5b4f78f5f4
chromium/doh-google{,64}.json: use get requests
...
more as a note that it can be done
2024-05-18 15:35:36 +03:00
2ff416d880
{firefox,chromium}: also enable curben-phishing
2024-05-18 14:04:43 +03:00
20679e705d
{firefox,chromium}: enable AdNauseam ublock-annoyances & adguard-mobile-app-banners
2024-05-18 13:55:18 +03:00
c68e3f66ab
firefox: attempt to enable http for esr
2024-05-18 10:21:44 +03:00
5a88836d59
firefox: Comment/clear network.dns.native_https_query_win10
2024-05-18 09:44:25 +03:00
5995ef8f32
firefox/policies.json: attempt to autoconfig, but again not allowed
2024-05-18 09:24:25 +03:00
1290db73f5
firefox/policies.json: import more disallowed things from autoconfig, comment disallowed ones, clear location provider
2024-05-18 09:15:10 +03:00
c05eedbb78
chromium README: note Bitwarden management options for self-hosters
2024-05-18 08:03:29 +03:00
df1458af1f
firefox: use system DNS for ECH (and prefer IPv6 and try image.animation.mode)
...
The last is not allowed for stability reasons apparently.
2024-05-18 07:33:10 +03:00
38c331494c
chromium/managed: merge enable-ech-ocsp.json into https-everywhere.json
...
This will not appear on my blog post. ECH is enough offtopic and OCSP would only bring argument on whether it's useful and is that usefulness more important than privacy leakage to non-ocsp-stapling websites.
2024-05-17 16:15:34 +03:00
fb57ae0ea5
firefox & chromium: accidentally silence DuckDuckGo post-install
2024-05-17 14:28:33 +03:00
c92ded3ad3
firefox & chromium: add Ruffle.rs
2024-05-17 11:05:31 +03:00
9f8eaab73d
init-browser-policies.bash: why am I creating managed & recommended separately? Let's not
2024-05-17 08:31:13 +03:00
344caa700d
Init-browser-policies.bash: how about not making recursive symlinks in the first place?
...
Properly resolves: 0ce24f54d9
2024-05-16 21:04:01 +03:00
05a3cb6c08
firefox: allow private ECS
2024-05-16 19:48:39 +03:00
38710540f2
firefox & chromium: add missing favicons for DDG & Brave
2024-05-16 19:12:10 +03:00
6a916ed3b9
chromium/recommended/{duckduckgo,ecosia}.json: also restore forgotten HomepageIsNewTabPage
2024-05-16 18:51:51 +03:00
7bab72fb3c
chromium/recommended/{duckduckgo,ecosia}.json: trick Brave & Edge into complying by NewTabPageLocation
2024-05-16 18:47:22 +03:00
006ed65597
Re-integrate Edge policies into Chromium by removing apps-as-homepage.json
2024-05-16 18:35:48 +03:00
859f2a9f1d
chromium/duckduckgo.json: fill in DefaultSearchProviderNewTabURL
2024-05-16 18:29:54 +03:00
729013c3c1
firefox: install user-agent-string-switcher automatically so I don't have to worry about that for Microsoft Teams
...
TODO: proper automagic deployment
2024-05-16 15:37:59 +03:00
e6f4bd72ba
firefox: explicitly enable FirefoxAccounts & Screenshots
...
I have a feeling I might sometime have a situation where I want to disable at least accounts
2024-05-16 15:16:25 +03:00
b36f37196f
firefox: lock DoH again since I don't want to worry about multiple places where to edit it when I inevitably do
2024-05-16 15:13:11 +03:00
34799d0776
firefox & curl: default to dns0.eu, but have comment on unfiltered.adguard-dns.con available as well
2024-05-16 15:12:12 +03:00
23803ad433
firefox: restore privacy.userContext
...
Reverts: 4b7eff36b2
2024-05-16 15:06:04 +03:00
5158b52da4
firefox: apparently HTTPS Only mode can be set here contrary to the documentation
...
Also generic hardening(?)
