Commit Graph

209 Commits

Author SHA1 Message Date
13fa6d00b7
{firefox,chromium}#uBo: attempt to import Rethink lists
Or at least the ones I found easily enough
2024-05-23 09:14:21 +03:00
cb57ba5e3e
firefox: no, don't trim https or URLs for me 2024-05-23 07:02:01 +03:00
f0fe05393e
firefox: add sidebar.revamp and allow unloading Sidebery 2024-05-23 06:57:13 +03:00
4451ecfa31
Dear Firefox, system title bar exists, please use it
I am on Sway, the maximize and minimize do nothing to me and the close annoys me since I Super+Shift+Q or Ctrl+q you anyway
2024-05-22 08:11:29 +03:00
616785fc1f
{firefox,chromium}: trust default restricted domains of Firefox
I trust Privacy Badger to handle any potential trackers there and I especially suspect JavaScript blocking of breaking things. Besides they are very unlikely to be actively malicious.
2024-05-21 21:24:34 +03:00
ae87cac5a8
firefox: set extensions.webextensions.restrictedDomains to user set 2024-05-21 21:17:50 +03:00
1c549d964e
firefox: underline links by default 2024-05-21 20:56:27 +03:00
1769f3b6dc
firefox: remove deprecated navigator.platform as well 2024-05-21 18:59:51 +03:00
7006c43e77
firefox: test if OpenDyslexic extension works even if fonts aren't exposed 2024-05-21 18:23:28 +03:00
2a56a0183b
firefox: disable user-agent header revealing 2024-05-21 18:21:32 +03:00
129a2a04a0
firefox: restore OpenDyslexic since it works with standard contentblocking 2024-05-21 18:07:40 +03:00
ef2232bb2b
firefox: give fingerprintingprotection another chance 2024-05-21 17:42:56 +03:00
3d299f96f5
firefox: tone down the radicalism a bit
This reverts commit 7421820cf6.
2024-05-21 17:12:06 +03:00
7421820cf6
firefox: radicalize and trust only AdNauseam since all protection seems to conflict with accessibility or something else I care about 2024-05-21 16:52:00 +03:00
3f668d68a0
firefox: another prefetch variable 2024-05-21 11:10:12 +03:00
f7a484ca03
{firefox,chromium}: use GET requests with DoH for caching and speed 2024-05-21 11:07:09 +03:00
a2640115c9
firefox: attempt to mitigate CVE-2024-4367 + hardening
https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/
2024-05-21 06:35:32 +03:00
a00bd7ae42
firefox: clear app.update.download.attempts 2024-05-20 19:48:12 +03:00
73ff0cbcf0
{firefox,chromium}: ask for download directory to make drive-by attempts more obvious 2024-05-20 19:42:19 +03:00
0597b4f359
{firefox,chromium}: add PrivacyGuides recommended LegitimateURLShortener.txt 2024-05-20 18:22:29 +03:00
e2188d25f8
{firefox,chromium}: further cut/adjust default allowlists 2024-05-20 18:20:23 +03:00
9a78f6c387
{firefox,chromium}#uBlockOrigin: add uBlock Quick Fixes just in case 2024-05-20 13:30:50 +03:00
9a639609cd
{firefox,chromium}#uBlockOrigin: cut filter lists that no one has asked for yet 2024-05-20 13:21:49 +03:00
5840a1a8c9
{firefox,chromium}: reset accept_languages to Firefox default 2024-05-20 13:11:23 +03:00
889da57c3d
more microsoft login domains + I am not touching browser ETP without a good reason. 2024-05-19 21:12:14 +03:00
6d87da0227
Does Microsoft seriously require en-GB? 2024-05-19 20:57:24 +03:00
81d1a2a0fb
privacy.userContext.extension is extra forbidden! 2024-05-19 20:32:14 +03:00
e066a99481
Does Mozilla have a point in not allowing me to customize fonts through policy? No comment. 2024-05-19 20:19:35 +03:00
fc8efef261
pre-commit: return & run pretty-format-json as I like its sorting 2024-05-19 19:49:46 +03:00
1585a6daae
firefox: or maybe I don't trust my family that much 2024-05-19 19:46:13 +03:00
8b050a2bab
firefox: force enable phishing & malware protection
Although they can still be disabled through about:config, I am trusting my family to not start doing that
2024-05-19 19:31:14 +03:00
ee83db4ddc
firefox: comment fingerprinting protections for now 2024-05-19 19:01:38 +03:00
294bcb4049
