diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/prefsCleaner.sh b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/prefsCleaner.sh
deleted file mode 100755
index b9739b2..0000000
--- a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/prefsCleaner.sh
+++ /dev/null
@@ -1,185 +0,0 @@
-#!/usr/bin/env bash
-
-## prefs.js cleaner for Linux/Mac
-## author: @claustromaniac
-## version: 2.1
-
-## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
-
-## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_prefsCleaner() )
-
-readonly CURRDIR=$(pwd)
-
-## get the full path of this script (readlink for Linux, greadlink for Mac with coreutils installed)
-SCRIPT_FILE=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
-
-## fallback for Macs without coreutils
-[ -z "$SCRIPT_FILE" ] && SCRIPT_FILE=${BASH_SOURCE[0]}
-
-
-AUTOUPDATE=true
-QUICKSTART=false
-
-## download method priority: curl -> wget
-DOWNLOAD_METHOD=''
-if command -v curl >/dev/null; then
- DOWNLOAD_METHOD='curl --max-redirs 3 -so'
-elif command -v wget >/dev/null; then
- DOWNLOAD_METHOD='wget --max-redirect 3 --quiet -O'
-else
- AUTOUPDATE=false
- echo -e "No curl or wget detected.\nAutomatic self-update disabled!"
-fi
-
-fQuit() {
- ## change directory back to the original working directory
- cd "${CURRDIR}"
- [ "$1" -eq 0 ] && echo -e "\n$2" || echo -e "\n$2" >&2
- exit $1
-}
-
-fUsage() {
- echo -e "\nUsage: $0 [-ds]"
- echo -e "
-Optional Arguments:
- -s Start immediately
- -d Don't auto-update prefsCleaner.sh"
-}
-
-download_file() { # expects URL as argument ($1)
- declare -r tf=$(mktemp)
-
- $DOWNLOAD_METHOD "${tf}" "$1" &>/dev/null && echo "$tf" || echo '' # return the temp-filename or empty string on error
-}
-
-fFF_check() {
- # there are many ways to see if firefox is running or not, some more reliable than others
- # this isn't elegant and might not be future-proof but should at least be compatible with any environment
- while [ -e lock ]; do
- echo -e "\nThis Firefox profile seems to be in use. Close Firefox and try again.\n" >&2
- read -r -p "Press any key to continue."
- done
-}
-
-## returns the version number of a prefsCleaner.sh file
-get_prefsCleaner_version() {
- echo "$(sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p' "$1")"
-}
-
-## updates the prefsCleaner.sh file based on the latest public version
-update_prefsCleaner() {
- declare -r tmpfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/prefsCleaner.sh')"
- [ -z "$tmpfile" ] && echo -e "Error! Could not download prefsCleaner.sh" && return 1 # check if download failed
-
- [[ $(get_prefsCleaner_version "$SCRIPT_FILE") == $(get_prefsCleaner_version "$tmpfile") ]] && return 0
-
- mv "$tmpfile" "$SCRIPT_FILE"
- chmod u+x "$SCRIPT_FILE"
- "$SCRIPT_FILE" "$@" -d
- exit 0
-}
-
-fClean() {
- # the magic happens here
- prefs="@@"
- prefexp="user_pref[ ]*\([ ]*[\"']([^\"']+)[\"'][ ]*,"
- while read -r line; do
- if [[ "$line" =~ $prefexp && $prefs != *"@@${BASH_REMATCH[1]}@@"* ]]; then
- prefs="${prefs}${BASH_REMATCH[1]}@@"
- fi
- done <<< "$(grep -E "$prefexp" user.js)"
-
- while IFS='' read -r line || [[ -n "$line" ]]; do
- if [[ "$line" =~ ^$prefexp ]]; then
- if [[ $prefs != *"@@${BASH_REMATCH[1]}@@"* ]]; then
- echo "$line"
- fi
- else
- echo "$line"
- fi
- done < "$1" > prefs.js
-}
-
-fStart() {
- if [ ! -e user.js ]; then
- fQuit 1 "user.js not found in the current directory."
- elif [ ! -e prefs.js ]; then
- fQuit 1 "prefs.js not found in the current directory."
- fi
-
- fFF_check
- mkdir -p prefsjs_backups
- bakfile="prefsjs_backups/prefs.js.backup.$(date +"%Y-%m-%d_%H%M")"
- mv prefs.js "${bakfile}" || fQuit 1 "Operation aborted.\nReason: Could not create backup file $bakfile"
- echo -e "\nprefs.js backed up: $bakfile"
- echo "Cleaning prefs.js..."
- fClean "$bakfile"
- fQuit 0 "All done!"
-}
-
-
-while getopts "sd" opt; do
- case $opt in
- s)
- QUICKSTART=true
- ;;
- d)
- AUTOUPDATE=false
- ;;
- esac
-done
-
-## change directory to the Firefox profile directory
-cd "$(dirname "${SCRIPT_FILE}")"
-
-# Check if running as root and if any files have the owner as root/wheel.
-if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
- fQuit 1 "You shouldn't run this with elevated privileges (such as with doas/sudo)."
-elif [ -n "$(find ./ -user 0)" ]; then
- printf 'It looks like this script was previously run with elevated privileges,
-you will need to change ownership of the following files to your user:\n'
- find . -user 0
- fQuit 1
-fi
-
-[ "$AUTOUPDATE" = true ] && update_prefsCleaner "$@"
-
-echo -e "\n\n"
-echo " ╔══════════════════════════╗"
-echo " ║ prefs.js cleaner ║"
-echo " ║ by claustromaniac ║"
-echo " ║ v2.1 ║"
-echo " ╚══════════════════════════╝"
-echo -e "\nThis script should be run from your Firefox profile directory.\n"
-echo "It will remove any entries from prefs.js that also exist in user.js."
-echo "This will allow inactive preferences to be reset to their default values."
-echo -e "\nThis Firefox profile shouldn't be in use during the process.\n"
-
-[ "$QUICKSTART" = true ] && fStart
-
-echo -e "\nIn order to proceed, select a command below by entering its corresponding number.\n"
-
-select option in Start Help Exit; do
- case $option in
- Start)
- fStart
- ;;
- Help)
- fUsage
- echo -e "\nThis script creates a backup of your prefs.js file before doing anything."
- echo -e "It should be safe, but you can follow these steps if something goes wrong:\n"
- echo "1. Make sure Firefox is closed."
- echo "2. Delete prefs.js in your profile folder."
- echo "3. Delete Invalidprefs.js if you have one in the same folder."
- echo "4. Rename or copy your latest backup to prefs.js."
- echo "5. Run Firefox and see if you notice anything wrong with it."
- echo "6. If you do notice something wrong, especially with your extensions, and/or with the UI, go to about:support, and restart Firefox with add-ons disabled. Then, restart it again normally, and see if the problems were solved."
- echo -e "If you are able to identify the cause of your issues, please bring it up on the arkenfox user.js GitHub repository.\n"
- ;;
- Exit)
- fQuit 0
- ;;
- esac
-done
-
-fQuit 0
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/updater.sh b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/updater.sh
deleted file mode 100755
index 72c77fc..0000000
--- a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/updater.sh
+++ /dev/null
@@ -1,407 +0,0 @@
-#!/usr/bin/env bash
-
-## arkenfox user.js updater for macOS and Linux
-
-## version: 4.0
-## Author: Pat Johnson (@overdodactyl)
-## Additional contributors: @earthlng, @ema-pe, @claustromaniac, @infinitewarp
-
-## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_updater() )
-
-# Check if running as root
-if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
- printf "You shouldn't run this with elevated privileges (such as with doas/sudo).\n"
- exit 1
-fi
-
-readonly CURRDIR=$(pwd)
-
-SCRIPT_FILE=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
-[ -z "$SCRIPT_FILE" ] && SCRIPT_FILE=${BASH_SOURCE[0]}
-readonly SCRIPT_DIR=$(dirname "${SCRIPT_FILE}")
-
-
-#########################
-# Base variables #
-#########################
-
-# Colors used for printing
-RED='\033[0;31m'
-BLUE='\033[0;34m'
-BBLUE='\033[1;34m'
-GREEN='\033[0;32m'
-ORANGE='\033[0;33m'
-CYAN='\033[0;36m'
-NC='\033[0m' # No Color
-
-# Argument defaults
-UPDATE='check'
-CONFIRM='yes'
-OVERRIDE='user-overrides.js'
-BACKUP='multiple'
-COMPARE=false
-SKIPOVERRIDE=false
-VIEW=false
-PROFILE_PATH=false
-ESR=false
-
-# Download method priority: curl -> wget
-DOWNLOAD_METHOD=''
-if command -v curl >/dev/null; then
- DOWNLOAD_METHOD='curl --max-redirs 3 -so'
-elif command -v wget >/dev/null; then
- DOWNLOAD_METHOD='wget --max-redirect 3 --quiet -O'
-else
- echo -e "${RED}This script requires curl or wget.\nProcess aborted${NC}"
- exit 1
-fi
-
-
-show_banner() {
- echo -e "${BBLUE}
- ############################################################################
- #### ####
- #### arkenfox user.js ####
- #### Hardening the Privacy and Security Settings of Firefox ####
- #### Maintained by @Thorin-Oakenpants and @earthlng ####
- #### Updater for macOS and Linux by @overdodactyl ####
- #### ####
- ############################################################################"
- echo -e "${NC}\n"
- echo -e "Documentation for this script is available here: ${CYAN}https://github.com/arkenfox/user.js/wiki/5.1-Updater-[Options]#-maclinux${NC}\n"
-}
-
-#########################
-# Arguments #
-#########################
-
-usage() {
- echo
- echo -e "${BLUE}Usage: $0 [-bcdehlnrsuv] [-p PROFILE] [-o OVERRIDE]${NC}" 1>&2 # Echo usage string to standard error
- echo -e "
-Optional Arguments:
- -h Show this help message and exit.
- -p PROFILE Path to your Firefox profile (if different than the dir of this script)
- IMPORTANT: If the path contains spaces, wrap the entire argument in quotes.
- -l Choose your Firefox profile from a list
- -u Update updater.sh and execute silently. Do not seek confirmation.
- -d Do not look for updates to updater.sh.
- -s Silently update user.js. Do not seek confirmation.
- -b Only keep one backup of each file.
- -c Create a diff file comparing old and new user.js within userjs_diffs.
- -o OVERRIDE Filename or path to overrides file (if different than user-overrides.js).
- If used with -p, paths should be relative to PROFILE or absolute paths
- If given a directory, all files inside will be appended recursively.
- You can pass multiple files or directories by passing a comma separated list.
- Note: If a directory is given, only files inside ending in the extension .js are appended
- IMPORTANT: Do not add spaces between files/paths. Ex: -o file1.js,file2.js,dir1
- IMPORTANT: If any file/path contains spaces, wrap the entire argument in quotes.
- Ex: -o \"override folder\"
- -n Do not append any overrides, even if user-overrides.js exists.
- -v Open the resulting user.js file.
- -r Only download user.js to a temporary file and open it.
- -e Activate ESR related preferences."
- echo
- exit 1
-}
-
-#########################
-# File Handling #
-#########################
-
-download_file() { # expects URL as argument ($1)
- declare -r tf=$(mktemp)
-
- $DOWNLOAD_METHOD "${tf}" "$1" &>/dev/null && echo "$tf" || echo '' # return the temp-filename or empty string on error
-}
-
-open_file() { # expects one argument: file_path
- if [ "$(uname)" == 'Darwin' ]; then
- open "$1"
- elif [ "$(uname -s | cut -c -5)" == "Linux" ]; then
- xdg-open "$1"
- else
- echo -e "${RED}Error: Sorry, opening files is not supported for your OS.${NC}"
- fi
-}
-
-readIniFile() { # expects one argument: absolute path of profiles.ini
- declare -r inifile="$1"
-
- # tempIni will contain: [ProfileX], Name=, IsRelative= and Path= (and Default= if present) of the only (if) or the selected (else) profile
- if [ "$(grep -c '^\[Profile' "${inifile}")" -eq "1" ]; then ### only 1 profile found
- tempIni="$(grep '^\[Profile' -A 4 "${inifile}")"
- else
- echo -e "Profiles found:\n––––––––––––––––––––––––––––––"
- ## cmd-substitution to strip trailing newlines and in quotes to keep internal ones:
- echo "$(grep --color=never -E 'Default=[^1]|\[Profile[0-9]*\]|Name=|Path=|^$' "${inifile}")"
- echo '––––––––––––––––––––––––––––––'
- read -p 'Select the profile number ( 0 for Profile0, 1 for Profile1, etc ) : ' -r
- echo -e "\n"
- if [[ $REPLY =~ ^(0|[1-9][0-9]*)$ ]]; then
- tempIni="$(grep "^\[Profile${REPLY}" -A 4 "${inifile}")" || {
- echo -e "${RED}Profile${REPLY} does not exist!${NC}" && exit 1
- }
- else
- echo -e "${RED}Invalid selection!${NC}" && exit 1
- fi
- fi
-
- # extracting 0 or 1 from the "IsRelative=" line
- declare -r pathisrel=$(sed -n 's/^IsRelative=\([01]\)$/\1/p' <<< "${tempIni}")
-
- # extracting only the path itself, excluding "Path="
- PROFILE_PATH=$(sed -n 's/^Path=\(.*\)$/\1/p' <<< "${tempIni}")
- # update global variable if path is relative
- [[ ${pathisrel} == "1" ]] && PROFILE_PATH="$(dirname "${inifile}")/${PROFILE_PATH}"
-}
-
-getProfilePath() {
- declare -r f1=~/Library/Application\ Support/Firefox/profiles.ini
- declare -r f2=~/.mozilla/firefox/profiles.ini
-
- if [ "$PROFILE_PATH" = false ]; then
- PROFILE_PATH="$SCRIPT_DIR"
- elif [ "$PROFILE_PATH" = 'list' ]; then
- if [[ -f "$f1" ]]; then
- readIniFile "$f1" # updates PROFILE_PATH or exits on error
- elif [[ -f "$f2" ]]; then
- readIniFile "$f2"
- else
- echo -e "${RED}Error: Sorry, -l is not supported for your OS${NC}"
- exit 1
- fi
- #else
- # PROFILE_PATH already set by user with -p
- fi
-}
-
-#########################
-# Update updater.sh #
-#########################
-
-# Returns the version number of a updater.sh file
-get_updater_version() {
- echo "$(sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p' "$1")"
-}
-
-# Update updater.sh
-# Default: Check for update, if available, ask user if they want to execute it
-# Args:
-# -d: New version will not be looked for and update will not occur
-# -u: Check for update, if available, execute without asking
-update_updater() {
- [ "$UPDATE" = 'no' ] && return 0 # User signified not to check for updates
-
- declare -r tmpfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/updater.sh')"
- [ -z "${tmpfile}" ] && echo -e "${RED}Error! Could not download updater.sh${NC}" && return 1 # check if download failed
-
- if [[ $(get_updater_version "$SCRIPT_FILE") < $(get_updater_version "${tmpfile}") ]]; then
- if [ "$UPDATE" = 'check' ]; then
- echo -e "There is a newer version of updater.sh available. ${RED}Update and execute Y/N?${NC}"
- read -p "" -n 1 -r
- echo -e "\n\n"
- [[ $REPLY =~ ^[Yy]$ ]] || return 0 # Update available, but user chooses not to update
- fi
- else
- return 0 # No update available
- fi
- mv "${tmpfile}" "$SCRIPT_FILE"
- chmod u+x "$SCRIPT_FILE"
- "$SCRIPT_FILE" "$@" -d
- exit 0
-}
-
-#########################
-# Update user.js #
-#########################
-
-# Returns version number of a user.js file
-get_userjs_version() {
- [ -e "$1" ] && echo "$(sed -n '4p' "$1")" || echo "Not detected."
-}
-
-add_override() {
- input=$1
- if [ -f "$input" ]; then
- echo "" >> user.js
- cat "$input" >> user.js
- echo -e "Status: ${GREEN}Override file appended:${NC} ${input}"
- elif [ -d "$input" ]; then
- SAVEIFS=$IFS
- IFS=$'\n\b' # Set IFS
- FILES="${input}"/*.js
- for f in $FILES
- do
- add_override "$f"
- done
- IFS=$SAVEIFS # restore $IFS
- else
- echo -e "${ORANGE}Warning: Could not find override file:${NC} ${input}"
- fi
-}
-
-remove_comments() { # expects 2 arguments: from-file and to-file
- sed -e '/^\/\*.*\*\/[[:space:]]*$/d' -e '/^\/\*/,/\*\//d' -e 's|^[[:space:]]*//.*$||' -e '/^[[:space:]]*$/d' -e 's|);[[:space:]]*//.*|);|' "$1" > "$2"
-}
-
-# Applies latest version of user.js and any custom overrides
-update_userjs() {
- declare -r newfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/user.js')"
- [ -z "${newfile}" ] && echo -e "${RED}Error! Could not download user.js${NC}" && return 1 # check if download failed
-
- echo -e "Please observe the following information:
- Firefox profile: ${ORANGE}$(pwd)${NC}
- Available online: ${ORANGE}$(get_userjs_version "$newfile")${NC}
- Currently using: ${ORANGE}$(get_userjs_version user.js)${NC}\n\n"
-
- if [ "$CONFIRM" = 'yes' ]; then
- echo -e "This script will update to the latest user.js file and append any custom configurations from user-overrides.js. ${RED}Continue Y/N? ${NC}"
- read -p "" -n 1 -r
- echo -e "\n"
- if ! [[ $REPLY =~ ^[Yy]$ ]]; then
- echo -e "${RED}Process aborted${NC}"
- rm "$newfile"
- return 1
- fi
- fi
-
- # Copy a version of user.js to diffs folder for later comparison
- if [ "$COMPARE" = true ]; then
- mkdir -p userjs_diffs
- cp user.js userjs_diffs/past_user.js &>/dev/null
- fi
-
- # backup user.js
- mkdir -p userjs_backups
- local bakname="userjs_backups/user.js.backup.$(date +"%Y-%m-%d_%H%M")"
- [ "$BACKUP" = 'single' ] && bakname='userjs_backups/user.js.backup'
- cp user.js "$bakname" &>/dev/null
-
- mv "${newfile}" user.js
- echo -e "Status: ${GREEN}user.js has been backed up and replaced with the latest version!${NC}"
-
- if [ "$ESR" = true ]; then
- sed -e 's/\/\* \(ESR[0-9]\{2,\}\.x still uses all.*\)/\/\/ \1/' user.js > user.js.tmp && mv user.js.tmp user.js
- echo -e "Status: ${GREEN}ESR related preferences have been activated!${NC}"
- fi
-
- # apply overrides
- if [ "$SKIPOVERRIDE" = false ]; then
- while IFS=',' read -ra FILES; do
- for FILE in "${FILES[@]}"; do
- add_override "$FILE"
- done
- done <<< "$OVERRIDE"
- fi
-
- # create diff
- if [ "$COMPARE" = true ]; then
- pastuserjs='userjs_diffs/past_user.js'
- past_nocomments='userjs_diffs/past_userjs.txt'
- current_nocomments='userjs_diffs/current_userjs.txt'
-
- remove_comments "$pastuserjs" "$past_nocomments"
- remove_comments user.js "$current_nocomments"
-
- diffname="userjs_diffs/diff_$(date +"%Y-%m-%d_%H%M").txt"
- diff=$(diff -w -B -U 0 "$past_nocomments" "$current_nocomments")
- if [ -n "$diff" ]; then
- echo "$diff" > "$diffname"
- echo -e "Status: ${GREEN}A diff file was created:${NC} ${PWD}/${diffname}"
- else
- echo -e "Warning: ${ORANGE}Your new user.js file appears to be identical. No diff file was created.${NC}"
- [ "$BACKUP" = 'multiple' ] && rm "$bakname" &>/dev/null
- fi
- rm "$past_nocomments" "$current_nocomments" "$pastuserjs" &>/dev/null
- fi
-
- [ "$VIEW" = true ] && open_file "${PWD}/user.js"
-}
-
-#########################
-# Execute #
-#########################
-
-if [ $# != 0 ]; then
- # Display usage if first argument is -help or --help
- if [ "$1" = '--help' ] || [ "$1" = '-help' ]; then
- usage
- else
- while getopts ":hp:ludsno:bcvre" opt; do
- case $opt in
- h)
- usage
- ;;
- p)
- PROFILE_PATH=${OPTARG}
- ;;
- l)
- PROFILE_PATH='list'
- ;;
- u)
- UPDATE='yes'
- ;;
- d)
- UPDATE='no'
- ;;
- s)
- CONFIRM='no'
- ;;
- n)
- SKIPOVERRIDE=true
- ;;
- o)
- OVERRIDE=${OPTARG}
- ;;
- b)
- BACKUP='single'
- ;;
- c)
- COMPARE=true
- ;;
- v)
- VIEW=true
- ;;
- e)
- ESR=true
- ;;
- r)
- tfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/user.js')"
- [ -z "${tfile}" ] && echo -e "${RED}Error! Could not download user.js${NC}" && exit 1 # check if download failed
- mv "$tfile" "${tfile}.js"
- echo -e "${ORANGE}Warning: user.js was saved to temporary file ${tfile}.js${NC}"
- open_file "${tfile}.js"
- exit 0
- ;;
- \?)
