Skip to content

Commit 33a84b6

Browse files
v122 (#1764)
1 parent 4a510a4 commit 33a84b6

File tree

1 file changed

+31
-6
lines changed

1 file changed

+31
-6
lines changed

user.js

Lines changed: 31 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
/******
22
* name: arkenfox user.js
3-
* date: 20 November 2023
4-
* version: 119
3+
* date: 5 February 2024
4+
* version: 122
55
* urls: https://github.com/arkenfox/user.js [repo]
66
* : https://arkenfox.github.io/gui/ [interactive]
77
* license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
@@ -56,6 +56,7 @@
5656
2600: MISCELLANEOUS
5757
2700: ETP (ENHANCED TRACKING PROTECTION)
5858
2800: SHUTDOWN & SANITIZING
59+
4000: FPP (fingerprintingProtection)
5960
4500: RFP (resistFingerprinting)
6061
5000: OPTIONAL OPSEC
6162
5500: OPTIONAL HARDENING
@@ -686,8 +687,32 @@ user_pref("privacy.cpd.cookies", false);
686687
* which will display a blank value, and are not guaranteed to work ***/
687688
user_pref("privacy.sanitize.timeSpan", 0);
688689

690+
/*** [SECTION 4000]: FPP (fingerprintingProtection)
691+
RFP (4501) overrides FPP
692+
693+
In FF118+ FPP is on by default in private windows (4001) and in FF119+ is controlled
694+
by ETP (2701). FPP will also use Remote Services in future to relax FPP protections
695+
on a per site basis for compatibility (pref coming).
696+
697+
1826408 - restrict fonts to system (kBaseFonts + kLangPackFonts) (Windows, Mac, some Linux)
698+
https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc
699+
1858181 - subtly randomize canvas per eTLD+1, per session and per window-mode (FF120+)
700+
***/
701+
user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
702+
/* 4001: enable FPP in PB mode [FF114+]
703+
* [NOTE] In FF119+, FPP for all modes (7106) is enabled with ETP Strict (2701) ***/
704+
// user_pref("privacy.fingerprintingProtection.pbmode", true); // [DEFAULT: true FF118+]
705+
/* 4002: set global FPP overrides [FF114+]
706+
* Controls what protections FPP uses globally, including "RFPTargets" (despite the name these are
707+
* not used by RFP) e.g. "+AllTargets,-CSSPrefersColorScheme" or "-AllTargets,+CanvasRandomization"
708+
* [NOTE] Be aware that not all RFP protections are necessarily in RFPTargets
709+
* [WARNING] Not recommended. Either use RFP or FPP at defaults
710+
* [1] https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPTargets.inc ***/
711+
// user_pref("privacy.fingerprintingProtection.overrides", "");
712+
689713
/*** [SECTION 4500]: RFP (resistFingerprinting)
690-
RFP covers a wide range of ongoing fingerprinting solutions.
714+
RFP overrides FPP (4000)
715+
691716
It is an all-or-nothing buy in: you cannot pick and choose what parts you want
692717
[TEST] https://arkenfox.github.io/TZP/tzp.html
693718
@@ -741,8 +766,8 @@ user_pref("privacy.sanitize.timeSpan", 0);
741766
***/
742767
user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
743768
/* 4501: enable RFP
744-
* [SETUP-WEB] RFP can cause some website breakage: mainly canvas, use a canvas site exception via the urlbar
745-
* RFP also has a few side effects: mainly timezone is UTC0, and websites will prefer light theme
769+
* [SETUP-WEB] RFP can cause some website breakage: mainly canvas, use a canvas site exception via the urlbar.
770+
* RFP also has a few side effects: mainly timezone is UTC, and websites will prefer light theme
746771
* [NOTE] pbmode applies if true and the original pref is false
747772
* [1] https://bugzilla.mozilla.org/418986 ***/
748773
user_pref("privacy.resistFingerprinting", true); // [FF41+]
@@ -1069,7 +1094,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
10691094
// user_pref("privacy.fingerprintingProtection", true); // [FF114+] [ETP FF119+]
10701095
// user_pref("network.http.referer.disallowCrossSiteRelaxingDefault", true);
10711096
// user_pref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true); // [FF100+]
1072-
// user_pref("privacy.partition.network_state.ocsp_cache", true);
1097+
// user_pref("privacy.partition.network_state.ocsp_cache", true); // [DEFAULT: true FF123+]
10731098
// user_pref("privacy.query_stripping.enabled", true); // [FF101+]
10741099
// user_pref("privacy.trackingprotection.enabled", true);
10751100
// user_pref("privacy.trackingprotection.socialtracking.enabled", true);

0 commit comments

Comments
 (0)