2024-05-22 09:32:24 +02:00
|
|
|
|
---
|
|
|
|
|
layout: post
|
|
|
|
|
title: "Browser policies Ⅱ: Deploying PrivacyBadger and uBlock Origin"
|
|
|
|
|
category: [english]
|
|
|
|
|
tags: [firefox, chromium, browsers, browser, policy]
|
|
|
|
|
redirect_from:
|
|
|
|
|
- /privacybadger.html
|
|
|
|
|
- /ublockorigin.html
|
|
|
|
|
- /https2.html
|
2024-05-30 08:05:52 +02:00
|
|
|
|
lang: en
|
2024-05-31 05:29:21 +02:00
|
|
|
|
robots: noai
|
2024-05-22 09:32:24 +02:00
|
|
|
|
---
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
_I previously wrote about enforcing HTTPS for all users/profiles through browser
|
|
|
|
|
policy receiving some positive feedback and I felt like continuing on the
|
|
|
|
|
subject by instructing with extension installation. This barely scratches the
|
|
|
|
|
surface of what browser policy can do for you either though._
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
I recommend reading the [browser policy part Ⅰ on enforcing HTTPS
|
|
|
|
|
only mode]({% post_url blog/2024-05-17-https-everywhere %}) as especially the
|
|
|
|
|
Firefox part will continue building on it and I will try to not repeat myself,
|
|
|
|
|
although that is unavoidable.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
<!-- editorconfig-checker-disable -->
|
|
|
|
|
<!-- prettier-ignore-start -->
|
|
|
|
|
|
|
|
|
|
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
|
|
|
|
|
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
|
2024-05-30 08:05:52 +02:00
|
|
|
|
<em lang="fi">Automaattinen sisällysluettelo</em> / <em lang="en">Automatically generated Table of Contents</em>
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
- [Chromium](#chromium)
|
|
|
|
|
- [`/etc/opt/chromium/policies/managed/aminda-extensions.json`](#etcoptchromiumpoliciesmanagedaminda-extensionsjson)
|
|
|
|
|
- [Firefox](#firefox)
|
|
|
|
|
- [Answers to potential questions](#answers-to-potential-questions)
|
|
|
|
|
- [Where can I see what policies extensions can take?](#where-can-i-see-what-policies-extensions-can-take)
|
|
|
|
|
- [Why both PrivacyBadger and uBlock Origin?](#why-both-privacybadger-and-ublock-origin)
|
|
|
|
|
- [Why EFF DNT allowlist?](#why-eff-dnt-allowlist)
|
2024-06-04 20:59:42 +02:00
|
|
|
|
- [Where did uBlock Origin Lite come from?](#where-did-ublock-origin-lite-come-from)
|
2024-05-22 09:32:24 +02:00
|
|
|
|
- [How do I enable more default lists in uBlock Origin?](#how-do-i-enable-more-default-lists-in-ublock-origin)
|
|
|
|
|
- [What do you think about this blog post?](#what-do-you-think-about-this-blog-post)
|
|
|
|
|
- [Will there be browser policies part Ⅲ?](#will-there-be-browser-policies-part-%E2%85%B2)
|
|
|
|
|
- [Where is all the futher reading?](#where-is-all-the-futher-reading)
|
|
|
|
|
|
|
|
|
|
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
|
|
|
|
|
|
|
|
|
|
<!-- prettier-ignore-end -->
|
|
|
|
|
<!-- editorconfig-checker-enable -->
|
|
|
|
|
|
|
|
|
|
## Chromium
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
[I previously instructed with the directory creation and permissions in the
|
|
|
|
|
part Ⅰ]({% post_url blog/2024-05-17-https-everywhere %}#chromium) and there I
|
|
|
|
|
also mentioned loving how I can create separate files there as opposed to
|
|
|
|
|
messing everything together. I tend to use the filename `aminda-extensions.json`
|
|
|
|
|
for all extension related as Chromium isn't perfect either and only lets the
|
|
|
|
|
options appear once.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
So the file may look a bit scary, but it's actually quite simple (and the
|
|
|
|
|
difficulty comes from getting json formatted correctly, which I am leaving for
|
|
|
|
|
`pretty-format-json` pre-commit hook), so I am going to explain everything
|
|
|
|
|
before the actual json:
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
The `3rdparty` and `extensions` let us configure extensions in advance.
