reorganized tracking section + 3rd set of changes
This commit is contained in:
parent
9fb2ec8971
commit
b2803cf75f
2 changed files with 863 additions and 0 deletions
29
Changelog.md
29
Changelog.md
|
|
@ -3,7 +3,19 @@
|
||||||
Previously missing, now added
|
Previously missing, now added
|
||||||
```
|
```
|
||||||
defaultPref("pdfjs.enableScripting", false);
|
defaultPref("pdfjs.enableScripting", false);
|
||||||
|
<<<<<<< HEAD
|
||||||
lockPref("browser.contentblocking.category", "custom"); // changing to other options is currently broken anyway
|
lockPref("browser.contentblocking.category", "custom"); // changing to other options is currently broken anyway
|
||||||
|
=======
|
||||||
|
lockPref("privacy.trackingprotection.testing.report_blocked_node", false);
|
||||||
|
lockPref("browser.contentblocking.report.endpoint_url", "");
|
||||||
|
lockPref("browser.contentblocking.report.monitor.home_page_url", "");
|
||||||
|
lockPref("browser.contentblocking.report.monitor.preferences", "");
|
||||||
|
lockPref("browser.contentblocking.report.vpn.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.vpn-promo.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.vpn-ios.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.vpn-android.url", "");
|
||||||
|
lockPref("browser.contentblocking.category", "custom");
|
||||||
|
>>>>>>> 034d451 (reorganized tracking section + 3rd set of changes)
|
||||||
lockPref("browser.contentblocking.cfr-milestone.enabled", false);
|
lockPref("browser.contentblocking.cfr-milestone.enabled", false);
|
||||||
lockPref("browser.contentblocking.database.enabled", false);
|
lockPref("browser.contentblocking.database.enabled", false);
|
||||||
lockPref("browser.contentblocking.cryptomining.preferences.ui.enabled", false);
|
lockPref("browser.contentblocking.cryptomining.preferences.ui.enabled", false);
|
||||||
|
|
@ -45,9 +57,15 @@ lockPref("network.http.referer.XOriginTrimmingPolicy", 2); // Previously set to
|
||||||
lockPref("network.http.referer.XOriginPolicy", 0); // Previously set to 1
|
lockPref("network.http.referer.XOriginPolicy", 0); // Previously set to 1
|
||||||
defaultPref("privacy.clearOnShutdown.offlineApps", false); // For consistency with new cookie behavior
|
defaultPref("privacy.clearOnShutdown.offlineApps", false); // For consistency with new cookie behavior
|
||||||
defaultPref("privacy.cpd.offlineApps", false); // For consistency with new cookie behavior
|
defaultPref("privacy.cpd.offlineApps", false); // For consistency with new cookie behavior
|
||||||
|
<<<<<<< HEAD
|
||||||
lockPref("devtools.performance.recording.ui-base-url", "http://localhost:55555"); // Previously redirected to localhost:4242
|
lockPref("devtools.performance.recording.ui-base-url", "http://localhost:55555"); // Previously redirected to localhost:4242
|
||||||
defaultPref("media.autoplay.blocking_policy", 2); // Previously media.autoplay.enabled.user-gestures-needed
|
defaultPref("media.autoplay.blocking_policy", 2); // Previously media.autoplay.enabled.user-gestures-needed
|
||||||
defaultPref("media.memory_cache_max_size", 65536); // previously lockPref("media.memory_cache_max_size", 16384);
|
defaultPref("media.memory_cache_max_size", 65536); // previously lockPref("media.memory_cache_max_size", 16384);
|
||||||
|
=======
|
||||||
|
lockPref("devtools.performance.recording.ui-base-url", ""); // Previously redirected to localhost
|
||||||
|
lockPref("services.settings.security.onecrl.signer", ""); // Previously services.blocklist.onecrl.signer
|
||||||
|
lockPref("browser.contentblocking.report.lockwise.howitworks.url", "");
|
||||||
|
>>>>>>> 034d451 (reorganized tracking section + 3rd set of changes)
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Removed
|
#### Removed
|
||||||
|
|
@ -106,6 +124,7 @@ lockPref("services.settings.default_signer", ""); // Deprecated
|
||||||
lockPref("app.productInfo.baseURL", ""); // Deprecated
|
lockPref("app.productInfo.baseURL", ""); // Deprecated
|
||||||
lockPref("devtools.webide.adbAddonURL", ""); // Deprecated
|
lockPref("devtools.webide.adbAddonURL", ""); // Deprecated
|
||||||
lockPref("lightweightThemes.recommendedThemes", ""); // Deprecated
|
lockPref("lightweightThemes.recommendedThemes", ""); // Deprecated
|
||||||
|
<<<<<<< HEAD
|
||||||
defaultPref("media.gmp-gmpopenh264.autoupdate", false); // Adroid FF only
|
defaultPref("media.gmp-gmpopenh264.autoupdate", false); // Adroid FF only
|
||||||
lockPref("browser.newtabpage.activity-stream.prerender", false); // Deprecated
|
lockPref("browser.newtabpage.activity-stream.prerender", false); // Deprecated
|
||||||
lockPref("browser.newtabpage.activity-stream.aboutHome.enabled", false); // Deprecated
|
lockPref("browser.newtabpage.activity-stream.aboutHome.enabled", false); // Deprecated
|
||||||
|
|
@ -404,6 +423,16 @@ lockPref("identity.fxaccounts.commands.enabled", false);
|
||||||
lockPref("identity.fxaccounts.remote.oauth.uri", "");
|
lockPref("identity.fxaccounts.remote.oauth.uri", "");
|
||||||
lockPref("identity.fxaccounts.remote.profile.uri", "");
|
lockPref("identity.fxaccounts.remote.profile.uri", "");
|
||||||
lockPref("identity.fxaccounts.service.monitorLoginUrl", "");
|
lockPref("identity.fxaccounts.service.monitorLoginUrl", "");
|
||||||
|
=======
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Commented
|
||||||
|
Active prefs that were commented in order to address them before removing them
|
||||||
|
```
|
||||||
|
// this sets a cookie jar for 3rd party origin which is the same as dFPI and redundant
|
||||||
|
// when 3rd party cookies are disabled
|
||||||
|
// lockPref("privacy.storagePrincipal.enabledForTrackers", false);
|
||||||
|
>>>>>>> 034d451 (reorganized tracking section + 3rd set of changes)
|
||||||
|
|
||||||
// all handled by lockPref("services.settings.server", "")
|
// all handled by lockPref("services.settings.server", "")
|
||||||
lockPref("services.blocklist.addons.collection", "");
|
lockPref("services.blocklist.addons.collection", "");
|
||||||
|
|
|
||||||
834
librewolf.cfg
834
librewolf.cfg
|
|
@ -1,3 +1,4 @@
|
||||||
|
<<<<<<< HEAD
|
||||||
//---------------|
|
//---------------|
|
||||||
// LibreWolf |
|
// LibreWolf |
|
||||||
//---------------|
|
//---------------|
|
||||||
|
|
@ -22,17 +23,121 @@
|
||||||
// that rely on comparing version numbers. |
|
// that rely on comparing version numbers. |
|
||||||
// |
|
// |
|
||||||
// ================================================================================================================================|
|
// ================================================================================================================================|
|
||||||
|
=======
|
||||||
|
// ---------
|
||||||
|
// LibreWolf
|
||||||
|
// ---------
|
||||||
|
//
|
||||||
|
// Documentation .............. :
|
||||||
|
// ==============================
|
||||||
|
//
|
||||||
|
// "Section" : Description of the settings section separated by "----"
|
||||||
|
// "Bench Diff" : Impact on the performance of firefox can be a gain or loss of performance
|
||||||
|
// +100/5000 stand for 2% gained performance and -1500/5000 stand for -30% performance loss
|
||||||
|
// Performance can be tested here : https://chromium.github.io/octane/
|
||||||
|
// "Pref" : Preference/Settings name and or description followed by links or documentations
|
||||||
|
// and some time explanation why the setting is commented and ignored.
