# Chromium policies - https://chromeenterprise.google/policies/ - [`aminda-extensions.json`](#aminda-extensionsjson) - [Silk - Privacy Pass Client for the browser](#silk---privacy-pass-client-for-the-browser) - [DuckDuckGo Privacy Essentials](#duckduckgo-privacy-essentials) - [NoScript](#noscript) - [Dark Reader](#dark-reader) - [Privacy Manager](#privacy-manager) - [Fedora User Agent](#fedora-user-agent) - [Snowflake](#snowflake) - [Bitwarden](#bitwarden) - [Privacy Badger](#privacy-badger) - [`disable-floc.json`](#disable-flocjson) - [`disable-incognito.json`](#disable-incognitojson) - [`doh-automatic.json`](#doh-automaticjson) - [`doh-dns0.json`](#doh-dns0json) - [`enable-ech-ocsp.json`](#enable-ech-ocspjson) - [`enable-home-labs.json`](#enable-home-labsjson) - [`force-incognito.json`](#force-incognitojson) - [`https-everywhere.json`](#https-everywherejson) ## `aminda-extensions.json` As I cannot separate the keys to multiple files I am forced to keep them in one and separate by what the file does, `aminda-extensions.json` is unlikely to overlap with someone else. Changing `normal_installed` to `force_installed` would also prevent uninstallation. ### Silk - Privacy Pass Client for the browser - `ajhmfdgkijocedmfjonnpjfojldioehi` Silk or Privacy Pass has a chance of decreasing the amount of captchas especially from Cloudflare when "suspicious" traffic is detected. To intentionally trigger it and what should be allowed in NoScript: - https://captcha.website - https://issuance.privacypass.cloudflare.com ### DuckDuckGo Privacy Essentials - `bkdgflcldnnnapblkhphbgpggdiikppg` Installed by default so Google won't be the default search engine. ### NoScript - `doojmbjmlfjjnbmnoijecmcbfeoakpjm` Appears to make the internet much more pleasant and less distracting in 2024 eliminating the cookie banners and all, while not trusting lists generated by other people. ### Dark Reader - `eimadpbcbfnmbkopoojfekhnkhdbieeh` As playing around with these policies and constantly removing the profile directory doesn't help my migraine. ### Privacy Manager - `giccehglhacakcfemddmfhdkahamfcmd` Quick browser options and data removal on _startup_. Maybe beneficial if incognito is disabled (which again is not great idea for quick guest access?) ### Fedora User Agent - `hojggiaghnldpcknpbciehjcaoafceil` Communicates websites that Ubuntu isn't the only Linux distribution and makes some offer rpm packages directly. ### Snowflake - `mafpmfcccpbjnhfhjnllmmalhifmlcie` Helps bridge traffic to Tor by looking like WebRTC call. ### Bitwarden - `nngceckbapebfimnlniiiahkandclblb` The password manager of my choice. ### Privacy Badger - `pkehgijcmpdhfbdbbnkijodmdjhbjlgp` Configured to learn locally and also in incognito as opposed to only relying on vendor list. Also not display the "Welcome to Privacy Badger screen". See also: - https://github.com/EFForg/privacybadger/blob/master/doc/admin-deployment.md - https://github.com/EFForg/privacybadger/blob/master/src/data/schema.json ## `disable-floc.json` Disables floc or ad topics that are against privacy. - https://start.duckduckgo.com/?q=google+floc+privacy+topics ## `disable-incognito.json` Disables incognito mode. I don't recommend this. ## `doh-automatic.json` If no DNS over HTTPS policy is used, this unlocks the setting. Enabling managed policies disable it by default. Incompatible with any actual DoH policy. ## `doh-dns0.json` Simply enables DNS-over-HTTPS with DNS0.eu ## `enable-ech-ocsp.json` Enables encrypted client hello and OCSP (or CRL?) checks. ## `enable-home-labs.json` Enables home button and access to labs by default. ## `force-incognito.json` Forces incognito mode. I don't recommend this. ## `https-everywhere.json` Enforces https and attempts to upgrade http to https.