shell-things/etc/opt/chromium/policies/managed
2024-02-12 17:10:51 +02:00
..
aminda-extensions.json chromium: add noscript 2024-02-10 12:39:19 +02:00
disable-floc.json chromium: add multiple mutually incompatible policy files 2024-02-04 10:21:10 +02:00
disable-incognito.json chromium: add multiple mutually incompatible policy files 2024-02-04 10:21:10 +02:00
doh-automatic.json chromium: rename policies to be in line with my unbound/resolved naming 2024-02-07 10:51:12 +02:00
doh-dns0.json chromium: rename policies to be in line with my unbound/resolved naming 2024-02-07 10:51:12 +02:00
enable-ech-ocsp.json chromium/enable-ech-ocsp.json: additionally enable AdditionalDnsQueryTypesEnabled & BuiltInDnsClientEnabled 2024-02-04 10:29:41 +02:00
enable-home-labs.json chromium: add multiple mutually incompatible policy files 2024-02-04 10:21:10 +02:00
force-incognito.json chromium: add multiple mutually incompatible policy files 2024-02-04 10:21:10 +02:00
https-everywhere.json chrome policies: force_enable HttpsOnlyMode 2024-01-31 14:12:21 +02:00
README.md firefox & chromium policy READMEs: links to upstream on top 2024-02-12 17:10:51 +02:00

Chromium policies

aminda-extensions.json

As I cannot separate the keys to multiple files I am forced to keep them in one and separate by what the file does, aminda-extensions.json is unlikely to overlap with someone else.

Changing normal_installed to force_installed would also prevent uninstallation.

Silk - Privacy Pass Client for the browser

  • ajhmfdgkijocedmfjonnpjfojldioehi

Silk or Privacy Pass has a chance of decreasing the amount of captchas especially from Cloudflare when “suspicious” traffic is detected.

To intentionally trigger it and what should be allowed in NoScript:

DuckDuckGo Privacy Essentials

  • bkdgflcldnnnapblkhphbgpggdiikppg

Installed by default so Google wont be the default search engine.

NoScript

  • doojmbjmlfjjnbmnoijecmcbfeoakpjm

Appears to make the internet much more pleasant and less distracting in 2024 eliminating the cookie banners and all, while not trusting lists generated by other people.

Dark Reader

  • eimadpbcbfnmbkopoojfekhnkhdbieeh

As playing around with these policies and constantly removing the profile directory doesnt help my migraine.

Privacy Manager

  • giccehglhacakcfemddmfhdkahamfcmd

Quick browser options and data removal on startup. Maybe beneficial if incognito is disabled (which again is not great idea for quick guest access?)

Fedora User Agent

  • hojggiaghnldpcknpbciehjcaoafceil

Communicates websites that Ubuntu isnt the only Linux distribution and makes some offer rpm packages directly.

Snowflake

  • mafpmfcccpbjnhfhjnllmmalhifmlcie

Helps bridge traffic to Tor by looking like WebRTC call.

Bitwarden

  • nngceckbapebfimnlniiiahkandclblb

The password manager of my choice.

Privacy Badger

  • pkehgijcmpdhfbdbbnkijodmdjhbjlgp

Configured to learn locally and also in incognito as opposed to only relying on vendor list. Also not display the “Welcome to Privacy Badger screen”.

See also:

disable-floc.json

Disables floc or ad topics that are against privacy.

disable-incognito.json

Disables incognito mode. I dont recommend this.

doh-automatic.json

If no DNS over HTTPS policy is used, this unlocks the setting. Enabling managed policies disable it by default.

Incompatible with any actual DoH policy.

doh-dns0.json

Simply enables DNS-over-HTTPS with DNS0.eu

enable-ech-ocsp.json

Enables encrypted client hello and OCSP (or CRL?) checks.

enable-home-labs.json

Enables home button and access to labs by default.

force-incognito.json

Forces incognito mode. I dont recommend this.

https-everywhere.json

Enforces https and attempts to upgrade http to https.