79a7e38d93
{firefox,chromium}: actually cut PrivacyBadger's list a lot
2024-05-19 11:41:20 +03:00
1f0ac5a0e9
{firefox,chromium}: simplify allowlist configuration
...
PrivacyBadger continues having stricter rules and I am trusting it to catch what I let through
2024-05-19 11:38:18 +03:00
b4e1f7fd0e
{firefox,chromium}: allow challenges.cloudflare.com just in case
2024-05-19 11:04:09 +03:00
77e2e37362
{firefox,chromium}: add cookie lists to uBlock Origin
...
I was staring at them too much while testing policies
2024-05-19 09:53:16 +03:00
e8a3ecff0c
firefox: stop offering to translate English [and Finnish] by default
...
Otherwise it's not intelligent enough to understand that accepted language en also means en-US
2024-05-19 09:27:32 +03:00
9fff2bb17d
firefox: don't install Dark Reader by default
...
I cannot deploy it, so I have to configure it anyway and this means only Bitwarden throws a welcome page at me
2024-05-19 09:07:51 +03:00
ea5db5a670
firefox: install Ecosia extension by default for non-{ESR,nightly}
2024-05-19 09:03:51 +03:00
a4f3943073
{firefox,chromium}: add small hints of possibly being connected to Russia
...
https://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/
2024-05-19 08:32:00 +03:00
9b348b16cc
{firefox,chromium}: switch from AdNauseam to uBlock Origin
...
I love AdNauseam, but it's a tool for protests and it shows constantly, while uBlock Origin is more sysadmin-friendly deploying silently and not complaining about browser protection or PrivacyBadger etc.
2024-05-19 07:37:33 +03:00
6a9798c61b
firefox: restore prefetching
...
I accidentally tried it and it's just too significant performance improvement for me to keep disabled. Additionally AdNauseam is making clicks to ads anyway and I think I am still safer than someone who has no tracking protections at all.
2024-05-18 18:44:39 +03:00
2ff416d880
{firefox,chromium}: also enable curben-phishing
2024-05-18 14:04:43 +03:00
20679e705d
{firefox,chromium}: enable AdNauseam ublock-annoyances & adguard-mobile-app-banners
2024-05-18 13:55:18 +03:00
c68e3f66ab
firefox: attempt to enable http for esr
2024-05-18 10:21:44 +03:00
5a88836d59
firefox: Comment/clear network.dns.native_https_query_win10
2024-05-18 09:44:25 +03:00
5995ef8f32
firefox/policies.json: attempt to autoconfig, but again not allowed
2024-05-18 09:24:25 +03:00
1290db73f5
firefox/policies.json: import more disallowed things from autoconfig, comment disallowed ones, clear location provider
2024-05-18 09:15:10 +03:00
df1458af1f
firefox: use system DNS for ECH (and prefer IPv6 and try image.animation.mode)
...
The last is not allowed for stability reasons apparently.
2024-05-18 07:33:10 +03:00
fb57ae0ea5
firefox & chromium: accidentally silence DuckDuckGo post-install
2024-05-17 14:28:33 +03:00
c92ded3ad3
firefox & chromium: add Ruffle.rs
2024-05-17 11:05:31 +03:00
05a3cb6c08
firefox: allow private ECS
2024-05-16 19:48:39 +03:00
38710540f2
firefox & chromium: add missing favicons for DDG & Brave
2024-05-16 19:12:10 +03:00
729013c3c1
firefox: install user-agent-string-switcher automatically so I don't have to worry about that for Microsoft Teams
...
TODO: proper automagic deployment
2024-05-16 15:37:59 +03:00
e6f4bd72ba
firefox: explicitly enable FirefoxAccounts & Screenshots
...
I have a feeling I might sometime have a situation where I want to disable at least accounts
2024-05-16 15:16:25 +03:00
b36f37196f
firefox: lock DoH again since I don't want to worry about multiple places where to edit it when I inevitably do
2024-05-16 15:13:11 +03:00
34799d0776
firefox & curl: default to dns0.eu, but have comment on unfiltered.adguard-dns.con available as well
2024-05-16 15:12:12 +03:00
23803ad433
firefox: restore privacy.userContext
...
Reverts: 4b7eff36b2
2024-05-16 15:06:04 +03:00
5158b52da4
firefox: apparently HTTPS Only mode can be set here contrary to the documentation
...
Also generic hardening(?)
