diff --git a/archives/dove-osx.zip b/archives/dove-osx.zip
new file mode 100644
index 0000000..081a90a
Binary files /dev/null and b/archives/dove-osx.zip differ
diff --git a/archives/dove.zip b/archives/dove.zip
index e90878e..4ffab6f 100644
Binary files a/archives/dove.zip and b/archives/dove.zip differ
diff --git a/build/prefs/dove.js b/build/prefs/dove.js
index 3c0bd9c..b74463d 100644
--- a/build/prefs/dove.js
+++ b/build/prefs/dove.js
@@ -15,7 +15,7 @@
// Built from Phoenix (Extended)
-pref("mail.dove.version", "2025.02.14.1", locked);
+pref("mail.dove.version", "2025.02.18.1", locked);
pref("mail.dove.status", "000");
diff --git a/dove.cfg b/dove.cfg
index 7992d3d..e0fd30c 100644
--- a/dove.cfg
+++ b/dove.cfg
@@ -16,7 +16,7 @@
// Welcome to the heart of the Phoenix.
// This file contains preferences shared across all Phoenix configs, platforms (Desktop & Android), and Dove.
-lockPref("browser.phoenix.version", "2025.02.14.1");
+lockPref("browser.phoenix.version", "2025.02.18.1");
// 000 ABOUT:CONFIG
@@ -841,6 +841,7 @@ defaultPref("browser.phoenix.core.status", "014");
defaultPref("pdfjs.enableScripting", false);
/// Disable XFA
+// https://learn.microsoft.com/deployedge/microsoft-edge-policies#viewxfapdfiniemodeallowedorigins
// https://insert-script.blogspot.com/2019/01/adobe-reader-pdf-callback-via-xslt.html
// https://www.sentinelone.com/blog/malicious-pdfs-revealing-techniques-behind-attacks/
// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=xfa
@@ -1396,6 +1397,14 @@ defaultPref("dom.origin-trials.coep-credentialless.state", 1); // https://search
defaultPref("browser.tabs.remote.enforceRemoteTypeRestrictions", true); // [DEFAULT - Nightly Desktop]
+/// Disable automatic updates for OpenSearch engines
+// Doesn't appear to impact Mozilla's built-in search engines
+// Also has privacy implications (extra unsolicited connections to third parties...)
+// https://firefox-source-docs.mozilla.org/toolkit/search/Preferences.html#hidden
+// https://developer.mozilla.org/docs/Web/XML/Guides/OpenSearch#supporting_automatic_updates_for_opensearch_plugins
+
+defaultPref("browser.search.update", false); // [DEFAULT - Android]
+
defaultPref("browser.phoenix.core.status", "020");
// 021 BLOCK COOKIE BANNERS
@@ -1406,7 +1415,6 @@ defaultPref("cookiebanners.service.mode", 1);
defaultPref("cookiebanners.service.mode.privateBrowsing", 1); // [DEFAULT - Nightly Android]
defaultPref("cookiebanners.service.enableGlobalRules", true); // [DEFAULT]
defaultPref("cookiebanners.service.enableGlobalRules.subFrames", true); // [DEFAULT]
-defaultPref("cookiebanners.ui.desktop.enabled", true);
defaultPref("browser.phoenix.core.status", "021");
@@ -1667,13 +1675,13 @@ lockPref("security.enterprise_roots.enabled", false);
defaultPref("browser.phoenix.desktop.common.status", "003");
-// 004 GEOLOCATION
+// 004 GEOLOCATION [NO-OSX]
-/// Configure OS Geolocation providers
+/// Configure OS Geolocation providers [NO-OSX]
-defaultPref("geo.provider.ms-windows-location", false); // Disable Microsoft Location Services for Windows users
+defaultPref("geo.provider.ms-windows-location", false); // Disable Microsoft Location Services for Windows users [NO-OSX]
-defaultPref("browser.phoenix.desktop.common.status", "004");
+defaultPref("browser.phoenix.desktop.common.status", "004"); // [NO-OSX]
// 005 DISK AVOIDANCE
@@ -1686,9 +1694,9 @@ defaultPref("privacy.cpd.cache", true); // [DEFAULT]
defaultPref("privacy.sanitize.timeSpan", 0);
-/// Prevent automatically starting Firefox & restoring session after reboot on Windows
+/// Prevent automatically starting Firefox & restoring session after reboot on Windows [NO-OSX]
-defaultPref("toolkit.winRegisterApplicationRestart", false);
+defaultPref("toolkit.winRegisterApplicationRestart", false); // [NO-OSX]
defaultPref("browser.phoenix.desktop.common.status", "005");
@@ -1707,9 +1715,9 @@ defaultPref("browser.phoenix.desktop.common.status", "006");
// 007 MISC. PRIVACY
-/// [WINDOWS] Ensure we never save clipboard history/contents to the cloud...
+/// [WINDOWS] Ensure we never save clipboard history/contents to the cloud... [NO-OSX]
-defaultPref("clipboard.copyPrivateDataToClipboardCloudOrHistory", false); // [DEFAULT]
+defaultPref("clipboard.copyPrivateDataToClipboardCloudOrHistory", false); // [DEFAULT] [NO-OSX]
/// Disable Firefox Sync by default
// When signing in to Firefox Sync, this controls the items (checkboxes) that are set to sync (under about:preferences#sync).
@@ -1745,19 +1753,19 @@ defaultPref("browser.phoenix.desktop.common.status", "008");
// 009 MISC. SECURITY
-/// [WINDOWS] Disable Win32k System Calls
-// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15638
-// https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html
-// https://docs.google.com/document/d/1gJDlk-9xkh6_8M_awrczWCaUuyr0Zd2TKjNBCiPO_G4/edit
+/// [WINDOWS] Disable Win32k System Calls [NO-OSX]
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15638 [NO-OSX]
+// https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html [NO-OSX]
+// https://docs.google.com/document/d/1gJDlk-9xkh6_8M_awrczWCaUuyr0Zd2TKjNBCiPO_G4/edit [NO-OSX]
-defaultPref("security.sandbox.content.win32k-disable", true); // [DEFAULT]
-defaultPref("security.sandbox.gmp.win32k-disable", true);
-defaultPref("security.sandbox.socket.win32k-disable", true); // [DEFAULT]
+defaultPref("security.sandbox.content.win32k-disable", true); // [DEFAULT] [NO-OSX]
+defaultPref("security.sandbox.gmp.win32k-disable", true); // [NO-OSX]
+defaultPref("security.sandbox.socket.win32k-disable", true); // [DEFAULT] [NO-OSX]
-/// Disable GNOME Integration
-// https://searchfox.org/mozilla-central/source/browser/components/shell/nsGNOMEShellService.cpp
+/// Disable GNOME Integration [NO-OSX]
+// https://searchfox.org/mozilla-central/source/browser/components/shell/nsGNOMEShellService.cpp [NO-OSX]
-defaultPref("browser.gnome-search-provider.enabled", false); // [HIDDEN]
+defaultPref("browser.gnome-search-provider.enabled", false); // [HIDDEN] [NO-OSX]
/// If a remote AutoConfig is being used, block it from gaining privileged browser access...
// https://www.mozilla.org/firefox/62.0/releasenotes/
@@ -1768,29 +1776,29 @@ defaultPref("browser.phoenix.desktop.common.status", "009");
// 010 MEDIA
-/// Always sandbox GMP on GNU/Linux
-// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml
+/// Always sandbox GMP on GNU/Linux [NO-OSX]
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml [NO-OSX]
-defaultPref("media.gmp.insecure.allow", false); // [DEFAULT]
+defaultPref("media.gmp.insecure.allow", false); // [DEFAULT] [NO-OSX]
/// Remove DRM toggle in `about:preferences#general`
defaultPref("browser.eme.ui.enabled", false);
-/// Disable Microsoft PlayReady DRM
+/// Disable Microsoft PlayReady DRM [NO-OSX]
-defaultPref("media.eme.playready.enabled", false);
+defaultPref("media.eme.playready.enabled", false); // [NO-OSX]
-/// Explicitly disable Windows Media Foundation Clearkey DRM
+/// Explicitly disable Windows Media Foundation Clearkey DRM [NO-OSX]
-defaultPref("media.eme.wmf.clearkey.enabled", false); // [DEFAULT]
+defaultPref("media.eme.wmf.clearkey.enabled", false); // [DEFAULT] [NO-OSX]
-/// Disable Windows Media Foundation Media Engine
-// By default, it's enabled for protected content (DRM)
-// Enabling it for standard content appears to cause video playback issues (ex. on YouTube)
-// https://learn.microsoft.com/windows/win32/medfound/about-the-media-foundation-sdk
+/// Disable Windows Media Foundation Media Engine [NO-OSX]
+// By default, it's enabled for protected content (DRM) [NO-OSX]
+// Enabling it for standard content appears to cause video playback issues (ex. on YouTube) [NO-OSX]
+// https://learn.microsoft.com/windows/win32/medfound/about-the-media-foundation-sdk [NO-OSX]
-defaultPref("media.wmf.media-engine.enabled", 0);
+defaultPref("media.wmf.media-engine.enabled", 0); // [NO-OSX]
/// Enable click to play UI for certain CSS skins by default...
// https://github.com/black7375/Firefox-UI-Fix/blob/master/css/leptonContent.css#L223
@@ -1834,7 +1842,7 @@ defaultPref("browser.phoenix.desktop.common.status", "013");
// 014 PERFORMANCE
// A lot of these taken from https://github.com/yokoffing/Betterfox/blob/main/Fastfox.js
-defaultPref("media.ffmpeg.vaapi.enabled", true); // Enable VA-API by default
+defaultPref("media.ffmpeg.vaapi.enabled", true); // Enable VA-API by default [NO-OSX]
defaultPref("network.http.max-connections", 1800); // [Default = 900]
/// Disables certain UI animations
@@ -2015,7 +2023,7 @@ lockPref("browser.phoenix.extended.desktop.common.status", "successfully applied
// Built from Phoenix (Extended)
-lockPref("mail.dove.version", "2025.02.14.1");
+lockPref("mail.dove.version", "2025.02.18.1");
defaultPref("mail.dove.status", "000");
@@ -2624,12 +2632,12 @@ lockPref("mailnews.oauth.usePrivateBrowser", false); // Breaks uBlock Origin & a
defaultPref("mail.dove.status", "013");
-// 014 Enable support for custom/specialized configs...
+// 014 Enable support for custom/specialized configs... // [NO-OSX]
-defaultPref("general.config.filename", "dove.cfg");
-defaultPref("general.config.vendor", "dove");
-defaultPref("general.config.obscure_value", 0);
+defaultPref("general.config.filename", "dove.cfg"); // [NO-OSX]
+defaultPref("general.config.vendor", "dove"); // [NO-OSX]
+defaultPref("general.config.obscure_value", 0); // [NO-OSX]
-defaultPref("mail.dove.status", "014");
+defaultPref("mail.dove.status", "014"); // [NO-OSX]
lockPref("mail.dove.status", "successfully applied :D");
diff --git a/macos/dove.cfg b/macos/dove.cfg
new file mode 100644
index 0000000..fee1791
--- /dev/null
+++ b/macos/dove.cfg
@@ -0,0 +1,2607 @@
+//
+// The Phoenix shall rise from the ashes of what fell before it.
+
+//
+// Copyright (C) 2024-2025 celenity
+//
+// This file is part of Phoenix.
+//
+// Phoenix is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
+//
+// Phoenix is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
+//
+// You should have received a copy of the GNU General Public License along with Phoenix. If not, see https://www.gnu.org/licenses/.
+//
+
+// Welcome to the heart of the Phoenix.
+// This file contains preferences shared across all Phoenix configs, platforms (Desktop & Android), and Dove.
+
+lockPref("browser.phoenix.version", "2025.02.18.1");
+
+// 000 ABOUT:CONFIG
+
+/// Ensure that about:config is always enabled...
+
+lockPref("general.aboutConfig.enable", true); // [DEFAULT on Desktop]
+
+// Disable annoying warnings when attempting to access the about:config
+
+defaultPref("general.warnOnAboutConfig", false);
+
+defaultPref("browser.phoenix.core.status", "000");
+
+// 001 DATA COLLECTION
+
+// A lot of defense in depth...
+
+/// Shield Studies/Normandy/Nimbus
+// We also set "DisableFirefoxStudies" in policies on Desktop
+// https://mozilla.github.io/policy-templates/#disablefirefoxstudies
+// https://mozilla.github.io/normandy/
+// https://wiki.mozilla.org/Firefox/Shield/Shield_Studies
+// https://support.mozilla.org/kb/shield
+// https://support.mozilla.org/kb/how-stop-firefox-making-automatic-connections#w_experiments-or-studies
+// https://wiki.mozilla.org/Advocacy/heartbeat
+// https://experimenter.info/
+// resource://nimbus/ExperimentAPI.sys.mjs
+
+lockPref("toolkit.telemetry.pioneer-new-studies-available", false);
+
+/// Origin Trials
+// https://wiki.mozilla.org/Origin_Trials
+
+lockPref("dom.origin-trials.enabled", false);
+
+/// Crash Reporting
+// https://github.com/mozilla-services/socorro
+// https://wiki.mozilla.org/Socorro
+// https://firefox-source-docs.mozilla.org/tools/sanitizer/asan_nightly.html
+// https://github.com/choller/firefox-asan-reporter
+
+lockPref("asanreporter.apiurl", "");
+lockPref("asanreporter.clientid", "");
+defaultPref("asanreporter.loglevel", 70);
+lockPref("breakpad.reportURL", "");
+lockPref("toolkit.crashreporter.include_context_heap", false); // Defense in depth
+
+/// X-Frame Options Error Reporting
+// https://firefox-source-docs.mozilla.org/toolkit/components/telemetry/data/xfocsp-error-report-ping.html
+
+lockPref("security.xfocsp.errorReporting.automatic", false); // [DEFAULT]
+lockPref("security.xfocsp.errorReporting.enabled", false);
+
+/// Coverage
+// https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/
+// https://searchfox.org/mozilla-central/source/toolkit/components/telemetry/pings/CoveragePing.sys.mjs
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1487578
+
+lockPref("toolkit.telemetry.coverage.opt-out", true); // [HIDDEN]
+
+/// Misc. Telemetry
+/// We also configure "DisableTelemetry" & "ImproveSuggest" in policies on Desktop
+// https://mozilla.github.io/policy-templates/#disabletelemetry
+// https://mozilla.github.io/policy-templates/#firefoxsuggest
+// https://searchfox.org/mozilla-central/source/testing/geckodriver/src/prefs.rs
+// https://wiki.mozilla.org/QA/Telemetry
+// https://firefox-source-docs.mozilla.org/toolkit/components/telemetry/internals/preferences.html
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml
+// https://searchfox.org/mozilla-central/source/remote/shared/RecommendedPreferences.sys.mjs
+// https://searchfox.org/mozilla-central/source/testing/profiles/perf/user.js
+
+lockPref("browser.places.interactions.enabled", false); // https://searchfox.org/mozilla-central/source/browser/app/profile/firefox.js
+defaultPref("browser.rights.3.shown", true);
+lockPref("browser.safebrowsing.features.emailtracking.datacollection.update", false); // [HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+lockPref("captchadetection.actor.enabled", false); // [DEFAULT - non-Nightly] Disable CAPTCHA Detection Pings https://searchfox.org/mozilla-central/source/toolkit/components/captchadetection
+defaultPref("captchadetection.loglevel", "Off");
+lockPref("datareporting.dau.cachedUsageProfileID", "beefbeef-beef-beef-beef-beeefbeefbee"); // [HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/telemetry/app/ClientID.sys.mjs#44
+lockPref("datareporting.healthreport.documentServerURI", ""); // [HIDDEN]
+defaultPref("datareporting.healthreport.logging.consoleEnabled", false); // [HIDDEN]
+lockPref("datareporting.healthreport.service.enabled", false); // [HIDDEN]
+lockPref("datareporting.healthreport.service.firstRun", false); // [HIDDEN]
+lockPref("datareporting.healthreport.uploadEnabled", false);
+lockPref("datareporting.policy.dataSubmissionEnabled", false);
+lockPref("datareporting.policy.dataSubmissionPolicyAccepted", false);
+lockPref("datareporting.policy.dataSubmissionPolicyBypassNotification", true);
+lockPref("datareporting.policy.firstRunURL", "");
+lockPref("datareporting.usage.uploadEnabled", false); // Disables sending "daily usage pings" to Mozilla - currently only on Nightly https://support.mozilla.org/kb/usage-ping-settings
+lockPref("dom.security.unexpected_system_load_telemetry_enabled", false);
+lockPref("network.jar.record_failure_reason", false); // https://searchfox.org/mozilla-release/source/modules/libpref/init/StaticPrefList.yaml#14397
+lockPref("network.traffic_analyzer.enabled", false); // https://searchfox.org/mozilla-release/source/modules/libpref/init/StaticPrefList.yaml#13191
+lockPref("network.trr.confirmation_telemetry_enabled", false);
+lockPref("privacy.imageInputTelemetry.enableTestMode", false); // [HIDDEN] "Event Telemetry" https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15549
+lockPref("privacy.trackingprotection.emailtracking.data_collection.enabled", false);
+lockPref("toolkit.content-background-hang-monitor.disabled", true); // BHR https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#16720
+lockPref("toolkit.telemetry.archive.enabled", false);
+lockPref("toolkit.telemetry.bhrPing.enabled", false);
+lockPref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0");
+lockPref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde");
+lockPref("toolkit.telemetry.dap.helper.hpke", "");
+lockPref("toolkit.telemetry.dap.helper.url", "");
+lockPref("toolkit.telemetry.dap.leader.hpke", "");
+lockPref("toolkit.telemetry.dap.leader.url", "");
+defaultPref("toolkit.telemetry.dap.logLevel", "Off");
+lockPref("toolkit.telemetry.dap_enabled", false); // [DEFAULT]
+lockPref("toolkit.telemetry.dap_helper", "");
+lockPref("toolkit.telemetry.dap_helper_owner", "");
+lockPref("toolkit.telemetry.dap_leader", "");
+lockPref("toolkit.telemetry.dap_leader_owner", "");
+lockPref("toolkit.telemetry.dap_task1_enabled", false); // [DEFAULT]
+lockPref("toolkit.telemetry.dap_task1_taskid", ""); // [DEFAULT]
+lockPref("toolkit.telemetry.dap_visit_counting_enabled", false); // [DEFAULT]
+lockPref("toolkit.telemetry.dap_visit_counting_experiment_list", "[]"); // [DEFAULT]
+defaultPref("toolkit.telemetry.debugSlowSql", false); // [DEFAULT]
+lockPref("toolkit.telemetry.enabled", false); // [DEFAULT - non-Nightly]
+lockPref("toolkit.telemetry.firstShutdownPing.enabled", false);
+lockPref("toolkit.telemetry.healthping.enabled", false); // [HIDDEN]
+defaultPref("toolkit.telemetry.log.level", "Error"); // [HIDDEN, DEFAULT] - To expose via about:config...
+lockPref("toolkit.telemetry.newProfilePing.enabled", false);
+lockPref("toolkit.telemetry.pioneerId", ""); // [HIDDEN]
+lockPref("toolkit.telemetry.previousBuildID", "");
+lockPref("toolkit.telemetry.reportingpolicy.firstRun", false);
+lockPref("toolkit.telemetry.server", "data;");
+lockPref("toolkit.telemetry.server_owner", "");
+lockPref("toolkit.telemetry.shutdownPingSender.backgroundtask.enabled", false); // [DEFAULT]
+lockPref("toolkit.telemetry.shutdownPingSender.enabled", false);
+lockPref("toolkit.telemetry.shutdownPingSender.enabledFirstSession", false); // [DEFAULT]
+lockPref("toolkit.telemetry.testing.suppressPingsender", true); // [HIDDEN]
+defaultPref("toolkit.telemetry.translations.logLevel", "Off");
+lockPref("toolkit.telemetry.unified", false);
+lockPref("toolkit.telemetry.updatePing.enabled", false);
+lockPref("toolkit.telemetry.user_characteristics_ping.current_version", 0); // [DEFAULT]
+lockPref("toolkit.telemetry.user_characteristics_ping.last_version_sent", 0); // [DEFAULT]
+defaultPref("toolkit.telemetry.user_characteristics_ping.logLevel", "Off");
+lockPref("toolkit.telemetry.user_characteristics_ping.opt-out", true);
+lockPref("toolkit.telemetry.user_characteristics_ping.send-once", false); // [DEFAULT]
+lockPref("toolkit.telemetry.user_characteristics_ping.uuid", ""); // [DEFAULT]
+
+/// Misc. UX - Harmless but does not apply to us
+
+defaultPref("datareporting.healthreport.infoURL", "");
+defaultPref("extensions.recommendations.privacyPolicyUrl", "");
+defaultPref("toolkit.crashreporter.infoURL", "");
+defaultPref("toolkit.datacollection.infoURL", "");
+
+defaultPref("browser.phoenix.core.status", "001");
+
+// 002 MOZILLA CRAP™
+
+/// Disable "Privacy-Preserving Attribution"
+// https://support.mozilla.org/kb/privacy-preserving-attribution
+
+lockPref("dom.origin-trials.private-attribution.state", 2); // [DEFAULT]
+lockPref("dom.private-attribution.submission.enabled", false); // [DEFAULT]
+
+/// Firefox Recommendations & "Discovery"
+
+defaultPref("extensions.getAddons.browseAddons", ""); // [HIDDEN - non-Android]
+defaultPref("extensions.getAddons.showPane", false);
+defaultPref("extensions.htmlaboutaddons.recommendations.enabled", false);
+defaultPref("extensions.recommendations.themeRecommendationUrl", "");
+defaultPref("extensions.webservice.discoverURL", ""); // [HIDDEN - non-Thunderbird]
+
+/// Fakespot
+
+defaultPref("toolkit.shopping.ohttpConfigURL", "");
+defaultPref("toolkit.shopping.ohttpRelayURL", "");
+
+/// Firefox Relay
+
+defaultPref("signon.firefoxRelay.feature", "disabled"); // [HIDDEN - Thunderbird]
+
+/// Prevent Mozilla domains from having special privileges
+// https://firefox-source-docs.mozilla.org/dom/ipc/process_model.html#privileged-mozilla-content
+
+lockPref("browser.tabs.remote.separatePrivilegedMozillaWebContentProcess", false); // [DEFAULT on Firefox Desktop]
+lockPref("browser.tabs.remote.separatedMozillaDomains", "");
+lockPref("dom.ipc.processCount.privilegedmozilla", 0);
+lockPref("extensions.webapi.testing", false); // [DEFAULT] https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#5445
+defaultPref("extensions.webextensions.restrictedDomains", "");
+lockPref("svg.context-properties.content.allowed-domains", ""); // [DEFAULT - Android/Thunderbird]
+
+/// Disable Mozilla Web Compatibility Reporter
+// Harmless from a privacy perspective - We just don't want to waste Mozilla's time due to our custom set-up...
+// Also acts as attack surface reduction & a potential performance improvement
+
+defaultPref("extensions.webcompat-reporter.enabled", false); // [DEFAULT on non-Nightly/ESR]
+defaultPref("extensions.webcompat-reporter.newIssueEndpoint", "");
+
+/// Remove Mozilla URL tracking params
+
+defaultPref("signon.firefoxRelay.manage_url", "https://relay.firefox.com/accounts/profile/");
+
+defaultPref("browser.phoenix.core.status", "002");
+
+// 003 Search & URL Bar
+
+/// Allow using a different search engine in Private Windows vs. Normal Windows
+
+defaultPref("browser.search.separatePrivateDefault.ui.enabled", true);
+
+// Ensure by default we use same search engine in both Private & Normal Windows
+// Otherwise, Firefox's private search appears to default to Google... :/
+
+defaultPref("browser.search.separatePrivateDefault", false);
+
+/// Always show Punycode - Helps prevent phishing & IDN Homograph Attacks
+// https://wikipedia.org/wiki/IDN_homograph_attack
+
+defaultPref("network.IDN_show_punycode", true);
+
+defaultPref("browser.phoenix.core.status", "003");
+
+// 004 Implicit Connections
+
+/// Disable Network Prefetching
+// https://developer.mozilla.org/docs/Glossary/Prefetch
+
+defaultPref("browser.places.speculativeConnect.enabled", false);
+defaultPref("dom.prefetch_dns_for_anchor_http_document", false); // https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42684
+defaultPref("dom.prefetch_dns_for_anchor_https_document", false); // [DEFAULT] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42684
+defaultPref("network.dns.disablePrefetch", true);
+defaultPref("network.dns.disablePrefetchFromHTTPS", true); // [DEFAULT]
+defaultPref("network.dns.prefetch_via_proxy", false); // [DEFAULT]
+defaultPref("network.http.speculative-parallel-limit", 0); // [DEFAULT - Thunderbird]
+defaultPref("network.predictor.enable-hover-on-ssl", false); // [DEFAULT]
+defaultPref("network.predictor.enable-prefetch", false); // [DEFAULT]
+defaultPref("network.predictor.enabled", false);
+defaultPref("network.prefetch-next", false);
+
+/// Disable Preconnect
+// https://github.com/uBlockOrigin/uBlock-issues/issues/2913
+// https://developer.mozilla.org/docs/Web/HTML/Attributes/rel/preconnect
+
+defaultPref("network.preconnect", false);
+
+/// Disable Early Hints
+// https://developer.mozilla.org/docs/Web/HTTP/Status/103
+// https://github.com/bashi/early-hints-explainer/blob/main/explainer.md
+// Ex. like Cromite https://github.com/uazo/cromite/blob/master/build/patches/Client-hints-overrides.patch
+
+defaultPref("network.early-hints.enabled", false);
+defaultPref("network.early-hints.over-http-v1-1.enabled", false);
+defaultPref("network.early-hints.preconnect.enabled", false);
+defaultPref("network.early-hints.preconnect.max_connections", 0);
+
+/// Disable Search Suggestions
+// These prefs appear to have no impact on Android & Thunderbird, but they still appear in both by default... so we can set anyways
+
+defaultPref("browser.search.suggest.enabled", false); // [DEFAULT - Android]
+defaultPref("browser.search.suggest.enabled.private", false); // [DEFAULT]
+
+/// Disable middle mouse clicks from pasting clipboard contents by default
+// Way too easy to accidentally press...
+
+defaultPref("middlemouse.paste", false);
+
+/// Prevent middle click on new tab button opening URLs or searches from clipboard
+
+defaultPref("browser.tabs.searchclipboardfor.middleclick", false);
+defaultPref("middlemouse.contentLoadURL", false); // [DEFAULT]
+
+defaultPref("browser.phoenix.core.status", "004");
+
+// 005 HTTP(S) - Mixed Content & General Network Hardening
+
+/// Enforce using HTTPS as much as possible
+
+defaultPref("dom.security.https_first", true);
+defaultPref("dom.security.https_first_for_custom_ports", true); // [DEFAULT, DEFENSE IN DEPTH]
+defaultPref("dom.security.https_first_pbm", true); // [DEFAULT]
+defaultPref("dom.security.https_first_schemeless", true);
+lockPref("dom.security.https_only_mode", true);
+defaultPref("dom.security.https_only_mode.upgrade_local", true);
+lockPref("dom.security.https_only_mode_pbm", true);
+defaultPref("security.mixed_content.block_active_content", true);
+defaultPref("security.mixed_content.block_display_content", true);
+defaultPref("security.mixed_content.block_object_subrequest", true);
+defaultPref("security.mixed_content.upgrade_display_content", true);
+defaultPref("security.mixed_content.upgrade_display_content.audio", true); // [DEFAULT]
+defaultPref("security.mixed_content.upgrade_display_content.image", true); // [DEFAULT]
+defaultPref("security.mixed_content.upgrade_display_content.video", true); // [DEFAULT]
+
+/// Prevent sending HTTP requests to websites that do not respond quickly to check if they support HTTPS
+
+defaultPref("dom.security.https_only_mode_send_http_background_request", false);
+
+/// Show suggestions when an HTTPS page can not be found
+// Ex. If 'example.com' isn't secure, it may suggest 'www.example.com'
+
+defaultPref("dom.security.https_only_mode_error_page_user_suggestions", true);
+
+/// Always warn on insecure webpages
+
+defaultPref("security.insecure_connection_text.enabled", true);
+defaultPref("security.insecure_connection_text.pbmode.enabled", true);
+defaultPref("security.ssl.treat_unsafe_negotiation_as_broken", true);
+defaultPref("security.warn_submit_secure_to_insecure", true); // [DEFAULT] Warn when submitting a form from HTTP to HTTPS
+
+/// Show detailed information on insecure warning pages
+
+defaultPref("browser.xul.error_pages.expert_bad_cert", true);
+
+/// Disable TLS 1.3 0-RTT (Not forward secret)
+// https://github.com/tlswg/tls13-spec/issues/1001
+
+defaultPref("network.http.http3.enable_0rtt", false); // For HTTP3 https://bugzilla.mozilla.org/show_bug.cgi?id=1689550
+defaultPref("security.tls.enable_0rtt_data", false);
+
+/// Require safe renegotiations - Disables connections to servers without RFC 5746
+// https://wiki.mozilla.org/Security:Renegotiation
+
+defaultPref("security.ssl.require_safe_negotiation", true);
+
+/// Enforce preloading intermediates
+// https://wiki.mozilla.org/Security/CryptoEngineering/Intermediate_Preloading
+
+defaultPref("security.remote_settings.intermediates.enabled", true); // [DEFAULT]
+
+/// Never downgrade to insecure TLS 1.0/1.1
+
+defaultPref("security.tls.insecure_fallback_hosts", ""); // [DEFAULT]
+lockPref("security.tls.version.enable-deprecated", false); // [DEFAULT]
+
+/// Enforce TLS 1.3 downgrade protection
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1576790
+
+defaultPref("security.tls.hello_downgrade_check", true); // [DEFAULT]
+
+/// Only load secure websockets from HTTPS pages
+
+defaultPref("network.websocket.allowInsecureFromHTTPS", false); // [DEFAULT]
+
+/// Block access to Addon Manager over insecure protocols...
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#5452
+
+defaultPref("extensions.webapi.testing.http", false); // [DEFAULT]
+
+/// Enable Post Quantum Key Agreement (Kyber)
+
+defaultPref("media.webrtc.enable_pq_dtls", true); // [DEFAULT, HIDDEN - Thunderbird]
+defaultPref("network.http.http3.enable_kyber", true);
+defaultPref("security.tls.enable_kyber", true);
+
+/// Disable Captive Portal Detection & Connectivity Checks
+// Privacy & security concerns, and in general best handled by the OS.
+// https://support.mozilla.org/kb/how-stop-firefox-making-automatic-connections#w_network-detection
+// https://www.eff.org/deeplinks/2017/08/how-captive-portals-interfere-wireless-security-and-privacy
+
+defaultPref("captivedetect.canonicalURL", "");
+defaultPref("network.captive-portal-service.enabled", false); // [DEFAULT - Android/Thunderbird]
+defaultPref("network.connectivity-service.DNSv4.domain", "");
+defaultPref("network.connectivity-service.DNSv6.domain", "");
+defaultPref("network.connectivity-service.enabled", false);
+defaultPref("network.connectivity-service.IPv4.url", "");
+defaultPref("network.connectivity-service.IPv6.url", "");
+
+// Prevent Proxy bypasses & undesired information leakage
+
+/// Disable Uniform Naming Convention (UNC) file paths
+// https://bugzilla.mozilla.org/1413868
+
+defaultPref("network.file.disable_unc_paths", true); // [HIDDEN]
+
+/// Disable GIO
+// https://bugzilla.mozilla.org/1433507
+
+defaultPref("network.gio.supported-protocols", ""); // [HIDDEN]
+
+/// Disable bypassing the proxy (if configured) for system connections that include the `bypassProxy` flag
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1732792
+
+defaultPref("network.proxy.allow_bypass", false);
+
+/// Disable automatic failover from the proxy (if configured) to direct connections when certain system requests fail
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1720221
+
+defaultPref("network.proxy.failover_direct", false);
+
+/// Use the proxy (if configured) for remote DNS lookups
+
+defaultPref("network.proxy.socks_remote_dns", true);
+defaultPref("network.proxy.socks5_remote_dns", true); // [DEFAULT]
+
+defaultPref("browser.phoenix.core.status", "005");
+
+// 006 DNS
+
+/// Disable Mozilla's DoH Rollout
+
+lockPref("doh-rollout.disable-heuristics", true); // [HIDDEN]
+lockPref("doh-rollout.enabled", false); // [HIDDEN]
+lockPref("doh-rollout.skipHeuristicsCheck", true); // [HIDDEN]
+lockPref("doh-rollout.uri", ""); // [HIDDEN]
+
+/// Enable DoH & Set to Quad9 by default
+
+defaultPref("network.trr.default_provider_uri", "https://dns.quad9.net/dns-query");
+defaultPref("network.trr.mode", 3);
+
+/// Explicitly disable EDNS Client Subnet (ECS) to prevent leaking general location data to authoritative DNS servers...
+// https://wikipedia.org/wiki/EDNS_Client_Subnet
+
+defaultPref("network.trr.disable-ECS", true); // [DEFAULT]
+
+/// Disable sending headers for DoH requests...
+
+defaultPref("network.trr.send_accept-language_headers", false); // [DEFAULT]
+defaultPref("network.trr.send_empty_accept-encoding_headers", true); // [DEFAULT]
+defaultPref("network.trr.send_user-agent_headers", false); // [DEFAULT]
+
+/// Skip DoH Connectivity Checks
+
+defaultPref("network.connectivity-service.DNS_HTTPS.domain", "");
+defaultPref("network.trr.confirmationNS", "skip");
+
+/// Always warn before falling back from DoH to native DNS...
+
+defaultPref("network.trr.display_fallback_warning", true);
+defaultPref("network.trr_ui.show_fallback_warning_option", true);
+
+/// Never disable DoH from registry checks
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml
+
+defaultPref("network.notify.checkForNRPT", false);
+defaultPref("network.notify.checkForProxies", false);
+
+/// Enable EncryptedClientHello
+// https://blog.cloudflare.com/announcing-encrypted-client-hello
+
+defaultPref("network.dns.echconfig.enabled", true); // [DEFAULT]
+defaultPref("network.dns.http3_echconfig.enabled", true); // [DEFAULT]
+
+/// Enable Native DNS HTTPS Lookups
+
+defaultPref("network.dns.native_https_query", true); // [DEFAULT]
+
+/// Disable falling back to native DNS...