- echo -e "${RED}\n Error! Invalid option: -$OPTARG${NC}" >&2
- usage
- ;;
- :)
- echo -e "${RED}Error! Option -$OPTARG requires an argument.${NC}" >&2
- exit 2
- ;;
- esac
- done
- fi
-fi
-
-show_banner
-update_updater "$@"
-
-getProfilePath # updates PROFILE_PATH or exits on error
-cd "$PROFILE_PATH" || exit 1
-
-# Check if any files have the owner as root/wheel.
-if [ -n "$(find ./ -user 0)" ]; then
- printf 'It looks like this script was previously run with elevated privileges,
-you will need to change ownership of the following files to your user:\n'
- find . -user 0
- cd "$CURRDIR"
- exit 1
-fi
-
-update_userjs
-
-cd "$CURRDIR"
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/user-overrides.js b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/user-overrides.js
deleted file mode 100644
index 98cc07d..0000000
--- a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/user-overrides.js
+++ /dev/null
@@ -1,104 +0,0 @@
-//I read the wiki
-//https://github.com/arkenfox/user.js/wiki/3.2-Overrides-%5BCommon%5D
-
-//DNS over HTTPS
-//Protects web requests from an ISP
-//Please pick a provider you trust.
-//Disable if you use PiHole, but tools like pfBlocker work fine.
-// Cloudflare (default in US & Canada).
-//Quad 9: https://dns.quad9.net/dns-query
-user_pref("network.trr.uri", "https://mozilla.cloudflare-dns.com/dns-query");
-user_pref("network.trr.mode", 2);
-
-//Disable Safe Browsing, this phones home to Google.
-user_pref("browser.safebrowsing.malware.enabled", false);
-user_pref("browser.safebrowsing.phishing.enabled", false);
-user_pref("browser.safebrowsing.downloads.enabled", false);
-
-// Leave IPv6 enabled
-user_pref("network.dns.disableIPv6", false);
-
-//Reenable search engines
-user_pref("keyword.enabled", true);
-//Enable Search Engine suggestion
-user_pref("browser.search.suggest.enabled", false);
-user_pref("browser.urlbar.suggest.searches", false);
-// Disk caching, which might improve performance if enabled.
-user_pref("browser.cache.disk.enable", false);
-//Enable favicons, the icons in bookmarks
-user_pref("browser.shell.shortcutFavicons", true);
-//Enable Mozilla Container Tabs
-//Redundant with Total Cookie Protection, but useful if you have multiple accounts
-//with the same provider (e.g. a work Google account and a personal Google account)
-user_pref("privacy.userContext.enabled", true);
-user_pref("privacy.userContext.ui.enabled", true);
-
-// Strict third party requests, may cause images/video to break.
-user_pref("network.http.referer.XOriginPolicy", 2);
-
-//WebRTC settings, things like video calls
- // user_pref("media.peerconnection.enabled", false);
-// Disable Media Plugins
- // user_pref("media.gmp-provider.enabled", false);
-// Disable DRM, FCKDRM
- // user_pref("media.gmp-widevinecdm.enabled", false);
-user_pref("media.eme.enabled", false);
-//Autoplaying settings
-//0=Allow all, 1=Block non-muted media (default), 5=Block all
- // user_pref("media.autoplay.default", 5);
-//If some websites REALLY need autoplaying...
-//0=sticky (default), 1=transient, 2=user
-user_pref("media.autoplay.blocking_policy", 2);
-
-//Use Disconnect's blocklist to block ads
-user_pref("browser.contentblocking.category", "strict");
-
-//Delete cookies on close, but see below to make exceptions
-/* 2801: delete cookies and site data on exit
- //* 0=keep until they expire (default), 2=keep until you close Firefox
- * [NOTE] A "cookie" block permission also controls localStorage/sessionStorage, indexedDB,
- * sharedWorkers and serviceWorkers. serviceWorkers require an "Allow" permission
- * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
- * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
-user_pref("network.cookie.lifetimePolicy", 2);
-//Disabling disk cache is better, but try this if you like performance
- // user_pref("privacy.clearsitedata.cache.enabled", true);
-
-//Clear data on shutdown
-user_pref("privacy.sanitize.sanitizeOnShutdown", true);
-user_pref("privacy.clearOnShutdown.cache", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.downloads", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.formdata", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.history", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.sessions", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.offlineApps", false); // [DEFAULT: false]
-user_pref("privacy.clearOnShutdown.cookies", false);
- // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false]
-// Manual wiping, such as the forget-me-not button
-user_pref("privacy.cpd.cache", true); // [DEFAULT: true]
-user_pref("privacy.cpd.formdata", true); // [DEFAULT: true]
-user_pref("privacy.cpd.history", true); // [DEFAULT: true]
-user_pref("privacy.cpd.sessions", true); // [DEFAULT: true]
-user_pref("privacy.cpd.offlineApps", false); // [DEFAULT: false]
-user_pref("privacy.cpd.cookies", false);
- // user_pref("privacy.cpd.downloads", true); // not used, see note above
- // user_pref("privacy.cpd.passwords", false); // [DEFAULT: false] not listed
- // user_pref("privacy.cpd.siteSettings", false); // [DEFAULT: false]
-// Delete everything ever.
-user_pref("privacy.sanitize.timeSpan", 0);
-//Delete history, although might be security theater.
-//Helps against forensic tools.
-user_pref("places.history.enabled", false);
-
-//WebGL is a security risk, but sometimes breaks things like 23andMe
-//or Google Maps (not always).
-user_pref("webgl.disabled", true);
-
-//Firefox stores passwords in plain text and obsolete if you use a password manager.
-//Mozilla also told people to stop using their password manager.
-user_pref("signon.rememberSignons", false);
-//Disable Pocket, it's proprietary trash
-user_pref("extensions.pocket.enabled", false);
-// Disable Mozilla account
-user_pref("identity.fxaccounts.enabled", false);
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/user.js b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/user.js
deleted file mode 100644
index c525c2c..0000000
--- a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/user.js
+++ /dev/null
@@ -1,1372 +0,0 @@
-/******
-* name: arkenfox user.js
-* date: 7 June 2024
-* version: 126
-* urls: https://github.com/arkenfox/user.js [repo]
-* : https://arkenfox.github.io/gui/ [interactive]
-* license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
-
-* README:
-
- 1. Consider using Tor Browser if it meets your needs or fits your threat model
- * https://2019.www.torproject.org/about/torusers.html
- 2. Read the entire wiki
- * https://github.com/arkenfox/user.js/wiki
- 3. If you skipped step 2, return to step 2
- 4. Make changes in a user-overrides.js
- * There are often trade-offs and conflicts between security vs privacy vs anti-tracking
- and these need to be balanced against functionality & convenience & breakage
- * Some site breakage and unintended consequences will happen. Everyone's experience will differ
- e.g. some user data is erased on exit (section 2800), change this to suit your needs
- * While not 100% definitive, search for "[SETUP" tags
- 5. Some tag info
- [SETUP-SECURITY] it's one item, read it
- [SETUP-WEB] can cause some websites to break
- [SETUP-CHROME] changes how Firefox itself behaves (i.e. not directly website related)
- 6. Override Recipes: https://github.com/arkenfox/user.js/issues/1080
-
-* RELEASES: https://github.com/arkenfox/user.js/releases
-
- * Use the arkenfox release that matches your Firefox version
- - DON'T wait for arkenfox to update Firefox, nothing major changes these days
- * Each release
- - run prefsCleaner to reset prefs made inactive, including deprecated (9999)
- * ESR
- - It is recommended to not use the updater, or you will get a later version which may cause issues.
- So you should manually append your overrides (and keep a copy), and manually update when you
- change ESR releases (arkenfox is already past that release)
- - If you decide to keep updating, then the onus is on you - also see section 9999
-
-* INDEX:
-
- 0100: STARTUP
- 0200: GEOLOCATION
- 0300: QUIETER FOX
- 0400: SAFE BROWSING
- 0600: BLOCK IMPLICIT OUTBOUND
- 0700: DNS / DoH / PROXY / SOCKS
- 0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
- 0900: PASSWORDS
- 1000: DISK AVOIDANCE
- 1200: HTTPS (SSL/TLS / OCSP / CERTS / HPKP)
- 1600: REFERERS
- 1700: CONTAINERS
- 2000: PLUGINS / MEDIA / WEBRTC
- 2400: DOM (DOCUMENT OBJECT MODEL)
- 2600: MISCELLANEOUS
- 2700: ETP (ENHANCED TRACKING PROTECTION)
- 2800: SHUTDOWN & SANITIZING
- 4000: FPP (fingerprintingProtection)
- 4500: RFP (resistFingerprinting)
- 5000: OPTIONAL OPSEC
- 5500: OPTIONAL HARDENING
- 6000: DON'T TOUCH
- 7000: DON'T BOTHER
- 8000: DON'T BOTHER: FINGERPRINTING
- 9000: NON-PROJECT RELATED
- 9999: DEPRECATED / RENAMED
-
-******/
-
-/* START: internal custom pref to test for syntax errors
- * [NOTE] Not all syntax errors cause parsing to abort i.e. reaching the last debug pref
- * no longer necessarily means that all prefs have been applied. Check the console right
- * after startup for any warnings/error messages related to non-applied prefs
- * [1] https://blog.mozilla.org/nnethercote/2018/03/09/a-new-preferences-parser-for-firefox/ ***/
-user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong with it?");
-
-/* 0000: disable about:config warning ***/
-user_pref("browser.aboutConfig.showWarning", false);
-
-/*** [SECTION 0100]: STARTUP ***/
-user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
-/* 0102: set startup page [SETUP-CHROME]
- * 0=blank, 1=home, 2=last visited page, 3=resume previous session
- * [NOTE] Session Restore is cleared with history (2811), and not used in Private Browsing mode
- * [SETTING] General>Startup>Restore previous session ***/
-user_pref("browser.startup.page", 0);
-/* 0103: set HOME+NEWWINDOW page
- * about:home=Firefox Home (default, see 0105), custom URL, about:blank
- * [SETTING] Home>New Windows and Tabs>Homepage and new windows ***/
-user_pref("browser.startup.homepage", "about:blank");
-/* 0104: set NEWTAB page
- * true=Firefox Home (default, see 0105), false=blank page
- * [SETTING] Home>New Windows and Tabs>New tabs ***/
-user_pref("browser.newtabpage.enabled", false);
-/* 0105: disable sponsored content on Firefox Home (Activity Stream)
- * [SETTING] Home>Firefox Home Content ***/
-user_pref("browser.newtabpage.activity-stream.showSponsored", false); // [FF58+]
-user_pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); // [FF83+] Shortcuts>Sponsored shortcuts
-/* 0106: clear default topsites
- * [NOTE] This does not block you from adding your own ***/
-user_pref("browser.newtabpage.activity-stream.default.sites", "");
-
-/*** [SECTION 0200]: GEOLOCATION ***/
-user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");
-/* 0201: use Mozilla geolocation service instead of Google if permission is granted [FF74+]
- * Optionally enable logging to the console (defaults to false) ***/
-user_pref("geo.provider.network.url", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
- // user_pref("geo.provider.network.logging.enabled", true); // [HIDDEN PREF]
-/* 0202: disable using the OS's geolocation service ***/
-user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
-user_pref("geo.provider.use_corelocation", false); // [MAC]
-user_pref("geo.provider.use_gpsd", false); // [LINUX] [HIDDEN PREF]
-user_pref("geo.provider.use_geoclue", false); // [FF102+] [LINUX]
-
-/*** [SECTION 0300]: QUIETER FOX ***/
-user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
-/** RECOMMENDATIONS ***/
-/* 0320: disable recommendation pane in about:addons (uses Google Analytics) ***/
-user_pref("extensions.getAddons.showPane", false); // [HIDDEN PREF]
-/* 0321: disable recommendations in about:addons' Extensions and Themes panes [FF68+] ***/
-user_pref("extensions.htmlaboutaddons.recommendations.enabled", false);
-/* 0322: disable personalized Extension Recommendations in about:addons and AMO [FF65+]
- * [NOTE] This pref has no effect when Health Reports (0331) are disabled
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to make personalized extension recommendations
- * [1] https://support.mozilla.org/kb/personalized-extension-recommendations ***/
-user_pref("browser.discovery.enabled", false);
-/* 0323: disable shopping experience [FF116+]
- * [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1840156#c0 ***/
-user_pref("browser.shopping.experience2023.enabled", false); // [DEFAULT: false]
-
-/** TELEMETRY ***/
-/* 0330: disable new data submission [FF41+]
- * If disabled, no policy is shown or upload takes place, ever
- * [1] https://bugzilla.mozilla.org/1195552 ***/
-user_pref("datareporting.policy.dataSubmissionEnabled", false);
-/* 0331: disable Health Reports
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send technical... data ***/
-user_pref("datareporting.healthreport.uploadEnabled", false);
-/* 0332: disable telemetry
- * The "unified" pref affects the behavior of the "enabled" pref
- * - If "unified" is false then "enabled" controls the telemetry module
- * - If "unified" is true then "enabled" only controls whether to record extended data
- * [NOTE] "toolkit.telemetry.enabled" is now LOCKED to reflect prerelease (true) or release builds (false) [2]
- * [1] https://firefox-source-docs.mozilla.org/toolkit/components/telemetry/telemetry/internals/preferences.html
- * [2] https://medium.com/georg-fritzsche/data-preference-changes-in-firefox-58-2d5df9c428b5 ***/
-user_pref("toolkit.telemetry.unified", false);
-user_pref("toolkit.telemetry.enabled", false); // see [NOTE]
-user_pref("toolkit.telemetry.server", "data:,");
-user_pref("toolkit.telemetry.archive.enabled", false);
-user_pref("toolkit.telemetry.newProfilePing.enabled", false); // [FF55+]
-user_pref("toolkit.telemetry.shutdownPingSender.enabled", false); // [FF55+]
-user_pref("toolkit.telemetry.updatePing.enabled", false); // [FF56+]
-user_pref("toolkit.telemetry.bhrPing.enabled", false); // [FF57+] Background Hang Reporter
-user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // [FF57+]
-/* 0333: disable Telemetry Coverage
- * [1] https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/ ***/
-user_pref("toolkit.telemetry.coverage.opt-out", true); // [HIDDEN PREF]
-user_pref("toolkit.coverage.opt-out", true); // [FF64+] [HIDDEN PREF]
-user_pref("toolkit.coverage.endpoint.base", "");
-/* 0335: disable Firefox Home (Activity Stream) telemetry ***/
-user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
-user_pref("browser.newtabpage.activity-stream.telemetry", false);
-
-/** STUDIES ***/
-/* 0340: disable Studies
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to install and run studies ***/
-user_pref("app.shield.optoutstudies.enabled", false);
-/* 0341: disable Normandy/Shield [FF60+]
- * Shield is a telemetry system that can push and test "recipes"
- * [1] https://mozilla.github.io/normandy/ ***/
-user_pref("app.normandy.enabled", false);
-user_pref("app.normandy.api_url", "");
-
-/** CRASH REPORTS ***/
-/* 0350: disable Crash Reports ***/
-user_pref("breakpad.reportURL", "");
-user_pref("browser.tabs.crashReporting.sendReport", false); // [FF44+]
- // user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // [FF51+] [DEFAULT: false]
-/* 0351: enforce no submission of backlogged Crash Reports [FF58+]
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send backlogged crash reports ***/
-user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [DEFAULT: false]
-
-/** OTHER ***/
-/* 0360: disable Captive Portal detection
- * [1] https://www.eff.org/deeplinks/2017/08/how-captive-portals-interfere-wireless-security-and-privacy ***/
-user_pref("captivedetect.canonicalURL", "");
-user_pref("network.captive-portal-service.enabled", false); // [FF52+]
-/* 0361: disable Network Connectivity checks [FF65+]
- * [1] https://bugzilla.mozilla.org/1460537 ***/
-user_pref("network.connectivity-service.enabled", false);
-
-/*** [SECTION 0400]: SAFE BROWSING (SB)
- SB has taken many steps to preserve privacy. If required, a full url is never sent
- to Google, only a part-hash of the prefix, hidden with noise of other real part-hashes.