|
||||||
|
// "lockPref" : Locked preference can not be changed on firefox, nor by extensions, can only be changed here
|
||||||
|
// lockPref is used to lock preferences so they cannot be changed through the GUI or about:config.
|
||||||
|
// In many cases the GUI will change to reflect this, graying out or removing options. Appears
|
||||||
|
// in about:config as "locked". Some config items require lockPref to be set, such as app.update.enabled.
|
||||||
|
// It will not work if it set with just pref.
|
||||||
|
// "pref" : Sets the preference as if a user had set it, every time you start the browser. So users can make changes,
|
||||||
|
// but they will be erased on restart. If you set a particular preference this way,
|
||||||
|
// it shows up in about:config as "user set".
|
||||||
|
// "defaultPref" : Defaulting : Is used to alter the default value, though users can set it normally and their changes will
|
||||||
|
// be saved between sessions. If preferences are reset to default through the GUI or some other method,
|
||||||
|
// this is what they will go back to. Appears in about:config as "default".
|
||||||
|
// "clearPref" : Can be used to "blank" certain preferences. This can be useful e.g. to disable functions
|
||||||
|
// that rely on comparing version numbers.
|
||||||
|
//
|
||||||
|
// ====================================================================================
|
||||||
|
// Protection ................. :
|
||||||
|
// ==============================
|
||||||
|
//
|
||||||
|
// Pref : Locking librewolf.cfg itself
|
||||||
|
defaultPref("general.config.filename", "librewolf.cfg");
|
||||||
|
//
|
||||||
|
// =====================================================================================
|
||||||
|
// Index librewolf.cfg .......... :
|
||||||
|
// ==============================
|
||||||
|
//
|
||||||
|
// -----------------------------------------------------------------------
|
||||||
|
// Section : User settings // Bench Diff : +0 / 5000
|
||||||
|
// Section : Defaulting Settings // Bench Diff : +0 / 5000
|
||||||
|
// -----------------------------------------------------------------------
|
||||||
|
// Section : Controversial // Bench Diff : +0 / 5000
|
||||||
|
// Section : Firefox Fingerprint // Bench Diff : +0 / 5000
|
||||||
|
// Section : Locale/Time // Bench Diff : +0 / 5000
|
||||||
|
// Section : Ghacks-user Selection // Bench Diff : +100 / 5000
|
||||||
|
// Section : Extensions Manager // Bench Diff : +0 / 5000
|
||||||
|
// Section : IJWY To Shut Up // Bench Diff : +0 / 5000
|
||||||
|
// Section : Microsoft Windows // Bench Diff : +0 / 5000
|
||||||
|
// Section : Firefox ESR60.x // Bench Diff : +0 / 5000
|
||||||
|
// -----------------------------------------------------------------------
|
||||||
|
// Section : Security 1/3 // Bench Diff : +0 / 5000
|
||||||
|
// Section : Security 2/3 // Bench Diff : +0 / 5000
|
||||||
|
// Section : Security 3/3 (Cipher) // Bench Diff : +0 / 5000
|
||||||
|
// -----------------------------------------------------------------------
|
||||||
|
// Section : Performance 1/5 // Bench Diff : +650 / 5000
|
||||||
|
// Section : Performance 2/5 // Bench Diff : -800 / 5000
|
||||||
|
// Section : Performance 3/5 // Bench Diff : -1720 / 5000
|
||||||
|
// Section : Performance 4/5 // Bench Diff : -200 / 5000
|
||||||
|
// Section : Performance 5/5 // Bench Diff : -50 / 5000
|
||||||
|
// -----------------------------------------------------------------------
|
||||||
|
// Section : General Settings 1/3 // Bench Diff : +100 / 5000
|
||||||
|
// Section : General Settings 2/3 // Bench Diff : +0 / 5000
|
||||||
|
// Section : General Settings 3/3 // Bench Diff : -40 / 5000
|
||||||
|
// -----------------------------------------------------------------------
|
||||||
|
// Section : Disabled - ON/OFF // Bench Diff : +0 / 5000
|
||||||
|
// Section : Disabled - Deprecated Active // Bench Diff : +0 / 5000
|
||||||
|
// Section : Disabled - Deprecated Inactive // Bench Diff : +0 / 5000
|
||||||
|
// -----------------------------------------------------------------------
|
||||||
|
//
|
||||||
|
// -----------------------------------------------------------------------
|
||||||
|
// Index local-settings.js .... :
|
||||||
|
// ==============================
|
||||||
|
//
|
||||||
|
// -----------------------------------------------------------------------
|
||||||
|
// Section : General Settings // Bench Diff : ++ / 5000
|
||||||
|
// -----------------------------------------------------------------------
|
||||||
|
//
|
||||||
|
// -----------------------------------------------------------------------
|
||||||
|
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
// Section : User Settings
|
||||||
|
// Bench Diff : +0/5000
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
|
||||||
|
// --------------------------------
|
||||||
|
// User Settings : Cookies settings
|
||||||
|
// --------------------------------
|
||||||
|
|
||||||
|
// In the future consider switching to network.cookie.cookieBehavior=5 to enable dFPI
|
||||||
|
defaultPref("network.cookie.cookieBehavior", 1);
|
||||||
|
defaultPref("network.cookie.lifetimePolicy", 2);
|
||||||
|
defaultPref("network.cookie.thirdparty.sessionOnly", true);
|
||||||
|
lockPref("network.cookie.thirdparty.nonsecureSessionOnly", true);
|
||||||
|
>>>>>>> 034d451 (reorganized tracking section + 3rd set of changes)
|
||||||
|
|
||||||
// -----------------------------------
|
// -----------------------------------
|
||||||
// # TRACKING PROTECTION
|
// # TRACKING PROTECTION
|
||||||
// -----------------------------------
|
// -----------------------------------
|
||||||
|
|
||||||
|
<<<<<<< HEAD
|
||||||
defaultPref("browser.contentblocking.category", "custom"); // do not lock as it breaks UI even more
|
defaultPref("browser.contentblocking.category", "custom"); // do not lock as it breaks UI even more
|
||||||
|
=======
|
||||||
|
// set custom mode
|
||||||
|
lockPref("browser.contentblocking.category", "custom"); // Changing to other options is currently broken anyway
|
||||||
|
|
||||||
|
// disabling tracking protection
|
||||||
|
>>>>>>> 034d451 (reorganized tracking section + 3rd set of changes)
|
||||||
lockPref("privacy.trackingprotection.enabled", false);
|
lockPref("privacy.trackingprotection.enabled", false);
|
||||||
lockPref("privacy.trackingprotection.pbmode.enabled", false);
|
lockPref("privacy.trackingprotection.pbmode.enabled", false);
|
||||||
lockPref("privacy.trackingprotection.socialtracking.enabled", false);
|
lockPref("privacy.trackingprotection.socialtracking.enabled", false);
|
||||||
lockPref("privacy.trackingprotection.cryptomining.enabled", false);
|
lockPref("privacy.trackingprotection.cryptomining.enabled", false);
|
||||||
lockPref("privacy.trackingprotection.fingerprinting.enabled", false);
|
lockPref("privacy.trackingprotection.fingerprinting.enabled", false);
|
||||||
|
<<<<<<< HEAD
|
||||||
lockPref("privacy.trackingprotection.annotate_channels", false);
|
lockPref("privacy.trackingprotection.annotate_channels", false);
|
||||||
lockPref("urlclassifier.trackingTable", "");
|
lockPref("urlclassifier.trackingTable", "");
|
||||||
lockPref("browser.contentblocking.database.enabled", false);
|
lockPref("browser.contentblocking.database.enabled", false);
|
||||||
|
|
@ -49,6 +154,61 @@ lockPref("browser.contentblocking.report.lockwise.enabled", false);