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#13855
+
+defaultPref("network.trr.retry_on_recoverable_errors", true); // [DEFAULT]
+defaultPref("network.trr.strict_native_fallback", true); // https://searchfox.org/mozilla-central/source/toolkit/components/telemetry/docs/data/environment.rst#438
+
+/// Fix IPv6 connectivity when DoH is enabled
+// https://codeberg.org/divested/brace/pulls/5
+
+defaultPref("network.dns.preferIPv6", true);
+
+defaultPref("browser.phoenix.core.status", "006");
+
+// 007 CERTIFICATES
+
+/// Enforce OCSP & Stapling
+
+defaultPref("security.OCSP.enabled", 1); // [DEFAULT - Desktop]
+defaultPref("security.ssl.enable_ocsp_must_staple", true); // [DEFAULT]
+defaultPref("security.ssl.enable_ocsp_stapling", true); // [DEFAULT]
+
+/// Hard-fail OCSP by default
+// Significant security improvement
+// https://github.com/arkenfox/user.js/issues/1576
+
+defaultPref("security.OCSP.require", true);
+
+/// Enable CRLite & use where possible
+// https://blog.mozilla.org/security/2020/01/09/crlite-part-1-all-web-pki-revocations-compressed/
+
+defaultPref("security.pki.crlite_mode", 2); // [DEFAULT on Nightly]
+defaultPref("security.remote_settings.crlite_filters.enabled", true); // [DEFAULT - Nightly Desktop]
+
+/// Enforce Strict Certificate Pinning
+// https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning#How_to_use_pinning
+
+defaultPref("security.cert_pinning.enforcement_level", 2);
+
+/// Disable third-party/OS-level root certificates
+// I've been torn on how to handle this, but IMO the safest way forward is disabling this functionality in Firefox.
+// This is commonly abused by malware/etc. and it's even overriden by certain software/garbage AV's...
+// Ex. https://support.kaspersky.com/common/compatibility/14620#block3
+// Since this is something programs actively try to override, I don't see a safe way to support this, so we'll lock it.
+// We still allow users to manually import certificates into Firefox...
+// So we can ensure users are aware of certificates they add and are making this decision consciously.
+// security.osclientcerts.autoload can be left alone - https://groups.google.com/a/mozilla.org/g/enterprise/c/XiW-ZidMaII
+// We also set "ImportEnterpriseRoots" in policies
+// https://mozilla.github.io/policy-templates/#certificates--importenterpriseroots
+
+defaultPref("security.enterprise_roots.enabled", false); // [DEFAULT - Android]
+
+/// Enable & Enforce Certificate Transparency
+// https://wiki.mozilla.org/SecurityEngineering/Certificate_Transparency
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15868
+
+defaultPref("security.pki.certificate_transparency.mode", 2); // [DEFAULT - Nightly Desktop]
+defaultPref("security.pki.certificate_transparency.disable_for_hosts", ""); // [DEFAULT]
+defaultPref("security.pki.certificate_transparency.disable_for_spki_hashes", ""); // [DEFAULT]
+
+defaultPref("browser.phoenix.core.status", "007");
+
+// 008 DOWNLOADS
+
+/// Always prompt before downloading files
+
+defaultPref("browser.download.always_ask_before_handling_new_types", true);
+defaultPref("browser.download.useDownloadDir", false); // [DEFAULT - Thunderbird]
+
+// Always notify when downloading files
+
+defaultPref("browser.download.alwaysOpenPanel", true); // [DEFAULT - Desktop, HIDDEN - Android/Thunderbird]
+
+// Enforce blocking insecure downloads
+
+defaultPref("dom.block_download_insecure", true); // [DEFAULT]
+
+/// Disable extra download logging by default
+// This lets us expose it in the about:config for Android/Thunderbird
+
+defaultPref("browser.download.loglevel", "Error"); // [DEFAULT, HIDDEN - Android/Thunderbird]
+
+defaultPref("browser.phoenix.core.status", "008");
+
+// 009 SAFE BROWSING
+
+/// Enable Safe Browsing by default
+// This won't do anything if you don't have an API key from Google, though doesn't hurt...
+// Harmless from a privacy perspective due to the below changes, also effective at preventing real-time malicious domains and downloads.
+// We will of course **ALWAYS** give users the ability to disable.
+
+defaultPref("browser.safebrowsing.blockedURIs.enabled", true); // [DEFAULT]
+defaultPref("browser.safebrowsing.downloads.enabled", true); // [DEFAULT - non-Android]
+defaultPref("browser.safebrowsing.downloads.remote.url", "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%"); // [DEFAULT]
+defaultPref("browser.safebrowsing.features.blockedURIs.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("browser.safebrowsing.features.downloads.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("browser.safebrowsing.features.malware.update", true); // [DEFAULT, HIDDEN - non-Android] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("browser.safebrowsing.features.phishing.update", true); // [DEFAULT, HIDDEN - non-Android] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("browser.safebrowsing.malware.enabled", true); // [DEFAULT]
+defaultPref("browser.safebrowsing.phishing.enabled", true); // [DEFAULT]
+defaultPref("browser.safebrowsing.update.enabled", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("urlclassifier.downloadAllowTable", "goog-downloadwhite-proto"); // [DEFAULT - non-Android]
+defaultPref("urlclassifier.downloadBlockTable", "goog-badbinurl-proto"); // [DEFAULT - non-Android]
+
+/// Disable the legacy Safe Browsing API (v2.2...)
+// https://code.google.com/archive/p/google-safe-browsing/wikis/Protocolv2Spec.wiki
+// Has been nonfunctional since October 2018
+// https://security.googleblog.com/2018/01/announcing-turndown-of-deprecated.html
+// Let's make sure it's not used for defense in depth (and attack surface reduction...)
+
+defaultPref("browser.safebrowsing.provider.google.advisoryName", "Google Safe Browsing (Legacy)"); // Label it so it's clearly distinguishable if it is ever enabled for whatever reason...
+defaultPref("browser.safebrowsing.provider.google.gethashURL", "");
+defaultPref("browser.safebrowsing.provider.google.updateURL", "");
+
+/// Proxy Safe Browsing
+// These are using the servers we've set up for IronFox, hosted on our Cloudflare storage bucket (in EU jurisdiction)
+
+defaultPref("browser.safebrowsing.provider.google4.gethashURL", "https://safebrowsing.ironfoxoss.org/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST");
+defaultPref("browser.safebrowsing.provider.google4.updateURL", "https://safebrowsing.ironfoxoss.org/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST");
+
+/// Prevent sending metadata of downloaded files to Google
+// https://support.mozilla.org/kb/how-does-phishing-and-malware-protection-work#w_how-does-phishing-and-malware-protection-work-in-firefox
+// https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
+
+defaultPref("browser.safebrowsing.downloads.remote.enabled", false);
+
+/// Enforce that no data is shared with Google
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1351147
+
+lockPref("browser.safebrowsing.provider.google.dataSharing.enabled", false); // [DEFAULT, HIDDEN - non-Android]
+lockPref("browser.safebrowsing.provider.google4.dataSharing.enabled", false); // [DEFAULT]
+lockPref("browser.safebrowsing.provider.google4.dataSharingURL", "");
+
+/// Show advanced details on pages blocked by Safe Browsing by default
+
+defaultPref("browser.xul.error_pages.show_safe_browsing_details_on_load", true); // [HIDDEN - Android/Thunderbird]
+
+/// By default, when you report a Safe Browsing false positive, it sends the URL to both Mozilla & Google (NOT PROXIED), as well as your locale to Mozilla
+// Ex. https://en-us.phish-error.mozilla.com/?url=example.org - Which redirects you directly to https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=example.org
+// We can improve privacy & speed by sending the domain *only* to Google & without sending your locale to anyone
+// We could also potentially strip tpl=mozilla which tells Google the request is from Firefox - though it looks like there is a different page for Firefox users with a better privacy policy, so we will leave it for now
+// Unclear whether 'MalwareMistake' is used, but we can set it anyways
+
+defaultPref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=");
+defaultPref("browser.safebrowsing.provider.google.reportPhishMistakeURL", "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=");
+defaultPref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=");
+defaultPref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=");
+
+/// Similar behavior also appears to happen when you report a URL to Safe Browsing
+
+defaultPref("browser.safebrowsing.reportPhishURL", "https://safebrowsing.google.com/safebrowsing/report_phish/?tpl=mozilla&url=");
+
+/// Unclear whether these are actually used or not, but looks like Firefox has some kind of functionality to view a "report" from Safe Browsing about the safety, history, & general status of a site
+// By default, it unnecessarily redirects from ex. https://safebrowsing.google.com/safebrowsing/diagnostic?site=example.org to https://transparencyreport.google.com/safe-browsing/search?url=example.org
+// We can skip the redirect to improve speed
+
+defaultPref("browser.safebrowsing.provider.google.reportURL", "https://transparencyreport.google.com/safe-browsing/search?url=");
+defaultPref("browser.safebrowsing.provider.google4.reportURL", "https://transparencyreport.google.com/safe-browsing/search?url=");
+
+defaultPref("browser.phoenix.core.status", "009");
+
+// 010 GEOLOCATION
+
+/// Prevent Wi-Fi Scanning
+
+defaultPref("browser.region.network.scan", false); // [DEFAULT] https://searchfox.org/mozilla-central/source/toolkit/modules/Region.sys.mjs#20
+defaultPref("geo.wifi.scan", false); // [HIDDEN] https://searchfox.org/mozilla-release/source/remote/shared/RecommendedPreferences.sys.mjs#299
+
+/// Disable "Region Updates"
+// https://firefox-source-docs.mozilla.org/toolkit/modules/toolkit_modules/Region.html
+
+defaultPref("browser.region.network.url", "");
+defaultPref("browser.region.update.enabled", false);
+
+/// Disable logging Geolocation requests by default
+// This is already Firefox's default setting - but setting here exposes it in the about:config since it's hidden...
+// https://searchfox.org/mozilla-central/source/dom/system/NetworkGeolocationProvider.sys.mjs#21
+
+defaultPref("geo.provider.network.logging.enabled", false); // [DEFAULT - HIDDEN]
+
+/// Geolocation Provider
+
+/// Set BeaconDB as the network Geolocation provider instead of Google...
+
+defaultPref("geo.provider.network.url", "https://api.beacondb.net/v1/geolocate");
+
+defaultPref("browser.phoenix.core.status", "010");
+
+// 011 AI
+// https://support.mozilla.org/kb/ai-chatbot
+
+/// Ensure that AI functionality is disabled by default
+
+defaultPref("browser.ml.enable", false); // [DEFAULT - non-Nightly] - "Experimental Machine Learning Inference Engine"
+
+/// Disable AI/ML "Autofill Experiment"...
+// https://searchfox.org/mozilla-central/source/toolkit/components/formautofill/MLAutofill.sys.mjs
+
+defaultPref("extensions.formautofill.ml.experiment.enabled", false); // [HIDDEN - Thunderbird]
+
+defaultPref("browser.phoenix.core.status", "011");
+
+// 012 WEBRTC
+
+/// Enable mDNS Host Obfuscation to prevent leaking local IP addresses
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1588817
+
+defaultPref("media.peerconnection.ice.obfuscate_host_addresses", true); // [DEFAULT - Desktop]
+
+/// If a proxy is configured, ensure WebRTC isn't bypassing it
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1790270
+
+defaultPref("media.peerconnection.ice.proxy_only_if_behind_proxy", true);
+
+/// Always allow user to silence notifications when screen sharing
+// https://searchfox.org/mozilla-central/source/browser/app/profile/firefox.js#2452
+
+defaultPref("privacy.webrtc.allowSilencingNotifications", true); // [DEFAULT, HIDDEN - Android/Thunderbird]
+defaultPref("privacy.webrtc.hideGlobalIndicator", false); // [DEFAULT, HIDDEN - Android/Thunderbird]
+
+/// Enable global toggles for muting the camera/microphone in WebRTC
+// https://searchfox.org/mozilla-central/source/browser/app/profile/firefox.js#2452
+
+defaultPref("privacy.webrtc.globalMuteToggles", true); // [HIDDEN - Android]
+
+/// Warn users when attempting to switch tabs in a window being shared over WebRTC
+// https://searchfox.org/mozilla-central/source/browser/app/profile/firefox.js#2459
+
+defaultPref("privacy.webrtc.sharedTabWarning", true); // [HIDDEN - Android/Thunderbird]
+
+/// Always sandbox Media Transport
+// https://searchfox.org/mozilla-central/source/security/sandbox/common/SandboxSettings.cpp
+
+defaultPref("media.peerconnection.mtransport_process", true); // [DEFAULT, HIDDEN - Android/Thunderbird]
+
+defaultPref("browser.phoenix.core.status", "012");
+
+// 013 DISK AVOIDANCE
+
+/// Disable Search & Form History - Can be leaked to sites
+// https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
+
+defaultPref("browser.formfill.enable", false);
+
+/// Disable disk cache
+
+defaultPref("browser.cache.disk.enable", false);
+defaultPref("browser.cache.disk_cache_ssl", false);
+
+/// Do not write media cache (ex. for video streaming) to disk in private windows
+
+defaultPref("browser.privatebrowsing.forceMediaMemoryCache", true);
+
+/// Prevent storing unnecessary extra session data
+
+defaultPref("browser.sessionstore.privacy_level", 2); // [HIDDEN - Thunderbird]
+
+/// Sanitization
+// Clears browsing history, cache, download history, & sessions on exit by default
+
+defaultPref("privacy.clearOnShutdown.cache", true);
+defaultPref("privacy.clearOnShutdown.downloads", true); // [HIDDEN - Android/Thunderbird]
+defaultPref("privacy.clearOnShutdown.history", true); // [HIDDEN - Android/Thunderbird]
+defaultPref("privacy.clearOnShutdown.sessions", true); // [HIDDEN - Android/Thunderbird]
+defaultPref("privacy.clearOnShutdown_v2.cache", true);
+defaultPref("privacy.clearOnShutdown_v2.historyFormDataAndDownloads", true); // [HIDDEN - Android/Thunderbird]
+defaultPref("privacy.sanitize.sanitizeOnShutdown", true);
+
+/// Prevent logging blocked domains in about:protections
+
+defaultPref("browser.contentblocking.database.enabled", false); // [DEFAULT - Android/Thunderbird]
+
+/// Removes cached files from browser windows opened with external applications
+// https://bugzilla.mozilla.org/buglist.cgi?bug_id=302433,1738574
+
+defaultPref("browser.download.start_downloads_in_tmp_dir", true);
+defaultPref("browser.helperApps.deleteTempFileOnExit", true); // [DEFAULT - Thunderbird]
+
+/// When a file is deleted in Firefox, also remove from session list & history
+// https://searchfox.org/mozilla-central/source/browser/app/profile/firefox.js
+
+defaultPref("browser.download.clearHistoryOnDelete", 2); // [HIDDEN - Android/Thunderbird]
+
+/// Prevent coloring visited links
+
+defaultPref("layout.css.visited_links_enabled", false);
+
+/// Allow permission manager to write to disk
+// This is already Firefox's default - but it's hidden, so this exposes it to the about:config
+// https://searchfox.org/mozilla-central/source/extensions/permissions/PermissionManager.cpp#758
+
+defaultPref("permissions.memory_only", false); // [HIDDEN - DEFAULT]
+
+/// Disable adding downloads to "recent documents"
+
+defaultPref("browser.download.manager.addToRecentDocs", false);
+
+defaultPref("browser.phoenix.core.status", "013");
+
+// 014 EXTENSIONS
+
+/// Only allow installing extensions from profile & application directories (Prevents extensions being installed from the system/via other software)
+// https://archive.is/DYjAM
+// https://github.com/arkenfox/user.js/blob/master/user.js#L612
+
+lockPref("extensions.autoDisableScopes", 15); // [DEFAULT - non-Thunderbird] Defense in depth, ensures extensions installed via directories are disabled by default...
+defaultPref("extensions.enabledScopes", 5); // [HIDDEN]
+
+/// Disable automatic installation/enablement of third party extensions in Firefox's installation directory
+// https://support.mozilla.org/kb/deploying-firefox-with-extensions
+
+defaultPref("extensions.installDistroAddons", false); // [HIDDEN - non-Android, DEFAULT - Android]
+
+/// Only allow signed extensions by default
+
+defaultPref("xpinstall.whitelist.required", true); // [DEFAULT]
+
+/// Only allow installation and updates of extensions using Firefox's built-in certificates by default...
+
+defaultPref("extensions.install.requireBuiltInCerts", true); // [HIDDEN]
+defaultPref("extensions.update.requireBuiltInCerts", true); // [HIDDEN]
+
+/// Block extensions signed with weak signature algorithms
+
+defaultPref("xpinstall.signatures.weakSignaturesTemporarilyAllowed", false); // [DEFAULT, HIDDEN]
+
+/// Enforce Extension Blocklist
+
+defaultPref("extensions.blocklist.enabled", true); // [DEFAULT]
+
+/// Never bypass 3rd party extension install prompts
+
+lockPref("extensions.postDownloadThirdPartyPrompt", false); // [HIDDEN - Android/Thunderbird]
+
+/// Prevent unprivileged extensions from accessing experimental APIs by default
+// https://searchfox.org/mozilla-central/source/toolkit/components/extensions/docs/basics.rst#142
+
+defaultPref("extensions.experiments.enabled", false); // [DEFAULT - non-Thunderbird]
+
+/// Enable restricted/quarantined domains by default
+// https://support.mozilla.org/kb/quarantined-domains
+
+defaultPref("extensions.quarantinedDomains.enabled", true); // [DEFAULT]
+
+/// Allow LocalCDN to work on quarantined domains
+
+defaultPref("extensions.quarantineIgnoredByUser.{b86e4813-687a-43e6-ab65-0bde4ab75758}", true);
+
+/// Allow Mullvad's extension to work on quarantined domains
+
+defaultPref("extensions.quarantineIgnoredByUser.{d19a89b9-76c1-4a61-bcd4-49e8de916403}", true);
+
+/// Block our search 'extensions' from accessing quarantined domains...
+
+lockPref("extensions.quarantineIgnoredByUser.ddg@celenity.dev", false); // DuckDuckGo
+lockPref("extensions.quarantineIgnoredByUser.duckduckgo-html@celenity.dev", false); // DuckDuckGo HTML
+lockPref("extensions.quarantineIgnoredByUser.duckduckgo-lite@celenity.dev", false); // DuckDuckGo Lite
+lockPref("extensions.quarantineIgnoredByUser.ecosia@celenity.dev", false); // Ecosia
+lockPref("extensions.quarantineIgnoredByUser.mojeek@celenity.dev", false); // Mojeek
+lockPref("extensions.quarantineIgnoredByUser.no-search@celenity.dev", false); // No Search
+lockPref("extensions.quarantineIgnoredByUser.qwant@celenity.dev", false); // Qwant
+lockPref("extensions.quarantineIgnoredByUser.qwant-junior@celenity.dev", false); // Qwant Junior
+lockPref("extensions.quarantineIgnoredByUser.startpage@celenity.dev", false); // Startpage
+lockPref("extensions.quarantineIgnoredByUser.swisscows@celenity.dev", false); // Startpage
+
+/// We can also include our deprecated search 'extensions' for defense in depth...
+
+lockPref("extensions.quarantineIgnoredByUser.bravesearch@celenity.dev", false); // Brave Search
+lockPref("extensions.quarantineIgnoredByUser.kagi@celenity.dev", false); // Kagi
+lockPref("extensions.quarantineIgnoredByUser.kagi-html@celenity.dev", false); // Kagi HTML
+lockPref("extensions.quarantineIgnoredByUser.leta-brave@celenity.dev", false); // Mullvad Leta (Brave)
+lockPref("extensions.quarantineIgnoredByUser.leta-google@celenity.dev", false); // Mullvad Leta (Google)
+lockPref("extensions.quarantineIgnoredByUser.metager@celenity.dev", false); // MetaGer
+
+/// Block certain Mozilla extensions from accessing quarantined domains...
+
+lockPref("extensions.quarantineIgnoredByUser.ads@mozac.org", false); // Mozilla Android Components - Ads Telemetry...
+lockPref("extensions.quarantineIgnoredByUser.cookies@mozac.org", false); // Mozilla Android Components - Search Telemetry...
+lockPref("extensions.quarantineIgnoredByUser.wikipedia@search.mozilla.org", false); // Wikipedia (en) - search engine...
+
+defaultPref("browser.phoenix.core.status", "014");
+
+// 015 PDF.js
+
+/// Disable JavaScript
+
+defaultPref("pdfjs.enableScripting", false);
+
+/// Disable XFA
+// https://learn.microsoft.com/deployedge/microsoft-edge-policies#viewxfapdfiniemodeallowedorigins
+// https://insert-script.blogspot.com/2019/01/adobe-reader-pdf-callback-via-xslt.html
+// https://www.sentinelone.com/blog/malicious-pdfs-revealing-techniques-behind-attacks/
+// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=xfa
+// https://wikipedia.org/wiki/XFA
+// Not even a standard...
+
+defaultPref("pdfjs.enableXfa", false);
+
+/// Never allow documents to prevent copying text
+
+defaultPref("pdfjs.enablePermissions", false); // [DEFAULT]
+
+/// Open PDFs inline where possible
+
+defaultPref("browser.download.open_pdf_attachments_inline", true); // [DEFAULT - Android]
+
+/// Show sidebar by default when viewing PDFs
+
+defaultPref("pdfjs.sidebarViewOnLoad", 2);
+
+defaultPref("browser.phoenix.core.status", "015");
+
+// 016 MISC. PRIVACY
+
+/// Enable ETP Strict
+// https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop?as=u#w_strict-enhanced-tracking-protection
+
+lockPref("browser.contentblocking.category", "strict"); // [HIDDEN]
+
+/// Manually enable ETP/Strict protections...
+// These are typically configured by ETP Strict - but unfortunately Firefox doesn't set ETP Strict on the browser's first run :/
+// So we need to also manually configure them. We still also use ETP Strict (not 'Custom') due to our enforcement of it, so we should be covered by Mozilla changes/updates for protections.
+// Manually specifying these is also useful for cases like Android: where all protections aren't enabled with ETP Strict, and on Thunderbird: where ETP Strict doesn't exist at all...
+// We're also configuring the 'CookieBehavior' & 'EnableTrackingProtection' policies on desktop.
+
+// Enable TCP/dFPI
+// https://support.mozilla.org/kb/introducing-total-cookie-protection-standard-mode
+// https://searchfox.org/mozilla-central/source/toolkit/components/nimbus/FeatureManifest.yaml#2828
+
+defaultPref("network.cookie.cookieBehavior", 5);
+defaultPref("network.cookie.cookieBehavior.optInPartitioning", true);
+defaultPref("network.cookie.cookieBehavior.optInPartitioning.pbmode", true);
+defaultPref("network.cookie.cookieBehavior.pbmode", 5);
+
+// Enable State Partitioning
+
+defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage", true);
+defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", false);
+defaultPref("privacy.partition.bloburl_per_partition_key", true);
+defaultPref("privacy.partition.network_state", true);
+defaultPref("privacy.partition.network_state.ocsp_cache", true);
+defaultPref("privacy.partition.network_state.ocsp_cache.pbmode", true);
+defaultPref("privacy.partition.serviceWorkers", true);
+
+// Ignore less restricted referer policies (than the default)
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#12979
+
+defaultPref("network.http.referer.disallowCrossSiteRelaxingDefault", true); // for cross-site requests
+defaultPref("network.http.referer.disallowCrossSiteRelaxingDefault.pbmode", true); // for cross-site requests in Private Browsing
+defaultPref("network.http.referer.disallowCrossSiteRelaxingDefault.pbmode.top_navigation", true); // for top navigations in Private Browsing
+defaultPref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true); // for top navigations
+
+/// Block known tracking resources
+
+defaultPref("browser.safebrowsing.features.cryptomining.annotate.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("browser.safebrowsing.features.cryptomining.update", true); // [DEFAULT, HIDDEN - non-Android] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("browser.safebrowsing.features.emailtracking.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("browser.safebrowsing.features.fingerprinting.annotate.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("browser.safebrowsing.features.fingerprinting.update", true); // [DEFAULT, HIDDEN - non-Android] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("browser.safebrowsing.features.socialtracking.annotate.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("browser.safebrowsing.features.socialtracking.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("browser.safebrowsing.features.trackingAnnotation.update", true); // [DEFAULT, HIDDEN - non-Android] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("browser.safebrowsing.features.trackingProtection.update", true); // [DEFAULT, HIDDEN - non-Android] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs
+defaultPref("browser.safebrowsing.provider.mozilla.updateURL", "moz-sbrs:://antitracking"); // [DEFAULT - non-Thunderbird]
+defaultPref("privacy.trackingprotection.annotate_channels", true);
+defaultPref("privacy.trackingprotection.enabled", true);
+defaultPref("privacy.trackingprotection.pbmode.enabled", true);
+
+// Block known tracking resources using the `strict` (Level 2) list
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15192
+// https://searchfox.org/mozilla-central/source/toolkit/components/nimbus/FeatureManifest.yaml#2804
+
+defaultPref("privacy.annotate_channels.strict_list.enabled", true);
+defaultPref("privacy.annotate_channels.strict_list.pbmode.enabled", true);
+
+// Block known third-party tracking cookies
+
+defaultPref("network.cookie.cookieBehavior.trackerCookieBlocking", true);
+defaultPref("privacy.socialtracking.block_cookies.enabled", true);
+
+/// Block known third party cryptomining resources
+
+defaultPref("privacy.trackingprotection.cryptomining.enabled", true);
+
+/// Block known third party email tracking resources
+
+defaultPref("privacy.trackingprotection.emailtracking.enabled", true);
+defaultPref("privacy.trackingprotection.emailtracking.pbmode.enabled", true);
+
+/// Block known third party fingerprinting resources
+
+defaultPref("privacy.trackingprotection.fingerprinting.enabled", true);
+
+/// Block known third party social tracking resources
+
+defaultPref("privacy.trackingprotection.socialtracking.enabled", true);
+
+// Enable Bounce Tracking Protection
+// https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_bounce-tracking-protection
+// https://searchfox.org/mozilla-central/source/toolkit/components/antitracking/bouncetrackingprotection/nsIBounceTrackingProtection.idl#11
+
+defaultPref("privacy.bounceTrackingProtection.enabled", true); // [HIDDEN - non-Thunderbird]
+defaultPref("privacy.bounceTrackingProtection.mode", 1); // [HIDDEN - Thunderbird]
+
+// Enable Suspected Fingerprinters Protection
+// https://support.mozilla.org/kb/firefox-protection-against-fingerprinting#w_suspected-fingerprinters
+
+defaultPref("privacy.fingerprintingProtection", true);
+defaultPref("privacy.fingerprintingProtection.pbmode", true);
+defaultPref("privacy.reduceTimerPrecision", true); // https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15353
+
+// Enable Query Parameter Stripping
+// https://firefox-source-docs.mozilla.org/toolkit/components/antitracking/anti-tracking/query-stripping/index.html
+
+defaultPref("privacy.query_stripping.enabled", true);
+defaultPref("privacy.query_stripping.enabled.pbmode", true);
+defaultPref("privacy.query_stripping.redirect", true);
+
+// Enable SmartBlock & UA overrides/injections
+// Also typically covered by ETP/Strict
+
+defaultPref("extensions.webcompat.enable_shims", true); // [HIDDEN]
+defaultPref("extensions.webcompat.perform_injections", true); // [HIDDEN]
+defaultPref("extensions.webcompat.perform_ua_overrides", true); // [HIDDEN]
+
+/// Enforce Do Not Track & Global Privacy Control
+
+defaultPref("privacy.donottrackheader.enabled", true);
+defaultPref("privacy.globalprivacycontrol.enabled", true);
+defaultPref("privacy.globalprivacycontrol.functionality.enabled", true); // [DEFAULT - non-Thunderbird]
+defaultPref("privacy.globalprivacycontrol.pbmode.enabled", true); // [DEFAULT - non-Thunderbird]
+
+/// Disable Reporting API
+// https://w3c.github.io/reporting/
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1492036
+
+defaultPref("dom.reporting.crash.enabled", false); // [DEFAULT]
+defaultPref("dom.reporting.enabled", false); // [DEFAULT]
+defaultPref("dom.reporting.featurePolicy.enabled", false); // [DEFAULT]
+defaultPref("dom.reporting.header.enabled", false); // [DEFAULT]
+
+/// Disable Beacon API (Navigator.sendBeacon)
+// I was originally against disabling this, but after careful consideration, I've changed my position.
+// The explicit, stated purpose/use case of this API is for analytics/tracking.
+// Websites *can* obtain the data shared from this API through other means; though the other ways to obtain it are more disruptive and less reliable.
+// Analytics/tracking is evidently not a use case that we, as the user agent, should support or assist with.
+// I don't see a justification for adding APIs/features to support this hostile behavior.
+// https://developer.mozilla.org/docs/Web/API/Beacon_API
+// https://developer.mozilla.org/docs/Web/API/Navigator/sendBeacon
+// https://udn.realityripple.com/docs/Web/API/Navigator/sendBeacon
+// https://w3c.github.io/beacon/#privacy-and-security
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1454252
+// Also disabled by ex. Cromite: https://github.com/uazo/cromite/blob/master/docs/FEATURES.md https://github.com/uazo/cromite/issues/1454
+
+defaultPref("beacon.enabled", false);
+
+/// Disable Network Error Logging
+// https://developer.mozilla.org/docs/Web/HTTP/Network_Error_Logging
+// https://w3c.github.io/network-error-logging/
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1145235
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#12829
+
+defaultPref("network.http.network_error_logging.enabled", false); // [DEFAULT, HIDDEN - Thunderbird]
+
+/// Trim cross-origin referers (Like Safari)
+
+defaultPref("network.http.referer.XOriginTrimmingPolicy", 2);
+
+/// Restrict tracking referers
+
+defaultPref("network.http.referer.defaultPolicy.trackers", 1);
+defaultPref("network.http.referer.defaultPolicy.trackers.pbmode", 1);
+
+/// Disable Hyperlink Auditing (Click Tracking)
+// https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/
+
+defaultPref("browser.send_pings", false); // [DEFAULT]
+defaultPref("browser.send_pings.max_per_link", 0); // [DEFENSE IN DEPTH]
+defaultPref("browser.send_pings.require_same_host", true); // [DEFENSE IN DEPTH]
+
+/// Improve built-in query stripping to be on par with LibreWolf & Brave
+// https://codeberg.org/librewolf/settings/src/branch/master/librewolf.cfg#L77
+
+defaultPref("privacy.query_stripping.strip_list", "__hsfp __hssc __hstc __s _hsenc _openstat dclid fbclid gbraid gclid hsCtaTracking igshid mc_eid ml_subscriber ml_subscriber_hash msclkid oft_c oft_ck oft_d oft_id oft_ids oft_k oft_lk oft_sk oly_anon_id oly_enc_id rb_clickid s_cid twclid vero_conv vero_id wbraid wickedid yclid");
+
+/// Strip tracking parameters from URLs when shared by default
+
+defaultPref("privacy.query_stripping.strip_on_share.enabled", true); // [DEFAULT - non-Android/Thunderbird]
+
+/// Enable Smartblock Embeds/Placeholders
+// Makes certain resources click to load
+
+defaultPref("extensions.webcompat.smartblockEmbeds.enabled", true); // [DEFAULT - Nightly, HIDDEN - Android/Thunderbird]
+
+/// Enable Cookies Having Independent Partitioned State (CHIPS)
+// This allows websites to set cookies with a 'Partitioned' attribute, meaning they're limited in scope
+// We still use ETP Strict for partioning anyways, so this could be useful as a defense in depth if a user decides to allow a specific domain (or domains) to access a third party cookie
+// https://developer.mozilla.org/docs/Web/Privacy/Privacy_sandbox/Partitioned_cookies
+// https://developer.mozilla.org/docs/Web/HTTP/Headers/Set-Cookie#partitioned
+// https://github.com/privacycg/CHIPS
+
+defaultPref("network.cookie.CHIPS.enabled", true); // [DEFAULT - Nightly]
+
+defaultPref("browser.phoenix.core.status", "016");
+
+// 017 FINGERPRINTING PROTECTION
+
+/// Round window sizes
+
+defaultPref("privacy.window.maxInnerHeight", 900); // [DEFAULT - non-Thunderbird]
+defaultPref("privacy.window.maxInnerWidth", 1600);
+
+/// Prompt to spoof locale to en-US
+
+defaultPref("privacy.spoof_english", 0); // [DEFAULT]
+
+/// Enable light mode by default
+// This matches with RFP...
+
+defaultPref("layout.css.prefers-color-scheme.content-override", 1);
+
+/// Disable WebGPU
+// https://browserleaks.com/webgpu
+
+defaultPref("dom.webgpu.enabled", false); // [DEFAULT - non-Nightly]
+
+/// Disable failIfMajorPerformanceCaveat in WebGL contexts...
+// https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/18603
+
+defaultPref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT]
+
+/// Prevent using system colors
+
+defaultPref("browser.display.use_system_colors", false); // [DEFAULT - non-Windows]
+
+/// Prevent using system accent colors
+
+defaultPref("widget.non-native-theme.use-theme-accent", false); // [DEFAULT - non-Thunderbird Windows]
+
+/// Enable fdlibm for Math.sin, Math.cos, and Math.tan
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#8720
+// https://groups.google.com/a/mozilla.org/g/dev-platform/c/0dxAO-JsoXI/m/eEhjM9VsAgAJ
+
+defaultPref("javascript.options.use_fdlibm_for_sin_cos_tan", true); // [DEFAULT - non-Android/Windows/Thunderbird]
+
+defaultPref("browser.phoenix.core.status", "017");
+
+// 018 PASSWORDS & AUTHENTICATION
+
+/// Disable Autofill
+
+defaultPref("signon.autofillForms", false);
+defaultPref("signon.autofillForms.http", false); // [DEFAULT]
+
+/// Disable formless capture of log-in credentials
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1166947
+
+defaultPref("signon.formlessCapture.enabled", false);
+defaultPref("signon.privateBrowsingCapture.enabled", false);
+
+/// Always display a `reveal password` button in `password` `` types
+// https://developer.mozilla.org/docs/Web/HTML/Element/input/password
+
+defaultPref("layout.forms.reveal-password-button.enabled", true);
+
+/// Prevent websites from dictating whether to allow filling passwords
+// https://blog.0xbadc0de.be/archives/124
+
+defaultPref("signon.storeWhenAutocompleteOff", false);
+
+/// Disable password truncation
+// https://www.ghacks.net/2020/05/18/firefox-77-wont-truncate-text-exceeding-max-length-to-address-password-pasting-issues/
+
+defaultPref("editor.truncate_user_pastes", false);
+
+/// Disable Password Manager by default - Insecure & unencrypted
+/// You should instead use something like Bitwarden or Proton Pass
+// https://support.mozilla.org/kb/manage-your-logins-firefox-password-manager
+// https://wiki.mozilla.org/Firefox/Features/Form_Autofill
+
+defaultPref("extensions.formautofill.addresses.enabled", false);
+defaultPref("extensions.formautofill.creditCards.enabled", false);
+defaultPref("signon.rememberSignons", false);
+
+/// If password manager is enabled, enable strong password generation by default
+
+defaultPref("signon.generation.enabled", true); // [DEFAULT]
+
+/// Prevent cross-origin sub-resources from opening HTTP authentication dialogs to protect against phishing
+// (Meaning dialogs for embedded items are only presented when originating from the same site)
+// https://support.mozilla.org/questions/1245144
+
+defaultPref("network.auth.non-web-content-triggered-resources-http-auth-allow", false); // [DEFAULT - non-Thunderbird]
+defaultPref("network.auth.subresource-http-auth-allow", 1);
+defaultPref("network.auth.subresource-img-cross-origin-http-auth-allow", false); // [DEFAULT - non-Thunderbird]
+
+/// Disable Windows SSO
+// https://support.mozilla.org/kb/windows-sso
+
+defaultPref("network.http.windows-sso.container-enabled.0", false);
+defaultPref("network.http.windows-sso.enabled", false); // [DEFAULT]
+
+/// Disable Microsoft Entra
+// https://www.microsoft.com/security/business/identity-access/microsoft-entra-single-sign-on
+
+defaultPref("network.http.microsoft-entra-sso.container-enabled.0", false);
+defaultPref("network.http.microsoft-entra-sso.enabled", false); // [DEFAULT]
+defaultPref("network.microsoft-sso-authority-list", ""); // DEFENSE IN DEPTH
+
+/// Prevent using Negotiate authentication by default
+// This is modified by ex. RedHat/Fedora
+// https://people.redhat.com/mikeb/negotiate/
+
+defaultPref("network.negotiate-auth.trusted-uris", ""); // [DEFAULT]
+
+/// Enforce crashing on insecure password input
+
+defaultPref("intl.allow-insecure-text-input", false); // [DEFAULT, HIDDEN - non-Nightly]
+
+defaultPref("browser.phoenix.core.status", "018");
+
+// 019 ATTACK SURFACE REDUCTION
+
+/// Disable JavaScript Just-in-time Compilation (JIT)
+// https://microsoftedge.github.io/edgevr/posts/Super-Duper-Secure-Mode/
+// https://firefox-source-docs.mozilla.org/js/index.html#javascript-jits
+// https://codeberg.org/rusty-snake/firefox-config/src/branch/main/assets/user-overrides.js#L60
+
+defaultPref("javascript.options.baselinejit", false); // Baseline Compiler
+defaultPref("javascript.options.blinterp", false); // Baseline Interpreter
+defaultPref("javascript.options.ion", false); // WarpMonkey
+defaultPref("javascript.options.main_process_disable_jit", true); // [DEFAULT - iOS?] Main process https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#8761
+defaultPref("javascript.options.native_regexp", false); // irregexp https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21865 https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml
+defaultPref("javascript.options.wasm_baselinejit", false); // WASM Baseline Compiler
+
+/// If JIT (Ion/WarpMonkey) is disabled, also disable it for extensions
+// This is the default, but it's hidden - so setting it here lets us expose it...