- Firefox takes measures such as stripping out identifying parameters and since SBv4 (FF57+)
- doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
-
- [1] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
- [2] https://wiki.mozilla.org/Security/Safe_Browsing
- [3] https://support.mozilla.org/kb/how-does-phishing-and-malware-protection-work
- [4] https://educatedguesswork.org/posts/safe-browsing-privacy/
-***/
-user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
-/* 0401: disable SB (Safe Browsing)
- * [WARNING] Do this at your own risk! These are the master switches
- * [SETTING] Privacy & Security>Security>... Block dangerous and deceptive content ***/
- // user_pref("browser.safebrowsing.malware.enabled", false);
- // user_pref("browser.safebrowsing.phishing.enabled", false);
-/* 0402: disable SB checks for downloads (both local lookups + remote)
- * This is the master switch for the safebrowsing.downloads* prefs (0403, 0404)
- * [SETTING] Privacy & Security>Security>... "Block dangerous downloads" ***/
- // user_pref("browser.safebrowsing.downloads.enabled", false);
-/* 0403: disable SB checks for downloads (remote)
- * To verify the safety of certain executable files, Firefox may submit some information about the
- * file, including the name, origin, size and a cryptographic hash of the contents, to the Google
- * Safe Browsing service which helps Firefox determine whether or not the file should be blocked
- * [SETUP-SECURITY] If you do not understand this, or you want this protection, then override this ***/
-user_pref("browser.safebrowsing.downloads.remote.enabled", false);
- // user_pref("browser.safebrowsing.downloads.remote.url", ""); // Defense-in-depth
-/* 0404: disable SB checks for unwanted software
- * [SETTING] Privacy & Security>Security>... "Warn you about unwanted and uncommon software" ***/
- // user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
- // user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
-/* 0405: disable "ignore this warning" on SB warnings [FF45+]
- * If clicked, it bypasses the block for that session. This is a means for admins to enforce SB
- * [TEST] see https://github.com/arkenfox/user.js/wiki/Appendix-A-Test-Sites#-mozilla
- * [1] https://bugzilla.mozilla.org/1226490 ***/
- // user_pref("browser.safebrowsing.allowOverride", false);
-
-/*** [SECTION 0600]: BLOCK IMPLICIT OUTBOUND [not explicitly asked for - e.g. clicked on] ***/
-user_pref("_user.js.parrot", "0600 syntax error: the parrot's no more!");
-/* 0601: disable link prefetching
- * [1] https://developer.mozilla.org/docs/Web/HTTP/Link_prefetching_FAQ ***/
-user_pref("network.prefetch-next", false);
-/* 0602: disable DNS prefetching
- * [1] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
-user_pref("network.dns.disablePrefetch", true);
- // user_pref("network.dns.disablePrefetchFromHTTPS", true); // [DEFAULT: true]
-/* 0603: disable predictor / prefetching ***/
-user_pref("network.predictor.enabled", false);
-user_pref("network.predictor.enable-prefetch", false); // [FF48+] [DEFAULT: false]
-/* 0604: disable link-mouseover opening connection to linked server
- * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests ***/
-user_pref("network.http.speculative-parallel-limit", 0);
-/* 0605: disable mousedown speculative connections on bookmarks and history [FF98+] ***/
-user_pref("browser.places.speculativeConnect.enabled", false);
-/* 0610: enforce no "Hyperlink Auditing" (click tracking)
- * [1] https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ***/
- // user_pref("browser.send_pings", false); // [DEFAULT: false]
-
-/*** [SECTION 0700]: DNS / DoH / PROXY / SOCKS ***/
-user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
-/* 0702: set the proxy server to do any DNS lookups when using SOCKS
- * e.g. in Tor, this stops your local DNS server from knowing your Tor destination
- * as a remote Tor node will handle the DNS request
- * [1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
-user_pref("network.proxy.socks_remote_dns", true);
-/* 0703: disable using UNC (Uniform Naming Convention) paths [FF61+]
- * [SETUP-CHROME] Can break extensions for profiles on network shares
- * [1] https://bugzilla.mozilla.org/1413868 ***/
-user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
-/* 0704: disable GIO as a potential proxy bypass vector
- * Gvfs/GIO has a set of supported protocols like obex, network, archive, computer,
- * dav, cdda, gphoto2, trash, etc. From FF87-117, by default only sftp was accepted
- * [1] https://bugzilla.mozilla.org/1433507
- * [2] https://en.wikipedia.org/wiki/GVfs
- * [3] https://en.wikipedia.org/wiki/GIO_(software) ***/
-user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF] [DEFAULT: "" FF118+]
-/* 0705: disable proxy direct failover for system requests [FF91+]
- * [WARNING] Default true is a security feature against malicious extensions [1]
- * [SETUP-CHROME] If you use a proxy and you trust your extensions
- * [1] https://blog.mozilla.org/security/2021/10/25/securing-the-proxy-api-for-firefox-add-ons/ ***/
- // user_pref("network.proxy.failover_direct", false);
-/* 0706: disable proxy bypass for system request failures [FF95+]
- * RemoteSettings, UpdateService, Telemetry [1]
- * [WARNING] If false, this will break the fallback for some security features
- * [SETUP-CHROME] If you use a proxy and you understand the security impact
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1732792,1733994,1733481 ***/
- // user_pref("network.proxy.allow_bypass", false);
-/* 0710: enable DNS-over-HTTPS (DoH) [FF60+]
- * 0=default, 2=increased (TRR (Trusted Recursive Resolver) first), 3=max (TRR only), 5=off (no rollout)
- * see "doh-rollout.home-region": USA 2019, Canada 2021, Russia/Ukraine 2022 [3]
- * [SETTING] Privacy & Security>DNS over HTTPS
- * [1] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/
- * [2] https://wiki.mozilla.org/Security/DOH-resolver-policy
- * [3] https://support.mozilla.org/en-US/kb/firefox-dns-over-https
- * [4] https://www.eff.org/deeplinks/2020/12/dns-doh-and-odoh-oh-my-year-review-2020 ***/
- // user_pref("network.trr.mode", 3);
-/* 0712: set DoH provider
- * The custom uri is the value shown when you "Choose provider>Custom>"
- * [NOTE] If you USE custom then "network.trr.uri" should be set the same
- * [SETTING] Privacy & Security>DNS over HTTPS>Increased/Max>Choose provider ***/
- // user_pref("network.trr.uri", "https://example.dns");
- // user_pref("network.trr.custom_uri", "https://example.dns");
-
-/*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS ***/
-user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
-/* 0801: disable location bar making speculative connections [FF56+]
- * [1] https://bugzilla.mozilla.org/1348275 ***/
-user_pref("browser.urlbar.speculativeConnect.enabled", false);
-/* 0802: disable location bar contextual suggestions
- * [NOTE] The UI is controlled by the .enabled pref
- * [SETTING] Search>Address Bar>Suggestions from...
- * [1] https://blog.mozilla.org/data/2021/09/15/data-and-firefox-suggest/ ***/
- // user_pref("browser.urlbar.quicksuggest.enabled", false); // [FF92+] [DEFAULT: false]
- // user_pref("browser.urlbar.suggest.quicksuggest.nonsponsored", false); // [FF95+] [DEFAULT: false]
- // user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false); // [FF92+] [DEFAULT: false]
-/* 0803: disable live search suggestions
- * [NOTE] Both must be true for live search to work in the location bar
- * [SETUP-CHROME] Override these if you trust and use a privacy respecting search engine
- * [SETTING] Search>Provide search suggestions | Show search suggestions in address bar results ***/
-user_pref("browser.search.suggest.enabled", false);
-user_pref("browser.urlbar.suggest.searches", false);
-/* 0805: disable urlbar trending search suggestions [FF118+]
- * [SETTING] Search>Search Suggestions>Show trending search suggestions (FF119) ***/
-user_pref("browser.urlbar.trending.featureGate", false);
-/* 0806: disable urlbar suggestions ***/
-user_pref("browser.urlbar.addons.featureGate", false); // [FF115+]
-user_pref("browser.urlbar.mdn.featureGate", false); // [FF117+] [HIDDEN PREF]
-user_pref("browser.urlbar.pocket.featureGate", false); // [FF116+] [DEFAULT: false]
-user_pref("browser.urlbar.weather.featureGate", false); // [FF108+] [DEFAULT: false]
-user_pref("browser.urlbar.yelp.featureGate", false); // [FF124+] [DEFAULT: false]
-/* 0807: disable urlbar clipboard suggestions [FF118+] ***/
- // user_pref("browser.urlbar.clipboard.featureGate", false);
-/* 0810: disable search and form history
- * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
- * [NOTE] We also clear formdata on exit (2811)
- * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
- * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
- * [2] https://bugzilla.mozilla.org/381681 ***/
-user_pref("browser.formfill.enable", false);
-/* 0815: disable tab-to-search [FF85+]
- * Alternatively, you can exclude on a per-engine basis by unchecking them in Options>Search
- * [SETTING] Search>Address Bar>When using the address bar, suggest>Search engines ***/
- // user_pref("browser.urlbar.suggest.engines", false);
-/* 0820: disable coloring of visited links
- * [SETUP-HARDEN] Bulk rapid history sniffing was mitigated in 2010 [1][2]. Slower and more expensive
- * redraw timing attacks were largely mitigated in FF77+ [3]. Using RFP (4501) further hampers timing
- * attacks. Don't forget clearing history on exit (2811). However, social engineering [2#limits][4][5]
- * and advanced targeted timing attacks could still produce usable results
- * [1] https://developer.mozilla.org/docs/Web/CSS/Privacy_and_the_:visited_selector
- * [2] https://dbaron.org/mozilla/visited-privacy
- * [3] https://bugzilla.mozilla.org/1632765
- * [4] https://earthlng.github.io/testpages/visited_links.html (see github wiki APPENDIX A on how to use)
- * [5] https://lcamtuf.blogspot.com/2016/08/css-mix-blend-mode-is-bad-for-keeping.html ***/
- // user_pref("layout.css.visited_links_enabled", false);
-/* 0830: enable separate default search engine in Private Windows and its UI setting
- * [SETTING] Search>Default Search Engine>Choose a different default search engine for Private Windows only ***/
-user_pref("browser.search.separatePrivateDefault", true); // [FF70+]
-user_pref("browser.search.separatePrivateDefault.ui.enabled", true); // [FF71+]
-
-/*** [SECTION 0900]: PASSWORDS
- [1] https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas
-***/
-user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
-/* 0903: disable auto-filling username & password form fields
- * can leak in cross-site forms *and* be spoofed
- * [NOTE] Username & password is still available when you enter the field
- * [SETTING] Privacy & Security>Logins and Passwords>Autofill logins and passwords
- * [1] https://freedom-to-tinker.com/2017/12/27/no-boundaries-for-user-identities-web-trackers-exploit-browser-login-managers/
- * [2] https://homes.esat.kuleuven.be/~asenol/leaky-forms/ ***/
-user_pref("signon.autofillForms", false);
-/* 0904: disable formless login capture for Password Manager [FF51+] ***/
-user_pref("signon.formlessCapture.enabled", false);
-/* 0905: limit (or disable) HTTP authentication credentials dialogs triggered by sub-resources [FF41+]
- * hardens against potential credentials phishing
- * 0 = don't allow sub-resources to open HTTP authentication credentials dialogs
- * 1 = don't allow cross-origin sub-resources to open HTTP authentication credentials dialogs
- * 2 = allow sub-resources to open HTTP authentication credentials dialogs (default) ***/
-user_pref("network.auth.subresource-http-auth-allow", 1);
-/* 0906: enforce no automatic authentication on Microsoft sites [FF91+] [WINDOWS 10+]
- * [SETTING] Privacy & Security>Logins and Passwords>Allow Windows single sign-on for...
- * [1] https://support.mozilla.org/kb/windows-sso ***/
- // user_pref("network.http.windows-sso.enabled", false); // [DEFAULT: false]
-
-/*** [SECTION 1000]: DISK AVOIDANCE ***/
-user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
-/* 1001: disable disk cache
- * [SETUP-CHROME] If you think disk cache helps perf, then feel free to override this
- * [NOTE] We also clear cache on exit (2811) ***/
-user_pref("browser.cache.disk.enable", false);
-/* 1002: disable media cache from writing to disk in Private Browsing
- * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB ***/
-user_pref("browser.privatebrowsing.forceMediaMemoryCache", true); // [FF75+]
-user_pref("media.memory_cache_max_size", 65536);
-/* 1003: disable storing extra session data [SETUP-CHROME]
- * define on which sites to save extra session data such as form content, cookies and POST data
- * 0=everywhere, 1=unencrypted sites, 2=nowhere ***/
-user_pref("browser.sessionstore.privacy_level", 2);
-/* 1005: disable automatic Firefox start and session restore after reboot [FF62+] [WINDOWS]
- * [1] https://bugzilla.mozilla.org/603903 ***/
-user_pref("toolkit.winRegisterApplicationRestart", false);
-/* 1006: disable favicons in shortcuts [WINDOWS]
- * URL shortcuts use a cached randomly named .ico file which is stored in your
- * profile/shortcutCache directory. The .ico remains after the shortcut is deleted
- * If set to false then the shortcuts use a generic Firefox icon ***/
-user_pref("browser.shell.shortcutFavicons", false);
-
-/*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP)
- Your cipher and other settings can be used in server side fingerprinting
- [TEST] https://www.ssllabs.com/ssltest/viewMyClient.html
- [TEST] https://browserleaks.com/ssl
- [TEST] https://ja3er.com/
- [1] https://www.securityartwork.es/2017/02/02/tls-client-fingerprinting-with-bro/
-***/
-user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
-/** SSL (Secure Sockets Layer) / TLS (Transport Layer Security) ***/
-/* 1201: require safe negotiation
- * Blocks connections to servers that don't support RFC 5746 [2] as they're potentially vulnerable to a
- * MiTM attack [3]. A server without RFC 5746 can be safe from the attack if it disables renegotiations
- * but the problem is that the browser can't know that. Setting this pref to true is the only way for the
- * browser to ensure there will be no unsafe renegotiations on the channel between the browser and the server
- * [SETUP-WEB] SSL_ERROR_UNSAFE_NEGOTIATION: is it worth overriding this for that one site?
- * [STATS] SSL Labs (May 2024) reports over 99.7% of top sites have secure renegotiation [4]
- * [1] https://wiki.mozilla.org/Security:Renegotiation
- * [2] https://datatracker.ietf.org/doc/html/rfc5746
- * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
- * [4] https://www.ssllabs.com/ssl-pulse/ ***/
-user_pref("security.ssl.require_safe_negotiation", true);
-/* 1206: disable TLS1.3 0-RTT (round-trip time) [FF51+]
- * This data is not forward secret, as it is encrypted solely under keys derived using
- * the offered PSK. There are no guarantees of non-replay between connections
- * [1] https://github.com/tlswg/tls13-spec/issues/1001
- * [2] https://www.rfc-editor.org/rfc/rfc9001.html#name-replay-attacks-with-0-rtt
- * [3] https://blog.cloudflare.com/tls-1-3-overview-and-q-and-a/ ***/
-user_pref("security.tls.enable_0rtt_data", false);
-
-/** OCSP (Online Certificate Status Protocol)
- [1] https://scotthelme.co.uk/revocation-is-broken/
- [2] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/
-***/
-/* 1211: enforce OCSP fetching to confirm current validity of certificates
- * 0=disabled, 1=enabled (default), 2=enabled for EV certificates only
- * OCSP (non-stapled) leaks information about the sites you visit to the CA (cert authority)
- * It's a trade-off between security (checking) and privacy (leaking info to the CA)
- * [NOTE] This pref only controls OCSP fetching and does not affect OCSP stapling
- * [SETTING] Privacy & Security>Security>Certificates>Query OCSP responder servers...
