001670164170000C3D4000000000000000000000000000000000000002900000000settings-master/docs/changelog-legacy.md## Changelog This is a list of all the changes in librewolf prefs, in the transition from legacy up to the release of 89.0. After this all the changes will be documented in a better [changelog](./changelod.md) that includes a list of removed and added stuff on each release. #### Added Previously missing, now added ``` defaultPref("pdfjs.enableScripting", false); lockPref("browser.contentblocking.category", "custom"); // changing to other options is currently broken anyway lockPref("browser.contentblocking.cfr-milestone.enabled", false); lockPref("browser.contentblocking.database.enabled", false); lockPref("browser.contentblocking.cryptomining.preferences.ui.enabled", false); lockPref("browser.contentblocking.fingerprinting.preferences.ui.enabled", false); lockPref("browser.contentblocking.report.hide_vpn_banner", true); lockPref("browser.contentblocking.report.show_mobile_app", false); defaultPref("extensions.formautofill.creditCards.available", false); defaultPref("extensions.formautofill.addresses.capture.enabled", false); defaultPref("extensions.formautofill.section.enabled", false); // hide formautofill section in settings, which is useless and buggy atm defaultPref("media.peerconnection.ice.proxy_only_if_behind_proxy", true); lockPref("network.trr.send_empty_accept-encoding_headers", false); lockPref("browser.newtabpage.activity-stream.section.highlights.includePocket", false); lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts", false); lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts.havePinned", ""); lockPref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); lockPref("browser.newtabpage.activity-stream.feeds.topsites", false); lockPref("browser.newtabpage.activity-stream.feeds.system.topsites", false); lockPref("browser.newtabpage.activity-stream.feeds.system.topstories", false); lockPref("app.normandy.dev_mode", false); lockPref("toolkit.telemetry.shutdownPingSender.enabledFirstSession", false); defaultPref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0); defaultPref("dom.security.https_only_mode_pbm", true); lockPref("browser.ping-centre.telemetry", false); lockPref("browser.region.network.url", ""); lockPref("browser.region.update.enabled", false); defaultPref("dom.popup_allowed_events", "click dblclick mousedown pointerdown"); defaultPref("extensions.postDownloadThirdPartyPrompt", false); defaultPref("general.warnOnAboutConfig", false); defaultPref("network.auth.subresource-http-auth-allow", 1); defaultPref("browser.display.use_system_colors", false); defaultPref("browser.cache.disk.enable", false); defaultPref("fission.autostart", true); // commented for now ``` #### Modified Updated some present prefs to better one ``` defaultPref("network.cookie.cookieBehavior", 5); // dFPI, previously set to 1 lockPref("browser.cache.offline.storage.enable", false); // Previously browser.cache.offline.insecure.enable lockPref("network.http.referer.XOriginTrimmingPolicy", 2); // Previously set to 0 lockPref("network.http.referer.XOriginPolicy", 0); // Previously set to 1 defaultPref("privacy.clearOnShutdown.offlineApps", false); // For consistency with new cookie behavior defaultPref("privacy.cpd.offlineApps", false); // For consistency with new cookie behavior lockPref("devtools.performance.recording.ui-base-url", "http://localhost:55555"); // Previously redirected to localhost:4242 defaultPref("media.autoplay.blocking_policy", 2); // Previously media.autoplay.enabled.user-gestures-needed defaultPref("media.memory_cache_max_size", 65536); // previously lockPref("media.memory_cache_max_size", 16384); ``` #### Removed Active prefs that were removed ``` lockPref("network.cookie.same-site.enabled", true); // Deprecated lockPref("network.cookie.leave-secure-alone", true); // Deprecated lockPref("browser.contentblocking.reportBreakage.enabled", false); // Deprecated lockPref("browser.contentblocking.rejecttrackers.reportBreakage.enabled", false); // Deprecated lockPref("browser.contentblocking.rejecttrackers.ui.enabled", false); // Deprecated lockPref("browser.contentblocking.trackingprotection.control-center.ui.enabled", false); // Deprecated lockPref("browser.contentblocking.trackingprotection.ui.enabled", false); // Deprecated pref("signon.management.page.mobileAndroidURL", ""); // Deprecated pref("signon.management.page.mobileAppleURL", ""); // Deprecated lockPref("browser.urlbar.openViewOnFocus", false); // Handled through patch lockPref("browser.urlbar.update1", false); // Handled through patch lockPref("browser.urlbar.update1.interventions", false); // Handled through patch lockPref("browser.urlbar.update1.searchTips", false); // Handled through patch defaultPref("places.history.expiration.max_pages", 2147483647); // Useless defaultPref("media.gmp-manager.url.override", "data:text/plain,"); // To easily enable DRM defaultPref("media.gmp-manager.updateEnabled", false); // Deprecated defaultPref("media.gmp-widevinecdm.autoupdate", false); // Deprecated defaultPref("media.gmp-eme-adobe.enabled", false); // Deprecated defaultPref("media.gmp-manager.certs.2.commonName", ""); // To easily enable DRM defaultPref("media.gmp-manager.certs.1.commonName", ""); // To easily enable DRM defaultPref("media.gmp.trial-create.enabled", false); // To easily enable DRM lockPref("dom.indexedDB.enabled", true); // Deprecated lockPref("dom.w3c_pointer_events.enabled", false); // Deprecated lockPref("offline-apps.allow_by_default", false); // Deprecated lockPref("ui.use_standins_for_native_colors", true); // Interferes with RFP lockPref("dom.event.highrestimestamp.enabled", true); // Deprecated lockPref("browser.urlbar.usepreloadedtopurls.enabled", false); // Deprecated lockPref("browser.urlbar.oneOffSearches", false); // Deprecated lockPref("dom.disable_window_open_feature.close", true); // Deprecated lockPref("dom.disable_window_open_feature.location", true); // Deprecated lockPref("dom.disable_window_open_feature.menubar", true); // Deprecated lockPref("dom.disable_window_open_feature.minimizable", true); // Deprecated lockPref("dom.disable_window_open_feature.personalbar", true); // Deprecated lockPref("dom.disable_window_open_feature.resizable", true); // Deprecated lockPref("dom.disable_window_open_feature.status", true); // Deprecated lockPref("dom.disable_window_open_feature.titlebar", true); // Deprecated lockPref("dom.disable_window_open_feature.toolbar", true); // Deprecated lockPref("security.csp.experimentalEnabled", true); // Deprecated lockPref("security.csp.enable_violation_events", false); // Deprecated lockPref("gecko.handlerService.schemes.ircs.0.uriTemplate", ""); // Duplicated in the file lockPref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false); // Deprecated lockPref("extensions.htmlaboutaddons.discover.enabled", false); // Deprecated lockPref("browser.messaging-system.fxatoolbarbadge.enabled", false); // Deprecated lockPref("browser.onboarding.notification.tour-ids-queue", ""); // Deprecated lockPref("devtools.gcli.lodashSrc", ""); // Deprecated lockPref("devtools.webide.templatesURL", ""); // Deprecated lockPref("browser.ping-centre.production.endpoint", ""); // Deprecated lockPref("gecko.handlerService.schemes.ircs.0.name", ""); // Duplicated in the file lockPref("services.sync.fxa.privacyURL", ""); // Deprecated lockPref("services.settings.default_signer", ""); // Deprecated lockPref("app.productInfo.baseURL", ""); // Deprecated lockPref("devtools.webide.adbAddonURL", ""); // Deprecated lockPref("lightweightThemes.recommendedThemes", ""); // Deprecated defaultPref("media.gmp-gmpopenh264.autoupdate", false); // Adroid FF only lockPref("browser.newtabpage.activity-stream.prerender", false); // Deprecated lockPref("browser.newtabpage.activity-stream.aboutHome.enabled", false); // Deprecated lockPref("browser.newtabpage.activity-stream.disableSnippets", true); // Deprecated lockPref("privacy.donottrackheader.value", 1); // Deprecated defaultPref("privacy.userContext.longPressBehavior", 2); // Deprecated defaultPref("browser.tabs.closeWindowWithLastTab", true); // Already default lockPref("dom.forms.datetime", false); // Deprecated lockPref("browser.download.hide_plugins_without_extensions", false); // Deprecated lockPref("services.sync.clients.lastSync", "0"); // Deprecated lockPref("services.sync.clients.lastSyncLocal", "0"); // Deprecated lockPref("services.sync.enabled", false); // Deprecated lockPref("services.sync.jpake.serverURL", ""); // Deprecated lockPref("services.sync.migrated", true); // Deprecated lockPref("services.sync.prefs.sync.browser.safebrowsing.downloads.password", false); // Deprecated lockPref("services.sync.serverURL", ""); // Deprecated lockPref("services.sync.tabs.lastSyncLocal", "0"); // Deprecated lockPref("services.sync.engine.bookmarks.buffer", false); // Deprecated lockPref("services.sync.prefs.sync.browser.sessionstore.restore_on_demand", false); // Deprecated lockPref("services.sync.prefs.sync.browser.urlbar.suggest.history.onlyTyped", false); // Deprecated lockPref("services.sync.prefs.sync.browser.urlbar.matchBuckets", false); // Deprecated lockPref("services.sync.prefs.sync.browser.urlbar.autocomplete.enabled", false); // Deprecated lockPref("services.sync.prefs.sync.extensions.personas.current", false); // Deprecated lockPref("services.sync.prefs.sync.lightweightThemes.selectedThemeID", false); // Deprecated lockPref("services.sync.prefs.sync.lightweightThemes.usedThemes", false); // Deprecated lockPref("services.sync.prefs.sync.pref.advanced.images.disable_button.view_image", false); // Deprecated lockPref("services.sync.prefs.sync.pref.advanced.javascript.disable_button.advanced", false); // Deprecated lockPref("services.sync.prefs.sync.security.OCSP.enabled", false); // Deprecated lockPref("services.sync.prefs.sync.security.OCSP.require", false); // Deprecated lockPref("services.sync.prefs.sync.security.tls.version.max", false); // Deprecated lockPref("services.sync.prefs.sync.security.tls.version.min", false); // Deprecated lockPref("services.sync.prefs.sync.xpinstall.whitelist.required", false); // Deprecated lockPref("prio.publicKeyB", ""); // Deprecated lockPref("prio.publicKeyA", ""); // Deprecated lockPref("browser.chrome.errorReporter.publicKey", ""); // Deprecated lockPref("security.insecure_password.ui.enabled", true); // Deprecated defaultPref("network.dns.localDomains", "librefox.com"); // Doesn't make sense at all lockPref("security.ssl.errorReporting.automatic", false); // Deprecated lockPref("security.ssl.errorReporting.url", ""); // Deprecated lockPref("security.ssl.errorReporting.enabled", false); // Deprecated defaultPref("layout.frame_rate.precise", true); // Deprecated defaultPref("layers.offmainthreadcomposition.enabled", true); // Deprecated defaultPref("layers.async-video.enabled", true); // Deprecated defaultPref("layers.offmainthreadcomposition.async-animations", true); // Default true and not important to set defaultPref("html5.offmainthread", true); // Default true and not important to set defaultPref("browser.tabs.animate", false); // Deprecated lockPref("webgl.disable-extensions", true); // Deprecated lockPref("browser.onboarding.notification.finished", true); // Deprecated lockPref("browser.onboarding.tour.onboarding-tour-customize.completed", true); // Deprecated lockPref("browser.onboarding.tour.onboarding-tour-performance.completed", true); // Deprecated lockPref("devtools.onboarding.telemetry.logged", false); // Deprecated lockPref("pref.general.disable_button.default_browser", false); // Deprecated lockPref("pref.privacy.disable_button.view_passwords", false); // Deprecated lockPref("browser.urlbar.daysBeforeHidingSuggestionsPrompt", 0); // Deprecated lockPref("browser.urlbar.searchSuggestionsChoice", false); // Deprecated lockPref("browser.urlbar.timesBeforeHidingSuggestionsHint", 0); // Deprecated lockPref("app.update.silent", false); // Deprecated lockPref("app.vendorURL", ""); // Deprecated lockPref("browser.chrome.errorReporter.submitUrl", ""); // Deprecated lockPref("browser.chrome.errorReporter.enabled", false); // Deprecated lockPref("browser.ping-centre.staging.endpoint", ""); // Deprecated lockPref("devtools.devedition.promo.url", ""); // Deprecated lockPref("devtools.gcli.imgurUploadURL", ""); // Deprecated lockPref("devtools.gcli.jquerySrc", ""); // Deprecated lockPref("devtools.gcli.underscoreSrc", ""); // Deprecated lockPref("devtools.telemetry.supported_performance_marks", ""); // Deprecated lockPref("dom.permissions.enabled", false); // Deprecated lockPref("extensions.blocklist.url", ""); // Deprecated lockPref("geo.wifi.uri", ""); // Deprecated lockPref("geo.provider-country.network.scan", false); // Deprecated lockPref("geo.provider-country.network.url", ""); // Deprecated lockPref("identity.fxaccounts.service.sendLoginUrl", ""); // Deprecated lockPref("lpbmode.enabled", true); // Deprecated lockPref("mailnews.messageid_browser.url", ""); // Deprecated lockPref("mailnews.mx_service_url", ""); // Deprecated lockPref("network.predictor.cleaned-up", true); // Deprecated lockPref("plugins.crash.supportUrl", ""); // Deprecated lockPref("sync.enabled", false); // Deprecated lockPref("sync.jpake.serverURL", ""); // Deprecated lockPref("sync.serverURL", ""); // Deprecated lockPref("toolkit.telemetry.hybridContent.enabled", false); // Deprecated lockPref("toolkit.telemetry.infoURL", ""); // Deprecated lockPref("toolkit.telemetry.prompted", 2); // Deprecated lockPref("toolkit.telemetry.rejected", true); // Deprecated lockPref("toolkit.telemetry.coverage.opt-out", true); // Deprecated lockPref("browser.aboutHomeSnippets.updateUrl", ""); // Deprecated lockPref("dom.enable_user_timing", false); // Deprecated lockPref("geo.wifi.logging.enabled", false); // Deprecated lockPref("browser.search.geoSpecificDefaults.url", ""); // Deprecated lockPref("browser.search.geoSpecificDefaults", false); // Deprecated lockPref("browser.fixup.hide_user_pass", true); // Deprecated lockPref("privacy.storagePrincipal.enabledForTrackers", false); // redundant with dFPI defaultPref("layout.css.visited_links_enabled", false); // https://bugzilla.mozilla.org/show_bug.cgi?id=1632765 defaultPref("layout.css.always-repaint-on-unvisited", false); // no benefit with RFP enabled -> https://github.com/arkenfox/user.js/issues/933 defaultPref("layout.css.notify-of-unvisited", false); // no benefit with RFP enabled defaultPref("dom.event.contextmenu.enabled", false); // causes breakage with no demonstrated privacy benefit lockPref("dom.registerProtocolHandler.insecure.enabled", true); // Deprecated defaultPref("dom.security.https_only_mode_ever_enabled", true); // Triggered by dom.security.https_only_mode = true lockPref("dom.enable_resource_timing", false); // conflicting with RFP lockPref("device.sensors.enabled", false); // conflicting with RFP lockPref("dom.gamepad.enabled", false); // conflicting with RFP lockPref("dom.netinfo.enabled", false); // conflicting with RFP lockPref("media.video_stats.enabled", false); // conflicting with RFP lockPref("webgl.enable-debug-renderer-info", false); // conflicting with RFP defaultPref("extensions.getAddons.themes.browseURL", ""); // Deprecated lockPref("extensions.getAddons.compatOverides.url", ""); // Used for tests on localhost:8888 defaultPref("extensions.ui.experiment.hidden", false); // Deprecated defaultPref("extensions.webextensions.tabhide.enabled", false); // Deprecated lockPref("dom.enable_performance", false); // conflicting with RFP lockPref("dom.enable_performance_navigation_timing", false); // conflicting with RFP lockPref("security.mixed_content.upgrade_display_content", true); // not worth having https://github.com/arkenfox/user.js/issues/754 lockPref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); // Deprecated lockPref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); // Deprecated lockPref("security.ssl3.rsa_rc4_128_md5", false); // Deprecated lockPref("security.ssl3.rsa_rc4_128_sha", false); // Deprecated lockPref("security.tls.unrestricted_rc4_fallback", false); // Deprecated lockPref("security.ssl3.ecdh_ecdsa_rc4_128_sha", false); // Deprecated lockPref("security.ssl3.ecdh_rsa_rc4_128_sha", false); // Deprecated lockPref("security.ssl3.rsa_seed_sha", false); // Deprecated lockPref("security.ssl3.rsa_des_ede3_sha", false); // known to leak and increase fingerprint lockPref("security.ssl3.rsa_aes_256_sha", false); // known to leak and increase fingerprint lockPref("security.ssl3.rsa_aes_128_sha", false); // known to leak and increase fingerprint lockPref("browser.safebrowsing.allowOverride", false); // we do not have SB enabled so we don't care if the bypass button is shown defaultPref("browser.ctrlTab.recentlyUsedOrder", false); // why should be disable this? lockPref("services.blocklist.onecrl.collection", ""); // Deprecated lockPref("font.blacklist.underline_offset", ""); // knwown to increase fingerprint lockPref("plugin.defaultXpi.state", 1); // Deprecated lockPref("remote.log.level", "Info"); // already default and not important in any way lockPref("webgl.min_capability_mode", true); // small to no gain according to arkenfox and TOR, breaks websites on the other side lockPref("lightweightThemes.update.enabled", false); // Deprecated lockPref("lightweightThemes.persisted.headerURL", false); // Deprecated lockPref("lightweightThemes.persisted.footerURL", false); // Deprecated lockPref("network.protocol-handler.warn-external-default",true); // any real benefit? lockPref("network.protocol-handler.external.javascript",false); // any real benefit? lockPref("network.protocol-handler.external.moz-extension",false); // any real benefit? lockPref("network.protocol-handler.external.ftp",false);// any real benefit? lockPref("network.protocol-handler.external.file",false);// any real benefit? lockPref("network.protocol-handler.external.about",false);// any real benefit? lockPref("network.protocol-handler.external.chrome",false);// any real benefit? lockPref("network.protocol-handler.external.blob",false);// any real benefit? lockPref("network.protocol-handler.external.data",false);// any real benefit? lockPref("network.protocol-handler.expose-all",false);// any real benefit? lockPref("network.protocol-handler.expose.http",true);// any real benefit? lockPref("network.protocol-handler.expose.https",true);// any real benefit? lockPref("network.protocol-handler.expose.javascript",true);// any real benefit? lockPref("network.protocol-handler.expose.moz-extension",true);// any real benefit? lockPref("network.protocol-handler.expose.ftp",true);// any real benefit? lockPref("network.protocol-handler.expose.file",true);// any real benefit? lockPref("network.protocol-handler.expose.about",true);// any real benefit? lockPref("network.protocol-handler.expose.chrome",true);// any real benefit? lockPref("network.protocol-handler.expose.blob",true);// any real benefit? lockPref("network.protocol-handler.expose.data",true);// any real benefit? lockPref("network.protocol-handler.external.http",false);// any real benefit? lockPref("network.protocol-handler.external.https",false);// any real benefit? lockPref("shumway.disabled", true); // Deprecated lockPref("plugin.state.libgnome-shell-browser-plugin", 0); // Deprecated lockPref("plugins.click_to_play", true); // Deprecated lockPref("plugin.sessionPermissionNow.intervalInMinutes", 0); // Deprecated lockPref("devtools.webide.enabled", false); // Deprecated lockPref("devtools.webide.autoinstallADBExtension", false); // Deprecated lockPref("network.allow-experiments", false); // Deprecated lockPref("browser.urlbar.userMadeSearchSuggestionsChoice", true); // Deprecated lockPref("network.netlink.route.check.IPv4", "127.0.0.1"); // Deprecated lockPref("network.netlink.route.check.IPv6", "::1"); // Deprecated lockPref("network.negotiate-auth.allow-insecure-ntlm-v1", false); // Deprecated lockPref("network.negotiate-auth.allow-insecure-ntlm-v1-https", false); // Deprecated lockPref("security.tls.version.max", 