7bab72fb3c
chromium/recommended/{duckduckgo,ecosia}.json: trick Brave & Edge into complying by NewTabPageLocation
2024-05-16 18:47:22 +03:00
006ed65597
Re-integrate Edge policies into Chromium by removing apps-as-homepage.json
2024-05-16 18:35:48 +03:00
859f2a9f1d
chromium/duckduckgo.json: fill in DefaultSearchProviderNewTabURL
2024-05-16 18:29:54 +03:00
729013c3c1
firefox: install user-agent-string-switcher automatically so I don't have to worry about that for Microsoft Teams
...
TODO: proper automagic deployment
2024-05-16 15:37:59 +03:00
e6f4bd72ba
firefox: explicitly enable FirefoxAccounts & Screenshots
...
I have a feeling I might sometime have a situation where I want to disable at least accounts
2024-05-16 15:16:25 +03:00
b36f37196f
firefox: lock DoH again since I don't want to worry about multiple places where to edit it when I inevitably do
2024-05-16 15:13:11 +03:00
34799d0776
firefox & curl: default to dns0.eu, but have comment on unfiltered.adguard-dns.con available as well
2024-05-16 15:12:12 +03:00
23803ad433
firefox: restore privacy.userContext
...
Reverts: 4b7eff36b2
2024-05-16 15:06:04 +03:00
5158b52da4
firefox: apparently HTTPS Only mode can be set here contrary to the documentation
...
Also generic hardening(?)
2024-05-16 15:03:01 +03:00
83d53b8c17
systemd-resolved/10-dot-cloudflare.conf: add malicious domain filtering and alternative SNI
2024-05-15 20:38:49 +03:00
ef7584566f
systemd/resolved/10-dot-{443,adguard,dns0}.conf: fix server order
2024-05-15 20:33:23 +03:00
7f918cc797
systemd/resolved.conf.d/README: note my scripts existing
2024-05-15 20:29:59 +03:00
cb3c944d47
systemd-resolved: note server priority
2024-05-15 20:23:27 +03:00
1f5815b54e
hosts/dns: comment the IPv4-as-IPv6 hack, uncomment proper IPv6
2024-05-15 17:44:50 +03:00
4b7eff36b2
firefox: remove privacy.userContext policies for stability reasons (Firefox ESR is upset by them)
2024-05-14 15:40:37 +03:00
8d34384c78
unbound: mark dot-flushable-cache.conf as .badidea
2024-05-14 15:08:26 +03:00
901c634424
unbound: I have been using Fedora for a couple of years, I know where the ca bundle is without attributing to ctrl.blog
2024-05-14 15:07:11 +03:00
78fa2b7b9c
unbound/dns-over-tls.conf: remove ECS and private ECS
2024-05-14 15:01:41 +03:00
8d3609f171
firefox: lock ecs to disabled
2024-05-14 15:01:14 +03:00
5672e14c89
Revert "Stop pretending issues of ECS weight more than pros of it after GApple upgrades delayed my going to bed."
...
This reverts commit afe50117fe
.
2024-05-14 14:47:09 +03:00
c1b1eaa040
unbound/dot-dns0-quad9.conf: add forgotten ports
2024-05-14 12:23:09 +03:00
fb6a44d264
firefox: on second thoughts, let the user have some control
2024-05-14 11:51:22 +03:00
ae0e3beb9a
firefox: fix pdf dark mode
2024-05-14 11:49:17 +03:00
0a9767bf38
etc/samba/playstation2.conf: hide the share from sight
2024-05-14 11:32:46 +03:00
b60bc9f1b8
firefox: switch to AMO version of Privacy Badger
2024-05-14 11:18:26 +03:00
afe50117fe
Stop pretending issues of ECS weight more than pros of it after GApple upgrades delayed my going to bed.
2024-05-14 11:06:01 +03:00
5d46d529bb
firefox: new tab page crashes? No problem, we can disable it.
2024-05-14 11:01:28 +03:00
c23e857c91
firefox: confusing user and default means I can use dark theme here
2024-05-14 10:44:14 +03:00
7b22530eb9
policies.json: seems like I confused default and user
2024-05-14 10:38:39 +03:00
a0795908b2
init-browser-policies.bash: this script requires root by the way
2024-05-14 10:25:49 +03:00
0ce24f54d9
init-browser-policies.bash: rm recursive symlinks caused by multiple runs
2024-05-14 10:20:55 +03:00
303af92a6a
firefox/libreawoo: remove wrong warning
2024-05-14 10:17:22 +03:00
372a032a18
firefox: actually trr.mode 3 may be nice for the ECH
2024-05-14 10:10:50 +03:00
583cc6a8a3
firefox: please do warn if TRR isn't working
2024-05-14 10:08:19 +03:00
7c867e1329
firefox: explicitly allow about:{addons,config,profiles,support}
2024-05-14 09:57:52 +03:00
fb73f8e5d3
firefox: maybe be done with preferences?
2024-05-14 09:55:24 +03:00
5cc2e5d720
firefox: the end of preferences additions is approaching
2024-05-14 09:43:17 +03:00
89dd05c882
firefox: set user policies of hiding Mozilla ads
2024-05-14 09:38:12 +03:00
cb5c844e1c
firefox: TRR IPv6 preference & reading /etc/hosts
2024-05-14 09:34:01 +03:00
82bcaa0d80
firefox: disable prediction/prefetching
...
Interestingly the policy didn't seem to touch the two preferences
2024-05-14 09:25:17 +03:00
88c391fd04
firefox: don't protect any domains from extensions
...
OK, so this simultaneously hurts security as extensions could modify the page,
but it may improve privacy by blocking analytics and it can improve
accessibility for any accessibility extensions.
2024-05-14 09:18:26 +03:00
fd22af5142
firefox: move DoH excluded domains here
2024-05-14 09:12:21 +03:00
beee380a30
firefox: begin adding security preferences
2024-05-14 09:04:56 +03:00
7f653b52e3
firefox/policies/README: note WebsiteFilter as not that useful for me
2024-05-14 08:49:45 +03:00
7a68117198
firefox policies: go wild
2024-05-13 21:54:05 +03:00
0a0fe39076
note to self: firefox TRR policy lock locks trr.mode to 2 (TRR first)
2024-05-13 19:33:30 +03:00
95d59857eb
policies.json: lock DoH provider so I only have to configure it at one place
2024-05-13 18:07:22 +03:00
9b4cc804e5
browsers: expose to Ecosia that we are using gpo (or policies), remove extraneous PostData from Firefox
...
The logic here is hope that it will stop offering the addon if I am following their instructions and sending them the information. Oh and I added icons
2024-05-13 17:56:41 +03:00
d93b8eb3d5
firefox policy: disable bookmarks toolbar, default browser checking & add tracking protection exceptions
2024-05-13 06:29:17 +03:00
575332b4ce
firefox: return to Quad9 ECS, disable Pocket (I don't actually use it), fix search engine typo
2024-05-12 21:43:33 +03:00