- * [1] https://en.wikipedia.org/wiki/Ocsp ***/
-user_pref("security.OCSP.enabled", 1); // [DEFAULT: 1]
-/* 1212: set OCSP fetch failures (non-stapled, see 1211) to hard-fail
- * [SETUP-WEB] SEC_ERROR_OCSP_SERVER_ERROR
- * When a CA cannot be reached to validate a cert, Firefox just continues the connection (=soft-fail)
- * Setting this pref to true tells Firefox to instead terminate the connection (=hard-fail)
- * It is pointless to soft-fail when an OCSP fetch fails: you cannot confirm a cert is still valid (it
- * could have been revoked) and/or you could be under attack (e.g. malicious blocking of OCSP servers)
- * [1] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/
- * [2] https://www.imperialviolet.org/2014/04/19/revchecking.html ***/
-user_pref("security.OCSP.require", true);
-
-/** CERTS / HPKP (HTTP Public Key Pinning) ***/
-/* 1223: enable strict PKP (Public Key Pinning)
- * 0=disabled, 1=allow user MiTM (default; such as your antivirus), 2=strict
- * [SETUP-WEB] MOZILLA_PKIX_ERROR_KEY_PINNING_FAILURE ***/
-user_pref("security.cert_pinning.enforcement_level", 2);
-/* 1224: enable CRLite [FF73+]
- * 0 = disabled
- * 1 = consult CRLite but only collect telemetry
- * 2 = consult CRLite and enforce both "Revoked" and "Not Revoked" results
- * 3 = consult CRLite and enforce "Not Revoked" results, but defer to OCSP for "Revoked" (default)
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1429800,1670985,1753071
- * [2] https://blog.mozilla.org/security/tag/crlite/ ***/
-user_pref("security.remote_settings.crlite_filters.enabled", true);
-user_pref("security.pki.crlite_mode", 2);
-
-/** MIXED CONTENT ***/
-/* 1241: disable insecure passive content (such as images) on https pages ***/
- // user_pref("security.mixed_content.block_display_content", true); // Defense-in-depth (see 1244)
-/* 1244: enable HTTPS-Only mode in all windows
- * When the top-level is HTTPS, insecure subresources are also upgraded (silent fail)
- * [SETTING] to add site exceptions: Padlock>HTTPS-Only mode>On (after "Continue to HTTP Site")
- * [SETTING] Privacy & Security>HTTPS-Only Mode (and manage exceptions)
- * [TEST] http://example.com [upgrade]
- * [TEST] http://httpforever.com/ | http://http.rip [no upgrade] ***/
-user_pref("dom.security.https_only_mode", true); // [FF76+]
- // user_pref("dom.security.https_only_mode_pbm", true); // [FF80+]
-/* 1245: enable HTTPS-Only mode for local resources [FF77+] ***/
- // user_pref("dom.security.https_only_mode.upgrade_local", true);
-/* 1246: disable HTTP background requests [FF82+]
- * When attempting to upgrade, if the server doesn't respond within 3 seconds, Firefox sends
- * a top-level HTTP request without path in order to check if the server supports HTTPS or not
- * This is done to avoid waiting for a timeout which takes 90 seconds
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1642387,1660945 ***/
-user_pref("dom.security.https_only_mode_send_http_background_request", false);
-
-/** UI (User Interface) ***/
-/* 1270: display warning on the padlock for "broken security" (if 1201 is false)
- * Bug: warning padlock not indicated for subresources on a secure page! [2]
- * [1] https://wiki.mozilla.org/Security:Renegotiation
- * [2] https://bugzilla.mozilla.org/1353705 ***/
-user_pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
-/* 1272: display advanced information on Insecure Connection warning pages
- * only works when it's possible to add an exception
- * i.e. it doesn't work for HSTS discrepancies (https://subdomain.preloaded-hsts.badssl.com/)
- * [TEST] https://expired.badssl.com/ ***/
-user_pref("browser.xul.error_pages.expert_bad_cert", true);
-
-/*** [SECTION 1600]: REFERERS
- full URI: https://example.com:8888/foo/bar.html?id=1234
- scheme+host+port+path: https://example.com:8888/foo/bar.html
- scheme+host+port: https://example.com:8888
- [1] https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
-***/
-user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
-/* 1602: control the amount of cross-origin information to send [FF52+]
- * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
-user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
-
-/*** [SECTION 1700]: CONTAINERS ***/
-user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
-/* 1701: enable Container Tabs and its UI setting [FF50+]
- * [SETTING] General>Tabs>Enable Container Tabs
- * https://wiki.mozilla.org/Security/Contextual_Identity_Project/Containers ***/
-user_pref("privacy.userContext.enabled", true);
-user_pref("privacy.userContext.ui.enabled", true);
-/* 1702: set behavior on "+ Tab" button to display container menu on left click [FF74+]
- * [NOTE] The menu is always shown on long press and right click
- * [SETTING] General>Tabs>Enable Container Tabs>Settings>Select a container for each new tab ***/
- // user_pref("privacy.userContext.newTabContainerOnLeftClick.enabled", true);
-/* 1703: set external links to open in site-specific containers [FF123+]
- * [SETUP-WEB] Depending on your container extension(s) and their settings
- * true=Firefox will not choose a container (so your extension can)
- * false=Firefox will choose the container/no-container (default)
- * [1] https://bugzilla.mozilla.org/1874599 ***/
- // user_pref("browser.link.force_default_user_context_id_for_external_opens", true);
-
-/*** [SECTION 2000]: PLUGINS / MEDIA / WEBRTC ***/
-user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
-/* 2002: force WebRTC inside the proxy [FF70+] ***/
-user_pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true);
-/* 2003: force a single network interface for ICE candidates generation [FF42+]
- * When using a system-wide proxy, it uses the proxy interface
- * [1] https://developer.mozilla.org/en-US/docs/Web/API/RTCIceCandidate
- * [2] https://wiki.mozilla.org/Media/WebRTC/Privacy ***/
-user_pref("media.peerconnection.ice.default_address_only", true);
-/* 2004: force exclusion of private IPs from ICE candidates [FF51+]
- * [SETUP-HARDEN] This will protect your private IP even in TRUSTED scenarios after you
- * grant device access, but often results in breakage on video-conferencing platforms ***/
- // user_pref("media.peerconnection.ice.no_host", true);
-/* 2020: disable GMP (Gecko Media Plugins)
- * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
- // user_pref("media.gmp-provider.enabled", false);
-
-/*** [SECTION 2400]: DOM (DOCUMENT OBJECT MODEL) ***/
-user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");
-/* 2402: prevent scripts from moving and resizing open windows ***/
-user_pref("dom.disable_window_move_resize", true);
-
-/*** [SECTION 2600]: MISCELLANEOUS ***/
-user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
-/* 2603: remove temp files opened from non-PB windows with an external application
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=302433,1738574 ***/
-user_pref("browser.download.start_downloads_in_tmp_dir", true); // [FF102+]
-user_pref("browser.helperApps.deleteTempFileOnExit", true);
-/* 2606: disable UITour backend so there is no chance that a remote page can use it ***/
-user_pref("browser.uitour.enabled", false);
- // user_pref("browser.uitour.url", ""); // Defense-in-depth
-/* 2608: reset remote debugging to disabled
- * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16222 ***/
-user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
-/* 2615: disable websites overriding Firefox's keyboard shortcuts [FF58+]
- * 0 (default) or 1=allow, 2=block
- * [SETTING] to add site exceptions: Ctrl+I>Permissions>Override Keyboard Shortcuts ***/
- // user_pref("permissions.default.shortcuts", 2);
-/* 2616: remove special permissions for certain mozilla domains [FF35+]
- * [1] resource://app/defaults/permissions ***/
-user_pref("permissions.manager.defaultsUrl", "");
-/* 2617: remove webchannel whitelist ***/
-user_pref("webchannel.allowObject.urlWhitelist", "");
-/* 2619: use Punycode in Internationalized Domain Names to eliminate possible spoofing
- * [SETUP-WEB] Might be undesirable for non-latin alphabet users since legitimate IDN's are also punycoded
- * [TEST] https://www.xn--80ak6aa92e.com/ (www.apple.com)
- * [1] https://wiki.mozilla.org/IDN_Display_Algorithm
- * [2] https://en.wikipedia.org/wiki/IDN_homograph_attack
- * [3] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=punycode+firefox
- * [4] https://www.xudongz.com/blog/2017/idn-phishing/ ***/
-user_pref("network.IDN_show_punycode", true);
-/* 2620: enforce PDFJS, disable PDFJS scripting
- * This setting controls if the option "Display in Firefox" is available in the setting below
- * and by effect controls whether PDFs are handled in-browser or externally ("Ask" or "Open With")
- * [WHY] pdfjs is lightweight, open source, and secure: the last exploit was June 2015 [1]
- * It doesn't break "state separation" of browser content (by not sharing with OS, independent apps).
- * It maintains disk avoidance and application data isolation. It's convenient. You can still save to disk.
- * [NOTE] JS can still force a pdf to open in-browser by bundling its own code
- * [SETUP-CHROME] You may prefer a different pdf reader for security/workflow reasons
- * [SETTING] General>Applications>Portable Document Format (PDF)
- * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=pdf.js+firefox ***/
-user_pref("pdfjs.disabled", false); // [DEFAULT: false]
-user_pref("pdfjs.enableScripting", false); // [FF86+]
-/* 2624: disable middle click on new tab button opening URLs or searches using clipboard [FF115+] */
-user_pref("browser.tabs.searchclipboardfor.middleclick", false); // [DEFAULT: false NON-LINUX]
-/* 2630: disable content analysis by DLP (Data Loss Prevention) agents
- * DLP agents are background processes on managed computers that allow enterprises to monitor locally running
- * applications for data exfiltration events, which they can allow/block based on customer defined DLP policies.
- * [1] https://github.com/chromium/content_analysis_sdk */
-user_pref("browser.contentanalysis.default_allow", false); // [FF124+] [DEFAULT: false]
-
-/** DOWNLOADS ***/
-/* 2651: enable user interaction for security by always asking where to download
- * [SETUP-CHROME] On Android this blocks longtapping and saving images
- * [SETTING] General>Downloads>Always ask you where to save files ***/
-user_pref("browser.download.useDownloadDir", false);
-/* 2652: disable downloads panel opening on every download [FF96+] ***/
-user_pref("browser.download.alwaysOpenPanel", false);
-/* 2653: disable adding downloads to the system's "recent documents" list ***/
-user_pref("browser.download.manager.addToRecentDocs", false);
-/* 2654: enable user interaction for security by always asking how to handle new mimetypes [FF101+]
- * [SETTING] General>Files and Applications>What should Firefox do with other files ***/
-user_pref("browser.download.always_ask_before_handling_new_types", true);
-
-/** EXTENSIONS ***/
-/* 2660: limit allowed extension directories
- * 1=profile, 2=user, 4=application, 8=system, 16=temporary, 31=all
- * The pref value represents the sum: e.g. 5 would be profile and application directories
- * [SETUP-CHROME] Breaks usage of files which are installed outside allowed directories
- * [1] https://archive.is/DYjAM ***/
-user_pref("extensions.enabledScopes", 5); // [HIDDEN PREF]
- // user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
-/* 2661: disable bypassing 3rd party extension install prompts [FF82+]
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1659530,1681331 ***/
-user_pref("extensions.postDownloadThirdPartyPrompt", false);
-/* 2662: disable webextension restrictions on certain mozilla domains (you also need 4503) [FF60+]
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
- // user_pref("extensions.webextensions.restrictedDomains", "");
-
-/*** [SECTION 2700]: ETP (ENHANCED TRACKING PROTECTION) ***/
-user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
-/* 2701: enable ETP Strict Mode [FF86+]
- * ETP Strict Mode enables Total Cookie Protection (TCP)
- * [NOTE] Adding site exceptions disables all ETP protections for that site and increases the risk of
- * cross-site state tracking e.g. exceptions for SiteA and SiteB means PartyC on both sites is shared
- * [1] https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/
- * [SETTING] to add site exceptions: Urlbar>ETP Shield
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Enhanced Tracking Protection>Manage Exceptions ***/
-user_pref("browser.contentblocking.category", "strict"); // [HIDDEN PREF]
-/* 2702: disable ETP web compat features [FF93+]
- * [SETUP-HARDEN] Includes skip lists, heuristics (SmartBlock) and automatic grants
- * Opener and redirect heuristics are granted for 30 days, see [3]
- * [1] https://blog.mozilla.org/security/2021/07/13/smartblock-v2/
- * [2] https://hg.mozilla.org/mozilla-central/rev/e5483fd469ab#l4.12
- * [3] https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning#storage_access_heuristics ***/
- // user_pref("privacy.antitracking.enableWebcompat", false);
-
-/*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
-user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
-/* 2810: enable Firefox to clear items on shutdown
- * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes | Settings ***/
-user_pref("privacy.sanitize.sanitizeOnShutdown", true);
-
-/** SANITIZE ON SHUTDOWN: IGNORES "ALLOW" SITE EXCEPTIONS | v2 migration is FF128+ ***/
-/* 2811: set/enforce what items to clear on shutdown (if 2810 is true) [SETUP-CHROME]
- * [NOTE] If "history" is true, downloads will also be cleared ***/
-user_pref("privacy.clearOnShutdown.cache", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown_v2.cache", true); // [FF128+] [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.downloads", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.formdata", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.history", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown_v2.historyFormDataAndDownloads", true); // [FF128+] [DEFAULT: true]
- // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false]
- // user_pref("privacy.clearOnShutdown_v2.siteSettings", false); // [FF128+] [DEFAULT: false]
-/* 2812: set Session Restore to clear on shutdown (if 2810 is true) [FF34+]
- * [NOTE] Not needed if Session Restore is not used (0102) or it is already cleared with history (2811)
- * [NOTE] If true, this prevents resuming from crashes (also see 5008) ***/
- // user_pref("privacy.clearOnShutdown.openWindows", true);
-
-/** SANITIZE ON SHUTDOWN: RESPECTS "ALLOW" SITE EXCEPTIONS FF103+ | v2 migration is FF128+ ***/
-/* 2815: set "Cookies" and "Site Data" to clear on shutdown (if 2810 is true) [SETUP-CHROME]
- * [NOTE] Exceptions: A "cookie" block permission also controls "offlineApps" (see note below).
- * serviceWorkers require an "Allow" permission. For cross-domain logins, add exceptions for
- * both sites e.g. https://www.youtube.com (site) + https://accounts.google.com (single sign on)
- * [NOTE] "offlineApps": Offline Website Data: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
- * [NOTE] "sessions": Active Logins (has no site exceptions): refers to HTTP Basic Authentication [1], not logins via cookies
- * [WARNING] Be selective with what sites you "Allow", as they also disable partitioning (1767271)
- * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow (when on the website in question)
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings
- * [1] https://en.wikipedia.org/wiki/Basic_access_authentication ***/
-user_pref("privacy.clearOnShutdown.cookies", true); // Cookies
-user_pref("privacy.clearOnShutdown.offlineApps", true); // Site Data
-user_pref("privacy.clearOnShutdown.sessions", true); // Active Logins [DEFAULT: true]
-user_pref("privacy.clearOnShutdown_v2.cookiesAndStorage", true); // Cookies, Site Data, Active Logins [FF128+]
-
-/** SANITIZE SITE DATA: IGNORES "ALLOW" SITE EXCEPTIONS ***/
-/* 2820: set manual "Clear Data" items [SETUP-CHROME] [FF128+]
- * Firefox remembers your last choices. This will reset them when you start Firefox
- * [SETTING] Privacy & Security>Browser Privacy>Cookies and Site Data>Clear Data ***/
-user_pref("privacy.clearSiteData.cache", true);
-user_pref("privacy.clearSiteData.cookiesAndStorage", false); // keep false until it respects "allow" site exceptions
-user_pref("privacy.clearSiteData.historyFormDataAndDownloads", true);
- // user_pref("privacy.clearSiteData.siteSettings", false);
-
-/** SANITIZE HISTORY: IGNORES "ALLOW" SITE EXCEPTIONS | clearHistory migration is FF128+ ***/
-/* 2830: set manual "Clear History" items, also via Ctrl-Shift-Del [SETUP-CHROME]
- * Firefox remembers your last choices. This will reset them when you start Firefox
- * [NOTE] Regardless of what you set "downloads" to, as soon as the dialog
- * for "Clear Recent History" is opened, it is synced to the same as "history"
- * [SETTING] Privacy & Security>History>Custom Settings>Clear History ***/
-user_pref("privacy.cpd.cache", true); // [DEFAULT: true]
-user_pref("privacy.clearHistory.cache", true);
-user_pref("privacy.cpd.formdata", true); // [DEFAULT: true]
-user_pref("privacy.cpd.history", true); // [DEFAULT: true]
- // user_pref("privacy.cpd.downloads", true); // not used, see note above
-user_pref("privacy.clearHistory.historyFormDataAndDownloads", true);
-user_pref("privacy.cpd.cookies", false);
-user_pref("privacy.cpd.sessions", true); // [DEFAULT: true]
-user_pref("privacy.cpd.offlineApps", false); // [DEFAULT: false]
-user_pref("privacy.clearHistory.cookiesAndStorage", false);
- // user_pref("privacy.cpd.openWindows", false); // Session Restore
- // user_pref("privacy.cpd.passwords", false);
- // user_pref("privacy.cpd.siteSettings", false);
- // user_pref("privacy.clearHistory.siteSettings", false);
-
-/** SANITIZE MANUAL: TIMERANGE ***/
-/* 2840: set "Time range to clear" for "Clear Data" (2820) and "Clear History" (2830)
- * Firefox remembers your last choice. This will reset the value when you start Firefox
- * 0=everything, 1=last hour, 2=last two hours, 3=last four hours, 4=today
- * [NOTE] Values 5 (last 5 minutes) and 6 (last 24 hours) are not listed in the dropdown,
- * which will display a blank value, and are not guaranteed to work ***/
-user_pref("privacy.sanitize.timeSpan", 0);
-
-/*** [SECTION 4000]: FPP (fingerprintingProtection)
- RFP (4501) overrides FPP
-
- In FF118+ FPP is on by default in private windows (4001) and in FF119+ is controlled
- by ETP (2701). FPP will also use Remote Services in future to relax FPP protections
- on a per site basis for compatibility (4003).
-
- 1826408 - restrict fonts to system (kBaseFonts + kLangPackFonts) (Windows, Mac, some Linux)
- https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc
- 1858181 - subtly randomize canvas per eTLD+1, per session and per window-mode (FF120+)
-***/
-user_pref("_user.js.parrot", "4000 syntax error: the parrot's bereft of life!");
-/* 4001: enable FPP in PB mode [FF114+]
- * [NOTE] In FF119+, FPP for all modes (7016) is enabled with ETP Strict (2701) ***/
- // user_pref("privacy.fingerprintingProtection.pbmode", true); // [DEFAULT: true FF118+]
-/* 4002: set global FPP overrides [FF114+]
- * Controls what protections FPP uses globally, including "RFPTargets" (despite the name these are
- * not used by RFP) e.g. "+AllTargets,-CSSPrefersColorScheme" or "-AllTargets,+CanvasRandomization"
- * [NOTE] Be aware that not all RFP protections are necessarily in RFPTargets
- * [WARNING] Not recommended. Either use RFP or FPP at defaults
- * [1] https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPTargets.inc ***/
- // user_pref("privacy.fingerprintingProtection.overrides", "");
-/* 4003: disable remote FPP overrides [FF127+] ***/
- // user_pref("privacy.fingerprintingProtection.remoteOverrides.enabled", false);
-
-/*** [SECTION 4500]: RFP (resistFingerprinting)
- RFP overrides FPP (4000)
-
- It is an all-or-nothing buy in: you cannot pick and choose what parts you want
- [TEST] https://arkenfox.github.io/TZP/tzp.html
-
- [WARNING] DO NOT USE extensions to alter RFP protected metrics
-
- 418986 - limit window.screen & CSS media queries (FF41)
- 1281949 - spoof screen orientation (FF50)
- 1360039 - spoof navigator.hardwareConcurrency as 2 (FF55)
- FF56
- 1333651 - spoof User Agent & Navigator API
- version: android version spoofed as ESR (FF119 or lower)
- OS: JS spoofed as Windows 10, OS 10.15, Android 10, or Linux | HTTP Headers spoofed as Windows or Android
- 1369319 - disable device sensor API
- 1369357 - disable site specific zoom
- 1337161 - hide gamepads from content
- 1372072 - spoof network information API as "unknown" when dom.netinfo.enabled = true
- 1333641 - reduce fingerprinting in WebSpeech API
- FF57
- 1369309 - spoof media statistics
- 1382499 - reduce screen co-ordinate fingerprinting in Touch API
- 1217290 & 1409677 - enable some fingerprinting resistance for WebGL
- 1354633 - limit MediaError.message to a whitelist
- FF58+
- 1372073 - spoof/block fingerprinting in MediaDevices API (FF59)
- Spoof: enumerate devices as one "Internal Camera" and one "Internal Microphone"
- Block: suppresses the ondevicechange event
- 1039069 - warn when language prefs are not set to "en*" (FF59)
- 1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events (FF59)
- Spoofing mimics the content language of the document. Currently it only supports en-US.
- Modifier events suppressed are SHIFT and both ALT keys. Chrome is not affected.
- 1337157 - disable WebGL debug renderer info (FF60)
- 1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62)
- 1479239 - return "no-preference" with prefers-reduced-motion (FF63)
- 1363508 - spoof/suppress Pointer Events (FF64)
- 1492766 - spoof pointerEvent.pointerid (FF65)
- 1485266 - disable exposure of system colors to CSS or canvas (FF67)
- 1494034 - return "light" with prefers-color-scheme (FF67)
- 1564422 - spoof audioContext outputLatency (FF70)
- 1595823 - return audioContext sampleRate as 44100 (FF72)
- 1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74)
- 1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78)
- 1506364 - return "no-preference" with prefers-contrast (FF80)
- 1653987 - limit font visibility to bundled and "Base Fonts" (Windows, Mac, some Linux) (FF80)
- 1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82)
- 531915 - use fdlibm's sin, cos and tan in jsmath (FF93, ESR91.1)
- 1756280 - enforce navigator.pdfViewerEnabled as true and plugins/mimeTypes as hard-coded values (FF100-115)
- 1692609 - reduce JS timing precision to 16.67ms (previously FF55+ was 100ms) (FF102)
- 1422237 - return "srgb" with color-gamut (FF110)
- 1794628 - return "none" with inverted-colors (FF114)
- 1554751 - return devicePixelRatio as 2 (previously FF41+ was 1) (FF127)
- 1787790 - normalize system fonts (FF128)
- 1835987 - spoof timezone as Atlantic/Reykjavik (previously FF55+ was UTC) (FF128)
-***/
-user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
-/* 4501: enable RFP
- * [SETUP-WEB] RFP can cause some website breakage: mainly canvas, use a canvas site exception via the urlbar.
