Commit Graph

3385 Commits

Author SHA1 Message Date
2ff416d880
{firefox,chromium}: also enable curben-phishing 2024-05-18 14:04:43 +03:00
20679e705d
{firefox,chromium}: enable AdNauseam ublock-annoyances & adguard-mobile-app-banners 2024-05-18 13:55:18 +03:00
aac0a04564
LibreAwoo: comment the 7 options that policy accepted 2024-05-18 11:04:59 +03:00
c68e3f66ab
firefox: attempt to enable http for esr 2024-05-18 10:21:44 +03:00
5a88836d59
firefox: Comment/clear network.dns.native_https_query_win10 2024-05-18 09:44:25 +03:00
5995ef8f32
firefox/policies.json: attempt to autoconfig, but again not allowed 2024-05-18 09:24:25 +03:00
1290db73f5
firefox/policies.json: import more disallowed things from autoconfig, comment disallowed ones, clear location provider 2024-05-18 09:15:10 +03:00
c05eedbb78
chromium README: note Bitwarden management options for self-hosters 2024-05-18 08:03:29 +03:00
df1458af1f
firefox: use system DNS for ECH (and prefer IPv6 and try image.animation.mode)
The last is not allowed for stability reasons apparently.
2024-05-18 07:33:10 +03:00
38c331494c
chromium/managed: merge enable-ech-ocsp.json into https-everywhere.json
This will not appear on my blog post. ECH is enough offtopic and OCSP would only bring argument on whether it's useful and is that usefulness more important than privacy leakage to non-ocsp-stapling websites.
2024-05-17 16:15:34 +03:00
fb57ae0ea5
firefox & chromium: accidentally silence DuckDuckGo post-install 2024-05-17 14:28:33 +03:00
c92ded3ad3
firefox & chromium: add Ruffle.rs 2024-05-17 11:05:31 +03:00
9f8eaab73d
init-browser-policies.bash: why am I creating managed & recommended separately? Let's not 2024-05-17 08:31:13 +03:00
23bbedf852
.pre-commit-config.yaml: remove deprecated hook fix-encoding-pragma 2024-05-16 21:22:54 +03:00
344caa700d
Init-browser-policies.bash: how about not making recursive symlinks in the first place?
Properly resolves: 0ce24f54d9
2024-05-16 21:04:01 +03:00
05a3cb6c08
firefox: allow private ECS 2024-05-16 19:48:39 +03:00
38710540f2
firefox & chromium: add missing favicons for DDG & Brave 2024-05-16 19:12:10 +03:00
6a916ed3b9
chromium/recommended/{duckduckgo,ecosia}.json: also restore forgotten HomepageIsNewTabPage 2024-05-16 18:51:51 +03:00
7bab72fb3c
chromium/recommended/{duckduckgo,ecosia}.json: trick Brave & Edge into complying by NewTabPageLocation 2024-05-16 18:47:22 +03:00
006ed65597
Re-integrate Edge policies into Chromium by removing apps-as-homepage.json 2024-05-16 18:35:48 +03:00
859f2a9f1d
chromium/duckduckgo.json: fill in DefaultSearchProviderNewTabURL 2024-05-16 18:29:54 +03:00
729013c3c1
firefox: install user-agent-string-switcher automatically so I don't have to worry about that for Microsoft Teams
TODO: proper automagic deployment
2024-05-16 15:37:59 +03:00
e6f4bd72ba
firefox: explicitly enable FirefoxAccounts & Screenshots
I have a feeling I might sometime have a situation where I want to disable at least accounts
2024-05-16 15:16:25 +03:00
b36f37196f
firefox: lock DoH again since I don't want to worry about multiple places where to edit it when I inevitably do 2024-05-16 15:13:11 +03:00
34799d0776
firefox & curl: default to dns0.eu, but have comment on unfiltered.adguard-dns.con available as well 2024-05-16 15:12:12 +03:00
23803ad433
firefox: restore privacy.userContext
Reverts: 4b7eff36b2
2024-05-16 15:06:04 +03:00
5158b52da4
firefox: apparently HTTPS Only mode can be set here contrary to the documentation
Also generic hardening(?)
2024-05-16 15:03:01 +03:00
83d53b8c17
systemd-resolved/10-dot-cloudflare.conf: add malicious domain filtering and alternative SNI 2024-05-15 20:38:49 +03:00
ef7584566f
systemd/resolved/10-dot-{443,adguard,dns0}.conf: fix server order 2024-05-15 20:33:23 +03:00
7f918cc797
systemd/resolved.conf.d/README: note my scripts existing 2024-05-15 20:29:59 +03:00
cb3c944d47
systemd-resolved: note server priority 2024-05-15 20:23:27 +03:00
1f5815b54e
hosts/dns: comment the IPv4-as-IPv6 hack, uncomment proper IPv6 2024-05-15 17:44:50 +03:00
4b7eff36b2
firefox: remove privacy.userContext policies for stability reasons (Firefox ESR is upset by them) 2024-05-14 15:40:37 +03:00
8d34384c78
unbound: mark dot-flushable-cache.conf as .badidea 2024-05-14 15:08:26 +03:00
901c634424
unbound: I have been using Fedora for a couple of years, I know where the ca bundle is without attributing to ctrl.blog 2024-05-14 15:07:11 +03:00
78fa2b7b9c
unbound/dns-over-tls.conf: remove ECS and private ECS 2024-05-14 15:01:41 +03:00
8d3609f171
firefox: lock ecs to disabled 2024-05-14 15:01:14 +03:00
5672e14c89
Revert "Stop pretending issues of ECS weight more than pros of it after GApple upgrades delayed my going to bed."
This reverts commit afe50117fe.
2024-05-14 14:47:09 +03:00
c1b1eaa040
unbound/dot-dns0-quad9.conf: add forgotten ports 2024-05-14 12:23:09 +03:00
fb6a44d264
firefox: on second thoughts, let the user have some control 2024-05-14 11:51:22 +03:00
ae0e3beb9a
firefox: fix pdf dark mode 2024-05-14 11:49:17 +03:00
0a9767bf38
etc/samba/playstation2.conf: hide the share from sight 2024-05-14 11:32:46 +03:00
b60bc9f1b8
firefox: switch to AMO version of Privacy Badger 2024-05-14 11:18:26 +03:00
afe50117fe
Stop pretending issues of ECS weight more than pros of it after GApple upgrades delayed my going to bed. 2024-05-14 11:06:01 +03:00
5d46d529bb
firefox: new tab page crashes? No problem, we can disable it. 2024-05-14 11:01:28 +03:00
c23e857c91
firefox: confusing user and default means I can use dark theme here 2024-05-14 10:44:14 +03:00
7b22530eb9
policies.json: seems like I confused default and user 2024-05-14 10:38:39 +03:00
7b09a7ca1f
LibreAwoo: attempt to comment what the policy sets 2024-05-14 10:32:17 +03:00
a0795908b2
init-browser-policies.bash: this script requires root by the way 2024-05-14 10:25:49 +03:00
0ce24f54d9
init-browser-policies.bash: rm recursive symlinks caused by multiple runs 2024-05-14 10:20:55 +03:00