2024-05-16 15:03:01 +03:00
83d53b8c17
systemd-resolved/10-dot-cloudflare.conf: add malicious domain filtering and alternative SNI
2024-05-15 20:38:49 +03:00
ef7584566f
systemd/resolved/10-dot-{443,adguard,dns0}.conf: fix server order
2024-05-15 20:33:23 +03:00
7f918cc797
systemd/resolved.conf.d/README: note my scripts existing
2024-05-15 20:29:59 +03:00
cb3c944d47
systemd-resolved: note server priority
2024-05-15 20:23:27 +03:00
1f5815b54e
hosts/dns: comment the IPv4-as-IPv6 hack, uncomment proper IPv6
2024-05-15 17:44:50 +03:00
4b7eff36b2
firefox: remove privacy.userContext policies for stability reasons (Firefox ESR is upset by them)
2024-05-14 15:40:37 +03:00
8d34384c78
unbound: mark dot-flushable-cache.conf as .badidea
2024-05-14 15:08:26 +03:00
901c634424
unbound: I have been using Fedora for a couple of years, I know where the ca bundle is without attributing to ctrl.blog
2024-05-14 15:07:11 +03:00
78fa2b7b9c
unbound/dns-over-tls.conf: remove ECS and private ECS
2024-05-14 15:01:41 +03:00
8d3609f171
firefox: lock ecs to disabled
2024-05-14 15:01:14 +03:00
5672e14c89
Revert "Stop pretending issues of ECS weight more than pros of it after GApple upgrades delayed my going to bed."
...
This reverts commit afe50117fe
.
2024-05-14 14:47:09 +03:00
c1b1eaa040
unbound/dot-dns0-quad9.conf: add forgotten ports
2024-05-14 12:23:09 +03:00
fb6a44d264
firefox: on second thoughts, let the user have some control
2024-05-14 11:51:22 +03:00
ae0e3beb9a
firefox: fix pdf dark mode
2024-05-14 11:49:17 +03:00
0a9767bf38
etc/samba/playstation2.conf: hide the share from sight
2024-05-14 11:32:46 +03:00
b60bc9f1b8
firefox: switch to AMO version of Privacy Badger
2024-05-14 11:18:26 +03:00
afe50117fe
Stop pretending issues of ECS weight more than pros of it after GApple upgrades delayed my going to bed.
2024-05-14 11:06:01 +03:00
5d46d529bb
firefox: new tab page crashes? No problem, we can disable it.
2024-05-14 11:01:28 +03:00
c23e857c91
firefox: confusing user and default means I can use dark theme here
2024-05-14 10:44:14 +03:00
7b22530eb9
policies.json: seems like I confused default and user
2024-05-14 10:38:39 +03:00
a0795908b2
init-browser-policies.bash: this script requires root by the way
2024-05-14 10:25:49 +03:00
0ce24f54d9
init-browser-policies.bash: rm recursive symlinks caused by multiple runs
2024-05-14 10:20:55 +03:00
303af92a6a
firefox/libreawoo: remove wrong warning
2024-05-14 10:17:22 +03:00
372a032a18
firefox: actually trr.mode 3 may be nice for the ECH
2024-05-14 10:10:50 +03:00
583cc6a8a3
firefox: please do warn if TRR isn't working
2024-05-14 10:08:19 +03:00
7c867e1329
firefox: explicitly allow about:{addons,config,profiles,support}
2024-05-14 09:57:52 +03:00
fb73f8e5d3
firefox: maybe be done with preferences?
2024-05-14 09:55:24 +03:00
5cc2e5d720
firefox: the end of preferences additions is approaching
2024-05-14 09:43:17 +03:00
89dd05c882
firefox: set user policies of hiding Mozilla ads
2024-05-14 09:38:12 +03:00
cb5c844e1c
firefox: TRR IPv6 preference & reading /etc/hosts
2024-05-14 09:34:01 +03:00
82bcaa0d80
firefox: disable prediction/prefetching
...
Interestingly the policy didn't seem to touch the two preferences
2024-05-14 09:25:17 +03:00
88c391fd04
firefox: don't protect any domains from extensions
...
OK, so this simultaneously hurts security as extensions could modify the page,
but it may improve privacy by blocking analytics and it can improve
accessibility for any accessibility extensions.
2024-05-14 09:18:26 +03:00
fd22af5142
firefox: move DoH excluded domains here
2024-05-14 09:12:21 +03:00
beee380a30
firefox: begin adding security preferences
2024-05-14 09:04:56 +03:00
7f653b52e3
firefox/policies/README: note WebsiteFilter as not that useful for me
2024-05-14 08:49:45 +03:00
7a68117198
firefox policies: go wild
2024-05-13 21:54:05 +03:00
0a0fe39076
note to self: firefox TRR policy lock locks trr.mode to 2 (TRR first)
2024-05-13 19:33:30 +03:00
95d59857eb
policies.json: lock DoH provider so I only have to configure it at one place
2024-05-13 18:07:22 +03:00
9b4cc804e5
browsers: expose to Ecosia that we are using gpo (or policies), remove extraneous PostData from Firefox
...
