3
3
* Securefox *
4
4
* "Natura non contristatur" *
5
5
* priority: provide sensible security and privacy *
6
- * version: 117 *
6
+ * version: 118 *
7
7
* url: https://github.com/yokoffing/Betterfox *
8
8
****************************************************************************/
9
9
@@ -118,7 +118,7 @@ user_pref("urlclassifier.features.socialtracking.skipURLs", "*.instagram.com, *.
118
118
//user_pref("privacy.partition.serviceWorkers", true); // [DEFAULT: true FF105+]
119
119
//user_pref("privacy.partition.network_state.ocsp_cache", true); // enabled with "Strict"
120
120
//user_pref("privacy.partition.bloburl_per_agent_cluster", false); // DEFAULT [REGRESSIONS - DO NOT TOUCH]
121
- // user_pref("privacy.partition.bloburl_per_partition_key", true); // enabled with "Strict"? [FF118+]
121
+ user_pref ( "privacy.partition.bloburl_per_partition_key" , true ) ; // [FF118+]
122
122
// enable APS (Always Partitioning Storage) [FF104+]
123
123
//user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", true); // [DEFAULT: true FF109+]
124
124
//user_pref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", false); // [DEFAULT: false FF109+]
@@ -247,7 +247,13 @@ user_pref("security.remote_settings.crlite_filters.enabled", true);
247
247
user_pref ( "security.pki.crlite_mode" , 2 ) ;
248
248
249
249
// PREF: HTTP Public Key Pinning (HPKP)
250
- // If you rely on an antivirus to protect your web browsing
250
+ // HPKP enhances the security of SSL certificates by associating
251
+ // a host with their expected public key. It prevents attackers
252
+ // from impersonating the host using fraudulent certificates,
253
+ // even if they hold a valid certificate from a trusted certification authority.
254
+ // HPKP ensures that the client maintains a secure connection with
255
+ // the correct server, thereby reducing the risk of man-in-the-middle (MITM) attacks.
256
+ // [NOTE] If you rely on an antivirus to protect your web browsing
251
257
// by inspecting ALL your web traffic, then leave at 1.
252
258
// [ERROR] MOZILLA_PKIX_ERROR_KEY_PINNING_FAILURE
253
259
// By default, pinning enforcement is not applied if a user-installed
@@ -263,16 +269,12 @@ user_pref("security.cert_pinning.enforcement_level", 2);
263
269
//user_pref("security.enterprise_roots.enabled", false); // DEFAULT
264
270
//user_pref("security.certerrors.mitm.auto_enable_enterprise_roots", false);
265
271
266
- // PREF: disable Microsoft Family Safety [WINDOWS 8-10]
267
- // [1] https://wiki.mozilla.org/QA/Windows_Child_Mode
268
- //user_pref("security.family_safety.mode", 0);
269
-
270
272
/****************************************************************************
271
273
* SECTION: SSL (Secure Sockets Layer) / TLS (Transport Layer Security) *
272
274
****************************************************************************/
273
275
274
276
// PREF: display warning on the padlock for "broken security"
275
- // Bug: warning padlock not indicated for subresources on a secure page! [2]
277
+ // [NOTE] Warning padlock not indicated for subresources on a secure page! [2]
276
278
// [1] https://wiki.mozilla.org/Security:Renegotiation
277
279
// [2] https://bugzilla.mozilla.org/1353705
278
280
user_pref ( "security.ssl.treat_unsafe_negotiation_as_broken" , true ) ;
@@ -483,6 +485,17 @@ user_pref("privacy.history.custom", true);
483
485
// [2] https://winaero.com/firefox-75-strips-https-and-www-from-address-bar-results/
484
486
//user_pref("browser.urlbar.trimURLs", true); // DEFAULT
485
487
488
+ // PREF: trim https:// from the URL bar [FF119+]
489
+ // Firefox will hide https:// from the address bar, but not subdomains like www.
490
+ // [TEST] http://www.http2demo.io/
491
+ // [1] https://www.ghacks.net/2023/09/19/firefox-119-will-launch-with-an-important-address-bar-change/
492
+ //user_pref("browser.urlbar.trimHttps", true);
493
+
494
+ // PREF: display "Not Secure" text on HTTP sites
495
+ // Needed with HTTPS-First Policy; not needed with HTTPS-Only Mode.