2024-05-16 15:03:01 +03:00
4b7eff36b2
firefox: remove privacy.userContext policies for stability reasons (Firefox ESR is upset by them)
2024-05-14 15:40:37 +03:00
8d3609f171
firefox: lock ecs to disabled
2024-05-14 15:01:14 +03:00
fb6a44d264
firefox: on second thoughts, let the user have some control
2024-05-14 11:51:22 +03:00
ae0e3beb9a
firefox: fix pdf dark mode
2024-05-14 11:49:17 +03:00
b60bc9f1b8
firefox: switch to AMO version of Privacy Badger
2024-05-14 11:18:26 +03:00
5d46d529bb
firefox: new tab page crashes? No problem, we can disable it.
2024-05-14 11:01:28 +03:00
c23e857c91
firefox: confusing user and default means I can use dark theme here
2024-05-14 10:44:14 +03:00
7b22530eb9
policies.json: seems like I confused default and user
2024-05-14 10:38:39 +03:00
303af92a6a
firefox/libreawoo: remove wrong warning
2024-05-14 10:17:22 +03:00
372a032a18
firefox: actually trr.mode 3 may be nice for the ECH
2024-05-14 10:10:50 +03:00
583cc6a8a3
firefox: please do warn if TRR isn't working
2024-05-14 10:08:19 +03:00
7c867e1329
firefox: explicitly allow about:{addons,config,profiles,support}
2024-05-14 09:57:52 +03:00
fb73f8e5d3
firefox: maybe be done with preferences?
2024-05-14 09:55:24 +03:00
5cc2e5d720
firefox: the end of preferences additions is approaching
2024-05-14 09:43:17 +03:00
89dd05c882
firefox: set user policies of hiding Mozilla ads
2024-05-14 09:38:12 +03:00
cb5c844e1c
firefox: TRR IPv6 preference & reading /etc/hosts
2024-05-14 09:34:01 +03:00
82bcaa0d80
firefox: disable prediction/prefetching
...
Interestingly the policy didn't seem to touch the two preferences
2024-05-14 09:25:17 +03:00
88c391fd04
firefox: don't protect any domains from extensions
...
OK, so this simultaneously hurts security as extensions could modify the page,
but it may improve privacy by blocking analytics and it can improve
accessibility for any accessibility extensions.
2024-05-14 09:18:26 +03:00
fd22af5142
firefox: move DoH excluded domains here
2024-05-14 09:12:21 +03:00
beee380a30
firefox: begin adding security preferences
2024-05-14 09:04:56 +03:00
7f653b52e3
firefox/policies/README: note WebsiteFilter as not that useful for me
2024-05-14 08:49:45 +03:00
7a68117198
firefox policies: go wild
2024-05-13 21:54:05 +03:00
0a0fe39076
note to self: firefox TRR policy lock locks trr.mode to 2 (TRR first)
2024-05-13 19:33:30 +03:00
95d59857eb
policies.json: lock DoH provider so I only have to configure it at one place
2024-05-13 18:07:22 +03:00
9b4cc804e5
browsers: expose to Ecosia that we are using gpo (or policies), remove extraneous PostData from Firefox
...
The logic here is hope that it will stop offering the addon if I am following their instructions and sending them the information. Oh and I added icons
2024-05-13 17:56:41 +03:00
d93b8eb3d5
firefox policy: disable bookmarks toolbar, default browser checking & add tracking protection exceptions
2024-05-13 06:29:17 +03:00
575332b4ce
firefox: return to Quad9 ECS, disable Pocket (I don't actually use it), fix search engine typo
2024-05-12 21:43:33 +03:00
e5fc9bfbaf
{firefox,chromium}: add Plasma Integration mainly for family
2024-05-12 15:49:12 +03:00
d6aae8fb9a
browsers: add OISD (big) to AdNauseam
2024-05-11 18:01:05 +03:00
7430dd9e99
{firefox,chromium}: add HTTP Indicator
2024-05-11 17:35:37 +03:00
28542ca06a
firefox policy: clean-up attempt
2024-05-11 17:28:29 +03:00
ba4fb50c76
firefox: set DoH to Quad9 DNS as a more international option, Ecosia Search Engine
2024-05-11 17:26:33 +03:00
fef359500f
firefox: add AdNauseam configuration
2024-05-11 17:24:44 +03:00
9a974e7bca
{firefox,chromium,edge}: add Ecosia
2024-05-11 16:16:12 +03:00
18a04b1351
{firefox,chromium}: disable protections for one.one.one.one
...
For some reason they make connection to 1.1.1.1 appear as no or unreachable.
2024-04-28 09:21:29 +03:00
2113b593e7
Chromium & Firefox: force Bitwarden (for passkeys)
2024-04-27 08:32:39 +03:00
da85d0d9c7
firefox & chromium: allow PrivacyPass attestor & Keyoxide.org
2024-04-27 08:31:05 +03:00
e64e4e7fd0
firefox: DisableEncryptedClientHello: false
...
