mikaela.github.io/pages/browser-extensions.markdown
Mikaela Suomalainen eb4fd8bde2
Browser extensions: multiple changes
* add comment to Facebook container on being nice even without a Facebook
  account
* strike temporary containers
* warn about layout.perpixels likely increasing fingerprintability
* note firstparty.isolate doesn't break Finnish strong identification
* add link to ghacks-user.js for a better list on
  privacy.resistfingerprinting
    * Thanks @beerisgood ( privacytoolsIO/privacytools.io#1006 )
* bootstrapaddress remove mention to DNS.watch which I am not actively
  following/using
* mention using Quad9 DNS#2 IP directly for network.trr.uri
* add link to my Android 9 DoT post
* Strike True Sight
* Strike Healthy.Onion
* Strike Nudge by Siempo for Firefox
* move RSS extensions around
* update IPFS Companion date (still not Tor compatible)
* fix Nicer dark note location
* add ViolentMonkey for Firefox
* Strike Firefox Dark Mode (Webextension)
* Strike Zenfox
* Add Grayscale for Firefox
* add changelog links (GitHub, gitea.blesmrt.net file history pages)

Ref: #129
2019-07-13 23:58:20 +03:00

15 KiB
Raw Blame History

Firefox containers

Firefox language packs

Firefox about:config

  • layout.css.devPixelsPerPx to 1.25 or 2.0 on macOS Retina to increase font size.
    • Warning: very likely increases fingerprintability
  • privacy.firstparty.isolate to true for preventing domains from accessing each others data.
    • If something breaks, its most likely related to this. I am yet to test if this Surprisingly it doesnt breaks Finnish strong electric authentication.
  • privacy.resistFingerprinting = true multiple effects to make your browser appear less unique, the ones I have found/understood:
  • privacy.trackingprotection.cryptomining.enabled = true so cryptomining on some websites gets blocked and wont waste resources.
  • privacy.trackingprotection.fingerprinting.enabled = true I am not entirely sure what this does, but as I already recommend privacy.resistFingerprinting, why not?
  • intl.accept_languages to en-US, en
    • see above.
  • extensions.pocket.enabled to false so the Pocket integration goes away
  • On Linux widget.content.gtk-theme-override (a string that has to be created by user) to Adwaita:light so text boxes in dark themes become readable, thank you Dovydas Venckus
  • image.animation_mode to once in order to have gifs play once and then stop everywhere (none to never have them play).
  • geo.wifi.uri to https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY% in order to send nearby WiFi networks to Mozilla instead of Google. See also MLS Software.
  • network.security.esni.enabled to true in order to enable encrypted SNI.
    • Requires DoH, see the next section!

Future note: network.dns.blockDotOnion;false ?

DNS over HTTPS

  • network.trr.bootstrapAddress DNS server to use for resolving the DoH name, e.g. 149.112.112.112 (Resolver 2 of Quad9)
  • network.trr.mode 2 to prefer DoH, but fallback to system resolver (or 3 to enforce DoH without fallback)
  • network.trr.early-AAAA true to hopefully prefer IPv6
  • network.trr.uri for the actual resolver address, e.g. https://dns.quad9.net/dns-query or https://149.112.112.112/dns-query (removes the need for network.trr.bootstrapAddress and allows ǹetwork.trr.mode3`?) or check curl wiki

Some notes: * You can confirm TRR working by visiting about:networking#dns where you should be seeing DNS cache of Firefox and a lot of TRR: true. * Quad9 became my preferred resolver through anxiety about other options being small (and possibly more likely to go down) or commercial while Quad9 is non-profit organization and 2019-03-20 apparently the default fallback resolver of dnscrypt-proxy (at least in Debian). * Quad9 while having filtering of malicious domains should be easy to figure out as the problem if something doesnt work on my computers as due to the previously mentioned bug I am mainly using it on Firefox. * While investingating how Android 9 Private DNS works, I also wrote a DNS provider comparsion here

SSDs

This information is from Arch Wiki on Firefox tweaks

  • browser.cache.disk.enable to false to only cache to RAM.
  • (browser.cache.memory.enable to true which should be default)
  • browser.sessionstore.interval to 600000 in order to only store open session every ten minutes (instead of 15 seconds) in case of crashes.
    • alternatively browser.sessionstore.resume_from_crash to false to not store the session data for crash recovery at all. I think this may be the more healthy option with all the information flood and dozens of tabs.

Why?

Every object loaded (html page, jpeg image, css stylesheet, gif banner) is saved in the Firefox cache for future use without the need to download it again. It is estimated that only a fraction of these objects will be reused, usually about 30%. This because of very short object expiration time, updates or simply user behavior (loading new pages instead of returning to the ones already visited). The Firefox cache is divided into memory and disk cache and the latter results in frequent disk writes: newly loaded objects are written to memory and older objects are removed.

Firefox stores the current session status (opened urls, cookies, history and form data) to the disk on a regular basis. It is used to recover a previous session in case of crash. The default setting is to save the session every 15 seconds, resulting in frequent disk access.

and this is the reason why Firefox is at times accused of killing SSDs.

Passwords

Privacy

Tor

  • Firefox: Privacy Pass
    • Chrome
    • May reduce captchas with CloudFlare.
  • Firefox: Healthy.Onion
    • Only for Tor Browser or other browser going through Tor all the time as it redirects clearnet addresses to Tor .onion hidden services that cannot be accessed outside of Tor.
    • I cannot figure out how to edit the list and I keep getting stuck with some dead onions. Due to these issues I am also unsure on trusting it.

Productivity

Misc

Usability

Videos

Firefox Dictionaries

Changelog: GitHub.com commits | gitea.blesmrt.net commits