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
`cjpalhdlnbpafiamejdnhcphjbkeiagm` is the ID of uBlock Origin from Chrome Web
|
|
|
|
|
store which can be seen from its URL:
|
|
|
|
|
`https://chromewebstore.google.com/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm`
|
|
|
|
|
and everything specified here will become a part of it's
|
|
|
|
|
configuration.`trustedSiteDirective` means the sites it will be disabld on, the
|
|
|
|
|
extension pages are recommended in the documentation and I don't mind Ecosia
|
|
|
|
|
displaying ads since they go to planting trees. Note that the user can add their
|
|
|
|
|
own sites or remove these from the extension settings.
|
|
|
|
|
|
|
|
|
|
`toOverwrite` says clearly it will overwrite user settings, so the lists
|
|
|
|
|
everyone on your system wishes to use should be specified here. In this case,
|
|
|
|
|
this contains the default lists, the Finnish adblocking list and the quick fixes
|
|
|
|
|
list, which updates more rapidly in cases such as the cat-and-mouse with YouTube
|
|
|
|
|
and adblockers.
|
|
|
|
|
|
|
|
|
|
There is also the EFF DNT allowlist which was introduced to me by [AdNauseam].
|
|
|
|
|
You have most likely heard of how ads let content to be free and supports
|
|
|
|
|
content creators and all that, I don't want to take away their revenue, but I
|
|
|
|
|
don't want to risk targeted malvertising or manipulation either, so this is my
|
|
|
|
|
compromise. Respect my privacy, and I will see your ads, or be blocked.
|
|
|
|
|
|
|
|
|
|
Onwards to [PrivacyBadger], the ID again comes from Chrome Web Store URL
|
|
|
|
|
`https://chromewebstore.google.com/detail/privacy-badger/pkehgijcmpdhfbdbbnkijodmdjhbjlgp`
|
|
|
|
|
and the settings are clear on what they do. If they are removed, it's up to the
|
|
|
|
|
default value or user configuration what will happen.
|
|
|
|
|
|
|
|
|
|
This [PrivacyBadger] configuration will simply always set these options on
|
|
|
|
|
browser start:
|
|
|
|
|
|
|
|
|
|
- `"checkForDNTPolicy": true` check if the domain has a
|
|
|
|
|
[`.well-known/dnt-policy.txt`](https://www.eff.org/dnt-policy) and if so,
|
|
|
|
|
won't block it.
|
|
|
|
|
- `"disabledSites": []` configures the domains that are allowed to perform
|
|
|
|
|
tracking/disrespect DNT. While here it's the same as with uBlock Origin, in my
|
|
|
|
|
actual policies I allowlist domains more freely in uBlock Origin than
|
|
|
|
|
[PrivacyBadger].
|
|
|
|
|
- `"learnInIncognito": true`
|
|
|
|
|
[**_WARNING! May make you more trackable_**](https://www.eff.org/deeplinks/2020/10/privacy-badger-changing-protect-you-better)
|
|
|
|
|
Same as below, but in incognito mode.
|
|
|
|
|
- `"learnLocally": true`
|
|
|
|
|
[**_WARNING! May make you more trackable_**](https://www.eff.org/deeplinks/2020/10/privacy-badger-changing-protect-you-better)
|
|
|
|
|
[PrivacyBadger] has rare ability to learn who tracks you without having to ask
|
|
|
|
|
anywhere else, so with this enabled, it may block something before it gets
|
|
|
|
|
added to either the premade list or something uBlock Origin has.
|
|
|
|
|
- `"sendDNTSignal": true` Whether or not to configure the web browser to send Do
|
|
|
|
|
Not Track and Global Privacy Control signals.
|
|
|
|
|
- `"showCounter": true` Whether to display the number of blocked trackers in the
|
|
|
|
|
[PrivacyBadger] icon.
