Difference between revisions of "Firefox/Privacy"

From ArchWiki
Jump to: navigation, search
(NoScript)
(Disable Safe Browsing service: Added safebrowsing.downloads)
 
(77 intermediate revisions by 19 users not shown)
Line 1: Line 1:
[[Category:Web Browser]]
+
[[Category:Web browser]]
{{Article summary start}}
+
[[ja:Firefox プライバシー]]
{{Article summary text|Configuration and installation of recommended add-ons to the Firefox browser to improve privacy}}
+
{{Related articles start}}
{{Article summary heading|Required}}
+
{{Related|Firefox}}
{{Article summary wiki|Firefox}}: Installing and troubleshooting the Firefox browser and plugins
+
{{Related|Tor}}
{{Article summary heading|Related}}
+
{{Related|Browser Plugins}}
{{Article summary wiki|Tor}}: Anonymous proxy network
+
{{Related|Firefox/Tweaks}}
{{Article summary wiki|Browser Plugins}}: Acquiring and installing plugins such as [[Flash]]
+
{{Related|Firefox/Profile on RAM}}
{{Article summary wiki|Firefox Tweaks}}: Configuration and modifications
+
{{Related articles end}}
{{Article summary wiki|Speed-up Firefox using tmpfs}}: Caching the profile in RAM
+
{{Article summary end}}
+
  
This article overviews some useful extensions which enhance security and privacy while using the Firefox web browser.
+
This article overviews some useful extensions which enhance security and privacy while using the [[Firefox]] web browser.
  
==HTTPS Everywhere==
+
== Extensions ==
 +
 
 +
=== HTTPS Everywhere ===
  
 
[https://www.eff.org/https-everywhere HTTPS Everywhere] is an extension which encrypts your communication with a website. It forces a connection over HTTPS instead of HTTP wherever possible.
 
[https://www.eff.org/https-everywhere HTTPS Everywhere] is an extension which encrypts your communication with a website. It forces a connection over HTTPS instead of HTTP wherever possible.
Line 21: Line 21:
 
{{Note|HTTPS Everywhere does not magically enable HTTPS for every site on the internet. The site needs to support HTTPS and HTTPS Everywhere should have a ruleset configured for that site.}}
 
{{Note|HTTPS Everywhere does not magically enable HTTPS for every site on the internet. The site needs to support HTTPS and HTTPS Everywhere should have a ruleset configured for that site.}}
  
==Adblock Plus==
+
=== uBlock Origin ===
  
[https://adblockplus.org/en/ Adblock Plus] can be used to stop intrusive advertisments but it can also be configured to block websites from tracking you.
+
uBlock Origin is a lightweight, efficient blocker which is easy on [https://github.com/gorhill/uBlock#performance memory and CPU]. It comes with several filter lists ready to use out-of-the-box (including EasyList, Peter Lowe's, several malware filter lists).  
  
Once installed visit the [https://easylist.adblockplus.org/en/ Easy List website] and add the EasyList and EasyPrivacy lists to your Adblock Plus filter subscriptions. This is done by simply clicking any of the "Add [filter] to Adblock Plus" on the webpage. This will bring up the add filter prompt. Review the details and click "Add Subscription".
+
The lead developer of uBlock forked the project and created uBlock Origin. As of July 2015, most of the development is being done on uBlock Origin and the codebases are deviating substantially.
  
EasyList is the primary subscription that removes adverts from English webpages, including unwanted frames, images and objects.
+
uBlock Origin: [https://github.com/gorhill/uBlock Github]; [https://addons.mozilla.org/firefox/addon/ublock-origin/ Firefox Add-ons].
  
EasyPrivacy is a supplementary subscription for EasyList which removes all forms of tracking from the internet, including web bugs, tracking scripts and information collectors.
+
=== Adblock Plus ===
  
==Ghostery==
+
[https://adblockplus.org/en/ Adblock Plus] was a popular exstension to block ads. Now that it is not blocking some ads on purpose [https://adblockplus.org/acceptable-ads], it may be a better idea to use a different blocker like uBlock Origin.
  
