diff --git a/user.js b/user.js index 55cdd89..ed9951a 100644 --- a/user.js +++ b/user.js @@ -202,7 +202,7 @@ user_pref("browser.search.update", false); user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false); /* 0310: disable sending the URL of the website where a plugin crashed ***/ user_pref("dom.ipc.plugins.reportCrashURL", false); -/* 0320: disable about:addons' Get Add-ons panel (uses Google-Analytics) ***/ +/* 0320: disable about:addons' Get Add-ons panel (uses Google Analytics) ***/ user_pref("extensions.getAddons.showPane", false); // [HIDDEN PREF] user_pref("extensions.webservice.discoverURL", ""); /* 0330: disable telemetry @@ -696,7 +696,7 @@ user_pref("browser.sessionstore.privacy_level", 2); // user_pref("browser.sessionstore.resume_from_crash", false); /* 1023: set the minimum interval between session save operations * Increasing this can help on older machines and some websites, as well as reducing writes, see [1] - * Default is 15000 (15 secs). Try 30000 (30sec), 60000 (1min) etc + * Default is 15000 (15 secs). Try 30000 (30 secs), 60000 (1 min) etc * [SETUP-CHROME] This can also affect entries in the "Recently Closed Tabs" feature: * i.e. the longer the interval the more chance a quick tab open/close won't be captured. * This longer interval *may* affect history but we cannot replicate any history not recorded @@ -912,7 +912,7 @@ user_pref("gfx.font_rendering.graphite.enabled", false); Our default settings provide the best balance between protection and amount of breakage. To harden it a bit more you can set XOriginPolicy (1603) to 2 (+ optionally 1604 to 1 or 2). To fix broken sites (including your modem/router), temporarily set XOriginPolicy=0 and XOriginTrimmingPolicy=2 in about:config, - use the site and then change the values back. If you visit those sites regularly (e.g. Vimeo), use an extension. + use the site and then change the values back. If you visit those sites regularly (e.g. vimeo), use an extension. full URI: https://example.com:8888/foo/bar.html?id=1234 scheme+host+port+path: https://example.com:8888/foo/bar.html @@ -1416,7 +1416,7 @@ user_pref("network.cookie.leave-secure-alone", true); // [DEFAULT: true] * To control *website* IDB data, control allowing cookies and service workers, or use * Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize * on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically - * via an extenion. Note that IDB currently cannot be sanitized by host. + * via an extension. Note that IDB currently cannot be sanitized by host. * [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/ ***/ user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true] /* 2730: disable offline cache ***/ @@ -1732,7 +1732,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!"); // user_pref("browser.backspace_action", 2); // 0=previous page, 1=scroll up, 2=do nothing // user_pref("browser.tabs.closeWindowWithLastTab", false); // user_pref("browser.tabs.loadBookmarksInTabs", true); // open bookmarks in a new tab [FF57+] - // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see Bugzilla 1320061 [FF53+] + // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see bugzilla 1320061 [FF53+] // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [WINDOWS] [MAC] // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART] /* OTHER ***/ @@ -1741,7 +1741,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!"); // [SETTING] General>Browsing>Recommend extensions as you browse // [1] https://support.mozilla.org/en-US/kb/extension-recommendations // user_pref("identity.fxaccounts.enabled", false); // disable and hide Firefox Accounts and Sync [FF60+] [RESTART] - // user_pref("network.manage-offline-status", false); // see Bugzilla 620472 + // user_pref("network.manage-offline-status", false); // see bugzilla 620472 // user_pref("reader.parse-on-load.enabled", false); // "Reader View" // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)