|
||||||
lockPref("browser.contentblocking.report.monitor.enabled", false);
|
lockPref("browser.contentblocking.report.monitor.enabled", false);
|
||||||
lockPref("browser.contentblocking.report.proxy.enabled", false);
|
lockPref("browser.contentblocking.report.proxy.enabled", false);
|
||||||
lockPref("browser.contentblocking.report.vpn.enabled", false);
|
lockPref("browser.contentblocking.report.vpn.enabled", false);
|
||||||
|
=======
|
||||||
|
|
||||||
|
// below are potentially useless as tracking protection is disabled
|
||||||
|
lockPref("privacy.trackingprotection.origin_telemetry.enabled", false);
|
||||||
|
lockPref("privacy.trackingprotection.annotate_channels", false);
|
||||||
|
lockPref("privacy.trackingprotection.lower_network_priority", false);
|
||||||
|
lockPref("privacy.trackingprotection.testing.report_blocked_node", false);
|
||||||
|
lockPref("telemetry.origin_telemetry_test_mode.enabled", false);
|
||||||
|
lockPref("urlclassifier.trackingTable", "");
|
||||||
|
lockPref("browser.contentblocking.database.enabled", false);
|
||||||
|
|
||||||
|
// remove urls for/from tracking protection
|
||||||
|
lockPref("browser.contentblocking.reportBreakage.url", "");
|
||||||
|
|
||||||
|
// hide ui elements for tracking protection
|
||||||
|
lockPref("browser.contentblocking.cfr-milestone.enabled", false);
|
||||||
|
lockPref("browser.contentblocking.cryptomining.preferences.ui.enabled", false);
|
||||||
|
lockPref("browser.contentblocking.fingerprinting.preferences.ui.enabled", false);
|
||||||
|
|
||||||
|
// remove urls for/from protection report
|
||||||
|
lockPref("browser.contentblocking.report.cookie.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.cryptominer.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.endpoint_url", "");
|
||||||
|
lockPref("browser.contentblocking.report.fingerprinter.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.lockwise.how_it_works.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.manage_devices.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.monitor.how_it_works.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.monitor.sign_in_url", "");
|
||||||
|
lockPref("browser.contentblocking.report.monitor.home_page_url", "");
|
||||||
|
lockPref("browser.contentblocking.report.monitor.preferences", "");
|
||||||
|
lockPref("browser.contentblocking.report.monitor.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.proxy.enabled", false);
|
||||||
|
lockPref("browser.contentblocking.report.proxy_extension.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.social.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.tracker.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.vpn.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.vpn-promo.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.vpn-ios.url", "");
|
||||||
|
lockPref("browser.contentblocking.report.vpn-android.url", "");
|
||||||
|
|
||||||
|
// hide ui elements from protection report
|
||||||
|
lockPref("browser.contentblocking.report.hide_vpn_banner", true);
|
||||||
|
lockPref("browser.contentblocking.report.show_mobile_app", false);
|
||||||
|
lockPref("browser.contentblocking.report.lockwise.enabled", false);
|
||||||
|
lockPref("browser.contentblocking.report.monitor.enabled", false);
|
||||||
|
lockPref("browser.contentblocking.report.proxy.enabled", false);
|
||||||
|
lockPref("browser.contentblocking.report.vpn.enabled", false);
|
||||||
|
|
||||||
|
// Windows only
|
||||||
|
lockPref("default-browser-agent.enabled", false);
|
||||||
|
>>>>>>> 034d451 (reorganized tracking section + 3rd set of changes)
|
||||||
|
|
||||||
|
// to check, likely deprecated
|
||||||
|
lockPref("pref.privacy.disable_button.change_blocklist", true);
|
||||||
|
lockPref("pref.privacy.disable_button.tracking_protection_exceptions", true);
|
||||||
|
|
||||||
// ----------------------------------
|
// ----------------------------------
|
||||||
// # AUTOPLAY
|
// # AUTOPLAY
|
||||||
|
|
@ -214,9 +374,36 @@ lockPref("browser.newtabpage.activity-stream.discoverystream.endpoints", "");
|
||||||
lockPref("browser.newtabpage.activity-stream.discoverystream.engagementLabelEnabled", false);
|
lockPref("browser.newtabpage.activity-stream.discoverystream.engagementLabelEnabled", false);
|
||||||
lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts", false);
|
lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts", false);
|
||||||
lockPref("browser.newtabpage.activity-stream.improvesearch.handoffToAwesomebar", false);
|
lockPref("browser.newtabpage.activity-stream.improvesearch.handoffToAwesomebar", false);
|
||||||
|
<<<<<<< HEAD
|
||||||
lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts.searchEngines", "");
|
lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts.searchEngines", "");
|
||||||
lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts.havePinned", "");
|
lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts.havePinned", "");
|
||||||
lockPref("browser.newtabpage.activity-stream.fxaccounts.endpoint", "");
|
lockPref("browser.newtabpage.activity-stream.fxaccounts.endpoint", "");
|
||||||
|
=======
|
||||||
|
lockPref("browser.newtab.preload", false);
|
||||||
|
lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts.searchEngines", "");
|
||||||
|
lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts.havePinned", "");
|
||||||
|
lockPref("browser.newtabpage.activity-stream.feeds.section.topstories.options", "");
|
||||||
|
|
||||||
|
lockPref("extensions.getAddons.discovery.api_url", "");
|
||||||
|
lockPref("extensions.htmlaboutaddons.recommendations.enabled", false);
|
||||||
|
lockPref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false);
|
||||||
|
lockPref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false);
|
||||||
|
lockPref("browser.newtabpage.activity-stream.asrouter.providers.cfr", "");
|
||||||
|
lockPref("browser.newtabpage.activity-stream.asrouter.providers.whats-new-panel", "{\"id\":\"whats-new-panel\",\"enabled\":false}");
|
||||||
|
|
||||||
|
lockPref("browser.newtabpage.activity-stream.asrouter.providers.cfr-fxa", "");
|
||||||
|
// Default Value :
|
||||||
|
// {\"id\":\"cfr\",\"enabled\":false,\"type\":\"local\",\"localProvider\":\
|
||||||
|
// "CFRMessageProvider\",\"frequency\":{\"custom\":[{\"period\":\"daily\",\"cap\":1}]}}
|
||||||
|
lockPref("browser.newtabpage.activity-stream.asrouter.providers.onboarding", "");
|
||||||
|
// Default Value :
|
||||||
|
// {\"id\":\"onboarding\",\"type\":\"local\",\"localProvider\":\"OnboardingMessageProvider\",\"enabled\":true}
|
||||||
|
lockPref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
|
||||||
|
// Default Value :
|
||||||
|
// {\"id\":\"snippets\",\"enabled\":false,\"type\":\"remote\",\"url\":\"https://snippets.cdn.mozilla.net/
|
||||||
|
// %STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%
|
||||||
|
// /%DISTRIBUTION%/%DISTRIBUTION_VERSION%/\",\"updateCycleInMs\":14400000}
|
||||||
|
>>>>>>> 034d451 (reorganized tracking section + 3rd set of changes)
|
||||||
|
|
||||||
// -------------------------------------------
|
// -------------------------------------------
|
||||||
// # DO NOT TRACK
|
// # DO NOT TRACK
|
||||||
|
|
@ -401,8 +588,655 @@ lockPref("security.mixed_content.block_active_content", true);
|
||||||
lockPref("security.insecure_connection_text.enabled", true);
|
lockPref("security.insecure_connection_text.enabled", true);
