|
c55b2a6aed
|
{systemd-resolved,unbound}: utilize unfiltered dns0 since nordvpn is unlikely to filter either
|
2024-02-11 13:37:32 +02:00 |
|
|
75d8833b03
|
firefox/policies.json: fix DDG Start Description & Method
|
2024-02-11 13:33:27 +02:00 |
|
|
75b938f3ce
|
firefox policies: restore pocket, searchengines
|
2024-02-11 13:23:04 +02:00 |
|
|
3b99fd30b7
|
Chromium policy README.md: note the PrivacyPass domains
|
2024-02-11 13:13:13 +02:00 |
|
|
2b45c13960
|
Chromium policy README.md: add forgotten NoScript
|
2024-02-11 13:11:37 +02:00 |
|
|
121aedd2ff
|
chromium: add noscript
|
2024-02-10 12:39:19 +02:00 |
|
|
d37d9e8019
|
firefox policies: add noscript
|
2024-02-10 12:34:52 +02:00 |
|
|
e4d223ab42
|
chromium: default unpin snowflake & silk
|
2024-02-08 10:54:05 +02:00 |
|
|
da0ab06fdf
|
chromium: install DuckDuckGo by default
|
2024-02-08 10:46:30 +02:00 |
|
|
7afdc0e046
|
firefox: install DuckDuckGo by default
|
2024-02-08 10:42:34 +02:00 |
|
|
6bd2acac6b
|
firefox policies.json: clean up advertisements
|
2024-02-08 10:31:31 +02:00 |
|
|
963f266dad
|
firefox: note that search engine policy is ESR-only
|
2024-02-08 10:15:26 +02:00 |
|
|
fa4395def9
|
firefox policies.json: add new tab suspender
|
2024-02-08 10:06:57 +02:00 |
|
|
3cd94522df
|
firefox policies.json: add extensions based on the Chromium one
|
2024-02-08 10:03:07 +02:00 |
|
|
e71446363b
|
firefox policy README.md: add link to documentation
|
2024-02-08 09:37:06 +02:00 |
|
|
4a849a8811
|
chromium: add Silk (Privacy Pass) & Snowflake
|
2024-02-07 17:07:54 +02:00 |
|
|
e7f137f282
|
chromium: rename policies to be in line with my unbound/resolved naming
|
2024-02-07 10:51:12 +02:00 |
|
|
c1af586c26
|
chromium README: quick explanations
|
2024-02-07 10:46:57 +02:00 |
|
|
5eab48fcd5
|
chromium README: sort aminda-extensions.json
|
2024-02-07 10:38:15 +02:00 |
|
|
0e26c96b39
|
chromium: add privacy-manager
|
2024-02-07 10:34:43 +02:00 |
|
|
ce175c5645
|
etc/init-browser-policies.bash: ln -siv
|
2024-02-06 11:43:45 +02:00 |
|
|
f4c796c5ed
|
etc: add quick script init-browser-policies.bash
|
2024-02-05 20:54:17 +02:00 |
|
|
e672d04d46
|
rm etc/install
Obsolete script that I don't ever remember using
|
2024-02-05 20:34:45 +02:00 |
|
|
8c11a1afce
|
brave policies
|
2024-02-05 19:06:35 +02:00 |
|
|
f0ee77fa05
|
add symlinks and README for Vivaldi policies as well
|
2024-02-05 18:58:50 +02:00 |
|
|
3c9a97ed2f
|
chromium/enable-ech-ocsp.json: additionally enable AdditionalDnsQueryTypesEnabled & BuiltInDnsClientEnabled
|
2024-02-04 10:29:41 +02:00 |
|
|
902f011468
|
chromium: add multiple mutually incompatible policy files
|
2024-02-04 10:21:10 +02:00 |
|
|
13a8956758
|
{resolved,unbound}/nordvpn: add dns0 in case it helps with automatic connection issues
|
2024-02-02 08:51:52 +02:00 |
|
|
8e1f947591
|
etc/opt: edge is chromium
|
2024-02-01 19:58:11 +02:00 |
|
|
82014c0c0c
|
etc/firefox/policies: add README.md
|
2024-02-01 19:48:27 +02:00 |
|
|
738ddcbfaf
|
firefox policies: add EnableTrackingProtection
|
2024-02-01 19:43:03 +02:00 |
|
|
f0fe1a93b2
|
firefox policies: add DoH
|
2024-02-01 19:36:26 +02:00 |
|
|
2c67c85786
|
rm etc/librewolf: it's not read and overrides LibreWolf customizations
|
2024-02-01 19:07:40 +02:00 |
|
|
f37ec89f3f
|
etc/firefox/policies/policies.json: initial commit (just PrivacyBadger and LibreAwoo symlink so far)
|
2024-02-01 18:50:13 +02:00 |
|
|
b53f8f6f52
|
chroium policy: default_unpin fedora user agent
|
2024-01-31 18:49:16 +02:00 |
|
|
e1eae5dd48
|
chromium policies: throw in Dark Reader and Bitwarden
|
2024-01-31 14:28:14 +02:00 |
|
|
7cb754def8
|
chrome policies: force_enable HttpsOnlyMode
|
2024-01-31 14:12:21 +02:00 |
|
|
23bcc0e908
|
test managed chrome profilies
|
2024-01-31 13:43:10 +02:00 |
|
|
bc39daa2ed
|
unbound/insecure-domains: add norwegianwifi.com
while it's unlikely for me to run unbound on flight
|
2024-01-27 13:09:14 +02:00 |
|
|
57ac0a8c7a
|
systemd: add nordvpnd.service.d
|
2024-01-27 10:20:55 +02:00 |
|
|
7c9aaef375
|
systemd/service.d: add iwd.conf & network-online.conf
|
2024-01-27 10:19:08 +02:00 |
|
|
58bc1dd726
|
systemd-networkd/wlan: comments for when iwd doesn't manage network
|
2024-01-27 10:18:18 +02:00 |
|
|
e9b77cbc05
|
etc/iwd/main.conf: disable network configuration
|
2024-01-27 10:15:54 +02:00 |
|
|
73604ae80f
|
systmed-timesyncd: add {google,facebook}.conf commented
|
2024-01-26 10:47:18 +02:00 |
|
|
cc76eb7d5c
|
timesyncd.conf.d/finland: add ntp.miuku.net
It would have NTS and this is hoping for systemd-timesyncd to support it one day
|
2024-01-26 10:44:55 +02:00 |
|
|
e3381049b5
|
systemd-timesyncd/hetzner: replace with individual servers
|
2024-01-26 10:43:07 +02:00 |
|
|
3b3f1c5193
|
chrony/ntppool.sources: add zone links to comments
|
2024-01-25 09:40:34 +02:00 |
|
|
e2e130ea5d
|
chrony/sources.d/hetzner.sources: replace pool with individual servers
|
2024-01-24 20:32:23 +02:00 |
|
|
ff1bc7b3ba
|
nts-servers.sources: no preferring non-ISP servers
|
2024-01-24 20:00:22 +02:00 |
|
|
e246d21038
|
chrony/sources: add the ntppool.sources although commented
|
2024-01-24 18:04:15 +02:00 |
|