[https://www.ghostery.com/ Ghostery] is a project to track businesses which employ the use of website trackers. From the website:
+
=== Privacy Badger ===
  
''Ghostery tracks over 1,000 trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.
+
[https://www.eff.org/privacybadger Privacy Badger] is an extension that monitors third-party trackers loaded with web content. It blocks trackers once they appear on different sites. It does not block advertisements in the first place, but since a lot of ads are served based on tracking information these are blocked as well. For more information on the mechanism, see its [https://www.eff.org/privacybadger#faq-How-is-Privacy-Badger-different-to-Disconnect,-Adblock-Plus,-Ghostery,-and-other-blocking-extensions? FAQ].
  
Ghostery can be installed from the [https://www.ghostery.com/download official website]. Once installed Ghostery can be configured from:
+
=== Disconnect ===
  chrome://ghostery/content/options.html
+
  
Or by selecting preferences from the Add-ons Manager in Firefox which will bring you to the configuration page.  
+
Disconnect is a open source project aimed at stopping 2,000 third-party sites from tracking a user. It encrypts data sent to popular sites and claims to loads web pages 27 percent faster. Disconnect shows its users, in real time, how many tracking attempts from Google, Twitter, Facebook, and more are stopped. It categorizes tracking attempts into advertising, analytical, social, and content, which makes it easy to monitor how one is being tracked.
  
Alternatively you can configure Ghostery through the included wizard:
+
Disconnect can also stop side-jacking, which utilizes stolen cookies to steal personal data. It is easy to use and well supported. It can be added to Firefox at the [https://disconnect.me/ official website].
  chrome://ghostery/content/wizard.html
+
  
From the configuration page you can configure what 3rd party elements(3pes) Ghostery should block. When navigating the categories you can click on the individual profiles for more information about that specific company. You can also choose to clear Flash and Silverlight cookies on exit. Also, you can enable the cookie protection feature which prevents selected websites from setting cookies in your browser.
+
{{Note|Firefox gained a feature based on the Disconnect list. See [[Firefox tweaks#Enable firefox optional tracking protection]].}}
  
==NoScript==
+
=== NoScript ===
  
 
[http://noscript.net/ NoScript] is an extension which disables JavaScript, Java, Flash and other plugins on any website not specifically whitelisted by the user. This extension will protect you from exploitation of security vulnerabilities by not letting anything but trusted sites (e.g: your bank, webmail) serve you executable content.
 
[http://noscript.net/ NoScript] is an extension which disables JavaScript, Java, Flash and other plugins on any website not specifically whitelisted by the user. This extension will protect you from exploitation of security vulnerabilities by not letting anything but trusted sites (e.g: your bank, webmail) serve you executable content.
  
 
Once installed you can configure settings for NoScript by either clicking its icon on the toolbar or right clicking a page and navigating to NoScript. You will then have the option to enable/disable scripts for the current page, as well as any third party scripts that the page is linking to. Alternatively you can choose to enable scripts temporarily for that session only.
 
Once installed you can configure settings for NoScript by either clicking its icon on the toolbar or right clicking a page and navigating to NoScript. You will then have the option to enable/disable scripts for the current page, as well as any third party scripts that the page is linking to. Alternatively you can choose to enable scripts temporarily for that session only.
 +
 +
Be aware a lot of modern websites use scripts for layout purposes, hence content may look different. For example, failed rendering due to missing fonts might occur on websites that load fonts at runtime via scripts, which were blocked by NoScript.
  
 
For more detailed configuration see the [http://noscript.net/faq NoScript FAQ].
 
For more detailed configuration see the [http://noscript.net/faq NoScript FAQ].
  
