Hey, I'm not an expert in privacy and browser security but I thought I'd get the ball rolling. If anyone could write some more detailed insights into cookies, scripts, etc that would be appreciated. Once/if more plugins are added we can begin to make sub catergories, eg: "Cookie Management", "Script/Plugin Management".
Check this site: https://panopticlick.eff.org Flash may track you using system fonts, to disable it:
- echo DisableDeviceFontEnumeration = 1 >> /etc/adobe/mms.cfg
The same problem should occur with Java another thing is to change the user agent to a more common one about:config -> general.useragent.override -> windows smth Are these suggestion worth in this page? Flu (talk) 19:22, 7 December 2012 (UTC)
Merging with Bubblewrap#Firefox.
I had considered expanding Bubblewrap#Firefox with this example, but thought to add some weight to this article. The idea was to showcase a (more or less) vanilla wrap under Bubblewrap and a more privacy-enhanced version here. Under Bubblewrap or Firefox/Privacy is fine by me. Will look to add additional wrap commentary once we come to a decision. Adamlau (talk) 09:56, 18 March 2020 (UTC)
- Understanding bubblewrap takes more than just installing the package and using a command example given on this page, so everything should be on the bubblewrap page. Giving two examples which do not reference each other at all is more confusing than useful. -- Lahwaacz (talk) 10:47, 18 March 2020 (UTC)
Rehashing of select prefs.js/user.js?
What we have here under #Configuration is for the most part a set of cherry-picked preferences which I feel only touch upon what is possible. Perhaps a revamp of the page is in order. Arguably the two most important preferences in terms of providing privacy are:
firefox.settings.services.mozilla.com cannot be blocked by any extension or by setting all pref URLs to
"");. The solution is either a DNS sinkhole (hardware or software) or firewalling the resolved IP block.
~ $ dig @22.214.171.124 firefox.settings.services.mozilla.com ;; ANSWER SECTION: firefox.settings.services.mozilla.com. 77 IN CNAME d2k03kvdk5cku0.cloudfront.net. d2k03kvdk5cku0.cloudfront.net. 60 IN A 126.96.36.199 d2k03kvdk5cku0.cloudfront.net. 60 IN A 188.8.131.52 d2k03kvdk5cku0.cloudfront.net. 60 IN A 184.108.40.206 d2k03kvdk5cku0.cloudfront.net. 60 IN A 220.127.116.11
One might consider
# ufw deny out to 18.104.22.168/16 port 443 since the domain resolved to 13.226.219.xxx for me only last week (load balancing moving target). But that essentially negates the use of a significant block of addresses leveraging the same subnet on Amazon AWS (locally for me, YMMV). Coverage should also be given to useful extensions such as Dark Reader which (unfortunately) submits frequent metadata streams to
darkreader.github.io. An alternative is to curate a
userContent.css to provide similar results, thereby negating the need for an extension with heartbeat callbacks. What do you guys think? Adamlau (talk) 10:54, 18 March 2020 (UTC)