Commit Graph

224 Commits

Author SHA1 Message Date
7b22530eb9
policies.json: seems like I confused default and user 2024-05-14 10:38:39 +03:00
372a032a18
firefox: actually trr.mode 3 may be nice for the ECH 2024-05-14 10:10:50 +03:00
583cc6a8a3
firefox: please do warn if TRR isn't working 2024-05-14 10:08:19 +03:00
7c867e1329
firefox: explicitly allow about:{addons,config,profiles,support} 2024-05-14 09:57:52 +03:00
fb73f8e5d3
firefox: maybe be done with preferences? 2024-05-14 09:55:24 +03:00
5cc2e5d720
firefox: the end of preferences additions is approaching 2024-05-14 09:43:17 +03:00
89dd05c882
firefox: set user policies of hiding Mozilla ads 2024-05-14 09:38:12 +03:00
cb5c844e1c
firefox: TRR IPv6 preference & reading /etc/hosts 2024-05-14 09:34:01 +03:00
82bcaa0d80
firefox: disable prediction/prefetching
Interestingly the policy didn't seem to touch the two preferences
2024-05-14 09:25:17 +03:00
88c391fd04
firefox: don't protect any domains from extensions
OK, so this simultaneously hurts security as extensions could modify the page,
but it may improve privacy by blocking analytics and it can improve
accessibility for any accessibility extensions.
2024-05-14 09:18:26 +03:00
fd22af5142
firefox: move DoH excluded domains here 2024-05-14 09:12:21 +03:00
beee380a30
firefox: begin adding security preferences 2024-05-14 09:04:56 +03:00
7a68117198
firefox policies: go wild 2024-05-13 21:54:05 +03:00
95d59857eb
policies.json: lock DoH provider so I only have to configure it at one place 2024-05-13 18:07:22 +03:00
9b4cc804e5
browsers: expose to Ecosia that we are using gpo (or policies), remove extraneous PostData from Firefox
The logic here is hope that it will stop offering the addon if I am following their instructions and sending them the information. Oh and I added icons
2024-05-13 17:56:41 +03:00
d93b8eb3d5
firefox policy: disable bookmarks toolbar, default browser checking & add tracking protection exceptions 2024-05-13 06:29:17 +03:00
575332b4ce
firefox: return to Quad9 ECS, disable Pocket (I don't actually use it), fix search engine typo 2024-05-12 21:43:33 +03:00
e5fc9bfbaf
{firefox,chromium}: add Plasma Integration mainly for family 2024-05-12 15:49:12 +03:00
d6aae8fb9a
browsers: add OISD (big) to AdNauseam 2024-05-11 18:01:05 +03:00
7430dd9e99
{firefox,chromium}: add HTTP Indicator 2024-05-11 17:35:37 +03:00
28542ca06a
firefox policy: clean-up attempt 2024-05-11 17:28:29 +03:00
ba4fb50c76
firefox: set DoH to Quad9 DNS as a more international option, Ecosia Search Engine 2024-05-11 17:26:33 +03:00
fef359500f
firefox: add AdNauseam configuration 2024-05-11 17:24:44 +03:00
9a974e7bca
{firefox,chromium,edge}: add Ecosia 2024-05-11 16:16:12 +03:00
18a04b1351
{firefox,chromium}: disable protections for one.one.one.one
For some reason they make connection to 1.1.1.1 appear as no or unreachable.
2024-04-28 09:21:29 +03:00
2113b593e7
Chromium & Firefox: force Bitwarden (for passkeys) 2024-04-27 08:32:39 +03:00
da85d0d9c7
firefox & chromium: allow PrivacyPass attestor & Keyoxide.org 2024-04-27 08:31:05 +03:00
e64e4e7fd0
firefox: DisableEncryptedClientHello: false
I am not sure if this does anything, I just saw a message in logs and it didn't trigger an error
2024-04-21 10:13:29 +03:00
6a97040386
firefox: add IPvFoo* 2024-04-21 10:08:43 +03:00
422ab0de4e
libreawoo, unbound & resolved: uncomment Quad9 default, comment ECS 2024-04-20 17:50:12 +03:00
47e51ee38b
firefox policy: use Quad9 ECS as TRR 2024-04-19 08:48:57 +03:00
ac922aea86
{firefox,chromium}: add Floccus bookmarks sync so I will remember its existence 2024-04-14 14:10:39 +03:00
bf1fdc4cff
{firefox,chromium} policy: PB exclude Disroot Mvim, Microsoft {Teams,Learn} 2024-04-12 14:24:31 +03:00
149cadfa41
firefox & chromium: add IPFS Companion 2024-04-10 11:03:19 +03:00
c034e016e8
firefox policy: add search engine suggestion urls 2024-04-05 14:04:14 +03:00
99c63d25fe
{firefox,chromium} policy: add OpenDyslexic 2024-04-04 14:27:43 +03:00
08ae59ed99
firefox policy: configure Homepage 2024-03-31 08:46:12 +03:00
323dde1545
{firefox, chromium}: force install privacy pass
This is in hopes of reducing family member frustation with captchas should they happen
2024-03-29 08:32:44 +02:00
e823810723
firefox: add search engine aliases 2024-03-24 08:16:20 +02:00
4bab0cbb6a
firefox: default to Brave Search 2024-03-24 08:15:43 +02:00
405d407c2a
firefox: add Brave Search Goggles 2024-03-21 17:21:30 +02:00
3e56346be0
firefox: add Brave Search 2024-03-20 18:53:18 +02:00
cc6dbceaff
{firefox,chromium} policy: add UpdateSWH 2024-03-14 20:25:06 +02:00
39b0f1d19a
{firefox,chromium} policy: disable PrivacyBadger on Element Web instances 2024-03-13 11:45:19 +02:00
5c1dce8d36
{firefox,chromium} policy: explicitly configure PrivacyBadger
I think all of these default to true anyway, but explicit is better than implicit is what they say
2024-03-12 10:15:15 +02:00
e35c477a71
firefox policy: block uBlock & uMatrix to avoid conflict with force_install AdNauseam 2024-03-09 15:45:02 +02:00
685b14c2f6
firefox policy: block wayback machine 2024-03-09 15:41:39 +02:00
5149b23598
browser policies: add wayback machine 2024-03-08 08:41:41 +02:00
16d6a3df09
browser policies: install Bias Finder 2024-03-08 08:29:54 +02:00
0f23d25647
firefox policy: add offline-qr-code-generator 2024-03-04 12:29:45 +02:00
f2e8b86665
browser policies: remove AdNauseam advancedSettings 2024-03-02 16:26:47 +02:00
6029869230
browsers: force_install Privacy Badger again
While this isn't the recommended configuration, Privacy Badger has the
widget replacements, automatic learning (enabled by default as per
this policy), canvas protection etc.

AdNauseam again can replace NoScript (that I previously removed from
the policies for too aggressive for basic users) and fails to click ads
for me anyway, so I think this is the best option for me.
2024-02-29 11:22:29 +02:00
d242b05e76
browser policies: ship AdNauseam in filterAuthorMode 2024-02-29 08:56:59 +02:00
e343e80858
Weaken protection for Ad Nauseam since I am already so unique/fingerprintable 2024-02-28 20:55:46 +02:00
2d7539b0ed
browser policies: install AdNauseam 2024-02-28 20:04:08 +02:00
2e4744bc90
Don't install NoScript on browsers automatically due to being a bit extreme on unsuspecting family members after self-reflection. 2024-02-27 09:44:28 +02:00
5c3e5e29b3
browser policies: add Terms of Service;Didn't Read 2024-02-26 12:20:47 +02:00
8b0e28f417
firefox policies: also keep sidebery installed 2024-02-24 11:08:48 +02:00
3498e0d830
firefox. fix peertube-companion ID 2024-02-23 08:59:50 +02:00
4ff3705df0
firefox: force install peertube companion as a stronger stance against youtube centralization 2024-02-22 19:55:17 +02:00
4dbfd94d90
{chromium,firefox}: force install (& pin in Chromium) Snowflake too 2024-02-19 18:00:06 +02:00
303f69a671
firefox: actually force_install tab suspender 2024-02-19 16:45:36 +02:00
a1056807bf
firefox: add peertubeify
as indiewiki buddy kind of opened the door for it
2024-02-16 19:41:45 +02:00
67ddd26f71
browser policies: include indiewiki buddy 2024-02-16 17:13:33 +02:00
75d8833b03
firefox/policies.json: fix DDG Start Description & Method 2024-02-11 13:33:27 +02:00
75b938f3ce
firefox policies: restore pocket, searchengines 2024-02-11 13:23:04 +02:00
d37d9e8019
firefox policies: add noscript 2024-02-10 12:34:52 +02:00
7afdc0e046
firefox: install DuckDuckGo by default 2024-02-08 10:42:34 +02:00
6bd2acac6b
firefox policies.json: clean up advertisements 2024-02-08 10:31:31 +02:00
fa4395def9
firefox policies.json: add new tab suspender 2024-02-08 10:06:57 +02:00
3cd94522df
firefox policies.json: add extensions based on the Chromium one 2024-02-08 10:03:07 +02:00
738ddcbfaf
firefox policies: add EnableTrackingProtection 2024-02-01 19:43:03 +02:00
f0fe1a93b2
firefox policies: add DoH 2024-02-01 19:36:26 +02:00
f37ec89f3f
etc/firefox/policies/policies.json: initial commit (just PrivacyBadger and LibreAwoo symlink so far) 2024-02-01 18:50:13 +02:00