Compare commits

..

No commits in common. "38c331494ccfa7a07d44871509623a4022f14089" and "23bbedf852bac652cc112005204118bf59893c1d" have entirely different histories.

7 changed files with 18 additions and 53 deletions

View File

@ -15,7 +15,6 @@ per whatever I am doing.
- [WARNING TO LIBREWOLF USERS](#warning-to-librewolf-users)
- [General warning](#general-warning)
- [Extensions](#extensions)
- [DuckDuckGo](#duckduckgo)
- [Privacy Badger](#privacy-badger)
- [Duplicate](#duplicate)
- [Search engines](#search-engines)
@ -45,13 +44,6 @@ errors in `about:config` depending on the release channel or even all of them.
They are mostly self-explanatory.
### DuckDuckGo
- `jid1-ZAdIEUB7XOzOJw@jetpack`
Although it's not installed, I accidentally learned to manage it to tell it to
shut up on install, because I know what is DuckDuckGo.
### Privacy Badger
- `jid1-MnnxcxisBPnSXQ-eff@jetpack` - Downloaded directly from EFF.

View File

@ -64,9 +64,6 @@
"showCounter": true,
"showIntroPage": false,
"socialWidgetReplacementEnabled": true
},
"jid1-ZAdIEUB7XOzOJw@jetpack": {
"hasSeenPostInstall": true
}
}
},
@ -201,10 +198,6 @@
"{a6c4a591-f1b2-4f03-b3ff-767e5bedf4e7}": {
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/user-agent-string-switcher/latest.xpi",
"installation_mode": "normal_installed"
},
"{b5501fd1-7084-45c5-9aa6-567c2fcf5dc6}": {
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/ruffle_rs/latest.xpi",
"installation_mode": "normal_installed"
}
},
"FirefoxHome": {

View File

@ -29,8 +29,9 @@ printf "WARNING! LibreWolf default profile may be masked!\nhttps://codeberg.org/
ln -fnsv /etc/firefox /etc/firefox-esr
# Chromium
mkdir -vp /etc/opt/chromium/policies/{managed,recommended}
mkdir -vp /etc/opt/chromium/policies/managed
chmod -v a+rx /etc/opt/chromium/policies/
mkdir -vp /etc/opt/chromium/policies/recommended
chmod -v a+rx /etc/opt/chromium/policies/{managed,recommended}/
# Brave

View File

@ -10,11 +10,9 @@
- [`amber-theme-colour.json.sample`](#amber-theme-colourjsonsample)
- [`aminda-extensions.json`](#aminda-extensionsjson)
- [3rdparty](#3rdparty)
- [Silk - Privacy Pass Client for the browser](#silk---privacy-pass-client-for-the-browser)
- [Plasma Integration](#plasma-integration)
- [uBlock Origin](#ublock-origin)
- [Ruffle](#ruffle)
- [HTTP Indicator](#http-indicator)
- [Fedora User Agent](#fedora-user-agent)
- [IPvFooBar](#ipvfoobar)
@ -42,6 +40,7 @@
- [`edge-newtabapps.json`](#edge-newtabappsjson)
- [`edge-screenshots.json`](#edge-screenshotsjson)
- [`enable-chromecast.json`](#enable-chromecastjson)
- [`enable-ech-ocsp.json`](#enable-ech-ocspjson)
- [`enable-labs.json`](#enable-labsjson)
- [`enable-passwordleakdetection.json`](#enable-passwordleakdetectionjson)
- [`enable-tab-suspend.json`](#enable-tab-suspendjson)
@ -75,13 +74,6 @@ even overlapping extensions, but there is an important side goal of _teaching
users to disable extraneous extensions they don't need_ (unless I decide they
do need something and thus it's `force_installed`.
### 3rdparty
- `bkdgflcldnnnapblkhphbgpggdiikppg` - DuckDuckGo
- `caoacbimdbbljakfhgikoodekdnlcgpk` - DuckDuckGo
- `mlojlfildnehdpnlmpkeiiglhhkofhpb` - AdNauseam
- `pkehgijcmpdhfbdbbnkijodmdjhbjlgp` - PrivacyBadger
### [Silk - Privacy Pass Client for the browser](https://chrome.google.com/webstore/detail/ajhmfdgkijocedmfjonnpjfojldioehi)
- `ajhmfdgkijocedmfjonnpjfojldioehi`
@ -108,12 +100,6 @@ downloads indicator/control, KDE Connect, alt-f2, etc.
Blocked for Ad Nauseam
### [Ruffle](https://chrome.google.com/webstore/detail/donbcfbmhbcapadipfkeojnmajbakjdc)
Actively developed open source extension to revive Flash content on the web.
It can also be embedded to webpages, but I would prefer my family to use a
newer version than hope everyone keeps their websites up-to-date.
### [HTTP Indicator](https://chromewebstore.google.com/detail/http-indicator/hgcomhbcacfkpffiphlmnlhpppcjgmbl)
- `hgcomhbcacfkpffiphlmnlhpppcjgmbl`
@ -264,6 +250,16 @@ Explicitly enables screenshotting-
Explicitly enables Chromecast support.
## `enable-ech-ocsp.json`
Enables encrypted client hello (ECH) and Online Certificate Status Protocol
(OCSP)/Certificate Revocation List (CRL) checks.
However ECH requires `"DnsOverHttpsMode": "secure"` which will break things
(and thus my files don't enable it),
or it will occassionally get disabled (I hope they implement it with system
resolver soon).
## `enable-labs.json`
Enables the beaker button "Experiments" for easier management than `about:flags`.
@ -293,14 +289,7 @@ back to Google about them.
## `https-everywhere.json`
This file evolved to merge another one, so now it:
- Online Certificate Status Protocol (OCSP), and Certivicate Revokation List
(CRL) checks.
- Enables Encrypted Client-Hello (ECH), which however requires DNS-Over-HTTPS
to be used.
- Forces HTTPS-only mode to be enabled.
- Attempts to upgrade `http://` queries to `https://`
Enforces https and attempts to upgrade http to https.
## `README.md`

View File

@ -1,12 +1,6 @@
{
"3rdparty": {
"extensions": {
"bkdgflcldnnnapblkhphbgpggdiikppg": {
"hasSeenPostInstall": true
},
"caoacbimdbbljakfhgikoodekdnlcgpk": {
"hasSeenPostInstall": true
},
"mlojlfildnehdpnlmpkeiiglhhkofhpb": {
"toAdd": {
"trustedSiteDirectives": [
@ -89,12 +83,6 @@
"blocked_install_message": "uBlock Origin on integroitu AdNauseamiin, joka on forkki siitä.",
"installation_mode": "blocked"
},
"donbcfbmhbcapadipfkeojnmajbakjdc": {
"installation_mode": "normal_installed",
"override_update_url": true,
"toolbar_pin": "default_unpinned",
"update_url": "https://clients2.google.com/service/update2/crx"
},
"hgcomhbcacfkpffiphlmnlhpppcjgmbl": {
"installation_mode": "normal_installed",
"override_update_url": true,

View File

@ -0,0 +1,4 @@
{
"EnableOnlineRevocationChecks": true,
"EncryptedClientHelloEnabled": true
}

View File

@ -1,6 +1,4 @@
{
"EnableOnlineRevocationChecks": true,
"EncryptedClientHelloEnabled": true,
"HttpsOnlyMode": "force_enabled",
"HttpsUpgradesEnabled": true
}