2024-01-31 12:43:10 +01:00
|
|
|
# Chromium policies
|
|
|
|
|
|
|
|
<!-- editorconfig-checker-disable -->
|
|
|
|
<!-- prettier-ignore-start -->
|
|
|
|
|
|
|
|
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
|
|
|
|
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
|
|
|
|
|
|
|
|
- [`aminda-extensions.json`](#aminda-extensionsjson)
|
2024-02-07 16:07:54 +01:00
|
|
|
- [Silk - Privacy Pass Client for the browser](#silk---privacy-pass-client-for-the-browser)
|
2024-02-08 09:46:30 +01:00
|
|
|
- [DuckDuckGo Privacy Essentials](#duckduckgo-privacy-essentials)
|
2024-01-31 13:28:14 +01:00
|
|
|
- [Dark Reader](#dark-reader)
|
2024-02-07 09:34:43 +01:00
|
|
|
- [Privacy Manager](#privacy-manager)
|
2024-02-07 09:38:15 +01:00
|
|
|
- [Fedora User Agent](#fedora-user-agent)
|
2024-02-07 16:07:54 +01:00
|
|
|
- [Snowflake](#snowflake)
|
2024-02-07 09:38:15 +01:00
|
|
|
- [Bitwarden](#bitwarden)
|
|
|
|
- [Privacy Badger](#privacy-badger)
|
2024-02-07 09:46:57 +01:00
|
|
|
- [`disable-floc.json`](#disable-flocjson)
|
|
|
|
- [`disable-incognito.json`](#disable-incognitojson)
|
2024-02-07 09:51:12 +01:00
|
|
|
- [`doh-automatic.json`](#doh-automaticjson)
|
|
|
|
- [`doh-dns0.json`](#doh-dns0json)
|
2024-02-07 09:46:57 +01:00
|
|
|
- [`enable-ech-ocsp.json`](#enable-ech-ocspjson)
|
|
|
|
- [`enable-home-labs.json`](#enable-home-labsjson)
|
|
|
|
- [`force-incognito.json`](#force-incognitojson)
|
2024-01-31 13:12:21 +01:00
|
|
|
- [`https-everywhere.json`](#https-everywherejson)
|
2024-01-31 12:43:10 +01:00
|
|
|
|
|
|
|
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
|
|
|
|
|
|
|
|
<!-- prettier-ignore-end -->
|
|
|
|
<!-- editorconfig-checker-enable -->
|
|
|
|
|
|
|
|
## `aminda-extensions.json`
|
|
|
|
|
|
|
|
As I cannot separate the keys to multiple files I am forced to keep them in
|
|
|
|
one and separate by what the file does, `aminda-extensions.json` is unlikely
|
|
|
|
to overlap with someone else.
|
|
|
|
|
|
|
|
Changing `normal_installed` to `force_installed` would also prevent
|
|
|
|
uninstallation.
|
|
|
|
|
2024-02-07 16:07:54 +01:00
|
|
|
### Silk - Privacy Pass Client for the browser
|
|
|
|
|
|
|
|
- `ajhmfdgkijocedmfjonnpjfojldioehi`
|
|
|
|
|
|
|
|
Silk or Privacy Pass has a chance of decreasing the amount of captchas
|
|
|
|
especially from Cloudflare when "suspicious" traffic is detected.
|
|
|
|
|
2024-02-08 09:46:30 +01:00
|
|
|
### DuckDuckGo Privacy Essentials
|
|
|
|
|
|
|
|
- `bkdgflcldnnnapblkhphbgpggdiikppg`
|
|
|
|
|
|
|
|
Installed by default so Google won't be the default search engine.
|
|
|
|
|
2024-01-31 13:28:14 +01:00
|
|
|
### Dark Reader
|
|
|
|
|
|
|
|
- `eimadpbcbfnmbkopoojfekhnkhdbieeh`
|
|
|
|
|
|
|
|
As playing around with these policies and constantly removing the profile directory doesn't help my migraine.