==Cookie Monster==
+
=== uMatrix ===
  
[https://addons.mozilla.org/en-US/firefox/addon/cookie-monster/ Cookie Monster] is a similar extension to NoScript but will the goal of managing cookies.
+
[https://addons.mozilla.org/firefox/addon/umatrix/ uMatrix] is forked and refactored from HTTP Switchboard. It allows you to selectively block Javascript, plugins or other resources and control third-party resources. It also features extensive privacy features like user-agent masquerading, referering blocking and so on. It effectively replaces NoScript and RequestPolicy. See the [https://github.com/gorhill/httpswitchboard/wiki/How-to-use-HTTP-Switchboard:-Two-opposing-views old HTTP Switchboard wiki] for different ways how to use it.
 +
 
 +
For more Information visit the [https://github.com/gorhill/uMatrix project site].
 +
 
 +
=== Cookie Monster ===
 +
 
 +
[https://addons.mozilla.org/firefox/addon/cookie-monster/ Cookie Monster] is a similar extension to NoScript but will the goal of managing cookies.
  
 
From the preferences for Cookie Monster select "Block All Cookies". Once this is done, just as with NoScript, you can enable the use of cookies for specific pages from either the Cookie Monster icon on the toolbar or by right clicking the page and navigating to Cookie Monster. You have the option to accept cookies from the website in question or alternatively to only temporarily allow cookies for the current session.
 
From the preferences for Cookie Monster select "Block All Cookies". Once this is done, just as with NoScript, you can enable the use of cookies for specific pages from either the Cookie Monster icon on the toolbar or by right clicking the page and navigating to Cookie Monster. You have the option to accept cookies from the website in question or alternatively to only temporarily allow cookies for the current session.
  
==RefControl==
+
=== Self-Destructing Cookies ===
 +
 
 +
[https://addons.mozilla.org/firefox/addon/self-destructing-cookies/ Self-Destructing Cookies] gets rid of a site's cookies and LocalStorage as soon as you close its tabs. Protects against trackers and zombie-cookies.
 +
 
 +
=== RefControl ===
  
 
[http://www.stardrifter.org/refcontrol/ RefControl] is an extension to control what gets sent as the HTTP Referer. Once installed RefControl can be configured so that no referer gets sent when navigating to a new webpage. This prevents the server from knowing which website you originated from.
 
[http://www.stardrifter.org/refcontrol/ RefControl] is an extension to control what gets sent as the HTTP Referer. Once installed RefControl can be configured so that no referer gets sent when navigating to a new webpage. This prevents the server from knowing which website you originated from.
Line 67: Line 77:
 
To do this open RefControl's preferences and change the setting for "Default for sites not listed:" to <Block>.
 
To do this open RefControl's preferences and change the setting for "Default for sites not listed:" to <Block>.
  
== RequestPolicy ==
+
{{Note|Firefox has options to control emitted HTTP referers, possibly replacing plugins such as RefControl and Smart Referer. See [[Firefox tweaks#Referer header control]].}}
 +
 
 +
=== RequestPolicy ===
  
 
[https://www.requestpolicy.com/ RequestPolicy] is an extension for Mozilla browsers which lets you have control over cross-site requests. The latest development version lets you blacklist or whitelist requests by default. Disabling unnecessary cross-site requests leads to better privacy, safety and faster browsing.
 
[https://www.requestpolicy.com/ RequestPolicy] is an extension for Mozilla browsers which lets you have control over cross-site requests. The latest development version lets you blacklist or whitelist requests by default. Disabling unnecessary cross-site requests leads to better privacy, safety and faster browsing.
  
 
For more information on cross-site requests and RequestPolicy visit [https://www.requestpolicy.com/faq.html here].
 
