diff --git a/archives/dove-osx.zip b/archives/dove-osx.zip new file mode 100644 index 0000000..081a90a Binary files /dev/null and b/archives/dove-osx.zip differ diff --git a/archives/dove.zip b/archives/dove.zip index e90878e..4ffab6f 100644 Binary files a/archives/dove.zip and b/archives/dove.zip differ diff --git a/build/prefs/dove.js b/build/prefs/dove.js index 3c0bd9c..b74463d 100644 --- a/build/prefs/dove.js +++ b/build/prefs/dove.js @@ -15,7 +15,7 @@ // Built from Phoenix (Extended) -pref("mail.dove.version", "2025.02.14.1", locked); +pref("mail.dove.version", "2025.02.18.1", locked); pref("mail.dove.status", "000"); diff --git a/dove.cfg b/dove.cfg index 7992d3d..e0fd30c 100644 --- a/dove.cfg +++ b/dove.cfg @@ -16,7 +16,7 @@ // Welcome to the heart of the Phoenix. // This file contains preferences shared across all Phoenix configs, platforms (Desktop & Android), and Dove. -lockPref("browser.phoenix.version", "2025.02.14.1"); +lockPref("browser.phoenix.version", "2025.02.18.1"); // 000 ABOUT:CONFIG @@ -841,6 +841,7 @@ defaultPref("browser.phoenix.core.status", "014"); defaultPref("pdfjs.enableScripting", false); /// Disable XFA +// https://learn.microsoft.com/deployedge/microsoft-edge-policies#viewxfapdfiniemodeallowedorigins // https://insert-script.blogspot.com/2019/01/adobe-reader-pdf-callback-via-xslt.html // https://www.sentinelone.com/blog/malicious-pdfs-revealing-techniques-behind-attacks/ // https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=xfa @@ -1396,6 +1397,14 @@ defaultPref("dom.origin-trials.coep-credentialless.state", 1); // https://search defaultPref("browser.tabs.remote.enforceRemoteTypeRestrictions", true); // [DEFAULT - Nightly Desktop] +/// Disable automatic updates for OpenSearch engines +// Doesn't appear to impact Mozilla's built-in search engines +// Also has privacy implications (extra unsolicited connections to third parties...) +// https://firefox-source-docs.mozilla.org/toolkit/search/Preferences.html#hidden +// https://developer.mozilla.org/docs/Web/XML/Guides/OpenSearch#supporting_automatic_updates_for_opensearch_plugins + +defaultPref("browser.search.update", false); // [DEFAULT - Android] + defaultPref("browser.phoenix.core.status", "020"); // 021 BLOCK COOKIE BANNERS @@ -1406,7 +1415,6 @@ defaultPref("cookiebanners.service.mode", 1); defaultPref("cookiebanners.service.mode.privateBrowsing", 1); // [DEFAULT - Nightly Android] defaultPref("cookiebanners.service.enableGlobalRules", true); // [DEFAULT] defaultPref("cookiebanners.service.enableGlobalRules.subFrames", true); // [DEFAULT] -defaultPref("cookiebanners.ui.desktop.enabled", true); defaultPref("browser.phoenix.core.status", "021"); @@ -1667,13 +1675,13 @@ lockPref("security.enterprise_roots.enabled", false); defaultPref("browser.phoenix.desktop.common.status", "003"); -// 004 GEOLOCATION +// 004 GEOLOCATION [NO-OSX] -/// Configure OS Geolocation providers +/// Configure OS Geolocation providers [NO-OSX] -defaultPref("geo.provider.ms-windows-location", false); // Disable Microsoft Location Services for Windows users +defaultPref("geo.provider.ms-windows-location", false); // Disable Microsoft Location Services for Windows users [NO-OSX] -defaultPref("browser.phoenix.desktop.common.status", "004"); +defaultPref("browser.phoenix.desktop.common.status", "004"); // [NO-OSX] // 005 DISK AVOIDANCE @@ -1686,9 +1694,9 @@ defaultPref("privacy.cpd.cache", true); // [DEFAULT] defaultPref("privacy.sanitize.timeSpan", 0); -/// Prevent automatically starting Firefox & restoring session after reboot on Windows +/// Prevent automatically starting Firefox & restoring session after reboot on Windows [NO-OSX] -defaultPref("toolkit.winRegisterApplicationRestart", false); +defaultPref("toolkit.winRegisterApplicationRestart", false); // [NO-OSX] defaultPref("browser.phoenix.desktop.common.status", "005"); @@ -1707,9 +1715,9 @@ defaultPref("browser.phoenix.desktop.common.status", "006"); // 007 MISC. PRIVACY -/// [WINDOWS] Ensure we never save clipboard history/contents to the cloud... +/// [WINDOWS] Ensure we never save clipboard history/contents to the cloud... [NO-OSX] -defaultPref("clipboard.copyPrivateDataToClipboardCloudOrHistory", false); // [DEFAULT] +defaultPref("clipboard.copyPrivateDataToClipboardCloudOrHistory", false); // [DEFAULT] [NO-OSX] /// Disable Firefox Sync by default // When signing in to Firefox Sync, this controls the items (checkboxes) that are set to sync (under about:preferences#sync). @@ -1745,19 +1753,19 @@ defaultPref("browser.phoenix.desktop.common.status", "008"); // 009 MISC. SECURITY -/// [WINDOWS] Disable Win32k System Calls -// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15638 -// https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html -// https://docs.google.com/document/d/1gJDlk-9xkh6_8M_awrczWCaUuyr0Zd2TKjNBCiPO_G4/edit +/// [WINDOWS] Disable Win32k System Calls [NO-OSX] +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15638 [NO-OSX] +// https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html [NO-OSX] +// https://docs.google.com/document/d/1gJDlk-9xkh6_8M_awrczWCaUuyr0Zd2TKjNBCiPO_G4/edit [NO-OSX] -defaultPref("security.sandbox.content.win32k-disable", true); // [DEFAULT] -defaultPref("security.sandbox.gmp.win32k-disable", true); -defaultPref("security.sandbox.socket.win32k-disable", true); // [DEFAULT] +defaultPref("security.sandbox.content.win32k-disable", true); // [DEFAULT] [NO-OSX] +defaultPref("security.sandbox.gmp.win32k-disable", true); // [NO-OSX] +defaultPref("security.sandbox.socket.win32k-disable", true); // [DEFAULT] [NO-OSX] -/// Disable GNOME Integration -// https://searchfox.org/mozilla-central/source/browser/components/shell/nsGNOMEShellService.cpp +/// Disable GNOME Integration [NO-OSX] +// https://searchfox.org/mozilla-central/source/browser/components/shell/nsGNOMEShellService.cpp [NO-OSX] -defaultPref("browser.gnome-search-provider.enabled", false); // [HIDDEN] +defaultPref("browser.gnome-search-provider.enabled", false); // [HIDDEN] [NO-OSX] /// If a remote AutoConfig is being used, block it from gaining privileged browser access... // https://www.mozilla.org/firefox/62.0/releasenotes/ @@ -1768,29 +1776,29 @@ defaultPref("browser.phoenix.desktop.common.status", "009"); // 010 MEDIA -/// Always sandbox GMP on GNU/Linux -// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml +/// Always sandbox GMP on GNU/Linux [NO-OSX] +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml [NO-OSX] -defaultPref("media.gmp.insecure.allow", false); // [DEFAULT] +defaultPref("media.gmp.insecure.allow", false); // [DEFAULT] [NO-OSX] /// Remove DRM toggle in `about:preferences#general` defaultPref("browser.eme.ui.enabled", false); -/// Disable Microsoft PlayReady DRM +/// Disable Microsoft PlayReady DRM [NO-OSX] -defaultPref("media.eme.playready.enabled", false); +defaultPref("media.eme.playready.enabled", false); // [NO-OSX] -/// Explicitly disable Windows Media Foundation Clearkey DRM +/// Explicitly disable Windows Media Foundation Clearkey DRM [NO-OSX] -defaultPref("media.eme.wmf.clearkey.enabled", false); // [DEFAULT] +defaultPref("media.eme.wmf.clearkey.enabled", false); // [DEFAULT] [NO-OSX] -/// Disable Windows Media Foundation Media Engine -// By default, it's enabled for protected content (DRM) -// Enabling it for standard content appears to cause video playback issues (ex. on YouTube) -// https://learn.microsoft.com/windows/win32/medfound/about-the-media-foundation-sdk +/// Disable Windows Media Foundation Media Engine [NO-OSX] +// By default, it's enabled for protected content (DRM) [NO-OSX] +// Enabling it for standard content appears to cause video playback issues (ex. on YouTube) [NO-OSX] +// https://learn.microsoft.com/windows/win32/medfound/about-the-media-foundation-sdk [NO-OSX] -defaultPref("media.wmf.media-engine.enabled", 0); +defaultPref("media.wmf.media-engine.enabled", 0); // [NO-OSX] /// Enable click to play UI for certain CSS skins by default... // https://github.com/black7375/Firefox-UI-Fix/blob/master/css/leptonContent.css#L223 @@ -1834,7 +1842,7 @@ defaultPref("browser.phoenix.desktop.common.status", "013"); // 014 PERFORMANCE // A lot of these taken from https://github.com/yokoffing/Betterfox/blob/main/Fastfox.js -defaultPref("media.ffmpeg.vaapi.enabled", true); // Enable VA-API by default +defaultPref("media.ffmpeg.vaapi.enabled", true); // Enable VA-API by default [NO-OSX] defaultPref("network.http.max-connections", 1800); // [Default = 900] /// Disables certain UI animations @@ -2015,7 +2023,7 @@ lockPref("browser.phoenix.extended.desktop.common.status", "successfully applied // Built from Phoenix (Extended) -lockPref("mail.dove.version", "2025.02.14.1"); +lockPref("mail.dove.version", "2025.02.18.1"); defaultPref("mail.dove.status", "000"); @@ -2624,12 +2632,12 @@ lockPref("mailnews.oauth.usePrivateBrowser", false); // Breaks uBlock Origin & a defaultPref("mail.dove.status", "013"); -// 014 Enable support for custom/specialized configs... +// 014 Enable support for custom/specialized configs... // [NO-OSX] -defaultPref("general.config.filename", "dove.cfg"); -defaultPref("general.config.vendor", "dove"); -defaultPref("general.config.obscure_value", 0); +defaultPref("general.config.filename", "dove.cfg"); // [NO-OSX] +defaultPref("general.config.vendor", "dove"); // [NO-OSX] +defaultPref("general.config.obscure_value", 0); // [NO-OSX] -defaultPref("mail.dove.status", "014"); +defaultPref("mail.dove.status", "014"); // [NO-OSX] lockPref("mail.dove.status", "successfully applied :D"); diff --git a/macos/dove.cfg b/macos/dove.cfg new file mode 100644 index 0000000..fee1791 --- /dev/null +++ b/macos/dove.cfg @@ -0,0 +1,2607 @@ +// +// The Phoenix shall rise from the ashes of what fell before it. + +// +// Copyright (C) 2024-2025 celenity +// +// This file is part of Phoenix. +// +// Phoenix is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. +// +// Phoenix is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. +// +// You should have received a copy of the GNU General Public License along with Phoenix. If not, see https://www.gnu.org/licenses/. +// + +// Welcome to the heart of the Phoenix. +// This file contains preferences shared across all Phoenix configs, platforms (Desktop & Android), and Dove. + +lockPref("browser.phoenix.version", "2025.02.18.1"); + +// 000 ABOUT:CONFIG + +/// Ensure that about:config is always enabled... + +lockPref("general.aboutConfig.enable", true); // [DEFAULT on Desktop] + +// Disable annoying warnings when attempting to access the about:config + +defaultPref("general.warnOnAboutConfig", false); + +defaultPref("browser.phoenix.core.status", "000"); + +// 001 DATA COLLECTION + +// A lot of defense in depth... + +/// Shield Studies/Normandy/Nimbus +// We also set "DisableFirefoxStudies" in policies on Desktop +// https://mozilla.github.io/policy-templates/#disablefirefoxstudies +// https://mozilla.github.io/normandy/ +// https://wiki.mozilla.org/Firefox/Shield/Shield_Studies +// https://support.mozilla.org/kb/shield +// https://support.mozilla.org/kb/how-stop-firefox-making-automatic-connections#w_experiments-or-studies +// https://wiki.mozilla.org/Advocacy/heartbeat +// https://experimenter.info/ +// resource://nimbus/ExperimentAPI.sys.mjs + +lockPref("toolkit.telemetry.pioneer-new-studies-available", false); + +/// Origin Trials +// https://wiki.mozilla.org/Origin_Trials + +lockPref("dom.origin-trials.enabled", false); + +/// Crash Reporting +// https://github.com/mozilla-services/socorro +// https://wiki.mozilla.org/Socorro +// https://firefox-source-docs.mozilla.org/tools/sanitizer/asan_nightly.html +// https://github.com/choller/firefox-asan-reporter + +lockPref("asanreporter.apiurl", ""); +lockPref("asanreporter.clientid", ""); +defaultPref("asanreporter.loglevel", 70); +lockPref("breakpad.reportURL", ""); +lockPref("toolkit.crashreporter.include_context_heap", false); // Defense in depth + +/// X-Frame Options Error Reporting +// https://firefox-source-docs.mozilla.org/toolkit/components/telemetry/data/xfocsp-error-report-ping.html + +lockPref("security.xfocsp.errorReporting.automatic", false); // [DEFAULT] +lockPref("security.xfocsp.errorReporting.enabled", false); + +/// Coverage +// https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/ +// https://searchfox.org/mozilla-central/source/toolkit/components/telemetry/pings/CoveragePing.sys.mjs +// https://bugzilla.mozilla.org/show_bug.cgi?id=1487578 + +lockPref("toolkit.telemetry.coverage.opt-out", true); // [HIDDEN] + +/// Misc. Telemetry +/// We also configure "DisableTelemetry" & "ImproveSuggest" in policies on Desktop +// https://mozilla.github.io/policy-templates/#disabletelemetry +// https://mozilla.github.io/policy-templates/#firefoxsuggest +// https://searchfox.org/mozilla-central/source/testing/geckodriver/src/prefs.rs +// https://wiki.mozilla.org/QA/Telemetry +// https://firefox-source-docs.mozilla.org/toolkit/components/telemetry/internals/preferences.html +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml +// https://searchfox.org/mozilla-central/source/remote/shared/RecommendedPreferences.sys.mjs +// https://searchfox.org/mozilla-central/source/testing/profiles/perf/user.js + +lockPref("browser.places.interactions.enabled", false); // https://searchfox.org/mozilla-central/source/browser/app/profile/firefox.js +defaultPref("browser.rights.3.shown", true); +lockPref("browser.safebrowsing.features.emailtracking.datacollection.update", false); // [HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +lockPref("captchadetection.actor.enabled", false); // [DEFAULT - non-Nightly] Disable CAPTCHA Detection Pings https://searchfox.org/mozilla-central/source/toolkit/components/captchadetection +defaultPref("captchadetection.loglevel", "Off"); +lockPref("datareporting.dau.cachedUsageProfileID", "beefbeef-beef-beef-beef-beeefbeefbee"); // [HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/telemetry/app/ClientID.sys.mjs#44 +lockPref("datareporting.healthreport.documentServerURI", ""); // [HIDDEN] +defaultPref("datareporting.healthreport.logging.consoleEnabled", false); // [HIDDEN] +lockPref("datareporting.healthreport.service.enabled", false); // [HIDDEN] +lockPref("datareporting.healthreport.service.firstRun", false); // [HIDDEN] +lockPref("datareporting.healthreport.uploadEnabled", false); +lockPref("datareporting.policy.dataSubmissionEnabled", false); +lockPref("datareporting.policy.dataSubmissionPolicyAccepted", false); +lockPref("datareporting.policy.dataSubmissionPolicyBypassNotification", true); +lockPref("datareporting.policy.firstRunURL", ""); +lockPref("datareporting.usage.uploadEnabled", false); // Disables sending "daily usage pings" to Mozilla - currently only on Nightly https://support.mozilla.org/kb/usage-ping-settings +lockPref("dom.security.unexpected_system_load_telemetry_enabled", false); +lockPref("network.jar.record_failure_reason", false); // https://searchfox.org/mozilla-release/source/modules/libpref/init/StaticPrefList.yaml#14397 +lockPref("network.traffic_analyzer.enabled", false); // https://searchfox.org/mozilla-release/source/modules/libpref/init/StaticPrefList.yaml#13191 +lockPref("network.trr.confirmation_telemetry_enabled", false); +lockPref("privacy.imageInputTelemetry.enableTestMode", false); // [HIDDEN] "Event Telemetry" https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15549 +lockPref("privacy.trackingprotection.emailtracking.data_collection.enabled", false); +lockPref("toolkit.content-background-hang-monitor.disabled", true); // BHR https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#16720 +lockPref("toolkit.telemetry.archive.enabled", false); +lockPref("toolkit.telemetry.bhrPing.enabled", false); +lockPref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0"); +lockPref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde"); +lockPref("toolkit.telemetry.dap.helper.hpke", ""); +lockPref("toolkit.telemetry.dap.helper.url", ""); +lockPref("toolkit.telemetry.dap.leader.hpke", ""); +lockPref("toolkit.telemetry.dap.leader.url", ""); +defaultPref("toolkit.telemetry.dap.logLevel", "Off"); +lockPref("toolkit.telemetry.dap_enabled", false); // [DEFAULT] +lockPref("toolkit.telemetry.dap_helper", ""); +lockPref("toolkit.telemetry.dap_helper_owner", ""); +lockPref("toolkit.telemetry.dap_leader", ""); +lockPref("toolkit.telemetry.dap_leader_owner", ""); +lockPref("toolkit.telemetry.dap_task1_enabled", false); // [DEFAULT] +lockPref("toolkit.telemetry.dap_task1_taskid", ""); // [DEFAULT] +lockPref("toolkit.telemetry.dap_visit_counting_enabled", false); // [DEFAULT] +lockPref("toolkit.telemetry.dap_visit_counting_experiment_list", "[]"); // [DEFAULT] +defaultPref("toolkit.telemetry.debugSlowSql", false); // [DEFAULT] +lockPref("toolkit.telemetry.enabled", false); // [DEFAULT - non-Nightly] +lockPref("toolkit.telemetry.firstShutdownPing.enabled", false); +lockPref("toolkit.telemetry.healthping.enabled", false); // [HIDDEN] +defaultPref("toolkit.telemetry.log.level", "Error"); // [HIDDEN, DEFAULT] - To expose via about:config... +lockPref("toolkit.telemetry.newProfilePing.enabled", false); +lockPref("toolkit.telemetry.pioneerId", ""); // [HIDDEN] +lockPref("toolkit.telemetry.previousBuildID", ""); +lockPref("toolkit.telemetry.reportingpolicy.firstRun", false); +lockPref("toolkit.telemetry.server", "data;"); +lockPref("toolkit.telemetry.server_owner", ""); +lockPref("toolkit.telemetry.shutdownPingSender.backgroundtask.enabled", false); // [DEFAULT] +lockPref("toolkit.telemetry.shutdownPingSender.enabled", false); +lockPref("toolkit.telemetry.shutdownPingSender.enabledFirstSession", false); // [DEFAULT] +lockPref("toolkit.telemetry.testing.suppressPingsender", true); // [HIDDEN] +defaultPref("toolkit.telemetry.translations.logLevel", "Off"); +lockPref("toolkit.telemetry.unified", false); +lockPref("toolkit.telemetry.updatePing.enabled", false); +lockPref("toolkit.telemetry.user_characteristics_ping.current_version", 0); // [DEFAULT] +lockPref("toolkit.telemetry.user_characteristics_ping.last_version_sent", 0); // [DEFAULT] +defaultPref("toolkit.telemetry.user_characteristics_ping.logLevel", "Off"); +lockPref("toolkit.telemetry.user_characteristics_ping.opt-out", true); +lockPref("toolkit.telemetry.user_characteristics_ping.send-once", false); // [DEFAULT] +lockPref("toolkit.telemetry.user_characteristics_ping.uuid", ""); // [DEFAULT] + +/// Misc. UX - Harmless but does not apply to us + +defaultPref("datareporting.healthreport.infoURL", ""); +defaultPref("extensions.recommendations.privacyPolicyUrl", ""); +defaultPref("toolkit.crashreporter.infoURL", ""); +defaultPref("toolkit.datacollection.infoURL", ""); + +defaultPref("browser.phoenix.core.status", "001"); + +// 002 MOZILLA CRAP™ + +/// Disable "Privacy-Preserving Attribution" +// https://support.mozilla.org/kb/privacy-preserving-attribution + +lockPref("dom.origin-trials.private-attribution.state", 2); // [DEFAULT] +lockPref("dom.private-attribution.submission.enabled", false); // [DEFAULT] + +/// Firefox Recommendations & "Discovery" + +defaultPref("extensions.getAddons.browseAddons", ""); // [HIDDEN - non-Android] +defaultPref("extensions.getAddons.showPane", false); +defaultPref("extensions.htmlaboutaddons.recommendations.enabled", false); +defaultPref("extensions.recommendations.themeRecommendationUrl", ""); +defaultPref("extensions.webservice.discoverURL", ""); // [HIDDEN - non-Thunderbird] + +/// Fakespot + +defaultPref("toolkit.shopping.ohttpConfigURL", ""); +defaultPref("toolkit.shopping.ohttpRelayURL", ""); + +/// Firefox Relay + +defaultPref("signon.firefoxRelay.feature", "disabled"); // [HIDDEN - Thunderbird] + +/// Prevent Mozilla domains from having special privileges +// https://firefox-source-docs.mozilla.org/dom/ipc/process_model.html#privileged-mozilla-content + +lockPref("browser.tabs.remote.separatePrivilegedMozillaWebContentProcess", false); // [DEFAULT on Firefox Desktop] +lockPref("browser.tabs.remote.separatedMozillaDomains", ""); +lockPref("dom.ipc.processCount.privilegedmozilla", 0); +lockPref("extensions.webapi.testing", false); // [DEFAULT] https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#5445 +defaultPref("extensions.webextensions.restrictedDomains", ""); +lockPref("svg.context-properties.content.allowed-domains", ""); // [DEFAULT - Android/Thunderbird] + +/// Disable Mozilla Web Compatibility Reporter +// Harmless from a privacy perspective - We just don't want to waste Mozilla's time due to our custom set-up... +// Also acts as attack surface reduction & a potential performance improvement + +defaultPref("extensions.webcompat-reporter.enabled", false); // [DEFAULT on non-Nightly/ESR] +defaultPref("extensions.webcompat-reporter.newIssueEndpoint", ""); + +/// Remove Mozilla URL tracking params + +defaultPref("signon.firefoxRelay.manage_url", "https://relay.firefox.com/accounts/profile/"); + +defaultPref("browser.phoenix.core.status", "002"); + +// 003 Search & URL Bar + +/// Allow using a different search engine in Private Windows vs. Normal Windows + +defaultPref("browser.search.separatePrivateDefault.ui.enabled", true); + +// Ensure by default we use same search engine in both Private & Normal Windows +// Otherwise, Firefox's private search appears to default to Google... :/ + +defaultPref("browser.search.separatePrivateDefault", false); + +/// Always show Punycode - Helps prevent phishing & IDN Homograph Attacks +// https://wikipedia.org/wiki/IDN_homograph_attack + +defaultPref("network.IDN_show_punycode", true); + +defaultPref("browser.phoenix.core.status", "003"); + +// 004 Implicit Connections + +/// Disable Network Prefetching +// https://developer.mozilla.org/docs/Glossary/Prefetch + +defaultPref("browser.places.speculativeConnect.enabled", false); +defaultPref("dom.prefetch_dns_for_anchor_http_document", false); // https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42684 +defaultPref("dom.prefetch_dns_for_anchor_https_document", false); // [DEFAULT] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42684 +defaultPref("network.dns.disablePrefetch", true); +defaultPref("network.dns.disablePrefetchFromHTTPS", true); // [DEFAULT] +defaultPref("network.dns.prefetch_via_proxy", false); // [DEFAULT] +defaultPref("network.http.speculative-parallel-limit", 0); // [DEFAULT - Thunderbird] +defaultPref("network.predictor.enable-hover-on-ssl", false); // [DEFAULT] +defaultPref("network.predictor.enable-prefetch", false); // [DEFAULT] +defaultPref("network.predictor.enabled", false); +defaultPref("network.prefetch-next", false); + +/// Disable Preconnect +// https://github.com/uBlockOrigin/uBlock-issues/issues/2913 +// https://developer.mozilla.org/docs/Web/HTML/Attributes/rel/preconnect + +defaultPref("network.preconnect", false); + +/// Disable Early Hints +// https://developer.mozilla.org/docs/Web/HTTP/Status/103 +// https://github.com/bashi/early-hints-explainer/blob/main/explainer.md +// Ex. like Cromite https://github.com/uazo/cromite/blob/master/build/patches/Client-hints-overrides.patch + +defaultPref("network.early-hints.enabled", false); +defaultPref("network.early-hints.over-http-v1-1.enabled", false); +defaultPref("network.early-hints.preconnect.enabled", false); +defaultPref("network.early-hints.preconnect.max_connections", 0); + +/// Disable Search Suggestions +// These prefs appear to have no impact on Android & Thunderbird, but they still appear in both by default... so we can set anyways + +defaultPref("browser.search.suggest.enabled", false); // [DEFAULT - Android] +defaultPref("browser.search.suggest.enabled.private", false); // [DEFAULT] + +/// Disable middle mouse clicks from pasting clipboard contents by default +// Way too easy to accidentally press... + +defaultPref("middlemouse.paste", false); + +/// Prevent middle click on new tab button opening URLs or searches from clipboard + +defaultPref("browser.tabs.searchclipboardfor.middleclick", false); +defaultPref("middlemouse.contentLoadURL", false); // [DEFAULT] + +defaultPref("browser.phoenix.core.status", "004"); + +// 005 HTTP(S) - Mixed Content & General Network Hardening + +/// Enforce using HTTPS as much as possible + +defaultPref("dom.security.https_first", true); +defaultPref("dom.security.https_first_for_custom_ports", true); // [DEFAULT, DEFENSE IN DEPTH] +defaultPref("dom.security.https_first_pbm", true); // [DEFAULT] +defaultPref("dom.security.https_first_schemeless", true); +lockPref("dom.security.https_only_mode", true); +defaultPref("dom.security.https_only_mode.upgrade_local", true); +lockPref("dom.security.https_only_mode_pbm", true); +defaultPref("security.mixed_content.block_active_content", true); +defaultPref("security.mixed_content.block_display_content", true); +defaultPref("security.mixed_content.block_object_subrequest", true); +defaultPref("security.mixed_content.upgrade_display_content", true); +defaultPref("security.mixed_content.upgrade_display_content.audio", true); // [DEFAULT] +defaultPref("security.mixed_content.upgrade_display_content.image", true); // [DEFAULT] +defaultPref("security.mixed_content.upgrade_display_content.video", true); // [DEFAULT] + +/// Prevent sending HTTP requests to websites that do not respond quickly to check if they support HTTPS + +defaultPref("dom.security.https_only_mode_send_http_background_request", false); + +/// Show suggestions when an HTTPS page can not be found +// Ex. If 'example.com' isn't secure, it may suggest 'www.example.com' + +defaultPref("dom.security.https_only_mode_error_page_user_suggestions", true); + +/// Always warn on insecure webpages + +defaultPref("security.insecure_connection_text.enabled", true); +defaultPref("security.insecure_connection_text.pbmode.enabled", true); +defaultPref("security.ssl.treat_unsafe_negotiation_as_broken", true); +defaultPref("security.warn_submit_secure_to_insecure", true); // [DEFAULT] Warn when submitting a form from HTTP to HTTPS + +/// Show detailed information on insecure warning pages + +defaultPref("browser.xul.error_pages.expert_bad_cert", true); + +/// Disable TLS 1.3 0-RTT (Not forward secret) +// https://github.com/tlswg/tls13-spec/issues/1001 + +defaultPref("network.http.http3.enable_0rtt", false); // For HTTP3 https://bugzilla.mozilla.org/show_bug.cgi?id=1689550 +defaultPref("security.tls.enable_0rtt_data", false); + +/// Require safe renegotiations - Disables connections to servers without RFC 5746 +// https://wiki.mozilla.org/Security:Renegotiation + +defaultPref("security.ssl.require_safe_negotiation", true); + +/// Enforce preloading intermediates +// https://wiki.mozilla.org/Security/CryptoEngineering/Intermediate_Preloading + +defaultPref("security.remote_settings.intermediates.enabled", true); // [DEFAULT] + +/// Never downgrade to insecure TLS 1.0/1.1 + +defaultPref("security.tls.insecure_fallback_hosts", ""); // [DEFAULT] +lockPref("security.tls.version.enable-deprecated", false); // [DEFAULT] + +/// Enforce TLS 1.3 downgrade protection +// https://bugzilla.mozilla.org/show_bug.cgi?id=1576790 + +defaultPref("security.tls.hello_downgrade_check", true); // [DEFAULT] + +/// Only load secure websockets from HTTPS pages + +defaultPref("network.websocket.allowInsecureFromHTTPS", false); // [DEFAULT] + +/// Block access to Addon Manager over insecure protocols... +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#5452 + +defaultPref("extensions.webapi.testing.http", false); // [DEFAULT] + +/// Enable Post Quantum Key Agreement (Kyber) + +defaultPref("media.webrtc.enable_pq_dtls", true); // [DEFAULT, HIDDEN - Thunderbird] +defaultPref("network.http.http3.enable_kyber", true); +defaultPref("security.tls.enable_kyber", true); + +/// Disable Captive Portal Detection & Connectivity Checks +// Privacy & security concerns, and in general best handled by the OS. +// https://support.mozilla.org/kb/how-stop-firefox-making-automatic-connections#w_network-detection +// https://www.eff.org/deeplinks/2017/08/how-captive-portals-interfere-wireless-security-and-privacy + +defaultPref("captivedetect.canonicalURL", ""); +defaultPref("network.captive-portal-service.enabled", false); // [DEFAULT - Android/Thunderbird] +defaultPref("network.connectivity-service.DNSv4.domain", ""); +defaultPref("network.connectivity-service.DNSv6.domain", ""); +defaultPref("network.connectivity-service.enabled", false); +defaultPref("network.connectivity-service.IPv4.url", ""); +defaultPref("network.connectivity-service.IPv6.url", ""); + +// Prevent Proxy bypasses & undesired information leakage + +/// Disable Uniform Naming Convention (UNC) file paths +// https://bugzilla.mozilla.org/1413868 + +defaultPref("network.file.disable_unc_paths", true); // [HIDDEN] + +/// Disable GIO +// https://bugzilla.mozilla.org/1433507 + +defaultPref("network.gio.supported-protocols", ""); // [HIDDEN] + +/// Disable bypassing the proxy (if configured) for system connections that include the `bypassProxy` flag +// https://bugzilla.mozilla.org/show_bug.cgi?id=1732792 + +defaultPref("network.proxy.allow_bypass", false); + +/// Disable automatic failover from the proxy (if configured) to direct connections when certain system requests fail +// https://bugzilla.mozilla.org/show_bug.cgi?id=1720221 + +defaultPref("network.proxy.failover_direct", false); + +/// Use the proxy (if configured) for remote DNS lookups + +defaultPref("network.proxy.socks_remote_dns", true); +defaultPref("network.proxy.socks5_remote_dns", true); // [DEFAULT] + +defaultPref("browser.phoenix.core.status", "005"); + +// 006 DNS + +/// Disable Mozilla's DoH Rollout + +lockPref("doh-rollout.disable-heuristics", true); // [HIDDEN] +lockPref("doh-rollout.enabled", false); // [HIDDEN] +lockPref("doh-rollout.skipHeuristicsCheck", true); // [HIDDEN] +lockPref("doh-rollout.uri", ""); // [HIDDEN] + +/// Enable DoH & Set to Quad9 by default + +defaultPref("network.trr.default_provider_uri", "https://dns.quad9.net/dns-query"); +defaultPref("network.trr.mode", 3); + +/// Explicitly disable EDNS Client Subnet (ECS) to prevent leaking general location data to authoritative DNS servers... +// https://wikipedia.org/wiki/EDNS_Client_Subnet + +defaultPref("network.trr.disable-ECS", true); // [DEFAULT] + +/// Disable sending headers for DoH requests... + +defaultPref("network.trr.send_accept-language_headers", false); // [DEFAULT] +defaultPref("network.trr.send_empty_accept-encoding_headers", true); // [DEFAULT] +defaultPref("network.trr.send_user-agent_headers", false); // [DEFAULT] + +/// Skip DoH Connectivity Checks + +defaultPref("network.connectivity-service.DNS_HTTPS.domain", ""); +defaultPref("network.trr.confirmationNS", "skip"); + +/// Always warn before falling back from DoH to native DNS... + +defaultPref("network.trr.display_fallback_warning", true); +defaultPref("network.trr_ui.show_fallback_warning_option", true); + +/// Never disable DoH from registry checks +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml + +defaultPref("network.notify.checkForNRPT", false); +defaultPref("network.notify.checkForProxies", false); + +/// Enable EncryptedClientHello +// https://blog.cloudflare.com/announcing-encrypted-client-hello + +defaultPref("network.dns.echconfig.enabled", true); // [DEFAULT] +defaultPref("network.dns.http3_echconfig.enabled", true); // [DEFAULT] + +/// Enable Native DNS HTTPS Lookups + +defaultPref("network.dns.native_https_query", true); // [DEFAULT] + +/// Disable falling back to native DNS... +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#13855 + +defaultPref("network.trr.retry_on_recoverable_errors", true); // [DEFAULT] +defaultPref("network.trr.strict_native_fallback", true); // https://searchfox.org/mozilla-central/source/toolkit/components/telemetry/docs/data/environment.rst#438 + +/// Fix IPv6 connectivity when DoH is enabled +// https://codeberg.org/divested/brace/pulls/5 + +defaultPref("network.dns.preferIPv6", true); + +defaultPref("browser.phoenix.core.status", "006"); + +// 007 CERTIFICATES + +/// Enforce OCSP & Stapling + +defaultPref("security.OCSP.enabled", 1); // [DEFAULT - Desktop] +defaultPref("security.ssl.enable_ocsp_must_staple", true); // [DEFAULT] +defaultPref("security.ssl.enable_ocsp_stapling", true); // [DEFAULT] + +/// Hard-fail OCSP by default +// Significant security improvement +// https://github.com/arkenfox/user.js/issues/1576 + +defaultPref("security.OCSP.require", true); + +/// Enable CRLite & use where possible +// https://blog.mozilla.org/security/2020/01/09/crlite-part-1-all-web-pki-revocations-compressed/ + +defaultPref("security.pki.crlite_mode", 2); // [DEFAULT on Nightly] +defaultPref("security.remote_settings.crlite_filters.enabled", true); // [DEFAULT - Nightly Desktop] + +/// Enforce Strict Certificate Pinning +// https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning#How_to_use_pinning + +defaultPref("security.cert_pinning.enforcement_level", 2); + +/// Disable third-party/OS-level root certificates +// I've been torn on how to handle this, but IMO the safest way forward is disabling this functionality in Firefox. +// This is commonly abused by malware/etc. and it's even overriden by certain software/garbage AV's... +// Ex. https://support.kaspersky.com/common/compatibility/14620#block3 +// Since this is something programs actively try to override, I don't see a safe way to support this, so we'll lock it. +// We still allow users to manually import certificates into Firefox... +// So we can ensure users are aware of certificates they add and are making this decision consciously. +// security.osclientcerts.autoload can be left alone - https://groups.google.com/a/mozilla.org/g/enterprise/c/XiW-ZidMaII +// We also set "ImportEnterpriseRoots" in policies +// https://mozilla.github.io/policy-templates/#certificates--importenterpriseroots + +defaultPref("security.enterprise_roots.enabled", false); // [DEFAULT - Android] + +/// Enable & Enforce Certificate Transparency +// https://wiki.mozilla.org/SecurityEngineering/Certificate_Transparency +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15868 + +defaultPref("security.pki.certificate_transparency.mode", 2); // [DEFAULT - Nightly Desktop] +defaultPref("security.pki.certificate_transparency.disable_for_hosts", ""); // [DEFAULT] +defaultPref("security.pki.certificate_transparency.disable_for_spki_hashes", ""); // [DEFAULT] + +defaultPref("browser.phoenix.core.status", "007"); + +// 008 DOWNLOADS + +/// Always prompt before downloading files + +defaultPref("browser.download.always_ask_before_handling_new_types", true); +defaultPref("browser.download.useDownloadDir", false); // [DEFAULT - Thunderbird] + +// Always notify when downloading files + +defaultPref("browser.download.alwaysOpenPanel", true); // [DEFAULT - Desktop, HIDDEN - Android/Thunderbird] + +// Enforce blocking insecure downloads + +defaultPref("dom.block_download_insecure", true); // [DEFAULT] + +/// Disable extra download logging by default +// This lets us expose it in the about:config for Android/Thunderbird + +defaultPref("browser.download.loglevel", "Error"); // [DEFAULT, HIDDEN - Android/Thunderbird] + +defaultPref("browser.phoenix.core.status", "008"); + +// 009 SAFE BROWSING + +/// Enable Safe Browsing by default +// This won't do anything if you don't have an API key from Google, though doesn't hurt... +// Harmless from a privacy perspective due to the below changes, also effective at preventing real-time malicious domains and downloads. +// We will of course **ALWAYS** give users the ability to disable. + +defaultPref("browser.safebrowsing.blockedURIs.enabled", true); // [DEFAULT] +defaultPref("browser.safebrowsing.downloads.enabled", true); // [DEFAULT - non-Android] +defaultPref("browser.safebrowsing.downloads.remote.url", "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%"); // [DEFAULT] +defaultPref("browser.safebrowsing.features.blockedURIs.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("browser.safebrowsing.features.downloads.