|
||||||
lockPref("security.insecure_connection_text.pbmode.enabled", true);
|
lockPref("security.insecure_connection_text.pbmode.enabled", true);
|
||||||
|
|
||||||
|
<<<<<<< HEAD
|
||||||
lockPref("security.dialog_enable_delay", 700);
|
lockPref("security.dialog_enable_delay", 700);
|
||||||
lockPref("security.csp.enable", true);
|
lockPref("security.csp.enable", true);
|
||||||
|
=======
|
||||||
|
// Remove a bunch of URLs :
|
||||||
|
lockPref("lightweightThemes.getMoreURL", "");
|
||||||
|
lockPref("media.decoder-doctor.new-issue-endpoint", "");
|
||||||
|
lockPref("identity.sync.tokenserver.uri", "");
|
||||||
|
lockPref("network.trr.confirmationNS", "");
|
||||||
|
lockPref("browser.translation.engine", ""); // default Google
|
||||||
|
lockPref("gecko.handlerService.schemes.mailto.0.uriTemplate", "");
|
||||||
|
lockPref("gecko.handlerService.schemes.mailto.0.name", ""); // default Yahoo! Mail
|
||||||
|
lockPref("gecko.handlerService.schemes.mailto.1.uriTemplate", "");
|
||||||
|
lockPref("gecko.handlerService.schemes.mailto.1.name", ""); // default Gmail
|
||||||
|
lockPref("gecko.handlerService.schemes.irc.0.uriTemplate", "");
|
||||||
|
lockPref("gecko.handlerService.schemes.irc.0.name", "");
|
||||||
|
lockPref("services.sync.lastversion", "");
|
||||||
|
lockPref("browser.safebrowsing.provider.mozilla.lists.base", "");
|
||||||
|
lockPref("browser.safebrowsing.provider.mozilla.lists.content", "");
|
||||||
|
lockPref("browser.safebrowsing.provider.google.advisoryName", "");
|
||||||
|
lockPref("browser.safebrowsing.provider.google4.advisoryName", "");
|
||||||
|
lockPref("browser.safebrowsing.provider.mozilla.lists", "");
|
||||||
|
lockPref("identity.fxaccounts.remote.root", "");
|
||||||
|
lockPref("services.settings.server", "");
|
||||||
|
lockPref("services.blocklist.addons.signer", "");
|
||||||
|
lockPref("services.blocklist.gfx.signer", "");
|
||||||
|
lockPref("services.settings.security.onecrl.signer", "");
|
||||||
|
lockPref("services.blocklist.pinning.signer", "");
|
||||||
|
lockPref("services.blocklist.plugins.signer", "");
|
||||||
|
lockPref("accessibility.support.url", "");
|
||||||
|
lockPref("app.normandy.shieldLearnMoreUrl", "");
|
||||||
|
lockPref("app.support.baseURL", "");
|
||||||
|
lockPref("browser.chrome.errorReporter.infoURL", "");
|
||||||
|
lockPref("browser.dictionaries.download.url", "");
|
||||||
|
lockPref("browser.geolocation.warning.infoURL", "");
|
||||||
|
lockPref("browser.search.searchEnginesURL", "");
|
||||||
|
lockPref("browser.uitour.themeOrigin", "");
|
||||||
|
lockPref("extensions.getAddons.compatOverides.url", "");
|
||||||
|
lockPref("services.sync.addons.trustedSourceHostnames", "");
|
||||||
|
lockPref("toolkit.datacollection.infoURL", "");
|
||||||
|
lockPref("xpinstall.signatures.devInfoURL", "");
|
||||||
|
lockPref("browser.newtabpage.activity-stream.fxaccounts.endpoint", "");
|
||||||
|
|
||||||
|
// Relevant for addons and lang packs
|
||||||
|
defaultPref("extensions.getAddons.get.url", ""); // https://services.addons.mozilla.org/api/v3/addons/search/?guid=%IDS%&lang=%LOCALE%
|
||||||
|
defaultPref("extensions.getAddons.langpacks.url", ""); // https://services.addons.mozilla.org/api/v3/addons/language-tools/?app=firefox&type=language&appversion=%VERSION%
|
||||||
|
defaultPref("extensions.getAddons.link.url", ""); // https://addons.mozilla.org/%LOCALE%/firefox/
|
||||||
|
defaultPref("extensions.getAddons.search.browseURL", ""); // https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%
|
||||||
|
defaultPref("extensions.getAddons.themes.browseURL", ""); // https://addons.mozilla.org/%LOCALE%/firefox/themes/?src=firefox
|
||||||
|
defaultPref("extensions.update.url", "");
|
||||||
|
// Default Value
|
||||||
|
// https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=
|
||||||
|
// %REQ_VERSION%&id=%ITEM_ID%&version=%ITEM_VERSION%&maxAppVersion=
|
||||||
|
// %ITEM_MAXAPPVERSION%&status=%ITEM_STATUS%&appID=%APP_ID%&appVersion=%APP_VERSION%&appOS=
|
||||||
|
// %APP_OS%&appABI=%APP_ABI%&locale=%APP_LOCALE%¤tAppVersion=
|
||||||
|
// %CURRENT_APP_VERSION%&updateType=%UPDATE_TYPE%&compatMode=%COMPATIBILITY_MODE%
|
||||||
|
|
||||||
|
// Other Sync Settings - Disabling By Prevention ---------------------------------------------------------
|
||||||
|
|
||||||
|
lockPref("services.sync.maxResyncs", 0); //5
|
||||||
|
lockPref("services.sync.telemetry.maxPayloadCount", 0); //500
|
||||||
|
lockPref("services.sync.addons.ignoreUserEnabledChanges", true); //false
|
||||||
|
lockPref("services.sync.engine.addons", false); //true
|
||||||
|
lockPref("services.sync.engine.addresses", false); //false
|
||||||
|
lockPref("services.sync.engine.bookmarks", false); //true
|
||||||
|
lockPref("services.sync.engine.bookmarks.buffer", false); //false
|
||||||
|
lockPref("services.sync.engine.creditcards", false); //false
|
||||||
|
lockPref("services.sync.engine.creditcards.available", false); //false
|
||||||
|
lockPref("services.sync.engine.history", false); //true
|
||||||
|
lockPref("services.sync.engine.passwords", false); //true
|
||||||
|
lockPref("services.sync.engine.prefs", false); //true
|
||||||
|
lockPref("services.sync.engine.tabs", false); //true
|
||||||
|
lockPref("services.sync.log.appender.file.logOnError", false); //true
|
||||||
|
lockPref("services.sync.log.appender.file.logOnSuccess", false); //false
|
||||||
|
lockPref("services.sync.log.cryptoDebug", false); //false
|
||||||
|
lockPref("services.sync.sendVersionInfo", false); //true
|
||||||
|
lockPref("services.sync.syncedTabs.showRemoteIcons", true); //true
|
||||||
|
lockPref("services.sync.prefs.sync.accessibility.blockautorefresh", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.accessibility.browsewithcaret", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.accessibility.typeaheadfind", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.accessibility.typeaheadfind.linksonly", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.addons.ignoreUserEnabledChanges", true); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.contentblocking.enabled", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.ctrlTab.recentlyUsedOrder", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.download.useDownloadDir", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.formfill.enable", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.link.open_newwindow", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.newtabpage.enabled", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.newtabpage.pinned", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includePocket", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includeVisited", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includeBookmarks", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.offline-apps.notify", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.search.update", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.sessionstore.restore_on_demand", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.startup.homepage", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.startup.page", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.tabs.loadInBackground", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.tabs.warnOnClose", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.tabs.warnOnOpen", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.urlbar.autocomplete.enabled", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.urlbar.matchBuckets", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.urlbar.maxRichResults", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.urlbar.suggest.bookmark", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.urlbar.suggest.history", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.urlbar.suggest.history.onlyTyped", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.urlbar.suggest.topsites", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.urlbar.suggest.openpage", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.browser.urlbar.suggest.searches", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.dom.disable_open_during_load", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.dom.disable_window_flip", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.dom.disable_window_move_resize", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.dom.event.contextmenu.enabled", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.extensions.personas.current", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.extensions.update.enabled", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.intl.accept_languages", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.layout.spellcheckDefault", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.lightweightThemes.selectedThemeID", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.lightweightThemes.usedThemes", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.network.cookie.cookieBehavior", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.network.cookie.lifetimePolicy", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.network.cookie.thirdparty.sessionOnly", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.permissions.default.image", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.pref.advanced.images.disable_button.view_image", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.pref.advanced.javascript.disable_button.advanced", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.pref.downloads.disable_button.edit_actions", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.pref.privacy.disable_button.cookie_exceptions", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.cache", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.cookies", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.downloads", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.formdata", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.history", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.offlineApps", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.sessions", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.siteSettings", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.donottrackheader.enabled", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.reduceTimerPrecision", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.resistFingerprinting", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.resistFingerprinting.reduceTimerPrecision.jitter", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.resistFingerprinting.reduceTimerPrecision.microseconds", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.sanitize.sanitizeOnShutdown", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.trackingprotection.enabled", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.privacy.trackingprotection.pbmode.enabled", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.security.OCSP.enabled", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.security.OCSP.require", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.security.default_personal_cert", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.security.tls.version.max", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.security.tls.version.min", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.services.sync.syncedTabs.showRemoteIcons", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.spellchecker.dictionary", false); //true
|
||||||
|
lockPref("services.sync.prefs.sync.xpinstall.whitelist.required", false); //true
|
||||||
|
|
||||||
|
// Testing -----------------------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
// Pref : Test To Make FFox Silent
|
||||||
|
lockPref("browser.chrome.errorReporter.publicKey", "");
|
||||||
|
// Default Value
|
||||||
|
// c709cb7a2c0b4f0882fcc84a5af161ec
|
||||||
|
|
||||||
|
// Pref : Test To Make FFox Silent
|
||||||
|
lockPref("prio.publicKeyA", "");
|
||||||
|
// Default Value
|
||||||
|
// 35AC1C7576C7C6EDD7FED6BCFC337B34D48CB4EE45C86BEEFB40BD8875707733
|
||||||
|
lockPref("prio.publicKeyB", "");
|
||||||
|
// Default Value
|
||||||
|
// 26E6674E65425B823F1F1D5F96E3BB3EF9E406EC7FBA7DEF8B08A35DD135AF50
|
||||||
|
|
||||||
|
// Alpha Settings Not Needed At The Moment --------------------------------------------------------------
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
//lockPref("urlclassifier.phishTable", "");
|
||||||
|
// Default Value
|
||||||
|
// goog-phish-proto,test-phish-simple
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
//lockPref("urlclassifier.passwordAllowTable", "");
|
||||||
|
// Default Value
|
||||||
|
// goog-passwordwhite-proto
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
//lockPref("urlclassifier.downloadAllowTable", "");
|
||||||
|
// Default Value
|
||||||
|
// goog-downloadwhite-proto
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
//lockPref("urlclassifier.downloadBlockTable", "");
|
||||||
|
// Default Value
|
||||||
|
// goog-badbinurl-proto
|
||||||
|
|
||||||
|
// Pref : Test To Make FFox Silent
|
||||||
|
//lockPref("security.content.signature.root_hash", "");
|
||||||
|
// Default Value
|
||||||
|
// 97:E8:BA:9C:F1:2F:B3:DE:53:CC:42:A4:E6:57:7E:D6:4D:F4:93:C2:47:B4:14:FE:A0:36:81:8D:38:23:56:0E
|
||||||
|
|
||||||
|
// Pref : Test To Make FFox Silent
|
||||||
|
//lockPref("media.gmp-manager.certs.1.issuerName", "");
|
||||||
|
// Default Value
|
||||||
|
// CN=DigiCert SHA2 Secure Server CA,O=DigiCert Inc,C=US
|
||||||
|
|
||||||
|
// Pref : Test To Make FFox Silent
|
||||||
|
//lockPref("media.gmp-manager.certs.2.issuerName", "");
|
||||||
|
// Default Value
|
||||||
|
// CN=thawte SSL CA - G2,O="thawte, Inc.",C=US
|
||||||
|
|
||||||
|
// Disabled ----------------------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
// Pref : New page default sites
|
||||||
|
//lockPref("browser.newtabpage.activity-stream.default.sites", "");
|
||||||
|
// Default Value
|
||||||
|
// https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/,
|
||||||
|
// https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/
|
||||||
|
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
// Section : Microsoft Windows
|
||||||
|
// Bench Diff : +0/5000
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>
|
||||||
|
|
||||||
|
// Pref : Other webGl [WINDOWS]
|
||||||
|
lockPref("webgl.dxgl.enabled", false);
|
||||||
|
|
||||||
|
// Pref : disable scanning for plugins [WINDOWS]
|
||||||
|
lockPref("plugin.scan.plid.all", false);
|
||||||
|
|
||||||
|
// Pref : disable Windows jumplist [WINDOWS]
|
||||||
|
lockPref("browser.taskbar.lists.enabled", false);
|
||||||
|
lockPref("browser.taskbar.lists.frequent.enabled", false);
|
||||||
|
lockPref("browser.taskbar.lists.recent.enabled", false);