- * RFP also has a few side effects: mainly timezone is UTC, and websites will prefer light theme
- * [NOTE] pbmode applies if true and the original pref is false
- * [1] https://bugzilla.mozilla.org/418986 ***/
-user_pref("privacy.resistFingerprinting", true); // [FF41+]
- // user_pref("privacy.resistFingerprinting.pbmode", true); // [FF114+]
-/* 4502: set new window size rounding max values [FF55+]
- * [SETUP-CHROME] sizes round down in hundreds: width to 200s and height to 100s, to fit your screen
- * [1] https://bugzilla.mozilla.org/1330882 ***/
-user_pref("privacy.window.maxInnerWidth", 1600);
-user_pref("privacy.window.maxInnerHeight", 900);
-/* 4503: disable mozAddonManager Web API [FF57+]
- * [NOTE] To allow extensions to work on AMO, you also need 2662
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
-user_pref("privacy.resistFingerprinting.block_mozAddonManager", true);
-/* 4504: enable RFP letterboxing [FF67+]
- * Dynamically resizes the inner window by applying margins in stepped ranges [2]
- * If you use the dimension pref, then it will only apply those resolutions.
- * The format is "width1xheight1, width2xheight2, ..." (e.g. "800x600, 1000x1000")
- * [SETUP-WEB] This is independent of RFP (4501). If you're not using RFP, or you are but
- * dislike the margins, then flip this pref, keeping in mind that it is effectively fingerprintable
- * [WARNING] DO NOT USE: the dimension pref is only meant for testing
- * [1] https://bugzilla.mozilla.org/1407366
- * [2] https://hg.mozilla.org/mozilla-central/rev/6d2d7856e468#l2.32 ***/
-user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
- // user_pref("privacy.resistFingerprinting.letterboxing.dimensions", ""); // [HIDDEN PREF]
-/* 4505: experimental RFP [FF91+]
- * [WARNING] DO NOT USE unless testing, see [1] comment 12
- * [1] https://bugzilla.mozilla.org/1635603 ***/
- // user_pref("privacy.resistFingerprinting.exemptedDomains", "*.example.invalid");
-/* 4506: disable RFP spoof english prompt [FF59+]
- * 0=prompt, 1=disabled, 2=enabled (requires RFP)
- * [NOTE] When changing from value 2, preferred languages ('intl.accept_languages') is not reset.
- * [SETUP-WEB] when enabled, sets 'en-US, en' for displaying pages and 'en-US' as locale.
- * [SETTING] General>Language>Choose your preferred language for displaying pages>Choose>Request English... ***/
-user_pref("privacy.spoof_english", 1);
-/* 4510: disable using system colors
- * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
-user_pref("browser.display.use_system_colors", false); // [DEFAULT: false NON-WINDOWS]
-/* 4511: enforce non-native widget theme
- * Security: removes/reduces system API calls, e.g. win32k API [1]
- * Fingerprinting: provides a uniform look and feel across platforms [2]
- * [1] https://bugzilla.mozilla.org/1381938
- * [2] https://bugzilla.mozilla.org/1411425 ***/
-user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true]
-/* 4512: enforce links targeting new windows to open in a new tab instead
- * 1=most recent window or tab, 2=new window, 3=new tab
- * Stops malicious window sizes and some screen resolution leaks.
- * You can still right-click a link and open in a new window
- * [SETTING] General>Tabs>Open links in tabs instead of new windows
- * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
- * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
-user_pref("browser.link.open_newwindow", 3); // [DEFAULT: 3]
-/* 4513: set all open window methods to abide by "browser.link.open_newwindow" (4512)
- * [1] https://searchfox.org/mozilla-central/source/dom/tests/browser/browser_test_new_window_from_content.js ***/
-user_pref("browser.link.open_newwindow.restriction", 0);
-/* 4520: disable WebGL (Web Graphics Library)
- * [SETUP-WEB] If you need it then override it. RFP still randomizes canvas for naive scripts ***/
-user_pref("webgl.disabled", true);
-
-/*** [SECTION 5000]: OPTIONAL OPSEC
- Disk avoidance, application data isolation, eyeballs...
-***/
-user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow");
-/* 5001: start Firefox in PB (Private Browsing) mode
- * [NOTE] In this mode all windows are "private windows" and the PB mode icon is not displayed
- * [NOTE] The P in PB mode can be misleading: it means no "persistent" disk state such as history,
- * caches, searches, cookies, localStorage, IndexedDB etc (which you can achieve in normal mode).
- * In fact, PB mode limits or removes the ability to control some of these, and you need to quit
- * Firefox to clear them. PB is best used as a one off window (Menu>New Private Window) to provide
- * a temporary self-contained new session. Close all private windows to clear the PB session.
- * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
- * [1] https://wiki.mozilla.org/Private_Browsing
- * [2] https://support.mozilla.org/kb/common-myths-about-private-browsing ***/
- // user_pref("browser.privatebrowsing.autostart", true);
-/* 5002: disable memory cache
- * capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kibibytes ***/
- // user_pref("browser.cache.memory.enable", false);
- // user_pref("browser.cache.memory.capacity", 0);
-/* 5003: disable saving passwords
- * [NOTE] This does not clear any passwords already saved
- * [SETTING] Privacy & Security>Logins and Passwords>Ask to save logins and passwords for websites ***/
- // user_pref("signon.rememberSignons", false);
-/* 5004: disable permissions manager from writing to disk [FF41+] [RESTART]
- * [NOTE] This means any permission changes are session only
- * [1] https://bugzilla.mozilla.org/967812 ***/
- // user_pref("permissions.memory_only", true); // [HIDDEN PREF]
-/* 5005: disable intermediate certificate caching [FF41+] [RESTART]
- * [NOTE] This affects login/cert/key dbs. The effect is all credentials are session-only.
- * Saved logins and passwords are not available. Reset the pref and restart to return them ***/
- // user_pref("security.nocertdb", true);
-/* 5006: disable favicons in history and bookmarks
- * [NOTE] Stored as data blobs in favicons.sqlite, these don't reveal anything that your
- * actual history (and bookmarks) already do. Your history is more detailed, so
- * control that instead; e.g. disable history, clear history on exit, use PB mode
- * [NOTE] favicons.sqlite is sanitized on Firefox close ***/
- // user_pref("browser.chrome.site_icons", false);
-/* 5007: exclude "Undo Closed Tabs" in Session Restore ***/
- // user_pref("browser.sessionstore.max_tabs_undo", 0);
-/* 5008: disable resuming session from crash
- * [TEST] about:crashparent ***/
- // user_pref("browser.sessionstore.resume_from_crash", false);
-/* 5009: disable "open with" in download dialog [FF50+]
- * Application data isolation [1]
- * [1] https://bugzilla.mozilla.org/1281959 ***/
- // user_pref("browser.download.forbid_open_with", true);
-/* 5010: disable location bar suggestion types
- * [SETTING] Search>Address Bar>When using the address bar, suggest ***/
- // user_pref("browser.urlbar.suggest.history", false);
- // user_pref("browser.urlbar.suggest.bookmark", false);
- // user_pref("browser.urlbar.suggest.openpage", false);
- // user_pref("browser.urlbar.suggest.topsites", false); // [FF78+]
-/* 5011: disable location bar dropdown
- * This value controls the total number of entries to appear in the location bar dropdown ***/
- // user_pref("browser.urlbar.maxRichResults", 0);
-/* 5012: disable location bar autofill
- * [1] https://support.mozilla.org/kb/address-bar-autocomplete-firefox#w_url-autocomplete ***/
- // user_pref("browser.urlbar.autoFill", false);
-/* 5013: disable browsing and download history
- * [NOTE] We also clear history and downloads on exit (2811)
- * [SETTING] Privacy & Security>History>Custom Settings>Remember browsing and download history ***/
- // user_pref("places.history.enabled", false);
-/* 5014: disable Windows jumplist [WINDOWS] ***/
- // user_pref("browser.taskbar.lists.enabled", false);
- // user_pref("browser.taskbar.lists.frequent.enabled", false);
- // user_pref("browser.taskbar.lists.recent.enabled", false);
- // user_pref("browser.taskbar.lists.tasks.enabled", false);
-/* 5016: discourage downloading to desktop
- * 0=desktop, 1=downloads (default), 2=custom
- * [SETTING] To set your custom default "downloads": General>Downloads>Save files to ***/
- // user_pref("browser.download.folderList", 2);
-/* 5017: disable Form Autofill
- * If .supportedCountries includes your region (browser.search.region) and .supported
- * is "detect" (default), then the UI will show. Stored data is not secure, uses JSON
- * [SETTING] Privacy & Security>Forms and Autofill>Autofill addresses
- * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill ***/
- // user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
- // user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
-/* 5018: limit events that can cause a pop-up ***/
- // user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
-/* 5019: disable page thumbnail collection ***/
- // user_pref("browser.pagethumbnails.capturing_disabled", true); // [HIDDEN PREF]
-/* 5020: disable Windows native notifications and use app notications instead [FF111+] [WINDOWS] ***/
- // user_pref("alerts.useSystemBackend.windows.notificationserver.enabled", false);
-/* 5021: disable location bar using search
- * Don't leak URL typos to a search engine, give an error message instead
- * Examples: "secretplace,com", "secretplace/com", "secretplace com", "secret place.com"
- * [NOTE] This does not affect explicit user action such as using search buttons in the
- * dropdown, or using keyword search shortcuts you configure in options (e.g. "d" for DuckDuckGo) ***/
- // user_pref("keyword.enabled", false);
-
-/*** [SECTION 5500]: OPTIONAL HARDENING
- Not recommended. Overriding these can cause breakage and performance issues,
- they are mostly fingerprintable, and the threat model is practically nonexistent
-***/
-user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
-/* 5501: disable MathML (Mathematical Markup Language) [FF51+]
- * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=mathml ***/
- // user_pref("mathml.disabled", true); // 1173199
-/* 5502: disable in-content SVG (Scalable Vector Graphics) [FF53+]
- * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+svg ***/
- // user_pref("svg.disabled", true); // 1216893
-/* 5503: disable graphite
- * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+graphite
- * [2] https://en.wikipedia.org/wiki/Graphite_(SIL) ***/
- // user_pref("gfx.font_rendering.graphite.enabled", false);
-/* 5504: disable asm.js [FF22+]
- * [1] http://asmjs.org/
- * [2] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=asm.js
- * [3] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
- // user_pref("javascript.options.asmjs", false);
-/* 5505: disable Ion and baseline JIT to harden against JS exploits
- * [NOTE] When both Ion and JIT are disabled, and trustedprincipals
- * is enabled, then Ion can still be used by extensions (1599226)
- * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+jit
- * [2] https://microsoftedge.github.io/edgevr/posts/Super-Duper-Secure-Mode/ ***/
- // user_pref("javascript.options.ion", false);
- // user_pref("javascript.options.baselinejit", false);
- // user_pref("javascript.options.jit_trustedprincipals", true); // [FF75+] [HIDDEN PREF]
-/* 5506: disable WebAssembly [FF52+]
- * Vulnerabilities [1] have increasingly been found, including those known and fixed
- * in native programs years ago [2]. WASM has powerful low-level access, making
- * certain attacks (brute-force) and vulnerabilities more possible
- * [STATS] ~0.2% of websites, about half of which are for cryptomining / malvertising [2][3]
- * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=wasm
- * [2] https://spectrum.ieee.org/tech-talk/telecom/security/more-worries-over-the-security-of-web-assembly
- * [3] https://www.zdnet.com/article/half-of-the-websites-using-webassembly-use-it-for-malicious-purposes ***/
- // user_pref("javascript.options.wasm", false);
-/* 5507: disable rendering of SVG OpenType fonts ***/
- // user_pref("gfx.font_rendering.opentype_svg.enabled", false);
-/* 5508: disable all DRM content (EME: Encryption Media Extension)
- * Optionally hide the UI setting which also disables the DRM prompt
- * [SETTING] General>DRM Content>Play DRM-controlled content
- * [TEST] https://bitmovin.com/demos/drm
- * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
- // user_pref("media.eme.enabled", false);
- // user_pref("browser.eme.ui.enabled", false);
-/* 5509: disable IPv6 if using a VPN
- * This is an application level fallback. Disabling IPv6 is best done at an OS/network
- * level, and/or configured properly in system wide VPN setups.
- * [SETUP-WEB] PR_CONNECT_RESET_ERROR
- * [NOTE] PHP defaults to IPv6 with "localhost". Use "php -S 127.0.0.1:PORT"
- * [TEST] https://ipleak.org/
- * [1] https://www.internetsociety.org/tag/ipv6-security/ (Myths 2,4,5,6) ***/
- // user_pref("network.dns.disableIPv6", true);
-/* 5510: control when to send a cross-origin referer
- * 0=always (default), 1=only if base domains match, 2=only if hosts match
- * [NOTE] Will cause breakage: older modems/routers and some sites e.g banks, vimeo, icloud, instagram ***/
- // user_pref("network.http.referer.XOriginPolicy", 2);
-/* 5511: set DoH bootstrap address [FF89+]
- * Firefox uses the system DNS to initially resolve the IP address of your DoH server.
- * When set to a valid, working value that matches your "network.trr.uri" (0712) Firefox
- * won't use the system DNS. If the IP doesn't match then DoH won't work ***/
- // user_pref("network.trr.bootstrapAddr", "10.0.0.1"); // [HIDDEN PREF]
-
-/*** [SECTION 6000]: DON'T TOUCH ***/
-user_pref("_user.js.parrot", "6000 syntax error: the parrot's 'istory!");
-/* 6001: enforce Firefox blocklist
- * [WHY] It includes updates for "revoked certificates"
- * [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/ ***/
-user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
-/* 6002: enforce no referer spoofing
- * [WHY] Spoofing can affect CSRF (Cross-Site Request Forgery) protections ***/
-user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false]
-/* 6004: enforce a security delay on some confirmation dialogs such as install, open/save
- * [1] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
-user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
-/* 6008: enforce no First Party Isolation [FF51+]
- * [WARNING] Replaced with network partitioning (FF85+) and TCP (2701), and enabling FPI
- * disables those. FPI is no longer maintained except at Tor Project for Tor Browser's config ***/
-user_pref("privacy.firstparty.isolate", false); // [DEFAULT: false]
-/* 6009: enforce SmartBlock shims (about:compat) [FF81+]
- * [1] https://blog.mozilla.org/security/2021/03/23/introducing-smartblock/ ***/
-user_pref("extensions.webcompat.enable_shims", true); // [HIDDEN PREF] [DEFAULT: true]
-/* 6010: enforce no TLS 1.0/1.1 downgrades
- * [TEST] https://tls-v1-1.badssl.com:1010/ ***/
-user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
-/* 6011: enforce disabling of Web Compatibility Reporter [FF56+]
- * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla
- * [WHY] To prevent wasting Mozilla's time with a custom setup ***/
-user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
-/* 6012: enforce Quarantined Domains [FF115+]
- * [WHY] https://support.mozilla.org/kb/quarantined-domains */
-user_pref("extensions.quarantinedDomains.enabled", true); // [DEFAULT: true]
-/* 6050: prefsCleaner: previously active items removed from arkenfox 115-127 ***/
- // user_pref("accessibility.force_disabled", "");
- // user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", "");
- // user_pref("network.protocol-handler.external.ms-windows-store", "");
- // user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", "");
- // user_pref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", "");
- // user_pref("privacy.partition.serviceWorkers", "");
-
-/*** [SECTION 7000]: DON'T BOTHER ***/
-user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");
-/* 7001: disable APIs
- * Location-Aware Browsing, Full Screen
- * [WHY] The API state is easily fingerprintable.