For more information on cross-site requests and RequestPolicy visit [https://www.requestpolicy.com/faq.html here].
 +
 +
=== Decentraleyes ===
 +
 +
[https://addons.mozilla.org/firefox/addon/decentraleyes/ Decentraleyes] protects you against tracking through "free", centralized, content delivery. It prevents a lot of requests from reaching networks like Google Hosted Libraries, and serves local files to keep sites from breaking. Complements regular content blockers.
 +
 +
=== CanvasBlocker ===
 +
 +
[https://addons.mozilla.org/firefox/addon/canvasblocker/ CanvasBlocker] Blocks or fakes the JS-API for modifying <canvas> to prevent Canvas-Fingerprinting.</canvas>
 +
 +
=== Random User Agent ===
 +
 +
[https://addons.mozilla.org/firefox/addon/random-agent-spoofer/ Random User Agent] rotates complete browser profiles (from real browsers/devices) at a user defined time interval. It includes many extra privacy enhancing options.
 +
 +
=== Privacy Settings ===
 +
 +
[https://addons.mozilla.org/firefox/addon/privacy-settings/ Privacy Settings] provides a toolbar panel for easily altering Firefox's built-in privacy settings.
 +
 +
== Configuration tweaks ==
 +
 +
The following are privacy-focused configuration tweaks to prevent [https://panopticlick.eff.org/ browser fingerprinting] and tracking.
 +
 +
In addition, see the following links:
 +
 +
* [https://ffprofile.com/ ffprofile.com] - You select which features you want to enable and disable and in the end you get a download link for a zip-file with your profile template. You can for example disable some functions, which send data to Mozilla and Google, or disable several annoying Firefox functions like Mozilla Hello or the Pocket integration.
 +
* [https://github.com/pyllyukko/user.js user.js Firefox hardening stuff] - This is a user.js configuration file for Mozilla Firefox that's supposed to harden Firefox's settings and make it more secure.
 +
 +
=== Enable tracking protection ===
 +
 +
Firefox gained an option for [https://support.mozilla.org/en-US/kb/tracking-protection-firefox tracking protection]. It can be enabled by setting {{ic|about:config}}:
 +
 +
* privacy.trackingprotection.enabled true
 +
 +
Apart from privacy benefits, enabling [http://venturebeat.com/2015/05/24/firefoxs-optional-tracking-protection-reduces-load-time-for-top-news-sites-by-44/ tracking protection] may also reduce load time by 44%.
 +
 +
Note that this is not a replacement for ad blocking extensions such as [[#uBlock Origin]] and it may or may not work with [[List of applications/Internet|Firefox forks]].
 +
 +
=== Change browser time zone ===
 +
 +
The time zone of your system can be used in browser fingerprinting. To set firefox's time zone to UTC launch it as:
 +
 +
$ TZ=UTC firefox
 +
 +
Or, set a script to launch the above (for example, at {{ic|/usr/local/bin/firefox}}).
 +
 +
=== Change user agent and platform ===
 +
 +
To change the user agent in firefox, add the following {{ic|string}} key in {{ic|about:config}}:
 +
 +
general.useragent.override
 +
 +
The value for the key is your browser's user agent. Select a known common one.
 +
 +
{{Tip|The value {{ic|Mozilla/5.0 (Windows NT 6.1; rv:38.0) Gecko/20100101 Firefox/38.0}} is used as the user agent for the Tor browser, thus being very common.}}
 +
 +
{{Warning|Changing the user agent without changing to a corresponding platform will make your browser nearly unique.}}
 +
 +
To change the platform for firefox, add the following {{ic|string}} key in {{ic|about:config}}:
 +
 +
general.platform.override
 +
 +
Select a known common platform that corresponds with your user agent.
 +
 +
{{Tip|The value {{ic|Win32}} is used as the platform for the Tor browser, corresponding with the user agent provided above.}}
 +
 +
=== Disable battery api ===
 +
 +
Firefox is disabling the battery api for web content starting with Firefox 52, the api will still be available for add-ons [https://bugzilla.mozilla.org/show_bug.cgi?id=1313580] [https://www.theguardian.com/technology/2016/nov/01/firefox-disable-battery-status-api-tracking]
 +
 +
Battery status api may be used to fingerprint the user[http://eprint.iacr.org/2015/616.pdf]. To disable it, set {{ic|dom.battery.enabled}} to {{ic|false}} in {{ic|about:config}}.
 +
 +
=== WebRTC exposes LAN IP address ===
 +
 +
To prevent websites from getting your local IP address via [[wikipedia:WebRTC|WebRTC]]'s peer-to-peer (and JavaScript), open {{ic|about:config}} and set:
 +
 +
* {{ic|media.peerconnection.ice.default_address_only}} to '''true'''
 +
* {{ic|media.peerconnection.enabled}} to '''false'''. (only if you want to completely disable WebRTC)
 +
 +
You can use this [http://net.ipcalf.com/ WebRTC test page] and [https://www.privacytools.io/webrtc.html WebRTC IP Leak VPN / Tor IP Test] to confirm that your internal/external IP address is no longer leaked.
 +
 +
=== Disable 1024-bit Diffie-Hellman primes ===
 +
 +
Following [https://freedom-to-tinker.com/blog/haldermanheninger/how-is-nsa-breaking-so-much-crypto/ recent research] it is likely that the NSA has been breaking 1024-bit Diffie-Hellman for some time now. To disable these switch the [https://www.eff.org/deeplinks/2015/10/how-to-protect-yourself-from-nsa-attacks-1024-bit-DH following] settings to '''false''' in {{ic|about:config}}:
 +
 +
security.ssl3.dhe_rsa_aes_128_sha
 +
security.ssl3.dhe_rsa_aes_256_sha
 +
 +
Then consider checking your SSL configuration at https://www.howsmyssl.com/.
 +
 +
=== Disable telemetry ===
 +
 +
Set {{ic|toolkit.telemetry.enabled}} to '''false''' and/or disable it under Preferences, Advanced, Data Choices.
 +
 +
=== Enable Do Not Track Header (DNT) ===
 +
 +
{{Note|The user has no control over whether the request is honoured or not.}}
 +
 +
Set {{ic|privacy.donottrackheader.enabled}} to '''true''' or toggle it in Preferences under Privacy, manage your Do Not Track settings.
 +
 +
=== Disable geolocation ===
 +
 +
Set {{ic|geo.enabled}} to '''false''' in {{ic|about:config}}.
 +
 +
=== Disable Safe Browsing service ===
 +
 +
Safe Browsing offers phishing protection and malware checks, however it may send user information (e.g. URL, file hashes, etc.) to third parties like Google.
 +
 +
To disable the Safe Browsing service, in {{ic|about:config}} set:
 +
 +
* Set {{ic|browser.safebrowsing.malware.enabled}} to '''false'''
 +
* Set {{ic|browser.safebrowsing.phishing.enabled}} to '''false'''
 +
 +
In addition disable download checking, by setting {{ic|browser.safebrowsing.downloads.enabled}} to '''false'''.
 +
 +
=== Disable WebGL ===
 +
 +
WebGL is a potential [http://security.stackexchange.com/questions/13799/is-webgl-a-security-concern security risk]. Set {{ic|webgl.disabled}} to '''true''' in {{ic|about:config}} if you want to disable it.