|
|
|
|
|
2024-02-07 09:38:15 +01:00
|
|
|
### Privacy Manager
|
2024-01-31 13:28:14 +01:00
|
|
|
|
2024-02-07 09:38:15 +01:00
|
|
|
- `giccehglhacakcfemddmfhdkahamfcmd`
|
2024-01-31 13:28:14 +01:00
|
|
|
|
2024-02-07 09:38:15 +01:00
|
|
|
Quick browser options and data removal on _startup_. Maybe beneficial if
|
|
|
|
incognito is disabled (which again is not great idea for quick guest access?)
|
2024-01-31 13:28:14 +01:00
|
|
|
|
2024-01-31 12:43:10 +01:00
|
|
|
### Fedora User Agent
|
|
|
|
|
2024-02-07 09:46:57 +01:00
|
|
|
- `hojggiaghnldpcknpbciehjcaoafceil`
|
|
|
|
|
2024-01-31 12:43:10 +01:00
|
|
|
Communicates websites that Ubuntu isn't the only Linux distribution and makes
|
|
|
|
some offer rpm packages directly.
|
|
|
|
|
2024-02-07 16:07:54 +01:00
|
|
|
### Snowflake
|
|
|
|
|
|
|
|
- `mafpmfcccpbjnhfhjnllmmalhifmlcie`
|
|
|
|
|
|
|
|
Helps bridge traffic to Tor by looking like WebRTC call.
|
|
|
|
|
2024-02-07 09:38:15 +01:00
|
|
|
### Bitwarden
|
2024-02-07 09:34:43 +01:00
|
|
|
|
2024-02-07 09:38:15 +01:00
|
|
|
- `nngceckbapebfimnlniiiahkandclblb`
|
2024-02-07 09:34:43 +01:00
|
|
|
|
2024-02-07 09:38:15 +01:00
|
|
|
The password manager of my choice.
|
|
|
|
|
|
|
|
### Privacy Badger
|
|
|
|
|
|
|
|
- `pkehgijcmpdhfbdbbnkijodmdjhbjlgp`
|
|
|
|
|
|
|
|
Configured to learn locally and also in incognito as opposed to only relying
|
|
|
|
on vendor list. Also not display the "Welcome to Privacy Badger screen".
|
|
|
|
|
|
|
|
See also:
|
|
|
|
|
|
|
|
- https://github.com/EFForg/privacybadger/blob/master/doc/admin-deployment.md
|
|
|
|
- https://github.com/EFForg/privacybadger/blob/master/src/data/schema.json
|
2024-02-07 09:34:43 +01:00
|
|
|
|
2024-02-07 09:46:57 +01:00
|
|
|
## `disable-floc.json`
|
|
|
|
|
|
|
|
Disables floc or ad topics that are against privacy.
|
|
|
|
|
|
|
|
- https://start.duckduckgo.com/?q=google+floc+privacy+topics
|
|
|
|
|
|
|
|
## `disable-incognito.json`
|
|
|
|
|
|
|
|
Disables incognito mode. I don't recommend this.
|
|
|
|
|
2024-02-07 09:51:12 +01:00
|
|
|
## `doh-automatic.json`
|
|
|
|
|
|
|
|
If no DNS over HTTPS policy is used, this unlocks the setting. Enabling managed policies disable it by default.
|
|
|
|
|
|
|
|
Incompatible with any actual DoH policy.
|
|
|
|
|
|
|
|
## `doh-dns0.json`
|
2024-01-31 12:43:10 +01:00
|
|
|
|
|
|
|
Simply enables DNS-over-HTTPS with DNS0.eu
|
2024-01-31 13:12:21 +01:00
|
|
|
|
2024-02-07 09:46:57 +01:00
|
|
|
## `enable-ech-ocsp.json`
|
|
|
|
|
|
|
|
Enables encrypted client hello and OCSP (or CRL?) checks.
|
|
|
|
|
|
|
|
## `enable-home-labs.json`
|
|
|
|
|
|
|
|
Enables home button and access to labs by default.
|
|
|
|
|
|
|
|
## `force-incognito.json`
|
|
|
|
|
|
|
|
Forces incognito mode. I don't recommend this.
|
|
|
|
|
2024-01-31 13:12:21 +01:00
|
|
|
## `https-everywhere.json`
|
|
|
|
|
|
|
|
Enforces https and attempts to upgrade http to https.
|