|
|
|
|
|
- `"showIntroPage": false` Whether or not to display the welcome to
|
|
|
|
|
PrivacyBadger screen on start. In general having less displayed automatically
|
|
|
|
|
on browser start is a good thing, and if you set this to `true`,
|
|
|
|
|
[PrivacyBadger] would greet you every browser start and I bet you would get
|
|
|
|
|
annoyed quickly.
|
|
|
|
|
- `"socialWidgetReplacementEnabled": true` Whether to display social media
|
|
|
|
|
embeds directly or replace them with a notice on how [PrivacyBadger] has
|
|
|
|
|
blocked them from tracking you with the menu options on what to do.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
Now the only thing to do remains actually installing the extension.
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
**_BONUS!_**
|
|
|
|
|
[`"ExtensionManifestV2Availability": 2`](https://chromeenterprise.google/policies/#ExtensionManifestV2Availability)
|
|
|
|
|
will extend the time how long until ManifestV3 gets forced (and Google kills
|
|
|
|
|
content filters).
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
Anyway there is the same extension ID as before and four new options:
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
- `installation_mode` has options `normal_installed`, `force_installed` and
|
|
|
|
|
`blocked`. The first means it's installed by default, but the user can choose
|
|
|
|
|
to unload it, the second used here will prevent unloading the extension and
|
|
|
|
|
the third prevents installing and loading it entirely.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
- Typing this I am not sure if `override_update_url` is actually required.
|
2024-06-19 07:19:44 +02:00
|
|
|
|
- `force_pinned` will pin the extension to Chromium toolbar by default and not
|
|
|
|
|
allow unpinning and moving it to the extension menu. I strongly recommend it
|
|
|
|
|
with content blockers, especially when there is site breakage as it makes it
|
|
|
|
|
so much easier to see at a glance when something is blocked. The other option
|
|
|
|
|
would be `default_unpinned`.
|
|
|
|
|
- `update_url` is required for automatically installed extensions and while here
|
|
|
|
|
it's the Chrome Web Store, it could as well be
|
|
|
|
|
`https://edge.microsoft.com/extensionwebstorebase/v1/crx` and although the IDs
|
|
|
|
|
are different there, they are again visible in the URL bar.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
### `/etc/opt/chromium/policies/managed/aminda-extensions.json`
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
I hope I didn't scare you too badly by saying this isn't scary, but it's all
|
|
|
|
|
explained above.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"3rdparty": {
|
|
|
|
|
"extensions": {
|
|
|
|
|
"cjpalhdlnbpafiamejdnhcphjbkeiagm": {
|
|
|
|
|
"toAdd": {
|
|
|
|
|
"trustedSiteDirectives": [
|
|
|
|
|
"chrome-extension-scheme",
|
|
|
|
|
"ecosia.org",
|
|
|
|
|
"moz-extension-scheme"
|
|
|
|
|
]
|
|
|
|
|
},
|
|
|
|
|
"toOverwrite": {
|
|
|
|
|
"filterLists": [
|
|
|
|
|
"user-filters",
|
|
|
|
|
"ublock-filters",
|
|
|
|
|
"ublock-badware",
|
|
|
|
|
"ublock-privacy",
|
|
|
|
|
"ublock-abuse",
|
|
|
|
|
"ublock-unbreak",
|
|
|
|
|
"easylist",
|
|
|
|
|