4); // increases fingerprint defaultPref("network.dns.blockDotOnion", true); // TOR is out of scope lockPref("network.http.referer.hideOnionSource", true); // TOR is out of scope lockPref("browser.onboarding.enabled", false); // Deprecated lockPref("dom.mozTCPSocket.enabled", false); // Useless according to https://gitlab.torproject.org/legacy/trac/-/issues/27268#comment:2 lockPref("devtools.webide.autoinstallADBHelper", false); // Deprecated lockPref("app.update.enabled", false); // Deprecated lockPref("browser.casting.enabled", false); // Deprecated, probably Android only lockPref("browser.newtabpage.activity-stream.enabled", false); // Deprecated lockPref("browser.newtabpage.directory.ping", "data:text/plain,"); // Deprecated lockPref("browser.newtabpage.directory.source", "data:text/plain,"); // Deprecated lockPref("browser.newtabpage.enhanced", false); // Deprecated lockPref("browser.selfsupport.url", ""); // Deprecated lockPref("camera.control.face_detection.enabled", false); // Deprecated lockPref("datareporting.healthreport.about.reportUrl", "data:,"); // Deprecated lockPref("datareporting.healthreport.service.enabled", false); // Deprecated lockPref("devtools.webide.autoinstallFxdtAdapters", false); // Deprecated lockPref("devtools.webide.adaptersAddonURL", ""); // Deprecated lockPref("dom.flyweb.enabled", false); // Deprecated lockPref("dom.push.udp.wakeupEnabled", false); // Deprecated lockPref("dom.telephony.enabled", false); // Deprecated lockPref("extensions.shield-recipe-client.enabled", false); // Deprecated lockPref("loop.logDomains", false); // Deprecated lockPref("network.websocket.enabled", false); // Deprecated lockPref("security.xpconnect.plugin.unrestricted", false); // Deprecated lockPref("social.directories", ""); // Deprecated lockPref("social.remote-install.enabled", false); // Deprecated lockPref("social.whitelist", ""); // Deprecated lockPref("pref.privacy.disable_button.change_blocklist", true); // seems to have no effect and probably deprecated lockPref("pref.privacy.disable_button.tracking_protection_exceptions", true); // seems to have no effect and probably deprecated lockPref("browser.pocket.enabled", false); // Deprecated defaultPref("toolkit.legacyUserProfileCustomizations.stylesheets", false); // already default value and not that important, can still be flipped easily lockPref("plugin.scan.plid.all", false); // Win-only, plugins are disabled so it's redundant lockPref("webgl.dxgl.enabled", false); // Win-only, marked as useless https://github.com/arkenfox/user.js/issues/714 lockPref("browser.search.countryCode", "US"); // Deprecated lockPref("experiments.activeExperiment", false); // Deprecated lockPref("experiments.enabled", false); // Deprecated lockPref("experiments.manifest.uri", ""); // Deprecated lockPref("experiments.supported", false); // Deprecated lockPref("network.jar.block-remote-files", true); // Deprecated lockPref("network.jar.open-unsafe-types", false); // Deprecated lockPref("plugin.state.java", 0); // Deprecated lockPref("trailhead.firstrun.branches", "join-privacy"); // Deprecated lockPref("services.blocklist.update_enabled", false); // Deprecated lockPref("shield.savant.enabled", false); // Deprecated defaultPref("gfx.direct2d.disabled", false); // Win-only, default and probably out of scope defaultPref("layers.acceleration.disabled", false); // default and probably out of scope lockPref("browser.taskbar.previews.enable", false); // personal pref lockPref("browser.taskbar.lists.enabled", false); // personal pref lockPref("browser.taskbar.lists.frequent.enabled", false); // personal pref lockPref("browser.taskbar.lists.recent.enabled", false); // personal pref lockPref("browser.taskbar.lists.tasks.enabled", false); // personal pref defaultPref("webgl.force-enabled", true); // out of scope, not worth defaultPref("layers.acceleration.force-enabled", true); // out of scope, not worth lockPref("privacy.trackingprotection.testing.report_blocked_node", false); // default false and we have tracking protection disabled lockPref("privacy.trackingprotection.origin_telemetry.enabled", false); // default false and we have tracking protection disabled lockPref("privacy.trackingprotection.lower_network_priority", false); // default lockPref("telemetry.origin_telemetry_test_mode.enabled", false); // default false and we have tracking protection disabled lockPref("signon.storeSignons", false); // Deprecated lockPref("browser.urlbar.filter.javascript", true); // default lockPref("browser.search.geoip.url", ""); // Deprecated defaultPref("privacy.clearOnShutdown.siteSettings", false); // default defaultPref("privacy.clearOnShutdown.cache", true); // default defaultPref("privacy.clearOnShutdown.sessions", true); // default defaultPref("privacy.clearOnShutdown.downloads", true); // default defaultPref("privacy.clearOnShutdown.formdata", true); // default defaultPref("privacy.clearOnShutdown.history", true); // default defaultPref("privacy.cpd.siteSettings", false); // default defaultPref("privacy.cpd.downloads", true); // default defaultPref("privacy.cpd.cache", true); // default defaultPref("privacy.cpd.formdata", true); // default defaultPref("privacy.cpd.history", true); // default defaultPref("privacy.cpd.passwords", false); // default defaultPref("privacy.cpd.sessions", true); // default defaultPref("extensions.formautofill.addresses.capture.enabled", false); // default lockPref("signon.autofillForms.http", false); // default lockPref("network.trr.send_user-agent_headers", false); // default lockPref("network.dns.disablePrefetchFromHTTPS", true); // default lockPref("dom.imagecapture.enabled", false); // default lockPref("dom.reporting.crash.enabled", false); // default defaultPref("network.proxy.autoconfig_url.include_path", false); // default lockPref("security.tls.version.min", 3); // default defaultPref("extensions.webextensions.background-delayed-startup", true); //default defaultPref("xpinstall.signatures.required", true); // default lockPref("app.normandy.dev_mode", false); // default defaultPref("pdfjs.enableWebGL", false); // default lockPref("browser.cache.offline.enable", false); // apparently increases fingerprinting and redundant with browser.cache.offline.storage.enable lockPref("network.predictor.enable-prefetch", false); // default lockPref("network.http.referer.spoofSource", false); // default defaultPref("network.http.referer.defaultPolicy", 2); // default defaultPref("network.http.referer.defaultPolicy.pbmode", 2); // default defaultPref("layout.spellcheckDefault", 2); // why? lockPref("privacy.trackingprotection.introURL", ""); // Deprecated defaultPref("general.appname.override", "Netscape"); // no benefit over RFP defaultPref("general.appversion.override", "5.0 (Windows)"); // no benefit over RFP, and it doesn't spoof defaultPref("general.platform.override", "Win32"); // no benefit over RFP, and it doesn't spoof defaultPref("general.oscpu.override", "Windows NT 6.1"); // no benefit over RFP, and it doesn't spoof lockPref("general.buildID.override", "20100101"); // no benefit over RFP lockPref("browser.startup.homepage_override.buildID", "20100101"); // no benefit over RFP defaultPref("general.useragent.override", "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0"); // no benefit over RFP and without may increase FP lockPref("security.insecure_connection_icon.enabled", true); // Default lockPref("security.insecure_connection_icon.pbmode.enabled", true); // Default lockPref("browser.bookmarks.restore_default_bookmarks", false); // Default lockPref("browser.contentblocking.cfr-milestone.enabled", false); // not needed with contenblocking disabled lockPref("app.normandy.first_run", false); // default lockPref("browser.send_pings", false); // default lockPref("browser.send_pings.require_same_host", true); // default defaultPref("browser.tabs.closeTabByDblclick", true); // why? lockPref("devtools.debugger.force-local", true); // default lockPref("gfx.offscreencanvas.enabled", false); // default lockPref("media.webspeech.recognition.enable", false); // default lockPref("network.auth.subresource-img-cross-origin-http-auth-allow", false); // default lockPref("remote.force-local", true); // default lockPref("security.data_uri.block_toplevel_data_uri_navigations", true); // default lockPref("security.fileuri.strict_origin_policy", true); // default lockPref("security.insecure_field_warning.contextual.enabled", true); // default defaultPref("security.remote_settings.intermediates.enabled", true); // default lockPref("xpinstall.whitelist.required", true); // default lockPref("browser.sessionhistory.max_entries", 20); // why? lockPref("extensions.webapi.testing", false); // hidden but default false lockPref("canvas.capturestream.enabled", false); // any real benefit? lockPref("network.http.redirection-limit", 10); // small benefit from having it at default 20, and break some payments defaultPref("dom.event.clipboardevents.enabled", false); // causes breakage with small benefits, moved to hardened setup lockPref("webgl.disable-fail-if-major-performance-caveat", true); // default lockPref("network.trr.send_empty_accept-encoding_headers", false); // why? // fxaccounts is disabled in policies lockPref("identity.fxaccounts.enabled", false); lockPref("identity.fxaccounts.remote.root", ""); lockPref("identity.fxaccounts.auth.uri", ""); lockPref("identity.fxaccounts.commands.enabled", false); lockPref("identity.fxaccounts.remote.oauth.uri", ""); lockPref("identity.fxaccounts.remote.profile.uri", ""); lockPref("identity.fxaccounts.service.monitorLoginUrl", ""); // all handled by lockPref("services.settings.server", "") lockPref("services.blocklist.addons.collection", ""); lockPref("services.blocklist.plugins.collection", ""); lockPref("services.blocklist.gfx.collection", ""); lockPref("services.blocklist.addons.signer", ""); lockPref("services.blocklist.gfx.signer", ""); lockPref("services.settings.security.onecrl.signer", ""); lockPref("services.blocklist.pinning.signer", ""); lockPref("services.blocklist.plugins.signer", ""); // useless