-
Notifications
You must be signed in to change notification settings - Fork 237
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
New Profile Settings for Mozilla #165
Comments
Did you look before? https://github.com/pyllyukko/user.js/blob/master/user.js |
Already there:
As for As for WebRTC, I agree it should be expanded to include more entries |
Alright, thanks for the clarification Roman-Nopantski. As far as the suggested modifications I agree with you. In regards to the link: https://www.privacytools.io/#webrtc, how about changing it to: // Settings defined below are taken from https://www.privacytools.io/#webrtc |
Do we actually need these, as WebRTC is disabled altogether? Relates to #86 |
You know me, I like to "future-proof" and close all holes. Up to you. :) |
If disabling WebRTC doesn't automatically disable all of these things, that's a bug in Firefox and it should be fixed upstream :) |
I think it's better to keep the amount of settings at minimum when we have these kind of "main switches" available. Keeping the user.js tidier. |
@fmarier wrote:
Does anyone have reason to believe it does not disable all of these things? (As an aside, sometime settings need to be temporarily added to user.js to workaround Mozilla issues... until they develop a fix.) |
I'm with TBB on this one. If it's good enough for them, it's good enough for me. It wouldn't be the first time unintended consequences/bugs derail code (I remember something about beacons or something back in the day). In fact, even INTENDED consequences (changes to telemetry/health reporting spring to mind). I would rather be pro-active, than do nothing. "Future proofing". At the very least urls can be blanked, set to 127.0.0.1 or "data:text/plain,". I'm not suggesting that for this repository, it's just my thoughts. I'm also not criticizing Moziila. It's just a fact, and I think they do an excellent job. I simply approach this the same way I approach security - it's a many layered thing. Can it get into my network, can it get past the OS, can it get past any system protections, can it bypass any application mechanisms. Same goes for my approach to FF. I hope that makes sense 🎱 |
Suggest we close this. Everything has been covered, except session data which could be a separate issue if anyone wants to bring it up - I consider it a forensics item, certainly not online security/privacy etc. As for WebRTC, the single pref is the master switch and fits this repository's modus operandi. |
Lets. |
I was wondering if the .js file had some of the defined settings on the privacytools.io website for WebRTC and suggested Privacy. I have not tried this profile yet, but I wanted to help enhance it the best way I could.
Here is the code below - I tried my best to convert it .js code, but I am just a beginner.
; Disable WebRTC
user_pref(media.peerconnection.turn.disable, true)
user_pref(media.peerconnection.use_document_iceservers, false)
user_pref(media.peerconnection.video.enabled, false)
user_pref(media.peerconnection.identity.timeout, 1)
; Privacy Enhancements
user_pref(privacy.trackingprotection.enabled, true)
user_pref(geo.enabled, false)
user_pref(browser.safebrowsing.enabled, false)
user_pref(browser.safebrowsing.malware.enabled, false)
user_pref(dom.event.clipboardevents.enabled, false)
user_pref(network.cookie.cookieBehavior, 1)
user_pref(network.cookie.lifetimePolicy, 2)
user_pref(browser.cache.offline.enable, false)
user_pref(browser.send_pings, false)
user_pref(webgl.disabled, true)
user_pref(dom.battery.enabled, false)
user_pref(browser.sessionstore.max_tabs_undo, 0)
The text was updated successfully, but these errors were encountered: