Commit Graph

3503 Commits

Author SHA1 Message Date
129a2a04a0
firefox: restore OpenDyslexic since it works with standard contentblocking 2024-05-21 18:07:40 +03:00
ef2232bb2b
firefox: give fingerprintingprotection another chance 2024-05-21 17:42:56 +03:00
3d299f96f5
firefox: tone down the radicalism a bit
This reverts commit 7421820cf6.
2024-05-21 17:12:06 +03:00
7421820cf6
firefox: radicalize and trust only AdNauseam since all protection seems to conflict with accessibility or something else I care about 2024-05-21 16:52:00 +03:00
3f668d68a0
firefox: another prefetch variable 2024-05-21 11:10:12 +03:00
f7a484ca03
{firefox,chromium}: use GET requests with DoH for caching and speed 2024-05-21 11:07:09 +03:00
a2640115c9
firefox: attempt to mitigate CVE-2024-4367 + hardening
https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/
2024-05-21 06:35:32 +03:00
ae471c224b
aminda-duperemove.service: fix path to the binary 2024-05-20 21:15:23 +03:00
1af8de8186
systemd/aminda-duperemove.service: add /usr/local/bin
It's mostly filled with my scripts repo and has duplicates since the symlinks turn into duplicate files instead of staying as symlinks. Not that I expect it to affect much.
2024-05-20 21:11:32 +03:00
0d02542f4c
if .local/firefox/defaults/pref doesn't exist, there is no need to create it or files there 2024-05-20 20:27:13 +03:00
3ff87045a3
install: remove mystery if that seems to move itself into itself? 2024-05-20 20:22:34 +03:00
a00bd7ae42
firefox: clear app.update.download.attempts 2024-05-20 19:48:12 +03:00
73ff0cbcf0
{firefox,chromium}: ask for download directory to make drive-by attempts more obvious 2024-05-20 19:42:19 +03:00
f0a7657d47
chromium: rm disable-incognito.json.badidea
I just tried disabling it and then searching for the difference between it and guest mode and it was so full of ads without even the option to allow my usual extensions
2024-05-20 19:35:20 +03:00
dfa77e7d69
add prettier 2024-05-20 18:31:43 +03:00
0597b4f359
{firefox,chromium}: add PrivacyGuides recommended LegitimateURLShortener.txt 2024-05-20 18:22:29 +03:00
e2188d25f8
{firefox,chromium}: further cut/adjust default allowlists 2024-05-20 18:20:23 +03:00
9a78f6c387
{firefox,chromium}#uBlockOrigin: add uBlock Quick Fixes just in case 2024-05-20 13:30:50 +03:00
9a639609cd
{firefox,chromium}#uBlockOrigin: cut filter lists that no one has asked for yet 2024-05-20 13:21:49 +03:00
5840a1a8c9
{firefox,chromium}: reset accept_languages to Firefox default 2024-05-20 13:11:23 +03:00
889da57c3d
more microsoft login domains + I am not touching browser ETP without a good reason. 2024-05-19 21:12:14 +03:00
6d87da0227
Does Microsoft seriously require en-GB? 2024-05-19 20:57:24 +03:00
c349dd04ef
Revert and WARN about autoconfig logPref
Apparently it's not allowed and as a result all settings specified there
vanish. Oops.

This reverts commit ae08cd834e.
2024-05-19 20:43:34 +03:00
ae08cd834e
autoconfig: use lockPref here as well 2024-05-19 20:39:52 +03:00
473d0ba704
firefox-forbidden-policies.js: use lockPref so it's clear what cannot be changed within the browser 2024-05-19 20:38:32 +03:00
81d1a2a0fb
privacy.userContext.extension is extra forbidden! 2024-05-19 20:32:14 +03:00
e066a99481
Does Mozilla have a point in not allowing me to customize fonts through policy? No comment. 2024-05-19 20:19:35 +03:00
5486aed454
forbidden policies: if I cannot clear it, I will lock it 2024-05-19 20:00:31 +03:00
fc8efef261
pre-commit: return & run pretty-format-json as I like its sorting 2024-05-19 19:49:46 +03:00
1585a6daae
firefox: or maybe I don't trust my family that much 2024-05-19 19:46:13 +03:00
a595a63355
.pre-commit-config.yaml: add prettier-plugin-sort-json 2024-05-19 19:37:26 +03:00
8b050a2bab
firefox: force enable phishing & malware protection
Although they can still be disabled through about:config, I am trusting my family to not start doing that
2024-05-19 19:31:14 +03:00
428f60d00e
chromium: recommend restoring previous session at startup
This is painful in testing otherwise
2024-05-19 19:02:48 +03:00
ee83db4ddc
firefox: comment fingerprinting protections for now 2024-05-19 19:01:38 +03:00
294bcb4049
policies.json: comment what is unclear and I understand, clear what I don't understand 2024-05-19 18:40:16 +03:00
3ec414c933
firefox: disable extension recommendations & default sending crashreports 2024-05-19 18:28:15 +03:00
c8e85859c3
{firefox,chromium}: accept regional languages as well to not fallback to Russian? 2024-05-19 18:22:21 +03:00
0e5b94c867
firefox: allow disabling peertube-companion, remove forgotten blocked_message & opendyslexic 2024-05-19 18:05:07 +03:00
6c3382683b
firefox: install facebook container 2024-05-19 18:02:54 +03:00
4d11897918
{firefox,chromium}#ubo: add antipaywall.txt which apparently helps with Quora login prompt as well 2024-05-19 15:04:52 +03:00
6ece6f5e75
{firefox,chromium}#ubo: add lists I can imagine triggering in near future 2024-05-19 14:47:06 +03:00
6f7d510f89
stop using rm where ln -n suffices 2024-05-19 14:07:21 +03:00
17a189396b
initial commit of firefox-forbidden-policies.js (autoconfig take#2) 2024-05-19 14:05:04 +03:00
6293ce0a14
run prettier on json files (4) 2024-05-19 13:10:20 +03:00
e24c05bb3d
.pre-commit-config.yaml: move json to prettier for cod{e,ium} compatibility 2024-05-19 13:07:23 +03:00
e92addc23f
install: attempt to ensure allowed signers exist 2024-05-19 13:00:39 +03:00
79411a0932
{firefox,brave}: add forgotten integrated protection excemptions 2024-05-19 11:59:50 +03:00
162912dd82
{firefox,chromium}#PrivacyBadger: just trust cloudflare.com directly
I remembered that the analytics domain is cloudflareinsigts.com and I use cloudflare's esni testing etc. too often
2024-05-19 11:54:58 +03:00
79a7e38d93
{firefox,chromium}: actually cut PrivacyBadger's list a lot 2024-05-19 11:41:20 +03:00
1f0ac5a0e9
{firefox,chromium}: simplify allowlist configuration
PrivacyBadger continues having stricter rules and I am trusting it to catch what I let through
2024-05-19 11:38:18 +03:00