The logic here is hope that it will stop offering the addon if I am following their instructions and sending them the information. Oh and I added icons
2024-05-13 17:56:41 +03:00
d93b8eb3d5
firefox policy: disable bookmarks toolbar, default browser checking & add tracking protection exceptions
2024-05-13 06:29:17 +03:00
575332b4ce
firefox: return to Quad9 ECS, disable Pocket (I don't actually use it), fix search engine typo
2024-05-12 21:43:33 +03:00
f6e8c3fb45
chromium/managed: remember I have a README.md and update it
2024-05-12 18:42:50 +03:00
bb84a4ed65
chromium/managed: add generative-ai.json
2024-05-12 18:40:48 +03:00
4a642d3dea
chromium/managed: add amber-theme-colour.json.sample
...
It looks fancy, while not exactly for me.
2024-05-12 18:34:10 +03:00
87f5c78298
chromium: move safe browsings from managed to recommended
...
I just don't feel right with them being in managed
2024-05-12 18:27:18 +03:00
e5fc9bfbaf
{firefox,chromium}: add Plasma Integration mainly for family
2024-05-12 15:49:12 +03:00
5ea86f54a7
etc/hosts/dns: add the two other adguard options
2024-05-12 15:36:05 +03:00
c9a4a1c7cc
chromium: add doh-adguard policies
2024-05-12 15:30:52 +03:00
dceb88b272
Revert "chromium/recommended/ecosia: trick Brave into using it as well"
...
This reverts commit 4835a8c89d
.
It's too annoying and impractical compared to my apps page.
2024-05-12 09:26:05 +03:00
4835a8c89d
chromium/recommended/ecosia: trick Brave into using it as well
2024-05-11 22:31:26 +03:00
ef00ae4d90
chromium: set Ecosia's DefaultSearchProviderNewTabURL
2024-05-11 22:24:56 +03:00
a4c35994e8
chromium: rename black-theme-colour.json -> black-theme-colour.json.sample to stop me accidentally applying it
2024-05-11 20:36:08 +03:00
4743efb556
chromium: add enable-google-safebrowsing-less-private.json.sample
2024-05-11 20:34:36 +03:00
e2dd25113a
chromium: ExtensionManifestV2Availability expects 2, not true
2024-05-11 19:49:04 +03:00
0ad28afe47
chromium: allow manifestv2, enable chromecast, safebrowsing, passwordleakdetection, efficiencymode, suggest disabling bookmarks bar and document previously forgotten policies
2024-05-11 19:44:16 +03:00
d6aae8fb9a
browsers: add OISD (big) to AdNauseam
2024-05-11 18:01:05 +03:00
7430dd9e99
{firefox,chromium}: add HTTP Indicator
2024-05-11 17:35:37 +03:00
28542ca06a
firefox policy: clean-up attempt
2024-05-11 17:28:29 +03:00
ba4fb50c76
firefox: set DoH to Quad9 DNS as a more international option, Ecosia Search Engine
2024-05-11 17:26:33 +03:00
fef359500f
firefox: add AdNauseam configuration
2024-05-11 17:24:44 +03:00
ec40dd0250
chromium: initial commit of AdNauseam managed configuration
2024-05-11 17:22:26 +03:00
972c866541
chromium/aminda-extensions cleanup
2024-05-11 16:46:20 +03:00
9a974e7bca
{firefox,chromium,edge}: add Ecosia
2024-05-11 16:16:12 +03:00
97bbaa09a1
dracut.conf.d: fix name recovery to rescue, add yes_rescue counterpart
2024-05-11 10:41:41 +03:00
9fcb0aa289
dnf.conf: note install_only_limit and kernel updates
2024-05-10 19:27:32 +03:00
0cb5b0992b
sudoers.d/nordvpnd: instead of restarting DNS, allow reloading it. Also IPv6 enabling
2024-05-10 18:27:06 +03:00
c81c1dd7d0
unbound: restore dot-dns0-quad9.conf with IPv4 for DNS0 & IPv6 for Quad9 ECS
...
This partially reverts commit 422ab0de4e
2024-05-09 20:02:23 +03:00
93e2ab81dd
chromium policy: fix doh-cloudflare-secure.json name inconsistency
2024-05-09 17:11:17 +03:00
764073e241
etc/hosts/blocklist: use only ::1, systemd-resolved will fix it automatically to 127.0.0.1 too
2024-05-09 12:05:37 +03:00
dff016aa45
hosts/dns: IPv4 represented as IPv6 is technically valid, but this feels so wrong...
2024-05-09 10:21:23 +03:00
f5223b871f
etc/hosts/dns: attempt to block private ECS providers on IPv6
2024-05-09 09:48:00 +03:00
9f2b75368d
etc/hosts/dns: add dns9.quad9.net alias (note the first 9)
2024-05-09 09:41:03 +03:00
1e807e888c
etc: add NetworkManager-resolv.conf-restore.bash
2024-05-09 09:38:25 +03:00
6567488801
NetworkManager: also add explicit no-systemd-resolved.conf
2024-05-09 09:31:39 +03:00