|
||||||
|
lockPref("browser.taskbar.lists.tasks.enabled", false);
|
||||||
|
|
||||||
|
// Pref : disable Windows taskbar preview [WINDOWS]
|
||||||
|
lockPref("browser.taskbar.previews.enable", false);
|
||||||
|
|
||||||
|
// Pref : disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS]
|
||||||
|
// [1] https://www.ghacks.net/2016/03/25/block-firefox-chrome-windows-store/
|
||||||
|
lockPref("network.protocol-handler.external.ms-windows-store", false);
|
||||||
|
|
||||||
|
// Pref : disable background update service [WINDOWS]
|
||||||
|
// [SETTING] General>Firefox Updates>Use a background service to install updates
|
||||||
|
lockPref("app.update.service.enabled", false);
|
||||||
|
|
||||||
|
// Pref : disable automatic Firefox start and session restore after reboot [WINDOWS] (FF62+)
|
||||||
|
// [1] https://bugzilla.mozilla.org/603903
|
||||||
|
lockPref("toolkit.winRegisterApplicationRestart", false);
|
||||||
|
|
||||||
|
// Pref : 1220: disable Windows 8.1's Microsoft Family Safety cert [WINDOWS] (FF50+)
|
||||||
|
// 0=disable detecting Family Safety mode and importing the root
|
||||||
|
// 1=only attempt to detect Family Safety mode (don't import the root)
|
||||||
|
// 2=detect Family Safety mode and import the root
|
||||||
|
// [1] https://trac.torproject.org/projects/tor/ticket/21686
|
||||||
|
lockPref("security.family_safety.mode", 0);
|
||||||
|
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
// Section : Firefox ESR60.x
|
||||||
|
// Deprecated Active For ESR
|
||||||
|
// Bench Diff : +0/5000
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>
|
||||||
|
|
||||||
|
// Pref : Geolocation
|
||||||
|
lockPref("browser.search.countryCode", "US");
|
||||||
|
|
||||||
|
// Pref : Disable Mozilla telemetry/experiments
|
||||||
|
// https://wiki.mozilla.org/Platform/Features/Telemetry
|
||||||
|
// https://wiki.mozilla.org/Privacy/Reviews/Telemetry
|
||||||
|
// https://wiki.mozilla.org/Telemetry
|
||||||
|
// https://www.mozilla.org/en-US/legal/privacy/firefox.html#telemetry
|
||||||
|
// https://support.mozilla.org/t5/Firefox-crashes/Mozilla-Crash-Reporter/ta-p/1715
|
||||||
|
// https://wiki.mozilla.org/Security/Reviews/Firefox6/ReviewNotes/telemetry
|
||||||
|
// https://gecko.readthedocs.io/en/latest/browser/experiments/experiments/manifest.html
|
||||||
|
// https://wiki.mozilla.org/Telemetry/Experiments
|
||||||
|
// https://support.mozilla.org/en-US/questions/1197144
|
||||||
|
lockPref("experiments.activeExperiment", false);
|
||||||
|
lockPref("experiments.enabled", false);
|
||||||
|
lockPref("experiments.manifest.uri", "");
|
||||||
|
lockPref("experiments.supported", false);
|
||||||
|
|
||||||
|
// Pref : 2612: disable remote JAR files being opened, regardless of content type (FF42+)
|
||||||
|
// [1] https://bugzilla.mozilla.org/1173171
|
||||||
|
// [2] https://www.fxsitecompat.com/en-CA/docs/2015/jar-protocol-support-has-been-disabled-by-default/
|
||||||
|
// [-] https://bugzilla.mozilla.org/1427726
|
||||||
|
lockPref("network.jar.block-remote-files", true);
|
||||||
|
|
||||||
|
// Pref : 2613: disable JAR from opening Unsafe File Types
|
||||||
|
// [-] https://bugzilla.mozilla.org/1427726
|
||||||
|
lockPref("network.jar.open-unsafe-types", false);
|
||||||
|
|
||||||
|
// Pref : Disable Java NPAPI plugin
|
||||||
|
lockPref("plugin.state.java", 0);
|
||||||
|
|
||||||
|
// Discussion at https://github.com/ghacksuserjs/ghacks-user.js/issues/743
|
||||||
|
lockPref("trailhead.firstrun.branches", "join-privacy");
|
||||||
|
|
||||||
|
// Pref : 0402: enable Kinto blocklist updates (FF50+)
|
||||||
|
// What is Kinto?: https://wiki.mozilla.org/Firefox/Kinto#Specifications
|
||||||
|
// As Firefox transitions to Kinto, the blocklists have been broken down into entries for certs to be
|
||||||
|
// revoked, extensions and plugins to be disabled, and gfx environments that cause problems or crashes
|
||||||
|
// [-] https://bugzilla.mozilla.org/1458917
|
||||||
|
lockPref("services.blocklist.update_enabled", false);
|
||||||
|
|
||||||
|
// Pref : 0503: disable "Savant" Shield study (FF61+)
|
||||||
|
// [-] https://bugzilla.mozilla.org/1457226
|
||||||
|
lockPref("shield.savant.enabled", false);
|
||||||
|
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
// Section : Security 1/3
|
||||||
|
// Bench Diff : +0/5000
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>
|
||||||
|
|
||||||
|
// Pref : Enable insecure password warnings (login forms in non-HTTPS pages)
|
||||||
|
// https://blog.mozilla.org/tanvi/2016/01/28/no-more-passwords-over-http-please/
|
||||||
|
// https://bugzilla.mozilla.org/show_bug.cgi?id=1319119
|
||||||
|
// https://bugzilla.mozilla.org/show_bug.cgi?id=1217156
|
||||||
|
lockPref("security.insecure_password.ui.enabled", true);
|
||||||
|
|
||||||
|
// Pref : Show in-content login form warning UI for insecure login fields
|
||||||
|
// https://hg.mozilla.org/integration/mozilla-inbound/rev/f0d146fe7317
|
||||||
|
lockPref("security.insecure_field_warning.contextual.enabled", true);
|
||||||
|
|
||||||
|
// Pref : Disable HSTS preload list (pre-set HSTS sites list provided by Mozilla)
|
||||||
|
// https://blog.mozilla.org/security/2012/11/01/preloading-hsts/
|
||||||
|
// https://wiki.mozilla.org/Privacy/Features/HSTS_Preload_List
|
||||||
|
// https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security
|
||||||
|
lockPref("network.stricttransportsecurity.preloadlist", false);
|
||||||
|
|
||||||
|
// Pref : Disable TLS Session Tickets
|
||||||
|
// https://www.blackhat.com/us-13/briefings.html#NextGen
|
||||||
|
// https://media.blackhat.com/us-13/US-13-Daigniere-TLS-Secrets-Slides.pdf
|
||||||
|
// https://media.blackhat.com/us-13/US-13-Daigniere-TLS-Secrets-WP.pdf
|
||||||
|
// https://bugzilla.mozilla.org/show_bug.cgi?id=917049
|
||||||
|
// https://bugzilla.mozilla.org/show_bug.cgi?id=967977
|
||||||
|
// SSL Session IDs speed up HTTPS connections (no need to renegotiate) and last for 48hrs.
|
||||||
|
// Since the ID is unique, web servers can (and do) use it for tracking. If set to true,
|
||||||
|
// this disables sending SSL Session IDs and TLS Session Tickets to prevent session tracking
|
||||||
|
lockPref("security.ssl.disable_session_identifiers", true);
|
||||||
|
|
||||||
|
// Pref : Blocking GD Parking Scam Site
|
||||||
|
// TODO: do we still need this? librefox.com isn't relevant anymore and this pretty much
|
||||||
|
// only tells LibreWolf to look for librefox.com locally
|
||||||
|
defaultPref("network.dns.localDomains", "librefox.com");
|
||||||
|
|
||||||
|
// Pref : Disable insecure TLS version fallback
|
||||||
|
// https://bugzilla.mozilla.org/show_bug.cgi?id=1084025
|
||||||
|
// https://github.com/pyllyukko/user.js/pull/206#issuecomment-280229645
|
||||||
|
lockPref("security.tls.version.fallback-limit", 3);
|
||||||
|
|
||||||
|
// Pref : Only allow TLS 1.2+
|
||||||
|
// http://kb.mozillazine.org/Security.tls.version.*
|
||||||
|
lockPref("security.tls.version.min", 3);
|
||||||
|
|
||||||
|
// enforce TLS 1.0 and 1.1 downgrades as session only
|
||||||
|
lockPref("security.tls.version.enable-deprecated", false);
|
||||||
|
|
||||||
|
// Pref : Enfore Public Key Pinning
|
||||||
|
// https://en.wikipedia.org/wiki/HTTP_Public_Key_Pinning
|
||||||
|
// https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning
|
||||||
|
// "2. Strict. Pinning is always enforced."