- * Geo is behind a prompt (7002). Full screen requires user interaction ***/
- // user_pref("geo.enabled", false);
- // user_pref("full-screen-api.enabled", false);
-/* 7002: set default permissions
- * Location, Camera, Microphone, Notifications [FF58+] Virtual Reality [FF73+]
- * 0=always ask (default), 1=allow, 2=block
- * [WHY] These are fingerprintable via Permissions API, except VR. Just add site
- * exceptions as allow/block for frequently visited/annoying sites: i.e. not global
- * [SETTING] to add site exceptions: Ctrl+I>Permissions>
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
- // user_pref("permissions.default.geo", 0);
- // user_pref("permissions.default.camera", 0);
- // user_pref("permissions.default.microphone", 0);
- // user_pref("permissions.default.desktop-notification", 0);
- // user_pref("permissions.default.xr", 0); // Virtual Reality
-/* 7003: disable non-modern cipher suites [1]
- * [WHY] Passive fingerprinting. Minimal/non-existent threat of downgrade attacks
- * [1] https://browserleaks.com/ssl ***/
- // user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
- // user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false);
- // user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
- // user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false);
- // user_pref("security.ssl3.rsa_aes_128_gcm_sha256", false); // no PFS
- // user_pref("security.ssl3.rsa_aes_256_gcm_sha384", false); // no PFS
- // user_pref("security.ssl3.rsa_aes_128_sha", false); // no PFS
- // user_pref("security.ssl3.rsa_aes_256_sha", false); // no PFS
-/* 7004: control TLS versions
- * [WHY] Passive fingerprinting and security ***/
- // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
- // user_pref("security.tls.version.max", 4);
-/* 7005: disable SSL session IDs [FF36+]
- * [WHY] Passive fingerprinting and perf costs. These are session-only
- * and isolated with network partitioning (FF85+) and/or containers ***/
- // user_pref("security.ssl.disable_session_identifiers", true);
-/* 7006: onions
- * [WHY] Firefox doesn't support hidden services. Use Tor Browser ***/
- // user_pref("dom.securecontext.allowlist_onions", true); // [FF97+] 1382359/1744006
- // user_pref("network.http.referer.hideOnionSource", true); // 1305144
-/* 7007: referers
- * [WHY] Only cross-origin referers (1602, 5510) matter ***/
- // user_pref("network.http.sendRefererHeader", 2);
- // user_pref("network.http.referer.trimmingPolicy", 0);
-/* 7008: set the default Referrer Policy [FF59+]
- * 0=no-referer, 1=same-origin, 2=strict-origin-when-cross-origin, 3=no-referrer-when-downgrade
- * [WHY] Defaults are fine. They can be overridden by a site-controlled Referrer Policy ***/
- // user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2]
- // user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
-/* 7010: disable HTTP Alternative Services [FF37+]
- * [WHY] Already isolated with network partitioning (FF85+) ***/
- // user_pref("network.http.altsvc.enabled", false);
-/* 7011: disable website control over browser right-click context menu
- * [WHY] Just use Shift-Right-Click ***/
- // user_pref("dom.event.contextmenu.enabled", false);
-/* 7012: disable icon fonts (glyphs) and local fallback rendering
- * [WHY] Breakage, font fallback is equivalency, also RFP
- * [1] https://bugzilla.mozilla.org/789788
- * [2] https://gitlab.torproject.org/legacy/trac/-/issues/8455 ***/
- // user_pref("gfx.downloadable_fonts.enabled", false); // [FF41+]
- // user_pref("gfx.downloadable_fonts.fallback_delay", -1);
-/* 7013: disable Clipboard API
- * [WHY] Fingerprintable. Breakage. Cut/copy/paste require user
- * interaction, and paste is limited to focused editable fields ***/
- // user_pref("dom.event.clipboardevents.enabled", false);
-/* 7014: disable System Add-on updates
- * [WHY] It can compromise security. System addons ship with prefs, use those ***/
- // user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
- // user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
-/* 7015: enable the DNT (Do Not Track) HTTP header
- * [WHY] DNT is enforced with Tracking Protection which is used in ETP Strict (2701) ***/
- // user_pref("privacy.donottrackheader.enabled", true);
-/* 7016: customize ETP settings
- * [NOTE] FPP (fingerprintingProtection) is ignored when RFP (4501) is enabled
- * [WHY] Arkenfox only supports strict (2701) which sets these at runtime ***/
- // user_pref("network.cookie.cookieBehavior", 5); // [DEFAULT: 5]
- // user_pref("privacy.fingerprintingProtection", true); // [FF114+] [ETP FF119+]
- // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault", true);
- // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true); // [FF100+]
- // user_pref("privacy.partition.network_state.ocsp_cache", true); // [DEFAULT: true FF123+]
- // user_pref("privacy.query_stripping.enabled", true); // [FF101+]
- // user_pref("privacy.trackingprotection.enabled", true);
- // user_pref("privacy.trackingprotection.socialtracking.enabled", true);
- // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
- // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
-/* 7017: disable service workers
- * [WHY] Already isolated with TCP (2701) behind a pref (2710) ***/
- // user_pref("dom.serviceWorkers.enabled", false);
-/* 7018: disable Web Notifications [FF22+]
- * [WHY] Web Notifications are behind a prompt (7002)
- * [1] https://blog.mozilla.org/en/products/firefox/block-notification-requests/ ***/
- // user_pref("dom.webnotifications.enabled", false);
-/* 7019: disable Push Notifications [FF44+]
- * [WHY] Website "push" requires subscription, and the API is required for CRLite (1224)
- * [NOTE] To remove all subscriptions, reset "dom.push.userAgentID"
- * [1] https://support.mozilla.org/kb/push-notifications-firefox ***/
- // user_pref("dom.push.enabled", false);
-/* 7020: disable WebRTC (Web Real-Time Communication)
- * [WHY] Firefox desktop uses mDNS hostname obfuscation and the private IP is never exposed until
- * required in TRUSTED scenarios; i.e. after you grant device (microphone or camera) access
- * [TEST] https://browserleaks.com/webrtc
- * [1] https://groups.google.com/g/discuss-webrtc/c/6stQXi72BEU/m/2FwZd24UAQAJ
- * [2] https://datatracker.ietf.org/doc/html/draft-ietf-mmusic-mdns-ice-candidates#section-3.1.1 ***/
- // user_pref("media.peerconnection.enabled", false);
-/* 7021: enable GPC (Global Privacy Control) in non-PB windows
- * [WHY] Passive and active fingerprinting. Mostly redundant with Tracking Protection
- * in ETP Strict (2701) and sanitizing on close (2800s) ***/
- // user_pref("privacy.globalprivacycontrol.enabled", true);
-
-/*** [SECTION 8000]: DON'T BOTHER: FINGERPRINTING
- [WHY] They are insufficient to help anti-fingerprinting and do more harm than good
- [WARNING] DO NOT USE with RFP. RFP already covers these and they can interfere
-***/
-user_pref("_user.js.parrot", "8000 syntax error: the parrot's crossed the Jordan");
-/* 8001: prefsCleaner: reset items useless for anti-fingerprinting ***/
- // user_pref("browser.display.use_document_fonts", "");
- // user_pref("browser.zoom.siteSpecific", "");
- // user_pref("device.sensors.enabled", "");
- // user_pref("dom.enable_performance", "");
- // user_pref("dom.enable_resource_timing", "");
- // user_pref("dom.gamepad.enabled", "");
- // user_pref("dom.maxHardwareConcurrency", "");
- // user_pref("dom.w3c_touch_events.enabled", "");
- // user_pref("dom.webaudio.enabled", "");
- // user_pref("font.system.whitelist", "");
- // user_pref("general.appname.override", "");
- // user_pref("general.appversion.override", "");
- // user_pref("general.buildID.override", "");
- // user_pref("general.oscpu.override", "");
- // user_pref("general.platform.override", "");
- // user_pref("general.useragent.override", "");
- // user_pref("media.navigator.enabled", "");
- // user_pref("media.ondevicechange.enabled", "");
- // user_pref("media.video_stats.enabled", "");
- // user_pref("media.webspeech.synth.enabled", "");
- // user_pref("ui.use_standins_for_native_colors", "");
- // user_pref("webgl.enable-debug-renderer-info", "");
-
-/*** [SECTION 9000]: NON-PROJECT RELATED ***/
-user_pref("_user.js.parrot", "9000 syntax error: the parrot's cashed in 'is chips!");
-/* 9001: disable welcome notices ***/
-user_pref("browser.startup.homepage_override.mstone", "ignore"); // [HIDDEN PREF]
-/* 9002: disable General>Browsing>Recommend extensions/features as you browse [FF67+] ***/
-user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false);
-user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false);
-/* 9004: disable search terms [FF110+]
- * [SETTING] Search>Search Bar>Use the address bar for search and navigation>Show search terms instead of URL... ***/
-user_pref("browser.urlbar.showSearchTerms.enabled", false);
-
-/*** [SECTION 9999]: DEPRECATED / RENAMED ***/
-user_pref("_user.js.parrot", "9999 syntax error: the parrot's shuffled off 'is mortal coil!");
-/* ESR115.x still uses all the following prefs
-// [NOTE] replace the * with a slash in the line above to re-enable active ones
-// FF116
-// 4506: set RFP's font visibility level (1402) [FF94+]
- // [-] https://bugzilla.mozilla.org/1838415
- // user_pref("layout.css.font-visibility.resistFingerprinting", 1); // [DEFAULT: 1]
-// FF117
-// 1221: disable Windows Microsoft Family Safety cert [FF50+] [WINDOWS]
- // 0=disable detecting Family Safety mode and importing the root
- // 1=only attempt to detect Family Safety mode (don't import the root)
- // 2=detect Family Safety mode and import the root
- // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21686
- // [-] https://bugzilla.mozilla.org/1844908
-user_pref("security.family_safety.mode", 0);
-// 7018: disable service worker Web Notifications [FF44+]
- // [WHY] Web Notifications are behind a prompt (7002)
- // [1] https://blog.mozilla.org/en/products/firefox/block-notification-requests/
- // [-] https://bugzilla.mozilla.org/1842457
- // user_pref("dom.webnotifications.serviceworker.enabled", false);
-// FF118
-// 1402: limit font visibility (Windows, Mac, some Linux) [FF94+]
- // Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1], bundled fonts are auto-allowed
- // In normal windows: uses the first applicable: RFP over TP over Standard
- // In Private Browsing windows: uses the most restrictive between normal and private
- // 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
- // [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc
- // [-] https://bugzilla.mozilla.org/1847599
- // user_pref("layout.css.font-visibility.private", 1);
- // user_pref("layout.css.font-visibility.standard", 1);
- // user_pref("layout.css.font-visibility.trackingprotection", 1);
-// 2623: disable permissions delegation [FF73+]
- // Currently applies to cross-origin geolocation, camera, mic and screen-sharing
- // permissions, and fullscreen requests. Disabling delegation means any prompts
- // for these will show/use their correct 3rd party origin
- // [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion
- // [-] https://bugzilla.mozilla.org/1697151
- // user_pref("permissions.delegation.enabled", false);
-// FF119
-// 0211: use en-US locale regardless of the system or region locale
- // [SETUP-WEB] May break some input methods e.g xim/ibus for CJK languages [1]
- // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=867501,1629630
- // [-] https://bugzilla.mozilla.org/1846224
- // user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
-// 0711: disable skipping DoH when parental controls are enabled [FF70+]
- // [-] https://bugzilla.mozilla.org/1586941
-user_pref("network.dns.skipTRR-when-parental-control-enabled", false);
-// FF123
-// 0334: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
- // Defense-in-depth: currently covered by 0331
- // [-] https://bugzilla.mozilla.org/1868988
-user_pref("browser.ping-centre.telemetry", false);
-// FF126
-// 9003: disable What's New toolbar icon [FF69+]
- // [-] https://bugzilla.mozilla.org/1724300
-user_pref("browser.messaging-system.whatsNewPanel.enabled", false);
-// ***/
-
-/* END: internal custom pref to test for syntax errors ***/
-user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");
-
-//I read the wiki
-//https://github.com/arkenfox/user.js/wiki/3.2-Overrides-%5BCommon%5D
-
-//DNS over HTTPS
-//Protects web requests from an ISP
-//Please pick a provider you trust.
-//Disable if you use PiHole, but tools like pfBlocker work fine.
-// Cloudflare (default in US & Canada).
-//Quad 9: https://dns.quad9.net/dns-query
-user_pref("network.trr.uri", "https://mozilla.cloudflare-dns.com/dns-query");
-user_pref("network.trr.mode", 2);
-
-//Disable Safe Browsing, this phones home to Google.
-user_pref("browser.safebrowsing.malware.enabled", false);
-user_pref("browser.safebrowsing.phishing.enabled", false);
-user_pref("browser.safebrowsing.downloads.enabled", false);
-
-// Leave IPv6 enabled
-user_pref("network.dns.disableIPv6", false);
-
-//Reenable search engines
-user_pref("keyword.enabled", true);
-//Enable Search Engine suggestion
-user_pref("browser.search.suggest.enabled", false);
-user_pref("browser.urlbar.suggest.searches", false);
-// Disk caching, which might improve performance if enabled.
-user_pref("browser.cache.disk.enable", false);
-//Enable favicons, the icons in bookmarks
-user_pref("browser.shell.shortcutFavicons", true);
-//Enable Mozilla Container Tabs
-//Redundant with Total Cookie Protection, but useful if you have multiple accounts
-//with the same provider (e.g. a work Google account and a personal Google account)
-user_pref("privacy.userContext.enabled", true);
-user_pref("privacy.userContext.ui.enabled", true);
-
-// Strict third party requests, may cause images/video to break.
-user_pref("network.http.referer.XOriginPolicy", 2);
-
-//WebRTC settings, things like video calls
- // user_pref("media.peerconnection.enabled", false);
-// Disable Media Plugins
- // user_pref("media.gmp-provider.enabled", false);
-// Disable DRM, FCKDRM
- // user_pref("media.gmp-widevinecdm.enabled", false);
-user_pref("media.eme.enabled", false);
-//Autoplaying settings
-//0=Allow all, 1=Block non-muted media (default), 5=Block all
- // user_pref("media.autoplay.default", 5);
-//If some websites REALLY need autoplaying...
-//0=sticky (default), 1=transient, 2=user
-user_pref("media.autoplay.blocking_policy", 2);
-
-//Use Disconnect's blocklist to block ads
-user_pref("browser.contentblocking.category", "strict");
-
-//Delete cookies on close, but see below to make exceptions
-/* 2801: delete cookies and site data on exit
- //* 0=keep until they expire (default), 2=keep until you close Firefox
- * [NOTE] A "cookie" block permission also controls localStorage/sessionStorage, indexedDB,
- * sharedWorkers and serviceWorkers. serviceWorkers require an "Allow" permission
- * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
- * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
-user_pref("network.cookie.lifetimePolicy", 2);
-//Disabling disk cache is better, but try this if you like performance
- // user_pref("privacy.clearsitedata.cache.enabled", true);
-
-//Clear data on shutdown
-user_pref("privacy.sanitize.sanitizeOnShutdown", true);
-user_pref("privacy.clearOnShutdown.cache", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.downloads", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.formdata", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.history", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.sessions", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.offlineApps", false); // [DEFAULT: false]
-user_pref("privacy.clearOnShutdown.cookies", false);
- // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false]
-// Manual wiping, such as the forget-me-not button
-user_pref("privacy.cpd.cache", true); // [DEFAULT: true]
-user_pref("privacy.cpd.formdata", true); // [DEFAULT: true]
-user_pref("privacy.cpd.history", true); // [DEFAULT: true]
-user_pref("privacy.cpd.sessions", true); // [DEFAULT: true]
-user_pref("privacy.cpd.offlineApps", false); // [DEFAULT: false]
-user_pref("privacy.cpd.cookies", false);
- // user_pref("privacy.cpd.downloads", true); // not used, see note above
- // user_pref("privacy.cpd.passwords", false); // [DEFAULT: false] not listed
- // user_pref("privacy.cpd.siteSettings", false); // [DEFAULT: false]
-// Delete everything ever.
-user_pref("privacy.sanitize.timeSpan", 0);
-//Delete history, although might be security theater.
-//Helps against forensic tools.
-user_pref("places.history.enabled", false);
-
-//WebGL is a security risk, but sometimes breaks things like 23andMe
-//or Google Maps (not always).
-user_pref("webgl.disabled", true);
-
-//Firefox stores passwords in plain text and obsolete if you use a password manager.
-//Mozilla also told people to stop using their password manager.
-user_pref("signon.rememberSignons", false);
-//Disable Pocket, it's proprietary trash
-user_pref("extensions.pocket.enabled", false);
-// Disable Mozilla account
-user_pref("identity.fxaccounts.enabled", false);
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/.parentlock b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/.parentlock
deleted file mode 100644
index e69de29..0000000
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/AlternateServices.bin b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/AlternateServices.bin
deleted file mode 100644
index 66b5263..0000000
Binary files a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/AlternateServices.bin and /dev/null differ
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/ExperimentStoreData.json b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/ExperimentStoreData.json
deleted file mode 100644
index e06276e..0000000
--- a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/ExperimentStoreData.json
+++ /dev/null
@@ -1 +0,0 @@