as fxaccounts are off lockPref("services.sync.addons.trustedSourceHostnames", ""); lockPref("services.sync.lastversion", ""); lockPref("services.sync.maxResyncs", 0); // 1 lockPref("services.sync.telemetry.maxPayloadCount", 0); //500 lockPref("services.sync.addons.ignoreUserEnabledChanges", true); //false lockPref("services.sync.engine.addons", false); //true lockPref("services.sync.engine.addresses", false); //false lockPref("services.sync.engine.addresses.available", false); lockPref("services.sync.engine.bookmarks", false); //true lockPref("services.sync.engine.creditcards", false); //false lockPref("services.sync.engine.creditcards.available", false); //false lockPref("services.sync.engine.history", false); //true lockPref("services.sync.engine.passwords", false); //true lockPref("services.sync.engine.prefs", false); //true lockPref("services.sync.engine.tabs", false); //true lockPref("services.sync.log.appender.file.logOnError", false); //true lockPref("services.sync.log.appender.file.logOnSuccess", false); //false lockPref("services.sync.log.cryptoDebug", false); //false lockPref("services.sync.sendVersionInfo", false); //true lockPref("services.sync.syncedTabs.showRemoteIcons", true); //true lockPref("services.sync.prefs.sync.services.sync.syncedTabs.showRemoteIcons", false); //true lockPref("services.sync.prefs.sync.accessibility.blockautorefresh", false); //true lockPref("services.sync.prefs.sync.accessibility.browsewithcaret", false); //true lockPref("services.sync.prefs.sync.accessibility.typeaheadfind", false); //true lockPref("services.sync.prefs.sync.accessibility.typeaheadfind.linksonly", false); //true lockPref("services.sync.prefs.sync.addons.ignoreUserEnabledChanges", true); //true lockPref("services.sync.prefs.sync.browser.contentblocking.category", false); //true lockPref("services.sync.prefs.sync.browser.contentblocking.features.strict", false); //true lockPref("services.sync.prefs.sync.browser.ctrlTab.recentlyUsedOrder", false); //true lockPref("services.sync.prefs.sync.browser.download.useDownloadDir", false); //true lockPref("services.sync.prefs.sync.browser.formfill.enable", false); //true lockPref("services.sync.prefs.sync.browser.link.open_newwindow", false); //true lockPref("services.sync.prefs.sync.browser.newtabpage.enabled", false); //true lockPref("services.sync.prefs.sync.browser.newtabpage.pinned", false); //true lockPref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includePocket", false); //true lockPref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includeVisited", false); //true lockPref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includeBookmarks", false); //true lockPref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includeDownloads", false); //true lockPref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.rows", false); //true lockPref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.topstories.rows", false); //true lockPref("services.sync.prefs.sync.browser.offline-apps.notify", false); //true lockPref("services.sync.prefs.sync.browser.search.update", false); //true lockPref("services.sync.prefs.sync.browser.search.widget.inNavBar", false); //true lockPref("services.sync.prefs.sync.browser.sessionstore.warnOnQuit", false); //true lockPref("services.sync.prefs.sync.browser.startup.homepage", false); //true lockPref("services.sync.prefs.sync.browser.startup.page", false); //true lockPref("services.sync.prefs.sync.browser.tabs.loadInBackground", false); //true lockPref("services.sync.prefs.sync.browser.tabs.warnOnClose", false); //true lockPref("services.sync.prefs.sync.browser.tabs.warnOnOpen", false); //true lockPref("services.sync.prefs.sync.browser.urlbar.maxRichResults", false); //true lockPref("services.sync.prefs.sync.browser.urlbar.suggest.bookmark", false); //true lockPref("services.sync.prefs.sync.browser.urlbar.suggest.history", false); //true lockPref("services.sync.prefs.sync.browser.urlbar.suggest.engines", false); //true lockPref("services.sync.prefs.sync.browser.urlbar.suggest.topsites", false); //true lockPref("services.sync.prefs.sync.browser.urlbar.suggest.openpage", false); //true lockPref("services.sync.prefs.sync.browser.urlbar.suggest.searches", false); //true lockPref("services.sync.prefs.sync.browser.urlbar.resultBuckets", false); //true lockPref("services.sync.prefs.sync.browser.urlbar.showSearchSuggestionsFirst", false); //true lockPref("services.sync.prefs.sync.dom.disable_open_during_load", false); //true lockPref("services.sync.prefs.sync.dom.disable_window_flip", false); //true lockPref("services.sync.prefs.sync.dom.disable_window_move_resize", false); //true lockPref("services.sync.prefs.sync.dom.event.contextmenu.enabled", false); //true lockPref("services.sync.prefs.sync.dom.security.https_only_mode", false); //true lockPref("services.sync.prefs.sync.dom.security.https_only_mode_ever_enabled", false); //true lockPref("services.sync.prefs.sync.dom.security.https_only_mode_ever_enabled_pbm", false); //true lockPref("services.sync.prefs.sync.dom.security.https_only_mode_pbm", false); //true lockPref("services.sync.prefs.sync.extensions.activeThemeID", false); //true lockPref("services.sync.prefs.sync.extensions.update.enabled", false); //true lockPref("services.sync.prefs.sync.intl.accept_languages", false); //true lockPref("services.sync.prefs.sync.intl.regional_prefs.use_os_locales", false); //true lockPref("services.sync.prefs.sync.layout.spellcheckDefault", false); //true lockPref("services.sync.prefs.sync.network.cookie.cookieBehavior", false); //true lockPref("services.sync.prefs.sync.network.cookie.lifetimePolicy", false); //true lockPref("services.sync.prefs.sync.network.cookie.thirdparty.sessionOnly", false); //true lockPref("services.sync.prefs.sync.permissions.default.image", false); //true lockPref("services.sync.prefs.sync.pref.downloads.disable_button.edit_actions", false); //true lockPref("services.sync.prefs.sync.pref.privacy.disable_button.cookie_exceptions", false); //true lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.cache", false); //true lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.cookies", false); //true lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.downloads", false); //true lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.formdata", false); //true lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.history", false); //true lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.offlineApps", false); //true lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.sessions", false); //true lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.siteSettings", false); //true lockPref("services.sync.prefs.sync.privacy.donottrackheader.enabled", false); //true lockPref("services.sync.prefs.sync.privacy.fuzzyfox.clockgrainus", false); //true lockPref("services.sync.prefs.sync.privacy.fuzzyfox.enabled", false); //true lockPref("services.sync.prefs.sync.privacy.reduceTimerPrecision", false); //true lockPref("services.sync.prefs.sync.privacy.resistFingerprinting", false); //true lockPref("services.sync.prefs.sync.privacy.resistFingerprinting.reduceTimerPrecision.jitter", false); //true lockPref("services.sync.prefs.sync.privacy.resistFingerprinting.reduceTimerPrecision.microseconds", false); //true lockPref("services.sync.prefs.sync.privacy.sanitize.sanitizeOnShutdown", false); //true lockPref("services.sync.prefs.sync.privacy.trackingprotection.enabled", false); //true lockPref("services.sync.prefs.sync.privacy.trackingprotection.pbmode.enabled", false); //true lockPref("services.sync.prefs.sync.privacy.trackingprotection.cryptomining.enabled", false); //true lockPref("services.sync.prefs.sync.privacy.trackingprotection.fingerprinting.enabled", false); //true lockPref("services.sync.prefs.sync.privacy.userContext.enabled", false); //true lockPref("services.sync.prefs.sync.privacy.userContext.newTabContainerOnLeftClick.enabled", false); //true lockPref("services.sync.prefs.sync.security.default_personal_cert", false); //true lockPref("services.sync.prefs.sync.spellchecker.dictionary", false); //true lockPref("services.sync.prefs.sync.signon.rememberSignons", false); lockPref("services.sync.prefs.sync.signon.management.page.breach-alerts.enabled", false); lockPref("services.sync.prefs.sync.signon.generation.enabled", false); lockPref("services.sync.prefs.sync.signon.autofillForms", false); lockPref("services.sync.declinedEngines", ""); lockPref("services.sync.globalScore", 0); lockPref("services.sync.nextSync", 0); lockPref("services.sync.prefs.sync.browser.safebrowsing.downloads.enabled", false); lockPref("services.sync.prefs.sync.browser.safebrowsing.malware.enabled", false); lockPref("services.sync.prefs.sync.browser.safebrowsing.downloads.remote.block_potentially_unwanted", false); lockPref("services.sync.prefs.sync.browser.safebrowsing.phishing.enabled", false); lockPref("services.sync.tabs.lastSync", "0"); // useless as ui elements are not in the report page lockPref("browser.contentblocking.report.cookie.url", ""); lockPref("browser.contentblocking.report.cryptominer.url", ""); lockPref("browser.contentblocking.report.endpoint_url", ""); lockPref("browser.contentblocking.report.fingerprinter.url", ""); lockPref("browser.contentblocking.report.lockwise.how_it_works.url", ""); lockPref("browser.contentblocking.report.manage_devices.url", ""); lockPref("browser.contentblocking.report.monitor.how_it_works.url", ""); lockPref("browser.contentblocking.report.monitor.sign_in_url", ""); lockPref("browser.contentblocking.report.monitor.home_page_url", ""); lockPref("browser.contentblocking.report.monitor.preferences", ""); lockPref("browser.contentblocking.report.monitor.url", ""); lockPref("browser.contentblocking.report.proxy.enabled", false); lockPref("browser.contentblocking.report.proxy_extension.url", ""); lockPref("browser.contentblocking.report.social.url", ""); lockPref("browser.contentblocking.report.tracker.url", ""); lockPref("browser.contentblocking.report.vpn.url", ""); lockPref("browser.contentblocking.report.vpn-promo.url", ""); lockPref("browser.contentblocking.report.vpn-ios.url", ""); lockPref("browser.contentblocking.report.vpn-android.url", ""); // urls