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("browser.safebrowsing.features.malware.update", true); // [DEFAULT, HIDDEN - non-Android] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("browser.safebrowsing.features.phishing.update", true); // [DEFAULT, HIDDEN - non-Android] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("browser.safebrowsing.malware.enabled", true); // [DEFAULT] +defaultPref("browser.safebrowsing.phishing.enabled", true); // [DEFAULT] +defaultPref("browser.safebrowsing.update.enabled", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("urlclassifier.downloadAllowTable", "goog-downloadwhite-proto"); // [DEFAULT - non-Android] +defaultPref("urlclassifier.downloadBlockTable", "goog-badbinurl-proto"); // [DEFAULT - non-Android] + +/// Disable the legacy Safe Browsing API (v2.2...) +// https://code.google.com/archive/p/google-safe-browsing/wikis/Protocolv2Spec.wiki +// Has been nonfunctional since October 2018 +// https://security.googleblog.com/2018/01/announcing-turndown-of-deprecated.html +// Let's make sure it's not used for defense in depth (and attack surface reduction...) + +defaultPref("browser.safebrowsing.provider.google.advisoryName", "Google Safe Browsing (Legacy)"); // Label it so it's clearly distinguishable if it is ever enabled for whatever reason... +defaultPref("browser.safebrowsing.provider.google.gethashURL", ""); +defaultPref("browser.safebrowsing.provider.google.updateURL", ""); + +/// Proxy Safe Browsing +// These are using the servers we've set up for IronFox, hosted on our Cloudflare storage bucket (in EU jurisdiction) + +defaultPref("browser.safebrowsing.provider.google4.gethashURL", "https://safebrowsing.ironfoxoss.org/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST"); +defaultPref("browser.safebrowsing.provider.google4.updateURL", "https://safebrowsing.ironfoxoss.org/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST"); + +/// Prevent sending metadata of downloaded files to Google +// https://support.mozilla.org/kb/how-does-phishing-and-malware-protection-work#w_how-does-phishing-and-malware-protection-work-in-firefox +// https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/ + +defaultPref("browser.safebrowsing.downloads.remote.enabled", false); + +/// Enforce that no data is shared with Google +// https://bugzilla.mozilla.org/show_bug.cgi?id=1351147 + +lockPref("browser.safebrowsing.provider.google.dataSharing.enabled", false); // [DEFAULT, HIDDEN - non-Android] +lockPref("browser.safebrowsing.provider.google4.dataSharing.enabled", false); // [DEFAULT] +lockPref("browser.safebrowsing.provider.google4.dataSharingURL", ""); + +/// Show advanced details on pages blocked by Safe Browsing by default + +defaultPref("browser.xul.error_pages.show_safe_browsing_details_on_load", true); // [HIDDEN - Android/Thunderbird] + +/// By default, when you report a Safe Browsing false positive, it sends the URL to both Mozilla & Google (NOT PROXIED), as well as your locale to Mozilla +// Ex. https://en-us.phish-error.mozilla.com/?url=example.org - Which redirects you directly to https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=example.org +// We can improve privacy & speed by sending the domain *only* to Google & without sending your locale to anyone +// We could also potentially strip tpl=mozilla which tells Google the request is from Firefox - though it looks like there is a different page for Firefox users with a better privacy policy, so we will leave it for now +// Unclear whether 'MalwareMistake' is used, but we can set it anyways + +defaultPref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url="); +defaultPref("browser.safebrowsing.provider.google.reportPhishMistakeURL", "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url="); +defaultPref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url="); +defaultPref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url="); + +/// Similar behavior also appears to happen when you report a URL to Safe Browsing + +defaultPref("browser.safebrowsing.reportPhishURL", "https://safebrowsing.google.com/safebrowsing/report_phish/?tpl=mozilla&url="); + +/// Unclear whether these are actually used or not, but looks like Firefox has some kind of functionality to view a "report" from Safe Browsing about the safety, history, & general status of a site +// By default, it unnecessarily redirects from ex. https://safebrowsing.google.com/safebrowsing/diagnostic?site=example.org to https://transparencyreport.google.com/safe-browsing/search?url=example.org +// We can skip the redirect to improve speed + +defaultPref("browser.safebrowsing.provider.google.reportURL", "https://transparencyreport.google.com/safe-browsing/search?url="); +defaultPref("browser.safebrowsing.provider.google4.reportURL", "https://transparencyreport.google.com/safe-browsing/search?url="); + +defaultPref("browser.phoenix.core.status", "009"); + +// 010 GEOLOCATION + +/// Prevent Wi-Fi Scanning + +defaultPref("browser.region.network.scan", false); // [DEFAULT] https://searchfox.org/mozilla-central/source/toolkit/modules/Region.sys.mjs#20 +defaultPref("geo.wifi.scan", false); // [HIDDEN] https://searchfox.org/mozilla-release/source/remote/shared/RecommendedPreferences.sys.mjs#299 + +/// Disable "Region Updates" +// https://firefox-source-docs.mozilla.org/toolkit/modules/toolkit_modules/Region.html + +defaultPref("browser.region.network.url", ""); +defaultPref("browser.region.update.enabled", false); + +/// Disable logging Geolocation requests by default +// This is already Firefox's default setting - but setting here exposes it in the about:config since it's hidden... +// https://searchfox.org/mozilla-central/source/dom/system/NetworkGeolocationProvider.sys.mjs#21 + +defaultPref("geo.provider.network.logging.enabled", false); // [DEFAULT - HIDDEN] + +/// Geolocation Provider + +/// Set BeaconDB as the network Geolocation provider instead of Google... + +defaultPref("geo.provider.network.url", "https://api.beacondb.net/v1/geolocate"); + +defaultPref("browser.phoenix.core.status", "010"); + +// 011 AI +// https://support.mozilla.org/kb/ai-chatbot + +/// Ensure that AI functionality is disabled by default + +defaultPref("browser.ml.enable", false); // [DEFAULT - non-Nightly] - "Experimental Machine Learning Inference Engine" + +/// Disable AI/ML "Autofill Experiment"... +// https://searchfox.org/mozilla-central/source/toolkit/components/formautofill/MLAutofill.sys.mjs + +defaultPref("extensions.formautofill.ml.experiment.enabled", false); // [HIDDEN - Thunderbird] + +defaultPref("browser.phoenix.core.status", "011"); + +// 012 WEBRTC + +/// Enable mDNS Host Obfuscation to prevent leaking local IP addresses +// https://bugzilla.mozilla.org/show_bug.cgi?id=1588817 + +defaultPref("media.peerconnection.ice.obfuscate_host_addresses", true); // [DEFAULT - Desktop] + +/// If a proxy is configured, ensure WebRTC isn't bypassing it +// https://bugzilla.mozilla.org/show_bug.cgi?id=1790270 + +defaultPref("media.peerconnection.ice.proxy_only_if_behind_proxy", true); + +/// Always allow user to silence notifications when screen sharing +// https://searchfox.org/mozilla-central/source/browser/app/profile/firefox.js#2452 + +defaultPref("privacy.webrtc.allowSilencingNotifications", true); // [DEFAULT, HIDDEN - Android/Thunderbird] +defaultPref("privacy.webrtc.hideGlobalIndicator", false); // [DEFAULT, HIDDEN - Android/Thunderbird] + +/// Enable global toggles for muting the camera/microphone in WebRTC +// https://searchfox.org/mozilla-central/source/browser/app/profile/firefox.js#2452 + +defaultPref("privacy.webrtc.globalMuteToggles", true); // [HIDDEN - Android] + +/// Warn users when attempting to switch tabs in a window being shared over WebRTC +// https://searchfox.org/mozilla-central/source/browser/app/profile/firefox.js#2459 + +defaultPref("privacy.webrtc.sharedTabWarning", true); // [HIDDEN - Android/Thunderbird] + +/// Always sandbox Media Transport +// https://searchfox.org/mozilla-central/source/security/sandbox/common/SandboxSettings.cpp + +defaultPref("media.peerconnection.mtransport_process", true); // [DEFAULT, HIDDEN - Android/Thunderbird] + +defaultPref("browser.phoenix.core.status", "012"); + +// 013 DISK AVOIDANCE + +/// Disable Search & Form History - Can be leaked to sites +// https://blog.mindedsecurity.com/2011/10/autocompleteagain.html + +defaultPref("browser.formfill.enable", false); + +/// Disable disk cache + +defaultPref("browser.cache.disk.enable", false); +defaultPref("browser.cache.disk_cache_ssl", false); + +/// Do not write media cache (ex. for video streaming) to disk in private windows + +defaultPref("browser.privatebrowsing.forceMediaMemoryCache", true); + +/// Prevent storing unnecessary extra session data + +defaultPref("browser.sessionstore.privacy_level", 2); // [HIDDEN - Thunderbird] + +/// Sanitization +// Clears browsing history, cache, download history, & sessions on exit by default + +defaultPref("privacy.clearOnShutdown.cache", true); +defaultPref("privacy.clearOnShutdown.downloads", true); // [HIDDEN - Android/Thunderbird] +defaultPref("privacy.clearOnShutdown.history", true); // [HIDDEN - Android/Thunderbird] +defaultPref("privacy.clearOnShutdown.sessions", true); // [HIDDEN - Android/Thunderbird] +defaultPref("privacy.clearOnShutdown_v2.cache", true); +defaultPref("privacy.clearOnShutdown_v2.historyFormDataAndDownloads", true); // [HIDDEN - Android/Thunderbird] +defaultPref("privacy.sanitize.sanitizeOnShutdown", true); + +/// Prevent logging blocked domains in about:protections + +defaultPref("browser.contentblocking.database.enabled", false); // [DEFAULT - Android/Thunderbird] + +/// Removes cached files from browser windows opened with external applications +// https://bugzilla.mozilla.org/buglist.cgi?bug_id=302433,1738574 + +defaultPref("browser.download.start_downloads_in_tmp_dir", true); +defaultPref("browser.helperApps.deleteTempFileOnExit", true); // [DEFAULT - Thunderbird] + +/// When a file is deleted in Firefox, also remove from session list & history +// https://searchfox.org/mozilla-central/source/browser/app/profile/firefox.js + +defaultPref("browser.download.clearHistoryOnDelete", 2); // [HIDDEN - Android/Thunderbird] + +/// Prevent coloring visited links + +defaultPref("layout.css.visited_links_enabled", false); + +/// Allow permission manager to write to disk +// This is already Firefox's default - but it's hidden, so this exposes it to the about:config +// https://searchfox.org/mozilla-central/source/extensions/permissions/PermissionManager.cpp#758 + +defaultPref("permissions.memory_only", false); // [HIDDEN - DEFAULT] + +/// Disable adding downloads to "recent documents" + +defaultPref("browser.download.manager.addToRecentDocs", false); + +defaultPref("browser.phoenix.core.status", "013"); + +// 014 EXTENSIONS + +/// Only allow installing extensions from profile & application directories (Prevents extensions being installed from the system/via other software) +// https://archive.is/DYjAM +// https://github.com/arkenfox/user.js/blob/master/user.js#L612 + +lockPref("extensions.autoDisableScopes", 15); // [DEFAULT - non-Thunderbird] Defense in depth, ensures extensions installed via directories are disabled by default... +defaultPref("extensions.enabledScopes", 5); // [HIDDEN] + +/// Disable automatic installation/enablement of third party extensions in Firefox's installation directory +// https://support.mozilla.org/kb/deploying-firefox-with-extensions + +defaultPref("extensions.installDistroAddons", false); // [HIDDEN - non-Android, DEFAULT - Android] + +/// Only allow signed extensions by default + +defaultPref("xpinstall.whitelist.required", true); // [DEFAULT] + +/// Only allow installation and updates of extensions using Firefox's built-in certificates by default... + +defaultPref("extensions.install.requireBuiltInCerts", true); // [HIDDEN] +defaultPref("extensions.update.requireBuiltInCerts", true); // [HIDDEN] + +/// Block extensions signed with weak signature algorithms + +defaultPref("xpinstall.signatures.weakSignaturesTemporarilyAllowed", false); // [DEFAULT, HIDDEN] + +/// Enforce Extension Blocklist + +defaultPref("extensions.blocklist.enabled", true); // [DEFAULT] + +/// Never bypass 3rd party extension install prompts + +lockPref("extensions.postDownloadThirdPartyPrompt", false); // [HIDDEN - Android/Thunderbird] + +/// Prevent unprivileged extensions from accessing experimental APIs by default +// https://searchfox.org/mozilla-central/source/toolkit/components/extensions/docs/basics.rst#142 + +defaultPref("extensions.experiments.enabled", false); // [DEFAULT - non-Thunderbird] + +/// Enable restricted/quarantined domains by default +// https://support.mozilla.org/kb/quarantined-domains + +defaultPref("extensions.quarantinedDomains.enabled", true); // [DEFAULT] + +/// Allow LocalCDN to work on quarantined domains + +defaultPref("extensions.quarantineIgnoredByUser.{b86e4813-687a-43e6-ab65-0bde4ab75758}", true); + +/// Allow Mullvad's extension to work on quarantined domains + +defaultPref("extensions.quarantineIgnoredByUser.{d19a89b9-76c1-4a61-bcd4-49e8de916403}", true); + +/// Block our search 'extensions' from accessing quarantined domains... + +lockPref("extensions.quarantineIgnoredByUser.ddg@celenity.dev", false); // DuckDuckGo +lockPref("extensions.quarantineIgnoredByUser.duckduckgo-html@celenity.dev", false); // DuckDuckGo HTML +lockPref("extensions.quarantineIgnoredByUser.duckduckgo-lite@celenity.dev", false); // DuckDuckGo Lite +lockPref("extensions.quarantineIgnoredByUser.ecosia@celenity.dev", false); // Ecosia +lockPref("extensions.quarantineIgnoredByUser.mojeek@celenity.dev", false); // Mojeek +lockPref("extensions.quarantineIgnoredByUser.no-search@celenity.dev", false); // No Search +lockPref("extensions.quarantineIgnoredByUser.qwant@celenity.dev", false); // Qwant +lockPref("extensions.quarantineIgnoredByUser.qwant-junior@celenity.dev", false); // Qwant Junior +lockPref("extensions.quarantineIgnoredByUser.startpage@celenity.dev", false); // Startpage +lockPref("extensions.quarantineIgnoredByUser.swisscows@celenity.dev", false); // Startpage + +/// We can also include our deprecated search 'extensions' for defense in depth... + +lockPref("extensions.quarantineIgnoredByUser.bravesearch@celenity.dev", false); // Brave Search +lockPref("extensions.quarantineIgnoredByUser.kagi@celenity.dev", false); // Kagi +lockPref("extensions.quarantineIgnoredByUser.kagi-html@celenity.dev", false); // Kagi HTML +lockPref("extensions.quarantineIgnoredByUser.leta-brave@celenity.dev", false); // Mullvad Leta (Brave) +lockPref("extensions.quarantineIgnoredByUser.leta-google@celenity.dev", false); // Mullvad Leta (Google) +lockPref("extensions.quarantineIgnoredByUser.metager@celenity.dev", false); // MetaGer + +/// Block certain Mozilla extensions from accessing quarantined domains... + +lockPref("extensions.quarantineIgnoredByUser.ads@mozac.org", false); // Mozilla Android Components - Ads Telemetry... +lockPref("extensions.quarantineIgnoredByUser.cookies@mozac.org", false); // Mozilla Android Components - Search Telemetry... +lockPref("extensions.quarantineIgnoredByUser.wikipedia@search.mozilla.org", false); // Wikipedia (en) - search engine... + +defaultPref("browser.phoenix.core.status", "014"); + +// 015 PDF.js + +/// Disable JavaScript + +defaultPref("pdfjs.enableScripting", false); + +/// Disable XFA +// https://learn.microsoft.com/deployedge/microsoft-edge-policies#viewxfapdfiniemodeallowedorigins +// https://insert-script.blogspot.com/2019/01/adobe-reader-pdf-callback-via-xslt.html +// https://www.sentinelone.com/blog/malicious-pdfs-revealing-techniques-behind-attacks/ +// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=xfa +// https://wikipedia.org/wiki/XFA +// Not even a standard... + +defaultPref("pdfjs.enableXfa", false); + +/// Never allow documents to prevent copying text + +defaultPref("pdfjs.enablePermissions", false); // [DEFAULT] + +/// Open PDFs inline where possible + +defaultPref("browser.download.open_pdf_attachments_inline", true); // [DEFAULT - Android] + +/// Show sidebar by default when viewing PDFs + +defaultPref("pdfjs.sidebarViewOnLoad", 2); + +defaultPref("browser.phoenix.core.status", "015"); + +// 016 MISC. PRIVACY + +/// Enable ETP Strict +// https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop?as=u#w_strict-enhanced-tracking-protection + +lockPref("browser.contentblocking.category", "strict"); // [HIDDEN] + +/// Manually enable ETP/Strict protections... +// These are typically configured by ETP Strict - but unfortunately Firefox doesn't set ETP Strict on the browser's first run :/ +// So we need to also manually configure them. We still also use ETP Strict (not 'Custom') due to our enforcement of it, so we should be covered by Mozilla changes/updates for protections. +// Manually specifying these is also useful for cases like Android: where all protections aren't enabled with ETP Strict, and on Thunderbird: where ETP Strict doesn't exist at all... +// We're also configuring the 'CookieBehavior' & 'EnableTrackingProtection' policies on desktop. + +// Enable TCP/dFPI +// https://support.mozilla.org/kb/introducing-total-cookie-protection-standard-mode +// https://searchfox.org/mozilla-central/source/toolkit/components/nimbus/FeatureManifest.yaml#2828 + +defaultPref("network.cookie.cookieBehavior", 5); +defaultPref("network.cookie.cookieBehavior.optInPartitioning", true); +defaultPref("network.cookie.cookieBehavior.optInPartitioning.pbmode", true); +defaultPref("network.cookie.cookieBehavior.pbmode", 5); + +// Enable State Partitioning + +defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage", true); +defaultPref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", false); +defaultPref("privacy.partition.bloburl_per_partition_key", true); +defaultPref("privacy.partition.network_state", true); +defaultPref("privacy.partition.network_state.ocsp_cache", true); +defaultPref("privacy.partition.network_state.ocsp_cache.pbmode", true); +defaultPref("privacy.partition.serviceWorkers", true); + +// Ignore less restricted referer policies (than the default) +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#12979 + +defaultPref("network.http.referer.disallowCrossSiteRelaxingDefault", true); // for cross-site requests +defaultPref("network.http.referer.disallowCrossSiteRelaxingDefault.pbmode", true); // for cross-site requests in Private Browsing +defaultPref("network.http.referer.disallowCrossSiteRelaxingDefault.pbmode.top_navigation", true); // for top navigations in Private Browsing +defaultPref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true); // for top navigations + +/// Block known tracking resources + +defaultPref("browser.safebrowsing.features.cryptomining.annotate.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("browser.safebrowsing.features.cryptomining.update", true); // [DEFAULT, HIDDEN - non-Android] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("browser.safebrowsing.features.emailtracking.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("browser.safebrowsing.features.fingerprinting.annotate.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("browser.safebrowsing.features.fingerprinting.update", true); // [DEFAULT, HIDDEN - non-Android] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("browser.safebrowsing.features.socialtracking.annotate.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("browser.safebrowsing.features.socialtracking.update", true); // [DEFAULT, HIDDEN] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("browser.safebrowsing.features.trackingAnnotation.update", true); // [DEFAULT, HIDDEN - non-Android] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("browser.safebrowsing.features.trackingProtection.update", true); // [DEFAULT, HIDDEN - non-Android] https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/SafeBrowsing.sys.mjs +defaultPref("browser.safebrowsing.provider.mozilla.updateURL", "moz-sbrs:://antitracking"); // [DEFAULT - non-Thunderbird] +defaultPref("privacy.trackingprotection.annotate_channels", true); +defaultPref("privacy.trackingprotection.enabled", true); +defaultPref("privacy.trackingprotection.pbmode.enabled", true); + +// Block known tracking resources using the `strict` (Level 2) list +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15192 +// https://searchfox.org/mozilla-central/source/toolkit/components/nimbus/FeatureManifest.yaml#2804 + +defaultPref("privacy.annotate_channels.strict_list.enabled", true); +defaultPref("privacy.annotate_channels.strict_list.pbmode.enabled", true); + +// Block known third-party tracking cookies + +defaultPref("network.cookie.cookieBehavior.trackerCookieBlocking", true); +defaultPref("privacy.socialtracking.block_cookies.enabled", true); + +/// Block known third party cryptomining resources + +defaultPref("privacy.trackingprotection.cryptomining.enabled", true); + +/// Block known third party email tracking resources + +defaultPref("privacy.trackingprotection.emailtracking.enabled", true); +defaultPref("privacy.trackingprotection.emailtracking.pbmode.enabled", true); + +/// Block known third party fingerprinting resources + +defaultPref("privacy.trackingprotection.fingerprinting.enabled", true); + +/// Block known third party social tracking resources + +defaultPref("privacy.trackingprotection.socialtracking.enabled", true); + +// Enable Bounce Tracking Protection +// https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_bounce-tracking-protection +// https://searchfox.org/mozilla-central/source/toolkit/components/antitracking/bouncetrackingprotection/nsIBounceTrackingProtection.idl#11 + +defaultPref("privacy.bounceTrackingProtection.enabled", true); // [HIDDEN - non-Thunderbird] +defaultPref("privacy.bounceTrackingProtection.mode", 1); // [HIDDEN - Thunderbird] + +// Enable Suspected Fingerprinters Protection +// https://support.mozilla.org/kb/firefox-protection-against-fingerprinting#w_suspected-fingerprinters + +defaultPref("privacy.fingerprintingProtection", true); +defaultPref("privacy.fingerprintingProtection.pbmode", true); +defaultPref("privacy.reduceTimerPrecision", true); // https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15353 + +// Enable Query Parameter Stripping +// https://firefox-source-docs.mozilla.org/toolkit/components/antitracking/anti-tracking/query-stripping/index.html + +defaultPref("privacy.query_stripping.enabled", true); +defaultPref("privacy.query_stripping.enabled.pbmode", true); +defaultPref("privacy.query_stripping.redirect", true); + +// Enable SmartBlock & UA overrides/injections +// Also typically covered by ETP/Strict + +defaultPref("extensions.webcompat.enable_shims", true); // [HIDDEN] +defaultPref("extensions.webcompat.perform_injections", true); // [HIDDEN] +defaultPref("extensions.webcompat.perform_ua_overrides", true); // [HIDDEN] + +/// Enforce Do Not Track & Global Privacy Control + +defaultPref("privacy.donottrackheader.enabled", true); +defaultPref("privacy.globalprivacycontrol.enabled", true); +defaultPref("privacy.globalprivacycontrol.functionality.enabled", true); // [DEFAULT - non-Thunderbird] +defaultPref("privacy.globalprivacycontrol.pbmode.enabled", true); // [DEFAULT - non-Thunderbird] + +/// Disable Reporting API +// https://w3c.github.io/reporting/ +// https://bugzilla.mozilla.org/show_bug.cgi?id=1492036 + +defaultPref("dom.reporting.crash.enabled", false); // [DEFAULT] +defaultPref("dom.reporting.enabled", false); // [DEFAULT] +defaultPref("dom.reporting.featurePolicy.enabled", false); // [DEFAULT] +defaultPref("dom.reporting.header.enabled", false); // [DEFAULT] + +/// Disable Beacon API (Navigator.sendBeacon) +// I was originally against disabling this, but after careful consideration, I've changed my position. +// The explicit, stated purpose/use case of this API is for analytics/tracking. +// Websites *can* obtain the data shared from this API through other means; though the other ways to obtain it are more disruptive and less reliable. +// Analytics/tracking is evidently not a use case that we, as the user agent, should support or assist with. +// I don't see a justification for adding APIs/features to support this hostile behavior. +// https://developer.mozilla.org/docs/Web/API/Beacon_API +// https://developer.mozilla.org/docs/Web/API/Navigator/sendBeacon +// https://udn.realityripple.com/docs/Web/API/Navigator/sendBeacon +// https://w3c.github.io/beacon/#privacy-and-security +// https://bugzilla.mozilla.org/show_bug.cgi?id=1454252 +// Also disabled by ex. Cromite: https://github.com/uazo/cromite/blob/master/docs/FEATURES.md https://github.com/uazo/cromite/issues/1454 + +defaultPref("beacon.enabled", false); + +/// Disable Network Error Logging +// https://developer.mozilla.org/docs/Web/HTTP/Network_Error_Logging +// https://w3c.github.io/network-error-logging/ +// https://bugzilla.mozilla.org/show_bug.cgi?id=1145235 +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#12829 + +defaultPref("network.http.network_error_logging.enabled", false); // [DEFAULT, HIDDEN - Thunderbird] + +/// Trim cross-origin referers (Like Safari) + +defaultPref("network.http.referer.XOriginTrimmingPolicy", 2); + +/// Restrict tracking referers + +defaultPref("network.http.referer.defaultPolicy.trackers", 1); +defaultPref("network.http.referer.defaultPolicy.trackers.pbmode", 1); + +/// Disable Hyperlink Auditing (Click Tracking) +// https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ + +defaultPref("browser.send_pings", false); // [DEFAULT] +defaultPref("browser.send_pings.max_per_link", 0); // [DEFENSE IN DEPTH] +defaultPref("browser.send_pings.require_same_host", true); // [DEFENSE IN DEPTH] + +/// Improve built-in query stripping to be on par with LibreWolf & Brave +// https://codeberg.org/librewolf/settings/src/branch/master/librewolf.cfg#L77 + +defaultPref("privacy.query_stripping.strip_list", "__hsfp __hssc __hstc __s _hsenc _openstat dclid fbclid gbraid gclid hsCtaTracking igshid mc_eid ml_subscriber ml_subscriber_hash msclkid oft_c oft_ck oft_d oft_id oft_ids oft_k oft_lk oft_sk oly_anon_id oly_enc_id rb_clickid s_cid twclid vero_conv vero_id wbraid wickedid yclid"); + +/// Strip tracking parameters from URLs when shared by default + +defaultPref("privacy.query_stripping.strip_on_share.enabled", true); // [DEFAULT - non-Android/Thunderbird] + +/// Enable Smartblock Embeds/Placeholders +// Makes certain resources click to load + +defaultPref("extensions.webcompat.smartblockEmbeds.enabled", true); // [DEFAULT - Nightly, HIDDEN - Android/Thunderbird] + +/// Enable Cookies Having Independent Partitioned State (CHIPS) +// This allows websites to set cookies with a 'Partitioned' attribute, meaning they're limited in scope +// We still use ETP Strict for partioning anyways, so this could be useful as a defense in depth if a user decides to allow a specific domain (or domains) to access a third party cookie +// https://developer.mozilla.org/docs/Web/Privacy/Privacy_sandbox/Partitioned_cookies +// https://developer.mozilla.org/docs/Web/HTTP/Headers/Set-Cookie#partitioned +// https://github.com/privacycg/CHIPS + +defaultPref("network.cookie.CHIPS.enabled", true); // [DEFAULT - Nightly] + +defaultPref("browser.phoenix.core.status", "016"); + +// 017 FINGERPRINTING PROTECTION + +/// Round window sizes + +defaultPref("privacy.window.maxInnerHeight", 900); // [DEFAULT - non-Thunderbird] +defaultPref("privacy.window.maxInnerWidth", 1600); + +/// Prompt to spoof locale to en-US + +defaultPref("privacy.spoof_english", 0); // [DEFAULT] + +/// Enable light mode by default +// This matches with RFP... + +defaultPref("layout.css.prefers-color-scheme.content-override", 1); + +/// Disable WebGPU +// https://browserleaks.com/webgpu + +defaultPref("dom.webgpu.enabled", false); // [DEFAULT - non-Nightly] + +/// Disable failIfMajorPerformanceCaveat in WebGL contexts... +// https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/18603 + +defaultPref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT] + +/// Prevent using system colors + +defaultPref("browser.display.use_system_colors", false); // [DEFAULT - non-Windows] + +/// Prevent using system accent colors + +defaultPref("widget.non-native-theme.use-theme-accent", false); // [DEFAULT - non-Thunderbird Windows] + +/// Enable fdlibm for Math.sin, Math.cos, and Math.tan +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#8720 +// https://groups.google.com/a/mozilla.org/g/dev-platform/c/0dxAO-JsoXI/m/eEhjM9VsAgAJ + +defaultPref("javascript.options.use_fdlibm_for_sin_cos_tan", true); // [DEFAULT - non-Android/Windows/Thunderbird] + +defaultPref("browser.phoenix.core.status", "017"); + +// 018 PASSWORDS & AUTHENTICATION + +/// Disable Autofill + +defaultPref("signon.autofillForms", false); +defaultPref("signon.autofillForms.http", false); // [DEFAULT] + +/// Disable formless capture of log-in credentials +// https://bugzilla.mozilla.org/show_bug.cgi?id=1166947 + +defaultPref("signon.formlessCapture.enabled", false); +defaultPref("signon.privateBrowsingCapture.enabled", false); + +/// Always display a `reveal password` button in `password` `` types +// https://developer.mozilla.org/docs/Web/HTML/Element/input/password + +defaultPref("layout.forms.reveal-password-button.enabled", true); + +/// Prevent websites from dictating whether to allow filling passwords +// https://blog.0xbadc0de.be/archives/124 + +defaultPref("signon.storeWhenAutocompleteOff", false); + +/// Disable password truncation +// https://www.ghacks.net/2020/05/18/firefox-77-wont-truncate-text-exceeding-max-length-to-address-password-pasting-issues/ + +defaultPref("editor.truncate_user_pastes", false); + +/// Disable Password Manager by default - Insecure & unencrypted +/// You should instead use something like Bitwarden or Proton Pass +// https://support.mozilla.org/kb/manage-your-logins-firefox-password-manager +// https://wiki.mozilla.org/Firefox/Features/Form_Autofill + +defaultPref("extensions.formautofill.addresses.enabled", false); +defaultPref("extensions.formautofill.creditCards.enabled", false); +defaultPref("signon.rememberSignons", false); + +/// If password manager is enabled, enable strong password generation by default + +defaultPref("signon.generation.enabled", true); // [DEFAULT] + +/// Prevent cross-origin sub-resources from opening HTTP authentication dialogs to protect against phishing +// (Meaning dialogs for embedded items are only presented when originating from the same site) +// https://support.mozilla.org/questions/1245144 + +defaultPref("network.auth.non-web-content-triggered-resources-http-auth-allow", false); // [DEFAULT - non-Thunderbird] +defaultPref("network.auth.subresource-http-auth-allow", 1); +defaultPref("network.auth.subresource-img-cross-origin-http-auth-allow", false); // [DEFAULT - non-Thunderbird] + +/// Disable Windows SSO +// https://support.mozilla.org/kb/windows-sso + +defaultPref("network.http.windows-sso.container-enabled.0", false); +defaultPref("network.http.windows-sso.enabled", false); // [DEFAULT] + +/// Disable Microsoft Entra +// https://www.microsoft.com/security/business/identity-access/microsoft-entra-single-sign-on + +defaultPref("network.http.microsoft-entra-sso.container-enabled.0", false); +defaultPref("network.http.microsoft-entra-sso.enabled", false); // [DEFAULT] +defaultPref("network.microsoft-sso-authority-list", ""); // DEFENSE IN DEPTH + +/// Prevent using Negotiate authentication by default +// This is modified by ex. RedHat/Fedora +// https://people.redhat.com/mikeb/negotiate/ + +defaultPref("network.negotiate-auth.trusted-uris", ""); // [DEFAULT] + +/// Enforce crashing on insecure password input + +defaultPref("intl.allow-insecure-text-input", false); // [DEFAULT, HIDDEN - non-Nightly] + +defaultPref("browser.phoenix.core.status", "018"); + +// 019 ATTACK SURFACE REDUCTION + +/// Disable JavaScript Just-in-time Compilation (JIT) +// https://microsoftedge.github.io/edgevr/posts/Super-Duper-Secure-Mode/ +// https://firefox-source-docs.mozilla.org/js/index.html#javascript-jits +// https://codeberg.org/rusty-snake/firefox-config/src/branch/main/assets/user-overrides.js#L60 + +defaultPref("javascript.options.baselinejit", false); // Baseline Compiler +defaultPref("javascript.options.blinterp", false); // Baseline Interpreter +defaultPref("javascript.options.ion", false); // WarpMonkey +defaultPref("javascript.options.main_process_disable_jit", true); // [DEFAULT - iOS?] Main process https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#8761 +defaultPref("javascript.options.native_regexp", false); // irregexp https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21865 https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml +defaultPref("javascript.options.wasm_baselinejit", false); // WASM Baseline Compiler + +/// If JIT (Ion/WarpMonkey) is disabled, also disable it for extensions +// This is the default, but it's hidden - so setting it here lets us expose it... +// https://bugzilla.mozilla.org/show_bug.cgi?id=1599226 + +defaultPref("javascript.options.jit_trustedprincipals", false); // [DEFAULT] + +/// If WASM (WebAssembly) is disabled, also disable it for extensions +// https://bugzilla.mozilla.org/show_bug.cgi?id=1576254 + +defaultPref("javascript.options.wasm_trustedprincipals", false); + +/// Disable ASM.JS (More JIT) +// https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ + +defaultPref("javascript.options.asmjs", false); + +/// Disable MathML +// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=mathml + +defaultPref("mathml.disabled", true); + +/// Disable Graphite & SVG OpenType fonts +// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+graphite +// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+svg + +defaultPref("gfx.font_rendering.graphite.enabled", false); +defaultPref("gfx.font_rendering.opentype_svg.enabled", false); + +/// Disable SharedArrayBuffer using window.postMessage +// https://developer.mozilla.org/docs/Web/JavaScript/Reference/Global_Objects/SharedArrayBuffer +// https://developer.mozilla.org/docs/Web/API/Window/postMessage +// https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ +// https://github.com/tc39/ecma262/issues/1435 +// By default, Firefox restricts the use of SharedArrayBuffer - this fully disables it. + +defaultPref("dom.postMessage.sharedArrayBuffer.bypassCOOP_COEP.insecure.enabled", false); // [DEFAULT] +defaultPref("dom.postMessage.sharedArrayBuffer.withCOOP_COEP", false); + +defaultPref("browser.phoenix.core.status", "019"); + +// 020 MISC. SECURITY + +// Prevent websites from automatically downloading as many files as they want to a user's device... +// https://bugzilla.mozilla.org/show_bug.cgi?id=1731668 +// Can be used for denial of service +// Allows overriding for specific downloads if needed +// https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41764 +// Ex. also enabled by Tor Browser + +defaultPref("browser.download.enable_spam_prevention", true); + +// Do not disable Spectre mitigations for isolated content... +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#8689 + +defaultPref("javascript.options.spectre.disable_for_isolated_content", false); + +// If a website asks for a certificate, always prompt the user +// Never automatically select one... +// https://www.stigviewer.com/stig/mozilla_firefox/2023-06-05/finding/V-251547 + +lockPref("security.default_personal_cert", "Ask Every Time"); // [DEFAULT] + +/// Disable Accessibility Services +// https://web.archive.org/web/20240608190300/support.mozilla.org/en-US/kb/accessibility-services +// "Firefox Accessibility Service is a technology built into Firefox that provides 3rd party applications running on the same device the ability to inspect, monitor, visualize, and alter web page content hosted within Firefox." + +defaultPref("accessibility.force_disabled", 1); +defaultPref("devtools.accessibility.enabled", false); // [HIDDEN - Android] https://firefox-source-docs.mozilla.org/devtools-user/accessibility_inspector/ + +/// Enforce that Content Analysis is disabled +/// We also set "ContentAnalysis" in policies +// https://mozilla.github.io/policy-templates/#contentanalysis +// https://github.com/chromium/content_analysis_sdk + +lockPref("browser.contentanalysis.default_result", 0); // [DEFAULT] +lockPref("browser.contentanalysis.enabled", false); // [DEFAULT] +lockPref("browser.contentanalysis.interception_point.clipboard.enabled", false); // [HIDDEN - Thunderbird] +lockPref("browser.contentanalysis.interception_point.drag_and_drop.enabled", false); // [HIDDEN - Thunderbird] +lockPref("browser.contentanalysis.interception_point.file_upload.enabled", false); // [HIDDEN - Thunderbird] +lockPref("browser.contentanalysis.interception_point.print.enabled", false); // [HIDDEN - Thunderbird] +lockPref("browser.contentanalysis.show_blocked_result", true); // [DEFAULT] - Always notify users when Content Analysis blocks access to something... + +/// Enforce Site Isolation & Isolate all websites +// https://wiki.mozilla.org/Project_Fission + +defaultPref("browser.sessionstore.disable_platform_collection", false); // [DEFAULT - non-Thunderbird] https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#1737 +defaultPref("dom.ipc.processCount.webIsolated", 1); // [DEFAULT - Android] +defaultPref("fission.autostart", true); // [DEFAULT - non-Android] +defaultPref("fission.autostart.session", true); // [DEFAULT - non-Android] +defaultPref("fission.disableSessionHistoryInParent", false); // [DEFAULT - non-Android] SHIP, required for Fission +defaultPref("gfx.webrender.all", true); + +/// Always run extensions OOP (out of process...) +// https://bugzilla.mozilla.org/show_bug.cgi?id=1613141 +// https://bugzilla.mozilla.org/show_bug.cgi?id=1880856 +// https://groups.google.com/g/tb-planning/c/p4MUTMNYBVo + +defaultPref("extensions.webextensions.remote", true); // [DEFAULT] + +/// Yes, this is a real pref... +// https://searchfox.org/mozilla-central/source/testing/profiles/common/user.js + +lockPref("security.turn_off_all_security_so_that_viruses_can_take_over_this_computer", false); // [DEFAULT, HIDDEN] + +/// Enable GPU Sandboxing +// https://www.ghacks.net/2023/01/17/firefox-110-will-launch-with-gpu-sandboxing-on-windows/ + +defaultPref("security.sandbox.gpu.level", 1); // [DEFAULT - Windows] + +/// Protect against CSRF Attacks (Like Chromium) +// https://groups.google.com/a/mozilla.org/g/dev-platform/c/6PZtLH7c6JQ +// https://hacks.mozilla.org/2020/08/changes-to-samesite-cookie-behavior/ +// https://web.dev/articles/samesite-cookies-explained +// https://help.salesforce.com/s/articleView?id=000389944&type=1 +// https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions +// https://web.dev/articles/schemeful-samesite + +defaultPref("network.cookie.sameSite.laxByDefault", true); +defaultPref("network.cookie.sameSite.noneRequiresSecure", true); // [DEFAULT - non-Thunderbird] +defaultPref("network.cookie.sameSite.schemeful", true); // [DEFAULT - Nightly] + +/// Enforce Strict file:// Origin Policy +// https://stuffandnonsense.co.uk/blog/firefoxs_file_uri_origin_policy_and_web_fonts +// https://stackoverflow.com/questions/2856502/css-font-face-not-working-with-firefox-but-working-with-chrome-and-ie + +defaultPref("security.fileuri.strict_origin_policy", true); // [DEFAULT] + +/// Always protect against MIME Exploits +// https://www.pcmag.com/encyclopedia/term/mime-exploit + +defaultPref("security.block_fileuri_script_with_wrong_mime", true); +defaultPref("security.block_Worker_with_wrong_mime", true); // [DEFAULT] + +/// Never load Navigator Media Objects & getUserMedia Support in insecure contexts +// https://developer.mozilla.org/docs/Web/API/Navigator/mediaDevices +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml + +defaultPref("media.devices.insecure.enabled", false); // [DEFAULT] +defaultPref("media.getusermedia.insecure.enabled", false); // [DEFAULT] + +/// Never expose shell access to websites... +// https://www.stigviewer.com/stig/mozilla_firefox/2019-12-12/finding/V-15771 + +lockPref("network.protocol-handler.external.shell", false); // [DEFAULT] + +/// Always warn users before launching other apps... + +defaultPref("network.protocol-handler.warn-external.mailto", true); +defaultPref("network.protocol-handler.warn-external-default", true); // [DEFAULT] +defaultPref("security.external_protocol_requires_permission", true); // [DEFAULT - non-Thunderbird] Removed from Firefox, but we'll keep for ESR for the time being... + +/// Enforce various other important security-related prefs +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15473 + +defaultPref("dom.block_external_protocol_in_iframes", true); // [DEFAULT] +defaultPref("dom.block_external_protocol_navigation_from_sandbox", true); // [DEFAULT] +defaultPref("security.all_resource_uri_content_accessible", false); // [DEFAULT] +defaultPref("security.allow_eval_in_parent_process", false); //[DEFAULT - non-Android/Thunderbird] +defaultPref("security.allow_eval_with_system_principal", false); // [DEFAULT - non-Android] +defaultPref("security.allow_parent_unrestricted_js_loads", false); // [DEFAULT - non-Android/Thunderbird] +defaultPref("security.allow_unsafe_parent_loads", false); // [DEFAULT] +defaultPref("security.data_uri.block_toplevel_data_uri_navigations", true); // [DEFAULT] + +/// Always use a separate content process for `file://` URLs +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#1848 + +defaultPref("browser.tabs.remote.separateFileUriProcess", true); // [DEFAULT - non-Android] + +/// Never skip the assertion that about:pages don't have content security policies (CSP) +// This is default on Standard Firefox releases, but not on ex. Thunderbird & other builds +// https://searchfox.org/comm-central/source/mozilla/modules/libpref/init/StaticPrefList.yaml#3987 + +defaultPref("dom.security.skip_about_page_has_csp_assert", false); // [DEFAULT - non-Thunderbird] + +/// Apply CSP to internal browser.xhtml +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15628 + +defaultPref("security.browser_xhtml_csp.enabled", true); // [DEFAULT, HIDDEN - Thunderbird] + +/// Enable Trusted Types (Like Chromium) +// https://w3c.github.io/trusted-types/dist/spec/ +// https://developer.mozilla.org/docs/Web/API/Trusted_Types_API +// https://www.theregister.com/2023/12/21/mozilla_decides_trusted_types_is/ + +defaultPref("dom.security.trusted_types.enabled", true); + +/// Prevent marking JIT code pages as both writable and executable, only one or the other... +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#8714 +// Might cause issues in certain specific set-ups +// https://bugzilla.mozilla.org/show_bug.cgi?id=1876632 + +defaultPref("javascript.options.content_process_write_protect_code", true); // [DEFAULT - OpenBSD?] + +/// Enable Opaque Response Blocking +// https://github.com/annevk/orb + +defaultPref("browser.opaqueResponseBlocking", true); // [DEFAULT - non-Android] +defaultPref("browser.opaqueResponseBlocking.javascriptValidator", true); // [DEFAULT] + +/// Enable the 'credentialless' COEP (Cross-Origin-Embedder-Policy) Header +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#1829 + +defaultPref("browser.tabs.remote.coep.credentialless", true); // [DEFAULT - non-Android stable] +defaultPref("dom.origin-trials.coep-credentialless.state", 1); // https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#3447 + +/// Prevent remoteTypes from triggering process switches they shouldn't be able to... +// https://searchfox.org/mozilla-central/source/browser/app/profile/firefox.js#1035 + +defaultPref("browser.tabs.remote.enforceRemoteTypeRestrictions", true); // [DEFAULT - Nightly Desktop] + +/// Disable automatic updates for OpenSearch engines +// Doesn't appear to impact Mozilla's built-in search engines +// Also has privacy implications (extra unsolicited connections to third parties...) +// https://firefox-source-docs.mozilla.org/toolkit/search/Preferences.html#hidden +// https://developer.mozilla.org/docs/Web/XML/Guides/OpenSearch#supporting_automatic_updates_for_opensearch_plugins + +defaultPref("browser.search.update", false); // [DEFAULT - Android] + +defaultPref("browser.phoenix.core.status", "020"); + +// 021 BLOCK COOKIE BANNERS + +defaultPref("cookiebanners.bannerClicking.enabled", true); // [DEFAULT] +defaultPref("cookiebanners.cookieInjector.enabled", true); // [DEFAULT] +defaultPref("cookiebanners.service.mode", 1); +defaultPref("cookiebanners.service.mode.privateBrowsing", 1); // [DEFAULT - Nightly Android] +defaultPref("cookiebanners.service.enableGlobalRules", true); // [DEFAULT] +defaultPref("cookiebanners.service.enableGlobalRules.subFrames", true); // [DEFAULT] + +defaultPref("browser.phoenix.core.status", "021"); + +// 022 MEDIA + +/// Enforce validating signature for GMP when updating +// https://searchfox.org/mozilla-central/source/modules/libpref/init/all.js + +defaultPref("media.gmp-manager.cert.checkAttributes", true); // [DEFAULT] +defaultPref("media.gmp-manager.cert.requireBuiltIn", true); // [DEFAULT] +defaultPref("media.gmp-manager.checkContentSignature", true); // [DEFAULT] + +/// Blocks media autoplay by default +// https://support.mozilla.org/kb/block-autoplay + +defaultPref("media.autoplay.default", 5); + +/// DRM +// Garbage technology with freedom, privacy, & security concerns +// https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next + +defaultPref("media.clearkey.persistent-license.enabled", false); // [DEFAULT] +defaultPref("media.clearkey.test-key-systems.enabled", false); // [DEFAULT] +defaultPref("media.eme.enabled", false); +defaultPref("media.eme.encrypted-media-encryption-scheme.enabled", false); +defaultPref("media.eme.hdcp-policy-check.enabled", false); +defaultPref("media.eme.require-app-approval", true); // [DEFAULT (Android) - DEFENSE IN DEPTH]: Enforce locking DRM behind permission https://searchfox.org/mozilla-central/source/mobile/android/app/geckoview-prefs.js#304 +defaultPref("media.eme.widevine.experiment.enabled", false); // [DEFAULT - HIDDEN] Widevine L1 https://searchfox.org/mozilla-central/source/dom/media/eme/MediaKeySystemAccess.cpp#141 +defaultPref("media.gmp-widevinecdm.enabled", false); +defaultPref("media.gmp-widevinecdm.visible", false); +defaultPref("media.gmp-widevinecdm-l1.enabled", false); // [DEFAULT (Except for Nightly) - HIDDEN] +defaultPref("media.gmp-widevinecdm-l1.visible", false); // [DEFAULT (Except for Nightly) - HIDDEN] + +defaultPref("browser.phoenix.core.status", "022"); + +// 023 UPDATES + +/// Check for extension/theme updates hourly +// Default is once every 24 hours... + +defaultPref("extensions.update.interval", 3600); + +/// Ensure we're always updating extensions by default + +defaultPref("extensions.systemAddon.update.enabled", true); // [DEFAULT] +defaultPref("extensions.update.autoUpdateDefault", true); // [DEFAULT, HIDDEN - ANDROID] +defaultPref("extensions.update.enabled", true); // [DEFAULT] +defaultPref("media.gmp-manager.updateEnabled", true); // [DEFAULT, HIDDEN] + +/// Ensure we always notify users for extension updates by default +// https://searchfox.org/mozilla-central/source/remote/shared/RecommendedPreferences.sys.mjs#253 + +defaultPref("extensions.update.notifyUser", true); // [HIDDEN] + +defaultPref("browser.phoenix.core.status", "023"); + +// 024 DEBUGGING + +// Allow Remote debugging, as it can be useful (especially on Android) - but ONLY per-session +// https://firefox-source-docs.mozilla.org/devtools/backend/protocol.html + +pref("devtools.debugger.remote-enabled", false); // [DEFAULT - non-Thunderbird] + +/// Enforce local debugging only + +lockPref("devtools.debugger.force-local", true); // [DEFAULT] + +// Always prompt before connecting... + +lockPref("devtools.debugger.prompt-connection", true); // [DEFAULT - non-Nightly] + +/// Ensure that URLs are not being logged in Reader errors + +defaultPref("reader.errors.includeURLs", false); // [DEFAULT - Android/Thunderbird] + +defaultPref("browser.phoenix.core.status", "024"); + +/// 025 MISC. + +/// Disable WebVTT Testing Events +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml + +defaultPref("media.webvtt.testing.events", false); // [DEFAULT] + +/// Always allow installing "incompatible" add-ons +// Especially useful on Android & Thunderbird... + +defaultPref("extensions.strictCompatibility", false); // [DEFAULT - non-Thunderbird] + +/// Isolate permissions per container (if containers are enabled...) +// https://support.mozilla.org/kb/how-use-firefox-containers + +defaultPref("permissions.isolateBy.userContext", true); + +/// Force pop-up windows to open in new tabs instead + +defaultPref("browser.link.open_newwindow", 3); // [DEFAULT] +defaultPref("browser.link.open_newwindow.restriction", 0); // [DEFAULT - Android/Thunderbird] + +/// Always block pop-ups by default + +defaultPref("dom.disable_open_during_load", true); // [DEFAULT - non-Thunderbird] + +/// Limit what events can cause pop-ups + +defaultPref("dom.popup_allowed_events", "click dblclick"); + +/// Prevent scripts from moving, resizing, and messing with windows + +defaultPref("dom.disable_window_flip", true); // [DEFAULT - non-Android] +defaultPref("dom.disable_window_move_resize", true); // [DEFAULT - Android] + +/// Disable annoying Web Speech API errors +// https://searchfox.org/mozilla-central/source/browser/actors/SpeechDispatcherParent.sys.mjs#8 + +defaultPref("media.webspeech.synth.dont_notify_on_error", true); // [HIDDEN] + +defaultPref("browser.phoenix.core.status", "025"); + +// 026 PERFORMANCE +// A lot of these taken from https://github.com/yokoffing/Betterfox/blob/main/Fastfox.js + +defaultPref("browser.cache.jsbc_compression_level", 3); // [Default = 0] +defaultPref("browser.sessionstore.interval", 60000); +defaultPref("browser.sessionhistory.max_total_viewers", 7); // [Default = -1 (Automatic)] +defaultPref("content.notify.interval", 100000); // [Default = 120000] https://searchfox.org/mozilla-central/rev/c1180ea13e73eb985a49b15c0d90e977a1aa919c/modules/libpref/init/StaticPrefList.yaml#1824-1834 +defaultPref("extensions.logging.enabled", false); // [DEFAULT] https://searchfox.org/mozilla-central/source/mobile/android/app/geckoview-prefs.js#232 +defaultPref("gfx.canvas.accelerated", true); // [DEFAULT] +defaultPref("gfx.canvas.accelerated.cache-items", 8192); // [DEFAULT - non-Thunderbird] +defaultPref("gfx.canvas.accelerated.cache-size", 512); // [Default = 256] +defaultPref("gfx.content.skia-font-cache-size", 20); // [Default = 5] +defaultPref("gfx.webrender.compositor", true); // [DEFAULT - macOS/Windows] +defaultPref("image.mem.decode_bytes_at_a_time", 32768); // [Default = 16384] +defaultPref("image.mem.shared.unmap.min_expiration_ms", 120000); // [Default = 60000] +defaultPref("layout.css.report_errors", false); // [DEFAULT - Android] https://searchfox.org/mozilla-central/source/mobile/android/app/geckoview-prefs.js#299 +defaultPref("media.cache_readahead_limit", 7200); +defaultPref("media.cache_resume_threshold", 3600); +defaultPref("media.memory_cache_max_size", 65536); // [Default = 8192] +defaultPref("network.dnsCacheEntries", 1000); // [Default = 800 - Nightly Desktop, 400 - Non-Nightly Desktop] +defaultPref("network.dnsCacheExpiration", 3600); // [Default = 60] +defaultPref("network.dnsCacheExpirationGracePeriod", 240); // [Default = 60] +defaultPref("network.http.max-persistent-connections-per-proxy", 48); // [Default = 20 - Android, 32 - non-Android] +defaultPref("network.http.max-persistent-connections-per-server", 10); // [Default = 6] +defaultPref("network.http.max-urgent-start-excessive-connections-per-host", 5); // [Default = 3] + +defaultPref("browser.phoenix.core.status", "026"); + +// 027 SCROLLING + +defaultPref("apz.autoscroll.enabled", true); // [DEFAULT] +defaultPref("apz.overscroll.enabled", true); // [DEFAULT - non-Thunderbird] +defaultPref("general.autoScroll", true); // [DEFAULT - non-Unix (excluding macOS)/Thunderbird, HIDDEN - Android] +defaultPref("general.smoothScroll", true); // [DEFAULT - non-Thunderbird] + +defaultPref("browser.phoenix.core.status", "027"); + +// 028 Personal Touch 💜 + +/// Things that are nice to have™ +// Not directly privacy & security related + +defaultPref("browser.translations.alwaysTranslateLanguages", "bg,ca,cs,da,de,el,en,es,et,fi,fr,hr,hu,id,it,ja,ko,lv,lt,nl,pl,pt,ro,ru,sk,sl,sr,sv,tr,uk,vi,zh-Hans"); +defaultPref("browser.translations.automaticallyPopup", true); // [DEFAULT] +defaultPref("browser.translations.enable", true); // [DEFAULT - non-Thunderbird] +defaultPref("browser.translations.select.enable", true); // [DEFAULT - non-Android/Thunderbird] +defaultPref("devtools.chrome.enabled", true); // [DEFAULT - Thunderbird] +defaultPref("findbar.highlightAll", true); // Highlights all Findbar (Ctrl + F) results by default +defaultPref("full-screen-api.transition-duration.enter", "0 0"); // [Default = 200 200] +defaultPref("full-screen-api.transition-duration.leave", "0 0"); // [Default = 200 200] +defaultPref("full-screen-api.warning.delay", -1); // [Default = 500, -1 = Automatic] +defaultPref("full-screen-api.warning.timeout", 0); // [Default = 3000] +defaultPref("security.xfocsp.hideOpenInNewWindow", false); +defaultPref("ui.key.menuAccessKeyFocuses", false); // [DEFAULT - non-Windows/Linux] Prevent alt key from toggling menu bar by default +defaultPref("view_source.syntax_highlight", true); // [DEFAULT - non-Thunderbird] +defaultPref("view_source.wrap_long_lines", true); // [DEFAULT - Android] + +defaultPref("browser.phoenix.core.status", "028"); + +// 029 Specialized/Custom configs + +/// Configure the behavior of remote autoconfig files (if active) + +defaultPref("autoadmin.failover_to_cached", true); +defaultPref("autoadmin.offline_failover", true); +defaultPref("autoadmin.refresh_interval", 60); + +defaultPref("browser.phoenix.core.status", "029"); + +lockPref("browser.phoenix.core.status", "successfully applied :D"); + + +// + +// +// Copyright (C) 2024-2025 celenity +// +// This file is part of Phoenix. +// +// Phoenix is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. +// +// Phoenix is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. +// +// You should have received a copy of the GNU General Public License along with Phoenix. If not, see https://www.gnu.org/licenses/. +// + +// This file contains preferences shared across Phoenix & Dove on Desktop. + +// 001 DATA COLLECTION + +/// Crash Reporting +// https://github.com/mozilla-services/socorro +// https://wiki.mozilla.org/Socorro + +lockPref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [DEFAULT, HIDDEN - Thunderbird] +lockPref("browser.crashReports.unsubmittedCheck.enabled", false); // [DEFAULT - non-Nightly, HIDDEN - Thunderbird] + +/// Misc. Telemetry + +lockPref("browser.urlbar.quicksuggest.dataCollection.enabled", false); // [DEFAULT] +lockPref("browser.urlbar.quicksuggest.onboardingDialogChoice", "reject_2"); // [HIDDEN] https://searchfox.org/mozilla-central/source/browser/components/urlbar/docs/firefox-suggest-telemetry.rst https://searchfox.org/mozilla-central/source/toolkit/components/telemetry/docs/data/environment.rst https://searchfox.org/mozilla-central/source/browser/components/urlbar/tests/quicksuggest/browser/browser_quicksuggest_onboardingDialog.js + +defaultPref("browser.phoenix.desktop.common.status", "001"); + +// 002 MOZILLA CRAP™ + +/// Firefox Recommendations & "Discovery" + +defaultPref("extensions.getAddons.discovery.api_url", "data;"); // https://searchfox.org/mozilla-central/source/testing/profiles/common/user.js +defaultPref("extensions.ui.lastCategory", "addons://list/extension"); // [HIDDEN] Ensure default view of `about:addons` is local/installed extensions... + +/// Prevent Mozilla domains from having special privileges + +lockPref("permissions.manager.defaultsUrl", ""); +defaultPref("services.sync.addons.trustedSourceHostnames", ""); + +defaultPref("browser.phoenix.desktop.common.status", "002"); + +// 003 CERTIFICATES + +/// Enforce Strict Certificate Pinning +// https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning#How_to_use_pinning + +lockPref("security.cert_pinning.enforcement_level", 2); + +/// Disable third-party/OS-level root certificates +// I've been torn on how to handle this, but IMO the safest way forward is disabling this functionality in Firefox. +// This is commonly abused by malware/etc. and it's even overriden by certain software/garbage AV's... +// Ex. https://support.kaspersky.com/common/compatibility/14620#block3 +// Since this is something programs actively try to override, I don't see a safe way to support this, so we'll lock it. +// We still allow users to manually import certificates into Firefox... +// So we can ensure users are aware of certificates they add and are making this decision consciously. +// security.osclientcerts.autoload can be left alone - https://groups.google.com/a/mozilla.org/g/enterprise/c/XiW-ZidMaII +// We also set "ImportEnterpriseRoots" in policies +// https://mozilla.github.io/policy-templates/#certificates--importenterpriseroots + +lockPref("security.certerrors.mitm.auto_enable_enterprise_roots", false); +lockPref("security.enterprise_roots.enabled", false); + +defaultPref("browser.phoenix.desktop.common.status", "003"); + + + + + +// 005 DISK AVOIDANCE + +/// Sanitization +// Clears cache on sanitization dialog by default + +defaultPref("privacy.cpd.cache", true); // [DEFAULT] + +/// Set time range when manually clearing data to "everything" by default + +defaultPref("privacy.sanitize.timeSpan", 0); + + + +defaultPref("browser.phoenix.desktop.common.status", "005"); + +// 006 EXTENSIONS + +// Only allow signed language packs & whitelisted extensions... + +lockPref("extensions.langpacks.signatures.required", true); // [DEFAULT] +lockPref("xpinstall.whitelist.required", true); // [DEFAULT] + +// Enable panel for our own extension recommendations... + +defaultPref("extensions.getAddons.showPane", true); // [DEFAULT] + +defaultPref("browser.phoenix.desktop.common.status", "006"); + +// 007 MISC. PRIVACY + + + +/// Disable Firefox Sync by default +// When signing in to Firefox Sync, this controls the items (checkboxes) that are set to sync (under about:preferences#sync). +// This allows the user to control and choose for themselves what they'd like to sync... + +defaultPref("services.sync.engine.addons", false); +defaultPref("services.sync.engine.addresses", false); // [DEFAULT] +defaultPref("services.sync.engine.bookmarks", false); +defaultPref("services.sync.engine.creditcards", false); // [DEFAULT] +defaultPref("services.sync.engine.history", false); +defaultPref("services.sync.engine.passwords", false); +defaultPref("services.sync.engine.prefs", false); +defaultPref("services.sync.engine.tabs", false); + +/// Disable sharing unnecessary version info as part of Firefox Sync + +defaultPref("services.sync.sendVersionInfo", false); + +/// If a remote AutoConfig is being used, ensure identifying info is never shared... + +lockPref("autoadmin.append_emailaddr", false); // [HIDDEN] + +defaultPref("browser.phoenix.desktop.common.status", "007"); + +// 008 ATTACK SURFACE REDUCTION + +/// Disable WebXR +// https://developer.mozilla.org/docs/Web/API/WebXR_Device_API + +defaultPref("permissions.default.xr", 2); // [HIDDEN on Thunderbird] + +defaultPref("browser.phoenix.desktop.common.status", "008"); + +// 009 MISC. SECURITY + + + + + +/// If a remote AutoConfig is being used, block it from gaining privileged browser access... +// https://www.mozilla.org/firefox/62.0/releasenotes/ + +lockPref("general.config.sandbox_enabled", true); + +defaultPref("browser.phoenix.desktop.common.status", "009"); + +// 010 MEDIA + + + +/// Remove DRM toggle in `about:preferences#general` + +defaultPref("browser.eme.ui.enabled", false); + + + + + + + +/// Enable click to play UI for certain CSS skins by default... +// https://github.com/black7375/Firefox-UI-Fix/blob/master/css/leptonContent.css#L223 +// https://github.com/black7375/Firefox-UI-Fix/wiki/Options#defaults-6 + +defaultPref("userContent.player.click_to_play", true); // [HIDDEN] + +defaultPref("browser.phoenix.desktop.common.status", "010"); + +// 011 UPDATES + +/// Browser Updates + +defaultPref("app.update.badgeWaitTime", 0); // Immediately show badge on hamburger menu when update is available +defaultPref("app.update.notifyDuringDownload", true); // Ensure that users are notified when an update is downloaded +defaultPref("app.update.promptWaitTime", 3600); // Decrease time between update prompts, default is very generous... + +defaultPref("browser.phoenix.desktop.common.status", "011"); + +// 012 DEBUGGING + +/// Enforce local debugging only + +lockPref("devtools.inspector.remote", false); // [DEFAULT] + +defaultPref("browser.phoenix.desktop.common.status", "012"); + +// 013 MISC. + +/// Enable Containers by default +// https://support.mozilla.org/kb/how-use-firefox-containers + +defaultPref("privacy.userContext.enabled", true); + +/// Never hide any extensions in about:debugging + +lockPref("devtools.aboutdebugging.showHiddenAddons", true); + +defaultPref("browser.phoenix.desktop.common.status", "013"); + +// 014 PERFORMANCE +// A lot of these taken from https://github.com/yokoffing/Betterfox/blob/main/Fastfox.js + +defaultPref("network.http.max-connections", 1800); // [Default = 900] + +/// Disables certain UI animations +// https://searchfox.org/mozilla-central/source/widget/nsXPLookAndFeel.cpp +// https://searchfox.org/mozilla-central/source/widget/LookAndFeel.h + +defaultPref("ui.panelAnimations", 0); // [HIDDEN] +defaultPref("ui.prefersReducedMotion", 1); // [HIDDEN] +defaultPref("ui.swipeAnimationEnabled", 0); // [HIDDEN] + +defaultPref("browser.phoenix.desktop.common.status", "014"); + +// 015 Personal Touch 💜 + +/// Things that are nice to have™ +// Not directly privacy & security related + +/// Enable Spellcheck for both multi-line and single-line boxes +// [Default = 1, only checks multi-line boxes] +// https://codeberg.org/celenity/Phoenix/issues/33 + +defaultPref("layout.spellcheckDefault", 2); + +/// Enable custom CSS by default + +defaultPref("toolkit.legacyUserProfileCustomizations.stylesheets", true); + +/// This pref allows controlling the log level of policies (extremely useful for troubleshooting...), set here to the default value so that it's exposed in the about:config +// https://searchfox.org/mozilla-central/source/browser/components/BrowserGlue.sys.mjs#967 + +defaultPref("browser.policies.loglevel", "error"); // [DEFAULT, HIDDEN] + +/// Developer tools... + +defaultPref("devtools.command-button-experimental-prefs.enabled", true); // [HIDDEN] +defaultPref("devtools.command-button-measure.enabled", true); +defaultPref("devtools.command-button-rulers.enabled", true); +defaultPref("devtools.command-button-screenshot.enabled", true); +defaultPref("devtools.debugger.ui.editor-wrapping", true); // Enables long line wrapping in developer tools https://discourse.mozilla.org/t/long-line-wrapping-in-developer-tools-css-editor-and-debugger-code-views/47058 +defaultPref("devtools.dom.enabled", true); +defaultPref("devtools.netmonitor.persistlog", true); // Do not automatically clear log messages after page reloads/navigation +defaultPref("devtools.webconsole.persistlog", true); // Do not automatically clear log messages after page reloads/navigation +defaultPref("devtools.webconsole.timestampMessages", true); // Enable timestamps in the web console by default + +/// Expose hidden UI preferences in the about:config... +// https://searchfox.org/mozilla-central/source/widget/nsXPLookAndFeel.cpp +// https://searchfox.org/mozilla-central/source/widget/LookAndFeel.h + +defaultPref("ui.hideCursorWhileTyping", 1); // [DEFAULT, HIDDEN] +defaultPref("ui.prefersReducedTransparency", 0); // [DEFAULT, HIDDEN] +defaultPref("ui.scrollToClick", 1); // [HIDDEN] +defaultPref("ui.useAccessibilityTheme", 0); // [DEFAULT, HIDDEN] + +defaultPref("browser.phoenix.desktop.common.status", "015"); + +lockPref("browser.phoenix.desktop.common.status", "successfully applied :D"); + +// + +// +// Copyright (C) 2024-2025 celenity +// +// This file is part of Phoenix. +// +// Phoenix is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. +// +// Phoenix is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. +// +// You should have received a copy of the GNU General Public License along with Phoenix. If not, see https://www.gnu.org/licenses/. +// + +// This file contains preferences shared across Phoenix 'Extended' configs. + +// 001 ADVANCED FINGERPRINTING PROTECTION + +/// Disable WebGL +// https://blog.browserscan.net/docs/webgl-fingerprinting +// https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern + +defaultPref("webgl.disabled", true); + +defaultPref("browser.phoenix.extended.core.status", "001"); + +// 002 WEBRTC +// This will likely break WebRTC... + +/// Force a single candidate for ICE generation +defaultPref("media.peerconnection.ice.default_address_only", true); + +/// Forcefully exclude local IP addresses, even in trusted scenarios +defaultPref("media.peerconnection.ice.no_host", true); + +/// Only use TURN servers/relays, no p2p... +// https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/issues/40#note_2884663 +defaultPref("media.peerconnection.ice.relay_only", true); + +defaultPref("browser.phoenix.extended.core.status", "002"); + +// 003 MISC. PRIVACY + +/// Disable TCP/dFPI storage access heuristics +// https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning#storage_access_heuristics + +defaultPref("privacy.restrict3rdpartystorage.heuristic.opened_window_after_interaction", false); +defaultPref("privacy.restrict3rdpartystorage.heuristic.recently_visited", false); +defaultPref("privacy.restrict3rdpartystorage.heuristic.redirect", false); // [DEFAULT - Android] +defaultPref("privacy.restrict3rdpartystorage.heuristic.window_open", false); // [DEFAULT - Android] + +/// Only send cross-origin referers if hosts match + +defaultPref("network.http.referer.XOriginPolicy", 2); + +defaultPref("browser.phoenix.extended.core.status", "003"); + +// 004 ATTACK SURFACE REDUCTION + +/// Disable WebAssembly +// https://spectrum.ieee.org/more-worries-over-the-security-of-web-assembly + +defaultPref("javascript.options.wasm", false); + +defaultPref("browser.phoenix.extended.core.status", "004"); + +// 005 MISC. + +/// Prevent sites from automatically refreshing + +defaultPref("accessibility.blockautorefresh", true); +defaultPref("browser.meta_refresh_when_inactive.disabled", true); // [DEFAULT - Android] + +/// Stricter Autoplay Blocking + +defaultPref("media.autoplay.blocking_policy", 2); // [Default = 0] + +defaultPref("browser.phoenix.extended.core.status", "005"); + +lockPref("browser.phoenix.extended.core.status", "successfully applied :D"); + +// + +// +// Copyright (C) 2024-2025 celenity +// +// This file is part of Phoenix. +// +// Phoenix is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. +// +// Phoenix is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. +// +// You should have received a copy of the GNU General Public License along with Phoenix. If not, see https://www.gnu.org/licenses/. +// + +// This file contains preferences shared across Phoenix (Extended) & Dove on Desktop. + +// 001 ADVANCED FINGERPRINTING PROTECTION + +/// Enable dynamic rounding of content dimensions +// https://bugzilla.mozilla.org/show_bug.cgi?id=1407366 + +defaultPref("privacy.resistFingerprinting.letterboxing", true); + +lockPref("browser.phoenix.extended.desktop.common.status", "successfully applied :D"); + +// +// The Phoenix shall be followed by a Dove: one of great strength and great beauty, to help carry out its conquest. + +// +// Copyright (C) 2024-2025 celenity +// +// This file is part of Dove. +// +// Dove is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. +// +// Dove is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. +// +// You should have received a copy of the GNU General Public License along with Dove. If not, see https://www.gnu.org/licenses/. +// + +// Built from Phoenix (Extended) + +lockPref("mail.dove.version", "2025.02.18.1"); + +defaultPref("mail.dove.status", "000"); + +// 001 TELEMETRY + +lockPref("toolkit.telemetry.ecosystemtelemetry.enabled", false); // [DEFAULT for non-Nightly...] + +defaultPref("mail.dove.status", "001"); + +// 002 MOZILLA CRAP + +/// Disable Mozilla Email Provisioner/Creating new email addresses with their "partners" + +defaultPref("mail.provider.enabled", false); +defaultPref("mail.provider.suppress_dialog_on_startup", true); // [HIDDEN] + +/// Never check if Thunderbird is the default mail client + +defaultPref("mail.shell.checkDefaultClient", false); + +/// Never check if Thunderbird is the default PDF viewer + +defaultPref("pdfjs.firstRun", false); + +/// Skip onboarding +// https://searchfox.org/comm-central/source/suite/components/nsSuiteGlue.js#965 + +defaultPref("browser.EULA.override", true); +defaultPref("browser.rights.override", true); +defaultPref("mail.rights.override", true); +defaultPref("mailnews.start_page_override.mstone", "ignore"); + +/// Disable Start Page by default & switch the URL to the about:config +// This allows users to easily access the about:config via the menu bar from Go -> Mail Start Page +// Or by pressing alt + home + +defaultPref("mailnews.start_page.enabled", false); +defaultPref("mailnews.start_page.override_url", ""); +defaultPref("mailnews.start_page.url", "about:config"); + +/// Disable Donate Prompts +// Please still donate to Thunderbird if you appreciate it! ;) +// https://www.thunderbird.net/?form=support + +lockPref("app.donation.eoy.url", ""); +lockPref("app.donation.eoy.version.viewed", 99); + +/// Disable Filelink +// https://support.mozilla.org/kb/filelink-large-attachments + +defaultPref("mail.cloud_files.enabled", false); + +/// Disable "Chat" functionality + +defaultPref("mail.chat.enabled", false); + +/// Kill Add-on "Discovery" Recommendations + +defaultPref("extensions.getAddons.recommended.url", ""); + +/// Remove unnecessary URL params + +defaultPref("app.releaseNotesURL", "https://live.thunderbird.net/%APP%/releasenotes?locale=%LOCALE%&version=%VERSION%&channel=%CHANNEL%&os=%OS%&buildid=%APPBUILDID%"); +defaultPref("app.releaseNotesURL.aboutDialog", "https://live.thunderbird.net/%APP%/releasenotes?locale=%LOCALE%&version=%VERSION%&channel=%CHANNEL%&os=%OS%&buildid=%APPBUILDID%"); +defaultPref("app.releaseNotesURL.prompt", "https://live.thunderbird.net/%APP%/releasenotes?locale=%LOCALE%&version=%VERSION%&channel=%CHANNEL%&os=%OS%&buildid=%APPBUILDID%"); +defaultPref("extensions.getAddons.search.browseURL", "https://addons.thunderbird.net/%LOCALE%/%APP%/search/?q=%TERMS%"); + +defaultPref("mail.dove.status", "002"); + +// 003 DISK AVOIDANCE + +/// Disable caching + +defaultPref("mail.imap.use_disk_cache2", false); + +/// Set website permissions to be session only + +defaultPref("permissions.memory_only", true); // [HIDDEN] + +/// Fully disable browsing history + +defaultPref("places.history.enabled", false); + +/// Sanitize data on exit... +// https://bugzilla.mozilla.org/show_bug.cgi?id=1675829 + +defaultPref("network.cookie.noPersistentStorage", true); +defaultPref("privacy.clearHistory.cookiesAndStorage", true); +defaultPref("privacy.clearOnShutdown.cookies", true); +defaultPref("privacy.clearOnShutdown_v2.cookiesAndStorage", true); +defaultPref("privacy.clearSiteData.cookiesAndStorage", true); + +/// Disable logging chat history +// https://stackoverflow.com/questions/32155137/how-to-disable-chat-history-in-mozilla-thunderbird + +defaultPref("purple.logging.log_chats", false); +defaultPref("purple.logging.log_ims", false); + +/// Do not leak info in chat notifications by default + +defaultPref("mail.chat.notification_info", 2); + +/// Do not leak info in email alerts/notifications by default + +defaultPref("mail.biff.alert.show_preview", false); +defaultPref("mail.biff.alert.show_sender", false); +defaultPref("mail.biff.alert.show_subject", false); + +defaultPref("mail.dove.status", "003"); + +// 004 GENERAL NETWORK HARDENING + +/// Enforce using secure connections for auto config + +defaultPref("mailnews.auto_config.fetchFromISP.sslOnly", true); +defaultPref("mailnews.auto_config.guess.requireGoodCert", true); // [DEFAULT] +defaultPref("mailnews.auto_config.guess.sslOnly", true); + +/// Disable sending usernames to your email provider when using auto config by default... +// https://searchfox.org/comm-central/source/mailnews/mailnews.js#1024 + +defaultPref("mailnews.auto_config.fetchFromISP.sendEmailAddress", false); + +/// Disable link previews + +defaultPref("mail.compose.add_link_preview", false); + +/// Always warn when making insecure connections +// Unclear whether actually used anywhere + +defaultPref("security.warn_entering_weak", true); +defaultPref("security.warn_leaving_secure", true); +defaultPref("security.warn_viewing_mixed", true); + +defaultPref("mail.dove.status", "004"); + +// 005 UI + +/// Always show full email addresses + +defaultPref("mail.addressDisplayFormat", 0); // [DEFAULT, HIDDEN] Sets preferred address display format to "Full name and email address" +defaultPref("mail.showCondensedAddresses", false); + +/// Always show email information & headers + +defaultPref("mail.show_headers", 2); +defaultPref("mailnews.display.date_senders_timezone", true); // Display timezone of sender +defaultPref("mailnews.headers.showMessageId", true); +defaultPref("mailnews.headers.showOrganization", true); +defaultPref("mailnews.headers.showReferences", true); +defaultPref("mailnews.headers.showSender", true); +defaultPref("mailnews.headers.showUserAgent", true); + +defaultPref("mail.dove.status", "005"); + +// 006 INFORMATION LEAKAGE + +/// Disable sending read receipts +// https://searchfox.org/comm-central/source/mailnews/mailnews.js#292 + +defaultPref("mail.mdn.report.enabled", false); +defaultPref("mail.mdn.report.not_in_to_cc", 0); +defaultPref("mail.mdn.report.outside_domain", 0); +defaultPref("mail.mdn.report.other", 0); +defaultPref("mail.server.default.mdn_not_in_to_cc", 0); +defaultPref("mail.server.default.mdn_other", 0); +defaultPref("mail.server.default.mdn_outside_domain", 0); +defaultPref("mail.server.default.mdn_report_enabled", false); +defaultPref("purple.conversations.im.send_read", false); // [CHAT] + +/// Disable sending chat typing notifications + +defaultPref("purple.conversations.im.send_typing", false); + +/// Disable reporting chat idle status... + +defaultPref("messenger.status.reportIdle", false); + +/// Disable reporting chat status as 'away' when idle... +// Defense in depth + +defaultPref("messenger.status.awayWhenIdle", false); + +/// Prevent sending user agent with emails, as it is unnecessary, not even defined in spec, & leaks information +// https://bugzilla.mozilla.org/show_bug.cgi?id=1114475 + +defaultPref("mailnews.headers.sendUserAgent", false); +defaultPref("mailnews.headers.useMinimalUserAgent", true); // [DEFAULT, DEFENSE IN DEPTH] + +/// Prevent leaking system locale & date/time in replies + +defaultPref("mailnews.reply_header_authorwroteondate", "#1 wrote on #2 #3:"); +defaultPref("mailnews.reply_header_authorwrotesingle", "#1 wrote:"); +defaultPref("mailnews.reply_header_ondateauthorwrote", "On #2 #3, #1 wrote:"); +defaultPref("mailnews.reply_header_type", 1); + +/// Prevent leaking spellcheck dictionary info +// https://bugzilla.mozilla.org/show_bug.cgi?id=1370217 + +defaultPref("mail.suppress_content_language", true); + +/// Prevent leaking locale & specific time through date header +// https://bugzilla.mozilla.org/show_bug.cgi?id=1603359 + +defaultPref("mail.sanitize_date_header", true); + +/// Prevent local IP address leakage via EHLO/HELO... +// https://blog.plee.me/2014/11/mozilla-thunderbird-changing-the-ehlo-helo-value-in-the-received-header-for-outgoing-mail/ + +defaultPref("mail.smtpserver.default.hello_argument", "[127.0.0.1]"); // [HIDDEN] + +/// Prevent leaking display names of contacts in address fields... +// https://github.com/HorlogeSkynet/thunderbird-user.js/blob/master/user.js#L1231 + +defaultPref("extensions.cardbook.useOnlyEmail", true); + +defaultPref("mail.dove.status", "006"); + +// 007 E2EE + +/// Enable advanced E2EE settings +// https://searchfox.org/comm-central/source/mail/extensions/am-e2e/prefs/e2e-prefs.js#104 + +defaultPref("temp.openpgp.advancedUser", true); + +/// Always notify when encryption is possible + +defaultPref("mail.openpgp.remind_encryption_possible", true); // [DEFAULT] +defaultPref("mail.smime.remind_encryption_possible", true); // [DEFAULT] + +/// Always automatically encrypt when possible + +defaultPref("mail.e2ee.auto_enable", true); + +/// Never automatically disable E2EE... +// https://searchfox.org/comm-central/source/mail/extensions/am-e2e/prefs/e2e-prefs.js#67 + +lockPref("mail.e2ee.auto_disable", false); // [DEFAULT] + +/// Always notify when E2EE is disabled + +lockPref("mail.e2ee.notify_on_auto_disable", true); // [DEFAULT] + +/// Ensure we're not accepting insecure S/MIME signatures... +// https://searchfox.org/comm-central/source/mail/extensions/am-e2e/prefs/e2e-prefs.js#95 + +defaultPref("mail.smime.accept_insecure_sha1_message_signatures", false); // [DEFAULT] + +/// Sign messages by default +/// https://searchfox.org/comm-central/source/mail/extensions/am-e2e/prefs/e2e-prefs.js#12 + +defaultPref("mail.identity.default.sign_mail", true); + +/// Use GnuPG if built-in RNP fails +// https://wiki.mozilla.org/Thunderbird:OpenPGP:Smartcards#Allow_the_use_of_external_GnuP + +defaultPref("mail.openpgp.allow_external_gnupg", true); + +/// Always warn users when using a deprecated version of GnuPG... + +defaultPref("temp.openpgp.warnDeprecatedGnuPG", true); // [DEFAULT] + +defaultPref("mail.dove.status", "007"); + +// 008 MISC. PRIVACY + +/// Never load remote content in emails +// This still allows setting exceptions. + +lockPref("mailnews.message_display.disable_remote_image", true); // [DEFAULT] + +/// Disable Geolocation +// https://browserleaks.com/geo + +defaultPref("browser.geolocation.warning.infoURL", ""); +defaultPref("geo.provider.network.url", ""); +defaultPref("geo.provider.use_corelocation", false); +defaultPref("geo.provider.use_geoclue", false); + +/// Harden FPP +// As explained here: https://codeberg.org/celenity/Phoenix/issues/46 +// We're adding -HttpUserAgent & -NavigatorUserAgent (compared to standard Phoenix Extended) because they try to report that we're Firefox, which causes all kinds of breakage and weird behavior (ex. on the ATO...) +// We're removing -CanvasExtractionBeforeUserInputIsBlocked as Thunderbird simply doesn't support these permission prompts for canvas data extraction... + +defaultPref("privacy.fingerprintingProtection.overrides", "+AllTargets,-CSSPrefersColorScheme,-FrameRate,-HttpUserAgent,-NavigatorUserAgent"); + +/// Reset Phoenix's FPP overrides + disable Mozilla's remote overrides +// These are meant for browsers and may have undesired privacy implications for our use case... + +defaultPref("privacy.fingerprintingProtection.granularOverrides", ""); // [DEFAULT] +defaultPref("privacy.fingerprintingProtection.remoteOverrides.enabled", false); + +/// Strip referers, but allow toggling per session, since they may be needed on rare occasions. + +pref("network.http.referer.XOriginPolicy", 2); + +/// Disable macOS Spotlight & Windows file indexing email by default + +defaultPref("mail.spotlight.enable", false); // [DEFAULT] +defaultPref("mail.spotlight.firstRunDone", true); +defaultPref("mail.winsearch.enable", false); // [DEFAULT] +defaultPref("mail.winsearch.firstRunDone", true); +defaultPref("searchintegration.enable", false); + +/// Disable automatic collection of email addresses for Thunderbird's Address Book... + +defaultPref("mail.collect_email_address_outgoing", false); + +/// Alert users if they have not addressed a BCC (Blind Carbon Copy) warning + +defaultPref("mail.compose.warn_public_recipients.aggressive", true); + +/// Explicitly disable legacy XMPP gateways for Facebook, Google, Twitter, and Yahoo... +// https://searchfox.org/comm-central/source/chat/chat-prefs.js#76 + +defaultPref("chat.prpls.prpl-facebook.disable", true); // [DEFAULT] +defaultPref("chat.prpls.prpl-gtalk.disable", true); // [DEFAULT] +defaultPref("chat.prpls.prpl-twitter.disable", true); // [DEFAULT] +defaultPref("chat.prpls.prpl-yahoo.disable", true); // [DEFAULT] + +defaultPref("mail.dove.status", "008"); + +// 009 MISC. SECURITY + +/// Prevent 3rd party software from intercepting & analyzing your emails... +// This is the "Allow Antivirus clients to quarantine individual incoming messages" option within Privacy & Security settings... +// https://searchfox.org/comm-central/source/mail/components/MailGlue.sys.mjs#1299 + +lockPref("mailnews.downloadToTempFile", false); + +/// Sanitize HTML content +// https://www.bucksch.org/1/projects/mozilla/108153/ + +defaultPref("mail.html_sanitize.drop_conditional_css", true); // [DEFAULT] +defaultPref("mailnews.display.html_as", 3); +defaultPref("rss.display.html_as", 3); + +/// Enforce built-in phishing protection +// https://support.mozilla.org/kb/thunderbirds-scam-detection + +defaultPref("mail.phishing.detection.disallow_form_actions", true); // [DEFAULT] +defaultPref("mail.phishing.detection.enabled", true); // [DEFAULT] +defaultPref("mail.phishing.detection.ipaddresses", true); // [DEFAULT] +defaultPref("mail.phishing.detection.mismatched_hosts", true); // [DEFAULT] + +/// Always warn users before launching other apps... + +defaultPref("mail.external_protocol_requires_permission", true); // [HIDDEN] + +/// Always alert users when downloads are initiated (and completed) +// https://searchfox.org/comm-central/source/mail/app/profile/all-thunderbird.js#505 + +defaultPref("browser.download.manager.focusWhenStarting", true); +defaultPref("browser.download.manager.showAlertOnComplete", true); +defaultPref("browser.download.manager.showWhenStarting", true); + +/// Show a progress dialog upon download +// https://searchfox.org/comm-central/source/suite/app/profile/suite-prefs.js#708 + +defaultPref("browser.download.manager.behavior", 1); // [HIDDEN] + +/// Limit classes that can process incoming data +// Enables a blocklist to avoid HTML, inline images, and other unknown content types +// https://searchfox.org/comm-central/source/mailnews/mailnews.js#728 + +defaultPref("mailnews.display.disallow_mime_handlers", 3); +defaultPref("rss.display.disallow_mime_handlers", 3); + +defaultPref("mail.dove.status", "009"); + +// 010 MISC. + +/// Send emails in plaintext by default +// https://drewdevault.com/2016/04/11/Please-use-text-plain-for-emails.html + +defaultPref("mail.default_send_format", 