|
1 | 1 | /****** |
2 | 2 | * name: arkenfox user.js |
3 | | -* date: 12 March 2023 |
4 | | -* version: 110 |
| 3 | +* date: 30 March 2023 |
| 4 | +* version: 111 |
5 | 5 | * url: https://github.com/arkenfox/user.js |
6 | 6 | * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt |
7 | 7 |
|
@@ -262,7 +262,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost |
262 | 262 | * IPv6 can be abused, especially with MAC addresses, and can leak with VPNs: assuming |
263 | 263 | * your ISP and/or router and/or website is IPv6 capable. Most sites will fall back to IPv4 |
264 | 264 | * [SETUP-WEB] PR_CONNECT_RESET_ERROR: this pref *might* be the cause |
265 | | - * [STATS] Firefox telemetry (Sept 2022) shows ~8% of successful connections are IPv6 |
| 265 | + * [STATS] Firefox telemetry (Feb 2023) shows ~9% of successful connections are IPv6 |
266 | 266 | * [NOTE] This is an application level fallback. Disabling IPv6 is best done at an |
267 | 267 | * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP, |
268 | 268 | * then this won't make much difference. If you are masking your IP, then it can only help. |
@@ -426,7 +426,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!"); |
426 | 426 | * but the problem is that the browser can't know that. Setting this pref to true is the only way for the |
427 | 427 | * browser to ensure there will be no unsafe renegotiations on the channel between the browser and the server |
428 | 428 | * [SETUP-WEB] SSL_ERROR_UNSAFE_NEGOTIATION: is it worth overriding this for that one site? |
429 | | - * [STATS] SSL Labs (Sept 2022) reports over 99.3% of top sites have secure renegotiation [4] |
| 429 | + * [STATS] SSL Labs (Feb 2023) reports over 99.3% of top sites have secure renegotiation [4] |
430 | 430 | * [1] https://wiki.mozilla.org/Security:Renegotiation |
431 | 431 | * [2] https://datatracker.ietf.org/doc/html/rfc5746 |
432 | 432 | * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 |
@@ -875,7 +875,7 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow |
875 | 875 | * caches, searches, cookies, localStorage, IndexedDB etc (which you can achieve in normal mode). |
876 | 876 | * In fact, PB mode limits or removes the ability to control some of these, and you need to quit |
877 | 877 | * Firefox to clear them. PB is best used as a one off window (Menu>New Private Window) to provide |
878 | | - * a temporary self-contained new session. Close all Private Windows to clear the PB mode session. |
| 878 | + * a temporary self-contained new session. Close all private windows to clear the PB session. |
879 | 879 | * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode |
880 | 880 | * [1] https://wiki.mozilla.org/Private_Browsing |
881 | 881 | * [2] https://support.mozilla.org/kb/common-myths-about-private-browsing ***/ |
@@ -951,6 +951,8 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow |
951 | 951 | // user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown"); |
952 | 952 | /* 5019: disable page thumbnail collection ***/ |
953 | 953 | // user_pref("browser.pagethumbnails.capturing_disabled", true); // [HIDDEN PREF] |
| 954 | +/* 5020: disable Windows native notifications and use app notications instead [FF111+] [WINDOWS] ***/ |
| 955 | + // user_pref("alerts.useSystemBackend.windows.notificationserver.enabled", false); |
954 | 956 |
|
955 | 957 | /*** [SECTION 5500]: OPTIONAL HARDENING |
956 | 958 | Not recommended. Overriding these can cause breakage and performance issues, |
|
0 commit comments