policies.json: comment what is unclear and I understand, clear what I don't understand 2024-05-19 18:40:16 +03:00
3ec414c933
firefox: disable extension recommendations & default sending crashreports 2024-05-19 18:28:15 +03:00
c8e85859c3
{firefox,chromium}: accept regional languages as well to not fallback to Russian? 2024-05-19 18:22:21 +03:00
0e5b94c867
firefox: allow disabling peertube-companion, remove forgotten blocked_message & opendyslexic 2024-05-19 18:05:07 +03:00
6c3382683b
firefox: install facebook container 2024-05-19 18:02:54 +03:00
4d11897918
{firefox,chromium}#ubo: add antipaywall.txt which apparently helps with Quora login prompt as well 2024-05-19 15:04:52 +03:00
6ece6f5e75
{firefox,chromium}#ubo: add lists I can imagine triggering in near future 2024-05-19 14:47:06 +03:00
17a189396b
initial commit of firefox-forbidden-policies.js (autoconfig take#2) 2024-05-19 14:05:04 +03:00
6293ce0a14
run prettier on json files (4) 2024-05-19 13:10:20 +03:00
79411a0932
{firefox,brave}: add forgotten integrated protection excemptions 2024-05-19 11:59:50 +03:00
162912dd82
{firefox,chromium}#PrivacyBadger: just trust cloudflare.com directly
I remembered that the analytics domain is cloudflareinsigts.com and I use cloudflare's esni testing etc. too often
2024-05-19 11:54:58 +03:00
79a7e38d93
{firefox,chromium}: actually cut PrivacyBadger's list a lot 2024-05-19 11:41:20 +03:00
1f0ac5a0e9
{firefox,chromium}: simplify allowlist configuration
PrivacyBadger continues having stricter rules and I am trusting it to catch what I let through
2024-05-19 11:38:18 +03:00
b4e1f7fd0e
{firefox,chromium}: allow challenges.cloudflare.com just in case 2024-05-19 11:04:09 +03:00
77e2e37362
{firefox,chromium}: add cookie lists to uBlock Origin
I was staring at them too much while testing policies
2024-05-19 09:53:16 +03:00
e8a3ecff0c
firefox: stop offering to translate English [and Finnish] by default
Otherwise it's not intelligent enough to understand that accepted language en also means en-US
2024-05-19 09:27:32 +03:00
9fff2bb17d
firefox: don't install Dark Reader by default
I cannot deploy it, so I have to configure it anyway and this means only Bitwarden throws a welcome page at me
2024-05-19 09:07:51 +03:00
ea5db5a670
firefox: install Ecosia extension by default for non-{ESR,nightly} 2024-05-19 09:03:51 +03:00
a4f3943073
{firefox,chromium}: add small hints of possibly being connected to Russia
https://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/
2024-05-19 08:32:00 +03:00
9b348b16cc
{firefox,chromium}: switch from AdNauseam to uBlock Origin
I love AdNauseam, but it's a tool for protests and it shows constantly, while uBlock Origin is more sysadmin-friendly deploying silently and not complaining about browser protection or PrivacyBadger etc.
2024-05-19 07:37:33 +03:00
6a9798c61b
firefox: restore prefetching
I accidentally tried it and it's just too significant performance improvement for me to keep disabled. Additionally AdNauseam is making clicks to ads anyway and I think I am still safer than someone who has no tracking protections at all.
2024-05-18 18:44:39 +03:00
2ff416d880
{firefox,chromium}: also enable curben-phishing 2024-05-18 14:04:43 +03:00
20679e705d
{firefox,chromium}: enable AdNauseam ublock-annoyances & adguard-mobile-app-banners 2024-05-18 13:55:18 +03:00
c68e3f66ab
firefox: attempt to enable http for esr 2024-05-18 10:21:44 +03:00
5a88836d59
firefox: Comment/clear network.dns.native_https_query_win10 2024-05-18 09:44:25 +03:00
5995ef8f32
firefox/policies.json: attempt to autoconfig, but again not allowed 2024-05-18 09:24:25 +03:00
1290db73f5
firefox/policies.json: import more disallowed things from autoconfig, comment disallowed ones, clear location provider 2024-05-18 09:15:10 +03:00
df1458af1f
firefox: use system DNS for ECH (and prefer IPv6 and try image.animation.mode)
The last is not allowed for stability reasons apparently.