"easyprivacy",
|
|
|
|
|
"urlhaus-1",
|
|
|
|
|
"plowe-0",
|
|
|
|
|
"https://www.eff.org/files/effdntlist.txt",
|
|
|
|
|
"FIN-0",
|
|
|
|
|
"ublock-quick-fixes"
|
|
|
|
|
]
|
|
|
|
|
}
|
|
|
|
|
},
|
2024-06-04 20:59:42 +02:00
|
|
|
|
"ddkjiahejlhfcafbddmgiahcphecmpfh": {
|
|
|
|
|
"disableFirstRunPage": true
|
|
|
|
|
},
|
2024-05-22 09:32:24 +02:00
|
|
|
|
"pkehgijcmpdhfbdbbnkijodmdjhbjlgp": {
|
|
|
|
|
"checkForDNTPolicy": true,
|
|
|
|
|
"disabledSites": [
|
|
|
|
|
"chrome-extension-scheme",
|
|
|
|
|
"ecosia.org",
|
|
|
|
|
"moz-extension-scheme"
|
|
|
|
|
],
|
|
|
|
|
"learnInIncognito": true,
|
|
|
|
|
"learnLocally": true,
|
|
|
|
|
"sendDNTSignal": true,
|
|
|
|
|
"showCounter": true,
|
|
|
|
|
"showIntroPage": false,
|
|
|
|
|
"socialWidgetReplacementEnabled": true
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
},
|
|
|
|
|
"ExtensionManifestV2Availability": 2,
|
|
|
|
|
"cjpalhdlnbpafiamejdnhcphjbkeiagm": {
|
2024-06-04 20:59:42 +02:00
|
|
|
|
"installation_mode": "normal_installed",
|
|
|
|
|
"override_update_url": true,
|
|
|
|
|
"toolbar_pin": "force_pinned",
|
|
|
|
|
"update_url": "https://clients2.google.com/service/update2/crx"
|
|
|
|
|
},
|
|
|
|
|
"ddkjiahejlhfcafbddmgiahcphecmpfh": {
|
|
|
|
|
"installation_mode": "normal_installed",
|
2024-05-22 09:32:24 +02:00
|
|
|
|
"override_update_url": true,
|
|
|
|
|
"toolbar_pin": "force_pinned",
|
|
|
|
|
"update_url": "https://clients2.google.com/service/update2/crx"
|
|
|
|
|
},
|
|
|
|
|
"pkehgijcmpdhfbdbbnkijodmdjhbjlgp": {
|
|
|
|
|
"installation_mode": "force_installed",
|
|
|
|
|
"override_update_url": true,
|
|
|
|
|
"toolbar_pin": "force_pinned",
|
|
|
|
|
"update_url": "https://clients2.google.com/service/update2/crx"
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
2024-06-04 20:59:42 +02:00
|
|
|
|
_2024-06-04: I added uBlock Origin Lite here, see the questions and answers._
|
|
|
|
|
|
2024-05-22 09:32:24 +02:00
|
|
|
|
## Firefox
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
If you haven't read the previous blog post yet, please do that now as Firefox
|
|
|
|
|
forces everything to be in `/etc/firefox/policies.json` and thus this file will
|
|
|
|
|
begin by expanding the end result from there. And to not repeat myself, please
|
|
|
|
|
also read the Chromium section above as due to everything being webextensions,
|
|
|
|
|
the new part within extension configuration is the same.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
Let's begin by what differs from Chromium:
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
- The extension ID is most easily readable from `about:support` instead of addon
|
|
|
|
|
URL.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
- We can sideload the extension, although that won't affect Firefox sync.
|
2024-06-19 07:19:44 +02:00
|
|
|
|
- It's a lot easier to figure out what extension a block belongs to as the names
|
|
|
|
|
appear here.
|
|
|
|
|
- While there is no `ExtensionManifestV2Availability`, there are domains
|
|
|
|
|
protected by default (`extensions.webextensions.restrictedDomains`) that we
|
|
|
|
|
could unset.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
_Oh meow, no more json!_ I am sorry.
