.. | ||
aminda-extensions.json | ||
disable-floc.json | ||
disable-incognito.json | ||
doh-automatic.json | ||
doh-dns0.json | ||
enable-ech-ocsp.json | ||
enable-home.json | ||
force-incognito.json | ||
https-everywhere.json | ||
README.md |
Chromium policies
aminda-extensions.json
disable-floc.json
disable-incognito.json
doh-automatic.json
doh-dns0.json
enable-ech-ocsp.json
enable-home-labs.json
force-incognito.json
https-everywhere.json
aminda-extensions.json
As I cannot separate the keys to multiple files I am forced to keep
them in one and separate by what the file does,
aminda-extensions.json
is unlikely to overlap with someone
else.
Changing normal_installed
to
force_installed
would also prevent uninstallation.
Silk - Privacy Pass Client for the browser
ajhmfdgkijocedmfjonnpjfojldioehi
Silk or Privacy Pass has a chance of decreasing the amount of captchas especially from Cloudflare when “suspicious” traffic is detected.
To intentionally trigger it and what should be allowed in NoScript:
DuckDuckGo Privacy Essentials
bkdgflcldnnnapblkhphbgpggdiikppg
Installed by default so Google won’t be the default search engine, or that would be the idea, but Chromium doesn’t seem to allow that.
Additionally it’s restricted only to google.com
and
duckduckgo.com
domains so it won’t interfere with other
extensions.
NoScript
doojmbjmlfjjnbmnoijecmcbfeoakpjm
Not actually installed by
aminda-extensions.json
anymore due to self-reflection and
deciding it’s a bit much to push on unsuspecting family
members.
Appears to make the internet much more pleasant and less distracting in 2024 eliminating the cookie banners and all, while not trusting lists generated by other people.
Dark Reader
eimadpbcbfnmbkopoojfekhnkhdbieeh
As playing around with these policies and constantly removing the profile directory doesn’t help my migraine.
Indiewiki Buddy
fkagelmloambgokoeokbpihmgpkbgbfm
I am spoilt by how nice Breezewiki is to use and wikis existing outside of Fandom is good to be reminded about occassionally. And I just happened to stay in not so hardened Chromium for a bit due to hardened Firefox being too much for my task and there is no reason occassionally needed Chromium shouldn’t be tolerable for a few minutes.
Privacy Manager
giccehglhacakcfemddmfhdkahamfcmd
Quick browser options and data removal on startup. Maybe beneficial if incognito is disabled (which again is not great idea for quick guest access?)
Terms of Service; Didn’t Read
hjdoplcnndgiblooccencgcggcoihigg
Fedora User Agent
hojggiaghnldpcknpbciehjcaoafceil
Communicates websites that Ubuntu isn’t the only Linux distribution and makes some offer rpm packages directly.
Snowflake
mafpmfcccpbjnhfhjnllmmalhifmlcie
Helps bridge traffic to Tor by looking like WebRTC call.
AdNauseam
mlojlfildnehdpnlmpkeiiglhhkofhpb
Complementing PrivacyBadger with an adblocker so first profile runs have at least something to block Malvertising now that I no longer enable NoScript out of the box.
Bitwarden
nngceckbapebfimnlniiiahkandclblb
The password manager of my choice.
Privacy Badger
pkehgijcmpdhfbdbbnkijodmdjhbjlgp
Configured to learn locally and also in incognito as opposed to only relying on vendor list. Also not display the “Welcome to Privacy Badger screen”.
See also:
- https://github.com/EFForg/privacybadger/blob/master/doc/admin-deployment.md
- https://github.com/EFForg/privacybadger/blob/master/src/data/schema.json
TODO/Inconsistencies
- I am not aware of any New Tab Suspender equivalents, but it might be an integrated feature on some Chromiums.
- Peertubeify doesn’t support Chromium yet.
disable-floc.json
Disables floc or ad topics that are against privacy.
disable-incognito.json
Disables incognito mode. I don’t recommend this.
doh-automatic.json
If no DNS over HTTPS policy is used, this unlocks the setting. Enabling managed policies disable it by default.
Incompatible with any actual DoH policy.
doh-dns0.json
Simply enables DNS-over-HTTPS with DNS0.eu. automatic
means downgrade is allowed (the system resolver is encrypted),
secure
would lock it.
enable-ech-ocsp.json
Enables encrypted client hello and OCSP (or CRL?) checks.
enable-home-labs.json
Enables home button and access to labs by default.
force-incognito.json
Forces incognito mode. I don’t recommend this.
https-everywhere.json
Enforces https and attempts to upgrade http to https.