that do not damage and make re-enabling TP a pain lockPref("browser.contentblocking.reportBreakage.url", ""); defaultPref("browser.safebrowsing.provider.mozilla.pver", ""); defaultPref("browser.safebrowsing.provider.mozilla.lists", ""); defaultPref("browser.safebrowsing.provider.mozilla.lists.base", ""); defaultPref("browser.safebrowsing.provider.mozilla.lists.content", ""); defaultPref("browser.safebrowsing.provider.mozilla.lastupdatetime", ""); defaultPref("browser.safebrowsing.provider.mozilla.nextupdatetime", ""); lockPref("urlclassifier.trackingTable", ""); lockPref("browser.contentblocking.database.enabled", false); // all covered by previous prefs // defaultPref("media.navigator.video.enabled", false); // defaultPref("media.peerconnection.use_document_iceservers", false); // defaultPref("media.peerconnection.identity.enabled", false); // defaultPref("media.peerconnection.identity.timeout", 1); // defaultPref("media.peerconnection.turn.disable", true); // defaultPref("media.peerconnection.ice.tcp", false); lockPref("privacy.trackingprotection.socialtracking.enabled", false); // default defaultPref("network.stricttransportsecurity.preloadlist", false); // nothing wrong with hsts lockPref("security.ssl.disable_session_identifiers", true); // covered by isolation, large performance hit // defaultPref("intl.regional_prefs.use_os_locales", false); // default and already commented lockPref("extensions.screenshots.upload-disabled", true); // deprecated feature lockPref("dom.ipc.plugins.reportCrashURL", false); // flash is gone, does nothing lockPref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false); // flash is gone, does nothing lockPref("plugin.state.flash", 0); // flash is gone, does nothing defaultPref("alerts.showFavicons", false); // default lockPref("plugin.default.state", 1); // default lockPref("extensions.pocket.enabled", false); // pocket is already disabled lockPref("extensions.pocket.site", ""); // pocket is already disabled lockPref("extensions.pocket.oAuthConsumerKey", ""); // pocket is already disabled lockPref("extensions.pocket.api", ""); // pocket is already disabled defaultPref("accessibility.typeaheadfind", false); // default defaultPref("reader.parse-on-load.enabled", false); // no need to have it locked, even Tor Browser re-enabled it lockPref("gecko.handlerService.schemes.webcal.0.uriTemplate", ""); // default defaultPref("network.proxy.socks_version", 5); // default defaultPref("network.proxy.autoconfig_url", ""); // default defaultPref("extensions.formautofill.section.enabled", false); // no effect defaultPref("network.trr.bootstrapAddress", ""); // deprecated lockPref("browser.newtabpage.activity-stream.feeds.asrouterfeed", false); // deprecated lockPref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", ""); // deprecated defaultPref("security.ssl.enable_ocsp_stapling", true); // default lockPref("security.mixed_content.block_object_subrequest", true); // useless as rest of flash prefs defaultPref("geo.provider.network.logging.enabled", false); // default lockPref("toolkit.telemetry.ecosystemtelemetry.enabled", false); // deprecated lockPref("browser.contentblocking.report.proxy.enabled", false); // default ``` #### Commented Prefs that need to be addressed and that were disabled for now ``` // blocklist is a security feature, best left at default // defaultPref("extensions.blocklist.enabled", false); // defaultPref("extensions.blocklist.detailsURL", ""); // defaultPref("extensions.blocklist.itemURL", ""); // commented all below as they do no harm and make enabling SB painful // could potentially at some point // defaultPref("browser.safebrowsing.id", ""); // defaultPref("browser.safebrowsing.provider.google4.pver", ""); // defaultPref("browser.safebrowsing.provider.google4.advisoryName", ""); // defaultPref("browser.safebrowsing.provider.google4.advisoryURL", ""); // defaultPref("browser.safebrowsing.provider.google4.lists", ""); // defaultPref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", ""); // defaultPref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", ""); // defaultPref("browser.safebrowsing.provider.google4.reportURL", ""); // defaultPref("browser.safebrowsing.provider.google4.lastupdatetime", ""); // defaultPref("browser.safebrowsing.provider.google4.nextupdatetime", ""); // defaultPref("browser.safebrowsing.provider.google.advisoryName", ""); // defaultPref("browser.safebrowsing.provider.google.advisoryURL", ""); // defaultPref("browser.safebrowsing.provider.google.lastupdatetime", ""); // defaultPref("browser.safebrowsing.provider.google.lists", ""); // defaultPref("browser.safebrowsing.provider.google.nextupdatetime", ""); // defaultPref("browser.safebrowsing.provider.google.pver", ""); // defaultPref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", ""); // defaultPref("browser.safebrowsing.provider.google.reportPhishMistakeURL", ""); // defaultPref("browser.safebrowsing.provider.google.reportURL", ""); // defaultPref("browser.safebrowsing.reportPhishURL", ""); ``` #### Unlocked Locked prefs that were unlocked, more should be unlocked probably ``` defaultPref("general.config.filename", "librewolf.cfg"); defaultPref("privacy.donottrackheader.enabled", true); // Unlocked as some think it increases fingerprint, they can now disable it defaultPref("permissions.default.geo", 2); // Unlocked as some think it increases fingerprint, they can now disable it defaultPref("extensions.getAddons.themes.browseURL", "") defaultPref("pdfjs.enableWebGL", false); defaultPref("pdfjs.previousHandler.alwaysAskBeforeHandling", true); defaultPref("pdfjs.enabledCache.state", false); defaultPref("alerts.showFavicons", false); // default: false defaultPref("security.remote_settings.intermediates.enabled", true); defaultPref("dom.battery.enabled", false); // Unlocked as some think it increases fingerprint, they can now disable it defaultPref("extensions.blocklist.enabled", false); defaultPref("extensions.blocklist.detailsURL", ""); defaultPref("extensions.blocklist.itemURL", ""); defaultPref("security.OCSP.enabled", 0); // someone might want to have it on for security concerns defaultPref("security.OCSP.require", false); defaultPref("reader.parse-on-load.enabled", false); defaultPref("webgl.enable-webgl2", false); defaultPref("geo.provider.network.url", ""); defaultPref("geo.provider.network.logging.enabled", false); defaultPref("network.http.referer.XOriginTrimmingPolicy", 2); defaultPref("network.http.referer.XOriginPolicy", 0); defaultPref("browser.download.manager.addToRecentDocs", false); defaultPref("accessibility.force_disabled", 1); defaultPref("network.manage-offline-status", false); defaultPref("browser.helperApps.deleteTempFileOnExit", true); defaultPref("dom.push.enabled", false); defaultPref("dom.push.connection.enabled", false); defaultPref("dom.push.serverURL", ""); //default "wss://push.services.mozilla.com/" defaultPref("dom.push.userAgentID", ""); defaultPref("dom.targetBlankNoOpener.enabled", true); defaultPref("dom.disable_window_move_resize", true); defaultPref("dom.disable_beforeunload", true); defaultPref("dom.popup_maximum", 4); defaultPref("dom.vr.enabled", false); defaultPref("dom.vibrator.enabled", false); defaultPref("network.stricttransportsecurity.preloadlist", false); defaultPref("browser.ssl_override_behavior", 1); defaultPref("security.tls.version.fallback-limit", 3); defaultPref("browser.xul.error_pages.expert_bad_cert", true); // advanced ui infos defaultPref("extensions.enabledScopes", 5); defaultPref("extensions.autoDisableScopes", 11); defaultPref("xpinstall.signatures.devInfoURL", ""); defaultPref("security.cert_pinning.enforcement_level", 2); defaultPref("devtools.performance.recording.ui-base-url", "http://localhost:55555"); // Default Value : https://profiler.firefox.com defaultPref("devtools.devices.url", ""); defaultPref("devtools.remote.adb.extensionURL", ""); // [FF64+] defaultPref("devtools.remote.adb.extensionID", ""); // default adb@mozilla.org [FF64+] defaultPref("browser.safebrowsing.blockedURIs.enabled", false); defaultPref("browser.safebrowsing.provider.google4.gethashURL", "") defaultPref("browser.safebrowsing.provider.google4.updateURL", ""); defaultPref("browser.safebrowsing.provider.google.gethashURL", ""); defaultPref("browser.safebrowsing.provider.google.updateURL", ""); defaultPref("browser.safebrowsing.provider.mozilla.updateURL", ""); defaultPref("browser.safebrowsing.provider.mozilla.gethashURL", ""); defaultPref("browser.safebrowsing.reportPhishURL", ""); defaultPref("browser.safebrowsing.malware.enabled", false); defaultPref("browser.safebrowsing.passwords.enabled", false); defaultPref("browser.safebrowsing.phishing.enabled", false); defaultPref("browser.urlbar.trimURLs", false); defaultPref("browser.search.suggest.enabled", false); defaultPref("browser.search.region", "US"); defaultPref("browser.urlbar.suggest.searches", false); defaultPref("browser.search.update", false); defaultPref("browser.contentblocking.cryptomining.preferences.ui.enabled", false); // enable UI elements of TP if you want to use it defaultPref("browser.contentblocking.fingerprinting.preferences.ui.enabled", false); // enable UI elements of TP if you want to use it defaultPref("privacy.trackingprotection.cryptomining.enabled", false); // user can manually choose what to do once he enables UI with the above prefs defaultPref("privacy.trackingprotection.fingerprinting.enabled", false); // user can manually choose what to do once he enables UI with the above prefs ``` 07070100000011000081A4000000000000000000000001670164170000779D000000000000000000000000000000000000001E00000000settings-master/librewolf.cfg /** LIBREWOLF SETTINGS * * take the time to read and understand, but also to customize the settings to find your own setup. * the answers to the most common