496
+ user_pref ( "security.insecure_connection_text.enabled" , true ) ;
497
+ user_pref ( "security.insecure_connection_text.pbmode.enabled" , true ) ;
498
+
486
499
// PREF: do not show search terms in URL bar [FF110+] [FF113+]
487
500
// Show search query instead of URL on search results pages.
488
501
// [SETTING] Search>Search Bar>Use the address bar for search and navigation>Show search terms instead of URL...
@@ -542,13 +555,6 @@ user_pref("browser.formfill.enable", false);
542
555
// and is a security risk (e.g. common typos & malicious sites set up to exploit this).
543
556
//user_pref("browser.fixup.alternate.enabled", false); // [DEFAULT FF104+]
544
557
545
- // PREF: display "Not Secure" text on HTTP sites
546
- // Needed with HTTPS-First Policy; not needed with HTTPS-Only Mode.
547
- user_pref ( "security.insecure_connection_text.enabled" , true ) ;
548
- user_pref ( "security.insecure_connection_text.pbmode.enabled" , true ) ;
549
- //user_pref("security.insecure_connection_icon.enabled", true); // DEFAULT
550
- //user_pref("security.insecure_connection_icon.pbmode.enabled", true); // DEFAULT
551
-
552
558
// PREF: Disable location bar autofill
553
559
// https://support.mozilla.org/en-US/kb/address-bar-autocomplete-firefox#w_url-autocomplete
554
560
//user_pref("browser.urlbar.autoFill", false);
@@ -637,27 +643,23 @@ user_pref("dom.security.https_only_mode_error_page_user_suggestions", true);
637
643
* SECTION: DNS-over-HTTPS *
638
644
******************************************************************************/
639
645
640
- // PREF: DNS-over-HTTPS (DoH) mode
641
- // Mozilla uses Cloudfare by default. NextDNS is also an option.
642
- // You can set this to 0 if you are already using secure DNS for
643
- // your entire network (e.g. OS-level, router-level).
646
+ // PREF: DNS-over-HTTPS (DoH) implementation
647
+ // [NOTE] Mode 3 has site exceptions with a nice UI on the error page.
648
+ // [SETTINGS] Privacy & Security > DNS over HTTPS > Enable secure DNS using:
644
649
// [NOTE] Mode 3 has site-exceptions with a nice UI on the error page
645
650
// [1] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/
646
- // [2] https://www.internetsociety .org/blog/2018/12/ dns-privacy-support-in-mozilla-firefox/
647
- // 0=disable DoH (default)
648
- // 2=use DoH; fall back to native DNS if necessary
649
- // 3=only use DoH; do not fall back to native DNS
650
- // 5=explicitly disable DoH
651
+ // [2] https://support.mozilla .org/en-US/kb/ dns-over-https#w_protection-levels-explained
652
+ // 0= Default Protection: disable DoH (default)
653
+ // 2= Increased Protection: use DoH and fall back to native DNS if necessary
654
+ // 3= Max Protection: only use DoH; do not fall back to native DNS
655
+ // 5= Off: disable DoH
651
656
//user_pref("network.trr.mode", 0); // DEFAULT
652
657
653
658
// PREF: display fallback warning page [FF115+]
654
- // Show a warning checkbox UI in modes 0 + 2 .
659
+ // Show a warning checkbox UI in modes 0 or 2 above .
655
660
//user_pref("network.trr_ui.show_fallback_warning_option", false); // DEFAULT
656
661
//user_pref("network.trr.display_fallback_warning", false); // DEFAULT
657
662
658
- // PREF: fallback to native DNS upon network errors
659
- //user_pref("network.trr.strict_native_fallback", false); // DEFAULT
660
-
661
663
// PREF: DoH resolver
662
664
// [1] https://github.com/uBlockOrigin/uBlock-issues/issues/1710
663
665
//user_pref("network.trr.uri", "https://xxxx/dns-query");
@@ -666,6 +668,9 @@ user_pref("dom.security.https_only_mode_error_page_user_suggestions", true);
666
668
// PREF: adjust providers
667
669
//user_pref("network.trr.resolvers", '[{ "name": "Cloudflare", "url": "https://mozilla.cloudflare-dns.com/dns-query" },{ "name": "SecureDNS", "url": "https://doh.securedns.eu/dns-query" },{ "name": "AppliedPrivacy", "url": "https://doh.appliedprivacy.net/query" },{ "name": "Digitale Gesellschaft (CH)", "url": "https://dns.digitale-gesellschaft.ch/dns-query" }, { "name": "Quad9", "url": "https://dns.quad9.net/dns-query" }]');
668
670
671
+ // PREF: fallback to native DNS upon network errors
672
+ //user_pref("network.trr.strict_native_fallback", false); // DEFAULT
673
+
669
674
// PREF: EDNS Client Subnet (ECS)
670
675
// [WARNING] In some circumstances, enabling ECS may result
671
676
// in suboptimal routing between CDN origins and end users [2].