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"policies": {
|
|
|
|
|
"3rdparty": {
|
|
|
|
|
"Extensions": {
|
|
|
|
|
"jid1-MnnxcxisBPnSXQ@jetpack": {
|
|
|
|
|
"checkForDNTPolicy": true,
|
|
|
|
|
"disabledSites": [
|
|
|
|
|
"challenges.cloudflare.com",
|
|
|
|
|
"chrome-extension-scheme",
|
|
|
|
|
"ecosia.org",
|
|
|
|
|
"moz-extension-scheme"
|
|
|
|
|
],
|
|
|
|
|
"learnInIncognito": true,
|
|
|
|
|
"learnLocally": true,
|
|
|
|
|
"sendDNTSignal": true,
|
|
|
|
|
"showCounter": true,
|
|
|
|
|
"showIntroPage": false,
|
|
|
|
|
"socialWidgetReplacementEnabled": true
|
|
|
|
|
},
|
2024-06-04 20:59:42 +02:00
|
|
|
|
"uBOLite@raymondhill.net": {
|
|
|
|
|
"disableFirstRunPage": true
|
|
|
|
|
},
|
2024-05-22 09:32:24 +02:00
|
|
|
|
"uBlock0@raymondhill.net": {
|
|
|
|
|
"toAdd": {
|
|
|
|
|
"trustedSiteDirectives": [
|
|
|
|
|
"chrome-extension-scheme",
|
|
|
|
|
"ecosia.org",
|
|
|
|
|
"firefox.com",
|
|
|
|
|
"mozilla.net",
|
|
|
|
|
"mozilla.org",
|
|
|
|
|
"moz-extension-scheme"
|
|
|
|
|
]
|
|
|
|
|
},
|
|
|
|
|
"toOverwrite": {
|
|
|
|
|
"filterLists": [
|
|
|
|
|
"user-filters",
|
|
|
|
|
"ublock-filters",
|
|
|
|
|
"ublock-badware",
|
|
|
|
|
"ublock-privacy",
|
|
|
|
|
"ublock-abuse",
|
|
|
|
|
"ublock-unbreak",
|
|
|
|
|
"easylist",
|
|
|
|
|
"easyprivacy",
|
|
|
|
|
"urlhaus-1",
|
|
|
|
|
"plowe-0",
|
|
|
|
|
"https://www.eff.org/files/effdntlist.txt",
|
|
|
|
|
"FIN-0",
|
|
|
|
|
"ublock-quick-fixes"
|
|
|
|
|
]
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
},
|
|
|
|
|
"DNSOverHTTPS": {
|
|
|
|
|
"Enabled": true,
|
|
|
|
|
"Fallback": false,
|
|
|
|
|
"Locked": true,
|
|
|
|
|
"ProviderURL": "https://dns.quad9.net/dns-query"
|
|
|
|
|
},
|
|
|
|
|
"DisableEncryptedClientHello": false,
|
|
|
|
|
"ExtensionSettings": {
|
|
|
|
|
"jid1-MnnxcxisBPnSXQ@jetpack": {
|
|
|
|
|
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/privacy-badger17/latest.xpi",
|
|
|
|
|
"installation_mode": "force_installed"
|
|
|
|
|
},
|
2024-06-04 20:59:42 +02:00
|
|
|
|
"uBOLite@raymondhill.net": {
|
|
|
|
|
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin-lite/latest.xpi",
|
|
|
|
|
"installation_mode": "normal_installed"
|
|
|
|
|
},
|
2024-05-22 09:32:24 +02:00
|
|
|
|
"uBlock0@raymondhill.net": {
|
|
|
|
|
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi",
|
2024-06-04 20:59:42 +02:00
|
|
|
|
"installation_mode": "normal_installed"
|
2024-05-22 09:32:24 +02:00
|
|
|
|
}
|
|
|
|
|
},
|
|
|
|
|
"Preferences": {
|
|
|
|
|
"dom.block_download_insecure": {
|
|
|
|
|
"Status": "locked",
|
|
|
|
|
"Type": "boolean",
|
|
|
|
|
"Value": true
|
|
|
|
|
},
|
|
|
|
|
"dom.security.https_only_mode": {
|
|
|
|
|
"Status": "locked",
|
|
|
|
|
"Type": "boolean",
|
|
|
|
|
"Value": true
|
|
|
|
|
},
|
|
|
|
|
"extensions.webextensions.restrictedDomains": {
|
|
|
|
|
"Status": "user",
|
|
|
|
|
"Type": "string",
|
|
|
|
|
"Value": ""
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
Doesn't that look familiar? Yes, it's practically the same file [from
|
|
|
|
|
part Ⅰ]({% post_url blog/2024-05-17-https-everywhere %}#dns-over-https-1) and
|
|
|
|
|
the extensions took the exact same values as Chromium, only the IDs and download
|
|
|
|
|
locations changed and some Chromium extras disappeared.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
Well, in uBlock Origin I did add the Mozilla/Firefox domains to avoid breakage
|
|
|
|
|
and in the end I removed the extra protection those sites would have from
|
|
|
|
|
extensions which would permit tracking by Mozilla. However, [PrivacyBadger]
|
|
|
|
|
would still protect from that while being less likely to break.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
_Would you like to restore the protection for Mozilla pages? Replace the `user`
|
|
|
|
|
in `status` of `extensions.webextensions.restrictedDomains {}` with `clear` so
|
|
|
|
|
