From 8783ae9ce8541966274a6916b9f14446c6508352 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 31 May 2018 01:35:51 +0000
Subject: [PATCH 0001/1147] start 61 commits

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 89b9724..621d005 100644
--- a/user.js
+++ b/user.js
@@ -1,8 +1,8 @@
 /******
 * name: ghacks user.js
 * date: 30 May 2018
-* version 60: Call Me Pants, Maybe
-*   "Your stare was holding, ripped JEANS, skin was showin'"
+* version 61-alpha: You Can't Hurry Pants
+*   "My mama said, "You can't hurry pants. No, you'll just have to wait""
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From c61e633236f030a279d38906cdb4849005260348 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 1 Jun 2018 04:32:52 +0000
Subject: [PATCH 0002/1147] 0707: added ref link

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 621d005..c968abb 100644
--- a/user.js
+++ b/user.js
@@ -471,7 +471,8 @@ user_pref("network.proxy.autoconfig_url.include_path", false); // default: false
  * TRR = Trusted Recursive Resolver
  * .mode: 0=off, 1=race, 2=TRR first, 3=TRR only, 4=race for stats, but always use native result
  * [WARNING] DoH bypasses hosts and gives info to yet another party (e.g. Cloudflare)
- * [1] https://www.ghacks.net/2018/04/02/configure-dns-over-https-in-firefox/ ***/
+ * [1] https://www.ghacks.net/2018/04/02/configure-dns-over-https-in-firefox/
+ * [2] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/ ***/
    // user_pref("network.trr.mode", 0);
    // user_pref("network.trr.bootstrapAddress", "");
    // user_pref("network.trr.uri", "");

From a4a9b9a675df5f43e32d82062bd32e29f1ff4936 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 4 Jun 2018 00:23:16 +0000
Subject: [PATCH 0003/1147] cleanup #426

Both deprecated in FF61, but we'll remove them from the user.js
- `services.blocklist.signing.enforced` is default true since FF50
- `browser.storageManager.enabled` only controls "Site Data" UI visibility
---
 user.js | 2 --
 1 file changed, 2 deletions(-)

diff --git a/user.js b/user.js
index c968abb..064d24f 100644
--- a/user.js
+++ b/user.js
@@ -227,7 +227,6 @@ user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozi
  * As Firefox transitions to Kinto, the blocklists have been broken down into entries for certs to be
  * revoked, extensions and plugins to be disabled, and gfx environments that cause problems or crashes ***/
 user_pref("services.blocklist.update_enabled", true);
-user_pref("services.blocklist.signing.enforced", true);
 /* 0403: disable individual unwanted/unneeded parts of the Kinto blocklists ***/
    // user_pref("services.blocklist.onecrl.collection", ""); // revoked certificates
    // user_pref("services.blocklist.addons.collection", "");
@@ -1420,7 +1419,6 @@ user_pref("dom.caches.enabled", false);
  * [2] https://developer.mozilla.org/docs/Web/API/Storage_API
  * [3] https://blog.mozilla.org/l10n/2017/03/07/firefox-l10n-report-aurora-54/ ***/
    // user_pref("dom.storageManager.enabled", false); // (FF51+)
-   // user_pref("browser.storageManager.enabled", false); // controls "Site Data" UI visibility (FF53+)
 
 /*** 2800: SHUTDOWN [SETUP]
      You should set the values to what suits you best. Be aware that the settings below clear

From d9a1c83300f6aab3622d55f8b157304a254037a8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 4 Jun 2018 00:27:20 +0000
Subject: [PATCH 0004/1147] updated 03-Jun-2018

---
 scratchpad-scripts/ghacks-clear-[removed].js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index e84e6c6..5dff5dd 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -93,10 +93,12 @@
     'browser.slowStartup.maxSamples'
     'browser.slowStartup.notificationDisabled',
     'browser.slowStartup.samples',
+    'browser.storageManager.enabled',
     'dom.allow_scripts_to_close_windows',
     'dom.disable_window_flip',
     'network.http.fast-fallback-to-IPv4',
     'offline-apps.quota.warn',
+    'services.blocklist.signing.enforced',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From a2b5e1e7cfec152a94d3ec869591246b2cd2b47a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 4 Jun 2018 00:28:43 +0000
Subject: [PATCH 0005/1147] updated 03-Jun-2018

---
 scratchpad-scripts/ghacks-clear-[removed].js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 5dff5dd..c7e33f7 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 27-May-2018
+ Last updated: 03-Jun-2018
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]

From 05021ac62e4f33bd72e1d8dc00a28883715b66ae Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 20 Jun 2018 05:05:48 +0000
Subject: [PATCH 0006/1147] 2300: workers, fixes #446

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 064d24f..97e6a2a 100644
--- a/user.js
+++ b/user.js
@@ -1086,7 +1086,7 @@ user_pref("dom.popup_allowed_events", "click dblclick");
      including service and shared workers. Shared workers can be utilized by multiple scripts and
      communicate between browsing contexts (windows/tabs/iframes) and can even control your cache.
 
-     [WARNING] Disabling workers *will* break sites (e.g. Google Street View, Twitter).
+     [WARNING] Disabling "web workers" might break sites
      [UPDATE] uMatrix 1.2.0+ allows a per-scope control for workers (2301-deprecated) and service workers (2302)
               #Required reading [#] https://github.com/gorhill/uMatrix/releases/tag/1.2.0
 
@@ -2103,6 +2103,7 @@ user_pref("extensions.shield-recipe-client.api_url", "");
    // [-] https://bugzilla.mozilla.org/1433324
 user_pref("browser.newtabpage.activity-stream.enabled", false);
 // 2301: disable workers
+   // [WARNING] Disabling workers *will* break sites (e.g. Google Street View, Twitter)
    // [NOTE] CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed)
    // [-] https://bugzilla.mozilla.org/1434934
 user_pref("dom.workers.enabled", false);

From 1eac4185d23291dbb542c308eba34011da5220f1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 26 Jun 2018 03:48:47 +0000
Subject: [PATCH 0007/1147] 4500: RFP geo reverted 63+

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 97e6a2a..31e404a 100644
--- a/user.js
+++ b/user.js
@@ -1539,7 +1539,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true);
  ** 1337161 - hide gamepads from content (see 4606) (FF56+)
  ** 1372072 - spoof network information API as "unknown" (see 4607) (FF56+)
  ** 1333641 - reduce fingerprinting in WebSpeech API (see 4608) (FF56+)
- ** 1372069 & 1403813 - block geolocation requests (same as if you deny a site permission) (see 0201, 0211) (FF56+)
+ ** 1372069 & 1403813 & 1441295 - block geolocation requests (same as denying a site permission) (see 0201, 0211) (FF56-62)
  ** 1369309 - spoof media statistics (see 4610) (FF57+)
  ** 1382499 - reduce screen co-ordinate fingerprinting in Touch API (see 4611) (FF57+)
  ** 1217290 & 1409677 - enable fingerprinting resistance for WebGL (see 2010-12) (FF57+)

From 56acb4cff590941bb5b1e2a0fe491941bb653f96 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 4 Jul 2018 09:15:44 +0000
Subject: [PATCH 0008/1147] disable UNC paths

---
 user.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/user.js b/user.js
index 31e404a..cf99c44 100644
--- a/user.js
+++ b/user.js
@@ -478,6 +478,9 @@ user_pref("network.proxy.autoconfig_url.include_path", false); // default: false
 /* 0708: disable FTP (FF60+)
  * [1] https://www.ghacks.net/2018/02/20/firefox-60-with-new-preference-to-disable-ftp/ ***/
    // user_pref("network.ftp.enabled", false);
+/* 0709: disable using UNC (Uniform Naming Convention) paths (FF61+)
+ * [1] https://trac.torproject.org/projects/tor/ticket/26424 ***/
+user_pref("network.file.disable_unc_paths", true); // (hidden pref)
 
 /*** 0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS [SETUP]
      If you are in a private environment (no unwanted eyeballs) and your device is private

From 9386fb55819f960842a5328cb614e13899f5d805 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 4 Jul 2018 09:41:30 +0000
Subject: [PATCH 0009/1147] 61 deprecated/removed prefs

---
 user.js | 33 +++++++++++++++++++++------------
 1 file changed, 21 insertions(+), 12 deletions(-)

diff --git a/user.js b/user.js
index cf99c44..177d959 100644
--- a/user.js
+++ b/user.js
@@ -327,12 +327,6 @@ user_pref("privacy.trackingprotection.ui.enabled", true);
      [2] https://dxr.mozilla.org/mozilla-central/source/browser/extensions
 ***/
 user_pref("_user.js.parrot", "0500 syntax error: the parrot's cashed in 'is chips!");
-/* 0501: disable experiments
- * [1] https://wiki.mozilla.org/Telemetry/Experiments ***/
-user_pref("experiments.enabled", false);
-user_pref("experiments.manifest.uri", "");
-user_pref("experiments.supported", false);
-user_pref("experiments.activeExperiment", false);
 /* 0502: disable Mozilla permission to silently opt you into tests ***/
 user_pref("network.allow-experiments", false);
 /* 0503: disable Normandy/Shield (FF60+)
@@ -1245,12 +1239,6 @@ user_pref("mathml.disabled", true);
  * [1] https://trac.torproject.org/projects/tor/ticket/10089
  * [2] http://kb.mozillazine.org/Middlemouse.contentLoadURL ***/
 user_pref("middlemouse.contentLoadURL", false);
-/* 2612: disable remote JAR files being opened, regardless of content type (FF42+)
- * [1] https://bugzilla.mozilla.org/1173171
- * [2] https://www.fxsitecompat.com/en-CA/docs/2015/jar-protocol-support-has-been-disabled-by-default/ ***/
-user_pref("network.jar.block-remote-files", true);
-/* 2613: disable JAR from opening Unsafe File Types ***/
-user_pref("network.jar.open-unsafe-types", false);
 /* 2614: limit HTTP redirects (this does not control redirects with HTML meta tags or JS)
  * [WARNING] A low setting of 5 or under will probably break some sites (e.g. gmail logins)
  * To control HTML Meta tag and JS redirects, use an extension. Default is 20 ***/
@@ -2116,5 +2104,26 @@ user_pref("dom.workers.enabled", false);
 // * * * /
 // ***/
 
+/* ESR60.x still uses all the following prefs
+// [NOTE] replace the * with a slash in the line above to re-enable them
+// FF61
+// 0501: disable experiments
+   // [1] https://wiki.mozilla.org/Telemetry/Experiments
+   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1420908,1450801
+user_pref("experiments.enabled", false);
+user_pref("experiments.manifest.uri", "");
+user_pref("experiments.supported", false);
+user_pref("experiments.activeExperiment", false);
+// 2612: disable remote JAR files being opened, regardless of content type (FF42+)
+   // [1] https://bugzilla.mozilla.org/1173171
+   // [2] https://www.fxsitecompat.com/en-CA/docs/2015/jar-protocol-support-has-been-disabled-by-default/
+   // [-] https://bugzilla.mozilla.org/show_bug.cgi?id=1427726
+user_pref("network.jar.block-remote-files", true);
+// 2613: disable JAR from opening Unsafe File Types
+   // [-] https://bugzilla.mozilla.org/show_bug.cgi?id=1427726
+user_pref("network.jar.open-unsafe-types", false);
+// * * * /
+// ***/
+
 /* END: internal custom pref to test for syntax errors ***/
 user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");

From dceef9d1dbb8060be767f9fce3d7f3f07f3803f5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 4 Jul 2018 12:53:21 +0000
Subject: [PATCH 0010/1147] 0503: disable savant

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 177d959..759a470 100644
--- a/user.js
+++ b/user.js
@@ -336,6 +336,7 @@ user_pref("network.allow-experiments", false);
 user_pref("app.normandy.enabled", false);
 user_pref("app.normandy.api_url", "");
 user_pref("app.shield.optoutstudies.enabled", false);
+user_pref("shield.savant.enabled", false); // (FF61+)
 /* 0505: disable System Add-on updates
  * [NOTE] In FF61 and lower, you will not get any System Add-on updates except when you update Firefox ***/
    // user_pref("extensions.systemAddon.update.enabled", false); // (FF62+)

From 70abeda9d495edd72d5ca580233af17994e9ba49 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 4 Jul 2018 16:49:26 +0000
Subject: [PATCH 0011/1147] 2730 + 2750: Storage API + Offline Cache

https://bugzilla.mozilla.org/show_bug.cgi?id=1450448#c20
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 759a470..165f74d 100644
--- a/user.js
+++ b/user.js
@@ -1390,7 +1390,7 @@ user_pref("network.cookie.leave-secure-alone", true); // default: true
  * [WARNING] This *will* break other extensions including legacy, and *will* break some sites ***/
    // user_pref("dom.indexedDB.enabled", false);
 /* 2730: disable offline cache
- * [NOTE] For FF60 and under, this is required 'true' for Storage API (2750) ***/
+ * [NOTE] For FF60.0.1 and under, this is required 'true' for Storage API (2750) ***/
    // user_pref("browser.cache.offline.enable", false);
 /* 2730b: disable offline cache on insecure sites (FF60+)
  * [1] https://blog.mozilla.org/security/2018/02/12/restricting-appcache-secure-contexts/ ***/
@@ -1406,7 +1406,7 @@ user_pref("dom.caches.enabled", false);
  * The API gives sites the ability to find out how much space they can use, how much
  * they are already using, and even control whether or not they need to be alerted
  * before the user agent disposes of site data in order to make room for other things.
- * [NOTE] For FF60 and under, if Storage API is enabled, then Offline Cache (2730) must be also be enabled
+ * [NOTE] For FF60.0.1 and under, if Storage API is enabled, then Offline Cache (2730) must be also be enabled
  * [1] https://developer.mozilla.org/docs/Web/API/StorageManager
  * [2] https://developer.mozilla.org/docs/Web/API/Storage_API
  * [3] https://blog.mozilla.org/l10n/2017/03/07/firefox-l10n-report-aurora-54/ ***/

From d34894e9656cddcdf32c177a15e088e2316e0543 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 5 Jul 2018 10:16:20 +0000
Subject: [PATCH 0012/1147] 2730 + 2750: Storage API + Offline Cache

ESR52.x doesn't use the new site storage UI. FF61+ the issue is resolved, so let's enforce offline cache (2730) as false again
---
 user.js | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 165f74d..813cf17 100644
--- a/user.js
+++ b/user.js
@@ -1390,8 +1390,8 @@ user_pref("network.cookie.leave-secure-alone", true); // default: true
  * [WARNING] This *will* break other extensions including legacy, and *will* break some sites ***/
    // user_pref("dom.indexedDB.enabled", false);
 /* 2730: disable offline cache
- * [NOTE] For FF60.0.1 and under, this is required 'true' for Storage API (2750) ***/
-   // user_pref("browser.cache.offline.enable", false);
+ * [NOTE] For FF51-FF60 (ESR not included), this is required 'true' for Storage API (2750) ***/
+user_pref("browser.cache.offline.enable", false);
 /* 2730b: disable offline cache on insecure sites (FF60+)
  * [1] https://blog.mozilla.org/security/2018/02/12/restricting-appcache-secure-contexts/ ***/
 user_pref("browser.cache.offline.insecure.enable", false);
@@ -1402,15 +1402,15 @@ user_pref("offline-apps.allow_by_default", false);
 /* 2740: disable service workers cache and cache storage
  * [1] https://w3c.github.io/ServiceWorker/#privacy ***/
 user_pref("dom.caches.enabled", false);
-/* 2750: disable Storage API
+/* 2750: disable Storage API (FF51+)
  * The API gives sites the ability to find out how much space they can use, how much
  * they are already using, and even control whether or not they need to be alerted
  * before the user agent disposes of site data in order to make room for other things.
- * [NOTE] For FF60.0.1 and under, if Storage API is enabled, then Offline Cache (2730) must be also be enabled
+ * [NOTE] For FF51-FF60 (ESR not included), if Storage API is enabled, then Offline Cache (2730) must be also be enabled
  * [1] https://developer.mozilla.org/docs/Web/API/StorageManager
  * [2] https://developer.mozilla.org/docs/Web/API/Storage_API
  * [3] https://blog.mozilla.org/l10n/2017/03/07/firefox-l10n-report-aurora-54/ ***/
-   // user_pref("dom.storageManager.enabled", false); // (FF51+)
+   // user_pref("dom.storageManager.enabled", false);
 
 /*** 2800: SHUTDOWN [SETUP]
      You should set the values to what suits you best. Be aware that the settings below clear

From c9543519c787c37bdaa2602b3e5938de6b4efca0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 5 Jul 2018 15:32:19 +0000
Subject: [PATCH 0013/1147] 0100s: startpage, home+newwindow, newtab

FF61 introduced quite a few changes, including removing the ability to set a blank startpage in the UI, and a new Home options tab with unified Activity Stream (AS) defaults and dropdown options. Because the only way to stop AS on startup is to enforce a blank page (pref 0102), and setting this auto changes `home+newwindow` (0103) and `newtab` (0104) to a blank page, then we're just going to go ahead and enforce that on all of them.

For more info see the discussion in #426
---
 user.js | 18 +++++++++++-------
 1 file changed, 11 insertions(+), 7 deletions(-)

diff --git a/user.js b/user.js
index 813cf17..85ecfdc 100644
--- a/user.js
+++ b/user.js
@@ -68,11 +68,18 @@ user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
 /* 0101: disable default browser check
  * [SETTING] General>Startup>Always check if Firefox is your default browser ***/
 user_pref("browser.shell.checkDefaultBrowser", false);
-/* 0102: set start page (0=blank, 1=home, 2=last visited page, 3=resume previous session)
+/* 0102: set START page (0=blank, 1=home, 2=last visited page, 3=resume previous session)
  * [SETTING] General>Startup>When Firefox starts ***/
-   // user_pref("browser.startup.page", 0);
-/* 0103: set your "home" page (see 0102) ***/
-   // user_pref("browser.startup.homepage", "https://www.example.com/");
+user_pref("browser.startup.page", 0);
+/* 0103: set HOME+NEWWINDOW page
+ * about:home=Activity Stream (default, see 0514), custom URL, about:blank
+ * [SETTING] Home>New Windows and Tabs>Homepage and new windows ***/
+user_pref("browser.startup.homepage", "about:blank");
+/* 0104: set NEWTAB page
+ * true=Activity Stream (default, see 0514), false=blank page
+ * [SETTING] Home>New Windows and Tabs>New tabs ***/
+user_pref("browser.newtabpage.enabled", false);
+user_pref("browser.newtab.preload", false);
 
 /*** 0200: GEOLOCATION ***/
 user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");
@@ -192,9 +199,6 @@ user_pref("browser.tabs.crashReporting.sendReport", false);
 user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // (FF51+)
 user_pref("browser.crashReports.unsubmittedCheck.autoSubmit", false); // (FF51-57)
 user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // (FF58+)
-/* 0360: disable new tab tile ads & preload & marketing junk ***/
-user_pref("browser.newtab.preload", false);
-user_pref("browser.newtabpage.enabled", false);
 /* 0370: disable "Snippets" (Mozilla content shown on about:home screen)
  * [1] https://wiki.mozilla.org/Firefox/Projects/Firefox_Start/Snippet_Service ***/
 user_pref("browser.aboutHomeSnippets.updateUrl", "data:,");

From 857cbd8c2482d9a47de90a42914631f621631d2d Mon Sep 17 00:00:00 2001
From: Emanuele Petriglia <inbox@emanuelepetriglia.me>
Date: Fri, 6 Jul 2018 12:06:01 +0000
Subject: [PATCH 0014/1147] Use wget if curl is not available (#451)

* Use wget if curl is not available
On most GNU/Linux distributions wget is often preinstalled, while curl
is not.
* Bump updater.sh version
---
 updater.sh | 24 +++++++++++++++++-------
 1 file changed, 17 insertions(+), 7 deletions(-)

diff --git a/updater.sh b/updater.sh
index ddf623a..6e69bbd 100755
--- a/updater.sh
+++ b/updater.sh
@@ -1,8 +1,8 @@
 #!/usr/bin/env bash
 
 ### ghacks-user.js updater for Mac/Linux
-## author: @overdodactyl
-## version: 1.3
+## author: @overdodactyl, @ema-pe
+## version: 1.4
 
 ## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in check_for_update() )
 
@@ -12,6 +12,15 @@ update_pref=${1:--ask}
 
 currdir=$(pwd)
 
+DOWNLOAD_TO_STDOUT="curl -s"
+DOWNLOAD_TO_FILE="curl -O"
+
+# Use wget if curl is not available.
+if [[ -z $(command -v "curl") ]]; then
+  DOWNLOAD_TO_STDOUT="wget --quiet --output-document=-"
+  DOWNLOAD_TO_FILE="wget"
+fi
+
 ## get the full path of this script (readlink for Linux, greadlink for Mac with coreutils installed)
 sfp=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
 
@@ -24,7 +33,7 @@ cd "$(dirname "${sfp}")"
 ## Used to check if a new version of updater.sh is available
 update_available="no"
 check_for_update () {
-  online_version="$(curl -s ${updater} | sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p')"
+  online_version="$($DOWNLOAD_TO_STDOUT ${updater} | sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p')"
   path_to_script="$(dirname "${sfp}")/updater.sh"
   current_version="$(sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p' "$path_to_script")"
   if [[ "$current_version" < "$online_version" ]]; then
@@ -36,8 +45,8 @@ check_for_update () {
 update_script () {
   echo -e "This script will be backed up and the latest version of updater.sh will be executed.\n"
   mv updater.sh "updater.sh.backup.$(date +"%Y-%m-%d_%H%M")"
-  curl -O ${updater} && echo -e "\nThe latest updater script has been downloaded\n"
-  
+  $DOWNLOAD_TO_FILE ${updater} && echo -e "\nThe latest updater script has been downloaded\n"
+
   # make new file executable
   chmod +x updater.sh
 
@@ -60,7 +69,7 @@ main () {
   if [ -e user.js ]; then
     echo "Your current user.js file for this profile will be backed up and the latest ghacks version from github will take its place."
     echo -e "\nIf currently using the ghacks user.js, please compare versions:"
-    echo "  Available online: $(curl -s ${ghacksjs} | sed -n '4p')"
+    echo "  Available online: $($DOWNLOAD_TO_STDOUT ${ghacksjs} | sed -n '4p')"
     echo "  Currently using:  $(sed -n '4p' user.js)"
   else
     echo "A user.js file does not exist in this profile. If you continue, the latest ghacks version from github will be downloaded."
@@ -80,7 +89,7 @@ main () {
 
     # download latest ghacks user.js
     echo "downloading latest ghacks user.js file"
-    curl -O ${ghacksjs} && echo "ghacks user.js has been downloaded"
+    $DOWNLOAD_TO_FILE ${ghacksjs} && echo "ghacks user.js has been downloaded"
 
     if [ -e user-overrides.js ]; then
       echo "user-overrides.js file found"
@@ -94,6 +103,7 @@ main () {
   cd "${currdir}"
 }
 
+
 update_pref="$(echo $update_pref | tr '[A-Z]' '[a-z]')"
 if [ $update_pref = "-donotupdate" ]; then
   main

From a81d013e45af4d4346e9b3f47160f8a911eb250e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 6 Jul 2018 12:25:41 +0000
Subject: [PATCH 0015/1147] 61-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 85ecfdc..e0ff817 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 30 May 2018
-* version 61-alpha: You Can't Hurry Pants
+* date: 06 July 2018
+* version 61-beta: You Can't Hurry Pants
 *   "My mama said, "You can't hurry pants. No, you'll just have to wait""
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 96706cf11e25e8d125cd5d1e7a392233df013bb5 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Herv=C3=A9?= <dud225@users.noreply.github.com>
Date: Fri, 6 Jul 2018 13:44:53 +0000
Subject: [PATCH 0016/1147] ghacks-clear-[removed].js : Fix JS syntax (#460)

* Fix syntax

* updated 06-July-2018
---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index c7e33f7..5b5b389 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 03-Jun-2018
+ Last updated: 06-July-2018
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -90,7 +90,7 @@
     'browser.laterrun.enabled',
     'browser.offline-apps.notify',
     'browser.rights.3.shown',
-    'browser.slowStartup.maxSamples'
+    'browser.slowStartup.maxSamples',
     'browser.slowStartup.notificationDisabled',
     'browser.slowStartup.samples',
     'browser.storageManager.enabled',

From 4813aa549b99d8c5ff1ed0899eb135a5446f05a1 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 11 Jul 2018 13:59:52 +0200
Subject: [PATCH 0017/1147] Update user.js

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index e0ff817..fcfe592 100644
--- a/user.js
+++ b/user.js
@@ -39,7 +39,7 @@
 
  ******/
 
-/* START: internal custom pref to test for syntax errors (thanks earthling)
+/* START: internal custom pref to test for syntax errors
  * [NOTE] In FF60+, not all syntax errors cause parsing to abort i.e. reaching the last debug
  * pref no longer necessarily means that all prefs have been applied. Check the console right
  * after startup for any warnings/error messages related to non-applied prefs
@@ -2122,10 +2122,10 @@ user_pref("experiments.activeExperiment", false);
 // 2612: disable remote JAR files being opened, regardless of content type (FF42+)
    // [1] https://bugzilla.mozilla.org/1173171
    // [2] https://www.fxsitecompat.com/en-CA/docs/2015/jar-protocol-support-has-been-disabled-by-default/
-   // [-] https://bugzilla.mozilla.org/show_bug.cgi?id=1427726
+   // [-] https://bugzilla.mozilla.org/1427726
 user_pref("network.jar.block-remote-files", true);
 // 2613: disable JAR from opening Unsafe File Types
-   // [-] https://bugzilla.mozilla.org/show_bug.cgi?id=1427726
+   // [-] https://bugzilla.mozilla.org/1427726
 user_pref("network.jar.open-unsafe-types", false);
 // * * * /
 // ***/

From cbea3adc7e4f9907737d40b94a0157ed3c2ed1b3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 17 Jul 2018 02:58:51 +0000
Subject: [PATCH 0018/1147] FPI & IP addresses FF63+

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index fcfe592..ca67a19 100644
--- a/user.js
+++ b/user.js
@@ -1484,6 +1484,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1337893 - isolate DNS cache (FF55+)
  ** 1344170 - isolate blob: URI (FF55+)
  ** 1300671 - isolate data:, about: URLs (FF55+)
+ ** 1473247 - isolate IP addresses (FF63+)
 
  NOTE: FPI has some issues depending on your Firefox release
  ** 1418931 - [fixed in FF58+] IndexedDB (Offline Website Data) with FPI Origin Attributes

From 43119694fbf9e678bdf8f0dd9ee346a89832c5a9 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 5 Aug 2018 13:02:34 +0000
Subject: [PATCH 0019/1147] Update .gitattributes

---
 .gitattributes | 16 ++++++++--------
 1 file changed, 8 insertions(+), 8 deletions(-)

diff --git a/.gitattributes b/.gitattributes
index d6d1095..8cc5e8c 100644
--- a/.gitattributes
+++ b/.gitattributes
@@ -1,14 +1,14 @@
-## * text=auto
+* text=auto
 
-*.js text=auto
-*.md text=auto
-*.yml text=auto
-*.txt text=auto
-*.sh text=auto
-*.bat eol=crlf
+*.js text
+*.md text
+*.yml text
+*.txt text
+*.sh text
+*.bat text eol=crlf
 
 *.png binary
 
 .gitattributes export-ignore
 *.yml export-ignore
-wikipiki export-ignore
+/wikipiki export-ignore

From 9611eac1cfb2aa83e23fef05f21f1888ece9372f Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 6 Aug 2018 18:52:30 +0000
Subject: [PATCH 0020/1147] test

test
---
 test-CR.bat   | 1 +
 test-CRLF.bat | 8 ++++++++
 test-LF.bat   | 8 ++++++++
 3 files changed, 17 insertions(+)
 create mode 100644 test-CR.bat
 create mode 100644 test-CRLF.bat
 create mode 100644 test-LF.bat

diff --git a/test-CR.bat b/test-CR.bat
new file mode 100644
index 0000000..a9308ce
--- /dev/null
+++ b/test-CR.bat
@@ -0,0 +1 @@
+
line endings test

line endings test

line endings test

line endings test
\ No newline at end of file
diff --git a/test-CRLF.bat b/test-CRLF.bat
new file mode 100644
index 0000000..bddf79f
--- /dev/null
+++ b/test-CRLF.bat
@@ -0,0 +1,8 @@
+
+line endings test
+
+line endings test
+
+line endings test
+
+line endings test
diff --git a/test-LF.bat b/test-LF.bat
new file mode 100644
index 0000000..00c5994
--- /dev/null
+++ b/test-LF.bat
@@ -0,0 +1,8 @@
+
+line endings test
+
+line endings test
+
+line endings test
+
+line endings test

From 5ccea3262f901898d3d29abf8eee8c7bba595706 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 6 Aug 2018 19:14:56 +0000
Subject: [PATCH 0021/1147] Update updater.bat

---
 updater.bat | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/updater.bat b/updater.bat
index 21c83a2..a4d3f82 100644
--- a/updater.bat
+++ b/updater.bat
@@ -192,6 +192,7 @@ REM ############ Merge function ############
 :merge
 SETLOCAL DisableDelayedExpansion
 FOR /F tokens^=2^,^*^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^user_pref[ 	]*\([ 	]*[\"'].*[\"'][ 	]*,.*\)[ 	]*;" "%~1"') DO (SET "[%%G]=%%H")
+
 FOR /F tokens^=2^,^*^ delims^=^' %%G IN ('FINDSTR /R /C:"^//// --- comment-out --- '[^'][^']*'.*" "%~1"') DO (SET "__unset__%%G=1")
 (
 	FOR /F "tokens=1,* delims=:" %%I IN ('FINDSTR /N "^" "%~1"') DO (
@@ -205,6 +206,7 @@ FOR /F tokens^=2^,^*^ delims^=^' %%G IN ('FINDSTR /R /C:"^//// --- comment-out -
 			) ELSE (
 				ENDLOCAL
 				FOR /F tokens^=2^ delims^=^'^" %%K IN ("%%J") DO (
+				
 					IF NOT "_user.js.parrot"=="%%K" (
 						IF DEFINED __unset__%%K (
 							ECHO://%%J

From 833f816b998d584ef24c05698323b9c59098a12a Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 6 Aug 2018 19:17:48 +0000
Subject: [PATCH 0022/1147] Add files via upload


From 5bcbe56f4b9afb17aae82b2f3f600d77c52eeca2 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 6 Aug 2018 19:19:22 +0000
Subject: [PATCH 0023/1147] Add files via upload

---
 prefsCleaner2.bat | 108 ++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 108 insertions(+)
 create mode 100644 prefsCleaner2.bat

diff --git a/prefsCleaner2.bat b/prefsCleaner2.bat
new file mode 100644
index 0000000..6e0875d
--- /dev/null
+++ b/prefsCleaner2.bat
@@ -0,0 +1,108 @@
+@ECHO OFF & SETLOCAL DisableDelayedExpansion
+TITLE prefs.js cleaner
+
+REM ### prefs.js cleaner for Windows
+REM ## author: @claustromaniac
+REM ## version: 2.1
+
+:begin
+ECHO:
+ECHO:
+ECHO                 ########################################
+ECHO                 ####  prefs.js cleaner for Windows  ####
+ECHO                 ####        by claustromaniac       ####
+ECHO                 ####              v2.1              ####
+ECHO                 ########################################
+ECHO:
+CALL :message "This script should be run from your Firefox profile directory."
+ECHO   It will remove any entries from prefs.js that also exist in user.js.
+CALL :message "This will allow inactive preferences to be reset to their default values."
+ECHO   This Firefox profile shouldn't be in use during the process.
+CALL :message ""
+TIMEOUT 1 /nobreak >nul
+CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
+CLS
+IF ERRORLEVEL 3 (EXIT /B)
+IF ERRORLEVEL 2 (GOTO :showhelp)
+IF NOT EXIST "user.js" (CALL :abort "user.js not found in the current directory." 30)
+IF NOT EXIST "prefs.js" (CALL :abort "prefs.js not found in the current directory." 30)
+CALL :FFcheck
+CALL :message "Backing up prefs.js..."
+SET "_time=%time: =0%"
+COPY /B /V /Y prefs.js "prefs-backup-%date:/=-%_%_time::=.%.js"
+CALL :message "Cleaning prefs.js..."
+CALL :cleanup
+CALL :message "All done!"
+TIMEOUT 5 >nul
+ENDLOCAL
+EXIT /B
+
+REM ########## Abort Function ###########
+:abort
+CALL :message %1
+TIMEOUT %~2 >nul
+EXIT
+REM ########## Message Function #########
+:message
+ECHO:
+ECHO:  %~1
+ECHO:
+GOTO :EOF
+REM ####### Firefox Check Function ######
+:FFcheck
+TASKLIST /FI "IMAGENAME eq firefox.exe" 2>NUL | FIND /I /N "firefox.exe">NUL
+IF NOT ERRORLEVEL 1 (
+	CLS
+	CALL :message "Firefox is still running."
+	ECHO   If you're not currently using this profile you can continue, otherwise
+	CALL :message "close Firefox first!"
+	ECHO:
+	PAUSE
+	CLS
+	CALL :message "Resuming..."
+	TIMEOUT 5 /nobreak >nul
+)
+GOTO :EOF
+REM ######### Cleanup Function ##########
+:cleanup
+FOR /F tokens^=2^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^[^\"']*user_pref[ 	]*\([ 	]*[\"'][^\"']*[\"'][ 	]*," user.js') DO (
+	IF NOT ""=="%%G" (SET "[%%G]=1")
+)
+(
+	FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" prefs.js') DO (
+		IF ""=="%%H" (
+			ECHO:
+		) ELSE (
+			FOR /F tokens^=1^,2^ delims^=^"^' %%I IN ("%%H") DO (
+				IF NOT DEFINED [%%J] (ECHO:%%H)
+			)
+		)
+	)
+)>tempcleanedprefs
+MOVE /Y tempcleanedprefs prefs.js
+GOTO :EOF
+REM ############### Help ##################
+:showhelp
+MODE 80,34
+CLS
+CALL :message "This script creates a backup of your prefs.js file before doing anything."
+ECHO   It should be safe, but you can follow these steps if something goes wrong:
+ECHO:
+CALL :message "  1. Make sure Firefox is closed."
+ECHO     2. Delete prefs.js in your profile folder.
+CALL :message "  3. Delete Invalidprefs.js if you have one in the same folder."
+ECHO     4. Rename or copy your latest backup to prefs.js.
+CALL :message "  5. Run Firefox and see if you notice anything wrong with it."
+ECHO     6. If you do notice something wrong, especially with your extensions,
+CALL :message "     and/or with the UI, go to about:support, and restart Firefox with"
+ECHO        add-ons disabled. Then, restart it again normally, and see if the
+CALL :message "     problems were solved."
+ECHO:
+CALL :message "If you are able to identify the cause of your issues, please bring it up"
+ECHO   on ghacks-user.js GitHub repository.
+ECHO:
+ECHO:
+PAUSE
+CLS
+GOTO :begin
+REM #####################################

From f973422581beb93855ec3a9a3f60faaeae057a8d Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 6 Aug 2018 19:23:36 +0000
Subject: [PATCH 0024/1147] Delete prefsCleaner2.bat

---
 prefsCleaner2.bat | 108 ----------------------------------------------
 1 file changed, 108 deletions(-)
 delete mode 100644 prefsCleaner2.bat

diff --git a/prefsCleaner2.bat b/prefsCleaner2.bat
deleted file mode 100644
index 6e0875d..0000000
--- a/prefsCleaner2.bat
+++ /dev/null
@@ -1,108 +0,0 @@
-@ECHO OFF & SETLOCAL DisableDelayedExpansion
-TITLE prefs.js cleaner
-
-REM ### prefs.js cleaner for Windows
-REM ## author: @claustromaniac
-REM ## version: 2.1
-
-:begin
-ECHO:
-ECHO:
-ECHO                 ########################################
-ECHO                 ####  prefs.js cleaner for Windows  ####
-ECHO                 ####        by claustromaniac       ####
-ECHO                 ####              v2.1              ####
-ECHO                 ########################################
-ECHO:
-CALL :message "This script should be run from your Firefox profile directory."
-ECHO   It will remove any entries from prefs.js that also exist in user.js.
-CALL :message "This will allow inactive preferences to be reset to their default values."
-ECHO   This Firefox profile shouldn't be in use during the process.
-CALL :message ""
-TIMEOUT 1 /nobreak >nul
-CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
-CLS
-IF ERRORLEVEL 3 (EXIT /B)
-IF ERRORLEVEL 2 (GOTO :showhelp)
-IF NOT EXIST "user.js" (CALL :abort "user.js not found in the current directory." 30)
-IF NOT EXIST "prefs.js" (CALL :abort "prefs.js not found in the current directory." 30)
-CALL :FFcheck
-CALL :message "Backing up prefs.js..."
-SET "_time=%time: =0%"
-COPY /B /V /Y prefs.js "prefs-backup-%date:/=-%_%_time::=.%.js"
-CALL :message "Cleaning prefs.js..."
-CALL :cleanup
-CALL :message "All done!"
-TIMEOUT 5 >nul
-ENDLOCAL
-EXIT /B
-
-REM ########## Abort Function ###########
-:abort
-CALL :message %1
-TIMEOUT %~2 >nul
-EXIT
-REM ########## Message Function #########
-:message
-ECHO:
-ECHO:  %~1
-ECHO:
-GOTO :EOF
-REM ####### Firefox Check Function ######
-:FFcheck
-TASKLIST /FI "IMAGENAME eq firefox.exe" 2>NUL | FIND /I /N "firefox.exe">NUL
-IF NOT ERRORLEVEL 1 (
-	CLS
-	CALL :message "Firefox is still running."
-	ECHO   If you're not currently using this profile you can continue, otherwise
-	CALL :message "close Firefox first!"
-	ECHO:
-	PAUSE
-	CLS
-	CALL :message "Resuming..."
-	TIMEOUT 5 /nobreak >nul
-)
-GOTO :EOF
-REM ######### Cleanup Function ##########
-:cleanup
-FOR /F tokens^=2^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^[^\"']*user_pref[ 	]*\([ 	]*[\"'][^\"']*[\"'][ 	]*," user.js') DO (
-	IF NOT ""=="%%G" (SET "[%%G]=1")
-)
-(
-	FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" prefs.js') DO (
-		IF ""=="%%H" (
-			ECHO:
-		) ELSE (
-			FOR /F tokens^=1^,2^ delims^=^"^' %%I IN ("%%H") DO (
-				IF NOT DEFINED [%%J] (ECHO:%%H)
-			)
-		)
-	)
-)>tempcleanedprefs
-MOVE /Y tempcleanedprefs prefs.js
-GOTO :EOF
-REM ############### Help ##################
-:showhelp
-MODE 80,34
-CLS
-CALL :message "This script creates a backup of your prefs.js file before doing anything."
-ECHO   It should be safe, but you can follow these steps if something goes wrong:
-ECHO:
-CALL :message "  1. Make sure Firefox is closed."
-ECHO     2. Delete prefs.js in your profile folder.
-CALL :message "  3. Delete Invalidprefs.js if you have one in the same folder."
-ECHO     4. Rename or copy your latest backup to prefs.js.
-CALL :message "  5. Run Firefox and see if you notice anything wrong with it."
-ECHO     6. If you do notice something wrong, especially with your extensions,
-CALL :message "     and/or with the UI, go to about:support, and restart Firefox with"
-ECHO        add-ons disabled. Then, restart it again normally, and see if the
-CALL :message "     problems were solved."
-ECHO:
-CALL :message "If you are able to identify the cause of your issues, please bring it up"
-ECHO   on ghacks-user.js GitHub repository.
-ECHO:
-ECHO:
-PAUSE
-CLS
-GOTO :begin
-REM #####################################

From 2e908f38d2d6b7fde6d25c9415eb61121e4e7728 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 6 Aug 2018 19:25:25 +0000
Subject: [PATCH 0025/1147] Update prefsCleaner.bat

---
 prefsCleaner.bat | 8 ++------
 1 file changed, 2 insertions(+), 6 deletions(-)

diff --git a/prefsCleaner.bat b/prefsCleaner.bat
index 6e0875d..12b865d 100644
--- a/prefsCleaner.bat
+++ b/prefsCleaner.bat
@@ -65,17 +65,13 @@ IF NOT ERRORLEVEL 1 (
 GOTO :EOF
 REM ######### Cleanup Function ##########
 :cleanup
-FOR /F tokens^=2^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^[^\"']*user_pref[ 	]*\([ 	]*[\"'][^\"']*[\"'][ 	]*," user.js') DO (
-	IF NOT ""=="%%G" (SET "[%%G]=1")
-)
+FOR /F tokens^=2^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^[^\"']*user_pref[ 	]*\([ 	]*[\"'][^\"']*[\"'][ 	]*," user.js') DO (IF NOT ""=="%%G" (SET "[%%G]=1"))
 (
 	FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" prefs.js') DO (
 		IF ""=="%%H" (
 			ECHO:
 		) ELSE (
-			FOR /F tokens^=1^,2^ delims^=^"^' %%I IN ("%%H") DO (
-				IF NOT DEFINED [%%J] (ECHO:%%H)
-			)
+			FOR /F tokens^=1^,2^ delims^=^"^' %%I IN ("%%H") DO (IF NOT DEFINED [%%J] (ECHO:%%H))
 		)
 	)
 )>tempcleanedprefs

From b390d9787be86234fe42e606501c2c7d8b2e6c85 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 6 Aug 2018 19:27:07 +0000
Subject: [PATCH 0026/1147] Add files via upload

---
 prefsCleaner.bat | 8 ++++++--
 1 file changed, 6 insertions(+), 2 deletions(-)

diff --git a/prefsCleaner.bat b/prefsCleaner.bat
index 12b865d..6e0875d 100644
--- a/prefsCleaner.bat
+++ b/prefsCleaner.bat
@@ -65,13 +65,17 @@ IF NOT ERRORLEVEL 1 (
 GOTO :EOF
 REM ######### Cleanup Function ##########
 :cleanup
-FOR /F tokens^=2^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^[^\"']*user_pref[ 	]*\([ 	]*[\"'][^\"']*[\"'][ 	]*," user.js') DO (IF NOT ""=="%%G" (SET "[%%G]=1"))
+FOR /F tokens^=2^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^[^\"']*user_pref[ 	]*\([ 	]*[\"'][^\"']*[\"'][ 	]*," user.js') DO (
+	IF NOT ""=="%%G" (SET "[%%G]=1")
+)
 (
 	FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" prefs.js') DO (
 		IF ""=="%%H" (
 			ECHO:
 		) ELSE (
-			FOR /F tokens^=1^,2^ delims^=^"^' %%I IN ("%%H") DO (IF NOT DEFINED [%%J] (ECHO:%%H))
+			FOR /F tokens^=1^,2^ delims^=^"^' %%I IN ("%%H") DO (
+				IF NOT DEFINED [%%J] (ECHO:%%H)
+			)
 		)
 	)
 )>tempcleanedprefs

From 03efb9975451aaa3f0e2a1231eba6b9d58e97ae9 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 6 Aug 2018 19:34:18 +0000
Subject: [PATCH 0027/1147] Delete test-CR.bat

---
 test-CR.bat | 1 -
 1 file changed, 1 deletion(-)
 delete mode 100644 test-CR.bat

diff --git a/test-CR.bat b/test-CR.bat
deleted file mode 100644
index a9308ce..0000000
--- a/test-CR.bat
+++ /dev/null
@@ -1 +0,0 @@
-
line endings test

line endings test

line endings test

line endings test
\ No newline at end of file

From d8bfdaa0586347acc91b1a47a5efc27cdecd175d Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 6 Aug 2018 19:34:26 +0000
Subject: [PATCH 0028/1147] Delete test-CRLF.bat

---
 test-CRLF.bat | 8 --------
 1 file changed, 8 deletions(-)
 delete mode 100644 test-CRLF.bat

diff --git a/test-CRLF.bat b/test-CRLF.bat
deleted file mode 100644
index bddf79f..0000000
--- a/test-CRLF.bat
+++ /dev/null
@@ -1,8 +0,0 @@
-
-line endings test
-
-line endings test
-
-line endings test
-
-line endings test

From 06b69bb95ab6761281d62e3363c268c880625748 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 6 Aug 2018 19:34:33 +0000
Subject: [PATCH 0029/1147] Delete test-LF.bat

---
 test-LF.bat | 8 --------
 1 file changed, 8 deletions(-)
 delete mode 100644 test-LF.bat

diff --git a/test-LF.bat b/test-LF.bat
deleted file mode 100644
index 00c5994..0000000
--- a/test-LF.bat
+++ /dev/null
@@ -1,8 +0,0 @@
-
-line endings test
-
-line endings test
-
-line endings test
-
-line endings test

From 3806ccc68c80b4e6e9786fe81997f703fd3468c5 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=D0=94=D0=B5=D0=BD=D0=B8=D1=81?=
 <sciamano@users.noreply.github.com>
Date: Tue, 7 Aug 2018 00:06:30 +0200
Subject: [PATCH 0030/1147] Introduce end-of-line normalization (#471)

fix for #469
---
 prefsCleaner.bat | 216 +++++++++----------
 updater.bat      | 530 +++++++++++++++++++++++------------------------
 2 files changed, 373 insertions(+), 373 deletions(-)

diff --git a/prefsCleaner.bat b/prefsCleaner.bat
index 6e0875d..d4eeb13 100644
--- a/prefsCleaner.bat
+++ b/prefsCleaner.bat
@@ -1,108 +1,108 @@
-@ECHO OFF & SETLOCAL DisableDelayedExpansion
-TITLE prefs.js cleaner
-
-REM ### prefs.js cleaner for Windows
-REM ## author: @claustromaniac
-REM ## version: 2.1
-
-:begin
-ECHO:
-ECHO:
-ECHO                 ########################################
-ECHO                 ####  prefs.js cleaner for Windows  ####
-ECHO                 ####        by claustromaniac       ####
-ECHO                 ####              v2.1              ####
-ECHO                 ########################################
-ECHO:
-CALL :message "This script should be run from your Firefox profile directory."
-ECHO   It will remove any entries from prefs.js that also exist in user.js.
-CALL :message "This will allow inactive preferences to be reset to their default values."
-ECHO   This Firefox profile shouldn't be in use during the process.
-CALL :message ""
-TIMEOUT 1 /nobreak >nul
-CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
-CLS
-IF ERRORLEVEL 3 (EXIT /B)
-IF ERRORLEVEL 2 (GOTO :showhelp)
-IF NOT EXIST "user.js" (CALL :abort "user.js not found in the current directory." 30)
-IF NOT EXIST "prefs.js" (CALL :abort "prefs.js not found in the current directory." 30)
-CALL :FFcheck
-CALL :message "Backing up prefs.js..."
-SET "_time=%time: =0%"
-COPY /B /V /Y prefs.js "prefs-backup-%date:/=-%_%_time::=.%.js"
-CALL :message "Cleaning prefs.js..."
-CALL :cleanup
-CALL :message "All done!"
-TIMEOUT 5 >nul
-ENDLOCAL
-EXIT /B
-
-REM ########## Abort Function ###########
-:abort
-CALL :message %1
-TIMEOUT %~2 >nul
-EXIT
-REM ########## Message Function #########
-:message
-ECHO:
-ECHO:  %~1
-ECHO:
-GOTO :EOF
-REM ####### Firefox Check Function ######
-:FFcheck
-TASKLIST /FI "IMAGENAME eq firefox.exe" 2>NUL | FIND /I /N "firefox.exe">NUL
-IF NOT ERRORLEVEL 1 (
-	CLS
-	CALL :message "Firefox is still running."
-	ECHO   If you're not currently using this profile you can continue, otherwise
-	CALL :message "close Firefox first!"
-	ECHO:
-	PAUSE
-	CLS
-	CALL :message "Resuming..."
-	TIMEOUT 5 /nobreak >nul
-)
-GOTO :EOF
-REM ######### Cleanup Function ##########
-:cleanup
-FOR /F tokens^=2^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^[^\"']*user_pref[ 	]*\([ 	]*[\"'][^\"']*[\"'][ 	]*," user.js') DO (
-	IF NOT ""=="%%G" (SET "[%%G]=1")
-)
-(
-	FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" prefs.js') DO (
-		IF ""=="%%H" (
-			ECHO:
-		) ELSE (
-			FOR /F tokens^=1^,2^ delims^=^"^' %%I IN ("%%H") DO (
-				IF NOT DEFINED [%%J] (ECHO:%%H)
-			)
-		)
-	)
-)>tempcleanedprefs
-MOVE /Y tempcleanedprefs prefs.js
-GOTO :EOF
-REM ############### Help ##################
-:showhelp
-MODE 80,34
-CLS
-CALL :message "This script creates a backup of your prefs.js file before doing anything."
-ECHO   It should be safe, but you can follow these steps if something goes wrong:
-ECHO:
-CALL :message "  1. Make sure Firefox is closed."
-ECHO     2. Delete prefs.js in your profile folder.
-CALL :message "  3. Delete Invalidprefs.js if you have one in the same folder."
-ECHO     4. Rename or copy your latest backup to prefs.js.
-CALL :message "  5. Run Firefox and see if you notice anything wrong with it."
-ECHO     6. If you do notice something wrong, especially with your extensions,
-CALL :message "     and/or with the UI, go to about:support, and restart Firefox with"
-ECHO        add-ons disabled. Then, restart it again normally, and see if the
-CALL :message "     problems were solved."
-ECHO:
-CALL :message "If you are able to identify the cause of your issues, please bring it up"
-ECHO   on ghacks-user.js GitHub repository.
-ECHO:
-ECHO:
-PAUSE
-CLS
-GOTO :begin
-REM #####################################
+@ECHO OFF & SETLOCAL DisableDelayedExpansion
+TITLE prefs.js cleaner
+
+REM ### prefs.js cleaner for Windows
+REM ## author: @claustromaniac
+REM ## version: 2.1
+
+:begin
+ECHO:
+ECHO:
+ECHO                 ########################################
+ECHO                 ####  prefs.js cleaner for Windows  ####
+ECHO                 ####        by claustromaniac       ####
+ECHO                 ####              v2.1              ####
+ECHO                 ########################################
+ECHO:
+CALL :message "This script should be run from your Firefox profile directory."
+ECHO   It will remove any entries from prefs.js that also exist in user.js.
+CALL :message "This will allow inactive preferences to be reset to their default values."
+ECHO   This Firefox profile shouldn't be in use during the process.
+CALL :message ""
+TIMEOUT 1 /nobreak >nul
+CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
+CLS
+IF ERRORLEVEL 3 (EXIT /B)
+IF ERRORLEVEL 2 (GOTO :showhelp)
+IF NOT EXIST "user.js" (CALL :abort "user.js not found in the current directory." 30)
+IF NOT EXIST "prefs.js" (CALL :abort "prefs.js not found in the current directory." 30)
+CALL :FFcheck
+CALL :message "Backing up prefs.js..."
+SET "_time=%time: =0%"
+COPY /B /V /Y prefs.js "prefs-backup-%date:/=-%_%_time::=.%.js"
+CALL :message "Cleaning prefs.js..."
+CALL :cleanup
+CALL :message "All done!"
+TIMEOUT 5 >nul
+ENDLOCAL
+EXIT /B
+
+REM ########## Abort Function ###########
+:abort
+CALL :message %1
+TIMEOUT %~2 >nul
+EXIT
+REM ########## Message Function #########
+:message
+ECHO:
+ECHO:  %~1
+ECHO:
+GOTO :EOF
+REM ####### Firefox Check Function ######
+:FFcheck
+TASKLIST /FI "IMAGENAME eq firefox.exe" 2>NUL | FIND /I /N "firefox.exe">NUL
+IF NOT ERRORLEVEL 1 (
+	CLS
+	CALL :message "Firefox is still running."
+	ECHO   If you're not currently using this profile you can continue, otherwise
+	CALL :message "close Firefox first!"
+	ECHO:
+	PAUSE
+	CLS
+	CALL :message "Resuming..."
+	TIMEOUT 5 /nobreak >nul
+)
+GOTO :EOF
+REM ######### Cleanup Function ##########
+:cleanup
+FOR /F tokens^=2^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^[^\"']*user_pref[ 	]*\([ 	]*[\"'][^\"']*[\"'][ 	]*," user.js') DO (
+	IF NOT ""=="%%G" (SET "[%%G]=1")
+)
+(
+	FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" prefs.js') DO (
+		IF ""=="%%H" (
+			ECHO:
+		) ELSE (
+			FOR /F tokens^=1^,2^ delims^=^"^' %%I IN ("%%H") DO (
+				IF NOT DEFINED [%%J] (ECHO:%%H)
+			)
+		)
+	)
+)>tempcleanedprefs
+MOVE /Y tempcleanedprefs prefs.js
+GOTO :EOF
+REM ############### Help ##################
+:showhelp
+MODE 80,34
+CLS
+CALL :message "This script creates a backup of your prefs.js file before doing anything."
+ECHO   It should be safe, but you can follow these steps if something goes wrong:
+ECHO:
+CALL :message "  1. Make sure Firefox is closed."
+ECHO     2. Delete prefs.js in your profile folder.
+CALL :message "  3. Delete Invalidprefs.js if you have one in the same folder."
+ECHO     4. Rename or copy your latest backup to prefs.js.
+CALL :message "  5. Run Firefox and see if you notice anything wrong with it."
+ECHO     6. If you do notice something wrong, especially with your extensions,
+CALL :message "     and/or with the UI, go to about:support, and restart Firefox with"
+ECHO        add-ons disabled. Then, restart it again normally, and see if the
+CALL :message "     problems were solved."
+ECHO:
+CALL :message "If you are able to identify the cause of your issues, please bring it up"
+ECHO   on ghacks-user.js GitHub repository.
+ECHO:
+ECHO:
+PAUSE
+CLS
+GOTO :begin
+REM #####################################
diff --git a/updater.bat b/updater.bat
index a4d3f82..ef7aaa9 100644
--- a/updater.bat
+++ b/updater.bat
@@ -1,265 +1,265 @@
-@ECHO OFF & SETLOCAL EnableDelayedExpansion
-TITLE ghacks user.js updater
-
-REM ## ghacks-user.js updater for Windows
-REM ## author: @claustromaniac
-REM ## version: 4.5
-REM ## instructions: https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts
-
-SET _myname=%~n0
-SET _myparams=%*
-:parse
-IF "%~1"=="" (GOTO endparse)
-IF /I "%~1"=="-unattended" (SET _ua=1)
-IF /I "%~1"=="-log" (SET _log=1)
-IF /I "%~1"=="-logp" (SET _log=1 & SET _logp=1)
-IF /I "%~1"=="-multioverrides" (SET _multi=1)
-IF /I "%~1"=="-merge" (SET _merge=1)
-IF /I "%~1"=="-updatebatch" (SET _updateb=1)
-IF /I "%~1"=="-singlebackup" (SET _singlebackup=1)
-SHIFT
-GOTO parse
-:endparse
-IF DEFINED _updateb (
-	REM The normal flow here goes from phase 1 to phase 2 and then phase 3.
-	IF NOT "!_myname:~0,9!"=="[updated]" (
-		IF EXIST "[updated]!_myname!.bat" (
-			REM ## Phase 3 ##: The new script, with the original name, will:
-			REM 	* Delete the [updated]*.bat script
-			REM 	* Begin the normal routine
-			REN "[updated]!_myname!.bat" "[updated]!_myname!.bat.old"
-			DEL /F "[updated]!_myname!.bat.old"
-			CALL :message "Script updated^!"
-			TIMEOUT 3 >nul
-			GOTO begin
-		)
-		REM ## Phase 1 ##
-		REM 	* Download new batch and name it [updated]*.bat
-		REM 	* Start that script in a new CMD window
-		REM 	* Exit
-		CALL :message "Updating script..."
-		REM Uncomment the next line and comment the powershell call for testing.
-		REM COPY /B /V /Y "!_myname!.bat" "[updated]!_myname!.bat"
-		(
-			powershell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.bat', '[updated]!_myname!.bat')"
-		) >nul 2>&1
-		IF EXIST "[updated]!_myname!.bat" (
-			START /min CMD /C "[updated]!_myname!.bat" !_myparams!
-		) ELSE (
-			CALL :message "Failed. Make sure PowerShell is allowed internet access."
-			TIMEOUT 120 >nul
-		)
-	) ELSE (
-		IF "!_myname!"=="[updated]" (
-			CALL :message "The [updated] label is reserved. Rename this script and try again."
-			TIMEOUT 300 >nul
-		) ELSE (
-			REM ## Phase 2 ##: The [updated]*.bat script will:
-			REM 	* Copy itself overwriting the original batch
-			REM 	* Start that script in a new CMD instance
-			REM 	* Exit
-			IF EXIST "!_myname:~9!.bat" (
-				REN "!_myname:~9!.bat" "!_myname:~9!.bat.old"
-				DEL /F "!_myname:~9!.bat.old"
-			)
-			COPY /B /V /Y "!_myname!.bat" "!_myname:~9!.bat"
-			START CMD /C "!_myname:~9!.bat" !_myparams!
-		)
-	)
-	EXIT /B
-)
-:begin
-CLS
-ECHO:
-ECHO:
-ECHO:                ########################################
-ECHO:                ####  user.js Updater for Windows   ####
-ECHO:                ####       by claustromaniac        ####
-ECHO:                ####             v4.5               ####
-ECHO:                ########################################
-ECHO:
-SET /A "_line=0"
-IF NOT EXIST user.js (
-	CALL :message "user.js not detected in the current directory."
-) ELSE (
-	FOR /F "skip=1 tokens=1,* delims=:" %%G IN (user.js) DO (
-		SET /A "_line+=1"
-		IF !_line! GEQ 4 (GOTO exitloop)
-		IF !_line! EQU 1 (SET _name=%%H)
-		IF !_line! EQU 2 (SET _date=%%H)
-		IF !_line! EQU 3 (SET _version=%%G)
-	)
-	:exitloop
-	IF NOT "!_name!"=="" (
-		IF /I NOT "!_name!"=="!_name:ghacks=!" (
-			CALL :message "!_name! !_version:~2!,!_date!"
-		) ELSE (CALL :message "Current user.js version not recognised.")
-	) ELSE (CALL :message "Current user.js version not recognised.")
-)
-ECHO:
-IF NOT DEFINED _ua (
-	CALL :message "This batch should be run from your Firefox profile directory."
-	ECHO:  It will download the latest version of ghacks user.js from github and then
-	CALL :message "append any of your own changes from user-overrides.js to it."
-	CALL :message "Visit the wiki for more detailed information."
-	ECHO:
-	TIMEOUT 1 /nobreak >nul
-	CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
-	CLS
-	IF ERRORLEVEL 3 (EXIT /B)
-	IF ERRORLEVEL 2 (GOTO :showhelp)
-)
-IF DEFINED _log (
-	CALL :log >>user.js-update-log.txt 2>&1
-	IF DEFINED _logp (START user.js-update-log.txt)
-	EXIT /B
-	:log
-	SET _log=2
-	ECHO:##################################################################
-	ECHO:  %date%, %time%
-)
-IF EXIST user.js.new (DEL /F "user.js.new")
-CALL :message "Retrieving latest user.js file from github repository..."
-(
-	powershell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js', 'user.js.new')"
-) >nul 2>&1
-IF EXIST user.js.new (
-	IF DEFINED _multi (
-		FORFILES /P user.js-overrides /M *.js >nul 2>&1
-		IF NOT ERRORLEVEL 1 (
-			IF DEFINED _merge (
-				CALL :message "Merging..."
-				COPY /B /V /Y user.js-overrides\*.js user-overrides-merged.js
-				CALL :merge user-overrides-merged.js
-				COPY /B /V /Y user.js.new+user-overrides-merged.js user.js.new
-				CALL :merge user.js.new
-			) ELSE (
-				CALL :message "Appending..."
-				COPY /B /V /Y user.js.new+"user.js-overrides\*.js" user.js.new
-			)
-		) ELSE (CALL :message "No override files found.")
-	) ELSE (
-		IF EXIST "user-overrides.js" (
-			COPY /B /V /Y user.js.new+"user-overrides.js" "user.js.new"
-			IF DEFINED _merge (
-				CALL :message "Merging user-overrides.js..."
-				CALL :merge user.js.new
-			) ELSE (
-				CALL :message "user-overrides.js appended."
-			)
-		) ELSE (CALL :message "user-overrides.js not found.")
-	)
-	IF EXIST user.js (
-		FC user.js.new user.js >nul && SET "_changed=false" || SET "_changed=true"
-	)
-	IF "!_changed!"=="true" (
-		CALL :message "Backing up..."
-		IF DEFINED _singlebackup (
-			MOVE /Y user.js user.js.bak >nul
-		) ELSE (
-			SET "_time=!time: =0!"
-			MOVE /Y user.js "user-backup-!date:/=-!_!_time::=.!.js" >nul
-		)
-		REN user.js.new user.js
-		CALL :message "Update complete."
-	) ELSE (
-		IF "!_changed!"=="false" (
-			DEL /F user.js.new >nul
-			CALL :message "Update completed without changes."
-		) ELSE (
-			REN user.js.new user.js
-			CALL :message "Update complete."
-		)
-	)
-) ELSE (
-	CALL :message "Update failed. Make sure PowerShell is allowed internet access."
-	ECHO:  No changes were made.
-)
-IF NOT DEFINED _log (
-	IF NOT DEFINED _ua (PAUSE)
-)
-EXIT /B
-
-REM ########### Message Function ###########
-:message
-SETLOCAL DisableDelayedExpansion
-IF NOT "2"=="%_log%" (ECHO:)
-ECHO:  %~1
-IF NOT "2"=="%_log%" (ECHO:)
-ENDLOCAL
-GOTO :EOF
-REM ############ Merge function ############
-:merge
-SETLOCAL DisableDelayedExpansion
-FOR /F tokens^=2^,^*^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^user_pref[ 	]*\([ 	]*[\"'].*[\"'][ 	]*,.*\)[ 	]*;" "%~1"') DO (SET "[%%G]=%%H")
-
-FOR /F tokens^=2^,^*^ delims^=^' %%G IN ('FINDSTR /R /C:"^//// --- comment-out --- '[^'][^']*'.*" "%~1"') DO (SET "__unset__%%G=1")
-(
-	FOR /F "tokens=1,* delims=:" %%I IN ('FINDSTR /N "^" "%~1"') DO (
-		SET "_temp=%%J"
-		SETLOCAL EnableDelayedExpansion
-		IF NOT "!_temp:~0,9!"=="user_pref" (
-			ENDLOCAL & ECHO:%%J
-		) ELSE (
-			IF "!_temp:;=!"=="!_temp!" (
-				ENDLOCAL & ECHO:%%J
-			) ELSE (
-				ENDLOCAL
-				FOR /F tokens^=2^ delims^=^'^" %%K IN ("%%J") DO (
-				
-					IF NOT "_user.js.parrot"=="%%K" (
-						IF DEFINED __unset__%%K (
-							ECHO://%%J
-						) ELSE (
-							IF DEFINED [%%K] (
-								SETLOCAL EnableDelayedExpansion
-								FOR /F "delims=" %%L IN ("![%%K]!") DO (
-									ENDLOCAL & ECHO:user_pref("%%K"%%L
-									SET "[%%K]="
-								)
-							)
-						)
-					) ELSE (ECHO:%%J)
-				)
-			)
-		)
-	)
-)>updatertempfile
-MOVE /Y updatertempfile "%~1" >nul
-ENDLOCAL
-GOTO :EOF
-REM ############### Help ##################
-:showhelp
-MODE 80,46
-CLS
-CALL :message "Available arguments (case-insensitive):"
-CALL :message "  -log"
-ECHO:     Write the console output to a logfile (user.js-update-log.txt)
-CALL :message "  -logP"
-ECHO:     Like -log, but also open the logfile after updating.
-CALL :message "  -merge"
-ECHO:     Merge overrides instead of appending them. Single-line comments and
-ECHO:     _user.js.parrot lines are appended normally. Overrides for inactive
-ECHO:     user.js prefs will be appended. When -Merge and -MultiOverrides are used
-ECHO:     together, a user-overrides-merged.js file is also generated in the root
-ECHO:     directory for quick reference. It contains only the merged data from
-ECHO:     override files and can be safely discarded after updating, or used as the
-ECHO:     new user-overrides.js. When there are conflicting records for the same
-ECHO:     pref, the value of the last one declared will be used. Visit the wiki
-ECHO:     for usage examples and more detailed information.
-CALL :message "  -multiOverrides"
-ECHO:     Use any and all .js files in a user.js-overrides sub-folder as overrides
-ECHO:     instead of the default user-overrides.js file. Files are appended in
-ECHO:     alphabetical order.
-CALL :message "  -unattended"
-ECHO:     Run without user input.
-CALL :message "  -singleBackup"
-ECHO:     Use a single backup file and overwrite it on new updates, instead of
-ECHO:     cumulative backups. This was the default behaviour before v4.3.
-CALL :message "  -updatebatch"
-ECHO:     Update the script itself on execution, before the normal routine.
-CALL :message ""
-PAUSE
-MODE 80,25
-GOTO :begin
-REM #####################################
+@ECHO OFF & SETLOCAL EnableDelayedExpansion
+TITLE ghacks user.js updater
+
+REM ## ghacks-user.js updater for Windows
+REM ## author: @claustromaniac
+REM ## version: 4.5
+REM ## instructions: https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts
+
+SET _myname=%~n0
+SET _myparams=%*
+:parse
+IF "%~1"=="" (GOTO endparse)
+IF /I "%~1"=="-unattended" (SET _ua=1)
+IF /I "%~1"=="-log" (SET _log=1)
+IF /I "%~1"=="-logp" (SET _log=1 & SET _logp=1)
+IF /I "%~1"=="-multioverrides" (SET _multi=1)
+IF /I "%~1"=="-merge" (SET _merge=1)
+IF /I "%~1"=="-updatebatch" (SET _updateb=1)
+IF /I "%~1"=="-singlebackup" (SET _singlebackup=1)
+SHIFT
+GOTO parse
+:endparse
+IF DEFINED _updateb (
+	REM The normal flow here goes from phase 1 to phase 2 and then phase 3.
+	IF NOT "!_myname:~0,9!"=="[updated]" (
+		IF EXIST "[updated]!_myname!.bat" (
+			REM ## Phase 3 ##: The new script, with the original name, will:
+			REM 	* Delete the [updated]*.bat script
+			REM 	* Begin the normal routine
+			REN "[updated]!_myname!.bat" "[updated]!_myname!.bat.old"
+			DEL /F "[updated]!_myname!.bat.old"
+			CALL :message "Script updated^!"
+			TIMEOUT 3 >nul
+			GOTO begin
+		)
+		REM ## Phase 1 ##
+		REM 	* Download new batch and name it [updated]*.bat
+		REM 	* Start that script in a new CMD window
+		REM 	* Exit
+		CALL :message "Updating script..."
+		REM Uncomment the next line and comment the powershell call for testing.
+		REM COPY /B /V /Y "!_myname!.bat" "[updated]!_myname!.bat"
+		(
+			powershell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.bat', '[updated]!_myname!.bat')"
+		) >nul 2>&1
+		IF EXIST "[updated]!_myname!.bat" (
+			START /min CMD /C "[updated]!_myname!.bat" !_myparams!
+		) ELSE (
+			CALL :message "Failed. Make sure PowerShell is allowed internet access."
+			TIMEOUT 120 >nul
+		)
+	) ELSE (
+		IF "!_myname!"=="[updated]" (
+			CALL :message "The [updated] label is reserved. Rename this script and try again."
+			TIMEOUT 300 >nul
+		) ELSE (
+			REM ## Phase 2 ##: The [updated]*.bat script will:
+			REM 	* Copy itself overwriting the original batch
+			REM 	* Start that script in a new CMD instance
+			REM 	* Exit
+			IF EXIST "!_myname:~9!.bat" (
+				REN "!_myname:~9!.bat" "!_myname:~9!.bat.old"
+				DEL /F "!_myname:~9!.bat.old"
+			)
+			COPY /B /V /Y "!_myname!.bat" "!_myname:~9!.bat"
+			START CMD /C "!_myname:~9!.bat" !_myparams!
+		)
+	)
+	EXIT /B
+)
+:begin
+CLS
+ECHO:
+ECHO:
+ECHO:                ########################################
+ECHO:                ####  user.js Updater for Windows   ####
+ECHO:                ####       by claustromaniac        ####
+ECHO:                ####             v4.5               ####
+ECHO:                ########################################
+ECHO:
+SET /A "_line=0"
+IF NOT EXIST user.js (
+	CALL :message "user.js not detected in the current directory."
+) ELSE (
+	FOR /F "skip=1 tokens=1,* delims=:" %%G IN (user.js) DO (
+		SET /A "_line+=1"
+		IF !_line! GEQ 4 (GOTO exitloop)
+		IF !_line! EQU 1 (SET _name=%%H)
+		IF !_line! EQU 2 (SET _date=%%H)
+		IF !_line! EQU 3 (SET _version=%%G)
+	)
+	:exitloop
+	IF NOT "!_name!"=="" (
+		IF /I NOT "!_name!"=="!_name:ghacks=!" (
+			CALL :message "!_name! !_version:~2!,!_date!"
+		) ELSE (CALL :message "Current user.js version not recognised.")
+	) ELSE (CALL :message "Current user.js version not recognised.")
+)
+ECHO:
+IF NOT DEFINED _ua (
+	CALL :message "This batch should be run from your Firefox profile directory."
+	ECHO:  It will download the latest version of ghacks user.js from github and then
+	CALL :message "append any of your own changes from user-overrides.js to it."
+	CALL :message "Visit the wiki for more detailed information."
+	ECHO:
+	TIMEOUT 1 /nobreak >nul
+	CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
+	CLS
+	IF ERRORLEVEL 3 (EXIT /B)
+	IF ERRORLEVEL 2 (GOTO :showhelp)
+)
+IF DEFINED _log (
+	CALL :log >>user.js-update-log.txt 2>&1
+	IF DEFINED _logp (START user.js-update-log.txt)
+	EXIT /B
+	:log
+	SET _log=2
+	ECHO:##################################################################
+	ECHO:  %date%, %time%
+)
+IF EXIST user.js.new (DEL /F "user.js.new")
+CALL :message "Retrieving latest user.js file from github repository..."
+(
+	powershell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js', 'user.js.new')"
+) >nul 2>&1
+IF EXIST user.js.new (
+	IF DEFINED _multi (
+		FORFILES /P user.js-overrides /M *.js >nul 2>&1
+		IF NOT ERRORLEVEL 1 (
+			IF DEFINED _merge (
+				CALL :message "Merging..."
+				COPY /B /V /Y user.js-overrides\*.js user-overrides-merged.js
+				CALL :merge user-overrides-merged.js
+				COPY /B /V /Y user.js.new+user-overrides-merged.js user.js.new
+				CALL :merge user.js.new
+			) ELSE (
+				CALL :message "Appending..."
+				COPY /B /V /Y user.js.new+"user.js-overrides\*.js" user.js.new
+			)
+		) ELSE (CALL :message "No override files found.")
+	) ELSE (
+		IF EXIST "user-overrides.js" (
+			COPY /B /V /Y user.js.new+"user-overrides.js" "user.js.new"
+			IF DEFINED _merge (
+				CALL :message "Merging user-overrides.js..."
+				CALL :merge user.js.new
+			) ELSE (
+				CALL :message "user-overrides.js appended."
+			)
+		) ELSE (CALL :message "user-overrides.js not found.")
+	)
+	IF EXIST user.js (
+		FC user.js.new user.js >nul && SET "_changed=false" || SET "_changed=true"
+	)
+	IF "!_changed!"=="true" (
+		CALL :message "Backing up..."
+		IF DEFINED _singlebackup (
+			MOVE /Y user.js user.js.bak >nul
+		) ELSE (
+			SET "_time=!time: =0!"
+			MOVE /Y user.js "user-backup-!date:/=-!_!_time::=.!.js" >nul
+		)
+		REN user.js.new user.js
+		CALL :message "Update complete."
+	) ELSE (
+		IF "!_changed!"=="false" (
+			DEL /F user.js.new >nul
+			CALL :message "Update completed without changes."
+		) ELSE (
+			REN user.js.new user.js
+			CALL :message "Update complete."
+		)
+	)
+) ELSE (
+	CALL :message "Update failed. Make sure PowerShell is allowed internet access."
+	ECHO:  No changes were made.
+)
+IF NOT DEFINED _log (
+	IF NOT DEFINED _ua (PAUSE)
+)
+EXIT /B
+
+REM ########### Message Function ###########
+:message
+SETLOCAL DisableDelayedExpansion
+IF NOT "2"=="%_log%" (ECHO:)
+ECHO:  %~1
+IF NOT "2"=="%_log%" (ECHO:)
+ENDLOCAL
+GOTO :EOF
+REM ############ Merge function ############
+:merge
+SETLOCAL DisableDelayedExpansion
+FOR /F tokens^=2^,^*^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^user_pref[ 	]*\([ 	]*[\"'].*[\"'][ 	]*,.*\)[ 	]*;" "%~1"') DO (SET "[%%G]=%%H")
+
+FOR /F tokens^=2^,^*^ delims^=^' %%G IN ('FINDSTR /R /C:"^//// --- comment-out --- '[^'][^']*'.*" "%~1"') DO (SET "__unset__%%G=1")
+(
+	FOR /F "tokens=1,* delims=:" %%I IN ('FINDSTR /N "^" "%~1"') DO (
+		SET "_temp=%%J"
+		SETLOCAL EnableDelayedExpansion
+		IF NOT "!_temp:~0,9!"=="user_pref" (
+			ENDLOCAL & ECHO:%%J
+		) ELSE (
+			IF "!_temp:;=!"=="!_temp!" (
+				ENDLOCAL & ECHO:%%J
+			) ELSE (
+				ENDLOCAL
+				FOR /F tokens^=2^ delims^=^'^" %%K IN ("%%J") DO (
+				
+					IF NOT "_user.js.parrot"=="%%K" (
+						IF DEFINED __unset__%%K (
+							ECHO://%%J
+						) ELSE (
+							IF DEFINED [%%K] (
+								SETLOCAL EnableDelayedExpansion
+								FOR /F "delims=" %%L IN ("![%%K]!") DO (
+									ENDLOCAL & ECHO:user_pref("%%K"%%L
+									SET "[%%K]="
+								)
+							)
+						)
+					) ELSE (ECHO:%%J)
+				)
+			)
+		)
+	)
+)>updatertempfile
+MOVE /Y updatertempfile "%~1" >nul
+ENDLOCAL
+GOTO :EOF
+REM ############### Help ##################
+:showhelp
+MODE 80,46
+CLS
+CALL :message "Available arguments (case-insensitive):"
+CALL :message "  -log"
+ECHO:     Write the console output to a logfile (user.js-update-log.txt)
+CALL :message "  -logP"
+ECHO:     Like -log, but also open the logfile after updating.
+CALL :message "  -merge"
+ECHO:     Merge overrides instead of appending them. Single-line comments and
+ECHO:     _user.js.parrot lines are appended normally. Overrides for inactive
+ECHO:     user.js prefs will be appended. When -Merge and -MultiOverrides are used
+ECHO:     together, a user-overrides-merged.js file is also generated in the root
+ECHO:     directory for quick reference. It contains only the merged data from
+ECHO:     override files and can be safely discarded after updating, or used as the
+ECHO:     new user-overrides.js. When there are conflicting records for the same
+ECHO:     pref, the value of the last one declared will be used. Visit the wiki
+ECHO:     for usage examples and more detailed information.
+CALL :message "  -multiOverrides"
+ECHO:     Use any and all .js files in a user.js-overrides sub-folder as overrides
+ECHO:     instead of the default user-overrides.js file. Files are appended in
+ECHO:     alphabetical order.
+CALL :message "  -unattended"
+ECHO:     Run without user input.
+CALL :message "  -singleBackup"
+ECHO:     Use a single backup file and overwrite it on new updates, instead of
+ECHO:     cumulative backups. This was the default behaviour before v4.3.
+CALL :message "  -updatebatch"
+ECHO:     Update the script itself on execution, before the normal routine.
+CALL :message ""
+PAUSE
+MODE 80,25
+GOTO :begin
+REM #####################################

From a1638868ea3a8cc79385633cc6a1be9798525e6a Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 6 Aug 2018 22:31:21 +0000
Subject: [PATCH 0031/1147] Update .gitattributes

---
 .gitattributes | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/.gitattributes b/.gitattributes
index 8cc5e8c..2c7ddd5 100644
--- a/.gitattributes
+++ b/.gitattributes
@@ -5,7 +5,8 @@
 *.yml text
 *.txt text
 *.sh text
-*.bat text eol=crlf
+## *.bat text eol=crlf
+*.bat -text
 
 *.png binary
 

From 9c975b318a838f5dad51eba8f819f47cfb39ad2e Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 6 Aug 2018 23:27:41 +0000
Subject: [PATCH 0032/1147] store file with CRLF

I think there's no way to get rid of ^M but hopefully with `*.bat -text` in `.gitattributes` it shouldn't be a problem because git won't do any line conversion on check-in/out.
This way the raw link as well as the file within the zip download should be in proper MSDOS CRLF format, and git status shouldn't report the file as modified either. ***fingerscrossed!!***
---
 prefsCleaner.bat | 216 +++++++++++++++++++++++------------------------
 1 file changed, 108 insertions(+), 108 deletions(-)

diff --git a/prefsCleaner.bat b/prefsCleaner.bat
index d4eeb13..6e0875d 100644
--- a/prefsCleaner.bat
+++ b/prefsCleaner.bat
@@ -1,108 +1,108 @@
-@ECHO OFF & SETLOCAL DisableDelayedExpansion
-TITLE prefs.js cleaner
-
-REM ### prefs.js cleaner for Windows
-REM ## author: @claustromaniac
-REM ## version: 2.1
-
-:begin
-ECHO:
-ECHO:
-ECHO                 ########################################
-ECHO                 ####  prefs.js cleaner for Windows  ####
-ECHO                 ####        by claustromaniac       ####
-ECHO                 ####              v2.1              ####
-ECHO                 ########################################
-ECHO:
-CALL :message "This script should be run from your Firefox profile directory."
-ECHO   It will remove any entries from prefs.js that also exist in user.js.
-CALL :message "This will allow inactive preferences to be reset to their default values."
-ECHO   This Firefox profile shouldn't be in use during the process.
-CALL :message ""
-TIMEOUT 1 /nobreak >nul
-CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
-CLS
-IF ERRORLEVEL 3 (EXIT /B)
-IF ERRORLEVEL 2 (GOTO :showhelp)
-IF NOT EXIST "user.js" (CALL :abort "user.js not found in the current directory." 30)
-IF NOT EXIST "prefs.js" (CALL :abort "prefs.js not found in the current directory." 30)
-CALL :FFcheck
-CALL :message "Backing up prefs.js..."
-SET "_time=%time: =0%"
-COPY /B /V /Y prefs.js "prefs-backup-%date:/=-%_%_time::=.%.js"
-CALL :message "Cleaning prefs.js..."
-CALL :cleanup
-CALL :message "All done!"
-TIMEOUT 5 >nul
-ENDLOCAL
-EXIT /B
-
-REM ########## Abort Function ###########
-:abort
-CALL :message %1
-TIMEOUT %~2 >nul
-EXIT
-REM ########## Message Function #########
-:message
-ECHO:
-ECHO:  %~1
-ECHO:
-GOTO :EOF
-REM ####### Firefox Check Function ######
-:FFcheck
-TASKLIST /FI "IMAGENAME eq firefox.exe" 2>NUL | FIND /I /N "firefox.exe">NUL
-IF NOT ERRORLEVEL 1 (
-	CLS
-	CALL :message "Firefox is still running."
-	ECHO   If you're not currently using this profile you can continue, otherwise
-	CALL :message "close Firefox first!"
-	ECHO:
-	PAUSE
-	CLS
-	CALL :message "Resuming..."
-	TIMEOUT 5 /nobreak >nul
-)
-GOTO :EOF
-REM ######### Cleanup Function ##########
-:cleanup
-FOR /F tokens^=2^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^[^\"']*user_pref[ 	]*\([ 	]*[\"'][^\"']*[\"'][ 	]*," user.js') DO (
-	IF NOT ""=="%%G" (SET "[%%G]=1")
-)
-(
-	FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" prefs.js') DO (
-		IF ""=="%%H" (
-			ECHO:
-		) ELSE (
-			FOR /F tokens^=1^,2^ delims^=^"^' %%I IN ("%%H") DO (
-				IF NOT DEFINED [%%J] (ECHO:%%H)
-			)
-		)
-	)
-)>tempcleanedprefs
-MOVE /Y tempcleanedprefs prefs.js
-GOTO :EOF
-REM ############### Help ##################
-:showhelp
-MODE 80,34
-CLS
-CALL :message "This script creates a backup of your prefs.js file before doing anything."
-ECHO   It should be safe, but you can follow these steps if something goes wrong:
-ECHO:
-CALL :message "  1. Make sure Firefox is closed."
-ECHO     2. Delete prefs.js in your profile folder.
-CALL :message "  3. Delete Invalidprefs.js if you have one in the same folder."
-ECHO     4. Rename or copy your latest backup to prefs.js.
-CALL :message "  5. Run Firefox and see if you notice anything wrong with it."
-ECHO     6. If you do notice something wrong, especially with your extensions,
-CALL :message "     and/or with the UI, go to about:support, and restart Firefox with"
-ECHO        add-ons disabled. Then, restart it again normally, and see if the
-CALL :message "     problems were solved."
-ECHO:
-CALL :message "If you are able to identify the cause of your issues, please bring it up"
-ECHO   on ghacks-user.js GitHub repository.
-ECHO:
-ECHO:
-PAUSE
-CLS
-GOTO :begin
-REM #####################################
+@ECHO OFF & SETLOCAL DisableDelayedExpansion
+TITLE prefs.js cleaner
+
+REM ### prefs.js cleaner for Windows
+REM ## author: @claustromaniac
+REM ## version: 2.1
+
+:begin
+ECHO:
+ECHO:
+ECHO                 ########################################
+ECHO                 ####  prefs.js cleaner for Windows  ####
+ECHO                 ####        by claustromaniac       ####
+ECHO                 ####              v2.1              ####
+ECHO                 ########################################
+ECHO:
+CALL :message "This script should be run from your Firefox profile directory."
+ECHO   It will remove any entries from prefs.js that also exist in user.js.
+CALL :message "This will allow inactive preferences to be reset to their default values."
+ECHO   This Firefox profile shouldn't be in use during the process.
+CALL :message ""
+TIMEOUT 1 /nobreak >nul
+CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
+CLS
+IF ERRORLEVEL 3 (EXIT /B)
+IF ERRORLEVEL 2 (GOTO :showhelp)
+IF NOT EXIST "user.js" (CALL :abort "user.js not found in the current directory." 30)
+IF NOT EXIST "prefs.js" (CALL :abort "prefs.js not found in the current directory." 30)
+CALL :FFcheck
+CALL :message "Backing up prefs.js..."
+SET "_time=%time: =0%"
+COPY /B /V /Y prefs.js "prefs-backup-%date:/=-%_%_time::=.%.js"
+CALL :message "Cleaning prefs.js..."
+CALL :cleanup
+CALL :message "All done!"
+TIMEOUT 5 >nul
+ENDLOCAL
+EXIT /B
+
+REM ########## Abort Function ###########
+:abort
+CALL :message %1
+TIMEOUT %~2 >nul
+EXIT
+REM ########## Message Function #########
+:message
+ECHO:
+ECHO:  %~1
+ECHO:
+GOTO :EOF
+REM ####### Firefox Check Function ######
+:FFcheck
+TASKLIST /FI "IMAGENAME eq firefox.exe" 2>NUL | FIND /I /N "firefox.exe">NUL
+IF NOT ERRORLEVEL 1 (
+	CLS
+	CALL :message "Firefox is still running."
+	ECHO   If you're not currently using this profile you can continue, otherwise
+	CALL :message "close Firefox first!"
+	ECHO:
+	PAUSE
+	CLS
+	CALL :message "Resuming..."
+	TIMEOUT 5 /nobreak >nul
+)
+GOTO :EOF
+REM ######### Cleanup Function ##########
+:cleanup
+FOR /F tokens^=2^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^[^\"']*user_pref[ 	]*\([ 	]*[\"'][^\"']*[\"'][ 	]*," user.js') DO (
+	IF NOT ""=="%%G" (SET "[%%G]=1")
+)
+(
+	FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" prefs.js') DO (
+		IF ""=="%%H" (
+			ECHO:
+		) ELSE (
+			FOR /F tokens^=1^,2^ delims^=^"^' %%I IN ("%%H") DO (
+				IF NOT DEFINED [%%J] (ECHO:%%H)
+			)
+		)
+	)
+)>tempcleanedprefs
+MOVE /Y tempcleanedprefs prefs.js
+GOTO :EOF
+REM ############### Help ##################
+:showhelp
+MODE 80,34
+CLS
+CALL :message "This script creates a backup of your prefs.js file before doing anything."
+ECHO   It should be safe, but you can follow these steps if something goes wrong:
+ECHO:
+CALL :message "  1. Make sure Firefox is closed."
+ECHO     2. Delete prefs.js in your profile folder.
+CALL :message "  3. Delete Invalidprefs.js if you have one in the same folder."
+ECHO     4. Rename or copy your latest backup to prefs.js.
+CALL :message "  5. Run Firefox and see if you notice anything wrong with it."
+ECHO     6. If you do notice something wrong, especially with your extensions,
+CALL :message "     and/or with the UI, go to about:support, and restart Firefox with"
+ECHO        add-ons disabled. Then, restart it again normally, and see if the
+CALL :message "     problems were solved."
+ECHO:
+CALL :message "If you are able to identify the cause of your issues, please bring it up"
+ECHO   on ghacks-user.js GitHub repository.
+ECHO:
+ECHO:
+PAUSE
+CLS
+GOTO :begin
+REM #####################################

From c4d131aaf91a8d47c44ad141b2d03948ace38027 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 6 Aug 2018 23:33:06 +0000
Subject: [PATCH 0033/1147] Add files via upload (#474)

---
 updater.bat | 528 ++++++++++++++++++++++++++--------------------------
 1 file changed, 263 insertions(+), 265 deletions(-)

diff --git a/updater.bat b/updater.bat
index ef7aaa9..21c83a2 100644
--- a/updater.bat
+++ b/updater.bat
@@ -1,265 +1,263 @@
-@ECHO OFF & SETLOCAL EnableDelayedExpansion
-TITLE ghacks user.js updater
-
-REM ## ghacks-user.js updater for Windows
-REM ## author: @claustromaniac
-REM ## version: 4.5
-REM ## instructions: https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts
-
-SET _myname=%~n0
-SET _myparams=%*
-:parse
-IF "%~1"=="" (GOTO endparse)
-IF /I "%~1"=="-unattended" (SET _ua=1)
-IF /I "%~1"=="-log" (SET _log=1)
-IF /I "%~1"=="-logp" (SET _log=1 & SET _logp=1)
-IF /I "%~1"=="-multioverrides" (SET _multi=1)
-IF /I "%~1"=="-merge" (SET _merge=1)
-IF /I "%~1"=="-updatebatch" (SET _updateb=1)
-IF /I "%~1"=="-singlebackup" (SET _singlebackup=1)
-SHIFT
-GOTO parse
-:endparse
-IF DEFINED _updateb (
-	REM The normal flow here goes from phase 1 to phase 2 and then phase 3.
-	IF NOT "!_myname:~0,9!"=="[updated]" (
-		IF EXIST "[updated]!_myname!.bat" (
-			REM ## Phase 3 ##: The new script, with the original name, will:
-			REM 	* Delete the [updated]*.bat script
-			REM 	* Begin the normal routine
-			REN "[updated]!_myname!.bat" "[updated]!_myname!.bat.old"
-			DEL /F "[updated]!_myname!.bat.old"
-			CALL :message "Script updated^!"
-			TIMEOUT 3 >nul
-			GOTO begin
-		)
-		REM ## Phase 1 ##
-		REM 	* Download new batch and name it [updated]*.bat
-		REM 	* Start that script in a new CMD window
-		REM 	* Exit
-		CALL :message "Updating script..."
-		REM Uncomment the next line and comment the powershell call for testing.
-		REM COPY /B /V /Y "!_myname!.bat" "[updated]!_myname!.bat"
-		(
-			powershell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.bat', '[updated]!_myname!.bat')"
-		) >nul 2>&1
-		IF EXIST "[updated]!_myname!.bat" (
-			START /min CMD /C "[updated]!_myname!.bat" !_myparams!
-		) ELSE (
-			CALL :message "Failed. Make sure PowerShell is allowed internet access."
-			TIMEOUT 120 >nul
-		)
-	) ELSE (
-		IF "!_myname!"=="[updated]" (
-			CALL :message "The [updated] label is reserved. Rename this script and try again."
-			TIMEOUT 300 >nul
-		) ELSE (
-			REM ## Phase 2 ##: The [updated]*.bat script will:
-			REM 	* Copy itself overwriting the original batch
-			REM 	* Start that script in a new CMD instance
-			REM 	* Exit
-			IF EXIST "!_myname:~9!.bat" (
-				REN "!_myname:~9!.bat" "!_myname:~9!.bat.old"
-				DEL /F "!_myname:~9!.bat.old"
-			)
-			COPY /B /V /Y "!_myname!.bat" "!_myname:~9!.bat"
-			START CMD /C "!_myname:~9!.bat" !_myparams!
-		)
-	)
-	EXIT /B
-)
-:begin
-CLS
-ECHO:
-ECHO:
-ECHO:                ########################################
-ECHO:                ####  user.js Updater for Windows   ####
-ECHO:                ####       by claustromaniac        ####
-ECHO:                ####             v4.5               ####
-ECHO:                ########################################
-ECHO:
-SET /A "_line=0"
-IF NOT EXIST user.js (
-	CALL :message "user.js not detected in the current directory."
-) ELSE (
-	FOR /F "skip=1 tokens=1,* delims=:" %%G IN (user.js) DO (
-		SET /A "_line+=1"
-		IF !_line! GEQ 4 (GOTO exitloop)
-		IF !_line! EQU 1 (SET _name=%%H)
-		IF !_line! EQU 2 (SET _date=%%H)
-		IF !_line! EQU 3 (SET _version=%%G)
-	)
-	:exitloop
-	IF NOT "!_name!"=="" (
-		IF /I NOT "!_name!"=="!_name:ghacks=!" (
-			CALL :message "!_name! !_version:~2!,!_date!"
-		) ELSE (CALL :message "Current user.js version not recognised.")
-	) ELSE (CALL :message "Current user.js version not recognised.")
-)
-ECHO:
-IF NOT DEFINED _ua (
-	CALL :message "This batch should be run from your Firefox profile directory."
-	ECHO:  It will download the latest version of ghacks user.js from github and then
-	CALL :message "append any of your own changes from user-overrides.js to it."
-	CALL :message "Visit the wiki for more detailed information."
-	ECHO:
-	TIMEOUT 1 /nobreak >nul
-	CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
-	CLS
-	IF ERRORLEVEL 3 (EXIT /B)
-	IF ERRORLEVEL 2 (GOTO :showhelp)
-)
-IF DEFINED _log (
-	CALL :log >>user.js-update-log.txt 2>&1
-	IF DEFINED _logp (START user.js-update-log.txt)
-	EXIT /B
-	:log
-	SET _log=2
-	ECHO:##################################################################
-	ECHO:  %date%, %time%
-)
-IF EXIST user.js.new (DEL /F "user.js.new")
-CALL :message "Retrieving latest user.js file from github repository..."
-(
-	powershell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js', 'user.js.new')"
-) >nul 2>&1
-IF EXIST user.js.new (
-	IF DEFINED _multi (
-		FORFILES /P user.js-overrides /M *.js >nul 2>&1
-		IF NOT ERRORLEVEL 1 (
-			IF DEFINED _merge (
-				CALL :message "Merging..."
-				COPY /B /V /Y user.js-overrides\*.js user-overrides-merged.js
-				CALL :merge user-overrides-merged.js
-				COPY /B /V /Y user.js.new+user-overrides-merged.js user.js.new
-				CALL :merge user.js.new
-			) ELSE (
-				CALL :message "Appending..."
-				COPY /B /V /Y user.js.new+"user.js-overrides\*.js" user.js.new
-			)
-		) ELSE (CALL :message "No override files found.")
-	) ELSE (
-		IF EXIST "user-overrides.js" (
-			COPY /B /V /Y user.js.new+"user-overrides.js" "user.js.new"
-			IF DEFINED _merge (
-				CALL :message "Merging user-overrides.js..."
-				CALL :merge user.js.new
-			) ELSE (
-				CALL :message "user-overrides.js appended."
-			)
-		) ELSE (CALL :message "user-overrides.js not found.")
-	)
-	IF EXIST user.js (
-		FC user.js.new user.js >nul && SET "_changed=false" || SET "_changed=true"
-	)
-	IF "!_changed!"=="true" (
-		CALL :message "Backing up..."
-		IF DEFINED _singlebackup (
-			MOVE /Y user.js user.js.bak >nul
-		) ELSE (
-			SET "_time=!time: =0!"
-			MOVE /Y user.js "user-backup-!date:/=-!_!_time::=.!.js" >nul
-		)
-		REN user.js.new user.js
-		CALL :message "Update complete."
-	) ELSE (
-		IF "!_changed!"=="false" (
-			DEL /F user.js.new >nul
-			CALL :message "Update completed without changes."
-		) ELSE (
-			REN user.js.new user.js
-			CALL :message "Update complete."
-		)
-	)
-) ELSE (
-	CALL :message "Update failed. Make sure PowerShell is allowed internet access."
-	ECHO:  No changes were made.
-)
-IF NOT DEFINED _log (
-	IF NOT DEFINED _ua (PAUSE)
-)
-EXIT /B
-
-REM ########### Message Function ###########
-:message
-SETLOCAL DisableDelayedExpansion
-IF NOT "2"=="%_log%" (ECHO:)
-ECHO:  %~1
-IF NOT "2"=="%_log%" (ECHO:)
-ENDLOCAL
-GOTO :EOF
-REM ############ Merge function ############
-:merge
-SETLOCAL DisableDelayedExpansion
-FOR /F tokens^=2^,^*^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^user_pref[ 	]*\([ 	]*[\"'].*[\"'][ 	]*,.*\)[ 	]*;" "%~1"') DO (SET "[%%G]=%%H")
-
-FOR /F tokens^=2^,^*^ delims^=^' %%G IN ('FINDSTR /R /C:"^//// --- comment-out --- '[^'][^']*'.*" "%~1"') DO (SET "__unset__%%G=1")
-(
-	FOR /F "tokens=1,* delims=:" %%I IN ('FINDSTR /N "^" "%~1"') DO (
-		SET "_temp=%%J"
-		SETLOCAL EnableDelayedExpansion
-		IF NOT "!_temp:~0,9!"=="user_pref" (
-			ENDLOCAL & ECHO:%%J
-		) ELSE (
-			IF "!_temp:;=!"=="!_temp!" (
-				ENDLOCAL & ECHO:%%J
-			) ELSE (
-				ENDLOCAL
-				FOR /F tokens^=2^ delims^=^'^" %%K IN ("%%J") DO (
-				
-					IF NOT "_user.js.parrot"=="%%K" (
-						IF DEFINED __unset__%%K (
-							ECHO://%%J
-						) ELSE (
-							IF DEFINED [%%K] (
-								SETLOCAL EnableDelayedExpansion
-								FOR /F "delims=" %%L IN ("![%%K]!") DO (
-									ENDLOCAL & ECHO:user_pref("%%K"%%L
-									SET "[%%K]="
-								)
-							)
-						)
-					) ELSE (ECHO:%%J)
-				)
-			)
-		)
-	)
-)>updatertempfile
-MOVE /Y updatertempfile "%~1" >nul
-ENDLOCAL
-GOTO :EOF
-REM ############### Help ##################
-:showhelp
-MODE 80,46
-CLS
-CALL :message "Available arguments (case-insensitive):"
-CALL :message "  -log"
-ECHO:     Write the console output to a logfile (user.js-update-log.txt)
-CALL :message "  -logP"
-ECHO:     Like -log, but also open the logfile after updating.
-CALL :message "  -merge"
-ECHO:     Merge overrides instead of appending them. Single-line comments and
-ECHO:     _user.js.parrot lines are appended normally. Overrides for inactive
-ECHO:     user.js prefs will be appended. When -Merge and -MultiOverrides are used
-ECHO:     together, a user-overrides-merged.js file is also generated in the root
-ECHO:     directory for quick reference. It contains only the merged data from
-ECHO:     override files and can be safely discarded after updating, or used as the
-ECHO:     new user-overrides.js. When there are conflicting records for the same
-ECHO:     pref, the value of the last one declared will be used. Visit the wiki
-ECHO:     for usage examples and more detailed information.
-CALL :message "  -multiOverrides"
-ECHO:     Use any and all .js files in a user.js-overrides sub-folder as overrides
-ECHO:     instead of the default user-overrides.js file. Files are appended in
-ECHO:     alphabetical order.
-CALL :message "  -unattended"
-ECHO:     Run without user input.
-CALL :message "  -singleBackup"
-ECHO:     Use a single backup file and overwrite it on new updates, instead of
-ECHO:     cumulative backups. This was the default behaviour before v4.3.
-CALL :message "  -updatebatch"
-ECHO:     Update the script itself on execution, before the normal routine.
-CALL :message ""
-PAUSE
-MODE 80,25
-GOTO :begin
-REM #####################################
+@ECHO OFF & SETLOCAL EnableDelayedExpansion
+TITLE ghacks user.js updater
+
+REM ## ghacks-user.js updater for Windows
+REM ## author: @claustromaniac
+REM ## version: 4.5
+REM ## instructions: https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts
+
+SET _myname=%~n0
+SET _myparams=%*
+:parse
+IF "%~1"=="" (GOTO endparse)
+IF /I "%~1"=="-unattended" (SET _ua=1)
+IF /I "%~1"=="-log" (SET _log=1)
+IF /I "%~1"=="-logp" (SET _log=1 & SET _logp=1)
+IF /I "%~1"=="-multioverrides" (SET _multi=1)
+IF /I "%~1"=="-merge" (SET _merge=1)
+IF /I "%~1"=="-updatebatch" (SET _updateb=1)
+IF /I "%~1"=="-singlebackup" (SET _singlebackup=1)
+SHIFT
+GOTO parse
+:endparse
+IF DEFINED _updateb (
+	REM The normal flow here goes from phase 1 to phase 2 and then phase 3.
+	IF NOT "!_myname:~0,9!"=="[updated]" (
+		IF EXIST "[updated]!_myname!.bat" (
+			REM ## Phase 3 ##: The new script, with the original name, will:
+			REM 	* Delete the [updated]*.bat script
+			REM 	* Begin the normal routine
+			REN "[updated]!_myname!.bat" "[updated]!_myname!.bat.old"
+			DEL /F "[updated]!_myname!.bat.old"
+			CALL :message "Script updated^!"
+			TIMEOUT 3 >nul
+			GOTO begin
+		)
+		REM ## Phase 1 ##
+		REM 	* Download new batch and name it [updated]*.bat
+		REM 	* Start that script in a new CMD window
+		REM 	* Exit
+		CALL :message "Updating script..."
+		REM Uncomment the next line and comment the powershell call for testing.
+		REM COPY /B /V /Y "!_myname!.bat" "[updated]!_myname!.bat"
+		(
+			powershell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.bat', '[updated]!_myname!.bat')"
+		) >nul 2>&1
+		IF EXIST "[updated]!_myname!.bat" (
+			START /min CMD /C "[updated]!_myname!.bat" !_myparams!
+		) ELSE (
+			CALL :message "Failed. Make sure PowerShell is allowed internet access."
+			TIMEOUT 120 >nul
+		)
+	) ELSE (
+		IF "!_myname!"=="[updated]" (
+			CALL :message "The [updated] label is reserved. Rename this script and try again."
+			TIMEOUT 300 >nul
+		) ELSE (
+			REM ## Phase 2 ##: The [updated]*.bat script will:
+			REM 	* Copy itself overwriting the original batch
+			REM 	* Start that script in a new CMD instance
+			REM 	* Exit
+			IF EXIST "!_myname:~9!.bat" (
+				REN "!_myname:~9!.bat" "!_myname:~9!.bat.old"
+				DEL /F "!_myname:~9!.bat.old"
+			)
+			COPY /B /V /Y "!_myname!.bat" "!_myname:~9!.bat"
+			START CMD /C "!_myname:~9!.bat" !_myparams!
+		)
+	)
+	EXIT /B
+)
+:begin
+CLS
+ECHO:
+ECHO:
+ECHO:                ########################################
+ECHO:                ####  user.js Updater for Windows   ####
+ECHO:                ####       by claustromaniac        ####
+ECHO:                ####             v4.5               ####
+ECHO:                ########################################
+ECHO:
+SET /A "_line=0"
+IF NOT EXIST user.js (
+	CALL :message "user.js not detected in the current directory."
+) ELSE (
+	FOR /F "skip=1 tokens=1,* delims=:" %%G IN (user.js) DO (
+		SET /A "_line+=1"
+		IF !_line! GEQ 4 (GOTO exitloop)
+		IF !_line! EQU 1 (SET _name=%%H)
+		IF !_line! EQU 2 (SET _date=%%H)
+		IF !_line! EQU 3 (SET _version=%%G)
+	)
+	:exitloop
+	IF NOT "!_name!"=="" (
+		IF /I NOT "!_name!"=="!_name:ghacks=!" (
+			CALL :message "!_name! !_version:~2!,!_date!"
+		) ELSE (CALL :message "Current user.js version not recognised.")
+	) ELSE (CALL :message "Current user.js version not recognised.")
+)
+ECHO:
+IF NOT DEFINED _ua (
+	CALL :message "This batch should be run from your Firefox profile directory."
+	ECHO:  It will download the latest version of ghacks user.js from github and then
+	CALL :message "append any of your own changes from user-overrides.js to it."
+	CALL :message "Visit the wiki for more detailed information."
+	ECHO:
+	TIMEOUT 1 /nobreak >nul
+	CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
+	CLS
+	IF ERRORLEVEL 3 (EXIT /B)
+	IF ERRORLEVEL 2 (GOTO :showhelp)
+)
+IF DEFINED _log (
+	CALL :log >>user.js-update-log.txt 2>&1
+	IF DEFINED _logp (START user.js-update-log.txt)
+	EXIT /B
+	:log
+	SET _log=2
+	ECHO:##################################################################
+	ECHO:  %date%, %time%
+)
+IF EXIST user.js.new (DEL /F "user.js.new")
+CALL :message "Retrieving latest user.js file from github repository..."
+(
+	powershell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js', 'user.js.new')"
+) >nul 2>&1
+IF EXIST user.js.new (
+	IF DEFINED _multi (
+		FORFILES /P user.js-overrides /M *.js >nul 2>&1
+		IF NOT ERRORLEVEL 1 (
+			IF DEFINED _merge (
+				CALL :message "Merging..."
+				COPY /B /V /Y user.js-overrides\*.js user-overrides-merged.js
+				CALL :merge user-overrides-merged.js
+				COPY /B /V /Y user.js.new+user-overrides-merged.js user.js.new
+				CALL :merge user.js.new
+			) ELSE (
+				CALL :message "Appending..."
+				COPY /B /V /Y user.js.new+"user.js-overrides\*.js" user.js.new
+			)
+		) ELSE (CALL :message "No override files found.")
+	) ELSE (
+		IF EXIST "user-overrides.js" (
+			COPY /B /V /Y user.js.new+"user-overrides.js" "user.js.new"
+			IF DEFINED _merge (
+				CALL :message "Merging user-overrides.js..."
+				CALL :merge user.js.new
+			) ELSE (
+				CALL :message "user-overrides.js appended."
+			)
+		) ELSE (CALL :message "user-overrides.js not found.")
+	)
+	IF EXIST user.js (
+		FC user.js.new user.js >nul && SET "_changed=false" || SET "_changed=true"
+	)
+	IF "!_changed!"=="true" (
+		CALL :message "Backing up..."
+		IF DEFINED _singlebackup (
+			MOVE /Y user.js user.js.bak >nul
+		) ELSE (
+			SET "_time=!time: =0!"
+			MOVE /Y user.js "user-backup-!date:/=-!_!_time::=.!.js" >nul
+		)
+		REN user.js.new user.js
+		CALL :message "Update complete."
+	) ELSE (
+		IF "!_changed!"=="false" (
+			DEL /F user.js.new >nul
+			CALL :message "Update completed without changes."
+		) ELSE (
+			REN user.js.new user.js
+			CALL :message "Update complete."
+		)
+	)
+) ELSE (
+	CALL :message "Update failed. Make sure PowerShell is allowed internet access."
+	ECHO:  No changes were made.
+)
+IF NOT DEFINED _log (
+	IF NOT DEFINED _ua (PAUSE)
+)
+EXIT /B
+
+REM ########### Message Function ###########
+:message
+SETLOCAL DisableDelayedExpansion
+IF NOT "2"=="%_log%" (ECHO:)
+ECHO:  %~1
+IF NOT "2"=="%_log%" (ECHO:)
+ENDLOCAL
+GOTO :EOF
+REM ############ Merge function ############
+:merge
+SETLOCAL DisableDelayedExpansion
+FOR /F tokens^=2^,^*^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^user_pref[ 	]*\([ 	]*[\"'].*[\"'][ 	]*,.*\)[ 	]*;" "%~1"') DO (SET "[%%G]=%%H")
+FOR /F tokens^=2^,^*^ delims^=^' %%G IN ('FINDSTR /R /C:"^//// --- comment-out --- '[^'][^']*'.*" "%~1"') DO (SET "__unset__%%G=1")
+(
+	FOR /F "tokens=1,* delims=:" %%I IN ('FINDSTR /N "^" "%~1"') DO (
+		SET "_temp=%%J"
+		SETLOCAL EnableDelayedExpansion
+		IF NOT "!_temp:~0,9!"=="user_pref" (
+			ENDLOCAL & ECHO:%%J
+		) ELSE (
+			IF "!_temp:;=!"=="!_temp!" (
+				ENDLOCAL & ECHO:%%J
+			) ELSE (
+				ENDLOCAL
+				FOR /F tokens^=2^ delims^=^'^" %%K IN ("%%J") DO (
+					IF NOT "_user.js.parrot"=="%%K" (
+						IF DEFINED __unset__%%K (
+							ECHO://%%J
+						) ELSE (
+							IF DEFINED [%%K] (
+								SETLOCAL EnableDelayedExpansion
+								FOR /F "delims=" %%L IN ("![%%K]!") DO (
+									ENDLOCAL & ECHO:user_pref("%%K"%%L
+									SET "[%%K]="
+								)
+							)
+						)
+					) ELSE (ECHO:%%J)
+				)
+			)
+		)
+	)
+)>updatertempfile
+MOVE /Y updatertempfile "%~1" >nul
+ENDLOCAL
+GOTO :EOF
+REM ############### Help ##################
+:showhelp
+MODE 80,46
+CLS
+CALL :message "Available arguments (case-insensitive):"
+CALL :message "  -log"
+ECHO:     Write the console output to a logfile (user.js-update-log.txt)
+CALL :message "  -logP"
+ECHO:     Like -log, but also open the logfile after updating.
+CALL :message "  -merge"
+ECHO:     Merge overrides instead of appending them. Single-line comments and
+ECHO:     _user.js.parrot lines are appended normally. Overrides for inactive
+ECHO:     user.js prefs will be appended. When -Merge and -MultiOverrides are used
+ECHO:     together, a user-overrides-merged.js file is also generated in the root
+ECHO:     directory for quick reference. It contains only the merged data from
+ECHO:     override files and can be safely discarded after updating, or used as the
+ECHO:     new user-overrides.js. When there are conflicting records for the same
+ECHO:     pref, the value of the last one declared will be used. Visit the wiki
+ECHO:     for usage examples and more detailed information.
+CALL :message "  -multiOverrides"
+ECHO:     Use any and all .js files in a user.js-overrides sub-folder as overrides
+ECHO:     instead of the default user-overrides.js file. Files are appended in
+ECHO:     alphabetical order.
+CALL :message "  -unattended"
+ECHO:     Run without user input.
+CALL :message "  -singleBackup"
+ECHO:     Use a single backup file and overwrite it on new updates, instead of
+ECHO:     cumulative backups. This was the default behaviour before v4.3.
+CALL :message "  -updatebatch"
+ECHO:     Update the script itself on execution, before the normal routine.
+CALL :message ""
+PAUSE
+MODE 80,25
+GOTO :begin
+REM #####################################

From b3b3ae4660a402a4cfca05e559ea5bc265718ff4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 8 Aug 2018 14:34:08 +0000
Subject: [PATCH 0034/1147] finalize 61

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index ca67a19..b65ca07 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 06 July 2018
-* version 61-beta: You Can't Hurry Pants
+* date: 08 August 2018
+* version 61: You Can't Hurry Pants
 *   "My mama said, "You can't hurry pants. No, you'll just have to wait""
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From cfa2da8fea4d23f61c6d2ac4a405b1f91ba1af32 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Aug 2018 03:28:54 +0000
Subject: [PATCH 0035/1147] start 62 commits

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index b65ca07..ecf759d 100644
--- a/user.js
+++ b/user.js
@@ -1,8 +1,8 @@
 /******
 * name: ghacks user.js
 * date: 08 August 2018
-* version 61: You Can't Hurry Pants
-*   "My mama said, "You can't hurry pants. No, you'll just have to wait""
+* version 62-alpha: Total Eclipse of the Pants
+*   "Once upon a time there was light in my life, but now there's only pants in the dark"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From ab404680dfc07f192dd8ead1660657689f3788e0 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Thu, 9 Aug 2018 03:30:57 +0000
Subject: [PATCH 0036/1147] remove [SETTING-ESR52] lines (#475)

---
 user.js | 45 ++++++++++-----------------------------------
 1 file changed, 10 insertions(+), 35 deletions(-)

diff --git a/user.js b/user.js
index ecf759d..b972a16 100644
--- a/user.js
+++ b/user.js
@@ -51,7 +51,6 @@ user_pref("general.warnOnAboutConfig", false);
 
 /* 0001: start Firefox in PB (Private Browsing) mode
  * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
- * [SETTING-ESR52] Privacy>History>Custom Settings>Always use private browsing mode
  * [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed
  * [NOTE] The P in PB mode is misleading: it means no "persistent" local storage of history,
  * caches, searches or cookies (which you can achieve in normal mode). In fact, it limits or
@@ -125,23 +124,20 @@ user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?ke
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
 /* 0301a: disable auto-update checks for Firefox
  * [NOTE] Firefox currently checks every 12 hrs and allows 8 day notification dismissal
- * [SETTING] General>Firefox Updates>Never check for updates
- * [SETTING-ESR52] Advanced>Update>Never check for updates ***/
+ * [SETTING] General>Firefox Updates>Never check for updates ***/
    // user_pref("app.update.enabled", false);
 /* 0301b: disable auto-update checks for extensions
  * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
    // user_pref("extensions.update.enabled", false);
 /* 0302a: disable auto update installing for Firefox (after the check in 0301a)
  * [SETTING] General>Firefox Updates>Check for updates but let you choose...
- * [SETTING-ESR52] Advanced>Update>Check for updates but let you choose...
  * [NOTE] The UI checkbox also controls the behavior for checking, the pref only controls auto installing ***/
 user_pref("app.update.auto", false);
 /* 0302b: disable auto update installing for extensions (after the check in 0301b)
  * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
 user_pref("extensions.update.autoUpdateDefault", false);
 /* 0303: disable background update service [WINDOWS]
- * [SETTING] General>Firefox Updates>Use a background service to install updates
- * [SETTING-ESR52] Advanced>Update>Use a background service to install updates ***/
+ * [SETTING] General>Firefox Updates>Use a background service to install updates ***/
 user_pref("app.update.service.enabled", false);
 /* 0304: disable background update staging ***/
 user_pref("app.update.staging.enabled", false);
@@ -154,8 +150,7 @@ user_pref("extensions.getAddons.cache.enabled", false);
 /* 0307: disable auto updating of personas (themes) ***/
 user_pref("lightweightThemes.update.enabled", false);
 /* 0308: disable search update
- * [SETTING] General>Firefox Update>Automatically update search engines
- * [SETTING-ESR52] Advanced>Update>Automatically update: Search Engines ***/
+ * [SETTING] General>Firefox Update>Automatically update search engines ***/
 user_pref("browser.search.update", false);
 /* 0309: disable sending Flash crash reports ***/
 user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
@@ -296,8 +291,7 @@ user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
 user_pref("privacy.trackingprotection.ui.enabled", true);
 /* 0422: set which Tracking Protection block list to use
  * [WARNING] We don't recommend enforcing this from here, as available block lists can change
- * [SETTING] Privacy & Security>Tracking Protection>Change Block List
- * [SETTING-ESR52] Privacy>Use Tracking Protection>Change Block List ***/
+ * [SETTING] Privacy & Security>Tracking Protection>Change Block List ***/
    // user_pref("urlclassifier.trackingTable", "test-track-simple,base-track-digest256"); // basic
 /* 0423: disable Mozilla's blocklist for known Flash tracking/fingerprinting (FF48+)
  * [1] https://www.ghacks.net/2016/07/18/firefox-48-blocklist-against-plugin-fingerprinting/
@@ -381,7 +375,6 @@ user_pref("browser.library.activity-stream.enabled", false); // (FF57+)
 user_pref("browser.onboarding.enabled", false);
 /* 0517: disable Form Autofill (FF55+)
  * [SETTING] Privacy & Security>Forms & Passwords>Enable Profile Autofill
- * [SETTING-ESR52] Privacy>Forms & Passwords>Enable Profile Autofill
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
  * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill
@@ -537,7 +530,6 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
  *   - If *ALL* of the suggestion types are false, 'autocomplete' must also be false
  *   - If *ANY* of the suggestion types are true, 'autocomplete' must also be true
  * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest
- * [SETTING-ESR52] Privacy>Location Bar>When using the location bar, suggest
  * [WARNING] If all three suggestion types are false, search engine keywords are disabled ***/
 user_pref("browser.urlbar.autocomplete.enabled", false);
 user_pref("browser.urlbar.suggest.history", false);
@@ -563,12 +555,10 @@ user_pref("browser.urlbar.oneOffSearches", false);
 user_pref("browser.urlbar.maxHistoricalSearchSuggestions", 0); // max. number of search suggestions
 /* 0860: disable search and form history
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
- * [SETTING-ESR52] Privacy>History>Custom Settings>Remember search and form history
  * [NOTE] You can clear formdata on exiting Firefox (see 2803) ***/
 user_pref("browser.formfill.enable", false);
 /* 0862: disable browsing and download history
  * [SETTING] Privacy & Security>History>Custom Settings>Remember my browsing and download history
- * [SETTING-ESR52] Privacy>History>Custom Settings>Remember my browsing and download history
  * [NOTE] You can clear history and downloads on exiting Firefox (see 2803) ***/
    // user_pref("places.history.enabled", false);
 /* 0870: disable Windows jumplist [WINDOWS] ***/
@@ -583,13 +573,11 @@ user_pref("browser.taskbar.previews.enable", false);
 user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
 /* 0901: disable saving passwords
  * [SETTING] Privacy & Security>Forms & Passwords>Remember logins and passwords for sites
- * [SETTING-ESR52] Security>Logins>Remember logins for sites
  * [NOTE] This does not clear any passwords already saved ***/
    // user_pref("signon.rememberSignons", false);
 /* 0902: use a master password (recommended if you save passwords)
  * There are no preferences for this. It is all handled internally.
  * [SETTING] Privacy & Security>Forms & Passwords>Use a master password
- * [SETTING-ESR52] Security>Logins>Use a master password
  * [1] https://support.mozilla.org/kb/use-master-password-protect-stored-logins ***/
 /* 0903: set how often Firefox should ask for the master password
  * 0=the first time (default), 1=every time it's needed, 2=every n minutes (as per the next pref) ***/
@@ -836,12 +824,10 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
  * If you disallow fonts, this drastically limits/reduces font
  * enumeration (by JS) which is a high entropy fingerprinting vector.
  * [SETTING] General>Language and Appearance>Advanced>Allow pages to choose...
- * [SETTING-ESR52] Content>Font & Colors>Advanced>Allow pages to choose...
  * [SETUP] Disabling fonts can uglify the web a fair bit. ***/
 user_pref("browser.display.use_document_fonts", 0);
 /* 1402: set more legible default fonts [SETUP]
  * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Serif|Sans-serif|Monospace
- * [SETTING-ESR52] Content>Fonts & Colors>Advanced>Serif|Sans-serif|Monospace
  * [NOTE] Example below for Windows/Western only ***/
    // user_pref("font.name.serif.x-unicode", "Georgia");
    // user_pref("font.name.serif.x-western", "Georgia"); // default: Times New Roman
@@ -922,7 +908,6 @@ user_pref("network.http.referer.defaultPolicy.pbmode", 2); // (FF59+) default: 2
 user_pref("network.http.referer.hideOnionSource", true);
 /* 1610: ALL: enable the DNT (Do Not Track) HTTP header
  * [SETTING] Privacy & Security>Tracking Protecting>Send websites a "Do Not Track"...
- * [SETTING-ESR52] Privacy>Use Tracking Protecting>manage your Do Not Track settings
  * [NOTE] DNT is enforced with TP (see 0420) regardless of this pref ***/
 user_pref("privacy.donottrackheader.enabled", true);
 
@@ -936,8 +921,7 @@ user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
  * [1] https://bugzilla.mozilla.org/1279029 ***/
    // user_pref("privacy.userContext.ui.enabled", true);
 /* 1702: enable Container Tabs (FF50+)
- * [SETTING] Privacy & Security>Tabs>Enable Container Tabs
- * [SETTING-ESR52] Privacy>Container Tabs>Enable Container Tabs ***/
+ * [SETTING] Privacy & Security>Tabs>Enable Container Tabs ***/
    // user_pref("privacy.userContext.enabled", true);
 /* 1703: enable a private container for thumbnail loads (FF51+) ***/
    // user_pref("privacy.usercontext.about_newtab_segregation.enabled", true);
@@ -1072,8 +1056,7 @@ user_pref("browser.link.open_newwindow.restriction", 0);
  * [TEST] https://developer.mozilla.org/samples/domref/fullscreen.html ***/
 user_pref("full-screen-api.enabled", false);
 /* 2210: block popup windows
- * [SETTING] Privacy & Security>Permissions>Block pop-up windows
- * [SETTING-ESR52] Content>Pop-ups>Block pop-up windows ***/
+ * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
 user_pref("dom.disable_open_during_load", true);
 /* 2211: set max popups from a single non-click event - default is 20! ***/
 user_pref("dom.popup_maximum", 3);
@@ -1188,7 +1171,6 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
 user_pref("media.navigator.enabled", false);
 /* 2508: disable hardware acceleration to reduce graphics fingerprinting
  * [SETTING] General>Performance>Custom>Use hardware acceleration when available
- * [SETTING-ESR52] Advanced>General>Use hardware acceleration when available
  * [WARNING] [SETUP] Affects text rendering (fonts will look different), impacts video performance,
  * and parts of Quantum that utilize the GPU will also be affected as they are rolled out
  * [1] https://wiki.mozilla.org/Platform/GFX/HardwareAcceleration ***/
@@ -1272,7 +1254,6 @@ user_pref("ui.use_standins_for_native_colors", true); // (hidden pref)
 user_pref("network.IDN_show_punycode", true);
 /* 2620: enable Firefox's built-in PDF reader [SETUP]
  * [SETTING] General>Applications>Portable Document Format (PDF)
- * [SETTING-ESR52] Applications>Portable Document Format (PDF)
  * This setting controls if the option "Display in Firefox" in the above setting is available
  *   and by effect controls whether PDFs are handled in-browser or externally ("Ask" or "Open With")
  * PROS: pdfjs is lightweight, open source, and as secure/vetted as any pdf reader out there (more than most)
@@ -1288,8 +1269,7 @@ user_pref("pdfjs.disabled", false);
  * [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
 user_pref("browser.download.folderList", 2);
 /* 2651: enforce user interaction for security by always asking the user where to download
- * [SETTING] General>Downloads>Always ask you where to save files
- * [SETTING-ESR52] General>Downloads>Always ask me where to save files ***/
+ * [SETTING] General>Downloads>Always ask you where to save files ***/
 user_pref("browser.download.useDownloadDir", false);
 /* 2652: disable adding downloads to the system's "recent documents" list ***/
 user_pref("browser.download.manager.addToRecentDocs", false);
@@ -1319,8 +1299,7 @@ user_pref("extensions.webextensions.keepUuidOnUninstall", false);
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
    // user_pref("extensions.webextensions.restrictedDomains", "");
 /* 2663: enable warning when websites try to install add-ons
- * [SETTING] Privacy & Security>Permissions>Warn you when websites try to install add-ons
- * [SETTING-ESR52] Security>General>Warn me when sites try to install add-ons ***/
+ * [SETTING] Privacy & Security>Permissions>Warn you when websites try to install add-ons ***/
 user_pref("xpinstall.whitelist.required", true); // default: true
 
 /** SECURITY ***/
@@ -1356,7 +1335,6 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * You can set exceptions under site permissions or use an extension
  * 0=allow all 1=allow same host 2=disallow all 3=allow 3rd party if it already set a cookie
  * [SETTING] Privacy & Security>History>Custom Settings>Accept cookies from sites
- * [SETTING-ESR52] Privacy>History>Custom Settings>Accept cookies from sites
  * [NOTE] Blocking 3rd party controls 3rd party access to localStorage, IndexedDB, Cache API and Service Worker Cache.
  * Blocking 1st party controls access to localStorage and IndexedDB (note: Service Workers can still use IndexedDB).
  * [1] https://www.fxsitecompat.com/en-CA/docs/2015/web-storage-indexeddb-cache-api-now-obey-third-party-cookies-preference/ ***/
@@ -1371,8 +1349,7 @@ user_pref("network.cookie.thirdparty.sessionOnly", true);
 user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // (FF58+)
 /* 2703: set cookie lifetime policy
  * 0=until they expire (default), 2=until you close Firefox, 3=for n days (see next pref)
- * [SETTING] Privacy & Security>History>Custom Settings>Accept cookies from sites>Keep until
- * [SETTING-ESR52] Privacy>History>Custom Settings>Accept cookies from sites>Keep until ***/
+ * [SETTING] Privacy & Security>History>Custom Settings>Accept cookies from sites>Keep until ***/
    // user_pref("network.cookie.lifetimePolicy", 0);
 /* 2704: set cookie lifetime in days (see above pref) - default is 90 days ***/
    // user_pref("network.cookie.lifetime.days", 90);
@@ -1426,12 +1403,10 @@ user_pref("dom.caches.enabled", false);
  ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
 /* 2802: enable Firefox to clear history items on shutdown
- * [SETTING] Privacy & Security>History>Clear history when Firefox closes
- * [SETTING-ESR52] Privacy>Clear history when Firefox closes ***/
+ * [SETTING] Privacy & Security>History>Clear history when Firefox closes ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
 /* 2803: set what history items to clear on shutdown
  * [SETTING] Privacy & Security>History>Clear history when Firefox closes>Settings
- * [SETTING-ESR52] Privacy>Clear history when Firefox closes>Settings
  * [NOTE] If 'history' is true, downloads will also be cleared regardless of the value
  * but if 'history' is false, downloads can still be cleared independently
  * However, this may not always be the case. The interface combines and syncs these

From c2c8e6227cba79a445a4f1cdc087821fc6cb9e30 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 12 Aug 2018 03:01:03 +0000
Subject: [PATCH 0037/1147] more info for 2026-28 (#481)

---
 user.js | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index b972a16..f12aaea 100644
--- a/user.js
+++ b/user.js
@@ -1012,15 +1012,15 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Camera/Microphone>Settings ***/
    // user_pref("permissions.default.camera", 2);
    // user_pref("permissions.default.microphone", 2);
-/* 2026: disable canvas capture stream
+/* 2026: disable canvas capture stream (FF41+)
  * [1] https://developer.mozilla.org/docs/Web/API/HTMLCanvasElement/captureStream ***/
 user_pref("canvas.capturestream.enabled", false);
-/* 2027: disable camera image capture
+/* 2027: disable camera image capture (FF35+)
  * [1] https://trac.torproject.org/projects/tor/ticket/16339 ***/
-user_pref("dom.imagecapture.enabled", false);
-/* 2028: disable offscreen canvas
+user_pref("dom.imagecapture.enabled", false); // default: false
+/* 2028: disable offscreen canvas (FF44+)
  * [1] https://developer.mozilla.org/docs/Web/API/OffscreenCanvas ***/
-user_pref("gfx.offscreencanvas.enabled", false);
+user_pref("gfx.offscreencanvas.enabled", false); // default: false
 /* 2030: disable auto-play of HTML5 media
  * [WARNING] This may break video playback on various sites ***/
 user_pref("media.autoplay.enabled", false);

From 0145ccfec34d2c32191e2d0e93db93458c9d62bc Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 12 Aug 2018 03:11:23 +0000
Subject: [PATCH 0038/1147] add empty lines for subgroups in 0400 + 1200 (#482)

---
 user.js | 7 +++++++
 1 file changed, 7 insertions(+)

diff --git a/user.js b/user.js
index f12aaea..f87533a 100644
--- a/user.js
+++ b/user.js
@@ -231,6 +231,7 @@ user_pref("services.blocklist.update_enabled", true);
    // user_pref("services.blocklist.addons.collection", "");
    // user_pref("services.blocklist.plugins.collection", "");
    // user_pref("services.blocklist.gfx.collection", "");
+
 /** SAFE BROWSING (SB)
     This sub-section has been redesigned to differentiate between "real-time"/"user initiated"
     data being sent to Google from all other settings such as using local blocklists/whitelists and
@@ -277,6 +278,7 @@ user_pref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", ""); //
 /* 0417: disable data sharing (FF58+) ***/
 user_pref("browser.safebrowsing.provider.google4.dataSharing.enabled", false);
 user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
+
 /** TRACKING PROTECTION (TP)
     There are NO privacy concerns here, but we strongly recommend to use uBlock Origin as well,
     as it offers more comprehensive and specialized lists. It also allows per domain control. ***/
@@ -724,6 +726,7 @@ user_pref("security.ssl.errorReporting.url", "");
  * [1] https://github.com/tlswg/tls13-spec/issues/1001
  * [2] https://blog.cloudflare.com/tls-1-3-overview-and-q-and-a/ ***/
 user_pref("security.tls.enable_0rtt_data", false); // (FF55+ default true)
+
 /** OCSP (Online Certificate Status Protocol)
     #Required reading [#] https://scotthelme.co.uk/revocation-is-broken/ ***/
 /* 1210: enable OCSP Stapling
@@ -744,6 +747,7 @@ user_pref("security.OCSP.enabled", 1);
  * [1] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/
  * [2] https://www.imperialviolet.org/2014/04/19/revchecking.html ***/
 user_pref("security.OCSP.require", true);
+
 /** CERTS / HSTS (HTTP Strict Transport Security) / HPKP (HTTP Public Key Pinning) ***/
 /* 1220: disable Windows 8.1's Microsoft Family Safety cert [WINDOWS] (FF50+)
  * 0=disable detecting Family Safety mode and importing the root
@@ -765,12 +769,14 @@ user_pref("security.family_safety.mode", 0);
  * by inspecting ALL your web traffic, then leave at current default=1
  * [1] https://trac.torproject.org/projects/tor/ticket/16206 ***/
 user_pref("security.cert_pinning.enforcement_level", 2);
+
 /** MIXED CONTENT ***/
 /* 1240: disable insecure active content on https pages - mixed content
  * [1] https://trac.torproject.org/projects/tor/ticket/21323 ***/
 user_pref("security.mixed_content.block_active_content", true);
 /* 1241: disable insecure passive content (such as images) on https pages - mixed context ***/
 user_pref("security.mixed_content.block_display_content", true);
+
 /** CIPHERS [see the section 1200 intro] ***/
 /* 1260: disable or limit SHA-1
  * 0=all SHA1 certs are allowed
@@ -799,6 +805,7 @@ user_pref("security.pki.sha1_enforcement_level", 1);
  * [NOTE] Commented out because it still breaks too many sites ***/
    // user_pref("security.ssl3.rsa_aes_128_sha", false);
    // user_pref("security.ssl3.rsa_aes_256_sha", false);
+
 /** UI (User Interface) ***/
 /* 1270: display warning (red padlock) for "broken security"
  * [1] https://wiki.mozilla.org/Security:Renegotiation ***/

From f39112f9149e65c567b6daae6bce57b01019392b Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Sun, 12 Aug 2018 11:56:47 +0000
Subject: [PATCH 0039/1147] P*tches for B*tches (#483)

* replace /V with global VERIFY ON

* change working dir to script dir
The working dir doesn't necessarily match the script's path, depending on how the script is called. All relative paths and conditional statements using EXIST will fail whenever the working dir is not the script's own location. This fixes that.

* minimal stuff, mostly cosmetic

* prompt to run prefsCleaner under very specific circumstances

* improve -updatebatch option

* add version variable + display new script version on update
---
 prefsCleaner.bat |  6 ++++--
 updater.bat      | 50 +++++++++++++++++++++++++++++++++---------------
 2 files changed, 39 insertions(+), 17 deletions(-)

diff --git a/prefsCleaner.bat b/prefsCleaner.bat
index 6e0875d..4c8f7a4 100644
--- a/prefsCleaner.bat
+++ b/prefsCleaner.bat
@@ -3,7 +3,9 @@ TITLE prefs.js cleaner
 
 REM ### prefs.js cleaner for Windows
 REM ## author: @claustromaniac
-REM ## version: 2.1
+REM ## version: 2.2
+
+CD /D "%~dp0"
 
 :begin
 ECHO:
@@ -11,7 +13,7 @@ ECHO:
 ECHO                 ########################################
 ECHO                 ####  prefs.js cleaner for Windows  ####
 ECHO                 ####        by claustromaniac       ####
-ECHO                 ####              v2.1              ####
+ECHO                 ####              v2.2              ####
 ECHO                 ########################################
 ECHO:
 CALL :message "This script should be run from your Firefox profile directory."
diff --git a/updater.bat b/updater.bat
index 21c83a2..2aed79c 100644
--- a/updater.bat
+++ b/updater.bat
@@ -3,11 +3,16 @@ TITLE ghacks user.js updater
 
 REM ## ghacks-user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.5
+REM ## version: 4.6
 REM ## instructions: https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts
 
+SET v=4.6
+
+VERIFY ON
+CD /D "%~dp0"
 SET _myname=%~n0
 SET _myparams=%*
+
 :parse
 IF "%~1"=="" (GOTO endparse)
 IF /I "%~1"=="-unattended" (SET _ua=1)
@@ -20,6 +25,7 @@ IF /I "%~1"=="-singlebackup" (SET _singlebackup=1)
 SHIFT
 GOTO parse
 :endparse
+
 IF DEFINED _updateb (
 	REM The normal flow here goes from phase 1 to phase 2 and then phase 3.
 	IF NOT "!_myname:~0,9!"=="[updated]" (
@@ -27,10 +33,13 @@ IF DEFINED _updateb (
 			REM ## Phase 3 ##: The new script, with the original name, will:
 			REM 	* Delete the [updated]*.bat script
 			REM 	* Begin the normal routine
+			FC "[updated]!_myname!.bat" "!_myname!.bat" >nul
+			IF ERRORLEVEL 1 (
+				CALL :message "Script updated to version !v!"
+				TIMEOUT 3 >nul
+			)
 			REN "[updated]!_myname!.bat" "[updated]!_myname!.bat.old"
 			DEL /F "[updated]!_myname!.bat.old"
-			CALL :message "Script updated^!"
-			TIMEOUT 3 >nul
 			GOTO begin
 		)
 		REM ## Phase 1 ##
@@ -38,10 +47,10 @@ IF DEFINED _updateb (
 		REM 	* Start that script in a new CMD window
 		REM 	* Exit
 		CALL :message "Updating script..."
-		REM Uncomment the next line and comment the powershell call for testing.
-		REM COPY /B /V /Y "!_myname!.bat" "[updated]!_myname!.bat"
+		REM Uncomment the next line and comment out the PowerShell call for testing.
+		REM COPY /B /Y "!_myname!.bat" "[updated]!_myname!.bat" >nul
 		(
-			powershell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.bat', '[updated]!_myname!.bat')"
+			PowerShell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.bat', '[updated]!_myname!.bat')"
 		) >nul 2>&1
 		IF EXIST "[updated]!_myname!.bat" (
 			START /min CMD /C "[updated]!_myname!.bat" !_myparams!
@@ -62,12 +71,13 @@ IF DEFINED _updateb (
 				REN "!_myname:~9!.bat" "!_myname:~9!.bat.old"
 				DEL /F "!_myname:~9!.bat.old"
 			)
-			COPY /B /V /Y "!_myname!.bat" "!_myname:~9!.bat"
+			COPY /B /Y "!_myname!.bat" "!_myname:~9!.bat"
 			START CMD /C "!_myname:~9!.bat" !_myparams!
 		)
 	)
 	EXIT /B
 )
+
 :begin
 CLS
 ECHO:
@@ -75,7 +85,7 @@ ECHO:
 ECHO:                ########################################
 ECHO:                ####  user.js Updater for Windows   ####
 ECHO:                ####       by claustromaniac        ####
-ECHO:                ####             v4.5               ####
+ECHO:                ####             v!v!               ####
 ECHO:                ########################################
 ECHO:
 SET /A "_line=0"
@@ -121,7 +131,7 @@ IF DEFINED _log (
 IF EXIST user.js.new (DEL /F "user.js.new")
 CALL :message "Retrieving latest user.js file from github repository..."
 (
-	powershell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js', 'user.js.new')"
+	PowerShell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js', 'user.js.new')"
 ) >nul 2>&1
 IF EXIST user.js.new (
 	IF DEFINED _multi (
@@ -129,18 +139,18 @@ IF EXIST user.js.new (
 		IF NOT ERRORLEVEL 1 (
 			IF DEFINED _merge (
 				CALL :message "Merging..."
-				COPY /B /V /Y user.js-overrides\*.js user-overrides-merged.js
+				COPY /B /Y user.js-overrides\*.js user-overrides-merged.js
 				CALL :merge user-overrides-merged.js
-				COPY /B /V /Y user.js.new+user-overrides-merged.js user.js.new
+				COPY /B /Y user.js.new+user-overrides-merged.js user.js.new
 				CALL :merge user.js.new
 			) ELSE (
 				CALL :message "Appending..."
-				COPY /B /V /Y user.js.new+"user.js-overrides\*.js" user.js.new
+				COPY /B /Y user.js.new+"user.js-overrides\*.js" user.js.new
 			)
 		) ELSE (CALL :message "No override files found.")
 	) ELSE (
 		IF EXIST "user-overrides.js" (
-			COPY /B /V /Y user.js.new+"user-overrides.js" "user.js.new"
+			COPY /B /Y user.js.new+"user-overrides.js" "user.js.new"
 			IF DEFINED _merge (
 				CALL :message "Merging user-overrides.js..."
 				CALL :merge user.js.new
@@ -169,6 +179,7 @@ IF EXIST user.js.new (
 		) ELSE (
 			REN user.js.new user.js
 			CALL :message "Update complete."
+			SET "_changed=true"
 		)
 	)
 ) ELSE (
@@ -176,7 +187,15 @@ IF EXIST user.js.new (
 	ECHO:  No changes were made.
 )
 IF NOT DEFINED _log (
-	IF NOT DEFINED _ua (PAUSE)
+	IF NOT DEFINED _ua (
+		IF EXIST prefsCleaner.bat (
+			IF "!_changed!"=="true" (
+				CALL :message "Would you like to run the prefsCleaner now?"
+				CHOICE /C YN /N /M "(Y/N) "
+				IF "1"=="!errorlevel!" ( START "" cmd.exe /C "prefsCleaner.bat" )
+			) ELSE (PAUSE)
+		) ELSE (PAUSE)
+	)
 )
 EXIT /B
 
@@ -188,6 +207,7 @@ ECHO:  %~1
 IF NOT "2"=="%_log%" (ECHO:)
 ENDLOCAL
 GOTO :EOF
+
 REM ############ Merge function ############
 :merge
 SETLOCAL DisableDelayedExpansion
@@ -226,6 +246,7 @@ FOR /F tokens^=2^,^*^ delims^=^' %%G IN ('FINDSTR /R /C:"^//// --- comment-out -
 MOVE /Y updatertempfile "%~1" >nul
 ENDLOCAL
 GOTO :EOF
+
 REM ############### Help ##################
 :showhelp
 MODE 80,46
@@ -260,4 +281,3 @@ CALL :message ""
 PAUSE
 MODE 80,25
 GOTO :begin
-REM #####################################

From 29e2461cd1555b57edb1380fd257b2c260f861b3 Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Mon, 13 Aug 2018 12:39:24 +0000
Subject: [PATCH 0040/1147] fix -updatebatch (#484)

---
 updater.bat | 19 ++++++++-----------
 1 file changed, 8 insertions(+), 11 deletions(-)

diff --git a/updater.bat b/updater.bat
index 2aed79c..3458c63 100644
--- a/updater.bat
+++ b/updater.bat
@@ -6,7 +6,7 @@ REM ## author: @claustromaniac
 REM ## version: 4.6
 REM ## instructions: https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts
 
-SET v=4.6
+SET v=4.7
 
 VERIFY ON
 CD /D "%~dp0"
@@ -31,15 +31,15 @@ IF DEFINED _updateb (
 	IF NOT "!_myname:~0,9!"=="[updated]" (
 		IF EXIST "[updated]!_myname!.bat" (
 			REM ## Phase 3 ##: The new script, with the original name, will:
-			REM 	* Delete the [updated]*.bat script
+			REM 	* Delete the [updated]*.bat and *.bat.old scripts
 			REM 	* Begin the normal routine
-			FC "[updated]!_myname!.bat" "!_myname!.bat" >nul
-			IF ERRORLEVEL 1 (
+			FC "[updated]!_myname!.bat" "!_myname!.bat.old" >nul
+			IF NOT "!errorlevel!"=="0" (
 				CALL :message "Script updated to version !v!"
 				TIMEOUT 3 >nul
 			)
 			REN "[updated]!_myname!.bat" "[updated]!_myname!.bat.old"
-			DEL /F "[updated]!_myname!.bat.old"
+			DEL /F "!_myname!.bat.old" "[updated]!_myname!.bat.old"
 			GOTO begin
 		)
 		REM ## Phase 1 ##
@@ -64,13 +64,10 @@ IF DEFINED _updateb (
 			TIMEOUT 300 >nul
 		) ELSE (
 			REM ## Phase 2 ##: The [updated]*.bat script will:
-			REM 	* Copy itself overwriting the original batch
-			REM 	* Start that script in a new CMD instance
+			REM 	* Rename the old script and make a copy of itself with the original name.
+			REM 	* Run that copy in a new CMD instance
 			REM 	* Exit
-			IF EXIST "!_myname:~9!.bat" (
-				REN "!_myname:~9!.bat" "!_myname:~9!.bat.old"
-				DEL /F "!_myname:~9!.bat.old"
-			)
+			IF EXIST "!_myname:~9!.bat" ( REN "!_myname:~9!.bat" "!_myname:~9!.bat.old" )
 			COPY /B /Y "!_myname!.bat" "!_myname:~9!.bat"
 			START CMD /C "!_myname:~9!.bat" !_myparams!
 		)

From 572d16d5a5863c08da5ed3b96f96d1effba3eeb8 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 15 Aug 2018 05:56:40 +0000
Subject: [PATCH 0041/1147] change cookies from block all to allow 1st party
 (#477)

* change cookies from block all to allow 1st party

see https://github.com/ghacksuserjs/ghacks-user.js/issues/439

* and fixup readme as well
---
 user.js | 16 ++++++----------
 1 file changed, 6 insertions(+), 10 deletions(-)

diff --git a/user.js b/user.js
index f87533a..7905339 100644
--- a/user.js
+++ b/user.js
@@ -19,10 +19,7 @@
      * https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.3-Implementation
   3. If you skipped steps 1 and 2 above (shame on you), then here is the absolute minimum
      * Auto-installing updates for Firefox and extensions are disabled (section 0302's)
-     * Some user data is erased on close (section 2800), namely history (browsing, form, download)
-     * Cookies are denied by default (2701), we use site exceptions. In Firefox 58 and lower, this breaks
-       extensions that use IndexedDB, so you need to allow exceptions for those as well: see [1] below
-       [1] https://github.com/ghacksuserjs/ghacks-user.js/wiki/4.1.1-Setting-Extension-Permission-Exceptions
+     * Some user data is erased on close (section 2800). Change this to suit your needs
      * EACH RELEASE check:
          - 4600s: reset prefs made redundant due to privacy.resistFingerprinting (RPF)
                   or enable them as an alternative to RFP or for ESR users
@@ -1338,14 +1335,14 @@ user_pref("security.dialog_enable_delay", 700); // default: 1000 (milliseconds)
      serviceWorkers :
  ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
-/* 2701: disable cookies on all sites [SETUP]
+/* 2701: disable 3rd-party cookies and site-data [SETUP]
  * You can set exceptions under site permissions or use an extension
  * 0=allow all 1=allow same host 2=disallow all 3=allow 3rd party if it already set a cookie
  * [SETTING] Privacy & Security>History>Custom Settings>Accept cookies from sites
  * [NOTE] Blocking 3rd party controls 3rd party access to localStorage, IndexedDB, Cache API and Service Worker Cache.
  * Blocking 1st party controls access to localStorage and IndexedDB (note: Service Workers can still use IndexedDB).
  * [1] https://www.fxsitecompat.com/en-CA/docs/2015/web-storage-indexeddb-cache-api-now-obey-third-party-cookies-preference/ ***/
-user_pref("network.cookie.cookieBehavior", 2);
+user_pref("network.cookie.cookieBehavior", 1);
 /* 2702: set third-party cookies (i.e ALL) (if enabled, see above pref) to session-only
    and (FF58+) set third-party non-secure (i.e HTTP) cookies to session-only
    [NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and
@@ -1401,8 +1398,7 @@ user_pref("dom.caches.enabled", false);
    // user_pref("dom.storageManager.enabled", false);
 
 /*** 2800: SHUTDOWN [SETUP]
-     You should set the values to what suits you best. Be aware that the settings below clear
-     browsing, download and form history, but not cookies (use exceptions or an extension).
+     You should set the values to what suits you best.
      - "Offline Website Data" includes appCache (2730), localStorage (2710),
        Service Worker cache (2740), and QuotaManager (IndexedDB (2720), asm-cache)
      - In both 2803 + 2804, the 'download' and 'history' prefs are combined in the
@@ -1419,7 +1415,7 @@ user_pref("privacy.sanitize.sanitizeOnShutdown", true);
  * However, this may not always be the case. The interface combines and syncs these
  * prefs when set from there, and the sanitize code may change at any time ***/
 user_pref("privacy.clearOnShutdown.cache", true);
-user_pref("privacy.clearOnShutdown.cookies", false);
+user_pref("privacy.clearOnShutdown.cookies", true);
 user_pref("privacy.clearOnShutdown.downloads", true); // see note above
 user_pref("privacy.clearOnShutdown.formdata", true); // Form & Search History
 user_pref("privacy.clearOnShutdown.history", true); // Browsing & Download History
@@ -1432,7 +1428,7 @@ user_pref("privacy.clearOnShutdown.siteSettings", false); // Site Preferences
  * [NOTE] Regardless of what you set privacy.cpd.downloads to, as soon as the dialog
  * for "Clear Recent History" is opened, it is synced to the same as 'history' ***/
 user_pref("privacy.cpd.cache", true);
-user_pref("privacy.cpd.cookies", false);
+user_pref("privacy.cpd.cookies", true);
    // user_pref("privacy.cpd.downloads", true); // not used, see note above
 user_pref("privacy.cpd.formdata", true); // Form & Search History
 user_pref("privacy.cpd.history", true); // Browsing & Download History

From 9e1c368cd90ab32bffdd96a3163b889f7295394b Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 15 Aug 2018 19:04:25 +0000
Subject: [PATCH 0042/1147] move dom.battery.enabled back to 2500 from 9999
 (#486)

* move dom.battery.enabled back to 2500 from 9999

* make it inactive, clear out old links
---
 user.js | 18 +++++++-----------
 1 file changed, 7 insertions(+), 11 deletions(-)

diff --git a/user.js b/user.js
index 7905339..30d5eb9 100644
--- a/user.js
+++ b/user.js
@@ -1164,6 +1164,13 @@ user_pref("javascript.options.shared_memory", false);
 
 /*** 2500: HARDWARE FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");
+/* 2502: disable Battery Status API
+ * Initially a Linux issue (high precision readout) that was fixed.
+ * However, it is still another metric for fingerprinting, used to raise entropy.
+ * e.g. do you have a battery or not, current charging status, charge level, times remaining etc
+ * [NOTE] From FF52+ Battery Status API is only available in chrome/privileged code. see [1]
+ * [1] https://bugzilla.mozilla.org/1313580 ***/
+   // user_pref("dom.battery.enabled", false);
 /* 2504: disable virtual reality devices
  * [WARNING] [SETUP] Optional protection depending on your connected devices
  * [1] https://developer.mozilla.org/docs/Web/API/WebVR_API ***/
@@ -1897,17 +1904,6 @@ user_pref("media.gmp-eme-adobe.autoupdate", false);
    // [1] https://wiki.mozilla.org/WebAPI/Security/WebTelephony
    // [-] https://bugzilla.mozilla.org/1309719
 user_pref("dom.telephony.enabled", false);
-// 2502: disable Battery Status API
-   // Initially a Linux issue (high precision readout) that was fixed.
-   // However, it is still another metric for fingerprinting, used to raise entropy.
-   // e.g. do you have a battery or not, current charging status, charge level, times remaining etc
-   // [1] https://techcrunch.com/2015/08/04/battery-attributes-can-be-used-to-track-web-users/
-   // [2] https://bugzilla.mozilla.org/1124127
-   // [3] https://www.w3.org/TR/battery-status/
-   // [4] https://www.theguardian.com/technology/2016/aug/02/battery-status-indicators-tracking-online
-   // [NOTE] From FF52+ Battery Status API is only available in chrome/privileged code.
-   // [-] https://bugzilla.mozilla.org/1313580
-user_pref("dom.battery.enabled", false);
 // ***/
 
 /* ESR52.x still uses all the following prefs

From 776e32c27f286d6260348cf9a00b607c0493637d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 16 Aug 2018 14:34:32 +0000
Subject: [PATCH 0043/1147] 0850d: remove browser.urlbar.autoFill.typed

It is deprecated in FF62 ( https://bugzilla.mozilla.org/show_bug.cgi?id=1239708 ), and is already covered by the other pref in 0850d (for ESR60.x users)
---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 30d5eb9..1c67640 100644
--- a/user.js
+++ b/user.js
@@ -545,7 +545,6 @@ user_pref("browser.urlbar.suggest.openpage", false);
 /* 0850d: disable location bar autofill
  * [1] http://kb.mozillazine.org/Inline_autocomplete ***/
 user_pref("browser.urlbar.autoFill", false);
-user_pref("browser.urlbar.autoFill.typed", false);
 /* 0850e: disable location bar one-off searches (FF51+)
  * [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/ ***/
 user_pref("browser.urlbar.oneOffSearches", false);

From 2969c6660f0bc98f2f20f889554836ff0063ae2a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 16 Aug 2018 14:36:48 +0000
Subject: [PATCH 0044/1147] removed browser.urlbar.autoFill.typed

---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 5b5b389..47bec1a 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 06-July-2018
+ Last updated: 16-August-2018
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -99,6 +99,8 @@
     'network.http.fast-fallback-to-IPv4',
     'offline-apps.quota.warn',
     'services.blocklist.signing.enforced',
+    /* 62-beta */
+    'browser.urlbar.autoFill.typed',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 5b6ed92da4a9eb31160b96acb1ebc1541d78da7d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 17 Aug 2018 07:15:47 +0000
Subject: [PATCH 0045/1147] 0701: disable IPv6, closes #437

---
 user.js | 17 +++++++----------
 1 file changed, 7 insertions(+), 10 deletions(-)

diff --git a/user.js b/user.js
index 1c67640..f893d82 100644
--- a/user.js
+++ b/user.js
@@ -422,16 +422,13 @@ user_pref("network.predictor.enable-prefetch", false);
 
 /*** 0700: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
-/* 0701: disable IPv6 (included for knowledge ONLY [WARNING] do not do this)
- * This is all about covert channels such as MAC addresses being included/abused in the
- * IPv6 protocol for tracking. If you want to mask your IP address, this is not the way
- * to do it. It's 2016, IPv6 is here. Here are some old links
- * 2010: https://christopher-parsons.com/ipv6-and-the-future-of-privacy/
- * 2011: https://iapp.org/news/a/2011-09-09-facing-the-privacy-implications-of-ipv6/
- * 2012: http://www.zdnet.com/article/security-versus-privacy-with-ipv6-deployment/
- * [NOTE] It is a myth that disabling IPv6 will speed up your internet connection
- * [1] https://www.howtogeek.com/195062/no-disabling-ipv6-probably-wont-speed-up-your-internet-connection/ ***/
-   // user_pref("network.dns.disableIPv6", true);
+/* 0701: disable IPv6
+ * IPv6 can be abused, especially regarding MAC addresses. They also do not play nice
+ * with VPNs. That's even assuming your ISP and/or router and/or website can hande it
+ * [TEST] http://testmyipv6.com/
+ * [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/437#issuecomment-403740626
+ * [2] https://www.internetsociety.org/tag/ipv6-security/ (see Myths 2,4,5,6) ***/
+user_pref("network.dns.disableIPv6", true);
 /* 0702: disable HTTP2 (which was based on SPDY which is now deprecated)
  * HTTP2 raises concerns with "multiplexing" and "server push", does nothing to enhance
  * privacy, and in fact opens up a number of server-side fingerprinting opportunities

From 9e67f982abd3759d93ec6c2b9a694c5c8848b5e9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 17 Aug 2018 07:50:33 +0000
Subject: [PATCH 0046/1147] 2720: enforce IDB=enabled

---
 user.js | 13 ++++++++-----
 1 file changed, 8 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index f893d82..7d93783 100644
--- a/user.js
+++ b/user.js
@@ -1372,11 +1372,14 @@ user_pref("network.cookie.leave-secure-alone", true); // default: true
  * [WARNING] This will break a LOT of sites' functionality.
  * You are better off using an extension for more granular control ***/
    // user_pref("dom.storage.enabled", false);
-/* 2720: disable JS storing data permanently [SETUP]
- * [WARNING] This BREAKS uBlock Origin [1.14.0+] and other extensions that require IndexedDB
- * [1] https://github.com/gorhill/uBlock/releases/tag/1.14.0
- * [WARNING] This *will* break other extensions including legacy, and *will* break some sites ***/
-   // user_pref("dom.indexedDB.enabled", false);
+/* 2720: enforce IndexedDB (IDB) as enabled
+ * IDB is required for extensions and Firefox internals (even before FF63 in [1])
+ * To control *website* IDB data, control allowing cookies and service workers, or use
+ * Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize
+ * on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically
+ * via an extenion. Note that IDB currently cannot be sanitized by host.
+ * [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/ ***/
+user_pref("dom.indexedDB.enabled", true); // default: true
 /* 2730: disable offline cache
  * [NOTE] For FF51-FF60 (ESR not included), this is required 'true' for Storage API (2750) ***/
 user_pref("browser.cache.offline.enable", false);

From 6fb2f25e6519b7a4a07f633fc935af758e9bcc01 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 17 Aug 2018 09:09:01 +0000
Subject: [PATCH 0047/1147] 4700: revamp, closes #485

---
 user.js | 44 +++++++++++++++++++-------------------------
 1 file changed, 19 insertions(+), 25 deletions(-)

diff --git a/user.js b/user.js
index 7d93783..37e0d65 100644
--- a/user.js
+++ b/user.js
@@ -1634,36 +1634,30 @@ user_pref("webgl.enable-debug-renderer-info", false);
 // ***/
 
 /*** 4700: RFP (4500) ALTERNATIVES - NAVIGATOR / USER AGENT (UA) SPOOFING
-     Spoofing your UA to *LOWER* entropy *does* *not* *work*. It may even cause site breakage
-     depending on your values. Even if you spoof, like TBB (Tor Browser Bundle) does, as the
-     latest ESR, it still *does* *not* *work*. There are two main reasons for this.
-       1. Many of the components that make up your UA can be derived by other means. And when
-          those values differ, you provide more bits and raise entropy. Examples of leaks include
-          navigator objects, date locale/formats, iframes, headers, resource://URIs,
-          feature detection and more.
-       2. You are not in a controlled set of significant numbers, where the values are enforced
-          by default. It works for TBB because for TBB, the spoofed values ARE their default.
-     * We do not recommend UA spoofing yourself, leave it to privacy.resistFingerprinting (see 4500)
-       which is already plugging leaks (see 1 above) the prefs below do not address
-     * Values below are for example only based on the current TBB at the time of writing
+     This is FYI ONLY. These prefs are INSUFFICIENT(a) on their own, you need
+     to use RFP (4500) or an extension, in which case they become POINTLESS.
+     (a) Many of the components that make up your UA can be derived by other means.
+         And when those values differ, you provide more bits and raise entropy.
+         Examples of leaks include navigator objects, date locale/formats, iframes,
+         headers, tcp/ip attributes, feature detection, and **many** more.
+     ALL values below intentionally left blank - use RFP, or get a vetted, tested
+         extension and mimic RFP values to *lower* entropy, or randomize to *raise* it
 ***/
 user_pref("_user.js.parrot", "4700 syntax error: the parrot's taken 'is last bow");
-/* 4701: navigator.userAgent leaks in JS
- * [NOTE] Setting this will break any UA spoofing extension whitelisting ***/
-   // user_pref("general.useragent.override", "Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0"); // (hidden pref)
-/* 4702: navigator.buildID (see gecko.buildID in about:config) reveals build time
- * down to the second which defeats user agent spoofing and can compromise OS etc
+/* 4701: navigator.userAgent ***/
+   // user_pref("general.useragent.override", ""); // (hidden pref)
+/* 4702: navigator.buildID (
+ * reveals build time down to the second
  * [1] https://bugzilla.mozilla.org/583181 ***/
-   // user_pref("general.buildID.override", "20100101"); // (hidden pref)
+   // user_pref("general.buildID.override", ""); // (hidden pref)
 /* 4703: navigator.appName ***/
-   // user_pref("general.appname.override", "Netscape"); // (hidden pref)
+   // user_pref("general.appname.override", ""); // (hidden pref)
 /* 4704: navigator.appVersion ***/
-   // user_pref("general.appversion.override", "5.0 (Windows)"); // (hidden pref)
-/* 4705: navigator.platform leaks in JS ***/
-   // user_pref("general.platform.override", "Win32"); // (hidden pref)
-/* 4706: navigator.oscpu leaks in JS ***/
-   // user_pref("general.oscpu.override", "Windows NT 6.1"); // (hidden pref)
-/* 4707: general.useragent.locale (related, see 0204-deprecated FF59+) ***/
+   // user_pref("general.appversion.override", ""); // (hidden pref)
+/* 4705: navigator.platform ***/
+   // user_pref("general.platform.override", ""); // (hidden pref)
+/* 4706: navigator.oscpu ***/
+   // user_pref("general.oscpu.override", ""); // (hidden pref)
 
 /*** 5000: PERSONAL [SETUP]
      Non-project related but useful. If any of these interest you, add them to your overrides ***/

From 9a46fafb53c6bcd4d6404e5db25fa47a67c71506 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 20 Aug 2018 14:52:06 +0000
Subject: [PATCH 0048/1147] 1203: remove TLS fallback-limit

Currently enforcing the default at 3, it gets changed to 4 for FF62, and will get deprecated some stage soon - https://bugzilla.mozilla.org/show_bug.cgi?id=1479501
---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 37e0d65..a8ecd58 100644
--- a/user.js
+++ b/user.js
@@ -701,7 +701,6 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * [2] https://www.ssl.com/how-to/turn-off-ssl-3-0-and-tls-1-0-in-your-browser/
  * [2] archived: https://archive.is/hY2Mm ***/
 user_pref("security.tls.version.min", 3);
-user_pref("security.tls.version.fallback-limit", 3);
 user_pref("security.tls.version.max", 4); // 4 = allow up to and including TLS 1.3
 /* 1203: disable SSL session tracking (FF36+)
  * SSL Session IDs speed up HTTPS connections (no need to renegotiate) and last for 48hrs.

From e6a13e5a932b4e641f76a46f79cf00347dfbc529 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 20 Aug 2018 14:54:47 +0000
Subject: [PATCH 0049/1147] removed security.tls.version.fallback-limit

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 47bec1a..74f216a 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 16-August-2018
+ Last updated: 20-August-2018
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -101,6 +101,7 @@
     'services.blocklist.signing.enforced',
     /* 62-beta */
     'browser.urlbar.autoFill.typed',
+    'security.tls.version.fallback-limit',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 7d417da5fdfb632da481358e38fde15f44ee7ba7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 25 Aug 2018 06:09:28 +0000
Subject: [PATCH 0050/1147] 0701: IPv6 info tweak, closes #437

---
 user.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index a8ecd58..fe49903 100644
--- a/user.js
+++ b/user.js
@@ -425,7 +425,9 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
 /* 0701: disable IPv6
  * IPv6 can be abused, especially regarding MAC addresses. They also do not play nice
  * with VPNs. That's even assuming your ISP and/or router and/or website can hande it
- * [TEST] http://testmyipv6.com/
+ * [WARNING] This is just an application level fallback. Disabling IPv6 is best done
+ * at an OS/network level, and/or configured properly in VPN setups
+ * [TEST] http://ipv6leak.com/
  * [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/437#issuecomment-403740626
  * [2] https://www.internetsociety.org/tag/ipv6-security/ (see Myths 2,4,5,6) ***/
 user_pref("network.dns.disableIPv6", true);

From 50a578c32ab1efd73361545cd5c284805f7b43a5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 28 Aug 2018 07:57:21 +0000
Subject: [PATCH 0051/1147] remove extra spaces

---
 user.js | 14 +++++++-------
 1 file changed, 7 insertions(+), 7 deletions(-)

diff --git a/user.js b/user.js
index fe49903..4f43fe6 100644
--- a/user.js
+++ b/user.js
@@ -34,7 +34,7 @@
   4. BACKUP your profile folder before implementing (and/or test in a new/cloned profile)
   5. KEEP UP TO DATE: https://github.com/ghacksuserjs/ghacks-user.js/wiki#small_orange_diamond-maintenance
 
- ******/
+******/
 
 /* START: internal custom pref to test for syntax errors
  * [NOTE] In FF60+, not all syntax errors cause parsing to abort i.e. reaching the last debug
@@ -479,7 +479,7 @@ user_pref("network.file.disable_unc_paths", true); // (hidden pref)
      functionality. Likewise, you may want to check the items cleared on shutdown in section 2800.
      [NOTE] The urlbar is also commonly referred to as the location bar and address bar
      #Required reading [#] https://xkcd.com/538/
- ***/
+***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
 /* 0801: disable location bar using search - PRIVACY
  * don't leak typos to a search engine, give an error message instead ***/
@@ -687,7 +687,7 @@ user_pref("alerts.showFavicons", false); // default: false
              Optionally, disable the ciphers in 1264.
 
    [1] https://www.securityartwork.es/2017/02/02/tls-client-fingerprinting-with-bro/
- ***/
+***/
 user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
 /** SSL (Secure Sockets Layer) / TLS (Transport Layer Security) ***/
 /* 1201: disable old SSL/TLS - vulnerable to a MiTM attack
@@ -877,7 +877,7 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
             scheme+host+port: https://example.com:8888
 
      #Required reading [#] https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
- ***/
+***/
 user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
 /* 1601: ALL: control when images/links send a referer
  * 0=never, 1=send only when links are clicked, 2=for links and images (default) ***/
@@ -1082,7 +1082,7 @@ user_pref("dom.popup_allowed_events", "click dblclick");
      [4]   SharedWorker: https://developer.mozilla.org/docs/Web/API/SharedWorker
      [5]   ChromeWorker: https://developer.mozilla.org/docs/Web/API/ChromeWorker
      [6]  Notifications: https://support.mozilla.org/questions/1165867#answer-981820
- ***/
+***/
 user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
 /* 2302: disable service workers
  * Service workers essentially act as proxy servers that sit between web apps, and the browser
@@ -1337,7 +1337,7 @@ user_pref("security.dialog_enable_delay", 700); // default: 1000 (milliseconds)
           indexedDB : profile\storage\default
            appCache : profile\OfflineCache
      serviceWorkers :
- ***/
+***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 /* 2701: disable 3rd-party cookies and site-data [SETUP]
  * You can set exceptions under site permissions or use an extension
@@ -1410,7 +1410,7 @@ user_pref("dom.caches.enabled", false);
        Service Worker cache (2740), and QuotaManager (IndexedDB (2720), asm-cache)
      - In both 2803 + 2804, the 'download' and 'history' prefs are combined in the
        Firefox interface as "Browsing & Download History" and their values will be synced
- ***/
+***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
 /* 2802: enable Firefox to clear history items on shutdown
  * [SETTING] Privacy & Security>History>Clear history when Firefox closes ***/

From 299489c701cb9da341da176c9c4aa87bb80861a9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 28 Aug 2018 08:27:45 +0000
Subject: [PATCH 0052/1147] 1000s: cache description/info, closes #436

---
 user.js | 12 +++++++++++-
 1 file changed, 11 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 4f43fe6..7f20269 100644
--- a/user.js
+++ b/user.js
@@ -609,7 +609,17 @@ user_pref("security.insecure_field_warning.contextual.enabled", true);
  * [1] https://bugzilla.mozilla.org/1357835 ***/
 user_pref("network.auth.subresource-img-cross-origin-http-auth-allow", false);
 
-/*** 1000: CACHE [SETUP] ***/
+/*** 1000: CACHE [SETUP]
+     ETAG [1] and other [2] cache tracking/fingerprinting techniques can be averted by
+     disabling *BOTH* disk (1001) and memory (1003) cache. ETAGs can also be neutralized
+     by modifying response headers [3]. Another solution is to use a hardened configuration
+     with Temporary Containers [4]. Alternatively, you can *LIMIT* exposure by clearing
+     cache on close (2803). or on a regular basis manually or with an extension.
+     [1] https://en.wikipedia.org/wiki/HTTP_ETag#Tracking_using_ETags
+     [2] https://robertheaton.com/2014/01/20/cookieless-user-tracking-for-douchebags/
+     [3] https://github.com/ghacksuserjs/ghacks-user.js/wiki/4.2.4-Header-Editor
+     [4] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
+***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
 /** CACHE ***/
 /* 1001: disable disk cache ***/

From f2065a463c9debcbc63196c5400507bba500b24c Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 29 Aug 2018 17:10:28 +0000
Subject: [PATCH 0053/1147] move 1007 to 9999 (#493)

`browser.cache.frecency_experiment` is a dead pref since FF59: https://bugzilla.mozilla.org/1430197

proof: https://dxr.mozilla.org/mozilla-esr60/search?q=frecency_experiment
 - the pref still exists but is not used anymore ie dead pref
---
 user.js | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 7f20269..753fa3c 100644
--- a/user.js
+++ b/user.js
@@ -645,9 +645,6 @@ user_pref("browser.cache.disk_cache_ssl", false);
  * [NOTE] This means any permission changes are session only
  * [1] https://bugzilla.mozilla.org/967812 ***/
    // user_pref("permissions.memory_only", true); // (hidden pref)
-/* 1007: disable randomized FF HTTP cache decay experiments
- * [1] https://trac.torproject.org/projects/tor/ticket/13575 ***/
-user_pref("browser.cache.frecency_experiment", -1);
 /* 1008: set DNS cache and expiration time (default 400 and 60, same as TBB) ***/
    // user_pref("network.dnsCacheEntries", 400);
    // user_pref("network.dnsCacheExpiration", 60);
@@ -2033,6 +2030,10 @@ user_pref("datareporting.healthreport.about.reportUrl", "data:text/plain,");
    // [3] https://www.ghacks.net/2016/07/26/firefox-flyweb/
    // [-] https://bugzilla.mozilla.org/1374574
 user_pref("dom.flyweb.enabled", false);
+// 1007: disable randomized FF HTTP cache decay experiments
+   // [1] https://trac.torproject.org/projects/tor/ticket/13575
+   // [-] https://bugzilla.mozilla.org/1430197
+user_pref("browser.cache.frecency_experiment", -1);
 // 1242: enable Mixed-Content-Blocker to use the HSTS cache but disable the HSTS Priming requests (FF51+)
    // Allow resources from domains with an existing HSTS cache record or in the HSTS preload list
    // to be upgraded to HTTPS internally but disable sending out HSTS Priming requests, because

From a89e8fc1e02e6f3f9cc048a1952022ff6565703f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 29 Aug 2018 17:12:13 +0000
Subject: [PATCH 0054/1147] removed browser.cache.frecency_experiment

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 74f216a..aa8e7d0 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 20-August-2018
+ Last updated: 29-August-2018
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -102,6 +102,7 @@
     /* 62-beta */
     'browser.urlbar.autoFill.typed',
     'security.tls.version.fallback-limit',
+    'browser.cache.frecency_experiment',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From c805dd8b3b7b0386beddcbbac5314060871827e2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 5 Sep 2018 09:30:42 +0000
Subject: [PATCH 0055/1147] 62 deprecated/removed prefs

---
 user.js | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 753fa3c..5192abd 100644
--- a/user.js
+++ b/user.js
@@ -956,7 +956,6 @@ user_pref("plugin.sessionPermissionNow.intervalInMinutes", 0);
  * [NOTE] You can still over-ride individual sites e.g. youtube via site permissions
  * [1] https://www.ghacks.net/2013/07/09/how-to-make-sure-that-a-firefox-plugin-never-activates-again/ ***/
 user_pref("plugin.state.flash", 0);
-user_pref("plugin.state.java", 0);
 /* 1805: disable scanning for plugins [WINDOWS]
  * [1] http://kb.mozillazine.org/Plugin_scanning
  * plid.all = whether to scan the directories specified in the Windows registry for PLIDs.
@@ -2108,6 +2107,11 @@ user_pref("network.jar.block-remote-files", true);
    // [-] https://bugzilla.mozilla.org/1427726
 user_pref("network.jar.open-unsafe-types", false);
 // * * * /
+// FF62
+// 1803: disable Java plugin
+   // [-] (part5) https://bugzilla.mozilla.org/1461243
+user_pref("plugin.state.java", 0);
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 109d4cf916027d663f6367c5cb6b6472812909e0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 5 Sep 2018 09:33:29 +0000
Subject: [PATCH 0056/1147] removed plugin.state.java

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index aa8e7d0..3b83232 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 29-August-2018
+ Last updated: 05-Sept-2018
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -103,6 +103,7 @@
     'browser.urlbar.autoFill.typed',
     'security.tls.version.fallback-limit',
     'browser.cache.frecency_experiment',
+    'plugin.state.java',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 9e342deaf2c458e73b36bad9a48b224c294fd971 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 5 Sep 2018 16:59:04 +0000
Subject: [PATCH 0057/1147] update 1803 after Java removal (#494)

---
 user.js | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 5192abd..b556c10 100644
--- a/user.js
+++ b/user.js
@@ -949,11 +949,10 @@ user_pref("plugin.defaultXpi.state", 0);
 /* 1802: enable click to play and set to 0 minutes ***/
 user_pref("plugins.click_to_play", true);
 user_pref("plugin.sessionPermissionNow.intervalInMinutes", 0);
-/* 1803: disable NPAPI plugins (Add-ons>Plugins)
+/* 1803: disable Flash plugin (Add-ons>Plugins)
  * 0=deactivated, 1=ask, 2=enabled
  * ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash
- * [NOTE] ESR52 users should check plugin.state* for other installed NPAPI plugins
- * [NOTE] You can still over-ride individual sites e.g. youtube via site permissions
+ * [NOTE] You can still override individual sites via site permissions
  * [1] https://www.ghacks.net/2013/07/09/how-to-make-sure-that-a-firefox-plugin-never-activates-again/ ***/
 user_pref("plugin.state.flash", 0);
 /* 1805: disable scanning for plugins [WINDOWS]

From e7a71143a8f042d261e672ad0c6816abacd2edf7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 8 Sep 2018 14:14:46 +0000
Subject: [PATCH 0058/1147] oophs

these two prefs were moved to deprecated, not removed from the user.js itself
---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 3b83232..a59325b 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 05-Sept-2018
+ Last updated: 08-Sept-2018
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -102,8 +102,6 @@
     /* 62-beta */
     'browser.urlbar.autoFill.typed',
     'security.tls.version.fallback-limit',
-    'browser.cache.frecency_experiment',
-    'plugin.state.java',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From f0c29cf8a6d2b4318fd1046794202630b3a78814 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 8 Sep 2018 16:37:12 +0000
Subject: [PATCH 0059/1147] 62-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index b556c10..dce355d 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 08 August 2018
-* version 62-alpha: Total Eclipse of the Pants
+* date: 08 September 2018
+* version 62-beta: Total Eclipse of the Pants
 *   "Once upon a time there was light in my life, but now there's only pants in the dark"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 8b5547a9737bbefe93544ba401fdbd2c1a3b3576 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 8 Sep 2018 17:23:48 +0000
Subject: [PATCH 0060/1147] 4504: browser.startup.blankWindow

---
 user.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/user.js b/user.js
index dce355d..18d9a07 100644
--- a/user.js
+++ b/user.js
@@ -1561,6 +1561,9 @@ user_pref("privacy.resistFingerprinting", true); // (hidden pref) (not hidden FF
  * to sanitize or clear extensions.webextensions.restrictedDomains (see 2662) to keep that side-effect
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
 user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // (hidden pref)
+/* 4504: disable showing about:blank as soon as possible during startup (FF60+)
+ * When default true (FF62+) this no longer masks the RFP resizing activity ***/
+user_pref("browser.startup.blankWindow", false);
 
 /*** 4600: RFP (4500) ALTERNATIVES [SETUP]
    * IF you DO use RFP (see 4500) then you DO NOT need these redundant prefs. In fact,

From b7c0e816a0abc6f96af96ee03e7db9e589426926 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 9 Sep 2018 20:33:43 +0000
Subject: [PATCH 0061/1147] remove ESR52 grouping in 9999 (#499)

---
 user.js | 30 +++++++++++++-----------------
 1 file changed, 13 insertions(+), 17 deletions(-)

diff --git a/user.js b/user.js
index 18d9a07..89e9b6b 100644
--- a/user.js
+++ b/user.js
@@ -1907,10 +1907,7 @@ user_pref("media.gmp-eme-adobe.autoupdate", false);
    // [-] https://bugzilla.mozilla.org/1309719
 user_pref("dom.telephony.enabled", false);
 // ***/
-
-/* ESR52.x still uses all the following prefs
-// [NOTE] replace the * with a slash in the line above to re-enable them
-// FF53
+/* FF53
 // 1265: block rc4 fallback
    // [-] https://bugzilla.mozilla.org/1130670
 user_pref("security.tls.unrestricted_rc4_fallback", false);
@@ -1925,8 +1922,8 @@ user_pref("media.getusermedia.screensharing.allow_on_old_platforms", false);
 // 2507: disable keyboard fingerprinting
    // [-] https://bugzilla.mozilla.org/1322736
 user_pref("dom.beforeAfterKeyboardEvent.enabled", false);
-// * * * /
-// FF54
+// ***/
+/* FF54
 // 0415: disable reporting URLs (safe browsing)
    // [-] https://bugzilla.mozilla.org/1288633
 user_pref("browser.safebrowsing.reportMalwareMistakeURL", "");
@@ -1938,8 +1935,8 @@ user_pref("media.eme.apiVisible", false);
    // i.e. reading archive contents directly in the browser, through DOM file objects
    // [-] https://bugzilla.mozilla.org/1342361
 user_pref("dom.archivereader.enabled", false);
-// * * * /
-// FF55
+// ***/
+/* FF55
 // 0209: disable geolocation on non-secure origins (FF54+)
    // [1] https://bugzilla.mozilla.org/1269531
    // [-] https://bugzilla.mozilla.org/1072859
@@ -1977,16 +1974,16 @@ user_pref("browser.tabs.animate", false);
 // 5016: disable fullscreeen animation - replaced by toolkit.cosmeticAnimations.enabled
    // [-] https://bugzilla.mozilla.org/1352069
 user_pref("browser.fullscreen.animate", false);
-// * * * /
-// FF56
+// ***/
+/* FF56
 // 0515: disable Screenshots (rollout pref only) (FF54+)
    // [-] https://bugzilla.mozilla.org/1386333
    // user_pref("extensions.screenshots.system-disabled", true);
 // 0517: disable Form Autofill (FF55+) - replaced by extensions.formautofill.available
    // [-] https://bugzilla.mozilla.org/1385201
 user_pref("extensions.formautofill.experimental", false);
-// * * * /
-// FF57
+// ***/
+/* FF57
 // 0374: disable "social" integration
    // [1] https://developer.mozilla.org/docs/Mozilla/Projects/Social_API
    // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1388902,1406193 (some leftovers were removed in FF58)
@@ -2011,8 +2008,8 @@ user_pref("browser.casting.enabled", false);
 // 5022: hide recently bookmarked items (you still have the original bookmarks) (FF49+)
    // [-] https://bugzilla.mozilla.org/1401238
 user_pref("browser.bookmarks.showRecentlyBookmarked", false);
-// * * * /
-// FF59
+// ***/
+/* FF59
 // 0203: disable using OS locale, force APP locale - replaced by intl.locale.requested
    // [-] https://bugzilla.mozilla.org/1414390
 user_pref("intl.locale.matchOS", false);
@@ -2062,8 +2059,8 @@ user_pref("dom.disable_window_status_change", true);
 // 2416: disable idle observation
    // [-] (part7) https://bugzilla.mozilla.org/1416703#c21
 user_pref("dom.idle-observers-api.enabled", false);
-// * * * /
-// FF60
+// ***/
+/* FF60
 // 0360: disable new tab tile ads & preload & marketing junk
    // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1370930,1433133
 user_pref("browser.newtabpage.directory.source", "data:text/plain,");
@@ -2087,7 +2084,6 @@ user_pref("dom.workers.enabled", false);
 // 5000's: open "page/selection source" in a new window
    // [-] https://bugzilla.mozilla.org/1418403
    // user_pref("view_source.tab", false);
-// * * * /
 // ***/
 
 /* ESR60.x still uses all the following prefs

From 11a94c7e320e3c14f5c542d9ca8a9776c0162fd9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 9 Sep 2018 20:43:56 +0000
Subject: [PATCH 0062/1147] 4503: add bugzilla

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 89e9b6b..b9dcb40 100644
--- a/user.js
+++ b/user.js
@@ -1562,7 +1562,8 @@ user_pref("privacy.resistFingerprinting", true); // (hidden pref) (not hidden FF
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
 user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // (hidden pref)
 /* 4504: disable showing about:blank as soon as possible during startup (FF60+)
- * When default true (FF62+) this no longer masks the RFP resizing activity ***/
+ * When default true (FF62+) this no longer masks the RFP resizing activity
+ * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
 
 /*** 4600: RFP (4500) ALTERNATIVES [SETUP]

From 6717bc0674b92078971da41b712cf3668440bb87 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 9 Sep 2018 20:46:35 +0000
Subject: [PATCH 0063/1147] 1024: toolkit.winRegisterApplicationRestart

---
 user.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/user.js b/user.js
index b9dcb40..84a3179 100644
--- a/user.js
+++ b/user.js
@@ -669,6 +669,9 @@ user_pref("browser.sessionstore.resume_from_crash", false);
  * This longer interval *may* affect history but we cannot replicate any history not recorded
  * [1] https://bugzilla.mozilla.org/1304389 ***/
 user_pref("browser.sessionstore.interval", 30000);
+/* 1024: disable automatic Firefox start and session restore after reboot [WINDOWS] (FF62+)
+ * [1] https://bugzilla.mozilla.org/603903 ***/
+user_pref("toolkit.winRegisterApplicationRestart", false);
 /** FAVICONS ***/
 /* 1030: disable favicons in shortcuts
  * URL shortcuts use a cached randomly named .ico file which is stored in your

From 01a978e33ae649e366fd2796dacd5aa145d276a4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Sep 2018 16:43:18 +0000
Subject: [PATCH 0064/1147] add 0864: dom.forms.datetime, closes #495

---
 user.js | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/user.js b/user.js
index 84a3179..5fee46a 100644
--- a/user.js
+++ b/user.js
@@ -558,6 +558,10 @@ user_pref("browser.formfill.enable", false);
  * [SETTING] Privacy & Security>History>Custom Settings>Remember my browsing and download history
  * [NOTE] You can clear history and downloads on exiting Firefox (see 2803) ***/
    // user_pref("places.history.enabled", false);
+/* 0864: disable date/time picker (FF57+ default true)
+ * This can leak your locale if not en-US
+ * [1] https://trac.torproject.org/projects/tor/ticket/21787 ***/
+user_pref("dom.forms.datetime", false);
 /* 0870: disable Windows jumplist [WINDOWS] ***/
 user_pref("browser.taskbar.lists.enabled", false);
 user_pref("browser.taskbar.lists.frequent.enabled", false);

From ee213f2babba007f943f351dd6601c0525c18d65 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 12 Sep 2018 22:17:56 +0000
Subject: [PATCH 0065/1147] infos about default values (#504)

* more infos

* add colons

not all EOL comments for defaults start with `// default` (23). The common string is `default:` (27 incl. these ones) with or without preceding or trailing spaces
---
 user.js | 14 +++++++-------
 1 file changed, 7 insertions(+), 7 deletions(-)

diff --git a/user.js b/user.js
index 5fee46a..55c805e 100644
--- a/user.js
+++ b/user.js
@@ -216,7 +216,7 @@ user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
  * [NOTE] It includes updates for "revoked certificates"
  * [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/
  * [2] https://trac.torproject.org/projects/tor/ticket/16931 ***/
-user_pref("extensions.blocklist.enabled", true);
+user_pref("extensions.blocklist.enabled", true); // default: true
 user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
 /* 0402: enable Kinto blocklist updates (FF50+)
  * What is Kinto?: https://wiki.mozilla.org/Firefox/Kinto#Specifications
@@ -424,7 +424,7 @@ user_pref("network.predictor.enable-prefetch", false);
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
 /* 0701: disable IPv6
  * IPv6 can be abused, especially regarding MAC addresses. They also do not play nice
- * with VPNs. That's even assuming your ISP and/or router and/or website can hande it
+ * with VPNs. That's even assuming your ISP and/or router and/or website can handle it
  * [WARNING] This is just an application level fallback. Disabling IPv6 is best done
  * at an OS/network level, and/or configured properly in VPN setups
  * [TEST] http://ipv6leak.com/
@@ -781,7 +781,7 @@ user_pref("security.cert_pinning.enforcement_level", 2);
 /** MIXED CONTENT ***/
 /* 1240: disable insecure active content on https pages - mixed content
  * [1] https://trac.torproject.org/projects/tor/ticket/21323 ***/
-user_pref("security.mixed_content.block_active_content", true);
+user_pref("security.mixed_content.block_active_content", true); // default: true
 /* 1241: disable insecure passive content (such as images) on https pages - mixed context ***/
 user_pref("security.mixed_content.block_display_content", true);
 
@@ -939,7 +939,7 @@ user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
  * [SETTING] Privacy & Security>Tabs>Enable Container Tabs ***/
    // user_pref("privacy.userContext.enabled", true);
 /* 1703: enable a private container for thumbnail loads (FF51+) ***/
-   // user_pref("privacy.usercontext.about_newtab_segregation.enabled", true);
+   // user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // default: true in FF61+
 /* 1704: set long press behaviour on "+ Tab" button to display container menu (FF53+)
  * 0=disables long press, 1=when clicked, the menu is shown
  * 2=the menu is shown after X milliseconds
@@ -1336,7 +1336,7 @@ user_pref("security.csp.experimentalEnabled", true);
  * [1] https://bugzilla.mozilla.org/1331351
  * [2] https://www.wordfence.com/blog/2017/01/gmail-phishing-data-uri/
  * [3] https://www.fxsitecompat.com/en-CA/docs/2017/data-url-navigations-on-top-level-window-will-be-blocked/ ***/
-user_pref("security.data_uri.block_toplevel_data_uri_navigations", true);
+user_pref("security.data_uri.block_toplevel_data_uri_navigations", true); // default: true in FF59+
 /* 2684: enforce a security delay on some confirmation dialogs such as install, open/save
  * [1] http://kb.mozillazine.org/Disable_extension_install_delay_-_Firefox
  * [2] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
@@ -1382,7 +1382,7 @@ user_pref("network.cookie.leave-secure-alone", true); // default: true
  * [3] https://www.sjoerdlangkemper.nl/2016/04/14/preventing-csrf-with-samesite-cookie-attribute/ ***/
    // user_pref("network.cookie.same-site.enabled", true); // default: true
 /* 2710: disable DOM (Document Object Model) Storage
- * [WARNING] This will break a LOT of sites' functionality.
+ * [WARNING] This will break a LOT of sites' functionality AND extensions!
  * You are better off using an extension for more granular control ***/
    // user_pref("dom.storage.enabled", false);
 /* 2720: enforce IndexedDB (IDB) as enabled
@@ -1398,7 +1398,7 @@ user_pref("dom.indexedDB.enabled", true); // default: true
 user_pref("browser.cache.offline.enable", false);
 /* 2730b: disable offline cache on insecure sites (FF60+)
  * [1] https://blog.mozilla.org/security/2018/02/12/restricting-appcache-secure-contexts/ ***/
-user_pref("browser.cache.offline.insecure.enable", false);
+user_pref("browser.cache.offline.insecure.enable", false); // default: false in FF62+
 /* 2731: enforce websites to ask to store data for offline use
  * [1] https://support.mozilla.org/questions/1098540
  * [2] https://bugzilla.mozilla.org/959985 ***/

From 36c791c4bc031e83ba72d19bd828f03dfcfbf8e6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Sep 2018 22:23:59 +0000
Subject: [PATCH 0066/1147] remove 2661: *webextensions.keep*

Added in FF51 with defaults false and never changed since
---
 user.js | 6 ------
 1 file changed, 6 deletions(-)

diff --git a/user.js b/user.js
index 55c805e..0a8aa44 100644
--- a/user.js
+++ b/user.js
@@ -1309,12 +1309,6 @@ user_pref("browser.download.forbid_open_with", true);
  * [1] archived: https://archive.is/DYjAM ***/
 user_pref("extensions.enabledScopes", 1); // (hidden pref)
 user_pref("extensions.autoDisableScopes", 15);
-/* 2661: clear localStorage and UUID when an extension is uninstalled
- * [NOTE] Both preferences must be the same
- * [1] https://developer.mozilla.org/Add-ons/WebExtensions/API/storage/local
- * [2] https://bugzilla.mozilla.org/1213990 ***/
-user_pref("extensions.webextensions.keepStorageOnUninstall", false);
-user_pref("extensions.webextensions.keepUuidOnUninstall", false);
 /* 2662: disable webextension restrictions on certain mozilla domains (also see 4503) (FF60+)
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
    // user_pref("extensions.webextensions.restrictedDomains", "");

From 2d316ceedd347836ad268e5d59c3b20a5a56565a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Sep 2018 22:27:26 +0000
Subject: [PATCH 0067/1147] removed *webextensions.keep*

---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index a59325b..0b1980e 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 08-Sept-2018
+ Last updated: 12-Sept-2018
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -102,6 +102,8 @@
     /* 62-beta */
     'browser.urlbar.autoFill.typed',
     'security.tls.version.fallback-limit',
+    'extensions.webextensions.keepStorageOnUninstall',
+    'extensions.webextensions.keepUuidOnUninstall',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 1c6c5ea2ff3cbd9185e80c869f8b1c4217d223bd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 13 Sep 2018 05:09:07 +0000
Subject: [PATCH 0068/1147] 1000s: cache header section #496

---
 user.js | 11 ++++++-----
 1 file changed, 6 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 0a8aa44..00a04d1 100644
--- a/user.js
+++ b/user.js
@@ -614,15 +614,16 @@ user_pref("security.insecure_field_warning.contextual.enabled", true);
 user_pref("network.auth.subresource-img-cross-origin-http-auth-allow", false);
 
 /*** 1000: CACHE [SETUP]
-     ETAG [1] and other [2] cache tracking/fingerprinting techniques can be averted by
+     ETAG [1] and other [2][3] cache tracking/fingerprinting techniques can be averted by
      disabling *BOTH* disk (1001) and memory (1003) cache. ETAGs can also be neutralized
-     by modifying response headers [3]. Another solution is to use a hardened configuration
-     with Temporary Containers [4]. Alternatively, you can *LIMIT* exposure by clearing
+     by modifying response headers [4]. Another solution is to use a hardened configuration
+     with Temporary Containers [5]. Alternatively, you can *LIMIT* exposure by clearing
      cache on close (2803). or on a regular basis manually or with an extension.
      [1] https://en.wikipedia.org/wiki/HTTP_ETag#Tracking_using_ETags
      [2] https://robertheaton.com/2014/01/20/cookieless-user-tracking-for-douchebags/
-     [3] https://github.com/ghacksuserjs/ghacks-user.js/wiki/4.2.4-Header-Editor
-     [4] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
+     [3] https://www.grepular.com/Preventing_Web_Tracking_via_the_Browser_Cache
+     [4] https://github.com/ghacksuserjs/ghacks-user.js/wiki/4.2.4-Header-Editor
+     [5] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
 ***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
 /** CACHE ***/

From f88af1dac6edda674c80d0b74fdb026abc70447c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 20 Sep 2018 23:39:44 +0000
Subject: [PATCH 0069/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 90bdea3..5367578 100644
--- a/README.md
+++ b/README.md
@@ -14,7 +14,7 @@ Literally thousands of sources, references and suggestions. That said...
 * Martin Brinkmann at [ghacks](https://www.ghacks.net/) <sup>1</sup>
 * The ghacks community and commentators
 * [12bytes](http://12bytes.org/tech/firefox/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs)
-   * The 12bytes article now uses this user.js and supplements it with an additonal JS hosted right [here](https://github.com/atomGit/Firefox-user.js) at github
+   * The 12bytes article now uses this user.js and supplements it with an additonal JS hosted right at [GitLab](https://gitlab.com/labwrat/Firefox-user.js/tree/master)
 
 <sup>1</sup> The ghacks user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015 and was [first published](https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/) at ghacks in August 2015. With Martin Brinkmann's blessing, it will keep the ghacks name.
 

From ca1cc2001f9d40c4dff9e32f396cf9d43df256cb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 20 Sep 2018 23:40:29 +0000
Subject: [PATCH 0070/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 5367578..9b59e75 100644
--- a/README.md
+++ b/README.md
@@ -14,7 +14,7 @@ Literally thousands of sources, references and suggestions. That said...
 * Martin Brinkmann at [ghacks](https://www.ghacks.net/) <sup>1</sup>
 * The ghacks community and commentators
 * [12bytes](http://12bytes.org/tech/firefox/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs)
-   * The 12bytes article now uses this user.js and supplements it with an additonal JS hosted right at [GitLab](https://gitlab.com/labwrat/Firefox-user.js/tree/master)
+   * The 12bytes article now uses this user.js and supplements it with an additonal JS hosted at [GitLab](https://gitlab.com/labwrat/Firefox-user.js/tree/master)
 
 <sup>1</sup> The ghacks user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015 and was [first published](https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/) at ghacks in August 2015. With Martin Brinkmann's blessing, it will keep the ghacks name.
 

From b2fc9bc2664820cb22a658fb9a3977390029333a Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 30 Sep 2018 15:20:36 +0000
Subject: [PATCH 0071/1147] remove 0421: privacy.trackingprotection.ui.enabled

- pref removed in FF63 (https://bugzilla.mozilla.org/1476879)
- when we added it the default was false
- default is true since FF57
- it's only an UI thing

ergo we don't need to move it to 9999
---
 user.js | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/user.js b/user.js
index 00a04d1..5146813 100644
--- a/user.js
+++ b/user.js
@@ -285,9 +285,6 @@ user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
  * [2] https://support.mozilla.org/kb/tracking-protection-firefox ***/
    // user_pref("privacy.trackingprotection.pbmode.enabled", true); // default: true
    // user_pref("privacy.trackingprotection.enabled", true);
-/* 0421: enable more Tracking Protection choices under Options>Privacy & Security>Use Tracking Protection
- * Displays three choices: "Always", "Only in private windows", "Never" ***/
-user_pref("privacy.trackingprotection.ui.enabled", true);
 /* 0422: set which Tracking Protection block list to use
  * [WARNING] We don't recommend enforcing this from here, as available block lists can change
  * [SETTING] Privacy & Security>Tracking Protection>Change Block List ***/

From ec5fb6e3a1833c2db8eacd2e31bc12f0d469a859 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 30 Sep 2018 15:24:33 +0000
Subject: [PATCH 0072/1147] removed privacy.trackingprotection.ui.enabled

---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 0b1980e..6f3dd47 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 12-Sept-2018
+ Last updated: 30-Sept-2018
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -102,8 +102,10 @@
     /* 62-beta */
     'browser.urlbar.autoFill.typed',
     'security.tls.version.fallback-limit',
+    /* 63-beta */
     'extensions.webextensions.keepStorageOnUninstall',
     'extensions.webextensions.keepUuidOnUninstall',
+    'privacy.trackingprotection.ui.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From aacf5d4a0b2cb056957cecc464b6a30d0ef978ff Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 30 Sep 2018 15:30:32 +0000
Subject: [PATCH 0073/1147] update 1031 description

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 5146813..b5dc7e7 100644
--- a/user.js
+++ b/user.js
@@ -681,7 +681,7 @@ user_pref("toolkit.winRegisterApplicationRestart", false);
  * If set to false then the shortcuts use a generic Firefox icon ***/
 user_pref("browser.shell.shortcutFavicons", false);
 /* 1031: disable favicons in tabs and new bookmarks
- * bookmark favicons are stored as data blobs in places.sqlite>moz_favicons ***/
+ * bookmark favicons are stored as data blobs in favicons.sqlite ***/
    // user_pref("browser.chrome.site_icons", false);
    // user_pref("browser.chrome.favicons", false);
 /* 1032: disable favicons in web notifications ***/

From cbcd293e68a2d6eebdd6268140aa55fe1963461a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 11 Oct 2018 05:50:09 +0000
Subject: [PATCH 0074/1147] RFP: spoof/suppress Pointer Events

https://bugzilla.mozilla.org/show_bug.cgi?id=1363508
---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index b5dc7e7..fb3fdb1 100644
--- a/user.js
+++ b/user.js
@@ -1543,6 +1543,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true);
       FF60: Fix keydown/keyup events (1438795)
  ** 1337157 - disable WebGL debug renderer info (see 4613) (FF60+)
  ** 1459089 - disable OS locale in HTTP Accept-Language headers [ANDROID] (FF62+)
+ ** 1363508 - spoof/suppress Pointer Events (FF64+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting (FF41+)

From 21b18cbe49b901280a3ea4a6e0e7016bb05cfe2f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 11 Oct 2018 10:46:35 +0000
Subject: [PATCH 0075/1147] finalize 62

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index fb3fdb1..1665501 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 08 September 2018
-* version 62-beta: Total Eclipse of the Pants
+* date: 10 October 2018
+* version 62: Total Eclipse of the Pants
 *   "Once upon a time there was light in my life, but now there's only pants in the dark"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 58931bc15d80ceba832006554bc3cdb5f10223f5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 11 Oct 2018 11:25:03 +0000
Subject: [PATCH 0076/1147] start 63 commits

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 1665501..0368473 100644
--- a/user.js
+++ b/user.js
@@ -1,8 +1,8 @@
 /******
 * name: ghacks user.js
 * date: 10 October 2018
-* version 62: Total Eclipse of the Pants
-*   "Once upon a time there was light in my life, but now there's only pants in the dark"
+* version 63-alpha: Pants Romance
+*   "Rah rah ah-ah-ah! Ro mah ro-mah-mah. Gaga oh-la-la! Want your pants romance"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 732c438148511b3b32e7f1ce40486db3f2a3431d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 14 Oct 2018 12:11:56 +0000
Subject: [PATCH 0077/1147] 0710: disable GIO... #442

---
 user.js | 8 ++++++++
 1 file changed, 8 insertions(+)

diff --git a/user.js b/user.js
index 0368473..d3463e3 100644
--- a/user.js
+++ b/user.js
@@ -468,6 +468,14 @@ user_pref("network.proxy.autoconfig_url.include_path", false); // default: false
 /* 0709: disable using UNC (Uniform Naming Convention) paths (FF61+)
  * [1] https://trac.torproject.org/projects/tor/ticket/26424 ***/
 user_pref("network.file.disable_unc_paths", true); // (hidden pref)
+/* 0710: disable GIO as a potential proxy bypass vector
+ * Gvfs/GIO has a set of supported protocols like obex, network, archive, computer, dav, cdda,
+ * gphoto2, trash, etc. By default only smb and sftp protocols are accepted so far (as of FF64)
+ * [1] https://bugzilla.mozilla.org/1433507
+ * [2] https://trac.torproject.org/23044
+ * [3] https://en.wikipedia.org/wiki/GVfs
+ * [4] https://en.wikipedia.org/wiki/GIO_(software) ***/
+user_pref("network.gio.supported-protocols", ""); // (hidden pref)
 
 /*** 0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS [SETUP]
      If you are in a private environment (no unwanted eyeballs) and your device is private

From 9e073ea5d5c2b928cd31698eeb227a1b2f362611 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 16 Oct 2018 11:57:32 +0000
Subject: [PATCH 0078/1147] 1201: SSL renegotiation -> active, closes #519

---
 user.js | 9 +++++----
 1 file changed, 5 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index d3463e3..d3a2ccf 100644
--- a/user.js
+++ b/user.js
@@ -710,10 +710,11 @@ user_pref("alerts.showFavicons", false); // default: false
 ***/
 user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
 /** SSL (Secure Sockets Layer) / TLS (Transport Layer Security) ***/
-/* 1201: disable old SSL/TLS - vulnerable to a MiTM attack
- * [WARNING] Tested Feb 2017 - still breaks too many sites
- * [1] https://wiki.mozilla.org/Security:Renegotiation ***/
-   // user_pref("security.ssl.require_safe_negotiation", true);
+/* 1201: disable old SSL/TLS "insecure" renegotiation (vulnerable to a MiTM attack)
+ * [WARNING] <2% of secure sites do NOT support the newer "secure" renegotiation, see [2]
+ * [1] https://wiki.mozilla.org/Security:Renegotiation
+ * [2] https://www.ssllabs.com/ssl-pulse/ ***/
+user_pref("security.ssl.require_safe_negotiation", true);
 /* 1202: control TLS versions with min and max
  * 1=min version of TLS 1.0, 2=min version of TLS 1.1, 3=min version of TLS 1.2 etc
  * [NOTE] Jul-2017: Telemetry indicates approx 2% of TLS web traffic uses 1.0 or 1.1

From 7aac6d476ab71b43d78bf6c68ffa81955007d2bf Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 16 Oct 2018 12:01:42 +0000
Subject: [PATCH 0079/1147] 1270: link to 1201, #519

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index d3a2ccf..4e297d3 100644
--- a/user.js
+++ b/user.js
@@ -822,7 +822,7 @@ user_pref("security.pki.sha1_enforcement_level", 1);
    // user_pref("security.ssl3.rsa_aes_256_sha", false);
 
 /** UI (User Interface) ***/
-/* 1270: display warning (red padlock) for "broken security"
+/* 1270: display warning (red padlock) for "broken security" (see 1201)
  * [1] https://wiki.mozilla.org/Security:Renegotiation ***/
 user_pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
 /* 1271: control "Add Security Exception" dialog on SSL warnings

From 587194ce848717377f2287e34699ce249d8b14ae Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 20 Oct 2018 01:35:37 +0000
Subject: [PATCH 0080/1147] 1403: icon fonts: flip, make inactive, closes #521

---
 user.js | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 4e297d3..d7f18ab 100644
--- a/user.js
+++ b/user.js
@@ -857,9 +857,11 @@ user_pref("browser.display.use_document_fonts", 0);
    // user_pref("font.name.sans-serif.x-western", "Arial"); // default: Arial
    // user_pref("font.name.monospace.x-unicode", "Lucida Console");
    // user_pref("font.name.monospace.x-western", "Lucida Console"); // default: Courier New
-/* 1403: enable icon fonts (glyphs) (FF41+)
- * [1] https://bugzilla.mozilla.org/789788 ***/
-user_pref("gfx.downloadable_fonts.enabled", true); // default: true
+/* 1403: disable icon fonts (glyphs) (FF41) and local fallback rendering
+ * [1] https://bugzilla.mozilla.org/789788
+ * [2] https://trac.torproject.org/projects/tor/ticket/8455 ***/
+   // user_pref("gfx.downloadable_fonts.enabled", false);
+   // user_pref("gfx.downloadable_fonts.fallback_delay", -1);
 /* 1404: disable rendering of SVG OpenType fonts
  * [1] https://wiki.mozilla.org/SVGOpenTypeFonts - iSECPartnersReport recommends to disable this ***/
 user_pref("gfx.font_rendering.opentype_svg.enabled", false);

From 56206f77ba6833876931e346212e3df9d2cf9ae5 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 23 Oct 2018 15:45:31 +0000
Subject: [PATCH 0081/1147] removed, renamed or hidden in v63.0 (#523)

* removed, renamed or hidden in v63.0

- 0301a - do you want to add the `[NOTE] Firefox currently checks every 12 hrs  ...` to `0302a` ? The problem is it also checks for updates every time you open/reload about:preferences and in Menu>Help>About Firefox regardless of when the last check was.

- 0513 - removed because follow-on-search is no longer a deletable system addon

- 2703 - do we just remove `3=for n days` or add a [NOTE] that value 3 was remove in FF63 or something?

- `browser.ctrlTab.recentlyUsedOrder` replaces `browser.ctrlTab.previews` but it now defaults to true. No need to list the new one under 5000 IMO

* Update user.js

* 1031 add more info

https://bugzilla.mozilla.org/show_bug.cgi?id=1453751#c28

* 0301a: remove update-check timing info

* 2703: add version deprecation for value 3
---
 user.js | 61 ++++++++++++++++++++++++++++++++++++---------------------
 1 file changed, 39 insertions(+), 22 deletions(-)

diff --git a/user.js b/user.js
index d7f18ab..6be3a70 100644
--- a/user.js
+++ b/user.js
@@ -90,7 +90,6 @@ user_pref("permissions.default.geo", 2); // 0=always ask (default), 1=allow, 2=b
  * [NOTE] May not be hidden if Firefox has changed your settings due to your locale
  * [1] https://trac.torproject.org/projects/tor/ticket/16254
  * [2] https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections#w_geolocation-for-default-search-engine ***/
-user_pref("browser.search.countryCode", "US"); // (hidden pref)
 user_pref("browser.search.region", "US"); // (hidden pref)
 user_pref("browser.search.geoip.url", "");
 /* 0205: set OS & APP locale (FF59+)
@@ -119,16 +118,11 @@ user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?ke
      monetized extensions, time constraints, legacy issues, and fear of breakage/bugs.
      It is still important to do updates for security reasons, please do so manually. ***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
-/* 0301a: disable auto-update checks for Firefox
- * [NOTE] Firefox currently checks every 12 hrs and allows 8 day notification dismissal
- * [SETTING] General>Firefox Updates>Never check for updates ***/
-   // user_pref("app.update.enabled", false);
 /* 0301b: disable auto-update checks for extensions
  * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
    // user_pref("extensions.update.enabled", false);
-/* 0302a: disable auto update installing for Firefox (after the check in 0301a)
- * [SETTING] General>Firefox Updates>Check for updates but let you choose...
- * [NOTE] The UI checkbox also controls the behavior for checking, the pref only controls auto installing ***/
+/* 0302a: disable auto update installing for Firefox
+ * [SETTING] General>Firefox Updates>Check for updates but let you choose... ***/
 user_pref("app.update.auto", false);
 /* 0302b: disable auto update installing for extensions (after the check in 0301b)
  * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
@@ -218,12 +212,10 @@ user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
  * [2] https://trac.torproject.org/projects/tor/ticket/16931 ***/
 user_pref("extensions.blocklist.enabled", true); // default: true
 user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
-/* 0402: enable Kinto blocklist updates (FF50+)
+/* 0403: disable individual unwanted/unneeded parts of the Kinto blocklists
  * What is Kinto?: https://wiki.mozilla.org/Firefox/Kinto#Specifications
  * As Firefox transitions to Kinto, the blocklists have been broken down into entries for certs to be
  * revoked, extensions and plugins to be disabled, and gfx environments that cause problems or crashes ***/
-user_pref("services.blocklist.update_enabled", true);
-/* 0403: disable individual unwanted/unneeded parts of the Kinto blocklists ***/
    // user_pref("services.blocklist.onecrl.collection", ""); // revoked certificates
    // user_pref("services.blocklist.addons.collection", "");
    // user_pref("services.blocklist.plugins.collection", "");
@@ -330,7 +322,6 @@ user_pref("network.allow-experiments", false);
 user_pref("app.normandy.enabled", false);
 user_pref("app.normandy.api_url", "");
 user_pref("app.shield.optoutstudies.enabled", false);
-user_pref("shield.savant.enabled", false); // (FF61+)
 /* 0505: disable System Add-on updates
  * [NOTE] In FF61 and lower, you will not get any System Add-on updates except when you update Firefox ***/
    // user_pref("extensions.systemAddon.update.enabled", false); // (FF62+)
@@ -343,9 +334,6 @@ user_pref("browser.ping-centre.telemetry", false);
  * [1] https://en.wikipedia.org/wiki/Pocket_(application)
  * [2] https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/ ***/
 user_pref("extensions.pocket.enabled", false);
-/* 0513: disable Follow On Search (FF53+)
- * Just DELETE the XPI file in your System Add-ons directory
- * [1] https://blog.mozilla.org/data/2017/06/05/measuring-search-in-firefox/ ***/
 /* 0514: disable Activity Stream (FF54+)
  * Activity Stream is the default homepage/newtab in FF57+. It is based on metadata and browsing behavior,
  * and includes telemetry and web content such as snippets, top stories (pocket), top sites, etc.
@@ -691,7 +679,6 @@ user_pref("browser.shell.shortcutFavicons", false);
 /* 1031: disable favicons in tabs and new bookmarks
  * bookmark favicons are stored as data blobs in favicons.sqlite ***/
    // user_pref("browser.chrome.site_icons", false);
-   // user_pref("browser.chrome.favicons", false);
 /* 1032: disable favicons in web notifications ***/
 user_pref("alerts.showFavicons", false); // default: false
 
@@ -1043,9 +1030,10 @@ user_pref("dom.imagecapture.enabled", false); // default: false
 /* 2028: disable offscreen canvas (FF44+)
  * [1] https://developer.mozilla.org/docs/Web/API/OffscreenCanvas ***/
 user_pref("gfx.offscreencanvas.enabled", false); // default: false
-/* 2030: disable auto-play of HTML5 media
+/* 2030: disable auto-play of HTML5 media (FF63+)
+ * 0=Allowed (default), 1=Blocked, 2=Prompt
  * [WARNING] This may break video playback on various sites ***/
-user_pref("media.autoplay.enabled", false);
+user_pref("media.autoplay.default", 1);
 /* 2031: disable audio auto-play in non-active tabs (FF51+)
  * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
 user_pref("media.block-autoplay-until-in-foreground", true);
@@ -1371,11 +1359,9 @@ user_pref("network.cookie.cookieBehavior", 1);
 user_pref("network.cookie.thirdparty.sessionOnly", true);
 user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // (FF58+)
 /* 2703: set cookie lifetime policy
- * 0=until they expire (default), 2=until you close Firefox, 3=for n days (see next pref)
+ * 0=until they expire (default), 2=until you close Firefox, 3=for n days (see 2704-deprecated FF63+)
  * [SETTING] Privacy & Security>History>Custom Settings>Accept cookies from sites>Keep until ***/
    // user_pref("network.cookie.lifetimePolicy", 0);
-/* 2704: set cookie lifetime in days (see above pref) - default is 90 days ***/
-   // user_pref("network.cookie.lifetime.days", 90);
 /* 2705: disable HTTP sites setting cookies with the "secure" directive (FF52+)
  * [1] https://developer.mozilla.org/Firefox/Releases/52#HTTP ***/
 user_pref("network.cookie.leave-secure-alone", true); // default: true
@@ -1703,7 +1689,6 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("layout.spellcheckDefault", 2); // 0=none, 1-multi-line, 2=multi-line & single-line
 /* UX BEHAVIOR ***/
    // user_pref("browser.backspace_action", 2); // 0=previous page, 1=scroll up, 2=do nothing
-   // user_pref("browser.ctrlTab.previews", true);
    // user_pref("browser.tabs.closeWindowWithLastTab", false);
    // user_pref("browser.tabs.loadBookmarksInTabs", true); // open bookmarks in a new tab (FF57+)
    // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see  Bugzilla 1320061 (FF53+)
@@ -2122,6 +2107,38 @@ user_pref("network.jar.open-unsafe-types", false);
    // [-] (part5) https://bugzilla.mozilla.org/1461243
 user_pref("plugin.state.java", 0);
 // * * * /
+// FF63
+// 0202: disable GeoIP-based search results
+   // [NOTE] May not be hidden if Firefox has changed your settings due to your locale
+   // [-] https://bugzilla.mozilla.org/1462015
+user_pref("browser.search.countryCode", "US"); // (hidden pref)
+// 0301a: disable auto-update checks for Firefox
+   // [SETTING] General>Firefox Updates>Never check for updates
+   // [-] https://bugzilla.mozilla.org/1420514
+   // user_pref("app.update.enabled", false);
+// 0402: enable Kinto blocklist updates (FF50+)
+   // What is Kinto?: https://wiki.mozilla.org/Firefox/Kinto#Specifications
+   // As Firefox transitions to Kinto, the blocklists have been broken down into entries for certs to be
+   // revoked, extensions and plugins to be disabled, and gfx environments that cause problems or crashes
+   // [-] https://bugzilla.mozilla.org/1458917
+user_pref("services.blocklist.update_enabled", true);
+// 0503: disable "Savant" Shield study (FF61+)
+   // [-] https://bugzilla.mozilla.org/1457226
+user_pref("shield.savant.enabled", false);
+// 1031: disable favicons in tabs and new bookmarks - merged into browser.chrome.site_icons
+   // [-] https://bugzilla.mozilla.org/1453751
+   // user_pref("browser.chrome.favicons", false);
+// 2030: disable auto-play of HTML5 media - replaced by media.autoplay.default
+   // [WARNING] This may break video playback on various sites
+   // [-] https://bugzilla.mozilla.org/1470082
+user_pref("media.autoplay.enabled", false);
+// 2704: set cookie lifetime in days (see 2703)
+   // [-] https://bugzilla.mozilla.org/1457170
+   // user_pref("network.cookie.lifetime.days", 90); // default: 90
+// 5000's: enable "Ctrl+Tab cycles through tabs in recently used order" - replaced by browser.ctrlTab.recentlyUsedOrder
+   // [-] https://bugzilla.mozilla.org/1473595
+   // user_pref("browser.ctrlTab.previews", true);
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 24f7847f7321e1a55add50ea78f0393f92a00917 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Oct 2018 16:13:23 +0000
Subject: [PATCH 0082/1147] 2703: make value 3 info clearer

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 6be3a70..cb2d363 100644
--- a/user.js
+++ b/user.js
@@ -1359,7 +1359,8 @@ user_pref("network.cookie.cookieBehavior", 1);
 user_pref("network.cookie.thirdparty.sessionOnly", true);
 user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // (FF58+)
 /* 2703: set cookie lifetime policy
- * 0=until they expire (default), 2=until you close Firefox, 3=for n days (see 2704-deprecated FF63+)
+ * 0=until they expire (default), 2=until you close Firefox
+ * [NOTE] 3=for n days : no longer supported in FF63+ (see 2704-deprecated)
  * [SETTING] Privacy & Security>History>Custom Settings>Accept cookies from sites>Keep until ***/
    // user_pref("network.cookie.lifetimePolicy", 0);
 /* 2705: disable HTTP sites setting cookies with the "secure" directive (FF52+)

From 1abe1fd4df744780460a047046c6a6ab3615c570 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 24 Oct 2018 10:15:37 +0000
Subject: [PATCH 0083/1147] 4702: buildID cleanup, closes 518

---
 user.js | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index cb2d363..af0f24e 100644
--- a/user.js
+++ b/user.js
@@ -1654,9 +1654,10 @@ user_pref("webgl.enable-debug-renderer-info", false);
 user_pref("_user.js.parrot", "4700 syntax error: the parrot's taken 'is last bow");
 /* 4701: navigator.userAgent ***/
    // user_pref("general.useragent.override", ""); // (hidden pref)
-/* 4702: navigator.buildID (
- * reveals build time down to the second
- * [1] https://bugzilla.mozilla.org/583181 ***/
+/* 4702: navigator.buildID
+ * Revealed build time down to the second. In FF64+ it now returns a fixed timestamp
+ * [1] https://bugzilla.mozilla.org/583181
+ * [2] https://www.fxsitecompat.com/en-CA/docs/2018/navigator-buildid-now-returns-a-fixed-timestamp/ ***/
    // user_pref("general.buildID.override", ""); // (hidden pref)
 /* 4703: navigator.appName ***/
    // user_pref("general.appname.override", ""); // (hidden pref)

From e8bfa936966785fe6a167d6728146640945d8ec9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 25 Oct 2018 00:13:50 +0000
Subject: [PATCH 0084/1147] 0410s: SBv4 & cookies, #520

---
 user.js | 14 +++++++-------
 1 file changed, 7 insertions(+), 7 deletions(-)

diff --git a/user.js b/user.js
index af0f24e..1f5b319 100644
--- a/user.js
+++ b/user.js
@@ -222,13 +222,13 @@ user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozi
    // user_pref("services.blocklist.gfx.collection", "");
 
 /** SAFE BROWSING (SB)
-    This sub-section has been redesigned to differentiate between "real-time"/"user initiated"
-    data being sent to Google from all other settings such as using local blocklists/whitelists and
-    updating those lists. There are NO privacy issues here. *IF* required, a full url is never sent
-    to Google, only a PART-hash of the prefix, and this is hidden with noise of other real PART-hashes.
-    Google also swear it is anonymized and only used to flag malicious sites/activity. Firefox
-    also takes measures such as striping out identifying parameters and storing safe browsing
-    cookies in a separate jar. (#Turn on browser.safebrowsing.debug to monitor this activity)
+    This sub-section has been redesigned to differentiate between "real-time"/"user initiated" data
+    being sent to Google from all other settings such as using local blocklists/whitelists and updating
+    those lists. There are NO privacy issues here. *IF* required, a full url is never sent to Google,
+    only a PART-hash of the prefix, and this is hidden with noise of other real PART-hashes. Google also
+    swear it is anonymized and only used to flag malicious sites/activity. Firefox also takes measures
+    such as striping out identifying parameters and storing safe browsing cookies in a separate jar.
+    SB v4 (FF57+) doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
     #Required reading [#] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
     [1] https://wiki.mozilla.org/Security/Safe_Browsing ***/
 /* 0410: disable "Block dangerous and deceptive content" (under Options>Privacy & Security)

From 68e44285c57f0a274461e321ca87e33bed8633a7 Mon Sep 17 00:00:00 2001
From: Mtq <5884000+KonoromiHimaries@users.noreply.github.com>
Date: Sat, 27 Oct 2018 16:52:19 +0200
Subject: [PATCH 0085/1147] Update README.md (#524)

+ compressed
---
 README.md | 10 ++++++----
 1 file changed, 6 insertions(+), 4 deletions(-)

diff --git a/README.md b/README.md
index 9b59e75..3f9df6f 100644
--- a/README.md
+++ b/README.md
@@ -1,14 +1,14 @@
-### ![](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/bullet01.png) user.js
+### ![][b] user.js
 A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.1-Overview) wiki page.
 
-### ![](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/bullet01.png) ghacks user.js
+### ![][b] ghacks user.js
 The `ghacks user.js` is a **template**, which, as provided, aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).
 
 Everyone, experts included, should at least read the [implementation](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.3-Implementation) wiki page, as it contains important information regarding a few `ghacks user.js` settings.
 
 Sitemap: [Releases](https://github.com/ghacksuserjs/ghacks-user.js/releases), [changelogs](https://github.com/ghacksuserjs/ghacks-user.js/issues?utf8=%E2%9C%93&q=is%3Aissue+label%3Achangelog), [Wiki](https://github.com/ghacksuserjs/ghacks-user.js/wiki), [stickies](https://github.com/ghacksuserjs/ghacks-user.js/issues?q=is%3Aissue+is%3Aopen+label%3A%22sticky+topic%22). [diffs](https://github.com/ghacksuserjs/ghacks-user.js/issues?q=is%3Aissue+label%3Adiffs)
 
-### ![](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/bullet01.png) acknowledgments
+### ![][b] acknowledgments
 Literally thousands of sources, references and suggestions. That said...
 
 * Martin Brinkmann at [ghacks](https://www.ghacks.net/) <sup>1</sup>
@@ -18,4 +18,6 @@ Literally thousands of sources, references and suggestions. That said...
 
 <sup>1</sup> The ghacks user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015 and was [first published](https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/) at ghacks in August 2015. With Martin Brinkmann's blessing, it will keep the ghacks name.
 
-### ![](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/bullet01.png) [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
+### ![][b] [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
+
+[b]: https://i.postimg.cc/TPT20mdn/bullet01.png

From 29d832e350acb41b6a90f574acd052969b662a73 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Oct 2018 14:55:15 +0000
Subject: [PATCH 0086/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 3f9df6f..f22e3c3 100644
--- a/README.md
+++ b/README.md
@@ -20,4 +20,4 @@ Literally thousands of sources, references and suggestions. That said...
 
 ### ![][b] [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
 
-[b]: https://i.postimg.cc/TPT20mdn/bullet01.png
+[b]: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/bullet01.png

From b4b5e3a06826492b2f98780112dd5dbe4cea769b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Oct 2018 03:57:54 +1300
Subject: [PATCH 0087/1147] Add files via upload

---
 wikipiki/License-MIT-yellow.svg | 1 +
 1 file changed, 1 insertion(+)
 create mode 100644 wikipiki/License-MIT-yellow.svg

diff --git a/wikipiki/License-MIT-yellow.svg b/wikipiki/License-MIT-yellow.svg
new file mode 100644
index 0000000..d4aa560
--- /dev/null
+++ b/wikipiki/License-MIT-yellow.svg
@@ -0,0 +1 @@
+<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="78" height="20"><linearGradient id="b" x2="0" y2="100%"><stop offset="0" stop-color="#bbb" stop-opacity=".1"/><stop offset="1" stop-opacity=".1"/></linearGradient><clipPath id="a"><rect width="78" height="20" rx="3" fill="#fff"/></clipPath><g clip-path="url(#a)"><path fill="#555" d="M0 0h47v20H0z"/><path fill="#dfb317" d="M47 0h31v20H47z"/><path fill="url(#b)" d="M0 0h78v20H0z"/></g><g fill="#fff" text-anchor="middle" font-family="DejaVu Sans,Verdana,Geneva,sans-serif" font-size="110"> <text x="245" y="150" fill="#010101" fill-opacity=".3" transform="scale(.1)" textLength="370">license</text><text x="245" y="140" transform="scale(.1)" textLength="370">license</text><text x="615" y="150" fill="#010101" fill-opacity=".3" transform="scale(.1)" textLength="210">MIT</text><text x="615" y="140" transform="scale(.1)" textLength="210">MIT</text></g> </svg>
\ No newline at end of file

From 49d9314b0add9998c8cb90e1f3dede3070e57ea0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Oct 2018 15:00:10 +0000
Subject: [PATCH 0088/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index f22e3c3..985308a 100644
--- a/README.md
+++ b/README.md
@@ -18,6 +18,6 @@ Literally thousands of sources, references and suggestions. That said...
 
 <sup>1</sup> The ghacks user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015 and was [first published](https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/) at ghacks in August 2015. With Martin Brinkmann's blessing, it will keep the ghacks name.
 
-### ![][b] [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
+### ![][b] [![License: MIT](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
 
 [b]: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/bullet01.png

From 0efebe3e83fd349c8c9e74b6d56f5a93a346f569 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sat, 27 Oct 2018 16:17:25 +0000
Subject: [PATCH 0089/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 985308a..d1bb973 100644
--- a/README.md
+++ b/README.md
@@ -20,4 +20,4 @@ Literally thousands of sources, references and suggestions. That said...
 
 ### ![][b] [![License: MIT](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
 
-[b]: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/bullet01.png
+[b]: https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/wikipiki/bullet01.png

From 806d04772906cc50cb08ab4ccd36e51c17e8f486 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sat, 27 Oct 2018 16:28:15 +0000
Subject: [PATCH 0090/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index d1bb973..30c5372 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,4 @@
-### ![][b] user.js
+### &bull; user.js
 A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.1-Overview) wiki page.
 
 ### ![][b] ghacks user.js

From 8f10300c15e1d897b7115e949c5fb36658631265 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sat, 27 Oct 2018 16:29:34 +0000
Subject: [PATCH 0091/1147] Update _config.yml

---
 _config.yml | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/_config.yml b/_config.yml
index 1885487..a8f761e 100644
--- a/_config.yml
+++ b/_config.yml
@@ -1 +1,3 @@
-theme: jekyll-theme-midnight
\ No newline at end of file
+theme: jekyll-theme-midnight
+title: ghacks-user.js
+description: An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting

From 39a30d710b1dd27d79c5c48006813f1684d92b8c Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sat, 27 Oct 2018 16:30:38 +0000
Subject: [PATCH 0092/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 30c5372..d1bb973 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,4 @@
-### &bull; user.js
+### ![][b] user.js
 A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.1-Overview) wiki page.
 
 ### ![][b] ghacks user.js

From 661af196d9e9775ea0b29ecd639a75a30cd5ebfa Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Oct 2018 11:08:18 +0000
Subject: [PATCH 0093/1147] Update README.md

---
 README.md | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/README.md b/README.md
index d1bb973..e601a9d 100644
--- a/README.md
+++ b/README.md
@@ -2,7 +2,7 @@
 A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.1-Overview) wiki page.
 
 ### ![][b] ghacks user.js
-The `ghacks user.js` is a **template**, which, as provided, aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).
+The `ghacks user.js` is a **template** which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).
 
 Everyone, experts included, should at least read the [implementation](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.3-Implementation) wiki page, as it contains important information regarding a few `ghacks user.js` settings.
 
@@ -18,6 +18,6 @@ Literally thousands of sources, references and suggestions. That said...
 
 <sup>1</sup> The ghacks user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015 and was [first published](https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/) at ghacks in August 2015. With Martin Brinkmann's blessing, it will keep the ghacks name.
 
-### ![][b] [![License: MIT](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
+### ![][b] [![License: MIT](https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/wikipiki/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
 
 [b]: https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/wikipiki/bullet01.png

From 452c71750241eb7fb3bc53267be153b507b6a912 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Oct 2018 11:09:47 +0000
Subject: [PATCH 0094/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index e601a9d..7ad85e8 100644
--- a/README.md
+++ b/README.md
@@ -18,6 +18,6 @@ Literally thousands of sources, references and suggestions. That said...
 
 <sup>1</sup> The ghacks user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015 and was [first published](https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/) at ghacks in August 2015. With Martin Brinkmann's blessing, it will keep the ghacks name.
 
-### ![][b] [![License: MIT](https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/wikipiki/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
+### ![][b] [![License: MIT](https://github.com/ghacksuserjs/ghacks-user.js/tree/master/wikipiki/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
 
 [b]: https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/wikipiki/bullet01.png

From 7b3e6f5143f75e944bc69f2645f1e773fb4a643e Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 28 Oct 2018 15:20:41 +0000
Subject: [PATCH 0095/1147] Update README.md

---
 README.md | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/README.md b/README.md
index 7ad85e8..8252a30 100644
--- a/README.md
+++ b/README.md
@@ -18,6 +18,6 @@ Literally thousands of sources, references and suggestions. That said...
 
 <sup>1</sup> The ghacks user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015 and was [first published](https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/) at ghacks in August 2015. With Martin Brinkmann's blessing, it will keep the ghacks name.
 
-### ![][b] [![License: MIT](https://github.com/ghacksuserjs/ghacks-user.js/tree/master/wikipiki/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
+### ![][b] [![License: MIT](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
 
-[b]: https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/wikipiki/bullet01.png
+[b]: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/bullet01.png

From 5a36b4e016c27db22ee0e040edbe1ba399085ab6 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 28 Oct 2018 15:58:47 +0000
Subject: [PATCH 0096/1147] Update README.md

---
 README.md | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/README.md b/README.md
index 8252a30..2b3454b 100644
--- a/README.md
+++ b/README.md
@@ -18,6 +18,6 @@ Literally thousands of sources, references and suggestions. That said...
 
 <sup>1</sup> The ghacks user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015 and was [first published](https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/) at ghacks in August 2015. With Martin Brinkmann's blessing, it will keep the ghacks name.
 
-### ![][b] [![License: MIT](https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
+### ![][b] [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
 
-[b]: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/wikipiki/bullet01.png
+[b]: https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/wikipiki/bullet01.png

From afee555045df337d07874cf143bdbeaac4c8e363 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Oct 2018 16:46:22 +0000
Subject: [PATCH 0097/1147] FPI: isolate postMessage...

---
 user.js | 11 +++++++++--
 1 file changed, 9 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 1f5b319..53fd981 100644
--- a/user.js
+++ b/user.js
@@ -1472,6 +1472,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1344170 - isolate blob: URI (FF55+)
  ** 1300671 - isolate data:, about: URLs (FF55+)
  ** 1473247 - isolate IP addresses (FF63+)
+ ** 1492607 - isolate postMessage with targetOrigin "*" (requires 4002) (FF65+)
 
  NOTE: FPI has some issues depending on your Firefox release
  ** 1418931 - [fixed in FF58+] IndexedDB (Offline Website Data) with FPI Origin Attributes
@@ -1485,8 +1486,14 @@ user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 user_pref("privacy.firstparty.isolate", true);
 /* 4002: enforce FPI restriction for window.opener (FF54+)
  * [NOTE] Setting this to false may reduce the breakage in 4001
- * [1] https://bugzilla.mozilla.org/1319773#c22 ***/
-user_pref("privacy.firstparty.isolate.restrict_opener_access", true);
+ * [FF65+] blocks postMessage with targetOrigin "*" if originAttributes don't match. But
+ * to reduce breakage it ignores the 1st-party domain (FPD) originAttribute. (see [2],[3])
+ * The 2nd pref removes that limitation and will only allow communication if FPDs also match.
+ * [1] https://bugzilla.mozilla.org/1319773#c22
+ * [2] https://bugzilla.mozilla.org/1492607
+ * [3] https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage ***/
+user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // default: true
+   // user_pref("privacy.firstparty.isolate.block_post_message", true); // (hidden pref)
 
 /*** 4500: privacy.resistFingerprinting (RFP)
    This master switch will be used for a wide range of items, many of which will

From 58fa4e9b6d44ba37adf2d5083b09f28ef792dc06 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 29 Oct 2018 14:26:49 +0000
Subject: [PATCH 0098/1147] 0514: disable snippets, top stories, telemetry

---
 user.js | 13 +++++++++++++
 1 file changed, 13 insertions(+)

diff --git a/user.js b/user.js
index 53fd981..374a63b 100644
--- a/user.js
+++ b/user.js
@@ -340,9 +340,22 @@ user_pref("extensions.pocket.enabled", false);
  *  - ONE: make sure to set your "home" and "newtab" to about:blank (or use an extension to control them)
  *  - TWO: DELETE the XPI file in your System Add-ons directory (note this get reinstalled on app updates)
  * And/or you can try to control the ever-growing, ever-changing "browser.newtabpage.activity-stream.*" prefs
+ * [FF63+] Activity Stream (AS) is now builtin and no longer an easily deletable system addon!
+ *     We'll clean this up and move to a new number when ESR67 is released.
  * [1] https://wiki.mozilla.org/Firefox/Activity_Stream
  * [2] https://www.ghacks.net/2016/02/15/firefox-mockups-show-activity-stream-new-tab-page-and-share-updates/ ***/
 user_pref("browser.library.activity-stream.enabled", false); // (FF57+)
+/* 0514a: disable AS Snippets ***/
+user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
+user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // [SETTING] Home>Firefox Home Content>Snippets
+/* 0514b: disable AS Top Stories and other Pocket-based and/or sponsored content ***/
+user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
+user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false); // [SETTING] Home>Firefox Home Content>Highlights>Pages Saved to Pocket
+user_pref("browser.newtabpage.activity-stream.showSponsored", false);
+/* 0514c: disable AS telemetry ***/
+user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
+user_pref("browser.newtabpage.activity-stream.telemetry", false);
+user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
 /* 0515: disable Screenshots (FF55+)
  * alternatively in FF60+, disable uploading to the Screenshots server
  * [1] https://github.com/mozilla-services/screenshots

From f8fc465d0aa30fc66282095199c892dce104358c Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 29 Oct 2018 15:40:24 +0000
Subject: [PATCH 0099/1147] 2701: add new descriptions and new value (#527)

---
 user.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 374a63b..2bfff10 100644
--- a/user.js
+++ b/user.js
@@ -1357,7 +1357,9 @@ user_pref("security.dialog_enable_delay", 700); // default: 1000 (milliseconds)
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 /* 2701: disable 3rd-party cookies and site-data [SETUP]
  * You can set exceptions under site permissions or use an extension
- * 0=allow all 1=allow same host 2=disallow all 3=allow 3rd party if it already set a cookie
+ * 0=Accept cookies and site data, 1=Block third-party cookies, 2=Block all cookies,
+ * 3=Block cookies from unvisited sites, 4=Block third-party trackers (FF63+)
+ * [NOTE] value 4 is tied to the Tracking Protection lists so make sure you have 0424 + 0425 on default values!
  * [SETTING] Privacy & Security>History>Custom Settings>Accept cookies from sites
  * [NOTE] Blocking 3rd party controls 3rd party access to localStorage, IndexedDB, Cache API and Service Worker Cache.
  * Blocking 1st party controls access to localStorage and IndexedDB (note: Service Workers can still use IndexedDB).

