minimize number of prefs, fix accessibility issues
This commit is contained in:
parent
4445fa8ee9
commit
2f9f56d8ff
2 changed files with 38 additions and 25 deletions
|
|
@ -1,19 +1,42 @@
|
||||||
This changelog will be used from now on to document changes in a precise manner, with a list of changes for each setting version.
|
This changelog will be used from now on to document changes in a precise manner, with a list of changes for each setting version.
|
||||||
Setting versions are documented using the pref `librewolf.cfg.version`, available in about:config.
|
Setting versions are documented using the pref `librewolf.cfg.version`, available in about:config.
|
||||||
|
|
||||||
# 6.10
|
# 7.0
|
||||||
|
|
||||||
**target commit**:
|
**target commit**:
|
||||||
|
|
||||||
**base librewolf version**: 104.x
|
**base librewolf version**: 105.x
|
||||||
|
|
||||||
**References**:
|
**References**:
|
||||||
|
|
||||||
- [enable APS](https://github.com/arkenfox/user.js/issues/1530#issuecomment-1242850653);
|
- [enable APS](https://github.com/arkenfox/user.js/issues/1530#issuecomment-1242850653);
|
||||||
|
- trim unnecessary or default NTP prefs, tidy existing ones;
|
||||||
|
- stick to default session restore interval for writes;
|
||||||
|
- remove a bunch of default prefs that have been that way for the longest;
|
||||||
|
- offer accessibility by default.
|
||||||
|
|
||||||
#### Added preferences
|
#### Added preferences
|
||||||
```
|
```
|
||||||
defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage", true);
|
defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage", true);
|
||||||
|
defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", false);
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Removed preferences
|
||||||
|
```
|
||||||
|
defaultPref("browser.newtab.preload", false);
|
||||||
|
lockPref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false);
|
||||||
|
lockPref("browser.newtabpage.activity-stream.discoverystream.enabled", false);
|
||||||
|
lockPref("browser.newtabpage.activity-stream.feeds.snippets", false); // default
|
||||||
|
lockPref("browser.newtabpage.activity-stream.feeds.system.topstories", false);
|
||||||
|
defaultPref("browser.sessionstore.interval", 60000); // increase time between session saves
|
||||||
|
defaultPref("network.http.windows-sso.enabled", false); // default
|
||||||
|
defaultPref("privacy.partition.serviceWorkers", true); // default v105+
|
||||||
|
defaultPref("accessibility.force_disabled", 1); // block accessibility services
|
||||||
|
lockPref("toolkit.telemetry.shutdownPingSender.enabledFirstSession", false); // default
|
||||||
|
lockPref("toolkit.telemetry.reportingpolicy.firstRun", false); // default
|
||||||
|
defaultPref("network.http.referer.XOriginPolicy", 0); // default
|
||||||
|
lockPref("browser.safebrowsing.passwords.enabled", false); // default
|
||||||
|
lockPref("browser.safebrowsing.provider.google4.dataSharing.enabled", false); // default
|
||||||
```
|
```
|
||||||
|
|
||||||
# 6.9
|
# 6.9
|
||||||
|
|
|
||||||
|
|
@ -6,7 +6,7 @@
|
||||||
*
|
*
|
||||||
* WARNING: please make sure the first line of this file is empty. this is a known bug.
|
* WARNING: please make sure the first line of this file is empty. this is a known bug.
|
||||||
*/
|
*/
|
||||||
defaultPref("librewolf.cfg.version", "6.10");
|
defaultPref("librewolf.cfg.version", "7.0");
|
||||||
|
|
||||||
|
|
||||||
/** INDEX
|
/** INDEX
|
||||||
|
|
@ -42,8 +42,9 @@ defaultPref("librewolf.cfg.version", "6.10");
|
||||||
* the UI that allows to change mode manually is hidden.
|
* the UI that allows to change mode manually is hidden.