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1599226
+
+defaultPref("javascript.options.jit_trustedprincipals", false); // [DEFAULT]
+
+/// If WASM (WebAssembly) is disabled, also disable it for extensions
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1576254
+
+defaultPref("javascript.options.wasm_trustedprincipals", false);
+
+/// Disable ASM.JS (More JIT)
+// https://rh0dev.github.io/blog/2017/the-return-of-the-jit/
+
+defaultPref("javascript.options.asmjs", false);
+
+/// Disable MathML
+// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=mathml
+
+defaultPref("mathml.disabled", true);
+
+/// Disable Graphite & SVG OpenType fonts
+// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+graphite
+// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+svg
+
+defaultPref("gfx.font_rendering.graphite.enabled", false);
+defaultPref("gfx.font_rendering.opentype_svg.enabled", false);
+
+/// Disable SharedArrayBuffer using window.postMessage
+// https://developer.mozilla.org/docs/Web/JavaScript/Reference/Global_Objects/SharedArrayBuffer
+// https://developer.mozilla.org/docs/Web/API/Window/postMessage
+// https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
+// https://github.com/tc39/ecma262/issues/1435
+// By default, Firefox restricts the use of SharedArrayBuffer - this fully disables it.
+
+defaultPref("dom.postMessage.sharedArrayBuffer.bypassCOOP_COEP.insecure.enabled", false); // [DEFAULT]
+defaultPref("dom.postMessage.sharedArrayBuffer.withCOOP_COEP", false);
+
+defaultPref("browser.phoenix.core.status", "019");
+
+// 020 MISC. SECURITY
+
+// Prevent websites from automatically downloading as many files as they want to a user's device...
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1731668
+// Can be used for denial of service
+// Allows overriding for specific downloads if needed
+// https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41764
+// Ex. also enabled by Tor Browser
+
+defaultPref("browser.download.enable_spam_prevention", true);
+
+// Do not disable Spectre mitigations for isolated content...
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#8689
+
+defaultPref("javascript.options.spectre.disable_for_isolated_content", false);
+
+// If a website asks for a certificate, always prompt the user
+// Never automatically select one...
+// https://www.stigviewer.com/stig/mozilla_firefox/2023-06-05/finding/V-251547
+
+lockPref("security.default_personal_cert", "Ask Every Time"); // [DEFAULT]
+
+/// Disable Accessibility Services
+// https://web.archive.org/web/20240608190300/support.mozilla.org/en-US/kb/accessibility-services
+// "Firefox Accessibility Service is a technology built into Firefox that provides 3rd party applications running on the same device the ability to inspect, monitor, visualize, and alter web page content hosted within Firefox."
+
+defaultPref("accessibility.force_disabled", 1);
+defaultPref("devtools.accessibility.enabled", false); // [HIDDEN - Android] https://firefox-source-docs.mozilla.org/devtools-user/accessibility_inspector/
+
+/// Enforce that Content Analysis is disabled
+/// We also set "ContentAnalysis" in policies
+// https://mozilla.github.io/policy-templates/#contentanalysis
+// https://github.com/chromium/content_analysis_sdk
+
+lockPref("browser.contentanalysis.default_result", 0); // [DEFAULT]
+lockPref("browser.contentanalysis.enabled", false); // [DEFAULT]
+lockPref("browser.contentanalysis.interception_point.clipboard.enabled", false); // [HIDDEN - Thunderbird]
+lockPref("browser.contentanalysis.interception_point.drag_and_drop.enabled", false); // [HIDDEN - Thunderbird]
+lockPref("browser.contentanalysis.interception_point.file_upload.enabled", false); // [HIDDEN - Thunderbird]
+lockPref("browser.contentanalysis.interception_point.print.enabled", false); // [HIDDEN - Thunderbird]
+lockPref("browser.contentanalysis.show_blocked_result", true); // [DEFAULT] - Always notify users when Content Analysis blocks access to something...
+
+/// Enforce Site Isolation & Isolate all websites
+// https://wiki.mozilla.org/Project_Fission
+
+defaultPref("browser.sessionstore.disable_platform_collection", false); // [DEFAULT - non-Thunderbird] https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#1737
+defaultPref("dom.ipc.processCount.webIsolated", 1); // [DEFAULT - Android]
+defaultPref("fission.autostart", true); // [DEFAULT - non-Android]
+defaultPref("fission.autostart.session", true); // [DEFAULT - non-Android]
+defaultPref("fission.disableSessionHistoryInParent", false); // [DEFAULT - non-Android] SHIP, required for Fission
+defaultPref("gfx.webrender.all", true);
+
+/// Always run extensions OOP (out of process...)
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1613141
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1880856
+// https://groups.google.com/g/tb-planning/c/p4MUTMNYBVo
+
+defaultPref("extensions.webextensions.remote", true); // [DEFAULT]
+
+/// Yes, this is a real pref...
+// https://searchfox.org/mozilla-central/source/testing/profiles/common/user.js
+
+lockPref("security.turn_off_all_security_so_that_viruses_can_take_over_this_computer", false); // [DEFAULT, HIDDEN]
+
+/// Enable GPU Sandboxing
+// https://www.ghacks.net/2023/01/17/firefox-110-will-launch-with-gpu-sandboxing-on-windows/
+
+defaultPref("security.sandbox.gpu.level", 1); // [DEFAULT - Windows]
+
+/// Protect against CSRF Attacks (Like Chromium)
+// https://groups.google.com/a/mozilla.org/g/dev-platform/c/6PZtLH7c6JQ
+// https://hacks.mozilla.org/2020/08/changes-to-samesite-cookie-behavior/
+// https://web.dev/articles/samesite-cookies-explained
+// https://help.salesforce.com/s/articleView?id=000389944&type=1
+// https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions
+// https://web.dev/articles/schemeful-samesite
+
+defaultPref("network.cookie.sameSite.laxByDefault", true);
+defaultPref("network.cookie.sameSite.noneRequiresSecure", true); // [DEFAULT - non-Thunderbird]
+defaultPref("network.cookie.sameSite.schemeful", true); // [DEFAULT - Nightly]
+
+/// Enforce Strict file:// Origin Policy
+// https://stuffandnonsense.co.uk/blog/firefoxs_file_uri_origin_policy_and_web_fonts
+// https://stackoverflow.com/questions/2856502/css-font-face-not-working-with-firefox-but-working-with-chrome-and-ie
+
+defaultPref("security.fileuri.strict_origin_policy", true); // [DEFAULT]
+
+/// Always protect against MIME Exploits
+// https://www.pcmag.com/encyclopedia/term/mime-exploit
+
+defaultPref("security.block_fileuri_script_with_wrong_mime", true);
+defaultPref("security.block_Worker_with_wrong_mime", true); // [DEFAULT]
+
+/// Never load Navigator Media Objects & getUserMedia Support in insecure contexts
+// https://developer.mozilla.org/docs/Web/API/Navigator/mediaDevices
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml
+
+defaultPref("media.devices.insecure.enabled", false); // [DEFAULT]
+defaultPref("media.getusermedia.insecure.enabled", false); // [DEFAULT]
+
+/// Never expose shell access to websites...
+// https://www.stigviewer.com/stig/mozilla_firefox/2019-12-12/finding/V-15771
+
+lockPref("network.protocol-handler.external.shell", false); // [DEFAULT]
+
+/// Always warn users before launching other apps...
+
+defaultPref("network.protocol-handler.warn-external.mailto", true);
+defaultPref("network.protocol-handler.warn-external-default", true); // [DEFAULT]
+defaultPref("security.external_protocol_requires_permission", true); // [DEFAULT - non-Thunderbird] Removed from Firefox, but we'll keep for ESR for the time being...
+
+/// Enforce various other important security-related prefs
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15473
+
+defaultPref("dom.block_external_protocol_in_iframes", true); // [DEFAULT]
+defaultPref("dom.block_external_protocol_navigation_from_sandbox", true); // [DEFAULT]
+defaultPref("security.all_resource_uri_content_accessible", false); // [DEFAULT]
+defaultPref("security.allow_eval_in_parent_process", false); //[DEFAULT - non-Android/Thunderbird]
+defaultPref("security.allow_eval_with_system_principal", false); // [DEFAULT - non-Android]
+defaultPref("security.allow_parent_unrestricted_js_loads", false); // [DEFAULT - non-Android/Thunderbird]
+defaultPref("security.allow_unsafe_parent_loads", false); // [DEFAULT]
+defaultPref("security.data_uri.block_toplevel_data_uri_navigations", true); // [DEFAULT]
+
+/// Always use a separate content process for `file://` URLs
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#1848
+
+defaultPref("browser.tabs.remote.separateFileUriProcess", true); // [DEFAULT - non-Android]
+
+/// Never skip the assertion that about:pages don't have content security policies (CSP)
+// This is default on Standard Firefox releases, but not on ex. Thunderbird & other builds
+// https://searchfox.org/comm-central/source/mozilla/modules/libpref/init/StaticPrefList.yaml#3987
+
+defaultPref("dom.security.skip_about_page_has_csp_assert", false); // [DEFAULT - non-Thunderbird]
+
+/// Apply CSP to internal browser.xhtml
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15628
+
+defaultPref("security.browser_xhtml_csp.enabled", true); // [DEFAULT, HIDDEN - Thunderbird]
+
+/// Enable Trusted Types (Like Chromium)
+// https://w3c.github.io/trusted-types/dist/spec/
+// https://developer.mozilla.org/docs/Web/API/Trusted_Types_API
+// https://www.theregister.com/2023/12/21/mozilla_decides_trusted_types_is/
+
+defaultPref("dom.security.trusted_types.enabled", true);
+
+/// Prevent marking JIT code pages as both writable and executable, only one or the other...
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#8714
+// Might cause issues in certain specific set-ups
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1876632
+
+defaultPref("javascript.options.content_process_write_protect_code", true); // [DEFAULT - OpenBSD?]
+
+/// Enable Opaque Response Blocking
+// https://github.com/annevk/orb
+
+defaultPref("browser.opaqueResponseBlocking", true); // [DEFAULT - non-Android]
+defaultPref("browser.opaqueResponseBlocking.javascriptValidator", true); // [DEFAULT]
+
+/// Enable the 'credentialless' COEP (Cross-Origin-Embedder-Policy) Header
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#1829
+
+defaultPref("browser.tabs.remote.coep.credentialless", true); // [DEFAULT - non-Android stable]
+defaultPref("dom.origin-trials.coep-credentialless.state", 1); // https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#3447
+
+/// Prevent remoteTypes from triggering process switches they shouldn't be able to...
+// https://searchfox.org/mozilla-central/source/browser/app/profile/firefox.js#1035
+
+defaultPref("browser.tabs.remote.enforceRemoteTypeRestrictions", true); // [DEFAULT - Nightly Desktop]
+
+/// Disable automatic updates for OpenSearch engines
+// Doesn't appear to impact Mozilla's built-in search engines
+// Also has privacy implications (extra unsolicited connections to third parties...)
+// https://firefox-source-docs.mozilla.org/toolkit/search/Preferences.html#hidden
+// https://developer.mozilla.org/docs/Web/XML/Guides/OpenSearch#supporting_automatic_updates_for_opensearch_plugins
+
+defaultPref("browser.search.update", false); // [DEFAULT - Android]
+
+defaultPref("browser.phoenix.core.status", "020");
+
+// 021 BLOCK COOKIE BANNERS
+
+defaultPref("cookiebanners.bannerClicking.enabled", true); // [DEFAULT]
+defaultPref("cookiebanners.cookieInjector.enabled", true); // [DEFAULT]
+defaultPref("cookiebanners.service.mode", 1);
+defaultPref("cookiebanners.service.mode.privateBrowsing", 1); // [DEFAULT - Nightly Android]
+defaultPref("cookiebanners.service.enableGlobalRules", true); // [DEFAULT]
+defaultPref("cookiebanners.service.enableGlobalRules.subFrames", true); // [DEFAULT]
+
+defaultPref("browser.phoenix.core.status", "021");
+
+// 022 MEDIA
+
+/// Enforce validating signature for GMP when updating
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/all.js
+
+defaultPref("media.gmp-manager.cert.checkAttributes", true); // [DEFAULT]
+defaultPref("media.gmp-manager.cert.requireBuiltIn", true); // [DEFAULT]
+defaultPref("media.gmp-manager.checkContentSignature", true); // [DEFAULT]
+
+/// Blocks media autoplay by default
+// https://support.mozilla.org/kb/block-autoplay
+
+defaultPref("media.autoplay.default", 5);
+
+/// DRM
+// Garbage technology with freedom, privacy, & security concerns
+// https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next
+
+defaultPref("media.clearkey.persistent-license.enabled", false); // [DEFAULT]
+defaultPref("media.clearkey.test-key-systems.enabled", false); // [DEFAULT]
+defaultPref("media.eme.enabled", false);
+defaultPref("media.eme.encrypted-media-encryption-scheme.enabled", false);
+defaultPref("media.eme.hdcp-policy-check.enabled", false);
+defaultPref("media.eme.require-app-approval", true); // [DEFAULT (Android) - DEFENSE IN DEPTH]: Enforce locking DRM behind permission https://searchfox.org/mozilla-central/source/mobile/android/app/geckoview-prefs.js#304
+defaultPref("media.eme.widevine.experiment.enabled", false); // [DEFAULT - HIDDEN] Widevine L1 https://searchfox.org/mozilla-central/source/dom/media/eme/MediaKeySystemAccess.cpp#141
+defaultPref("media.gmp-widevinecdm.enabled", false);
+defaultPref("media.gmp-widevinecdm.visible", false);
+defaultPref("media.gmp-widevinecdm-l1.enabled", false); // [DEFAULT (Except for Nightly) - HIDDEN]
+defaultPref("media.gmp-widevinecdm-l1.visible", false); // [DEFAULT (Except for Nightly) - HIDDEN]
+
+defaultPref("browser.phoenix.core.status", "022");
+
+// 023 UPDATES
+
+/// Check for extension/theme updates hourly
+// Default is once every 24 hours...
+
+defaultPref("extensions.update.interval", 3600);
+
+/// Ensure we're always updating extensions by default
+
+defaultPref("extensions.systemAddon.update.enabled", true); // [DEFAULT]
+defaultPref("extensions.update.autoUpdateDefault", true); // [DEFAULT, HIDDEN - ANDROID]
+defaultPref("extensions.update.enabled", true); // [DEFAULT]
+defaultPref("media.gmp-manager.updateEnabled", true); // [DEFAULT, HIDDEN]
+
+/// Ensure we always notify users for extension updates by default
+// https://searchfox.org/mozilla-central/source/remote/shared/RecommendedPreferences.sys.mjs#253
+
+defaultPref("extensions.update.notifyUser", true); // [HIDDEN]
+
+defaultPref("browser.phoenix.core.status", "023");
+
+// 024 DEBUGGING
+
+// Allow Remote debugging, as it can be useful (especially on Android) - but ONLY per-session
+// https://firefox-source-docs.mozilla.org/devtools/backend/protocol.html
+
+pref("devtools.debugger.remote-enabled", false); // [DEFAULT - non-Thunderbird]
+
+/// Enforce local debugging only
+
+lockPref("devtools.debugger.force-local", true); // [DEFAULT]
+
+// Always prompt before connecting...
+
+lockPref("devtools.debugger.prompt-connection", true); // [DEFAULT - non-Nightly]
+
+/// Ensure that URLs are not being logged in Reader errors
+
+defaultPref("reader.errors.includeURLs", false); // [DEFAULT - Android/Thunderbird]
+
+defaultPref("browser.phoenix.core.status", "024");
+
+/// 025 MISC.
+
+/// Disable WebVTT Testing Events
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml
+
+defaultPref("media.webvtt.testing.events", false); // [DEFAULT]
+
+/// Always allow installing "incompatible" add-ons
+// Especially useful on Android & Thunderbird...
+
+defaultPref("extensions.strictCompatibility", false); // [DEFAULT - non-Thunderbird]
+
+/// Isolate permissions per container (if containers are enabled...)
+// https://support.mozilla.org/kb/how-use-firefox-containers
+
+defaultPref("permissions.isolateBy.userContext", true);
+
+/// Force pop-up windows to open in new tabs instead
+
+defaultPref("browser.link.open_newwindow", 3); // [DEFAULT]
+defaultPref("browser.link.open_newwindow.restriction", 0); // [DEFAULT - Android/Thunderbird]
+
+/// Always block pop-ups by default
+
+defaultPref("dom.disable_open_during_load", true); // [DEFAULT - non-Thunderbird]
+
+/// Limit what events can cause pop-ups
+
+defaultPref("dom.popup_allowed_events", "click dblclick");
+
+/// Prevent scripts from moving, resizing, and messing with windows
+
+defaultPref("dom.disable_window_flip", true); // [DEFAULT - non-Android]
+defaultPref("dom.disable_window_move_resize", true); // [DEFAULT - Android]
+
+/// Disable annoying Web Speech API errors
+// https://searchfox.org/mozilla-central/source/browser/actors/SpeechDispatcherParent.sys.mjs#8
+
+defaultPref("media.webspeech.synth.dont_notify_on_error", true); // [HIDDEN]
+
+defaultPref("browser.phoenix.core.status", "025");
+
+// 026 PERFORMANCE
+// A lot of these taken from https://github.com/yokoffing/Betterfox/blob/main/Fastfox.js
+
+defaultPref("browser.cache.jsbc_compression_level", 3); // [Default = 0]
+defaultPref("browser.sessionstore.interval", 60000);
+defaultPref("browser.sessionhistory.max_total_viewers", 7); // [Default = -1 (Automatic)]
+defaultPref("content.notify.interval", 100000); // [Default = 120000] https://searchfox.org/mozilla-central/rev/c1180ea13e73eb985a49b15c0d90e977a1aa919c/modules/libpref/init/StaticPrefList.yaml#1824-1834
+defaultPref("extensions.logging.enabled", false); // [DEFAULT] https://searchfox.org/mozilla-central/source/mobile/android/app/geckoview-prefs.js#232
+defaultPref("gfx.canvas.accelerated", true); // [DEFAULT]
+defaultPref("gfx.canvas.accelerated.cache-items", 8192); // [DEFAULT - non-Thunderbird]
+defaultPref("gfx.canvas.accelerated.cache-size", 512); // [Default = 256]
+defaultPref("gfx.content.skia-font-cache-size", 20); // [Default = 5]
+defaultPref("gfx.webrender.compositor", true); // [DEFAULT - macOS/Windows]
+defaultPref("image.mem.decode_bytes_at_a_time", 32768); // [Default = 16384]
+defaultPref("image.mem.shared.unmap.min_expiration_ms", 120000); // [Default = 60000]
+defaultPref("layout.css.report_errors", false); // [DEFAULT - Android] https://searchfox.org/mozilla-central/source/mobile/android/app/geckoview-prefs.js#299
+defaultPref("media.cache_readahead_limit", 7200);
+defaultPref("media.cache_resume_threshold", 3600);
+defaultPref("media.memory_cache_max_size", 65536); // [Default = 8192]
+defaultPref("network.dnsCacheEntries", 1000); // [Default = 800 - Nightly Desktop, 400 - Non-Nightly Desktop]
+defaultPref("network.dnsCacheExpiration", 3600); // [Default = 60]
+defaultPref("network.dnsCacheExpirationGracePeriod", 240); // [Default = 60]
+defaultPref("network.http.max-persistent-connections-per-proxy", 48); // [Default = 20 - Android, 32 - non-Android]
+defaultPref("network.http.max-persistent-connections-per-server", 10); // [Default = 6]
+defaultPref("network.http.max-urgent-start-excessive-connections-per-host", 5); // [Default = 3]
+
+defaultPref("browser.phoenix.core.status", "026");
+
+// 027 SCROLLING
+
+defaultPref("apz.autoscroll.enabled", true); // [DEFAULT]
+defaultPref("apz.overscroll.enabled", true); // [DEFAULT - non-Thunderbird]
+defaultPref("general.autoScroll", true); // [DEFAULT - non-Unix (excluding macOS)/Thunderbird, HIDDEN - Android]
+defaultPref("general.smoothScroll", true); // [DEFAULT - non-Thunderbird]
+
+defaultPref("browser.phoenix.core.status", "027");
+
+// 028 Personal Touch 💜
+
+/// Things that are nice to have™
+// Not directly privacy & security related
+
+defaultPref("browser.translations.alwaysTranslateLanguages", "bg,ca,cs,da,de,el,en,es,et,fi,fr,hr,hu,id,it,ja,ko,lv,lt,nl,pl,pt,ro,ru,sk,sl,sr,sv,tr,uk,vi,zh-Hans");
+defaultPref("browser.translations.automaticallyPopup", true); // [DEFAULT]
+defaultPref("browser.translations.enable", true); // [DEFAULT - non-Thunderbird]
+defaultPref("browser.translations.select.enable", true); // [DEFAULT - non-Android/Thunderbird]
+defaultPref("devtools.chrome.enabled", true); // [DEFAULT - Thunderbird]
+defaultPref("findbar.highlightAll", true); // Highlights all Findbar (Ctrl + F) results by default
+defaultPref("full-screen-api.transition-duration.enter", "0 0"); // [Default = 200 200]
+defaultPref("full-screen-api.transition-duration.leave", "0 0"); // [Default = 200 200]
+defaultPref("full-screen-api.warning.delay", -1); // [Default = 500, -1 = Automatic]
+defaultPref("full-screen-api.warning.timeout", 0); // [Default = 3000]
+defaultPref("security.xfocsp.hideOpenInNewWindow", false);
+defaultPref("ui.key.menuAccessKeyFocuses", false); // [DEFAULT - non-Windows/Linux] Prevent alt key from toggling menu bar by default
+defaultPref("view_source.syntax_highlight", true); // [DEFAULT - non-Thunderbird]
+defaultPref("view_source.wrap_long_lines", true); // [DEFAULT - Android]
+
+defaultPref("browser.phoenix.core.status", "028");
+
+// 029 Specialized/Custom configs
+
+/// Configure the behavior of remote autoconfig files (if active)
+
+defaultPref("autoadmin.failover_to_cached", true);
+defaultPref("autoadmin.offline_failover", true);
+defaultPref("autoadmin.refresh_interval", 60);
+
+defaultPref("browser.phoenix.core.status", "029");
+
+lockPref("browser.phoenix.core.status", "successfully applied :D");
+
+
+//
+
+//
+// Copyright (C) 2024-2025 celenity
+//
+// This file is part of Phoenix.
+//
+// Phoenix is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
+//
+// Phoenix is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
+//
+// You should have received a copy of the GNU General Public License along with Phoenix. If not, see https://www.gnu.org/licenses/.
+//
+
+// This file contains preferences shared across Phoenix & Dove on Desktop.
+
+// 001 DATA COLLECTION
+
+/// Crash Reporting
+// https://github.com/mozilla-services/socorro
+// https://wiki.mozilla.org/Socorro
+
+lockPref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [DEFAULT, HIDDEN - Thunderbird]
+lockPref("browser.crashReports.unsubmittedCheck.enabled", false); // [DEFAULT - non-Nightly, HIDDEN - Thunderbird]
+
+/// Misc. Telemetry
+
+lockPref("browser.urlbar.quicksuggest.dataCollection.enabled", false); // [DEFAULT]
+lockPref("browser.urlbar.quicksuggest.onboardingDialogChoice", "reject_2"); // [HIDDEN] https://searchfox.org/mozilla-central/source/browser/components/urlbar/docs/firefox-suggest-telemetry.rst https://searchfox.org/mozilla-central/source/toolkit/components/telemetry/docs/data/environment.rst https://searchfox.org/mozilla-central/source/browser/components/urlbar/tests/quicksuggest/browser/browser_quicksuggest_onboardingDialog.js
+
+defaultPref("browser.phoenix.desktop.common.status", "001");
+
+// 002 MOZILLA CRAP™
+
+/// Firefox Recommendations & "Discovery"
+
+defaultPref("extensions.getAddons.discovery.api_url", "data;"); // https://searchfox.org/mozilla-central/source/testing/profiles/common/user.js
+defaultPref("extensions.ui.lastCategory", "addons://list/extension"); // [HIDDEN] Ensure default view of `about:addons` is local/installed extensions...
+
+/// Prevent Mozilla domains from having special privileges
+
+lockPref("permissions.manager.defaultsUrl", "");
+defaultPref("services.sync.addons.trustedSourceHostnames", "");
+
+defaultPref("browser.phoenix.desktop.common.status", "002");
+
+// 003 CERTIFICATES
+
+/// Enforce Strict Certificate Pinning
+// https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning#How_to_use_pinning
+
+lockPref("security.cert_pinning.enforcement_level", 2);
+
+/// Disable third-party/OS-level root certificates
+// I've been torn on how to handle this, but IMO the safest way forward is disabling this functionality in Firefox.
+// This is commonly abused by malware/etc. and it's even overriden by certain software/garbage AV's...
+// Ex. https://support.kaspersky.com/common/compatibility/14620#block3
+// Since this is something programs actively try to override, I don't see a safe way to support this, so we'll lock it.
+// We still allow users to manually import certificates into Firefox...
+// So we can ensure users are aware of certificates they add and are making this decision consciously.
+// security.osclientcerts.autoload can be left alone - https://groups.google.com/a/mozilla.org/g/enterprise/c/XiW-ZidMaII
+// We also set "ImportEnterpriseRoots" in policies
+// https://mozilla.github.io/policy-templates/#certificates--importenterpriseroots
+
+lockPref("security.certerrors.mitm.auto_enable_enterprise_roots", false);
+lockPref("security.enterprise_roots.enabled", false);
+
+defaultPref("browser.phoenix.desktop.common.status", "003");
+
+
+
+
+
+// 005 DISK AVOIDANCE
+
+/// Sanitization
+// Clears cache on sanitization dialog by default
+
+defaultPref("privacy.cpd.cache", true); // [DEFAULT]
+
+/// Set time range when manually clearing data to "everything" by default
+
+defaultPref("privacy.sanitize.timeSpan", 0);
+
+
+
+defaultPref("browser.phoenix.desktop.common.status", "005");
+
+// 006 EXTENSIONS
+
+// Only allow signed language packs & whitelisted extensions...
+
+lockPref("extensions.langpacks.signatures.required", true); // [DEFAULT]
+lockPref("xpinstall.whitelist.required", true); // [DEFAULT]
+
+// Enable panel for our own extension recommendations...
+
+defaultPref("extensions.getAddons.showPane", true); // [DEFAULT]
+
+defaultPref("browser.phoenix.desktop.common.status", "006");
+
+// 007 MISC. PRIVACY
+
+
+
+/// Disable Firefox Sync by default
+// When signing in to Firefox Sync, this controls the items (checkboxes) that are set to sync (under about:preferences#sync).
+// This allows the user to control and choose for themselves what they'd like to sync...
+
+defaultPref("services.sync.engine.addons", false);
+defaultPref("services.sync.engine.addresses", false); // [DEFAULT]
+defaultPref("services.sync.engine.bookmarks", false);
+defaultPref("services.sync.engine.creditcards", false); // [DEFAULT]
+defaultPref("services.sync.engine.history", false);
+defaultPref("services.sync.engine.passwords", false);
+defaultPref("services.sync.engine.prefs", false);
+defaultPref("services.sync.engine.tabs", false);
+
+/// Disable sharing unnecessary version info as part of Firefox Sync
+
+defaultPref("services.sync.sendVersionInfo", false);
+
+/// If a remote AutoConfig is being used, ensure identifying info is never shared...
+
+lockPref("autoadmin.append_emailaddr", false); // [HIDDEN]
+
+defaultPref("browser.phoenix.desktop.common.status", "007");
+
+// 008 ATTACK SURFACE REDUCTION
+
+/// Disable WebXR
+// https://developer.mozilla.org/docs/Web/API/WebXR_Device_API
+
+defaultPref("permissions.default.xr", 2); // [HIDDEN on Thunderbird]
+
+defaultPref("browser.phoenix.desktop.common.status", "008");
+
+// 009 MISC. SECURITY
+
+
+
+
+
+/// If a remote AutoConfig is being used, block it from gaining privileged browser access...
+// https://www.mozilla.org/firefox/62.0/releasenotes/
+
+lockPref("general.config.sandbox_enabled", true);
+
+defaultPref("browser.phoenix.desktop.common.status", "009");
+
+// 010 MEDIA
+
+
+
+/// Remove DRM toggle in `about:preferences#general`
+
+defaultPref("browser.eme.ui.enabled", false);
+
+
+
+
+
+
+
+/// Enable click to play UI for certain CSS skins by default...
+// https://github.com/black7375/Firefox-UI-Fix/blob/master/css/leptonContent.css#L223
+// https://github.com/black7375/Firefox-UI-Fix/wiki/Options#defaults-6
+
+defaultPref("userContent.player.click_to_play", true); // [HIDDEN]
+
+defaultPref("browser.phoenix.desktop.common.status", "010");
+
+// 011 UPDATES
+
+/// Browser Updates
+
+defaultPref("app.update.badgeWaitTime", 0); // Immediately show badge on hamburger menu when update is available
+defaultPref("app.update.notifyDuringDownload", true); // Ensure that users are notified when an update is downloaded
+defaultPref("app.update.promptWaitTime", 3600); // Decrease time between update prompts, default is very generous...
+
+defaultPref("browser.phoenix.desktop.common.status", "011");
+
+// 012 DEBUGGING
+
+/// Enforce local debugging only
+
+lockPref("devtools.inspector.remote", false); // [DEFAULT]
+
+defaultPref("browser.phoenix.desktop.common.status", "012");
+
+// 013 MISC.
+
+/// Enable Containers by default
+// https://support.mozilla.org/kb/how-use-firefox-containers
+
+defaultPref("privacy.userContext.enabled", true);
+
+/// Never hide any extensions in about:debugging
+
+lockPref("devtools.aboutdebugging.showHiddenAddons", true);
+
+defaultPref("browser.phoenix.desktop.common.status", "013");
+
+// 014 PERFORMANCE
+// A lot of these taken from https://github.com/yokoffing/Betterfox/blob/main/Fastfox.js
+
+defaultPref("network.http.max-connections", 1800); // [Default = 900]
+
+/// Disables certain UI animations
+// https://searchfox.org/mozilla-central/source/widget/nsXPLookAndFeel.cpp
+// https://searchfox.org/mozilla-central/source/widget/LookAndFeel.h
+
+defaultPref("ui.panelAnimations", 0); // [HIDDEN]
+defaultPref("ui.prefersReducedMotion", 1); // [HIDDEN]
+defaultPref("ui.swipeAnimationEnabled", 0); // [HIDDEN]
+
+defaultPref("browser.phoenix.desktop.common.status", "014");
+
+// 015 Personal Touch 💜
+
+/// Things that are nice to have™
+// Not directly privacy & security related
+
+/// Enable Spellcheck for both multi-line and single-line boxes
+// [Default = 1, only checks multi-line boxes]
+// https://codeberg.org/celenity/Phoenix/issues/33
+
+defaultPref("layout.spellcheckDefault", 2);
+
+/// Enable custom CSS by default
+
+defaultPref("toolkit.legacyUserProfileCustomizations.stylesheets", true);
+
+/// This pref allows controlling the log level of policies (extremely useful for troubleshooting...), set here to the default value so that it's exposed in the about:config
+// https://searchfox.org/mozilla-central/source/browser/components/BrowserGlue.sys.mjs#967
+
+defaultPref("browser.policies.loglevel", "error"); // [DEFAULT, HIDDEN]
+
+/// Developer tools...
+
+defaultPref("devtools.command-button-experimental-prefs.enabled", true); // [HIDDEN]
+defaultPref("devtools.command-button-measure.enabled", true);
+defaultPref("devtools.command-button-rulers.enabled", true);
+defaultPref("devtools.command-button-screenshot.enabled", true);
+defaultPref("devtools.debugger.ui.editor-wrapping", true); // Enables long line wrapping in developer tools https://discourse.mozilla.org/t/long-line-wrapping-in-developer-tools-css-editor-and-debugger-code-views/47058
+defaultPref("devtools.dom.enabled", true);
+defaultPref("devtools.netmonitor.persistlog", true); // Do not automatically clear log messages after page reloads/navigation
+defaultPref("devtools.webconsole.persistlog", true); // Do not automatically clear log messages after page reloads/navigation
+defaultPref("devtools.webconsole.timestampMessages", true); // Enable timestamps in the web console by default
+
+/// Expose hidden UI preferences in the about:config...
+// https://searchfox.org/mozilla-central/source/widget/nsXPLookAndFeel.cpp
+// https://searchfox.org/mozilla-central/source/widget/LookAndFeel.h
+
+defaultPref("ui.hideCursorWhileTyping", 1); // [DEFAULT, HIDDEN]
+defaultPref("ui.prefersReducedTransparency", 0); // [DEFAULT, HIDDEN]
+defaultPref("ui.scrollToClick", 1); // [HIDDEN]
+defaultPref("ui.useAccessibilityTheme", 0); // [DEFAULT, HIDDEN]
+
+defaultPref("browser.phoenix.desktop.common.status", "015");
+
+lockPref("browser.phoenix.desktop.common.status", "successfully applied :D");
+
+//
+
+//
+// Copyright (C) 2024-2025 celenity
+//
+// This file is part of Phoenix.
+//
+// Phoenix is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
+//
+// Phoenix is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
+//
+// You should have received a copy of the GNU General Public License along with Phoenix. If not, see https://www.gnu.org/licenses/.
+//
+
+// This file contains preferences shared across Phoenix 'Extended' configs.
+
+// 001 ADVANCED FINGERPRINTING PROTECTION
+
+/// Disable WebGL
+// https://blog.browserscan.net/docs/webgl-fingerprinting
+// https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern
+
+defaultPref("webgl.disabled", true);
+
+defaultPref("browser.phoenix.extended.core.status", "001");
+
+// 002 WEBRTC
+// This will likely break WebRTC...
+
+/// Force a single candidate for ICE generation
+defaultPref("media.peerconnection.ice.default_address_only", true);
+
+/// Forcefully exclude local IP addresses, even in trusted scenarios
+defaultPref("media.peerconnection.ice.no_host", true);
+
+/// Only use TURN servers/relays, no p2p...
+// https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/issues/40#note_2884663
+defaultPref("media.peerconnection.ice.relay_only", true);
+
+defaultPref("browser.phoenix.extended.core.status", "002");
+
+// 003 MISC. PRIVACY
+
+/// Disable TCP/dFPI storage access heuristics
+// https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning#storage_access_heuristics
+
+defaultPref("privacy.restrict3rdpartystorage.heuristic.opened_window_after_interaction", false);
+defaultPref("privacy.restrict3rdpartystorage.heuristic.recently_visited", false);
+defaultPref("privacy.restrict3rdpartystorage.heuristic.redirect", false); // [DEFAULT - Android]
+defaultPref("privacy.restrict3rdpartystorage.heuristic.window_open", false); // [DEFAULT - Android]
+
+/// Only send cross-origin referers if hosts match
+
+defaultPref("network.http.referer.XOriginPolicy", 2);
+
+defaultPref("browser.phoenix.extended.core.status", "003");
+
+// 004 ATTACK SURFACE REDUCTION
+
+/// Disable WebAssembly
+// https://spectrum.ieee.org/more-worries-over-the-security-of-web-assembly
+
+defaultPref("javascript.options.wasm", false);
+
+defaultPref("browser.phoenix.extended.core.status", "004");
+
+// 005 MISC.
+
+/// Prevent sites from automatically refreshing
+
+defaultPref("accessibility.blockautorefresh", true);
+defaultPref("browser.meta_refresh_when_inactive.disabled", true); // [DEFAULT - Android]
+
+/// Stricter Autoplay Blocking
+
+defaultPref("media.autoplay.blocking_policy", 2); // [Default = 0]
+
+defaultPref("browser.phoenix.extended.core.status", "005");
+
+lockPref("browser.phoenix.extended.core.status", "successfully applied :D");
+
+//
+
+//
+// Copyright (C) 2024-2025 celenity
+//
+// This file is part of Phoenix.
+//
+// Phoenix is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
+//
+// Phoenix is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
+//
+// You should have received a copy of the GNU General Public License along with Phoenix. If not, see https://www.gnu.org/licenses/.
+//
+
+// This file contains preferences shared across Phoenix (Extended) & Dove on Desktop.
+
+// 001 ADVANCED FINGERPRINTING PROTECTION
+
+/// Enable dynamic rounding of content dimensions
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1407366
+
+defaultPref("privacy.resistFingerprinting.letterboxing", true);
+
+lockPref("browser.phoenix.extended.desktop.common.status", "successfully applied :D");
+
+//
+// The Phoenix shall be followed by a Dove: one of great strength and great beauty, to help carry out its conquest.
+
+//
+// Copyright (C) 2024-2025 celenity
+//
+// This file is part of Dove.
+//
+// Dove is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
+//
+// Dove is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
+//
+// You should have received a copy of the GNU General Public License along with Dove. If not, see https://www.gnu.org/licenses/.
+//
+
+// Built from Phoenix (Extended)
+
+lockPref("mail.dove.version", "2025.02.18.1");
+
+defaultPref("mail.dove.status", "000");
+
+// 001 TELEMETRY
+
+lockPref("toolkit.telemetry.ecosystemtelemetry.enabled", false); // [DEFAULT for non-Nightly...]
+
+defaultPref("mail.dove.status", "001");
+
+// 002 MOZILLA CRAP
+
+/// Disable Mozilla Email Provisioner/Creating new email addresses with their "partners"
+
+defaultPref("mail.provider.enabled", false);
+defaultPref("mail.provider.suppress_dialog_on_startup", true); // [HIDDEN]
+
+/// Never check if Thunderbird is the default mail client
+
+defaultPref("mail.shell.checkDefaultClient", false);
+
+/// Never check if Thunderbird is the default PDF viewer
+
+defaultPref("pdfjs.firstRun", false);
+
+/// Skip onboarding
+// https://searchfox.org/comm-central/source/suite/components/nsSuiteGlue.js#965
+
+defaultPref("browser.EULA.override", true);
+defaultPref("browser.rights.override", true);
+defaultPref("mail.rights.override", true);
+defaultPref("mailnews.start_page_override.mstone", "ignore");
+
+/// Disable Start Page by default & switch the URL to the about:config
+// This allows users to easily access the about:config via the menu bar from Go -> Mail Start Page
+// Or by pressing alt + home
+
+defaultPref("mailnews.start_page.enabled", false);
+defaultPref("mailnews.start_page.override_url", "");
+defaultPref("mailnews.start_page.url", "about:config");
+
+/// Disable Donate Prompts
+// Please still donate to Thunderbird if you appreciate it! ;)
+// https://www.thunderbird.net/?form=support
+
+lockPref("app.donation.eoy.url", "");
+lockPref("app.donation.eoy.version.viewed", 99);
+
+/// Disable Filelink
+// https://support.mozilla.org/kb/filelink-large-attachments
+
+defaultPref("mail.cloud_files.enabled", false);
+
+/// Disable "Chat" functionality
+
+defaultPref("mail.chat.enabled", false);
+
+/// Kill Add-on "Discovery" Recommendations
+
+defaultPref("extensions.getAddons.recommended.url", "");
+
+/// Remove unnecessary URL params
+
+defaultPref("app.releaseNotesURL", "https://live.thunderbird.net/%APP%/releasenotes?locale=%LOCALE%&version=%VERSION%&channel=%CHANNEL%&os=%OS%&buildid=%APPBUILDID%");
+defaultPref("app.releaseNotesURL.aboutDialog", "https://live.thunderbird.net/%APP%/releasenotes?locale=%LOCALE%&version=%VERSION%&channel=%CHANNEL%&os=%OS%&buildid=%APPBUILDID%");
+defaultPref("app.releaseNotesURL.prompt", "https://live.thunderbird.net/%APP%/releasenotes?locale=%LOCALE%&version=%VERSION%&channel=%CHANNEL%&os=%OS%&buildid=%APPBUILDID%");
+defaultPref("extensions.getAddons.search.browseURL", "https://addons.thunderbird.net/%LOCALE%/%APP%/search/?q=%TERMS%");
+
+defaultPref("mail.dove.status", "002");
+
+// 003 DISK AVOIDANCE
+
+/// Disable caching
+
+defaultPref("mail.imap.use_disk_cache2", false);
+
+/// Set website permissions to be session only
+
+defaultPref("permissions.memory_only", true); // [HIDDEN]
+
+/// Fully disable browsing history
+
+defaultPref("places.history.enabled", false);
+
+/// Sanitize data on exit...
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1675829
+
+defaultPref("network.cookie.noPersistentStorage", true);
+defaultPref("privacy.clearHistory.cookiesAndStorage", true);
+defaultPref("privacy.clearOnShutdown.cookies", true);
+defaultPref("privacy.clearOnShutdown_v2.cookiesAndStorage", true);
+defaultPref("privacy.clearSiteData.cookiesAndStorage", true);
+
+/// Disable logging chat history
+// https://stackoverflow.com/questions/32155137/how-to-disable-chat-history-in-mozilla-thunderbird
+
+defaultPref("purple.logging.log_chats", false);
+defaultPref("purple.logging.log_ims", false);
+
+/// Do not leak info in chat notifications by default
+
+defaultPref("mail.chat.notification_info", 2);
+
+/// Do not leak info in email alerts/notifications by default
+
+defaultPref("mail.biff.alert.show_preview", false);
+defaultPref("mail.biff.alert.show_sender", false);
+defaultPref("mail.biff.alert.show_subject", false);
+
+defaultPref("mail.dove.status", "003");
+
+// 004 GENERAL NETWORK HARDENING
+
+/// Enforce using secure connections for auto config
+
+defaultPref("mailnews.auto_config.fetchFromISP.sslOnly", true);
+defaultPref("mailnews.auto_config.guess.requireGoodCert", true); // [DEFAULT]
+defaultPref("mailnews.auto_config.guess.sslOnly", true);
+
+/// Disable sending usernames to your email provider when using auto config by default...
+// https://searchfox.org/comm-central/source/mailnews/mailnews.js#1024
+
+defaultPref("mailnews.auto_config.fetchFromISP.sendEmailAddress", false);
+
+/// Disable link previews
+
+defaultPref("mail.compose.add_link_preview", false);
+
+/// Always warn when making insecure connections
+// Unclear whether actually used anywhere
+
+defaultPref("security.warn_entering_weak", true);
+defaultPref("security.warn_leaving_secure", true);
+defaultPref("security.warn_viewing_mixed", true);
+
+defaultPref("mail.dove.status", "004");
+
+// 005 UI
+
+/// Always show full email addresses
+
+defaultPref("mail.addressDisplayFormat", 0); // [DEFAULT, HIDDEN] Sets preferred address display format to "Full name and email address"
+defaultPref("mail.showCondensedAddresses", false);
+
+/// Always show email information & headers
+
+defaultPref("mail.show_headers", 2);
+defaultPref("mailnews.display.date_senders_timezone", true); // Display timezone of sender
+defaultPref("mailnews.headers.showMessageId", true);
+defaultPref("mailnews.headers.showOrganization", true);
+defaultPref("mailnews.headers.showReferences", true);
+defaultPref("mailnews.headers.showSender", true);
+defaultPref("mailnews.headers.showUserAgent", true);
+
+defaultPref("mail.dove.status", "005");
+
+// 006 INFORMATION LEAKAGE
+
+/// Disable sending read receipts
+// https://searchfox.org/comm-central/source/mailnews/mailnews.js#292
+
+defaultPref("mail.mdn.report.enabled", false);
+defaultPref("mail.mdn.report.not_in_to_cc", 0);
+defaultPref("mail.mdn.report.outside_domain", 0);
+defaultPref("mail.mdn.report.other", 0);
+defaultPref("mail.server.default.mdn_not_in_to_cc", 0);
+defaultPref("mail.server.default.mdn_other", 0);
+defaultPref("mail.server.default.mdn_outside_domain", 0);
+defaultPref("mail.server.default.mdn_report_enabled", false);
+defaultPref("purple.conversations.im.send_read", false); // [CHAT]
+
+/// Disable sending chat typing notifications
+
+defaultPref("purple.conversations.im.send_typing", false);
+
+/// Disable reporting chat idle status...
+
+defaultPref("messenger.status.reportIdle", false);
+
+/// Disable reporting chat status as 'away' when idle...
+// Defense in depth
+
+defaultPref("messenger.status.awayWhenIdle", false);
+
+/// Prevent sending user agent with emails, as it is unnecessary, not even defined in spec, & leaks information
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1114475
+
+defaultPref("mailnews.headers.sendUserAgent", false);
+defaultPref("mailnews.headers.useMinimalUserAgent", true); // [DEFAULT, DEFENSE IN DEPTH]
+
+/// Prevent leaking system locale & date/time in replies
+
+defaultPref("mailnews.reply_header_authorwroteondate", "#1 wrote on #2 #3:");
+defaultPref("mailnews.reply_header_authorwrotesingle", "#1 wrote:");
+defaultPref("mailnews.reply_header_ondateauthorwrote", "On #2 #3, #1 wrote:");
+defaultPref("mailnews.reply_header_type", 1);
+
+/// Prevent leaking spellcheck dictionary info
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1370217
+
+defaultPref("mail.suppress_content_language", true);
+
+/// Prevent leaking locale & specific time through date header
+// https://bugzilla.mozilla.org/show_bug.cgi?id=1603359
+
+defaultPref("mail.sanitize_date_header", true);
+
+/// Prevent local IP address leakage via EHLO/HELO...
+// https://blog.plee.me/2014/11/mozilla-thunderbird-changing-the-ehlo-helo-value-in-the-received-header-for-outgoing-mail/
+
+defaultPref("mail.smtpserver.default.hello_argument", "[127.0.0.1]"); // [HIDDEN]
+
+/// Prevent leaking display names of contacts in address fields...
+// https://github.com/HorlogeSkynet/thunderbird-user.js/blob/master/user.js#L1231
+
+defaultPref("extensions.cardbook.useOnlyEmail", true);
+
+defaultPref("mail.dove.status", "006");
+
+// 007 E2EE
+
+/// Enable advanced E2EE settings
+// https://searchfox.org/comm-central/source/mail/extensions/am-e2e/prefs/e2e-prefs.js#104
+
+defaultPref("temp.openpgp.advancedUser", true);
+
+/// Always notify when encryption is possible
+
+defaultPref("mail.openpgp.remind_encryption_possible", true); // [DEFAULT]
+defaultPref("mail.smime.remind_encryption_possible", true); // [DEFAULT]
+
+/// Always automatically encrypt when possible
+
+defaultPref("mail.e2ee.auto_enable", true);
+
+/// Never automatically disable E2EE...
+// https://searchfox.org/comm-central/source/mail/extensions/am-e2e/prefs/e2e-prefs.js#67
+
+lockPref("mail.e2ee.auto_disable", false); // [DEFAULT]
+
+/// Always notify when E2EE is disabled
+
+lockPref("mail.e2ee.notify_on_auto_disable", true); // [DEFAULT]
+
+/// Ensure we're not accepting insecure S/MIME signatures...
+// https://searchfox.org/comm-central/source/mail/extensions/am-e2e/prefs/e2e-prefs.js#95
+
+defaultPref("mail.smime.accept_insecure_sha1_message_signatures", false); // [DEFAULT]
+
+/// Sign messages by default
+/// https://searchfox.org/comm-central/source/mail/extensions/am-e2e/prefs/e2e-prefs.js#12
+
+defaultPref("mail.identity.default.sign_mail", true);
+
+/// Use GnuPG if built-in RNP fails
+// https://wiki.mozilla.org/Thunderbird:OpenPGP:Smartcards#Allow_the_use_of_external_GnuP
+
+defaultPref("mail.openpgp.allow_external_gnupg", true);
+
+/// Always warn users when using a deprecated version of GnuPG...
+
+defaultPref("temp.openpgp.warnDeprecatedGnuPG", true); // [DEFAULT]
+
+defaultPref("mail.dove.status", "007");
+
+// 008 MISC. PRIVACY
+
+/// Never load remote content in emails
+// This still allows setting exceptions.
+
+lockPref("mailnews.message_display.disable_remote_image", true); // [DEFAULT]
+
+/// Disable Geolocation
+// https://browserleaks.com/geo
+
+defaultPref("browser.geolocation.warning.infoURL", "");
+defaultPref("geo.provider.network.url", "");
+defaultPref("geo.provider.use_corelocation", false);
+defaultPref("geo.provider.use_geoclue", false);
+
+/// Harden FPP
+// As explained here: https://codeberg.org/celenity/Phoenix/issues/46
+// We're adding -HttpUserAgent & -NavigatorUserAgent (compared to standard Phoenix Extended) because they try to report that we're Firefox, which causes all kinds of breakage and weird behavior (ex. on the ATO...)
+// We're removing -CanvasExtractionBeforeUserInputIsBlocked as Thunderbird simply doesn't support these permission prompts for canvas data extraction...
+
+defaultPref("privacy.fingerprintingProtection.overrides", "+AllTargets,-CSSPrefersColorScheme,-FrameRate,-HttpUserAgent,-NavigatorUserAgent");
+
+/// Reset Phoenix's FPP overrides + disable Mozilla's remote overrides
+// These are meant for browsers and may have undesired privacy implications for our use case...
+
+defaultPref("privacy.fingerprintingProtection.granularOverrides", ""); // [DEFAULT]
+defaultPref("privacy.fingerprintingProtection.remoteOverrides.enabled", false);
+
+/// Strip referers, but allow toggling per session, since they may be needed on rare occasions.
+
+pref("network.http.referer.XOriginPolicy", 2);
+
+/// Disable macOS Spotlight & Windows file indexing email by default
+
+defaultPref("mail.spotlight.enable", false); // [DEFAULT]
+defaultPref("mail.spotlight.firstRunDone", true);
+defaultPref("mail.winsearch.enable", false); // [DEFAULT]
+defaultPref("mail.winsearch.firstRunDone", true);
+defaultPref("searchintegration.enable", false);
+
+/// Disable automatic collection of email addresses for Thunderbird's Address Book...
+
+defaultPref("mail.collect_email_address_outgoing", false);
+
+/// Alert users if they have not addressed a BCC (Blind Carbon Copy) warning
+
+defaultPref("mail.compose.warn_public_recipients.aggressive", true);
+
+/// Explicitly disable legacy XMPP gateways for Facebook, Google, Twitter, and Yahoo...
+// https://searchfox.org/comm-central/source/chat/chat-prefs.js#76
+
+defaultPref("chat.prpls.prpl-facebook.disable", true); // [DEFAULT]
+defaultPref("chat.prpls.prpl-gtalk.disable", true); // [DEFAULT]
+defaultPref("chat.prpls.prpl-twitter.disable", true); // [DEFAULT]
+defaultPref("chat.prpls.prpl-yahoo.disable", true); // [DEFAULT]
+
+defaultPref("mail.dove.status", "008");
+
+// 009 MISC. SECURITY
+
+/// Prevent 3rd party software from intercepting & analyzing your emails...
+// This is the "Allow Antivirus clients to quarantine individual incoming messages" option within Privacy & Security settings...
+// https://searchfox.org/comm-central/source/mail/components/MailGlue.sys.mjs#1299
+
+lockPref("mailnews.downloadToTempFile", false);
+
+/// Sanitize HTML content
+// https://www.bucksch.org/1/projects/mozilla/108153/
+
+defaultPref("mail.html_sanitize.drop_conditional_css", true); // [DEFAULT]
+defaultPref("mailnews.display.html_as", 3);
+defaultPref("rss.display.html_as", 3);
+
+/// Enforce built-in phishing protection
+// https://support.mozilla.org/kb/thunderbirds-scam-detection
+
+defaultPref("mail.phishing.detection.disallow_form_actions", true); // [DEFAULT]
+defaultPref("mail.phishing.detection.enabled", true); // [DEFAULT]
+defaultPref("mail.phishing.detection.ipaddresses", true); // [DEFAULT]
+defaultPref("mail.phishing.detection.mismatched_hosts", true); // [DEFAULT]
+
+/// Always warn users before launching other apps...
+
+defaultPref("mail.external_protocol_requires_permission", true); // [HIDDEN]
+
+/// Always alert users when downloads are initiated (and completed)
+// https://searchfox.org/comm-central/source/mail/app/profile/all-thunderbird.js#505
+
+defaultPref("browser.download.manager.focusWhenStarting", true);
+defaultPref("browser.download.manager.showAlertOnComplete", true);
+defaultPref("browser.download.manager.showWhenStarting", true);
+
+/// Show a progress dialog upon download
+// https://searchfox.org/comm-central/source/suite/app/profile/suite-prefs.js#708
+
+defaultPref("browser.download.manager.behavior", 1); // [HIDDEN]
+
+/// Limit classes that can process incoming data
+// Enables a blocklist to avoid HTML, inline images, and other unknown content types
+// https://searchfox.org/comm-central/source/mailnews/mailnews.js#728
+
+defaultPref("mailnews.display.disallow_mime_handlers", 3);
+defaultPref("rss.display.disallow_mime_handlers", 3);
+
+defaultPref("mail.dove.status", "009");
+
+// 010 MISC.
+
+/// Send emails in plaintext by default
+// https://drewdevault.com/2016/04/11/Please-use-text-plain-for-emails.html
+
+defaultPref("mail.default_send_format", 1);
+defaultPref("mail.html_compose", false);
+defaultPref("mail.identity.default.compose_html", false);
+
+/// Prefer viewing emails in plaintext by default
+
+defaultPref("mailnews.display.prefer_plaintext", true);
+
+/// Prefer viewing RSS feeds in plaintext by default
+
+defaultPref("rss.display.prefer_plaintext", true);
+
+/// Load summary of RSS feeds instead of the full webpage by default
+
+defaultPref("rss.show.summary", 1);
+
+/// Open RSS webpages in your web browser instead of Thunderbird...
+// https://support.mozilla.org/kb/how-subscribe-news-feeds-and-blogs
+
+defaultPref("rss.show.content-base", 3);
+
+/// Prevent selection of RSS messages from automatically loading the web page...
+// https://support.mozilla.org/kb/how-subscribe-news-feeds-and-blogs
+
+defaultPref("rss.message.loadWebPageOnSelect", 0);
+
+/// Do not allow calendar to extract data from emails by default
+
+defaultPref("calendar.extract.service.enabled", false); // [DEFAULT]
+
+/// Kill Gecko Media Plugins
+
+defaultPref("media.gmp-gmpopenh264.enabled", false);
+defaultPref("media.gmp-gmpopenh264.provider.enabled", false);
+defaultPref("media.gmp-gmpopenh264.visible", false);
+defaultPref("media.gmp-provider.enabled", false);
+
+/// Always allow installing "incompatible" add-ons - REQUIRED FOR UBLOCK ORIGIN
+
+lockPref("extensions.strictCompatibility", false);
+
+/// Allow running uBlock Origin on sites with restrictions (Quarantined domains)
+// Necessary since it isn't 'recommended' like it is on Firefox...
+
+defaultPref("extensions.quarantineIgnoredByUser.uBlock0@raymondhill.net", true);
+
+/// Block DKIM Verifier from accessing quarantined domains...
+
+defaultPref("extensions.quarantineIgnoredByUser.dkim_verifier@pl", false);
+
+/// Disable SVG
+// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+svg
+
+defaultPref("svg.disabled", true);
+
+/// Disable WebRTC
+// We already take care of privacy concerns here; this is for attack surface reduction...
+// https://x.com/GrapheneOS/status/1728921946396725618
+
+defaultPref("media.peerconnection.enabled", false);
+
+/// Prevent status bar spoofing
+// https://searchfox.org/comm-central/source/mail/app/profile/all-thunderbird.js#542
+
+defaultPref("dom.disable_window_status_change", true); // [DEFAULT]
+
+/// Re-enable Password Manager by default
+// This is useful & important for Thunderbird, since it's the only way to store account passwords...
+// Also no UI toggle for it :/
+
+defaultPref("signon.rememberSignons", true); // [DEFAULT]
+
+/// Add our own extension recommendations...
+
+defaultPref("extensions.getAddons.discovery.api_url", "https://dove.celenity.dev/extensions/recommendations.json"); // https://searchfox.org/mozilla-central/source/testing/profiles/common/user.js
+defaultPref("extensions.recommendations.privacyPolicyUrl", "https://dove.celenity.dev/privacy#extension-recommendations");
+
+/// Don't warn on `mailto:`...
+// Override from Phoenix
+
+defaultPref("network.protocol-handler.warn-external.mailto", false); // [DEFAULT, HIDDEN]
+
+defaultPref("mail.dove.status", "010");
+
+// 011 Configure DKIM Verifier...
+// https://codeberg.org/celenity/Dove/issues/6
+// https://github.com/lieser/dkim_verifier/issues/267
+// https://github.com/lieser/dkim_verifier/issues/268
+// https://github.com/lieser/dkim_verifier/wiki/Options
+// https://github.com/lieser/dkim_verifier/blob/master/modules/preferences.mjs.js
+// https://github.com/lieser/dkim_verifier/blob/master/_locales/en_US/messages.json
+
+/// Verify DKIM Signatures...
+
+defaultPref("extensions.dkim_verifier.dkim.enable", true); // [DEFAULT]
+
+/// By default, store DKIM keys + results for later comparison
+
+defaultPref("extensions.dkim_verifier.key.storing", 2);
+defaultPref("extensions.dkim_verifier.saveResult", true);
+
+/// Enable reading the Authentication-Results header, but don't replace the extension's results...
+// This allows us to look at both the header and the client-side results of DKIM Verifier for comparison/extra verification
+
+defaultPref("extensions.dkim_verifier.arh.read", true);
+defaultPref("extensions.dkim_verifier.arh.replaceAddonResult", false);
+
+/// Warn on ill-formed AUID tags
+
+defaultPref("extensions.dkim_verifier.error.illformed_i.treatAs", 1); // [DEFAULT]
+
+/// Warn on ill-formed selector tags
+
+defaultPref("extensions.dkim_verifier.error.illformed_s.treatAs", 1); // [DEFAULT]
+
+/// Warn on DKIM keys not secured by DNSSEC
+
+defaultPref("extensions.dkim_verifier.error.policy.key_insecure.treatAs", 1);
+
+/// Warn on the RSA-SHA1 algorithm
+
+defaultPref("extensions.dkim_verifier.error.algorithm.sign.rsa-sha1.treatAs", 1); // [DEFAULT]
+
+/// Warn on weak RSA keys
+
+defaultPref("extensions.dkim_verifier.error.algorithm.rsa.weakKeyLength.treatAs", 1);
+
+/// Show detailed error reasons...
+
+defaultPref("extensions.dkim_verifier.error.detailedReasons", true);
+
+/// Switch the default DNS server from Google to Quad9...
+
+defaultPref("extensions.dkim_verifier.dns.nameserver", "9.9.9.9");
+
+/// Check if emails should be signed
+// https://github.com/lieser/dkim_verifier/wiki/Sign-rules
+
+defaultPref("extensions.dkim_verifier.policy.signRules.enable", true);
+
+/// Use the default signing rules by default...
+
+defaultPref("extensions.dkim_verifier.policy.signRules.checkDefaultRules", true); // [DEFAULT]
+
+/// Automatically add rules based on viewed DKIM-signed emails, but only if the from address is in the SDID
+
+defaultPref("extensions.dkim_verifier.policy.signRules.autoAddRule.enable", true);
+defaultPref("extensions.dkim_verifier.policy.signRules.autoAddRule.for", 0); // [DEFAULT]
+defaultPref("extensions.dkim_verifier.policy.signRules.autoAddRule.onlyIfFromAddressInSDID", true); // [DEFAULT]
+
+/// For signing rules, ensure the domain/subdomain in the SSID matches
+
+defaultPref("extensions.dkim_verifier.policy.signRules.sdid.allowSubDomains", false);
+
+/// Treat wrong SSIDs as errors instead of warnings...
+
+defaultPref("extensions.dkim_verifier.policy.signRules.error.wrong_sdid.asWarning", false); // [DEFAULT]
+
+/// Check DMARC entries to help determine whether an email should be signed
+// https://github.com/lieser/dkim_verifier/wiki/Options#use-dmarc-to-heuristically-determine-if-an-e-mail-should-be-signed
+
+defaultPref("extensions.dkim_verifier.policy.DMARC.shouldBeSigned.enable", true);
+defaultPref("extensions.dkim_verifier.policy.DMARC.shouldBeSigned.neededPolicy", "none"); // [DEFAULT]
+
+/// IF a header should be signed (as defined by the criteria above), enforce signing of *all* relevant headers
+
+defaultPref("extensions.dkim_verifier.policy.dkim.unsignedHeadersWarning.mode", 30);
+
+/// Always show the DKIM header & tooltip when a message is viewed...
+
+defaultPref("extensions.dkim_verifier.showDKIMFromTooltip", 50);
+defaultPref("extensions.dkim_verifier.showDKIMHeader", 50);
+
+/// Enable showing favicons of known signing domains before the 'From' address by default
+/// Works via BIMI & DKIM Verifier's own internal database
+// https://github.com/lieser/dkim_verifier/wiki/Display-Options#show-the-favicon-of-known-signing-domains-before-the-from-address
+// https://wikipedia.org/wiki/Brand_Indicators_for_Message_Identification
+
+defaultPref("extensions.dkim_verifier.display.favicon.show", true); // [DEFAULT]
+
+/// Indicate when a DKIM key is successfully validated by DNSSEC...
+// https://github.com/lieser/dkim_verifier/wiki/Options#indicate-successful-dnssec-validation-with-a-lock-after-the-sdid
+
+defaultPref("extensions.dkim_verifier.display.keySecure", true); // [DEFAULT]
+
+/// Ensure debugging is disabled by default...
+
+defaultPref("extensions.dkim_verifier.debug", false); // [DEFAULT]
+
+defaultPref("mail.dove.status", "011");
+
+// 012 Personal Touch 💜
+
+/// Things that are nice to have™
+// Not directly privacy & security related
+
+/// Enable inline spellcheck when composing messages & check before sending by default
+
+defaultPref("mail.spellcheck.inline", true); // [DEFAULT]
+defaultPref("mail.SpellCheckBeforeSend", true);
+
+/// Enable dark theme for the message pane
+
+defaultPref("mail.dark-reader.enabled", true);
+defaultPref("mail.dark-reader.show-toggle", true); // [HIDDEN] Enables the UI toggle https://searchfox.org/comm-central/source/mail/base/content/msgHdrView.js#2787
+
+/// By default, when saving a message to a file, use underscores instead of spaces in the file name...
+
+defaultPref("mail.save_msg_filename_underscores_for_space", true);
+
+/// Show progress when saving/sending a message...
+
+defaultPref("mailnews.show_send_progress", true); // [DEFAULT]
+
+/// Allow reporting malicious add-ons/themes to Mozilla
+
+defaultPref("extensions.abuseReport.enabled", true);
+
+/// Allow inspecting/debugging local tabs
+// Extremely useful for Thunderbird, as it gives us a URL bar...
+// Can be accessed via `Tools` -> `Developer Tools` -> `Debug Add-ons` (`about:debugging`), simply choose `Inspect` next to any tab of your choice and profit...
+
+defaultPref("devtools.aboutdebugging.local-tab-debugging", true);
+
+defaultPref("mail.dove.status", "012");
+
+// 013 DO NOT TOUCH
+
+lockPref("browser.privatebrowsing.autostart", false); // Breaks uBlock Origin & all other extensions... also unnecessary since we always sanitize data anyways
+lockPref("mailnews.oauth.usePrivateBrowser", false); // Breaks uBlock Origin & all other extensions... also unnecessary since we always sanitize data anyways
+
+defaultPref("mail.dove.status", "013");
+
+
+
+
+lockPref("mail.dove.status", "successfully applied :D");
diff --git a/macos/org.mozilla.thunderbird.plist b/macos/org.mozilla.thunderbird.plist
new file mode 100644
index 0000000..f385f05
--- /dev/null
+++ b/macos/org.mozilla.thunderbird.plist
@@ -0,0 +1,7313 @@
+
+
+
+
+ 3rdparty
+
+ Extensions
+
+ uBlock0@raymondhill.net
+
+ adminSettings
+
+ assetsBootstrapLocation
+ https://codeberg.org/celenity/Phoenix/raw/commit/ccaf778427b3f8c8b02e99f9bfc565adc7ed0633/uBlock/assets.json
+ hostnameSwitchesString
+ no-large-media: behind-the-scene false
+no-csp-reports: * true
+no-scripting: * true
+no-scripting: abrahamjuliot.github.io false
+no-scripting: accounts.google.com false
+no-scripting: addons.thunderbird.net false
+no-scripting: arkenfox.github.io false
+no-scripting: browserleaks.com false
+no-scripting: deviceinfo.me false
+no-scripting: earthlng.github.io false
+no-scripting: login.aol.com false
+no-scripting: login.live.com false
+no-scripting: login.microsoftonline.com false
+no-scripting: login.yahoo.net false
+no-scripting: okta.com false
+no-scripting: permission.site false
+no-scripting: www.google.com false
+
+ advancedSettings
+
+
+ autoCommentFilterTemplate
+ {{url}}
+
+
+ filterAuthorMode
+ true
+
+
+ updateAssetBypassBrowserCache
+ true
+
+
+ userSettings
+
+
+ advancedUserEnabled
+ true
+
+
+ dynamicFilteringEnabled
+ true
+
+
+ firewallPaneMinimized
+ false
+
+
+
+
+
+ BlockAboutAddons
+
+ BlockAboutConfig
+
+ BlockAboutProfiles
+
+ BlockAboutSupport
+
+ Certificates
+
+ ImportEnterpriseRoots
+
+
+ Cookies
+
+ Behavior
+ reject-tracker-and-partition-foreign
+ BehaviorPrivateBrowsing
+ reject-tracker-and-partition-foreign
+ Block
+
+ http://google-analytics.com/
+ https://google-analytics.com/
+ http://analytics.google.com/
+ https://analytics.google.com/
+ http://googletagmanager.com/
+ https://googletagmanager.com/
+ http://googletagservices.com/
+ https://googletagservices.com/
+ http://doubleclick.net/
+ https://doubleclick.net/
+ http://doubleclick-cn.net/
+ https://doubleclick-cn.net/
+ http://doubleclickbygoogle.com/
+ https://doubleclickbygoogle.com/
+ http://doubleclicksearch.com/
+ https://doubleclicksearch.com/
+ http://doubleclickusercontent.com/
+ https://doubleclickusercontent.com/
+ http://googledoubleclick.net/
+ https://googledoubleclick.net/
+ http://doubleclick.com/
+ https://doubleclick.com/
+ http://youtube-nocookie.com/
+ https://youtube-nocookie.com/
+ http://braze.com/
+ https://braze.com/
+ http://sentry.io/
+ https://sentry.io/
+ http://omappapi.com/
+ https://omappapi.com/
+ http://250analytics.com/
+ https://250analytics.com/
+ http://raw.githubusercontent.com/
+ https://raw.githubusercontent.com/
+ http://fonts.googleapis.com/
+ https://fonts.googleapis.com/
+ http://fonts.gstatic.com/
+ https://fonts.gstatic.com/
+ http://scorecardresearch.com/
+ https://scorecardresearch.com/
+ http://quantserve.com/
+ https://quantserve.com/
+ http://ads.google.com/
+ https://ads.google.com/
+ http://ads.google.cn/
+ https://ads.google.cn/
+ http://amazon-adsystem.com/
+ https://amazon-adsystem.com/
+ http://connect.facebook.net/
+ https://connect.facebook.com/
+ http://2mdn.net/
+ https://2mdn.net/
+ http://2mdn-cn.net/
+ https://2mdn-cn.net/
+ http://dartmotif.com/
+ https://dartmotif.com/
+ http://adsbygoogle.com/
+ https://adsbygoogle.com/
+ http://admanager.google.com/
+ https://admanager.google.com/
+ http://admob-creative.googleusercontent.com/
+ http://admobapplicationnetwork.com/
+ http://adometry.com/
+ http://adrollo.com/
+ http://mail-ads.google.com/
+ https://admobapplicationnetwork.com/
+ https://adometry.com/
+ https://adrollo.com/
+ https://mail-ads.google.com/
+ http://adgoogle.net/
+ https://adgoogle.net/
+ http://adservice.google.ac/
+ http://adservice.google.ad/
+ http://adservice.google.ae/
+ http://adservice.google.af/
+ http://adservice.google.ag/
+ http://adservice.google.al/
+ http://adservice.google.am/
+ http://adservice.google.as/
+ http://adservice.google.at/
+ http://adservice.google.az/
+ http://adservice.google.ba/
+ http://adservice.google.be/
+ http://adservice.google.berlin/
+ http://adservice.google.bf/
+ http://adservice.google.bg/
+ http://adservice.google.bi/
+ http://adservice.google.bj/
+ http://adservice.google.bo/
+ http://adservice.google.bs/
+ http://adservice.google.bt/
+ http://adservice.google.by/
+ http://adservice.google.ca/
+ http://adservice.google.cat/
+ http://adservice.google.cc/
+ http://adservice.google.cd/
+ http://adservice.google.cf/
+ http://adservice.google.cg/
+ http://adservice.google.ch/
+ http://adservice.google.ci/
+ http://adservice.google.cl/
+ http://adservice.google.cm/
+ http://adservice.google.co.ao/
+ http://adservice.google.co.bw/
+ http://adservice.google.co.ck/
+ http://adservice.google.co.cr/
+ http://adservice.google.co.hu/
+ http://adservice.google.co.id/
+ http://adservice.google.co.il/
+ http://adservice.google.co.im/
+ http://adservice.google.co.in/
+ http://adservice.google.co.je/
+ http://adservice.google.co.jp/
+ http://adservice.google.co.ke/
+ http://adservice.google.co.kr/
+ http://adservice.google.co.ls/
+ http://adservice.google.co.ma/
+ http://adservice.google.co.mz/
+ http://adservice.google.co.nz/
+ http://adservice.google.co.th/
+ http://adservice.google.co.tz/
+ http://adservice.google.co.ug/
+ http://adservice.google.co.uk/
+ http://adservice.google.co.uz/
+ http://adservice.google.co.ve/
+ http://adservice.google.co.vi/
+ http://adservice.google.co.za/
+ http://adservice.google.co.zm/
+ http://adservice.google.co.zw/
+ http://adservice.google.com/
+ http://adservice.google.com.af/
+ http://adservice.google.com.ag/
+ http://adservice.google.com.ai/
+ http://adservice.google.com.ar/
+ http://adservice.google.com.au/
+ http://adservice.google.com.bd/
+ http://adservice.google.com.bh/
+ http://adservice.google.com.bn/
+ http://adservice.google.com.bo/
+ http://adservice.google.com.br/
+ http://adservice.google.com.by/
+ http://adservice.google.com.bz/
+ http://adservice.google.com.co/
+ http://adservice.google.com.cu/
+ http://adservice.google.com.cy/
+ http://adservice.google.com.do/
+ http://adservice.google.com.ec/
+ http://adservice.google.com.eg/
+ http://adservice.google.com.et/
+ http://adservice.google.com.fj/
+ http://adservice.google.com.ge/
+ http://adservice.google.com.gr/
+ http://adservice.google.com.gh/
+ http://adservice.google.com.gi/
+ http://adservice.google.com.gt/
+ http://adservice.google.com.hk/
+ http://adservice.google.com.iq/
+ http://adservice.google.com.jm/
+ http://adservice.google.com.jo/
+ http://adservice.google.com.kh/
+ http://adservice.google.com.kw/
+ http://adservice.google.com.lb/
+ http://adservice.google.com.ly/
+ http://adservice.google.com.mm/
+ http://adservice.google.com.mt/
+ http://adservice.google.com.mx/
+ http://adservice.google.com.my/
+ http://adservice.google.com.na/
+ http://adservice.google.com.nf/
+ http://adservice.google.com.ng/
+ http://adservice.google.com.ni/
+ http://adservice.google.com.np/
+ http://adservice.google.com.nr/
+ http://adservice.google.com.om/
+ http://adservice.google.com.pa/
+ http://adservice.google.com.pe/
+ http://adservice.google.com.pg/
+ http://adservice.google.com.ph/
+ http://adservice.google.com.pk/
+ http://adservice.google.com.pl/
+ http://adservice.google.com.pr/
+ http://adservice.google.com.py/
+ http://adservice.google.com.qa/
+ http://adservice.google.com.ru/
+ http://adservice.google.com.sa/
+ http://adservice.google.com.sb/
+ http://adservice.google.com.sg/
+ http://adservice.google.com.sl/
+ http://adservice.google.com.sv/
+ http://adservice.google.com.tj/
+ http://adservice.google.com.tn/
+ http://adservice.google.com.tr/
+ http://adservice.google.com.tw/
+ http://adservice.google.com.ua/
+ http://adservice.google.com.uy/
+ http://adservice.google.com.vc/
+ http://adservice.google.com.ve/
+ http://adservice.google.com.vn/
+ http://adservice.google.cv/
+ http://adservice.google.cz/
+ http://adservice.google.de/
+ http://adservice.google.dev/
+ http://adservice.google.dj/
+ http://adservice.google.dk/
+ http://adservice.google.dm/
+ http://adservice.google.dz/
+ http://adservice.google.ec/
+ http://adservice.google.ee/
+ http://adservice.google.es/
+ http://adservice.google.eu/
+ http://adservice.google.fi/
+ http://adservice.google.fm/
+ http://adservice.google.fr/
+ http://adservice.google.ga/
+ http://adservice.google.gd/
+ http://adservice.google.ge/
+ http://adservice.google.gf/
+ http://adservice.google.gg/
+ http://adservice.google.gl/
+ http://adservice.google.gm/
+ http://adservice.google.gp/
+ http://adservice.google.gr/
+ http://adservice.google.gy/
+ http://adservice.google.health/
+ http://adservice.google.hk/
+ http://adservice.google.hn/
+ http://adservice.google.hr/
+ http://adservice.google.ht/
+ http://adservice.google.hu/
+ http://adservice.google.ie/
+ http://adservice.google.im/
+ http://adservice.google.in/
+ http://adservice.google.info/
+ http://adservice.google.io/
+ http://adservice.google.iq/
+ http://adservice.google.is/
+ http://adservice.google.it/
+ http://adservice.google.it.ao/
+ http://adservice.google.je/
+ http://adservice.google.jo/
+ http://adservice.google.jp/
+ http://adservice.google.kg/
+ http://adservice.google.ki/
+ http://adservice.google.kr/
+ http://adservice.google.kz/
+ http://adservice.google.la/
+ http://adservice.google.li/
+ http://adservice.google.lk/
+ http://adservice.google.lt/
+ http://adservice.google.lu/
+ http://adservice.google.lv/
+ http://adservice.google.ma/
+ http://adservice.google.md/
+ http://adservice.google.me/
+ http://adservice.google.meet/
+ http://adservice.google.mg/
+ http://adservice.google.mk/
+ http://adservice.google.ml/
+ http://adservice.google.mn/
+ http://adservice.google.ms/
+ http://adservice.google.mu/
+ http://adservice.google.mv/
+ http://adservice.google.mw/
+ http://adservice.google.mx/
+ http://adservice.google.ne/
+ http://adservice.google.ne.jp/
+ http://adservice.google.ng/
+ http://adservice.google.nl/
+ http://adservice.google.no/
+ http://adservice.google.nr/
+ http://adservice.google.nu/
+ http://adservice.google.off.ai/
+ http://adservice.google.pf/
+ http://adservice.google.ph/
+ http://adservice.google.pk/
+ http://adservice.google.pl/
+ http://adservice.google.pn/
+ http://adservice.google.ps/
+ http://adservice.google.pt/
+ http://adservice.google.qa/
+ http://adservice.google.re/
+ http://adservice.google.ro/
+ http://adservice.google.rs/
+ http://adservice.google.ru/
+ http://adservice.google.rw/
+ http://adservice.google.sc/
+ http://adservice.google.se/
+ http://adservice.google.sg/
+ http://adservice.google.sh/
+ http://adservice.google.si/
+ http://adservice.google.sk/
+ http://adservice.google.sm/
+ http://adservice.google.sn/
+ http://adservice.google.so/
+ http://adservice.google.sr/
+ http://adservice.google.st/
+ http://adservice.google.td/
+ http://adservice.google.tel/
+ http://adservice.google.tg/
+ http://adservice.google.tk/
+ http://adservice.google.tl/
+ http://adservice.google.tm/
+ http://adservice.google.tn/
+ http://adservice.google.to/
+ http://adservice.google.tt/
+ http://adservice.google.tw/
+ http://adservice.google.ua/
+ http://adservice.google.us/
+ http://adservice.google.uz/
+ http://adservice.google.vg/
+ http://adservice.google.vn/
+ http://adservice.google.vu/
+ http://adservice.google.ws/
+ https://adservice.google.ac/
+ https://adservice.google.ad/
+ https://adservice.google.ae/
+ https://adservice.google.af/
+ https://adservice.google.ag/
+ https://adservice.google.al/
+ https://adservice.google.am/
+ https://adservice.google.as/
+ https://adservice.google.at/
+ https://adservice.google.az/
+ https://adservice.google.ba/
+ https://adservice.google.be/
+ https://adservice.google.berlin/
+ https://adservice.google.bf/
+ https://adservice.google.bg/
+ https://adservice.google.bi/
+ https://adservice.google.bj/
+ https://adservice.google.bo/
+ https://adservice.google.bs/
+ https://adservice.google.bt/
+ https://adservice.google.by/
+ https://adservice.google.ca/
+ https://adservice.google.cat/
+ https://adservice.google.cc/
+ https://adservice.google.cd/
+ https://adservice.google.cf/
+ https://adservice.google.cg/
+ https://adservice.google.ch/
+ https://adservice.google.ci/
+ https://adservice.google.cl/
+ https://adservice.google.cm/
+ https://adservice.google.co.ao/
+ https://adservice.google.co.bw/
+ https://adservice.google.co.ck/
+ https://adservice.google.co.cr/
+ https://adservice.google.co.hu/
+ https://adservice.google.co.id/
+ https://adservice.google.co.il/
+ https://adservice.google.co.im/
+ https://adservice.google.co.in/
+ https://adservice.google.co.je/
+ https://adservice.google.co.jp/
+ https://adservice.google.co.ke/
+ https://adservice.google.co.kr/
+ https://adservice.google.co.ls/
+ https://adservice.google.co.ma/
+ https://adservice.google.co.mz/
+ https://adservice.google.co.nz/
+ https://adservice.google.co.th/
+ https://adservice.google.co.tz/
+ https://adservice.google.co.ug/
+ https://adservice.google.co.uk/
+ https://adservice.google.co.uz/
+ https://adservice.google.co.ve/
+ https://adservice.google.co.vi/
+ https://adservice.google.co.za/
+ https://adservice.google.co.zm/
+ https://adservice.google.co.zw/
+ https://adservice.google.com/
+ https://adservice.google.com.af/
+ https://adservice.google.com.ag/
+ https://adservice.google.com.ai/
+ https://adservice.google.com.ar/
+ https://adservice.google.com.au/
+ https://adservice.google.com.bd/
+ https://adservice.google.com.bh/
+ https://adservice.google.com.bn/
+ https://adservice.google.com.bo/
+ https://adservice.google.com.br/
+ https://adservice.google.com.by/
+ https://adservice.google.com.bz/
+ https://adservice.google.com.co/
+ https://adservice.google.com.cu/
+ https://adservice.google.com.cy/
+ https://adservice.google.com.do/
+ https://adservice.google.com.ec/
+ https://adservice.google.com.eg/
+ https://adservice.google.com.et/
+ https://adservice.google.com.fj/
+ https://adservice.google.com.ge/
+ https://adservice.google.com.gr/
+ https://adservice.google.com.gh/
+ https://adservice.google.com.gi/
+ https://adservice.google.com.gt/
+ https://adservice.google.com.hk/
+ https://adservice.google.com.iq/
+ https://adservice.google.com.jm/
+ https://adservice.google.com.jo/
+ https://adservice.google.com.kh/
+ https://adservice.google.com.kw/
+ https://adservice.google.com.lb/
+ https://adservice.google.com.ly/
+ https://adservice.google.com.mm/
+ https://adservice.google.com.mt/
+ https://adservice.google.com.mx/
+ https://adservice.google.com.my/
+ https://adservice.google.com.na/
+ https://adservice.google.com.nf/
+ https://adservice.google.com.ng/
+ https://adservice.google.com.ni/
+ https://adservice.google.com.np/
+ https://adservice.google.com.nr/
+ https://adservice.google.com.om/
+ https://adservice.google.com.pa/
+ https://adservice.google.com.pe/
+ https://adservice.google.com.pg/
+ https://adservice.google.com.ph/
+ https://adservice.google.com.pk/
+ https://adservice.google.com.pl/
+ https://adservice.google.com.pr/
+ https://adservice.google.com.py/
+ https://adservice.google.com.qa/
+ https://adservice.google.com.ru/
+ https://adservice.google.com.sa/
+ https://adservice.google.com.sb/
+ https://adservice.google.com.sg/
+ https://adservice.google.com.sl/
+ https://adservice.google.com.sv/
+ https://adservice.google.com.tj/
+ https://adservice.google.com.tn/
+ https://adservice.google.com.tr/
+ https://adservice.google.com.tw/
+ https://adservice.google.com.ua/
+ https://adservice.google.com.uy/
+ https://adservice.google.com.vc/
+ https://adservice.google.com.ve/
+ https://adservice.google.com.vn/
+ https://adservice.google.cv/
+ https://adservice.google.cz/
+ https://adservice.google.de/
+ https://adservice.google.dev/
+ https://adservice.google.dj/
+ https://adservice.google.dk/
+ https://adservice.google.dm/
+ https://adservice.google.dz/
+ https://adservice.google.ec/
+ https://adservice.google.ee/
+ https://adservice.google.es/
+ https://adservice.google.eu/
+ https://adservice.google.fi/
+ https://adservice.google.fm/
+ https://adservice.google.fr/
+ https://adservice.google.ga/
+ https://adservice.google.gd/
+ https://adservice.google.ge/
+ https://adservice.google.gf/
+ https://adservice.google.gg/
+ https://adservice.google.gl/
+ https://adservice.google.gm/
+ https://adservice.google.gp/
+ https://adservice.google.gr/
+ https://adservice.google.gy/
+ https://adservice.google.health/
+ https://adservice.google.hk/
+ https://adservice.google.hn/
+ https://adservice.google.hr/
+ https://adservice.google.ht/
+ https://adservice.google.hu/
+ https://adservice.google.ie/
+ https://adservice.google.im/
+ https://adservice.google.in/
+ https://adservice.google.info/
+ https://adservice.google.io/
+ https://adservice.google.iq/
+ https://adservice.google.is/
+ https://adservice.google.it/
+ https://adservice.google.it.ao/
+ https://adservice.google.je/
+ https://adservice.google.jo/
+ https://adservice.google.jp/
+ https://adservice.google.kg/
+ https://adservice.google.ki/
+ https://adservice.google.kr/
+ https://adservice.google.kz/
+ https://adservice.google.la/
+ https://adservice.google.li/
+ https://adservice.google.lk/
+ https://adservice.google.lt/
+ https://adservice.google.lu/
+ https://adservice.google.lv/
+ https://adservice.google.ma/
+ https://adservice.google.md/
+ https://adservice.google.me/
+ https://adservice.google.meet/
+ https://adservice.google.mg/
+ https://adservice.google.mk/
+ https://adservice.google.ml/
+ https://adservice.google.mn/
+ https://adservice.google.ms/
+ https://adservice.google.mu/
+ https://adservice.google.mv/
+ https://adservice.google.mw/
+ https://adservice.google.mx/
+ https://adservice.google.ne/
+ https://adservice.google.ne.jp/
+ https://adservice.google.ng/
+ https://adservice.google.nl/
+ https://adservice.google.no/
+ https://adservice.google.nr/
+ https://adservice.google.nu/
+ https://adservice.google.off.ai/
+ https://adservice.google.pf/
+ https://adservice.google.ph/
+ https://adservice.google.pk/
+ https://adservice.google.pl/
+ https://adservice.google.pn/
+ https://adservice.google.ps/
+ https://adservice.google.pt/
+ https://adservice.google.qa/
+ https://adservice.google.re/
+ https://adservice.google.ro/
+ https://adservice.google.rs/
+ https://adservice.google.ru/
+ https://adservice.google.rw/
+ https://adservice.google.sc/
+ https://adservice.google.se/
+ https://adservice.google.sg/
+ https://adservice.google.sh/
+ https://adservice.google.si/
+ https://adservice.google.sk/
+ https://adservice.google.sm/
+ https://adservice.google.sn/
+ https://adservice.google.so/
+ https://adservice.google.sr/
+ https://adservice.google.st/
+ https://adservice.google.td/
+ https://adservice.google.tel/
+ https://adservice.google.tg/
+ https://adservice.google.tk/
+ https://adservice.google.tl/
+ https://adservice.google.tm/
+ https://adservice.google.tn/
+ https://adservice.google.to/
+ https://adservice.google.tt/
+ https://adservice.google.tw/
+ https://adservice.google.ua/
+ https://adservice.google.us/
+ https://adservice.google.uz/
+ https://adservice.google.vg/
+ https://adservice.google.vn/
+ https://adservice.google.vu/
+ https://adservice.google.ws/
+ http://adsgoogle.com/
+ https://adsgoogle.com/
+ http://displayads-formats.googleusercontent.com/
+ https://displayads-formats.googleusercontent.com/
+ http://ad-creatives-public.commondatastorage.googleapis.com/
+ https://ad-creatives-public.commondatastorage.googleapis.com/
+ http://video-ad-creatives-public.commondatastorage.googleapis.com/
+ https://video-ad-creatives-public.commondatastorage.googleapis.com/
+ http://google-syndicatedsearch.net/
+ https://google-syndicatedsearch.net/
+ http://google-syndication.com/
+ https://google-syndication.com/
+ http://googlesyndication.com/
+ https://googlesyndication.com/
+ http://googleads.com/
+ https://googleads.com/
+ http://googleads-cn.com/
+ https://googleads-cn.com/
+ http://googleadservices.com/
+ https://googleadservices.com/
+ http://secure.gravatar.com/
+ https://secure.gravatar.com/
+ http://click.discord.com/
+ https://click.discord.com/
+ http://t.co/
+ https://t.co/
+ http://bit.ly/
+ https://bit.ly/
+ http://youtu.be/
+ https://youtu.be/
+ http://links.mozilla.org/
+ https://links.mozilla.org/
+ http://ads.youtube.com/
+ https://ads.youtube.com/
+ http://ads-twitter.com/
+ https://ads-twitter.com/
+ http://ads-api.x.com/
+ https://ads-api.x.com/
+ http://ads-api.twitter.com/
+ https://ads-api.twitter.com/
+ http://location.services.mozilla.com/
+ https://location.services.mozilla.com/
+ http://classify-client.nonprod.webservices.mozgcp.net
+ https://classify-client.nonprod.webservices.mozgcp.net
+ http://classify-client.prod.webservices.mozgcp.net
+ https://classify-client.prod.webservices.mozgcp.net
+ http://ads.allizom.org/
+ https://ads.allizom.org/
+ http://ads.mozilla.org/
+ https://ads.mozilla.org
+ http://ads.nonprod.webservices.mozgcp.net/
+ https://ads.nonprod.webservices.mozgcp.net/
+ http://ads.prod.webservices.mozgcp.net/
+ https://ads.prod.webservices.mozgcp.net/
+ http://contile.services.mozilla.com/
+ https://contile.services.mozilla.com/
+ http://contile-images.services.mozilla.com/
+ https://contile-images.services.mozilla.com/
+ http://getpocket.com/
+ https://getpocket.com/
+ http://getpocket.dev/
+ https://getpocket.dev/
+ http://getpocket.cdn.mozilla.net/
+ https://getpocket.cdn.mozilla.net/
+ http://getpocket-cdn.prod.mozaws.net/
+ https://getpocket-cdn.prod.mozaws.net/
+ http://img-getpocket.cdn.mozilla.net/
+ https://img-getpocket.cdn.mozilla.net/
+ http://pocket.prod.cloudops.mozgcp.net/
+ https://pocket.prod.cloudops.mozgcp.net/
+ http://pocket-image-cache.com/
+ https://pocket-image-cache.com/
+ http://spocs.mozilla.net/
+ https://spocs.mozilla.net/
+ http://snippets.allizom.org/
+ https://snippets.allizom.org/
+ http://snippets.cdn.mozilla.net/
+ https://snippets.cdn.mozilla.net/
+ http://snippets.mozilla.com/
+ https://snippets.mozilla.com/
+ http://snippets-prod.moz.works/
+ https://snippets-prod.moz.works/
+ http://snippets-prod.frankfurt.moz.works/
+ https://snippets-prod.frankfurt.moz.works/
+ http://snippets-prod.oregon-b.moz.works/
+ https://snippets-prod.oregon-b.moz.works/
+ http://snippets-stage.moz.works/
+ https://snippets-stage.moz.works/
+ http://snippets-stage.oregon-b.moz.works/
+ https://snippets-stage.oregon-b.moz.works/
+ http://anonymco.com/
+ https://anonymco.com/
+ http://asan-nightly-frontend-elb-1348905149.us-east-2.elb.amazonaws.com/
+ https://asan-nightly-frontend-elb-1348905149.us-east-2.elb.amazonaws.com/
+ http://crash-reports.allizom.org/
+ https://crash-reports.allizom.org/
+ http://crash-reports.mozilla.com/
+ https://crash-reports.mozilla.com/
+ http://crash-reports-xpsp2.mozilla.com/
+ https://crash-reports-xpsp2.mozilla.com/
+ http://crash-stacks.mozilla.com/
+ https://crash-stacks.mozilla.com/
+ http://crash-stats.allizom.org/
+ https://crash-stats.allizom.org/
+ http://crash-stats.mozilla.com/
+ https://crash-stats.mozilla.com/
+ http://crash-stats.mozilla.org/
+ https://crash-stats.mozilla.org/
+ http://socorro.nonprod.webservices.mozgcp.net/
+ https://socorro.nonprod.webservices.mozgcp.net/
+ http://socorro.prod.webservices.mozgcp.net/
+ https://socorro.prod.webservices.mozgcp.net/
+ http://socorro-collector.services.mozilla.com/
+ https://socorro-collector.services.mozilla.com/
+ http://socorro-webapp-allizom.stage.mozaws.net/
+ https://socorro-webapp-allizom.stage.mozaws.net/
+ http://socorro-webapp.services.mozilla.com/
+ https://socorro-webapp.services.mozilla.com/
+ http://talkback.mozilla.org/
+ https://talkback.mozilla.org/
+ http://talkback-public.mozilla.org/
+ https://talkback-public.mozilla.org/
+ http://talkback-reports.mozilla.org/
+ https://talkback-reports.mozilla.org/
+ http://normandy.cdn.mozilla.net/
+ https://normandy.cdn.mozilla.net/
+ http://normandy.nonprod.cloudops.mozgcp.net/
+ https://normandy.nonprod.cloudops.mozgcp.net/
+ http://normandy.prod.cloudops.mozgcp.net/
+ https://normandy.prod.cloudops.mozgcp.net/
+ http://normandy-cdn.services.mozilla.com/
+ https://normandy-cdn.services.mozilla.com/
+ http://download-stats.mozilla.org/
+ https://download-stats.mozilla.org/
+ http://download-stats.r53-2.services.mozilla.com/
+ https://download-stats.r53-2.services.mozilla.com/
+ http://dap-09-3.api.divviup.org/
+ https://dap-09-3.api.divviup.org/
+ http://dap.services.mozilla.com/
+ https://dap.services.mozilla.com/
+ http://dap.nonprod.webservices.mozgcp.net/
+ https://dap.nonprod.webservices.mozgcp.net/
+ http://dap.prod.webservices.mozgcp.net/
+ https://dap.prod.webservices.mozgcp.net/
+ http://data.mozilla.com/
+ https://data.mozilla.com/
+ http://dataops.mozgcp.net/
+ https://dataops.mozgcp.net/
+ http://dataservices.mozgcp.net/
+ https://dataservices.mozgcp.net/
+ http://fuzzing.mozilla.org/
+ https://fuzzing.mozilla.org/
+ http://incoming-telemetry.thunderbird.net/
+ https://incoming-telemetry.thunderbird.net/
+ http://pipeline-incoming-prod-elb-149169523.us-west-2.elb.amazonaws.com/
+ https://pipeline-incoming-prod-elb-149169523.us-west-2.elb.amazonaws.com/
+ http://telemetry.mozilla.org
+ https://telemetry.mozilla.org
+ http://telemetry-data.r53-2.services.mozilla.com
+ https://telemetry-data.r53-2.services.mozilla.com
+ http://telemetry-incoming.r53-2.services.mozilla.com/
+ https://telemetry-incoming.r53-2.services.mozilla.com/
+ http://telemetry-prod-1054754349.us-east-1.elb.amazonaws.com/
+ https://telemetry-prod-1054754349.us-east-1.elb.amazonaws.com/
+ http://sentry.nonprod.cloudops.mozgcp.net/
+ https://sentry.nonprod.cloudops.mozgcp.net/
+ http://sentry.prod.cloudops.mozgcp.net/
+ https://sentry.prod.cloudops.mozgcp.net/
+ http://telemetry-coverage.mozilla.org/
+ https://telemetry-coverage.mozilla.org/
+ http://telemetry-coverage.r53-2.services.mozilla.com/
+ https://telemetry-coverage.r53-2.services.mozilla.com/
+ http://discovery.addons.allizom.org/
+ https://discovery.addons.allizom.org/
+ http://discovery.addons.mozilla.org/
+ https://discovery.addons.mozilla.org/
+ http://discovery.addons-dev.allizom.org/
+ https://discovery.addons-dev.allizom.org/
+ http://merino.nonprod.cloudops.mozgcp.net/
+ https://merino.nonprod.cloudops.mozgcp.net/
+ http://merino.prod.cloudops.mozgcp.net/
+ https://merino.prod.cloudops.mozgcp.net/
+ http://merino.services.mozilla.com/
+ https://merino.services.mozilla.com/
+ http://autoconnect.stage.mozaws.net/
+ https://autoconnect.stage.mozaws.net/
+ http://autopush.prod.mozaws.net/
+ https://autopush.prod.mozaws.net/
+ http://autopush.stage.mozaws.net/
+ https://autopush.stage.mozaws.net/
+ http://push.services.mozilla.com/
+ https://push.services.mozilla.com/
+ http://fakespot.com/
+ https://fakespot.com/
+ http://fakespot.io
+ https://fakespot.io
+ http://mozilla-ohttp-fakespot.fastly-edge.com/
+ https://mozilla-ohttp-fakespot.fastly-edge.com/
+
+
+ DNSOverHTTPS
+
+ Enabled
+
+ Fallback
+
+ Locked
+
+ ProviderURL
+ https://dns.quad9.net/dns-query
+
+ DisableTelemetry
+
+ EnterprisePoliciesEnabled
+
+ ExtensionSettings
+
+ *
+
+ allowed_types
+
+ extension
+ theme
+ dictionary
+ locale
+
+ blocked_install_message
+ I am Iron Man.
+ install_sources
+
+ https://addons.thunderbird.net/*
+ https://archive.mozilla.org/pub/labs/*
+ https://archive.mozilla.org/pub/system-addons/*
+ https://archive.mozilla.org/pub/thunderbird/*
+ https://ftp.mozilla.org/pub/labs/*
+ https://ftp.mozilla.org/pub/system-addons/*
+ https://ftp.mozilla.org/pub/thunderbird/*
+ https://gitflic.ru/project/magnolia1234/bpc_uploads/blob/raw?file=bypass_paywalls_clean-latest.xpi&inline=false
+ https://github.com/anticensority/runet-censorship-bypass/releases
+ https://github.com/anticensority/runet-censorship-bypass/releases/*
+ https://github.com/anticensority/runet-censorship-bypass/releases*
+ https://github.com/darkreader/darkreader/releases
+ https://github.com/darkreader/darkreader/releases/*
+ https://github.com/darkreader/darkreader/releases*
+ https://github.com/FastForwardTeam/FastForward/releases
+ https://github.com/FastForwardTeam/FastForward/releases/*
+ https://github.com/FastForwardTeam/FastForward/releases*
+ https://github.com/fmhy/FMHY-SafeGuard/releases
+ https://github.com/fmhy/FMHY-SafeGuard/releases/*
+ https://github.com/fmhy/FMHY-SafeGuard/releases*
+ https://github.com/gorhill/uBlock/releases
+ https://github.com/gorhill/uBlock/releases/*
+ https://github.com/gorhill/uBlock/releases*
+ https://objects.githubusercontent.com/github-production-release-asset-2e65be/26682105/*
+ https://objects.githubusercontent.com/github-production-release-asset-2e65be/33263118/*
+ https://objects.githubusercontent.com/github-production-release-asset-2e65be/404295988/*
+ https://objects.githubusercontent.com/github-production-release-asset-2e65be/46041549/*
+ https://objects.githubusercontent.com/github-production-release-asset-2e65be/873923787/*
+ https://releases.mozilla.org/pub/labs/*
+ https://releases.mozilla.org/pub/system-addons/*
+ https://releases.mozilla.org/pub/thunderbird/*
+
+ temporarily_allow_weak_signatures
+
+ updates_disabled
+
+
+ 1block@example.com
+
+ blocked_install_message
+ Dead? Adblock - 1Block, by 1VPN. Highly sketchy, appears to even contain advertising. Avoid & just use uBlock Origin instead.
+ installation_mode
+ blocked
+
+ 1und1@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in 1&1 Internet Search Engine in some regions. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/1und1/manifest.json
+ installation_mode
+ blocked
+
+ 1vpn@example.com
+
+ blocked_install_message
+ Free VPN & Adblock - 1VPN, by 1VPN. See 1Block above. Highly sketchy, appears to even contain advertising. Avoid & just use uBlock Origin with a reputable VPN like Proton or Mullvad instead.
+ installation_mode
+ blocked
+
+ 87677a2c52b84ad3a151a4a72f5bd3c4@jetpack
+
+ blocked_install_message
+ Grammarly. Keylogger, also very sketchy... if you insist on this type of invasive spell-checking, just use LanguageTool instead, though even that I would be cautious of.
+ installation_mode
+ blocked
+
+ @contain-facebook
+
+ blocked_install_message
+ Facebook Container, by Mozilla. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Facebook, you can do so at about:preferences#general or through the Multi-Account Containers extension instead.
+ installation_mode
+ blocked
+
+ @contain-facebook-newalexandria
+
+ blocked_install_message
+ Facebook Container - Expanded, by New Alexandria. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Facebook, you can do so at about:preferences#general or through the Multi-Account Containers extension instead. Also appears dead anyways.
+ installation_mode
+ blocked
+
+ @contain-google
+
+ blocked_install_message
+ Google Container, by containers-everywhere. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Google, you can do so at about:preferences#general or through the Multi-Account Containers extension instead. Also appears dead anyways.
+ installation_mode
+ blocked
+
+ @contain-google-minus-youtube
+
+ blocked_install_message
+ Google Container Minus YouTube, by yoasif. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Google, you can do so at about:preferences#general or through the Multi-Account Containers extension instead.
+ installation_mode
+ blocked
+
+ @contain-google-minus-youtube-and-searchpages
+
+ blocked_install_message
+ Google Container Minus YouTube & Search Pages, by Bernd Bestel. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Google, you can do so at about:preferences#general or through the Multi-Account Containers extension instead.
+ installation_mode
+ blocked
+
+ @contain-google-with-integrations
+
+ blocked_install_message
+ Google Container - with Integrations, by New Alexandria. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Google, you can do so at about:preferences#general or through the Multi-Account Containers extension instead. Also appears dead anyways.
+ installation_mode
+ blocked
+
+ @contain-twitter
+
+ blocked_install_message
+ Twitter Container, by Vishwa. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Twitter, you can do so at about:preferences#general or through the Multi-Account Containers extension instead.
+ installation_mode
+ blocked
+
+ @twitter_x_container
+
+ blocked_install_message
+ Twitter/X Container, by Zachary E. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Twitter, you can do so at about:preferences#general or through the Multi-Account Containers extension instead.
+ installation_mode
+ blocked
+
+ @yahoo_wider_mail_extension
+
+ blocked_install_message
+ Search and Wider Mail, by Yahoo. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ @yset
+
+ blocked_install_message
+ Yahoo Search Addon, by Yahoo. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ BraveSearchExtension@io.Uvera
+
+ blocked_install_message
+ Brave search, by Dusan Uveric. Extension is unnecessary, just add Brave Search in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ CanvasBlocker@kkapsner.de
+
+ blocked_install_message
+ CanvasBlocker, unnecessary with RFP or ETP (Which we enforce).
+ installation_mode
+ blocked
+
+ Converter_Suite_fqRObEsLaM@convertersuite.com
+
+ blocked_install_message
+ Converter Suite. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ Easy_Games_Tab_zKsDuEzLrv@easygamestab.com
+
+ blocked_install_message
+ Easy Games Tab & Custom Web Search, by EasyGamesTab. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ Easy_Manuals_Finder_and_Custom_Web_Search_KtQPWLAgRu@easymanualsfinder.co
+
+ blocked_install_message
+ Easy Manuals Finder & Custom Web Search. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ Ezy_Alarm_Clock___Custom_Web_Search_aGDLGGilLT@ezyalarmclock.com
+
+ blocked_install_message
+ Ezy Alarm Clock & Custom Web Search, by Ezy Alarm Clock & Custom Web Search. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ Ezy_Photo_Tab___Custom_Web_Search_YALalKMirg@ezyphototab.com
+
+ blocked_install_message
+ Ezy Photo Tab & Custom Web Search, by EzyPhotoTab. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ Ezy_Screenshot___Custom_Web_Search_nKZANPHKLR@ezyscreenshot.com
+
+ blocked_install_message
+ Ezy Screenshot & Custom Web Search, by Ezy Screenshot. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ Ezy_Speed_Test___Custom_Web_Search_nybAAzaSyK@ezyspeedtest.com
+
+ blocked_install_message
+ Ezy Speed Test & Custom Web Search, by Ezy Speed Test. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ Flight_Tab_Pro___Custom_Web_Search_yVOErTvhoC@flighttabpro.com
+
+ blocked_install_message
+ Flight Tab Pro & Custom Web Search, by FlightTabPro. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ FreespokeSearchExtension@com.Freespoke
+
+ blocked_install_message
+ Freespoke Search. Extension is unnecessary, just add this in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ InternetProtection@360safe.com
+
+ blocked_install_message
+ 360 Internet Protection, by 360 Total Security. Highly sketchy, also unnecessary with Google Safe Browsing & uBlock Origin. Avoid.
+ installation_mode
+ blocked
+
+ Maps_Assist___Custom_Web_Search_VeyzPDMlKh@mapsassist.com
+
+ blocked_install_message
+ Maps Assist & Custom Web Search. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ Package_Tracking_Tab___Custom_Web_Search_JVVfIFSBVe@packagetrackingtab.com
+
+ blocked_install_message
+ Package Tracking Tab & Custom Web Search, by PackageTrackingTab. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ Quick_Live_News_spxMukSrlT@quicklivenews.com
+
+ blocked_install_message
+ Quick Live News & Custom Web Search, by QuickLiveNews. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ Quick_Recipe_Hub___Custom_Web_Search_MTyoGHhulF@quickrecipehub.com
+
+ blocked_install_message
+ Quick Recipe Hub & Custom Web Search, by Quick Recipe Hub. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ Safeplex_Search_qeKaqkdrwd@safeplexsearch.com
+
+ blocked_install_message
+ Safeplex Search. Hijacks search engine to Yahoo without user consent/knowledge. (Also just completely unncessary anyways with uBlock Origin & Google Safe Browsing :/)
+ installation_mode
+ blocked
+
+ StartpageSearchExtension@roteKlaue
+
+ blocked_install_message
+ Startpage search, by roteKlaue. Unncessary, just add Startpage in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ Task_Manager_Tab___Custom_Web_Search_nKQMsPVbct@taskmanagertab.com
+
+ blocked_install_message
+ Task Manager Tab & Custom Web Search, by TaskManagerTab. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ Turbo_Converter___Custom_Web_Search_jkERzVmVos@turboconverter.co
+
+ blocked_install_message
+ Turbo Converter & Custom Web Search, by Turbo Converter. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ Weather_Authority___Custom_Web_Search_TOLImHKtPk@weatherauthority.co
+
+ blocked_install_message
+ Weather Authority & Custom Web Search, by Weather Authority. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ YandexSearchExtension@io.librity
+
+ blocked_install_message
+ Yandex search, by Librity. Please don't use Yandex... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ abb@amazon.com
+
+ blocked_install-message
+ Amazon Assistant, raises serious privacy concerns. Also appears dead anyways.
+ installation_mode
+ blocked
+
+ active_eue_enteprise@bmc.com
+
+ blocked_install_message
+ BMC TrueSight, Real User Monitoring, probably self-explanatory why blocked...
+ installation_mode
+ blocked
+
+ adblockultimate@adblockultimate.net
+
+ blocked_install_message
+ AdBlocker Ultimate, by AdAvoid. Highly sketchy. https://x.com/gorhill/status/1165747661691064322. Just use uBlock Origin.
+ installation_mode
+ blocked
+
+ addon@customsearchtool.com
+
+ blocked_install_message
+ Custom Search Tool. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ addon@documentconverter.com
+
+ blocked_install_message
+ Document Converter & Search. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ addon@maproutepro.com
+
+ blocked_install_message
+ Map Route Pro and Search. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ addon@speedtestmeter.com
+
+ blocked_install_message
+ Speed Test Meter and Search. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ addon@trendingnews.com
+
+ blocked_install_message
+ Trending News & Search. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ ads@mozac.org
+
+ blocked_install_message
+ Mozilla Android Components - Ads Telemetry...
+ installation_mode
+ blocked
+
+ allegro-pl@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Allegro Search Engine in some regions. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/allegro-pl/manifest.json
+ installation_mode
+ blocked
+
+ amazon@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Amazon Search Engine. Amazon should be avoided due to its horrible privacy practices, but regardless, Amazon still appears to be selectable as a search engine with this removed. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/amazon/manifest.json
+ installation_mode
+ blocked
+
+ amazondotcn@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Amazon Search Engine. Amazon should be avoided due to its horrible privacy practices, but regardless, Amazon still appears to be selectable as a search engine with this removed. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/amazondotcn/manifest.json
+ installation_mode
+ blocked
+
+ amazondotcom@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Amazon Search Engine. Amazon should be avoided due to its horrible privacy practices, but regardless, Amazon still appears to be selectable as a search engine with this removed. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/amazondotcom/manifest.json
+ installation_mode
+ blocked
+
+ aos@avg.com
+
+ blocked_install_message
+ AVG Online Security, by Avast. Highly sketchy & known for selling data. Also unnecessary with Google Safe Browsing & uBlock Origin, avoid.
+ installation_mode
+ blocked
+
+ baidu@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Baidu Search Engine in some regions. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/baidu/manifest.json
+ installation_mode
+ blocked
+
+ bing@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Bing Search Engine. Bing should be avoided due to its horrible privacy practices, but regardless, Bing still appears to be selectable as a search engine with this removed. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/bing/manifest.json
+ installation_mode
+ blocked
+
+ bravesearch@celenity.dev
+
+ blocked_install_message
+ Deprecated
+ installation_mode
+ blocked
+
+ ceneji@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Ceneje Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/ceneji/manifest.json
+ installation_mode
+ blocked
+
+ coccoc@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Cốc Cốc Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/coccoc/manifest.json
+ installation_mode
+ blocked
+
+ cookies@mozac.org
+
+ blocked_install_message
+ Mozilla Android Components - Search Telemetry...
+ installation_mode
+ blocked
+
+ daum-kr@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Daum Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/daum-kr/manifest.json
+ installation_mode
+ blocked
+
+ ddg@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in DuckDuckGo Search Engine. We replace with our own to set it as the default...
+ installation_mode
+ blocked
+
+ dkim_verifier@pl
+
+ install_url
+ https://addons.thunderbird.net/thunderbird/downloads/latest/dkim-verifier/latest.xpi
+ installation_mode
+ normal_installed
+ private_browsing
+
+ temporarily_allow_weak_signatures
+
+ updates_disabled
+
+
+ earthview360_newvers@earthview360.org
+
+ blocked_install_message
+ Earth View 360° & Custom Web Search. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ easydrivingdirections_newvers@easydrivingdirections.com
+
+ blocked_install_message
+ Maps & Driving Directions. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ easyprint@easyprintapp.net
+
+ blocked_install_message
+ Easy Print. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ ebay@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in eBay Search Engine. eBay should be avoided due to its horrible privacy practices, but regardless, eBay still appears to be selectable as a search engine with this removed. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/ebay/manifest.json
+ installation_mode
+ blocked
+
+ ebooksearch1@candytech.com
+
+ blocked_install_message
+ eBook Search, by Candytechltd. Hijacks search engine to genieosearch.com without user consent/knowledge.
+ installation_mode
+ blocked
+
+ ep@FreeTestNow
+
+ blocked_install_message
+ Sponsored Search, by SearchesCentral/Search Smart/FreeTestNow. Adware & hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ eudict@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in EUdict Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/eudict/manifest.json
+ installation_mode
+ blocked
+
+ firefox-addon@expressvpn.com
+
+ blocked_install_message
+ ExpressVPN, by Kape. Highly sketchy. Please just use a trustworthy VPN like Mullvad or ProtonVPN instead.
+ installation_mode
+ blocked
+
+ firefox-translations-addon@mozilla.org
+
+ blocked_install_message
+ Firefox Translations, by Mozilla. Dead. Also unnecessary since the Translations feature is now built in.
+ installation_mode
+ blocked
+
+ firefox-webext@zenmate.com
+
+ blocked_install_message
+ ZenMate Free VPN, by ZenMate (Kape). Highly sketchy, please just use a trustworthy VPN like Mullvad or ProtonVPN instead
+ installation_mode
+ blocked
+
+ firefox@ghostery.com
+
+ blocked_install_message
+ Ghostery Privacy Ad Blocker. Highly sketchy, has previously sold user data, Just use uBlock Origin.
+ installation_mode
+ blocked
+
+ firefox@hg.newsguardtech.com
+
+ blocked_install_message
+ HealthGuard, by NewsGuard. Sketchy & poor privacy policy.
+ installation_mode
+ blocked
+
+ firefox@newsguardtech.com
+
+ blocked_install_message
+ NewsGuard, sketchy & poor privacy policy.
+ installation_mode
+ blocked
+
+ firefox@tampermonkey.net
+
+ blocked_install_message
+ Tampermonkey. Closed source, just use Violentmonkey instead if needed.
+ installation_mode
+ blocked
+
+ firefox@vid.io
+
+ blocked_install_message
+ vidIQ Vision for YouTube, by vidIQ. Sketchy.
+ installation_mode
+ blocked
+
+ gmx@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in GMX Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/gmx/manifest.json
+ installation_mode
+ blocked
+
+ google@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Google Search Engine. Google should be avoided due to its horrible privacy practices, but regardless, Google still appears to be selectable as a search engine with this removed. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/google/manifest.json
+ installation_mode
+ blocked
+
+ gulesider-NO@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Gulesider.no Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/gulesider-NO/manifest.json
+ installation_mode
+ blocked
+
+ homeutil@yandex.ru
+
+ blocked_install_message
+ Yandex - Homepage, by Yandex. Please don't use Yandex... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ https-by-default@robwu.nl
+
+ blocked_install_message
+ HTTPS by default, by Rob W. Useless with HTTPS-Only Mode (which we enforce).
+ installation_mode
+ blocked
+
+ https-everywhere@eff.org
+
+ blocked_install_message
+ HTTPS Everywhere. Deprecated, also useless with HTTPS-Only Mode (which we enforce) anyways.
+ installation_mode
+ blocked
+
+ idsafe@norton.com
+
+ blocked_install_message
+ Norton Password Manager, by Norton. Must I say more? Would almost rather getting a virus than installing this crap...
+ installation_mode
+ blocked
+
+ jid1-16aeif9OQIRKxA@jetpack
+
+ blocked_install_message
+ Search and New Tab, by Yahoo. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ jid1-93CWPmRbVPjRQA@jetpack
+
+ blocked_install_message
+ Honey, by PayPal, horrible privacy policy.
+ installation_mode
+ blocked
+
+ jid1-BoFifL9Vbdl2zQ@jetpack
+
+ blocked_install_message
+ Decentraleyes. Very outdated, just use LocalCDN instead if needed.
+ installation_mode
+ blocked
+
+ jid1-G80Ec8LLEbK5fQ@jetpack
+
+ blocked_install_message
+ New Tab, by Yahoo. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ jid1-KKzOGWgsW3Ao4Q@jetpack
+
+ blocked_install_message
+ I don't care about cookies, by Avast. Highly sketchy & known for selling data. Just use Firefox's built-in cookie banner blocking & uBlock Origin, or `I still don't care about cookies` if really needed instead.
+ installation_mode
+ blocked
+
+ jid1-NIfFY2CA8fy1tg@jetpack
+
+ blocked_install_message
+ AdBlock, by Eyeo. Highly sketchy, avoid & just use uBlock Origin instead.
+ installation_mode
+ blocked
+
+ jid1-dwtFBkQjb3SIQp@jetpack
+
+ blocked_install_message
+ AdBlocker Lite, appears dead.
+ installation_mode
+ blocked
+
+ jid1-n8wH2cBfc2QaUj@jetpack
+
+ blocked_install_message
+ Flash Block (Plus), by AdblockLite. Dead technology, but for some reason this is still being updated?
+ installation_mode
+ blocked
+
+ jsr@javascriptrestrictor
+
+ blocked_install_message
+ JShelter, by Libor Polčák. Unnecessary with RFP or ETP (Which we enforce).
+ installation_mode
+ blocked
+
+ kagi-html@celenity.dev
+
+ blocked_install_message
+ Deprecated
+ installation_mode
+ blocked
+
+ kagi@celenity.dev
+
+ blocked_install_message
+ Deprecated
+ installation_mode
+ blocked
+
+ leo_ende_de@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in LEO Eng-Deu Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/leo_ende_de/manifest.json
+ installation_mode
+ blocked
+
+ leta-brave@celenity.dev
+
+ blocked_install_message
+ Deprecated
+ installation_mode
+ blocked
+
+ leta-google@celenity.dev
+
+ blocked_install_message
+ Deprecated
+ installation_mode
+ blocked
+
+ longdo@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Longdo Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/longdo/manifest.json
+ installation_mode
+ blocked
+
+ mailcom@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in mail.com Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/mailcom/manifest.json
+ installation_mode
+ blocked
+
+ mailru@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in @ Mail (mail.ru) Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/mailru/manifest.json
+ installation_mode
+ blocked
+
+ mapy-cz@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Mapy.cz Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/mapy-cz/manifest.json
+ installation_mode
+ blocked
+
+ mercadolibre@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in MercadoLibre Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/mercadolibre/manifest.json
+ installation_mode
+ blocked
+
+ mercadolivre@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in MercadoLivre Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/mercadolivre/manifest.json
+ installation_mode
+ blocked
+
+ metager@celenity.dev
+
+ blocked_install_message
+ Deprecated
+ installation_mode
+ blocked
+
+ mipfingerprint@mip.co.za
+
+ blocked_install_message
+ MIP Fingerprint, by MIP Holdings. Unnecessary with RFP or ETP (Which we enforce). Also appears dead.
+ installation_mode
+ blocked
+
+ naver-kr@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in NAVER Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/naver-kr/manifest.json
+ installation_mode
+ blocked
+
+ nordpass@nordpass.com
+
+ blocked_install_message
+ NordPass, by NordVPN. Highly sketchy. Please just use a trustworthy password manager like Bitwarden or Proton Pass instead.
+ installation_mode
+ blocked
+
+ nordpassStandalone@nordsecurity.com
+
+ blocked_install_message
+ NordPass, by NordVPN. Highly sketchy. Please just use a trustworthy password manager like Bitwarden or Proton Pass instead.
+ installation_mode
+ blocked
+
+ nordvpnproxy@nordvpn.com
+
+ blocked_install_message
+ NordVPN, highly sketchy. Please just use a trustworthy VPN like Mullvad or ProtonVPN instead.
+ installation_mode
+ blocked
+
+ nortonsafeweb@symantec.com
+
+ blocked_install_message
+ Norton Safe Web, by Norton. Must I say more? Would almost rather getting a virus than installing this crap... Also unnecessary with Google Safe Browsing & uBlock Origin, avoid.
+ installtaion_mode
+ blocked
+
+ odpiralni@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Odpiralni Časi Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/odpiralni/manifest.json
+ installation_mode
+ blocked
+
+ pazaruvaj@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Pazaruvaj Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/pazaruvaj/manifest.json
+ installation_mode
+ blocked
+
+ priberam@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Priberam Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/priberam/manifest.json
+ installation_mode
+ blocked
+
+ prisjakt-sv-SE@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Prisjakt Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/prisjakt-sv-SE/manifest.json
+ installation_mode
+ blocked
+
+ qwant-p1-firefox@qwant.com
+
+ blocked_install_message
+ Qwant for you, by Qwant. Unnecessary, just set in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ qwant-search-firefox@qwant.com
+
+ blocked_install_message
+ Qwant - Search engine, by Qwant. Unnecessary, just set in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ qwantcomforfirefox@jetpack
+
+ blocked_install_message
+ Qwant VIPrivacy, by Qwant. Unnecessary, just set in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ rakuten@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Rakuten Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/rakuten/manifest.json
+ installation_mode
+ blocked
+
+ readmoo@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Readmoo Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/readmoo/manifest.json
+ installation_mode
+ blocked
+
+ salidzinilv@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Salidzini.lv Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/salidzinilv/manifest.json
+ installation_mode
+ blocked
+
+ search-fastshare.cz@jirka-justra.cz
+
+ blocked_install_message
+ search-fastshare.cz, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ search-gearslutz@jirka-justra.cz
+
+ blocked_install_message
+ search-gearslutz, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ search-kytary.cz@jirka-justra.cz
+
+ blocked_install_message
+ search-kytary.cz, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ search-odysee.com@jirka-justra.cz
+
+ blocked_install_message
+ search-odysee.com, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ search-searx@jirka-justra.cz
+
+ blocked_install_message
+ search-searx, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ search-thomann--cz@jirka-justra.cz
+
+ blocked_install_message
+ search-thomann--cz, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ search-thomann--intl@jirka-justra.cz
+
+ blocked_install_message
+ search-thomann--intl, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ search@ghostery.com
+
+ blocked_install_message
+ Ghostery Private Search for Firefox, by Ghostery. Unnecessary, just set in either about:preferences#search or from the Omnibox. I would avoid Ghostery Search anyways due to the company's sketchy practices & past of selling user data.
+ installation_mode
+ blocked
+
+ secureline-vpn@avast.com
+
+ blocked_install_message
+ Avast SecureLine VPN, by Avast. Highly sketchy & known for selling data.
+ installation_mode
+ blocked
+
+ seznam-cz@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Seznam Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/seznam-cz/manifest.json
+ installation_mode
+ blocked
+
+ sp@SearchSmart
+
+ blocked_install_message
+ Search Smart, by SearchesCentral/Search Smart/FreeTestNow. Adware & hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ sp@SearchesCentral
+
+ blocked_install_message
+ Sponsored Search, by SearchesCentral/Search Smart/FreeTestNow. Adware & hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ sp@avast.com
+
+ blocked_install_message
+ Avast SafePrice, by Avast. Highly sketchy & known for selling data.
+ installation_mode
+ blocked
+
+ support@lastpass.com
+
+ blocked_install_message
+ LastPass Password Manager, by LastPass. Sketchy & has had serious breaches. Please just use a trustworthy password manager like Bitwarden or Proton Pass instead.
+ installation_mode
+ blocked
+
+ support@netzilo.com
+
+ blocked_install_message
+ Netzilo Secure Browser, by Netzilo Inc. Remote Monitoring.
+ installation_mode
+ blocked
+
+ swisscows@swisscows.ch
+
+ blocked_install_message
+ Swisscows, by Swisscows AG. Extension is unnecessary, just set Swisscows in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ tyda-sv-SE@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Tyda.se Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/tyda-sv-SE/manifest.json
+ installation_mode
+ blocked
+
+ uBlock0@raymondhill.net
+
+ install_url
+ https://github.com/gorhill/uBlock/releases/download/1.62.0/uBlock0_1.62.0.thunderbird.xpi
+ installation_mode
+ normal_installed
+ private_browsing
+
+ temporarily_allow_weak_signatures
+
+ updates_disabled
+
+
+ vatera@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Vatera.hu Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/vatera/manifest.json
+ installation_mode
+ blocked
+
+ viewmanuals_newvers@viewmanuals.com
+
+ blocked_install_message
+ View Manuals & Custom Web Search, by View Manuals. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ viewpdf_newvers@viewpdf.org
+
+ blocked_install_message
+ View PDF. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ viewrecipes_aill@viewrecipes.net
+
+ blocked_install_message
+ View Recipes & Custom Web Search, by View Recipes. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ weather@yandex.ru
+
+ blocked_install_message
+ Yandex Elements Weather, by Yandex. Extremely sketchy, requires highly invasive permissions. Yandex generally is sketchy and should be avoided. Just use Firefox's new weather feature on about:home, or an extension like Tabliss.
+ installation_mode
+ blocked
+
+ webde@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in WEB.DE Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/webde/manifest.json
+ installation_mode
+ blocked
+
+ webrootsecure@webroot.com
+
+ blocked_install_message
+ Web Threat Shield, by Webroot. Seen this force install itself on various PCs. Also unnecessary with Google Safe Browsing & uBlock Origin, avoid.
+ installation_mode
+ blocked
+
+ wolnelektury-pl@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Wolne Lektury Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/wolnelektury-pl/manifest.json
+ installation_mode
+ blocked
+
+ wrc@avast.com
+
+ blocked_install_message
+ Avast Online Security, by Avast. Highly sketchy & known for selling data. Also unnecessary with Google Safe Browsing & uBlock Origin, avoid.
+ installation_mode
+ blocked
+
+ yahoo-jp-auctions@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Yahoo! Auctions Search Engine. Should be avoided due to its horrible privacy practices, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/yahoo-jp-auctions/manifest.json
+ installation_mode
+ blocked
+
+ yahoo-jp@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Yahoo! Search Engine. Should be avoided due to its horrible privacy practices, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/yahoo-jp/manifest.json
+ installation_mode
+ blocked
+
+ yandex@search.mozilla.org
+
+ blocked_install_message
+ Mozilla's extension for the built-in Yandex Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/yandex/manifest.json
+ installation_mode
+ blocked
+
+ yasearch@yandex.ru
+
+ blocked_install_message
+ Yandex.Bar, by Yandex. Please don't use Yandex... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ {0220de78-d398-47cb-8323-ebab3a845d01}
+
+ blocked_install_message
+ Yahoo New Tab, by heubergen. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ {07bccf58-b5f1-425c-b7ad-2301e1a42704}
+
+ blocked_install_message
+ Fingerprint shelter, by Ol. Unnecessary with RFP or ETP (Which we enforce). Also appears dead.
+ installation_mode
+ blocked
+
+ {0dce8429-bdf7-4610-b3cf-72d0f86278d5}
+
+ blocked_install_message
+ Robux Changer, by indxd. Just use Inspect Element.
+ installation_mode
+ blocked
+
+ {17c75373-e1fc-43a5-a05b-7f17e306359e}
+
+ blocked_install_message
+ Stay secure with CyberGhost VPN Free Proxy, by Running __Elephants. CyberGhost is Highly sketchy, by Kape. This extension also appears fake & unmaintained. Please just use a trustworthy VPN like Mullvad or ProtonVPN instead.
+ installation_mode
+ blocked
+
+ {1e924475-d910-44ab-bed8-af34439d2a8a}
+
+ blocked_install_message
+ Just Search Qwant, by Naresh. Extension is unnecessary, just add Qwant in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ {20fc2e06-e3e4-4b2b-812b-ab431220cada}
+
+ blocked_install_message
+ Startpage. Unncessary, just set in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ {248e6a49-f636-4c81-9899-a456eb6291a8}
+
+ blocked_install_message
+ Ground News Bias Checker, by Ground News. Very sketchy, poor privacy policy. Avoid.
+ installation_mode
+ blocked
+
+ {25f17283-8325-42fb-812e-193c8de90b04}
+
+ blocked_install_message
+ Sport Search, by GetTheResult. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ {2a168bd0-55d2-466f-9c68-077c416943be}
+
+ blocked_install_message
+ YouTube Search Engine, by A. Taha Baki. Extension is unnecessary, just add YouTube in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ {2cf5dbed-78fe-4bd5-9524-38fdf837be98}
+
+ blocked_install_message
+ WebGL Fingerprint Defender, by ilGur. Unnecessary with RFP or ETP (Which we enforce).
+ installation_mode
+ blocked
+
+ {2d158f19-1146-4bfe-9085-cc15f947bb35}
+
+ blocked_install_message
+ Yahoo! Search, by balduran98. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ {2e0fa8dd-c43c-438c-b77b-95ddc3d893ec}
+
+ blocked_install_message
+ Add Brave Search, by maaa. Extension is unnecessary, just add Brave Search in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ {2ed00a98-3452-4535-a99d-0bb13056d09f}
+
+ blocked_install_message
+ Browser Plugs Spoof FP Random, by BrowserPlugs. Unnecessary with RFP or ETP (Which we enforce).
+ installation_mode
+ blocked
+
+ {2f182d41-fd03-4a6d-938d-081419586c37}
+
+ blocked_install_message
+ Google Analytics Opt-out, by emano waldeck. Unnecessary with content blocking.
+ installation_mode
+ blocked
+
+ {3968ec87-3c9f-45cd-8d9e-7f6d1f3a5093}
+
+ blocked_install_message
+ Glider Proctoring, by GLIDER.ai. Used for remote monitoring/test 'Proctoring'
+ installation_mode
+ blocked
+
+ {3e4d2037-d300-4e95-859d-3cba866f46d3}
+
+ blocked_install_message
+ Private Internet Access, by Kape. Highly sketchy. Please just use a trustworthy VPN like Mullvad or ProtonVPN instead.
+ installation_mode
+ blocked
+
+ {43d20840-2895-4866-9d79-4f6f2ea537f7}
+
+ blocked_install_message
+ Music Search, by GetTheResult. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ {441ae0e7-c955-4b0e-8209-99462af458db}
+
+ blocked_install_message
+ Presearch.com Search Extension. Extension is unnecessary, just add this in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ {44df5123-f715-9146-bfaa-c6e8d4461d44}
+
+ blocked_install_message
+ Fakespot, by Mozilla. Poor privacy policy.
+ installation_mode
+ blocked
+
+ {46cc18f3-9054-4edd-9441-102a1021b5d0}
+
+ blocked_install_message
+ Fingerprint Spoof, by ns. Unnecessary with RFP or ETP (Which we enforce). Also appears dead.
+ installation_mode
+ blocked
+
+ {4d5b7a5e-5232-9e45-97f4-f8e1ca2626e5}
+
+ blocked_install_message
+ Eno® from Capital One®, by Capital One. Very sketchy, avoid.
+ installation_mode
+ blocked
+
+ {50f5675e-2d43-4894-a3b6-ad933f6a31a0}
+
+ blocked_install_message
+ SignalHire. Data Broker.
+ installation_mode
+ blocked
+
+ {585280b0-ee78-428a-92c5-3fb3c0b85460}
+
+ blocked_install_message
+ CyberGhost VPN Free Proxy, by Kape. Highly sketchy. Please just use a trustworthy VPN like Mullvad or ProtonVPN instead.
+ installation_mode
+ blocked
+
+ {635abd67-4fe9-1b23-4f01-e679fa7484c1}
+
+ blocked_install_message
+ Yahoo Toolbar and New Tab, by Yahoo. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ {6476684c-e1dc-4505-8bb6-5f0f9663f78e}
+
+ blocked_install_message
+ BP Block Font Fingerprint, by BrowserPlugs. Unnecessary with RFP or ETP (Which we enforce).
+ installation_mode
+ blocked
+
+ {67ed3e87-6d34-4e72-9482-45876b90cf8d}
+
+ blocked_install_message
+ GLIDER.ai Proctoring, by GLIDER.ai. Used for remote monitoring/test 'Proctoring'
+ installation_mode
+ blocked
+
+ {6cbc4940-eb87-4dba-9654-1002fb91e9e0}
+
+ blocked_install_message
+ Google Tag Manager Blocker, by heubergen. Unnecessary with uBlock Origin or any content blocking extension.
+ installation_mode
+ blocked
+
+ {6ff498ff-a3b6-4891-a614-12a825d4efcf}
+
+ blocked_install_message
+ Trace, by AbsoluteDouble. Unnecessary with RFP or ETP (Which we enforce). Also appears dead.
+ intallation_mode
+ blocked
+
+ {710a25a7-051f-4059-8952-abbaa9aa6121}
+
+ blocked_install_message
+ FakeBux for Roblox, by LuckyDev. Just use Inspect Element.
+ installation_mode
+ blocked
+
+ {7313aced-ab7c-40fb-bf3a-115e91ba6c2a}
+
+ blocked_install_message
+ Maps Driving Directions, by MyDirections. Hijacks search engine & new tab page, accesses browser history, very sketchy...
+ installation_mode
+ blocked
+
+ {732216ec-0dab-43bb-ac85-4b5e1977599d}
+
+ blocked_install_message
+ Surfshark VPN Extension, by NordVPN. Highly sketchy. Please just use a trustworthy VPN like Mullvad or ProtonVPN instead.
+ installation_mode
+ blocked
+
+ {74fc443d-ab0b-42b2-95d0-890f2d8092cb}
+
+ blocked_install_message
+ HTTP to HTTPS, by Balvin. Useless with HTTPS-Only Mode (which we enforce).
+ installation_mode
+ blocked
+
+ {76f42345-d120-4c8e-bdd4-63cf95b780fb}
+
+ blocked_install_message
+ CyberGhost Cookie Cleaner, by Kape. Highly sketchy... and also completely useless with our tweaks. Avoid.
+ installation_mode
+ blocked
+
+ {7e39f3c8-2ef5-46ea-80d0-f8b8f72541c5}
+
+ blocked_install_message
+ MSN Homepage, New Tab and Bing Search Engine, by Microsoft. Please don't use Bing... but if you insist, extension is unnecessary, just set it in about:preferences#search.
+ installation_mode
+ blocked
+
+ {87edebac-93fe-4780-8945-598a961b793f}
+
+ blocked_install_message
+ Fingerprint Shield, by Francesco De Stefano. Unnecessary with RFP or ETP (Which we enforce).
+ installation_mode
+ blocked
+
+ {8A0D66E3-1C08-49A6-8F6C-7E024029D199}
+
+ blocked_install_message
+ Norton Family, by Norton. Must I say more? Would almost rather getting a virus than installing this crap...
+ installation_mode
+ blocked
+
+ {8d8ca802-6b23-43ed-9445-e05d48579542}
+
+ blocked_install_message
+ Microsoft Bing Search Engine, by Microsoft. Please don't use Bing... but if you insist, extension is unnecessary, just set it in about:preferences#search.
+ installation_mode
+ blocked
+
+ {9363e9cd-be75-42fb-b787-3b0103e2acc7}
+
+ blocked_install_message
+ Google Analytics Opt-Out, by Vishwas. Unnecessary with content blocking.
+ installation_mode
+ blocked
+
+ {94cadb67-daa0-4761-b6b5-171e5d61da2e}
+
+ blocked_install_message
+ SingleFile Auto-Save, by gildas. Very concerning from a privacy perspective.
+ installation_mode
+ blocked
+
+ {96ef5869-e3ba-4d21-b86e-21b163096400}
+
+ blocked_install_message
+ Font Fingerprint Defender, by ilGur. Unnecessary with RFP or ETP (Which we enforce).
+ installation_mode
+ blocked
+
+ {9763fbae-6f90-483b-a8ca-aeb9ccfdacac}
+
+ blocked_install_message
+ IRobux, by 'Roblox Corporation'. Impersonation scam extension, no idea how this hasn't been removed from the AMO or got signed in the first place.
+ installation_mode
+ blocked
+
+ {98dc1b2a-d86b-4dcd-b73c-b0abde809db4}
+
+ blocked_install_message
+ OneSearch, by Yahoo. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ {9b43dad5-885b-4f0d-882f-e945b7e4b96f}
+
+ blocked_install_message
+ MSN Homepage and Bing Search Engine, by Microsoft. Please don't use Bing... but if you insist, extension is unnecessary, just set it in about:preferences#search.
+ installation_mode
+ blocked
+
+ {a07b7886-3015-4959-9a88-4273860edd6d}
+
+ blocked_install_message
+ Microsoft Bing Homepage and Search Engine, by Microsoft. Please don't use Bing... but if you insist, extension is unnecessary, just set it in about:preferences#search.
+ installation_mode
+ blocked
+
+ {aa9eef0b-ca4e-4e24-b42e-e1b006c7160a}
+
+ blocked_install_message
+ Safe Search Powered by Yahoo, by Safely. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ {abbf120b-a853-4fbd-a139-7e7dcc2d3e86}
+
+ blocked_install_message
+ Scam WebRoot Activation theme
+ installation_mode
+ blocked
+
+ {af37054b-3ace-46a2-ac59-709e4412bec6}
+
+ blocked_install_message
+ Add custom search engine, by Tom Schuster. Unnecessary, just add your search engine of choice in either about:preferences#search or from the Omnibox on the search engine's webpage
+ installation_mode
+ blocked
+
+ {b2531c6a-ce38-4b46-961e-62a6e89a1b17}
+
+ blocked_install_message
+ No Fingerprint, by Sam0230. Unnecessary with RFP or ETP (Which we enforce). Also appears dead.
+ installation_mode
+ blocked
+
+ {b3e677f4-1150-4387-8629-da738260a48e}
+
+ blocked_install_message
+ Smart HTTPS, by ilGur. Appears dead, and useless with HTTPS-Only Mode (which we enforce) anyways.
+ installation_mode
+ blocked
+
+ {b69c9b46-2236-45c2-9abd-143972558677}
+
+ blocked_install_message
+ Yahoo jp, by Viktor. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ {b9ddfa6d-fb38-47a6-8cf2-8d1044540a1f}
+
+ blocked_install_message
+ Scam WebRoot Activation theme
+ installation_mode
+ blocked
+
+ {c909a72e-e04b-4528-b14a-f721df46d776}
+
+ blocked_install_message
+ Adblock_S, appears dead.
+ installation_mode
+ blocked
+
+ {cfa868c0-6239-47df-bc81-54e13151ec2e}
+
+ blocked_install_message
+ Microsoft Bing Homepage, by Microsoft. Please don't use Bing... but if you insist, extension is unnecessary, just set it in about:preferences#search.
+ installation_mode
+ blocked
+
+ {d04b0b40-3dab-4f0b-97a6-04ec3eddbfb0}
+
+ blocked_install_message
+ Ecosia, by Ecosia Dev Team. Extension is unnecessary, just add Ecosia in either about:preferences#search or from the Omnibox.
+ installation_mode
+ blocked
+
+ {d0bfdcce-52c7-4b32-bb45-948f62db8d3f}
+
+ blocked_install_message
+ Flash Video Player for Facebook™, by Baris Derin. Dead technology, but for some reason this is still being updated? Very suspicious.
+ installation_mode
+ blocked
+
+ {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}
+
+ blocked_install_message
+ Adblock Plus, by Eyeo. Highly sketchy, avoid & just use uBlock Origin instead.
+ installation_mode
+ blocked
+
+ {e969f389-ecf2-4ba5-b6b3-95157461366c}
+
+ blocked_install_message
+ Blend In and Spoof Everything, by BrowserPlugs. Unnecessary with RFP or ETP (Which we enforce).
+ installation_mode
+ blocked
+
+ {e98b4b87-bc39-439f-a175-b15fbe4a06c0}
+
+ blocked_install_message
+ Canvas Blocker - Fingerprint Protect, by Joue. Unnecessary with RFP or ETP (Which we enforce). Also appears dead.
+ installation_mode
+ blocked
+
+ {eefb374b-ea77-47a1-bb1b-bd5758569056}
+
+ blocked_install_message
+ Scam WebRoot Activation theme
+ installation_mode
+ blocked
+
+ {f3bd3dd2-2888-44c5-91a2-2caeb33fb898}
+
+ blocked_install_message
+ YouTube Flash Video Player, by Baris Derin. Dead technology, but for some reason this is still being updated? Very suspicious.
+ installation_mode
+ blocked
+
+ {f637a841-f7e3-4055-a189-6951a9d4fc4f}
+
+ blocked_install_message
+ Scam WebRoot Activation theme
+ installation_mode
+ blocked
+
+ {ff5dfca6-4e75-4882-a145-b58a4afc35a7}
+
+ blocked_install_message
+ Movie Search, by GetTheResult. Hijacks search engine to Yahoo without user consent/knowledge.
+ installation_mode
+ blocked
+
+ {ff6bdf28-4fb3-42a0-8e36-11b4125a6ce4}
+
+ blocked_install_message
+ Logify - Parental Control, by Logify. Remote Monitoring.
+ installation_mode
+ blocked
+
+
+ OfferToSaveLoginsDefault
+
+ Preferences
+
+ accessibility.force_disabled
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ app.update.badgeWaitTime
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ app.update.notifyDuringDownload
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ app.update.promptWaitTime
+
+ Status
+ default
+ Type
+ number
+ Value
+ 3600
+
+ browser.EULA.override
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.cache.disk.enable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.cache.disk_cache_ssl
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.cache.jsbc_compression_level
+
+ Status
+ default
+ Type
+ number
+ Value
+ 3
+
+ browser.compactmode.show
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.contentanalysis.default_result
+
+ Status
+ locked
+ Type
+ number
+ Value
+ 0
+
+ browser.contentanalysis.enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.contentanalysis.interception_point.clipboard.enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.contentanalysis.interception_point.drag_and_drop.enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.contentanalysis.interception_point.file_upload.enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.contentanalysis.interception_point.print.enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.contentanalysis.show_blocked_result
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.contentblocking.category
+
+ Status
+ locked
+ Type
+ string
+ Value
+ strict
+
+ browser.contentblocking.database.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.crashReports.unsubmittedCheck.autoSubmit2
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.crashReports.unsubmittedCheck.enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.display.use_system_colors
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.download.alwaysOpenPanel
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.download.always_ask_before_handling_new_types
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.download.clearHistoryOnDelete
+
+ Status
+ default
+ Type
+ number
+ Value
+ 2
+
+ browser.download.enable_spam_prevention
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.download.loglevel
+
+ Status
+ default
+ Type
+ string
+ Value
+ Error
+
+ browser.download.manager.addToRecentDocs
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.download.manager.behavior
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ browser.download.manager.focusWhenStarting
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.download.manager.showAlertOnComplete
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.download.manager.showWhenStarting
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.download.open_pdf_attachments_inline
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.download.start_downloads_in_tmp_dir
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.download.useDownloadDir
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.eme.ui.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.formfill.enable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.gnome-search-provider.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.helperApps.deleteTempFileOnExit
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.link.open_newwindow
+
+ Status
+ default
+ Type
+ number
+ Value
+ 3
+
+ browser.link.open_newwindow.restriction
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ browser.ml.enable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.opaqueResponseBlocking
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.opaqueResponseBlocking.javascriptValidator
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.phoenix.core.policies.status
+
+ Status
+ locked
+ Type
+ string
+ Value
+ successfully applied :D
+
+ browser.places.interactions.enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.places.speculativeConnect.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.policies.loglevel
+
+ Status
+ default
+ Type
+ string
+ Value
+ error
+
+ browser.privatebrowsing.autostart
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.privatebrowsing.forceMediaMemoryCache
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.region.network.scan
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.region.network.url
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ browser.region.update.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.rights.3.shown
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.rights.override
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.blockedURIs.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.downloads.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.downloads.remote.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.downloads.remote.url
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
+
+ browser.safebrowsing.features.blockedURIs.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.features.cryptomining.annotate.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.features.cryptomining.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.features.downloads.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.features.emailtracking.datacollection.update
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.features.emailtracking.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.features.fingerprinting.annotate.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.features.fingerprinting.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.features.malware.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.features.phishing.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.features.socialtracking.annotate.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.features.socialtracking.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.features.trackingAnnotation.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.features.trackingProtection.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.malware.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.phishing.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.provider.google.advisoryName
+
+ Status
+ default
+ Type
+ string
+ Value
+ Google Safe Browsing (Legacy)
+
+ browser.safebrowsing.provider.google.dataSharing.enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.provider.google.gethashURL
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ browser.safebrowsing.provider.google.reportMalwareMistakeURL
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=
+
+ browser.safebrowsing.provider.google.reportPhishMistakeURL
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=
+
+ browser.safebrowsing.provider.google.reportURL
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://transparencyreport.google.com/safe-browsing/search?url=
+
+ browser.safebrowsing.provider.google.updateURL
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ browser.safebrowsing.provider.google4.dataSharing.enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.safebrowsing.provider.google4.dataSharingURL
+
+ Status
+ locked
+ Type
+ string
+ Value
+
+
+ browser.safebrowsing.provider.google4.gethashURL
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://safebrowsing.ironfoxoss.org/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST
+
+ browser.safebrowsing.provider.google4.reportMalwareMistakeURL
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=
+
+ browser.safebrowsing.provider.google4.reportPhishMistakeURL
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=
+
+ browser.safebrowsing.provider.google4.reportURL
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://transparencyreport.google.com/safe-browsing/search?url=
+
+ browser.safebrowsing.provider.google4.updateURL
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://safebrowsing.ironfoxoss.org/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST
+
+ browser.safebrowsing.provider.mozilla.updateURL
+
+ Status
+ default
+ Type
+ string
+ Value
+ moz-sbrs:://antitracking
+
+ browser.safebrowsing.reportPhishURL
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://safebrowsing.google.com/safebrowsing/report_phish/?tpl=mozilla&url=
+
+ browser.safebrowsing.update.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.search.separatePrivateDefault
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.search.separatePrivateDefault.ui.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.search.suggest.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.search.suggest.enabled.private
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.search.update
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.send_pings
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.send_pings.max_per_link
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ browser.send_pings.require_same_host
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.sessionhistory.max_total_viewers
+
+ Status
+ default
+ Type
+ number
+ Value
+ 7
+
+ browser.sessionstore.disable_platform_collection
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.sessionstore.interval
+
+ Status
+ default
+ Type
+ number
+ Value
+ 60000
+
+ browser.sessionstore.privacy_level
+
+ Status
+ default
+ Type
+ number
+ Value
+ 2
+
+ browser.tabs.remote.coep.credentialles
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.tabs.remote.enforceRemoteTypeRestrictions
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.tabs.remote.separateFileUriProcess
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.tabs.remote.separatePrivilegedMozillaWebContentProcess
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ browser.tabs.remote.separatedMozillaDomains
+
+ Status
+ locked
+ Type
+ string
+ Value
+
+
+ browser.tabs.searchclipboardfor.middleclick
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.translations.alwaysTranslateLanguages
+
+ Status
+ default
+ Type
+ string
+ Value
+ bg,ca,cs,da,de,el,en,es,et,fi,fr,hr,hu,id,it,ja,ko,lv,lt,nl,pl,pt,ro,ru,sk,sl,sr,sv,tr,uk,vi,zh-Hans
+
+ browser.translations.automaticallyPopup
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.translations.enable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.translations.select.enable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.xul.error_pages.expert_bad_cert
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ browser.xul.error_pages.show_safe_browsing_details_on_load
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ calendar.extract.service.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ chat.prpls.prpl-facebook.disable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ chat.prpls.prpl-gtalk.disable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ chat.prpls.prpl-twitter.disable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ chat.prpls.prpl-yahoo.disable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ datareporting.policy.dataSubmissionEnabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ datareporting.policy.dataSubmissionPolicyAccepted
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ datareporting.policy.dataSubmissionPolicyBypassNotification
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ datareporting.policy.firstRunURL
+
+ Status
+ locked
+ Type
+ string
+ Value
+
+
+ dom.block_download_insecure
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.block_external_protocol_in_iframes
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.block_external_protocol_navigation_from_sandbox
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.disable_open_during_load
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.disable_window_flip
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.disable_window_move_resize
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.disable_window_status_change
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.ipc.processCount.privilegedmozilla
+
+ Status
+ locked
+ Type
+ number
+ Value
+ 0
+
+ dom.ipc.processCount.webIsolated
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ dom.origin-trials.coep-credentialless.state
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ dom.origin-trials.enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ dom.origin-trials.private-attribution.state
+
+ Status
+ locked
+ Type
+ number
+ Value
+ 2
+
+ dom.popup_allowed_events
+
+ Status
+ default
+ Type
+ string
+ Value
+ click dblclick
+
+ dom.postMessage.sharedArrayBuffer.bypassCOOP_COEP.insecure.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.postMessage.sharedArrayBuffer.withCOOP_COEP
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.prefetch_dns_for_anchor_http_document
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.prefetch_dns_for_anchor_https_document
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.private-attribution.submission.enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ dom.reporting.crash.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.reporting.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.reporting.featurePolicy.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.reporting.header.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.security.https_first
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.security.https_first_for_custom_ports
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.security.https_first_pbm
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.security.https_first_schemeless
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.security.https_only_mode
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ dom.security.https_only_mode.upgrade_local
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.security.https_only_mode_error_page_user_suggestions
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.security.https_only_mode_pbm
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ dom.security.https_only_mode_send_http_background_request
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.security.skip_about_page_has_csp_assert
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.security.trusted_types.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ dom.security.unexpected_system_load_telemetry_enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ dom.webgpu.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.abuseReport.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.autoDisableScopes
+
+ Status
+ locked
+ Type
+ number
+ Value
+ 15
+
+ extensions.blocklist.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.cardbook.useOnlyEmail
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.arh.read
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.arh.replaceAddonResult
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.debug
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.display.favicon.show
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.display.keySecure
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.dkim.enable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.dns.nameserver
+
+ Status
+ default
+ Type
+ string
+ Value
+ 9.9.9.9
+
+ extensions.dkim_verifier.error.algorithm.rsa.weakKeyLength.treatAs
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ extensions.dkim_verifier.error.algorithm.sign.rsa-sha1.treatAs
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ extensions.dkim_verifier.error.detailedReasons
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.error.illformed_i.treatAs
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ extensions.dkim_verifier.error.illformed_s.treatAs
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ extensions.dkim_verifier.error.policy.key_insecure.treatAs
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ extensions.dkim_verifier.key.storing
+
+ Status
+ default
+ Type
+ number
+ Value
+ 2
+
+ extensions.dkim_verifier.policy.DMARC.shouldBeSigned.enable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.policy.DMARC.shouldBeSigned.neededPolicy
+
+ Status
+ default
+ Type
+ string
+ Value
+ none
+
+ extensions.dkim_verifier.policy.dkim.unsignedHeadersWarning.mode
+
+ Status
+ default
+ Type
+ number
+ Value
+ 30
+
+ extensions.dkim_verifier.policy.signRules.autoAddRule.enable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.policy.signRules.autoAddRule.for
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ extensions.dkim_verifier.policy.signRules.autoAddRule.onlyIfFromAddressInSDID
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.policy.signRules.checkDefaultRules
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.policy.signRules.enable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.policy.signRules.error.wrong_sdid.asWarning
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.policy.signRules.sdid.allowSubDomains
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.saveResult
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.dkim_verifier.showDKIMFromTooltip
+
+ Status
+ default
+ Type
+ number
+ Value
+ 50
+
+ extensions.dkim_verifier.showDKIMHeader
+
+ Status
+ default
+ Type
+ number
+ Value
+ 50
+
+ extensions.enabledScopes
+
+ Status
+ default
+ Type
+ number
+ Value
+ 5
+
+ extensions.experiments.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.formautofill.addresses.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.formautofill.creditCards.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.formautofill.ml.experiment.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.getAddons.browseAddons
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ extensions.getAddons.discovery.api_url
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://dove.celenity.dev/extensions/recommendations.json
+
+ extensions.getAddons.search.browseURL
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://addons.thunderbird.net/%LOCALE%/%APP%/search/?q=%TERMS%
+
+ extensions.getAddons.showPane
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.htmlaboutaddons.recommendations.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.install.requireBuiltInCerts
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.installDistroAddons
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.postDownloadThirdPartyPrompt
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.ads@mozac.org
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.bravesearch@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.cookies@mozac.org
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.ddg@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.dkim_verifier@pl
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.duckduckgo-html@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.duckduckgo-lite@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.ecosia@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.kagi-html@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.kagi@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.leta-brave@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.leta-google@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.metager@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.mojeek@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.no-search@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.qwant-junior@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.qwant@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.startpage@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.swisscows@celenity.dev
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.uBlock0@raymondhill.net
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.wikipedia@search.mozilla.org
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.{b86e4813-687a-43e6-ab65-0bde4ab75758}
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantineIgnoredByUser.{d19a89b9-76c1-4a61-bcd4-49e8de916403}
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.quarantinedDomains.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.recommendations.privacyPolicyUrl
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://dove.celenity.dev/privacy#extension-recommendations
+
+ extensions.recommendations.themeRecommendationUrl
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ extensions.strictCompatibility
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.systemAddon.update.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.ui.lastCategory
+
+ Status
+ default
+ Type
+ string
+ Value
+ addons://list/extension
+
+ extensions.update.autoUpdateDefault
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.update.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.update.interval
+
+ Status
+ default
+ Type
+ number
+ Value
+ 3600
+
+ extensions.update.notifyUser
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.update.requireBuiltInCerts
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.webapi.testing
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ extensions.webapi.testing.http
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.webcompat-reporter.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.webcompat-reporter.newIssueEndpoint
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ extensions.webcompat.enable_shims
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.webcompat.perform_injections
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.webcompat.perform_ua_overrides
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.webcompat.smartblockEmbeds.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.webextensions.remote
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ extensions.webextensions.restrictedDomains
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ extensions.webservice.discoverURL
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ general.autoScroll
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ general.smoothScroll
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ geo.provider.ms-windows-location
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ geo.provider.network.logging.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ geo.provider.network.url
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ geo.provider.use_corelocation
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ geo.provider.use_geoclue
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ geo.wifi.scan
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ gfx.canvas.accelerated
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ gfx.canvas.accelerated.cache-items
+
+ Status
+ default
+ Type
+ number
+ Value
+ 8192
+
+ gfx.canvas.accelerated.cache-size
+
+ Status
+ default
+ Type
+ number
+ Value
+ 512
+
+ gfx.content.skia-font-cache-size
+
+ Status
+ default
+ Type
+ number
+ Value
+ 20
+
+ gfx.font_rendering.graphite.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ gfx.font_rendering.opentype_svg.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ gfx.webrender.all
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ gfx.webrender.compositor
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ intl.allow-insecure-text-input
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ layout.css.prefers-color-scheme.content-override
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ layout.css.report_errors
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ layout.css.visited_links_enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ layout.forms.reveal-password-button.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ layout.spellcheckDefault
+
+ Status
+ default
+ Type
+ number
+ Value
+ 2
+
+ mail.SpellCheckBeforeSend
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.addressDisplayFormat
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ mail.biff.alert.show_preview
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.biff.alert.show_sender
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.biff.alert.show_subject
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.chat.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.chat.notification_info
+
+ Status
+ default
+ Type
+ number
+ Value
+ 2
+
+ mail.cloud_files.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.collect_email_address_outgoing
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.compose.add_link_preview
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.compose.warn_public_recipients.aggressive
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.dark-reader.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.dark-reader.show-toggle
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.default_send_format
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ mail.dove.policies.status
+
+ Status
+ locked
+ Type
+ string
+ Value
+ successfully applied :D
+
+ mail.e2ee.auto_disable
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ mail.e2ee.auto_enable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.e2ee.notify_on_auto_disable
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ mail.external_protocol_requires_permission
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.html_compose
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.html_sanitize.drop_conditional_css
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.identity.default.compose_html
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.identity.default.sign_mail
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.imap.use_disk_cache2
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.mdn.report.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.mdn.report.not_in_to_cc
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ mail.mdn.report.other
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ mail.mdn.report.outside_domain
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ mail.openpgp.allow_external_gnupg
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.openpgp.remind_encryption_possible
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.phishing.detection.disallow_form_actions
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.phishing.detection.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.phishing.detection.ipaddresses
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.phishing.detection.mismatched_hosts
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.provider.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.provider.suppress_dialog_on_startup
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.rights.override
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.sanitize_date_header
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.save_msg_filename_underscores_for_space
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.server.default.mdn_not_in_to_cc
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ mail.server.default.mdn_other
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ mail.server.default.mdn_outside_domain
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ mail.server.default.mdn_report_enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.shell.checkDefaultClient
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.showCondensedAddresses
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.show_headers
+
+ Status
+ default
+ Type
+ number
+ Value
+ 2
+
+ mail.smime.accept_insecure_sha1_message_signatures
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.smime.remind_encryption_possible
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.smtpserver.default.hello_argument
+
+ Status
+ default
+ Type
+ string
+ Value
+ [127.0.0.1]
+
+ mail.spellcheck.inline
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.spotlight.enable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.spotlight.firstRunDone
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.suppress_content_language
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.winsearch.enable
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mail.winsearch.firstRunDone
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.auto_config.fetchFromISP.sendEmailAddress
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.auto_config.fetchFromISP.sslOnly
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.auto_config.guess.requireGoodCert
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.auto_config.guess.sslOnly
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.display.date_senders_timezone
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.display.disallow_mime_handlers
+
+ Status
+ default
+ Type
+ number
+ Value
+ 3
+
+ mailnews.display.html_as
+
+ Status
+ default
+ Type
+ number
+ Value
+ 3
+
+ mailnews.display.prefer_plaintext
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.downloadToTempFile
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ mailnews.headers.sendUserAgent
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.headers.showMessageId
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.headers.showOrganization
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.headers.showReferences
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.headers.showSender
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.headers.showUserAgent
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.headers.useMinimalUserAgent
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.message_display.disable_remote_image
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ mailnews.oauth.usePrivateBrowser
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ mailnews.reply_header_authorwroteondate
+
+ Status
+ default
+ Type
+ string
+ Value
+ #1 wrote on #2 #3:
+
+ mailnews.reply_header_authorwrotesingle
+
+ Status
+ default
+ Type
+ string
+ Value
+ #1 wrote:
+
+ mailnews.reply_header_ondateauthorwrote
+
+ Status
+ default
+ Type
+ string
+ Value
+ On #2 #3, #1 wrote:
+
+ mailnews.reply_header_type
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ mailnews.show_send_progress
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.start_page.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ mailnews.start_page.override_url
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ mailnews.start_page.url
+
+ Status
+ default
+ Type
+ string
+ Value
+ about:config
+
+ mailnews.start_page_override.mstone
+
+ Status
+ default
+ Type
+ string
+ Value
+ ignore
+
+ media.autoplay.blocking_policy
+
+ Status
+ default
+ Type
+ number
+ Value
+ 2
+
+ media.autoplay.default
+
+ Status
+ default
+ Type
+ number
+ Value
+ 5
+
+ media.cache_readahead_limit
+
+ Status
+ default
+ Type
+ number
+ Value
+ 7200
+
+ media.cache_resume_threshold
+
+ Status
+ default
+ Type
+ number
+ Value
+ 3600
+
+ media.clearkey.persistent-license.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.clearkey.test-key-systems.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.devices.insecure.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.eme.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.eme.encrypted-media-encryption-scheme.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.eme.hdcp-policy-check.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.eme.playready.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.eme.require-app-approval
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.eme.widevine.experiment.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.eme.wmf.clearkey.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.ffmpeg.vaapi.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.getusermedia.insecure.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.gmp-gmpopenh264.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.gmp-gmpopenh264.provider.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.gmp-gmpopenh264.visible
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.gmp-manager.cert.checkAttributes
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.gmp-manager.cert.requireBuiltIn
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.gmp-manager.checkContentSignature
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.gmp-manager.updateEnabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.gmp-provider.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.gmp-widevinecdm-l1.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.gmp-widevinecdm-l1.visible
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.gmp-widevinecdm.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.gmp-widevinecdm.visible
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.gmp.insecure.allow
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.memory_cache_max_size
+
+ Status
+ default
+ Type
+ number
+ Value
+ 65536
+
+ media.peerconnection.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.peerconnection.ice.default_address_only
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.peerconnection.ice.no_host
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.peerconnection.ice.obfuscate_host_addresses
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.peerconnection.ice.proxy_only_if_behind_proxy
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.peerconnection.ice.relay_only
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.peerconnection.mtransport_process
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.webrtc.enable_pq_dtls
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.webspeech.synth.dont_notify_on_error
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.webvtt.testing.events
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ media.wmf.media-engine.enabled
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ network.IDN_show_punycode
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.auth.non-web-content-triggered-resources-http-auth-allow
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.auth.subresource-http-auth-allow
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ network.auth.subresource-img-cross-origin-http-auth-allow
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.captive-portal-service.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.connectivity-service.DNS_HTTPS.domain
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ network.connectivity-service.DNSv4.domain
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ network.connectivity-service.DNSv6.domain
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ network.connectivity-service.IPv4.url
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ network.connectivity-service.IPv6.url
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ network.connectivity-service.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.cookie.CHIPS.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.cookie.cookieBehavior
+
+ Status
+ default
+ Type
+ number
+ Value
+ 5
+
+ network.cookie.cookieBehavior.optInPartitioning
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.cookie.cookieBehavior.optInPartitioning.pbmode
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.cookie.cookieBehavior.pbmode
+
+ Status
+ default
+ Type
+ number
+ Value
+ 5
+
+ network.cookie.cookieBehavior.trackerCookieBlocking
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.cookie.noPersistentStorage
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.cookie.sameSite.laxByDefault
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.cookie.sameSite.noneRequiresSecure
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.cookie.sameSite.schemeful
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.dns.disablePrefetch
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.dns.disablePrefetchFromHTTPS
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.dns.echconfig.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.dns.http3_echconfig.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.dns.native_https_query
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.dns.preferIPv6
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.dns.prefetch_via_proxy
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.dnsCacheEntries
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1000
+
+ network.dnsCacheExpiration
+
+ Status
+ default
+ Value
+ 3600
+
+ network.dnsCacheExpirationGracePeriod
+
+ Status
+ default
+ Type
+ number
+ Value
+ 240
+
+ network.early-hints.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.early-hints.over-http-v1-1.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.early-hints.preconnect.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.early-hints.preconnect.max_connections
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ network.file.disable_unc_paths
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.gio.supported-protocols
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ network.http.http3.enable_0rtt
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.http.http3.enable_kyber
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.http.max-connections
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1800
+
+ network.http.max-persistent-connections-per-proxy
+
+ Status
+ default
+ Type
+ number
+ Value
+ 48
+
+ network.http.max-persistent-connections-per-server
+
+ Status
+ default
+ Type
+ number
+ Value
+ 10
+
+ network.http.max-urgent-start-excessive-connections-per-host
+
+ Status
+ default
+ Type
+ number
+ Value
+ 5
+
+ network.http.microsoft-entra-sso.container-enabled.0
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.http.microsoft-entra-sso.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.http.network_error_logging.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.http.referer.XOriginPolicy
+
+ Status
+ user
+ Type
+ number
+ Value
+ 2
+
+ network.http.referer.XOriginTrimmingPolicy
+
+ Status
+ default
+ Type
+ number
+ Value
+ 2
+
+ network.http.referer.defaultPolicy.trackers
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ network.http.referer.defaultPolicy.trackers.pbmode
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ network.http.referer.disallowCrossSiteRelaxingDefault
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.http.referer.disallowCrossSiteRelaxingDefault.pbmode
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.http.referer.disallowCrossSiteRelaxingDefault.pbmode.top_navigation
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.http.speculative-parallel-limit
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ network.http.windows-sso.container-enabled.0
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.http.windows-sso.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.jar.record_failure_reason
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ network.microsoft-sso-authority-list
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ network.negotiate-auth.trusted-uris
+
+ Status
+ default
+ Type
+ string
+ Value
+
+
+ network.notify.checkForNRPT
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.notify.checkForProxies
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.preconnect
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.predictor.enable-hover-on-ssl
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.predictor.enable-prefetch
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.predictor.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.prefetch-next
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.protocol-handler.external.shell
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ network.protocol-handler.warn-external-default
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.proxy.allow_bypass
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.proxy.failover_direct
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.proxy.socks5_remote_dns
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.proxy.socks_remote_dns
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.traffic_analyzer.enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ network.trr.confirmationNS
+
+ Status
+ default
+ Type
+ string
+ Value
+ skip
+
+ network.trr.confirmation_telemetry_enabled
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ network.trr.default_provider_uri
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://dns.quad9.net/dns-query
+
+ network.trr.disable-ECS
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.trr.display_fallback_warning
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.trr.mode
+
+ Status
+ default
+ Type
+ number
+ Value
+ 3
+
+ network.trr.retry_on_recoverable_errors
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.trr.send_accept-language_headers
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.trr.send_empty_accept-encoding_headers
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.trr.send_user-agent_headers
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.trr.strict_native_fallback
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.trr_ui.show_fallback_warning_option
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ network.websocket.allowInsecureFromHTTPS
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ pdfjs.enablePermissions
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ pdfjs.enableScripting
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ pdfjs.enableXfa
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ pdfjs.firstRun
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ pdfjs.sidebarViewOnLoad
+
+ Status
+ default
+ Type
+ number
+ Value
+ 2
+
+ places.history.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ privacy.globalprivacycontrol.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ privacy.userContext.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ security.OCSP.enabled
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ security.OCSP.require
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ security.default_personal_cert
+
+ Status
+ locked
+ Type
+ string
+ Value
+ Ask Every Time
+
+ security.insecure_connection_text.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ security.insecure_connection_text.pbmode.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ security.mixed_content.block_active_content
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ security.mixed_content.block_display_content
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ security.mixed_content.upgrade_display_content
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ security.pki.certificate_transparency.mode
+
+ Status
+ default
+ Type
+ number
+ Value
+ 2
+
+ security.ssl.enable_ocsp_stapling
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ security.ssl.require_safe_negotiation
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ security.tls.enable_0rtt_data
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ security.tls.hello_downgrade_check
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ security.tls.version.enable-deprecated
+
+ Status
+ locked
+ Type
+ boolean
+ Value
+
+
+ security.warn_submit_secure_to_insecure
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ signon.autofillForms
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ signon.autofillForms.http
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ signon.firefoxRelay.feature
+
+ Status
+ default
+ Type
+ string
+ Value
+ disabled
+
+ signon.firefoxRelay.manage_url
+
+ Status
+ default
+ Type
+ string
+ Value
+ https://relay.firefox.com/accounts/profile/
+
+ signon.formlessCapture.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ signon.generation.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ signon.privateBrowsingCapture.enabled
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ signon.rememberSignons
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ signon.storeWhenAutocompleteOff
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ toolkit.legacyUserProfileCustomizations.stylesheets
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ ui.hideCursorWhileTyping
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ ui.key.menuAccessKeyFocuses
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ ui.panelAnimations
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ ui.prefersReducedMotion
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ ui.prefersReducedTransparency
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ ui.scrollToClick
+
+ Status
+ default
+ Type
+ number
+ Value
+ 1
+
+ ui.swipeAnimationEnabled
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ ui.useAccessibilityTheme
+
+ Status
+ default
+ Type
+ number
+ Value
+ 0
+
+ widget.non-native-theme.use-theme-accent
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+ xpinstall.whitelist.required
+
+ Status
+ default
+ Type
+ boolean
+ Value
+
+
+
+ Proxy
+
+ UseProxyForDNS
+
+
+ SSLVersionMin
+ tls1.2
+ SearchEngines
+
+ Add
+
+
+ Description
+ Search DuckDuckGo HTML
+ IconURL
+ data:image/x-icon;base64,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
+ Method
+ POST
+ Name
+ DuckDuckGo (HTML)
+ SuggestURLTemplate
+ https://duckduckgo.com/ac/?q={searchTerms}&type=list
+ URLTemplate
+ https://html.duckduckgo.com/html/?q={searchTerms}
+
+
+ Description
+ Search DuckDuckGo Lite
+ IconURL
+ data:image/x-icon;base64,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
+ Method
+ POST
+ Name
+ DuckDuckGo (Lite)
+ SuggestURLTemplate
+ https://duckduckgo.com/ac/?q={searchTerms}&type=list
+ URLTemplate
+ https://lite.duckduckgo.com/lite/?q={searchTerms}
+
+
+ Description
+ Search Ecosia
+ IconURL
+ data:image/x-icon;base64,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
+ Method
+ GET
+ Name
+ Ecosia
+ SuggestURLTemplate
+ https://ac.ecosia.org/autocomplete?q={searchTerms}&type=list
+ URLTemplate
+ https://www.ecosia.org/search?q={searchTerms}
+
+
+ Description
+ Search Mojeek
+ IconURL
+ data:image/png;base64,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
+ Method
+ GET
+ Name
+ Mojeek
+ URLTemplate
+ https://www.mojeek.com/search?q={searchTerms}
+
+
+ Description
+ Search nothing...