-{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2024-09-01T18:34:46.323Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":true}],"isRollout":true},"upgrade-spotlight-rollout":{"slug":"upgrade-spotlight-rollout","branch":{"slug":"treatment","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"enabled":false},"enabled":true,"featureId":"upgradeDialog"}]},"active":true,"experimentType":"rollout","source":"rs-loader","userFacingName":"Upgrade Spotlight Rollout","userFacingDescription":"Experimenting on onboarding content when you upgrade Firefox.","lastSeen":"2024-09-01T18:34:46.327Z","featureIds":["upgradeDialog"],"prefs":[],"isRollout":true},"address-autofill-desktop-pref-release-rollout":{"slug":"address-autofill-desktop-pref-release-rollout","branch":{"slug":"enable-address-autofill","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"status":true},"enabled":true,"featureId":"address-autofill-feature"}]},"active":true,"experimentType":"rollout","source":"rs-loader","userFacingName":"Address Autofill Desktop ( Pref, Release Rollout )","userFacingDescription":"Enable address autofill feature.","lastSeen":"2024-09-01T18:34:46.330Z","featureIds":["address-autofill-feature"],"prefs":[{"name":"extensions.formautofill.addresses.experiments.enabled","branch":"default","featureId":"address-autofill-feature","variable":"status","originalValue":false}],"isRollout":true},"highlighting-in-pdfs-rollout":{"slug":"highlighting-in-pdfs-rollout","branch":{"slug":"treatment","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"addHighlight":true},"enabled":true,"featureId":"pdfjs"}]},"active":true,"experimentType":"rollout","source":"rs-loader","userFacingName":"Highlighting in PDFs - Rollout","userFacingDescription":"Feature to highlight text and other content in PDFs","lastSeen":"2024-09-01T18:34:46.333Z","featureIds":["pdfjs"],"prefs":[{"name":"pdfjs.enableHighlightEditor","branch":"default","featureId":"pdfjs","variable":"addHighlight","originalValue":true}],"isRollout":true},"consolidated-search-configuration-row-desktop-relaunch":{"slug":"consolidated-search-configuration-row-desktop-relaunch","branch":{"slug":"rollout","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"newSearchConfigEnabled":true},"enabled":true,"featureId":"search"}]},"active":true,"experimentType":"rollout","source":"rs-loader","userFacingName":"Consolidated Search Configuration (ROW) [Desktop] Relaunch","userFacingDescription":"Consolidated search configuration for desktop and mobile Firefox","lastSeen":"2024-09-01T18:34:46.334Z","featureIds":["search"],"prefs":[{"name":"browser.search.newSearchConfig.enabled","branch":"user","featureId":"search","variable":"newSearchConfigEnabled","originalValue":null}],"isRollout":true},"long-term-holdback-2024-h2-velocity-desktop":{"slug":"long-term-holdback-2024-h2-velocity-desktop","branch":{"slug":"delivery","ratio":19,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{},"enabled":true,"featureId":"no-feature-firefox-desktop"}]},"active":true,"experimentType":"nimbus","source":"rs-loader","userFacingName":"Long term holdback 2024 H2 Velocity Desktop","userFacingDescription":"Long-term holdback for H2 Velocity experiments","lastSeen":"2024-09-01T18:34:46.337Z","featureIds":["no-feature-firefox-desktop"],"prefs":[],"isRollout":false},"disable-redirects-for-authretries":{"slug":"disable-redirects-for-authretries","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"redirectForAuthRetriesEnabled":false},"enabled":true,"featureId":"networkingAuth"}]},"active":true,"experimentType":"rollout","source":"rs-loader","userFacingName":"Disable Redirects for Authretries","userFacingDescription":"Rollback Redirection of the http channel for Authentication retries.","lastSeen":"2024-09-01T18:34:46.340Z","featureIds":["networkingAuth"],"prefs":[{"name":"network.auth.use_redirect_for_retries","branch":"default","featureId":"networkingAuth","variable":"redirectForAuthRetriesEnabled","originalValue":false}],"isRollout":true},"fpp-floating-point-protection-rollout":{"slug":"fpp-floating-point-protection-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"fdlibm_math":true},"enabled":true,"featureId":"fingerprintingProtection"}]},"active":true,"experimentType":"rollout","source":"rs-loader","userFacingName":"FPP: Floating Point Protection Rollout (Mac Only)","userFacingDescription":"This is a rollout of FPP Floating Point Value protections on Desktop for Linux and Mac so that floating point values cannot be used as a fingerprinting vector between platforms.","lastSeen":"2024-09-01T18:34:46.341Z","featureIds":["fingerprintingProtection"],"prefs":[{"name":"javascript.options.use_fdlibm_for_sin_cos_tan","branch":"default","featureId":"fingerprintingProtection","variable":"fdlibm_math","originalValue":false}],"isRollout":true},"home-and-newtab-wallpapers-v1-rollout-us-and-ca":{"slug":"home-and-newtab-wallpapers-v1-rollout-us-and-ca","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"wallpapers":true,"wallpapersV2":true,"regionWeatherConfig":"US, CA","weatherLocationSearch":true},"enabled":true,"featureId":"pocketNewtab"}]},"active":true,"experimentType":"rollout","source":"rs-loader","userFacingName":"Home and newtab wallpapers v2 Rollout -- US and CA","userFacingDescription":"Rollout of New Tab wallpaper selection.","lastSeen":"2024-09-01T18:34:46.346Z","featureIds":["pocketNewtab"],"prefs":[{"name":"browser.newtabpage.activity-stream.newtabWallpapers.enabled","branch":"user","featureId":"pocketNewtab","variable":"wallpapers","originalValue":null},{"name":"browser.newtabpage.activity-stream.newtabWallpapers.v2.enabled","branch":"user","featureId":"pocketNewtab","variable":"wallpapersV2","originalValue":null},{"name":"browser.newtabpage.activity-stream.weather.locationSearchEnabled","branch":"user","featureId":"pocketNewtab","variable":"weatherLocationSearch","originalValue":null}],"isRollout":true},"tab-hover-preview-release-rollout":{"slug":"tab-hover-preview-release-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"tabPreviewsEnabled":true},"enabled":true,"featureId":"tabPreview"}]},"active":true,"experimentType":"rollout","source":"rs-loader","userFacingName":"Tab Hover Preview Release Rollout","userFacingDescription":"Enable Tab Hover Preview.","lastSeen":"2024-09-01T18:34:46.351Z","featureIds":["tabPreview"],"prefs":[{"name":"browser.tabs.hoverPreview.enabled","branch":"default","featureId":"tabPreview","variable":"tabPreviewsEnabled","originalValue":false}],"isRollout":true},"encrypted-client-hello-fallback-mechanism":{"slug":"encrypted-client-hello-fallback-mechanism","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"insecureFallback":true},"enabled":true,"featureId":"echPrefs"}]},"active":true,"experimentType":"rollout","source":"rs-loader","userFacingName":"Encrypted Client Hello - Fallback Mechanism","userFacingDescription":"This experiment enables a fallback mechanism for Encrypted Client Hello. This feature maximizes compatibility with websites that have misconfigured or unexpected DNS configurations.","lastSeen":"2024-09-01T18:34:46.359Z","featureIds":["echPrefs"],"prefs":[{"name":"network.dns.echconfig.fallback_to_origin_when_all_failed","branch":"default","featureId":"echPrefs","variable":"insecureFallback","originalValue":false}],"isRollout":true}}
\ No newline at end of file
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/SiteSecurityServiceState.bin b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/SiteSecurityServiceState.bin
deleted file mode 100644
index 388c932..0000000
Binary files a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/SiteSecurityServiceState.bin and /dev/null differ
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/activity-stream.discovery_stream.json b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/activity-stream.discovery_stream.json
deleted file mode 100644
index b9be782..0000000
--- a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/activity-stream.discovery_stream.json
+++ /dev/null
@@ -1 +0,0 @@
-{"feeds":{"https://firefox-api-proxy.cdn.mozilla.net/desktop/v1/recommendations?locale=$locale®ion=$region&count=30":{"lastUpdated":1725215686469,"personalized":false,"data":{"settings":{},"recommendations":[{"id":1237673593164797,"url":"https://www.zdnet.com/article/why-the-nsa-advises-you-to-turn-off-your-phone-once-a-week/?utm_source=pocket-newtab-en-us","title":"Why the NSA Advises You to Turn Off Your Phone Once a Week","excerpt":"Powering off your phone regularly, disabling Bluetooth, and using only trusted accessories are just a few of the NSA’s security recommendations. Here’s what else to know.","publisher":"ZDNet","raw_image_src":"https://www.zdnet.com/a/img/resize/153728d5f66ee0fb01cca3dccdf01af11307c9b9/2024/08/26/8f6e1cdd-c037-48f5-a932-e7e1d5f09e66/gettyimages-1977127901.jpg?auto=webp&fit=crop&height=675&width=1200","recommendation_id":"54844477-0bab-4a1b-b00d-2f9cc04e11a6","score":1},{"id":2806006005551800,"url":"https://getpocket.com/explore/item/inside-the-unsolved-murder-of-jfk-s-mistress-mary-pinchot-meyer?utm_source=pocket-newtab-en-us","title":"Inside the Unsolved Murder of JFK’s Mistress Mary Pinchot Meyer","excerpt":"A true crime podcast revisits the mysterious 1964 murder of the Washington, D.C. socialite.","publisher":"Town & Country Magazine","raw_image_src":"https://s3.us-east-1.amazonaws.com/pocket-curatedcorpusapi-prod-images/47161f47-f9ba-46bc-9172-eaf152256cd9.jpeg","recommendation_id":"d0f2aa71-f4c5-4b75-b652-c535e988dbb3","score":1},{"id":8305955701842621,"url":"https://www.cntraveler.com/story/golden-rules-of-road-trips?utm_source=pocket-newtab-en-us","title":"The Golden Rules of Road Tripping","excerpt":"Veteran road trippers (including a gas station food evangelist) share their savviest tips and tricks.","publisher":"Condé Nast Traveler","raw_image_src":"https://media.cntraveler.com/photos/66d0cab1759c2a9f11040cac/16:9/w_1280,c_limit/GettyImages-1588291549.jpg","recommendation_id":"048badb3-8552-409a-b945-483621fcffdb","score":1},{"id":7740724110986131,"url":"https://daily.jstor.org/the-shrewd-business-logic-of-immigrant-cooks/?utm_source=pocket-newtab-en-us","title":"The Shrewd Business Logic of Immigrant Cooks","excerpt":"Savvy observers, immigrant restaurateurs operate as amateur anthropologists who analyze their potential customers to determine how to best attract them.","publisher":"JStor Daily","raw_image_src":"https://daily.jstor.org/wp-content/uploads/2024/08/the_shrewd_business_logic_of_immigrant_cooks_1050x700.jpg","recommendation_id":"f652a7e8-4276-4313-8f4f-85c8dfc1a1d8","score":1},{"id":385574474559666,"url":"https://www.npr.org/2024/08/30/g-s1-20058/signs-of-codependency-how-to-overcome-unhealthy-relationships?utm_source=pocket-newtab-en-us","title":"How I Broke Free From Codependency — and Learned the Meaning of Loving Relationships","excerpt":"“I thought: if I just helped my friends, colleagues and neighbors, maybe I’d get the connection I craved in love, work and life,” writes journalist Gina Ryder. ","publisher":"NPR","raw_image_src":"https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4500x2531+0+0/resize/1400/quality/100/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2F71%2F71%2Fd2c5dc9248cba5375baa2d277339%2Ffinal-copy-b-wide-a076df3e37ddefc91e27ecaaae796f158b8388af.jpg","recommendation_id":"b3ed0a59-7ea7-4553-8c64-8dc925e02806","score":1},{"id":6353226517752388,"url":"https://www.cnbc.com/2024/08/28/37percent-of-hiring-managers-say-job-hopping-is-a-red-flag-how-to-explain-it.html?utm_source=pocket-newtab-en-us","title":"37% of Hiring Managers Say Job-Hopping Is a Red Flag: ‘Don’t Make Apologies for It,’ Says LinkedIn Career Expert","excerpt":"Job hopping and a lack of direction give hiring managers pause when reading a resume, says LinkedIn. Here’s how to make those work for you. ","publisher":"CNBC","raw_image_src":"https://image.cnbcfm.com/api/v1/image/108024975-1724430221608-gettyimages-1381569694-dsc05823.jpeg?v=1724430524&w=1920&h=1080","recommendation_id":"f26e6e10-8d63-4c5c-a5b2-aeda05f9785b","score":1},{"id":2639946232487271,"url":"https://www.popsci.com/science/why-are-we-ticklish/?utm_source=pocket-newtab-en-us","title":"Why Are We Ticklish?","excerpt":"The science of tickling is full of mysteries, but there are some playful theories.","publisher":"Popular Science","raw_image_src":"https://www.popsci.com/wp-content/uploads/2024/08/tickling-hands.jpg?quality=85","recommendation_id":"f0217821-8028-45dd-9581-3adc75f17b71","score":1},{"id":5331020961960890,"url":"https://www.washingtonpost.com/business/2024/08/30/401k-millionaires-secret/?utm_source=pocket-newtab-en-us","title":"The 401(K) Millionaires Club Hit a New Record. What’s Their Secret?","excerpt":"While this elite group benefited from surging stock prices, their gains are markers of steady investing over time and having the patience to ride out the rough patches.","publisher":"The Washington Post","raw_image_src":"https://s3.us-east-1.amazonaws.com/pocket-curatedcorpusapi-prod-images/319ba9ad-86f7-42f7-b9d5-a710e005af91.png","recommendation_id":"c2f72737-c17a-42a3-aa10-fd1120ce594f","score":1},{"id":5705530850067820,"url":"https://www.cnn.com/2024/08/30/health/weekend-sleep-lower-heart-disease-risk-wellness/index.html?utm_source=pocket-newtab-en-us","title":" What a Weekend Snooze Could Do for Your Heart Health, According to New Research ","excerpt":"Getting extra sleep on the weekends to compensate for lost rest during the week may benefit your heart health, new research suggests.","publisher":"CNN","raw_image_src":"https://s3.us-east-1.amazonaws.com/pocket-curatedcorpusapi-prod-images/bbf99e22-d18f-473b-b486-9181ceeafd1d.png","recommendation_id":"66ebfc60-e7ef-4486-a7e9-13d8840edb26","score":1},{"id":8961269824482220,"url":"https://www.newyorker.com/culture/the-front-row/the-giddy-delights-of-1941?utm_source=pocket-newtab-en-us","title":"The Giddy Delights of “1941”","excerpt":"Steven Spielberg gave free rein to his anarchic inner child in this Second World War comedy—and paid the price.","publisher":"The New Yorker","raw_image_src":"https://media.newyorker.com/photos/66d0d25e6fdde2d32f124f4f/16:9/w_1280,c_limit/Brody01-1941.jpg","recommendation_id":"890f05ef-a6cc-49ae-8c70-7ae9034ffd15","score":1},{"id":8017352545460819,"url":"https://www.discovermagazine.com/the-sciences/ancient-romans-were-some-of-the-first-obnoxious-tourists?utm_source=pocket-newtab-en-us","title":"Ancient Romans Were Some of the First Obnoxious Tourists","excerpt":"Archaeologists reveal traces of early tourism. From graffitied buildings to rowdy beach resorts, learn how ancient travelers shaped modern tourism.","publisher":"Discover Magazine","raw_image_src":"https://images.ctfassets.net/cnu0m8re1exe/6s1aSjTwLDrfUYAZrZ27ly/fd770ca5a5ed689ec3b982876eccfca8/shutterstock_2434319603.jpg?fm=jpg&fl=progressive&w=660&h=433&fit=fill","recommendation_id":"f31ab5b8-6140-405d-88c7-f739dc2dea37","score":1},{"id":8585537236724587,"url":"https://hbr.org/2024/08/how-to-craft-a-memorable-message-according-to-science?utm_source=pocket-newtab-en-us","title":"How to Craft a Memorable Message, According to Science","excerpt":"Imagine sitting in a meeting where someone is giving a presentation. You’re somewhat interested in the topic, and the speaker seems to be doing a good job. The meeting ends, and 30 minutes later, you try to recall what was discussed.","publisher":"Harvard Business Review","raw_image_src":"https://s3.us-east-1.amazonaws.com/pocket-curatedcorpusapi-prod-images/c5b2dedc-0ca3-4240-988a-264ce58b151a.jpeg","recommendation_id":"9ab969a6-6490-463f-9bf2-90a47b29a742","score":1},{"id":2600415718993677,"url":"https://www.bustle.com/wellness/functional-freeze-tiktok?utm_source=pocket-newtab-en-us","title":"Feeling Tired & Stuck? Blame It on “Functional Freeze”","excerpt":"Experts explain “functional freeze” and tips for getting out of it.","publisher":"Bustle","raw_image_src":"https://imgix.bustle.com/uploads/getty/2024/8/28/ded05894/exhausted-young-asian-woman.jpg?w=1200&h=630&fit=crop&crop=faces&fm=jpg","recommendation_id":"45136e3c-cfcf-4b27-9043-288343a4984a","score":1},{"id":3815514097256825,"url":"https://www.context.news/digital-rights/why-is-telegram-in-trouble-with-the-law?utm_source=pocket-newtab-en-us","title":"Why Is Telegram in Trouble With the Law?","excerpt":"Telegram, whose boss Durov was arrested in France, has few moderators and refuses to hand over data but how exactly does it work?","publisher":"Context News","raw_image_src":"https://ddc514qh7t05d.cloudfront.net/dA/1a97132cafbba867ce6c84e92317e107/1200w/Jpeg","recommendation_id":"f509e631-487f-4da0-9bdf-4ec48b832e52","score":1},{"id":3368948738226282,"url":"https://www.theatlantic.com/technology/archive/2024/08/venmo-social-media/679665/?utm_source=pocket-newtab-en-us","title":"The Last Social Network","excerpt":"Venmo has become the best way to see what the people you know are up to.","publisher":"The Atlantic","raw_image_src":"https://s3.us-east-1.amazonaws.com/pocket-curatedcorpusapi-prod-images/3bd44da5-2c15-49ca-b138-64c654152dc6.jpeg","recommendation_id":"b46de81e-d41c-44b8-996f-e3ae19e4ebd4","score":1},{"id":2718235349382233,"url":"https://www.cnbc.com/2024/08/30/mortgage-rates-are-falling-is-this-the-right-time-to-buy-a-home.html?utm_source=pocket-newtab-en-us","title":"Mortgage Rates Are Falling, Improving Home Buying Conditions. Here’s What to Know Before You Act","excerpt":"Experts give their best advice for navigating the housing market in the months ahead.","publisher":"CNBC","raw_image_src":"https://image.cnbcfm.com/api/v1/image/107418725-1716399817877-gettyimages-1347125095-120_0821_125794.jpeg?v=1721742352&w=1920&h=1080","recommendation_id":"ab954c84-9d06-4558-bb81-3a5b1428a2d9","score":1},{"id":5756898452464831,"url":"https://www.wired.com/story/waymo-is-picking-up-at-phoenix-airport/?utm_source=pocket-newtab-en-us","title":"Waymo Is Picking up at the Airport. That’s a Big Deal","excerpt":"Self-driving cars have started all-day pickups and drop-offs in Phoenix, Arizona. It’s great news for Alphabet’s bottom line, and a step forward for robotaxis.","publisher":"WIRED","raw_image_src":"https://media.wired.com/photos/66ce36f04bed518556513e05/191:100/w_1280,c_limit/Airport-Waymo-transport-1497020112.jpg","recommendation_id":"7cb13068-8df9-4ff1-a557-da8e681b476a","score":1},{"id":341596945613700,"url":"https://time.com/7015189/most-anticipated-tv-shows-fall-2024/?utm_source=pocket-newtab-en-us","title":"The 34 Most Anticipated TV Shows of Fall 2024","excerpt":"Including a bevy of new Ryan Murphy shows, some fond farewells, and new shows from Alfonso Cuarón and Mike Schur.","publisher":"Time","raw_image_src":"https://api.time.com/wp-content/uploads/2024/08/fall-preview-tv-2024.jpg?quality=85&w=1200&h=628&crop=1","recommendation_id":"86453c33-aee5-4d25-b507-975a49db0af0","score":1},{"id":4637722453319065,"url":"https://www.theringer.com/nfl/2024/8/29/24231064/2024-nfl-worst-to-first-candidates-ranking?utm_source=pocket-newtab-en-us","title":"Ranking the NFL’s Worst-to-First Candidates for 2024","excerpt":"It’s inevitable: One team during an NFL season will come out of nowhere and land in first place. Which teams have the best chance to shock the rest of the league, and who is bound to remain at the bottom?","publisher":"The Ringer","raw_image_src":"https://cdn.vox-cdn.com/thumbor/O52keaRsbI7Eb1QiYvY-0KjG-fI=/0x0:1200x628/fit-in/1200x630/cdn.vox-cdn.com/uploads/chorus_asset/file/25593828/DabbundoWorstToFirst_AP_Ringer.jpg","recommendation_id":"ae8f6c55-a6ef-43ca-995b-58788f1340b0","score":1},{"id":4744553102394205,"url":"https://www.sportico.com/leagues/football/2024/how-nfl-teams-owners-make-money-1234795113/?utm_source=pocket-newtab-en-us","title":"How NFL Teams and Owners Make Their Money","excerpt":"The NFL’s 32 teams generated an estimated $20.5 billion in revenue last year, 70% higher than what NBA and MLB teams made. TV is the driving force.","publisher":"Sportico","raw_image_src":"https://www.sportico.com/wp-content/uploads/2024/08/GettyImages-2168767155-e1724784926728.jpg?w=1024","recommendation_id":"1fee66b0-b352-4fe4-a461-9809f1fae480","score":1},{"id":4951008296652531,"url":"https://apnews.com/article/us-open-swiatek-calendar-811e0deff257faad9a5f55fa82e28c2a?utm_source=pocket-newtab-en-us","title":"Iga Swiatek and Other Tennis Players Say Their Mental and Physical Health Are Ignored","excerpt":"It’s nothing new for tennis players to worry aloud about their sport’s overcrowded calendar, too-tough season and too-short offseason.","publisher":"The Associated Press","raw_image_src":"https://dims.apnews.com/dims4/default/8557ad3/2147483647/strip/true/crop/2000x1125+0+104/resize/1440x810!/quality/90/?url=https%3A%2F%2Fassets.apnews.com%2Fe3%2F68%2Ffa9e59870523584ab445f87e94e1%2Fa9f9577cfbff40cdb282c00f6bd1bc5c","recommendation_id":"d264fe5b-9c76-4302-aaf2-c27bd232c2fc","score":1},{"id":5148614590207024,"url":"https://www.eater.com/24225596/best-zucchini-bread-recipe-ranking?utm_source=pocket-newtab-en-us","title":"Which Zucchini Bread Recipe Makes the Most Out of Summer Abundance?","excerpt":"Zucchini bread is a great way to use up an excess of summer squash, but not all recipes are created equal.","publisher":"Eater","raw_image_src":"https://cdn.vox-cdn.com/thumbor/Xz7DzXyi89bgkdLySKAngF8AmNo=/0x31:1600x869/fit-in/1200x630/cdn.vox-cdn.com/uploads/chorus_asset/file/25583421/lede__1_.png","recommendation_id":"9f1b20ab-a721-4cd4-9a34-cd6751ec58bc","score":1},{"id":1669887505274605,"url":"https://www.usatoday.com/story/life/pets/2024/08/29/what-do-dogs-dream-about/74865197007/?utm_source=pocket-newtab-en-us","title":"Do Dogs Dream? It’s No Surprise – the Answer Is Pretty Cute.","excerpt":"Dogs can dream just like humans can, and while researchers aren’t certain, here’s what they likely picture when they twitch or growl in their sleep.","publisher":"USA Today","raw_image_src":"https://www.usatoday.com/gcdn/-mm-/9e1f6e2ee20f44aa1f3be4f71e9f3e52b6ae2c7e/c=0-110-2121-1303/local/-/media/2021/10/25/USATODAY/usatsports/dogecoin-sleeping-shiba-inu.jpg?width=2121&height=1193&fit=crop&format=pjpg&auto=webp","recommendation_id":"3b28f1dc-c0f5-4f59-9a93-e6cdcdf90358","score":1},{"id":6458913960373998,"url":"https://getpocket.com/collections/how-to-be-more-creative?utm_source=pocket-newtab-en-us","title":"How To Be More Creative","excerpt":"Twenty-one great articles and resources about the art and science of cultivating creativity.","publisher":"Pocket Collections","raw_image_src":"https://s3.amazonaws.com/pocket-curatedcorpusapi-prod-images/822a4805-7f11-4769-b434-22798a3233ac.jpeg","recommendation_id":"b0263acf-5419-4da5-bb7a-6fad9b470c00","score":1},{"id":1025053198112710,"url":"https://www.sfgate.com/sf-culture/article/emergency-burning-man-airlift-service-19731550.php?utm_source=pocket-newtab-en-us","title":"This Emergency Burning Man Service Costs $20, and Thousands Sign up for It","excerpt":"Like any city, Black Rock City has its share of accidents, injuries and even deaths. ","publisher":"SFGate","raw_image_src":"https://s3.us-east-1.amazonaws.com/pocket-curatedcorpusapi-prod-images/12be72dc-d364-4a39-887f-7fb453d19381.png","recommendation_id":"e11e4df7-231c-46b0-95cc-6324f6e4ef54","score":1},{"id":6140350244852717,"url":"https://www.theatlantic.com/health/archive/2024/08/our-houses-are-fuel-for-fires/679649/?utm_source=pocket-newtab-en-us","title":"The Wildfire Risk in America’s Front Yards","excerpt":"If we really want to keep communities safe, we need to think about where we build, and with what.","publisher":"The Atlantic","raw_image_src":"https://cdn.theatlantic.com/thumbor/vK7P14SS5IpfP3if3pzJ6Prnjkk=/0x61:2876x1559/1200x625/media/img/mt/2024/08/GettyImages_1059684446/original.jpg","recommendation_id":"d855d896-ccc7-4dc3-b475-a2b76a311cbb","score":1},{"id":207858574713052,"url":"https://www.washingtonpost.com/travel/2024/08/29/passport-photos-makeup-security-tiktok/?utm_source=pocket-newtab-en-us","title":"Your ‘Hot’ Passport Photo Could Be a Problem at the Airport","excerpt":"The passport photos are glam — some might say aspirational — and created with a multistep, multi-product process. They also might be a cautionary tale.","publisher":"The Washington Post","raw_image_src":"https://s3.us-east-1.amazonaws.com/pocket-curatedcorpusapi-prod-images/f88c668b-c07e-4d08-83f5-e4e6c6a38f5e.png","recommendation_id":"65e39884-83f7-490e-a943-f69e05ff75e2","score":1},{"id":6548513307998425,"url":"https://www.theverge.com/24230813/demure-mindful-trademark-uspto-explainer-jools-lebron?utm_source=pocket-newtab-en-us","title":"A Demure and Mindful Trademark Investigation","excerpt":"See how I wrote this legal explainer?","publisher":"The Verge","raw_image_src":"https://cdn.vox-cdn.com/thumbor/ghzs2dc_aNWjDEzhmbN0h9I8u0U=/0x0:2040x1360/1200x628/filters:focal(1020x680:1021x681)/cdn.vox-cdn.com/uploads/chorus_asset/file/25593501/247230_Demure_Mindful_TM_CVirginia_4.jpg","recommendation_id":"3da69809-498d-4525-a7e5-c250cc5f68a2","score":1},{"id":5986195010620404,"url":"https://www.eater.com/24224470/shrimp-corn-calabrian-chile-butter-for-one-recipe?utm_source=pocket-newtab-en-us","title":"A Buttery Corn and Shrimp Dish Ideal for the End of Summer","excerpt":"This dinner for one showcases ingredients that reach peak deliciousness in mere minutes.","publisher":"Eater","raw_image_src":"https://cdn.vox-cdn.com/thumbor/gmn0qDUIO7EvHQabAodf8FB4RPw=/0x31:1600x869/fit-in/1200x630/cdn.vox-cdn.com/uploads/chorus_asset/file/25581236/Lede.png","recommendation_id":"a5c517c8-6921-4c17-8fde-a0828bc677eb","score":1},{"id":6428931032359864,"url":"https://www.npr.org/2024/08/29/nx-s1-5090967/birds-build-nests-tradition-culture-architecture?utm_source=pocket-newtab-en-us","title":"When Birds Build Nests, They’re Also Building a Culture","excerpt":"Nest-building isn’t just instinct. Birds can learn from others, letting groups within one species develop their own distinctive nest-building traditions.","publisher":"NPR","raw_image_src":"https://npr.brightspotcdn.com/dims3/default/strip/false/crop/1698x955+36+0/resize/1400/quality/100/format/png/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fe8%2Fb9%2Fb9aa4cf34256bf30765476f6631b%2Fbird-three.png","recommendation_id":"e0c903c2-83ce-4dd5-afb7-578462e937bb","score":1}],"status":"success"}}},"spocs":{"lastUpdated":1725215686352,"spocs":{"settings":{"feature_flags":{"collections":false,"spoc_v2":true},"spocsPerNewTabs":1,"domainAffinityParameterSets":{"default":{"combinedDomainFactor":0.5,"frequencyFactor":0.5,"itemScoreFactor":1,"multiDomainBoost":0,"perfectCombinedDomainScore":2,"perfectFrequencyVisits":10,"recencyFactor":0.5},"fully-personalized":{"combinedDomainFactor":0.5,"frequencyFactor":0.5,"itemScoreFactor":0.01,"multiDomainBoost":0,"perfectCombinedDomainScore":2,"perfectFrequencyVisits":10,"recencyFactor":0.5},"fully-personalized-domains":{"combinedDomainFactor":0.5,"frequencyFactor":0.5,"itemScoreFactor":0.01,"multiDomainBoost":0,"perfectCombinedDomainScore":10,"perfectFrequencyVisits":1,"recencyFactor":0.5}},"timeSegments":[{"id":"week-1","startTime":432000,"endTime":0,"weightPosition":1},{"id":"week-2","startTime":864000,"endTime":432000,"weightPosition":1},{"id":"week-3","startTime":1296000,"endTime":864000,"weightPosition":1},{"id":"week-4","startTime":1728000,"endTime":1296000,"weightPosition":1},{"id":"week-5","startTime":2160000,"endTime":1728000,"weightPosition":1},{"id":"week-6","startTime":2592000,"endTime":2160000,"weightPosition":1}]},"sponsored-topsites":{"title":"","context":"","items":[]}}},"sov":{}}
\ No newline at end of file
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/activity-stream.personalization.json b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/activity-stream.personalization.json
deleted file mode 100644
index d0c38bd..0000000
--- a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/activity-stream.personalization.json
+++ /dev/null
@@ -1 +0,0 @@
-{"personalization":{"scores":{"interestConfig":{"history_required_fields":["title","description","url","frecency"],"history_limit_secs":2592000,"history_item_builder":[{"function":"nb_tag","fields":["title","description"]},{"function":"copy_value","src":"nb_tags","dest":"tags"},{"function":"make_boolean","field":"tags","threshold":-1},{"function":"allow_fields","fields":["tags"]}],"interest_combiner":[{"function":"combiner_add","field":"tags"}],"interest_finalizer":[{"function":"set_default","field":"tags","value":{}},{"function":"l2_normalize","field":"tags"}],"item_to_rank_builder":[{"function":"nb_tag","fields":["title","excerpt"]},{"function":"copy_value","src":"nb_tags","dest":"item_tags"},{"function":"make_boolean","field":"item_tags","threshold":-1},{"function":"set_default","field":"item_score","value":0},{"function":"set_default","field":"sort_id","value":0},{"function":"copy_value","dest":"item_sort_id","src":"sort_id"},{"function":"scalar_add","field":"item_sort_id","k":1},{"function":"set_default","field":"item_tags","value":{}},{"function":"l2_normalize","field":"item_tags"},{"function":"allow_fields","fields":["id","item_tags","item_score","item_sort_id"]}],"item_ranker":[{"function":"vector_multiply","left":"tags","right":"item_tags","dest":"tag_sim"},{"function":"copy_to_map","src":"tag_sim","dest_key":"tag_sim","dest_map":"final_features"},{"function":"copy_to_map","src":"item_sort_id","dest_key":"item_sort_id","dest_map":"final_features"},{"function":"set_default","field":"coeffs","value":{"tag_sim":1,"item_sort_id":-0.00001}},{"function":"allow_fields","fields":["final_features","coeffs"]},{"function":"vector_multiply","left":"final_features","right":"coeffs","dest":"score"}],"recordKey":"default-interest-config"},"interestVector":{"tags":{"business_and_industrial":0.5773502691896258,"online_communities":0.5773502691896258,"internet_and_telecom":0.5773502691896258}}},"_timestamp":1725216053746}}
\ No newline at end of file
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/activity-stream.weather_feed.json b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/activity-stream.weather_feed.json
deleted file mode 100644
index 89f47d1..0000000
--- a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/activity-stream.weather_feed.json
+++ /dev/null
@@ -1 +0,0 @@
-{"weather":{}}
\ No newline at end of file
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/addonStartup.json.lz4 b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/addonStartup.json.lz4
deleted file mode 100644
index ee9d8b6..0000000
Binary files a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/addonStartup.json.lz4 and /dev/null differ
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/addons.json b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/addons.json
deleted file mode 100644
index 203de05..0000000
--- a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/addons.json
+++ /dev/null
@@ -1 +0,0 @@
-{"schema":6,"addons":[]}
\ No newline at end of file
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/bookmarkbackups/bookmarks-2024-09-01_11_ycPkV1AOFAclO0pDkCXO4odH0k_0iiSVn1IhTUv6pfI=.jsonlz4 b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/bookmarkbackups/bookmarks-2024-09-01_11_ycPkV1AOFAclO0pDkCXO4odH0k_0iiSVn1IhTUv6pfI=.jsonlz4
deleted file mode 100644
index e8e1342..0000000
Binary files a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/bookmarkbackups/bookmarks-2024-09-01_11_ycPkV1AOFAclO0pDkCXO4odH0k_0iiSVn1IhTUv6pfI=.jsonlz4 and /dev/null differ
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/bounce-tracking-protection.sqlite b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/bounce-tracking-protection.sqlite
deleted file mode 100644
index 35086b7..0000000
Binary files a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/bounce-tracking-protection.sqlite and /dev/null differ
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/broadcast-listeners.json b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/broadcast-listeners.json
deleted file mode 100644
index 771d13f..0000000
--- a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/broadcast-listeners.json
+++ /dev/null
@@ -1 +0,0 @@
-{"version":1,"listeners":{"remote-settings/monitor_changes":{"version":"\"1725202629204\"","sourceInfo":{"moduleURI":"resource://services-settings/remote-settings.sys.mjs","symbolName":"remoteSettingsBroadcastHandler"}}}}
\ No newline at end of file
diff --git a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/cache2/doomed/1034473119 b/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/cache2/doomed/1034473119
deleted file mode 100644
index 985078c..0000000
--- a/firefox/Library/Application Support/Firefox/Profiles/qakpynq4.default-release/userjs_backups/cache2/doomed/1034473119
+++ /dev/null
@@ -1,1681 +0,0 @@
-
-
-
Why the NSA Advises You to Turn Off Your Phone Once a Week
Powering off your phone regularly, disabling Bluetooth, and using only trusted accessories are just a few of the NSA’s security recommendations. Here’s what else to know.
Town & Country Magazine
Inside the Unsolved Murder of JFK’s Mistress Mary Pinchot Meyer
A true crime podcast revisits the mysterious 1964 murder of the Washington, D.C. socialite.
Condé Nast Traveler
The Golden Rules of Road Tripping
Veteran road trippers (including a gas station food evangelist) share their savviest tips and tricks.
JStor Daily
The Shrewd Business Logic of Immigrant Cooks
Savvy observers, immigrant restaurateurs operate as amateur anthropologists who analyze their potential customers to determine how to best attract them.
NPR
How I Broke Free From Codependency — and Learned the Meaning of Loving Relationships
“I thought: if I just helped my friends, colleagues and neighbors, maybe I’d get the connection I craved in love, work and life,” writes journalist Gina Ryder.
CNBC
37% of Hiring Managers Say Job-Hopping Is a Red Flag: ‘Don’t Make Apologies for It,’ Says LinkedIn Career Expert
Job hopping and a lack of direction give hiring managers pause when reading a resume, says LinkedIn. Here’s how to make those work for you.
Popular Science
Why Are We Ticklish?
The science of tickling is full of mysteries, but there are some playful theories.
The Washington Post
The 401(K) Millionaires Club Hit a New Record. What’s Their Secret?
While this elite group benefited from surging stock prices, their gains are markers of steady investing over time and having the patience to ride out the rough patches.
CNN
What a Weekend Snooze Could Do for Your Heart Health, According to New Research
Getting extra sleep on the weekends to compensate for lost rest during the week may benefit your heart health, new research suggests.
The New Yorker
The Giddy Delights of “1941”
Steven Spielberg gave free rein to his anarchic inner child in this Second World War comedy—and paid the price.
Discover Magazine
Ancient Romans Were Some of the First Obnoxious Tourists
Archaeologists reveal traces of early tourism. From graffitied buildings to rowdy beach resorts, learn how ancient travelers shaped modern tourism.
Harvard Business Review
How to Craft a Memorable Message, According to Science
Imagine sitting in a meeting where someone is giving a presentation. You’re somewhat interested in the topic, and the speaker seems to be doing a good job. The meeting ends, and 30 minutes later, you try to recall what was discussed.
Bustle
Feeling Tired & Stuck? Blame It on “Functional Freeze”
Experts explain “functional freeze” and tips for getting out of it.
Context News
Why Is Telegram in Trouble With the Law?
Telegram, whose boss Durov was arrested in France, has few moderators and refuses to hand over data but how exactly does it work?
The Atlantic
The Last Social Network
Venmo has become the best way to see what the people you know are up to.
CNBC
Mortgage Rates Are Falling, Improving Home Buying Conditions. Here’s What to Know Before You Act
Experts give their best advice for navigating the housing market in the months ahead.
WIRED
Waymo Is Picking up at the Airport. That’s a Big Deal
Self-driving cars have started all-day pickups and drop-offs in Phoenix, Arizona. It’s great news for Alphabet’s bottom line, and a step forward for robotaxis.
Time
The 34 Most Anticipated TV Shows of Fall 2024
Including a bevy of new Ryan Murphy shows, some fond farewells, and new shows from Alfonso Cuarón and Mike Schur.
The Ringer
Ranking the NFL’s Worst-to-First Candidates for 2024
It’s inevitable: One team during an NFL season will come out of nowhere and land in first place. Which teams have the best chance to shock the rest of the league, and who is bound to remain at the bottom?
Sportico
How NFL Teams and Owners Make Their Money
The NFL’s 32 teams generated an estimated $20.5 billion in revenue last year, 70% higher than what NBA and MLB teams made. TV is the driving force.
The Associated Press
Iga Swiatek and Other Tennis Players Say Their Mental and Physical Health Are Ignored
It’s nothing new for tennis players to worry aloud about their sport’s overcrowded calendar, too-tough season and too-short offseason.
Why the NSA Advises You to Turn Off Your Phone Once a Week
Powering off your phone regularly, disabling Bluetooth, and using only trusted accessories are just a few of the NSA’s security recommendations. Here’s what else to know.
Town & Country Magazine
Inside the Unsolved Murder of JFK’s Mistress Mary Pinchot Meyer
A true crime podcast revisits the mysterious 1964 murder of the Washington, D.C. socialite.
Condé Nast Traveler
The Golden Rules of Road Tripping
Veteran road trippers (including a gas station food evangelist) share their savviest tips and tricks.
JStor Daily
The Shrewd Business Logic of Immigrant Cooks
Savvy observers, immigrant restaurateurs operate as amateur anthropologists who analyze their potential customers to determine how to best attract them.
NPR
How I Broke Free From Codependency — and Learned the Meaning of Loving Relationships
“I thought: if I just helped my friends, colleagues and neighbors, maybe I’d get the connection I craved in love, work and life,” writes journalist Gina Ryder.
CNBC
37% of Hiring Managers Say Job-Hopping Is a Red Flag: ‘Don’t Make Apologies for It,’ Says LinkedIn Career Expert
Job hopping and a lack of direction give hiring managers pause when reading a resume, says LinkedIn. Here’s how to make those work for you.
Popular Science
Why Are We Ticklish?
The science of tickling is full of mysteries, but there are some playful theories.
The Washington Post
The 401(K) Millionaires Club Hit a New Record. What’s Their Secret?
While this elite group benefited from surging stock prices, their gains are markers of steady investing over time and having the patience to ride out the rough patches.
CNN
What a Weekend Snooze Could Do for Your Heart Health, According to New Research
Getting extra sleep on the weekends to compensate for lost rest during the week may benefit your heart health, new research suggests.
The New Yorker
The Giddy Delights of “1941”
Steven Spielberg gave free rein to his anarchic inner child in this Second World War comedy—and paid the price.
Discover Magazine
Ancient Romans Were Some of the First Obnoxious Tourists
Archaeologists reveal traces of early tourism. From graffitied buildings to rowdy beach resorts, learn how ancient travelers shaped modern tourism.
Harvard Business Review
How to Craft a Memorable Message, According to Science
Imagine sitting in a meeting where someone is giving a presentation. You’re somewhat interested in the topic, and the speaker seems to be doing a good job. The meeting ends, and 30 minutes later, you try to recall what was discussed.
Bustle
Feeling Tired & Stuck? Blame It on “Functional Freeze”
Experts explain “functional freeze” and tips for getting out of it.
Context News
Why Is Telegram in Trouble With the Law?
Telegram, whose boss Durov was arrested in France, has few moderators and refuses to hand over data but how exactly does it work?
The Atlantic
The Last Social Network
Venmo has become the best way to see what the people you know are up to.
CNBC
Mortgage Rates Are Falling, Improving Home Buying Conditions. Here’s What to Know Before You Act
Experts give their best advice for navigating the housing market in the months ahead.
WIRED
Waymo Is Picking up at the Airport. That’s a Big Deal
Self-driving cars have started all-day pickups and drop-offs in Phoenix, Arizona. It’s great news for Alphabet’s bottom line, and a step forward for robotaxis.
Time
The 34 Most Anticipated TV Shows of Fall 2024
Including a bevy of new Ryan Murphy shows, some fond farewells, and new shows from Alfonso Cuarón and Mike Schur.
The Ringer
Ranking the NFL’s Worst-to-First Candidates for 2024
It’s inevitable: One team during an NFL season will come out of nowhere and land in first place. Which teams have the best chance to shock the rest of the league, and who is bound to remain at the bottom?
Sportico
How NFL Teams and Owners Make Their Money
The NFL’s 32 teams generated an estimated $20.5 billion in revenue last year, 70% higher than what NBA and MLB teams made. TV is the driving force.
The Associated Press
Iga Swiatek and Other Tennis Players Say Their Mental and Physical Health Are Ignored
It’s nothing new for tennis players to worry aloud about their sport’s overcrowded calendar, too-tough season and too-short offseason.