Latest revision as of 15:36, 6 December 2016

This article overviews some useful extensions which enhance security and privacy while using the Firefox web browser.

Extensions

HTTPS Everywhere

HTTPS Everywhere is an extension which encrypts your communication with a website. It forces a connection over HTTPS instead of HTTP wherever possible.

HTTPS Everywhere will be automatically configured and enabled upon restarting Firefox. For information on how to set up your own rules for different websites please visit the official website.

Note: HTTPS Everywhere does not magically enable HTTPS for every site on the internet. The site needs to support HTTPS and HTTPS Everywhere should have a ruleset configured for that site.

uBlock Origin

uBlock Origin is a lightweight, efficient blocker which is easy on memory and CPU. It comes with several filter lists ready to use out-of-the-box (including EasyList, Peter Lowe's, several malware filter lists).

The lead developer of uBlock forked the project and created uBlock Origin. As of July 2015, most of the development is being done on uBlock Origin and the codebases are deviating substantially.

uBlock Origin: Github; Firefox Add-ons.

Adblock Plus

Adblock Plus was a popular exstension to block ads. Now that it is not blocking some ads on purpose [1], it may be a better idea to use a different blocker like uBlock Origin.

Privacy Badger

Privacy Badger is an extension that monitors third-party trackers loaded with web content. It blocks trackers once they appear on different sites. It does not block advertisements in the first place, but since a lot of ads are served based on tracking information these are blocked as well. For more information on the mechanism, see its FAQ.

Disconnect

Disconnect is a open source project aimed at stopping 2,000 third-party sites from tracking a user. It encrypts data sent to popular sites and claims to loads web pages 27 percent faster. Disconnect shows its users, in real time, how many tracking attempts from Google, Twitter, Facebook, and more are stopped. It categorizes tracking attempts into advertising, analytical, social, and content, which makes it easy to monitor how one is being tracked.

Disconnect can also stop side-jacking, which utilizes stolen cookies to steal personal data. It is easy to use and well supported. It can be added to Firefox at the official website.

Note: Firefox gained a feature based on the Disconnect list. See Firefox tweaks#Enable firefox optional tracking protection.

NoScript

NoScript is an extension which disables JavaScript, Java, Flash and other plugins on any website not specifically whitelisted by the user. This extension will protect you from exploitation of security vulnerabilities by not letting anything but trusted sites (e.g: your bank, webmail) serve you executable content.

Once installed you can configure settings for NoScript by either clicking its icon on the toolbar or right clicking a page and navigating to NoScript. You will then have the option to enable/disable scripts for the current page, as well as any third party scripts that the page is linking to. Alternatively you can choose to enable scripts temporarily for that session only.

Be aware a lot of modern websites use scripts for layout purposes, hence content may look different. For example, failed rendering due to missing fonts might occur on websites that load fonts at runtime via scripts, which were blocked by NoScript.

For more detailed configuration see the NoScript FAQ.

uMatrix

uMatrix is forked and refactored from HTTP Switchboard. It allows you to selectively block Javascript, plugins or other resources and control third-party resources. It also features extensive privacy features like user-agent masquerading, referering blocking and so on. It effectively replaces NoScript and RequestPolicy. See the old HTTP Switchboard wiki for different ways how to use it.

For more Information visit the project site.

Cookie Monster

Cookie Monster is a similar extension to NoScript but will the goal of managing cookies.

From the preferences for Cookie Monster select "Block All Cookies". Once this is done, just as with NoScript, you can enable the use of cookies for specific pages from either the Cookie Monster icon on the toolbar or by right clicking the page and navigating to Cookie Monster. You have the option to accept cookies from the website in question or alternatively to only temporarily allow cookies for the current session.

Self-Destructing Cookies

Self-Destructing Cookies gets rid of a site's cookies and LocalStorage as soon as you close its tabs. Protects against trackers and zombie-cookies.

RefControl

RefControl is an extension to control what gets sent as the HTTP Referer. Once installed RefControl can be configured so that no referer gets sent when navigating to a new webpage. This prevents the server from knowing which website you originated from.

To do this open RefControl's preferences and change the setting for "Default for sites not listed:" to <Block>.

Note: Firefox has options to control emitted HTTP referers, possibly replacing plugins such as RefControl and Smart Referer. See Firefox tweaks#Referer header control.

RequestPolicy

RequestPolicy is an extension for Mozilla browsers which lets you have control over cross-site requests. The latest development version lets you blacklist or whitelist requests by default. Disabling unnecessary cross-site requests leads to better privacy, safety and faster browsing.

For more information on cross-site requests and RequestPolicy visit here.

Decentraleyes

Decentraleyes protects you against tracking through "free", centralized, content delivery. It prevents a lot of requests from reaching networks like Google Hosted Libraries, and serves local files to keep sites from breaking. Complements regular content blockers.