+ Method
+ GET
+ Name
+ No Search
+ URLTemplate
+ https://nosearch.invalid/{searchTerms}
+
+
+ Description
+ Search Qwant
+ IconURL
+ data:image/x-icon;base64,AAABAAEAMDAAAAEAIACoJQAAFgAAACgAAAAwAAAAYAAAAAEAIAAAAAAAACQAABMLAAATCwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADJyQhVSgjIq4nJCLrJyMh/icjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/icjIusnIyKvJiMgWCQkJAcAAAAAAAAAAAAAAAAAAAAAAAAAACgiIi0oJCLUJyMh/icjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIcoqJB8xAAAAAAAAAAAAAAAAKiQfMSgjIeAnIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyHhKSMdLAAAAAAkJCQHJyMhyicjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/KCQi04CAgAIpIyBXJyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ickJFYpIyKvJyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIq8nIyLrJyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIusnIyH+JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf4nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/z06OP9oZWT/fnx6/4KAf/9wbWz/REE//ygkIv8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf86NjT/o6Kh/+vq6v//////////////////////7Ovr/1JQTv8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/1tYV//n5ub//////////////////////////////////////3Fvbv8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/R0RC//Ly8v///////////////////////////////////////////5WTkv8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8zLy3/2dnZ///////n5+f/oJ+e/2toZv9WU1L/W1hX/4WDgv/DwcH/9vX1/8fFxf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8zLy3/amdm/6Gfnv/Ozs3//v7+//7+/v/HxsX/lJGQ/1lWVP8tKSj/JyMh/ycjIf8nIyH/ZWJh/42Liv8pJSP/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/NzMx/5OQj//t7e3////////////8/Pz/7Ozs//Pz8//////////////////d3dz/f318/yklI/8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf9HQ0L/2tra////////////+fj4/62sqv9ST03/OjY0/zw5OP9fXFv/09LS/////////////Pz8/7a1tP8vKyn/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/z47Ov/n5+b/////////////////iomI/ycjIf8nIyH/JyMh/ycjIf8nIyH/MS4s/8PCwv/////////////////Hxsb/Lioo/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/Kygm/7a1tf/////////////////R0ND/KCQi/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/0I+PP/09PT/////////////////hYKB/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/WVZV//39/f////////////////9wbm3/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf+ioZ//////////////////7Ozs/0E+PP8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/q6qp//////////////////f39/8yLy3/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf9qZ2b//v7+/////////////////3l3dv8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/6Ojo/////////////////8rKyf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf9FQT//8vHx/////////////////6+urf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8vKyn//v7+/////////////////62rq/8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8wLSv/5eXk/////////////////9vZ2f8oJCL/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf9EQT///////////////////////5+dm/8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/29ra/////////////////+vq6v8uKij/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf9FQkD//////////////////////56cm/8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/2tnZ/////////////////+vr6v8uKij/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8xLSv//f39/////////////////6mop/8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8qJiT/4ODg/////////////////93d3f8pJSP/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/6+rq/////////////////8fFxf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf86Nzb/7Ozr/////////////////7u7uv8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/ubi3//////////////////Pz8v8rJyb/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf9bWFf//Pz8/////////////////4OBgP8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/Z2Rj//7+/v////////////////9mY2L/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf+SkI//////////////////7u7u/0RBP/8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/Lysp/8nJyP/////////////////Av77/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/zEtK//l5OT/////////////////oZ6d/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/09MSv/z8vL/////////////////cG1s/ycjIf8nIyH/JyMh/ycjIf8nIyH/KCQi/4+MjP/////////////////e3d3/MCwr/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf9kYmD/4+Pi/////////////Pz8/4KAf/8+Ozn/KiYk/ywoJv9BPTz/pqSj//39/f///////////9TT0/9GQ0H/JyMh/ycjIf8nIyH/LCgm/1lWVf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/Q0A+/7y6uv/4+Pj////////////u7ez/z8/O/9HQ0P/x8fH////////////x8fH/mZeW/zczMf8nIyH/JyMh/ycjIf8nIyH/WFVU/6+trP8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/yklI/9FQkD/joyL/728vP/X1dX/5OPj/+Hh4P/Qz8//ube3/4OAf/84NDP/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/mZeW/+3t7P8pJST/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ygkIv8vKyn/NTEv/zQwLv8sKCb/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8qJyX/ysjH//////9aV1b/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf82MjD/f3x7/7OxsP/t7Oz////////////+/v7/zcvL/5iWlf9fXFv/KSUj/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf85NTP/ioiH/7q5uf/y8vL/////////////////2djY/6Gfn/9fXFv/KSUj/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8sKCb/zs7N//////9iXl3/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/lpSS/+3t7f8sKCb/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/WFRT/7Gvrv8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH+JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/MzAu/2hlZP8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf4nIyLrJyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/yckIusoIyKuJyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIq8nJCFWJyMh/icjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/yYjI1hVVVUDKCMi1CcjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMhzCQkJAcAAAAAKCIiLScjIeAnIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyHhKiQfMQAAAAAAAAAAAAAAACokJDEoIyLMJyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ygjIdMpIyMsAAAAAAAAAAAAAAAAAAAAAAAAAAAkJCQHKSYjWCgjIq4nIyHrJyMh/icjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIf8nIyH/JyMh/ycjIeomIyKvJyQhVlVVVQMAAAAAAAAAAAAAAADgAAAAAAcAAMAAAAAAAwAAgAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAEAAMAAAAAAAwAA4AAAAAAHAAA=
+ Method
+ GET
+ Name
+ Qwant
+ SuggestURLTemplate
+ https://api.qwant.com/v3/suggest/?q={searchTerms}
+ URLTemplate
+ https://www.qwant.com?q={searchTerms}
+
+
+ Description
+ Search Qwant Junior
+ IconURL
+ data:image/x-icon;base64,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
+ Method
+ GET
+ Name
+ Qwant Junior
+ SuggestURLTemplate
+ https://fdn.qwant.com/v3/egp/suggest/?q={searchTerms}
+ URLTemplate
+ https://www.qwantjunior.com?q={searchTerms}
+
+
+ Description
+ Search Startpage
+ IconURL
+ data:image/x-icon;base64,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
+ Method
+ GET
+ Name
+ Startpage
+ SuggestURLTemplate
+ https://www.startpage.com/osuggestions?q={searchTerms}
+ URLTemplate
+ https://www.startpage.com/sp/search?query={searchTerms}
+
+
+ Description
+ Search Swisscows
+ IconURL
+ data:image/x-icon;base64,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
+ Method
+ GET
+ Name
+ Swisscows
+ SuggestURLTemplate
+ https://swisscows.com/api/suggest?query={searchTerms}
+ URLTemplate
+ https://swisscows.com/web?query={searchTerms}
+
+
+ Default
+ DuckDuckGo
+ PreventInstalls
+
+ Remove
+
+ 1&1 Suche
+ Allegro
+ Amazon.ca
+ 亚马逊
+ Amazon.co.jp
+ Amazon.co.uk
+ Amazon.com
+ Amazon.com.au
+ Amazon.de
+ Amazon.es
+ Amazon.fr
+ Amazon.in
+ Amazon.it
+ Amazon.nl
+ Amazon.se
+ 百度
+ Bing
+ Ceneje.si
+ Cốc Cốc
+ 다음
+ eBay
+ EUdict Eng->Cro
+ GMX - Búsqueda web
+ GMX - Recherche web
+ GMX Search
+ GMX Shopping
+ GMX Suche
+ Google
+ Gule sider
+ LEO Eng-Deu
+ พจนานุกรม ลองดู
+ mail.com
+ Поиск Mail.Ru
+ Mapy.cz
+ MercadoLibre Argentina
+ MercadoLibre Chile
+ MercadoLibre Mexico
+ MercadoLivre
+ 네이버
+ Odpiralni Časi
+ Pazaruvaj
+ Priberam
+ Prisjakt
+ 楽天市場
+ Readmoo 讀墨電子書
+ Salidzini.lv
+ Seznam
+ Tyda.se
+ Vatera.hu
+ WEB.DE Suche
+ Wolne Lektury
+ Yahoo! JAPAN
+ Yahoo!オークション
+ Yandex
+ Яндекс
+
+
+
+
diff --git a/policies.json b/policies.json
index 20e18be..6c6db75 100644
--- a/policies.json
+++ b/policies.json
@@ -52,1110 +52,1392 @@
"ProviderURL": "https://dns.quad9.net/dns-query",
"Fallback": false
},
+ "EnterprisePoliciesEnabled": true,
"Preferences": {
"accessibility.force_disabled": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"app.update.badgeWaitTime": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"app.update.notifyDuringDownload": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"app.update.promptWaitTime": {
"Value": 3600,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"browser.cache.disk.enable": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.cache.disk_cache_ssl": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.cache.jsbc_compression_level": {
"Value": 3,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"browser.compactmode.show": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.contentanalysis.default_result": {
"Value": 0,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "number"
},
"browser.contentanalysis.enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.contentanalysis.interception_point.clipboard.enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.contentanalysis.interception_point.drag_and_drop.enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.contentanalysis.interception_point.file_upload.enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.contentanalysis.interception_point.print.enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.contentanalysis.show_blocked_result": {
"Value": true,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.contentblocking.category": {
"Value": "strict",
- "Status": "locked"
+ "Status": "locked",
+ "Type": "string"
},
"browser.contentblocking.database.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.crashReports.unsubmittedCheck.autoSubmit2": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.crashReports.unsubmittedCheck.enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.display.use_system_colors": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.download.always_ask_before_handling_new_types": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.download.alwaysOpenPanel": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.download.clearHistoryOnDelete": {
"Value": 2,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"browser.download.enable_spam_prevention": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.download.loglevel": {
"Value": "Error",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.download.manager.addToRecentDocs": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.download.open_pdf_attachments_inline": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.download.start_downloads_in_tmp_dir": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.download.useDownloadDir": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.eme.ui.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.formfill.enable": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.gnome-search-provider.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.helperApps.deleteTempFileOnExit": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.link.open_newwindow": {
"Value": 3,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"browser.link.open_newwindow.restriction": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"browser.ml.enable": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.opaqueResponseBlocking": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.opaqueResponseBlocking.javascriptValidator": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.places.interactions.enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.places.speculativeConnect.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.policies.loglevel": {
"Value": "error",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.privatebrowsing.forceMediaMemoryCache": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.region.network.scan": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.region.network.url": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.region.update.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.rights.3.shown": {
"Value": true,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.safebrowsing.blockedURIs.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.downloads.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.downloads.remote.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.downloads.remote.url": {
"Value": "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.features.blockedURIs.update": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.features.cryptomining.annotate.update": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.features.cryptomining.update": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.features.downloads.update": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.features.emailtracking.update": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.features.emailtracking.datacollection.update": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.safebrowsing.features.fingerprinting.annotate.update": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.features.fingerprinting.update": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.features.malware.update": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.features.phishing.update": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.features.socialtracking.annotate.update": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.features.socialtracking.update": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.features.trackingAnnotation.update": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.features.trackingProtection.update": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.malware.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.phishing.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.safebrowsing.provider.google.advisoryName": {
"Value": "Google Safe Browsing (Legacy)",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.provider.google.dataSharing.enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.safebrowsing.provider.google.gethashURL": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.provider.google.reportMalwareMistakeURL": {
"Value": "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.provider.google.reportPhishMistakeURL": {
"Value": "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.provider.google.reportURL": {
"Value": "https://transparencyreport.google.com/safe-browsing/search?url=",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.provider.google.updateURL": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.provider.google4.dataSharing.enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.safebrowsing.provider.google4.dataSharingURL": {
"Value": "",
- "Status": "locked"
+ "Status": "locked",
+ "Type": "string"
},
"browser.safebrowsing.provider.google4.gethashURL": {
"Value": "https://safebrowsing.ironfoxoss.org/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.provider.google4.reportMalwareMistakeURL": {
"Value": "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.provider.google4.reportPhishMistakeURL": {
"Value": "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.provider.google4.reportURL": {
"Value": "https://transparencyreport.google.com/safe-browsing/search?url=",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.provider.google4.updateURL": {
"Value": "https://safebrowsing.ironfoxoss.org/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.provider.mozilla.updateURL": {
"Value": "moz-sbrs:://antitracking",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.reportPhishURL": {
"Value": "https://safebrowsing.google.com/safebrowsing/report_phish/?tpl=mozilla&url=",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.safebrowsing.update.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.search.separatePrivateDefault": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.search.separatePrivateDefault.ui.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.search.suggest.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.search.suggest.enabled.private": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
+ },
+ "browser.search.update": {
+ "Value": false,
+ "Status": "default",
+ "Type": "boolean"
},
"browser.send_pings": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.send_pings.max_per_link": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"browser.send_pings.require_same_host": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.sessionhistory.max_total_viewers": {
"Value": 7,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"browser.sessionstore.disable_platform_collection": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.sessionstore.interval": {
"Value": 60000,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"browser.sessionstore.privacy_level": {
"Value": 2,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"browser.tabs.remote.coep.credentialles": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.tabs.remote.enforceRemoteTypeRestrictions": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.tabs.remote.separateFileUriProcess": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.tabs.remote.separatePrivilegedMozillaWebContentProcess": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.tabs.remote.separatedMozillaDomains": {
"Value": "",
- "Status": "locked"
+ "Status": "locked",
+ "Type": "string"
},
"browser.tabs.searchclipboardfor.middleclick": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.translations.alwaysTranslateLanguages": {
"Value": "bg,ca,cs,da,de,el,en,es,et,fi,fr,hr,hu,id,it,ja,ko,lv,lt,nl,pl,pt,ro,ru,sk,sl,sr,sv,tr,uk,vi,zh-Hans",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"browser.translations.automaticallyPopup": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.translations.enable": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.translations.select.enable": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.xul.error_pages.expert_bad_cert": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.xul.error_pages.show_safe_browsing_details_on_load": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"datareporting.policy.dataSubmissionEnabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"datareporting.policy.dataSubmissionPolicyAccepted": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"datareporting.policy.dataSubmissionPolicyBypassNotification": {
"Value": true,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"datareporting.policy.firstRunURL": {
"Value": "",
- "Status": "locked"
+ "Status": "locked",
+ "Type": "string"
},
"dom.block_download_insecure": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.block_external_protocol_in_iframes": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.block_external_protocol_navigation_from_sandbox": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.disable_open_during_load": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.disable_window_flip": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.disable_window_move_resize": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.ipc.processCount.privilegedmozilla": {
"Value": 0,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "number"
},
"dom.ipc.processCount.webIsolated": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"dom.origin-trials.coep-credentialless.state": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"dom.origin-trials.enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"dom.origin-trials.private-attribution.state": {
"Value": 2,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "number"
},
"dom.popup_allowed_events": {
"Value": "click dblclick",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"dom.postMessage.sharedArrayBuffer.bypassCOOP_COEP.insecure.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.postMessage.sharedArrayBuffer.withCOOP_COEP": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.prefetch_dns_for_anchor_http_document": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.prefetch_dns_for_anchor_https_document": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.private-attribution.submission.enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"dom.reporting.crash.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.reporting.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.reporting.featurePolicy.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.reporting.header.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.security.https_first": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.security.https_first_for_custom_ports": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.security.https_first_pbm": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.security.https_first_schemeless": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.security.https_only_mode": {
"Value": true,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"dom.security.https_only_mode.upgrade_local": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.security.https_only_mode_error_page_user_suggestions": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.security.https_only_mode_pbm": {
"Value": true,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"dom.security.https_only_mode_send_http_background_request": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.security.skip_about_page_has_csp_assert": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.security.trusted_types.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.security.unexpected_system_load_telemetry_enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"dom.webgpu.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.autoDisableScopes": {
"Value": 15,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "number"
},
"extensions.blocklist.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.enabledScopes": {
"Value": 5,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"extensions.experiments.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.formautofill.addresses.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.formautofill.creditCards.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.formautofill.ml.experiment.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.getAddons.browseAddons": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"extensions.getAddons.showPane": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.htmlaboutaddons.recommendations.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.install.requireBuiltInCerts": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.installDistroAddons": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.postDownloadThirdPartyPrompt": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantinedDomains.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.{b86e4813-687a-43e6-ab65-0bde4ab75758}": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.{d19a89b9-76c1-4a61-bcd4-49e8de916403}": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.ads@mozac.org": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.bravesearch@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.cookies@mozac.org": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.ddg@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.duckduckgo-html@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.duckduckgo-lite@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.ecosia@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.kagi@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.kagi-html@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.leta-brave@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.leta-google@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.metager@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.mojeek@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.no-search@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.qwant@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.qwant-junior@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.startpage@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.swisscows@celenity.dev": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.wikipedia@search.mozilla.org": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.recommendations.themeRecommendationUrl": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"extensions.systemAddon.update.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.ui.lastCategory": {
"Value": "addons://list/extension",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"extensions.update.autoUpdateDefault": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.update.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.update.interval": {
"Value": 3600,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"extensions.update.notifyUser": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.update.requireBuiltInCerts": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.webapi.testing": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.webapi.testing.http": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.webcompat.enable_shims": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.webcompat.perform_injections": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.webcompat.perform_ua_overrides": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.webcompat.smartblockEmbeds.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.webcompat-reporter.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.webcompat-reporter.newIssueEndpoint": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"extensions.webextensions.remote": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.webextensions.restrictedDomains": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"extensions.webservice.discoverURL": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"general.autoScroll": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"general.smoothScroll": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"gfx.canvas.accelerated": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"gfx.canvas.accelerated.cache-items": {
"Value": 8192,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"gfx.canvas.accelerated.cache-size": {
"Value": 512,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"gfx.content.skia-font-cache-size": {
"Value": 20,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"gfx.font_rendering.graphite.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"gfx.font_rendering.opentype_svg.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"geo.provider.ms-windows-location": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"geo.provider.network.logging.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"gfx.webrender.all": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"gfx.webrender.compositor": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"geo.wifi.scan": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"intl.allow-insecure-text-input": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"layout.css.prefers-color-scheme.content-override": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"layout.css.report_errors": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"layout.css.visited_links_enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"layout.forms.reveal-password-button.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"layout.spellcheckDefault": {
"Value": 2,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"media.autoplay.default": {
"Value": 5,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"media.cache_readahead_limit": {
"Value": 7200,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"media.cache_resume_threshold": {
"Value": 3600,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"media.clearkey.persistent-license.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.clearkey.test-key-systems.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.devices.insecure.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.eme.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.eme.encrypted-media-encryption-scheme.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.eme.hdcp-policy-check.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.eme.playready.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.eme.require-app-approval": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.eme.widevine.experiment.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.eme.wmf.clearkey.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.ffmpeg.vaapi.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.getusermedia.insecure.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.gmp.insecure.allow": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.gmp-manager.cert.checkAttributes": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.gmp-manager.cert.requireBuiltIn": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.gmp-manager.checkContentSignature": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.gmp-manager.updateEnabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.gmp-widevinecdm.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.gmp-widevinecdm.visible": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.gmp-widevinecdm-l1.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.gmp-widevinecdm-l1.visible": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.memory_cache_max_size": {
"Value": 65536,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"media.peerconnection.ice.obfuscate_host_addresses": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.peerconnection.ice.proxy_only_if_behind_proxy": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.peerconnection.mtransport_process": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.webrtc.enable_pq_dtls": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.webspeech.synth.dont_notify_on_error": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.webvtt.testing.events": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.wmf.media-engine.enabled": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.auth.non-web-content-triggered-resources-http-auth-allow": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.auth.subresource-http-auth-allow": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.auth.subresource-img-cross-origin-http-auth-allow": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.captive-portal-service.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.connectivity-service.DNS_HTTPS.domain": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"network.connectivity-service.DNSv4.domain": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"network.connectivity-service.DNSv6.domain": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"network.connectivity-service.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.connectivity-service.IPv4.url": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"network.connectivity-service.IPv6.url": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"network.cookie.CHIPS.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.cookie.cookieBehavior": {
"Value": 5,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.cookie.cookieBehavior.optInPartitioning": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.cookie.cookieBehavior.optInPartitioning.pbmode": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.cookie.cookieBehavior.pbmode": {
"Value": 5,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.cookie.cookieBehavior.trackerCookieBlocking": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.cookie.sameSite.laxByDefault": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.cookie.sameSite.noneRequiresSecure": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.cookie.sameSite.schemeful": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.dns.disablePrefetch": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.dns.disablePrefetchFromHTTPS": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.dns.echconfig.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.dns.http3_echconfig.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.dns.native_https_query": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.dns.preferIPv6": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.dns.prefetch_via_proxy": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.dnsCacheEntries": {
"Value": 1000,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.dnsCacheExpiration": {
"Value": 3600,
@@ -1163,979 +1445,1228 @@
},
"network.dnsCacheExpirationGracePeriod": {
"Value": 240,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.early-hints.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.early-hints.over-http-v1-1.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.early-hints.preconnect.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.early-hints.preconnect.max_connections": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.file.disable_unc_paths": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.gio.supported-protocols": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"network.http.http3.enable_0rtt": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.http.http3.enable_kyber": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.http.max-connections": {
"Value": 1800,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.http.max-persistent-connections-per-proxy": {
"Value": 48,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.http.max-persistent-connections-per-server": {
"Value": 10,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.http.max-urgent-start-excessive-connections-per-host": {
"Value": 5,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.http.microsoft-entra-sso.container-enabled.0": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.http.microsoft-entra-sso.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.http.network_error_logging.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.http.referer.defaultPolicy.trackers": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.http.referer.defaultPolicy.trackers.pbmode": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.http.referer.disallowCrossSiteRelaxingDefault": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.http.referer.disallowCrossSiteRelaxingDefault.pbmode": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.http.referer.disallowCrossSiteRelaxingDefault.pbmode.top_navigation": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.http.referer.XOriginTrimmingPolicy": {
"Value": 2,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.http.speculative-parallel-limit": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.http.windows-sso.container-enabled.0": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.http.windows-sso.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.IDN_show_punycode": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.jar.record_failure_reason": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"network.microsoft-sso-authority-list": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"network.negotiate-auth.trusted-uris": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"network.notify.checkForNRPT": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.notify.checkForProxies": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.preconnect": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.predictor.enable-hover-on-ssl": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.predictor.enable-prefetch": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.predictor.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.prefetch-next": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.proxy.allow_bypass": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.proxy.failover_direct": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.proxy.socks_remote_dns": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.proxy.socks5_remote_dns": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.protocol-handler.external.shell": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"network.protocol-handler.warn-external-default": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.traffic_analyzer.enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"network.trr.confirmation_telemetry_enabled": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"network.trr.confirmationNS": {
"Value": "skip",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"network.trr.default_provider_uri": {
"Value": "https://dns.quad9.net/dns-query",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"network.trr.disable-ECS": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.trr.display_fallback_warning": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.trr.mode": {
"Value": 3,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"network.trr.retry_on_recoverable_errors": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.trr.send_accept-language_headers": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.trr.send_empty_accept-encoding_headers": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.trr.send_user-agent_headers": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.trr.strict_native_fallback": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.trr_ui.show_fallback_warning_option": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.websocket.allowInsecureFromHTTPS": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"pdfjs.enablePermissions": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"pdfjs.enableScripting": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"pdfjs.enableXfa": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"pdfjs.sidebarViewOnLoad": {
"Value": 2,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"privacy.globalprivacycontrol.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"privacy.userContext.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"security.default_personal_cert": {
"Value": "Ask Every Time",
- "Status": "locked"
+ "Status": "locked",
+ "Type": "string"
},
"security.insecure_connection_text.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"security.insecure_connection_text.pbmode.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"security.mixed_content.block_active_content": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"security.mixed_content.block_display_content": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"security.mixed_content.upgrade_display_content": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"security.OCSP.enabled": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"security.OCSP.require": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"security.pki.certificate_transparency.mode": {
"Value": 2,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"security.ssl.enable_ocsp_stapling": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"security.ssl.require_safe_negotiation": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"security.tls.enable_0rtt_data": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"security.tls.hello_downgrade_check": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"security.tls.version.enable-deprecated": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"security.warn_submit_secure_to_insecure": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"signon.autofillForms": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"signon.autofillForms.http": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"signon.firefoxRelay.feature": {
"Value": "disabled",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"signon.firefoxRelay.manage_url": {
"Value": "https://relay.firefox.com/accounts/profile/",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"signon.formlessCapture.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"signon.generation.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"signon.privateBrowsingCapture.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"signon.storeWhenAutocompleteOff": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"toolkit.legacyUserProfileCustomizations.stylesheets": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"ui.hideCursorWhileTyping": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"ui.key.menuAccessKeyFocuses": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"ui.panelAnimations": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"ui.prefersReducedMotion": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"ui.prefersReducedTransparency": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"ui.scrollToClick": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"ui.swipeAnimationEnabled": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"ui.useAccessibilityTheme": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"widget.non-native-theme.use-theme-accent": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"xpinstall.whitelist.required": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.phoenix.core.policies.status": {
"Value": "successfully applied :D",
- "Status": "locked"
+ "Status": "locked",
+ "Type": "string"
},
"browser.download.manager.behavior": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"browser.download.manager.focusWhenStarting": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.download.manager.showAlertOnComplete": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.download.manager.showWhenStarting": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"browser.EULA.override": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
+ },
+ "browser.privatebrowsing.autostart": {
+ "Value": false,
+ "Status": "locked",
+ "Type": "boolean"
},
"browser.rights.override": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"calendar.extract.service.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"chat.prpls.prpl-facebook.disable": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"chat.prpls.prpl-gtalk.disable": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"chat.prpls.prpl-twitter.disable": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"chat.prpls.prpl-yahoo.disable": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"dom.disable_window_status_change": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.abuseReport.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.cardbook.useOnlyEmail": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.arh.read": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.arh.replaceAddonResult": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.debug": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.display.favicon.show": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.display.keySecure": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.dkim.enable": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.dns.nameserver": {
"Value": "9.9.9.9",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"extensions.dkim_verifier.error.algorithm.rsa.weakKeyLength.treatAs": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"extensions.dkim_verifier.error.algorithm.sign.rsa-sha1.treatAs": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"extensions.dkim_verifier.error.detailedReasons": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.error.illformed_i.treatAs": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"extensions.dkim_verifier.error.illformed_s.treatAs": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"extensions.dkim_verifier.error.policy.key_insecure.treatAs": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"extensions.dkim_verifier.key.storing": {
"Value": 2,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"extensions.dkim_verifier.policy.DMARC.shouldBeSigned.enable": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.policy.DMARC.shouldBeSigned.neededPolicy": {
"Value": "none",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"extensions.dkim_verifier.policy.dkim.unsignedHeadersWarning.mode": {
"Value": 30,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"extensions.dkim_verifier.policy.signRules.autoAddRule.enable": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.policy.signRules.autoAddRule.for": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"extensions.dkim_verifier.policy.signRules.autoAddRule.onlyIfFromAddressInSDID": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.policy.signRules.checkDefaultRules": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.policy.signRules.enable": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.policy.signRules.error.wrong_sdid.asWarning": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.policy.signRules.sdid.allowSubDomains": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.saveResult": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.dkim_verifier.showDKIMFromTooltip": {
"Value": 50,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"extensions.dkim_verifier.showDKIMHeader": {
"Value": 50,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"extensions.getAddons.discovery.api_url": {
"Value": "https://dove.celenity.dev/extensions/recommendations.json",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"extensions.getAddons.search.browseURL": {
"Value": "https://addons.thunderbird.net/%LOCALE%/%APP%/search/?q=%TERMS%",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"extensions.quarantineIgnoredByUser.dkim_verifier@pl": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"extensions.quarantineIgnoredByUser.uBlock0@raymondhill.net": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"extensions.recommendations.privacyPolicyUrl": {
"Value": "https://dove.celenity.dev/privacy#extension-recommendations",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"extensions.strictCompatibility": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"geo.provider.network.url": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"geo.provider.use_corelocation": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"geo.provider.use_geoclue": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.addressDisplayFormat": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"mail.biff.alert.show_preview": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.biff.alert.show_sender": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.biff.alert.show_subject": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.chat.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.chat.notification_info": {
"Value": 2,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"mail.cloud_files.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.collect_email_address_outgoing": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.compose.add_link_preview": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.compose.warn_public_recipients.aggressive": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.dark-reader.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.dark-reader.show-toggle": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.default_send_format": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"mail.e2ee.auto_enable": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.e2ee.auto_disable": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"mail.e2ee.notify_on_auto_disable": {
"Value": true,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"mail.external_protocol_requires_permission": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.html_compose": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.html_sanitize.drop_conditional_css": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.identity.default.compose_html": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.identity.default.sign_mail": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.imap.use_disk_cache2": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.mdn.report.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.mdn.report.not_in_to_cc": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"mail.mdn.report.outside_domain": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"mail.mdn.report.other": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"mail.openpgp.allow_external_gnupg": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.openpgp.remind_encryption_possible": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.phishing.detection.disallow_form_actions": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.phishing.detection.enabled": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.phishing.detection.ipaddresses": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.phishing.detection.mismatched_hosts": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.provider.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.provider.suppress_dialog_on_startup": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.rights.override": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.sanitize_date_header": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.save_msg_filename_underscores_for_space": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.server.default.mdn_not_in_to_cc": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"mail.server.default.mdn_other": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"mail.server.default.mdn_outside_domain": {
"Value": 0,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"mail.server.default.mdn_report_enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.shell.checkDefaultClient": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.show_headers": {
"Value": 2,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"mail.showCondensedAddresses": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.smime.accept_insecure_sha1_message_signatures": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.smime.remind_encryption_possible": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.smtpserver.default.hello_argument": {
"Value": "[127.0.0.1]",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"mail.spellcheck.inline": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.SpellCheckBeforeSend": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.spotlight.enable": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.spotlight.firstRunDone": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.suppress_content_language": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.winsearch.enable": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.winsearch.firstRunDone": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.auto_config.fetchFromISP.sendEmailAddress": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.auto_config.fetchFromISP.sslOnly": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.auto_config.guess.requireGoodCert": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.auto_config.guess.sslOnly": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.display.date_senders_timezone": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.display.disallow_mime_handlers": {
"Value": 3,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"mailnews.display.html_as": {
"Value": 3,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"mailnews.display.prefer_plaintext": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.downloadToTempFile": {
"Value": false,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"mailnews.headers.sendUserAgent": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.headers.showMessageId": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.headers.showOrganization": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.headers.showReferences": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.headers.showSender": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.headers.showUserAgent": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.headers.useMinimalUserAgent": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.message_display.disable_remote_image": {
"Value": true,
- "Status": "locked"
+ "Status": "locked",
+ "Type": "boolean"
},
"mailnews.oauth.usePrivateBrowser": {
"Value": false,
- "Status": "default"
+ "Status": "locked",
+ "Type": "boolean"
},
"mailnews.reply_header_authorwroteondate": {
"Value": "#1 wrote on #2 #3:",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"mailnews.reply_header_authorwrotesingle": {
"Value": "#1 wrote:",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"mailnews.reply_header_ondateauthorwrote": {
"Value": "On #2 #3, #1 wrote:",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"mailnews.reply_header_type": {
"Value": 1,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"mailnews.show_send_progress": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.start_page.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mailnews.start_page.override_url": {
"Value": "",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"mailnews.start_page.url": {
"Value": "about:config",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"mailnews.start_page_override.mstone": {
"Value": "ignore",
- "Status": "default"
+ "Status": "default",
+ "Type": "string"
},
"media.autoplay.blocking_policy": {
"Value": 2,
- "Status": "default"
+ "Status": "default",
+ "Type": "number"
},
"media.gmp-gmpopenh264.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.gmp-gmpopenh264.provider.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.gmp-gmpopenh264.visible": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.gmp-provider.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.peerconnection.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.peerconnection.ice.default_address_only": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.peerconnection.ice.no_host": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"media.peerconnection.ice.relay_only": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.cookie.noPersistentStorage": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"network.http.referer.XOriginPolicy": {
"Value": 2,
- "Status": "user"
+ "Status": "user",
+ "Type": "number"
},
"pdfjs.firstRun": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"places.history.enabled": {
"Value": false,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"signon.rememberSignons": {
"Value": true,
- "Status": "default"
+ "Status": "default",
+ "Type": "boolean"
},
"mail.dove.policies.status": {
"Value": "successfully applied :D",
- "Status": "locked"
+ "Status": "locked",
+ "Type": "string"
}
},
"Proxy": {
diff --git a/prefs/dove.js b/prefs/dove.js
index 2fb605c..89c9b9c 100644
--- a/prefs/dove.js
+++ b/prefs/dove.js
@@ -16,7 +16,7 @@
// Welcome to the heart of the Phoenix.
// This file contains preferences shared across all Phoenix configs, platforms (Desktop & Android), and Dove.
-pref("browser.phoenix.version", "2025.02.14.1", locked);
+pref("browser.phoenix.version", "2025.02.18.1", locked);
// 000 ABOUT:CONFIG
@@ -841,6 +841,7 @@ pref("browser.phoenix.core.status", "014");
pref("pdfjs.enableScripting", false);
/// Disable XFA
+// https://learn.microsoft.com/deployedge/microsoft-edge-policies#viewxfapdfiniemodeallowedorigins
// https://insert-script.blogspot.com/2019/01/adobe-reader-pdf-callback-via-xslt.html
// https://www.sentinelone.com/blog/malicious-pdfs-revealing-techniques-behind-attacks/
// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=xfa
@@ -1396,6 +1397,14 @@ pref("dom.origin-trials.coep-credentialless.state", 1); // https://searchfox.org
pref("browser.tabs.remote.enforceRemoteTypeRestrictions", true); // [DEFAULT - Nightly Desktop]
+/// Disable automatic updates for OpenSearch engines
+// Doesn't appear to impact Mozilla's built-in search engines
+// Also has privacy implications (extra unsolicited connections to third parties...)
+// https://firefox-source-docs.mozilla.org/toolkit/search/Preferences.html#hidden
+// https://developer.mozilla.org/docs/Web/XML/Guides/OpenSearch#supporting_automatic_updates_for_opensearch_plugins
+
+pref("browser.search.update", false); // [DEFAULT - Android]
+
pref("browser.phoenix.core.status", "020");
// 021 BLOCK COOKIE BANNERS
@@ -1406,7 +1415,6 @@ pref("cookiebanners.service.mode", 1);
pref("cookiebanners.service.mode.privateBrowsing", 1); // [DEFAULT - Nightly Android]
pref("cookiebanners.service.enableGlobalRules", true); // [DEFAULT]
pref("cookiebanners.service.enableGlobalRules.subFrames", true); // [DEFAULT]
-pref("cookiebanners.ui.desktop.enabled", true);
pref("browser.phoenix.core.status", "021");
@@ -1667,13 +1675,13 @@ pref("security.enterprise_roots.enabled", false, locked);
pref("browser.phoenix.desktop.common.status", "003");
-// 004 GEOLOCATION
+// 004 GEOLOCATION [NO-OSX]
-/// Configure OS Geolocation providers
+/// Configure OS Geolocation providers [NO-OSX]
-pref("geo.provider.ms-windows-location", false); // Disable Microsoft Location Services for Windows users
+pref("geo.provider.ms-windows-location", false); // Disable Microsoft Location Services for Windows users [NO-OSX]
-pref("browser.phoenix.desktop.common.status", "004");
+pref("browser.phoenix.desktop.common.status", "004"); // [NO-OSX]
// 005 DISK AVOIDANCE
@@ -1686,9 +1694,9 @@ pref("privacy.cpd.cache", true); // [DEFAULT]
pref("privacy.sanitize.timeSpan", 0);
-/// Prevent automatically starting Firefox & restoring session after reboot on Windows
+/// Prevent automatically starting Firefox & restoring session after reboot on Windows [NO-OSX]
-pref("toolkit.winRegisterApplicationRestart", false);
+pref("toolkit.winRegisterApplicationRestart", false); // [NO-OSX]
pref("browser.phoenix.desktop.common.status", "005");
@@ -1707,9 +1715,9 @@ pref("browser.phoenix.desktop.common.status", "006");
// 007 MISC. PRIVACY
-/// [WINDOWS] Ensure we never save clipboard history/contents to the cloud...
+/// [WINDOWS] Ensure we never save clipboard history/contents to the cloud... [NO-OSX]
-pref("clipboard.copyPrivateDataToClipboardCloudOrHistory", false); // [DEFAULT]
+pref("clipboard.copyPrivateDataToClipboardCloudOrHistory", false); // [DEFAULT] [NO-OSX]
/// Disable Firefox Sync by default
// When signing in to Firefox Sync, this controls the items (checkboxes) that are set to sync (under about:preferences#sync).
@@ -1745,19 +1753,19 @@ pref("browser.phoenix.desktop.common.status", "008");
// 009 MISC. SECURITY
-/// [WINDOWS] Disable Win32k System Calls
-// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15638
-// https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html
-// https://docs.google.com/document/d/1gJDlk-9xkh6_8M_awrczWCaUuyr0Zd2TKjNBCiPO_G4/edit
+/// [WINDOWS] Disable Win32k System Calls [NO-OSX]
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15638 [NO-OSX]
+// https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html [NO-OSX]
+// https://docs.google.com/document/d/1gJDlk-9xkh6_8M_awrczWCaUuyr0Zd2TKjNBCiPO_G4/edit [NO-OSX]
-pref("security.sandbox.content.win32k-disable", true); // [DEFAULT]
-pref("security.sandbox.gmp.win32k-disable", true);
-pref("security.sandbox.socket.win32k-disable", true); // [DEFAULT]
+pref("security.sandbox.content.win32k-disable", true); // [DEFAULT] [NO-OSX]
+pref("security.sandbox.gmp.win32k-disable", true); // [NO-OSX]
+pref("security.sandbox.socket.win32k-disable", true); // [DEFAULT] [NO-OSX]
-/// Disable GNOME Integration
-// https://searchfox.org/mozilla-central/source/browser/components/shell/nsGNOMEShellService.cpp
+/// Disable GNOME Integration [NO-OSX]
+// https://searchfox.org/mozilla-central/source/browser/components/shell/nsGNOMEShellService.cpp [NO-OSX]
-pref("browser.gnome-search-provider.enabled", false); // [HIDDEN]
+pref("browser.gnome-search-provider.enabled", false); // [HIDDEN] [NO-OSX]
/// If a remote AutoConfig is being used, block it from gaining privileged browser access...
// https://www.mozilla.org/firefox/62.0/releasenotes/
@@ -1768,29 +1776,29 @@ pref("browser.phoenix.desktop.common.status", "009");
// 010 MEDIA
-/// Always sandbox GMP on GNU/Linux
-// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml
+/// Always sandbox GMP on GNU/Linux [NO-OSX]
+// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml [NO-OSX]
-pref("media.gmp.insecure.allow", false); // [DEFAULT]
+pref("media.gmp.insecure.allow", false); // [DEFAULT] [NO-OSX]
/// Remove DRM toggle in `about:preferences#general`
pref("browser.eme.ui.enabled", false);
-/// Disable Microsoft PlayReady DRM
+/// Disable Microsoft PlayReady DRM [NO-OSX]
-pref("media.eme.playready.enabled", false);
+pref("media.eme.playready.enabled", false); // [NO-OSX]
-/// Explicitly disable Windows Media Foundation Clearkey DRM
+/// Explicitly disable Windows Media Foundation Clearkey DRM [NO-OSX]
-pref("media.eme.wmf.clearkey.enabled", false); // [DEFAULT]
+pref("media.eme.wmf.clearkey.enabled", false); // [DEFAULT] [NO-OSX]
-/// Disable Windows Media Foundation Media Engine
-// By default, it's enabled for protected content (DRM)
-// Enabling it for standard content appears to cause video playback issues (ex. on YouTube)
-// https://learn.microsoft.com/windows/win32/medfound/about-the-media-foundation-sdk
+/// Disable Windows Media Foundation Media Engine [NO-OSX]
+// By default, it's enabled for protected content (DRM) [NO-OSX]
+// Enabling it for standard content appears to cause video playback issues (ex. on YouTube) [NO-OSX]
+// https://learn.microsoft.com/windows/win32/medfound/about-the-media-foundation-sdk [NO-OSX]
-pref("media.wmf.media-engine.enabled", 0);
+pref("media.wmf.media-engine.enabled", 0); // [NO-OSX]
/// Enable click to play UI for certain CSS skins by default...
// https://github.com/black7375/Firefox-UI-Fix/blob/master/css/leptonContent.css#L223
@@ -1834,7 +1842,7 @@ pref("browser.phoenix.desktop.common.status", "013");
// 014 PERFORMANCE
// A lot of these taken from https://github.com/yokoffing/Betterfox/blob/main/Fastfox.js
-pref("media.ffmpeg.vaapi.enabled", true); // Enable VA-API by default
+pref("media.ffmpeg.vaapi.enabled", true); // Enable VA-API by default [NO-OSX]
pref("network.http.max-connections", 1800); // [Default = 900]
/// Disables certain UI animations
@@ -2015,7 +2023,7 @@ pref("browser.phoenix.extended.desktop.common.status", "successfully applied :D"
// Built from Phoenix (Extended)
-pref("mail.dove.version", "2025.02.14.1", locked);
+pref("mail.dove.version", "2025.02.18.1", locked);
pref("mail.dove.status", "000");
@@ -2624,12 +2632,12 @@ pref("mailnews.oauth.usePrivateBrowser", false, locked); // Breaks uBlock Origin
pref("mail.dove.status", "013");
-// 014 Enable support for custom/specialized configs...
+// 014 Enable support for custom/specialized configs... // [NO-OSX]
-pref("general.config.filename", "dove.cfg");
-pref("general.config.vendor", "dove");
-pref("general.config.obscure_value", 0);
+pref("general.config.filename", "dove.cfg"); // [NO-OSX]
+pref("general.config.vendor", "dove"); // [NO-OSX]
+pref("general.config.obscure_value", 0); // [NO-OSX]
-pref("mail.dove.status", "014");
+pref("mail.dove.status", "014"); // [NO-OSX]
pref("mail.dove.status", "successfully applied :D", locked);