2024-05-18 07:33:10 +03:00
fb57ae0ea5
firefox & chromium: accidentally silence DuckDuckGo post-install 2024-05-17 14:28:33 +03:00
c92ded3ad3
firefox & chromium: add Ruffle.rs 2024-05-17 11:05:31 +03:00
05a3cb6c08
firefox: allow private ECS 2024-05-16 19:48:39 +03:00
38710540f2
firefox & chromium: add missing favicons for DDG & Brave 2024-05-16 19:12:10 +03:00
729013c3c1
firefox: install user-agent-string-switcher automatically so I don't have to worry about that for Microsoft Teams
TODO: proper automagic deployment
2024-05-16 15:37:59 +03:00
e6f4bd72ba
firefox: explicitly enable FirefoxAccounts & Screenshots
I have a feeling I might sometime have a situation where I want to disable at least accounts
2024-05-16 15:16:25 +03:00
b36f37196f
firefox: lock DoH again since I don't want to worry about multiple places where to edit it when I inevitably do 2024-05-16 15:13:11 +03:00
34799d0776
firefox & curl: default to dns0.eu, but have comment on unfiltered.adguard-dns.con available as well 2024-05-16 15:12:12 +03:00
23803ad433
firefox: restore privacy.userContext
Reverts: 4b7eff36b2
2024-05-16 15:06:04 +03:00
5158b52da4
firefox: apparently HTTPS Only mode can be set here contrary to the documentation
Also generic hardening(?)
2024-05-16 15:03:01 +03:00
4b7eff36b2
firefox: remove privacy.userContext policies for stability reasons (Firefox ESR is upset by them) 2024-05-14 15:40:37 +03:00
8d3609f171
firefox: lock ecs to disabled 2024-05-14 15:01:14 +03:00
fb6a44d264
firefox: on second thoughts, let the user have some control 2024-05-14 11:51:22 +03:00
ae0e3beb9a
firefox: fix pdf dark mode 2024-05-14 11:49:17 +03:00
b60bc9f1b8
firefox: switch to AMO version of Privacy Badger 2024-05-14 11:18:26 +03:00
5d46d529bb
firefox: new tab page crashes? No problem, we can disable it. 2024-05-14 11:01:28 +03:00
c23e857c91
firefox: confusing user and default means I can use dark theme here 2024-05-14 10:44:14 +03:00
7b22530eb9
policies.json: seems like I confused default and user 2024-05-14 10:38:39 +03:00
303af92a6a
firefox/libreawoo: remove wrong warning 2024-05-14 10:17:22 +03:00
372a032a18
firefox: actually trr.mode 3 may be nice for the ECH 2024-05-14 10:10:50 +03:00
583cc6a8a3
firefox: please do warn if TRR isn't working 2024-05-14 10:08:19 +03:00
7c867e1329
firefox: explicitly allow about:{addons,config,profiles,support} 2024-05-14 09:57:52 +03:00
fb73f8e5d3
firefox: maybe be done with preferences? 2024-05-14 09:55:24 +03:00
5cc2e5d720
firefox: the end of preferences additions is approaching 2024-05-14 09:43:17 +03:00
89dd05c882
firefox: set user policies of hiding Mozilla ads 2024-05-14 09:38:12 +03:00
cb5c844e1c
firefox: TRR IPv6 preference & reading /etc/hosts 2024-05-14 09:34:01 +03:00
82bcaa0d80
firefox: disable prediction/prefetching
Interestingly the policy didn't seem to touch the two preferences
2024-05-14 09:25:17 +03:00
88c391fd04
firefox: don't protect any domains from extensions
OK, so this simultaneously hurts security as extensions could modify the page,
but it may improve privacy by blocking analytics and it can improve
accessibility for any accessibility extensions.
2024-05-14 09:18:26 +03:00
fd22af5142
firefox: move DoH excluded domains here 2024-05-14 09:12:21 +03:00
beee380a30
firefox: begin adding security preferences 2024-05-14 09:04:56 +03:00
7f653b52e3
firefox/policies/README: note WebsiteFilter as not that useful for me 2024-05-14 08:49:45 +03:00
7a68117198
firefox policies: go wild 2024-05-13 21:54:05 +03:00
0a0fe39076
note to self: firefox TRR policy lock locks trr.mode to 2 (TRR first) 2024-05-13 19:33:30 +03:00
95d59857eb
policies.json: lock DoH provider so I only have to configure it at one place 2024-05-13 18:07:22 +03:00
9b4cc804e5
browsers: expose to Ecosia that we are using gpo (or policies), remove extraneous PostData from Firefox
The logic here is hope that it will stop offering the addon if I am following their instructions and sending them the information. Oh and I added icons
2024-05-13 17:56:41 +03:00
d93b8eb3d5
firefox policy: disable bookmarks toolbar, default browser checking & add tracking protection exceptions 2024-05-13 06:29:17 +03:00
575332b4ce
firefox: return to Quad9 ECS, disable Pocket (I don't actually use it), fix search engine typo 2024-05-12 21:43:33 +03:00
e5fc9bfbaf
{firefox,chromium}: add Plasma Integration mainly for family 2024-05-12 15:49:12 +03:00
d6aae8fb9a
browsers: add OISD (big) to AdNauseam 2024-05-11 18:01:05 +03:00
7430dd9e99
{firefox,chromium}: add HTTP Indicator 2024-05-11 17:35:37 +03:00