CanvasBlocker

CanvasBlocker Blocks or fakes the JS-API for modifying <canvas> to prevent Canvas-Fingerprinting.</canvas>

Random User Agent

Random User Agent rotates complete browser profiles (from real browsers/devices) at a user defined time interval. It includes many extra privacy enhancing options.

Privacy Settings

Privacy Settings provides a toolbar panel for easily altering Firefox's built-in privacy settings.

Configuration tweaks

The following are privacy-focused configuration tweaks to prevent browser fingerprinting and tracking.

In addition, see the following links:

  • ffprofile.com - You select which features you want to enable and disable and in the end you get a download link for a zip-file with your profile template. You can for example disable some functions, which send data to Mozilla and Google, or disable several annoying Firefox functions like Mozilla Hello or the Pocket integration.
  • user.js Firefox hardening stuff - This is a user.js configuration file for Mozilla Firefox that's supposed to harden Firefox's settings and make it more secure.

Enable tracking protection

Firefox gained an option for tracking protection. It can be enabled by setting about:config:

  • privacy.trackingprotection.enabled true

Apart from privacy benefits, enabling tracking protection may also reduce load time by 44%.

Note that this is not a replacement for ad blocking extensions such as #uBlock Origin and it may or may not work with Firefox forks.

Change browser time zone

The time zone of your system can be used in browser fingerprinting. To set firefox's time zone to UTC launch it as:

$ TZ=UTC firefox

Or, set a script to launch the above (for example, at /usr/local/bin/firefox).

Change user agent and platform

To change the user agent in firefox, add the following string key in about:config:

general.useragent.override

The value for the key is your browser's user agent. Select a known common one.

Tip: The value Mozilla/5.0 (Windows NT 6.1; rv:38.0) Gecko/20100101 Firefox/38.0 is used as the user agent for the Tor browser, thus being very common.
Warning: Changing the user agent without changing to a corresponding platform will make your browser nearly unique.

To change the platform for firefox, add the following string key in about:config:

general.platform.override

Select a known common platform that corresponds with your user agent.

Tip: The value Win32 is used as the platform for the Tor browser, corresponding with the user agent provided above.

Disable battery api

Firefox is disabling the battery api for web content starting with Firefox 52, the api will still be available for add-ons [2] [3]

Battery status api may be used to fingerprint the user[4]. To disable it, set dom.battery.enabled to false in about:config.

WebRTC exposes LAN IP address

To prevent websites from getting your local IP address via WebRTC's peer-to-peer (and JavaScript), open about:config and set:

  • media.peerconnection.ice.default_address_only to true
  • media.peerconnection.enabled to false. (only if you want to completely disable WebRTC)

You can use this WebRTC test page and WebRTC IP Leak VPN / Tor IP Test to confirm that your internal/external IP address is no longer leaked.

Disable 1024-bit Diffie-Hellman primes

Following recent research it is likely that the NSA has been breaking 1024-bit Diffie-Hellman for some time now. To disable these switch the following settings to false in about:config:

security.ssl3.dhe_rsa_aes_128_sha
security.ssl3.dhe_rsa_aes_256_sha

Then consider checking your SSL configuration at https://www.howsmyssl.com/.

Disable telemetry

Set toolkit.telemetry.enabled to false and/or disable it under Preferences, Advanced, Data Choices.

Enable Do Not Track Header (DNT)

Note: The user has no control over whether the request is honoured or not.

Set privacy.donottrackheader.enabled to true or toggle it in Preferences under Privacy, manage your Do Not Track settings.

Disable geolocation

Set geo.enabled to false in about:config.

Disable Safe Browsing service

Safe Browsing offers phishing protection and malware checks, however it may send user information (e.g. URL, file hashes, etc.) to third parties like Google.

To disable the Safe Browsing service, in about:config set:

  • Set browser.safebrowsing.malware.enabled to false
  • Set browser.safebrowsing.phishing.enabled to false

In addition disable download checking, by setting browser.safebrowsing.downloads.enabled to false.

Disable WebGL

WebGL is a potential security risk. Set webgl.disabled to true in about:config if you want to disable it.