questions can be found at https://librewolf.net/docs/faq/. * * WARNING: make sure the first line of this file is empty. this is a known bug. */ lockPref("librewolf.cfg.version", "8.5"); /** INDEX * * The file is organized in categories, and each one has a number of sections: * * * - PRIVACY [ISOLATION, SANITIZING, CACHE AND STORAGE, HISTORY AND SESSION RESTORE, QUERY STRIPPING] * * - NETWORKING [HTTPS, REFERERS, WEBRTC, PROXY, DNS, DOH, PREFETCHING AND SPECULATIVE CONNECTIONS] * * - FINGERPRINTING [RFP, WEBGL] * * - SECURITY [SITE ISOLATION, CERTIFICATES, TLS/SSL, PERMISSIONS, SAFE BROWSING, OTHERS] * * - REGION [LOCATION, LANGUAGE] * * - BEHAVIOR [DRM, SEARCH AND URLBAR, DOWNLOADS, AUTOPLAY, POP-UPS AND WINDOWS, MOUSE, MACHINE LEARNING] * * - EXTENSIONS [USER INSTALLED, SYSTEM, EXTENSION FIREWALL] * * - BUILT-IN FEATURES [UPDATER, SYNC, LOCKWISE, CONTAINERS, DEVTOOLS, SHOPPING, OTHERS] * * - UI [BRANDING, HANDLERS, FIRST LAUNCH, NEW TAB PAGE, ABOUT, RECOMMENDED] * * - TELEMETRY * * - WINDOWS [UPDATES, OTHERS] * */ /** [CATEGORY] PRIVACY */ /** [SECTION] ISOLATION * default to strict mode, which includes: * 1. dFPI for both normal and private windows * 2. strict blocking lists for trackers * 3. shims to avoid breakage caused by blocking lists * 4. stricter policies for xorigin referrers * 5. dFPI specific cookie cleaning mechanism * 6. query stripping * * the desired category must be set with pref() otherwise it won't stick. * the UI that allows to change mode manually is hidden. */ pref("browser.contentblocking.category", "strict"); // enable APS defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage", true); defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", false); /** [SECTION] SANITIZING * all the cleaning prefs true by default except for siteSetting and offlineApps, * which is what we want. users should set manual exceptions in the UI if there * are cookies they want to keep. */ defaultPref("privacy.clearOnShutdown.offlineApps", true); defaultPref("privacy.sanitize.sanitizeOnShutdown", true); defaultPref("privacy.sanitize.timeSpan", 0); // Sanitize on Shutdown, see: https://support.mozilla.org/en-US/questions/1275887 defaultPref("privacy.clearOnShutdown.sessions", false); defaultPref("privacy.clearOnShutdown.history", false); // The sanitation settings have actually changed.. defaultPref("privacy.sanitize.clearOnShutdown.hasMigratedToNewPrefs2",true); defaultPref("privacy.clearOnShutdown_v2.historyFormDataAndDownloads", false); /** [SECTION] CACHE AND STORAGE */ defaultPref("browser.cache.disk.enable", false); // disable disk cache /** prevent media cache from being written to disk in pb, but increase max cache size to avoid playback issues */ defaultPref("browser.privatebrowsing.forceMediaMemoryCache", true); defaultPref("media.memory_cache_max_size", 65536); defaultPref("browser.shell.shortcutFavicons", false); // disable favicons in profile folder defaultPref("browser.helperApps.deleteTempFileOnExit", true); // delete temporary files opened with external apps /** [SECTION] HISTORY AND SESSION RESTORE * since we hide the UI for modes other than custom we want to reset it for * everyone. same thing for always on PB mode. */ pref("privacy.history.custom", true); pref("browser.privatebrowsing.autostart", false); defaultPref("browser.formfill.enable", false); // disable form history defaultPref("browser.sessionstore.privacy_level", 2); // prevent websites from storing session data like cookies and forms /** [SECTION] QUERY STRIPPING * currently we set the same query stripping list that brave uses: * https://github.com/brave/brave-core/blob/f337a47cf84211807035581a9f609853752a32fb/browser/net/brave_site_hacks_network_delegate_helper.cc#L29 */ defaultPref("privacy.query_stripping.strip_list", "__hsfp __hssc __hstc __s _hsenc _openstat dclid fbclid gbraid gclid hsCtaTracking igshid mc_eid ml_subscriber ml_subscriber_hash msclkid oft_c oft_ck oft_d oft_id oft_ids oft_k oft_lk oft_sk oly_anon_id oly_enc_id rb_clickid s_cid twclid vero_conv vero_id wbraid wickedid yclid"); /** * librewolf specific pref that allows to include the query stripping lists in uBO by default. * the asset file is fetched every 7 days. */ defaultPref("librewolf.uBO.assetsBootstrapLocation", "https://gitlab.com/librewolf-community/browser/source/-/raw/main/assets/uBOAssets.json"); /** [SECTION] LOGGING * these prefs are off by default in the official Mozilla builds, * so it only makes sense that we also disable them. * See https://gitlab.com/librewolf-community/settings/-/issues/240 */ pref("browser.dom.window.dump.enabled", false); pref("devtools.console.stdout.chrome", false); /** [CATEGORY] NETWORKING */ /** [SECTION] HTTPS */ defaultPref("dom.security.https_only_mode", true); // only allow https in all windows, including private browsing defaultPref("network.auth.subresource-http-auth-allow", 1); // block HTTP authentication credential dialogs /** [SECTION] REFERERS * to enhance privacy but keep a certain level of usability we trim cross-origin * referers to only send scheme, host and port, instead of completely avoid sending them. * as a general rule, the behavior of referes which are not cross-origin should not * be changed. */ defaultPref("network.http.referer.XOriginTrimmingPolicy", 2); /** [SECTION] WEBRTC * there is no point in disabling webrtc as mDNS protects the private IP on linux, osx and win10+. * the private IP address is only used in trusted environments, eg. allowed camera and mic access. */ defaultPref("media.peerconnection.ice.default_address_only", true); // use a single interface for ICE candidates, the vpn one when a vpn is used /** [SECTION] PROXY */ defaultPref("network.gio.supported-protocols", ""); // disable gio as it could bypass proxy defaultPref("network.file.disable_unc_paths", true); // hidden, disable using uniform naming convention to prevent proxy bypass defaultPref("network.proxy.socks_remote_dns", true); // forces dns query through the proxy when using one defaultPref("media.peerconnection.ice.proxy_only_if_behind_proxy", true); // force webrtc inside proxy when one is used /** [SECTION] DNS */ defaultPref("network.dns.disablePrefetch", true); // disable dns prefetching defaultPref("network.dns.skipTRR-when-parental-control-enabled", false); // Arkenfox user.js v117 /** [SECTION] DOH */ // The current DoH providers are: // -> LibreDNS, Quad9, Wikimedia, dns4all, Mullvad. // For more providers: https://github.com/curl/curl/wiki/DNS-over-HTTPS defaultPref("doh-rollout.provider-list", `[ { "UIName": "Quad9 (No Filtering)", "uri": "https://dns10.quad9.net/dns-query" }, { "UIName": "Quad9 (Malware blocking)", "uri": "https://dns.quad9.net/dns-query" }, { "UIName": "LibreDNS (No Filtering)", "uri": "https://doh.libredns.gr/dns-query" }, { "UIName": "LibreDNS (Adblocking)", "uri": "https://doh.libredns.gr/noads" }, { "UIName": "Wikimedia DNS (No Filtering)", "uri": "https://wikimedia-dns.org/dns-query" }, { "UIName": "DNS4All (No Filtering)", "uri": "https://doh.dns4all.eu/dns-query" }, { "UIName": "Mullvad (No Filtering)", "uri": "https://dns.mullvad.net/dns-query" } ]`); /** * librewolf does use DoH: * * the possible modes are: * 0 = default * 1 = browser picks faster * 2 = DoH with system dns fallback * 3 = DoH without fallback * 5 = DoH is off, default currently */ defaultPref("network.trr.mode", 5); // DoH is turned off. defaultPref("network.trr.uri", "https://dns10.quad9.net/dns-query"); // Current 'reasonable default' proposal: NON-malware-blocking quad9 endpoint. // Additions by Acideburn in https://codeberg.org/librewolf/issues/issues/1975 defaultPref("network.trr.strict_native_fallback", false); // Allow native fallback defaultPref("network.trr.retry_on_recoverable_errors", true); // Retry on recoverable errors defaultPref("network.trr.disable-heuristics", true); // Disables the canary telemetry detection request "use-application-dns.net" for DOH defaultPref("network.trr.default_provider_uri", "https://doh.dns4all.eu/dns-query"); // Define a fallback DoH server defaultPref("network.trr.allow-rfc1918", true); // Allows the use of private IP addresses (RFC 1918) in DOH responses /** [SECTION] PREFETCHING AND SPECULATIVE CONNECTIONS * disable prefecthing for different things such as links, bookmarks and predictions. */ pref("network.predictor.enabled", false); pref("network.prefetch-next", false); pref("network.http.speculative-parallel-limit", 0); defaultPref("browser.places.speculativeConnect.enabled", false); // disable speculative connections and domain guessing from the urlbar defaultPref("browser.urlbar.speculativeConnect.enabled", false); /** [CATEGORY] FINGERPRINTING */ /** [SECTION] RFP * librewolf should stick to RFP for fingerprinting. we should not set prefs that interfere with it * and disabling API for no good reason will be counter productive, so it should also be avoided. */ defaultPref("privacy.resistFingerprinting", true); // rfp related settings defaultPref("privacy.resistFingerprinting.block_mozAddonManager", true); // prevents rfp from breaking AMO defaultPref("browser.display.use_system_colors", false); // default, except Win /** * increase the size of new RFP windows for better usability, while still using a rounded value. * if the screen resolution is lower it will stretch to the biggest possible rounded value. * also, expose hidden letterboxing pref but do not enable it for now. */ defaultPref("privacy.window.maxInnerWidth", 1600); defaultPref("privacy.window.maxInnerHeight", 900); defaultPref("privacy.resistFingerprinting.letterboxing", false); // this ensures there is no rounding error when computing the window size, see #1569. defaultPref("browser.toolbars.bookmarks.visibility", "always"); // Enable GPC ( see issue: https://codeberg.org/librewolf/issues/issues/1840 ) defaultPref("privacy.globalprivacycontrol.enabled", true); defaultPref("privacy.globalprivacycontrol.pbmode.enabled", true); defaultPref("privacy.globalprivacycontrol.functionality.enabled", true); /** [SECTION] WEBGL */ defaultPref("webgl.disabled", true); /** [CATEGORY] SECURITY */ /** [SECTION] CERTIFICATES */ defaultPref("security.cert_pinning.enforcement_level", 2); // enable strict public key pinning, might cause issues with AVs /** * enable safe negotiation and show warning when it is not supported. might cause breakage * if the the server does not support RFC 5746, in tha case SSL_ERROR_UNSAFE_NEGOTIATION * will be shown. */ defaultPref("security.ssl.require_safe_negotiation", true); defaultPref("security.ssl.treat_unsafe_negotiation_as_broken", true); /** * our strategy with revocation is to perform all possible checks with CRL, but when a cert * cannot be checked with it we use OCSP stapled with hard-fail, to still keep privacy and * increase security. * crlite is in mode 3 by default, which allows us to detect false positive with OCSP. * in v103, when crlite is fully mature, it will switch to mode 2 and no longer double-check. */ defaultPref("security.remote_settings.crlite_filters.enabled", true); defaultPref("security.OCSP.require", true); // set to hard-fail, might cause SEC_ERROR_OCSP_SERVER_ERROR /** [SECTION] TLS/SSL */ pref("security.tls.enable_0rtt_data", false); // disable 0 RTT to improve tls 1.3 security pref("security.tls.version.enable-deprecated", false); // make TLS downgrades session only by enforcing it with pref(), default defaultPref("browser.xul.error_pages.expert_bad_cert", true); // show relevant and advanced issues on warnings and error screens /** [SECTION] PERMISSIONS */ pref("permissions.delegation.enabled", false); // force permission request to show real origin pref("permissions.manager.defaultsUrl", ""); // revoke special permissions for some mozilla domains /** [SECTION] SAFE BROWSING * disable safe browsing, including the fetch of updates. reverting the 7 prefs below * allows to perform local checks and to fetch updated lists from google. */ defaultPref("browser.safebrowsing.allowOverride", false); defaultPref("browser.safebrowsing.malware.enabled", false); defaultPref("browser.safebrowsing.phishing.enabled", false); defaultPref("browser.safebrowsing.blockedURIs.enabled", false); defaultPref("browser.safebrowsing.provider.google4.gethashURL", ""); defaultPref("browser.safebrowsing.provider.google4.updateURL", ""); defaultPref("browser.safebrowsing.provider.google.gethashURL", ""); defaultPref("browser.safebrowsing.provider.google.updateURL", ""); /** * disable safe browsing checks on downloads, both local and remote. the resetting prefs * control remote checks, while the first one is for local checks only. */ defaultPref("browser.safebrowsing.downloads.enabled", false); pref("browser.safebrowsing.downloads.remote.enabled", false); pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false); pref("browser.safebrowsing.downloads.remote.block_uncommon", false); defaultPref("browser.safebrowsing.downloads.remote.block_dangerous", false); defaultPref("browser.safebrowsing.downloads.remote.block_dangerous_host", false); // empty for defense in depth pref("browser.safebrowsing.downloads.remote.url", ""); pref("browser.safebrowsing.provider.google4.dataSharingURL", ""); // Handle Google and Mozilla safebrowsing settings defaultPref("browser.safebrowsing.provider.google.advisoryName", ""); defaultPref("browser.safebrowsing.provider.google.advisoryURL", ""); defaultPref("browser.safebrowsing.provider.google.lists", ""); defaultPref("browser.safebrowsing.provider.google.reportURL", ""); defaultPref("browser.safebrowsing.provider.google4.advisoryName", ""); defaultPref("browser.safebrowsing.provider.google4.advisoryURL", ""); defaultPref("browser.safebrowsing.provider.google4.lists", ""); defaultPref("browser.safebrowsing.provider.google4.reportURL", ""); defaultPref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", ""); defaultPref("browser.safebrowsing.provider.google.reportPhishMistakeURL", ""); defaultPref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", ""); defaultPref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", ""); defaultPref("browser.safebrowsing.provider.mozilla.gethashURL", ""); defaultPref("browser.safebrowsing.provider.mozilla.lists", ""); defaultPref("browser.safebrowsing.provider.mozilla.updateURL", ""); defaultPref("browser.safebrowsing.reportPhishURL", ""); /** [SECTION] OTHERS */ defaultPref("network.IDN_show_punycode", true); // use punycode in idn to prevent spoofing defaultPref("pdfjs.enableScripting", false); // disable js scripting in the built-in pdf reader /** [CATEGORY] REGION */ /** [SECTION] LOCATION * replace google with mozilla as the default geolocation provide and prevent use of OS location services */ defaultPref("geo.provider.network.url", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%"); defaultPref("geo.provider.ms-windows-location", false); // [WINDOWS] defaultPref("geo.provider.use_corelocation", false); // [MAC] defaultPref("geo.provider.use_gpsd", false); // [LINUX] defaultPref("geo.provider.use_geoclue", false); // [LINUX] /** [SECTION] LANGUAGE * show language as en-US for all users, regardless of their OS language and browser language. * both prefs must use pref() and not defaultPref to work. */ pref("javascript.use_us_english_locale", true); pref("intl.accept_languages", "en-US, en"); // disable region specific updates from mozilla pref("browser.region.network.url", ""); pref("browser.region.update.enabled", false); /** [CATEGORY] BEHAVIOR */ /** [SECTION] DRM */ defaultPref("media.eme.enabled", false); // master switch for drm content defaultPref("media.gmp-manager.url", "data:text/plain,"); // prevent checks for plugin updates when drm is disabled // disable the widevine and the openh264 plugins defaultPref("media.gmp-provider.enabled", false); defaultPref("media.gmp-gmpopenh264.enabled", false); // but allow h264 itself. defaultPref("media.webrtc.hw.h264.enabled", true); /** [SECTION] SEARCH AND URLBAR * disable search suggestion and do not update opensearch engines. */ defaultPref("browser.urlbar.suggest.searches", false); defaultPref("browser.search.suggest.enabled", false); defaultPref("browser.search.update", false); defaultPref("browser.search.separatePrivateDefault", true); // [FF70+] // Arkenfox user.js v119 defaultPref("browser.search.separatePrivateDefault.ui.enabled", true); // [FF71+] // Arkenfox user.js v119 defaultPref("browser.search.serpEventTelemetry.enabled",false); defaultPref("browser.urlbar.suggest.mdn", true); defaultPref("browser.urlbar.addons.featureGate", false); defaultPref("browser.urlbar.mdn.featureGate", false); defaultPref("browser.urlbar.pocket.featureGate", false); defaultPref("browser.urlbar.trending.featureGate", false); defaultPref("browser.urlbar.weather.featureGate", false); // these are from Arkenfox, I decided to put them here. defaultPref("browser.download.start_downloads_in_tmp_dir", true); // Arkenfox user.js v118 /** * the pref disables the whole feature and hide it from the ui * (as noted in https://bugzilla.mozilla.org/show_bug.cgi?id=1755057). * this also includes the best match feature, as it is part of firefox suggest. */ pref("browser.urlbar.quicksuggest.enabled", false); defaultPref("browser.urlbar.suggest.weather", false); // disable weather suggestions in urlbar once they are no longer behind feature gate // Allows the user to add a custom search engine in the settings. defaultPref("browser.urlbar.update2.engineAliasRefresh", true); /** [SECTION] DOWNLOADS * user interaction should always be required for downloads, as a way to enhance security by asking * the user to specific a certain save location. */ defaultPref("browser.download.useDownloadDir", false); defaultPref("browser.download.autohideButton", false); // do not hide download button automatically defaultPref("browser.download.manager.addToRecentDocs", false); // do not add downloads to recents defaultPref("browser.download.alwaysOpenPanel", false); // do not expand toolbar menu for every download, we already have enough interaction /** [SECTION] AUTOPLAY * block autoplay unless element is right-clicked. this means background videos, videos in a different tab, * or media opened while other media is played will not start automatically. * thumbnails will not autoplay unless hovered. exceptions can be set from the UI. */ defaultPref("media.autoplay.default", 5); /** [SECTION] POP-UPS AND WINDOWS * prevent scripts from resizing existing windows and opening new ones, by forcing them into * new tabs that can't be resized as well. */ defaultPref("dom.disable_window_move_resize", true); defaultPref("browser.link.open_newwindow", 3); defaultPref("browser.link.open_newwindow.restriction", 0); /** [SECTION] MOUSE */ defaultPref("browser.tabs.searchclipboardfor.middleclick", false); // prevent mouse middle click on new tab button to trigger searches or page loads /** [SECTION] MACHINE LEARNING **/ // See ticket: #1919 - LibreWolf should delete all AI code - https://codeberg.org/librewolf/issues/issues/1919 defaultPref("browser.ml.enable", false); defaultPref("browser.ml.chat.enabled", false); // Hide from UI defaultPref("browser.ml.chat.hideFromLabs", true); defaultPref("browser.ml.chat.hideLabsShortcuts", true); /** [CATEGORY] EXTENSIONS */ /** [SECTION] USER INSTALLED * extensions are allowed to operate on restricted domains, while their scope * is set to profile+applications (https://mike.kaply.com/2012/02/21/understanding-add-on-scopes/). * an installation prompt should always be displayed. */ defaultPref("extensions.webextensions.restrictedDomains", ""); defaultPref("extensions.enabledScopes", 5); // hidden defaultPref("extensions.postDownloadThirdPartyPrompt", false); /** * the pref disables quarantined domains. * this is a security feature, we should remove it with v116 as there will be a UI to control this per-extension. * unless we patch remote settings we rely on static dumps. this means even if we did not flip this pref it would * not make a difference at the moment. */ defaultPref("extensions.quarantinedDomains.enabled", false); /** [SECTION] SYSTEM * built-in