[tbb-commits] [tor-browser/tor-browser-91.3.0esr-11.0-1] fixup! TB4: Tor Browser's Firefox preference overrides.
sysrqb at torproject.org
sysrqb at torproject.org
Tue Nov 2 21:00:28 UTC 2021
commit ae322f3e7a10be7445b5c5d592ae002ce7040267
Author: Matthew Finkel <sysrqb at torproject.org>
Date: Mon Nov 1 20:29:48 2021 +0000
fixup! TB4: Tor Browser's Firefox preference overrides.
---
browser/app/profile/000-tor-browser.js | 25 -------------------------
1 file changed, 25 deletions(-)
diff --git a/browser/app/profile/000-tor-browser.js b/browser/app/profile/000-tor-browser.js
index ed8c4c8c80dd..867bcf2b662f 100644
--- a/browser/app/profile/000-tor-browser.js
+++ b/browser/app/profile/000-tor-browser.js
@@ -48,7 +48,6 @@ pref("browser.disableResetPrompt", true);
// Disk activity: Disable Browsing History Storage
pref("browser.privatebrowsing.autostart", true);
pref("browser.cache.disk.enable", false);
-pref("browser.cache.offline.enable", false);
pref("permissions.memory_only", true);
pref("network.cookie.lifetimePolicy", 2);
pref("security.nocertdb", true);
@@ -69,8 +68,6 @@ pref("browser.sessionstore.privacy_level", 2);
// Use the in-memory media cache and increase its maximum size (#29120)
pref("browser.privatebrowsing.forceMediaMemoryCache", true);
pref("media.memory_cache_max_size", 16384);
-// Disable site-specific browsing to avoid sharing site icons with the OS.
-pref("browser.ssb.enabled", false);
// Misc privacy: Remote
pref("browser.send_pings", false);
@@ -164,7 +161,6 @@ pref("dom.serviceWorkers.enabled", false);
pref("dom.push.enabled", false);
// Fingerprinting
-pref("webgl.disable-extensions", true);
pref("webgl.disable-fail-if-major-performance-caveat", true);
pref("webgl.enable-webgl2", false);
pref("gfx.downloadable_fonts.fallback_delay", -1);
@@ -177,9 +173,7 @@ pref("privacy.resistFingerprinting", true);
pref("privacy.resistFingerprinting.block_mozAddonManager", true); // Bug 26114
pref("dom.webaudio.enabled", false); // Bug 13017: Disable Web Audio API
pref("dom.w3c_touch_events.enabled", 0); // Bug 10286: Always disable Touch API
-pref("dom.w3c_pointer_events.enabled", false);
pref("dom.vr.enabled", false); // Bug 21607: Disable WebVR for now
-// Disable randomised Firefox HTTP cache decay user test groups (Bug: 13575)
pref("security.webauth.webauthn", false); // Bug 26614: Disable Web Authentication API for now
// Disable SAB, no matter if the sites are cross-origin isolated.
pref("dom.postMessage.sharedArrayBuffer.withCOOP_COEP", false);
@@ -241,8 +235,6 @@ pref("network.protocol-handler.warn-external.snews", true);
// Make sure we don't have any GIO supported protocols (defense in depth
// measure)
pref("network.gio.supported-protocols", "");
-pref("plugin.disable", true); // Disable to search plugins on first start
-pref("plugin.state.flash", 0); // Disable for defense-in-depth
pref("media.peerconnection.enabled", false); // Disable WebRTC interfaces
// Disables media devices but only if `media.peerconnection.enabled` is set to
// `false` as well. (see bug 16328 for this defense-in-depth measure)
@@ -278,9 +270,6 @@ pref("network.file.disable_unc_paths", true);
// Enhance our treatment of file:// to avoid proxy bypasses (see Mozilla's bug
// 1412081)
pref("network.file.path_blacklist", "/net");
-// Make sure no enterprise policy can interfere with our proxy settings, see
-// #29916.
-pref("browser.policies.testing.disallowEnterprise", true);
// Security slider
pref("svg.in-content.enabled", true);
@@ -308,24 +297,15 @@ pref("extensions.autoDisableScopes", 0);
pref("extensions.bootstrappedAddons", "{}");
pref("extensions.checkCompatibility.4.*", false);
pref("extensions.databaseSchema", 3);
-pref("extensions.enabledAddons", "https-everywhere%40eff.org:3.1.4,%7B73a6fe31-595d-460b-a920-fcc0f8843232%7D:2.6.6.1,torbutton%40torproject.org:1.5.2,ubufox%40ubuntu.com:2.6,%7B972ce4c6-7e08-4474-a285-3208198ce6fd%7D:17.0.5");
-pref("extensions.enabledItems", "langpack-en-US at firefox.mozilla.org:,{73a6fe31-595d-460b-a920-fcc0f8843232}:1.9.9.57,{e0204bd5-9d31-402b-a99d-a6aa8ffebdca}:1.2.4,{972ce4c6-7e08-4474-a285-3208198ce6fd}:3.5.8");
pref("extensions.enabledScopes", 5); // AddonManager.SCOPE_PROFILE=1 | AddonManager.SCOPE_APPLICATION=4
pref("extensions.pendingOperations", false);
-pref("xpinstall.whitelist.add", "");
-pref("xpinstall.whitelist.add.36", "");
// We don't know what extensions Mozilla is advertising to our users and we
// don't want to have some random Google Analytics script running either on the
// about:addons page, see bug 22073, 22900 and 31601.
pref("extensions.getAddons.showPane", false);
pref("extensions.htmlaboutaddons.recommendations.enabled", false);
-// Show our legacy extensions directly on about:addons and get rid of the
-// warning for the default theme.
-pref("extensions.legacy.exceptions", "{972ce4c6-7e08-4474-a285-3208198ce6fd},torbutton at torproject.org");
// Bug 26114: Allow NoScript to access addons.mozilla.org etc.
pref("extensions.webextensions.restrictedDomains", "");
-// Bug 28896: Make sure our bundled WebExtensions are running in Private Browsing Mode
-pref("extensions.allowPrivateBrowsingByDefault", true);
// Don't give Mozilla-recommended third-party extensions special privileges.
pref("extensions.postDownloadThirdPartyPrompt", false);
@@ -355,11 +335,6 @@ pref("security.certerrors.mitm.auto_enable_enterprise_roots", false);
pref("extensions.langpacks.signatures.required", false);
#endif
-// Avoid report TLS errors to Mozilla. We might want to repurpose this feature
-// one day to help detecting bad relays (which is bug 19119). For now we just
-// hide the checkbox, see bug 22072.
-pref("security.ssl.errorReporting.enabled", false);
-
// Workaround for https://bugs.torproject.org/13579. Progress on
// `about:downloads` is only shown if the following preference is set to `true`
// in case the download panel got removed from the toolbar.
More information about the tbb-commits
mailing list