From 89bc0bee16d9728208208c38c6e6828b17c95d84 Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Sun, 4 Nov 2018 14:44:20 +0000
Subject: [PATCH 0100/1147] scheme+host+path+port -> scheme+host+port+path
 (#530)

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 2bfff10..6945045 100644
--- a/user.js
+++ b/user.js
@@ -896,7 +896,7 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
      use the site and then change the values back. If you visit those sites regularly (e.g. Vimeo), use an extension.
 
                     full URI: https://example.com:8888/foo/bar.html?id=1234
-       scheme+host+path+port: https://example.com:8888/foo/bar.html
+       scheme+host+port+path: https://example.com:8888/foo/bar.html
             scheme+host+port: https://example.com:8888
 
      #Required reading [#] https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
@@ -906,13 +906,13 @@ user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
  * 0=never, 1=send only when links are clicked, 2=for links and images (default) ***/
 user_pref("network.http.sendRefererHeader", 2);
 /* 1602: ALL: control the amount of information to send
- * 0=send full URI (default), 1=scheme+host+path+port, 2=scheme+host+port ***/
+ * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.trimmingPolicy", 0);
 /* 1603: CROSS ORIGIN: control when to send a referer [SETUP]
  * 0=always (default), 1=only if base domains match, 2=only if hosts match ***/
 user_pref("network.http.referer.XOriginPolicy", 1);
 /* 1604: CROSS ORIGIN: control the amount of information to send (FF52+)
- * 0=send full URI (default), 1=scheme+host+path+port, 2=scheme+host+port ***/
+ * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.XOriginTrimmingPolicy", 0);
 /* 1605: ALL: disable spoofing a referer
  * [WARNING] Spoofing effectively disables the anti-CSRF (Cross-Site Request Forgery) protections that some sites may rely on ***/

From b6b9733afa5e887abafc878456f9c0a0a4c20d20 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 7 Nov 2018 15:14:32 +0000
Subject: [PATCH 0101/1147] remove old information (#531)

Pants said "We do not need to keep anything for ESR users. ESR users are on v60, and we have an archived 60 for them."
This isn't even affecting ESR60 but only older versions.
---
 user.js | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 6945045..2a87f25 100644
--- a/user.js
+++ b/user.js
@@ -1398,8 +1398,7 @@ user_pref("network.cookie.leave-secure-alone", true); // default: true
  * via an extenion. Note that IDB currently cannot be sanitized by host.
  * [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/ ***/
 user_pref("dom.indexedDB.enabled", true); // default: true
-/* 2730: disable offline cache
- * [NOTE] For FF51-FF60 (ESR not included), this is required 'true' for Storage API (2750) ***/
+/* 2730: disable offline cache ***/
 user_pref("browser.cache.offline.enable", false);
 /* 2730b: disable offline cache on insecure sites (FF60+)
  * [1] https://blog.mozilla.org/security/2018/02/12/restricting-appcache-secure-contexts/ ***/
@@ -1415,7 +1414,6 @@ user_pref("dom.caches.enabled", false);
  * The API gives sites the ability to find out how much space they can use, how much
  * they are already using, and even control whether or not they need to be alerted
  * before the user agent disposes of site data in order to make room for other things.
- * [NOTE] For FF51-FF60 (ESR not included), if Storage API is enabled, then Offline Cache (2730) must be also be enabled
  * [1] https://developer.mozilla.org/docs/Web/API/StorageManager
  * [2] https://developer.mozilla.org/docs/Web/API/Storage_API
  * [3] https://blog.mozilla.org/l10n/2017/03/07/firefox-l10n-report-aurora-54/ ***/

From 92acb6b2f754cbce457789877c2c206c0908817b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 12 Nov 2018 00:06:19 +0000
Subject: [PATCH 0102/1147] saving the world, one byte at a time

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 2a87f25..bdee111 100644
--- a/user.js
+++ b/user.js
@@ -1713,7 +1713,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("browser.backspace_action", 2); // 0=previous page, 1=scroll up, 2=do nothing
    // user_pref("browser.tabs.closeWindowWithLastTab", false);
    // user_pref("browser.tabs.loadBookmarksInTabs", true); // open bookmarks in a new tab (FF57+)
-   // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see  Bugzilla 1320061 (FF53+)
+   // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see Bugzilla 1320061 (FF53+)
    // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [WINDOWS] [MAC]
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
 /* OTHER ***/

From 8fd6061bcc977d6e242ba08b1c50ac46b0225b7d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 13 Nov 2018 08:19:19 +0000
Subject: [PATCH 0103/1147] 0426: enforce CB

---
 user.js | 6 ++++--
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index bdee111..bdcf7ed 100644
--- a/user.js
+++ b/user.js
@@ -194,7 +194,7 @@ user_pref("browser.aboutHomeSnippets.updateUrl", "data:,");
 user_pref("browser.chrome.errorReporter.enabled", false);
 user_pref("browser.chrome.errorReporter.submitUrl", "");
 
-/*** 0400: BLOCKLISTS / SAFE BROWSING / TRACKING PROTECTION
+/*** 0400: BLOCKLISTS / SAFE BROWSING / TRACKING PROTECTION / CONTENT BLOCKING
      This section has security & tracking protection implications vs privacy concerns vs effectiveness
      vs 3rd party 'censorship'. We DO NOT advocate no protection. If you disable Tracking Protection (TP)
      and/or Safe Browsing (SB), then SECTION 0400 REQUIRES YOU HAVE uBLOCK ORIGIN INSTALLED.
@@ -268,7 +268,7 @@ user_pref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", ""); //
 user_pref("browser.safebrowsing.provider.google4.dataSharing.enabled", false);
 user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
 
-/** TRACKING PROTECTION (TP)
+/** TRACKING PROTECTION (TP) / CONTENT BLOCKING
     There are NO privacy concerns here, but we strongly recommend to use uBlock Origin as well,
     as it offers more comprehensive and specialized lists. It also allows per domain control. ***/
 /* 0420: enable Tracking Protection in all windows
@@ -295,6 +295,8 @@ user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1170190,1141814 ***/
    // user_pref("privacy.trackingprotection.annotate_channels", false);
    // user_pref("privacy.trackingprotection.lower_network_priority", false);
+/* 0426: enforce Content Blocking (required to block cookies) (FF63+) ***/
+user_pref("browser.contentblocking.enabled", true); // default: true
 
 /*** 0500: SYSTEM ADD-ONS / EXPERIMENTS
      System Add-ons are a method for shipping extensions, considered to be

From f214e4bc4e69af62a031323142b3645bd0bad340 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 13 Nov 2018 08:42:49 +0000
Subject: [PATCH 0104/1147] 2517: disable Media Capabilities API (for now)

---
 user.js | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/user.js b/user.js
index bdcf7ed..0648345 100644
--- a/user.js
+++ b/user.js
@@ -1214,6 +1214,11 @@ user_pref("dom.webaudio.enabled", false);
 /* 2516: disable PointerEvents
  * [1] https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent ***/
 user_pref("dom.w3c_pointer_events.enabled", false);
+/* 2517: disable Media Capabilities API (FF63+)
+ [WARNING] This *may* affect media performance if disabled, no one is sure
+ [1] https://github.com/WICG/media-capabilities
+ [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
+user_pref("media.media-capabilities.enabled", false);
 
 /*** 2600: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");

From 4834472107a4c03c206571271586dfe0bf9bcc92 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 13 Nov 2018 15:01:35 +0000
Subject: [PATCH 0105/1147] remove 0426 content blocking

---
 user.js | 6 ++----
 1 file changed, 2 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 0648345..b96b4f0 100644
--- a/user.js
+++ b/user.js
@@ -194,7 +194,7 @@ user_pref("browser.aboutHomeSnippets.updateUrl", "data:,");
 user_pref("browser.chrome.errorReporter.enabled", false);
 user_pref("browser.chrome.errorReporter.submitUrl", "");
 
-/*** 0400: BLOCKLISTS / SAFE BROWSING / TRACKING PROTECTION / CONTENT BLOCKING
+/*** 0400: BLOCKLISTS / SAFE BROWSING / TRACKING PROTECTION
      This section has security & tracking protection implications vs privacy concerns vs effectiveness
      vs 3rd party 'censorship'. We DO NOT advocate no protection. If you disable Tracking Protection (TP)
      and/or Safe Browsing (SB), then SECTION 0400 REQUIRES YOU HAVE uBLOCK ORIGIN INSTALLED.
@@ -268,7 +268,7 @@ user_pref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", ""); //
 user_pref("browser.safebrowsing.provider.google4.dataSharing.enabled", false);
 user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
 
-/** TRACKING PROTECTION (TP) / CONTENT BLOCKING
+/** TRACKING PROTECTION (TP)
     There are NO privacy concerns here, but we strongly recommend to use uBlock Origin as well,
     as it offers more comprehensive and specialized lists. It also allows per domain control. ***/
 /* 0420: enable Tracking Protection in all windows
@@ -295,8 +295,6 @@ user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1170190,1141814 ***/
    // user_pref("privacy.trackingprotection.annotate_channels", false);
    // user_pref("privacy.trackingprotection.lower_network_priority", false);
-/* 0426: enforce Content Blocking (required to block cookies) (FF63+) ***/
-user_pref("browser.contentblocking.enabled", true); // default: true
 
 /*** 0500: SYSTEM ADD-ONS / EXPERIMENTS
      System Add-ons are a method for shipping extensions, considered to be

From 3423d39fa9255a4793fa60d6de63ba2cb2d95e1d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 13 Nov 2018 15:11:01 +0000
Subject: [PATCH 0106/1147] 2517 Media Capabilities => inactive

see https://github.com/ghacksuserjs/ghacks-user.js/commit/f214e4bc4e69af62a031323142b3645bd0bad340#comments
---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index b96b4f0..a5f7971 100644
--- a/user.js
+++ b/user.js
@@ -1213,10 +1213,10 @@ user_pref("dom.webaudio.enabled", false);
  * [1] https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent ***/
 user_pref("dom.w3c_pointer_events.enabled", false);
 /* 2517: disable Media Capabilities API (FF63+)
- [WARNING] This *may* affect media performance if disabled, no one is sure
- [1] https://github.com/WICG/media-capabilities
- [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
-user_pref("media.media-capabilities.enabled", false);
+ * [WARNING] This *may* affect media performance if disabled, no one is sure
+ * [1] https://github.com/WICG/media-capabilities
+ * [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
+   // user_pref("media.media-capabilities.enabled", false);
 
 /*** 2600: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");

From ce48306a0dffffedc5932d8eac05c79e7a0f69c1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 13 Nov 2018 15:12:20 +0000
Subject: [PATCH 0107/1147] finalize beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index a5f7971..7d61448 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 10 October 2018
-* version 63-alpha: Pants Romance
+* date: 13 November 2018
+* version 63-beta: Pants Romance
 *   "Rah rah ah-ah-ah! Ro mah ro-mah-mah. Gaga oh-la-la! Want your pants romance"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 3003f2dd85be1851d1493e94df801c5c6d8c29ef Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 13 Nov 2018 15:30:39 +0000
Subject: [PATCH 0108/1147] make up yer mind

stick it back in for two releases - pref gets removed in FF65 anyway
---
 user.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/user.js b/user.js
index 7d61448..be8a695 100644
--- a/user.js
+++ b/user.js
@@ -295,6 +295,8 @@ user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1170190,1141814 ***/
    // user_pref("privacy.trackingprotection.annotate_channels", false);
    // user_pref("privacy.trackingprotection.lower_network_priority", false);
+/* 0426: enforce Content Blocking (required to block cookies) (FF63+) ***/
+user_pref("browser.contentblocking.enabled", true); // default: true
 
 /*** 0500: SYSTEM ADD-ONS / EXPERIMENTS
      System Add-ons are a method for shipping extensions, considered to be

From 0cc4007eda10a92dadbe8d3548a06a16c21a1d7b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 13 Nov 2018 16:19:23 +0000
Subject: [PATCH 0109/1147] 1202: tls.min => inactive #533

TLS 1.0 and 1.1 are still secure. Sure, later versions are more secure, but 98% of the web is already upgraded - less than 2% of sites use < v1.2. So it's not very likely you would come across a site that requires it, but if you did, what's the point in breaking it. Mozilla and Chrome already have plans to deprecate TLS 1.0 & 1.1, and force that last 2% of sites.

TLS settings can be FP'ed without JS. By sticking with the defaults, I do not see any security issues, but an increase in potential anti-FPing. TBH, the chances of either (i.e being FP'ed with TLS as a entropy point, or being compromised due to TLS<1.2) are slim to non anyway.

Any arguments, please see @earthlng
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index be8a695..aa4a1a2 100644
--- a/user.js
+++ b/user.js
@@ -725,7 +725,7 @@ user_pref("security.ssl.require_safe_negotiation", true);
  * [1] http://kb.mozillazine.org/Security.tls.version.*
  * [2] https://www.ssl.com/how-to/turn-off-ssl-3-0-and-tls-1-0-in-your-browser/
  * [2] archived: https://archive.is/hY2Mm ***/
-user_pref("security.tls.version.min", 3);
+   // user_pref("security.tls.version.min", 3);
 user_pref("security.tls.version.max", 4); // 4 = allow up to and including TLS 1.3
 /* 1203: disable SSL session tracking (FF36+)
  * SSL Session IDs speed up HTTPS connections (no need to renegotiate) and last for 48hrs.

From b85e748b532086a28fc69524223bde1e1e6e8c76 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 13 Nov 2018 18:56:51 +0000
Subject: [PATCH 0110/1147] 2204: FS API=>inactive, #533

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index aa4a1a2..db6145f 100644
--- a/user.js
+++ b/user.js
@@ -1075,11 +1075,11 @@ user_pref("dom.disable_window_move_resize", true);
  * [1] https://trac.torproject.org/projects/tor/ticket/9881 ***/
 user_pref("browser.link.open_newwindow", 3);
 user_pref("browser.link.open_newwindow.restriction", 0);
-/* 2204: disable Fullscreen API to prevent screen-resolution leaks [SETUP]
+/* 2204: disable Fullscreen API (requires user interaction) to prevent screen-resolution leaks
  * [NOTE] You can still manually toggle the browser's fullscreen state (F11),
  * but this pref will disable embedded video/game fullscreen controls, e.g. youtube
  * [TEST] https://developer.mozilla.org/samples/domref/fullscreen.html ***/
-user_pref("full-screen-api.enabled", false);
+   // user_pref("full-screen-api.enabled", false);
 /* 2210: block popup windows
  * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
 user_pref("dom.disable_open_during_load", true);

From 4e42bad6a13ba8a840a61e5807ea0d3ddd162690 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 14 Nov 2018 17:12:03 +0000
Subject: [PATCH 0111/1147] 0201: default geo=> inactive, #533

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index db6145f..282fea8 100644
--- a/user.js
+++ b/user.js
@@ -85,7 +85,7 @@ user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely decease
 /* 0201b: set a default permission for Location (FF58+)
  * [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
-user_pref("permissions.default.geo", 2); // 0=always ask (default), 1=allow, 2=block
+   // user_pref("permissions.default.geo", 2); // 0=always ask (default), 1=allow, 2=block
 /* 0202: disable GeoIP-based search results
  * [NOTE] May not be hidden if Firefox has changed your settings due to your locale
  * [1] https://trac.torproject.org/projects/tor/ticket/16254

From 7351e561c429adbbb94f2130a77b0a153bff8d8f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 15 Nov 2018 07:06:34 +0000
Subject: [PATCH 0112/1147] 1243: mixed OBJECT_SUBREQUESTS

---
 user.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/user.js b/user.js
index 282fea8..8415596 100644
--- a/user.js
+++ b/user.js
@@ -793,6 +793,9 @@ user_pref("security.cert_pinning.enforcement_level", 2);
 user_pref("security.mixed_content.block_active_content", true); // default: true
 /* 1241: disable insecure passive content (such as images) on https pages - mixed context ***/
 user_pref("security.mixed_content.block_display_content", true);
+/* 1243: block unencrypted requests from Flash on encrypted pages to mitigate MitM attacks (FF59+)
+ * [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1190623 ***/
+user_pref("security.mixed_content.block_object_subrequest", true);
 
 /** CIPHERS [see the section 1200 intro] ***/
 /* 1260: disable or limit SHA-1

From acbf881b1f7cede2a903f226bdaa7f636ce688d3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 15 Nov 2018 15:47:21 +0000
Subject: [PATCH 0113/1147] saving the world bytes at a time

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 8415596..a3ac3c2 100644
--- a/user.js
+++ b/user.js
@@ -794,7 +794,7 @@ user_pref("security.mixed_content.block_active_content", true); // default: true
 /* 1241: disable insecure passive content (such as images) on https pages - mixed context ***/
 user_pref("security.mixed_content.block_display_content", true);
 /* 1243: block unencrypted requests from Flash on encrypted pages to mitigate MitM attacks (FF59+)
- * [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1190623 ***/
+ * [1] https://bugzilla.mozilla.org/1190623 ***/
 user_pref("security.mixed_content.block_object_subrequest", true);
 
 /** CIPHERS [see the section 1200 intro] ***/

From c12eb0fdc6ccd898298ee7094aca5a05fc4d3b42 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 18 Nov 2018 12:56:51 +0000
Subject: [PATCH 0114/1147] 0201b+2305 Permissions API info

---
 user.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/user.js b/user.js
index a3ac3c2..1dd6ef0 100644
--- a/user.js
+++ b/user.js
@@ -83,6 +83,7 @@ user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely decease
  * [1] https://www.mozilla.org/firefox/geolocation/ ***/
    // user_pref("geo.enabled", false);
 /* 0201b: set a default permission for Location (FF58+)
+ * [NOTE] best left at default "always ask", fingerpintable via Permissions API
  * [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
    // user_pref("permissions.default.geo", 2); // 0=always ask (default), 1=allow, 2=block
@@ -1123,6 +1124,7 @@ user_pref("dom.serviceWorkers.enabled", false);
 user_pref("dom.webnotifications.enabled", false); // (FF22+)
 user_pref("dom.webnotifications.serviceworker.enabled", false); // (FF44+)
 /* 2305: set a default permission for Notifications (see 2304) (FF58+)
+ * [NOTE] best left at default "always ask", fingerpintable via Permissions API
  * [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Notifications>Settings ***/
    // user_pref("permissions.default.desktop-notification", 2); // 0=always ask (default), 1=allow, 2=block

From 13550d18a1a4e6fe350096e6aa61875e41f6209b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 19 Nov 2018 12:56:12 +1300
Subject: [PATCH 0115/1147] update [SETTING] info (#538)

---
 user.js | 29 ++++++++++++++---------------
 1 file changed, 14 insertions(+), 15 deletions(-)

diff --git a/user.js b/user.js
index 1dd6ef0..1c659f0 100644
--- a/user.js
+++ b/user.js
@@ -65,7 +65,7 @@ user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
  * [SETTING] General>Startup>Always check if Firefox is your default browser ***/
 user_pref("browser.shell.checkDefaultBrowser", false);
 /* 0102: set START page (0=blank, 1=home, 2=last visited page, 3=resume previous session)
- * [SETTING] General>Startup>When Firefox starts ***/
+ * [SETTING] General>Startup>Restore previous session ***/
 user_pref("browser.startup.page", 0);
 /* 0103: set HOME+NEWWINDOW page
  * about:home=Activity Stream (default, see 0514), custom URL, about:blank
@@ -142,7 +142,7 @@ user_pref("extensions.getAddons.cache.enabled", false);
 /* 0307: disable auto updating of personas (themes) ***/
 user_pref("lightweightThemes.update.enabled", false);
 /* 0308: disable search update
- * [SETTING] General>Firefox Update>Automatically update search engines ***/
+ * [SETTING] General>Firefox Updates>Automatically update search engines ***/
 user_pref("browser.search.update", false);
 /* 0309: disable sending Flash crash reports ***/
 user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
@@ -180,8 +180,7 @@ user_pref("datareporting.healthreport.uploadEnabled", false);
 user_pref("datareporting.policy.dataSubmissionEnabled", false);
 /* 0350: disable crash reports ***/
 user_pref("breakpad.reportURL", "");
-/* 0351: disable sending of crash reports (FF44+)
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send crash reports ***/
+/* 0351: disable sending of crash reports (FF44+) ***/
 user_pref("browser.tabs.crashReporting.sendReport", false);
 user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // (FF51+)
 user_pref("browser.crashReports.unsubmittedCheck.autoSubmit", false); // (FF51-57)
@@ -280,7 +279,7 @@ user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
    // user_pref("privacy.trackingprotection.enabled", true);
 /* 0422: set which Tracking Protection block list to use
  * [WARNING] We don't recommend enforcing this from here, as available block lists can change
- * [SETTING] Privacy & Security>Tracking Protection>Change Block List ***/
+ * [SETTING] Privacy & Security>Content Blocking>All Detected Trackers>Change block list ***/
    // user_pref("urlclassifier.trackingTable", "test-track-simple,base-track-digest256"); // basic
 /* 0423: disable Mozilla's blocklist for known Flash tracking/fingerprinting (FF48+)
  * [1] https://www.ghacks.net/2016/07/18/firefox-48-blocklist-against-plugin-fingerprinting/
@@ -374,7 +373,7 @@ user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
  * [3] https://bugzilla.mozilla.org/863246#c154 ***/
 user_pref("browser.onboarding.enabled", false);
 /* 0517: disable Form Autofill (FF55+)
- * [SETTING] Privacy & Security>Forms & Passwords>Enable Profile Autofill
+ * [SETTING] Privacy & Security>Forms & Passwords>Autofill addresses
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
  * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill
@@ -564,7 +563,7 @@ user_pref("browser.urlbar.maxHistoricalSearchSuggestions", 0); // max. number of
  * [NOTE] You can clear formdata on exiting Firefox (see 2803) ***/
 user_pref("browser.formfill.enable", false);
 /* 0862: disable browsing and download history
- * [SETTING] Privacy & Security>History>Custom Settings>Remember my browsing and download history
+ * [SETTING] Privacy & Security>History>Custom Settings>Remember browsing and download history
  * [NOTE] You can clear history and downloads on exiting Firefox (see 2803) ***/
    // user_pref("places.history.enabled", false);
 /* 0864: disable date/time picker (FF57+ default true)
@@ -582,7 +581,7 @@ user_pref("browser.taskbar.previews.enable", false);
 /*** 0900: PASSWORDS ***/
 user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
 /* 0901: disable saving passwords
- * [SETTING] Privacy & Security>Forms & Passwords>Remember logins and passwords for sites
+ * [SETTING] Privacy & Security>Forms & Passwords>Ask to save logins and passwords for sites
  * [NOTE] This does not clear any passwords already saved ***/
    // user_pref("signon.rememberSignons", false);
 /* 0902: use a master password (recommended if you save passwords)
@@ -851,7 +850,7 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 /* 1401: disable websites choosing fonts (0=block, 1=allow)
  * If you disallow fonts, this drastically limits/reduces font
  * enumeration (by JS) which is a high entropy fingerprinting vector.
- * [SETTING] General>Language and Appearance>Advanced>Allow pages to choose...
+ * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Allow pages to choose...
  * [SETUP] Disabling fonts can uglify the web a fair bit. ***/
 user_pref("browser.display.use_document_fonts", 0);
 /* 1402: set more legible default fonts [SETUP]
@@ -937,7 +936,7 @@ user_pref("network.http.referer.defaultPolicy.pbmode", 2); // (FF59+) default: 2
  * [1] https://bugzilla.mozilla.org/1305144 ***/
 user_pref("network.http.referer.hideOnionSource", true);
 /* 1610: ALL: enable the DNT (Do Not Track) HTTP header
- * [SETTING] Privacy & Security>Tracking Protecting>Send websites a "Do Not Track"...
+ * [SETTING] Privacy & Security>Content Blocking>Send websites a "Do Not Track"...
  * [NOTE] DNT is enforced with TP (see 0420) regardless of this pref ***/
 user_pref("privacy.donottrackheader.enabled", true);
 
@@ -951,7 +950,7 @@ user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
  * [1] https://bugzilla.mozilla.org/1279029 ***/
    // user_pref("privacy.userContext.ui.enabled", true);
 /* 1702: enable Container Tabs (FF50+)
- * [SETTING] Privacy & Security>Tabs>Enable Container Tabs ***/
+ * [SETTING] General>Tabs>Enable Container Tabs ***/
    // user_pref("privacy.userContext.enabled", true);
 /* 1703: enable a private container for thumbnail loads (FF51+) ***/
    // user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // default: true in FF61+
@@ -1372,7 +1371,7 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * 0=Accept cookies and site data, 1=Block third-party cookies, 2=Block all cookies,
  * 3=Block cookies from unvisited sites, 4=Block third-party trackers (FF63+)
  * [NOTE] value 4 is tied to the Tracking Protection lists so make sure you have 0424 + 0425 on default values!
- * [SETTING] Privacy & Security>History>Custom Settings>Accept cookies from sites
+ * [SETTING] Privacy & Security>Cookies and Site Data>Type blocked
  * [NOTE] Blocking 3rd party controls 3rd party access to localStorage, IndexedDB, Cache API and Service Worker Cache.
  * Blocking 1st party controls access to localStorage and IndexedDB (note: Service Workers can still use IndexedDB).
  * [1] https://www.fxsitecompat.com/en-CA/docs/2015/web-storage-indexeddb-cache-api-now-obey-third-party-cookies-preference/ ***/
@@ -1388,7 +1387,7 @@ user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // (FF58+)
 /* 2703: set cookie lifetime policy
  * 0=until they expire (default), 2=until you close Firefox
  * [NOTE] 3=for n days : no longer supported in FF63+ (see 2704-deprecated)
- * [SETTING] Privacy & Security>History>Custom Settings>Accept cookies from sites>Keep until ***/
+ * [SETTING] Privacy & Security>Cookies and Site Data>Keep until... ***/
    // user_pref("network.cookie.lifetimePolicy", 0);
 /* 2705: disable HTTP sites setting cookies with the "secure" directive (FF52+)
  * [1] https://developer.mozilla.org/Firefox/Releases/52#HTTP ***/
@@ -1440,10 +1439,10 @@ user_pref("dom.caches.enabled", false);
 ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
 /* 2802: enable Firefox to clear history items on shutdown
- * [SETTING] Privacy & Security>History>Clear history when Firefox closes ***/
+ * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
 /* 2803: set what history items to clear on shutdown
- * [SETTING] Privacy & Security>History>Clear history when Firefox closes>Settings
+ * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes>Settings
  * [NOTE] If 'history' is true, downloads will also be cleared regardless of the value
  * but if 'history' is false, downloads can still be cleared independently
  * However, this may not always be the case. The interface combines and syncs these

From 299a03663fb70673d017f82058e4ba97910f6d54 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 19 Nov 2018 00:12:07 +0000
Subject: [PATCH 0116/1147] 0351: move *autoSubmit to deprecated

https://github.com/ghacksuserjs/ghacks-user.js/issues/302#issuecomment-359245047
---
 user.js | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 1c659f0..7486c0e 100644
--- a/user.js
+++ b/user.js
@@ -183,7 +183,6 @@ user_pref("breakpad.reportURL", "");
 /* 0351: disable sending of crash reports (FF44+) ***/
 user_pref("browser.tabs.crashReporting.sendReport", false);
 user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // (FF51+)
-user_pref("browser.crashReports.unsubmittedCheck.autoSubmit", false); // (FF51-57)
 user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // (FF58+)
 /* 0370: disable "Snippets" (Mozilla content shown on about:home screen)
  * [1] https://wiki.mozilla.org/Firefox/Projects/Firefox_Start/Snippet_Service ***/
@@ -2039,6 +2038,11 @@ user_pref("browser.casting.enabled", false);
    // [-] https://bugzilla.mozilla.org/1401238
 user_pref("browser.bookmarks.showRecentlyBookmarked", false);
 // ***/
+/* FF58
+// 0351: disable sending of crash reports - replaced by *.autoSubmit2
+   // [-] https://bugzilla.mozilla.org/1424373
+user_pref("browser.crashReports.unsubmittedCheck.autoSubmit", false); // (FF51-57)
+// ***/
 /* FF59
 // 0203: disable using OS locale, force APP locale - replaced by intl.locale.requested
    // [-] https://bugzilla.mozilla.org/1414390

From 36b90cd5e6bc71a2c214da81060c4d8e2673f69d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 19 Nov 2018 00:34:56 +0000
Subject: [PATCH 0117/1147] 1830: remove hiding the DRM UI

out of interest, it no longer requires a restart
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 7486c0e..d2e3fb7 100644
--- a/user.js
+++ b/user.js
@@ -992,9 +992,9 @@ user_pref("media.gmp-widevinecdm.visible", false);
 user_pref("media.gmp-widevinecdm.enabled", false);
 user_pref("media.gmp-widevinecdm.autoupdate", false);
 /* 1830: disable all DRM content (EME: Encryption Media Extension) [SETUP]
+ * [SETTING] General>DRM Content>Play DRM-controlled content
  * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
-user_pref("media.eme.enabled", false); // [SETTING] General>DRM Content>Play DRM-controlled content
-user_pref("browser.eme.ui.enabled", false); // hides "Play DRM-controlled content" checkbox [RESTART]
+user_pref("media.eme.enabled", false);
 /* 1840: disable the OpenH264 Video Codec by Cisco to "Never Activate"
  * This is the bundled codec used for video chat in WebRTC ***/
 user_pref("media.gmp-gmpopenh264.enabled", false); // (hidden pref)

From b5c5d8e9d17e6f871bbfe63a36c37f6e84e9b955 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 19 Nov 2018 00:37:42 +0000
Subject: [PATCH 0118/1147] removed browser.eme.ui.enabled

---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 6f3dd47..1ad4ae9 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 30-Sept-2018
+ Last updated: 18-Mov-2018
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -106,6 +106,8 @@
     'extensions.webextensions.keepStorageOnUninstall',
     'extensions.webextensions.keepUuidOnUninstall',
     'privacy.trackingprotection.ui.enabled',
+    /* 64-beta */
+    'browser.eme.ui.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 643cba63cf810bc6563b5afc4e5ab2c79a7fdc11 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 19 Nov 2018 03:00:40 +0000
Subject: [PATCH 0119/1147] Activity Stream is no longer a System Add-on

---
 user.js | 43 +++++++++++++++++++------------------------
 1 file changed, 19 insertions(+), 24 deletions(-)

diff --git a/user.js b/user.js
index d2e3fb7..9af11c0 100644
--- a/user.js
+++ b/user.js
@@ -68,14 +68,31 @@ user_pref("browser.shell.checkDefaultBrowser", false);
  * [SETTING] General>Startup>Restore previous session ***/
 user_pref("browser.startup.page", 0);
 /* 0103: set HOME+NEWWINDOW page
- * about:home=Activity Stream (default, see 0514), custom URL, about:blank
+ * about:home=Activity Stream (default, see 0105), custom URL, about:blank
  * [SETTING] Home>New Windows and Tabs>Homepage and new windows ***/
 user_pref("browser.startup.homepage", "about:blank");
 /* 0104: set NEWTAB page
- * true=Activity Stream (default, see 0514), false=blank page
+ * true=Activity Stream (default, see 0105), false=blank page
  * [SETTING] Home>New Windows and Tabs>New tabs ***/
 user_pref("browser.newtabpage.enabled", false);
 user_pref("browser.newtab.preload", false);
+/* 0105: disable Activity Stream stuff (AS)
+ * AS is the default homepage/newtab in FF57+, based on metadata and browsing behavior.
+ *    **NOT LISTING ALL OF THESE: USE THE PREFERENCES UI**
+ * [SETTING] Home>Firefox Home Content>...  to show/hide what you want ***/
+/* 0105a: disable Activity Stream telemetry ***/
+user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
+user_pref("browser.newtabpage.activity-stream.telemetry", false);
+user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
+/* 0105b: disable AS Snippets ***/
+user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
+user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // [SETTING]
+/* 0105c: disable AS Top Stories, Pocket-based and/or sponsored content ***/
+user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
+user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false); // [SETTING]
+user_pref("browser.newtabpage.activity-stream.showSponsored", false);
+/* 0105d: disable AS recent Highlights in the Library (FF57+) ***/
+   // user_pref("browser.library.activity-stream.enabled", false);
 
 /*** 0200: GEOLOCATION ***/
 user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");
@@ -335,28 +352,6 @@ user_pref("browser.ping-centre.telemetry", false);
  * [1] https://en.wikipedia.org/wiki/Pocket_(application)
  * [2] https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/ ***/
 user_pref("extensions.pocket.enabled", false);
-/* 0514: disable Activity Stream (FF54+)
- * Activity Stream is the default homepage/newtab in FF57+. It is based on metadata and browsing behavior,
- * and includes telemetry and web content such as snippets, top stories (pocket), top sites, etc.
- *  - ONE: make sure to set your "home" and "newtab" to about:blank (or use an extension to control them)
- *  - TWO: DELETE the XPI file in your System Add-ons directory (note this get reinstalled on app updates)
- * And/or you can try to control the ever-growing, ever-changing "browser.newtabpage.activity-stream.*" prefs
- * [FF63+] Activity Stream (AS) is now builtin and no longer an easily deletable system addon!
- *     We'll clean this up and move to a new number when ESR67 is released.
- * [1] https://wiki.mozilla.org/Firefox/Activity_Stream
- * [2] https://www.ghacks.net/2016/02/15/firefox-mockups-show-activity-stream-new-tab-page-and-share-updates/ ***/
-user_pref("browser.library.activity-stream.enabled", false); // (FF57+)
-/* 0514a: disable AS Snippets ***/
-user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
-user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // [SETTING] Home>Firefox Home Content>Snippets
-/* 0514b: disable AS Top Stories and other Pocket-based and/or sponsored content ***/
-user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
-user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false); // [SETTING] Home>Firefox Home Content>Highlights>Pages Saved to Pocket
-user_pref("browser.newtabpage.activity-stream.showSponsored", false);
-/* 0514c: disable AS telemetry ***/
-user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
-user_pref("browser.newtabpage.activity-stream.telemetry", false);
-user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
 /* 0515: disable Screenshots (FF55+)
  * alternatively in FF60+, disable uploading to the Screenshots server
  * [1] https://github.com/mozilla-services/screenshots

From 106f46d053496cc0eeaa802f49626ecbd5f62d78 Mon Sep 17 00:00:00 2001
From: Pat Johnson <patjohns1216@gmail.com>
Date: Mon, 19 Nov 2018 10:34:14 -0700
Subject: [PATCH 0120/1147] updater.sh restructuring/re-write (#541)

* Uses `perl` as a last resort if `curl` and `wget`  are not available (fixes #537)
* Aborts and notifies user if none of the above are installed
* Better use of functions
* When version numbers are checked, the contents are immediately saved to a temp dir.  This allows us to skip using wget/curl/perl a second time
* Improved messages for users
* Added various font colors for ease of use and aesthetics
---
 updater.sh | 278 ++++++++++++++++++++++++++++++++++-------------------
 1 file changed, 177 insertions(+), 101 deletions(-)

diff --git a/updater.sh b/updater.sh
index 6e69bbd..d7c1b38 100755
--- a/updater.sh
+++ b/updater.sh
@@ -1,129 +1,205 @@
 #!/usr/bin/env bash
 
-### ghacks-user.js updater for Mac/Linux
-## author: @overdodactyl, @ema-pe
-## version: 1.4
+## ghacks-user.js updater for macOS and Linux
+
+## version: 1.5
+## Author: Pat Johnson (@overdodactyl)
+## Additional contributors: @earthlng, @ema-pe
 
 ## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in check_for_update() )
 
-ghacksjs="https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js"
-updater="https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.sh"
+#########################
+#    Base variables     #
+#########################
 update_pref=${1:--ask}
+RED='\033[0;31m'
+BLUE='\033[0;34m'
+BBLUE='\033[1;34m' 
+GREEN='\033[0;32m'
+ORANGE='\033[0;33m'
+CYAN='\033[0;36m'  
+NC='\033[0m' # No Color
 
+
+#########################
+#   Working directory   #
+#########################
+
+# get current directory
 currdir=$(pwd)
-
-DOWNLOAD_TO_STDOUT="curl -s"
-DOWNLOAD_TO_FILE="curl -O"
-
-# Use wget if curl is not available.
-if [[ -z $(command -v "curl") ]]; then
-  DOWNLOAD_TO_STDOUT="wget --quiet --output-document=-"
-  DOWNLOAD_TO_FILE="wget"
-fi
-
 ## get the full path of this script (readlink for Linux, greadlink for Mac with coreutils installed)
 sfp=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
-
 ## fallback for Macs without coreutils
 if [ -z "$sfp" ]; then sfp=${BASH_SOURCE[0]}; fi
+## store the Firefox profile directory
+ff_profile="$(dirname "${sfp}")"
 
-## change directory to the Firefox profile directory
-cd "$(dirname "${sfp}")"
 
-## Used to check if a new version of updater.sh is available
-update_available="no"
-check_for_update () {
-  online_version="$($DOWNLOAD_TO_STDOUT ${updater} | sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p')"
-  path_to_script="$(dirname "${sfp}")/updater.sh"
-  current_version="$(sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p' "$path_to_script")"
-  if [[ "$current_version" < "$online_version" ]]; then
-    update_available="yes"
+#########################
+#     File Handeling    #
+#########################
+
+# Download method priority: curl -> wget -> pearl
+DOWNLOAD_METHOD="not_pearl"
+if [[ $(command -v "curl") ]] > /dev/null 2>&1; then
+  DOWNLOAD_TO_FILE="curl -O"  
+elif [[ $(command -v "wget") ]] > /dev/null 2>&1; then
+  DOWNLOAD_TO_FILE="wget"
+elif [[ $(command -v "perl") ]]; then
+  DOWNLOAD_METHOD="perl"
+else
+  echo -e ${RED}"This script requires curl, wget or perl to be installed.\nProcess aborted"${NC}
+  exit 0
+fi
+
+# Download files
+download_file () {
+  mkdir -p userjs_temps
+  cd userjs_temps
+  url=$1
+
+  if [ $DOWNLOAD_METHOD = "not_pearl" ]; then
+    $DOWNLOAD_TO_FILE ${url}
+  else
+    http_url=${url/https/http}
+    # Variables from the shell are available in Perl's %ENV hash
+    # Need to export shell variable so it is visible to subprocesses
+    export http_url
+
+    perl -e '
+            use File::Fetch;
+            my $ff = File::Fetch->new(uri => $ENV{http_url});
+            my $where = $ff->fetch() or die $ff->error;
+            my $where = $ff->fetch( to => "." );
+            '
+  fi
+
+  cd ..
+}
+
+# Backup a file into userjs_backups
+# Replace current version of a file with new one in userjs_temps
+backup_file () {
+  filename=$1
+  mkdir -p userjs_backups
+  mv $filename "userjs_backups/${filename}.backup.$(date +"%Y-%m-%d_%H%M")"
+  mv "userjs_temps/${filename}" $filename
+  echo -e "Status: ${GREEN}${filename} has been backed up and replaced with the latest version!${NC}"
+}
+
+#########################
+#      Initiation       #
+#########################
+
+initiate () {
+  echo -e
+  echo -e
+  echo -e        ${BBLUE}"  ############################################################################"
+  echo -e                "  ####                                                                    ####"
+  echo -e 				 "  ####                           ghacks user.js                           ####"
+  echo -e                "  ####       Hardening the Privacy and Security Settings of Firefox       ####"
+  echo -e                "  ####           Maintained by @Thorin-Oakenpants and @earthlng           ####"                            ####"
+  echo -e                "  ####            Updater for macOS and Linux by @overdodactyl            ####"            									 ####"
+  echo -e                "  ####                                                                    ####"
+  echo -e                "  ############################################################################"${NC}
+  echo -e
+  echo -e
+  echo -e "Documentation for this script is available here: ${CYAN}https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts${NC}\n"
+}
+
+confirmation () {
+  download_file "https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js" &>/dev/null
+  echo -e "Please observe the following information:"
+  echo -e "\tFirefox profile:  ${ORANGE}$(pwd)${NC}"
+  echo -e "\tAvailable online: ${ORANGE}$(get_userjs_version userjs_temps/user.js)${NC}"
+  echo -e "\tCurrently using:  ${ORANGE}$(get_userjs_version user.js)\n${NC}\n"
+
+  echo -e "This script will update to the latest user.js file and append any custom configurations from user-overrides.js. ${RED}Continue Y/N? ${NC}"
+  read -p "" -n 1 -r
+  echo -e "\n"
+
+  if [[ $REPLY =~ ^[Nn]$ ]]; then
+    echo -e ${RED}"Process aborted"${NC}
+    return 1
   fi
 }
 
-## Used to backup the current script, and download and execute the latest version of updater.sh
-update_script () {
-  echo -e "This script will be backed up and the latest version of updater.sh will be executed.\n"
-  mv updater.sh "updater.sh.backup.$(date +"%Y-%m-%d_%H%M")"
-  $DOWNLOAD_TO_FILE ${updater} && echo -e "\nThe latest updater script has been downloaded\n"
 
-  # make new file executable
+#########################
+#   Update updater.sh   #
+#########################
+
+# Returns the version number of a updater.sh file
+get_updater_version () {
+  filename=$1
+  version_regex='5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p'
+  echo "$(sed -n "$version_regex" "${ff_profile}/${filename}")"
+}
+
+# Update updater.sh
+# Default: Check for update, if available, ask user if they want to execute it
+# Args:
+#   -donotupdate: New version will not be looked for and update will not occur
+#   -update: Check for update, if available, execute without asking
+update_updater () {
+  update_pref="$(echo $update_pref | tr '[A-Z]' '[a-z]')"
+  if [ $update_pref = "-donotupdate" ]; then
+    # User signified not to check for updates
+    return 0
+  fi
+
+  download_file "https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.sh" &>/dev/null
+
+  if [[ $(get_updater_version updater.sh) < $(get_updater_version userjs_temps/updater.sh) ]]; then
+    if [ $update_pref != "-update" ]; then
+      echo -e "There is a newer version of updater.sh available. ${RED}Download and execute Y/N?${NC}"
+      read -p "" -n 1 -r
+      echo -e "\n\n"
+      if [[ $REPLY =~ ^[Nn]$ ]]; then
+        # Update available, but user chooses not to update
+        return 0
+      fi
+    fi
+  else
+    # No update available
+    return 0
+  fi
+  # Backup current updater, execute latest version
+  backup_file updater.sh
   chmod +x updater.sh
-
-  # execute new updater script
   ./updater.sh -donotupdate
-
-  # exit script
   exit 1
 }
 
 
-main () {
-  ## create backup folder if it doesn't exist
-  mkdir -p userjs_backups;
+#########################
+#    Update user.js     #
+#########################
 
-  echo -e "\nThis script should be run from your Firefox profile directory.\n"
-
-  echo -e "Updating the user.js for Firefox profile:\n$(pwd)\n"
-
-  if [ -e user.js ]; then
-    echo "Your current user.js file for this profile will be backed up and the latest ghacks version from github will take its place."
-    echo -e "\nIf currently using the ghacks user.js, please compare versions:"
-    echo "  Available online: $($DOWNLOAD_TO_STDOUT ${ghacksjs} | sed -n '4p')"
-    echo "  Currently using:  $(sed -n '4p' user.js)"
-  else
-    echo "A user.js file does not exist in this profile. If you continue, the latest ghacks version from github will be downloaded."
-  fi
-
-  echo -e "\nIf a user-overrides.js file exists in this profile, it will be appended to the user.js.\n"
-
-  read -p "Continue Y/N? " -n 1 -r
-  echo -e "\n\n"
-
-  if [[ $REPLY =~ ^[Yy]$ ]]; then
-    if [ -e user.js ]; then
-      # backup current user.js
-      bakfile="userjs_backups/user.js.backup.$(date +"%Y-%m-%d_%H%M")"
-      mv user.js "${bakfile}" && echo "Your previous user.js file was backed up: ${bakfile}"
-    fi
-
-    # download latest ghacks user.js
-    echo "downloading latest ghacks user.js file"
-    $DOWNLOAD_TO_FILE ${ghacksjs} && echo "ghacks user.js has been downloaded"
-
-    if [ -e user-overrides.js ]; then
-      echo "user-overrides.js file found"
-      cat user-overrides.js >> user.js && echo "user-overrides.js has been appended to user.js"
-    fi
-  else
-    echo "Process aborted"
-  fi
-
-  ## change directory back to the original working directory
-  cd "${currdir}"
+# Returns version number of a user.js file
+get_userjs_version () {
+  filename=$1
+  echo "$(sed -n "4p" "${ff_profile}/${filename}")"
 }
 
-
-update_pref="$(echo $update_pref | tr '[A-Z]' '[a-z]')"
-if [ $update_pref = "-donotupdate" ]; then
-  main
-else
-  check_for_update
-  if [ $update_available = "no" ]; then
-    main
-  else
-    ## there is an update available 
-    if [ $update_pref = "-update" ]; then
-      ## update without asking
-      update_script
-    else 
-      read -p "There is a newer version of updater.sh available.  Download and execute?  Y/N? " -n 1 -r
-      echo -e "\n\n"
-      if [[ $REPLY =~ ^[Yy]$ ]]; then
-        update_script
-      else
-        main
-      fi
-    fi
+# Applies latest version of user.js and any custom overrides
+update_userjs () {
+  backup_file user.js
+  if [ -e user-overrides.js ]; then
+    cat user-overrides.js >> user.js
+    echo -e "Status: ${GREEN}Your user-overrides.js customizations have been applied!${NC}"
   fi
-fi
+}
+
+#########################
+#        Execute        #
+#########################
+
+## change directory to the Firefox profile directory
+cd "$ff_profile"
+
+initiate
+update_updater
+confirmation && update_userjs
+rm -rf userjs_temps
+cd "${currdir}"

From 661a314e2821e71fa2e2a73ff13aad449c3b0d45 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 20 Nov 2018 17:36:04 +0000
Subject: [PATCH 0121/1147] RFP: pointerEvent.pointerid

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 9af11c0..103c385 100644
--- a/user.js
+++ b/user.js
@@ -1566,7 +1566,8 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // default
       FF60: Fix keydown/keyup events (1438795)
  ** 1337157 - disable WebGL debug renderer info (see 4613) (FF60+)
  ** 1459089 - disable OS locale in HTTP Accept-Language headers [ANDROID] (FF62+)
- ** 1363508 - spoof/suppress Pointer Events (FF64+)
+ ** 1363508 - spoof/suppress Pointer Events (see 2516) (FF64+)
+      FF65: pointerEvent.pointerid (1492766)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting (FF41+)

From 0ff610c056c90724a65e33463e466fe8f9cab84b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 20 Nov 2018 18:14:23 +0000
Subject: [PATCH 0122/1147] there is no spoon

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 103c385..876babe 100644
--- a/user.js
+++ b/user.js
@@ -1548,7 +1548,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // default
  ** 1337161 - hide gamepads from content (see 4606) (FF56+)
  ** 1372072 - spoof network information API as "unknown" (see 4607) (FF56+)
  ** 1333641 - reduce fingerprinting in WebSpeech API (see 4608) (FF56+)
- ** 1372069 & 1403813 & 1441295 - block geolocation requests (same as denying a site permission) (see 0201, 0211) (FF56-62)
+ ** 1372069 & 1403813 & 1441295 - block geolocation requests (same as denying a site permission) (see 0201, 0201b) (FF56-62)
  ** 1369309 - spoof media statistics (see 4610) (FF57+)
  ** 1382499 - reduce screen co-ordinate fingerprinting in Touch API (see 4611) (FF57+)
  ** 1217290 & 1409677 - enable fingerprinting resistance for WebGL (see 2010-12) (FF57+)

From 2ae3a3e4e1a52ea05ebc9e7283ab2f613bff0667 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 21 Nov 2018 23:53:00 +0000
Subject: [PATCH 0123/1147] 1700s: enable containers, #438

AFAIK there's no technical reasons for containers to be disabled in FF63+
---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 876babe..741b47d 100644
--- a/user.js
+++ b/user.js
@@ -942,18 +942,18 @@ user_pref("privacy.donottrackheader.enabled", true);
 user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
 /* 1701: enable Container Tabs setting in preferences (see 1702) (FF50+)
  * [1] https://bugzilla.mozilla.org/1279029 ***/
-   // user_pref("privacy.userContext.ui.enabled", true);
+user_pref("privacy.userContext.ui.enabled", true);
 /* 1702: enable Container Tabs (FF50+)
  * [SETTING] General>Tabs>Enable Container Tabs ***/
-   // user_pref("privacy.userContext.enabled", true);
+user_pref("privacy.userContext.enabled", true);
 /* 1703: enable a private container for thumbnail loads (FF51+) ***/
-   // user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // default: true in FF61+
+user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // default: true in FF61+
 /* 1704: set long press behaviour on "+ Tab" button to display container menu (FF53+)
  * 0=disables long press, 1=when clicked, the menu is shown
  * 2=the menu is shown after X milliseconds
  * [NOTE] The menu does not contain a non-container tab option
  * [1] https://bugzilla.mozilla.org/1328756 ***/
-   // user_pref("privacy.userContext.longPressBehavior", 2);
+user_pref("privacy.userContext.longPressBehavior", 2);
 
 /*** 1800: PLUGINS ***/
 user_pref("_user.js.parrot", "1800 syntax error: the parrot's pushing up daisies!");

From b182946ae48d5a84f25d5b8ef2bfbe9eb2c004b9 Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Sat, 24 Nov 2018 05:19:24 +0000
Subject: [PATCH 0124/1147] Tor-related warnings (#551)

Also reworded some stuff.
---
 README.md | 8 ++++++--
 user.js   | 8 +++++---
 2 files changed, 11 insertions(+), 5 deletions(-)

diff --git a/README.md b/README.md
index 2b3454b..1e1b28c 100644
--- a/README.md
+++ b/README.md
@@ -6,6 +6,10 @@ The `ghacks user.js` is a **template** which aims to provide as much privacy and
 
 Everyone, experts included, should at least read the [implementation](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.3-Implementation) wiki page, as it contains important information regarding a few `ghacks user.js` settings.
 
+Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) if your [threat model](https://www.torproject.org/about/torusers.html.en) calls for it, or for accessing hidden services. 
+
+Also be aware that this `user.js` is made specifically for Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.
+
 Sitemap: [Releases](https://github.com/ghacksuserjs/ghacks-user.js/releases), [changelogs](https://github.com/ghacksuserjs/ghacks-user.js/issues?utf8=%E2%9C%93&q=is%3Aissue+label%3Achangelog), [Wiki](https://github.com/ghacksuserjs/ghacks-user.js/wiki), [stickies](https://github.com/ghacksuserjs/ghacks-user.js/issues?q=is%3Aissue+is%3Aopen+label%3A%22sticky+topic%22). [diffs](https://github.com/ghacksuserjs/ghacks-user.js/issues?q=is%3Aissue+label%3Adiffs)
 
 ### ![][b] acknowledgments
@@ -14,10 +18,10 @@ Literally thousands of sources, references and suggestions. That said...
 * Martin Brinkmann at [ghacks](https://www.ghacks.net/) <sup>1</sup>
 * The ghacks community and commentators
 * [12bytes](http://12bytes.org/tech/firefox/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs)
-   * The 12bytes article now uses this user.js and supplements it with an additonal JS hosted at [GitLab](https://gitlab.com/labwrat/Firefox-user.js/tree/master)
+   * The 12bytes article now uses this user.js and supplements it with an additional JS hosted at [GitLab](https://gitlab.com/labwrat/Firefox-user.js/tree/master)
 
 <sup>1</sup> The ghacks user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015 and was [first published](https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/) at ghacks in August 2015. With Martin Brinkmann's blessing, it will keep the ghacks name.
 
 ### ![][b] [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
 
-[b]: https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/wikipiki/bullet01.png
+[b]: /wikipiki/bullet01.png
diff --git a/user.js b/user.js
index 741b47d..c077d57 100644
--- a/user.js
+++ b/user.js
@@ -13,6 +13,8 @@
 
 * README:
 
+  0. Consider using Tor Browser if it meets your needs or fits your threat model better
+     * https://www.torproject.org/about/torusers.html.en
   1. READ the full README
      * https://github.com/ghacksuserjs/ghacks-user.js/blob/master/README.md
   2. READ this
@@ -441,7 +443,7 @@ user_pref("network.http.spdy.enabled.http2", false);
 user_pref("network.http.altsvc.enabled", false);
 user_pref("network.http.altsvc.oe", false);
 /* 0704: enforce the proxy server to do any DNS lookups when using SOCKS
- * e.g. in TOR, this stops your local DNS server from knowing your Tor destination
+ * e.g. in Tor, this stops your local DNS server from knowing your Tor destination
  * as a remote Tor node will handle the DNS request
  * [1] http://kb.mozillazine.org/Network.proxy.socks_remote_dns
  * [2] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
@@ -652,7 +654,7 @@ user_pref("browser.cache.disk_cache_ssl", false);
  * [NOTE] This means any permission changes are session only
  * [1] https://bugzilla.mozilla.org/967812 ***/
    // user_pref("permissions.memory_only", true); // (hidden pref)
-/* 1008: set DNS cache and expiration time (default 400 and 60, same as TBB) ***/
+/* 1008: set DNS cache and expiration time (default 400 and 60, same as Tor Browser) ***/
    // user_pref("network.dnsCacheEntries", 400);
    // user_pref("network.dnsCacheExpiration", 60);
 /** SESSIONS & SESSION RESTORE ***/
@@ -926,7 +928,7 @@ user_pref("network.http.referer.defaultPolicy", 3); // (FF59+) default: 3
 user_pref("network.http.referer.defaultPolicy.pbmode", 2); // (FF59+) default: 2
 /* 1607: TOR: hide (not spoof) referrer when leaving a .onion domain (FF54+)
  * [NOTE] Firefox cannot access .onion sites by default. We recommend you use
- * TBB (Tor Browser Bundle) which is specifically designed for the dark web
+ * the Tor Browser which is specifically designed for hidden services
  * [1] https://bugzilla.mozilla.org/1305144 ***/
 user_pref("network.http.referer.hideOnionSource", true);
 /* 1610: ALL: enable the DNT (Do Not Track) HTTP header

From 62351bfbf5b001ba89c814b1db5f3e38fbc6a7b7 Mon Sep 17 00:00:00 2001
From: Pat Johnson <patjohns1216@gmail.com>
Date: Sun, 25 Nov 2018 10:16:05 -0700
Subject: [PATCH 0125/1147] updater.sh v2.0 (#543)

* lots of new arguments

`usage: ./updater.sh [-h] [-p PROFILE] [-u] [-d] [-s] [-n] [-b] [-c] [-v] [-r] [-o OVERRIDE]`

Args can be written separately or together. Examples:

```txt
./updater.sh -sdc
./updater.sh -sd -o relaxed.js
./updater.sh -s -d
```

Deprecated arguments still work (for now!)
---
 updater.sh | 397 +++++++++++++++++++++++++++++++++++++++--------------
 1 file changed, 294 insertions(+), 103 deletions(-)

diff --git a/updater.sh b/updater.sh
index d7c1b38..1aba949 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,104 +2,169 @@
 
 ## ghacks-user.js updater for macOS and Linux
 
-## version: 1.5
+## version: 2.0
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe
 
-## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in check_for_update() )
+## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_updater() )
+
+readonly currdir=$(pwd)
+
+sfp=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
+if [ -z "$sfp" ]; then sfp=${BASH_SOURCE[0]}; fi
+readonly SCRIPT_DIR=$(dirname "${sfp}")
+
 
 #########################
 #    Base variables     #
 #########################
-update_pref=${1:--ask}
+
+# Colors used for printing
 RED='\033[0;31m'
 BLUE='\033[0;34m'
-BBLUE='\033[1;34m' 
+BBLUE='\033[1;34m'
 GREEN='\033[0;32m'
 ORANGE='\033[0;33m'
-CYAN='\033[0;36m'  
+CYAN='\033[0;36m'
 NC='\033[0m' # No Color
 
+# Argument defaults
+UPDATE="check"
+CONFIRM="yes"
+OVERRIDE="user-overrides.js"
+BACKUP="multiple"
+COMPARE=false
+SKIPOVERRIDE=false
+VIEW=false
+PROFILE_PATH=false
 
 #########################
 #   Working directory   #
 #########################
 
-# get current directory
-currdir=$(pwd)
-## get the full path of this script (readlink for Linux, greadlink for Mac with coreutils installed)
-sfp=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
-## fallback for Macs without coreutils
-if [ -z "$sfp" ]; then sfp=${BASH_SOURCE[0]}; fi
-## store the Firefox profile directory
-ff_profile="$(dirname "${sfp}")"
-
+set_wd () {
+  declare -r macdir=~/Library/Application\ Support/Firefox/Profiles/
+  declare -r nixdir=~/.mozilla/firefox/
+  local ff_profile
+  if [ "$PROFILE_PATH" = false ]; then
+    ff_profile="$SCRIPT_DIR"
+  elif [ "$PROFILE_PATH" = "list" ]; then
+    local firefox_dir=""
+    if [ -d "$macdir" ]; then
+      firefox_dir=$macdir
+    elif [ -d $nixdir ]; then
+      firefox_dir=$nixdir
+    else
+      echo -e ${RED}"Error: Sorry, -l is not supported for your OS"${NC}
+      exit 1
+    fi
+    if [ $(find "$firefox_dir" -maxdepth 1 -type d | wc -l) == "2" ]; then
+      ff_profile=$(ls -d "$firefox_dir"*)
+    else 
+      echo -e ${GREEN}"The following profiles were found:\n"${ORANGE}
+      ls -d "$firefox_dir"*
+      echo -e ${RED}"\nWhich profile would you like to update?"${NC}
+      read -p ""
+      echo -e ""
+      ff_profile=$REPLY
+    fi
+  else
+    ff_profile="$PROFILE_PATH"
+  fi
+  cd "$ff_profile"
+}
 
 #########################
-#     File Handeling    #
+#      Arguments       #
 #########################
 
-# Download method priority: curl -> wget -> pearl
-DOWNLOAD_METHOD="not_pearl"
-if [[ $(command -v "curl") ]] > /dev/null 2>&1; then
-  DOWNLOAD_TO_FILE="curl -O"  
-elif [[ $(command -v "wget") ]] > /dev/null 2>&1; then
-  DOWNLOAD_TO_FILE="wget"
-elif [[ $(command -v "perl") ]]; then
-  DOWNLOAD_METHOD="perl"
+usage() {
+  echo -e ${BLUE}"\nUsage: $0 [-h] [-p PROFILE] [-u] [-d] [-s] [-n] [-b] [-c] [-v] [-r] [-o OVERRIDE]\n"${NC} 1>&2  # Echo usage string to standard error
+  echo -e "Optional Arguments:"
+  echo -e "\t-h,\t\t Show this help message and exit."
+  echo -e "\t-p PROFILE,\t Path to your Firefox profile (if different than the dir of this script)"
+  echo -e "\t\t\t IMPORTANT: if the path include spaces, wrap the entire argument in quotes."
+  echo -e "\t-l, \t\t Choose your Firefox profile from a list"
+  echo -e "\t-u,\t\t Update updater.sh and execute silently.  Do not seek confirmation."
+  echo -e "\t-d,\t\t Do not look for updates to updater.sh."
+  echo -e "\t-s,\t\t Silently update user.js.  Do not seek confirmation."
+  echo -e "\t-b,\t\t Only keep one backup of each file."
+  echo -e "\t-c,\t\t Create a diff file comparing old and new user.js within userjs_diffs. "
+  echo -e "\t-o OVERRIDE,\t Filename or path to overrides file (if different than user-overrides.js)."
+  echo -e "\t\t\t If used with -p, paths should be relative to PROFILE or absolute paths"
+  echo -e "\t\t\t If given a directory, all files inside will be appended recursively."
+  echo -e "\t\t\t You can pass multiple files or directories by passing a comma separated list."
+  echo -e "\t\t\t\t Note: If a directory is given, only files inside ending in the extension .js are appended"
+  echo -e "\t\t\t\t IMPORTANT: do not add spaces between files/paths.  Ex: -o file1.js,file2.js,dir1"
+  echo -e "\t\t\t\t IMPORTANT: if any files/paths include spaces, wrap the entire argument in quotes."
+  echo -e "\t\t\t\t\t Ex: -o \"override folder\" "
+  echo -e "\t-n,\t\t Do not append any overrides, even if user-overrides.js exists."
+  echo -e "\t-v,\t\t Open the resulting user.js file."
+  echo -e "\t-r,\t\t Only download user.js to a temporary file and open it."
+  echo -e
+  echo -e "Deprecated Arguments (they still work for now):"
+  echo -e "\t-donotupdate,\t Use instead -d"
+  echo -e "\t-update,\t Use instead -u"
+  echo -e
+  exit 1
+}
+
+legacy_argument () {
+  echo -e ${ORANGE}"\nWarning: command line arguments have changed."
+  echo -e "$1 has been deprecated and may not work in the future.\n"
+  echo -e "Please view the new options using the -h argument."${NC}
+}
+
+#########################
+#     File Handling     #
+#########################
+
+# Download method priority: curl -> wget
+DOWNLOAD_METHOD=""
+if [[ $(command -v "curl") ]]; then
+  DOWNLOAD_METHOD="curl"
+elif [[ $(command -v "wget") ]]; then
+  DOWNLOAD_METHOD="wget"
 else
-  echo -e ${RED}"This script requires curl, wget or perl to be installed.\nProcess aborted"${NC}
+  echo -e ${RED}"This script requires curl or wget.\nProcess aborted"${NC}
   exit 0
 fi
 
 # Download files
 download_file () {
-  mkdir -p userjs_temps
-  cd userjs_temps
-  url=$1
+  declare -r url=$1
+  declare -r tf=$(mktemp)
+  local dlcmd=""
 
-  if [ $DOWNLOAD_METHOD = "not_pearl" ]; then
-    $DOWNLOAD_TO_FILE ${url}
+  if [ $DOWNLOAD_METHOD = "curl" ]; then
+    dlcmd="curl -o $tf"
   else
-    http_url=${url/https/http}
-    # Variables from the shell are available in Perl's %ENV hash
-    # Need to export shell variable so it is visible to subprocesses
-    export http_url
-
-    perl -e '
-            use File::Fetch;
-            my $ff = File::Fetch->new(uri => $ENV{http_url});
-            my $where = $ff->fetch() or die $ff->error;
-            my $where = $ff->fetch( to => "." );
-            '
+    dlcmd="wget -O $tf" 
   fi
 
-  cd ..
+  $dlcmd "${url}" &>/dev/null && echo "$tf" || echo "" # return the temp-filename (or empty string on error)
 }
 
-# Backup a file into userjs_backups
-# Replace current version of a file with new one in userjs_temps
-backup_file () {
-  filename=$1
-  mkdir -p userjs_backups
-  mv $filename "userjs_backups/${filename}.backup.$(date +"%Y-%m-%d_%H%M")"
-  mv "userjs_temps/${filename}" $filename
-  echo -e "Status: ${GREEN}${filename} has been backed up and replaced with the latest version!${NC}"
+open_file () { #expects one argument: file_path
+  if [ "$(uname)" == "Darwin" ]; then
+    open "$1"
+  elif [ "$(expr substr $(uname -s) 1 5)" == "Linux" ]; then
+    xdg-open "$1"
+  else
+    echo -e ${RED}"Error: Sorry, opening files is not supported for your OS."${NC}
+  fi
 }
 
-#########################
-#      Initiation       #
-#########################
 
-initiate () {
+show_banner () {
   echo -e
   echo -e
   echo -e        ${BBLUE}"  ############################################################################"
   echo -e                "  ####                                                                    ####"
-  echo -e 				 "  ####                           ghacks user.js                           ####"
+  echo -e                "  ####                           ghacks user.js                           ####"
   echo -e                "  ####       Hardening the Privacy and Security Settings of Firefox       ####"
-  echo -e                "  ####           Maintained by @Thorin-Oakenpants and @earthlng           ####"                            ####"
-  echo -e                "  ####            Updater for macOS and Linux by @overdodactyl            ####"            									 ####"
+  echo -e                "  ####           Maintained by @Thorin-Oakenpants and @earthlng           ####"
+  echo -e                "  ####            Updater for macOS and Linux by @overdodactyl            ####"
   echo -e                "  ####                                                                    ####"
   echo -e                "  ############################################################################"${NC}
   echo -e
@@ -107,23 +172,6 @@ initiate () {
   echo -e "Documentation for this script is available here: ${CYAN}https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts${NC}\n"
 }
 
-confirmation () {
-  download_file "https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js" &>/dev/null
-  echo -e "Please observe the following information:"
-  echo -e "\tFirefox profile:  ${ORANGE}$(pwd)${NC}"
-  echo -e "\tAvailable online: ${ORANGE}$(get_userjs_version userjs_temps/user.js)${NC}"
-  echo -e "\tCurrently using:  ${ORANGE}$(get_userjs_version user.js)\n${NC}\n"
-
-  echo -e "This script will update to the latest user.js file and append any custom configurations from user-overrides.js. ${RED}Continue Y/N? ${NC}"
-  read -p "" -n 1 -r
-  echo -e "\n"
-
-  if [[ $REPLY =~ ^[Nn]$ ]]; then
-    echo -e ${RED}"Process aborted"${NC}
-    return 1
-  fi
-}
-
 
 #########################
 #   Update updater.sh   #
@@ -131,9 +179,7 @@ confirmation () {
 
 # Returns the version number of a updater.sh file
 get_updater_version () {
-  filename=$1
-  version_regex='5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p'
-  echo "$(sed -n "$version_regex" "${ff_profile}/${filename}")"
+  echo $(sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p' "$1")
 }
 
 # Update updater.sh
@@ -142,32 +188,27 @@ get_updater_version () {
 #   -donotupdate: New version will not be looked for and update will not occur
 #   -update: Check for update, if available, execute without asking
 update_updater () {
-  update_pref="$(echo $update_pref | tr '[A-Z]' '[a-z]')"
-  if [ $update_pref = "-donotupdate" ]; then
-    # User signified not to check for updates
-    return 0
+  if [ $UPDATE = "no" ]; then
+    return 0 # User signified not to check for updates
   fi
 
-  download_file "https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.sh" &>/dev/null
+  declare -r tmpfile=$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.sh')
 
-  if [[ $(get_updater_version updater.sh) < $(get_updater_version userjs_temps/updater.sh) ]]; then
-    if [ $update_pref != "-update" ]; then
-      echo -e "There is a newer version of updater.sh available. ${RED}Download and execute Y/N?${NC}"
+  if [[ $(get_updater_version "${SCRIPT_DIR}/updater.sh") < $(get_updater_version "${tmpfile}") ]]; then
+    if [ $UPDATE = "check" ]; then
+      echo -e "There is a newer version of updater.sh available. ${RED}Update and execute Y/N?${NC}"
       read -p "" -n 1 -r
       echo -e "\n\n"
       if [[ $REPLY =~ ^[Nn]$ ]]; then
-        # Update available, but user chooses not to update
-        return 0
+        return 0 # Update available, but user chooses not to update
       fi
     fi
   else
-    # No update available
-    return 0
+    return 0 # No update available
   fi
-  # Backup current updater, execute latest version
-  backup_file updater.sh
-  chmod +x updater.sh
-  ./updater.sh -donotupdate
+  mv "${tmpfile}" "${SCRIPT_DIR}/updater.sh"
+  chmod u+x "${SCRIPT_DIR}/updater.sh"
+  "${SCRIPT_DIR}/updater.sh" "$@ -d"
   exit 1
 }
 
@@ -178,28 +219,178 @@ update_updater () {
 
 # Returns version number of a user.js file
 get_userjs_version () {
-  filename=$1
-  echo "$(sed -n "4p" "${ff_profile}/${filename}")"
+  echo "$(sed -n '4p' "$1")"
+}
+
+add_override () {
+  input=$1
+  if [ -f "$input" ]; then
+    echo "" >> user.js
+    cat "$input" >> user.js
+    echo -e "Status: ${GREEN}Override file appended:${NC} ${input}"
+  elif [ -d "$input" ]; then
+    FSAVEIFS=$IFS
+    IFS=$'\n\b' # Set IFS
+    FILES="${input}"/*.js
+    for f in $FILES
+    do
+      add_override "$f"
+    done
+    IFS=$SAVEIFS # restore $IFS
+  else
+    echo -e "${ORANGE}Warning: Could not find override file:${NC} ${input}"
+  fi
+}
+
+remove_comments () { # expects 2 arguments: from-file and to-file
+  sed -e 's/^[[:space:]]*\/\/.*$//' -e '/^\/\*/,/\*\//d' -e '/^[[:space:]]*$/d' -e 's/);[[:space:]]*\/\/.*/);/' "$1" > "$2"
 }
 
 # Applies latest version of user.js and any custom overrides
 update_userjs () {
-  backup_file user.js
-  if [ -e user-overrides.js ]; then
-    cat user-overrides.js >> user.js
-    echo -e "Status: ${GREEN}Your user-overrides.js customizations have been applied!${NC}"
+  declare -r newfile=$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js')
+
+  echo 'Please observe the following information:'
+  echo -e "\tFirefox profile:  ${ORANGE}$(pwd)${NC}"
+  echo -e "\tAvailable online: ${ORANGE}$(get_userjs_version $newfile)${NC}"
+  echo -e "\tCurrently using:  ${ORANGE}$(get_userjs_version user.js)\n${NC}\n"
+
+  if [ $CONFIRM = "yes" ]; then
+    echo -e "This script will update to the latest user.js file and append any custom configurations from user-overrides.js. ${RED}Continue Y/N? ${NC}"
+    read -p "" -n 1 -r
+    echo -e "\n"
+    if [[ $REPLY =~ ^[Nn]$ ]]; then
+      echo -e ${RED}"Process aborted"${NC}
+      rm $newfile
+      return 1
+    fi
   fi
+
+  # Copy a version of user.js to diffs folder for later comparison
+  if [ "$COMPARE" = true ]; then
+    mkdir -p userjs_diffs
+    cp user.js userjs_diffs/past_user.js
+  fi
+
+  # backup user.js
+  mkdir -p userjs_backups
+  local bakname="userjs_backups/user.js.backup.$(date +"%Y-%m-%d_%H%M")"
+  if [ $BACKUP = "single" ]; then
+    bakname="userjs_backups/user.js.backup"
+  fi
+  cp user.js "$bakname"
+
+  mv "${newfile}" user.js
+  echo -e "Status: ${GREEN}user.js has been backed up and replaced with the latest version!${NC}"
+
+  # apply overrides
+  if [ "$SKIPOVERRIDE" = false ]; then
+    while IFS=',' read -ra FILE; do
+      add_override "$FILE"
+    done <<< "$OVERRIDE"
+  fi
+
+  # create diff
+  if [ "$COMPARE" = true ]; then
+    pastuserjs=userjs_diffs/past_user.js
+    past_nocomments=userjs_diffs/past_userjs.txt
+    current_nocomments=userjs_diffs/current_userjs.txt
+
+    remove_comments $pastuserjs $past_nocomments
+    remove_comments user.js $current_nocomments
+
+    diffname="userjs_diffs/diff_$(date +"%Y-%m-%d_%H%M").txt"
+    diff=$(diff -w -B -U 0 $past_nocomments $current_nocomments) 
+    if [ ! -z "$diff" ]; then
+      echo "$diff" > "$diffname"
+      echo -e "Status: ${GREEN}A diff file was created:${NC} ${PWD}/${diffname}"
+    else
+      echo -e "Warning: ${ORANGE}Your new user.js file appears to be identical.  No diff file was created."${NC}
+    fi
+
+    rm $past_nocomments $current_nocomments $pastuserjs
+  fi
+
+  if [ "$VIEW" = true ]; then
+    open_file "${PWD}/user.js"
+  fi
+
 }
 
 #########################
 #        Execute        #
 #########################
 
-## change directory to the Firefox profile directory
-cd "$ff_profile"
+if [ $# != 0 ]; then
+  readonly legacy_lc=$(echo $1 | tr '[A-Z]' '[a-z]')
+  # Display usage if first argument is -help or --help
+  if [ $1 = '--help' ] || [ $1 = '-help' ]; then
+    usage
+  elif [ $legacy_lc = '-donotupdate' ]; then
+    UPDATE="no"
+    legacy_argument $1
+  elif [ $legacy_lc = '-update' ]; then
+    UPDATE="yes"
+    legacy_argument $1
+  else
+    while getopts ":hp:ludsno:bcvr" opt; do
+      case $opt in
+        h)
+          usage
+          ;;
+        p)
+          PROFILE_PATH=${OPTARG}
+          ;;
+        l)
+          PROFILE_PATH="list"
+          ;;
+        u)
+          UPDATE="yes"
+          ;;
+        d)
+          UPDATE="no"
+          ;;
+        s)
+          CONFIRM="no"
+          ;;
+        n)
+          SKIPOVERRIDE=true
+          ;;
+        o)
+          OVERRIDE=${OPTARG}
+          ;;
+        b)
+          BACKUP="single"
+          ;;
+        c)
+          COMPARE=true
+          ;;
+        v)
+          VIEW=true
+          ;;
+        r)
+          tfile=$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js')
+          mv $tfile "${tfile}.js"
+          echo -e ${ORANGE}"Warning: user.js was saved to temporary file ${tfile}.js"${NC}
+          open_file "${tfile}.js"
+          exit 1
+          ;;
+        \?)
+          echo -e ${RED}"\n Error! Invalid option: -$OPTARG"${NC} >&2
+          usage
+          ;;
+        :)
+          echo -e ${RED}"Error! Option -$OPTARG requires an argument."${NC} >&2
+          exit 1
+          ;;
+      esac
+    done
+  fi
+fi
 
-initiate
+show_banner
 update_updater
-confirmation && update_userjs
-rm -rf userjs_temps
+set_wd		# changes directory to the Firefox profile (or script-dir)
+update_userjs
+
 cd "${currdir}"

From d4907faa8e9eeaaed0bb1546ac80725bd87b6711 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 26 Nov 2018 14:44:52 +0000
Subject: [PATCH 0126/1147] updater.sh v2.1 (#554)

when argument `-l` is used, parse profiles.ini instead of just listing folders in the default profiles dir.
This allows to select profiles located outside of the default profiles directory and makes selection easier because it also shows the profile name (and selection is by number instead of having to copy-paste a path)
---
 updater.sh | 223 ++++++++++++++++++++++++++++-------------------------
 1 file changed, 119 insertions(+), 104 deletions(-)

diff --git a/updater.sh b/updater.sh
index 1aba949..5eca133 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,13 +2,13 @@
 
 ## ghacks-user.js updater for macOS and Linux
 
-## version: 2.0
+## version: 2.1
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe
 
 ## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_updater() )
 
-readonly currdir=$(pwd)
+readonly CURRDIR=$(pwd)
 
 sfp=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
 if [ -z "$sfp" ]; then sfp=${BASH_SOURCE[0]}; fi
@@ -29,58 +29,48 @@ CYAN='\033[0;36m'
 NC='\033[0m' # No Color
 
 # Argument defaults
-UPDATE="check"
-CONFIRM="yes"
-OVERRIDE="user-overrides.js"
-BACKUP="multiple"
+UPDATE='check'
+CONFIRM='yes'
+OVERRIDE='user-overrides.js'
+BACKUP='multiple'
 COMPARE=false
 SKIPOVERRIDE=false
 VIEW=false
 PROFILE_PATH=false
 
-#########################
-#   Working directory   #
-#########################
+# Download method priority: curl -> wget
+DOWNLOAD_METHOD=''
+if [[ $(command -v 'curl') ]]; then
+  DOWNLOAD_METHOD='curl'
+elif [[ $(command -v 'wget') ]]; then
+  DOWNLOAD_METHOD='wget'
+else
+  echo -e "${RED}This script requires curl or wget.\nProcess aborted${NC}"
+  exit 0
+fi
 
-set_wd () {
-  declare -r macdir=~/Library/Application\ Support/Firefox/Profiles/
-  declare -r nixdir=~/.mozilla/firefox/
-  local ff_profile
-  if [ "$PROFILE_PATH" = false ]; then
-    ff_profile="$SCRIPT_DIR"
-  elif [ "$PROFILE_PATH" = "list" ]; then
-    local firefox_dir=""
-    if [ -d "$macdir" ]; then
-      firefox_dir=$macdir
-    elif [ -d $nixdir ]; then
-      firefox_dir=$nixdir
-    else
-      echo -e ${RED}"Error: Sorry, -l is not supported for your OS"${NC}
-      exit 1
-    fi
-    if [ $(find "$firefox_dir" -maxdepth 1 -type d | wc -l) == "2" ]; then
-      ff_profile=$(ls -d "$firefox_dir"*)
-    else 
-      echo -e ${GREEN}"The following profiles were found:\n"${ORANGE}
-      ls -d "$firefox_dir"*
-      echo -e ${RED}"\nWhich profile would you like to update?"${NC}
-      read -p ""
-      echo -e ""
-      ff_profile=$REPLY
-    fi
-  else
-    ff_profile="$PROFILE_PATH"
-  fi
-  cd "$ff_profile"
+
+show_banner () {
+  echo -e "${BBLUE}\n"
+  echo '                ############################################################################'
+  echo '                ####                                                                    ####'
+  echo '                ####                           ghacks user.js                           ####'
+  echo '                ####       Hardening the Privacy and Security Settings of Firefox       ####'
+  echo '                ####           Maintained by @Thorin-Oakenpants and @earthlng           ####'
+  echo '                ####            Updater for macOS and Linux by @overdodactyl            ####'
+  echo '                ####                                                                    ####'
+  echo '                ############################################################################'
+  echo -e "${NC}\n"
+  echo -e "Documentation for this script is available here: ${CYAN}https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts${NC}\n"
 }
 
 #########################
-#      Arguments       #
+#      Arguments        #
 #########################
 
 usage() {
-  echo -e ${BLUE}"\nUsage: $0 [-h] [-p PROFILE] [-u] [-d] [-s] [-n] [-b] [-c] [-v] [-r] [-o OVERRIDE]\n"${NC} 1>&2  # Echo usage string to standard error
-  echo -e "Optional Arguments:"
+  echo -e "${BLUE}\nUsage: $0 [-h] [-p PROFILE] [-u] [-d] [-s] [-n] [-b] [-c] [-v] [-r] [-o OVERRIDE]\n${NC}" 1>&2  # Echo usage string to standard error
+  echo 'Optional Arguments:'
   echo -e "\t-h,\t\t Show this help message and exit."
   echo -e "\t-p PROFILE,\t Path to your Firefox profile (if different than the dir of this script)"
   echo -e "\t\t\t IMPORTANT: if the path include spaces, wrap the entire argument in quotes."
@@ -102,7 +92,7 @@ usage() {
   echo -e "\t-v,\t\t Open the resulting user.js file."
   echo -e "\t-r,\t\t Only download user.js to a temporary file and open it."
   echo -e
-  echo -e "Deprecated Arguments (they still work for now):"
+  echo 'Deprecated Arguments (they still work for now):'
   echo -e "\t-donotupdate,\t Use instead -d"
   echo -e "\t-update,\t Use instead -u"
   echo -e
@@ -110,68 +100,95 @@ usage() {
 }
 
 legacy_argument () {
-  echo -e ${ORANGE}"\nWarning: command line arguments have changed."
+  echo -e "${ORANGE}\nWarning: command line arguments have changed."
   echo -e "$1 has been deprecated and may not work in the future.\n"
-  echo -e "Please view the new options using the -h argument."${NC}
+  echo -e "Please view the new options using the -h argument.${NC}"
 }
 
 #########################
 #     File Handling     #
 #########################
 
-# Download method priority: curl -> wget
-DOWNLOAD_METHOD=""
-if [[ $(command -v "curl") ]]; then
-  DOWNLOAD_METHOD="curl"
-elif [[ $(command -v "wget") ]]; then
-  DOWNLOAD_METHOD="wget"
-else
-  echo -e ${RED}"This script requires curl or wget.\nProcess aborted"${NC}
-  exit 0
-fi
-
 # Download files
 download_file () {
   declare -r url=$1
   declare -r tf=$(mktemp)
-  local dlcmd=""
+  local dlcmd=''
 
-  if [ $DOWNLOAD_METHOD = "curl" ]; then
+  if [ $DOWNLOAD_METHOD = 'curl' ]; then
     dlcmd="curl -o $tf"
   else
-    dlcmd="wget -O $tf" 
+    dlcmd="wget -O $tf"
   fi
 
-  $dlcmd "${url}" &>/dev/null && echo "$tf" || echo "" # return the temp-filename (or empty string on error)
+  $dlcmd "${url}" &>/dev/null && echo "$tf" || echo '' # return the temp-filename (or empty string on error)
 }
 
 open_file () { #expects one argument: file_path
-  if [ "$(uname)" == "Darwin" ]; then
+  if [ "$(uname)" == 'Darwin' ]; then
     open "$1"
   elif [ "$(expr substr $(uname -s) 1 5)" == "Linux" ]; then
     xdg-open "$1"
   else
-    echo -e ${RED}"Error: Sorry, opening files is not supported for your OS."${NC}
+    echo -e "${RED}Error: Sorry, opening files is not supported for your OS.${NC}"
   fi
 }
 
+readIniFile () { # expects one argument: absolute path of profiles.ini
+  declare -r inifile="$1"
+  declare -r tfile=$(mktemp)
 
-show_banner () {
-  echo -e
-  echo -e
-  echo -e        ${BBLUE}"  ############################################################################"
-  echo -e                "  ####                                                                    ####"
-  echo -e                "  ####                           ghacks user.js                           ####"
-  echo -e                "  ####       Hardening the Privacy and Security Settings of Firefox       ####"
-  echo -e                "  ####           Maintained by @Thorin-Oakenpants and @earthlng           ####"
-  echo -e                "  ####            Updater for macOS and Linux by @overdodactyl            ####"
-  echo -e                "  ####                                                                    ####"
-  echo -e                "  ############################################################################"${NC}
-  echo -e
-  echo -e
-  echo -e "Documentation for this script is available here: ${CYAN}https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts${NC}\n"
+  if [ $(grep '^\[Profile' "$inifile" | wc -l) == "1" ]; then ### only 1 profile found
+    grep '^\[Profile' -A 4 "$inifile" | grep -v '^\[Profile' > $tfile
+  else
+    grep -E -v '^\[General\]|^StartWithLastProfile=|^IsRelative=' "$inifile"
+    echo ''
+    read -p 'Select the profile number ( 0 for Profile0, 1 for Profile1, etc ) : ' -r
+    echo -e "\n"
+    if [[ $REPLY =~ ^(0|[1-9][0-9]*)$ ]]; then
+      grep '^\[Profile'${REPLY} -A 4 "$inifile" | grep -v '^\[Profile'${REPLY} > $tfile
+      if [ !$? ]; then
+        echo "Profile${REPLY} does not exist!" && exit 1
+      fi
+    else
+      echo "Invalid selection!" && exit 1
+    fi
+  fi
+
+  declare -r profpath=$(grep '^Path=' $tfile)
+  declare -r pathisrel=$(grep '^IsRelative=' $tfile)
+
+  rm "$tfile"
+
+  # update global variable
+  if [[ ${pathisrel#*=} == "1" ]]; then
+    PROFILE_PATH="$(dirname "$inifile")/${profpath#*=}"
+  else
+    PROFILE_PATH="${profpath#*=}"
+  fi
 }
 
+getProfilePath () {
+  declare -r f1=~/Library/Application\ Support/Firefox/profiles.ini
+  declare -r f2=~/.mozilla/firefox/profiles.ini
+
+  if [ "$PROFILE_PATH" = false ]; then
+    PROFILE_PATH="$SCRIPT_DIR"
+  elif [ "$PROFILE_PATH" = 'list' ]; then
+    local ini=''
+    if [[ -f "$f1" ]]; then
+      ini="$f1"
+    elif [[ -f "$f2" ]]; then
+      ini="$f2"
+    else
+      echo -e "${RED}Error: Sorry, -l is not supported for your OS${NC}"
+      exit 1
+    fi
+    readIniFile "$ini" # updates PROFILE_PATH or exits on error
+  #else
+    # PROFILE_PATH already set by user with -p
+  fi
+}
 
 #########################
 #   Update updater.sh   #
@@ -188,14 +205,14 @@ get_updater_version () {
 #   -donotupdate: New version will not be looked for and update will not occur
 #   -update: Check for update, if available, execute without asking
 update_updater () {
-  if [ $UPDATE = "no" ]; then
+  if [ $UPDATE = 'no' ]; then
     return 0 # User signified not to check for updates
   fi
 
   declare -r tmpfile=$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.sh')
 
   if [[ $(get_updater_version "${SCRIPT_DIR}/updater.sh") < $(get_updater_version "${tmpfile}") ]]; then
-    if [ $UPDATE = "check" ]; then
+    if [ $UPDATE = 'check' ]; then
       echo -e "There is a newer version of updater.sh available. ${RED}Update and execute Y/N?${NC}"
       read -p "" -n 1 -r
       echo -e "\n\n"
@@ -255,12 +272,12 @@ update_userjs () {
   echo -e "\tAvailable online: ${ORANGE}$(get_userjs_version $newfile)${NC}"
   echo -e "\tCurrently using:  ${ORANGE}$(get_userjs_version user.js)\n${NC}\n"
 
-  if [ $CONFIRM = "yes" ]; then
+  if [ $CONFIRM = 'yes' ]; then
     echo -e "This script will update to the latest user.js file and append any custom configurations from user-overrides.js. ${RED}Continue Y/N? ${NC}"
     read -p "" -n 1 -r
     echo -e "\n"
     if [[ $REPLY =~ ^[Nn]$ ]]; then
-      echo -e ${RED}"Process aborted"${NC}
+      echo -e "${RED}Process aborted${NC}"
       rm $newfile
       return 1
     fi
@@ -275,8 +292,8 @@ update_userjs () {
   # backup user.js
   mkdir -p userjs_backups
   local bakname="userjs_backups/user.js.backup.$(date +"%Y-%m-%d_%H%M")"
-  if [ $BACKUP = "single" ]; then
-    bakname="userjs_backups/user.js.backup"
+  if [ $BACKUP = 'single' ]; then
+    bakname='userjs_backups/user.js.backup'
   fi
   cp user.js "$bakname"
 
@@ -292,29 +309,26 @@ update_userjs () {
 
   # create diff
   if [ "$COMPARE" = true ]; then
-    pastuserjs=userjs_diffs/past_user.js
-    past_nocomments=userjs_diffs/past_userjs.txt
-    current_nocomments=userjs_diffs/current_userjs.txt
+    pastuserjs='userjs_diffs/past_user.js'
+    past_nocomments='userjs_diffs/past_userjs.txt'
+    current_nocomments='userjs_diffs/current_userjs.txt'
 
     remove_comments $pastuserjs $past_nocomments
     remove_comments user.js $current_nocomments
 
     diffname="userjs_diffs/diff_$(date +"%Y-%m-%d_%H%M").txt"
-    diff=$(diff -w -B -U 0 $past_nocomments $current_nocomments) 
+    diff=$(diff -w -B -U 0 $past_nocomments $current_nocomments)
     if [ ! -z "$diff" ]; then
       echo "$diff" > "$diffname"
       echo -e "Status: ${GREEN}A diff file was created:${NC} ${PWD}/${diffname}"
     else
-      echo -e "Warning: ${ORANGE}Your new user.js file appears to be identical.  No diff file was created."${NC}
+      echo -e "Warning: ${ORANGE}Your new user.js file appears to be identical.  No diff file was created.${NC}"
     fi
 
     rm $past_nocomments $current_nocomments $pastuserjs
   fi
 
-  if [ "$VIEW" = true ]; then
-    open_file "${PWD}/user.js"
-  fi
-
+  if [ "$VIEW" = true ]; then open_file "${PWD}/user.js"; fi
 }
 
 #########################
@@ -327,10 +341,10 @@ if [ $# != 0 ]; then
   if [ $1 = '--help' ] || [ $1 = '-help' ]; then
     usage
   elif [ $legacy_lc = '-donotupdate' ]; then
-    UPDATE="no"
+    UPDATE='no'
     legacy_argument $1
   elif [ $legacy_lc = '-update' ]; then
-    UPDATE="yes"
+    UPDATE='yes'
     legacy_argument $1
   else
     while getopts ":hp:ludsno:bcvr" opt; do
@@ -342,16 +356,16 @@ if [ $# != 0 ]; then
           PROFILE_PATH=${OPTARG}
           ;;
         l)
-          PROFILE_PATH="list"
+          PROFILE_PATH='list'
           ;;
         u)
-          UPDATE="yes"
+          UPDATE='yes'
           ;;
         d)
-          UPDATE="no"
+          UPDATE='no'
           ;;
         s)
-          CONFIRM="no"
+          CONFIRM='no'
           ;;
         n)
           SKIPOVERRIDE=true
@@ -360,7 +374,7 @@ if [ $# != 0 ]; then
           OVERRIDE=${OPTARG}
           ;;
         b)
-          BACKUP="single"
+          BACKUP='single'
           ;;
         c)
           COMPARE=true
@@ -371,16 +385,16 @@ if [ $# != 0 ]; then
         r)
           tfile=$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js')
           mv $tfile "${tfile}.js"
-          echo -e ${ORANGE}"Warning: user.js was saved to temporary file ${tfile}.js"${NC}
+          echo -e "${ORANGE}Warning: user.js was saved to temporary file ${tfile}.js${NC}"
           open_file "${tfile}.js"
           exit 1
           ;;
         \?)
-          echo -e ${RED}"\n Error! Invalid option: -$OPTARG"${NC} >&2
+          echo -e "${RED}\n Error! Invalid option: -$OPTARG${NC}" >&2
           usage
           ;;
         :)
-          echo -e ${RED}"Error! Option -$OPTARG requires an argument."${NC} >&2
+          echo -e "${RED}Error! Option -$OPTARG requires an argument.${NC}" >&2
           exit 1
           ;;
       esac
@@ -390,7 +404,8 @@ fi
 
 show_banner
 update_updater
-set_wd		# changes directory to the Firefox profile (or script-dir)
-update_userjs
 
-cd "${currdir}"
+getProfilePath # updates PROFILE_PATH or exits on error
+cd "$PROFILE_PATH" && update_userjs
+
+cd "$CURRDIR"

From f3e2bfa76db19da9b696e1dc5e41b386ddbd939f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 26 Nov 2018 15:33:36 +0000
Subject: [PATCH 0127/1147] browser.crashReports.unsubmittedCheck.autoSubmit

---
 scratchpad-scripts/ghacks-clear-FF60inclusive-[deprecated].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-FF60inclusive-[deprecated].js b/scratchpad-scripts/ghacks-clear-FF60inclusive-[deprecated].js
index 8977a8d..f62c589 100644
--- a/scratchpad-scripts/ghacks-clear-FF60inclusive-[deprecated].js
+++ b/scratchpad-scripts/ghacks-clear-FF60inclusive-[deprecated].js
@@ -36,7 +36,8 @@
     'camera.control.face_detection.enabled',
     'dom.disable_window_status_change',
     'dom.idle-observers-api.enabled',
-    /* 58 : nothing */
+    /* 58 */
+    'browser.crashReports.unsubmittedCheck.autoSubmit',
     /* 57 */
     'social.whitelist',
     'social.toast-notifications.enabled',

From 400d764a9374ebe812b255bd4b74dac8d96f1985 Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Tue, 27 Nov 2018 16:57:51 +0000
Subject: [PATCH 0128/1147] Update updater.sh (#558)

* just some polishing
---
 updater.sh | 17 ++++++++++-------
 1 file changed, 10 insertions(+), 7 deletions(-)

diff --git a/updater.sh b/updater.sh
index 5eca133..0232461 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,9 +2,9 @@
 
 ## ghacks-user.js updater for macOS and Linux
 
-## version: 2.1
+## version: 2.2
 ## Author: Pat Johnson (@overdodactyl)
-## Additional contributors: @earthlng, @ema-pe
+## Additional contributors: @earthlng, @ema-pe, @claustromaniac
 
 ## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_updater() )
 
@@ -236,7 +236,11 @@ update_updater () {
 
 # Returns version number of a user.js file
 get_userjs_version () {
-  echo "$(sed -n '4p' "$1")"
+  if [ -e $1 ]; then
+    echo "$(sed -n '4p' "$1")"
+  else
+    echo "Not detected."
+  fi
 }
 
 add_override () {
@@ -286,7 +290,7 @@ update_userjs () {
   # Copy a version of user.js to diffs folder for later comparison
   if [ "$COMPARE" = true ]; then
     mkdir -p userjs_diffs
-    cp user.js userjs_diffs/past_user.js
+    cp user.js userjs_diffs/past_user.js &>/dev/null
   fi
 
   # backup user.js
@@ -295,7 +299,7 @@ update_userjs () {
   if [ $BACKUP = 'single' ]; then
     bakname='userjs_backups/user.js.backup'
   fi
-  cp user.js "$bakname"
+  cp user.js "$bakname" &>/dev/null
 
   mv "${newfile}" user.js
   echo -e "Status: ${GREEN}user.js has been backed up and replaced with the latest version!${NC}"
@@ -324,8 +328,7 @@ update_userjs () {
     else
       echo -e "Warning: ${ORANGE}Your new user.js file appears to be identical.  No diff file was created.${NC}"
     fi
-
-    rm $past_nocomments $current_nocomments $pastuserjs
+    rm $past_nocomments $current_nocomments $pastuserjs &>/dev/null
   fi
 
   if [ "$VIEW" = true ]; then open_file "${PWD}/user.js"; fi

From db56940422dd91534b6ceed5b789221c991de7ca Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Thu, 29 Nov 2018 14:10:08 +0000
Subject: [PATCH 0129/1147] typos

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index c077d57..d599012 100644
--- a/user.js
+++ b/user.js
@@ -102,7 +102,7 @@ user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely decease
  * [1] https://www.mozilla.org/firefox/geolocation/ ***/
    // user_pref("geo.enabled", false);
 /* 0201b: set a default permission for Location (FF58+)
- * [NOTE] best left at default "always ask", fingerpintable via Permissions API
+ * [NOTE] best left at default "always ask", fingerprintable via Permissions API
  * [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
    // user_pref("permissions.default.geo", 2); // 0=always ask (default), 1=allow, 2=block
@@ -1119,7 +1119,7 @@ user_pref("dom.serviceWorkers.enabled", false);
 user_pref("dom.webnotifications.enabled", false); // (FF22+)
 user_pref("dom.webnotifications.serviceworker.enabled", false); // (FF44+)
 /* 2305: set a default permission for Notifications (see 2304) (FF58+)
- * [NOTE] best left at default "always ask", fingerpintable via Permissions API
+ * [NOTE] best left at default "always ask", fingerprintable via Permissions API
  * [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Notifications>Settings ***/
    // user_pref("permissions.default.desktop-notification", 2); // 0=always ask (default), 1=allow, 2=block

From 74e753d0c5ee9aabc067a8ecc50c5aa1171bea59 Mon Sep 17 00:00:00 2001
From: Pat Johnson <patjohns1216@gmail.com>
Date: Sat, 1 Dec 2018 07:18:38 -0700
Subject: [PATCH 0130/1147] fix profile check (#564)

---
 updater.sh | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/updater.sh b/updater.sh
index 0232461..8a3ac22 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## ghacks-user.js updater for macOS and Linux
 
-## version: 2.2
+## version: 2.3
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac
 
@@ -147,7 +147,7 @@ readIniFile () { # expects one argument: absolute path of profiles.ini
     echo -e "\n"
     if [[ $REPLY =~ ^(0|[1-9][0-9]*)$ ]]; then
       grep '^\[Profile'${REPLY} -A 4 "$inifile" | grep -v '^\[Profile'${REPLY} > $tfile
-      if [ !$? ]; then
+      if [[ "$?" != "0" ]]; then
         echo "Profile${REPLY} does not exist!" && exit 1
       fi
     else

From 51237f688969ed4f094b8d671692badf5af2dd73 Mon Sep 17 00:00:00 2001
From: Pat Johnson <patjohns1216@gmail.com>
Date: Sat, 1 Dec 2018 07:47:58 -0700
Subject: [PATCH 0131/1147] updater.sh: add -e option for ESR users (#565)

---
 updater.sh | 16 +++++++++++++---
 1 file changed, 13 insertions(+), 3 deletions(-)

diff --git a/updater.sh b/updater.sh
index 8a3ac22..0206a35 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## ghacks-user.js updater for macOS and Linux
 
-## version: 2.3
+## version: 2.4
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac
 
@@ -37,6 +37,7 @@ COMPARE=false
 SKIPOVERRIDE=false
 VIEW=false
 PROFILE_PATH=false
+ESR=false
 
 # Download method priority: curl -> wget
 DOWNLOAD_METHOD=''
@@ -69,7 +70,7 @@ show_banner () {
 #########################
 
 usage() {
-  echo -e "${BLUE}\nUsage: $0 [-h] [-p PROFILE] [-u] [-d] [-s] [-n] [-b] [-c] [-v] [-r] [-o OVERRIDE]\n${NC}" 1>&2  # Echo usage string to standard error
+  echo -e "${BLUE}\nUsage: $0 [-h] [-p PROFILE] [-u] [-d] [-s] [-n] [-b] [-c] [-v] [-r] [-e] [-o OVERRIDE]\n${NC}" 1>&2  # Echo usage string to standard error
   echo 'Optional Arguments:'
   echo -e "\t-h,\t\t Show this help message and exit."
   echo -e "\t-p PROFILE,\t Path to your Firefox profile (if different than the dir of this script)"
@@ -91,6 +92,7 @@ usage() {
   echo -e "\t-n,\t\t Do not append any overrides, even if user-overrides.js exists."
   echo -e "\t-v,\t\t Open the resulting user.js file."
   echo -e "\t-r,\t\t Only download user.js to a temporary file and open it."
+    echo -e "\t-e,\t\t Activate ESR related preferences."
   echo -e
   echo 'Deprecated Arguments (they still work for now):'
   echo -e "\t-donotupdate,\t Use instead -d"
@@ -304,6 +306,11 @@ update_userjs () {
   mv "${newfile}" user.js
   echo -e "Status: ${GREEN}user.js has been backed up and replaced with the latest version!${NC}"
 
+  if [ "$ESR" = true ]; then
+    sed -e 's/\/\* \(ESR[0-9]\{2,\}\.x still uses all.*\)/\/\/ \1/' user.js > user.js.tmp && mv user.js.tmp user.js
+    echo -e "Status: ${GREEN}ESR related preferences have been activated!${NC}"
+  fi
+
   # apply overrides
   if [ "$SKIPOVERRIDE" = false ]; then
     while IFS=',' read -ra FILE; do
@@ -350,7 +357,7 @@ if [ $# != 0 ]; then
     UPDATE='yes'
     legacy_argument $1
   else
-    while getopts ":hp:ludsno:bcvr" opt; do
+    while getopts ":hp:ludsno:bcvre" opt; do
       case $opt in
         h)
           usage
@@ -385,6 +392,9 @@ if [ $# != 0 ]; then
         v)
           VIEW=true
           ;;
+        e)
+          ESR=true
+          ;;
         r)
           tfile=$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js')
           mv $tfile "${tfile}.js"

From 85eaba25711450901bc4888c8d2f7c0e01342df6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 4 Dec 2018 18:36:03 +1300
Subject: [PATCH 0132/1147] TAG! You're it! #545

---
 user.js | 140 ++++++++++++++++++++++++++++----------------------------
 1 file changed, 69 insertions(+), 71 deletions(-)

diff --git a/user.js b/user.js
index d599012..08d7c4a 100644
--- a/user.js
+++ b/user.js
@@ -29,10 +29,13 @@
      * Site breakage WILL happen
          - There are often trade-offs and conflicts between Security vs Privacy vs Anti-Fingerprinting
            and these need to be balanced against Functionality & Convenience & Breakage
-     * You will need to make a few changes to suit your own needs
-         - Search this file for the "[SETUP]" tag to find SOME common items you could check
-           before using to avoid unexpected surprises
-         - Search this file for the "[WARNING]" tag to troubleshoot or prevent SOME common issues
+     * You will need to make changes, and to troubleshoot at times (choose wisely, there is always a trade-off).
+       While not 100% definitive, search for "[SETUP". If required, add each pref to your overrides section at
+       default values (or comment them out and reset them in about:config). Here are the main ones:
+            [SETUP-WEB] can cause some websites to break
+         [SETUP-CHROME] changes how Firefox itself behaves (i.e. NOT directly website related)
+           [SETUP-PERF] may impact performance
+     * [WARNING] tags are extra special and used sparingly, so heed them
   4. BACKUP your profile folder before implementing (and/or test in a new/cloned profile)
   5. KEEP UP TO DATE: https://github.com/ghacksuserjs/ghacks-user.js/wiki#small_orange_diamond-maintenance
 
@@ -51,13 +54,12 @@ user_pref("general.warnOnAboutConfig", false);
 /* 0001: start Firefox in PB (Private Browsing) mode
  * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
  * [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed
- * [NOTE] The P in PB mode is misleading: it means no "persistent" local storage of history,
+ * [WARNING] The P in PB mode is misleading: it means no "persistent" local storage of history,
  * caches, searches or cookies (which you can achieve in normal mode). In fact, it limits or
  * removes the ability to control these, and you need to quit Firefox to clear them. PB is best
  * used as a one off window (File>New Private Window) to provide a temporary self-contained
- * new instance. Closing all Private Windows clears all traces. Repeat as required.
- * [WARNING] PB does not allow indexedDB which breaks many Extensions that use it
- * including uBlock Origin, uMatrix, Violentmonkey and Stylus
+ * new instance. Closing all Private Windows clears all traces. Repeat as required. PB also does
+ * not allow indexedDB which breaks many Extensions that use it including uBlock Origin and uMatrix
  * [1] https://wiki.mozilla.org/Private_Browsing ***/
    // user_pref("browser.privatebrowsing.autostart", true);
 
@@ -421,7 +423,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
 /* 0701: disable IPv6
  * IPv6 can be abused, especially regarding MAC addresses. They also do not play nice
  * with VPNs. That's even assuming your ISP and/or router and/or website can handle it
- * [WARNING] This is just an application level fallback. Disabling IPv6 is best done
+ * [NOTE] This is just an application level fallback. Disabling IPv6 is best done
  * at an OS/network level, and/or configured properly in VPN setups
  * [TEST] http://ipv6leak.com/
  * [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/437#issuecomment-403740626
@@ -476,7 +478,7 @@ user_pref("network.file.disable_unc_paths", true); // (hidden pref)
  * [4] https://en.wikipedia.org/wiki/GIO_(software) ***/
 user_pref("network.gio.supported-protocols", ""); // (hidden pref)
 
-/*** 0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS [SETUP]
+/*** 0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS [SETUP-CHROME]
      If you are in a private environment (no unwanted eyeballs) and your device is private
      (restricted access), and the device is secure when unattended (locked, encrypted, forensic
      hardened), then items 0850 and above can be relaxed in return for more convenience and
@@ -532,7 +534,7 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
  *   - If *ALL* of the suggestion types are false, 'autocomplete' must also be false
  *   - If *ANY* of the suggestion types are true, 'autocomplete' must also be true
  * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest
- * [WARNING] If all three suggestion types are false, search engine keywords are disabled ***/
+ * [SETUP-CHROME] If all three suggestion types are false, search engine keywords are disabled ***/
 user_pref("browser.urlbar.autocomplete.enabled", false);
 user_pref("browser.urlbar.suggest.history", false);
 user_pref("browser.urlbar.suggest.bookmark", false);
@@ -577,7 +579,7 @@ user_pref("browser.taskbar.previews.enable", false);
 /*** 0900: PASSWORDS ***/
 user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
 /* 0901: disable saving passwords
- * [SETTING] Privacy & Security>Forms & Passwords>Ask to save logins and passwords for sites
+ * [SETTING] Privacy & Security>Forms & Passwords>Ask to save logins and passwords for websites
  * [NOTE] This does not clear any passwords already saved ***/
    // user_pref("signon.rememberSignons", false);
 /* 0902: use a master password (recommended if you save passwords)
@@ -617,7 +619,7 @@ user_pref("security.insecure_field_warning.contextual.enabled", true);
  * [1] https://bugzilla.mozilla.org/1357835 ***/
 user_pref("network.auth.subresource-img-cross-origin-http-auth-allow", false);
 
-/*** 1000: CACHE [SETUP]
+/*** 1000: CACHE [SETUP-CHROME]
      ETAG [1] and other [2][3] cache tracking/fingerprinting techniques can be averted by
      disabling *BOTH* disk (1001) and memory (1003) cache. ETAGs can also be neutralized
      by modifying response headers [4]. Another solution is to use a hardened configuration
@@ -647,7 +649,7 @@ user_pref("browser.cache.disk_cache_ssl", false);
  * To improve performance when pressing back/forward Firefox stores visited pages
  * so they don't have to be re-parsed. This is not the same as memory cache.
  * 0=none, -1=auto (that's minus 1), or for other values see [1]
- * [NOTE] Not recommended unless you know what you're doing
+ * [WARNING] Not recommended unless you know what you're doing
  * [1] http://kb.mozillazine.org/Browser.sessionhistory.max_total_viewers ***/
    // user_pref("browser.sessionhistory.max_total_viewers", 0);
 /* 1006: disable permissions manager from writing to disk [RESTART]
@@ -659,21 +661,21 @@ user_pref("browser.cache.disk_cache_ssl", false);
    // user_pref("network.dnsCacheExpiration", 60);
 /** SESSIONS & SESSION RESTORE ***/
 /* 1020: disable the Session Restore service completely
- * [WARNING] [SETUP] This also disables the "Recently Closed Tabs" feature
+ * [SETUP-CHROME] This also disables the "Recently Closed Tabs" feature
  * It does not affect "Recently Closed Windows" or any history. ***/
 user_pref("browser.sessionstore.max_tabs_undo", 0);
 user_pref("browser.sessionstore.max_windows_undo", 0);
-/* 1021: disable storing extra session data
+/* 1021: disable storing extra session data [SETUP-CHROME]
  * extra session data contains contents of forms, scrollbar positions, cookies and POST data
  * define on which sites to save extra session data:
  * 0=everywhere, 1=unencrypted sites, 2=nowhere ***/
 user_pref("browser.sessionstore.privacy_level", 2);
-/* 1022: disable resuming session from crash [SETUP] ***/
+/* 1022: disable resuming session from crash [SETUP-CHROME] ***/
 user_pref("browser.sessionstore.resume_from_crash", false);
 /* 1023: set the minimum interval between session save operations - increasing it
  * can help on older machines and some websites, as well as reducing writes, see [1]
  * Default is 15000 (15 secs). Try 30000 (30sec), 60000 (1min) etc
- * [WARNING] This can also affect entries in the "Recently Closed Tabs" feature:
+ * [SETUP-CHROME] This can also affect entries in the "Recently Closed Tabs" feature:
  * i.e. the longer the interval the more chance a quick tab open/close won't be captured.
  * This longer interval *may* affect history but we cannot replicate any history not recorded
  * [1] https://bugzilla.mozilla.org/1304389 ***/
@@ -709,15 +711,13 @@ user_pref("alerts.showFavicons", false); // default: false
 user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
 /** SSL (Secure Sockets Layer) / TLS (Transport Layer Security) ***/
 /* 1201: disable old SSL/TLS "insecure" renegotiation (vulnerable to a MiTM attack)
- * [WARNING] <2% of secure sites do NOT support the newer "secure" renegotiation, see [2]
+ * [SETUP-WEB] <2% of secure sites do NOT support the newer "secure" renegotiation, see [2]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
  * [2] https://www.ssllabs.com/ssl-pulse/ ***/
 user_pref("security.ssl.require_safe_negotiation", true);
 /* 1202: control TLS versions with min and max
  * 1=min version of TLS 1.0, 2=min version of TLS 1.1, 3=min version of TLS 1.2 etc
  * [NOTE] Jul-2017: Telemetry indicates approx 2% of TLS web traffic uses 1.0 or 1.1
- * [WARNING] If you get an "SSL_ERROR_NO_CYPHER_OVERLAP" error, temporarily
- * set a lower value for 'security.tls.version.min' in about:config
  * [1] http://kb.mozillazine.org/Security.tls.version.*
  * [2] https://www.ssl.com/how-to/turn-off-ssl-3-0-and-tls-1-0-in-your-browser/
  * [2] archived: https://archive.is/hY2Mm ***/
@@ -752,7 +752,7 @@ user_pref("security.ssl.enable_ocsp_stapling", true);
  * [NOTE] This pref only controls OCSP fetching and does not affect OCSP stapling
  * [1] https://en.wikipedia.org/wiki/Ocsp ***/
 user_pref("security.OCSP.enabled", 1);
-/* 1212: set OCSP fetch failures (non-stapled, see 1211) to hard-fail
+/* 1212: set OCSP fetch failures (non-stapled, see 1211) to hard-fail [SETUP-WEB]
  * When a CA cannot be reached to validate a cert, Firefox just continues the connection (=soft-fail)
  * Setting this pref to true tells Firefox to instead terminate the connection (=hard-fail)
  * It is pointless to soft-fail when an OCSP fetch fails: you cannot confirm a cert is still valid (it
@@ -769,8 +769,7 @@ user_pref("security.OCSP.require", true);
  * [1] https://trac.torproject.org/projects/tor/ticket/21686 ***/
 user_pref("security.family_safety.mode", 0);
 /* 1221: disable intermediate certificate caching (fingerprinting attack vector) [RESTART]
- * [NOTE] This may be better handled under FPI (ticket 1323644, part of Tor Uplift)
- * [WARNING] This affects login/cert/key dbs. The effect is all credentials are session-only.
+ * [NOTE] This affects login/cert/key dbs. The effect is all credentials are session-only.
  * Saved logins and passwords are not available. Reset the pref and restart to return them.
  * [TEST] https://fiprinca.0x90.eu/poc/
  * [1] https://bugzilla.mozilla.org/1334485 - related bug
@@ -800,7 +799,7 @@ user_pref("security.mixed_content.block_object_subrequest", true);
  * 2=deprecated option that now maps to 1
  * 3=only allowed for locally-added roots (e.g. anti-virus)
  * 4=only allowed for locally-added roots or for certs in 2015 and earlier
- * [WARNING] When disabled, some man-in-the-middle devices (e.g. security scanners and
+ * [SETUP-WEB] When disabled, some man-in-the-middle devices (e.g. security scanners and
  * antivirus products, may fail to connect to HTTPS sites. SHA-1 is *almost* obsolete.
  * [1] https://blog.mozilla.org/security/2016/10/18/phasing-out-sha-1-on-the-public-web/ ***/
 user_pref("security.pki.sha1_enforcement_level", 1);
@@ -813,12 +812,10 @@ user_pref("security.pki.sha1_enforcement_level", 1);
    // user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
    // user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
 /* 1263: disable DHE (Diffie-Hellman Key Exchange)
- * [WARNING] May break obscure sites, but not major sites, which should support ECDH over DHE
  * [1] https://www.eff.org/deeplinks/2015/10/how-to-protect-yourself-from-nsa-attacks-1024-bit-DH ***/
    // user_pref("security.ssl3.dhe_rsa_aes_128_sha", false);
    // user_pref("security.ssl3.dhe_rsa_aes_256_sha", false);
-/* 1264: disable the remaining non-modern cipher suites as of FF52
- * [NOTE] Commented out because it still breaks too many sites ***/
+/* 1264: disable the remaining non-modern cipher suites as of FF52 ***/
    // user_pref("security.ssl3.rsa_aes_128_sha", false);
    // user_pref("security.ssl3.rsa_aes_256_sha", false);
 
@@ -847,9 +844,9 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
  * If you disallow fonts, this drastically limits/reduces font
  * enumeration (by JS) which is a high entropy fingerprinting vector.
  * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Allow pages to choose...
- * [SETUP] Disabling fonts can uglify the web a fair bit. ***/
+ * [NOTE] Disabling fonts can uglify the web a fair bit. ***/
 user_pref("browser.display.use_document_fonts", 0);
-/* 1402: set more legible default fonts [SETUP]
+/* 1402: set more legible default fonts
  * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Serif|Sans-serif|Monospace
  * [NOTE] Example below for Windows/Western only ***/
    // user_pref("font.name.serif.x-unicode", "Georgia");
@@ -869,7 +866,7 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 /* 1405: disable WOFF2 (Web Open Font Format) (FF35+) ***/
 user_pref("gfx.downloadable_fonts.woff2.enabled", false);
 /* 1406: disable CSS Font Loading API
- * [SETUP] Disabling fonts can uglify the web a fair bit. ***/
+ * [NOTE] Disabling fonts can uglify the web a fair bit. ***/
 user_pref("layout.css.font-loading-api.enabled", false);
 /* 1407: disable special underline handling for a few fonts which you will probably never use [RESTART]
  * Any of these fonts on your system can be enumerated for fingerprinting.
@@ -879,11 +876,11 @@ user_pref("font.blacklist.underline_offset", "");
  * In the past it had security issues. Update: This continues to be the case, see [1]
  * [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778 ***/
 user_pref("gfx.font_rendering.graphite.enabled", false);
-/* 1409: limit system font exposure to a whitelist (FF52+) [SETUP] [RESTART]
+/* 1409: limit system font exposure to a whitelist (FF52+) [RESTART]
  * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed.
- * [NOTE] Creating your own probably highly-unique whitelist will raise your entropy. If
+ * [WARNING] Creating your own probably highly-unique whitelist will raise your entropy. If
  * you block sites choosing fonts in 1401, this preference is irrelevant. In future,
- * privacy.resistFingerprinting (see 4500) may cover this, and 1401 can be relaxed.
+ * privacy.resistFingerprinting (see 4500) will cover this (and 1401 can be relaxed)
  * [1] https://bugzilla.mozilla.org/1121643 ***/
    // user_pref("font.system.whitelist", ""); // (hidden pref)
 
@@ -909,15 +906,16 @@ user_pref("network.http.sendRefererHeader", 2);
 /* 1602: ALL: control the amount of information to send
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.trimmingPolicy", 0);
-/* 1603: CROSS ORIGIN: control when to send a referer [SETUP]
+/* 1603: CROSS ORIGIN: control when to send a referer [SETUP-WEB]
  * 0=always (default), 1=only if base domains match, 2=only if hosts match ***/
 user_pref("network.http.referer.XOriginPolicy", 1);
 /* 1604: CROSS ORIGIN: control the amount of information to send (FF52+)
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.XOriginTrimmingPolicy", 0);
 /* 1605: ALL: disable spoofing a referer
- * [WARNING] Spoofing effectively disables the anti-CSRF (Cross-Site Request Forgery) protections that some sites may rely on ***/
-user_pref("network.http.referer.spoofSource", false);
+ * [WARNING] do not set this to true, as spoofing effectively disables the anti-CSRF
+ * (Cross-Site Request Forgery) protections that some sites may rely on ***/
+user_pref("network.http.referer.spoofSource", false); // default: false
 /* 1606: ALL: set the default Referrer Policy
  * 0=no-referer, 1=same-origin, 2=strict-origin-when-cross-origin, 3=no-referrer-when-downgrade
  * [NOTE] This is only a default, it can be overridden by a site-controlled Referrer Policy
@@ -936,7 +934,7 @@ user_pref("network.http.referer.hideOnionSource", true);
  * [NOTE] DNT is enforced with TP (see 0420) regardless of this pref ***/
 user_pref("privacy.donottrackheader.enabled", true);
 
-/*** 1700: CONTAINERS [SETUP]
+/*** 1700: CONTAINERS
      [1] https://support.mozilla.org/kb/containers-experiment
      [2] https://wiki.mozilla.org/Security/Contextual_Identity_Project/Containers
      [3] https://github.com/mozilla/testpilot-containers
@@ -977,23 +975,23 @@ user_pref("plugin.state.flash", 0);
  * plid.all = whether to scan the directories specified in the Windows registry for PLIDs.
  * Used to detect RealPlayer, Java, Antivirus etc, but since FF52 only covers Flash ***/
 user_pref("plugin.scan.plid.all", false);
-/* 1820: disable all GMP (Gecko Media Plugins) [SETUP]
+/* 1820: disable all GMP (Gecko Media Plugins) [SETUP-WEB]
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
 user_pref("media.gmp-provider.enabled", false);
 user_pref("media.gmp.trial-create.enabled", false);
 user_pref("media.gmp-manager.url", "data:text/plain,");
 user_pref("media.gmp-manager.url.override", "data:text/plain,"); // (hidden pref)
 user_pref("media.gmp-manager.updateEnabled", false); // disable local fallback (hidden pref)
-/* 1825: disable widevine CDM (Content Decryption Module) [SETUP] ***/
+/* 1825: disable widevine CDM (Content Decryption Module) [SETUP-WEB] ***/
 user_pref("media.gmp-widevinecdm.visible", false);
 user_pref("media.gmp-widevinecdm.enabled", false);
 user_pref("media.gmp-widevinecdm.autoupdate", false);
-/* 1830: disable all DRM content (EME: Encryption Media Extension) [SETUP]
+/* 1830: disable all DRM content (EME: Encryption Media Extension) [SETUP-WEB]
  * [SETTING] General>DRM Content>Play DRM-controlled content
  * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
 user_pref("media.eme.enabled", false);
 /* 1840: disable the OpenH264 Video Codec by Cisco to "Never Activate"
- * This is the bundled codec used for video chat in WebRTC ***/
+ * This is the bundled codec used for video chat in WebRTC [SETUP-WEB] ***/
 user_pref("media.gmp-gmpopenh264.enabled", false); // (hidden pref)
 user_pref("media.gmp-gmpopenh264.autoupdate", false);
 
@@ -1046,7 +1044,7 @@ user_pref("dom.imagecapture.enabled", false); // default: false
 user_pref("gfx.offscreencanvas.enabled", false); // default: false
 /* 2030: disable auto-play of HTML5 media (FF63+)
  * 0=Allowed (default), 1=Blocked, 2=Prompt
- * [WARNING] This may break video playback on various sites ***/
+ * [SETUP-WEB] This may break video playback on various sites ***/
 user_pref("media.autoplay.default", 1);
 /* 2031: disable audio auto-play in non-active tabs (FF51+)
  * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
@@ -1089,13 +1087,13 @@ user_pref("dom.popup_maximum", 3);
  * [1] http://kb.mozillazine.org/Dom.popup_allowed_events ***/
 user_pref("dom.popup_allowed_events", "click dblclick");
 
-/*** 2300: WEB WORKERS [SETUP]
+/*** 2300: WEB WORKERS
      A worker is a JS "background task" running in a global context, i.e. it is different from
      the current window. Workers can spawn new workers (must be the same origin & scheme),
      including service and shared workers. Shared workers can be utilized by multiple scripts and
      communicate between browsing contexts (windows/tabs/iframes) and can even control your cache.
 
-     [WARNING] Disabling "web workers" might break sites
+     [SETUP-WEB] Disabling "web workers" might break sites
      [UPDATE] uMatrix 1.2.0+ allows a per-scope control for workers (2301-deprecated) and service workers (2302)
               #Required reading [#] https://github.com/gorhill/uMatrix/releases/tag/1.2.0
 
@@ -1138,7 +1136,7 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
  * [NOTE] Shift-Right-Click will always bring up the browser right-click context menu ***/
    // user_pref("dom.event.contextmenu.enabled", false);
 /* 2402: disable website access to clipboard events/content
- * [WARNING] This will break some sites functionality such as pasting into facebook, wordpress
+ * [SETUP-WEB] This will break some sites functionality such as pasting into facebook, wordpress
  * this applies to onCut, onCopy, onPaste events - i.e. you have to interact with
  * the website for it to look at the clipboard
  * [1] https://www.ghacks.net/2014/01/08/block-websites-reading-modifying-clipboard-contents-firefox/ ***/
@@ -1163,7 +1161,7 @@ user_pref("dom.vibrator.enabled", false);
  * [6] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
 user_pref("javascript.options.asmjs", false);
 /* 2421: disable Ion and baseline JIT to help harden JS against exploits
- * [WARNING] Causes the odd site issue and there is also a performance loss
+ * [SETUP-PERF] If false, causes the odd site issue and there is also a performance loss
  * [1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817 ***/
    // user_pref("javascript.options.ion", false);
    // user_pref("javascript.options.baselinejit", false);
@@ -1193,7 +1191,7 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * [1] https://bugzilla.mozilla.org/1313580 ***/
    // user_pref("dom.battery.enabled", false);
 /* 2504: disable virtual reality devices
- * [WARNING] [SETUP] Optional protection depending on your connected devices
+ * Optional protection depending on your connected devices
  * [1] https://developer.mozilla.org/docs/Web/API/WebVR_API ***/
    // user_pref("dom.vr.enabled", false);
 /* 2505: disable media device enumeration (FF29+)
@@ -1203,7 +1201,7 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
 user_pref("media.navigator.enabled", false);
 /* 2508: disable hardware acceleration to reduce graphics fingerprinting
  * [SETTING] General>Performance>Custom>Use hardware acceleration when available
- * [WARNING] [SETUP] Affects text rendering (fonts will look different), impacts video performance,
+ * [SETUP-PERF] Affects text rendering (fonts will look different), impacts video performance,
  * and parts of Quantum that utilize the GPU will also be affected as they are rolled out
  * [1] https://wiki.mozilla.org/Platform/GFX/HardwareAcceleration ***/
    // user_pref("gfx.direct2d.disabled", true); // [WINDOWS]
@@ -1215,7 +1213,7 @@ user_pref("dom.webaudio.enabled", false);
  * [1] https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent ***/
 user_pref("dom.w3c_pointer_events.enabled", false);
 /* 2517: disable Media Capabilities API (FF63+)
- * [WARNING] This *may* affect media performance if disabled, no one is sure
+ * [SETUP-PERF] This *may* affect media performance if disabled, no one is sure
  * [1] https://github.com/WICG/media-capabilities
  * [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
    // user_pref("media.media-capabilities.enabled", false);
@@ -1236,7 +1234,7 @@ user_pref("browser.helperApps.deleteTempFileOnExit", true);
  * look in profile/thumbnails directory - you may want to clean that out ***/
 user_pref("browser.pagethumbnails.capturing_disabled", true); // (hidden pref)
 /* 2605: block web content in file processes (FF55+)
- * [WARNING] [SETUP] You may want to disable this for corporate or developer environments
+ * [SETUP-WEB] You may want to disable this for corporate or developer environments
  * [1] https://bugzilla.mozilla.org/1343184 ***/
 user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false);
 /* 2606: disable UITour backend so there is no chance that a remote page can use it ***/
@@ -1256,7 +1254,7 @@ user_pref("devtools.webide.enabled", false);
  * [1] https://bugzilla.mozilla.org/1173199 ***/
 user_pref("mathml.disabled", true);
 /* 2610: disable in-content SVG (Scalable Vector Graphics) (FF53+)
- * [WARNING] Expect breakage incl. youtube player controls. Best left for a "hardened" profile.
+ * [SETUP-WEB] Expect breakage incl. youtube player controls. Best left for a "hardened" profile.
  * [1] https://bugzilla.mozilla.org/1216893 ***/
    // user_pref("svg.disabled", true);
 /* 2611: disable middle mouse click opening links from clipboard
@@ -1264,7 +1262,7 @@ user_pref("mathml.disabled", true);
  * [2] http://kb.mozillazine.org/Middlemouse.contentLoadURL ***/
 user_pref("middlemouse.contentLoadURL", false);
 /* 2614: limit HTTP redirects (this does not control redirects with HTML meta tags or JS)
- * [WARNING] A low setting of 5 or under will probably break some sites (e.g. gmail logins)
+ * [NOTE] A low setting of 5 or under will probably break some sites (e.g. gmail logins)
  * To control HTML Meta tag and JS redirects, use an extension. Default is 20 ***/
 user_pref("network.http.redirection-limit", 10);
 /* 2615: disable websites overriding Firefox's keyboard shortcuts (FF58+)
@@ -1289,7 +1287,7 @@ user_pref("ui.use_standins_for_native_colors", true); // (hidden pref)
  * [3] CVE-2017-5383: https://www.mozilla.org/security/advisories/mfsa2017-02/
  * [4] https://www.xudongz.com/blog/2017/idn-phishing/ ***/
 user_pref("network.IDN_show_punycode", true);
-/* 2620: enable Firefox's built-in PDF reader [SETUP]
+/* 2620: enable Firefox's built-in PDF reader
  * [SETTING] General>Applications>Portable Document Format (PDF)
  * This setting controls if the option "Display in Firefox" in the above setting is available
  *   and by effect controls whether PDFs are handled in-browser or externally ("Ask" or "Open With")
@@ -1315,13 +1313,13 @@ user_pref("browser.download.hide_plugins_without_extensions", false);
 /* 2654: disable "open with" in download dialog (FF50+)
  * This is very useful to enable when the browser is sandboxed (e.g. via AppArmor)
  * in such a way that it is forbidden to run external applications.
- * [SETUP] This may interfere with some users' workflow or methods
+ * [SETUP-CHROME] This may interfere with some users' workflow or methods
  * [1] https://bugzilla.mozilla.org/1281959 ***/
 user_pref("browser.download.forbid_open_with", true);
 
 /** EXTENSIONS ***/
 /* 2660: lock down allowed extension directories
- * [WARNING] This will break extensions that do not use the default XPI directories
+ * [SETUP-CHROME] This will break extensions that do not use the default XPI directories
  * [1] https://mike.kaply.com/2012/02/21/understanding-add-on-scopes/
  * [1] archived: https://archive.is/DYjAM ***/
 user_pref("extensions.enabledScopes", 1); // (hidden pref)
@@ -1362,7 +1360,7 @@ user_pref("security.dialog_enable_delay", 700); // default: 1000 (milliseconds)
      serviceWorkers :
 ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
-/* 2701: disable 3rd-party cookies and site-data [SETUP]
+/* 2701: disable 3rd-party cookies and site-data
  * You can set exceptions under site permissions or use an extension
  * 0=Accept cookies and site data, 1=Block third-party cookies, 2=Block all cookies,
  * 3=Block cookies from unvisited sites, 4=Block third-party trackers (FF63+)
@@ -1426,7 +1424,7 @@ user_pref("dom.caches.enabled", false);
  * [3] https://blog.mozilla.org/l10n/2017/03/07/firefox-l10n-report-aurora-54/ ***/
    // user_pref("dom.storageManager.enabled", false);
 
-/*** 2800: SHUTDOWN [SETUP]
+/*** 2800: SHUTDOWN [SETUP-CHROME]
      You should set the values to what suits you best.
      - "Offline Website Data" includes appCache (2730), localStorage (2710),
        Service Worker cache (2740), and QuotaManager (IndexedDB (2720), asm-cache)
@@ -1501,7 +1499,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation (FF51+)
- * [WARNING] May break cross-domain logins and site functionality until perfected
+ * [SETUP-WEB] May break cross-domain logins and site functionality until perfected
  * [1] https://bugzilla.mozilla.org/1260931 ***/
 user_pref("privacy.firstparty.isolate", true);
 /* 4002: enforce FPI restriction for window.opener (FF54+)
@@ -1573,10 +1571,11 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // default
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting (FF41+)
+ * [SETUP-WEB] RFP is not ready for the masses, so expect some website breakage
  * [1] https://bugzilla.mozilla.org/418986 ***/
 user_pref("privacy.resistFingerprinting", true); // (hidden pref) (not hidden FF55+)
-/* 4502: set new window sizes to round to hundreds (FF55+) [SETUP]
- * [NOTE] Width will round down to multiples of 200s and height to 100s, to fit your screen.
+/* 4502: set new window sizes to round to hundreds (FF55+)
+ * [SETUP-CHROME] Width will round down to multiples of 200s and height to 100s, to fit your screen.
  * The override values are a starting point to round from if you want some control
  * [1] https://bugzilla.mozilla.org/1330882
  * [2] https://hardware.metrics.mozilla.com/ ***/
@@ -1592,17 +1591,17 @@ user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // (hidde
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
 
-/*** 4600: RFP (4500) ALTERNATIVES [SETUP]
+/*** 4600: RFP (4500) ALTERNATIVES
    * IF you DO use RFP (see 4500) then you DO NOT need these redundant prefs. In fact,
      some even cause RFP to not behave as you would expect and alter your fingerprint.
      Make sure they are RESET in about:config as per your Firefox version
    * IF you DO NOT use RFP or are on ESR... then turn on each ESR section below
 ***/
 user_pref("_user.js.parrot", "4600 syntax error: the parrot's crossed the Jordan");
-/* [NOTE] ESR52.x and non-RFP users replace the * with a slash on this line to enable these
+/* [SETUP-non-RFP] Non-RFP users replace the * with a slash on this line to enable these
 // FF55+
 // 4601: [2514] spoof (or limit?) number of CPU cores (FF48+)
-   // [WARNING] *may* affect core chrome/Firefox performance, will affect content.
+   // [NOTE] *may* affect core chrome/Firefox performance, will affect content.
    // [1] https://bugzilla.mozilla.org/1008453
    // [2] https://trac.torproject.org/projects/tor/ticket/21675
    // [3] https://trac.torproject.org/projects/tor/ticket/22127
@@ -1616,7 +1615,7 @@ user_pref("dom.enable_resource_timing", false);
    // [1] https://wiki.mozilla.org/Security/Reviews/Firefox/NavigationTimingAPI
 user_pref("dom.enable_performance", false);
 // 4604: [2512] disable device sensor API
-   // [WARNING] [SETUP] Optional protection depending on your device
+   // Optional protection depending on your device
    // [1] https://trac.torproject.org/projects/tor/ticket/15758
    // [2] https://blog.lukaszolejnik.com/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api/
    // [3] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1357733,1292751
@@ -1627,7 +1626,7 @@ user_pref("dom.enable_performance", false);
    // and new windows are reset to default and only the current tab retains the current zoom
 user_pref("browser.zoom.siteSpecific", false);
 // 4606: [2501] disable gamepad API - USB device ID enumeration
-   // [WARNING] [SETUP] Optional protection depending on your connected devices
+   // Optional protection depending on your connected devices
    // [1] https://trac.torproject.org/projects/tor/ticket/13023
    // user_pref("dom.gamepad.enabled", false);
 // 4607: [2503] disable giving away network info (FF31+)
@@ -1650,7 +1649,7 @@ user_pref("media.video_stats.enabled", false);
 // 4611: [2509] disable touch events
    // fingerprinting attack vector - leaks screen res & actual screen coordinates
    // 0=disabled, 1=enabled, 2=autodetect
-   // [WARNING] [SETUP] Optional protection depending on your device
+   // Optional protection depending on your device
    // [1] https://developer.mozilla.org/docs/Web/API/Touch_events
    // [2] https://trac.torproject.org/projects/tor/ticket/10286
    // user_pref("dom.w3c_touch_events.enabled", 0);
@@ -1696,7 +1695,7 @@ user_pref("_user.js.parrot", "4700 syntax error: the parrot's taken 'is last bow
 /* 4706: navigator.oscpu ***/
    // user_pref("general.oscpu.override", ""); // (hidden pref)
 
-/*** 5000: PERSONAL [SETUP]
+/*** 5000: PERSONAL
      Non-project related but useful. If any of these interest you, add them to your overrides ***/
 user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
 /* WELCOME & WHAT's NEW NOTICES ***/
@@ -1811,7 +1810,6 @@ user_pref("security.tls.insecure_fallback_hosts.use_static_list", false);
 user_pref("dom.workers.sharedWorkers.enabled", false);
 // 2403: disable scripts changing images
    // [TEST] https://www.w3schools.com/jsref/tryit.asp?filename=tryjsref_img_src2
-   // [WARNING] Will break some sites such as Google Maps and a lot of web apps
    // [-] https://bugzilla.mozilla.org/773429
    // user_pref("dom.disable_image_src_set", true);
 // ***/
@@ -2109,7 +2107,7 @@ user_pref("extensions.shield-recipe-client.api_url", "");
    // [-] https://bugzilla.mozilla.org/1433324
 user_pref("browser.newtabpage.activity-stream.enabled", false);
 // 2301: disable workers
-   // [WARNING] Disabling workers *will* break sites (e.g. Google Street View, Twitter)
+   // [SETUP-WEB] Disabling workers *will* break sites (e.g. Google Street View, Twitter)
    // [NOTE] CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed)
    // [-] https://bugzilla.mozilla.org/1434934
 user_pref("dom.workers.enabled", false);
@@ -2164,7 +2162,7 @@ user_pref("shield.savant.enabled", false);
    // [-] https://bugzilla.mozilla.org/1453751
    // user_pref("browser.chrome.favicons", false);
 // 2030: disable auto-play of HTML5 media - replaced by media.autoplay.default
-   // [WARNING] This may break video playback on various sites
+   // [SETUP-WEB] This may break video playback on various sites
    // [-] https://bugzilla.mozilla.org/1470082
 user_pref("media.autoplay.enabled", false);
 // 2704: set cookie lifetime in days (see 2703)

From 25923f1acde6e3e53f98e0108862fc202d23d230 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 4 Dec 2018 06:03:11 +0000
Subject: [PATCH 0133/1147] add index #567

---
 user.js | 32 ++++++++++++++++++++++++++++++++
 1 file changed, 32 insertions(+)

diff --git a/user.js b/user.js
index 08d7c4a..6e80ac2 100644
--- a/user.js
+++ b/user.js
@@ -39,6 +39,38 @@
   4. BACKUP your profile folder before implementing (and/or test in a new/cloned profile)
   5. KEEP UP TO DATE: https://github.com/ghacksuserjs/ghacks-user.js/wiki#small_orange_diamond-maintenance
 
+* INDEX:
+
+     0100: STARTUP
+     0200: GEOLOCATION
+     0300: QUIET FOX
+     0400: BLOCKLISTS / SAFE BROWSING / TRACKING PROTECTION
+     0500: SYSTEM ADD-ONS / EXPERIMENTS
+     0600: BLOCK IMPLICIT OUTBOUND
+     0700: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc
+     0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
+     0900: PASSWORDS
+     1000: CACHE
+     1200: HTTPS ( SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS )
+     1400: FONTS
+     1600: HEADERS / REFERERS
+     1700: CONTAINERS
+     1800: PLUGINS
+     2000: MEDIA / CAMERA / MIC
+     2200: WINDOW MEDDLING & LEAKS / POPUPS
+     2300: WEB WORKERS
+     2400: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT
+     2500: HARDWARE FINGERPRINTING
+     2600: MISCELLANEOUS
+     2700: PERSISTENT STORAGE
+     2800: SHUTDOWN
+     4000: FIRST PARTY ISOLATION
+     4500: privacy.resistFingerprinting
+     4600: RFP (4500) ALTERNATIVES
+     4700: RFP (4500) ALTERNATIVES - NAVIGATOR / USER AGENT (UA) SPOOFING
+     5000: PERSONAL
+     9999: DEPRECATED / REMOVED / LEGACY / RENAMED
+
 ******/
 
 /* START: internal custom pref to test for syntax errors

From 834857b5643b324291985af7868595bc9c356dc5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 4 Dec 2018 20:03:19 +1300
Subject: [PATCH 0134/1147] tag sections #567

---
 user.js | 58 ++++++++++++++++++++++++++++-----------------------------
 1 file changed, 29 insertions(+), 29 deletions(-)

diff --git a/user.js b/user.js
index 6e80ac2..f25edff 100644
--- a/user.js
+++ b/user.js
@@ -95,7 +95,7 @@ user_pref("general.warnOnAboutConfig", false);
  * [1] https://wiki.mozilla.org/Private_Browsing ***/
    // user_pref("browser.privatebrowsing.autostart", true);
 
-/*** 0100: STARTUP ***/
+/*** [SECTION 0100]: STARTUP ***/
 user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
 /* 0101: disable default browser check
  * [SETTING] General>Startup>Always check if Firefox is your default browser ***/
@@ -130,7 +130,7 @@ user_pref("browser.newtabpage.activity-stream.showSponsored", false);
 /* 0105d: disable AS recent Highlights in the Library (FF57+) ***/
    // user_pref("browser.library.activity-stream.enabled", false);
 
-/*** 0200: GEOLOCATION ***/
+/*** [SECTION 0200]: GEOLOCATION ***/
 user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");
 /* 0201: disable Location-Aware Browsing
  * [1] https://www.mozilla.org/firefox/geolocation/ ***/
@@ -166,7 +166,7 @@ user_pref("intl.regional_prefs.use_os_locales", false);
 user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
    // user_pref("geo.wifi.logging.enabled", true); // (hidden pref)
 
-/*** 0300: QUIET FOX
+/*** [SECTION 0300]: QUIET FOX
      We choose to not disable auto-CHECKs (0301's) but to disable auto-INSTALLs (0302's).
      There are many legitimate reasons to turn off auto-INSTALLS, including hijacked or
      monetized extensions, time constraints, legacy issues, and fear of breakage/bugs.
@@ -246,7 +246,7 @@ user_pref("browser.aboutHomeSnippets.updateUrl", "data:,");
 user_pref("browser.chrome.errorReporter.enabled", false);
 user_pref("browser.chrome.errorReporter.submitUrl", "");
 
-/*** 0400: BLOCKLISTS / SAFE BROWSING / TRACKING PROTECTION
+/*** [SECTION 0400]: BLOCKLISTS / SAFE BROWSING / TRACKING PROTECTION
      This section has security & tracking protection implications vs privacy concerns vs effectiveness
      vs 3rd party 'censorship'. We DO NOT advocate no protection. If you disable Tracking Protection (TP)
      and/or Safe Browsing (SB), then SECTION 0400 REQUIRES YOU HAVE uBLOCK ORIGIN INSTALLED.
@@ -350,7 +350,7 @@ user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
 /* 0426: enforce Content Blocking (required to block cookies) (FF63+) ***/
 user_pref("browser.contentblocking.enabled", true); // default: true
 
-/*** 0500: SYSTEM ADD-ONS / EXPERIMENTS
+/*** [SECTION 0500]: SYSTEM ADD-ONS / EXPERIMENTS
      System Add-ons are a method for shipping extensions, considered to be
      built-in features to Firefox, that are hidden from the about:addons UI.
      To view your System Add-ons go to about:support, they are listed under "Firefox Features"
@@ -416,7 +416,7 @@ user_pref("extensions.formautofill.heuristics.enabled", false);
  * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla ***/
 user_pref("extensions.webcompat-reporter.enabled", false);
 
-/*** 0600: BLOCK IMPLICIT OUTBOUND [not explicitly asked for - e.g. clicked on] ***/
+/*** [SECTION 0600]: BLOCK IMPLICIT OUTBOUND [not explicitly asked for - e.g. clicked on] ***/
 user_pref("_user.js.parrot", "0600 syntax error: the parrot's no more!");
 /* 0601: disable link prefetching
  * [1] https://developer.mozilla.org/docs/Web/HTTP/Link_prefetching_FAQ ***/
@@ -450,7 +450,7 @@ user_pref("network.protocol-handler.external.ms-windows-store", false);
 /* 0608: disable predictor / prefetching (FF48+) ***/
 user_pref("network.predictor.enable-prefetch", false);
 
-/*** 0700: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
+/*** [SECTION 0700]: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
 /* 0701: disable IPv6
  * IPv6 can be abused, especially regarding MAC addresses. They also do not play nice
@@ -510,7 +510,7 @@ user_pref("network.file.disable_unc_paths", true); // (hidden pref)
  * [4] https://en.wikipedia.org/wiki/GIO_(software) ***/
 user_pref("network.gio.supported-protocols", ""); // (hidden pref)
 
-/*** 0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS [SETUP-CHROME]
+/*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS [SETUP-CHROME]
      If you are in a private environment (no unwanted eyeballs) and your device is private
      (restricted access), and the device is secure when unattended (locked, encrypted, forensic
      hardened), then items 0850 and above can be relaxed in return for more convenience and
@@ -608,7 +608,7 @@ user_pref("browser.taskbar.lists.tasks.enabled", false);
 /* 0871: disable Windows taskbar preview [WINDOWS] ***/
 user_pref("browser.taskbar.previews.enable", false);
 
-/*** 0900: PASSWORDS ***/
+/*** [SECTION 0900]: PASSWORDS ***/
 user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
 /* 0901: disable saving passwords
  * [SETTING] Privacy & Security>Forms & Passwords>Ask to save logins and passwords for websites
@@ -651,7 +651,7 @@ user_pref("security.insecure_field_warning.contextual.enabled", true);
  * [1] https://bugzilla.mozilla.org/1357835 ***/
 user_pref("network.auth.subresource-img-cross-origin-http-auth-allow", false);
 
-/*** 1000: CACHE [SETUP-CHROME]
+/*** [SECTION 1000]: CACHE [SETUP-CHROME]
      ETAG [1] and other [2][3] cache tracking/fingerprinting techniques can be averted by
      disabling *BOTH* disk (1001) and memory (1003) cache. ETAGs can also be neutralized
      by modifying response headers [4]. Another solution is to use a hardened configuration
@@ -727,7 +727,7 @@ user_pref("browser.shell.shortcutFavicons", false);
 /* 1032: disable favicons in web notifications ***/
 user_pref("alerts.showFavicons", false); // default: false
 
-/*** 1200: HTTPS ( SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS )
+/*** [SECTION 1200]: HTTPS ( SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS )
    Note that your cipher and other settings can be used server side as a fingerprint attack
    vector, see [1] (It's quite technical but the first part is easy to understand
    and you can stop reading when you reach the second section titled "Enter Bro")
@@ -870,7 +870,7 @@ user_pref("security.insecure_connection_text.enabled", true);
    // user_pref("security.insecure_connection_icon.pbmode.enabled", true); // private windows only
    // user_pref("security.insecure_connection_text.pbmode.enabled", true);
 
-/*** 1400: FONTS ***/
+/*** [SECTION 1400]: FONTS ***/
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 /* 1401: disable websites choosing fonts (0=block, 1=allow)
  * If you disallow fonts, this drastically limits/reduces font
@@ -916,7 +916,7 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
  * [1] https://bugzilla.mozilla.org/1121643 ***/
    // user_pref("font.system.whitelist", ""); // (hidden pref)
 
-/*** 1600: HEADERS / REFERERS
+/*** [SECTION 1600]: HEADERS / REFERERS
      Only *cross domain* referers need controlling and XOriginPolicy (1603) is perfect for that. Thus we enforce
      the default values for 1601, 1602, 1605 and 1606 to minimize breakage, and only tweak 1603 and 1604.
 
@@ -966,7 +966,7 @@ user_pref("network.http.referer.hideOnionSource", true);
  * [NOTE] DNT is enforced with TP (see 0420) regardless of this pref ***/
 user_pref("privacy.donottrackheader.enabled", true);
 
-/*** 1700: CONTAINERS
+/*** [SECTION 1700]: CONTAINERS
      [1] https://support.mozilla.org/kb/containers-experiment
      [2] https://wiki.mozilla.org/Security/Contextual_Identity_Project/Containers
      [3] https://github.com/mozilla/testpilot-containers
@@ -987,7 +987,7 @@ user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // defa
  * [1] https://bugzilla.mozilla.org/1328756 ***/
 user_pref("privacy.userContext.longPressBehavior", 2);
 
-/*** 1800: PLUGINS ***/
+/*** [SECTION 1800]: PLUGINS ***/
 user_pref("_user.js.parrot", "1800 syntax error: the parrot's pushing up daisies!");
 /* 1801: set default plugin state (i.e. new plugins on discovery) to never activate
  * 0=disabled, 1=ask to activate, 2=active - you can override individual plugins ***/
@@ -1027,7 +1027,7 @@ user_pref("media.eme.enabled", false);
 user_pref("media.gmp-gmpopenh264.enabled", false); // (hidden pref)
 user_pref("media.gmp-gmpopenh264.autoupdate", false);
 
-/*** 2000: MEDIA / CAMERA / MIC ***/
+/*** [SECTION 2000]: MEDIA / CAMERA / MIC ***/
 user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
 /* 2001: disable WebRTC (Web Real-Time Communication)
  * [1] https://www.privacytools.io/#webrtc ***/
@@ -1082,7 +1082,7 @@ user_pref("media.autoplay.default", 1);
  * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
 user_pref("media.block-autoplay-until-in-foreground", true);
 
-/*** 2200: WINDOW MEDDLING & LEAKS / POPUPS ***/
+/*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/
 user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
 /* 2201: prevent websites from disabling new window features
  * [1] http://kb.mozillazine.org/Prevent_websites_from_disabling_new_window_features ***/
@@ -1119,7 +1119,7 @@ user_pref("dom.popup_maximum", 3);
  * [1] http://kb.mozillazine.org/Dom.popup_allowed_events ***/
 user_pref("dom.popup_allowed_events", "click dblclick");
 
-/*** 2300: WEB WORKERS
+/*** [SECTION 2300]: WEB WORKERS
      A worker is a JS "background task" running in a global context, i.e. it is different from
      the current window. Workers can spawn new workers (must be the same origin & scheme),
      including service and shared workers. Shared workers can be utilized by multiple scripts and
@@ -1162,7 +1162,7 @@ user_pref("dom.push.connection.enabled", false);
 user_pref("dom.push.serverURL", "");
 user_pref("dom.push.userAgentID", "");
 
-/*** 2400: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT ***/
+/*** [SECTION 2400]: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT ***/
 user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");
 /* 2401: disable website control over browser right-click context menu
  * [NOTE] Shift-Right-Click will always bring up the browser right-click context menu ***/
@@ -1213,7 +1213,7 @@ user_pref("dom.IntersectionObserver.enabled", false);
  * [2] https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ ***/
 user_pref("javascript.options.shared_memory", false);
 
-/*** 2500: HARDWARE FINGERPRINTING ***/
+/*** [SECTION 2500]: HARDWARE FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");
 /* 2502: disable Battery Status API
  * Initially a Linux issue (high precision readout) that was fixed.
@@ -1250,7 +1250,7 @@ user_pref("dom.w3c_pointer_events.enabled", false);
  * [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
    // user_pref("media.media-capabilities.enabled", false);
 
-/*** 2600: MISCELLANEOUS ***/
+/*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
 /* 2601: prevent accessibility services from accessing your browser [RESTART]
  * [SETTING] Privacy & Security>Permissions>Prevent accessibility services from accessing your browser
@@ -1383,7 +1383,7 @@ user_pref("security.data_uri.block_toplevel_data_uri_navigations", true); // def
  * [2] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
 user_pref("security.dialog_enable_delay", 700); // default: 1000 (milliseconds)
 
-/*** 2700: PERSISTENT STORAGE
+/*** [SECTION 2700]: PERSISTENT STORAGE
      Data SET by websites including
             cookies : profile\cookies.sqlite
        localStorage : profile\webappsstore.sqlite
@@ -1456,7 +1456,7 @@ user_pref("dom.caches.enabled", false);
  * [3] https://blog.mozilla.org/l10n/2017/03/07/firefox-l10n-report-aurora-54/ ***/
    // user_pref("dom.storageManager.enabled", false);
 
-/*** 2800: SHUTDOWN [SETUP-CHROME]
+/*** [SECTION 2800]: SHUTDOWN [SETUP-CHROME]
      You should set the values to what suits you best.
      - "Offline Website Data" includes appCache (2730), localStorage (2710),
        Service Worker cache (2740), and QuotaManager (IndexedDB (2720), asm-cache)
@@ -1508,7 +1508,7 @@ user_pref("privacy.cpd.siteSettings", false); // Site Preferences
  * blank value if they are used, but they do work as advertised ***/
 user_pref("privacy.sanitize.timeSpan", 0);
 
-/*** 4000: FIRST PARTY ISOLATION (FPI)
+/*** [SECTION 4000]: FIRST PARTY ISOLATION (FPI)
  ** 1278037 - isolate indexedDB (FF51+)
  ** 1277803 - isolate favicons (FF52+)
  ** 1264562 - isolate OCSP cache (FF52+)
@@ -1545,7 +1545,7 @@ user_pref("privacy.firstparty.isolate", true);
 user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // default: true
    // user_pref("privacy.firstparty.isolate.block_post_message", true); // (hidden pref)
 
-/*** 4500: privacy.resistFingerprinting (RFP)
+/*** [SECTION 4500]: privacy.resistFingerprinting (RFP)
    This master switch will be used for a wide range of items, many of which will
    **override** existing prefs from FF55+, often providing a **better** solution
 
@@ -1623,7 +1623,7 @@ user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // (hidde
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
 
-/*** 4600: RFP (4500) ALTERNATIVES
+/*** [SECTION 4600]: RFP (4500) ALTERNATIVES
    * IF you DO use RFP (see 4500) then you DO NOT need these redundant prefs. In fact,
      some even cause RFP to not behave as you would expect and alter your fingerprint.
      Make sure they are RESET in about:config as per your Firefox version
@@ -1700,7 +1700,7 @@ user_pref("webgl.enable-debug-renderer-info", false);
 // * * * /
 // ***/
 
-/*** 4700: RFP (4500) ALTERNATIVES - NAVIGATOR / USER AGENT (UA) SPOOFING
+/*** [SECTION 4700]: RFP (4500) ALTERNATIVES - NAVIGATOR / USER AGENT (UA) SPOOFING
      This is FYI ONLY. These prefs are INSUFFICIENT(a) on their own, you need
      to use RFP (4500) or an extension, in which case they become POINTLESS.
      (a) Many of the components that make up your UA can be derived by other means.
@@ -1727,7 +1727,7 @@ user_pref("_user.js.parrot", "4700 syntax error: the parrot's taken 'is last bow
 /* 4706: navigator.oscpu ***/
    // user_pref("general.oscpu.override", ""); // (hidden pref)
 
-/*** 5000: PERSONAL
+/*** [SECTION 5000]: PERSONAL
      Non-project related but useful. If any of these interest you, add them to your overrides ***/
 user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
 /* WELCOME & WHAT's NEW NOTICES ***/
@@ -1762,7 +1762,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("reader.parse-on-load.enabled", false); // "Reader View"
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 
-/*** 9999: DEPRECATED / REMOVED / LEGACY / RENAMED
+/*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
      Documentation denoted as [-]. Numbers may be re-used. See [1] for a link-clickable,
      viewer-friendly version of the deprecated bugzilla tickets. The original state of each pref
      has been preserved, or changed to match the current setup, but you are advised to review them.

From 67998eb4aff851bcc5ceacf7a0415cc18fbed723 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 4 Dec 2018 08:27:52 +0000
Subject: [PATCH 0135/1147] section naming convention consistency

---
 user.js | 20 ++++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)

diff --git a/user.js b/user.js
index f25edff..14966cd 100644
--- a/user.js
+++ b/user.js
@@ -51,7 +51,7 @@
      0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
      0900: PASSWORDS
      1000: CACHE
-     1200: HTTPS ( SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS )
+     1200: HTTPS (SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS)
      1400: FONTS
      1600: HEADERS / REFERERS
      1700: CONTAINERS
@@ -64,10 +64,10 @@
      2600: MISCELLANEOUS
      2700: PERSISTENT STORAGE
      2800: SHUTDOWN
-     4000: FIRST PARTY ISOLATION
-     4500: privacy.resistFingerprinting
-     4600: RFP (4500) ALTERNATIVES
-     4700: RFP (4500) ALTERNATIVES - NAVIGATOR / USER AGENT (UA) SPOOFING
+     4000: FPI (FIRST PARTY ISOLATION)
+     4500: RFP (RESIST FINGERPRINTING)
+     4600: RFP ALTERNATIVES
+     4700: RFP ALTERNATIVES (NAVIGATOR / USER AGENT (UA) SPOOFING)
      5000: PERSONAL
      9999: DEPRECATED / REMOVED / LEGACY / RENAMED
 
@@ -727,7 +727,7 @@ user_pref("browser.shell.shortcutFavicons", false);
 /* 1032: disable favicons in web notifications ***/
 user_pref("alerts.showFavicons", false); // default: false
 
-/*** [SECTION 1200]: HTTPS ( SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS )
+/*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS)
    Note that your cipher and other settings can be used server side as a fingerprint attack
    vector, see [1] (It's quite technical but the first part is easy to understand
    and you can stop reading when you reach the second section titled "Enter Bro")
@@ -1508,7 +1508,7 @@ user_pref("privacy.cpd.siteSettings", false); // Site Preferences
  * blank value if they are used, but they do work as advertised ***/
 user_pref("privacy.sanitize.timeSpan", 0);
 
-/*** [SECTION 4000]: FIRST PARTY ISOLATION (FPI)
+/*** [SECTION 4000]: FPI (FIRST PARTY ISOLATION)
  ** 1278037 - isolate indexedDB (FF51+)
  ** 1277803 - isolate favicons (FF52+)
  ** 1264562 - isolate OCSP cache (FF52+)
@@ -1545,7 +1545,7 @@ user_pref("privacy.firstparty.isolate", true);
 user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // default: true
    // user_pref("privacy.firstparty.isolate.block_post_message", true); // (hidden pref)
 
-/*** [SECTION 4500]: privacy.resistFingerprinting (RFP)
+/*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
    This master switch will be used for a wide range of items, many of which will
    **override** existing prefs from FF55+, often providing a **better** solution
 
@@ -1623,7 +1623,7 @@ user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // (hidde
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
 
-/*** [SECTION 4600]: RFP (4500) ALTERNATIVES
+/*** [SECTION 4600]: RFP ALTERNATIVES
    * IF you DO use RFP (see 4500) then you DO NOT need these redundant prefs. In fact,
      some even cause RFP to not behave as you would expect and alter your fingerprint.
      Make sure they are RESET in about:config as per your Firefox version
@@ -1700,7 +1700,7 @@ user_pref("webgl.enable-debug-renderer-info", false);
 // * * * /
 // ***/
 
-/*** [SECTION 4700]: RFP (4500) ALTERNATIVES - NAVIGATOR / USER AGENT (UA) SPOOFING
+/*** [SECTION 4700]: RFP ALTERNATIVES (NAVIGATOR / USER AGENT (UA) SPOOFING)
      This is FYI ONLY. These prefs are INSUFFICIENT(a) on their own, you need
      to use RFP (4500) or an extension, in which case they become POINTLESS.
      (a) Many of the components that make up your UA can be derived by other means.

From c4ec4dbc7780c03aa39b72214d97ba647c47df50 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 4 Dec 2018 08:34:36 +0000
Subject: [PATCH 0136/1147] move 0000 to personal #567

it has zero to do with privacy etc, and in fact most users will only ever encounter it once (and check the box) when they first go to about:config, so it's not even useful as an override or a new profile IMO. This removes one of three numbers that don't have a section
---
 user.js | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 14966cd..0ffa56e 100644
--- a/user.js
+++ b/user.js
@@ -80,9 +80,6 @@
  * [1] https://blog.mozilla.org/nnethercote/2018/03/09/a-new-preferences-parser-for-firefox/ ***/
 user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong with it?");
 
-/* 0000: disable about:config warning ***/
-user_pref("general.warnOnAboutConfig", false);
-
 /* 0001: start Firefox in PB (Private Browsing) mode
  * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
  * [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed
@@ -1741,6 +1738,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("browser.tabs.warnOnOpen", false);
    // user_pref("full-screen-api.warning.delay", 0);
    // user_pref("full-screen-api.warning.timeout", 0);
+   // user_pref("general.warnOnAboutConfig", false);
 /* APPEARANCE ***/
    // user_pref("browser.download.autohideButton", false); // (FF57+)
    // user_pref("toolkit.cosmeticAnimations.enabled", false); // (FF55+)

From 11b16c9c6d21cf9c8868d0f92c9bbf01da20cef4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 4 Dec 2018 08:51:19 +0000
Subject: [PATCH 0137/1147] move PB mode into STARTUP section #567

---
 user.js | 23 +++++++++++------------
 1 file changed, 11 insertions(+), 12 deletions(-)

diff --git a/user.js b/user.js
index 0ffa56e..7305d47 100644
--- a/user.js
+++ b/user.js
@@ -80,18 +80,6 @@
  * [1] https://blog.mozilla.org/nnethercote/2018/03/09/a-new-preferences-parser-for-firefox/ ***/
 user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong with it?");
 
-/* 0001: start Firefox in PB (Private Browsing) mode
- * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
- * [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed
- * [WARNING] The P in PB mode is misleading: it means no "persistent" local storage of history,
- * caches, searches or cookies (which you can achieve in normal mode). In fact, it limits or
- * removes the ability to control these, and you need to quit Firefox to clear them. PB is best
- * used as a one off window (File>New Private Window) to provide a temporary self-contained
- * new instance. Closing all Private Windows clears all traces. Repeat as required. PB also does
- * not allow indexedDB which breaks many Extensions that use it including uBlock Origin and uMatrix
- * [1] https://wiki.mozilla.org/Private_Browsing ***/
-   // user_pref("browser.privatebrowsing.autostart", true);
-
 /*** [SECTION 0100]: STARTUP ***/
 user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
 /* 0101: disable default browser check
@@ -126,6 +114,17 @@ user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket",
 user_pref("browser.newtabpage.activity-stream.showSponsored", false);
 /* 0105d: disable AS recent Highlights in the Library (FF57+) ***/
    // user_pref("browser.library.activity-stream.enabled", false);
+/* 0110: start Firefox in PB (Private Browsing) mode
+ * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
+ * [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed
+ * [WARNING] The P in PB mode is misleading: it means no "persistent" local storage of history,
+ * caches, searches or cookies (which you can achieve in normal mode). In fact, it limits or
+ * removes the ability to control these, and you need to quit Firefox to clear them. PB is best
+ * used as a one off window (File>New Private Window) to provide a temporary self-contained
+ * new instance. Closing all Private Windows clears all traces. Repeat as required. PB also does
+ * not allow indexedDB which breaks many Extensions that use it including uBlock Origin and uMatrix
+ * [1] https://wiki.mozilla.org/Private_Browsing ***/
+   // user_pref("browser.privatebrowsing.autostart", true);
 
 /*** [SECTION 0200]: GEOLOCATION ***/
 user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");

From 571be93ae0eafe65c150be491f369b9adfb167bc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 4 Dec 2018 10:26:44 +0000
Subject: [PATCH 0138/1147] proper case convention after tags

Can't believe I did this. Out of 32 `[setup*` and  9 `[warning]` tags (excluding the readme), I let one capital letter get past me, the bastard!
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 7305d47..14e2c7c 100644
--- a/user.js
+++ b/user.js
@@ -941,7 +941,7 @@ user_pref("network.http.referer.XOriginPolicy", 1);
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.XOriginTrimmingPolicy", 0);
 /* 1605: ALL: disable spoofing a referer
- * [WARNING] do not set this to true, as spoofing effectively disables the anti-CSRF
+ * [WARNING] Do not set this to true, as spoofing effectively disables the anti-CSRF
  * (Cross-Site Request Forgery) protections that some sites may rely on ***/
 user_pref("network.http.referer.spoofSource", false); // default: false
 /* 1606: ALL: set the default Referrer Policy

From 74f029566ecbd757abac025e1e7ec45add1ac6d6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 4 Dec 2018 10:34:02 +0000
Subject: [PATCH 0139/1147] enforce DOMHighResTimeStamp API #491

flipped true in FF54: https://bugzilla.mozilla.org/show_bug.cgi?id=1026804 but unsure when the pref itself was introduced. note: other timing prefs were always in 2400's see 4602: [2411] disable resource/navigation timing / 4603: [2412] disable timing attacks
---
 user.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/user.js b/user.js
index 14e2c7c..8033427 100644
--- a/user.js
+++ b/user.js
@@ -1208,6 +1208,9 @@ user_pref("dom.IntersectionObserver.enabled", false);
  * [1] https://github.com/tc39/ecmascript_sharedmem/blob/master/TUTORIAL.md
  * [2] https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ ***/
 user_pref("javascript.options.shared_memory", false);
+/* 2428: enforce DOMHighResTimeStamp API
+ * [WARNING] Required for normalization of timestamps and any timer resolution mitigations ***/
+user_pref("dom.event.highrestimestamp.enabled", true); // default: true
 
 /*** [SECTION 2500]: HARDWARE FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");

From 91fed43fc7dcec01017b0cb7710cd272e168751a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 5 Dec 2018 20:36:20 +0000
Subject: [PATCH 0140/1147] 0703 atl-svc, better ref, #571

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 8033427..df2c47e 100644
--- a/user.js
+++ b/user.js
@@ -468,7 +468,7 @@ user_pref("network.http.spdy.enabled", false);
 user_pref("network.http.spdy.enabled.deps", false);
 user_pref("network.http.spdy.enabled.http2", false);
 /* 0703: disable HTTP Alternative Services (FF37+)
- * [1] https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/#comment-3970881
+ * [1] https://tools.ietf.org/html/rfc7838#section-9
  * [2] https://www.mnot.net/blog/2016/03/09/alt-svc ***/
 user_pref("network.http.altsvc.enabled", false);
 user_pref("network.http.altsvc.oe", false);

From 0a87c99a0ecb8ac28b734b63f1a1349514ba6a97 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 5 Dec 2018 20:58:07 +0000
Subject: [PATCH 0141/1147] 1203: ssl session ids are 24hrs

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index df2c47e..3e0626d 100644
--- a/user.js
+++ b/user.js
@@ -752,7 +752,7 @@ user_pref("security.ssl.require_safe_negotiation", true);
    // user_pref("security.tls.version.min", 3);
 user_pref("security.tls.version.max", 4); // 4 = allow up to and including TLS 1.3
 /* 1203: disable SSL session tracking (FF36+)
- * SSL Session IDs speed up HTTPS connections (no need to renegotiate) and last for 48hrs.
+ * SSL Session IDs speed up HTTPS connections (no need to renegotiate) and last for 24hrs.
  * Since the ID is unique, web servers can (and do) use it for tracking. If set to true,
  * this disables sending SSL Session IDs and TLS Session Tickets to prevent session tracking
  * [1] https://tools.ietf.org/html/rfc5077

From 8313f2e01a17907b564d20c9829b4e7c2499d803 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 6 Dec 2018 05:41:25 +0000
Subject: [PATCH 0142/1147] 1020: fix description

Session Restore cannot be disabled in Normal mode, it is also used internally. FYI: PB Mode does not use Session Restore. The description is still not 100%, as it refers to what is restored, not what is kept in the recovery.jsonlz4 (at least for tabs)
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 3e0626d..d3d2248 100644
--- a/user.js
+++ b/user.js
@@ -688,7 +688,7 @@ user_pref("browser.cache.disk_cache_ssl", false);
    // user_pref("network.dnsCacheEntries", 400);
    // user_pref("network.dnsCacheExpiration", 60);
 /** SESSIONS & SESSION RESTORE ***/
-/* 1020: disable the Session Restore service completely
+/* 1020: limit Session Restore to last active tab and window
  * [SETUP-CHROME] This also disables the "Recently Closed Tabs" feature
  * It does not affect "Recently Closed Windows" or any history. ***/
 user_pref("browser.sessionstore.max_tabs_undo", 0);

From 786839ffc17c6aa2d00119c330eb437f21231e8c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 6 Dec 2018 08:16:01 +0000
Subject: [PATCH 0143/1147] 2701: fix split multi-[notes]

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index d3d2248..af8dfd3 100644
--- a/user.js
+++ b/user.js
@@ -1395,8 +1395,8 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * You can set exceptions under site permissions or use an extension
  * 0=Accept cookies and site data, 1=Block third-party cookies, 2=Block all cookies,
  * 3=Block cookies from unvisited sites, 4=Block third-party trackers (FF63+)
- * [NOTE] value 4 is tied to the Tracking Protection lists so make sure you have 0424 + 0425 on default values!
  * [SETTING] Privacy & Security>Cookies and Site Data>Type blocked
+ * [NOTE] value 4 is tied to the Tracking Protection lists so make sure you have 0424 + 0425 on default values!
  * [NOTE] Blocking 3rd party controls 3rd party access to localStorage, IndexedDB, Cache API and Service Worker Cache.
  * Blocking 1st party controls access to localStorage and IndexedDB (note: Service Workers can still use IndexedDB).
  * [1] https://www.fxsitecompat.com/en-CA/docs/2015/web-storage-indexeddb-cache-api-now-obey-third-party-cookies-preference/ ***/

From b85668c2cd4a24caac21329033c3b6652fb17321 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 8 Dec 2018 04:10:13 +1300
Subject: [PATCH 0144/1147] make description & info & notes concurrent #574

---
 user.js | 50 +++++++++++++++++++++++++-------------------------
 1 file changed, 25 insertions(+), 25 deletions(-)

diff --git a/user.js b/user.js
index af8dfd3..2dc9302 100644
--- a/user.js
+++ b/user.js
@@ -115,7 +115,6 @@ user_pref("browser.newtabpage.activity-stream.showSponsored", false);
 /* 0105d: disable AS recent Highlights in the Library (FF57+) ***/
    // user_pref("browser.library.activity-stream.enabled", false);
 /* 0110: start Firefox in PB (Private Browsing) mode
- * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
  * [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed
  * [WARNING] The P in PB mode is misleading: it means no "persistent" local storage of history,
  * caches, searches or cookies (which you can achieve in normal mode). In fact, it limits or
@@ -123,6 +122,7 @@ user_pref("browser.newtabpage.activity-stream.showSponsored", false);
  * used as a one off window (File>New Private Window) to provide a temporary self-contained
  * new instance. Closing all Private Windows clears all traces. Repeat as required. PB also does
  * not allow indexedDB which breaks many Extensions that use it including uBlock Origin and uMatrix
+ * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
  * [1] https://wiki.mozilla.org/Private_Browsing ***/
    // user_pref("browser.privatebrowsing.autostart", true);
 
@@ -399,9 +399,9 @@ user_pref("extensions.pocket.enabled", false);
  * [3] https://bugzilla.mozilla.org/863246#c154 ***/
 user_pref("browser.onboarding.enabled", false);
 /* 0517: disable Form Autofill (FF55+)
- * [SETTING] Privacy & Security>Forms & Passwords>Autofill addresses
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
+ * [SETTING] Privacy & Security>Forms & Passwords>Autofill addresses
  * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill
  * [2] https://www.ghacks.net/2017/05/24/firefoxs-new-form-autofill-is-awesome/ ***/
 user_pref("extensions.formautofill.addresses.enabled", false);
@@ -561,8 +561,8 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
  * If you enforce any of the suggestion types, you MUST enforce 'autocomplete'
  *   - If *ALL* of the suggestion types are false, 'autocomplete' must also be false
  *   - If *ANY* of the suggestion types are true, 'autocomplete' must also be true
- * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest
- * [SETUP-CHROME] If all three suggestion types are false, search engine keywords are disabled ***/
+ * [SETUP-CHROME] If all three suggestion types are false, search engine keywords are disabled
+ * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest ***/
 user_pref("browser.urlbar.autocomplete.enabled", false);
 user_pref("browser.urlbar.suggest.history", false);
 user_pref("browser.urlbar.suggest.bookmark", false);
@@ -572,7 +572,7 @@ user_pref("browser.urlbar.suggest.openpage", false);
  * [NOTE] Items (bookmarks/history/openpages) with a high "frecency"/"bonus" will always
  * be displayed (no we do not know how these are calculated or what the threshold is),
  * and this does not affect the search by search engine suggestion (see 0808)
- * [USAGE] This setting is only useful if you want to enable search engine keywords
+ * [NOTE] This setting is only useful if you want to enable search engine keywords
  * (i.e. at least one of 0850a suggestion types must be true) but you want to *limit* suggestions shown ***/
    // user_pref("browser.urlbar.maxRichResults", 0);
 /* 0850d: disable location bar autofill
@@ -585,12 +585,12 @@ user_pref("browser.urlbar.oneOffSearches", false);
  * [1] https://bugzilla.mozilla.org/1181644 ***/
 user_pref("browser.urlbar.maxHistoricalSearchSuggestions", 0); // max. number of search suggestions
 /* 0860: disable search and form history
- * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
- * [NOTE] You can clear formdata on exiting Firefox (see 2803) ***/
+ * [NOTE] You can clear formdata on exiting Firefox (see 2803)
+ * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history ***/
 user_pref("browser.formfill.enable", false);
 /* 0862: disable browsing and download history
- * [SETTING] Privacy & Security>History>Custom Settings>Remember browsing and download history
- * [NOTE] You can clear history and downloads on exiting Firefox (see 2803) ***/
+ * [NOTE] You can clear history and downloads on exiting Firefox (see 2803)
+ * [SETTING] Privacy & Security>History>Custom Settings>Remember browsing and download history ***/
    // user_pref("places.history.enabled", false);
 /* 0864: disable date/time picker (FF57+ default true)
  * This can leak your locale if not en-US
@@ -607,8 +607,8 @@ user_pref("browser.taskbar.previews.enable", false);
 /*** [SECTION 0900]: PASSWORDS ***/
 user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
 /* 0901: disable saving passwords
- * [SETTING] Privacy & Security>Forms & Passwords>Ask to save logins and passwords for websites
- * [NOTE] This does not clear any passwords already saved ***/
+ * [NOTE] This does not clear any passwords already saved
+ * [SETTING] Privacy & Security>Forms & Passwords>Ask to save logins and passwords for websites ***/
    // user_pref("signon.rememberSignons", false);
 /* 0902: use a master password (recommended if you save passwords)
  * There are no preferences for this. It is all handled internally.
@@ -871,12 +871,12 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 /* 1401: disable websites choosing fonts (0=block, 1=allow)
  * If you disallow fonts, this drastically limits/reduces font
  * enumeration (by JS) which is a high entropy fingerprinting vector.
- * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Allow pages to choose...
- * [NOTE] Disabling fonts can uglify the web a fair bit. ***/
+ * [NOTE] Disabling fonts can uglify the web a fair bit.
+ * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Allow pages to choose... ***/
 user_pref("browser.display.use_document_fonts", 0);
 /* 1402: set more legible default fonts
- * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Serif|Sans-serif|Monospace
- * [NOTE] Example below for Windows/Western only ***/
+ * [NOTE] Example below for Windows/Western only
+ * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Serif|Sans-serif|Monospace ***/
    // user_pref("font.name.serif.x-unicode", "Georgia");
    // user_pref("font.name.serif.x-western", "Georgia"); // default: Times New Roman
    // user_pref("font.name.sans-serif.x-unicode", "Arial");
@@ -958,8 +958,8 @@ user_pref("network.http.referer.defaultPolicy.pbmode", 2); // (FF59+) default: 2
  * [1] https://bugzilla.mozilla.org/1305144 ***/
 user_pref("network.http.referer.hideOnionSource", true);
 /* 1610: ALL: enable the DNT (Do Not Track) HTTP header
- * [SETTING] Privacy & Security>Content Blocking>Send websites a "Do Not Track"...
- * [NOTE] DNT is enforced with TP (see 0420) regardless of this pref ***/
+ * [NOTE] DNT is enforced with TP (see 0420) regardless of this pref
+ * [SETTING] Privacy & Security>Content Blocking>Send websites a "Do Not Track"... ***/
 user_pref("privacy.donottrackheader.enabled", true);
 
 /*** [SECTION 1700]: CONTAINERS
@@ -1231,9 +1231,9 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * [2] https://developer.mozilla.org/docs/Web/API/MediaDevices/enumerateDevices ***/
 user_pref("media.navigator.enabled", false);
 /* 2508: disable hardware acceleration to reduce graphics fingerprinting
- * [SETTING] General>Performance>Custom>Use hardware acceleration when available
  * [SETUP-PERF] Affects text rendering (fonts will look different), impacts video performance,
  * and parts of Quantum that utilize the GPU will also be affected as they are rolled out
+ * [SETTING] General>Performance>Custom>Use hardware acceleration when available
  * [1] https://wiki.mozilla.org/Platform/GFX/HardwareAcceleration ***/
    // user_pref("gfx.direct2d.disabled", true); // [WINDOWS]
 user_pref("layers.acceleration.disabled", true);
@@ -1297,8 +1297,8 @@ user_pref("middlemouse.contentLoadURL", false);
  * To control HTML Meta tag and JS redirects, use an extension. Default is 20 ***/
 user_pref("network.http.redirection-limit", 10);
 /* 2615: disable websites overriding Firefox's keyboard shortcuts (FF58+)
- * [SETTING] to add site exceptions: Page Info>Permissions>Override Keyboard Shortcuts
- * [NOTE] At the time of writing, causes issues with delete and backspace keys ***/
+ * [NOTE] At the time of writing, causes issues with delete and backspace keys
+ * [SETTING] to add site exceptions: Page Info>Permissions>Override Keyboard Shortcuts ***/
    // user_pref("permissions.default.shortcuts", 2); //  0 (default) or 1=allow, 2=block
 /* 2616: remove special permissions for certain mozilla domains (FF35+)
  * [1] resource://app/defaults/permissions ***/
@@ -1319,7 +1319,6 @@ user_pref("ui.use_standins_for_native_colors", true); // (hidden pref)
  * [4] https://www.xudongz.com/blog/2017/idn-phishing/ ***/
 user_pref("network.IDN_show_punycode", true);
 /* 2620: enable Firefox's built-in PDF reader
- * [SETTING] General>Applications>Portable Document Format (PDF)
  * This setting controls if the option "Display in Firefox" in the above setting is available
  *   and by effect controls whether PDFs are handled in-browser or externally ("Ask" or "Open With")
  * PROS: pdfjs is lightweight, open source, and as secure/vetted as any pdf reader out there (more than most)
@@ -1327,7 +1326,8 @@ user_pref("network.IDN_show_punycode", true);
  *   It doesn't break "state separation" of browser content (by not sharing with OS, independent apps).
  *   It maintains disk avoidance and application data isolation. It's convenient. You can still save to disk.
  * CONS: You may prefer a different pdf reader for security reasons
- * CAVEAT: JS can still force a pdf to open in-browser by bundling its own code (rare) ***/
+ * CAVEAT: JS can still force a pdf to open in-browser by bundling its own code (rare)
+ * [SETTING] General>Applications>Portable Document Format (PDF) ***/
 user_pref("pdfjs.disabled", false);
 
 /** DOWNLOADS ***/
@@ -1395,10 +1395,10 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * You can set exceptions under site permissions or use an extension
  * 0=Accept cookies and site data, 1=Block third-party cookies, 2=Block all cookies,
  * 3=Block cookies from unvisited sites, 4=Block third-party trackers (FF63+)
- * [SETTING] Privacy & Security>Cookies and Site Data>Type blocked
  * [NOTE] value 4 is tied to the Tracking Protection lists so make sure you have 0424 + 0425 on default values!
  * [NOTE] Blocking 3rd party controls 3rd party access to localStorage, IndexedDB, Cache API and Service Worker Cache.
  * Blocking 1st party controls access to localStorage and IndexedDB (note: Service Workers can still use IndexedDB).
+ * [SETTING] Privacy & Security>Cookies and Site Data>Type blocked
  * [1] https://www.fxsitecompat.com/en-CA/docs/2015/web-storage-indexeddb-cache-api-now-obey-third-party-cookies-preference/ ***/
 user_pref("network.cookie.cookieBehavior", 1);
 /* 2702: set third-party cookies (i.e ALL) (if enabled, see above pref) to session-only
@@ -1467,11 +1467,11 @@ user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!"
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
 /* 2803: set what history items to clear on shutdown
- * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes>Settings
  * [NOTE] If 'history' is true, downloads will also be cleared regardless of the value
  * but if 'history' is false, downloads can still be cleared independently
  * However, this may not always be the case. The interface combines and syncs these
- * prefs when set from there, and the sanitize code may change at any time ***/
+ * prefs when set from there, and the sanitize code may change at any time
+ * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes>Settings ***/
 user_pref("privacy.clearOnShutdown.cache", true);
 user_pref("privacy.clearOnShutdown.cookies", true);
 user_pref("privacy.clearOnShutdown.downloads", true); // see note above

From 0a67cdec8bac0d2172a2ffbf92af4e093c8e8275 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Dec 2018 07:18:26 +1300
Subject: [PATCH 0145/1147] #578 cleanups (#576)

- cleanup of tags placement, order consistency, and to use square brackets (allows usage elsewhere to not get tagged, eg 1402)
- other bits and bobs
---
 user.js | 518 ++++++++++++++++++++++++++++----------------------------
 1 file changed, 262 insertions(+), 256 deletions(-)

diff --git a/user.js b/user.js
index 2dc9302..54cc2d4 100644
--- a/user.js
+++ b/user.js
@@ -112,7 +112,7 @@ user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // [SETTI
 user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false); // [SETTING]
 user_pref("browser.newtabpage.activity-stream.showSponsored", false);
-/* 0105d: disable AS recent Highlights in the Library (FF57+) ***/
+/* 0105d: disable AS recent Highlights in the Library [FF57+] ***/
    // user_pref("browser.library.activity-stream.enabled", false);
 /* 0110: start Firefox in PB (Private Browsing) mode
  * [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed
@@ -131,20 +131,21 @@ user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely decease
 /* 0201: disable Location-Aware Browsing
  * [1] https://www.mozilla.org/firefox/geolocation/ ***/
    // user_pref("geo.enabled", false);
-/* 0201b: set a default permission for Location (FF58+)
+/* 0201b: set a default permission for Location [FF58+]
+ * 0=always ask (default), 1=allow, 2=block
  * [NOTE] best left at default "always ask", fingerprintable via Permissions API
  * [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
-   // user_pref("permissions.default.geo", 2); // 0=always ask (default), 1=allow, 2=block
+   // user_pref("permissions.default.geo", 2);
 /* 0202: disable GeoIP-based search results
  * [NOTE] May not be hidden if Firefox has changed your settings due to your locale
  * [1] https://trac.torproject.org/projects/tor/ticket/16254
  * [2] https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections#w_geolocation-for-default-search-engine ***/
-user_pref("browser.search.region", "US"); // (hidden pref)
+user_pref("browser.search.region", "US"); // [HIDDEN PREF]
 user_pref("browser.search.geoip.url", "");
-/* 0205: set OS & APP locale (FF59+)
+/* 0205: set OS & APP locale [FF59+]
  * If set to empty, the OS locales are used. If not set at all, default locale is used ***/
-user_pref("intl.locale.requested", "en-US"); // (hidden pref)
+user_pref("intl.locale.requested", "en-US"); // [HIDDEN PREF]
 /* 0206: disable geographically specific results/search engines e.g. "browser.search.*.US"
  * i.e. ignore all of Mozilla's various search engines in multiple locales ***/
 user_pref("browser.search.geoSpecificDefaults", false);
@@ -153,14 +154,14 @@ user_pref("browser.search.geoSpecificDefaults.url", "");
 user_pref("intl.accept_languages", "en-US, en");
 /* 0208: enforce US English locale regardless of the system locale
  * [1] https://bugzilla.mozilla.org/867501 ***/
-user_pref("javascript.use_us_english_locale", true); // (hidden pref)
-/* 0209: use APP locale over OS locale in regional preferences (FF56+)
+user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
+/* 0209: use APP locale over OS locale in regional preferences [FF56+] 
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1379420,1364789 ***/
 user_pref("intl.regional_prefs.use_os_locales", false);
 /* 0210: use Mozilla geolocation service instead of Google when geolocation is enabled
  * Optionally enable logging to the console (defaults to false) ***/
 user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
-   // user_pref("geo.wifi.logging.enabled", true); // (hidden pref)
+   // user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
 
 /*** [SECTION 0300]: QUIET FOX
      We choose to not disable auto-CHECKs (0301's) but to disable auto-INSTALLs (0302's).
@@ -198,7 +199,7 @@ user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
 /* 0310: disable sending the URL of the website where a plugin crashed ***/
 user_pref("dom.ipc.plugins.reportCrashURL", false);
 /* 0320: disable about:addons' Get Add-ons panel (uses Google-Analytics) ***/
-user_pref("extensions.getAddons.showPane", false); // hidden pref
+user_pref("extensions.getAddons.showPane", false); // [HIDDEN PREF]
 user_pref("extensions.webservice.discoverURL", "");
 /* 0330: disable telemetry
  * the pref (.unified) affects the behaviour of the pref (.enabled)
@@ -214,29 +215,29 @@ user_pref("toolkit.telemetry.enabled", false); // see [NOTE] above FF58+
 user_pref("toolkit.telemetry.server", "data:,");
 user_pref("toolkit.telemetry.archive.enabled", false);
 user_pref("toolkit.telemetry.cachedClientID", "");
-user_pref("toolkit.telemetry.newProfilePing.enabled", false); // (FF55+)
-user_pref("toolkit.telemetry.shutdownPingSender.enabled", false); // (FF55+)
-user_pref("toolkit.telemetry.updatePing.enabled", false); // (FF56+)
-user_pref("toolkit.telemetry.bhrPing.enabled", false); // (FF57+) Background Hang Reporter
-user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // (FF57+)
-user_pref("toolkit.telemetry.hybridContent.enabled", false); // (FF59+)
+user_pref("toolkit.telemetry.newProfilePing.enabled", false); // [FF55+]
+user_pref("toolkit.telemetry.shutdownPingSender.enabled", false); // [FF55+]
+user_pref("toolkit.telemetry.updatePing.enabled", false); // [FF56+]
+user_pref("toolkit.telemetry.bhrPing.enabled", false); // [FF57+] Background Hang Reporter
+user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // [FF57+]
+user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+]
 /* 0333: disable health report
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send technical... data ***/
 user_pref("datareporting.healthreport.uploadEnabled", false);
-/* 0334: disable new data submission, master kill switch (FF41+)
+/* 0334: disable new data submission, master kill switch [FF41+]
  * If disabled, no policy is shown or upload takes place, ever
  * [1] https://bugzilla.mozilla.org/1195552 ***/
 user_pref("datareporting.policy.dataSubmissionEnabled", false);
 /* 0350: disable crash reports ***/
 user_pref("breakpad.reportURL", "");
-/* 0351: disable sending of crash reports (FF44+) ***/
-user_pref("browser.tabs.crashReporting.sendReport", false);
-user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // (FF51+)
-user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // (FF58+)
+/* 0351: disable sending of crash reports ***/
+user_pref("browser.tabs.crashReporting.sendReport", false); // [FF44+]
+user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // [FF51+]
+user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [FF58+]
 /* 0370: disable "Snippets" (Mozilla content shown on about:home screen)
  * [1] https://wiki.mozilla.org/Firefox/Projects/Firefox_Start/Snippet_Service ***/
 user_pref("browser.aboutHomeSnippets.updateUrl", "data:,");
-/* 0380: disable Browser Error Reporter (FF60+)
+/* 0380: disable Browser Error Reporter [FF60+]
  * [1] https://support.mozilla.org/en-US/kb/firefox-nightly-error-collection
  * [2] https://firefox-source-docs.mozilla.org/browser/browser/BrowserErrorReporter.html ***/
 user_pref("browser.chrome.errorReporter.enabled", false);
@@ -258,7 +259,7 @@ user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
  * [NOTE] It includes updates for "revoked certificates"
  * [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/
  * [2] https://trac.torproject.org/projects/tor/ticket/16931 ***/
-user_pref("extensions.blocklist.enabled", true); // default: true
+user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
 user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
 /* 0403: disable individual unwanted/unneeded parts of the Kinto blocklists
  * What is Kinto?: https://wiki.mozilla.org/Firefox/Kinto#Specifications
@@ -279,40 +280,43 @@ user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozi
     SB v4 (FF57+) doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
     #Required reading [#] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
     [1] https://wiki.mozilla.org/Security/Safe_Browsing ***/
-/* 0410: disable "Block dangerous and deceptive content" (under Options>Privacy & Security)
- * This covers deceptive sites such as phishing and social engineering ***/
+/* 0410: disable "Block dangerous and deceptive content"
+ * This covers deceptive sites such as phishing and social engineering
+ * [SETTING] Privacy & Security>Security>Deceptive Content and Software Protection ***/
    // user_pref("browser.safebrowsing.malware.enabled", false);
-   // user_pref("browser.safebrowsing.phishing.enabled", false); // (FF50+)
-/* 0411: disable "Block dangerous downloads" (under Options>Privacy & Security)
- * This covers malware and PUPs (potentially unwanted programs) ***/
+   // user_pref("browser.safebrowsing.phishing.enabled", false); // [FF50+]
+/* 0411: disable "Block dangerous downloads"
+ * This covers malware and PUPs (potentially unwanted programs)
+ * [SETTING] Privacy & Security>Security>Deceptive Content and Software Protection ***/
    // user_pref("browser.safebrowsing.downloads.enabled", false);
-/* 0412: disable "Warn me about unwanted and uncommon software" (under Options>Privacy & Security) (FF48+) ***/
-   // user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
-   // user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
-   // user_pref("browser.safebrowsing.downloads.remote.block_dangerous", false); // (FF49+)
-   // user_pref("browser.safebrowsing.downloads.remote.block_dangerous_host", false); // (FF49+)
+/* 0412: disable "Warn me about unwanted and uncommon software"
+ * [SETTING] Privacy & Security>Security>Deceptive Content and Software Protection ***/
+   // user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false); // [FF48+]
+   // user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false); // [FF48+]
+   // user_pref("browser.safebrowsing.downloads.remote.block_dangerous", false); // [FF49+]
+   // user_pref("browser.safebrowsing.downloads.remote.block_dangerous_host", false); // [FF49+]
 /* 0413: disable Google safebrowsing updates ***/
    // user_pref("browser.safebrowsing.provider.google.updateURL", "");
    // user_pref("browser.safebrowsing.provider.google.gethashURL", "");
-   // user_pref("browser.safebrowsing.provider.google4.updateURL", ""); // (FF50+)
-   // user_pref("browser.safebrowsing.provider.google4.gethashURL", ""); // (FF50+)
+   // user_pref("browser.safebrowsing.provider.google4.updateURL", ""); // [FF50+]
+   // user_pref("browser.safebrowsing.provider.google4.gethashURL", ""); // [FF50+]
 /* 0414: disable binaries NOT in local lists being checked by Google (real-time checking) ***/
 user_pref("browser.safebrowsing.downloads.remote.enabled", false);
 user_pref("browser.safebrowsing.downloads.remote.url", "");
 /* 0415: disable reporting URLs ***/
 user_pref("browser.safebrowsing.provider.google.reportURL", "");
 user_pref("browser.safebrowsing.reportPhishURL", "");
-user_pref("browser.safebrowsing.provider.google4.reportURL", ""); // (FF50+)
-user_pref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", ""); // (FF54+)
-user_pref("browser.safebrowsing.provider.google.reportPhishMistakeURL", ""); // (FF54+)
-user_pref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", ""); // (FF54+)
-user_pref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", ""); // (FF54+)
-/* 0416: disable 'ignore this warning' on Safe Browsing warnings which when clicked
- * bypasses the block for that session. This is a means for admins to enforce SB
+user_pref("browser.safebrowsing.provider.google4.reportURL", ""); // [FF50+]
+user_pref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", ""); // [FF54+]
+user_pref("browser.safebrowsing.provider.google.reportPhishMistakeURL", ""); // [FF54+]
+user_pref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", ""); // [FF54+]
+user_pref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", ""); // [FF54+]
+/* 0416: disable 'ignore this warning' on Safe Browsing warnings
+ * If clicked, it bypasses the block for that session. This is a means for admins to enforce SB
  * [TEST] see github wiki APPENDIX A: Test Sites: Section 5
  * [1] https://bugzilla.mozilla.org/1226490 ***/
    // user_pref("browser.safebrowsing.allowOverride", false);
-/* 0417: disable data sharing (FF58+) ***/
+/* 0417: disable data sharing [FF58+] ***/
 user_pref("browser.safebrowsing.provider.google4.dataSharing.enabled", false);
 user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
 
@@ -323,28 +327,28 @@ user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
  * [NOTE] TP sends DNT headers regardless of the DNT pref (see 1610)
  * [1] https://wiki.mozilla.org/Security/Tracking_protection
  * [2] https://support.mozilla.org/kb/tracking-protection-firefox ***/
-   // user_pref("privacy.trackingprotection.pbmode.enabled", true); // default: true
+   // user_pref("privacy.trackingprotection.pbmode.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.enabled", true);
 /* 0422: set which Tracking Protection block list to use
  * [WARNING] We don't recommend enforcing this from here, as available block lists can change
  * [SETTING] Privacy & Security>Content Blocking>All Detected Trackers>Change block list ***/
    // user_pref("urlclassifier.trackingTable", "test-track-simple,base-track-digest256"); // basic
-/* 0423: disable Mozilla's blocklist for known Flash tracking/fingerprinting (FF48+)
+/* 0423: disable Mozilla's blocklist for known Flash tracking/fingerprinting [FF48+]
  * [1] https://www.ghacks.net/2016/07/18/firefox-48-blocklist-against-plugin-fingerprinting/
  * [2] https://bugzilla.mozilla.org/1237198 ***/
    // user_pref("browser.safebrowsing.blockedURIs.enabled", false);
 /* 0424: disable Mozilla's tracking protection and Flash blocklist updates ***/
    // user_pref("browser.safebrowsing.provider.mozilla.gethashURL", "");
    // user_pref("browser.safebrowsing.provider.mozilla.updateURL", "");
-/* 0425: disable passive Tracking Protection (FF53+)
+/* 0425: disable passive Tracking Protection [FF53+]
  * Passive TP annotates channels to lower the priority of network loads for resources on the tracking protection list
  * [NOTE] It has no effect if TP is enabled, but keep in mind that by default TP is only enabled in Private Windows
  * This is included for people who want to completely disable Tracking Protection.
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1170190,1141814 ***/
    // user_pref("privacy.trackingprotection.annotate_channels", false);
    // user_pref("privacy.trackingprotection.lower_network_priority", false);
-/* 0426: enforce Content Blocking (required to block cookies) (FF63+) ***/
-user_pref("browser.contentblocking.enabled", true); // default: true
+/* 0426: enforce Content Blocking (required to block cookies) [FF63+] ***/
+user_pref("browser.contentblocking.enabled", true); // [DEFAULT: true]
 
 /*** [SECTION 0500]: SYSTEM ADD-ONS / EXPERIMENTS
      System Add-ons are a method for shipping extensions, considered to be
@@ -365,7 +369,7 @@ user_pref("browser.contentblocking.enabled", true); // default: true
 user_pref("_user.js.parrot", "0500 syntax error: the parrot's cashed in 'is chips!");
 /* 0502: disable Mozilla permission to silently opt you into tests ***/
 user_pref("network.allow-experiments", false);
-/* 0503: disable Normandy/Shield (FF60+)
+/* 0503: disable Normandy/Shield [FF60+]
  * Shield is an telemetry system (including Heartbeat) that can also push and test "recipes"
  * [1] https://wiki.mozilla.org/Firefox/Shield
  * [2] https://github.com/mozilla/normandy ***/
@@ -374,23 +378,23 @@ user_pref("app.normandy.api_url", "");
 user_pref("app.shield.optoutstudies.enabled", false);
 /* 0505: disable System Add-on updates
  * [NOTE] In FF61 and lower, you will not get any System Add-on updates except when you update Firefox ***/
-   // user_pref("extensions.systemAddon.update.enabled", false); // (FF62+)
+   // user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
    // user_pref("extensions.systemAddon.update.url", "");
-/* 0506: disable PingCentre telemetry (used in several System Add-ons) (FF57+)
+/* 0506: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
  * Currently blocked by 'datareporting.healthreport.uploadEnabled' (see 0333) ***/
 user_pref("browser.ping-centre.telemetry", false);
-/* 0510: disable Pocket (FF39+)
+/* 0510: disable Pocket [FF46+]
  * Pocket is a third party (now owned by Mozilla) "save for later" cloud service
  * [1] https://en.wikipedia.org/wiki/Pocket_(application)
  * [2] https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/ ***/
 user_pref("extensions.pocket.enabled", false);
-/* 0515: disable Screenshots (FF55+)
+/* 0515: disable Screenshots
  * alternatively in FF60+, disable uploading to the Screenshots server
  * [1] https://github.com/mozilla-services/screenshots
  * [2] https://www.ghacks.net/2017/05/28/firefox-screenshots-integrated-in-firefox-nightly/ ***/
-   // user_pref("extensions.screenshots.disabled", true);
-   // user_pref("extensions.screenshots.upload-disabled", true); // (FF60+)
-/* 0516: disable Onboarding (FF55+)
+   // user_pref("extensions.screenshots.disabled", true); // [FF55+]
+   // user_pref("extensions.screenshots.upload-disabled", true); // [FF60+]
+/* 0516: disable Onboarding [FF55+]
  * Onboarding is an interactive tour/setup for new installs/profiles and features. Every time
  * about:home or about:newtab is opened, the onboarding overlay is injected into that page
  * [NOTE] Onboarding uses Google Analytics [2], and leaks resource://URIs [3]
@@ -398,17 +402,17 @@ user_pref("extensions.pocket.enabled", false);
  * [2] https://github.com/mozilla/onboard/commit/db4d6c8726c89a5d6a241c1b1065827b525c5baf
  * [3] https://bugzilla.mozilla.org/863246#c154 ***/
 user_pref("browser.onboarding.enabled", false);
-/* 0517: disable Form Autofill (FF55+)
+/* 0517: disable Form Autofill
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
  * [SETTING] Privacy & Security>Forms & Passwords>Autofill addresses
  * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill
  * [2] https://www.ghacks.net/2017/05/24/firefoxs-new-form-autofill-is-awesome/ ***/
-user_pref("extensions.formautofill.addresses.enabled", false);
-user_pref("extensions.formautofill.available", "off"); // (FF56+)
-user_pref("extensions.formautofill.creditCards.enabled", false); // (FF56+)
-user_pref("extensions.formautofill.heuristics.enabled", false);
-/* 0518: disable Web Compatibility Reporter (FF56+)
+user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
+user_pref("extensions.formautofill.available", "off"); // [FF56+]
+user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
+user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
+/* 0518: disable Web Compatibility Reporter [FF56+]
  * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla ***/
 user_pref("extensions.webcompat-reporter.enabled", false);
 
@@ -421,7 +425,7 @@ user_pref("network.prefetch-next", false);
  * [1] https://www.ghacks.net/2013/04/27/firefox-prefetching-what-you-need-to-know/
  * [2] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
 user_pref("network.dns.disablePrefetch", true);
-user_pref("network.dns.disablePrefetchFromHTTPS", true); // (hidden pref)
+user_pref("network.dns.disablePrefetchFromHTTPS", true); // [HIDDEN PREF]
 /* 0603a: disable Seer/Necko
  * [1] https://developer.mozilla.org/docs/Mozilla/Projects/Necko ***/
 user_pref("network.predictor.enabled", false);
@@ -430,7 +434,7 @@ user_pref("network.predictor.enabled", false);
  * [2] https://wiki.mozilla.org/Necko/CaptivePortal
  * [3] https://trac.torproject.org/projects/tor/ticket/21790 ***/
 user_pref("captivedetect.canonicalURL", "");
-user_pref("network.captive-portal-service.enabled", false); // (FF52+)
+user_pref("network.captive-portal-service.enabled", false); // [FF52+]
 /* 0605: disable link-mouseover opening connection to linked server
  * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests
  * [2] https://www.ghacks.net/2015/08/16/block-firefox-from-connecting-to-sites-when-you-hover-over-links/ ***/
@@ -443,7 +447,7 @@ user_pref("browser.send_pings.require_same_host", true);
 /* 0607: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS]
  * [1] https://www.ghacks.net/2016/03/25/block-firefox-chrome-windows-store/ ***/
 user_pref("network.protocol-handler.external.ms-windows-store", false);
-/* 0608: disable predictor / prefetching (FF48+) ***/
+/* 0608: disable predictor / prefetching [FF48+] ***/
 user_pref("network.predictor.enable-prefetch", false);
 
 /*** [SECTION 0700]: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
@@ -467,7 +471,7 @@ user_pref("network.dns.disableIPv6", true);
 user_pref("network.http.spdy.enabled", false);
 user_pref("network.http.spdy.enabled.deps", false);
 user_pref("network.http.spdy.enabled.http2", false);
-/* 0703: disable HTTP Alternative Services (FF37+)
+/* 0703: disable HTTP Alternative Services [FF37+]
  * [1] https://tools.ietf.org/html/rfc7838#section-9
  * [2] https://www.mnot.net/blog/2016/03/09/alt-svc ***/
 user_pref("network.http.altsvc.enabled", false);
@@ -478,11 +482,11 @@ user_pref("network.http.altsvc.oe", false);
  * [1] http://kb.mozillazine.org/Network.proxy.socks_remote_dns
  * [2] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
 user_pref("network.proxy.socks_remote_dns", true);
-/* 0706: remove paths when sending URLs to PAC scripts (FF51+)
+/* 0706: remove paths when sending URLs to PAC scripts [FF51+]
  * CVE-2017-5384: Information disclosure via Proxy Auto-Config (PAC)
  * [1] https://bugzilla.mozilla.org/1255474 ***/
-user_pref("network.proxy.autoconfig_url.include_path", false); // default: false
-/* 0707: disable (or setup) DNS-over-HTTPS (DoH) (FF60+)
+user_pref("network.proxy.autoconfig_url.include_path", false); // [DEFAULT: false]
+/* 0707: disable (or setup) DNS-over-HTTPS (DoH) [FF60+]
  * TRR = Trusted Recursive Resolver
  * .mode: 0=off, 1=race, 2=TRR first, 3=TRR only, 4=race for stats, but always use native result
  * [WARNING] DoH bypasses hosts and gives info to yet another party (e.g. Cloudflare)
@@ -491,12 +495,12 @@ user_pref("network.proxy.autoconfig_url.include_path", false); // default: false
    // user_pref("network.trr.mode", 0);
    // user_pref("network.trr.bootstrapAddress", "");
    // user_pref("network.trr.uri", "");
-/* 0708: disable FTP (FF60+)
+/* 0708: disable FTP [FF60+]
  * [1] https://www.ghacks.net/2018/02/20/firefox-60-with-new-preference-to-disable-ftp/ ***/
    // user_pref("network.ftp.enabled", false);
-/* 0709: disable using UNC (Uniform Naming Convention) paths (FF61+)
+/* 0709: disable using UNC (Uniform Naming Convention) paths [FF61+]
  * [1] https://trac.torproject.org/projects/tor/ticket/26424 ***/
-user_pref("network.file.disable_unc_paths", true); // (hidden pref)
+user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
 /* 0710: disable GIO as a potential proxy bypass vector
  * Gvfs/GIO has a set of supported protocols like obex, network, archive, computer, dav, cdda,
  * gphoto2, trash, etc. By default only smb and sftp protocols are accepted so far (as of FF64)
@@ -504,7 +508,7 @@ user_pref("network.file.disable_unc_paths", true); // (hidden pref)
  * [2] https://trac.torproject.org/23044
  * [3] https://en.wikipedia.org/wiki/GVfs
  * [4] https://en.wikipedia.org/wiki/GIO_(software) ***/
-user_pref("network.gio.supported-protocols", ""); // (hidden pref)
+user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
 
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS [SETUP-CHROME]
      If you are in a private environment (no unwanted eyeballs) and your device is private
@@ -515,10 +519,10 @@ user_pref("network.gio.supported-protocols", ""); // (hidden pref)
      #Required reading [#] https://xkcd.com/538/
 ***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
-/* 0801: disable location bar using search - PRIVACY
+/* 0801: disable location bar using search
  * don't leak typos to a search engine, give an error message instead ***/
 user_pref("keyword.enabled", false);
-/* 0802: disable location bar domain guessing - PRIVACY/SECURITY
+/* 0802: disable location bar domain guessing
  * domain guessing intercepts DNS "hostname not found errors" and resends a
  * request (e.g. by adding www or .com). This is inconsistent use (e.g. FQDNs), does not work
  * via Proxy Servers (different error), is a flawed use of DNS (TLDs: why treat .com
@@ -526,14 +530,14 @@ user_pref("keyword.enabled", false);
  * intend to), can leak sensitive data (e.g. query strings: e.g. Princeton attack),
  * and is a security risk (e.g. common typos & malicious sites set up to exploit this) ***/
 user_pref("browser.fixup.alternate.enabled", false);
-/* 0803: display all parts of the url in the location bar - helps SECURITY ***/
+/* 0803: display all parts of the url in the location bar ***/
 user_pref("browser.urlbar.trimURLs", false);
-/* 0804: limit history leaks via enumeration (PER TAB: back/forward) - PRIVACY
+/* 0804: limit history leaks via enumeration (PER TAB: back/forward)
  * This is a PER TAB session history. You still have a full history stored under all history
  * default=50, minimum=1=currentpage, 2 is the recommended minimum as some pages
  * use it as a means of referral (e.g. hotlinking), 4 or 6 or 10 may be more practical ***/
 user_pref("browser.sessionhistory.max_entries", 10);
-/* 0805: disable CSS querying page history - CSS history leak - PRIVACY
+/* 0805: disable CSS querying page history - CSS history leak
  * [NOTE] This has NEVER been fully "resolved": in Mozilla/docs it is stated it's
  * only in 'certain circumstances', also see latest comments in [2]
  * [TEST] http://lcamtuf.coredump.cx/yahh/ (see github wiki APPENDIX C on how to use)
@@ -541,20 +545,20 @@ user_pref("browser.sessionhistory.max_entries", 10);
  * [2] https://bugzilla.mozilla.org/147777
  * [3] https://developer.mozilla.org/docs/Web/CSS/Privacy_and_the_:visited_selector ***/
 user_pref("layout.css.visited_links_enabled", false);
-/* 0806: disable displaying javascript in history URLs - SECURITY ***/
+/* 0806: disable displaying javascript in history URLs ***/
 user_pref("browser.urlbar.filter.javascript", true);
-/* 0807: disable search bar LIVE search suggestions - PRIVACY
+/* 0807: disable search bar LIVE search suggestions
  * [SETTING] Search>Provide search suggestions ***/
 user_pref("browser.search.suggest.enabled", false);
-/* 0808: disable location bar LIVE search suggestions (requires 0807 = true) - PRIVACY
+/* 0808: disable location bar LIVE search suggestions (requires 0807 = true)
  * Also disable the location bar prompt to enable/disable or learn more about it.
  * [SETTING] Search>Show search suggestions in address bar results ***/
 user_pref("browser.urlbar.suggest.searches", false);
-user_pref("browser.urlbar.userMadeSearchSuggestionsChoice", true); // (FF41+)
-/* 0809: disable location bar suggesting "preloaded" top websites (FF54+)
+user_pref("browser.urlbar.userMadeSearchSuggestionsChoice", true); // [FF41+]
+/* 0809: disable location bar suggesting "preloaded" top websites [FF54+]
  * [1] https://bugzilla.mozilla.org/1211726 ***/
 user_pref("browser.urlbar.usepreloadedtopurls.enabled", false);
-/* 0810: disable location bar making speculative connections (FF56+)
+/* 0810: disable location bar making speculative connections [FF56+]
  * [1] https://bugzilla.mozilla.org/1348275 ***/
 user_pref("browser.urlbar.speculativeConnect.enabled", false);
 /* 0850a: disable location bar autocomplete and suggestion types
@@ -578,12 +582,12 @@ user_pref("browser.urlbar.suggest.openpage", false);
 /* 0850d: disable location bar autofill
  * [1] http://kb.mozillazine.org/Inline_autocomplete ***/
 user_pref("browser.urlbar.autoFill", false);
-/* 0850e: disable location bar one-off searches (FF51+)
+/* 0850e: disable location bar one-off searches [FF51+]
  * [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/ ***/
 user_pref("browser.urlbar.oneOffSearches", false);
-/* 0850f: disable location bar suggesting local search history (FF57+)
+/* 0850f: disable location bar suggesting local search history [FF57+]
  * [1] https://bugzilla.mozilla.org/1181644 ***/
-user_pref("browser.urlbar.maxHistoricalSearchSuggestions", 0); // max. number of search suggestions
+user_pref("browser.urlbar.maxHistoricalSearchSuggestions", 0);
 /* 0860: disable search and form history
  * [NOTE] You can clear formdata on exiting Firefox (see 2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history ***/
@@ -592,7 +596,7 @@ user_pref("browser.formfill.enable", false);
  * [NOTE] You can clear history and downloads on exiting Firefox (see 2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember browsing and download history ***/
    // user_pref("places.history.enabled", false);
-/* 0864: disable date/time picker (FF57+ default true)
+/* 0864: disable date/time picker
  * This can leak your locale if not en-US
  * [1] https://trac.torproject.org/projects/tor/ticket/21787 ***/
 user_pref("dom.forms.datetime", false);
@@ -615,35 +619,35 @@ user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
  * [SETTING] Privacy & Security>Forms & Passwords>Use a master password
  * [1] https://support.mozilla.org/kb/use-master-password-protect-stored-logins ***/
 /* 0903: set how often Firefox should ask for the master password
- * 0=the first time (default), 1=every time it's needed, 2=every n minutes (as per the next pref) ***/
+ * 0=the first time (default), 1=every time it's needed, 2=every n minutes (see 0904) ***/
 user_pref("security.ask_for_password", 2);
-/* 0904: set how often in minutes Firefox should ask for the master password (see pref above)
+/* 0904: set how often in minutes Firefox should ask for the master password (see 0903)
  * in minutes, default is 30 ***/
 user_pref("security.password_lifetime", 5);
-/* 0905: disable auto-filling username & password form fields - SECURITY
+/* 0905: disable auto-filling username & password form fields
  * can leak in cross-site forms AND be spoofed
  * [NOTE] Password will still be auto-filled after a user name is manually entered
  * [1] http://kb.mozillazine.org/Signon.autofillForms ***/
 user_pref("signon.autofillForms", false);
-/* 0906: disable websites' autocomplete="off" (FF30+)
+/* 0906: disable websites' autocomplete="off" [FF30+]
  * Don't let sites dictate use of saved logins and passwords. Increase security through
  * stronger password use. The trade-off is the convenience. Some sites should never be
  * saved (such as banking sites). Set at true, informed users can make their own choice. ***/
-user_pref("signon.storeWhenAutocompleteOff", true); // default: true
+user_pref("signon.storeWhenAutocompleteOff", true); // [DEFAULT: true]
 /* 0907: display warnings for logins on non-secure (non HTTPS) pages
  * [1] https://bugzilla.mozilla.org/1217156 ***/
 user_pref("security.insecure_password.ui.enabled", true);
 /* 0908: remove user & password info when attempting to fix an entered URL (i.e. 0802 is true)
  * e.g. //user:password@foo -> //user@(prefix)foo(suffix) NOT //user:password@(prefix)foo(suffix) ***/
 user_pref("browser.fixup.hide_user_pass", true);
-/* 0909: disable formless login capture for Password Manager (FF51+) ***/
+/* 0909: disable formless login capture for Password Manager [FF51+] ***/
 user_pref("signon.formlessCapture.enabled", false);
-/* 0910: disable autofilling saved passwords on HTTP pages and show warning (FF52+)
+/* 0910: disable autofilling saved passwords on HTTP pages and show warning [FF52+]
  * [1] https://www.fxsitecompat.com/en-CA/docs/2017/insecure-login-forms-now-disable-autofill-show-warning-beneath-input-control/
  * [2] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1217152,1319119 ***/
 user_pref("signon.autofillForms.http", false);
 user_pref("security.insecure_field_warning.contextual.enabled", true);
-/* 0911: prevent cross-origin images from triggering an HTTP-Authentication prompt (FF55+)
+/* 0911: prevent cross-origin images from triggering an HTTP-Authentication prompt [FF55+]
  * [1] https://bugzilla.mozilla.org/1357835 ***/
 user_pref("network.auth.subresource-img-cross-origin-http-auth-allow", false);
 
@@ -672,7 +676,7 @@ user_pref("browser.cache.disk_cache_ssl", false);
 /* 1003: disable memory cache
  * [NOTE] Not recommended due to performance issues ***/
    // user_pref("browser.cache.memory.enable", false);
-   // user_pref("browser.cache.memory.capacity", 0); // (hidden pref)
+   // user_pref("browser.cache.memory.capacity", 0); // [HIDDEN PREF]
 /* 1005: disable fastback cache
  * To improve performance when pressing back/forward Firefox stores visited pages
  * so they don't have to be re-parsed. This is not the same as memory cache.
@@ -683,7 +687,7 @@ user_pref("browser.cache.disk_cache_ssl", false);
 /* 1006: disable permissions manager from writing to disk [RESTART]
  * [NOTE] This means any permission changes are session only
  * [1] https://bugzilla.mozilla.org/967812 ***/
-   // user_pref("permissions.memory_only", true); // (hidden pref)
+   // user_pref("permissions.memory_only", true); // [HIDDEN PREF]
 /* 1008: set DNS cache and expiration time (default 400 and 60, same as Tor Browser) ***/
    // user_pref("network.dnsCacheEntries", 400);
    // user_pref("network.dnsCacheExpiration", 60);
@@ -700,15 +704,15 @@ user_pref("browser.sessionstore.max_windows_undo", 0);
 user_pref("browser.sessionstore.privacy_level", 2);
 /* 1022: disable resuming session from crash [SETUP-CHROME] ***/
 user_pref("browser.sessionstore.resume_from_crash", false);
-/* 1023: set the minimum interval between session save operations - increasing it
- * can help on older machines and some websites, as well as reducing writes, see [1]
+/* 1023: set the minimum interval between session save operations
+ * Increasing this can help on older machines and some websites, as well as reducing writes, see [1]
  * Default is 15000 (15 secs). Try 30000 (30sec), 60000 (1min) etc
  * [SETUP-CHROME] This can also affect entries in the "Recently Closed Tabs" feature:
  * i.e. the longer the interval the more chance a quick tab open/close won't be captured.
  * This longer interval *may* affect history but we cannot replicate any history not recorded
  * [1] https://bugzilla.mozilla.org/1304389 ***/
 user_pref("browser.sessionstore.interval", 30000);
-/* 1024: disable automatic Firefox start and session restore after reboot [WINDOWS] (FF62+)
+/* 1024: disable automatic Firefox start and session restore after reboot [FF62+] [WINDOWS]
  * [1] https://bugzilla.mozilla.org/603903 ***/
 user_pref("toolkit.winRegisterApplicationRestart", false);
 /** FAVICONS ***/
@@ -721,7 +725,7 @@ user_pref("browser.shell.shortcutFavicons", false);
  * bookmark favicons are stored as data blobs in favicons.sqlite ***/
    // user_pref("browser.chrome.site_icons", false);
 /* 1032: disable favicons in web notifications ***/
-user_pref("alerts.showFavicons", false); // default: false
+user_pref("alerts.showFavicons", false); // [DEFAULT: false]
 
 /*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS)
    Note that your cipher and other settings can be used server side as a fingerprint attack
@@ -744,29 +748,29 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * [2] https://www.ssllabs.com/ssl-pulse/ ***/
 user_pref("security.ssl.require_safe_negotiation", true);
 /* 1202: control TLS versions with min and max
- * 1=min version of TLS 1.0, 2=min version of TLS 1.1, 3=min version of TLS 1.2 etc
+ * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3 etc
  * [NOTE] Jul-2017: Telemetry indicates approx 2% of TLS web traffic uses 1.0 or 1.1
  * [1] http://kb.mozillazine.org/Security.tls.version.*
  * [2] https://www.ssl.com/how-to/turn-off-ssl-3-0-and-tls-1-0-in-your-browser/
  * [2] archived: https://archive.is/hY2Mm ***/
    // user_pref("security.tls.version.min", 3);
-user_pref("security.tls.version.max", 4); // 4 = allow up to and including TLS 1.3
-/* 1203: disable SSL session tracking (FF36+)
+user_pref("security.tls.version.max", 4);
+/* 1203: disable SSL session tracking [FF36+]
  * SSL Session IDs speed up HTTPS connections (no need to renegotiate) and last for 24hrs.
  * Since the ID is unique, web servers can (and do) use it for tracking. If set to true,
  * this disables sending SSL Session IDs and TLS Session Tickets to prevent session tracking
  * [1] https://tools.ietf.org/html/rfc5077
  * [2] https://bugzilla.mozilla.org/967977 ***/
-user_pref("security.ssl.disable_session_identifiers", true); // (hidden pref)
+user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
 /* 1204: disable SSL Error Reporting
  * [1] https://firefox-source-docs.mozilla.org/browser/base/sslerrorreport/preferences.html ***/
 user_pref("security.ssl.errorReporting.automatic", false);
 user_pref("security.ssl.errorReporting.enabled", false);
 user_pref("security.ssl.errorReporting.url", "");
-/* 1205: disable TLS1.3 0-RTT (round-trip time) (FF51+)
+/* 1205: disable TLS1.3 0-RTT (round-trip time) [FF51+]
  * [1] https://github.com/tlswg/tls13-spec/issues/1001
  * [2] https://blog.cloudflare.com/tls-1-3-overview-and-q-and-a/ ***/
-user_pref("security.tls.enable_0rtt_data", false); // (FF55+ default true)
+user_pref("security.tls.enable_0rtt_data", false);
 
 /** OCSP (Online Certificate Status Protocol)
     #Required reading [#] https://scotthelme.co.uk/revocation-is-broken/ ***/
@@ -790,7 +794,7 @@ user_pref("security.OCSP.enabled", 1);
 user_pref("security.OCSP.require", true);
 
 /** CERTS / HSTS (HTTP Strict Transport Security) / HPKP (HTTP Public Key Pinning) ***/
-/* 1220: disable Windows 8.1's Microsoft Family Safety cert [WINDOWS] (FF50+)
+/* 1220: disable Windows 8.1's Microsoft Family Safety cert [FF50+] [WINDOWS]
  * 0=disable detecting Family Safety mode and importing the root
  * 1=only attempt to detect Family Safety mode (don't import the root)
  * 2=detect Family Safety mode and import the root
@@ -802,7 +806,7 @@ user_pref("security.family_safety.mode", 0);
  * [TEST] https://fiprinca.0x90.eu/poc/
  * [1] https://bugzilla.mozilla.org/1334485 - related bug
  * [2] https://bugzilla.mozilla.org/1216882 - related bug (see comment 9) ***/
-   // user_pref("security.nocertdb", true); // (hidden pref)
+   // user_pref("security.nocertdb", true); // [HIDDEN PREF]
 /* 1222: enforce strict pinning
  * PKP (Public Key Pinning) 0=disabled 1=allow user MiTM (such as your antivirus), 2=strict
  * [WARNING] If you rely on an AV (antivirus) to protect your web browsing
@@ -811,12 +815,12 @@ user_pref("security.family_safety.mode", 0);
 user_pref("security.cert_pinning.enforcement_level", 2);
 
 /** MIXED CONTENT ***/
-/* 1240: disable insecure active content on https pages - mixed content
+/* 1240: disable insecure active content on https pages
  * [1] https://trac.torproject.org/projects/tor/ticket/21323 ***/
-user_pref("security.mixed_content.block_active_content", true); // default: true
-/* 1241: disable insecure passive content (such as images) on https pages - mixed context ***/
+user_pref("security.mixed_content.block_active_content", true); // [DEFAULT: true]
+/* 1241: disable insecure passive content (such as images) on https pages ***/
 user_pref("security.mixed_content.block_display_content", true);
-/* 1243: block unencrypted requests from Flash on encrypted pages to mitigate MitM attacks (FF59+)
+/* 1243: block unencrypted requests from Flash on encrypted pages to mitigate MitM attacks [FF59+]
  * [1] https://bugzilla.mozilla.org/1190623 ***/
 user_pref("security.mixed_content.block_object_subrequest", true);
 
@@ -860,11 +864,11 @@ user_pref("browser.ssl_override_behavior", 1);
  * i.e. it doesn't work for HSTS discrepancies (https://subdomain.preloaded-hsts.badssl.com/)
  * [TEST] https://expired.badssl.com/ ***/
 user_pref("browser.xul.error_pages.expert_bad_cert", true);
-/* 1273: display "insecure" icon (FF59+) and "Not Secure" text (FF60+) on HTTP sites ***/
-user_pref("security.insecure_connection_icon.enabled", true); // all windows
-user_pref("security.insecure_connection_text.enabled", true);
-   // user_pref("security.insecure_connection_icon.pbmode.enabled", true); // private windows only
-   // user_pref("security.insecure_connection_text.pbmode.enabled", true);
+/* 1273: display "insecure" icon and "Not Secure" text on HTTP sites ***/
+user_pref("security.insecure_connection_icon.enabled", true); // [FF59+]
+user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
+   // user_pref("security.insecure_connection_icon.pbmode.enabled", true); // [FF59+] private windows only
+   // user_pref("security.insecure_connection_text.pbmode.enabled", true); // [FF60+] private windows only
 
 /*** [SECTION 1400]: FONTS ***/
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
@@ -883,15 +887,15 @@ user_pref("browser.display.use_document_fonts", 0);
    // user_pref("font.name.sans-serif.x-western", "Arial"); // default: Arial
    // user_pref("font.name.monospace.x-unicode", "Lucida Console");
    // user_pref("font.name.monospace.x-western", "Lucida Console"); // default: Courier New
-/* 1403: disable icon fonts (glyphs) (FF41) and local fallback rendering
+/* 1403: disable icon fonts (glyphs) and local fallback rendering
  * [1] https://bugzilla.mozilla.org/789788
  * [2] https://trac.torproject.org/projects/tor/ticket/8455 ***/
-   // user_pref("gfx.downloadable_fonts.enabled", false);
+   // user_pref("gfx.downloadable_fonts.enabled", false); // [FF41+]
    // user_pref("gfx.downloadable_fonts.fallback_delay", -1);
 /* 1404: disable rendering of SVG OpenType fonts
  * [1] https://wiki.mozilla.org/SVGOpenTypeFonts - iSECPartnersReport recommends to disable this ***/
 user_pref("gfx.font_rendering.opentype_svg.enabled", false);
-/* 1405: disable WOFF2 (Web Open Font Format) (FF35+) ***/
+/* 1405: disable WOFF2 (Web Open Font Format) [FF35+] ***/
 user_pref("gfx.downloadable_fonts.woff2.enabled", false);
 /* 1406: disable CSS Font Loading API
  * [NOTE] Disabling fonts can uglify the web a fair bit. ***/
@@ -904,13 +908,13 @@ user_pref("font.blacklist.underline_offset", "");
  * In the past it had security issues. Update: This continues to be the case, see [1]
  * [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778 ***/
 user_pref("gfx.font_rendering.graphite.enabled", false);
-/* 1409: limit system font exposure to a whitelist (FF52+) [RESTART]
+/* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
  * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed.
  * [WARNING] Creating your own probably highly-unique whitelist will raise your entropy. If
  * you block sites choosing fonts in 1401, this preference is irrelevant. In future,
  * privacy.resistFingerprinting (see 4500) will cover this (and 1401 can be relaxed)
  * [1] https://bugzilla.mozilla.org/1121643 ***/
-   // user_pref("font.system.whitelist", ""); // (hidden pref)
+   // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
 
 /*** [SECTION 1600]: HEADERS / REFERERS
      Only *cross domain* referers need controlling and XOriginPolicy (1603) is perfect for that. Thus we enforce
@@ -937,22 +941,22 @@ user_pref("network.http.referer.trimmingPolicy", 0);
 /* 1603: CROSS ORIGIN: control when to send a referer [SETUP-WEB]
  * 0=always (default), 1=only if base domains match, 2=only if hosts match ***/
 user_pref("network.http.referer.XOriginPolicy", 1);
-/* 1604: CROSS ORIGIN: control the amount of information to send (FF52+)
+/* 1604: CROSS ORIGIN: control the amount of information to send [FF52+]
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.XOriginTrimmingPolicy", 0);
 /* 1605: ALL: disable spoofing a referer
  * [WARNING] Do not set this to true, as spoofing effectively disables the anti-CSRF
  * (Cross-Site Request Forgery) protections that some sites may rely on ***/
-user_pref("network.http.referer.spoofSource", false); // default: false
-/* 1606: ALL: set the default Referrer Policy
+user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false]
+/* 1606: ALL: set the default Referrer Policy [FF59+]
  * 0=no-referer, 1=same-origin, 2=strict-origin-when-cross-origin, 3=no-referrer-when-downgrade
  * [NOTE] This is only a default, it can be overridden by a site-controlled Referrer Policy
  * [1] https://www.w3.org/TR/referrer-policy/
  * [2] https://developer.mozilla.org/docs/Web/HTTP/Headers/Referrer-Policy
  * [3] https://blog.mozilla.org/security/2018/01/31/preventing-data-leaks-by-stripping-path-information-in-http-referrers/ ***/
-user_pref("network.http.referer.defaultPolicy", 3); // (FF59+) default: 3
-user_pref("network.http.referer.defaultPolicy.pbmode", 2); // (FF59+) default: 2
-/* 1607: TOR: hide (not spoof) referrer when leaving a .onion domain (FF54+)
+user_pref("network.http.referer.defaultPolicy", 3); // [DEFAULT: 3]
+user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
+/* 1607: TOR: hide (not spoof) referrer when leaving a .onion domain [FF54+]
  * [NOTE] Firefox cannot access .onion sites by default. We recommend you use
  * the Tor Browser which is specifically designed for hidden services
  * [1] https://bugzilla.mozilla.org/1305144 ***/
@@ -968,15 +972,15 @@ user_pref("privacy.donottrackheader.enabled", true);
      [3] https://github.com/mozilla/testpilot-containers
 ***/
 user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
-/* 1701: enable Container Tabs setting in preferences (see 1702) (FF50+)
+/* 1701: enable Container Tabs setting in preferences (see 1702) [FF50+]
  * [1] https://bugzilla.mozilla.org/1279029 ***/
 user_pref("privacy.userContext.ui.enabled", true);
-/* 1702: enable Container Tabs (FF50+)
+/* 1702: enable Container Tabs [FF50+]
  * [SETTING] General>Tabs>Enable Container Tabs ***/
 user_pref("privacy.userContext.enabled", true);
-/* 1703: enable a private container for thumbnail loads (FF51+) ***/
-user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // default: true in FF61+
-/* 1704: set long press behaviour on "+ Tab" button to display container menu (FF53+)
+/* 1703: enable a private container for thumbnail loads [FF51+] ***/
+user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // [DEFAULT: true in FF61+]
+/* 1704: set long press behaviour on "+ Tab" button to display container menu [FF53+]
  * 0=disables long press, 1=when clicked, the menu is shown
  * 2=the menu is shown after X milliseconds
  * [NOTE] The menu does not contain a non-container tab option
@@ -1008,8 +1012,8 @@ user_pref("plugin.scan.plid.all", false);
 user_pref("media.gmp-provider.enabled", false);
 user_pref("media.gmp.trial-create.enabled", false);
 user_pref("media.gmp-manager.url", "data:text/plain,");
-user_pref("media.gmp-manager.url.override", "data:text/plain,"); // (hidden pref)
-user_pref("media.gmp-manager.updateEnabled", false); // disable local fallback (hidden pref)
+user_pref("media.gmp-manager.url.override", "data:text/plain,"); // [HIDDEN PREF]
+user_pref("media.gmp-manager.updateEnabled", false); // disable local fallback [HIDDEN PREF]
 /* 1825: disable widevine CDM (Content Decryption Module) [SETUP-WEB] ***/
 user_pref("media.gmp-widevinecdm.visible", false);
 user_pref("media.gmp-widevinecdm.enabled", false);
@@ -1020,7 +1024,7 @@ user_pref("media.gmp-widevinecdm.autoupdate", false);
 user_pref("media.eme.enabled", false);
 /* 1840: disable the OpenH264 Video Codec by Cisco to "Never Activate"
  * This is the bundled codec used for video chat in WebRTC [SETUP-WEB] ***/
-user_pref("media.gmp-gmpopenh264.enabled", false); // (hidden pref)
+user_pref("media.gmp-gmpopenh264.enabled", false); // [HIDDEN PREF]
 user_pref("media.gmp-gmpopenh264.autoupdate", false);
 
 /*** [SECTION 2000]: MEDIA / CAMERA / MIC ***/
@@ -1038,8 +1042,8 @@ user_pref("media.navigator.video.enabled", false); // video capability for WebRT
 /* 2002: limit WebRTC IP leaks if using WebRTC
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1189041,1297416
  * [2] https://wiki.mozilla.org/Media/WebRTC/Privacy ***/
-user_pref("media.peerconnection.ice.default_address_only", true); // (FF42-FF50)
-user_pref("media.peerconnection.ice.no_host", true); // (FF51+)
+user_pref("media.peerconnection.ice.default_address_only", true); // [FF42-FF50]
+user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
 /* 2010: disable WebGL (Web Graphics Library), force bare minimum feature set if used & disable WebGL extensions
  * [1] https://www.contextis.com/resources/blog/webgl-new-dimension-browser-exploitation/
  * [2] https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern ***/
@@ -1048,33 +1052,33 @@ user_pref("pdfjs.enableWebGL", false);
 user_pref("webgl.min_capability_mode", true);
 user_pref("webgl.disable-extensions", true);
 user_pref("webgl.disable-fail-if-major-performance-caveat", true);
-/* 2012: disable two more webgl preferences (FF51+) ***/
+/* 2012: disable two more webgl preferences [FF51+] ***/
 user_pref("webgl.dxgl.enabled", false); // [WINDOWS]
 user_pref("webgl.enable-webgl2", false);
 /* 2022: disable screensharing ***/
 user_pref("media.getusermedia.screensharing.enabled", false);
 user_pref("media.getusermedia.browser.enabled", false);
 user_pref("media.getusermedia.audiocapture.enabled", false);
-/* 2024: set a default permission for Camera/Microphone (FF58+)
+/* 2024: set a default permission for Camera/Microphone [FF58+]
  * 0=always ask (default), 1=allow, 2=block
  * [SETTING] to add site exceptions: Page Info>Permissions>Use the Camera/Microphone
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Camera/Microphone>Settings ***/
    // user_pref("permissions.default.camera", 2);
    // user_pref("permissions.default.microphone", 2);
-/* 2026: disable canvas capture stream (FF41+)
+/* 2026: disable canvas capture stream [FF41+]
  * [1] https://developer.mozilla.org/docs/Web/API/HTMLCanvasElement/captureStream ***/
 user_pref("canvas.capturestream.enabled", false);
-/* 2027: disable camera image capture (FF35+)
+/* 2027: disable camera image capture [FF35+]
  * [1] https://trac.torproject.org/projects/tor/ticket/16339 ***/
-user_pref("dom.imagecapture.enabled", false); // default: false
-/* 2028: disable offscreen canvas (FF44+)
+user_pref("dom.imagecapture.enabled", false); // [DEFAULT: false]
+/* 2028: disable offscreen canvas [FF44+]
  * [1] https://developer.mozilla.org/docs/Web/API/OffscreenCanvas ***/
-user_pref("gfx.offscreencanvas.enabled", false); // default: false
-/* 2030: disable auto-play of HTML5 media (FF63+)
+user_pref("gfx.offscreencanvas.enabled", false); // [DEFAULT: false]
+/* 2030: disable auto-play of HTML5 media [FF63+]
  * 0=Allowed (default), 1=Blocked, 2=Prompt
  * [SETUP-WEB] This may break video playback on various sites ***/
 user_pref("media.autoplay.default", 1);
-/* 2031: disable audio auto-play in non-active tabs (FF51+)
+/* 2031: disable audio auto-play in non-active tabs [FF51+]
  * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
 user_pref("media.block-autoplay-until-in-foreground", true);
 
@@ -1083,12 +1087,12 @@ user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
 /* 2201: prevent websites from disabling new window features
  * [1] http://kb.mozillazine.org/Prevent_websites_from_disabling_new_window_features ***/
 user_pref("dom.disable_window_open_feature.close", true);
-user_pref("dom.disable_window_open_feature.location", true); // default: true
+user_pref("dom.disable_window_open_feature.location", true); // [DEFAULT: true]
 user_pref("dom.disable_window_open_feature.menubar", true);
 user_pref("dom.disable_window_open_feature.minimizable", true);
 user_pref("dom.disable_window_open_feature.personalbar", true); // bookmarks toolbar
-user_pref("dom.disable_window_open_feature.resizable", true); // default: true
-user_pref("dom.disable_window_open_feature.status", true); // status bar - default: true
+user_pref("dom.disable_window_open_feature.resizable", true); // [DEFAULT: true]
+user_pref("dom.disable_window_open_feature.status", true); // [DEFAULT: true]
 user_pref("dom.disable_window_open_feature.titlebar", true);
 user_pref("dom.disable_window_open_feature.toolbar", true);
 /* 2202: prevent scripts moving and resizing open windows ***/
@@ -1142,14 +1146,15 @@ user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
 user_pref("dom.serviceWorkers.enabled", false);
 /* 2304: disable web notifications
  * [1] https://developer.mozilla.org/docs/Web/API/Notifications_API ***/
-user_pref("dom.webnotifications.enabled", false); // (FF22+)
-user_pref("dom.webnotifications.serviceworker.enabled", false); // (FF44+)
-/* 2305: set a default permission for Notifications (see 2304) (FF58+)
+user_pref("dom.webnotifications.enabled", false); // [FF22+]
+user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
+/* 2305: set a default permission for Notifications (see 2304) [FF58+]
+ * 0=always ask (default), 1=allow, 2=block
  * [NOTE] best left at default "always ask", fingerprintable via Permissions API
  * [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Notifications>Settings ***/
-   // user_pref("permissions.default.desktop-notification", 2); // 0=always ask (default), 1=allow, 2=block
-/* 2306: disable push notifications (FF44+)
+   // user_pref("permissions.default.desktop-notification", 2);
+/* 2306: disable push notifications [FF44+]
  * web apps can receive messages pushed to them from a server, whether or
  * not the web app is in the foreground, or even currently loaded
  * [1] https://developer.mozilla.org/docs/Web/API/Push_API ***/
@@ -1169,10 +1174,10 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
  * the website for it to look at the clipboard
  * [1] https://www.ghacks.net/2014/01/08/block-websites-reading-modifying-clipboard-contents-firefox/ ***/
 user_pref("dom.event.clipboardevents.enabled", false);
-/* 2403: disable clipboard commands (cut/copy) from "non-privileged" content (FF41+)
+/* 2403: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
  * this disables document.execCommand("cut"/"copy") to protect your clipboard
  * [1] https://bugzilla.mozilla.org/1170911 ***/
-user_pref("dom.allow_cut_copy", false); // (hidden pref)
+user_pref("dom.allow_cut_copy", false); // [HIDDEN PREF]
 /* 2404: disable "Confirm you want to leave" dialog on page close
  * Does not prevent JS leaks of the page close event.
  * [1] https://developer.mozilla.org/docs/Web/Events/beforeunload
@@ -1180,7 +1185,7 @@ user_pref("dom.allow_cut_copy", false); // (hidden pref)
 user_pref("dom.disable_beforeunload", true);
 /* 2414: disable shaking the screen ***/
 user_pref("dom.vibrator.enabled", false);
-/* 2420: disable asm.js (FF22+)
+/* 2420: disable asm.js [FF22+]
  * [1] http://asmjs.org/
  * [2] https://www.mozilla.org/security/advisories/mfsa2015-29/
  * [3] https://www.mozilla.org/security/advisories/mfsa2015-50/
@@ -1193,10 +1198,10 @@ user_pref("javascript.options.asmjs", false);
  * [1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817 ***/
    // user_pref("javascript.options.ion", false);
    // user_pref("javascript.options.baselinejit", false);
-/* 2422: disable WebAssembly for now (FF52+)
+/* 2422: disable WebAssembly [FF52+]
  * [1] https://developer.mozilla.org/docs/WebAssembly ***/
 user_pref("javascript.options.wasm", false);
-/* 2426: disable Intersection Observer API (FF53+)
+/* 2426: disable Intersection Observer API [FF53+]
  * Almost a year to complete, three versions late to stable (as default false),
  * number #1 cause of crashes in nightly numerous times, and is (primarily) an
  * ad network API for "ad viewability checks" down to a pixel level
@@ -1210,7 +1215,7 @@ user_pref("dom.IntersectionObserver.enabled", false);
 user_pref("javascript.options.shared_memory", false);
 /* 2428: enforce DOMHighResTimeStamp API
  * [WARNING] Required for normalization of timestamps and any timer resolution mitigations ***/
-user_pref("dom.event.highrestimestamp.enabled", true); // default: true
+user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
 
 /*** [SECTION 2500]: HARDWARE FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");
@@ -1225,7 +1230,7 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * Optional protection depending on your connected devices
  * [1] https://developer.mozilla.org/docs/Web/API/WebVR_API ***/
    // user_pref("dom.vr.enabled", false);
-/* 2505: disable media device enumeration (FF29+)
+/* 2505: disable media device enumeration [FF29+]
  * [NOTE] media.peerconnection.enabled should also be set to false (see 2001)
  * [1] https://wiki.mozilla.org/Media/getUserMedia
  * [2] https://developer.mozilla.org/docs/Web/API/MediaDevices/enumerateDevices ***/
@@ -1237,13 +1242,13 @@ user_pref("media.navigator.enabled", false);
  * [1] https://wiki.mozilla.org/Platform/GFX/HardwareAcceleration ***/
    // user_pref("gfx.direct2d.disabled", true); // [WINDOWS]
 user_pref("layers.acceleration.disabled", true);
-/* 2510: disable Web Audio API (FF51+)
+/* 2510: disable Web Audio API [FF51+]
  * [1] https://bugzilla.mozilla.org/1288359 ***/
 user_pref("dom.webaudio.enabled", false);
 /* 2516: disable PointerEvents
  * [1] https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent ***/
 user_pref("dom.w3c_pointer_events.enabled", false);
-/* 2517: disable Media Capabilities API (FF63+)
+/* 2517: disable Media Capabilities API [FF63+]
  * [SETUP-PERF] This *may* affect media performance if disabled, no one is sure
  * [1] https://github.com/WICG/media-capabilities
  * [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
@@ -1263,8 +1268,8 @@ user_pref("beacon.enabled", false);
 user_pref("browser.helperApps.deleteTempFileOnExit", true);
 /* 2604: disable page thumbnail collection
  * look in profile/thumbnails directory - you may want to clean that out ***/
-user_pref("browser.pagethumbnails.capturing_disabled", true); // (hidden pref)
-/* 2605: block web content in file processes (FF55+)
+user_pref("browser.pagethumbnails.capturing_disabled", true); // [HIDDEN PREF]
+/* 2605: block web content in file processes [FF55+]
  * [SETUP-WEB] You may want to disable this for corporate or developer environments
  * [1] https://bugzilla.mozilla.org/1343184 ***/
 user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false);
@@ -1280,11 +1285,11 @@ user_pref("devtools.chrome.enabled", false);
 user_pref("devtools.webide.autoinstallADBHelper", false);
 user_pref("devtools.debugger.remote-enabled", false);
 user_pref("devtools.webide.enabled", false);
-/* 2609: disable MathML (Mathematical Markup Language) (FF51+)
+/* 2609: disable MathML (Mathematical Markup Language) [FF51+]
  * [TEST] http://browserspy.dk/mathml.php
  * [1] https://bugzilla.mozilla.org/1173199 ***/
 user_pref("mathml.disabled", true);
-/* 2610: disable in-content SVG (Scalable Vector Graphics) (FF53+)
+/* 2610: disable in-content SVG (Scalable Vector Graphics) [FF53+]
  * [SETUP-WEB] Expect breakage incl. youtube player controls. Best left for a "hardened" profile.
  * [1] https://bugzilla.mozilla.org/1216893 ***/
    // user_pref("svg.disabled", true);
@@ -1296,19 +1301,20 @@ user_pref("middlemouse.contentLoadURL", false);
  * [NOTE] A low setting of 5 or under will probably break some sites (e.g. gmail logins)
  * To control HTML Meta tag and JS redirects, use an extension. Default is 20 ***/
 user_pref("network.http.redirection-limit", 10);
-/* 2615: disable websites overriding Firefox's keyboard shortcuts (FF58+)
+/* 2615: disable websites overriding Firefox's keyboard shortcuts [FF58+]
+ * 0= (default), 1=allow, 2=block
  * [NOTE] At the time of writing, causes issues with delete and backspace keys
  * [SETTING] to add site exceptions: Page Info>Permissions>Override Keyboard Shortcuts ***/
-   // user_pref("permissions.default.shortcuts", 2); //  0 (default) or 1=allow, 2=block
-/* 2616: remove special permissions for certain mozilla domains (FF35+)
+   // user_pref("permissions.default.shortcuts", 2);
+/* 2616: remove special permissions for certain mozilla domains [FF35+]
  * [1] resource://app/defaults/permissions ***/
 user_pref("permissions.manager.defaultsUrl", "");
 /* 2617: remove webchannel whitelist ***/
 user_pref("webchannel.allowObject.urlWhitelist", "");
-/* 2618: disable exposure of system colors to CSS or canvas (FF44+)
+/* 2618: disable exposure of system colors to CSS or canvas [FF44+]
  * [NOTE] see second listed bug: may cause black on black for elements with undefined colors
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876 ***/
-user_pref("ui.use_standins_for_native_colors", true); // (hidden pref)
+user_pref("ui.use_standins_for_native_colors", true); // [HIDDEN PREF]
 /* 2619: enforce Punycode for Internationalized Domain Names to eliminate possible spoofing
  * Firefox has *some* protections, but it is better to be safe than sorry. The downside: it will also
  * display legitimate IDN's punycoded, which might be undesirable for users of non-latin alphabets
@@ -1341,7 +1347,7 @@ user_pref("browser.download.useDownloadDir", false);
 user_pref("browser.download.manager.addToRecentDocs", false);
 /* 2653: disable hiding mime types (Options>General>Applications) not associated with a plugin ***/
 user_pref("browser.download.hide_plugins_without_extensions", false);
-/* 2654: disable "open with" in download dialog (FF50+)
+/* 2654: disable "open with" in download dialog [FF50+]
  * This is very useful to enable when the browser is sandboxed (e.g. via AppArmor)
  * in such a way that it is forbidden to run external applications.
  * [SETUP-CHROME] This may interfere with some users' workflow or methods
@@ -1353,34 +1359,34 @@ user_pref("browser.download.forbid_open_with", true);
  * [SETUP-CHROME] This will break extensions that do not use the default XPI directories
  * [1] https://mike.kaply.com/2012/02/21/understanding-add-on-scopes/
  * [1] archived: https://archive.is/DYjAM ***/
-user_pref("extensions.enabledScopes", 1); // (hidden pref)
+user_pref("extensions.enabledScopes", 1); // [HIDDEN PREF]
 user_pref("extensions.autoDisableScopes", 15);
-/* 2662: disable webextension restrictions on certain mozilla domains (also see 4503) (FF60+)
+/* 2662: disable webextension restrictions on certain mozilla domains (also see 4503) [FF60+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
    // user_pref("extensions.webextensions.restrictedDomains", "");
 /* 2663: enable warning when websites try to install add-ons
  * [SETTING] Privacy & Security>Permissions>Warn you when websites try to install add-ons ***/
-user_pref("xpinstall.whitelist.required", true); // default: true
+user_pref("xpinstall.whitelist.required", true); // [DEFAULT: true]
 
 /** SECURITY ***/
 /* 2680: enable CSP (Content Security Policy)
  * [1] https://developer.mozilla.org/docs/Web/HTTP/CSP ***/
-user_pref("security.csp.enable", true); // default: true
-/* 2681: disable CSP violation events (FF59+)
+user_pref("security.csp.enable", true); // [DEFAULT: true]
+/* 2681: disable CSP violation events [FF59+]
  * [1] https://developer.mozilla.org/docs/Web/API/SecurityPolicyViolationEvent ***/
 user_pref("security.csp.enable_violation_events", false);
-/* 2682: enable CSP 1.1 experimental hash-source directive (FF29+)
+/* 2682: enable CSP 1.1 experimental hash-source directive [FF44+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=855326,883975 ***/
 user_pref("security.csp.experimentalEnabled", true);
-/* 2683: block top level window data: URIs (FF56+)
+/* 2683: block top level window data: URIs [FF56+]
  * [1] https://bugzilla.mozilla.org/1331351
  * [2] https://www.wordfence.com/blog/2017/01/gmail-phishing-data-uri/
  * [3] https://www.fxsitecompat.com/en-CA/docs/2017/data-url-navigations-on-top-level-window-will-be-blocked/ ***/
-user_pref("security.data_uri.block_toplevel_data_uri_navigations", true); // default: true in FF59+
+user_pref("security.data_uri.block_toplevel_data_uri_navigations", true); // [DEFAULT: true]
 /* 2684: enforce a security delay on some confirmation dialogs such as install, open/save
  * [1] http://kb.mozillazine.org/Disable_extension_install_delay_-_Firefox
  * [2] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
-user_pref("security.dialog_enable_delay", 700); // default: 1000 (milliseconds)
+user_pref("security.dialog_enable_delay", 700);
 
 /*** [SECTION 2700]: PERSISTENT STORAGE
      Data SET by websites including
@@ -1401,27 +1407,27 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * [SETTING] Privacy & Security>Cookies and Site Data>Type blocked
  * [1] https://www.fxsitecompat.com/en-CA/docs/2015/web-storage-indexeddb-cache-api-now-obey-third-party-cookies-preference/ ***/
 user_pref("network.cookie.cookieBehavior", 1);
-/* 2702: set third-party cookies (i.e ALL) (if enabled, see above pref) to session-only
+/* 2702: set third-party cookies (i.e ALL) (if enabled, see 2701) to session-only
    and (FF58+) set third-party non-secure (i.e HTTP) cookies to session-only
    [NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and
    .nonsecureSessionOnly=true. This allows you to keep HTTPS cookies, but session-only HTTP ones
  * [1] https://feeding.cloud.geek.nz/posts/tweaking-cookies-for-privacy-in-firefox/
  * [2] http://kb.mozillazine.org/Network.cookie.thirdparty.sessionOnly ***/
 user_pref("network.cookie.thirdparty.sessionOnly", true);
-user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // (FF58+)
+user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
 /* 2703: set cookie lifetime policy
  * 0=until they expire (default), 2=until you close Firefox
  * [NOTE] 3=for n days : no longer supported in FF63+ (see 2704-deprecated)
  * [SETTING] Privacy & Security>Cookies and Site Data>Keep until... ***/
    // user_pref("network.cookie.lifetimePolicy", 0);
-/* 2705: disable HTTP sites setting cookies with the "secure" directive (FF52+)
+/* 2705: disable HTTP sites setting cookies with the "secure" directive [FF52+]
  * [1] https://developer.mozilla.org/Firefox/Releases/52#HTTP ***/
-user_pref("network.cookie.leave-secure-alone", true); // default: true
-/* 2706: enable support for same-site cookies (FF60+)
+user_pref("network.cookie.leave-secure-alone", true); // [DEFAULT: true]
+/* 2706: enable support for same-site cookies [FF60+]
  * [1] https://bugzilla.mozilla.org/795346
  * [2] https://blog.mozilla.org/security/2018/04/24/same-site-cookies-in-firefox-60/
  * [3] https://www.sjoerdlangkemper.nl/2016/04/14/preventing-csrf-with-samesite-cookie-attribute/ ***/
-   // user_pref("network.cookie.same-site.enabled", true); // default: true
+   // user_pref("network.cookie.same-site.enabled", true); // [DEFAULT: true]
 /* 2710: disable DOM (Document Object Model) Storage
  * [WARNING] This will break a LOT of sites' functionality AND extensions!
  * You are better off using an extension for more granular control ***/
@@ -1433,12 +1439,12 @@ user_pref("network.cookie.leave-secure-alone", true); // default: true
  * on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically
  * via an extenion. Note that IDB currently cannot be sanitized by host.
  * [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/ ***/
-user_pref("dom.indexedDB.enabled", true); // default: true
+user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
 /* 2730: disable offline cache ***/
 user_pref("browser.cache.offline.enable", false);
-/* 2730b: disable offline cache on insecure sites (FF60+)
+/* 2730b: disable offline cache on insecure sites [FF60+]
  * [1] https://blog.mozilla.org/security/2018/02/12/restricting-appcache-secure-contexts/ ***/
-user_pref("browser.cache.offline.insecure.enable", false); // default: false in FF62+
+user_pref("browser.cache.offline.insecure.enable", false); // [DEFAULT: false in FF62+]
 /* 2731: enforce websites to ask to store data for offline use
  * [1] https://support.mozilla.org/questions/1098540
  * [2] https://bugzilla.mozilla.org/959985 ***/
@@ -1446,7 +1452,7 @@ user_pref("offline-apps.allow_by_default", false);
 /* 2740: disable service workers cache and cache storage
  * [1] https://w3c.github.io/ServiceWorker/#privacy ***/
 user_pref("dom.caches.enabled", false);
-/* 2750: disable Storage API (FF51+)
+/* 2750: disable Storage API [FF51+]
  * The API gives sites the ability to find out how much space they can use, how much
  * they are already using, and even control whether or not they need to be alerted
  * before the user agent disposes of site data in order to make room for other things.
@@ -1494,9 +1500,9 @@ user_pref("privacy.cpd.offlineApps", true); // Offline Website Data
 user_pref("privacy.cpd.passwords", false); // this is not listed
 user_pref("privacy.cpd.sessions", true); // Active Logins
 user_pref("privacy.cpd.siteSettings", false); // Site Preferences
-/* 2805: privacy.*.openWindows (clear session restore data) (FF34+)
+/* 2805: privacy.*.openWindows (clear session restore data) [FF34+]
  * [NOTE] There is a years-old bug that these cause two windows when Firefox restarts.
- * You do not need these anyway if session restore is disabled (see 1020) ***/
+ * You do not need these anyway if session restore is cleared with history (see 2803) ***/
    // user_pref("privacy.clearOnShutdown.openWindows", true);
    // user_pref("privacy.cpd.openWindows", true);
 /* 2806: reset default 'Time range to clear' for 'Clear Recent History' (see 2804)
@@ -1529,20 +1535,20 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1381197 - [fixed in FF59+] extensions cannot control cookies with FPI Origin Attributes
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
-/* 4001: enable First Party Isolation (FF51+)
+/* 4001: enable First Party Isolation [FF51+]
  * [SETUP-WEB] May break cross-domain logins and site functionality until perfected
  * [1] https://bugzilla.mozilla.org/1260931 ***/
 user_pref("privacy.firstparty.isolate", true);
-/* 4002: enforce FPI restriction for window.opener (FF54+)
+/* 4002: enforce FPI restriction for window.opener [FF54+]
  * [NOTE] Setting this to false may reduce the breakage in 4001
- * [FF65+] blocks postMessage with targetOrigin "*" if originAttributes don't match. But
+ * FF65+ blocks postMessage with targetOrigin "*" if originAttributes don't match. But
  * to reduce breakage it ignores the 1st-party domain (FPD) originAttribute. (see [2],[3])
  * The 2nd pref removes that limitation and will only allow communication if FPDs also match.
  * [1] https://bugzilla.mozilla.org/1319773#c22
  * [2] https://bugzilla.mozilla.org/1492607
  * [3] https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage ***/
-user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // default: true
-   // user_pref("privacy.firstparty.isolate.block_post_message", true); // (hidden pref)
+user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAULT: true]
+   // user_pref("privacy.firstparty.isolate.block_post_message", true); // [HIDDEN PREF]
 
 /*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
    This master switch will be used for a wide range of items, many of which will
@@ -1596,28 +1602,28 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // default
       Modifier events suppressed are SHIFT and both ALT keys. Chrome is not affected.
       FF60: Fix keydown/keyup events (1438795)
  ** 1337157 - disable WebGL debug renderer info (see 4613) (FF60+)
- ** 1459089 - disable OS locale in HTTP Accept-Language headers [ANDROID] (FF62+)
+ ** 1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62+)
  ** 1363508 - spoof/suppress Pointer Events (see 2516) (FF64+)
       FF65: pointerEvent.pointerid (1492766)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
-/* 4501: enable privacy.resistFingerprinting (FF41+)
+/* 4501: enable privacy.resistFingerprinting [FF41+]
  * [SETUP-WEB] RFP is not ready for the masses, so expect some website breakage
  * [1] https://bugzilla.mozilla.org/418986 ***/
-user_pref("privacy.resistFingerprinting", true); // (hidden pref) (not hidden FF55+)
-/* 4502: set new window sizes to round to hundreds (FF55+)
+user_pref("privacy.resistFingerprinting", true);
+/* 4502: set new window sizes to round to hundreds [FF55+]
  * [SETUP-CHROME] Width will round down to multiples of 200s and height to 100s, to fit your screen.
  * The override values are a starting point to round from if you want some control
  * [1] https://bugzilla.mozilla.org/1330882
  * [2] https://hardware.metrics.mozilla.com/ ***/
-   // user_pref("privacy.window.maxInnerWidth", 1600); // (hidden pref)
-   // user_pref("privacy.window.maxInnerHeight", 900); // (hidden pref)
-/* 4503: disable mozAddonManager Web API (FF57+)
+   // user_pref("privacy.window.maxInnerWidth", 1600); // [HIDDEN PREF]
+   // user_pref("privacy.window.maxInnerHeight", 900); // [HIDDEN PREF]
+/* 4503: disable mozAddonManager Web API [FF57+]
  * [NOTE] As a side-effect in FF57-59 this allowed extensions to work on AMO. In FF60+ you also need
  * to sanitize or clear extensions.webextensions.restrictedDomains (see 2662) to keep that side-effect
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
-user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // (hidden pref)
-/* 4504: disable showing about:blank as soon as possible during startup (FF60+)
+user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDEN PREF]
+/* 4504: disable showing about:blank as soon as possible during startup [FF60+]
  * When default true (FF62+) this no longer masks the RFP resizing activity
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
@@ -1631,7 +1637,7 @@ user_pref("browser.startup.blankWindow", false);
 user_pref("_user.js.parrot", "4600 syntax error: the parrot's crossed the Jordan");
 /* [SETUP-non-RFP] Non-RFP users replace the * with a slash on this line to enable these
 // FF55+
-// 4601: [2514] spoof (or limit?) number of CPU cores (FF48+)
+// 4601: [2514] spoof (or limit?) number of CPU cores [FF48+]
    // [NOTE] *may* affect core chrome/Firefox performance, will affect content.
    // [1] https://bugzilla.mozilla.org/1008453
    // [2] https://trac.torproject.org/projects/tor/ticket/21675
@@ -1660,7 +1666,7 @@ user_pref("browser.zoom.siteSpecific", false);
    // Optional protection depending on your connected devices
    // [1] https://trac.torproject.org/projects/tor/ticket/13023
    // user_pref("dom.gamepad.enabled", false);
-// 4607: [2503] disable giving away network info (FF31+)
+// 4607: [2503] disable giving away network info [FF31+]
    // e.g. bluetooth, cellular, ethernet, wifi, wimax, other, mixed, unknown, none
    // [1] https://developer.mozilla.org/docs/Web/API/Network_Information_API
    // [2] https://wicg.github.io/netinfo/
@@ -1673,7 +1679,7 @@ user_pref("dom.netinfo.enabled", false);
 user_pref("media.webspeech.synth.enabled", false);
 // * * * /
 // FF57+
-// 4610: [2506] disable video statistics - JS performance fingerprinting (FF25+)
+// 4610: [2506] disable video statistics - JS performance fingerprinting [FF25+]
    // [1] https://trac.torproject.org/projects/tor/ticket/15757
    // [2] https://bugzilla.mozilla.org/654550
 user_pref("media.video_stats.enabled", false);
@@ -1686,7 +1692,7 @@ user_pref("media.video_stats.enabled", false);
    // user_pref("dom.w3c_touch_events.enabled", 0);
 // * * * /
 // FF59+
-// 4612: [2511] disable MediaDevices change detection (FF51+)
+// 4612: [2511] disable MediaDevices change detection [FF51+]
    // [1] https://developer.mozilla.org/docs/Web/Events/devicechange
    // [2] https://developer.mozilla.org/docs/Web/API/MediaDevices/ondevicechange
 user_pref("media.ondevicechange.enabled", false);
@@ -1711,20 +1717,20 @@ user_pref("webgl.enable-debug-renderer-info", false);
 ***/
 user_pref("_user.js.parrot", "4700 syntax error: the parrot's taken 'is last bow");
 /* 4701: navigator.userAgent ***/
-   // user_pref("general.useragent.override", ""); // (hidden pref)
+   // user_pref("general.useragent.override", ""); // [HIDDEN PREF]
 /* 4702: navigator.buildID
  * Revealed build time down to the second. In FF64+ it now returns a fixed timestamp
  * [1] https://bugzilla.mozilla.org/583181
  * [2] https://www.fxsitecompat.com/en-CA/docs/2018/navigator-buildid-now-returns-a-fixed-timestamp/ ***/
-   // user_pref("general.buildID.override", ""); // (hidden pref)
+   // user_pref("general.buildID.override", ""); // [HIDDEN PREF]
 /* 4703: navigator.appName ***/
-   // user_pref("general.appname.override", ""); // (hidden pref)
+   // user_pref("general.appname.override", ""); // [HIDDEN PREF]
 /* 4704: navigator.appVersion ***/
-   // user_pref("general.appversion.override", ""); // (hidden pref)
+   // user_pref("general.appversion.override", ""); // [HIDDEN PREF]
 /* 4705: navigator.platform ***/
-   // user_pref("general.platform.override", ""); // (hidden pref)
+   // user_pref("general.platform.override", ""); // [HIDDEN PREF]
 /* 4706: navigator.oscpu ***/
-   // user_pref("general.oscpu.override", ""); // (hidden pref)
+   // user_pref("general.oscpu.override", ""); // [HIDDEN PREF]
 
 /*** [SECTION 5000]: PERSONAL
      Non-project related but useful. If any of these interest you, add them to your overrides ***/
@@ -1742,8 +1748,8 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("full-screen-api.warning.timeout", 0);
    // user_pref("general.warnOnAboutConfig", false);
 /* APPEARANCE ***/
-   // user_pref("browser.download.autohideButton", false); // (FF57+)
-   // user_pref("toolkit.cosmeticAnimations.enabled", false); // (FF55+)
+   // user_pref("browser.download.autohideButton", false); // [FF57+]
+   // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
 /* CONTENT BEHAVIOR ***/
    // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
    // user_pref("clipboard.autocopy", false); // disable autocopy default [LINUX]
@@ -1751,13 +1757,13 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
 /* UX BEHAVIOR ***/
    // user_pref("browser.backspace_action", 2); // 0=previous page, 1=scroll up, 2=do nothing
    // user_pref("browser.tabs.closeWindowWithLastTab", false);
-   // user_pref("browser.tabs.loadBookmarksInTabs", true); // open bookmarks in a new tab (FF57+)
-   // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see Bugzilla 1320061 (FF53+)
+   // user_pref("browser.tabs.loadBookmarksInTabs", true); // open bookmarks in a new tab [FF57+]
+   // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see Bugzilla 1320061 [FF53+]
    // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [WINDOWS] [MAC]
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
 /* OTHER ***/
    // user_pref("browser.bookmarks.max_backups", 2);
-   // user_pref("identity.fxaccounts.enabled", false); // disable and hide Firefox Accounts and Sync (FF60+) [RESTART]
+   // user_pref("identity.fxaccounts.enabled", false); // disable and hide Firefox Accounts and Sync [FF60+] [RESTART]
    // user_pref("network.manage-offline-status", false); // see Bugzilla 620472
    // user_pref("reader.parse-on-load.enabled", false); // "Reader View"
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
@@ -1781,7 +1787,7 @@ user_pref("dom.network.enabled", false);
 // 2600's: (35+) disable WebSockets
    // [-] https://bugzilla.mozilla.org/1091016
 user_pref("network.websocket.enabled", false);
-// 1610: (36+) set DNT "value" to "not be tracked" (FF21+)
+// 1610: (36+) set DNT "value" to "not be tracked" [FF21+]
    // [1] http://kb.mozillazine.org/Privacy.donottrackheader.value
    // [-] https://bugzilla.mozilla.org/1042135#c101
    // user_pref("privacy.donottrackheader.value", 1);
@@ -1830,7 +1836,7 @@ user_pref("pfs.datasource.url", "");
    // user_pref("browser.search.showOneOffButtons", false);
 // ***/
 /* FF44
-// 0414: disable safebrowsing's real-time binary checking (google) (FF43+)
+// 0414: disable safebrowsing's real-time binary checking (google) [FF43+]
    // [-] https://bugzilla.mozilla.org/1237103
 user_pref("browser.safebrowsing.provider.google.appRepURL", ""); // browser.safebrowsing.appRepURL
 // 1200's: block rc4 whitelist
@@ -1854,8 +1860,8 @@ user_pref("browser.sessionstore.privacy_level_deferred", 2);
 /* FF46
 // 0333: disable health report
    // [-] https://bugzilla.mozilla.org/1234526
-user_pref("datareporting.healthreport.service.enabled", false); // (hidden pref)
-user_pref("datareporting.healthreport.documentServerURI", ""); // (hidden pref)
+user_pref("datareporting.healthreport.service.enabled", false); // [HIDDEN PREF]
+user_pref("datareporting.healthreport.documentServerURI", ""); // [HIDDEN PREF]
 // 0334b: disable FHR (Firefox Health Report) v2 data being sent to Mozilla servers
    // [-] https://bugzilla.mozilla.org/1234522
 user_pref("datareporting.policy.dataSubmissionEnabled.v2", false);
@@ -1865,7 +1871,7 @@ user_pref("browser.safebrowsing.appRepURL", ""); // Google application reputatio
 // 0420: disable polaris (part of Tracking Protection, never used in stable)
    // [-] https://bugzilla.mozilla.org/1235565
    // user_pref("browser.polaris.enabled", false);
-// 0510: disable "Pocket" - replaced by extensions.pocket.*
+// 0510: disable "Pocket" [FF39+] - replaced by extensions.pocket.*
    // [-] https://bugzilla.mozilla.org/1215694
 user_pref("browser.pocket.enabled", false);
 user_pref("browser.pocket.api", "");
@@ -1876,7 +1882,7 @@ user_pref("browser.pocket.oAuthConsumerKey", "");
 // 0330b: set unifiedIsOptIn to make sure telemetry respects OptIn choice and that telemetry
    // is enabled ONLY for people that opted into it, even if unified Telemetry is enabled
    // [-] https://bugzilla.mozilla.org/1236580
-user_pref("toolkit.telemetry.unifiedIsOptIn", true); // (hidden pref)
+user_pref("toolkit.telemetry.unifiedIsOptIn", true); // [HIDDEN PREF]
 // 0333b: disable about:healthreport page UNIFIED
    // [-] https://bugzilla.mozilla.org/1236580
 user_pref("datareporting.healthreport.about.reportUrlUnified", "data:text/plain,");
@@ -1994,14 +2000,14 @@ user_pref("media.eme.apiVisible", false);
 user_pref("dom.archivereader.enabled", false);
 // ***/
 /* FF55
-// 0209: disable geolocation on non-secure origins (FF54+)
+// 0209: disable geolocation on non-secure origins [FF54+]
    // [1] https://bugzilla.mozilla.org/1269531
    // [-] https://bugzilla.mozilla.org/1072859
 user_pref("geo.security.allowinsecure", false);
-// 0336: disable "Heartbeat" (Mozilla user rating telemetry) (FF37+)
+// 0336: disable "Heartbeat" (Mozilla user rating telemetry) [FF37+]
    // [1] https://trac.torproject.org/projects/tor/ticket/18738
    // [-] https://bugzilla.mozilla.org/1361578
-user_pref("browser.selfsupport.enabled", false); // (hidden pref)
+user_pref("browser.selfsupport.enabled", false); // [HIDDEN PREF]
 user_pref("browser.selfsupport.url", "");
 // 0360: disable new tab "pings"
    // [-] https://bugzilla.mozilla.org/1241390
@@ -2009,14 +2015,14 @@ user_pref("browser.newtabpage.directory.ping", "data:text/plain,");
 // 0861: disable saving form history on secure websites
    // [-] https://bugzilla.mozilla.org/1361220
 user_pref("browser.formfill.saveHttpsForms", false);
-// 0863: disable Form Autofill (FF54+) - replaced by extensions.formautofill.*
+// 0863: disable Form Autofill [FF54+] - replaced by extensions.formautofill.*
    // [-] https://bugzilla.mozilla.org/1364334
 user_pref("browser.formautofill.enabled", false);
 // 2410: disable User Timing API
    // [1] https://trac.torproject.org/projects/tor/ticket/16336
    // [-] https://bugzilla.mozilla.org/1344669
 user_pref("dom.enable_user_timing", false);
-// 2507: disable keyboard fingerprinting (FF38+) (physical keyboards)
+// 2507: disable keyboard fingerprinting (physical keyboards) [FF38+]
    // The Keyboard API allows tracking the "read parameter" of pressed keys in forms on
    // web pages. These parameters vary between types of keyboard layouts such as QWERTY,
    // AZERTY, Dvorak, and between various languages, e.g. German vs English.
@@ -2033,10 +2039,10 @@ user_pref("browser.tabs.animate", false);
 user_pref("browser.fullscreen.animate", false);
 // ***/
 /* FF56
-// 0515: disable Screenshots (rollout pref only) (FF54+)
+// 0515: disable Screenshots (rollout pref only) [FF54+]
    // [-] https://bugzilla.mozilla.org/1386333
    // user_pref("extensions.screenshots.system-disabled", true);
-// 0517: disable Form Autofill (FF55+) - replaced by extensions.formautofill.available
+// 0517: disable Form Autofill [FF55+] - replaced by extensions.formautofill.available
    // [-] https://bugzilla.mozilla.org/1385201
 user_pref("extensions.formautofill.experimental", false);
 // ***/
@@ -2050,10 +2056,10 @@ user_pref("social.shareDirectory", "");
 user_pref("social.remote-install.enabled", false);
 user_pref("social.directories", "");
 user_pref("social.share.activationPanelEnabled", false);
-user_pref("social.enabled", false); // (hidden pref)
-// 1830: disable DRM's EME WideVineAdapter
+user_pref("social.enabled", false); // [HIDDEN PREF]
+// 1830: disable DRM's EME WideVineAdapter [FF55+]
    // [-] https://bugzilla.mozilla.org/1395468
-user_pref("media.eme.chromium-api.enabled", false); // (FF55+)
+user_pref("media.eme.chromium-api.enabled", false);
 // 2608: disable WebIDE extension downloads (Valence)
    // [1] https://trac.torproject.org/projects/tor/ticket/16222
    // [-] https://bugzilla.mozilla.org/1393497
@@ -2062,14 +2068,14 @@ user_pref("devtools.webide.autoinstallFxdtAdapters", false);
    // [1] https://trac.torproject.org/projects/tor/ticket/16222
    // [-] https://bugzilla.mozilla.org/1393582
 user_pref("browser.casting.enabled", false);
-// 5022: hide recently bookmarked items (you still have the original bookmarks) (FF49+)
+// 5022: hide recently bookmarked items (you still have the original bookmarks) [FF49+]
    // [-] https://bugzilla.mozilla.org/1401238
 user_pref("browser.bookmarks.showRecentlyBookmarked", false);
 // ***/
 /* FF58
-// 0351: disable sending of crash reports - replaced by *.autoSubmit2
+// 0351: disable sending of crash reports [FF51+] - replaced by *.autoSubmit2
    // [-] https://bugzilla.mozilla.org/1424373
-user_pref("browser.crashReports.unsubmittedCheck.autoSubmit", false); // (FF51-57)
+user_pref("browser.crashReports.unsubmittedCheck.autoSubmit", false);
 // ***/
 /* FF59
 // 0203: disable using OS locale, force APP locale - replaced by intl.locale.requested
@@ -2083,7 +2089,7 @@ user_pref("general.useragent.locale", "en-US");
    // If you want to see what health data is present, then this must be set at default
    // [-] https://bugzilla.mozilla.org/1352497
 user_pref("datareporting.healthreport.about.reportUrl", "data:text/plain,");
-// 0511: disable FlyWeb (FF49+)
+// 0511: disable FlyWeb [FF49+]
    // Flyweb is a set of APIs for advertising and discovering local-area web servers
    // [1] https://flyweb.github.io/
    // [2] https://wiki.mozilla.org/FlyWeb/Security_scenarios
@@ -2094,7 +2100,7 @@ user_pref("dom.flyweb.enabled", false);
    // [1] https://trac.torproject.org/projects/tor/ticket/13575
    // [-] https://bugzilla.mozilla.org/1430197
 user_pref("browser.cache.frecency_experiment", -1);
-// 1242: enable Mixed-Content-Blocker to use the HSTS cache but disable the HSTS Priming requests (FF51+)
+// 1242: enable Mixed-Content-Blocker to use the HSTS cache but disable the HSTS Priming requests [FF51+]
    // Allow resources from domains with an existing HSTS cache record or in the HSTS preload list
    // to be upgraded to HTTPS internally but disable sending out HSTS Priming requests, because
    // those may cause noticeable delays e.g. requests time out or are not handled well by servers
@@ -2103,9 +2109,9 @@ user_pref("browser.cache.frecency_experiment", -1);
    // [-] https://bugzilla.mozilla.org/1424917
 user_pref("security.mixed_content.use_hsts", true);
 user_pref("security.mixed_content.send_hsts_priming", false);
-// 1606: set the default Referrer Policy - replaced by network.http.referer.defaultPolicy
+// 1606: set the default Referrer Policy [FF53+] - replaced by network.http.referer.defaultPolicy
    // [-] https://bugzilla.mozilla.org/587523
-user_pref("network.http.referer.userControlPolicy", 3); // (FF53-FF58) default: 3
+user_pref("network.http.referer.userControlPolicy", 3);
 // 1804: disable plugins using external/untrusted scripts with XPCOM or XPConnect
    // [-] (part8) https://bugzilla.mozilla.org/1416703#c21
 user_pref("security.xpconnect.plugin.unrestricted", false);
@@ -2128,14 +2134,14 @@ user_pref("dom.idle-observers-api.enabled", false);
 user_pref("browser.newtabpage.directory.source", "data:text/plain,");
 user_pref("browser.newtabpage.enhanced", false);
 user_pref("browser.newtabpage.introShown", true);
-// 0512: disable Shield (FF53+) - replaced internally by Normandy (see 0503)
+// 0512: disable Shield - replaced internally by Normandy (see 0503) [FF53+]
    // Shield is an telemetry system (including Heartbeat) that can also push and test "recipes"
    // [1] https://wiki.mozilla.org/Firefox/Shield
    // [2] https://github.com/mozilla/normandy
    // [-] https://bugzilla.mozilla.org/1436113
 user_pref("extensions.shield-recipe-client.enabled", false);
 user_pref("extensions.shield-recipe-client.api_url", "");
-// 0514: disable Activity Stream (FF54+)
+// 0514: disable Activity Stream [FF54+]
    // [-] https://bugzilla.mozilla.org/1433324
 user_pref("browser.newtabpage.activity-stream.enabled", false);
 // 2301: disable workers
@@ -2158,7 +2164,7 @@ user_pref("experiments.enabled", false);
 user_pref("experiments.manifest.uri", "");
 user_pref("experiments.supported", false);
 user_pref("experiments.activeExperiment", false);
-// 2612: disable remote JAR files being opened, regardless of content type (FF42+)
+// 2612: disable remote JAR files being opened, regardless of content type [FF42+]
    // [1] https://bugzilla.mozilla.org/1173171
    // [2] https://www.fxsitecompat.com/en-CA/docs/2015/jar-protocol-support-has-been-disabled-by-default/
    // [-] https://bugzilla.mozilla.org/1427726
@@ -2176,18 +2182,18 @@ user_pref("plugin.state.java", 0);
 // 0202: disable GeoIP-based search results
    // [NOTE] May not be hidden if Firefox has changed your settings due to your locale
    // [-] https://bugzilla.mozilla.org/1462015
-user_pref("browser.search.countryCode", "US"); // (hidden pref)
+user_pref("browser.search.countryCode", "US"); // [HIDDEN PREF]
 // 0301a: disable auto-update checks for Firefox
    // [SETTING] General>Firefox Updates>Never check for updates
    // [-] https://bugzilla.mozilla.org/1420514
    // user_pref("app.update.enabled", false);
-// 0402: enable Kinto blocklist updates (FF50+)
+// 0402: enable Kinto blocklist updates [FF50+]
    // What is Kinto?: https://wiki.mozilla.org/Firefox/Kinto#Specifications
    // As Firefox transitions to Kinto, the blocklists have been broken down into entries for certs to be
    // revoked, extensions and plugins to be disabled, and gfx environments that cause problems or crashes
    // [-] https://bugzilla.mozilla.org/1458917
 user_pref("services.blocklist.update_enabled", true);
-// 0503: disable "Savant" Shield study (FF61+)
+// 0503: disable "Savant" Shield study [FF61+]
    // [-] https://bugzilla.mozilla.org/1457226
 user_pref("shield.savant.enabled", false);
 // 1031: disable favicons in tabs and new bookmarks - merged into browser.chrome.site_icons
@@ -2199,7 +2205,7 @@ user_pref("shield.savant.enabled", false);
 user_pref("media.autoplay.enabled", false);
 // 2704: set cookie lifetime in days (see 2703)
    // [-] https://bugzilla.mozilla.org/1457170
-   // user_pref("network.cookie.lifetime.days", 90); // default: 90
+   // user_pref("network.cookie.lifetime.days", 90); // [DEFAULT: 90]
 // 5000's: enable "Ctrl+Tab cycles through tabs in recently used order" - replaced by browser.ctrlTab.recentlyUsedOrder
    // [-] https://bugzilla.mozilla.org/1473595
    // user_pref("browser.ctrlTab.previews", true);

From 5c85e61bb4f5fca18ef37de9b3eef32da9d6259b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Dec 2018 07:36:07 +1300
Subject: [PATCH 0146/1147] 4000: remove old FPI notes (#581)

---
 user.js | 5 -----
 1 file changed, 5 deletions(-)

diff --git a/user.js b/user.js
index 54cc2d4..f00355d 100644
--- a/user.js
+++ b/user.js
@@ -1528,11 +1528,6 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1300671 - isolate data:, about: URLs (FF55+)
  ** 1473247 - isolate IP addresses (FF63+)
  ** 1492607 - isolate postMessage with targetOrigin "*" (requires 4002) (FF65+)
-
- NOTE: FPI has some issues depending on your Firefox release
- ** 1418931 - [fixed in FF58+] IndexedDB (Offline Website Data) with FPI Origin Attributes
-      are not removed with "Clear All/Recent History" or "On Close"
- ** 1381197 - [fixed in FF59+] extensions cannot control cookies with FPI Origin Attributes
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]

From 8172f730d361fb026893a8c69b3bda1b4e6f1294 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 10 Dec 2018 19:26:17 +0000
Subject: [PATCH 0147/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 1e1b28c..fc5d76a 100644
--- a/README.md
+++ b/README.md
@@ -17,7 +17,7 @@ Literally thousands of sources, references and suggestions. That said...
 
 * Martin Brinkmann at [ghacks](https://www.ghacks.net/) <sup>1</sup>
 * The ghacks community and commentators
-* [12bytes](http://12bytes.org/tech/firefox/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs)
+* [12bytes](https://12bytes.org/articles/tech/firefox/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs)
    * The 12bytes article now uses this user.js and supplements it with an additional JS hosted at [GitLab](https://gitlab.com/labwrat/Firefox-user.js/tree/master)
 
 <sup>1</sup> The ghacks user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015 and was [first published](https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/) at ghacks in August 2015. With Martin Brinkmann's blessing, it will keep the ghacks name.

From 45e3b3a0e023ef328b2f0aabe1ba2007db42a2b9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 10 Dec 2018 19:35:41 +0000
Subject: [PATCH 0148/1147] 2682: put correct version back

https://github.com/ghacksuserjs/ghacks-user.js/commit/0a67cdec8bac0d2172a2ffbf92af4e093c8e8275#comments
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index f00355d..6165ef8 100644
--- a/user.js
+++ b/user.js
@@ -1375,7 +1375,7 @@ user_pref("security.csp.enable", true); // [DEFAULT: true]
 /* 2681: disable CSP violation events [FF59+]
  * [1] https://developer.mozilla.org/docs/Web/API/SecurityPolicyViolationEvent ***/
 user_pref("security.csp.enable_violation_events", false);
-/* 2682: enable CSP 1.1 experimental hash-source directive [FF44+]
+/* 2682: enable CSP 1.1 experimental hash-source directive [FF29+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=855326,883975 ***/
 user_pref("security.csp.experimentalEnabled", true);
 /* 2683: block top level window data: URIs [FF56+]

From 74ebacc0dd914afa6fd7e96c3f0194db91dd7b77 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 10 Dec 2018 19:52:48 +0000
Subject: [PATCH 0149/1147] obey rules for [setting] tag location #578

all setting tags must be between `/* ... ***/`
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 6165ef8..82737da 100644
--- a/user.js
+++ b/user.js
@@ -107,10 +107,10 @@ user_pref("browser.newtabpage.activity-stream.telemetry", false);
 user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
 /* 0105b: disable AS Snippets ***/
 user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
-user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // [SETTING]
+user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // has setting (see 0105)
 /* 0105c: disable AS Top Stories, Pocket-based and/or sponsored content ***/
 user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
-user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false); // [SETTING]
+user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false); // has setting (see 0105)
 user_pref("browser.newtabpage.activity-stream.showSponsored", false);
 /* 0105d: disable AS recent Highlights in the Library [FF57+] ***/
    // user_pref("browser.library.activity-stream.enabled", false);

From 71a2d393f37e0dc3b77975b992b915be0e4d4ea7 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 10 Dec 2018 22:23:00 +0000
Subject: [PATCH 0150/1147] minor wording changes (#583)

---
 user.js | 47 ++++++++++++++++++++++++-----------------------
 1 file changed, 24 insertions(+), 23 deletions(-)

diff --git a/user.js b/user.js
index 82737da..c50d76b 100644
--- a/user.js
+++ b/user.js
@@ -50,7 +50,7 @@
      0700: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc
      0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
      0900: PASSWORDS
-     1000: CACHE
+     1000: CACHE / SESSION (RE)STORE / FAVICONS
      1200: HTTPS (SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS)
      1400: FONTS
      1600: HEADERS / REFERERS
@@ -488,7 +488,7 @@ user_pref("network.proxy.socks_remote_dns", true);
 user_pref("network.proxy.autoconfig_url.include_path", false); // [DEFAULT: false]
 /* 0707: disable (or setup) DNS-over-HTTPS (DoH) [FF60+]
  * TRR = Trusted Recursive Resolver
- * .mode: 0=off, 1=race, 2=TRR first, 3=TRR only, 4=race for stats, but always use native result
+ * .mode: 0=off, 1=race, 2=TRR first, 3=TRR only, 4=race for stats but always use native result
  * [WARNING] DoH bypasses hosts and gives info to yet another party (e.g. Cloudflare)
  * [1] https://www.ghacks.net/2018/04/02/configure-dns-over-https-in-firefox/
  * [2] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/ ***/
@@ -546,7 +546,7 @@ user_pref("browser.sessionhistory.max_entries", 10);
  * [3] https://developer.mozilla.org/docs/Web/CSS/Privacy_and_the_:visited_selector ***/
 user_pref("layout.css.visited_links_enabled", false);
 /* 0806: disable displaying javascript in history URLs ***/
-user_pref("browser.urlbar.filter.javascript", true);
+user_pref("browser.urlbar.filter.javascript", true); // [DEFAULT: true]
 /* 0807: disable search bar LIVE search suggestions
  * [SETTING] Search>Provide search suggestions ***/
 user_pref("browser.search.suggest.enabled", false);
@@ -651,7 +651,7 @@ user_pref("security.insecure_field_warning.contextual.enabled", true);
  * [1] https://bugzilla.mozilla.org/1357835 ***/
 user_pref("network.auth.subresource-img-cross-origin-http-auth-allow", false);
 
-/*** [SECTION 1000]: CACHE [SETUP-CHROME]
+/*** [SECTION 1000]: CACHE / SESSION (RE)STORE / FAVICONS [SETUP-CHROME]
      ETAG [1] and other [2][3] cache tracking/fingerprinting techniques can be averted by
      disabling *BOTH* disk (1001) and memory (1003) cache. ETAGs can also be neutralized
      by modifying response headers [4]. Another solution is to use a hardened configuration
@@ -691,6 +691,7 @@ user_pref("browser.cache.disk_cache_ssl", false);
 /* 1008: set DNS cache and expiration time (default 400 and 60, same as Tor Browser) ***/
    // user_pref("network.dnsCacheEntries", 400);
    // user_pref("network.dnsCacheExpiration", 60);
+
 /** SESSIONS & SESSION RESTORE ***/
 /* 1020: limit Session Restore to last active tab and window
  * [SETUP-CHROME] This also disables the "Recently Closed Tabs" feature
@@ -702,7 +703,7 @@ user_pref("browser.sessionstore.max_windows_undo", 0);
  * define on which sites to save extra session data:
  * 0=everywhere, 1=unencrypted sites, 2=nowhere ***/
 user_pref("browser.sessionstore.privacy_level", 2);
-/* 1022: disable resuming session from crash [SETUP-CHROME] ***/
+/* 1022: disable resuming session from crash ***/
 user_pref("browser.sessionstore.resume_from_crash", false);
 /* 1023: set the minimum interval between session save operations
  * Increasing this can help on older machines and some websites, as well as reducing writes, see [1]
@@ -715,6 +716,7 @@ user_pref("browser.sessionstore.interval", 30000);
 /* 1024: disable automatic Firefox start and session restore after reboot [FF62+] [WINDOWS]
  * [1] https://bugzilla.mozilla.org/603903 ***/
 user_pref("toolkit.winRegisterApplicationRestart", false);
+
 /** FAVICONS ***/
 /* 1030: disable favicons in shortcuts
  * URL shortcuts use a cached randomly named .ico file which is stored in your
@@ -748,7 +750,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * [2] https://www.ssllabs.com/ssl-pulse/ ***/
 user_pref("security.ssl.require_safe_negotiation", true);
 /* 1202: control TLS versions with min and max
- * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3 etc
+ * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
  * [NOTE] Jul-2017: Telemetry indicates approx 2% of TLS web traffic uses 1.0 or 1.1
  * [1] http://kb.mozillazine.org/Security.tls.version.*
  * [2] https://www.ssl.com/how-to/turn-off-ssl-3-0-and-tls-1-0-in-your-browser/
@@ -831,7 +833,7 @@ user_pref("security.mixed_content.block_object_subrequest", true);
  * 2=deprecated option that now maps to 1
  * 3=only allowed for locally-added roots (e.g. anti-virus)
  * 4=only allowed for locally-added roots or for certs in 2015 and earlier
- * [SETUP-WEB] When disabled, some man-in-the-middle devices (e.g. security scanners and
+ * [SETUP-CHROME] When disabled, some man-in-the-middle devices (e.g. security scanners and
  * antivirus products, may fail to connect to HTTPS sites. SHA-1 is *almost* obsolete.
  * [1] https://blog.mozilla.org/security/2016/10/18/phasing-out-sha-1-on-the-public-web/ ***/
 user_pref("security.pki.sha1_enforcement_level", 1);
@@ -910,9 +912,8 @@ user_pref("font.blacklist.underline_offset", "");
 user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
  * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed.
- * [WARNING] Creating your own probably highly-unique whitelist will raise your entropy. If
- * you block sites choosing fonts in 1401, this preference is irrelevant. In future,
- * privacy.resistFingerprinting (see 4500) will cover this (and 1401 can be relaxed)
+ * [WARNING] Creating your own probably highly-unique whitelist will raise your entropy.
+ * Eventually privacy.resistFingerprinting (see 4500) will cover this (and 1401 can be relaxed)
  * [1] https://bugzilla.mozilla.org/1121643 ***/
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
 
@@ -980,10 +981,9 @@ user_pref("privacy.userContext.ui.enabled", true);
 user_pref("privacy.userContext.enabled", true);
 /* 1703: enable a private container for thumbnail loads [FF51+] ***/
 user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // [DEFAULT: true in FF61+]
-/* 1704: set long press behaviour on "+ Tab" button to display container menu [FF53+]
- * 0=disables long press, 1=when clicked, the menu is shown
- * 2=the menu is shown after X milliseconds
- * [NOTE] The menu does not contain a non-container tab option
+/* 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
+ * 0=no menu (default), 1=show when clicked, 2=show on long press
+ * [NOTE] The menu does not contain a non-container tab option (use Ctrl+T to open non-container tab)
  * [1] https://bugzilla.mozilla.org/1328756 ***/
 user_pref("privacy.userContext.longPressBehavior", 2);
 
@@ -1022,8 +1022,8 @@ user_pref("media.gmp-widevinecdm.autoupdate", false);
  * [SETTING] General>DRM Content>Play DRM-controlled content
  * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
 user_pref("media.eme.enabled", false);
-/* 1840: disable the OpenH264 Video Codec by Cisco to "Never Activate"
- * This is the bundled codec used for video chat in WebRTC [SETUP-WEB] ***/
+/* 1840: disable the OpenH264 Video Codec by Cisco to "Never Activate" [SETUP-WEB]
+ * This is the bundled codec used for video chat in WebRTC ***/
 user_pref("media.gmp-gmpopenh264.enabled", false); // [HIDDEN PREF]
 user_pref("media.gmp-gmpopenh264.autoupdate", false);
 
@@ -1095,7 +1095,7 @@ user_pref("dom.disable_window_open_feature.resizable", true); // [DEFAULT: true]
 user_pref("dom.disable_window_open_feature.status", true); // [DEFAULT: true]
 user_pref("dom.disable_window_open_feature.titlebar", true);
 user_pref("dom.disable_window_open_feature.toolbar", true);
-/* 2202: prevent scripts moving and resizing open windows ***/
+/* 2202: prevent scripts from moving and resizing open windows ***/
 user_pref("dom.disable_window_move_resize", true);
 /* 2203: open links targeting new windows in a new tab instead
  * This stops malicious window sizes and some screen resolution leaks.
@@ -1302,7 +1302,7 @@ user_pref("middlemouse.contentLoadURL", false);
  * To control HTML Meta tag and JS redirects, use an extension. Default is 20 ***/
 user_pref("network.http.redirection-limit", 10);
 /* 2615: disable websites overriding Firefox's keyboard shortcuts [FF58+]
- * 0= (default), 1=allow, 2=block
+ * 0 (default) or 1=allow, 2=block
  * [NOTE] At the time of writing, causes issues with delete and backspace keys
  * [SETTING] to add site exceptions: Page Info>Permissions>Override Keyboard Shortcuts ***/
    // user_pref("permissions.default.shortcuts", 2);
@@ -1606,8 +1606,8 @@ user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs")
  * [SETUP-WEB] RFP is not ready for the masses, so expect some website breakage
  * [1] https://bugzilla.mozilla.org/418986 ***/
 user_pref("privacy.resistFingerprinting", true);
-/* 4502: set new window sizes to round to hundreds [FF55+]
- * [SETUP-CHROME] Width will round down to multiples of 200s and height to 100s, to fit your screen.
+/* 4502: set new window sizes to round to hundreds [FF55+] [SETUP-CHROME]
+ * Width will round down to multiples of 200s and height to 100s, to fit your screen.
  * The override values are a starting point to round from if you want some control
  * [1] https://bugzilla.mozilla.org/1330882
  * [2] https://hardware.metrics.mozilla.com/ ***/
@@ -2059,6 +2059,7 @@ user_pref("media.eme.chromium-api.enabled", false);
    // [1] https://trac.torproject.org/projects/tor/ticket/16222
    // [-] https://bugzilla.mozilla.org/1393497
 user_pref("devtools.webide.autoinstallFxdtAdapters", false);
+user_pref("devtools.webide.adaptersAddonURL", "");
 // 2600's: disable SimpleServiceDiscovery - which can bypass proxy settings - e.g. Roku
    // [1] https://trac.torproject.org/projects/tor/ticket/16222
    // [-] https://bugzilla.mozilla.org/1393582
@@ -2083,7 +2084,7 @@ user_pref("general.useragent.locale", "en-US");
    // If you have disabled health reports, then this about page is useless - disable it
    // If you want to see what health data is present, then this must be set at default
    // [-] https://bugzilla.mozilla.org/1352497
-user_pref("datareporting.healthreport.about.reportUrl", "data:text/plain,");
+user_pref("datareporting.healthreport.about.reportUrl", "data:,");
 // 0511: disable FlyWeb [FF49+]
    // Flyweb is a set of APIs for advertising and discovering local-area web servers
    // [1] https://flyweb.github.io/
@@ -2129,7 +2130,7 @@ user_pref("dom.idle-observers-api.enabled", false);
 user_pref("browser.newtabpage.directory.source", "data:text/plain,");
 user_pref("browser.newtabpage.enhanced", false);
 user_pref("browser.newtabpage.introShown", true);
-// 0512: disable Shield - replaced internally by Normandy (see 0503) [FF53+]
+// 0512: disable Shield [FF53+] - renamed to app.normandy.* (see 0503)
    // Shield is an telemetry system (including Heartbeat) that can also push and test "recipes"
    // [1] https://wiki.mozilla.org/Firefox/Shield
    // [2] https://github.com/mozilla/normandy
@@ -2187,7 +2188,7 @@ user_pref("browser.search.countryCode", "US"); // [HIDDEN PREF]
    // As Firefox transitions to Kinto, the blocklists have been broken down into entries for certs to be
    // revoked, extensions and plugins to be disabled, and gfx environments that cause problems or crashes
    // [-] https://bugzilla.mozilla.org/1458917
-user_pref("services.blocklist.update_enabled", true);
+user_pref("services.blocklist.update_enabled", true); // [DEFAULT: true]
 // 0503: disable "Savant" Shield study [FF61+]
    // [-] https://bugzilla.mozilla.org/1457226
 user_pref("shield.savant.enabled", false);

From 23733097a95d9db37028d0ec8c7991bd0bf0a04b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Dec 2018 00:13:07 +0000
Subject: [PATCH 0151/1147] 2302 FF version

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index c50d76b..4ffd04a 100644
--- a/user.js
+++ b/user.js
@@ -1137,7 +1137,7 @@ user_pref("dom.popup_allowed_events", "click dblclick");
      [6]  Notifications: https://support.mozilla.org/questions/1165867#answer-981820
 ***/
 user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
-/* 2302: disable service workers
+/* 2302: disable service workers [FF32, FF44-compat]
  * Service workers essentially act as proxy servers that sit between web apps, and the browser
  * and network, are event driven, and can control the web page/site it is associated with,
  * intercepting and modifying navigation and resource requests, and caching resources.

From 778dc89bb6126212d9c897f6e7add88ca5e6a96e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Dec 2018 00:40:03 +0000
Subject: [PATCH 0152/1147] 2002 WebRTC tests #580

FYI, the https://www.privacytools.io/webrtc.html test in our wiki is 404, so I gave it a strikethru and added this one. This is also handy for 2001, but do we need to double up on it? We're only disabling WebRTC because of IP leaks, so I don't see the point in testing if WebRTC is disabled.
---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 4ffd04a..7c6a668 100644
--- a/user.js
+++ b/user.js
@@ -1040,6 +1040,7 @@ user_pref("media.peerconnection.turn.disable", true);
 user_pref("media.peerconnection.ice.tcp", false);
 user_pref("media.navigator.video.enabled", false); // video capability for WebRTC
 /* 2002: limit WebRTC IP leaks if using WebRTC
+ * [TEST] https://browserleaks.com/webrtc
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1189041,1297416
  * [2] https://wiki.mozilla.org/Media/WebRTC/Privacy ***/
 user_pref("media.peerconnection.ice.default_address_only", true); // [FF42-FF50]

From 0e1b0a4b6e572f88a7e456a75be8e88f46a9b559 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 11 Dec 2018 15:40:29 +0000
Subject: [PATCH 0153/1147] move 0370 to 0105b (#586)

---
 user.js | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 7c6a668..484b963 100644
--- a/user.js
+++ b/user.js
@@ -105,13 +105,16 @@ user_pref("browser.newtab.preload", false);
 user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
 user_pref("browser.newtabpage.activity-stream.telemetry", false);
 user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
-/* 0105b: disable AS Snippets ***/
+/* 0105b: disable AS Snippets
+ * Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
+ * [1] https://abouthome-snippets-service.readthedocs.io/ ***/
 user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
 user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // has setting (see 0105)
+user_pref("browser.aboutHomeSnippets.updateUrl", "");
 /* 0105c: disable AS Top Stories, Pocket-based and/or sponsored content ***/
-user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
+user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false); // has setting (see 0105)
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false); // has setting (see 0105)
-user_pref("browser.newtabpage.activity-stream.showSponsored", false);
+user_pref("browser.newtabpage.activity-stream.showSponsored", false); // has setting (see 0105)
 /* 0105d: disable AS recent Highlights in the Library [FF57+] ***/
    // user_pref("browser.library.activity-stream.enabled", false);
 /* 0110: start Firefox in PB (Private Browsing) mode
@@ -234,9 +237,6 @@ user_pref("breakpad.reportURL", "");
 user_pref("browser.tabs.crashReporting.sendReport", false); // [FF44+]
 user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // [FF51+]
 user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [FF58+]
-/* 0370: disable "Snippets" (Mozilla content shown on about:home screen)
- * [1] https://wiki.mozilla.org/Firefox/Projects/Firefox_Start/Snippet_Service ***/
-user_pref("browser.aboutHomeSnippets.updateUrl", "data:,");
 /* 0380: disable Browser Error Reporter [FF60+]
  * [1] https://support.mozilla.org/en-US/kb/firefox-nightly-error-collection
  * [2] https://firefox-source-docs.mozilla.org/browser/browser/BrowserErrorReporter.html ***/

From 205c48d9d324bb8ef7f39a6281e3af0e5c3e7ee2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Dec 2018 15:49:31 +0000
Subject: [PATCH 0154/1147] final 63 release

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 484b963..8bed37a 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 13 November 2018
-* version 63-beta: Pants Romance
+* date: 11 December 2018
+* version 63: Pants Romance
 *   "Rah rah ah-ah-ah! Ro mah ro-mah-mah. Gaga oh-la-la! Want your pants romance"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From ef1e61ebcd33a88ef18913299c2d3e3ebc1c0f86 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Dec 2018 16:05:07 +0000
Subject: [PATCH 0155/1147] start 64-alpha

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 8bed37a..a17ece3 100644
--- a/user.js
+++ b/user.js
@@ -1,8 +1,8 @@
 /******
 * name: ghacks user.js
 * date: 11 December 2018
-* version 63: Pants Romance
-*   "Rah rah ah-ah-ah! Ro mah ro-mah-mah. Gaga oh-la-la! Want your pants romance"
+* version 64-alpha: Crocodile Pants
+*   "I remember when Pants was young, me and Suzie had so much fun"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 61be5ae563e0e7e3427885a16e6f920437797966 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 11 Dec 2018 16:07:28 +0000
Subject: [PATCH 0156/1147] all Deprecations + new ADB extension prefs (#587)

---
 user.js | 34 ++++++++++++++++++++++------------
 1 file changed, 22 insertions(+), 12 deletions(-)

diff --git a/user.js b/user.js
index a17ece3..f707684 100644
--- a/user.js
+++ b/user.js
@@ -394,14 +394,6 @@ user_pref("extensions.pocket.enabled", false);
  * [2] https://www.ghacks.net/2017/05/28/firefox-screenshots-integrated-in-firefox-nightly/ ***/
    // user_pref("extensions.screenshots.disabled", true); // [FF55+]
    // user_pref("extensions.screenshots.upload-disabled", true); // [FF60+]
-/* 0516: disable Onboarding [FF55+]
- * Onboarding is an interactive tour/setup for new installs/profiles and features. Every time
- * about:home or about:newtab is opened, the onboarding overlay is injected into that page
- * [NOTE] Onboarding uses Google Analytics [2], and leaks resource://URIs [3]
- * [1] https://wiki.mozilla.org/Firefox/Onboarding
- * [2] https://github.com/mozilla/onboard/commit/db4d6c8726c89a5d6a241c1b1065827b525c5baf
- * [3] https://bugzilla.mozilla.org/863246#c154 ***/
-user_pref("browser.onboarding.enabled", false);
 /* 0517: disable Form Autofill
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
@@ -1283,9 +1275,10 @@ user_pref("browser.uitour.url", "");
 user_pref("devtools.chrome.enabled", false);
 /* 2608: disable WebIDE to prevent remote debugging and extension downloads
  * [1] https://trac.torproject.org/projects/tor/ticket/16222 ***/
-user_pref("devtools.webide.autoinstallADBHelper", false);
 user_pref("devtools.debugger.remote-enabled", false);
 user_pref("devtools.webide.enabled", false);
+user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
+user_pref("devtools.remote.adb.extensionURL", ""); // [FF64+]
 /* 2609: disable MathML (Mathematical Markup Language) [FF51+]
  * [TEST] http://browserspy.dk/mathml.php
  * [1] https://bugzilla.mozilla.org/1173199 ***/
@@ -1373,9 +1366,6 @@ user_pref("xpinstall.whitelist.required", true); // [DEFAULT: true]
 /* 2680: enable CSP (Content Security Policy)
  * [1] https://developer.mozilla.org/docs/Web/HTTP/CSP ***/
 user_pref("security.csp.enable", true); // [DEFAULT: true]
-/* 2681: disable CSP violation events [FF59+]
- * [1] https://developer.mozilla.org/docs/Web/API/SecurityPolicyViolationEvent ***/
-user_pref("security.csp.enable_violation_events", false);
 /* 2682: enable CSP 1.1 experimental hash-source directive [FF29+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=855326,883975 ***/
 user_pref("security.csp.experimentalEnabled", true);
@@ -2207,6 +2197,26 @@ user_pref("media.autoplay.enabled", false);
    // [-] https://bugzilla.mozilla.org/1473595
    // user_pref("browser.ctrlTab.previews", true);
 // * * * /
+// FF64
+// 0516: disable Onboarding [FF55+]
+   // Onboarding is an interactive tour/setup for new installs/profiles and features. Every time
+   // about:home or about:newtab is opened, the onboarding overlay is injected into that page
+   // [NOTE] Onboarding uses Google Analytics [2], and leaks resource://URIs [3]
+   // [1] https://wiki.mozilla.org/Firefox/Onboarding
+   // [2] https://github.com/mozilla/onboard/commit/db4d6c8726c89a5d6a241c1b1065827b525c5baf
+   // [3] https://bugzilla.mozilla.org/863246#c154
+   // [-] https://bugzilla.mozilla.org/1462415
+user_pref("browser.onboarding.enabled", false);
+// 2608: disable WebIDE ADB extension downloads - both renamed
+   // [1] https://trac.torproject.org/projects/tor/ticket/16222
+   // [-] https://bugzilla.mozilla.org/1491315
+user_pref("devtools.webide.autoinstallADBHelper", false);
+user_pref("devtools.webide.adbAddonURL", "");
+// 2681: disable CSP violation events [FF59+]
+   // [1] https://developer.mozilla.org/docs/Web/API/SecurityPolicyViolationEvent
+   // [-] https://bugzilla.mozilla.org/1488165
+user_pref("security.csp.enable_violation_events", false);
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 26b874bed78ac6a42e5a9dbc8881c665697a13e5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Dec 2018 16:43:11 +0000
Subject: [PATCH 0157/1147] 1020: remove max_windows #575

---
 user.js | 7 ++-----
 1 file changed, 2 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index f707684..a7b8dc9 100644
--- a/user.js
+++ b/user.js
@@ -685,11 +685,8 @@ user_pref("browser.cache.disk_cache_ssl", false);
    // user_pref("network.dnsCacheExpiration", 60);
 
 /** SESSIONS & SESSION RESTORE ***/
-/* 1020: limit Session Restore to last active tab and window
- * [SETUP-CHROME] This also disables the "Recently Closed Tabs" feature
- * It does not affect "Recently Closed Windows" or any history. ***/
-user_pref("browser.sessionstore.max_tabs_undo", 0);
-user_pref("browser.sessionstore.max_windows_undo", 0);
+/* 1020: exclude "Undo Closed Tabs" in Session Restore ***/
+   // user_pref("browser.sessionstore.max_tabs_undo", 0);
 /* 1021: disable storing extra session data [SETUP-CHROME]
  * extra session data contains contents of forms, scrollbar positions, cookies and POST data
  * define on which sites to save extra session data:

From 4f379755668e285d12a610a216c804a1690f1a0f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Dec 2018 16:49:38 +0000
Subject: [PATCH 0158/1147] browser.sessionstore.max_windows_undo #575

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 1ad4ae9..6315ed0 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 18-Mov-2018
+ Last updated: 11-Dec-2018
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -108,6 +108,7 @@
     'privacy.trackingprotection.ui.enabled',
     /* 64-beta */
     'browser.eme.ui.enabled',
+    'browser.sessionstore.max_windows_undo',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 7684e83abadd45aa30e4c63592059b6eb94e9eab Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Dec 2018 17:18:26 +0000
Subject: [PATCH 0159/1147] 0102 add SR info #575

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index a7b8dc9..e57bcf6 100644
--- a/user.js
+++ b/user.js
@@ -86,6 +86,7 @@ user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
  * [SETTING] General>Startup>Always check if Firefox is your default browser ***/
 user_pref("browser.shell.checkDefaultBrowser", false);
 /* 0102: set START page (0=blank, 1=home, 2=last visited page, 3=resume previous session)
+ * [NOTE] Session Restore is not used in PB mode (0110) and is cleared with history (2803, 2804)
  * [SETTING] General>Startup>Restore previous session ***/
 user_pref("browser.startup.page", 0);
 /* 0103: set HOME+NEWWINDOW page

From c6ebe3616525847aad30f3ba2a8ece789fab93d4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Dec 2018 17:28:21 +0000
Subject: [PATCH 0160/1147] 1022: resume from crash=>inactive, closes #575

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index e57bcf6..3ec3f66 100644
--- a/user.js
+++ b/user.js
@@ -694,7 +694,7 @@ user_pref("browser.cache.disk_cache_ssl", false);
  * 0=everywhere, 1=unencrypted sites, 2=nowhere ***/
 user_pref("browser.sessionstore.privacy_level", 2);
 /* 1022: disable resuming session from crash ***/
-user_pref("browser.sessionstore.resume_from_crash", false);
+   // user_pref("browser.sessionstore.resume_from_crash", false);
 /* 1023: set the minimum interval between session save operations
  * Increasing this can help on older machines and some websites, as well as reducing writes, see [1]
  * Default is 15000 (15 secs). Try 30000 (30sec), 60000 (1min) etc

From 88b747ef36185c460b87a5ca5cd7d964a2dd597e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Dec 2018 17:42:19 +0000
Subject: [PATCH 0161/1147] 0911: remove it, #585

it is default false in FF59+
---
 user.js | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/user.js b/user.js
index 3ec3f66..aa410de 100644
--- a/user.js
+++ b/user.js
@@ -640,9 +640,6 @@ user_pref("signon.formlessCapture.enabled", false);
  * [2] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1217152,1319119 ***/
 user_pref("signon.autofillForms.http", false);
 user_pref("security.insecure_field_warning.contextual.enabled", true);
-/* 0911: prevent cross-origin images from triggering an HTTP-Authentication prompt [FF55+]
- * [1] https://bugzilla.mozilla.org/1357835 ***/
-user_pref("network.auth.subresource-img-cross-origin-http-auth-allow", false);
 
 /*** [SECTION 1000]: CACHE / SESSION (RE)STORE / FAVICONS [SETUP-CHROME]
      ETAG [1] and other [2][3] cache tracking/fingerprinting techniques can be averted by

From f0fbfd3086311548b8863a2a8d0e50593b76b306 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Dec 2018 17:44:19 +0000
Subject: [PATCH 0162/1147] 
 network.auth.subresource-img-cross-origin-http-auth-allow #585

---
 scratchpad-scripts/ghacks-clear-[removed].js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 6315ed0..e1e7dcf 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -109,6 +109,7 @@
     /* 64-beta */
     'browser.eme.ui.enabled',
     'browser.sessionstore.max_windows_undo',
+    'network.auth.subresource-img-cross-origin-http-auth-allow',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From ccdd4decf01dd3576e84c775d1a99fe3d7f5b27d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Dec 2018 08:25:25 +0000
Subject: [PATCH 0163/1147] Pocket: 0510->0370

Pocket is no longer a System Add-on in FF64+
---
 user.js | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index aa410de..41774f6 100644
--- a/user.js
+++ b/user.js
@@ -238,6 +238,11 @@ user_pref("breakpad.reportURL", "");
 user_pref("browser.tabs.crashReporting.sendReport", false); // [FF44+]
 user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // [FF51+]
 user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [FF58+]
+/* 0370: disable Pocket [FF46+]
+ * Pocket is a third party (now owned by Mozilla) "save for later" cloud service
+ * [1] https://en.wikipedia.org/wiki/Pocket_(application)
+ * [2] https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/ ***/
+user_pref("extensions.pocket.enabled", false);
 /* 0380: disable Browser Error Reporter [FF60+]
  * [1] https://support.mozilla.org/en-US/kb/firefox-nightly-error-collection
  * [2] https://firefox-source-docs.mozilla.org/browser/browser/BrowserErrorReporter.html ***/
@@ -384,11 +389,6 @@ user_pref("app.shield.optoutstudies.enabled", false);
 /* 0506: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
  * Currently blocked by 'datareporting.healthreport.uploadEnabled' (see 0333) ***/
 user_pref("browser.ping-centre.telemetry", false);
-/* 0510: disable Pocket [FF46+]
- * Pocket is a third party (now owned by Mozilla) "save for later" cloud service
- * [1] https://en.wikipedia.org/wiki/Pocket_(application)
- * [2] https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/ ***/
-user_pref("extensions.pocket.enabled", false);
 /* 0515: disable Screenshots
  * alternatively in FF60+, disable uploading to the Screenshots server
  * [1] https://github.com/mozilla-services/screenshots

From 9d6bfb650cca3e0785849c49640a31d6323249f9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 13 Dec 2018 00:29:29 +1300
Subject: [PATCH 0164/1147] disable Telemetry Coverage (#589)

---
 user.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/user.js b/user.js
index 41774f6..818c8b9 100644
--- a/user.js
+++ b/user.js
@@ -232,6 +232,9 @@ user_pref("datareporting.healthreport.uploadEnabled", false);
  * If disabled, no policy is shown or upload takes place, ever
  * [1] https://bugzilla.mozilla.org/1195552 ***/
 user_pref("datareporting.policy.dataSubmissionEnabled", false);
+/* 0335: disable Telemetry Coverage [FF64+]
+ * [1] https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/ ***/
+user_pref("toolkit.coverage.opt-out", true); // [HIDDEN PREF]
 /* 0350: disable crash reports ***/
 user_pref("breakpad.reportURL", "");
 /* 0351: disable sending of crash reports ***/

From 2d956d04f303a70e6ca2cde3625548445c0fb520 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 12 Dec 2018 11:52:49 +0000
Subject: [PATCH 0165/1147] move 1260 to 122x (#591)

* move 1260 to 122x

"disable or limit SHA-1 certificates" is about certs, not ciphers.
Because CERTS is 1st in the title I moved it to the 1st item there because it's arguably also the most important of the lot (and renumbered the rest)
We can also drop HSTS from the subgroup title because there's nothing HSTS left atm.
---
 user.js | 37 ++++++++++++++++++-------------------
 1 file changed, 18 insertions(+), 19 deletions(-)

diff --git a/user.js b/user.js
index 818c8b9..6f4a79f 100644
--- a/user.js
+++ b/user.js
@@ -51,7 +51,7 @@
      0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
      0900: PASSWORDS
      1000: CACHE / SESSION (RE)STORE / FAVICONS
-     1200: HTTPS (SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS)
+     1200: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
      1400: FONTS
      1600: HEADERS / REFERERS
      1700: CONTAINERS
@@ -719,14 +719,13 @@ user_pref("browser.shell.shortcutFavicons", false);
 /* 1032: disable favicons in web notifications ***/
 user_pref("alerts.showFavicons", false); // [DEFAULT: false]
 
-/*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS)
+/*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
    Note that your cipher and other settings can be used server side as a fingerprint attack
    vector, see [1] (It's quite technical but the first part is easy to understand
    and you can stop reading when you reach the second section titled "Enter Bro")
 
-   Option 1: Use Firefox defaults for the 1260's items (item 1260 default for SHA-1, is local
-             only anyway). There is nothing *weak* about Firefox's defaults, but Mozilla (and
-             other browsers) will always lag for fear of breakage and upset end-users
+   Option 1: Use defaults for ciphers (1260's). There is nothing *weak* about these, but
+             due to breakage, browsers can't deprecate them until the web stops using them
    Option 2: Disable the ciphers in 1261, 1262 and 1263. These shouldn't break anything.
              Optionally, disable the ciphers in 1264.
 
@@ -785,21 +784,31 @@ user_pref("security.OCSP.enabled", 1);
  * [2] https://www.imperialviolet.org/2014/04/19/revchecking.html ***/
 user_pref("security.OCSP.require", true);
 
-/** CERTS / HSTS (HTTP Strict Transport Security) / HPKP (HTTP Public Key Pinning) ***/
-/* 1220: disable Windows 8.1's Microsoft Family Safety cert [FF50+] [WINDOWS]
+/** CERTS / HPKP (HTTP Public Key Pinning) ***/
+/* 1220: disable or limit SHA-1 certificates
+ * 0=all SHA1 certs are allowed
+ * 1=all SHA1 certs are blocked
+ * 2=deprecated option that now maps to 1
+ * 3=only allowed for locally-added roots (e.g. anti-virus)
+ * 4=only allowed for locally-added roots or for certs in 2015 and earlier
+ * [SETUP-CHROME] When disabled, some man-in-the-middle devices (e.g. security scanners and
+ * antivirus products, may fail to connect to HTTPS sites. SHA-1 is *almost* obsolete.
+ * [1] https://blog.mozilla.org/security/2016/10/18/phasing-out-sha-1-on-the-public-web/ ***/
+user_pref("security.pki.sha1_enforcement_level", 1);
+/* 1221: disable Windows 8.1's Microsoft Family Safety cert [FF50+] [WINDOWS]
  * 0=disable detecting Family Safety mode and importing the root
  * 1=only attempt to detect Family Safety mode (don't import the root)
  * 2=detect Family Safety mode and import the root
  * [1] https://trac.torproject.org/projects/tor/ticket/21686 ***/
 user_pref("security.family_safety.mode", 0);
-/* 1221: disable intermediate certificate caching (fingerprinting attack vector) [RESTART]
+/* 1222: disable intermediate certificate caching (fingerprinting attack vector) [RESTART]
  * [NOTE] This affects login/cert/key dbs. The effect is all credentials are session-only.
  * Saved logins and passwords are not available. Reset the pref and restart to return them.
  * [TEST] https://fiprinca.0x90.eu/poc/
  * [1] https://bugzilla.mozilla.org/1334485 - related bug
  * [2] https://bugzilla.mozilla.org/1216882 - related bug (see comment 9) ***/
    // user_pref("security.nocertdb", true); // [HIDDEN PREF]
-/* 1222: enforce strict pinning
+/* 1223: enforce strict pinning
  * PKP (Public Key Pinning) 0=disabled 1=allow user MiTM (such as your antivirus), 2=strict
  * [WARNING] If you rely on an AV (antivirus) to protect your web browsing
  * by inspecting ALL your web traffic, then leave at current default=1
@@ -817,16 +826,6 @@ user_pref("security.mixed_content.block_display_content", true);
 user_pref("security.mixed_content.block_object_subrequest", true);
 
 /** CIPHERS [see the section 1200 intro] ***/
-/* 1260: disable or limit SHA-1
- * 0=all SHA1 certs are allowed
- * 1=all SHA1 certs are blocked (including perfectly valid ones from 2015 and earlier)
- * 2=deprecated option that now maps to 1
- * 3=only allowed for locally-added roots (e.g. anti-virus)
- * 4=only allowed for locally-added roots or for certs in 2015 and earlier
- * [SETUP-CHROME] When disabled, some man-in-the-middle devices (e.g. security scanners and
- * antivirus products, may fail to connect to HTTPS sites. SHA-1 is *almost* obsolete.
- * [1] https://blog.mozilla.org/security/2016/10/18/phasing-out-sha-1-on-the-public-web/ ***/
-user_pref("security.pki.sha1_enforcement_level", 1);
 /* 1261: disable 3DES (effective key size < 128)
  * [1] https://en.wikipedia.org/wiki/3des#Security
  * [2] http://en.citizendium.org/wiki/Meet-in-the-middle_attack

From 51ac69874bca1f07ca577897a491e5df289851fa Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Dec 2018 11:58:48 +0000
Subject: [PATCH 0166/1147] 0105* remove // has setting

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 6f4a79f..a0196a2 100644
--- a/user.js
+++ b/user.js
@@ -110,12 +110,12 @@ user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
  * Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
  * [1] https://abouthome-snippets-service.readthedocs.io/ ***/
 user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
-user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // has setting (see 0105)
+user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
 user_pref("browser.aboutHomeSnippets.updateUrl", "");
 /* 0105c: disable AS Top Stories, Pocket-based and/or sponsored content ***/
-user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false); // has setting (see 0105)
-user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false); // has setting (see 0105)
-user_pref("browser.newtabpage.activity-stream.showSponsored", false); // has setting (see 0105)
+user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
+user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
+user_pref("browser.newtabpage.activity-stream.showSponsored", false);
 /* 0105d: disable AS recent Highlights in the Library [FF57+] ***/
    // user_pref("browser.library.activity-stream.enabled", false);
 /* 0110: start Firefox in PB (Private Browsing) mode

From 3916e3868180cae24594c15af9c799b9cd7a4f80 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 12 Dec 2018 13:02:38 +0000
Subject: [PATCH 0167/1147] taking out the garbage (#590)

---
 user.js | 11 ++---------
 1 file changed, 2 insertions(+), 9 deletions(-)

diff --git a/user.js b/user.js
index a0196a2..87101ad 100644
--- a/user.js
+++ b/user.js
@@ -1021,18 +1021,12 @@ user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
 /* 2001: disable WebRTC (Web Real-Time Communication)
  * [1] https://www.privacytools.io/#webrtc ***/
 user_pref("media.peerconnection.enabled", false);
-user_pref("media.peerconnection.use_document_iceservers", false);
-user_pref("media.peerconnection.video.enabled", false);
-user_pref("media.peerconnection.identity.enabled", false);
-user_pref("media.peerconnection.identity.timeout", 1);
-user_pref("media.peerconnection.turn.disable", true);
-user_pref("media.peerconnection.ice.tcp", false);
 user_pref("media.navigator.video.enabled", false); // video capability for WebRTC
 /* 2002: limit WebRTC IP leaks if using WebRTC
  * [TEST] https://browserleaks.com/webrtc
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1189041,1297416
  * [2] https://wiki.mozilla.org/Media/WebRTC/Privacy ***/
-user_pref("media.peerconnection.ice.default_address_only", true); // [FF42-FF50]
+user_pref("media.peerconnection.ice.default_address_only", true);
 user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
 /* 2010: disable WebGL (Web Graphics Library), force bare minimum feature set if used & disable WebGL extensions
  * [1] https://www.contextis.com/resources/blog/webgl-new-dimension-browser-exploitation/
@@ -1270,12 +1264,11 @@ user_pref("browser.uitour.url", "");
  * [SETTING] Devtools>Advanced Settings>Enable browser chrome and add-on debugging toolboxes
  * [1] https://github.com/pyllyukko/user.js/issues/179#issuecomment-246468676 ***/
 user_pref("devtools.chrome.enabled", false);
-/* 2608: disable WebIDE to prevent remote debugging and extension downloads
+/* 2608: disable WebIDE to prevent remote debugging and ADB extension download
  * [1] https://trac.torproject.org/projects/tor/ticket/16222 ***/
 user_pref("devtools.debugger.remote-enabled", false);
 user_pref("devtools.webide.enabled", false);
 user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
-user_pref("devtools.remote.adb.extensionURL", ""); // [FF64+]
 /* 2609: disable MathML (Mathematical Markup Language) [FF51+]
  * [TEST] http://browserspy.dk/mathml.php
  * [1] https://bugzilla.mozilla.org/1173199 ***/

From d97d0ec0f59df18938f9f78ca81a12b192a16ce1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Dec 2018 13:09:03 +0000
Subject: [PATCH 0168/1147] media.peerconnection*

covered by user_pref("media.peerconnection.enabled", false);
---
 scratchpad-scripts/ghacks-clear-[removed].js | 8 +++++++-
 1 file changed, 7 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index e1e7dcf..5fb1425 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 11-Dec-2018
+ Last updated: 12-Dec-2018
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -110,6 +110,12 @@
     'browser.eme.ui.enabled',
     'browser.sessionstore.max_windows_undo',
     'network.auth.subresource-img-cross-origin-http-auth-allow',
+    'media.peerconnection.ice.tcp',
+    'media.peerconnection.identity.enabled',
+    'media.peerconnection.identity.timeout',
+    'media.peerconnection.turn.disable',
+    'media.peerconnection.use_document_iceservers',
+    'media.peerconnection.video.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 879f0abf28703ea082cdf41a396dc97c8d0a3bbd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Dec 2018 13:21:24 +0000
Subject: [PATCH 0169/1147] 2201: more garbage

---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 87101ad..e2157ba 100644
--- a/user.js
+++ b/user.js
@@ -1021,7 +1021,6 @@ user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
 /* 2001: disable WebRTC (Web Real-Time Communication)
  * [1] https://www.privacytools.io/#webrtc ***/
 user_pref("media.peerconnection.enabled", false);
-user_pref("media.navigator.video.enabled", false); // video capability for WebRTC
 /* 2002: limit WebRTC IP leaks if using WebRTC
  * [TEST] https://browserleaks.com/webrtc
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1189041,1297416

From 3c247a2c5b91502f548e7a5d5a24b234d3881e3d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Dec 2018 13:22:58 +0000
Subject: [PATCH 0170/1147] Update ghacks-clear-[removed].js

---
 scratchpad-scripts/ghacks-clear-[removed].js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 5fb1425..4231a0b 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -116,6 +116,7 @@
     'media.peerconnection.turn.disable',
     'media.peerconnection.use_document_iceservers',
     'media.peerconnection.video.enabled',
+    'media.navigator.video.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 31adbba774139f1f79cc90c4b48126b5bd3912fa Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Dec 2018 16:34:27 +0000
Subject: [PATCH 0171/1147] 5000s: disable CFR

---
 user.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/user.js b/user.js
index e2157ba..11f048f 100644
--- a/user.js
+++ b/user.js
@@ -1738,6 +1738,9 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
 /* OTHER ***/
    // user_pref("browser.bookmarks.max_backups", 2);
+   // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false); // disable CRF [FF64+]
+      // [SETTING] General>Browsing>Recommend extensions as you browse
+      // [1] https://support.mozilla.org/en-US/kb/extension-recommendations
    // user_pref("identity.fxaccounts.enabled", false); // disable and hide Firefox Accounts and Sync [FF60+] [RESTART]
    // user_pref("network.manage-offline-status", false); // see Bugzilla 620472
    // user_pref("reader.parse-on-load.enabled", false); // "Reader View"

From d55b8176adea7ae91fd96a16db388f689f5560fa Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Dec 2018 16:52:12 +0000
Subject: [PATCH 0172/1147] dyslexia and/or dementia

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 11f048f..f3d668f 100644
--- a/user.js
+++ b/user.js
@@ -1738,7 +1738,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
 /* OTHER ***/
    // user_pref("browser.bookmarks.max_backups", 2);
-   // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false); // disable CRF [FF64+]
+   // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false); // disable CFR [FF64+]
       // [SETTING] General>Browsing>Recommend extensions as you browse
       // [1] https://support.mozilla.org/en-US/kb/extension-recommendations
    // user_pref("identity.fxaccounts.enabled", false); // disable and hide Firefox Accounts and Sync [FF60+] [RESTART]

From e60abd6c44fc6395867304ee8ee48029720b5e84 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Dec 2018 17:17:33 +0000
Subject: [PATCH 0173/1147] 64-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index f3d668f..47d85c8 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 11 December 2018
-* version 64-alpha: Crocodile Pants
+* date: 12 December 2018
+* version 64-beta: Crocodile Pants
 *   "I remember when Pants was young, me and Suzie had so much fun"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 04b797f1aa2271ae561cffddb963912b0b61f96e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 13 Dec 2018 11:14:44 +0000
Subject: [PATCH 0174/1147] 0209: remove trailing space

@Just-me-ghacks :kiss:
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 47d85c8..06a2cfa 100644
--- a/user.js
+++ b/user.js
@@ -159,7 +159,7 @@ user_pref("intl.accept_languages", "en-US, en");
 /* 0208: enforce US English locale regardless of the system locale
  * [1] https://bugzilla.mozilla.org/867501 ***/
 user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
-/* 0209: use APP locale over OS locale in regional preferences [FF56+] 
+/* 0209: use APP locale over OS locale in regional preferences [FF56+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1379420,1364789 ***/
 user_pref("intl.regional_prefs.use_os_locales", false);
 /* 0210: use Mozilla geolocation service instead of Google when geolocation is enabled

From 15c68dc344b5781b7d0269cee0d8fd0ce43093c2 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Thu, 13 Dec 2018 14:21:57 +0000
Subject: [PATCH 0175/1147] disable System Add-on updates (#595)

remember the new Coverage Telemetry shit? with a **hidden** opt-out pref? guess what, they are already collecting for 3 months ...

https://bugzilla.mozilla.org/show_bug.cgi?id=1487578 - **3 months ago**: "I see data coming in that looks reasonable"

guess what else ...

"It has also replaced the previous version that was there (from bug 1480194)" and oh, surprise surprise, 1480194 is ACCESS DENIED!

they're not just using private tickets to hide security critical information from potential hackers and blackhats, no they also use it to hide shady AF things. Things that they fully know are shady as fuck and that they absolutely know a lot of people would not like. There's simply no other reason why they'd do that

but wait, that's not all. If you think an opt-out pref that 99% of people wouldn't know about even if it showed up in about:config BUT ALSO HAPPENS TO BE HIDDEN is kind of questionable, well ... the system addon that they use for this shit apparently looked or still looks for `toolkit.telemetry.coverage.opt-out` [1] instead of `toolkit.coverage.opt-out` as their documentation [2] claims

[1] https://github.com/mozilla/one-off-system-add-ons/pull/131/files#diff-6e0cbf76986d04383ccb32a29ef27a7aR25
[2] https://hg.mozilla.org/mozilla-central/file/tip/toolkit/components/telemetry/docs/data/coverage-ping.rst#l32

It's time to opt out of all that shit for good. Disable system addon updates and kill it at the root

> In FF61 and lower, you will not get any System Add-on updates except when you update Firefox

on its own that's not true. You will get SA updates unless you disable app update checks + auto install. Let's just remove that as well.
---
 user.js | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 06a2cfa..55cdd89 100644
--- a/user.js
+++ b/user.js
@@ -385,10 +385,9 @@ user_pref("network.allow-experiments", false);
 user_pref("app.normandy.enabled", false);
 user_pref("app.normandy.api_url", "");
 user_pref("app.shield.optoutstudies.enabled", false);
-/* 0505: disable System Add-on updates
- * [NOTE] In FF61 and lower, you will not get any System Add-on updates except when you update Firefox ***/
-   // user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
-   // user_pref("extensions.systemAddon.update.url", "");
+/* 0505: disable System Add-on updates ***/
+user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
+user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
 /* 0506: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
  * Currently blocked by 'datareporting.healthreport.uploadEnabled' (see 0333) ***/
 user_pref("browser.ping-centre.telemetry", false);

From 645492e82f748d6b2085f092b551c1afbad56074 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 14 Dec 2018 04:49:50 +1300
Subject: [PATCH 0176/1147] grammar, case, etc, closes #594

thanks @Just-me-ghacks
---
 user.js | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 55cdd89..ed9951a 100644
--- a/user.js
+++ b/user.js
@@ -202,7 +202,7 @@ user_pref("browser.search.update", false);
 user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
 /* 0310: disable sending the URL of the website where a plugin crashed ***/
 user_pref("dom.ipc.plugins.reportCrashURL", false);
-/* 0320: disable about:addons' Get Add-ons panel (uses Google-Analytics) ***/
+/* 0320: disable about:addons' Get Add-ons panel (uses Google Analytics) ***/
 user_pref("extensions.getAddons.showPane", false); // [HIDDEN PREF]
 user_pref("extensions.webservice.discoverURL", "");
 /* 0330: disable telemetry
@@ -696,7 +696,7 @@ user_pref("browser.sessionstore.privacy_level", 2);
    // user_pref("browser.sessionstore.resume_from_crash", false);
 /* 1023: set the minimum interval between session save operations
  * Increasing this can help on older machines and some websites, as well as reducing writes, see [1]
- * Default is 15000 (15 secs). Try 30000 (30sec), 60000 (1min) etc
+ * Default is 15000 (15 secs). Try 30000 (30 secs), 60000 (1 min) etc
  * [SETUP-CHROME] This can also affect entries in the "Recently Closed Tabs" feature:
  * i.e. the longer the interval the more chance a quick tab open/close won't be captured.
  * This longer interval *may* affect history but we cannot replicate any history not recorded
@@ -912,7 +912,7 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
      Our default settings provide the best balance between protection and amount of breakage.
      To harden it a bit more you can set XOriginPolicy (1603) to 2 (+ optionally 1604 to 1 or 2).
      To fix broken sites (including your modem/router), temporarily set XOriginPolicy=0 and XOriginTrimmingPolicy=2 in about:config,
-     use the site and then change the values back. If you visit those sites regularly (e.g. Vimeo), use an extension.
+     use the site and then change the values back. If you visit those sites regularly (e.g. vimeo), use an extension.
 
                     full URI: https://example.com:8888/foo/bar.html?id=1234
        scheme+host+port+path: https://example.com:8888/foo/bar.html
@@ -1416,7 +1416,7 @@ user_pref("network.cookie.leave-secure-alone", true); // [DEFAULT: true]
  * To control *website* IDB data, control allowing cookies and service workers, or use
  * Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize
  * on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically
- * via an extenion. Note that IDB currently cannot be sanitized by host.
+ * via an extension. Note that IDB currently cannot be sanitized by host.
  * [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/ ***/
 user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
 /* 2730: disable offline cache ***/
@@ -1732,7 +1732,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("browser.backspace_action", 2); // 0=previous page, 1=scroll up, 2=do nothing
    // user_pref("browser.tabs.closeWindowWithLastTab", false);
    // user_pref("browser.tabs.loadBookmarksInTabs", true); // open bookmarks in a new tab [FF57+]
-   // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see Bugzilla 1320061 [FF53+]
+   // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see bugzilla 1320061 [FF53+]
    // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [WINDOWS] [MAC]
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
 /* OTHER ***/
@@ -1741,7 +1741,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
       // [SETTING] General>Browsing>Recommend extensions as you browse
       // [1] https://support.mozilla.org/en-US/kb/extension-recommendations
    // user_pref("identity.fxaccounts.enabled", false); // disable and hide Firefox Accounts and Sync [FF60+] [RESTART]
-   // user_pref("network.manage-offline-status", false); // see Bugzilla 620472
+   // user_pref("network.manage-offline-status", false); // see bugzilla 620472
    // user_pref("reader.parse-on-load.enabled", false); // "Reader View"
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 

From f6ea20a8b09b128a0b7d2b8b3067a4334622d5a8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 13 Dec 2018 17:28:16 +0000
Subject: [PATCH 0177/1147] 0335: Telemetry Coverage endpoint

let's just coverage-our-ass on this one

While I don't mind telemetry (development needs meaningful feedback to better the product), and I trust the data is not PII, and/or anonymized into buckets etc (you can check this you know), and I understand this one needs to be outside the Telemetry pref in order to gather the one-time ping ... and I trust Mozilla's motives ... I'm starting to get a little annoyed at the non-stop incessant increasing telemetry bullshittery and ass-fuckery around sending data home, and the lengths some Mozilla devs will go to, to hide this info (hidden prefs, access denied tickets to hide discussion of what should be public, and even **not even adhering to their own documentation**).

I will also be killing as many Activity Stream endpoints as well - as long as they are in line with our js - pocket, snippets, onboarding etc. And I will add those from personal as inactive for end-users - eg cfr
---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index ed9951a..f9bb4c2 100644
--- a/user.js
+++ b/user.js
@@ -234,6 +234,7 @@ user_pref("datareporting.healthreport.uploadEnabled", false);
 user_pref("datareporting.policy.dataSubmissionEnabled", false);
 /* 0335: disable Telemetry Coverage [FF64+]
  * [1] https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/ ***/
+user_pref("toolkit.coverage.endpoint.base", "");
 user_pref("toolkit.coverage.opt-out", true); // [HIDDEN PREF]
 /* 0350: disable crash reports ***/
 user_pref("breakpad.reportURL", "");

From d5ece0f6f44896461a22c0dce46427aac77fcd19 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 14 Dec 2018 20:05:43 +1300
Subject: [PATCH 0178/1147] 1700s: revamp Containers header #585 (#596)

---
 user.js | 9 ++++++---
 1 file changed, 6 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index f9bb4c2..31f718f 100644
--- a/user.js
+++ b/user.js
@@ -957,9 +957,12 @@ user_pref("network.http.referer.hideOnionSource", true);
 user_pref("privacy.donottrackheader.enabled", true);
 
 /*** [SECTION 1700]: CONTAINERS
-     [1] https://support.mozilla.org/kb/containers-experiment
-     [2] https://wiki.mozilla.org/Security/Contextual_Identity_Project/Containers
-     [3] https://github.com/mozilla/testpilot-containers
+     If you want to *really* leverage containers, we highly recommend Temporary Containers [2].
+     Read the article by the extension author [3], and check out the github wiki/repo [4].
+     [1] https://wiki.mozilla.org/Security/Contextual_Identity_Project/Containers
+     [2] https://addons.mozilla.org/firefox/addon/temporary-containers/
+     [3] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
+     [4] https://github.com/stoically/temporary-containers/wiki
 ***/
 user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
 /* 1701: enable Container Tabs setting in preferences (see 1702) [FF50+]

From c1d6d81528917d102dd57eb00c74be6efb49dfc3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 16 Dec 2018 14:10:32 +0000
Subject: [PATCH 0179/1147] add PERF tags to wasm, asm.js, closes #599

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 31f718f..12fc230 100644
--- a/user.js
+++ b/user.js
@@ -1171,7 +1171,7 @@ user_pref("dom.allow_cut_copy", false); // [HIDDEN PREF]
 user_pref("dom.disable_beforeunload", true);
 /* 2414: disable shaking the screen ***/
 user_pref("dom.vibrator.enabled", false);
-/* 2420: disable asm.js [FF22+]
+/* 2420: disable asm.js [FF22+] [SETUP-PERF]
  * [1] http://asmjs.org/
  * [2] https://www.mozilla.org/security/advisories/mfsa2015-29/
  * [3] https://www.mozilla.org/security/advisories/mfsa2015-50/
@@ -1184,7 +1184,7 @@ user_pref("javascript.options.asmjs", false);
  * [1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817 ***/
    // user_pref("javascript.options.ion", false);
    // user_pref("javascript.options.baselinejit", false);
-/* 2422: disable WebAssembly [FF52+]
+/* 2422: disable WebAssembly [FF52+] [SETUP-PERF]
  * [1] https://developer.mozilla.org/docs/WebAssembly ***/
 user_pref("javascript.options.wasm", false);
 /* 2426: disable Intersection Observer API [FF53+]

From da80e390648257b92327202164b923bc7efcb63e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 16 Dec 2018 17:37:42 +0000
Subject: [PATCH 0180/1147] 0105s: description s/be self explanatory #578

when filtered and 0105a is not shown, AS doesn't mean anything
---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 12fc230..56f18fa 100644
--- a/user.js
+++ b/user.js
@@ -106,17 +106,17 @@ user_pref("browser.newtab.preload", false);
 user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
 user_pref("browser.newtabpage.activity-stream.telemetry", false);
 user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
-/* 0105b: disable AS Snippets
+/* 0105b: disable Activity Stream Snippets
  * Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
  * [1] https://abouthome-snippets-service.readthedocs.io/ ***/
 user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
 user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
 user_pref("browser.aboutHomeSnippets.updateUrl", "");
-/* 0105c: disable AS Top Stories, Pocket-based and/or sponsored content ***/
+/* 0105c: disable Activity Stream Top Stories, Pocket-based and/or sponsored content ***/
 user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
 user_pref("browser.newtabpage.activity-stream.showSponsored", false);
-/* 0105d: disable AS recent Highlights in the Library [FF57+] ***/
+/* 0105d: disable Activity Stream recent Highlights in the Library [FF57+] ***/
    // user_pref("browser.library.activity-stream.enabled", false);
 /* 0110: start Firefox in PB (Private Browsing) mode
  * [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed

From 6946a012320025d257a80a0729000d34c5240ec4 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 17 Dec 2018 08:19:14 +0000
Subject: [PATCH 0181/1147] Update troubleshooter.js

---
 scratchpad-scripts/troubleshooter.js | 6 ++----
 1 file changed, 2 insertions(+), 4 deletions(-)

diff --git a/scratchpad-scripts/troubleshooter.js b/scratchpad-scripts/troubleshooter.js
index 0e751ca..9653c2f 100644
--- a/scratchpad-scripts/troubleshooter.js
+++ b/scratchpad-scripts/troubleshooter.js
@@ -1,5 +1,5 @@
 
-/*** ghacks-user.js troubleshooter.js v1.5 ***/
+/*** ghacks-user.js troubleshooter.js v1.5.1 ***/
 
 (function() {
 
@@ -82,7 +82,6 @@
     'dom.push.enabled',
     'dom.push.serverURL',
     'dom.serviceWorkers.enabled',
-    'dom.workers.enabled',
     'dom.webnotifications.enabled',
     'dom.webnotifications.serviceworker.enabled',
 
@@ -116,6 +115,7 @@
     /* Audio + Video */
     'dom.webaudio.enabled',
     'media.autoplay.enabled',
+    'media.autoplay.default', // FF63+
 
     /* Forms */
     'browser.formfill.enable',
@@ -125,7 +125,6 @@
     /* HTTPS */
     'security.cert_pinning.enforcement_level',
     'security.family_safety.mode',
-    'security.mixed_content.use_hsts',
     'security.OCSP.require',
     'security.pki.sha1_enforcement_level',
     'security.ssl.require_safe_negotiation',
@@ -152,7 +151,6 @@
     'dom.popup_maximum',
     'layout.css.visited_links_enabled',
     'mathml.disabled',
-    'network.auth.subresource-img-cross-origin-http-auth-allow',
     'network.http.redirection-limit',
     'network.protocol-handler.external.ms-windows-store',
     'privacy.trackingprotection.enabled',

From 4badc42879184cc5a470430504f9339360f005ff Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 17 Dec 2018 09:36:26 +0000
Subject: [PATCH 0182/1147] 0105b: kill snippets endpoint #528

it's too hard to follow AS changes, and work out if disabling showing items (basic toggling of show/hide sections etc) actually stops downloading a localized local copy etc. For items we actually want to block, let the endpoint slaughter begin.
---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 56f18fa..3907c0d 100644
--- a/user.js
+++ b/user.js
@@ -109,9 +109,10 @@ user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
 /* 0105b: disable Activity Stream Snippets
  * Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
  * [1] https://abouthome-snippets-service.readthedocs.io/ ***/
+user_pref("browser.aboutHomeSnippets.updateUrl", "");
+user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
 user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
 user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
-user_pref("browser.aboutHomeSnippets.updateUrl", "");
 /* 0105c: disable Activity Stream Top Stories, Pocket-based and/or sponsored content ***/
 user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);

From 55c2cacbce27003c77cf05069b964944ab65dde3 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 17 Dec 2018 09:43:45 +0000
Subject: [PATCH 0183/1147] 0335: toolkit.telemetry.coverage.opt-out (#600)

---
 user.js | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 3907c0d..cca0842 100644
--- a/user.js
+++ b/user.js
@@ -233,10 +233,11 @@ user_pref("datareporting.healthreport.uploadEnabled", false);
  * If disabled, no policy is shown or upload takes place, ever
  * [1] https://bugzilla.mozilla.org/1195552 ***/
 user_pref("datareporting.policy.dataSubmissionEnabled", false);
-/* 0335: disable Telemetry Coverage [FF64+]
+/* 0335: disable Telemetry Coverage
  * [1] https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/ ***/
+user_pref("toolkit.telemetry.coverage.opt-out", true); // [HIDDEN PREF]
+user_pref("toolkit.coverage.opt-out", true); // [FF64+] [HIDDEN PREF]
 user_pref("toolkit.coverage.endpoint.base", "");
-user_pref("toolkit.coverage.opt-out", true); // [HIDDEN PREF]
 /* 0350: disable crash reports ***/
 user_pref("breakpad.reportURL", "");
 /* 0351: disable sending of crash reports ***/

From 5bd5f6b28e801b8437e2574fad35f52365a6b593 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 18 Dec 2018 01:41:37 +1300
Subject: [PATCH 0184/1147] 0912: HTTP Auth sub-resources #585 (#602)

---
 user.js | 7 +++++++
 1 file changed, 7 insertions(+)

diff --git a/user.js b/user.js
index cca0842..a454252 100644
--- a/user.js
+++ b/user.js
@@ -645,6 +645,13 @@ user_pref("signon.formlessCapture.enabled", false);
  * [2] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1217152,1319119 ***/
 user_pref("signon.autofillForms.http", false);
 user_pref("security.insecure_field_warning.contextual.enabled", true);
+/* 0912: limit (or disable) HTTP authentication credentials dialogs triggered by sub-resources [FF41+]
+ * hardens against potential credentials phishing
+ * 0=don't allow sub-resources to open HTTP authentication credentials dialogs
+ * 1=don't allow cross-origin sub-resources to open HTTP authentication credentials dialogs
+ * 2=allow sub-resources to open HTTP authentication credentials dialogs (default)
+ * [1] https://www.fxsitecompat.com/en-CA/docs/2015/http-auth-dialog-can-no-longer-be-triggered-by-cross-origin-resources/ ***/
+user_pref("network.auth.subresource-http-auth-allow", 1);
 
 /*** [SECTION 1000]: CACHE / SESSION (RE)STORE / FAVICONS [SETUP-CHROME]
      ETAG [1] and other [2][3] cache tracking/fingerprinting techniques can be averted by

From 5b0952f60a5e9ed0fd62499187c6e62829fcd587 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 17 Dec 2018 13:00:27 +0000
Subject: [PATCH 0185/1147] network.auth.subresource-http-auth-allow

---
 scratchpad-scripts/troubleshooter.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/troubleshooter.js b/scratchpad-scripts/troubleshooter.js
index 9653c2f..98d9948 100644
--- a/scratchpad-scripts/troubleshooter.js
+++ b/scratchpad-scripts/troubleshooter.js
@@ -1,5 +1,5 @@
 
-/*** ghacks-user.js troubleshooter.js v1.5.1 ***/
+/*** ghacks-user.js troubleshooter.js v1.5.2 ***/
 
 (function() {
 
@@ -151,6 +151,7 @@
     'dom.popup_maximum',
     'layout.css.visited_links_enabled',
     'mathml.disabled',
+    'network.auth.subresource-http-auth-allow',
     'network.http.redirection-limit',
     'network.protocol-handler.external.ms-windows-store',
     'privacy.trackingprotection.enabled',

From ac4e764c37560a32edddb1deb12cd7bca9c20a7e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 18 Dec 2018 15:54:57 +0000
Subject: [PATCH 0186/1147] http2, altsvc, ssl session ids vs FPI vs TB #571

---
 user.js | 16 ++++++++++++----
 1 file changed, 12 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index a454252..aee54f5 100644
--- a/user.js
+++ b/user.js
@@ -462,6 +462,9 @@ user_pref("network.dns.disableIPv6", true);
 /* 0702: disable HTTP2 (which was based on SPDY which is now deprecated)
  * HTTP2 raises concerns with "multiplexing" and "server push", does nothing to enhance
  * privacy, and in fact opens up a number of server-side fingerprinting opportunities
+ * [SETUP-PERF] Relax this if you have FPI enabled (see 4000) *AND* you understand the
+ * consequences. FPI isolates these, but it was designed with the Tor protocol in mind,
+ * and the Tor Browser has extra protection, including enhanced sanitizing per Identity.
  * [1] https://http2.github.io/faq/
  * [2] https://blog.scottlogic.com/2014/11/07/http-2-a-quick-look.html
  * [3] https://queue.acm.org/detail.cfm?id=2716278
@@ -470,6 +473,9 @@ user_pref("network.http.spdy.enabled", false);
 user_pref("network.http.spdy.enabled.deps", false);
 user_pref("network.http.spdy.enabled.http2", false);
 /* 0703: disable HTTP Alternative Services [FF37+]
+ * [SETUP-PERF] Relax this if you have FPI enabled (see 4000) *AND* you understand the
+ * consequences. FPI isolates these, but it was designed with the Tor protocol in mind,
+ * and the Tor Browser has extra protection, including enhanced sanitizing per Identity.
  * [1] https://tools.ietf.org/html/rfc7838#section-9
  * [2] https://www.mnot.net/blog/2016/03/09/alt-svc ***/
 user_pref("network.http.altsvc.enabled", false);
@@ -756,11 +762,13 @@ user_pref("security.ssl.require_safe_negotiation", true);
    // user_pref("security.tls.version.min", 3);
 user_pref("security.tls.version.max", 4);
 /* 1203: disable SSL session tracking [FF36+]
- * SSL Session IDs speed up HTTPS connections (no need to renegotiate) and last for 24hrs.
- * Since the ID is unique, web servers can (and do) use it for tracking. If set to true,
- * this disables sending SSL Session IDs and TLS Session Tickets to prevent session tracking
+ * SSL Session IDs are unique, last up to 24hrs in Firefox, and can be used for tracking
+ * [SETUP-PERF] Relax this if you have FPI enabled (see 4000) *AND* you understand the
+ * consequences. FPI isolates these, but it was designed with the Tor protocol in mind,
+ * and the Tor Browser has extra protection, including enhanced sanitizing per Identity.
  * [1] https://tools.ietf.org/html/rfc5077
- * [2] https://bugzilla.mozilla.org/967977 ***/
+ * [2] https://bugzilla.mozilla.org/967977
+ * [3] https://arxiv.org/abs/1810.07304 ***/
 user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
 /* 1204: disable SSL Error Reporting
  * [1] https://firefox-source-docs.mozilla.org/browser/base/sslerrorreport/preferences.html ***/

From 186fb1c9be2ed25e5ab6bc82b7a9842b3351a9fc Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Thu, 20 Dec 2018 19:42:28 +0000
Subject: [PATCH 0187/1147] Update README.md

fix for the weird page title ![][b]
https://ghacksuserjs.github.io/ghacks-user.js/
---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index fc5d76a..9df4ee3 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,4 @@
-### ![][b] user.js
+### ![🔶][b] user.js
 A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.1-Overview) wiki page.
 
 ### ![][b] ghacks user.js

From 96063027ba4862a85e0cc5c3c1850122b7f7ab1a Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Thu, 20 Dec 2018 19:44:27 +0000
Subject: [PATCH 0188/1147] Update README.md

second attempt at fixing the weird title...
---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 9df4ee3..d0071be 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,4 @@
-### ![🔶][b] user.js
+### ![o][b] user.js
 A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.1-Overview) wiki page.
 
 ### ![][b] ghacks user.js

From b845f8fe3ad49beefe094b818046644f7eb0821e Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Thu, 20 Dec 2018 19:53:48 +0000
Subject: [PATCH 0189/1147] Update README.md

OK, I give up. I would've removed those commits by force-pushing, but the branch is protected. #NotMyFault
---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index d0071be..fc5d76a 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,4 @@
-### ![o][b] user.js
+### ![][b] user.js
 A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.1-Overview) wiki page.
 
 ### ![][b] ghacks user.js

From 4604cf0d4ebc0aef81a89bbb971461018ed68370 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 21 Dec 2018 11:02:40 +0000
Subject: [PATCH 0190/1147] references to other prefs s/be explicit

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index aee54f5..e4976d6 100644
--- a/user.js
+++ b/user.js
@@ -1486,7 +1486,7 @@ user_pref("privacy.clearOnShutdown.history", true); // Browsing & Download Histo
 user_pref("privacy.clearOnShutdown.offlineApps", true); // Offline Website Data
 user_pref("privacy.clearOnShutdown.sessions", true); // Active Logins
 user_pref("privacy.clearOnShutdown.siteSettings", false); // Site Preferences
-/* 2804: reset default history items to clear with Ctrl-Shift-Del (to match above)
+/* 2804: reset default history items to clear with Ctrl-Shift-Del (to match 2803)
  * This dialog can also be accessed from the menu History>Clear Recent History
  * Firefox remembers your last choices. This will reset them when you start Firefox.
  * [NOTE] Regardless of what you set privacy.cpd.downloads to, as soon as the dialog

From 075d6fe6e4e258fb39d4f53ecf6ad04dd30fd0a0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 11 Jan 2019 05:09:14 +0000
Subject: [PATCH 0191/1147] 2615: s/cut keys: bug fix in 66+

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index e4976d6..e0fb1e7 100644
--- a/user.js
+++ b/user.js
@@ -1306,7 +1306,7 @@ user_pref("middlemouse.contentLoadURL", false);
 user_pref("network.http.redirection-limit", 10);
 /* 2615: disable websites overriding Firefox's keyboard shortcuts [FF58+]
  * 0 (default) or 1=allow, 2=block
- * [NOTE] At the time of writing, causes issues with delete and backspace keys
+ * [NOTE] In FF65 and under, causes issues with delete and backspace keys (see 1445942)
  * [SETTING] to add site exceptions: Page Info>Permissions>Override Keyboard Shortcuts ***/
    // user_pref("permissions.default.shortcuts", 2);
 /* 2616: remove special permissions for certain mozilla domains [FF35+]

From 7bf5790f2b607583307f6e70c510876b245405b8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 11 Jan 2019 05:14:59 +0000
Subject: [PATCH 0192/1147] RFP: FF66 changes to UA HTTP Headers

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index e0fb1e7..a6ae1d7 100644
--- a/user.js
+++ b/user.js
@@ -1575,6 +1575,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
       FF56: The version number will be rounded down to the nearest multiple of 10
       FF57: The version number will match current ESR (1393283, 1418672, 1418162)
       FF59: The OS will be reported as Windows, OSX, Android, or Linux (to reduce breakage) (1404608)
+      FF66: The OS in HTTP Headers will be reduced to Windows or Android (1509829)
  ** 1369319 - disable device sensor API (see 4604) (FF56+)
  ** 1369357 - disable site specific zoom (see 4605) (FF56+)
  ** 1337161 - hide gamepads from content (see 4606) (FF56+)

From 45bd5ccc02d4526195cc85bb2e455ec489388361 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 16 Jan 2019 02:07:06 +0000
Subject: [PATCH 0193/1147] PB Mode: ref added

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index a6ae1d7..544d873 100644
--- a/user.js
+++ b/user.js
@@ -128,7 +128,8 @@ user_pref("browser.newtabpage.activity-stream.showSponsored", false);
  * new instance. Closing all Private Windows clears all traces. Repeat as required. PB also does
  * not allow indexedDB which breaks many Extensions that use it including uBlock Origin and uMatrix
  * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
- * [1] https://wiki.mozilla.org/Private_Browsing ***/
+ * [1] https://wiki.mozilla.org/Private_Browsing
+ * [2] https://spreadprivacy.com/is-private-browsing-really-private/ ***/
    // user_pref("browser.privatebrowsing.autostart", true);
 
 /*** [SECTION 0200]: GEOLOCATION ***/

From 3b90e6e5925cc612e6ec3c866b80965cdfb12ce6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 17 Jan 2019 05:11:29 +0000
Subject: [PATCH 0194/1147] end of v64

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 544d873..3a88f8f 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 12 December 2018
-* version 64-beta: Crocodile Pants
+* date: 17 January 2019
+* version 64: Crocodile Pants
 *   "I remember when Pants was young, me and Suzie had so much fun"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From f1e6d164f7e6619c2e652ccc44df7a5958c28841 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 17 Jan 2019 05:19:11 +0000
Subject: [PATCH 0195/1147] start 65 commits

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 3a88f8f..5512ec6 100644
--- a/user.js
+++ b/user.js
@@ -1,8 +1,8 @@
 /******
 * name: ghacks user.js
 * date: 17 January 2019
-* version 64: Crocodile Pants
-*   "I remember when Pants was young, me and Suzie had so much fun"
+* version 65-alpha: Dancing with My Pants
+*   "If I had the chance, I'd ask the world to dance, and I'll be dancing with my pants"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 1c09ec36e3275c2ac6c4bf5a7c16d55a928630c7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 18 Jan 2019 04:24:13 +0000
Subject: [PATCH 0196/1147] 0306: extra info, closes #615

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 5512ec6..d350535 100644
--- a/user.js
+++ b/user.js
@@ -193,7 +193,8 @@ user_pref("app.update.staging.enabled", false);
  * This is the update available, downloaded, error and success information ***/
 user_pref("app.update.silent", false);
 /* 0306: disable extension metadata updating
- * sends daily pings to Mozilla about extensions and recent startups ***/
+ * sends daily pings to Mozilla about extensions and recent startups
+ * [NOTE] blocks any expanded text description, if it exists, when you "show more details about an addon" ***/
 user_pref("extensions.getAddons.cache.enabled", false);
 /* 0307: disable auto updating of personas (themes) ***/
 user_pref("lightweightThemes.update.enabled", false);

From 8c96432eb809d4626a1bd396747eb09c1434be5a Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Fri, 25 Jan 2019 14:28:00 +0000
Subject: [PATCH 0197/1147] Update updater.sh (#618)

Closes #616 + #617
---
 updater.sh | 9 ++++++---
 1 file changed, 6 insertions(+), 3 deletions(-)

diff --git a/updater.sh b/updater.sh
index 0206a35..226a492 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## ghacks-user.js updater for macOS and Linux
 
-## version: 2.4
+## version: 2.5
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac
 
@@ -227,7 +227,7 @@ update_updater () {
   fi
   mv "${tmpfile}" "${SCRIPT_DIR}/updater.sh"
   chmod u+x "${SCRIPT_DIR}/updater.sh"
-  "${SCRIPT_DIR}/updater.sh" "$@ -d"
+  "${SCRIPT_DIR}/updater.sh" "$@" -d
   exit 1
 }
 
@@ -334,6 +334,9 @@ update_userjs () {
       echo -e "Status: ${GREEN}A diff file was created:${NC} ${PWD}/${diffname}"
     else
       echo -e "Warning: ${ORANGE}Your new user.js file appears to be identical.  No diff file was created.${NC}"
+      if [ $BACKUP = 'multiple' ]; then
+        rm $bakname &>/dev/null
+      fi
     fi
     rm $past_nocomments $current_nocomments $pastuserjs &>/dev/null
   fi
@@ -416,7 +419,7 @@ if [ $# != 0 ]; then
 fi
 
 show_banner
-update_updater
+update_updater $@
 
 getProfilePath # updates PROFILE_PATH or exits on error
 cd "$PROFILE_PATH" && update_userjs

From 95b75a065d428cfe79b54b333c0e4294935caff9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 30 Jan 2019 10:23:42 +0000
Subject: [PATCH 0198/1147] up date info on what cookies control #622

---
 user.js | 8 ++++++--
 1 file changed, 6 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index d350535..87983d4 100644
--- a/user.js
+++ b/user.js
@@ -1397,6 +1397,12 @@ user_pref("security.dialog_enable_delay", 700);
           indexedDB : profile\storage\default
            appCache : profile\OfflineCache
      serviceWorkers :
+
+     [NOTE] indexedDB and serviceWorkers are not available in Private Browsing Mode
+     [NOTE] Blocking cookies also blocks websites access to: localStorage (incl. sessionStorage),
+     indexedDB, sharedWorker, and serviceWorker (and therefore service worker cache and notifications)
+     If you set a site exception for cookies (either "Allow" or "Allow for Session") then they become
+     accessible to websites except shared/service workers where the cookie setting *must* be "Allow"
 ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 /* 2701: disable 3rd-party cookies and site-data
@@ -1404,8 +1410,6 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * 0=Accept cookies and site data, 1=Block third-party cookies, 2=Block all cookies,
  * 3=Block cookies from unvisited sites, 4=Block third-party trackers (FF63+)
  * [NOTE] value 4 is tied to the Tracking Protection lists so make sure you have 0424 + 0425 on default values!
- * [NOTE] Blocking 3rd party controls 3rd party access to localStorage, IndexedDB, Cache API and Service Worker Cache.
- * Blocking 1st party controls access to localStorage and IndexedDB (note: Service Workers can still use IndexedDB).
  * [SETTING] Privacy & Security>Cookies and Site Data>Type blocked
  * [1] https://www.fxsitecompat.com/en-CA/docs/2015/web-storage-indexeddb-cache-api-now-obey-third-party-cookies-preference/ ***/
 user_pref("network.cookie.cookieBehavior", 1);

From d9a87b3ac4b7b794ff4fad7a9d1aed4a704566af Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 30 Jan 2019 12:27:53 +0000
Subject: [PATCH 0199/1147] FF65 removals (#624)

---
 user.js | 26 +++++++++++++++-----------
 1 file changed, 15 insertions(+), 11 deletions(-)

diff --git a/user.js b/user.js
index 87983d4..4cae9bd 100644
--- a/user.js
+++ b/user.js
@@ -178,7 +178,8 @@ user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the
 /* 0301b: disable auto-update checks for extensions
  * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
    // user_pref("extensions.update.enabled", false);
-/* 0302a: disable auto update installing for Firefox
+/* 0302a: disable auto update installing for Firefox [NON-WINDOWS FF65+]
+ * [NOTE] In FF65+ on Windows this SETTING (below) is now stored in a file and the pref was removed
  * [SETTING] General>Firefox Updates>Check for updates but let you choose... ***/
 user_pref("app.update.auto", false);
 /* 0302b: disable auto update installing for extensions (after the check in 0301b)
@@ -361,8 +362,6 @@ user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1170190,1141814 ***/
    // user_pref("privacy.trackingprotection.annotate_channels", false);
    // user_pref("privacy.trackingprotection.lower_network_priority", false);
-/* 0426: enforce Content Blocking (required to block cookies) [FF63+] ***/
-user_pref("browser.contentblocking.enabled", true); // [DEFAULT: true]
 
 /*** [SECTION 0500]: SYSTEM ADD-ONS / EXPERIMENTS
      System Add-ons are a method for shipping extensions, considered to be
@@ -567,13 +566,9 @@ user_pref("browser.urlbar.usepreloadedtopurls.enabled", false);
 /* 0810: disable location bar making speculative connections [FF56+]
  * [1] https://bugzilla.mozilla.org/1348275 ***/
 user_pref("browser.urlbar.speculativeConnect.enabled", false);
-/* 0850a: disable location bar autocomplete and suggestion types
- * If you enforce any of the suggestion types, you MUST enforce 'autocomplete'
- *   - If *ALL* of the suggestion types are false, 'autocomplete' must also be false
- *   - If *ANY* of the suggestion types are true, 'autocomplete' must also be true
+/* 0850a: disable location bar suggestion types
  * [SETUP-CHROME] If all three suggestion types are false, search engine keywords are disabled
  * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest ***/
-user_pref("browser.urlbar.autocomplete.enabled", false);
 user_pref("browser.urlbar.suggest.history", false);
 user_pref("browser.urlbar.suggest.bookmark", false);
 user_pref("browser.urlbar.suggest.openpage", false);
@@ -643,9 +638,6 @@ user_pref("signon.storeWhenAutocompleteOff", true); // [DEFAULT: true]
 /* 0907: display warnings for logins on non-secure (non HTTPS) pages
  * [1] https://bugzilla.mozilla.org/1217156 ***/
 user_pref("security.insecure_password.ui.enabled", true);
-/* 0908: remove user & password info when attempting to fix an entered URL (i.e. 0802 is true)
- * e.g. //user:password@foo -> //user@(prefix)foo(suffix) NOT //user:password@(prefix)foo(suffix) ***/
-user_pref("browser.fixup.hide_user_pass", true);
 /* 0909: disable formless login capture for Password Manager [FF51+] ***/
 user_pref("signon.formlessCapture.enabled", false);
 /* 0910: disable autofilling saved passwords on HTTP pages and show warning [FF52+]
@@ -2236,6 +2228,18 @@ user_pref("devtools.webide.adbAddonURL", "");
    // [-] https://bugzilla.mozilla.org/1488165
 user_pref("security.csp.enable_violation_events", false);
 // * * * /
+// FF65
+// 0850a: disable location bar autocomplete and suggestion types
+   // If you enforce any of the suggestion types (see the other 0850a), you MUST enforce 'autocomplete'
+   //   - If *ALL* of the suggestion types are false, 'autocomplete' must also be false
+   //   - If *ANY* of the suggestion types are true, 'autocomplete' must also be true
+   // [-] https://bugzilla.mozilla.org/1502392
+user_pref("browser.urlbar.autocomplete.enabled", false);
+// 0908: remove user & password info when attempting to fix an entered URL (i.e. 0802 is true)
+   // e.g. //user:password@foo -> //user@(prefix)foo(suffix) NOT //user:password@(prefix)foo(suffix)
+   // [-] https://bugzilla.mozilla.org/1510580
+user_pref("browser.fixup.hide_user_pass", true); // [DEFAULT: true]
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 5dc3ea66cdfd0d8f3b5f292bea00e37cffacd616 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 30 Jan 2019 12:38:07 +0000
Subject: [PATCH 0200/1147] browser.contentblocking.enabled

only existed for FF63+64, default true anyway
---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 4231a0b..c885953 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 12-Dec-2018
+ Last updated: 30-Jan-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -117,6 +117,8 @@
     'media.peerconnection.use_document_iceservers',
     'media.peerconnection.video.enabled',
     'media.navigator.video.enabled',
+    /* 65-beta */
+    'browser.contentblocking.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 2f351fa5ce23edeed569b7ad7004cd9ac0afc382 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 30 Jan 2019 14:09:39 +0000
Subject: [PATCH 0201/1147] 0702: http2 websockets

might as well add it: needs t be taken into consideration when looking at the whole http2 thing. Will be interesting to see what Tor Browser does with it in ESR68
---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 4cae9bd..3010a18 100644
--- a/user.js
+++ b/user.js
@@ -473,6 +473,7 @@ user_pref("network.dns.disableIPv6", true);
 user_pref("network.http.spdy.enabled", false);
 user_pref("network.http.spdy.enabled.deps", false);
 user_pref("network.http.spdy.enabled.http2", false);
+user_pref("network.http.spdy.websockets", false); // [FF65+]
 /* 0703: disable HTTP Alternative Services [FF37+]
  * [SETUP-PERF] Relax this if you have FPI enabled (see 4000) *AND* you understand the
  * consequences. FPI isolates these, but it was designed with the Tor protocol in mind,

From 54f79604da3f631febfe066e313ca5dec3b36ae1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 31 Jan 2019 04:06:32 +1300
Subject: [PATCH 0202/1147] Make Firefox Great Again (#626)

* location bar changes
* if the dropdown is going to be used, then no point hiding search engines on the bottom line
---
 user.js | 16 ++++++++--------
 1 file changed, 8 insertions(+), 8 deletions(-)

diff --git a/user.js b/user.js
index 3010a18..aa74e70 100644
--- a/user.js
+++ b/user.js
@@ -517,10 +517,10 @@ user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
 user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
 
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS [SETUP-CHROME]
-     If you are in a private environment (no unwanted eyeballs) and your device is private
-     (restricted access), and the device is secure when unattended (locked, encrypted, forensic
-     hardened), then items 0850 and above can be relaxed in return for more convenience and
-     functionality. Likewise, you may want to check the items cleared on shutdown in section 2800.
+     Change items 0850 and above to suit for privacy vs convenience and functionality. Consider
+     your environment (no unwanted eyeballs), your device (restricted access), your device's
+     unattended state (locked, encrypted, forensic hardened). Likewise, you may want to check
+     the items cleared on shutdown in section 2800.
      [NOTE] The urlbar is also commonly referred to as the location bar and address bar
      #Required reading [#] https://xkcd.com/538/
 ***/
@@ -570,9 +570,9 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
 /* 0850a: disable location bar suggestion types
  * [SETUP-CHROME] If all three suggestion types are false, search engine keywords are disabled
  * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest ***/
-user_pref("browser.urlbar.suggest.history", false);
-user_pref("browser.urlbar.suggest.bookmark", false);
-user_pref("browser.urlbar.suggest.openpage", false);
+   // user_pref("browser.urlbar.suggest.history", false);
+   // user_pref("browser.urlbar.suggest.bookmark", false);
+   // user_pref("browser.urlbar.suggest.openpage", false);
 /* 0850c: disable location bar dropdown
  * This value controls the total number of entries to appear in the location bar dropdown
  * [NOTE] Items (bookmarks/history/openpages) with a high "frecency"/"bonus" will always
@@ -586,7 +586,7 @@ user_pref("browser.urlbar.suggest.openpage", false);
 user_pref("browser.urlbar.autoFill", false);
 /* 0850e: disable location bar one-off searches [FF51+]
  * [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/ ***/
-user_pref("browser.urlbar.oneOffSearches", false);
+   // user_pref("browser.urlbar.oneOffSearches", false);
 /* 0850f: disable location bar suggesting local search history [FF57+]
  * [1] https://bugzilla.mozilla.org/1181644 ***/
 user_pref("browser.urlbar.maxHistoricalSearchSuggestions", 0);

From 6147fed61c4f6f0a13f38947598ee20343c2531f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 30 Jan 2019 15:44:08 +0000
Subject: [PATCH 0203/1147] and the rest of the 0850's

The location bar dropdown cannot be disabled via prefs except with css, in which case the whole thing is hidden regardless of he above prefs. So there is no point in making any of them active. This is also in line with what we can achieve with relaxed and hardened tags / sticky issues - that is we can find a better balance, Shoulder surfers is a low risk, not even Tor Browser disables this stuff. People need to take responsibility and/or use common sense. Sure, we can leave em in for users to know about and enable if they want. End of story.

userChrome.css code is
```css
/* locationbar dropdown FF65+ */
#PopupAutoCompleteRichResult {display: none!important;}
```
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index aa74e70..4d8ab48 100644
--- a/user.js
+++ b/user.js
@@ -583,13 +583,13 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
    // user_pref("browser.urlbar.maxRichResults", 0);
 /* 0850d: disable location bar autofill
  * [1] http://kb.mozillazine.org/Inline_autocomplete ***/
-user_pref("browser.urlbar.autoFill", false);
+   // user_pref("browser.urlbar.autoFill", false);
 /* 0850e: disable location bar one-off searches [FF51+]
  * [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/ ***/
    // user_pref("browser.urlbar.oneOffSearches", false);
 /* 0850f: disable location bar suggesting local search history [FF57+]
  * [1] https://bugzilla.mozilla.org/1181644 ***/
-user_pref("browser.urlbar.maxHistoricalSearchSuggestions", 0);
+   // user_pref("browser.urlbar.maxHistoricalSearchSuggestions", 0);
 /* 0860: disable search and form history
  * [NOTE] You can clear formdata on exiting Firefox (see 2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history ***/

From f047fe93c08bd166eea01a95afc7561a016328ab Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 30 Jan 2019 16:14:39 +0000
Subject: [PATCH 0204/1147] remove 0850f

`browser.urlbar.maxHistoricalSearchSuggestions` is default 0 is FF60 thru to FF66. It is also default 0 in ESR60.1 thru 60.5. (at least on Windows)

IDK if this has ever been used, maybe android, in which case it's probably useful?
---
 user.js | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/user.js b/user.js
index 4d8ab48..6a80cc3 100644
--- a/user.js
+++ b/user.js
@@ -587,9 +587,6 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
 /* 0850e: disable location bar one-off searches [FF51+]
  * [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/ ***/
    // user_pref("browser.urlbar.oneOffSearches", false);
-/* 0850f: disable location bar suggesting local search history [FF57+]
- * [1] https://bugzilla.mozilla.org/1181644 ***/
-   // user_pref("browser.urlbar.maxHistoricalSearchSuggestions", 0);
 /* 0860: disable search and form history
  * [NOTE] You can clear formdata on exiting Firefox (see 2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history ***/

From d0b8a08a4b88e2bc509b4b314b71c0ed59c8cfe8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 30 Jan 2019 16:16:12 +0000
Subject: [PATCH 0205/1147] browser.urlbar.maxHistoricalSearchSuggestions

default 0 in ESR60 and FF60+
---
 scratchpad-scripts/ghacks-clear-[removed].js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index c885953..185a14e 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -119,6 +119,7 @@
     'media.navigator.video.enabled',
     /* 65-beta */
     'browser.contentblocking.enabled',
+    'browser.urlbar.maxHistoricalSearchSuggestions',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From c6060e5645120856a144acabc20045a9cb4a64bc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 31 Jan 2019 16:03:39 +0000
Subject: [PATCH 0206/1147] storage access api

---
 user.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/user.js b/user.js
index 6a80cc3..364593f 100644
--- a/user.js
+++ b/user.js
@@ -1456,6 +1456,9 @@ user_pref("dom.caches.enabled", false);
  * [2] https://developer.mozilla.org/docs/Web/API/Storage_API
  * [3] https://blog.mozilla.org/l10n/2017/03/07/firefox-l10n-report-aurora-54/ ***/
    // user_pref("dom.storageManager.enabled", false);
+/* 2755: disable Storage Access API [FF65+]
+ * [1] https://developer.mozilla.org/en-US/docs/Web/API/Storage_Access_API ***/
+   // user_pref("dom.storage_access.enabled", false);
 
 /*** [SECTION 2800]: SHUTDOWN [SETUP-CHROME]
      You should set the values to what suits you best.

From 24f2e1d9829212077cbc5a4df92b877fcbfde8ea Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 31 Jan 2019 16:16:59 +0000
Subject: [PATCH 0207/1147] disable storage access api

see: https://old.reddit.com/r/firefox/comments/alnn3f/storageaccessapi_permissions/effg5tp/
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 364593f..d89aef0 100644
--- a/user.js
+++ b/user.js
@@ -1458,7 +1458,7 @@ user_pref("dom.caches.enabled", false);
    // user_pref("dom.storageManager.enabled", false);
 /* 2755: disable Storage Access API [FF65+]
  * [1] https://developer.mozilla.org/en-US/docs/Web/API/Storage_Access_API ***/
-   // user_pref("dom.storage_access.enabled", false);
+user_pref("dom.storage_access.enabled", false);
 
 /*** [SECTION 2800]: SHUTDOWN [SETUP-CHROME]
      You should set the values to what suits you best.

From 524b5f79dc8abe9f77497175d5ec60556736c3dd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 31 Jan 2019 18:42:59 +0000
Subject: [PATCH 0208/1147] setting changes re cookies

---
 user.js | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index d89aef0..b0efd39 100644
--- a/user.js
+++ b/user.js
@@ -1400,7 +1400,7 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * 0=Accept cookies and site data, 1=Block third-party cookies, 2=Block all cookies,
  * 3=Block cookies from unvisited sites, 4=Block third-party trackers (FF63+)
  * [NOTE] value 4 is tied to the Tracking Protection lists so make sure you have 0424 + 0425 on default values!
- * [SETTING] Privacy & Security>Cookies and Site Data>Type blocked
+ * [SETTING] Privacy & Security>Content Blocking>Custom>Cookies
  * [1] https://www.fxsitecompat.com/en-CA/docs/2015/web-storage-indexeddb-cache-api-now-obey-third-party-cookies-preference/ ***/
 user_pref("network.cookie.cookieBehavior", 1);
 /* 2702: set third-party cookies (i.e ALL) (if enabled, see 2701) to session-only
@@ -1413,8 +1413,7 @@ user_pref("network.cookie.thirdparty.sessionOnly", true);
 user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
 /* 2703: set cookie lifetime policy
  * 0=until they expire (default), 2=until you close Firefox
- * [NOTE] 3=for n days : no longer supported in FF63+ (see 2704-deprecated)
- * [SETTING] Privacy & Security>Cookies and Site Data>Keep until... ***/
+ * [NOTE] 3=for n days : no longer supported in FF63+ (see 2704-deprecated) ***/
    // user_pref("network.cookie.lifetimePolicy", 0);
 /* 2705: disable HTTP sites setting cookies with the "secure" directive [FF52+]
  * [1] https://developer.mozilla.org/Firefox/Releases/52#HTTP ***/

From f1b892bc1c8cacdbfc1a32ba87ad1a241a52e922 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 2 Feb 2019 00:57:22 +1300
Subject: [PATCH 0209/1147] clean up "Firefox Data Collection & Use" (#627)

* clean up "Firefox Data Collection & Use"
  - telemetry prefs to 330's
  - Firefox Data Collection & Use prefs to 340's (but leave crash reports in 350s)
  - move `app.shield.optoutstudies.enabled` to 330's - this is an internal pref which controls if you get the system addon
  - make notes that `datareporting.healthreport.uploadEnabled` controls studies and ext recommendations
  - split crash reports better to reflex the UI setting
---
 user.js | 41 +++++++++++++++++++++++++----------------
 1 file changed, 25 insertions(+), 16 deletions(-)

diff --git a/user.js b/user.js
index b0efd39..af6fb68 100644
--- a/user.js
+++ b/user.js
@@ -229,23 +229,33 @@ user_pref("toolkit.telemetry.updatePing.enabled", false); // [FF56+]
 user_pref("toolkit.telemetry.bhrPing.enabled", false); // [FF57+] Background Hang Reporter
 user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // [FF57+]
 user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+]
-/* 0333: disable health report
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send technical... data ***/
-user_pref("datareporting.healthreport.uploadEnabled", false);
-/* 0334: disable new data submission, master kill switch [FF41+]
- * If disabled, no policy is shown or upload takes place, ever
- * [1] https://bugzilla.mozilla.org/1195552 ***/
-user_pref("datareporting.policy.dataSubmissionEnabled", false);
-/* 0335: disable Telemetry Coverage
+/* 0331: disable Telemetry Coverage
  * [1] https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/ ***/
 user_pref("toolkit.telemetry.coverage.opt-out", true); // [HIDDEN PREF]
 user_pref("toolkit.coverage.opt-out", true); // [FF64+] [HIDDEN PREF]
 user_pref("toolkit.coverage.endpoint.base", "");
-/* 0350: disable crash reports ***/
+/* 0340: disable Health Reports
+ * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send technical... data ***/
+user_pref("datareporting.healthreport.uploadEnabled", false);
+/* 0341: disable new data submission, master kill switch [FF41+]
+ * If disabled, no policy is shown or upload takes place, ever
+ * [1] https://bugzilla.mozilla.org/1195552 ***/
+user_pref("datareporting.policy.dataSubmissionEnabled", false);
+/* 0342: disable Studies (see 0503)
+ * [NOTE] This pref has no effect when Health Reports (0340) are disabled
+ * [SETTING] Privacy & Security>Firefox Data Collection & Use>...>Allow Firefox to install and run studies ***/
+user_pref("app.shield.optoutstudies.enabled", false);
+/* 0343: disable Extension Recommendations [FF65+]
+ * [NOTE] This pref has no effect when Health Reports (0340) are disabled
+ * [SETTING] Privacy & Security>Firefox Data Collection & Use>...>Allow Firefox to make personalized extension rec.
+ * [1] https://support.mozilla.org/kb/personalized-extension-recommendations ***/
+user_pref("browser.discovery.enabled", false);
+/* 0350: disable Crash Reports ***/
 user_pref("breakpad.reportURL", "");
-/* 0351: disable sending of crash reports ***/
 user_pref("browser.tabs.crashReporting.sendReport", false); // [FF44+]
 user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // [FF51+]
+/* 0351: disable backlogged Crash Reports
+ * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send backlogged crash reports  ***/
 user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [FF58+]
 /* 0370: disable Pocket [FF46+]
  * Pocket is a third party (now owned by Mozilla) "save for later" cloud service
@@ -388,12 +398,11 @@ user_pref("network.allow-experiments", false);
  * [2] https://github.com/mozilla/normandy ***/
 user_pref("app.normandy.enabled", false);
 user_pref("app.normandy.api_url", "");
-user_pref("app.shield.optoutstudies.enabled", false);
 /* 0505: disable System Add-on updates ***/
 user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
 user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
 /* 0506: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
- * Currently blocked by 'datareporting.healthreport.uploadEnabled' (see 0333) ***/
+ * Currently blocked by 'datareporting.healthreport.uploadEnabled' (see 0340) ***/
 user_pref("browser.ping-centre.telemetry", false);
 /* 0515: disable Screenshots
  * alternatively in FF60+, disable uploading to the Screenshots server
@@ -1855,11 +1864,11 @@ user_pref("dom.workers.sharedWorkers.enabled", false);
 user_pref("browser.sessionstore.privacy_level_deferred", 2);
 // ***/
 /* FF46
-// 0333: disable health report
+// 0340: disable health report
    // [-] https://bugzilla.mozilla.org/1234526
 user_pref("datareporting.healthreport.service.enabled", false); // [HIDDEN PREF]
 user_pref("datareporting.healthreport.documentServerURI", ""); // [HIDDEN PREF]
-// 0334b: disable FHR (Firefox Health Report) v2 data being sent to Mozilla servers
+// 0341: disable FHR (Firefox Health Report) v2 data being sent to Mozilla servers
    // [-] https://bugzilla.mozilla.org/1234522
 user_pref("datareporting.policy.dataSubmissionEnabled.v2", false);
 // 0414: disable safebrowsing pref - replaced by browser.safebrowsing.downloads.remote.url
@@ -1880,7 +1889,7 @@ user_pref("browser.pocket.oAuthConsumerKey", "");
    // is enabled ONLY for people that opted into it, even if unified Telemetry is enabled
    // [-] https://bugzilla.mozilla.org/1236580
 user_pref("toolkit.telemetry.unifiedIsOptIn", true); // [HIDDEN PREF]
-// 0333b: disable about:healthreport page UNIFIED
+// 0340b: disable about:healthreport page UNIFIED
    // [-] https://bugzilla.mozilla.org/1236580
 user_pref("datareporting.healthreport.about.reportUrlUnified", "data:text/plain,");
 // 0807: disable history manipulation
@@ -2082,7 +2091,7 @@ user_pref("intl.locale.matchOS", false);
 // 0204: set APP locale - replaced by intl.locale.requested
    // [-] https://bugzilla.mozilla.org/1414390
 user_pref("general.useragent.locale", "en-US");
-// 0333b: disable about:healthreport page (which connects to Mozilla for locale/css+js+json)
+// 0340b: disable about:healthreport page (which connects to Mozilla for locale/css+js+json)
    // If you have disabled health reports, then this about page is useless - disable it
    // If you want to see what health data is present, then this must be set at default
    // [-] https://bugzilla.mozilla.org/1352497

From e6eb4730719bca426c73595cf5e07646baa543fa Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 1 Feb 2019 13:41:00 +0000
Subject: [PATCH 0210/1147] dom.storage_access.enabled

regardless of this pref setting: the permissions.sqlite file will still be abused to store a flag for this for every single site you connect to (as third party?) - fun.
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index af6fb68..1943d0e 100644
--- a/user.js
+++ b/user.js
@@ -1466,7 +1466,7 @@ user_pref("dom.caches.enabled", false);
    // user_pref("dom.storageManager.enabled", false);
 /* 2755: disable Storage Access API [FF65+]
  * [1] https://developer.mozilla.org/en-US/docs/Web/API/Storage_Access_API ***/
-user_pref("dom.storage_access.enabled", false);
+   // user_pref("dom.storage_access.enabled", false);
 
 /*** [SECTION 2800]: SHUTDOWN [SETUP-CHROME]
      You should set the values to what suits you best.

From ec0e58099f0669683d109b1d847fe73db18a450e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 1 Feb 2019 13:53:04 +0000
Subject: [PATCH 0211/1147] pointer events -> RFP ALTS

---
 user.js | 10 ++++++----
 1 file changed, 6 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 1943d0e..4dda617 100644
--- a/user.js
+++ b/user.js
@@ -1249,9 +1249,6 @@ user_pref("layers.acceleration.disabled", true);
 /* 2510: disable Web Audio API [FF51+]
  * [1] https://bugzilla.mozilla.org/1288359 ***/
 user_pref("dom.webaudio.enabled", false);
-/* 2516: disable PointerEvents
- * [1] https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent ***/
-user_pref("dom.w3c_pointer_events.enabled", false);
 /* 2517: disable Media Capabilities API [FF63+]
  * [SETUP-PERF] This *may* affect media performance if disabled, no one is sure
  * [1] https://github.com/WICG/media-capabilities
@@ -1606,7 +1603,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
       FF60: Fix keydown/keyup events (1438795)
  ** 1337157 - disable WebGL debug renderer info (see 4613) (FF60+)
  ** 1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62+)
- ** 1363508 - spoof/suppress Pointer Events (see 2516) (FF64+)
+ ** 1363508 - spoof/suppress Pointer Events (see 4614) (FF64+)
       FF65: pointerEvent.pointerid (1492766)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
@@ -1706,6 +1703,11 @@ user_pref("media.ondevicechange.enabled", false);
    // [2] https://developer.mozilla.org/docs/Web/API/WEBGL_debug_renderer_info
 user_pref("webgl.enable-debug-renderer-info", false);
 // * * * /
+// FF65+
+// 4614: [2516] disable PointerEvents
+   // [1] https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent
+user_pref("dom.w3c_pointer_events.enabled", false);
+// * * * /
 // ***/
 
 /*** [SECTION 4700]: RFP ALTERNATIVES (NAVIGATOR / USER AGENT (UA) SPOOFING)

From 847eb80877f5f70b352e8d958f267f3501dbe052 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 4 Feb 2019 06:39:29 +0000
Subject: [PATCH 0212/1147] 0306 => inactive, closes #615

whatever we thought it may have done in the past, it doesn't do that now as far as we know. And it's not an issue since we allow extension update-CHECKs anyway.
---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 4dda617..c89eaf9 100644
--- a/user.js
+++ b/user.js
@@ -193,10 +193,10 @@ user_pref("app.update.staging.enabled", false);
 /* 0305: enforce update information is displayed
  * This is the update available, downloaded, error and success information ***/
 user_pref("app.update.silent", false);
-/* 0306: disable extension metadata updating
- * sends daily pings to Mozilla about extensions and recent startups
- * [NOTE] blocks any expanded text description, if it exists, when you "show more details about an addon" ***/
-user_pref("extensions.getAddons.cache.enabled", false);
+/* 0306: disable extension metadata
+ * used when installing, updating and checking for extension updates: if false, all it does is hide
+ * the expanded text description, if it exists, when you "show more details about an addon" ***/
+   // user_pref("extensions.getAddons.cache.enabled", false);
 /* 0307: disable auto updating of personas (themes) ***/
 user_pref("lightweightThemes.update.enabled", false);
 /* 0308: disable search update

From f06c78f897968f17da6e47279c286b1e44afa412 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 5 Feb 2019 02:00:19 +1300
Subject: [PATCH 0213/1147] update cookie settings info

---
 user.js | 27 +++++++++++++--------------
 1 file changed, 13 insertions(+), 14 deletions(-)

diff --git a/user.js b/user.js
index c89eaf9..4421574 100644
--- a/user.js
+++ b/user.js
@@ -139,7 +139,7 @@ user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely decease
    // user_pref("geo.enabled", false);
 /* 0201b: set a default permission for Location [FF58+]
  * 0=always ask (default), 1=allow, 2=block
- * [NOTE] best left at default "always ask", fingerprintable via Permissions API
+ * [NOTE] Best left at default "always ask", fingerprintable via Permissions API
  * [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
    // user_pref("permissions.default.geo", 2);
@@ -1154,7 +1154,7 @@ user_pref("dom.webnotifications.enabled", false); // [FF22+]
 user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
 /* 2305: set a default permission for Notifications (see 2304) [FF58+]
  * 0=always ask (default), 1=allow, 2=block
- * [NOTE] best left at default "always ask", fingerprintable via Permissions API
+ * [NOTE] Best left at default "always ask", fingerprintable via Permissions API
  * [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Notifications>Settings ***/
    // user_pref("permissions.default.desktop-notification", 2);
@@ -1313,7 +1313,7 @@ user_pref("permissions.manager.defaultsUrl", "");
 /* 2617: remove webchannel whitelist ***/
 user_pref("webchannel.allowObject.urlWhitelist", "");
 /* 2618: disable exposure of system colors to CSS or canvas [FF44+]
- * [NOTE] see second listed bug: may cause black on black for elements with undefined colors
+ * [NOTE] See second listed bug: may cause black on black for elements with undefined colors
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876 ***/
 user_pref("ui.use_standins_for_native_colors", true); // [HIDDEN PREF]
 /* 2619: enforce Punycode for Internationalized Domain Names to eliminate possible spoofing
@@ -1401,13 +1401,11 @@ user_pref("security.dialog_enable_delay", 700);
      accessible to websites except shared/service workers where the cookie setting *must* be "Allow"
 ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
-/* 2701: disable 3rd-party cookies and site-data
- * You can set exceptions under site permissions or use an extension
- * 0=Accept cookies and site data, 1=Block third-party cookies, 2=Block all cookies,
- * 3=Block cookies from unvisited sites, 4=Block third-party trackers (FF63+)
- * [NOTE] value 4 is tied to the Tracking Protection lists so make sure you have 0424 + 0425 on default values!
- * [SETTING] Privacy & Security>Content Blocking>Custom>Cookies
- * [1] https://www.fxsitecompat.com/en-CA/docs/2015/web-storage-indexeddb-cache-api-now-obey-third-party-cookies-preference/ ***/
+/* 2701: disable 3rd-party cookies
+ * 0=default (Standard Content Blocking / Custom Content Blocking with "Cookies" unchecked)
+ * 1=All third-party cookies, 2=All cookies 3=Cookies from unvisited websites, 4=Third-party trackers (FF63+)
+ * [NOTE] You can set exceptions under site permissions or use an extension
+ * [SETTING] Privacy & Security>Content Blocking>Custom>Choose what to block>Cookies ***/
 user_pref("network.cookie.cookieBehavior", 1);
 /* 2702: set third-party cookies (i.e ALL) (if enabled, see 2701) to session-only
    and (FF58+) set third-party non-secure (i.e HTTP) cookies to session-only
@@ -1417,10 +1415,11 @@ user_pref("network.cookie.cookieBehavior", 1);
  * [2] http://kb.mozillazine.org/Network.cookie.thirdparty.sessionOnly ***/
 user_pref("network.cookie.thirdparty.sessionOnly", true);
 user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
-/* 2703: set cookie lifetime policy
- * 0=until they expire (default), 2=until you close Firefox
- * [NOTE] 3=for n days : no longer supported in FF63+ (see 2704-deprecated) ***/
-   // user_pref("network.cookie.lifetimePolicy", 0);
+/* 2703: delete cookies and site data on close
+ * [NOTE] This is *NOT* the same as 2802 + 2803 (clearing data on shutdown)
+ * [NOTE] The setting below is disabled (but not changed) if you block all cookies (2701 = 2)
+ * [SETTING] Privacy>Cookies and Site Data>Delete cookies and site data when Firefox is closed ***/
+   // user_pref("network.cookie.lifetimePolicy", 0); // 0=delete, 2=do nothing
 /* 2705: disable HTTP sites setting cookies with the "secure" directive [FF52+]
  * [1] https://developer.mozilla.org/Firefox/Releases/52#HTTP ***/
 user_pref("network.cookie.leave-secure-alone", true); // [DEFAULT: true]

From e432a2269315d64397c8ea507dd78649c7306a21 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 4 Feb 2019 13:08:41 +0000
Subject: [PATCH 0214/1147] 0306: moar info #615

see https://github.com/ghacksuserjs/ghacks-user.js/issues/615#issuecomment-460243162 - checking for updates is not a trigger, having an update **and** applying it is
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 4421574..d121cae 100644
--- a/user.js
+++ b/user.js
@@ -194,8 +194,8 @@ user_pref("app.update.staging.enabled", false);
  * This is the update available, downloaded, error and success information ***/
 user_pref("app.update.silent", false);
 /* 0306: disable extension metadata
- * used when installing, updating and checking for extension updates: if false, all it does is hide
- * the expanded text description, if it exists, when you "show more details about an addon" ***/
+ * used when installing or updating an extension: if false, all it does is hide the
+ * expanded text description, if it exists, when you "show more details about an addon" ***/
    // user_pref("extensions.getAddons.cache.enabled", false);
 /* 0307: disable auto updating of personas (themes) ***/
 user_pref("lightweightThemes.update.enabled", false);

From 71ffc661b25ee3dd84c8c5f5718faef2e1600217 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 4 Feb 2019 13:26:19 +0000
Subject: [PATCH 0215/1147] 2701 again

---
 user.js | 9 +++++----
 1 file changed, 5 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index d121cae..78c78f2 100644
--- a/user.js
+++ b/user.js
@@ -1401,11 +1401,12 @@ user_pref("security.dialog_enable_delay", 700);
      accessible to websites except shared/service workers where the cookie setting *must* be "Allow"
 ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
-/* 2701: disable 3rd-party cookies
- * 0=default (Standard Content Blocking / Custom Content Blocking with "Cookies" unchecked)
- * 1=All third-party cookies, 2=All cookies 3=Cookies from unvisited websites, 4=Third-party trackers (FF63+)
+/* 2701: disable 3rd-party cookies and site-data
+ * 0=Accept cookies and site data (default), 1=(Block) All third-party cookies, 2=(Block) All cookies,
+ * 3=(Block) Cookies from unvisited sites, 4=(Block) Third-party trackers (FF63+)
+ * [NOTE] value 4 is tied to the Tracking Protection lists
  * [NOTE] You can set exceptions under site permissions or use an extension
- * [SETTING] Privacy & Security>Content Blocking>Custom>Choose what to block>Cookies ***/
+ * [SETTING] the "Cookie" part under Privacy & Security>Content Blocking ***/
 user_pref("network.cookie.cookieBehavior", 1);
 /* 2702: set third-party cookies (i.e ALL) (if enabled, see 2701) to session-only
    and (FF58+) set third-party non-secure (i.e HTTP) cookies to session-only

From 74a08114a80db2f009ac70e01e72b9c843c31b65 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 4 Feb 2019 13:28:29 +0000
Subject: [PATCH 0216/1147] 2701: refix setting

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 78c78f2..bc617a0 100644
--- a/user.js
+++ b/user.js
@@ -1406,7 +1406,7 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * 3=(Block) Cookies from unvisited sites, 4=(Block) Third-party trackers (FF63+)
  * [NOTE] value 4 is tied to the Tracking Protection lists
  * [NOTE] You can set exceptions under site permissions or use an extension
- * [SETTING] the "Cookie" part under Privacy & Security>Content Blocking ***/
+ * [SETTING] Privacy & Security>Content Blocking>Custom>Choose what to block>Cookies ***/
 user_pref("network.cookie.cookieBehavior", 1);
 /* 2702: set third-party cookies (i.e ALL) (if enabled, see 2701) to session-only
    and (FF58+) set third-party non-secure (i.e HTTP) cookies to session-only

From 25acd9f63ec847d0d656bbd5868619a5e2ae5ff0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 4 Feb 2019 13:40:45 +0000
Subject: [PATCH 0217/1147] 2703 again

- description needs to stay changed from just cookies since it also clears site data
- keep the info about n days out of it, it's just messy (ESR users should be on version 60)
- get the values correct (I mixed them up earlier)
- fixup [setting] path
- leave in one (of two) extra [notes] I previously added
---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index bc617a0..dbe02a0 100644
--- a/user.js
+++ b/user.js
@@ -1417,10 +1417,10 @@ user_pref("network.cookie.cookieBehavior", 1);
 user_pref("network.cookie.thirdparty.sessionOnly", true);
 user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
 /* 2703: delete cookies and site data on close
- * [NOTE] This is *NOT* the same as 2802 + 2803 (clearing data on shutdown)
+ * 0=keep until they expire (default), 2=keep until you close Firefox
  * [NOTE] The setting below is disabled (but not changed) if you block all cookies (2701 = 2)
- * [SETTING] Privacy>Cookies and Site Data>Delete cookies and site data when Firefox is closed ***/
-   // user_pref("network.cookie.lifetimePolicy", 0); // 0=delete, 2=do nothing
+ * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed ***/
+   // user_pref("network.cookie.lifetimePolicy", 2);
 /* 2705: disable HTTP sites setting cookies with the "secure" directive [FF52+]
  * [1] https://developer.mozilla.org/Firefox/Releases/52#HTTP ***/
 user_pref("network.cookie.leave-secure-alone", true); // [DEFAULT: true]

From a0508eccf6e8fa3e4fbc6095a7ddd07a80f78cb5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 4 Feb 2019 13:41:56 +0000
Subject: [PATCH 0218/1147] capital letter after [note]

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index dbe02a0..ef7bddb 100644
--- a/user.js
+++ b/user.js
@@ -1404,7 +1404,7 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
 /* 2701: disable 3rd-party cookies and site-data
  * 0=Accept cookies and site data (default), 1=(Block) All third-party cookies, 2=(Block) All cookies,
  * 3=(Block) Cookies from unvisited sites, 4=(Block) Third-party trackers (FF63+)
- * [NOTE] value 4 is tied to the Tracking Protection lists
+ * [NOTE] Value 4 is tied to the Tracking Protection lists
  * [NOTE] You can set exceptions under site permissions or use an extension
  * [SETTING] Privacy & Security>Content Blocking>Custom>Choose what to block>Cookies ***/
 user_pref("network.cookie.cookieBehavior", 1);

From 74c8f294d6cf9bd32332d01b5b107f97c517ca68 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 5 Feb 2019 04:51:07 +0000
Subject: [PATCH 0219/1147] 0306: extension metadata, closes #615

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index ef7bddb..ecbaeb5 100644
--- a/user.js
+++ b/user.js
@@ -194,8 +194,8 @@ user_pref("app.update.staging.enabled", false);
  * This is the update available, downloaded, error and success information ***/
 user_pref("app.update.silent", false);
 /* 0306: disable extension metadata
- * used when installing or updating an extension: if false, all it does is hide the
- * expanded text description, if it exists, when you "show more details about an addon" ***/
+ * used when installing/updating an extension, and in daily background update checks: if false, it
+ * hides the expanded text description (if it exists) when you "show more details about an addon" ***/
    // user_pref("extensions.getAddons.cache.enabled", false);
 /* 0307: disable auto updating of personas (themes) ***/
 user_pref("lightweightThemes.update.enabled", false);

From 1d5289dd94db1fdca8a87a94e84c6d4a0174669c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 6 Feb 2019 16:59:28 +0000
Subject: [PATCH 0220/1147] RFP 67+

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index ecbaeb5..b21bfa0 100644
--- a/user.js
+++ b/user.js
@@ -1605,6 +1605,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
  ** 1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62+)
  ** 1363508 - spoof/suppress Pointer Events (see 4614) (FF64+)
       FF65: pointerEvent.pointerid (1492766)
+ ** 1485266 - disable exposure of system colors to CSS or canvas (see 2618) (FF67+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]

From 649699ad22123bf5ae88e1b57d3a552e69946c6c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 7 Feb 2019 11:00:07 +0000
Subject: [PATCH 0221/1147] 0609: disable connectivity service #610

---
 user.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/user.js b/user.js
index b21bfa0..ddb23d8 100644
--- a/user.js
+++ b/user.js
@@ -457,6 +457,8 @@ user_pref("browser.send_pings.require_same_host", true);
 user_pref("network.protocol-handler.external.ms-windows-store", false);
 /* 0608: disable predictor / prefetching [FF48+] ***/
 user_pref("network.predictor.enable-prefetch", false);
+/* 0609: disable Network Connectivity Services [FF65+] ***/
+pref("network.connectivity-service.enabled", false);
 
 /*** [SECTION 0700]: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");

From 7a8381d894ba457efacac4b9675bbaccbf42e322 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 7 Feb 2019 11:01:31 +0000
Subject: [PATCH 0222/1147] typo

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index ddb23d8..183b433 100644
--- a/user.js
+++ b/user.js
@@ -457,7 +457,7 @@ user_pref("browser.send_pings.require_same_host", true);
 user_pref("network.protocol-handler.external.ms-windows-store", false);
 /* 0608: disable predictor / prefetching [FF48+] ***/
 user_pref("network.predictor.enable-prefetch", false);
-/* 0609: disable Network Connectivity Services [FF65+] ***/
+/* 0609: disable Network Connectivity Service [FF65+] ***/
 pref("network.connectivity-service.enabled", false);
 
 /*** [SECTION 0700]: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/

From d81e8ae5835a8cb255bcbc1827e2108227e0097b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 7 Feb 2019 11:11:16 +0000
Subject: [PATCH 0223/1147] i need a break

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 183b433..9ab112c 100644
--- a/user.js
+++ b/user.js
@@ -458,7 +458,7 @@ user_pref("network.protocol-handler.external.ms-windows-store", false);
 /* 0608: disable predictor / prefetching [FF48+] ***/
 user_pref("network.predictor.enable-prefetch", false);
 /* 0609: disable Network Connectivity Service [FF65+] ***/
-pref("network.connectivity-service.enabled", false);
+user_pref("network.connectivity-service.enabled", false);
 
 /*** [SECTION 0700]: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");

From 3847f97f4166f2a5f5080d13c92165e702ae9a22 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 7 Feb 2019 13:41:15 +0000
Subject: [PATCH 0224/1147] some more 65+ diffs, #610

---
 user.js | 9 ++++++++-
 1 file changed, 8 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 9ab112c..2af9248 100644
--- a/user.js
+++ b/user.js
@@ -168,6 +168,10 @@ user_pref("intl.regional_prefs.use_os_locales", false);
  * Optionally enable logging to the console (defaults to false) ***/
 user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
    // user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
+/* 0211: disable using the OS's geolocation service ***/
+user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
+user_pref("geo.provider.use_corelocation", false); // [MAC]
+user_pref("geo.provider.use_gpsd", false); // [LINUX]
 
 /*** [SECTION 0300]: QUIET FOX
      We choose to not disable auto-CHECKs (0301's) but to disable auto-INSTALLs (0302's).
@@ -457,7 +461,7 @@ user_pref("browser.send_pings.require_same_host", true);
 user_pref("network.protocol-handler.external.ms-windows-store", false);
 /* 0608: disable predictor / prefetching [FF48+] ***/
 user_pref("network.predictor.enable-prefetch", false);
-/* 0609: disable Network Connectivity Service [FF65+] ***/
+/* 0609: disable Network Connectivity checks [FF65+] ***/
 user_pref("network.connectivity-service.enabled", false);
 
 /*** [SECTION 0700]: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
@@ -1222,6 +1226,9 @@ user_pref("javascript.options.shared_memory", false);
 /* 2428: enforce DOMHighResTimeStamp API
  * [WARNING] Required for normalization of timestamps and any timer resolution mitigations ***/
 user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
+/* 2429: enable (limited but sufficient) window.opener protection [FF65+]
+ * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
+user_pref("dom.targetBlankNoOpener.enabled", true);
 
 /*** [SECTION 2500]: HARDWARE FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");

From ed140425ea695f017ad5deb660990290f059274f Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Thu, 7 Feb 2019 14:41:23 +0000
Subject: [PATCH 0225/1147] move shit around

---
 user.js | 25 +++++++++++++------------
 1 file changed, 13 insertions(+), 12 deletions(-)

diff --git a/user.js b/user.js
index 2af9248..ceaadf4 100644
--- a/user.js
+++ b/user.js
@@ -271,6 +271,15 @@ user_pref("extensions.pocket.enabled", false);
  * [2] https://firefox-source-docs.mozilla.org/browser/browser/BrowserErrorReporter.html ***/
 user_pref("browser.chrome.errorReporter.enabled", false);
 user_pref("browser.chrome.errorReporter.submitUrl", "");
+/* 0390: disable Captive Portal detection
+ * [1] https://en.wikipedia.org/wiki/Captive_portal
+ * [2] https://wiki.mozilla.org/Necko/CaptivePortal
+ * [3] https://trac.torproject.org/projects/tor/ticket/21790 ***/
+user_pref("captivedetect.canonicalURL", "");
+user_pref("network.captive-portal-service.enabled", false); // [FF52+]
+/* 0391: disable Network Connectivity checks [FF65+]
+ * [1] https://bugzilla.mozilla.org/1460537 ***/
+user_pref("network.connectivity-service.enabled", false);
 
 /*** [SECTION 0400]: BLOCKLISTS / SAFE BROWSING / TRACKING PROTECTION
      This section has security & tracking protection implications vs privacy concerns vs effectiveness
@@ -438,15 +447,9 @@ user_pref("network.prefetch-next", false);
  * [2] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
 user_pref("network.dns.disablePrefetch", true);
 user_pref("network.dns.disablePrefetchFromHTTPS", true); // [HIDDEN PREF]
-/* 0603a: disable Seer/Necko
+/* 0603: disable Seer/Necko
  * [1] https://developer.mozilla.org/docs/Mozilla/Projects/Necko ***/
 user_pref("network.predictor.enabled", false);
-/* 0603b: disable more Necko/Captive Portal
- * [1] https://en.wikipedia.org/wiki/Captive_portal
- * [2] https://wiki.mozilla.org/Necko/CaptivePortal
- * [3] https://trac.torproject.org/projects/tor/ticket/21790 ***/
-user_pref("captivedetect.canonicalURL", "");
-user_pref("network.captive-portal-service.enabled", false); // [FF52+]
 /* 0605: disable link-mouseover opening connection to linked server
  * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests
  * [2] https://www.ghacks.net/2015/08/16/block-firefox-from-connecting-to-sites-when-you-hover-over-links/ ***/
@@ -456,13 +459,8 @@ user_pref("network.http.speculative-parallel-limit", 0);
  * [2] http://kb.mozillazine.org/Browser.send_pings.require_same_host ***/
 user_pref("browser.send_pings", false);
 user_pref("browser.send_pings.require_same_host", true);
-/* 0607: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS]
- * [1] https://www.ghacks.net/2016/03/25/block-firefox-chrome-windows-store/ ***/
-user_pref("network.protocol-handler.external.ms-windows-store", false);
 /* 0608: disable predictor / prefetching [FF48+] ***/
 user_pref("network.predictor.enable-prefetch", false);
-/* 0609: disable Network Connectivity checks [FF65+] ***/
-user_pref("network.connectivity-service.enabled", false);
 
 /*** [SECTION 0700]: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
@@ -1345,6 +1343,9 @@ user_pref("network.IDN_show_punycode", true);
  * CAVEAT: JS can still force a pdf to open in-browser by bundling its own code (rare)
  * [SETTING] General>Applications>Portable Document Format (PDF) ***/
 user_pref("pdfjs.disabled", false);
+/* 2621: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS]
+ * [1] https://www.ghacks.net/2016/03/25/block-firefox-chrome-windows-store/ ***/
+user_pref("network.protocol-handler.external.ms-windows-store", false);
 
 /** DOWNLOADS ***/
 /* 2650: discourage downloading to desktop (0=desktop 1=downloads 2=last used)

From d3b1ed45ad1ef7d91ca6077d4c9bb7f0afe5b7b4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 7 Feb 2019 15:14:08 +0000
Subject: [PATCH 0226/1147] RFP: UA spoof is now 60+8's

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index ceaadf4..95f89c2 100644
--- a/user.js
+++ b/user.js
@@ -1587,7 +1587,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
  ** 1369303 - spoof/disable performance API (see 2410-deprecated, 4602, 4603) (FF56+)
  ** 1333651 & 1383495 & 1396468 - spoof Navigator API (see section 4700) (FF56+)
       FF56: The version number will be rounded down to the nearest multiple of 10
-      FF57: The version number will match current ESR (1393283, 1418672, 1418162)
+      FF57: The version number will match current ESR (1393283, 1418672, 1418162, 1511763)
       FF59: The OS will be reported as Windows, OSX, Android, or Linux (to reduce breakage) (1404608)
       FF66: The OS in HTTP Headers will be reduced to Windows or Android (1509829)
  ** 1369319 - disable device sensor API (see 4604) (FF56+)

From e448015704f4488a601bd9f6660e33b25bed9fd2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 7 Feb 2019 16:55:04 +0000
Subject: [PATCH 0227/1147] 0343: clarify where

TAAR is extension recommendations in the "Add-ons Manager" (not sure how it's displayed)
CFR is extension recommendations as you browse the web, via a drop down panel
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 95f89c2..1d608fb 100644
--- a/user.js
+++ b/user.js
@@ -249,7 +249,7 @@ user_pref("datareporting.policy.dataSubmissionEnabled", false);
  * [NOTE] This pref has no effect when Health Reports (0340) are disabled
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>...>Allow Firefox to install and run studies ***/
 user_pref("app.shield.optoutstudies.enabled", false);
-/* 0343: disable Extension Recommendations [FF65+]
+/* 0343: disable Extension Recommendations in about:addons [FF65+]
  * [NOTE] This pref has no effect when Health Reports (0340) are disabled
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>...>Allow Firefox to make personalized extension rec.
  * [1] https://support.mozilla.org/kb/personalized-extension-recommendations ***/

From de0ebbed2120787ada6f5455639741c4f3ae1466 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 8 Feb 2019 11:38:17 +0000
Subject: [PATCH 0228/1147] 0343: even MOAR clarification

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 1d608fb..6ed9a11 100644
--- a/user.js
+++ b/user.js
@@ -249,7 +249,7 @@ user_pref("datareporting.policy.dataSubmissionEnabled", false);
  * [NOTE] This pref has no effect when Health Reports (0340) are disabled
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>...>Allow Firefox to install and run studies ***/
 user_pref("app.shield.optoutstudies.enabled", false);
-/* 0343: disable Extension Recommendations in about:addons [FF65+]
+/* 0343: disable Extension Recommendations in about:addons and AMO [FF65+]
  * [NOTE] This pref has no effect when Health Reports (0340) are disabled
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>...>Allow Firefox to make personalized extension rec.
  * [1] https://support.mozilla.org/kb/personalized-extension-recommendations ***/

From 5c703f0262b948c5ad898c54afd4ff120bba4530 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 9 Feb 2019 10:05:45 +0000
Subject: [PATCH 0229/1147] 65-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 6ed9a11..71a0541 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 17 January 2019
-* version 65-alpha: Dancing with My Pants
+* date: 8 February 2019
+* version 65-beta: Dancing with My Pants
 *   "If I had the chance, I'd ask the world to dance, and I'll be dancing with my pants"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 981dd83c1526c5eb8ebe0d86cb30d9e6914382e6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 17 Feb 2019 16:34:34 +1300
Subject: [PATCH 0230/1147] clarify themes info, closes #648

---
 user.js | 12 +++++++-----
 1 file changed, 7 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 71a0541..8823dfc 100644
--- a/user.js
+++ b/user.js
@@ -179,14 +179,13 @@ user_pref("geo.provider.use_gpsd", false); // [LINUX]
      monetized extensions, time constraints, legacy issues, and fear of breakage/bugs.
      It is still important to do updates for security reasons, please do so manually. ***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
-/* 0301b: disable auto-update checks for extensions
- * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
+/* 0301b: disable auto-CHECKING for extension and theme updates ***/
    // user_pref("extensions.update.enabled", false);
-/* 0302a: disable auto update installing for Firefox [NON-WINDOWS FF65+]
+/* 0302a: disable auto-INSTALLING Firefox updates [NON-WINDOWS FF65+]
  * [NOTE] In FF65+ on Windows this SETTING (below) is now stored in a file and the pref was removed
  * [SETTING] General>Firefox Updates>Check for updates but let you choose... ***/
 user_pref("app.update.auto", false);
-/* 0302b: disable auto update installing for extensions (after the check in 0301b)
+/* 0302b: disable auto-INSTALLING extension and theme updates (after the check in 0301b)
  * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
 user_pref("extensions.update.autoUpdateDefault", false);
 /* 0303: disable background update service [WINDOWS]
@@ -201,7 +200,10 @@ user_pref("app.update.silent", false);
  * used when installing/updating an extension, and in daily background update checks: if false, it
  * hides the expanded text description (if it exists) when you "show more details about an addon" ***/
    // user_pref("extensions.getAddons.cache.enabled", false);
-/* 0307: disable auto updating of personas (themes) ***/
+/* 0307: disable auto updating of lightweight themes (LWT)
+ * Not to be confused with themes in 0301* + 0302*, which use the FF55+ Theme API
+ * Mozilla plan to convert existing LWTs and remove LWT support in the future, see [1]
+ * [1] https://blog.mozilla.org/addons/2018/09/20/future-themes-here/ ***/
 user_pref("lightweightThemes.update.enabled", false);
 /* 0308: disable search update
  * [SETTING] General>Firefox Updates>Automatically update search engines ***/

From 60be8be5ec2646ff26fbf0cf451d5c2cbc9e5c72 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 17 Feb 2019 03:51:44 +0000
Subject: [PATCH 0231/1147] UNC and extensions, closes #651

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 8823dfc..401bb35 100644
--- a/user.js
+++ b/user.js
@@ -520,6 +520,7 @@ user_pref("network.proxy.autoconfig_url.include_path", false); // [DEFAULT: fals
  * [1] https://www.ghacks.net/2018/02/20/firefox-60-with-new-preference-to-disable-ftp/ ***/
    // user_pref("network.ftp.enabled", false);
 /* 0709: disable using UNC (Uniform Naming Convention) paths [FF61+]
+ * [SETUP-CHROME] Can break extensions for profiles on network shares
  * [1] https://trac.torproject.org/projects/tor/ticket/26424 ***/
 user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
 /* 0710: disable GIO as a potential proxy bypass vector

From 2cff24f12e89d3592f8285875fed3a57c489a961 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 26 Feb 2019 05:42:32 +0000
Subject: [PATCH 0232/1147] 65 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 401bb35..bbedb40 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 8 February 2019
-* version 65-beta: Dancing with My Pants
+* date: 26 February 2019
+* version 65: Dancing with My Pants
 *   "If I had the chance, I'd ask the world to dance, and I'll be dancing with my pants"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From eae84348536e4ffd9f411c8ef95d0c91e2387365 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 26 Feb 2019 07:53:21 +0000
Subject: [PATCH 0233/1147] start 66 commits

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index bbedb40..cd4b486 100644
--- a/user.js
+++ b/user.js
@@ -1,8 +1,8 @@
 /******
 * name: ghacks user.js
 * date: 26 February 2019
-* version 65: Dancing with My Pants
-*   "If I had the chance, I'd ask the world to dance, and I'll be dancing with my pants"
+* version 66-alpha: The Power of Pants
+*   "The power of pants is a curious thing. Make a one man weep, make another man sing"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 6d6cd5f410dea7ae2594ccab56f78ff424741b90 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 5 Mar 2019 03:26:39 +0000
Subject: [PATCH 0234/1147] 2802 applies to 2803, closes #658

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index cd4b486..13e1345 100644
--- a/user.js
+++ b/user.js
@@ -1486,10 +1486,10 @@ user_pref("dom.caches.enabled", false);
        Firefox interface as "Browsing & Download History" and their values will be synced
 ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
-/* 2802: enable Firefox to clear history items on shutdown
+/* 2802: enable Firefox to clear items on shutdown (see 2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
-/* 2803: set what history items to clear on shutdown
+/* 2803: set what items to clear on shutdown (if 2802 is true)
  * [NOTE] If 'history' is true, downloads will also be cleared regardless of the value
  * but if 'history' is false, downloads can still be cleared independently
  * However, this may not always be the case. The interface combines and syncs these
@@ -1503,7 +1503,7 @@ user_pref("privacy.clearOnShutdown.history", true); // Browsing & Download Histo
 user_pref("privacy.clearOnShutdown.offlineApps", true); // Offline Website Data
 user_pref("privacy.clearOnShutdown.sessions", true); // Active Logins
 user_pref("privacy.clearOnShutdown.siteSettings", false); // Site Preferences
-/* 2804: reset default history items to clear with Ctrl-Shift-Del (to match 2803)
+/* 2804: reset default items to clear with Ctrl-Shift-Del (to match 2803)
  * This dialog can also be accessed from the menu History>Clear Recent History
  * Firefox remembers your last choices. This will reset them when you start Firefox.
  * [NOTE] Regardless of what you set privacy.cpd.downloads to, as soon as the dialog

From f8428dcc0a330867b8e0ac2695512de9b5d8e7f5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 7 Mar 2019 14:55:03 +0000
Subject: [PATCH 0235/1147] a better test

- more metrics covered/displayed
- test page site is https
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 13e1345..d63b50b 100644
--- a/user.js
+++ b/user.js
@@ -1577,7 +1577,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
       To set a size, open a XUL (chrome) page (such as about:config) which is at 100% zoom, hit
       Shift+F4 to open the scratchpad, type window.resizeTo(1366,768), hit Ctrl+R to run. Test
       your window size, do some math, resize to allow for all the non inner window elements
-      [TEST] http://browserspy.dk/screen.php
+      [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#screen
  ** 1281949 - spoof screen orientation (FF50+)
  ** 1281963 - hide the contents of navigator.plugins and navigator.mimeTypes (FF50+)
       FF53: Fixes GetSupportedNames in nsMimeTypeArray and nsPluginArray (1324044)

From 8b4f45774a4e594501566c7f15cf972058434176 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 13 Mar 2019 14:46:33 +0000
Subject: [PATCH 0236/1147] 4607+RFP clarity, closes #656

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index d63b50b..1194977 100644
--- a/user.js
+++ b/user.js
@@ -1596,7 +1596,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
  ** 1369319 - disable device sensor API (see 4604) (FF56+)
  ** 1369357 - disable site specific zoom (see 4605) (FF56+)
  ** 1337161 - hide gamepads from content (see 4606) (FF56+)
- ** 1372072 - spoof network information API as "unknown" (see 4607) (FF56+)
+ ** 1372072 - spoof network information API as "unknown" when dom.netinfo.enabled = true (see 4607) (FF56+)
  ** 1333641 - reduce fingerprinting in WebSpeech API (see 4608) (FF56+)
  ** 1372069 & 1403813 & 1441295 - block geolocation requests (same as denying a site permission) (see 0201, 0201b) (FF56-62)
  ** 1369309 - spoof media statistics (see 4610) (FF57+)
@@ -1685,7 +1685,7 @@ user_pref("browser.zoom.siteSpecific", false);
    // [1] https://developer.mozilla.org/docs/Web/API/Network_Information_API
    // [2] https://wicg.github.io/netinfo/
    // [3] https://bugzilla.mozilla.org/960426
-user_pref("dom.netinfo.enabled", false);
+user_pref("dom.netinfo.enabled", false); // [DEFAULT: true on Android]
 // 4608: [2021] disable the SpeechSynthesis (Text-to-Speech) part of the Web Speech API
    // [1] https://developer.mozilla.org/docs/Web/API/Web_Speech_API
    // [2] https://developer.mozilla.org/docs/Web/API/SpeechSynthesis

From 68584a3397c9e819ad651b409463813fc388d174 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 13 Mar 2019 15:15:23 +0000
Subject: [PATCH 0237/1147] some 2505+RFP clarity, closes #661

---
 user.js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 1194977..e294747 100644
--- a/user.js
+++ b/user.js
@@ -1608,7 +1608,10 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
       This blocks exposure of local IP Addresses via mDNS (Multicast DNS)
  **  967895 - enable site permission prompt before allowing canvas data extraction (FF58+)
       FF59: Added to site permissions panel (1413780) Only prompt when triggered by user input (1376865)
- ** 1372073 - spoof/block fingerprinting in MediaDevices API (see 4612) (FF59+)
+ ** 1372073 - spoof/block fingerprinting in MediaDevices API (FF59+)
+      Spoof: enumerate devices reports one "Internal Camera" and one "Internal Microphone" if
+             media.navigator.enabled is true (see 2505 which we chose to keep disabled)
+      Block: suppresses the ondevicechange event (see 4612)
  ** 1039069 - warn when language prefs are set to non en-US (see 0207, 0208) (FF59+)
  ** 1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events (FF59+)
       Spoofing mimics the content language of the document. Currently it only supports en-US.

From 97f08ad3cdb7f3de5f0e358703563c815e9d8a7d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 16 Mar 2019 22:34:45 +0000
Subject: [PATCH 0238/1147] 4504: RFP letterboxing, closes #659

---
 user.js | 13 ++++++++++++-
 1 file changed, 12 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index e294747..85b5f7c 100644
--- a/user.js
+++ b/user.js
@@ -1622,9 +1622,11 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
  ** 1363508 - spoof/suppress Pointer Events (see 4614) (FF64+)
       FF65: pointerEvent.pointerid (1492766)
  ** 1485266 - disable exposure of system colors to CSS or canvas (see 2618) (FF67+)
+ ** 1407366 - enable inner window letterboxing (see 4504) (FF67+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]
+ * This pref is the master switch for all other privacy.resist* prefs unless stated
  * [SETUP-WEB] RFP is not ready for the masses, so expect some website breakage
  * [1] https://bugzilla.mozilla.org/418986 ***/
 user_pref("privacy.resistFingerprinting", true);
@@ -1640,7 +1642,16 @@ user_pref("privacy.resistFingerprinting", true);
  * to sanitize or clear extensions.webextensions.restrictedDomains (see 2662) to keep that side-effect
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
 user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDEN PREF]
-/* 4504: disable showing about:blank as soon as possible during startup [FF60+]
+/* 4504: enable RFP letterboxing [FF67+]
+ * Dynamically resizes the inner window in 200w x100h steps by applying letterboxing, using dimensions
+ * which waste the least content area, If you use the dimension pref, then it will only apply those
+ * resolutions. The format is "width1xheight1, width2xheight2, ..." (e.g. "800x600, 1000x1000, 1600x900")
+ * [NOTE] This does NOT require RFP (see 4501) **for now**
+ * [WARNING] The dimension pref is only meant for testing, and we recommend you DO NOT USE it
+ * [1] https://bugzilla.mozilla.org/1407366 ***/
+user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
+   // user_pref("privacy.resistFingerprinting.letterboxing.dimensions", ""); // [HIDDEN PREF]
+/* 4510: disable showing about:blank as soon as possible during startup [FF60+]
  * When default true (FF62+) this no longer masks the RFP resizing activity
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);

From 28a7226235a128f136374732a35b2ee5feb06356 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 16 Mar 2019 22:36:31 +0000
Subject: [PATCH 0239/1147] 4510: clarify this is the chrome

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 85b5f7c..78b33e2 100644
--- a/user.js
+++ b/user.js
@@ -1652,7 +1652,7 @@ user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDE
 user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
    // user_pref("privacy.resistFingerprinting.letterboxing.dimensions", ""); // [HIDDEN PREF]
 /* 4510: disable showing about:blank as soon as possible during startup [FF60+]
- * When default true (FF62+) this no longer masks the RFP resizing activity
+ * When default true (FF62+) this no longer masks the RFP chrome resizing activity
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
 

From a349662f69d9cf4d9eb90352f589a8ea240be24e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 16 Mar 2019 22:44:24 +0000
Subject: [PATCH 0240/1147] 66 deprecated prefs

---
 user.js | 18 +++++++++++-------
 1 file changed, 11 insertions(+), 7 deletions(-)

diff --git a/user.js b/user.js
index 78b33e2..270544e 100644
--- a/user.js
+++ b/user.js
@@ -268,11 +268,6 @@ user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [FF58+
  * [1] https://en.wikipedia.org/wiki/Pocket_(application)
  * [2] https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/ ***/
 user_pref("extensions.pocket.enabled", false);
-/* 0380: disable Browser Error Reporter [FF60+]
- * [1] https://support.mozilla.org/en-US/kb/firefox-nightly-error-collection
- * [2] https://firefox-source-docs.mozilla.org/browser/browser/BrowserErrorReporter.html ***/
-user_pref("browser.chrome.errorReporter.enabled", false);
-user_pref("browser.chrome.errorReporter.submitUrl", "");
 /* 0390: disable Captive Portal detection
  * [1] https://en.wikipedia.org/wiki/Captive_portal
  * [2] https://wiki.mozilla.org/Necko/CaptivePortal
@@ -405,8 +400,6 @@ user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
      [2] https://dxr.mozilla.org/mozilla-central/source/browser/extensions
 ***/
 user_pref("_user.js.parrot", "0500 syntax error: the parrot's cashed in 'is chips!");
-/* 0502: disable Mozilla permission to silently opt you into tests ***/
-user_pref("network.allow-experiments", false);
 /* 0503: disable Normandy/Shield [FF60+]
  * Shield is an telemetry system (including Heartbeat) that can also push and test "recipes"
  * [1] https://wiki.mozilla.org/Firefox/Shield
@@ -2279,6 +2272,17 @@ user_pref("browser.urlbar.autocomplete.enabled", false);
    // [-] https://bugzilla.mozilla.org/1510580
 user_pref("browser.fixup.hide_user_pass", true); // [DEFAULT: true]
 // * * * /
+// FF66
+// 0380: disable Browser Error Reporter [FF60+]
+ // [1] https://support.mozilla.org/en-US/kb/firefox-nightly-error-collection
+ // [2] https://firefox-source-docs.mozilla.org/browser/browser/BrowserErrorReporter.html
+ // [-] https://bugzilla.mozilla.org/1509888
+user_pref("browser.chrome.errorReporter.enabled", false);
+user_pref("browser.chrome.errorReporter.submitUrl", "");
+// 0502: disable Mozilla permission to silently opt you into tests
+   // [-] https://bugzilla.mozilla.org/1415625
+user_pref("network.allow-experiments", false);
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From b1aa1f561926cf6e49c96699307f7329146c42d7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 16 Mar 2019 22:51:58 +0000
Subject: [PATCH 0241/1147] 2030: default change

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 270544e..362f7d1 100644
--- a/user.js
+++ b/user.js
@@ -1079,9 +1079,9 @@ user_pref("dom.imagecapture.enabled", false); // [DEFAULT: false]
  * [1] https://developer.mozilla.org/docs/Web/API/OffscreenCanvas ***/
 user_pref("gfx.offscreencanvas.enabled", false); // [DEFAULT: false]
 /* 2030: disable auto-play of HTML5 media [FF63+]
- * 0=Allowed (default), 1=Blocked, 2=Prompt
+ * 0=Allowed, 1=Blocked, 2=Prompt
  * [SETUP-WEB] This may break video playback on various sites ***/
-user_pref("media.autoplay.default", 1);
+user_pref("media.autoplay.default", 1); // [DEFAULT: 1 in FF66+]
 /* 2031: disable audio auto-play in non-active tabs [FF51+]
  * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
 user_pref("media.block-autoplay-until-in-foreground", true);

From d9e24e5095bb3f93f9298fcd0e1e02e7a7bb2dc4 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 17 Mar 2019 18:07:15 +0000
Subject: [PATCH 0242/1147] Update user.js (#667)

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 362f7d1..31da20a 100644
--- a/user.js
+++ b/user.js
@@ -251,7 +251,7 @@ user_pref("datareporting.policy.dataSubmissionEnabled", false);
  * [NOTE] This pref has no effect when Health Reports (0340) are disabled
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>...>Allow Firefox to install and run studies ***/
 user_pref("app.shield.optoutstudies.enabled", false);
-/* 0343: disable Extension Recommendations in about:addons and AMO [FF65+]
+/* 0343: disable personalized Extension Recommendations in about:addons and AMO [FF65+]
  * [NOTE] This pref has no effect when Health Reports (0340) are disabled
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>...>Allow Firefox to make personalized extension rec.
  * [1] https://support.mozilla.org/kb/personalized-extension-recommendations ***/
@@ -2274,9 +2274,9 @@ user_pref("browser.fixup.hide_user_pass", true); // [DEFAULT: true]
 // * * * /
 // FF66
 // 0380: disable Browser Error Reporter [FF60+]
- // [1] https://support.mozilla.org/en-US/kb/firefox-nightly-error-collection
- // [2] https://firefox-source-docs.mozilla.org/browser/browser/BrowserErrorReporter.html
- // [-] https://bugzilla.mozilla.org/1509888
+   // [1] https://support.mozilla.org/en-US/kb/firefox-nightly-error-collection
+   // [2] https://firefox-source-docs.mozilla.org/browser/browser/BrowserErrorReporter.html
+   // [-] https://bugzilla.mozilla.org/1509888
 user_pref("browser.chrome.errorReporter.enabled", false);
 user_pref("browser.chrome.errorReporter.submitUrl", "");
 // 0502: disable Mozilla permission to silently opt you into tests

From 462db2062c15331e16fee71d8a736d52839c5615 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 17 Mar 2019 22:43:27 +0000
Subject: [PATCH 0243/1147] 2030: remove setup tag

If Firefox see fit to set this as 1 by now, then breakage is probably rare, and I'm not encouraging users to reduce security/privacy etc from default
---
 user.js | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 31da20a..4b2500c 100644
--- a/user.js
+++ b/user.js
@@ -1079,8 +1079,7 @@ user_pref("dom.imagecapture.enabled", false); // [DEFAULT: false]
  * [1] https://developer.mozilla.org/docs/Web/API/OffscreenCanvas ***/
 user_pref("gfx.offscreencanvas.enabled", false); // [DEFAULT: false]
 /* 2030: disable auto-play of HTML5 media [FF63+]
- * 0=Allowed, 1=Blocked, 2=Prompt
- * [SETUP-WEB] This may break video playback on various sites ***/
+ * 0=Allowed, 1=Blocked, 2=Prompt ***/
 user_pref("media.autoplay.default", 1); // [DEFAULT: 1 in FF66+]
 /* 2031: disable audio auto-play in non-active tabs [FF51+]
  * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/

From 0354895a2e634f04990578026bc6a25d2be2922d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 19 Mar 2019 09:00:39 +0000
Subject: [PATCH 0244/1147] 2030: add [setting] for autoplay

---
 user.js | 9 +++++----
 1 file changed, 5 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 4b2500c..db687d4 100644
--- a/user.js
+++ b/user.js
@@ -1078,10 +1078,11 @@ user_pref("dom.imagecapture.enabled", false); // [DEFAULT: false]
 /* 2028: disable offscreen canvas [FF44+]
  * [1] https://developer.mozilla.org/docs/Web/API/OffscreenCanvas ***/
 user_pref("gfx.offscreencanvas.enabled", false); // [DEFAULT: false]
-/* 2030: disable auto-play of HTML5 media [FF63+]
- * 0=Allowed, 1=Blocked, 2=Prompt ***/
+/* 2030: disable autoplay of HTML5 media [FF63+]
+ * 0=Allowed, 1=Blocked, 2=Prompt
+ * [SETTING] Privacy & Security>Permissions>Block websites from automatically playing sound ***/
 user_pref("media.autoplay.default", 1); // [DEFAULT: 1 in FF66+]
-/* 2031: disable audio auto-play in non-active tabs [FF51+]
+/* 2031: disable audio autoplay in non-active tabs [FF51+]
  * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
 user_pref("media.block-autoplay-until-in-foreground", true);
 
@@ -2228,7 +2229,7 @@ user_pref("shield.savant.enabled", false);
 // 1031: disable favicons in tabs and new bookmarks - merged into browser.chrome.site_icons
    // [-] https://bugzilla.mozilla.org/1453751
    // user_pref("browser.chrome.favicons", false);
-// 2030: disable auto-play of HTML5 media - replaced by media.autoplay.default
+// 2030: disable autoplay of HTML5 media - replaced by media.autoplay.default
    // [SETUP-WEB] This may break video playback on various sites
    // [-] https://bugzilla.mozilla.org/1470082
 user_pref("media.autoplay.enabled", false);

From 3c4b312cc7f765e05440e6f5f8a9840599d23567 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 19 Mar 2019 19:58:15 +0000
Subject: [PATCH 0245/1147] 2030: default didn't change

not putting the setup-web tag back in, as users now have site exceptions
---
 user.js | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index db687d4..ae80a93 100644
--- a/user.js
+++ b/user.js
@@ -1079,9 +1079,10 @@ user_pref("dom.imagecapture.enabled", false); // [DEFAULT: false]
  * [1] https://developer.mozilla.org/docs/Web/API/OffscreenCanvas ***/
 user_pref("gfx.offscreencanvas.enabled", false); // [DEFAULT: false]
 /* 2030: disable autoplay of HTML5 media [FF63+]
- * 0=Allowed, 1=Blocked, 2=Prompt
+ * 0=Allowed (default), 1=Blocked, 2=Prompt
+ * [NOTE] You can set exceptions under site permissions
  * [SETTING] Privacy & Security>Permissions>Block websites from automatically playing sound ***/
-user_pref("media.autoplay.default", 1); // [DEFAULT: 1 in FF66+]
+user_pref("media.autoplay.default", 1);
 /* 2031: disable audio autoplay in non-active tabs [FF51+]
  * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
 user_pref("media.block-autoplay-until-in-foreground", true);

From 2fcec590b41d21943a7dee8a57c0f575999715d9 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 26 Mar 2019 19:05:55 +0000
Subject: [PATCH 0246/1147] Update user.js (#676)

- to avoid confusion with the setting tag, split the prefs into separate numbers, thus shove 2031->2031, reuse 2031
- remove the default value notation as Mozilla will roll out default change gradually to users
---
 user.js | 7 +++++--
 1 file changed, 5 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index ae80a93..8999bbf 100644
--- a/user.js
+++ b/user.js
@@ -117,6 +117,7 @@ user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
 user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
 user_pref("browser.newtabpage.activity-stream.showSponsored", false);
+user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false); // [FF66+]
 /* 0105d: disable Activity Stream recent Highlights in the Library [FF57+] ***/
    // user_pref("browser.library.activity-stream.enabled", false);
 /* 0110: start Firefox in PB (Private Browsing) mode
@@ -1079,11 +1080,13 @@ user_pref("dom.imagecapture.enabled", false); // [DEFAULT: false]
  * [1] https://developer.mozilla.org/docs/Web/API/OffscreenCanvas ***/
 user_pref("gfx.offscreencanvas.enabled", false); // [DEFAULT: false]
 /* 2030: disable autoplay of HTML5 media [FF63+]
- * 0=Allowed (default), 1=Blocked, 2=Prompt
+ * 0=Allowed, 1=Blocked, 2=Prompt
  * [NOTE] You can set exceptions under site permissions
  * [SETTING] Privacy & Security>Permissions>Block websites from automatically playing sound ***/
 user_pref("media.autoplay.default", 1);
-/* 2031: disable audio autoplay in non-active tabs [FF51+]
+/* 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] ***/
+user_pref("media.autoplay.enabled.user-gestures-needed", false);
+/* 2032: disable audio autoplay in non-active tabs [FF51+]
  * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
 user_pref("media.block-autoplay-until-in-foreground", true);
 

From bee47f33cd28e091549d71686bd938f4ffee86cb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 27 Mar 2019 04:35:42 +0000
Subject: [PATCH 0247/1147] 66-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 8999bbf..eace704 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 26 February 2019
-* version 66-alpha: The Power of Pants
+* date: 27 March 2019
+* version 66-beta: The Power of Pants
 *   "The power of pants is a curious thing. Make a one man weep, make another man sing"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 26a70f3cd7c5b7c52869e41affb403236c919e8f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 3 Apr 2019 10:43:44 +0000
Subject: [PATCH 0248/1147] 2618: setup-chrome tag, closes #682

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index eace704..97fd287 100644
--- a/user.js
+++ b/user.js
@@ -1321,6 +1321,7 @@ user_pref("permissions.manager.defaultsUrl", "");
 user_pref("webchannel.allowObject.urlWhitelist", "");
 /* 2618: disable exposure of system colors to CSS or canvas [FF44+]
  * [NOTE] See second listed bug: may cause black on black for elements with undefined colors
+ * [SETUP-CHROME] May affect themes
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876 ***/
 user_pref("ui.use_standins_for_native_colors", true); // [HIDDEN PREF]
 /* 2619: enforce Punycode for Internationalized Domain Names to eliminate possible spoofing

From 79e316a26fee55197c8a6bbbc123434d073c402c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 3 Apr 2019 10:50:59 +0000
Subject: [PATCH 0249/1147] 2618: better info, #682

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 97fd287..85b591b 100644
--- a/user.js
+++ b/user.js
@@ -1321,7 +1321,7 @@ user_pref("permissions.manager.defaultsUrl", "");
 user_pref("webchannel.allowObject.urlWhitelist", "");
 /* 2618: disable exposure of system colors to CSS or canvas [FF44+]
  * [NOTE] See second listed bug: may cause black on black for elements with undefined colors
- * [SETUP-CHROME] May affect themes
+ * [SETUP-CHROME] Might affect CSS in themes and extensions
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876 ***/
 user_pref("ui.use_standins_for_native_colors", true); // [HIDDEN PREF]
 /* 2619: enforce Punycode for Internationalized Domain Names to eliminate possible spoofing

From 8419b4d71b9028de325078b452b47b09503217a5 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 8 Apr 2019 13:44:11 +0000
Subject: [PATCH 0250/1147] autoplay option "Prompt" was removed in FF66 (#686)

* autoplay option "Prompt" was removed in FF66
source: https://hg.mozilla.org/integration/autoland/rev/2e48b6769911
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 85b591b..b2df600 100644
--- a/user.js
+++ b/user.js
@@ -1080,7 +1080,7 @@ user_pref("dom.imagecapture.enabled", false); // [DEFAULT: false]
  * [1] https://developer.mozilla.org/docs/Web/API/OffscreenCanvas ***/
 user_pref("gfx.offscreencanvas.enabled", false); // [DEFAULT: false]
 /* 2030: disable autoplay of HTML5 media [FF63+]
- * 0=Allowed, 1=Blocked, 2=Prompt
+ * 0=Allowed, 1=Blocked (2=Prompt - removed in FF66)
  * [NOTE] You can set exceptions under site permissions
  * [SETTING] Privacy & Security>Permissions>Block websites from automatically playing sound ***/
 user_pref("media.autoplay.default", 1);

From 99586c4a3b57ab44e78029846480d55fb3d295f2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 8 Apr 2019 14:24:41 +0000
Subject: [PATCH 0251/1147] enabled scopes breakage info, closes #674

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index b2df600..c9ba1f9 100644
--- a/user.js
+++ b/user.js
@@ -1368,7 +1368,8 @@ user_pref("browser.download.forbid_open_with", true);
 
 /** EXTENSIONS ***/
 /* 2660: lock down allowed extension directories
- * [SETUP-CHROME] This will break extensions that do not use the default XPI directories
+ * [SETUP-CHROME] This will break extensions, language packs, themes and any other XPI files which are
+ * installed outside of profile directories (see GitHub issue #674 for an issue with language packs in Linux)
  * [1] https://mike.kaply.com/2012/02/21/understanding-add-on-scopes/
  * [1] archived: https://archive.is/DYjAM ***/
 user_pref("extensions.enabledScopes", 1); // [HIDDEN PREF]

From 585415b5344198d67181f90f2e6693aab8284848 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 11 Apr 2019 02:02:26 +0000
Subject: [PATCH 0252/1147] RFP: prefers-color-scheme 67+

---
 user.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/user.js b/user.js
index c9ba1f9..9a30198 100644
--- a/user.js
+++ b/user.js
@@ -1622,6 +1622,8 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
       FF65: pointerEvent.pointerid (1492766)
  ** 1485266 - disable exposure of system colors to CSS or canvas (see 2618) (FF67+)
  ** 1407366 - enable inner window letterboxing (see 4504) (FF67+)
+ ** 1540726 - enforce "light" with prefers-color-scheme (FF67+)
+        [1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]

From 54f86f4be60484443dbf79650b5a6d75198b070b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 15 Apr 2019 12:55:15 +0000
Subject: [PATCH 0253/1147] Update user.js

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 9a30198..9659093 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 27 March 2019
-* version 66-beta: The Power of Pants
+* date: 15 April 2019
+* version 66: The Power of Pants
 *   "The power of pants is a curious thing. Make a one man weep, make another man sing"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 92082621d62ac90c1e2625e0a300b19aa0ec42a2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 15 Apr 2019 14:15:54 +0000
Subject: [PATCH 0254/1147] start 67 commits

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 9659093..c52d6c9 100644
--- a/user.js
+++ b/user.js
@@ -1,8 +1,8 @@
 /******
 * name: ghacks user.js
 * date: 15 April 2019
-* version 66: The Power of Pants
-*   "The power of pants is a curious thing. Make a one man weep, make another man sing"
+* version 67-alpha: Barbie Pants
+*   "I'm a Barbie pants in a Barbie world. Life in plastic, it's fantastic"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From e3349d0f076de90b70dfe75c78cfe697a71d12e6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 15 Apr 2019 14:17:52 +0000
Subject: [PATCH 0255/1147] 2212 defaults [67+ change]

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index c52d6c9..b922921 100644
--- a/user.js
+++ b/user.js
@@ -1123,7 +1123,7 @@ user_pref("dom.disable_open_during_load", true);
 /* 2211: set max popups from a single non-click event - default is 20! ***/
 user_pref("dom.popup_maximum", 3);
 /* 2212: limit events that can cause a popup
- * default is "change click dblclick mouseup pointerup notificationclick reset submit touchend"
+ * default is "change click dblclick mouseup pointerup notificationclick reset submit touchend contextmenu"
  * [1] http://kb.mozillazine.org/Dom.popup_allowed_events ***/
 user_pref("dom.popup_allowed_events", "click dblclick");
 

From 8c12f4bb14048fd67e2cb35b2ddc34c21b68c28e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 15 Apr 2019 14:46:39 +0000
Subject: [PATCH 0256/1147] 1840 no longer hidden 67+

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index b922921..bb86424 100644
--- a/user.js
+++ b/user.js
@@ -1035,7 +1035,7 @@ user_pref("media.gmp-widevinecdm.autoupdate", false);
 user_pref("media.eme.enabled", false);
 /* 1840: disable the OpenH264 Video Codec by Cisco to "Never Activate" [SETUP-WEB]
  * This is the bundled codec used for video chat in WebRTC ***/
-user_pref("media.gmp-gmpopenh264.enabled", false); // [HIDDEN PREF]
+user_pref("media.gmp-gmpopenh264.enabled", false);
 user_pref("media.gmp-gmpopenh264.autoupdate", false);
 
 /*** [SECTION 2000]: MEDIA / CAMERA / MIC ***/

From 411805b05cd94b7da77e77c4f797aed4e60f6158 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 15 Apr 2019 14:49:22 +0000
Subject: [PATCH 0257/1147] 2618 no longer hidden 67+

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index bb86424..5d3a2de 100644
--- a/user.js
+++ b/user.js
@@ -1323,7 +1323,7 @@ user_pref("webchannel.allowObject.urlWhitelist", "");
  * [NOTE] See second listed bug: may cause black on black for elements with undefined colors
  * [SETUP-CHROME] Might affect CSS in themes and extensions
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876 ***/
-user_pref("ui.use_standins_for_native_colors", true); // [HIDDEN PREF]
+user_pref("ui.use_standins_for_native_colors", true);
 /* 2619: enforce Punycode for Internationalized Domain Names to eliminate possible spoofing
  * Firefox has *some* protections, but it is better to be safe than sorry. The downside: it will also
  * display legitimate IDN's punycoded, which might be undesirable for users of non-latin alphabets

From 6231d6ebed6302739d816945abf494b519709e4f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 15 Apr 2019 14:54:55 +0000
Subject: [PATCH 0258/1147] 5000s add new about:config warning pref

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 5d3a2de..8a78ef9 100644
--- a/user.js
+++ b/user.js
@@ -1781,6 +1781,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("full-screen-api.warning.delay", 0);
    // user_pref("full-screen-api.warning.timeout", 0);
    // user_pref("general.warnOnAboutConfig", false);
+   // user_pref("browser.aboutConfig.showWarning", false); // [FF67+]
 /* APPEARANCE ***/
    // user_pref("browser.download.autohideButton", false); // [FF57+]
    // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]

From c2034617f0dcef095dc4eda7741b10c8e0dce380 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 15 Apr 2019 14:59:23 +0000
Subject: [PATCH 0259/1147] 2429 default true 67+

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 8a78ef9..e628bb9 100644
--- a/user.js
+++ b/user.js
@@ -1226,7 +1226,7 @@ user_pref("javascript.options.shared_memory", false);
 user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
 /* 2429: enable (limited but sufficient) window.opener protection [FF65+]
  * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
-user_pref("dom.targetBlankNoOpener.enabled", true);
+user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true]
 
 /*** [SECTION 2500]: HARDWARE FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");

From 6ed3581cb0306cff2485622c08b64793be648d15 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 15 Apr 2019 16:31:17 +0000
Subject: [PATCH 0260/1147] 5000s: CRF 67+

---
 user.js | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/user.js b/user.js
index e628bb9..22a5657 100644
--- a/user.js
+++ b/user.js
@@ -1801,6 +1801,10 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false); // disable CFR [FF64+]
       // [SETTING] General>Browsing>Recommend extensions as you browse
       // [1] https://support.mozilla.org/en-US/kb/extension-recommendations
+   // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+]
+      // [SETTING] General>Browsing>Recommend extensions as you browse
+   // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
+      // [SETTING] General>Browsing>Recommend features as you browse
    // user_pref("identity.fxaccounts.enabled", false); // disable and hide Firefox Accounts and Sync [FF60+] [RESTART]
    // user_pref("network.manage-offline-status", false); // see bugzilla 620472
    // user_pref("reader.parse-on-load.enabled", false); // "Reader View"

From fd10c35049d0f3722f62064a582c618ee699fb45 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 17 Apr 2019 03:31:27 +0000
Subject: [PATCH 0261/1147] 0606 some default info

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 22a5657..8f6e967 100644
--- a/user.js
+++ b/user.js
@@ -453,7 +453,7 @@ user_pref("network.http.speculative-parallel-limit", 0);
 /* 0606: disable pings (but enforce same host in case)
  * [1] http://kb.mozillazine.org/Browser.send_pings
  * [2] http://kb.mozillazine.org/Browser.send_pings.require_same_host ***/
-user_pref("browser.send_pings", false);
+user_pref("browser.send_pings", false); // [DEFAULT: false]
 user_pref("browser.send_pings.require_same_host", true);
 /* 0608: disable predictor / prefetching [FF48+] ***/
 user_pref("network.predictor.enable-prefetch", false);

From ca0f2a5a88bc659b4cbe38d9bbd045187961b765 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 19 Apr 2019 01:39:07 +0000
Subject: [PATCH 0262/1147] 0302b-> inactive: ext auto-updates closes #690

---
 user.js | 14 +++++++++-----
 1 file changed, 9 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 8f6e967..c9e1f75 100644
--- a/user.js
+++ b/user.js
@@ -175,10 +175,14 @@ user_pref("geo.provider.use_corelocation", false); // [MAC]
 user_pref("geo.provider.use_gpsd", false); // [LINUX]
 
 /*** [SECTION 0300]: QUIET FOX
-     We choose to not disable auto-CHECKs (0301's) but to disable auto-INSTALLs (0302's).
-     There are many legitimate reasons to turn off auto-INSTALLS, including hijacked or
-     monetized extensions, time constraints, legacy issues, and fear of breakage/bugs.
-     It is still important to do updates for security reasons, please do so manually. ***/
+     Starting in user.js v67, we only disable the auto-INSTALL of Firefox. You still get prompts
+     to update, in one click. We have NEVER disabled auto-CHECKING, and highly discourage that.
+     Previously we also disabled auto-INSTALLING of extensions (302b).
+
+     There are many legitimate reasons to turn off auto-INSTALLS, including hijacked or monetized
+     extensions, time constraints, legacy issues, dev/testing, and fear of breakage/bugs. It is
+     still important to do updates for security reasons, please do so manually if you make changes.
+***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
 /* 0301b: disable auto-CHECKING for extension and theme updates ***/
    // user_pref("extensions.update.enabled", false);
@@ -188,7 +192,7 @@ user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the
 user_pref("app.update.auto", false);
 /* 0302b: disable auto-INSTALLING extension and theme updates (after the check in 0301b)
  * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
-user_pref("extensions.update.autoUpdateDefault", false);
+   // user_pref("extensions.update.autoUpdateDefault", false);
 /* 0303: disable background update service [WINDOWS]
  * [SETTING] General>Firefox Updates>Use a background service to install updates ***/
 user_pref("app.update.service.enabled", false);

From d491cf1e890887e5bab90241b5713fef0301d399 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 19 Apr 2019 02:11:21 +0000
Subject: [PATCH 0263/1147] readme changes

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index c9e1f75..2255586 100644
--- a/user.js
+++ b/user.js
@@ -20,7 +20,7 @@
   2. READ this
      * https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.3-Implementation
   3. If you skipped steps 1 and 2 above (shame on you), then here is the absolute minimum
-     * Auto-installing updates for Firefox and extensions are disabled (section 0302's)
+     * You will still get prompts to update Firefox, but auto-installing them is disabled (0302a)
      * Some user data is erased on close (section 2800). Change this to suit your needs
      * EACH RELEASE check:
          - 4600s: reset prefs made redundant due to privacy.resistFingerprinting (RPF)

From 408d1d0e269d68d26f19d055c80e5c7cbc4c1a13 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 19 Apr 2019 05:54:57 +0000
Subject: [PATCH 0264/1147] FPI 68+ change

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 2255586..efa75e4 100644
--- a/user.js
+++ b/user.js
@@ -1548,6 +1548,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1300671 - isolate data:, about: URLs (FF55+)
  ** 1473247 - isolate IP addresses (FF63+)
  ** 1492607 - isolate postMessage with targetOrigin "*" (requires 4002) (FF65+)
+ ** 1542309 - isolate top-level domain URLs (FF68+)
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]

From f62f781645b514b790675abd28611a430a5d284e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 11:41:34 +0000
Subject: [PATCH 0265/1147] HTTP2 -> inactive

---
 user.js | 22 +++++++++++-----------
 1 file changed, 11 insertions(+), 11 deletions(-)

diff --git a/user.js b/user.js
index efa75e4..7be1519 100644
--- a/user.js
+++ b/user.js
@@ -473,20 +473,20 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
  * [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/437#issuecomment-403740626
  * [2] https://www.internetsociety.org/tag/ipv6-security/ (see Myths 2,4,5,6) ***/
 user_pref("network.dns.disableIPv6", true);
-/* 0702: disable HTTP2 (which was based on SPDY which is now deprecated)
- * HTTP2 raises concerns with "multiplexing" and "server push", does nothing to enhance
- * privacy, and in fact opens up a number of server-side fingerprinting opportunities
- * [SETUP-PERF] Relax this if you have FPI enabled (see 4000) *AND* you understand the
- * consequences. FPI isolates these, but it was designed with the Tor protocol in mind,
- * and the Tor Browser has extra protection, including enhanced sanitizing per Identity.
+/* 0702: disable HTTP2
+ * HTTP2 raises some concerns with "multiplexing" and "server push", does nothing to
+ * enhance privacy, and may open up a number of server-side fingerprinting opportunities.
+ * [WARNING] Disabling this made sense in the past, and doesn't break anything, but HTTP2 is
+ * now at 35% and growing, see [5] - don't be that one person using HTTP1.1 on HTTP2 sites
  * [1] https://http2.github.io/faq/
  * [2] https://blog.scottlogic.com/2014/11/07/http-2-a-quick-look.html
  * [3] https://queue.acm.org/detail.cfm?id=2716278
- * [4] https://github.com/ghacksuserjs/ghacks-user.js/issues/107 ***/
-user_pref("network.http.spdy.enabled", false);
-user_pref("network.http.spdy.enabled.deps", false);
-user_pref("network.http.spdy.enabled.http2", false);
-user_pref("network.http.spdy.websockets", false); // [FF65+]
+ * [4] https://github.com/ghacksuserjs/ghacks-user.js/issues/107
+ * [5] https://w3techs.com/technologies/details/ce-http2/all/all ***/
+   // user_pref("network.http.spdy.enabled", false);
+   // user_pref("network.http.spdy.enabled.deps", false);
+   // user_pref("network.http.spdy.enabled.http2", false);
+   // user_pref("network.http.spdy.websockets", false); // [FF65+]
 /* 0703: disable HTTP Alternative Services [FF37+]
  * [SETUP-PERF] Relax this if you have FPI enabled (see 4000) *AND* you understand the
  * consequences. FPI isolates these, but it was designed with the Tor protocol in mind,

From d41372a7f00edefe16b7aa28c5f5abd2e2951328 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 11:50:01 +0000
Subject: [PATCH 0266/1147] 2421 should be a warning

it's not setup tag, because any change (it is inactive) does not help performance, in fact the opposite
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 7be1519..93dc7fb 100644
--- a/user.js
+++ b/user.js
@@ -1206,7 +1206,7 @@ user_pref("dom.vibrator.enabled", false);
  * [6] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
 user_pref("javascript.options.asmjs", false);
 /* 2421: disable Ion and baseline JIT to help harden JS against exploits
- * [SETUP-PERF] If false, causes the odd site issue and there is also a performance loss
+ * [WARNING] If false, causes the odd site issue and there is also a performance loss
  * [1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817 ***/
    // user_pref("javascript.options.ion", false);
    // user_pref("javascript.options.baselinejit", false);

From 59d056de27283273739fe22ca6e4bb67ae0a442c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 12:00:46 +0000
Subject: [PATCH 0267/1147] document fonts -> inactive

---
 user.js | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 93dc7fb..5492236 100644
--- a/user.js
+++ b/user.js
@@ -887,11 +887,10 @@ user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 /*** [SECTION 1400]: FONTS ***/
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 /* 1401: disable websites choosing fonts (0=block, 1=allow)
- * If you disallow fonts, this drastically limits/reduces font
- * enumeration (by JS) which is a high entropy fingerprinting vector.
- * [NOTE] Disabling fonts can uglify the web a fair bit.
+ * [WARNING] Blocking fonts can *sometimes* reduce JS font enumeration, but not entropy.
+ * There are also other methods to fingerprint fonts. Wait for RFP (4500) to cover this.
  * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Allow pages to choose... ***/
-user_pref("browser.display.use_document_fonts", 0);
+   // user_pref("browser.display.use_document_fonts", 0);
 /* 1402: set more legible default fonts
  * [NOTE] Example below for Windows/Western only
  * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Serif|Sans-serif|Monospace ***/

From e56665ecd155e9e019c9ee2c1cabadf2bf360791 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 12:05:21 +0000
Subject: [PATCH 0268/1147] HWA -> inactive

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 5492236..c9ad677 100644
--- a/user.js
+++ b/user.js
@@ -1249,13 +1249,13 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * [1] https://wiki.mozilla.org/Media/getUserMedia
  * [2] https://developer.mozilla.org/docs/Web/API/MediaDevices/enumerateDevices ***/
 user_pref("media.navigator.enabled", false);
-/* 2508: disable hardware acceleration to reduce graphics fingerprinting
- * [SETUP-PERF] Affects text rendering (fonts will look different), impacts video performance,
+/* 2508: disable hardware acceleration to reduce graphics fingerprinting [SETUP-HARDEN]
+ * [WARNING] Affects text rendering (fonts will look different), impacts video performance,
  * and parts of Quantum that utilize the GPU will also be affected as they are rolled out
  * [SETTING] General>Performance>Custom>Use hardware acceleration when available
  * [1] https://wiki.mozilla.org/Platform/GFX/HardwareAcceleration ***/
    // user_pref("gfx.direct2d.disabled", true); // [WINDOWS]
-user_pref("layers.acceleration.disabled", true);
+   // user_pref("layers.acceleration.disabled", true);
 /* 2510: disable Web Audio API [FF51+]
  * [1] https://bugzilla.mozilla.org/1288359 ***/
 user_pref("dom.webaudio.enabled", false);

From 373602f0f072f1e9fdfd51924c14109fc4e60e4a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 12:12:30 +0000
Subject: [PATCH 0269/1147] mathml -> inactive

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index c9ad677..b773e96 100644
--- a/user.js
+++ b/user.js
@@ -1296,10 +1296,10 @@ user_pref("devtools.chrome.enabled", false);
 user_pref("devtools.debugger.remote-enabled", false);
 user_pref("devtools.webide.enabled", false);
 user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
-/* 2609: disable MathML (Mathematical Markup Language) [FF51+]
+/* 2609: disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
  * [TEST] http://browserspy.dk/mathml.php
  * [1] https://bugzilla.mozilla.org/1173199 ***/
-user_pref("mathml.disabled", true);
+   // user_pref("mathml.disabled", true);
 /* 2610: disable in-content SVG (Scalable Vector Graphics) [FF53+]
  * [SETUP-WEB] Expect breakage incl. youtube player controls. Best left for a "hardened" profile.
  * [1] https://bugzilla.mozilla.org/1216893 ***/

From bb7f8df6470d171e9409d3b4aaf7a2484ba2d5b9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 12:16:33 +0000
Subject: [PATCH 0270/1147] 2650 -> inactive

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index b773e96..a02a36b 100644
--- a/user.js
+++ b/user.js
@@ -1354,7 +1354,7 @@ user_pref("network.protocol-handler.external.ms-windows-store", false);
 /** DOWNLOADS ***/
 /* 2650: discourage downloading to desktop (0=desktop 1=downloads 2=last used)
  * [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
-user_pref("browser.download.folderList", 2);
+   // user_pref("browser.download.folderList", 2);
 /* 2651: enforce user interaction for security by always asking the user where to download
  * [SETTING] General>Downloads>Always ask you where to save files ***/
 user_pref("browser.download.useDownloadDir", false);

From 2d62b9f729c34a2c586ec2e0af2d5f203d4a1116 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 12:23:39 +0000
Subject: [PATCH 0271/1147] 2654 (open with) -> inactive

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index a02a36b..c77639e 100644
--- a/user.js
+++ b/user.js
@@ -1362,12 +1362,12 @@ user_pref("browser.download.useDownloadDir", false);
 user_pref("browser.download.manager.addToRecentDocs", false);
 /* 2653: disable hiding mime types (Options>General>Applications) not associated with a plugin ***/
 user_pref("browser.download.hide_plugins_without_extensions", false);
-/* 2654: disable "open with" in download dialog [FF50+]
+/* 2654: disable "open with" in download dialog [FF50+] [SETUP-HARDEN]
  * This is very useful to enable when the browser is sandboxed (e.g. via AppArmor)
  * in such a way that it is forbidden to run external applications.
- * [SETUP-CHROME] This may interfere with some users' workflow or methods
+ * [WARNING] This may interfere with some users' workflow or methods
  * [1] https://bugzilla.mozilla.org/1281959 ***/
-user_pref("browser.download.forbid_open_with", true);
+   // user_pref("browser.download.forbid_open_with", true);
 
 /** EXTENSIONS ***/
 /* 2660: lock down allowed extension directories

From 8a98cd18902ffa4bfcbe523e20c832d79aa5e6a6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 13:12:47 +0000
Subject: [PATCH 0272/1147] tidying up

---
 user.js | 13 +++++++------
 1 file changed, 7 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index c77639e..9ed45b3 100644
--- a/user.js
+++ b/user.js
@@ -530,7 +530,7 @@ user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
  * [4] https://en.wikipedia.org/wiki/GIO_(software) ***/
 user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
 
-/*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS [SETUP-CHROME]
+/*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
      Change items 0850 and above to suit for privacy vs convenience and functionality. Consider
      your environment (no unwanted eyeballs), your device (restricted access), your device's
      unattended state (locked, encrypted, forensic hardened). Likewise, you may want to check
@@ -582,7 +582,7 @@ user_pref("browser.urlbar.usepreloadedtopurls.enabled", false);
  * [1] https://bugzilla.mozilla.org/1348275 ***/
 user_pref("browser.urlbar.speculativeConnect.enabled", false);
 /* 0850a: disable location bar suggestion types
- * [SETUP-CHROME] If all three suggestion types are false, search engine keywords are disabled
+ * If all three suggestion types are false, search engine keywords are disabled
  * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest ***/
    // user_pref("browser.urlbar.suggest.history", false);
    // user_pref("browser.urlbar.suggest.bookmark", false);
@@ -1352,7 +1352,8 @@ user_pref("pdfjs.disabled", false);
 user_pref("network.protocol-handler.external.ms-windows-store", false);
 
 /** DOWNLOADS ***/
-/* 2650: discourage downloading to desktop (0=desktop 1=downloads 2=last used)
+/* 2650: discourage downloading to desktop
+ * 0=desktop 1=downloads 2=last used
  * [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
    // user_pref("browser.download.folderList", 2);
 /* 2651: enforce user interaction for security by always asking the user where to download
@@ -1480,7 +1481,7 @@ user_pref("dom.caches.enabled", false);
  * [1] https://developer.mozilla.org/en-US/docs/Web/API/Storage_Access_API ***/
    // user_pref("dom.storage_access.enabled", false);
 
-/*** [SECTION 2800]: SHUTDOWN [SETUP-CHROME]
+/*** [SECTION 2800]: SHUTDOWN
      You should set the values to what suits you best.
      - "Offline Website Data" includes appCache (2730), localStorage (2710),
        Service Worker cache (2740), and QuotaManager (IndexedDB (2720), asm-cache)
@@ -1491,7 +1492,7 @@ user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!"
 /* 2802: enable Firefox to clear items on shutdown (see 2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
-/* 2803: set what items to clear on shutdown (if 2802 is true)
+/* 2803: set what items to clear on shutdown (if 2802 is true) [SETUP-CHROME]
  * [NOTE] If 'history' is true, downloads will also be cleared regardless of the value
  * but if 'history' is false, downloads can still be cleared independently
  * However, this may not always be the case. The interface combines and syncs these
@@ -1505,7 +1506,7 @@ user_pref("privacy.clearOnShutdown.history", true); // Browsing & Download Histo
 user_pref("privacy.clearOnShutdown.offlineApps", true); // Offline Website Data
 user_pref("privacy.clearOnShutdown.sessions", true); // Active Logins
 user_pref("privacy.clearOnShutdown.siteSettings", false); // Site Preferences
-/* 2804: reset default items to clear with Ctrl-Shift-Del (to match 2803)
+/* 2804: reset default items to clear with Ctrl-Shift-Del (to match 2803) [SETUP-CHROME]
  * This dialog can also be accessed from the menu History>Clear Recent History
  * Firefox remembers your last choices. This will reset them when you start Firefox.
  * [NOTE] Regardless of what you set privacy.cpd.downloads to, as soon as the dialog

From 9fbe3080c54ac4e5c1894ba7a8507f72b45dad40 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 13:28:07 +0000
Subject: [PATCH 0273/1147] 2651: add setup-chrome tag

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 9ed45b3..8d270b9 100644
--- a/user.js
+++ b/user.js
@@ -1356,7 +1356,7 @@ user_pref("network.protocol-handler.external.ms-windows-store", false);
  * 0=desktop 1=downloads 2=last used
  * [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
    // user_pref("browser.download.folderList", 2);
-/* 2651: enforce user interaction for security by always asking the user where to download
+/* 2651: enforce user interaction for security by always asking where to download [SETUP-CHROME]
  * [SETTING] General>Downloads>Always ask you where to save files ***/
 user_pref("browser.download.useDownloadDir", false);
 /* 2652: disable adding downloads to the system's "recent documents" list ***/

From 50d31a7aa257532c58786637af2b5214a449e538 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 13:31:15 +0000
Subject: [PATCH 0274/1147] 2701 cookies add setup-web tag

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 8d270b9..37fcd8e 100644
--- a/user.js
+++ b/user.js
@@ -1417,7 +1417,7 @@ user_pref("security.dialog_enable_delay", 700);
      accessible to websites except shared/service workers where the cookie setting *must* be "Allow"
 ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
-/* 2701: disable 3rd-party cookies and site-data
+/* 2701: disable 3rd-party cookies and site-data [SETUP-WEB]
  * 0=Accept cookies and site data (default), 1=(Block) All third-party cookies, 2=(Block) All cookies,
  * 3=(Block) Cookies from unvisited sites, 4=(Block) Third-party trackers (FF63+)
  * [NOTE] Value 4 is tied to the Tracking Protection lists

From c2775a3441e475b53c5056b2d88db0427e5cd4f5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 14:15:58 +0000
Subject: [PATCH 0275/1147] 0860 form history info, closes #691

---
 user.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 37fcd8e..5bd3c79 100644
--- a/user.js
+++ b/user.js
@@ -602,8 +602,10 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
  * [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/ ***/
    // user_pref("browser.urlbar.oneOffSearches", false);
 /* 0860: disable search and form history
+ * Autocomplete form data is still (in April 2019) easily read by third parties, see [1]
  * [NOTE] You can clear formdata on exiting Firefox (see 2803)
- * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history ***/
+ * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
+ * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html ***/
 user_pref("browser.formfill.enable", false);
 /* 0862: disable browsing and download history
  * [NOTE] You can clear history and downloads on exiting Firefox (see 2803)

From 4989928c1ea57c5f763d6b78fd3ee494ff99bc8b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 14:34:07 +0000
Subject: [PATCH 0276/1147] 2026: remove (canvas.capture*)

Disabled back when first added as a stop gap measure, never checked on since. TB has this at true, so I think we can get rid of it
---
 user.js | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/user.js b/user.js
index 5bd3c79..a8251b1 100644
--- a/user.js
+++ b/user.js
@@ -1075,9 +1075,6 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Camera/Microphone>Settings ***/
    // user_pref("permissions.default.camera", 2);
    // user_pref("permissions.default.microphone", 2);
-/* 2026: disable canvas capture stream [FF41+]
- * [1] https://developer.mozilla.org/docs/Web/API/HTMLCanvasElement/captureStream ***/
-user_pref("canvas.capturestream.enabled", false);
 /* 2027: disable camera image capture [FF35+]
  * [1] https://trac.torproject.org/projects/tor/ticket/16339 ***/
 user_pref("dom.imagecapture.enabled", false); // [DEFAULT: false]

From 8b07fd57d0f8a31dab25661d51235fe1b0c6360c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 14:35:51 +0000
Subject: [PATCH 0277/1147] canvas.capturestream.enabled

---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 185a14e..b29265e 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 30-Jan-2019
+ Last updated: 22-Apr-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -120,6 +120,8 @@
     /* 65-beta */
     'browser.contentblocking.enabled',
     'browser.urlbar.maxHistoricalSearchSuggestions',
+    /* 67-beta */
+    'canvas.capturestream.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 87959d621cd9c7f9d0e59928b0e07731309f5b15 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 15:20:16 +0000
Subject: [PATCH 0278/1147] 2010: remove pdf webgl

it's default false, and I want to simplify webgl 2010+2012
---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index a8251b1..52373c1 100644
--- a/user.js
+++ b/user.js
@@ -1058,7 +1058,6 @@ user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
  * [1] https://www.contextis.com/resources/blog/webgl-new-dimension-browser-exploitation/
  * [2] https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern ***/
 user_pref("webgl.disabled", true);
-user_pref("pdfjs.enableWebGL", false);
 user_pref("webgl.min_capability_mode", true);
 user_pref("webgl.disable-extensions", true);
 user_pref("webgl.disable-fail-if-major-performance-caveat", true);

From 8a68fc48c57f591ada8896e56454f5a0792e233f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 15:21:16 +0000
Subject: [PATCH 0279/1147] pdfjs.enableWebGL

---
 scratchpad-scripts/ghacks-clear-[removed].js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index b29265e..13a5147 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -122,6 +122,7 @@
     'browser.urlbar.maxHistoricalSearchSuggestions',
     /* 67-beta */
     'canvas.capturestream.enabled',
+    'pdfjs.enableWebGL',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 358ddfdfced6c5b171bdc5509cd20f7f387ae402 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Apr 2019 15:38:26 +0000
Subject: [PATCH 0280/1147] pdfjs - add setup tag

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 52373c1..62515e3 100644
--- a/user.js
+++ b/user.js
@@ -1334,8 +1334,8 @@ user_pref("ui.use_standins_for_native_colors", true);
  * [3] CVE-2017-5383: https://www.mozilla.org/security/advisories/mfsa2017-02/
  * [4] https://www.xudongz.com/blog/2017/idn-phishing/ ***/
 user_pref("network.IDN_show_punycode", true);
-/* 2620: enable Firefox's built-in PDF reader
- * This setting controls if the option "Display in Firefox" in the above setting is available
+/* 2620: enable Firefox's built-in PDF reader [SETUP-CHROME]
+ * This setting controls if the option "Display in Firefox" is available in the setting below
  *   and by effect controls whether PDFs are handled in-browser or externally ("Ask" or "Open With")
  * PROS: pdfjs is lightweight, open source, and as secure/vetted as any pdf reader out there (more than most)
  *   Exploits are rare (1 serious case in 4 yrs), treated seriously and patched quickly.
@@ -1344,7 +1344,7 @@ user_pref("network.IDN_show_punycode", true);
  * CONS: You may prefer a different pdf reader for security reasons
  * CAVEAT: JS can still force a pdf to open in-browser by bundling its own code (rare)
  * [SETTING] General>Applications>Portable Document Format (PDF) ***/
-user_pref("pdfjs.disabled", false);
+user_pref("pdfjs.disabled", false); // [DEFAULT: false]
 /* 2621: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS]
  * [1] https://www.ghacks.net/2016/03/25/block-firefox-chrome-windows-store/ ***/
 user_pref("network.protocol-handler.external.ms-windows-store", false);

From b05cfc32de098f7bf9ead0b4bd079def38df80ba Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Apr 2019 04:04:22 +0000
Subject: [PATCH 0281/1147] HTTP2 tweak

---
 user.js | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 62515e3..0bd8d7b 100644
--- a/user.js
+++ b/user.js
@@ -474,14 +474,14 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
  * [2] https://www.internetsociety.org/tag/ipv6-security/ (see Myths 2,4,5,6) ***/
 user_pref("network.dns.disableIPv6", true);
 /* 0702: disable HTTP2
- * HTTP2 raises some concerns with "multiplexing" and "server push", does nothing to
- * enhance privacy, and may open up a number of server-side fingerprinting opportunities.
+ * HTTP2 raises concerns with "multiplexing" and "server push", does nothing to
+ * enhance privacy, and opens up a number of server-side fingerprinting opportunities.
  * [WARNING] Disabling this made sense in the past, and doesn't break anything, but HTTP2 is
- * now at 35% and growing, see [5] - don't be that one person using HTTP1.1 on HTTP2 sites
+ * at 35% (April 2019) and growing [5]. Don't be that one person using HTTP1.1 on HTTP2 sites
  * [1] https://http2.github.io/faq/
  * [2] https://blog.scottlogic.com/2014/11/07/http-2-a-quick-look.html
- * [3] https://queue.acm.org/detail.cfm?id=2716278
- * [4] https://github.com/ghacksuserjs/ghacks-user.js/issues/107
+ * [3] https://http2.github.io/http2-spec/#rfc.section.10.8
+ * [4] https://queue.acm.org/detail.cfm?id=2716278
  * [5] https://w3techs.com/technologies/details/ce-http2/all/all ***/
    // user_pref("network.http.spdy.enabled", false);
    // user_pref("network.http.spdy.enabled.deps", false);

From b8367959dace0b408eea8421df283fd3e33ef4ee Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Apr 2019 05:33:06 +0000
Subject: [PATCH 0282/1147] mathml: a better test

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 0bd8d7b..c96154d 100644
--- a/user.js
+++ b/user.js
@@ -1295,7 +1295,7 @@ user_pref("devtools.debugger.remote-enabled", false);
 user_pref("devtools.webide.enabled", false);
 user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
 /* 2609: disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
- * [TEST] http://browserspy.dk/mathml.php
+ * [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#misc
  * [1] https://bugzilla.mozilla.org/1173199 ***/
    // user_pref("mathml.disabled", true);
 /* 2610: disable in-content SVG (Scalable Vector Graphics) [FF53+]

From 986c9001935c7856e2ef4ddebef47fe3ea026a24 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Apr 2019 05:50:35 +0000
Subject: [PATCH 0283/1147] RFP tidy up

---
 user.js | 12 ++++--------
 1 file changed, 4 insertions(+), 8 deletions(-)

diff --git a/user.js b/user.js
index c96154d..74c2c00 100644
--- a/user.js
+++ b/user.js
@@ -1571,14 +1571,10 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
    IMPORTANT: As existing prefs become redundant, and some of them WILL interfere
    with how RFP works, they will be moved to section 4600 and made inactive
 
- ** 418986 - limit window.screen & CSS media queries leaking identifiable info (FF41+)
-      [POC] http://ip-check.info/?lang=en (screen, usable screen, and browser window will match)
-      [NOTE] Does not cover everything yet - https://bugzilla.mozilla.org/1216800
-      [NOTE] This will probably make your values pretty unique until you resize or snap the
-      inner window width + height into standard/common resolutions (such as 1366x768)
-      To set a size, open a XUL (chrome) page (such as about:config) which is at 100% zoom, hit
-      Shift+F4 to open the scratchpad, type window.resizeTo(1366,768), hit Ctrl+R to run. Test
-      your window size, do some math, resize to allow for all the non inner window elements
+  ** 418986 - limit window.screen & CSS media queries leaking identifiable info (FF41+)
+      [NOTE] Info only: To set a size, open a XUL (chrome) page (such as about:config) which is at
+      100% zoom, hit Shift+F4 to open the scratchpad, type window.resizeTo(1366,768), hit Ctrl+R to run.
+      Test your window size, do some math, resize to allow for all the non inner window elements
       [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#screen
  ** 1281949 - spoof screen orientation (FF50+)
  ** 1281963 - hide the contents of navigator.plugins and navigator.mimeTypes (FF50+)

From f849e1c602ad95bb0f7c6734145d8e2a0ec969a5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 24 Apr 2019 06:39:59 +0000
Subject: [PATCH 0284/1147] WOFF2 -> inactive

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 74c2c00..56b450b 100644
--- a/user.js
+++ b/user.js
@@ -911,7 +911,7 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
  * [1] https://wiki.mozilla.org/SVGOpenTypeFonts - iSECPartnersReport recommends to disable this ***/
 user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 /* 1405: disable WOFF2 (Web Open Font Format) [FF35+] ***/
-user_pref("gfx.downloadable_fonts.woff2.enabled", false);
+   // user_pref("gfx.downloadable_fonts.woff2.enabled", false);
 /* 1406: disable CSS Font Loading API
  * [NOTE] Disabling fonts can uglify the web a fair bit. ***/
 user_pref("layout.css.font-loading-api.enabled", false);

From 092221567020c0602113927971cd9be0db895136 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 24 Apr 2019 07:46:47 +0000
Subject: [PATCH 0285/1147] 1840 openh264 -> inactive

WebRTC is already disabled
---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 56b450b..a14c0be 100644
--- a/user.js
+++ b/user.js
@@ -1038,10 +1038,10 @@ user_pref("media.gmp-widevinecdm.autoupdate", false);
  * [SETTING] General>DRM Content>Play DRM-controlled content
  * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
 user_pref("media.eme.enabled", false);
-/* 1840: disable the OpenH264 Video Codec by Cisco to "Never Activate" [SETUP-WEB]
+/* 1840: disable the OpenH264 Video Codec by Cisco to "Never Activate" [SETUP-HARDEN]
  * This is the bundled codec used for video chat in WebRTC ***/
-user_pref("media.gmp-gmpopenh264.enabled", false);
-user_pref("media.gmp-gmpopenh264.autoupdate", false);
+  // user_pref("media.gmp-gmpopenh264.enabled", false);
+  // user_pref("media.gmp-gmpopenh264.autoupdate", false);
 
 /*** [SECTION 2000]: MEDIA / CAMERA / MIC ***/
 user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");

From d6ccf7ba643aaf1cba18dd97a4fe4e6fb8033adc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 24 Apr 2019 08:12:31 +0000
Subject: [PATCH 0286/1147] 0860 form history: add setup tag / warning

- Used setup-web since it relates to actual web pages, even though it doesn't break them
- Added the tag because it's an item that is likely to get attention / troubleshooting
- Added a warning tag to make the risk more apparent.
- Slight edit to the 2803 references
---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index a14c0be..a99a39c 100644
--- a/user.js
+++ b/user.js
@@ -601,14 +601,14 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
 /* 0850e: disable location bar one-off searches [FF51+]
  * [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/ ***/
    // user_pref("browser.urlbar.oneOffSearches", false);
-/* 0860: disable search and form history
- * Autocomplete form data is still (in April 2019) easily read by third parties, see [1]
- * [NOTE] You can clear formdata on exiting Firefox (see 2803)
+/* 0860: disable search and form history [SETUP-WEB]
+ * [WARNING] Autocomplete form data is still (in April 2019) easily read by third parties, see [1]
+ * [NOTE] We also clear formdata on exiting Firefox (see 2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html ***/
 user_pref("browser.formfill.enable", false);
 /* 0862: disable browsing and download history
- * [NOTE] You can clear history and downloads on exiting Firefox (see 2803)
+ * [NOTE] We also clear history and downloads on exiting Firefox (see 2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember browsing and download history ***/
    // user_pref("places.history.enabled", false);
 /* 0864: disable date/time picker

From d4f7590c833f6f0ff851072e74cd05d8517aad1b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 24 Apr 2019 08:39:11 +0000
Subject: [PATCH 0287/1147] 2212: add setup tag

- doesn't need any more than that. users can fiddle with it to find what works for them: I'm sure this breaks a lot of website "features"
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index a99a39c..20680f0 100644
--- a/user.js
+++ b/user.js
@@ -1123,7 +1123,7 @@ user_pref("browser.link.open_newwindow.restriction", 0);
 user_pref("dom.disable_open_during_load", true);
 /* 2211: set max popups from a single non-click event - default is 20! ***/
 user_pref("dom.popup_maximum", 3);
-/* 2212: limit events that can cause a popup
+/* 2212: limit events that can cause a popup [SETUP-WEB]
  * default is "change click dblclick mouseup pointerup notificationclick reset submit touchend contextmenu"
  * [1] http://kb.mozillazine.org/Dom.popup_allowed_events ***/
 user_pref("dom.popup_allowed_events", "click dblclick");

From c3210d1be97c7d3867d76841d1573a40a96cf0b2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Apr 2019 06:55:58 +0000
Subject: [PATCH 0288/1147] 1241: insecure passive: add setup tag

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 20680f0..3f6f3d9 100644
--- a/user.js
+++ b/user.js
@@ -844,7 +844,7 @@ user_pref("security.cert_pinning.enforcement_level", 2);
 /* 1240: disable insecure active content on https pages
  * [1] https://trac.torproject.org/projects/tor/ticket/21323 ***/
 user_pref("security.mixed_content.block_active_content", true); // [DEFAULT: true]
-/* 1241: disable insecure passive content (such as images) on https pages ***/
+/* 1241: disable insecure passive content (such as images) on https pages [SETUP-WEB] ***/
 user_pref("security.mixed_content.block_display_content", true);
 /* 1243: block unencrypted requests from Flash on encrypted pages to mitigate MitM attacks [FF59+]
  * [1] https://bugzilla.mozilla.org/1190623 ***/

From 882d25f725b75fe12225d12e257a3c1cc3dcf033 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Apr 2019 07:00:40 +0000
Subject: [PATCH 0289/1147] 2610: SVG: should be warning, not setup

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 3f6f3d9..2ba26a5 100644
--- a/user.js
+++ b/user.js
@@ -1299,7 +1299,7 @@ user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
  * [1] https://bugzilla.mozilla.org/1173199 ***/
    // user_pref("mathml.disabled", true);
 /* 2610: disable in-content SVG (Scalable Vector Graphics) [FF53+]
- * [SETUP-WEB] Expect breakage incl. youtube player controls. Best left for a "hardened" profile.
+ * [WARNING] Expect breakage incl. youtube player controls. Best left for a "hardened" profile.
  * [1] https://bugzilla.mozilla.org/1216893 ***/
    // user_pref("svg.disabled", true);
 /* 2611: disable middle mouse click opening links from clipboard

From 6a0c44d0a4b467652d92fbb495cbe371f265235c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Apr 2019 07:03:28 +0000
Subject: [PATCH 0290/1147] 2517: should be warning, not setup

If it's inactive then it's a warning. We can still go through the js and add setup-harden tags for a few inactive items, which I will do
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 2ba26a5..4e9657e 100644
--- a/user.js
+++ b/user.js
@@ -1258,7 +1258,7 @@ user_pref("media.navigator.enabled", false);
  * [1] https://bugzilla.mozilla.org/1288359 ***/
 user_pref("dom.webaudio.enabled", false);
 /* 2517: disable Media Capabilities API [FF63+]
- * [SETUP-PERF] This *may* affect media performance if disabled, no one is sure
+ * [WARNING] This *may* affect media performance if disabled, no one is sure
  * [1] https://github.com/WICG/media-capabilities
  * [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
    // user_pref("media.media-capabilities.enabled", false);

From 98f65da430104df5ebb3f8f38d76a1895ae8252f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Apr 2019 07:33:30 +0000
Subject: [PATCH 0291/1147] remove dead setup tags

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 4e9657e..0bd44d2 100644
--- a/user.js
+++ b/user.js
@@ -2187,7 +2187,7 @@ user_pref("extensions.shield-recipe-client.api_url", "");
    // [-] https://bugzilla.mozilla.org/1433324
 user_pref("browser.newtabpage.activity-stream.enabled", false);
 // 2301: disable workers
-   // [SETUP-WEB] Disabling workers *will* break sites (e.g. Google Street View, Twitter)
+   // Disabling workers *will* break sites (e.g. Google Street View, Twitter)
    // [NOTE] CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed)
    // [-] https://bugzilla.mozilla.org/1434934
 user_pref("dom.workers.enabled", false);
@@ -2242,7 +2242,7 @@ user_pref("shield.savant.enabled", false);
    // [-] https://bugzilla.mozilla.org/1453751
    // user_pref("browser.chrome.favicons", false);
 // 2030: disable autoplay of HTML5 media - replaced by media.autoplay.default
-   // [SETUP-WEB] This may break video playback on various sites
+   // This may break video playback on various sites
    // [-] https://bugzilla.mozilla.org/1470082
 user_pref("media.autoplay.enabled", false);
 // 2704: set cookie lifetime in days (see 2703)

From 2d0182ce6ee26f9d0c7d0feb2a0f8e207fd53406 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Apr 2019 13:53:02 +0000
Subject: [PATCH 0292/1147] 1001: add setup tag

- remove tag from section header (chrome)
- add tag to pref (perf)
- mention that we clear on close
---
 user.js | 7 +++++--
 1 file changed, 5 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 0bd44d2..7237e15 100644
--- a/user.js
+++ b/user.js
@@ -667,7 +667,7 @@ user_pref("security.insecure_field_warning.contextual.enabled", true);
  * [1] https://www.fxsitecompat.com/en-CA/docs/2015/http-auth-dialog-can-no-longer-be-triggered-by-cross-origin-resources/ ***/
 user_pref("network.auth.subresource-http-auth-allow", 1);
 
-/*** [SECTION 1000]: CACHE / SESSION (RE)STORE / FAVICONS [SETUP-CHROME]
+/*** [SECTION 1000]: CACHE / SESSION (RE)STORE / FAVICONS
      ETAG [1] and other [2][3] cache tracking/fingerprinting techniques can be averted by
      disabling *BOTH* disk (1001) and memory (1003) cache. ETAGs can also be neutralized
      by modifying response headers [4]. Another solution is to use a hardened configuration
@@ -681,7 +681,10 @@ user_pref("network.auth.subresource-http-auth-allow", 1);
 ***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
 /** CACHE ***/
-/* 1001: disable disk cache ***/
+/* 1001: disable disk cache
+ * [SETUP-PERF] If you think disk cache may help (heavy tab user, high-res video),
+ * or you use a hardened Temporary Containers, then feel free to override these
+ * [NOTE] We also clear cache on close (see 2803) ***/
 user_pref("browser.cache.disk.enable", false);
 user_pref("browser.cache.disk.capacity", 0);
 user_pref("browser.cache.disk.smart_size.enabled", false);

From 053808ba971dc308640d2f1646fb6dbb126d6c0e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Apr 2019 14:03:02 +0000
Subject: [PATCH 0293/1147] 1001: remove dead wood

- these are not needed, you can view your cache in about:cache, or look at your `profile/cache2` folder (at least for portable Firefox), the remaining pref is enough to achieve the desired result
- browser.cache.disk.smart_size.first_run is set internally (for me it got automatically reset to modified false)
- the other two prefs are just more things for users to have deal with if they want to use disk cache
---
 user.js | 5 +----
 1 file changed, 1 insertion(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 7237e15..49802e7 100644
--- a/user.js
+++ b/user.js
@@ -683,12 +683,9 @@ user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is m
 /** CACHE ***/
 /* 1001: disable disk cache
  * [SETUP-PERF] If you think disk cache may help (heavy tab user, high-res video),
- * or you use a hardened Temporary Containers, then feel free to override these
+ * or you use a hardened Temporary Containers, then feel free to override this
  * [NOTE] We also clear cache on close (see 2803) ***/
 user_pref("browser.cache.disk.enable", false);
-user_pref("browser.cache.disk.capacity", 0);
-user_pref("browser.cache.disk.smart_size.enabled", false);
-user_pref("browser.cache.disk.smart_size.first_run", false);
 /* 1002: disable disk cache for SSL pages
  * [1] http://kb.mozillazine.org/Browser.cache.disk_cache_ssl ***/
 user_pref("browser.cache.disk_cache_ssl", false);

From e6017af4bd43c6a0890b454ac1d8b5c463a02d6a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Apr 2019 14:06:48 +0000
Subject: [PATCH 0294/1147] 3 disk cache prefs

see https://github.com/ghacksuserjs/ghacks-user.js/commit/053808ba971dc308640d2f1646fb6dbb126d6c0e
---
 scratchpad-scripts/ghacks-clear-[removed].js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 13a5147..4ea6aac 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 22-Apr-2019
+ Last updated: 27-Apr-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -123,6 +123,9 @@
     /* 67-beta */
     'canvas.capturestream.enabled',
     'pdfjs.enableWebGL',
+    'browser.cache.disk.capacity',
+    'browser.cache.disk.smart_size.enabled',
+    'browser.cache.disk.smart_size.first_run',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 8765231de0a1d943403732e5b2448d7c45133580 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Apr 2019 16:12:25 +0000
Subject: [PATCH 0295/1147] 0801: keyword.enabled, closes #702

- explain pitfalls, add keyword tip, add setup tag
- given the searchbar is hidden by default in new FF installs, a lot of people could find this incredibly annoying (not being able to hit enter), including users who have changed their search engine - hence the setup tag
---
 user.js | 8 +++++++-
 1 file changed, 7 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 49802e7..a746a49 100644
--- a/user.js
+++ b/user.js
@@ -540,7 +540,13 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
 ***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
 /* 0801: disable location bar using search
- * don't leak typos to a search engine, give an error message instead ***/
+ * Don't leak URL typos to a search engine, give an error message instead.
+ * Examples: "secretplace,com", "secretplace/com", "secretplace com", "secret place.com"
+ * [NOTE] Search buttons in the dropdown work, but hitting 'enter' in the location bar will fail
+ * [TIP] You can add keywords to search engines in options (e.g. 'd' for DuckDuckGo) and
+ * the dropdown will now auto-select it and you can then hit 'enter' and it will work
+ * [SETUP-CHROME] If you don't, or rarely, type URLs, or you use a default search
+ * engine that respects privacy, then you probably don't need this ***/
 user_pref("keyword.enabled", false);
 /* 0802: disable location bar domain guessing
  * domain guessing intercepts DNS "hostname not found errors" and resends a

From c9c1671e4aa1121cd457995db39a2e36658f15cd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Apr 2019 16:18:48 +0000
Subject: [PATCH 0296/1147] 2010+2012: simplify WebGL, closes #699

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index a746a49..0707797 100644
--- a/user.js
+++ b/user.js
@@ -1060,16 +1060,16 @@ user_pref("media.peerconnection.enabled", false);
  * [2] https://wiki.mozilla.org/Media/WebRTC/Privacy ***/
 user_pref("media.peerconnection.ice.default_address_only", true);
 user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
-/* 2010: disable WebGL (Web Graphics Library), force bare minimum feature set if used & disable WebGL extensions
+/* 2010: disable WebGL (Web Graphics Library)
  * [1] https://www.contextis.com/resources/blog/webgl-new-dimension-browser-exploitation/
  * [2] https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern ***/
 user_pref("webgl.disabled", true);
+user_pref("webgl.dxgl.enabled", false); // [WINDOWS]
+user_pref("webgl.enable-webgl2", false);
+/* 2012: limit WebGL ***/
 user_pref("webgl.min_capability_mode", true);
 user_pref("webgl.disable-extensions", true);
 user_pref("webgl.disable-fail-if-major-performance-caveat", true);
-/* 2012: disable two more webgl preferences [FF51+] ***/
-user_pref("webgl.dxgl.enabled", false); // [WINDOWS]
-user_pref("webgl.enable-webgl2", false);
 /* 2022: disable screensharing ***/
 user_pref("media.getusermedia.screensharing.enabled", false);
 user_pref("media.getusermedia.browser.enabled", false);

From 528d0de6b4e7d8a205ef38356d2cdf719cb7405d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Apr 2019 17:39:53 +0000
Subject: [PATCH 0297/1147] 2305: permission also applies to push

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 0707797..ad9fea2 100644
--- a/user.js
+++ b/user.js
@@ -1163,7 +1163,7 @@ user_pref("dom.serviceWorkers.enabled", false);
  * [1] https://developer.mozilla.org/docs/Web/API/Notifications_API ***/
 user_pref("dom.webnotifications.enabled", false); // [FF22+]
 user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
-/* 2305: set a default permission for Notifications (see 2304) [FF58+]
+/* 2305: set a default permission for Notifications (2304) and Push (2306) [FF58+]
  * 0=always ask (default), 1=allow, 2=block
  * [NOTE] Best left at default "always ask", fingerprintable via Permissions API
  * [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications

From 25b8b404fbf25c0b3b73ef87a954dbee6323fc1c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Apr 2019 19:02:14 +0000
Subject: [PATCH 0298/1147] 2305+2306: musical chairs #706

---
 user.js | 16 ++++++++--------
 1 file changed, 8 insertions(+), 8 deletions(-)

diff --git a/user.js b/user.js
index ad9fea2..83d8490 100644
--- a/user.js
+++ b/user.js
@@ -1159,17 +1159,11 @@ user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
  * [NOTE] Service worker APIs are hidden (in Firefox) and cannot be used when in PB mode.
  * [NOTE] Service workers only run over HTTPS. Service Workers have no DOM access. ***/
 user_pref("dom.serviceWorkers.enabled", false);
-/* 2304: disable web notifications
+/* 2304: disable Web Notifications
  * [1] https://developer.mozilla.org/docs/Web/API/Notifications_API ***/
 user_pref("dom.webnotifications.enabled", false); // [FF22+]
 user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
-/* 2305: set a default permission for Notifications (2304) and Push (2306) [FF58+]
- * 0=always ask (default), 1=allow, 2=block
- * [NOTE] Best left at default "always ask", fingerprintable via Permissions API
- * [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Notifications>Settings ***/
-   // user_pref("permissions.default.desktop-notification", 2);
-/* 2306: disable push notifications [FF44+]
+/* 2305: disable Push Notifications [FF44+]
  * web apps can receive messages pushed to them from a server, whether or
  * not the web app is in the foreground, or even currently loaded
  * [1] https://developer.mozilla.org/docs/Web/API/Push_API ***/
@@ -1177,6 +1171,12 @@ user_pref("dom.push.enabled", false);
 user_pref("dom.push.connection.enabled", false);
 user_pref("dom.push.serverURL", "");
 user_pref("dom.push.userAgentID", "");
+/* 2306: set a default permission for Notifications (both 2305 and 2306) [FF58+]
+ * 0=always ask (default), 1=allow, 2=block
+ * [NOTE] Best left at default "always ask", fingerprintable via Permissions API
+ * [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
+ * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Notifications>Settings ***/
+   // user_pref("permissions.default.desktop-notification", 2);
 
 /*** [SECTION 2400]: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT ***/
 user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");

From 6f8d0263df52b239f8d7dd5485591abf62c67680 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Apr 2019 02:55:45 +0000
Subject: [PATCH 0299/1147] 0303 + 0304 + 0305: remove, closes #708

---
 user.js | 8 --------
 1 file changed, 8 deletions(-)

diff --git a/user.js b/user.js
index 83d8490..64b2e3f 100644
--- a/user.js
+++ b/user.js
@@ -193,14 +193,6 @@ user_pref("app.update.auto", false);
 /* 0302b: disable auto-INSTALLING extension and theme updates (after the check in 0301b)
  * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
    // user_pref("extensions.update.autoUpdateDefault", false);
-/* 0303: disable background update service [WINDOWS]
- * [SETTING] General>Firefox Updates>Use a background service to install updates ***/
-user_pref("app.update.service.enabled", false);
-/* 0304: disable background update staging ***/
-user_pref("app.update.staging.enabled", false);
-/* 0305: enforce update information is displayed
- * This is the update available, downloaded, error and success information ***/
-user_pref("app.update.silent", false);
 /* 0306: disable extension metadata
  * used when installing/updating an extension, and in daily background update checks: if false, it
  * hides the expanded text description (if it exists) when you "show more details about an addon" ***/

From 8f1a489e361f97995e0cb69b1e0303c0f425d2f2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Apr 2019 02:58:35 +0000
Subject: [PATCH 0300/1147] 3 update prefs, see #708

---
 scratchpad-scripts/ghacks-clear-[removed].js | 9 ++++++---
 1 file changed, 6 insertions(+), 3 deletions(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 4ea6aac..f5eb3c3 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 27-Apr-2019
+ Last updated: 28-Apr-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -121,11 +121,14 @@
     'browser.contentblocking.enabled',
     'browser.urlbar.maxHistoricalSearchSuggestions',
     /* 67-beta */
-    'canvas.capturestream.enabled',
-    'pdfjs.enableWebGL',
+    'app.update.service.enabled',
+    'app.update.staging.enabled',
+    'app.update.silent',
     'browser.cache.disk.capacity',
     'browser.cache.disk.smart_size.enabled',
     'browser.cache.disk.smart_size.first_run',
+    'canvas.capturestream.enabled',
+    'pdfjs.enableWebGL',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 7b667db7669155952323bf0aad2894cd09b32728 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Apr 2019 03:37:07 +0000
Subject: [PATCH 0301/1147] 2304 + 2305 -> inactive, see #706

---
 user.js | 14 ++++++++------
 1 file changed, 8 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 64b2e3f..b0fe23e 100644
--- a/user.js
+++ b/user.js
@@ -1152,17 +1152,19 @@ user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
  * [NOTE] Service workers only run over HTTPS. Service Workers have no DOM access. ***/
 user_pref("dom.serviceWorkers.enabled", false);
 /* 2304: disable Web Notifications
+ * [NOTE] Web Notifications require Service Workers, and are behind a prompt (see 2306)
  * [1] https://developer.mozilla.org/docs/Web/API/Notifications_API ***/
-user_pref("dom.webnotifications.enabled", false); // [FF22+]
-user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
+   // user_pref("dom.webnotifications.enabled", false); // [FF22+]
+   // user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
 /* 2305: disable Push Notifications [FF44+]
  * web apps can receive messages pushed to them from a server, whether or
  * not the web app is in the foreground, or even currently loaded
+ * [NOTE] Push Notifications require Service Workers, and are behind a prompt (see 2306)
  * [1] https://developer.mozilla.org/docs/Web/API/Push_API ***/
-user_pref("dom.push.enabled", false);
-user_pref("dom.push.connection.enabled", false);
-user_pref("dom.push.serverURL", "");
-user_pref("dom.push.userAgentID", "");
+   // user_pref("dom.push.enabled", false);
+   // user_pref("dom.push.connection.enabled", false);
+   // user_pref("dom.push.serverURL", "");
+   // user_pref("dom.push.userAgentID", "");
 /* 2306: set a default permission for Notifications (both 2305 and 2306) [FF58+]
  * 0=always ask (default), 1=allow, 2=block
  * [NOTE] Best left at default "always ask", fingerprintable via Permissions API

From 3e5e1bfdd2f534961778e8df0ba933d4a517dc9e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Apr 2019 03:48:55 +0000
Subject: [PATCH 0302/1147] 2740 -> inactive, see #706

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index b0fe23e..b38ad0a 100644
--- a/user.js
+++ b/user.js
@@ -1465,8 +1465,9 @@ user_pref("browser.cache.offline.insecure.enable", false); // [DEFAULT: false in
  * [2] https://bugzilla.mozilla.org/959985 ***/
 user_pref("offline-apps.allow_by_default", false);
 /* 2740: disable service workers cache and cache storage
+ * [NOTE] We clear Service Worker cache on close (see 2803)
  * [1] https://w3c.github.io/ServiceWorker/#privacy ***/
-user_pref("dom.caches.enabled", false);
+   // user_pref("dom.caches.enabled", false);
 /* 2750: disable Storage API [FF51+]
  * The API gives sites the ability to find out how much space they can use, how much
  * they are already using, and even control whether or not they need to be alerted

From a39516ff0e112c2601d4b8d71e11499bbdc03a1c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Apr 2019 04:02:19 +0000
Subject: [PATCH 0303/1147] case consistency when using service worker*

---
 user.js | 15 +++++++--------
 1 file changed, 7 insertions(+), 8 deletions(-)

diff --git a/user.js b/user.js
index b38ad0a..3052bee 100644
--- a/user.js
+++ b/user.js
@@ -1132,8 +1132,7 @@ user_pref("dom.popup_allowed_events", "click dblclick");
      including service and shared workers. Shared workers can be utilized by multiple scripts and
      communicate between browsing contexts (windows/tabs/iframes) and can even control your cache.
 
-     [SETUP-WEB] Disabling "web workers" might break sites
-     [UPDATE] uMatrix 1.2.0+ allows a per-scope control for workers (2301-deprecated) and service workers (2302)
+     [NOTE] uMatrix 1.2.0+ allows a per-scope control for workers (2301-deprecated) and service workers (2302)
               #Required reading [#] https://github.com/gorhill/uMatrix/releases/tag/1.2.0
 
      [1]    Web Workers: https://developer.mozilla.org/docs/Web/API/Web_Workers_API
@@ -1149,17 +1148,17 @@ user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
  * and network, are event driven, and can control the web page/site it is associated with,
  * intercepting and modifying navigation and resource requests, and caching resources.
  * [NOTE] Service worker APIs are hidden (in Firefox) and cannot be used when in PB mode.
- * [NOTE] Service workers only run over HTTPS. Service Workers have no DOM access. ***/
+ * [NOTE] Service workers only run over HTTPS. Service workers have no DOM access. ***/
 user_pref("dom.serviceWorkers.enabled", false);
 /* 2304: disable Web Notifications
- * [NOTE] Web Notifications require Service Workers, and are behind a prompt (see 2306)
+ * [NOTE] Web Notifications require service workers (2302) and are behind a prompt (2306)
  * [1] https://developer.mozilla.org/docs/Web/API/Notifications_API ***/
    // user_pref("dom.webnotifications.enabled", false); // [FF22+]
    // user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
 /* 2305: disable Push Notifications [FF44+]
  * web apps can receive messages pushed to them from a server, whether or
  * not the web app is in the foreground, or even currently loaded
- * [NOTE] Push Notifications require Service Workers, and are behind a prompt (see 2306)
+ * [NOTE] Push Notifications require service workers (2302) and are behind a prompt (s2306)
  * [1] https://developer.mozilla.org/docs/Web/API/Push_API ***/
    // user_pref("dom.push.enabled", false);
    // user_pref("dom.push.connection.enabled", false);
@@ -1464,8 +1463,8 @@ user_pref("browser.cache.offline.insecure.enable", false); // [DEFAULT: false in
  * [1] https://support.mozilla.org/questions/1098540
  * [2] https://bugzilla.mozilla.org/959985 ***/
 user_pref("offline-apps.allow_by_default", false);
-/* 2740: disable service workers cache and cache storage
- * [NOTE] We clear Service Worker cache on close (see 2803)
+/* 2740: disable service worker cache and cache storage
+ * [NOTE] We clear service worker cache on close (see 2803)
  * [1] https://w3c.github.io/ServiceWorker/#privacy ***/
    // user_pref("dom.caches.enabled", false);
 /* 2750: disable Storage API [FF51+]
@@ -1483,7 +1482,7 @@ user_pref("offline-apps.allow_by_default", false);
 /*** [SECTION 2800]: SHUTDOWN
      You should set the values to what suits you best.
      - "Offline Website Data" includes appCache (2730), localStorage (2710),
-       Service Worker cache (2740), and QuotaManager (IndexedDB (2720), asm-cache)
+       service worker cache (2740), and QuotaManager (IndexedDB (2720), asm-cache)
      - In both 2803 + 2804, the 'download' and 'history' prefs are combined in the
        Firefox interface as "Browsing & Download History" and their values will be synced
 ***/

From 7a9763d1292be07450a3ed7eca7b6d8475e8072d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Apr 2019 04:30:38 +0000
Subject: [PATCH 0304/1147] 2740: add setup tag etc, closes #706

---
 user.js | 15 +++++++++------
 1 file changed, 9 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 3052bee..fcb8785 100644
--- a/user.js
+++ b/user.js
@@ -682,7 +682,7 @@ user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is m
 /* 1001: disable disk cache
  * [SETUP-PERF] If you think disk cache may help (heavy tab user, high-res video),
  * or you use a hardened Temporary Containers, then feel free to override this
- * [NOTE] We also clear cache on close (see 2803) ***/
+ * [NOTE] We also clear cache on exiting Firefox (see 2803) ***/
 user_pref("browser.cache.disk.enable", false);
 /* 1002: disable disk cache for SSL pages
  * [1] http://kb.mozillazine.org/Browser.cache.disk_cache_ssl ***/
@@ -1038,8 +1038,8 @@ user_pref("media.gmp-widevinecdm.autoupdate", false);
 user_pref("media.eme.enabled", false);
 /* 1840: disable the OpenH264 Video Codec by Cisco to "Never Activate" [SETUP-HARDEN]
  * This is the bundled codec used for video chat in WebRTC ***/
-  // user_pref("media.gmp-gmpopenh264.enabled", false);
-  // user_pref("media.gmp-gmpopenh264.autoupdate", false);
+   // user_pref("media.gmp-gmpopenh264.enabled", false);
+   // user_pref("media.gmp-gmpopenh264.autoupdate", false);
 
 /*** [SECTION 2000]: MEDIA / CAMERA / MIC ***/
 user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
@@ -1147,6 +1147,9 @@ user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
  * Service workers essentially act as proxy servers that sit between web apps, and the browser
  * and network, are event driven, and can control the web page/site it is associated with,
  * intercepting and modifying navigation and resource requests, and caching resources.
+ * [SETUP-WEB] Disabling service workers will break some sites. This pref is a master switch, and controls
+ * notifications (2304, 2305) and service worker cache (2740) - all three are inactive. Notifications are
+ * behind a prompt (2306). If you enable service workers, then you may want to look at these prefs as well.
  * [NOTE] Service worker APIs are hidden (in Firefox) and cannot be used when in PB mode.
  * [NOTE] Service workers only run over HTTPS. Service workers have no DOM access. ***/
 user_pref("dom.serviceWorkers.enabled", false);
@@ -1158,7 +1161,7 @@ user_pref("dom.serviceWorkers.enabled", false);
 /* 2305: disable Push Notifications [FF44+]
  * web apps can receive messages pushed to them from a server, whether or
  * not the web app is in the foreground, or even currently loaded
- * [NOTE] Push Notifications require service workers (2302) and are behind a prompt (s2306)
+ * [NOTE] Push Notifications require service workers (2302) and are behind a prompt (2306)
  * [1] https://developer.mozilla.org/docs/Web/API/Push_API ***/
    // user_pref("dom.push.enabled", false);
    // user_pref("dom.push.connection.enabled", false);
@@ -1464,7 +1467,7 @@ user_pref("browser.cache.offline.insecure.enable", false); // [DEFAULT: false in
  * [2] https://bugzilla.mozilla.org/959985 ***/
 user_pref("offline-apps.allow_by_default", false);
 /* 2740: disable service worker cache and cache storage
- * [NOTE] We clear service worker cache on close (see 2803)
+ * [NOTE] We clear service worker cache on exiting Firefox (see 2803)
  * [1] https://w3c.github.io/ServiceWorker/#privacy ***/
    // user_pref("dom.caches.enabled", false);
 /* 2750: disable Storage API [FF51+]
@@ -1571,7 +1574,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
    IMPORTANT: As existing prefs become redundant, and some of them WILL interfere
    with how RFP works, they will be moved to section 4600 and made inactive
 
-  ** 418986 - limit window.screen & CSS media queries leaking identifiable info (FF41+)
+ ** 418986 - limit window.screen & CSS media queries leaking identifiable info (FF41+)
       [NOTE] Info only: To set a size, open a XUL (chrome) page (such as about:config) which is at
       100% zoom, hit Shift+F4 to open the scratchpad, type window.resizeTo(1366,768), hit Ctrl+R to run.
       Test your window size, do some math, resize to allow for all the non inner window elements

From 8a86097997cf56735475da2233f689faab4c3ce9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Apr 2019 11:10:15 +0000
Subject: [PATCH 0305/1147] 1820s: GMP: remove three prefs, see #709

---
 user.js | 5 +----
 1 file changed, 1 insertion(+), 4 deletions(-)

diff --git a/user.js b/user.js
index fcb8785..14e824d 100644
--- a/user.js
+++ b/user.js
@@ -1024,10 +1024,7 @@ user_pref("plugin.scan.plid.all", false);
 /* 1820: disable all GMP (Gecko Media Plugins) [SETUP-WEB]
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
 user_pref("media.gmp-provider.enabled", false);
-user_pref("media.gmp.trial-create.enabled", false);
-user_pref("media.gmp-manager.url", "data:text/plain,");
-user_pref("media.gmp-manager.url.override", "data:text/plain,"); // [HIDDEN PREF]
-user_pref("media.gmp-manager.updateEnabled", false); // disable local fallback [HIDDEN PREF]
+user_pref("media.gmp-manager.updateEnabled", false); // HIDDEN PREF]
 /* 1825: disable widevine CDM (Content Decryption Module) [SETUP-WEB] ***/
 user_pref("media.gmp-widevinecdm.visible", false);
 user_pref("media.gmp-widevinecdm.enabled", false);

From b4a48562237e3b25a2488afa8c36088947f07f81 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Apr 2019 11:12:11 +0000
Subject: [PATCH 0306/1147] 3 x GMP prefs, see #709

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index f5eb3c3..e48fb22 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -128,6 +128,9 @@
     'browser.cache.disk.smart_size.enabled',
     'browser.cache.disk.smart_size.first_run',
     'canvas.capturestream.enabled',
+    'media.gmp-manager.url',
+    'media.gmp-manager.url.override',
+    'media.gmp.trial-create.enabled',
     'pdfjs.enableWebGL',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'

From 8d874401fa7802363be1a94dd0a447f88635d397 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Apr 2019 12:56:27 +0000
Subject: [PATCH 0307/1147] pre FF61 deprecated -> archive

This is all archived in the sticky at the end of the first post
---
 user.js | 385 +-------------------------------------------------------
 1 file changed, 2 insertions(+), 383 deletions(-)

diff --git a/user.js b/user.js
index 14e824d..c70d519 100644
--- a/user.js
+++ b/user.js
@@ -1810,392 +1810,11 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
-     Documentation denoted as [-]. Numbers may be re-used. See [1] for a link-clickable,
-     viewer-friendly version of the deprecated bugzilla tickets. The original state of each pref
-     has been preserved, or changed to match the current setup, but you are advised to review them.
-     [NOTE] Up to FF53, to enable a section change /* FFxx to // FFxx
-     For FF53 on, we have bundled releases to cater for ESR. Change /* to // on the first line
+     Documentation denoted as [-]. Items deprecated prior to FF61 have been archived at [1], which
+     also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
      [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/123
 ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
-/* FF42 and older
-// 2604: (25+) disable page thumbnails - replaced by browser.pagethumbnails.capturing_disabled
-   // [-] https://bugzilla.mozilla.org/897811
-user_pref("pageThumbs.enabled", false);
-// 2503: (31+) disable network API - replaced by dom.netinfo.enabled
-   // [-] https://bugzilla.mozilla.org/960426
-user_pref("dom.network.enabled", false);
-// 2600's: (35+) disable WebSockets
-   // [-] https://bugzilla.mozilla.org/1091016
-user_pref("network.websocket.enabled", false);
-// 1610: (36+) set DNT "value" to "not be tracked" [FF21+]
-   // [1] http://kb.mozillazine.org/Privacy.donottrackheader.value
-   // [-] https://bugzilla.mozilla.org/1042135#c101
-   // user_pref("privacy.donottrackheader.value", 1);
-// 2023: (37+) disable camera autofocus callback
-   // The API will be superseded by the WebRTC Capture and Stream API
-   // [1] https://developer.mozilla.org/docs/Archive/B2G_OS/API/CameraControl
-   // [-] https://bugzilla.mozilla.org/1107683
-user_pref("camera.control.autofocus_moving_callback.enabled", false);
-// 0415: (41+) disable reporting URLs (safe browsing) - removed or replaced by various
-   // [-] https://bugzilla.mozilla.org/1109475
-user_pref("browser.safebrowsing.reportErrorURL", ""); // browser.safebrowsing.reportPhishMistakeURL
-user_pref("browser.safebrowsing.reportGenericURL", ""); // removed
-user_pref("browser.safebrowsing.reportMalwareErrorURL", ""); // browser.safebrowsing.reportMalwareMistakeURL
-user_pref("browser.safebrowsing.reportMalwareURL", ""); // removed
-user_pref("browser.safebrowsing.reportURL", ""); // removed
-// 0702: (41+) disable HTTP2 (draft)
-   // [-] https://bugzilla.mozilla.org/1132357
-user_pref("network.http.spdy.enabled.http2draft", false);
-// 1804: (41+) disable plugin enumeration
-   // [-] https://bugzilla.mozilla.org/1169945
-user_pref("plugins.enumerable_names", "");
-// 2803: (42+) clear passwords on shutdown
-   // [-] https://bugzilla.mozilla.org/1102184
-   // user_pref("privacy.clearOnShutdown.passwords", false);
-// 5002: (42+) disable warning when a domain requests full screen
-   // replaced by setting full-screen-api.warning.timeout to zero
-   // [-] https://bugzilla.mozilla.org/1160017
-   // user_pref("full-screen-api.approval-required", false);
-// ***/
-/* FF43
-// 0410's: disable safebrowsing urls & updates - replaced by various
-   // [-] https://bugzilla.mozilla.org/1107372
-   // user_pref("browser.safebrowsing.gethashURL", ""); // browser.safebrowsing.provider.google.gethashURL
-   // user_pref("browser.safebrowsing.updateURL", ""); // browser.safebrowsing.provider.google.updateURL
-user_pref("browser.safebrowsing.malware.reportURL", ""); // browser.safebrowsing.provider.google.reportURL
-// 0420's: disable tracking protection - replaced by various
-   // [-] https://bugzilla.mozilla.org/1107372
-   // user_pref("browser.trackingprotection.gethashURL", ""); // browser.safebrowsing.provider.mozilla.gethashURL
-   // user_pref("browser.trackingprotection.updateURL", ""); // browser.safebrowsing.provider.mozilla.updateURL
-// 1803: remove plugin finder service
-   // [1] http://kb.mozillazine.org/Pfs.datasource.url
-   // [-] https://bugzilla.mozilla.org/1202193
-user_pref("pfs.datasource.url", "");
-// 5003: disable new search panel UI
-   // [-] https://bugzilla.mozilla.org/1119250
-   // user_pref("browser.search.showOneOffButtons", false);
-// ***/
-/* FF44
-// 0414: disable safebrowsing's real-time binary checking (google) [FF43+]
-   // [-] https://bugzilla.mozilla.org/1237103
-user_pref("browser.safebrowsing.provider.google.appRepURL", ""); // browser.safebrowsing.appRepURL
-// 1200's: block rc4 whitelist
-   // [-] https://bugzilla.mozilla.org/1215796
-user_pref("security.tls.insecure_fallback_hosts.use_static_list", false);
-// 2300's: disable SharedWorkers
-   // [1] https://trac.torproject.org/projects/tor/ticket/15562
-   // [-] https://bugzilla.mozilla.org/1207635
-user_pref("dom.workers.sharedWorkers.enabled", false);
-// 2403: disable scripts changing images
-   // [TEST] https://www.w3schools.com/jsref/tryit.asp?filename=tryjsref_img_src2
-   // [-] https://bugzilla.mozilla.org/773429
-   // user_pref("dom.disable_image_src_set", true);
-// ***/
-/* FF45
-// 1021b: disable deferred level of storing extra session data 0=all 1=http-only 2=none
-   // extra session data contains contents of forms, scrollbar positions, cookies and POST data
-   // [-] https://bugzilla.mozilla.org/1235379
-user_pref("browser.sessionstore.privacy_level_deferred", 2);
-// ***/
-/* FF46
-// 0340: disable health report
-   // [-] https://bugzilla.mozilla.org/1234526
-user_pref("datareporting.healthreport.service.enabled", false); // [HIDDEN PREF]
-user_pref("datareporting.healthreport.documentServerURI", ""); // [HIDDEN PREF]
-// 0341: disable FHR (Firefox Health Report) v2 data being sent to Mozilla servers
-   // [-] https://bugzilla.mozilla.org/1234522
-user_pref("datareporting.policy.dataSubmissionEnabled.v2", false);
-// 0414: disable safebrowsing pref - replaced by browser.safebrowsing.downloads.remote.url
-   // [-] https://bugzilla.mozilla.org/1239587
-user_pref("browser.safebrowsing.appRepURL", ""); // Google application reputation check
-// 0420: disable polaris (part of Tracking Protection, never used in stable)
-   // [-] https://bugzilla.mozilla.org/1235565
-   // user_pref("browser.polaris.enabled", false);
-// 0510: disable "Pocket" [FF39+] - replaced by extensions.pocket.*
-   // [-] https://bugzilla.mozilla.org/1215694
-user_pref("browser.pocket.enabled", false);
-user_pref("browser.pocket.api", "");
-user_pref("browser.pocket.site", "");
-user_pref("browser.pocket.oAuthConsumerKey", "");
-// ***/
-/* FF47
-// 0330b: set unifiedIsOptIn to make sure telemetry respects OptIn choice and that telemetry
-   // is enabled ONLY for people that opted into it, even if unified Telemetry is enabled
-   // [-] https://bugzilla.mozilla.org/1236580
-user_pref("toolkit.telemetry.unifiedIsOptIn", true); // [HIDDEN PREF]
-// 0340b: disable about:healthreport page UNIFIED
-   // [-] https://bugzilla.mozilla.org/1236580
-user_pref("datareporting.healthreport.about.reportUrlUnified", "data:text/plain,");
-// 0807: disable history manipulation
-   // [1] https://developer.mozilla.org/docs/Web/API/History_API
-   // [-] https://bugzilla.mozilla.org/1249542
-user_pref("browser.history.allowPopState", false);
-user_pref("browser.history.allowPushState", false);
-user_pref("browser.history.allowReplaceState", false);
-// ***/
-/* FF48
-// 0806: disable 'unified complete': 'Search with [default search engine]'
-   // [-] http://techdows.com/2016/05/firefox-unified-complete-aboutconfig-preference-removed.html
-   // [-] https://bugzilla.mozilla.org/1181078
-user_pref("browser.urlbar.unifiedcomplete", false);
-// ***/
-/* FF49
-// 0372: disable "Hello"
-   // [1] https://www.mozilla.org/privacy/archive/hello/2016-03/
-   // [2] https://security.stackexchange.com/questions/94284/how-secure-is-firefox-hello
-   // [-] https://bugzilla.mozilla.org/1287827
-user_pref("loop.enabled", false);
-user_pref("loop.server", "");
-user_pref("loop.feedback.formURL", "");
-user_pref("loop.feedback.manualFormURL", "");
-user_pref("loop.facebook.appId", "");
-user_pref("loop.facebook.enabled", false);
-user_pref("loop.facebook.fallbackUrl", "");
-user_pref("loop.facebook.shareUrl", "");
-user_pref("loop.logDomains", false);
-// 2201: disable new window scrollbars being hidden
-   // [-] https://bugzilla.mozilla.org/1257887
-user_pref("dom.disable_window_open_feature.scrollbars", true);
-// 2303: disable push notification (UDP wake-up)
-   // [-] https://bugzilla.mozilla.org/1265914
-user_pref("dom.push.udp.wakeupEnabled", false);
-// ***/
-/* FF50
-// 0101: disable Windows10 intro on startup [WINDOWS]
-   // [-] https://bugzilla.mozilla.org/1274633
-user_pref("browser.usedOnWindows10.introURL", "");
-// 0308: disable plugin update notifications
-   // [-] https://bugzilla.mozilla.org/1277905
-user_pref("plugins.update.notifyUser", false);
-// 0410: disable "Block dangerous and deceptive content" - replaced by browser.safebrowsing.phishing.enabled
-   // [-] https://bugzilla.mozilla.org/1025965
-   // user_pref("browser.safebrowsing.enabled", false);
-// 1266: disable rc4 ciphers
-   // [1] https://trac.torproject.org/projects/tor/ticket/17369
-   // [-] https://bugzilla.mozilla.org/1268728
-   // [-] https://www.fxsitecompat.com/en-CA/docs/2016/rc4-support-has-been-completely-removed/
-user_pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false);
-user_pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false);
-user_pref("security.ssl3.rsa_rc4_128_md5", false);
-user_pref("security.ssl3.rsa_rc4_128_sha", false);
-// 1809: remove Mozilla's plugin update URL
-   // [-] https://bugzilla.mozilla.org/1277905
-user_pref("plugins.update.url", "");
-// ***/
-/* FF51
-// 0702: disable SPDY
-   // [-] https://bugzilla.mozilla.org/1248197
-user_pref("network.http.spdy.enabled.v3-1", false);
-// 1851: delay play of videos until they're visible
-   // [1] https://bugzilla.mozilla.org/1180563
-   // [-] https://bugzilla.mozilla.org/1262053
-user_pref("media.block-play-until-visible", true);
-// 2504: disable virtual reality devices
-   // [-] https://bugzilla.mozilla.org/1250244
-user_pref("dom.vr.oculus050.enabled", false);
-// ***/
-/* FF52
-// 1601: disable referer from an SSL Website
-   // [-] https://bugzilla.mozilla.org/1308725
-user_pref("network.http.sendSecureXSiteReferrer", false);
-// 1850: disable Adobe EME "Primetime CDM" (Content Decryption Module)
-   // [1] https://trac.torproject.org/projects/tor/ticket/16285
-   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1329538,1337121 // FF52
-   // [-] https://bugzilla.mozilla.org/1329543 // FF53
-user_pref("media.gmp-eme-adobe.enabled", false);
-user_pref("media.gmp-eme-adobe.visible", false);
-user_pref("media.gmp-eme-adobe.autoupdate", false);
-// 2405: disable WebTelephony API
-   // [1] https://wiki.mozilla.org/WebAPI/Security/WebTelephony
-   // [-] https://bugzilla.mozilla.org/1309719
-user_pref("dom.telephony.enabled", false);
-// ***/
-/* FF53
-// 1265: block rc4 fallback
-   // [-] https://bugzilla.mozilla.org/1130670
-user_pref("security.tls.unrestricted_rc4_fallback", false);
-// 1806: disable Acrobat, Quicktime, WMP (the string = min version number allowed)
-   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1317108,1317109,1317110
-user_pref("plugin.scan.Acrobat", "99999");
-user_pref("plugin.scan.Quicktime", "99999");
-user_pref("plugin.scan.WindowsMediaPlayer", "99999");
-// 2022: disable screensharing
-   // [-] https://bugzilla.mozilla.org/1329562
-user_pref("media.getusermedia.screensharing.allow_on_old_platforms", false);
-// 2507: disable keyboard fingerprinting
-   // [-] https://bugzilla.mozilla.org/1322736
-user_pref("dom.beforeAfterKeyboardEvent.enabled", false);
-// ***/
-/* FF54
-// 0415: disable reporting URLs (safe browsing)
-   // [-] https://bugzilla.mozilla.org/1288633
-user_pref("browser.safebrowsing.reportMalwareMistakeURL", "");
-user_pref("browser.safebrowsing.reportPhishMistakeURL", "");
-// 1830: block websites detecting DRM is disabled
-   // [-] https://bugzilla.mozilla.org/1242321
-user_pref("media.eme.apiVisible", false);
-// 2425: disable Archive Reader API
-   // i.e. reading archive contents directly in the browser, through DOM file objects
-   // [-] https://bugzilla.mozilla.org/1342361
-user_pref("dom.archivereader.enabled", false);
-// ***/
-/* FF55
-// 0209: disable geolocation on non-secure origins [FF54+]
-   // [1] https://bugzilla.mozilla.org/1269531
-   // [-] https://bugzilla.mozilla.org/1072859
-user_pref("geo.security.allowinsecure", false);
-// 0336: disable "Heartbeat" (Mozilla user rating telemetry) [FF37+]
-   // [1] https://trac.torproject.org/projects/tor/ticket/18738
-   // [-] https://bugzilla.mozilla.org/1361578
-user_pref("browser.selfsupport.enabled", false); // [HIDDEN PREF]
-user_pref("browser.selfsupport.url", "");
-// 0360: disable new tab "pings"
-   // [-] https://bugzilla.mozilla.org/1241390
-user_pref("browser.newtabpage.directory.ping", "data:text/plain,");
-// 0861: disable saving form history on secure websites
-   // [-] https://bugzilla.mozilla.org/1361220
-user_pref("browser.formfill.saveHttpsForms", false);
-// 0863: disable Form Autofill [FF54+] - replaced by extensions.formautofill.*
-   // [-] https://bugzilla.mozilla.org/1364334
-user_pref("browser.formautofill.enabled", false);
-// 2410: disable User Timing API
-   // [1] https://trac.torproject.org/projects/tor/ticket/16336
-   // [-] https://bugzilla.mozilla.org/1344669
-user_pref("dom.enable_user_timing", false);
-// 2507: disable keyboard fingerprinting (physical keyboards) [FF38+]
-   // The Keyboard API allows tracking the "read parameter" of pressed keys in forms on
-   // web pages. These parameters vary between types of keyboard layouts such as QWERTY,
-   // AZERTY, Dvorak, and between various languages, e.g. German vs English.
-   // [WARNING] Don't use if Android + physical keyboard
-   // [1] https://developer.mozilla.org/docs/Web/API/KeyboardEvent/code
-   // [2] https://www.privacy-handbuch.de/handbuch_21v.htm
-   // [-] https://bugzilla.mozilla.org/1352949
-user_pref("dom.keyboardevent.code.enabled", false);
-// 5015: disable tab animation - replaced by toolkit.cosmeticAnimations.enabled
-   // [-] https://bugzilla.mozilla.org/1352069
-user_pref("browser.tabs.animate", false);
-// 5016: disable fullscreeen animation - replaced by toolkit.cosmeticAnimations.enabled
-   // [-] https://bugzilla.mozilla.org/1352069
-user_pref("browser.fullscreen.animate", false);
-// ***/
-/* FF56
-// 0515: disable Screenshots (rollout pref only) [FF54+]
-   // [-] https://bugzilla.mozilla.org/1386333
-   // user_pref("extensions.screenshots.system-disabled", true);
-// 0517: disable Form Autofill [FF55+] - replaced by extensions.formautofill.available
-   // [-] https://bugzilla.mozilla.org/1385201
-user_pref("extensions.formautofill.experimental", false);
-// ***/
-/* FF57
-// 0374: disable "social" integration
-   // [1] https://developer.mozilla.org/docs/Mozilla/Projects/Social_API
-   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1388902,1406193 (some leftovers were removed in FF58)
-user_pref("social.whitelist", "");
-user_pref("social.toast-notifications.enabled", false);
-user_pref("social.shareDirectory", "");
-user_pref("social.remote-install.enabled", false);
-user_pref("social.directories", "");
-user_pref("social.share.activationPanelEnabled", false);
-user_pref("social.enabled", false); // [HIDDEN PREF]
-// 1830: disable DRM's EME WideVineAdapter [FF55+]
-   // [-] https://bugzilla.mozilla.org/1395468
-user_pref("media.eme.chromium-api.enabled", false);
-// 2608: disable WebIDE extension downloads (Valence)
-   // [1] https://trac.torproject.org/projects/tor/ticket/16222
-   // [-] https://bugzilla.mozilla.org/1393497
-user_pref("devtools.webide.autoinstallFxdtAdapters", false);
-user_pref("devtools.webide.adaptersAddonURL", "");
-// 2600's: disable SimpleServiceDiscovery - which can bypass proxy settings - e.g. Roku
-   // [1] https://trac.torproject.org/projects/tor/ticket/16222
-   // [-] https://bugzilla.mozilla.org/1393582
-user_pref("browser.casting.enabled", false);
-// 5022: hide recently bookmarked items (you still have the original bookmarks) [FF49+]
-   // [-] https://bugzilla.mozilla.org/1401238
-user_pref("browser.bookmarks.showRecentlyBookmarked", false);
-// ***/
-/* FF58
-// 0351: disable sending of crash reports [FF51+] - replaced by *.autoSubmit2
-   // [-] https://bugzilla.mozilla.org/1424373
-user_pref("browser.crashReports.unsubmittedCheck.autoSubmit", false);
-// ***/
-/* FF59
-// 0203: disable using OS locale, force APP locale - replaced by intl.locale.requested
-   // [-] https://bugzilla.mozilla.org/1414390
-user_pref("intl.locale.matchOS", false);
-// 0204: set APP locale - replaced by intl.locale.requested
-   // [-] https://bugzilla.mozilla.org/1414390
-user_pref("general.useragent.locale", "en-US");
-// 0340b: disable about:healthreport page (which connects to Mozilla for locale/css+js+json)
-   // If you have disabled health reports, then this about page is useless - disable it
-   // If you want to see what health data is present, then this must be set at default
-   // [-] https://bugzilla.mozilla.org/1352497
-user_pref("datareporting.healthreport.about.reportUrl", "data:,");
-// 0511: disable FlyWeb [FF49+]
-   // Flyweb is a set of APIs for advertising and discovering local-area web servers
-   // [1] https://flyweb.github.io/
-   // [2] https://wiki.mozilla.org/FlyWeb/Security_scenarios
-   // [3] https://www.ghacks.net/2016/07/26/firefox-flyweb/
-   // [-] https://bugzilla.mozilla.org/1374574
-user_pref("dom.flyweb.enabled", false);
-// 1007: disable randomized FF HTTP cache decay experiments
-   // [1] https://trac.torproject.org/projects/tor/ticket/13575
-   // [-] https://bugzilla.mozilla.org/1430197
-user_pref("browser.cache.frecency_experiment", -1);
-// 1242: enable Mixed-Content-Blocker to use the HSTS cache but disable the HSTS Priming requests [FF51+]
-   // Allow resources from domains with an existing HSTS cache record or in the HSTS preload list
-   // to be upgraded to HTTPS internally but disable sending out HSTS Priming requests, because
-   // those may cause noticeable delays e.g. requests time out or are not handled well by servers
-   // [NOTE] If you want to use the priming requests make sure 'use_hsts' is also true
-   // [1] https://bugzilla.mozilla.org/1246540#c145
-   // [-] https://bugzilla.mozilla.org/1424917
-user_pref("security.mixed_content.use_hsts", true);
-user_pref("security.mixed_content.send_hsts_priming", false);
-// 1606: set the default Referrer Policy [FF53+] - replaced by network.http.referer.defaultPolicy
-   // [-] https://bugzilla.mozilla.org/587523
-user_pref("network.http.referer.userControlPolicy", 3);
-// 1804: disable plugins using external/untrusted scripts with XPCOM or XPConnect
-   // [-] (part8) https://bugzilla.mozilla.org/1416703#c21
-user_pref("security.xpconnect.plugin.unrestricted", false);
-// 2022: disable screensharing domain whitelist
-   // [-] https://bugzilla.mozilla.org/1411742
-user_pref("media.getusermedia.screensharing.allowed_domains", "");
-// 2023: disable camera stuff
-   // [-] (part7) https://bugzilla.mozilla.org/1416703#c21
-user_pref("camera.control.face_detection.enabled", false);
-// 2202: prevent scripts from changing the status text
-   // [-] https://bugzilla.mozilla.org/1425999
-user_pref("dom.disable_window_status_change", true);
-// 2416: disable idle observation
-   // [-] (part7) https://bugzilla.mozilla.org/1416703#c21
-user_pref("dom.idle-observers-api.enabled", false);
-// ***/
-/* FF60
-// 0360: disable new tab tile ads & preload & marketing junk
-   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1370930,1433133
-user_pref("browser.newtabpage.directory.source", "data:text/plain,");
-user_pref("browser.newtabpage.enhanced", false);
-user_pref("browser.newtabpage.introShown", true);
-// 0512: disable Shield [FF53+] - renamed to app.normandy.* (see 0503)
-   // Shield is an telemetry system (including Heartbeat) that can also push and test "recipes"
-   // [1] https://wiki.mozilla.org/Firefox/Shield
-   // [2] https://github.com/mozilla/normandy
-   // [-] https://bugzilla.mozilla.org/1436113
-user_pref("extensions.shield-recipe-client.enabled", false);
-user_pref("extensions.shield-recipe-client.api_url", "");
-// 0514: disable Activity Stream [FF54+]
-   // [-] https://bugzilla.mozilla.org/1433324
-user_pref("browser.newtabpage.activity-stream.enabled", false);
-// 2301: disable workers
-   // Disabling workers *will* break sites (e.g. Google Street View, Twitter)
-   // [NOTE] CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed)
-   // [-] https://bugzilla.mozilla.org/1434934
-user_pref("dom.workers.enabled", false);
-// 5000's: open "page/selection source" in a new window
-   // [-] https://bugzilla.mozilla.org/1418403
-   // user_pref("view_source.tab", false);
-// ***/
-
 /* ESR60.x still uses all the following prefs
 // [NOTE] replace the * with a slash in the line above to re-enable them
 // FF61

From 4119be3a860e811b00b78532eb68b855f3cfbf10 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Apr 2019 13:10:04 +0000
Subject: [PATCH 0308/1147] typo

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index c70d519..1751984 100644
--- a/user.js
+++ b/user.js
@@ -1024,7 +1024,7 @@ user_pref("plugin.scan.plid.all", false);
 /* 1820: disable all GMP (Gecko Media Plugins) [SETUP-WEB]
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
 user_pref("media.gmp-provider.enabled", false);
-user_pref("media.gmp-manager.updateEnabled", false); // HIDDEN PREF]
+user_pref("media.gmp-manager.updateEnabled", false); // [HIDDEN PREF]
 /* 1825: disable widevine CDM (Content Decryption Module) [SETUP-WEB] ***/
 user_pref("media.gmp-widevinecdm.visible", false);
 user_pref("media.gmp-widevinecdm.enabled", false);

From 8ffbd818132391149714f8e54e93fe8c2c40cdc9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 04:30:59 +0000
Subject: [PATCH 0309/1147] remove SB & TP see #710

- SB: disabling it nothing to enhance privacy/security etc if changed from default
- SB: I will not provide the prefs or encourage users to disable these, especially given that there is a UI
- SB: the urls are redundant
- SB: note: the binary checks stays
- TP section is out of date (or soon will be), I'm not maintaining it, it has a UI and is best handled there
---
 user.js | 105 +++++++++-----------------------------------------------
 1 file changed, 16 insertions(+), 89 deletions(-)

diff --git a/user.js b/user.js
index 1751984..788db22 100644
--- a/user.js
+++ b/user.js
@@ -44,7 +44,7 @@
      0100: STARTUP
      0200: GEOLOCATION
      0300: QUIET FOX
-     0400: BLOCKLISTS / SAFE BROWSING / TRACKING PROTECTION
+     0400: BLOCKLISTS / SAFE BROWSING
      0500: SYSTEM ADD-ONS / EXPERIMENTS
      0600: BLOCK IMPLICIT OUTBOUND
      0700: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc
@@ -275,67 +275,28 @@ user_pref("network.captive-portal-service.enabled", false); // [FF52+]
  * [1] https://bugzilla.mozilla.org/1460537 ***/
 user_pref("network.connectivity-service.enabled", false);
 
-/*** [SECTION 0400]: BLOCKLISTS / SAFE BROWSING / TRACKING PROTECTION
-     This section has security & tracking protection implications vs privacy concerns vs effectiveness
-     vs 3rd party 'censorship'. We DO NOT advocate no protection. If you disable Tracking Protection (TP)
-     and/or Safe Browsing (SB), then SECTION 0400 REQUIRES YOU HAVE uBLOCK ORIGIN INSTALLED.
+/*** [SECTION 0400]: BLOCKLISTS / SAFE BROWSING (SB)
+     Safe Browsing has taken many steps to preserve privacy. *IF* required, a full url is never
+     sent to Google, only a PART-hash of the prefix, and this is hidden with noise of other real
+     PART-hashes. Google also swear it is anonymized and only used to flag malicious sites.
+     Firefox also takes measures such as striping out identifying parameters and since SBv4 (FF57+)
+     doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
 
-     Safe Browsing is designed to protect users from malicious sites. Tracking Protection is designed
-     to lessen the impact of third parties on websites to reduce tracking and to speed up your browsing.
-     These do rely on 3rd parties (Google for SB and Disconnect for TP), but many steps, which are
-     continually being improved, have been taken to preserve privacy. Disable at your own risk.
+     #Required reading [#] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
+     [1] https://wiki.mozilla.org/Security/Safe_Browsing
 ***/
 user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
-/** BLOCKLISTS ***/
-/* 0401: enable Firefox blocklist, but sanitize blocklist url
+/* 0401: enforce Firefox blocklist, but sanitize blocklist url
  * [NOTE] It includes updates for "revoked certificates"
  * [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/
  * [2] https://trac.torproject.org/projects/tor/ticket/16931 ***/
 user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
 user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
-/* 0403: disable individual unwanted/unneeded parts of the Kinto blocklists
- * What is Kinto?: https://wiki.mozilla.org/Firefox/Kinto#Specifications
- * As Firefox transitions to Kinto, the blocklists have been broken down into entries for certs to be
- * revoked, extensions and plugins to be disabled, and gfx environments that cause problems or crashes ***/
-   // user_pref("services.blocklist.onecrl.collection", ""); // revoked certificates
-   // user_pref("services.blocklist.addons.collection", "");
-   // user_pref("services.blocklist.plugins.collection", "");
-   // user_pref("services.blocklist.gfx.collection", "");
-
-/** SAFE BROWSING (SB)
-    This sub-section has been redesigned to differentiate between "real-time"/"user initiated" data
-    being sent to Google from all other settings such as using local blocklists/whitelists and updating
-    those lists. There are NO privacy issues here. *IF* required, a full url is never sent to Google,
-    only a PART-hash of the prefix, and this is hidden with noise of other real PART-hashes. Google also
-    swear it is anonymized and only used to flag malicious sites/activity. Firefox also takes measures
-    such as striping out identifying parameters and storing safe browsing cookies in a separate jar.
-    SB v4 (FF57+) doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
-    #Required reading [#] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
-    [1] https://wiki.mozilla.org/Security/Safe_Browsing ***/
-/* 0410: disable "Block dangerous and deceptive content"
- * This covers deceptive sites such as phishing and social engineering
- * [SETTING] Privacy & Security>Security>Deceptive Content and Software Protection ***/
-   // user_pref("browser.safebrowsing.malware.enabled", false);
-   // user_pref("browser.safebrowsing.phishing.enabled", false); // [FF50+]
-/* 0411: disable "Block dangerous downloads"
- * This covers malware and PUPs (potentially unwanted programs)
- * [SETTING] Privacy & Security>Security>Deceptive Content and Software Protection ***/
-   // user_pref("browser.safebrowsing.downloads.enabled", false);
-/* 0412: disable "Warn me about unwanted and uncommon software"
- * [SETTING] Privacy & Security>Security>Deceptive Content and Software Protection ***/
-   // user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false); // [FF48+]
-   // user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false); // [FF48+]
-   // user_pref("browser.safebrowsing.downloads.remote.block_dangerous", false); // [FF49+]
-   // user_pref("browser.safebrowsing.downloads.remote.block_dangerous_host", false); // [FF49+]
-/* 0413: disable Google safebrowsing updates ***/
-   // user_pref("browser.safebrowsing.provider.google.updateURL", "");
-   // user_pref("browser.safebrowsing.provider.google.gethashURL", "");
-   // user_pref("browser.safebrowsing.provider.google4.updateURL", ""); // [FF50+]
-   // user_pref("browser.safebrowsing.provider.google4.gethashURL", ""); // [FF50+]
-/* 0414: disable binaries NOT in local lists being checked by Google (real-time checking) ***/
+/* 0402: disable binaries NOT in Safe Browsing local lists being checked
+ * [SETUP-WEB] This is a real-time check with Google. If you want this protection, turn it on ***/
 user_pref("browser.safebrowsing.downloads.remote.enabled", false);
 user_pref("browser.safebrowsing.downloads.remote.url", "");
-/* 0415: disable reporting URLs ***/
+/* 0403: disable reporting URLs ***/
 user_pref("browser.safebrowsing.provider.google.reportURL", "");
 user_pref("browser.safebrowsing.reportPhishURL", "");
 user_pref("browser.safebrowsing.provider.google4.reportURL", ""); // [FF50+]
@@ -343,43 +304,15 @@ user_pref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", ""); /
 user_pref("browser.safebrowsing.provider.google.reportPhishMistakeURL", ""); // [FF54+]
 user_pref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", ""); // [FF54+]
 user_pref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", ""); // [FF54+]
-/* 0416: disable 'ignore this warning' on Safe Browsing warnings
+/* 0404: disable 'ignore this warning' on Safe Browsing warnings
  * If clicked, it bypasses the block for that session. This is a means for admins to enforce SB
  * [TEST] see github wiki APPENDIX A: Test Sites: Section 5
  * [1] https://bugzilla.mozilla.org/1226490 ***/
    // user_pref("browser.safebrowsing.allowOverride", false);
-/* 0417: disable data sharing [FF58+] ***/
+/* 0405: disable data sharing [FF58+] ***/
 user_pref("browser.safebrowsing.provider.google4.dataSharing.enabled", false);
 user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
 
-/** TRACKING PROTECTION (TP)
-    There are NO privacy concerns here, but we strongly recommend to use uBlock Origin as well,
-    as it offers more comprehensive and specialized lists. It also allows per domain control. ***/
-/* 0420: enable Tracking Protection in all windows
- * [NOTE] TP sends DNT headers regardless of the DNT pref (see 1610)
- * [1] https://wiki.mozilla.org/Security/Tracking_protection
- * [2] https://support.mozilla.org/kb/tracking-protection-firefox ***/
-   // user_pref("privacy.trackingprotection.pbmode.enabled", true); // [DEFAULT: true]
-   // user_pref("privacy.trackingprotection.enabled", true);
-/* 0422: set which Tracking Protection block list to use
- * [WARNING] We don't recommend enforcing this from here, as available block lists can change
- * [SETTING] Privacy & Security>Content Blocking>All Detected Trackers>Change block list ***/
-   // user_pref("urlclassifier.trackingTable", "test-track-simple,base-track-digest256"); // basic
-/* 0423: disable Mozilla's blocklist for known Flash tracking/fingerprinting [FF48+]
- * [1] https://www.ghacks.net/2016/07/18/firefox-48-blocklist-against-plugin-fingerprinting/
- * [2] https://bugzilla.mozilla.org/1237198 ***/
-   // user_pref("browser.safebrowsing.blockedURIs.enabled", false);
-/* 0424: disable Mozilla's tracking protection and Flash blocklist updates ***/
-   // user_pref("browser.safebrowsing.provider.mozilla.gethashURL", "");
-   // user_pref("browser.safebrowsing.provider.mozilla.updateURL", "");
-/* 0425: disable passive Tracking Protection [FF53+]
- * Passive TP annotates channels to lower the priority of network loads for resources on the tracking protection list
- * [NOTE] It has no effect if TP is enabled, but keep in mind that by default TP is only enabled in Private Windows
- * This is included for people who want to completely disable Tracking Protection.
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1170190,1141814 ***/
-   // user_pref("privacy.trackingprotection.annotate_channels", false);
-   // user_pref("privacy.trackingprotection.lower_network_priority", false);
-
 /*** [SECTION 0500]: SYSTEM ADD-ONS / EXPERIMENTS
      System Add-ons are a method for shipping extensions, considered to be
      built-in features to Firefox, that are hidden from the about:addons UI.
@@ -974,7 +907,7 @@ user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
  * [1] https://bugzilla.mozilla.org/1305144 ***/
 user_pref("network.http.referer.hideOnionSource", true);
 /* 1610: ALL: enable the DNT (Do Not Track) HTTP header
- * [NOTE] DNT is enforced with TP (see 0420) regardless of this pref
+ * [NOTE] DNT is enforced with Tracking Protection regardless of this pref
  * [SETTING] Privacy & Security>Content Blocking>Send websites a "Do Not Track"... ***/
 user_pref("privacy.donottrackheader.enabled", true);
 
@@ -1848,12 +1781,6 @@ user_pref("browser.search.countryCode", "US"); // [HIDDEN PREF]
    // [SETTING] General>Firefox Updates>Never check for updates
    // [-] https://bugzilla.mozilla.org/1420514
    // user_pref("app.update.enabled", false);
-// 0402: enable Kinto blocklist updates [FF50+]
-   // What is Kinto?: https://wiki.mozilla.org/Firefox/Kinto#Specifications
-   // As Firefox transitions to Kinto, the blocklists have been broken down into entries for certs to be
-   // revoked, extensions and plugins to be disabled, and gfx environments that cause problems or crashes
-   // [-] https://bugzilla.mozilla.org/1458917
-user_pref("services.blocklist.update_enabled", true); // [DEFAULT: true]
 // 0503: disable "Savant" Shield study [FF61+]
    // [-] https://bugzilla.mozilla.org/1457226
 user_pref("shield.savant.enabled", false);

From ce3d5a8cbe5c8350654b7b31bfb826ff181b8391 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 04:52:58 +0000
Subject: [PATCH 0310/1147] 24 inactive SB+TP prefs, see #710

---
 scratchpad-scripts/ghacks-clear-[removed].js | 25 ++++++++++++++++++++
 1 file changed, 25 insertions(+)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index e48fb22..fd5d646 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -132,6 +132,31 @@
     'media.gmp-manager.url.override',
     'media.gmp.trial-create.enabled',
     'pdfjs.enableWebGL',
+    /* 67-beta: SB & TP cleanup: these were all inactive */
+    'browser.safebrowsing.downloads.enabled',
+    'browser.safebrowsing.downloads.remote.block_dangerous',
+    'browser.safebrowsing.downloads.remote.block_dangerous_host',
+    'browser.safebrowsing.downloads.remote.block_potentially_unwanted',
+    'browser.safebrowsing.downloads.remote.block_uncommon',
+    'browser.safebrowsing.blockedURIs.enabled',
+    'browser.safebrowsing.malware.enabled',
+    'browser.safebrowsing.phishing.enabled',
+    'browser.safebrowsing.provider.google.gethashURL',
+    'browser.safebrowsing.provider.google.updateURL',
+    'browser.safebrowsing.provider.google4.gethashURL',
+    'browser.safebrowsing.provider.google4.updateURL',
+    'browser.safebrowsing.provider.mozilla.gethashURL',
+    'browser.safebrowsing.provider.mozilla.updateURL',
+    'privacy.trackingprotection.annotate_channels',
+    'privacy.trackingprotection.enabled',
+    'privacy.trackingprotection.lower_network_priority',
+    'privacy.trackingprotection.pbmode.enabled',
+    'services.blocklist.update_enabled',
+    'services.blocklist.onecrl.collection',
+    'services.blocklist.addons.collection',
+    'services.blocklist.plugins.collection',
+    'services.blocklist.gfx.collection',
+    'urlclassifier.trackingTable',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From ed687fc7ca6535e149a873cb6a8d00c3e7bf0010 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 05:06:43 +0000
Subject: [PATCH 0311/1147] 1820: update -> inactive, see #709

At best disabling the background update of gmp means not only an extra item for those who wish to use it (e.g widevine, netflix) to have to deal with, but also a time delay in getting the actual download. At worst, it could cause users to use an old dll (security risk).

I will leave it in, for now, but am seriously considering removing it, so don't cry if I do.
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 788db22..bc7b6b8 100644
--- a/user.js
+++ b/user.js
@@ -957,7 +957,7 @@ user_pref("plugin.scan.plid.all", false);
 /* 1820: disable all GMP (Gecko Media Plugins) [SETUP-WEB]
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
 user_pref("media.gmp-provider.enabled", false);
-user_pref("media.gmp-manager.updateEnabled", false); // [HIDDEN PREF]
+   // user_pref("media.gmp-manager.updateEnabled", false); // [HIDDEN PREF]
 /* 1825: disable widevine CDM (Content Decryption Module) [SETUP-WEB] ***/
 user_pref("media.gmp-widevinecdm.visible", false);
 user_pref("media.gmp-widevinecdm.enabled", false);

From 579aa3aa9c8296293367670049374256cf4165f4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 05:27:16 +0000
Subject: [PATCH 0312/1147] 0402: tidy up, see #710

---
 user.js | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index bc7b6b8..b0bf1d0 100644
--- a/user.js
+++ b/user.js
@@ -20,6 +20,7 @@
   2. READ this
      * https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.3-Implementation
   3. If you skipped steps 1 and 2 above (shame on you), then here is the absolute minimum
+     * Real time binary checks with Google services are disabled (0402)
      * You will still get prompts to update Firefox, but auto-installing them is disabled (0302a)
      * Some user data is erased on close (section 2800). Change this to suit your needs
      * EACH RELEASE check:
@@ -32,9 +33,11 @@
      * You will need to make changes, and to troubleshoot at times (choose wisely, there is always a trade-off).
        While not 100% definitive, search for "[SETUP". If required, add each pref to your overrides section at
        default values (or comment them out and reset them in about:config). Here are the main ones:
+       [SETUP-SECURITY] it's one item, read it
             [SETUP-WEB] can cause some websites to break
          [SETUP-CHROME] changes how Firefox itself behaves (i.e. NOT directly website related)
            [SETUP-PERF] may impact performance
+         [SETUP-HARDEN] maybe you should consider using the Tor Browser
      * [WARNING] tags are extra special and used sparingly, so heed them
   4. BACKUP your profile folder before implementing (and/or test in a new/cloned profile)
   5. KEEP UP TO DATE: https://github.com/ghacksuserjs/ghacks-user.js/wiki#small_orange_diamond-maintenance
@@ -293,7 +296,8 @@ user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
 user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
 user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
 /* 0402: disable binaries NOT in Safe Browsing local lists being checked
- * [SETUP-WEB] This is a real-time check with Google. If you want this protection, turn it on ***/
+ * This is a real-time check with Google services.
+ * [SETUP-SECURITY] If you do not understand this, or if you want this protection, then override it ***/
 user_pref("browser.safebrowsing.downloads.remote.enabled", false);
 user_pref("browser.safebrowsing.downloads.remote.url", "");
 /* 0403: disable reporting URLs ***/

From 59930d46970f0d371c2802afa663a01fe1a2deb4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 05:29:53 +0000
Subject: [PATCH 0313/1147] 0402, remove redundant pref, see #709

---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index b0bf1d0..92c28ee 100644
--- a/user.js
+++ b/user.js
@@ -299,7 +299,6 @@ user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozi
  * This is a real-time check with Google services.
  * [SETUP-SECURITY] If you do not understand this, or if you want this protection, then override it ***/
 user_pref("browser.safebrowsing.downloads.remote.enabled", false);
-user_pref("browser.safebrowsing.downloads.remote.url", "");
 /* 0403: disable reporting URLs ***/
 user_pref("browser.safebrowsing.provider.google.reportURL", "");
 user_pref("browser.safebrowsing.reportPhishURL", "");

From 48f3dfec841704e0fadfb01f427352a91f9cece0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 05:31:17 +0000
Subject: [PATCH 0314/1147] browser.safebrowsing.downloads.remote.url

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index fd5d646..4e86ede 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 28-Apr-2019
+ Last updated: 29-Apr-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -127,6 +127,7 @@
     'browser.cache.disk.capacity',
     'browser.cache.disk.smart_size.enabled',
     'browser.cache.disk.smart_size.first_run',
+    'browser.safebrowsing.downloads.remote.url',
     'canvas.capturestream.enabled',
     'media.gmp-manager.url',
     'media.gmp-manager.url.override',

From b28677a59439f79dcd01d8e1c19ac5c8906b61ba Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 06:32:47 +0000
Subject: [PATCH 0315/1147] 1825: widevine update to inactive, see #709

- at worse, the update pref causes a security risk. I'll leave it in for now
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 92c28ee..5754d76 100644
--- a/user.js
+++ b/user.js
@@ -964,7 +964,7 @@ user_pref("media.gmp-provider.enabled", false);
 /* 1825: disable widevine CDM (Content Decryption Module) [SETUP-WEB] ***/
 user_pref("media.gmp-widevinecdm.visible", false);
 user_pref("media.gmp-widevinecdm.enabled", false);
-user_pref("media.gmp-widevinecdm.autoupdate", false);
+   // user_pref("media.gmp-widevinecdm.autoupdate", false);
 /* 1830: disable all DRM content (EME: Encryption Media Extension) [SETUP-WEB]
  * [SETTING] General>DRM Content>Play DRM-controlled content
  * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/

From 675577fb8dee5801275503475ace89d3233421c3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 11:12:05 +0000
Subject: [PATCH 0316/1147] 1800: remove redundant flash prefs, closes #714

---
 user.js | 11 +----------
 1 file changed, 1 insertion(+), 10 deletions(-)

diff --git a/user.js b/user.js
index 5754d76..14972be 100644
--- a/user.js
+++ b/user.js
@@ -939,24 +939,15 @@ user_pref("privacy.userContext.longPressBehavior", 2);
 
 /*** [SECTION 1800]: PLUGINS ***/
 user_pref("_user.js.parrot", "1800 syntax error: the parrot's pushing up daisies!");
-/* 1801: set default plugin state (i.e. new plugins on discovery) to never activate
- * 0=disabled, 1=ask to activate, 2=active - you can override individual plugins ***/
-user_pref("plugin.default.state", 0);
-user_pref("plugin.defaultXpi.state", 0);
 /* 1802: enable click to play and set to 0 minutes ***/
 user_pref("plugins.click_to_play", true);
 user_pref("plugin.sessionPermissionNow.intervalInMinutes", 0);
-/* 1803: disable Flash plugin (Add-ons>Plugins)
+/* 1803: disable Flash plugin
  * 0=deactivated, 1=ask, 2=enabled
  * ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash
  * [NOTE] You can still override individual sites via site permissions
  * [1] https://www.ghacks.net/2013/07/09/how-to-make-sure-that-a-firefox-plugin-never-activates-again/ ***/
 user_pref("plugin.state.flash", 0);
-/* 1805: disable scanning for plugins [WINDOWS]
- * [1] http://kb.mozillazine.org/Plugin_scanning
- * plid.all = whether to scan the directories specified in the Windows registry for PLIDs.
- * Used to detect RealPlayer, Java, Antivirus etc, but since FF52 only covers Flash ***/
-user_pref("plugin.scan.plid.all", false);
 /* 1820: disable all GMP (Gecko Media Plugins) [SETUP-WEB]
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
 user_pref("media.gmp-provider.enabled", false);

From 0eb107abf33b576a612407c585d1f45990e4aefc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 11:14:50 +0000
Subject: [PATCH 0317/1147] 3 x plugin prefs, see #714

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 4e86ede..2df664a 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -132,6 +132,9 @@
     'media.gmp-manager.url',
     'media.gmp-manager.url.override',
     'media.gmp.trial-create.enabled',
+    'plugin.default.state',
+    'plugin.defaultXpi.state',
+    'plugin.scan.plid.all',
     'pdfjs.enableWebGL',
     /* 67-beta: SB & TP cleanup: these were all inactive */
     'browser.safebrowsing.downloads.enabled',

From 50afeb18616f310bcd74b52eb8d1c01e3028064e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 17:14:23 +0000
Subject: [PATCH 0318/1147] 0205: -> inactive, closes #0707

---
 user.js | 7 +++++--
 1 file changed, 5 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 14972be..9891458 100644
--- a/user.js
+++ b/user.js
@@ -153,8 +153,11 @@ user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely decease
  * [2] https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections#w_geolocation-for-default-search-engine ***/
 user_pref("browser.search.region", "US"); // [HIDDEN PREF]
 user_pref("browser.search.geoip.url", "");
-/* 0205: set OS & APP locale [FF59+]
- * If set to empty, the OS locales are used. If not set at all, default locale is used ***/
+/* 0205: set Firefox language [FF59+] [RESTART]
+ * Go to the end of about:support to view Internationalization & Localization settings
+ * If set to empty, the OS locales are used. If not set at all, default locale is used
+ * This is the language used in menus, about pages, messages, and notifications from Firefox ***/
+   // user_pref("intl.locale.requested", "en-US"); // [HIDDEN PREF]
 user_pref("intl.locale.requested", "en-US"); // [HIDDEN PREF]
 /* 0206: disable geographically specific results/search engines e.g. "browser.search.*.US"
  * i.e. ignore all of Mozilla's various search engines in multiple locales ***/

From bb788682c979d71f8e0ba82d5e71857d013e08f4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 17:44:53 +0000
Subject: [PATCH 0319/1147] fixup: remove duplicate pref

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 9891458..be835bf 100644
--- a/user.js
+++ b/user.js
@@ -158,12 +158,12 @@ user_pref("browser.search.geoip.url", "");
  * If set to empty, the OS locales are used. If not set at all, default locale is used
  * This is the language used in menus, about pages, messages, and notifications from Firefox ***/
    // user_pref("intl.locale.requested", "en-US"); // [HIDDEN PREF]
-user_pref("intl.locale.requested", "en-US"); // [HIDDEN PREF]
 /* 0206: disable geographically specific results/search engines e.g. "browser.search.*.US"
  * i.e. ignore all of Mozilla's various search engines in multiple locales ***/
 user_pref("browser.search.geoSpecificDefaults", false);
 user_pref("browser.search.geoSpecificDefaults.url", "");
-/* 0207: set language to match ***/
+/* 0207: set preferred language for diplaying web pages
+ * [TEST] https://addons.mozilla.org/about ***/
 user_pref("intl.accept_languages", "en-US, en");
 /* 0208: enforce US English locale regardless of the system locale
  * [1] https://bugzilla.mozilla.org/867501 ***/
@@ -299,7 +299,7 @@ user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
 user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
 user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
 /* 0402: disable binaries NOT in Safe Browsing local lists being checked
- * This is a real-time check with Google services.
+ * This is a real-time check with Google services
  * [SETUP-SECURITY] If you do not understand this, or if you want this protection, then override it ***/
 user_pref("browser.safebrowsing.downloads.remote.enabled", false);
 /* 0403: disable reporting URLs ***/

From 50869a734f75e63b1fd2fd6d959c4ca3c1f5e689 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 18:13:47 +0000
Subject: [PATCH 0320/1147] [setup-*] always goes after [notes]

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index be835bf..31091f3 100644
--- a/user.js
+++ b/user.js
@@ -1074,11 +1074,11 @@ user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
  * Service workers essentially act as proxy servers that sit between web apps, and the browser
  * and network, are event driven, and can control the web page/site it is associated with,
  * intercepting and modifying navigation and resource requests, and caching resources.
+ * [NOTE] Service worker APIs are hidden (in Firefox) and cannot be used when in PB mode.
+ * [NOTE] Service workers only run over HTTPS. Service workers have no DOM access.
  * [SETUP-WEB] Disabling service workers will break some sites. This pref is a master switch, and controls
  * notifications (2304, 2305) and service worker cache (2740) - all three are inactive. Notifications are
- * behind a prompt (2306). If you enable service workers, then you may want to look at these prefs as well.
- * [NOTE] Service worker APIs are hidden (in Firefox) and cannot be used when in PB mode.
- * [NOTE] Service workers only run over HTTPS. Service workers have no DOM access. ***/
+ * behind a prompt (2306). If you enable service workers, then you may want to look at those as well ***/
 user_pref("dom.serviceWorkers.enabled", false);
 /* 2304: disable Web Notifications
  * [NOTE] Web Notifications require service workers (2302) and are behind a prompt (2306)

From 9da3cf4be88dfd19fe78cf000b937aa1e8e52f3e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 18:21:01 +0000
Subject: [PATCH 0321/1147] 1840: openh264: remove, see #709

Instead of being inactive, remove this. WebRTC is already blocked. And it can also be controlled by 1820. Redundant and does nothing extra for privacy, security etc
---
 user.js | 4 ----
 1 file changed, 4 deletions(-)

diff --git a/user.js b/user.js
index 31091f3..3dc9ff8 100644
--- a/user.js
+++ b/user.js
@@ -963,10 +963,6 @@ user_pref("media.gmp-widevinecdm.enabled", false);
  * [SETTING] General>DRM Content>Play DRM-controlled content
  * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
 user_pref("media.eme.enabled", false);
-/* 1840: disable the OpenH264 Video Codec by Cisco to "Never Activate" [SETUP-HARDEN]
- * This is the bundled codec used for video chat in WebRTC ***/
-   // user_pref("media.gmp-gmpopenh264.enabled", false);
-   // user_pref("media.gmp-gmpopenh264.autoupdate", false);
 
 /*** [SECTION 2000]: MEDIA / CAMERA / MIC ***/
 user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");

From 4dd40bddcca6c15da0751ca36bf87b0ed24e8b2c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Apr 2019 18:22:39 +0000
Subject: [PATCH 0322/1147] 2 x gmp openh264

---
 scratchpad-scripts/ghacks-clear-[removed].js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 2df664a..98ca140 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -110,6 +110,8 @@
     'browser.eme.ui.enabled',
     'browser.sessionstore.max_windows_undo',
     'network.auth.subresource-img-cross-origin-http-auth-allow',
+    'user_pref("media.gmp-gmpopenh264.enabled',
+    'user_pref("media.gmp-gmpopenh264.autoupdate',
     'media.peerconnection.ice.tcp',
     'media.peerconnection.identity.enabled',
     'media.peerconnection.identity.timeout',

From c3a74a7c6eedd4d5e3b7b2c22a067b1057416d60 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 30 Apr 2019 07:21:08 +0000
Subject: [PATCH 0323/1147] 2615: remove obsolete note

1445942 was resolved in FF66
---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 3dc9ff8..9b89499 100644
--- a/user.js
+++ b/user.js
@@ -1237,7 +1237,6 @@ user_pref("middlemouse.contentLoadURL", false);
 user_pref("network.http.redirection-limit", 10);
 /* 2615: disable websites overriding Firefox's keyboard shortcuts [FF58+]
  * 0 (default) or 1=allow, 2=block
- * [NOTE] In FF65 and under, causes issues with delete and backspace keys (see 1445942)
  * [SETTING] to add site exceptions: Page Info>Permissions>Override Keyboard Shortcuts ***/
    // user_pref("permissions.default.shortcuts", 2);
 /* 2616: remove special permissions for certain mozilla domains [FF35+]

From 11f40f8a84f45933a4871d1a8fca796d906add44 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 30 Apr 2019 08:25:06 +0000
Subject: [PATCH 0324/1147] 1800s remove: gmp/cdm update prefs, see #709

---
 user.js | 2 --
 1 file changed, 2 deletions(-)

diff --git a/user.js b/user.js
index 9b89499..e437551 100644
--- a/user.js
+++ b/user.js
@@ -954,11 +954,9 @@ user_pref("plugin.state.flash", 0);
 /* 1820: disable all GMP (Gecko Media Plugins) [SETUP-WEB]
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
 user_pref("media.gmp-provider.enabled", false);
-   // user_pref("media.gmp-manager.updateEnabled", false); // [HIDDEN PREF]
 /* 1825: disable widevine CDM (Content Decryption Module) [SETUP-WEB] ***/
 user_pref("media.gmp-widevinecdm.visible", false);
 user_pref("media.gmp-widevinecdm.enabled", false);
-   // user_pref("media.gmp-widevinecdm.autoupdate", false);
 /* 1830: disable all DRM content (EME: Encryption Media Extension) [SETUP-WEB]
  * [SETTING] General>DRM Content>Play DRM-controlled content
  * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/

From 0d40613268d793aa3d9df029ba0066614f3b6d15 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 30 Apr 2019 08:26:59 +0000
Subject: [PATCH 0325/1147] 2 x update prefs, see #709

---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 98ca140..baae99b 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 29-Apr-2019
+ Last updated: 30-Apr-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -112,6 +112,8 @@
     'network.auth.subresource-img-cross-origin-http-auth-allow',
     'user_pref("media.gmp-gmpopenh264.enabled',
     'user_pref("media.gmp-gmpopenh264.autoupdate',
+    'user_pref("media.gmp-manager.updateEnabled',
+    'user_pref("media.gmp-widevinecdm.autoupdate',
     'media.peerconnection.ice.tcp',
     'media.peerconnection.identity.enabled',
     'media.peerconnection.identity.timeout',

From 600f9677e93ad0cc5e884d8ae82b6d509e1244fc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 30 Apr 2019 09:10:42 +0000
Subject: [PATCH 0326/1147] 1820+1825+1830 changes, closes #709

---
 user.js | 10 ++++++----
 1 file changed, 6 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index e437551..c1ea4f9 100644
--- a/user.js
+++ b/user.js
@@ -951,13 +951,15 @@ user_pref("plugin.sessionPermissionNow.intervalInMinutes", 0);
  * [NOTE] You can still override individual sites via site permissions
  * [1] https://www.ghacks.net/2013/07/09/how-to-make-sure-that-a-firefox-plugin-never-activates-again/ ***/
 user_pref("plugin.state.flash", 0);
-/* 1820: disable all GMP (Gecko Media Plugins) [SETUP-WEB]
+/* 1820: disable GMP (Gecko Media Plugins)
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
-user_pref("media.gmp-provider.enabled", false);
-/* 1825: disable widevine CDM (Content Decryption Module) [SETUP-WEB] ***/
+   // user_pref("media.gmp-provider.enabled", false);
+/* 1825: disable widevine CDM (Content Decryption Module)
+ * [SETUP-WEB] if you *need* CDM, e.g. Netflix, Amazon Prime, Hulu, whatever ***/
 user_pref("media.gmp-widevinecdm.visible", false);
 user_pref("media.gmp-widevinecdm.enabled", false);
-/* 1830: disable all DRM content (EME: Encryption Media Extension) [SETUP-WEB]
+/* 1830: disable all DRM content (EME: Encryption Media Extension)
+ * [SETUP-WEB] if you *need* EME, e.g. Netflix, Amazon Prime, Hulu, whatever
  * [SETTING] General>DRM Content>Play DRM-controlled content
  * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
 user_pref("media.eme.enabled", false);

From 57618a31dc92ddb211054dbb16cd6f1850912d11 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 30 Apr 2019 10:05:03 +0000
Subject: [PATCH 0327/1147] fixups

---
 scratchpad-scripts/ghacks-clear-[removed].js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index baae99b..f4bafbf 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -110,10 +110,6 @@
     'browser.eme.ui.enabled',
     'browser.sessionstore.max_windows_undo',
     'network.auth.subresource-img-cross-origin-http-auth-allow',
-    'user_pref("media.gmp-gmpopenh264.enabled',
-    'user_pref("media.gmp-gmpopenh264.autoupdate',
-    'user_pref("media.gmp-manager.updateEnabled',
-    'user_pref("media.gmp-widevinecdm.autoupdate',
     'media.peerconnection.ice.tcp',
     'media.peerconnection.identity.enabled',
     'media.peerconnection.identity.timeout',
@@ -133,6 +129,10 @@
     'browser.cache.disk.smart_size.first_run',
     'browser.safebrowsing.downloads.remote.url',
     'canvas.capturestream.enabled',
+    'media.gmp-gmpopenh264.enabled',
+    'media.gmp-gmpopenh264.autoupdate',
+    'media.gmp-manager.updateEnabled',
+    'media.gmp-widevinecdm.autoupdate',
     'media.gmp-manager.url',
     'media.gmp-manager.url.override',
     'media.gmp.trial-create.enabled',

From f1d28f3878d6051e98a4b81f24ca26a0d37d52d6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 30 Apr 2019 10:10:59 +0000
Subject: [PATCH 0328/1147] pedantic aphabetical sorting

---
 scratchpad-scripts/ghacks-clear-[removed].js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index f4bafbf..9d674c8 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -122,24 +122,24 @@
     'browser.urlbar.maxHistoricalSearchSuggestions',
     /* 67-beta */
     'app.update.service.enabled',
-    'app.update.staging.enabled',
     'app.update.silent',
+    'app.update.staging.enabled',
     'browser.cache.disk.capacity',
     'browser.cache.disk.smart_size.enabled',
     'browser.cache.disk.smart_size.first_run',
     'browser.safebrowsing.downloads.remote.url',
     'canvas.capturestream.enabled',
-    'media.gmp-gmpopenh264.enabled',
     'media.gmp-gmpopenh264.autoupdate',
+    'media.gmp-gmpopenh264.enabled',
     'media.gmp-manager.updateEnabled',
-    'media.gmp-widevinecdm.autoupdate',
     'media.gmp-manager.url',
     'media.gmp-manager.url.override',
     'media.gmp.trial-create.enabled',
+    'media.gmp-widevinecdm.autoupdate',
+    'pdfjs.enableWebGL',
     'plugin.default.state',
     'plugin.defaultXpi.state',
     'plugin.scan.plid.all',
-    'pdfjs.enableWebGL',
     /* 67-beta: SB & TP cleanup: these were all inactive */
     'browser.safebrowsing.downloads.enabled',
     'browser.safebrowsing.downloads.remote.block_dangerous',

From 7bb0bfefe1314c0d83574e23a839543ddd93a7fb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 30 Apr 2019 13:46:41 +0000
Subject: [PATCH 0329/1147] combine search suggestions, add tag, see #609

also remove `browser.urlbar.userMadeSearchSuggestionsChoice`
---
 user.js | 12 +++++-------
 1 file changed, 5 insertions(+), 7 deletions(-)

diff --git a/user.js b/user.js
index c1ea4f9..22274a1 100644
--- a/user.js
+++ b/user.js
@@ -504,14 +504,12 @@ user_pref("browser.sessionhistory.max_entries", 10);
 user_pref("layout.css.visited_links_enabled", false);
 /* 0806: disable displaying javascript in history URLs ***/
 user_pref("browser.urlbar.filter.javascript", true); // [DEFAULT: true]
-/* 0807: disable search bar LIVE search suggestions
- * [SETTING] Search>Provide search suggestions ***/
+/* 0807: disable live search suggestions
+/* [NOTE] Both must be true for the location bar to work
+ * [SETUP-CHROME] Change these if you trust and use a privacy respecting search engine
+ * [SETTING] Search>Provide search suggestions | Show search suggestions in address bar results ***/
 user_pref("browser.search.suggest.enabled", false);
-/* 0808: disable location bar LIVE search suggestions (requires 0807 = true)
- * Also disable the location bar prompt to enable/disable or learn more about it.
- * [SETTING] Search>Show search suggestions in address bar results ***/
 user_pref("browser.urlbar.suggest.searches", false);
-user_pref("browser.urlbar.userMadeSearchSuggestionsChoice", true); // [FF41+]
 /* 0809: disable location bar suggesting "preloaded" top websites [FF54+]
  * [1] https://bugzilla.mozilla.org/1211726 ***/
 user_pref("browser.urlbar.usepreloadedtopurls.enabled", false);
@@ -528,7 +526,7 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
  * This value controls the total number of entries to appear in the location bar dropdown
  * [NOTE] Items (bookmarks/history/openpages) with a high "frecency"/"bonus" will always
  * be displayed (no we do not know how these are calculated or what the threshold is),
- * and this does not affect the search by search engine suggestion (see 0808)
+ * and this does not affect the search by search engine suggestion (see 0807)
  * [NOTE] This setting is only useful if you want to enable search engine keywords
  * (i.e. at least one of 0850a suggestion types must be true) but you want to *limit* suggestions shown ***/
    // user_pref("browser.urlbar.maxRichResults", 0);

From 1e0b3d74f91668bd6d3bd4e7444ae1c8327a3c4a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 30 Apr 2019 13:51:13 +0000
Subject: [PATCH 0330/1147] browser.urlbar.userMadeSearchSuggestionsChoice

- a user can click the one-off prompt when they first see it
- it's also set when you go changing search suggestions in options
---
 scratchpad-scripts/ghacks-clear-[removed].js | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 9d674c8..845780e 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -155,15 +155,16 @@
     'browser.safebrowsing.provider.google4.updateURL',
     'browser.safebrowsing.provider.mozilla.gethashURL',
     'browser.safebrowsing.provider.mozilla.updateURL',
+    'browser.urlbar.userMadeSearchSuggestionsChoice',
     'privacy.trackingprotection.annotate_channels',
     'privacy.trackingprotection.enabled',
     'privacy.trackingprotection.lower_network_priority',
     'privacy.trackingprotection.pbmode.enabled',
-    'services.blocklist.update_enabled',
-    'services.blocklist.onecrl.collection',
     'services.blocklist.addons.collection',
-    'services.blocklist.plugins.collection',
     'services.blocklist.gfx.collection',
+    'services.blocklist.onecrl.collection',
+    'services.blocklist.plugins.collection',
+    'services.blocklist.update_enabled',
     'urlclassifier.trackingTable',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'

From 99eb835e7a8d23655c7f72c9641c192dcc2ad5ec Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 30 Apr 2019 14:26:48 +0000
Subject: [PATCH 0331/1147] merge 0603 + 0608

- also remove reference which is pretty much useless
---
 user.js | 6 ++----
 1 file changed, 2 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 22274a1..d88aff3 100644
--- a/user.js
+++ b/user.js
@@ -378,9 +378,9 @@ user_pref("network.prefetch-next", false);
  * [2] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
 user_pref("network.dns.disablePrefetch", true);
 user_pref("network.dns.disablePrefetchFromHTTPS", true); // [HIDDEN PREF]
-/* 0603: disable Seer/Necko
- * [1] https://developer.mozilla.org/docs/Mozilla/Projects/Necko ***/
+/* 0603: disable predictor / prefetching ***/
 user_pref("network.predictor.enabled", false);
+user_pref("network.predictor.enable-prefetch", false); // [FF48+]
 /* 0605: disable link-mouseover opening connection to linked server
  * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests
  * [2] https://www.ghacks.net/2015/08/16/block-firefox-from-connecting-to-sites-when-you-hover-over-links/ ***/
@@ -390,8 +390,6 @@ user_pref("network.http.speculative-parallel-limit", 0);
  * [2] http://kb.mozillazine.org/Browser.send_pings.require_same_host ***/
 user_pref("browser.send_pings", false); // [DEFAULT: false]
 user_pref("browser.send_pings.require_same_host", true);
-/* 0608: disable predictor / prefetching [FF48+] ***/
-user_pref("network.predictor.enable-prefetch", false);
 
 /*** [SECTION 0700]: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");

From c55ecbd8b2f48ff4d8f2350987913afa9f616237 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 2 May 2019 00:30:27 +0000
Subject: [PATCH 0332/1147] 0701: IPv6, MOAR info

---
 user.js | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index d88aff3..9184d47 100644
--- a/user.js
+++ b/user.js
@@ -395,9 +395,11 @@ user_pref("browser.send_pings.require_same_host", true);
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
 /* 0701: disable IPv6
  * IPv6 can be abused, especially regarding MAC addresses. They also do not play nice
- * with VPNs. That's even assuming your ISP and/or router and/or website can handle it
- * [NOTE] This is just an application level fallback. Disabling IPv6 is best done
- * at an OS/network level, and/or configured properly in VPN setups
+ * with VPNs. That's even assuming your ISP and/or router and/or website can handle it.
+ * Firefox telemetry (April 2019) shows only 5% of all connections are IPv6.
+ * [NOTE] This is just an application level fallback. Disabling IPv6 is best done at an
+ * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
+ * then this won't make much difference. If you are maksing your IP, then it can only help.
  * [TEST] http://ipv6leak.com/
  * [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/437#issuecomment-403740626
  * [2] https://www.internetsociety.org/tag/ipv6-security/ (see Myths 2,4,5,6) ***/

From 1ff14e31c09f2326ec40bdb0afacc10ff26d88f5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 2 May 2019 00:47:14 +0000
Subject: [PATCH 0333/1147] 1201: TLS max -> inactive

Lets be consistent, we don't make min active as it alters your FP, and the risk is super low (updated the telemetry stat: down from 2% to 0.5%). Default max is now 4 anyway (don't care about ESR - they should be using the v60 archive).
---
 user.js | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 9184d47..1b77c9a 100644
--- a/user.js
+++ b/user.js
@@ -698,12 +698,13 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
 user_pref("security.ssl.require_safe_negotiation", true);
 /* 1202: control TLS versions with min and max
  * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
- * [NOTE] Jul-2017: Telemetry indicates approx 2% of TLS web traffic uses 1.0 or 1.1
+ * [WARNING] Leave these at default, otherwise you alter your TLS fingerprint.
+ * Firefox telemetry (April 2019) shows only 0.5% of TLS web traffic uses 1.0 or 1.1
  * [1] http://kb.mozillazine.org/Security.tls.version.*
  * [2] https://www.ssl.com/how-to/turn-off-ssl-3-0-and-tls-1-0-in-your-browser/
  * [2] archived: https://archive.is/hY2Mm ***/
    // user_pref("security.tls.version.min", 3);
-user_pref("security.tls.version.max", 4);
+   // user_pref("security.tls.version.max", 4);
 /* 1203: disable SSL session tracking [FF36+]
  * SSL Session IDs are unique, last up to 24hrs in Firefox, and can be used for tracking
  * [SETUP-PERF] Relax this if you have FPI enabled (see 4000) *AND* you understand the

From dab27cd143d088b250eab1493f87814fc14e125d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 3 May 2019 00:09:05 +0000
Subject: [PATCH 0334/1147] spring cleaning, part 1: see #716

All of these are the same as default, checked back to ESR60 and Ff60. Except 2211 which is not considered an issue by TB for example, and it doesn't enhance anything IMO
---
 user.js | 25 +------------------------
 1 file changed, 1 insertion(+), 24 deletions(-)

diff --git a/user.js b/user.js
index 1b77c9a..a7c8fe9 100644
--- a/user.js
+++ b/user.js
@@ -432,10 +432,6 @@ user_pref("network.http.altsvc.oe", false);
  * [1] http://kb.mozillazine.org/Network.proxy.socks_remote_dns
  * [2] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
 user_pref("network.proxy.socks_remote_dns", true);
-/* 0706: remove paths when sending URLs to PAC scripts [FF51+]
- * CVE-2017-5384: Information disclosure via Proxy Auto-Config (PAC)
- * [1] https://bugzilla.mozilla.org/1255474 ***/
-user_pref("network.proxy.autoconfig_url.include_path", false); // [DEFAULT: false]
 /* 0707: disable (or setup) DNS-over-HTTPS (DoH) [FF60+]
  * TRR = Trusted Recursive Resolver
  * .mode: 0=off, 1=race, 2=TRR first, 3=TRR only, 4=race for stats but always use native result
@@ -502,8 +498,6 @@ user_pref("browser.sessionhistory.max_entries", 10);
  * [2] https://bugzilla.mozilla.org/147777
  * [3] https://developer.mozilla.org/docs/Web/CSS/Privacy_and_the_:visited_selector ***/
 user_pref("layout.css.visited_links_enabled", false);
-/* 0806: disable displaying javascript in history URLs ***/
-user_pref("browser.urlbar.filter.javascript", true); // [DEFAULT: true]
 /* 0807: disable live search suggestions
 /* [NOTE] Both must be true for the location bar to work
  * [SETUP-CHROME] Change these if you trust and use a privacy respecting search engine
@@ -579,14 +573,6 @@ user_pref("security.password_lifetime", 5);
  * [NOTE] Password will still be auto-filled after a user name is manually entered
  * [1] http://kb.mozillazine.org/Signon.autofillForms ***/
 user_pref("signon.autofillForms", false);
-/* 0906: disable websites' autocomplete="off" [FF30+]
- * Don't let sites dictate use of saved logins and passwords. Increase security through
- * stronger password use. The trade-off is the convenience. Some sites should never be
- * saved (such as banking sites). Set at true, informed users can make their own choice. ***/
-user_pref("signon.storeWhenAutocompleteOff", true); // [DEFAULT: true]
-/* 0907: display warnings for logins on non-secure (non HTTPS) pages
- * [1] https://bugzilla.mozilla.org/1217156 ***/
-user_pref("security.insecure_password.ui.enabled", true);
 /* 0909: disable formless login capture for Password Manager [FF51+] ***/
 user_pref("signon.formlessCapture.enabled", false);
 /* 0910: disable autofilling saved passwords on HTTP pages and show warning [FF52+]
@@ -862,7 +848,7 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
  * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed.
  * [WARNING] Creating your own probably highly-unique whitelist will raise your entropy.
- * Eventually privacy.resistFingerprinting (see 4500) will cover this (and 1401 can be relaxed)
+ * Eventually privacy.resistFingerprinting (see 4500) will cover this
  * [1] https://bugzilla.mozilla.org/1121643 ***/
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
 
@@ -997,9 +983,6 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
 /* 2027: disable camera image capture [FF35+]
  * [1] https://trac.torproject.org/projects/tor/ticket/16339 ***/
 user_pref("dom.imagecapture.enabled", false); // [DEFAULT: false]
-/* 2028: disable offscreen canvas [FF44+]
- * [1] https://developer.mozilla.org/docs/Web/API/OffscreenCanvas ***/
-user_pref("gfx.offscreencanvas.enabled", false); // [DEFAULT: false]
 /* 2030: disable autoplay of HTML5 media [FF63+]
  * 0=Allowed, 1=Blocked (2=Prompt - removed in FF66)
  * [NOTE] You can set exceptions under site permissions
@@ -1041,8 +1024,6 @@ user_pref("browser.link.open_newwindow.restriction", 0);
 /* 2210: block popup windows
  * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
 user_pref("dom.disable_open_during_load", true);
-/* 2211: set max popups from a single non-click event - default is 20! ***/
-user_pref("dom.popup_maximum", 3);
 /* 2212: limit events that can cause a popup [SETUP-WEB]
  * default is "change click dblclick mouseup pointerup notificationclick reset submit touchend contextmenu"
  * [1] http://kb.mozillazine.org/Dom.popup_allowed_events ***/
@@ -1142,10 +1123,6 @@ user_pref("javascript.options.wasm", false);
  * [2] https://w3c.github.io/IntersectionObserver/
  * [3] https://bugzilla.mozilla.org/1243846 ***/
 user_pref("dom.IntersectionObserver.enabled", false);
-/* 2427: disable Shared Memory (Spectre mitigation)
- * [1] https://github.com/tc39/ecmascript_sharedmem/blob/master/TUTORIAL.md
- * [2] https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ ***/
-user_pref("javascript.options.shared_memory", false);
 /* 2428: enforce DOMHighResTimeStamp API
  * [WARNING] Required for normalization of timestamps and any timer resolution mitigations ***/
 user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]

From 59a85bcdda6eaf3013c7c643bd6fcc9e092b36ec Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 3 May 2019 00:35:04 +0000
Subject: [PATCH 0335/1147] spring cleaning, part 2: see #716

- 0910 same as default for desktop. Android is the opposite, must be for a reason. Android is not really my concern.
- 1005: always been inactive: one less warning to deal with
- 1008: always been inactive. defaults are 60, 60
---
 user.js | 15 ---------------
 1 file changed, 15 deletions(-)

diff --git a/user.js b/user.js
index a7c8fe9..29204e6 100644
--- a/user.js
+++ b/user.js
@@ -575,11 +575,6 @@ user_pref("security.password_lifetime", 5);
 user_pref("signon.autofillForms", false);
 /* 0909: disable formless login capture for Password Manager [FF51+] ***/
 user_pref("signon.formlessCapture.enabled", false);
-/* 0910: disable autofilling saved passwords on HTTP pages and show warning [FF52+]
- * [1] https://www.fxsitecompat.com/en-CA/docs/2017/insecure-login-forms-now-disable-autofill-show-warning-beneath-input-control/
- * [2] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1217152,1319119 ***/
-user_pref("signon.autofillForms.http", false);
-user_pref("security.insecure_field_warning.contextual.enabled", true);
 /* 0912: limit (or disable) HTTP authentication credentials dialogs triggered by sub-resources [FF41+]
  * hardens against potential credentials phishing
  * 0=don't allow sub-resources to open HTTP authentication credentials dialogs
@@ -614,20 +609,10 @@ user_pref("browser.cache.disk_cache_ssl", false);
  * [NOTE] Not recommended due to performance issues ***/
    // user_pref("browser.cache.memory.enable", false);
    // user_pref("browser.cache.memory.capacity", 0); // [HIDDEN PREF]
-/* 1005: disable fastback cache
- * To improve performance when pressing back/forward Firefox stores visited pages
- * so they don't have to be re-parsed. This is not the same as memory cache.
- * 0=none, -1=auto (that's minus 1), or for other values see [1]
- * [WARNING] Not recommended unless you know what you're doing
- * [1] http://kb.mozillazine.org/Browser.sessionhistory.max_total_viewers ***/
-   // user_pref("browser.sessionhistory.max_total_viewers", 0);
 /* 1006: disable permissions manager from writing to disk [RESTART]
  * [NOTE] This means any permission changes are session only
  * [1] https://bugzilla.mozilla.org/967812 ***/
    // user_pref("permissions.memory_only", true); // [HIDDEN PREF]
-/* 1008: set DNS cache and expiration time (default 400 and 60, same as Tor Browser) ***/
-   // user_pref("network.dnsCacheEntries", 400);
-   // user_pref("network.dnsCacheExpiration", 60);
 
 /** SESSIONS & SESSION RESTORE ***/
 /* 1020: exclude "Undo Closed Tabs" in Session Restore ***/

From 57f4bd46e9f193e46c02029d9e40b4c214988b21 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 3 May 2019 00:41:08 +0000
Subject: [PATCH 0336/1147] spring cleaning, closes #716

---
 scratchpad-scripts/ghacks-clear-[removed].js | 16 ++++++++++++++--
 1 file changed, 14 insertions(+), 2 deletions(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 845780e..fa78bc7 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 30-Apr-2019
+ Last updated: 02-May-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -128,7 +128,12 @@
     'browser.cache.disk.smart_size.enabled',
     'browser.cache.disk.smart_size.first_run',
     'browser.safebrowsing.downloads.remote.url',
+    'browser.sessionhistory.max_total_viewers'
+    'browser.urlbar.filter.javascript',
     'canvas.capturestream.enabled',
+    'dom.popup_maximum',
+    'gfx.offscreencanvas.enabled',
+    'javascript.options.shared_memory',
     'media.gmp-gmpopenh264.autoupdate',
     'media.gmp-gmpopenh264.enabled',
     'media.gmp-manager.updateEnabled',
@@ -136,11 +141,18 @@
     'media.gmp-manager.url.override',
     'media.gmp.trial-create.enabled',
     'media.gmp-widevinecdm.autoupdate',
+    'network.dnsCacheEntries'
+    'network.dnsCacheExpiration'
+    'network.proxy.autoconfig_url.include_path',
     'pdfjs.enableWebGL',
     'plugin.default.state',
     'plugin.defaultXpi.state',
     'plugin.scan.plid.all',
-    /* 67-beta: SB & TP cleanup: these were all inactive */
+    'security.insecure_field_warning.contextual.enabled", true);
+    'security.insecure_password.ui.enabled',
+    'signon.autofillForms.http", false);
+    'signon.storeWhenAutocompleteOff',
+    /* 67-beta: Blocklist, SB & TP cleanup: these were all inactive */
     'browser.safebrowsing.downloads.enabled',
     'browser.safebrowsing.downloads.remote.block_dangerous',
     'browser.safebrowsing.downloads.remote.block_dangerous_host',

From 329719fe257c321d234f11ec47ff0445e1cbff75 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 3 May 2019 02:03:56 +0000
Subject: [PATCH 0337/1147] 0400s: more cleanup, see #710

---
 user.js | 13 ++-----------
 1 file changed, 2 insertions(+), 11 deletions(-)

diff --git a/user.js b/user.js
index 29204e6..d6bc96e 100644
--- a/user.js
+++ b/user.js
@@ -302,22 +302,13 @@ user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozi
  * This is a real-time check with Google services
  * [SETUP-SECURITY] If you do not understand this, or if you want this protection, then override it ***/
 user_pref("browser.safebrowsing.downloads.remote.enabled", false);
-/* 0403: disable reporting URLs ***/
-user_pref("browser.safebrowsing.provider.google.reportURL", "");
-user_pref("browser.safebrowsing.reportPhishURL", "");
-user_pref("browser.safebrowsing.provider.google4.reportURL", ""); // [FF50+]
-user_pref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", ""); // [FF54+]
-user_pref("browser.safebrowsing.provider.google.reportPhishMistakeURL", ""); // [FF54+]
-user_pref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", ""); // [FF54+]
-user_pref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", ""); // [FF54+]
+/* 0403: disable data sharing [FF58+] ***/
+user_pref("browser.safebrowsing.provider.google4.dataSharing.enabled", false);
 /* 0404: disable 'ignore this warning' on Safe Browsing warnings
  * If clicked, it bypasses the block for that session. This is a means for admins to enforce SB
  * [TEST] see github wiki APPENDIX A: Test Sites: Section 5
  * [1] https://bugzilla.mozilla.org/1226490 ***/
    // user_pref("browser.safebrowsing.allowOverride", false);
-/* 0405: disable data sharing [FF58+] ***/
-user_pref("browser.safebrowsing.provider.google4.dataSharing.enabled", false);
-user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
 
 /*** [SECTION 0500]: SYSTEM ADD-ONS / EXPERIMENTS
      System Add-ons are a method for shipping extensions, considered to be

From ccec62f66b10e2f205c59fe5386ffe426bf78bdc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 3 May 2019 02:09:35 +0000
Subject: [PATCH 0338/1147] SB reporting URLs, closes #710

- the two reportURLs required the user to actively opt to send a report
- the other five reporting URLs use Mozilla domains, which is not a problem. Not entirely sure if they get used or how, don't care
- the dataSharingURL is not needed, the corresponding .enabled pref is sufficent
---
 scratchpad-scripts/ghacks-clear-[removed].js | 8 ++++++++
 1 file changed, 8 insertions(+)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index fa78bc7..26a4f84 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -128,6 +128,14 @@
     'browser.cache.disk.smart_size.enabled',
     'browser.cache.disk.smart_size.first_run',
     'browser.safebrowsing.downloads.remote.url',
+    'browser.safebrowsing.provider.google.reportMalwareMistakeURL',
+    'browser.safebrowsing.provider.google.reportPhishMistakeURL',
+    'browser.safebrowsing.provider.google.reportURL',
+    'browser.safebrowsing.provider.google4.dataSharingURL',
+    'browser.safebrowsing.provider.google4.reportMalwareMistakeURL',
+    'browser.safebrowsing.provider.google4.reportPhishMistakeURL',
+    'browser.safebrowsing.provider.google4.reportURL',
+    'browser.safebrowsing.reportPhishURL',
     'browser.sessionhistory.max_total_viewers'
     'browser.urlbar.filter.javascript',
     'canvas.capturestream.enabled',

From 7394f2f55395ac20a9752a64430d56c3a345e404 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 3 May 2019 07:36:04 +0000
Subject: [PATCH 0339/1147] 2027: remove, #716

default false since forever
---
 user.js | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/user.js b/user.js
index d6bc96e..651963c 100644
--- a/user.js
+++ b/user.js
@@ -956,9 +956,6 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Camera/Microphone>Settings ***/
    // user_pref("permissions.default.camera", 2);
    // user_pref("permissions.default.microphone", 2);
-/* 2027: disable camera image capture [FF35+]
- * [1] https://trac.torproject.org/projects/tor/ticket/16339 ***/
-user_pref("dom.imagecapture.enabled", false); // [DEFAULT: false]
 /* 2030: disable autoplay of HTML5 media [FF63+]
  * 0=Allowed, 1=Blocked (2=Prompt - removed in FF66)
  * [NOTE] You can set exceptions under site permissions

From 720253eca3afec3a5056e2eaba3e87c60a222ea7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 3 May 2019 07:36:55 +0000
Subject: [PATCH 0340/1147] dom.imagecapture.enabled

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 26a4f84..6b89f1a 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 02-May-2019
+ Last updated: 03-May-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -139,6 +139,7 @@
     'browser.sessionhistory.max_total_viewers'
     'browser.urlbar.filter.javascript',
     'canvas.capturestream.enabled',
+    'dom.imagecapture.enabled',
     'dom.popup_maximum',
     'gfx.offscreencanvas.enabled',
     'javascript.options.shared_memory',

From 7f6d7c6a52392b3e8b83b4d8c99fb3c4fa1bd905 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 3 May 2019 07:48:12 +0000
Subject: [PATCH 0341/1147] fixups

---
 scratchpad-scripts/ghacks-clear-[removed].js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 6b89f1a..41f1769 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -136,7 +136,7 @@
     'browser.safebrowsing.provider.google4.reportPhishMistakeURL',
     'browser.safebrowsing.provider.google4.reportURL',
     'browser.safebrowsing.reportPhishURL',
-    'browser.sessionhistory.max_total_viewers'
+    'browser.sessionhistory.max_total_viewers',
     'browser.urlbar.filter.javascript',
     'canvas.capturestream.enabled',
     'dom.imagecapture.enabled',
@@ -157,9 +157,9 @@
     'plugin.default.state',
     'plugin.defaultXpi.state',
     'plugin.scan.plid.all',
-    'security.insecure_field_warning.contextual.enabled", true);
+    'security.insecure_field_warning.contextual.enabled',
     'security.insecure_password.ui.enabled',
-    'signon.autofillForms.http", false);
+    'signon.autofillForms.http',
     'signon.storeWhenAutocompleteOff',
     /* 67-beta: Blocklist, SB & TP cleanup: these were all inactive */
     'browser.safebrowsing.downloads.enabled',

From 2a304369050d3243713ac94625dc84cf8db09ada Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 3 May 2019 07:49:47 +0000
Subject: [PATCH 0342/1147] moar fixups

---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 41f1769..8c4b8c0 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -150,8 +150,8 @@
     'media.gmp-manager.url.override',
     'media.gmp.trial-create.enabled',
     'media.gmp-widevinecdm.autoupdate',
-    'network.dnsCacheEntries'
-    'network.dnsCacheExpiration'
+    'network.dnsCacheEntries',
+    'network.dnsCacheExpiration',
     'network.proxy.autoconfig_url.include_path',
     'pdfjs.enableWebGL',
     'plugin.default.state',

From da4cfce10fdbe1995d4bb33fc327e58b0a859553 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 3 May 2019 13:19:55 +0000
Subject: [PATCH 0343/1147] RFP: OS spoof changes FF68+

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 651963c..8e9a140 100644
--- a/user.js
+++ b/user.js
@@ -1465,6 +1465,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
       FF57: The version number will match current ESR (1393283, 1418672, 1418162, 1511763)
       FF59: The OS will be reported as Windows, OSX, Android, or Linux (to reduce breakage) (1404608)
       FF66: The OS in HTTP Headers will be reduced to Windows or Android (1509829)
+      FF68: Reported OS versions updated to Windows 10, OS 10.14, and Adnroid 8.1 (1511434)
  ** 1369319 - disable device sensor API (see 4604) (FF56+)
  ** 1369357 - disable site specific zoom (see 4605) (FF56+)
  ** 1337161 - hide gamepads from content (see 4606) (FF56+)

From 473e88c7845235fe1b6dc8c683e22a051e2ccaa6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 5 May 2019 17:28:47 +0000
Subject: [PATCH 0344/1147] spring cleaning, part 3: see #716

---
 user.js | 23 +----------------------
 1 file changed, 1 insertion(+), 22 deletions(-)

diff --git a/user.js b/user.js
index 8e9a140..49392d9 100644
--- a/user.js
+++ b/user.js
@@ -302,9 +302,7 @@ user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozi
  * This is a real-time check with Google services
  * [SETUP-SECURITY] If you do not understand this, or if you want this protection, then override it ***/
 user_pref("browser.safebrowsing.downloads.remote.enabled", false);
-/* 0403: disable data sharing [FF58+] ***/
-user_pref("browser.safebrowsing.provider.google4.dataSharing.enabled", false);
-/* 0404: disable 'ignore this warning' on Safe Browsing warnings
+/* 0403: disable 'ignore this warning' on Safe Browsing warnings
  * If clicked, it bypasses the block for that session. This is a means for admins to enforce SB
  * [TEST] see github wiki APPENDIX A: Test Sites: Section 5
  * [1] https://bugzilla.mozilla.org/1226490 ***/
@@ -1252,9 +1250,6 @@ user_pref("extensions.autoDisableScopes", 15);
 /* 2662: disable webextension restrictions on certain mozilla domains (also see 4503) [FF60+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
    // user_pref("extensions.webextensions.restrictedDomains", "");
-/* 2663: enable warning when websites try to install add-ons
- * [SETTING] Privacy & Security>Permissions>Warn you when websites try to install add-ons ***/
-user_pref("xpinstall.whitelist.required", true); // [DEFAULT: true]
 
 /** SECURITY ***/
 /* 2680: enable CSP (Content Security Policy)
@@ -1263,11 +1258,6 @@ user_pref("security.csp.enable", true); // [DEFAULT: true]
 /* 2682: enable CSP 1.1 experimental hash-source directive [FF29+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=855326,883975 ***/
 user_pref("security.csp.experimentalEnabled", true);
-/* 2683: block top level window data: URIs [FF56+]
- * [1] https://bugzilla.mozilla.org/1331351
- * [2] https://www.wordfence.com/blog/2017/01/gmail-phishing-data-uri/
- * [3] https://www.fxsitecompat.com/en-CA/docs/2017/data-url-navigations-on-top-level-window-will-be-blocked/ ***/
-user_pref("security.data_uri.block_toplevel_data_uri_navigations", true); // [DEFAULT: true]
 /* 2684: enforce a security delay on some confirmation dialogs such as install, open/save
  * [1] http://kb.mozillazine.org/Disable_extension_install_delay_-_Firefox
  * [2] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
@@ -1308,14 +1298,6 @@ user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
  * [NOTE] The setting below is disabled (but not changed) if you block all cookies (2701 = 2)
  * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed ***/
    // user_pref("network.cookie.lifetimePolicy", 2);
-/* 2705: disable HTTP sites setting cookies with the "secure" directive [FF52+]
- * [1] https://developer.mozilla.org/Firefox/Releases/52#HTTP ***/
-user_pref("network.cookie.leave-secure-alone", true); // [DEFAULT: true]
-/* 2706: enable support for same-site cookies [FF60+]
- * [1] https://bugzilla.mozilla.org/795346
- * [2] https://blog.mozilla.org/security/2018/04/24/same-site-cookies-in-firefox-60/
- * [3] https://www.sjoerdlangkemper.nl/2016/04/14/preventing-csrf-with-samesite-cookie-attribute/ ***/
-   // user_pref("network.cookie.same-site.enabled", true); // [DEFAULT: true]
 /* 2710: disable DOM (Document Object Model) Storage
  * [WARNING] This will break a LOT of sites' functionality AND extensions!
  * You are better off using an extension for more granular control ***/
@@ -1330,9 +1312,6 @@ user_pref("network.cookie.leave-secure-alone", true); // [DEFAULT: true]
 user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
 /* 2730: disable offline cache ***/
 user_pref("browser.cache.offline.enable", false);
-/* 2730b: disable offline cache on insecure sites [FF60+]
- * [1] https://blog.mozilla.org/security/2018/02/12/restricting-appcache-secure-contexts/ ***/
-user_pref("browser.cache.offline.insecure.enable", false); // [DEFAULT: false in FF62+]
 /* 2731: enforce websites to ask to store data for offline use
  * [1] https://support.mozilla.org/questions/1098540
  * [2] https://bugzilla.mozilla.org/959985 ***/

From be7c50c19824533922b935a593d306c586d32b0e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 5 May 2019 17:33:16 +0000
Subject: [PATCH 0345/1147] spring cleaning, part 3: closes #716

---
 scratchpad-scripts/ghacks-clear-[removed].js | 8 +++++++-
 1 file changed, 7 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 8c4b8c0..ae61fd9 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 03-May-2019
+ Last updated: 05-May-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -127,10 +127,12 @@
     'browser.cache.disk.capacity',
     'browser.cache.disk.smart_size.enabled',
     'browser.cache.disk.smart_size.first_run',
+    'browser.cache.offline.insecure.enable',
     'browser.safebrowsing.downloads.remote.url',
     'browser.safebrowsing.provider.google.reportMalwareMistakeURL',
     'browser.safebrowsing.provider.google.reportPhishMistakeURL',
     'browser.safebrowsing.provider.google.reportURL',
+    'browser.safebrowsing.provider.google4.dataSharing.enabled',
     'browser.safebrowsing.provider.google4.dataSharingURL',
     'browser.safebrowsing.provider.google4.reportMalwareMistakeURL',
     'browser.safebrowsing.provider.google4.reportPhishMistakeURL',
@@ -150,6 +152,8 @@
     'media.gmp-manager.url.override',
     'media.gmp.trial-create.enabled',
     'media.gmp-widevinecdm.autoupdate',
+    'network.cookie.leave-secure-alone',
+    'network.cookie.same-site.enabled',
     'network.dnsCacheEntries',
     'network.dnsCacheExpiration',
     'network.proxy.autoconfig_url.include_path',
@@ -157,10 +161,12 @@
     'plugin.default.state',
     'plugin.defaultXpi.state',
     'plugin.scan.plid.all',
+    'security.data_uri.block_toplevel_data_uri_navigations',
     'security.insecure_field_warning.contextual.enabled',
     'security.insecure_password.ui.enabled',
     'signon.autofillForms.http',
     'signon.storeWhenAutocompleteOff',
+    'xpinstall.whitelist.required',
     /* 67-beta: Blocklist, SB & TP cleanup: these were all inactive */
     'browser.safebrowsing.downloads.enabled',
     'browser.safebrowsing.downloads.remote.block_dangerous',

From 540f5ce868a06d44b5c2912f34712551ba6cae8f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 8 May 2019 05:18:16 +0000
Subject: [PATCH 0346/1147] FF68+ letterboxing changes

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 49392d9..18c3c38 100644
--- a/user.js
+++ b/user.js
@@ -1497,9 +1497,9 @@ user_pref("privacy.resistFingerprinting", true);
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
 user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDEN PREF]
 /* 4504: enable RFP letterboxing [FF67+]
- * Dynamically resizes the inner window in 200w x100h steps by applying letterboxing, using dimensions
- * which waste the least content area, If you use the dimension pref, then it will only apply those
- * resolutions. The format is "width1xheight1, width2xheight2, ..." (e.g. "800x600, 1000x1000, 1600x900")
+ * Dynamically resizes the inner window (FF67; 200w x100h: FF68+; stepped ranges) by applying letterboxing,
+ * using dimensions which waste the least content area, If you use the dimension pref, then it will only apply
+ * those resolutions. The format is "width1xheight1, width2xheight2, ..." (e.g. "800x600, 1000x1000, 1600x900")
  * [NOTE] This does NOT require RFP (see 4501) **for now**
  * [WARNING] The dimension pref is only meant for testing, and we recommend you DO NOT USE it
  * [1] https://bugzilla.mozilla.org/1407366 ***/

From 842a78692e86faa1cf29b5e83f7997b12c94a30d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 8 May 2019 09:19:32 +0000
Subject: [PATCH 0347/1147] Delete exceptions01.png

---
 wikipiki/exceptions01.png | Bin 47041 -> 0 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)
 delete mode 100644 wikipiki/exceptions01.png

diff --git a/wikipiki/exceptions01.png b/wikipiki/exceptions01.png
deleted file mode 100644
index 1733fbb8593c7b33b2fc12c50810f956495bd304..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 47041
zcmV){Kz+Z7P)<h;3K|Lk000e1NJLTq00Jfe007nq1^@s6<-<vK00009a7bBm000XU
z000XU0RWnu7ytkYPiaF#P*7-ZbZ>KLZ*U+<Lqi~Na&Km7Y-Iodc-oy)XH-+^7Crag
z^g>IBfRsybQWXdwQbLP>6p<z>Aqfylh#{fb6;Z(vMMVS~$e@S=j*ftg6;Uh<iVD~V
z<RPMtgQJLw%KPDaqifc@_vX$1wbwr9tn;0-&j-K=43<bUQ8j=JsX`tR;Dg7+#^K~H
zK!FM*Z~zbpvt%K2{UZSY_<lS*D<Z%Lz5oGu(+dayz)hRLFdT>f59&ghTmgWD0l;*T
zI7<kC6aYYajzXpYKt=(8otP$50H6c_V9R4-;{Z@C0AMG7=F<Rxo%or10RUT+Ar%3j
zkpLhQWr#!oXgdI`&sK^>09Y^p6lP1rIRMx#05C~cW=H_Aw*bJ-5DT&Z2n+x)QHX^p
z00esgV8|mQcmRZ%02D^@S3L16t`O%c004NIvOKvYIYoh62rY33S640`D9%Y2D-<?i
z0%4j!F2Z@488U%158(66005wo6%pWr^Zj_v4zAA5HjcIqUoGmt2LB>rV&neh&#Q1i
z007~1e$oCcFS8neI|hJl{-P!B1ZZ9hpmq0)X0i`JwE&>$+E?>%_<lS*MWK+n+1cgf
z<k(8YLR(?VSAG6x!e78w{cQPuJpA|d;J)G{fihizM+Erb!p!tcr5w+a34~(Y=8s4G
zw+sLL9n&JjNn*KJDiq^U5^;`1nvC-@r6P$!k}1U{(*I=Q-z@tBKHoI}uxdU5dyy@u
zU1J0GOD7Ombim^G008p4Z^6_k2m^p<gW=D2|L;HjN1!DDfM!XOaR2~bL?kX$%CkSm
z2mk;?pn)o|K^yeJ7%adB9Ki+L!3+FgHiSYX#KJ-lLJDMn9CBbOtb#%)hRv`YDqt_v
zKpix|QD}yfa1JiQRk#j4a1Z)n2%f<xynzV>LC6RbVIkUx0b+_+BaR3cnT7Zv!AJxW
zizFb)h!jyGOOZ85F;a?DAXP{m@;!0_Ifq<Ex{*7`05XF7hP+2Hl!3BQJ=6@fL%FCo
z8iYoo3(#bAF`ADSpqtQgv>H8(HlgRxt7s3}k3K`kFu>>-2Q$QMFfPW!La{h336o>X
zu_CMttHv6zR;&ZNiS=X8v3CR#fknUxHUxJ<AYmRsNLWl*PS{AOARHt#5!wki2?K;t
z!Y3k=s7tgax)J%r7-BLphge7~Bi0g+6E6^Zh(p9TBoc{3GAFr^0!gu?RMHaCM$&Fl
zBk3%un>0uoBa_M6WNWeqIg~6QE69c9o#eyhGvpiOA@W-aonk<7r1(?fC{oI5N*U!4
z<uv66WtcKSRim0x-Ke2d5jBrmLam{;Qm;{ms1r1GnmNsb7D-E`t)i9F8fX`2_i3-_
zbh;7Ul^#x)&{xvS=|||7=mYe33=M`AgU5(xC>fg=2N-7=cNnjjOr{yriy6mMFgG#l
znCF=fnQv8CDz++o6_Lscl}eQ+l^ZHARH>?_s@|##Rr6KLRFA1%Q+=*RRWnoLsR`7U
zt5vF<Q0r40Q)j6=sE4X&sBct1q<&fbi3VB2Ov6t@q*0);U*o*SAPZv|vv@2aYYnT0
zb%8a+Cb7-ge0D0knEf5Qi#@8Tp*ce{N;6lpQuCB%KL_KOarm5cP6_8Ir<e17iry6O
zDdH&`rZh~sF=bq9s+O0QSgS~@QL9Jmy*94xr=6y~MY~!1fet~(N+(<=M`w@D1)b+p
z*;C!83a1uLJv#NSE~;y#8=<>IcfW3@?wFpwUVxrVZ>QdQz32KIeJ}k~{cZZE^+ya?
z2D1z#2HOnI7(B%_ac?{wFUQ;QQA1tBKtrWrm0_3Rgps+?Jfqb{jYbcQX~taRB;#$y
zZN{S}1|}gUOHJxc?wV3fxuz+mJ4`!F$IZ;mqRrNsHJd##*D~ju=bP7?-?v~|cv>vB
zsJ6IeNwVZxrdjT`yl#bBIa#GxRa#xMMy;K#CDyyGyQdMSxlWT#tDe?p!?5wT$+oGt
z8L;Kp2HUQ-ZMJ=3XJQv;x5ci*?vuTfeY$;({XGW_huIFR9a<fJbF^|4I#xQ~n$Dc=
zKYhjYmgz5NSkDm8*fZm{6U!;YX`NG>(?@3)XSs8O^N5RyOM=TTmp(3=8^+zpz2r)C
z^>JO{deZfso3oq3?Wo(Y?l$ge?uXo;%ru`Vo>?<<(8I_>;8Eq#KMS9gFl*neeosSB
zfoHYnBQIkwkyowPu(zdms`p{<7e4kra-ZWq<2*OsGTvEV%s0Td$hXT+!*8Bnh2KMe
zBmZRodjHV?r+_5^X9J0WL4jKW`}lf%A-|44I@@LTvf1rHjG(ze6+w@Jt%Bvjts!X0
z?2xS?_ve_-k<Mujg;0Lz*3buG=3$G&ehepthlN*$KaOySSQ^nWmo<0M+(UEUMEXRQ
zMBbZcF;6+KElM>iKB_KiJlZ$9G`c^=E@oNG)mWWaNo-3TIW8)$Hg0Ub-~8?KhvJ>$
z3*&nim@mj(aCxE5!t{lw7O5^0EIO7zOo&c6l<+|iDySBWCGrz@C5{St!X3hAA}`T4
z(TLbXTq+(;@<=L8dXnssyft|w#WSTW<++3>sgS%(4NTpeI-VAqb|7ssJvzNHgOZVu
zaYCvgO_R1~>SyL=cFU|~g|hy|Zi}}s9+d~lYqOB71z9Z$wnC=pR9Yz4DhIM>Wmjgu
z&56o6maCpC&F##y%G;1PobR9i?GnNg;gYtchD%p19a!eQtZF&3JaKv33gZ<8D~47E
ztUS1iwkmDaPpj=$m#%)jCVEY4fnLGNg2A-`YwHVD3gv};>)hAvT~AmqS>Lr``i7kw
zJ{5_It`yrBmlc25DBO7E8;5VoznR>Ww5hAaxn$2~(q`%A-YuS64wkBy=9dm`4cXeX
z4c}I@?e+FW+b@^RDBHV(wnMq2zdX3SWv9u`%{xC-q*U}&`cyXV(%rRT*Z6MH?i+i&
z_B8C(+grT%{XWUQ+f@NoP1R=AW&26{v-dx)iK^-Nmiuj8txj!m?Z*Ss1N{dh4z}01
z)YTo*JycSU)+_5r4#yw9{+;i4Ee$peRgIj+;v;ZGdF1K$3E%e~4LaI(jC-u%2h$&R
z9cLXcYC@Xwnns&bn)_Q~Te?roKGD|d-g^8;+aC{{G(1^(O7m37Y1-+6)01cN&y1aw
zoqc{T`P^XJqPBbIW6s}d4{z_f5Om?vMgNQEJG?v2T=KYd^0M3I6IZxbny)%vZR&LD
zJpPl@Psh8QyPB@KTx+@RdcC!KX7}kEo;S|j^u2lU7XQ}Oo;f|;z4Ll+_r>@1-xl3|
zawq-H%e&ckC+@AhPrP6BK<z=<L*0kfKU@CX*zeqbYQT4(^U>T#_XdT7&;F71j}Joy
zkC~6lh7E@6o;W@^IpRNZ{ptLtL(gQ-CY~4mqW;US7Zxvm_|@yz&e53Bp_lTPlfP|z
zrTyx_>lv@x#=^!PzR7qqF<$gm`|ZJZ+;<)Cqu&ot<a{81DF0~rvGr5Xr~8u`lav1h
z1DNytV>2z=0000WV@Og>004R=004l4008;_004mL004C`008P>0026e000+nl3&F}
z006A)Nkl<Zc-ripb(|g5{r=x)X0EPVHtq&-B?JiWR<u|PlqyhY3#CwMRG>dvXeq^^
zltK#yiaQh!5F<+5eUo*)GBfA*$6T4YckbQ0Nw9wB;k9J<%E*}`&v`y3O8bs$GW1v|
z(%vMENC&mO%IMp-H$8%M{gv)s1%Yt>*@I)cd`%Si1qwfQp%6Vdm)mEBu-+H856Q%5
zW%A1|jU^nP5`1AH3TrXZgSL|{pGdWYz5nd%W|4c;)!c7RX1|?!qQZ7Ak?X!i#w%i<
zKBCOmq;&6RGUs1n-!!;=zQ|~N$(IdsAIv6Se2AR4Blm4T?ZH?S`>el+tohsR!17b>
zHDX_WS9G&J@8k8*^*RMYAiFeOZwp3R+XFSFJ`OtW7!En)Fs4kMifNh!-k@|&TGH)(
znPYJgS=~iCCP9}on$mrN7Rk>iz9_8gk-5f#lpsXvngw8D=6s6M`M)gEAQBg0O4Hdc
zCM2&y%H($?(sbUhl+rq0;()1t0cpzA{YhzB_m=p+DJ3F7PmpG+4WyJvA#KfX9aAC`
z=duoHCp}hs351Z=dotZl$<L-+H1V5>^KWVYOxCKFW?=RQA~RNB+vhTSg-D&rx@$AD
z8%mkcpE8b+@eI=wi|ElX>lrc0F>0ht4St#Kyoo!r{!2c;<g+uSOm%db`d;b*W{e-X
zR}+Uw&A7QAXQ2m^`S&MT3y0f=CEqmJ{ZjXNFZOPIK&EG7oa08y+>}oge2;Pu?_KV3
zPq%j&k@-T-&x^tjFZO&a3P-z(T&q}~_7W~n!bz4z4mKv;`meB<zmi(RL~0&XgmWaM
z-*aiZLTH32tStc)+qET+Dx3o`vEnFuPBlex@vv{O)3cfo;oe<U#Ul8FD=%l*u#qfS
zxQLxQ>maqj3YXy|olP#SCBi;wBJGo-%+uus(uK!bhf2O?rWf^$7En^n<|Ig_v|Xo6
z+>Vf0Go_UF1>3YO80iHeb>GQrQc~@gv4C2iGfkN~Hkg>EMJS}1BpN1W>RbszkRV9b
z?*?Y-caT_wLz+hFv!-b#{!K5$rkQvKsdLzmY1*zU{aTuQ*xNioOpvK|OErlp69mpW
zuQX+f0Ez@rk}^$fgep=bD%n?3?Uy2T$>R%95=2o5*U8!Hme#ckq1f8l;;fJ+c-Etl
zU^oek=}JuKc0v-ik!zm>3f-w8rGqRaNu`Z~qS*UeVsl_hnYwRlFq?Sr;NgoT0gD{}
zlIL|LG3O;-Q<TK-3J7b1Xb}>DKsbm?iu@^xV>4$F8j&?8Szi^oiHYrfp$KbTO}r+A
zKv6{Axl$C!e>1sI>Pkgo{<F4U5lwcrG3&Tv7&>euue|mKKA%QWQP^c$l#B06$HJ4M
z5{B8W$eX+#nV}iWEOKMI?84K{EQLTwCoz$BBH^-KOD@3Dw)@OfiR=ncni$FSjy<U)
zNb6yy7MuiWAfa%WNg|S1m{Mwo=_EqQ?>VnUrhYe!Y+{lmFUjwxln+x{>Wz)~*nhB{
z!$IJr^*tq_CRt=kIs~iaGf93|NRd94lnGLiIFD_&>riVPyQLhvLXqa`Qkph$B5f*}
zbXT=(>X2PdlhQ>+=~gun`FDFgn8F;yBtfF=V@*v-W6Ab5K}rlMF(nwLMKF^j+TQN=
zXDc(tL+TkwnZ2WR^28ob&Z*;x^yF)QHg@&TZ8I)hO+zxHjYaNVy)67$BrkYxG=v^&
zFanpk$2NbtJgZb2$nMpzd<%x$lRK2zuiLLmxITa3=m!~Vp8M)0Ga5<sRPzx%ekj6a
z(RObq;d;leCvjQylYLRT{4GRcJ1s=&_2lnD5s3{KC<)TxY**)ZvgRR&;?iBe7mkNx
zKaZk_G*J<@<GB)?Zkk=>plZTtRT0P(LDBm3tzzauhw$;jMfiLgs;XvxJJ+DdA=~Gd
zkcG<xBvXz6+256}q$HQQ$36+0GKV?Jg_PJA)U4~Xn@4PBqVz(nq)ahM#X=;^I%ZP6
zv5_SE0)mZbWD=w_0Wlq9#7=<H|BCec0>@|5>WXQpThjKPG_&qoN{Mco3FSg!=WEI9
zOAWLHk#RgNn*x+>H&XJXByE#TJue}VQpwV0Ez?y--$;DdG-VDoQY08}&n(K)_Ut~3
zO_qYQ-Ias_B!oyU2O=dGTLeWYA|d=)-&GXF@jS@cm(!Dsot*3`Dak8%i%i1|h0O=H
zkJ}fJ<QNxjhJ5Kh@8o-iJ@v?vJ!pf%j3>E$>x8f?j6Ebzd+fU5MoOeBHOWUxL}J_t
zJK-$ULMoHWdwQXh-58f#pMdO!6y`PKWbNZ~epY0zgF-rVRZ~jWF_|=>+vhaLSe0oL
zhqT#BGdE%BaV)adJ%n|BH*!)~7ZHV%Z?PvtF$WE_eO9Zks$k66aV-7!<Ag$?93qKu
zeKaylQWoi*ZCcK7y%4*<Mase|-3f%7Y%XjAQMeEq>F5~J;d_xe=-ei>T)R()r6<*?
z5*^9rOOhfIDf3Cf93u^zDJA2Fq{3oXN)jd-({x;q^EHWK%9Na8rW7NYGHWGw;f7(P
zZo<S)Xwt2lTJSBqQ_4i*Mo!Z0ltB)KNZQX*rk#Wh#PwO*%#Epm?p$<oDOt9CjS#8s
zmNtVqCpnqwyD~39vG4x(B`I;6tg`-2^{ce+ld##GEfbZ3A}mv$lGtHM`+tdJm?;t>
zQsg<gqs>yAdb*a0o;QKa^QIs_mrTwr1rbM)pIL}~bloz?`}v8RaQHho<~NtcrpN50
zN5op@{afbIiqfP+WbNwr3`t+99Q{DJk%Mj=t$XZd<4#I4U)vKe96Q0bZ-N}pJn2Iz
zZ02p3wJE=HD;>lp^<FL}E%uDG^hCYNRBD8fdCfqYs;Y#;p^U{jgPb_-IZZy2yE!S6
zJ7hDx8xc0!xfFTTlw1qHn@*%89-f_9W7|o)?KWhFDF!=%a3f2Z{|d`oky0IO584z7
zWdTcuOPXwwvVatpe}HM)%`Vbmwvnk0DHClgQ=fO5Y)sp6T;4a+-?J}Jc1PJv^GwoI
zK&oA3mN_jwkkY0Rr@~@pjliUdD!Kblcp-slcdC*&yvA$<FSWC<AJ3uNyGX$qQh8D}
zk+$ohTSq&QMR=4P6Rpg*OLxeZBF9?kV&+U-qba4+sRfBp1&S$=O7b33EX-jxQIrHB
zNfOWm!F7-kDKgqZ_IwG;m?ToeLZ&wxJz0}-lM>nUd6L{KN1@8f-k5m`o#>M$&P>^=
zJ2PWm(qiAS6>{ZSHa6)P147{PoSpxs6%#kpoOJ0sZpU_#lkOTid-&(^uC|>oQ#FyP
z4YbX4BYO7yUCog>`k9@GBvtPup;Hva3U*KghGAHLOUt}twR3tLTkmCWZpd&gNPi|V
z$VAV2Xx>g;z#-g46_J{g+&--3+)=n$aHMp%>PW{^&px0ahZ1AIvE&J}2UVtxUM8F;
zGnJCOCL|#e&Y$@|YgbByEo#SU7P8tQc|1i)kQO6N22$#zX%T_sJ(yBrnudcIrF~M&
z#Bt3O32~ZroGJ={VI;mIO)zc#BZh&QG@aN?IWld7OaGm8%FVQIV~-ZH_U;H_Ic3^9
zNVcs!yPeHc|1ncGODWRi#57IkaTNP;GdfHzq9E-)B|Tj%a?6(v|8wDt#F7OH_9BB#
z*&|-0!~ACv4f|Rulj<*u<p^!tbt%GWGgnpX`KTgIPTY2Aj>Qm>Wd;z1Q-kzAQ;O_G
zB40R8Dz01PIEmb2lUt$WV{b`{=oyW2)k%a+!Am=Rn+{V*&(xE>Bqh?#Eayf_NRbjp
zV~Fk>BP$JpD5L@Ntb%z>I5K0yk?yDVzhyy6OQE`gaBQZW=E(G1m8pWHh>B@#bnU9V
z<uYJj&&(7#NtudV=9K(nrl-<prpDL(A#%Mf@+fwiAiu4+yYY~A<dUiA8s|VuMtkI$
z6l7AmlJ4WmJ~%}>WVE}`NW0HRy7On-a2<}VE=0#+)=4<~+B=A0ChY$Rn@NUrRF1U!
zf~3tQ(&1m?R6iVkA&9Kk?0zXu9}=4>$uQE+u+m9#k_w64;n#8hNm7%kDw)}Gx|vc&
zY=#myl}tEy$3mtZK+};u>1ZF*p;m}2B5XN5<En%u{MenlH6e1SCL;glJNX^kx|>>q
zWk$$%(lO12l%z~5_FZkpWR-MKvp<KFN|kVKPCKy*+k})JV`ifL6d{t<YTLx@W-5?9
zlXa!L+97P=uQIPGU?13p9QPt}5Gm<uGTT?^PSlopZ%;b1vpD<=M0zgSqpK1H>N`0|
zi5pk2#cX6aJE!M-*ESLP$%$+G2shQl%@ay=f1CMujLf|}(#^ATO(7t%H#pL+Y`U0N
za+!0bOsMpv35}hIkYmG<c`ey}zvo1xkk3nG-dWVmvnSt?wL)#Fsok;dhO?wxq%A3w
zNT0eO^Nn;@dk{`}-o<p_ZXQaBa%pnn_-uON%|%KwUvn<(RvQ?Gks6>f71k`Wj%%7}
zLXuQIGD(P?oa8m(nCZXm(LPDPljMMKoI^T&LQ;;nW~M`LMt+hkM_+4VGEJEwcG={~
zq|>T&Q4o^HOXhbG0)*+DAnc|&+yc{bDK#1SOKh3S>|P~ylUmXPzB?biye6AW{}-F{
zpRn8G6NJc4;_aDP9R3P6n{$eYD9#)(f`nx(V~8n2AQNHQZp*g&#ActQW$wA%T@206
z#Zo8{klo4f-S13uFM77NHS;JV-AG@18j&Lk+|kR7oI8ayMV5TuQ&Qr#*vqVG*D-GG
z3QC%Q7Zxho^TcKaNRow+6iJ@sgauiQ5Yo-G<~*={{MawsIW{xrDd9@ArEQ~^N_~*I
zDNC<P>EH`{pD-oX)F#|FSuS^7aI9JmMj<mcK|LdS&N*FkRT(lZa5DGcaP$06ZevA4
zqEDIo?G0+*wIv<&Y;oEdBC+jZ+V9NFqv$wI5e^4VTbM7>MHNUns^%UQmN~{2nPQrW
zj^K>GNva{4<iW0XqzObeDM|gF;ag%^ZY(t>lguQQjkLKb@t%;`c~g=yW5VIpOpq&)
zOg3VQgvWW(7H(piNe9dX(J<4}V%pi2l!H_DB$_;K(hWqU!jm1tJ8^y1_f5M&CHW8%
zE-TJGs>9jUo`7!eX38FKqXo_gl{AS<Cb7$&s-&CJo-s)ak^H_uRjf8r68V56(lX(t
z)EAl9fM$E~%d9ahQ*=tY<sOpx7v~<WBRQ-&-5$^GmPA@jvge=5^ij*}>MZOgI$2QY
zvB=&g)8n+CGB?R`nssE3xwd<@l+zq1bDM55zo>}hI2Gya)HYI5Z~}|&NX1?!uFib`
zDTQkq+T5f>cK<n>X(r2$EYV&vXS|y=e<z7U(!5QE5^9kP1=Tiold1`}+)aw&biq#g
z^(CY4q|69kPUV2g*Op2*#!69unNZ|p=lSzTON*Guj7d@0SeHZ7b6Ko~aGwn94zf;%
z$_y#d7B!HzV+u%x;EEJovfK7eyFI{uy)G(>Ti8|Vo-+oiX=X<7WP}N))DBxNj}#ej
z?#S(mN6O@q{K+6Hc4Cqhbt97mMq+o2mD0p;BQY}V5Sfn3v51VljjZFD>E~q+@5RWl
z1WJbrl^h60>KTeO2}u2&R;3({ml=ydqUGHU%~GVyJwnLr$yvHf^+|J!kj}`jRJ0!U
z#X3!CL;-VOuC(k9QX-uTj6-CxC9D&v7ESw$6eP(e$wqPtNo=jGJ5W+8oj^fRZ00s8
zk(T6@Q|-WEYRbK!IGp}6ccz)%jj}+}l1t3UMT(LpB$<&jLT2x$rHf+ZW_pl$`jpdR
zBC^#cX;VS=ko@M7`Ex4FHs^FlAI@w%*^P&-U35vdjS!AZpo%LgD@@67&+naiJtA{o
zS{TvGNhpN#*w9VXO~xxCzanG#!zorCt)!#BbZ(5Z*GHSGA#4hJGNGC+WIna|5^m`M
z5{~kwbP$b{?^)7aQ*nsUkm1v0Im_ahs|2}I#pRNsTpgKRO01+`Gi?OVnZiSJJ*8<N
zO`}`$OJ=8%*pgb={71~x0-kN-v>t5ws;!XEWFsqSn{^^uMUq(9(+5ajg_(}NaO5Ac
zDM2Y`(1Z^IGMx?8%xk)_FaAzbPqNdbGOH%9A(6EeGwJkdCd@F-q-$2<v}7o;Op%Zj
z!7$T~tCk7H#59sBiIFm$*fY*%5}ky=;7nAOc;CJovpTu3JuB(haVQxRN7AV^wTnu8
z))5AmQa*4Pu<bT$BQX)Wn^r{5IZ!AXN#{)=-0jFRaS!RmLOOPjW@-&px{IjGnmk3G
z6xo?((6ma}y?G*YkDtp9tti=!z7EGkmzV)1K~5yO!&BW&1^F3;bc>pBwQ={*Fp@7Q
z$1Rmb%E!pz-<$SFO0`i&qO%-IjmUS^!ukCq=@dB^J5jJHBHuG`jq(r~gi^YgYqA)k
z(+reJN*wA)4plJg)*K|Wr_4;c?6mh>i`i?q$%UD|B#H4P>}!!Dsbjv>1R`5>6LvD=
zv|&i;&|_21?MO47^(ey}gv{^sDjY}5#S2|*Vj}w(g$r8tRas_DvRZP#mi&pwV>C9k
zAp#Z7PMkUO%Uof(PMeXdFNw_6$rG|6$+Wz70+S#Wi7c=w>#=kpI^;_HX7gdNElz0y
zk}2pp)2llfu$i8K%tS^PfrFZw$#V#cR7gdFVk0+6vx%9!4=b`pk%`WpGDDeGs&ZTU
ze23WvGv$z*&ax>T10$93RA$%X$jm9@^v_7kw|3>hxp+D!Ft@Ja2qhI6J5AwKD{@YT
znUNzxA=17JJ>HctJ-JVs_Mk5z(ortSNkF>zE9A@dXcz`k$W&&=?nsGDkv5rIPKN@N
zNV_7C?S-F|dWFqgB=SuhQuf?jkaOOVIhI`E>|d@bgnPhcPNLx0dWpi9DW|15HMI+e
zecYzB*%gM2?6blycsqiTgrkH*_VbkmsSNhJGLxAxMW#O$1(F%*$cUWFE@vktSz}OS
zmSK?D{saYtl8S=dq4&@kx<EUZ$S~RLQ4Swlb<I@dqOJY1GLFj}R8-ibK$X;7or-qK
zFvH4>_0G;DgyK{UrK99U!p9Kd*eoO?^wg9VCNna`x_kM#j?#i2o1=J(GoO!?sljP8
z<s=ugI3m;+wf`AlbbXp8_?+Fb@I93%c+<7duX``O{6*G`(8KTTgD8XUi=Me{gFc1L
z$R0xT7qRl~Khd;f391$>?1p9Tu2abMD2hs3OCxP<jj1qkTq1F@$VoD39QIH`mr2@X
zXPl*EIGCR^mA9e@tZ43JK}IW@Co|;U&0Mf2$-TPoA+iU(!F>YEKi^6B^3g)(Ry!O-
zA~TtubTL>t36x{cD)L*TWZq=wJ#RC2bt}0L=CJ8YyXn+DH-ux?>`0T2tA;4@m``#$
z{pK<uxyoKHUbvYNMTO?z5PL8S6<C=vG0w0hN0ej=Rx*b_OQzas%ix@d$PtM=SgCoy
z?(8lyn2D)aA;u106D!al`FhHPZ6-}eO3M7M3X!|j66X`$nr{l7@ss`4bbSU|N_$A;
z+ep|8z>I<!`^*<3xrg8TwDILDt^R)lrl~vpczQA}_T<^hgtxD7ErUQ#XGo`MF*`|I
z-h3!|vc+akAqqlRd1jPEayb-XQ^(v>VcTmn+5a(Rj`X{t=Q$z;x&0=R3%|%I<IAiy
zPGs6>$aSgiu>!)jpA-^XDFCuee$MD6GUdd~)WnW|3(m@(m#*c{4l7a_l{5OCY3Auy
z>EjA}jg>sf(qyjm^&*2X^t9Bhbg3He2v{gYr_1ffTZlJIeu|lcNJ*!{o_SBQhfR<&
zyCf>SlPFV>K9)%J`6OXU{v_wXRD#7sA4w%`6Uic}N<xiEsNYK3kz7fI-`iD8Tllsk
zW2=kfNS<AUkj}m$GQ3+;stI-<lLEuTJ$U%Pj=aKr#!k;}x^dqq7UJFKZekKHj=ZUD
zyluf!Y&A%del~WmeIsH1LFV><ajE~EPb0FK<=ob5TUar|r42IuKJqQ_xg%-1pVHFj
zl37ZCyMk*k8<2K(%r?>GuNRhk5tVs_2Df|8;n?FsYNay>z<w<@BI5Wx-^J$5!Jo%Z
zMCN{kLgJ#1h=O+yxqW(^^iCE;WwKQ=*<JM>nTJSscf~0`5Sj855;m_@nW>hUPV;!u
z_G6f&l+u)`*0hm61B4<SeA+Vks3{YqFioVA!w8)1aF_k8^CqXm_OQ(iVv{B*n&X9J
z`f};%10Fo|bSg{-u?f1%kWfgDkn{)KigzXS5r@PpY+>5jDX5dSa8*&Pq<~3{MG?tr
z02v(1rf#?v49l+oWUXz&o)bc5BxbWO2)Ui=@+bIo`ja@K3zHMO$kr+B0!Q8*v^{Z;
z3;B?l$Ll5(H&?__kF*Bi%*W(dtn$?e%2Y)}4#!8Cr5BR3!cwxhq%Bg)9+j1S-?9f|
zOcbnk$XpR3d6^bYvh1#v7HoQR_b(Rt$+9Csqup97Y>EO7r&iNGCjbHyX(pmtQ_s{)
z6buEDYD%(nnE<4c@Ig@=#4;VQAe=-ouf492oYD4Yk;9Z@oyeXJ-o!Ipc<|8OeCbl2
zK}hEg#$_(dKZO-mgiLWnU|>s2pUml@I3-e<4vkG-b5gQ3ktkANx{?x{$?ojRM1o;B
z-F9+&`X?Plo#ig=yKCpfm&}3VzOENgnayP(bky(>nOAHt!+_26FynX`6|dc^;AT5K
z3inO&UXc+8NfgeIf7i$^oMtT{GF7d#cd*F2fOi+Al|M)#*XyqBRA5~fdjwu8O3${L
zccwBdgbWEsf0I2RliejLbz_RcmKejXa4AaK)MjQ?xfiLl5Xo{DsT?OFF&88<#hSuO
zai7e{C~TV%sTc^M+K9H|3}env-pH$@$UIY9hPhM79CBGwF%i-#Hs=u%4<7bFE6FAv
z(pK+A<nYhT+T?fRqbG1K;Hj`~8|e^<U5-d4TmwaM&IM8?6S5`B11gHG)PNN-t|%f!
zXwqTv_WUdMNGzFQp2?hxoW%j8BhN!}5>EOzBwx3i8?yaN5N`1lqFaqBMbe~|OfW^3
z5|K=fGz5;Y`E23_U>0ci&J|&_w;j-W?q*gSThG!)o`pzNp%&@f3>gl*2@^twFF@`_
z%@JynEiQF`BQjH5a50aFj3^rEOl&S)=%L7w&&KUF;X?c}>8G@h=N^(w=aMe$dl^Kk
z{6;cqTOz7X+SDvX!AK<}m5wB!$)bIR75JI*J27qdl>E=ig<{PMGTDcvOhuRpM<(vX
zHDxAgluojS=tj<T&G2k{5-FRsJt`-W`P1Vi9{#T&>Fnti^1H9eOU}JskE0^9zhJL?
zoFppN9AUbL{|b8~QF_cPsYy(rC^92?pe=cqJ-uo-S->-Qsb;<%w7t%baFP+3xh;kq
zJ`9B|4^mp;{fcekwr<zV@F#)p((C6h0_avDWDj#b<SB4yS4*7gk4RVjO+{oRi$O}4
z)bkl9&ymz8ukw(&`*nLx1=+8p>#jT(5s_|r=Y=iFVWI^Ji^0h>=eUPf_jI|;<pJez
z!cHVUPy~sJ!Xjk?vg+s93dBkyMc_>%(N9go+Gr$>C5&`h1IyP$apbj1iLb&yDk>sT
zY~EDT4%Mj*kRxTjYmezxWp?u?ar3Ow_GnU<l4vZQfK62dexI82^U;`rstPo9-!1~W
zVWJx*exI7NH2q#E^~B-^LXdTD`R+#u>wP_0r$m6NDj0@|rYhaGfs_!98%R?U3}`)$
z3Xa4KhrK!AQ}?QXnGn`76(R6xpWY(=Swh!!UViau*00~l#g}}S($bQ>S4{GGqhqss
z=W!y;l1)W-T0r*X>2PYZ{f<l*OSD3Y&8)s<voI%QWB2T~nYBCsXO0b7NOWC>Da`IG
zBW=;3GPgO$?)Y1{s+BuYIIgW}_fgqr+FJLYl!bgs<}}@;GKdOi8zuco6q~st?>S^<
zCzRcjj071;=^GOA#vjRSJ;6>2W%sS%-cfATuHBrQ-A0y32{YMwWilg@x+f<h@ADM4
z=oFF8-sQ+ECNjuSR`F4rLruB@u`SP(l8n|#$RmoCh*J@Y#eNW&Qc3u#nMrRH6scsC
z9B?X*WT<MHiJn~~BByMdMPi*v*0j{a5Tc-gXG%#ZpfPp-8Uj8IRTZq?+REB3Efj^c
ztPPQAO2&?;q_HJReN)#ytMVx&4DMS(-<l#;Y-pmTEtay!?e%V2N&-HWNu#TYM0Hkf
zY^JRvMmXd{2=d-fT$hX-R8DPG7{8_vi5t{4bkeIb#MZhFw(su9Nus0#O%;q7SV^y{
z5DQn<)6o?#m~@$@Wc-LqDoTR{d<spiQ9fQ-kD^%QanBZU$>_o5bVPLO>bv+9inJ1m
z86Y7PR6#;aH;L;ep`iAu1&CEvRnpMdSXh{`%Pu)tS|BS;e6GpIZcgo{5!244!Zksa
zTj*YT+?hB9k#y>6GN;-+myt@3PulY=d2RM2d~RvMq@%X5a9v1q<!_NlTU0@TW)asF
zHp6qo<-9#jCMRWg&#ti0#-0n)ZsnYFye~53bz4<ykrC3Rh(g*y<~)tec{kD}Y&hHB
z#h&LQ`*<#yPK9(PMw11$o4wMx>v+m+K9Mtftsu+CI?prB_d$^{ES-KWS&qn=rK%;)
z{+*!+lF(kHVMW+jvBg+ECW?~CNUm5(*%BGkrIM(@l`#3))9Xti-2J;U|IABJGJQ(S
z?Cnb8_LQt|i|!YyKGk7<eBmS}j;>;G-x99AZ~{}u)DVkjPx7(2$#>2e!}PJe(2ad(
zE0R)DUJ_t%-x30T&6#guACMkZRp?h+L``Lga8TonqlZyd9;7Rx^W8JYFl~(c{d7g*
zoPWYd&N^loL;9C6xKA+^r9lSvDWRmupLa0Dbb|rCi@E0FiA)<)lQjssLrgdM&Y5F4
z;gEsUR);z7gb`eD(nwTA>~Ww~XGG`x6Gw2^l)n44jqN0G(&%c&ji{ot%OIwk^sWwb
z__Th&rxze*8V06e@@YYkp;~6VE(-j<kllGsNLwhd>7qu+bQVd{(LBlBk|pd5l+^!~
z)bI8Ui}U+3QPeFXqA&TMqa1>n`Y~m;ecyHCY%?E8GKyD9TNw$Yvm&qK$F$OPOE*%I
zS+=1k{UF!=J>wd)E-3r+h5gtjZz&V^h3l~uCGF&_B%GiXk$#3s>b?90)bc;2T#I@x
zg3=x7DJ-*<BvCpd)!hoa#-7}hlN{L=QQ7?=_AF0rE;^I^&vgElta)Y_NNFVOkG33S
zCaGLxsd6QznXVu&ag>Wm6^%`lLXl=dZ8y!-u~S4Rk#Rk__L_-n%5@)7=DS}Tah1}w
z&uBeuU?HsC_qN>~{Nwr6Y}nq)jo&|j6Au~0hl}ed3HuTYSRzS_fJjUy8Z$5qi4azG
zL;)CviK<%3UUb7u?CJ%EVLC#hG)=)YWvY&gnUJFwEZ@z$3wBUi>_ZU(-7wRMVpPkS
z&M=%_%c>$$%8HRl<F2V9@w-f!TG~5fJo@q)Oj9zbPYGuoHH>vzTG_a*jjpKeen{U#
zvVmf{!Q1n<^U!mv@Tr1;U*(;7+Xx0V0zQSfZlVZ*s#xbuK5WA<DGB@N=+e3C@#VC%
z$M9<kx}I(iE7VhBD=?W-Lj=$j)p=$179M|fEvFqZgiFsE%M0&pqOBu_VJ2*+QX&%f
ztSQO%m#In2Fil7FLRZ8{kxuIwrn{J$2tUIXh>{rrl52Br7?R5J09Twl9#cwgy#HhB
z8alc1yzvYlP)6&$^Z9t?ZbAWV??^~SlBs0fAqkF3&wwM%dm$5x-DKjTNw`ltDH$|>
zor(0$$1P32U9oT~5vi)#c3IzTM{BS5BNL?%z>$p2D*C5@X<GGl9MuPfV?*P354ZI8
zg=coKbA?<rkP1=I$xwD=4pV|m?kF>#oN$|P^Z1o?m&2i;W{}-1VlpcxHk}|15Q?oo
zDo%5N&7_lD+*5@j%^c4wj}vUVG>E%G;1KpQ)e4ELA5lKjjdY>rx%z<X2+Z&{moks)
zk)zg+$eGnAmkyKNH-*eFEhY|WW}G&eEK!oIw`QAnOsB)Br8O!UCSjQ}<;cXmZ>AjG
zGpZHaoLZ&KBn^qbm2}2rOMyx_RCgyM30!<kG6uBmacQ|^<nD%zBA__zqa@_x-><CY
znu{kfenb_)fXdm&4kH}Un6tEwzdySQ!;nlES;f%@_9q%Mxbxqi5Z6tvIBy*HKDnIr
z+gkbcrPFx+-A!!Y)ya3y+MlA3Mr%hL0o?J}Ckz`{%6Z2Rr?DkUD4?=pLo=^_u!ZlR
zJC?sb_6bMN=*RGZWd!{y0l&)Mo?gkkWxF}&_~9Hey)WB#cTiax<edfEd3E*{A~A!n
z9y^ShiV$}_{s~9V=+Bh>dvWLE%Q$RmUxWhjxJm!oVtQAH(KNv~Pa91ns?!<KnK-J7
z;|>}?B&u`Uzm`$g(3$qZkWg6`V8p;uq=fqB2*162I&aL~h9cnH<44fc8s#tlT*@hj
z4QAAkas=?e(<?ad#1WJh`?>6^W4Y(aPdIwU01lp1i*8ERZEofHcQ^69v-juUudJi2
z#LofadhzE+mO3WyP(Y=3b(q<Uc5>8={v2~)e_s1wD;Irb6t$Hhn%iQ$^!_HkdhBrS
z`_BqC?`-3;bH=i@u7d@i?B*M%jixB1v3g?*w?4cWiA5Yk0gW?{97<J1fX;})lGXLR
z`|%EDjIX7%$e*fYylP_$JL|jXRT-oxq!Ejow6w>FL@nPOGcf@ws-U5%gMU6dmv5gt
zlOJC+kyy;2Uu`kZzqyo8R&OWZ53@I3*-}bMOH0r+E!DSmT}KFkrm0j`R!~}6ni{Cl
zXpGLz&H~6u#^`fRmX_&4CsWf_(wVJ$Go8$D0+QJidsZ?x7pDq)p|8v;!$JsDAuw=$
zUdXg2V?`!p*JW`g>+HTVN?`_%ZcJa93D{(TbSP($Tj?GZ(gQN#$emJv=wHwUO82a0
z0=Jwb!j`uMo8xGD>9mKS+WUm-W%N`MkOe)uycVjS1}bM?b2k?*rR$~2OuLVuoBXob
zCl}q-;K_{Yk!e3IiLlC7NT<JxnHt+NW%9_*q@4CAkqIJUN>Gv`*Gwc*vtCS_rlm}6
zM3QQX<pJvqCzqy7MF1r~m#o2)JF?qedo7U)-)&;DZP=8(G=8S!evu$5C(ar~XT;#m
zx!XAMfd0%FUyET%bW`%HyXK?ol2Z;HOgN}fT^>Z!6r_ZzvLGS9#-UUCAb=b1|CrW}
z7}e$0;&$R8gLr5D4(@+y1*OG)DocZ?s-UJKgsKS2iv5HG8vpOXMYMIq88@<u>dGKT
z&FIfRo?p##Z*QVkWr)(SKefYX?}#(FZwa+kVGf_(kD>ibC@T&yenb`VxJgNokIK>@
z4?eS!mi8DAJhPIO8=5IC@)OfdZhBxLrNw?m4lK(uPaH6|7nhwgmh(>>L1k%x(qca$
zzeZ8WM`@9dd!ATMugVaIPw&V33wN@8cL!fRb~ul{yq3o12!DTW6~TbU(FgYDZ_lpc
zPY*9))R1z<ji}_scQ-L@Yz@=L_TuqZ*SVTll1{j>xIrkWF?DPWV}@1o#++^VeF`TY
zGKkKIPHk0)Xw0BrO%ZE1w{X&-gYf%RUjJ|_6GvBZ>_G$Q=!zpHj2TwJfIdY$^!#ex
zU9f}kBdZu#TY{<zD$4@QS-P9XmM8;z7gG}UQBxiu5;N$E8ia$EKT_t{R5d?OzrB@z
zzp$9z)nWSdDq`;9&D{Rz63{{@V()A@ZSCzmc>f)I^#1G2nf(THX1~FLId4-O4l`l=
zSXL~Zn|l4D_h08{*Ih+pW7A%%vcg5O&q|4IGfQNCF3aR2({il)j4kast<#?Vw&SPF
zFiC~Smd-j;ElR&<&0k95H6`&Q6p?bM#TFW!bw4umryGggMK*VuNOGIQx)bZAyWMCX
z{p3@<3N>5gxD)AO5)rm&4qL|7bf_t|q-nxIl0=@yNt*3M=FYZ9>`uDNTisc=a?`xM
zS)O`4jAf=tNA~RL6>@axa!=B>VM&Gpo3<ZP<G?l_*v3b?tJutwX2!<BOq*Dd*=ACi
zagHRxu@hF)%r49;Gh0vQ?(@RILS3k6+LU9TAbW01AK0ga-A!F6io$@}VpgngWKiD{
z=6$k@T}@qpWYNlcw$`=t@rvC{+OHZ-Q_u}F75x&48B|w<7&E+z=ilDI#_jDq@#;FR
zzHlOAhF22wtGxXFW_C7o^5)!a3?EPq5{IA1ijB=|-_^le^S5!twEo26COhjpd4J(f
zx}rME);6LgR1LqTvTR)=2T$q4nBf&PG)HJ^jk5o+3W5QZ4;R;Q;voYuOv{TIX+02$
zL^n*9t!-rW=4KYItY_+&Ud&y#D`l2Z6v1mBZsp+@R->sRW&Sdy<qf^Hu9No8ILFK!
zKyzD^>hb`(A({J$bqopUy1^ln`?9OCi`ffzqN##a8=DwVTg3cNc5&VbBdKfXq`o=g
z>X2%hlB)6`rNw^UUs%UMlX_Fv(8<8w#q4g1@X^wp)Rc!9Ke7s;z^<kU+jey@dPoJE
zwzo30e<_PsH?VbQI|q!bB^XedvVS#;S2wV6TN^EHF(&U{O=*cABy8K&NoOR^_T8O~
z99Tw8MIhzCs40SI%y7-f7?0}=>R-#)(E|{GUsLGUr;^FzhOufx6QSVVnQ{DnKhM4J
zDvOpZCmxTdOgU$rc^b_vExh#dYXtljSq+7P%$+-*U@+MIB$F7}&Rue{2(8E!X_>uS
zlQO%iv2c$=Nv1x}bPRQ<6&c%3w<3VjW_n9ri$yeS*$YzjwXE=6M0QnDkx}*39{rIS
zYU^B}bND#qEEbbqP?eMf?^dKw+V-nC*3$x0t>&uflZ$xly;HxW07HG2hGcha6*foL
z^e*37<k5besd_3YH6>R8NxQ>!q4$uPcF#R@x*K8dbIoAkR?#|F6FB>!J^P8wqdsNl
zWl5hXqrAI=1Qgn5ofn->nwU;F=pg=PhN(t49ln$5NYV^gs3W*=C`mGhvgL%9lg$)>
zSlmF@CFdPKoR3%T=7YsMIQy8PY~9tt15d9+RRlr5N;s&|r>2PV;s6szS2K6nF4{Ze
zsH&Bra^k3J%1iw0Zt7y)<`xc{+LwhZ>pAwI0RXJt*vvr_doy!FZ{{uE#q@EtY~R(9
z8kk8NotE$)@oQFi@8VVU96Yf%<Azt#8Pyp+po}eb*7r13uyK1E4b2hGIBF;_y|<Z2
zOy`7y2T|A1$@*=rXqu9)b}k?mPx`rlrYfk46+){UW=5zU_<ah+Aq^$5DBJb&WMZ37
z);4m$xL!Q-<_1=8YC%&Kj-5Hc+NCOjMXTyL{@?+O9bQROYm{OA%eePH%jsKF#L5j#
zgo7I4pk_t2*s?grbxA{Wl(UZ+PEk<f!zDZET@_;T{?**~)N&eIqWFC(GsgGg*n<Wz
zeQYoO@X#WfTBGc&@1&_M%B}xcVwn^b!Pib!iN*{*S=YpjakbP`1nE;<gijT0*w)IF
z{i-P~@}a5<wUr?{y5j7t?_x;*QaU3#E$y+CZ;!n*8>Xb9G{|+|n9PVlWjyxcLU!(M
z<;n{W<=TrUbMxOnX4S@K0)BOmCznt#$Y1Zghj=`mI(IxC=aiFAVB^NkeE-U;s3<Q_
z4bWgPNNGt)mS0Nt=Er^DrFI(GX*J0Vk(D;{Nopa;Hn*l;$gEasH<jeGz&eWnnl5BP
zr1K+S<xen^5l2e8yuBl#Q>sLJItyj8im`PLr=LkG$BK|S4Ky-m{AD_vGMScJahSkm
z2H%j*=!-o}(bN;tk#C}w8Mb;M3eAR^ZO%#)5s@On0vF#Xk>O$CVs=v!es>N(lWz0O
zWG}_}GpfooxplGcNSQsPWOs%0y0P%>`^dp${}O4}Dwj(TF4vxA&J-E_-A1F++JMY6
z7M%Sgoyaa%h45q=#q5RNVYW#`J(;EiML}SKX*p0Q3jn6-?<h*v*d}4-6&d42xI9ro
zj*Zmb`k2Jx24%$oet5wI4AW%6ih7=VdlQNfy!hTGzIM_`4j5aDDJ2g)y@ICJ7!yWT
zGWqJ6=(@>Ai|go$8f>rY;L7vH)7}+FBIt_h%vn~)56&OQjaM9CrOlO+#?~kcmha-+
z6NYohls=S~_}RFvEupqpJ6Bzo#1ra?VMq*9vUOJnYc@CYqYEdnwXOqS!tpfOC;`99
z>WwYzH>841+uN)V)quvD&8-A{Dsf#B*R7l_(U`%dXYbD)|6WF0M?B?78rNkaQ(n4l
z<8d=9VkZ_iF{Q*XtYZQ!S<}FVZEgJi2M5y79AW*|7Cv5CPb_XN3hTGEvS39$KfY)p
zaouFa`X+WaMY!&plX>*zH4N!n!Z%OfpFcjd(5660PCI-sM;_3R#+C?w`sY$&af5e1
z-oex{HQe#jS+sY?S-5gH|9EaSYp1p{a!?uTHn$SjO<sC`Gv7UPfA0Oop%|v*pD(Va
zr9F;eNEWWBXWZ~AE<0x|k*LAkPj=DV8bt^}agm=xr}RN0`DASq?U6W5ZBc5g!W4yk
zMB)Y=9r3IMGa8Mtb^9(>t=r1O&#xkGD)_Yzm^Ez>P0eiy^12sOij<Tkd`OZ=`k44M
zjhd<|%E~fKai+NsCo{Vfn)|1^t92$E;fv|xnD*pHd*HhuG8|TuJF4t|No0#O9Xn}z
z%^v4>L`GyvdROnrt>L!o6uHb|*vvS|HYhA5{b#?w&bNBH79}d^SPpf>?#Sve!S%$k
zqx-sO*(7#P8aTVCpUha3q%7p9-8;L8j0(jC)yV9@ow?<YbBt3L|B-^+VY)j}4s(}q
z`74W1+mu$jUs)!JNt=5t1vOJeOA;V6S(nF!45d|IH|Lyef|7I8Oq?{S>$X4tIe6cF
z_Y)2mVZ=LWj#r}gKMjmX&avjxlvG4VN0**T+$5!?79<@(BQYZts^-%aqH!ylC28^q
z_*6_&VkA6{lhH1IpTgzmjl-`g{N|no_<Rb6A?epE%ng@K=dqX9@aEiYloa_f3^N^R
zW60Fb+%QbKqB^D_88@<u>n@qZFYlVq<{j;5Hh%|AwN#Jf?}lL}Qh8e)+b|@WD$q2A
zc-%}$T*=hk$<HLAsv`A%`ZcGww2?4lDGCJrR)RR)l*HmDs+xWuNF`e9idYM(-=`3b
z83-W=_!LVqv7N`K3RG1PjhU%ra8?MkrC@>O%o>RrXsQ*<p1gi3!RJ%(C!Sw4ZlsvJ
zk+@&K&x(?Y=_b*r!C}+-AP~%7z8k}oj{8ohN6)b^OG&J&8HvCjsz4EfXrvWsM6AD6
zE$8H^`NOP!|4y2BeuAn63Z4jbUFXBuZ?b01I?g!jyewjp4~nAF+FVat%WhQ7=c-Bw
z$Cwm3iHUU0p^)QvS^Eu}+)hvPamc){W%_ia<l}^WI{8|Xs3dLSGKbweeSDiwgsUkg
zhovRUSHihRmH8AS(XCY^w>pt`)hld4cN6=w<aXKpF-5W*eGcEC!jv6neVwfSnDx90
z->^E$47kz<k+nSKCMAUsE8&{EMu?0G%AzpVAqqAjiQFl3Tq`uXkM+#Yi@hb&E;p;V
zsJ6o9BPN8E-c?Z)6eay{GHty`W}j6=ip(T4(dO!ZnVX1YVr}d4%v7YVb-QNv!?BJP
z(e`MAkx(jPr0Z+g8GB4OiRos>^RX5(k>Ll?8P#nIhRM)=rA!!IjjF)-;gvl2>`D-D
z@Weh;mIoNtzm#~~V9jRB^bt=SQ#aCVEa?j(fa4Ath^h(>9AC@&t*taPMaaxG7B|w@
zW&hnUrR{Y|+%U50D%d}hx(~zcH8X?Vrn7Q(Mh&OpqC3Cem1v_R%Z<d0)bCx1-|gqo
zjr6gS4yRUmdr3z`w=J^5s=Z)1ZPxKbf;0Q`6Sf_8GV5=0S@3BJ5|R2&=7c4?nQ#N)
z%4882KoSTRgD7!#`r8+KTM40nk6=LC=Z6<AQ)^O95F-EWI10*T?m}`*nI=6Cn8>{g
z&a<$(I0)q;PtvUtaVq>@q*SDw=XYBr1gSLJ>9yRn)w6NgMT!C^vz)JGw?XQ@_Cis~
zuFl*&$;oy~&P<#p3O>I*v#>N>{Ex`?FUkA7$nM+SDIe1D9QTdDWp9T<%{gw>uqF9o
zsL~pz=+V3&dUi40M3#v>Gf3tfB3!OtWc-#i%}AL^L=(|D3R&ss-Tcg)CPZoTQE`%1
z>G(}%jRh@}a7if(nyf_+-YfL8Qd%LTLBEPLB@aBak~imUBUHU*SQ|{!HcX*KS}5*T
zJh&GpxCVE(wz#{yy9akDP@uTGyA>!<+}#Pzn_j)2?>N4n+3aq1XLn|2&XHiLPICyG
z{~kOYV9IuPgo7%+Dn#>fY_B}eg24$ta}?$|FAk3x>zoH_l*b~yuRRqE=<C|W-UON}
zOsMQz-p3p)s6w?I|MrpT!xZ_4+1X7swT(uu6)4#7VZ+WWb}`f&YR0PXR|#13)bR!G
z(t4BE*1=qs=(=LfVhDI3r+rY88R(}vDuWeSlH=|vp3!;Bc93fP8l|TuO=pTziW37s
zhln$?*H%<ud0y6kx%P*Kja?z)1jqa9das@OWims|1z)jf^@fXwelHetp+!U|X=)S!
zdc4t71U{6G%W)rz6MpRunr~NV<!f)*VUm`F3m4G$V;kq0Af%QI*{#b7eIDK&l}o6o
z=Ar*`b^~9gc%>i_Y#i!GUSw^O=914PN8erE)yMHeIVGj}vzFr^9WnqT=AtKwwn!{J
z7qBQiZ$4`$A&p{A{tn>MFYl-0q&x%Ba9rR6k{ay$85o`H;y|sOIvg}{MQy9$9oxy}
z5F1T6s&x(GLQ2wXZ^yu7du0*s@95{{IlJi)-;e3kzttCvoT+a{m1HHAut**Tfl6w@
z2?+@#CDe_QKfm&HBz!hll;e$%(ilq)Udp{1o2>CedCC4xV=gYl+jbUgT?Gi@jHi+<
zlTC|3WW}7Qr{*DdwYs&A%)IXFO0W(9Q06QOs&obkNG3V$@(nMl70M3Z*+jk5!r&1q
zcFGpTM_a^p_MAb;?0`M+RNxzS=|#M}<J)0d9DeHgLqeM`AP^$U(GW>t8AC%uOsn94
zs;lHink;Y~J-qbeo4DyB#>V2a3|dMv6@E-+8{`W~vKR_685VsRM^OwF7g@;3j|suF
zG{aejPcw`M+67<b%Njo2P7*0=chKJ&+q(cG1r`-UMLQ-fC|-Oq*y7V5qaiglGubCE
z9!+zs@!uPc6Uj|zR-*Nfzhh+A23QY_q-DC@(mAPdyUz5e>nc=#!91csa!(Di1!IK|
z;g@Q=W3?P`NSCaPt>|{_k+qV+e55jqh2--Lh1;pioi5_B62BMsK@F)(%oE_zX*i%>
zUZAcLsw<IO-;K)L(khZ}Q~{^*>>4aO3hHyeX++HxaI>f}l}k`dF=f6n@wjBM-odx_
zqND&;bcw?`XlN#?MHRK*jExNmdHO2;%&=B|%cb$?x}``VjfQDkal39biF={TF8PfK
z^^peR7GImA{|%SQarqvHt#g!!&pa*30khs78h~TrIWGl`qU#2MZ9t`(;hA>D$ujqC
z5g?sfxpA5FfLprdsx&YI#7Z1T!0l<Jl8{Nh(4AE7<6e)|4dvwAsq`TE?2p9wGz#_-
z={H~4a-45fv>YiHOV8PHyNNmoZ~5tKXhea7oJ}72QVz=-U;VQxKHZ3IO9_EHfc>|M
zKjeZphs3v|DtncsFlk{k-4l}POj;|VS}4lv3y{7DZ;h(!;o(Z+qmuA%uN3V$!^P8H
z$t@M9|K=%~k%9btUy)QPU&4mKb5QxdIS_4KRX?F#P0Tm}T|}5N34QJ}Uq*2N8H0l{
zB{j9UF*X848Z(^EWqh5S*pO9!Z+pav{uv+Si?<^NU8>3GSlzCO6XDB|dJ#ANG+0$N
zNKx5`61K60dxarci<-Dm)#-Gba>W-*na2sFW7aYRGD@w^UFP3anK-NIDj~nswH_K1
z$w^KYtlDy)oLmy%k<L+7)C`APWIq|I^yUT)lB@KONIj&;e~nY+`|_EGQ%*;a`p7m<
z(_O9*R%T|N=7(}_+MBM@XssGl!~^95T2$6yD;(KPrP*b2RFaOki2l6=V3B}$oAuB#
zP5E};m!*@I@K>Hc9bXh6hs`UenO~?(l#jnHx=?y0PW(C(sgB7<dPlY4n@>$`pz?+c
z+exQYGt#1ErZB-Nj4ErdYfOsW*0oK6R<<&Ysnx*TA+6J+Mmo76ohHpX{odPL!}2}1
zYy>wo@%y6MuIv>T%0#5|78Gw6T6yphd(F>;h}%7rrLj1+K?*4pq_mG)6UbB(vNG?R
znP_!ugLkRk3*_PjYnYET`sWTJk7gwekvQ6F6v_M^w~+3qXQlqyvawPIE1UM6lS!<H
zM_rm&wKxGdavk!)6H>p&N7u$5m@=FqH(S`=o}A#ur+jva14K2@)en&7Cm|z=HTIFX
zl^Wfc6;tEH5+DCv+car5ku-ZCJ!i8tq$~7cl`O)FW=L1iWyPENKHWG#mCZ$;oQJ0<
z5M#WsGw7%CHN8l;SgurfnN*N@zH!w?{BMDx<AoV5J4Kmg$0Yf8p<XxX?8PPv`~dRF
z{3PES2U)wES+@<v?)M+y8cGrrs1#(k;c?Gt@1C4<7{Q<$hCpuK)9L<_zKZWAlfN*O
zz=b=v4B`r5;*i}80cx7ZJG|zYgRp^NWywGAzDu;~l*x+XU-pzRCdiXY<pM$Pj^L<8
z0%+Nib>E4zs$A)5kF(Y$RyJSTj>ivZ$zU18nP~_xI@*jP8mQa~3m`%xTo`3w0}{Fm
zfVkS*-GK<u27x+;h8#8m+RrIeVFTo1<iw9punDXWB>d3i%)dR<q3IV63{6EYI3j4V
zgJw2M(PSvMMZo$b>gh@*Q19IzktBitbv0lyPRRYl!yPKLu+?{imuELEIQnQf7dag+
zPOe_)4`KM<oUvd^U+I!?>`F?Ju;U(Gn>b~R$o}(tFZXc{b7zTd&|&cr@3(wAuoM>I
z49B>q#lN-mzJ6wven<jHUAOZZau9sok0U$&-HfTnb^G0_-8>yHL^wy#dtXgOlm)M_
zwl*=#+4*>>{zJ~>9?z!7zpcCmD$cM*-fAOyHtf5)xLnS$D{SRGo^3CcS5l&#mqfT>
zzwc!MFwt%P)C&Fi>QiuGPEhTZY4{16Lxst`-vxK^=;@<-kH3>YnW3yRqCh)Z`80Mq
z`In0PZg)=MNXO3G1?K5>u1<EhX(bm&2Ktk^{&3tcO$GR$oe--v+e`}!o4|pn>C%#t
zG*`RK>s#WHcXwN{T0hOup&y0R)V@uCrzsrBu~0e{mdlqp#<{D(F|_?8*^>QxS9vEU
zd6MLcaN<c=?-YZtM?U;V^iXClR`jrT?J>}7VR?C^;{<OOq3s<{o?%?b0JTlW4zt(!
zhNKud`qJ`;59}$*HEa7y9G^c|8*YfCr>Eobo1v|>-H}_Am6@5Dt@p<6!Xy}phGOMn
z;5pSLvpoMEbbAc9t?_lo)Vs)DE8uvyu}Kz1GMz!5bDA(V$~zgg^*X++;6-u7uPlL-
zqC0+7^_&%1;xt9DsPUtZk}lvFk_Ehq&FC2U9-&TdU!~&t_ZUK%nd`)Qwwx+G7rk44
zCy9J|8!r`9JINpYcir8FXntzt3mD-N_Yd#($b)jLtHV+E#zti+k$ZE?$|CFleVbIW
zZ=iRjuD-F>Yln_}8X%a1+RLF??SNe%5&dPhc-%>x+}szFjOB*AVqC7TsL1ebor5Z)
zn9@{kK~eI&9{j~6#)ymv+DUF{ePEM0`7bo8qMf(i)*PID=hzy`1W{8ne`F+0@!3nB
zgZExJGHPQw0wAtQ{su)&`B6eY5{u`*k?T<tD*?rgNXuYq%acP=0L8TD$?%AD!aYW$
z-|FHkL*zHbjmk!P`wAHAT;Kup%p%DZ9Gn?JqjZQF)*KBk7?Qc~-{pk>7*Qz5<v1D!
zg=Q5&=fPB@Yff|s_3voUum|?73Wwi{a>ZHrMbuzC(TOdkn}_cM1W}9-Vf%Nm5ZWz9
z|Ko{`50W5d4mi+gXW>*m9Y(mrtyYQSEDDeY4Y5!^hsT6~-4rDIyt24B{3eu0oRVPt
zppLGnu&(ee85RKn;l<-KUU9h5zLQg3$=K)g;%e(h7itimEl<CTb5V?WpGnf($L-M0
z)<h$!ERKrTFw*B!#=>d&$jrXR%2)bS+~B+YIZ3zm#aQ%5;%?NATQzD3W4`54<e!`M
zK(CtTa^0&@^dH_k%>4C+M0?(QZ#}r2f4(+9E7HeonRY&5YcQ(vFe(m4LInHT{6o*5
zb22BBFi;GtW9Q|=&7Hd5tnE$WPUJUy4~%{FB7D_a6OpY;3a5FBd1NAz-=mp4ujSjV
zeyy{$e-Ng>TL9`8>GOmdJbw>DeYwZg-{!7-zSqFVJvH{!BW8>yz1U8)o#NP0KIK0X
z@>-s+jRxqf`DXH<;M%X)6S`gd>w%sJF0Mb8M&VEA+(w_-Ux`lsES)y&to0d)jU^Qy
zEZaFo9?-hFeCF>|MLQ43{7;be;v&khA#@}aTN)L5P2F(MQp-8TVJswmw`lZXP?o`(
z8(FM6QvVW1605RYp0X9o7gIB%9QBrG+L>5Q4IO`DC?X%t+IFM2F=uyi&*>xok+zSE
z2Wz~1R>u~qiO>oY&b{gRC}GEV{IjG(cYmY(qEfm0?g{F2Y>WS+j|Yb6$bkLnJ+A%G
zlzhImD9=mM=-tS+9>YshyxSoBZrkhUcsThD9Rt3I%i@hp&*>9g@57HcKhovSC?u3{
z%qeU#yT`e7hksA(xw+|pw|wmJMIS>h7LdPsRp~QmlWc{NzQkC@mgk?veQ0`WgWJcp
zl0+dMbY<d=&)b;x+R|yfSn1VZ@!X;N*!e`@<8Wz5Cu(Yc6uoBJ^rC<h>96ZCSDz_R
zow*7(u~Absp6hCeXPWg2*I_S4O7irD>rwC7(udXVQ($@3X2%+7X!VQFVF>ZKvxe?)
zJOw3dFConTF8FsamUccJW}YHg$F?)kKM>wwD(awgK}ToV%*uis@0ud0=a!g{HTo&0
zOu9DC9E=s*ON+62hn%7yYc7pcZH6U~y`g9%qg@_4^%`|%XKs#OR759A|L&|2Yr6VS
z(8hgRLXczEZYgqsWjEglnWrvnN29%Ki+S>^r75eVE?=}y`?A@wSusT!jM5Ut__2lV
zSmynWn7sb5&RP55fT_Gm+0sNM?Vvqm+Gq9tBJt^_l+o(=;iIcQ;wCtph&vy*NVjk2
zMgRIkC6zjcFbC5vF!mM9mpy~$)>RG?r~{+!HO~B647LH}HqQLEn&P$b{YG4Pb%~n2
zJ;9Y<ci%aD789M9&5>n4UG#MOsBq~f=|`*bF;DqTuT@cV?T3|L=4XGpGfgWu<}yO<
z&zowwFUseTt+J)=Lv1e>EOYj@4$X;J@A=6?&J&j0{|VrH<4p#UKZ!q8#L+o8I2`(8
zeR>c`$EDjl+z!|#_#q<HBz6GyZ^Yx~rUpW~3s<`&N?5@I1JslWKF<&63(l>X2@f<l
zk?dY~EK7X6`}@ZrQWcr}4)Tvrb0<&vJMTIipdo2L8;EID;{yDEVv%{6<$~FQKEah#
z)Z{pnf4E}&BRbDu>aut*zGdYq^oP|8qu<fP-F@*hY<jCU5blBx2$W#AenOPdaf-S{
z+j&MVoGK+y4VmPKmxHY+h%xoCLmC7TPM#x`)LN)uis!Mkg!z9C^l3*xGr$xTM!Oy~
zw>--?w`1)u6KWtpLsFUN`dB7C=cmlkD>g6d)y=ZufRrpuM;BnoOJQHg0cBh?q3FJ8
zZ;V=fv`XYnRM93|Rx07~$kmJg^dAG={=ViH2t#amvH5Xj)!rqkey@S;GaNf=<^&l6
z@z9BHOIo?lCA-V<kKQu~wh*-D6)*2%i!-6gU`$?fbK1(y&99TCeoNb@)RYt)Cjt4_
zmuGz5FNltN<4__Nv3I{mYmxubjq}TKVmnoVsC$g|S@W_`Y?=yNbYi3AwJK`&`D32<
zhJyQ+fvi^h8b-|Hb5--6X7~34QMav@WvvFmE=;-9%XZ6Cu}ol0Ahp`hi~f%-ysweG
z*F-+<E9#Z_PZXyFP3dPRzDTGqt|$smFOVn8-OtoHzhl?Sl<Q)%cV4Irwp#W`MLjKO
z`yY5uJ(`dWE&v^u&%R1d!*(ATd?SutJ3{&qI{Ru?O&zaJuz!%cBXSmvmg>H~@%6Q(
ziCuf4d2zPFOpIkNaLkMS-Kuc0k6m(AZhE!}cBV+<fZYXS$k7(@6ZMol0B%zY;NRt<
zUur1R8eUx~T&|*4?ZoWank2d-wvSRNC%a)g{HIR#;-VPO6b|b(u0E8kLyJTz*xRGG
z7}Xdp+vMw2i_v)mOBDu&gb=?C*vO2KG1b83oSS>Pne<)H#h+bl`$~`NbLDCEy9udt
z?abkuzd4>$L!<G&eb7(x0MP80v6n}7t9`V2+uvP>bCzb-mIXEW0n-JNthv6vDNH&O
zEjLF>obOtNdpIcH)B{ywaz<bb5S-;sj&<w9c)i~i45}%q=t{?%8FmNYYSoDM14xF*
z*gt;j)F!PU+`C+Jmo=Y(yOW$)|Me`XNMvoOV@h*FxcjqGnB}D_5g)^1bKIIZDmPlq
zaj&|=1t1CH4ML}aZ*{RL5om~1lf|tq_`+K<h9~E2k4B|ENN+pGYGy^1ya9#g?|!#E
zX|3wc3-hZ^426d}O1-jeqAV{GSQ|ZVLNvDt`>Qcal-2aR3#)t+xAs;h?mO>3(BJa;
zJ4)OX6j&gybzD*sFbjlQE~v5FJAIJFabmISK^!9{{b?skTR;<4f-4Jd_rTqlmUNtn
zb6A2W8Byr?9HAjEkY=!e6w$Uh@lPa228QvmF1BQt6`J<F{Q<~Yt#7|OTr9cjMsU=u
z`$Ah*wwo)q*w?3Q{bNf*U7gKo$k3v!94SP^$;C;r(GvHF%c`)bh|1o2k<Vu~YGx5#
zJpWUW(1)P&aDbj3JYskftU)eVQAmhiMv^kZMkeTx2J8KX3YCNg4Y7UsW_4UHd<3Ee
zbrvx(o=AaIaF{9-XPe$c=WQY1N5m5U6qI8K@FO@Y6e!dA#+Ijyr5@&T2=?QU!!khM
zhzl`36l>uPPY+KQ1Kb7dT+^YNj3DmxQadh~pibM3FEm|mESiayA6S*`t=m3FEHeQU
zT2X;%K-)F>F+{ZY^nES)>-6~m!>PGNaorFAJzYt@Zb5x%{ME}jKqD5KT#s(B$I~g(
zMfmoAkCzyz2E^l;xWtc#JT>*JkJxoB*6&XtWlm6{qC5csfti(+6BaB8=Xz9wNKpwE
zEA<OgBUyxOW|b7J@D(OgLpcuytuRsuEz&m<t)lOR95)*1ejM@XId;;;<dof{`P^GO
zcC1=Ci4iin-}@xcjGgM#9s0g5*u8{{UYNr>HyTXJ#X`~Ah{UFY##Hv|RML9xfka&0
zo@X7`f?!#xY&xuY4C^8&np|)|EuJiSakV^I(rJ<ZJ^Jb9Pr18NKLyqQ_JP1^KT}u<
zT!FIU3gnNZy%OF^lGSf@1qO_>YU3GE_{}n~8ycd~)ZDZ@rNt+7fd40PaU(A_868W6
z79=Tub!AYzf~b?m#bVUdJVAGaqw;xb3YvP`?d?AatJ*I%qUz5x%YjM8+fxb?=Vfg$
z=qSbfY$o9;MT;0BgBW7PoB@v!y_vwaH~8T@E~S{?ObxPkpQYnp%j^97T~JCsu`+pW
zWY?$oJ8$8hJgB$W`q2#~#Y_;GK6xg9^k292ZqalwWvvk<CpxV)pJkq+y1rcLj~eS<
zJ;?6;nu|Nda?n=7o$QxavKIHwj9H%sv{!Z-+Wn}@4_<RMQyK!or5U?%IU}=JOs41!
zzK~-f<DA<RW{RMN3W&$Ygq)4$TX*KC1OYeGVn(AhCofpl&QU#SXvqr3n{=l(ChKDf
z>P#8w!j9C2GcD5UG0AT;g<sq^s8>@POsLmnNd}eOe{7BZDk`p=aj~6$Omp@NGI=;!
z^_6JhH(Y#noV3?9x6Bb~b&{2}>^Y|X(A1z%GB}diNShU?-~`0lF||^5h}?BhG>X5|
z*-ldpl0tKdcVr!Zp)fJW#y7=%$5Hn?byjb;SZEiRGGs;{-yR&N<*j(z#@xJ8>qM$h
znl{)FF4O*P<j3@)o`K^Dt}!aSNQY@!fx)l<o?Q(BX=?Z@_TdPmc{f=8W7VWtbaJr4
z{9X^L*n}n8imP}$!H-e}zQ^Vva22H3`|ISX@;64D(lr%9YH5|2Bn)wta~>ihj9EXE
z=}Dqvm&-V>Rz72LYs|2l)^N~y5{EFWBL=2bU!M~O=0O8Y#5E-~OqwvLMeom7`5JP_
zmz?YZl$F+^o3op>cCaCfAMJR6^sL~TKr84x#3=XPD?DzGnJFIk*8f0)Az|T+E%4QV
znws1M7QN?rqUcX+NycJ*kac{5CzKnx)M64Bmp)~Hw<#8CTIaf+Ynd>s_vPd1!oY|$
z!ejP`8%qeDA|OHHqA?0;64qgA>e7A*W0}OJx1vZ*V;DA9_0aG#akAYM8^PIHlQ4l}
z@|+d<yb^yY*t-cxhb)va{#~^VUvzDcl0-!iC{0R+nRe_}ACHettQvBhvx14Kx4<el
z8<G70E4<+B1x-W#2O#{WHzp?@$&p0mza}ax!-yROI_9ANyWc=55DbX@0MD4(hu;lA
zB!b8xcZG%d-*-Qm!@|W7F~idUg$VlAT&SL~3atP17EieTj$F;cJ{`^fLvnIZl?ADb
zX|2Vd_#HNlCfCy({+TiQ7>Q2GwUo3M+is`=!9@*e`fLB2LKZZ0&r!&sceDe|4<iOa
zK{K@~vVVhCF)?KsrNuUzzG`2u=fN0nLLLQFV*Z0de$#UY*d|1T(+vJ+@I%`KHH^uN
z4jBCQ{)3$UvaCBA=4_oqYN5lA|8&y7<Gl3yD3vM~%3>*~vNQbtn+aMT%#o7X4=u$w
zpd|f&Ak%-7Ss~5y8*lz^w!1%J;ZjuUm{K~s8k5;u|JOPe9{!FtaiVHQ1@!+>fSpyC
zoRw8T{r@*q11BW}gl7jO%Kr@|3X`5m6idfoSNp2z!9@L^6oeudli6Uu9UWsSB(S=+
zhXTt#BK@~;u}|?K;YLdZ|0w$RKm`$?Rlz7`I9TQW??9j(C;FiEUJA{P@rpI{e)pP2
zBwaaQ4sy(%;lmTIc|?Y&l^+`jrGJ};{3G!z9&2^Py?ZecY7S!%S_~-`eMGzamc(k)
ztu~3k{g-U+BZidc$2GhQZbW~@q~o*yY4-wk+fFv<m=qgNWuN#xHaFM<NWybnUC4_l
z=ck3ABd~vXT!??}IEUr?Yz32R4bA!Myfeo6V~;?gz!%*eN+M(4>GNHXR7C9p8#~V|
zeF6NRi2X`K%_b~U$PriioyZn)uu<!uchm+cH@LX)h6uADP6H%#2(zm3sB@9tDCfVa
zu4J0;fRI3K>>ME_baEnixdLvYU9jh=(Ga?%8_MBdIvcnci--_PXE=ZgRohc8&eQVB
ztK)YEBt|JIsM3q`%IG4@i^o0}o96@G`*guT4UM>y6R9pl`03V`wvg+;K+-FUvGLph
zYZN6<wJIiaZ+hq?tOz2OoG2WYcsC0&uTvIGE-WkUG-l^fi2wVyKj)Mcu~gN>-M$h1
z<(xYMGV0;)i0tT0R-cMO@}&~&dy7q%F3!ypFd2NQS2&Q8lUZNtW;G#8mK-)~6S>2Q
zw4`i71Duw4+?F`e<r=lOHw(ftzr@!1Ie?r5#LLy0kEg9U@1m)KlDR872;>DI<P%`c
zH`OQn*N>rQSr2L*zCBX{JiKQ>H(X{{`OTKmZ%Tj0OO_WVHcmrd#>;NW3lB^?MJLt~
zOivY<yxD6^$QoCl-uHICSWjfDCPRM9X19eRq(XMnbFySe`;QX;?jbWgyeM4?L~9;f
zI=0`Q<r(W9DWzJ(bGWySi+XdN$Q;zt^{T7+0}XcWO!Cd9vhuHTT$(=~^sl@}44-Y+
zCZ-BvHup1Z@@uQ(%^cagYuM&HUU(I}w+O-00E?bq1@N#rBR6UB)aqkv-9w~av7{t3
zk<G7n0>I`iBlwro_r-I4i!~OU(QtgX=lcmEaz|Rzf@lR93a7f)cpA?RtdcL=kAFV5
zGiNQQo~K&cZnad}UX51C<pBmSJ~$htg56F}|L#JBmb%!S@)yQCajA3ZfMWR}Ed7`;
zW~`UNu<-m`Dk*Vg9##}Mb`r@qV{Sz4wTT*4%^~inf<s*gv-eB2lWbcf^zK)?8MNrI
z;%d`RF9L0_S=RKawMtbRUDe)-ektSSn))TI_Dd|#Yq5u_q^vB`r7`fmbhgxETW{XR
z_M0{{N)FIZK~5Gqix1~&caSe!R(N_{n&@*eyl=vstJO~6J^kV$(Vzx<nCQ2UG<b+;
zVP!ZMwu>WA{iEh*>{-1MNhLXMkKahzj-25$ovCmqi2`7H;7aW8V;j$(*MJj*DiU^w
zFa19Z>VnLg!sd6!kIjC38~8z%d3!SpAjq6D-c*_&dks@K<U`*H#3MK*Cphj6V)e%N
z>YDblb_$buM}Cu`*|utESmlCKxg<QsVEPoqihQDTi~{^CHV+krpv1#ep?;DDv9~W?
za)*a1;7ix{f&hS0A}YVC?_nYJmiPPJ2p9D4Eq5orj$2l-Zl3p|`x&JJ(nD$n`w9ag
zFYc%dD?kK+>4k+C$lB9!amnHrZ8at;I{zSz(TO=(#lfg=$6*dEPJ{93IPHCmzD*gg
zHWmerd&Z|NCoZSnjvrtodOb)Uub7*5iqwv6mPY>cM{2cG#jG)-MZ}_IJwZrcW9d)b
zv&OB9x0<pnS2x<FP-any&lH(Fqe&*o;2JJ3dl>tSmGoO7sk#m)?QK5|;pDQEv|X7t
zcP(vpfsq7nH198opAIKutG}}j6hlb21{a<p)>eTT9}W9wA&%p6%u|RQOunfZmCZ2*
zz-QK0!o$1u#m<XoKK*Zrr#EVUNfi<i&Orsn=;es-F`*z4<a<j`7l$J&K>#07X8fJ*
z#IN!Q3vwvFHeImT=0HW|1N0t<H66|5p-mP?dW)EndRF>P^ph?q4TMR^h?oC^BlD-D
z#oJyKen{i8)@@LCN(fWT>%>kJJ#2oseg2)_3jg(b;tza#BvgG5G&+`{wip9}YnDM0
zFUE0Zfu4#;`190GpGf?AAMz~T4#g;qt$?5VUskVN&u15nDqCJWCP*|6n|ea5GgvtQ
z^EG(H7K#P6vV(E&U;ISozSHVn-#Fr_zs<^6EBRg*q}YY3C)<1#UKG`Im-=+r)QyHO
z{kT-YfO^jWi-)YDj!~EG50t8&!sEDdW8%+EA$|<LKSg~VUCtqz2*xaH|9Auys0umY
zzfUu{u1;k9Cw#_M*V!f?0h;HF*kj1;aunaQ(^FBA*K;tgCY0TfGe1Wgn$w=WUc}yE
z6l%W>#G3ncTzjNM)Dk58qdX{W&o|kYWGPlJ(qIp@aaDdtp=$ld#e9CuVPHf34>L|Y
z_OHex_|C^*|D?9Yup;^+RxWG9uI{xjo%%R$-iL5@2`N$Xadq_A?)DC+8YGI#z>JL0
zqt^%&?H3va807<C$v~SI#u8D)BCnuOO!46H(cigAj{81=m{vc5a6N)4t(<=Nl2v#U
zzgFk#RZ}2e&D?|LHUAv__$zRJ<^8ti#6TK0B$`~F>opC^_lKMInkOf<wB7;Y>JObJ
z)8q476UdT!M)4JcjHZDv!Z}I>zd!p5qGq{~-&ihSC}M#={i-7Muc;B>Z<W^NijM%!
z?cIPWiCLNBl?&=>(hm*aJ;r8?Bz2U#n+{XAfJkK=GR@w<4`_-fQIOC@pb(Qz6GEKh
zRUc?dpuQ{p*0l~8-Sz2_Ppt=XIB~RV>u5F>uU@otI3mzDKBRH~NY9-VlJO6>tL~6F
zzgK$Kr>stn&8a}(OU5v(y}2x<HvH)R_f7j9+Sixv4(bK%ur6xs1Q#WV6|h3VsBj4r
zeM?U}@&2KB<TOEI%yT5+m6@WaqqeK2tvFG)jU~%cgZ6X{-)GBH{%ghTyZOfN2F(e%
zXkZaE7>OLO8f=vs$>)a5RW;$?H%K~f#%>ri8`D=>>f>~JMakj}8LJ<7Q>tdaS1{2O
zf^m?h3eeJr#(aEII-Yq^VEWumSGALbB^}P!2_#N{Df<DYZmy!ZpUf@H^4i%y!j4D~
z4cJz-`>kK%-j8pM4iVA5bj)(QTEvx{zT%Q{QJ+qm?E)b$k#gQKTi2qG0VI<rAHU(T
zxFPqpYHRYE7Tqj0@Qjt8{d^j2W7_}gTtegMa`57m1FeAW+D`>oS&;)bH_5+&vc|%U
zL^T`jF>Ck6Brja_NZ1tT%W(@P1ybv4O-*FN6%f7rXp45P;y!&UPEvnGPw8zi!c#>d
z9syrXHVQU|?g8&CX)cx^r|UEtPwDX#j~HyD07yRz<tJ=aYnsWIXPfzs{OW@0z>Yz^
z0X0dKH{KN0n#g*waBn8sj}bUtHeT)f>yPlr8>;7lY2{Vi{%9<>Nw)U=#YcBXw!Xuy
z-mo0O@K+VG6BM7e>gpu{q+WCjy4OgltIiY)pY<kCQYQ;3orC*{Jjb1#R<4*&pNBcI
zP`($J7r^=UPye|&G1-SR1n*yfi(Y<jgWdQ;Z1!`bc0Jd!`cZs4qR%QwK-M|hSiWFI
zt#@DjZ1(#$LyBU+@YQZa?9$hTM#O{HUXy>d@&i#&IyCN*26!)hjthK!M@7}oA&K>o
z@Ym3@X+<bvotQV#{aCy}&9M}1c>k8yV?NY1po41yhQDZ<5I}tiY$drvpz7EEy+I<t
z@TN-e8Su5JD5d7+od`b(4Ic8TeX@bdg8N3s+Lu#NR4pyT;I9d2E>x80r4-c;*+G#J
z+(*-r`1Y5>p5D*IH#f%?=G}-IiaJD}a5w=KOyaWz99&#8GbA*XM`(azjWhkEdzjK$
z-L)uux}uujm&DULN56H~q;=_%e%%%;*nbjm$*(y6Jtt-POYB4Hbd>^j9mk9Xd}$?e
zK_4H~-I==xFj4HRu|oK1M#FdHGL4al$S5R!1}%{^OIcW7?cdayG=g!IsT?~sHRa#=
zBXcG<BFSExFvI+4<|6fw|NbgNQ(!Cf>HZJ8m`;XS%>DODrVuGU6h?cQvJoV6*iuO-
zy3?znE^XdLud(r0xMIgUkzkrLIt>W2>`2j0t0t!(%An0}Vj#og{q6*|*tm_KlGXO+
znh^}HxzqS>8sqSv!|26_CG#^54`ERD$6>(j3z(q|KJ75$(8jafqzQ;CIdh7ZS)<cP
zH;a5wR9Xpr-)M-Hr=-8-B}!lM)yzC5@vY1Od+sk~?gT&;<uKzpw$fZ{SSF7)oRJ4A
z5y)0!zD!YDEz#axxXiMmVD!#~<mJ8-G0T;|0E^VQ>Lmm9>AA^pH>|HnO)=xi_$OFj
zc+bA<nE9_A)?0%3ZaL=HhzU7_J1^ZleZM8fJl)C3<#N82bn4Hafc!G6wd%x2(ihxr
zAsD>{m7J?}GV}C{;9erf$CJ$KF1Tw#_K>C|yzmYHW}z5j_phtTy{Nq$({0)kP478&
zRF}2B4vY|mO5<@$+lwB{Dz-*zZjIODK_adpOTxb|d3CPVQGgU$f&ehC@+b)lS4Bxb
z#3;RQ%f4p=O)nmCC&>tpTG%(vAMPO!kTPkl<H>h&LR{ME*)csI?$nPiNcyG|HGT`e
z&>Ss#;NsnrSwzB4BwD0cT$#kw*;UOSADcg7LIG}3z%%|3A{V@?*Gt^pKhC%(6%{bZ
z*=)gqRqZM92KVnHii-r#^3al4u8t$q4mg9Lc3%f_AEjEK!fD!-B|k}th8*X@%l;z>
zuN4?Cg+)u%-)|%n5jpJ)1x-2scrO3-RYQY;;o%r`+k$dlPf^7R>{aVcx5d)oI}#}F
zo>xrKymt(q?&G-@^^}8{6IsM5l48?)Y&%`4Cs%!G&KQ^F0qe4CgoQZk8J$n>#LEpf
zUIi|hio~<OJiF7;lzy$VHTc+ZAt90NLSXxPnR=bZ9e=Q(E2{MM>yl~jKX~uFQyLV<
zhE2y%v|sIze+1v|d1Jg(h?JCswTy*A??B#6QCU`I=T&8}*6|ijxTS^Mul|t{B!CY7
zmLxbh@#S#p4c?%faTmhb&#xJMd$@>XVUiS1;wECPEr`<5WWAw^1eYf180G{}_*WaL
z99EItj%6phXg?%PHl1u{QTkUBq7Z<9N?bT7PK-jY4+R@U+{=Nk9hV<Rss`TI%c?t?
zcjfQ}+jY?|FJazc1^XZnb-6RQf8puy5c>}~c{u}65A#$1M9_zX-}Fe`MeVm_2X+-2
zEO4OcErcK0lTYJ)Euu;}3pZL<nR`l)o{Enr({-?8PHDS>$tsxKSkJSqwObKE3_7r|
zE%F$`lNU6jE4sjGf&D6`&C56_Ef9nM-u@SU3ENLqaodVs(rEOBXrd1}lmyW=Ya29d
zUk&lof0?hgq|>ZvgQhgP&#Pw-NdE-?Sc&y7@^Pui9)HZS%A-0gusT%A<g39^JNwdG
z1GzKvMnH_syl(QO)zA2Aw)ehb16*vXx%iY-(!og1VzV3^az~#{rE^x>!EENRCD~34
zjjMOEl`k)@w2ZV96}psFoH%4IT}a4GC!05|s~i0g9q!YgGVn=9PA<+fmitnbuP2i{
zzHYt&YTkJ6hgwmL5$Mx$s+}YK8U~}BC1d$jHi}*|?}&K6b4$j+`x}XYZ|7v24rZ=+
z6v5!77q7jD^5*Mf{9}vv>{nph^TCX&Jwo<gWFi57gEcqe5|pw+w;5Vp-*M;+EFtda
zNSVGM#y3W8oap~zfkJJt6Soz}$tADt?tiH!x9HvcSgT7L8F_Eh{A>fY<(m#K&y-cM
zdhEyuS}Ikvl)5K<pWp(zVfw|zK{@%gUULN5Uc2uiA|oBLtJsYldeFV62-MF<A}X%+
z?r`EsiAAN)n#EGy56C|YVtSKaYyqF+QyaVAWbktD944X{3)|l}XL=~2Oujt5f4Q^3
z^oOL{@1JzmDo4utmle%M$rfOW0wbz?cckV8o-r$%ZL!B?kR0pQ9QK9>Ss)#)W`~D`
z?WO)}uNyvsNtn}T?P<N9sJp#_D%?$uaGgyXHZNNDI4Ywkn<BmCu~4<+FIeRy3S#K*
zEn{h;ndTA9i47T$sC?cz1JKeMJ%>aG^%{KyZh!hl%mL>>*`A`Ttf!WCx6)TqnuLQ}
z;!xJ)L$egZa|?(``;3m$J`qRT8-BNGm9lleG40J=)e)E=YGLm4;@+@eshUz&XS>?9
zq)wbeeoica;XLj!KW0NSRTZ)Mz{s$=DA9~jP;SY9Yv6;95c8hwDZv_5U??Xk{`!{l
zaz<r2?4~SV!lil#NNC3If>%%?yL1DClA&*C85*H|XrfUt?9c8c_IhC;$iM6PbXT46
z{b3o7A0mO91jz0z{s+lTRTz^eCO=~I6^0_jE9ZZI&&fHbnv_ywF|NIN;ifOCPWHB?
zvexau0eX6PJYE2~amF9ItsiqHQ;$Gm<bogZs!1P{39U*6W6r!KjRy*nTsdbvXQqGg
zU(jjG(Qf?oKj4Zl7UFc~5U>B0yZROD9eJ2B+$<I%dx(LW5IkaVs@){xf`e<#n|!^Y
zD`+L7GC-02_3bASg1%8T4i)3iCiuNU;R^A92qE#@x2n7i{KLVx%v(uS1`{a2XTrgx
z)gDy+tk}vjeQ&Y9I`jED87ZqYQ&NiY%vB)t{eZtd8fEsqq>zXunh1>Lm(ZZ>>ANst
zk;7C|Q+c5u-X~R4Tdey^sG;Wz=bxLS5(^AL$!M&xyHFMphQ#R^4II$n_xwacz|?+K
zsC>BSJvLMMG$YaJSh;bQO4_{;3LJXk63oAgG67#6w=%4JXTMlC`Cavk@|(zYC-bbs
z<wBbKwv@iN8LM@PSF{$K?7f+PGK`*@b$FLJ+H>#1qR+%6_ft==+soc$tq9@RJ0O0n
z?E>toR;Aq#&oB<CE+1w#E{VkPy}`;o8^qw%^C4xWf5#Le;`zaexXPjSe@B>QT*HOW
zfzn%8QxhQA?)k><;@w`MR9HTs?P@i&?P9|7*SxCZVfY}_A!-1#w7kqJmpHD|U_WYb
z)?Z@o?k#Jqlx2kZXg{LVu6Y@%fc7nJWCX1YSrO=oLde9O9H_t-1~j;G%_ebX2e#ZW
z$*<@ssHoX~<{Cu2<4j-k4hF7y0)Y3cuUqlG3p2VZW4pK9f^x(1{Z;o$pC|WXJ0CGM
z^zEr2Ks%13WWgwa*5u^t9c6iB4^hQ;vvjp?aq6&Wa!P-woARWH#_=$?AGz|+z_@FN
ztSKnpqe$W(*c<xPM=35<D0V#TBB-Rr*jz~%5<enc<1nu6<2q_>wbBsSRH@R~ntfE&
z5n#vy-8vvbr0c8%Ky><I97wjr#jsO?s}J(@W@j~EQS$yQWq)mA)ArE%7Aw%NDvi&!
zErG^z6j3_y_Ew#@C}ed}URn#>nA4nweML`uYdIA2&81(}%Oj{JA?_+jIsa{>CgcJE
zDlR2FlHrwD_suFzWxa9R>5SX%hMe0<ou`CpcdQBTpnt)$t5uMda_7-;qs$}jBVE@X
zKkl3*&pGhVMQ|P$2p+1l4Nvk^?4(wL|NIq0MjRq^rq6kOwvgJQ*Lrd9jZDY}Hnf|p
zDW}FPv0j@-iijvHlunv*(oR2o<3CxIE2+KMQccyJ!LVBhpev(`W0P5#xBgYMn*0fC
z@Z$I!T2F`bS9KoQa4%MX4+_hHnPnlde;EM4Chw^tU=09}kHl0kh8LrorKd*r{#(@k
z#|Tl@?o-5N_WnK=<gq?Tf;%WEUr}FuplGcPQAMU$A$v%xBrEBgxFAY@k&7JH@mn=D
zCGlJF?`7#S&^&<m>1Fv;`n6BGGjD0`vs2udacQMFRS&Olnx)$-e<MZz9Ev4J>*1~Z
z)=K@4U%N%$M1&_t2<AB;77cb#3(A>1#_;O9Z!v!4vGX|8j3D1Xj<}q7B!vRU%dYbm
zx1OYIMt^(&h^raT=;IZPX4zZ8|JY#Ne~h16n&x*lw044-rR`o7L~v;B^@iL08OCWg
zx49X+b8>J3>V<L}H2_F+H#O8X7;7oDv0(pi8G+GYO^`_8$Rq?y1d%)*F)J%etBO7%
z;bGw=t?;V+f4|Wk7zhq~OS_m6br6h(5*zh@UJQrJw|uN*&!G!!{|O<efiM{hJ}&hQ
zha%$=Qh(J_mNuqNW}P{Q!q>45$c`-y?YJsO!Sk~lgUr}Za>{YBovT+J>+Nm|Y9z{W
z9;iyJ&Jr!}VztyaqGqYt;ebNFV3Q~A`b>Ee9nIm|cRRdIWUfCX;OiCkZrs!HLdnH?
zX(;_>`S;wCgkvw$e5L+qM6#u3g9GNc-o@+U9*(uG@z#>FSB){sQNw5I5vSAjyqxFw
zy?LkGeN71`{Kn@ym)$y^99PpT9Kri9oaGI5Xp^8SN(w9O+L)d4`5Lc&x_K@aBOh~Z
zTTIBywnEzifzg2@>g8Uiw@~@kGmd^U<YV?jVH%2K&L(POn~cB>zuO99TZ7!%?1V*h
z&O{T}f!kdV#fgcrioBv9jJlGcBWhx$`?(^Fw(Hn#qXxe}&sShs7@5d3_Yog1O9#hQ
zBI|0)-WwMXFjzK*sDBk697<R0(0`)>xdd3ZU7hDNdAfklR$M;c_&(y2ijCk+(IemR
z?c?zW+v+=gHj#Z@@G9G6a63JFx@l&-UaZ1(q8)o0h~+jZ6yYbJvbjy-O&6n3a#~)<
z*TK2y>Yc3dhiTOq<k_6DwZFLTKvHjxb~W(GN>y)E(L0tTfVa*MgG1$y*($kta6oGf
z(l+he5<{T~v`Tfn+yTN;TCPT-N56}cGFCDryg83*vmbosAo766og@g^+u7Urpa4oh
zXD>s0%Q;*;ul!PN_g;@xx=#@?G_pPA0k(?{`>wOd?0|KjZx?3bxt|JIuH$!gphk{?
z*iKMy+Gm!o`L9)1*EH5vT8-IRD3fG!j&~DAaAx{~se=ZOe$Y6#Oz(?f<oOoOrvY8#
zb`b_QOF`s}A$*#NLJ6VK5ZC6T1FF8QWFq?)X;8WO?n-JS%WhKOenD3Z&+A4GsZ~)g
zSDcDGZ;W)Hs1rx!*Ne6jCwN{k&=wOR(~~R|(wNMsSeE8~iDbp1!|k-qqW^i6=dp~`
zZpM#1H*MjpGgyc80nFD4OkPjDzIXan_2pKw0>o?1%Xz$+Rg%j7RF{SZv0qQyv%gPM
z(R$dW;J-Y?n84#fR4eo}v%2yk@pS)uv>b`ge&RNfp8N@iZQ^o)WTRBPA}K~7;Oe8=
zMd|x8(%-zHq58k2mTytb(jVAu1d2j-V@b9~B=z^gN^#kw%y;@9Nq6O_uL@)>+%KBv
zlGGPw%D?+_Ww)TVLln5(g);lACaKg34JUNU5BRR!<a1_*DNs8n9$MtfB<0t~s)!<<
z?yz?ssqHtLw8Lz+`nej}z8G^>L^fblvE8kYD}e2G??EO=zTOV3qNXJM=CuQg$Wskj
z3kGiKs0~PT2$P$wrZN4JNndRz^UC>$@*zO#d0(JB@LuuZyWeVmj|R!cy@K&|I&0GR
z>pVKY%>vES&E~<E@!QYAq6$1v(D-D`)BdA40&$oDdQ4y3?X>M7-`#$4@|5Jp^8ya*
zWs)PeJBX2Ps>Om#q2uynYk=teQezBF#~r7>PJ2vDgK6Amxz|<P%WBZ!#)l6ju}JH<
zycv8l&E7j-PW9ORL%E_T(2(7M25~vBoP%G;C?&=yEj0N|krY*98m>(A-7L{t8<;n2
zUv+zP@hR|?)#TTNDbo1MP>;1oh!r{_KD+U%Sf;xjSF8CAm$~L_y{@!}p(lpSJgr(j
zZB?9fsb_l|(mtDxZx5xJ;A`Sg&eUYTcAS&7Vi~SjK3xpoAg9>_W@V0=Ukzewt3M<S
zX`kM26?pw@O%M%rx`goQ8+y;9h=qw!@xlgC&cv_YkUU4%;{SZG#^LaG&ry)<C0O+`
zC%J+7b@ftfTgyZ~r7B&gg3+B@U!UBKDG9?%oon`He`)9$wNpgz051m28zf%!XA(1~
z4({j9^I+3e79M*{x>$t)##vOs9h})sM$_3MPoJlG9j7|$RW3m}mFbvaKy#KFqaoDc
z5Pb1Q*K5fz`|0W`ObO2XVgG9i0ma?!LGRsp@Q&Z`Wn<39ZYwUU;o)0q<eS>VcIO~V
zNr%lJ)qS{a{cyIw(9xFNH@%O-UA);cQgIk)2-f-we7%GAQXhF7GIJzf9X@b%V(-x-
zTz?%_nY<dKVHApbec3Z;YiSRmh!w<35f~xWUxWq!xL+5yY4K))8$hMuJ(DBxa)yJk
ze0@|P0n>Bu|L(<`Zj0Zs9tVq1;6+_*=+L8a!r@KT1R=Z#piXH$9cD1BP6sF0wq@|S
zU1m$Vd39_L4IAmVLCklZVdTo2AH(;;ZgM8Zd@A@ahiH;whz5S9J3OG^_umQctd8t$
zj23_q$<QJK43bsf=Hs<we`3@Zb-#03|8Qrf$rZY$-=1cyLZir=M*6hN5Yx8L|9Mp)
zwi9@bL^1I~TY{X>_PZS3x|0=jR8W1``N2E}d3{@yT1gFes~~jM5M_;;sO-zU^q|A`
z4`HkY>+Sj-OEX?$7V8VV-qBDNcdIbNDFx3GnWm;7V`P1Ihc~^kz?@lBqA>2Cq}E&l
z-2vEq+&>ij{2vw8>1l|&?i6{>o*+o`Cn0&9!80!y7T0*h1F2x{GM^st?w|t@l`6&n
z&0GJUhTTBYb-t^dyy916rq-IbW^iv`41?-PI~2SPG1dej0FMF{?5eFIE*wmJ_6Uva
z)jsr8y<Vl>C&Pd|W^oSNjnY(8_Lr_I`_pY|8_$y9^pQGsJXIlVYC<koWj;HA8j7qI
z=Q-XfzZ>s|c^gwnwXlS43V^4BfLs(M-uKNZmDs(cKzK43$3rYSUgNht)Z^u;m-914
zU?6{XX>9wL_Qyg?Q9p{0_=7)}0CRy7j(4;O?DY<aDhBO|n{XeEdfbLns2XcsPCgTO
zxSmfZpzW=?eO3uzDQ$??c|9k)8T1a$?aT~R;1AjQ7G3DNOr5P&oiczK(Drc2B!4%o
zz*B?DqGYr|s6Zwcs42#B>6e!2unpRT%h2+feBZ#9vYEi*!|2=m(VR~8hO|3M1=U36
z>=}GJAYipJJyskder$6x8edC2+o^Tg-EOM_xuM5jC<$SFJemCEpACDuF)9Q~kbosq
zhKHMcUhXyZccYY_JIB|32(@J!>DCNkDLw@Lsi_WeyhVi}2JiQo3`6qV$H_^WOmJmP
zlgf-{OS`&Qup?x>)c4fYyduI!K6N;sO#gA-vUTt9U`y3?6D;tS$={RQ-={M%TvHUG
zW-d|<uWhf#Y)|bXok9#@uxHIJ4a<&-oFG1C!taruGg#fDC^E-xdfOE{sl6NSB2}FI
zB3H@pOLwH-6bgLaz_xi<MD~Jx3$KSxs`eE-iKaL$4j8pMFGgtZ)Slk`{442OIbiC~
zl8C6D-$kH|KeZt{-;t3Bil1;F(C^KTz4lW6e$f7*)u&$&p<I7#XTA%RoQMu*DnikA
zfTVH0qVAzAze<)GX<OIYs#fs9hp7f@E>4w!g6UAW!ISNi#qxb(zcN7zT27$EG>3?~
zgGIm#+78(fzy})du-Ou$P@ZSdBUl1Yha{%17#k2EqEz!rOXnjlj3Lftf%k`|q8OW2
zFenKcPKSLz1)~SJn-eR&g$+_d`kpTF{damlTzUjKm2%+x&8XXcWoNFlI4vPtnvAhk
zmr$%{HwsC|oniv9uF~5GwE0f`R=2w!ID&7>sM(a!M7?&7+8Sy}OQOOqr)HNc7L2L2
zyF5BI8S^bJojP1kIG+w6z&+D7!4wPfJ|a#4<5eNj9sPjA4ynz?W(_evWCnpFT^P&A
zP*JRNiTCC4fo>D#gkEcg34f*&SJ;UBYeIpnYb8_Q+b38QBxN*28tGwpl8zmvrH|=7
z>&zEd7nX1GJwCLOciry%h!z(@EX2Bloqs4zd55l-)u)Ii1;Q`Zs2?fY`Jg$AIMtng
zW2uOMS`tDxBC~LL_~#o;I$?p6b6+VQM?~UBx{cvw5@UT)U~yE;`G!^bi|dyStIxMb
zat5%-q`Rhb39;s9&Y!TaUWN@wy`nwZv&0><H>;RG+iy1`kcH*J(dIl4yyHLrMp&YI
z$8K}Kqo(U*#yK5EWr8B$_I{MaGmxp2)vYiBpMAF6XOoonq+MDOtBic6!w-_8#n5bX
zuY2eb`;CK_b@tvp++T!|O1#|7yW{Jgr2$W<n)Ue5mwf58RfLhYD6#dcjAQ*~zeQ48
zin50pOt(!^l?Q-wWN9W#xUIe;O5^IaqmTPR_%Dn+fdmpD)H1lh#*8N+f_+0$dV7xF
zy@z|O%NqI$iIkxGf*euCeRx-(^>Vz7%=4h!;bI8Z@x3*DY2F;n<gkQU5U?lhJZMYG
z$>EQ@xH{X7O?{2pTw)6WJ-mlXJcQDt{n9p6_z)&P50dr+;obUrO#0K&1Jme|DDgfM
z`xX%RqTaS<bAI`LV{(;zK9_wzED_Ap7Bm!s=kbS}1`(5@lJ6=T-0J?ii0gJzU>x#;
zNIrGG=g9XC?o8vInXP|3`{ZUzqJ&Rrj)MCdE9mf*j!WMiPNg^nJ(l(pmX~l=Y_?la
z{Rac#aI>+8c^=gnDGg9b`E0Js18rvWA=Byei2_T#F#vx8dm##bJxEr5GeyT{SCW|?
z>*N)iiLWTgtVBLXYmkNd<&$sI0X#L4&-)Em+s%mJ`nrQ6-Rp4`#**3LlB?t*-;IvP
zJ-ej?glX(@<IU2+sWzi`&Le;rJZyLZRwrT#X%O9@-FEKc)734Zn~~7FivdI`Zz_02
zCH4@X!y_w5R*&H)<Me%d3Um*KX_ZM`<3o68sXC<tA6>iCH-8*oW8JHMpc2cGO|;({
zeiG4Ln8wV4`T$yNJ|SHsN5(=8q?NANY}yhJGpZ0|Ey{_hY0SLO$^`rN^df_YmTdOO
zm~nXan4D%cKC3!yO_pp0)VG6Cgy8Ta_G|8GrtfKPpHu`}5`hLT0$;sH_kpKxD|tN`
z5J(h9ZF4$eTjpi&4y1eAh6j6baiB5x(s~+t&T8i+z-L;h`))rZ98qJ+c8UdA6r#N!
zdHvImhO{MeCczkV6^Y$L96N{vA1E*pNHGqGZcR6f7Gp(66fbDYho!(F)72M_x0snz
zR>)8muS&q<bNz*RrN;V`7b-PJVnQUymC1CK<vI`1vKTAC-Nq4cbk!3sP**usf51w{
zky#|+-AMVqj#|KE)XWS9g{o2jX&iCuVqH109(|r`l|=-c;UW6cl5@{a|J{_i^<kHR
zx&#X?Z8|H#(V;mPXT)gaIX-K8#!}e-tLZBP;_8{UOY!0?uEpKm-Q9}2yE`mUtT+^k
zySsaFcZ$1P(ZyZ9?Q_51{>+}_<Rp{HT$5`iX_Sw$$GW;QBM%24&zWiqk25RDvdVnX
z@7?)OMHMj{cav_%l<!VFZ?@y8IE`FQ1xZQhi%<h=%i2rQx_U*8<xEYZwbnGp%bi*0
z_Rf*CzACzCxdmmx!rn9xGlNrvcUA{Y7*Z!It2h!273RVkI1DRI(TdGoHyB*+o{+{g
z5t6@+KGfQdPuZyNAyVC%8;hPH0?+J>UoI#~%fWXdxI|)z)N+T|ZBB`ytjkS$ckk{C
zex1arVn7o;D0&Qi1Ad)dl+;5|A-E<ni%#BfKeOS2Pr9`*Quq|_*3_K$(w_vyv8#XX
zc0x-*L4slZ=UYoKA)&LZt*=@ocnBj=^$Fe5@QMaS3O6Nmf6J(Nr&_tv<+nn0qves&
zQZpj`S(y*3sl=d|6&biy(W{)@oKLgj3XVPWpr*|mDKT<utTXk5)K?`@*OTZ@Ck;6>
z8;*s!73P2}7yXAFq9T8!vRkVzEod4NcDz5I($FysGRvFQW_AUK`3ww@QReW1`KZQ9
z#(0vvW$CC^0+qcBUH%*mTfjsVyrIhi5V2_5QXyDJk^G2&kpU>?8z^26-vIBxM<Uob
zk>wY^g!FET4=QbHcKYN5RCmFp@OVapV*y_Z#h2W7+q2o$wdU0Q(htw;!3PhQX$2oa
zhC7jvogQH3D1waq*IpTEFb#l0B|f50tpS-g@MelTbT^+Akt}OM1TM&0*1-FQFdMj|
zVN%Ckelqy^|8r4UWagkVOzJ&<4DQO~bqjTO-G_TG#Dnzx1XX2;d~RhTqaweM2^7oF
zWA#sbAykEf@}qVr0eog7qOy_x4kXSN{y!3`Ur+=%0Wwiyp$+MZt0|ZX-Muxu4{wUV
zIwOz6mR>&gg_rmDpZV9K75V<Jdf$5YRmf;m+<AYuGlxoYV+cnyGY33Lt`_)w!?RRd
zqB&m(55lCi<+>m*-%I$9{R{p`xIt1%QW5#H6~hNGZFsh#y*zh1IpvoM#upNV7*@2;
z3UkVszaT9Ld!6UP$%?)!skycf516XhgkMbKN+}j{e`W3@c=^u-)sKx{ro$sjZhLS>
z$dI5_*7GvIh;{oU*u;_a>sNiJ1NKIdpR)R|>SW4I{}%?ge(_VTpYK%_-uF#yA;A#e
zA&5m)l-Z%7>3Wl^<w8(#d@`pPp~b%V31SAxlQY(<+R5eZE@8w|hLLoplK<yJ+qog7
zR4qn$qCuB8XDW?IDlHfN=n6$k9E)@TACof2^kD$<s6#|a5c|c|pd$|ps0m2-mzb6R
zk(j17g{0+D;v$u?9Y2oTH#ZldRZYr8kOkkxpF{eRQp)YTKJ?$&JOyS}-zRvVnJs?d
zHrha(Y<{48Xk&?J@cYL7=byXep{6XH;9i{0CjOK3a~14LEvM;l(cao@qAvgWRoWNm
zprJt%<FH#6&@q0-a6kZjPs?=cW5-&5K`$-?loH6!q#w1OFCZaidf{wwJ7evo>nsbL
zDaV5I>rERPn)Lq-=24gBSNuO_vEO~IpFAqHXdMPXLZ)k-436ZFd$1MzSi~^FOaX|<
z^|2QNJ2XPFz}KCPb+b2fB?@g%@vy#zu<wrzvFOzdc0`#~s)DT-aLPiIBp9jUTZ5Hv
zAY?dHy!&sKa!KdQq#cZ^r}&mdiOzM}|C`byNqG!t2@PcoObL~H>82mz`G|Ob;!XqH
zaH)t~z2ds~jL+U*cZW5ZO;5=4>mG?VBO~%JhL^gWv4)Wu@*M6cIh!PzA^J@e|N0<y
zQwpP5Wl>6M5)jJl)qA#q&KEGI`LjU*d+Nx@w%Ngz|2L%GXn;>ayUa(o121euadRb}
zOw~{CEj&-H1#pjV0$uUJ$f;vW0d6#El+h&U$89d83V^NByl6(2$IH4BZ;KsTQhgYk
zdSI9}I(2pN2#UVF^ZqvNGx9eped6Iu{4>2<!;7{Tdk<PN?%Th;sl`(A?~Xm>t1}{+
z6PM|IU_UDAY;>*b5hLE3iDBteZc$tI`R~<7ddrY%#^o6c`+OwAMJ^H3+Yg5=X{m$4
zzEDgbyp#fbN)C-*h`9VtHH^jO_22V?VXt;NLZRT@ma48`zlY@OkREjQoY~|ml$q}b
z^;@%qIbDuGB#p&TtL9sMd7p*I^gg3D$Sz^Ecx5lg*L3m(d-surA^?p=uMdf`k!JX|
zC(S;^nbS}zoQwuj%|B!{wjiQ$ltnBk@#m~e$J;Gv!%%W>)nt&@#~NDJMNW;eT}CV4
z%d(j!k((>+bKU+5j{&UVVzk(FIo(zH@=*x!xd2Qcg`8_Mp_n?;4P<c%_$vIR20AQ@
z?Z2BN?OAp!8}buL(nYDxY7ZrvmjSu^wVNZ?<`pZmm47TpaE4H5X)mJ)E3>=5R}r$%
z1*m=%ud9g$lJ(o^*2Y>4MwZUK4ko2&u=%+W>z!`PX1U)8T8K$ORr!2XyT_N0NM7(>
zZge8D<#h{Dot!TtqrtkPe|17)D8Jz+lYAgqu8l>}bSPoKGTV+<i6+wf;#LbB)oEt;
zG$Kvt-IUMbPf}$Vennjwj6|ALM<!CVmkv5)px3HPc>W=24uSyZeigz)U1?83S>iB$
z^ks3Fu(FZU)xPg_@xVnVp|HvQu`A5ePl-(15vw#zDX7;N>M@2Z;KL4C&d!X)$(T95
ziVP`HW_-QBlN4@WQ0Y%6*D~~1$c`FQ@aT25-c&#?*^%mSNf`sWTSp!w@`k%w5?!qj
z_2^`Zud2@M@Jekn?w{*f>ph76Z5|&(Gj6x1j)TUqGiyAhuD%+rp!BE8OI%R^i=F?I
zBBMX&)XGuz_!2TPoHXz0VtsRGNJ7640BS;uitdQP#CQGcvLzI3^hpf5wb9e=-C68V
z0$iVlSSn{Rm(HU1(4THC<%iK>Kh>=u5gOB>*kVVG>?ZR)zSnL(gZ#34aqxi?Gp(MW
z>K5EM?@kX8b>uHh%w#R=XEmR>^Dh>|WA2v&V5q)R`>McgjJXa(*JCcM1xe-C)}g`N
zhUG`wuByV;!@*#c80vNtMpoo$g?sB7r9gzichYYE0p@<TZ4r?{ntv90IhHt|E190Q
zm`pF~eAx7b3Kl6$`fC*uB^M8!&gQ0H;t0}-<#WMGFFs#@o&>X)2jx-#aBg#WqF)1_
z!LsIPC8ePeU0ikc1E#F}Sn9)w&NZdd+;W4ld7cApj(yeB&djy&XWrYG3Ln?yS%%#5
z0=gL6o4N){ZUE>j(y7qlFKC5t1}RL-I$r}Dl=vcqdkildo+j>biz62I+NIDAg<OTY
zyM2)lU<pR{y9Tv$el#&0P2p$fUGE1Uzm)OE!;Nq03fo<ZQzFqS01_Xm*6$Mo0NlIG
zVNd{9uMIngmyI<<0drPY$0xR%;DR(x@;1A(ZQ|~ZxGb^oy1TUBPp7WGmqDqt23<P_
zf`2gv*3wt%E(x=r3bTV=;tDt)%{Naxn2*|qy<hvAz&S+{uyYLM7v^aYX}=+mQbujQ
z214UE*H^SfxfAmb3JIPWolNL_d-G(Z^E@wh@MHrCy`X}c;<gKMAxE=S+>$$9zoK;2
z|5}XAnopyMCgKd-jYi>Q42ZJa)CE(BEf%MNaVUJE(L~g#A14IgE}FASYy%Yez77<8
zctt~>p00EnGk~g>MbGymZog@|oc=<oqeZmm^Qdj&83CHYsP4+jlM{D35evOd22k_7
zVhm|C-aL;pT|MVBG+wMueSbKrYj_ZsjKo~OYO!3|#4|luZ<|=LXSKHD$?3R<h-$tl
ztS$>y+Vlz;*2Hi=V=<+s`H^IIc-8%pv7(Ew-EBlv!(?l|EAo<83Cy6{YFahgcmc8g
z78n?)gG4uD>Wd2a0Ccz6a*D<BCFdC*k>GPO?45h2)PqBz+Z8Ijudj}*@Lj0c%9}4!
zV6)9FeKTWRh4$Z&h31BkO(u1fE*~_p=Fp;8UYc4;K@G$JAM85U(VO+RX>U7whx}@>
zlIiW4TN<0g<Co3d_#DGwZBxK_fFFL#+Zi_hwR1FNT$ViadB+0?*6S=-l9#u6F89vj
z`V!BBDIf;y#o@q{g}&4En5Fe)F;_?WjU_a_@gbX20=k^Jbuj3ebEG#?&<A7)We>06
zui<byv;X2rF7ux5lAo*Xe;TD|L*Ntqpv-(>C1AsSh9%heDfI!pWEVU)B<ziHSRvTC
zJ(8Du?DWCsbO7xnX}`0z)l3NdV2#fDoMuerDFBb~#$4g~+=TxDK`16-7eZ$c`22}|
zzW)@#*q3LbGQ{wWkW|b_bktI?|1Zs;xXe5C=b~`i?BepX^`;DWd`=dN+Yy1T^y1`i
z-)i*ZrnlZ=Rnfi|-3a!f;_U<$rNc>>_kVxT;#krd@-H_^!+;WlSnh~jTFQW<VJQ+P
zg@gGV0{O)rAM1MHMEs}kpcHrM&M`#}bYz;_1Pei(H=&fm`QZ9+PH~YTuB(9`iu>%0
z-$RHo|3}M_R--SVBH)8sQ_qQa4yI@AVPiDln^daPgp8ikEqBtQM#t6qm)!+ti)od|
zRnMWiw{E&WFQpw1v;6l$N4}XtO<d(F)3!>2qpk?})YYZ?15sVWBs{R)vZd4^{%>fJ
zamp%in3v&wP<|fpQoY28syb|eDh<db)tWqszDxBTl|tcq@Ak+vFjo5uFAhgj0Za$6
zj&XbAs)XgHd+0>KN1AT~HarjIAm+MvvFx0sp@<a2!CwEp4)-m4{+EHz$X$LgUw(!v
zZA|sM;=_XisJHlDoSvWfypM8PZszOZ7UsJ9FpvCV$T&U)FI}ufE`Bf%-4RVD(LKm1
zHoTe-OFm~hqsqKD-#5L0Z61andErj)h{2Ycux*z|TSoFK4y^l3#1qFUgo;(lfuXO5
z?FWqnTroER%wx{kK}QNy_cOutGxtaJbg`C!0oZYZkL<2nTcZP}uk*J8fpbi6v~Rzy
zOO{XKw2EGq11{krS-w`YSv@<;^VV@K0JB1C1bgX-yN20ZSQ6@vT;Iz2QO~0u?~rP)
zHq+rVpQ{|5K7Y#M_qfq{CIE8#>nSzHeDFVGI5IgFH$Dh=`K*M_cifPJ+!eRODq@RR
z+k=EQE~%NOv!|d<rJN4U!{_AS;)!oEPQR&o?z+*+vacR?_lC_1%9oz^P}R4HybVq5
zUe`6y|7^L^*I5-K@b_ZKAbLTF0WcjE1D=KbNR~dj&FQrdkKT@!nBUS3oox)Q(mqf%
zKYWo(VhDTZK$WJmq1dh`e+%FLjGhgDjMC9@6};X7_tTD?#vWZbJD*7HUkFDYs}_sd
z+fTf+w>aV}fDf3ueA4+dsHP<Z(-K>}^i{>~etmn|M?oX8HnAO-r?*H@K}hS~b8B{5
zTVu6v-|4;IST1~B>GF&M$r!t$AqVw{0`5!~Q|$5*SRJ_iqhD6{g0+FIK%x%gsGH?3
z^moEwGTI*HKzpaDmp=r-EdAR@u%fwu>~zQkX8vxx*fjVQ<Zuc)qcY?w-JQCP%U6UR
zdhR^pj!V2(YgmFtAw4#v$RLgJ?UyKFOs4~p%U3(E3ixCJXcR)E0y{I({cx`#W_Z|M
zrmqe?m35a5fZWeszKrXf*o=5E<|L<VITbWg8VgW7D#G_?HhzM{F$$BfuS2?EV&4!w
zdsKzkC$s@@lEDQoR74EQ?@y46jpo=WenIhMDj7mg5R+2Np%ilPkxasM(*^K3DD6K6
zpnl?<3Ia1M4+#g5ws^x*h+dgcG?$#Nk74Uf+KjHtq}Ysw1I?8-#sb=ht}}@5cOop4
zuN=CA2soX%l!RVc-<aA$Kz^1O9C?`Q4}YUDay|sQ0)W`v-rGXacrS!u_ABs3fXA7I
zerxYjw2RgUq~f>NulMH#Tr3hH()0D$ax@VhCX<xvtfyzDULTf@_1xg2;UK2>xr8d+
z$CvJGary3eL&VJ<|G3Twf;I70Gt~a)&yP5Q?ofkD)uwc8a2+>X7rN@BEldLGLxhxF
z(wRyIzJXLNF}wA|(I(@RnE8}eU+gj_Pu-2DxE-iH{2O;VEw$Bws9X3(ZyOz#@D9Fe
zM-?fV;f6!nSNpc}@<gL+TpzI+&3_4;4p;n6L+YT+qZbbqcU5;0Fx6%qaq^_;6r6?X
zkTPh}1tZ@{7+&}_wkvppAcg#*J&)qdT#TUCJeFJzp*ux5XBOVkgnrwgS(w68y<VD3
z;cmgI#r;`b4TXS`rK4W-yqbVLrOsiAqKPsPi96k{Ff;2m6O**sT#>Z8L>({@>AoVd
zy;0*&eWTsA+gOaQ%P}8IqBGp7T2=<~j*Vp##<~63MC(^qAET9Bsq>>Mf<)dQ9)2+I
zkBYm#6f!*cgl2U17l=V8TuPi6mcs0K<H2o)w~+7+Zx3j4%BAMkL;aj$^`|{H{IG@f
z{Vy)H>(+ovS)%yr+Hv$rt~JK5Bvj>3yY#*wLX(0i^UtV4Pj)a{uk0Xs0fei=&oI&H
zQ$OCFH)rMkY9?wuN`j{2A747Ii%|@<arw6VGC`a5v5|FBSN(Kx#@A?SD<60Ew>%fz
z$VB?c_*;8jlW#mABVwgDS1P>AtJ4hJ)(>%_mn-)PTk73MIi`JEHCSamm<lZZ(IU<6
zSUlVw^MEHte{6f<q~wO1$>FCdhSO34Uvf<YZ~D#`#C)a7tm0<I(lx~X7nY6ynuM^J
zGduhdbIlx4D{xYs=Ncup>%)Rn9&5PXZSkpe4$=n?LFB#Sp8KZDYjSSE-r$Q2l*D1t
zBa3nGn+=Z3tbQXqMBpnr{~wetHRu3;grOX`fK0ffE(j^a@OECWZp<zL!s41x+_~*q
zVC|#8qZ)wUh4j^)v!j+s5d<5M0hy8mUr_L;0`dDEJ@Kyw%bq{^eZwu~!g5r0r{8lS
zDm?m9ca)(Agrrmq<kI2jg#geb=AyAF0+d)t3X}6(?B{J|;9F=E?&c#uTx(g+ZG!L=
zxv!`t<LC>3-A{h4Z4vcpZ>5MStY%sqK#$9vGZ+{mbwz!3iuu-L%u`O5GS5Jff??;~
zvN>F=K&uSd^X(Y|?`!gB%m<754?#}HXy=~4#?d$SMlbgpZW{Obb`LtuuGANyRTRbQ
z%Au~<Wzv9%fh4p2b~I{fGp<ZM68SQknQn3y8PhkHW;;ZdH>l8dtxsF+nyI=1S=afh
zk*X&}qQdZ~xuKc{%abfyzrRO7_A{dzQN(o+?L=?+h0Yu>uTnzzu{!buMdl$A8I@3+
zcRU?pQ4+XYd}rpoI&sBM^>|+5@e+5;jcHfL2MIJsR9rkkr!+AgJ_Purm-s&HRI>bj
zTm!ui)@xyt#kGadDXqsX)V#%jy=%d{BmnNWeYB)U)+yIp?M3eiR>^3ly?4uty#=pS
z7T7F#VkFcT=gEx#@p9VVheEwbo*%)+T<<^fkch8RbPbJtg%9EpfIYn?f-yr{U3@;w
zC=&8xqElUs*BeLPj;@&4`rN_7R?yvEPZE-_$i2k6{jW&wh^Yrk)K-+B?%$DJWU+b0
z>YsQkguD{E1z2)oBfluN?(-_9aicHV=K(bVS7Wk~$u(xWtz2(m*hLct<;qudw6wMR
zzhGP6y7_2`coWzZi6mIiu>4x%>o@0k%(Q+`v=0zBPS_E@9-(EwS`n`HsAPUrIXVk-
zq}rdR{iYt9unnVX9Qc^t^dFYdFo+}mSU+m>9P?;qlEY5kgc1=!rNI)19Qvu1KeQZE
zM-H5ek?ekwj2UHOsgnQ%)D0M1#|*)d(n>%V2KT6Xtn^*<Ew0eC_<y9Xh}I=QMe{fs
z+<YhWxSyKpbUj+X$vol@MWl|p-2Ye?%g`R_X!t@scF|j#$8^(2b|aIqnla`cRdx+X
z;=Q8>y3kp!zt~@Nk8M9~y{Erq|D9wwx}y+cNEC#8PQWicOw;sm9xH30G2=+KMkg2b
zmVm6F!+YA)7uwV1+uHv9AUOE?T9Kyh!TP|@38|D(>GQ1k?zE&fk%4-&QPS*m*tvBW
zM7Q&_^%e%3{dbh%D5mg!!?Nw|DaNbqjoW%E?RE-Efd&v8(@>NjcAsf-ov}E(eW<D$
zuK;WfDY%9t_G~B3L^dQw?AAgonF@+*F_s}(SNrneNX6YVZ@Qi3vrH7S>t<CNv`CLL
zgU?8a02$0|4{v83miY-vfqGJI(G8I)h<$s(1!oq;qYYKDCo+q<0He>iv?|2-jf4sg
z(lw76t{|#+6|}zlOyCqdC+H;@^10TAPVX6`k+Y|6xR-3$?LA$Jn|Y<AZ8a~4MWIS$
ze7KT({|`o1Bov~#k=H22Xa22W*Tk}bY0u?0ANXmzxz-?)Sp4;<zy}hXAwkD3Gc4w(
zd)7wEQaz6vy*{y;>K^z5qX9fCE;(i5r+WnSMpE(L(0JK<=p3K5py1Ltowo){3e?vr
zOkitg1qCY=&sIh^zq7)8WSIR$JO?;dAH7M`G_Vj+xlTAE9;2B)9opap(fgS=e4?X@
z^V=oQM7(xs&k@t}6N*~Td>amLZm{!5f*zhOXnlFp#k#a8WWq+7JZ}{o^q3u;<m7vZ
zI)F`exuTbZ4%&8#WzgyyD#z<6kaBw45ZbV0Bb#o`4xj#X-!(WX1pEYa5}-<gGP?2G
zjJ`einKxQFP~82RFl+;R*~!OL9Oz@v`alA_YaDEuCJb5}jVju`YDl}E_qVIDK1j`*
zYrSikQ{97Jdt7)hG_nV+V01U8A0TO%bu`D<Hz=7ZbK2=V5-`!*9wpg!r$;Xo>rFKI
z5*<BtcS?$AGg@ro#Ev16#}zzdb~FLPvJEA5PA~-go_StPo_VrrET435yl<-%N*nFY
zih0*3HqD^$ORF3yAwp`ci(tLISG0Ok+qf<-^^B%7{2oeB5?akjL9d|Cc;PT`LJb)l
zzO+{FYv|9@*#oyx)h5ppFVH1&hQ|6A>WoaXNZlI`y59)>IUcs=045c!dr|@W2WO6~
zpgua5_ghP%fGe?QM7rXybNS>1<^#vWF0U%1jo=-lfF{6`4{6^RN6-T9p3yriWy#(|
z{u>OwE@ypSe#FyhSR&lM(`+b}GluY11OYZUgxFU%*AQ=vU8N^=ZrbFDfeB1u2y}Lh
z<1^xGiY_!88+`Tn62IKDA><Qp`AWwl;7Nt@@x*a|LR6S$e|Cr1xU;vr3yeJGu1495
z4eM3vMbN0VgVo~$^f_N@xQrauL0|e2T+bTI0pvLokG`1y@$N0qSn6xj2jTGM1S8m$
zhxp?6&N$f!QN#5imGm(k^~ap<_%`I$C<>MYD^O1U`LliIYuEt0!~SDn`w`9Q6c<$=
zKBY3WMJf@`N6<z61RRl|S7pi~ltxd7jDnzsZ{>G+-$~2jcd178h3%8FXihf7mpGvm
zV&F^0y337urh0Oe3n6kT^u>Eq9vmf}R=XR+VSJ7Anu6v{Rif`MaDo+%_D^_k(PYQ{
zZrD^w(?OMIDTphn3nv=qS8t?dvT6cvkho^&q-;f?%9HhDc0?L4JT6Yz5%PQW;QCF*
z(|(R%L}fr?CxA0*gjjuG-j(SHmMb9fbSkGmy0^2Ij8D5|1$x&`zmq@`Nm5OE`lsxB
zd+C?J=Vz?^1kx`z&6i{Ooq<aB3V`e*wN7WGQ^25n&V1*{@Xj6d=_oE&tZ~*t1T^B`
z&hRBH$6?6T-AJH6{UZH_d;tRan6~N5?fF{NTaEKW<xBiYtg$(nc5rc$BCyrNt|a`k
z->S}<47uA$NGWsvc_Sry<5G>Wv%3qgt;rf`@(F<?Cg}GAKU*+7TX$b(!S?~Am?7Z|
z2vOYHx2%-ZZjy;mE`z=hB7KO*kv43n@rUj~&B*?Nei5HL+1Q{;Uq>Y0YZ&MC+PG3~
zd3Bb6QBEJlR~VtTE1PQWJlLx9m1w+#;YD}i+4xWQNey*vK^+kO5e_S&F)ds8bOott
zR5_zbstSF|)IY_ZU~6=1j*de)<oVxP=ULVy)e7ctV+$}OZ2`W!Eb8CjEe%{DJ^es<
zVfJew0uHQm&zNf6wsaY^iMVOkt6y$&clHx|u6pE_OE&?nMvGUsqq6V(=8um+8dIsX
zj<<(N?oX4pPhXS9NBWq3n>(i?i}w%dlHXz!D2AQx|C)G!&XyJN51KHw`Xv)}HAbtY
z8*gxgY3S|7G#QKeO&LA?j%<LJ2fZOp8L!G87{q>pqqy{GX--2{t#1&^dT?ssv{(J?
zP&V7Wyk1t|pdIvyvG3m=der8q>>Z?eZ_i-krh<p3&(ez$Hz0v7oO%wud$zfg3g3)U
zVPz2I>B2O>iAoG}fGf|1Mx>3FWH^yPU=Sm1QHO<Z$y4AV)=rSQZnF5dS0xr;j6JZJ
zF-s6&#dN&g8hX2Sij2O9F*nTdMpYqJse~!%SWyGQUIT!y{aZJ06^w`Twn}^FwxGju
zO$L+0uhox>-qA8#GZqg+fiSD8Wd+=6GIeZU(zu=BK>S`*DGa9~alj`GsJSbMq6gx7
z2x-%2@09wTY(tkBg(9;jWRIGN*ZoNNPf6K+6eTs?p~Rbw=>!LJsAt2!H2r^NpYwTN
zEkI9f&E)Kq92u!ig92X3vJt!*SD-V2y>}D1DL0M{;eAE@Y5sjK7oAry1}AAE-?|f9
z?^bF2?7u;Gw>|J?e|y4+O`WQ0_?Z@-Slt>wDb$%Wj<viWo!uXUJ-L5I*FB-{xjtn+
z{gfpCj`zXgNglOjAbbCJ9A|~Wb^lw(@D`n)Vm3?WMgM*x<2xSyh1U<d8epc=3PyG3
z{#xdm7u{C3HJS&1;tV)3;(!WlS8;M(44=b0z}b)V%5SRm)~^`DdOecjwX<(KDXm{k
z8$S5zC?L(<Q*h{^8b~<JGJ?;VK*z+NKGE!%_A$5S-PgEMA=h@f>xw&Ty4BFcijc<c
zD|rO#?dHru(O@~_3&L~oy>;F!iLMgzj!TxD9B5$N&#bq9y?%dEZ+YCmCmw}f%IqJZ
z&u#koMAxk9(T8;VUP_4mcQOLt;|xk{aUJ}wS07nF`hbo>96)sB@P^ys|3bN{PNa5}
zIavm&ptIz-GX>(8?Yp#&!*&|tnzB4pk#L$1oTu9Jz)N9gIV_AwA}}k~+E`<{F)(8H
zOm>HoUGX~}YFocc+;Y03i?r&T{_EN`##7+(v>oc(`Y_q4g@c&E6PKY#N0}Sh=HvqX
zu;oq|=f#78oYmJ-eT-l?%#2xGHF7MFl;}%^kaNmqIjgQVdPR0~%=PF(`ElLdwmX#K
zY^p8)vg#du@=IYdUH08;7=eGiKUct#eCxLbX_|oiR8C_sY`gu@bIm=4@*88o;}fXN
zrXgZzHjVwk?vQ9BQEL<G%aPDX5tms4S0j}%TQq0S+%sTFdXDxf@BEY6i|7YwDhEz|
z5O2?Q&oK&iWuO{y(7K(pW3XwZ*;kX}>M(+0SqtT)gx3~hw+-0KqLs^aGG=c!al}W^
zoRJ5_`YSd4^;ZGHcT4i5P~+6^fDfnuAxKHL3{`bbT*mV6JSbw>-#3t7{g5#r*JAv`
zfnEGCSo}zyn%`@7hNt@kDEE_k#MtuonHL6e!6`XoHhoU3^7ud<i4zm@1WN@J#_=;`
z#2=`UT7%s#xsciZw_Re4%<r1@_8H35x40z;z5@j;1crGES@O2D05x2%*x;x>R?KYd
zf~pNN3}nC`7)5r`-+Q~JKa;VBW(7U^Bw#D|F>64^YlMa`-0-mU2!IqXcG-z5mVWDy
zOBQ;-R`Zp+%kLLMe4Yr8RZ}9ITru22&y22ZUlvj{z7+~?R7x_lJpL3d`q-#GL>=lS
zl5A=6ZmIB5INcB6DRUd+j1?a|N)j$P8AIR>pLl@^I-}Okg#VZEPOXr|kSJWlM6AZ2
zbly^AjVnaG%6NH!5rlEZP@*prFjxBFt*3y$%W)eI;`v#NsloN%3qymcnIvt=gDkbc
z5sIH-@kQ_TN$t;DA9KYD!y&Eq3R?CCO~ujS`PqAo@bc7?GJiCpxeFlDiThAH#eenq
zFdgcxrB6CSZL!x|>c7+TGc*qE3uzSdWsg0@h5Ag=SJuVZb(BzR@5VebY*6ZhTxXTk
z3j2*aCO3ya_7`>u1NyKA<&F~`g!{H_JR0(u=d1TJJhr(u>|3WEU#xv<$o+4OmIAc=
z*eFLRX_Rngj^!)3b9fX#2_H$FrI*nbYsWZaUzi{xn4O-k8nuV>XP}FOmpw(ejbBOD
zq6e%YtPBb)3+8s4I2jr`@LC`ZO_{iXFwUxwaP96=Be2m4P7bmw4iJS}C*VdMgPQx9
zlAE(SudeaAwFT0k1?4s*<qLiEzS);G1q(bxY&^hdUY6SirqeQGs)b8ypNH_VnaA>7
zA}-1rguRD`#4@~<bE1fX1?u-NI{ERJBt{~|zh3QX39Xt*_`Hm=B0!Xuu-<`rBz*C&
zPuZ}s-Hx>w4T;m*FMlq`KMX7OO_Ar?=q#cM`8a*n>{~)F+D{qlS=s9JQ;JhXB;)wu
z<;j_!uwf}h;YbF$f@Cbm(aGG^uJhqYLQr?%SRj&At*T~p_8`XM<s(qR&mapeuw;q2
z8}@+M7<Z{cz(rTne-?fkoH{hPkkg|5YXuEao|m_qc1wx|ckF)!J0-aVpy(5VsU1|E
zSp;yyqOS!%=MEmMYhl86WVJ}a1wY6DscwwhDLMm6|9i8vGGS1}Nk>_L6^YQl3O~da
zIOr^Mnq2<9ktEj0DE~Js<ws%IWA>4Ivm)1I^#U=$(%^$%W0}fqpWeSFXtEkyesWL_
z3E5XAiuX|xAhYa+j3yCs1d8_!J^1flLG_0rn(VgDQ1|zE5crkZ{_80eY{stwzvuub
z=3x(l%D_>Ll+5Yll8M5yw$Pl-H~dZguE>bJ;miJv>LMvcPL$Ux_-x=+jkqbx=j6~u
zo%<jEMk9wP)y<G@_)b-fCp>lFl0Poc+~rNf&~i$K%}GBc^NgO62Sjh<x#W7|uK9<I
z3V-XNZTqY(8kZ#+9N0_bf31Cjf1jU(vH1o34IeW>GM-_oPCsw~OE=6-iqI5uSNzzJ
zkkdC>my4?D>AK5x4L|e0`{^xFV0>Y9e#QAjO9ws(drA>vVP=Uo6CB>CkzQg(<eyf$
z59^2hsht~(m!dQ-&5@EgQ`B#Ib2ypfO$<*G^7tK=lCZ%gI#y`N(vV@enUH>bKdho_
z%9=`H_=ew)m|*y@ONf6;uBIdQ$a~#+8r1sKKAy(!%wK)F%Z*&T2+opVViN;;A=W<H
zU4^grNpbEy9<D!Q3NZJU0CXMw@qC1u60m2lcz-28u+^yrAoo*F?=~8zhi3y5rPp6D
zn%Ed4yaY?K*rGZF0(P!iR%c|txPB}=KY*B+zJuo;l8rJ<m0GRfua@59TsUR*>CbGU
z!*oZzk$)X@*Z<VGsJ<{?Z?d4X8vzBrpP)TVprgfv127!ZTTf3g+<V7A#qAEm@%z;4
zH7x}WsxsI?3LoY-8OvA<A|-ZlLtTBg<S&J9K;mmx7hG=Ty3)m7mKz${3j})vCqn!!
zwjWfx+(6bp%nDIXfBGKu!IDGtWh=rIoTw}qs>*C}z}ars8HJ8P{8OA4eb_k_8>a=c
z{K%~gIXZWC5UAZqCqy2SFT3a753vXyMoeogMX{Y2+%Io5up|?tvK#|nD#dufmqEw?
zhTIpEa9{>Z;7QL_z<2!~9G+HhTXwg{Rjqlj9_{1mJ>4Pv(NWXYRB|?kh}|>7N#~)O
zHrnBnD_hZzGf#(&kjH4J5gnhRPV0}VT|6g8oyrgBW}ZZ1fI@irgv9;CW0qod-<9!|
z$o-PdhxsZ5fE!=N%%72^%XzgJhSwLQHxx}QUA&=q*h5MR0#V|~Z9fY}q~^Qzz)=!p
zDIL6;S9;J7O{Wg!+Qs188uyQxSC*r&nf;ZPg@mu1C1v#hZO5Qw;BdIp2eT=dC@fU!
zb;gcy0@P$J|1DpoLZhu+&8j=gY*qq9sO8HYtmLj1^eT=n6cqkv@|KTX0~?Pe7MEqz
zuA9m6w*8KV*7wLL8HDi1IW;Dy@oC^_^7VO^fa3Ly3l2+Rw0NK3V;Evg+H(KY*m-N3
z{~wFMO67Qn9d3jc5P5<?pkSAX^EW)H&|UhPSR+{0RNe<Si$mRchh<rB`*?um^lr#b
zXk$}2j-Uf+i6WuA;tg^$m!xx3p91*^?a62dTge>V>X3mHi}k%7B{sE3<%YQT)ThIV
zROu~`;J$Y<?t^(#Ts!r;E*UnTA)1N5xFvp?90|Jy1iy}r<={jAX@O%%KtJ;z9V$qS
zBIT2Yh1AsI(aj+X;QQ%|_tV1C(?);X)hu1WQ72|a>)VBIS$UcH*~pHb$ByR6*w{Ww
zoKSy305Eppl*@Tdzx(jK2sB3&laDAN>GM2{C8kq696KcGk-<ZdlC3Ct&n&9Q@e6^o
zVM(E+GJrCar(Y({Pg-A>EG;yVo3bS<)Ul)Q6n{+n^?mKtJZgBpe)IMkeE?mhoQ~`I
z_Eo{o-iE>$$87&@_pHGpUh5qu;CajZY>Gd9?-_cfeaC-siKE_j1(}+`^siIO{SSr4
zx=hQ%n!VsLELH^8E6@2l=fRiPyQe35TR2qC17QGIiwbJU&*0`2KBwY@FAopY%ctwE
zJ`RG2hQ4YWqQhxbYIjFy*m5fC=!ICPu{Sl=I?P$DlAfDc6gE_}Cxf<t*!{35`2kx7
zc8psh)Hsi+NNG3+9P<~~e_j0;HG1{ZJuh;bt78{Sl@ztn+5~2;4VJ_UXTJKWlI*nG
zoRoi!$L#sR$L?s=pOYr}Ej#YCwUOOnctPYlweXDXJb&gS==vpe+#1eI+0PA)Cj^Jt
z50AnWb5--Ks<M!=7|u#Tch18kjFN0s^l6p@Ln&i$L8|C#_Y_lIgJUP0Jq#o5-`<kL
z$b76rCq;!{NntA_<ohgvOZ`(}mS7m7fBWZ6*F;%E@ebsSRZ?apy+hZ%i{G^6@%695
zlA^pMlfA>L%C%P9Ie8d%Vgdan@l)FJ^m}HT?V0EY0S~+K;sqNM1yi~slyu={(^~L7
zLs&)9QFx{DF|wXconLi=Qf!Tz+qlulo_^y+RvWIEDlPD4b_B_%H^!b|x_dQ8Y^e8E
zC<zY30%5GV2kfw`qEdNi@4UnSh(jx_E+iEm>Mlc#d*J<sq~rdmyS7wNQY%vaf6FtL
zqTN!C*Wop|0)a0!s!W0L_oW^qFNi)#m0qh6%-nys_0U*SR#)%wtm%%F8IC4HkD%;F
znj^<SbXzR-vtut(XkKjGKDsRmpcZx2Crrl7^_VnxJu~rHS+J|9>RpWdyZVbA6UAaI
z6~e5!$uz`=#a<MPuLWdcscw3#?({SNmq`C2mzRYzkAKOuxuP}78RmHDH2%mfO#$_t
z-e+9MR5t(5MP0#iCs);C{1sGtN(3@#b!pw5?O`zH3EI2czgf?<z*F-mkDD0Vr#bzg
zGWKa$s8G<h3zV3Rb@&Y4%_abp1xY3|yXIirB~@y>EauyoMZ9^d5c%cism4*iSD@QB
z)qGq?8kx+0EMK>uJ;H8NM56zzPxD1y{a9ZkhUA+~GZ$ik(gu-EIbo&IkCAF5{;T{^
zYc-{v^qDGdTH%{!3jXE}bfI+sSHjnw_-B28yS1Ua&vu5*f!!g9hknNuS|Gu(8>Wul
z4s9ye!Fc#(UUA=rmyVr&VJZ>+ot+oK*uBIx-_Iqngi5}8Gqo4`Sd~hs$kGY_46my)
z!9A%sB0~SmURW_D{wt{C<KyMn{-JXY@m<F7`s|!NZax3w&`dr@<WEsp-Q!u^z`(_3
zPWm}=hc$Tut}xv$S3+&=H16vD7@^jz1L8^w0%ZSWIO<<3G9K3FCy(XKyu2;N7dQOG
z=IN=l3poQGSDzMG1Xe*OY_m`9CxYhb)LVld9sa<u(^fB>(S?NH0z_hYO+hnlguwyd
zayTKq?q^;`#wH%u-Q}A8hj5g1p;W=vU_jwAM1xB^D|Wa}m36%IGIwl0z9ZAY)E2+6
zoULtrLb5R`B9xcoAT97=#FU+b3lKBp1SX*nK)d_K>Z2$$C4wF;PXvoFyoh4=cDYCG
z%jSdq0=5n<vkXhVV{N%R3m`w@5>oWN2oY`dZ&>oVB!LYY)SN|#s7LRz<V(TuW|P>(
zNUEHGG?c|^%hTp8cCHrmFVI)NF=Mro2kB~<3hT?m#QQ9y2CL(8BFO$NhL8Q8{XbEL
zNMNjrXL|fX2d}jVAtE#U0M_BKwo9f)sE9CTaKiue0PH=>6TL(!u>_rj4mYBcu=1<`
zH+;BgJuJ8xxH?B8m)bl6@MEGs`WbjEOmRvb25V$-M_gLLN-~6-G$=xLQuSCz|DW7~
zZEa}EFk_<&HhrztlBj8>Ejd*CxE<MVU~{<3seN&525*l2!S);F3gD{dfTwC+eGwo-
ze(9&&D=+(!^7EY~E`q)KunD?KK9wtLGr1!SEHM(ZX)MQ;Of#e12PWzS$TP_b9ZwH~
zc2%~;)*zyCL9LMrInLRn$5ts^D>ae`0r2A4m6;l2L3BGgq+xKU+^xOx501{?j80=s
z$o`bjMXy~O@*qTSv^e5-nXcV*N!ZNw8=S#yI)p?(MHawJYNy+jw1D|r1-BDN$d(_v
zvB7+hmNc{gcaATn{hV%PQFSDBrW2lGRr|M>;K8JzwSe!>l?xSqAn6;M88KK;j$~L(
z^D)8}adZlj5^S0o2aLZc>Ro2eV;>hG5~xU@PMxzu97JK)iJ_QXjGA82an&~oey>MN
zw|UrwiR6CYPrF^f>}aq82ns4R{VsJ>{3MuAtW$ofa~Wtqe%P?UaPX+6XzZ06figZW
zL_!Ci>D?dDl)^_kJYlM;I;62@BGyoU!eH*}D>!9+JOVeWkb%CCm`zm!_Q8#Pn}~S4
zfoF|~vFXfE4PB8o>_LGMi=&WQ)&Mo#Rs#xM8;<@sVkscC^l>VyEbClC!dLKUzVcWF
za}+h+vY<)*P$;a6X(TGzH`;q7s&dElTRsz0bcDH`kbL5xHqTW}2;C_`LrzV7d?YG+
zK|*w+9r6&-g%Z;b?}VZN&m>PLw}L?)o>dXAqpArhGF47BW<LHBgX!oYHHFyo=Qgtv
z-NFZgQTVxH=RWvEoFr^Xe8x%Nhk8#>f<S%zC3JXf74c8@&+MRxz_qDO{RMFa$SPTB
zQ<ODMPKes0eiu9wXP&80)Lqw7+xAN#=PCjcK?Zy1OI=#;mm+MqN22VD-oiPH89qRd
z$^Jaa>-k{!)hial@W|1!b|Q6cA4XxDdS%*lv1fiOZw^h#FNjDqbN`jssSN(#RDkhO
z@)B4aC|n_XL<GYRy6I|^gqeoGT-=`|a^NxQ0Eb4gGbhv$T-9Jt;f;3GAPwJjm>r5|
zq?Xf}z*)p@-`<4n`Vfs;_fd}F4AB_khMl&xX2&g3^4{STJa8XovB4}UEh^v^?#6ZG
zO}vkRNeLRD>)9#PC!XtP1h7!CGP59(@vup?cSZJ3_58t8JB@oqF5<As`QYmLiW~nI
zG9Y^vb}{~JvpxCb8_HZ{oxLfhMDQ?G2^AQqKKjA@14c=TFjPO8&<x4DKs(;Z9`bXJ
zXBc59)bZF7U}GmPC<65IGM{So>&%>V09)oNcLrm8{3}=oee@KXO6*Mah?5Q0{I}xg
z-*EwHW#Iq7co!@6EQjSd^B0-KKj<C8J;7@$-|h+g^`FKdfFC{FD65ot$N*~+Fr<c;
z&$UGpD#92Q1>lbVhqB@1c~9lYP5(pBgsH-s51Qs9q`?0*)&~aiPNXXTL+r6;MzbvX
zTAu;`G!cOeW&FuwdOG77MG1o3amByZkz4%1ujbJGXS;=Pugib6Ab$d*Z>D4P|J5*n
eL4E0l_>^p;+V4f%JpKv%laWvquNF1>{{H}Gx%-g-


From 7a766cd2a77e288c35a12f302228c6e43309f8c0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 8 May 2019 09:19:45 +0000
Subject: [PATCH 0348/1147] Delete exceptions02.png

---
 wikipiki/exceptions02.png | Bin 87107 -> 0 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)
 delete mode 100644 wikipiki/exceptions02.png

diff --git a/wikipiki/exceptions02.png b/wikipiki/exceptions02.png
deleted file mode 100644
index c6c56869dce078f4fd5d76d6366df576fffbb6d4..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 87107
zcmd421Cu7f(gr#^wryj_-mz`lw%)OJY}?wgZN9@D+qP}pJ?A_3{)U?o71dE4U7ej(
zm6iF_(-DgD5(u!kupl5H2vU-w${--1lpr8Kf}tV*wSeB8^Z%=093{0}KtSNo{!@N{
zWM*T7fWRtPiHImFS~>t6Tr3?NiKRqDh#j3B%&lzAKtMd!a#So-RZcPap0^%^Wx{_a
z%Qz@wKoctqNBu@mp!`V!gDf3RQm~4l)Q=)2297tH9}X59`#Ty#i4Hyzb_MEyq%bz9
zC_M7-`>uD9%~IF%(d1Y2GXHVaeNN*vR39{aswArt`)~MiVM3Ihppn7h-2(=}09bNI
z5M<~^Qxca?vL7HXe!RT2q<v65AU{0j;h;hK<g)sh@WZ~5&V(~`fBX*q(FaKQB?J8%
z9YoM8R=5O2Q2fX5oODVRkbH0u!*LVieGo-@5JM{eqj`|uIWHOBKR|SnNicroCx8&6
znT3mjSn_~WO{+(WfoL*;pqtAKa)GSSgD^>Hm`j4xwSx3bA;UF*K*NJDDTRm7fPj00
z7><&Wd4L3GfS`-tY4G0C)*v7M{Aa0*2HtjZF0lX|XnH3o4GjiD>M1EKT67L0P@_yi
zh5^qE9F_n!q@DW-5Rm)?jDKHy|LHM>STi-n5!-@jK!4T?`AuqUy#IALUFj$Y0<sJ6
zoBg6=Y{dP|1NqzTtB~Rf+)^Jd-}O1lya7qD86^L7P2=A2KeiDoh;LtAJv=yAkscJ*
zG5V|F`(-g;(5LZf`|8L0@%*^cvqv7lq8A_m{<1SL@gQ4_Kb;5@Y`k$4C-Kn=_x(XI
zPdX@N+^+c(eP0RHDONNy`ktkjG(tF$W{6_$+jMW6?j4MOn;oRin*WD)0)3gD3D}bi
z6|yFvZ|@ld<gU}9e}Nhr?6+mm?zH>&wZNxDJ_X2cbE!lp5D<M)at77EjRGUkARwao
z0YB@6@E-cH>G~k?`yn>^;XVvGf`!Qk2ZWJ@VNHMII~&qe1qxG#PSz3pG-O;5Bw*`P
zvJ6dfL}VCHYeVF7M0zuV&h4k}3V;C@8ihtPB3TRnVH~MR77LA)5%NOPFA0tsMNT{x
zj;=&1lfW*?tQ@IItR_it$L9>n6{aiRk-#$w!V>rq+9ko99MGV|w*cQP(q6`i8!TQ3
zH)9H5&Wyv%&zf;=!sUzRC^(*}v_x8q;};oW>N~-PVjZ+)Vi*Pr*Z-n}NirF)C#{07
z9LB9vuLA3gcr=-=cLzre5bJ~C0CyKAHX;;~)RfhfUy&>$#wTY(S%cw(0Si_dpdw8w
zlWC&tKzSX+HfCWC)0CtmTSARPV?_227a8OvM~x6+p=yr@m8$=vI)^$ZK4-5?c1l;C
z#U_bMmNd3zYSRG4l}txWI~sD3a{xSGJ-|C4xzmBoF&1?C^P;jxt^C(o8s`xCknIrC
zES*J2tteA@v#dZBg*{GNxVoT4xmGEx42{h-lWQ^vQ%a_|x-exP*AmO}*{b#g(1Eg<
zLMWd$qcJyrDshr_0`}kzj}VFxG!kw>jgy59g>8Z3j$NBBTY@tmg)^ec#L0Y~ew=}n
z;h?7Zv*o7`M#5j%6zLSo6uh5|s^t|W6<ZZ>YWHg6s&VD|D!w)1YOE^z<uD7Wm1-3^
zisveLDi-BDWnmQ-We%zWfBdvQBOtYavOooqKT7%a2K!yZ#Be4!jUIF)HVBoWt^w?W
zl=YLVK5jod(?1D1qxdSy3%EpBrCBu^mG6_y1)%oRonEp5@-WBLrD^wmkz453G<!67
zC2X?o%x1ba6{%^dnw653N|h4l-5fQSr8y<tVx3y=0f<5)(p0)s5*Be&5IM&xt16qN
zu%(!CeB6&U3>7xTcm<uJ?!ES<SLwMu`oD8!9ZI)6yN}=SeHlMhKkeR1A0^;5AsgYz
zA=lxjuz82rog8=x7)RD`l|=M_f+EF6DMo3#!3piNyhV%RG2%$kR>Qjc<okBRcEd%K
zkd!2pGID2fSDDIk?IkoNJhD8pBa;)8g_BDe>{)!w%PhxP$63o++pUJ$9@=y*Wi4%H
zQVj>%C0bW4UG^c`Tw2ANYT9~@;?+6T6ic1eouw$H?ea<TmAOk6z`EO(v6k{yoVvpm
z$n}~QyB1#~3u7#c)}b2URZ@47Z-;NpCm$3-*eYTrfi{7kOOrD?w>tM$=2Z5TfbY;l
z>M5gz<}~v33hRCg+BnUiRgOy5yo3doMY~JTeRx!aOyD>}8b3o8-tgvV_klFv(MfOD
zYwj^8t1)ZfvTVKfisQ=aDr_Tff-R3GSBuqU1~@9RqjWec0GF4-WV2o6ry!ybV9|U`
z#%RKrpi#YC*IMje@oaRB#s9?boVU-v&&#>RvZZA(!P(b3+B&WPbjURb*%t99`!@ad
z`kn<T{Y~-10xTjxC_o4F{l&|Nq&HT8d)@4*Vf9idI=@{ALntn=I`FW+n#6MSBEFjB
z`8a(lVaf_IMA7eLX$H#Z$S4Zv2Tv6e7NQX<5bGGOi95@j#_m45A>y(v`X-txx|L<Y
ztiV-EFU|gwzk<P<ca5`ytwUg#!CY%%Q8PzV%2o!Si{WPthrMmj_Q&OY*j~;a+`czf
zI^(FGqi4a?z(YtWW;p{Y9e1jrY`FZd<QpO6pJkZQ6nALu6tS?L0|WyWq>Qs1v*9Zu
zx<3i!?<9Z9c_m&Xbg_Gq53v^09kvHkmB)9<BFJuLapz)Yx)Iy4@NsuD2PG!NI|)~i
z$R)K{oLL;1yNy?wg*1E(*+;c95~e_n*)+yiL1@v#wg{J;sA^L$|AcC=Fw-#aos9U)
zm0FogJ9#<L_;)>?Gy6L4`x12kbvLo4I8;W1o<Q@cyULoYf!E1%9d;iBf;LngvWmAY
zvgN1UqC(}RMp}(uH>H=HO@My?-@yLnA2#Q3YOsePzULdumwF1Cj9S~xMsJ}xc>EX<
zku~V+SZNskE7Thvhj?KQe|s}FlAFpa2ir}j&F9QdkGAM@br4f4(vH#)?GaYjnh>_t
zn=T)p#MT+pCaKpugIYw|i+Xw6y39()rY3m=RR5?xsJ^LkT+MAZ8!f-s&tBnqcRjIP
zEUxQxJ%93#^{lJ?P?K9UUo?A{dT)FdsEMdJeMx<{)2o)ZbGjS>n*;lVB13FhZeLg=
znB!Abj$5KVmp~jL>iNpKcBe<+Kv0Xx9^NB!6!knfeTLb7CPd&~bBp$_+J%}YawD)H
zV6+y_yvr2NQptSRG1lo&nBbpXI@|L4kXR=|%4Xx$@|3<;9kW_H4V+K1xSNj7Ny+i`
zV|d*#TrX_#J~o-!wnlQe?m!0Y&WU|T9rJYYOzGaW0qz>s579K*G%{<s4eZVUXS`oY
z^9m!K*`1j+?YcJYS6<!C-saDzc)6TYn-ATdx0v5ci@98Uo89+b4$ni+kK34=e$G^%
zQ{$bh?o?ORT?$<W4}zCMt0J3Wivl`d8!Oiv{?>i&`S-IM63>t!LDOFek8wyM5OEoC
z<Dm$l=efW5xw!TOoIg)LN=2qkrzvx>z6!s_Yp^gG{azN&m#1daXA9Eq(vo`Ze2PEM
z`p$7`*M|p&346voSef-7)ZZ`r-8b9`u8X#j6b^id{i(k#U+W)LW=h|aaFUX~!NJn+
zKTKHZ*Z;+v#3qu;av&gH6d)kKgFrxDzyH;zARw+xARuRkARyf7ARt%{i3UUBAU~w+
zr9_2PJ=QLAT+{JKZtJ#lGY(D67jopO%u~&@8qCbYGjK#=_kWX|{4zI}p&UzuNVR2_
z!DJ<n8gb`7Dh{}g)7#AHlh6M3@Ok7*$QSYKX5m#)S!wgH3~jW#Y+B^FVkVLsVM9{>
zPrmJgk=r)yJ1uQ(+2}B%PLtFBPd-Kxf{{y9jQ>yWws+IhNtu}cPYBTdCrL>JXkf?#
z=)n>Hl`(%pF;;L)aKodF^z;t}6Ul!oThr{Oljr0P=Nn3&8(nxHTQW4XwGu6E?Y__q
z8?<viVv@ATbM5pYgJWv&z~4kQ>)(UE_x$<P>K7dCX+(^I8n+(ZWuZF)$57CwSz$4a
z7L7gXOg?`@WXGF#Z}Gm_2a?d?II<vUsCfedrjLQ=%ils!(gQQn>8~3<W7m?nyw_C4
z|4@5;a1$FLIW?M`E?2E;iClSdI@;Gj$Z_VNp(XiqVnzkloLgoh{-zs;CQ(#d1jx$D
zeq}^#GrUu;{0d7uCLE}P1#Al5d)5^r93SC17@Epb**|WtkW2k8DFREh6|q{K90-Zh
z)HDJTa7NxkneN`cf5VAV8M#ACyVvf1KKGWO;$gCJr(jQYK3Lml$4kBokp3buI&roA
zu!hMRfK1}qqZ=-U<Mk7)H@2ZOy<CR#a8LnDLM?F?((gF^Hy|H8a>?Yo_ph4WMtD{<
zFb9XGKkB@{jWTuCusNNX8tC#GSXch5b&ZrFF-%ZRDlXy`qhMqN3HL(i?)kvd)o{Ei
zojjHB;!P*tOMLxmm8NOH(f!`jDK#dodSzgrpyAH*>&+WGc@#pYnm93XXz23!P;JoS
zQQuFz7oVTP>Wb(v0EE1eAj(ch%k`H-Uk9aB?o<hX7b;+3BQ~E86GA<zuL{|$Dgv^m
z9S1rWaw2kQ?D9Ua7H>2XB5N~H(bvNjCrb>rY5W{mYE4YDa-n{(KMSu1+`ldGHwcTB
zck}ze?0xZJ%&bF2!HJ!`Q9gcF(mNI(1vQ03%t8(S1ru=fy!TlCLkcHfvwDRN7Tm1#
z&BsFxEI68MP^@e`Rt!=^-SJno<S24l-|qsl^cAiC_$o`lW}o1Id8^yF$n*QH*C)0x
zw~##e;h&6R^nU|vgsxT6P>|6b2FInS8NF!^Jb$eB*)*q%6!zPu+cPdyRGa*-Nm1Yh
zM`07MD9*DxJ-()9MaMw=em-3qt`=~hYk;qU-AOTP)BJLbzY9gQz5T?_BNEZ@<?4j3
zxPive(+pRTE;2CZU8^VMNL$#QhyPfT3_Y?yv09|&tBWD4=5Tg4R?;~u|Fsl>k1A#V
z9ngjw^=keq?Z(k+;-p&d`>8Js70m2-CPwZ}%&{6Pk>V60yn3~XZ+B0|G;;tQ3O`OV
zuvb*y6P*Lmd~)lHvtw(jqsFQalybAD98;1f2g=PpZ7#fl%4gJx&(#{hGTc5}{DE1O
zpKOVH*{s?uOQkN^^84q*d4es=g9?kFemO5hQgT7x;+p}dtW`zwZTtr2AX$DbhAi)o
zpjej{H3Sn##O`9TR2Y%aQ-y83AaiTS<Zhv026x6@djGWq;E_|7GC6Lb54?Lt$Tt@l
zlPp{nAKVcB#qGup6%}>ne)Zj}Ki8LjzAj;-rqY8gR?x?tMT7uGH~gF7A}=3)b1G;V
z{GPlv9QONBL$n~!_3IgKN1A&kMYrz?F{zoc5fNk0qAhDyTwMuq7V3uc?0auVNjU0L
zBaB_+v9Xr+FZ+!jbk<aie2=^`+;4XW4vjcV&cEGrebZLYpJz_yPn*ac$EUwW=WERQ
zeI7lxG}Qzf*ZZJljvMgok2%wj%=agH??(7YviT@OOrYHAyB9<>ePA{CKfFtt=nrn6
zH3}ri3)C+66rQgN_8x6+re7n)!~$*n-z@w*Tf*24Y7c^1kLud1AbOECg<0Dl{#Ld<
zf8Da7GaR?ZO$ZVBGZb~bYc};_R_#Xjz7hJluUks@d?g=my(I?G>-+E%r5>D4eBAuF
zvzyz-k&0KWLZH*>it<_<9)+vfEr1K%Ik7EP!y>0ZBqdvyzx=AM$`D98?%|h|NsA<h
zQI^P_rsv!qeH6J!Cek0#sr4OR&O)3umc*9+1ss+?PRKJD>Khe2;}4A{+mM*m$h(=>
zP~RO-pQ=QX@%bEr>S}6Ag!5w$>Xp4b*je-BeO*hl6_|^**ObBoPzt<n#+c%-Ps#Yd
z#XD52J9_iAT>?FBb4GsEDv(zwu%~Pd9uN&)Yv6DJKqSU#sp)9MmR+6S4_KH4(pp+#
z=Owgd>od}Q3`Pcp?swU{x~rq6+#<e?w<jw7J5mL<)TSmK?2Wgxak^4xr?yO(H*T^z
z+wI$u;_^Hb6_(gpb}GDIXVc*`@oW?iaMkHFhk4E`aa{MW+f3U24%eFB9!cEeaFU?u
zc%VDAKt}2mzRcz*I7y6H=lXl|(PB=S_t~Z0Z{!dX<~8GSc~T4b@4%KISRFTdst*j<
z28Xs;Znq}48hi(n%@GrN-LiyMsL`cAQyBQaG1q))>6*JB6QYU9yei?hZuebJ2~3PQ
zRGBV!RA1y;n{8$<CWjq41LZWF-D*PI*n?HY^7D3*B{glO-G#{Y?)No<{L|<p<)FAc
zCSta6rG<S^69BW;(7_;+Agg*~6%cth19Qr6^1Wf+(_@9!$J+c^z3J{-F@L^QEb4YA
zH8NTkhr|RvA?8_u)awo58Up%*E<|QG7j`JriGogTmMhJ%>`|>o!3akQRQ49C(g-?O
zE8);cWD^v#sy$K523g}j-obPIop4EVNw?naODD9G1>X|D@GqR1Uqj#9oK&f+^?7{v
z@cR#${<9OJR}Kxd=y`K#s|VEB820TJ8qcYqo+hQ(i~rjZ{o*-6-0`H2w}uQD@#KRq
zgjzbGPaV;?A1Up(Jk#A<?2Mj-kRpyZrs((Yt!!RG`8us{En@c8PE|7anIQ8@NKzaQ
zLz)*YTabUYP8>IbaZe)HwLM@ysR0tpPXXmhvUw~aL^%TJ<wFA<5LsG^+rKF#Sd1MZ
zQ?+>Fh4-+zJc(ChyP?%a1P6>y^UK;I&0A$BR$w;RjM(JMlUnvfY<aqJfZl(Ri^$=7
zq0C-P?YS(tBQ9w!^x6^=hY@+TS%RP_?j|`OZT0!X3O8RjoVF?2s!&65M_Eu3gIi7T
z{5@`5B9V7ol3ZpLUQRt%SAvm%OiaQ9Fs);f9ibKF#AA|W*uPEdNfy-<bvMHuDVcW%
ztYooK5$i86R_bHqVxU$Xe+7|Abk-e2?>5{fVW$vEr!<DJ%eXg|mSsPw;|&-CSCvN7
z?qMx00ZgB}Jng^cA?*A_9XsPlU(2khi@R3ERb_GVrgLNdv|GiiE))gU*VmJ`{iXRZ
zCt<{w-@nVMA*LJ%*uBkybuhkD_(kz=rD-(**c0R1_V!Lay7Z42_4@;d#@nwdWWwX3
zxXj#RO_$VJnP2^|J3`q>11_@Bot@v}Q}Cnou(2~E4LE1m_~I?g%Pp}jy=X7(Va8@)
zu2Mx3^SjG~TAt+NAsQBAH*v(B#R-cfN_GKofJqSW22!XkVqU_o&>x^|i%9m2+I7Nv
z5$kpk!X76NfW1c<!;_Q#_)w#h09_oEDm_zdYI&#zg`wk=dTn@Q&>*IouOXtB%@m+y
zY}1T#N2&q;hmJY^jd6nartIhnz8gLw4`LWt)?8(JQ-Lvcx#`Gi{DvL+<!b*G12h60
z8QnsF;yQJ$b^rN23AvXu7d%;daV?Y?6e?uqiPR1|a(^I20R5Uhc{T?v!|LSjr-bEY
z{K;x3J#s}}O^LWR0uG5OJ_nQ$N<BO_e>8kr3af)x`0*8gnx7O2cJ;gGRa)GAso7y!
zBE-CSX8MOoS*EzIEL+gqp>sc1(%6)2k-t9T{B&mD&X=cXa9Dv=sW=6O7WNT|A0_2B
zm{k3oQcoC#K_?7`z0Z=Sc-(bdhchJ6r6q~)D9!^CqtRDjdl%2oFacSdsbD1~TdkHf
z1uVv47rK<A5=i0Ts4p!TAJ4Mn;DDrd+jum&M-mA$7GBy!v2}QSakQ*u`eP9tyxlOY
z`T}(de#V49(bNl(eN7h*)#jUf)xU<{ndn$R5o#GjcSYV3@arQIea}6-t$qb9Sf^ey
z{MjNHXfndV_QD}%0`MVk3L;T9OGEEt>u|EoX7c9ZDO+nYIiS!!1NN4^kGw^e>$$`3
zU&c*>WVk>#ulx6(QJ84BD{!a&SgC0GSwiw?&>xAF=G{{rpsp<rUx9@={)yX<?$4<D
z$vxWf8g)9KDu1~}kIzskGRB)#4i;vJhd!K&@Sfi3OfzX!pn9b_{^b>M(KrVaRaf-N
zXPFSx{*mc~PUn-<F0*wwl#Ku76GNcI2?8eP6ra8nrg|>@q!q?uw?=NPx1&yQ05936
z(i7F~g{Yw)KhV+~MZ>F$Sr%sOML|jV&D2q2Qcs=jK7|g@8##s(B@RP8i$ezOHQ=lM
zHexvZ7h>c<3qE^0dLu}4P92tG@T=xw(b#}5qa&0!k7;Kv(AoRHAeN*snr>%uX57!=
znXda!q_}TOSuKyyW#98>2`t}m&$XR%`XB6`vy@l7(h~XKvC#@BGWlGtNNf*XZ0m=R
z!UHrwo$M$kKE_F<we9|x!5<%WGMXwjMaD7f#<#|{w%YH$HbYr??f+EWRFDXhwveEj
zy4`O(E-=^s828!ox`6q>rj`<EKaL%5H#g>8tn30bweH`(%%bF<dvNnuUfvYpNWAP!
zJ2W<RfJvp+Yoq=;Udn27tixz_hfos%&L4g~og^NSxlNdTh^xOmR37^9U#oCTvCgmy
z3?dxVZwriOn2?p#_(m*i^o;vP0s4mXU21m<DjELxr^lRlU*~UpG8=T?px#p`>cPnJ
zU5gX;xS=OJbvL!T&Ka}qDc}xQ3uI1|Y)_euy)(`U-17P)N=tY{*%1W3pjh0U_^R>V
zezEv{y};557cb@wE97<Knw<J<X(<O^H4)>WME9In*JLFILtJ{>$8j(-bK!hTJti;o
zCUjC{W@f@`rOJ(Eq<>UPMlhXNRunXK1YPYBh6Wrok$JN7+9RdLTQ=OOIJ!0|>uU*#
zgb~sF%u4VDTGdwPpID-GkOtUNP%`I42P<+{M$uH+i=m+kFC!N?JxIYHpIZ<e)baq^
zcb6)Exm%J?KI&hfI6a(Z{odFW*RU;nq`>E23MtTv7>gFIbSPXU3zw3npqUE*?(UCn
zk+FHOgL7x{rIL8kXu2ZFO^#6Wto=sG5S4dEk31@=xPV6JQJiZWu&k{roh&5_4yaj`
zB1#rZF4+C<S+@x3J8hU%()rszr%o<5zyu)IftD)A84T5$!ING!m<>cc`6+64I7hW6
zou)H{LOQRjG?h@n0gt0PCgi1#X;l!|QbQ>XS9z+aOHNUmfVwoc3shrsJq?x!-B;~e
z;PeWY9HV4k6N0vnl!<k&QjtgyWUV6qBW~2hF+Xz#0mIfSEW9n7C`?zzzsOq!96Z?m
zM78Apm-}x6xf19#tLGv@cpv&m!{f<=3-<5dW<sJDt%Wf2%lW(fz=n+bjk&(o1rwNh
z&53oYHO<PY7>X)ix(ScIPDygNcMsOyul9GNph!OS+2nxNDxKSVW<!x;D8%rpwV{fp
zrZ8-INO_2$FqM;YNwVhP1Lc{B4ONECH2H70Z|v|Sb((h6!ocIjglg$payGEVbBRx=
zG+zWkel54q*zIG9MWKI@9=&oLw2z-pe=t4}nOa?Dhbu;q#=BRb?p*>Jr&3Rd+mBvk
z*jyz(B%tC9TUb~LRP5>_GXUixZKpUe<ccl+Fn7-ylr4{_*ZRK>fQl*2Syr|Os^e&6
z|10auukXi=mp2r`jH*DUmot-4{`+Tk*Q*Fi-}a)A4PIL}zfUL<@RH9=OGw3+N`Jm|
z_u2}=(U`}pRbp9<w_Bzk57Mu;^!+*WIc)tWZI6hXF!*<guTI~P;Qjl|N9h+Ln@_hN
z^~_Dqg8kz5y@t`rOSk?<she%>bq=xMKLlm|zi3LZXfG?n-jgjYu%U=)f&$`S9QI9?
zF2nWDqZO~{8m*Xu^_If5Y8(>r1}+Z{{sT#1#h_>Pf=B;d_CgtG@bv6EASar_{^!<r
zsL9;yYyi&xU>fGvT1Q!2T-^AHR_6Z$Y?8h~gDWb`|K(Bt!)qY^-U3}F8Xo>%Fvx0x
z9shsW&i`rm->&{YyyyQ<ZT~ahKLuaE*O^g3wGt8rVTf{%8o$4XevY#!D|QGc#$!N;
zy%`PCo8p`TKrvV%=}3C6ul>^1Nyb_HuNOne$;Q7;q)EUVY~Sv_A5NgpB9Kw%dZluO
z6ThAxF7x8AX@I(;)RECIKSYU5A;h>&x7}BAh}NdEpI*O?VOCP-`P1UR;4WgJCycg%
z!`~XeD21T`3RsKmt^jM)254y2gb%ibg}Ie-(l162Dq&%D9%@GVea+6uc#PoMq`!qg
zbbK3;Z>ml;Nyw`s%C(M<nR9Jn=!F(-*zwq14tX_45}dXyTq~E#Z`5Lp0R<O5Rzl#*
zdMHFpiwOpPxz&Fhocb3PrO)PdNqrB28tO;hU8BDwUjm!<d6tt6H@^bZq+HI)H>Bs=
zCcy%yCzCt@_Gn}v^0)s(88Re6OiYvaBO1PScTwy>(ITK?FE4W;<abME5k4Jt$%!Qn
zg+#1lS$=roUrg28+S3uVi=Y`x2g^S|hY$A{AuXZQL;sD{e@dy~5%A|E5l!5<Dle}@
zeC5q4k;I3{n^>Vh{f(V{R5+XIU1m-&Gj->>?)gA9u&sgfSZokI?~mbq9~iN9xFM7I
zhT7sVgW0VyKK&50tpJe0A+4wSPZ@mOLFU=fk5tNhi<U}{CQdCOZJT`6;6CVs2|){4
z%$oDR-QmSrQEiI|r?PSQ-w?t*|1(Y))J!WsTZ8V@1eHbONKrxfwYoD5<4{&Ai?;}h
zy_T>Iotc6s?VW%9{!iM#)U)cY&k5yNDHayW@AzCv*NNA8x|XIUrFsj5>+bG|7XNx)
z3>@p{+MU|#OVLYTMv{UT9U5wyq5_ro+NIv!b^cNPrS4Zu1FTjuh|6kZ7V9B-{*2aG
z*t`z~Zc0=NJgl29Dx&+5(ys}|?-xu5AKox6+Q{2axI#+MpjZ=$RfE+4Qd(+fo^gG@
zphfnd-|W{c!aEMsCJI{P0wp4e(V`Tr+xmTPh3d&$ZhFcmKMkhy3^qkeKl18%8o-;w
zH102m^!GN+c*@*lB)|7gitd8C<tlKcW&Q25HsX$3><&)K#>bMawVG_f>e1}?H>wl?
zY7$Cb_T@IX9Y(~#fph>iy%CV$LSh`q%#xflEotRx=ir(mFiGVZAPW;4!Xh#sN$LLG
zJR2Ku=iu2>O3AB>RZnC-h{S-PqgilS(Ur{OJC_0%s0hQx+!pQhp`Y;CcAwxE@V%`(
z+Oy^+{`mq?GYvMQ6bJQh1!_UVtBGBINs2>*sV#!-T1X8*x9Cx$5|hxdG*sn>3%<{S
zHNX+M(kR5R%&=qh5+(<nFl$GWlF4AAlOT8dE$dK@<cX*?@63g4(DM{fOLoLo1Qbg4
z+u)se2|`Ay31PyHN(<J*BdD=<)Vg%hgdQ2M9J({jLG!x$-dgAKFh%0DijnS0EMp|w
zUyDo31K{`n^vtm>Bo(nXL_2>3#Oz$hD<<n>%FfTg!?eG@;bxjUO6MQ{vBANHCMnVk
z92QDIsR(t_6&KPfq#g|os5lQe?8?_a%Y-D&@60TLxS|3zvMR8`P7DTo_?0fI1r$D{
zQ|!Nd%HR9&IiFHI+dC0ny96M!@Np=L&4X?)yCUdu1|n)HDzL>XoVZ}<rO8{))4ZWC
z7|il<#GOkCUQ<Y2Ek2>;?YB+QMg|&LmQ|qWqGDQBM51)H)L3DM%EtZ67@iO6t?U14
z(#@4)wpIozq+Xcqt!l8)%Yy2`eO-BMLtVr>MG_<?{2DVq<^HGRgKBt^Y2kylNt}G%
zg=Tg|C20Gy#fY7`U>8*@>xu;?1(OvV3O*}j%a7x`K@c#J`~Br0nVwDG@&X%Th(qtS
zo{KBv925=yiE!F(+w}VQyBnXHjyC^i(Lx!}zz(!{DMe#(MsI8IT07*r&$}_-<@XT5
z!lOQC{mQK2a{*X5-qxW&IvQdcYGsF<Z;p4L%%1a4f=^K%DjHbfWu+g*X<v}0{+WKD
z+A`|5%b#Q!p5ElB)-#lT>%V580Vx|M$K()|a^k6?j<!#uV)Z{Y=}1q?Myb2sbTwR0
z<WraeO(<s4oNId)*bzjO<X<ipzWAI7SpfuctjO34_$#4+M<S1_Dn&NA%M9R`+SE*~
z-(w}!A0q0+0z6a{E+ce$9T^=<#MzuMEoJ0^7|uA7jTxcJ<MA|uqh<)&m$NKx<@dux
zY)X}ScUGHLj->3oV3B7hz&k8vYCCo+%90&%oI+KxP0vn9tAN>5;v~L3tQkN+Ag}9|
z!(l>uYAMisF7%OV>C9~TV+fx`TkCF*r>oP0NZc8cE5ayTAD3(lcBIAUuZqKjS%0A(
zK)hs*vpUF(wPhYte{7<3`>1izJH7!j9_>;vRqcr}YaFiD@9&=7yJEx0EEPVvmdWvj
zyXS5a#Dqat)RSXKrkxlY&xh^ji3#RadHzEmVJy1CPX25d3Qd7!Vsx=R6r;ai`e2tT
zDcuh;XTW9Y1bs6r8!cwLAJMg63#Pvhht;m1n}a40(E)o_Eo5PY+V=ZKWlO&<X6nZD
ztyp5We0w^r5jGq*SE}s~<a$&5Yn1ye3PwnEdu9!F#N@UA#5$b&PJ}!KBReWhS$<@p
zV!IP!BP;;&NosISd2l3;zLbkDs0v$X_XvZoI?~j#WBAT}>o6tmxUr@!;m^m{;9BNN
zdqZN~4?oPWT|0BS^-xZdG`|R=(Oj=ozc=n_->&RMyto9ecBCAhmb%@1>9(dQ4FOI0
z{s6vYwpXdKONpwYOf7%EB+g@cbBQ2f`(C;MdTue=t;6!xUent|Fi9;f(~;1phtewI
z*s9%DM*l%9gPOxK#%RCK#Ck95SMx1YH&vpe>f=<ByY~bX?Xk{Y-<;=OZRvo_(Y|c(
ziwAgRlCc*=`rX?!0khq`#|7=ZvFT_L8+w!NACgm5$LGxy<mTpRC7cbmSNLvj6f8{i
z(MzASp4a&)%ruuiUtgVFA7jcrt2#1kEB%^CbjLtD_CKX&sK!b0d>9k2J_K?`<(hEE
zH-qN}b&j`$J}~76<PyZL=M}+)9;+|?cwN72nD3X-jbtV$skTB&%cCa^Y7Je+2)BIg
zz^05m|AehF0RjqNR=W*R!lKnvyFUo8>DFRW<K^X*e?@{L44r%2B3(0kPjYMTiO+7U
zk8FrVokrt`YNrPuTpR8WOlzv4jo<JGQq=YiRp!x~0%tjt@88jE94y8!7+2Rlf;scF
z1Wj~*dX_7VcEpm<QWFeK_+0yLz1ZUDAaN#gv*lS9$86F@hT~@`Xu42@9I^zBnC<^b
zIdtfn7&o9Z+kJyIem_XWEUCYX!ohEPDmAEzIpTx!bk!pJ3^U)crr!aYK}E<)k_>j{
zE$8|q;mBwxnva<~s<WwUmHLb*>wCCC!g2bFG!q6)qYVeomQ!~SrZ4cyRps3Oa9P51
zKA2(Py#-<?ALQTmY3uu*67XyFL~JgSMB`=#7O#gx9e8;FAzKI@lQIdS<Sq@TOVn&_
zqfG^+sbhGK?;h|PGoBCKGIMSZEQX1_VLgveIX(Pul@UEnaN@IqRZaj|oFqjvgL@kK
zdy65ouhwHERqb4+5&)*_S1gau@f4r#;)tpMuEBP6a;XxxcV&IQM=*Y!`VbL0lxUpv
z-@$QvG3z&v1i;_eoHqQPF<9={@MDTvpJRl&z{ZGVZcWa65&gFtICX*wN)89=F@}g#
zKDd|9^E~F~@#+N{=7Z;m^T&<u9JBy(&tDBT0<JBZZ_hG<Y-;s}v!J+Skcl`XBshN3
z9CRj1o>aMDA*y3?Rle6ITiK1-WIarG@5MXu;Ccw19-pVJFP5v)f2(}46LCU>;~JOS
zd>N+wpAaOFuKsLXl9w7l#;mu_64KV66}P?^YB7_1I!nd@3MIKEI2eyYjs=XrhA&^{
zhi4eY&ko5YsbN(wbcgS!{YJ6QIrpWq1pRGj@_d@YwKXugoYdVIzk_SfRIpL>#<FUA
z$2;?C4UZELS;C&kq(P;u;ZDvz4t<)tz#T?NFsruYcenJ=Ip3tN*5fq2>m1A=itnlO
zd~OJ9eOsa@-_NCRIO2ba5z~yk?6tRgd`1=HS5y^OP(*fpu(6orun}lYNA>!rO)uN!
zOS{glp$==Iu~O@F2X2}{Ok}plyFzdS#fzOCzeae!pN{EP)q-i=(KC!tuLcf34j(go
zT6XZHJB4wWh;dxMN&TMRN_~19;n+oI1vr1$xPL>Mx>(Li@ILqBAJuHgM6t(^Xpz{y
zKiF+)ImI^sd1$Os#{N!H&aKI~e`lpRgEFK>%0oWuFXg#rr82!YHXq3KW~=@PT^QIn
z);BB1{;P1+o3$?9=K0*bivI2kSkO>X)C?1N;h0s{o5=k;rC;j_Du$wJn?7`XOl0&x
z!FjXOjK#$E7x*;C;4Ch8G#ln%EUZaE<l_fjr|9kocHPqw^yR({B-p>4$m@(BfNZv?
zR#uMBY`H&+mLA@8!|QF^gP$8H2*Tv>y`{OHDz`YBCfq5t7-70ToL;Fu#b5uzAo86b
zP1d<S+>&WneH(^Hgp2sc2|5_sgw@yvz`5%)1*mF}dAnmMog)~1c+O+z=KWoXs@Y%r
zkx-TW$_|A96E(B?b*Q0=Cf&9eX#^g~7D4h8&rO5m2ZmU&tyW!vu{)Ku1?_vQ!%(=S
zV5*Mh?JnY6O=m)931yx2EY?MZQbLnC;$@8})YG(A5SBZwuFF0BhUeEW)G9qdB!~Lc
zirAA}tK)Jqb}D`LNG>js^3414??I**hbQ$ym|yDZ!<_dViVL%mXV=EtM-FwA;woK^
zkOr+(F3)k-N7>2pJwE;z2*HId*GEaMQ8=$Vn;&-#bW2_LIOllUTy5rDw11V`_v@kB
z+;wsFrHYC>5(9y1nk*yEV=sQ>h<sV=4A>IdWm$_3zN1s=PP|{^>)0#paqaid$_70t
z?wA0le&F+66r4Ef)r{jaOGd-*K-ir7+TMWeEiR1dF9*%8MwHbv^Z8{NEd$IEJ%Qd#
zl=_?r-&?e^Q2oF2y&bV--7@K&J@~zU9_BcL_Ov5t?R#^!w^&jmW6m{o=0fX6Pq@j0
z`@aIMak<q#?AUEzd{`kyDsDjDIjcnBqKdl<g9g7$UQWqcUH%a#9sB|5b*fllJ-WcR
zOm%R@W?w#@H~?}9#{JPqbGGMm4zJrPII1v$SCfIT(ueKaj@lMO%ux%^^<KXVn&#t}
zta_?zz9c<eR%i4l!Rp5QeiRO}y~uL(mBBK>)*ug~L-F;cyYum&Vo!GK?*U4JW<N$E
zzovlTsOz29IN9TsDx{T-KShN6eFKkBiYPB@e^)xngGaMP5q)m?#}{o0UruwfaW+Rk
zkd|k{g=ddaCN|02Zbvj&+ZEskpt;*YE5<uU@%bb21f1cLNGm-3pGf+=5@!?Y^6T#w
z(=s+w$Ag}?fZZ0F8J|z37d7{Wi##vp{$TkHzC%Br?6<_}XS@udFkI=ey~y&qnUS`G
zZC*e3H43Ue1I6AmEos*$I$hinJ;x?_ea06>lO2jsW_=xiGc#2v(S)o4U!V8C&I4)F
zw*-=x5?wz|Cl^KKIx-D5ToKx<WnT6ta>_PmxqqCnrKYLqt_4FHzLe859vS8!t_kV;
z_6GMaZw)fm<ciBDi}KJ<_+O$`K<N&u^mgRFh|p$qzEN-4=OiiqF+bw_W{Fx5;&r~R
z-e4+0!u*+jdtp=M9=&UUv;mw9%JRHCWc*bjJpV=U;WzBoFx4I_;n17j776iTc4gET
z8XPQgWq4gUt)+=Nlrk@YO2Y1F=#9gl?{Ql?Q5&;!1a-YT=hL6~oT_-uaF~MxJKDMD
zMcDnMduKwCxqGdh$qX`7o{x#e<iAMhBWX!sMrZJWFjXbXEv<ex!Pq<Ox^?(**V1@n
z|Caf@oVvSQ`Fb%KQkGP+@7~*mYPE=ud12KD-9wF+DKDDmq|3w+)}(aoGQJuVuIvM7
zQf+kZR~r6$A*mr+nF`BeC|yOOhp>6sIVTO(_eK)v_WT94?U^<?$ubgz*Fb7XvpV{I
z|2%tr*7-W5w@>5uEZ1_f8XbLYxc;<>&()Lx!IL9PNGNBg1ocUkJ86QXH*NR|O~gPA
zx;iqap>OP_!+^Bmi^mx|Nlwm}*EsS><}|vx;nk0gS}oqn`UkqK`h?tW)Wh%Vrdl?J
zXZXGGDF8le%R6q-S>USsnxVu@d`8y~q;@g3*HwV1s}+BFb@}$*+n(}YMEvMS1UsYE
zoz!YhXt)!S<~V-{R<_ENrGQwb>%82(;bTr`vz;lE(wdraeM#!|_mJ1?+$>t&W!4OT
zchVg(-uJfoV=ojA8=Yzv5Ez4k?)Uj)y2|SK!^Yu|N&~6X>rvL+zMR7UEhL+jG-6{c
z&E>vHNR(zc0;S;FYXp2ojlgP#t)wz+B?*AIjEHUt8J_8DTP3^O(pi#_nmrotQfru5
zoe6e$If_ZkVKY5QtYf?49i~Tt)0I-CuO_&6aG%cqGp$Diip6scd-%XKi4adp$A+hZ
z72ZaRt9n$k$|>7_{7_ap!s2DfVs85=zoQ<Z$Q?965jy6^sj3V{L7PS7UOD2XJeczN
z@UIS|k%uuajtax^#tUkT9ktPNENDj|YlJ&sb`?cB&7YBH$=>WV)s6D|1T^${()1>y
z2wT9B$*CjY&#!Pf84`Y$;K2g`>U3KqTp?1Ovp_ypLkC?V^L_(#EBL@uC~Pc>368pU
z-&U%%TeB863wQ3*UlY}(RF!$A-?vUPtA~bnk7<tP>MSBtS)(`U)D<?FiWqQD@yNPo
zLPrjkW_NK6hMM+}L8Z~V(fwf1HX7*wV6p6!r18mX5;iKK&|`h7Jv)=CB4mt_>LSY1
z;!<6$RMB)9{DTSmzqdFy*;CIa!DTcS$0SeuQjLqmpsv{J-}OS0*FeSE_QTm%MwP<x
z#=){!Y%uc%Q%{5UqH-;+Zli>^ApXaYs=^F_pvs6qX)~UelnWnLuaDpgql5qJG`CQN
zY<+5|b4z%}Lm@2UyMW12czDdj!v4de7P-@0u$NUF<??nWUlaP)8o<srM`1dEhL-Wm
zj@0usLNvwBTuBX{tPz6!QJ&O}y=u!Kyi|jso`D=vmQYU92JaCOYxh#GsikEv?ccdK
z5(-y({grtnZ3Rt5xi}$9w5kI{@g>Fu&4l@!A#K4b*MnR{X=6Q(gC=<F0FX^Q_IRyd
z-|d16vZ=ANF671!h!bC7=<ZccZ#|HeGJL~d9&FWr$fp%pBdmVa?EEVCk42Ip+k1QL
zV#J+{p)tFg7Ct3=98FU+Dy2ZW@e@sx4EiI9u0GrSKl4e(a78Q$=LCLNQx7erlcP~*
z+So8KYc13f|H90vJjJEt$Rzo)xC-t}=1DQjl`CzK$n<H6fu*tV7J$1FGQ9hj0Dbu#
zCMME!<G~94uRIn1K<o@?Y(xbPIl_fR-V61b&YGg0(TeoAl?0blj&6%FGh#yrQzYKi
zudu2GQApYLWEV1>U%Ka%?6m^BP|x!RT%)NoySf{#A>9}`_;gE>@}m?DZUi!Ti8u-6
z%6eGRZPm$Yok+@Eo#5^p9t?TOa@yiVC9(t(gSW-ohS(eN6c@KJqGDo+iL+tQQE>x$
z5R$$nj+3ikQj;e@E-ZP90svlE_Y6-RoerI5^+*~OMC4GY9LjHD%iz2>vPl5NAhU-c
z=4_Y-b1!LTf-kxCd5-8xT>X*Y54|lx7Me)#Av{e@^r0B{96534pG6FL!{Eia1S#bk
zZp&JKC@GjO0%^Ha7>e?nQa^cQB5<8K(sF0xnl5~%viNgn_Ac><0_AQSF2`}Y+=(;8
z{5@Is(W;@z=|~uaKPc!{^%Vfxq={!DmarJE>nkcXsA!e5j!hX;>6VZPQxrlPubpI1
zPac%HT+lj)^03@}I_+t|rCC{p`n|_cr=^%QXL~=&u}><;+ZXCHMEs-C;g~8b88g$j
z+a8{QJHBFU@oCfw3f|m@7ii%<R>^Rfkw~I3%#l}4gW=H^&0z!P6hN!IhzcK6>t(@k
zik!Iz)g=8c_L;o;l?@^w8yUJfYR_(+%X*xWsv>H*1e)9z%iz+U;yF-e^rGVEe#krB
zYyZ_$hs5aLpDRES%gYncFu39lLWgq>%nNs?%bfW!c{#JekR&df6UDniVaLIe#8m7k
zm8Fg%n2M65_&f=DW4g=9>KEaG`ZSGsDHxll5XY<H{jqUL(;b{5oH;6lq2q$98==1`
z3A*0$2Fl9H8O~Fpd+0a>Oz;suEM!gh;%yUw+$&wL)XKuR1r2z4BT_2s>Ks^}5i(4c
z<+jC(SL6<&4E25l-pSG?TC4=SDDc=zaewwdX{GYj>fCgAOc=QHV8B>USxrf?;$#ah
zZ;X7DXiNt~kW&)nly%wM3O;3uC<H8Hr5KmN3826rsTx*^piZ!b13PeIwL~J6OaW>l
z%C>FfLE?PKsEJ}sj6YyjD}Emb7c(lV`Ak7478WLe$U$j&(0rS-vn~@As?6WAx$cF_
zocc8;V89T>vk^!o%1?AHt2LF8@ZP~?EE{A@+vw;<XF9W{#Wol=hN2Nr1XKj>k#obt
zu5Fm^6*o9y!F7e*c6^R<CE?%}uyC@)29U`2L07><<!*qoVN5d3un8a!)s20o*LzYu
zei?VnHDIUW#>^~Uv8w|m$vHbC)okJt*3>4$@23qHb0L3r6*nD6lfx2BLLcB^gM*Vu
zbtmdUK<6PDn1Y^?O!axSkdQ<P62{uXjEXJ+{;0H+S_zVVI$LXYw&!-$D2wYdMc8@s
zlp&|E9mWz*oJ-8F)2y`wJb~gY)+TaU^5PV5he4BZ3<nleK#P%3$`<xaO5~ktI7OK;
z=S_JAr8uFrKOR|aN*P0fJM*$NuLEa3<t{W^Gl7XeItF%xz$CADlEa9QyPl4yy6X5d
z%8w1kxxhqFLPJSts0r9@b(=HA-fimE*(;>^qWM*Ri0ssfp%HoVmX+>aRv7{B%&_?p
zq@;~5X6S4a2`!_^$y!tEomaKh(U<lC)~X9HQY}Bj1#NEkNd-zX6yWfj%ENE~Q|KMB
z>Plae<`r)bBzTOAJRCQ(XTEHn>`hY)@aKjfeRZc~uO~$!s_<5al8ya0aBrmRI|X^~
zp8JbjT@5sexAQf}g$c9NWhbDPRYmF=;Z5tz(SkKmDv7h~7-|~OuHt9}gfpjT_n6T;
ze`s9KBjZ8aArf~>+iSv$qt0&H)c%yAM9apK{wycDOGH3VRo~NB65eVS2%O@x)c%*B
zRh1g`1|MmhvU-5hFyv^Xh$+kNY;8Iy2@5lKP_K98#w`>4(ObN21{lXkb3G#HrY4-(
zl&9c}>R<rmBoeFJOv}_M3X6bsAy+1s8hWCogR_jz*akJ*p#|8%<di69>*5wV5H@La
zL)WwMbiNrgRD=rsm|X=yFfd2q1(hE1SU+ai;pHUeRRv3n>S6pX(QEQQ$XEZ7gLmh>
zzgGk~!7*u0Oe69q=X{8d?`9Yok0&*bZin463RJERBv4o?N>k-%Q|rfS$s)jqqpyPW
z&YETS?o9?u6O0mO0{10qYKymU#iQXn3`81MoTMQATC<jp)E@>VZ8u?h+~`7)h<@)L
zSr&)Ablqyk7+&??*31fF=b&G`g|?eve((!KycS8yod6dMbjNfUefrls0dH}gxi%#w
zd&+$?YE8Yjp|;rZOqR&?=jux8x>Dn*!Yqtl;flO30IYiE8v9$ZVD8&;f)_r&4ZFiC
zt-09gA`%+U=xI682Wto7Ua66pW;9gCP8VJP7)?5W7KcAJ<<eqypy)@AeBR(7xs4+}
z_?HCB$ASjoL1oBcz%_ZCg=`@_IrGo@90y#J(eUPg-kicon^%Adi9Uck&J}s~-#PJg
z5Mh>dC_B>^JP8R{M+uajW^D@`%+QTuy&V`)HJ4zP0dV^t7da(zPF;ZjQ@C2%Fu4Mk
zAHW9e(=br*J|P|e?ZFY&aDuXs&_g1lnL<f7_}~WRlt8jI(ZARCArvTRHyMjouvj5m
zX1QNve7PyYFh%T)J!c%<-7?Sv@-R;B=kV#@iEsBctIRvWV90@LYnQpaOSy&s##bqI
zP&$Zu5i<!VlJ*yhyT4IJ{*0(B#OeGbkQ}FKy(crb%Nv*;9u(O$U$R!xCB%rW)Gw~6
zPyT5~YSa++xgJOS$Wzo>3s&QpD9ruhd~B3CB}x1j#PwS`H>))*;CTD5oyDNa!#_$*
z^YJx$R+Zq8TZ`1E$4OdmiE00NSDPseFf6*L`x9B_AK}!}nQfuU+)0WqO*bLbUksXt
zi>&RqUuqCwP!`Re=Rdi|r<R?th*ex1Bi<gUE=Kak);fvpfhn@wJC=m^#!BfAZY4jn
zKp13!O#)A_ofgNxC3r9+1dpFMUC_?@Qt>BMh;tMAf&6bSrksS!a8gBDqniRoQsWzG
zYm*{XrllI4KUw9vAge8W#;^EiiyE>91%ndAQ-wzj*4Hyb7+;5OMBNlo9fEKtjoTBh
z)9xDg;FcOt%$f?Li6N_*h8T!2eAzCN#I-~|OEAVg_x-8;`@D^jz|W$#y5;rK0xL`D
znL)~-L}DJP?gM#yf*Dpx-eR4VQ~drSg=q6-9fiC83cKhDfhf(0zCP}j5G<^gyFoYs
z5`m^jE&rGJj-6B~;EXrr<bg+Gvh(of1Jm*FBXxQOBvdvza`CyRS$n^Y!)Gu#tmpYH
z7vS~59_KZn%c;on)s&3qLDasxh7k%8-*C0Ub#Utzy}+8D^~f%Gmh-+8ZoXXqox@)X
zg-O$SX*HYnJK<S<xrjT|SpoFqP-oQ)XE4s6FFA0P@#d^yF&f(k0!JP6QhvfL+!g1Z
z1A}?@E?`EjFH}7x8pWyYkM=)ypyaDN<zKwSU<&@wKR3_}-Y<}M#e|%YkS=a(=5Bth
zQ9)~>xs%F$;lxvC#CugXueS$(^o^DvIjp!N{W96Uo}Bq}8dGjuu6NQbD3lux*!8#l
zGV9CVl=k146?KM>vuHhyts$E(jH}oC+sYh;(dZwf)~7CNE889u>dD19c6{$ep5$@*
zU44P^I>wSs&5lPoNK7<MR0+?DQ88~6>#MbhM!)yWmK&;@f(^W^!!?&@gQNdw{>WH(
z_=THVWudb!C>{z^5#{E{MwwSh0G{NI&?lbW9ksV7orx{our}4NXGX1pKhqUANno|{
zes7>$Zw%?L$CkH?6ivM8l|IYKI}j2<b()RR<WN2~xa2$8FkrR8MhsrvkU4iluFR8q
z`#MF#%S4B3%~7`%z8`wv@ljqdvDOd}gmn;q{owM)l+o2GXiTVhBYf|#_f(P1EuG(U
zVweFRTMD=s><Xj~_N*IKMiAo>R@&30n{C-9uw+T~>Se45f1N2xU|L6VH{YgQuQMQ+
zb=pWW8C`be12boiEtoaVDr0@6?Gf!r_3^O$T=+MK?UM9S^-trsbhavS1lpD~lr&#<
zn$L>xRyLO-y=PYD1JU+}7OBvhBH9+TjmxBN(oO4r6bvC{Wn9kh10Q8C`c(pjP;sTY
z5z$0^qVY$8_T*^&G)tbQbS??w^u(FI5rfp*llDs=CU2xy&MlxT8E}>77=yoDdDbLJ
z(o%o20XW}g<3aAFMp2AN#bQYPWaw<?xFL-SP-pU<GS61A->-K`q%pXKWb`X4453Im
z%bl$FjFFXf+~e2n>jyJC&^M=Iqd?up(pjBjPKY3Zd{4D2*b?ZWO8D|<8#pE1zz|;R
zYxFo+LIG6z14&x&5svTP36BbcXkYfvT~_9gy-3MO+YS@*W}963{ogz|-iJS;>rsS0
zqa@87Rk7|lF82yi=EG;sSG3fE64}y!jpaXV@5X%a;G@A8QEe1eo+N;^zZW?1zCPr6
zI0{h{*dbDG0>D0t2qZ;9lUiTFa@)?Cm5oJUBA{V<a-OF2BKESg7>f2*S9!gjmFu|1
za5!?|O37KjlLTD0@1Uz<nT#>Wn4F%s7Kx!v8}gDN8RsYdAJ*Qnv63g+9-f(GV%t2i
zZQGjIw(W^++qP{d6DJefw)H>ryZ3&A=h?4LS65f<s;<-8YptDW`t^rQuxJHh&wqlB
zXlYTRl;(TYx#8u9IZrodmcHxO*yuAvAr;-uD0I%vF|MvYWL@0y5zJ+mEmRAy8=mjW
z01Td*<@Qam<Kcs$-AdtQXnWpM;}9aAoP`!Rc=+~XM#Hy<KtGdQ<T!@k3y<(-Qay;^
zJCWGu2WOKXt#ndQI@g1^*d9;5*cjz0E=X-ReU9#j@Jy|~S$=D{<NIfH1S_PoE1IOQ
zWgQAI+GNa*5GxloGnw|Vw1OCX%hR34ZR^Rj-%r-<zE(P~Lt5IdsBmSR8F&3FS}(M~
z2_+d7=YL$jspD=M`n>9RBBR5E@6N=#zwgA{g~q6u!{+?C3J#iUB(<{zu{$u)^F2ew
zv(6a4Xwm5>j#;?v;CqjL>o@Mqij(d+1Dk@bIRbv8(o2>qnhHHS%m70)h2(U`iseX;
zsNdWV(&Y`NqQPnU+h<17Dr|z$x9|<tV8rfg(z)~cPV9xU&%cH$tisoaCPArxR++}G
zs(X)v?bABj?b%+CssDzBBP|~kUF<&B#~8*`{*CDIF+&oEH50_h#7cT+eV@KojNaZ0
z&34k$&y!6=FD9ITyLA?Npl_66r}KVRq1yA@1%-bJ`{h2ycU!3<N0cX?sv1u!_@i~8
zJfEUW>#G6U?H2vYaf_79rbY0xEyeNgw%UF9I6t4ynu*ljATKKnt}-$Jjw9s^ns2A3
zg*%+MFWlf_TDzy)pSz-ekRt8R#|9CjO_!hi27gL@>w#Z`+a-LB!`2Uw9=1S+6z#Dn
zrM);=^!Y^?h)JXIRwLfj2bia-@Lnt=*+vw%9Om|isoohcH;J9*9GQa~-L6rP387=F
z7RK9hd<N3BpX?{t21B+th<FLYMu9<*%uyeTe7A!9fzrF16KC!hpJFfEv;Kz@+rwL0
z)2R(~JN^Do?x)qdu_)*QiVmE0>Gt_bHQyO1?o(74_r^v_-Hst`GJPOblX`}zo<0*}
zg~?hS+8*M@0x>8pYA3OvK*(YUZJtKn->WAJhuLR@`X!h_M=z+oPHO)AQeL&U|NC=k
zhL0no!-jUdCWdFc9u&HJ3bguptVwz-bWomUhULCipW98BW}5ejd2J76RnwsDa2DI`
zI1Vk_W7m~C6;smG6GF+RBQBF1eYak!E%zKZyY0x7-4KVI;ol#cLELFq^}{WSxw`w!
zL?g#L$kSJA#MUQ0jQZDV*g<*6^j;gE&!2#bUrqykzs*&zdsir>ay;VTH+(pQ0w9kz
zdga9+pJ>zu3ianPu#P*Gth{1uFwJ^@*PVF1-y`A7`v_}@+m*nU!8Bj(wa8f&cGU-5
z`<Y(%4!H}9m#sTXkko8FkvAaIn0-py0QtU=k&Ol5Ld?OH2w7ReM|-~eOBYLaSI&mD
zPz7YPgg;m(DpoKZK8G^3KN)(uoOznbsdjD(fa5tz2o4YTE7ly#@jygR@*STCt{a|V
zQL}aS%T|u46?|*JLqB+%Q)5z!&l~qu$>uPs>EQKYN6%3P-GIVAeLQieQ{2c0eDqGt
z^k*7)zR~Jxe(QZVHoGT3>*JE{&e4TZ+r_KY33hq@DQ94z<KZ*&X4)I|Q*}fy8k#`j
zPC)?kWv446pZkmPrPe-xi5SMy0gSar^iS-`I{OZ;PWzXF$w*K_8m?HT!AY~RD7~O@
zsM%D<3lU|`OD6sn6Z)71vEg9Q`?&@gwytLe+nLufTF`rg&mbm66!%Apd*}M$2=NLg
z%LSCE7^pN+a5$-mLm!B$-81lUZN<BSUojNl0S#XI3c4L#o9**pf{jd#HfF>Sw0Zv{
z))n=*n|6H}qE3=$<vd<MQ;4|A2Q?94w?HT^$PWPNrH#wn+*lw5WGZR@o?~irrJEdm
zUeho$yAnoaoT@d;uk^vn(6~NEdW^Nx>hImH&v$8`t#Yxd59BYJsLEHXQuDazK{IP)
zZJIez>O&KhHey%trmK1PVl#ceA=<^_nl(nRtJ@(L6ccCEFr|X6!hMdbRm&0<4Khgi
zsVx)5+}3p*pLBgqPo0im$yym7y>td1fm<RYaBN-acEr+MpEKgf1}CU0hyH!`#-*JB
zhmhTP<`>(AP7u8+0sP3)foRKeEd`LA(6Sa|RA&&!!mW+<7XiFkX%!`U<2rBruab{x
zQ)ohDv|mjF^dzFc6xy)`x^>?h@_P5NxkcgFg%A?}Cr@8EQ2n~;C5}etG^2x`Jv1z8
zkoN4ETbsG1agVJR2}{PS)PL!suSRMaR|Swar?4d*Vnocy{i9?tx2roFtp}_<l8P~t
z9=nkl6v`3O6T=>n7RAFjcml~oj0)CT`&fmGHUqgsM6eFROIyb%1UZ79-k(KV;|$Ae
z36`EZP$Xop{+_Y3K5+G~v``4RzU!`{)$#>Y{LD=|ixr`ZQSa7@-}EWWyUN|%;rEh(
za3ZN(4|5xfJSlKbaZp;P$~;+W!I{=uSiI%bVeB4`7<pw8p`xa`AX;T1HKEWjsG-%j
z6@=07+={v|lNfYu2LxQy*o4!ky@ygDe+Es~Nj?zbG<-2wCRq*xoHgP{dB||E$vT9Q
zJ~0t14E7Jqq-0jM$65sHu4Ivos3>N4ujAlACg#X%d8$u1wq;y3IXDq<q~{H0ww9e)
zk(xU5zNJeMht*hSK3=}%Ox8-IMmE;j-3R?q+THwt+VSs(X3yMCWqPj5b-8;t9@mCs
z3xqSUkSp@$)wYH6^u0iWF0yQ>a^KZSZe1CyvRYUu)K5P4%yGzeS|h*J6#*qnvgB)w
zd@VE>TXa~NDmPfaNmLQ9z=OgTw^(CHIWa03YnwnTV!)p;1V&n_Mpl;j6J>@<*?i&w
z`%ymz+!+pBn4sEH2(675{t?UA<Hkjnnc~x2_RwgE0dp3!D$7C{WdTSMLQ>GM-!yX@
zxXg`>d%z_^s4y5zRazcAebHCDYOjInb*X}-!Q5YviJ^mAF%c~jciqT5zkDLV1nQ!S
z5r?SKj+J5l^vZw&uAmUt3ZSdH;H8#5qWGW+^qbxjLS|&mAgPt6o{(<}e$!nZL51HO
z-bWz|6+QfLCzQq-DeWY`rwy37Chynw+hA0z=|)zAjDZ}P_4HN;C7pVFHEE{?jz^Gw
zT^oZHTt$LF{^VS-Zq-_i2CBUyVE9m_Q=B|JU^G>}vP)+lpgw%<G&{2}_mLH92d%B`
zqouFEOk(HCJWmpYWPAgD{|z&Q3Z{f!KGUT#Ucl2EgvJNe2wVYCf7zN7*I7mY8!cJ}
zPILeO`HrWNu4#X!2OUNL3NmCoLV4E6%shKIYZusBt64=JA30f`TcOR&+_=kxLX<zy
z3oo1EfBKjUMUtA}K9?C9xQHj{lnCPL$YgDUA8bX;%@|H!At_}DjobGb6&Xn&JbP00
zx1MOv(mF4%09r;3G9nbvPbkj<#O)80t=Oyo48GwzO9lPA1d!cS1jM#iaAT2mo<Pnf
zT-kNfyqd2%-99<-L#g1Le{dm2mON<bW*%aCwvg3ss6SoproFY;eR8=n3BxbcJU6@e
z`~B74DtvN|%w~fE6$EY0ZBD!}oY>r;-cp+mdIC~d%H}A*YQ(%0bA5sl6N`=^cOVI6
zL(@SWOkrS%5kz5x&17wqYF&oReV;xqeQ)ouf}?%jH^DZV5F#&)gk~$Q<@rqnAwWmE
zuJ@L>XwPgrJ|(6NGgnQ@$iA)P(y*(ecT2(dJZNlO<d@(BAoY*Cvh$8?A?*EiB<rPB
zwK?7*o^B7&*G5}!eQdCC7b^~jUHR5ry^j`-xXSS5u)s&&v_RKJ#~dJhY`iM|L_dwW
zZoL^{-bYUARYh!XIqlhw@`F;!;Kgu55faKetjjLtbmd$<r!sdB6g%<Fn~$*j&ZFT@
z^Kg7PzFTK;iGcNaF!`oTo}=zwZII=Ap8LnjChE(rflSj#%$bj5-dMMz;tYTx1#iiS
z+_-dWbo!m9hP|H;O9V<0?1P!`++cn-OdpBuF~&LLZalAfyLz;N=G=g0ahXeJFSwTA
zu92N}*#prdf2E*Sd2wg8pY{ehPMo~G>S5p3_HuzIAtA+Fc)AOusr$z?xva&s`H}Fz
zGuPXb?OEfdp%KFI7h1`_Zf9aa4k^-%rvn!UWvTBG)}gESl@nZ~{hUwnJeN+1c?`<P
z^IZsHg(Zdu0ryMG+RMeXvlmh<Xrn4>{ZVKL!_sDdTA4#`=t@ht9G^n+a0{Q*wC~gA
zuyZ?W7Q0^e1m;Keo9|jv%$G2e?8n;J@CLg+$Lao=_u4~LPo4wk>Xt{c@2LivO#;`f
zUQT0B^;0ff_w&n|#Y)EqeVpmmAWeax$HUi_&9rND*41*yllEROedPT8Vwv?9u;HaH
zIp3__{n4?Bsx1<b0d|Qmxoq;DBI~V3FJD9HFQ(?>wVXZti@hsbCeJ5{t1FDxt=fVu
z$4ngj0YRi(5Av0|sMF`0b^8@zB5FUucqo@w863Z4lwiC+=r1J)4!itZ_R^oY-maWo
z$2_zi``6a5cRUyKEs+5|57-xhb*~q!Z%)%diL$Gw)Q~7&xw*3*UV~e{h)5!67#Web
zyc+6>jkpY@iq-V@FWFoRdjhzE&k89rAV-mlEPf9)mQZb_)ig{po&@m0oRlsjEj<Dx
zgZ#7oo==h~6u<vvd;HUp_#ev*ysha5Vv*~OK;=9>2(`+#C8FBH%QJAzZd>j}1Q1KO
z2p^4jU^6K<9Q}`bT$U;75yeFlj0^Wl=)VH2PrVJ;e&>~!_9Y1Re69Li-z(d{vU<Nw
z7wY}o-6R{79IX$WVPXE^!oS4q)2hGbh*hp{wo!8Cvt@bDYYoI(Li)-XVT#P0p{#tt
z1r~z7@-MX`iw4QZlHkhxl!!xEeIgeE(p%|v!FjZwTm9k#ngmfq@@>9MRIDoq+HJw|
zj=wS$6j2flxt`A|?#$$H#bpCg3B!=3FuuM55&DF{dyG5s0mRVs^8wu(D|V{3riZ&4
zw_s$3Jo?x<5Xtqd{K?0hDx={dnhLkKp>bc%WTsGrJ7<)7pMM4l;p%FiAD&kB<qYIK
zP~vCb_Rq3e)q&M`WikQ*ekD=H_`DO)4NG-aixw(YW(0<czPpLC&3`my@=gIPWls`A
zTRaj};R1d2B372oamhGQ2Jg5%$WY-6e^i+^O+>tZ1T^HwA(8_LU8dFfytH7N6Z+jc
zzhwJknYCWwZ{msMQSdWNJExd*tp;)VLcc>c_ZWtZKpw)2+%z1Wt#Ch$n|jrGK!<1&
zVRFzT9^hLQ#G-V9_w1fvYKGx*2MT9=+R{irR23_sE#Rv4LpMAkr0~VMbwmTOf8no=
z-?Bs*!8z2PRw+9j7RKqR(#wR8`QCdgzUQvi<T{-n)!@_R<<5Qsv}0MaJ2ax@2ya7}
zsb4nv0P@Hsw{vjV2lf*EXeW5K7<wTl4puX0O@GBh@6ebIpTAUcoQf&zUqZ+{J<09a
zj)kvZu;cm`Bp>kG(@31YSU*t=LKw9z^%(*wF#AfYKz2?zkw-pfmn?CT5y`da-wx~g
z1;=lx)CKq5Pxk6AsMm93x^-8nvyQC7EqSvPT6`I%s(*n_OgBaA>MD3#Eb@)zg1-@7
z^H8`w3SV#LAI;zrK511P%@*=&#(e1{ds5~}bs29pn0^NGD(vg@K#o2>AC)MJ5@ucF
za;QPe@=BPLbmUM=ZC4xm>ht(`oWc=Mk!!#<9QpLA{?sud%yVIJytkvk9VwvR_;7u7
z!Rl*q7U9e~mvs>x4D&d!Ew+17I86dA*0x7Qhl><4)7Z9(y6jGv>Cj-;keAHZBwj;y
zQWeL@W(}u|iQ_!b!1H~!8SZGlSwjDtZz!*;B`PAM>beoW=}jOzt4+clY@{(Bt>{q+
zD}%7`9h0!zaxS3Qn~R)gc_P2+!0EM7uj?mW61Wt{-;;q29kJOw4X^K$oK@K_F*1A4
zt?<ov%!aZGMxAdxMu&B7mmMD-Q-5lKp*kj?fN9rv%#H_uoyFabGXC9oxJvPcJ$z5=
z0}>b|3C{U93C=E?Y`qx&C8Vxw5z&!!)?}`l9NA)J=**MFGq!rb16BxGl;=%LRo%L!
z^mrHC=qXRJTvs&zohN&v)pxG)^c9~{$iN>MPOOWHTFbwKQ|7vgn4g=r+4;uMutfFF
z@mquhL9Mi|bp$yj*kq(XF;)AY^R$o&3Cna&;qdpb^RRaF4MQ^-f2h|Xp_R?s75bO2
zYGm540MV^KdV=%Kew}Yj#IeHbkDc64NDmg5@$AS+2waw%JmpbpbTKkeq}|K7>YHB^
z?G-dVBfP<*%~BhTM&gKwHsb2uF+AeZ7RjiMVz7rYhwv|YvfeHwrwBNahPi;CLKaj+
z3yl!4alut}$7_pGnzLB}08b=zi(%Eyir$5=sunPL^^yD5J7x{Cg3_R@9B$I-fZ1Qp
zfi7Y{%Hn7PTjJt1=oldFh1EV57MJ#vh{Wxg>-P9LE_4J0JxJRq6fnAFu})We3CXv7
zL0hQ8`T`j3%z3e(;2f^?F!Oe1g*k&0kVwJd?Gx;l(CQs^8G?Ahf4UorON0)PRQ$qU
z7qPEEAIlz`dH<z_)^+sqUFdGct@3Bheo5mq#@~BxFcNYU>n*t|JV~7%-a#=ng!Gu=
za-_#37Gm{*QT#-yM%YzsteZ8!Dpica=7NZ{1DrQgKf^EBS%raQA!Rq_v_xL-(MV_^
zMwrHGw8tyDd<A5Hk%^uXDpEp!-I#wdaS%?mxgb<j{?%_SA`YEbu3V+?O#yoWilj+A
zEksC|^PFJqC*X9zARgqp=rTBqLbQ3m#UhyZ(SvGuf`G#(&rqWX1_ln8<hgd~=2<o-
z;TT-`83=Z1Vx}@D%a2Kl2jaSV^K?i?C=4)REbt+!FUnK<zxE5EEVLLzMH1KOqUpPt
zS6c83ua>PUi8mn0e0{15a~54XtoEhBtXwO#`LdB*V4+zuQ%L;i*zo5UoijFq0f>k`
zI>~olAt>8`n2P_nkp;3&k?brU&>qjJ2C#C3bTWD5(Mi?jx3I88eyOn5-O$_cGwPlr
zi9?`N{EWaMM<FY-k$l80oU1Z~p3pPuaSN;_qJY{=FF2>E87Np0zsvxW<zgkN#hG1{
z|C22l(A}mkyv89@$AD>Oy7URAg<O3Qz7evl#uXbeSMbem$VMa%G`<i>cHPL9b{zW-
zx6o8Tp>Th-7LqDoN<$?YAx%ax82(pbU<WMde!&c<J)_<bH!xTPVMm@nc&eDw#fEN>
ztiIIJij<NTuAnHGN93T<49x(^5i=IizuMEhnltz^Fdn2Su+TU*0WYZXyIU!_4I#HB
zXaQIuLbQNIjux{Jh=jcBGl2-K^>Y5+*jb81>30iD3Qg!!J4+YEdZw{ZcoADleM<ol
z-ps-yqc|jEA@fT?HU4Cjb!C$Cs?re}twPiNcuZT7hYs^nbAeWr@h8;z6LF)NUMH>F
zmPK?Zob?qQmEP`jlXpc7@7Mi!9Fn~!m!BhzDa1h+g|K6U6boQo;n6Q^k9BQ^jIKF*
z+t<|>%#pkq7@+Z1eHO~!AS*WfBl+Wv8xIZ7DQJt-l|yAmjrB~(ah*{Y%;Dk<3+hg_
ze<`yO1OZ|(^0sYwM3dG8Wc|<HXuhYXW=?(gJ-^xF&U^nh6&7o3B!{fIL}U2U&DoiS
zD|`?|FzX$-Ska=Sw#Gl({XwnW20Id}upg{my79r`>ve{WwHjS-EQXnU%w3O!<M)G8
zP&AHHjcL!2cTH3Hpque@LH-s@?fE^$Q9;ajZ=)sr=UT<Fl_ep-660l-hWdRQmse9$
zMCs0^8NYtsRve6w2q8HM7XNJX3mN~HvE${o8bIQp_dLa|0Fc#ix8`;=1h4Lz8$TY-
z*nH0GUorh{Zh*@D2|Yr73P(D4AiPv#q@V!`Gd@Qukx8CWH`#a`t!FSN9I4I7j=O5@
z=&pf}n%HI>w7%?cUcI3-GE>}T5ouGWD<mA`O|7RU_`0*th~4t#xW!lBz9_@cSWK-$
z50eD4EmAIarOk&z>S<x;(u$bbk=)xbk$*^5y|_pZ*KrB2@KlXhQJB%&5xGo*FXCuR
zS4v0~+mp?<q!)eocQ-KPjR#WXoOH93Fx^n7Qj})}okPbPT5>|abxwVB-8^aKtck%%
zfNZMDWZ9EBv>V{OV5L1mD#w`cI;7Ng39aLEWeLaDsL<#MKf!uQY;sS|n8{dVd3ZZ}
zNM!MNspqT@PVw=Uux(~Mx&GvSH9_3ylw5E4A$sUr!1Qq5t!BY?vp#XRqNy^lli#)A
zRLDe62gQLQnu3CPHOu4mxv1!Z_RC&x!lgVvgr0h(|8*&6ugg}ltg6gpE!^44YypFp
zIt5|2w_g2<$#6_TW7UG3Q&Auw`_Dp{`mz(Q5QNc&)J?N7^|Fe9rxa85y?{}OORf8g
z#^c{+c^$36@E|Jl3${T08$ze#nteJtUlDy7)HisXT=fZkyX5|*>GwD}cxHK3^(i*p
z8iNkR@#S}?$}ZXMMAWE{3EsVf7}nWibN#3Kfa8FE^R)^_D-Em+ozKXRWH&IA)@AlL
zkWKB@jNxd~$4ZKRPUh%pf3(+3hD5^#-J`Svl0aiP6TN&Idf`COZrR7muXNl4ywwVq
z>#=&ysg65~TOw~1E8ajhh5$cIS=Py{zK%QBx#gAqDH*O(`(k<kF;tTceof~+;#$mt
z!+tL!<*G7{EWD2xr~A#tpZB{7uNAzB<9Dlk9J0mcAAv-~EGcy^SG+``S_4jRlsYST
z<88!Bu_t<8>4N70uSg|}_S?DRu}ls(=eom8H9ivVj?f{l7bdP*0y;X3Z-?B|CAdPV
z$;g5yDYmzF@Zp%wW90c%Jv%S%nxW$Oq8f$#1hc>DLyRZb9In;KbaF(c1p$_P9yugj
zl4WIOMiY;M)M+21;S1_F@47E;wy<K*<ugP`CmDzV`DYMgqJaf*s1ZvJwXA`D0rB>f
zKL{tBaMZ_hbk)b>+MyoL`J_V@Qv5J=(7HZ(p`%rlnu=1BkA)rP^=GNB?wk)8%6lk^
ziAka&TP-$U4m9Fvv1HvQWp&(cm|Rj86*PX0{vB`z>_3pqF7}r6cn1d=XDuY*8*lg@
z;6zIs3aYG|FPRvN<UNdnWqX>_ij1U_uloMJD8e<mpC(kK+Y8w0?yYa99f!vwrtE<?
zM}!-+9}$i-SL2IVyg|2@>kbjgc+!)>6?G|;RuW+dI#3CYirL$)9}t$q6Xb02x*rDj
z>Uw}^8Yy3Czd(@O+A&I;+L<+mmByKcR~^v#yk9;`EQZs!@&M&J>ghcn7LY!{zU4`o
zmzI`AW{C62T@)5ln$@z;bRToCyj690c|oTKC=}N#4jn-rty9?=c;yej%IO-9%`r~3
z$?jdqQE{Bj=Gd9HC)A5Dxf?Dby*{+XGh>$u{w_%s!N%g)I|1&rfVi;1M>~zZfa*u<
z%XOsNjcm3yifRwMyQ4;-&KhZ-65zhs4Fcrfywu<y+;xGt>j^`&TM$&jiDue^RhZHl
zKP9!n%tEQxD%edrrk#JB(>$&Q-<@q~@e}brQoH56-2G*^{`6_p`g=(NN=V_ycCFK$
zSuF6FNCD{9kVQAQ;y@GF8ihN>&L}O$a@G8y1O~;OWO_XqW2lhGiq^>&(v<;?;cgEq
z$UZvCm(VdSIpk`G_T=3j@oJyKu#<nMe!$Ux-$1ALt9)I%dvoU3uBcWotTnFJCP$R#
zlw7~r)&Mj<p24zVjJ;AcH0RTG3Rz06xj3t738$>v{9@G(Oqv_y5-haw2v^SzotTo_
z&RB)`@p_+a_SR${@c?EP((sI<jiHAkN^Qgl{;KGh@yjwbBT`tV@7@JWl$G%gmu-X1
z3*xYDS^)7C_otH!jv({(j-zhvmmWtMg_v5Wz+o}E?;rM`(Ow^L(>BTwdD(6F-T@z#
zXKwGATAd^v?mHhbYJ9i$Q{m{x<==y4#ms2gHs^9?Akf90==Lu-GEQ)O;8ZG-5Ttx<
zdVCoXC)b`QBQ!bW=Yn^)hUc;f*Kg){B4cyChR(Pf+Ef|12KbdSVc6dcikoc-D!)jy
z7?wpeMIf_jsRE{21F67*mFf;<KCg`l*^XYGt%haet6Q_)hD+w!fs(I(-V$*QFNe)t
z5whqr-)gYKt2}<f_h|5s73#x;w}8RbC!o9!O}HO4AWeC^E@>rM1Pz0Ye}tqJHR*i|
zpA4U*oUip{u&p`SP440DOWWaB!X274ZdB*7%HfLu5kq!AS5=L}C(0@|u&Zrsf-qf}
zVWw=p8p%oukk*sPFLHoxNNKU((aqjJ7ni3}xm}>rbu@Zj#BuXv6~Q#U`;&zXdG~US
zJz1I26{=E{`lLhA%XaCq*=qNVwaZn}^2#kt^rVj{x(ygP#m+|}OQ<yh2j3{bJZEo9
zLpx`_Jy|=0=sBmw<6^>%gyMbP5UX6y7#oB%tu<GN%p_J@itS4s%|c--x2sKVy>@b#
zGn)B<*cAAEuk9<HD1AKSCPNCm{wbmbh}TFN`E(+|6fCe?f#FSW2q)z0`c^R+fX5P6
zf{%;9F2nA|n^Y|+e3UaWjVHOEfWCP|#-iE!{tC{{cLBj<a!&I0+R^H0L?pAOdc8a6
zelB%6eY@drx#b>M=Vs0d5Pp&DUOn25ON*f&T@pzkBy>-&ZN~|m84AagVo&y@mD^;E
zmS0tSnd+ccuaEcxls+~Fr{G9%+g_Kx?{8cG*zvI#If&Qeps0{0hd5Qg--KF_;M)z8
z0@us)bD!=RiEmP0=N^jI<R6Z$Xfri{Fw=;MhWNRnIrjd*Iq!=Fj>rlYd|B973&ZG$
zkpGkgunLa>nMkRtBT2~ld=c9h2NP4B-rq=zz<4<R1xCFg?5zr21#1HkW1pIWvfxpH
zJ9l*W+`H+Dkz`|d8No&N!-E<5{5A#odnD%4zMzb^*KdnT96MerNBF0FnC#S`LcX9B
zkFxb*V%I&H$~csTBPOi(6gX-v^bE6;rLWKHo<+9zBYb7#*#NBTMxU7&f#2WWZ#m(Y
zH@OwO{QX-R1Kr*sZjUz?ZtGw)*0}pk9>3*(90ZZ<I)W!)x1`{LJAs8+GsmQkgBGQw
zMS-;ifFZIctxFn6!a){AF%$osQaRQ!LMy3m!R91l%%c91Ryh|h_`7Gadrx>yT~#n;
zABm<)OYxhfFxfQQD@w5^<gkGL<Poy;Hx*@eWnGzHt(O6qy#uT^*tW7<tnpPCgtE}t
zt$u0t?*;`GVUcr$%d0)XJIm2(ADF23@M77AK(8O#A=jg74tF3SMkV`$30drspx-pv
z70|$av<EB_%xHD`l;p1Xq0yb13U|PbVuT-$xfzK-<`uOJI7MjioCu~=#uNB_(>x+1
z4fFa%OeLLE5@(Yc6A>l10TcUq-jG`bgr2MBr<I0#==h3ltNuM*X%?D9LLJQhWUhH<
zNDTHmhh2AsQjf}e4_JeRGJWuR?3mmnId;E8)sO~=W`Q9EN~)V;Sp8DaU=xHDvX~j`
zk`?0}rP+<m+{@OPcZ7trso&ps^o|3Ij1cQ4zsXU-W;t7Z?aM%+QI=Lc{0ez8Y+nm8
zfHoc7_gRJ^U`+!x1<{fDSvhjSZQ+f2F-FY6wHSW+L=5~2U|CP-ky611!-;(s*DylQ
zfaBB?j)E#y-;zGgL-o?`gw*qKgS#IxTJkFrwi98H-r@B?YY~0nulD<ns&4H`r>=o&
zF6uEg-9Q#c_*h(S1(xDF0a(y^-isOtss`|_=l~JStRDEHCl@(1`A3dV5Z95;R-64>
zM)mFzNZ7LI)rPa+@58+FUXA3cJ0%6jZ#!4{jh(m?=^9`;6`AP)f0d>ENFprX$n=iE
z1SO5-y&ya{bTTRG0$Xg1KV*|mYwe0<{s6O96tJ)TO1x$^$SvvQoY`5tcIVl)DQx^J
zvzn`K6#83dxcHvLSq@R=H}wd;i6G_iD&$0ZZr%ywiMQDGG5(%<&%5KM#~zP^Ew)s~
z6Naa0=lCZF+Iv;gf-wA!!IGViy)KE|))Vp}T-u;Eo3^0rxSNlcBM9B*BR#|3)Is;z
z6rnmJJpePJC)~dpK@@HZ7Ec0S)WrcxWJJU42|9D9?mjIRbJSK!oNQAun#-*^UjLp_
zl@>(C7-w#m!%)xTT5kyBHr}A@sd4ti83{Q<@-h}-#*-!pOflh@vo<?QB*@C=l#RMp
zqA>}-D336!qS!bqHG~wjz9ehh5ElTKDISed%c4N>F}mEDVljtl;F$u;6%xOxB7Avo
z|Ga@`5dm-i>tsYkwl_8o_Cs?Tosr?C0|$8!UTa)<2}BblY40c=tCSZt2TmNUTo)FD
zIpb#qP1>DJPj=Y};W0#@d@UtqIT{9_eOgZV%hB!dg#yJkZ8F2xBPNzl+h6I#nNElx
zu~#^E3~uffZnuOlLo#qHgp^`bQ1mRC*$g3haP<BAIrsI?nqMu929o%(&gb1K<Ji$V
zq_E&KCpN`WF1y0HW!g@!{$Xx-_&zxv@s9Zgq3mFh_6(LAh@?jBqZx_QY`z=gfA1{}
zNVOuHd~jp9o3hIId_!|coo|LB9Lt_c{fH}_VQawc{C8AA>W`C)0*&f2HxU<{@3$MI
z!haUj1^Uxwxuw7?C{&CKYsf~0owNsUK`-}R&Chgh_Ueav=uwr(C{m<<p-tmW?Vc=s
zNvmCOW_!QVgMkTRJa=jIauCeq^dAbAYftg?(CxOD_>4WrV)4Fzq+sa43W4R+B+wEF
z21g48{d$}4CE^#Re|?W=^Yvhj*ByvOp{|cE4(InT??`<5yoGEcrrQbPs;5xr2;snf
zxCE*3vVnz_{{<_v1Qf)ydNwbsC`1!a{%IWoT{>GYOS5c<@qL4XR`Ywi?!Xa<)sMv*
z1BmZvkc1*kC-qdV#)43#oPzbcc22c3C4}o1*916CZ}hdB+3j|#3h!BsrwICWzo(^2
ze98*|TvppBxwxS)+3#zI3SrpX(G`Xlf4<BRC7!eew#0wRD0^~%I~}Ei9-;*yhz!*D
z%Q*FT&nW9kQp8q_9$!2xn6tieRW74sMbp~m!v4sOkgZ8#P}Py%i+1k3Hzwlipa+N6
z!HRL#i-H=U2)h)z^{O&Hr>L`Ey2{?~T!!Ng7M^UEbGI2_Ys}(;ofwlVU#@Ldc4(cP
z3}wfj>0`(Vr`8M$7bl{@SD~geU2gRO6a~+{pE^9kAQ{0<z~B(MwA&L<Eq`SFT3nhD
zU?t>F=?HTf3xWn2fB+O_JEUgh?c6*gsE|#C{u-7}>#tvIV4vZH>0pUws%eiu6D2h;
z;}mSxo9#R%uHKJQII4HP)a?A+P2qm-4cgCf2D!>~COk9g9G9wDbK6dKqej9AM-A!l
zi!U}|Hi%U)e{{;F3|lVjb+NBm`z`<7$M<@M9YoHODl0gs)((8`22!VP=eV?}wk@jx
z@@FTr$2vp^Yy{|!17?vj0N_`14He)j+_UxK4>dr7Fy9%w=XqX~bumX^Q-X^TR-&)k
zML|hbgsLqN1kaV&Ivy9B-c9QVG+ZJg31%cv%M5#SqxWyYTkOb|Bn+iBkWhmPu3wFu
zWs96}h0gFom^AWDPzd6p)MUPVF;Lq9E&g!ef^{Z9RPn*{*y_qZmQagbkH*oork{ZV
zF=s^d?~IoNQa?g@FyRDwl%|`H1o26k1ja}^ghVKrqQZ&U)AkY!gfmicQ?2O(W4+-N
zso}bvB3spNfx3%mF@>2Tj?l=F-q|Lpg`OU<FF$9;rdKqbb_){|84@7OJSECxG6LFN
z&Zfw=Fofof^4Rm!deDHR#+Mksn-|{P0ji3NRY7axC@=vF1W^fFz3l|Ww>CWUdk+Bv
zQ99vxN2e!!R*7v~-el0kWr@KN?cb!v+5>(H25(R#&g?1L_YpF*0Wq->w%8W5U7`i=
zNE#|tM32j~eGw|25CI7!mlWx}bY-i_EXl8KQ^$)?zPqV;CI;H^0-r6?$HJI{uzQ4i
zWZA2^Yp3>r=$~djY`DBtZ?N?h^8u>hQbz2GjwBsywn9`}Q#)WYu`^ye>v+0$Yb}0T
zM|tySA+dIu4rF4@7rk_<^;M<uen;YiQ5XU})4cnxw&Pk0TY`Ouj7D-qSq_}0GUD4c
z5vn&y>-?=EM2sXEeJ^2tpKRYEU`+#~9(M!08p`|zG#`}?Fe5;pJKC?E(CcUIT-~qD
z{0Hp|#x&nKfY^qy`);H+)}-x+lI&KQjc+(`g62oPrw2IVsj~jndzTKbOLp|kbhy@8
zZU?i{_}EiaQmS=YlLIEBgQiCe%p>774GG!M6;3W5*Whv)U?9x6XTKGsp+0`2>%PZF
zh>0k6RYaGT$*$Y*ac(<$+P^s)j6?x^cTBmTiuEkI6HY;*24x}(3s(A8__`Bzu6QSF
zzV5$2>2PJ$1?(yO;@RFNzGhWcXw^qGe_#z?qRnIUq;wT|R$n>nyI2fOb7M8FcJoX5
zqED$HC37@7(>M**73_IN8C*8Y)?`nSYY#@6TMR=)jz;h?dgI6QvO=KadF14)?#M1F
zX};Nq7FmBDgoS~x%f<9dkd<PsG77=ygZ9P^JY^Lm2@4HNz-)bBN>+^$D&_S`k1l>W
zvACHr=ZV0c)*P6p`vW+<MSP}utWz<vyXs{IqyV|#!xcGb43GIz;<8tOx(jR8CGB1o
zj&X_!(BRX&fr}yQD82q6WVP3G)y@Y2bfI|I<_k&!^VJK$u8E_Vt@cS$Vr654=OiO5
zdI$samWa@p3FjOsqsyQkBPHAQ>8>)M)luFlZSb8CW>)2HpD~Q#qra^DZ<tK<uyS)K
zS&u^M`m}^Xm#~*2gv(AzLs1rM+|+^U{a(q{<Sx^butB3?CD*R$Y7%i6(u0$W6QT_c
z-?(y7!9<LZh2g=u`ng@y(al*f!3kx1xxg~NkJAa7&&TEnfGv9HuR|b<Oy2wP`gdWB
zA>g6AT-6>Mp5TDejloV3)?(>tA_~$U+TawY($%=liPKBTacRdT6;i|eBO99%AxM48
z5mS0MIX(MPuAPzNzn1F^@#B<i2to8_%<kbg4d!b*+UAl%v6KdC&|Mtfn#_9{Og;{#
zamKrnOKdTNgp?RS$Vk8BZ_oC6UKf#X;gv@Qzm4HZbZ&|YC{QFv3K)rvE)(yG%Z3m5
zMf*v+Il+{TG3>+Ohc=uOa7|d2R$mek5og_}A_P_k5XK7j-z1|u)?PzADE=_jarzEI
z1mwR6NV@!pi?%bMp)?MG+l!tyHOuLS8Fx@<cVzqNEYsMyHj0-n;8vp~4NIu+{Hoqj
z_xsonsAUg8`-N+&h4w)N3k8oVKUW#gc1l!@ff!IeUU*cp$KjF6GZY1Q!XL~<3>cMy
z7%84PYyS~JlUbN*=O6|{)K`XpXgZX{?SG>lHyRCEpH+pkt}9%$W3WBSgt<hPTuM%c
zHYQ*oiWQgKs~B+}O2EYf7Q*B2RuItNUodJ8G8U%dal3026gw*K74m2=97aM%oa86u
zP?v~a-_V#zIzn*SZuMhUcJ_??VvkOjHlA@VtoFA)L?)1$I1)^R2_|SCpB^XeVFE??
z@Y9M*EjpPiy}|J<HVHih8d6pIhXmy8G7PSKXk-{64Nr=6Te9|Bcv-^;qr<YB=zSO=
zEoIi{OWd!kH8FvtsZe_f6xI;Osby&-M(}tE9#1$_C7t>3op53{F0_hjLk!M-Bw3Bj
zti$*LoJw<ImqF&KsYo(jCa4Mo;i6(hbc-t+S4oQ>H?t@EPq2AjSG?gB%E7u0a3JwW
zW8<Oxm(Jx?M)ru7OJ$sHvC+@mw@8AuTm#~gQiQ)iqrF;!MB}m%g(NQt;yWl;l-&}?
z(^(Tsg<lIr3{j!#PRs|{Q3CY|66G10_8{w=RL=zC3ozNKp{KjG&#Nnoh`9qG1L{K|
zBLFO9XxLD*=3#}xB|zNy57-VD``qU5zFv5y`y~iyNRn0#Q0@b7`3uPkRicapY-k71
z4dRSwlTwaCJgAFJX0wK^N6}-#l9a$K7a8gNiodu&UW?|`-F|y3vy|Q>w0`Y=A8jX~
z^+ZrtB=&?yQ#@f6KVeJElh6+w1jHsM4*h<YABV<1u4ET>{3NG6NeQRE*K-n;SJf6e
z53Pfda>}>xOUFfvKo)Do&0z8e3R)V>A%(f9*$0ZmWui)1=<w}oQZ6evBwFyKRnVo&
z>U91Dfh<`RF%X6N0KX^fHz1_u4SbG7gpqQ|YUL)7(1Wl-3^Ni9*^87V=Gzn;%Nsyp
zbBg1=7p%rdkMRpfKr@)153|p1Z3IZDoVRDpeSlMxTNcj8_ZqWlN#bJz?y-dpEHSyH
z#!D-02C%Zkr+&k5!e1QlD{xpNzGyl1VH%OHnlJaH1dt>-4Z`k)-;KndDl!1!zHg*R
zDVb9EK=>qdIK@RR!_J=wb}BlQ#Tr5?I3&jT&}J}~-O(vC#VnmiG_(Yc7q3^5$8-NV
zX8~y!zPXQwb4pIZHZuRaV%^?SCvaZn0Rw0f3gRe;vJ#a<fJEcs-&xF*e#{qj_9Xtq
zVFaXEhCC-IvKNZkK;hxoWJEua`ncFMaV=@E59EtPJWgSKZ}71I+Wo^Y2|x0D;&?zv
zP-7kOXk;T2UQsRp#z623H1h{wNJ7%Y#ZD|+{rmhr{+_N~sBZ0Q!M6eVS!YajI29k3
zAI^wI_j=AEMJ117^bx<#yis0nC~G#P5IED($k)+I<(E4w3c}07`HR%so-~!Ol>9+7
zFV{noZ_hA;wA`+EGUF(JCP)S(QF$u=KCf1!m>?%3NzS}<TIMg3rBG9!<yZNEoLp^g
z*4O@%OiL7~Vdz&00Rz-(^nZ#6Z7<J9bo<Oc;(GCsyjFk6^+NSP|IXrn%iZRixc%{q
zMxIL$Nt7R~@3FxAIGCTe%q2Xp{8+Izz6J{-3R*<quQM}E?ZLys5%hUAq}RFeN=}Z6
z_m`*Jt3T*_IeVQ?RCU1_8QKo?eGNNdj+iPeFs1;ZLUyreGfDr0lT=o#nWJgf%ywgT
zhS}aANm*T>kALYGGY|&i{_ZXSd#@?4svyUc)LxR)9-sm-#;@uu?@`{6{mKJE7*Jhy
zEGQ5+Xr6O$Rrc;N-qf+S!lVN-?eb3UiK~1OXDnq7c{%E4Aeb4dgFI!wW`AqG5}pt0
zavj=>q%U`%iu%Dd{Bd)G&7PNh$>7v(Q5la@N{1wV&)wvI2Dul#jdUZyX&2r_@Bbl@
zTRaZwjhA`e!8gb3L^$iIYM8r$6pl0cr65<r)gC=-iSvl})ZL60&BBbBmKLO>BsaG*
z-&nTP<e}<Rl;TJvF(*OxiI<YaKhG|6urxoRc-4%L6pSby47UuAI75cGZ1HZL6bZyY
z1VoSd(#7Z1T?UZ3+oWVg)U?N~k(%aKP!{Wc(J9hO2%b?NHJEPcDK|vsx5U%GlHzq6
z0OC{@E7jh5P&AT^LEAZY-YZ6=Ygg}jj?6&+i3q>c@IQE56YkZn#m-Llebo%l+_-!D
zW&HqC%aXN<*EhKU=2QY&w8XS#n0xmhU%^AY@s0oBVI2yebi9om9O;Z~|8#y|u7nvy
z^!_*F(?5;q|FL4j|1C23|EKJWDLO1x0p(?I??~<?8il**o*6d5$VlSdG>BM&Jlvn?
z3*iD`w7!4qO&pka$Y|^y2MB2c+Q@!LY9L8hKzzQU#`_j4CiHcag2H0tS7DEoU_n!z
z->M1xF5iBpc)0)O=BOX;+KTdKu;261KH*y_6`yE@+>x!eq+m%^eQcHpOKV&l3Z}Y(
zv^C5B2plK)nqjFJrMr0j*^}%36Y|C*UJ}7B&gk*s^7*>TnO>w5_nnYfBFjprJylLM
znONeshsS~d@KeIlV8vg~-SSY7703LO3>O(wV&P_}p<!ipIS3%JbukE$6`Y?{xo#gw
zt4@FgBv00Y5eAmk{Wq^)x_5MLuqm<Th965&k!^0E)@RLo*bLu)qT(V53M7MUEmT3d
zbdVgoiI3I`>s>0>uF?P%xVb!Ld6Les(rF2)M##)@W#$<o6S_;xON0F?$$4l+t{W28
zD#&@F{j1HtyH-7tgKxMLe?3!7$$%&;gKQ-O01~<7SP*{H6S-$*?a}fm03k7D0flJ3
z2t;mm)&A4kJaMS_*jN-u7+4u5djF*pb21~Dw&0vR!*8GEG@Z?aArdcP$L;tsO7bYP
z-rm}(vr)bA33(M}?PbgV4XW4>sWTsxMN<u(F;gtKq;7kLJNZ}iQGO!-ufjSjo|+G1
z24l3e&w;mH^e_kjpeSmQiPz-vP*H1aXIaoed^#S%ss3}I4M)nZ-s7+S@TN1<QsiH^
zBUSv`qN1eMog>HTm?@&6Q~f1>Rd;I{8ld{yeH=D>O-zEVNl!0V23A~?QMLQM2Wd%Q
zL4^iABaxvS<;%XDZA0@|h{eR-Wk|KYnj0#UPTJTj6n@9kXZ-jX-tHm8jT(Tx`30J{
zEP7`cniTPZ<{%*^#Q@VCQxz^I&tT$5w;6Vy(0sqz=Vi#BEuHYh%*n-;je)?y-%5Mt
zD`U{pbcVJidiMuxcJu0O%REt)@B1{otDC{vMh+87OYw?LDG#24sa~SsS3qT~*ISwQ
zW$oUFmd(-HQc9B#chZXSGsp|B;5D1Jc%N0;&(~9z;Z1w!Jp+CgV0JQ~C433^Tq`5}
zWN*A7FduLfpO7SG<4OF;i1-HS>-e2X=Pf;y>gwR71kbooK_H+5B;)sPjmeEjT7;(W
z4F=!KY}@ig%N)_#H@=|`*1B_k6h7ZaA6jgyg9&sKMV@m?9p3|cQtXh_4m<S4A?z2u
zw4{z~_i%LE97zZE#4DZQkqjdD<F>7vcbSAxJB(-N0#&0DKlSO(slS5_?uTQ#Hx+l*
zUiY_TIM<{OC(bGKF2a1Y9UlVKxM*QO7$^a6-%#AH2j>S?l{3q^Msvz|vj(@>`I`w>
zo%#*V%PDelW6|wAAMen>JhJ-J<541Vc#@FUs|KMV{u>7!A7fH^kmGZGZT4IiRhlnB
zl5Xd-XLg$lifo6hm?d%1ka8@0^x71@#A#}T+kLVW2F`)WMF)NZl?{@w`)7+*+Gd}B
zT1A=CPa0SmCyQdm|GN@?Q~z%J9s2L$jJ!*z^O~#D?9AZoMn~yPucpgy19O0CcATi0
z8HQo8EYZ+OKQO7zQ^yIH3AfN3QRu|D$^G&Ud#BE~%pC>kbRV!21w?jB*Bj-sC}vZT
zjOJf6o9>Y`BtM;w^8iCmwHIgBC?kWje5~o>st^o>G*&Mb*hOPwFyYa{vjKUa>i(x)
zR@PHHj~T;=mr#U`{X^35RVCZ0IWwgYf|)Kv21s@*sJ*@Nevx^R<`ky7?kpje*kPDF
zp|yWCC{H6e<XKW1<|);>8}KYclg9gn5)+%0R_lS>*(^002`!f|)W~S4fh0$;6qxzt
zo(d!mKs<yc@fP)ptg;FkNG0K@V1GUYfPj<;w1Ue2`IvtHmB&jt7YYAVfBF&$7=&Hc
zZOTyehLGd?A~zjMn??F>InFac3QK`91E1<Eqy#L=P0!eVJ_kk>uM#!mSO{2J<^glY
z{lwse&_%!aQCLl@!PU`g0?jP0dh@p48la9|k0YTaY}dR91Je{m{1bfTebOZS0c8q{
zCo!>8VcqfTSLAM!7qcNNbPF3|x+B`t2Fv%S9aOL9Pn_fnOP~<KHqq~4&eOmk1j3&V
zQnh+QLW|DyFfaqXGoB#?%mmS&AFIpFHF3b8KMa>Iw?>HUN%AD~p(%0!*0CFhio&1A
z3$A75P1&!yc}x_;?M17=cBA`TM-+>c6Fbi^eCDVQ8w}aIO_I*1N3FjpZF0*|M#r4P
zH|rR%GhAil6nYbfRXAqOj6UmtIiY|U<HM2ke|Oe*_`89FR0tpvY^2$uKUiy2NHt~{
z@^{EOTeji+C(>|~?1+yMafM~EqXN;nPIJ&|bKmil8Y5B1v)376I$06IisEE5i)Wpd
zhl-ua-<jx|-a^s@QYt`}J4g$>gUeQTgBk8x7IN#;h|tRGYE4?x!8c+-t3;9L!@ito
zlMP*;;S{cD2hmTxbAgf2KYcLwT_YoBWOvW|D5bBy=Nry$%3_<nH&<~~_O1ggt(I|$
zW@SpYE#1y5?Oe{T=#(?NLmS!w$h()>T0FO(_5t(WROiV-FWm6(vHN&wX@6d_W*4a$
z3|dJkzjcxx+OwJGr_H$A+46pPV0H|w+KX9m{aMUVYqg=WzU+p1Ul#^n4THiTwq9~2
z+@3L&vh%1<?WWIAXmJT>$CZ|vKjxxMdyRD74}v@N69aF!etA=?cO+jLqO`k)f&me-
znJQm4L#jf{?4sMri>nI(`-8>u_Wby^;nZ=C<Pq#|65dY(;ZKm+=NDEf?iSIYuB0V)
z`up*DFJmmf)CCOQYUG?mT|5r`=DO);=k1?8Y6!?Y%^IUsQLsJIR7cy+$PHVW!%JUU
zLI#HL-i1rywC*%|U=BBP8;RMftk$PE%1w`(pP!iDE{E-C+rLOf!C9~GBIKA>F7sAv
zVBy#QX338bWqW&oA%k@O0(aWKq0&Sqz&2~YQWLc!v+*@T*~{^XSTkL*ZzXQKZuX7E
zq7bMHET<f)>C4AfQ}mcs(v_5Wqk`<0+`>cik-ZxHEsTvYO5&<5dr*<k`t*1;TQ_fh
zOu}tv&G`M%#Yt7w{!NH)kD5uMYuAGI6jyF?xX9~u)yfCvRuO$QB_(*Uz{vR3<nfzD
z2pquYlgCx{@-Vr>b~l@B_;!^E|9UzN3(pimsOAlv?Y`W2Z8%Ff$2Y8oMI4mWp8%r&
zi(u@)A+5X|?~?KvT3TqN0$Yt*#R#sMU0fW)%{ifR-3z7$I%FVdDYo`)je#YgwiaQv
zQF{2yWoG}Lh=S6k0~Q8Z<hwRgY+`_be_+0NYeu@=328Bf{zHSl5@21H3~xiY`5E!J
z#6NGxsr4F*w0<#$pu^uBX9bBUk9^z4VRyj^FeEDf8&w))o__X$c-qsbTq0EmzTIGm
z==-r7Gh_rM3%-)5E0?*0CxbNPqQQ`jDnln&c;)=@y<R>Nf}U8Cz>+htBOM{Zx)(&F
zgjpxtjb64O4X}-qesl5V3!h~gB)kxi5Y+)@5^7d#mx##XlTlwiXLSJtPyzNTkc0sJ
z(VHxS?!O^RTW^u&r&uV9EhZu6{%d=Ajv>wKw=q<+4+DD~((}UcUVM(v_+rCga|(Q(
z3rl|nRPFL>a9t-uqK)yK(~-9(cD98XV<5T<4S78m^x(Ii;5LW*u5i;1$+{m0TD;Gn
ze9u1RRCuBO&AT}wkhpPbOI=};eyAW2MgUyS5T?anr(o3Js&c5H|M`Yk=U(;Sj*`fP
zO@rMvDbYbLU^RccV)is1A~F{GI6&Cz>%YvdBD9eI8pY&SRyHs+l+!2}9Mc>TPBu3)
z%WZ8<&CMl<Q~K|~bS0Fa%uJmAfq|R5J1z=jb6E{NA_*kf5@hvc2}wz$Hj@AR_<ehO
zo8Zxzz>6V_l+pCB$ltE~zx4wANkotMpL_q`w~2tc>;Iht;~xnLb;!B@4YgkaQd$`4
zf4Uq8B{g8v`&R`)Hmz3};P+pR|LY&Y?|)|P|F)lP!AT8X>;9`#BCSVc^73CR*QRA;
zXZ*$HNGK@6+S<5pj~B=kRR8vraH#*AAoj8-r1*&gMrCCl3T^s$z>Y(k9Xk$D%Rkq4
zU~<W!1Ox=gXxKT*{KopWg_DO;HU9Hi>A2lzF1jfDJc3E)u22W)yeXJOJlqEda%!>r
zag2D(Jn?kzQj>l0L7F}W*@Ig-`7Q8*1;s2=P*-<TsOnHcsjLhM1M@x^l3IPn%)*jq
zo=%Qa0->G^2?4>c?E9A0T~-E}GT|)RB@YS;s#m8byUD;~lR`mNo_a_H(Z5yR-j1cL
zJe}GiBQr0L5;QY2v**vCo?KR5E*K9$5kU;vL(xws)u~CjzP{cYF9S%hXUPJSE7fXL
znQEm61_fm`>f@B_hb#XD6?lH5VryBGF*4f6yh}cD;siqS2&t*h1OFdq?-(7~^G1y(
zlZiD+$DY{sBoo`VZEIrN?r4(C#I|kQwr##WzyEsIz4z<wFMYaut<$IK)T!Ff-n*WM
zZ`ZXoJR+jUvOWTHP>FIgA|iqjVYkUoA%T>K068M>8wQ5!K;0XD202B3SxH_IENGA@
z+kfhPz8^bRif!C>N+C0uUd~;6YJMe^=wXavA!mG+iz-HmCi^#_h%&jmW5mDwcXx&L
ziT`)U5ts&qzXi=+MoTHgBfEHJ906m7yP3X_hg=U1REyUH1YL*nJ#My}L1F`RI5^#t
zLoYGWM0z-PJShVIP*NrYSsWetGTV?!h$<j;kl-Gz=(US(UP}x0a^i>3NHCYs8h{q^
zZDFB!GUsuARdhy#s9AIC6c}mH7#vSyRYjAZKN6jlL6gD?AC50_cbHqqEoFa$uo3UP
zEhZaAy?DXlsfqRj`!PfH1QusvKc_PDM*{{PUVzCZP6p4#<tPH**Eey+5!okRKwbLw
z&sU0slDx%aC3%HNGUD(heRyA13uBRP`voO=<q!ZYC{uSh6S%nV!xu8_WhF5I0|<X6
zhah#*k3+)6ki?mpUjcbW)lwZ`t5cbCizi<Po_5QMx)ETyHVb+zP&30S@IX%mVM5TK
zX7Nqd)a2D#O3ERl*OI^1-0~5$r)cL(GQV8W3(Bru4^W;qq)TVrsyJG)E-ydUd~dVS
zjoahf=sKC5bTC{9U`0|CjH7q(J;f(WdT3OtjfQPc(4O~{Uuq(DDoAZkO<m7N|C9;5
z_Oh^mZsS!_tx+!yd!b2uYDVuzolcU+9}>;h4`KZso8OF`VZUO#KVK3!6Uugm^m=#x
zmP*jf$}7W4q+GFLfT}Zs*|It=T#`1np(M>7I?!wW>-hE+DQO5Uq5#=;(OC{89xkc$
zruw*__&xH<_x6qcq`3r|kvsNolieI1&tZkYGQ5w>KSh)Y$5xtrkh=0F{eLRz@KUkG
z6n_iLsL-K==MMRmQBy{IEeNtyiSJtc>(ck09^zkdI#dz?D#?{GwbpKUf)hgZodz!L
zCAWfB1L_2>xNdOPj33$X-Pu`3P$gDQPU9NVDS=er_RdVN5h!8egTa-Yo9WU|lm}K`
zk)(+rJ?rM9S7l^)!rd{dC=blXm}O;RMMS&5T10@LV~htEN{n|#Ja3xBI%;vCj3t|0
zB!*(m*;Tf5h>P13y?JmqU#=&+fM_-kw~3bl<>OPJ>u^?4hE#g^J3GB@*ule};=TT}
zCB|ZB)U21E10fC_ZI~yC{NIFzae?x6yUysyT}PImxbt`XP)b&nLleBvm%0$cg-Ug)
zTrt51yWy(s_3%5Tc$35(e5<9lPOwm0iUJu-%_j}{xN33o<kpnxrmlfF0SE~s_UXIM
zTBPJS7i5?E{kcA5gQB+Jc@Z+wz93ZlHMs49%R`mKHW{g9pi)dEzozrWsNbCWh#TF3
zUpchUib$T?g_(sW+xhFm_u<X%k9O>)z#mg|!^pi!_G<gJ9{cPOco-)UjuO15Uo>&k
z%k*lK;e`4z7UJW3xdGNpRG{6G)bqcI+OfFucmpR+{5lH^h(Va)yT!ip;)!tZ2<7+c
zpi`)t9dfH)?iuD$#z3KCW^;sd664I^RrLn4z!q}&YMU08Dm|L0wP@On6sg2sNyWpT
zcb6zV+5ONkgmb~}zVPVB8Ov!Y0uZh}2`wyM`c~HNL+efP1!?xw9GAbl@Wl_mLmVZb
z#yAW6y>N(S4$UtcL)DuYC-D6kbxly14T&+Ju!Ty9cStI%btq>*F3ZKoVk@Cpm}xI#
zaGt7gvdg23{$sbsFCxzY<r2}OR1;{juaG%Q26c{x6PF)>m<Jl&S)fVltio&)xSV9o
zel^5&hl?}wrvJb@hS(l~D7CPCZjZ6MA|jtr>(55xYX7jL+vHklVv>^TPr^W|=%}<g
z$FIXishU{QhHpKbg2mXz0Q&*u`?_L=YHmxxmdr+ak4P>rE2yO{o25n4MU4M=R0C$R
zs#;SqHgPqb`pr<a#$^|SeFbWkmpW<Yj@uklz{7&%{uy%a@xs3~H>TyrkvP%QKi2?D
zA66>Qt&^Vf29ew4L^3FSFk-(I_LLXs5dM*LrZaw%40o8d4%@3S_OJ#PlEo4L(+U|`
z@eJjF^9^+~yh8_9o!tS>MCf&@T*yjLIdO(pOTrFryUd}tngdUN^u<Lu>Y}d$@oyg@
zXQ-1P?HotTR5a>BWo6#{^5OKfrTp%U{cdh`NxZ&D-cPq5G_I;MCP$EUa0^^jHuy9g
znppD;C}u9;Kj5W9^qjGEoH%OSC+Q7)p#Zp)@5laa6!+V-LJqDd)pReYc-wOBMST0u
z`_2fFTt6w}$$0KP%5>`^r*sb)L9V?SZ!7f%o-BAMsBOv0{O)aX=HKBx@90=rG!7^t
zBBtd266LbZ4xENjAZSsDK0C#9mg|ho6f;`U6j2%?Qfst~6A`aKs+StjSP+I&Pv@<)
zE03NW*1&5)r>3BzC1WeVJAJMw5rNRhz#7%GhY^&glw2Q<{v-1an<X;^9PR)mcVZJG
zRh+qE<o#@f*@9C1kY5+yRD>SeB$^^(Nxqo8Q994&P*ynfWg9a^__fcxh;9I|9MN~<
zC5fMmcIv8G2lqR-Ap7M7Ds#ekCtz#Kupoifpmw>cNcHW^b!~p%JU8oTn)}PVAxVRd
z8!At55;!Ux75?fsbey1ZQ!bvWdDdwJc!}cPCP!_Ky0YXkt$JKDC0-Ge`X>L99_br+
ztD<W(1$8PwhJG&dkBqV!YU}FwuW1-PMx>I+#tAw~a{SU?{jq*i7KH?YR;V7umMM06
zEGvFWI?YCsrfNS+V`V8yorx2HIuWum8C*j;kjvY4Olez3N3~mN=pstgGSW$6a;%`G
zBqSp5%SqI3Xrg$5fRG8*Mx5-OIlzMw8CAz4X=&G@_(yShSwTqy0$nrWv?JpDgl5Eu
zkwi>Gwqx!1KeW(eftB?%;OFO$y%EtMkesA~Up7S+HSi0^1f6DFt6>xlF2s(zd_5M7
z?+5ci?r}OQl&p@JiZl=pYKE$&GMn^R`C#8j4yIQ{Q_`V0vdSGE`^W7S5k9ZHT0&eK
zJ&;FNUKwdZEuIWk8vl=e&+f_aP>~QDFzj?LeqhJa@`Pq;H~*TCm=~#_nkro%#~l~f
zo*IMJ&myfum1g$pz3o`ePw)2kwowQY==rxWSI^^S-pPv$FI^c~_(Flv-!-o+C89yK
ze@~yM=}g8>n$!UCl4$NGAD2F`5WPGHkeEby4_7%Emf4(Wun}phA{r&K&|Q;-*6k0N
z!4sCOiJJ4$K`mhDl<6|h&hv_JCK_U9#lYA?to!{-2b7UH|78_4a40&<V2_*pE66pK
zNMcBCz%&Hd+1f$`oy$Z`i~wwqfBWj?L{$TdCYI#9wK=<QiW?>V{D*|-Bx=44HAT8Q
z{-)1NgPC#x%(7OAk^vUdCK`Ik(IO)X-I3E5I1PIPVCq{aM@9;#ljPYL?p4U<PN*fa
zpk_MTdmj3wxa1K_UO4#rNg;=oBt;dz@rEFpUQN|vu{$#gg&_Zp&K8LQpdH)O>f>+&
z$s#avb(xWjcNs~q7UGnYBGGWfstmuAlSQnxYhX#zPES_{C7C7Ys>=zMQZn8F`h3Yl
z{(Qs3kJPRX^;Xd}R>{pZXAlvf>Vp7!?69$uBH&ov4AFCVf#(kfn|?(_MHl})F3E4t
z%nOZdvQ)K=aIqY(&YKg3id_DRU|{~}+64C?uc9kz8!SEeVa8Nsgo@bQT6Cuw$23*$
z-zN&GnAMm{Od)Qbl)NWTxDY@YqvzJogAVKh5{@z>-8kaHNFEPg83bZ+JHxz(MjObt
z$$D5o%Ia`ASCi{Y!U;@Q7bSZxuVz9=i+EDONPbrh_>ED{XjL;ri<oQTMQV@``c~(?
zv`cbbOIfI`7L%4t0vg;R^($4ork5*vRMkN93Zj-6Y*`-E^qK(LKu{gWuJ8M0>a1CM
z0klVs2=Af@U2+YxuKd1uQj08ygIPxrSx+(T7FKHJcO!kS7o+@xs0ZVkex7^Z6cYoy
zSO`C222+U@vN}>vhDbw-pnwZ&U-Cp}N`j;B0;su{X*-tbK>5^zFyYHX?g|Yrs7>Y8
z0_j)7Z5I=B&xyNPuizs{Rx~5f()|J?9U}y7MNsJi1Quf=-@Iyp(pOSPU0oIRWf{*b
zt$}4jK2!)?t@zX-c9z$$?45~dknpldwCUXsU^EGf63UBC$7m=~cnhH~Ca3B5y`~7u
zlERV<qDV-2j_a1}3@*R5-o<6{1xG27X)tI_ytCjd+2R`3p%Trn<%wyIS_G9X8GbEP
z7~W6v8NO&-$6gF+n2~|o%F~IBwI#@_U~9a*1_C7Fr>#aPr==4NcVpefOY3Yf<wR|H
z>D`D*`WI(%i{J`i!I|)}mfC^!EWW04ap=Pg>EB6K4LF=(#K|>QWL2%H{VAUYSC%la
zq_p*kBCNA158gayyZ$3gB5dj*1)f&Z3M4c%upJy6e2eK5NW&8nP+2Q6^P4?%6VT99
zdL~UNn5j>uDk>Ach7{yxbSyweir8L+#C1<i0o90jIeC|a1qB6Dq}y~6kJG67eebx}
zZ8_@e>-z=<2pR$9w4+H$N#9UV{7Xtc$=4C2B}BO{JS+`?c=Zio7C`ZYz18}qscB~j
z0IZ5iJlU;1L!^bFWQV?J&z%fritJq*JCn?CqiWdRDdcqh!Mv&odMUL5)_ALk)Qm$r
zX@P~JqW0OVv{MME9AwVCsI)dh$N_IAbV5MhO98`a$fbKk345jUDo^zD)}k~Z|5-Pl
zlysKgD%*mDiW)<shcULZBJlXuE>J+D07Nnr6;Yyza9wzUt{&7U>gr258#?MKCU`OA
zBO^5O==VjL$&Ay8iBC^YLWg|L>!0Mv`~e3wj>a9?QOyiuDJqfuj*5n`(}w@%cA*4P
zW@cu4?kq80V^$dwcJ`E`v@{`PgxNdZA|%xSQ>WPu3oO5=Jc8#G-z#ua!?fQ;CsdA|
z%oIMud>^?^jJ#gR#@H&!v2cblPu)Vha$^U(nNJE%eOzOKr};&p1JHPQ^3Phxp0ljW
zjlQ1>$o4vm;bCD!?DQD7OFWF;MrufU4a;o=5tZm?LzVd4g~#xev165i>ym@Ii^a@B
zDk&yFAl}(VJ$&i>uO8>fn3x0oz@BZ-_j4Yw+o0!PBMrYIN~A$?Y_I_q0^!d$4#FT{
zLAWrt$WYDL(R9AZPkf<SR$>y8=A*pGkMqgQiFUkyB*u1K=@MkT+UMxR-Iny&$p4FF
z8RSk>&HLbeq*gruxk;qk)TaN<5>(yR*;Ec^)}gcY%%8kQUqJ-8X>GVhVxc_tJ1-xJ
z#0<7V%%^zETka+@laBhgASD5BZ(iHR*Ql05KR>W9U%teY`jScHRac`F&QhHmDAE3|
zQ>Xn34V`1J8aud~+tERwvpAWi3Y!0`HOqs7f->toG5&Ebh0>6R*X|Q(ugNCZk^MJz
zz5~10VJ**S2+}^M;ItB`pem9M5NhSBrxJ*L|E<+jD%Uv{-D%>;@n(gdz&C~e!7Cd`
ziW#AA9uJ*j|DU#kxPd{%=g4u{8rn!7`Tytvuuay-&Y8b|4RL&5dO-}0Gq(eG7BR(t
z<Pi}g;}yd>YZ>q+hw!t65)Kj)Qdv!H_wtef>ir+5(1R_RKzed|YB67e4oZRI`)j4H
zM4a50Ei)`OmV$@pt?0ZI@;^eysi;I!K%iUC_K!R`>627<c*UtXko*hazaNFt3p^Be
zz?Lyn{+-hdP6GqL9IVvjWf_8n38F6S3*tz_3kt}md+0J-{KE}Ti2pHo6W>4u?-UgS
z7EjTocwq`b+c_iu1?@pBAr`<q8Zpj#2!P0c9SS;Sp}4-`N1>LqG(bY3T60dwj9CU&
zrQT2lS@fKIh+4HYc+*lN$pk%8MC8S{@OwHDm3kSwGKw>Z^?QSaQ_Vok7!Mh@6=@rS
z`$YV_UJo{z7gRF&z7ML|<PcxPJfxaclBaz#W{zs~#VdGSK}1voV%p*QX*DVTKtQS{
zJijBT1S<HbkFu=gV|6ye1pRMuRJ+FCr3CIcJk#F1lC&1+N>kz%Wl%@?Z0>d&+7KCe
zLe0}N6tG1toGZfAYsI0%M;!N`v-#A@vXNnz_J3)CjxF*G=0oLpJA|->x0GSGQnk&S
z`%6-c@z$ntrp=Yeg$q9=136EvlvNv?j9Y6lqa1@YLWTwk=bbrl8%=krwB$d|VaZ5^
zde2?AnM}&ExtU#UDJpw{MbO_%K>gKuI89W_cBWpN#<nUog^&e=XkALy3pO}ODzr0l
z)8$niwVNwWh?-yJf2cS&PUea=$Hxp(`rY3*<tzx;2}`OOrge+MBM_I-MR$pY(p6((
z)BF*D&VcTM_*JxUhfp7qM?AqUE`?M|-0zQi^|F^hI4qIGke>mtBYxlX7Oo*A1S3iO
z@;e<<8;+zm)id_-lU9N`{%LGMAnkBkfq!_=-Vc!Pstz>%x|@VWY=_JyC&;<=yqScI
zAnfOp6t)!<*eFz*UxyK5ev6&Tw*ei5@y|+?WQ>*D!}G@8vHE6ze*ac!OQ5q!pcQKL
z@{p8FN~$zBOw9N^DN61h00@hW8>V;5ceYnj(TcA3HcNoF8lqja5I{`c*CqZDf_he{
zlw2Dxayv79ru&v4=6Dg8G6X^oD%IZic#^KEhD$<6UJuWAF^%#qE|8-Sdppk5L5;@~
zSGTB3JQe_dh*!h)<{0n(dG%6L`NNhV1>P@IOSMrdrEuT7h|1odqfW4c)7U{0jD6Jx
zJL9_$EaF{UBT1-bC)yc!uJE$U4abCmw=0>g6Mf>nLe$wh&SHgLdVM89<f@c<>~_=<
zP<-QH{*1arkm?gX^zq9Jc~Z555Cks+wse$OA(b~5ywq;9m$I4VgN^ZWiq2e<azLIY
z(@|b`Uvs-TF@>=H4I%ZmxhSJe!tQcAA4FlVq=p5X0M)w0oh?yeTR68Aq6z&E9g>~j
zj)XL77&8WEhzOT^2G@@)>aCMG1mAH)EFkOf-N4n>FvQje^qyVrMHT7IyHm=!`l8z-
z6yh;PMyRLRkm*AqB6q|peS|38Y`ZJpH4x6eNqQ`ZF8poAa-O$wj%3(hti-Hhx*?vB
ztlmaHMFc&IU^v{vQF!a2Tuuv&#pam2lU$*;+aGmD9vFdmQp1QRgTe2+7M6}m7n}Z8
zwx=S}HaL9aOQNQuSic?#WrLmYO-FMx=gBf7^0YH$IYLOkfA?REo`qnyLs@0N?3=mu
zvOPzYGm^!a*VU;@%k2K3!S^jF0IX4`@QZQ%kfNb1en3T=OF$Z)ZjyXd(9jCHAe6BG
zL%6XfP0ceU-{kLc>!zrwB_bg}29zSEuE*u&{-b|?^0n?*wyrR(Esvku6{*nt-7>}c
zhabjr$X8aqZ9dbgWaFcz8>eCx1WBYa<L*4?5}Z=X;YtBjVZtKN;NFhV5(_`+ZaS?r
zl+TPD@0`#-_lH7|;MHyf{$4t-v)vw?fV@rbB*_>cN2ZSge8oUbAjRLvkV%MRoZ9=Q
zSs(e=U=t&yY)#t5{fDMxi#Z*N|FAC)bN7{<fVDj!y|tDJ!Z1wYsy7=g+Sdl$qFE-W
zj|`P?ON51tRHNGvG(Sr3w1O~vtZ*0DIzNXOq;3KNi0!qC&Rva*M=-|?*{BLNiR4h&
zt1@~XN2x)rnc;z)$eU`Jgn4m+=`D?X(gtz-_A14{({x#fWgn~6nE(78n8<>*cfYE4
z2OEO>_2G&^yDq5X#|Q386G8hqP*GK2ryWiUo?ypbP`n!-V6kdPD)eK}Xu4LTULO+M
zMYSwq=nF{MF(Uy;lZ44i_@JGQ3nPaUubl`sHju9<O30=QsJo-7#)f2~iuoM~z@86v
z`M)16x6{}F0_ByXcQUOboTwQQk(V<#6bYBZ>3uxaTmD9bAwe9kQ(?P#kSEha4zmKG
z6~VF0bs2O?%c!Q+K|H#{Iu_?|Lf#hF0+A@fkR=xJZ(nnthxG+)mj+kpxHxqPfF&bE
z6{%rih+-<;))h)@5OpVBjwfG^dEFV;cZj=oIrHj!`EP$su~w;nnZ}76Ue^mHU5ran
z2v}6EUNoz=uwqv<)PuS^iBe1yut*FbF2KyGp8H%$m&W&$=DD6GhlLIQ>dwYf5Pj67
z-eXA|CIvIFd#?|B-qU<|LYu`A3}J;XO_J1+ib$ay{YT3R`7gHAQpcJ<9c8w_?k|*+
ziGlRa?Bi9{JQ|<6W2T@96mIknfh95kFK1@Z9??PtP$JqBFW(c<aPGHD8Soh*<4svv
zixz?&TePN9MiitEF-rg0;$M5VO0V|iO}OYum`X)yUooux5pE8cY~Z?0w~R71jumj8
zNT1AP_}Pnt?yslL^PTy~|9f8}jM4mv#@LPSSemU3_7X`B*=Rw6?JWg4c|sK!-__$_
z(MDfD4hM-At*{H8aOYPB`sq}sfdp;()Z&s81$f~5MUkk=a;GmJMr3eRRn@0&qojm@
z3K@dV?pCa1L_|P%?rG>32oTMi)LYtv1B{^>?r;EUjr?80i!KOCf+|Tu-q{7k`Bp?)
z##1f`fXyfZjUHBK=U$$>Pm)-M08|i+_!^NHmz*r3t&Qi}`o1~$jyi(kLQ~*hL3k#q
z=H*gXoO?=C8d2%6!Yc4U2XH95P$89GS9_GKaWubIpZz*Kca76wm4H0I-Ej-^nPE~2
z!s=UF`UwdMQ+0fpIwha;rR*-Om(_YRF}QoiKq#QAbT=!a^EhXBWlVU5)u0cG&<~#X
zMMmeCsPvfkPLOhAuN~~|wLY?q$$uWkt;%-;{^!$G#|npgP<0peNmo@Q0Dinr8SNj?
zq1$8ZPvhR6`x`;}Pv>(wYLQh`M2*M`0~6sS8xA>|{r7FYI&I2<$rj``2tW$=(Spuz
zigMp!Ppw3UG0(yCQYp+)v&QpFOLz;k><8G3LZOxX0zt8PR%!XaeE69|HPQ+SD9Opm
z#A^Rj?8qcgkwODOdRQk$+S@$*v`f}PxfTE&J-8wg|JOgLx9yu{0sMy%?|)UVo{QB7
ziGy?_;GnlmiU}MX+*7HMn%qbkUSxkjNl8&j+8)V2#8(IbLi$H`8Y#YN`i{(|p5fwx
z|5VAKe2~~j*~NLYDdzLJ>3vWc*S}=_A7qt9H{4hI@8}~gaGj^nOMl0rBsZ@P<I?xL
zg7$^w4NYd~N2LYZUJ}Q<ce62fF)eNHHO1gt(`jjOQIVK+5fx02uZ|IuM{=}zC~ykI
z$x0Tx{F>IjS58viMJXm_y}iB7ud7S)^Yi;00&-GNF<vA34QoBZ+jVlr@8owBDz(^A
zygHRIf}5$(w>Fqwr3%8#j>o{-T@9xIh4e<=_iZ+G6`mSRk}j5q#oS`dgm!bD>$*Fh
z^=>y-Ym2yt7x!%`jUNZR=OQ=BK(Md3fa=ozwR3~0@^~vl1(7Ak+rM}<l4_YFwUOX6
zLOWjCjAxb=77=lOQO|cDXjPH>`?ufL)>a}xX676QK%-i}Rx5_9NMJ<{kY4)>8A`s{
zjjq#+J29fuo}k=<Vf1G8>Z<vAyx7I>*c0IX6u|ClltQ)iW=%Pg^HyisZ>qwzEHyWO
zXlFFj%0~#G1u5vPr8?a^A+DK(S_5V6=%KpobnLjQBBCiO)~=;TkC+0m1_lPw8SK#%
z+3o>LOX?lZ2e=WDk=Kupd@c|GV|af>uG$Xw(AA1h3cW%VrFJ)Vmefkq?xfhJ%i5gh
z{n_HORle9zJ)oeh3&!onN0c6>>|V#{;PqBxX%WO2(7D6&j=ZAz0cS%iPImZVx$S2C
zKxox)(M}Jnm;U>WereZ&$C1zgs!C38Kygk@D+*EUFoTaI5P~SjBC@gOX!I~W=NPKZ
z`uX@r0mE`A?B1cRNe?L9o&K}nh>U%T?au3>4>59AZHAqxZSOfRF|qUc&iU)*R?K1c
zetWF1{zE1{XW7S-7HduFXWx6O-atNISt0oETt7YCj_gyrrtlv>btR3Q_|*CjG<e)j
z=e2!TdB>>kep920Q&S^Kd+ji7s3*n#@P@5i^PpSYbi@U?5iAcV_pB}cG+vn`bbOyz
zbNmdgrF4GoP|9Qv_SNyl=U96px4La)dEb?=9@3dGlJoApP@GmEh3T1&STI9DOXz}h
zi~VaafOFyd*n5HB_TII=W<RdN^Kp$P>6gh>$!ygLxT<m4ag)|+!vqX%bS50r^wUfq
z6H`)#q0^``8uWavXg<KH=y<VIR8o?VlFHA`1>c|SNd7E@0JN?Tzo@)c)wTN#R@(Gu
zHu`oiAJa}?&qVt7RvvVpGVEp2h)uPR+h4SM<IxG7YH)c|JGl*BzYQXzbodanEbdpC
z&ElnmXpjB4^yw<^UFDa-c)dk-UEO1`Nf?Q{@EQNC)L$`X;MIgi`DTz?RhGc!$qH&@
z8^mdPtxV|J_}S115fO9T@Mvw<5CzS<+D|<-ejOu#hLu@<|3H<C8q#tw_dtinTb&sN
zu9F`={F26c(04-X(W0GHvyHrtM;jjB-DXY>pUKQJ9Ak;UZJdcV9(3;4$uz}4uH=4=
z`)_E2SEYnI*{}3O#>=cJ2S187IYQlh)rB5^Y;4_|5gG~SL9Q#y&xxk^+(VJAS8QEu
zkSnE@cTYdsZg}3Z(VP1k3$OIW%-^PIEJRQ0bzrX!K#px_MwJ@iZ?@HkT)6QJ3myJS
zYbi+CNR25FixgP%UQ}_8QtY!!C4vzv(wAx$kanh~q7$2%tOv5OQM_=$`?#k+^kvN5
zw*@zD_(UL~TRoi&+NhI2q_^zYx4(!uwF6sykeVfn#CK+cW{>}Pzdm@q92fH3O$kL|
zvxGQJ@}~MjK<AZEQ#c82CE}ztWx^E)hA^ADYiT0>$k>?B9)Y3Y=1Hn5;?#V41)$&x
zi0gAwO*4z5Zo{rOJv3|wi6QTmbjz!%h?z^nZJT6h)Uo9J3e8wT`P_Lmo4nRJJ0L?t
z!j)W{I)J|4P}y@i7aR;?lqWGq!3(UX4J<FU#OAX7x_~IPTveNr6z9&3fGarK)_%6G
zAz+?C;Cwrmn4Km1GQlsZ!=1JV#lU6~Y`sb1u))RaV5>PAfXE%#N@~FOB>iYwtA#x=
zpWpIrwT6!bDmE{9yFXe$T-kF#ha)VmfdreNTtRCEOeUE2bstyv(-_GEu^!720(ypd
zN=VF6_mXr6HStPp0Ox4ZUxMLUL4%>9^$#Za_H<qBLm{~l3oeV~6_(iJHY8M|!J0_m
zl@(jkwoTwQMzVsQ=Fr3%o~q1CT<pPRel?QePCg703>jB9p$Lj6Hppoav?D#^W=C4v
z5O<E-pjh$uw)fAw-~N%UiG~1KY&+RG*3UeA1qYobXJhy`o>%)m#6RBCJ`WdVM1Ne|
zT0C&YCuMiLI_yOe?=UUAK<i5uh!F}142;#ZKHusop>WC^mbhR~iX$y<=FcD+9Wr-s
z<BpIKgmPXF{64G><lCOMq$~onueK?Sn%@!gdK`8C4D?0md=(*hF(nJ;I;LIK{KA=5
zQxNY%X9S}PzDB#GE>arCneYbw<#?VP=e+BOm+n-S!MYf;IB<Nj|3kRpNK#mxI`G}>
zX8Q)BNo#F93qNwH-HGiLF!?>5F{Ht@*66)(Y?^+zMYlYh;WK?WTUjx2XZoaOxsDls
z9aVsTT(<^Co1bm}FLaSI-8jv>ggCPwcukOuV~xiKLzzWefQ6p#aIg+4e=00&!;bk_
z?opWY?0UU0C=D3J<<A8(RS2Iuf=5b1KCa9)i%-M1JVBhuhguJBc3o>q)X<q_>k0vc
zWkGdkxr^5;rH-cyv5qz;PSxRXQ#@Ha5D+*JL-c&KGh3wxm>mcfOy~;7kVJIpI8k*Y
zpT^5U&-RgmWpJb>kZ-<amVH62#1IyClnZ(K90?so-jZz2XyrzKJ(>S=dqfOXkg1B$
z%MZeay_|JvE53%R6B0Vl^H(hnT+*BB-;{dS=YrtjZC0SKdiT^kW^TCUT&#jM?l_U#
z<|Eubv14<#_0NM+mvrhAnLpt@e(`&jG`@97B|dJeB@1@a>^fYe_l-(HG3EtIYG}iY
z)>&@<Fp$Cd3+}4vcI-;o19!SfaEO_chX_YpZSqBBn*eS`yRMTCjZxwlOXxukTX+*w
zVDtv2VXZcbppplHf23K5s^vt-FxxXEOjc#?Lp=lqAgEZDTrxiTbW!dlIPoh!LsW9@
z<}ANV0<n-vjf7aTN4R%=&pO-IY{!L@i51?VTyrPuh6%a7E$IcKA7S?0!t(<1PR=v&
zdT~Qc*zudu$2|g*47Y!l=*`kPir4iHJlbP>(nYStTU}Y^R?EfRr2&QSEGhXI9Jxi8
z$q~o}s3(};tj)R39bX>G+;VA{-FfqqyI^SQ9w!@X8tQYP(c@_!O}Ets?_9(!h6o01
zg1VtxLu}C3yT{2Wz+10$d}o$J&&2i@*K`49qpALpt~RLr0m`6Dqsv};s-C`86>eiW
zKyA~BU^_uru@I}qcZlevLtHaStZF~IPUyab=xv)EDRtDOq~xVAk3dCbxzUbLK|w)S
zRCLF-=uZg-aUyXwP$p?_?%Nu5JeV67_A5&<thwCgf`5|P-}nvCZ1BM5<<RR!%I5%(
zkck#{ITJn&lh53TUP@6wk|fPiT16$Dm#+|-F4;!|+HidaTohp$mt_p5M17-gH-Kp%
z+4w>YFGa+eIi&9kw4^DrWt0$)5QXB2!5JCh?W+$H=oiry#a6IMxK1VQ0;%TM0ut9>
zHH=FlBCl5h!lGdYPRk1N)}(|b5!mtYmJ-7a+^RkX|IU%-jPr8b|7CB5`NRnSI)bC}
zO!f^$EJ!BbeABgN&ESvl695>;4=M<tqtNpaMT=uXGhEyrwop>!s2&!BoKNM1DPqcr
z(tv}sw`h1PS0EN^92Ejra)O=*2rM3^>Q0CgFPi^T@#kwQT~wOAFON*}pG$83K!ZHt
zhQD?hjFvYuOG*Gi%fW`A=kN;<huSsAtDLl#FWmTjXG&8;w}fWIVO0>;yr>@+M<i}d
z*rYi%EXmxuX;^Yq!XZ#rTGDETObmR>VL@K?LF>NcicjOGbmGX!h)~AU`$oGX=mmp_
zNJd2kEA#3EpqI7OzZuj*ZM^Og(POsXDU5>q@Le^!YI2FAeZt6Ox&Fn5pwn;qX@}vH
zI1qt)(#D+qCgXLr&EVYr2w{6d_+7FF6sQn=N$kW*duz{llE`%?Sc^>CoNpyEs>fe8
zpfaddf4W4@jvLZ`1KIF5g|cWeKQMVm?ujY?QT{=Rw@L3>S|DrGzu;*9EsKuaa12Bw
z{)<8oP}2Ur2iRLel7EJK4E;MMg7M{KoOanQ@*(~&-U#ZXV?<&4pEVNX8p@+){?94~
zI-P8AS05|*wDo^pyPo22X<`4OGEhLIoXc~2H#<q#Y(GL6VQHK`G9n352d*CZyc-&A
zDVO@rf}z9C))M?Wok^qf-dNeum(0=6q4{+*aHN>e>LRW5mwWb;Rt+T(s{IwlUm%sz
z?oOFq&nAhRgw%-Tno7ze@Aj>z6nev9tMT8nM#jA!#=lt7!PdpVzpbk+t5=2VEn=cB
zlB0C)%BGH%6(^?G>yy1kmWG`##Sj(y>%cE6;9|)A`P}Xgj2@6akk0N-*r!pi&ks0C
zDTiUHP2+Ol9#yR{9>3t;(JK6A$v3UoDf?ifJ&?kjoN}Fegve#B>jUPQAsj=ifymXG
z{(SC6yQV4beAp1A<vY34Prm=!Sp8#FKv?i;Iua7sLptXU-U-7lS1`6f$Z;qfd3$Zr
z4N#D%Kqz{MVbIB7u--hD)d|kqz^3r<i=6>DBFB=F(7+Mc^`H}8Be^wfcJWr<)RP!~
zt>!Q4S`Hi>ONUo)b{O2Yx-kW1ModiW^rE;=;anMj_BZ0&lueU8u+vq-zAgOhscA<&
z-*Hy`xPqKjwHp*S7m^Gk%$`9wc)wz+UAPpKv5+&|n%*B?j~h+df32>Uc#G_W?kS$g
zsLj+kCeZ8?F^u=_j6EJ*RJg$O&tZuz$Gw5IL=V*=oyYFqw%5mk0$IEp(^ler3Evt?
zCFT|u3>#NrVPU%&5vC0l6Kk_AHfevKRkD*5`+S9d{k*?_$wDvtd=RVo8yKq!z3TfE
zUyhxTezy(p^)!QNEnR7e1lE>TBrGOIVnVyM-<UdMzrz?%59ly^-f)Z|z*ZhBQ`0pQ
zlA+uN_uU&=FMIvq?RYbW5}|-A2lA-fe2@x5Dz?30Ze+)SbE<zFe`QDGiit6hWWVk;
zv$`4>{06`Y8z)xEX-^^SSPn`@6LU5PD|y3R54mraCj8{-q}_;yw^zB)9~oq!<fP`k
zO=sC9X=q6hcd*%uo>Wu#Y`vH!GCS8c9b1y#WwK~Kdymy<>x{2TGY@$4wek%lPwBj+
zhG!uagz)v9*KTn@())Q!o-xwCHO(j;T$F}I+Z^e!8@Rt`Qn{V~sJlIStyfcDb-Y!W
z_S!G)x*#q*AdGr+i9E-08I7!=WBv^rU*PvTRFnG0L@Dh^lJ6~$+2<op4`YA(&@P|b
z3U?Wt&iwD?!TYrm=hV?}S~E;Y0Xhj++x_v>g2Zw{B`+E`#{2x^y~vkm*2TUyjoYVR
zZ?At;JdqYzHoYfL#;8kfIhgK8pM9Hk(StUnc+-1z#}AIgZ+~4KZC%>+UU54#bzj&G
z&a5#To#4=?!s{qrJw6JtBl6f%5XcDDQ;QcZl?`^P-~usIM}v!>w(Sz9+jNaH5Fr8h
z(I;;@Wg3d28K;Ba^1l>>uTBSHqPMQcl%!z+{li0g{}OhP&+<F9+FL-CjOX|@(PskO
z`g)i5@4P21`)%vN#0Uou%mzz_(n4ZvM~WgYx3%<|vvj&KuLR9D1AEKXhZH9chN~fp
zt>JPFE=iRU5WqUIUZR^r{88tUgA(5>+m%@oh`LT4cNP$ot-xGMqx9q%)yXn#krPM_
z8Z{Z$g3q|V^{D8@<Ue*>J+_$Nn2Xm$jN6LEcin*+?Ls;qFm5X}oHnd21^p5_lvza^
z)VP}&x%yoS>NTPKjn#_7HUxl$8r5mI<G{_N4DT8lVWAl&e$-EvswX9RJ4nL|2Xc%#
zF8@^nyk<ZS%DBET&yc*%j>?HbqxDPLs}t2gwG4uPd~inI6qiNq)Lg60HhvExlS|!U
zBvOZR231ah7D}jIdC%B<L8^U%{Dx;N1kEFhsmk{w#zrY!iC_rvkyre)DIbD-cDHYP
zI-c(1X?a9kDv(Jo%1C+g3a}Y?(ZBDSpU&I>=1W^|F;?yhz+4BV#)epc`IY6w_D*VE
z5<z@gvED?`93EMb%H%53b18p<OPL}ZqV3M5b|3XvUsL|>=P`kH;dP{|h|CscT*Hev
zz{3`!!0V+qw`RMhi@1#Hms6gCzglXs`1z}Xrx8#>l6~qKx+7<Yr2PQ(1FlkEJ62(h
zl?aBfrRp&cd0EQ`v3!RXOBb0yXD~4NcO1VS+4qp#tPaQ2n%;%z46#eY?G$3D%vIF5
zYG}w@O*FK5QT{N#kzC7ue=U~kCF><x>W~8gMLKcuG$06llfI_Vav;c~DYysmVWnke
z_CCSseuPN8J@wMp3ByCPTYtY_IJC&%_0Pe$5V~;VApGfqeZ9bp;d70YGdbLkF(saQ
z+PPDVVq4Ju_(jRJ)ncr)V13>0dYY|xQ2EV-HtPx!pk{1T+hDe4)Vp-sPrCDQ{ZkFt
zX@8kS-1A6l=4pZWnk~DRKUhIRYsJjqRTK3B<qNgpLAV%wb#w1>sWeX!<1Lkvd*7NP
zmxCQj=gDOk`x$jd9^KK{Ievfc^nCM|PWxs*-<dXhGEq*JxUd0EN>T3Pc}NODZer^e
zcQdy}46iknelYn3dBgJo;}3e}^<9j>+tVB)7+h*O`Slql(z;-G&wd|52WF=qSi+YT
zzzKzd(G!7q&DV+(Lr2Nd<xZC$28+4^aQaCVhk<V7HMLy=Ua9czd&AR9bWrJ9KKsR$
z3-(<L*{wORm_D=Q)%3p58G7z;`_-vjjV36aQNH2F7QtT&W41ad2>(QqMPBCkq;nnb
z3qN!OQDir#XDO9pvDNUdx|(G+`H4@-CrCMHP~jpcO`X(8Rc-gh@fy>9#zW_1iOG&>
z@Lcx+5Mp2kV~f}LOuy5Kt#{=k>xjA=V=2x)t}*?>z^8A{2))1(nyW^XVp}fLDR$gW
zOEErtc~Ff*M_<+%%aq&LYVW_D4&j>&g7%!{a;55QdnCA>ofU6CK{qt<gHrXnhuWlH
z^5<wl=lJ<fa7c=;^V1|UqSTm%khePI9s1_j^YS!`vWUD#VbHB|eME~)cHrj&3CDc`
z6Oj4&BRDlZQCDW9$mz&pT0ONn6v&a&<+X=zd*)$17?OC;*WRnf!ZCxEFf?B2E#31%
zD;TJFG}VG2bGu)yt0ieGfsVb(0dU{{Tc;LC)PN4I3j01a*2Isx%FYbp;nJ~JLRve#
z2pZ;44lVZD2P^X%sKP)oeH=z9Ma^3mfwtXG|GU0W?M?DPyUiyc8?<G(6-QY7;d8C~
zGW$az`cCwV-{C;Rl}mW?Wnr<6@2@^cl2vrQMI8a|3R$5ebR+OZpAL_G?}M`<au0d4
zH#Cht(!%C;t&y-ByY4u6ts0j%D9cG3i6cAK%2SP5_p4*<q-N^sdaexU>|bfWpOKj;
zj>!nHtWBm{cb9RzQDWDpV%twCYTCRgA9XTGQ8k{7+A$~|^%1RCHKZ<Sa&`+R?TpVu
z?c_Z-D8|&U=+7T34Rs92Jgf>?Je9C2$KQi<I(;E+R+Pp{th(prd`9o&Dh}5C7jK64
z&x^;_hU#*Bc2b8+sl-Uk#+Av(X$^+>Y`5DgJiI!)b8stKf?l2{Z|+z*+&)j~FFdwQ
zMekYy<n&s@*#%ZTZjaOZqB?+D3<ze+CH2M_tcu!dq3xUbZ_J-UE9YAMKnTb`g>+`V
zgT6QGbJ#qrCFmswUHi<}z1^`4vZN;?hw02t^sxxnMjNqw3bI6O_voD5YyAwj9mf13
zI8v^A`cfx?n@HoaI!+Kujn2l#t%22>^gbI&W4}|N2Yv81e=0PakpX_X2SSq3akZLI
z$`2+rc9Kh-cd0C9Mvu2=>$$3->}?KZ2Yl82wBWAH#2qV<kUF~CGSZ#{IZ)d_m=7DA
znJ$~Jtt~tN0H3VhR0clrR6nQ!-gh|ccY=ddy~C?xmd0<5$I$F`$0CJQ#&627G=91h
zFOZ$g*Mr5ht8tOAdzHX}!5rT~@OByqfcK?Li>i#P4dzcEdyW{lTCMrE;0cN7%>+Xy
zqtn7@pUr1-I6RWROtW8Xp^U-7U11e{c3%`?aMKA(+UqDO`A41K`#vICxd#7q*r@nC
z8tq4iAeEG^<E>TLi3cb>Sho1)*kxK%q5siB{8BBF{6$!w^P(Zx4`27#;(i-!J{JrC
zpKq*F!rI=2`fySXIkU}yDNcM<vCP?8q0=^m9n*DS>ovVsDw~RG#JLVA|8V8=R*Zky
z+X;!Je=|dypy{Vr`ps!&oA>0pw&$x#)G>S5YL0IpuII|oW^)7;pN#QIRP-DKHVfZ=
zA@4TN!ziuK#{*y@-nF{ACMHhT3~<O+#b)Ml|H1Zl)qOffFTH)HD&UTk97r-M$fL&h
zOfY*Wb9h|MPTqb;C&K<i1l-&G^Og{suL6=~^CSDIlwdnTH?Zmbxv{AuvU^9a!_Y{A
z6I0I(_Id<q!6U@}ROQfdxqR~KX$fPzvSr!p{$jEZ`BJVl?%+}HQ1_>o9ryVpUnJ+U
z{`#JTvHFB*Pi5zoxF<AM$Tf$Z0R5X-y2qJ|RA1wTobnOaM2y7lqO|OkuxWoR&QD)k
z9Q;e)oMD!O+sOtM>5RH>pBF;Q)l`6!8gt^neU15~R29WG6L<l9VR_=WasTjDlib0r
zpLdq|g6=;;#OnS^!TX`Lgp9gV;}%t>z=oX*z=L^G8@((jDuT<86mD9RK8K+EQK#iR
zp&1?>{?1W}P`Dac+8sD+n9FTO106*lWrHcCe%YXGI&LT>PHB_(7U#?X45_sG(*U$&
zLo4^9z?J%fJ@psh08YMbK!?4&NhqFYg~hrs?2P9Oi}`f9b<Uw{ba4TPupCfENvW)O
zaV}nX03KhA50D5i`cor8%t;x{6qxVl&MmflrP>;H;`;qD`V@ixdQz%78dthzJhhL_
zNmU=|RCLt5b5pvr@4MRVjM*m3hha2w&Rdih538k5S~lE+DY`-I<>VCxIbw`BeMc^z
z>TeT8ylqRedRYhvh)vU&<+Gt!Bl$uMF$C37qVg)TUZvd(mi5t@=2I#luYYCdXMFOp
zR@x6YWFWDEPNtl!D*+k$eUtx$+Rr}d9G|gy*dHG6e~0I`Vr68uW^g^fpk`?X8_Zgo
z-w>4bw#>A;!0(OVXhX{pPKEkVO&_V;H)Y<V?H$Br>4*k$L}~z1lsFFo9qMhF=#iMU
z)U5=m2Kg?9wo!O^NPSGd^8<NlQmXY8co%)&U<rM_5&!aejk2p@Yj~iRE43s#7d=k?
zu5O81JHxxVp>fFHb$nvFdjoflN~wmb%XhM-(s+jAU7`2}CtQy`7FXpsa$2*jG82KK
zvlCkcWJ5r3uKaq$y1+`<`Wq)2r^a!;Z}2`(=k{B2-Wk62hXc7(=WCqCa%=kQxO5Hg
zH;yf4-KR6pjV8tI*+D+T$<B8h#jr~zAkqc#4K>1xvt$nvY2&3_jvuiklK}e^E3EmS
zg}-?j(Z*)@UDyk;w<`jP2O_rwZIL(_pI2n92^9yx?Q<^^eg>lfj?K8uXVnTUENEpV
z3An75JCd(3=MLZ7WdN~76mnV@W!~1AKZA>Fe{P>I>TVy(tfsy0{_1kQ>lILqEB-Tb
zCYoyegJ`-?3oYIUom0qjy3>>-(sdCv&Wiw3%W65NF{Lg5De8h~M*V5E#Sw`;4cC2*
zTo-IOP-*eX+)t+0=!mi;`ZtVyk~LZAw6pojM9+8@*Qe}IHfzQ}*lja08@S(Iwvk8G
z;gZnc#DfwnjKwh5XIoCicqdc86(-8`f#S>Jd{t*#IOTHVW$f2)7_vdeGdFM0%^fDU
zyZzPRjf0V+h(#S%%m^?Mm;HPfr+p80m)rUCtw%hlQ!dVV;q~W6Zm#%7Kg8l1YJoUv
zo~RH!?!3TDPIGr@2oWZ#73RR=<t+CjINt)a0jG<up@XmV2BJP-?@;6@)cDiyCVpN4
zu+$+!y$dyLOkYt;nqbcyVcj;T%DIM$$Yf}Y&r_%?PLlg7cuiQb*25le^DIQ2lovt>
z$|W^gC=!{xjevZM+1XS%Rn}%ddsjn=NoG%9TB`~Vm2^9@0-|MiP)Xv#49~_NnID=;
zXRd%4f|?CP2>6w%T`P3anW;rJ1{nZ0s^F_YBQYtpDn^>viF_rb@tbL<!|JN05Ce(o
zpn)K#L8EqH=dAcrzMTA&@&vuu_j*aZ>1}^?Jo*SprzMrI<$#A8V=HExN@sihtOFXo
zl4K&bZ~X*9gQ}=fvyBOrE@T>zS0pY^=zoy-?li@#HN{pozKpQSQ#V#o8F8j+TbqpR
zu!?d{3^e#6;sRG3M8s)YNcXCo#Xv1`<wDB@Io~W!{Gw&ebYu%_kqV_xRei=ZTEm^?
z^j5UK*WB9M{vyuC`Rn%_83<z)FMWmbY|Y)KuGvWTvDMlQJL;cW4o?w>?u*}8XuF?v
z|D$<p$0zA>xlgtoz_DYJzsS!fP2?vZiTSCT-*la=APhFu=hcV_r~-dI{1`fG>E`*U
zoDPxzLt>Zv^q;>`&u;U8=@8A*&)f4_xLD#p?@v`|H6h29`2-|EZr^PgimkYg7}4*A
zRNGv$TGmOzn2ok9pXDL5FL&9zXx>Td^b!Hh$)fSO=tKInG&+}qF*2nMwP{{NEB5|s
z=-Rd&=&fPBu;)}17qktYkDF+J`xxjFZdkg$<;Wnhf%ozMP$$*fw?c&JVx_Iaa)-pc
z^oXRGzzt<1%7oAUm6JXH!^3DBnYK90WK<CM+S_*j9(v-&g^tyV?M9M*;}JtH$CJuO
z!C&}+J2d9+YIysHjV<M;AN0?RNu@>?3enE+3<8*)QZu`~_(Nz%kl0pD#NWI8A-U09
zh~J$n5Lz*effdwm8CU;=Pw-|)^0DDgPq679*Y&;xp{%{se9(;ReiMG!v==FA*pfN=
zE|)FEcwFQUJ`O=^QuYD<q+x=$&viy4(VbO|*z97Jw;SLcdv`bP-YXbxwTt_)oYWc<
ztNSb21X6eJtZ*sEhc7n9^?LdCGU4EXVrnMq$4~FCxYWDZP5yOan|m$T(M`mP&AaKo
zsQ9x`pWb?o^XS1v*YC}T*Gyll38nP)Z`(DnZ|8W8H{LN8Wj&LtY<rtOheMn8_FISA
zo@MAiJAg$$F|W2r+!)JTFi+qEsMd@N%^KBXyni0heMB^Nyd(?CficmEUU#*U_@P>N
zOSms~j_hv|5LKNf^SC^NHMF_$<&@F<UH}Xq;Sz4Y_#4n-`Tp2EFZr_p7;S1L*q^Bw
zL?S@^Bhv|9*G<}1_O+Nj7%7*zh9>N5>%dIx#lhe@^pX2I#hRBbZE4BILGx_||Giz_
zs0-mNVq9f&a(rb+ckiKI7;q*5H`^y?TCAQZV+eehlxyK;#G7MA{(QSF)W=wukVA1G
zlE-sjJt~ZTjq$@Izz;sVGt#@Uv)cqv5`N*vCHK=C5@h-dg<>NtJrCxv_qo93ar+R7
z!x~kQ^PcF>2lzXV6qtVVwDo;+QoEUfx2qlB5A9qFZte8M>CC!yKNyc)QqLpdeI?RR
z;~k^JuXTT{x8vMGB&yqQj`B768lJKdwR%hYsQc?@%G1v^ZXY~XNrf*E)l}TyhKf9G
zO&4b`9ZsKfeuq*x4GTRc;t&LMu19Fm7(6HGEo)%+Ct4)h<5K6_HHV(0--=r;4G5if
z_5@}*O!|(SU}|@*q;70SL>A6?m?O7@P#SKX9*-!1R&x4xyN|S5PYymfykO2!KGWL^
z!GvBRhf=r%!`@B3ZW)-yc4szZ9tVchjsw!_PjsHA$=oIXBZ9#2waV!V+^=<KqWgUw
z2(8o#f2ywzak&0xy~<fJP*+iTIA0Z0Rz{1DkMH~p1X-diuo419RJvH1m>3ZNy^Qh3
zkSg)MyG|{Y3j8SwU>XWwpl##v=-3GO<6tTZaiolFh~umRit_US<UJNde3?Z7MY$)I
zf{I*h@|v=b7?cB<vYd7dvJM(=&;BpAuH~9ie+wadCv9DhezMAlDWWkVN*kkLJIg#q
zv&SjZo}e5uIk&Zdi-R^B6N4ATsIkPEK#Dv^6Ep|rBpNHLT(75AY_pB!cRtwFN{THa
zO7kbs6^V5`bLa);6;aj%<ysw$52`AI_O=VnPRZ!`6i3`Z=QxmuT#U*^mb_q4{#14~
z-duYTdbIp~%uS9OQR29xG2G$I5%0Y}v6!-JWg#fS%RHVjD`DAzdF+;CQO@;=Ht+cM
z9Q*W<`^M&dn4%2n456ebZw#Sx`?s-7lT&#OIIEd3zljjX=*+s_#cw&0*n4b_Q*eoc
zgw&v_Y%DE3d$qrevS`CjDAu4ZFO2V@$$|)RoaR#I75n9ugTsxDjR8pY+|n9Ldn7it
z!Hfuyz(6_wbY5nZp{Aj^{?)#8?i!<gDV^X|TM?rJ%12@H|0pfv91UB(q>TS}lLG}&
z${)=C#E7Kt|MT2``@cy6i2i?mmc<>JmE(JFqy21t0{u1Uia@Cqx;8gI>m-s++H0S;
zZlg&N&qa^)xDztGPYamXXaauH1%Oe?WQ<V!=*60=Nt)FCh>O~aaSli1xkxne#9%r<
zT<?20?YiEiGaVS+RG96cknj(6V{yQs-47Pi-7myeN^5D$Wan-D2KXJI+c$^2VW1&|
z$EzhqtTg$OqqpzRumGymK+h+WF%-32oBq=SJUO>q!Uo%8jets~mE3U>P|4yjVf&`#
zoNptI4*0movh(7|vZl+dD5hG9krlycyJr)DJ+HznGhUf{C%v-~>-tPJX3KDYPqs5R
zpU-H>Rkbg;-Cy1HcuyR*W{5Nt&LNdleH)TuXd9c`M{3DleU~RV#;$e0X%FtZyA+Gs
zf83KJDgF5h)G@`gK@EsqLLMA1K_=M!KRmr<R9n&7c3q%_;zf!}@fLTN7I$}d4KBf@
zxVu|%iUxPL;_j}&o#620ocBE6&y2B0{v><vwbp&jc?|=L6Tz~EKbyYbv_puh{jT8Z
z4#th1_CBcwH{^{X&K$WnjCnj7>A$$Z>Xe@qLI4VXw1%T_&$pLjHFjbw<(kyDo3B$Z
z*ZQhi9S^XJt4jZvbmfR1YkA-F!?j<nn_k25&QkqNVY={)Qm_~|KhNSB%dQLe7wogd
z*Bt*{ZLk&3#CF74imT)+SMl~{>$^lTTOz}XqrsAx+Z75H)I$g-KFq>~<zD7FLACR-
zrC?Ys9eY0&5PXGrQI9VNP~{;L?=aAN+!*lRy%CK_{?PzyUg0<sl<Pl#+Qm(oE|Jjz
zApH~=6?};p+rkN&vo{(EsuV>(6pfQCV~gn9?q){W>@*#s7xLTNM0jVA!h}Li(El<N
z)q)Bz6tXo0vLRZu>nyPb)Ts_fqfK$QxG`8Wp4?3vW|-Hw)e<(}P1h^3>%I0y4ysja
zJ<SOaMS9)A^HKnvZPTT12!n_jRYdcjPS=$t<FKHIyA=$4EL8%$vzfF=->d8<yL?}0
z961OAj5=S_=_1@}0V9~?<U`~z^Lz&^Ch~AxT`wpi6;yMUNIeri?RVR%$NX;+XUC`I
z4JoW|>y=R+dki5V<sU^u6F9f=-GCi2_jZ5x&lHN83&bR<E=WC86;s-LaDRbYrOHMu
zHto3jd?hl9Y;`17)*AZtZ<rPPP8GVyncPwAefh(_aeVj-K+UaMlDNn;AQODW($57Y
zD%c$&vDX+LIn}B!syrTEjFT~mwE<P)*|R8s5oJ0zWCja&JM%O<Y0M@_LUw*hHWx3r
z#3!!8Szhipfk$&*ua5#Xv5tngGh(sVSM$r>4<n|&fca$P^zN*wlZTxeq?}h*0$W~w
zS!+2ADpz8Utx%n?%4tNzxxcHq3NL5&H$`47=v@ySk*fl|YLfy(j|oCBEke#G77e1o
zl1UXggS~gYYxgh2E+~l(3uh*8dt&S;hyDovvTsNtjo*hgaQ7}B){g4!-<f!MHLgbc
zVXH{r@!|4QnH>{@M+JQXNy<LGmrByAxA%Uu{dggGG!!~p%u=qx$9QzgWPLoVOft)v
zqTFgtOedZ@5IhXyANrfP?GnP9i{?9Ux~|{-Azrc9FC36Yb745qibNX`@oyz}@cQe?
z-<d2`^D2|K{QXn<DiQm)mZw^x1$zDdgs(O~AQ^u+;*uK^f+IC*?MA5^Ef#Yg%v!kv
z)go~~-nKY$s2rxJ%W^H-URxJSO}XoYTy@R{1fxw~w=Q9|IdoE)%zF|Tu+^Gj5cUyj
ze~hgU{}vlvQd7QI{kya-2`M(C*R2oB7Q4esYc4yv`mjaje8QVTuRB)UfzRz@1ZRfe
z^nG}9yf;{8ImaLvzPTKkM^O{Vt@vF}#BS&WAAkF~ORGJ}Hayko>|Z?p!<>%p90&Y*
zIq4%Fh2NyQdbNR+d53gZ?pJ&Vu)W#-j2QhoD3YAUKg!_ehlm3IJ7nBCmb#Bje<a~2
zo{VSi_wsbk9<(Sezth-E+C?#nNC^)`M(PpXtDMa^w%ODSQ6^+zht8i3kYEaT2@Vex
zJs;#!i){W1O0iJho4QOyS^|}RO3mGjJY+O!saK&aT5X#Ba2SKc$)Mj`oDVCj^UY06
zSot&v{s*>&1;}&Rx|YC~B4R>&61p3Kf_gz(R2h&e3t&s;!rAWk@v&|K%ET@czBI>M
z{Fw~>J_KXE_TT*e<Ic+%(;<!97+uQ|+g1MzcSnNh^=krNIX+<Gczp<PBGy@~Fn86a
zW;DFXCoY5#NIKoa+#;is+pjaOkxds;4j8$5f<i-Pnij)FHb-t<>Gj&v_E%X;Z-1}Z
zeKt`^M6}}YCpk;3Nx3kd?*+g|;fZTr<lVZkgMfZ$@@kO%^>codNYwHHVarsEtX0N@
zKa2&3_>8+{oMDoZ<Wz#cLr%$8P><x0b%<BF%xAVBTi2Za#Y*kIR2=IPGukOrjvzBF
zlE4WPS<5aXm+~@GjX}mn`(+6&tiug$l)m5Ff62WJs9hO@zp0tLzO3I8F$XQ32OjQP
zklCErwdZ&8GaOkFmZBW}8|MNVjgPDaUUX@mx>ZC((U&h}oRB-z*za27FzJphjPbYs
z^ywj?&FUOqIle~zTUv2H?-!#TF-lAx5G=G|?Bs+-!O^5CyITZa{K8j^e*GpUtLcXb
z7fAbKsUiNZ3kCdoe^F2eT^?;dC!xC5^e;m$Pt>DR?d%m68o$!hm0B#$=@oW9VF+jk
zlf2sL)FgU9C-IEInCe~0`TliQY1|kmVI|y~EP?iH*xGw$D%vW;#|>?G)6`+NTAM5s
zxa0)o%V5=qA<IPcw@0FRaE_erhSNp{e?shL2Xfb|^TXC^bWjLgJ>rpUg$*Ame{1|n
zNtfu@h=RvSo31cLhbl*Rw~hWmF%;DHxEH}jBbFCl_EdkLi%#8e4+5!OI8PR1(0iWf
zc8jg_cer#t9*f+A_CvD^V~8CO--iZ+ICMI}>k3@tL*hn`sWX;m(O*l)H^<NQ9t**0
zHCB_+{Ejjx#p*q^!_JZpr-rZnmUbSuT7!+pJ)n3hz?&ie4MphXrOZ91dfH$}JE!i7
z52;r>HE*(Mp_!tlQs0xD7hVEul4NG80RFS3;?pd}&Qd#r(S6m2q?DtIEP>RhYvwBN
zw_m~{$V)nZr@2-{D$|DpLe4F<v1EjNauB_G4_9P%etLW@P(xPd!#-W_UHicp^}?~o
zSiQfS%J}UxP5n=Brqg94Kq9uE+$H0Cd1*eiPHzX0%!{*f3#_!;!uwA?%>Y)(p9ot#
zs1unB)w`=U;H^)mX1>dRbLIQ0R{ZEjeYB~@qGCsVM63Zp@c2sqV9U)9Xz#g#FIJm<
zNBEy7w0Z@U52rz)-xZak;h@a>Vt@<5JXVp4vtdHwV9u?y+l9f;1COSgN#qq`zy!sp
zEk%PLG8#QVtb`KrGa2WUh`1UBBxjx5Mw5h42ye3eu+IH*xlPK}j%yLfRQ#=mj;lW0
zMo@<ArcuVF^ADV_I3j|ZnTqC)Ssz5#Q(I4VHNM-`r%Wr}95z{1!!_TY_2+j-7&~d&
zh^3~-4+9*_0L`Xkqtr%=v9D)ZLN{LecAs}!fp!J0RRU*;0DmDRGEi3)8qG_UI{CI=
z_~78WtLU=Ik*_{&IjOF6j}UL}p8+lLPe=!yqdF?(;gMw}?&i$k%~t}wd*6`~2#v?H
zFkhsgUxZjZ*VQzf$a3Aa4GvG$!I5Krk=#Qd12xT^VQmohT!f5WYwi{4J8}vG)kDIN
z$I%TC?@XY3qTLt`pg9n;!r1;YeAE6iK~s3(JJuedInnaSqu<slU~=J}a0PCnb{>!A
z_XKCJy?5iD0^6Wx_F)F*Mce97in)>1wUQLL;lsD_^?j$t7K7hsvr_kFaujdIm3?x}
zizNIQt@FWK&`cjrY{FzA;SM|1vnFV0`Xv9^<6!oldnj=NQXyQ11dPXD%G5FNj68Xw
zGK}vg!IS+mFZ<@n)p73azqs)dM#FR_x{x8YhY`fUorPv{zMUQ`xR>z9squ7#;;BN%
z<2;09e4SJ#jVad99pF3^=1k>Wzkw2l{vJI?XR&Y!SKskqx8eIJW_OAkxM=eSjzyrA
z><6ur7{+7zb7^mcsdT?<TinpbLrO^~9$>RGpg4|X?QKb=on`xLt448+%RaRml;c|C
zz{Qv;EYL;;P_jZoM)4PRb<bPuzQ=QRYyA=*wCkNDkpEz)YQK{`M7lMxYG8T*0en_Q
zJanUCg08!P=r<<g)r3bbwlp|`&O*=?2mvxsvOXNWPp>B6u}#JODD#TnZS_<AXZ9;=
z>O&G;X@1=Gmk-t6FDxRN#h|LW(W+(An{Hy@O@E{cPh4GS@3p70IBMVKU!xkCe<27G
znqF1S&q^Cl4?MpY{r=S|e=RqC&~A-Wd{IS8t^UJF9kUlhTyqSMBjnF&?)OG}zu`;D
z)WMc3{jJ`_>qSIl`uMnXy(=AsUURBu5Pc^cx*5OI37G=f@IDis{*w^pqE2ACbyIiv
zW&@S!pbn8vm2+N0Owb*`XOqlUVmQ=OwHCm3g6~vXME}N%dT`a)9@{2MB@c(f)brd0
zNL*eoYf$^TNfwg%Nc=LmXxe2{XDTa}64rHN8gHH!k*#=KKG>p*J0UD2;^RrSHU22I
zmKfA`#ppxOAL&SSD>6OM{ms<n|2a0uIysI7<~8gFUvfb`3yLOW&0A3dH(3*wK%$Jz
zcVzmHd&E^I)HT-E%4H0k8Cdu#bBQHP67X6Xng8Z|KbD^1uLuTSXv~woTgK5Z{V?C*
z(u(ptmKyB3;z376C$rs0ncKkKS;`L9Pm5+Cp`|_fH#%J4pu?hvFciuDMoKLO#gCvi
zy|+!Fva)N7q4Kv-ZP^SR4t`pOm6ABTPtD|#s0w*vls`X*!yuU_BE-rJkl-mWf7q_K
zLF6I%^CMd0z@7WKOkYze%x*S!w8|#DN;CnG_^&KA{FpxqnUO>cv<s+`vqZoU<36b^
zwZ!=Ohjfkrm3!@>HHwIFZ0bDAd0KKsssIl^MRXK|0%-i)S`Yu3dfH%cU-8Ion$4T2
zDbAj>ooGKxqq!jwRVpRUVJBrb{Jsh93o(YQsw4v=?!z*<q^->-SgFq-<--}osH1;>
z@C>v8ua0b$5}UG?H*^PY!<pen0>76W_7!EnXR?mu5jpIjNK*gcNBZy{gx0^^EsSBn
z|40X;5wqR?Q>alRARxdPv1HX>^uzB8%wnA(W^_*dfw(XD^5Jx$uE-0{-_Fd}JX+>5
zdFqK)l5@(CLq|nz1f50ZeOV#m4(EZLy792uP7_5MGn2at<!CVUF0GPL5V&uG{PChq
zsc8XCSNi>iw13S9QmG-J&!@^H(g2MF7<vXNq|bfE&}2F7kFx}+Fj#ivo`}pRapX!b
zH1G(BWT|&YDYFr@pE^vxQ5VxH&=S=7hKP$ENx?WLT#BNZc!-T5Z5u{fT!Mq}XHHca
z_lvZN3fgLC)@Z9)UQ!Wm9r#YF-t)=&35_o`Y(oB}R~ti$s;l#w;_-(7_j`h<`g<!W
zBAguZpXY9z4@+wJ1BAk+&6(8W$lRr+cfyt*fBiIh^sSwtz<-Xb{vm>9IdJHxF|%nx
zR%HvDV1j(XUl#?rHxSjCrDXf}6V`3w?YHap`__IYJnX#a(45Lif<Hk7q3R38?-<MQ
zFftbMAX+ZNIab?icDy${uH5;jDFwi0mPnW%;R@wLFT9G|mJ9rcJAigupxKGNg_SLS
zk(!Zcv?L|}v{*LQ=dygzv^X?E6EWl8XF@b9fF<cJOB9g&OH>qlc56BSe#9DeE{VC{
z>*A<{){Bd-^C@^H>1<57Llx(%@uWVCh(um*9xv>$2B{~#l<4ClZDml}H(`SHFB_3Y
z=fFqmGkQ!c`z;&=K?Ela&^%8Vjj<@fI}-vG6r;Pnb+NXwi6uO=&N#@cPA`^naA3Aw
zZ4^^V>heB^QXOd-nS;D_9)OU@r$K66{qEvz2kv+f<}5Xl$1&}J{fPqlz3_oW^g#~9
zb<EEQ6U~eC<(Aed!bO|1KF=PI**EVxDwz~=hOLgkN)H24t%E#2KHU36l}F4zx{Bz)
ze_EL)a9U2h$QLt4BJPb`&S7M6arhz^aj`fyJr&dkr`f?x#3(!d)0xw#-_^pjWL~zC
zv1i+D*Uqw63U+-3o5k<QjrVz=)<cTKv-h#ShKr@6DxA8h`p4Xni*W`4!a>LQNm~f>
zHVa+koSkkw(S_FqGXx|WTVg+o*2!g?8ko_#zL%6b6PGS!ULv|OKs_U1NGdeel=y|m
z-{+>drmy{jmmUUR#@5V~VSAM{5-oWgjD#LM@<GY8jV2r$*Q%AP8Q<-QE-QhlHBi<<
zzX1xEPgrz&q#CZ!rakW2oQ83y)+PKdrE}VGYR(*bu>@rD2HbLT-RR!TD%Fa`uW%hJ
zuAmd(|GQxWv-U5<q|-rmd7j0Sj+L`u0^EVsWE!Y@Bfi<6QLQQI!2*I>^NBLHvsy_W
z{&i+_I4uF|tH2uTRgYWijPa+8Iu8))!)*8);<(w6<W}V)m<+-6YC72-(`npRHzBDH
zxxC95(hifgpE0mj{MPRLi?7ogNGpSL_KnjXd8M1M`SJx4h3AcBcQ3y2Ff@tMYDHA@
z;j9g7_RVmvJyl@-?qi8KChf(yw*Khws3Qi`;ofl+c_)yq9PfE4UGwWfG(V>Y#(IY%
z!0vL!*BxC|mQ&$5V2rbA25iW?94k*#Teo!7$i_J~m=hvBa>}}2F0?(Iju|VEEPV7P
zpjogwWuuBx{mLJz|9Z0Ym0*B_IMFf1RQa%8sm%xJ<^-^|%<=n7C<@%>L+tJY_@MQC
zkC8SPuc<)bym(4|*n7h5ZoYmpc$DOTH73-R-j8Zcankt~xBQ&IU1DHQR8;3-vqRnr
zp*Q!_B?mUi_iHyGS|koF<|wBtxHTXH#ds4_ZHv}zNuB>Tggje}m1y{USanGb=ulCx
zGb4L>9rJ9g&<(x2Zc1}gz+H>xtx90<zUwi?;mD3IYjd!H_U8`FA9l+jw-%Y!0($IL
z&{Q;=>vQ~l!Bgbyzl(!p&vPoSFX<+of4%VWznS11FQv*e7brd$C@U)dba7$#dAjXk
zmm53y)_>+yZ~|X!^@kANE;TbFgP^vqPD)nxWfZKI<8yEXE=pwATUu2OO#I9X0YrBl
z71nAN?01uh{v~jw;s|m%l(!xtp$x)dyQ{0#YCx~@+=o#nbk=IJ#qhd`TyD2U)r!7C
zIZk$&`!?vm6jKPjaJQUPv)zh~Zxs6_E4dyI$cEd%V0us{{)B!Wti+s{%jtQz?EKMW
zBHVnuX_MLFku?QZ`)HBl(=kfIGmu7l{x98Ms#Y0`B)D0Rw?NWmrKDaCE`7;NW~K%;
zRtAK^852v3>x1{P{-g3guUaoR2YDZ-B+c>?3*S1z>Im7B)UcKsu@GVG2m&#~7&b&(
z8a{P+HFcvU*=mZr`F!Y@kfxG^)sQ0C?0Un01{gI*%np}E8!BF4Yr9C1`K`kG>a}8c
z#UkUA;LBfk*B#D*axO|33WC&8gvu!@wTE^Y+)T{)HhsFHrs8)WhL+AxpN_wFrU`~N
zJYuZfb_b%^Vg*5Mq7QlV3){If;dAOrcoVz?0zEE=vpGMHm%BJJaSDdwp9q}+6uhWZ
z=9}yr&t`B&fsEizy4ISj0^q|A7$0C2wlm^I`p1v`&)_um-<<GV-=6cWMwGA%S#W1|
zSZ$dmfwk16?#K&AQP%SV#Vxu<Z1}|23O8h&WnmR7ikc3u8QPYw>*QwYZ`b(9*T&5!
zMXQ#CL<)p02_8azqvzeD?)wm5&A6Hs+lS@6D%FxR(1s|f7o9YA<*8Xk8cVpE*%b=u
zR79iRsz_1lPo6}pF2+LIe75&yR}`t5zoO^az0Wtbhn&Z5RfO1|%o(1W%x16G99?4G
zqT_LlY{M9`M!{^eQ?RSd-l}{AXr{_~>2fO}cNMxdQMKJ@QAEyyZ*-fxl^hPs9Pg%@
zUdhP@ojn?C2Q^j95jrH^aWD)<&rmpE5vRuE&U&FjFLJ{Z&z9lqo+>R0H<0^kTn;a1
zkU-Z7o7k(q*P!9g$lDe`6iL2VCe?ID$4yx0MeqV}z57IHpKo7F99tgq1TVyUe<8a3
z`{Kd0*EHp{qIj`cqQ%UezVV?d2=JN%#7Sj&_`TX(4{R<iQs81l;Nd~A^nxV2pfo}A
z?w?W625s1PYKIb{5Z>MXQhxHZa(bF>wU_Wjx0yU2-ej?YPz%FH?GHNofM5~~K7_FS
zRsy?FGSdc~63a!kyL@(ZlPbJ<2d%dOu}Dc3pf~0>GBPq5R+3oU>f$^bc(jtpl~!I;
zsr>x>tTbqh9B0%ZgOQ#`k8u|2&^aKzkWyDmhH{b^U%!f(nil>O`#^NMo*?p56X{1K
z91QxhSKXy$jmsecb%F$x%Xr9T_IvYQskahwa$>b>LeN`eaS2>`f?s3AZLQjM^Mcy3
z{;?*de4V9gK=$?ZrKF<Dvs%gJt)|^sP8`pb@8Bc7@}sNdb;Tb35AX3Z$trgfCIo$S
z<e$KYI9`ViMGg@Chlc<4@cK*I`OnNtb)v5~OOD)sh>)O7G*MZs$N^zP!*6y?gw<6h
zN~&vi=*36fXKs<*qW`_*9W8P|`j@Yu4yQdeIV&c#f<`v*PxnvZzFx;R2FnbI|JlJ`
zz&|2n&CRKE{jPW{a(y6q19LmOyPr{zgw<642eVvmZr^zxEp$M0J`f(LY#VBfbkT#O
zbXosXQ*&LIqws&<L>)QM`}X?mexKcRwBE*5oBvG;6A|&sMgA;ez_{mZL4M`&e<Pz_
zdsdW0sE=$gx-BY(nD5U~=TR?bCaRE-pS7+l&7JrEjN#jx%uunF<WDiPBKym7qc23*
zL1j5F0z+c|&qm#ApJ0}rpHF@;o;&oXC(t|4fC_(>JuE6hSP8p6aWRnsHW6zuBm*IJ
zsQ<wJd6aGnKO~?yaGsoNC>#24Mo^jc&O97OQdj$x(!J|sBB^|{sH$52N$Y;g!Q<!E
z&?aMnmu~Z#K8loZidqHE*Ma<;OJ39_tWXV!h9{$@CpQvSU9^mLc=b$D&T`n0RO(Pd
zIMB-J5<LwgW@|ZO=wiQdok>%f#9D5Qoxj*?G%=MN9Mr<kK-*=JY$P}PQ(cjYSR-+?
zsqJr}p^}+uIqJZa15dU)6>`9v8zmw$`x+yS{>$e}p(_t)(t+6wTTSp>uKUboYg$&d
zoYa@|6FZk2BU9}FsZb_Lnk6(3-h@kx7&(sKCMF2^$eqo|zAjp$dDW!j*Cxvj4j3@+
zv%BlCJ(Nd4TL(<QeR4sUlShZg<jf>4FXDMeK`rSE5BMbH$5#f}ab@3T#eR7?Esbzl
zdp*)8mQss<&qZNIB^E(g&L>I?q0Sf$9xXSLzRt6qQd9d?LFCh_>Z#9P{97y~^JWgJ
zZ;Ja$Iov%ZugVz277VqN$)qy2ze4ylZ8@``H%75Z2E1KUYHO?bwDEN&I){cp0|zge
zqtQ$9VA1hw-Q!^@!Q0hLW&IN!ZXw?i_oEMv#9DtHxF1##bV!`Df+zYcAhY~;MUj|;
zJ@|I7QOC3Pdi-J-`8xE8mI#C5ac?#BM+S3Ftc9HjI)1N-5dZJ@UVHbONGkTA6~`1c
zjHzAP4c}MlO}kbJsolWmO$(@A>dhAZYKt&-dc8HB%kJI3QY|_NNIL#Hx%sPPZJGb&
z7{!`)RB0t<CxC|Zp!s!$e?ZpbjLO_@Qrwy)$t%}0B4FBIYiLK~d>3ICR?r>7DqlaY
zBQor?;pZfP>;25W{??^kX~$Q+!A4T$lN}1rb^TTetv=BPo!sqdP+z_zafR#N<5zdJ
z!2=Dyh>&_Dw;@o2{H`?GpO>puE&s0F?%(KsA#?zUgG`Qx#wKlhY-9CA`!O~hZL|B=
zFDCzt;rITLA=wMJSz*5K7<w=gL-QRja6e4+lH|C*T&ZNLt(l12NgaFS66mf3*K<E%
ztLeDk-%TzjXa!So$2cl@4}K+<SCt%1yMoBbt|x`3FU9iZdIZ#wFR;EH#4fLIQMSGh
z@IUOK)~^XAKW}7(7PO)?j27`fJ!HEeTAQAM6>fHVy@m7PujU@SEYH#hRGJiuC4tj#
z84?~lA!Hv(U3*`>-DkO6e8H&VV(-r=-!}x4tGmkgTG1~Ai`V!xZ|*X^+f2E{|457J
zqn<JPg=w4%NSu;*WpFdUQsw9p4@*?9OH>g5$@mf59^!WQigLf&znF{bd?s=K((t7C
zuo<l*hb5*2dVb8a;$=)FY#NPTEZ=r(n|3AE67(=SvHF^pbf($6xVh)_3PzvVVIra-
zcO{xEdb>MuT(GD$DiPvpUm@Z=<aueG+X@HUmn3eUeVD8E&S_gfF&f*7k0SPF`9Ou7
zvvX9zLTM_yGybAT@@9_q>m+x3pNsSQt^jy7@CgVb-ze`Lf;a&~^I6((l}1Q~@0zh#
ze<NVoUTAb|7`nv7VtK!URhd8omrM$Q7k_wJx!w(UU(XjwDpLswJfb0kZS$U8J7O8}
zsP^l<wtRfi9GPDSaMM{lcsefdW17tAoPj)6(^7rUnN-?CCs)RAU1ke?F<IHBVD}?i
zOHH`8oBm0m=gx);EW0PFgu<EiF@24H(QFpXy=mhO3XHomh3c{fnZy6M4xGhyS9R|;
zjK#a$ScV!k@G@}a7GuLR)UQVFSDSB#C-GK$aI4rWJwlIi^xOH4P-{zs`W6k$uFosC
z9PjrYCoc*#qTUg!JEyw{(L1iGI3tG}4K{YmnW)*GvgtnaoF5rTm$z-0&ZrPL>-&Yb
zu&M8`7h^h1ddcFOLQj4-S%C65@9me;op0v^f6|!Fy>hAO?y)e1Vso85*=!HII=A{t
z4@!n`rg!^(c;hww9y-q%h|vG5o94M^9*?Qt6uMbARAQB8NpgXRlZIxvv_8ppYS*pP
zousfyQzusTSy~?VymE{-EMKP2?ZAA|L59ZQak`y^y|14=!!J}!I(z!R{I+agx8<8j
z#-QJx?tkPg0<LAXv;RiQip&1`Gqllizc*$gE<FhtRF&oTd2l(LO>r)<46pO#=KARe
z&I$$9+54rD^?apIzh;oRKM4|r|1y83Y=@uYw5DS}xUejn-U`D2VCK@_3|Ob*!~ni=
z+=9;cGOd=I7skzP)KT{h3a|G#z+XzvcW$_R$%ej8ep=KU-;&qol+#vFF~veoJ<mJy
z;JS*<vjr_2u-!jbYv~;q4HexpH%2F-MqW#H7=Nr$Wj=`{UCL6CQf&&*b)0|fSDq-&
z<=TpNW3`w@O9(X>xGQMeS#J7GW%ff?u%hTffXxdLHLx1ImF+$QR-V3a;(a9cG_bh3
zm3`88W(wsKKGx)<i#1ZHr!qOCCx6vWz(#ah)fbi5SAd7JM8=b&0%$7r#DUQ|Q@}Sj
z&qB2Y{jo+GkOJ0fDiKdg*k8BDE0I2#>bsVkpKK>#q<JNjv#X~cuNRi$GwZ5h82aUf
zP3NwH$&2^|GBbf9I`!1UR=;4KEbOVh=M-V<1c<!%2wnH-(=IW}rQ2QF9vCO2AQb=X
z;u<_jkPoV;?ACmA7imIF_<W<<iKOew!Y>x#+J>A}shT~X>{f1@0}JtlgvWo<)|N|7
z%9Z$ld)RR-cK;%m=;(BFgf$*HFCBEGy$!Lar`INbD@yo;)kQ{A9glIpCUM&<w<H3$
z)N)AU#)P<Y>}8j4YJ+H---bbAI<TIP1+gOhTfpQwOTFRc!7maTvpq5zLNZGW6YvHR
zsYGtwp(5uQz)eb9ez}Awoc_JGxLg|L@pItvWJfS2`%x)X$|V(HGa8cp{9QrGk~a0o
z(~i|QRJoKyfIMjLbF^I7X`xu^bo>2WVm-kPIwNs~Qo?#_xi%ci?n~iczyxFP95d2A
z!_JU>3MO+gI`4vrp3m14@a1mr{2T(c(+2AO3{6?Q+AMV~ZATVp5AP*8P$+$<5a?$r
zk)G@e)*Ymx@HT5@5y~8MiH6}CjLdjqS8DUcRhC53*dQLkMTQu=5CqBIP~RgMe5d^T
z2&|18CVlxgk>H7m5VZq6M%>lB#}Z>;EKq0<t}q+@``KRR{d_nH=ZvhJHRRWN|HMr%
zsk1WIl?}c2xD2|lXa+@m=k_xH+mg%}(8WX-n5;!AYiN>;E3u*5`RKq1IR~>9MkkUQ
zJVbR={nU0l9M$UE8O~|Nq8RgCt0{*-_pJ(iQbdkqaKdiaqXC{#Gv1sN`hC|->eH6U
zd1lr~@jZwxGPV+7RH;8E--GDx0F0-5W@6d|Ee$QQPg^3?7QxP13UqaXFFE5yuBRLP
znJx1_vbda}t;vB7>gVR${rhvUIzq&g`M;Ur(NBUchG09hKycCU2i{LG28GMb_4eQC
zIy1U!qpWEmO#7i?=?Izlnh$aUA_$>GNZbcLdSYEUd7<`Yo;=9MUd-*g7#H&cGFqnu
z|9GSnXTL~`N@D)<H*VNbpqMzIaZ`aHane%o@b%nZYQH=!?mYmFU2?zIva$Y~XVpqf
zM@Ylot2CA?k}sF3ruJS%(Dgan1=vQIIRFV2Cwmt!_RBIii<@6HtMC%9GapYz^c1ws
zsq`jDqlzvyI{%)J%n!R|pv>Z~9-7HMyYrtE+GY7H{9GA;H>tDSE4(n>WlZc5>D7AL
zc&?xobPN8;W%ayRBSGBFGrh&{)Fgd@bAUTE(_xF50&2YFql;fg&mFp(v?~Fdoq-N<
zUMkPRU=>e4{*C6&h+#VLeM3_pUlr}(2!I$3yxdNd0IF-0RLf>Moe9Zh7Oo(v$lv32
z;-GcesGt=!z=pN8<!E-b(1ctcp9=G{$wqejeUN=DpRZ^1s$F{`>1dnNklw4m^+D$?
z$AFRmPqoBnuls5X9b4x(?dD)xFC;4=YrJfx&MzmmS5a-}VyyF~Pe72r((oy+J@{Hj
zux}Yigo_SJ%s!75xiV3WWlr&X6S#p08{SeMoP8RjUr4>k>#kHbXpXYq$O&0_Hs(#T
zw<s?_qxzZeIHbCf+Ziw=Z@~i6Ku;+6W-{0&tEDCqdhVkHsWxmfrum|I^`x=)sl>_d
z;(IOYVr||EZW@jmfQ;*w2>w&#$jz<dWC(yO-l+0$${Cv&DJA|u@QSYjRr7IBrozf{
z;NSLNRr=fsp!3aC2J3^1BZ=bJ!9eciNY*R6=Q@$5KzK4$1XRaUNC%!Gm6h$gx9?;2
zsidK4+21R4+sA9ohP+N1uO(Ahl|0u0wm+`q3S_<IW#hG(@&|iRiKgr+k#eVnR^ds8
zEu&iueg%B*%*^zP4SKAe+Ra0Fw79o~(7%Lf2x*6n`h8RIa~2Bt1a%X7GEASdCS{Pf
z>;9tv>W>ehZ+1UV$Fg1JY_kK(jZUhB#Zdvjey(HURBnp<n4u!9Q58zSJ1kGB<|npI
zxvt@PO57Qq_FnDbEX-;+Dk~j#FFaDW4oT0M(mjL*Z7CokFX-Su{lgOnh8HM+0+~1~
zD2JSRwrkELJ8q4i>Pz?YIhf*7l_m~l^bKdy4jKb}BA4cE=u<y(bhUyR%ydG3t$lTE
zPVX?hQl1k8PtjgFaGEk|OLuP(hV@8SopvwJ`QtLPOv~+0eHiSJNyYM+kO|`G8mL%J
z8N^`=<@cjWUpVLYyuq9CeMpl@^%c?8Bm$R&)I6S`*XTpY6IE>KUyN9D71k#TQtu4A
zg-D9Z+md)T$IO2FeQrXl+Ii&LFtRXXHaUO51?n&1xBSSh?s|gPxUj&>`GB0OEjxO1
zQ7GugB!?yhm8b7jT8L@G-pi8=^|)mXVlw49X5)FSYr@0F4y<``ctu!C2{LEnZlud3
zc97n8u%<+PYO{Ravn*SjpHb8Zh5HP1ylDI92U$c+W$z_+rN#V{an-vez5rb@+gtJl
z3saQnViq?HCER#D*6D@uu7ds5M4_B!{t)w9=IV4d(iuY3*376lmdYaHZf59m5?`45
z-&cGNCv2zkpT}K~@s*ymmBz$)Py;TWB;HTsl1@suW09z$hznf%yyFN%U*9b)oRYRf
zw{sznmyK-~Zm?$#vF7Ocfb+v?ouPg^Q^uXn>{7PAY?Zb|YbDL=<N{fJ2BLwlxZENQ
z-Ylki$2}rOQ~PN3*_!ODC%nP<=1|wf*}piQoZ{HFxWBmyyF*h|Ux*~D^KjX|VcfoW
zX|<Gxm)jHf&c3(C75O|*Ev%=*FqlPLM>>?~4$f+z{aj!GWU*khDUGgp@YT5Tr`lBE
z1&!l=V!QAcf}7|{8WnFS{KlS}MT$y!t<~m=K)CPibS7t7ntjN-2Dc5ezroRtYJrO^
zEmuHK)-qK)*xh`?)OF=$sp0YF>hRCeAjR?+p;dR%?BGdq-XtEs?Ek{6Jjm5zbCtyw
zaoC`hbRPMw&=zxA3)R&8lnPkVucZ(g4jn(zNI?atr0XKaB&UNczhK3b(3+~UodUwi
zu<)?`yI?J8^B{)5D?T8-;ouK{kYZ)IJy^!!wgOz!Fr#pTvckpIn-3xwKe!OM(riYz
z!^J771?r(<GCb*x-jM3~xyy=qP}d%Zj!&`3G0Q^x@UA)F(hct}Ce}$id$h*&XfjMF
zLaeCRL5~b8<lBy;^~6`qDo-Say$?#>^XFf4ghn@rK79XIObB#lKXk(PCsmIOr`JK`
zb0<<0XOV4>;iWyX{rHgn!dn;i2F{MoMKJ^c>_~`tqsXtPn#W)dsv$G?*KQA_BR8@K
zmFjp-K;)m~EM(aB>TnJIs##J>ntYo}_$GA7T%xQ`BZ1@4mO!p_I(^RoKNms%k9S#b
z6g?F?i;J5S6znL@V!TRlSYdYf60s1%?@SZ<DI}u(G#Ikqm5kVyleMCJClvMHAT;b)
zrdndfIl(Hvg}#S${2ub;iUG4bLl6ahGgpyM15|Fx>d+TYC7hDu<L{upJkC<;;_=kY
zPadp>MR%apNAt@{$%NnA8^e$cf(5}x?)l}%X2|jFixA|TuRVg+e(M1^Vk>3md4Wjw
z<=gEBR4rck_d60qe_>;E<<o%vFKkhaFW4Vde}4JpiQMr?lBT0cr?}mZ^4sV0^R|<!
z2=HznMa$Y)HV=4>r;Eo`k~CzH9pt70Grip>1rm``VtnMuL$N=Su^dIVdS9k%-eb=q
z^ZI`KQ})UiZF#q4#hL~ZA(8IWg802O?UdbBR%doL^MJ7k^eqh}nav9%CiywNW?5hC
zB|(_J;Ykp1-OEoa%!dKIHs)_G8=bB+lI(W^m(MoOe~?PZ<kj!Z4@ZqG<h?_%#@SO=
zz-DDgyWEk{&2S*!J<)nyc8T!hAD!*P4B&UOpOV5O6mjtWqL;9EGkXQFmZD&$M!Td~
zvS10;BB5U(pgo3ZpKE?WM05GFxNj|J;K-3wy?^zrfr*V7)SxM`NN@?;2yJ3PC00>Z
z`g&<C1Z)e40=Qq|$x#H|4)U%&d^7r;)BP2i+)S?YwcEZ)Vzk)Zz|p-5t8UiGrKpWL
zHC@jq{+=FNt3GR0S~0+7&(p9=W1PIThoV^b=xfQo!;-mzOi1uce1NN!4lcRP9XPAl
zDzVu^JSdH3eo!~+_Z`a{I>1ba{#;5>`+BjJWk!f2`Naug#$cu)XDm;^N(g+Gue|Jy
z5NY&nCOma(N&E^y!O@_FXK7{GfbEAvcGbn-i^5K+kbZBzOpOvv$@qIm%0p_B@Ueq+
ziH)7GB8tt`(It}U#2VcC9dLR!D?=NQ(sJ0M{Z^JD8?)kpvZ=St{D*YcVl&qTU9tD^
zsH;HVCC<cl$D@zCyC@&ysX**KiFa~V4BByTtFx5>Q&oocnx_hAN>L@W!X}ACclhNl
zSaU9hQtUgPIGk&;+8oA&7{!Z+>yrh0V~vVKea75&Q~bAN6+QjP@<;CI23O10P>N02
z?L1=K+LupE2qtaJjDp2Sw>Df(-<U&47*?}oFONyVbrplLp*mDKS-&-&#!I~I#aVcG
zi2Tz6I%@24Cg#A`HSTnWKCkl+FzLCnCMKe!=O{uf{cOQTeW$X%`*H+c;zrPeAqza!
zR9r=E9m!6b0Ky>@31Ic^IJ$+(^5EXohSQ3kCztDLYOT8j%$%yzAJzzD`=c1*pGpcj
zHXH30?t8mPcFk{Ig6<_LAbF9N%ZqAeZK!jrV-$R%ItWqdw}NM`zgU#*05h~UsfC@p
z;&%v}jl`T8Z;yGHLU*f)tWlvenY4Urwoe}iO5pCtvS8S+=htK7*tV=0!<44btIdbc
zg`WhLP(OVRkEEWm|7zdy!eiAK4RA#>Q{J4YSi7gF%gyQKwZXTo>Im2TAjZ?-kjco(
zMQ?I|!USoLPU_zr*t9P-yH+7(b5%yOp8i$Vx;Z(JI(Kzzl6&nofkvQ95NJ;ncE3f?
zso54g@&pe#|7&<CfXgv{8b6<CRu9<JR<GEU%U&$xE=jnx8Qcve1?QsM3qJGC3kW+%
zxE4Aulau7C{oBX#-3kN}gdZ<Q&-HNPbZ|so&w09CSQjofXehQilHJ^=kZGiV7G;gs
zKAD7tjqRm#<@TmnUz+43I%2^s@!zYUam=ZtdEj*+GnD|9nbCA$eR(dNH|bDsQC22$
z@>!pbeNl)P14;F@{@Em=V_*>qZ;mqU=0o7o$9-~Z*C6g_wtMbA3Tu?ir^3jS3Z98i
zIY#WfDtH{n-qPm2{du>mN0b>d6R0_?jTPD=F9M`29=bOo^2@*Up;P?G8}Z#s&Z)!s
zX*I4pwR!e0lb}fY_V+<qT4fGaber4eYw!FDPHP>!c5Xj9u#YEVc7(>&HddRY=hnfd
zTZR9n5H2C%Xgr0)KmLT}Ij0$29jV$m?24Qj=^gN{j4Xg2+EF3&rn?^wb+>A#ym#zS
zjIx@UnLRu`K}QFH12q0iI6wM_LX4A%g8HcwvM>X4D=@#{%Na|PV_^I!EDTY}OpP8|
zPNB0W7Pi!*XjSRK$3bBv_HrP%8YV0GYR&O2-OZNbDhX#hfkD%oTuLg6?Cj;-#qvTy
zFPh2fY!#E#NOAg5;UvZOi1iPfVDivk2*FlVzTPNKKMhs<967v@7TGt}l%xejO+qB@
zIJF?`ndll3PfX%d1$SLo$8e?o`V;ZElC&M`#Cl&ao6}ELB&43{E6S#*K7(Y(5Q+G-
z3|UzKCNZzLa<eCbvLce+s#w0UlfyXt2w~sRBF)hrAYNRqNNk9tUIDR(Hrst%yxgwC
zD)mbkEsQlDaRF>;1uaE$pL^B$`keY6>&xL(6Z#LM&hdR=s$yrZ{3s+^f_BM?Z?GSL
zBB()>Y`0~I^)~^aTf2{(I7+%E2`hfg6bSW$uD2hS%{bV<W1zGfetgwIc&i1*AHxSP
zFo;YGz^C#0DltfgqxO&o%uh<G8Y3H<2!kZiFm+set9S6IGNc@I35IKG>H*UU|GKqf
zG(NGu6i*lCnxRZ1b{ZM=Q#E}f{}-SWc)1tja)K9|3mah%%dje{k_(Iymmn{&Ba+Wo
z`1ZHv>L154J9W&#LSCifgmPBpTa62VI5=;S{8PR8X#?Enx}g~=#<YZMr!3nLhdwjn
znqeguBo!Y0bxEh{a=dJkpYvCMS|sVKC6Obc1Dp`o&-}X&(Pkc|;MA#ak2AHi%!BA*
zaH^QCK&ml4@uE@W&R;>H4Sy`2ncMB)WKq2wY$gc#65=udNH%IKs4f1Hp2do}EwNc;
zo&@uFjO~`(>xtfoQ5W(yJh>eWMo=x?kJm)+;bqsj1bB2KJtpI|OS_LF-*|Q<t+9UD
z+M!KUQM6QO0231Puh8YF82W#inXzPyrylk<QZ_2k%uUM3Ri-ZB${M;1nfC7VN}bL`
zOLk;Mh@*#4B&7_qJUoX?7x^*ezlxbU$wv`R$zfZ3(Q5@#?)7WToQr4*!~XK^DQuJ^
zZxkcPAnOsOqQW2~l@|uvJ*a_|R4s~brjYShIB@VmVvTuv(l)IPQQeqHqHzX9a9&iq
zC1J@5Z}t0q?9=SgAP}>5gSA*B4uhn;yx=3vj~{=JE~MoAc6N541I47|WFx2+42nrH
zzjf5m{J&b<*QN{uRki)@061uEECvCsxIWjFvbt*I{CTY3A0$iF<V8a~`QLs0sCxgI
zCOUtlhTg009r~wkd?lQQ|8;9imY~qbQzB}m43CVEGc(6EH#Zl5VtYp|ql8`AObed+
zr;<vbf{22M^WRbB=Xcm;?DB*Eita8Y{{J@M|HHsO{%>sff1iW=aMHrGc>b%xdohB=
z68T@7%yukhS{VF)>s!9OF$aYIuWI(~yYFm=)5O=R5qh^Xx<P#6m3D!buF*eb2i(j1
zNO^Lr^t*1j@ik1b`5k=Ax!H1Vc4TVv(GTJw#(N}YCkG5fKise|aDAO@JZAOA&PBwy
zg@4zKZVd}{hg9<YD1%UOj$Gj8S}CifNk~OQy#{dj+1I@$M0AUYXt!d6g~g}epOJNg
zg1D7F%<k@7wvsM8J#eS^e}nb$JuB<L-Y22zlBZtU3<#3<n8t`nA_)5U$SKhRzc2Ru
zU?oEWV}x<Itn=XL#aT=wDmhh6yja*spD8k=_wf@~_H38vO<c>HL?aRHPY5#Q(#4p7
zJ4$6nyGXEP-mfKj8xohq+(fBgfyrM=h!IPf_~ebGC<FsKOL7C1dN$ye4?BCf8Qya*
zq@jx$z`iBR$EEV64l^1AHnw2~jqu2;qP>6e3%2VL^1m=3rIuO8M?(<Kq<FsySesHI
zoXVhV1SHVM5cabT)U<P9Hxk-Gj5Sq8`9d=vF*Jnh6GWsdp=ZYI4J5Slm4OYPXPzXL
zXaxs6`Gy3aRbcIVHw@bT{5B~;M70`!(~FrZi8=7cM?N3Rm5o7};dsC?J=ENgjJ>C7
zgnT6dD7#vmnVRx9!YeKF9K60Md3*2Qgti!!l^qLh(1Ej%WRIoMYJ8xv1gZF?_rTpb
zTvO0>$!<T;Ci>maNjQgAz3ZLT=H+RIYXi;lH2o2Fw)RZZ?X|yg4YrnxVK3Xh44;=a
zWS_Kskc$v`c(o%$Zvk>^gYo%i&&=@JTmK?uETK&89Uf^rgi*+rM{;n1xVa7O+qj1{
zM_J9|?xH4Wz0hV;^>jnI(|yZRko!x2Ft};=Awt3ZefNl7Pfe;xspB(jOqEyg@GL|z
zw<&&K0!15WCvmxa{_}2Gwqw^5N41!_9*E4ED!+SnUsC5;Eqj5?yM>Teq>~0Yy&0R7
z`=cQYL)tEsTF`b6I?()a)zOCO*jU;JFx*Gxy6L@!pCDXL^!H=&aOUiqkhw5Z%<M}4
zilA42xE261=odUcj&AoHm3?9A2y?#^4c4DHs4lr0OgcKXjVdsRHLbuS(&SCXHy|nL
zn~KT$d~aO`ygtjfYKNMvN_|46SzZj7w1!eUM@(k94B>|gOnrx)RXR%+lqDSHKCkly
zIXIjNr&I{Zz7;>x^J4aO3rdwFuhs_2xLeFvd+Q+7+?@d3cL(f06FMSRW+~SDP#Ji0
zWTWdp$1l}TSUFzf3RGl!(<%7r4g0hBeC8eXI1(Feer|0VPJqUE@8Xsivq8u9ExS+X
z-$8SUx%P1hIpWQ^wC7`f7&bya@id#8lJ}AD80LuqNC!ff^v?x+SbB9CO$JZlNit8I
zXJrgw-Fsa`X;~`3oRNZ6Eq=Dt%U{Ir`y*!nSY>!el@a?d-_=gdyi9;3r&vq6@8{-L
z`a0ACY$4wUKPX<G1<tAI{eDkDCAyc}-L?W^X0fGqbu^;h$9)92>ZGX^P7N}BG%zUD
ze&c!e_PXj{)llp>_1JhYWH8CW_Z~T)#VlJ#2(|k4iS}B(W^nztoi8oHA8xpC+r>|t
zD9CbR#SsjVXv}++TDl~)xe_G$gEbXM$}8}>)7nn-U>Y|ohNDBe0yt|$JSkgV46Th@
zwx7QiFd_)~t{2)&tlXb@%bo?tS9h_Ch3-k{Qc1{sPSX)r6+yoT8m?|{>vH%fy1oe3
zdb}~hcRu~l5F<G_qDhVOXb!4p+%D;mNl+z{CzZE}V*V8#MZwTOT-G~0saoMi)VZJn
zycQQ9Twu*UpKjnTdY_cM@?5C=SG3vB*J2|{aAE<l*aGQzJmkH}^#s6Vi*HC&%Y5)*
zL)UGOGC|Ll0ILY;)NEfm8Y*FX&+txD00`CpT2(uWHEaP^gGp@evmjIuY({W-hNdU4
zp8x~utgz|}Gl|E!x_qJf8Ci0Fii!Jiy3KpRMa(6QYHLD6PGgi!M_^G~q|^x^>OV~%
z?>Gk5TH}Fj3*6VY-uE$k)rAbZ{m0d=?Zn}WO9<hl)7`!Xi-nG0dCA7WVI<Q*47$2X
zB^-OL&vv;io<Iy;b!$Q_usM$<vnA2a@boKI%gZ$)KfnF^vN2bq?;Y=AblY!2JKxO8
z7QVEnF%|DbI3k0=zR9lfdW{1Ri}MdZF95X!?XS_-7=)_y?)}t_p)9#aOCqxgxXG)Y
z+tg;jp2K-oYY1<*k2hiUrW;SHz9(XJ^;rJSgL$#w6`8~bUA}au`*B@CbL^&<S6j$D
ztSQSy9{BNacQ}fWCo5B5M>ZWH=KX;z*0=d?4_^ad5PY!}Ptz7i%f-;Q;CJ{#p+<~8
z%Rp|DWH<<D9ZLay(G#j)J+9guIxi~%y3cvMq@?ZTME@|A0h|s&nS0$1!t`ITGleyK
zNMc~-06Xb~RohQPBt}Qu;@-Bj1kr%^)-XW|zC8BU>41Ly0{j#bnGSPya0aQKS8<)k
zAZ~?b{pSIu_}e))F5+8t5{vg^TF+R^*txC2588JvK|Phie{YWEhGrnF;Q5w{&8CRd
zV!!_1asjvY`v{`bwEqw^e&IA&gxCYJ62+<``AqICvr3<uykEGgvK@F#F1)hkc+QI#
zViU64eO9>#V~9sbH;D>--ZucbETPGpzR{tQyp700GSjLcI#g5otU)<kgMQ-K#aTnd
zJe}Mcm&luf37f2Ibvic%oLpJYgz~Die>ygFmvVqfP-h_GUHsKs!4H5Z4qI+lE*(=x
zO3CI^#`tRIPUan-*24yJdz)bHpE&phdf#}Nq0OEbpZ)KwOW4G*@WDEbI|NhNx5ZO2
z9!x_2l6PsC&CGD{;Cues;w@C;q9Nm%&pw8@;&q#WU4O;*@bB~0Zr2su;%(q(LfuwR
zF$(AVPvNO-kn>cn%p#MkI%Sp4v=fO~@G?H#UwH3R#VoE=L=$Rej}38x44oIKBaWb|
z^%{xs{TaNc9{Ix?oS!AP{E@o=&vW#%wEC&#$g_b;UA%=|OU~#}%wE-S-9L`4B@G2;
z3n1K<QJ;kU&G628TKD$)=)>tVY<zd`#n&`;p|IAv^!G>cm*=$+K6J=dLCHDzX9=#>
z?e<yPCX>0G5$XWGb9w_PL8sWKM}jHJVly)q)G8R@c<<X?(L^&dF%vT_g6XJ%<6t;R
z0y!TY2$tFyWJ-HhL+m5<jyUlm2G<eO!nHL~_#Lrtynat5OV#V0zc&z`tjFMg-fJj)
zxHxD)!1?00@59f*5`&t_<=70$f(FUsuy_I<XD@^et~hLBaB96qSy>b8cIrF~oGu=v
zrZi>c%@HwqBXd2YGbWm@uhwE)D0jGXW%Z;vXc2&RhM~6D2Hw}7f32!tp5=J+Cj^W-
z@9?;i8u${AZB5WTiPk<E=LK%qDjZ$&w*Jn|(mVQU3-gZM3Iu`NX6Weo4i$tmNRz58
z!Ve0~0DQ1!SjZ%6Ifk&Wfgspg$^vOjb=@(aV*w(H+=GtiYN~wBz=AS#R6d*<UaRk5
zo(eo1d3>(C>;+4l<qkF&C{uqIz5Y-i)?)=zkQdbFbq}(bRH7y5z&7(9O-aFJ>n1l@
zk`KzKmODcow?(nG8C+ut(YIwh$RP~HGC`&2wz9GwP|D0ebYXWwKQoy;7r|B~wDjsa
zSS{^Daey~0n;CXKbwBc1d+i=aVU7V=4{#pe!9tC6)Vhy2&K5pn#JKfTjW&G3Xx<Za
zO!fmA*b@GzvKsiI_h)94=M+f`N6;4Wms68H4==W}(cykT#_;cTwQ+DoE<_EqdaT(*
z9h%a2v2#Zw?%;k<4gh9LR;$pNaZ$BMEVX$tg~qCXh_1-G7JP2tT=Tt{?@#AjE`w}G
zkagg3zL8MhO8*%Td)5M76K=Hf#8;DeMHBxV-!S9nyArn3vE0s(c{cuKGCOnuYUo5}
zlFObLNb!LNybpYRUU9(=DK{%^VFO0%N4Q_23Z-dulviRqLfg)}f_obI)tU4}e73#_
zKDe>mY__8AKI3~otYahv$vn6ZaE)cM21Gnwu-S;fXu=)&-R-VDZ+%=btvYD4T@IVt
z(^ct@kq(PEmjs;te3By6(sOFO*SgGu&LX>_&6ak@a&BPY#!-s>YGJ&DVK-ls5Oe5}
zkkoIMA-k%oiwRASUbJw+VwlKX_J%u-%SUc+9$A|VMDK1LJeyoOXh-s4r}DYXfvvqr
z(l_gx1zxipL_~;vc&iMdW3Y(J<{+nST4VdREd5`C{~u-V_}|F?fB#oo+ithEwzjdg
zZQI%!TW(WZTidp6+qSJ=_VxaL{(#?=T**vs&&(v5$vKa6?)&FjlU~Y&*NbbBT#M6!
zBCcE#uyxOlpR8u~_GCIvv!}WIDi^Q*1&>s(jS+)ehJ9wP$on9rup{LqrdPMA-q#zx
ztQ!Dj=I}puW5aiQ#O-)K!mc!<@Tgjiq@CUbKd>0~6fF6uFv}6~)Bw);?c^J+gL~F+
zhJstHyWY`G?Ly>atcf*P4IzI4_kbEjbq(ore{GKsK$h$U2(6j|-znIvjjU=#ry)iG
z_^%kuQ{Gg)wyq6vo2EuG&TU}Y{KnXjHy)F5?=G49W&=+7*~%7Db*-tE(wMI;qIRX#
zQviV-Nl%^)_pdc1;R+TM7yeCKjP$QTLnKRyD+UpZ@1{2c^Qz0EKQubof<B-gYdF4a
zri8i1eGK_^H?>A@iL!?}%@Fl3hx1xJpoqF&xU1w+#~$B(=(1`swFeN@&Q~WoGut>d
zN<Z*pGEn!QpI;1`mK{(dvO7}JAQ=s|A0-WH@|uxu2B5B(4ickZPP!Q|CpAMGfZ_S{
zCI{j(<TjSF0IkNUteym%$YD;UKlm0oHN-*SrX9`Y`ebTdg5DKk-Z$sw^*)|3V}9PL
z(|@W`ns%@o4%(jgCzeuKOfl1IX{JpRhl2rs(x(weR<mL^aH(l31;$$NSm)PHe%LU9
z&-TH{6ZU(KNR05Ff$L-7C66CQsc#w#wof#d6g3xS<-PeDZDPSK#~cxpYXGrzJ7;In
z+3>?^-siA0N3!`{1##y#NT3&?ckdadbgdk5PnTK!{CR(P<yrV%;fZ^;<W~L1j?1k*
zJ{#<bBF#Vjy?KKc(mCn`j+l6mR6r2UGu~jTCZ8j0p(10z$Ylf@iaB@Rel+{g{>jie
z1u0YQDH=eAY>F62RR1%iJ6sxFbh|o!V4}L<A8j!%u$0o0dcIa4Q6bS-?R}%<mV9A4
zY3}7e*Tx#Fihj$bHkZV|L84$gqr*uI5CkX^Z3f-v@|`d12KYJ2zoxO_Pp*!B_RYYb
z*rA2fy?1>y8q1I|!Pi-y2b%nqo}Rz8F_8RAg=xc&i*Nu%ZHj%fUu!B4Phc0gdX?<3
z>`sT~MF|?ief?{b(Bos|=bk?WN-DSin|^0hK3XP-S0gI+N+u>-RKnu%Fg7uVfZ^-&
zHsx>T=hP<b8GJYkg!CH=$X4Io3>kP`lJ*OWtnBq@qRrM+tj_AYb!3bYR_5!W5+d@Z
zTtw&tNjW~%huGlP<6}q*E#<O+?*SwtFEtZ3oP=X3ors5a$~aD%8h3Mc2ykv5$E$1+
zF=*74SKDX0G`jZkVqi41r4|-{`am^uwNQ?@!u(!|xd|<auM8*-Dscfv9@xti8Lm)c
zR8NAQkA$OfL#Po*jk)yamF+2*C{g<dm&5{w=vcbEfkCNI!wi*wTUSLqUBUZbiPQNx
zZ7^h0?UNJ~3~~~Q1o6WIeCIh@Va~n3$Md&WznF|wBenQvib)L9loggX{)ynm3VvZD
z80)dD(~xm#FLpVx+UYZ9(^+jy15aFdc9HG1j64ch+7eiKs4jA1BKL}pac)mJ<wiPC
zwd0lOI(o>~x*j;1sy2K@XP;llgXl*kV>GrV*TIKS5ccg9Zf6vPhY<=$Xw`Whgg^Xk
z8RS=4S@xv7p&)DqY&)bj-f$D>ZCwVzS#jCk^CIC+t|@*n!752eM?U5nfAp!*!G|*#
zBGIhL&H%yaDdzc{Eas7W*8$8!+lp`X?5Vq26LxF$2`7hGW^GRHaMdSVv@&vh%eY;D
zyYAb$>X&%zJDD^z-$a4WwcxA;h$so(CC>v?8x5ZL*m8WTsjcp;A*n?|W3wGo)-!}l
z&rYe!Tyl<lr^W>OZ(lNshM&)6eT%K%TQY|`q6t<c6d0QS#E050Pc{aEkxU{LILz^4
z?(23RUFi<zb_x8H%EP;(`<{7iUQlE12l)m|db0UQ)rNG2JfAk*Cq1$wWCQCVpTq`^
z=I6~9I#PMhM2!1rYSr9e(7U%fH}ryPUx7b<{ORrx`5}UN!P!5PAZ<wwY~bwx2m0sN
zzoHKDY61>#*paGPXLt$Q?GlqdLg(D)%6J_HDj;~;>j~fB!P~u3-*>FbEoF9&3#Y;?
zII<}1PNE(XLNe=x`c7JJR4)m<_!OBtAsVja_j4K`0KV}>fUe28EANRsG^LuP%^rIB
z-*=lISk7nk)*cq`Y~EO;GcmkrMO9HCx^FKT?YNlj`{f`0MP^q$RTLqeevt!)e1C>E
z1PMT8+U=2%WIVI*3cYF|ikufVnotIPadoql0ejy>ia7W1%+5Q*m@6VnELQ-{$A@O)
zfl(^Kzhf6!PL3ew55`u^qxa+XnLxOah=yA?h#cP%1$M2=@(03}xCGcB2`~Sg@O3B9
z&mFs3B593=*RMYFBI$QPdnpOnd6mO~s7J%^zfxZAht@0HdxwWvQ0hu#OnLq>+e#+7
zeXxTHS`Dc^`51aOcwlh4!&`RD&MYD%oG@*YxZUkvOFc>t<#FSU&M$h;y@dh(2R%Cp
z9XUkOGp=aD@QL@<csS+ruD?VcIN)yEU}609;RROto!#ty)6#P!?|kB&T+n|;nRADK
zf{*?Z3%~jPkt;3L1%1oGU=YHS-LuhKvzR~EbA!sU-iFrlH)CG9br1S@c!7hA#j=-;
z4iI?n=>Frq5q-1yguT-VeHxo91d6AT%el0sJa;~+_B3ed`MVdT*_zk07hKf0sg3^g
z2hDjLfts%6zOrZ}38fFF=!(My3B(=x@w|uNC#f;Lk$v~V+mBD-1PP*}<74fXuZYL4
z=NM#$7Go+Tz6S~p#yUX<mgJ2eC`1eWF=Y3HyobDR@YXb{R-^Pf@7>@otVqlk0m&;G
z=6za*MR(vxalu4VBEW0(eiKfYC1H&srZ9fbe&rXyvrfQdA=ap~<xUaSt~CgBR=)jh
zB-w^fY5a*pU~*w;V-y4HPr<}Dg?eLVA~k~D_stoqhZ7ga&h82KD{<<|oP}kTM(<bL
zt@14isRAjPCuxuKI2HDeFV5^snw;8R;)8Zt9Ctn5q;nUNv8}zq(4}0H!#UUDlmcft
z%W{LKq>B74wnQ%|Hh1PFlbapuc+Hxw7^(r$A2Kq^63!gcf)Gm^OYu<p9x1MvSV_g3
z>mE}~VE)H$^u;Nvg6DmmqDceQM~xUR*%>szZqcVz&i@MFXbNAxuK0j~8gM8?WK2wP
z3k#~WGC(UNnt3(afQz!ORx}?ScDjjzy52Wm(B~C&odyhiMylR2PASRozC+u;?d366
zSQdl?WquGaGoa@8KU%D5Iept9n(_^95J&`XjH3VaP8E|>4U^H#Mi0*7-{QSX{)z1W
z-o}-cC|#l6cMn5OJxb)R3f?$PY!fG^>&aG|E#PDfqbas9{F4|4CUzMeYXQT~yAQ0!
zKp`nzR<i@EYa7~#6bzJ+jl4laIM9&_5&=UM8<CQo*TaU81+%;tV<GkKjT~Iht@0U=
z5dy(LxUsX(<_To@%v3-?zGnVGJfn@ErmO6(enF1UxV}>^KgnsWN7S~M`-LIyin21W
zKot;97MyKC;~JZtC>>-&IgArrB{p#BLJYncqIJ5#@+s6gzfY7m{!J}iG;dAV#hX=b
zLAqzg#)=gh5J|p1^`xF1vC**53{N`=f~VRtR6MOxUK%iVM$EvBn!YJ18x^8&F^7v=
zxl31DO5RJd2lMdtPzf@jE3cag(7#*7tBkX8DwTbI&w%*G<+yAssfRScwW8wTnt=i%
z`b~?9-|deTBg8;I^3Ij}pl5nv=xQ7;?t|87Sw}D>IkHha)yQa}TBD&*Uywj}xZ(7&
zps_4MVpK!33!Ec8YR#g$LX3Xk&R)>Yqrpuy8UOlK`I3Teg1nR}ecCQDD>trR1!43;
zc(!UDCuJy2bigj2tdb2#gqpme9U&X8<WDAQsU0d<e>qPnP}9VyXR&@%6I|@t$k|+2
zG9sun={`ofG{KUHJu$Xne)e_-g0E_960r2qz{`@NM)4tzddm$McT2<-RqoEtPl(Xh
z-4d#T`cgt&S5y=N>6mCCRUvlr20M6Z5Jl!0h-FaaqDH33cSzbEIiif7fM*R+2d7Dw
zJ#5?t)q`PBl;_Mp$F8T=WjCdr%Q^_h{Brnl>8q<~K;t;>oNg2k0j!TC9M)D#LFkTE
zL3xjyi4_Eg@jz^WlT^4S;;=!${)I^v2rs(+uU}72S4}jIOlFSPxV4&Y%*50b1shuu
zh>A@s{P+wApI&b;28o+*-|PxE1S<@tYd!v#`2qrp_m+jpzU()lA0k2Wxdc(<5&!uo
z*Ye@!9{)07|G&HUKF0&Xml;+5ONI%^{4YNhcs)d{=F1m(YHa;-8j8!%?g*jyH51!z
zLbNI=u8V8j%4)l)9$S}nb&J+gDnE{MRk_lUHib!_H+$uM*?t8E_Bk-c*=z&~r+(3M
zU@gJ!BS|zLUtJ2uZnG{Mv=L&oYWZWEgaJ1NaHR=QNN$SYD6GnzoDHl|*Ohz9*FXQJ
zT>G2DjG-vMHg?$#i^<T2=+XBblr}oiaG6fyI&ZAl5nk?T?@fKvNcOi(74shULLT`q
zO~^WaO*vm#dOLH<$~HrEYN4dM3^6{OEyjbG3ex0z``-mM2^d736QjaGlX;X*meFb{
z2ND|BkMM3*Iq+RKR<Hf4cLR6XP6}X}jl1{Z+wImAv(){!^2)M|V`d|iS2dlbd>k8m
zfO!SZ`@JLY_FXEsw#?6^^?~i+LLWhkVUx)~+j@NNkV=%tIRJ33C5X$Ofo!NWcbGje
z5EaLF4FlrhC3eNRE3bbg0_I6igf>*TC*&%n=~?2mkDF=dl2%Fyls<CGeB4|;DSe(l
z+419gQSwrTKkXA^At0#buC!8PL({v(06g|Xe1>upiOP5&u;snFBJBE}dEHCZi)D$?
zYzElMpNkyJAE(W57A7`jcsb5E%(*HVxvB1S2Q84~&64g4MGNys&R`yaV`lJZsS^UH
zo!|DGZ-s>8+(5;E><<2thXIT;FstgVVD7Ez56OaA(R;iejV?`?&Y?1Q5Z4(TmX9hL
zIr1gHvO|>ma3~D>)wj0{W@M3`<-Pdx{i`4+ST@^N)<;m`4z9r_jVqgm=twg+sKdK?
zp9eSh7qaplTYT5pE0%!hcdAYd-M2?W!Dts7QylM(lBD2!H<z=GWT6f1y^*o)H$FD=
zuB=vq_OEv=stZV_VsjpnkEuVZ)_m-<Jg(-FRp?G#nNt#FwPB~5L0LYp%=yY>5^lEU
zOOBc2R}?pyl!?rIff^qRBx*;^ju=-)E43tAh&bc^4Ac<IlY0C2r+IX~dkAWFyn%2I
z1Y>`h4tT{~?|0Uk1WZlUzMUn@7^eFPg!B`budeAkG>=Bt>+zk;co7H1;cB*93Any?
zO|w}p*1oo#lrOeA_#P7$dbcD&B2i6Rydq+YZVdxNUYE{@9JWNVn~xZD9v32RNxvrl
zoD=NSpRB|ac0f+^v<H6^INYJ$91ASCv#{Vw0R5iY{<x!tOVh|?|Dv?djuoTvK@eYL
z3y%A|lUZUz4fFTO6I@arUaZ&P&a0}1Um)z!cDEXAz-zJEVD!y~)&-QJ?Z|IDZsNg(
z-w%3YE;qK=Y>mU3^Ax6NDF)O<CaPB$T%eO9F>2`Jn9YKiKpSGm)_*v75&nEDa(Gr&
z#&b^scPdTLl`j33#*2^scv|T^!1c1s<mUE)&hyQuF|p0pS3%>RZOy5yn7=dfK)<p;
zhAiRQ+=h9k!_H-+f3LErafXbQ1iGU#qZSw3ToU@z4GwkNw!Eme7FM<v86O9*aj&GU
zDlVHBykIEQ$O+@9HO1Lkl#?_%Y6Z_0b8SHT@bI7k9#p-T)4C}(Gt*(SrXd_@Eslmk
z9B@+5-W)7GCnxEEjMx^?HW~E2g{tay8y@C+w;gDow2v50q8)g4w?kl{_H;$$r}Kc0
zns9}7-{~0{=XCg=khaC35)Y~}n|=<e6hR`qkfK;f-GLK}Uq)5b8@->y(w^)E)TtA<
z59Lo?DMvhPeBm4_stUSSy(sv<z21I}>L|*zo6$)Poi>}#{)A<04W|;UqA#jn{Duh?
z@LiS%-kQxcVX-y#q7$OP?J#grQ1`p(S~4orG1xAe>Mq)vuo#6zQ$^vzU;c^2+VHa4
zlv{Cv>}u@VBR@&KR}Dgf*=XcYjIxJuk{z_U0HGR!nBu-f?U8^yjDEyRF(n=*7WL{v
zW7v+iL8W&$dfh5~i7B;Io0T_$D2#_=cG}PH;Vzdy!qm9`W>jo94{x@ml`s3cGzLL(
zYCrDWHg+zbbmsskty`?gE7>g9nf8QNrvu8<^$pHqnRWO~s0acg?A7KRpFQi5`0LgU
zJW5Kaau(?gk;40{E}`2vh>E`Urhc%pq#f+3*E#F>{c^_<h6V90*X)e@1w*ybgQRLl
zlB<nYo`G|(@nLkrMuO?TK7}>AH~U>Q0dsa+_Au8Pa;Ecdpy?0T<&KpgBcf4P_3UW*
zf}f8*w9k&fm|dcj4(H9!N$GmyI!%8aw+q*qUl!`WTqFEP!OQ9ChXe}wX57AYc<|7=
znan=aj{G@24xO<2_LJ#`w9^&p_5MN{WV+fNcx|wTZ}|mwM7dVIQjSgGg2RcA!%3(<
zmBZmw42A!Yh`z-7mlhGMFX-lbG9MIK>&8NqT!ol{)8yEDY#;wci{m}0n%$^*cQLx)
z;N?-Mm7;<QUZ-64VO6D+t0jypAwj4gh>)CqeTY@{n{h08{V%MLQiBG~X%|Mls^C5b
z+{52n<V=>UISlr9`1~GzP)YR$u#I-ax3!@b>a__4W$ub|ufH~Z>_}jebduViaI-&D
z!sm+qG{@TCoJ+!u@&C%ILTskm@X1(2Y9HZIujl(9)$uG(xnY)eOWqY>4Z7lrCY>`w
z`!$fRQ!sU~V?P$oc~9yEM>FF4@I$ZbisihG|0t1><$7_nKGOpajd9xJYjh;xNvgo(
zgJx7~tAGBes@HelOV9J=M+9r8+>*SRw-dz`UrVZEHos8W_zUmLIY)wLDRZEf(?SR1
zkM;%T&9+C+pREN7^(PV$MvOZTNA^RtujGX5%>Gqbc<?FsZ*FMxlYW=`<oLSnfM8#D
zQc$xIM1CK82ApqE!9xusH3h#Nv`G}z6ohxfE#I^DC`8!^59gBgj7`m`Cl`I1FJj*;
zs(>Z`=354~au_`Xp-w{`9CNEsG}28qFM_Zf0*}s(n1|-o0&Q&W?3CuffwlI#*`f0?
zHVY14&P6sM(WbS2V~$QC9}j^`&t2wUU%6jDV_5-LW80FG%x*Nk_XMj^h11gJOPwO~
zt#cMwG<)s`#FrkA_W0HX%J%oB!bJw&x5Cgjnmx*W3=~e&4ZI#x<o%zy^9$<uMhlPv
z3?0NtJ`(qZJIiYN=OCtDREYMnT}g^I*Cy-&J8!$tlazJG{d2lFk$yI07w<`&Q%boL
ztwx<+&zio&b5u&dZu?zpnys|v*kOqS&|89Ye-g|ojb{NBiP812htbGmG8`MN_}^82
zs3-IhGpu_=-cU|2w@`_d?n7u9n}PeL0yi`HU3vBbqy8LQ<Q_}HryDeSf&&2jW?+NX
z5VFclxBCww^TQteUji(VGpkOE=j-y02WQWe9i#rI#>ZMD8*52<cv0w>hf03q!Xu^B
zI$!6Ixs>C(iL||vm)OG*->#hI0-vxSXUAN|OS_fMci*P6w&#2#Ed0)F2-}!q($+uD
z1=PAbgN7^|KM;b!zG-)D2MuU*s-6AayS8po_zaJdKveqLF*%=1ZfUH`ZdT6fbGx7-
zUyl{OVy0ht-{&3`FF^j4<kb#8f0Z^M!dOul>vSJRxc+#ICR*+r%t(@TbR)#x>Gc7_
z{yTavHQlSueS=Od327&w#*rlU_m{c)q&+9KMC^tMQ8G5?&XxE3jV*r04d`X8{q;+n
z`*B>??}-+2eC?)SRVbsB+G8~Smvh&5HU5d*2oDA?2V7^0XrukGwU;;33aa(C2uu6U
zk+v&8k<Oii<-y<MFWjMxA|W$uH%!@;PX~o(6w}qaLWIxaJ3Vig+mAz4<_^iyo^LJT
z_16>I4M&}WO=H9%Pe7UVfg5nJplmGI?-|YHeB<RZxi&u7*Mh&%1?Zz6yjwKCYxYtg
z!R(8o*1Rc5(u_}v^VryWvDp+RY@^C(xD&`h7Fch^vtDXTtvNQHbSD6!FO50ZGKP*j
zZ)C%FKEfHJUCb12!*39IQrwvmH(`4GBNMYHc8f?^IzsQs=NmIqBTJ$0pZIX7f7V8b
z1YS{g^#s)8y*PX(w|}ks)IU`iUe4LaZ9RQAoA`=rBC?152@=s*o}YUpR?nSEs(0&N
zUeNjUn+yzlDCKj!D0rPGh)aL`;D$K}Cc&!2o-GUK4$Hw*2PQK4Q?jDS|2I*`RC?9a
zerTpFfpH67a-GSCFWn+pFCBtxs5_S9^YV9mzDZJOs`AIUO>T&~ajZ67lB(56ayzPc
zfvl1CfhpupQ)X$7gIR@|bonixbdIeQX>lR)6>BvGj$Ib5X7uvTBGyuiZ{DAubQYO%
zRgD{#Yd6r!pN|xEN8Xc%HUwWF+Rif7S-OiLz{$4&cyyxo*c1DX5g-YEV#kUx&X0A2
zu_MdZha1($gWlT7Dh8c$5sgC!hfK3aH+F20{7yp~ThhyqhfU0jOG8mgVJj!N#ntAM
zWt-f2jsrOLsx9+jLH>=h6@XZ7AnyT7uou*=EFxGg(Bn$cGZT(ZL`70-&5|`+(Ehxx
zQaGV0m9vyh+!m>0&HdE*j5(Lxma%cw6;L!KE5m7zj7H><q`lU>>`I4s<VhN4Ghf3c
z#LSB>S@Y*}Epq(x{)&|$V|?@{RL3A+Kc)Wo&Yt;ewePJ8;t9pTW8?b6diuD>iB+vx
zSFhgRon^$%uSe}#zLESD9S`7?H|dGMK1r*DH2#Yj+IP~g!RE@3mY0$vQ3a>UIe?=^
ze3;~gSd2baNdMKrm=CwPO(=urP0pWaz1J+e==Ra_7U|})y7a3~orsPx1%QnJ?199z
z58O(Yw$#pz5x{;++C%~+0s2eafMld=g9)ukx<EJjv0gTzn<JJ#hq^u-JdA=~L8z>>
zs8hU$gD%qoq~seo4~K#pOw5FJ_Br{>D1R_D%`mK58Akd-V6JtumFs>CwD<T=US=#O
zpJ-0+wIQY0rZgWRIisKo1J>=w6blfxh546$RHL%O<;5h&ATN|72tRYW4{mLL$yqS6
zQ)`S>gjN9Fp0meANoY#P0cWd?Se&UzX)#%1LRevCvf2nr|8F&ARmPnoyuQD7pn}*X
zJ?!^ZNIeykd#5?{pq%V)5`lv*l%uQn-xy!55FSBo!;qBye_3rHdJBKdup#x>GVCS!
z^0VTaHiL9@0&uw!kZ(CPu%((XXE@~wo!CQvq8`VizDDZBDlPiyk9dl#eXJ{OQ=5#f
z{(?lXMO3u{#OSWY_LNYz^0>ewv=)Ydb-LK4$|R`Bb`)`4*kYou^a~aoMaf@}!Xd?I
zb!J#*R~CUfU>rG||NZ$Dup`L7)m{TgXv+d-us`J_+#$=B&U?ISZ5c8VYf!LNT`h_=
zY}IVop)jQxwkAGfeTewR&ZLuSj82xym-RtCR$doe7T==xUu*ajtC^pZD6zL@koZ_L
zu)Qc}chkY*gYW>`_tB(milFdhVgpvTr%AOMvQ~)Y`*lrS1quihB%|STOW{@e%&xNG
z!oP=*LUo4-fmI25-l6J1D(Py|mQl~;hD|zKc9ouQnrG;b=hKTRuEWF{O%)q<TD8c)
zd2jHo+FdFbdaXEQ5YKd96Q7XGGyPvl=9JO-7K<*3;*UoF9{XJ7;6J#D!qQ&Sy}j#X
z5}~Lh0rsNquc1pyfbg8=n^vF>f>>>LDBS7!aOK_V2Nk)QJ#mPN6uuKc_6ioT(M;SU
zt2!}N(4E8`hM0s4JIbmx5Q<C@M4HP3o?A*?>OUNS=5c$l)KcJ1K1VrG0Ks^smp+mv
zGBEt8K$1r<*?hCxvq5YZbJY5p_x57>cr>2%Kqt@p&O}tc*)uxj2WC^WrB8+v{<AdE
zEkA?<0px0$CPg8ehBqMdMEeab@=;|kj9~1ba{+(+Gn`<606UEiC}DE6I?3E|*sw6W
z>O7b!o0552TzfcJ0})9DmQ)c@e<k56_tICk9KL6s`R=CM>NfAXMQzM=4WcoH@t2?+
zr^%_L2k5MsZI6g}f!S)HQxY(=M%Z=ACZ5hD3ZSkZ;zFup*6}sPiHZ$QuQ$sAN#K$V
zh!U?Jm1ol`0hS2q4lV1ft)QxX6_(hL&k#)}%WOCOK2Ati=iGu<pO7I#k;#&%??`bq
zO~EL(KFiH5DOP!KFr9?!4Dxf1(++32wI(rjc9=hq+z(sM2)tEe$E)+N4>4o#F_R(Z
z^5juvzXReO{0Q<YF|c$UVPa8Z9>C>&8w2=;*2&ISL_M2gMUf?r*fGY}S|jhcC3dSM
zHRvqw<-DS=*e{Fht?bL=!WVLtS_~m+@3Y!toqlpmuBMi&LS27`!w3ct9OJ)H>sL~5
z&j_LX?VqWXCMELe3RR?!(`ca%4bcOKeu^}C?#BZrD5u+-WpUCqrJ~N|U6e@pyB`<y
z9XQX032(t2W{OpnQ!YXP4Ib;A&u^@32iSran^hWG8e?IYHP29Q&M#56Y0;aK!};pe
zPf2wbV~op6aiVMe1`&(xLv1{0o~I{@qQ!dcX@3TazL8eh3+>b{c`&qoQx}B_dP5#-
zG(nyAb5X92l<^qr)Y+)L3U^4oz`^6h=S;v!F1($5!mH*&y|%vrr(If_<2T@YQ(AQ}
z_D9&*6OXqoZW)-TtS>NMg2TC1<8H8GxchPI@OUm9mWw=XO10$9Rj{sZXE3wLJzHrX
zO~ACTH9C4)>>?tgOAv<|G2vgW=93z;7)hkx5`VBkxbv!Z=3%gB_J{>fdD89vu8=&5
z-Cpi;;<3REdgIgbv|({t{zA8!96DRTxS@?}!)#XVR+UUkC#|Ux(+dvczZPXyQ?nP@
zw1UEwLfMus^I`$lb|*e}c-&N8ZZ~w-BYQQ65&v2%j!)2rQf7Npz^7N~eTj<-i+R0T
z<T~M5Ng7TLm~=!qUu}(Qy-)YpU0rNGb6GDS&}cEC);@_;owZ~F@<qC@J*LA+CTk)q
zyvk09E)GH;9<UWV!jPhiq@T?QwTqq4Y>^yQkIUL`MNrr_u1ICbYOk*#D7p@M==ec{
zgVSZ95^W$PLU&?7(BDaWnM`PFbO)VZrk7G&R<Iq!nLl5eEVO<7mzo$2b$7&Bd{ch9
zJf)|2UxCOG45mzf(NGY2WlALj#9(en%kPj^RWC_jSCgA-ylI|%Thk=$E`R1ud96F@
zGtFhS282=~9N8nuo3sx^l|5jzyP4z0-k=C%E1N)I5^=tMSg&)qg1hmhmQgfNa$bY<
z#LBg6H1DVKEPqX#40>yc*Z@JhPsg6mG2uUG@QDgaNbcd_MDFU0n(>O4T&*5$x;dz0
zr^5<8nGn1hgXW}EM#D$k)Lu8;XhX9+qj<!9BQUYYs(G^a7xh9t4nJpD^Yte7vD(0=
zkFwr4U%ScdI`(xlPClB?YC>DKZ{9{)jaioHvP315QF!0)ZRgMFh)s`WClZ~NyIq*_
zQtEfmp!r|4Akebfeka@g@@Kx9kNb7w!|Q!?rt`di@drm$V)O;A#oi|LN1@fl`~A1g
zS36482j6-kH@+wRI7l;`&>wgwtnKo5@v5*K@~y!`gdG9Wx)`De?TJHBjYboZO-w%K
zFb!s?XjeWND3+gHoUK8{Y8BzV-MlW)?y4j={J3SwU!o)Y@#c0qLdHSqn;cv4&WE*~
zt?1V2vAnO{Y-Gzh{6CVltjT=Znw}GtEJ-WA#PS)uLKK@^b35o`7Q>}nqVanYhQxo2
zyYb7*wT3Ft$Co?_Og>?-l$Mb%b$vkF24*7T!}dFHx>8OuR6uh|gB!o>(2W<PbJru<
z)0FuznyV~o^Kv|*k`?v-Mv|wrx>8?%Tc&gJK}QYc>vvA3+!g_Izt8T~b_W!0cJXm^
zcw@;~RsRm%xiS`t^|qX$CJ3XXb%m<87jlVou*1uqu%7y}3r89duB=B%?M1-&`C;0~
zzFGtH{C-O%$LxbQWhM`$`{9XI=yNx9{(#xK(7&BdNHzK84HM284Yh>_eJpc)M}M{D
zN1!B$yD>MX5OW<3FVRT7i|8pgME-!Dq|UruN_!l$s8fw+Og%ETyWQ!%Yn;b)PE$G|
zB`M0M_ul+iknV9G0EKhc7?~i1)@<)BPbcWHlv6+XI9<r5vG?n*Pt6}VI{>n!HzKnv
zTKYuDhMmAmon_i_D`04Er^#kN=6`ghE>{IrRW65Z5JN-5;E;%!w~44c8_gPUZBbkT
z?qD#xN844o2Fk3>4`Z?0e?bku2*LdFa`>vH$PK%pp`p+qD5SX5)bQwNq!2@crZq?I
z%>4ZPZ3j*!+4%BuIxukX@W@D!x%#cH0a1|ag0~poBEFiYixq9M$bU9OQ9&sU0s?|e
z8f!SP;?l^-$YP_FjqlezF&7t(RGe>}8ruI=$002&F3#pjAYsyJbk|$XNlHuSSua)A
z+pM4hmr`gs+%;o@TcZvDz9=zt*UvaI6V1ZL#-!zCjm!2sIbi0+VkY++VKh|q&|SK3
zmId>FG@_kybTOg0{CGcHJUkdg#6pQ^LSTZl@@%-)`*!R9y5aoTn7B|pG8|5UOtGpj
zHKA~5nSb;mp=Z@vI?}OQOK@#d%|WI=KL!)RF#lf$g;vgGf+`{~m&$y+SrPp}-S5a9
zNd~^J`@m`E#$(!5cfau8GT%p13&Y0_a&vNa%7unks3LCD;e$V-fs+V+ei0E7RP^*1
zT-5*G&QX|O(L*28pZLg%kG1T#?DBV5fhPf&e?AWJaqB11H;OJPb$}r@3FZG57X6_P
z*%g7AAOJwaqyHf7I(T>9nbL#=J~=tk4YZKj^%xnFrSs2;f^(@j@d19%Ss@{i%nmP%
zdjD<H@^71UJC2r?madoE`ra=2B-7r$J{SZ9zPvHnB-4LuV`RjVpFi@zfrf$kPC_E=
z(gquNy#ym8SDt5&4SBKFghl-ZrKqYZW@pE+v$NBMo04BxxO;R&iF$^ws;({ptO-<9
zRQy-Yw^N0dlA*QIb0WP6+qD&cE3g*v+W#E)<$~UDJ>){-C$<TE<)V@{-!t$CyltYP
zaG~fg8-udpI_EC@u$~FvQ8Wer-%<a+w9xetl8h*L)qfuZzm)EM_cxP1!6jDK2@omq
zm!QUtjN@zpoNg&pmLf(;U`IH`q5VU^ajV?iIt+|h>`NXz5|ayp?A$a$+T<CMUbFmu
z?E9Cb;2f*aZi01u+UJ{??^g(UId#`W;Z&TdCNDkk9Dv1t8L9@9mZIA~XS5B%o31Y`
zF@KJhwRp`osf^K_5}k*Xm(mP%`Gi23zXy-02q`HhqMEJ$2uMyQkWfQMS1mBSYg_+3
zG%8*1DpxU4Sr8d)Ul~tp!D%YZecwY8o%jHR5_$w6B%+p{<mQ$_CNI4c1fk)GRT$6o
z?csR6EUY_hc!&f10t?!t6;vLgwQDgj3Y^%Yb$?`WG_mHEqW&du^tWu1qm*#1d&rYd
zsWYI|1D=`5tJNr?>*KXMDhm}w6Aaagqx59Eotx;U-8fYh)d614?6)GBBL%MFi2KM}
z+qe!x7-ju;fR*aU(A=g9MuQU^Bkw(@K2e28BCC~EX$i2xg%kLtf}r@4t}G=H_R=5F
zc0R0jI7AaAe9KtsngkUS6BbfkI254Ng4<WtvwkI&Dth<+85u%GUDOp_XjxZU`mWO=
z4P>3=N}^^w+@)Cv3co#~SFZgu>%db51=yKv#D0`-qyvW^f=4Eap5l;ELN~s1d}E}H
zUUFfoS`#zQ1Hem`MwHS}(h_QN9o!*+^X(XIdYoxO22*dZPDp3_$cif}!->tIJxmRK
zVY%miA`qUkt*7-2$WItPX8e}v&^g$6I*eB@`!0Qpb7Yc+TI>Cbf4KJb?hXAQ0Yp|<
zQSRmA@Z?Z-=#}e-iI|WoI@z7R6gZ4(AVFPM-wH*zF0C8bPiLGN%W~Ho<J=Zp$Cmnd
zTU}h_^+p6&FQmGrYE&u6pHDSDTbOF+0)Qq@$oGH>FBk<8Xhg*x72nt`iq<7r<Br99
z&xw}`NrN=v50<W=UpM1;%FX4f#K&CTw+Hx`7f&R#R?doi4ZLjnnRIy>ag7np(J+Ay
zh>Cv6;kin42s(FQpEoW9(;@awZ~+kLG#U?^bnHnBvCDp(#*l7<YU-monO-FdIyPF3
z2y5MC&4ux!w<UGUd6Z12qcbitE?~fb+pxMm{kB3-VznA+v#AW8RkV$PaZ8jPK^wBg
zx03JKs%7pdDVy00j)X~FeDU;&QTgzM6UF=&4#&8yFvo&A65Q5s%ZXKU%*crLe4<WO
zcFk^fMt;VOt6YHE3eG>x{5#Jh3dtRjznzm}f}-@)H%GT2;3(L^-d)@n(uZ0nhM?uH
z`kHG#9MiTZHG4w!ZHr2KvKd6gne*Ei*D#5`@4TA;{OW=`tnX%|Bd+!CI3}eX7218+
zB0IGu3hbGJsyY(wKq=C0x`tVB=B~kD!?Es3pF@2TTHE`%2+-}n0>ri|ie@=d?y5SX
zDupOs)*6+L%Ifw)CrnaN;9E{vNZjbmdRjl8DUeKe`|Xz7xg*4OhB<y{)ED_fYO~~t
zN9TydWqw#6DQ+0ib>xz>Di^RjvuzO~nyrT+qTA|B=BjEJ-yxX~H#AMp$n)?an0y=G
zpqsFk`YLNh<?=z?N_;xVHJEmd**_F~O!k5}5tQU<)hu$RYDzOK5yIc{O6XRzmEw0u
z;UkZ_kFGGia>OwAMm40dNYtczu^{x)g}jiEHBtG6A7|3Dr4I!8u<*aR(JBdJF?6|M
z@4zb5#-`r+kyP~xTRlZKn^@qtC0|k$%j0g!Mrw3fQTlpGLpN+rie2=T@Fey0wrs^v
zuATTSOk`jkAyw+A`E<k}q((uAJ#62eK_Tbjg%!*JFB|j}Uyo?b;pL+m7lJExZsn7C
z(p!`MJ%yT#Oiy7!h?#lAdbKh3zBJv|NjC%gSg9Y%^d%c$%a4mccpvxI(8Y`5tu7Bc
zs*;qpA?u77?PXJYlhT-GmE(&ySfZpNogG$TQ=bNl$|p;N;{IBF(InAniZv|sB&AN>
zm{tm8wgtzx81Qe|asw(^8|n?LQmkl#pde~3)%g`h0XlxG2pzFGJv__0@aHT2HU5ID
zjZ(pbedDQ*h+dKfB6z7ph2th&6lll_lkPwGO+|8qewIN;_@<1N!LbO98XhK?&WrZP
zpI-gVsf@sl(B!lI)}jFe1KTqt;6FW#-3xZne7khLQ_e^QCrQec8!^B*aTxX~a0(VL
z*sux`PvD%4hCCPd%mh{0z992v;ycInTm9xiI$POa_+^pN<MhO{xi|O5dbuZowsJ52
z4+)8qmO>VD{1ZERo(4Li58v;iE?z+uCtT_zI{vK3?>w-&&4}Jp2~WO%6_pfCGb`%0
zOq2`2)i+@aC-sDNC9QYCerj-9GH_*NK}Ntwr7!K+5y+G!Ox9oQ?xg>Q@@010Kc^R=
zK*<oG3gHWN^8bZ+*aCCniKSj>R?Da#v>t?SXG2_IO{p@f$?`z1w$MLYP$#ff=sURj
zuI2rXw^DDyuw_I0y--(rxhdsnYYi;n$5+$<ete(>4n~BEvJg3&&ASN~R2lCx)Nd5z
zZFvI^c$5Hs4{Jo`x4x%k%A&X|ikjO*d9LN<;mIn@8s5CD=SF&%GFnnB<_<aJVCUk2
z{ikPzGJE2dEx+-LHT6An1cULQDF;m`+I@z@AXm9cA2TrUy>|;uUx6xn4Uy=5yI_ij
zqM=|%`0$YV+cu99D^3nM{4m)_qb)RTDw>jhR|^6OUOvzJa6Bmxt5vAmOP*|JoBceU
zjYDm<t5G8xD_RzS8p_fUH{=Lyvzab*QzvVz9*Wy8+~xMg10K%u32NYcVWE4UKc)}l
z->$~gT0<C<c~vJN1t_gY7_(pE>_N6Kz{oZl8Uz<@r&&W0Q57ExKyoC?{KJ%P*@HRR
z3ODwI5BrB9?+E5GCY(KkR)3BVR;==Fu5^{6PTYPZ7EEe~MkYI1dVI5<kK_ov>2}yn
zJzRz9!Ti-oG|osu8$)jufAs7_Qw^Ch{*znN?UoIDEE&!^kfLx3tA?#-1O?cOg<_;g
zu<HCW!x-8VzZuoV+SN{$9(m=_^gf22bcdLE3B1(dzXbD+9#YhQ<hl{5+ADQ|l0Yl<
zbe~{8-Wc9xggf>-3es8N!!0Jg9>7}ZJc3R}=n8n8^6iz!5W(4P3n#J)x$Yho^nEvB
zORN~Y9kvasR>MDxl0~|?xRh?G$Xic<jEfNEl1@I@lacG&Ir`32Nk59U74K?{EA^ER
zxr7i##034uhhqYOGjsnmeAkjSQ24TMwx9B4NOWRuM~vIW;N|Hwu~XB|^7^1r@*#V7
z)9vYXg=(giBPC{zLQ&V1HTNq%!S3HrKB}oW)q{<o4a0TA+j|`}PWu}Zbn5a~!yD#o
zH5%~^7v|K3Tz8iM|NYl@ffI1gk66dxz21gPCrmqB(danu`|3MvzC#i)CWjM9qfFC(
z15UR@*R1o%bN0MQ>z;T+{8`-`X8@K;5i-_!CB>RhB%-dwlaSz@QWA?}NgHfV?{{ce
z+gG3LYLMP{<7!YzH*XBu+9k1<8?gFd6f%%PL!+BWN-bS6W+nqs?yD(*?wd&pFE>Jp
zo5{8uE4+aMoc6D2+4i!aoyza`xl}f{Clx%6$0}MQ&YG>W(#34S`Iv}-Clb@+SDKi4
z$f#?vR2a3mw8QHSzbWl?q=Lo-lLL>h^0pr#W=eHwbLnJ5;gO;Tw$g;$jCu6DzfcL=
z&#W**8q9VpfHu1<*Ua2ELWI5x;iV2)Mvt+T8YhY;{P&DONF=>3GI7nXH-zUx%fN+X
z#c01#2vY`kKj4peFEbe#=q5{JRYngVlo>~6{EyVJ3hp$!@4VdACBKE$U@TFj!>Yii
z1t0n(RR4ZLhnAzPBje0__xSd6`iwlW@8T__sa4R~tZ2#pdQfU7kU%~vi`k(z9UCoK
zZ!w0f6zACNMrUX`rCftI`9{S(UXxql-9;MxK`S8cr0P^nk&%d3)>4vuK%`#|8r(p!
z(HTs{F=UvaEoE;`I=vBHZ2v>!$YBTJRN9(o+Nx}1YO{a8t#QvOH6=~F3?S!Hg#<&t
z8gstoq6vh=^h07*7cnJy@i+fYzVywY6>wuZO<Ka)%A@X*9WQ)$YhhyL*cNnBcj7dL
zir%WufJ_E3Kus%0nN9N{DclW~t#h6daO;1-HX+IPS#dGf{cB?f-oeVLhMLsuq5XBZ
zL2$1<10Z=cDHB~DW6P!RCDIo14t?7ZP$xzh@S1i37qPG80X{CtLn1;_6k3rkZ%GXx
zS+CgM|LvfgQHbj?^ddP*6%3uZPiO!AP1~9}Da6^CE`~_5*&fgC*B#gEx1W^O6tZ)2
zoBOix=YU3+le96k>=GTGL)2Z>>ku+D&wIn9SHMApZ;5~SCH!~t2J)$PFTNSdsm(C}
z_>gATnn8>?2(?-!X=tPJch~%=j$j=xdA%2JCay^Ry@Mq^lGn_$8fw-Du47!il|Y*s
zP~2Mj6vPk4!v@Nb9bOz(R{54s#-rpF-o%BjJJHLlW?-5{Pxy$Mw0c?On9~5gir;N!
z#2IXPcQO5O3zP`~enZfnUv`d(8G*nXO|m?Fpf+ge1Y-+q*jzpnF4P_wlRONuqD?V@
zIh<Ox<WD;Vf(p(Gs_@cxbs!x($RT6+yNJCUI1CPFTuta|jH1lfwp<)YvGIWQRIT@(
zc&S&zE9Gy!KC;x$Aij0BBg&A*)|kdlf4->sh$jv2e99AWZbPV2@St#ntDcWJqTHx^
zXRU+xd(yTak<0o%Fdg83dA$fit!7)en&Wy0JqSInluzC1_g{{#C@=5SZ@3(VLjV-i
zDT{@)eT*qdmX^Fviw&Y#ob7FKxx3u2@3t&?Uv3#3gL3=v`Ks>~Kd^IGME@J1^n#Zs
zML<AgMS#BSdp>i!IX-irea$>-c7I3I>$nqIY`E!B#p<bEqnM?a?A@4lsBKxjW>>hH
zkyj&&dSJk1rOlL(H`oVs-OXaS$1gI()H-EuHt~zL=jTa>>#(aFMVx52*xafvGcy}O
zIlqPJw)>6wlw0iumGP&cxc@0q7e+30Be@2(QQOT!9pSG>qW+Mg^9ROr{|=Mf*7DZ>
zd;ph0eTz0)er@u2Uk#O#sSTWs)y~2W$aynlT<aTmr}&PMprB)Dxcnm;)tq5JYlvg_
zx<*M=S$4MjCV%zxrLq-87m8%pLa`-9KHDd(RU+H`nw)gx`3;`1{eiN#m+o2O{veGf
z6ged1b8DPwq+eM-QhE*~(TzhuE?N6(e<Zrk<8fBe#_!gcu-%p3&=3=h<jwhx;3%jJ
zrK!ksFfwOmdD*{-i)n_91EHY-`+gT7F}YVcly!L1AZ4MNm~w*UXkV2ClK&uOKB0b9
z&6gv9)Bp`>Fx_l;?tAEb*=0=L6M!j<3hDGPafD)Hfn5vsz(uG1f%a?Fm<+VF@Ozmr
zJobFnK(?)!yB%xmS`?y(uAPqCm8Mo0agHlgM0S?Qhbqz@6fyZUNkvE#hq}{4W{!VA
z-G@Wv#UpM!C9k9tEiIutELv7Oe%pRfN2`B9cKi5k@6Vskr6>2-W%V~(qi~FLh06zm
z%vKKf1aer?d|qXEFtaY#aFnqun4K;}0EukF`M=UQtv3jSZI{G1;g}}c9Clq*XgtYs
z#*b>WBRf&(g?jybHxu-H|0ErdkprjH($dc%ycX&RVJRsX3=E9?f`X6J%ida=J(`Jv
zYB_QmeoUfo*GbM6@)S-g5?bOT_*x&N61aTWX#y2qt`yAE`NtODeMjhFRC01y<9SKr
zl6K_K>q7E|N?{@Z#LH75ZDi2|Yi^2Gqt6oVh6Y7ph0d{L#f(NnJ65YMwm~9yMn5sp
z>jJ>7eRora;5G$kUtLI;mjg<^yo-{_98?dSsiwqq&K83;UExLYSgi$qi(^|>7%8$L
zXsX^M5K$V>x&0)^DI*WDJ8BBpOWdv?uj35OC1H%cAvl?#My<Dcv|W*t^Q3R}!zXBU
zq1dbnDc3!KXb30mCQ(jo2_*=<g+BA<zsS3oKg2hCy9}EDNz(~B;&PE3k?r<~gA+%l
zsI4sx6p(;&k^rf^iYhrNX;2cq_O1h`ZvnidWL$D?AJh!#8tNINAr+0*4x$@6#B7H(
z%jG)h`Lb6GuF5-@_H={0bbUtN{BmFzG?KWhdYrma03TT_G*Nu(s1ZPYMe-+N4++k`
z?PfQylB#_Xn%n(SSf@C!5U02{v^*%a8QjPM2Q9GVq_|Z0Vdmp}*)N!TB=864@5&D4
z>lqh#DKK{e2>`($=2|$JAIt<3kT2hXaXwW>Ova1tZbu+=qUcczXQ_}WItWQ(Jvb%3
zFNG>@3<HIjjGC4v_a_=)C%kbJgkRzmle7ueR%kd%!>U&MR)m0#O`M+Nf<F&xZcI=a
zp%sC9%bBDqV&K8;<3;{A1p$9zxo0O3mQ@0pI`daN=B(i5rV+jrbMUKH2_t7O;Nq>i
z2r1uMiFmWt+s$TEC^g@xVQ_lyz44d}YGm0NKG}x6SXSVbY;~r-&d(3nr&3cBJ3cPM
z?RrY)_JR5D`qxzsjYPyhE)vZv?mq`rH8iJ!BS~ZDP8!YYA+X`~$p3ND;HfGj7R#Kb
zE}Dq`O_ODs4J}3y9cRws)HgPNZmDs)A$zGrP*H&#=C0pmyAVshlEZ2D?!GQxY|b&g
z6#;%vG^T)r!(ADha;qq#@iQdnB&F8rb+oZCJjWWlnCf)Ox|)?hTUgZuUROjyI2OYM
zhl!1~!_o&?lmCJ9wThqai#<R}*&(--r7$P^9H6M0SX;|t*Kwd`)9JfhPE!jk<<XY<
z>O68h+PbtlO|uwHDCD)8l$KJ9B}da;0y(H(umuthIb*xyg3GCfLjZOe8ro0U1p&dO
zG!vGdqYsi!&NwWwrfFdEnnHtuKPKY><04A^4J|0|w3Sp7^u0G3@7Cslr=S0#0qv-m
zG%w4k0tjldq$n-*&&f$I(n&ALJ2~u9$dX~bSXvwVhbrmKp7^S#m6&6Vi;qtgu%E2j
z6!p6pEID~S>FJwlvbtB+;z%3Rc^`#2e$_N%JbtHrI;|sEny&v52sXz%b_0Jw7jH%;
zC?T*{C(HWLA9#Ogi9u@q{@&$ec2H!A3#9sur}7-B-@VR9XbKzvTT4Wj;$6f)KS-FT
z;s(Fy5XS40zt0KUPX@<}jZFJ?K<(4L*jlaP92}Lu*k*OeNSU{&N#$}0^1L;CoE=F0
z?<UCiM-<uO8oznkx~LxPKT-XA4MY5Ys_OrPst7$7Y}L~q&G*Eg5_ul2bRkQ{eeQId
z&9TOs;)tPW_hi<|6V<*GA=zO8#qzmt6or;RFwcx@W?&##Y^@(MLo!^^+)J6~p$j)P
z4Nb3EU3fpYM9YR<hFlS}9B>b3UWG5Ux!>}|rKLd1j_^OZx^IV=m-k&=Ta;Bcuelk!
zX^kGJCz}FmtdNkfDpG)2Ffhg^rr0kNC4jBF<j3Y`swti{ppe()g!50YCw-Y9%5l-f
zDtV=JS`9S&C!b&Qphb`Vr=y4c4|W5wliY8?3FP89{~?p|Yas`bnR^cvf%%NEyzRQx
zjy6OK2q%W_<-$zJSZ=?oVmZ9(pM|=)xyi6)2_=)7pP!G(&Sqq<eUF;cRYV7_8X6H1
z^WPqU4v(WGl$4>(&73yuYx+j)Nn}z92?+{7=9iPxt!7a4`nnF#qo~%Z$c=dqIkCfr
z90CyZO-)^K(AxiZv^j^s(5jZC4GgyR%_5p}sh*#o-}~6=flB`8=cf@@<d^X3*J2&d
zf1ZT{BL7HQ;Y%`5j@LO8faU&NdBpD}3Qb8Q{bwcw{y+QT|AHUAL`m4j|F}UJLQ3cf
z%7Zp3ApxKI8=XM0mP|%>?<r%SPKu_8!QIFL_iLgoN%f%~6HH`|iTs-w^9);1*KRTP
z{~VekwTa=<K%MF|cL9A7sfv&>RA8NARG$4=_tz{pF-x4v@G6&tWM?_Y4C*@}kH<)9
zMA132^H%DF(41ftes{%EhD3^PFO%;XvXGc+$9_fXC=@MR4K=qY;^C$?<X`hEQ++$|
zinj;i<@xC^qnYsI(SH_>oEl82mBaB`$@*>6w-m>VlbJRm@c4Fo&i43oNCk|O{mT8K
z$-vnB!tC@<+1>dUW~IBgf1ir9!0c@O_%!f%65q6rkiEkz6=o^eUww9k{2wel-m_fx
zf__@_mj>E~7>AZev>f{B!E~9PnX{TzS2jXY{B=aXVz4k(XIu2;Tivc?C0yaQ2ptuZ
zJECQ+8<psT^504L$WIdL-?8TO<K)NcvhOa`Cza!-e&Np;{YPk$r!JK-K74BL@&MPh
z&+eBE%1is~IhS`03K3(T-T;z!myG@*BcldZ$qGGrOv`{P-zn*8M(#tC(DetD;80;=
zbTnqft%}1d5A48`4Q~O;+7lwgIZC7BW41v|M0$3v?%Gs=7TAo#J8>Iez~P7|c?RdN
zyL;)45Q{7BX=zER>-RGLU@-{NmeZ0s*>gmFbY&<R9alDs+Ds4uyoUmEmDY~s3{VIt
z&RDq<R3+8rrx#i}rq%0L<E40PGs~Z56<BO>nQ6kbz5)Ce4|+e#e#UqUL&MbOT2s_s
z=GN!pR#EKWAxrwt0d^jCUE5++iWy1->mZRaPeV;`sY)Z%v}HYA=?krTmIR;&SgTj)
zi&^HA5)>{Ls-YlI&X0mj(kv=}M$q6go8p1?fG*R+z9SWB{SQY4G;wm1=mjdpB5_Ad
zgYvqkr{O_p<=PN5LyV=j_GVt*s#WGu_;)c0J0FDKVcnVUGBxK#$>X|Q@m|<~q_>;M
zKVkPGRTCz!%2Rcn%VNgAqY(G(_A0GaHec4X&+q1q!Y%sx*Yvjo*=f4YX3Y!3No&8+
z|9^Fzc{J2tAIFnXvSi<8NSGm8mdHL7S%x8d%DyCP5o2Gn4`Z8<>{McetYJv@WM3ys
zCR<_{zp~5ne5>Dc&hyXn{qK9u=iGDeId^;C`?{aEdaL6%JV~da8p3zu$v&kK@*+_`
zyK{Y`ZXfRysIqhMojhS{blh~i#Ywuu*yPGg?|F&lCyIwivTJLMv*$t7SvQ`^O!%xf
zL48}#L{f%_mCaHqv!;LGdr)@@=lz4mAU&GPYN;jfK8|OsJGZ5+C{+JCQ#Uy|yEj5y
zU4C)9CID^_+JK#|K6f-tKVPBc`KqNns?h+hYh9LPQeoA1auy<B6B3h+hemi|0*tL4
zR(FkZq}Uy`z~V}Di%&?3h9Ud3dCg&b%Y%yC7dX5LU;Kvo3c_zyDtE2)%*rF$xqeNn
zWAqblj@F(|`E!i?nJB`cPhRK6YhF0b@VEfleoCpLM>nQ6M&BP*)t|j1oG+exv$IOY
zeab3gJ-jHgYu}Hv2mg3QYBi8{%XuAyJ6LOcwl9oQ-VB2$Q`t24sjNWy{R80?a;if)
z2ML)zUWyRFDBCWXvh3%tXu;xAhaaT&+{&ZGaM?}oA<8|eO<S1Y?G3L{=YEG^mAz~5
zyZ~4b@t(Fi!az|Z(S4?wOX88TM1rCgL&f(Er?tn#(ZkJ6=^(QGrOky7zb#c5QMB+=
zI4F(%He;IR-Iu(XuQA0gCwSK%SbR&`xGs5lQ9^a)+lf<ub{$7J4e@>R)}Yuov8+KV
zDf*)ZM~0X#gq4@@j<>nsKwjT0$IL$+IleOXDN>}z*SWs<JFP0igWaTg5?`3~UHnST
z+gz7wT{&dCyQ145R2W~$A+h{*E<L#Ah3saCboS5+9I*!y%BnauI6oi%=Yp6*?}KXx
zVL|O`na0Bkb%XL0M^l($X^c5JDBMVuA>ba;s6y5Y4`puJD<B?Rumx+Nz}icmat#bs
zucWaf<~|(^!^gSuDqxF)p3;*A@k>@@AnTM+P)MM3GeSKzjJUiYi|mjqVi*d+_SXY`
zXA3pS_HfB)QN{DAVGp<-BB$bJhIG{}Xre(<u6Jn42s|%Knpw`*ABT?yNi)@z-SKNa
zd-`0$`y=^7E<TTP#NqjE29S)6jV&YJ#Ljp?OD6Uhv-M~~v=$P2DP)@JtS7VLw!k9~
z7&zs#zTIJsf!AkKT{}%mt4iJ|2z8tbGS&?*0QpKNlt9}o&%5?JpL!*JzWxPG`Ic(L
zcgc2gDf4!1!a(#gcm5%(lBrU~n+eBy#6nCeC8vtNqJd?QQf_5ap4-*$@m7R=8_$p{
zXMf-J79O~$#7&m-?+3Qg)SGM<nLpYxF&k4;@0PDk(VA0MYekz&cD~DmY02@qozpG|
zlCcCAAijHY#H`a|Bi3pKM3ISGpU~7F!J4rr9HVl*Xiv=7thcO2ku(;sj|ayL^lF5;
zxD9<;)?tF~+ye|Vepr-`C@=ZKQuWM3HQ}kY1qQcailF4ssQ$wkkLPX*O~P0^-UBs?
zk|gb>Jk=Z&-*q|{&|sXSeF&XThda1zeqHahB>7I$H^z`ka+0YBxmhx+Nf+ANIa4wZ
zXOaw<&AhH^GK8}B|HtiS%*FXn^0_-?-qdDfIaf@@*q!qr3QvwEXyF5}r}Bec76?aR
z$tOhw`W57gh#8SH&`Lf>gO@8U;YYIj4Sx+u4x2DlkHd%eC!CD~T1R7*Bs?M~Sgn3%
z&1^qy=+(G(IdoY2DnfK|1aED-u}jIVkkwUHu4~bNQfidF6c09GW?@DfLFBD749bNg
zOBcO@^e>WSkP;P5ns4iuj~b-e!|LOBVyi#n0|oARxA^F%E1+IJNr~g+?{GlV(sp`E
zJtE-4p1HIS*M_3Y9ATS-mOZI2rk1$(GdxT$Y;S_qkydOwMrVX|(4cXr$F=qEOR@F7
z%UKj`!Kx0Ieg$D%!IF@%=WT`Q>ng5{JP>uqJ9Jfc`fu240**?O?jK4nyhn425|@(9
z*`Ef9J&lY_t`6G~3VuEn=Lq&!78)JXAha~J2y*%^nUFLzyO}v`3yYViyRxDp(1hi~
zfMX8ho-be9mocxLvm}18hjv$E+><t@`x!)04yiuWr0&b7_Ne>9(9Rx4CU)K6C{^E?
z*FWZ_5k=S;rq$PrKgVTrdrsd<=>{wSIg2x#nDT$`oJ8Xj63`gT(Yw1y$0;4xWIMXu
zKBo~Z%zd`{d0lkq_9gk8i!Qw&XK|-)XPc_7MJ;?op3f>)J1$uVnW(S#3kA{@oa+`5
z0Uzm*GPPYR^W;&Xea<%GOR>k%pm*T53G=*Uza8%T!7Wjn&o(=GMkBV<)I_|&XwpQM
zE&7x&)+p9DP9Q9LH&O$ThQsT7I@l{BBK-XP3k12tryth-;oBrBh|N_;BeNOCPGW)@
zn{}Dz=PA<4PolVNDhe)FNl-@G>yT%#XN>t}I@=~At-Gz{BIL85+y{-WwkM@YWVZD$
z_gORs^Jcu1x!Xg<mn$zZcBYlxQl?ohFP&F<15fX6wMUsfK`|R*D57Zv+u2XaoMcw*
z{a||U)(ftivAbWi-Dd}nhE{&6qhL(pLjeCtXNW!-XE$M-F1(g%CRqngdS>w;eGc1+
zS_MryN^Xu(aeo|pAXOreC7KqRYrHD`l3t;vSlVp@VJ5DMv6=BPvWEdy5?5_PYH}!<
zIvQ7SZBYvQ6TX%J_ft|5my*H=cyc~ufi_uQH8wS^A{7DMzj2ssm$g3Ek_|XTp0tul
z@kO^SEPBUFjSX4Z5|Vk}U#Dfh{M=gP)2GJuPh~m?jOsCmFAonug-H7FbbtUvLVCoP
zo`vd`Le+b%Et=}UvGJv+QW16q5M<B3pIN9WYxKf`Jr0Kh7^WSrgbzB{&cR$I7vlTl
z%5#7;{5hhPe|yvALm}?6j{jQOjViC14L|ScExe2UTHsiK2n`Nu2c8y=jAk=2Ra8mT
z+Y)Qbz~J)cBnw=?qY`GJ>8xy2l*ns_CedS8ZxBWXinnF5Pm^BCEXNi<d2^(Udd;7`
zmzR%0EklmV%czh~2bB$U;2v+1D@dnrxl3^fP0e%S_v$<69~}u+Mg86K+hzgv!e(a1
zd9P)y53B>P(+3>b1}%>#mTI42SR!Gt4{C(OYj=eP{pp9diE{KsFFHzbIK_bD;xRNp
zf64gP+CWZ=NX}fGxUEX@6t@DGZi}A_K%@a3JY9`26l%LM-g(W}2YJ)f6yYcCa2Weo
zzWCrwUF~;YIX|CzyX(9w{cpxcFhn`tzkZ&!oaf+hIEGjC#GLqobQtEMb4biDcCqxI
zk9PJjJa}wfgZ2dPclj+~vjrXiR+b5o4YejY#WB0*$xx<0LhB!)%BV0%Q$@Zp!C~#(
zWVobJB)@*ZMlw&@zY1^AuGp@Ct2=)!r^|;MSW4y%46sls^ddLk@0BI$@rLk}%nyI%
zR=Dggce6FXmf=nUg~G-98orQQ^|FpCBW_d@ekJfEghejKueJlT>WZ0@p|!PsXy}Q}
zxA&e|f<ObHf`axnQ-cj;78j#CclMuMQr{wK``t36rltMW<JS4NCLp1(uAoEJCeM+H
ztrg*iMWVpv!#sB|mW?1jx-@im?!OMFyfOb(Y=0W~KML;u{I|ERb)NN*ws(C8!~(iq
zz#?NrhQ32G1vYa3xBQ@P-(1qr?X9rFmz0;^nnYF=rv43Nu*d*fuA!j;;Cm^u1B|7A
zqfgVIIshQ0uYVDRKVCYAsTKqOOTh7-hXJQ_ckd!BEVyFqQqt3-XEro(rEW4I>+Dr+
ze@i{}6>9Q?>a@Gojeh<d*D((m%K}N>t8rKO)Bn<Hl}b{>zI)^^CZ?u_W@g>MkV%CC
zlPRXSt<oty{bO}z)*s#49tLy-4K1xj5-9<PgF>Oeu<-Ko0)+78knJBmi5$tCH-O9_
zO%(~OEWZn$Z$%ig(sjryOllB(fx|-~p`Md4$}<fnaW1G3ZK^ZCr*lhRqvED*#D4&L
C*b|%p


From 61ce537f20a5d3fac9941f54e013d817a02c623c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 8 May 2019 09:19:55 +0000
Subject: [PATCH 0349/1147] Delete exceptions03.png

---
 wikipiki/exceptions03.png | Bin 97305 -> 0 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)
 delete mode 100644 wikipiki/exceptions03.png

diff --git a/wikipiki/exceptions03.png b/wikipiki/exceptions03.png
deleted file mode 100644
index d6ce963bf5687d3bfb6170c33fbb5e69c99417f0..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 97305
zcmX`S1ymK?_dk54L8L*YyHmPLq(Qn{y1N^s<RXHkfOL0vgMff^gLH#*!~gJnfA2eM
z5lgvqXU^>XseNw5M+M1ODEKH42;`Nt)O%$J1cn;?evX6yzL)18%7P!r4pLgq5XejH
z=dTx#lpk*(5EMmAaq*8IE$m(Foh|GgNTtQaNgbT*%`9z9ArO!GG!=7Im0di+tL1Ys
z+3<jPS$kz%BvNIur~sT;YI-tc44H7U%sE`8PD}|2ID%h4!(pM&fG@a8jHr<)vxpmH
zS<v9@@W{ctRqt%;>6WXl;m6t;q3x2hwCYjB4kXkBDRw2!0MtS;V$8q6{XKoF8_Xhs
zD3lHm45aE$WX=y1FCf=`0s;)=9f)m^7akKYksuxNsU56@VNd9LV#&HM0zzJNxWw|v
zA_d?;M7*G4c@U8gF9On%s8t|8;UI=XCdTWKk4z9l8vm^cNI=?kviA#!PCOazi=VL&
zQf$-k_YezyNXe*rqy$8h6@p_X+rtZ)WrDCuYnVwvD(WE}BN#8MAV{bXR;BPzItZLM
z#PAmdg$E=g8G`fSR72o|p$uc29;{Syl|UmUuSB2@5|bmMh6Xb+?TGYi1{^LU7^4&s
z<}T0Vx9<Wu(EpzOhCqJC;)1(9d+-=RD;pW%g4UrKFzvM?Jdqn4uRm^%7CVSQAgeBZ
zV~>n1)%XGY2m!W_SyV@G7WyxLx?V+@RiTU2LVoVfYn(YeuZ=|J*T%WI&5ey&nI176
zqd^VdNAoU&4vhz!8$W^jtBb#FYm|ZS^a3T}uK#xZK9|cS9Q}qIV!XH&BY9u{^68#v
zg1krCxKWcHXI%-)5&Aym%h|hJ@(8hSbiGvLPoLIS81G<(RyZLQRzfelW0?x{Okgi%
zX)rWhI@Ycrkke-S&PiG%*Z_;*)lv7SW8nwMpHz?lGwE-R5QzSJN@mr;YT<q)2;}|G
zK>7+%g7eNdj2#Gso$!mDFYgVxLc}P0y2LQVP(B3^IvLWH1c}jp9<CswH)NR<A>!yz
zviKb5fX3XV)_^AHfPQO)l-^0(5{L{Z`U?r$h-^Omg>j@N1r+IZa_BW#rxYAk6ea0E
zIF1szY%He~n{uQoshSkgsh|@KZ<y|frda-8kat1%pIao^;sdLc1Se5z#TyH_@k2gj
zz5MgZg)Jop?`P^Cry6|0FI<`1e~K;8=VOG#`&m17-XOB~*swD9b&FN<Fe1m93{{es
zpcePxSE!f3Hb-2Tj8?kCVFgNbAalXFi;)@;i%MzAX)4T06_65Aa$wFQb0fosD0R`0
z#}&xdP&Z-T^t>^C#}=k3#Yi!Y6@$%!;T<mC!%c}5A^wi0@hgmUWsd4N*7%2UJ7tPp
z#==w%DSV2!f%#9?RfxRtjHC>|LO0Sjx;NN22sX%0bx_ibMI3XkRn};g2d!k@Zenb5
zY$BK@y%SZ-PElSe$W+DTjL{Y=&8$-{R|+e@=5S5n9S+8mmd!2A`aXeg@!I0bvV6y-
z33KT?u|nb>jq#yf$(_U<*mHN(SD$f%`@_v?-=@And}IFB{Y`n2T;AJ>sJH#9tlVt-
zN!!Wj$@XfR^mX(;xUqvM-(|j2e<z@4Q7tUWD_SmksdlC|q#9GGui{(wL5*Eyy%2da
zp;)ab?c=@*fr@z{e?eH0d4avEaE_nWLj;0Ww_LZPc#hJ~N`v*5KGK&aZ>v2R$*f-$
ze|8Pz?4hn4p7U{|Z%%q3YK{^tD$L{+XP05us8&9UHxou&PjbBe;i7=NO`D&1<`=n)
zb4<5JN07%M*T`n7Yh9F(n4noKRjgDjx!=lFc9@@**DBGhbr*;x+Al++OCxC>GXkHs
ztum*wl#h~+Cojl%QN~<kolB6}{NBCYF8?Sgy-hzLUCus#*|T-~me7~wLG{7*Hvd8r
zRTH5al@ehAb>xjeFQ=ou01-?7!ikc&Ubl#NuF-d+#MO}4#xa5HsSnW~(7#yr>8?|*
z+xFS^Wm6+ilTpjc@5vvfD9bnI(dF^W@yqoO{~pd7o=)aW6=a)vx1GA3I+MCmZ>a5|
z%~)4Z*I+7LwV|D-byU}47pl#xm8+?ytyle_G_90sy1BGDA2YvEAx@z<ecHUc;-qe%
zuCV@X#pW!+LRp<{ov)F(@oV$?-m>naxYjt|Cg11>LBv;Kb7;jx+C+ZNHBLBu>U_&7
zBR`IWeS6Onc3I3dM=?fc+1Kl^hv<4N(^OI?B+Xx&H#!HOg-1om1`RPM3Nfb=^ez2r
z-H>s)aMWA%8ox+OtxoMaELbQ%;ySWC3R}$h&5=QuuEp;Br~8-qU!~14;g=cTS*=$}
z{1n9%1I=r<DOgNcVl_%<D(Z9Hi>{20UkhCdIc2O1tqX83zgyNa_|4r>|EqpTvD-e~
zAaq6CpW^A$lh@N2BtL-ag*j|QplF~D%-yw@4_P}@m~X-KvTE*7^vlmiQC!iOpwght
z&QdaqUk6`H$*#7OMq)=S(Lz7^?M(kcG}<zX>h?pW2@MO?_$&-{2-n0PV@u?8A6pc6
zUU`4}KH>dxsyUk?Z#k0;C%sS+vz5R+cN0gGa38ao*6%6JG)-w6SwdcB`Z6v%o3@qv
z!?Uopw6&M(-mjBbe(5=QW{z~7hvwrIGGj6FC5Xs{EAYhs6UCq}!23dVitSDXMe*z+
z>M|#18RHrYpB2}oCssI>qL=sjb`aab=}Fnkp3At|7(!F{wMFig+)^rEI$nw!sqH&K
zzE-y2Z?Rt;#fr$}<Lb=!%(u+khDuCBs~&spqUu?QzatJ<SAQ*m*J47c6U*CC)ux@H
zN31e8)i7%xju_-kC{AY>KKxxhxbT(x$8pBfAyyaG>bJVw&$1d!M4DTzC04vu0*;;w
zDC@ZJ44>5zN(34r>*#H#6pIfv63hHrslDW_1NA!xgF0(pSnt17L)i@V-CvwJ)Kk=C
z(ORiBy8WC+AcPwcS%$OlIuX}@mUhu&lOW7~uswM(zNWCar}5LM*|^#6)-qGN4q8G{
z;#MM>-K)9znpZ38HHR0M5(_Me!?X*{!FA$|+3f-iEvEScBg6c{syV9Xs<*0KN8?Mi
zMl;uTV@CwuEtebzQwusRR}Vr1Z3}8I)a0kkrcCdo@2ana%OZ+)uM_TU^-2|N9S{3q
z$6+53DbVU>8YicS#syWCW2PDQCDHmx+8)!6-I-o-y;6(*(YHq7@ZNJ{_X>ICiue`Z
zyxSM=l2ybB5;r1qA{HyLl+%<CsVXUVI>tIpiob=%ruUY;?j;vU(0_0UXnD$<sSa4q
z?*>i8nV*h+N&BAW>&JYvXt<D7=e=z*vSNj9f82!OvN|sD6t&IY!at&W+Te0pwXlh;
z(V&r1&Szk|=dvg87&oEV-~6LFrL0lcy79=XwbtA0YL_6Ldt~Xn)$;`JX?iN1S8%EI
z%*+0&_v&H=Z^_Sz=3!*0dCr~YsI*0~#o%1zP;^dwDQrqu=W%iNc+uag!~N&k*rMbW
zLTK>lW9&r?x;T7Ha?H@@SD*LOd4za**MyxOcJK4WM?Z~Hr@wy8dK@ZyjmP45J+(hG
zGL|%!nRuEQ*KX^R`>@xs|F(Rgud9!^ZNP(_P5)f|?y%E+(Vgfxdj(x_!-v$L_Q~R=
z@<QcL{$1SLxVR@c*rc<26LzKrpf^cPq?F|$5HBhSBp?_9xp@LVcOej0RtRLz5CY*#
zf<Ru|e>3R)0D0l~Ui!VLs>l36nro8Y)J4UL??|KHHdOY*+R+CXOe8EZGB_5ADE?6L
zUKFNyu@hz5f89$<X@+cTNAIMm-)1!Wx%m4pCX*pM!r-)>oi5UJ|Kjy7x3w;>y_|=U
zdV$aUe@8oG!gN-ALu5qMf5#9DbS<)@_rGJ)KXj=kzJSS}{zdiXN(R<RT)Q|@;LLvS
z_E{!vS=-jy^Kt4-mfKUsIKF$%OiL|;Hzz?vM^D$CF-2@oN-*?}4QoG~)8?nu1O1PU
z&w^PZA>_RAYN{Vqb!8Onn2Yja6><y8i;cRQTvhEgV@&bARcT|TLY7;-<5E+jEK_)(
z>z6pMpN~Ym-p>6C<AqDbDj_ccVw(lC;S^4!choVq47B7@M%%FmwJUIF0)HV0SIqgO
zI^D;ZvslKKVVwKfKKGlbc?v$ko)g0T(k08D1pU<QN#9dPD=@R?+@D})&5u{lcg7<Q
zq~1s<vC7Bo&3kSAHt3l#@E@MZ@bAj<biPaq8gKP>Z*o6|_OFxC&>%`65vsObxkZp9
zG#|<$k0a=s_B}7xW_?(mC8I&xkCqkzCnu-N1}EbbYEDkhf+8zh4Ym_AwThWz=D)uu
z6wJ;8$dymtOw}T1vB3^GeZ)aRXvNt;_{9?b5xd%RZL{3ts`qZLVuym`6(x%Dp!)Y>
zQ_<H*a7cmiXi%nIPD55n5`UO}V&3$%E&=5T%2{gY;a@34H6@J5$gQjO3-}~Kf6P&V
zJHq4E6a3+eDPe6|@z1Da7)by6g&$+9NBD|2o9TYO{iE|fr^bR3L5fC&gfbi>9OfM}
z^Z%B5h4^aG8U60Co+KC%eR+Kp`XQUp`8OL59-j6>O}q!i63<qbPUB7q#lIZ<WC2(B
zSHlROEluXQps->AMYJBR^syfWaZQaLeWqWWlPm`NFF6SAo40--{Yk1*f~G7Jf{~i^
znb1YNYNmkghua7*>fuD3haTs}K0|wbPR%_7H=8OF*{_&S&X0}eD${MSih}nL&i(0o
z+RTEYNK>tijg6oCd};*v17mHZe~ZNmaFb3X-t5vQY|=2)qxQ2o5)v%LzWGdgcpmUq
zpLD|R*wqmnH}aSf?=7sXjMw|3RW&rS_iwrU>!;pS?s~Ng682}B^h0OsqKk@j>f>ow
zFXeci)JKG!VJ`Nkt6fYfBI2dB>!tIU@J;yg4lz(HLVSo@^g}fVbJ)sMmcE*Klw*~(
z-r(6?M@dX%X`I}`Nd4r@tC<QgeuLnPcsyKao-V587cw>U+Ft)FUT)6RC(00uVhdYa
zqN4t8zdO|KD#rBt_B+dx<$u{Y*zyw<w)|&LDW8ja#>6&h+g{KH64MsqbCun`VX6;b
zbTdWDg!%Sq$@o0l`XhOE2ip?y!GBGdDyF6uf<YS@R8&;3H!TP!6cZK{@OsG6LW<x`
zUadI1gc6R;!UrWB0pd}09Bj<Im4=r*H#yw}+SO1h2K;auCS&Q~t&l)F-Y<Iwa{X>v
zK5WI2MYlNm5>z|v11Psr^JsKKnHr<-6xugrj_!w0K3U<>b{=!SdXZrC)j+oov!771
zr(CJtNKmXsQ=N-WfqILAV4=>^4r*Mds*FiW6lUSfE{=$1I6T|!vHg9U^<vTvxmArc
zGRr0lQb>wR=!}_CE}YViZrp2KqQi$h9Dzl@6XJqu!yX+^Ev6(ADY#5V*iXjKpZbw@
z(#%zc5-UfUuBy5^;zM@Q78IA9j;g5WTU=alo+SqdhhfT=f@Q6;3``(|mzUSpG`xSk
zXZ=J_-++#)v9U2nxsb$S6a0Bvn!Jk2#3=sHMQ!Sg(V5Fu4*>=8*y~|MDgE-q#YNrm
zU5;Isl#jIUO-v}jzle~EI6I$R9cd?Kv@nTfV#v$O>wIsF$C97;H9QReGc(gDu`eS2
zTS-Yt-Q(ffcpiRDNmQy|-Fp=rflku;5-2uaP<CXi2T?>T_E|6njQqqOj>9ldxzi@J
z^@?o&m}HAj%clr?#t58BX+?P)1X+BDXe`@{+1}2Rk7=|17H{bmGPw#>2)GNNxpT8Q
z)p^vN<KL$aI2#DM`!i(b|79WNORy<v>$0QV5ph7ry9849tiox&y<c}sS$E80%J6s>
zkwyPWg8V%>X3#1IouE7iUM?>lMY;@TG#7TM-e^JW-Je>G6)q|h_mJhH_<M&A@5&2a
zQYM=r1e<U2YCL8rL*XVm$T_NhRU?0|?mSO=U-KR{tS7M=!GM-puk0tzuB!SL#nP5!
zI+SoYSuH?}t}J8Mc4MZ%vkI5MVgRsnuJE0Q0CAptYF`9R`mgJgb>4%DZjYyjtCPD2
ze%mtGe|HZXo13<0_8}MrMT4zZ%R|4D*}1J>lED#h+59zlx_v!nac<5(y`=s0bl3i5
zZ5`Z=F8pIu=&r;TYh{{}1SRy>$jIZA!iUJL3a<+*sPLl)xI(l%g|tCj4P8;bG_$@h
zZw3B!z$WG0M3Gcpd9`kAZyzfg+;i6Tc7?udygO=^&Yu7ewST>n6_vUD-f4t)o6yS2
z%B{&(TZOvi{&cA2q>q3HD(>ee6e!Z6_g&9z(I1jAI+RbKa=#MfB?Gg^OeJHz^si_y
z!9QPumV_r=Xz5I|B`duzL|T0OCv}-hDl3muJM{j<eF^E7{d2-dE+#6n(o&vuy@gCF
z2c_$t3E#feTFwL?A|VHs6Cwp6tOO=)qzE5Z@8;p|VlKmgCdKfuQVKS5)(KB#f+7bd
zO{~nSR7BbSPF`~IhO^Tjd4}ws9^)PrzNx7x4>i#%Azx(4s*@WZi}|u#3rjV*w%1P7
ztQvK*_LTHeunX^Ep%E@NjMZ-$mcE$wh|(ghntGeZ0z9m!`092zUu*dTe9Nw=a7b-V
znU*+Na$hlBYH~e4UdiYTMpV((j$Ap;my98X3+_xycOmw_cNBU!S7~zD72_dX-c2jZ
zv;3Vdn99<A|BX!i^Vjd+dnsZBx}KkDHTl6W93JN_IlIP9JQux{BD#uNleX)%C`P@e
znnUl>$(fn6^9jW`DM~kQHdUO^uCA`MGVfyQr$L5tjHuo>JPxF-UKeY(`{mo9lxD4X
zwKpG@y^l}+h@;mg)49)RW21!neUrK-ij|_gURZhj9RCeU#Q)s!^>$1DyjmGGD*|Tp
zy<ZJg)mct2DYg0tk=)$e2p8##Atf;B^sPKSx?@H3*nQvJu4sS{7IkuVc5f~#m05eq
z(h^|wM!3LyU)S+!$(`MNgb>_q(CGF;uHVs#$MyZ$=nc52F^*{OqsA~6a7TzIfx>D;
zdVa%^)q{}*8@s!;_k{vcD~UH_jIhPIPrT6TZoe@r!daUOv<>w?nKKS+1C#^=${e|J
zdus^M$iXYeGqKhE?le1hkBa)KHJ@vv>EOQBsktn4CcqSG(ki7LH1Y6C<ksxha=)6$
z8*Acqr*zpHhb?y~urKJZV-IzONDfX1^S_;e7X3y4{0<(WYn64bk+(#z9Zj73BQAV@
zT`a-$L}rVirvw$plugI_30PmZfu5FJ&%xMInTVcBc|w|K+hm?PsBM1bxIDlC%RQ;$
z7yPxTy*jAli$%)H`uZbU=4riO-m-f<T+GlhGH(0~Mk5Duqw6ILI9XlcACFdjYPqD2
z+(i9IprB%<3{$B6AI~x@t*p8@<iX-rGQN~hvH*v3YfXyjgP*W$BC{#Lh3y0#yUfDE
z2p2wiKR>_J&78tQ<Zjkq0|R8=WnyJ=kwV4bU|xh^8~~`$^**e9^SSe_`HxQX4BrnK
zLca65jQZuT$>5@+qjM%KRn@4txnD2TA;ZD=oDFmP+@JK{-;DZyP*Vdi4_LvLztw^x
z(slvB<Gr6SJUl$O=BzQ=flpP3f~AKzs0a&;Se2SzG#Tr<kvZ_Aot9i@PX2YHS39ov
zrOli2L&aI&Y+SF$Z1-R*{?>ebcIpA%AQ@nzUwg*Efekoioh^1u|A|*?iEiUJUgs@`
zWzX%*eLiIwKw?U2xOy}0gH)RUR@bAs!8-h{8e%p9oyMQLQPXtzZGduaZjJ{!F}=0w
z&`>HLH$XY?>D!MVKkAkoot@bMNg1;Ksxlq&*e|W$nJy(5vxvu}`0!_PG9=H^7LS6C
zDpo3IcxiTW@;&|c`7#?$d6TW*$v(Hc`HOA~w)}c5KZi@Hb17q`zAEH<9=BdKY<!cQ
z*9EN;0=SH8#+(Dc*YO7zcUb>=W@TlpA?s}3V*O(}MwadUo6lnj&1Cq|Ff{`*G9V>~
z{apD_122>jgD!mkRjpXvahP-FKv_?a7#(yMZKRmG`n1_Q^sw$vrlw@Ml=#tDXkp3R
z_QW*l9^~8U-psD9uGbHKfLbBo_O`anKv%9hB=z-u0L+hrvU+y&$F)_S*wfQf?gvk-
z1CN}Y9do5-2@`_7j_dv3VDy5Ll8vI`viV%Tru%n;PW!hFxu#wk0_dfqCmz1P_2P2M
zxOzJt8##JalGJ5=A}}_#KlK@lJHybWm5#hBwf<*je~IuC89{84GdFx6&ruwUo2oy0
zw<i?a%Puco;JovlP>M?QOfe?f9a5;kb+C|?F*Wi_<2-pi#%Mb!axM7TYtc^!=wcJU
zMusJ3RNk*EtrfyqiqqKcAW4vN;7X{8Vsc1imz3y68{sF_h1%+DY;P(ntA@YFQlysJ
zv&6^WKe=mx6T|fJ6Yex*RdHlOYV>~i7gx{y=>n2@FQQ}JUH26lT!U(((my$~K1)5$
z^;I2(Vd_h=RaYezZ68+2ENaNwLYeaEtVxXHS_F-<s%lSz<9ZU8Eq;EQ8~(0~S6Fm;
z5j}AXVoZN9Mvy9f?{n7%!M`jhE8F_QKJph}>&B#tBGntz)02LZi9!_`V0lKIM+N&$
zVg&oF%Uk=NDfwnQLs4G-6%a%!3cR8EtzKj02ExFMNpRqA{%{_#T;OcI-78)MO%@`S
zSyv4zHVOEll+;v5Lh#1jyxTv-N7Ds&$FdPs^5jG(YU-RGHd*{Lt!K(~y>@edr*KAz
zqw$7BVAE8&>?-#`iDWG;>GFR#p{S{;f#LvdoGj;by&5)AZ*Q>dwa>&MZ%rT)nf3R=
z>jsp-&SW7rXq)vhNs=YHdO(W;7n3SK+?PG$zkfgccA6qZX<=gn3eV|ufCd{BpRm7B
z#QUJLQQ-`QG(I-7-*4J(_ZWm8uT74c_L-Oc?rhP7?;R4D^#*$)u;21JQ4;aF{2iBN
zSz1MFpVF?jTjF~b3Hp9Frh`L6?pBgbj_V(o8~(y9`#<?UuU%#s@gV5SUqeIdrS;2e
zEoUR^zbIlhlFieBjSMR;Z%eUTY8nFz{rr}w-G9OAn*zcm^ggH*xI3t3)T#<`9^nn!
z+S=kO&M7K_3l=?U+$QF8*%3KjZoRo&uy@~q`G^yGd+TM_{@@1wFFma+G0#%hd6@Hj
zcOuNF`|}C7TF2GU*Hso{<Y<EDAN4&qaU-LmJTK?WcgJ&I=H})udTytI)+ELF+ecu(
zF>hVI832oBI8~&!=rqK1ez=ebnEni)8U{)zAkOE`LnGpI0O;lnVAOfV_o|i-7Emcu
z8lS6iN5Bh4{T7dAym@tozn@<bG+fSGdu}D0yET;oNoF>TkAP16`&TSQGKVErr(s1Y
zv!dVy4p`Hl=A-HV;Ss1BAK*KmZ$Q`gVhZ5)^Mkm(Ivx#p0qe1o8HR)q{5zF9=2>O}
zwGJ*intS<gUaB475f1t8<16sOnSU2E2F~5DxE;VvPW<^(G2B~J3kBu#d`1D_Z29#h
z6AcjBR}?)xc{evVRaI4Me8KahV`jEXO?0bqJo9RePuz&bMgDhM6MfB;nq(IjN0Lb^
zOrUo5QTxqm^>^uIeVptX9s;uX(vjxU2kW@89K%%Nlx%8gNo4}|0$rV<Sc<`$iP+YE
zmZ`7p7QZTA?rVfh8xQ=Vl?dA0PiZ*3dAsu=q(w}mexN7Y>tn?`DB7xM*4J@YWxAIO
zfvQc(BZmyXpr1_U@Sr9XL=o@5MN(;2TfK_R`dNTNJQZA2c+J65Tlqm%UK|^bc%cWA
zSU{gdG$T>FW5SYAu<VJUu5!1FWh}_Z_+?`CZJ9M$?R{8e1VoaLr!Fww@GYOZ6Cc!e
zRTBYPXtXP@`GGyMoIv}LcDzz8m5#3znEZD}U2uS%h@R^jjdug%GwR!}CfEIIAZ$R*
z47s`AiXj1ze!AZl_Wak0C`}!w>;G^;==6(BF8N((c8m}{=yOC8pN?mIIre|@er~FC
z|3}ZG_9s8UWkU%}*`VDI>R0?MQu-YGi6jA#zt;C4%lsHlVAl}nx<Bm*=+$vM&HbI#
zBrUPm4%zA1*|Xtj+)U7Uz6?O4prI>`dr^R~7y(9NV0d^FXs`Y{Tf2r;1fbZj?^d2h
z(%hHl@&tbPUd}xixm*fI#MO#_hAeYq$k9@Bwk5v*-NFinm;)%dv(+#Xr@pu5q`4aa
zIySSSn6ol71DlVUqKE~(Y6hg#)Y={{b@V+};h*mTD*`U+HH+Ep`R@7tjD54@oHj*A
zhR0e&-POU~QQ1_@;nkg`jZF`zMo{}sdxiO@hxIF`JJ~T#6Y|`S0KBT5Hf5NbcE}?m
zBg5a5FM92l@<6*m)sEI!PR!baR=#dicb}Ux&xp>VCG<TXvze_hYWAg0mODKiVwqT6
z{LNIq*cC?N_Y0uPAhx1F=XkE{4Y>ctwMYh@^FQK^0D-ld-I%x+9bkcIS+H+UdtO-f
z5uRXN2KDE@VE6cEI9;OE9Z#piikfZfzJB55xe+U=+2}+SBmBrytWj=uwAkpf^C$4z
zH!Q}X`7%z(-=_UCahXQ(sINsuav4HtMMd<$-fex6ZFDwQ5W4x4?y-i<+_-^tx$JG9
z?z#2$`H7dcoXS*HRe79`Ndn>Z!*yEA=VD3&m^?=SR&~+CuxLC1;5@`0e_x;pT^p*G
zYWEIvulxo=QASksh5Mo-Vj92u7NC_?DF2a&%)m1deWQ|1;;>ZKS+E<W+Q0C6(ExNN
zrkDdj^y7+^shJsPP$<sN3{kAXqVKg!1*ix3%N77d&(I=p`ilbOKh-vK@4)lx?g)h4
zU25hIBle;#Dsln<^IUOO*46+@y?L(x23y+MnGMF%*+%|K;j~U-H%EiU%?+gF4Y2hS
zc7upe{^{|7_j1-`p~PrGr9=B}7qDYY{I@s-zKDzcndXGJC+S{Fk#Zq_kX(e1SJ@%I
z;H*_b<10W%f4n*;x>Tg2$}|j6A=dgr|1(c0+5lI8w=y!3Ms1>$wj;X#!f>w&!OqVY
zzK((p&CR@>curM~`>Dfeya?4Y)s3Fr_T(^MR;z-wV;;Vm$3+!Q<8k#L2`v>QEmBN}
z$-=TM2K`j|{%(LJdBPJe@MA#HceWONbg@|}IH^$8cf;eoLz?YwoDrXb?iY0jPtU@&
z@t_p3Vy6#pzEbMQ6(sMVe^kYlSD9;Yd&Qt$M$Yg};`mXVRhdseCee^K1Ouko?Zv)<
zUzA_}kD#fn9|ig(C$*fatrzc-I2TYipEI~g$DCl(yozx)n}wdr3C+5W@y_YgSYq5&
z774zg`r8~J@a&p)sm*>Tb($vX^@U?nG=N2aBkU)jq3=mW;&;8uwZu~zouQEboHOuj
zC7ED|eN<8kEGoKwc;pH#%E<{q#-{$0uSk;ab1MBz)@GyWOK#uRfDyDEvg3F7E0U6u
zqS@lX=Krv7zzb~um}?rHO5R5`wW+#hq5YETYmkSEw);IK33$G<Z@s`XH8t%qW*ZT_
z(pBKwr35IV+2BC-3{30&G5wB&)bc4kpbB=DTluM|s0hIYq7n-v0UZUp_6?^M4#=7~
zI60pg_hhfQT-m^2w8E%+p85(DZNkZVe>N=&U`rzF>5|NbhBstz38s}+Q}oY33)J|;
zmebyREd$7D=gN%7%`mEMiM<clz$JL><|YEovS_Me!9$n_UMN4IS!;#+yhK3vKR(>4
zC@YJV>$igB8fbnDRD{C9!d0*WrhAixlarHQr6|8DXVDHSXxRZb(@*41h%R`J@vNsn
ze6^rQ3wV$B>^J*cb~99P`TsSCy87DL%^OxjkyK@V`(=S=)c_SZl~PqRJ>3{6F=$VR
zMHl!AJk4ix5(O=-x8J{iPlXp?h!g|y3ZMspn~k_<kpQ0Ve7*gs-`%04me!mbZk)Pu
zAx@%!A8&1K?V`te^yJi(t$Y5}l!ig&)8idbIolY~AKnUhu-doXP=g?b1=tVIv#qf*
zJ$?W#8(i+HuCAQJ!$4G$fe@#Aw$emN?fX=*hI1$UYYbqlJOp~y9gB*Jb`~4i&C^`*
z>TKD4Z(TqqNA#~VYS)AVvPpgZ%FCnnx;h#r3nQ$W5FG*F_^e{*=e0-pk6R8en*kUB
zgS`F284c)GO~yVIML`L0W4)2ME$8F1&-|vz_(4etGe+PP322AsBqUwXJIfOPvysC9
zRbox!D;>R((nH!@5IFulyP1Dnsk6Pk*q4-+Mt-=xF!}YBtT{fir51W|aRE?`w^^W0
z*UyWve=G1QeelJd!K<3GZMw_(Vuq)NUCp(V9R<OD4kl*)hM>6PRC%|L-7nO+a%qQN
zI$R{TCbwn<%93P+S(<Ovw+pleG%FnT7T95OO-j`B9ow4u$4ePcP4#dwB2x6`8<cKl
zZVRolY(rNDBJj;d42Ee8MuId2YtMw>6v-lE-z%~EQA^ND^>@|T8jpDuajOS@WL2S?
zF4dFWW=_K_GE`xSi?1>jk^1_UA(C7*fl+U8jVel-`dd#5zU4|GBGeM=pT|EhK~gw{
z2^4%9q3)I~9N&Jz&~=`kRDz_d&TP%%b_oC2B~+e?8m7V)acI(!5PL|<_^l=3f|xeK
zxH9W2f_}Nb)e{zLcOr8nTtB2GB;XBvFL1LzL}vkQ$f(=!RZ;jM{+TXTyTi^v)r>7J
zwk*8~i;P48z|I1+Ulrrp$+cPZyj75Vt};jh+U|~q1g{pw>A!bvpDBTiV!ymyK|uj6
z&l2SFAQ)(0i7|Qugs+{Q-NFp;`+yWw0J>PF>@<z+jAh?|)aU~##?PNWLB1ymTsCn`
zm<TBde{B14bz)fS6Bv@^z=@#ihFW-qs*%mdZ3O*}Nj#3^SIgckorW02y)0Vbbn#f-
ztn-g<DxNl4lI1h9qN1J5M5|0JEZac5+eZ=2ei!LUNx@ey*Ovzs5=W!B6)Q=+3N)?Z
z<Nb{fATpqU<tBRS4(0q~dK-Wiegith|LJa}@n$O(sGw$_$;;pDqZ`0gES9}%-X+)9
z)|TN*vx_q+_JIwAL}q=JqXuD=A#1qN8-SX19=R@j(Kg5;D+xhk^N9+=4=&F#M7dB^
z=V?~ypf``u<&UT?c;5xJI-7+&oqD?#(26ZUO}Ok&M+1^X>UW$UoVy(XCtT-A%9D0;
z<0@1wVnSd5_M8U|h`P<^NDlPUdo?v;pMRo^Lt-*>ZeDUqIA9=FP+s28ipn^&2EvVX
zU{WP!T!D-Pc77qcefB@j#8%)j3VRr-Vg#8GxI4`R2@w0}ypz(K;RUqaxcZquiaHKN
zJ~Fbh(v(=X>o&maJ$r>`Kmozc;{#Ber0Iq_lEOMB)~MYUsn~9z&s;2gzl#1}s}ZlA
z@K8v)7!AgI&w3vhL(pLnFOA1@QrU(%UcIU$s%yju`a~~rl|@>v&-WGk_!doGY3IlB
z_7p=HtGOwA{)734zP;m_kD;XLRXoSS?2X4QfvEe0Kj{+Y>w4kHlyG2igu8Um82kTi
zI4pH%7+IqvW>g6$?EaOCkW^{BZznmKPmHQ$A|QhdK`gWPxhfH`F_8kPV%tV&`+RVQ
zMMVdG=*J?|Sz;i;v7>~*6(Z%yKSAGCo7=XL%1Rsgy}0{A7$`YR$uYqZy~&_)x^(_F
zDKA2D;@{1KMbYPuzU{Nq2U9MrHEYWsXZUCGQI|wsZ2q_2v)0sgbW}QM<LapiHB53#
zJ&rhX6rs8K?_zuF0&CO=yF1o*ep^YgXY-9T!W-IWpSbAJU`6}`@)HD9ky(G5-R++l
zs;+xh3DF{rQk!PA^yWz$*7PL`3W!{C>gp24vL)kWa{q9Y+V)R)iT$dx-5N<-Fw4u}
zw8l%+_o6FSFI}r16<RNAK3W4h?k|XJA*2ipQNa9Sf?y3VFenHH0$wr%`cA9fj%XrZ
zafPy0I2B&2_UI3wEkGI1Knr{);BE=fC@Fd1%0Rc6fs8P}s3;O>t%-Jje|&uWdFHsm
z(b0S`iD+u#`w)#UK^{AstEUHe>KRTlKU(CwU6i6oTi=Wb-Pw%r?K6V9)C5Wy<ZI84
z`MB*43hak1o;wH>wA%dy0ppw>%*Cy(8PhW`Ea;N+o1|H)$sD!a*(n!JqP-TQqXMDT
zvl<2$R{;VG5S;_O0!E+Tw%)T2L3k9HRS<fA0~VcHG5t5N8Ov@xKHezK)*@R#dt->P
z8g>M5Q5j0gXzY*nLy3lDSz1FZQ}}IO%1`XfR#Jd0lPk}%%CHm0>tb(eOaCPZ&&<u)
zUH4Rrii@9J4?s0D;0|zbaceIy$>2Z>N=$IvULFnsnXK9B<*HM$^E}Gln<`eq34O-U
z@p0wT(^DiknBQsqiNcR3F)koWkhfgWf<McNQ&<Z`BqmK$IIbuQ4GsOB#1;&q%0JnX
z=+E-XxKdL`WDn#SQn|{gggh08NRHM|8aSa~!Cw3UaSWHu>>u?E2cE@*n7pa3csXkS
z3XIx8mxV%{y5;m|$pPHglfu;4W+EAO!_x1cqMJT9o5H-0*LTTm>v-P=;D(1Q(}cWO
zKr*PP980pXEBo1@x4YWovMMvjH5e__Pw1}SB0;0~dXzvmsi`5|`teVy@WBdZca2oe
zxUlB-yFjWHMK-BwG&SmzO;ytBDvZ!x&AH9{i@DwVvqBaNE4!@5!ic6OFJ@sk4DSm&
z$=3V;e0zA#N9d#n{~tnH@vZM73UHjdUxYCboZ%xYFllMUI<pHorf1?34c^<?5sN9E
z6cCGaRuS6h7%yNAIsHNj1&RejOonknZ2p@Xg9f|F79-<OU$&>H$elu(RGu6hTBjjo
zp^p3Qd$jj6e_E~u@rEDanw`isPfD5jQqkJJFwlhN(o~L1+pteLNkT(i<i6rX27H>&
zX(9{E3MWcx0gmr<9{O^jP9BI32?+^)*DqGq^VZf}ZPUoju9ZAHKZALIetRCIft1PQ
zd}r+0=KlCWsH$e`z4AP60V$JA46z{3UO{#P7+!%YAh2(V1<IM#>)Zlp9qwfh3Xm$>
z)=%?c))T+*1|A5^VOXAXWH1!p1c6X)R+e$K6EYd-PDBtb0|I6@=|g?ih0m!I!Ylmu
zwzf=Q{{w()eSKmusx!>+y)-(Qt$bz@kSEj$jye*8ByR}hUIQQ!Ytka>Uj2tAmxKmn
zwC#%&es)I`G7#+OdTxFP#h3<WMGhdwap=L6{Cna7aJu!`%jz||Z318TEC(P5wKMv1
zX?)*fDI~{dXMZKJnec#I=PkD#VNuc1WUMV66%ckHnLo*Rx)1yGu2H4=Y#K7~EdKz~
zJi7&eL``*mIYso!GIA3eN6p7(pu1dl$3sEb<qRbGSiWKgmuI~emQIkPPP<*J;TbUA
z&yy}x0<JIj_dd^p_!$t^=<7nu_MedhL|~=E_>~m78$b$V8?^g9djmzGn~>)bCFnVj
zWdkv@29{v;n=G@@^}p5gy{V|@8C!2ANcOoBz>XH64uQP=j7BsFOt4%cvz`NC7zi)I
zo&!;!^qqlkkITqVR9DAqDmxqXf5ethdY*)VviRY1IsgXWHr(M_GSULX=Isxc>i}!)
zs&x;;0d_sx^5^G;#`6~f=Ca@gwt)kP#2%#Ck}=dQEHPlIDjinEfK&g713y&thQk5_
zD53*^*}Cpat}X|&nEj4BATFekgnsG?#{`p}&p>*sfH<EzW7;G3S(ZJ|bAEX36@tm#
zu__VhbbpZBWTus653%fyI2M%K8~^)@g2&Pp4JIhEG6P%AszI0VLi!D6aCt_52%}AQ
zq+23Il{Bd+Q4!RxXPYI_BC}0$ur=#i=bE**^Xg>pLm<Q0ADD!&j{jCi?8#z8!fSa-
z?FKA&82HV^s(f$}QF^By7qd0>Z|17VLj4Q_t3vKi+}B7k^1%KXOn*J1zAS&tOU_SD
zfus<`r9V6li)0*}>eW`g?{L(H;r^VqI+4P;>`g|b3pSb5s~Uod_V2WM(zr=!H3!C*
znMGgTG?G-CGxf+#O;nn|Gia230s$$1t2Z&QeE=wb_}%V)A>vQC?c-2*2u7L<u|>9_
zh_=nODAJ2a{v32qno@p&MG_HB!g(wOBN0Y%m_bdjH_bPcxAL^A_ui>mqMQ?IWUZdS
z#Q$L*u6EbC?&4~}d*pJkcDK2%M$^{wi>=P+f;N%6dOAPBOr@Zw-Trp!wCM!VLET<+
z^<g`E^YpZNxmNXOkkuzjlK930&=__qv>9Hjv%GPi^wZgQUMPA>w~Ml^72m(&{ys51
zSl#MawR>Dk&kD4w|NS}%2;xAN6j`>PYU|^cTUOfMUVPLnfA>4@>FD>H75!$L!$uwJ
ziHvM0b2}ryRkajlm!A7lFYuYee=^1E-}cXV4eK$ie$5z+MlNf%C)cAtZP+_srJYSm
zXw@QNVrJfoS5Y7n7Jj;uz0ZMLkjcuM3Bb*7SP?1GU=a<e#)uWj+4+4qQOw%Q2i;4P
z_(M@3zr!Oz^_KyD;r$-+d&bB~oclTW4KvrDZmX|DYN<oAY_Yhr3{#c%tgLr|Z<c@M
z%E8H<U6@XSG{B1L(k&t*ZR`5#B_4B^9dG*HuP@exk~3um>7)@JM29HOV4nf7#s{ZL
zwZn+%ue52#<>T0*;l{aQ$NL=Nl!yDKoxWN@e#nWG<L!iVFT&=W#JQ#r`T7s7%*}tQ
zs@=A+Wm{pKTcjSHTi&Q?%??>$n5n~xx83*Enf7$A@;w^qY0P%F-QU)kws&X8wlDg4
zZ~(L1WU}P6x}uL3m}c2-P{mZIF_K0%3cbz7fazu}C@$_^KVb!={v3u_=BL%ob+tEZ
znYo*HE-%l{kAVlERnL9tCzskJGf+NJTP>M>2FnuC=bbT{Raq7}!7`s1ph1@Kr=FjS
z8{O|an%jijMr2~dmj>i)`>%alJTlU61Enx}8CNSWiY*+n&Ii=4D+YTOG6@=&ZBQqu
z)9Nbs3H~9#)G+Lav$>L|N0+aUDt%R6%K7_E$}MD9r7g3jhRFBsmErW4W2syfi=ug_
zLWjO8WgR_v9-N*UM&Mqe<Iz%z{z?%n)L3ZDLzjJT&u;P!*3{r7dV5QB>Y=LiwF}YY
zx$o!c;(xt>>!MIvAClr87K>r-xqL<0Y{8*L<*QU9rNb^o=)g#*<L=!s^aKa|7SL2R
zoBockqtdc3az+674-S530Cpydxhb4|R3OfRV{dS5^GT=IbZ8X%-Llh!#doANre(zS
zHHmC{x+!?)6U5Y5c_wEaB{>l#x${>OmiPC9x9RTqLn>T!6QndHSV*{;bus_cmJo!B
zqp<fh-&?w2)={vFmP@C)G<<<-5h=Z9Hk{69QTlOAN{CDMe(O<4R2G9VL>zy`=Ylhg
z$PetSJL>(xTRng3`H6!GzMCVt-Own?UI(5`yJ|pGOM=(?kn;!p%Y=!^kMbG%df?)}
zGiV&u*;lI>Lf1)i(8T@@?1gfV$Ao{xl*;*?lT%-sv!J8*Xl^-EMl>q?<fD^dn3&eh
ziVE`gK9HWw;f2L1<Xc);T+6TYuCG-IYNPAb^x+=;qA*(E0s-a-GNRM&9JUmdN{NBN
z5}rq!pmj9Z(hRb0;>OQA?&uZo`n!evZz&=USO;oCT|{VwB8Qxna64X1)UXjDOAV@h
z569u~<4?6GetaFeeEd-<R!lTDdC?@bZRHppE6VQggrd;qpOpuwQnqBZ!=n$E-QsLQ
zn+{SgQ^BMi?_MG<+IX$3hS&K)cNSG~lCV2{tCtH|`_F)6cJrf2w!u<5%F@SA@)IER
zURY3RY@OWH5Vz)YO4Q2;*P&S<8bxMiZnq_mMFP*>kW~uM3mWW#&X|0Zi}(cEcGmIC
zJ=4+Pz(!&Pa;R8HeDtKB2aSPxxoNv_hRDpSAckn*gz?2!rlD#I9bFa#N{0R9hpw>S
zUTe~kE!D^&FjDVCOLY*Iq<2ZFHnz4WH0u+<f+km*pd0`Dnc0J_G+k~W=_@Wc@E&WI
z$0GfAD<RdP3>_1l1ST;E{yHOZU+%8dBT`Z2K2PPIAEL5QpgQ9a*yq4%JI?{8_ydE3
z^QGGj{~h<!K+jNOAp?y7a&PZRl;R?K*#ySUDn_}9`$yH0yoBKC5YfPZu)dTx@>VQ-
zBtEFH=x-G)k1yd+s+1mt2p2xsLnkWoK7U^sG3~oE_{r=a^X;9mp8;fezdySONkVjD
za+rLRTVB9a8}CH(%X|~9@9lZEPJP)Y$*!NYv{HnY;<A03-Bkcu%$M(Pq$JIEz6M_V
z`aRD}zy=&?YWLCB@l0{V4^YCngzT>8?W<q|t9Q2qC6?uoL2dq0N~z@JOu2#mg9w`?
z6%LA$=0_2IKjvBLTD4ak1xrW?S9t{`U!`VajHL1R@hwY=s2R9Y-9qVmaW^eeVpQp)
z%kmeTu-`DzSchQPCbkt8Mdn#v`v|q@vq0A?GOYxo<>^jOqiE@wvq*&zB`_)DEcXaf
z3JS|!SOUAreR}rt*_4535$u+53VXe3iyqTI;TAD=^l9DYc{it{<D74APFq_#kRkRu
zY%k`Oqqa9bfjz_Ge~vr3P#I-|YAP8KL2yG#C{jSIOc(tAoitw>HQ3?+Y^rN3Q`${l
zRO`&XZ8Kf{#h|VKP-#ag^0+p(Cp=7GLe16-@>oV-<nr?Bn5eFgw54_bcRc3Lwi%Dh
z>@Q(uene_ti5lIORI5!m-{ERXZw#jRF7rTJEK%Hr1vcs;z{0_F)-g;4*6|a7@dFqJ
zxtNIj-%0#c<^Jz{x_)TA?;TD5{<n*I?X*3pIO%`Y)A0Xq#*P|FumEFn*WCZ_kAwri
zDmQhO|KHZ_r<a;3mb|mjRJq^(_XHCq)ZkJmsPZ-&#vT5*P&c4};pO=Z7x?Rv?payd
z-pd4H1jHvt-G^A*-O|wgLo1UptA1yrUni)E1ov&&fC*#G+w<Od_aM}8zy7t2*0Nsw
zjpAgUj`!tA%W?jZ`G0TSj;ahlTtnnya`#p>l$;F<87l&ZE5PL=4DSXU>GBV;;X&%Z
zl~SC!W8_*MSLa$JFQCcPV}$)*vFM0Y4Z<CGf;3#U@$>>eGAheUBZd4crXK6VNk6cG
zNeRlLms)s?jY{s3;xP7dLiU#U@HP&uDKlFZw>^&9(lUhHNPtK9xQmX;t0f_c8AD8z
zmeiI&m87%8MvQn?Ehf!mKWCjf{eZFMfLB5UDI!_H=nag4Iz}{}gmR@cH;qHfi+dq-
zV+Q+ps3^VF-+{SmQ>W*3y4h4x3*4GL==i=)p{(26tdZ8~8sqc9#7-#vy`ZUi%SiEd
z%KiFm|Bl<r`j0Vx{2BCHZeJR|p0~JMTf}E*bRMvl>i*8?uZd64&9-qc!e_=D@23`h
z7D^8cl1RY_DOrspga5Oh*jiCoqtm1=GszWdce-DSiZ^XfF_y>6Q)Jra_9W?rzY_#^
z|2|#~_&B&peuIV?t}~|lU%pr#x`j>TX#M5Cb+K90&tm>l?(1#iyRDajanREvgFC0*
z1!4~6o^@*Cj1O)Z-PdQfqyO@aP@)IYn7)c!ys^<d$9dwpbVf@)!Rv>|ro58!<$#%s
zmh-wM5jfEfm=JD=^OgQu^YH0)`QJ`)X5))%>&A^1Sh`rc5_x=CC0l$3gRRfO`sPo&
zBo1PiqqHXfZO6|b>_=eA)!~r1IMhbA@ei6WV!g|FfZ1L-MQoBG5KJS@WLV@n)cj%b
z#bdH30mVx<zjCe*51+UkQG#z48ez)wYpID!tJ5T}pj@S3$A>G?_lz~n!)DDgO|=PH
z>q?)}ADl-|iyW~@s~N#Fm2T4De|e%gtc1U}yn0MQVl<m*;G}Gat)x=LFM&CpH~LFO
z^KzNcN`YRS?;EFVf-<kS(A|S6VX!x0M>bTxDicbtJ(yd7WMs5Qt$dOx1v?ZQ5VSS%
z^>ZMTC@p=FL&d?8TB;A>b-7u>Qli;#{Zqf*_Q=M+<MdTluv?0JAo3N=@Oo!9T|h@A
zDr50fP|i<J!2+hTcVNhc6KtWo#uKDEnK@9&ipx?2>F27H!#1zav54y<jm4AF`4%ol
z!AD1M5D;NRH)|PX!4Zv)omrbO)K%q@vW^B-mFj0qQGKaGE2Wd=C4jWhRU@~kY4`kz
z2LqavqMyihc*0dTM_Nd^RQlbWjvcXR2^1fv%+&pwF>1xlopkQG#b^uYH6v<&-@4JU
ziEY&GE5zu-(^@)nm*B#Xy<fP?g@u|J@lr$2vHqpn=<-E<x5ke^Rb#V(SEDVEp<rk$
ze18}(`>;X9p(U;EcSXhS?VhWs^~RYS2SSDuUuB1Sd#@%m5wq!V?1fjV*SmJ%zfmsk
zT4c_c%as{B(+GRh250?x)a2rp&t(j%?|spwBAoWA;x)XMJ`QK+Z88DU<&gr^_^Se!
zGSS6YB}a=2o3Ku|jAR5q-#|QcHz~&$<0_ApF#6|8mff&GLU{=_JdP`YOrl$30W?}N
zs@i8upa>g5`D{G%sZBLx_{(oh+LR!<nM$utf$1Jftx%%f$y|Qk^e@V_Lx+W*Zd0>7
zkw25lz3IIKTg(1gS@nfdw7}IM;3*i0*p5RK5pR!GpycoK<ci+Ms8>6Rqi`ClG&<mB
zl@KiPxl?PfU;XSI`Hu*<#US`FA+skz2PaypEVq%0E2r$E7L@h<JfANOy0Fb3B1*iM
z*AB?uZUX$dn3D5f<2v$mCc_hwK_Kqey3*}hE|M6WBMKGyY4z>>gK?Yh_ABEAdAmgL
zd5Gl~CVdkEE{9Ji1K-S=(pmBI$p#=X=o$W8?hhv@k;JWm=ZA{y6ng!O-j6bymhNXg
zbgh;O$<1VJxCVD)U*@(yw55~tH2HH{Yba(O^&q~HVNz^6QPh8|`{BIO5O;7>e$r(d
zb9Qm-b&vvc>HSyfGR=wpDvWsh2s<nm+cz#%!7p5>+;50eFE#0GO7Gr$47ug8K9j>{
zCa5-;oIZ7siGp8Iq*wETYxMq*SwA(6@~=*0{>n<j-k$8+CCQI>tA~r%Gckpiv$WG*
ze1vD1_4kE{k-utM4WuiL$FX(&*PoP3tZE3HUnJ^#3Q~y%ZybdyA#s#bYIBCMtawG?
z8^3{uiHvxe*;|nAoUFatv$@}Ke7rkG*J6>6*F=Z<th)KlWHEZeA`s*W3`Qrm$WODG
z6!<<U;cXIk>}m*gWT3G~$nTbI_B<;Vje=y0tX}d;->A??7K=)=d4dv!-(3X7rhhyi
zb|+Xwk_cf^QnY$7EQ+L;24`-LgR5uvh0)(BJVkQT_;$0GlXQ2|;Ko9en{{Q#a5!Qp
ziPJ_F(3gL2SBic3;lw2FPvdcPL}R&gXD;-^2O%wg>31NDJQX#(m<Lj<{I7Q5*Zw!8
zUgd~$cfszwWbuZ+lNNKH$4xx~+Hb}Ch<}ASZ-1OA4czM;dMlhM$maY?s0yjra|2=K
zWd7lby&J!aq)a$MKgw>Si<`!2?V7#7#}gCTo7U%+ZG=oO>9Ld0*c?%d-<5f(Z{@SC
zCci~YS~YX+L-94z4TI<I7-I5zMhCmK-6xxA?MJRXjOA+!T39cMhU1j&UDpK;ecmF9
zW!GcJkt7ul*Dgk=nkX%P`ZZs|aGJ#7ue+PQll4LjKI<ZUsU(z0!}|G&edhv$C#rJ6
zKO$`v4mm-45tUxHUtk}Mx&~G49`*tC=@0Y5${KDRE}n0|^ks}Yol4POt6Er8{33Co
ziX(YMFMr(iAoknFH2cyRz3LYnzX^5x55*Go$=~5&n<7R=kTYUMlYL0PGkEm5s&qj#
zjz-A4WUBj}r29T9f~Y?*h1yC5&)J|g!t)iM`kVuFkCxT8k^m)81QUy)bgXRQtuE)y
zi@v*`LJ0F&?gjLOqx#ulaRjweG1stRiE=s9bvnOAU|6N5xnjQ|j3ES58)ecp``bvJ
zSm3;RBe}|;$hO{rSz<2~(#;=m2=Z@L+|tH~9O9pLH<ZhspI#hOQl?3MT0IsFfaUV*
zv9hL6Gw|fu3PSeroaq0}-$qlNc)41Di78j@$^AV~T`PjiJq+V#0ljt$G;cn=W}h`4
zrd-<81b!VlXe2F1)9OT2d&?%bLl@53`!NXdBy2s!!@X662~*0_<OBU10T&!^;YR@t
zz2*eW;42W|x6=KioV~!|fl=exab(ex)a|@6So~!{YANn!DCi!|mnuOAYh`8mjaOCP
zGa<iSr9-8s;3WOa7agd1>W3tKL3Hp5m*$TPNVvfZ6J&EDzC;#8aFGOW_MbnWXI+zY
z5W*n&Ld}tN&2g`oic<ln`vmJ39&Jq%>N~4|kMN&D2Uy<z%Fy=@jSEgT=iuHgDOb!a
zY;N1B6Eql<`x5a=AHF6_tSfq@(rFB%Wa17(|MArd=k&*)b=nTv7ueXcC$VwIRNSAc
z$jpu&*UBy6qOOcTO-C<2b|CPf-eY%D;N{)7eF=Fm6p2|c-)`fN$z%wC-8V+=b8Qa3
zT4_nFoj+NeG9e8-&A%}#%Bea&o@4mYWijvQeGp%w-QE{y7-Hx~_3DB_s+f3wyU%0a
z`p;*0WQ`DH>y?TkZK`}ly!3fXAKpr$GzGY~qj2|o&<uS^gYK7->Zhj$F>9xH?d$ic
zADq;ML-XRRbxc)p5c$(`GV!e}s7>$w$nHh#A}9y^dbQ5h@}=>F%8tL`3xt#@ZdWC-
zZc<)UC2o?t#L$$JaEhUCyPB&avx(tQMwCxj0s2239IhWk9THTf_cAClFMv5EoR<$P
zu!xqHwjfeI2tgGQr<eQ#EZy6m1v7s4Wuw-*g7@#+2=Q|0{v>0DJ;h=pZeq$F7y0Um
zs;R2_e^DDUSQ~i>(_%6snh$mrm0<H;{PY=lXiw!ey?K4GRQv6wQu`7QOQJGjLZnCO
zpGT82;Z4Y0S!06Q|D)+FgWCGuXkFYLN^uMB?(XjHF2$|5Yk=VHu7#p)(c<pz?(PmZ
zzyH1W%;ZZZlgZwD_Rf3Wv(~e)K87e?wG*a(xbZV$Lw1|_oaqk~wH-Jw<x68K;C~|v
zrY-8Lfi=_92Jv}+$=`IPFP{v|ckJhyu9bFsCP6jN7e?M88SIi9^sOrr87*22p!>1T
zl^&Y+MBkkfUP*KI;Zs#W14*kUVTn}+jYA-QItC$q)_c}wynj->I3@Tis6Q_9W-w8F
zm_9;XiD~;G(4g0nIea=xTXpf$bK>aSL{Sk7%Y}ntA}9S~e?yr&X?86a?B6K*qciA&
z?YaI`Qa}eO-xn>1M8NhgTU7xBNKzos%kl{T*_B4OCvkHm?|(f!`QZmA2JXEDP_bsQ
zlmHLz&A6HN-ap?`DaSV(OuYFYcy|q8v5zwD+tj)KSD_kfuwo#d%r6=QhC1>A(SKee
zWCxbG4~>kJl@xGyL?D+KZyMb63N?`9A2<D@mpg9J7M7zBZFoCB7HVSN|4VetU4>TU
zigynR5`iG{0e{@~%WRtcsiFSs7cW6@E2>p3!%&3hj0_!7ZK|Fmm;c^mC;<W*k`HVe
zOb|TK09|rtb^G3z85(`n&0}l5n2(=1V;gBbnbVdRBZ_1xlIKcm{JwAVo{|zaJc6n=
z<Bja=!JBZ6#ixQjqoRQ#h*wmj?!@PLrZCyvdz?XGTU9NNi>bR5iP14aOLHpLHw)HD
z6UmvXbQ@2FGAQHiq7uo#SC2EcRFi<M6pKs}JcOi4^TDV@uk2nLaNvILQd;`jM5v8%
zh01Rqg!=|+X#*E3xO>Kkiu^pdix}%&%##^dyA7L()@O;<EGiIuQubo*M(D_|1#knR
z;eJTuhZK<yWF+$Bpps5Ol%c(H^d?D3(;sR>A5@d6UuwW!Au-d`1n&6uoV+`d`TP(Q
zp^ir)(SUZ~N)tp?#BV?JV&4?3;S;e-jND(^6Q&>9vV0`dxkq}T5YqX5F4Cx!+^Ib)
zioC5PkGlbD@vqPOLJ(aiQ7=^Mu>)}q8%#O5L<h&zc{{1x#wDaX)HurKWKn}ze@{1+
zr+sa-$6laqN99?Jd+ihwJfX9wWdPa*GUzP;qQ&TwwhOUo4zy}5rbA}!kIWg=eJ>(7
zTI{ToDxQ~&UEY(DSqzbXa8_&GH}p%_09r!|ovnUbxdhLD1gIF-!KqWWG8aZy)eibO
zfe*txAc^aUAw>ET{A}A;YOrRCFtB4^PmML%-3<|nq%bPJpsQcWWQn6sO=m{gGcRHq
zo7w>hn^8tfBFRpsfWnix3y2QDLYNRfwBVQz-MPjBdQE}59`TesXIB(|pJqm7v(Zt5
zAxnyEF=?@AMSx!t4Sq73I~9>Bt$@qkcoPXxCmC@T8KrN40&0bwdJfk`3gc@yNQGRE
zXnm))L{G}UCD~@*XfioIK~kjLF%suK9|5<5?#H|tA{i~N!zr@na_D2z=*M~o?XO=R
zH~-|RTM3R$o7w=g0cN(yw9Xwo{~c;wLgc1(rIt-84y)~oSbUxreH9(jU`4`eCs>LH
zZ~ZL0aJtm;#WcyDh5Z5=0+d=*>4{XHP;{Xs+N+B(5W9@qB|P=ep;3iJiDQ^R1yGm8
zbP%?=|D#ia&tRi_Htv=5@)S=WS!5Ht@)$(27H<BHPtfOqY#DmE1OXTUROHJ85N-C%
zhltj6e_{J;T9Qk?0uP@`vg<u1VDzy1Nt(iVQdU0ee!4+03Qdt&LiX3zWiCxcE!3;H
zUYD2Ml3j+Qh38#O_Czh4tE^Q&rpsI&5fN$0>8=wxwD9ML65V`^GXSkbwEa4=w#%Y8
zoSVj3BE+gK@qnsAo>Eo^Z?SmCj`Dxgpr#EH;ou^$;xKibH6t$tpkM7g`f|0wE5S$g
z&n!JC=MT$i;xsh833~<7StcnF2=92E*Cyu@tpQ29S?qVNIYyY9=n%=GBp~$}vupJM
zm@mv)EsU?pgT;xd`@JqLn&}Fg4Gh)<5H*mJ%~4>%?fwpSX)&xijVJYT_J3CV(a)5A
zz+SzCz;VX7i@aO^_D!`IB6d7*5KgP7ug7Eazh=?f$}sBpG%m{*0ekMv(El0uV@8={
zt3sj%lFIgZYWx4IlEHN{?!V>-$D#}xAZ1BP8MHR*|LqOAJeQ_&$Tw0hT`1Q4@Ba+E
z`YctDSrp50uS);FOZC7Y78C(}Ox*bYI&aUVi3PGxqCG7CowDF7T@izkyRXFvd$mZ~
zB9_2)@(2?%QB}b}8T7wF)OmNWao`oNnI*2>9D;7UI`FhL>sNml^G_(N3I`X3Sn`6M
zyzYW=w%=rEr#VpaH{&-+{+-@#E&V(hxuBz}r62s?0JK4l8GvM3ix|u#9Mqx~17@aD
zK&DdhDHZAUb2~KD$LBIdYZZBgL)7$A&Ju_m)+j#0d?nk~yd`Dtz#=i7U|>VN@|Pr)
zw<VwDFTZ0mtvVeg^L44B@i-okA`g8`PP^Gks`gZ)a$rLPc_!pVtr?kUiNc^lrfWPQ
z?$;`@q1X3bMXZ^Y+hor#(f<yy;PuUPk~U*Ol%m)0e#F6WGI*G?Np0?1hN?IMS$#8<
znfjrgCv{iP-3vqve-AC|z{36bJ_Y$O>27*}Es;jPNGfLU8%pzbyvQ`RSl-xT8l!Bf
z=shBbq#6DVZlfz*Rmdci)XH*=vMlXYQ&XYsh;ccN7R}Rp!BWDMeyw-{<UGZcMs($6
zrjKkQ-eLgGOqm4tK9}cUX8q9-YT4Qu1WndbT>U!%5k0V{r?i>{CAWZEL?HKH6A|iC
z8*^D$)(iBgwkGCWJJ@JD5aHA6NmpzgiD?$m*8tcFlnF`<>Ir2I=pM-OLA)i`Zw^>$
z=^a724_n#aZKC~>G;q&(w)&gCoRBliW@Op?#=+j+WS|MG4eiLOIU{f1Mhv4y!-ip>
zkIJnjn{EP~tr@_gtVZ5E<ceHuyh0J1+Pb3YDuhv8an^2yJ1v^<6hM>Tt$e5Hy}`+v
znNXg+66>ZW$b9a1-GRydHq{YCiaOzBVyP~O7*|c7*=2!8Ac67z>R#q+3(sIp{q<tZ
zkWG<bp}{J*#9l=jF|1Mj$FNL!-g5q80_PuUoX&HFKE{Up>wedy@Z6(K2k8b}8lYm0
zry#xdiu*S;Ill?9G^(3#d=0UCYx{HFH^)n*K~qj8C_ft2i|J4gBEkiPDiLYlu(jQ-
z=b|9-(`zjJ=agSNE%&zG&VE24*cY9qvw8%}*1f;XOrrtmSZ9K?t=He=@P`V;AIW>V
zdbpb6@XP!(WsA&(2Rt4yIYnj_P8Mpc{d1+BgAi{5O4dqM;70-S2V;k$`z$s#Brh6a
z|JGLiIGQ{h5+I<R$cA^#^DwD!#0=b@R<4oKkSqoJZNCKuDr<<V$JYBkTKSAKL>%1h
zNBHK8E0;%Ggwrz9Q|w(&|JD9VOD)-}5zf8wnI*K&Kh@}Ky@G>l@{UHN=<#JWk&xT*
z8<bDe=E-Fr7OkV-2?cEa8-ECb;O!4l5;y9}h!a@Chq2aLTf};uoJ!+BSvP+aqE=LM
zZ+{G=uZTsoA}e00=!qiy4;QK-$vWM8b)6=gP#r00>86=&Oxnx%Zzpd@_%u%^X}3@B
z@i!`(sQx`%wyS%$Fymemd<h#6vOUiTO+FC#tZ5S&@`}F+TYu1#2E8dV*k!@`%+eWk
zo)T}QnLjPAThBHM>hN2tqI>!CRd>FIeG26rq-Zml)g;-55-|xbm=XWIQG{*xfh+&*
z*5W-)49S6Kc^vz9?tZ9Lf01a|sK6U#fiYvq{|ATbKsGMAUT2gor{T9hPE4Bu9}LEa
zME~+@m-B1YE~fNuvo+<z#H*}$FNLna{uK^7wXcb&ir65YuqA4z>%BY73I8LB2r|~d
zg})jFX2})0{Ux%ph=X^O4W7J6+I;S7<@|=t-;(ov6Qj*|aMyW2MqLeD*kVbb$^DC4
zV$)|A>Dm2=U0U1%pIL^N9mBj2h8XsIo;cN=!6Czf=faP+Nw2L=v?m?BZpB>w**0@{
zTYKJGn4wYu&;9DVfNjr-ngqs?$dJWstLMFVuP4c25@UgQsJ@BV^UbS_#H5AKGOckd
z6Qe-FLDQKOye21OsYujwRh;muB`Ld^dkHbinoS)=!*MA@q#GIs?O$*U{{*Wuyae%Y
z(|%Iq&DFQaa8N;)%vw>QbEXwlRN>K*CSvtWc@Pc`EJK~PqC>6*Kf76hpP2>UOo%_5
zsgmW7&+(f32@Rg*%m1tUWv`fHy`ek7PO|7a7C?kRPoK$mOn{p0j4Y<<$xF(G_0|f<
zKqbbW@wp-{V9-SpFUS#W8Zh-;`(`t6ZBQ{@^J*z|{rb4z`5%-{tN0i?bZAHrVhc(O
zqUQ*eL+DqHVKqJc;fRQmIBE53xGw~6c4cGNP2!>I6SCSl(VH$dt^kO5pmft26QPa5
zN<oE0NakHj3q>>~p?!TR3+b8m)%P7Zq^>VnY7=?4%jeL?JnkFc!3-6jZ~a!v569_>
zU#8ya0$?-}S+AvMmCD}3#7F_~kRWKd;2jk7Vbv*nm3KPPak5-bmQpzu8WsD<CbIf)
zF)fuXoPu&ci+#&&CvT97CV7Ag#B5TZI^HtEYME@);ojF}?lMX}5lJXWIjbujtuj9c
zs0oY;V&O!4l8B$I7mw7x>YyvaRWekDl!xFj3e8&P#yvH}OwlphA<bk7I4dw6ZH0SN
zI7$IR`5}|((@i*u2s3ggY{|va>O&~-X0oqv!_b_H3Fq1YQwN9%9F_wmpX^K@z@O@Z
zyX+T+tYOSXyeW`)=Kh*Qr&aDLCJD{}nJFYP$^JtThI5k@OvZwQQiK%6*A5kg2$94B
zIa!Wv(snuw<1)cnsj`5EexjOZoHv=7h(5c-w&aOe*+ROfjsPGmVb6N+mqPaETUmiy
zi6l4F6D2eafkJdL%Gn5AG0H8OqRO9_2b`J-L@F(O3o~VakH(RX`7Dfr8bi375Tw6{
z%`}g>_}vm)*Kor?=qbWqI57Fj=yPoTfV`&qb~>R!GFuq{T_L&-ZFUn>RvG4%jF~K)
z3OubW)wqrnn>C<rGY}I>G4dn~fUSX0k@-Rpp}6*iR?uSKdK))8UJ?yocbjzE9&Q{$
z9==^DTtz+;(>5}N3_c77_$5DRAnZLmj?$elDy-L!)ti_i6z*nu@9*9Da(E+15M8`y
z<%DM*>@e8D*WGZns?(Vm9*i~5|5&$?<1bNrKxKR(RzzPO5J+U992Q(MCdzclpX2I7
z7qg#FHP8AA`K#2T*wl(4APq%rXX)XQ+A<(^-bfStNYiS3#1i{!Dx0qZvGGLouBL<B
zt$kYEMv#hN?2)m;p{F3vSrKPDE9)>`WSUx=BL;mMbE)*@M#e#{;Q%$I4eHIHt(KUm
zZQkT8Nkz{4l$X!)R|0dy4;fxKLT~h#ytfE%_j3DgfrCl?@tZJ3t;r7F`yj%y&JVIn
zWn=k=;MW;zMJQd0$eG^^V>7?=51PYaLDVr1uS7kPp-?pj&9SA)+$PxN&sWu&O{d&B
z2yn=SfvT~?mt!UM6=)se^j^1(&oyyXdk5YuzzEmrB}WTh`9Gg|bvoxyG*#b5D$DPw
z(3_q69<vJ3L((^%fs~_*2}B6LZN0_d@$s{HpZ|!{(vE!U!sP@j&B$OZQmV0MzD&4F
zEFDx+ey^xvKNj?a9K0Kmsz5ZVn<yE~-_7;l>RvM&AP)SdTLleGEX<J277nBM_inWg
zZokl~)7PA88fb)kWGEK?I}7*Y63c3_looFtkC|<j7dy%!r~7BTvT10N{3RI$&%+hS
zMioiA!V8MEtdl?HrTqeVm47Hi`yf#hmPEl=bnI#>a1DcSxj%Bb=!N&@we#S*r{Q>$
z)z_cvl~6aV%xmb8^J;nY^7^P<4iS|Pm<*SWeh1b-P^X(6aI^Y*3rXh+C6saJ?Vsb&
z=_w(I4-${jc2G8U>W_?sr`FUfaxF+63)%@wJzU7t;)=z^JU@PCr6OEPZ)do)diP%*
zp)>NiHAlR0<950&qX~VzH#rOFbt!qv1kK5#Lvjwrb9Y9?FA$H&;^^*STP0pP>`};5
zEaF-}3}Sijo`#1>#e#tW?!_EPTK@M`bxL(qRld<@>>&9^CP1puVBcX{(une}rWUC3
zd~SHwPyGvT7pi$V)>lHFEb+(hk(kXY@A#)>etlIY#^6Us6x=ia`Ub5ri21Yf{z6up
z;#@L5IGZphPj)SdOeByRcd%xcy8L<E#F`G=%uLu+7K-z`Ux^gpwMGdyN8NquwhR+|
zK&zpyUeLOI`%aRSpWc|cmYrq(-{#sR;@PoI;fDu+%y)-@Q*NK)x({bi?S519Icix5
zG-0v*<n#$9J8f9rfh%-b$354FL<$qYN1b%`B+>K6>*uQHy~J>A;$~sNH(PwJ8k3O|
zmR;$T9U8vT1BLC-N$o}s!`@Kkz(EqUr5KETRw1u_tWF&rdCWM|!S}pgK8xnN*)bgr
z>|i7Q^i`7Q2%B=T26aSU;_^}j+RpbU`Hc@Bm^k;HA@xV=d`GIy&R;<qzd*7v;s#y^
zHjn}LzbkWw6k=t_e<n|afXx$CRYPM!TomG~Wu5!b(dNtWk`AhnY;H+Q!TToHHy-V8
z57gL>yviJ0jf(|Bge-PP#HV$jFbloIpzV&9<B{lo^|h-b{{PryNMZlXWd&pyR?U>X
z#KIt(=LxQ9xMYEue;LA?W}n)>qII;yrl#J@(0YGv_#YV%OHqvXq{><`-LurlvsP;}
z6<c?0@C?+Z_KFrY<&7-A$3rS=)(qoM6!>MA<Q~(M&0QTp(;{ovx4?2uyr#Sozh&T|
z1jxxTSarQ3$9J^l*c3oJfDsT6m$*+hikRw%b1F<Ymi^e!)z3$rkD1>q0SkeH9iKj+
z@`GddTkf0vQK##nzPO<79B$!*4%t+RW>Qh(pb)mu=*NHovGpFzQ?J7fG+hj);_oi-
z^#S<Ij1BNMW{o~JRUx*^0@rJ+29J|)f9^NR|Mz-u`n3AkNrmr=PnmV}vw639k_h?h
z)H#NO79gIwUH)gA-?8ga{h&mF5X1cD7VY**A@s~SC}=X0PA|W3=UR{9{Y8Gm&k154
zvPUkZk~wfln*BR#51+BX6*}{nT=7!~hjQ)+2U|VVbgN|h$Cmb7ntQQRp7?zOp5HG-
zNaElW$b5Y3gKU!Pj}(+6y^v#Ofk7PQaq{T=s}-lG!wxK6rY$&sWSDWMM!OYmF!aa1
z3LX=+EaR?U;ozroGJ($I=wrtKoV>Y?9wUk19RN+)vFC6W9ll*R-2GT1h`S}_H_1nm
zrj5qrTi7e{OIT(-1K;te*G)|3*vb()V$Xo=<kdhs>`vNBS)%oT{ej5Gk49XVbCgHF
z%>(ZB$(TC-sB;-?&1c=!H4I``IM9AWXnVWQ`?$fw7TlOpC<#p6q{&6Bw}Rf1givbx
z-4%a(^B>|~s2-9+Ls?oP{v*HJfBFhl&8%vp-uoNYUID?90eNEQRhjMAbM9t19pAo1
z*V}9xbn3zdC~nc9S7!IV=Z{${VmExZz8Y(+yPCR#B_y!3>KL7EEG{AVdOgsa-zX6Q
z|H7#u*?ag{L`x?Wm_=(mY4xyz4KrZ&aryE1WG0R*ugP@^h1V8jG7(~F;M?2PmHs;Z
zxqpni+3%W@Z+P)@P@YkmqD}qBKs<~0t+8=K8VfN16UO-4LDwe&iBeVfVkPeT+<rU1
zFVwW<?4QF%OOA5Njpk&pqhoF_A5p~kQt(=|2?#4w7g(A>gjW@MW21v<7Wpcm?y<$Z
z?MgKIXuD@@+EMS5i^nH>2YmS!9VZ;w25$)FwP$Q&DWs?pGlqP@$o`El+bj$pcWxV>
zW`cI*M#xt+2gRAG_P+=+ZqC@>4vU+0s^B2Hf&>Ed&_u-DVtWUXEziC`vIKmZj_Ll2
z4Sav}HVSxW2ZYGDU<}&a6V_W{8ou5ilyVF25BTO;4ByDL8#zQy!e#K8Lo6C~4GXyJ
z`nSIwQ1gIon7%Dt7h?!tXdMJZ=6*%tf2AEAaIpuwt0^qe5ji-y3J_!+=0+n<tOVq;
zH0UOPocH!M$}9!RamrjbJ-)ZPn)6Z43TZXb$?4hR_YqYsy}WIDKgL^f(#$p5&bP$p
z8B0tPW)$7^Niixg-NngELpU55q{-SwO_X>Z(Lr=N10J8tGS^@qz*%hPo@PML8+Y{-
zA<}x7(E952NXoH<xd&i@lf7}mG^%);`Fu!d7qrLxE~Vz&Yu?W9z=RYij2y@lg-f)8
za&UM1l9=)ErFk&Fn-=bev{vBQ?d8}2A5GLEuK9T@r~Q)`2X4-+X`>H8L=Q$}Z1?58
z%dKGiG<IB~LMiXZpWZ(wJF`Qh<IgUxD{<?MgAJ?>(Yrb&^{ReGV*R~5yG>BvYEl}U
z-+cYFy-9P)Z@nHeQIJ0-#|;+LCAqs@@SmB$z(a!GU+5cOf`cM*BP@nQk>IYqIp$ux
z1s=nDy0uA0X~o@a@;(S>g^eO|mDJi?V42&w<JXFB;WNHxG;El7TnptmyJNIECVCRi
zsi1ekA+L&}zz$vTCLvAYDae`&-F{v%s#iah8`l04-7+!Dz?A0uMoTciOO1ZBB?Gno
zE1_^Amj8kVRP#-FI={|jWhXB7tO$K5ddhs0;`ugs`I`$?u^R+)mq6svK-?U+C95#)
zHA46qQz*|xNhnWI0TI$<zQq1abBXWQ>yJIK;kZax7ebWI(w^&JR1Wxe*D3vG(wF$~
z)~ORrwU{aV!TsUczkJ4T#u6>@Vm;|yV6#u?zA(Jk{(@LH{sDIQKf3gC7GtD^pMM`5
z+9Vq0?SM_-*+)p5FznCzct*ZZ9q^r{YHaySY;GvXZimu}LlXv+JMsW~H247Bhs=T#
zw<OFZ0`w$-_Piuoi(>sI14Iep<Yj6zPNaFv_%=}|3^{`FJH33j>)bI*EbX{%RE`!?
ziRZEe->+aPu(j_j@{1#Wo#^HY=Lm(o`+EowDN=-<^IjblKlw*q)bPJ~A23x~dC3O-
za&Y)6V`z{t`7`hxYgt#<@2TGc5`x6?9QbFup^?YA%M^gg2fDq5QGzF%_JA9${{_!(
zvuBE&^-TL)`FzwiAea(o&Vpz&fHzgy3ehK0Aj1R6`{CyU;bUY#)M9mo@;&v(vw&Ru
z(Fjoa;8%+qhJ4vP`_Us#pE<2rL}XHDD9_P9%A*)Lp685!yL6<#C;gljB(7|Myp1He
zHT7YWT}jbMkCq~}eNtwpvUYY~uZFXj44&66c~z>n_g@#TmmuL1?JZ8Y)t^lolqQ|O
z=>ASf*FJQ+`t|YD7@~3J@hv@n3L#S_St<MNtEwi<?9h@F<hpNS0x6g_w2z4xE>r4m
z-y8N8GKS(30RqF*evzU{(v+xEm03DG65&{$|GB*kJUD10*&n54zxEac^Cd#N3|&x*
zABZzDsUH$}<<vFLa*tjy*_bX<U?8#8$xA{j36A)LeLB=M;w;#r$w`08??gibA;+h`
zX>zg-T%`7Tl&7&fe83X>{l)B>j8VqQNDEoqrNoH8)Z%@sf*W@M9K-{Q8h=p`9hnIa
zH*pS57wbq%laVs0dED1H((V6K%e5Gh76pVE2YXo(jVChQRSijT=>k?B3!IL=t5NCP
zv;RF^n2e4)kxX}oE^o!`Z;~ZIl;nMOrw@ZAg5)K0&2~3y4Goo8!8C+(m<LSwFKk_@
z`>5|NWi%ti<~SmgsEG!w6}2xKX}FITky)8JevLji(M5$j=O--L%F_SnB{P?Dets@b
z$j`n-LbikJZK}^zSZC-Zw+#EXMoE&HreSG0%eq&<y?pcnTXmL~v$0%gCyp;o;|0Zb
z`x}#Cw&xe2Gc*V$LSrgSga@;+HB+Z8;EvJVrdC;OGT_dfH_b88kwta&-eRf1Gwk#>
zljT>CQODa{zk-5%KMPxT{Y+X$S-5G$a<xA3a7DLNAX6?RRkRcwyZn|61TfT+Uxv0G
zg}@#`smyU$BM3sgRrRaJQo@~Df>Y5T<6ToIAp7B2#h8Rb_nAof?FZk<CF~Uc5w!}X
zvwKX_aWN@>*ktgDyEf?jop<u*>d+Z8H9I9o&@5u8mpztwOc2~C8(4(AQx&7!%c7XZ
zU_6eJo;yBd8Y)BOahCrcAs>v+1;jBKLO7gi+q7Q0IVu;p(WC~Y2Jm^%7s!)wEEC@}
z2+oy>^l9C0u5MV{M!NdAA4kr6;|m>|WEI#hryR&saZ5yVBZ(3Du+;>zezX!Q5p94(
za|Jp27#UUzS-bct#<(khj3yT;gi?9aNEb$ZBR<KKRjn>^KjP*P;iCIwjySl>W%RjF
z?x!?N3QmQ59?oTS(eZ1(oRcGZu*SHrbW?K)mzwLMO2RxFcyE)iD#R?`raQmqPnwMl
z6?R3fh1>9g(7qu=Yb}NQqw4h)*9nbVuk&H5GS&?6OuKWPzotyp>66(FL)S7MOF44K
zVAMbAVjE7p9QVhz*`Oz1WQ?}AvXw2|Z;d%3)|Z5aOVZ_$<1fk{!^Vv#OcnP@^2;Im
zAF1ZbWsVngCcz*e8BX@a^R~uq*cZDKi*S!ygdP|F(pPRBTae|Zj4JC%xjz{Sx(K(S
zjJ!@Sa&!k}C~)?;)2P_kD_|u&I6ZvpbP#v+3>!3hMOI~jKD}2y-fZK?LS4pP|5fQ^
zQ&v`$^;+b@(G@RoPL9fJ!U6777yac`B(JoFl>PmCM3-v6wBO*ioP7!<Su^$Y@Ai$`
zlJ!xL;D)hcuPEOpb=0bw=wx5+(oz|O82Tck3N+cOC|Lh$YnJsk<UypdE_(YUiv-hE
zRy=||??J0p2}rACZwQpum>(^6s-w<A$3C=#3TX)WGVGou!V_Y8=EF-UUDPb~{E-2p
z0o&%XQ;0F~wCGECb%t@L4)7T5+Pi-3>dSJb3=Nw|m$4u0t`91L1Qt25_$zUv@)d;C
z*c#t@t7AcNpg8Pv<k_C|5tI|j9Vbox*?Q-Mr(|~lGjmOYLqg5@Wh6y4SNdc;O;fm?
zvgPZ*bf}{s0kJei2N%@kdi)wCIJadM7=1B5(}qr6Y0bW`kS;6=$?wuA`v=v`CDQ4r
z*tiF#%L|hM6NYlpi<gvJw;2CIC#ws$3bH+^ct%=SEU9oq^k#DNx(B`7MqJi-=_E$J
ztSSX;3b9G>SeRA1NT9nCRAnr#g@HsE8A~c|9E6MofB|r@mHwAlLdi+&95{@^LBhlo
zYo8`er%BiTQpJ3nE?AnX+{w}CLC#ZgW6(7ANa}PICy&Q5+=}LFX5*6zX=43{wk8WR
zD1=s`{F`c>8A-}*NFmUWiZaJ0dYJw7QB1kRz9S}OInG}Qg#8jv4<xvcN$@0x<z9~X
zTj&>%<h?C-6ndodr2wPx3Hsj$W7RZOwZ=4Ya|d2fIAgypkgT&f6CPSS{V>fgIhe4p
zs#8^f4@t%Wn3TxKp##B4ZDfKldxX9F7x=pDiR9{D1Mg$60OO`GH{+}b`|GyfBTCQ$
zPYs$W62O^lbKajsGSX_B_EQNQsyJ}sr~e>ADV00l>5zINU3CJC8(#c-w6PScUgJy3
z7Ykb*`1iM#xIkBl=}5XpFwvo=dKswjg9EN?^%%gJg*D-fv(;2==YE*-hALOVSJ1au
z$BeGnHT@ZTYfN|EBj}@*AMkLDULpD)PB8utB#~*^k`fM7RwyQ8PvYOcLfgu6l@JXe
zdu5gz`{Y)6cI`g3gS=Whh7XOu_racvqs^24ZD!s20`rVrL9f%v0Cf8mkGep9@z#_9
z()PXf(bGUs>`p!u&3vRaUX0u8GhufMd_`ezr{E>yS4g84?Kzncii|biWJuuRSeE}q
zL@=1<aQXg|9J*x2HsbzN$`llT-@L4l)j_BTHLAtJm~1jNNhT<V@Fd{Jp-Y`5vvcj2
zkKs9ZGdzYxL?`#>MY&wvP=9hm{N)318)ieqzzB?f6BSBGOJ-^bC8t!KmBI+IUmeaF
zvem5%u+IcbNG8UME6b94YM=w+l?=t%$+`fT2@2WTik6z}_v6Hfw;?oOQ*f#NUpaqq
zqW<%d1W<?m{t`v>{4dQBRH1Bwto-fR-7a$Ntf-*)?!Z4eNCPdQ8dwpDREbmd0Kge2
z$Mx>Z$KB9uEXgB-KkA7n=x*1|KF86Qec~0}`Xhj@^9)k%%@!G9hE1k#CL@R(V8y3M
zZo5TeLY16Rm2c@J(A!}gAUd1W@Av#mBrSG3tqb|^O_*_OWb~ttyPp`@iRm4cKbn6a
zeKw_`rO2P32W0W7DxQd`F!~`0o6WpuJsg>Td((D#m8dX%TEQZ_3UF8&N;CAJOOt3M
zOsR3q@!Q{6b6ro3rM*FCu$h!iHx{w3OpZG3^XTrTfW7(1;pR2((cnWK7yqd+Jv$ve
z9Ur4qvxWBgPMt4Qq{3Q5ab6^w)DpSF^m;Y8t92Eh%(Qo}ma6lI0xRGX?n8hte*i!O
z3{6x>nqw?UII0I!wg}L3RoaAHqU~E)S+tcBF-ivIQDw3?W5e|#Vi`T6a2xX{pDr*_
z^4yWvo-TtDD#-8@lRQPLh#P!REw*kaou?3t(Z7OGd`R`^G>nrC(D3xp8y6xVhW6ys
zw6xoFrBdt{Kufa&<rD`ap9f8;dZZfi>`VVeJZ9EE<b|u9%5>)+&^w@bP;cPm`>Qqk
zem8Wq1U!-oc66dlk^(^1V=a<`{$e{Xrfw^5284~rDhENUm^2NDps24wUw>RlH~%U$
z`BU0>sF*UOtUVyde?&Ehhcw$}rAJPDaayp_|G;A<UsGX<fHcqo=7&*ZM&a+AC_7#r
zkStposRJAhW3@<iTjcJfoZIex@zB?=!zs~F@cp9k)UsI*TyEPkve{}&o$cRlaZ~t%
z+}UnsC}l>)_S~)JKFskxw!1PHQUJAw?Ax*RV;#4G6NH~+i455`i!N)v7u|P)1>Bm4
z0aA;n^jFnFD`-rn2f5Wx>s`uWT<R@f$m;K~qf0<2efJMJe#bhFZI_lGUUzObEs~Gd
z)~>FD@Wcv9)6leo;-bUo0bP?8AMQQ*-mS`E1?n=98Yw=4k>X1Dqib!OJ8!*Rq};1z
zm9v*#TR=paa@ouYCn3{9QY?m*-@eRDe$E)5yyg6po%b;5#=i8qd`*W@y=cWe+(TJ9
zU#qo`kk5=p{FOWYV<U_q3=)k81^7>S_?L6VMA*(YtMeN2r+)6;N*sIvyKr*HFXAvD
z?FR=MVigK%E=aM1O)VLwKn|CQYlJNh>MA;8H{l_KlmkK?{tP;4RJln_%m}ViSCD)u
z2bhXn4P|m$G)ApWp?T*HT1<6Tb<=RBs|y#+w*GT01iJ(A+A7#6jGE)^^W!`+9L5PV
zpj;Xi4`kb9dwZ%ZwPD)fZf0nqObbO#6i(IbqBlF@PBXrDN50H!L$@jVMHRe8j1Ty5
zh-l_6^sZ?I|6EBeT{4VufZn3S*j<t_KDnl5<i#Y}7Khqu4#2@;=iAl6OsTk#=uVBE
zs^VCh%)B^HS6J<{P|bNCDm+=hw5*z{rdk||#^M47j&4e-RiOk{Mkj-7Ba~MPHs|*&
zRV1XL`)V4!ER>i<_3!c=@%cMI#D+20lWaiZjF_tgFm9f+rcR!`kz#KdeQcbJ9+TXH
zyZ%oDC}kU+hJhSYeutKkY7xn^H9EEWM25_z=?mD+sj=tv%U(qzxvWac-8k&cFZEyq
zHYZ2GRh$@GZB9$-x`m#6wK1AR7_Yc~gR0G+iGyn@=OID+>p+Dgd1<*VmwOUz_8Sn?
zgygF#nUuvjZbKQq=LMst$MN&0g}+`uE_@=%4E({Nh&t4`ZCuU{;oFi;BFkxB7wEOf
zoaZ%))qR}JlkT&RdHn+3`3#yM&7lATBJayHWvTmc>YOGw<}9Zx&<(*BtidB-_0!$M
z3Hw#GsJficcO^x0$NO{>Go+?I_fsC7hMv60Dg{q)<KM{$toy%*2ylsA0;p+@g$bsc
z(a_}DW~3pdE+||=Sg4IlR96*CJ1{vxIH~sN!RZhC3EfPv*dRnyR3nh@OeZz>kgSj1
zT~}IJZQmEYmqhSTbY|lH*1wO+<C)ZY|MMnErm%nqR<U`WV}wBtcsu-XH0M}h<!{J_
z^@%Z7>}yMG$~eBlIUXh#6XgXB!m#$&OnO753=6yUcjcI;GTM|-cuY{wi6go4QQ*>Y
zG%<I>M<TH_q#JrfEKyL?$LrPCQ>dk?PxfG_v6n!A9!9jpXd;B9gxT{_z^|&-)y5ix
zJQE>arxz>X=GfgkNW_{`3FrkzSJ5csHU<?xkjQ8j1B5MHX5X3Fw+mFg+KD;h<GpHv
z{bBEWlCJi-XLZ_J(>h)rNx`^MXP&0fYXxD;Kopoaf!Bq@GvOvA@fY_#mKu_Fe*C!G
z^g!Y9PTZXSY^O;{j1c0E5qJ)!2+Hp~pCOGlAgTbr_Lu|H>9@=p1CDIqgQ53nwvW+=
z7fN_I@7ntz8S=S)kLHh`CKs5g8-|>qC1WyOVG?64REohj)WPNZIDf~b@8`VzfX1vH
z&8{xDsg|=ALRer?5siudR}eOh5eZqB6e%)&{wEx@Fz!KBU~W&;4tkY}ioSv_>Xr_d
z8cjvjzj_9HS`|(lNg4Z5(F!`CyYtW+=qUgx%$8TCaBDgx?a~?q!khREz_%`>v8e*i
zV19;FkrGm4@rQ`qR>+LnCAu7ZrYc%o!oz6VCT0!^$YbG+8zUyN_Vc^4Kg+C&R>`fp
zg%|BCmnaggPGp?u7u9LR0~1iw7*#oc_J=XAj@<e`>%nP$=U<VLl+@(1?M>sy3;S}s
zr1QXaQdvp!^IbfN_xI)t!z`?E2KiUlUE!{x^<Z;6;da9DrT{^HX|gLDJN-ZpdxBY5
zO-)t3y?vP}uEdU_DjT2;9y_G1^+5E2stZFkW2gD-1Gbvka%OS68P>SWtwj=&t`Zf;
zW-%?}Zf)s1N3gjbkC>=Br^dEPb5prkjJ#sV!E%%E8{fl*{s<CuRav2#xgHlPVpdht
z-{5d}7OqTlz5O{lZeK8nh!59lh1Ct7Y_?oKGSl429~nWjzuMxf1g$6{+vTcVCIDC#
zk{qr6$_S?2RWH<<kNjw4TX09B8<FSr>cY@zQ4~nDIA{-NFs?_8mliEzwYwy{JDZ8N
zpu3Nu@6*>-=rs8(%>6dgCVp@wR&5JE?OF5Dz@NXhlwDg;D1-n>zASp+_k?iLFmK?z
zz3eN&s;YrQk!$sECp+h;BQ7avy}(uB$K92vv(|lx@J09T1i#Q2H@P(~CJ{LBEAcfs
zIXm9rlcv9KE?~e>f^>)F^zY!`$7Wj%Ip*UmF{O@Ed(fq}+&|B?HZ=p!HmB!Cz^##g
z$SO&e#6@(vb3ZE-?YsiRBccOt`X&QtH$kDCeb4}+YcjH|(m|M8A-T!XqUK9g#O9%-
z>Ie7lvciJ=Md6o-)au2ZTRZTb(s>3?S-3;?Qd)RnxvjmO)U9v5L!;#_lWmQY$yx?$
zj>`!Nc%wXK?4-+4>NePLRi`tMVk4@nXvk>+NF=9a07V>J8nY_;lA>*hFUU(VIcp*7
zT2HRMdB$R_w!?^aM@JE<%j<=h@Gnzg{QnFd6gK5fxw3?V7K=&OP8$skK7_x$W;2uO
zGsR|q7<`~jB8XX-5p)S3Q~Z{RrPg<41uB@-*vCl^gP|)|UIM=DATf+N$C@J7eKjr(
z%^4lzQ1jKWMmJg}+VXaBYdStpN!2-$`@Bn><i5%3j3&9jWXF&;&p&6&o%;{8U|Hbi
z5%%v=szw-LTa^nfwzU>3<xQ-;2!XVR7+I~>#nrYy{-a=JpJjUaAI5{W{2!aY4^t8x
z3jZknFV6&QTj&aDxu28%f3id-VQxr8I>tdL!~Z8s3=l0LpE9E*=;zG%PX`IU-g^4f
zxK?^7=?!K7yp;_b$aa2*FjH#*_<aBCR<<9O_dhkFa_rZ;KbhqQ0lhLZr?Sp~s<IE#
ztai!6C)1QvbRJM>S!D@ha2cXsmUBF5+kao$2Txl%oYy)w*}or{Fz~`hcnl7|P|<Wi
zdKYifk?gY?0ano*MFdYCmQw9go`o}X`9_WZC%B{@nDL}e?-&Km3F6q!?;O!P*YL=o
zsHld8SRV7Vgr|UWaIhI;xvTlB>flShcdX2U)sKqwZnEhrs+xbr`=Qw`NP1boVE9>%
zdhB3#4Z=mU|7^lH$vb*-0f-$EL8*FCbLB-(FXjMT(?0D4IlH~II|+47`&F?Wlk6mk
zajAw?lEYSn|2td#eK_69P3k|?XgUd-REX`I1wI6_pOUC6ofK4O3YmqBzm$X~)|9)9
zw<{Es(zh6s09%L0^Yv*e^xwL6dH$@F|2KEl8E<OzU)Ah*9;Cv|3ZJD4Xz`l~w6-v)
zo^kv|SC*_W2U!DC@71yEpE*%Lp^fs#TQFiY;6i@)&GpBs{dj6)BhNM7(g1#m19>T2
zFr*BaK?cq<G7rYKDO7rLgDtYdC~;pe|8KoljSLL}Mkvv)$ba4kMLSq}j!CsctSXq`
zvD#C#W+OHHFXN{6J+7#tqH0Up(1R3PLsRAXWjyDXHVl{uSM*kp{anNbYM6ylQ=O-o
zCH|Yt@92{~4+Op--ARGtS|%no&bxjmsjCXm&Y4Ivn4?Zd)Y;k@NYHS{3hz)P5CIZ)
zdlkmS;(t0z=luVX^F>3`>Vt|A|NU$6upjJ8{F;W*zfip7gG`%i*p4kCsfl~F*~_$b
zysUbb`|=$}^XGmqLG6BvuTZ(&4;+ZXBD(wb>)&Ad`7~#2>kACA&y^~%uylioksv3l
z=k{Mdg7is?gB%<QcG#4B9I$U4%+gOc^jvnNqlS!*-Wip=r?W^klG1A1#B$P;S5$=B
zaAw_*;q8=x;gPlP=<ayy{%<Qu6G&-83!{MCRiI@6EtWfpvi7SID||Bx_4igKmS))q
zCCTJkw?u_K9pGEic^DPd6vi4tuJ7fO#s6GXG+^urJg~lpr(g~yGS((t=Fk3e$4kwH
zHTg|L4}^q-TTNsfLBhjLz7_wj@O`E}wQjS|7s-$C{`V`dlaui%8XRi{txVdaBky~I
ztgOCLfaM4|_ynW!f5I`AmmYh|-Ce??Pbw;K)U#c+Qsxx}V~D`$843^&<e-b!S^eOD
z6e}=ncf(`dh)+frrHW)+A5=PMQ=_LeWR1ae6!zb_3A*`o^NTJj0xopk3+o7JN?Q8v
zV}V%+7^`mlj(h<v55Kd~s0Llw9F@WEL6Yg`b=Z2hbe@XxO)Mx!H49bWb2|`3G7j8m
zo&KrR=VaFkUxLA{wyE4Lv&3S&)jIvI-`TZn(9)mrwW{@*-P5+Q<-XN{>rw`85LRP9
z5^vJ-RN#+WcGCFa0@(ibbFr@Z(`otx-Xq4kX(V8@p?U6masZhFfi=?KRkZ?py;{Zf
z)9kyrg};7{oTDwK?7GcOq2F1b<4E;j3mvwXs9G#dOBT(tX$eRB>fLKJu;rb47R=$x
zgUjOb9d_-$;Am><TwP_x*23@1gTpG8t^b0}<^rm>jDh?G{6x%wB=ki4{cf(q6B86|
zs~d!mJ$xFP))U_!UHXk8U7lRTqxRhQLw;{=N3VW}42nBiO8Idqzg<{d_&MPq6c*7K
z-~RrfzP2xw^y?)s;C|8|_BrQ@KolJw+VwJl_=ni()tKmh%}Ut$8x2hIZK=0p3g<O?
zGfJiXjan%0Efh|PbN776U12wHo?`F{qmA-V@bY%Ye`eO%1dM_f$M#OYoudpa=s>@F
zpH*kD)nIp|d&im}nu|*cfgIs8>g5(YOGE`DF(OP^JkNB%2)_SN%m0!8F57QW!6-hO
z5vF#@mMkB@jIEel^!m(2S>8W3EFB;AmedzbJT*-ZwAKY|oaPf=(4`MF8Y9OC^{Jho
zE2H7-XQFoXZ!IVA_B(70G?+-m6&_@>)bC=?%!bYThb2FL$!IPnshOpFHL{P4EIBlZ
zv|IUYbf1|)OjZBod4T)rJ*qzE@ywt|ZuHS=U2)TKKP8r6@XwAJVoVGe4^J*!M^OxV
zf=mAS^N))rPV<ML62W4+^S_wDAx*zdvbd^=ZITW?bu}G@@{RIarP;K7ZPj_I&gaKw
zgMb6}8ugiWw-4U8`vqm4F7`A{NlDJCr=2vcV~-`qv7%Dc;o~*efekN>;F)*#ybRsQ
zDmp*!`G7k*lw^Hp)_g$C7$PmU2LHg0^hDukMb}kxJ-wqHj%IFO9F)@Du;l_3Qmu%l
zW)^PeNWVXf81l|sm$K-zeP`!20JaLk6&OQfr!676pz`t3ZI>jr9!;+YJ~Rt&iuHM`
zLPJ!r2Miy{>F;8*{bn}N3Ii+iRTg;L)$^sQApNg<W5Hrl7gM3-b07ADDrFJP%Fhec
zk0nh~4YcCPz@T|xPhT~tsE%5~(FH^D97sDs)IDyjRZLH3HY0qbGMz_EEu`37Rg~qS
z(DAC#O5z1IYmcL-S@H5@Ot`2^+V`#2*A~O)yKuE%o_Ivs?&hJD6@y<^@~cN_Q$@m?
zXYM!W1$ux+>fXrXAHM<-n)m1TRFc_tLzrbvg#ZtkV~Z3_^+7I1HO0pISS!NSAsQ+l
zEUQ+8(XU>s?+Al7YYQ2noRe<nA)bWqTN-xUH9NHwpxsvG&tVss-oJa%(SE+`A2yu~
z1E1f?MztpPl6?n?-_MN|$b*<!bEB)X@B+52C9*sB4nooPGT4c?vJY!bWztOEtD5Hq
zQ3yp6N@`sN$6?`hCu4Q%Tpy)#y_s8rULV!HuX_UP#a__&EmPbtWL#Ez-rgO1JqckA
zu7oy~@+WI5f3xgu{<wOR5_LU~TytH}wg2M<F@CCjGmZ6WA<T%l(Jb)sCZSgBROGtd
z5w__SN=;P<ndUtBtBtnx1gC7wcxW$h;O}mwCcNfZa7&_r=dxuiv0xS$1)m7c=*aGP
zSON1R|HG9F<vZc#-M<G+y4aT_540ecn49U#GIY=u2kBLQP2c$BqpRYJ)PEuAHpHr)
zRt@m0B!Vk<hI|ZshNt$tev7B2B=9<00=fH`GWOC}+cdQ3B4DC$f`epO^*p9Y63S{D
zfK-N#*KWB39<a-TOuOe<_chr!42z0KA&d}U0OUJobMoOXfRWAgiv7>=QsC6(4B7{Y
zuM?5AX7lH#@Z$z`SzBaQL0em!z9a@XqmC8>9YYmEMFbnVBt=RLP}0`MADIaOn{koM
z9}t+s&hl^TJ|GbHeq*wo1dP?>y=Z*UySz90-m$>X+hTzyubh8yw(Mpg)DX^lsR@RO
z)6(H>A!vpI$Xv3n1<TB;pLyXN*Qq^62RUeVCbnG+msZVTrQ=CV^&(H(xt($FdS>B3
zA+!|HC6RbTHhWZpq`Zu{&&q2(08vWHXY#H({;)ths%6N3ifPE1L#FCzo*Uy^+rhN$
zY83FJ3&D4aHr?_3j=x@a_1jq;`8{<du{9dp>gsQPLqP*dlb)T7XBkV@WJ!C=_Gdez
z65R7F<#AnGCK2}3#S<?l_KMGGIX>*U^v&zsu4foAwUGbS*`tt)tvO?TN^Io-{^hc-
z%@%n()WMvOA>W;9v3blIHYkG%KY!vYtPze5U!!?j?^wAiux0Va#GZMMb$W)MQvaxT
zRZ#ES(-)9oo$-soJD(vR$=U3gs(VxmxN&^|r!V*PXRqnrP`y-SrJ#BYD)RJXq<57M
zKS7;kPsfR9u+1=Eudawcm0Khf!|g1v2fW+153Kh!bg;JlU@)1-V|Py1?TFZ&G2<Fs
z@KfOYfrWN4x1YUR{>S+SeYMQJhw&Zu``7V3k@(&r>%pyD)_jc9i(4l?wy#;PAKi#p
zkpmJfMY2{F+3M;=OGGE!l9Be~QtAvgMG;2spSyZYlJcs%E9GOYyW$;o;*~@dP=43w
zab9o{7zd|7i%BwvSsS^|F4ztROoLkHFAd}QGt;IVwr5b#+lME>HtR2@AD}qhDZ&Fx
zvPp}uFdCZ*V6aL4!5#i)vI&~a%wNuQb}d&f$1je<vVcRXBv@#i0y)nPmULj<yNp~5
zg6L0ix3=)P#z7vRQ=GCp#&9_Ni>xnz#MEQyY^Av4#SUzENM_u11wVWIuj=^Piq^XC
zTIN=NkES?adb5dwWj;P(wU9#o%~h%=0*(_s0nBvLvm7;Ar}=PHRj}aSf~=#GN~j?z
zl~7~j$=<*V)o&#x5lMUhjme0T)dzdjx<Os_j4nh;qJCKw2BTvms6elN1iy%;aP}Aj
zMtYoBv&B3eM*|v=3y}*Tukf^Q2q{B=Cnr5(IqHMlSJSjS^Tfl!$W@95(9l!`Rm>KO
zcT>g4BxR1xX~h1us%ZemOqgCYE}vCo1(BYxe3OV|s0Pz>8;Z!~`0n_Kih{(=0rX&|
za0Pc!y1_L9N74@>91a*Tg8Yk_s#rNUDFR|uQBfs6A|0@ZOxDM}^=(T=JXLc_7G|T0
zLs3$lC{j&yNmL!1qg;+a1Di5x@oR2*vNvx2I~Uq^rU!$0WA&fbVH=tFMWEfFmHLzh
zgu4$i-|*i634mz7V|@`kIiGmmfM}n|RiE;qqVq4fDgcj>vn7oF8S$T&R5G1pRhS^c
z8MaZ?dNY>p4~Rc9sLxFRfxU|kEROSf==gFM1oXB&0#JHQPg@7SDx=1~TD&Q@FqFnD
z_AN0AAY9un|C4`~_H#I6CG%~Sut|FTGLFHzMdYwF`t24h9|Sg@#WIiqe@eEeQ2<AB
zsCBdhtIG}0isa$6j1Duj-VrOv#qR)%RwA2$+EyeUpL<`;rS|)UO)edoVyq3xlHSSu
z@lQ*Ww%hPhR|*kjo7$}vB=G8OT~pmbY1t?15fhWnvl<5m0arUQ@`o~}+X30S^@0T5
zxv08>u<s%fWxWTtSd32ysq_096OhX*HEUZ`rUE7-h7-FDWtpr-#s|HJPK~~VJOmu(
z;L9g{zWuV!{?-skz)2rl?6<5!-qWU1ImYx5u#on(C<@TJy-OmIpa{_scA}Tlz!;+{
z<@BYH*P+VZayM1KWG1Dd-vA<5zWg`Fx+`Elq+N8JilR**wHg}p=oFNaJ=9Cl<yv5&
zZI{nM2KhtzvOle=STV*XmW<K%?b)C<r!_)tJU6z<MlO|B3>^BpBZz^a-3|o_&xSuu
z;9g=R*t=hRefLyItoE$W;jucr!uk4V^Io$jFX^{f+;AXmW!8z#6c-#z;!mn_;ATYG
zlFHd%kc#PY$bS5dJ`EyJE47~A>@S;`sfB|eN~eGntW-IXs)z{L?pXXCG0s?Uj=dS$
z<l%k-vTKey1ETkX28`tF)X=Jl1Ue1}w6uOz2;-(1HZ*#!2`@E8FkF4X%d5)oM95)%
zUhK>EN?FV#Qu9SXNeN}srDyu}VC^mGHYtfV77@32w=KbB<K)4rjk}K^AKB#tC20jd
zzSfxTc!u8{9Rlre37|BArIdFh@Smut%ge5f5`SG0O}tQ56`y@qpdKD6zfc3pa$4v(
zVPsWB1rVp-QLM$n<aY^$9OlAVwT|26o;s(z%#7`TRP$~&rTQ_pZU`nN`Lo3=lxN^F
zx-uGb4;|OR?79_Plv-`QnS?a(@9XyNg;H^M%pWtX?IE5lZAK*(8<vk+VrbOmAjtu|
z=6x0z#G<eY!L6&B-?Y0I!I8d<8_%Z9z6)q2ucPA2e#R1iIukrEJxjE7v;#T=V~3eF
z$z6|p7#hO&#5bn^G${oINplYO6s$%6;+oZ;D#YMkP|t(Q+xWK~A{#%-qG(3W-Wsqt
zfiGLT`=Xou*BPZ)erhF*!bbIEW;++4$%<n<36lae%adm7Z5#;IF|*Gf`D|6HXg=-B
zsLVfp06PT2dl5pgB;;h&5anCrE%ZVC+woV>%rF-u>jP*|<!<6h2{+H&@I_$&-KD#3
z+&9-Zd@9<>1LguS|7Mm(5aEX;f~vg9=baGt4{r47Tf;OXjVsqhQ|Kga<RU{Hr;s;6
z=gT`H?PPl;GVLLrcc`D@;_&fwie1LUkhNYgI?=pBIj$ij9zM#4O^OnL>^LM6l`=1A
zPC8%n=40o>ubcA$*^-sgc#DM`f`^7~jwn`1mm~*s7X$9!Pf=;$L!N9v+r)4!t?Hbo
zWX2uZaQ_FuKtI2|WTgE!r$|GOfD^1CV$_EbUivuKVgM33KL2eZ-HjCM_y#|nk@0rd
zApnBj6?fBNzUthFa94LK3|T{5rlVAYm`|=G!Op|@8|>WT#o%`$$jucn0B29+5O7Om
z$BecJf}Z+ARuj)dZl5hlM6eGo2FHb~f_9DDaWc7?H(0U6z_9nCF`Jbq{6q4_C<+3S
zB$BZH1KL*haqzzL_gqhQ@?MZhKRumR!NG(@m*wp>w^2-4q{dXIY!pBsMZ+Zw_hY&5
z^oxOOtpCN6s?jwF4H7}+iSdb|gq(Sog?+v8^$*0eY(rjObQ4jhM<<C68OpuE&45Z&
zY+xYgQaGW$fw;Q>L8YiD-Qf0Z1tcBV7ShqfpU5ixSd%Cq>Lo<U0RXYa5$h60(FQdr
z1vrq|MSfcvNc~DR3H3eCxbknYB=ZQLH80KU%j3vRxykRpxifS?Bqo!F1U!t_P|_+;
zA_Slqr2?!-mSaqMZ4mRWAL847)oB0KAu_ElxO=SUjUq)U8qt-7cP&_QlS#Z*lX4{i
z{0J-Jg4=@_?&TrhLSXVgflN?r7G$dl*<!+OHK8hsBOSdeqsk^wETmcOj6IiwtMr`1
zP!N$+3&{`e^04Il%>DFL{0%8&DH<*=R?;8Fb0@`wl6ar%<^6C?y2+(ud)a$U!sx*I
zC^(%-F<^87Yt}tt6BQtu>Wve)dE+KGZzXYW!zO-}Ehw6RAlk{!KEdWKw=gH3;K<&)
zBpP0)o);AFG>{0>?+hF;icJ@?NP3vagR=`*x+ew8wTE0U?}H)vAql6pvGuGSRdOM)
zS{>>}ui(2Muac1%&)tU^4rvz@6is<_D5%INvK_lyMe0ZF=cgZbbMxjM?j<B}Kg04L
zGlppYAxBhIRZwLsirtFcl8!m+BAN=SY;yvWOzgP{h+eG`y_$fM`^*v)Im^^VI%dY-
z<NCY~eAlZAD{37;RqwL$<zlS(;%5@kIQY%SEIUz>6(%co?HnDiE@0B+%{*v4fg{(F
z$;n*7`;i~AdVE_9LJkk&;)son=Waqaf{?@I&GVT)U1d_DhIVEcMNB7%sXCeuLqdqz
zK8c|p-sZKJW^&^GUOotK$k<J{csRQ|l4UC&cicgb1Gh;yzmADLuJXnDI|O(nvH5lq
zUOj(9)eiES^(G6~pMd0*jK5ox5t|dRDH<#KN8y1LSyn+%$xi%@k6&KND;ILe%}wIB
z0i{{~+WQ>Ak0AYR7GE_}cf?*4+eYeLImps|XURn&^L_&N6Yr3mn?X{1JaKpKkY;hj
zMk$sw9^Q}T?t_P<Wu|g3GlitYRLrV`B-qJLP9!-aj>OD#Qtl@ZfBzoI*)l2u0#E1O
zk&uKOE^hpesWUQ|m8B6ovp>OUyV$205rDw1vsimLnR^*K7<Tn{Rvo*K2^|6#nDMJ0
zD>75LzVbcpk9vz0Y2H-nGn?C*hW213_2L)v;U~MWr|e+4rb8E5m1xzDCdrtIX4vs%
zyc5uviF@MN@Lm~*3DA_q{lf=1(6T3OTpbq{OJ)*xVq%DiNydf+y=Y~9N=d$3e-`__
zc_e-JB?~UOQm)M|e)xVbF)_EewtfLWTzA9U1MVM~#n)fOF(p;w&Z6N&rEO)0X2b;p
zp6<7pIsXQACvGKCJ4mx_Q<%LkmTbG3<U8@i#l>;wUIzBuByJs8&2M#IqOEGjE{I5g
zi)LYWN+_><y9+IMBca=uGJX3_5_RP$9`1@k$O9f4*vuqu|B0XKzC=3|WI@1D(n`Vn
zXpHwr$+BPviue4Hbw`r8m$8EnFRy3C@rRhufqI^qYy4T2mB#hu?~*X;9Tq$cCeW({
zp}PEPuzWh#OPl!BzZ@lNmLO07P01z6IllP#RLrW1-nTe!ElT5F!Z~(~ZUob3u}g6P
z7?Er?PMp94-yj;*s){~0gwQZ|T=Kn4(*#_~4`zRM7P-k+n9=$MgPM=$5+af)A!6ph
z-0wJ_uF$+kRU{M?2{^N!l|`ykxvD>|RA%he<-G0Fgek}3S@Du5H?}WfdA*ltr`oX#
z0urDqzWDft5%6fZ7BU}1^TF~33@P7?F)OaH>+=S9MZeDagd{T368L?PnU5Qd;IOM7
zUak>@8=QTA;xbtXO#UZKIf^P{x0#Wx4vmRoGoz_0U`JCO;6y_}P!)_h_t2gPNkswD
z4)N7{9Vi(YK-IxE+PA4rxKx$S!*u-qQ41P<a}f8I1NdAwg+|rd^TBpky1W#Q0Wf$4
z5n3b=R{<cH7X7MXKJg*VdW~b>T_bJBP9S~bhqSC&hUy1gc)vsm{0yMshPN1v;n;fw
z6l=uS7i_%!b8m_uBYW56i}gpDT<$UhYll&;Tm;4X-6Awnk4vM$%&4%B5p5gLa8eSD
zx)i}v1DEg?44XC%hE*pdx(x06f5twWKOvzZgogOy@aoXx8(x%P9|<eP8F+9R_0CVE
zP5oNbtXrQJ-ye5GApMi@r(#F8S+UzJj`_A(oLVu5#>8&RM6qTes8)yP{4=XuLAF=n
zi|_jrX^_x0Xv4cMb!pYm4e+8^-KsQ8k0DM?B{3l!zp^c;<O)!k-hJHgad}8engh};
zA2b;0hYx7t?T#9=f_`;sQ=>*BI=r%oSVYw1yBv-Cm4P)v32ru+Z@0&wWtE`$jG7#t
zK8np1s?oH02_P346~*p|1khsRxRi5&$(<@tx=veOoqY{AF&&G|pN3W2(5IOZC`psD
zzJ%Y7B{8rOuVntt%xOQf>F5;_GZlxHOaMVsvEP2keYZZeE)U>CsfI1-+T=V}9)Q^v
zMCZos=vWQVSE54+3AZ~YRLe;wz1EhR<=Qau$gd1<(S!!|8#4W*h$vZkcz7BeqN~z=
zz({`BIFoKg!f88r3MaAwF@{y2zDD)1It<^mlyL)Iqe1CtKKd=5T)6;~j{wLSq-Ocx
z-ti;4dji1?>D;s<wM-_5R`J+R^lo2+u<)0db2kaQs~!;zsKvw|`VxvB&+<L#)8Q<a
zuQ^S23J_A8POY0#E%gXfryU{8WFuIg%gyvu9>&M>Fw-Fuj%YpwMb!{RFl8rkXy1O?
zz0?*xfRw_CB_nBCsw5?&yYu<lvn0FeXjP{MMZJOWzI@sC3|Eip=stNKr8W+sL8E5$
zxLTDjtJI)GXfA0<2Bh|*c*PI!uSL67-KlTN!Hkv6^kTd_@*O%<b_W{pcApe7Gps20
zwlKI^Lu%KoPxH3lvp4$+8|Pl3cU><|UWp?$H<g6kha_7SYE&po<!}kyIxwtD8p`cE
zq-4eOFwug;6-2>~4q3ax!f(&euYnJzFU65&&EQ^)9mwF+;t`L=ICj}ZtN@38;?;Hz
z-p{?4g6yh8L`4v5GjV!fLeS$?p$D&bIM20PGKw0*ec3Swstl^`v473E-+w2#Trp}E
z4{=O=`VL04X-eIiwQ1P&TTV+NVn!VMzwAj+L@l}xSxQV%ALo7wmlh9U%$0B&y*_{l
ztf;zJ?mx`M;xMFR*YrpRrw^W@f~zmpUVV!WY3I3aa>&~4-^Vj%XA048j-!b`D6#`&
zoLIMx64lF4CCJ|?qY5e-sw|U}ae<XHF7jqQA5LD5Bh{S7y|iSk`fPG@?vdhr-mZ!W
zdI1d?Mbl7Z)nSs-9GYTP)KRw22fSpu!mYb18aGL>I^QLOD(U_f=hs3XlNX5jY?f>g
z6jZz2>5HJE$_lC~qd1MIo}@80Y%a2E=jWSpf?6?seQSQm=S-+53Y7;P<jSB&kMaK2
zWZutbiqSL`?WIqc`ih38DaZ==HTslQm&ULPM~ZYsc$pn1UU_PBwvieuqj?6=;oEgA
znU&X`f}%J~M~YaS*QRcy_tYm&X%t1I?aY(J%zX0jRTKfgvVB-#>GNd&hD@S{=*W;N
ztHtQEYM~=cQBhFzO__P}Dl?xl!~By-k!57N(_Ck>Alob`s)8Wf&}0$WW(CDWip7r2
zrs6GV1v*yRtcoKnPm!@Z=gQ%`qM!%@f~ZI5l7l5D8I$u@_wEX)Zbm%(fE6Q|95|of
z8x_Y*4{F%~Y<)N&-#d~xDtl4B_86ug8%z28uRoHGn_m#_$vNbv10kSj0(uvRe}w8{
z#LKrUi|;O??V}&%aB7JKMUk;<fS@3&8X9KODZ!xi7Z`M58f`n5C$;Zcc8t+E!{<S8
z)gh{P$aD8LWoMI^>_HJ<hbBu_WT(@mf~;w1s)<aO)_lG10$-EG!d7DmUp<}{J|2iD
zD2fZ=t;TW6G>$v_cd~xrS=ufdNl7#`RYq3J(SQCf-kGnk;f*gazx@&&8&<>}1w~Pv
zW*#FtLBimgr!>(a2^MULv7`clq?3~QkaVLrA+`g&`SvmDf3k(muSK$`V`uJRbB0x>
zlaQ=Hl!h($5~q%N6Ez~w)a00lgp>#5x`hxF?#_XEKk)0e8RR4+k#%7rMH|<rOndzk
zktJwmQsOqV=V(VhTw`#Aj%pz^8nT#}A&Z^QrL$)3LJno7ku3wdyIf7EL{yX!F}Mv2
zuf~FABYFK0+U=;vYG23}?AQ};lLCa0Nm|AOQpK`Jh)7}%N$Doc8XzQd;t=Q}HMHVA
zSb3|*qjjBqZ!POG5}4AV8Md4Zl2TmJ##N!Sk2e-uGD#M|C54;!isD<lKGoY^=A_N!
zkeO>IIpSJ{?vdH-R7}i&wKX#=StO^b+#5NWYHL5G@z5p23|;bAR&&?W^X=m_{(LK2
zdquFYLnrQQHXNCtGDt{KAX0}l_aY~cgb?{j6yBA#5T62sBycmqj5VS(kpP_Jx8J=e
z_i7!A1v&SxpzbWW(*5!K<ScIPn8BdsElAJYM)vN-{4nzbvH-dJzGKvhAo_haf&Ntm
zpcs|wx^tCWEGiIxk|Tx+bck^Jf;sorjQdx(?-EF`8(2>*;frl4)ET~w&l?*66;USw
zhgrQogc`%E6XXY|`PB#-f|QNbl*06G&9Rv>NlMa@^T}$4wy8jH)HNRD0It_Ko9>BE
zR5(5;<hM`@VjehC$-Z}icwH!ULZUEKGZC8tgeMYvCzGraEhx!f>|jy|OkNCWfYGBY
z`pj6&Irot*W)yoCcAE{!7>?1q2s(Ek=iv;3TL?bE^`9TN|D0Izrw{3Z&urz<_kzH)
z{u7$^OxvOa8g|U835ywURi178x$*5P&%+K5VDr5G3C_F;Prl=yp1fU=Wdv(J&6wSa
zrfF!J9ZeC@WCbrtX2ESMu67F_g+CpeqhJ+sv8tL=#caon3A^e9CRi~mIhgRKT74f@
zP5GU93#-xDe+#p>RiOS?Z7C`*rQ1hGY58Rp&K};%1-FtktQ(2vBL@r-N%Eyc^%4Y5
zp3SJy<r&e$K&neI$`!rF!cPv;Y{YunEnCctxqf{5c_o4ZGdQz%Gn+iy(Y{<&nng@v
z^qce1y&OU=o)oWD620DzS+h8Oh%{uugjoQiC5Q7T4-#*$#|JNWVUd3>ifX}v37aP3
z5?zTVMQ1YqtG(!}-{JJ8gWPfbm@iz+9JE@nXg24(YuGVi)$&Y{8VFYWE0@4k07X?F
zYoHVrBn6$9k$^Jcjy+saou(QURdM*3c$W!7=jnn9Xo`R!nu$GnfOGfubHyHuvT+y1
zE0?2T)exd1eDFT~9UsoE#h{=~tUPj@geI>cW$VyYuyZr+2>bSIW!0g0%D&}zkCm(J
zShJd1$!;W{S;uw%&lwh-!o}_TiNlZdGpm_@{vM6TOs8M#5c<704oF~H&AvSR;0r!#
zUj#k3F>4N)5Co93AF_Me49<32LUSExPSC35%K;)uzO;G28b5rqoF#L7=q|5ieqseC
zl!V)RcMzX#!7j(Jan>nX&HauD^dv?E6L#@C2G6R;u<)I%+;@l@Wm=*`LUen`*`pg-
z|63UKlohPK*M~v%!|{+bhl8^7y>6jBnSG}xVCC|<X-xhymI0H7QuoFJ4xXRQyh)V_
zEOwN+7hUNxunw<%aE7TL&*wMc0md^2(T(_ohHedLcDXHIBa?7?F`stb&da}lN^PFn
zFC+;mM|AK$_6U3TY-ZJ=J5+c_L_oo!U17(stErXfO5*8tT=DvfWnD|K`>Ks8V`fmc
zeg^wIe5u!~0iHne^69L^i(&Oj5#X@CKb2QSKvEr=zTBt;_8(YJ%x~*CmK;sz>pK}Y
zb`hD8?^4OWj}2>5@vq#0y1g6o@x-O9(Pt8HWgqH?L#bo1ar@97u4D?>((kc;-Wv2H
zx6>eJKi_=z4X1Q(@uT};Hmpg(Gol)`t4Cp4Foji~;Y_Mg3?FCTL}aX(u*w2%ew~;W
z(}`)=xVdvS;|HGM&AA`YG<6@x_HX3p35#(LKFQ_U<rvYR3~&__xmZ;dL6o_BVmB9(
zY{*tK+kc!*)_ZH|RV9+&Ym1EebQ+bL+t{hOP_1ucy#IP!f;4vQ*s+Bso&PW}(KPg~
zL3jn%$K9t2qTUBp1<|bxq0!w4FZU|`MVjIh+7RE+hIj^4MepM8H1+&5Y*C6elcXCW
zWx6$@gkJlvu03Zmnb0&1olf^mj*`4+oTqE$2!ep3C>ZoQa_u5Uoq&s8e9GP`kd?R<
zFgk#VY{qWM#gdbTh=7Z$h$w1Ef=Z&<8!t75@<mIb^N4i%xQK{iE)ULT5#FW=WdjUg
z&m!@vN~vy5h;&i0q^FUU?oF9?wJ1}eA;J1<EFC|VxtnunK5;lh+C`DLdLDbT5;(v6
zDEoG7XV2YG+IOss@1xLa4NcSGRirYNDr@ZgW)e$x>}1CS6FC>I;a00E^?G)tZM}Oe
z-*ShriXCWN`5fz)tY)L7GH*3)O1++?xjbzOKW*R1juY3(DA9nf;UdYI{#0yNjbOn}
zMr;aVu^KduOkmoCiOl$U0lRKB;j?isQ{GqR{^@Lrwr@s-kZ7v4E5?pbKVt6Ii<pYH
z<Lmh^5rm11gcM|#5>#$l4u7nqUQfZbY;`JC2*q7fQB)7gwyr~Qy;Q)u6Y&fwL8S&2
z@qGq3YiOE*h=w&O73_;%RnZWU#58t&J(zD+#bPMu$Gro)IcqCR=VsCP7cEP0&_jOs
zYz!ydB56>y2knc75Z<gQEyZ(eSulfH*COfAD1xdjn^7i6Bk7D6Wuq_h?ex`L%<$&J
zU&m2B@gQ?X4dJ`h+t{BF!mA^H;<I)kj;JP0L=>}mc;x}cay2PmDiBv8mj`FFDbltH
zW&QQY*1McPcAKiN52bz)vA_$ArfIkoZ$V4(7OQ`n!gqW98N23dUN4!&>H!}!ed9Lv
zAHPk7aR>Oiu@OZT@eD3a(Guy*`0P`T2_e+3)0@s=p+q)_z#gk3!atL}2Ujw0*#+9p
zn!+2^!*M}<Y7OKi6|<3>_JGthA4;{YNoZhIngmFkSU8$dYoYJVFBsaaD8_&WG<xtW
z-_Kjf9<QP7`l1bPdd;yviZYh$hdjJvB)WZlit3))cQg<^%TP-=!?uMpn0-Bpj*TLy
z(xNG)gEW%QdQv*-B2%WX;&PTRLza)FhPxNhVIi1S4P(fDZ+gA;B_o;z017uw9>N~c
zgf7i%6X^P!gl>8x9^oYjK0Jv}S6nAMq!I7*j6l^%B%a>Kjk}lGx^64mHm@VWy)un^
zyiV8jP0W}*hu;nFv;E6X__-vp`OAS!T)u;Sr(y{1zMNkNmnZes1&-`JKtkFLHvhJT
zZCln8E0v*s^Gc+j+>2bM9bFq$!PiA~M#JTB|BQ*^9h*|h(+O5YJLZfBBtP_^RQo!F
zdz7H2mz9ePM)2vCYD^gM5nU^|0w$6!rr}qwA(bNp4ow-%_{Ce;b?_u=vjyz@q8=h1
zL=-K7_UnfX*`=plpRf3$P4M5LrB(%5mhFX_lNWcwKa=qhoEZYue|X;=s%K4mQU&<m
z2oh6LQczVDqtW<8cHBGwQcw{;Q53P+Y<Rf2kZ983X%z5rlb+hV1nyt@7`rVO)fv7h
z%VyFOW6=}|e}5yA&T*M{7tIJR#qlcr37-CC9a$F1uj0?U9p?W#FT14EjHZc*qL}X%
z;fNp-1nJo#gau{EeUv4#Af=p&APA0j6vYt+>TFX{lxH%LIx8+b?wjIBIwc5sT8ey;
zSBir2^f;er?{OQV=oqi6DyV8+U8fgW<gwsHUQcG#d{QH*s)CbOPiy`P%9flrjwhM-
zWJb-rf|z;Ze4b4FD^upvg*Ef$MJQO)`rPpqlzr3@zWs-LU4B`8G?)3?)zGx3`uKF_
zS3z>Np+0BdDWG`hAM*aG46T}mraI-(*^a8J|H2vm&n9~-KsKI`{U_&Ndm`&=!EHR*
zx2NUePw-t;Q8g6}$;r2ZdFAM5LA?4~GQY}&z@(7==e1Wa5}0Hs9UwRD0_L0qEZKK4
z=O$yZ8u9Y0L||BP1f7c`uZgI~)hiMYzsg8@&%z4Bg;Yp|R7lSOCWU~ckP7Ml9roZ8
z+63>A#+b7c$w|M4Ip;otp&0(5m2vm*EKoC12ucd6kP4}go==6q<VBGnKE8z)kbL8*
zdQQ(N-d9Nfbh77ON0k%N0lt1-_y-0cs5Y#YljLOEP*oWa(7A?V@GOZSxdB=s;|i&e
z3aO9^fyrM9N+dK}BC_Qgs*(ko4v-K93E6H&RTM|4tfnIByfAo|N9Pg>np()a|1y$u
z_aW*fG>TwO--6X-K@<J)3ywllEeN85s%cm<Zh@e~#kT^53X?)Aq(UmB=Tl)c&Wpe$
z0w~t2Xz~ek26t3B7IVf{lJ9Lrlu|IbW}`D^qBmxtX>sHx9eCDxv5@{7W*SX1qjM{Q
z-lGWaVISZc*q-dH6tYZu+yctt7E}?>po)MQyE&1<SuUhPDx^aCV=B~`ydct43xeJU
z(bWYP*ABS&i{xINLsDWIp%E2vb#X`2RP3g7Om{9K2!#s%|4x$7G#O2aLo!sr#l0-D
zc@c?m7cfdD+<c3os4|M(f@u6dtPy(@g`=P-{{{VfCSv7}B1If>@NC4y<D1H(w*Fru
z9i07pZj_v}FyUk1`@9IB0{ZmmC(eEq^u6}{)Z~IBIkOt8D2nhXvg%oW6%;k}@7<%H
zj9z-)96D!AQJ&A|{QUYC<16Uq>EPW{5kAlGzF@g`@GE~uojGYl@rn9QkNPD#3avVt
zQ3}o}l7Bwcr_~P6iHItY|M{bQ)W0nvvruF5B3Y}6Xi6%mu}JzNNTQyM<h!KaIfrb`
zMzLn0$hoMhy^vl1wFuO)m>mhP;?Xom{u5QUVav@xkxj_fOcccm|26uOyuxY!spcf4
zhiiGKP9K(BxBcUQr6ft%Pkc|4&L6Wq*;&BNmdL3&eF-iSNmN7xT}Dplviv-rNJ!Ep
z=63&(RabJISx6t9+DKX^XIH#WU{n*{|LOcQ2k5^z1(7s6iQ6X9w8uD(n)0d@KXo9d
zA7*_2mV_6NCL$t|;lEuZOLO#VPWKO4b<Om+UxJ84E_e5RN7u>~C|@d)B2~IFVpS}n
zn97c+187vH4CP7|C#>N}Hrz-@kfZ`q_lroXncM5WpxLXFIc<~B>2kQZW+vZ!w3Mqt
zett<vQZ8HHdx`obBZw&T3af7Cf*}4I^OVH4v7a&hr=ui_c|{l>^FX*hhkDg2Qnq3Z
znhxDShE#9`Y9tBCeu-}fH^sZk09Ia1DR_L(`>idW^^*qCZPZHQL>;=ULyUX71w~3k
z6B!Z3h;^69)|_&5bsnuc4q;84f*=S;f|Z9yX3(=*B`TDTqF9v<3|@EvbUJigVaBM=
z6b}m~wBArwIr}9gZ{+3H)hN|<23IWdv)hO$A!#WboZlCps5Xq<9!J9Q8T73lN>EsF
z2K>CAWKBYnG!B2+iTagFQMyu1emH00$$|`y%Hp^8FJj_bGdZjM2ls$NjmbZa^k_;l
zU_+5*&{XW^OcYx#nr26_W&c0AmgMCp_=ny=|F7VZe3PeXplTKr#SWs3qFRuxnW%OX
ziroaF_+J1`BqZqyv)fO{@Yy(Ctr>*znWS3(Hj~i2Yct@RV)%#tleQcYNqWH2H(K+R
zP>RTXDa2VEXwzah;!?gVOP0QkU+O_-Oxw)xiM3esc|ANR=+>Ifm4inJ%8>K%N<b2A
zJUF?CS)cBr&FBq$)HVc-Kd&7X1hCrfv3}7~?j9>kg8f;1D*+j~{<P>dgj&6W2)s6f
z9wTN@EMhW)t7UWbz!8F<>K9l^y&X$zdNqcvA3#KgNMPw=z$MP^O~9j8ABKKV9}lY^
z6~Y|aUG15^X_!s1tp9m2cds{a)T1%Vq~5*6nbQF@(jNC!k|1GSUuI;7)AyStRE(R;
zE2CFXZvLB;bJzVzhFG|J;UpKVRp|KmKHva<nY$U-VG*T9Ordv_5o2I!+zKo}Cn1r|
zp|6Is^Lz<Lef2TTqdd|6RIxfo4V%>XGi>{533tjCAq%jX{b}{;Q0lxMNZ{2ObpL1;
zr7C`m|ExZY%?>1JR|0pkRcD87WZa46#{KdP+B}ew83KOMB@swr^N4TQbTyKX7mc8_
zt0$$3`y+6N#jg$|IeIML^lm{BgY*=yL?ppV{NCBjn|y|z<2N%n<R)kDdQxlRCO&#N
zpWfqtVpeno#)Tc?Lix8C*}xB<;}hxj>NKif7)f10d{p%v6ta@8bLMCoHPydQbx{aR
zUf6-<*nS*SjRTk{j*qI^k!@L^*io!ms88Op{^a3to^KmY#rykd^r`BDuFw$l_sp|X
z*Qu%ss8%$^jH1X$k`>i%LN;fh*h~mWnA0!d>Rkc7Yf!!@tb%SO3L1}Za1NEKR)G55
zkzftMQ4;=%779eG0)mw9_p0;c5S>+$1!oy|R1(fz#Y0vQCBY%U`ERIykRVD`9qM04
zvbB6FV`DhgnuI?F(ofuYpO=*Dahs2mOgRDhb5z=bAR!9RGnY8b41$)Yx>r$EUs`>-
zm{Q6`7O(roQG#AmkzBnfRl6OP3_74B-Or}6<@OCysE3E(REa;H20+AsD+Zl}B#BRG
zM9jGYvRISX-!4m(vpAn1=GT1WsoI_W%f~lOmNB3DiKRYmXs+EuE8w6|6$O`|XljI(
zMz0g0@d#f2{#%r+Ok^aCxMGlWPxedG&@>N1{YufcT0O!Zfh8H$7D9!xjc8N50d7ti
zSD#6XDj?cTWS&{fD&O|B(6UjTeUmf;M#1Rd<s<pFb9{X!l{*fiWA}yx=f)BG+igsC
z1<*SV{U<UN7i2~d&|$<V864vf99jT?Gjj)Us^bg}ywwJS^q4OiI877z*N2UJ@m@q#
zYr-oXBM8J<VDGt?KWCp1AnOL_Zye;5Zz~$2Vg(FAC8-fu#>smZUjFVo%!xK?4*Q8;
z#7q3N=0|k-=S_1b*t-U8tJkNP^Q-J5Kd?G6osJ{s^L|rTr`!XWh`kj~vrn4Swm}J8
z6b1E(wdnXycBY8rUYpl@6(PXpL+z5)spsK^JD$Aq)BD7oyvW1%TJu^7Jsx^JQj5WK
z`1Tu4-yTlAXc0}wYg0le8Zin6{?2--g{GVrK|<b5T0_$`RN0QE<s!>AG{uG{+mNkU
z4i&#G7ZfvD4-X@V&)1uYVxD?EZ$q<_d?S{0SwqT`AVGTkj3hdXrU?l7z83}I$+q$z
zAW!^0?|J8eCg%J8zvAZq*N`Jasf;SykZn2GEO#7*8f7br&5Ufxz-CED6cx<rC$MD4
z<U4pIB<VC0s=dljzyC;wBB6vumFK%7W=>3~gJf_eyk<MTJE=MO{(#M2^`y9HL@x=n
z`fM$CMIFMyu{0<jf|pMap<w}p3|xy<e(E3*BqS-5b4x#<lpr7oHF<B&VGgeUfS3D?
zVpp<+?%^uByx*OAMOrcU{!zxYDNXnXYq2UC<|{L4=HrcrR|#siUBE+0;>PbY_^R=1
zyg#f9f*=s}(iiN#C!*7doSf2~>S1oU7$kcC9EVvv$+$`{@$*$1lAw@rdMXV(Jn`^!
zr*z|&So=VSPM5*K*%O)EwJ)#sZHXudlzV43=Tk(djEhK8BER(cjO|$_)F;50fF!Bh
zJHCxMBW82$8FPu#lrVfEt4>@a$EoJmGy}n<s#3L>4@y38FA4(2ytMasPOvLE7HgyW
zlmHMfGoyDS!i*xK*o}FYQvp4KphtISDV@SX2r6Ed_ckYDj$OjArXR92<`-VA-Hjhk
z3P?JM_zh!eU(Au=v-u~#am(a5WOt8jNU0ESe0;naxIPoJ?H(I`$e{0_s%TcF!0U$w
z=yejhynW!{V%C(8q+)0=I#g6ahjeGLvtMNx@Ovf*dW>!<oIXF8B5p-#{`Oq10pNmH
z$T?<?Ziu_C9D{#3N2Vz9RPtB^QNxsThb{AR={KYbidlZ#AIX&f!yPt^eVYhDAmWW_
zoXFDC?V}d#8oi8-u?Lyj<};#t_Mo)8E21Evnl3ZBu@|oHo<!AZ%c5J)F(XJG1PQ14
zrh9Wj1%X<h?<a#ZY?vKPhkz}V2oEB>WJSI|2cje(NfH^Ce`P>f0YNa*aNs~Dj+w&r
zrE8co?M+(royD0%@$nv-e-oEunBK}CPcLsuRBFV6ILN#jL(Fj_FZV5jHOKCl4=Eq-
z4=iR)#YidyhEcR=87hSbJf-0h(YvH^>Bev(Jc`ip)mg*>mkuQnk|46<r_P9iK)Z3<
zNf*;t+NC!?#vfx`hjO%?d>oT3V81n&R{nl?d6%G8`)M4AUBc)dV_ABBK0O-0$-)~R
zczJl?fHz4bg;b$JsZe~~-SE~)4j`SBN@}_0)DM#o1evrGlc}vY5?;R<;}6ROx=DZQ
zRkskBys(?Jf~v@<iVejsV>jPHl})IM4OOwCSTeC&Gmvdrh(Z>biTj^PUH^DPl{h`~
zb!r9c5e13fOPBI#t+!c_bcoMeMp0zwCIn<MPJBZhR}b7hT#2mHkze8^bW#RK=S^f#
z<+@a<)|vMf#d7`7$FwOe;;NSry8XcQWV-`|++9rP@L+<9gwt`-G(Il(2J3PpBq^OU
z3*RML5D<ily!yp%GX5<)`TsI7k)0sKhTW2ZIr9RVs-em@6nidqO9uAb1SGFkh#vLO
z<m_j(BRNT1`0(pwMjbrL?%`z_(YY#fiZ90+caU#t2uvTnj7;G4v|-Hu-IWQKt=JRS
zQFiAn#!o#+Vx7<UeeXr$@BK_?Yiqt5(g3|)a%fjX5mA(o#9Xd#`<Wl7*qM;1p`H1V
z64o=^tk91R*&4SFFJtltXJ}CGW7geUL7$MC4EpH+r^dHKu<c}Qo2_)-7svhc>-eVg
zRVM6xfRFAb3lE$kv;Gfg@hhlv>o~L4U4*n1jEb$ypyg+HkZ_ObFGb)%4ypGZl4V!P
zN!`Gw9i~xxbs{No$C%pMg&(?q$p!rIww_|rj_VY8Z5itI9|_*Ig`f9c#Dst(3V=#>
zVj5;ASQnny%0yJFnatEIhc+cYaB%``b7}@THu>>aXef&E)Qwp{l0=d({=(bE1%$@a
zP+Co7(OV^f`>gCUfop+pvmsH%y15KHcVFh7UBPHL!x!JDG3MBD_Rr|VxpzKfhyQC#
zSo0a(ioDG9b!!=16K<^;#<2P4X|ebL*(vu~@o`5=dC2Veum)e{zQVEt*SLP|Dqpqq
zL^&{<Ps7^M(*tZ;zB4XQdnSs`i-*X$x&5f;Eg*~*`ELART9kHksKuo-eEEHbvtOM#
z|NeWdPxqlhx2arB&EWpQZz+3m7H_}5i8Lzm-i&SB$uM(gb#wL(`j}~ZVzG#h3yDLX
z1O(Yi*1?|{SF}AZyQx^T$4Yn)w}-6Rv5&Z-1Bo&1qWi7&%$&BDoJu1Z)8aJasyAZz
zp)xe?Rs;_t*i9Fi@k$#G_t?*a_!}JBxRf5nG&D8;7y%4;dER8o)MJ!*|0m+^Ehc=y
z1m+yNL7Lf}eQIq^oIK9vf#n(3V*-~D$-KCXu|vK@{4x$xT0Fmvo5UyM`|(!y4!rvM
z4=kVd0aXK3XL*G@&58ipZRWhxgdJ_R5O?buM|b~DKkpcJpV-OTh_-Zgv0+jlYw^y`
z?n_;70bz`e>Ej2}tdtiHrRWn?Nl`R6O0@Z!iz#U&9Qu)Z2@B{qVm|l$Tse3*fcB#n
zqF(%g+(mPkupxz)*3YDGcwGj~-pAqrH82Q!7}IP$ZMI)0{`^L!c8O>4<;HxoWCUGH
z_GR{(MZ8f)K~o(o;>cH@kyJF2+V#s~L_tvnBr%z#AB-UM{r*&Rhs^tH__Xs(8gI$r
z#<EFNk6X@4(G~YXVDi6d%25?Nifl!Z?U*vpBipi36+5bIMYd!hTQX2o5q-!IRD0I*
ztTqt4jIq~>^Xk%TDApY2zucP%C#KUous)xxImgwnTVqOJ&&YN&Xu36r+|=tVdNqu>
z-9~T{Kin**Ig}p2J3p^xPQOS>*8ZFoN76~P?P27F4XikDA2TNyRsSPGr<~)~h0_eq
zTEVO|D|#c`*)gB#lk9w*qM=<JLq+!!EIMl8Z}W`$Cjk>hMzLFw?Pg?KF0w5LRguvY
zD~fDJwq>H&GSO5KK`<6jlS4tVSLEZb-=kJUaf){9!E5#?8nuW*7gm;PZR$|}{yA=v
zM*K}rT*|efSy>>U3-9y-Nxngn$$(!_AeX-#hW@)Tyi`00<=T(5^7F;hGn8_5z9$9=
z`QcSIU7XJw<pK$;{~DuyK0tCtWnQ1tkX>Wn;OBtKbm?4+U_5b^^mzIQ6XN3nao0GM
zu#?fvOA=YNA#Eq@;O@iwD2gAoE4AgVF2$f&V>(v$#`oF{()=n?|KeOG{d|CXsy}}2
zqC@qMgoKLiRvcH=o^)&HhKqki>bL7e>xw%#lLB^o0Bss{q-Tp@DAk6Zkt*EIM6(`Y
zMEx=ZxR+$;-k*6rq9{Q@p^Q1;aM(-OIhsnM8|6Co;mZ}{sIC{N(0v5^G9@JGD)ag^
zB3Sg}wG}fM(!K$~dVyXGZjmiZ1zZR;6h+0aY!808W<@*t8KFx@&}7I?hi``Y21};(
zqj_{7q20b_&7O-WiWOC^$jGnXqeijfL^b+=ciZgdOpGi3AzrxY-0=+oxXz)inHWP~
z;iaY_c=(49;Nt?e9jshihW0&MQ?XPi!NFm8yTq|*>RE=p+XPFt2?Z6K9UzqxbKfFT
z6cNRWygp$M=|I&tXRsqlMVnik2`%1Z!r}W4uqIbv<TnEz_3NEhyEu6jFnZwY>rF`Y
zmh|Y+kP??qaTCya`{D2HLeXv?@J6IU){QK*tep&~5=nrUC;kD0*qnWxUuIrp_<*M5
zWac7k3U-@Ao=rL4G;Gj|_ui_4=-QmOUh^a<=mOJTZ_3V+W7!^~p&h8j_?p95o05z5
z=3X`(?aJUmRq^o;AtX2uPh%3t=DtOQC?blLczwcQR9vuTg!1aZ{`6=bfib)fAH8;)
z`-xeYEh?>Bv?Z))1f^aXz@V_XY&;|L@XQ6SrS<0hmx|-+8%&^&I|3efxVz!u;g7#J
z2<iboX<Cs$Hv=w)KKz<wLXO|X`u!akIHVT-fuV#3dh;;mG-r0E@!lJCNKef{Ru$~B
zW6Tx%&17eiiZ;6_<C?$6*GJ>ANd>FZMS};ve!hfMX-wBwTT=4sDK6gCs9d2uwJU~0
zh4=ZmeJn|5u8>L)-bMqS{=xWrNeFS*IQnoOV_TJ>WR?1~{9-%zQnLvN@x|TXfnOkq
zIsrk1gf;zn_qZ=jUhYLre^3;Mx$NNBdJOaYf(e}hF{m<@JNJpLI+|fE^|(h=r`1cn
zXquCY>2KUu3w=ypj3vimmz8a3k_FjjL6vQ&iVaOsQ57AsEgMa-fT$sg`adq}SE3?K
z?|#MXS#DG)Hh_kau7C>$LBinXj=Mp?bny<iq*v+J1fUp|T6Cn-weg&P2vwC}DwZiq
zt*S-`)`?k1|Nft|{%iu8DU=~@Mx=XJxKQ>JCUx?|(?g(o|AF+JvjN#6V@bNjt{V$k
zSLS!#%}po0R8J<?$pu{g&(F1@$jEjJvd!%L*NUnsh>8tO7Ex@V+H<igHf*X&fnI)^
zgu$Q#O+^z#43F&c4!;sf(@+6HP@hP`Co7WUw(JJ%|D3)VpR=P=6y636rSt%{CBN$w
zNF6#7Ihx}|g&JQo{p2Xhqd6T11-NBJ)aj5k&Dp%OnrU7kF+|*b`mrWu4sD&bc0tJE
z)Dj!gBVP$ey&=(_LlPDE>QDlo?faa1m5um~yv&+m`o{o3&=7bW%BiUus-{OLIVuF}
z@@eBl0R-7Zy0H~g4qau6n82J?UlX)qA{~4@5K&PSSHfG4=YskLF?%-g>yjI^T{Mcy
zvWzS!C`wuS|8#)&7G?758{^6B`x@PwRKZ(O&`=!qbxA}(M3f$DS|ptjH$C85j%pPH
zxppyz1WJ&d9L<~GP36lEo8YfG{d9yQ*c2Hz(b0FS9LMcz28;&KavUaIO?3=N6dmEA
zc@BqSo(4p4B;(85L<HduF&8edxIqM8sTQ&_HI8=rh_GE#Y4+Yv-0DC7@t&h<XfEz}
z0F-M)Ywz{s+|I&W-w|GmsC(S6>jn%)$Gy}sCkl4E9o6{^j|wnav8f<x7IM5=GW*O;
zW;%x}o3^s)#7S1vD9RYcOlFqAxgO&vxpORTk_v+0^cB)bh%;dcjpN#hs?>csilV+i
z!*>{7u`daC?P!9CD9DerTml-Z8bHl=ej?`47<Gu;#fAz(o}W}Ux39@4RSoD3b}V_;
zBuxaVDpAE1)C&RvvQyUbLS>!vk>}8>YsmOr=NSLUOeLYlI1ApX&dVV(ikiUbjZ2ss
zyaByAn{2ZO$s@}$`@3F5ySSqVDBp<I-W$liosFd~xF8}RAUe(Hil*f&?5be5+fYRV
zMja@~$QmG6Fk4GgtcXAE$SA7gJaMc|0T=h)tavz=j(Wkl7PC43>!y4%CSp1KJ^i*B
z>Hq1^yj|NDO>>z1;}^Y3@3gU;o7RgUPaUYvC?Cbie>7A@LHV0)^@SRf7j=`?RAjpq
z*=llpEG9=7sbY29rfs<>b`!E}A;a!0)mre$he9Pr{C=J5pSv@qbpZ9hI7AwHL{UK0
zNr;jJl7OIPW6k@S&59}41s9j6npSu6{%hMQ^Y#Yh+$@%MD~GROL6LL_=5$PU#|EwB
zWRfF*AShVOUX-sff#b<3q?r`7b1V6%f$!f@4*Q=s&$9i=Iks7x4xl#2JloB9h%(D#
z&1_Dv;Gugus6s;#<i`gRDhkS@Inz*36dN}DC{@vl?b;T$oU&n!`-QoyA}A8oh%$zK
z40-(u{aZ$2$xa~VZn{J5@2nOqpaI^5R`9`aXBjh=UnlK;EI00@k*gl#yTONP@x^l9
zPC3QO)kn$119vwIsrO>Im6(edS(?i3>zFd}5clug=2q-IQdJw0_;g=o6ajQ9q$S+u
zZt0;c7}X7fmW0)2MG+JfL=4f<R5Y$-^_pZ-?;K~(?*};j@Lk&b+AvvUlt&RD8Y+sj
zI%=NnMTcjwFYcn~9NUvu0=<hH-u_+~9vyOzEFXY~o4+p}E)M5Ohjm9L>%nbeZYPkg
zX7V8R9uJapk(FGM;;(ZfE`ikJd)WOzL+jX>aEef+!aWYGUc=Tyw@HYP;l}+OryI|C
zHg7)6%^TObx@RK?QwGtcyn@B9IQXOhl%jqIKkWB^VabLV67SsPPI4~j+t9n$EjBLQ
z$cZzzh>f{LVonpjPfQ{`Es2|_X7jp#Yrfevm1eFE2jaZ>6(s>%RwDOeZgBHXA{m>0
zV|~f`RI3$+D=LccWWNrl4x&?aJLz#ZxP3Q~a~qd3YtwGT*Sb-a9PY<lCq6NYJ>Pu9
z&&D9CHY`aXdH!mSy3u;K4$R3+Co}CKm-kGicUWg8Z5>M$GO<Z1T)n=J-TP8d?yX||
z!BP}2+nV}ycC&laDb8F?A@Sr=e!pIclEn=eOE;%equ=>%!eQ>;iQ#tqJu>YMXUs=3
z?3{apYaB<8?&rjrWU{X=V9nVM)UWjly+@`pWA<WhT)oVNC9|26QlE<cM#5`Vp={tU
zOq+j|l!O@K9%MR@hM=J2+ZZ3eM*vMjjBG{smRp!MVLx}{ZV?mr5ckR-vQ<+tr^d5+
z{0F?=>_aAf*Nf=vhuq2I{l?!|U#bB$Y6qiBy-$4nUDDJn660csdzg)^T1dTfgWGrR
zb7A`$X02RJc9%~W_Hr>EXzN+L;u@Tq&ky@F<dC9xV@K8=?+-#mS*rPL;M<7@xEp_)
zTd{XZw&$%yr~T&cY6eZ*jeA6Ux|T8#bNxE^O#<v4Nu%jrjC-{*mb5$Ex)npRMZ&ds
zQA(a4&-e`)Bwsng=G80N@9u)j-{@pgs4;nAS7{a5W=6n--D*Oy+fWsU--)KmsIr2f
z*-5v{Og@{-^zi3sOauwZmQHNkUDDlqFmdP!CfGB{RlV`_$l>mlvz!aBM!Bf6)bgFq
z@}F){y!Ks={<??rnS&YXW8<t<#-4X;NXa2BQUFr|x38V%w}S~3eMLhHtwOWZfsCKi
zhH))KF0WX|9$j%>Hy8=86of~@V!oc$oUfW0NK!m0TC^Bp-nxHL3jKedWZ4E*Gj^*P
z#cn~Ctq7V1nvAOI5H&~iii<fJy*&f<8P6P7f}<kvb#sIP3X&ILC5z*&a~!lrk08P$
zRRj&nzxy5UW)5da0}tL;qUbm0Cx&#7<nE$RI2(A7U;7_nnrcI<I)=UL-lwEqd<=F}
z7fLkwkZ)$?(5H6|O1cWzYxm%#kaS$iSEong9yE!(L8H&sQnC4Dx{dMYwJ$sJ%jpHg
zPVK~meP8o(gC11*LBZx-iVhQh<omFq6e*F7oAc1{3MopMYZ1bdb~EIyA*?(Wi=e#3
z{PWcaFx((Gssw&U2@n5He7WTTJsX!KQuCs0<9C^}u@}CiqYDTpyl8+^7iYk?NO3{}
zJRG-CO+`_Id2Q)<2Vj2!acd}wNRc{ic(1NAVb#+nGsT^DQ%5_Zaufv>5lKvC{jfHC
zcF>GIRL`N8o3pv+x2zgz;QKC}nU~;>mJ>nukyDuec3IG%&CEsId3PY6wX2RvvXRwh
z8rK(8BCK>TTG-~(yxA#q9>EM-dzSK;h;t33NK_Uc&gqEiJf2VQjbi9a75P%I&}8_p
z%pBF7reAO3osKW@cB`++6g7IyzrmFDzUXx-g5*v}bP?Q?XKlTr0Jk@O!-r$$a>8uH
zn$eu;hi1^Vv=^WwsN~Bux6F0+D}<51pP^#H4nFPCh1s`V(7Y@2`ls9Y@$Hht{Prn>
zKl+w~={l?>`ti%sujpRE=TU^q6aEs4!{Jykco7;Ij;jplG>rZYXj^(0r)IXn^|#Zs
z`0N*kHfuw4n-Eev51@Db;pC$6#<DB4^m4}_mEoNQi-;-Hg>v631edDE=p~zYBO0EZ
zL=E>M-RQ{$z8~C>ekbF2Wx*NR7jeOR_+fs0vkonqO~ECoJxh*_q^znzxt@&tJdMH4
zt5Za;P_fge%>897Va19PCV4vm?6WFN5K7Q*(Mn=Uzf6@`Hhha!VC1rWyi?XOcB4-q
zA>jdd0x=uDX27TOIB7Ow&1}IBhkvA7v<K@4G-UY3`^dp=?C;;2waq55d0G?;Uv9;;
zn+EVKL)YQkSkx~J7{HHjr!wTjatJZy7_?*|qdS%WuHYXTf#7Lycu`4B`Rc$_dewiG
z8nb0=UL|P$<y__!4<|gr1wY{a<rs3}4s!V1d1}v;F=eFE`nwIZjlDw&>wZS}*yzxE
ziV|-uy3NF<of$pv7!`UKV@K7>G-@`S;g_@dJCl(MvMk#R0m^@tBuOIe?kdcgClPdh
z*e%(pvW@hI*D>W<@bhxT)!lKE%~U*Dklc+?Q6~wlKIvI4gd`y)?&PCEpYrpb>j+90
zrtkZf-jxHn_H!HhOu0lxr=Pg-O-r(47V}!;PdK4?Qo6xg%=+yUDv`nQpJ%iAbTF^{
z*pG6+&80&b^5uLE7kh&@LUO4xbR0cv6vy-GENZ;;9qFo`+5_Ih_v@oHy}gniZaG}u
zG>Nx+|45usBdcT=zMk|ggX{bK<FzK5rje48f~u+*jYg!W{9*(_K-08mN&<+Yh|Olh
z!_9?6lMYX#fRCHRlTnib_b-h^RW%g59aT}VTXRWIjzdr+{QX^!^p2=pqhLjog77W-
z37!EJQI)5|h4b>!<o`Q=7Dfd{b2=a9I~-J1MG&NCOBxguPFqm6&%BmY_3@2SQ9u+Q
znKTqdc{Z!2Q_1(JZ;I%Q@Nxvd3*^&gD9-Gd`N#Q0dryZ8YtCpV2}$~cOrQUm)%vWf
zl!n7+@u>l8`7@(FrLA$Y=vn_E#Tml<L?+F=dCfnM|0*-5qn`z5etkO3n0(nxrRVhP
zsqZxnRnZ({6ANnR4-S!h<9nR>^+^z;=7pC(!MA6}_gEeZ3KxEwKY0L2D_|b;+AfIK
zd2RhGxq4oo^4iSb))S6rC|dqd<0raRfLu8=iQ*s1L_S{q;abf5&7ZzO7qA}xXb%3G
z`(7b1d11h04Ve$Nq2cDJFsnjVS}Zx4CVahJad8u!OHIXHFQEi<C%kOGf)DzqH$qiK
z(X=NH*=G-rXH!H!x!FH0ocR`#X6F97_h|NEG;8C>P)<=%r6&)xCv!{u-vuTa2^+{x
zIg8btj@^=u-I_^mjvZHzNCJXG5OhXVMMe<yxcijFE2JShgAZC^CBH%{q(UmB0)a^(
zAbAmoA>iU!0ZYyU%sKb4TT`)H(y&@=NUkMt3y8qr?gLJwE4T;Y8(16ldFT9dYHK_L
zVhXq=3qsy)G!N+)oVZAoOkCT!p5qBN?B-nd%-%@Rk2VwKfH(!H#tR8F{EBtOw@7Dl
z(r=QLe1@Eic-%sx2r1qOZ@=IIH4}xPq>u`!kP7MfR0vF70I7<Ci+5?le9B-krI3?y
zp6s*>7<`TR1lJ-UtP(oC;hCGgs{UOEmVkhX8@pGs>_iqe)ktW~MXVZJ2V)^1`9o4H
z38+d2t}X)ZCF&tcO+d3_vm{|kyXVaCDj*sB(Yb~pNQOeD6;dG;QX&1(iBxFHdBF$%
zqtLMYw`T2+!-M}8D!>-~KLAQztSJX<sS6QA3z`;)E&D8Xs})W3!P6($5eld(fQBsV
zarJA3i+AaK>F5iokP4}g3h60&Y|0UwsmcrK#giku;D14Kvj2hXt}og-S5tE^c$Y<x
zBGGx2AvfbDsrQd#^skOrP#~HhAZQwCvHP)`5^(h?U0BtqkP4}g3h56>mv=ifo6Y3r
z=3=+opY`xBq(b^HBvn=M_4R#$@+^QLp=owB<vM!Ty0~e6Jh-urgc~Q(l`MnNI|Nh(
zRW>93U-m6|1akjr)v*7a((VrbEJ4T@0ppCo5GA32`ccmt>%SS5Q-D)@!O;>=|6YAE
zoc~YFL0*K<zYz)bDBA0fqC!+uHGfW${Qbx`2io%rFy<fMbNcplw2Gpj3i*m9YEEA{
zQGB-E*Yl!}{xt6k;(r0-BQLV*se+n$Z7YEEbg+YhqCGF_s35uecOq(@jtcxEIel7Q
zUobGq$;lxrD+|5efKI0`JkkDA^@)qKm^M5UI4(TS!Ki7nBU5bQef!VD20{CaK(+vy
zifX$6lyW$@+AWx~64ASPqbg<;*^2JJru1Q6gw}ruL<ka6@=m@OyqBsI$I_wLKV^@R
zkfcle^y)Y^<yg=J5y9w3*|ODW)Fq1J!=`e~(+$0(!zlPsvtw`i_HBau{&{>kdkKe=
z+cJLE5So@rW7T_O`Snf;Hl2iE^r1vZMY?`AoF)Oz?4eKbHtzSIm_B_GCxvpnId&wk
zH;TrHg#%+gX3p8`WEg8P`sYt+;3blE=to|fxE-AU0p)5jc>GwZ8J=#}k#0P8?bm#}
zY!_E@+<0l+Ox~<j92d=zvqiqTnt?wh^2V4!)bUn$HU*KRF4oCKYq(*oMDtf_6GA}%
zpg>>0&*guuh@|9jW9KryKjOzHU%rg6cQ%tg|CL+5?&x$z+zFu3+e7Kst_+tZjNpgE
z=Xoeq<CC90qe+k(f}F*H3H_LGOh<I3cbM``Gh7wrDR3eoNvRx}{VVYyb!ge83IX~1
zCP|3**U@L_V$y5|0_qN6=Eu!&eRzfC<KJiI<&t!MbqF8#uYgW_z~SW!S+M#j$u=`t
zfo&Q4<y$m~@IlCzuSL{kvJTGT<%!#oM1jEabr|y17^*(Q`^Wshv3v|u)*R=y#hur_
zo=5MBK^TMtR`wanvUCN%;;s37=DS46Nt|0fok8<X;-(iV-|-EG4(vrS9iUxd)>l8U
zao;s;#d|Ped|&E@DQx~=2n+6}q7P`s=($6wB<44@OGr`<*LQ5@=oL>I4{1k)SWrKo
zB-wI?m7g6UV(dWbdF7vLM|)S+&u9A7jl}!9qtm(IDFo4M;4peNj>1Ry7qapH2bgG@
zMn-x%-rhdAxVjdabN<>pJy<TF+V7*OGMZ*^9Hgp>-EMIlcB+D=3FzD-G5AzKkX)Zg
zOI}F-inJFR)|}s0NJBzXZ78x0Q7@yZc4S*7s@;riH(~s*sLCuMNw--wXgP-d@6)!t
zAA0@+@@5R7V*Sb#aTottvVk{I^&8UIYDd(pWE@||j9-0eKd?DfS~SPi!;=8>HC8V;
zz}BKY8EQGfh~?Wz328-V`(B2vielBMCX}pGkA_iMD58jPWeuPGYNXqwXYUb`Bw)X@
zgt_Y%a4+grdRSL6Wy*Z~qbAYf-XJEQwos*R8-n7tGT`$qY@XB>yUm^E&0Ao!CUR}h
zI{JUqm_0Ka<4wMUNfP1iA&#Z%2yEDsUf1XI`GB7Y`F$jvig_StS?pW*9jkv9sWNmB
zb$p(8$I0dLp0#Xu6{*&%HX#mt`g{m03Rp8@+4%i9*4%4Hk1t=QPH0JLwroLBA74T<
z5A)5mllXKrka}(;laJmdvSxeg-rvfgFE+C7+a9<dnaDc_TzRi)G-nS@;hh7OSk@?j
zXHjuB=eMomXlZ|Hb*(}G&M^oQlI1L4cmJ9@b$imWs1c8n;TV-v_WnMFZ{o@_pr*v8
zUDMH;%;%Gm583zYPR`{Nr*rqp7=+RUyX&3ukZ*U^Aj#%VvlcCJwLav^p0)HJ-iX~Z
z8a>JTJpRY+;ZUwO#Ts>``sI0i^7aCX?;J_sw%3{Ypej9E`jdQiBX50Mi|xZoU^fQS
zrb8zJ(vPub@y~o>sKxSk!`buEc-CAqQnghlLi|b*<mJx2ogJ8Tttf3<H00s7*}U;}
zEsl+?hyIDgcUJD4+s1~iA(R}_jtJpjD!Pzu*V***3K|U?NIjqYbM43t<5i>#wOg5q
z^!6nzeJ^9Do+P+i4zG&93p|E&nx<j1+i~}BN0t?2MJ_zc{<3}1ikfo}y;~?qp;*$l
zV$QK58ba|8Es5Q31r1b9!IXX&Rq(>#SsG0(oTEQ|%)VfttvU6jnyR8{R#erDqR1fG
zP-K&%P@~O+fPgjY7B=5%PvtQwI006EA0$UXNJr8$;ZG)5E6}&*=>%))qf5LajlLi_
z%iG(zuy!k6ulJ*!Bp@iD<yUDt)$N)fJ)`Dzq~jN!%9W#_cvhtQz>5621Z&T>`50U}
z`Bk7}wo~;iJkK29RJCh)YI_w`DN5512GJD2n#NIi8C$CMr$JyD__VC!XEzsfD<KY{
zdkb<lyv8lHECWW3rIY(Sw$|Rmfwqn5_r^O^bB^Watc5HJeVazEnj^uQB;}hk3n!Le
zBtz-O#|s8hgNod%J(V*Dj*z(N8s!I0<-_*1@HhJ~r`~B&wRS|;d7Tl>^ni)WwF9^}
zWGlC5O!a5LUojf?C{G7(Up%SIi4wy&cIgdT6!XOM`cF)?)}RA1=%qhW)r%N4Pds$4
zj%>S5eixXxNDvY1S=_(AniX1Ox(a%1HgGT7f;Yyta6EH7mW}s(Y2G}H%j1txq|fIJ
zeW^L2Y5;R;Tp-z8n_~;+QKIjChP-Cx!os`s8nu?>BkvIS3?>pWYF>EgT^y=@;qltJ
zx%@3wMh@r1<X#wc4#CTb*~)><2dFbLh7THDKtJ#s)=%5VC$oZ(Ol9cMq7S3ruZzyP
ze$}Vc3!11SsP5~GY;FKdT&fYk=#RE?i$+v0C|RLPBrST?Ai&cLH_CA+WHd)_w!<(d
zfp&|wGbBRc_F0K_gAR~ByebvizDG@0J<t;$Wg^=zU*|^LN`8zN=|AdwUTx&#Z1^@)
zhFWO7cpSrP1Y+;1(zf1Q_6(~>TXzBVQSBf-2GJW&!3~{IkZDOpRkSD8vLw0Tffp{4
zQy%i0mo!(3RBKDW8f_haA2`P^_akXkwKVR)i%j}0=52hMra5X-Xj<XtFZ>9Cg5ctV
z<m!c2(b2dEwj(1op0so`Mz10my^G=MQv#GMN0nNHLcaYwpBIfSRmEX5mTkzkT<q2d
zjsk6p71d@!HfLbBWFQJQOsV^@WZgs%pEM=R?)ots4=<-rl}c2u--=(ZTevc#9l_xx
zsNU&qmfaMPbUGw4ll^lCQ9Cq@kdRRN%-BYfsDq>5(6M28BBLu(t9~`AjNXD()}Gab
zh$gOX{gOt3{se@!XUwv5oY_2@_dofTBbg$)+-<z|X@5Fa>CBSEvwYjNK9xpo!K#Aw
z!Af2!6-9}t8no@bj%-Qd_MYX;?=zAw#=VKZZvc&l{>bSx5uHxp=FjiZwn_<#gop6{
z@;g|#$d8?d@@tG8Nrdd%%jg*$L5YY+8uomjJ-Iq`x-3rpGLNN$M>FKZo&@>_(fW(k
z+|151Es01{GQW?U&cR#@>Jwm0K#~+5o<GPhQ&w>M8OLo2Niwm2@?17wyiM*Su%I|<
zSZOjj*=Jcd(@4*rW%8M^Y@FSDnTMAmY2QfV%s~?&LUE#k0M9x!A)eUS6f&KMo1&d#
z`6P|5U8*2xAW3%ao%o)XAwdKeY01zZHgMNHlpv`T5dbu%L$y>A;}faZu_Xt;+{DSG
z>nwidTdKbFGLd>6o~};QmpPfcXATfouQ}D9R(L21N?=jKy}fZ)0c6zhs#Feg$Auhr
zjlWFuck1Kz=vM-gBx1U?m$6NP@DB>6+1r!3NFeU69)!EZuxMx>D*6Y~{`&(Y+Qer7
zv><AjQW7}5@BwWHH9#`i&;;`F&dm0uF}N$GC|k^h);$_=Y|<`{-MhicSEo>}V^^YG
zV>z?81Z}Fi07iUDSEAzGqnvm;^KRaHlRODGTxE9uo>T}5rQ4iy<Zy#ur)qSmdWG6m
z%TuLcTUI{+Yu0V<oGV4kN&sO*7YW4o_66?XfoJd$CXa1GXt6d-+I<7FC_eK#0q}Bl
zhWDG3xO4U(@%0_NN6g^R&x5HI=!;))cP9OI16xQ5ig|e8;w*%z6{$u=zd*Y8sLj&1
z7H}!!6f56fPV<3p5dyfnIOjFx4Chi)aI5Fby~TGZ<D#-+P9MU9Lm9T_Ix<N-Oshim
zU?ZTRFVcao(YrZv1rY4qJvN;d{sB~bqd&{9>j`!h9~Fp<TREDpRl^Ah3gC^|r%AR;
zNF3$k<~1o_wk&V2xsSUjIG?w1=jgYz2o55+NK@V!cMy{Z$PP`~hPm;Cc$A}Dw96l>
z(f(7wBtJMQ{QR{akU&$=lzRw53VN3!*v;vr+`U3>atxZ?f?~~flvV#X+Eq0WMFXxz
zJv!9q{8mMk3>aNpaCI>v{abS2xEbs9F1YGNgnuZg<ppP_RTKv(QS3JC)(p&<XHis8
zWSgT%qa_1-?tLV$W(cm;Q0*B{wU9&1$vN~Hd7cj6e#eAHR{C~s#Wd+7b}spv?)n>y
z8@(1YaBcC&%>MZ<on{^2z^_A47SCex{EMVkc%3gN&tuhwVHCUKNxP1vk&HSdNpgHd
z2}v>&ckmY$Ot{Y*d#-YEaaTMuPH?GsLyDb_<Jy5eEFZ8N|KPTK`s)~4`Ie^hhu<>u
z%^C>uVZQJ1D^+K2Vb_Yu45)F6$!Ah<F(2idrE54B+@Fif2jjYP1JgI$f}C{>I~zc|
zQFB<kY6b5#3dL1O=F;I4#OElOGPg6i<EOX`{EhX?r_d|>0TX-9BNiWoq-_lUc{}Fn
zBRK!l>m)7ug#`z0V0+~E;zH`VSj?)1B<4FTB@xggXIV+Pa?hbHk(}BS!C5sJS2C~M
zBRk8C=(un{K7<q*%jumg4SR)d(fO2CmKz+unZoS~9jH$RshN?4g%-tM1Tf$#*^y1o
z%CCZmcxof_{JPVnk^ux8N!K^<;|FKxviTgRm%mFD&lomcJWoveCU&O*wtXx-bBe=v
zL_%H}OW&Z?^sQ2sH-8VL<A6wf^a7TwGfZv~ginPoOq2(5Y+g%8CF;ESl_VrVKv303
z)dWtC8boH(cGNB#ivG%M`pNa^6Xxm&ch?+!&5Yg5<k3U9-F68()~{sZpqD9&3B7AP
zKhE4ncBQ_oTssiUv~T!n=WTMx_dZENw3~Twb~&HBwBo%GjU43(90)l_S^v-zUDeu@
z252>!w@PefP>s^`TIEKYcT3^#YQtu&OX*S?AR-tg46+5QB@ayI$*@Bs;N=y=ci-+n
zX#4>ye(6W@_^()e>O2q9gE*NT!nEnr7+cH6pdPch<nD>9RFfzlM_W1rNahTZD8`!;
zmvivw34R&i#?O7nF#C7{HtEUnNdj0hPxDRlKzu56W0E$AV{=*nIh<cUhqde67<TX`
zSLW3r`QAzP#ycw?i*R`8`&hcZLap#nqCOZ&tJs0mEZc$aAJpNES3CfXq>C$fzr2Ld
zU^;2dzhLGorO3KxWmk+RZTgR9-=tRj_Tfx^x#Lc;vMZUp{T{L+U^}^p3Ae4N3gq5e
z%%s<UBx=eL7WZj_dhu7b=sfWU?*H}y!+(pX!HDIoTeFG}+mt2P<u>!1yu_8tAM^dJ
zIkb;i#WF-(43Kec9kYjAr2E$MoLTk`l{}6x|D5dbM9tjCinLJtt5qe+@WOFPK44M^
zPX4BYGY^}qXlj~MZ7-wAHe_oKvONdcnu#h~9V+xc^${?-=5l%C_YCVefn&JgDi#1<
zbZ)rcT}IoQ#qew}jx$-7e?txoxVznFRsVMwJAFU*1vlJWT`@?)ztPXX0{FdPFCkTS
z6z{WJkgd7M)=V@-c2pLYO~|%PWNSLA-~p0Pf%$7BduiSr`YxSYG^feHzO;QHP^m+6
zDmCv&hgTa@?%H9llEJmpX5>;G>D?`wQVmBjxLXccNhf(I7NJ_*`UD>Ofq+lHWmvT+
zwCi(e7ZyrjU<6eg&)_x!x$(zXad;jhIyIt6?*WXO`8)S=n=@)wGxkjG!8c-g-h8DS
zbxKwy+~`Mi_4+g_69jk8vhnPCzIn4fZF=<Ljc-?T@?0D`{HR!_C2zh~pRjiQc%_CH
z;`vKtyMz#ScrNn}SO}`xl!`?i#orB@5xt;dxpkQ%$t`(vXf>+T>rT(!J*eZijKi5A
z+I^{0qdl+otVLMY0lXGzBkNi+vi&%tn^mD`U<rmE_=#7_L{qGI1fTC0kt7QVyS|{N
zhYwY{zr<(1PN0UjD>Yso&AtpBI`Jy=-)%*44<BA%GmZDUHm9h!8*eO#AzOA7!Bb>~
z6FV0X^-32a^WhTHjSJjLzDTupEdVR3m_ll52D#6%*&o|Dm+&6#sG!q8vy&Tpg4L&%
zF{XP{n!WNSZ+)|ekcM69SmX-*{Uy9!T8dfUfY+M1vUO}bt~C0B6~Eu$+Rqgj)A$?q
zSY`BXC3*FS?HpL~9q;D;M%&)2$q;fm{zG3%>UHR)I=nyoI9ZZ}P7+C7*@bRrD)9Qt
zjfis3;<vB&@#gTC@z%Rz5G0JA0O`aXI>gayt$F|BHdL?Ilsc7*qr*g2mKO~>zQP;5
zno_>;=Zxujn>&fA*b}z$R^^g}2Zs_-@)LIE+-BF}tGxfk%ZRyP&`B8edEQo#d1N~&
zo)&7>seu7FFtIb|stjh~rdVQ^)@EYMNo>nBp>l@@5A&Z&dfY^XOAFtnv|f)vUz5I*
zj-uj<ob5}q9<R~6M-wWxn828>7r1dZ9kWHHM$;ZNYSxO@9}cIN_7y7+38390NqIuW
zi43?Gtw4<$m1#M8G%x!maraUxYVICBs9BcqpdiAEe8>))g2Am6y=Uy;;EHeQpS^~*
zum4IG3Tg32S-N==1KTyEalesFUAUX%lxzSVENV{oYmFK7N>xH#llbMmSCGb@;N-@w
zEa_vVSF1V1AP^YQoR3zW;rfEU_^+MDpd~v=_7o{oz79>B)S={?-!rP}2KH=|=|1Hn
z(nmKZGCYj3%UyW8d<7zctt8&MPi*x2eBQ4V6`OaVTg!%&vM5MA;P=Iec$Vu$uUDH;
zw^4JdM0h~vaW+}H@&1rjv~1Rxj&Jv(i3XZ%Cnxqet4}Urbhjon?e#W;W^LkDOfmpz
z`__{kW~4@yvglttF3Fcz&1p9-q`%U~L`8M_8fY4hS~iLWS+*nS?8vgo2}&#|iUkz`
zP5m?T<nUNCXC`ttE{j|R1WA3$XV!p+{u<L?8->(p8k^s0L>X5J?N5hcXn>8hd+|I7
zvEt$q!}NwD$r<`3{o6$2uE~FU{E((;pnI{o0~OhhY`0*ynVtVyQ56{x8>(GI7Og0@
zTtwB1D5yMZT++}qH^PhgIVuqwJqQwf@Nsu8P@^keN*1yvqu5<B8oZsAcfmhEk0D({
z)_`l@)A~d&ei>Je0E32H>?P(MXpUJE&=~`WAd91EUX-ddmM@QfKtw_oHWyC<!VHk1
z!;+bf#n&A-Plpqof`Z-V@ah-L3I?yYn0NeBYMAUOI(Gs~=()XA#naUbe-Fov)LpN`
zXv*Y)t_!mc#t^r83|-2;Muo8#nftZ@QE*5mRuxqU#xqY6T|MygRj`^t(e(Ivdf{z!
z$f%c2L}$(=L)VfKi+^W;n832v<`D4xM>O&Fz&BV$Rg47J9?1I3y|{H`AKTW&((uP2
zRIy5Uc>-!AJ-=8)#|g=-dv7*5Jvz~<ZdpRSLUGrrXn?F7Vf&JjymG8meptedi`PiL
zT$A3-MZkyP;+}X*HtYc0<z{v;C5yXb6ah~1`~0GG-&6rfbC@*jSw_N&eZ-tg!zuG1
z2dmM8z(8MII@hJv5G&qZm-(vo8jOC4T-#BEk`t>_t41_#H9nx<!VkE7TcJs5cf!k6
zr3fZmG7humm+c%^UZV9I6WQK+6n2bw2L|E=aAZ7fHWlN`FGkU&q8D(S<GYVA@Ane?
zsJD}yX=QEQw+T4>14V3h6kRyMd8QyFBuPV&jRc1V;_d2~A5*pkYqkxuXLG*Zu$@n2
z6;blQ!@h^PtJkt=PcUQcS)^r(ob49P{52m_UCiLf&WCtdYg4<52wdmn+HfMq)TB<0
z5_r}aME{@O;d*Q*N>s2S%K~7-d?$qmZY2nIkto;YOSaY<h8-hb{^5uuVwR1Bh6m#5
z;xJd4vaDE4Dyk+D=<SZGso)w!3BR(Ki-e(;Hes~^u9>9Vw_yq@M#vN64Is#9AlH;j
zwo604ShJZAZ3+mUgy<v?9`oLic8K2w?d38pF{cGnr`>mqUHvK{_p`CPc@q}y4f{va
zVrO+`em$HfQSQJ=POhm=!>JXi;2{$3okphvKXWQ`08!q7L{$g^La4iOH=B;0=9a~P
zzmFS60l=LQpE4BllW?yxnBPu!A;YR*d$^eq-7C;8QpSEsLh>()FAj~Mr*{B8nu<m)
zITm-kJiKtr8?PiGS!~EY#RzZ{&`{C&hY^IMkf1Hgh46?G%)jsvr5<EsGrHsF9}1+g
z@AnKs4Q;7hR`(ac5}x$kDb!&69Us+s^R_zyhzV7(qp4Q3JX3%v9Z}F@O+AF&lmJM7
z+@`8J7AOJ|lCvg{^LsUa40;wRDa9#QsT8G4_@Woc_l){4O-G<1AR%fZU?DT{A?Z0b
zWR?FjS`$^4v0F{ZRui(tgkm$JYAUK~b7)O$xp)XRR>hgvmSDlXz<d`toYEYEfQt4g
z2Z5%lXsU)H1W=@SA{m!<aW)g+2n!bm;}uwq3Z6Ha()}tQ^zA{Ja5of1MKE|19vw}|
zl2Jqy^9J1Ujnt#WZROy#Ac~cYCaOp<K2ki(1|Fy3@bBq*^E5kl-a^HQ_-H=>F|q_D
zY#Uf}&`3mdG*QJv@y39nsScB#<^Wia`V8njJt_IhbbcG%golZ-<X9c~ku*U>7a2y;
z+@)+g1CYe!JxADkz9+3h6s%UKqh+46o~D7Ip$Y=NMT=1^Jc1xMA3`Fdh>naTz||pz
zI=2AAi<cxKJQRPg0E!2M5*8MSo2Z~@db~rz2n~oP)XSHk@M1(2iy*{H|0wsyjfLN`
zykbu}MuMi`F#SBdz}6jmxZb!MO$`7>nzSs&vD+s(co8_TmECpAQnOev?m)t_ubCgw
zo;GFm4!IMJxJUWop16^1XZ$HvGMeb3L3kN-=skjoh%QF#;vYB@RfGoh>rh19!l9!{
zWZHm);~c#jNzri8QM6M9Olc%sj^R>+)-;p=&k!O@m!@>-5(N9XBgX$irzv-7{mT3F
zsTYQ(D9CCR#$LL`ty@<(cXB2#d)8;vuQO@w<3d1{G88w?XYO7bNRo3;(BtY7%fS;T
zxN#p~J8QSsrBbyJyuAzrm53xdI-1CcVEp~MvLGpi2Qeqv^7BZ#7wOC=^FF4!2;A7j
z@=N!T8#bY`<N%p^{a%hAPaw?-q#ozU<zf^GD?_tRD&ywv2U9lZ&mQ1juMSiN@D6@7
zz7T&spu@%G7JHALA}$HAZ)MHS22`)slkRU{X57!)kS%61w$5k##d<Vv97%ZjB&ICB
z1F5kb%DIoOU1Lgsvj{5OSw4*KbM-{miojpe6IeWw=#nLgjt<66a9kc0706BH-j!Ic
z)Ne&yJP9b8OX8*dT)H1j@siO*g$Lpm^D|8*XY%Gd@6n}d5UK(iDvG+9g9q)Pn#hVd
z&-uG$iS!0!#o@k@dY#khRx+!+!=RobJ8%5P-iyHfB}~}njxpRDqa@*1B!Y+tf!$w!
zjr_?#8luNFSVF&j0*medspr_XX*K(e1_YvM(L9-pCpK^_9*_hy1qd!jg)0-8za<^B
zRpt86(^w{mNCp=?qP%f?u#xTO9I_f!Gz33);NmJ4#+q<#Scfv=UxG{WIq0i}j<0{m
zM^$80RYsNV$hHjZmOBpMpx97sxej1rNk!7>ux6b{wj`n<7SI-mS`K%%kD<D^7e#Be
z;p+n?yxetY5{Sw*mJjbtw6{0j-W~Yv#Ad$hHH@Eb9pk%x)#x~JKbcm6y<^J}QM@SO
zCCgL)>r;4o%G}&FodLB!Vz26nr)L^FzZk-xem`*yA6!Hup20E9>GA<{Zyw=?w`&pc
z?ov`rGQvLq?7nDH6g#rj?D*KsD6$Pf(?D~~E1HTZiDYJ($j&hrkgP~V?`lAo_q`xt
za4|koWr~s>gAvR??NL*BqftD4d;|ocCpSC4!H4~-a&OUxEKd1}kK0zKh_@I1t-t5G
zO+i&0j-864plI%tX*Z0oCzN4MbqNnwJ^E(7d9(MsY<ICzy7f>dkJOksZ5qGDm7~*;
zTo$|*N$3Z^p%~lp{q7;ez7dU=mj}k;)p_aH7{Yu#Fc|gDO+-LvFrfGJBkaL0-fR|)
z<f5bWdlKEcR3^ZvM`tu3A>tL(jmaC{U~MfITwKc1|2G)6Z74;_#HQ0@Fyv)?5z!fp
z7<7{3Z%si_0_d}LGHpFv90|0ve33tjMp)gp44yTZ(yD^;2;exJloi#54nKautF_DE
zrsU;d5I~D#|CaOAd8r-6QBj@QgC4}6<<=cD%{w+h=eTqtH5|#L8kx*%ARzQk<+Bm}
zX%y`VB(rD3ajJA_MJc_6hK8aV39s@NQx~;hLt|Gw+}&_%*oYQAd(zp>h@=zfbfgxa
zP5GSKt|j?k=Ulwky-5XMPrORMOUTR#w3K3)+R7gvUvJ#~Ycq6171k|z2{%<i(NyRB
zIy6ydH*e+MzIjaQRhK|NU)+s4`Yen`_3$SkAdr9nKfK($@b+^7O(3}XD}3@*PmVV;
zB1i&NUK+zG0`T;$Lw)fSpLCB#6xxvR_Pe}XBMNsdpFAll2nIa-{qgk*z~9#gZx3(0
zoq;6RP97mk^rcCIs!siF1cP_}M3IBTsOIf~d-!X3O!=Jl{ytQGZ!!Z8w#OJ=m+=qY
z<<PiVpeWAj=uYQkr$aC9^=Y8)<-Il$=nS3689t28CH!gs?S8(9A3|7Y5o&&##MJ#0
zsAVipyMFyC{Y`O%$d9-e{Ru1kMsaJ^a9S79V=(F{{)vGR^XKwz?GT4nA>a69>lLQ9
z@W<QN8+ZRYe6*=5YZr9^Bx(&B&nK_Rj4q|a!ziKaJcN(GT8Z_{JU;7Koj_k-ygc;u
zUs;x~4vgc{>qYSP38l^lD`>NJ0u^qrVL*93Mh`c10sT4a-h=PnElH7f)0x{sWKL57
zA^dA<d^>>;>zbKWy)+@7UibypWNVw9Y#dY)MKe&WVjqSL3*`Oc0wsEV!S(PSbT?W_
z1FC#Hj}HQ`FtCIkQIP2N{Sh9>HJP+x5WC0JAS@(^;ntSC?yAFXhoBnoFlBxderxE0
zhnpU;d>6htkxJ6Vli0n(Xjr`*!e4_+5NtM^Jw85O7akst)oLv?ul&W~!eq_I#kUNy
zEf+<$lam%t!p*Z74E_WLd7?8KkSz}}h7KVo=>Ts2wK4kCL{qI#<r7dzk6X$|4S%58
z-WW!Q9%0J6uP`OCH=B=tOwzCcEW8p;--Vyi?7}!+-514>A*DIi>=V*PeaDb4W$@G#
zP;yDl%p(2nMkaRMPv@H}skU!2<3`@$l~W7p>J!VaLq20ed@Vj%-;*P4`f{@B2Ymi@
z1Pe;NNA{R$&bI8&ua^85nsVIS+{nntKv9$zP%B5^{-u!!q7m6@MNw?nE!m_c#UW~X
z0{mT&^v(*>sK|H`Ty6xOfmI#hzj+~>q9bX7R?y#hnKJYK&KIJnX{zIvD+q}B`>$yZ
zO~Z4N7YL8CN;>?J9_4xw1RSr{9%nbr(}+CrJLkK3vTqI^IzaN{?5LW<{8-?)^7lh~
zG?qL-`-m5s_M&~59sNapW`0G%q4L(A{$9-IOZA6s6vR92(Kz!ig#|ySKE=!Y{4Cgn
zD?U}2OUnn&o|Uzy-kB#if{4K5HStK!{+NMJ$|(X47Cq-(Pqq74-u^h6PH+fB0e#D#
zRW_eIJ=M1Al&eR4`V;SaF7NY)3v1fr_3$+R|IEB<kLBixwc{LzkS_<)GncM>>;KXB
zTHcy`{EkPm@bvS-AFNB~+I?m&Uo1VYmGf8KFbgT4ABd)*$u<<51-s3HVz(mOtZ0fI
zO|_udB?K(UmTX)!yF-4|g0%sfV#jhngOrA!@J3ZDRyBh9-FkEOJ2ST2EVAs0?ApGD
zT~+3w%grLK-e^7&A{~A!n&xO%&EfuvQPlck3pzV^_&24esyTB$2nbr9qF%^zmv$U%
z8V>VAUd|0wL*vCCCVvK)yl9y=dXy(S<qWdT@+cAq^oWK)F#4hB4QPrTQ8eJ;TM?ss
zk*D~gJ>~oJ)Zb4Z$_3@;_#+@vz_U+oFxr#t6mV!fe*=HAZ~1xs>|s{WxC+?lp6c6Q
zl}pe8w4U{&DwwYh8UJ%_JZG%W8+!rY|0!Vb2mRuY_*r1z)JIP6{{{n}nQvA5bL0DW
z#+YaNeztE<f{{ON`(N?tPxkAXwfLMp@86u)g1&zeVE*~_U*J2Qe*RCa^S}C%`2;Xg
z6s53E&R+^lRELj(-HdEAIf04A;RGw&P-PKW(?B+nYLSs;4Ws7p|9I8`Rz(vvNV`L-
z%}BT;la>6CG{F}Q8#!ryH0!^B@8-Qu2>?Yyla8^)s-P+=Dk9poIduQTn=M&MRK2^C
zaWDUX$>y-}Yoghy!c(wVOk`^g`>Ez!<SMem2~#p)(1B`G{}CFK7yJeSqWa=nv=`Z_
zXUTkcjO?^qxQ8?(Ji0ahA*G&JPwFF|k;3Z2g;Yp|R7igcn5ddYAuRa|N!1(?I5rcq
z#f)ONqR3W98hTYmm2IHOc<W@wUAIsX8(o7`l!7!Sk`A|`QB=G;lu^@~F+BPr8@BG`
zoUsS8YcZ<VHSp84pO`$=ovx)d(p*Z?q>&v}vS3veR82$8Q7~07ae3WZZr|L_uA6pB
zscr;>hEXJPHNP!AO3{cTY&?5`8zq_`p<%~@Rkb1GjgOCs<7aoXy|{r^rTvk_zgL?6
z3e}@(OG8jCc=<)(9Z&{I(4nCq+jFt!-f=o1gQ)XB)O#Zcx<a`xq(UmBLi)47M01qR
zEab{xr7=+z6vc{Qvmo2eD0T~~(|OWSJI7&9mC;jFzKOS(hN4N%TlZ5+L{-Goza>Lw
z^{4f~-h5cT67`#X!sxhM)Kopy-u;R(ITIQ8{ZO_`b~39DVoh{2%GRz!W`G-#-HKYf
zA5$v#=8G{WFjVYJ@3;N%x7!JdZb65Rr+IT+7Y@~~L(S-p3@#mtra@@AYLqMPiIy8l
z`{7mCHRW5zWcgC}vo`p;ihrxtL{-%noM25r&fJ8irGn~-%^ZtjlhFh>jILfNvJF+0
z9bFK8aSLdJ!85W@V^T<kR7i#NM>}ht^J{Q$FuA$8g{GXp6qs1B+@Fl5ITAc+D%h;q
zWF*}|6!iG}84-1$r~;m%37b9=U6DcP-HM^9_5$0KT)heKGNQ>ccDof>Ctyv@z>EP8
zZ*RQv(p%eeNK3b(_wz)|$s*S(qoKpi*B?&<Xm%@RRluH^hDp=o>fw!#yB=g285OJD
zj49oM!QThH-Arz_3Be-}Ur#-fHIw8_%inIwQB@TmA0M)^vR;t$D_E0fVDv4AAeF{$
zx<yV#Jeg^+ghn;S)zcGaj&9Q84xn?XfoEuwe2%Y$R7izXNQLwiJ?Z@FC<s<qUHGpd
z4KxYSqcPU3>)7qd$d-p#&FR?j#>1-&l5ZHAXh2kDOrin3djz7+7e$sSxHPDSnw!pp
zXVOxN2*~7Sq>`KQ^ud~zUmnOwO(f@O0ELV>D;0Crv)D>bOMmnZa#Bgk`R8yr&r$e=
zf=fX{(`;zUC5&Fp5Ot+UjvGb%Wj!TIl|%0l0GfhoH=!Er|98dxQSBOqe-<t)sEA@-
z$%Xv?FYmiY$Q4l#98ox`hNeB$&L0&S6rF7;IMe3mZ|8Zu`h&g{M34HHuZ@D*&0mZz
zUr|Tr0&+UO|EqcZ6aD#9ynmi-<nb+k4yJ!4TaILL1@=o25JmAxp8s3RzJLOLJT>>C
zi1fr|r=YRrlLu8nK}0I3Uys^)whc#t$bZ5AN3!r#AD^x#r9H3s<zG*_rx~Rds+s>%
zt%>N>0ymEa*m7gAW?x4$rJ@Tgj(1=sTs%Y3&?Dr9b82=})e5S;kad4jWAc}2zcdBa
zb_|WusEUSa&Bc_SfR~F0ieg4ltmyu0Jh<}e()@=&gdicMpJd^Tvy^=M4eAE#{xRbe
zrQ2-!YAMIeRy09GFnCccyev)L>`3tk=UDl}LXN5d)M(y`m)ljw6&YF5p)=iJ_39J2
zR&7r6ilMkkaA(8!EIgSEo~;@3abrB6V4fp&{=G9NxP044#qM<o(*c$k)~z`TWg63}
zT2b63AoUnCevPAM=g!m!G9ro~XT`C3$}INU+=-~zj5l6ygf~jTIVD61Df<EoS6-rc
z^LErP;e$~E`<>lP+mcP&*Sb*7-I@7R$mQm-wai%ifJVLg(<$H@zb;wE!Q|?^{!TaQ
zm-9hYlmftsfT*ctUE9HeLkgW=Z%d?J`8O)g3P@5Ghra!Rt!WmFzE$ZvqB}*O8Iy!0
z<#21?VPY+zRBc^}0P@}=B1!^6>QQF=8c(e*U8o*tKok|s=~p?tCY};+w5OE*an2e+
z5)tk3Y+HMf<bYaqZd?j4{*8VM5|WtB<paMmdrJ=OUusEl%SE<sIZvw1jLD}qectX$
zHR%N3&EG*%rWKu=5AEOkh`PS{bAX6Ql9dM+PjTV0K!sQ86RyOw_16QW2GyZcqmp=`
zp@{-Q#z}r$d5cQzJ5f8#710?PDQR|+&Tr?JGkUuAZb@;SBUAG;vY;k#WWyE?oQWe_
zwqXx$&U^ivQPh5s)l0W?^<f5P(T$)gU3kAoMU0B_w}TU%AP5+ZMl5DCuC6Wx*77K%
z7kYdGuDG~WMF^?wK=PW5BHPe3J79V0c|#$~{;W<)(-1}Rg})<jqt(!%sa6!(1_lLH
zvm;wGP-QcU-TXu@f`71T14+8io@u+#b?i)?5}ru^2^V73OzOi_!v0bB9svOxnGYXu
zKi7(Y9n;lA%uemZ@2}S8){4PQ+Y(ImGS^x3<3k?$O<+_VA9R4}=u#$r@GV6r@1}0$
zP~75{@y_($2ndTH<Lu`QuD^^W^}|q9EuZGm%(eZCn7P)Ek=^PLCV=JCuT1*jb38uX
zO2ZmOiCaFNW!F!$bkarMtkjC?!LDfbY))?&!1&d!RH-4d<IELq`juiv`w+xu4iN!K
zfYhBo^7#j=X!Yx9YDbA2|KW3fiMz>`1xdKI>q0qC0ST4ti@z~<$S14}`iREKCz-cx
z(f`NZdB;gntZn=1?nyhF^Rm0ZE@{a*XHXDC5CcgBb3ieps3<C!14fLffLR1lK}11C
ziIQ{9u&_B!?Cz@XkC}xf`TBnEF`RSy@;5)-ak{6wx_avFr=GeWX8l+~jiL?Q8?Ex{
z{a4c_QVkiZou<WwUc{1@?_~VfwMoCMKXu~y!|q$ErgG%hJ9%WracZ_qLSMR!TVisU
zeN$6xX9%GR*36m8=XpJN<bviTsel<8*w@c|j?Z?l<HKh+b4`nWv`%)SDuRlFpPBl=
z94;F&fClkZpI69R`!%!Y&*ZiD){t@OWIFX|K+GR@GgZ-4N!iMoOuhSQ=49T-rTQMe
zdh-?D`c2TGTV15Tl%P=Y<?Sc;$RYA8CF+i8jNaLZ?>`to?P@+R;A79qk9qS0jp6k*
z0t=t#={HxCIpj$?cCSy2s<Y*j7x`?*DyBcZjw>4UqHVex6^Wv%n4Vm|f9_VsuWU>9
zkUrG5pZ%E$eKYSo{sOCF>d?AQ5~$_qQb8X3p2x<&M#_lusYL{2`T3_9hS(HEAt51w
zlHy{5!QdbFL$I*;H;9<HToHe+FbPK(r4UFNKnOpEX`q=w%%B$|P>vb&BBdbUIf4=N
zq1qyl(mY2v8&1}0IVpZbxNPjHA!HGre$~#%kulE}>Nq_FT`hDkgg_{vK@H0J{<+tP
z>D-$Rbz@OXGgQg;w2-e<v@@J+L*)z<G_AVXl!=+xopG;sKN*ENC5$YQ(!?}XR8>9e
zK2Hk3aC`mUREct~khF@bDk!pQio(P+8!~e0n~Veqma_f50qn@Xfu@I-@%T?ZZdx~s
z>zzAz>ao{Z{`oSDjsvg-SMuuqa^n5<X<~Pv0V`h_&(YrB@acW6ar|-vb#D8DBkS)Z
zgHYS4;Q+NujVDft!ma{x9q;VV!{Kd6OS>IGXwp?}(}hc&MZ{|gC=!3!K7M$2JC`m$
z$o)xq%=>%_55Kbz-+-$)qjzg6co*^XL5;>n7B$0`!m86rWZUjs_TG;;Y=Bfj3371H
zesc9reDlrSv|KQeD>lQ$uP@;4%=Z}3?`MAK(2dp?)ji={bfP7tpyJTyyqwpVVX6(y
zR@KFnQyvCF*G>RhsO?Ym2`}>>`;JyKxAI)8XbSgCq2-Wy6yDU7^fPpVic7{3XOG6N
zRKI5wR7FK?Th(5iI7$^aacTk)u2b(ZMF`CLjp$m-Al|egPCv0T+OvAU2MDlZ^FGSm
z=ke9t+vvb*mQHBFbytmM!UG*b*I5b*BQE9Xmq%dJ6im<OoS*p->y(SgMj}r12Ya|b
zNSum^r(Pqv*3yX=;p2i(eW^B`85~hSlB%3EuM>Xq4$R^0f@TcYVop@bKBN5sG=W-v
zJ`<iA#}yZ3g&vLs1XVZbuIqT~y+^52bzhq%Qc=*V?V~Eq<1e4eiHL|mNle7=_gf}w
z7XMKZ6Yb1V|6eRj1X7xz`bN@=5iAJZ+-3k_crkn>7`hjYAfAFnxMG_Uo!mN9w*n1K
z+rzAT7LajGJ-&JPO}0m+G4`34Xt3liM!dO)^cLN@cKk&8XV?HQtG|4eDKF0Bu+->z
z`(*AO(v7(FZ*$8FU$ZCQMpA~8VDnq}@YXJ&O3&3JA*!Fft7b6iuJ_n!Yt5D8?&AEY
z`Fyc0k&CV#O-tu89(v<@N`6_&lA=B6w~XYM5tEpEdpGd>zyrgcW33rW{Z?am`I+A2
zty;kPZ+CM%?HKP(|Ai()@8aGYE~ilp<bL@$lRx;G?L`54jr)XqFY+_*?ztq~eH-W1
zv{PB|J&%rhh7E>Bddu$I@$^HqwUx8^+r=E+mdhq{7jx#WqxH3qa{tKlsO1)zrh=vw
zv*hLPh`DYs&D^e#{r`!n0YSlz4Xj<2N7JkNlX;4GQPDIXYo~vUuTuwF<<um?G{fQq
z6cv1xJNR@;9+!O8jM$hm>cnTUWZHHHbzeroZ)Kc!S8r@U-aEhI$gV}5R@rDluyK%|
zzKdYs(<wMKu(jyJc?UjaN!gu@jFsf=n#IJcU!<sKJL>t|q&PKffail1C{ZcY@6-T$
zAV2_UG;#t@u!eh`^FxW&5}d9m+B9v$E6*+Ey1RXBnz@;NSKd!VHEnsK4S+*aek7qs
zb86P!jcOX0B8ILvJxzPh0>+N{F*GnKK?--zX6m?UEIgu6`shTO<sKy6$fi>^;OI<m
z<!cV@Jxm^TNmDpwy2H@R*!c2Fn%;aN=CW_Y$D!dnw3PRszlTrPMdIjqDdX<GnF}*R
zs^!q<lbQU<&+I8NIB&wc^zV5-A3py*``>QGvWef&XXN`NpK(qhMIcl+X_0w+|H@-b
z_~<)QZh4VMMs%dbs0p-S^~v@+v4x7uW>U8H3$7nGg`zH(aO?f|a(=tP+}5rOpMG}-
zivzzOCQ%dxf9XOV9`+pTWfIN0UdtWVmh$$aAF-fV<LG_Ucy(-B;?h<z>D2|y|G7W6
zK0Tgct!j}J<2<p#Rc!i|!woyqQ7WK8@qxKa9Q{1U+qa;;BawJvkl4BlgIhNs;+xy~
zDQJXG!cOC1<C&~%<U#kmkf#-)z8WkqV$0j>X?AmelslH4Xn*gXg}nK~M84YW#@_u(
z9vOEXJ(6t5xCK0L?{cQS+K2JeCeSA>2F0l4i0@S{xo|x#>ki=IS8t@Arr|rXnh&49
zjhU<6INMyr*n4j0lG?VjKkWRO!bD1m%jF6Q6l+zE#eWc{Y5u8VTL=ST1~K&@rs>63
zaR4DCiV=#K=zay=UxY2T3mE$`gGHz9A&;e>KE&)z*Kp^6UUXXZHbX~T%T@h*aP7bZ
zmVZ5$@sD=pf_Hjz^qa{{efBpZ`rN{pgn7(-`ZZotvbm#k3%d6*Xd9WwdpCSY=D-*f
zyNwgNL;^~H<LkcS<HuH0@AfCTvT!BK_b+E{hgb?eS;G3dZ7BctD~=|l({o5S4lg>0
zXn!8(HLrm**Ym*@(@`!S%U#ih9NGR8Q}?&#lH>Cj|HL=cdh`j#U$l?OZ%yOnj843H
z={D|NR6thS3%Md%Qln-x4rM2cW`085tH#hZ?l;~UK9()@?qg*0!)*EWCmy@571L+*
zrDDei+%$PN?IzsMz31=Yo+sWSJ*z$s^r;no>UFbk?kZ|sH7FEaIT3+T0Tth|GIsy4
zf%;eV4<(k0a4v<a0B(-_u#rG^16t?QMAbNvL!$@-|F-Y>K)Zr@jQ~2+`}(y^@7tKv
zq#E?N_&)AEKLUcka{m@T-8;0UeZnv75};B<d1*It>O0UhiEu{{BP#KEz+e6quV48f
zM><YqMAj}AOrOK9l(F0=_wvN%B2ovmp-1vs)|z1tsqnR`3iwM2_UJlvyl*rw*Xu^s
z*BNA{T*kcN@gT%$kte|WEjMk8;;t*RAQJo{?9&{!Ca4~Ta3|EJNymoNTo|Brm!>3s
zsgoDgm>Ld%2%;Q8L|M3!vRdtXOo?yzhunO;D+?Prc&M6UQKK_ycj2vM4fOHtn~RwL
zN)}z8y@<;B_i+CgxzuhokmfN4*(s^Cdgwvw*JwxgUa^$zYs%Lj*Ta5#Ql<<IQ&Ca*
z%z1A;?eD#Tp(C<*cG9!Vh<|}Q2W1mM;IyjU3YtwP_xLj2n%R}xuIkN_Z@%H#d+X3-
z`eoE0h?K^u&KRdBhzgTHU>!3@&cuG%o!srt=jgtld4JdWbnKGD+NFXv?V1rAU588V
zo=ifo<K!-Wi%C~KiSg;vT+`UeqDQaf*&mORS8otg=iW?)Vo-5xA#V)7hrMkkGP3?Y
ze*AO}8=ONKAwyzON+Ue~QWX)^(6m#}PZb6wJ3r;_qV9atNaZ2(<Q7V7Hk}9EMx)Ei
znf=_ieDiia+CJEYd!Boa?t4l&{LKs8a(N8zd~-KFYG1<3)6>{{IF}7`USQ;yn#_Nr
zKXL9fTJ;-4jea_dXZ*mo&woj$SBH?Ma%K+8pD9eL#EBIx`Kur4O-#>fO#LX*G(g%=
zl#ow}q5Hy>eodsJ;)tw=E3P$)%?(x_(EloG@~2K0nMTO5R}Wz5eso`csJNUGKo~ZR
zpn(}E!e+}rahPYhb{Y|8ExHdH&DgOm(GR(p*K{h0Z+*gb4a;d+Q*hrC-?4>u?Eh&m
z#aRQHGHC?$7(q&I7e3swh};XWX2f+J@XznZnlbM%v0p2cy&p1a=nHHxoYbgy6Vv95
zpnS*oytCj#BK-yYR<W8N18sP)?JQn?+QoHG4`!<SZr;9Y46W<z<lx=Qa9?=?w{)(7
z-1{oiznjJJ;sQ3<iaA_ZMtbI8M%Ij@X3g%5xPBCurgh`kj=T9~^?Ljl+wuK6m!+3}
z%xyP!A<Z5h2xSZ|Rp8yXimx{{W!&QHxd=GYY8uZx`5ZrZ2hhNbrf&VdTy?`p2FAB$
z(=T^%aLZu=y^DEe_<hXYd4#-!h1h%iOq|Qj6)!F4o=!fF{_+MlUO$b!1gR_z@KWRV
zXxQUgCOq{3o#S@#(S48d>ep*IURVaJXY+^_q~9ao^Vp?zh_;!CpvjgW-X(IxH#7#y
z4*tlJ1>e*6wS`P#9bbO8lc&De%oy7*B-d|9`?ft<Q~5SA@iy!LN+Bhs=E=G(fNBQF
z+qIb$>JVOiWfToLNX*`?yuGV}6`%irGr1<6d-h}h6Eld8vxTz9WVLY#P!x&3Vi!NW
zHI>#=zG1BUAnSi#$Gww&<%@~US^4UN-1ova95vf>%X^bK@4zB*`dmtrtOjfi*l;A;
zLIonvu%fr&PHe+@mtVk!Eyo$sXDH>%moj5h8QyB&EmapW{`EXL@?Pfb$|b<XJpb!W
z_^1BNMUT%RHaM3^o1LiW&^8f?ZYoQ*^7yL@$lsPvoy;KwILt>+uE%lt!`yyXFKPf#
z$>Qh6k$m?XJeLfCO+PW=>Q9+9{Su4?PjmgP@3K#+L(h>9@%p3=D1MC^je0Wb#_Q>m
zc0KX?Tk`q7ZRB~g$#S0=VUYq{u6pzzeKVuGM$)6+6rP{<9zW$?#ue$Ohek9s?@}JS
z@=?CoeT<-TG0*?{5S{avF@3=-@=FWZpcQbS&`Wm4NNyR{pWlv@F?2`=Y9bMF{kgI=
za9tKhnmok%)qA<5aU1IOzJjakR$`RwWBR?HQgh}|qW5fIiGC?BO}&by93?Gp8;2GI
zF#h20jiP|=J;E>3R&eo?Ul3jN0g-kak>NSL$ka#*a@X?IdyB|jUqG`qBgrF@CcQ4D
zNiX2)Xf~z4!f(5-r%Q(%`VP+ld>rlIW%#g}tbDyc7bQdx^z7z|XTPCvcRm>x_o4tu
z`wL?hmJQ|KijL`9jV-Ds$l7>I=HadIqB?4jl+g&o2!v}Fn0SiTpgK}<#WujwkN>2I
zjDZpKhhDl5L)Q_)KoJ2<Lq!b)&;uS~qz^+e&vNY~LL}3nOI>V8^r#e?+Onye5)v)$
zs8}+C$MKmy0-i*oBI*zy-m-Di2;9d^d;!4oA)P;N$g_{PrbdLsNb1B5k4>UPs6@o(
zkV*x)1remzzkyqyzl_Ag6<i-*ljhA_;EJXscMoO#6N#?{P(eTmqEv*k{FO34(tSC1
zJw2K_r8=fNiTdqokT*{yBQb-9X`v_Vv<MfmWyKtc7|olXe98L7Z*ggd>*@U9A|Aio
z9-1#lBFl6PwH2A+^N3GOBBy~)X%U#hO`RGU)Q$&;q^8qGNrjJcS}<_zeYEr+Vcvw<
z#ElzG`{+or>qrnbV(a%~+>~tgZdu3jACJ;%{4kok)2ZVENTI{fTS&d&2#cTo0`K`f
z>D06qbsHt&R720ALTu*ycVii`usPr(f6p$~ep`=gw)UkXU9eS7;@gcM@>wvKZ=ZXT
zPp4-P+;fo9>yP7X@EkGOL2L?0si5ZNaYV~xU=0I(qYYb5M{)p2B0aq&jrZlUan~Nc
zoH&DbK70mq?|zDY+(|I~GbRjfNbD&ikswg9oh9$3aq;ns=tq!xsjsnr>SrvI-Duf&
z6cf^W;S=e!?IBq>V<lhCp2^o!VyQTEguvkI(7vC=nAY)UNxTkXNDqEp#|y+Hx`<Dz
z3=fh894n6^qJ|U2RhNNd@1uFS7n52vc5dUr>EE*O$0mGf7I8E$!16&)k~a4~-0#25
zj89CidGlqAsngh*Xdv|?9InWsep)K=q31CaZ9CsTZ=>;s!HlR8N#)T5Rt$WdUrUE`
zX^V>(_gq6fN))Ntjd9||8;GGv^Bn4=g^oNn(j@2+82Y&)nKq(hvgzC<GL+5XP;e?b
zo{Dpgg!LFS_CDHFcoAgM#AQR41|Vt(_dIhIS;c-#cM3Tj;yM0BDZZc}AVb$j3PMpi
ztr^WC-E1xM;}ek8{W7uuQSk}0C%(<n!$asFP*8Jv&@j~VNzG_MJ+qwu%{oinT+iq4
ze96zhG~p9}K1U9ktQ-C^8J~{9|Kgj>{wabR-gudc=caNnHW-R>C?=-R(Clq#Wf%C%
z1k#k42sF(`L|Pk~>KpM^!hw0yc<YTyM!oqG+PgE@>Iz_-n)YT1lmA>4KtU=3#U6#C
z+K8z+0j+2ixw}3ATM8*PvqQ!6fQsYW5Jm-7&47QHFfj~_pbsP9!_Y$l#S|ursUr;y
zLota|0?a+^Lksx1Eb(k*9|Qq^cy)zopi2|o42u>sw3Jb5DWqf`py224*(L|kP1(Wp
z_hWEe)__LwC4AKVH%2^rA04yfLN|6yUAhmfTkSi_ao1G9vy+OnUW{se^8N2_+(_Fi
z?;&pCR@VG<oa{a-hSYGyYS>f|wQG<jUS)^vV{RK%wOu7^OcTR22+Gh8pCKet6&OHD
zlh$0&<aLtuZrr+YJ7oiHAu~Hg#g>&og8ylLI{Yv#YgVvh^?DZm+LLFdKyg5#n?`tW
zG%=(^Dkg>&MUx)q(}V&JJh6iGe*L*9E-E~gqY;tXgkBdlCfjYJXwxRnJFg#&2{|Ym
zW-N8vbfuo+r*ztCDmrvyK+hIL6Dn^nrOLs%Q+O|J7(X=$x4UwLBjxKj;DwIvN=lCV
zC@gHqs5izj^rEo@lJ+zG@)yYMbtC<nbtUo=!Fh8xa%Ia@e80|S>3P>M*JkH%qD1*_
zGP6AW7%I2$%c2>~<p!qTcrzo;yADtMAwC*4g}u$LWN?@I#3}$$II$BEt6@_#REo&=
zuVi;F^h@{SDXFBaD1jISVskn&AgAh@1i1XMcWHA|IZFI?UccaF%rSS+uU;HZRUxQF
z;Zkix#GZ`G$Z$Ic0IWb$zkyC|YchG=2EJMk&7&8wFeQ<z>enWQ7@GC!OS2Q5zJy6j
zmvO6JN#TKoOucC(JtvHzwPz>qZ`s1$oI9A=vJoFe7~~!ZpxZlfe#;w~vSK-d1~#Ty
z6o8L%xt#5L3}g+7=_};;;S>_$z!BSm3odI>?Es5#I1jL5RWujmLEY31d@;W^8TV(B
z5_@WUX_`u?da$38vX#tV3jMm3uw(sUwjb}tRXHIMZO4t<t%ajh0#i$+W$(VUsy3D5
zt({7$SjH~LN8Ea%-&e3w7pFu#tJ2s!-`~xY0-bA{W|2}Yfm`n1!KzxFd8~#Vd$Aq+
z!bka}<RV5ncd`7t>3kP)H8(5a<C1RNk>TS)3(Zgxg;P3k$A+dPo$j7Iy=o<evVtR<
zzTvI$+v$J*^)xEq$aCBFP}KB3u4`G7w^W0?V@fDu7Cz4053b@RXFc9-5Q9roP|%RR
zB7S~t3|}^%%+t|_S+r>bo9m8YW~(;Lj((3LdnKCo*Z!_rZfbwuBttcUVj|646b@r^
zq@oAQDLJ-_%EEmJ!;cxPz%&CPhf=HI{!s`+#|U^&yi6kyO2`xjLIgn=*frQ)WN@%V
z53R;HRoW0#yaa^|dG4X($A=-p10+HGvVt<8=iLu8xaN8;(V~d7^<-(Q;fx*Ije?Iy
zF>%wYOuVQy^-_~a?e`+vgF2>Zo_GmjXx{%;#$ToKP==e7glHl!xRx8QAIdw&57Y3H
z=b3taJ`*NQX7<s>^c|7Q3j^wsK6Wl5>LQ+-K8WwT#*vzmNKF0CTsdbq$uSU+fpAi!
z#8i9)9Fe3R`-vMaXiQW>GQGyR7%-p_@lJ_fdI_2;(dn1*<ZI{gdUgWwarGGWYCfYr
zeS*dmQ7QcdWH3DQAkpy=6yZpdG!ZhEVINPTXQUHpR`XerCPD~mbm+<TQ^tf=KbQg`
ztIW#;5{<r7#&b!#2DpR>Z>xaZ$Go=}ka77S8X^(WO-`q4xMNHrcSXh#7nR2St36yW
z?iN}`B-6NC2U<01Pp#-kG8*TQ>4y4uzR2|(Zlqc5R9d~)hA-Z_2o(pln+)UD;Q@w4
zMbq$-d-y?ZM@Q3-Ej5k?ojcH~Q3tYPqeySqh(;+Ii^g@QQAQ`8Dq74vo$HZx={pps
zT+E{{cjuK_i6kbZartwL={98&t*V6UiI<&(I*n-CtpjbEwk5;mBC};Pvf>JuKCCWT
zbuM9Q>3l|KH=xsP^9kZYC5T`8379~~YZ=>C@>Nd-rOQurxn>Mkc25hJ&Zzbxj_kH=
z>DZ|&9oy9>!5K-N7V!{Wk51<|!SPXN98CxD{GwdaY8#XSgJ!-#zpYalkQhg7w2P}h
zNaev<cd_!arlh5$(x}J1WWMqWeF#lopZG2jiY)8SENYeh#KS{d5UsRgN!u&AZb)-h
z-q($W8J&5mXfbzpu1B3q-{A;=V#jW%?0%yMG0p_8{csOM-hP<WB~Nl`okWIw@*%Ih
zd<EG#*E3^%0h*?S`&0NO!IdzGXW#A5HyvV0O-UfSepjykY7Z%~5Re8=1&(}qKmBXl
ziHVOTYE&*mro76Xy%YKVp04DiCy<hwN@lm+O#JE|n%eB7)g8h;*V!1I5KDvpH}SR7
zg}w<swto9IqjC}%`uT^vI%PQ7IX5%wz!83Y{6d;%wqa7<BF6V_NUZ^{vPZ^Kw|zT0
zbm&U^mf0k_W2n<K5@MRs=loifzSbH?i(yRrt&rL+VEGF-(Y;nA35juJPE6;?&mX6M
zRtfJ7sY7~N3dvb*xoh`W=6`)Hv82)R{5B+i)e}eKzD$~TnDjbIC}Q$gKDHZ%p<9uY
zziU(r5GZ;JM|?w&I+{HbUxkZ3s~^SY%%(=|+PD+a5r&_VL%$K7eg#p<ZU0Lw%@s6F
zMGEu(WNj~{q_D6MA;h0xNw1K*<z6&<OekVv1PJ;{Dakv4ii4!Y2sFC{De(#ihH#SA
z^iHBv+J&#7f}#W|&#OR-kH>9Skit(zp$|uL0uib}_j~YEm_#Hc5TP0P%8Ds0svsyG
z#HOYYALYa>%cIZ}z|du=XrLpGw3L|e(#n&^s;Uy*S4RHvGIT{EosmRp63y-+GA51)
zvy|KtgXs8poO&Sz#a{G?Br+2s(WIBWqlNf{1kFxFd=iOTfQm|qJ24KYrsFLxC#Xgc
z6DcVyD8dskP>3cuGl2-3PQ~#Gw1jvf?JAg+<Q*--Csmy8SdvoXa7rCtc_ltwBQhZd
zhZ@9FP>$hr6B+3`VJxL;YG~!tS?AzY6y@Ay;uTc`DNf5hGN>#nM2}1%(WQo#?W$n-
z%gH}hLI7|^$CH>4j}sGtf}$CC^2;zIqKR}nuxa2gI!1nlj^a)tGsTTGB`To%N;sNd
zh8p3<?R4W5;7EwUAth)Ao`P~rXCzV44*W&ODXuiYrh#c7opIDiiNSWFy}<5@Bq1dQ
zH|H|KQczT#io9}&i6znnp8R8!_!Ts}f-nS{JAt%hH>Rf&Po*FtDGrwgrniiu!a^#D
zB`r0cNQa8}of}Y?J}Qd*xRMibX%Z3eQdXEpsffVsa1a^k!s(8}shM~R3Mj7hVMvKP
zF_V;NlfvA5JcdNkY{aEz5~H2z%c7_z{&Eiie*m8uz~?iFN=_#++KIpDD8-fLY3&t_
zV)&>m^kO=6%F6;cB4bEQO~U3aqM)#hpyEKoKqrF4<anZ-wzJgLQc$Fa{G&zTe(%5?
zpGbllpu!`GOo@YvLW+vZ@tc4n)MjqGq_XfB#g#e&1=JX7)Qra-UUF;tOF5cfhT?SL
zj)=k~B)BA=!eacY15JjGD>*eD)l*1OxqjmOgd;Z89{?1I8T3(E8pM^HK!ggWzk-s&
z0?MVENQa%sm<R||QdaIk7ofNjNKc8yuIQBKAEU%CK~Zr;C6k`$3RQ~NeUumEQDVA?
za5{*JbmDYJVMqK`J|~7HO#a4!R|-FY!Z&axG)9Ubsx1wFg`Hi$O~&rZA}uo=cWes6
z@KJJX6LB@KAu74u?+X(}f$9ToHB0G}gKssvV?_ZOPIQxJZXfyqujW4>PZ|WB`QGn;
z|5=Zr>hsmMm1t<%Mjmhc0QOhj;r8AcIHmdjbyNJ=!lYpLt5g(i3a$PT3c?IhUYrL+
zk&qMxHapTZP*od|2`x#;8j3TrMzunI3aX|cO>xqrpxWPxqJ#%p8U8!u#Sw}?hx|CI
zzeiPQ`W%DFsh_Rt2Qsw(u#brl5>yRUslKm}AULsQ*e67-`aFaT<fKH%Q2QxL)pV3V
zp7lJ#`>S@mArm@zmVN%YKZ%N}p~%xju%e!<kRA4Nkf#io;r@DJ8RzM3c3PWDd17@%
z^})XSIV$1RA!lC8>g`|EroaFDqH0QbIeWEZJ8@rxY|l^cUnlL_!{;mi=ijkYuIq{I
z!)<m-`<y(t&;!Tmed^o~AxgMERjr#jas0pAURA$sO8EMP780nZ7#;pk=lMJR-jtwL
zJKt*iI`z0ty<TVQ4^n`lopxNNKvwUAXS=r*1y%jM_7A(`sLEOHwQ7Chl>Jt}H$&I&
zFZMSxEJ5;jPw0eIv=9aueoQlnFb$*#A`LG_pcFIcLsK18<o$@lT@$-I?W`4Qr8Ee7
z4OFK}z~cwafh!^+G<~2*biWsWKu2K16&Zok4na=<sh9+H6=#$k;nmTcDgkc*scE=e
zktlivl>vcfci?hH;LyO-{rLO=bfJLVMU=~qrV0Wc9n}v0KoE(7!xf3krXW#}B7mpT
zkBN%i>B8-{VfX?FAu*(ht{Z4hH<2z4sGz*O410MQWxf=WUH`;cM@e$MTZqjpq@r*g
zCC8TIDc*%GrURMvE+i?l8LBPvgqfOx3W{>twUePAxO4m+S}k|#fO5JnJ==Td7HYrq
zSt(C?Rfy9K%;Z@G@hRRB)dub}OIw`nJk7J-5At{Z{`2m`vk2ecZP$>PJAEJK|F+Ff
zJ4Y$RIZR09|1wf~T0c7Hv7J^cM*iQv=l8Zh^W6UUcb%&r{C<0#83FnKJHK=Ed*$5c
zd+y^pcYly)ee-{~x8)yce}Od5-sk@{eeGY5m1FWZ4{Smh2%#g4AV#2spzmO)fK!!o
zsIL^=SA=GF;Va#Y?$76JRx_$*Qg-As#@4)m$EH0&&x8ar+V^MD50$8zit69Q^xFr~
zFeRDfguXoV)gDmx^GestxcSPy)Xy2myps8htKFB!XTHFN8R;}=*^$Zf_AqCBXA%<<
zsM-D!o?RA1QB_Koy~uUF63DEPNJ8)NEZh-9Rk!m*%Zqq?;#itAYfPQYG%k2)YshOs
z6tVT=akNWLCq1<dgU5VHJ_f%&Igb1KT+ZOp14v6qAbZ4{Y&CZC{zbR*{?X;UaAi9h
zjr$6p{!h)XF|a$MNyz9<y|xe1s_%4KpZ6fiHJhO*AdE_+=?nQ2SP4QF78VwkF!`q=
zOdSynU<88%d<FO`wj+f^7y*o6CAz;9-FpNr{&G}zOQZ;#JLIV9<d<z>{+`~fmwp!C
z-jtOSC$I{^qDfEl-H|T5pKB0U)Qg?#R`FZ8AGf-m9a$6Ebnp!>PmTh8EAK9-&3sQ0
z%N}mT6Ib?U)sU@7xr<kNMDod$nH&O=dynU>Ma3L0{*gz_^(^>)6BW3L);2TcNN+am
zJWBqzce3N@sr-n}@y#Fd=v}+Gb4Mw~Yo295z2BI!JdgC)Bh1`oXW-;t2<TtZe)D&{
zHCJ-YywAC#W^W#yzl&pUTpr55_{Uv61-<MWg2mGa7R<nVbP5#*pQqx$%Xp8zMdhK_
zs5tmCWd~lN;>aiHzGI;r2MY@e3yX7NP38RE&)bF(T4t*IF!cbY9z>ct(hOkgHWbB=
z9;hHf1W<lA`A8y6JE@6%xapbR05s^>ne(^LWZw=S(Pk;XE_{hq9j2pJc&X^|Fi}oF
zfnW<R>{b`I6Oa<k)`7_{T}doKJZ<}PLzIJF9RN~j)S^BeHXPt6P;0|y+%xV8KHOA@
zqrl0qu@TtN@dcXm$PK-5I~8Py9$X<`;NU?)<6}qISh9ju{p#~Xg&$9LKPC(+r`(gl
z&_2!R+XSE`7iS1|9V(`R7)-@P`2R%}ZvU)^mvIb7Y$Fs~V*(W`@R#P|sVpbGUKi|6
z2ca;Dpyc36f|UnwM%Bc!p|P;Au&{*5KNiyr3zI-dm>7XTXnCipBMct~0@d(x)Eh(u
zO_F|hSQ7;GLJl1VY6^}Y-NV*RakQ;zQe2wAdAGmG^DmF2=84a5W^OQuu7{Jq6hIpI
zy(S=$rjB14=my}Fm_lIKqe(Wl@bG=#;^^`ofkhqp^6KHNF+J$Sp<v?o8-!MO8U#>7
z*56tbHM6easXedK`Na1ZGVcQ)x^9FGh75v236=WB#E=S+ZW}g@KU}r+ua206f{r@U
z+=@GX2zKXTiVr`?fh{(&a++Xs#ex(F-GgxW|9d;Ss)a1_rTLfHTK}J~ZuLZAd9K2M
zzlU~q|A*7uT|@7Mk~z<Lcb`^7QJgL3;&fYeLWL1E?aVpEP@-w|<CEc>0~PJGD%e#?
z*5_;|O+zKrKBf#8)~i-2GE~@6JGHQ*3>$uFXEsjg`~GmpI`#aj>LZ;|BvNpq4&8|a
z(Quo~KXTo|g)6CExH8;kXPjHLYk6A9fRHP6wPKp#oDg}UKxegMI_-K&(?nF=N2m9N
zGYWKua$HVL^gY-4o@|#>j!THY?IFq%CV%e(H$vAj0-lfuMlgVB_>oc|g^n~8BnGiI
zljn8?X)1M^G&pCkLRAI+%58l2@f_;aJ<QU%I}nZTqGx0b2fN4e#uIPx*yAdL8wm<y
zS~Ikdj;VR^pGf>O@li=YR2^OrA71pZr-q3iuk>N~Ttqey{8sQQ3l^>8!$q5kZmpsr
z@l%O%;#bAMCq4KTCrM44&?@p??zyQ25BHCvP)VmlzbtHyAYK^=>kdg!@!%6WCTXOm
z6!Oc0S$yWagyC&7(EhPG8VblDBKR|s984h)zH%yy4ib}=gE0IEGr+%3l1cc-{$C{`
z6cyF8mnGjHAhlO_>c{-^XOI<5LssOm>DTXAU6@SMRvqckEFn~B`45R2Nzk*G<zKDj
zu-%5LDA?2}G8<%(=nSxL)fS2zb`;G{gc?ch*6qltm5A#s?!bzw5GdHdH$QAew?&as
zza70=rK46q7F9#@A7RDvb?iA-iK=Nd>Tw~h(hW9!{WCkffzaS(cas>CM#JvyNcA0I
z#rz-HDWa&|uqB<_*1;(%IJ{*O8@C<7V+0Af>(Z@zD{3dWkY{uT1y!0<9NNsX{VHuc
zHz(N+-n?C`Te_Ux9tYX2I?%3ZT_SCQ<ExhN+up;JYZ-Lz-<9l`BG%3Mh245MIo$3h
zIX;61om-P(H!=S}Lu;Bs@%n`<*<Fm`Xhy$5O^Fggy!(IS%jNsgRE6mDY&vx7NU~yL
zpkXtM*t}*3Wl`C*ZkSGlQhha$f}-ZJZqBc#99L3&293M7Cb48c%NPE_ZW&G8W^L)%
zq81KSQn+y?tG4W<P)VahpRUwTjzp25`t~sIyY*BCCC(bH>D#>?kwT~R@EYbVJxWH?
z&U9~<il&#aef@R{9JOfEBons=ia5rvi&t|buN)EIls>(hkZ2xZ<+6<&E%6dm9mLdb
zL!S<{ap33J?lt_ld=I8Ooks0C)2^16H9xIl`_Xa~RU@ZcUs`4)pmDZ7te|01a(FfK
zmgbTfKCVC7-z{PCAEiqqhT%sE211UZx*uWaC{l)mi44``)^X5KZYG%mOzh`y29^k1
z#5fz17MRDq6W36u*I*u)(g{0IZ`3nP(x2j~7oXx$&7iE!ZM5ll9&P&%psZFbc0kG+
zbR5{9jF`~i6cLj{w*fk}?ErR?v)j?Vs{==LJ;o02LH?sJaQmx+7&3G)tve*6;Gku{
z3sGvg(U2%=CY=ZMrH%t4k}u)G*+IsQc%FyXNPIOqb7ReM3~tktZt)pmoAoFfb?-}J
zgLo8@x$KFa{PNrkUUN0%@>c2CZ2y0GCW@k9v)OPs9DjJZu%amFy8b_YpR88h7R82?
zK}<sjTPW&f1j<5@FWrYjQU493iHfEbvw7Yo)HdyDkP;F05BWcZ9#A~n`118{>Da8x
zKVO(A8mg>d&7v2%b=>=S{24^|9LA*S<LP5pG5>&CQ&dTyaw}gw^E^LByNNPNIkM#l
z376f$y_eTu!IQ7CF)@Jz-#(VE4>IhnuX*vtPPoOX!9hg<%62gO&KtOKEi_3^rNxjm
zdbUbOtrkdB6d-RCU(I}#`CC0iA6r3Q=NWu4qZKRPdy|ikm0_q7d3*=kgBSA2j(17<
z`cB5&v=v7k4Oycn*GzqlTN)hTlgDr6@$U+#+bD%V{2-E=G$bn_;zY2gdV~gFE=!)e
zg3A^*;`7b38Eh|M&#xcx!Yf~M=-^I@(ns;o+i!7wvspYh{#kxHt`azMfTV}!@cH;i
zetB~$pO^bX(b6M3+3&oBPq)t?L;atlq>83N+0Q&M{%$swxTxG8$I8VY^FkvxhnIcC
zvr|?RWfW2tjG@aTKk@d6xX^&NYd({Qk74J)xB2p=k<?MDf0v4)9OmaYrt(Ea=(qxh
zcXH4@j9FWzV4HP2x8A!4S4{<3cL2A)_8g<K7V_rgiOgDUV3Zsra?Cr-oOme>BTHHF
z=$%~qZ2?(P4&pnHqkH#yMC7mH^V>&q(}uR({csk&nx(>_A9?P|t60`$3SUjTk%pKY
zdi!z4zPTJ-0awH8Xwtbc@wuOI&7eu>t(%gdMpL{0gY@Z88-3dkymI?^UO8l^Zh9N8
ze5fVu;&<}xN3ZeO`U+z6R&cECRA#(!Bi(AK$kSAxqA3{1SMk|xS1@K{JMNyCMUQ5w
z{DI5x=iGvpkICQnlr2mjxm(7E>Z_On1r0q=NpapmRBXg2I78DQLK0*1AtD-)(0Bq7
z(Y4N4F05)M#rr?y-ga~7e{3#8?A1b;Ca0~pKN0N<c>^c{)0EXhm{oZl8k$xW235kL
z?JAFn>fzc@n9wvsYw8uH`t~RH7Yg~F5`{!cP}S4Jy`kd?d0{Bw2<`v>?Q!hbF$xL_
z@cDda^(#4Dm}r_tLP9)IQPIT3L~-1sozus}pZ7A(ga$}VAQCf}!HyO8qd97mnwEq+
zAq_L=rLuS*&X_L5*SZuGty(d^vxSXMEleS+mH?gz_nsOiR}}4x^EzvLoe}Om@mm~f
ze?>u46cn~FE@Lz?v%Y40=S=LTi9Bs8K?;FXwA1=Pct1ipHMC8*!Y|eO))}Gp(6oc9
zs%PEjNdXvcFY|0m9m9Q8IoGsHXlh20p{WUZuBj3rux9~}PaMyN5u5nt!XKG<!)t7+
z`v7w%v_l#aPC38R@1L_!wvvxud6F5C&$00CoRjbGev*Mt7IX2<4|08n1WZ$&IyE5z
zZ2f33!(Z>iFDvd23HY;2D`~1iL7ATjr=6$>JMbMBWWGkvd2e!e%S@aA!cYF^m(h9U
zc-D+FdH(tvh@82H2U2$N(o-)n`^aE^om!Kp`o4<ZYcvxc=oo4fahCQ%K~qc$_swAR
zO&=3`IGYh$-epkve)b(dPDRsBv|uw6F20Z5J#L`?kr^yWy^{OK524|q$u#f0o$)`s
z&WJ{Fq5i0sviGAA^xyChyI$%Nn%+2Lrb<1dpKp1r5d%E0vHa2VNMAOZ_($8bZP^$o
z@{yhx1r)LPoypw$UMw?LJVsLvGv}+RymZA^G`;n4?tb<%>YWi8tacss683y}1%q}z
z#`5cq@x<MakTG)ucgAn#(FfjOTjEgeu+QYJL(LfT++B1keT8oAe&(_n?{STN9Nn&q
z=ED_F(>&UFB8q%y^=sU7=_ialyo$j9<nrBjZ}7zM*)$&c0C!IvMb6$yoIhj}SHJoa
zS9ZxfalZz4y~c%|3V5UBG3r+xZp9Wpczg^qbMNH)4=y|L8(&oB#csC|<8}Z)GAMfr
ztv{N=y`38nc}52fAJ=7{apj>ET#Q7T|J$j{e;JmK$=?|-QB*szH7><dvK3#&5q#wb
z@m1tus)@v=wk9sEHj3s96@^nBM8(v_;YvDZ#aw}pGP8urav-r<(&+E4x0k05h^Ky}
z`rlQ9$GJWmj@pQG?@yX%UpHT64X!BSl<kH1zuy*`rjeVQOL=+uS@$P|S?xPR-V{Oz
z^78V?%E}@!A@20&#8bDIA|%`l9q?i3#R$_tF$0)}55rfAp?lFV@#Ou0Go~R?iOoY|
z5e-c{%91x%lhUsSzq~V-gYG1T+&Y$wwJ-AM+@mBnXvIY%N7F9B1_ar;bT*%Tx|HKm
zqs`Fk8QP;ck-NTT%4f?sQlgQN<|LSPF%MnR6kBy;CNwlvCwIquroTLogSH&{4IfII
zh~+Ff6i26ieW~Zz!n7~f;N85G)nx^UDU&HZG=`@yZw|h-yfg75c8Dl4>tDj1H@Bi_
z`)}<1?Fhwj1$_POChDC(jNt>iQ_Bs-OFv-xck9?+7Nqs?M;P8oXVsg_h`xL<t&{Ee
z%GNSt@(1iNRZ{A=WXLU}X<+lPZ{-Gx4;QdUKg3VJ?4r@Y>lk@{E0P^1rcltdayHIc
zjk{kLvR!tRY9V-46O<m>%kJ$ZWM9yp<Wu^ailznF`Q2{>o8(ZhW-87TgP#WaCZ;|7
z0ox20={Xm2QTqerZI0!NR{$-C)(Oe%+4LLRX-6ZQLh<s?nDOm0_Ldm57;-<uJJ%xG
z0oy;C#EgyQD9$LlU-Kyavjr$BN7ip*#livx&CEF=;x$cS>03*PjOt6Ph6yL8CJxMf
zf%jJ)!z(n}4ZVWBudJinm>YR%++EnRnlpUNHPk<?Vz4PBNwE<p2k!DisL2gz;&7sc
z`?(%C%*^N4G3eFK#A&O@h;7Y|pN<pkwg=BvALkA1031Sz-pEI@AK^gRMU1>|C_U<@
zqMa@j6fnFc?0f%5Vn<&}^2C*)`#7mKSxH$a0#K8wo7NDgeG3~lx20#>Ce#L~bsOVS
zJF<3LIfLuR5upkE75n-0)lFRTMi)3slE0>Dly9HMCv)br<){N^w^2+Ok;=~teO!K9
zCXo(M+6|)r)=&7U>{do5MuoTZA_D<Z)0<EaFn?G^L9ryQR|lf}{&Nhx;Rh*I!B@7Q
zPhZ=@#najoXJ15`voU!~iwHE`fqB4ApTTx^yjznNwK~#V1rl!L&RR2AacDhnO#6jy
zH;iY_vy=G57Q>}?kEf-%iaF1I$)=(Tw5Q%B;kxVSzJD#p4_1<PK{ukkIxb-Gl*QER
z-I?vbe!{pph4jAVe)`slM=`zR1wLimeL5X7x^Uwi0}xx+vGLb@8eI<)ZoieZo|iK0
z((_1-b#Y?ht@kiWQe7H5qlp0a&Y#SCzm^eHV#vJwW^T*b!<=WnWK&@opFI68F+;DS
zR~?PND<RAhCVywlMA3+?(VOVh9{9@-P+7VYe`OJxt2PNWTHub1J@b|kqT17TwLxE~
zxMMqT<$W>KjriTM^uLaS2M^MrLkDWrs&z5~5q|3Qc)SQ1a#=J@6Q9qAp&RVjxt;v{
ze3~?F2)|R5T$m=p3?hsmrs>1)IU0&Y839DlgW*>&0wt*KrkH{K82*CO_OPGNCtt(T
zA4k(O)=Sy8>0G|0ge&X%kR^Nh<*o1d?r0NMJ>7<q<x_cW!sl#>>qLv#pLuJ%7yr{Q
zb5*)QWm!48y_D&Xd_&^%y?9Wwg$sa%`+{Onx_dESJo*{CGaFH-bQjB3EWzLE5DT8z
ziim5Dvh*Xq&ev(`_7ju_dSw}9ULDii#dmkT#!6cj*=`R7>*n%dSp&N4n89shz9M$a
zO|;Gbm6z^6Kz>A1p1)`>kA1v|5|4sgGpG!Js_x*!haaa-rvWsJ+RB`<H}dYGj&y8r
zoHetTv-N0m-hU#8!^>V|>@(ZQ7&VOMN4{g?9i_+_Q@E>3O86<(#+n!BP^(u5>bhOw
zB7T6TqM%Z~`w+|DUqQkJ?Mc>DR1uEWs0!d>+xrU$+#E}tnyH~^q^W?qj|F$W%rcQl
z?P#6y4IeR8tA|VWq;3*G1d-8TFRdT|1h-D($*HqAq^A<)GN|+m6bJ13@(w0`e1O;*
z$=KZjpApKhf#dAjzMVD7Q0}cm$el}5ft7r*If>+cooEog)ersfFb}`K9$P{x4u_4(
zz&5sTYlgFME&0a}aQMgX_$j|Tizd}QH98ZnAiI11RAzqj8|x|}Xz|?L^r)YNO_-rR
zeqcTy92?4;?QCFcPtP$Oc;mt>8nn$KEp;Ft4vPhuN}tgqDPO#u0}Eeb?5aGTeD8iP
z&W<{D3fVL$I`9qmZEefjS4HxKE>5_gN>ie08o{L>u_mC=bI|q3Uq>;2e`|Wsm~8J_
z7RUnx3qqB7RaM8g?|VKg9KrPVp{J!&qO0MjCtV0MTO`RDh0K2Z6<XB0h{O54s9z@%
zhYie_SdwKiWrYel+nMw1lgv5nK&juFJEslB#Q~=NwvU3Etr?c{13!4=$s8!HTGDV>
z&?-X5yYG8GFC5PFRsh}TF>)DKkE+Sc1{u_Eel1^i=)$UZo@LRoO!m@==5iB@jQt!d
zT~EQ*rr0}dBe%2yed9E)+}DZ4Z-T$vgWvQ}Ru;hSJ;dy_+u0)8a&_Ys%-wCnP9FOY
zrc>rBK-di&Yo>9{bvewNJBrq6J-Fk(Le}j+%#ttfW33XygPlt_uq}&((#^<2EBW@3
z1MCU3;gu0_99Z}U)8{T_b(xFClkedCW;IZOppdvCTnPUrX58`$o#*r?SQ$F5@{$UC
zfAeAkOPKu4h>$eL9aopgxVooAGD36Ne@tOWso;uj$t4f83`I7C)wWgm{eCn}BNz;#
z>pG?xngTIRlk)OP4AVdeK`;=ctfB&!(@9VdVhd`V)y?jd>t`VJ07fu?VfYAmjv)<!
zAc$#rF@h$#zW`T4W7G&Y$kPj)+ldxQB-I<lQ<HmQ?0<z$EnmX_%R$~~UCPRjCUM7e
zU$E`zhV1$BC-$ZeVCv@&(HNM0b4O+`noXaFNAt+@m%@hYxh?-g?j79~?Z`YH95;g<
zhJ)l<Lzwi^1>~=r&8xE(QTLX*WCk`c=c__uyL`Y0_kPM9?+)gj(qTOJ#I1B{ew4`{
z6c9c6MQ&+V199kero1-?am95c>Brfzdkd>RzJvj_qj1Ky<DxMSb9cQFBo80Q@}<9_
zclWYw)fN(Oc!yVSZcS`BVi6@1iPQw113xltK@8*br!qu^eLug-V-v^mjlPI_(t#tX
zJ6GQG2v?>L#_W0@o7e5Z)1`#Z?wP`(Lr2)PXBVz(k1;L6P5<#Txw?6P{5795Y0_-=
zR1|aUU<F@a_8W~`4&u5yuBTPZ0p?G6gHM-kVfXrdh=O%|^s=39H^0Fx=hehr^fNEM
z`vu-huOd!VaO}_ze7)@g#=2^pkfaKPqLx(f@r0S|Zg4BlJUc90z8>)Z#Phc<qUPtz
zc(!XemmySC9`)EEw(s~E=g_&-s?sF@%jU8@*~x%T&4>nI4X=#(64x_dGUc-RL<2$3
zT$U;-vE9e<{C#e=&3}R$@4uY|<LA@p$7gx;wM85k4H$6iSjG%)h|?8GWNaLbYNR55
z*vO7nnY2!fL^BljeESY1!``H$4SdBr*tvcq{qA^#n2O`<%ZK;pZs*~_jc9Z6Ews59
z5Pi71@#FlkVkrGH1k>(%g<p@CB5mh$@3eswPye0<lRhKW`!SIYJ5doKVWMd^IQkX$
zzcP)I)=zVB?R2=a9q)~On5({jn~YBNDX&bSK@A(K3PLy7{rz+*N6e%(fb_8c$C*6&
z>^zPtwdpqWdTzb89f?ialCX9c8`kW@c5oZ3k9H<#8W?&tyZ2BfOcd3ID<+;AH6pPG
z;qWipIFhx20>6XCqlb}j-48@3+i(FGn|Xi28+^a>2tLuByWhWsE(vZ#z+lf0GpM}c
z16l)~yiM%ivzPuiKTKTtQFato@b=Q<+&bZWJ{<K5*R=bZhUeu_QjkDSMhpSPLuJF!
zygjM~<etaHoyIV?cq=zPbvp+xS<JAfZ=vJb&w2capC*$>k}z%s(XkpX960p~O0xzt
z>9JwdcMPGt{xCjS*_Wmlbm00&I{;n|Ef~)wx4q1&W_?jzNi-k&C}Z!wi_h*K&0AkQ
z&-xLMQ!^@($e1`9rluknZ)SVT+O$iHrBUC$1b_LAlF|zFUCY_%c%18=xSf5ME#~rP
z?&N&rAIhb&gvo#OtWG!&<p0b++4JM?qbiRil>cz@Wtalp&@pra!!$5-BQ$D=P<@C{
zEtLPE#jBQkhhL_yBZMBB%F$H}HHZ<Y#3d>*6dfUzGbZ3nvo@EGXp2(?GrkVJ?X754
z2f#sGTq;fcM<_Qc@s(u~AKi-d@RnV>N3rOTPI)E3_gwH)IoD0<LS~eT=}n?uix#*{
zJF%&$xbWf2v*AwZOuLpbL>w8w)jeBsVRi&sr(|-UT}9r&yGd*20E+M{eke9E1St6x
z`0btP-aeItq69iNy^!`7#!;}sMNZ8ey3_-Rp<a}mJq7t3jv2u#k9t_N`Yo=yG>=|m
z-(gH|8>$i-I7GgmpmqU`!jHr?GHTMXy^p-3P}_{7O@sQhOb1A$soT!_5+7b8n#_hx
zXpt0)cT)*bO`Fju(oK3)XgIRRq|>-<E1ZY-LPa5U+P9}kW(Lt3fQzK899jl7j6;<K
z>*dg}W<1%6PE-YCK^Z=^6CK*8lT<E9YuSnRW+C~X?7|nG4yY)HU}7=}>|%RfeVX^p
zA-n47TGP-9wzAFBk4cT3C_-R{*WYWJ<oLlo?D#2yVdH9t@`4CO1D1ZZpA<)PIyMc-
z5=ytSrK|_n=EUO)KeU);0BLv8y+s@VX|>ujxZbZ67C}r}7R}nUAyZ~jE5(HY)ard5
z_n!x_kRi1m;)~vGY0|eIQR+SxyyIc`yX{a2P`LLuzI{EwWxF5X0!mr<!bIMj`59XW
zKS~=+OjASCdeSrQHP+{Q@R(`TZrp_OG!JMsaT#lQ|D`Y4x@|C*mhEKA!AkbuKAjq`
zTul@2X5M<^Jyz7bi+69iIF#Sgc>+&P%wh4`L)g32Vb2G9$!TCmwMopteils+aK$HW
z!w+H_5eYSE(xwe*N(yyqCJ{?1zfF3LIonF8(Y+%r8x@flnL;qN5JL~GWYS7YIj$tr
zF;!xVtk1>cU*Tek`StyWc=)BY6kk<?pPqSx?{+LfU$KG%<y*0JXw4%RCsRA85zXBx
z1Vt8cb~Q9DZSH5$i~u7)Z43Cx-MoVDKhzkx@d0{L%$$ki`DEJX<WIky$&-?pvuFoO
z_j>G~l}p1cm9-9)ZY?uHd3=do7}>()XbBjy6pt=3fSr4m@y%23!|t`PdIft6Hj*&J
zhTn*wbJH5cI{?~qMOzn(eG*|vgep)p2hnv0&@=Ejhx2t3l45C>2@p%$#*Nre>Y<<r
zT6G!Cy<J8FKXGNf`}n*|TUzxyz>G_$va5YP8b`OHS%WP&6^SlN@#rRAKj8X%pKL8*
zV)5Ul0cBNvkkej5{%#f3b4E-I13l;qRTtL%7(qWm3RIyZO%*dJaLNEb9QUF4gIths
z=AvN*15ZUbAHodalR81YO0?(%QBiCO#HH<{VBJsbVE}D8#-|^<P<m%jFVW=3%NNjU
z><jeGNk#?K)Q(&`p<}ggDMd?Bh=^8cGWs5d+pFF;SbhHv8ub~DSh1H~OUuaaCI|={
z$w?YE6-3P>5^aZxxo|uWW>sxh$(kiPx~}67PZb44=tnb%okjyk(P&^_YTwtHM;2~k
zco$n}1(c$q)r=u3_y#M=?x$(2pWWMbu;`Z-jDH^Vpdb*`35J6A1f)b_5U{1w_lDc)
zOBrv?yN{Z8-%G#vsPI&dotOrFxMgA=4lG{4tnxJs9RCmvkw{@+h*a8NdMzC=`C{$;
zct?!n(q1izA{<%FOd(M_fV=PgObCZSg8P5txz&q!doi5XWjkvMkKu3Lngp_GnZ1Q~
zx36Yvpe3!H;iTEjE_6wGlJ{5MNB0X;u~p4O_;XqJ%NP8dG>Qjm0z#l_DwKS~2OBGK
zp5Ke6QQ`48t_$5VAL7&1H`Aw467iab!_kI%IXCgt7sU)3Wn=I9MZCAWH6PT1q*_C{
zx82Z_Q#sZBQOqKaM%SlzbOa6sihiELTl!^u+{OiX(dBV+effC9!+=eVB0A{AQI(IR
z0qY*+jbjz`ubWI{L^cC&y@!ES{XTGjvG2Xhu0RRL_c|%xaDb*=+fmObX5j~)GT(6}
z?>s()#wYq;G;Ic7Lz}^n`$88kXgY-JQe$yQg`+>e!h6bazHF_8gq{*XTC0n>yVb=f
zyKnv%y!`V~YF+*)Pu=3?nJ<5$sGuH$1}faTbU#BoW#d{li-j%DV`_BuJ1jt@A*paR
zq5p*!(d^|cj>i<T^zadEMspfxCxDv7dDq^~dDW(Jga{qi`^pIBwhrAVL3xZ^Z$VhB
z+OQKvw5ehM4SJ8@p59P0Z6JMXw&Jpk%ZY3AAP;}FlM#&*QTNT_spV~Wv8ljZ6}n&n
z6Y6vs#Y0n@Q5aLis)Af(bbad8xsaq5uQGPUYR((loutTFO#VKbp^rr3v@57+5G-c>
zCwDO`;~G9|lF2&}FZ22m=+I+7^Ox*nrMQ4GiPe8)iZ~Kkmo^CrxHmt~gF70r=Cg66
zDnD?;yPN-UP6n1R`P(1owUd3~ES*ECmL?#D0BI$U{F5+E9ReqXiK+WR2qZefR8dty
zgiWyOIJko*19MJ)645DFig1~NP!!rvDJ9`KUWtK+QnQF+?DW6sW>(+wIG3e1#_bG{
z-s66rzM&u9c|*8i@fUb^{J;X60*!Cui}$Xfj$J*`i&QO+mVHNY?ZP`56IF+2>f5Mj
zHjvA+4zhDqB*R|$n6WjkrS~I`@%-nH(yh-S#$MKuw@1Fonu+~+?2-9g+NdsH)_38J
zs>=lvCv!(skWyJePym|1uar`1x09H+l6&tQ&zD=vaUIH}->lliI1f-Ji}08#(KQG0
z(7g+}zD`qKNfEeW+jG^kZ_}O<=9^`d3QyQ@PvE75auE!BS_q_Kr{9aW<8(VtUAbYJ
z2vw5Qq9vD3Xh1TAR~0BBBP~-w(@Z))bRA|!4IHv6QCmRF1x$YG8wR(j%eQqS@JD9S
z>9%K>G^!gzuZ*N-R7;u;8N>5;HUVJx+YhnzlE=8R=5rV^K6*d&9Z!vF#rUsp<*M%8
zX`Sl85uLy_Z!Y2bn6-TU!BUcLpGrC)WGGs)^Rrp3D6(-?kJh*WQ<$h)J?{Maes1hB
zj2=&`C=oV>zPN(XuT5at6%A<mcnUVH9+$s1lQx76x2g$=Eg#;?!!LfpHr<W7FOjyd
zKf~Y-={U&a%O^e{IQSb{xdcMGsFgE-Ylbi8uJ~q5Og)Yn)16yinN7md=NNU@tE~1$
zlV2Li;0GshW52q%POLnt8acA)Iy#H4=p0_Fvi`#WJ%=_yS^XOCKlmiyQJ>@AJxl4)
ze7cMuPs?rFSg`O14%t1Z4Tdr4h0(N#bs^0IeEH0$aQR|dD514&NO@|aysDw4bYoE0
zkC{BVHM76%L(+ylv^E7z@19Jri?86qPZcU-yYb9>ml0RCk(aL-#v8jG*eX?GvM%E8
zFYcgOqK#%_a)1JC3s+#qccfFxBwS}qeJdajhK_5<Pc#Q4k>s=<%&<O7xhbJJu}Oz9
zlP=-GcSlnC_8nX>c|HfD{ZR8l?tkWHx+cY7zWyrT4;e|9&!eEkNyjOl(~}^_@KP#E
z@c6-z*_J`Kv;~TZS-BREw-v2wMU(UN^IUPw7;fqGI(mU5bL=||s_SRgO`UjlrH7!Y
z;EV6Vi=W&^r|cl&uHM{pWjqZ<JP|pUbN@%zV9bA%p^r>wLogC`Uo5SrJk8}@lfg5H
zA?YKzpz|j<Yd0msUW(5Q-EF0^6#qXU>TWF;{#zg4P0Y$=n871R(?Cia3JOw${7s|~
z2%#et4M$`HTnX(_ZPA>yRHVgO(KL;ZKKh6rJ$jIolteJ7hn#hVKsQXv%F04hIfj9*
z8~FWxTuvv4jvOE=Dw4kEpU<IU{hZ5%bGO`s&5;-qCWeoox0K?%{irxdN_1hf3p50|
z!30bLnzkH6RBGq&3MmCuE9bzfL)aQNq(+p6G>X{2u7H@<O-OU<R2JrP^k9(Wmi0-{
z3<?i!Wz)v}l#3YZwr@p~^mx4cSF`z885I>qXqj+a4xQU&5p~L{92HHIR2J@G{mPw`
z0Wv<F45xu3I*If;bxF|ovV4o5+Kn0$=UL0TEqPQXwdDM!>8SEJ8-ChAo*@wSC{i1>
zpm{_Y2M(E}w5UV8>L-8K0m`&wveOMVt=q!U5)X=&P5T~=NOD(lVC7*PO&XCNsbL0>
zvhK(A<O>I}X?1DSwjPlLC_Z?If=U-P8r395^^&`JKi-%cWYmnuDFw31{Oueoyc9+I
zo#n#eCG%%27uHb7XX8)nITkdLHWvvw?dg;jWar9X*z8NCX|q-|%y3~C5}Qq-c<VYg
z?a!rLn4~rBPV<`axa@xRFImP;PXNX4B&$tt>bUaQx8or8I_;?wE5a*_B&CP9bEw=w
zMx6#Ex~c|76-_favSK;gN-8lFg<7rq&@@SMWbGo><*US|)S+Gb`nXRye+5m0()}CR
zyz?++LP3a3+V^NeTC^P@yd2rIp31Z~G)i_LP*61mfBAmaF4;mcDsh?hXw|AA_M=-_
zw`C7SL69*G=-fJoq-f=w`38z22~_5BXh$VU?Q)1LJ;d%U+sO|o1cL^qVUX0YA#vs9
z96NptkCenW?nT?|XzZ9s>E-aIjrcO!(<n(hr>UB%X$10jv1Q{nj@WCF9jg&vE1UGh
z7(CmTvHD;sW>QP~w#mQ<7PIfS73{81KsrgR(Ugv@Q$ykv6;1P#zw-cPS_0{HQgLIR
z#cB5R;|jHLW$|9tE!{>58i`qrXw$qdzU`~ou<IBeMH1Vf3vKEr;Z{r(Rik*zFRVV|
z0Y^G*d$%A_=y)sgIJ~ox#MTW-QqAzbgB0vJNQoIkdi@$iso*`Zo;AA;Q=%u+x_29D
zMi?CYZ7JJ}41{7QrdB(;HV#ekiOOPjt^1X&#gWu*+?3W0((oSK$c7yUDK!*KkxsjA
zO-YY)Adr-9TgKW$m5BIk>c^P4>og=TaEyaHJS4Wx2_M(r_OoqR!sKriCVm1%@8F2e
zM#@_FO1{BUUWsB$A*EJxOfwh?kVun?{Cz|uUWh9;=L`=Mi@#5p<ZXYN%93rE0u;r8
zFmy_b4kHZ*@re<rHVxA-ao7|h;#-nX_c~nBHLG32aM)Z_{SZ|D`=obF=m|3H^Kpvx
zwLnqN^f3|U+1(wL>f4{}h+$i66-`kPrirSmClY_nkO|GnRX$YrpgDPLT9wT=3W{?2
zDu>g~^OXHnJHN0Gi4dX0QB74&T8ICsk7%c#UubGi3%^;Fqf{mGLVi8f^MuakV`7Gv
z1*>5%AX#ld5Bar(JX$zSKq_b5$BDK&hh_U2J|Cy#x~SETGu#(Wv5v1gziKx8{Lgmu
zC&Zu{^1YDCsoS4p0`!#QIP=)fAx=&|KPfN;)!L@2-z%rQcc$;lX_oY7KdZC1*(vu=
zmA%24?HFpZ(~cwD_fNFfDc4as#gbk?=zgj?Ur{As)U)2_r<YF<LY%O)uihU*g8a<=
zaANh^|F$H+pCe2xLGt$ntEejQhUP?5bYe0mpcSv=$oA<7HGvwn>mrp<2NL=^gi-PD
z<7)ojp)5(NH->0WE)|9AC_BD_^3ucLXhde?{-o4whH8sMN)e8ZI75G*;-~UQy<-%V
z6ZK3^?MLzt`@NiPdrtkKuR4m;_bJbwSY7?t#0jx=wjcY`wm)Nk;q#MK0<B7r{DslW
zv!0)M)`9ix$8~mZAM>pKLE;>V>f#UY<BToO*;r@W{&ZiW-~0amq3NpcNB(cOmw(ti
z@m%M3wsZUaeOB+Q{O{WAtoP5k79E`H+Mm6jRNuF9*7H60d7ZUC32}~l{apL`=PaJE
zgvsAHsGaPB5+U+X#ZFW$2_xvGEN>rCZiUFing}y^B6^}=S(N;vA~KFR-1b-^V(OAq
zdk|6>pxDuDE>z7<btNgO$`P`zpoN8ng(Xb>soF$Ve}eHNr3=&0Q8XP>_hJMp5QYz7
z`2WxjO+$ptiLA)VS)MB7Da(eX5D2r{5@H#C{cnUr*z8VG9cZc}Wc!W`Pjy&kG8PsV
z7XMpRs|o%tLIvrn2CvY7sUw9S)6@|nh^c!q17)F?89>T&S9(-6lk%gVaZBcKzVvD*
z=BX7$Mbk7iO$*I8N>Ef4C0sj4s}eD%eD35is#<8CQ`NLH%AqT2wQWvp6xt@VZ#8U8
zrJZ^V5Z-4fFQMxFlV7Wba|`}OEgde@CxkqaUn0WR^QLKpUcwBQH4oPh3jg!JR++M@
zu8S2Fv9PePup%b^j!*I7c|;*}FnpLs0AU(P5kTr548I*S=tEQOlpp&Zhr1?@$n-N3
zV5N{09nPmruORPmDJ8Yt#7AiaDvQX^D<i15h)ql)F;>G<SOQKP{>lm}{6S(;YY`_4
zIaKIDC>l|THAsw5Fmx{!1p%}umD0Roggb`Bq-3Hr0jj`LoJUcq7Xye&N+%)8g{Jr^
zKVFHj>y%g8Ny>;t6da<^qkzppWMT>_Ztz!n@Kt#6E0SP9Co(RM=*SrCsz5b894pp|
zj*B9~uKu6L_=JQ6N=r+z+wEc3*N`Dor~qClK~~iigiXWYv?I(=PKev>KCAt|g@uKM
zg(Xb>Q)LN47zm*wbRAQc5cHLYp4^QfM$n7m2QyHC=7_;tvKu{6fHNxnl(AY-6#V60
zp1p7abISvKJ*Y1~PW*%~uYv_n-pgGtFQzz{#f1;Q$XgSeGv|iUEKRIU#lbBsTeOtg
zkNm*H@gH!<i{DdHR7A#|%UCnHIR(3Ba8LL5Nf_UYl@p$4XZ;@B`P`R0J}@4N7V+Y>
z5Af20{TNCK4X*i+w;mfwtJL*OYI_@px<s>TbvxeM^Z+G~c4X|ADnVBqjjw!{Ws}>m
z;j_s+eczWHY14whmhXwb@&P8^`5@<~tFY=(x=yh1%p2pmG$#&B@&Bz&gb-w9WwCqr
zZq}?_b4CHg>RJ9(`8#&Ioy3Ghl9H1CR$FEZ3kwTNm{|Pf2t&sV1~Bvhrcr^v;sC-V
zR1{A4p!kCrzGFCRjz{zV1R{8*ypfWKxG0|8^Z{C%kGWv?YzC|4teP=_*FV#kxG|T@
z4!_22^Oy43p4!xoFW{3o@w~t4XFf~)oHh;ma?hAmtlm8X_l8HP+4psRm^_X4nn_;i
z0geQQvDSQoUtb!_<Ig?8x`9t~@PP>|cVEsA!3Su?HpaIc#;afC@baxuxaD3-J1l3{
z$Bl5QV7#)67I*ID;OftKZNi%@oII0SGLJlWW3GQ^HaDk#$MCVg@Z0JGoPTi^KhFJy
zVb{Gtx2*VZ5w`zB`wBsPd^{aGbRZ%k0`0WA^i|V5r!Tiv6a}Bphi<K=x3I9Vu!PBf
z6NYJE3tO3+dH_S$5oS2oL=X8>7{N*+g%=g`cZ^>prtshw2EGa))<dwkgf06P^Tg$C
zc%sCMx8=255$B_%B#T?dUqz4l8qkzW9OvQant@FN*`f=>#8M6)g*K*>tQr?`#UpJ2
zXxzRfo%a94;azzgFK9_tvrg0r{U2_;9-bBzc(7xNHeA>>4MmZd<@;Fj_+4B)dn?HS
zNT_oWQ9wXXA*Xg7TGs~X$Th|Se%`u=f{XX?-SMj#a7ANMo%~CduSproEeQsLe^{8P
zsv4T=vAU>*g@wgmik1BOH)EPQM$m^5^kM|Pm_dKYT*}lDx*sFpK{I^ps|ZpQG|`lE
zPijaEOw~?A6o5uhMA5j%9n9IVgFOcik^9x7T#yt)na_{UV-Ns9CxDJWXoS)?%^-ek
zXeua*j@O^d?xO$(2lwq|$F>Ag>qg*k=2GH2N=5j)*RONnjBw&a0tUgLi6RY3SG>mP
z8C}WUx0hAlzC<ruX}CT|s18i1dTSgP+?&C1-xl5*HHBlXQ%J0t2w2l778Vv3R>Z{O
zuS0^+^^hnD_`=gU0i-aIrj8T}(lm*-nLN46pgB6t8_09)O2uwZBgVd*886MkbxBXU
zp5Kg&_g~|-t0TF(qefn2ONNiCf#UGs5qc>4q8NB7!x6640zoP%Cm<A575t^!S@8aJ
zB4f9*?1w|db$X1BS^^0dr1Sl|vv_*4pq=w4KHG5#*WcBgcs5fZ%5aE~!=UO+AToP3
zZ%%s^&xT)Fe$+vKz*Ia`NQoiB^0?tB&eI-X^3O$#xvD935<&^R78Vv37XMvn6DLlb
zXhlx`4iu!+DbM>3MRj8Ye3-fq-Cv2nvJ_QSaYrbqszg<wGGM2Ml1p~Y_Shn7oRP!{
z8g@qt2?=Xh_~Su*89lhDM{k<7bh2&sY?f}{&gSxHnzw051I0;9gXT2ONyV)g_>Qa8
z?%t7l$q}eh$Dbcb!~SiFFWtt{na4>#U$WqfHN<!8#~qJcM2Z55t$L8eUY2}0i=VeA
za^>rHa9N8KYy|Nhw~^heBXtv;I5V5jBzG<|m*f(t)rT7|Z%lUc=EPO{utn9OS=UA+
zV1g1u*5SAL)X|$EgD<0T+`rEC)9dvjrNm~lg{;=AUxjMRmrsA+G))|K8y;Q7X;X07
zRcjHjg@uL1pNp_+<@}ApM3_EuH{XvQ^dbZ(*f0Vfit`VkN*i$rPE-v{0Wo$TxSNsC
z=>F4ct(+!L!Z{RDN`#c*`U};rxCr}nDB(I0va0S!l^t<ay-oddbfn+&1qx3zv6G2C
zv2EM7ZD(RTnb;HCwrwXJ+qN^&?fHD)-+OPZ{;yZB=b)adI=fHpjmR&~E_d7qlx8`t
zn`!01O$A=$ml05wf5hKC_!PpYD!INku^~5c`B4snT27FkU(Uzpd4uh09=lh3{#_x+
zPZpVyk`y>HC?W^0tgi~(L<0tiq;=8kW!D%j&j0PAQKc5A9|4ML6KW1;;P^c7($n)U
z?P^fT9!GJClu$In&!thZxl9Se{8Cq)xh6-EpC8o)C#S4P2b$%z+1NImyiAI!EHpab
z*C~qY;liub#EDc!cX6=@_uQ;{GCzGsgD-FD5&zuIQ`5NUP83?dDG4WkrKQ9F_i#U2
zAReY2M20<AmK7m$C6T+wuyyAH?oC=cEwh(^jf{-tbL2n=KFa@Ar%PNYrW1YNdU%Ul
zulpV$R*aId8N*wE*rGERJN<Z}Q9jt;-@n)6ZqZom^a-s_Wb>ximETfXPWS3Ijb~w@
z<^K0bUYih=PO!Rn>@?Re@1m~Qi3Vt&S+&3)AWH-!-OT((eMdK~{gQxo`mfjL>qq4x
z$A9AlIy+`%_*hQqE7~K=_N?=2xYTsp_%QH^Ktmz>@x_h?f4cqqN;iaoI=(m%jS2>)
z7z<7v5ka+0_41Yjm1`%`E;uQL<G;G5HaKFaM=O=W0Q@;fE13Go8#GxPO2ww2aYfon
z4f3M8R6!3q_if_#2h9Nb`bkcjiIL$yyG=DZOnaA<pj1#{7rGk2S`KMli`}UecW^lN
z1m#1F<OLOV&M!xB*><eZ$OLXV(12A042#GPJCyo&gulE=_^VM^H-v%7X`#n%@PL1l
z2TniZ-}F(y^NL!&_p>m-<0;pOz~C`!_@=b8|8MFk40SIUD3O7|Q5`atpnNhU;Yc9C
zrz22FL1o6@sge4jaMCC<7Zqex=b#po<0(qhVVF$BLi6*>Pym&G?TgO73DMO_t@P47
z97WhJP%$$DRSuL%`_V?v-o6D}YK5HtZybhq_R*k9P-v>eArZ5`f;9sy!Q+Z!Sb{JE
zoC>je;XD;Zut>v>;?jOm?y-n7133vW@bZP)BO+vp`|)!f<nap&k#G(Lm?t<~bcje;
zu^)t7ZMkJa8d1?RB)i&gCFGIA5U)vkltiOt3*^+`FGRg4l~E-m!bkF877UQNoqsVg
zB}Obrt#;fJ9tsWZ%9Z%a5wj_4?EQ19{yqA>amH6v5;CEaG%+N=EVR3;;Te7~GO#U9
zMjtD*2MutO$FX;VR>f@%S_zZn>xJmXbB`^353+P;@&yu=(S(XfW#jc{f}B<`EyU*4
zfT`d+y!lI!x)WffMFWCDJmvn$=cD!F4%X6nPGd{YHTVNivwt?iZ)7Yv>Y0^um3#gO
zWVfN+?NwK9-JOq*!sJRg7vr6I4h^(=MEU2bz+&iK8&W1tC|ERtK$!g|*?we}8p#X^
z0A&C!#rSTT78*$MXcpJka0MjMnIRC8{L{a+L0I_?R3Ap;r`?v0ST+Hq{x01tLf-1E
zY5j`HIeC1tIqLrUhQY2sRA7%MJb^WecU@_I)!E`vsYhACuPb`A5>|(fR%?Fj`0Z$N
zbu<exCO70meORCQcd@+eet}!gZu4hG+RGlk0?T>6mIlz?Ni~!?{j>%}jLrlL_XeOm
zkwaq`q7<e>EeB?)<3kBVl^u2q?sTAQQA+3HvOkk4wsgIpd?<Nqa0Ng2*Ev;wOtkQu
zF+8lfaAb}s>XVM-v}F^F2V$O9wRPrza39_7wT}Er!6Cd7fS}c`cqy3PxBC$Oam^_v
znL+T<ZiD;GDm#?ym83IZ@?7CoyJ2lawvaawy%b6Ge+#%yQrJ5SMiGg~yCaM#C}T)G
zNjTqV_#HwCd^RL8i}XAEbn+0<Pm3w6mB|rvX@cE>E{yxVDX_MpA@`?ut=|60iB?|G
zpm7QmRBh+CnTEDPD{UWU`>2m_)oJlD{pHvp)axB<d!nJ<*F<J_pz0@IrzgS_QEUR*
zH8^Vmg%_`#22V}}?wMqOsn)dpf3F@eHa^FsrGW}R=Sk3u_5Nl61p<%hVixEzmbp?v
zOu9Fd!-ND&yvsZENER%3OOfWDTSIlfYlyqWcx-E27)=M6n8>$86Q%+Z7DI^ewoP=F
z*H;|{aSy9yxSlQKgUlGwyg%_{dp>c_do%*)8Z0eZqQwA)*XS}YtYP%ob^-~gB2pOD
z-6y1EE*&Al7{w^HqKT{fFm_kzb`hxmmhE>Bxb5Cx1Ztg=>}OGFd1Q+V3CJ~3+|!MU
z+&6twWKRY1e#-&FR0;|Tf8FPJRPyk$xi{QwGAb(_DmLDXZVZ<^O*Pz@BpRw%QOB`b
zyM?Ga!<G_&ivV?$s`QF`r9Wt_q{&1;)P)w#^3@OxPlDLU{mk)vfNg1(S`Y<myw;QV
zLp2!I0#}#@IaIs|K$@$dT6=tW0~Ch(W2K(kK`-dV&$<S^X8Cs#O2*U=si&&Ye2S9y
zj=yikmV349Hz!nb8G#ekS`~@^MM9lmBg{}cU^O#jB@dwByF(ueGc$xi7hO|OflMZa
zq@cb<BG~WUZ3aP6l``72ljulT@Dv92GU&)&<^lsgsG(G0c|Ii!(S9?kzRV+wDy49Z
z@`zCY5-1Vy&@8AZ0OhFUo>>RPcfPtk$dsgDU}2Gkc3imTST5l}h>LiHfu*h#1Ln{1
zOX3-8lC?6V<0YgNrhggZg_#kEqL`2JLdQenDJDU6ntGMeY)P7q$?;?pUJWArG;bNk
z$^vCdTDNi=+>0C&``jue2j6S#nTca4_E_TbH@Cur5Jk>Zwa+vr_+L=>g8(`gbM|~l
z1TS$2hns$WLI;wvN0R?BMQAN5vTjD{iVTY^r|hIeVXa#4zqeOIqknKu9+{k|MP=%U
zj4BUg4jNwQ8caxoTK9heoW}6Z4GN7iF6I0GlH7~1Mup@5@2gKn4dg_ASW$@bl>AS`
zoMghP+Q|QZhQd|MC;H%K<e^3?#;^=z5ESfVfiGl0>KB0uu!<c)-v&{)ahA^fzcE+^
z@(cb;ornQdDC!#!;Jn&%6D`2QtCW=*c_uQWzX<W%N0B>>8c;|$rb%x3zwq6IM?G>N
zPi(S=9>CzX6J;l_Qw8b3xq-XV4FmMjQtUj;$k3}9@z(|f5$HeRluM-lm!=^i@t9jt
z7?41t4E*N{))|8EgRlBnc>K~gJMtyqdQu~q=(+wsNgY}Sm>d~?1(z9vQ!|1drU6se
zJ9E?`i%L`AB7k6T7?!+FOI279`@e|u+mAslW-LcU!Y0_NHmx5V6jKa|C=iOoADISB
zc?3!=*lIbAEKilkTufd?RaDWWwKzJooRUJx00ufTv>1iS2KLMC<Xd@C34F&Mp$SVx
zo+XnGH6)8HZ;_bH=!5KjqZ5;aC2??Ierd_#W?46V)!G>e>IDDvzZC(NEMI6zarYJZ
zFog{L@d-*m3Idiu31<J(8mJHL=Rk_QmmQ3si&(B=$o#5+(#cJ+x^PlP)*y<G*n;z?
z0u$3j+~a;bwE7PQmQgtoAe8?%l@@K6n6C{QPpeH~)?pPc5)t2UXbB!ulh$G`myD6E
zl%q36)(iF)Tm|=+_8ciUzUq$#ds)8tUmF*1w%pxmKhK&igfB-4O-Jr1r~$|b^l#1h
zy?W0F-8_&>4UT>w=pcex06P|`-vY{&k#7GN9nD2#f_sy=B7vEhEMOcj&6BhkYmfyj
z?UO0^hD0Xds63#>okS|j&>X<w?&lrcvCMw(mzx~WbA+9Z@5vjo&wu!Mu7%uS3Zve+
z8nLZsJJrrkV7|d^eN*O|P)~Q1XMaV;2MR>O?#G;C>%SV@R+AVL%=JA(7<o}CG+q(t
zyW0{5&`E6!&?=7Pavl3;WKKND@3N^W-weKMqm$FtWQ{DN)~`NYCi46};M$|J=$q5L
zu4Od-In#Z|X55Z(Gpzi4H#851<`D$v?usQ3R~;eC_)0E?DykSB8Oe3Kt;)$)Y-xn~
zy}eo+Zw0t*d-nanLc|%AOai>0fg#8jjyJr<2%}gpg5_5*@*q@_(aQvbY%RGyBBuFf
zDs<r!UQEfxaG$Z@%P+<?k1-nU<}jn0>Cjc_(bGjt`z>~!haDp=9+r?)^5|mY%Oak~
zF+LRIE}IQ)!6OLyhRWU<?aP=3_a_=Q90l`H=O{mKDtR6+957ekfeT(em($)N$Q4~j
zKG-Kb)6+0F<F6A}Gc4r7R&dBC$@(|`vH5ZzALiJ6TmHMD0Jv&*Yv_(Ag1sW5)7AyQ
zVu~^p66fRT!*%-})2&XA$qe>b(ceGn%%-qo2>4?Fr;R`&aG;?xz9L4YVfq%Hi6eR<
zdm;fCkctCXSfg?SS->dLBeic8JgSp9Q6ww}UqAH~JGEa80&?)xqY7{0vv4UjC)K6v
zG1-d0-x+{-2uANzj;yNT4pz>k=fOh^;q0Ayd=iQw%7ErdFT4A$>PEDHBKUDcc=c$>
zDgbWUFB_dH3DJo+vOHcQw!Zybun?`0vv)8cV0p^1)o;U<!JZnh^*aI}>YL4%uRY+p
zpl8*S%q97mHJMP7ZhPOu-ycnp@bP7zoLHPK*T^T5$(}6N5HwjW*5{M`b6#NZoe_cx
zK!(fR8G?F2@<bwn3kKf0!BfVNK>kUAYcslR=~3+sM<if9DQX+&UF#0YkBi-x@kqCu
z(%jN;c+B%-xh?Z8fi-Cy6J_tr0g(9`#Zd=r%T+scK1nn2f@X=KKVHtEE|n;g72XcZ
z{L+EgH}jpY&Au@Sqn-`^CTfJ)p-~6@-Hm}_e0wxO--_`}SHYKdceZX%`57HYQbY<A
zEIX~wzaL_Q+nd2Hsmb*A<5JQg-~}>N7EN^bvSs@y%WcaLP%P_mwecr26W7VfDLgv5
zsIwDSwjqT<^S^X)z)xjF%;>@o!x!a`sEkM`%WNY~5SdvzpR1GF*|@rs`1e?Am>5}L
zfXJ3})|l)tbwftS3hkHJ(EW=)!I<xp-X1Hrm709@=^OrjMvQ^#4CZ)N(~0k<!`g@>
z3?l8p2RT_?z5@ugTeI<kYEXDpT_{^s$^B=A+uivdIGYWZ2tA&FAU1ksh6jI3k6T*5
za9AB;_Anu6rMk{ZnBT!b3BIYvr;ysE%}8m97+|y~R6YA6jkXB6brQePcDLUyan$cb
zCk83dfMN7;S%2pJ^&SY_ve>M|jgCqH1={2^%S`?|mM!PYW^y<Zt5uKn01=Pd6uX~0
zoZ#~@$PdI1-}vPJ-y+CAl29y3fn1HGSnS$4t*WfF&T_Cd-N`UVj%7NkFIxpewx(}K
znkx?9RJfsJ?j+Dv1b=JFQCTn|oV37@nrqokqDu>2QkKqiS&-bvt}D{er`~~@)iUQt
zAw`e>UNF86Z#}H-T61pbIZ(Z`HZ^p)dDv@GSZg9X%A=IOObY^1t;YPCEt>1YTG2_P
z=$UrcCmGM|F_ae#4V{>o?zq~zBmPM3wdCg?_bxp&(LNy9k;+O9g`93?wNgt2><~*y
z37t9SKE#G0a#*o-cR??a?K4%cTf+Lc+wW~NF_DIt?dY7Z7!|y-1uvt^Xaw(Y!W0xM
ziYk!V2|-E8?%}bHdk*UYQfT0HSC|VA@r4U*4^fBxi(*nLqJn~iG7&1OETX$;Gf1)p
zf5C&3@|MehvPl=b`FWP(mdUXYg4-<{di&^H7q8jY2|~y?l;~(hNr%eh_ebW)Q6Gnn
zYwFvn`FW}>UF=hSGOGlXq!17gD>iJn2#{7y!*NRame@cDS%46UjwCk|i7Y_Ce-w(`
zLl0+8E`+1yDK;~`{$HVm*k21imP7OmE<)-m)<C*LxhX0-_k$|3Md_3=T<TQJD$A9l
zKv`Y{&F0AhH~vrfHqK+PK<3jkR?rtGc;6o_aY03)VT+O;`dekH-<0%_D6%pjL;zMn
z1<DeR(tTEtDk-Fp$*n>D_w>?o&qxXoIT1O~fZm9i|Ein!u76chh2dgcMLF^V^1~tU
zV+?~M=f;IRS7t#(y@aY)qa;=M@)qVsdAHhr^38FRTY*|Almr|my;!-?j~z0$bm3|~
zO+;qWFX%*2b#U;|$*^U8rc=(4AQ5mc1>Dr@=lvLm1bb1L{|erEAb*$4r%ga$WPVoW
zQ5;Gz+Pg8ca0Sh&scPfF!JlB7Q(@4vZBzeh6tejE_!S$!&J60vz?tKQ;0R!F9s){>
z*eunL_Gpw+<WhcpSN=Z!ht*jQ3hi-0C&iCTt^}3RwDrd<fw-#bg)0!h$D8^dS#GdN
z`!D|a(KTBFiZ!bYZgXgR;P=10pli#^)06~N1)9{5wf{NP>&(#M;o*`BPyxZ6Uj0*E
z+5Br{iuSW^Q;2iq&KtHOi{^9MTv8M&&ue^~#t?{*-0BCFQ{d855i_zaIlX>#xhkpN
z{f-Qei0nUg&;T9UlP70lV{6pWfHG_f1rFX15ROx>OB#Im@WxFMTr4EKCH@b{@q<<?
z{NI`XOTRNyb!9AZdPX%HYP`%III8~teWM?llwiPs8Cghy0zum7DZA*O*hb0pVCau(
zN(2N{#Qz~>nRGajaIb#Yo^iQ!rA#|<r5u^AXaE8B$sWB&Dk`=Nc-51W6$g&XQl(HP
z)M!GGO#z8G3l3d26NYf#9{_04#ad35V1ECx)#Pp!n^s%|mZ3p{S>!Lp-HF*(PCQqe
zbQmGT9OD<i3RhxWsy>0-^nmn0Ak&iqM1TO2V~Q*6BO+vTc@eeH2mwP}WaPjhPu-*%
zOaT6kak(pQdME>!%DEYE8@|MnQq*g$HWAots6<tX>o{>+N%qUO8A29J$UR#f%F3xQ
zLnVU&(jQR=4aXG}RIVkk8N?tF41wT*OR)ofRSb$q;1f>`hN~b_A6)H6WJRvR>C4gr
zb3nrT-P|Ny>gS#48riN&6{8K{#Qg2T`SlAau+vXTpJ(-AxUB#ys*|D7Z<NTO00xI;
zJGr;eCI{;8W;-0`eq16Va;WtvIx6%X#ia=XLyS*Xk8!h=e9+~Np@u0cxFU-E?b~dQ
zvxx%dOOFzfwO?U06LAuYl5j(n`VGlJujt{UT8(y^se@2B5)f71{5=;>37afoCLJRA
zMkE5a0a+JRv4xKNYa)tWn?IEtQ7&oB&&SbmDQ=0;W>IkFx-F>?8p1E7T@%jl3t%It
z>5|E8xslcDqitVFMHX#jZQbJhEjOcp3up&Lv{KiVKuMnl?tP2&2d-JgQx|)p76e8J
zOc^W{6%GuW3|ByL`mWc)c}Ib2wdn!!Nu^YRHesQ1xUrld2>B($i4Yy$JQxpfJW_j<
z^J!(6pNsPIt3@4)=Yf|vou#+T1SsJi=3XX>ZB>S-{0oUF_U2>#+M)1raf6pFpr5n?
zdcjVhDoNsElwUEEV#Oxm4o}+sstplonYX{HO&ROgewaJ(eoiQdfT4)I*fy|hS$`wS
z#2GS&hc$5$THe7n3@Vd6Mz+rk(ZOJZoQJ`aRJ~FgD6(rr6@9i{WE87J`MQT?=V^h!
zomhSJ``Mm|b3EWZ_T&#XvfbFNroF>@L&K^z_MoacxV=nQNVVczZW?apF9I-p-r@a;
z6sG2snCevp>1KxW07D)i9i<t)cNpJO;w4!f>LEh?TSklfNkrR4C7h94@2vqjpT^zK
zsz81xzb_n3%^IwxBorBQ>>&KlKVBJ?rbo`oiu7s2%Ib%?YVLJPwX`%qfjn6ibX9;u
z$K~LVYJxb#U<Z+gm|}O(xD@*>^bVlUI*{%gr6On7dr;&Nf3I7E+0E)hTV<63V-rU@
zBJM=uepq6a+Krn9s^LMy>07~IqrGIPvPSic->*UNpZzlVqD#t?D^3Kg@o9qeTSoN7
z<^HF6GL}<W1U`|QaXVTwL2g?i&%3dITs)}COF)%>A)}%quVviq(%zC}(GhRBn)D7H
zxe|ftfr6m262pY)2IOMYEXUeWa1<Cja0%%yRniO<gn0#&=XoI3S-pZHnDLCdft@jZ
z5kd0)<)7Z%<`aN*S(0r}ySMjAsGKx!D}NKv`)i6+-jf8w&rz`Nu#z<Uv&0uywLL=B
z$gwn+i#Q@;2}(_E2NoudZsTb{#^;_peftLC{<<gp;7%&sB_9(eeY02nY^YWg2@e$n
zD)?$Z{YYG$RR`Hl2N|JP;Mx85?U#u=ovIXs`9j(83F}3xaTZif0527&4A_9SplPp2
zgE$g0R>ahIOb~B;dO_iDRMVvvnFu(Mpk}7f*|{QhZQ(I7-$aSw39^~+7V!e4q4#dV
z<0AvlqJ-C<nT+*y#yn8F4aR1VfZSE7swgZh#8eo!lV-{H5hG<GB|{<*9f-91=bO+E
z@=;>ti;2r<Hu1<R?@vf>vMVCXsoh5npG}S++*=;WJU9|PiP(-9cS~!paIs|uAII`e
z*CcLrwr}e^uBx1<-R_B}S=q<MYgC7V(&@m2!i@y?owA}-fE_$tc4#+6;S53%WPUoY
z3t`EwF<yB)X8T)CHDMf!JWp3Xr-bHkDB|_bt|cSS&7~dRG-wpb#b$H7E_aX#`=Z0z
z28V8*mioMY#PYE?`=!WmN4zhXS1|C@#y~9%y^`-JZjmQcvgJhezT?p5z{OffR42+I
z_`Lt@euIO3wIZRi88%ZxQkXUR0#!&ZFxwnMSx`J{d`@K-LtU^y;?TO$N|NOtar(Sd
z#ZV_MzEiuZsG68NB2H+L`Lfya!VirqKxt~f1&Z&hl&9?~PKQ08%&{0tpisLXMPYQm
ze12n6OpN&1d$eIBW!5!m!kF&pqZN0sHa$7gV`e`qCZi=^-QC3bNsFV=RR?9>JeDxy
zOLWzVtg}Uy&6?BIo3AT)_S_!)d!6kkqu%aGf6J?pEnV_=76O)(`|~x$Z>k~nojOl;
z+(Hv`mjODpg0ts&jkqq97QD9*WbZCG=j<27`YjYr=I?>4)v&VlBpfe8_mf+C5l4~5
z_qEn#Ws-#|j$%RPU-F&o*5p_iy3<3Pb(l{|&2(uK<#-M&pU41g69?lN3)iU)DF(jS
zWNj2I7ioeskEOe(hI>v5<53$2`~mTnpVRu&pO5-?Lz&436_2MrlKky0vH^F5D6{!C
z2fklF8kX@2<`pa)Z>t_Ac_!rnPjR!HDMifPC7rIuo`~3D$7q6mpRC>;H`Gf6jt18A
z(Yroea|~<W>lATcuXxRBxCAVb()C<mF%AY%kXHsf=qHVPumq)+UUi&RZJ+3L$IVDG
z0(7nNUr3ST^?Wlw!4zd17-Q*<BcOBU-sdwoYvg#e3j4AtooC;4CH`iv5(+j^zr^Ai
zT_fT+=zAkm{vMaB(yQbMUvRyj{Lqj0Jg1Jj$__XKAk%Tf+qXuCq7NOY1|R(vw!7g1
zK_-lg6N`d0T4(L=GQpU@us<r+&L{x?P#f+J8R`M?fC!m<KS5n<w*DO{<dP{u`9SCc
z%93@L@U6r3v{jc;!m^~_SX>dj?}#i@EuJK<C5k<pf3S(#jhVPCyq;JfI!`Q1&jbdn
zW7A-{UemkD0c=RA=rlx~Iak)lh!~;P`^d~_oxH*06Xglw@&Vg}`w_8wDv=*|AWJEu
z8Y~RJJ2la5o5ATc3s!eX^I?V_Ll@Lqscv4sAJcGmPjItnD+tKM7FmnEJ#T~;c^E(1
zd8k=Aq%XW{I*vcqolL_o!`*)5wV!(Vqf<p@>-A*r(DT#PuO;cd|HFnOU-7H+%EdA%
ziq}G`$Mj3xkhl(2y#$toj^1#+#o3+pS$Zkr+1*Nnta+Z0%vGn_=ts{ZjW)NgnE0C`
z%*P?x#rpW)t|811goc-~GVd;R5~A^+Zq6V%4>i&`K@A=|>4=W{-02rn_Zkg<*?%;1
z$F6Ph;_5!*)l5$frG3H~pV#c>Js%swMEg@lT-t%gDD;XvD(kq!b)BC(jh(v+WTQZ-
z+!!k)ipj<{JXmo0en92$vmx)FuF9bCGhKBNNJPXARtzQZDir)MaO+_B&BpxpdfVC5
z!Qb-CHp>EUiKx{0OgJ(D!_n@C!;O#<&=4+9t~Zmu#4Fk2R;=y7zAfjQWe=M#(L}KO
z@(H8kgYBq!WyI%o>-<UJWsXfQ>QQz3rM>7S|4hTn%)r1f5MvW~;xC1yz)%_?(iWNT
zPJ$ie81dGPRM2OwQmu2?zW)QgfS9<{pMuy(f#i+uycdpn@<C14tLs@9@w-Bz{#Dq4
zCt#)|TYp(4$8)<}dB$tYIs0BSH*@?*^qo;n#&OwkAq1RDF!HHurf8-+D2b{VvWP^d
za<GKQd+4!I&xKNavBu;wzl}yOW2fnlIpHMQ+w)Z+r|tdN!(!_yW{aK&aanB1eFv6(
z-AHtPdBRErLiI*pM~_dEhnKKQC=GVAB@hq73eN6H^-8DTA1UxcVWLrKuJ=)g{<}r9
zo}aVt{Z7oB`s4nhK^fDU?qEE&o#Ara$qYt-0(=7vhmG!dH7ls~6gTlJd)d<+N$qhU
zK((??+)+lBv@ZPT$Jp;lcP|pArRcfi=z>&GGc&xIZC4WOi=Xgfj3nlplXIWA^}txI
z^Ud5G>}^314NPwL4^6KB*Zu6TphxRv1wavOF}k=!kUNV6S4Pe3t<LYip0V>NVFC;i
zRF@+)TpB4pFKh@XErzHW#u&~%BP?3wwE4t%xD&!?&`-2}DOhejlQ1RRoB7llwUx;a
zcs+*WD<6|tY$1rA(Z%w;0_zX>^p!IXdL3Dno2?newljDA!*-Q_R%5&TvWIGF-uxq>
z%@w<R=&pM@Vv2F_cR!_Ne(=2DxMn)@yFHyrX<9JPY&v0Fe%*YFXyUeT1+1Je0lA;Y
zPP|-i{$88a4N{j-wPd<gK`k1~na<!SxA{3T=VhBap3V|UhzcqYlKCMP9`D}2I;^uS
zqQ$wtP+s{U0J8l;+6cPF?Wcd=&jH)aFMlAb+$}($5!XYpE=D`scl>c~#~TT8;~mIw
z`$!6|%Y?-DN-UmtDyK3wpx>)IW<y03RlKD78{HL9!v7jh{Z^#W-Wk9M(A$gE?;Pq8
zZ)tE^WOIVIez6gb*-GUbtFZ5yY9bj34+2o(;z|ooG?s9Ty8Y;b)zK*ljui11P$-f}
zLA`%dJo_4q++>t%+lT*rxpS7es4+$zT<Q6<Y_>5lJ~-4_Z-L#zQ4RdlU6@;8?1sAf
zIFM+7^Xp9fb;eq3mhOziB<#d{jklBO4dyR9-BCcvmS{zJaq+l(y(uGo&tFb$KEI$6
zjB1jNCU)^fmRg4~AvN#SNdCe=Z2u4ayVLJk|Au<O>HPW_jszo^uNNqC9l^u<WvthA
zeXLT|9=ocY_kO~4CYCMM5edUp!d7qQ#as3C!%X)B9Dcxlzs%$Q&)YPp9j;>Fd}rD=
zKVPhhDP;M2*qrjc#{+BhKAG+iDaO-?d7AAjj&ESh@K%1G4)Z1DXR8%-2^-%K4z+s2
zL607Z_v_3lx-=3x$R4_)34pCz<DGMn{XMe!JGd~i5ozwYFlx5XOFs$`sRYE#yhM@u
z-NS+<P3esI@4`k2f)#mVHF3r~mmzYSCGT(r^rj+EruDMrkC&u=Ff9QPe(+!tA~_yk
z%!o)SEkK+N>kTCt71;`BZ9`#(_G;JtH+V1Y((QE-;Q<g_fEcc(SpihAelGs$dPojK
zhvv<lHyi2n!Joq#Ca+zq>eJTDAp$z1FpL5f5r@Em*0(lw59g~c@FO|%w^6J~%^Nm(
zd2WoyEDTMt;4~=z)rfuajcEXE%grEGLKXG4QF4@GIazpxFB(z&ON6pm{Fg?x`>pFV
z1y@Q&wqMLCYPrV8sr97$CG)~s_QOTe?u>rdL?>c8g{n8&WBOoF&DO+B?6r(Q3(TvN
zA0lOZf&`727N8s1%hn5Bf`?oBuK<d6#Jus%7;c7*iN3Wj^`Qa`AsS@#&vffJOW6cD
ztkF=gLQ{S#RL%s>*c*S?Hai#SvC5n^{1M0DG^yTPVz%H0ZkGaLaD`!iVuJW#wREm%
z^I=kQ!!9@2M7s3J-_%*xI|SQZ=H$?M^S$j&=!4@@5pQb=Nj#ADy+84}TevH-Gbalt
z>~=nEMS}y`w4Rjpa(ZHi4SVwS35BWliGjMnba6rrzv|1-#tLEQMLl(~Hh4wol7}s1
z^2$C+DP`v^L{1n?h*Ou#SgzEdhdUIG)&~%NA??fI4AfTh(MSho4P3Bgi<2SRcMMCv
z3>?#Cmnfidr~jtIk19ETq2`+F5F=mTt34ko@wn*ou*plC7vW4sHw>Jr&|Kt6niIBy
z^3r6Yr7e_2tYMT?I~BLpOh3wu9n6J(-)qEo!ScXgjy{h~XI*PHuwhD>V)SW`zX?DK
z;<yfmVswL-=e<RK%Wlh-L@i;W?}#j^$r``NvUc|ww)XbDHq~+Zf~C>8M~Icr7$A#;
zru07+%#TV~qP+lKQCTPAdw?mP>5RSK$BX#wZ6{0N3#ZP@_uE|GH$8)_tkdneipC1A
zw{OsdQUGlU0|M<vI6#50==7vrQW<sOx?Y0Kn!^&FiE^}fjFoh?uIdloy4K3$FXoPB
z_C&zcfKHo8Zi-t`^Py=9`*1|)Po*PLc<($Y4as>(D@yz2R2Vp5vu8NtVUnmU%hXVP
zIj8wNl$1@hOMYnLBA47nnZXfD()ctSTOx}!%0wj7&PpOCcRn1F%Na5`KEo^%UA2Ou
zx0EmA1tRhf&;ZGHR!KRn!gLvlquLBzlS1-KlDCyZSJM^BeavP3B2sO^8oA5xGP+PZ
zj63PiEiY&Xo><oNW#blBovBn<Si#0dmKh}_{koT_Ki+!Iq%CAT7Y{A+B()4YArkpX
zdwWRv?Sa8-B4N;ow;chH=+sKyjO)X7@GS69UL4hu(~b_^W9*~iB9#tq!+Kuq#yI>(
zeHGItf4zDR9<nzTAP9Y4Ko#?ctR=ApfU;PEgi0ckxbIMEGF|CzO$DtND}p~YV#x(1
z5dW0!znA@r(*J^C-*$ip@Tc`B`sf%H38%SiS)SPI_h*7MV5(QdTe8KCKf`6zGSaa7
zU8)u(L9lqr_=ab25%8EHI{!EfcRiVwxATf4Xt9ku)%w0!iwwMmO)%Z+`;FiBJ#Aax
zgAB3fSz1iiWo~MbM$eMb7Y=u&ImJ{T{$M)2#{IP~x$&v%Puug;;cKxZ&05Y-B~L(m
zxwdAlHx55{9R}WnzfR;50yIiDnl2gdBp&aY%=o3rEi6FOWYO_FM7+QZPp2JFQ!+gn
zox?!JnSB+2=<Z?|SU`U=4gv5TXxDu#tfak2?};5x$L9KVF>tUgXNp>NF-yJDHdavH
zo&Y81E4qWF(al8`1MAd>C(q!pbIsXfkEGxrnaAlD?~6v|A7;FY>H5tN>E@}9gfgB~
zw-kYsqpe@~zrgx}PH+l_B?HLqBo;C4Knw5>+%7@6X>-s1O)c}D2Nx-i6!+uS9h0bI
zuN~zO$#TY^!%*j+{PEJu#0k%_qwfZS!*iVvAeDtOtF(M;_|sOuKDObM(Di=l9F#FX
z^DZsy0k?h?HzwHMG|$*LjZR34XT2Yd?>#bddwINhQ(LnOHPmHw;ttWtM7rVxiN1iM
z8E@(yDh2%JQe(=idFT&R?;x6>6jhJ{N?+;?Dn0G4`0_{gJqcvhS9()%1fGL~j%J+B
ztG>;)1m&11(}J4%zOrf@N)8ezGoU{)HRhm5mxyLl%msH~0SmQ^l{xK>u;g|$;>Wz*
z_aH$y&h8LvUmutTesBMf7KGy`?IQ-m!EbyQ=tBs}fUgAYHd4d*hk09Ubd*FiN%?`>
zZ#pbmk`*9(8RpEVPa`WU<vZJ)X>-bZwzNm2*%-u%deX6iH8)#Mzvl|PONS`=^ca$h
ze%)IfYb7l$FuwBF7}?Zt7{mejAXJd3@%Ik6^~In2!IcI$y^?Y^5Q1zf)1CboL+;F{
z5AOheljGV~`%BPWL_XoV)gk1feB%PJk^8%ONM&5f=k#7-V?J+8E%s?Pjj#pPFSLmI
zE<`!B9f^{cZ-9p1g>@4g#hVNv4R6B|9Uze{oxQ>9X1BkzhI*_SjH|<mfJDVVY`lCy
zh3$31Br{Q~Ju?h1ZM9;f@B0VL87$ryys4J~w)0qpmvlO8=S<z$ez4}<F62@xrjxez
z4wsSzZKr2#GT0lbZf_!^LsnRi4Gk}IYn+p-+T+oQu_WOU*)dEHYwMVP`%@bpcZwT{
z<3!@yeQEf=GTp~9he2ar$@KZ#L-JBTxyjW`ZtW_Bi6)NyT7yDuDaCS}L9-^o3UvZ{
zha^HyzAC&tMC6W(rR5L#b&{dH#^AdWMy!Es66X3&eCl5(BKV5%!9AhMSAJ1BjbPXa
zwX8OC^KHDBx~Vd|nzXt81QIWJN^Q6S!0rV3YuS<~B<jfgzdjn(K?>gPF}=0$?|kSZ
zPYUSCXXW3-o6S(Au!QOSGPNhyTi?_2RDQY6by4ujzjC^5F$L!6u*B2br;W93{)mVA
z3H|t|pOzm_5?wz&iMBOnos8KuA%XTFv-7D-Jf={_s5KW{Dx!&QzbIqmc0pZw^e36q
z=HY%>ahkKABMP&h7d%OJv=Uz<?z+YBgTNzvp?S&gw)Z4J8vh}_9?u6ZS+@_Zy4vG@
z-4@l<rQFez<uMB7yo3i=bqQMd*mj+dvWm{+=f~SECCp)RvPN^(wFx{FWzptZ?Q+Z2
zK#N9>QZGS?Yp-M`Pie4@l0B?6<x3!^t8a6>i=ue@(^aI>7l^dFT|r%COv9O{0*b{>
zLEFTNWvhgKnn=$+mS()^hgLKKIb5MIh4e=|EsKTd0^Eh52gBHsDbC#5<4$P;*_M8D
zdP-#k_Q}La!(S!u+IQg>D6J0nuOdhfm-U}pJ`dn$%asQ+erpm1#|CGDo(TLQd0o^B
zzwl;q%<dsGc1u599@!X=6KPjs2$gu^82QgbE4TZO7A?7Au!TgONTgG%1Mvqims)UT
z5Lrv>J`$rX&~;C=wB-hu`$LB^Zs9r7*Al)(DkxlL(fsKM?5YmKpeb(ulFZ!Vm--l{
z*J!sP!6K@Y@?z+;BjlX`)5w-$XbWhYSc+eeSrFhK&fJ9byXUdv`m5>L=?;JSyo73}
zF1;DfxbU5IK3e<rEKy$L_*cF*vD64%mgRCa3Hl+M_A&jDd<UWd;VILDOw2hN>B*(p
z*v8?7BTuJ5=Ghk5DS?$?kmA_w2NiP4Z*n5c-?_Fr)ARI84dm*5w<WQArSpW@8QXk`
zddxVfSHx^C3|Rvx@-S#Q!d5c~t``nv_-nCFh99EnYEn=?P~BSYuDtw=)PKhiqj6>4
zpo+P|7-&UTYQ970TXV{Y7qyntlV@p(zr_iEWPTk5v}vFC4frv%C2CS&(CrX>7gbzo
z@#8-%Dhj#k_k$?UudOMINN|5=Xj<BQ^lCfbI(>g=oQwKe)tE11iI)ggA)7kCKW;Fb
zP`d&D@O(DdSg8vhFtnK%PQ;&cz&xzQ1qs+g+?%m8>f1nPfexrZ1GHT$h#^$|B!qXZ
z(jBW$)|T)feIQ^B6l6UFU!D0&nvrL&Z$(X9%2KyGkTn<zSM0nXD!<g=p_;M=Xs_EZ
z3v+*n=f!>A0gr6HEOgp&h#{EGAhtwt#nyPgm1@40Ch~eRG?*uLx*+5l^2S|xKp?Pl
ziFm}HUJV+zsL~&Sgzd>!^~XDx*@XVET(14y#UyyCxF{Yj|KnzP2ll&Ww-LmqwRKr#
z`QAV*-(G6~SXpVgQ}D5eE7_k12oh27V4K7O_E9W^upgPyWk^tvio7_0Mx+3W_*}#x
z#?dr3rI!d11gThQ9e}{IijW`#cZsnygdan={B129s(Lv%i6Gj@paVMbE@3&6e^51E
zc_X>P2h3XNbK6@0xdkqF)-wH7h_$o|rJ%npHfBn+2w{;_DFsw<Ohit;0^v5dl-7wR
z><k7Wno=z*o;o}V!drYwj9ojSNOuwkiijhv%tT)zpOC0vA&{!1D>?+55CuB7(H3j9
zIKWIAw2v^)pnFoYm95>-$m5kUS;{}(;akxqc66rP-(H|gABl!mX^xWO+48LSu{dei
z>4Ea0!R#ioA?#?eHQTmCYlr)%n;*xN<*lRS{f!6?qG((-(bgyp4i0i1)scekHV9Yf
zjiutD(H(I?kT-)D{b+5^#t;FG105nD#Qa8WzT-{pL+j@=r|_*wHesvD#VG~0Uz`K`
zZ!w*&CtC~#VVl(t^^M1GQ68b{HF$w3lV~WzFce6M1W=5YHZ~?l%Jg#u<``u93?S>x
z(BSVTEYalp=~M5|DLbz_?+tRtsmJnzjkLHU9~D^_i1!ul9L<u`4tL}Gz-jv<1`M+O
ziVEuH#0H<}b>cZd?v|zi5!(I6rw>NJ`-H@7PAQ}Li9`a*R&8gHrpD)4^EV<i@I?i}
za+SjuLVf1V%da%Nmi~)xLWAy8AkKjz&VF-`6EigA{CR(5=x??w9t3W;PeJ3OR6Sl;
zW-)SvhyWCeYyky!5l6g(H{`ZjaY`T01s$hS*31B#%Z2v^yydwGV%2*BTU(`1FczIB
zojhG|97oEW8UocF>t*|vYo@r|Tepy6#JNPiuHRs^vh@nR)P11ARXlsEMFU`H0fCHK
z!=zzpH>~wX`_faGbv*Y=7t*%QvHk^$cxKHM@v_i_Mi@62NQ`M*Q`B`m%<ig1y3fju
zlwm<UQ3;O5DsHIP4SSz6LfvIt!{OzG;{p48(_A;}C&C)CGbMOyN`Px{R@i5(<ADxT
z#Bth*Tn7BMD<#wnS!zR%@n75ro2T&Es-T{I2fOYX`n>TijXyR4NoWeah)~vSHl&HR
zgN@wZX4A)OYwDmyk<l=QIKL(Vvov6Sg#9IcdZM$}CCXt>!NPg=&!ex@zUV|q?kmMH
zw)m&8x|2FrUOuT0G%iylxRCOg2Rf-b2t3R|NAE++dz=SOVK1G+z9Ve)D`7A0%WPx#
zc2H?{+Kz$&N$<2uDA6O9c9wl?a9oQExu;ysw#u5SqD+Z`<K952ZKL_MzkWRvwMeDq
zh@xB?U-Ai2g{cLm@}UMJPlGD2HLA~aD!`0>y0)T6WLfDiG<Xn(#yIE16&epD7DT3|
z>UY$&Sr@d_hJI5;mp`KZ8G=L+Nx1X;rQ8k!D{54nSO`EmSCErv9qo6W;P=J<wtIhj
zc(#}{wC{4cmP{(0I^SY0kCL2BquU(SE*ONcI{r$8l=xMmT=atGupu;<>ks+~JpI`l
zlc1ZLLKxk#hmUO)lS#!Ak_m<LjK$q$T%ErrDR&bQy#9rVK-=>w`1!@*lz&jLP_2%{
z_eMTYZwtJAqN++W(SLkTga$ED5B2gfI5Cb(RI~s*vluA}fIz%U3rfApYxZFbm-+jh
l9=;HXJa+KG5@mj2ee1f-OfJL-*Zc-FNl`hGY9WKb{|D}q4jBLd


From fc801db06a8c9c465f7ab92e0d276bfe0b972bb4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 8 May 2019 15:43:41 +0000
Subject: [PATCH 0350/1147] RFP stuff

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 18c3c38..f06eded 100644
--- a/user.js
+++ b/user.js
@@ -1471,11 +1471,12 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
       FF60: Fix keydown/keyup events (1438795)
  ** 1337157 - disable WebGL debug renderer info (see 4613) (FF60+)
  ** 1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62+)
+ ** 1479239 - return "no-preference" with prefers-reduced-motion (FF63+)
  ** 1363508 - spoof/suppress Pointer Events (see 4614) (FF64+)
       FF65: pointerEvent.pointerid (1492766)
  ** 1485266 - disable exposure of system colors to CSS or canvas (see 2618) (FF67+)
  ** 1407366 - enable inner window letterboxing (see 4504) (FF67+)
- ** 1540726 - enforce "light" with prefers-color-scheme (FF67+)
+ ** 1540726 - return "light" with prefers-color-scheme (FF67+)
         [1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");

From a173d30d4ec7b42062fd3352be5cfdae229c9053 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 10 May 2019 22:34:24 +0000
Subject: [PATCH 0351/1147] RFP 68+ isolate site permissions

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index f06eded..ddcd2a0 100644
--- a/user.js
+++ b/user.js
@@ -1400,6 +1400,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1473247 - isolate IP addresses (FF63+)
  ** 1492607 - isolate postMessage with targetOrigin "*" (requires 4002) (FF65+)
  ** 1542309 - isolate top-level domain URLs (FF68+)
+ ** 1330467 - isolate site permissions (FF68+)
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]

From a4c2bb80aafc750203979be994a4567567cdb89b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 May 2019 02:48:06 +0000
Subject: [PATCH 0352/1147] 2429 remove default tag

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index ddcd2a0..1fcb4cc 100644
--- a/user.js
+++ b/user.js
@@ -1099,7 +1099,7 @@ user_pref("dom.IntersectionObserver.enabled", false);
 user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
 /* 2429: enable (limited but sufficient) window.opener protection [FF65+]
  * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
-user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true]
+user_pref("dom.targetBlankNoOpener.enabled", true);
 
 /*** [SECTION 2500]: HARDWARE FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");

From b3c6561ba81f94a30bda29ff5fdf7e9da2a930a1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 May 2019 13:44:12 +0000
Subject: [PATCH 0353/1147] 2203: change [test]

It's the same test (thanks gk)
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 1fcb4cc..e7efee2 100644
--- a/user.js
+++ b/user.js
@@ -983,7 +983,7 @@ user_pref("dom.disable_window_move_resize", true);
 /* 2203: open links targeting new windows in a new tab instead
  * This stops malicious window sizes and some screen resolution leaks.
  * You can still right-click a link and open in a new window.
- * [TEST] https://people.torproject.org/~gk/misc/entire_desktop.html
+ * [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#screen
  * [1] https://trac.torproject.org/projects/tor/ticket/9881 ***/
 user_pref("browser.link.open_newwindow", 3);
 user_pref("browser.link.open_newwindow.restriction", 0);

From 76c476ee3cf6d2b8b5a84557d90de5e7d006d1d3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 May 2019 13:52:53 +0000
Subject: [PATCH 0354/1147] 2204: replace [test]

old test: https://developer.mozilla.org/samples/domref/fullscreen.html
- for me the video comes up as "no video with supported format and mime type", so may not be practical for all users
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index e7efee2..fd3b959 100644
--- a/user.js
+++ b/user.js
@@ -990,7 +990,7 @@ user_pref("browser.link.open_newwindow.restriction", 0);
 /* 2204: disable Fullscreen API (requires user interaction) to prevent screen-resolution leaks
  * [NOTE] You can still manually toggle the browser's fullscreen state (F11),
  * but this pref will disable embedded video/game fullscreen controls, e.g. youtube
- * [TEST] https://developer.mozilla.org/samples/domref/fullscreen.html ***/
+ * [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#screen ***/
    // user_pref("full-screen-api.enabled", false);
 /* 2210: block popup windows
  * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/

From 5d5a9acaa41087bff8aad6123c12c8cb0e80ce48 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 14 May 2019 06:48:49 +0000
Subject: [PATCH 0355/1147] FPI: 69+ isolate pdfjs range-based requests

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index fd3b959..5c50857 100644
--- a/user.js
+++ b/user.js
@@ -1401,6 +1401,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1492607 - isolate postMessage with targetOrigin "*" (requires 4002) (FF65+)
  ** 1542309 - isolate top-level domain URLs (FF68+)
  ** 1330467 - isolate site permissions (FF68+)
+ ** 1506693 - isolate pdfjs range-based requests (FF68+)
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]

From 7a103b0c23984f8d338c69fd998c7e3e2303557f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 21 May 2019 22:23:23 +0000
Subject: [PATCH 0356/1147] FPI: 1330467 backed out

now that stable has landed.. I'll leave the text in place
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 5c50857..da966be 100644
--- a/user.js
+++ b/user.js
@@ -1400,8 +1400,8 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1473247 - isolate IP addresses (FF63+)
  ** 1492607 - isolate postMessage with targetOrigin "*" (requires 4002) (FF65+)
  ** 1542309 - isolate top-level domain URLs (FF68+)
- ** 1330467 - isolate site permissions (FF68+)
  ** 1506693 - isolate pdfjs range-based requests (FF68+)
+ ** 1330467 - isolate site permissions (coming)
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]

From dae1087082a729441cfe30665cd64e13416e1501 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 May 2019 21:11:45 +0000
Subject: [PATCH 0357/1147] 2660 enabledScopes, closes #729

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index da966be..d9b736f 100644
--- a/user.js
+++ b/user.js
@@ -1241,12 +1241,12 @@ user_pref("browser.download.hide_plugins_without_extensions", false);
 
 /** EXTENSIONS ***/
 /* 2660: lock down allowed extension directories
- * [SETUP-CHROME] This will break extensions, language packs, themes and any other XPI files which are
- * installed outside of profile directories (see GitHub issue #674 for an issue with language packs in Linux)
+ * [SETUP-CHROME] This will break extensions, language packs, themes and any other
+ * XPI files which are installed outside of profile and application directories
  * [1] https://mike.kaply.com/2012/02/21/understanding-add-on-scopes/
  * [1] archived: https://archive.is/DYjAM ***/
-user_pref("extensions.enabledScopes", 1); // [HIDDEN PREF]
-user_pref("extensions.autoDisableScopes", 15);
+user_pref("extensions.enabledScopes", 5); // [HIDDEN PREF]
+user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
 /* 2662: disable webextension restrictions on certain mozilla domains (also see 4503) [FF60+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
    // user_pref("extensions.webextensions.restrictedDomains", "");

From ed23a88c081840571e814f9c034c02cd3d185f49 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 24 May 2019 22:50:24 +0000
Subject: [PATCH 0358/1147] save 87bytes

---
 user.js | 58 ++++++++++++++++++++++++++++-----------------------------
 1 file changed, 29 insertions(+), 29 deletions(-)

diff --git a/user.js b/user.js
index d9b736f..e322c99 100644
--- a/user.js
+++ b/user.js
@@ -44,35 +44,35 @@
 
 * INDEX:
 
-     0100: STARTUP
-     0200: GEOLOCATION
-     0300: QUIET FOX
-     0400: BLOCKLISTS / SAFE BROWSING
-     0500: SYSTEM ADD-ONS / EXPERIMENTS
-     0600: BLOCK IMPLICIT OUTBOUND
-     0700: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc
-     0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
-     0900: PASSWORDS
-     1000: CACHE / SESSION (RE)STORE / FAVICONS
-     1200: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
-     1400: FONTS
-     1600: HEADERS / REFERERS
-     1700: CONTAINERS
-     1800: PLUGINS
-     2000: MEDIA / CAMERA / MIC
-     2200: WINDOW MEDDLING & LEAKS / POPUPS
-     2300: WEB WORKERS
-     2400: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT
-     2500: HARDWARE FINGERPRINTING
-     2600: MISCELLANEOUS
-     2700: PERSISTENT STORAGE
-     2800: SHUTDOWN
-     4000: FPI (FIRST PARTY ISOLATION)
-     4500: RFP (RESIST FINGERPRINTING)
-     4600: RFP ALTERNATIVES
-     4700: RFP ALTERNATIVES (NAVIGATOR / USER AGENT (UA) SPOOFING)
-     5000: PERSONAL
-     9999: DEPRECATED / REMOVED / LEGACY / RENAMED
+  0100: STARTUP
+  0200: GEOLOCATION
+  0300: QUIET FOX
+  0400: BLOCKLISTS / SAFE BROWSING
+  0500: SYSTEM ADD-ONS / EXPERIMENTS
+  0600: BLOCK IMPLICIT OUTBOUND
+  0700: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc
+  0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
+  0900: PASSWORDS
+  1000: CACHE / SESSION (RE)STORE / FAVICONS
+  1200: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
+  1400: FONTS
+  1600: HEADERS / REFERERS
+  1700: CONTAINERS
+  1800: PLUGINS
+  2000: MEDIA / CAMERA / MIC
+  2200: WINDOW MEDDLING & LEAKS / POPUPS
+  2300: WEB WORKERS
+  2400: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT
+  2500: HARDWARE FINGERPRINTING
+  2600: MISCELLANEOUS
+  2700: PERSISTENT STORAGE
+  2800: SHUTDOWN
+  4000: FPI (FIRST PARTY ISOLATION)
+  4500: RFP (RESIST FINGERPRINTING)
+  4600: RFP ALTERNATIVES
+  4700: RFP ALTERNATIVES (NAVIGATOR / USER AGENT (UA) SPOOFING)
+  5000: PERSONAL
+  9999: DEPRECATED / REMOVED / LEGACY / RENAMED
 
 ******/
 

From 57339d09b1f59f0c707d2434002b65f852f78049 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 26 May 2019 05:16:17 +0000
Subject: [PATCH 0359/1147] 2618 -> RFP ALTs

---
 user.js | 14 ++++++++------
 1 file changed, 8 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index e322c99..31b5f9b 100644
--- a/user.js
+++ b/user.js
@@ -1191,11 +1191,6 @@ user_pref("network.http.redirection-limit", 10);
 user_pref("permissions.manager.defaultsUrl", "");
 /* 2617: remove webchannel whitelist ***/
 user_pref("webchannel.allowObject.urlWhitelist", "");
-/* 2618: disable exposure of system colors to CSS or canvas [FF44+]
- * [NOTE] See second listed bug: may cause black on black for elements with undefined colors
- * [SETUP-CHROME] Might affect CSS in themes and extensions
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876 ***/
-user_pref("ui.use_standins_for_native_colors", true);
 /* 2619: enforce Punycode for Internationalized Domain Names to eliminate possible spoofing
  * Firefox has *some* protections, but it is better to be safe than sorry. The downside: it will also
  * display legitimate IDN's punycoded, which might be undesirable for users of non-latin alphabets
@@ -1476,7 +1471,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
  ** 1479239 - return "no-preference" with prefers-reduced-motion (FF63+)
  ** 1363508 - spoof/suppress Pointer Events (see 4614) (FF64+)
       FF65: pointerEvent.pointerid (1492766)
- ** 1485266 - disable exposure of system colors to CSS or canvas (see 2618) (FF67+)
+ ** 1485266 - disable exposure of system colors to CSS or canvas (see 4615) (FF67+)
  ** 1407366 - enable inner window letterboxing (see 4504) (FF67+)
  ** 1540726 - return "light" with prefers-color-scheme (FF67+)
         [1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
@@ -1593,6 +1588,13 @@ user_pref("webgl.enable-debug-renderer-info", false);
    // [1] https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent
 user_pref("dom.w3c_pointer_events.enabled", false);
 // * * * /
+// FF67+
+// 4615: [2618] disable exposure of system colors to CSS or canvas [FF44+]
+  // [NOTE] See second listed bug: may cause black on black for elements with undefined colors
+  // [SETUP-CHROME] Might affect CSS in themes and extensions
+  // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876
+user_pref("ui.use_standins_for_native_colors", true);
+// * * * /
 // ***/
 
 /*** [SECTION 4700]: RFP ALTERNATIVES (NAVIGATOR / USER AGENT (UA) SPOOFING)

From dfab1516ef22575c015d8dc6e41c0a6b58ea8074 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 26 May 2019 05:33:57 +0000
Subject: [PATCH 0360/1147] FF67+ deprecated

---
 user.js | 17 +++++++++++------
 1 file changed, 11 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 31b5f9b..87d05d1 100644
--- a/user.js
+++ b/user.js
@@ -1094,9 +1094,6 @@ user_pref("javascript.options.wasm", false);
  * [2] https://w3c.github.io/IntersectionObserver/
  * [3] https://bugzilla.mozilla.org/1243846 ***/
 user_pref("dom.IntersectionObserver.enabled", false);
-/* 2428: enforce DOMHighResTimeStamp API
- * [WARNING] Required for normalization of timestamps and any timer resolution mitigations ***/
-user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
 /* 2429: enable (limited but sufficient) window.opener protection [FF65+]
  * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
 user_pref("dom.targetBlankNoOpener.enabled", true);
@@ -1656,9 +1653,6 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
 /* OTHER ***/
    // user_pref("browser.bookmarks.max_backups", 2);
-   // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false); // disable CFR [FF64+]
-      // [SETTING] General>Browsing>Recommend extensions as you browse
-      // [1] https://support.mozilla.org/en-US/kb/extension-recommendations
    // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+]
       // [SETTING] General>Browsing>Recommend extensions as you browse
    // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
@@ -1767,6 +1761,17 @@ user_pref("browser.chrome.errorReporter.submitUrl", "");
    // [-] https://bugzilla.mozilla.org/1415625
 user_pref("network.allow-experiments", false);
 // * * * /
+// FF67
+// 2428: enforce DOMHighResTimeStamp API
+   // [WARNING] Required for normalization of timestamps and any timer resolution mitigations
+   // [-] https://bugzilla.mozilla.org/1485264
+user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
+// 5000's: disable CFR [FF64+] - split into two new prefs: *cfr.addons, *cfr.features
+   // [SETTING] General>Browsing>Recommend extensions as you browse
+   // [1] https://support.mozilla.org/en-US/kb/extension-recommendations
+   // [-] https://bugzilla.mozilla.org/1528953
+   // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false);
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 6f76a9bfd20e9e4a0df03dd3b4bbb91572c81b38 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 26 May 2019 05:51:13 +0000
Subject: [PATCH 0361/1147] 2030 new default

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 87d05d1..2d07edf 100644
--- a/user.js
+++ b/user.js
@@ -958,7 +958,7 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
  * 0=Allowed, 1=Blocked (2=Prompt - removed in FF66)
  * [NOTE] You can set exceptions under site permissions
  * [SETTING] Privacy & Security>Permissions>Block websites from automatically playing sound ***/
-user_pref("media.autoplay.default", 1);
+user_pref("media.autoplay.default", 1); // [DEFAULT: 1 in FF67+]
 /* 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] ***/
 user_pref("media.autoplay.enabled.user-gestures-needed", false);
 /* 2032: disable audio autoplay in non-active tabs [FF51+]

From c079c3c6329f6b8277491376feb0985e535ea6c9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 26 May 2019 06:07:41 +0000
Subject: [PATCH 0362/1147] 0110: clean up

---
 user.js | 11 +++++------
 1 file changed, 5 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 2d07edf..b3eeb66 100644
--- a/user.js
+++ b/user.js
@@ -125,12 +125,11 @@ user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false)
    // user_pref("browser.library.activity-stream.enabled", false);
 /* 0110: start Firefox in PB (Private Browsing) mode
  * [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed
- * [WARNING] The P in PB mode is misleading: it means no "persistent" local storage of history,
- * caches, searches or cookies (which you can achieve in normal mode). In fact, it limits or
- * removes the ability to control these, and you need to quit Firefox to clear them. PB is best
- * used as a one off window (File>New Private Window) to provide a temporary self-contained
- * new instance. Closing all Private Windows clears all traces. Repeat as required. PB also does
- * not allow indexedDB which breaks many Extensions that use it including uBlock Origin and uMatrix
+ * [WARNING] The P in PB mode is misleading: it means no "persistent" disk storage such as history,
+ * caches, searches, cookies, localStorage, IndexedDB etc (which you can achieve in normal mode).
+ * In fact, PB mode limits or removes the ability to control some of these, and you need to quit
+ * Firefox to clear them. PB is best used as a one off window (File>New Private Window) to provide
+ * a temporary self-contained new session. Close all Private Windows to clear the PB mode session.
  * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
  * [1] https://wiki.mozilla.org/Private_Browsing
  * [2] https://spreadprivacy.com/is-private-browsing-really-private/ ***/

From fdc9db9a084d6ef4f058d01ff8e204054f485591 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 26 May 2019 08:43:12 +0000
Subject: [PATCH 0363/1147] 1600s revamp

- no need to enforce defaults (except the second cross-origin) = less items in prefs and about:support
- simplify header info
- add in that you need an extension for real control: i.e for most people, e.g I use uMatrix and have never can to whitelist anything. Kolanich has been on settings of 2 for years and only found one broken site: these are anecdotal and don;t reflect the real world: which is why the settings are pretty relaxed
- move the broken info out of header and onto the pref in a setup tag
- reference: https://github.com/ghacksuserjs/ghacks-user.js/issues/716#issuecomment-488527274
- thanks Kolanich and :cat2:
---
 user.js | 36 +++++++++++++++++++-----------------
 1 file changed, 19 insertions(+), 17 deletions(-)

diff --git a/user.js b/user.js
index b3eeb66..2da4f38 100644
--- a/user.js
+++ b/user.js
@@ -826,45 +826,47 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
 
 /*** [SECTION 1600]: HEADERS / REFERERS
-     Only *cross domain* referers need controlling and XOriginPolicy (1603) is perfect for that. Thus we enforce
-     the default values for 1601, 1602, 1605 and 1606 to minimize breakage, and only tweak 1603 and 1604.
-
-     Our default settings provide the best balance between protection and amount of breakage.
-     To harden it a bit more you can set XOriginPolicy (1603) to 2 (+ optionally 1604 to 1 or 2).
-     To fix broken sites (including your modem/router), temporarily set XOriginPolicy=0 and XOriginTrimmingPolicy=2 in about:config,
-     use the site and then change the values back. If you visit those sites regularly (e.g. vimeo), use an extension.
-
+     Only *cross domain* referers need controlling: leave 1601, 1602, 1605 and 1606 alone
+     ---
+            harden it a bit: set XOriginPolicy (1603) to 1 (as per the settings below)
+       harden it a bit more: set XOriginPolicy (1603) to 2 (and optionally 1604 to 1 or 2), expect breakage
+     ---
+     If you want any REAL control over referers and breakage, then use an extension. Either:
+              uMatrix: limited by scope, all requests are spoofed or not-spoofed
+       Smart Referrer: granular with source<->destination, whitelists
+     ---
                     full URI: https://example.com:8888/foo/bar.html?id=1234
        scheme+host+port+path: https://example.com:8888/foo/bar.html
             scheme+host+port: https://example.com:8888
-
+     ---
      #Required reading [#] https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
 ***/
 user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
 /* 1601: ALL: control when images/links send a referer
  * 0=never, 1=send only when links are clicked, 2=for links and images (default) ***/
-user_pref("network.http.sendRefererHeader", 2);
+   // user_pref("network.http.sendRefererHeader", 2); // [DEFAULT: 2]
 /* 1602: ALL: control the amount of information to send
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
-user_pref("network.http.referer.trimmingPolicy", 0);
-/* 1603: CROSS ORIGIN: control when to send a referer [SETUP-WEB]
- * 0=always (default), 1=only if base domains match, 2=only if hosts match ***/
+   // user_pref("network.http.referer.trimmingPolicy", 0); // [DEFAULT: 0]
+/* 1603: CROSS ORIGIN: control when to send a referer
+ * 0=always (default), 1=only if base domains match, 2=only if hosts match
+ * [SETUP-WEB] Known to cause issues with older modems/routers and some sites e.g vimeo ***/
 user_pref("network.http.referer.XOriginPolicy", 1);
 /* 1604: CROSS ORIGIN: control the amount of information to send [FF52+]
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
-user_pref("network.http.referer.XOriginTrimmingPolicy", 0);
+user_pref("network.http.referer.XOriginTrimmingPolicy", 0); // [DEFAULT: 0]
 /* 1605: ALL: disable spoofing a referer
  * [WARNING] Do not set this to true, as spoofing effectively disables the anti-CSRF
  * (Cross-Site Request Forgery) protections that some sites may rely on ***/
-user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false]
+   // user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false]
 /* 1606: ALL: set the default Referrer Policy [FF59+]
  * 0=no-referer, 1=same-origin, 2=strict-origin-when-cross-origin, 3=no-referrer-when-downgrade
  * [NOTE] This is only a default, it can be overridden by a site-controlled Referrer Policy
  * [1] https://www.w3.org/TR/referrer-policy/
  * [2] https://developer.mozilla.org/docs/Web/HTTP/Headers/Referrer-Policy
  * [3] https://blog.mozilla.org/security/2018/01/31/preventing-data-leaks-by-stripping-path-information-in-http-referrers/ ***/
-user_pref("network.http.referer.defaultPolicy", 3); // [DEFAULT: 3]
-user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
+   // user_pref("network.http.referer.defaultPolicy", 3); // [DEFAULT: 3]
+   // user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
 /* 1607: TOR: hide (not spoof) referrer when leaving a .onion domain [FF54+]
  * [NOTE] Firefox cannot access .onion sites by default. We recommend you use
  * the Tor Browser which is specifically designed for hidden services

From 8811a28c56d332c170596169511808c6debb55eb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 28 May 2019 14:04:09 +0000
Subject: [PATCH 0364/1147] 2705: document.cookie max lifetime

https://bugzilla.mozilla.org/show_bug.cgi?id=1529836
---
 user.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/user.js b/user.js
index 2da4f38..19755af 100644
--- a/user.js
+++ b/user.js
@@ -1291,6 +1291,9 @@ user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
  * [NOTE] The setting below is disabled (but not changed) if you block all cookies (2701 = 2)
  * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed ***/
    // user_pref("network.cookie.lifetimePolicy", 2);
+/* 2705: set client-side cookies maximum lifetime in days [FF67+]
+ * i.e cookies set through the document.cookie API */
+   // user_pref("privacy.documentCookies.maxage", 7);
 /* 2710: disable DOM (Document Object Model) Storage
  * [WARNING] This will break a LOT of sites' functionality AND extensions!
  * You are better off using an extension for more granular control ***/

From caaf76e3fb280b0ae1f2e170fbd95605322af960 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 28 May 2019 14:42:44 +0000
Subject: [PATCH 0365/1147] remove 2705

---
 user.js | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/user.js b/user.js
index 19755af..2da4f38 100644
--- a/user.js
+++ b/user.js
@@ -1291,9 +1291,6 @@ user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
  * [NOTE] The setting below is disabled (but not changed) if you block all cookies (2701 = 2)
  * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed ***/
    // user_pref("network.cookie.lifetimePolicy", 2);
-/* 2705: set client-side cookies maximum lifetime in days [FF67+]
- * i.e cookies set through the document.cookie API */
-   // user_pref("privacy.documentCookies.maxage", 7);
 /* 2710: disable DOM (Document Object Model) Storage
  * [WARNING] This will break a LOT of sites' functionality AND extensions!
  * You are better off using an extension for more granular control ***/

From a633622d11539233cbaa4a1b3e3f81a8abdbb93f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 28 May 2019 14:45:07 +0000
Subject: [PATCH 0366/1147] 67-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 2da4f38..552790e 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 15 April 2019
-* version 67-alpha: Barbie Pants
+* date: 28 May 2019
+* version 67-beta: Barbie Pants
 *   "I'm a Barbie pants in a Barbie world. Life in plastic, it's fantastic"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From f53b996cfa73d26920cf61c58d5a9af9a8004f8f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 7 Jun 2019 17:49:42 +0000
Subject: [PATCH 0367/1147] toolkit.telemetry.cachedClientID, closes #739

Read the linked issue
---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 552790e..6c85155 100644
--- a/user.js
+++ b/user.js
@@ -230,7 +230,6 @@ user_pref("toolkit.telemetry.unified", false);
 user_pref("toolkit.telemetry.enabled", false); // see [NOTE] above FF58+
 user_pref("toolkit.telemetry.server", "data:,");
 user_pref("toolkit.telemetry.archive.enabled", false);
-user_pref("toolkit.telemetry.cachedClientID", "");
 user_pref("toolkit.telemetry.newProfilePing.enabled", false); // [FF55+]
 user_pref("toolkit.telemetry.shutdownPingSender.enabled", false); // [FF55+]
 user_pref("toolkit.telemetry.updatePing.enabled", false); // [FF56+]

From c2dbdcd4ec1f32431859fe75af09a0f1b73ec162 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 7 Jun 2019 17:51:49 +0000
Subject: [PATCH 0368/1147] toolkit.telemetry.cachedClientID, #739

---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index ae61fd9..2c667ff 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 05-May-2019
+ Last updated: 07-June-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -193,6 +193,8 @@
     'services.blocklist.plugins.collection',
     'services.blocklist.update_enabled',
     'urlclassifier.trackingTable',
+    /* 68-beta */
+    'toolkit.telemetry.cachedClientID',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 01aae1b346d7ba69522f4a13f1debddfdf07aa1a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 9 Jun 2019 23:29:58 +0000
Subject: [PATCH 0369/1147] 2426: IntersectionObserver=> inactive, closes #737

---
 user.js | 7 ++-----
 1 file changed, 2 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 6c85155..762ba38 100644
--- a/user.js
+++ b/user.js
@@ -1086,14 +1086,11 @@ user_pref("javascript.options.asmjs", false);
 /* 2422: disable WebAssembly [FF52+] [SETUP-PERF]
  * [1] https://developer.mozilla.org/docs/WebAssembly ***/
 user_pref("javascript.options.wasm", false);
-/* 2426: disable Intersection Observer API [FF53+]
- * Almost a year to complete, three versions late to stable (as default false),
- * number #1 cause of crashes in nightly numerous times, and is (primarily) an
- * ad network API for "ad viewability checks" down to a pixel level
+/* 2426: disable Intersection Observer API [FF55+]
  * [1] https://developer.mozilla.org/docs/Web/API/Intersection_Observer_API
  * [2] https://w3c.github.io/IntersectionObserver/
  * [3] https://bugzilla.mozilla.org/1243846 ***/
-user_pref("dom.IntersectionObserver.enabled", false);
+   // user_pref("dom.IntersectionObserver.enabled", false);
 /* 2429: enable (limited but sufficient) window.opener protection [FF65+]
  * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
 user_pref("dom.targetBlankNoOpener.enabled", true);

From 2265b7352157eb1856dce07afae56c766b026fc5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 9 Jun 2019 23:56:40 +0000
Subject: [PATCH 0370/1147] 1406: css.font-loading-api=> inactive, closes #731

---
 user.js | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 762ba38..b56b05f 100644
--- a/user.js
+++ b/user.js
@@ -806,9 +806,8 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 /* 1405: disable WOFF2 (Web Open Font Format) [FF35+] ***/
    // user_pref("gfx.downloadable_fonts.woff2.enabled", false);
-/* 1406: disable CSS Font Loading API
- * [NOTE] Disabling fonts can uglify the web a fair bit. ***/
-user_pref("layout.css.font-loading-api.enabled", false);
+/* 1406: disable CSS Font Loading API ***/
+   // user_pref("layout.css.font-loading-api.enabled", false);
 /* 1407: disable special underline handling for a few fonts which you will probably never use [RESTART]
  * Any of these fonts on your system can be enumerated for fingerprinting.
  * [1] http://kb.mozillazine.org/Font.blacklist.underline_offset ***/

From 9b7771fe763f0750ae516de28951c320c00f786b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 10 Jun 2019 00:06:15 +0000
Subject: [PATCH 0371/1147] 1401: document fonts => active, see #731

- https://github.com/ghacksuserjs/ghacks-user.js/issues/731#issuecomment-500255686
- reverting my change from last release
---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index b56b05f..3661f81 100644
--- a/user.js
+++ b/user.js
@@ -783,10 +783,10 @@ user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 /*** [SECTION 1400]: FONTS ***/
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 /* 1401: disable websites choosing fonts (0=block, 1=allow)
- * [WARNING] Blocking fonts can *sometimes* reduce JS font enumeration, but not entropy.
- * There are also other methods to fingerprint fonts. Wait for RFP (4500) to cover this.
+ * This can limit most (but not all) JS font enumeration which is a high entropy fingerprinting vector
+ * [SETUP-WEB] Disabling fonts can uglify the web a fair bit.
  * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Allow pages to choose... ***/
-   // user_pref("browser.display.use_document_fonts", 0);
+user_pref("browser.display.use_document_fonts", 0);
 /* 1402: set more legible default fonts
  * [NOTE] Example below for Windows/Western only
  * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Serif|Sans-serif|Monospace ***/

From a92c4086bbf8c4324c4369d1dc8a39338334af45 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 10 Jun 2019 00:38:20 +0000
Subject: [PATCH 0372/1147] 2622: middlemouse.paste, closes #735

---
 user.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/user.js b/user.js
index 3661f81..f60b6f8 100644
--- a/user.js
+++ b/user.js
@@ -1207,6 +1207,9 @@ user_pref("pdfjs.disabled", false); // [DEFAULT: false]
 /* 2621: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS]
  * [1] https://www.ghacks.net/2016/03/25/block-firefox-chrome-windows-store/ ***/
 user_pref("network.protocol-handler.external.ms-windows-store", false);
+/* 2622: disable middlemouse paste leaking on Linux
+ * [1] https://bugzilla.mozilla.org/1528289 */
+user_pref("middlemouse.paste", false); // [DEFAULT: false on Windows]
 
 /** DOWNLOADS ***/
 /* 2650: discourage downloading to desktop

From 0da3835a498e74fe24f76bf43a86c4c3d24db5d1 Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Tue, 11 Jun 2019 12:43:27 +0000
Subject: [PATCH 0373/1147] updater.bat -ESR option (#742)

---
 updater.bat | 34 ++++++++++++++++++++++++++++++----
 1 file changed, 30 insertions(+), 4 deletions(-)

diff --git a/updater.bat b/updater.bat
index 3458c63..3e43db4 100644
--- a/updater.bat
+++ b/updater.bat
@@ -3,10 +3,10 @@ TITLE ghacks user.js updater
 
 REM ## ghacks-user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.6
+REM ## version: 4.8
 REM ## instructions: https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts
 
-SET v=4.7
+SET v=4.8
 
 VERIFY ON
 CD /D "%~dp0"
@@ -22,6 +22,7 @@ IF /I "%~1"=="-multioverrides" (SET _multi=1)
 IF /I "%~1"=="-merge" (SET _merge=1)
 IF /I "%~1"=="-updatebatch" (SET _updateb=1)
 IF /I "%~1"=="-singlebackup" (SET _singlebackup=1)
+IF /I "%~1"=="-esr" (SET _esr=1)
 SHIFT
 GOTO parse
 :endparse
@@ -131,6 +132,10 @@ CALL :message "Retrieving latest user.js file from github repository..."
 	PowerShell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js', 'user.js.new')"
 ) >nul 2>&1
 IF EXIST user.js.new (
+	IF DEFINED _esr (
+		CALL :message "Activating ESR section..."
+		CALL :esr user.js.new
+	)
 	IF DEFINED _multi (
 		FORFILES /P user.js-overrides /M *.js >nul 2>&1
 		IF NOT ERRORLEVEL 1 (
@@ -205,7 +210,26 @@ IF NOT "2"=="%_log%" (ECHO:)
 ENDLOCAL
 GOTO :EOF
 
-REM ############ Merge function ############
+REM ############ ESR Function ############
+:esr
+SETLOCAL DisableDelayedExpansion
+(
+	FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" "%~1"') DO (
+		SET "_temp=%%H"
+		SETLOCAL EnableDelayedExpansion
+		IF NOT "!_temp:~-37!"==".x still uses all the following prefs" (
+			ENDLOCAL & ECHO:%%H
+		) ELSE (
+			ECHO://!_temp:~2!
+			ENDLOCAL
+		)
+	)
+)>updatertempfile
+MOVE /Y updatertempfile "%~1" >nul
+ENDLOCAL
+GOTO :EOF
+
+REM ############ Merge Function ############
 :merge
 SETLOCAL DisableDelayedExpansion
 FOR /F tokens^=2^,^*^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^user_pref[ 	]*\([ 	]*[\"'].*[\"'][ 	]*,.*\)[ 	]*;" "%~1"') DO (SET "[%%G]=%%H")
@@ -246,9 +270,11 @@ GOTO :EOF
 
 REM ############### Help ##################
 :showhelp
-MODE 80,46
+MODE 80,50
 CLS
 CALL :message "Available arguments (case-insensitive):"
+CALL :message "  -esr"
+ECHO:     Activate ESR related preferences
 CALL :message "  -log"
 ECHO:     Write the console output to a logfile (user.js-update-log.txt)
 CALL :message "  -logP"

From 690a93b71d8aebb4d7a2eba2ad5fe7a4ee75f543 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Jun 2019 15:09:24 +0000
Subject: [PATCH 0374/1147] remove: 1407, see #744

---
 user.js | 4 ----
 1 file changed, 4 deletions(-)

diff --git a/user.js b/user.js
index f60b6f8..be4d42e 100644
--- a/user.js
+++ b/user.js
@@ -808,10 +808,6 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
    // user_pref("gfx.downloadable_fonts.woff2.enabled", false);
 /* 1406: disable CSS Font Loading API ***/
    // user_pref("layout.css.font-loading-api.enabled", false);
-/* 1407: disable special underline handling for a few fonts which you will probably never use [RESTART]
- * Any of these fonts on your system can be enumerated for fingerprinting.
- * [1] http://kb.mozillazine.org/Font.blacklist.underline_offset ***/
-user_pref("font.blacklist.underline_offset", "");
 /* 1408: disable graphite which FF49 turned back on by default
  * In the past it had security issues. Update: This continues to be the case, see [1]
  * [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778 ***/

From 8a204b5db0e5fdf1198b00abfda8ccfde1fc9db9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Jun 2019 15:10:44 +0000
Subject: [PATCH 0375/1147] font.blacklist.underline_offset, #744

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 2c667ff..b88c2a8 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 07-June-2019
+ Last updated: 11-June-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -194,6 +194,7 @@
     'services.blocklist.update_enabled',
     'urlclassifier.trackingTable',
     /* 68-beta */
+    'font.blacklist.underline_offset',
     'toolkit.telemetry.cachedClientID',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'

From 9e7f9de56f070784815496fc5b871b90c0841d0b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Jun 2019 15:47:34 +0000
Subject: [PATCH 0376/1147] remove 1402, see #744

---
 user.js | 9 ---------
 1 file changed, 9 deletions(-)

diff --git a/user.js b/user.js
index be4d42e..afaef23 100644
--- a/user.js
+++ b/user.js
@@ -787,15 +787,6 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
  * [SETUP-WEB] Disabling fonts can uglify the web a fair bit.
  * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Allow pages to choose... ***/
 user_pref("browser.display.use_document_fonts", 0);
-/* 1402: set more legible default fonts
- * [NOTE] Example below for Windows/Western only
- * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Serif|Sans-serif|Monospace ***/
-   // user_pref("font.name.serif.x-unicode", "Georgia");
-   // user_pref("font.name.serif.x-western", "Georgia"); // default: Times New Roman
-   // user_pref("font.name.sans-serif.x-unicode", "Arial");
-   // user_pref("font.name.sans-serif.x-western", "Arial"); // default: Arial
-   // user_pref("font.name.monospace.x-unicode", "Lucida Console");
-   // user_pref("font.name.monospace.x-western", "Lucida Console"); // default: Courier New
 /* 1403: disable icon fonts (glyphs) and local fallback rendering
  * [1] https://bugzilla.mozilla.org/789788
  * [2] https://trac.torproject.org/projects/tor/ticket/8455 ***/

From ca5d6b331795b07e2980da707b30a2ea6281e621 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Jun 2019 15:50:08 +0000
Subject: [PATCH 0377/1147] 1402: inactive prefs for default fonts, #744

---
 scratchpad-scripts/ghacks-clear-[removed].js | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index b88c2a8..12f4fd4 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -195,6 +195,12 @@
     'urlclassifier.trackingTable',
     /* 68-beta */
     'font.blacklist.underline_offset',
+    'font.name.monospace.x-unicode',
+    'font.name.monospace.x-western',
+    'font.name.sans-serif.x-unicode',
+    'font.name.sans-serif.x-western',
+    'font.name.serif.x-unicode',
+    'font.name.serif.x-western',
     'toolkit.telemetry.cachedClientID',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'

From 7d7f580bfc0fbb48fdb0584dd7b750029b0d0bb2 Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Wed, 12 Jun 2019 10:51:25 +0000
Subject: [PATCH 0378/1147] add -RFPalts option (#745)

---
 updater.bat | 38 ++++++++++++++++++++++++++++++++------
 1 file changed, 32 insertions(+), 6 deletions(-)

diff --git a/updater.bat b/updater.bat
index 3e43db4..16a30e8 100644
--- a/updater.bat
+++ b/updater.bat
@@ -23,6 +23,7 @@ IF /I "%~1"=="-merge" (SET _merge=1)
 IF /I "%~1"=="-updatebatch" (SET _updateb=1)
 IF /I "%~1"=="-singlebackup" (SET _singlebackup=1)
 IF /I "%~1"=="-esr" (SET _esr=1)
+IF /I "%~1"=="-rfpalts" (SET _rfpalts=1)
 SHIFT
 GOTO parse
 :endparse
@@ -136,6 +137,10 @@ IF EXIST user.js.new (
 		CALL :message "Activating ESR section..."
 		CALL :esr user.js.new
 	)
+	IF DEFINED _rfpalts (
+		CALL :message "Activating RFP Alternatives section..."
+		CALL :rfpalts user.js.new
+	)
 	IF DEFINED _multi (
 		FORFILES /P user.js-overrides /M *.js >nul 2>&1
 		IF NOT ERRORLEVEL 1 (
@@ -212,18 +217,37 @@ GOTO :EOF
 
 REM ############ ESR Function ############
 :esr
-SETLOCAL DisableDelayedExpansion
+SETLOCAL DisableDelayedExpansion
 (
 	FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" "%~1"') DO (
 		SET "_temp=%%H"
 		SETLOCAL EnableDelayedExpansion
 		IF NOT "!_temp:~-37!"==".x still uses all the following prefs" (
 			ENDLOCAL & ECHO:%%H
-		) ELSE (
-			ECHO://!_temp:~2!
+		) ELSE (
+			ECHO://!_temp:~2!
 			ENDLOCAL
 		)
-	)
+	)
+)>updatertempfile
+MOVE /Y updatertempfile "%~1" >nul
+ENDLOCAL
+GOTO :EOF
+
+REM ############ RFP Alts Function ############
+:rfpalts
+SETLOCAL DisableDelayedExpansion
+(
+	FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" "%~1"') DO (
+		SET "_temp=%%H"
+		SETLOCAL EnableDelayedExpansion
+		IF "!_temp:[SETUP-non-RFP]=!"=="!_temp!" (
+			ENDLOCAL & ECHO:%%H
+		) ELSE (
+			ECHO://!_temp:~2!
+			ENDLOCAL
+		)
+	)
 )>updatertempfile
 MOVE /Y updatertempfile "%~1" >nul
 ENDLOCAL
@@ -270,7 +294,7 @@ GOTO :EOF
 
 REM ############### Help ##################
 :showhelp
-MODE 80,50
+MODE 80,53
 CLS
 CALL :message "Available arguments (case-insensitive):"
 CALL :message "  -esr"
@@ -298,7 +322,9 @@ ECHO:     Run without user input.
 CALL :message "  -singleBackup"
 ECHO:     Use a single backup file and overwrite it on new updates, instead of
 ECHO:     cumulative backups. This was the default behaviour before v4.3.
-CALL :message "  -updatebatch"
+CALL :message "  -rfpAlts"
+ECHO:     Activate RFP Alternatives section
+CALL :message "  -updateBatch"
 ECHO:     Update the script itself on execution, before the normal routine.
 CALL :message ""
 PAUSE

From 3c5f58b812f0e99f683d23758f01c8fb0d87d36c Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 12 Jun 2019 10:52:46 +0000
Subject: [PATCH 0379/1147] Update updater.bat

---
 updater.bat | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/updater.bat b/updater.bat
index 16a30e8..b3a4ea3 100644
--- a/updater.bat
+++ b/updater.bat
@@ -3,10 +3,10 @@ TITLE ghacks user.js updater
 
 REM ## ghacks-user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.8
+REM ## version: 4.9
 REM ## instructions: https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts
 
-SET v=4.8
+SET v=4.9
 
 VERIFY ON
 CD /D "%~dp0"

From fc545b4d2705bd770efcba7e8d677a986965949d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Jun 2019 13:33:58 +0000
Subject: [PATCH 0380/1147] remove 1406 css font loading api #744, #731

---
 user.js | 2 --
 1 file changed, 2 deletions(-)

diff --git a/user.js b/user.js
index afaef23..2963ccb 100644
--- a/user.js
+++ b/user.js
@@ -797,8 +797,6 @@ user_pref("browser.display.use_document_fonts", 0);
 user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 /* 1405: disable WOFF2 (Web Open Font Format) [FF35+] ***/
    // user_pref("gfx.downloadable_fonts.woff2.enabled", false);
-/* 1406: disable CSS Font Loading API ***/
-   // user_pref("layout.css.font-loading-api.enabled", false);
 /* 1408: disable graphite which FF49 turned back on by default
  * In the past it had security issues. Update: This continues to be the case, see [1]
  * [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778 ***/

From 06cf53d63eb869c73b2d19ad524338c8f3ddbd82 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Jun 2019 13:35:05 +0000
Subject: [PATCH 0381/1147] layout.css.font-loading-api.enabled #744, #731

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 12f4fd4..7ac59b8 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 11-June-2019
+ Last updated: 12-June-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -201,6 +201,7 @@
     'font.name.sans-serif.x-western',
     'font.name.serif.x-unicode',
     'font.name.serif.x-western',
+    'layout.css.font-loading-api.enabled',
     'toolkit.telemetry.cachedClientID',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'

From dafd0894e6efb14675cbe46854918372dca6695c Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Wed, 12 Jun 2019 18:30:08 -0300
Subject: [PATCH 0382/1147] refactoring, mostly

De-duplicates many lines because the -ESR and -RFPalts options require too much boilerplate garbage. The script was unreadable enough without repeating code.