|
||||||
*/
|
*/
|
||||||
pref("browser.contentblocking.category", "strict");
|
pref("browser.contentblocking.category", "strict");
|
||||||
defaultPref("privacy.partition.serviceWorkers", true); // default v105+
|
// enable APS
|
||||||
defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage", true); // enable APS
|
defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage", true);
|
||||||
|
defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", false);
|
||||||
|
|
||||||
/** [SECTION] SANITIZING
|
/** [SECTION] SANITIZING
|
||||||
* all the cleaning prefs true by default except for siteSetting and offlineApps,
|
* all the cleaning prefs true by default except for siteSetting and offlineApps,
|
||||||
|
|
@ -72,7 +73,6 @@ pref("privacy.history.custom", true);
|
||||||
pref("browser.privatebrowsing.autostart", false);
|
pref("browser.privatebrowsing.autostart", false);
|
||||||
defaultPref("browser.formfill.enable", false); // disable form history
|
defaultPref("browser.formfill.enable", false); // disable form history
|
||||||
defaultPref("browser.sessionstore.privacy_level", 2); // prevent websites from storing session data like cookies and forms
|
defaultPref("browser.sessionstore.privacy_level", 2); // prevent websites from storing session data like cookies and forms
|
||||||
defaultPref("browser.sessionstore.interval", 60000); // increase time between session saves
|
|
||||||
|
|
||||||
/** [SECTION] QUERY STRIPPING
|
/** [SECTION] QUERY STRIPPING
|
||||||
* currently we set the same query stripping list that brave uses:
|
* currently we set the same query stripping list that brave uses:
|
||||||
|
|
@ -100,7 +100,6 @@ defaultPref("security.mixed_content.block_display_content", true); // block inse
|
||||||
* as a general rule, the behavior of referes which are not cross-origin should not
|
* as a general rule, the behavior of referes which are not cross-origin should not
|
||||||
* be changed.
|
* be changed.
|
||||||
*/
|
*/
|
||||||
defaultPref("network.http.referer.XOriginPolicy", 0); // default, might be worth changing to 2 to stop sending them completely
|
|
||||||
defaultPref("network.http.referer.XOriginTrimmingPolicy", 2); // trim referer to only send scheme, host and port
|
defaultPref("network.http.referer.XOriginTrimmingPolicy", 2); // trim referer to only send scheme, host and port
|
||||||
|
|
||||||
/** [SECTION] WEBRTC
|
/** [SECTION] WEBRTC
|
||||||
|
|
@ -160,7 +159,7 @@ defaultPref("privacy.resistFingerprinting", true);
|
||||||
// rfp related settings
|
// rfp related settings
|
||||||
defaultPref("privacy.resistFingerprinting.block_mozAddonManager", true); // prevents rfp from breaking AMO
|
defaultPref("privacy.resistFingerprinting.block_mozAddonManager", true); // prevents rfp from breaking AMO
|
||||||
defaultPref("browser.startup.blankWindow", false); // if set to true it breaks RFP windows resizing
|
defaultPref("browser.startup.blankWindow", false); // if set to true it breaks RFP windows resizing
|
||||||
defaultPref("browser.display.use_system_colors", false); // default but enforced due to RFP
|
defaultPref("browser.display.use_system_colors", false); // default except Windows
|
||||||
/**
|
/**
|
||||||
* increase the size of new RFP windows for better usability, while still using a rounded value.
|
* increase the size of new RFP windows for better usability, while still using a rounded value.
|
||||||
* if the screen resolution is lower it will stretch to the biggest possible rounded value.
|
* if the screen resolution is lower it will stretch to the biggest possible rounded value.