|
||||||
|
lockPref("security.cert_pinning.enforcement_level", 2);
|
||||||
|
|
||||||
|
// Pref : Disallow SHA-1
|
||||||
|
// https://bugzilla.mozilla.org/show_bug.cgi?id=1302140
|
||||||
|
// https://shattered.io/
|
||||||
|
lockPref("security.pki.sha1_enforcement_level", 1);
|
||||||
|
|
||||||
|
// Pref : Warn the user when server doesn't support RFC 5746 ("safe" renegotiation)
|
||||||
|
// https://wiki.mozilla.org/Security:Renegotiation#security.ssl.treat_unsafe_negotiation_as_broken
|
||||||
|
// https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3555
|
||||||
|
lockPref("security.ssl.treat_unsafe_negotiation_as_broken", true);
|
||||||
|
|
||||||
|
// Pref : Pre-populate the current URL but do not pre-fetch the certificate in the
|
||||||
|
// "Add Security Exception" dialog
|
||||||
|
// http://kb.mozillazine.org/Browser.ssl_override_behavior
|
||||||
|
// https://github.com/pyllyukko/user.js/issues/210
|
||||||
|
lockPref("browser.ssl_override_behavior", 1);
|
||||||
|
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
// Section : Security 2/3
|
||||||
|
// Bench Diff : +0/5000
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("security.ssl.errorReporting.automatic", false);
|
||||||
|
lockPref("security.ssl.errorReporting.url", "");
|
||||||
|
|
||||||
|
// Pref : Check disabled section
|
||||||
|
// OCSP leaks the visited sites. Exactly same issue as with safebrowsing.
|
||||||
|
// Stapling forces the site to prove that its certificate is good
|
||||||
|
// through the CA, so apparently nothing is leaked in this case.
|
||||||
|
// [1] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/
|
||||||
|
lockPref("security.OCSP.enabled", 0);
|
||||||
|
lockPref("security.OCSP.require", false);
|
||||||
|
lockPref("security.ssl.enable_ocsp_stapling", true);
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("security.ssl.errorReporting.enabled", false);
|
||||||
|
lockPref("security.remote_settings.intermediates.enabled", true);
|
||||||
|
|
||||||
|
// Pref : Manage certificates button
|
||||||
|
//lockPref("security.disable_button.openCertManager", false);
|
||||||
|
// Disabled because of a bug that disables the button regardless of its value
|
||||||
|
|
||||||
|
// Pref : Manage security devices button
|
||||||
|
//lockPref("security.disable_button.openDeviceManager", false);
|
||||||
|
// Disabled because of a bug that disables the button regardless of its value
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("security.mixed_content.upgrade_display_content", true);
|
||||||
|
lockPref("security.mixed_content.block_object_subrequest", true);
|
||||||
|
lockPref("security.mixed_content.block_display_content", true);
|
||||||
|
lockPref("security.mixed_content.block_active_content", true);
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("security.insecure_connection_icon.enabled", true);
|
||||||
|
lockPref("security.insecure_connection_icon.pbmode.enabled", true);
|
||||||
|
lockPref("security.insecure_connection_text.enabled", true);
|
||||||
|
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
// Section : Security 3/3 (Cipher)
|
||||||
|
// Bench Diff : +0/5000
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("security.ssl3.rsa_des_ede3_sha", false);
|
||||||
|
lockPref("security.ssl3.rsa_aes_256_sha", false);
|
||||||
|
lockPref("security.ssl3.rsa_aes_128_sha", false);
|
||||||
|
|
||||||
|
// Pref : Disable RC4
|
||||||
|
// https://developer.mozilla.org/en-US/Firefox/Releases/38#Security
|
||||||
|
// https://bugzilla.mozilla.org/show_bug.cgi?id=1138882
|
||||||
|
// https://rc4.io/
|
||||||
|
// https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2566
|
||||||
|
lockPref("security.ssl3.ecdh_ecdsa_rc4_128_sha", false);
|
||||||
|
lockPref("security.ssl3.ecdh_rsa_rc4_128_sha", false);
|
||||||
|
|
||||||
|
// Pref : Disable SEED cipher
|
||||||
|
// https://en.wikipedia.org/wiki/SEED
|
||||||
|
lockPref("security.ssl3.rsa_seed_sha", false);
|
||||||
|
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
// Section : Performance 1/5
|
||||||
|
// Defaulting settings - HW Settings can be checked under about:support
|
||||||
|
// Bench Diff : +650/5000
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
|
||||||
|
// Bench Diff : +100/5000
|
||||||
|
// Pref : Increases animation speed. May mitigate choppy scrolling.
|
||||||
|
defaultPref("layout.frame_rate.precise", true);
|
||||||
|
|
||||||
|
// Bench Diff : +500/5000
|
||||||
|
// Pref : Enable Hardware Acceleration and Off Main Thread Compositing (OMTC).
|
||||||
|
// It's likely your browser is already set to use these features.
|
||||||
|
// May introduce instability on some hardware.
|
||||||
|
// Tor compatibility - have inverted values in tor.
|
||||||
|
defaultPref("webgl.force-enabled", true);
|
||||||
|
defaultPref("layers.acceleration.force-enabled", true);
|
||||||
|
|
||||||
|
// Pref : 2508: disable hardware acceleration to reduce graphics fingerprinting
|
||||||
|
// [SETTING] General>Performance>Custom>Use hardware acceleration when available
|
||||||
|
// [SETUP-PERF] Affects text rendering (fonts will look different) and impacts video performance.
|
||||||
|
// Parts of Quantum that utilize the GPU will also be affected as they are rolled out
|
||||||
|
// [1] https://wiki.mozilla.org/Platform/GFX/HardwareAcceleration
|
||||||
|
// Resolved by extension
|
||||||
|
defaultPref("gfx.direct2d.disabled", false); // [WINDOWS]
|
||||||
|
defaultPref("layers.acceleration.disabled", false);
|
||||||
|
|
||||||
|
// Bench Diff : 0/5000
|
||||||
|
// Pref :
|
||||||
|
defaultPref("html5.offmainthread", true); //default true
|
||||||
|
defaultPref("layers.offmainthreadcomposition.enabled", true);
|
||||||
|
defaultPref("layers.offmainthreadcomposition.async-animations", true);
|
||||||
|
defaultPref("layers.async-video.enabled", true);
|
||||||
|
|
||||||
|
// Bench Diff : +50/5000
|
||||||
|
// Pref : Deprecated Active
|
||||||
|
defaultPref("browser.tabs.animate", false);
|
||||||
|
|
||||||
|
// Pref : The impact for this one is negligible
|
||||||
|
//defaultPref("browser.download.animateNotifications", false);
|
||||||
|
|
||||||
|
// Bench Diff : -80/5000
|
||||||
|
// Pref : Spoof CPU Core Def 16
|
||||||
|
// Default settings seems to be the best
|
||||||
|
//defaultPref("dom.maxHardwareConcurrency", 8);
|
||||||
|
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
// Section : Performance 2/5
|
||||||
|
// Bench Diff : -800/5000
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
|
||||||
|
// Bench Diff : -500/5000
|
||||||
|
// Pref : Tell garbage collector to start running when javascript is using xx MB of memory.
|
||||||
|
// Garbage collection releases memory back to the system.
|
||||||
|
// Default settings seems to be the best
|
||||||
|
//lockPref("javascript.options.mem.high_water_mark", 96);
|
||||||
|
|
||||||
|
// Bench Diff : -200/5000
|
||||||
|
// Pref : Disable WebAssembly
|
||||||
|
// https://webassembly.org/
|
||||||
|
// https://en.wikipedia.org/wiki/WebAssembly
|
||||||
|
// https://trac.torproject.org/projects/tor/ticket/21549
|
||||||
|
// Solved by extension disabled here for performance
|
||||||
|
//lockPref("javascript.options.wasm", false);
|
||||||
|
|
||||||
|
// Bench Diff : -100/5000
|
||||||
|
// Pref : Prevent font fingerprinting
|
||||||
|
// https://browserleaks.com/fonts
|
||||||
|
// https://github.com/pyllyukko/user.js/issues/120
|
||||||
|
// Solved by extension disabled here for performance
|
||||||
|
//lockPref("browser.display.use_document_fonts", 0);
|
||||||
|
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
// Section : Performance 3/5
|
||||||
|
// Bench Diff : -1720/5000
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
|
||||||
|
// Bench Diff : -220/5000
|
||||||
|
// Pref : Disable webGL I/II
|
||||||
|
// WebGL introduces high fingerprinting (WebGL is a js API for directly accessing hardware)
|
||||||
|
defaultPref("webgl.disabled", false); // Tor have it false but the rest is the same (webgl)
|
||||||
|
// This does not leak
|
||||||
|
lockPref("webgl.enable-webgl2", false);
|
||||||
|
lockPref("webgl.min_capability_mode", true);
|
||||||
|
|
||||||
|
// Bench Diff : 0/5000
|
||||||
|
// Pref : Disable webGL II/II
|
||||||
|
// WebGL introduces high fingerprinting (WebGL is a js API for directly accessing hardware)
|
||||||
|
lockPref("pdfjs.enableWebGL", false);
|
||||||
|
lockPref("webgl.disable-extensions", true);
|
||||||
|
lockPref("webgl.disable-fail-if-major-performance-caveat", true);
|
||||||
|
lockPref("webgl.enable-debug-renderer-info", false); //Deprecated Active
|
||||||
|
|
||||||
|
// Bench Diff : -1500/5000
|
||||||
|
// Pref : Disable asm.js
|
||||||
|
// http://asmjs.org/
|
||||||
|
// https://www.mozilla.org/en-US/security/advisories/mfsa2015-29/
|
||||||
|
// https://www.mozilla.org/en-US/security/advisories/mfsa2015-50/
|
||||||
|
// https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2712
|
||||||
|
// Solved by extension disabled here for performance
|
||||||
|
// Tor enforce this
|
||||||
|
//lockPref("javascript.options.asmjs", false);
|
||||||
|
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
// Section : Performance 4/5
|
||||||
|
// Bench Diff : -200/5000
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
|
||||||
|
// Bench Diff : -200/5000
|
||||||
|
// Pref : JS Shared Memory - Default false
|
||||||
|
// https://github.com/MrAlex94/Waterfox/issues/356
|
||||||
|
lockPref("javascript.options.shared_memory", false);
|
||||||
|
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
// Section : Performance 5/5
|
||||||
|
// Bench Diff : -50/5000
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>
|
||||||
|
|
||||||
|
// Bench Diff : -50/5000
|
||||||
|
// Pref : 2302 : disable service workers
|
||||||
|
// Service workers essentially act as proxy servers that sit between web apps, and the browser
|
||||||
|
// and network. They are event-driven, and can control the web page/site it is associated with,
|
||||||
|
// intercepting and modifying navigation and resource requests, and caching resources.
|
||||||
|
// SW may decrease performance depending on the script that is running in background.
|
||||||
|
// So overall, disabling SW should enhance performance because it blocks SW Scripts.
|
||||||
|
// [NOTE] Service worker APIs are hidden (in Firefox) and cannot be used when in PB mode.
|
||||||
|
// [NOTE] Service workers only run over HTTPS. Service Workers have no DOM access.
|
||||||
|
defaultPref("dom.serviceWorkers.enabled", false);
|
||||||
|
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
// Section : General Settings 1/3
|
||||||
|
// Bench Diff : +100/5000
|
||||||
|
// >>>>>>>>>>>>>>>>>>>>>>
|
||||||
|
|
||||||
|
// Pref : Onboarding tour disabled because of included telemetry
|
||||||
|
// This extension has already been removed. This setting is here to disable it just in case it
|
||||||
|
// comes back or for users using the script outside the bundle.
|
||||||
|
lockPref("browser.onboarding.notification.finished", true);
|
||||||
|
lockPref("browser.onboarding.tour.onboarding-tour-customize.completed", true);
|
||||||
|
lockPref("browser.onboarding.tour.onboarding-tour-performance.completed", true);
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("devtools.onboarding.telemetry.logged", false);
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("services.sync.engine.addresses.available", false);
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("browser.bookmarks.restore_default_bookmarks", false);
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("pdfjs.previousHandler.alwaysAskBeforeHandling", true);
|
||||||
|
|
||||||
|
// Pref : Caching for integrated PDF
|
||||||
|
lockPref("pdfjs.enabledCache.state", false);
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("pref.general.disable_button.default_browser", false);
|
||||||
|
lockPref("pref.privacy.disable_button.view_passwords", false);
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("identity.mobilepromo.android", "");
|
||||||
|
pref("identity.sendtabpromo.url", "");
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("extensions.systemAddon.update.url", "");
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("datareporting.healthreport.infoURL", "");
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("browser.urlbar.daysBeforeHidingSuggestionsPrompt", 0);
|
||||||
|
lockPref("browser.urlbar.searchSuggestionsChoice", false);
|
||||||
|
lockPref("browser.urlbar.timesBeforeHidingSuggestionsHint", 0);
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("browser.shell.didSkipDefaultBrowserCheckOnFirstRun", true);
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("app.feedback.baseURL", "");
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("app.normandy.enabled", false);
|
||||||
|
lockPref("app.normandy.api_url", "");
|
||||||
|
lockPref("app.normandy.first_run", false);
|
||||||
|
lockPref("app.normandy.user_id", "");
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("app.releaseNotesURL", "");
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("app.update.auto", false);
|
||||||
|
defaultPref("extensions.update.autoUpdateDefault", false);
|
||||||
|
lockPref("app.update.staging.enabled", false);
|
||||||
|
lockPref("app.update.silent", false);
|
||||||
|
lockPref("app.update.lastUpdateTime.telemetry_modules_ping", 0);
|
||||||
|
lockPref("app.update.url.details", "https://gitlab.com/librewolf-community/browser");
|
||||||
|
lockPref("app.update.url.manual", "https://gitlab.com/librewolf-community/browser");
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("app.vendorURL", "");
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("breakpad.reportURL", "");
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("browser.chrome.errorReporter.submitUrl", "");
|
||||||
|
lockPref("browser.chrome.errorReporter.enabled", false);
|
||||||
|
|
||||||
|
// Pref :
|
||||||
|
lockPref("browser.ping-centre.staging.endpoint", "");
|
||||||
|
lockPref("browser.ping-centre.telemetry", false);
|
||||||
|
>>>>>>> 034d451 (reorganized tracking section + 3rd set of changes)
|
||||||
|
|
||||||
// -------------------------------------------------------
|
// -------------------------------------------------------
|
||||||
// # SAFE BROWSING
|
// # SAFE BROWSING
|
||||||
|
|
|
||||||
Loading…
Add table
Reference in a new issue