extension are not allowed to auto-update. additionally the reporter extension * of webcompat is disabled. urls are stripped for defense in depth. */ defaultPref("extensions.systemAddon.update.enabled", false); defaultPref("extensions.systemAddon.update.url", ""); lockPref("extensions.webcompat-reporter.enabled", false); lockPref("extensions.webcompat-reporter.newIssueEndpoint", ""); /** [SECTION] EXTENSION FIREWALL * the firewall can be enabled with the below prefs, but it is not a sane default: * defaultPref("extensions.webextensions.base-content-security-policy", "default-src 'none'; script-src 'none'; object-src 'none';"); * defaultPref("extensions.webextensions.base-content-security-policy.v3", "default-src 'none'; script-src 'none'; object-src 'none';"); */ /** [CATEGORY] BUILT-IN FEATURES */ /** [SECTION] UPDATER * since we do not bake auto-updates in the browser it doesn't make sense at the moment. */ lockPref("app.update.auto", false); /** [SECTION] SYNC * this functionality is disabled by default but it can be activated in one click. * this pref fully controls the feature, including its ui. */ defaultPref("identity.fxaccounts.enabled", false); /** [SECTION] LOCKWISE * disable the default password manager built into the browser, including its autofill * capabilities and formless login capture. */ defaultPref("signon.rememberSignons", false); defaultPref("signon.autofillForms", false); defaultPref("extensions.formautofill.addresses.enabled", false); defaultPref("extensions.formautofill.creditCards.enabled", false); defaultPref("signon.formlessCapture.enabled", false); /** [SECTION] CONTAINERS * enable containers and show the settings to control them in the stock ui */ defaultPref("privacy.userContext.enabled", true); defaultPref("privacy.userContext.ui.enabled", true); /** [SECTION] DEVTOOLS * disable remote debugging. */ pref("devtools.debugger.remote-enabled", false); // default, but subject to branding so keep it defaultPref("devtools.selfxss.count", 0); // required for devtools console to work /** [SECTION] SHOPPING * disable the fakespot shopping sidebar */ defaultPref("browser.shopping.experience2023.enabled", false); defaultPref("browser.shopping.experience2023.optedIn", 2); defaultPref("browser.shopping.experience2023.active", false); /** [SECTION] OTHERS */ pref("webchannel.allowObject.urlWhitelist", ""); // remove web channel whitelist defaultPref("services.settings.server", "https://%.invalid") // set the remote settings URL (REMOTE_SETTINGS_SERVER_URL in the code) /** [CATEGORY] UI */ /** [SECTION] BRANDING * set librewolf support and releases urls in the UI, so that users land in the proper places. */ defaultPref("app.support.baseURL", "https://support.librewolf.net/"); defaultPref("browser.search.searchEnginesURL", "https://librewolf.net/docs/faq/#how-do-i-add-a-search-engine"); defaultPref("browser.geolocation.warning.infoURL", "https://librewolf.net/docs/faq/#how-do-i-enable-location-aware-browsing"); defaultPref("app.feedback.baseURL", "https://librewolf.net/#questions"); defaultPref("app.releaseNotesURL", "https://gitlab.com/librewolf-community/browser"); defaultPref("app.releaseNotesURL.aboutDialog", "https://gitlab.com/librewolf-community/browser"); defaultPref("app.update.url.details", "https://gitlab.com/librewolf-community/browser"); defaultPref("app.update.url.manual", "https://gitlab.com/librewolf-community/browser"); /** [SECTION] FIRST LAUNCH * disable what's new and ui tour on first start and updates. the browser * should also not stress user about being the default one. */ defaultPref("browser.startup.homepage_override.mstone", "ignore"); defaultPref("startup.homepage_override_url", "about:blank"); defaultPref("startup.homepage_welcome_url", "about:blank"); defaultPref("startup.homepage_welcome_url.additional", ""); lockPref("browser.messaging-system.whatsNewPanel.enabled", false); lockPref("browser.uitour.enabled", false); lockPref("browser.uitour.url", ""); defaultPref("browser.shell.checkDefaultBrowser", false); /** [SECTION] NEW TAB PAGE * we want NTP to display nothing but the search bar without anything distracting. * the three prefs below are just for minimalism and they should be easy to revert for users. */ defaultPref("browser.newtabpage.activity-stream.section.highlights.includeDownloads", false); defaultPref("browser.newtabpage.activity-stream.section.highlights.includeVisited", false); defaultPref("browser.newtabpage.activity-stream.feeds.topsites", false); // hide stories and sponsored content from Firefox Home lockPref("browser.newtabpage.activity-stream.feeds.section.topstories", false); lockPref("browser.newtabpage.activity-stream.showSponsored", false); lockPref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); // disable telemetry in Firefox Home lockPref("browser.newtabpage.activity-stream.feeds.telemetry", false); lockPref("browser.newtabpage.activity-stream.telemetry", false); // hide stories UI in about:preferences#home, empty highlights list lockPref("browser.newtabpage.activity-stream.feeds.section.topstories.options", "{\"hidden\":true}"); lockPref("browser.newtabpage.activity-stream.default.sites", ""); // disable weather info fetching (ticket #2048) defaultPref("browser.newtabpage.activity-stream.feeds.weatherfeed", false); defaultPref("browser.newtabpage.activity-stream.showWeather", false); /** [SECTION] ABOUT * remove annoying ui elements from the about pages, including about:protections */ defaultPref("browser.contentblocking.report.lockwise.enabled", false); lockPref("browser.contentblocking.report.hide_vpn_banner", true); lockPref("browser.contentblocking.report.vpn.enabled", false); lockPref("browser.contentblocking.report.show_mobile_app", false); lockPref("browser.vpn_promo.enabled", false); lockPref("browser.promo.focus.enabled", false); // ...about:addons recommendations sections and more defaultPref("extensions.htmlaboutaddons.recommendations.enabled", false); defaultPref("extensions.getAddons.showPane", false); defaultPref("lightweightThemes.getMoreURL", ""); // disable button to get more themes // ...about:preferences#home defaultPref("browser.topsites.useRemoteSetting", false); // hide sponsored shortcuts button // ...and about:config defaultPref("browser.aboutConfig.showWarning", false); // hide about:preferences#moreFromMozilla defaultPref("browser.preferences.moreFromMozilla", false); /** [SECTION] RECOMMENDED * disable all "recommend as you browse" activity. */ lockPref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); lockPref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); /** [CATEGORY] TELEMETRY * telemetry is already disabled elsewhere and most of the stuff in here is just for redundancy. */ lockPref("toolkit.telemetry.unified", false); // master switch lockPref("toolkit.telemetry.enabled", false); // master switch lockPref("toolkit.telemetry.server", "data:,"); lockPref("toolkit.telemetry.archive.enabled", false); lockPref("toolkit.telemetry.newProfilePing.enabled", false); lockPref("toolkit.telemetry.updatePing.enabled", false); lockPref("toolkit.telemetry.firstShutdownPing.enabled", false); lockPref("toolkit.telemetry.shutdownPingSender.enabled", false); lockPref("toolkit.telemetry.bhrPing.enabled", false); lockPref("toolkit.telemetry.cachedClientID", ""); lockPref("toolkit.telemetry.previousBuildID", ""); lockPref("toolkit.telemetry.server_owner", ""); lockPref("toolkit.coverage.opt-out", true); // hidden lockPref("toolkit.telemetry.coverage.opt-out", true); // hidden lockPref("toolkit.coverage.enabled", false); lockPref("toolkit.coverage.endpoint.base", ""); lockPref("toolkit.crashreporter.infoURL", ""); lockPref("datareporting.healthreport.uploadEnabled", false); lockPref("datareporting.policy.dataSubmissionEnabled", false); lockPref("security.protectionspopup.recordEventTelemetry", false); lockPref("browser.ping-centre.telemetry", false); // opt-out of normandy and studies lockPref("app.normandy.enabled", false); lockPref("app.normandy.api_url", ""); lockPref("app.shield.optoutstudies.enabled", false); // disable personalized extension recommendations lockPref("browser.discovery.enabled", false); // disable crash report lockPref("browser.tabs.crashReporting.sendReport", false); lockPref("breakpad.reportURL", ""); // disable connectivity checks pref("network.connectivity-service.enabled", false); // disable captive portal pref("network.captive-portal-service.enabled", false); pref("captivedetect.canonicalURL", ""); // disable Privacy-Preserving Attribution pref("dom.private-attribution.submission.enabled", false); /** [CATEGORY] WINDOWS * the prefs in this section only apply to windows installations and they don't have any * effect on linux, macos and bsd users. */ /** [SECTION] UPDATES * disable windows specific update services. */ lockPref("app.update.service.enabled", false); defaultPref("app.update.background.scheduling.enabled", false); /** [SECTION] OTHERS */ lockPref("default-browser-agent.enabled", false); // disable windows specific telemetry defaultPref("network.protocol-handler.external.ms-windows-store", false); // prevent links from launching windows store pref("toolkit.winRegisterApplicationRestart", false); // disable automatic start and session restore after reboot lockPref("security.family_safety.mode", 2); // Remove pre-Win10-specific codepath /** [CATEGORY] OVERRIDES * allow settings to be overriden with a file placed in the right location * https://librewolf.net/docs/settings/#where-do-i-find-my-librewolfoverridescfg */ let profile_directory; if (profile_directory = getenv('USERPROFILE') || getenv('HOME')) { defaultPref('autoadmin.global_config_url', `file://${profile_directory}/.librewolf/librewolf.overrides.cfg`); } 070701000000120000A1FF000000000000000000000001670164170000000D000000000000000000000000000000000000002100000000settings-master/librewolf.cfg.jslibrewolf.cfg07070100000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000B00000000TRAILER!!!333 blocks
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor