Firefox Quiet

Discussion in 'privacy technology' started by Slink489, Apr 10, 2015.

  1. SweX

    SweX Registered Member

    Joined:
    Apr 21, 2007
    Posts:
    6,429
    Yes, but only for a certain amount of time (I don't know exactly how many days). But in this case, as this thread gets bigger and bigger, and things may change with each new release of Firefox, it might be good if you have the ability to edit the OP to add or change information when ever that is needed.

    Try to send a PM to LWM, this post and thread is about that:
    https://www.wilderssecurity.com/thr...t-post-by-thread-starter.368679/#post-2412785
     
  2. LinuxKungFu

    LinuxKungFu Registered Member

    Joined:
    Sep 18, 2007
    Posts:
    11
    How can I use this? I would like to have it enabled at all times that I start firefox but to only log the current value and not change anything?

    Thanks
     
  3. TheWindBringeth

    TheWindBringeth Registered Member

    Joined:
    Feb 29, 2012
    Posts:
    2,171
    Autoconfig? You'll find tutorial material on autoconfig if you search for keywords like: Mozila OR Firefox autoconfig. Here is one link: https://mike.kaply.com/2012/03/16/customizing-firefox-autoconfig-files/

    Once you have an autoconfig file hooked up, you code it to do whatever you want. A primitive example of a selective user value logger is below. More elaborate things are possible. If necessary, look at [preference related] XPCOM APIs, extension code, etc.

    Note that autoconfig gets processed before some other things which have the potential to change preferences. So if you are trying to capture "final values" you may want to consider an extension or (if it is possible) setting up an observer in your autoconfig.

    Code:
    // Comment first line
    try
    {
      Components.utils.import("resource://gre/modules/Services.jsm");
      var prefsToLog = ['toolkit.telemetry.enabled',
                        'toolkit.telemetry.server',
                        'does.not.exist.pref'];
      var logOutput = "";
      for(var i=0; i<prefsToLog.length; i++)
      {
        var prefName = prefsToLog[i];
        var prefValue = getPref(prefName);
        if(prefValue === null)
          prefValue = "PREF_NOT_FOUND";
        logOutput += prefName + ":" + prefValue + "\n";
      }
      var logFilename = "PrefLog.log";
      var logfile = Services.dirsvc.get("TmpD", Components.interfaces.nsILocalFile);
      logfile.append(logFilename);
      var foStream = Components.classes["@mozilla.org/network/file-output-stream;1"]
                          .createInstance(Components.interfaces.nsIFileOutputStream);
      foStream.init(logfile, 0x02 | 0x08 | 0x20, parseInt("0666", 8), 0);
      var converter = Components.classes["@mozilla.org/intl/converter-output-stream;1"]
                          .createInstance(Components.interfaces.nsIConverterOutputStream);
      converter.init(foStream, "UTF-8", 0, 0);
      converter.writeString(logOutput);
      converter.close();
    }
    catch(e)
    {
      displayError("TestAutoconfig", e.message);
      throw("");
    }
    
     
  4. younameit

    younameit Registered Member

    Joined:
    Aug 19, 2013
    Posts:
    33
    Location:
    UK
    Hi guys, a German privacy-related website has good recommendations on configuring Firefox too.

    https://privacy-handbuch.de/handbuch_21u.htm

    They also provide details why they recommend these changes and what kinds of tracking are prevented but then again it is in German.
     
    Last edited by a moderator: Jun 24, 2015
  5. Alhaitham

    Alhaitham Registered Member

    Joined:
    May 18, 2013
    Posts:
    188
    Location:
    Egypt
  6. Alhaitham

    Alhaitham Registered Member

    Joined:
    May 18, 2013
    Posts:
    188
    Location:
    Egypt
  7. Slink489

    Slink489 Registered Member

    Joined:
    Mar 28, 2015
    Posts:
    24
    So here it is. My list of settings for firefox that SHOULD quiet it down. At least as far as the version number listed below. Furthermore, this list is based on the end user already having some knowlede of the browser. Don't bother me or anyone else if this list destroys your happy internet experience. Tis up to the end user to figure out why.

    Testing consists of a 2 week block where DNS records and packets are stored per session. So far, I've yet to see any funky mozilla related crap when clearly myself or the browser didn't initate contact with mozilla. Or so I think... I'm fairly confident nothing is slipping by. At least for now.

    Code:
    // ###### <Start Copy> ######
    /////////////////////////////////////////////////////////
    // user.js
    //
    // Version 00.01.4
    // Date 08.06.2015
    // Stick it where? Multiple OS and places? End user is responsible!
    // Don't bug me or anyone else about this!
    
    /////////////////////////////////////////////////////////
    // Firefox
    // Version: 38.05
    // Build: o_O
    // Other: o_O
    /////////////////////////////////////////////////////////
    
    /////////////////////////////////////////////////////////
    // Notes:
    // Rude and Crude!
    /////////////////////////////////////////////////////////
    
    //****************************************************************************
    //* Since it was suggetsted Firefox might alter this file either now         *
    //* or in the future (watch how fast they start to ignore this file!)        *
    //* it would be wise to keep this as a master copy named 'user.jbak'         *
    //* or some such thing.                                                      *
    //*                                                                          *
    //* Suggested addons: Request policy, Ublock, noscript                       *
    //* Random agent spoofer, Secret agent                                       *
    //*                                                                          *
    //* Use of either Proxomitron [Win] or Privoxy may be of use. A DNS          *
    //* filtering proxy such as DNSKong [older software] might be considered.    *
    //*                                                                          *
    //* Note: Some of the above suggestions may overlap in what these            *
    //* settings attempt to do. Choose carefully to avoid redundency and         *
    //* overkill.                                                                *
    //*                                                                          *
    //* Lastly: This file and all the settings are tested with only the          *
    //* following extensions. Everything else is either disabled or removed.     *
    //* |                                                                        *
    //* |-> QuickJava                                                            *
    //* |-> RequestPolicy                                                        *
    //* |-> Ublock                                                               *
    //*                                                                          *
    //* QuickJava is used as an on the fly blocker of Java, Javascript, cookies, *
    //* and a few other things. This is NOT like the NoScript extension at all.  *
    //* Note- Quickjava is old and doesn't play niclely with the newer firefox UI*
    //****************************************************************************
    
    /////////////////////////////////////////////////////////
    // Required to semi-required to quiet Firefox!
    /////////////////////////////////////////////////////////
    
    //user_pref("app.crashreporter.autosubmit", false); for Win8?
    //user_pref("app.crashreporter.prompted", false); for Win8?
    
    user_pref("beacon.enabled", false);
    user_pref("breakpad.reportURL", "");
    
    user_pref("browser.aboutHomeSnippets.updateUrl", "");
    user_pref("browser.bookmarks.max_backups", 0);
    user_pref("browser.cache.disk.capacity", 0);
    user_pref("browser.cache.disk.enable", false);
    user_pref("browser.cache.disk.smart_size.enabled", false);
    user_pref("browser.cache.disk_cache_ssl", false);
    user_pref("browser.cache.offline.capacity", 0);
    user_pref("browser.cache.offline.enable", false);
    user_pref("browser.casting.enabled", false);
    user_pref("browser.display.use_document_fonts", 0);
    user_pref("browser.dom.window.dump.enabled", false);
    user_pref("browser.download.manager.addToRecentDocs", false);
    user_pref("browser.download.manager.retention", 0);
    user_pref("browser.fixup.alternate.enabled", false);
    user_pref("browser.formfill.enable", false);
    user_pref("browser.formfill.expire_days", 1);
    user_pref("browser.formfill.saveHttpsForms", false);
    user_pref("browser.helperApps.alwaysAsk.force", true);
    user_pref("browser.history.allowPopState", false);
    user_pref("browser.history.allowPushState", false);
    user_pref("browser.history.allowReplaceState", false);
    user_pref("browser.newtab.preload", false);
    user_pref("browser.newtab.url", "about:blank");
    user_pref("browser.newtabpage.directory.ping", "");
    //user_pref("browser.newtabpage.directory.source", "data:application/json,{}"); ///?
    user_pref("browser.newtabpage.directory.source", "");
    user_pref("browser.newtabpage.enabled", false);
    user_pref("browser.newtabpage.enhanced", false);
    user_pref("browser.newtabpage.introShown", false);
    user_pref("browser.offline-apps.notify", false);
    user_pref("browser.pagethumbnails.capturing_disabled", true);
    user_pref("browser.search.suggest.enabled", false);
    user_pref("browser.search.geoip.url", "");
    user_pref("browser.selfsupport.url", "");
    user_pref("browser.send_pings", false);
    user_pref("browser.send_pings.require_same_host", true);
    user_pref("browser.sessionhistory.max_entries", 2);
    user_pref("browser.sessionstore.max_resumed_crashes", 0);
    user_pref("browser.sessionstore.privacy_level", 2);
    user_pref("browser.sessionstore.resume_from_crash", false);
    user_pref("browser.slowStartup.notificationDisabled", true);
    user_pref("browser.ssl_override_behavior", 0);
    user_pref("browser.taskbar.lists.frequent.enabled", false);
    user_pref("browser.taskbar.lists.maxListItemCount", 0);
    user_pref("browser.urlbar.autocomplete.enabled", false);
    user_pref("browser.urlbar.autoFill", false);
    user_pref("browser.zoom.siteSpecific", false);
    
    user_pref("camera.control.autofocus_moving_callback.enabled", false);
    user_pref("camera.control.face_detection.enabled", false);
    
    user_pref("datareporting.healthreport.about.reportUrl", "");
    user_pref("datareporting.healthreport.documentServerURI", "");
    user_pref("datareporting.healthreport.service.enabled", false);
    user_pref("datareporting.healthreport.uploadEnabled", false);
    user_pref("datareporting.policy.dataSubmissionEnabled", false);
    
    user_pref("device.sensors.enabled", false);
    
    user_pref("dom.battery.enabled", false);
    user_pref("dom.disable_window_open_feature.close", true);
    user_pref("dom.disable_window_open_feature.menubar", true);
    user_pref("dom.disable_window_open_feature.minimizable", true);
    user_pref("dom.disable_window_open_feature.personalbar", true);
    user_pref("dom.disable_window_open_feature.scrollbars", true);
    user_pref("dom.disable_window_open_feature.titlebar", true);
    user_pref("dom.disable_window_open_feature.toolbar", true);
    user_pref("dom.enable_performance", false);
    user_pref("dom.enable_resource_timing", false);
    user_pref("dom.event.clipboardevents.enabled", false);
    user_pref("dom.gamepad.enabled", false);
    user_pref("dom.idle-observers-api.enabled", false);
    user_pref("dom.indexedDB.enabled", false); ///// required to proper addon function /////
    user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
    user_pref("dom.ipc.plugins.reportCrashURL", false);
    user_pref("dom.server-events.enabled", false);
    user_pref("dom.storage.enabled", false); //required for sync
    user_pref("dom.vibrator.enabled", false);
    user_pref("dom.w3c_touch_events.enabled", 0);
    user_pref("dom.workers.sharedWorkers.enabled", false);
    
    user_pref("experiments.enabled", false);
    user_pref("experiments.manifest.uri", "");
    user_pref("experiments.supported", false);
    
    user_pref("extensions.blocklist.enabled", false);
    user_pref("extensions.getAddons.cache.enabled", false);
    user_pref("extensions.webservice.discoverURL", "http://0.0.0.0");
    user_pref("extensions.update.background.url", "http://0.0.0.0");
    
    user_pref("geo.enabled", false);
    user_pref("geo.wifi.uri", "");
    
    user_pref("gfx.direct2d.disabled", true);
    user_pref("gfx.downloadable_fonts.enabled", false);
    
    user_pref("image.cache.size", 0);
    user_pref("keyword.enabled", false);
    user_pref("layout.css.visited_links_enabled", false);
    
    user_pref("loop.server", ""); //??
    user_pref("loop.enabled", false);
    user_pref("loop.soft_start_hostname", "");
    
    user_pref("media.autoplay.enabled", false);
    user_pref("media.cache_size", 0);
    user_pref("media.eme.enabled", false);
    user_pref("media.gmp-gmpopenh264.enabled", false);
    user_pref("media.gmp-gmpopenh264.provider.enabled", false);
    user_pref("media.peerconnection.enabled", false);
    user_pref("media.peerconnection.video.enabled", false);
    user_pref("media.video_stats.enabled", false);
    user_pref("media.gmp-manager.certs.1.commonName", "");
    user_pref("media.gmp-manager.certs.2.commonName", "");
    user_pref("media.gmp-manager.url", "");
    
    user_pref("network.allow-experiments", false);
    user_pref("network.automatic-ntlm-auth.allow-proxies", false);
    user_pref("network.cookie.cookieBehavior", 1);
    user_pref("network.cookie.lifetime.days", 1);
    user_pref("network.cookie.thirdparty.sessionOnly", true);
    user_pref("network.dns.disableIPv6", true);
    user_pref("network.dns.disablePrefetch", true);
    user_pref("network.dnsCacheEntries", 0);
    user_pref("network.http.accept-encoding", "identity");
    user_pref("network.http.prompt-temp-redirect", true);
    
    //Probably wise to shut this down!!!
    user_pref("network.http.spdy.allow-push", false);
    user_pref("network.http.spdy.coalesce-hostnames", false);
    user_pref("network.http.spdy.enabled", false);
    user_pref("network.http.spdy.enabled.deps", false);
    user_pref("network.http.spdy.enabled.http2", false);
    user_pref("network.http.spdy.enabled.http2draft", false);
    user_pref("network.http.spdy.enabled.v3-1", false);
    user_pref("network.http.spdy.enforce-tls-profile", false);
    
    user_pref("network.http.speculative-parallel-limit", 0);
    user_pref("network.predictor.enabled", false);
    user_pref("network.prefetch-next", false);
    user_pref("network.protocol-handler.warn-external.ms-windows-store", true);
    user_pref("network.protocol-handler.warn-external.news", true);
    user_pref("network.protocol-handler.warn-external.nntp", true);
    user_pref("network.protocol-handler.warn-external.snews", true);
    user_pref("network.websocket.enabled", false);
    
    user_pref("offline-apps.allow_by_default", false);
    
    user_pref("pfs.datasource.url", "");
    
    user_pref("plugin.default.state", 1);
    user_pref("plugin.scan.Acrobat", "99.0");
    user_pref("plugin.scan.Quicktime", "99.0");
    user_pref("plugin.state.java", 0);
    user_pref("plugin.state.np_prsnl", 0);
    user_pref("plugin.state.npatgpc", 0);
    user_pref("plugin.state.npauthz", 0);
    user_pref("plugin.state.npbispbrowser", 0);
    user_pref("plugin.state.npboxedit", 0);
    user_pref("plugin.state.npchip", 0);
    user_pref("plugin.state.npciscowebcommunicator", 0);
    user_pref("plugin.state.npesteid-firefox-plugin", 0);
    user_pref("plugin.state.npfacebookvideocalling", 0);
    user_pref("plugin.state.npgcplugin", 0);
    user_pref("plugin.state.npgoogleupdate", 0);
    user_pref("plugin.state.npmcafeemss", 0);
    user_pref("plugin.state.npmcffplg", 0);
    user_pref("plugin.state.npmeetingjoinpluginoc", 0);
    user_pref("plugin.state.npmozcouponprinter", 0);
    user_pref("plugin.state.npmvtplugin", 0);
    user_pref("plugin.state.nppdf", 0);
    user_pref("plugin.state.npplayerplugin", 0);
    user_pref("plugin.state.nprobloxproxy", 0);
    user_pref("plugin.state.npskypewebplugin", 0);
    user_pref("plugin.state.npspwrap", 0);
    user_pref("plugin.state.npunity3d", 0);
    user_pref("plugin.state.npvidyoweb", 0);
    user_pref("plugin.state.npviewright", 0);
    user_pref("plugin.state.npwebcard", 0);
    user_pref("plugins.enumerable_names", "");
    
    user_pref("print.save_print_settings", false);
    
    //These might break some sites?
    user_pref("security.OCSP.require", true);
    user_pref("security.cert_pinning.enforcement_level", 2);
    user_pref("security.remember_cert_checkbox_default_setting", false);
    user_pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false);
    user_pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false);
    user_pref("security.ssl3.rsa_des_ede3_sha", false);
    user_pref("security.ssl3.rsa_fips_des_ede3_sha", false);
    user_pref("security.ssl3.rsa_rc4_128_md5", false);
    user_pref("security.ssl3.rsa_rc4_128_sha", false);
    user_pref("security.tls.version.min", 1);
    user_pref("security.tls.version.max", 3);
    user_pref("security.xpconnect.plugin.unrestricted", false);
    
    user_pref("social.remote-install.enabled", false);
    user_pref("social.toast-notifications.enabled", false);
    
    user_pref("toolkit.telemetry.enabled", false);
    user_pref("toolkit.telemetry.server", "");
    
    user_pref("webgl.disable-extensions", true);
    user_pref("webgl.disabled", true);
    
    user_pref("xpinstall.whitelist.required", true); ///?
    
    //This section for masking browser ID if needed... Needs work!
    //////////////////////////////////////////////////////////////
    //user_pref("general.appname.override", "Netscape");
    //user_pref("general.appversion.override", "5.0 (Windows)");
    //user_pref("general.buildID.override", "20131025151332");
    
    //user_pref("general.oscpu.override", "Windows NT 6.1; WOW64");
    //user_pref("general.platform.override", "Windows NT 6.1; WOW64");
    //user_pref("general.useragent.locale", "en-US");
    //user_pref("general.useragent.override", "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:25.0) Gecko/20100101 Firefox/25.0");
    //user_pref("general.useragent.vendor", "");
    //user_pref("general.useragent.vendorSub", "");
    //user_pref("image.http.accept", "image/png,image/*;q=0.8,*/*;q=0.5");
    //user_pref("intl.accept_languages", "en-US,en;q=0.5");
    //user_pref("network.http.accept.default", "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8");
    //user_pref("network.http.accept-encoding", "gzip, deflate");
    //user_pref("accept_charsets", "*");
    //user_pref("charset_default", "");
    //////////////Not Used////////////////
    //user_pref("gecko.buildID", "20131025151332");
    //user_pref("productSub.override", "20100101");
    //user_pref("navigator.system", "Windows NT 6.1; WOW64");
    //user_pref("navigator.appVersion", "5.0 (Windows)");
    //user_pref("navigator.buildID", "20131025151332");
    //user_pref("navigator.geckoVersion", "25.0");
    //user_pref("navigator.version", "25.0");
    /////////////////////////////////////////////////////////
    
    
    /////////////////////////////////////////////////////////
    // Optional settings - User prefs and risk!
    /////////////////////////////////////////////////////////
    user_pref("network.http.pipelining", true);
    user_pref("network.http.pipelining.maxrequests", :cool:;
    user_pref("network.http.pipelining.ssl", true);
    user_pref("network.http.proxy.pipelining", true);
    
    // Some extensions better used to control this
    //user_pref("javascript.enabled", false);
    // ###### <End Copy> ######
     
    Last edited by a moderator: Aug 6, 2015
  8. inka

    inka Registered Member

    Joined:
    Oct 21, 2009
    Posts:
    426
    Thanks for sharing your suggested prefs list, Slink.

    FYI, setting these false (as tested on ff31esr) disables the forward/back navigation in browser ui.
    (probably not desirable, and wide-of-the-mark in terms of "quiet-related" prefs)
    browser.history.allowPopState = false
    browser.history.allowPushState = false
     
  9. TheWindBringeth

    TheWindBringeth Registered Member

    Joined:
    Feb 29, 2012
    Posts:
    2,171
  10. TheWindBringeth

    TheWindBringeth Registered Member

    Joined:
    Feb 29, 2012
    Posts:
    2,171
    @Slink489: There were some pref changes I thought I might find in your list (in part because you were aggressive enough to target the blocklist), but I didn't spot them. Since I do not know whether you missed them, or reviewed them and decided they are OK for you, I offer the following.

    Attached is an export from FF 39.0.3, aimed at identifying host and url related prefs. I'm not trying to encourage you or someone else to jump right in and change these. I'm posting it because the pref names are useful for identifying the features that involve [remote] communications. Once you know what the features are, then you can determine whether you want to change the default behavior and how best to accomplish that. For example, many features have a .enabled preference and setting that to false would be the preferred way. To start anyway.

    Note: The reader can look for these types of prefs on their own, via the about:config search box. Pref names and pref values are searched, so something like :// can find many things of interest.
     

    Attached Files:

    Last edited: Aug 8, 2015
  11. Slink489

    Slink489 Registered Member

    Joined:
    Mar 28, 2015
    Posts:
    24
    Thanks for pointing that out. Non ERS versions don't seem to have the problem you mentioned. Or the settings are ignored. With Firefox 38.05, I have no UI navigation problems. That does remind me to try and point out settings that might have arguable results.
     
  12. Slink489

    Slink489 Registered Member

    Joined:
    Mar 28, 2015
    Posts:
    24
    Actually, you can offer anything you want. I tend to pay attention to your posts. You can help shape the list if you want. Anyway, did I miss some things? Yup! My goal was to keep Firefox quiet. Not a peep goes out on the wire without user consent. I'm not perfect so no doubt I didn't get them all. As for reviewing each setting or potential setting? Not really. <-- But that only applies until now. If you care to suggest some aggressive settings I'd like to see them.

    "For example, many features have a .enabled preference and setting that to false would be the preferred way. To start anyway."

    Not sure I agree with that. If the setting has a .enabled setting and a URL(s) is attached to it to provide some sort of functionality, the URL entry should be blank or some other method used to deflect said functionallity. Maybe I'm wrong, but were there not cases (in the night-lies?) where settings were completely ignored?

    While I'm at it, I've gleaned some things off the web as well as your own posts WindB, that seem to point toward Mozilla being able to push stuff into the browser at will. I'd guess easily pulling things from the browser is also in the mix. Allowing the end user to opt out by any means would likely break both processes. Hence, they'd HAVE to ignore settings a user might set.

    Heh!, but none of that really matters so much to me. I'm seriously considering pulling out my programmers gloves and jumping ship to K-Meleon.

    As for the host and url prefs list? Awesome. Looks to me like its all DNS based and therefore would get logged by DNSkong. *.tokbox.com? What the bloody hell is that? Oh, I've got some new stuff to block. Yup.

    --

    Lastly, I'll be upgrading [Or should I say downgrading] to Firefox 39 some time this week. A new list of options should follow for THAT browser release. In the mean time:
     
  13. Slink489

    Slink489 Registered Member

    Joined:
    Mar 28, 2015
    Posts:
    24
    Man I hope all my glorious formatting shows up. Otherwise, its wrecked!

    Code:
    
    // ###### <Start Copy> ######
    // ===========================================================================
    // = user.js                                                                 =
    // =                                                                         =
    // = Version 00.01.5                                                         =
    // = Date 08.10.2015                                                         =
    // = Stick it where? Multiple OS and places? End user is responsible!        =
    // = Don't bug me or anyone else about this!                                 =
    // =                                                                         =
    // = Firefox                                                                 =
    // = Version: 38.05                                                          =
    // = Build: 20150523                                                         =
    // = Other: ???                                                              =
    // ===========================================================================
    
    // ===========================================================================
    // = NOTES: Rude and Crude!                                                  =
    // = **********************                                                  =
    // =                                                                         =
    // = Since it was suggetsted Firefox might alter this file either now        =
    // = or in the future (watch how fast they start to ignore this file!)       =
    // = it would be wise to keep this as a master copy named 'user.jsbak'       =
    // = or some such thing.                                                     =
    // =                                                                         =
    // = Suggested Addons: Request policy, Ublock, Noscript, Secret agent,       =
    // = Random agent spoofer                                                    =
    // =                                                                         =
    // = Use of either Proxomitron [Win] or Privoxy may be of use. A DNS         =
    // = filtering proxy such as DNSKong [older software] might be considered.   =
    // = Use of a hosts file or IP based blocking software (Peerblock) could     =
    // = also be useful.                                                         =
    // =                                                                         =
    // = Note: Some of the above suggestions may overlap in what these           =
    // = settings attempt to do. Choose carefully to avoid redundency and        =
    // = overkill.                                                               =
    // =                                                                         =
    // = Lastly: This file and all the settings are tested with only the         =
    // = following extensions. Everything else is either disabled or removed.    =
    // = |                                                                       =
    // = |-> QuickJava                                                           =
    // = |-> RequestPolicy                                                       =
    // = |-> Ublock                                                              =
    // =                                                                         =
    // = QuickJava is used as an on the fly blocker of Java, Javascript,         =
    // = cookies, and a few other things. This is NOT like the Noscript          =
    // = extension at all. Note- Quickjava is old and doesn't play nicely with   =
    // = the newer firefox UI.                                                   =
    // ===========================================================================
    
    
    // ===========================================================================
    // = Required to semi-required to quiet Firefox!                             =
    // ===========================================================================
    
    //user_pref("app.crashreporter.autosubmit", false); for Win8?
    //user_pref("app.crashreporter.prompted", false); for Win8?
    
    user_pref("app.update.auto", false);
    user_pref("app.update.url", "");
    user_pref("app.update.url.details", "");
    
    user_pref("beacon.enabled", false);
    user_pref("breakpad.reportURL", "");
    
    user_pref("browser.aboutHomeSnippets.updateUrl", "");
    user_pref("browser.bookmarks.max_backups", 0);
    user_pref("browser.cache.disk.capacity", 0);
    user_pref("browser.cache.disk.enable", false);
    user_pref("browser.cache.disk.smart_size.enabled", false);
    user_pref("browser.cache.disk_cache_ssl", false);
    user_pref("browser.cache.offline.capacity", 0);
    user_pref("browser.cache.offline.enable", false);
    user_pref("browser.casting.enabled", false);
    user_pref("browser.display.use_document_fonts", 0);
    user_pref("browser.dom.window.dump.enabled", false);
    user_pref("browser.download.manager.addToRecentDocs", false);
    user_pref("browser.download.manager.retention", 0);
    user_pref("browser.fixup.alternate.enabled", false);
    user_pref("browser.formfill.enable", false);
    user_pref("browser.formfill.expire_days", 1);
    user_pref("browser.formfill.saveHttpsForms", false);
    user_pref("browser.helperApps.alwaysAsk.force", true);
    
    // Arguable Options: May cause lack of functionality in some browser versions
    //user_pref("browser.history.allowPopState", false);
    //user_pref("browser.history.allowPushState", false);
    //user_pref("browser.history.allowReplaceState", false);
    
    user_pref("browser.newtab.preload", false);
    user_pref("browser.newtab.url", "about:blank");
    user_pref("browser.newtabpage.directory.ping", "");
    // Why is this here?
    //user_pref("browser.newtabpage.directory.source", "data:application/json,{}"); ///?
    user_pref("browser.newtabpage.directory.source", "");
    user_pref("browser.newtabpage.enabled", false);
    user_pref("browser.newtabpage.enhanced", false);
    user_pref("browser.newtabpage.introShown", false);
    user_pref("browser.offline-apps.notify", false);
    user_pref("browser.pagethumbnails.capturing_disabled", true);
    user_pref("browser.search.suggest.enabled", false);
    user_pref("browser.search.geoip.url", "");
    user_pref("browser.selfsupport.url", "");
    user_pref("browser.send_pings", false);
    user_pref("browser.send_pings.require_same_host", true);
    user_pref("browser.sessionhistory.max_entries", 2);
    user_pref("browser.sessionstore.max_resumed_crashes", 0);
    user_pref("browser.sessionstore.privacy_level", 2);
    user_pref("browser.sessionstore.resume_from_crash", false);
    user_pref("browser.slowStartup.notificationDisabled", true);
    user_pref("browser.ssl_override_behavior", 0);
    user_pref("browser.taskbar.lists.frequent.enabled", false);
    user_pref("browser.taskbar.lists.maxListItemCount", 0);
    user_pref("browser.urlbar.autocomplete.enabled", false);
    user_pref("browser.urlbar.autoFill", false);
    user_pref("browser.zoom.siteSpecific", false);
    
    user_pref("camera.control.autofocus_moving_callback.enabled", false);
    user_pref("camera.control.face_detection.enabled", false);
    
    user_pref("datareporting.healthreport.about.reportUrl", "");
    user_pref("datareporting.healthreport.documentServerURI", "");
    user_pref("datareporting.healthreport.service.enabled", false);
    user_pref("datareporting.healthreport.uploadEnabled", false);
    user_pref("datareporting.policy.dataSubmissionEnabled", false);
    
    user_pref("device.sensors.enabled", false);
    
    user_pref("dom.battery.enabled", false);
    user_pref("dom.disable_window_open_feature.close", true);
    user_pref("dom.disable_window_open_feature.menubar", true);
    user_pref("dom.disable_window_open_feature.minimizable", true);
    user_pref("dom.disable_window_open_feature.personalbar", true);
    user_pref("dom.disable_window_open_feature.scrollbars", true);
    user_pref("dom.disable_window_open_feature.titlebar", true);
    user_pref("dom.disable_window_open_feature.toolbar", true);
    user_pref("dom.enable_performance", false);
    user_pref("dom.enable_resource_timing", false);
    user_pref("dom.event.clipboardevents.enabled", false);
    user_pref("dom.gamepad.enabled", false);
    user_pref("dom.idle-observers-api.enabled", false);
    user_pref("dom.indexedDB.enabled", false); // *required for proper addon functions?* //
    user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
    user_pref("dom.ipc.plugins.reportCrashURL", false);
    user_pref("dom.server-events.enabled", false);
    user_pref("dom.storage.enabled", false); //required for sync
    user_pref("dom.vibrator.enabled", false);
    user_pref("dom.w3c_touch_events.enabled", 0);
    user_pref("dom.workers.sharedWorkers.enabled", false);
    
    user_pref("experiments.enabled", false);
    user_pref("experiments.manifest.uri", "");
    user_pref("experiments.supported", false);
    
    user_pref("extensions.blocklist.enabled", false);
    user_pref("extensions.getAddons.cache.enabled", false);
    user_pref("extensions.webservice.discoverURL", "http://0.0.0.0");
    user_pref("extensions.update.background.url", "http://0.0.0.0");
    
    user_pref("geo.enabled", false);
    user_pref("geo.wifi.uri", "");
    
    user_pref("gfx.direct2d.disabled", true);
    user_pref("gfx.downloadable_fonts.enabled", false);
    
    user_pref("image.cache.size", 0);
    user_pref("keyword.enabled", false);
    user_pref("layout.css.visited_links_enabled", false);
    
    user_pref("loop.server", ""); //??
    user_pref("loop.enabled", false);
    user_pref("loop.soft_start_hostname", "");
    
    user_pref("media.autoplay.enabled", false);
    user_pref("media.cache_size", 0);
    user_pref("media.eme.enabled", false);
    user_pref("media.gmp-gmpopenh264.enabled", false);
    user_pref("media.gmp-gmpopenh264.provider.enabled", false);
    
    // Stiffle this!
    user_pref("media.peerconnection.enabled", false);
    user_pref("media.peerconnection.default_iceservers", "");
    user_pref("media.peerconnection.identity.enabled", false);
    user_pref("media.peerconnection.identity.timeout", 1);
    user_pref("media.peerconnection.turn.disable", false);
    user_pref("media.peerconnection.use_document_iceservers", false);
    user_pref("media.peerconnection.video.enabled", false);
    
    user_pref("media.video_stats.enabled", false);
    user_pref("media.gmp-manager.certs.1.commonName", "");
    user_pref("media.gmp-manager.certs.2.commonName", "");
    user_pref("media.gmp-manager.url", "");
    
    user_pref("network.allow-experiments", false);
    user_pref("network.automatic-ntlm-auth.allow-proxies", false);
    user_pref("network.cookie.cookieBehavior", 1);
    user_pref("network.cookie.lifetime.days", 1);
    user_pref("network.cookie.thirdparty.sessionOnly", true);
    user_pref("network.dns.disableIPv6", true);
    user_pref("network.dns.disablePrefetch", true);
    user_pref("network.dnsCacheEntries", 0);
    user_pref("network.http.accept-encoding", "identity");
    user_pref("network.http.prompt-temp-redirect", true);
    
    // Probably wise to shut this down!!!
    user_pref("network.http.spdy.allow-push", false);
    user_pref("network.http.spdy.coalesce-hostnames", false);
    user_pref("network.http.spdy.enabled", false);
    user_pref("network.http.spdy.enabled.deps", false);
    user_pref("network.http.spdy.enabled.http2", false);
    user_pref("network.http.spdy.enabled.http2draft", false);
    user_pref("network.http.spdy.enabled.v3-1", false);
    user_pref("network.http.spdy.enforce-tls-profile", false);
    
    user_pref("network.http.speculative-parallel-limit", 0);
    user_pref("network.predictor.enabled", false);
    user_pref("network.prefetch-next", false);
    user_pref("network.protocol-handler.warn-external.ms-windows-store", true);
    user_pref("network.protocol-handler.warn-external.news", true);
    user_pref("network.protocol-handler.warn-external.nntp", true);
    user_pref("network.protocol-handler.warn-external.snews", true);
    user_pref("network.websocket.enabled", false);
    
    user_pref("offline-apps.allow_by_default", false);
    
    // Arguable Options: Used here to sidestep a security issue that has no
    // no doubt been fixed by now [FF 39.03]. Besides, there are better
    // free PDF readers out there.
    user_pref("pdfjs.disabled", true);
    
    user_pref("pfs.datasource.url", "");
    
    // Arguable Options: May cause browser to be identified as unique
    user_pref("plugin.default.state", 1);
    user_pref("plugin.scan.Acrobat", "99.0");
    user_pref("plugin.scan.Quicktime", "99.0");
    user_pref("plugin.scan.WindowsMediaPlayer", "99.0");
    user_pref("plugin.scan.plid.all", false);
    
    user_pref("plugin.state.java", 0);
    user_pref("plugin.state.np_prsnl", 0);
    user_pref("plugin.state.npatgpc", 0);
    user_pref("plugin.state.npauthz", 0);
    user_pref("plugin.state.npbispbrowser", 0);
    user_pref("plugin.state.npboxedit", 0);
    user_pref("plugin.state.npchip", 0);
    user_pref("plugin.state.npciscowebcommunicator", 0);
    user_pref("plugin.state.npesteid-firefox-plugin", 0);
    user_pref("plugin.state.npfacebookvideocalling", 0);
    user_pref("plugin.state.npgcplugin", 0);
    user_pref("plugin.state.npgoogleupdate", 0);
    user_pref("plugin.state.npmcafeemss", 0);
    user_pref("plugin.state.npmcffplg", 0);
    user_pref("plugin.state.npmeetingjoinpluginoc", 0);
    user_pref("plugin.state.npmozcouponprinter", 0);
    user_pref("plugin.state.npmvtplugin", 0);
    user_pref("plugin.state.nppdf", 0);
    user_pref("plugin.state.npplayerplugin", 0);
    user_pref("plugin.state.nprobloxproxy", 0);
    user_pref("plugin.state.npskypewebplugin", 0);
    user_pref("plugin.state.npspwrap", 0);
    user_pref("plugin.state.npunity3d", 0);
    user_pref("plugin.state.npvidyoweb", 0);
    user_pref("plugin.state.npviewright", 0);
    user_pref("plugin.state.npwebcard", 0);
    user_pref("plugins.enumerable_names", "");
    
    user_pref("print.save_print_settings", false);
    
    //These might break some sites?
    user_pref("security.OCSP.require", true);
    user_pref("security.cert_pinning.enforcement_level", 2);
    user_pref("security.remember_cert_checkbox_default_setting", false);
    user_pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false);
    user_pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false);
    user_pref("security.ssl3.rsa_des_ede3_sha", false);
    user_pref("security.ssl3.rsa_fips_des_ede3_sha", false);
    user_pref("security.ssl3.rsa_rc4_128_md5", false);
    user_pref("security.ssl3.rsa_rc4_128_sha", false);
    user_pref("security.tls.version.min", 1);
    user_pref("security.tls.version.max", 3);
    user_pref("security.xpconnect.plugin.unrestricted", false);
    
    user_pref("social.remote-install.enabled", false);
    user_pref("social.toast-notifications.enabled", false);
    
    user_pref("toolkit.telemetry.enabled", false);
    user_pref("toolkit.telemetry.server", "");
    
    user_pref("webgl.disable-extensions", true);
    user_pref("webgl.disabled", true);
    
    user_pref("xpinstall.whitelist.required", true); ///????????????
    
    //This section for masking browser ID if needed... Needs work!
    //////////////////////////////////////////////////////////////
    //user_pref("gecko.buildID", "20131025151332");
    
    //user_pref("general.appname.override", "Netscape");
    //user_pref("general.appversion.override", "5.0 (Windows)");
    //user_pref("general.buildID.override", "20131025151332");
    
    //user_pref("general.oscpu.override", "Windows NT 6.1; WOW64");
    //user_pref("general.platform.override", "Windows NT 6.1; WOW64");
    //user_pref("general.useragent.locale", "en-US");
    //user_pref("general.useragent.override", "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:25.0) Gecko/20100101 Firefox/25.0");
    //user_pref("general.useragent.vendor", "");
    //user_pref("general.useragent.vendorSub", "");
    //user_pref("image.http.accept", "image/png,image/*;q=0.8,*/*;q=0.5");
    //user_pref("intl.accept_languages", "en-US,en;q=0.5");
    //user_pref("network.http.accept.default", "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8");
    //user_pref("network.http.accept-encoding", "gzip, deflate");
    //user_pref("accept_charsets", "*");
    //user_pref("charset_default", "");
    //////////////Not Used////////////////
    //user_pref("productSub.override", "20100101");
    //user_pref("navigator.system", "Windows NT 6.1; WOW64");
    //user_pref("navigator.appVersion", "5.0 (Windows)");
    //user_pref("navigator.buildID", "20131025151332");
    //user_pref("navigator.geckoVersion", "25.0");
    //user_pref("navigator.version", "25.0");
    /////////////////////////////////////////////////////////
    
    
    /////////////////////////////////////////////////////////
    // Optional settings - User prefs and risk!
    /////////////////////////////////////////////////////////
    user_pref("network.http.pipelining", true);
    user_pref("network.http.pipelining.maxrequests", 12);
    user_pref("network.http.pipelining.ssl", true);
    user_pref("network.http.proxy.pipelining", true);
    
    // Some extensions better used to control this
    // user_pref("javascript.enabled", false);
    // ###### <End Copy> ######
    
    
     
  14. inka

    inka Registered Member

    Joined:
    Oct 21, 2009
    Posts:
    426
    I agree about keeping a backup copy. Still, you might be interested in trying this:
    https://addons.mozilla.org/en-US/firefox/addon/preferences-monitor
    Does noscript extension similarly monitor/notify of changed preferences?
    I customized an older version (before eCleaner functionality was added) of the prefMon extension and it served me well.
    I never witnessed notification of any "malicious" changes (unsurprising. I review the code of all extensions I install, disallow automatic updates, etc)
    but its realtime notification was enlightening nonethless. I discovered that some extensions wrote/updated their pref keys each time their options dialog was closed (stupidly, even if no edits had been performed).

    user_pref("browser.zoom.siteSpecific", false);
    ^--- idunno what benefit you would derive from this? Suspect it might be leaked as a fingerprinting detail?

    user_pref("dom.indexedDB.enabled", false); // *required for proper addon functions?* //
    ^--- scroobeedoobeedoo. Hopefully enough folks have complained, and loudly enough, that mozilla will revert the asinine decision to have this sole pref affect BOTH content scripts AND extensions' scripts. I do set this false and, increasingly, I'm noticing "breakage" when visiting various sites. To be clear, none of my installed extensions depend on indexedDB functionality; it's site authors increasingly expecting (presuming, demanding) the visitor is using a "modern" browser, with indexedDB functionality enabled. Even if extensions are not affected by this pref down the road, we deserve the courtesy of "informed consent". When a site attempts to use indexedDB, alert me... and provide a means to set per-site policy.

    I'm not up-to-speed on understanding the merit of restartless addons, nor could I embrace the SDK approach (which seemed to introduce terrible redundancy / ineficiency). Nowadays, at reading that extensions will be expected (forced) to use content scripts for many operations (proxied, by messageManager), to me it feels like "game over". I worry (perhaps naively) that when the scripts of extensions are sniffable by content scripts... surely spy-vs-spy escalation will ensue, pushing us into the realm of Anti-aNti-anTi-ANTI-adblocker nonsense. I think I read that namespaced scripts are expected to offer some "protection" against sniffing/meddling. Yeah, from the eggheads who've introduced scripted "abortable promises" (wtf?). Duh! If namespace "adblockplus" exists in the runtime environment, no need for an anti-adblock script to sniff any further. So, at the very least, seems like employing mutable runtime code (varnames, namespace names) will become necessary.

    user_pref("dom.vibrator.enabled", false);
    ^--- I too set this to false, but speaking of potential fingerprinting details, I wonder whether doing so makes ya stick out from the herd. If false, does any attempt to utilize it just silently fail, or does the script attempting to initiate this functionality receive feedback that its attempt has been disallowed? My point in raising this example is to underscore my interest in having/building a watchdog which alarms when select prefs are accessed. Who/when (and why) wants to know if they can "vibrate" me?
     
  15. TheWindBringeth

    TheWindBringeth Registered Member

    Joined:
    Feb 29, 2012
    Posts:
    2,171
    I want the next version of my PrefDiffTool to highlight prefs of special importance. So I created a prefix list. I added some additional entries/comments to draw attention to prefs that aren't set by default [on desktop]. A work in progress:
    Code:
    var specialPrefPrefixes = [
      "app.",
      "app.update.url.override",                          // Hidden
      "beacon.enabled",
      "breakpad.reportURL",
      "browser.aboutHomeSnippets.updateUrl",
      "browser.apps.URL",
      "browser.bookmarks.max_backups",
      "browser.cache.",
      "browser.casting.enabled",
      "browser.contentHandlers",
      "browser.customizemode.tip0.learnMoreUrl",
      "browser.dictionaries.download.url",
      "browser.display.max_font",
      "browser.display.use_document_fonts",
      "browser.download.folderList",
      "browser.download.hide_plugins_without_extensions",
      "browser.download.manager.addToRecentDocs",
      "browser.download.manager.alertOnEXEOpen",          // Hidden
      "browser.download.manager.retention",               // Hidden
      "browser.download.manager.scanWhenDone",            // Hidden
      "browser.download.show_plugins_in_list",
      "browser.download.useDownloadDir",
      "browser.eme.",
      "browser.fixup.",
      "browser.flash-protected-mode-flip.",
      "browser.formfill.",
      "browser.fullscreen.",
      "browser.geolocation.warning.infoURL",
      "browser.helperApps.",
      "browser.history.",
      "browser.link.open_newwindow",
      "browser.mirroring.",                               // Android Chromecast
      "browser.newtab.",
      "browser.newtabpage.",
      "browser.offline-apps.notify",
      "browser.pagethumbnails.",
      "browser.pagethumbnails.capturing_disabled",        // Hidden
      "browser.pocket.",
      "browser.privatebrowsing.",
      "browser.push.warning.infoURL",
      "browser.readinglist.",
      "browser.safebrowsing.",
      "browser.search.",
      "browser.search.countryCode",                       // Hidden
      "browser.search.isUS",                              // Hidden
      "browser.search.region",                            // Hidden
      "browser.search.useDBForOrder",                     // Hidden
      "browser.selfsupport.",
      "browser.selfsupport.enabled",                      // Hidden
      "browser.selfsupport.url",
      "browser.selfsupport.log",                          // Hidden
      "browser.send_pings",
      "browser.sessionhistory.",
      "browser.sessionstore.",
      "browser.shell.",
      "brwoser.slowStartup.",
      "browser.snippets.enabled",                         // Hidden
      "browser.ssl_override_behavior",
      "browser.startup.",
      "browser.taskbar.",
      "browser.tiles.reportURL",                          // Android
      "browser.trackingprotection.",
      "browser.uitour.",
      "browser.urlbar.",
      "browser.usedOnWindows10",
      "browser.webapps.checkForUpdates",                  // Android
      "browser.xul.error_pages.",
      "browser.zoom.siteSpecific",
      "camera.",
      "camera.control.autofocus_moving_callback.enabled", // ToDo: Recently removed
      "canvas.",
      "capability.policy.",                               // ToDo: What remains?
      "clipboard.autocopy",
      "content.cors.disable",                             // Hidden
      "datareporting.",
      "device.",
      "device.camera.enabled",                            // Android
      "devtools.",                                        // ToDo: Narrow
      "dom.allow_scripts_to_close_windows",
      "dom.archivereader.enabled",
      "dom.battery.enabled",
      "dom.broadcastChannel.enabled",
      "dom.caches.enabled",
      "dom.cellbroadcast.enabled",
      "dom.compartment_per_addon",
      "dom.datastore.enabled",
      "dom.disable_",
      "dom.enable_",
      "dom.event.",
      "dom.experimental",
      "dom.fetch.enabled",                                // ToDo: Recently removed
      "dom.forms.autocomplete.",
      "dom.forms.requestAutocomplete",
      "dom.gamepad.",
      "dom.icc.",
      "dom.identity.enabled",
      "dom.idle-observers-api.enabled",
      "dom.image.",
      "dom.imagecapture.enabled",
      "dom.indexedDB.",
      "dom.inter-app-communication-api.enabled",
      "dom.ipc.plugins.",
      "dom.messageChannel.enabled",                       // In Moz Central
      "dom.mms.",
      "dom.mobileconnection.enabled",
      "dom.mozAlarms.",
      "dom.mozApps.",
      "dom.mozContacts.",
      "dom.mozInputMethod.",
      "dom.mozNetworkStats.",
      "dom.mozPay.enabled",                               // Mobile & WebAppRT
      "dom.mozPermissionSettings.",
      "dom.mozSettings.",
      "dom.mozTCPSocket.enabled",                         // WebAppRT
      "dom.netinfo.enabled",
      "dom.network.enabled",                              // ToDo: Recently became dom.netinfo.enabled
      "dom.performance.enable_user_timing_logging",
      "dom.presentation.",
      "dom.presentation.enabled",
      "dom.presentation.discoverable",                    // In Moz Central
      "dom.presentation.discovery.enabled",               // In Moz Central
      "dom.push.",
      "dom.requestSync.enabled",
      "dom.secureelement.enabled",
      "dom.server-events.enabled",
      "dom.serviceWorkers.enabled",
      "dom.sms.",
      "dom.storage.enabled",
      "dom.sysmsg.enabled",
      "dom.telephony.",
      "dom.tv.enabled",                                   // Firefox OS
      "dom.udpsocket.enabled",
      "dom.undo_manager.enabled",
      "dom.vibrator.",
      "dom.voicemail.",
      "dom.vr.",
      "dom.w3c_pointer_events.enabled",                   // ToDo: Review
      "dom.w3c_touch_events.enabled",                     // ToDo: Review
      "dom.wakelock.enabled",
      "dom.webapps.",
      "dom.webcomponents.enabled",
      "dom.webnotifications.enabled",
      "dom.workers.",
      "experiments.",
      "extensions.",
      "full-screen-api.",
      "gecko.handlerService",
      "general.appname.override",                         // Hidden
      "general.appversion.override",                      // Hidden
      "general.buildID.override",                         // Hidden
      "general.config.filename",                          // Hidden (autoconfig)
      "general.config.obscure_value",                     // Hidden (autoconfig)
      "general.oscpu.override",                           // Hidden
      "general.platform.override",                        // Hidden
      "general.useragent.override",                       // Hidden       
      "geo.",
      "geo.cell.scan",
      "geo.enabled",
      "geo.provider.testing",                             // Hidden
      "geo.provider.use_corelocation",                    // XP_MACOSX
      "geo.provider.use_mls",                             // b2g
      "geo.provider.ms-windows-location",
      "geo.wifi.logging.enabled",                         // Hidden
      "geo.wifi.scan",                                    // Hidden
      "gl.",                                              // ToDo: Narrow, fingerprinting?
      "gfx.",                                             // ToDo: Narrow, fingerprinting?
      "identity.",
      "identity.fxaccounts.enabled",                      // b2g
      "image.",
      "images.dither",                                    // ToDo: Narrow, fingerprinting?
      "intl.accept_languages",
      "intl.tsf.",
      "javascript.",
      "keyword.enabled",
      "layers.",                                          // ToDo: Narrow, fingerprinting?
      "layout.css.visited_links_enabled",
      "lightweightThemes.",
      "loop.",
      "loop.soft_start_hostname",                         // ToDo: Recently removed
      "mathml.disabled",
      "media.",
      "media.eme.clearkey.enabled",                       // Hidden
      "media.gmp-eme-adobe.autoupdate",                   // Hidden
      "media.gmp-gmpopenh264.autoupdate",                 // Hidden
      "media.gmp-gmpopenh264.enabled",                    // Hidden
      "media.gmp-gmpopenh264.provider.enabled",           // ToDo: Recently removed, alt media.gmp-provider.enabled(?)
                                                          // https://mxr.mozilla.org/mozilla-release/source/toolkit/modules/GMPUtils.jsm#91
      "media.gmp-manager.url.override",                   // Hidden
      "media.peerconnection.ice.default_address_only",    // In Moz Central
      "mms.debugging.enabled",
      "network.",                                         // ToDo: Narrow (IDN, ...)
      "network.dns.disablePrefetchFromHTTPS",             // In Moz Central
      "network.security.ports.banned",                    // Hidden
      "network.websocket.enabed",                         // ToDo: Recently removed, dom.workers.websocket.enabled added
      "notification.feature.enabled",
      "offline-apps.allow_by_default",
      "pdfjs.",
      "permissions.default.image",
      "pfs.datasource.url",
      "places.history.enabled",
      "plugin.",
      "plugins.",
      "print.printer_",
      "print.save_print_settings",
      "print_printer",
      "privacy.",
      "privacy.resistFingerprinting",                     // In Moz Central
      "privacy.donottrackheader.value",                   // Hidden
      "reader.parse-on-load.",
      "readinglist.",
      "security.",
      "security.ssl.disable_session_identifiers",         // Hidden
      "services.",
      "signon.",
      "snav.enabled",
      "social.",
      "startup.",
      "stagefright.",
      "svg.",                                             // ToDo: Narrow, fingerprinting?
      "toolkit.",
      "toolkit.identity.uri",                             // B2G Hidden
      "urlclassifier.",
      "wap.",
      "webgl.",                                           // ToDo: Narrow, fingerprinting?
      "xpinstall.",
    ];
    
    Looks like the above, can-be-whittled-down prefixes are matching 1702 of 2555 prefs in FF 40.0.2 (if I have no bugs).
     
    Last edited: Aug 20, 2015
  16. marzametal

    marzametal Registered Member

    Joined:
    Mar 19, 2014
    Posts:
    766
    Any updates to the list?
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.