I am not sure if this does anything, I just saw a message in logs and it didn't trigger an error
2024-04-21 10:13:29 +03:00
6a97040386
firefox: add IPvFoo*
2024-04-21 10:08:43 +03:00
422ab0de4e
libreawoo, unbound & resolved: uncomment Quad9 default, comment ECS
2024-04-20 17:50:12 +03:00
47e51ee38b
firefox policy: use Quad9 ECS as TRR
2024-04-19 08:48:57 +03:00
ac922aea86
{firefox,chromium}: add Floccus bookmarks sync so I will remember its existence
2024-04-14 14:10:39 +03:00
bf1fdc4cff
{firefox,chromium} policy: PB exclude Disroot Mvim, Microsoft {Teams,Learn}
2024-04-12 14:24:31 +03:00
149cadfa41
firefox & chromium: add IPFS Companion
2024-04-10 11:03:19 +03:00
c034e016e8
firefox policy: add search engine suggestion urls
2024-04-05 14:04:14 +03:00
99c63d25fe
{firefox,chromium} policy: add OpenDyslexic
2024-04-04 14:27:43 +03:00
08ae59ed99
firefox policy: configure Homepage
2024-03-31 08:46:12 +03:00
323dde1545
{firefox, chromium}: force install privacy pass
...
This is in hopes of reducing family member frustation with captchas should they happen
2024-03-29 08:32:44 +02:00
58df0709f4
firefox policy README.md: note that search engines also work on nightly
2024-03-24 08:17:31 +02:00
e823810723
firefox: add search engine aliases
2024-03-24 08:16:20 +02:00
4bab0cbb6a
firefox: default to Brave Search
2024-03-24 08:15:43 +02:00
405d407c2a
firefox: add Brave Search Goggles
2024-03-21 17:21:30 +02:00
3e56346be0
firefox: add Brave Search
2024-03-20 18:53:18 +02:00
cc6dbceaff
{firefox,chromium} policy: add UpdateSWH
2024-03-14 20:25:06 +02:00
39b0f1d19a
{firefox,chromium} policy: disable PrivacyBadger on Element Web instances
2024-03-13 11:45:19 +02:00
5c1dce8d36
{firefox,chromium} policy: explicitly configure PrivacyBadger
...
I think all of these default to true anyway, but explicit is better than implicit is what they say
2024-03-12 10:15:15 +02:00
e35c477a71
firefox policy: block uBlock & uMatrix to avoid conflict with force_install AdNauseam
2024-03-09 15:45:02 +02:00
685b14c2f6
firefox policy: block wayback machine
2024-03-09 15:41:39 +02:00
5149b23598
browser policies: add wayback machine
2024-03-08 08:41:41 +02:00
16d6a3df09
browser policies: install Bias Finder
2024-03-08 08:29:54 +02:00
0f23d25647
firefox policy: add offline-qr-code-generator
2024-03-04 12:29:45 +02:00
f2e8b86665
browser policies: remove AdNauseam advancedSettings
2024-03-02 16:26:47 +02:00
6029869230
browsers: force_install Privacy Badger again
...
While this isn't the recommended configuration, Privacy Badger has the
widget replacements, automatic learning (enabled by default as per
this policy), canvas protection etc.
AdNauseam again can replace NoScript (that I previously removed from
the policies for too aggressive for basic users) and fails to click ads
for me anyway, so I think this is the best option for me.
2024-02-29 11:22:29 +02:00
d242b05e76
browser policies: ship AdNauseam in filterAuthorMode
2024-02-29 08:56:59 +02:00
e343e80858
Weaken protection for Ad Nauseam since I am already so unique/fingerprintable
2024-02-28 20:55:46 +02:00
2d7539b0ed
browser policies: install AdNauseam
2024-02-28 20:04:08 +02:00
2e4744bc90
Don't install NoScript on browsers automatically due to being a bit extreme on unsuspecting family members after self-reflection.
2024-02-27 09:44:28 +02:00
5c3e5e29b3
browser policies: add Terms of Service;Didn't Read
2024-02-26 12:20:47 +02:00
8b0e28f417
firefox policies: also keep sidebery installed
2024-02-24 11:08:48 +02:00
3498e0d830
firefox. fix peertube-companion ID
2024-02-23 08:59:50 +02:00
4ff3705df0
firefox: force install peertube companion as a stronger stance against youtube centralization
2024-02-22 19:55:17 +02:00
4dbfd94d90
{chromium,firefox}: force install (& pin in Chromium) Snowflake too
2024-02-19 18:00:06 +02:00
303f69a671
firefox: actually force_install tab suspender
2024-02-19 16:45:36 +02:00