1); +defaultPref("mail.html_compose", false); +defaultPref("mail.identity.default.compose_html", false); + +/// Prefer viewing emails in plaintext by default + +defaultPref("mailnews.display.prefer_plaintext", true); + +/// Prefer viewing RSS feeds in plaintext by default + +defaultPref("rss.display.prefer_plaintext", true); + +/// Load summary of RSS feeds instead of the full webpage by default + +defaultPref("rss.show.summary", 1); + +/// Open RSS webpages in your web browser instead of Thunderbird... +// https://support.mozilla.org/kb/how-subscribe-news-feeds-and-blogs + +defaultPref("rss.show.content-base", 3); + +/// Prevent selection of RSS messages from automatically loading the web page... +// https://support.mozilla.org/kb/how-subscribe-news-feeds-and-blogs + +defaultPref("rss.message.loadWebPageOnSelect", 0); + +/// Do not allow calendar to extract data from emails by default + +defaultPref("calendar.extract.service.enabled", false); // [DEFAULT] + +/// Kill Gecko Media Plugins + +defaultPref("media.gmp-gmpopenh264.enabled", false); +defaultPref("media.gmp-gmpopenh264.provider.enabled", false); +defaultPref("media.gmp-gmpopenh264.visible", false); +defaultPref("media.gmp-provider.enabled", false); + +/// Always allow installing "incompatible" add-ons - REQUIRED FOR UBLOCK ORIGIN + +lockPref("extensions.strictCompatibility", false); + +/// Allow running uBlock Origin on sites with restrictions (Quarantined domains) +// Necessary since it isn't 'recommended' like it is on Firefox... + +defaultPref("extensions.quarantineIgnoredByUser.uBlock0@raymondhill.net", true); + +/// Block DKIM Verifier from accessing quarantined domains... + +defaultPref("extensions.quarantineIgnoredByUser.dkim_verifier@pl", false); + +/// Disable SVG +// https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+svg + +defaultPref("svg.disabled", true); + +/// Disable WebRTC +// We already take care of privacy concerns here; this is for attack surface reduction... +// https://x.com/GrapheneOS/status/1728921946396725618 + +defaultPref("media.peerconnection.enabled", false); + +/// Prevent status bar spoofing +// https://searchfox.org/comm-central/source/mail/app/profile/all-thunderbird.js#542 + +defaultPref("dom.disable_window_status_change", true); // [DEFAULT] + +/// Re-enable Password Manager by default +// This is useful & important for Thunderbird, since it's the only way to store account passwords... +// Also no UI toggle for it :/ + +defaultPref("signon.rememberSignons", true); // [DEFAULT] + +/// Add our own extension recommendations... + +defaultPref("extensions.getAddons.discovery.api_url", "https://dove.celenity.dev/extensions/recommendations.json"); // https://searchfox.org/mozilla-central/source/testing/profiles/common/user.js +defaultPref("extensions.recommendations.privacyPolicyUrl", "https://dove.celenity.dev/privacy#extension-recommendations"); + +/// Don't warn on `mailto:`... +// Override from Phoenix + +defaultPref("network.protocol-handler.warn-external.mailto", false); // [DEFAULT, HIDDEN] + +defaultPref("mail.dove.status", "010"); + +// 011 Configure DKIM Verifier... +// https://codeberg.org/celenity/Dove/issues/6 +// https://github.com/lieser/dkim_verifier/issues/267 +// https://github.com/lieser/dkim_verifier/issues/268 +// https://github.com/lieser/dkim_verifier/wiki/Options +// https://github.com/lieser/dkim_verifier/blob/master/modules/preferences.mjs.js +// https://github.com/lieser/dkim_verifier/blob/master/_locales/en_US/messages.json + +/// Verify DKIM Signatures... + +defaultPref("extensions.dkim_verifier.dkim.enable", true); // [DEFAULT] + +/// By default, store DKIM keys + results for later comparison + +defaultPref("extensions.dkim_verifier.key.storing", 2); +defaultPref("extensions.dkim_verifier.saveResult", true); + +/// Enable reading the Authentication-Results header, but don't replace the extension's results... +// This allows us to look at both the header and the client-side results of DKIM Verifier for comparison/extra verification + +defaultPref("extensions.dkim_verifier.arh.read", true); +defaultPref("extensions.dkim_verifier.arh.replaceAddonResult", false); + +/// Warn on ill-formed AUID tags + +defaultPref("extensions.dkim_verifier.error.illformed_i.treatAs", 1); // [DEFAULT] + +/// Warn on ill-formed selector tags + +defaultPref("extensions.dkim_verifier.error.illformed_s.treatAs", 1); // [DEFAULT] + +/// Warn on DKIM keys not secured by DNSSEC + +defaultPref("extensions.dkim_verifier.error.policy.key_insecure.treatAs", 1); + +/// Warn on the RSA-SHA1 algorithm + +defaultPref("extensions.dkim_verifier.error.algorithm.sign.rsa-sha1.treatAs", 1); // [DEFAULT] + +/// Warn on weak RSA keys + +defaultPref("extensions.dkim_verifier.error.algorithm.rsa.weakKeyLength.treatAs", 1); + +/// Show detailed error reasons... + +defaultPref("extensions.dkim_verifier.error.detailedReasons", true); + +/// Switch the default DNS server from Google to Quad9... + +defaultPref("extensions.dkim_verifier.dns.nameserver", "9.9.9.9"); + +/// Check if emails should be signed +// https://github.com/lieser/dkim_verifier/wiki/Sign-rules + +defaultPref("extensions.dkim_verifier.policy.signRules.enable", true); + +/// Use the default signing rules by default... + +defaultPref("extensions.dkim_verifier.policy.signRules.checkDefaultRules", true); // [DEFAULT] + +/// Automatically add rules based on viewed DKIM-signed emails, but only if the from address is in the SDID + +defaultPref("extensions.dkim_verifier.policy.signRules.autoAddRule.enable", true); +defaultPref("extensions.dkim_verifier.policy.signRules.autoAddRule.for", 0); // [DEFAULT] +defaultPref("extensions.dkim_verifier.policy.signRules.autoAddRule.onlyIfFromAddressInSDID", true); // [DEFAULT] + +/// For signing rules, ensure the domain/subdomain in the SSID matches + +defaultPref("extensions.dkim_verifier.policy.signRules.sdid.allowSubDomains", false); + +/// Treat wrong SSIDs as errors instead of warnings... + +defaultPref("extensions.dkim_verifier.policy.signRules.error.wrong_sdid.asWarning", false); // [DEFAULT] + +/// Check DMARC entries to help determine whether an email should be signed +// https://github.com/lieser/dkim_verifier/wiki/Options#use-dmarc-to-heuristically-determine-if-an-e-mail-should-be-signed + +defaultPref("extensions.dkim_verifier.policy.DMARC.shouldBeSigned.enable", true); +defaultPref("extensions.dkim_verifier.policy.DMARC.shouldBeSigned.neededPolicy", "none"); // [DEFAULT] + +/// IF a header should be signed (as defined by the criteria above), enforce signing of *all* relevant headers + +defaultPref("extensions.dkim_verifier.policy.dkim.unsignedHeadersWarning.mode", 30); + +/// Always show the DKIM header & tooltip when a message is viewed... + +defaultPref("extensions.dkim_verifier.showDKIMFromTooltip", 50); +defaultPref("extensions.dkim_verifier.showDKIMHeader", 50); + +/// Enable showing favicons of known signing domains before the 'From' address by default +/// Works via BIMI & DKIM Verifier's own internal database +// https://github.com/lieser/dkim_verifier/wiki/Display-Options#show-the-favicon-of-known-signing-domains-before-the-from-address +// https://wikipedia.org/wiki/Brand_Indicators_for_Message_Identification + +defaultPref("extensions.dkim_verifier.display.favicon.show", true); // [DEFAULT] + +/// Indicate when a DKIM key is successfully validated by DNSSEC... +// https://github.com/lieser/dkim_verifier/wiki/Options#indicate-successful-dnssec-validation-with-a-lock-after-the-sdid + +defaultPref("extensions.dkim_verifier.display.keySecure", true); // [DEFAULT] + +/// Ensure debugging is disabled by default... + +defaultPref("extensions.dkim_verifier.debug", false); // [DEFAULT] + +defaultPref("mail.dove.status", "011"); + +// 012 Personal Touch 💜 + +/// Things that are nice to have™ +// Not directly privacy & security related + +/// Enable inline spellcheck when composing messages & check before sending by default + +defaultPref("mail.spellcheck.inline", true); // [DEFAULT] +defaultPref("mail.SpellCheckBeforeSend", true); + +/// Enable dark theme for the message pane + +defaultPref("mail.dark-reader.enabled", true); +defaultPref("mail.dark-reader.show-toggle", true); // [HIDDEN] Enables the UI toggle https://searchfox.org/comm-central/source/mail/base/content/msgHdrView.js#2787 + +/// By default, when saving a message to a file, use underscores instead of spaces in the file name... + +defaultPref("mail.save_msg_filename_underscores_for_space", true); + +/// Show progress when saving/sending a message... + +defaultPref("mailnews.show_send_progress", true); // [DEFAULT] + +/// Allow reporting malicious add-ons/themes to Mozilla + +defaultPref("extensions.abuseReport.enabled", true); + +/// Allow inspecting/debugging local tabs +// Extremely useful for Thunderbird, as it gives us a URL bar... +// Can be accessed via `Tools` -> `Developer Tools` -> `Debug Add-ons` (`about:debugging`), simply choose `Inspect` next to any tab of your choice and profit... + +defaultPref("devtools.aboutdebugging.local-tab-debugging", true); + +defaultPref("mail.dove.status", "012"); + +// 013 DO NOT TOUCH + +lockPref("browser.privatebrowsing.autostart", false); // Breaks uBlock Origin & all other extensions... also unnecessary since we always sanitize data anyways +lockPref("mailnews.oauth.usePrivateBrowser", false); // Breaks uBlock Origin & all other extensions... also unnecessary since we always sanitize data anyways + +defaultPref("mail.dove.status", "013"); + + + + +lockPref("mail.dove.status", "successfully applied :D"); diff --git a/macos/org.mozilla.thunderbird.plist b/macos/org.mozilla.thunderbird.plist new file mode 100644 index 0000000..f385f05 --- /dev/null +++ b/macos/org.mozilla.thunderbird.plist @@ -0,0 +1,7313 @@ + + + + + 3rdparty + + Extensions + + uBlock0@raymondhill.net + + adminSettings + + assetsBootstrapLocation + https://codeberg.org/celenity/Phoenix/raw/commit/ccaf778427b3f8c8b02e99f9bfc565adc7ed0633/uBlock/assets.json + hostnameSwitchesString + no-large-media: behind-the-scene false +no-csp-reports: * true +no-scripting: * true +no-scripting: abrahamjuliot.github.io false +no-scripting: accounts.google.com false +no-scripting: addons.thunderbird.net false +no-scripting: arkenfox.github.io false +no-scripting: browserleaks.com false +no-scripting: deviceinfo.me false +no-scripting: earthlng.github.io false +no-scripting: login.aol.com false +no-scripting: login.live.com false +no-scripting: login.microsoftonline.com false +no-scripting: login.yahoo.net false +no-scripting: okta.com false +no-scripting: permission.site false +no-scripting: www.google.com false + + advancedSettings + + + autoCommentFilterTemplate + {{url}} + + + filterAuthorMode + true + + + updateAssetBypassBrowserCache + true + + + userSettings + + + advancedUserEnabled + true + + + dynamicFilteringEnabled + true + + + firewallPaneMinimized + false + + + + + + BlockAboutAddons + + BlockAboutConfig + + BlockAboutProfiles + + BlockAboutSupport + + Certificates + + ImportEnterpriseRoots + + + Cookies + + Behavior + reject-tracker-and-partition-foreign + BehaviorPrivateBrowsing + reject-tracker-and-partition-foreign + Block + + http://google-analytics.com/ + https://google-analytics.com/ + http://analytics.google.com/ + https://analytics.google.com/ + http://googletagmanager.com/ + https://googletagmanager.com/ + http://googletagservices.com/ + https://googletagservices.com/ + http://doubleclick.net/ + https://doubleclick.net/ + http://doubleclick-cn.net/ + https://doubleclick-cn.net/ + http://doubleclickbygoogle.com/ + https://doubleclickbygoogle.com/ + http://doubleclicksearch.com/ + https://doubleclicksearch.com/ + http://doubleclickusercontent.com/ + https://doubleclickusercontent.com/ + http://googledoubleclick.net/ + https://googledoubleclick.net/ + http://doubleclick.com/ + https://doubleclick.com/ + http://youtube-nocookie.com/ + https://youtube-nocookie.com/ + http://braze.com/ + https://braze.com/ + http://sentry.io/ + https://sentry.io/ + http://omappapi.com/ + https://omappapi.com/ + http://250analytics.com/ + https://250analytics.com/ + http://raw.githubusercontent.com/ + https://raw.githubusercontent.com/ + http://fonts.googleapis.com/ + https://fonts.googleapis.com/ + http://fonts.gstatic.com/ + https://fonts.gstatic.com/ + http://scorecardresearch.com/ + https://scorecardresearch.com/ + http://quantserve.com/ + https://quantserve.com/ + http://ads.google.com/ + https://ads.google.com/ + http://ads.google.cn/ + https://ads.google.cn/ + http://amazon-adsystem.com/ + https://amazon-adsystem.com/ + http://connect.facebook.net/ + https://connect.facebook.com/ + http://2mdn.net/ + https://2mdn.net/ + http://2mdn-cn.net/ + https://2mdn-cn.net/ + http://dartmotif.com/ + https://dartmotif.com/ + http://adsbygoogle.com/ + https://adsbygoogle.com/ + http://admanager.google.com/ + https://admanager.google.com/ + http://admob-creative.googleusercontent.com/ + http://admobapplicationnetwork.com/ + http://adometry.com/ + http://adrollo.com/ + http://mail-ads.google.com/ + https://admobapplicationnetwork.com/ + https://adometry.com/ + https://adrollo.com/ + https://mail-ads.google.com/ + http://adgoogle.net/ + https://adgoogle.net/ + http://adservice.google.ac/ + http://adservice.google.ad/ + http://adservice.google.ae/ + http://adservice.google.af/ + http://adservice.google.ag/ + http://adservice.google.al/ + http://adservice.google.am/ + http://adservice.google.as/ + http://adservice.google.at/ + http://adservice.google.az/ + http://adservice.google.ba/ + http://adservice.google.be/ + http://adservice.google.berlin/ + http://adservice.google.bf/ + http://adservice.google.bg/ + http://adservice.google.bi/ + http://adservice.google.bj/ + http://adservice.google.bo/ + http://adservice.google.bs/ + http://adservice.google.bt/ + http://adservice.google.by/ + http://adservice.google.ca/ + http://adservice.google.cat/ + http://adservice.google.cc/ + http://adservice.google.cd/ + http://adservice.google.cf/ + http://adservice.google.cg/ + http://adservice.google.ch/ + http://adservice.google.ci/ + http://adservice.google.cl/ + http://adservice.google.cm/ + http://adservice.google.co.ao/ + http://adservice.google.co.bw/ + http://adservice.google.co.ck/ + http://adservice.google.co.cr/ + http://adservice.google.co.hu/ + http://adservice.google.co.id/ + http://adservice.google.co.il/ + http://adservice.google.co.im/ + http://adservice.google.co.in/ + http://adservice.google.co.je/ + http://adservice.google.co.jp/ + http://adservice.google.co.ke/ + http://adservice.google.co.kr/ + http://adservice.google.co.ls/ + http://adservice.google.co.ma/ + http://adservice.google.co.mz/ + http://adservice.google.co.nz/ + http://adservice.google.co.th/ + http://adservice.google.co.tz/ + http://adservice.google.co.ug/ + http://adservice.google.co.uk/ + http://adservice.google.co.uz/ + http://adservice.google.co.ve/ + http://adservice.google.co.vi/ + http://adservice.google.co.za/ + http://adservice.google.co.zm/ + http://adservice.google.co.zw/ + http://adservice.google.com/ + http://adservice.google.com.af/ + http://adservice.google.com.ag/ + http://adservice.google.com.ai/ + http://adservice.google.com.ar/ + http://adservice.google.com.au/ + http://adservice.google.com.bd/ + http://adservice.google.com.bh/ + http://adservice.google.com.bn/ + http://adservice.google.com.bo/ + http://adservice.google.com.br/ + http://adservice.google.com.by/ + http://adservice.google.com.bz/ + http://adservice.google.com.co/ + http://adservice.google.com.cu/ + http://adservice.google.com.cy/ + http://adservice.google.com.do/ + http://adservice.google.com.ec/ + http://adservice.google.com.eg/ + http://adservice.google.com.et/ + http://adservice.google.com.fj/ + http://adservice.google.com.ge/ + http://adservice.google.com.gr/ + http://adservice.google.com.gh/ + http://adservice.google.com.gi/ + http://adservice.google.com.gt/ + http://adservice.google.com.hk/ + http://adservice.google.com.iq/ + http://adservice.google.com.jm/ + http://adservice.google.com.jo/ + http://adservice.google.com.kh/ + http://adservice.google.com.kw/ + http://adservice.google.com.lb/ + http://adservice.google.com.ly/ + http://adservice.google.com.mm/ + http://adservice.google.com.mt/ + http://adservice.google.com.mx/ + http://adservice.google.com.my/ + http://adservice.google.com.na/ + http://adservice.google.com.nf/ + http://adservice.google.com.ng/ + http://adservice.google.com.ni/ + http://adservice.google.com.np/ + http://adservice.google.com.nr/ + http://adservice.google.com.om/ + http://adservice.google.com.pa/ + http://adservice.google.com.pe/ + http://adservice.google.com.pg/ + http://adservice.google.com.ph/ + http://adservice.google.com.pk/ + http://adservice.google.com.pl/ + http://adservice.google.com.pr/ + http://adservice.google.com.py/ + http://adservice.google.com.qa/ + http://adservice.google.com.ru/ + http://adservice.google.com.sa/ + http://adservice.google.com.sb/ + http://adservice.google.com.sg/ + http://adservice.google.com.sl/ + http://adservice.google.com.sv/ + http://adservice.google.com.tj/ + http://adservice.google.com.tn/ + http://adservice.google.com.tr/ + http://adservice.google.com.tw/ + http://adservice.google.com.ua/ + http://adservice.google.com.uy/ + http://adservice.google.com.vc/ + http://adservice.google.com.ve/ + http://adservice.google.com.vn/ + http://adservice.google.cv/ + http://adservice.google.cz/ + http://adservice.google.de/ + http://adservice.google.dev/ + http://adservice.google.dj/ + http://adservice.google.dk/ + http://adservice.google.dm/ + http://adservice.google.dz/ + http://adservice.google.ec/ + http://adservice.google.ee/ + http://adservice.google.es/ + http://adservice.google.eu/ + http://adservice.google.fi/ + http://adservice.google.fm/ + http://adservice.google.fr/ + http://adservice.google.ga/ + http://adservice.google.gd/ + http://adservice.google.ge/ + http://adservice.google.gf/ + http://adservice.google.gg/ + http://adservice.google.gl/ + http://adservice.google.gm/ + http://adservice.google.gp/ + http://adservice.google.gr/ + http://adservice.google.gy/ + http://adservice.google.health/ + http://adservice.google.hk/ + http://adservice.google.hn/ + http://adservice.google.hr/ + http://adservice.google.ht/ + http://adservice.google.hu/ + http://adservice.google.ie/ + http://adservice.google.im/ + http://adservice.google.in/ + http://adservice.google.info/ + http://adservice.google.io/ + http://adservice.google.iq/ + http://adservice.google.is/ + http://adservice.google.it/ + http://adservice.google.it.ao/ + http://adservice.google.je/ + http://adservice.google.jo/ + http://adservice.google.jp/ + http://adservice.google.kg/ + http://adservice.google.ki/ + http://adservice.google.kr/ + http://adservice.google.kz/ + http://adservice.google.la/ + http://adservice.google.li/ + http://adservice.google.lk/ + http://adservice.google.lt/ + http://adservice.google.lu/ + http://adservice.google.lv/ + http://adservice.google.ma/ + http://adservice.google.md/ + http://adservice.google.me/ + http://adservice.google.meet/ + http://adservice.google.mg/ + http://adservice.google.mk/ + http://adservice.google.ml/ + http://adservice.google.mn/ + http://adservice.google.ms/ + http://adservice.google.mu/ + http://adservice.google.mv/ + http://adservice.google.mw/ + http://adservice.google.mx/ + http://adservice.google.ne/ + http://adservice.google.ne.jp/ + http://adservice.google.ng/ + http://adservice.google.nl/ + http://adservice.google.no/ + http://adservice.google.nr/ + http://adservice.google.nu/ + http://adservice.google.off.ai/ + http://adservice.google.pf/ + http://adservice.google.ph/ + http://adservice.google.pk/ + http://adservice.google.pl/ + http://adservice.google.pn/ + http://adservice.google.ps/ + http://adservice.google.pt/ + http://adservice.google.qa/ + http://adservice.google.re/ + http://adservice.google.ro/ + http://adservice.google.rs/ + http://adservice.google.ru/ + http://adservice.google.rw/ + http://adservice.google.sc/ + http://adservice.google.se/ + http://adservice.google.sg/ + http://adservice.google.sh/ + http://adservice.google.si/ + http://adservice.google.sk/ + http://adservice.google.sm/ + http://adservice.google.sn/ + http://adservice.google.so/ + http://adservice.google.sr/ + http://adservice.google.st/ + http://adservice.google.td/ + http://adservice.google.tel/ + http://adservice.google.tg/ + http://adservice.google.tk/ + http://adservice.google.tl/ + http://adservice.google.tm/ + http://adservice.google.tn/ + http://adservice.google.to/ + http://adservice.google.tt/ + http://adservice.google.tw/ + http://adservice.google.ua/ + http://adservice.google.us/ + http://adservice.google.uz/ + http://adservice.google.vg/ + http://adservice.google.vn/ + http://adservice.google.vu/ + http://adservice.google.ws/ + https://adservice.google.ac/ + https://adservice.google.ad/ + https://adservice.google.ae/ + https://adservice.google.af/ + https://adservice.google.ag/ + https://adservice.google.al/ + https://adservice.google.am/ + https://adservice.google.as/ + https://adservice.google.at/ + https://adservice.google.az/ + https://adservice.google.ba/ + https://adservice.google.be/ + https://adservice.google.berlin/ + https://adservice.google.bf/ + https://adservice.google.bg/ + https://adservice.google.bi/ + https://adservice.google.bj/ + https://adservice.google.bo/ + https://adservice.google.bs/ + https://adservice.google.bt/ + https://adservice.google.by/ + https://adservice.google.ca/ + https://adservice.google.cat/ + https://adservice.google.cc/ + https://adservice.google.cd/ + https://adservice.google.cf/ + https://adservice.google.cg/ + https://adservice.google.ch/ + https://adservice.google.ci/ + https://adservice.google.cl/ + https://adservice.google.cm/ + https://adservice.google.co.ao/ + https://adservice.google.co.bw/ + https://adservice.google.co.ck/ + https://adservice.google.co.cr/ + https://adservice.google.co.hu/ + https://adservice.google.co.id/ + https://adservice.google.co.il/ + https://adservice.google.co.im/ + https://adservice.google.co.in/ + https://adservice.google.co.je/ + https://adservice.google.co.jp/ + https://adservice.google.co.ke/ + https://adservice.google.co.kr/ + https://adservice.google.co.ls/ + https://adservice.google.co.ma/ + https://adservice.google.co.mz/ + https://adservice.google.co.nz/ + https://adservice.google.co.th/ + https://adservice.google.co.tz/ + https://adservice.google.co.ug/ + https://adservice.google.co.uk/ + https://adservice.google.co.uz/ + https://adservice.google.co.ve/ + https://adservice.google.co.vi/ + https://adservice.google.co.za/ + https://adservice.google.co.zm/ + https://adservice.google.co.zw/ + https://adservice.google.com/ + https://adservice.google.com.af/ + https://adservice.google.com.ag/ + https://adservice.google.com.ai/ + https://adservice.google.com.ar/ + https://adservice.google.com.au/ + https://adservice.google.com.bd/ + https://adservice.google.com.bh/ + https://adservice.google.com.bn/ + https://adservice.google.com.bo/ + https://adservice.google.com.br/ + https://adservice.google.com.by/ + https://adservice.google.com.bz/ + https://adservice.google.com.co/ + https://adservice.google.com.cu/ + https://adservice.google.com.cy/ + https://adservice.google.com.do/ + https://adservice.google.com.ec/ + https://adservice.google.com.eg/ + https://adservice.google.com.et/ + https://adservice.google.com.fj/ + https://adservice.google.com.ge/ + https://adservice.google.com.gr/ + https://adservice.google.com.gh/ + https://adservice.google.com.gi/ + https://adservice.google.com.gt/ + https://adservice.google.com.hk/ + https://adservice.google.com.iq/ + https://adservice.google.com.jm/ + https://adservice.google.com.jo/ + https://adservice.google.com.kh/ + https://adservice.google.com.kw/ + https://adservice.google.com.lb/ + https://adservice.google.com.ly/ + https://adservice.google.com.mm/ + https://adservice.google.com.mt/ + https://adservice.google.com.mx/ + https://adservice.google.com.my/ + https://adservice.google.com.na/ + https://adservice.google.com.nf/ + https://adservice.google.com.ng/ + https://adservice.google.com.ni/ + https://adservice.google.com.np/ + https://adservice.google.com.nr/ + https://adservice.google.com.om/ + https://adservice.google.com.pa/ + https://adservice.google.com.pe/ + https://adservice.google.com.pg/ + https://adservice.google.com.ph/ + https://adservice.google.com.pk/ + https://adservice.google.com.pl/ + https://adservice.google.com.pr/ + https://adservice.google.com.py/ + https://adservice.google.com.qa/ + https://adservice.google.com.ru/ + https://adservice.google.com.sa/ + https://adservice.google.com.sb/ + https://adservice.google.com.sg/ + https://adservice.google.com.sl/ + https://adservice.google.com.sv/ + https://adservice.google.com.tj/ + https://adservice.google.com.tn/ + https://adservice.google.com.tr/ + https://adservice.google.com.tw/ + https://adservice.google.com.ua/ + https://adservice.google.com.uy/ + https://adservice.google.com.vc/ + https://adservice.google.com.ve/ + https://adservice.google.com.vn/ + https://adservice.google.cv/ + https://adservice.google.cz/ + https://adservice.google.de/ + https://adservice.google.dev/ + https://adservice.google.dj/ + https://adservice.google.dk/ + https://adservice.google.dm/ + https://adservice.google.dz/ + https://adservice.google.ec/ + https://adservice.google.ee/ + https://adservice.google.es/ + https://adservice.google.eu/ + https://adservice.google.fi/ + https://adservice.google.fm/ + https://adservice.google.fr/ + https://adservice.google.ga/ + https://adservice.google.gd/ + https://adservice.google.ge/ + https://adservice.google.gf/ + https://adservice.google.gg/ + https://adservice.google.gl/ + https://adservice.google.gm/ + https://adservice.google.gp/ + https://adservice.google.gr/ + https://adservice.google.gy/ + https://adservice.google.health/ + https://adservice.google.hk/ + https://adservice.google.hn/ + https://adservice.google.hr/ + https://adservice.google.ht/ + https://adservice.google.hu/ + https://adservice.google.ie/ + https://adservice.google.im/ + https://adservice.google.in/ + https://adservice.google.info/ + https://adservice.google.io/ + https://adservice.google.iq/ + https://adservice.google.is/ + https://adservice.google.it/ + https://adservice.google.it.ao/ + https://adservice.google.je/ + https://adservice.google.jo/ + https://adservice.google.jp/ + https://adservice.google.kg/ + https://adservice.google.ki/ + https://adservice.google.kr/ + https://adservice.google.kz/ + https://adservice.google.la/ + https://adservice.google.li/ + https://adservice.google.lk/ + https://adservice.google.lt/ + https://adservice.google.lu/ + https://adservice.google.lv/ + https://adservice.google.ma/ + https://adservice.google.md/ + https://adservice.google.me/ + https://adservice.google.meet/ + https://adservice.google.mg/ + https://adservice.google.mk/ + https://adservice.google.ml/ + https://adservice.google.mn/ + https://adservice.google.ms/ + https://adservice.google.mu/ + https://adservice.google.mv/ + https://adservice.google.mw/ + https://adservice.google.mx/ + https://adservice.google.ne/ + https://adservice.google.ne.jp/ + https://adservice.google.ng/ + https://adservice.google.nl/ + https://adservice.google.no/ + https://adservice.google.nr/ + https://adservice.google.nu/ + https://adservice.google.off.ai/ + https://adservice.google.pf/ + https://adservice.google.ph/ + https://adservice.google.pk/ + https://adservice.google.pl/ + https://adservice.google.pn/ + https://adservice.google.ps/ + https://adservice.google.pt/ + https://adservice.google.qa/ + https://adservice.google.re/ + https://adservice.google.ro/ + https://adservice.google.rs/ + https://adservice.google.ru/ + https://adservice.google.rw/ + https://adservice.google.sc/ + https://adservice.google.se/ + https://adservice.google.sg/ + https://adservice.google.sh/ + https://adservice.google.si/ + https://adservice.google.sk/ + https://adservice.google.sm/ + https://adservice.google.sn/ + https://adservice.google.so/ + https://adservice.google.sr/ + https://adservice.google.st/ + https://adservice.google.td/ + https://adservice.google.tel/ + https://adservice.google.tg/ + https://adservice.google.tk/ + https://adservice.google.tl/ + https://adservice.google.tm/ + https://adservice.google.tn/ + https://adservice.google.to/ + https://adservice.google.tt/ + https://adservice.google.tw/ + https://adservice.google.ua/ + https://adservice.google.us/ + https://adservice.google.uz/ + https://adservice.google.vg/ + https://adservice.google.vn/ + https://adservice.google.vu/ + https://adservice.google.ws/ + http://adsgoogle.com/ + https://adsgoogle.com/ + http://displayads-formats.googleusercontent.com/ + https://displayads-formats.googleusercontent.com/ + http://ad-creatives-public.commondatastorage.googleapis.com/ + https://ad-creatives-public.commondatastorage.googleapis.com/ + http://video-ad-creatives-public.commondatastorage.googleapis.com/ + https://video-ad-creatives-public.commondatastorage.googleapis.com/ + http://google-syndicatedsearch.net/ + https://google-syndicatedsearch.net/ + http://google-syndication.com/ + https://google-syndication.com/ + http://googlesyndication.com/ + https://googlesyndication.com/ + http://googleads.com/ + https://googleads.com/ + http://googleads-cn.com/ + https://googleads-cn.com/ + http://googleadservices.com/ + https://googleadservices.com/ + http://secure.gravatar.com/ + https://secure.gravatar.com/ + http://click.discord.com/ + https://click.discord.com/ + http://t.co/ + https://t.co/ + http://bit.ly/ + https://bit.ly/ + http://youtu.be/ + https://youtu.be/ + http://links.mozilla.org/ + https://links.mozilla.org/ + http://ads.youtube.com/ + https://ads.youtube.com/ + http://ads-twitter.com/ + https://ads-twitter.com/ + http://ads-api.x.com/ + https://ads-api.x.com/ + http://ads-api.twitter.com/ + https://ads-api.twitter.com/ + http://location.services.mozilla.com/ + https://location.services.mozilla.com/ + http://classify-client.nonprod.webservices.mozgcp.net + https://classify-client.nonprod.webservices.mozgcp.net + http://classify-client.prod.webservices.mozgcp.net + https://classify-client.prod.webservices.mozgcp.net + http://ads.allizom.org/ + https://ads.allizom.org/ + http://ads.mozilla.org/ + https://ads.mozilla.org + http://ads.nonprod.webservices.mozgcp.net/ + https://ads.nonprod.webservices.mozgcp.net/ + http://ads.prod.webservices.mozgcp.net/ + https://ads.prod.webservices.mozgcp.net/ + http://contile.services.mozilla.com/ + https://contile.services.mozilla.com/ + http://contile-images.services.mozilla.com/ + https://contile-images.services.mozilla.com/ + http://getpocket.com/ + https://getpocket.com/ + http://getpocket.dev/ + https://getpocket.dev/ + http://getpocket.cdn.mozilla.net/ + https://getpocket.cdn.mozilla.net/ + http://getpocket-cdn.prod.mozaws.net/ + https://getpocket-cdn.prod.mozaws.net/ + http://img-getpocket.cdn.mozilla.net/ + https://img-getpocket.cdn.mozilla.net/ + http://pocket.prod.cloudops.mozgcp.net/ + https://pocket.prod.cloudops.mozgcp.net/ + http://pocket-image-cache.com/ + https://pocket-image-cache.com/ + http://spocs.mozilla.net/ + https://spocs.mozilla.net/ + http://snippets.allizom.org/ + https://snippets.allizom.org/ + http://snippets.cdn.mozilla.net/ + https://snippets.cdn.mozilla.net/ + http://snippets.mozilla.com/ + https://snippets.mozilla.com/ + http://snippets-prod.moz.works/ + https://snippets-prod.moz.works/ + http://snippets-prod.frankfurt.moz.works/ + https://snippets-prod.frankfurt.moz.works/ + http://snippets-prod.oregon-b.moz.works/ + https://snippets-prod.oregon-b.moz.works/ + http://snippets-stage.moz.works/ + https://snippets-stage.moz.works/ + http://snippets-stage.oregon-b.moz.works/ + https://snippets-stage.oregon-b.moz.works/ + http://anonymco.com/ + https://anonymco.com/ + http://asan-nightly-frontend-elb-1348905149.us-east-2.elb.amazonaws.com/ + https://asan-nightly-frontend-elb-1348905149.us-east-2.elb.amazonaws.com/ + http://crash-reports.allizom.org/ + https://crash-reports.allizom.org/ + http://crash-reports.mozilla.com/ + https://crash-reports.mozilla.com/ + http://crash-reports-xpsp2.mozilla.com/ + https://crash-reports-xpsp2.mozilla.com/ + http://crash-stacks.mozilla.com/ + https://crash-stacks.mozilla.com/ + http://crash-stats.allizom.org/ + https://crash-stats.allizom.org/ + http://crash-stats.mozilla.com/ + https://crash-stats.mozilla.com/ + http://crash-stats.mozilla.org/ + https://crash-stats.mozilla.org/ + http://socorro.nonprod.webservices.mozgcp.net/ + https://socorro.nonprod.webservices.mozgcp.net/ + http://socorro.prod.webservices.mozgcp.net/ + https://socorro.prod.webservices.mozgcp.net/ + http://socorro-collector.services.mozilla.com/ + https://socorro-collector.services.mozilla.com/ + http://socorro-webapp-allizom.stage.mozaws.net/ + https://socorro-webapp-allizom.stage.mozaws.net/ + http://socorro-webapp.services.mozilla.com/ + https://socorro-webapp.services.mozilla.com/ + http://talkback.mozilla.org/ + https://talkback.mozilla.org/ + http://talkback-public.mozilla.org/ + https://talkback-public.mozilla.org/ + http://talkback-reports.mozilla.org/ + https://talkback-reports.mozilla.org/ + http://normandy.cdn.mozilla.net/ + https://normandy.cdn.mozilla.net/ + http://normandy.nonprod.cloudops.mozgcp.net/ + https://normandy.nonprod.cloudops.mozgcp.net/ + http://normandy.prod.cloudops.mozgcp.net/ + https://normandy.prod.cloudops.mozgcp.net/ + http://normandy-cdn.services.mozilla.com/ + https://normandy-cdn.services.mozilla.com/ + http://download-stats.mozilla.org/ + https://download-stats.mozilla.org/ + http://download-stats.r53-2.services.mozilla.com/ + https://download-stats.r53-2.services.mozilla.com/ + http://dap-09-3.api.divviup.org/ + https://dap-09-3.api.divviup.org/ + http://dap.services.mozilla.com/ + https://dap.services.mozilla.com/ + http://dap.nonprod.webservices.mozgcp.net/ + https://dap.nonprod.webservices.mozgcp.net/ + http://dap.prod.webservices.mozgcp.net/ + https://dap.prod.webservices.mozgcp.net/ + http://data.mozilla.com/ + https://data.mozilla.com/ + http://dataops.mozgcp.net/ + https://dataops.mozgcp.net/ + http://dataservices.mozgcp.net/ + https://dataservices.mozgcp.net/ + http://fuzzing.mozilla.org/ + https://fuzzing.mozilla.org/ + http://incoming-telemetry.thunderbird.net/ + https://incoming-telemetry.thunderbird.net/ + http://pipeline-incoming-prod-elb-149169523.us-west-2.elb.amazonaws.com/ + https://pipeline-incoming-prod-elb-149169523.us-west-2.elb.amazonaws.com/ + http://telemetry.mozilla.org + https://telemetry.mozilla.org + http://telemetry-data.r53-2.services.mozilla.com + https://telemetry-data.r53-2.services.mozilla.com + http://telemetry-incoming.r53-2.services.mozilla.com/ + https://telemetry-incoming.r53-2.services.mozilla.com/ + http://telemetry-prod-1054754349.us-east-1.elb.amazonaws.com/ + https://telemetry-prod-1054754349.us-east-1.elb.amazonaws.com/ + http://sentry.nonprod.cloudops.mozgcp.net/ + https://sentry.nonprod.cloudops.mozgcp.net/ + http://sentry.prod.cloudops.mozgcp.net/ + https://sentry.prod.cloudops.mozgcp.net/ + http://telemetry-coverage.mozilla.org/ + https://telemetry-coverage.mozilla.org/ + http://telemetry-coverage.r53-2.services.mozilla.com/ + https://telemetry-coverage.r53-2.services.mozilla.com/ + http://discovery.addons.allizom.org/ + https://discovery.addons.allizom.org/ + http://discovery.addons.mozilla.org/ + https://discovery.addons.mozilla.org/ + http://discovery.addons-dev.allizom.org/ + https://discovery.addons-dev.allizom.org/ + http://merino.nonprod.cloudops.mozgcp.net/ + https://merino.nonprod.cloudops.mozgcp.net/ + http://merino.prod.cloudops.mozgcp.net/ + https://merino.prod.cloudops.mozgcp.net/ + http://merino.services.mozilla.com/ + https://merino.services.mozilla.com/ + http://autoconnect.stage.mozaws.net/ + https://autoconnect.stage.mozaws.net/ + http://autopush.prod.mozaws.net/ + https://autopush.prod.mozaws.net/ + http://autopush.stage.mozaws.net/ + https://autopush.stage.mozaws.net/ + http://push.services.mozilla.com/ + https://push.services.mozilla.com/ + http://fakespot.com/ + https://fakespot.com/ + http://fakespot.io + https://fakespot.io + http://mozilla-ohttp-fakespot.fastly-edge.com/ + https://mozilla-ohttp-fakespot.fastly-edge.com/ + + + DNSOverHTTPS + + Enabled + + Fallback + + Locked + + ProviderURL + https://dns.quad9.net/dns-query + + DisableTelemetry + + EnterprisePoliciesEnabled + + ExtensionSettings + + * + + allowed_types + + extension + theme + dictionary + locale + + blocked_install_message + I am Iron Man. + install_sources + + https://addons.thunderbird.net/* + https://archive.mozilla.org/pub/labs/* + https://archive.mozilla.org/pub/system-addons/* + https://archive.mozilla.org/pub/thunderbird/* + https://ftp.mozilla.org/pub/labs/* + https://ftp.mozilla.org/pub/system-addons/* + https://ftp.mozilla.org/pub/thunderbird/* + https://gitflic.ru/project/magnolia1234/bpc_uploads/blob/raw?file=bypass_paywalls_clean-latest.xpi&inline=false + https://github.com/anticensority/runet-censorship-bypass/releases + https://github.com/anticensority/runet-censorship-bypass/releases/* + https://github.com/anticensority/runet-censorship-bypass/releases* + https://github.com/darkreader/darkreader/releases + https://github.com/darkreader/darkreader/releases/* + https://github.com/darkreader/darkreader/releases* + https://github.com/FastForwardTeam/FastForward/releases + https://github.com/FastForwardTeam/FastForward/releases/* + https://github.com/FastForwardTeam/FastForward/releases* + https://github.com/fmhy/FMHY-SafeGuard/releases + https://github.com/fmhy/FMHY-SafeGuard/releases/* + https://github.com/fmhy/FMHY-SafeGuard/releases* + https://github.com/gorhill/uBlock/releases + https://github.com/gorhill/uBlock/releases/* + https://github.com/gorhill/uBlock/releases* + https://objects.githubusercontent.com/github-production-release-asset-2e65be/26682105/* + https://objects.githubusercontent.com/github-production-release-asset-2e65be/33263118/* + https://objects.githubusercontent.com/github-production-release-asset-2e65be/404295988/* + https://objects.githubusercontent.com/github-production-release-asset-2e65be/46041549/* + https://objects.githubusercontent.com/github-production-release-asset-2e65be/873923787/* + https://releases.mozilla.org/pub/labs/* + https://releases.mozilla.org/pub/system-addons/* + https://releases.mozilla.org/pub/thunderbird/* + + temporarily_allow_weak_signatures + + updates_disabled + + + 1block@example.com + + blocked_install_message + Dead? Adblock - 1Block, by 1VPN. Highly sketchy, appears to even contain advertising. Avoid & just use uBlock Origin instead. + installation_mode + blocked + + 1und1@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in 1&1 Internet Search Engine in some regions. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/1und1/manifest.json + installation_mode + blocked + + 1vpn@example.com + + blocked_install_message + Free VPN & Adblock - 1VPN, by 1VPN. See 1Block above. Highly sketchy, appears to even contain advertising. Avoid & just use uBlock Origin with a reputable VPN like Proton or Mullvad instead. + installation_mode + blocked + + 87677a2c52b84ad3a151a4a72f5bd3c4@jetpack + + blocked_install_message + Grammarly. Keylogger, also very sketchy... if you insist on this type of invasive spell-checking, just use LanguageTool instead, though even that I would be cautious of. + installation_mode + blocked + + @contain-facebook + + blocked_install_message + Facebook Container, by Mozilla. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Facebook, you can do so at about:preferences#general or through the Multi-Account Containers extension instead. + installation_mode + blocked + + @contain-facebook-newalexandria + + blocked_install_message + Facebook Container - Expanded, by New Alexandria. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Facebook, you can do so at about:preferences#general or through the Multi-Account Containers extension instead. Also appears dead anyways. + installation_mode + blocked + + @contain-google + + blocked_install_message + Google Container, by containers-everywhere. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Google, you can do so at about:preferences#general or through the Multi-Account Containers extension instead. Also appears dead anyways. + installation_mode + blocked + + @contain-google-minus-youtube + + blocked_install_message + Google Container Minus YouTube, by yoasif. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Google, you can do so at about:preferences#general or through the Multi-Account Containers extension instead. + installation_mode + blocked + + @contain-google-minus-youtube-and-searchpages + + blocked_install_message + Google Container Minus YouTube & Search Pages, by Bernd Bestel. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Google, you can do so at about:preferences#general or through the Multi-Account Containers extension instead. + installation_mode + blocked + + @contain-google-with-integrations + + blocked_install_message + Google Container - with Integrations, by New Alexandria. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Google, you can do so at about:preferences#general or through the Multi-Account Containers extension instead. Also appears dead anyways. + installation_mode + blocked + + @contain-twitter + + blocked_install_message + Twitter Container, by Vishwa. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Twitter, you can do so at about:preferences#general or through the Multi-Account Containers extension instead. + installation_mode + blocked + + @twitter_x_container + + blocked_install_message + Twitter/X Container, by Zachary E. Unnecessary since cookies are now isolated by default, and if you still wish to create a container for Twitter, you can do so at about:preferences#general or through the Multi-Account Containers extension instead. + installation_mode + blocked + + @yahoo_wider_mail_extension + + blocked_install_message + Search and Wider Mail, by Yahoo. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + @yset + + blocked_install_message + Yahoo Search Addon, by Yahoo. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + BraveSearchExtension@io.Uvera + + blocked_install_message + Brave search, by Dusan Uveric. Extension is unnecessary, just add Brave Search in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + CanvasBlocker@kkapsner.de + + blocked_install_message + CanvasBlocker, unnecessary with RFP or ETP (Which we enforce). + installation_mode + blocked + + Converter_Suite_fqRObEsLaM@convertersuite.com + + blocked_install_message + Converter Suite. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + Easy_Games_Tab_zKsDuEzLrv@easygamestab.com + + blocked_install_message + Easy Games Tab & Custom Web Search, by EasyGamesTab. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + Easy_Manuals_Finder_and_Custom_Web_Search_KtQPWLAgRu@easymanualsfinder.co + + blocked_install_message + Easy Manuals Finder & Custom Web Search. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + Ezy_Alarm_Clock___Custom_Web_Search_aGDLGGilLT@ezyalarmclock.com + + blocked_install_message + Ezy Alarm Clock & Custom Web Search, by Ezy Alarm Clock & Custom Web Search. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + Ezy_Photo_Tab___Custom_Web_Search_YALalKMirg@ezyphototab.com + + blocked_install_message + Ezy Photo Tab & Custom Web Search, by EzyPhotoTab. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + Ezy_Screenshot___Custom_Web_Search_nKZANPHKLR@ezyscreenshot.com + + blocked_install_message + Ezy Screenshot & Custom Web Search, by Ezy Screenshot. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + Ezy_Speed_Test___Custom_Web_Search_nybAAzaSyK@ezyspeedtest.com + + blocked_install_message + Ezy Speed Test & Custom Web Search, by Ezy Speed Test. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + Flight_Tab_Pro___Custom_Web_Search_yVOErTvhoC@flighttabpro.com + + blocked_install_message + Flight Tab Pro & Custom Web Search, by FlightTabPro. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + FreespokeSearchExtension@com.Freespoke + + blocked_install_message + Freespoke Search. Extension is unnecessary, just add this in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + InternetProtection@360safe.com + + blocked_install_message + 360 Internet Protection, by 360 Total Security. Highly sketchy, also unnecessary with Google Safe Browsing & uBlock Origin. Avoid. + installation_mode + blocked + + Maps_Assist___Custom_Web_Search_VeyzPDMlKh@mapsassist.com + + blocked_install_message + Maps Assist & Custom Web Search. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + Package_Tracking_Tab___Custom_Web_Search_JVVfIFSBVe@packagetrackingtab.com + + blocked_install_message + Package Tracking Tab & Custom Web Search, by PackageTrackingTab. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + Quick_Live_News_spxMukSrlT@quicklivenews.com + + blocked_install_message + Quick Live News & Custom Web Search, by QuickLiveNews. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + Quick_Recipe_Hub___Custom_Web_Search_MTyoGHhulF@quickrecipehub.com + + blocked_install_message + Quick Recipe Hub & Custom Web Search, by Quick Recipe Hub. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + Safeplex_Search_qeKaqkdrwd@safeplexsearch.com + + blocked_install_message + Safeplex Search. Hijacks search engine to Yahoo without user consent/knowledge. (Also just completely unncessary anyways with uBlock Origin & Google Safe Browsing :/) + installation_mode + blocked + + StartpageSearchExtension@roteKlaue + + blocked_install_message + Startpage search, by roteKlaue. Unncessary, just add Startpage in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + Task_Manager_Tab___Custom_Web_Search_nKQMsPVbct@taskmanagertab.com + + blocked_install_message + Task Manager Tab & Custom Web Search, by TaskManagerTab. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + Turbo_Converter___Custom_Web_Search_jkERzVmVos@turboconverter.co + + blocked_install_message + Turbo Converter & Custom Web Search, by Turbo Converter. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + Weather_Authority___Custom_Web_Search_TOLImHKtPk@weatherauthority.co + + blocked_install_message + Weather Authority & Custom Web Search, by Weather Authority. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + YandexSearchExtension@io.librity + + blocked_install_message + Yandex search, by Librity. Please don't use Yandex... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + abb@amazon.com + + blocked_install-message + Amazon Assistant, raises serious privacy concerns. Also appears dead anyways. + installation_mode + blocked + + active_eue_enteprise@bmc.com + + blocked_install_message + BMC TrueSight, Real User Monitoring, probably self-explanatory why blocked... + installation_mode + blocked + + adblockultimate@adblockultimate.net + + blocked_install_message + AdBlocker Ultimate, by AdAvoid. Highly sketchy. https://x.com/gorhill/status/1165747661691064322. Just use uBlock Origin. + installation_mode + blocked + + addon@customsearchtool.com + + blocked_install_message + Custom Search Tool. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + addon@documentconverter.com + + blocked_install_message + Document Converter & Search. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + addon@maproutepro.com + + blocked_install_message + Map Route Pro and Search. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + addon@speedtestmeter.com + + blocked_install_message + Speed Test Meter and Search. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + addon@trendingnews.com + + blocked_install_message + Trending News & Search. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + ads@mozac.org + + blocked_install_message + Mozilla Android Components - Ads Telemetry... + installation_mode + blocked + + allegro-pl@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Allegro Search Engine in some regions. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/allegro-pl/manifest.json + installation_mode + blocked + + amazon@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Amazon Search Engine. Amazon should be avoided due to its horrible privacy practices, but regardless, Amazon still appears to be selectable as a search engine with this removed. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/amazon/manifest.json + installation_mode + blocked + + amazondotcn@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Amazon Search Engine. Amazon should be avoided due to its horrible privacy practices, but regardless, Amazon still appears to be selectable as a search engine with this removed. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/amazondotcn/manifest.json + installation_mode + blocked + + amazondotcom@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Amazon Search Engine. Amazon should be avoided due to its horrible privacy practices, but regardless, Amazon still appears to be selectable as a search engine with this removed. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/amazondotcom/manifest.json + installation_mode + blocked + + aos@avg.com + + blocked_install_message + AVG Online Security, by Avast. Highly sketchy & known for selling data. Also unnecessary with Google Safe Browsing & uBlock Origin, avoid. + installation_mode + blocked + + baidu@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Baidu Search Engine in some regions. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/baidu/manifest.json + installation_mode + blocked + + bing@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Bing Search Engine. Bing should be avoided due to its horrible privacy practices, but regardless, Bing still appears to be selectable as a search engine with this removed. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/bing/manifest.json + installation_mode + blocked + + bravesearch@celenity.dev + + blocked_install_message + Deprecated + installation_mode + blocked + + ceneji@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Ceneje Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/ceneji/manifest.json + installation_mode + blocked + + coccoc@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Cốc Cốc Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/coccoc/manifest.json + installation_mode + blocked + + cookies@mozac.org + + blocked_install_message + Mozilla Android Components - Search Telemetry... + installation_mode + blocked + + daum-kr@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Daum Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/daum-kr/manifest.json + installation_mode + blocked + + ddg@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in DuckDuckGo Search Engine. We replace with our own to set it as the default... + installation_mode + blocked + + dkim_verifier@pl + + install_url + https://addons.thunderbird.net/thunderbird/downloads/latest/dkim-verifier/latest.xpi + installation_mode + normal_installed + private_browsing + + temporarily_allow_weak_signatures + + updates_disabled + + + earthview360_newvers@earthview360.org + + blocked_install_message + Earth View 360° & Custom Web Search. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + easydrivingdirections_newvers@easydrivingdirections.com + + blocked_install_message + Maps & Driving Directions. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + easyprint@easyprintapp.net + + blocked_install_message + Easy Print. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + ebay@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in eBay Search Engine. eBay should be avoided due to its horrible privacy practices, but regardless, eBay still appears to be selectable as a search engine with this removed. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/ebay/manifest.json + installation_mode + blocked + + ebooksearch1@candytech.com + + blocked_install_message + eBook Search, by Candytechltd. Hijacks search engine to genieosearch.com without user consent/knowledge. + installation_mode + blocked + + ep@FreeTestNow + + blocked_install_message + Sponsored Search, by SearchesCentral/Search Smart/FreeTestNow. Adware & hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + eudict@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in EUdict Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/eudict/manifest.json + installation_mode + blocked + + firefox-addon@expressvpn.com + + blocked_install_message + ExpressVPN, by Kape. Highly sketchy. Please just use a trustworthy VPN like Mullvad or ProtonVPN instead. + installation_mode + blocked + + firefox-translations-addon@mozilla.org + + blocked_install_message + Firefox Translations, by Mozilla. Dead. Also unnecessary since the Translations feature is now built in. + installation_mode + blocked + + firefox-webext@zenmate.com + + blocked_install_message + ZenMate Free VPN, by ZenMate (Kape). Highly sketchy, please just use a trustworthy VPN like Mullvad or ProtonVPN instead + installation_mode + blocked + + firefox@ghostery.com + + blocked_install_message + Ghostery Privacy Ad Blocker. Highly sketchy, has previously sold user data, Just use uBlock Origin. + installation_mode + blocked + + firefox@hg.newsguardtech.com + + blocked_install_message + HealthGuard, by NewsGuard. Sketchy & poor privacy policy. + installation_mode + blocked + + firefox@newsguardtech.com + + blocked_install_message + NewsGuard, sketchy & poor privacy policy. + installation_mode + blocked + + firefox@tampermonkey.net + + blocked_install_message + Tampermonkey. Closed source, just use Violentmonkey instead if needed. + installation_mode + blocked + + firefox@vid.io + + blocked_install_message + vidIQ Vision for YouTube, by vidIQ. Sketchy. + installation_mode + blocked + + gmx@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in GMX Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/gmx/manifest.json + installation_mode + blocked + + google@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Google Search Engine. Google should be avoided due to its horrible privacy practices, but regardless, Google still appears to be selectable as a search engine with this removed. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/google/manifest.json + installation_mode + blocked + + gulesider-NO@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Gulesider.no Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/gulesider-NO/manifest.json + installation_mode + blocked + + homeutil@yandex.ru + + blocked_install_message + Yandex - Homepage, by Yandex. Please don't use Yandex... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + https-by-default@robwu.nl + + blocked_install_message + HTTPS by default, by Rob W. Useless with HTTPS-Only Mode (which we enforce). + installation_mode + blocked + + https-everywhere@eff.org + + blocked_install_message + HTTPS Everywhere. Deprecated, also useless with HTTPS-Only Mode (which we enforce) anyways. + installation_mode + blocked + + idsafe@norton.com + + blocked_install_message + Norton Password Manager, by Norton. Must I say more? Would almost rather getting a virus than installing this crap... + installation_mode + blocked + + jid1-16aeif9OQIRKxA@jetpack + + blocked_install_message + Search and New Tab, by Yahoo. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + jid1-93CWPmRbVPjRQA@jetpack + + blocked_install_message + Honey, by PayPal, horrible privacy policy. + installation_mode + blocked + + jid1-BoFifL9Vbdl2zQ@jetpack + + blocked_install_message + Decentraleyes. Very outdated, just use LocalCDN instead if needed. + installation_mode + blocked + + jid1-G80Ec8LLEbK5fQ@jetpack + + blocked_install_message + New Tab, by Yahoo. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + jid1-KKzOGWgsW3Ao4Q@jetpack + + blocked_install_message + I don't care about cookies, by Avast. Highly sketchy & known for selling data. Just use Firefox's built-in cookie banner blocking & uBlock Origin, or `I still don't care about cookies` if really needed instead. + installation_mode + blocked + + jid1-NIfFY2CA8fy1tg@jetpack + + blocked_install_message + AdBlock, by Eyeo. Highly sketchy, avoid & just use uBlock Origin instead. + installation_mode + blocked + + jid1-dwtFBkQjb3SIQp@jetpack + + blocked_install_message + AdBlocker Lite, appears dead. + installation_mode + blocked + + jid1-n8wH2cBfc2QaUj@jetpack + + blocked_install_message + Flash Block (Plus), by AdblockLite. Dead technology, but for some reason this is still being updated? + installation_mode + blocked + + jsr@javascriptrestrictor + + blocked_install_message + JShelter, by Libor Polčák. Unnecessary with RFP or ETP (Which we enforce). + installation_mode + blocked + + kagi-html@celenity.dev + + blocked_install_message + Deprecated + installation_mode + blocked + + kagi@celenity.dev + + blocked_install_message + Deprecated + installation_mode + blocked + + leo_ende_de@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in LEO Eng-Deu Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/leo_ende_de/manifest.json + installation_mode + blocked + + leta-brave@celenity.dev + + blocked_install_message + Deprecated + installation_mode + blocked + + leta-google@celenity.dev + + blocked_install_message + Deprecated + installation_mode + blocked + + longdo@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Longdo Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/longdo/manifest.json + installation_mode + blocked + + mailcom@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in mail.com Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/mailcom/manifest.json + installation_mode + blocked + + mailru@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in @ Mail (mail.ru) Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/mailru/manifest.json + installation_mode + blocked + + mapy-cz@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Mapy.cz Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/mapy-cz/manifest.json + installation_mode + blocked + + mercadolibre@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in MercadoLibre Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/mercadolibre/manifest.json + installation_mode + blocked + + mercadolivre@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in MercadoLivre Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/mercadolivre/manifest.json + installation_mode + blocked + + metager@celenity.dev + + blocked_install_message + Deprecated + installation_mode + blocked + + mipfingerprint@mip.co.za + + blocked_install_message + MIP Fingerprint, by MIP Holdings. Unnecessary with RFP or ETP (Which we enforce). Also appears dead. + installation_mode + blocked + + naver-kr@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in NAVER Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/naver-kr/manifest.json + installation_mode + blocked + + nordpass@nordpass.com + + blocked_install_message + NordPass, by NordVPN. Highly sketchy. Please just use a trustworthy password manager like Bitwarden or Proton Pass instead. + installation_mode + blocked + + nordpassStandalone@nordsecurity.com + + blocked_install_message + NordPass, by NordVPN. Highly sketchy. Please just use a trustworthy password manager like Bitwarden or Proton Pass instead. + installation_mode + blocked + + nordvpnproxy@nordvpn.com + + blocked_install_message + NordVPN, highly sketchy. Please just use a trustworthy VPN like Mullvad or ProtonVPN instead. + installation_mode + blocked + + nortonsafeweb@symantec.com + + blocked_install_message + Norton Safe Web, by Norton. Must I say more? Would almost rather getting a virus than installing this crap... Also unnecessary with Google Safe Browsing & uBlock Origin, avoid. + installtaion_mode + blocked + + odpiralni@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Odpiralni Časi Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/odpiralni/manifest.json + installation_mode + blocked + + pazaruvaj@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Pazaruvaj Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/pazaruvaj/manifest.json + installation_mode + blocked + + priberam@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Priberam Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/priberam/manifest.json + installation_mode + blocked + + prisjakt-sv-SE@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Prisjakt Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/prisjakt-sv-SE/manifest.json + installation_mode + blocked + + qwant-p1-firefox@qwant.com + + blocked_install_message + Qwant for you, by Qwant. Unnecessary, just set in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + qwant-search-firefox@qwant.com + + blocked_install_message + Qwant - Search engine, by Qwant. Unnecessary, just set in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + qwantcomforfirefox@jetpack + + blocked_install_message + Qwant VIPrivacy, by Qwant. Unnecessary, just set in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + rakuten@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Rakuten Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/rakuten/manifest.json + installation_mode + blocked + + readmoo@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Readmoo Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/readmoo/manifest.json + installation_mode + blocked + + salidzinilv@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Salidzini.lv Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/salidzinilv/manifest.json + installation_mode + blocked + + search-fastshare.cz@jirka-justra.cz + + blocked_install_message + search-fastshare.cz, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + search-gearslutz@jirka-justra.cz + + blocked_install_message + search-gearslutz, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + search-kytary.cz@jirka-justra.cz + + blocked_install_message + search-kytary.cz, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + search-odysee.com@jirka-justra.cz + + blocked_install_message + search-odysee.com, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + search-searx@jirka-justra.cz + + blocked_install_message + search-searx, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + search-thomann--cz@jirka-justra.cz + + blocked_install_message + search-thomann--cz, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + search-thomann--intl@jirka-justra.cz + + blocked_install_message + search-thomann--intl, by Jirka Justra. Extension is unnecessary, just add it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + search@ghostery.com + + blocked_install_message + Ghostery Private Search for Firefox, by Ghostery. Unnecessary, just set in either about:preferences#search or from the Omnibox. I would avoid Ghostery Search anyways due to the company's sketchy practices & past of selling user data. + installation_mode + blocked + + secureline-vpn@avast.com + + blocked_install_message + Avast SecureLine VPN, by Avast. Highly sketchy & known for selling data. + installation_mode + blocked + + seznam-cz@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Seznam Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/seznam-cz/manifest.json + installation_mode + blocked + + sp@SearchSmart + + blocked_install_message + Search Smart, by SearchesCentral/Search Smart/FreeTestNow. Adware & hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + sp@SearchesCentral + + blocked_install_message + Sponsored Search, by SearchesCentral/Search Smart/FreeTestNow. Adware & hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + sp@avast.com + + blocked_install_message + Avast SafePrice, by Avast. Highly sketchy & known for selling data. + installation_mode + blocked + + support@lastpass.com + + blocked_install_message + LastPass Password Manager, by LastPass. Sketchy & has had serious breaches. Please just use a trustworthy password manager like Bitwarden or Proton Pass instead. + installation_mode + blocked + + support@netzilo.com + + blocked_install_message + Netzilo Secure Browser, by Netzilo Inc. Remote Monitoring. + installation_mode + blocked + + swisscows@swisscows.ch + + blocked_install_message + Swisscows, by Swisscows AG. Extension is unnecessary, just set Swisscows in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + tyda-sv-SE@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Tyda.se Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/tyda-sv-SE/manifest.json + installation_mode + blocked + + uBlock0@raymondhill.net + + install_url + https://github.com/gorhill/uBlock/releases/download/1.62.0/uBlock0_1.62.0.thunderbird.xpi + installation_mode + normal_installed + private_browsing + + temporarily_allow_weak_signatures + + updates_disabled + + + vatera@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Vatera.hu Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/vatera/manifest.json + installation_mode + blocked + + viewmanuals_newvers@viewmanuals.com + + blocked_install_message + View Manuals & Custom Web Search, by View Manuals. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + viewpdf_newvers@viewpdf.org + + blocked_install_message + View PDF. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + viewrecipes_aill@viewrecipes.net + + blocked_install_message + View Recipes & Custom Web Search, by View Recipes. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + weather@yandex.ru + + blocked_install_message + Yandex Elements Weather, by Yandex. Extremely sketchy, requires highly invasive permissions. Yandex generally is sketchy and should be avoided. Just use Firefox's new weather feature on about:home, or an extension like Tabliss. + installation_mode + blocked + + webde@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in WEB.DE Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/webde/manifest.json + installation_mode + blocked + + webrootsecure@webroot.com + + blocked_install_message + Web Threat Shield, by Webroot. Seen this force install itself on various PCs. Also unnecessary with Google Safe Browsing & uBlock Origin, avoid. + installation_mode + blocked + + wolnelektury-pl@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Wolne Lektury Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/wolnelektury-pl/manifest.json + installation_mode + blocked + + wrc@avast.com + + blocked_install_message + Avast Online Security, by Avast. Highly sketchy & known for selling data. Also unnecessary with Google Safe Browsing & uBlock Origin, avoid. + installation_mode + blocked + + yahoo-jp-auctions@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Yahoo! Auctions Search Engine. Should be avoided due to its horrible privacy practices, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/yahoo-jp-auctions/manifest.json + installation_mode + blocked + + yahoo-jp@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Yahoo! Search Engine. Should be avoided due to its horrible privacy practices, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/yahoo-jp/manifest.json + installation_mode + blocked + + yandex@search.mozilla.org + + blocked_install_message + Mozilla's extension for the built-in Yandex Search Engine. Should be avoided, but regardless, can still be added manually. https://searchfox.org/mozilla-release/source/browser/components/search/extensions/yandex/manifest.json + installation_mode + blocked + + yasearch@yandex.ru + + blocked_install_message + Yandex.Bar, by Yandex. Please don't use Yandex... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + {0220de78-d398-47cb-8323-ebab3a845d01} + + blocked_install_message + Yahoo New Tab, by heubergen. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + {07bccf58-b5f1-425c-b7ad-2301e1a42704} + + blocked_install_message + Fingerprint shelter, by Ol. Unnecessary with RFP or ETP (Which we enforce). Also appears dead. + installation_mode + blocked + + {0dce8429-bdf7-4610-b3cf-72d0f86278d5} + + blocked_install_message + Robux Changer, by indxd. Just use Inspect Element. + installation_mode + blocked + + {17c75373-e1fc-43a5-a05b-7f17e306359e} + + blocked_install_message + Stay secure with CyberGhost VPN Free Proxy, by Running __Elephants. CyberGhost is Highly sketchy, by Kape. This extension also appears fake & unmaintained. Please just use a trustworthy VPN like Mullvad or ProtonVPN instead. + installation_mode + blocked + + {1e924475-d910-44ab-bed8-af34439d2a8a} + + blocked_install_message + Just Search Qwant, by Naresh. Extension is unnecessary, just add Qwant in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + {20fc2e06-e3e4-4b2b-812b-ab431220cada} + + blocked_install_message + Startpage. Unncessary, just set in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + {248e6a49-f636-4c81-9899-a456eb6291a8} + + blocked_install_message + Ground News Bias Checker, by Ground News. Very sketchy, poor privacy policy. Avoid. + installation_mode + blocked + + {25f17283-8325-42fb-812e-193c8de90b04} + + blocked_install_message + Sport Search, by GetTheResult. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + {2a168bd0-55d2-466f-9c68-077c416943be} + + blocked_install_message + YouTube Search Engine, by A. Taha Baki. Extension is unnecessary, just add YouTube in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + {2cf5dbed-78fe-4bd5-9524-38fdf837be98} + + blocked_install_message + WebGL Fingerprint Defender, by ilGur. Unnecessary with RFP or ETP (Which we enforce). + installation_mode + blocked + + {2d158f19-1146-4bfe-9085-cc15f947bb35} + + blocked_install_message + Yahoo! Search, by balduran98. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + {2e0fa8dd-c43c-438c-b77b-95ddc3d893ec} + + blocked_install_message + Add Brave Search, by maaa. Extension is unnecessary, just add Brave Search in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + {2ed00a98-3452-4535-a99d-0bb13056d09f} + + blocked_install_message + Browser Plugs Spoof FP Random, by BrowserPlugs. Unnecessary with RFP or ETP (Which we enforce). + installation_mode + blocked + + {2f182d41-fd03-4a6d-938d-081419586c37} + + blocked_install_message + Google Analytics Opt-out, by emano waldeck. Unnecessary with content blocking. + installation_mode + blocked + + {3968ec87-3c9f-45cd-8d9e-7f6d1f3a5093} + + blocked_install_message + Glider Proctoring, by GLIDER.ai. Used for remote monitoring/test 'Proctoring' + installation_mode + blocked + + {3e4d2037-d300-4e95-859d-3cba866f46d3} + + blocked_install_message + Private Internet Access, by Kape. Highly sketchy. Please just use a trustworthy VPN like Mullvad or ProtonVPN instead. + installation_mode + blocked + + {43d20840-2895-4866-9d79-4f6f2ea537f7} + + blocked_install_message + Music Search, by GetTheResult. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + {441ae0e7-c955-4b0e-8209-99462af458db} + + blocked_install_message + Presearch.com Search Extension. Extension is unnecessary, just add this in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + {44df5123-f715-9146-bfaa-c6e8d4461d44} + + blocked_install_message + Fakespot, by Mozilla. Poor privacy policy. + installation_mode + blocked + + {46cc18f3-9054-4edd-9441-102a1021b5d0} + + blocked_install_message + Fingerprint Spoof, by ns. Unnecessary with RFP or ETP (Which we enforce). Also appears dead. + installation_mode + blocked + + {4d5b7a5e-5232-9e45-97f4-f8e1ca2626e5} + + blocked_install_message + Eno® from Capital One®, by Capital One. Very sketchy, avoid. + installation_mode + blocked + + {50f5675e-2d43-4894-a3b6-ad933f6a31a0} + + blocked_install_message + SignalHire. Data Broker. + installation_mode + blocked + + {585280b0-ee78-428a-92c5-3fb3c0b85460} + + blocked_install_message + CyberGhost VPN Free Proxy, by Kape. Highly sketchy. Please just use a trustworthy VPN like Mullvad or ProtonVPN instead. + installation_mode + blocked + + {635abd67-4fe9-1b23-4f01-e679fa7484c1} + + blocked_install_message + Yahoo Toolbar and New Tab, by Yahoo. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + {6476684c-e1dc-4505-8bb6-5f0f9663f78e} + + blocked_install_message + BP Block Font Fingerprint, by BrowserPlugs. Unnecessary with RFP or ETP (Which we enforce). + installation_mode + blocked + + {67ed3e87-6d34-4e72-9482-45876b90cf8d} + + blocked_install_message + GLIDER.ai Proctoring, by GLIDER.ai. Used for remote monitoring/test 'Proctoring' + installation_mode + blocked + + {6cbc4940-eb87-4dba-9654-1002fb91e9e0} + + blocked_install_message + Google Tag Manager Blocker, by heubergen. Unnecessary with uBlock Origin or any content blocking extension. + installation_mode + blocked + + {6ff498ff-a3b6-4891-a614-12a825d4efcf} + + blocked_install_message + Trace, by AbsoluteDouble. Unnecessary with RFP or ETP (Which we enforce). Also appears dead. + intallation_mode + blocked + + {710a25a7-051f-4059-8952-abbaa9aa6121} + + blocked_install_message + FakeBux for Roblox, by LuckyDev. Just use Inspect Element. + installation_mode + blocked + + {7313aced-ab7c-40fb-bf3a-115e91ba6c2a} + + blocked_install_message + Maps Driving Directions, by MyDirections. Hijacks search engine & new tab page, accesses browser history, very sketchy... + installation_mode + blocked + + {732216ec-0dab-43bb-ac85-4b5e1977599d} + + blocked_install_message + Surfshark VPN Extension, by NordVPN. Highly sketchy. Please just use a trustworthy VPN like Mullvad or ProtonVPN instead. + installation_mode + blocked + + {74fc443d-ab0b-42b2-95d0-890f2d8092cb} + + blocked_install_message + HTTP to HTTPS, by Balvin. Useless with HTTPS-Only Mode (which we enforce). + installation_mode + blocked + + {76f42345-d120-4c8e-bdd4-63cf95b780fb} + + blocked_install_message + CyberGhost Cookie Cleaner, by Kape. Highly sketchy... and also completely useless with our tweaks. Avoid. + installation_mode + blocked + + {7e39f3c8-2ef5-46ea-80d0-f8b8f72541c5} + + blocked_install_message + MSN Homepage, New Tab and Bing Search Engine, by Microsoft. Please don't use Bing... but if you insist, extension is unnecessary, just set it in about:preferences#search. + installation_mode + blocked + + {87edebac-93fe-4780-8945-598a961b793f} + + blocked_install_message + Fingerprint Shield, by Francesco De Stefano. Unnecessary with RFP or ETP (Which we enforce). + installation_mode + blocked + + {8A0D66E3-1C08-49A6-8F6C-7E024029D199} + + blocked_install_message + Norton Family, by Norton. Must I say more? Would almost rather getting a virus than installing this crap... + installation_mode + blocked + + {8d8ca802-6b23-43ed-9445-e05d48579542} + + blocked_install_message + Microsoft Bing Search Engine, by Microsoft. Please don't use Bing... but if you insist, extension is unnecessary, just set it in about:preferences#search. + installation_mode + blocked + + {9363e9cd-be75-42fb-b787-3b0103e2acc7} + + blocked_install_message + Google Analytics Opt-Out, by Vishwas. Unnecessary with content blocking. + installation_mode + blocked + + {94cadb67-daa0-4761-b6b5-171e5d61da2e} + + blocked_install_message + SingleFile Auto-Save, by gildas. Very concerning from a privacy perspective. + installation_mode + blocked + + {96ef5869-e3ba-4d21-b86e-21b163096400} + + blocked_install_message + Font Fingerprint Defender, by ilGur. Unnecessary with RFP or ETP (Which we enforce). + installation_mode + blocked + + {9763fbae-6f90-483b-a8ca-aeb9ccfdacac} + + blocked_install_message + IRobux, by 'Roblox Corporation'. Impersonation scam extension, no idea how this hasn't been removed from the AMO or got signed in the first place. + installation_mode + blocked + + {98dc1b2a-d86b-4dcd-b73c-b0abde809db4} + + blocked_install_message + OneSearch, by Yahoo. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + {9b43dad5-885b-4f0d-882f-e945b7e4b96f} + + blocked_install_message + MSN Homepage and Bing Search Engine, by Microsoft. Please don't use Bing... but if you insist, extension is unnecessary, just set it in about:preferences#search. + installation_mode + blocked + + {a07b7886-3015-4959-9a88-4273860edd6d} + + blocked_install_message + Microsoft Bing Homepage and Search Engine, by Microsoft. Please don't use Bing... but if you insist, extension is unnecessary, just set it in about:preferences#search. + installation_mode + blocked + + {aa9eef0b-ca4e-4e24-b42e-e1b006c7160a} + + blocked_install_message + Safe Search Powered by Yahoo, by Safely. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + {abbf120b-a853-4fbd-a139-7e7dcc2d3e86} + + blocked_install_message + Scam WebRoot Activation theme + installation_mode + blocked + + {af37054b-3ace-46a2-ac59-709e4412bec6} + + blocked_install_message + Add custom search engine, by Tom Schuster. Unnecessary, just add your search engine of choice in either about:preferences#search or from the Omnibox on the search engine's webpage + installation_mode + blocked + + {b2531c6a-ce38-4b46-961e-62a6e89a1b17} + + blocked_install_message + No Fingerprint, by Sam0230. Unnecessary with RFP or ETP (Which we enforce). Also appears dead. + installation_mode + blocked + + {b3e677f4-1150-4387-8629-da738260a48e} + + blocked_install_message + Smart HTTPS, by ilGur. Appears dead, and useless with HTTPS-Only Mode (which we enforce) anyways. + installation_mode + blocked + + {b69c9b46-2236-45c2-9abd-143972558677} + + blocked_install_message + Yahoo jp, by Viktor. Please don't use Yahoo... but if you insist, extension is unnecessary, just set it in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + {b9ddfa6d-fb38-47a6-8cf2-8d1044540a1f} + + blocked_install_message + Scam WebRoot Activation theme + installation_mode + blocked + + {c909a72e-e04b-4528-b14a-f721df46d776} + + blocked_install_message + Adblock_S, appears dead. + installation_mode + blocked + + {cfa868c0-6239-47df-bc81-54e13151ec2e} + + blocked_install_message + Microsoft Bing Homepage, by Microsoft. Please don't use Bing... but if you insist, extension is unnecessary, just set it in about:preferences#search. + installation_mode + blocked + + {d04b0b40-3dab-4f0b-97a6-04ec3eddbfb0} + + blocked_install_message + Ecosia, by Ecosia Dev Team. Extension is unnecessary, just add Ecosia in either about:preferences#search or from the Omnibox. + installation_mode + blocked + + {d0bfdcce-52c7-4b32-bb45-948f62db8d3f} + + blocked_install_message + Flash Video Player for Facebook™, by Baris Derin. Dead technology, but for some reason this is still being updated? Very suspicious. + installation_mode + blocked + + {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d} + + blocked_install_message + Adblock Plus, by Eyeo. Highly sketchy, avoid & just use uBlock Origin instead. + installation_mode + blocked + + {e969f389-ecf2-4ba5-b6b3-95157461366c} + + blocked_install_message + Blend In and Spoof Everything, by BrowserPlugs. Unnecessary with RFP or ETP (Which we enforce). + installation_mode + blocked + + {e98b4b87-bc39-439f-a175-b15fbe4a06c0} + + blocked_install_message + Canvas Blocker - Fingerprint Protect, by Joue. Unnecessary with RFP or ETP (Which we enforce). Also appears dead. + installation_mode + blocked + + {eefb374b-ea77-47a1-bb1b-bd5758569056} + + blocked_install_message + Scam WebRoot Activation theme + installation_mode + blocked + + {f3bd3dd2-2888-44c5-91a2-2caeb33fb898} + + blocked_install_message + YouTube Flash Video Player, by Baris Derin. Dead technology, but for some reason this is still being updated? Very suspicious. + installation_mode + blocked + + {f637a841-f7e3-4055-a189-6951a9d4fc4f} + + blocked_install_message + Scam WebRoot Activation theme + installation_mode + blocked + + {ff5dfca6-4e75-4882-a145-b58a4afc35a7} + + blocked_install_message + Movie Search, by GetTheResult. Hijacks search engine to Yahoo without user consent/knowledge. + installation_mode + blocked + + {ff6bdf28-4fb3-42a0-8e36-11b4125a6ce4} + + blocked_install_message + Logify - Parental Control, by Logify. Remote Monitoring. + installation_mode + blocked + + + OfferToSaveLoginsDefault + + Preferences + + accessibility.force_disabled + + Status + default + Type + number + Value + 1 + + app.update.badgeWaitTime + + Status + default + Type + number + Value + 0 + + app.update.notifyDuringDownload + + Status + default + Type + boolean + Value + + + app.update.promptWaitTime + + Status + default + Type + number + Value + 3600 + + browser.EULA.override + + Status + default + Type + boolean + Value + + + browser.cache.disk.enable + + Status + default + Type + boolean + Value + + + browser.cache.disk_cache_ssl + + Status + default + Type + boolean + Value + + + browser.cache.jsbc_compression_level + + Status + default + Type + number + Value + 3 + + browser.compactmode.show + + Status + default + Type + boolean + Value + + + browser.contentanalysis.default_result + + Status + locked + Type + number + Value + 0 + + browser.contentanalysis.enabled + + Status + locked + Type + boolean + Value + + + browser.contentanalysis.interception_point.clipboard.enabled + + Status + locked + Type + boolean + Value + + + browser.contentanalysis.interception_point.drag_and_drop.enabled + + Status + locked + Type + boolean + Value + + + browser.contentanalysis.interception_point.file_upload.enabled + + Status + locked + Type + boolean + Value + + + browser.contentanalysis.interception_point.print.enabled + + Status + locked + Type + boolean + Value + + + browser.contentanalysis.show_blocked_result + + Status + locked + Type + boolean + Value + + + browser.contentblocking.category + + Status + locked + Type + string + Value + strict + + browser.contentblocking.database.enabled + + Status + default + Type + boolean + Value + + + browser.crashReports.unsubmittedCheck.autoSubmit2 + + Status + locked + Type + boolean + Value + + + browser.crashReports.unsubmittedCheck.enabled + + Status + locked + Type + boolean + Value + + + browser.display.use_system_colors + + Status + default + Type + boolean + Value + + + browser.download.alwaysOpenPanel + + Status + default + Type + boolean + Value + + + browser.download.always_ask_before_handling_new_types + + Status + default + Type + boolean + Value + + + browser.download.clearHistoryOnDelete + + Status + default + Type + number + Value + 2 + + browser.download.enable_spam_prevention + + Status + default + Type + boolean + Value + + + browser.download.loglevel + + Status + default + Type + string + Value + Error + + browser.download.manager.addToRecentDocs + + Status + default + Type + boolean + Value + + + browser.download.manager.behavior + + Status + default + Type + number + Value + 1 + + browser.download.manager.focusWhenStarting + + Status + default + Type + boolean + Value + + + browser.download.manager.showAlertOnComplete + + Status + default + Type + boolean + Value + + + browser.download.manager.showWhenStarting + + Status + default + Type + boolean + Value + + + browser.download.open_pdf_attachments_inline + + Status + default + Type + boolean + Value + + + browser.download.start_downloads_in_tmp_dir + + Status + default + Type + boolean + Value + + + browser.download.useDownloadDir + + Status + default + Type + boolean + Value + + + browser.eme.ui.enabled + + Status + default + Type + boolean + Value + + + browser.formfill.enable + + Status + default + Type + boolean + Value + + + browser.gnome-search-provider.enabled + + Status + default + Type + boolean + Value + + + browser.helperApps.deleteTempFileOnExit + + Status + default + Type + boolean + Value + + + browser.link.open_newwindow + + Status + default + Type + number + Value + 3 + + browser.link.open_newwindow.restriction + + Status + default + Type + number + Value + 0 + + browser.ml.enable + + Status + default + Type + boolean + Value + + + browser.opaqueResponseBlocking + + Status + default + Type + boolean + Value + + + browser.opaqueResponseBlocking.javascriptValidator + + Status + default + Type + boolean + Value + + + browser.phoenix.core.policies.status + + Status + locked + Type + string + Value + successfully applied :D + + browser.places.interactions.enabled + + Status + locked + Type + boolean + Value + + + browser.places.speculativeConnect.enabled + + Status + default + Type + boolean + Value + + + browser.policies.loglevel + + Status + default + Type + string + Value + error + + browser.privatebrowsing.autostart + + Status + locked + Type + boolean + Value + + + browser.privatebrowsing.forceMediaMemoryCache + + Status + default + Type + boolean + Value + + + browser.region.network.scan + + Status + default + Type + boolean + Value + + + browser.region.network.url + + Status + default + Type + string + Value + + + browser.region.update.enabled + + Status + default + Type + boolean + Value + + + browser.rights.3.shown + + Status + locked + Type + boolean + Value + + + browser.rights.override + + Status + default + Type + boolean + Value + + + browser.safebrowsing.blockedURIs.enabled + + Status + default + Type + boolean + Value + + + browser.safebrowsing.downloads.enabled + + Status + default + Type + boolean + Value + + + browser.safebrowsing.downloads.remote.enabled + + Status + default + Type + boolean + Value + + + browser.safebrowsing.downloads.remote.url + + Status + default + Type + string + Value + https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY% + + browser.safebrowsing.features.blockedURIs.update + + Status + default + Type + boolean + Value + + + browser.safebrowsing.features.cryptomining.annotate.update + + Status + default + Type + boolean + Value + + + browser.safebrowsing.features.cryptomining.update + + Status + default + Type + boolean + Value + + + browser.safebrowsing.features.downloads.update + + Status + default + Type + boolean + Value + + + browser.safebrowsing.features.emailtracking.datacollection.update + + Status + locked + Type + boolean + Value + + + browser.safebrowsing.features.emailtracking.update + + Status + default + Type + boolean + Value + + + browser.safebrowsing.features.fingerprinting.annotate.update + + Status + default + Type + boolean + Value + + + browser.safebrowsing.features.fingerprinting.update + + Status + default + Type + boolean + Value + + + browser.safebrowsing.features.malware.update + + Status + default + Type + boolean + Value + + + browser.safebrowsing.features.phishing.update + + Status + default + Type + boolean + Value + + + browser.safebrowsing.features.socialtracking.annotate.update + + Status + default + Type + boolean + Value + + + browser.safebrowsing.features.socialtracking.update + + Status + default + Type + boolean + Value + + + browser.safebrowsing.features.trackingAnnotation.update + + Status + default + Type + boolean + Value + + + browser.safebrowsing.features.trackingProtection.update + + Status + default + Type + boolean + Value + + + browser.safebrowsing.malware.enabled + + Status + default + Type + boolean + Value + + + browser.safebrowsing.phishing.enabled + + Status + default + Type + boolean + Value + + + browser.safebrowsing.provider.google.advisoryName + + Status + default + Type + string + Value + Google Safe Browsing (Legacy) + + browser.safebrowsing.provider.google.dataSharing.enabled + + Status + locked + Type + boolean + Value + + + browser.safebrowsing.provider.google.gethashURL + + Status + default + Type + string + Value + + + browser.safebrowsing.provider.google.reportMalwareMistakeURL + + Status + default + Type + string + Value + https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url= + + browser.safebrowsing.provider.google.reportPhishMistakeURL + + Status + default + Type + string + Value + https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url= + + browser.safebrowsing.provider.google.reportURL + + Status + default + Type + string + Value + https://transparencyreport.google.com/safe-browsing/search?url= + + browser.safebrowsing.provider.google.updateURL + + Status + default + Type + string + Value + + + browser.safebrowsing.provider.google4.dataSharing.enabled + + Status + locked + Type + boolean + Value + + + browser.safebrowsing.provider.google4.dataSharingURL + + Status + locked + Type + string + Value + + + browser.safebrowsing.provider.google4.gethashURL + + Status + default + Type + string + Value + https://safebrowsing.ironfoxoss.org/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST + + browser.safebrowsing.provider.google4.reportMalwareMistakeURL + + Status + default + Type + string + Value + https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url= + + browser.safebrowsing.provider.google4.reportPhishMistakeURL + + Status + default + Type + string + Value + https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url= + + browser.safebrowsing.provider.google4.reportURL + + Status + default + Type + string + Value + https://transparencyreport.google.com/safe-browsing/search?url= + + browser.safebrowsing.provider.google4.updateURL + + Status + default + Type + string + Value + https://safebrowsing.ironfoxoss.org/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST + + browser.safebrowsing.provider.mozilla.updateURL + + Status + default + Type + string + Value + moz-sbrs:://antitracking + + browser.safebrowsing.reportPhishURL + + Status + default + Type + string + Value + https://safebrowsing.google.com/safebrowsing/report_phish/?tpl=mozilla&url= + + browser.safebrowsing.update.enabled + + Status + default + Type + boolean + Value + + + browser.search.separatePrivateDefault + + Status + default + Type + boolean + Value + + + browser.search.separatePrivateDefault.ui.enabled + + Status + default + Type + boolean + Value + + + browser.search.suggest.enabled + + Status + default + Type + boolean + Value + + + browser.search.suggest.enabled.private + + Status + default + Type + boolean + Value + + + browser.search.update + + Status + default + Type + boolean + Value + + + browser.send_pings + + Status + default + Type + boolean + Value + + + browser.send_pings.max_per_link + + Status + default + Type + number + Value + 0 + + browser.send_pings.require_same_host + + Status + default + Type + boolean + Value + + + browser.sessionhistory.max_total_viewers + + Status + default + Type + number + Value + 7 + + browser.sessionstore.disable_platform_collection + + Status + default + Type + boolean + Value + + + browser.sessionstore.interval + + Status + default + Type + number + Value + 60000 + + browser.sessionstore.privacy_level + + Status + default + Type + number + Value + 2 + + browser.tabs.remote.coep.credentialles + + Status + default + Type + boolean + Value + + + browser.tabs.remote.enforceRemoteTypeRestrictions + + Status + default + Type + boolean + Value + + + browser.tabs.remote.separateFileUriProcess + + Status + default + Type + boolean + Value + + + browser.tabs.remote.separatePrivilegedMozillaWebContentProcess + + Status + locked + Type + boolean + Value + + + browser.tabs.remote.separatedMozillaDomains + + Status + locked + Type + string + Value + + + browser.tabs.searchclipboardfor.middleclick + + Status + default + Type + boolean + Value + + + browser.translations.alwaysTranslateLanguages + + Status + default + Type + string + Value + bg,ca,cs,da,de,el,en,es,et,fi,fr,hr,hu,id,it,ja,ko,lv,lt,nl,pl,pt,ro,ru,sk,sl,sr,sv,tr,uk,vi,zh-Hans + + browser.translations.automaticallyPopup + + Status + default + Type + boolean + Value + + + browser.translations.enable + + Status + default + Type + boolean + Value + + + browser.translations.select.enable + + Status + default + Type + boolean + Value + + + browser.xul.error_pages.expert_bad_cert + + Status + default + Type + boolean + Value + + + browser.xul.error_pages.show_safe_browsing_details_on_load + + Status + default + Type + boolean + Value + + + calendar.extract.service.enabled + + Status + default + Type + boolean + Value + + + chat.prpls.prpl-facebook.disable + + Status + default + Type + boolean + Value + + + chat.prpls.prpl-gtalk.disable + + Status + default + Type + boolean + Value + + + chat.prpls.prpl-twitter.disable + + Status + default + Type + boolean + Value + + + chat.prpls.prpl-yahoo.disable + + Status + default + Type + boolean + Value + + + datareporting.policy.dataSubmissionEnabled + + Status + locked + Type + boolean + Value + + + datareporting.policy.dataSubmissionPolicyAccepted + + Status + locked + Type + boolean + Value + + + datareporting.policy.dataSubmissionPolicyBypassNotification + + Status + locked + Type + boolean + Value + + + datareporting.policy.firstRunURL + + Status + locked + Type + string + Value + + + dom.block_download_insecure + + Status + default + Type + boolean + Value + + + dom.block_external_protocol_in_iframes + + Status + default + Type + boolean + Value + + + dom.block_external_protocol_navigation_from_sandbox + + Status + default + Type + boolean + Value + + + dom.disable_open_during_load + + Status + default + Type + boolean + Value + + + dom.disable_window_flip + + Status + default + Type + boolean + Value + + + dom.disable_window_move_resize + + Status + default + Type + boolean + Value + + + dom.disable_window_status_change + + Status + default + Type + boolean + Value + + + dom.ipc.processCount.privilegedmozilla + + Status + locked + Type + number + Value + 0 + + dom.ipc.processCount.webIsolated + + Status + default + Type + number + Value + 1 + + dom.origin-trials.coep-credentialless.state + + Status + default + Type + number + Value + 1 + + dom.origin-trials.enabled + + Status + locked + Type + boolean + Value + + + dom.origin-trials.private-attribution.state + + Status + locked + Type + number + Value + 2 + + dom.popup_allowed_events + + Status + default + Type + string + Value + click dblclick + + dom.postMessage.sharedArrayBuffer.bypassCOOP_COEP.insecure.enabled + + Status + default + Type + boolean + Value + + + dom.postMessage.sharedArrayBuffer.withCOOP_COEP + + Status + default + Type + boolean + Value + + + dom.prefetch_dns_for_anchor_http_document + + Status + default + Type + boolean + Value + + + dom.prefetch_dns_for_anchor_https_document + + Status + default + Type + boolean + Value + + + dom.private-attribution.submission.enabled + + Status + locked + Type + boolean + Value + + + dom.reporting.crash.enabled + + Status + default + Type + boolean + Value + + + dom.reporting.enabled + + Status + default + Type + boolean + Value + + + dom.reporting.featurePolicy.enabled + + Status + default + Type + boolean + Value + + + dom.reporting.header.enabled + + Status + default + Type + boolean + Value + + + dom.security.https_first + + Status + default + Type + boolean + Value + + + dom.security.https_first_for_custom_ports + + Status + default + Type + boolean + Value + + + dom.security.https_first_pbm + + Status + default + Type + boolean + Value + + + dom.security.https_first_schemeless + + Status + default + Type + boolean + Value + + + dom.security.https_only_mode + + Status + locked + Type + boolean + Value + + + dom.security.https_only_mode.upgrade_local + + Status + default + Type + boolean + Value + + + dom.security.https_only_mode_error_page_user_suggestions + + Status + default + Type + boolean + Value + + + dom.security.https_only_mode_pbm + + Status + locked + Type + boolean + Value + + + dom.security.https_only_mode_send_http_background_request + + Status + default + Type + boolean + Value + + + dom.security.skip_about_page_has_csp_assert + + Status + default + Type + boolean + Value + + + dom.security.trusted_types.enabled + + Status + default + Type + boolean + Value + + + dom.security.unexpected_system_load_telemetry_enabled + + Status + locked + Type + boolean + Value + + + dom.webgpu.enabled + + Status + default + Type + boolean + Value + + + extensions.abuseReport.enabled + + Status + default + Type + boolean + Value + + + extensions.autoDisableScopes + + Status + locked + Type + number + Value + 15 + + extensions.blocklist.enabled + + Status + default + Type + boolean + Value + + + extensions.cardbook.useOnlyEmail + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.arh.read + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.arh.replaceAddonResult + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.debug + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.display.favicon.show + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.display.keySecure + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.dkim.enable + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.dns.nameserver + + Status + default + Type + string + Value + 9.9.9.9 + + extensions.dkim_verifier.error.algorithm.rsa.weakKeyLength.treatAs + + Status + default + Type + number + Value + 1 + + extensions.dkim_verifier.error.algorithm.sign.rsa-sha1.treatAs + + Status + default + Type + number + Value + 1 + + extensions.dkim_verifier.error.detailedReasons + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.error.illformed_i.treatAs + + Status + default + Type + number + Value + 1 + + extensions.dkim_verifier.error.illformed_s.treatAs + + Status + default + Type + number + Value + 1 + + extensions.dkim_verifier.error.policy.key_insecure.treatAs + + Status + default + Type + number + Value + 1 + + extensions.dkim_verifier.key.storing + + Status + default + Type + number + Value + 2 + + extensions.dkim_verifier.policy.DMARC.shouldBeSigned.enable + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.policy.DMARC.shouldBeSigned.neededPolicy + + Status + default + Type + string + Value + none + + extensions.dkim_verifier.policy.dkim.unsignedHeadersWarning.mode + + Status + default + Type + number + Value + 30 + + extensions.dkim_verifier.policy.signRules.autoAddRule.enable + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.policy.signRules.autoAddRule.for + + Status + default + Type + number + Value + 0 + + extensions.dkim_verifier.policy.signRules.autoAddRule.onlyIfFromAddressInSDID + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.policy.signRules.checkDefaultRules + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.policy.signRules.enable + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.policy.signRules.error.wrong_sdid.asWarning + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.policy.signRules.sdid.allowSubDomains + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.saveResult + + Status + default + Type + boolean + Value + + + extensions.dkim_verifier.showDKIMFromTooltip + + Status + default + Type + number + Value + 50 + + extensions.dkim_verifier.showDKIMHeader + + Status + default + Type + number + Value + 50 + + extensions.enabledScopes + + Status + default + Type + number + Value + 5 + + extensions.experiments.enabled + + Status + default + Type + boolean + Value + + + extensions.formautofill.addresses.enabled + + Status + default + Type + boolean + Value + + + extensions.formautofill.creditCards.enabled + + Status + default + Type + boolean + Value + + + extensions.formautofill.ml.experiment.enabled + + Status + default + Type + boolean + Value + + + extensions.getAddons.browseAddons + + Status + default + Type + string + Value + + + extensions.getAddons.discovery.api_url + + Status + default + Type + string + Value + https://dove.celenity.dev/extensions/recommendations.json + + extensions.getAddons.search.browseURL + + Status + default + Type + string + Value + https://addons.thunderbird.net/%LOCALE%/%APP%/search/?q=%TERMS% + + extensions.getAddons.showPane + + Status + default + Type + boolean + Value + + + extensions.htmlaboutaddons.recommendations.enabled + + Status + default + Type + boolean + Value + + + extensions.install.requireBuiltInCerts + + Status + default + Type + boolean + Value + + + extensions.installDistroAddons + + Status + default + Type + boolean + Value + + + extensions.postDownloadThirdPartyPrompt + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.ads@mozac.org + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.bravesearch@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.cookies@mozac.org + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.ddg@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.dkim_verifier@pl + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.duckduckgo-html@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.duckduckgo-lite@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.ecosia@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.kagi-html@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.kagi@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.leta-brave@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.leta-google@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.metager@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.mojeek@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.no-search@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.qwant-junior@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.qwant@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.startpage@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.swisscows@celenity.dev + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.uBlock0@raymondhill.net + + Status + default + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.wikipedia@search.mozilla.org + + Status + locked + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.{b86e4813-687a-43e6-ab65-0bde4ab75758} + + Status + default + Type + boolean + Value + + + extensions.quarantineIgnoredByUser.{d19a89b9-76c1-4a61-bcd4-49e8de916403} + + Status + default + Type + boolean + Value + + + extensions.quarantinedDomains.enabled + + Status + default + Type + boolean + Value + + + extensions.recommendations.privacyPolicyUrl + + Status + default + Type + string + Value + https://dove.celenity.dev/privacy#extension-recommendations + + extensions.recommendations.themeRecommendationUrl + + Status + default + Type + string + Value + + + extensions.strictCompatibility + + Status + locked + Type + boolean + Value + + + extensions.systemAddon.update.enabled + + Status + default + Type + boolean + Value + + + extensions.ui.lastCategory + + Status + default + Type + string + Value + addons://list/extension + + extensions.update.autoUpdateDefault + + Status + default + Type + boolean + Value + + + extensions.update.enabled + + Status + default + Type + boolean + Value + + + extensions.update.interval + + Status + default + Type + number + Value + 3600 + + extensions.update.notifyUser + + Status + default + Type + boolean + Value + + + extensions.update.requireBuiltInCerts + + Status + default + Type + boolean + Value + + + extensions.webapi.testing + + Status + locked + Type + boolean + Value + + + extensions.webapi.testing.http + + Status + default + Type + boolean + Value + + + extensions.webcompat-reporter.enabled + + Status + default + Type + boolean + Value + + + extensions.webcompat-reporter.newIssueEndpoint + + Status + default + Type + string + Value + + + extensions.webcompat.enable_shims + + Status + default + Type + boolean + Value + + + extensions.webcompat.perform_injections + + Status + default + Type + boolean + Value + + + extensions.webcompat.perform_ua_overrides + + Status + default + Type + boolean + Value + + + extensions.webcompat.smartblockEmbeds.enabled + + Status + default + Type + boolean + Value + + + extensions.webextensions.remote + + Status + default + Type + boolean + Value + + + extensions.webextensions.restrictedDomains + + Status + default + Type + string + Value + + + extensions.webservice.discoverURL + + Status + default + Type + string + Value + + + general.autoScroll + + Status + default + Type + boolean + Value + + + general.smoothScroll + + Status + default + Type + boolean + Value + + + geo.provider.ms-windows-location + + Status + default + Type + boolean + Value + + + geo.provider.network.logging.enabled + + Status + default + Type + boolean + Value + + + geo.provider.network.url + + Status + default + Type + boolean + Value + + + geo.provider.use_corelocation + + Status + default + Type + boolean + Value + + + geo.provider.use_geoclue + + Status + default + Type + boolean + Value + + + geo.wifi.scan + + Status + default + Type + boolean + Value + + + gfx.canvas.accelerated + + Status + default + Type + boolean + Value + + + gfx.canvas.accelerated.cache-items + + Status + default + Type + number + Value + 8192 + + gfx.canvas.accelerated.cache-size + + Status + default + Type + number + Value + 512 + + gfx.content.skia-font-cache-size + + Status + default + Type + number + Value + 20 + + gfx.font_rendering.graphite.enabled + + Status + default + Type + boolean + Value + + + gfx.font_rendering.opentype_svg.enabled + + Status + default + Type + boolean + Value + + + gfx.webrender.all + + Status + default + Type + boolean + Value + + + gfx.webrender.compositor + + Status + default + Type + boolean + Value + + + intl.allow-insecure-text-input + + Status + default + Type + boolean + Value + + + layout.css.prefers-color-scheme.content-override + + Status + default + Type + number + Value + 1 + + layout.css.report_errors + + Status + default + Type + boolean + Value + + + layout.css.visited_links_enabled + + Status + default + Type + boolean + Value + + + layout.forms.reveal-password-button.enabled + + Status + default + Type + boolean + Value + + + layout.spellcheckDefault + + Status + default + Type + number + Value + 2 + + mail.SpellCheckBeforeSend + + Status + default + Type + boolean + Value + + + mail.addressDisplayFormat + + Status + default + Type + number + Value + 0 + + mail.biff.alert.show_preview + + Status + default + Type + boolean + Value + + + mail.biff.alert.show_sender + + Status + default + Type + boolean + Value + + + mail.biff.alert.show_subject + + Status + default + Type + boolean + Value + + + mail.chat.enabled + + Status + default + Type + boolean + Value + + + mail.chat.notification_info + + Status + default + Type + number + Value + 2 + + mail.cloud_files.enabled + + Status + default + Type + boolean + Value + + + mail.collect_email_address_outgoing + + Status + default + Type + boolean + Value + + + mail.compose.add_link_preview + + Status + default + Type + boolean + Value + + + mail.compose.warn_public_recipients.aggressive + + Status + default + Type + boolean + Value + + + mail.dark-reader.enabled + + Status + default + Type + boolean + Value + + + mail.dark-reader.show-toggle + + Status + default + Type + boolean + Value + + + mail.default_send_format + + Status + default + Type + number + Value + 1 + + mail.dove.policies.status + + Status + locked + Type + string + Value + successfully applied :D + + mail.e2ee.auto_disable + + Status + locked + Type + boolean + Value + + + mail.e2ee.auto_enable + + Status + default + Type + boolean + Value + + + mail.e2ee.notify_on_auto_disable + + Status + locked + Type + boolean + Value + + + mail.external_protocol_requires_permission + + Status + default + Type + boolean + Value + + + mail.html_compose + + Status + default + Type + boolean + Value + + + mail.html_sanitize.drop_conditional_css + + Status + default + Type + boolean + Value + + + mail.identity.default.compose_html + + Status + default + Type + boolean + Value + + + mail.identity.default.sign_mail + + Status + default + Type + boolean + Value + + + mail.imap.use_disk_cache2 + + Status + default + Type + boolean + Value + + + mail.mdn.report.enabled + + Status + default + Type + boolean + Value + + + mail.mdn.report.not_in_to_cc + + Status + default + Type + number + Value + 0 + + mail.mdn.report.other + + Status + default + Type + number + Value + 0 + + mail.mdn.report.outside_domain + + Status + default + Type + number + Value + 0 + + mail.openpgp.allow_external_gnupg + + Status + default + Type + boolean + Value + + + mail.openpgp.remind_encryption_possible + + Status + default + Type + boolean + Value + + + mail.phishing.detection.disallow_form_actions + + Status + default + Type + boolean + Value + + + mail.phishing.detection.enabled + + Status + default + Type + boolean + Value + + + mail.phishing.detection.ipaddresses + + Status + default + Type + boolean + Value + + + mail.phishing.detection.mismatched_hosts + + Status + default + Type + boolean + Value + + + mail.provider.enabled + + Status + default + Type + boolean + Value + + + mail.provider.suppress_dialog_on_startup + + Status + default + Type + boolean + Value + + + mail.rights.override + + Status + default + Type + boolean + Value + + + mail.sanitize_date_header + + Status + default + Type + boolean + Value + + + mail.save_msg_filename_underscores_for_space + + Status + default + Type + boolean + Value + + + mail.server.default.mdn_not_in_to_cc + + Status + default + Type + number + Value + 0 + + mail.server.default.mdn_other + + Status + default + Type + number + Value + 0 + + mail.server.default.mdn_outside_domain + + Status + default + Type + number + Value + 0 + + mail.server.default.mdn_report_enabled + + Status + default + Type + boolean + Value + + + mail.shell.checkDefaultClient + + Status + default + Type + boolean + Value + + + mail.showCondensedAddresses + + Status + default + Type + boolean + Value + + + mail.show_headers + + Status + default + Type + number + Value + 2 + + mail.smime.accept_insecure_sha1_message_signatures + + Status + default + Type + boolean + Value + + + mail.smime.remind_encryption_possible + + Status + default + Type + boolean + Value + + + mail.smtpserver.default.hello_argument + + Status + default + Type + string + Value + [127.0.0.1] + + mail.spellcheck.inline + + Status + default + Type + boolean + Value + + + mail.spotlight.enable + + Status + default + Type + boolean + Value + + + mail.spotlight.firstRunDone + + Status + default + Type + boolean + Value + + + mail.suppress_content_language + + Status + default + Type + boolean + Value + + + mail.winsearch.enable + + Status + default + Type + boolean + Value + + + mail.winsearch.firstRunDone + + Status + default + Type + boolean + Value + + + mailnews.auto_config.fetchFromISP.sendEmailAddress + + Status + default + Type + boolean + Value + + + mailnews.auto_config.fetchFromISP.sslOnly + + Status + default + Type + boolean + Value + + + mailnews.auto_config.guess.requireGoodCert + + Status + default + Type + boolean + Value + + + mailnews.auto_config.guess.sslOnly + + Status + default + Type + boolean + Value + + + mailnews.display.date_senders_timezone + + Status + default + Type + boolean + Value + + + mailnews.display.disallow_mime_handlers + + Status + default + Type + number + Value + 3 + + mailnews.display.html_as + + Status + default + Type + number + Value + 3 + + mailnews.display.prefer_plaintext + + Status + default + Type + boolean + Value + + + mailnews.downloadToTempFile + + Status + locked + Type + boolean + Value + + + mailnews.headers.sendUserAgent + + Status + default + Type + boolean + Value + + + mailnews.headers.showMessageId + + Status + default + Type + boolean + Value + + + mailnews.headers.showOrganization + + Status + default + Type + boolean + Value + + + mailnews.headers.showReferences + + Status + default + Type + boolean + Value + + + mailnews.headers.showSender + + Status + default + Type + boolean + Value + + + mailnews.headers.showUserAgent + + Status + default + Type + boolean + Value + + + mailnews.headers.useMinimalUserAgent + + Status + default + Type + boolean + Value + + + mailnews.message_display.disable_remote_image + + Status + locked + Type + boolean + Value + + + mailnews.oauth.usePrivateBrowser + + Status + locked + Type + boolean + Value + + + mailnews.reply_header_authorwroteondate + + Status + default + Type + string + Value + #1 wrote on #2 #3: + + mailnews.reply_header_authorwrotesingle + + Status + default + Type + string + Value + #1 wrote: + + mailnews.reply_header_ondateauthorwrote + + Status + default + Type + string + Value + On #2 #3, #1 wrote: + + mailnews.reply_header_type + + Status + default + Type + number + Value + 1 + + mailnews.show_send_progress + + Status + default + Type + boolean + Value + + + mailnews.start_page.enabled + + Status + default + Type + boolean + Value + + + mailnews.start_page.override_url + + Status + default + Type + string + Value + + + mailnews.start_page.url + + Status + default + Type + string + Value + about:config + + mailnews.start_page_override.mstone + + Status + default + Type + string + Value + ignore + + media.autoplay.blocking_policy + + Status + default + Type + number + Value + 2 + + media.autoplay.default + + Status + default + Type + number + Value + 5 + + media.cache_readahead_limit + + Status + default + Type + number + Value + 7200 + + media.cache_resume_threshold + + Status + default + Type + number + Value + 3600 + + media.clearkey.persistent-license.enabled + + Status + default + Type + boolean + Value + + + media.clearkey.test-key-systems.enabled + + Status + default + Type + boolean + Value + + + media.devices.insecure.enabled + + Status + default + Type + boolean + Value + + + media.eme.enabled + + Status + default + Type + boolean + Value + + + media.eme.encrypted-media-encryption-scheme.enabled + + Status + default + Type + boolean + Value + + + media.eme.hdcp-policy-check.enabled + + Status + default + Type + boolean + Value + + + media.eme.playready.enabled + + Status + default + Type + boolean + Value + + + media.eme.require-app-approval + + Status + default + Type + boolean + Value + + + media.eme.widevine.experiment.enabled + + Status + default + Type + boolean + Value + + + media.eme.wmf.clearkey.enabled + + Status + default + Type + boolean + Value + + + media.ffmpeg.vaapi.enabled + + Status + default + Type + boolean + Value + + + media.getusermedia.insecure.enabled + + Status + default + Type + boolean + Value + + + media.gmp-gmpopenh264.enabled + + Status + default + Type + boolean + Value + + + media.gmp-gmpopenh264.provider.enabled + + Status + default + Type + boolean + Value + + + media.gmp-gmpopenh264.visible + + Status + default + Type + boolean + Value + + + media.gmp-manager.cert.checkAttributes + + Status + default + Type + boolean + Value + + + media.gmp-manager.cert.requireBuiltIn + + Status + default + Type + boolean + Value + + + media.gmp-manager.checkContentSignature + + Status + default + Type + boolean + Value + + + media.gmp-manager.updateEnabled + + Status + default + Type + boolean + Value + + + media.gmp-provider.enabled + + Status + default + Type + boolean + Value + + + media.gmp-widevinecdm-l1.enabled + + Status + default + Type + boolean + Value + + + media.gmp-widevinecdm-l1.visible + + Status + default + Type + boolean + Value + + + media.gmp-widevinecdm.enabled + + Status + default + Type + boolean + Value + + + media.gmp-widevinecdm.visible + + Status + default + Type + boolean + Value + + + media.gmp.insecure.allow + + Status + default + Type + boolean + Value + + + media.memory_cache_max_size + + Status + default + Type + number + Value + 65536 + + media.peerconnection.enabled + + Status + default + Type + boolean + Value + + + media.peerconnection.ice.default_address_only + + Status + default + Type + boolean + Value + + + media.peerconnection.ice.no_host + + Status + default + Type + boolean + Value + + + media.peerconnection.ice.obfuscate_host_addresses + + Status + default + Type + boolean + Value + + + media.peerconnection.ice.proxy_only_if_behind_proxy + + Status + default + Type + boolean + Value + + + media.peerconnection.ice.relay_only + + Status + default + Type + boolean + Value + + + media.peerconnection.mtransport_process + + Status + default + Type + boolean + Value + + + media.webrtc.enable_pq_dtls + + Status + default + Type + boolean + Value + + + media.webspeech.synth.dont_notify_on_error + + Status + default + Type + boolean + Value + + + media.webvtt.testing.events + + Status + default + Type + boolean + Value + + + media.wmf.media-engine.enabled + + Status + default + Type + number + Value + 0 + + network.IDN_show_punycode + + Status + default + Type + boolean + Value + + + network.auth.non-web-content-triggered-resources-http-auth-allow + + Status + default + Type + boolean + Value + + + network.auth.subresource-http-auth-allow + + Status + default + Type + number + Value + 1 + + network.auth.subresource-img-cross-origin-http-auth-allow + + Status + default + Type + boolean + Value + + + network.captive-portal-service.enabled + + Status + default + Type + boolean + Value + + + network.connectivity-service.DNS_HTTPS.domain + + Status + default + Type + string + Value + + + network.connectivity-service.DNSv4.domain + + Status + default + Type + string + Value + + + network.connectivity-service.DNSv6.domain + + Status + default + Type + string + Value + + + network.connectivity-service.IPv4.url + + Status + default + Type + string + Value + + + network.connectivity-service.IPv6.url + + Status + default + Type + string + Value + + + network.connectivity-service.enabled + + Status + default + Type + boolean + Value + + + network.cookie.CHIPS.enabled + + Status + default + Type + boolean + Value + + + network.cookie.cookieBehavior + + Status + default + Type + number + Value + 5 + + network.cookie.cookieBehavior.optInPartitioning + + Status + default + Type + boolean + Value + + + network.cookie.cookieBehavior.optInPartitioning.pbmode + + Status + default + Type + boolean + Value + + + network.cookie.cookieBehavior.pbmode + + Status + default + Type + number + Value + 5 + + network.cookie.cookieBehavior.trackerCookieBlocking + + Status + default + Type + boolean + Value + + + network.cookie.noPersistentStorage + + Status + default + Type + boolean + Value + + + network.cookie.sameSite.laxByDefault + + Status + default + Type + boolean + Value + + + network.cookie.sameSite.noneRequiresSecure + + Status + default + Type + boolean + Value + + + network.cookie.sameSite.schemeful + + Status + default + Type + boolean + Value + + + network.dns.disablePrefetch + + Status + default + Type + boolean + Value + + + network.dns.disablePrefetchFromHTTPS + + Status + default + Type + boolean + Value + + + network.dns.echconfig.enabled + + Status + default + Type + boolean + Value + + + network.dns.http3_echconfig.enabled + + Status + default + Type + boolean + Value + + + network.dns.native_https_query + + Status + default + Type + boolean + Value + + + network.dns.preferIPv6 + + Status + default + Type + boolean + Value + + + network.dns.prefetch_via_proxy + + Status + default + Type + boolean + Value + + + network.dnsCacheEntries + + Status + default + Type + number + Value + 1000 + + network.dnsCacheExpiration + + Status + default + Value + 3600 + + network.dnsCacheExpirationGracePeriod + + Status + default + Type + number + Value + 240 + + network.early-hints.enabled + + Status + default + Type + boolean + Value + + + network.early-hints.over-http-v1-1.enabled + + Status + default + Type + boolean + Value + + + network.early-hints.preconnect.enabled + + Status + default + Type + boolean + Value + + + network.early-hints.preconnect.max_connections + + Status + default + Type + number + Value + 0 + + network.file.disable_unc_paths + + Status + default + Type + boolean + Value + + + network.gio.supported-protocols + + Status + default + Type + string + Value + + + network.http.http3.enable_0rtt + + Status + default + Type + boolean + Value + + + network.http.http3.enable_kyber + + Status + default + Type + boolean + Value + + + network.http.max-connections + + Status + default + Type + number + Value + 1800 + + network.http.max-persistent-connections-per-proxy + + Status + default + Type + number + Value + 48 + + network.http.max-persistent-connections-per-server + + Status + default + Type + number + Value + 10 + + network.http.max-urgent-start-excessive-connections-per-host + + Status + default + Type + number + Value + 5 + + network.http.microsoft-entra-sso.container-enabled.0 + + Status + default + Type + boolean + Value + + + network.http.microsoft-entra-sso.enabled + + Status + default + Type + boolean + Value + + + network.http.network_error_logging.enabled + + Status + default + Type + boolean + Value + + + network.http.referer.XOriginPolicy + + Status + user + Type + number + Value + 2 + + network.http.referer.XOriginTrimmingPolicy + + Status + default + Type + number + Value + 2 + + network.http.referer.defaultPolicy.trackers + + Status + default + Type + number + Value + 1 + + network.http.referer.defaultPolicy.trackers.pbmode + + Status + default + Type + number + Value + 1 + + network.http.referer.disallowCrossSiteRelaxingDefault + + Status + default + Type + boolean + Value + + + network.http.referer.disallowCrossSiteRelaxingDefault.pbmode + + Status + default + Type + boolean + Value + + + network.http.referer.disallowCrossSiteRelaxingDefault.pbmode.top_navigation + + Status + default + Type + boolean + Value + + + network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation + + Status + default + Type + boolean + Value + + + network.http.speculative-parallel-limit + + Status + default + Type + number + Value + 0 + + network.http.windows-sso.container-enabled.0 + + Status + default + Type + boolean + Value + + + network.http.windows-sso.enabled + + Status + default + Type + boolean + Value + + + network.jar.record_failure_reason + + Status + locked + Type + boolean + Value + + + network.microsoft-sso-authority-list + + Status + default + Type + string + Value + + + network.negotiate-auth.trusted-uris + + Status + default + Type + string + Value + + + network.notify.checkForNRPT + + Status + default + Type + boolean + Value + + + network.notify.checkForProxies + + Status + default + Type + boolean + Value + + + network.preconnect + + Status + default + Type + boolean + Value + + + network.predictor.enable-hover-on-ssl + + Status + default + Type + boolean + Value + + + network.predictor.enable-prefetch + + Status + default + Type + boolean + Value + + + network.predictor.enabled + + Status + default + Type + boolean + Value + + + network.prefetch-next + + Status + default + Type + boolean + Value + + + network.protocol-handler.external.shell + + Status + locked + Type + boolean + Value + + + network.protocol-handler.warn-external-default + + Status + default + Type + boolean + Value + + + network.proxy.allow_bypass + + Status + default + Type + boolean + Value + + + network.proxy.failover_direct + + Status + default + Type + boolean + Value + + + network.proxy.socks5_remote_dns + + Status + default + Type + boolean + Value + + + network.proxy.socks_remote_dns + + Status + default + Type + boolean + Value + + + network.traffic_analyzer.enabled + + Status + locked + Type + boolean + Value + + + network.trr.confirmationNS + + Status + default + Type + string + Value + skip + + network.trr.confirmation_telemetry_enabled + + Status + locked + Type + boolean + Value + + + network.trr.default_provider_uri + + Status + default + Type + string + Value + https://dns.quad9.net/dns-query + + network.trr.disable-ECS + + Status + default + Type + boolean + Value + + + network.trr.display_fallback_warning + + Status + default + Type + boolean + Value + + + network.trr.mode + + Status + default + Type + number + Value + 3 + + network.trr.retry_on_recoverable_errors + + Status + default + Type + boolean + Value + + + network.trr.send_accept-language_headers + + Status + default + Type + boolean + Value + + + network.trr.send_empty_accept-encoding_headers + + Status + default + Type + boolean + Value + + + network.trr.send_user-agent_headers + + Status + default + Type + boolean + Value + + + network.trr.strict_native_fallback + + Status + default + Type + boolean + Value + + + network.trr_ui.show_fallback_warning_option + + Status + default + Type + boolean + Value + + + network.websocket.allowInsecureFromHTTPS + + Status + default + Type + boolean + Value + + + pdfjs.enablePermissions + + Status + default + Type + boolean + Value + + + pdfjs.enableScripting + + Status + default + Type + boolean + Value + + + pdfjs.enableXfa + + Status + default + Type + boolean + Value + + + pdfjs.firstRun + + Status + default + Type + boolean + Value + + + pdfjs.sidebarViewOnLoad + + Status + default + Type + number + Value + 2 + + places.history.enabled + + Status + default + Type + boolean + Value + + + privacy.globalprivacycontrol.enabled + + Status + default + Type + boolean + Value + + + privacy.userContext.enabled + + Status + default + Type + boolean + Value + + + security.OCSP.enabled + + Status + default + Type + number + Value + 1 + + security.OCSP.require + + Status + default + Type + boolean + Value + + + security.default_personal_cert + + Status + locked + Type + string + Value + Ask Every Time + + security.insecure_connection_text.enabled + + Status + default + Type + boolean + Value + + + security.insecure_connection_text.pbmode.enabled + + Status + default + Type + boolean + Value + + + security.mixed_content.block_active_content + + Status + default + Type + boolean + Value + + + security.mixed_content.block_display_content + + Status + default + Type + boolean + Value + + + security.mixed_content.upgrade_display_content + + Status + default + Type + boolean + Value + + + security.pki.certificate_transparency.mode + + Status + default + Type + number + Value + 2 + + security.ssl.enable_ocsp_stapling + + Status + default + Type + boolean + Value + + + security.ssl.require_safe_negotiation + + Status + default + Type + boolean + Value + + + security.tls.enable_0rtt_data + + Status + default + Type + boolean + Value + + + security.tls.hello_downgrade_check + + Status + default + Type + boolean + Value + + + security.tls.version.enable-deprecated + + Status + locked + Type + boolean + Value + + + security.warn_submit_secure_to_insecure + + Status + default + Type + boolean + Value + + + signon.autofillForms + + Status + default + Type + boolean + Value + + + signon.autofillForms.http + + Status + default + Type + boolean + Value + + + signon.firefoxRelay.feature + + Status + default + Type + string + Value + disabled + + signon.firefoxRelay.manage_url + + Status + default + Type + string + Value + https://relay.firefox.com/accounts/profile/ + + signon.formlessCapture.enabled + + Status + default + Type + boolean + Value + + + signon.generation.enabled + + Status + default + Type + boolean + Value + + + signon.privateBrowsingCapture.enabled + + Status + default + Type + boolean + Value + + + signon.rememberSignons + + Status + default + Type + boolean + Value + + + signon.storeWhenAutocompleteOff + + Status + default + Type + boolean + Value + + + toolkit.legacyUserProfileCustomizations.stylesheets + + Status + default + Type + boolean + Value + + + ui.hideCursorWhileTyping + + Status + default + Type + number + Value + 1 + + ui.key.menuAccessKeyFocuses + + Status + default + Type + boolean + Value + + + ui.panelAnimations + + Status + default + Type + number + Value + 0 + + ui.prefersReducedMotion + + Status + default + Type + number + Value + 1 + + ui.prefersReducedTransparency + + Status + default + Type + number + Value + 0 + + ui.scrollToClick + + Status + default + Type + number + Value + 1 + + ui.swipeAnimationEnabled + + Status + default + Type + number + Value + 0 + + ui.useAccessibilityTheme + + Status + default + Type + number + Value + 0 + + widget.non-native-theme.use-theme-accent + + Status + default + Type + boolean + Value + + + xpinstall.whitelist.required + + Status + default + Type + boolean + Value + + + + Proxy + + UseProxyForDNS + + + SSLVersionMin + tls1.2 + SearchEngines + + Add + + + Description + Search DuckDuckGo HTML + IconURL + data:image/x-icon;base64,AAABAAIAEBAAAAEAIAB5AwAAJgAAACAgAAABACAAUAcAAJ8DAACJUE5HDQoaCgAAAA1JSERSAAAAEAAAABAIBgAAAB/z/2EAAANASURBVDiNpZNNTFsFAMd/76t9rx+UsZYCGTNsIytVsXGGA5qNmAjG0Ok+OsXNuIMas4MnT4o6g4bTYnYw7jCnS/QAZHMmbBlKluzCphlK5mAbAcamlKyUQt+jtH19Hx6MZpz93f6X3+n/g/+J8OiYTe0KObLysikqRz3F9WeVcsVTUr1rjs9z04vTr66YVxqGx4sCuBsELgj39rW1CtWevkDjzqT60mHU5icRbBvbKmOvrmKODrF669qIvZr/aFvLjXHhU5z/BHOH2p6SNkdGwq8cjUqxXVTSM6xfGcYYHESMBAkeeofgiylYnGPpu5O5tfRMsuXc5BiAeG/PHlUO+ftq33gvaksa6SMdWOlZNn1wkoYz55DDtegDp/irpx3TWCOServGH6k/PptsigKIVqPdEYi3JcXGGJkP30Lt7kHb/y4KoD3dTrj/NJ5YHEJBMn3HsMNbCTXFXyAQTg6mkMQKbq+3qwdjZACpfivSa8e4PZ1leaWA48KkZwfLWiOyK+NKGsblAZTnDyAGQnvjk3FJpGgm5Ooa9KGvkULViKEwur5OJmciCpDOLFNqqMX/hA81plL+5WeUphZESdpdVaVLslYu+SVfACuTRaxrxLOWIxGvQ7H+xJkfYq9gU9zxALPawV1SyN+YBcdFFgkthm1Briieius6indnM1ZBpzh5nWjnQTDuYM+8T26sFtv1IdYoFCZcxFAEx1yn4rJgZiVXNP3qWOnuTdTnunBWsli3fvvnIb527HA/eANomoKdFnBWdYIH3oRCAWxnKpxVHVFx7W/Kl76nqqsHwTCwp+9iAkib8FTtQ/gjwsV1l/lFG3G5SLDzINbV8wjF0pfNMzOmLD+sXDCU6WHt/lR39PMz5E8c5/dfB/lKuYSl51lOZpmvdei/bZD4+BTkFliauDaa0x9cfQxccfvoeN61jN7sD6cfSppM3bcX8W/egmWVEVSN1+V2DrsdxE6cR/BB5uwXufLC4ieJH+/nN7ZwJNEqaDWfVcef6RY6X6UYDhGoieIt2RhT49iXByjM3fnJ0fXeba0TG1v4l7HUFq1Ord9dcb29brGc0MqlgKl4zYpPvS5jnzXN/IXHh6ZWHq3xb489Z7RfaFfAAAAAAElFTkSuQmCCiVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAHF0lEQVRYhZ2XX2xT9xXHP7/r6z+x48Qhc1lCWWzKopFOqluHDW0SCZuElmpIqaASoRXwMCL2MNE1PGyTNog6qXsoLbBpMHgBNAqVyBaaqbDugaSaSlXwlq4hrNkgzhgOYEJMnFw7zvX97eHa13bsFLrzZJ/7+53v95x7/l3BY8p4Z7sv65rptCHapCSEQgCJDwBBAoOoFAxL5JAtXdMf7B9MPI5d8UjgresCSH2PVOROC/AxRMIJBXtv8OxH0f+LwHhnu4+qmX1SilfyOteaMO617VS1hFH9DShuLwCGliQTHWN+YgztyiDp65ECESEOKim9N9g/XDEiFQmMb10XkCxcAgIA1es3UbdlF6q/8fOcsUSPx5g+d5zZDwbyqqjAvqFSNMoIjG9bG5KG8UcgoPobWd7zBo6mZsvThxfOkB6NoMcn0eMxABSPF0dTM+7WdjytbRZRPR5j8rXd+XNRoSgvBN++MrwkgWLPves3sWzHqyhuL3o8xtztKE6HE0NLMndlCC0yiDGXrBiB6rZN1G02I2ZoSeJHetGuDlaMRAmBm1vD40DA3drO8p43AHh44Qwzl87je/nHiIYmHLXLcDgc6PEYU6fezBsuE8Xtxbelm9qOLgDuH+0lOTRgkkhnn83nhM3yvuu5t0B8T/U38uWfHkbYnUz3HWP6zG8wZh6g/fU9tEvnma+px/nkKhw1dVR/ayN2fyOZiTEMrTQaciFD6pPLIKCqJYyrJczc5b9gaEmftNtch0dif7YikAv9OMDKw++i+ht5eOEMD04dsAw6NnRS/+IPcdXVV/S4yMMyWba9h9qOLjITY9z+ybZc6O3B4NmPogqAwcI+MLNd9Teix2Mk+o4VwDteouEHP1sS3AR5dckqSZw7hh6P4Whqpnr9JgAMufAKgDK+M+QTsBOgbssuAKb7jhcSrO4Jlm/7EZ/+8w7vf/AZs9p8GcC/J6a4PDrFQkd3RQKGliR+tJdiDKGwY7wz5FOzaaVTwWwyee9ni0Jp+8Z3UVUVj8fJxpbKHq5uqmd1Uz2GVs+tPm/F6kiPRjC0JKq/EVdLmPRoxJd12TsVgWgDcK9tB2Du6lDJRfvK1RbIrDbPnXjl0vvtqQ+5PHof15pwxecAD987A4C71cSyYbSpQhBCgjPXbMrKyuWxfvb8coDqKie9PRupdjtLjn0YiQLwNX/DkgTyLbqqxSQphQip5NqtI2ASyEyMlVxayHU7gG+HAwBl4AC/P2Rm9/S5EQAUF1Q/DVUrIX4RjDTo8UkAVIukDKj5CWcNlkXvT0/OWL+3b24tPMgmYepPoJUS9j75Gd5uUGtyXt8ywYFC685hIfGpZa4sljtRMpkMDoejVD/6EmRiZcdVOxiGCZwcgdlrn29eRZBA4jO0JIrba1VCXsTkBKlUqpRAaswCT92Ce+dNL9UaMDIFjxdL8fg2jZNQgCiAfm/x+8nJ5DjzD6dLdY4GsJnGbC5QcimhzywNDlhTNRPNvzYRVZF8AoRS1yM4As241oRJj0ZKLmo3rsFXAgWFzQvNv4Obe3H4Y6zcBZl4KbhaC5l7cLe/oMuX+nwu0YWUw4qBHIRC+dU+31XG3Bj5GF3XS5XuZvj6u+iebpLXAGmCqrUmkeSImf3F4mltoxgL5JBqcxn9ct72Vno04tPjseJOZV0Uk1Hm5uaora0tI5ccgcSFMnWZFM8Zy3ba6FeCJ4YTEk6COQMA/Lv3oXi8hdvj10gnpioati8aQP9qsPHfeqVEp3i8JXMGQMCJYP9wQgFQZPYgwOzQAJnoGKq/kbrNpYMldfM6ALMLST598Hfm9FkAXC3PMeVV0JyCP3zTzq87HFwMlVZ33ebuCnMm2wugAgTPDkdvdIUPCcmeu2/uZcWvTlPT0YUxl2Q6N5aNkY9JrfsOF28PcHL8CABP1z7DvfQd4i86MbIGQhEIKIlA3eZu05aWZPK13QBIyaFV7wxHAayTijO7H4jmVy0A35Zu6rf3oHi8iMko6XRpjf1j6m/c0XI9Q0BWzwLwoFqgeLzUb+/Bt8WMZPxIr7WcPvVOxFr1LQLBE8MJQXYDEJ0dGuDugb0YWpKaji5WvH6a6pWrSE1P8VTNV5FSmlExDOy6HbtuJ/CfecLX01TfT7HM/iVWvH7a8jx+tHgpzW4oduKRa3nDz48W1mxdJy1TvPz+9/HYa9gb+gXPPrEWMLcegJrnu6yOl5kY4+6BvUVrefaF4NvDS6/lFomtoYDEVvgwKVqzwUzEaru30lWTaDzGdN/x4sUmKshuCJ413/sjCeTlRlf4oJDsyf93tYRxt7bjbGrGEWgu6e36vUlS1yNoVwdLeoiUHFLms/u/0KdZseSisR/Y8aizRVYT0uCkIrIHK3n9hQhYRDpDvqxL6VQQ7QjxDMjSz3NEVEgxnCU7ZEsb/Ut5vFj+B4mSK5j/ya9iAAAAAElFTkSuQmCC + Method + POST + Name + DuckDuckGo (HTML) + SuggestURLTemplate + https://duckduckgo.com/ac/?q={searchTerms}&type=list + URLTemplate + https://html.duckduckgo.com/html/?q={searchTerms} + + + Description + Search DuckDuckGo Lite + IconURL + data:image/x-icon;base64,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 + Method + POST + Name + DuckDuckGo (Lite) + SuggestURLTemplate + https://duckduckgo.com/ac/?q={searchTerms}&type=list + URLTemplate + https://lite.duckduckgo.com/lite/?q={searchTerms} + + + Description + Search Ecosia + IconURL + data:image/x-icon;base64,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 + Method + GET + Name + Ecosia + SuggestURLTemplate + https://ac.ecosia.org/autocomplete?q={searchTerms}&type=list + URLTemplate + https://www.ecosia.org/search?q={searchTerms} + + + Description + Search Mojeek + IconURL + data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAIAAAD8GO2jAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAA8pJREFUeNrsVk1vG0UY3tnvtb3+SJpgO01cmkQKUhURqBCC8iE+EoSKED1QBBUKB0r7AzjwB+BSUX4AXDkhFATHCJAKKpSegDZqRVFpGtLETmI72fV+zvDsDnV2VwUu4ZY52KN55n2feZ953rEJY0z4PwfZJ9gn2EOCle7StY2Lf3ave6EzYNRnai80ytNYv7F5+ee1xXXrD8bCoXzjsdFXa+YkD7m+8cNS88K6dTMIPVMbmK7OTt/37D0I2s7qZ1feRyI3tEUiEYGELNCk3Nzk2Q17+cfbCyH1JSJjd8C8vFKef+j8oDHy+dUPlprfURZGIYRQGlKBPnXo1MtT72YJtr2ND78/aftdviSLKj6ZQP3QxUSRdCEqkyFRxEG9onZAEpWWdUuTczQWQCRiHMIcf/vNmXMPVmf7BBFgqoOPjp7oBd1qYXykOIXUEbMgqpKB7H7oYIJcPnVjem3H22o7a1iBmJpsaJLBIZQO4ku3F5IVyPzrkYOvDOcPQ0Gc4qOLr7fsZYkomEOB2Yl3jtaPEyIu3vj40sqCIuooBRBknJs4c3TkJcbo4u+f/LTyBSAZldm3nGBHlwspgopeq9Rq8ZThjJEkRPBC+4nGG8+Pn+Z7ZifO/LL+NQpCcYCebJx6bvxtDs1NnP117RufOigDGqIgXSjsSpQcvWDb9tvQFELpsvn42Mk+pMo6bp6iKoEacvFY47VdSNJ1OY9ScD6oqop66g6Sw/a3ncCCICENhnJjg7mDfcjxLS/sifAYoPwYrLwLBRYciGyQtKBWcD3/SGB5W14kAsHWslHFJA31BBJlKWrDQgLa8TbdwI7MymgpDWUJsBWuj+1Li9pQEoKboS/hkJ6G3BaHwF0xakkoS9B1W9jETV1KE3TdZkjvDXXcJo0uIPbLfxE0/+5AQkr6cCqLsx4lj/2egeIo3nFSWa/+K4HTRGq+1dQOZAj4lYiinFXPbcUQQ6MV01FZAggNm0MERdRMdSBzTBLZF42iovnT1ugQ/lowyrViAks1WtIq0cPCqCLnc2q5v44A3H/UHwz9UcgnIAx09V1dxa+una8YdUMxTzzwXrYCj/YsPzoLFRiyGLLZh+BCy2uT6JGghlJAfDKwolc5h0yU5c7VyytfXln71vY7WQLb67R7q8gFDBKhPxOVbW45dzwOSbqS6FWMh+sv4kF0AwuPBErE/eE1XN35LSsRxH36/nnoEfdqI9kvSPrM4bdI3MbDhUMZYUdLR+Znzl24+SkeWkMp1s3JqaFjY6Uje/+TyX9/9v9V7BPs7fhLgAEAm6sRCKh1afsAAAAASUVORK5CYII= + Method + GET + Name + Mojeek + URLTemplate + https://www.mojeek.com/search?q={searchTerms} + + + Description + Search nothing... + Method + GET + Name + No Search + URLTemplate + https://nosearch.invalid/{searchTerms} + + + Description + Search Qwant + IconURL + data:image/x-icon;base64,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 + Method + GET + Name + Qwant + SuggestURLTemplate + https://api.qwant.com/v3/suggest/?q={searchTerms} + URLTemplate + https://www.qwant.com?q={searchTerms} + + + Description + Search Qwant Junior + IconURL + data:image/x-icon;base64,AAABAAEAMDAAAAEAIACoJQAAFgAAACgAAAAwAAAAYAAAAAEAIAAAAAAAACQAABMLAAATCwAAAAAAAAAAAAAAAAAAAAAAAP///wLY1f9o1dX/ytjX//jX1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1//419X/ytfX/2f///8CAAAAAAAAAAAAAAAA09P/HdbW/9XX1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v/V09P/HQAAAACAgP8C1tX/1dfW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b/1f///wLV1f9o19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9XV/2jX1f/K19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9XV/8rX1//419b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//nX1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//8PB5f+QjqT/Yl5p/1JPVf9QTVP/Z2Rv/46Lof/R0Pf/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///Ny/L/fHmK/zMvLf8vKyj/Lyso/y8rKP8vKyj/Lyso/y8rKP+amLH/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//8fG6/9NSk7/Lyso/y8rKP8vKyj/Lyso/y8rKP8vKyj/Lyso/y8rKP92c4P/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//zMvx/0pHS/8vKyj/Lyso/y8rKP8vKyj/Lyso/y8rKP8vKyj/Lyso/y8rKP9VUVf/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///T0vr/X1tl/y8rKP8vKyj/U09V/4aEmP+pp8T/s7HR/6qoxf+Cf5H/VFFY/y8rKP81MS//1tX+/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//uLbX/5iWrv91coH/Lyso/y8rKP9XU1v/k5Cn/6+uzP/X1v//19b//9fW///X1v//19b//6mmw/9bWGD/y8rw/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//1dT9/5aTq/9KR0v/Lyso/y8rKP8vKyj/Lyso/y8rKP8vKyj/Lyso/y8rKP8+Ojv/hYKV/8zK8P/X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///AvuL/SUZK/y8rKP8vKyj/Lyso/z87PP95dob/oZ+6/6Gfuf98eov/REBD/y8rKP8vKyj/Lyso/z05Ov+trMr/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//7i31/88ODn/Lyso/y8rKP8vKyj/ZGFs/8bE6f/X1v//19b//9fW///X1v//zszz/25ref8vKyj/Lyso/y8rKP8yLiz/m5mz/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//w8Ll/z46PP8vKyj/Lyso/y8rKP9OS1D/zMvx/9fW///X1v//19b//9fW///X1v//19b//9PS+v9WUlr/Lyso/y8rKP8vKyj/My8t/7Ox0f/X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//aWdz/y8rKP8vKyj/Lyso/y8rKP+npcH/19b//9fW///X1v//19b//9fW///X1v//19b//9fW//+1s9P/Lysp/y8rKP8vKyj/Lyso/0xITf/U0vv/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//++vN//Mi4s/y8rKP8vKyj/Lyso/zczMv/Qz/f/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//WFRc/y8rKP8vKyj/Lyso/y8rKP+job3/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//+LiJ3/Lyso/y8rKP8vKyj/Lyso/2todP/X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//iYab/y8rKP8vKyj/Lyso/y8rKP9lYm3/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//9WU1n/Lyso/y8rKP8vKyj/Lyso/398jv/X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//q6nI/y8rKP8vKyj/Lyso/y8rKP9BPT//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//9CPj//Lyso/y8rKP8vKyj/Lyso/5mXr//X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//t7XW/y8rKP8vKyj/Lyso/y8rKP8vKyj/y8rw/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//83MzP/Lyso/y8rKP8vKyj/Lyso/6qnxf/X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//w8Hk/zAsKv8vKyj/Lyso/y8rKP8vKyj/t7bX/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//80MTD/Lyso/y8rKP8vKyj/Lyso/62ryf/X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//xMPn/zIuLP8vKyj/Lyso/y8rKP8vKyj/tbPT/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//86Njb/Lyso/y8rKP8vKyj/Lyso/6Wjv//X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//wcDj/y8sKf8vKyj/Lyso/y8rKP8vKyj/w8Ll/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//9QTVL/Lyso/y8rKP8vKyj/Lyso/4+No//X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//uLfX/y8rKP8vKyj/Lyso/y8rKP81MjD/1dX9/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//9tanf/Lyso/y8rKP8vKyj/Lyso/3Nwfv/X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//nZu1/y8rKP8vKyj/Lyso/y8rKP9MSU3/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//+lor7/Lyso/y8rKP8vKyj/Lyso/1FNU//X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//eXaG/y8rKP8vKyj/Lyso/y8rKP+Jhpv/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///W1f7/REFE/y8rKP8vKyj/Lyso/y8rKP+9u93/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///Qz/b/Q0BC/y8rKP8vKyj/Lyso/zczMv/Jx+z/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//n523/y8rKP8vKyj/Lyso/y8rKP90cYD/19b//9fW///X1v//19b//9fW///X1v//19b//9fW//+WlKz/Lyso/y8rKP8vKyj/Lyso/4OAk//X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//3x5iv8vKyj/Lyso/y8rKP8vKyj/lZOr/9fW///X1v//19b//9fW///X1v//19b//7u52/86Njb/Lyso/y8rKP8vKyj/W1hh/9XV/f/X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fV/v94dYT/Lyso/y8rKP8vKyj/MCwp/4J/k//Kye//19b//9fW///R0Pf/m5ix/z05Of8vKyj/Lyso/y8rKP9gXWf/z830/9fW///X1v//19b//9fW//+amLH/09L7/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//paO//0RAQ/8vKyj/Lyso/y8rKP8wLCn/R0RI/1BMUv81MTD/Lyso/y8rKP8vKyj/QDw8/4uJn//X1v7/19b//9fW///X1v//19b//9fW//9eW2X/ravK/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9XV/f+cmrT/Z2Rw/0E+P/8yLiz/Lyso/y8rKP8vKyn/QDw9/19bZf+Xlaz/y8nv/9fW///X1v//19b//9fW///X1v//19b//8/O9f8yLiz/hYKV/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///V1f3/x8Xp/8TD5v/Qz/f/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//6+ty/8vKyj/WFRc/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9PS+v+vrcz/goCS/0lGSv8vKyj/MCwq/29tev+Zl6//xcPo/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//w8Lm/01KT/8yLiz/Lyso/y8rKP8vKyj/Lyso/y8rKP8vKyj/OTU1/4F/kf/X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///JyO7/mpew/2FdaP8vKyj/ODQ0/4iGmv+xr87/1tX9/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//7Gwz/8vKyj/XFhh/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9PS+v84NDP/joyi/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///Y1//419b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//9hXWj/tbTU/9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//jY1v/J19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW//+urMr/19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fV/8rY1f9o19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9jV/2iAgP8C1tb/1dfW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b/1f///wIAAAAA3Nz/HdbV/9XX1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v/V3Nz/HQAAAAAAAAAAAAAAAP///wLX1/9n19X/ytjX//jX1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///X1v//19b//9fW///Y1//419X/ytfX/2f///8CAAAAAAAAAADAAAAAAAMAAIAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAAAAAAAQAAwAAAAAADAAA= + Method + GET + Name + Qwant Junior + SuggestURLTemplate + https://fdn.qwant.com/v3/egp/suggest/?q={searchTerms} + URLTemplate + https://www.qwantjunior.com?q={searchTerms} + + + Description + Search Startpage + IconURL + data:image/x-icon;base64,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 + Method + GET + Name + Startpage + SuggestURLTemplate + https://www.startpage.com/osuggestions?q={searchTerms} + URLTemplate + https://www.startpage.com/sp/search?query={searchTerms} + + + Description + Search Swisscows + IconURL + data:image/x-icon;base64,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 + Method + GET + Name + Swisscows + SuggestURLTemplate + https://swisscows.com/api/suggest?query={searchTerms} + URLTemplate + https://swisscows.com/web?query={searchTerms} + + + Default + DuckDuckGo + PreventInstalls + + Remove + + 1&1 Suche + Allegro + Amazon.ca + 亚马逊 + Amazon.co.jp + Amazon.co.uk + Amazon.com + Amazon.com.au + Amazon.de + Amazon.es + Amazon.fr + Amazon.in + Amazon.it + Amazon.nl + Amazon.se + 百度 + Bing + Ceneje.si + Cốc Cốc + 다음 + eBay + EUdict Eng->Cro + GMX - Búsqueda web + GMX - Recherche web + GMX Search + GMX Shopping + GMX Suche + Google + Gule sider + LEO Eng-Deu + พจนานุกรม ลองดู + mail.com + Поиск Mail.Ru + Mapy.cz + MercadoLibre Argentina + MercadoLibre Chile + MercadoLibre Mexico + MercadoLivre + 네이버 + Odpiralni Časi + Pazaruvaj + Priberam + Prisjakt + 楽天市場 + Readmoo 讀墨電子書 + Salidzini.lv + Seznam + Tyda.se + Vatera.hu + WEB.DE Suche + Wolne Lektury + Yahoo! JAPAN + Yahoo!オークション + Yandex + Яндекс + + + + diff --git a/policies.json b/policies.json index 20e18be..6c6db75 100644 --- a/policies.json +++ b/policies.json @@ -52,1110 +52,1392 @@ "ProviderURL": "https://dns.quad9.net/dns-query", "Fallback": false }, + "EnterprisePoliciesEnabled": true, "Preferences": { "accessibility.force_disabled": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "app.update.badgeWaitTime": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "app.update.notifyDuringDownload": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "app.update.promptWaitTime": { "Value": 3600, - "Status": "default" + "Status": "default", + "Type": "number" }, "browser.cache.disk.enable": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.cache.disk_cache_ssl": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.cache.jsbc_compression_level": { "Value": 3, - "Status": "default" + "Status": "default", + "Type": "number" }, "browser.compactmode.show": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.contentanalysis.default_result": { "Value": 0, - "Status": "locked" + "Status": "locked", + "Type": "number" }, "browser.contentanalysis.enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.contentanalysis.interception_point.clipboard.enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.contentanalysis.interception_point.drag_and_drop.enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.contentanalysis.interception_point.file_upload.enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.contentanalysis.interception_point.print.enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.contentanalysis.show_blocked_result": { "Value": true, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.contentblocking.category": { "Value": "strict", - "Status": "locked" + "Status": "locked", + "Type": "string" }, "browser.contentblocking.database.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.crashReports.unsubmittedCheck.autoSubmit2": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.crashReports.unsubmittedCheck.enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.display.use_system_colors": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.download.always_ask_before_handling_new_types": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.download.alwaysOpenPanel": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.download.clearHistoryOnDelete": { "Value": 2, - "Status": "default" + "Status": "default", + "Type": "number" }, "browser.download.enable_spam_prevention": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.download.loglevel": { "Value": "Error", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.download.manager.addToRecentDocs": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.download.open_pdf_attachments_inline": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.download.start_downloads_in_tmp_dir": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.download.useDownloadDir": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.eme.ui.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.formfill.enable": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.gnome-search-provider.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.helperApps.deleteTempFileOnExit": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.link.open_newwindow": { "Value": 3, - "Status": "default" + "Status": "default", + "Type": "number" }, "browser.link.open_newwindow.restriction": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "browser.ml.enable": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.opaqueResponseBlocking": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.opaqueResponseBlocking.javascriptValidator": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.places.interactions.enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.places.speculativeConnect.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.policies.loglevel": { "Value": "error", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.privatebrowsing.forceMediaMemoryCache": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.region.network.scan": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.region.network.url": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.region.update.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.rights.3.shown": { "Value": true, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.safebrowsing.blockedURIs.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.downloads.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.downloads.remote.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.downloads.remote.url": { "Value": "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.features.blockedURIs.update": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.features.cryptomining.annotate.update": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.features.cryptomining.update": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.features.downloads.update": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.features.emailtracking.update": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.features.emailtracking.datacollection.update": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.safebrowsing.features.fingerprinting.annotate.update": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.features.fingerprinting.update": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.features.malware.update": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.features.phishing.update": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.features.socialtracking.annotate.update": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.features.socialtracking.update": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.features.trackingAnnotation.update": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.features.trackingProtection.update": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.malware.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.phishing.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.safebrowsing.provider.google.advisoryName": { "Value": "Google Safe Browsing (Legacy)", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.provider.google.dataSharing.enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.safebrowsing.provider.google.gethashURL": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.provider.google.reportMalwareMistakeURL": { "Value": "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.provider.google.reportPhishMistakeURL": { "Value": "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.provider.google.reportURL": { "Value": "https://transparencyreport.google.com/safe-browsing/search?url=", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.provider.google.updateURL": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.provider.google4.dataSharing.enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.safebrowsing.provider.google4.dataSharingURL": { "Value": "", - "Status": "locked" + "Status": "locked", + "Type": "string" }, "browser.safebrowsing.provider.google4.gethashURL": { "Value": "https://safebrowsing.ironfoxoss.org/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.provider.google4.reportMalwareMistakeURL": { "Value": "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.provider.google4.reportPhishMistakeURL": { "Value": "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.provider.google4.reportURL": { "Value": "https://transparencyreport.google.com/safe-browsing/search?url=", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.provider.google4.updateURL": { "Value": "https://safebrowsing.ironfoxoss.org/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.provider.mozilla.updateURL": { "Value": "moz-sbrs:://antitracking", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.reportPhishURL": { "Value": "https://safebrowsing.google.com/safebrowsing/report_phish/?tpl=mozilla&url=", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.safebrowsing.update.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.search.separatePrivateDefault": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.search.separatePrivateDefault.ui.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.search.suggest.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.search.suggest.enabled.private": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" + }, + "browser.search.update": { + "Value": false, + "Status": "default", + "Type": "boolean" }, "browser.send_pings": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.send_pings.max_per_link": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "browser.send_pings.require_same_host": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.sessionhistory.max_total_viewers": { "Value": 7, - "Status": "default" + "Status": "default", + "Type": "number" }, "browser.sessionstore.disable_platform_collection": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.sessionstore.interval": { "Value": 60000, - "Status": "default" + "Status": "default", + "Type": "number" }, "browser.sessionstore.privacy_level": { "Value": 2, - "Status": "default" + "Status": "default", + "Type": "number" }, "browser.tabs.remote.coep.credentialles": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.tabs.remote.enforceRemoteTypeRestrictions": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.tabs.remote.separateFileUriProcess": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.tabs.remote.separatePrivilegedMozillaWebContentProcess": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "browser.tabs.remote.separatedMozillaDomains": { "Value": "", - "Status": "locked" + "Status": "locked", + "Type": "string" }, "browser.tabs.searchclipboardfor.middleclick": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.translations.alwaysTranslateLanguages": { "Value": "bg,ca,cs,da,de,el,en,es,et,fi,fr,hr,hu,id,it,ja,ko,lv,lt,nl,pl,pt,ro,ru,sk,sl,sr,sv,tr,uk,vi,zh-Hans", - "Status": "default" + "Status": "default", + "Type": "string" }, "browser.translations.automaticallyPopup": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.translations.enable": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.translations.select.enable": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.xul.error_pages.expert_bad_cert": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.xul.error_pages.show_safe_browsing_details_on_load": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "datareporting.policy.dataSubmissionEnabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "datareporting.policy.dataSubmissionPolicyAccepted": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "datareporting.policy.dataSubmissionPolicyBypassNotification": { "Value": true, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "datareporting.policy.firstRunURL": { "Value": "", - "Status": "locked" + "Status": "locked", + "Type": "string" }, "dom.block_download_insecure": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.block_external_protocol_in_iframes": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.block_external_protocol_navigation_from_sandbox": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.disable_open_during_load": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.disable_window_flip": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.disable_window_move_resize": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.ipc.processCount.privilegedmozilla": { "Value": 0, - "Status": "locked" + "Status": "locked", + "Type": "number" }, "dom.ipc.processCount.webIsolated": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "dom.origin-trials.coep-credentialless.state": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "dom.origin-trials.enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "dom.origin-trials.private-attribution.state": { "Value": 2, - "Status": "locked" + "Status": "locked", + "Type": "number" }, "dom.popup_allowed_events": { "Value": "click dblclick", - "Status": "default" + "Status": "default", + "Type": "string" }, "dom.postMessage.sharedArrayBuffer.bypassCOOP_COEP.insecure.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.postMessage.sharedArrayBuffer.withCOOP_COEP": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.prefetch_dns_for_anchor_http_document": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.prefetch_dns_for_anchor_https_document": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.private-attribution.submission.enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "dom.reporting.crash.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.reporting.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.reporting.featurePolicy.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.reporting.header.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.security.https_first": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.security.https_first_for_custom_ports": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.security.https_first_pbm": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.security.https_first_schemeless": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.security.https_only_mode": { "Value": true, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "dom.security.https_only_mode.upgrade_local": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.security.https_only_mode_error_page_user_suggestions": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.security.https_only_mode_pbm": { "Value": true, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "dom.security.https_only_mode_send_http_background_request": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.security.skip_about_page_has_csp_assert": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.security.trusted_types.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.security.unexpected_system_load_telemetry_enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "dom.webgpu.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.autoDisableScopes": { "Value": 15, - "Status": "locked" + "Status": "locked", + "Type": "number" }, "extensions.blocklist.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.enabledScopes": { "Value": 5, - "Status": "default" + "Status": "default", + "Type": "number" }, "extensions.experiments.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.formautofill.addresses.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.formautofill.creditCards.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.formautofill.ml.experiment.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.getAddons.browseAddons": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "extensions.getAddons.showPane": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.htmlaboutaddons.recommendations.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.install.requireBuiltInCerts": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.installDistroAddons": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.postDownloadThirdPartyPrompt": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantinedDomains.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.{b86e4813-687a-43e6-ab65-0bde4ab75758}": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.{d19a89b9-76c1-4a61-bcd4-49e8de916403}": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.ads@mozac.org": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.bravesearch@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.cookies@mozac.org": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.ddg@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.duckduckgo-html@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.duckduckgo-lite@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.ecosia@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.kagi@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.kagi-html@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.leta-brave@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.leta-google@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.metager@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.mojeek@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.no-search@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.qwant@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.qwant-junior@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.startpage@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.swisscows@celenity.dev": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.wikipedia@search.mozilla.org": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.recommendations.themeRecommendationUrl": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "extensions.systemAddon.update.