it will be restored to default value while `user` persists even if the lines are
|
|
|
|
|
removed as they appear as if the user had changed them in `about:config`._
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
2024-06-04 20:59:42 +02:00
|
|
|
|
_2024-06-04: I added uBlock Origin Lite here, see the questions and answers._
|
|
|
|
|
|
2024-05-22 09:32:24 +02:00
|
|
|
|
## Answers to potential questions
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
As I sometimes tend to be a bit controversial when balancing security, privacy,
|
|
|
|
|
digital carbon footprint and all, there are going to be questions and I keep
|
|
|
|
|
answering them otherwise too.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
## Where can I see what policies extensions can take?
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
In Chromium `about:policies` has a checkbox "show unset policies" which will
|
|
|
|
|
bring a long list including the extensions. It also has a lovely search box.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
### Why both PrivacyBadger and uBlock Origin?
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
I admit they have some overlap, but uBlock Origin relies on human made lists
|
|
|
|
|
instead of an algorhitm to block trackers (note that [PrivacyBadger] doesn't
|
|
|
|
|
even try to block ads, it happens by accident).
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
Additionally uBlock Origin does nothing about Instagram, Disqus, etc. widgets. I
|
|
|
|
|
could block JavaScript (which I do), but sometimes I will allow it to a website
|
|
|
|
|
anyway and then the widget learns I am there even if I had no interest in seeing
|
|
|
|
|
comments in that case. And if I wanted to allow them somewhere, I could click
|
|
|
|
|
"always allow this widget on this site".
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
I also love its ability to self-learn trackers, even if that may make me more
|
|
|
|
|
trackable. I think there are easier methods to track me (like my HTTP user-agent
|
|
|
|
|
saying I am on Windows, while my `navigator.useragent or `navigator.platform`
|
|
|
|
|
say something different) and Firefox Nightly is newer than most people use and
|
|
|
|
|
there are a countless of small things in browser fingerprinting, which could be
|
|
|
|
|
it's own blog post.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
### Why EFF DNT allowlist?
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
I think I already answered this in the Chromium section, but I don't hate ads.
|
|
|
|
|
They may be important source of money to creators and I wouldn't mind some
|
|
|
|
|
financial support as well (if that wasn't practically illegal in Finland).
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
What I mind is targeted advertising, tracking, the potential for targeted
|
|
|
|
|
malvertising without it affecting anyone else and how they are used for
|
|
|
|
|
manipulation especially politically and with elections on discouraging some
|
|
|
|
|
people from voting.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
2024-06-04 20:59:42 +02:00
|
|
|
|
### Where did uBlock Origin Lite come from?
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
I added it here on 2024-06-04 and set uBlock Origin to `normal_installed`
|
|
|
|
|
instead of `force_installed`, because I am worried about ManifestV2 extensions
|
|
|
|
|
not syncing as the majority probably won't have the policy to allow it
|
|
|
|
|
configured.
|
2024-06-04 20:59:42 +02:00
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
This gives the users the choice to use either of the two, both (which may be
|
|
|
|
|
discouraged) or neither, while PrivacyBadger is forced on and I think it may
|
|
|
|
|
perform better with ManifestV3 anyway considering the local learning feature,
|
|
|
|
|
which I consider essential for non-English content anyway.