@@ -874,13 +879,6 @@ user_pref("pdfjs.enableScripting", false);
874
879
// [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1659530,1681331
875
880
user_pref ( "extensions.postDownloadThirdPartyPrompt" , false ) ;
876
881
877
- // PREF: disable permissions delegation [deprecated in FF118]
878
- // Currently applies to cross-origin geolocation, camera, mic and screen-sharing
879
- // permissions, and fullscreen requests. Disabling delegation means any prompts
880
- // for these will show/use their correct 3rd party origin.
881
- // [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion
882
- user_pref ( "permissions.delegation.enabled" , false ) ;
883
-
884
882
// PREF: disable middle click on new tab button opening URLs or searches using clipboard [FF115+]
885
883
// Enable if you're using LINUX.
886
884
//user_pref("browser.tabs.searchclipboardfor.middleclick", false); // DEFAULT WINDOWS macOS
@@ -947,6 +945,7 @@ user_pref("permissions.delegation.enabled", false);
947
945
// 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port
948
946
// [1] https://blog.mozilla.org/security/2021/03/22/firefox-87-trims-http-referrers-by-default-to-protect-user-privacy/
949
947
// [2] https://web.dev/referrer-best-practices/
948
+ // [3] https://www.reddit.com/r/waterfox/comments/16px8yq/comment/k29r6bu/?context=3
950
949
user_pref ( "network.http.referer.XOriginTrimmingPolicy" , 2 ) ;
951
950
952
951
/******************************************************************************
@@ -1117,10 +1116,10 @@ user_pref("browser.safebrowsing.downloads.remote.enabled", false);
1117
1116
// [3] https://www.reddit.com/r/firefox/comments/p8g5zd/why_does_disabling_accessibility_services_improve
1118
1117
// [4] https://winaero.com/firefox-has-accessibility-service-memory-leak-you-should-disable-it/
1119
1118
// [5] https://www.ghacks.net/2022/12/26/firefoxs-accessibility-performance-is-getting-a-huge-boost/
1120
- user_pref ( "accessibility.force_disabled" , 1 ) ;
1119
+ // user_pref("accessibility.force_disabled", 1);
1121
1120
//user_pref("devtools.accessibility.enabled", false);
1122
1121
1123
- // PREF: disable Firefox accounts
1122
+ // PREF: disable Firefox Sync
1124
1123
// [ALTERNATIVE] Use xBrowserSync [1]
1125
1124
// [1] https://addons.mozilla.org/en-US/firefox/addon/xbs
1126
1125
// [2] https://github.com/arkenfox/user.js/issues/1175
@@ -1131,6 +1130,9 @@ user_pref("identity.fxaccounts.enabled", false);
1131
1130
user_pref ( "browser.tabs.firefox-view" , false ) ;
1132
1131
//user_pref("browser.tabs.firefox-view-next", false); // [FF119+]
1133
1132
1133
+ // PREF: disable the Firefox View tour from popping up
1134
+ //user_pref("browser.firefox-view.feature-tour", "{\"screen\":\"\",\"complete\":true}");
1135
+
1134
1136
// PREF: disable Push Notifications API [FF44+]
1135
1137
// Push is an API that allows websites to send you (subscribed) messages even when the site
1136
1138
// isn't loaded, by pushing messages to your userAgentID through Mozilla's Push Server.
@@ -1258,7 +1260,7 @@ user_pref("datareporting.policy.dataSubmissionEnabled", false);
1258
1260
// [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to install and run studies
1259
1261
user_pref ( "app.shield.optoutstudies.enabled" , false ) ;
1260
1262
1261
- // Personalized Extension Recommendations in about:addons and AMO
1263
+ // PREF: Personalized Extension Recommendations in about:addons and AMO
1262
1264
// [NOTE] This pref has no effect when Health Reports are disabled.
1263
1265
// [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to make personalized extension recommendations
1264
1266
user_pref ( "browser.discovery.enabled" , false ) ;
0 commit comments