|
||||||
|
|
@ -228,10 +227,7 @@ lockPref("browser.safebrowsing.downloads.remote.enabled", false);
|
||||||
lockPref("browser.safebrowsing.downloads.remote.url", "");
|
lockPref("browser.safebrowsing.downloads.remote.url", "");
|
||||||
lockPref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
|
lockPref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
|
||||||
lockPref("browser.safebrowsing.downloads.remote.block_uncommon", false);
|
lockPref("browser.safebrowsing.downloads.remote.block_uncommon", false);
|
||||||
// other safe browsing options, all default but enforce
|
lockPref("browser.safebrowsing.provider.google4.dataSharingURL", ""); // empty for defense in depth
|
||||||
lockPref("browser.safebrowsing.passwords.enabled", false);
|
|
||||||
lockPref("browser.safebrowsing.provider.google4.dataSharing.enabled", false);
|
|
||||||
lockPref("browser.safebrowsing.provider.google4.dataSharingURL", "");
|
|
||||||
|
|
||||||
/** [SECTION] OTHERS */
|
/** [SECTION] OTHERS */
|
||||||
defaultPref("network.IDN_show_punycode", true); // use punycode in idn to prevent spoofing
|
defaultPref("network.IDN_show_punycode", true); // use punycode in idn to prevent spoofing
|
||||||
|
|
@ -386,7 +382,6 @@ defaultPref("devtools.selfxss.count", 0); // required for devtools console to wo
|
||||||
|
|
||||||
/** [SECTION] OTHERS */
|
/** [SECTION] OTHERS */
|
||||||
lockPref("browser.translation.engine", ""); // remove translation engine
|
lockPref("browser.translation.engine", ""); // remove translation engine
|
||||||
defaultPref("accessibility.force_disabled", 1); // block accessibility services
|
|
||||||
defaultPref("webchannel.allowObject.urlWhitelist", ""); // do not receive objects through webchannels
|
defaultPref("webchannel.allowObject.urlWhitelist", ""); // do not receive objects through webchannels
|
||||||
defaultPref("services.settings.server", "https://%.invalid") // set the remote settings URL (REMOTE_SETTINGS_SERVER_URL in the code)
|
defaultPref("services.settings.server", "https://%.invalid") // set the remote settings URL (REMOTE_SETTINGS_SERVER_URL in the code)
|
||||||
|
|
||||||
|
|
@ -420,24 +415,22 @@ lockPref("browser.uitour.url", "");
|
||||||
defaultPref("browser.shell.checkDefaultBrowser", false);
|
defaultPref("browser.shell.checkDefaultBrowser", false);
|
||||||
|
|
||||||
/** [SECTION] NEW TAB PAGE
|
/** [SECTION] NEW TAB PAGE
|
||||||
* we want the new tab page to display nothing but the search bar without anything distracting.
|
* we want NTP to display nothing but the search bar without anything distracting.
|
||||||
|
* the three prefs below are just for minimalism and they should be easy to revert for users.
|
||||||
*/
|
*/
|
||||||
defaultPref("browser.newtab.preload", false);
|
|
||||||
defaultPref("browser.newtabpage.activity-stream.section.highlights.includeDownloads", false);
|
defaultPref("browser.newtabpage.activity-stream.section.highlights.includeDownloads", false);
|
||||||
defaultPref("browser.newtabpage.activity-stream.section.highlights.includeVisited", false);
|
defaultPref("browser.newtabpage.activity-stream.section.highlights.includeVisited", false);
|
||||||
defaultPref("browser.newtabpage.activity-stream.feeds.topsites", false);
|
defaultPref("browser.newtabpage.activity-stream.feeds.topsites", false);
|
||||||
// hide pocket and sponsored content, from new tab page and search bar
|
// hide stories and sponsored content from Firefox Home
|
||||||
lockPref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
|
lockPref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
|
||||||
lockPref("browser.newtabpage.activity-stream.feeds.system.topstories", false);
|
|
||||||
lockPref("browser.newtabpage.activity-stream.feeds.telemetry", false);
|
|
||||||
lockPref("browser.newtabpage.activity-stream.feeds.section.topstories.options", "{\"hidden\":true}"); // hide buggy pocket section from about:preferences#home
|
|
||||||
lockPref("browser.newtabpage.activity-stream.showSponsored", false);
|
lockPref("browser.newtabpage.activity-stream.showSponsored", false);
|
||||||
lockPref("browser.newtabpage.activity-stream.showSponsoredTopSites", false);
|
lockPref("browser.newtabpage.activity-stream.showSponsoredTopSites", false);
|
||||||
|
// disable telemetry in Firefox Home
|
||||||
|
lockPref("browser.newtabpage.activity-stream.feeds.telemetry", false);
|
||||||
lockPref("browser.newtabpage.activity-stream.telemetry", false);
|
lockPref("browser.newtabpage.activity-stream.telemetry", false);
|
||||||
|
// hide stories UI in about:preferences#home, empty highlights list
|
||||||
|
lockPref("browser.newtabpage.activity-stream.feeds.section.topstories.options", "{\"hidden\":true}");
|
||||||
lockPref("browser.newtabpage.activity-stream.default.sites", "");
|
lockPref("browser.newtabpage.activity-stream.default.sites", "");
|
||||||
lockPref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false);
|
|
||||||
lockPref("browser.newtabpage.activity-stream.discoverystream.enabled", false);
|
|
||||||
lockPref("browser.newtabpage.activity-stream.feeds.snippets", false); // default
|
|
||||||
|
|
||||||
/** [SECTION] ABOUT
|
/** [SECTION] ABOUT
|
||||||
* remove annoying ui elements from the about pages, including about:protections
|
* remove annoying ui elements from the about pages, including about:protections
|
||||||
|
|
@ -480,9 +473,7 @@ lockPref("toolkit.telemetry.newProfilePing.enabled", false);
|
||||||
lockPref("toolkit.telemetry.updatePing.enabled", false);
|
lockPref("toolkit.telemetry.updatePing.enabled", false);
|
||||||
lockPref("toolkit.telemetry.firstShutdownPing.enabled", false);
|
lockPref("toolkit.telemetry.firstShutdownPing.enabled", false);
|
||||||
lockPref("toolkit.telemetry.shutdownPingSender.enabled", false);
|
lockPref("toolkit.telemetry.shutdownPingSender.enabled", false);
|
||||||
lockPref("toolkit.telemetry.shutdownPingSender.enabledFirstSession", false); // default
|
|
||||||
lockPref("toolkit.telemetry.bhrPing.enabled", false);
|
lockPref("toolkit.telemetry.bhrPing.enabled", false);
|
||||||
lockPref("toolkit.telemetry.reportingpolicy.firstRun", false); // default
|
|
||||||
lockPref("toolkit.telemetry.cachedClientID", "");
|
lockPref("toolkit.telemetry.cachedClientID", "");
|
||||||
lockPref("toolkit.telemetry.previousBuildID", "");
|
lockPref("toolkit.telemetry.previousBuildID", "");
|
||||||
lockPref("toolkit.telemetry.server_owner", "");
|
lockPref("toolkit.telemetry.server_owner", "");
|
||||||
|
|
@ -530,7 +521,6 @@ lockPref("default-browser-agent.enabled", false); // disable windows specific te
|
||||||
defaultPref("network.protocol-handler.external.ms-windows-store", false); // prevent links from launching windows store
|
defaultPref("network.protocol-handler.external.ms-windows-store", false); // prevent links from launching windows store
|
||||||
lockPref("toolkit.winRegisterApplicationRestart", false); // disable automatic start and session restore after reboot
|
lockPref("toolkit.winRegisterApplicationRestart", false); // disable automatic start and session restore after reboot
|
||||||
lockPref("security.family_safety.mode", 0); // disable win8.1 family safety cert
|
lockPref("security.family_safety.mode", 0); // disable win8.1 family safety cert
|
||||||
defaultPref("network.http.windows-sso.enabled", false); // disable MS auto authentication via sso
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Reference in a new issue