|
2024-06-04 20:59:42 +02:00
|
|
|
|
|
|
|
|
|
Speaking of PrivacyBadger, other concerns I have with uBlock Origin Lite are:
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
1. I cannot allow non-tracking ads as I cannot add the EFF DNT allowlist. I
|
|
|
|
|
would need to convince the developer to add it, which I am not even going to
|
|
|
|
|
try, as it would go against the principle of the extension.
|
|
|
|
|
1. <del>I didn't get uBlock Origin Lite's `"noFiltering": [""]` policy working,
|
|
|
|
|
so I cannot pre-emptively handle broken captchas or allow Ecosia to show me
|
|
|
|
|
tracking ads in exchange of them planting trees.</del>. A day later I got
|
|
|
|
|
`"noFiltering": [""]` working, but it works like `toOverwrite` from uBlock
|
|
|
|
|
Origin, so any edits outside of the policy will reset upon restart. Then
|
|
|
|
|
again that may also be a feature, please do send your best regards to
|
|
|
|
|
Google...
|
|
|
|
|
|
|
|
|
|
Google only has themselves to blame for not thinking of the scenario where their
|
|
|
|
|
users might be ok with non-tracking ads and now have no option to allow them due
|
|
|
|
|
to being more concerned about malvertising than how advertising businesses are
|
|
|
|
|
doing, since they they ruined the compromise solution that tried to account
|
|
|
|
|
both.
|
|
|
|
|
|
|
|
|
|
I may trust myself to avoid malicious content online or that DNS filtering will
|
|
|
|
|
catch it, but I don't have such trust on my less technical family members.
|
2024-06-04 20:59:42 +02:00
|
|
|
|
|
|
|
|
|
I should also say that ManifestV3 and uBlock Origin Lite have good sides as
|
|
|
|
|
well, considering it not needing or requesting access to all pages visited out
|
|
|
|
|
of the box, so it may be more likely to pass organizational criterias and
|
|
|
|
|
actually get installed through policy.
|
|
|
|
|
|
2024-05-22 09:32:24 +02:00
|
|
|
|
### How do I enable more default lists in uBlock Origin?
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
As you saw, external blocklists are just matter of entering the URL into the
|
|
|
|
|
policy, but integrated ones are a bit more challenging. See the eye icon in
|
|
|
|
|
uBlock Origin dashboard? I have been pointing it and looking at the URL which
|
|
|
|
|
ends e.g. `/asset-viewer.html?url=fanboy-social` where `fanboy-social` would be
|
|
|
|
|
the list name.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
More technical solution would be looking into the
|
|
|
|
|
[`assets/assets.json` file in uBlock Origin's GitHub repository](https://github.com/gorhill/uBlock/blob/master/assets/assets.json)
|
|
|
|
|
where the same names appear.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
Remember that
|
|
|
|
|
[more filter lists make you more identifiable](https://browserleaks.com/proxy)
|
|
|
|
|
and _do as I say, not as I do_.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
## What do you think about this blog post?
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
I feel a bit disappointed with it, I felt the previous one was more meaningful
|
|
|
|
|
and did everything better, but I hope this will be some benefit to someone
|
|
|
|
|
regardless or be something I can link to when I inevitably get asked these
|
|
|
|
|
questions again.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
## Will there be browser policies part Ⅲ?
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
Honestly, I don't know. I was surprised part Ⅱ happened, although this is also
|
|
|
|
|
just scratching the tip of the iceberg and there is really a lot you can do with
|
|
|
|
|
browser policies.
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
### Where is all the futher reading?
|
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
|
If you have read both blog posts carefully, this one didn't actually say
|
|
|
|
|
anything new, it's all linked [from
|
|
|
|
|
part
|
|
|
|
|
Ⅰ]({% post_url blog/2024-05-17-https-everywhere %}#documentation-and-other-policies).
|
2024-05-22 09:32:24 +02:00
|
|
|
|
|
|
|
|
|
_[Obligatory changelog link](https://github.com/Mikaela/mikaela.github.io/commits/master/blog/_posts/2024-05-22-policy-contentblocker.md)_
|
|
|
|
|
|
|
|
|
|
[PrivacyBadger]: https://privacybadger.org
|
|
|
|
|
[AdNauseam]: https://adnauseam.io
|