Compare commits

..

No commits in common. "616785fc1fdbf1ff1b2e80eb5ce24419575b8742" and "7006c43e779d0e00cfd2bdc1deef5db6f7a53fa5" have entirely different histories.

4 changed files with 18 additions and 18 deletions

View File

@ -49,7 +49,7 @@ lockPref("privacy.fingerprintingProtection", true);
//lockPref("privacy.fingerprintingProtection", false); //lockPref("privacy.fingerprintingProtection", false);
pref( pref(
"privacy.fingerprintingProtection.overrides", "privacy.fingerprintingProtection.overrides",
"+AllTargets,-KeyboardEvents,-SpeechSynthesis,-CSSPrefersColorScheme,-CSSPrefersReducedMotion,-NavigatorUserAgent,-JSDateTimeUTC", "+AllTargets,-KeyboardEvents,-SpeechSynthesis,-CSSPrefersColorScheme,-CSSPrefersReducedMotion,-NavigatorPlatform,-NavigatorUserAgent,-JSDateTimeUTC",
); );
//clearPref("privacy.fingerprintingProtection.overrides"); //clearPref("privacy.fingerprintingProtection.overrides");
lockPref("privacy.fingerprintingProtection.pbmode", true); lockPref("privacy.fingerprintingProtection.pbmode", true);
@ -65,6 +65,16 @@ lockPref("privacy.resistFingerprinting.letterboxing", true);
//lockPref("privacy.resistFingerprinting.pbmode", false); //lockPref("privacy.resistFingerprinting.pbmode", false);
clearPref("privacy.resistFingerprinting.pbmode"); clearPref("privacy.resistFingerprinting.pbmode");
// Which extension requires container tabs? My policy and this file. This
// particular option is so forbidden, it cannot be set either in the policy
// or autoconfig.js
lockPref("privacy.userContext.extension", "");
// Enable containers without extensions (although those are forced by the
// policy. TODO: Remove these as they are in the policy, but disallowed by
// current ESR
lockPref("privacy.userContext.enabled", true);
lockPref("privacy.userContext.ui.enabled", true);
// Enables reading mode for all pages (at least in theory) // Enables reading mode for all pages (at least in theory)
lockPref("reader.parse-on-load.force-enabled", true); lockPref("reader.parse-on-load.force-enabled", true);

View File

@ -43,10 +43,7 @@
"challenges.cloudflare.com", "challenges.cloudflare.com",
"duckduckgo.com", "duckduckgo.com",
"ecosia.org", "ecosia.org",
"firefox.com",
"keyoxide.org", "keyoxide.org",
"mozilla.net",
"mozilla.org",
"moz-extension-scheme", "moz-extension-scheme",
"research.cloudflare.com" "research.cloudflare.com"
] ]
@ -402,8 +399,8 @@
"Value": false "Value": false
}, },
"extensions.webextensions.restrictedDomains": { "extensions.webextensions.restrictedDomains": {
"Comment": "Don't protect Mozilla domains from privacy extensions. Always reset it to modified/empty so I can access the original value if I ever need it.", "Comment": "Don't protect Mozilla domains from privacy extensions.",
"Status": "user", "Status": "locked",
"Type": "string", "Type": "string",
"Value": "" "Value": ""
}, },
@ -470,12 +467,6 @@
"Type": "boolean", "Type": "boolean",
"Value": true "Value": true
}, },
"layout.css.always_underline_links": {
"Comment": "Underscore links by default, disabling allowed",
"Status": "default",
"Type": "boolean",
"Value": true
},
"layout.css.devPixelsPerPx": { "layout.css.devPixelsPerPx": {
"Status": "default", "Status": "default",
"Type": "string", "Type": "string",
@ -631,7 +622,7 @@
"Comment": "Preference not allowed for stability reasons. :( https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPTargets.inc", "Comment": "Preference not allowed for stability reasons. :( https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPTargets.inc",
"Status": "locked", "Status": "locked",
"Type": "string", "Type": "string",
"Value": "+AllTargets,-KeyboardEvents,-SpeechSynthesis,-CSSPrefersColorScheme,-CSSPrefersReducedMotion,-NavigatorUserAgent,-JSDateTimeUTC" "Value": "+AllTargets,-KeyboardEvents,-SpeechSynthesis,-CSSPrefersColorScheme,-CSSPrefersReducedMotion,-NavigatorPlatform,-NavigatorUserAgent,-JSDateTimeUTC"
}, },
"privacy.fingerprintingProtection.pbmode": { "privacy.fingerprintingProtection.pbmode": {
"Comment": "Preference not allowed for stability reasons. :(", "Comment": "Preference not allowed for stability reasons. :(",

View File

@ -14,10 +14,7 @@
"challenges.cloudflare.com", "challenges.cloudflare.com",
"duckduckgo.com", "duckduckgo.com",
"ecosia.org", "ecosia.org",
"firefox.com",
"keyoxide.org", "keyoxide.org",
"mozilla.net",
"mozilla.org",
"moz-extension-scheme", "moz-extension-scheme",
"research.cloudflare.com" "research.cloudflare.com"
] ]

View File

@ -3,14 +3,16 @@
set -x set -x
if [ -d ~/src/gitea.blesmrt.net/Mikaela/ssh-allowed_signers ]; then if [ -d ~/src/gitea.blesmrt.net/Mikaela/ssh-allowed_signers ]; then
git verify-commit HEAD printf "\n[OK] ssh-allowed_signers exists\n\n"
sleep 3
else else
echo "Keys not found, cloning..." echo "Keys not found, cloning..."
mkdir -vp ~/src/gitea.blesmrt.net/Mikaela/ mkdir -vp ~/src/gitea.blesmrt.net/Mikaela/
git clone https://gitea.blesmrt.net/Mikaela/ssh-allowed_signers.git ~/src/gitea.blesmrt.net/Mikaela/ssh-allowed_signers git clone https://gitea.blesmrt.net/Mikaela/ssh-allowed_signers.git ~/src/gitea.blesmrt.net/Mikaela/ssh-allowed_signers
fi fi
git verify-commit HEAD
sleep 3
export MIKAELA_GREP=$HOME/.MIKAELA_GREP export MIKAELA_GREP=$HOME/.MIKAELA_GREP
cat rc/bashrc >~/.bashrc cat rc/bashrc >~/.bashrc