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.ui.lastCategory": { "Value": "addons://list/extension", - "Status": "default" + "Status": "default", + "Type": "string" }, "extensions.update.autoUpdateDefault": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.update.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.update.interval": { "Value": 3600, - "Status": "default" + "Status": "default", + "Type": "number" }, "extensions.update.notifyUser": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.update.requireBuiltInCerts": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.webapi.testing": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.webapi.testing.http": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.webcompat.enable_shims": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.webcompat.perform_injections": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.webcompat.perform_ua_overrides": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.webcompat.smartblockEmbeds.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.webcompat-reporter.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.webcompat-reporter.newIssueEndpoint": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "extensions.webextensions.remote": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.webextensions.restrictedDomains": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "extensions.webservice.discoverURL": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "general.autoScroll": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "general.smoothScroll": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "gfx.canvas.accelerated": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "gfx.canvas.accelerated.cache-items": { "Value": 8192, - "Status": "default" + "Status": "default", + "Type": "number" }, "gfx.canvas.accelerated.cache-size": { "Value": 512, - "Status": "default" + "Status": "default", + "Type": "number" }, "gfx.content.skia-font-cache-size": { "Value": 20, - "Status": "default" + "Status": "default", + "Type": "number" }, "gfx.font_rendering.graphite.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "gfx.font_rendering.opentype_svg.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "geo.provider.ms-windows-location": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "geo.provider.network.logging.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "gfx.webrender.all": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "gfx.webrender.compositor": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "geo.wifi.scan": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "intl.allow-insecure-text-input": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "layout.css.prefers-color-scheme.content-override": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "layout.css.report_errors": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "layout.css.visited_links_enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "layout.forms.reveal-password-button.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "layout.spellcheckDefault": { "Value": 2, - "Status": "default" + "Status": "default", + "Type": "number" }, "media.autoplay.default": { "Value": 5, - "Status": "default" + "Status": "default", + "Type": "number" }, "media.cache_readahead_limit": { "Value": 7200, - "Status": "default" + "Status": "default", + "Type": "number" }, "media.cache_resume_threshold": { "Value": 3600, - "Status": "default" + "Status": "default", + "Type": "number" }, "media.clearkey.persistent-license.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.clearkey.test-key-systems.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.devices.insecure.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.eme.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.eme.encrypted-media-encryption-scheme.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.eme.hdcp-policy-check.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.eme.playready.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.eme.require-app-approval": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.eme.widevine.experiment.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.eme.wmf.clearkey.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.ffmpeg.vaapi.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.getusermedia.insecure.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.gmp.insecure.allow": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.gmp-manager.cert.checkAttributes": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.gmp-manager.cert.requireBuiltIn": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.gmp-manager.checkContentSignature": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.gmp-manager.updateEnabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.gmp-widevinecdm.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.gmp-widevinecdm.visible": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.gmp-widevinecdm-l1.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.gmp-widevinecdm-l1.visible": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.memory_cache_max_size": { "Value": 65536, - "Status": "default" + "Status": "default", + "Type": "number" }, "media.peerconnection.ice.obfuscate_host_addresses": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.peerconnection.ice.proxy_only_if_behind_proxy": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.peerconnection.mtransport_process": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.webrtc.enable_pq_dtls": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.webspeech.synth.dont_notify_on_error": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.webvtt.testing.events": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.wmf.media-engine.enabled": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.auth.non-web-content-triggered-resources-http-auth-allow": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.auth.subresource-http-auth-allow": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.auth.subresource-img-cross-origin-http-auth-allow": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.captive-portal-service.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.connectivity-service.DNS_HTTPS.domain": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "network.connectivity-service.DNSv4.domain": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "network.connectivity-service.DNSv6.domain": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "network.connectivity-service.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.connectivity-service.IPv4.url": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "network.connectivity-service.IPv6.url": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "network.cookie.CHIPS.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.cookie.cookieBehavior": { "Value": 5, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.cookie.cookieBehavior.optInPartitioning": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.cookie.cookieBehavior.optInPartitioning.pbmode": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.cookie.cookieBehavior.pbmode": { "Value": 5, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.cookie.cookieBehavior.trackerCookieBlocking": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.cookie.sameSite.laxByDefault": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.cookie.sameSite.noneRequiresSecure": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.cookie.sameSite.schemeful": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.dns.disablePrefetch": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.dns.disablePrefetchFromHTTPS": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.dns.echconfig.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.dns.http3_echconfig.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.dns.native_https_query": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.dns.preferIPv6": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.dns.prefetch_via_proxy": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.dnsCacheEntries": { "Value": 1000, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.dnsCacheExpiration": { "Value": 3600, @@ -1163,979 +1445,1228 @@ }, "network.dnsCacheExpirationGracePeriod": { "Value": 240, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.early-hints.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.early-hints.over-http-v1-1.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.early-hints.preconnect.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.early-hints.preconnect.max_connections": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.file.disable_unc_paths": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.gio.supported-protocols": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "network.http.http3.enable_0rtt": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.http.http3.enable_kyber": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.http.max-connections": { "Value": 1800, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.http.max-persistent-connections-per-proxy": { "Value": 48, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.http.max-persistent-connections-per-server": { "Value": 10, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.http.max-urgent-start-excessive-connections-per-host": { "Value": 5, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.http.microsoft-entra-sso.container-enabled.0": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.http.microsoft-entra-sso.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.http.network_error_logging.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.http.referer.defaultPolicy.trackers": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.http.referer.defaultPolicy.trackers.pbmode": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.http.referer.disallowCrossSiteRelaxingDefault": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.http.referer.disallowCrossSiteRelaxingDefault.pbmode": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.http.referer.disallowCrossSiteRelaxingDefault.pbmode.top_navigation": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.http.referer.XOriginTrimmingPolicy": { "Value": 2, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.http.speculative-parallel-limit": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.http.windows-sso.container-enabled.0": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.http.windows-sso.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.IDN_show_punycode": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.jar.record_failure_reason": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "network.microsoft-sso-authority-list": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "network.negotiate-auth.trusted-uris": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "network.notify.checkForNRPT": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.notify.checkForProxies": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.preconnect": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.predictor.enable-hover-on-ssl": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.predictor.enable-prefetch": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.predictor.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.prefetch-next": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.proxy.allow_bypass": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.proxy.failover_direct": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.proxy.socks_remote_dns": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.proxy.socks5_remote_dns": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.protocol-handler.external.shell": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "network.protocol-handler.warn-external-default": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.traffic_analyzer.enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "network.trr.confirmation_telemetry_enabled": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "network.trr.confirmationNS": { "Value": "skip", - "Status": "default" + "Status": "default", + "Type": "string" }, "network.trr.default_provider_uri": { "Value": "https://dns.quad9.net/dns-query", - "Status": "default" + "Status": "default", + "Type": "string" }, "network.trr.disable-ECS": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.trr.display_fallback_warning": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.trr.mode": { "Value": 3, - "Status": "default" + "Status": "default", + "Type": "number" }, "network.trr.retry_on_recoverable_errors": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.trr.send_accept-language_headers": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.trr.send_empty_accept-encoding_headers": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.trr.send_user-agent_headers": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.trr.strict_native_fallback": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.trr_ui.show_fallback_warning_option": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.websocket.allowInsecureFromHTTPS": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "pdfjs.enablePermissions": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "pdfjs.enableScripting": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "pdfjs.enableXfa": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "pdfjs.sidebarViewOnLoad": { "Value": 2, - "Status": "default" + "Status": "default", + "Type": "number" }, "privacy.globalprivacycontrol.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "privacy.userContext.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "security.default_personal_cert": { "Value": "Ask Every Time", - "Status": "locked" + "Status": "locked", + "Type": "string" }, "security.insecure_connection_text.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "security.insecure_connection_text.pbmode.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "security.mixed_content.block_active_content": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "security.mixed_content.block_display_content": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "security.mixed_content.upgrade_display_content": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "security.OCSP.enabled": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "security.OCSP.require": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "security.pki.certificate_transparency.mode": { "Value": 2, - "Status": "default" + "Status": "default", + "Type": "number" }, "security.ssl.enable_ocsp_stapling": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "security.ssl.require_safe_negotiation": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "security.tls.enable_0rtt_data": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "security.tls.hello_downgrade_check": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "security.tls.version.enable-deprecated": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "security.warn_submit_secure_to_insecure": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "signon.autofillForms": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "signon.autofillForms.http": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "signon.firefoxRelay.feature": { "Value": "disabled", - "Status": "default" + "Status": "default", + "Type": "string" }, "signon.firefoxRelay.manage_url": { "Value": "https://relay.firefox.com/accounts/profile/", - "Status": "default" + "Status": "default", + "Type": "string" }, "signon.formlessCapture.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "signon.generation.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "signon.privateBrowsingCapture.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "signon.storeWhenAutocompleteOff": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "toolkit.legacyUserProfileCustomizations.stylesheets": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "ui.hideCursorWhileTyping": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "ui.key.menuAccessKeyFocuses": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "ui.panelAnimations": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "ui.prefersReducedMotion": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "ui.prefersReducedTransparency": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "ui.scrollToClick": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "ui.swipeAnimationEnabled": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "ui.useAccessibilityTheme": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "widget.non-native-theme.use-theme-accent": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "xpinstall.whitelist.required": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.phoenix.core.policies.status": { "Value": "successfully applied :D", - "Status": "locked" + "Status": "locked", + "Type": "string" }, "browser.download.manager.behavior": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "browser.download.manager.focusWhenStarting": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.download.manager.showAlertOnComplete": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.download.manager.showWhenStarting": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "browser.EULA.override": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" + }, + "browser.privatebrowsing.autostart": { + "Value": false, + "Status": "locked", + "Type": "boolean" }, "browser.rights.override": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "calendar.extract.service.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "chat.prpls.prpl-facebook.disable": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "chat.prpls.prpl-gtalk.disable": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "chat.prpls.prpl-twitter.disable": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "chat.prpls.prpl-yahoo.disable": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "dom.disable_window_status_change": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.abuseReport.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.cardbook.useOnlyEmail": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.arh.read": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.arh.replaceAddonResult": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.debug": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.display.favicon.show": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.display.keySecure": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.dkim.enable": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.dns.nameserver": { "Value": "9.9.9.9", - "Status": "default" + "Status": "default", + "Type": "string" }, "extensions.dkim_verifier.error.algorithm.rsa.weakKeyLength.treatAs": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "extensions.dkim_verifier.error.algorithm.sign.rsa-sha1.treatAs": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "extensions.dkim_verifier.error.detailedReasons": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.error.illformed_i.treatAs": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "extensions.dkim_verifier.error.illformed_s.treatAs": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "extensions.dkim_verifier.error.policy.key_insecure.treatAs": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "extensions.dkim_verifier.key.storing": { "Value": 2, - "Status": "default" + "Status": "default", + "Type": "number" }, "extensions.dkim_verifier.policy.DMARC.shouldBeSigned.enable": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.policy.DMARC.shouldBeSigned.neededPolicy": { "Value": "none", - "Status": "default" + "Status": "default", + "Type": "string" }, "extensions.dkim_verifier.policy.dkim.unsignedHeadersWarning.mode": { "Value": 30, - "Status": "default" + "Status": "default", + "Type": "number" }, "extensions.dkim_verifier.policy.signRules.autoAddRule.enable": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.policy.signRules.autoAddRule.for": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "extensions.dkim_verifier.policy.signRules.autoAddRule.onlyIfFromAddressInSDID": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.policy.signRules.checkDefaultRules": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.policy.signRules.enable": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.policy.signRules.error.wrong_sdid.asWarning": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.policy.signRules.sdid.allowSubDomains": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.saveResult": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.dkim_verifier.showDKIMFromTooltip": { "Value": 50, - "Status": "default" + "Status": "default", + "Type": "number" }, "extensions.dkim_verifier.showDKIMHeader": { "Value": 50, - "Status": "default" + "Status": "default", + "Type": "number" }, "extensions.getAddons.discovery.api_url": { "Value": "https://dove.celenity.dev/extensions/recommendations.json", - "Status": "default" + "Status": "default", + "Type": "string" }, "extensions.getAddons.search.browseURL": { "Value": "https://addons.thunderbird.net/%LOCALE%/%APP%/search/?q=%TERMS%", - "Status": "default" + "Status": "default", + "Type": "string" }, "extensions.quarantineIgnoredByUser.dkim_verifier@pl": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "extensions.quarantineIgnoredByUser.uBlock0@raymondhill.net": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "extensions.recommendations.privacyPolicyUrl": { "Value": "https://dove.celenity.dev/privacy#extension-recommendations", - "Status": "default" + "Status": "default", + "Type": "string" }, "extensions.strictCompatibility": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "geo.provider.network.url": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "boolean" }, "geo.provider.use_corelocation": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "geo.provider.use_geoclue": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.addressDisplayFormat": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "mail.biff.alert.show_preview": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.biff.alert.show_sender": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.biff.alert.show_subject": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.chat.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.chat.notification_info": { "Value": 2, - "Status": "default" + "Status": "default", + "Type": "number" }, "mail.cloud_files.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.collect_email_address_outgoing": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.compose.add_link_preview": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.compose.warn_public_recipients.aggressive": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.dark-reader.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.dark-reader.show-toggle": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.default_send_format": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "mail.e2ee.auto_enable": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.e2ee.auto_disable": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "mail.e2ee.notify_on_auto_disable": { "Value": true, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "mail.external_protocol_requires_permission": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.html_compose": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.html_sanitize.drop_conditional_css": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.identity.default.compose_html": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.identity.default.sign_mail": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.imap.use_disk_cache2": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.mdn.report.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.mdn.report.not_in_to_cc": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "mail.mdn.report.outside_domain": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "mail.mdn.report.other": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "mail.openpgp.allow_external_gnupg": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.openpgp.remind_encryption_possible": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.phishing.detection.disallow_form_actions": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.phishing.detection.enabled": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.phishing.detection.ipaddresses": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.phishing.detection.mismatched_hosts": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.provider.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.provider.suppress_dialog_on_startup": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.rights.override": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.sanitize_date_header": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.save_msg_filename_underscores_for_space": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.server.default.mdn_not_in_to_cc": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "mail.server.default.mdn_other": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "mail.server.default.mdn_outside_domain": { "Value": 0, - "Status": "default" + "Status": "default", + "Type": "number" }, "mail.server.default.mdn_report_enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.shell.checkDefaultClient": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.show_headers": { "Value": 2, - "Status": "default" + "Status": "default", + "Type": "number" }, "mail.showCondensedAddresses": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.smime.accept_insecure_sha1_message_signatures": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.smime.remind_encryption_possible": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.smtpserver.default.hello_argument": { "Value": "[127.0.0.1]", - "Status": "default" + "Status": "default", + "Type": "string" }, "mail.spellcheck.inline": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.SpellCheckBeforeSend": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.spotlight.enable": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.spotlight.firstRunDone": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.suppress_content_language": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.winsearch.enable": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.winsearch.firstRunDone": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.auto_config.fetchFromISP.sendEmailAddress": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.auto_config.fetchFromISP.sslOnly": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.auto_config.guess.requireGoodCert": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.auto_config.guess.sslOnly": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.display.date_senders_timezone": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.display.disallow_mime_handlers": { "Value": 3, - "Status": "default" + "Status": "default", + "Type": "number" }, "mailnews.display.html_as": { "Value": 3, - "Status": "default" + "Status": "default", + "Type": "number" }, "mailnews.display.prefer_plaintext": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.downloadToTempFile": { "Value": false, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "mailnews.headers.sendUserAgent": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.headers.showMessageId": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.headers.showOrganization": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.headers.showReferences": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.headers.showSender": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.headers.showUserAgent": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.headers.useMinimalUserAgent": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.message_display.disable_remote_image": { "Value": true, - "Status": "locked" + "Status": "locked", + "Type": "boolean" }, "mailnews.oauth.usePrivateBrowser": { "Value": false, - "Status": "default" + "Status": "locked", + "Type": "boolean" }, "mailnews.reply_header_authorwroteondate": { "Value": "#1 wrote on #2 #3:", - "Status": "default" + "Status": "default", + "Type": "string" }, "mailnews.reply_header_authorwrotesingle": { "Value": "#1 wrote:", - "Status": "default" + "Status": "default", + "Type": "string" }, "mailnews.reply_header_ondateauthorwrote": { "Value": "On #2 #3, #1 wrote:", - "Status": "default" + "Status": "default", + "Type": "string" }, "mailnews.reply_header_type": { "Value": 1, - "Status": "default" + "Status": "default", + "Type": "number" }, "mailnews.show_send_progress": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.start_page.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mailnews.start_page.override_url": { "Value": "", - "Status": "default" + "Status": "default", + "Type": "string" }, "mailnews.start_page.url": { "Value": "about:config", - "Status": "default" + "Status": "default", + "Type": "string" }, "mailnews.start_page_override.mstone": { "Value": "ignore", - "Status": "default" + "Status": "default", + "Type": "string" }, "media.autoplay.blocking_policy": { "Value": 2, - "Status": "default" + "Status": "default", + "Type": "number" }, "media.gmp-gmpopenh264.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.gmp-gmpopenh264.provider.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.gmp-gmpopenh264.visible": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.gmp-provider.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.peerconnection.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.peerconnection.ice.default_address_only": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.peerconnection.ice.no_host": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "media.peerconnection.ice.relay_only": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.cookie.noPersistentStorage": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "network.http.referer.XOriginPolicy": { "Value": 2, - "Status": "user" + "Status": "user", + "Type": "number" }, "pdfjs.firstRun": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "places.history.enabled": { "Value": false, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "signon.rememberSignons": { "Value": true, - "Status": "default" + "Status": "default", + "Type": "boolean" }, "mail.dove.policies.status": { "Value": "successfully applied :D", - "Status": "locked" + "Status": "locked", + "Type": "string" } }, "Proxy": { diff --git a/prefs/dove.js b/prefs/dove.js index 2fb605c..89c9b9c 100644 --- a/prefs/dove.js +++ b/prefs/dove.js @@ -16,7 +16,7 @@ // Welcome to the heart of the Phoenix. // This file contains preferences shared across all Phoenix configs, platforms (Desktop & Android), and Dove. -pref("browser.phoenix.version", "2025.02.14.1", locked); +pref("browser.phoenix.version", "2025.02.18.1", locked); // 000 ABOUT:CONFIG @@ -841,6 +841,7 @@ pref("browser.phoenix.core.status", "014"); pref("pdfjs.enableScripting", false); /// Disable XFA +// https://learn.microsoft.com/deployedge/microsoft-edge-policies#viewxfapdfiniemodeallowedorigins // https://insert-script.blogspot.com/2019/01/adobe-reader-pdf-callback-via-xslt.html // https://www.sentinelone.com/blog/malicious-pdfs-revealing-techniques-behind-attacks/ // https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=xfa @@ -1396,6 +1397,14 @@ pref("dom.origin-trials.coep-credentialless.state", 1); // https://searchfox.org pref("browser.tabs.remote.enforceRemoteTypeRestrictions", true); // [DEFAULT - Nightly Desktop] +/// Disable automatic updates for OpenSearch engines +// Doesn't appear to impact Mozilla's built-in search engines +// Also has privacy implications (extra unsolicited connections to third parties...) +// https://firefox-source-docs.mozilla.org/toolkit/search/Preferences.html#hidden +// https://developer.mozilla.org/docs/Web/XML/Guides/OpenSearch#supporting_automatic_updates_for_opensearch_plugins + +pref("browser.search.update", false); // [DEFAULT - Android] + pref("browser.phoenix.core.status", "020"); // 021 BLOCK COOKIE BANNERS @@ -1406,7 +1415,6 @@ pref("cookiebanners.service.mode", 1); pref("cookiebanners.service.mode.privateBrowsing", 1); // [DEFAULT - Nightly Android] pref("cookiebanners.service.enableGlobalRules", true); // [DEFAULT] pref("cookiebanners.service.enableGlobalRules.subFrames", true); // [DEFAULT] -pref("cookiebanners.ui.desktop.enabled", true); pref("browser.phoenix.core.status", "021"); @@ -1667,13 +1675,13 @@ pref("security.enterprise_roots.enabled", false, locked); pref("browser.phoenix.desktop.common.status", "003"); -// 004 GEOLOCATION +// 004 GEOLOCATION [NO-OSX] -/// Configure OS Geolocation providers +/// Configure OS Geolocation providers [NO-OSX] -pref("geo.provider.ms-windows-location", false); // Disable Microsoft Location Services for Windows users +pref("geo.provider.ms-windows-location", false); // Disable Microsoft Location Services for Windows users [NO-OSX] -pref("browser.phoenix.desktop.common.status", "004"); +pref("browser.phoenix.desktop.common.status", "004"); // [NO-OSX] // 005 DISK AVOIDANCE @@ -1686,9 +1694,9 @@ pref("privacy.cpd.cache", true); // [DEFAULT] pref("privacy.sanitize.timeSpan", 0); -/// Prevent automatically starting Firefox & restoring session after reboot on Windows +/// Prevent automatically starting Firefox & restoring session after reboot on Windows [NO-OSX] -pref("toolkit.winRegisterApplicationRestart", false); +pref("toolkit.winRegisterApplicationRestart", false); // [NO-OSX] pref("browser.phoenix.desktop.common.status", "005"); @@ -1707,9 +1715,9 @@ pref("browser.phoenix.desktop.common.status", "006"); // 007 MISC. PRIVACY -/// [WINDOWS] Ensure we never save clipboard history/contents to the cloud... +/// [WINDOWS] Ensure we never save clipboard history/contents to the cloud... [NO-OSX] -pref("clipboard.copyPrivateDataToClipboardCloudOrHistory", false); // [DEFAULT] +pref("clipboard.copyPrivateDataToClipboardCloudOrHistory", false); // [DEFAULT] [NO-OSX] /// Disable Firefox Sync by default // When signing in to Firefox Sync, this controls the items (checkboxes) that are set to sync (under about:preferences#sync). @@ -1745,19 +1753,19 @@ pref("browser.phoenix.desktop.common.status", "008"); // 009 MISC. SECURITY -/// [WINDOWS] Disable Win32k System Calls -// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15638 -// https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html -// https://docs.google.com/document/d/1gJDlk-9xkh6_8M_awrczWCaUuyr0Zd2TKjNBCiPO_G4/edit +/// [WINDOWS] Disable Win32k System Calls [NO-OSX] +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#15638 [NO-OSX] +// https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html [NO-OSX] +// https://docs.google.com/document/d/1gJDlk-9xkh6_8M_awrczWCaUuyr0Zd2TKjNBCiPO_G4/edit [NO-OSX] -pref("security.sandbox.content.win32k-disable", true); // [DEFAULT] -pref("security.sandbox.gmp.win32k-disable", true); -pref("security.sandbox.socket.win32k-disable", true); // [DEFAULT] +pref("security.sandbox.content.win32k-disable", true); // [DEFAULT] [NO-OSX] +pref("security.sandbox.gmp.win32k-disable", true); // [NO-OSX] +pref("security.sandbox.socket.win32k-disable", true); // [DEFAULT] [NO-OSX] -/// Disable GNOME Integration -// https://searchfox.org/mozilla-central/source/browser/components/shell/nsGNOMEShellService.cpp +/// Disable GNOME Integration [NO-OSX] +// https://searchfox.org/mozilla-central/source/browser/components/shell/nsGNOMEShellService.cpp [NO-OSX] -pref("browser.gnome-search-provider.enabled", false); // [HIDDEN] +pref("browser.gnome-search-provider.enabled", false); // [HIDDEN] [NO-OSX] /// If a remote AutoConfig is being used, block it from gaining privileged browser access... // https://www.mozilla.org/firefox/62.0/releasenotes/ @@ -1768,29 +1776,29 @@ pref("browser.phoenix.desktop.common.status", "009"); // 010 MEDIA -/// Always sandbox GMP on GNU/Linux -// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml +/// Always sandbox GMP on GNU/Linux [NO-OSX] +// https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml [NO-OSX] -pref("media.gmp.insecure.allow", false); // [DEFAULT] +pref("media.gmp.insecure.allow", false); // [DEFAULT] [NO-OSX] /// Remove DRM toggle in `about:preferences#general` pref("browser.eme.ui.enabled", false); -/// Disable Microsoft PlayReady DRM +/// Disable Microsoft PlayReady DRM [NO-OSX] -pref("media.eme.playready.enabled", false); +pref("media.eme.playready.enabled", false); // [NO-OSX] -/// Explicitly disable Windows Media Foundation Clearkey DRM +/// Explicitly disable Windows Media Foundation Clearkey DRM [NO-OSX] -pref("media.eme.wmf.clearkey.enabled", false); // [DEFAULT] +pref("media.eme.wmf.clearkey.enabled", false); // [DEFAULT] [NO-OSX] -/// Disable Windows Media Foundation Media Engine -// By default, it's enabled for protected content (DRM) -// Enabling it for standard content appears to cause video playback issues (ex. on YouTube) -// https://learn.microsoft.com/windows/win32/medfound/about-the-media-foundation-sdk +/// Disable Windows Media Foundation Media Engine [NO-OSX] +// By default, it's enabled for protected content (DRM) [NO-OSX] +// Enabling it for standard content appears to cause video playback issues (ex. on YouTube) [NO-OSX] +// https://learn.microsoft.com/windows/win32/medfound/about-the-media-foundation-sdk [NO-OSX] -pref("media.wmf.media-engine.enabled", 0); +pref("media.wmf.media-engine.enabled", 0); // [NO-OSX] /// Enable click to play UI for certain CSS skins by default... // https://github.com/black7375/Firefox-UI-Fix/blob/master/css/leptonContent.css#L223 @@ -1834,7 +1842,7 @@ pref("browser.phoenix.desktop.common.status", "013"); // 014 PERFORMANCE // A lot of these taken from https://github.com/yokoffing/Betterfox/blob/main/Fastfox.js -pref("media.ffmpeg.vaapi.enabled", true); // Enable VA-API by default +pref("media.ffmpeg.vaapi.enabled", true); // Enable VA-API by default [NO-OSX] pref("network.http.max-connections", 1800); // [Default = 900] /// Disables certain UI animations @@ -2015,7 +2023,7 @@ pref("browser.phoenix.extended.desktop.common.status", "successfully applied :D" // Built from Phoenix (Extended) -pref("mail.dove.version", "2025.02.14.1", locked); +pref("mail.dove.version", "2025.02.18.1", locked); pref("mail.dove.status", "000"); @@ -2624,12 +2632,12 @@ pref("mailnews.oauth.usePrivateBrowser", false, locked); // Breaks uBlock Origin pref("mail.dove.status", "013"); -// 014 Enable support for custom/specialized configs... +// 014 Enable support for custom/specialized configs... // [NO-OSX] -pref("general.config.filename", "dove.cfg"); -pref("general.config.vendor", "dove"); -pref("general.config.obscure_value", 0); +pref("general.config.filename", "dove.cfg"); // [NO-OSX] +pref("general.config.vendor", "dove"); // [NO-OSX] +pref("general.config.obscure_value", 0); // [NO-OSX] -pref("mail.dove.status", "014"); +pref("mail.dove.status", "014"); // [NO-OSX] pref("mail.dove.status", "successfully applied :D", locked);