I don't think these changes deserve opening yet another PR, but please let me know if you disagree.
---
 updater.bat | 51 +++++++++++++++++----------------------------------
 1 file changed, 17 insertions(+), 34 deletions(-)

diff --git a/updater.bat b/updater.bat
index b3a4ea3..b433678 100644
--- a/updater.bat
+++ b/updater.bat
@@ -3,10 +3,10 @@ TITLE ghacks user.js updater
 
 REM ## ghacks-user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.9
+REM ## version: 4.10
 REM ## instructions: https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts
 
-SET v=4.9
+SET v=4.10
 
 VERIFY ON
 CD /D "%~dp0"
@@ -84,7 +84,7 @@ ECHO:
 ECHO:                ########################################
 ECHO:                ####  user.js Updater for Windows   ####
 ECHO:                ####       by claustromaniac        ####
-ECHO:                ####             v!v!               ####
+ECHO:                ####             v!v!              ####
 ECHO:                ########################################
 ECHO:
 SET /A "_line=0"
@@ -133,13 +133,13 @@ CALL :message "Retrieving latest user.js file from github repository..."
 	PowerShell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js', 'user.js.new')"
 ) >nul 2>&1
 IF EXIST user.js.new (
-	IF DEFINED _esr (
-		CALL :message "Activating ESR section..."
-		CALL :esr user.js.new
-	)
 	IF DEFINED _rfpalts (
 		CALL :message "Activating RFP Alternatives section..."
-		CALL :rfpalts user.js.new
+		CALL :activate user.js.new "[SETUP-non-RFP]"
+	)
+	IF DEFINED _esr (
+		CALL :message "Activating ESR section..."
+		CALL :activate user.js.new ".x still uses all the following prefs"
 	)
 	IF DEFINED _multi (
 		FORFILES /P user.js-overrides /M *.js >nul 2>&1
@@ -206,7 +206,7 @@ IF NOT DEFINED _log (
 )
 EXIT /B
 
-REM ########### Message Function ###########
+::::::::::::::: Message :::::::::::::::
 :message
 SETLOCAL DisableDelayedExpansion
 IF NOT "2"=="%_log%" (ECHO:)
@@ -215,14 +215,16 @@ IF NOT "2"=="%_log%" (ECHO:)
 ENDLOCAL
 GOTO :EOF
 
-REM ############ ESR Function ############
-:esr
+::::::::::::::: Activate Section :::::::::::::::
+:activate
+:: arg1 = file
+:: arg2 = line substring
 SETLOCAL DisableDelayedExpansion
 (
 	FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" "%~1"') DO (
 		SET "_temp=%%H"
 		SETLOCAL EnableDelayedExpansion
-		IF NOT "!_temp:~-37!"==".x still uses all the following prefs" (
+		IF "!_temp:%~2=!"=="!_temp!" (
 			ENDLOCAL & ECHO:%%H
 		) ELSE (
 			ECHO://!_temp:~2!
@@ -234,26 +236,7 @@ MOVE /Y updatertempfile "%~1" >nul
 ENDLOCAL
 GOTO :EOF
 
-REM ############ RFP Alts Function ############
-:rfpalts
-SETLOCAL DisableDelayedExpansion
-(
-	FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" "%~1"') DO (
-		SET "_temp=%%H"
-		SETLOCAL EnableDelayedExpansion
-		IF "!_temp:[SETUP-non-RFP]=!"=="!_temp!" (
-			ENDLOCAL & ECHO:%%H
-		) ELSE (
-			ECHO://!_temp:~2!
-			ENDLOCAL
-		)
-	)
-)>updatertempfile
-MOVE /Y updatertempfile "%~1" >nul
-ENDLOCAL
-GOTO :EOF
-
-REM ############ Merge Function ############
+::::::::::::::: Merge :::::::::::::::
 :merge
 SETLOCAL DisableDelayedExpansion
 FOR /F tokens^=2^,^*^ delims^=^'^" %%G IN ('FINDSTR /R /C:"^user_pref[ 	]*\([ 	]*[\"'].*[\"'][ 	]*,.*\)[ 	]*;" "%~1"') DO (SET "[%%G]=%%H")
@@ -292,9 +275,9 @@ MOVE /Y updatertempfile "%~1" >nul
 ENDLOCAL
 GOTO :EOF
 
-REM ############### Help ##################
+::::::::::::::: Help :::::::::::::::
 :showhelp
-MODE 80,53
+MODE 80,54
 CLS
 CALL :message "Available arguments (case-insensitive):"
 CALL :message "  -esr"

From fa61a7c25bb8755a39dbdbe6a83a1a3024b8cf0c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 15 Jun 2019 16:34:29 +0000
Subject: [PATCH 0383/1147] 1202: cleanup

I don't think we need a 4 yr old article to explain the concept of `.min` (or `.max`), it's pretty self explanatory (and SSL 3 is obsolete). Three lines of text culled, and one of the remaining http links eliminated as a bonus. Enjoy the saved bytes and mouse-scrolling.
---
 user.js | 5 +----
 1 file changed, 1 insertion(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 2963ccb..f785835 100644
--- a/user.js
+++ b/user.js
@@ -657,10 +657,7 @@ user_pref("security.ssl.require_safe_negotiation", true);
 /* 1202: control TLS versions with min and max
  * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
  * [WARNING] Leave these at default, otherwise you alter your TLS fingerprint.
- * Firefox telemetry (April 2019) shows only 0.5% of TLS web traffic uses 1.0 or 1.1
- * [1] http://kb.mozillazine.org/Security.tls.version.*
- * [2] https://www.ssl.com/how-to/turn-off-ssl-3-0-and-tls-1-0-in-your-browser/
- * [2] archived: https://archive.is/hY2Mm ***/
+ * Firefox telemetry (April 2019) shows only 0.5% of TLS web traffic uses 1.0 or 1.1 ***/
    // user_pref("security.tls.version.min", 3);
    // user_pref("security.tls.version.max", 4);
 /* 1203: disable SSL session tracking [FF36+]

From e3381869534b7c3361cf4f2ab34499634c11ad91 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 15 Jun 2019 16:47:25 +0000
Subject: [PATCH 0384/1147] 4500 fix alignment

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index f785835..9528fa6 100644
--- a/user.js
+++ b/user.js
@@ -1452,7 +1452,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
  ** 1485266 - disable exposure of system colors to CSS or canvas (see 4615) (FF67+)
  ** 1407366 - enable inner window letterboxing (see 4504) (FF67+)
  ** 1540726 - return "light" with prefers-color-scheme (FF67+)
-        [1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
+      [1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]

From 7df6c676bed3f09eec73eca964467230be0552a7 Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Tue, 25 Jun 2019 19:33:57 +0000
Subject: [PATCH 0385/1147] Update issue templates

---
 .github/ISSUE_TEMPLATE/tools.md               | 17 +++++++++
 .../ISSUE_TEMPLATE/troubleshooting-help.md    | 35 +++++++++++++++++++
 .github/ISSUE_TEMPLATE/user-js.md             | 13 +++++++
 3 files changed, 65 insertions(+)
 create mode 100644 .github/ISSUE_TEMPLATE/tools.md
 create mode 100644 .github/ISSUE_TEMPLATE/troubleshooting-help.md
 create mode 100644 .github/ISSUE_TEMPLATE/user-js.md

diff --git a/.github/ISSUE_TEMPLATE/tools.md b/.github/ISSUE_TEMPLATE/tools.md
new file mode 100644
index 0000000..dbd0be8
--- /dev/null
+++ b/.github/ISSUE_TEMPLATE/tools.md
@@ -0,0 +1,17 @@
+---
+name: Tools
+about: Report issues with the updaters, troubleshooter, or any other tools.
+title: ''
+labels: ''
+assignees: ''
+
+---
+
+<!-- 
+Make sure to specify: 
+  - the name of the file (i.e. updater.bat, updater.sh)
+  - the OS where you used the tool (if applicable)
+  - steps to reproduce the issue
+  - expected result
+  - actual result
+-->
diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
new file mode 100644
index 0000000..b27540a
--- /dev/null
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -0,0 +1,35 @@
+---
+name: Troubleshooting help
+about: Ask for help troubleshooting issues with user.js
+title: ''
+labels: ''
+assignees: ''
+
+---
+
+<!--
+Before you ask for help...
+  - Keep reading this. Seriously.
+  - Note that we do not support forks (i.e. IceCat, Pale Moon, WaterFox, etc).
+  - Make sure you searched for the setup tags in user.js.
+  - Search the GitHub repository. The information you need is most likely here already.
+  - See if you get the same problem in a new Firefox profile without user.js.
+  - See if you get the same problem without extensions/add-ons.
+  - Check out our wiki page on troubleshooting.
+    https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.4-Troubleshooting
+
+See also:
+  - Extension breakage due to prefs
+    https://github.com/ghacksuserjs/ghacks-user.js/issues/391
+  - Prefs vs Recommended Extensions: Co-Existance+Enhancement | Conflicts
+    https://github.com/ghacksuserjs/ghacks-user.js/issues/350
+  - The extension CSP header modification game
+    https://github.com/ghacksuserjs/ghacks-user.js/issues/664
+	
+If you still need help, help us help you by providing relevant information:
+  - browser version
+  - Steps to Reproduce (STR)
+  - actual result
+  - expected result
+  - anything else you deem worth mentioning
+-->
diff --git a/.github/ISSUE_TEMPLATE/user-js.md b/.github/ISSUE_TEMPLATE/user-js.md
new file mode 100644
index 0000000..046a671
--- /dev/null
+++ b/.github/ISSUE_TEMPLATE/user-js.md
@@ -0,0 +1,13 @@
+---
+name: User.js
+about: Suggest changes to user.js
+title: ''
+labels: ''
+assignees: ''
+
+---
+
+<!--
+We value feedback in general, but we value feedback from informed users more. There is no need for you to be an expert to participate (most of us aren't), but we hope that you at least understand our decisions before questioning them. We discuss all changes openly, and we do not make changes lightly. So, if you don't understand why we decided to add/remove/change a certain pref, search the repo. The answer is most certainly here.
+If some change we made took you by surprise (in the wrong way), remember that keeping track of changes is your responsibility. Watch the repo, read the changelogs, compare revisions as you update your copy of user.js, or use any other method you prefer.
+-->

From 83b4ada670850df774395caf78c459e72f6f56d8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 26 Jun 2019 09:05:08 +0000
Subject: [PATCH 0386/1147] 67 archive

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 9528fa6..50c0977 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 28 May 2019
-* version 67-beta: Barbie Pants
+* date: 26 June 2019
+* version 67: Barbie Pants
 *   "I'm a Barbie pants in a Barbie world. Life in plastic, it's fantastic"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 51089fbad90285fca643a9ca2d91ae64c136c1c1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 26 Jun 2019 10:12:48 +0000
Subject: [PATCH 0387/1147] start 68-alpha

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 50c0977..d18cbf7 100644
--- a/user.js
+++ b/user.js
@@ -1,8 +1,8 @@
 /******
 * name: ghacks user.js
 * date: 26 June 2019
-* version 67: Barbie Pants
-*   "I'm a Barbie pants in a Barbie world. Life in plastic, it's fantastic"
+* version 68-alpha: Knock on Pants
+*   "It's like thunder, lightning... the way you wear me is frightening"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 23c884a5f838a5dcf0feb7d8c196056413f1a16f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 26 Jun 2019 10:14:24 +0000
Subject: [PATCH 0388/1147] prefs no longer hidden

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index d18cbf7..604f21f 100644
--- a/user.js
+++ b/user.js
@@ -1043,7 +1043,7 @@ user_pref("dom.event.clipboardevents.enabled", false);
 /* 2403: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
  * this disables document.execCommand("cut"/"copy") to protect your clipboard
  * [1] https://bugzilla.mozilla.org/1170911 ***/
-user_pref("dom.allow_cut_copy", false); // [HIDDEN PREF]
+user_pref("dom.allow_cut_copy", false);
 /* 2404: disable "Confirm you want to leave" dialog on page close
  * Does not prevent JS leaks of the page close event.
  * [1] https://developer.mozilla.org/docs/Web/Events/beforeunload
@@ -1465,8 +1465,8 @@ user_pref("privacy.resistFingerprinting", true);
  * The override values are a starting point to round from if you want some control
  * [1] https://bugzilla.mozilla.org/1330882
  * [2] https://hardware.metrics.mozilla.com/ ***/
-   // user_pref("privacy.window.maxInnerWidth", 1600); // [HIDDEN PREF]
-   // user_pref("privacy.window.maxInnerHeight", 900); // [HIDDEN PREF]
+   // user_pref("privacy.window.maxInnerWidth", 1000);
+   // user_pref("privacy.window.maxInnerHeight", 1000);
 /* 4503: disable mozAddonManager Web API [FF57+]
  * [NOTE] As a side-effect in FF57-59 this allowed extensions to work on AMO. In FF60+ you also need
  * to sanitize or clear extensions.webextensions.restrictedDomains (see 2662) to keep that side-effect

From 408a99289315cd00639e7fe931d871a253fab140 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 26 Jun 2019 13:32:12 +0000
Subject: [PATCH 0389/1147] Update .gitattributes

---
 .gitattributes | 1 +
 1 file changed, 1 insertion(+)

diff --git a/.gitattributes b/.gitattributes
index 2c7ddd5..f80aa4c 100644
--- a/.gitattributes
+++ b/.gitattributes
@@ -13,3 +13,4 @@
 .gitattributes export-ignore
 *.yml export-ignore
 /wikipiki export-ignore
+/.github export-ignore

From f85eb9d0c212a4a87becdbd425e36e8a86a4a953 Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Wed, 26 Jun 2019 23:09:01 -0300
Subject: [PATCH 0390/1147] update issue templates

---
 .github/ISSUE_TEMPLATE/tools.md                | 9 +++++----
 .github/ISSUE_TEMPLATE/troubleshooting-help.md | 6 ++++--
 .github/ISSUE_TEMPLATE/user-js.md              | 5 ++++-
 3 files changed, 13 insertions(+), 7 deletions(-)

diff --git a/.github/ISSUE_TEMPLATE/tools.md b/.github/ISSUE_TEMPLATE/tools.md
index dbd0be8..f98aa59 100644
--- a/.github/ISSUE_TEMPLATE/tools.md
+++ b/.github/ISSUE_TEMPLATE/tools.md
@@ -1,6 +1,6 @@
 ---
 name: Tools
-about: Report issues with the updaters, troubleshooter, or any other tools.
+about: Report issues with the updaters, the troubleshooter, or any other tools.
 title: ''
 labels: ''
 assignees: ''
@@ -8,10 +8,11 @@ assignees: ''
 ---
 
 <!-- 
-Make sure to specify: 
+Please specify: 
   - the name of the file (i.e. updater.bat, updater.sh)
-  - the OS where you used the tool (if applicable)
   - steps to reproduce the issue
-  - expected result
   - actual result
+  - expected result
+  
+Blank out this field before typing, or start typing after the next line.
 -->
diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
index b27540a..82086d9 100644
--- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -1,6 +1,6 @@
 ---
 name: Troubleshooting help
-about: Ask for help troubleshooting issues with user.js
+about: Ask for help to solve problems with user.js
 title: ''
 labels: ''
 assignees: ''
@@ -8,7 +8,7 @@ assignees: ''
 ---
 
 <!--
-Before you ask for help...
+Before you proceed...
   - Keep reading this. Seriously.
   - Note that we do not support forks (i.e. IceCat, Pale Moon, WaterFox, etc).
   - Make sure you searched for the setup tags in user.js.
@@ -32,4 +32,6 @@ If you still need help, help us help you by providing relevant information:
   - actual result
   - expected result
   - anything else you deem worth mentioning
+
+Blank out this field before typing, or start typing after the next line.
 -->
diff --git a/.github/ISSUE_TEMPLATE/user-js.md b/.github/ISSUE_TEMPLATE/user-js.md
index 046a671..734d6bc 100644
--- a/.github/ISSUE_TEMPLATE/user-js.md
+++ b/.github/ISSUE_TEMPLATE/user-js.md
@@ -1,5 +1,5 @@
 ---
-name: User.js
+name: user.js
 about: Suggest changes to user.js
 title: ''
 labels: ''
@@ -9,5 +9,8 @@ assignees: ''
 
 <!--
 We value feedback in general, but we value feedback from informed users more. There is no need for you to be an expert to participate (most of us aren't), but we hope that you at least understand our decisions before questioning them. We discuss all changes openly, and we do not make changes lightly. So, if you don't understand why we decided to add/remove/change a certain pref, search the repo. The answer is most certainly here.
+
 If some change we made took you by surprise (in the wrong way), remember that keeping track of changes is your responsibility. Watch the repo, read the changelogs, compare revisions as you update your copy of user.js, or use any other method you prefer.
+
+Blank out this field before typing, or start typing after the next line.
 -->

From 8f1c3018ca2039dcaed01f18bc846b9ad2e90f35 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 28 Jun 2019 02:29:58 +1200
Subject: [PATCH 0391/1147] Update user-js.md (#750)

---
 .github/ISSUE_TEMPLATE/user-js.md | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/.github/ISSUE_TEMPLATE/user-js.md b/.github/ISSUE_TEMPLATE/user-js.md
index 734d6bc..1357819 100644
--- a/.github/ISSUE_TEMPLATE/user-js.md
+++ b/.github/ISSUE_TEMPLATE/user-js.md
@@ -7,10 +7,9 @@ assignees: ''
 
 ---
 
-<!--
 We value feedback in general, but we value feedback from informed users more. There is no need for you to be an expert to participate (most of us aren't), but we hope that you at least understand our decisions before questioning them. We discuss all changes openly, and we do not make changes lightly. So, if you don't understand why we decided to add/remove/change a certain pref, search the repo. The answer is most certainly here.
 
-If some change we made took you by surprise (in the wrong way), remember that keeping track of changes is your responsibility. Watch the repo, read the changelogs, compare revisions as you update your copy of user.js, or use any other method you prefer.
+If some change we made took you by surprise (in the wrong way), remember that keeping track of changes is your responsibility. Watch the repo, read the [changelogs](https://github.com/ghacksuserjs/ghacks-user.js/issues?utf8=✓&q=is%3Aissue+label%3Achangelog), compare [releases](https://github.com/ghacksuserjs/ghacks-user.js/releases) as you update your copy of user.js, or use any other method you prefer.
+
+Clear all of this when you're ready to type.
 
-Blank out this field before typing, or start typing after the next line.
--->

From 9642452c483e922f14727d0f4adea2bb94e69866 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 28 Jun 2019 02:30:10 +1200
Subject: [PATCH 0392/1147] Update troubleshooting-help.md (#749)

---
 .../ISSUE_TEMPLATE/troubleshooting-help.md    | 22 ++++++-------------
 1 file changed, 7 insertions(+), 15 deletions(-)

diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
index 82086d9..02cc07a 100644
--- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -7,25 +7,18 @@ assignees: ''
 
 ---
 
-<!--
 Before you proceed...
   - Keep reading this. Seriously.
   - Note that we do not support forks (i.e. IceCat, Pale Moon, WaterFox, etc).
-  - Make sure you searched for the setup tags in user.js.
+  - Make sure you searched for the `[Setup` tags in the `user.js`.
   - Search the GitHub repository. The information you need is most likely here already.
-  - See if you get the same problem in a new Firefox profile without user.js.
-  - See if you get the same problem without extensions/add-ons.
-  - Check out our wiki page on troubleshooting.
-    https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.4-Troubleshooting
+  - Check out our [troubleshooting](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.4-Troubleshooting) wiki page, including steps to see if the problem is caused by the `user.js` or an extension.
 
 See also:
-  - Extension breakage due to prefs
-    https://github.com/ghacksuserjs/ghacks-user.js/issues/391
-  - Prefs vs Recommended Extensions: Co-Existance+Enhancement | Conflicts
-    https://github.com/ghacksuserjs/ghacks-user.js/issues/350
-  - The extension CSP header modification game
-    https://github.com/ghacksuserjs/ghacks-user.js/issues/664
-	
+  - Extension breakage due to prefs [issue 391](https://github.com/ghacksuserjs/ghacks-user.js/issues/391)
+  - Prefs vs Recommended Extensions: Co-Existance+Enhancement | Conflicts [issue 350](https://github.com/ghacksuserjs/ghacks-user.js/issues/350)
+  - The extension CSP header modification game [issue 664](https://github.com/ghacksuserjs/ghacks-user.js/issues/664)
+
 If you still need help, help us help you by providing relevant information:
   - browser version
   - Steps to Reproduce (STR)
@@ -33,5 +26,4 @@ If you still need help, help us help you by providing relevant information:
   - expected result
   - anything else you deem worth mentioning
 
-Blank out this field before typing, or start typing after the next line.
--->
+Clear all of this when you're ready to type.

From 8f40c97fd1c2cd8400357da6575e304626015415 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 28 Jun 2019 04:11:46 +0000
Subject: [PATCH 0393/1147] the return of the jedi

https://bugzilla.mozilla.org/show_bug.cgi?id=1444133
---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 604f21f..c5c084c 100644
--- a/user.js
+++ b/user.js
@@ -1632,6 +1632,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see bugzilla 1320061 [FF53+]
    // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [WINDOWS] [MAC]
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
+   // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+, FF59 and under]
 /* OTHER ***/
    // user_pref("browser.bookmarks.max_backups", 2);
    // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+]

From 42281a9e52211b4eab6b1fae8d7b0af3b9bb2910 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 28 Jun 2019 04:15:54 +0000
Subject: [PATCH 0394/1147] 2212: popup events

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index c5c084c..155a597 100644
--- a/user.js
+++ b/user.js
@@ -977,7 +977,7 @@ user_pref("browser.link.open_newwindow.restriction", 0);
  * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
 user_pref("dom.disable_open_during_load", true);
 /* 2212: limit events that can cause a popup [SETUP-WEB]
- * default is "change click dblclick mouseup pointerup notificationclick reset submit touchend contextmenu"
+ * default is "change click dblclick auxclick mouseup pointerup notificationclick reset submit touchend contextmenu"
  * [1] http://kb.mozillazine.org/Dom.popup_allowed_events ***/
 user_pref("dom.popup_allowed_events", "click dblclick");
 

From 27bd07d496f00247c49c140a13717b15f2324635 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 28 Jun 2019 04:22:50 +0000
Subject: [PATCH 0395/1147] 5000s: userChrome / userContent

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 155a597..62536d6 100644
--- a/user.js
+++ b/user.js
@@ -1621,6 +1621,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
 /* APPEARANCE ***/
    // user_pref("browser.download.autohideButton", false); // [FF57+]
    // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
+   // user_pref("toolkit.legacyUserProfileCustomizations.stylesheets", true); // [FF68+] allow userChrome/userContent
 /* CONTENT BEHAVIOR ***/
    // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
    // user_pref("clipboard.autocopy", false); // disable autocopy default [LINUX]

From 8f939c91feca31785b1ad86e9e47b2be3be4661d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 28 Jun 2019 04:47:55 +0000
Subject: [PATCH 0396/1147] 0320: UI change : get add-ons->recommendations

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 62536d6..2009dab 100644
--- a/user.js
+++ b/user.js
@@ -214,7 +214,7 @@ user_pref("browser.search.update", false);
 user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
 /* 0310: disable sending the URL of the website where a plugin crashed ***/
 user_pref("dom.ipc.plugins.reportCrashURL", false);
-/* 0320: disable about:addons' Get Add-ons panel (uses Google Analytics) ***/
+/* 0320: disable about:addons' Recommendations pane (uses Google Analytics) ***/
 user_pref("extensions.getAddons.showPane", false); // [HIDDEN PREF]
 user_pref("extensions.webservice.discoverURL", "");
 /* 0330: disable telemetry

From 31567c7938f1d86497c1e34ce967a0d8980587ee Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 28 Jun 2019 05:00:19 +0000
Subject: [PATCH 0397/1147] 0321: recommendations discovery in about:addons

---
 user.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/user.js b/user.js
index 2009dab..954b12d 100644
--- a/user.js
+++ b/user.js
@@ -217,6 +217,9 @@ user_pref("dom.ipc.plugins.reportCrashURL", false);
 /* 0320: disable about:addons' Recommendations pane (uses Google Analytics) ***/
 user_pref("extensions.getAddons.showPane", false); // [HIDDEN PREF]
 user_pref("extensions.webservice.discoverURL", "");
+/* 0321: disable recommendations in about:addons' Extensions and Themes panes [FF68+] ***/
+user_pref("extensions.getAddons.discovery.api_url", "");
+user_pref("extensions.htmlaboutaddons.discover.enabled", false);
 /* 0330: disable telemetry
  * the pref (.unified) affects the behaviour of the pref (.enabled)
  * IF unified=false then .enabled controls the telemetry module

From 55b720faeced2e9670b7c112f98c5dc83bc26dfc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 28 Jun 2019 05:30:43 +0000
Subject: [PATCH 0398/1147] letterboxing, add setup tag see #728

---
 user.js | 6 ++++--
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 954b12d..d4d5b21 100644
--- a/user.js
+++ b/user.js
@@ -1460,7 +1460,8 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]
  * This pref is the master switch for all other privacy.resist* prefs unless stated
- * [SETUP-WEB] RFP is not ready for the masses, so expect some website breakage
+ * [SETUP-WEB] RFP can cause the odd website to break in strange ways, and has a few side affects,
+ * but is largely robust nowadays. Give it a try. Your choice. Also see 4504 (letterboxing).
  * [1] https://bugzilla.mozilla.org/418986 ***/
 user_pref("privacy.resistFingerprinting", true);
 /* 4502: set new window sizes to round to hundreds [FF55+] [SETUP-CHROME]
@@ -1479,7 +1480,8 @@ user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDE
  * Dynamically resizes the inner window (FF67; 200w x100h: FF68+; stepped ranges) by applying letterboxing,
  * using dimensions which waste the least content area, If you use the dimension pref, then it will only apply
  * those resolutions. The format is "width1xheight1, width2xheight2, ..." (e.g. "800x600, 1000x1000, 1600x900")
- * [NOTE] This does NOT require RFP (see 4501) **for now**
+ * [SETUP-WEB] This does NOT require RFP (see 4501) **for now**, so if you're not using 4501, or you are but you're
+ * not taking anti-fingerprinting seriously and a little visual change upsets you, then feel free to flip this pref
  * [WARNING] The dimension pref is only meant for testing, and we recommend you DO NOT USE it
  * [1] https://bugzilla.mozilla.org/1407366 ***/
 user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]

From ed735f875cf941737738576b790ac29ed90de260 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 29 Jun 2019 02:44:37 +0000
Subject: [PATCH 0399/1147] 2001: WebRTC setup tag #605

---
 user.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/user.js b/user.js
index d4d5b21..90d9204 100644
--- a/user.js
+++ b/user.js
@@ -910,6 +910,8 @@ user_pref("media.eme.enabled", false);
 /*** [SECTION 2000]: MEDIA / CAMERA / MIC ***/
 user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
 /* 2001: disable WebRTC (Web Real-Time Communication)
+ * [SETUP-WEB] WebRTC can leak your IP address from behind your VPN, but if this is not
+ * in your threat model, and you want Real-Time Communication, this is the pref for you
  * [1] https://www.privacytools.io/#webrtc ***/
 user_pref("media.peerconnection.enabled", false);
 /* 2002: limit WebRTC IP leaks if using WebRTC

From b80c515e885efec96474473e38d238ef1606e349 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 29 Jun 2019 02:52:41 +0000
Subject: [PATCH 0400/1147]  2010: WebGL setup tag #605

---
 user.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/user.js b/user.js
index 90d9204..40b5f7b 100644
--- a/user.js
+++ b/user.js
@@ -921,6 +921,8 @@ user_pref("media.peerconnection.enabled", false);
 user_pref("media.peerconnection.ice.default_address_only", true);
 user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
 /* 2010: disable WebGL (Web Graphics Library)
+ * [SETUP-WEB] When disabled, may break some websites. When enabled, provides high entropy,
+ * especially with readPixels(). Some of the other entropy is lessened with RFP (see 4501)
  * [1] https://www.contextis.com/resources/blog/webgl-new-dimension-browser-exploitation/
  * [2] https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern ***/
 user_pref("webgl.disabled", true);

From d40d7dbabd884ebbae973f34bb56e67547f3c902 Mon Sep 17 00:00:00 2001
From: claustromaniac <20734810+claustromaniac@users.noreply.github.com>
Date: Sun, 30 Jun 2019 10:31:21 -0300
Subject: [PATCH 0401/1147] 0805 test info

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 40b5f7b..2cce115 100644
--- a/user.js
+++ b/user.js
@@ -483,7 +483,7 @@ user_pref("browser.sessionhistory.max_entries", 10);
 /* 0805: disable CSS querying page history - CSS history leak
  * [NOTE] This has NEVER been fully "resolved": in Mozilla/docs it is stated it's
  * only in 'certain circumstances', also see latest comments in [2]
- * [TEST] http://lcamtuf.coredump.cx/yahh/ (see github wiki APPENDIX C on how to use)
+ * [TEST] http://lcamtuf.coredump.cx/yahh/ (see github wiki APPENDIX A on how to use)
  * [1] https://dbaron.org/mozilla/visited-privacy
  * [2] https://bugzilla.mozilla.org/147777
  * [3] https://developer.mozilla.org/docs/Web/CSS/Privacy_and_the_:visited_selector ***/

From 11dcc54b61b84d4d3cc0d82d44857ce3e4be2921 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 9 Jul 2019 03:16:40 +0000
Subject: [PATCH 0402/1147] 0321 tweak

`url` and `discover` prefs stop the recommendations, the `enabled` pref hides the leftover recommended section and "Find more add-ons" button
---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 2cce115..b03d801 100644
--- a/user.js
+++ b/user.js
@@ -220,6 +220,7 @@ user_pref("extensions.webservice.discoverURL", "");
 /* 0321: disable recommendations in about:addons' Extensions and Themes panes [FF68+] ***/
 user_pref("extensions.getAddons.discovery.api_url", "");
 user_pref("extensions.htmlaboutaddons.discover.enabled", false);
+user_pref("extensions.htmlaboutaddons.recommendations.enabled", false);
 /* 0330: disable telemetry
  * the pref (.unified) affects the behaviour of the pref (.enabled)
  * IF unified=false then .enabled controls the telemetry module

From 469bbc1ab30788e8923abf381dd2c8df5f11235f Mon Sep 17 00:00:00 2001
From: Aeriem <45237401+Aeriem@users.noreply.github.com>
Date: Mon, 15 Jul 2019 17:49:14 +0200
Subject: [PATCH 0403/1147] remove 0864 (#760)

https://bugzilla.mozilla.org/show_bug.cgi?id=1492587
---
 user.js | 4 ----
 1 file changed, 4 deletions(-)

diff --git a/user.js b/user.js
index b03d801..314b97e 100644
--- a/user.js
+++ b/user.js
@@ -531,10 +531,6 @@ user_pref("browser.formfill.enable", false);
  * [NOTE] We also clear history and downloads on exiting Firefox (see 2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember browsing and download history ***/
    // user_pref("places.history.enabled", false);
-/* 0864: disable date/time picker
- * This can leak your locale if not en-US
- * [1] https://trac.torproject.org/projects/tor/ticket/21787 ***/
-user_pref("dom.forms.datetime", false);
 /* 0870: disable Windows jumplist [WINDOWS] ***/
 user_pref("browser.taskbar.lists.enabled", false);
 user_pref("browser.taskbar.lists.frequent.enabled", false);

From 217553b367bb9cc27d035c8e365d8a66b2a7ccbc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 15 Jul 2019 15:54:23 +0000
Subject: [PATCH 0404/1147] dom.forms.datetime

https://bugzilla.mozilla.org/show_bug.cgi?id=1492587
---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 7ac59b8..c41665f 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 12-June-2019
+ Last updated: 16-July-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -194,6 +194,7 @@
     'services.blocklist.update_enabled',
     'urlclassifier.trackingTable',
     /* 68-beta */
+    'dom.forms.datetime',
     'font.blacklist.underline_offset',
     'font.name.monospace.x-unicode',
     'font.name.monospace.x-western',

From 931462b30b3fe8c3f093e193e3ebcb4ec8f540a8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 15 Jul 2019 16:16:39 +0000
Subject: [PATCH 0405/1147] RFP stuff

https://hg.mozilla.org/mozilla-central/rev/c96e81ba64f3#l1.14
---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 314b97e..87e0a4a 100644
--- a/user.js
+++ b/user.js
@@ -1457,6 +1457,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
  ** 1407366 - enable inner window letterboxing (see 4504) (FF67+)
  ** 1540726 - return "light" with prefers-color-scheme (FF67+)
       [1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
+ ** 1564422 - spoof audioContext outputLatency (FF70+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]

From 9c782fbf57bcc2cfb12a0d3d01646ed2c8118e14 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 15 Jul 2019 17:07:35 +0000
Subject: [PATCH 0406/1147] 2032: add default

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 87e0a4a..820c66a 100644
--- a/user.js
+++ b/user.js
@@ -948,7 +948,7 @@ user_pref("media.autoplay.default", 1); // [DEFAULT: 1 in FF67+]
 user_pref("media.autoplay.enabled.user-gestures-needed", false);
 /* 2032: disable audio autoplay in non-active tabs [FF51+]
  * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
-user_pref("media.block-autoplay-until-in-foreground", true);
+user_pref("media.block-autoplay-until-in-foreground", true); // [DEFAULT: true]
 
 /*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/
 user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");

From 9aa8e27ef4d77f1de07e7d765b75fa075eb320d9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 17 Jul 2019 10:09:39 +0000
Subject: [PATCH 0407/1147] 68 deprecated

---
 user.js | 26 ++++++++++++++++----------
 1 file changed, 16 insertions(+), 10 deletions(-)

diff --git a/user.js b/user.js
index 820c66a..e52ea63 100644
--- a/user.js
+++ b/user.js
@@ -112,9 +112,7 @@ user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
 /* 0105b: disable Activity Stream Snippets
  * Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
  * [1] https://abouthome-snippets-service.readthedocs.io/ ***/
-user_pref("browser.aboutHomeSnippets.updateUrl", "");
 user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
-user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
 user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
 /* 0105c: disable Activity Stream Top Stories, Pocket-based and/or sponsored content ***/
 user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
@@ -202,11 +200,6 @@ user_pref("app.update.auto", false);
  * used when installing/updating an extension, and in daily background update checks: if false, it
  * hides the expanded text description (if it exists) when you "show more details about an addon" ***/
    // user_pref("extensions.getAddons.cache.enabled", false);
-/* 0307: disable auto updating of lightweight themes (LWT)
- * Not to be confused with themes in 0301* + 0302*, which use the FF55+ Theme API
- * Mozilla plan to convert existing LWTs and remove LWT support in the future, see [1]
- * [1] https://blog.mozilla.org/addons/2018/09/20/future-themes-here/ ***/
-user_pref("lightweightThemes.update.enabled", false);
 /* 0308: disable search update
  * [SETTING] General>Firefox Updates>Automatically update search engines ***/
 user_pref("browser.search.update", false);
@@ -1232,9 +1225,6 @@ user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
 /* 2680: enable CSP (Content Security Policy)
  * [1] https://developer.mozilla.org/docs/Web/HTTP/CSP ***/
 user_pref("security.csp.enable", true); // [DEFAULT: true]
-/* 2682: enable CSP 1.1 experimental hash-source directive [FF29+]
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=855326,883975 ***/
-user_pref("security.csp.experimentalEnabled", true);
 /* 2684: enforce a security delay on some confirmation dialogs such as install, open/save
  * [1] http://kb.mozillazine.org/Disable_extension_install_delay_-_Firefox
  * [2] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
@@ -1762,6 +1752,22 @@ user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
    // [-] https://bugzilla.mozilla.org/1528953
    // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false);
 // * * * /
+// FF68
+// 0105b: disable Activity Stream Snippets
+   // [-] https://bugzilla.mozilla.org/1540939
+user_pref("browser.aboutHomeSnippets.updateUrl", "");
+user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
+// 0307: disable auto updating of lightweight themes (LWT)
+   // Not to be confused with themes in 0301* + 0302*, which use the FF55+ Theme API
+   // Mozilla plan to convert existing LWTs and remove LWT support in the future, see [1]
+   // [1] https://blog.mozilla.org/addons/2018/09/20/future-themes-here/
+   // [-] (part3b) https://bugzilla.mozilla.org/1525762
+user_pref("lightweightThemes.update.enabled", false);
+// 2682: enable CSP 1.1 experimental hash-source directive [FF29+]
+   // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=855326,883975
+   // [-] https://bugzilla.mozilla.org/1386214
+user_pref("security.csp.experimentalEnabled", true);
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 6618bf5f7693a15c77f863b6c5d9dabd5f72972a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Jul 2019 14:02:26 +0000
Subject: [PATCH 0408/1147] media.autoplay.allow-muted, closes #756

---
 user.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/user.js b/user.js
index e52ea63..ffe82b3 100644
--- a/user.js
+++ b/user.js
@@ -942,6 +942,8 @@ user_pref("media.autoplay.enabled.user-gestures-needed", false);
 /* 2032: disable audio autoplay in non-active tabs [FF51+]
  * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
 user_pref("media.block-autoplay-until-in-foreground", true); // [DEFAULT: true]
+/* 2033: disable autoplay for muted videos [FF63+] ***/
+   // user_pref("media.autoplay.allow-muted", false);
 
 /*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/
 user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");

From aff595b6eac61cb1f258cea927a2e2aa0e7970af Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 4 Aug 2019 19:17:38 +0000
Subject: [PATCH 0409/1147] 1704: remove the obvious

---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index ffe82b3..750511d 100644
--- a/user.js
+++ b/user.js
@@ -869,7 +869,6 @@ user_pref("privacy.userContext.enabled", true);
 user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // [DEFAULT: true in FF61+]
 /* 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
  * 0=no menu (default), 1=show when clicked, 2=show on long press
- * [NOTE] The menu does not contain a non-container tab option (use Ctrl+T to open non-container tab)
  * [1] https://bugzilla.mozilla.org/1328756 ***/
 user_pref("privacy.userContext.longPressBehavior", 2);
 

From f2200fd4423eb4aaa61f6817bc3798d2eadd2f43 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 19 Aug 2019 04:52:53 +0000
Subject: [PATCH 0410/1147] 68-alpha (for earthlng diffs)

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 750511d..63fa5f8 100644
--- a/user.js
+++ b/user.js
@@ -1,6 +1,6 @@
 /******
 * name: ghacks user.js
-* date: 26 June 2019
+* date: 18 August 2019
 * version 68-alpha: Knock on Pants
 *   "It's like thunder, lightning... the way you wear me is frightening"
 * authors: v52+ github | v51- www.ghacks.net

From 90ef9e63ebbb6aa4c56cea04e7c43b4c3b48907d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 19 Aug 2019 04:54:30 +0000
Subject: [PATCH 0411/1147] oophs I meant 68-beta

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 63fa5f8..60fb8fa 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
 * date: 18 August 2019
-* version 68-alpha: Knock on Pants
+* version 68-beta: Knock on Pants
 *   "It's like thunder, lightning... the way you wear me is frightening"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 86bfdd14704f156ea8ff038edbd9ebcb074933ba Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 21 Aug 2019 04:08:40 +0000
Subject: [PATCH 0412/1147] tweak: middlemouse.paste for Linux

---
 user.js | 11 ++++++-----
 1 file changed, 6 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 60fb8fa..f4b718b 100644
--- a/user.js
+++ b/user.js
@@ -1038,11 +1038,15 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
  * the website for it to look at the clipboard
  * [1] https://www.ghacks.net/2014/01/08/block-websites-reading-modifying-clipboard-contents-firefox/ ***/
 user_pref("dom.event.clipboardevents.enabled", false);
-/* 2403: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
+/* 2403: disable middlemouse paste leaking clipboard content on Linux after autoscroll
+ * Defense in depth if clipboard events are enabled (see 2402)
+ * [1] https://bugzilla.mozilla.org/1528289 */
+user_pref("middlemouse.paste", false); // [DEFAULT: false on Windows]
+/* 2404: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
  * this disables document.execCommand("cut"/"copy") to protect your clipboard
  * [1] https://bugzilla.mozilla.org/1170911 ***/
 user_pref("dom.allow_cut_copy", false);
-/* 2404: disable "Confirm you want to leave" dialog on page close
+/* 2405: disable "Confirm you want to leave" dialog on page close
  * Does not prevent JS leaks of the page close event.
  * [1] https://developer.mozilla.org/docs/Web/Events/beforeunload
  * [2] https://support.mozilla.org/questions/1043508 ***/
@@ -1187,9 +1191,6 @@ user_pref("pdfjs.disabled", false); // [DEFAULT: false]
 /* 2621: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS]
  * [1] https://www.ghacks.net/2016/03/25/block-firefox-chrome-windows-store/ ***/
 user_pref("network.protocol-handler.external.ms-windows-store", false);
-/* 2622: disable middlemouse paste leaking on Linux
- * [1] https://bugzilla.mozilla.org/1528289 */
-user_pref("middlemouse.paste", false); // [DEFAULT: false on Windows]
 
 /** DOWNLOADS ***/
 /* 2650: discourage downloading to desktop

From 5166811bd55316757a02fe07cb87938b210d91fb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 21 Aug 2019 13:01:12 +0000
Subject: [PATCH 0413/1147] 1003: closes #772

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index f4b718b..8df81ae 100644
--- a/user.js
+++ b/user.js
@@ -586,6 +586,7 @@ user_pref("browser.cache.disk.enable", false);
  * [1] http://kb.mozillazine.org/Browser.cache.disk_cache_ssl ***/
 user_pref("browser.cache.disk_cache_ssl", false);
 /* 1003: disable memory cache
+/* capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kilobytes
  * [NOTE] Not recommended due to performance issues ***/
    // user_pref("browser.cache.memory.enable", false);
    // user_pref("browser.cache.memory.capacity", 0); // [HIDDEN PREF]

From a0f3da208fc529244581822cfcd80a15e29a272d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 28 Aug 2019 16:33:06 +0000
Subject: [PATCH 0414/1147] 0390: better reference

- EFF has pretty pictures and stuff and explains the issues (replaces wikipedia which people can still search for)
- tor issue doesn't hold anything important (out it goes)
- moz wiki page I'll leave in for the bugzilla links if someone wants to research how it's all meant to work
---
 user.js | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 8df81ae..b052c8b 100644
--- a/user.js
+++ b/user.js
@@ -267,9 +267,8 @@ user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [FF58+
  * [2] https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/ ***/
 user_pref("extensions.pocket.enabled", false);
 /* 0390: disable Captive Portal detection
- * [1] https://en.wikipedia.org/wiki/Captive_portal
- * [2] https://wiki.mozilla.org/Necko/CaptivePortal
- * [3] https://trac.torproject.org/projects/tor/ticket/21790 ***/
+ * [1] https://www.eff.org/deeplinks/2017/08/how-captive-portals-interfere-wireless-security-and-privacy
+ * [2] https://wiki.mozilla.org/Necko/CaptivePortal ***/
 user_pref("captivedetect.canonicalURL", "");
 user_pref("network.captive-portal-service.enabled", false); // [FF52+]
 /* 0391: disable Network Connectivity checks [FF65+]

From d26ea4f39e3aacdc2a7a7bb0e92e3acc33962c9a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 31 Aug 2019 14:51:08 +0000
Subject: [PATCH 0415/1147] 68 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index b052c8b..646a69a 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 18 August 2019
-* version 68-beta: Knock on Pants
+* date: 31 August 2019
+* version 68: Knock on Pants
 *   "It's like thunder, lightning... the way you wear me is frightening"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 755ebf88fb99d2e42b4cb2f488d99dd7eec6d796 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 1 Sep 2019 06:27:24 +0000
Subject: [PATCH 0416/1147] start 69 commits

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 646a69a..34737f5 100644
--- a/user.js
+++ b/user.js
@@ -1,8 +1,8 @@
 /******
 * name: ghacks user.js
-* date: 31 August 2019
-* version 68: Knock on Pants
-*   "It's like thunder, lightning... the way you wear me is frightening"
+* date: 1 September 2019
+* version 69-beta: Pants One More Time
+*   "When I'm not with pants I lose my mind. Give me a sign. Hit me, pants, one more time."
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 19484e1a56a73b6c05d4aa7ecd9acdaf26f0baa5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 1 Sep 2019 14:47:17 +0000
Subject: [PATCH 0417/1147] 2805: see #774

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 34737f5..25f2cff 100644
--- a/user.js
+++ b/user.js
@@ -1340,9 +1340,9 @@ user_pref("privacy.cpd.offlineApps", true); // Offline Website Data
 user_pref("privacy.cpd.passwords", false); // this is not listed
 user_pref("privacy.cpd.sessions", true); // Active Logins
 user_pref("privacy.cpd.siteSettings", false); // Site Preferences
-/* 2805: privacy.*.openWindows (clear session restore data) [FF34+]
- * [NOTE] There is a years-old bug that these cause two windows when Firefox restarts.
- * You do not need these anyway if session restore is cleared with history (see 2803) ***/
+/* 2805: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
+ * [NOTE] Not needed if Session Restore is not used (see 0102) or is already cleared with history (see 2803)
+ * [NOTE] privacy.cpd.openWindows has a bug that causes an additional window to open ***/
    // user_pref("privacy.clearOnShutdown.openWindows", true);
    // user_pref("privacy.cpd.openWindows", true);
 /* 2806: reset default 'Time range to clear' for 'Clear Recent History' (see 2804)

From 8d1c95c6501067b20fd5c5eb2e0803769ecd6465 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 1 Sep 2019 19:16:36 +0000
Subject: [PATCH 0418/1147] 2030: autoplay changes

When ESR60 hits end of life, we should remove that value 2
---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 25f2cff..11ce94d 100644
--- a/user.js
+++ b/user.js
@@ -932,10 +932,10 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
    // user_pref("permissions.default.camera", 2);
    // user_pref("permissions.default.microphone", 2);
 /* 2030: disable autoplay of HTML5 media [FF63+]
- * 0=Allowed, 1=Blocked (2=Prompt - removed in FF66)
+ * 0=Allow Audio and Video, 1=Block Audio, 2=Prompt (removed in FF66), 5=Block Audio and Video (added in FF69+)
  * [NOTE] You can set exceptions under site permissions
- * [SETTING] Privacy & Security>Permissions>Block websites from automatically playing sound ***/
-user_pref("media.autoplay.default", 1); // [DEFAULT: 1 in FF67+]
+ * [SETTING] Privacy & Security>Permissions>Autoplay>Settings>Default... ***/
+   // user_pref("media.autoplay.default", 5); // [DEFAULT: 1 in FF67+]
 /* 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] ***/
 user_pref("media.autoplay.enabled.user-gestures-needed", false);
 /* 2032: disable audio autoplay in non-active tabs [FF51+]

From 0691b8babe5d68d8e73512e7edd894db593cef1f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 1 Sep 2019 19:22:28 +0000
Subject: [PATCH 0419/1147] 2032: fix description

from earthlng
> it blocks **all media** autoplay "until in foreground", not just audio.
> Source: https://dxr.mozilla.org/mozilla-central/source/toolkit/content/widgets/browser-custom-element.js#1141
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 11ce94d..bdcda3c 100644
--- a/user.js
+++ b/user.js
@@ -938,7 +938,7 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
    // user_pref("media.autoplay.default", 5); // [DEFAULT: 1 in FF67+]
 /* 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] ***/
 user_pref("media.autoplay.enabled.user-gestures-needed", false);
-/* 2032: disable audio autoplay in non-active tabs [FF51+]
+/* 2032: disable autoplay of HTML5 media in non-active tabs [FF51+]
  * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
 user_pref("media.block-autoplay-until-in-foreground", true); // [DEFAULT: true]
 /* 2033: disable autoplay for muted videos [FF63+] ***/

From b47982bb9a62d918b679bca1a902e6523f7f832a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 1 Sep 2019 20:32:53 +0000
Subject: [PATCH 0420/1147] 2030: again

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index bdcda3c..2bc1147 100644
--- a/user.js
+++ b/user.js
@@ -932,7 +932,7 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
    // user_pref("permissions.default.camera", 2);
    // user_pref("permissions.default.microphone", 2);
 /* 2030: disable autoplay of HTML5 media [FF63+]
- * 0=Allow Audio and Video, 1=Block Audio, 2=Prompt (removed in FF66), 5=Block Audio and Video (added in FF69+)
+ * 0=Allow all, 1=Block non-muted media, 2=Prompt (removed in FF66), 5=Block all (added in FF69+)
  * [NOTE] You can set exceptions under site permissions
  * [SETTING] Privacy & Security>Permissions>Autoplay>Settings>Default... ***/
    // user_pref("media.autoplay.default", 5); // [DEFAULT: 1 in FF67+]

From 810045eb391705420baf45b4e4ba3f177be07f6b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 1 Sep 2019 21:03:53 +0000
Subject: [PATCH 0421/1147] 1802: remove intervalInMinues

with `plugins.click_to_play` deprecated in FF69, no-one here is sure if `intervalInMinutes` still applies to Flash or even works, and no-one here cares about Flash. Happy to let Mozilla just keep restricting it more and more until it's deprecated in early 2020. Note: we already disable flash anyway in pref 1803.
---
 user.js | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 2bc1147..12ac437 100644
--- a/user.js
+++ b/user.js
@@ -874,9 +874,8 @@ user_pref("privacy.userContext.longPressBehavior", 2);
 
 /*** [SECTION 1800]: PLUGINS ***/
 user_pref("_user.js.parrot", "1800 syntax error: the parrot's pushing up daisies!");
-/* 1802: enable click to play and set to 0 minutes ***/
+/* 1802: enable click to play ***/
 user_pref("plugins.click_to_play", true);
-user_pref("plugin.sessionPermissionNow.intervalInMinutes", 0);
 /* 1803: disable Flash plugin
  * 0=deactivated, 1=ask, 2=enabled
  * ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash

From cccb5b10b4b4141787972071e8854fd5f440ca91 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 1 Sep 2019 21:06:10 +0000
Subject: [PATCH 0422/1147] plugin.sessionPermissionNow.intervalInMinutes

---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index c41665f..bbf5963 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 16-July-2019
+ Last updated: 01-September-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -204,6 +204,8 @@
     'font.name.serif.x-western',
     'layout.css.font-loading-api.enabled',
     'toolkit.telemetry.cachedClientID',
+    /* 69-beta */
+    'plugin.sessionPermissionNow.intervalInMinutes',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 4d72ad90b0443a966cda53824e6fba165f581745 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 2 Sep 2019 18:33:00 +1200
Subject: [PATCH 0423/1147] 2701: cookies default FF69+

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 12ac437..d1b717f 100644
--- a/user.js
+++ b/user.js
@@ -1247,12 +1247,12 @@ user_pref("security.dialog_enable_delay", 700);
 ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 /* 2701: disable 3rd-party cookies and site-data [SETUP-WEB]
- * 0=Accept cookies and site data (default), 1=(Block) All third-party cookies, 2=(Block) All cookies,
+ * 0=Accept cookies and site data, 1=(Block) All third-party cookies, 2=(Block) All cookies,
  * 3=(Block) Cookies from unvisited sites, 4=(Block) Third-party trackers (FF63+)
  * [NOTE] Value 4 is tied to the Tracking Protection lists
  * [NOTE] You can set exceptions under site permissions or use an extension
  * [SETTING] Privacy & Security>Content Blocking>Custom>Choose what to block>Cookies ***/
-user_pref("network.cookie.cookieBehavior", 1);
+user_pref("network.cookie.cookieBehavior", 1); // [DEFAULT: 4 in FF69+]
 /* 2702: set third-party cookies (i.e ALL) (if enabled, see 2701) to session-only
    and (FF58+) set third-party non-secure (i.e HTTP) cookies to session-only
    [NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and

From 953b96431eec4440d64ea8a2d30aa32bc69d8af1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 2 Sep 2019 06:45:30 +0000
Subject: [PATCH 0424/1147] 4000: RFP info re 1330467

it rode the train in 69... after a bumpy ride in 68 where it was backed out. Note: it still has some issues. Suggest users wipe the site permissions once upgraded to 69
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index d1b717f..91b8604 100644
--- a/user.js
+++ b/user.js
@@ -1369,7 +1369,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1492607 - isolate postMessage with targetOrigin "*" (requires 4002) (FF65+)
  ** 1542309 - isolate top-level domain URLs (FF68+)
  ** 1506693 - isolate pdfjs range-based requests (FF68+)
- ** 1330467 - isolate site permissions (coming)
+ ** 1330467 - isolate site permissions (FF69+)
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]

From 66cdb72927cb9a0caff3621267f67ad53e46732b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 2 Sep 2019 07:07:50 +0000
Subject: [PATCH 0425/1147] FF69: deprecated

---
 user.js | 21 +++++++++++++++------
 1 file changed, 15 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 91b8604..6b20962 100644
--- a/user.js
+++ b/user.js
@@ -785,8 +785,6 @@ user_pref("browser.display.use_document_fonts", 0);
 /* 1404: disable rendering of SVG OpenType fonts
  * [1] https://wiki.mozilla.org/SVGOpenTypeFonts - iSECPartnersReport recommends to disable this ***/
 user_pref("gfx.font_rendering.opentype_svg.enabled", false);
-/* 1405: disable WOFF2 (Web Open Font Format) [FF35+] ***/
-   // user_pref("gfx.downloadable_fonts.woff2.enabled", false);
 /* 1408: disable graphite which FF49 turned back on by default
  * In the past it had security issues. Update: This continues to be the case, see [1]
  * [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778 ***/
@@ -874,8 +872,6 @@ user_pref("privacy.userContext.longPressBehavior", 2);
 
 /*** [SECTION 1800]: PLUGINS ***/
 user_pref("_user.js.parrot", "1800 syntax error: the parrot's pushing up daisies!");
-/* 1802: enable click to play ***/
-user_pref("plugins.click_to_play", true);
 /* 1803: disable Flash plugin
  * 0=deactivated, 1=ask, 2=enabled
  * ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash
@@ -940,8 +936,6 @@ user_pref("media.autoplay.enabled.user-gestures-needed", false);
 /* 2032: disable autoplay of HTML5 media in non-active tabs [FF51+]
  * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
 user_pref("media.block-autoplay-until-in-foreground", true); // [DEFAULT: true]
-/* 2033: disable autoplay for muted videos [FF63+] ***/
-   // user_pref("media.autoplay.allow-muted", false);
 
 /*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/
 user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
@@ -1771,5 +1765,20 @@ user_pref("security.csp.experimentalEnabled", true);
 // * * * /
 // ***/
 
+/* ESR68.x still uses all the following prefs
+// [NOTE] replace the * with a slash in the line above to re-enable them
+// FF69
+// 1405: disable WOFF2 (Web Open Font Format) [FF35+]
+   // user_pref("gfx.downloadable_fonts.woff2.enabled", false);
+   // [-] https://bugzilla.mozilla.org/1556991
+// 1802: enable click to play
+   // [-] https://bugzilla.mozilla.org/1519434
+user_pref("plugins.click_to_play", true);
+// 2033: disable autoplay for muted videos [FF63+] - replaced by `media.autoplay.default` options (2030)
+   // [-] https://bugzilla.mozilla.org/1562331
+   // user_pref("media.autoplay.allow-muted", false);
+// * * * /
+// ***/
+
 /* END: internal custom pref to test for syntax errors ***/
 user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");

From be9d9ac9ca706ec17875f48a5d16810252ec8bfc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 3 Sep 2019 03:34:16 +0000
Subject: [PATCH 0426/1147] 2701: tidyup

---
 user.js | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 6b20962..0a274e8 100644
--- a/user.js
+++ b/user.js
@@ -1242,11 +1242,10 @@ user_pref("security.dialog_enable_delay", 700);
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 /* 2701: disable 3rd-party cookies and site-data [SETUP-WEB]
  * 0=Accept cookies and site data, 1=(Block) All third-party cookies, 2=(Block) All cookies,
- * 3=(Block) Cookies from unvisited sites, 4=(Block) Third-party trackers (FF63+)
- * [NOTE] Value 4 is tied to the Tracking Protection lists
+ * 3=(Block) Cookies from unvisited sites, 4=(Block) Third-party trackers (FF63+) (default FF69+)
  * [NOTE] You can set exceptions under site permissions or use an extension
  * [SETTING] Privacy & Security>Content Blocking>Custom>Choose what to block>Cookies ***/
-user_pref("network.cookie.cookieBehavior", 1); // [DEFAULT: 4 in FF69+]
+user_pref("network.cookie.cookieBehavior", 1);
 /* 2702: set third-party cookies (i.e ALL) (if enabled, see 2701) to session-only
    and (FF58+) set third-party non-secure (i.e HTTP) cookies to session-only
    [NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and

From 44d9ceaf0533e7d995db0e065c3a44dcc977da1e Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 3 Sep 2019 13:40:33 +0000
Subject: [PATCH 0427/1147] various tidyups

---
 user.js | 29 +++++++++++++++--------------
 1 file changed, 15 insertions(+), 14 deletions(-)

diff --git a/user.js b/user.js
index 0a274e8..6a6ed42 100644
--- a/user.js
+++ b/user.js
@@ -112,8 +112,8 @@ user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
 /* 0105b: disable Activity Stream Snippets
  * Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
  * [1] https://abouthome-snippets-service.readthedocs.io/ ***/
-user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
 user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
+user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
 /* 0105c: disable Activity Stream Top Stories, Pocket-based and/or sponsored content ***/
 user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
@@ -417,7 +417,8 @@ user_pref("network.http.altsvc.oe", false);
 user_pref("network.proxy.socks_remote_dns", true);
 /* 0707: disable (or setup) DNS-over-HTTPS (DoH) [FF60+]
  * TRR = Trusted Recursive Resolver
- * .mode: 0=off, 1=race, 2=TRR first, 3=TRR only, 4=race for stats but always use native result
+ * 0=off, 1=race (removed in FF69), 2=TRR first, 3=TRR only,
+ * 4=race for stats but always use native result (removed in FF69)
  * [WARNING] DoH bypasses hosts and gives info to yet another party (e.g. Cloudflare)
  * [1] https://www.ghacks.net/2018/04/02/configure-dns-over-https-in-firefox/
  * [2] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/ ***/
@@ -927,10 +928,10 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
    // user_pref("permissions.default.camera", 2);
    // user_pref("permissions.default.microphone", 2);
 /* 2030: disable autoplay of HTML5 media [FF63+]
- * 0=Allow all, 1=Block non-muted media, 2=Prompt (removed in FF66), 5=Block all (added in FF69+)
+ * 0=Allow all, 1=Block non-muted media (default in FF67+), 2=Prompt (removed in FF66), 5=Block all (FF69+)
  * [NOTE] You can set exceptions under site permissions
- * [SETTING] Privacy & Security>Permissions>Autoplay>Settings>Default... ***/
-   // user_pref("media.autoplay.default", 5); // [DEFAULT: 1 in FF67+]
+ * [SETTING] Privacy & Security>Permissions>Autoplay>Settings>Default for all websites ***/
+   // user_pref("media.autoplay.default", 5);
 /* 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] ***/
 user_pref("media.autoplay.enabled.user-gestures-needed", false);
 /* 2032: disable autoplay of HTML5 media in non-active tabs [FF51+]
@@ -1013,7 +1014,7 @@ user_pref("dom.serviceWorkers.enabled", false);
    // user_pref("dom.push.connection.enabled", false);
    // user_pref("dom.push.serverURL", "");
    // user_pref("dom.push.userAgentID", "");
-/* 2306: set a default permission for Notifications (both 2305 and 2306) [FF58+]
+/* 2306: set a default permission for Notifications (both 2304 and 2305) [FF58+]
  * 0=always ask (default), 1=allow, 2=block
  * [NOTE] Best left at default "always ask", fingerprintable via Permissions API
  * [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
@@ -1187,7 +1188,7 @@ user_pref("network.protocol-handler.external.ms-windows-store", false);
 
 /** DOWNLOADS ***/
 /* 2650: discourage downloading to desktop
- * 0=desktop 1=downloads 2=last used
+ * 0=desktop, 1=downloads (default), 2=last used
  * [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
    // user_pref("browser.download.folderList", 2);
 /* 2651: enforce user interaction for security by always asking where to download [SETUP-CHROME]
@@ -1360,7 +1361,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1300671 - isolate data:, about: URLs (FF55+)
  ** 1473247 - isolate IP addresses (FF63+)
  ** 1492607 - isolate postMessage with targetOrigin "*" (requires 4002) (FF65+)
- ** 1542309 - isolate top-level domain URLs (FF68+)
+ ** 1542309 - isolate top-level domain URLs when host is in the public suffix list (FF68+)
  ** 1506693 - isolate pdfjs range-based requests (FF68+)
  ** 1330467 - isolate site permissions (FF69+)
 ***/
@@ -1747,10 +1748,10 @@ user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
    // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false);
 // * * * /
 // FF68
-// 0105b: disable Activity Stream Snippets
-   // [-] https://bugzilla.mozilla.org/1540939
-user_pref("browser.aboutHomeSnippets.updateUrl", "");
+// 0105b: disable Activity Stream Legacy Snippets
+   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1546190,1540939
 user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
+user_pref("browser.aboutHomeSnippets.updateUrl", "");
 // 0307: disable auto updating of lightweight themes (LWT)
    // Not to be confused with themes in 0301* + 0302*, which use the FF55+ Theme API
    // Mozilla plan to convert existing LWTs and remove LWT support in the future, see [1]
@@ -1768,11 +1769,11 @@ user_pref("security.csp.experimentalEnabled", true);
 // [NOTE] replace the * with a slash in the line above to re-enable them
 // FF69
 // 1405: disable WOFF2 (Web Open Font Format) [FF35+]
-   // user_pref("gfx.downloadable_fonts.woff2.enabled", false);
    // [-] https://bugzilla.mozilla.org/1556991
-// 1802: enable click to play
+   // user_pref("gfx.downloadable_fonts.woff2.enabled", false);
+// 1802: enforce click-to-play for plugins
    // [-] https://bugzilla.mozilla.org/1519434
-user_pref("plugins.click_to_play", true);
+user_pref("plugins.click_to_play", true); // [DEFAULT: true in FF25+]
 // 2033: disable autoplay for muted videos [FF63+] - replaced by `media.autoplay.default` options (2030)
    // [-] https://bugzilla.mozilla.org/1562331
    // user_pref("media.autoplay.allow-muted", false);

From a12dd83b1f5c9e254a934b2875fee20a6a4e3b5c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 4 Sep 2019 21:36:50 +0000
Subject: [PATCH 0428/1147] 69-alpha, fixes #766

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 6a6ed42..c89458e 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 1 September 2019
-* version 69-beta: Pants One More Time
+* date: 4 September 2019
+* version 69-alpha: Pants One More Time
 *   "When I'm not with pants I lose my mind. Give me a sign. Hit me, pants, one more time."
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 2c734612f63df907bb809560cc14f053b0978c18 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 4 Sep 2019 21:40:04 +0000
Subject: [PATCH 0429/1147] ummm .. beta

OK, did that all back to front... alpha is when we're working on the diffs .. beta is when we finished it
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index c89458e..615351e 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
 * date: 4 September 2019
-* version 69-alpha: Pants One More Time
+* version 69-beta: Pants One More Time
 *   "When I'm not with pants I lose my mind. Give me a sign. Hit me, pants, one more time."
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 3210ab0ca85356281e7e345f7f26838af5a64276 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 7 Sep 2019 07:22:32 +0000
Subject: [PATCH 0430/1147] 370: pocket -> 5000s, closes #787

---
 user.js | 6 +-----
 1 file changed, 1 insertion(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 615351e..4430df4 100644
--- a/user.js
+++ b/user.js
@@ -261,11 +261,6 @@ user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // [FF51+]
 /* 0351: disable backlogged Crash Reports
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send backlogged crash reports  ***/
 user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [FF58+]
-/* 0370: disable Pocket [FF46+]
- * Pocket is a third party (now owned by Mozilla) "save for later" cloud service
- * [1] https://en.wikipedia.org/wiki/Pocket_(application)
- * [2] https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/ ***/
-user_pref("extensions.pocket.enabled", false);
 /* 0390: disable Captive Portal detection
  * [1] https://www.eff.org/deeplinks/2017/08/how-captive-portals-interfere-wireless-security-and-privacy
  * [2] https://wiki.mozilla.org/Necko/CaptivePortal ***/
@@ -1632,6 +1627,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
       // [SETTING] General>Browsing>Recommend extensions as you browse
    // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
       // [SETTING] General>Browsing>Recommend features as you browse
+   // user_pref("extensions.pocket.enabled", false); // disable and hide Pocket [FF46+]
    // user_pref("identity.fxaccounts.enabled", false); // disable and hide Firefox Accounts and Sync [FF60+] [RESTART]
    // user_pref("network.manage-offline-status", false); // see bugzilla 620472
    // user_pref("reader.parse-on-load.enabled", false); // "Reader View"

From 3a9440aeea071f0856c965dd0874cd819697e445 Mon Sep 17 00:00:00 2001
From: rusty-snake <print_hello_world+GitHub@protonmail.com>
Date: Sun, 8 Sep 2019 11:38:37 +0000
Subject: [PATCH 0431/1147] 0707: Add mode 5 (#789)

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 4430df4..0c3f94e 100644
--- a/user.js
+++ b/user.js
@@ -412,8 +412,8 @@ user_pref("network.http.altsvc.oe", false);
 user_pref("network.proxy.socks_remote_dns", true);
 /* 0707: disable (or setup) DNS-over-HTTPS (DoH) [FF60+]
  * TRR = Trusted Recursive Resolver
- * 0=off, 1=race (removed in FF69), 2=TRR first, 3=TRR only,
- * 4=race for stats but always use native result (removed in FF69)
+ * 0=off by default, 1=race (removed in FF69), 2=TRR first, 3=TRR only,
+ * 4=race for stats but always use native result (removed in FF69), 5=explicitly off
  * [WARNING] DoH bypasses hosts and gives info to yet another party (e.g. Cloudflare)
  * [1] https://www.ghacks.net/2018/04/02/configure-dns-over-https-in-firefox/
  * [2] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/ ***/

From 7311cfdf84d3f839c95bb4cba535b9c1a3d44e38 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 9 Sep 2019 21:43:50 +0000
Subject: [PATCH 0432/1147] remove 1002, closes #792

---
 user.js | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/user.js b/user.js
index 0c3f94e..0b61504 100644
--- a/user.js
+++ b/user.js
@@ -577,9 +577,6 @@ user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is m
  * or you use a hardened Temporary Containers, then feel free to override this
  * [NOTE] We also clear cache on exiting Firefox (see 2803) ***/
 user_pref("browser.cache.disk.enable", false);
-/* 1002: disable disk cache for SSL pages
- * [1] http://kb.mozillazine.org/Browser.cache.disk_cache_ssl ***/
-user_pref("browser.cache.disk_cache_ssl", false);
 /* 1003: disable memory cache
 /* capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kilobytes
  * [NOTE] Not recommended due to performance issues ***/

From 335299a0cfc083e86e1b88e849999b5daffd5a58 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 9 Sep 2019 21:45:33 +0000
Subject: [PATCH 0433/1147] browser.cache.disk_cache_ssl

---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index bbf5963..df68905 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 01-September-2019
+ Last updated: 09-September-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -206,6 +206,8 @@
     'toolkit.telemetry.cachedClientID',
     /* 69-beta */
     'plugin.sessionPermissionNow.intervalInMinutes',
+    /* 70-beta */
+    'browser.cache.disk_cache_ssl',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From d503d96db034ae5ee5740867f638eb5c17d52d3c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 12 Sep 2019 15:50:54 +0000
Subject: [PATCH 0434/1147] 0320+0321: redundant prefs, closes #793

---
 user.js | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/user.js b/user.js
index 0b61504..5027fc5 100644
--- a/user.js
+++ b/user.js
@@ -209,10 +209,7 @@ user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
 user_pref("dom.ipc.plugins.reportCrashURL", false);
 /* 0320: disable about:addons' Recommendations pane (uses Google Analytics) ***/
 user_pref("extensions.getAddons.showPane", false); // [HIDDEN PREF]
-user_pref("extensions.webservice.discoverURL", "");
 /* 0321: disable recommendations in about:addons' Extensions and Themes panes [FF68+] ***/
-user_pref("extensions.getAddons.discovery.api_url", "");
-user_pref("extensions.htmlaboutaddons.discover.enabled", false);
 user_pref("extensions.htmlaboutaddons.recommendations.enabled", false);
 /* 0330: disable telemetry
  * the pref (.unified) affects the behaviour of the pref (.enabled)

From e16425310f679658601235020c6b710664418981 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 12 Sep 2019 15:52:46 +0000
Subject: [PATCH 0435/1147] 0320+0321: redundant prefs, #793

---
 scratchpad-scripts/ghacks-clear-[removed].js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index df68905..f54d94c 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 09-September-2019
+ Last updated: 12-September-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -208,6 +208,9 @@
     'plugin.sessionPermissionNow.intervalInMinutes',
     /* 70-beta */
     'browser.cache.disk_cache_ssl',
+    'extensions.getAddons.discovery.api_url',
+    'extensions.htmlaboutaddons.discover.enabled',
+    'extensions.webservice.discoverURL',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From a35cba391488944f6717b1d92917b5eee54ce93e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 12 Sep 2019 16:22:09 +0000
Subject: [PATCH 0436/1147] 2651: android UI breakage, closes #795

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 5027fc5..c7f708c 100644
--- a/user.js
+++ b/user.js
@@ -1180,7 +1180,8 @@ user_pref("network.protocol-handler.external.ms-windows-store", false);
  * 0=desktop, 1=downloads (default), 2=last used
  * [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
    // user_pref("browser.download.folderList", 2);
-/* 2651: enforce user interaction for security by always asking where to download [SETUP-CHROME]
+/* 2651: enforce user interaction for security by always asking where to download
+ * [SETUP-CHROME] On Android this blocks longtapping and saving images
  * [SETTING] General>Downloads>Always ask you where to save files ***/
 user_pref("browser.download.useDownloadDir", false);
 /* 2652: disable adding downloads to the system's "recent documents" list ***/

From 7c0a327b06ae2070dac2e067bceeb90c52c214be Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 16 Sep 2019 15:25:30 +0000
Subject: [PATCH 0437/1147] cache, closes #778

---
 user.js | 21 ++++++++++++---------
 1 file changed, 12 insertions(+), 9 deletions(-)

diff --git a/user.js b/user.js
index c7f708c..e856582 100644
--- a/user.js
+++ b/user.js
@@ -556,16 +556,20 @@ user_pref("signon.formlessCapture.enabled", false);
 user_pref("network.auth.subresource-http-auth-allow", 1);
 
 /*** [SECTION 1000]: CACHE / SESSION (RE)STORE / FAVICONS
-     ETAG [1] and other [2][3] cache tracking/fingerprinting techniques can be averted by
-     disabling *BOTH* disk (1001) and memory (1003) cache. ETAGs can also be neutralized
-     by modifying response headers [4]. Another solution is to use a hardened configuration
-     with Temporary Containers [5]. Alternatively, you can *LIMIT* exposure by clearing
-     cache on close (2803). or on a regular basis manually or with an extension.
+     Cache tracking/fingerprinting techniques [1][2][3] require a cache. Disabling disk (1001)
+     *and* memory (1003) caches is one solution; but that's extreme and fingerprintable. A hardened
+     Temporary Containers configuration can effectively do the same thing, by isolating every tab [4].
+
+     We consider avoiding disk cache (1001) so cache is session/memory only (like Private Browsing
+     mode), and isolating cache to first party (4001) is sufficient and a good balance between
+     risk and performance. ETAGs can also be neutralized by modifying response headers [5], and
+     you can clear the cache manually or on a regular basis with an extension.
+
      [1] https://en.wikipedia.org/wiki/HTTP_ETag#Tracking_using_ETags
      [2] https://robertheaton.com/2014/01/20/cookieless-user-tracking-for-douchebags/
      [3] https://www.grepular.com/Preventing_Web_Tracking_via_the_Browser_Cache
-     [4] https://github.com/ghacksuserjs/ghacks-user.js/wiki/4.2.4-Header-Editor
-     [5] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
+     [4] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
+     [5] https://github.com/ghacksuserjs/ghacks-user.js/wiki/4.2.4-Header-Editor
 ***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
 /** CACHE ***/
@@ -575,8 +579,7 @@ user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is m
  * [NOTE] We also clear cache on exiting Firefox (see 2803) ***/
 user_pref("browser.cache.disk.enable", false);
 /* 1003: disable memory cache
-/* capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kilobytes
- * [NOTE] Not recommended due to performance issues ***/
+/* capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kilobytes ***/
    // user_pref("browser.cache.memory.enable", false);
    // user_pref("browser.cache.memory.capacity", 0); // [HIDDEN PREF]
 /* 1006: disable permissions manager from writing to disk [RESTART]

From be0ccf646069869ead81564842e1687ac55593bb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 17 Sep 2019 12:43:50 +1200
Subject: [PATCH 0438/1147] 2300: service workers, closes #786

---
 scratchpad-scripts/ghacks-clear-[removed].js |  4 ++-
 user.js                                      | 30 +++++++++++---------
 2 files changed, 19 insertions(+), 15 deletions(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index f54d94c..3a91abb 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 12-September-2019
+ Last updated: 16-September-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -211,6 +211,8 @@
     'extensions.getAddons.discovery.api_url',
     'extensions.htmlaboutaddons.discover.enabled',
     'extensions.webservice.discoverURL',
+    'dom.push.connection.enabled',
+    'dom.push.serverURL',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]
diff --git a/user.js b/user.js
index e856582..8d9c5e1 100644
--- a/user.js
+++ b/user.js
@@ -983,28 +983,30 @@ user_pref("dom.popup_allowed_events", "click dblclick");
 ***/
 user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
 /* 2302: disable service workers [FF32, FF44-compat]
- * Service workers essentially act as proxy servers that sit between web apps, and the browser
- * and network, are event driven, and can control the web page/site it is associated with,
- * intercepting and modifying navigation and resource requests, and caching resources.
+ * Service workers essentially act as proxy servers that sit between web apps, and the
+ * browser and network, are event driven, and can control the web page/site it is associated
+ * with, intercepting and modifying navigation and resource requests, and caching resources.
  * [NOTE] Service worker APIs are hidden (in Firefox) and cannot be used when in PB mode.
  * [NOTE] Service workers only run over HTTPS. Service workers have no DOM access.
- * [SETUP-WEB] Disabling service workers will break some sites. This pref is a master switch, and controls
- * notifications (2304, 2305) and service worker cache (2740) - all three are inactive. Notifications are
- * behind a prompt (2306). If you enable service workers, then you may want to look at those as well ***/
+ * [SETUP-WEB] Disabling service workers will break some sites. This pref is required true for
+ * service worker notifications (2304), push notifications (disabled, 2305) and service worker
+ * cache (2740). If you enable this pref, then check those settings as well ***/
 user_pref("dom.serviceWorkers.enabled", false);
 /* 2304: disable Web Notifications
- * [NOTE] Web Notifications require service workers (2302) and are behind a prompt (2306)
+ * [NOTE] Web Notifications can also use service workers (2302) and are behind a prompt (2306)
  * [1] https://developer.mozilla.org/docs/Web/API/Notifications_API ***/
    // user_pref("dom.webnotifications.enabled", false); // [FF22+]
    // user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
 /* 2305: disable Push Notifications [FF44+]
- * web apps can receive messages pushed to them from a server, whether or
- * not the web app is in the foreground, or even currently loaded
- * [NOTE] Push Notifications require service workers (2302) and are behind a prompt (2306)
- * [1] https://developer.mozilla.org/docs/Web/API/Push_API ***/
-   // user_pref("dom.push.enabled", false);
-   // user_pref("dom.push.connection.enabled", false);
-   // user_pref("dom.push.serverURL", "");
+ * Push is an API that allows websites to send you (subscribed) messages even when the site
+ * isn’t loaded, by pushing messages to your userAgentID through Mozilla's Push Server.
+ * [NOTE] Push requires service workers (2302) to subscribe to and display, and is behind
+ * a prompt (2306). Disabling service workers alone doesn't stop Firefox polling the
+ * Mozilla Push Server. To remove all subscriptions, reset your userAgentID (in about:config
+ * or on start), and you will get a new one within a few seconds.
+ * [1] https://support.mozilla.org/en-US/kb/push-notifications-firefox
+ * [2] https://developer.mozilla.org/en-US/docs/Web/API/Push_API ***/
+user_pref("dom.push.enabled", false);
    // user_pref("dom.push.userAgentID", "");
 /* 2306: set a default permission for Notifications (both 2304 and 2305) [FF58+]
  * 0=always ask (default), 1=allow, 2=block

From e1b0eae740ad26234d094b6e1b28f6c19e821c7e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 22 Sep 2019 04:20:10 +1200
Subject: [PATCH 0439/1147] goodbye http and other stuff (#801)

* goodbye http and other stuff

* dead link

* put back asmjs [1] ref

* 0805 test

* typo

* 1222 refs

* 1222 FF version

FYI: https://bugzilla.mozilla.org/show_bug.cgi?id=629558

* 2684: security delay ref

* ESR stuff

* ping ref

* 2684 ref

* 0606: give the standard it's correct name

https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing

* 0805 test instructions

* tweakin'
---
 user.js | 63 ++++++++++++++++++++++++++-------------------------------
 1 file changed, 29 insertions(+), 34 deletions(-)

diff --git a/user.js b/user.js
index 8d9c5e1..f10d207 100644
--- a/user.js
+++ b/user.js
@@ -25,8 +25,8 @@
      * Some user data is erased on close (section 2800). Change this to suit your needs
      * EACH RELEASE check:
          - 4600s: reset prefs made redundant due to privacy.resistFingerprinting (RPF)
-                  or enable them as an alternative to RFP or for ESR users
-         - 9999s: reset deprecated prefs in about:config or enable relevant section(s) for ESR
+                  or enable them as an alternative to RFP (or some of them for ESR users)
+         - 9999s: reset deprecated prefs in about:config or enable the relevant section for ESR
      * Site breakage WILL happen
          - There are often trade-offs and conflicts between Security vs Privacy vs Anti-Fingerprinting
            and these need to be balanced against Functionality & Convenience & Breakage
@@ -360,9 +360,8 @@ user_pref("network.predictor.enable-prefetch", false); // [FF48+]
  * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests
  * [2] https://www.ghacks.net/2015/08/16/block-firefox-from-connecting-to-sites-when-you-hover-over-links/ ***/
 user_pref("network.http.speculative-parallel-limit", 0);
-/* 0606: disable pings (but enforce same host in case)
- * [1] http://kb.mozillazine.org/Browser.send_pings
- * [2] http://kb.mozillazine.org/Browser.send_pings.require_same_host ***/
+/* 0606: disable "Hyperlink Auditing" (click tracking) and enforce same host in case
+ * [1] https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ***/
 user_pref("browser.send_pings", false); // [DEFAULT: false]
 user_pref("browser.send_pings.require_same_host", true);
 
@@ -374,8 +373,8 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
  * Firefox telemetry (April 2019) shows only 5% of all connections are IPv6.
  * [NOTE] This is just an application level fallback. Disabling IPv6 is best done at an
  * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
- * then this won't make much difference. If you are maksing your IP, then it can only help.
- * [TEST] http://ipv6leak.com/
+ * then this won't make much difference. If you are masking your IP, then it can only help.
+ * [TEST] https://ipleak.org/
  * [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/437#issuecomment-403740626
  * [2] https://www.internetsociety.org/tag/ipv6-security/ (see Myths 2,4,5,6) ***/
 user_pref("network.dns.disableIPv6", true);
@@ -404,8 +403,7 @@ user_pref("network.http.altsvc.oe", false);
 /* 0704: enforce the proxy server to do any DNS lookups when using SOCKS
  * e.g. in Tor, this stops your local DNS server from knowing your Tor destination
  * as a remote Tor node will handle the DNS request
- * [1] http://kb.mozillazine.org/Network.proxy.socks_remote_dns
- * [2] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
+ * [1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
 user_pref("network.proxy.socks_remote_dns", true);
 /* 0707: disable (or setup) DNS-over-HTTPS (DoH) [FF60+]
  * TRR = Trusted Recursive Resolver
@@ -466,10 +464,10 @@ user_pref("browser.urlbar.trimURLs", false);
  * default=50, minimum=1=currentpage, 2 is the recommended minimum as some pages
  * use it as a means of referral (e.g. hotlinking), 4 or 6 or 10 may be more practical ***/
 user_pref("browser.sessionhistory.max_entries", 10);
-/* 0805: disable CSS querying page history - CSS history leak
+/* 0805: disable coloring of visited links - CSS history leak
  * [NOTE] This has NEVER been fully "resolved": in Mozilla/docs it is stated it's
  * only in 'certain circumstances', also see latest comments in [2]
- * [TEST] http://lcamtuf.coredump.cx/yahh/ (see github wiki APPENDIX A on how to use)
+ * [TEST] https://earthlng.github.io/testpages/visited_links.html (see github wiki APPENDIX A on how to use)
  * [1] https://dbaron.org/mozilla/visited-privacy
  * [2] https://bugzilla.mozilla.org/147777
  * [3] https://developer.mozilla.org/docs/Web/CSS/Privacy_and_the_:visited_selector ***/
@@ -501,7 +499,7 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
  * (i.e. at least one of 0850a suggestion types must be true) but you want to *limit* suggestions shown ***/
    // user_pref("browser.urlbar.maxRichResults", 0);
 /* 0850d: disable location bar autofill
- * [1] http://kb.mozillazine.org/Inline_autocomplete ***/
+ * [1] https://support.mozilla.org/en-US/kb/address-bar-autocomplete-firefox#w_url-autocomplete ***/
    // user_pref("browser.urlbar.autoFill", false);
 /* 0850e: disable location bar one-off searches [FF51+]
  * [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/ ***/
@@ -541,9 +539,8 @@ user_pref("security.ask_for_password", 2);
  * in minutes, default is 30 ***/
 user_pref("security.password_lifetime", 5);
 /* 0905: disable auto-filling username & password form fields
- * can leak in cross-site forms AND be spoofed
- * [NOTE] Password will still be auto-filled after a user name is manually entered
- * [1] http://kb.mozillazine.org/Signon.autofillForms ***/
+ * can leak in cross-site forms *and* be spoofed
+ * [NOTE] Username & password is still available when you enter the field ***/
 user_pref("signon.autofillForms", false);
 /* 0909: disable formless login capture for Password Manager [FF51+] ***/
 user_pref("signon.formlessCapture.enabled", false);
@@ -703,12 +700,10 @@ user_pref("security.pki.sha1_enforcement_level", 1);
  * 2=detect Family Safety mode and import the root
  * [1] https://trac.torproject.org/projects/tor/ticket/21686 ***/
 user_pref("security.family_safety.mode", 0);
-/* 1222: disable intermediate certificate caching (fingerprinting attack vector) [RESTART]
+/* 1222: disable intermediate certificate caching (fingerprinting attack vector) [FF41+] [RESTART]
  * [NOTE] This affects login/cert/key dbs. The effect is all credentials are session-only.
  * Saved logins and passwords are not available. Reset the pref and restart to return them.
- * [TEST] https://fiprinca.0x90.eu/poc/
- * [1] https://bugzilla.mozilla.org/1334485 - related bug
- * [2] https://bugzilla.mozilla.org/1216882 - related bug (see comment 9) ***/
+ * [1] https://shiftordie.de/blog/2017/02/21/fingerprinting-firefox-users-with-cached-intermediate-ca-certificates-fiprinca/ ***/
    // user_pref("security.nocertdb", true); // [HIDDEN PREF]
 /* 1223: enforce strict pinning
  * PKP (Public Key Pinning) 0=disabled 1=allow user MiTM (such as your antivirus), 2=strict
@@ -730,7 +725,7 @@ user_pref("security.mixed_content.block_object_subrequest", true);
 /** CIPHERS [see the section 1200 intro] ***/
 /* 1261: disable 3DES (effective key size < 128)
  * [1] https://en.wikipedia.org/wiki/3des#Security
- * [2] http://en.citizendium.org/wiki/Meet-in-the-middle_attack
+ * [2] https://en.wikipedia.org/wiki/Meet-in-the-middle_attack
  * [3] https://www-archive.mozilla.org/projects/security/pki/nss/ssl/fips-ssl-ciphersuites.html ***/
    // user_pref("security.ssl3.rsa_des_ede3_sha", false);
 /* 1262: disable 128 bits ***/
@@ -932,8 +927,7 @@ user_pref("media.block-autoplay-until-in-foreground", true); // [DEFAULT: true]
 
 /*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/
 user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
-/* 2201: prevent websites from disabling new window features
- * [1] http://kb.mozillazine.org/Prevent_websites_from_disabling_new_window_features ***/
+/* 2201: prevent websites from disabling new window features ***/
 user_pref("dom.disable_window_open_feature.close", true);
 user_pref("dom.disable_window_open_feature.location", true); // [DEFAULT: true]
 user_pref("dom.disable_window_open_feature.menubar", true);
@@ -961,8 +955,7 @@ user_pref("browser.link.open_newwindow.restriction", 0);
  * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
 user_pref("dom.disable_open_during_load", true);
 /* 2212: limit events that can cause a popup [SETUP-WEB]
- * default is "change click dblclick auxclick mouseup pointerup notificationclick reset submit touchend contextmenu"
- * [1] http://kb.mozillazine.org/Dom.popup_allowed_events ***/
+ * default is "change click dblclick auxclick mouseup pointerup notificationclick reset submit touchend contextmenu" ***/
 user_pref("dom.popup_allowed_events", "click dblclick");
 
 /*** [SECTION 2300]: WEB WORKERS
@@ -1140,8 +1133,7 @@ user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
  * [1] https://bugzilla.mozilla.org/1216893 ***/
    // user_pref("svg.disabled", true);
 /* 2611: disable middle mouse click opening links from clipboard
- * [1] https://trac.torproject.org/projects/tor/ticket/10089
- * [2] http://kb.mozillazine.org/Middlemouse.contentLoadURL ***/
+ * [1] https://trac.torproject.org/projects/tor/ticket/10089 ***/
 user_pref("middlemouse.contentLoadURL", false);
 /* 2614: limit HTTP redirects (this does not control redirects with HTML meta tags or JS)
  * [NOTE] A low setting of 5 or under will probably break some sites (e.g. gmail logins)
@@ -1217,8 +1209,7 @@ user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
  * [1] https://developer.mozilla.org/docs/Web/HTTP/CSP ***/
 user_pref("security.csp.enable", true); // [DEFAULT: true]
 /* 2684: enforce a security delay on some confirmation dialogs such as install, open/save
- * [1] http://kb.mozillazine.org/Disable_extension_install_delay_-_Firefox
- * [2] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
+ * [1] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
 user_pref("security.dialog_enable_delay", 700);
 
 /*** [SECTION 2700]: PERSISTENT STORAGE
@@ -1246,8 +1237,7 @@ user_pref("network.cookie.cookieBehavior", 1);
    and (FF58+) set third-party non-secure (i.e HTTP) cookies to session-only
    [NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and
    .nonsecureSessionOnly=true. This allows you to keep HTTPS cookies, but session-only HTTP ones
- * [1] https://feeding.cloud.geek.nz/posts/tweaking-cookies-for-privacy-in-firefox/
- * [2] http://kb.mozillazine.org/Network.cookie.thirdparty.sessionOnly ***/
+ * [1] https://feeding.cloud.geek.nz/posts/tweaking-cookies-for-privacy-in-firefox/ ***/
 user_pref("network.cookie.thirdparty.sessionOnly", true);
 user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
 /* 2703: delete cookies and site data on close
@@ -1474,10 +1464,15 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
 user_pref("browser.startup.blankWindow", false);
 
 /*** [SECTION 4600]: RFP ALTERNATIVES
-   * IF you DO use RFP (see 4500) then you DO NOT need these redundant prefs. In fact,
-     some even cause RFP to not behave as you would expect and alter your fingerprint.
-     Make sure they are RESET in about:config as per your Firefox version
-   * IF you DO NOT use RFP or are on ESR... then turn on each ESR section below
+   * non-RFP users:
+       Enable the whole section (see the SETUP tag below)
+   * RFP users:
+       Make sure these are reset in about:config. They are redundant. In fact, some
+       even cause RFP to not behave as you would expect and alter your fingerprint
+   * ESR RFP users:
+       Reset those *up to and including* your version. Add those *after* your version
+       as active prefs in your overrides. This is assuming that the patch wasn't also
+       backported to Firefox ESR. Backporting RFP patches to ESR is rare.
 ***/
 user_pref("_user.js.parrot", "4600 syntax error: the parrot's crossed the Jordan");
 /* [SETUP-non-RFP] Non-RFP users replace the * with a slash on this line to enable these

From dc4d9e4daef4f1e41db39adc3acfc9cee3ea0fca Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 6 Oct 2019 04:04:41 +1300
Subject: [PATCH 0440/1147] revamp 0200s (#807), closes #0806

- split geo related vs language/locale related
- rip out intl.locale.requested
- rip out intl.regional_prefs.use_os_locales
- add intl.charset.fallback.override
---
 user.js | 53 ++++++++++++++++++++++++++++-------------------------
 1 file changed, 28 insertions(+), 25 deletions(-)

diff --git a/user.js b/user.js
index f10d207..996985b 100644
--- a/user.js
+++ b/user.js
@@ -45,7 +45,7 @@
 * INDEX:
 
   0100: STARTUP
-  0200: GEOLOCATION
+  0200: GEOLOCATION / LANGUAGE / LOCALE
   0300: QUIET FOX
   0400: BLOCKLISTS / SAFE BROWSING
   0500: SYSTEM ADD-ONS / EXPERIMENTS
@@ -133,49 +133,52 @@ user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false)
  * [2] https://spreadprivacy.com/is-private-browsing-really-private/ ***/
    // user_pref("browser.privatebrowsing.autostart", true);
 
-/*** [SECTION 0200]: GEOLOCATION ***/
+/*** [SECTION 0200]: GEOLOCATION / LANGUAGE / LOCALE ***/
 user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");
+/** GEOLOCATION ***/
 /* 0201: disable Location-Aware Browsing
+ * [NOTE] Best left at default "true", fingerprintable, is already behind a prompt (see 0202)
  * [1] https://www.mozilla.org/firefox/geolocation/ ***/
    // user_pref("geo.enabled", false);
-/* 0201b: set a default permission for Location [FF58+]
+/* 0202: set a default permission for Location (see 0201) [FF58+]
  * 0=always ask (default), 1=allow, 2=block
  * [NOTE] Best left at default "always ask", fingerprintable via Permissions API
  * [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
    // user_pref("permissions.default.geo", 2);
-/* 0202: disable GeoIP-based search results
+/* 0203: use Mozilla geolocation service instead of Google when geolocation is enabled
+ * Optionally enable logging to the console (defaults to false) ***/
+user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
+   // user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
+/* 0204: disable using the OS's geolocation service ***/
+user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
+user_pref("geo.provider.use_corelocation", false); // [MAC]
+user_pref("geo.provider.use_gpsd", false); // [LINUX]
+/* 0205: disable GeoIP-based search results
  * [NOTE] May not be hidden if Firefox has changed your settings due to your locale
  * [1] https://trac.torproject.org/projects/tor/ticket/16254
  * [2] https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections#w_geolocation-for-default-search-engine ***/
 user_pref("browser.search.region", "US"); // [HIDDEN PREF]
 user_pref("browser.search.geoip.url", "");
-/* 0205: set Firefox language [FF59+] [RESTART]
- * Go to the end of about:support to view Internationalization & Localization settings
- * If set to empty, the OS locales are used. If not set at all, default locale is used
- * This is the language used in menus, about pages, messages, and notifications from Firefox ***/
-   // user_pref("intl.locale.requested", "en-US"); // [HIDDEN PREF]
 /* 0206: disable geographically specific results/search engines e.g. "browser.search.*.US"
  * i.e. ignore all of Mozilla's various search engines in multiple locales ***/
 user_pref("browser.search.geoSpecificDefaults", false);
 user_pref("browser.search.geoSpecificDefaults.url", "");
-/* 0207: set preferred language for diplaying web pages
+
+/** LANGUAGE / LOCALE ***/
+/* 0210: set preferred language for displaying web pages
  * [TEST] https://addons.mozilla.org/about ***/
 user_pref("intl.accept_languages", "en-US, en");
-/* 0208: enforce US English locale regardless of the system locale
+/* 0211: enforce US English locale regardless of the system locale
  * [1] https://bugzilla.mozilla.org/867501 ***/
 user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
-/* 0209: use APP locale over OS locale in regional preferences [FF56+]
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1379420,1364789 ***/
-user_pref("intl.regional_prefs.use_os_locales", false);
-/* 0210: use Mozilla geolocation service instead of Google when geolocation is enabled
- * Optionally enable logging to the console (defaults to false) ***/
-user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
-   // user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
-/* 0211: disable using the OS's geolocation service ***/
-user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
-user_pref("geo.provider.use_corelocation", false); // [MAC]
-user_pref("geo.provider.use_gpsd", false); // [LINUX]
+/* 0212: enforce fallback text encoding to match en-US
+ * When the content or server doesn't declare a charset the browser will
+ * fallback to the "Current locale" based on your application language
+ * [SETTING] General>Language and Appearance>Fonts and Colors>Advanced>Text Encoding for Legacy Content
+ * [TEST] https://hsivonen.com/test/moz/check-charset.htm
+ * [1] https://trac.torproject.org/projects/tor/ticket/20025 ***/
+user_pref("intl.charset.fallback.override", "windows-1252");
 
 /*** [SECTION 0300]: QUIET FOX
      Starting in user.js v67, we only disable the auto-INSTALL of Firefox. You still get prompts
@@ -1399,7 +1402,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
  ** 1337161 - hide gamepads from content (see 4606) (FF56+)
  ** 1372072 - spoof network information API as "unknown" when dom.netinfo.enabled = true (see 4607) (FF56+)
  ** 1333641 - reduce fingerprinting in WebSpeech API (see 4608) (FF56+)
- ** 1372069 & 1403813 & 1441295 - block geolocation requests (same as denying a site permission) (see 0201, 0201b) (FF56-62)
+ ** 1372069 & 1403813 & 1441295 - block geolocation requests (same as denying a site permission) (see 0201, 0202) (FF56-62)
  ** 1369309 - spoof media statistics (see 4610) (FF57+)
  ** 1382499 - reduce screen co-ordinate fingerprinting in Touch API (see 4611) (FF57+)
  ** 1217290 & 1409677 - enable fingerprinting resistance for WebGL (see 2010-12) (FF57+)
@@ -1413,7 +1416,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
       Spoof: enumerate devices reports one "Internal Camera" and one "Internal Microphone" if
              media.navigator.enabled is true (see 2505 which we chose to keep disabled)
       Block: suppresses the ondevicechange event (see 4612)
- ** 1039069 - warn when language prefs are set to non en-US (see 0207, 0208) (FF59+)
+ ** 1039069 - warn when language prefs are set to non en-US (see 0210, 0211) (FF59+)
  ** 1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events (FF59+)
       Spoofing mimics the content language of the document. Currently it only supports en-US.
       Modifier events suppressed are SHIFT and both ALT keys. Chrome is not affected.
@@ -1659,7 +1662,7 @@ user_pref("network.jar.open-unsafe-types", false);
 user_pref("plugin.state.java", 0);
 // * * * /
 // FF63
-// 0202: disable GeoIP-based search results
+// 0205: disable GeoIP-based search results
    // [NOTE] May not be hidden if Firefox has changed your settings due to your locale
    // [-] https://bugzilla.mozilla.org/1462015
 user_pref("browser.search.countryCode", "US"); // [HIDDEN PREF]

From 53f8578749cdbc35ac58155d3d417188171ae413 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 5 Oct 2019 15:09:19 +0000
Subject: [PATCH 0441/1147] see #807

---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 3a91abb..1501e47 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 16-September-2019
+ Last updated: 5-October-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -211,6 +211,8 @@
     'extensions.getAddons.discovery.api_url',
     'extensions.htmlaboutaddons.discover.enabled',
     'extensions.webservice.discoverURL',
+    'intl.locale.requested',
+    'intl.regional_prefs.use_os_locales',
     'dom.push.connection.enabled',
     'dom.push.serverURL',
     /* reset parrot: check your open about:config after running the script */

From 201210111e438da3a72d64fb2849212563b299a2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 5 Oct 2019 15:12:21 +0000
Subject: [PATCH 0442/1147] char fix

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 996985b..deb1fd8 100644
--- a/user.js
+++ b/user.js
@@ -995,7 +995,7 @@ user_pref("dom.serviceWorkers.enabled", false);
    // user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
 /* 2305: disable Push Notifications [FF44+]
  * Push is an API that allows websites to send you (subscribed) messages even when the site
- * isn’t loaded, by pushing messages to your userAgentID through Mozilla's Push Server.
+ * isn't loaded, by pushing messages to your userAgentID through Mozilla's Push Server.
  * [NOTE] Push requires service workers (2302) to subscribe to and display, and is behind
  * a prompt (2306). Disabling service workers alone doesn't stop Firefox polling the
  * Mozilla Push Server. To remove all subscriptions, reset your userAgentID (in about:config

From a9e93921724e15fbe60011d26a53a74c131ba0b3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 5 Oct 2019 17:47:25 +0000
Subject: [PATCH 0443/1147] add some SB back, see #803

---
 user.js | 50 +++++++++++++++++++++++++++++++++++---------------
 1 file changed, 35 insertions(+), 15 deletions(-)

diff --git a/user.js b/user.js
index deb1fd8..d46aa26 100644
--- a/user.js
+++ b/user.js
@@ -20,7 +20,7 @@
   2. READ this
      * https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.3-Implementation
   3. If you skipped steps 1 and 2 above (shame on you), then here is the absolute minimum
-     * Real time binary checks with Google services are disabled (0402)
+     * Real time binary checks with Google services are disabled (0412)
      * You will still get prompts to update Firefox, but auto-installing them is disabled (0302a)
      * Some user data is erased on close (section 2800). Change this to suit your needs
      * EACH RELEASE check:
@@ -270,28 +270,48 @@ user_pref("network.captive-portal-service.enabled", false); // [FF52+]
  * [1] https://bugzilla.mozilla.org/1460537 ***/
 user_pref("network.connectivity-service.enabled", false);
 
-/*** [SECTION 0400]: BLOCKLISTS / SAFE BROWSING (SB)
-     Safe Browsing has taken many steps to preserve privacy. *IF* required, a full url is never
-     sent to Google, only a PART-hash of the prefix, and this is hidden with noise of other real
-     PART-hashes. Google also swear it is anonymized and only used to flag malicious sites.
-     Firefox also takes measures such as striping out identifying parameters and since SBv4 (FF57+)
-     doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
-
-     #Required reading [#] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
-     [1] https://wiki.mozilla.org/Security/Safe_Browsing
-***/
+/*** [SECTION 0400]: BLOCKLISTS / SAFE BROWSING (SB) ***/
 user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
+/** BLOCKLISTS ***/
 /* 0401: enforce Firefox blocklist, but sanitize blocklist url
  * [NOTE] It includes updates for "revoked certificates"
  * [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/
  * [2] https://trac.torproject.org/projects/tor/ticket/16931 ***/
 user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
 user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
-/* 0402: disable binaries NOT in Safe Browsing local lists being checked
- * This is a real-time check with Google services
- * [SETUP-SECURITY] If you do not understand this, or if you want this protection, then override it ***/
+
+/** SAFE BROWSING (SB)
+    Safe Browsing has taken many steps to preserve privacy. *IF* required, a full url is never
+    sent to Google, only a PART-hash of the prefix, and this is hidden with noise of other real
+    PART-hashes. Google also swear it is anonymized and only used to flag malicious sites.
+    Firefox also takes measures such as striping out identifying parameters and since SBv4 (FF57+)
+    doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
+
+    #Required reading [#] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
+    [1] https://wiki.mozilla.org/Security/Safe_Browsing
+    [2] https://support.mozilla.org/en-US/kb/how-does-phishing-and-malware-protection-work
+***/
+/* 0410: disable SB (Safe Browsing)
+ * [WARNING] Do this at your own risk! These are the master switches.
+ * [SETTING] Privacy & Security>Security>... "Block dangerous and deceptive content" ***/
+   // user_pref("browser.safebrowsing.malware.enabled", false);
+   // user_pref("browser.safebrowsing.phishing.enabled", false);
+/* 0411: disable SB checks for downloads (both local lookups + remote)
+ * This is the master switch for the safebrowsing.downloads* prefs (0412, 0413)
+ * [SETTING] Privacy & Security>Security>... "Block dangerous downloads" ***/
+   // user_pref("browser.safebrowsing.downloads.enabled", false);
+/* 0412: disable SB checks for downloads (remote)
+ * To verify the safety of certain executable files, Firefox may submit some information about the
+ * file, including the name, origin, size and a cryptographic hash of the contents, to the Google
+ * Safe Browsing service which helps Firefox determine whether or not the file should be blocked
+ * [SETUP-SECURITY] If you do not understand this, or you want this protection, then override it ***/
 user_pref("browser.safebrowsing.downloads.remote.enabled", false);
-/* 0403: disable 'ignore this warning' on Safe Browsing warnings
+user_pref("browser.safebrowsing.downloads.remote.url", "");
+/* 0413: disable SB checks for unwanted software
+ * [SETTING] Privacy & Security>Security>... "Warn you about unwanted and uncommon software" ***/
+   // user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
+   // user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
+/* 0419: disable 'ignore this warning' on SB warnings
  * If clicked, it bypasses the block for that session. This is a means for admins to enforce SB
  * [TEST] see github wiki APPENDIX A: Test Sites: Section 5
  * [1] https://bugzilla.mozilla.org/1226490 ***/

From 624e50faac73f9689912fa6e3bc8d344b4e03967 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 5 Oct 2019 17:51:34 +0000
Subject: [PATCH 0444/1147] replace ` with '

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index d46aa26..f91f762 100644
--- a/user.js
+++ b/user.js
@@ -219,7 +219,7 @@ user_pref("extensions.htmlaboutaddons.recommendations.enabled", false);
  * IF unified=false then .enabled controls the telemetry module
  * IF unified=true then .enabled ONLY controls whether to record extended data
  * so make sure to have both set as false
- * [NOTE] FF58+ `toolkit.telemetry.enabled` is now LOCKED to reflect prerelease
+ * [NOTE] FF58+ 'toolkit.telemetry.enabled' is now LOCKED to reflect prerelease
  * or release builds (true and false respectively), see [2]
  * [1] https://firefox-source-docs.mozilla.org/toolkit/components/telemetry/telemetry/internals/preferences.html
  * [2] https://medium.com/georg-fritzsche/data-preference-changes-in-firefox-58-2d5df9c428b5 ***/
@@ -1788,7 +1788,7 @@ user_pref("security.csp.experimentalEnabled", true);
 // 1802: enforce click-to-play for plugins
    // [-] https://bugzilla.mozilla.org/1519434
 user_pref("plugins.click_to_play", true); // [DEFAULT: true in FF25+]
-// 2033: disable autoplay for muted videos [FF63+] - replaced by `media.autoplay.default` options (2030)
+// 2033: disable autoplay for muted videos [FF63+] - replaced by 'media.autoplay.default' options (2030)
    // [-] https://bugzilla.mozilla.org/1562331
    // user_pref("media.autoplay.allow-muted", false);
 // * * * /

From ad0187122d33e30ee5e9191d8cd22b727b40a27e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 7 Oct 2019 16:20:03 +0000
Subject: [PATCH 0445/1147] some SB were reinstated, closes #806

---
 scratchpad-scripts/ghacks-clear-[removed].js | 7 +------
 1 file changed, 1 insertion(+), 6 deletions(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 1501e47..5ff79ed 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 5-October-2019
+ Last updated: 7-October-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -168,14 +168,9 @@
     'signon.storeWhenAutocompleteOff',
     'xpinstall.whitelist.required',
     /* 67-beta: Blocklist, SB & TP cleanup: these were all inactive */
-    'browser.safebrowsing.downloads.enabled',
     'browser.safebrowsing.downloads.remote.block_dangerous',
     'browser.safebrowsing.downloads.remote.block_dangerous_host',
-    'browser.safebrowsing.downloads.remote.block_potentially_unwanted',
-    'browser.safebrowsing.downloads.remote.block_uncommon',
     'browser.safebrowsing.blockedURIs.enabled',
-    'browser.safebrowsing.malware.enabled',
-    'browser.safebrowsing.phishing.enabled',
     'browser.safebrowsing.provider.google.gethashURL',
     'browser.safebrowsing.provider.google.updateURL',
     'browser.safebrowsing.provider.google4.gethashURL',

From 1b6239eab8fd584f4ef0a76c0c57180db75860b7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 14 Oct 2019 01:13:27 +0000
Subject: [PATCH 0446/1147] remove 0804, closes #808

if anyone can show me how this stops history leaks, then I'll put it back with a note saying it's been broken since FF61
---
 user.js | 5 -----
 1 file changed, 5 deletions(-)

diff --git a/user.js b/user.js
index f91f762..56171e1 100644
--- a/user.js
+++ b/user.js
@@ -482,11 +482,6 @@ user_pref("keyword.enabled", false);
 user_pref("browser.fixup.alternate.enabled", false);
 /* 0803: display all parts of the url in the location bar ***/
 user_pref("browser.urlbar.trimURLs", false);
-/* 0804: limit history leaks via enumeration (PER TAB: back/forward)
- * This is a PER TAB session history. You still have a full history stored under all history
- * default=50, minimum=1=currentpage, 2 is the recommended minimum as some pages
- * use it as a means of referral (e.g. hotlinking), 4 or 6 or 10 may be more practical ***/
-user_pref("browser.sessionhistory.max_entries", 10);
 /* 0805: disable coloring of visited links - CSS history leak
  * [NOTE] This has NEVER been fully "resolved": in Mozilla/docs it is stated it's
  * only in 'certain circumstances', also see latest comments in [2]

From d7b1877a1f38bec7ecc02957e860403a885d397f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 14 Oct 2019 01:14:50 +0000
Subject: [PATCH 0447/1147] browser.sessionhistory.max_entries see #808

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 5ff79ed..8223d45 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 7-October-2019
+ Last updated: 13-October-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -203,6 +203,7 @@
     'plugin.sessionPermissionNow.intervalInMinutes',
     /* 70-beta */
     'browser.cache.disk_cache_ssl',
+    'browser.sessionhistory.max_entries',
     'extensions.getAddons.discovery.api_url',
     'extensions.htmlaboutaddons.discover.enabled',
     'extensions.webservice.discoverURL',

From 5b82afd5bd103e12fa29e460f5dd2812d7dca858 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Oct 2019 09:27:44 +0000
Subject: [PATCH 0448/1147] webgl.dxgl.enabled, closes #814

---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 56171e1..c95d0b2 100644
--- a/user.js
+++ b/user.js
@@ -916,7 +916,6 @@ user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
  * [1] https://www.contextis.com/resources/blog/webgl-new-dimension-browser-exploitation/
  * [2] https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern ***/
 user_pref("webgl.disabled", true);
-user_pref("webgl.dxgl.enabled", false); // [WINDOWS]
 user_pref("webgl.enable-webgl2", false);
 /* 2012: limit WebGL ***/
 user_pref("webgl.min_capability_mode", true);

From 7f2c92f654220db546d2290f38d61ab010e36bd7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Oct 2019 09:28:52 +0000
Subject: [PATCH 0449/1147] webgl.dxgl.enabled

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 8223d45..8f6e38b 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 13-October-2019
+ Last updated: 15-October-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -211,6 +211,7 @@
     'intl.regional_prefs.use_os_locales',
     'dom.push.connection.enabled',
     'dom.push.serverURL',
+    'webgl.dxgl.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 226af6f679114f8da3df0f98a3a575cca80ea749 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 20 Oct 2019 22:20:50 +0000
Subject: [PATCH 0450/1147] 69 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index c95d0b2..941b6df 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 4 September 2019
-* version 69-beta: Pants One More Time
+* date: 20 September 2019
+* version 69: Pants One More Time
 *   "When I'm not with pants I lose my mind. Give me a sign. Hit me, pants, one more time."
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 5d1857ddd8b1d07c0ffd12aa09f842825915de4e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 20 Oct 2019 22:32:37 +0000
Subject: [PATCH 0451/1147] start 70 commits

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 941b6df..69439b6 100644
--- a/user.js
+++ b/user.js
@@ -1,8 +1,8 @@
 /******
 * name: ghacks user.js
 * date: 20 September 2019
-* version 69: Pants One More Time
-*   "When I'm not with pants I lose my mind. Give me a sign. Hit me, pants, one more time."
+* version 70-alpha: Pinpants Wizard
+*   "Ever since I was a young pants, I've played the silver ball"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 1cc9a08a18e5e8439d3d687205a16c7cb856653a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 20 Oct 2019 22:40:53 +0000
Subject: [PATCH 0452/1147] remove ESR60.x deprecated

These are archived in #123
---
 user.js | 122 --------------------------------------------------------
 1 file changed, 122 deletions(-)

diff --git a/user.js b/user.js
index 69439b6..e670ea1 100644
--- a/user.js
+++ b/user.js
@@ -1651,128 +1651,6 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
      [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/123
 ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
-/* ESR60.x still uses all the following prefs
-// [NOTE] replace the * with a slash in the line above to re-enable them
-// FF61
-// 0501: disable experiments
-   // [1] https://wiki.mozilla.org/Telemetry/Experiments
-   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1420908,1450801
-user_pref("experiments.enabled", false);
-user_pref("experiments.manifest.uri", "");
-user_pref("experiments.supported", false);
-user_pref("experiments.activeExperiment", false);
-// 2612: disable remote JAR files being opened, regardless of content type [FF42+]
-   // [1] https://bugzilla.mozilla.org/1173171
-   // [2] https://www.fxsitecompat.com/en-CA/docs/2015/jar-protocol-support-has-been-disabled-by-default/
-   // [-] https://bugzilla.mozilla.org/1427726
-user_pref("network.jar.block-remote-files", true);
-// 2613: disable JAR from opening Unsafe File Types
-   // [-] https://bugzilla.mozilla.org/1427726
-user_pref("network.jar.open-unsafe-types", false);
-// * * * /
-// FF62
-// 1803: disable Java plugin
-   // [-] (part5) https://bugzilla.mozilla.org/1461243
-user_pref("plugin.state.java", 0);
-// * * * /
-// FF63
-// 0205: disable GeoIP-based search results
-   // [NOTE] May not be hidden if Firefox has changed your settings due to your locale
-   // [-] https://bugzilla.mozilla.org/1462015
-user_pref("browser.search.countryCode", "US"); // [HIDDEN PREF]
-// 0301a: disable auto-update checks for Firefox
-   // [SETTING] General>Firefox Updates>Never check for updates
-   // [-] https://bugzilla.mozilla.org/1420514
-   // user_pref("app.update.enabled", false);
-// 0503: disable "Savant" Shield study [FF61+]
-   // [-] https://bugzilla.mozilla.org/1457226
-user_pref("shield.savant.enabled", false);
-// 1031: disable favicons in tabs and new bookmarks - merged into browser.chrome.site_icons
-   // [-] https://bugzilla.mozilla.org/1453751
-   // user_pref("browser.chrome.favicons", false);
-// 2030: disable autoplay of HTML5 media - replaced by media.autoplay.default
-   // This may break video playback on various sites
-   // [-] https://bugzilla.mozilla.org/1470082
-user_pref("media.autoplay.enabled", false);
-// 2704: set cookie lifetime in days (see 2703)
-   // [-] https://bugzilla.mozilla.org/1457170
-   // user_pref("network.cookie.lifetime.days", 90); // [DEFAULT: 90]
-// 5000's: enable "Ctrl+Tab cycles through tabs in recently used order" - replaced by browser.ctrlTab.recentlyUsedOrder
-   // [-] https://bugzilla.mozilla.org/1473595
-   // user_pref("browser.ctrlTab.previews", true);
-// * * * /
-// FF64
-// 0516: disable Onboarding [FF55+]
-   // Onboarding is an interactive tour/setup for new installs/profiles and features. Every time
-   // about:home or about:newtab is opened, the onboarding overlay is injected into that page
-   // [NOTE] Onboarding uses Google Analytics [2], and leaks resource://URIs [3]
-   // [1] https://wiki.mozilla.org/Firefox/Onboarding
-   // [2] https://github.com/mozilla/onboard/commit/db4d6c8726c89a5d6a241c1b1065827b525c5baf
-   // [3] https://bugzilla.mozilla.org/863246#c154
-   // [-] https://bugzilla.mozilla.org/1462415
-user_pref("browser.onboarding.enabled", false);
-// 2608: disable WebIDE ADB extension downloads - both renamed
-   // [1] https://trac.torproject.org/projects/tor/ticket/16222
-   // [-] https://bugzilla.mozilla.org/1491315
-user_pref("devtools.webide.autoinstallADBHelper", false);
-user_pref("devtools.webide.adbAddonURL", "");
-// 2681: disable CSP violation events [FF59+]
-   // [1] https://developer.mozilla.org/docs/Web/API/SecurityPolicyViolationEvent
-   // [-] https://bugzilla.mozilla.org/1488165
-user_pref("security.csp.enable_violation_events", false);
-// * * * /
-// FF65
-// 0850a: disable location bar autocomplete and suggestion types
-   // If you enforce any of the suggestion types (see the other 0850a), you MUST enforce 'autocomplete'
-   //   - If *ALL* of the suggestion types are false, 'autocomplete' must also be false
-   //   - If *ANY* of the suggestion types are true, 'autocomplete' must also be true
-   // [-] https://bugzilla.mozilla.org/1502392
-user_pref("browser.urlbar.autocomplete.enabled", false);
-// 0908: remove user & password info when attempting to fix an entered URL (i.e. 0802 is true)
-   // e.g. //user:password@foo -> //user@(prefix)foo(suffix) NOT //user:password@(prefix)foo(suffix)
-   // [-] https://bugzilla.mozilla.org/1510580
-user_pref("browser.fixup.hide_user_pass", true); // [DEFAULT: true]
-// * * * /
-// FF66
-// 0380: disable Browser Error Reporter [FF60+]
-   // [1] https://support.mozilla.org/en-US/kb/firefox-nightly-error-collection
-   // [2] https://firefox-source-docs.mozilla.org/browser/browser/BrowserErrorReporter.html
-   // [-] https://bugzilla.mozilla.org/1509888
-user_pref("browser.chrome.errorReporter.enabled", false);
-user_pref("browser.chrome.errorReporter.submitUrl", "");
-// 0502: disable Mozilla permission to silently opt you into tests
-   // [-] https://bugzilla.mozilla.org/1415625
-user_pref("network.allow-experiments", false);
-// * * * /
-// FF67
-// 2428: enforce DOMHighResTimeStamp API
-   // [WARNING] Required for normalization of timestamps and any timer resolution mitigations
-   // [-] https://bugzilla.mozilla.org/1485264
-user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
-// 5000's: disable CFR [FF64+] - split into two new prefs: *cfr.addons, *cfr.features
-   // [SETTING] General>Browsing>Recommend extensions as you browse
-   // [1] https://support.mozilla.org/en-US/kb/extension-recommendations
-   // [-] https://bugzilla.mozilla.org/1528953
-   // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false);
-// * * * /
-// FF68
-// 0105b: disable Activity Stream Legacy Snippets
-   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1546190,1540939
-user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
-user_pref("browser.aboutHomeSnippets.updateUrl", "");
-// 0307: disable auto updating of lightweight themes (LWT)
-   // Not to be confused with themes in 0301* + 0302*, which use the FF55+ Theme API
-   // Mozilla plan to convert existing LWTs and remove LWT support in the future, see [1]
-   // [1] https://blog.mozilla.org/addons/2018/09/20/future-themes-here/
-   // [-] (part3b) https://bugzilla.mozilla.org/1525762
-user_pref("lightweightThemes.update.enabled", false);
-// 2682: enable CSP 1.1 experimental hash-source directive [FF29+]
-   // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=855326,883975
-   // [-] https://bugzilla.mozilla.org/1386214
-user_pref("security.csp.experimentalEnabled", true);
-// * * * /
-// ***/
-
 /* ESR68.x still uses all the following prefs
 // [NOTE] replace the * with a slash in the line above to re-enable them
 // FF69

From 301fcd059dc7f937f60e35a32a2848866a7e61be Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 20 Oct 2019 23:36:48 +0000
Subject: [PATCH 0453/1147] 1003: capacity no longer hidden

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index e670ea1..5c789db 100644
--- a/user.js
+++ b/user.js
@@ -596,7 +596,7 @@ user_pref("browser.cache.disk.enable", false);
 /* 1003: disable memory cache
 /* capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kilobytes ***/
    // user_pref("browser.cache.memory.enable", false);
-   // user_pref("browser.cache.memory.capacity", 0); // [HIDDEN PREF]
+   // user_pref("browser.cache.memory.capacity", 0);
 /* 1006: disable permissions manager from writing to disk [RESTART]
  * [NOTE] This means any permission changes are session only
  * [1] https://bugzilla.mozilla.org/967812 ***/

From d91226ed55b5fbdc1fd10860137ad6579f3d48c6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 20 Oct 2019 23:59:16 +0000
Subject: [PATCH 0454/1147] tweakin'

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 5c789db..b388c6a 100644
--- a/user.js
+++ b/user.js
@@ -1646,7 +1646,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
-     Documentation denoted as [-]. Items deprecated prior to FF61 have been archived at [1], which
+     Documentation denoted as [-]. Items deprecated prior to FF69 have been archived at [1], which
      also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
      [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/123
 ***/

From 539750d2f2d82ced8e1dc1761bdf7d17dbf18c58 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 27 Oct 2019 04:41:27 +0000
Subject: [PATCH 0455/1147] FF70 hidden/default changes

---
 user.js | 16 +++++++---------
 1 file changed, 7 insertions(+), 9 deletions(-)

diff --git a/user.js b/user.js
index b388c6a..f34ce19 100644
--- a/user.js
+++ b/user.js
@@ -375,7 +375,7 @@ user_pref("network.prefetch-next", false);
  * [1] https://www.ghacks.net/2013/04/27/firefox-prefetching-what-you-need-to-know/
  * [2] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
 user_pref("network.dns.disablePrefetch", true);
-user_pref("network.dns.disablePrefetchFromHTTPS", true); // [HIDDEN PREF]
+user_pref("network.dns.disablePrefetchFromHTTPS", true); // [HIDDEN PREF ESR] [DEFAULT: true FF70+]
 /* 0603: disable predictor / prefetching ***/
 user_pref("network.predictor.enabled", false);
 user_pref("network.predictor.enable-prefetch", false); // [FF48+]
@@ -596,7 +596,7 @@ user_pref("browser.cache.disk.enable", false);
 /* 1003: disable memory cache
 /* capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kilobytes ***/
    // user_pref("browser.cache.memory.enable", false);
-   // user_pref("browser.cache.memory.capacity", 0);
+   // user_pref("browser.cache.memory.capacity", 0); // [HIDDEN PREF ESR]
 /* 1006: disable permissions manager from writing to disk [RESTART]
  * [NOTE] This means any permission changes are session only
  * [1] https://bugzilla.mozilla.org/967812 ***/
@@ -771,10 +771,8 @@ user_pref("browser.ssl_override_behavior", 1);
  * [TEST] https://expired.badssl.com/ ***/
 user_pref("browser.xul.error_pages.expert_bad_cert", true);
 /* 1273: display "insecure" icon and "Not Secure" text on HTTP sites ***/
-user_pref("security.insecure_connection_icon.enabled", true); // [FF59+]
+user_pref("security.insecure_connection_icon.enabled", true); // [FF59+] [DEFAULT: true FF70+]
 user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
-   // user_pref("security.insecure_connection_icon.pbmode.enabled", true); // [FF59+] private windows only
-   // user_pref("security.insecure_connection_text.pbmode.enabled", true); // [FF60+] private windows only
 
 /*** [SECTION 1400]: FONTS ***/
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
@@ -870,7 +868,7 @@ user_pref("privacy.userContext.ui.enabled", true);
  * [SETTING] General>Tabs>Enable Container Tabs ***/
 user_pref("privacy.userContext.enabled", true);
 /* 1703: enable a private container for thumbnail loads [FF51+] ***/
-user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // [DEFAULT: true in FF61+]
+user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // [DEFAULT: true FF61+]
 /* 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
  * 0=no menu (default), 1=show when clicked, 2=show on long press
  * [1] https://bugzilla.mozilla.org/1328756 ***/
@@ -1139,7 +1137,7 @@ user_pref("devtools.chrome.enabled", false);
 /* 2608: disable WebIDE to prevent remote debugging and ADB extension download
  * [1] https://trac.torproject.org/projects/tor/ticket/16222 ***/
 user_pref("devtools.debugger.remote-enabled", false);
-user_pref("devtools.webide.enabled", false);
+user_pref("devtools.webide.enabled", false); // [DEFAULT: false FF70+]
 user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
 /* 2609: disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
  * [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#misc
@@ -1381,7 +1379,7 @@ user_pref("privacy.firstparty.isolate", true);
  * [2] https://bugzilla.mozilla.org/1492607
  * [3] https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage ***/
 user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAULT: true]
-   // user_pref("privacy.firstparty.isolate.block_post_message", true); // [HIDDEN PREF]
+   // user_pref("privacy.firstparty.isolate.block_post_message", true); // [HIDDEN PREF ESR]
 
 /*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
    This master switch will be used for a wide range of items, many of which will
@@ -1659,7 +1657,7 @@ user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
    // user_pref("gfx.downloadable_fonts.woff2.enabled", false);
 // 1802: enforce click-to-play for plugins
    // [-] https://bugzilla.mozilla.org/1519434
-user_pref("plugins.click_to_play", true); // [DEFAULT: true in FF25+]
+user_pref("plugins.click_to_play", true); // [DEFAULT: true FF25+]
 // 2033: disable autoplay for muted videos [FF63+] - replaced by 'media.autoplay.default' options (2030)
    // [-] https://bugzilla.mozilla.org/1562331
    // user_pref("media.autoplay.allow-muted", false);

From 67eec9c85c1ac98b30546f07f0f256e0b7545d76 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 27 Oct 2019 04:50:59 +0000
Subject: [PATCH 0456/1147] pbmode insecure text/icon

see `1273`
- we already make **all** windows do this (which overrides the pb mode setting), and these were inactive
- in FF70+ the icon pref (for PB mode and all windows) is now default true
---
 scratchpad-scripts/ghacks-clear-[removed].js | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 8f6e38b..e6f72d8 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 15-October-2019
+ Last updated: 27-October-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -204,13 +204,15 @@
     /* 70-beta */
     'browser.cache.disk_cache_ssl',
     'browser.sessionhistory.max_entries',
+    'dom.push.connection.enabled',
+    'dom.push.serverURL',
     'extensions.getAddons.discovery.api_url',
     'extensions.htmlaboutaddons.discover.enabled',
     'extensions.webservice.discoverURL',
     'intl.locale.requested',
     'intl.regional_prefs.use_os_locales',
-    'dom.push.connection.enabled',
-    'dom.push.serverURL',
+    'security.insecure_connection_icon.pbmode.enabled',
+    'security.insecure_connection_text.pbmode.enabled',
     'webgl.dxgl.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'

From e4f80225d8f2c5c70681e53a9ca607293a5695ed Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 28 Oct 2019 12:12:52 +0000
Subject: [PATCH 0457/1147] FF72: FPI & IPv6

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index f34ce19..15dd30e 100644
--- a/user.js
+++ b/user.js
@@ -1364,6 +1364,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1542309 - isolate top-level domain URLs when host is in the public suffix list (FF68+)
  ** 1506693 - isolate pdfjs range-based requests (FF68+)
  ** 1330467 - isolate site permissions (FF69+)
+ ** 1534339 - isolate IPv6 (FF72+)
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]

From 16756646bbd803e772d9796a20d400d2e2ee18c7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 31 Oct 2019 09:49:12 +0000
Subject: [PATCH 0458/1147] remove DoH, closes #790

---
 user.js | 10 ----------
 1 file changed, 10 deletions(-)

diff --git a/user.js b/user.js
index 15dd30e..5ceba38 100644
--- a/user.js
+++ b/user.js
@@ -428,16 +428,6 @@ user_pref("network.http.altsvc.oe", false);
  * as a remote Tor node will handle the DNS request
  * [1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
 user_pref("network.proxy.socks_remote_dns", true);
-/* 0707: disable (or setup) DNS-over-HTTPS (DoH) [FF60+]
- * TRR = Trusted Recursive Resolver
- * 0=off by default, 1=race (removed in FF69), 2=TRR first, 3=TRR only,
- * 4=race for stats but always use native result (removed in FF69), 5=explicitly off
- * [WARNING] DoH bypasses hosts and gives info to yet another party (e.g. Cloudflare)
- * [1] https://www.ghacks.net/2018/04/02/configure-dns-over-https-in-firefox/
- * [2] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/ ***/
-   // user_pref("network.trr.mode", 0);
-   // user_pref("network.trr.bootstrapAddress", "");
-   // user_pref("network.trr.uri", "");
 /* 0708: disable FTP [FF60+]
  * [1] https://www.ghacks.net/2018/02/20/firefox-60-with-new-preference-to-disable-ftp/ ***/
    // user_pref("network.ftp.enabled", false);

From fdaf22780fd985e19bd20e0301203d880fcfa304 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sat, 2 Nov 2019 16:00:12 +0000
Subject: [PATCH 0459/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index fc5d76a..34c8bc6 100644
--- a/README.md
+++ b/README.md
@@ -18,7 +18,7 @@ Literally thousands of sources, references and suggestions. That said...
 * Martin Brinkmann at [ghacks](https://www.ghacks.net/) <sup>1</sup>
 * The ghacks community and commentators
 * [12bytes](https://12bytes.org/articles/tech/firefox/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs)
-   * The 12bytes article now uses this user.js and supplements it with an additional JS hosted at [GitLab](https://gitlab.com/labwrat/Firefox-user.js/tree/master)
+   * The 12bytes article now uses this user.js and supplements it with an additional JS hosted at [Codeberg](https://codeberg.org/12bytes.org/Firefox-user.js-supplement)
 
 <sup>1</sup> The ghacks user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015 and was [first published](https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/) at ghacks in August 2015. With Martin Brinkmann's blessing, it will keep the ghacks name.
 

From 65dfad5c76148379c1c3f6d4667b28721c613770 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 6 Nov 2019 11:37:24 +0000
Subject: [PATCH 0460/1147] 2701: UI changes

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 5ceba38..6a759eb 100644
--- a/user.js
+++ b/user.js
@@ -1234,7 +1234,7 @@ user_pref("security.dialog_enable_delay", 700);
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 /* 2701: disable 3rd-party cookies and site-data [SETUP-WEB]
  * 0=Accept cookies and site data, 1=(Block) All third-party cookies, 2=(Block) All cookies,
- * 3=(Block) Cookies from unvisited sites, 4=(Block) Third-party trackers (FF63+) (default FF69+)
+ * 3=(Block) Cookies from unvisited websites, 4=(Block) Cross-site and social media trackers (FF63+) (default FF69+)
  * [NOTE] You can set exceptions under site permissions or use an extension
  * [SETTING] Privacy & Security>Content Blocking>Custom>Choose what to block>Cookies ***/
 user_pref("network.cookie.cookieBehavior", 1);

From 895f8d01d59d2640505f8f8f4d015023de88f069 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Fri, 8 Nov 2019 13:01:33 +0000
Subject: [PATCH 0461/1147] FF70+: shield studies no longer tied to FHR (#836)

https://bugzilla.mozilla.org/1569330
---
 user.js | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 6a759eb..5b7b74d 100644
--- a/user.js
+++ b/user.js
@@ -246,8 +246,7 @@ user_pref("datareporting.healthreport.uploadEnabled", false);
  * [1] https://bugzilla.mozilla.org/1195552 ***/
 user_pref("datareporting.policy.dataSubmissionEnabled", false);
 /* 0342: disable Studies (see 0503)
- * [NOTE] This pref has no effect when Health Reports (0340) are disabled
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>...>Allow Firefox to install and run studies ***/
+ * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to install and run studies ***/
 user_pref("app.shield.optoutstudies.enabled", false);
 /* 0343: disable personalized Extension Recommendations in about:addons and AMO [FF65+]
  * [NOTE] This pref has no effect when Health Reports (0340) are disabled

From 0c79b8b45bf4fa59849d49e9e3c4885789130fd0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 8 Nov 2019 13:46:20 +0000
Subject: [PATCH 0462/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 34c8bc6..b374351 100644
--- a/README.md
+++ b/README.md
@@ -8,7 +8,7 @@ Everyone, experts included, should at least read the [implementation](https://gi
 
 Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) if your [threat model](https://www.torproject.org/about/torusers.html.en) calls for it, or for accessing hidden services. 
 
-Also be aware that this `user.js` is made specifically for Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.
+Also be aware that this `user.js` is made specifically for desktop Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.
 
 Sitemap: [Releases](https://github.com/ghacksuserjs/ghacks-user.js/releases), [changelogs](https://github.com/ghacksuserjs/ghacks-user.js/issues?utf8=%E2%9C%93&q=is%3Aissue+label%3Achangelog), [Wiki](https://github.com/ghacksuserjs/ghacks-user.js/wiki), [stickies](https://github.com/ghacksuserjs/ghacks-user.js/issues?q=is%3Aissue+is%3Aopen+label%3A%22sticky+topic%22). [diffs](https://github.com/ghacksuserjs/ghacks-user.js/issues?q=is%3Aissue+label%3Adiffs)
 

From 6173104a9ef02ae85aa27c9ad63d00b03d5b0f49 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Fri, 8 Nov 2019 16:30:03 +0000
Subject: [PATCH 0463/1147] re-add relevant deprecated items for ESR users
 (#837)

makes the prefsCleaner scripts useful again for users updating from ESR60 to ESR68
---
 user.js | 121 +++++++++++++++++++++++++++++++++++++++++++++++++++++++-
 1 file changed, 120 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 5b7b74d..46bcdd3 100644
--- a/user.js
+++ b/user.js
@@ -1634,11 +1634,130 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
-     Documentation denoted as [-]. Items deprecated prior to FF69 have been archived at [1], which
+     Documentation denoted as [-]. Items deprecated prior to FF61 have been archived at [1], which
      also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
      [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/123
 ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
+/* FF61
+// 0501: disable experiments
+   // [1] https://wiki.mozilla.org/Telemetry/Experiments
+   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1420908,1450801
+user_pref("experiments.enabled", false);
+user_pref("experiments.manifest.uri", "");
+user_pref("experiments.supported", false);
+user_pref("experiments.activeExperiment", false);
+// 2612: disable remote JAR files being opened, regardless of content type [FF42+]
+   // [1] https://bugzilla.mozilla.org/1173171
+   // [2] https://www.fxsitecompat.com/en-CA/docs/2015/jar-protocol-support-has-been-disabled-by-default/
+   // [-] https://bugzilla.mozilla.org/1427726
+user_pref("network.jar.block-remote-files", true);
+// 2613: disable JAR from opening Unsafe File Types
+   // [-] https://bugzilla.mozilla.org/1427726
+user_pref("network.jar.open-unsafe-types", false);
+// ***/
+/* FF62
+// 1803: disable Java plugin
+   // [-] (part5) https://bugzilla.mozilla.org/1461243
+user_pref("plugin.state.java", 0);
+// ***/
+/* FF63
+// 0205: disable GeoIP-based search results
+   // [NOTE] May not be hidden if Firefox has changed your settings due to your locale
+   // [-] https://bugzilla.mozilla.org/1462015
+user_pref("browser.search.countryCode", "US"); // [HIDDEN PREF]
+// 0301a: disable auto-update checks for Firefox
+   // [SETTING] General>Firefox Updates>Never check for updates
+   // [-] https://bugzilla.mozilla.org/1420514
+   // user_pref("app.update.enabled", false);
+// 0503: disable "Savant" Shield study [FF61+]
+   // [-] https://bugzilla.mozilla.org/1457226
+user_pref("shield.savant.enabled", false);
+// 1031: disable favicons in tabs and new bookmarks - merged into browser.chrome.site_icons
+   // [-] https://bugzilla.mozilla.org/1453751
+   // user_pref("browser.chrome.favicons", false);
+// 2030: disable autoplay of HTML5 media - replaced by media.autoplay.default
+   // This may break video playback on various sites
+   // [-] https://bugzilla.mozilla.org/1470082
+user_pref("media.autoplay.enabled", false);
+// 2704: set cookie lifetime in days (see 2703)
+   // [-] https://bugzilla.mozilla.org/1457170
+   // user_pref("network.cookie.lifetime.days", 90); // [DEFAULT: 90]
+// 5000's: enable "Ctrl+Tab cycles through tabs in recently used order" - replaced by browser.ctrlTab.recentlyUsedOrder
+   // [-] https://bugzilla.mozilla.org/1473595
+   // user_pref("browser.ctrlTab.previews", true);
+// ***/
+/* FF64
+// 0516: disable Onboarding [FF55+]
+   // Onboarding is an interactive tour/setup for new installs/profiles and features. Every time
+   // about:home or about:newtab is opened, the onboarding overlay is injected into that page
+   // [NOTE] Onboarding uses Google Analytics [2], and leaks resource://URIs [3]
+   // [1] https://wiki.mozilla.org/Firefox/Onboarding
+   // [2] https://github.com/mozilla/onboard/commit/db4d6c8726c89a5d6a241c1b1065827b525c5baf
+   // [3] https://bugzilla.mozilla.org/863246#c154
+   // [-] https://bugzilla.mozilla.org/1462415
+user_pref("browser.onboarding.enabled", false);
+// 2608: disable WebIDE ADB extension downloads - both renamed
+   // [1] https://trac.torproject.org/projects/tor/ticket/16222
+   // [-] https://bugzilla.mozilla.org/1491315
+user_pref("devtools.webide.autoinstallADBHelper", false);
+user_pref("devtools.webide.adbAddonURL", "");
+// 2681: disable CSP violation events [FF59+]
+   // [1] https://developer.mozilla.org/docs/Web/API/SecurityPolicyViolationEvent
+   // [-] https://bugzilla.mozilla.org/1488165
+user_pref("security.csp.enable_violation_events", false);
+// ***/
+/* FF65
+// 0850a: disable location bar autocomplete and suggestion types
+   // If you enforce any of the suggestion types (see the other 0850a), you MUST enforce 'autocomplete'
+   //   - If *ALL* of the suggestion types are false, 'autocomplete' must also be false
+   //   - If *ANY* of the suggestion types are true, 'autocomplete' must also be true
+   // [-] https://bugzilla.mozilla.org/1502392
+user_pref("browser.urlbar.autocomplete.enabled", false);
+// 0908: remove user & password info when attempting to fix an entered URL (i.e. 0802 is true)
+   // e.g. //user:password@foo -> //user@(prefix)foo(suffix) NOT //user:password@(prefix)foo(suffix)
+   // [-] https://bugzilla.mozilla.org/1510580
+user_pref("browser.fixup.hide_user_pass", true); // [DEFAULT: true]
+// ***/
+/* FF66
+// 0380: disable Browser Error Reporter [FF60+]
+   // [1] https://support.mozilla.org/en-US/kb/firefox-nightly-error-collection
+   // [2] https://firefox-source-docs.mozilla.org/browser/browser/BrowserErrorReporter.html
+   // [-] https://bugzilla.mozilla.org/1509888
+user_pref("browser.chrome.errorReporter.enabled", false);
+user_pref("browser.chrome.errorReporter.submitUrl", "");
+// 0502: disable Mozilla permission to silently opt you into tests
+   // [-] https://bugzilla.mozilla.org/1415625
+user_pref("network.allow-experiments", false);
+// ***/
+/* FF67
+// 2428: enforce DOMHighResTimeStamp API
+   // [WARNING] Required for normalization of timestamps and any timer resolution mitigations
+   // [-] https://bugzilla.mozilla.org/1485264
+user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
+// 5000's: disable CFR [FF64+] - split into two new prefs: *cfr.addons, *cfr.features
+   // [SETTING] General>Browsing>Recommend extensions as you browse
+   // [1] https://support.mozilla.org/en-US/kb/extension-recommendations
+   // [-] https://bugzilla.mozilla.org/1528953
+   // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false);
+// ***/
+/* FF68
+// 0105b: disable Activity Stream Legacy Snippets
+   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1546190,1540939
+user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
+user_pref("browser.aboutHomeSnippets.updateUrl", "");
+// 0307: disable auto updating of lightweight themes (LWT)
+   // Not to be confused with themes in 0301* + 0302*, which use the FF55+ Theme API
+   // Mozilla plan to convert existing LWTs and remove LWT support in the future, see [1]
+   // [1] https://blog.mozilla.org/addons/2018/09/20/future-themes-here/
+   // [-] (part3b) https://bugzilla.mozilla.org/1525762
+user_pref("lightweightThemes.update.enabled", false);
+// 2682: enable CSP 1.1 experimental hash-source directive [FF29+]
+   // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=855326,883975
+   // [-] https://bugzilla.mozilla.org/1386214
+user_pref("security.csp.experimentalEnabled", true);
+// ***/
+
 /* ESR68.x still uses all the following prefs
 // [NOTE] replace the * with a slash in the line above to re-enable them
 // FF69

From c13dbdf40dd6c54a7cee8f8689a2a555252da089 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Fri, 8 Nov 2019 16:42:21 +0000
Subject: [PATCH 0464/1147] 1201 update (#838)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

https://wiki.mozilla.org/Security:Renegotiation describes

> **the new default behaviour** that was introduced in experimental mozilla-central nightly versions on 2010-02-08

where the last step is

> - should the server (or a MITM) request **renegotiation**, Mozilla will terminate the connection with an error message

and then after talking about breakage ...

> The above defaults may break some client/server environments where a Server is still using old software and requires renegotiation.

mentions workarounds to reduce said breakage:

> In order to give such environments a way to keep using Firefox (et.al.) to connect to their vulnerable server infrastructure, the following preferences are available:

specifically talking about the first 2 prefs listed there, one allowing to specify a list of hosts "where renegotiation may be performed" and the 2nd one "completely disables the new protection mechanisms".
But both those prefs were removed in FF38, meaning that since then it's no longer possible to disable the default behaviour that is "should the server (or a MITM) request **renegotiation**, Mozilla will terminate the connection with an error message".

But all of this is about the **re**-negotiation part and not negotiation. And nowhere does it say "insecure" renegotiation, which, as I read it, means that FF will terminate the connection for any kind of **renegotiation**, safe or unsafe.

1201 controls the negotiation part:

> This pref controls the behaviour during the initial negotiation between client and server.
> If set to true, a Mozilla client will reject all connection attempts to servers that are still using the old SSL/TLS protocol and which might be vulnerable to the attack.
> Setting this preference to “true” is the only way to guarantee full protection against the attack.

I think "servers that are still using the old SSL/TLS protocol" actually means servers that **only** support the old protocols.
Servers still supporting those old protocols in addition to some new protocol versions should not be affected by this pref because FF will be able to negotiate to use one of the newer protocol versions.

Ergo lets fix the title and remove the line about renegotiation support because I think that's irrelevant.


ps. the sslpulse link is nice and I'd like to keep it somewhere but it doesn't really fit in 1201 IMO so I moved it to 1202.
---
 user.js | 9 ++++-----
 1 file changed, 4 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 46bcdd3..56c8f50 100644
--- a/user.js
+++ b/user.js
@@ -639,15 +639,14 @@ user_pref("alerts.showFavicons", false); // [DEFAULT: false]
 ***/
 user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
 /** SSL (Secure Sockets Layer) / TLS (Transport Layer Security) ***/
-/* 1201: disable old SSL/TLS "insecure" renegotiation (vulnerable to a MiTM attack)
- * [SETUP-WEB] <2% of secure sites do NOT support the newer "secure" renegotiation, see [2]
- * [1] https://wiki.mozilla.org/Security:Renegotiation
- * [2] https://www.ssllabs.com/ssl-pulse/ ***/
+/* 1201: disable old SSL/TLS "insecure" negotiation (vulnerable to a MiTM attack)
+ * [1] https://wiki.mozilla.org/Security:Renegotiation ***/
 user_pref("security.ssl.require_safe_negotiation", true);
 /* 1202: control TLS versions with min and max
  * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
  * [WARNING] Leave these at default, otherwise you alter your TLS fingerprint.
- * Firefox telemetry (April 2019) shows only 0.5% of TLS web traffic uses 1.0 or 1.1 ***/
+ * Firefox telemetry (April 2019) shows only 0.5% of TLS web traffic uses 1.0 or 1.1
+ * [1] https://www.ssllabs.com/ssl-pulse/ ***/
    // user_pref("security.tls.version.min", 3);
    // user_pref("security.tls.version.max", 4);
 /* 1203: disable SSL session tracking [FF36+]

From d5f297ed426249e98c9bfc117d3d42ae5882944b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 8 Nov 2019 18:06:35 +0000
Subject: [PATCH 0465/1147] 5000s: disable what's new

---
 user.js | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 56c8f50..7e3761c 100644
--- a/user.js
+++ b/user.js
@@ -1620,16 +1620,18 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [WINDOWS] [MAC]
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
    // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+, FF59 and under]
+/* UX: FEATURES: disable and hide the icons and menus ***/
+   // user_pref("browser.messaging-system.whatsNewPanel.enabled", false); // What's New [FF70+]
+   // user_pref("extensions.pocket.enabled", false); // Pocket Account [FF46+]
+   // user_pref("identity.fxaccounts.enabled", false); // Firefox Accounts & Sync [FF60+] [RESTART]
+   // user_pref("reader.parse-on-load.enabled", false); // Reader View
 /* OTHER ***/
    // user_pref("browser.bookmarks.max_backups", 2);
    // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+]
       // [SETTING] General>Browsing>Recommend extensions as you browse
    // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
       // [SETTING] General>Browsing>Recommend features as you browse
-   // user_pref("extensions.pocket.enabled", false); // disable and hide Pocket [FF46+]
-   // user_pref("identity.fxaccounts.enabled", false); // disable and hide Firefox Accounts and Sync [FF60+] [RESTART]
    // user_pref("network.manage-offline-status", false); // see bugzilla 620472
-   // user_pref("reader.parse-on-load.enabled", false); // "Reader View"
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED

From 0cfb2fb06d68639b3e491a98b80a380ad48ec0d4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 9 Nov 2019 23:23:34 +0000
Subject: [PATCH 0466/1147] 1703: remove

default true since FF61, and ESR60 is now EOL
---
 user.js | 2 --
 1 file changed, 2 deletions(-)

diff --git a/user.js b/user.js
index 7e3761c..9a4bbb4 100644
--- a/user.js
+++ b/user.js
@@ -855,8 +855,6 @@ user_pref("privacy.userContext.ui.enabled", true);
 /* 1702: enable Container Tabs [FF50+]
  * [SETTING] General>Tabs>Enable Container Tabs ***/
 user_pref("privacy.userContext.enabled", true);
-/* 1703: enable a private container for thumbnail loads [FF51+] ***/
-user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // [DEFAULT: true FF61+]
 /* 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
  * 0=no menu (default), 1=show when clicked, 2=show on long press
  * [1] https://bugzilla.mozilla.org/1328756 ***/

From 0d57cfc44af3f0c8426e166db8dd91faf8a52c5c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 9 Nov 2019 23:25:52 +0000
Subject: [PATCH 0467/1147] about_newtab_segregation.enabled

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index e6f72d8..94a2cdb 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 27-October-2019
+ Last updated: 09-November-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -211,6 +211,7 @@
     'extensions.webservice.discoverURL',
     'intl.locale.requested',
     'intl.regional_prefs.use_os_locales',
+    'privacy.usercontext.about_newtab_segregation.enabled'
     'security.insecure_connection_icon.pbmode.enabled',
     'security.insecure_connection_text.pbmode.enabled',
     'webgl.dxgl.enabled',

From 1d31da40eca9a254f592fd48256e332efd2e510b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 11 Nov 2019 13:00:01 +0000
Subject: [PATCH 0468/1147] missing comma

thanks @sebp  - https://github.com/ghacksuserjs/ghacks-user.js/commit/0d57cfc44af3f0c8426e166db8dd91faf8a52c5c#commitcomment-35890867
---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 94a2cdb..3a889fd 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 09-November-2019
+ Last updated: 11-November-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -211,7 +211,7 @@
     'extensions.webservice.discoverURL',
     'intl.locale.requested',
     'intl.regional_prefs.use_os_locales',
-    'privacy.usercontext.about_newtab_segregation.enabled'
+    'privacy.usercontext.about_newtab_segregation.enabled',
     'security.insecure_connection_icon.pbmode.enabled',
     'security.insecure_connection_text.pbmode.enabled',
     'webgl.dxgl.enabled',

From bff1e84afa8294107462c9a6dce49ff6e7452474 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 11 Nov 2019 15:10:14 +0000
Subject: [PATCH 0469/1147] v1.6.0

---
 scratchpad-scripts/troubleshooter.js | 190 +++++++++++++--------------
 1 file changed, 94 insertions(+), 96 deletions(-)

diff --git a/scratchpad-scripts/troubleshooter.js b/scratchpad-scripts/troubleshooter.js
index 98d9948..1cce763 100644
--- a/scratchpad-scripts/troubleshooter.js
+++ b/scratchpad-scripts/troubleshooter.js
@@ -1,65 +1,11 @@
 
-/*** ghacks-user.js troubleshooter.js v1.5.2 ***/
+/*** ghacks-user.js troubleshooter.js v1.6.0 ***/
 
 (function() {
 
-  if("undefined" === typeof(Services)) {
-    alert("about:config needs to be the active tab!");
-    return;
-  }
+  if ("undefined" === typeof(Services)) return alert('about:config needs to be the active tab!');
 
-  function getMyList(arr) {
-    let aRet = [];
-    let dummy = 0;
-    for (let i = 0, len = arr.length; i < len; i++) {
-      if (Services.prefs.prefHasUserValue(arr[i])) {
-        dummy = Services.prefs.getPrefType(arr[i]);
-        switch (dummy) {
-          case 32: // string (see https://dxr.mozilla.org/mozilla-central/source/modules/libpref/nsIPrefBranch.idl#31)
-            dummy = Services.prefs.getCharPref(arr[i]);
-            aRet.push({'name':arr[i],'value': dummy,'type':32});
-            break;
-          case 64: // int
-            dummy = Services.prefs.getIntPref(arr[i]);
-            aRet.push({'name':arr[i],'value': dummy,'type':64});
-            break;
-          case 128: // boolean
-            dummy = Services.prefs.getBoolPref(arr[i]);
-            aRet.push({'name':arr[i],'value': dummy,'type':128});
-            break;
-          default:
-            console.log("error detecting pref-type for '"+arr[i]+"' !");
-        }
-      }
-    }
-    return aRet;
-  }
-
-  function reapply(arr) {
-    for (let i = 0, len = arr.length; i < len; i++) {
-      switch (arr[i].type) {
-        case 32: // string
-          Services.prefs.setCharPref(arr[i].name, arr[i].value);
-          break;
-        case 64: // int
-          Services.prefs.setIntPref(arr[i].name, arr[i].value);
-          break;
-        case 128: // boolean
-          Services.prefs.setBoolPref(arr[i].name, arr[i].value);
-          break;
-        default:
-          console.log("error re-appyling value for '"+arr[i].name+"' !"); // should never happen
-      }
-    }
-  }
-
-  function myreset(arr) {
-    for (let i = 0, len = arr.length; i < len; i++) {
-      Services.prefs.clearUserPref(arr[i].name);
-    }
-  }
-
-  let ops = [
+  const aPREFS = [
 
     /* known culprits */
     'network.cookie.cookieBehavior',
@@ -160,56 +106,108 @@
     'last.one.without.comma'
   ]
 
+  // any runtime-set pref that everyone will have and that can be safely reset
+  const oFILLER = { type: 64, name: 'extensions.blocklist.pingCountTotal', value: -1 };
 
-  // reset prefs that set the same value as FFs default value
-  let aTEMP = getMyList(ops);
-  myreset(aTEMP);
-  reapply(aTEMP);
+  function getMyList(arr) {
+    const aRet = [];
+    for (const sPname of arr) {
+      if (Services.prefs.prefHasUserValue(sPname)) {
+        const ptype = Services.prefs.getPrefType(sPname);
+        switch (ptype) {
+          case 32: // string (see https://dxr.mozilla.org/mozilla-central/source/modules/libpref/nsIPrefBranch.idl#31)
+            aRet.push({'type':ptype,'name':sPname,'value':Services.prefs.getCharPref(sPname)});
+            break;
+          case 64: // int
+            aRet.push({'type':ptype,'name':sPname,'value':Services.prefs.getIntPref(sPname)});
+            break;
+          case 128: // boolean
+            aRet.push({'type':ptype,'name':sPname,'value':Services.prefs.getBoolPref(sPname)});
+            break;
+          default:
+            console.log("error detecting pref-type for '"+sPname+"' !");
+        }
+      }
+    }
+    return aRet;
+  }
 
-  const aBACKUP = getMyList(ops);
-  //console.log(aBACKUP.length, "user-set prefs from our list detected and their values stored.");
+  function reapply(arr) {
+    for (const oPref of arr) {
+      switch (oPref.type) {
+        case 32: // string
+          Services.prefs.setCharPref(oPref.name, oPref.value);
+          break;
+        case 64: // int
+          Services.prefs.setIntPref(oPref.name, oPref.value);
+          break;
+        case 128: // boolean
+          Services.prefs.setBoolPref(oPref.name, oPref.value);
+          break;
+        default:
+          console.log("error re-appyling value for '"+oPref.name+"' !"); // should never happen
+      }
+    }
+  }
 
-  let myArr = aBACKUP;
-  let found = false;
-  let aDbg = [];
-  focus();
-  myreset(aBACKUP); // reset all detected prefs
-  if (confirm("all detected prefs reset.\n\n!! KEEP THIS PROMPT OPEN AND TEST THE SITE IN ANOTHER TAB !!\n\nIF the problem still exists, this script can't help you - click cancel to re-apply your values and exit.\n\nClick OK if your problem is fixed.")) {
-    aDbg = myArr;
-    reapply(aBACKUP);
-    myreset(myArr.slice(0, parseInt(myArr.length/2)));
-    while (myArr.length >= 2) {
+  function myreset(arr) {
+    for (const oPref of arr) Services.prefs.clearUserPref(oPref.name);
+  }
+
+  function resetAllMatchingDefault(arr) {
+    const aTmp = getMyList(arr);
+    myreset(aTmp);
+    reapply(aTmp);
+  }
+
+  function _main(aALL) {
+    const _h = (arr) => Math.ceil(arr.length/2);
+
+    let aTmp = aALL, aDbg = aALL;
+    reapply(aALL);
+    myreset(aTmp.slice(0, _h(aTmp)));
+    while (aTmp.length) {
       alert("NOW TEST AGAIN !");
       if (confirm("if the problem still exists click OK, otherwise click cancel.")) {
-        myArr = myArr.slice(parseInt(myArr.length/2));
-        if (myArr.length == 1) {
-          alert("The problem is caused by more than 1 pref !\n\nNarrowed it down to "+ aDbg.length.toString() +" prefs, check the console ...");
-          break;
-        }
+        aTmp = aTmp.slice(_h(aTmp));
       } else {
-        myArr = myArr.slice(0, parseInt(myArr.length/2));
-        aDbg = myArr;
-        if (myArr.length == 1) { found = true; break; }
+        aTmp = aTmp.slice(0, _h(aTmp));
+        aDbg = aTmp; // update narrowed down list
+        if (aDbg.length == 1) break;
       }
-      reapply(aBACKUP);
-      myreset(myArr.slice(0, parseInt(myArr.length/2))); // reset half of the remaining prefs
+      reapply(aALL);
+      myreset(aTmp.slice(0, _h(aTmp))); // reset half of the remaining prefs
     }
-    reapply(aBACKUP);
+    reapply(aALL);
+
+    if (aDbg.length == 1) return alert("narrowed it down to:\n\n"+aDbg[0].name+"\n");
+    if (aDbg.length == aALL.length) {
+      let msg = "Failed to narrow it down beyond the initial "+aALL.length+" prefs. The problem is most likely caused by at least 2 prefs!\n\n";
+      msg += "Either those prefs are too far apart in the list or there are exactly 2 culprits and they just happen to be at the wrong place.\n\n";
+      msg += "In case it's the latter, the script can add a dummy pref and you can try again - Try again?";
+      if (confirm(msg)) return _main([...aALL, oFILLER]);
+    } else if (aDbg.length > 10 && confirm("Narrowed it down to "+aDbg.length+" prefs. Try narrowing it down further?")) {
+      return _main(aDbg.reverse());
+    }
+
+    alert("Narrowed it down to "+ aDbg.length.toString() +" prefs, check the console ...");
+    console.log("The problem is caused by 2 or more of these prefs:");
+    for (const oPref of aDbg) console.log(oPref.name);
   }
-  else {
-    reapply(aBACKUP);
+
+
+  resetAllMatchingDefault(aPREFS); // reset user-set prefs matching FFs default value
+
+  const aBAK = getMyList(aPREFS);
+  //console.log(aBAK.length, "user-set prefs from our list detected and their values stored.");
+
+  focus();
+  myreset(aBAK);
+  if (!confirm("all detected prefs reset.\n\n!! KEEP THIS PROMPT OPEN AND TEST THE SITE IN ANOTHER TAB !!\n\nIF the problem still exists, this script can't help you - click cancel to re-apply your values and exit.\n\nClick OK if your problem is fixed.")) {
+    reapply(aBAK);
     return;
   }
 
-  if (found) {
-    alert("narrowed it down to:\n\n"+myArr[0].name+"\n");
-    myreset(myArr); // reset the culprit
-  }
-  else {
-    console.log("the problem is caused by a combination of the following prefs:");
-    for (let i = 0, len = aDbg.length; i < len; i++) {
-      console.log(aDbg[i].name);
-    }
-  }
+  _main(aBAK);
 
 })();

From a3611b7cf89b64b7b9814259cb5fdbde3ebbcd3e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 14 Nov 2019 02:39:48 +0000
Subject: [PATCH 0470/1147] changes to prefs affecting extensions

also first word on pdfjs.disabled, to be consistent
---
 user.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 9a4bbb4..381a8fc 100644
--- a/user.js
+++ b/user.js
@@ -1049,6 +1049,7 @@ user_pref("javascript.options.asmjs", false);
    // user_pref("javascript.options.ion", false);
    // user_pref("javascript.options.baselinejit", false);
 /* 2422: disable WebAssembly [FF52+] [SETUP-PERF]
+ * [NOTE] In FF70+ this no longer affects extensions (1576254)
  * [1] https://developer.mozilla.org/docs/WebAssembly ***/
 user_pref("javascript.options.wasm", false);
 /* 2426: disable Intersection Observer API [FF55+]
@@ -1130,6 +1131,7 @@ user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
  * [1] https://bugzilla.mozilla.org/1173199 ***/
    // user_pref("mathml.disabled", true);
 /* 2610: disable in-content SVG (Scalable Vector Graphics) [FF53+]
+ * [NOTE] In FF70+ and ESR68.1.0+ this no longer affects extensions (1564208)
  * [WARNING] Expect breakage incl. youtube player controls. Best left for a "hardened" profile.
  * [1] https://bugzilla.mozilla.org/1216893 ***/
    // user_pref("svg.disabled", true);
@@ -1158,7 +1160,7 @@ user_pref("webchannel.allowObject.urlWhitelist", "");
  * [3] CVE-2017-5383: https://www.mozilla.org/security/advisories/mfsa2017-02/
  * [4] https://www.xudongz.com/blog/2017/idn-phishing/ ***/
 user_pref("network.IDN_show_punycode", true);
-/* 2620: enable Firefox's built-in PDF reader [SETUP-CHROME]
+/* 2620: enforce Firefox's built-in PDF reader [SETUP-CHROME]
  * This setting controls if the option "Display in Firefox" is available in the setting below
  *   and by effect controls whether PDFs are handled in-browser or externally ("Ask" or "Open With")
  * PROS: pdfjs is lightweight, open source, and as secure/vetted as any pdf reader out there (more than most)

From b0221ec838acdf469b99466e37d8bf9068ce57fe Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 17 Nov 2019 10:33:02 +0000
Subject: [PATCH 0471/1147] 1576254 version fixup

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 381a8fc..604d42e 100644
--- a/user.js
+++ b/user.js
@@ -1049,7 +1049,7 @@ user_pref("javascript.options.asmjs", false);
    // user_pref("javascript.options.ion", false);
    // user_pref("javascript.options.baselinejit", false);
 /* 2422: disable WebAssembly [FF52+] [SETUP-PERF]
- * [NOTE] In FF70+ this no longer affects extensions (1576254)
+ * [NOTE] In FF71+ this no longer affects extensions (1576254)
  * [1] https://developer.mozilla.org/docs/WebAssembly ***/
 user_pref("javascript.options.wasm", false);
 /* 2426: disable Intersection Observer API [FF55+]

From 19526b573c880e3c843e69b76098939cc0a60e3f Mon Sep 17 00:00:00 2001
From: rusty-snake <print_hello_world+Public@protonmail.com>
Date: Tue, 19 Nov 2019 03:31:48 +0000
Subject: [PATCH 0472/1147] 2805 note, FPI change (#842)

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 604d42e..d5fea8e 100644
--- a/user.js
+++ b/user.js
@@ -1323,6 +1323,7 @@ user_pref("privacy.cpd.sessions", true); // Active Logins
 user_pref("privacy.cpd.siteSettings", false); // Site Preferences
 /* 2805: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
  * [NOTE] Not needed if Session Restore is not used (see 0102) or is already cleared with history (see 2803)
+ * [NOTE] privacy.clearOnShutdown.openWindows prevents resuming from crashes (see 1022)
  * [NOTE] privacy.cpd.openWindows has a bug that causes an additional window to open ***/
    // user_pref("privacy.clearOnShutdown.openWindows", true);
    // user_pref("privacy.cpd.openWindows", true);
@@ -1352,7 +1353,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1542309 - isolate top-level domain URLs when host is in the public suffix list (FF68+)
  ** 1506693 - isolate pdfjs range-based requests (FF68+)
  ** 1330467 - isolate site permissions (FF69+)
- ** 1534339 - isolate IPv6 (FF72+)
+ ** 1534339 - isolate IPv6 (coming soon)
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]

From f67e72919773ff51e712c515988c61e4d0a3d0e4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 19 Nov 2019 06:39:08 +0000
Subject: [PATCH 0473/1147] whatsNewPanel correct version

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index d5fea8e..6e61b1e 100644
--- a/user.js
+++ b/user.js
@@ -1622,7 +1622,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
    // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+, FF59 and under]
 /* UX: FEATURES: disable and hide the icons and menus ***/
-   // user_pref("browser.messaging-system.whatsNewPanel.enabled", false); // What's New [FF70+]
+   // user_pref("browser.messaging-system.whatsNewPanel.enabled", false); // What's New [FF69+]
    // user_pref("extensions.pocket.enabled", false); // Pocket Account [FF46+]
    // user_pref("identity.fxaccounts.enabled", false); // Firefox Accounts & Sync [FF60+] [RESTART]
    // user_pref("reader.parse-on-load.enabled", false); // Reader View

From a0e0a2a6c96167735b1f684da385ddb2ae6c6fbb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 19 Nov 2019 16:26:14 +0000
Subject: [PATCH 0474/1147] 2680 tweak #840

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 6e61b1e..3a4458f 100644
--- a/user.js
+++ b/user.js
@@ -1208,7 +1208,8 @@ user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
    // user_pref("extensions.webextensions.restrictedDomains", "");
 
 /** SECURITY ***/
-/* 2680: enable CSP (Content Security Policy)
+/* 2680: enforce CSP (Content Security Policy)
+ * [WARNING] CSP is a very important and widespread security feature. Don't disable it!
  * [1] https://developer.mozilla.org/docs/Web/HTTP/CSP ***/
 user_pref("security.csp.enable", true); // [DEFAULT: true]
 /* 2684: enforce a security delay on some confirmation dialogs such as install, open/save

From 6acfdaccbdb961ab748bfb067e2d77db11d159cd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 20 Nov 2019 04:48:15 +0000
Subject: [PATCH 0475/1147] RFP stuff

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 3a4458f..82c7e6a 100644
--- a/user.js
+++ b/user.js
@@ -1434,6 +1434,7 @@ user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAUL
  ** 1540726 - return "light" with prefers-color-scheme (FF67+)
       [1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
  ** 1564422 - spoof audioContext outputLatency (FF70+)
+ ** 1595823 - spoof audioContext sampleRate (FF72+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]

From 450c9a9e0f2ef14ae392d71f06132da578471a33 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 23 Nov 2019 03:23:08 +1300
Subject: [PATCH 0476/1147] simplify ciphers, closes #839 (#844)

* simplify ciphers

- let's not encourage (remove options 1, 2) changing your cipher suite FP
- remove "it's quite technical ..." (everything is technical to someone), trim to one line
- add test link so users can just see that it's FP'able
- reinforce not to fuck with the cipher suite in the cipher's sub-section
---
 user.js | 13 +++----------
 1 file changed, 3 insertions(+), 10 deletions(-)

diff --git a/user.js b/user.js
index 82c7e6a..6d429fd 100644
--- a/user.js
+++ b/user.js
@@ -626,15 +626,8 @@ user_pref("browser.shell.shortcutFavicons", false);
 user_pref("alerts.showFavicons", false); // [DEFAULT: false]
 
 /*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
-   Note that your cipher and other settings can be used server side as a fingerprint attack
-   vector, see [1] (It's quite technical but the first part is easy to understand
-   and you can stop reading when you reach the second section titled "Enter Bro")
-
-   Option 1: Use defaults for ciphers (1260's). There is nothing *weak* about these, but
-             due to breakage, browsers can't deprecate them until the web stops using them
-   Option 2: Disable the ciphers in 1261, 1262 and 1263. These shouldn't break anything.
-             Optionally, disable the ciphers in 1264.
-
+   Your cipher and other settings can be used in server side fingerprinting
+   [TEST] https://www.ssllabs.com/ssltest/viewMyClient.html
    [1] https://www.securityartwork.es/2017/02/02/tls-client-fingerprinting-with-bro/
 ***/
 user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
@@ -728,7 +721,7 @@ user_pref("security.mixed_content.block_display_content", true);
  * [1] https://bugzilla.mozilla.org/1190623 ***/
 user_pref("security.mixed_content.block_object_subrequest", true);
 
-/** CIPHERS [see the section 1200 intro] ***/
+/** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro] ***/
 /* 1261: disable 3DES (effective key size < 128)
  * [1] https://en.wikipedia.org/wiki/3des#Security
  * [2] https://en.wikipedia.org/wiki/Meet-in-the-middle_attack

From f0980b5cb84a9f576ff4afa60c1ae39cbba3b86f Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Fri, 22 Nov 2019 15:19:37 +0000
Subject: [PATCH 0477/1147] 2002: add proxy_only_if_behind_proxy

---
 user.js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 6d429fd..503ff6d 100644
--- a/user.js
+++ b/user.js
@@ -882,11 +882,14 @@ user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
  * [1] https://www.privacytools.io/#webrtc ***/
 user_pref("media.peerconnection.enabled", false);
 /* 2002: limit WebRTC IP leaks if using WebRTC
+ * In FF70+ these settings match Mode 4 (Mode 3 in older versions) (see [3])
  * [TEST] https://browserleaks.com/webrtc
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1189041,1297416
- * [2] https://wiki.mozilla.org/Media/WebRTC/Privacy ***/
+ * [2] https://wiki.mozilla.org/Media/WebRTC/Privacy
+ * [3] https://tools.ietf.org/html/draft-ietf-rtcweb-ip-handling-12#section-5.2 ***/
 user_pref("media.peerconnection.ice.default_address_only", true);
 user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
+user_pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true); // [FF70+]
 /* 2010: disable WebGL (Web Graphics Library)
  * [SETUP-WEB] When disabled, may break some websites. When enabled, provides high entropy,
  * especially with readPixels(). Some of the other entropy is lessened with RFP (see 4501)

From 8f76d9439f1b7998d100bc0cda316a8f2dcba741 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 22 Nov 2019 15:26:38 +0000
Subject: [PATCH 0478/1147] 2002: add FF70 bugzilla link

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 503ff6d..1ad591b 100644
--- a/user.js
+++ b/user.js
@@ -884,7 +884,7 @@ user_pref("media.peerconnection.enabled", false);
 /* 2002: limit WebRTC IP leaks if using WebRTC
  * In FF70+ these settings match Mode 4 (Mode 3 in older versions) (see [3])
  * [TEST] https://browserleaks.com/webrtc
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1189041,1297416
+ * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1189041,1297416,1452713
  * [2] https://wiki.mozilla.org/Media/WebRTC/Privacy
  * [3] https://tools.ietf.org/html/draft-ietf-rtcweb-ip-handling-12#section-5.2 ***/
 user_pref("media.peerconnection.ice.default_address_only", true);

From a13027905e7b2db381ecdef5cb69f524eb1acd4e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 23 Nov 2019 02:56:30 +0000
Subject: [PATCH 0479/1147] Delete ghacks-clear-FF60inclusive-[deprecated].js

---
 ...ghacks-clear-FF60inclusive-[deprecated].js | 189 ------------------
 1 file changed, 189 deletions(-)
 delete mode 100644 scratchpad-scripts/ghacks-clear-FF60inclusive-[deprecated].js

diff --git a/scratchpad-scripts/ghacks-clear-FF60inclusive-[deprecated].js b/scratchpad-scripts/ghacks-clear-FF60inclusive-[deprecated].js
deleted file mode 100644
index f62c589..0000000
--- a/scratchpad-scripts/ghacks-clear-FF60inclusive-[deprecated].js
+++ /dev/null
@@ -1,189 +0,0 @@
-/***
- This will reset the preferences that have been deprecated by Mozilla
- and used in the ghacks user.js up to and including release 60-beta
-
- It is in reverse order, so feel free to remove sections that do not apply
-
- For instructions see:
- https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
-***/
-
-(function() {
-  let ops = [
-    /* deprecated */
-
-    /* ESR52.x users can remove sections 53-60 but it is not
-       crucial as your user.js will reinstate them */
-    /* 60 */
-    'browser.newtabpage.directory.source',
-    'browser.newtabpage.enhanced',
-    'browser.newtabpage.introShown',
-    'extensions.shield-recipe-client.enabled',
-    'extensions.shield-recipe-client.api_url',
-    'browser.newtabpage.activity-stream.enabled',
-    'dom.workers.enabled',
-    'view_source.tab',
-    /* 59 */
-    'intl.locale.matchOS',
-    'general.useragent.locale',
-    'datareporting.healthreport.about.reportUrl',
-    'dom.flyweb.enabled',
-    'security.mixed_content.use_hsts',
-    'security.mixed_content.send_hsts_priming',
-    'network.http.referer.userControlPolicy',
-    'security.xpconnect.plugin.unrestricted',
-    'media.getusermedia.screensharing.allowed_domains',
-    'camera.control.face_detection.enabled',
-    'dom.disable_window_status_change',
-    'dom.idle-observers-api.enabled',
-    /* 58 */
-    'browser.crashReports.unsubmittedCheck.autoSubmit',
-    /* 57 */
-    'social.whitelist',
-    'social.toast-notifications.enabled',
-    'social.shareDirectory',
-    'social.remote-install.enabled',
-    'social.directories',
-    'social.share.activationPanelEnabled',
-    'social.enabled',
-    'media.eme.chromium-api.enabled',
-    'devtools.webide.autoinstallFxdtAdapters',
-    'browser.casting.enabled',
-    'browser.bookmarks.showRecentlyBookmarked',
-    /* 56 */
-    'extensions.screenshots.system-disabled',
-    'extensions.formautofill.experimental',
-    /* 55 */
-    'geo.security.allowinsecure',
-    'browser.selfsupport.enabled',
-    'browser.selfsupport.url',
-    'browser.newtabpage.directory.ping',
-    'browser.formfill.saveHttpsForms',
-    'browser.formautofill.enabled',
-    'dom.enable_user_timing',
-    'dom.keyboardevent.code.enabled',
-    'browser.tabs.animate',
-    'browser.fullscreen.animate',
-    /* 54 */
-    'browser.safebrowsing.reportMalwareMistakeURL',
-    'browser.safebrowsing.reportPhishMistakeURL',
-    'media.eme.apiVisible',
-    'dom.archivereader.enabled',
-    /* 53 */
-    'security.tls.unrestricted_rc4_fallback',
-    'plugin.scan.Acrobat',
-    'plugin.scan.Quicktime',
-    'plugin.scan.WindowsMediaPlayer',
-    'media.getusermedia.screensharing.allow_on_old_platforms',
-    'dom.beforeAfterKeyboardEvent.enabled',
-    /* End of ESR52.x section */
-
-    /* 52 */
-    'network.http.sendSecureXSiteReferrer',
-    'media.gmp-eme-adobe.enabled',
-    'media.gmp-eme-adobe.visible',
-    'media.gmp-eme-adobe.autoupdate',
-    'dom.telephony.enabled',
-    'dom.battery.enabled',
-    /* 51 */
-    'media.block-play-until-visible',
-    'dom.vr.oculus050.enabled',
-    'network.http.spdy.enabled.v3-1',
-    /* 50 */
-    'browser.usedOnWindows10.introURL',
-    'plugins.update.notifyUser',
-    'browser.safebrowsing.enabled',
-    'security.ssl3.ecdhe_ecdsa_rc4_128_sha',
-    'security.ssl3.ecdhe_rsa_rc4_128_sha',
-    'security.ssl3.rsa_rc4_128_md5',
-    'security.ssl3.rsa_rc4_128_sha',
-    'plugins.update.url',
-    /* 49 */
-    'loop.enabled',
-    'loop.server',
-    'loop.feedback.formURL',
-    'loop.feedback.manualFormURL',
-    'loop.facebook.appId',
-    'loop.facebook.enabled',
-    'loop.facebook.fallbackUrl',
-    'loop.facebook.shareUrl',
-    'loop.logDomains',
-    'dom.disable_window_open_feature.scrollbars',
-    'dom.push.udp.wakeupEnabled',
-    /* 48 */
-    'browser.urlbar.unifiedcomplete',
-    /* 47 */
-    'toolkit.telemetry.unifiedIsOptIn',
-    'datareporting.healthreport.about.reportUrlUnified',
-    'browser.history.allowPopState',
-    'browser.history.allowPushState',
-    'browser.history.allowReplaceState',
-    /* 46 */
-    'datareporting.healthreport.service.enabled',
-    'datareporting.healthreport.documentServerURI',
-    'datareporting.policy.dataSubmissionEnabled.v2',
-    'browser.safebrowsing.appRepURL',
-    'browser.polaris.enabled',
-    'browser.pocket.enabled',
-    'browser.pocket.api',
-    'browser.pocket.site',
-    'browser.pocket.oAuthConsumerKey',
-    /* 45 */
-    'browser.sessionstore.privacy_level_deferred',
-    /* 44 */
-    'browser.safebrowsing.provider.google.appRepURL',
-    'security.tls.insecure_fallback_hosts.use_static_list',
-    'dom.workers.sharedWorkers.enabled',
-    'dom.disable_image_src_set',
-    /* 43 */
-    'browser.safebrowsing.gethashURL',
-    'browser.safebrowsing.updateURL',
-    'browser.safebrowsing.malware.reportURL',
-    'browser.trackingprotection.gethashURL',
-    'browser.trackingprotection.updateURL',
-    'pfs.datasource.url',
-    'browser.search.showOneOffButtons',
-    /* 42 and earlier */
-    'privacy.clearOnShutdown.passwords', // 42
-    'full-screen-api.approval-required', // 42
-    'browser.safebrowsing.reportErrorURL', // 41
-    'browser.safebrowsing.reportGenericURL', // 41
-    'browser.safebrowsing.reportMalwareErrorURL', // 41
-    'browser.safebrowsing.reportMalwareURL', // 41
-    'browser.safebrowsing.reportURL', // 41
-    'plugins.enumerable_names', // 41
-    'network.http.spdy.enabled.http2draft', // 41
-    'camera.control.autofocus_moving_callback.enabled', // 37
-    'privacy.donottrackheader.value', // 36
-    'network.websocket.enabled', // 35
-    'dom.network.enabled', // 31
-    'pageThumbs.enabled', // 25
-
-    /* reset parrot: check your open about:config after running the script */
-    '_user.js.parrot'
-  ]
-
-  if("undefined" === typeof(Services)) {
-    alert("about:config needs to be the active tab!");
-    return;
-  }
-  
-  let c = 0;
-  for (let i = 0, len = ops.length; i < len; i++) {
-    if (Services.prefs.prefHasUserValue(ops[i])) {   
-      Services.prefs.clearUserPref(ops[i]);
-      if (!Services.prefs.prefHasUserValue(ops[i])) {
-        console.log("reset", ops[i]);
-        c++;
-      } else { console.log("failed to reset", ops[i]); }
-    }
-  }
-  
-  focus();
-  
-  let d = (c==1) ? " pref" : " prefs";
-  if (c > 0) {
-    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
-  } else { alert("nothing to reset"); }
-  
-})();

From 163e18ce6d41c090a9856d01b6a09fafe85b90e0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 23 Nov 2019 02:57:26 +0000
Subject: [PATCH 0480/1147] Create ghacks-clear-FF68inclusive-[deprecated].js

---
 ...ghacks-clear-FF68inclusive-[deprecated].js | 221 ++++++++++++++++++
 1 file changed, 221 insertions(+)
 create mode 100644 scratchpad-scripts/ghacks-clear-FF68inclusive-[deprecated].js

diff --git a/scratchpad-scripts/ghacks-clear-FF68inclusive-[deprecated].js b/scratchpad-scripts/ghacks-clear-FF68inclusive-[deprecated].js
new file mode 100644
index 0000000..a3005e0
--- /dev/null
+++ b/scratchpad-scripts/ghacks-clear-FF68inclusive-[deprecated].js
@@ -0,0 +1,221 @@
+/***
+ This will reset the preferences that have been deprecated by Mozilla
+ and used in the ghacks user.js up to and including Firefox/ESR 68
+
+ It is in reverse order, so feel free to remove sections that do not apply
+
+ For instructions see:
+ https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
+***/
+
+(function() {
+  let ops = [
+    /* deprecated */
+
+    /* 68 */
+    'browser.newtabpage.activity-stream.disableSnippets',
+    'browser.aboutHomeSnippets.updateUrl',
+    'lightweightThemes.update.enabled',
+    'security.csp.experimentalEnabled',
+    /* F67 */
+    'dom.event.highrestimestamp.enabled',
+    'browser.newtabpage.activity-stream.asrouter.userprefs.cfr',
+    /* 66 */
+    'browser.chrome.errorReporter.enabled',
+    'browser.chrome.errorReporter.submitUrl',
+    'network.allow-experiments',
+    /* 65 */
+    'browser.urlbar.autocomplete.enabled',
+    'browser.fixup.hide_user_pass',
+    /* 64 */
+    'browser.onboarding.enabled',
+    'devtools.webide.autoinstallADBHelper',
+    'devtools.webide.adbAddonURL',
+    'security.csp.enable_violation_events',
+    /* 63 */
+    'browser.search.countryCode',
+    'app.update.enabled',
+    'shield.savant.enabled',
+    'browser.chrome.favicons',
+    'media.autoplay.enabled',
+    'network.cookie.lifetime.days',
+    'browser.ctrlTab.previews',
+    /* 62 */
+    'plugin.state.java',
+    /* 61 */
+    'experiments.enabled',
+    'experiments.manifest.uri',
+    'experiments.supported',
+    'experiments.activeExperiment',
+    'network.jar.block-remote-files',
+    'network.jar.open-unsafe-types',
+    /* 60 */
+    'browser.newtabpage.directory.source',
+    'browser.newtabpage.enhanced',
+    'browser.newtabpage.introShown',
+    'extensions.shield-recipe-client.enabled',
+    'extensions.shield-recipe-client.api_url',
+    'browser.newtabpage.activity-stream.enabled',
+    'dom.workers.enabled',
+    /* 59 */
+    'intl.locale.matchOS',
+    'general.useragent.locale',
+    'datareporting.healthreport.about.reportUrl',
+    'dom.flyweb.enabled',
+    'security.mixed_content.use_hsts',
+    'security.mixed_content.send_hsts_priming',
+    'network.http.referer.userControlPolicy',
+    'security.xpconnect.plugin.unrestricted',
+    'media.getusermedia.screensharing.allowed_domains',
+    'camera.control.face_detection.enabled',
+    'dom.disable_window_status_change',
+    'dom.idle-observers-api.enabled',
+    /* 58 */
+    'browser.crashReports.unsubmittedCheck.autoSubmit',
+    /* 57 */
+    'social.whitelist',
+    'social.toast-notifications.enabled',
+    'social.shareDirectory',
+    'social.remote-install.enabled',
+    'social.directories',
+    'social.share.activationPanelEnabled',
+    'social.enabled',
+    'media.eme.chromium-api.enabled',
+    'devtools.webide.autoinstallFxdtAdapters',
+    'browser.casting.enabled',
+    'browser.bookmarks.showRecentlyBookmarked',
+    /* 56 */
+    'extensions.screenshots.system-disabled',
+    'extensions.formautofill.experimental',
+    /* 55 */
+    'geo.security.allowinsecure',
+    'browser.selfsupport.enabled',
+    'browser.selfsupport.url',
+    'browser.newtabpage.directory.ping',
+    'browser.formfill.saveHttpsForms',
+    'browser.formautofill.enabled',
+    'dom.enable_user_timing',
+    'dom.keyboardevent.code.enabled',
+    'browser.tabs.animate',
+    'browser.fullscreen.animate',
+    /* 54 */
+    'browser.safebrowsing.reportMalwareMistakeURL',
+    'browser.safebrowsing.reportPhishMistakeURL',
+    'media.eme.apiVisible',
+    'dom.archivereader.enabled',
+    /* 53 */
+    'security.tls.unrestricted_rc4_fallback',
+    'plugin.scan.Acrobat',
+    'plugin.scan.Quicktime',
+    'plugin.scan.WindowsMediaPlayer',
+    'media.getusermedia.screensharing.allow_on_old_platforms',
+    'dom.beforeAfterKeyboardEvent.enabled',
+    /* 52 */
+    'network.http.sendSecureXSiteReferrer',
+    'media.gmp-eme-adobe.enabled',
+    'media.gmp-eme-adobe.visible',
+    'media.gmp-eme-adobe.autoupdate',
+    'dom.telephony.enabled',
+    'dom.battery.enabled',
+    /* 51 */
+    'media.block-play-until-visible',
+    'dom.vr.oculus050.enabled',
+    'network.http.spdy.enabled.v3-1',
+    /* 50 */
+    'browser.usedOnWindows10.introURL',
+    'plugins.update.notifyUser',
+    'browser.safebrowsing.enabled',
+    'security.ssl3.ecdhe_ecdsa_rc4_128_sha',
+    'security.ssl3.ecdhe_rsa_rc4_128_sha',
+    'security.ssl3.rsa_rc4_128_md5',
+    'security.ssl3.rsa_rc4_128_sha',
+    'plugins.update.url',
+    /* 49 */
+    'loop.enabled',
+    'loop.server',
+    'loop.feedback.formURL',
+    'loop.feedback.manualFormURL',
+    'loop.facebook.appId',
+    'loop.facebook.enabled',
+    'loop.facebook.fallbackUrl',
+    'loop.facebook.shareUrl',
+    'loop.logDomains',
+    'dom.disable_window_open_feature.scrollbars',
+    'dom.push.udp.wakeupEnabled',
+    /* 48 */
+    'browser.urlbar.unifiedcomplete',
+    /* 47 */
+    'toolkit.telemetry.unifiedIsOptIn',
+    'datareporting.healthreport.about.reportUrlUnified',
+    'browser.history.allowPopState',
+    'browser.history.allowPushState',
+    'browser.history.allowReplaceState',
+    /* 46 */
+    'datareporting.healthreport.service.enabled',
+    'datareporting.healthreport.documentServerURI',
+    'datareporting.policy.dataSubmissionEnabled.v2',
+    'browser.safebrowsing.appRepURL',
+    'browser.polaris.enabled',
+    'browser.pocket.enabled',
+    'browser.pocket.api',
+    'browser.pocket.site',
+    'browser.pocket.oAuthConsumerKey',
+    /* 45 */
+    'browser.sessionstore.privacy_level_deferred',
+    /* 44 */
+    'browser.safebrowsing.provider.google.appRepURL',
+    'security.tls.insecure_fallback_hosts.use_static_list',
+    'dom.workers.sharedWorkers.enabled',
+    'dom.disable_image_src_set',
+    /* 43 */
+    'browser.safebrowsing.gethashURL',
+    'browser.safebrowsing.updateURL',
+    'browser.safebrowsing.malware.reportURL',
+    'browser.trackingprotection.gethashURL',
+    'browser.trackingprotection.updateURL',
+    'pfs.datasource.url',
+    'browser.search.showOneOffButtons',
+    /* 42 and earlier */
+    'privacy.clearOnShutdown.passwords', // 42
+    'full-screen-api.approval-required', // 42
+    'browser.safebrowsing.reportErrorURL', // 41
+    'browser.safebrowsing.reportGenericURL', // 41
+    'browser.safebrowsing.reportMalwareErrorURL', // 41
+    'browser.safebrowsing.reportMalwareURL', // 41
+    'browser.safebrowsing.reportURL', // 41
+    'plugins.enumerable_names', // 41
+    'network.http.spdy.enabled.http2draft', // 41
+    'camera.control.autofocus_moving_callback.enabled', // 37
+    'privacy.donottrackheader.value', // 36
+    'network.websocket.enabled', // 35
+    'dom.network.enabled', // 31
+    'pageThumbs.enabled', // 25
+
+    /* reset parrot: check your open about:config after running the script */
+    '_user.js.parrot'
+  ]
+
+  if("undefined" === typeof(Services)) {
+    alert("about:config needs to be the active tab!");
+    return;
+  }
+  
+  let c = 0;
+  for (let i = 0, len = ops.length; i < len; i++) {
+    if (Services.prefs.prefHasUserValue(ops[i])) {   
+      Services.prefs.clearUserPref(ops[i]);
+      if (!Services.prefs.prefHasUserValue(ops[i])) {
+        console.log("reset", ops[i]);
+        c++;
+      } else { console.log("failed to reset", ops[i]); }
+    }
+  }
+  
+  focus();
+  
+  let d = (c==1) ? " pref" : " prefs";
+  if (c > 0) {
+    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
+  } else { alert("nothing to reset"); }
+  
+})();

From a4ba22e912bb202e61c9968738a35c0298bf93c8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 23 Nov 2019 03:02:59 +0000
Subject: [PATCH 0481/1147] Delete
 ghacks-clear-FF60inclusive-[RFP-alternatives].js

---
 ...-clear-FF60inclusive-[RFP-alternatives].js | 59 -------------------
 1 file changed, 59 deletions(-)
 delete mode 100644 scratchpad-scripts/ghacks-clear-FF60inclusive-[RFP-alternatives].js

diff --git a/scratchpad-scripts/ghacks-clear-FF60inclusive-[RFP-alternatives].js b/scratchpad-scripts/ghacks-clear-FF60inclusive-[RFP-alternatives].js
deleted file mode 100644
index f23c568..0000000
--- a/scratchpad-scripts/ghacks-clear-FF60inclusive-[RFP-alternatives].js
+++ /dev/null
@@ -1,59 +0,0 @@
-/***
- This will reset the preferences that are under sections 4600 & 4700 in the ghacks user.js
- up to and including release 60-beta. These are the prefs that are no longer necessary,
- or they conflict with, privacy.resistFingerprinting if you have that enabled.
-
- For instructions see:
- https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
-***/
- 
-(function() {
-  let ops = [
-    /* section 4600 */
-    'dom.maxHardwareConcurrency',
-    'dom.enable_resource_timing',
-    'dom.enable_performance',
-    'device.sensors.enabled',
-    'browser.zoom.siteSpecific',
-    'dom.gamepad.enabled',
-    'dom.netinfo.enabled',
-    'media.webspeech.synth.enabled',
-    'media.video_stats.enabled',
-    'dom.w3c_touch_events.enabled',
-    'media.ondevicechange.enabled',
-    'webgl.enable-debug-renderer-info',
-    /* section 4700 */
-    'general.useragent.override',
-    'general.buildID.override',
-    'general.appname.override',
-    'general.appversion.override',
-    'general.platform.override',
-    'general.oscpu.override',
-    /* reset parrot: check your open about:config after running the script */
-    '_user.js.parrot'
-  ]
-
-  if("undefined" === typeof(Services)) {
-    alert("about:config needs to be the active tab!");
-    return;
-  }
-  
-  let c = 0;
-  for (let i = 0, len = ops.length; i < len; i++) {
-    if (Services.prefs.prefHasUserValue(ops[i])) {   
-      Services.prefs.clearUserPref(ops[i]);
-      if (!Services.prefs.prefHasUserValue(ops[i])) {
-        console.log("reset", ops[i]);
-        c++;
-      } else { console.log("failed to reset", ops[i]); }
-    }
-  }
-  
-  focus();
-  
-  let d = (c==1) ? " pref" : " prefs";
-  if (c > 0) {
-    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
-  } else { alert("nothing to reset"); }
-  
-})();

From b6fbf77dde1a7861d92ffedf8e8ae2e5617085b3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 23 Nov 2019 03:04:14 +0000
Subject: [PATCH 0482/1147] Create
 ghacks-clear-FF68inclusive-[RFP-alternatives].js

---
 ...-clear-FF68inclusive-[RFP-alternatives].js | 61 +++++++++++++++++++
 1 file changed, 61 insertions(+)
 create mode 100644 scratchpad-scripts/ghacks-clear-FF68inclusive-[RFP-alternatives].js

diff --git a/scratchpad-scripts/ghacks-clear-FF68inclusive-[RFP-alternatives].js b/scratchpad-scripts/ghacks-clear-FF68inclusive-[RFP-alternatives].js
new file mode 100644
index 0000000..dd315d6
--- /dev/null
+++ b/scratchpad-scripts/ghacks-clear-FF68inclusive-[RFP-alternatives].js
@@ -0,0 +1,61 @@
+/***
+ This will reset the preferences that are under sections 4600 & 4700 in the ghacks user.js
+ up to and including Firefox/ESR 68. These are the prefs that are no longer necessary,
+ or they conflict with, privacy.resistFingerprinting if you have that enabled.
+
+ For instructions see:
+ https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
+***/
+ 
+(function() {
+  let ops = [
+    /* section 4600 */
+    'dom.maxHardwareConcurrency',
+    'dom.enable_resource_timing',
+    'dom.enable_performance',
+    'device.sensors.enabled',
+    'browser.zoom.siteSpecific',
+    'dom.gamepad.enabled',
+    'dom.netinfo.enabled',
+    'media.webspeech.synth.enabled',
+    'media.video_stats.enabled',
+    'dom.w3c_touch_events.enabled',
+    'media.ondevicechange.enabled',
+    'webgl.enable-debug-renderer-info',
+    'dom.w3c_pointer_events.enabled',
+    'ui.use_standins_for_native_colors',
+    /* section 4700 */
+    'general.useragent.override',
+    'general.buildID.override',
+    'general.appname.override',
+    'general.appversion.override',
+    'general.platform.override',
+    'general.oscpu.override',
+    /* reset parrot: check your open about:config after running the script */
+    '_user.js.parrot'
+  ]
+
+  if("undefined" === typeof(Services)) {
+    alert("about:config needs to be the active tab!");
+    return;
+  }
+  
+  let c = 0;
+  for (let i = 0, len = ops.length; i < len; i++) {
+    if (Services.prefs.prefHasUserValue(ops[i])) {   
+      Services.prefs.clearUserPref(ops[i]);
+      if (!Services.prefs.prefHasUserValue(ops[i])) {
+        console.log("reset", ops[i]);
+        c++;
+      } else { console.log("failed to reset", ops[i]); }
+    }
+  }
+  
+  focus();
+  
+  let d = (c==1) ? " pref" : " prefs";
+  if (c > 0) {
+    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
+  } else { alert("nothing to reset"); }
+  
+})();

From 2db76c95c3cb85a881308070691995c1b91d1205 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 23 Nov 2019 16:19:09 +0000
Subject: [PATCH 0483/1147] 1603: breaks icloud, closes #850

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 1ad591b..59a4e6f 100644
--- a/user.js
+++ b/user.js
@@ -806,7 +806,7 @@ user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
    // user_pref("network.http.referer.trimmingPolicy", 0); // [DEFAULT: 0]
 /* 1603: CROSS ORIGIN: control when to send a referer
  * 0=always (default), 1=only if base domains match, 2=only if hosts match
- * [SETUP-WEB] Known to cause issues with older modems/routers and some sites e.g vimeo ***/
+ * [SETUP-WEB] Known to cause issues with older modems/routers and some sites e.g vimeo, icloud ***/
 user_pref("network.http.referer.XOriginPolicy", 1);
 /* 1604: CROSS ORIGIN: control the amount of information to send [FF52+]
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/

From 19b392b83de90557334529db00abc4e0ea403770 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 24 Nov 2019 05:23:10 +0000
Subject: [PATCH 0484/1147] 70-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 59a4e6f..c7ba2de 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 20 September 2019
-* version 70-alpha: Pinpants Wizard
+* date: 24 November 2019
+* version 70-beta: Pinpants Wizard
 *   "Ever since I was a young pants, I've played the silver ball"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From fb263f5624dd4990a537ff351f70f3e4ed033bb9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 2 Dec 2019 23:04:09 +1300
Subject: [PATCH 0485/1147] favicons: 1031 better info, 1032 inactive #840
 (#851)

---
 user.js | 9 ++++++---
 1 file changed, 6 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index c7ba2de..e4bb922 100644
--- a/user.js
+++ b/user.js
@@ -619,11 +619,14 @@ user_pref("toolkit.winRegisterApplicationRestart", false);
  * profile/shortcutCache directory. The .ico remains after the shortcut is deleted.
  * If set to false then the shortcuts use a generic Firefox icon ***/
 user_pref("browser.shell.shortcutFavicons", false);
-/* 1031: disable favicons in tabs and new bookmarks
- * bookmark favicons are stored as data blobs in favicons.sqlite ***/
+/* 1031: disable favicons in history and bookmarks
+ * Stored as data blobs in favicons.sqlite, these don't reveal anything that your
+ * actual history (and bookmarks) already do. Your history is more detailed, so
+ * control that instead; e.g. disable history, clear history on close, use PB mode
+ * [NOTE] favicons.sqlite is sanitized on Firefox close, not in-session ***/
    // user_pref("browser.chrome.site_icons", false);
 /* 1032: disable favicons in web notifications ***/
-user_pref("alerts.showFavicons", false); // [DEFAULT: false]
+   // user_pref("alerts.showFavicons", false); // [DEFAULT: false]
 
 /*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
    Your cipher and other settings can be used in server side fingerprinting

From 560acfc94fc9e1dd57141be9f659f225b3c9c27c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 3 Dec 2019 07:31:47 +0000
Subject: [PATCH 0486/1147] 70 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index e4bb922..65a3cf6 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 24 November 2019
-* version 70-beta: Pinpants Wizard
+* date: 03 December 2019
+* version 70: Pinpants Wizard
 *   "Ever since I was a young pants, I've played the silver ball"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 884e84a4cbcb38c1589f2d3f7e87d9e44fb5d9f0 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 3 Dec 2019 14:44:59 +0000
Subject: [PATCH 0487/1147] about:config warning back to the top + active
 (#855)

---
 user.js | 11 +++++++----
 1 file changed, 7 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 65a3cf6..b5bdbe4 100644
--- a/user.js
+++ b/user.js
@@ -1,8 +1,8 @@
 /******
 * name: ghacks user.js
 * date: 03 December 2019
-* version 70: Pinpants Wizard
-*   "Ever since I was a young pants, I've played the silver ball"
+* version 71-alpha: Dancing Pants
+*   "Ooh-ooh, see that girl, watch that scene, dig in the dancing pants"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
@@ -83,6 +83,11 @@
  * [1] https://blog.mozilla.org/nnethercote/2018/03/09/a-new-preferences-parser-for-firefox/ ***/
 user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong with it?");
 
+/* 0000: disable about:config warning
+ * The XUL version can still be accessed in FF71+ @ chrome://global/content/config.xul ***/
+user_pref("general.warnOnAboutConfig", false); // for the XUL version
+user_pref("browser.aboutConfig.showWarning", false); // for the new HTML version [FF71+]
+
 /*** [SECTION 0100]: STARTUP ***/
 user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
 /* 0101: disable default browser check
@@ -1604,8 +1609,6 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("browser.tabs.warnOnOpen", false);
    // user_pref("full-screen-api.warning.delay", 0);
    // user_pref("full-screen-api.warning.timeout", 0);
-   // user_pref("general.warnOnAboutConfig", false);
-   // user_pref("browser.aboutConfig.showWarning", false); // [FF67+]
 /* APPEARANCE ***/
    // user_pref("browser.download.autohideButton", false); // [FF57+]
    // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]

From 3f6340b69c3ba9d924e55bc1ff40864ee6cbc53e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 3 Dec 2019 14:51:44 +0000
Subject: [PATCH 0488/1147] OMG!!

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index b5bdbe4..41771f9 100644
--- a/user.js
+++ b/user.js
@@ -1625,7 +1625,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [WINDOWS] [MAC]
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
    // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+, FF59 and under]
-/* UX: FEATURES: disable and hide the icons and menus ***/
+/* UX FEATURES: disable and hide the icons and menus ***/
    // user_pref("browser.messaging-system.whatsNewPanel.enabled", false); // What's New [FF69+]
    // user_pref("extensions.pocket.enabled", false); // Pocket Account [FF46+]
    // user_pref("identity.fxaccounts.enabled", false); // Firefox Accounts & Sync [FF60+] [RESTART]

From 42ea48401728350fbd605ec92ff230f423e69928 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 4 Dec 2019 14:13:49 +1300
Subject: [PATCH 0489/1147] 71 deprecated (#856)

---
 user.js | 20 +++++++++++++-------
 1 file changed, 13 insertions(+), 7 deletions(-)

diff --git a/user.js b/user.js
index 41771f9..c01cd5b 100644
--- a/user.js
+++ b/user.js
@@ -1125,11 +1125,9 @@ user_pref("browser.uitour.url", "");
  * [SETTING] Devtools>Advanced Settings>Enable browser chrome and add-on debugging toolboxes
  * [1] https://github.com/pyllyukko/user.js/issues/179#issuecomment-246468676 ***/
 user_pref("devtools.chrome.enabled", false);
-/* 2608: disable WebIDE to prevent remote debugging and ADB extension download
+/* 2608: disable remote debugging
  * [1] https://trac.torproject.org/projects/tor/ticket/16222 ***/
 user_pref("devtools.debugger.remote-enabled", false);
-user_pref("devtools.webide.enabled", false); // [DEFAULT: false FF70+]
-user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
 /* 2609: disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
  * [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#misc
  * [1] https://bugzilla.mozilla.org/1173199 ***/
@@ -1267,10 +1265,6 @@ user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
 user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
 /* 2730: disable offline cache ***/
 user_pref("browser.cache.offline.enable", false);
-/* 2731: enforce websites to ask to store data for offline use
- * [1] https://support.mozilla.org/questions/1098540
- * [2] https://bugzilla.mozilla.org/959985 ***/
-user_pref("offline-apps.allow_by_default", false);
 /* 2740: disable service worker cache and cache storage
  * [NOTE] We clear service worker cache on exiting Firefox (see 2803)
  * [1] https://w3c.github.io/ServiceWorker/#privacy ***/
@@ -1777,6 +1771,18 @@ user_pref("plugins.click_to_play", true); // [DEFAULT: true FF25+]
    // [-] https://bugzilla.mozilla.org/1562331
    // user_pref("media.autoplay.allow-muted", false);
 // * * * /
+// FF71
+// 2608: disable WebIDE and ADB extension download
+   // [1] https://trac.torproject.org/projects/tor/ticket/16222
+   // [-] https://bugzilla.mozilla.org/1539462
+user_pref("devtools.webide.enabled", false); // [DEFAULT: false FF70+]
+user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
+// 2731: enforce websites to ask to store data for offline use
+   // [1] https://support.mozilla.org/questions/1098540
+   // [2] https://bugzilla.mozilla.org/959985
+   // [-] https://bugzilla.mozilla.org/1574480
+user_pref("offline-apps.allow_by_default", false);
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 97043b0ce15fd8fbcc16343bdce235c8fc824fc3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 6 Dec 2019 12:19:21 +0000
Subject: [PATCH 0490/1147] 71-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index c01cd5b..9f74ed7 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 03 December 2019
-* version 71-alpha: Dancing Pants
+* date: 06 December 2019
+* version 71-beta: Dancing Pants
 *   "Ooh-ooh, see that girl, watch that scene, dig in the dancing pants"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From 4074a37e1d3a2492e0fd28bcc9289b8b88e94b58 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sat, 7 Dec 2019 18:26:39 +0000
Subject: [PATCH 0491/1147] 1201 + 1270 update (#859)

trim by a line, remove extra space, fixup on red, indicate it only applies if 1201 is false
---
 user.js | 17 +++++++++++++----
 1 file changed, 13 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 9f74ed7..e3bed20 100644
--- a/user.js
+++ b/user.js
@@ -640,8 +640,15 @@ user_pref("browser.shell.shortcutFavicons", false);
 ***/
 user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
 /** SSL (Secure Sockets Layer) / TLS (Transport Layer Security) ***/
-/* 1201: disable old SSL/TLS "insecure" negotiation (vulnerable to a MiTM attack)
- * [1] https://wiki.mozilla.org/Security:Renegotiation ***/
+/* 1201: require safe negotiation
+ * Blocks connections to servers that don't support RFC 5746 [2] as they're potentially
+ * vulnerable to a MiTM attack [3]. A server *without* RFC 5746 can be safe from the attack
+ * if it disables renegotiations but the problem is that the browser can't know that.
+ * Setting this pref to true is the only way for the browser to ensure there will be
+ * no unsafe renegotiations on the channel between the browser and the server.
+ * [1] https://wiki.mozilla.org/Security:Renegotiation
+ * [2] https://tools.ietf.org/html/rfc5746
+ * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 ***/
 user_pref("security.ssl.require_safe_negotiation", true);
 /* 1202: control TLS versions with min and max
  * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
@@ -747,8 +754,10 @@ user_pref("security.mixed_content.block_object_subrequest", true);
    // user_pref("security.ssl3.rsa_aes_256_sha", false);
 
 /** UI (User Interface) ***/
-/* 1270: display warning (red padlock) for "broken security" (see 1201)
- * [1] https://wiki.mozilla.org/Security:Renegotiation ***/
+/* 1270: display warning on the padlock for "broken security" (if 1201 is false)
+ * Bug: warning padlock not indicated for subresources on a secure page! [2]
+ * [1] https://wiki.mozilla.org/Security:Renegotiation
+ * [2] https://bugzilla.mozilla.org/1353705 ***/
 user_pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
 /* 1271: control "Add Security Exception" dialog on SSL warnings
  * 0=do neither 1=pre-populate url 2=pre-populate url + pre-fetch cert (default)

From 30daf8640c3eea528a53eb0dff2ddfc684ce591f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 9 Dec 2019 20:18:42 +0000
Subject: [PATCH 0492/1147] FPI stuff

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index e3bed20..3498983 100644
--- a/user.js
+++ b/user.js
@@ -1361,7 +1361,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1542309 - isolate top-level domain URLs when host is in the public suffix list (FF68+)
  ** 1506693 - isolate pdfjs range-based requests (FF68+)
  ** 1330467 - isolate site permissions (FF69+)
- ** 1534339 - isolate IPv6 (coming soon)
+ ** 1534339 - isolate IPv6 (FF73+)
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]

From df1732745d84b1f7b163d6345fc66db4bb31402b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 10 Dec 2019 22:07:23 +0000
Subject: [PATCH 0493/1147] 0308: seach engine updates: better info #840

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 3498983..5ffeea4 100644
--- a/user.js
+++ b/user.js
@@ -208,7 +208,8 @@ user_pref("app.update.auto", false);
  * used when installing/updating an extension, and in daily background update checks: if false, it
  * hides the expanded text description (if it exists) when you "show more details about an addon" ***/
    // user_pref("extensions.getAddons.cache.enabled", false);
-/* 0308: disable search update
+/* 0308: disable search engine updates (e.g. OpenSearch)
+ * [NOTE] This does not affect Mozilla's built-in or Web Extension search engines
  * [SETTING] General>Firefox Updates>Automatically update search engines ***/
 user_pref("browser.search.update", false);
 /* 0309: disable sending Flash crash reports ***/

From 5672bc8cc8a978eed39e39b009cb909882ce4db0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 12 Dec 2019 01:21:17 +0000
Subject: [PATCH 0494/1147] 2032 removed, 4002 inactive, closes #840

---
 user.js | 5 +----
 1 file changed, 1 insertion(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 5ffeea4..ddbb1b5 100644
--- a/user.js
+++ b/user.js
@@ -936,9 +936,6 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
    // user_pref("media.autoplay.default", 5);
 /* 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] ***/
 user_pref("media.autoplay.enabled.user-gestures-needed", false);
-/* 2032: disable autoplay of HTML5 media in non-active tabs [FF51+]
- * [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ ***/
-user_pref("media.block-autoplay-until-in-foreground", true); // [DEFAULT: true]
 
 /*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/
 user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
@@ -1377,7 +1374,7 @@ user_pref("privacy.firstparty.isolate", true);
  * [1] https://bugzilla.mozilla.org/1319773#c22
  * [2] https://bugzilla.mozilla.org/1492607
  * [3] https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage ***/
-user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAULT: true]
+   // user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAULT: true]
    // user_pref("privacy.firstparty.isolate.block_post_message", true); // [HIDDEN PREF ESR]
 
 /*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)

From 1ef62a1036ea4d37476aa09f164e82be0d82c9b5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 12 Dec 2019 01:24:12 +0000
Subject: [PATCH 0495/1147] media.block-autoplay-until-in-foreground #840

---
 scratchpad-scripts/ghacks-clear-[removed].js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 3a889fd..71f3c8a 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 11-November-2019
+ Last updated: 11-December-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -215,6 +215,8 @@
     'security.insecure_connection_icon.pbmode.enabled',
     'security.insecure_connection_text.pbmode.enabled',
     'webgl.dxgl.enabled',
+    /* 71-beta */
+    'media.block-autoplay-until-in-foreground',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 9c02949e04498c6cb677ae5710737d1451fb16af Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 17 Dec 2019 15:00:34 +0000
Subject: [PATCH 0496/1147] 0000: config.xhtml in FF73+ (#865)

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index ddbb1b5..b0c0c99 100644
--- a/user.js
+++ b/user.js
@@ -84,7 +84,8 @@
 user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong with it?");
 
 /* 0000: disable about:config warning
- * The XUL version can still be accessed in FF71+ @ chrome://global/content/config.xul ***/
+ * The XUL version can still be accessed in FF71+ @ chrome://global/content/config.xul
+ * and in FF73+ @ chrome://global/content/config.xhtml ***/
 user_pref("general.warnOnAboutConfig", false); // for the XUL version
 user_pref("browser.aboutConfig.showWarning", false); // for the new HTML version [FF71+]
 

From cd07641a9daf05d523ee239c5cc8e07de2a1e572 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 18 Dec 2019 05:02:25 +0000
Subject: [PATCH 0497/1147] 2701: make sure cookieBehavior is always honored
 (#866)

see #862
---
 user.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index b0c0c99..2bb7809 100644
--- a/user.js
+++ b/user.js
@@ -1245,8 +1245,10 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * 0=Accept cookies and site data, 1=(Block) All third-party cookies, 2=(Block) All cookies,
  * 3=(Block) Cookies from unvisited websites, 4=(Block) Cross-site and social media trackers (FF63+) (default FF69+)
  * [NOTE] You can set exceptions under site permissions or use an extension
- * [SETTING] Privacy & Security>Content Blocking>Custom>Choose what to block>Cookies ***/
+ * [NOTE] Enforcing category to custom ensures ETP related prefs are always honored
+ * [SETTING] Privacy & Security>Enhanced Tracking Protection>Custom>Choose what to block>Cookies ***/
 user_pref("network.cookie.cookieBehavior", 1);
+user_pref("browser.contentblocking.category", "custom");
 /* 2702: set third-party cookies (i.e ALL) (if enabled, see 2701) to session-only
    and (FF58+) set third-party non-secure (i.e HTTP) cookies to session-only
    [NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and

From a1cdbc8324afddaad2ab49e478f7b72a49f21a8d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 18 Dec 2019 07:46:44 +0000
Subject: [PATCH 0498/1147] 1408 graphite, closes #1408 and 2619 puncyode

---
 user.js | 11 ++++++-----
 1 file changed, 6 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 2bb7809..cd542f9 100644
--- a/user.js
+++ b/user.js
@@ -789,9 +789,10 @@ user_pref("browser.display.use_document_fonts", 0);
 /* 1404: disable rendering of SVG OpenType fonts
  * [1] https://wiki.mozilla.org/SVGOpenTypeFonts - iSECPartnersReport recommends to disable this ***/
 user_pref("gfx.font_rendering.opentype_svg.enabled", false);
-/* 1408: disable graphite which FF49 turned back on by default
- * In the past it had security issues. Update: This continues to be the case, see [1]
- * [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778 ***/
+/* 1408: disable graphite
+ * Graphite has had many critical security issues in the past, see [1]
+ * [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778
+ * [2] https://en.wikipedia.org/wiki/Graphite_(SIL) ***/
 user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
  * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed.
@@ -1162,8 +1163,8 @@ user_pref("permissions.manager.defaultsUrl", "");
 /* 2617: remove webchannel whitelist ***/
 user_pref("webchannel.allowObject.urlWhitelist", "");
 /* 2619: enforce Punycode for Internationalized Domain Names to eliminate possible spoofing
- * Firefox has *some* protections, but it is better to be safe than sorry. The downside: it will also
- * display legitimate IDN's punycoded, which might be undesirable for users of non-latin alphabets
+ * Firefox has *some* protections, but it is better to be safe than sorry
+ * [SETUP-WEB] Might be undesirable for non-latin alphabet users since legitimate IDN's are also punycoded
  * [TEST] https://www.xn--80ak6aa92e.com/ (www.apple.com)
  * [1] https://wiki.mozilla.org/IDN_Display_Algorithm
  * [2] https://en.wikipedia.org/wiki/IDN_homograph_attack

From f9146fdf24bd168fa8dc7f1b9a1df1ee4c34f0b4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 18 Dec 2019 09:46:21 +0000
Subject: [PATCH 0499/1147] update setting tags, minor tweaks

---
 user.js | 33 +++++++++++++++++----------------
 1 file changed, 17 insertions(+), 16 deletions(-)

diff --git a/user.js b/user.js
index cd542f9..2613657 100644
--- a/user.js
+++ b/user.js
@@ -200,7 +200,7 @@ user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the
    // user_pref("extensions.update.enabled", false);
 /* 0302a: disable auto-INSTALLING Firefox updates [NON-WINDOWS FF65+]
  * [NOTE] In FF65+ on Windows this SETTING (below) is now stored in a file and the pref was removed
- * [SETTING] General>Firefox Updates>Check for updates but let you choose... ***/
+ * [SETTING] General>Firefox Updates>Check for updates but let you choose to install them ***/
 user_pref("app.update.auto", false);
 /* 0302b: disable auto-INSTALLING extension and theme updates (after the check in 0301b)
  * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
@@ -257,7 +257,7 @@ user_pref("datareporting.policy.dataSubmissionEnabled", false);
 user_pref("app.shield.optoutstudies.enabled", false);
 /* 0343: disable personalized Extension Recommendations in about:addons and AMO [FF65+]
  * [NOTE] This pref has no effect when Health Reports (0340) are disabled
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>...>Allow Firefox to make personalized extension rec.
+ * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to make personalized extension recommendations
  * [1] https://support.mozilla.org/kb/personalized-extension-recommendations ***/
 user_pref("browser.discovery.enabled", false);
 /* 0350: disable Crash Reports ***/
@@ -361,7 +361,6 @@ user_pref("browser.ping-centre.telemetry", false);
 /* 0517: disable Form Autofill
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
- * [SETTING] Privacy & Security>Forms & Passwords>Autofill addresses
  * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill
  * [2] https://www.ghacks.net/2017/05/24/firefoxs-new-form-autofill-is-awesome/ ***/
 user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
@@ -411,7 +410,7 @@ user_pref("network.dns.disableIPv6", true);
  * HTTP2 raises concerns with "multiplexing" and "server push", does nothing to
  * enhance privacy, and opens up a number of server-side fingerprinting opportunities.
  * [WARNING] Disabling this made sense in the past, and doesn't break anything, but HTTP2 is
- * at 35% (April 2019) and growing [5]. Don't be that one person using HTTP1.1 on HTTP2 sites
+ * at 40% (December 2019) and growing [5]. Don't be that one person using HTTP1.1 on HTTP2 sites
  * [1] https://http2.github.io/faq/
  * [2] https://blog.scottlogic.com/2014/11/07/http-2-a-quick-look.html
  * [3] https://http2.github.io/http2-spec/#rfc.section.10.8
@@ -518,11 +517,12 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
 /* 0850e: disable location bar one-off searches [FF51+]
  * [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/ ***/
    // user_pref("browser.urlbar.oneOffSearches", false);
-/* 0860: disable search and form history [SETUP-WEB]
- * [WARNING] Autocomplete form data is still (in April 2019) easily read by third parties, see [1]
- * [NOTE] We also clear formdata on exiting Firefox (see 2803)
+/* 0860: disable search and form history
+ * [SETUP-WEB] Be aware thet autocomplete form data can be read by third parties, see [1] [2]
+ * [NOTE] We also clear formdata on exit (see 2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
- * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html ***/
+ * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
+ * [2] https://bugzilla.mozilla.org/381681 ***/
 user_pref("browser.formfill.enable", false);
 /* 0862: disable browsing and download history
  * [NOTE] We also clear history and downloads on exiting Firefox (see 2803)
@@ -540,11 +540,11 @@ user_pref("browser.taskbar.previews.enable", false);
 user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
 /* 0901: disable saving passwords
  * [NOTE] This does not clear any passwords already saved
- * [SETTING] Privacy & Security>Forms & Passwords>Ask to save logins and passwords for websites ***/
+ * [SETTING] Privacy & Security>Logins and Passwords>Ask to save logins and passwords for websites ***/
    // user_pref("signon.rememberSignons", false);
-/* 0902: use a master password (recommended if you save passwords)
+/* 0902: use a master password
  * There are no preferences for this. It is all handled internally.
- * [SETTING] Privacy & Security>Forms & Passwords>Use a master password
+ * [SETTING] Privacy & Security>Logins and Passwords>Use a master password
  * [1] https://support.mozilla.org/kb/use-master-password-protect-stored-logins ***/
 /* 0903: set how often Firefox should ask for the master password
  * 0=the first time (default), 1=every time it's needed, 2=every n minutes (see 0904) ***/
@@ -554,7 +554,8 @@ user_pref("security.ask_for_password", 2);
 user_pref("security.password_lifetime", 5);
 /* 0905: disable auto-filling username & password form fields
  * can leak in cross-site forms *and* be spoofed
- * [NOTE] Username & password is still available when you enter the field ***/
+ * [NOTE] Username & password is still available when you enter the field
+ * [SETTING] Privacy & Security>Logins and Passwords>Autofill logins and passwords ***/
 user_pref("signon.autofillForms", false);
 /* 0909: disable formless login capture for Password Manager [FF51+] ***/
 user_pref("signon.formlessCapture.enabled", false);
@@ -723,7 +724,7 @@ user_pref("security.family_safety.mode", 0);
    // user_pref("security.nocertdb", true); // [HIDDEN PREF]
 /* 1223: enforce strict pinning
  * PKP (Public Key Pinning) 0=disabled 1=allow user MiTM (such as your antivirus), 2=strict
- * [WARNING] If you rely on an AV (antivirus) to protect your web browsing
+ * [SETUP-WEB] If you rely on an AV (antivirus) to protect your web browsing
  * by inspecting ALL your web traffic, then leave at current default=1
  * [1] https://trac.torproject.org/projects/tor/ticket/16206 ***/
 user_pref("security.cert_pinning.enforcement_level", 2);
@@ -849,8 +850,8 @@ user_pref("network.http.referer.XOriginTrimmingPolicy", 0); // [DEFAULT: 0]
  * [1] https://bugzilla.mozilla.org/1305144 ***/
 user_pref("network.http.referer.hideOnionSource", true);
 /* 1610: ALL: enable the DNT (Do Not Track) HTTP header
- * [NOTE] DNT is enforced with Tracking Protection regardless of this pref
- * [SETTING] Privacy & Security>Content Blocking>Send websites a "Do Not Track"... ***/
+ * [NOTE] DNT is enforced with Enhanced Tracking Protection regardless of this pref
+ * [SETTING] Privacy & Security>Enhanced Tracking Protection>Send websites a "Do Not Track" signal... ***/
 user_pref("privacy.donottrackheader.enabled", true);
 
 /*** [SECTION 1700]: CONTAINERS
@@ -1247,7 +1248,7 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * 3=(Block) Cookies from unvisited websites, 4=(Block) Cross-site and social media trackers (FF63+) (default FF69+)
  * [NOTE] You can set exceptions under site permissions or use an extension
  * [NOTE] Enforcing category to custom ensures ETP related prefs are always honored
- * [SETTING] Privacy & Security>Enhanced Tracking Protection>Custom>Choose what to block>Cookies ***/
+ * [SETTING] Privacy & Security>Enhanced Tracking Protection>Custom>Cookies ***/
 user_pref("network.cookie.cookieBehavior", 1);
 user_pref("browser.contentblocking.category", "custom");
 /* 2702: set third-party cookies (i.e ALL) (if enabled, see 2701) to session-only

From 34cfcedc1b0dd0d24e2a2a5d8b80bc318795d0b5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 19 Dec 2019 16:19:39 +0000
Subject: [PATCH 0500/1147] 2402+2403, finally closes #735

---
 user.js | 14 ++++++--------
 1 file changed, 6 insertions(+), 8 deletions(-)

diff --git a/user.js b/user.js
index 2613657..2b8a778 100644
--- a/user.js
+++ b/user.js
@@ -1030,14 +1030,12 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
    // user_pref("dom.event.contextmenu.enabled", false);
 /* 2402: disable website access to clipboard events/content
  * [SETUP-WEB] This will break some sites functionality such as pasting into facebook, wordpress
- * this applies to onCut, onCopy, onPaste events - i.e. you have to interact with
- * the website for it to look at the clipboard
- * [1] https://www.ghacks.net/2014/01/08/block-websites-reading-modifying-clipboard-contents-firefox/ ***/
+ * This applies to onCut/onCopy/onPaste events - i.e. it requires interaction with the website
+ * [WARNING] If both 'middlemouse.paste' and 'general.autoScroll' are true (at least one
+ * is default false) then enabling this pref can leak clipboard content, see [2]
+ * [1] https://www.ghacks.net/2014/01/08/block-websites-reading-modifying-clipboard-contents-firefox/
+ * [2] https://bugzilla.mozilla.org/1528289 */
 user_pref("dom.event.clipboardevents.enabled", false);
-/* 2403: disable middlemouse paste leaking clipboard content on Linux after autoscroll
- * Defense in depth if clipboard events are enabled (see 2402)
- * [1] https://bugzilla.mozilla.org/1528289 */
-user_pref("middlemouse.paste", false); // [DEFAULT: false on Windows]
 /* 2404: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
  * this disables document.execCommand("cut"/"copy") to protect your clipboard
  * [1] https://bugzilla.mozilla.org/1170911 ***/
@@ -1628,7 +1626,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("browser.tabs.closeWindowWithLastTab", false);
    // user_pref("browser.tabs.loadBookmarksInTabs", true); // open bookmarks in a new tab [FF57+]
    // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see bugzilla 1320061 [FF53+]
-   // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [WINDOWS] [MAC]
+   // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [DEFAULT: false on Linux]
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
    // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+, FF59 and under]
 /* UX FEATURES: disable and hide the icons and menus ***/

From 5b1d56933ba921ea0fee85fd46e355c484d70b87 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 19 Dec 2019 16:21:21 +0000
Subject: [PATCH 0501/1147] middlemouse.paste, see #735

---
 scratchpad-scripts/ghacks-clear-[removed].js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index 71f3c8a..ab22f90 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 11-December-2019
+ Last updated: 19-December-2019
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -217,6 +217,7 @@
     'webgl.dxgl.enabled',
     /* 71-beta */
     'media.block-autoplay-until-in-foreground',
+    'middlemouse.paste',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 07c128a1907380f3706eba4daa0f6551491a429b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 19 Dec 2019 16:31:51 +0000
Subject: [PATCH 0502/1147] 71 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 2b8a778..dd066d8 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 06 December 2019
-* version 71-beta: Dancing Pants
+* date: 19 December 2019
+* version 71: Dancing Pants
 *   "Ooh-ooh, see that girl, watch that scene, dig in the dancing pants"
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js

From ed60588473f887c6a1c33c57ca6a803d6b99f583 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 19 Dec 2019 16:34:44 +0000
Subject: [PATCH 0503/1147] 72-alpha start

---
 user.js | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/user.js b/user.js
index dd066d8..d1594f8 100644
--- a/user.js
+++ b/user.js
@@ -1,8 +1,7 @@
 /******
 * name: ghacks user.js
 * date: 19 December 2019
-* version 71: Dancing Pants
-*   "Ooh-ooh, see that girl, watch that scene, dig in the dancing pants"
+* version 72-alpha
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 79d316fd2299ef4c724bc5354d5a35b0a50eabf7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 19 Dec 2019 16:37:19 +0000
Subject: [PATCH 0504/1147] remove old deprecations

---
 user.js | 121 +-------------------------------------------------------
 1 file changed, 1 insertion(+), 120 deletions(-)

diff --git a/user.js b/user.js
index d1594f8..f23aec4 100644
--- a/user.js
+++ b/user.js
@@ -1643,130 +1643,11 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
-     Documentation denoted as [-]. Items deprecated prior to FF61 have been archived at [1], which
+     Documentation denoted as [-]. Items deprecated prior to FF68 have been archived at [1], which
      also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
      [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/123
 ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
-/* FF61
-// 0501: disable experiments
-   // [1] https://wiki.mozilla.org/Telemetry/Experiments
-   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1420908,1450801
-user_pref("experiments.enabled", false);
-user_pref("experiments.manifest.uri", "");
-user_pref("experiments.supported", false);
-user_pref("experiments.activeExperiment", false);
-// 2612: disable remote JAR files being opened, regardless of content type [FF42+]
-   // [1] https://bugzilla.mozilla.org/1173171
-   // [2] https://www.fxsitecompat.com/en-CA/docs/2015/jar-protocol-support-has-been-disabled-by-default/
-   // [-] https://bugzilla.mozilla.org/1427726
-user_pref("network.jar.block-remote-files", true);
-// 2613: disable JAR from opening Unsafe File Types
-   // [-] https://bugzilla.mozilla.org/1427726
-user_pref("network.jar.open-unsafe-types", false);
-// ***/
-/* FF62
-// 1803: disable Java plugin
-   // [-] (part5) https://bugzilla.mozilla.org/1461243
-user_pref("plugin.state.java", 0);
-// ***/
-/* FF63
-// 0205: disable GeoIP-based search results
-   // [NOTE] May not be hidden if Firefox has changed your settings due to your locale
-   // [-] https://bugzilla.mozilla.org/1462015
-user_pref("browser.search.countryCode", "US"); // [HIDDEN PREF]
-// 0301a: disable auto-update checks for Firefox
-   // [SETTING] General>Firefox Updates>Never check for updates
-   // [-] https://bugzilla.mozilla.org/1420514
-   // user_pref("app.update.enabled", false);
-// 0503: disable "Savant" Shield study [FF61+]
-   // [-] https://bugzilla.mozilla.org/1457226
-user_pref("shield.savant.enabled", false);
-// 1031: disable favicons in tabs and new bookmarks - merged into browser.chrome.site_icons
-   // [-] https://bugzilla.mozilla.org/1453751
-   // user_pref("browser.chrome.favicons", false);
-// 2030: disable autoplay of HTML5 media - replaced by media.autoplay.default
-   // This may break video playback on various sites
-   // [-] https://bugzilla.mozilla.org/1470082
-user_pref("media.autoplay.enabled", false);
-// 2704: set cookie lifetime in days (see 2703)
-   // [-] https://bugzilla.mozilla.org/1457170
-   // user_pref("network.cookie.lifetime.days", 90); // [DEFAULT: 90]
-// 5000's: enable "Ctrl+Tab cycles through tabs in recently used order" - replaced by browser.ctrlTab.recentlyUsedOrder
-   // [-] https://bugzilla.mozilla.org/1473595
-   // user_pref("browser.ctrlTab.previews", true);
-// ***/
-/* FF64
-// 0516: disable Onboarding [FF55+]
-   // Onboarding is an interactive tour/setup for new installs/profiles and features. Every time
-   // about:home or about:newtab is opened, the onboarding overlay is injected into that page
-   // [NOTE] Onboarding uses Google Analytics [2], and leaks resource://URIs [3]
-   // [1] https://wiki.mozilla.org/Firefox/Onboarding
-   // [2] https://github.com/mozilla/onboard/commit/db4d6c8726c89a5d6a241c1b1065827b525c5baf
-   // [3] https://bugzilla.mozilla.org/863246#c154
-   // [-] https://bugzilla.mozilla.org/1462415
-user_pref("browser.onboarding.enabled", false);
-// 2608: disable WebIDE ADB extension downloads - both renamed
-   // [1] https://trac.torproject.org/projects/tor/ticket/16222
-   // [-] https://bugzilla.mozilla.org/1491315
-user_pref("devtools.webide.autoinstallADBHelper", false);
-user_pref("devtools.webide.adbAddonURL", "");
-// 2681: disable CSP violation events [FF59+]
-   // [1] https://developer.mozilla.org/docs/Web/API/SecurityPolicyViolationEvent
-   // [-] https://bugzilla.mozilla.org/1488165
-user_pref("security.csp.enable_violation_events", false);
-// ***/
-/* FF65
-// 0850a: disable location bar autocomplete and suggestion types
-   // If you enforce any of the suggestion types (see the other 0850a), you MUST enforce 'autocomplete'
-   //   - If *ALL* of the suggestion types are false, 'autocomplete' must also be false
-   //   - If *ANY* of the suggestion types are true, 'autocomplete' must also be true
-   // [-] https://bugzilla.mozilla.org/1502392
-user_pref("browser.urlbar.autocomplete.enabled", false);
-// 0908: remove user & password info when attempting to fix an entered URL (i.e. 0802 is true)
-   // e.g. //user:password@foo -> //user@(prefix)foo(suffix) NOT //user:password@(prefix)foo(suffix)
-   // [-] https://bugzilla.mozilla.org/1510580
-user_pref("browser.fixup.hide_user_pass", true); // [DEFAULT: true]
-// ***/
-/* FF66
-// 0380: disable Browser Error Reporter [FF60+]
-   // [1] https://support.mozilla.org/en-US/kb/firefox-nightly-error-collection
-   // [2] https://firefox-source-docs.mozilla.org/browser/browser/BrowserErrorReporter.html
-   // [-] https://bugzilla.mozilla.org/1509888
-user_pref("browser.chrome.errorReporter.enabled", false);
-user_pref("browser.chrome.errorReporter.submitUrl", "");
-// 0502: disable Mozilla permission to silently opt you into tests
-   // [-] https://bugzilla.mozilla.org/1415625
-user_pref("network.allow-experiments", false);
-// ***/
-/* FF67
-// 2428: enforce DOMHighResTimeStamp API
-   // [WARNING] Required for normalization of timestamps and any timer resolution mitigations
-   // [-] https://bugzilla.mozilla.org/1485264
-user_pref("dom.event.highrestimestamp.enabled", true); // [DEFAULT: true]
-// 5000's: disable CFR [FF64+] - split into two new prefs: *cfr.addons, *cfr.features
-   // [SETTING] General>Browsing>Recommend extensions as you browse
-   // [1] https://support.mozilla.org/en-US/kb/extension-recommendations
-   // [-] https://bugzilla.mozilla.org/1528953
-   // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false);
-// ***/
-/* FF68
-// 0105b: disable Activity Stream Legacy Snippets
-   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1546190,1540939
-user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
-user_pref("browser.aboutHomeSnippets.updateUrl", "");
-// 0307: disable auto updating of lightweight themes (LWT)
-   // Not to be confused with themes in 0301* + 0302*, which use the FF55+ Theme API
-   // Mozilla plan to convert existing LWTs and remove LWT support in the future, see [1]
-   // [1] https://blog.mozilla.org/addons/2018/09/20/future-themes-here/
-   // [-] (part3b) https://bugzilla.mozilla.org/1525762
-user_pref("lightweightThemes.update.enabled", false);
-// 2682: enable CSP 1.1 experimental hash-source directive [FF29+]
-   // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=855326,883975
-   // [-] https://bugzilla.mozilla.org/1386214
-user_pref("security.csp.experimentalEnabled", true);
-// ***/
-
 /* ESR68.x still uses all the following prefs
 // [NOTE] replace the * with a slash in the line above to re-enable them
 // FF69

From ef293b57a7696fc044de395407a8c67f372d7617 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 22 Dec 2019 06:14:25 +0000
Subject: [PATCH 0505/1147] 5000s: add ui.systemUsesDarkTheme

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index f23aec4..27b22a3 100644
--- a/user.js
+++ b/user.js
@@ -1616,6 +1616,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("browser.download.autohideButton", false); // [FF57+]
    // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
    // user_pref("toolkit.legacyUserProfileCustomizations.stylesheets", true); // [FF68+] allow userChrome/userContent
+   // user_pref("ui.systemUsesDarkTheme", 1); // [[FF67+] override OS: 0=light, 1=dark
 /* CONTENT BEHAVIOR ***/
    // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
    // user_pref("clipboard.autocopy", false); // disable autocopy default [LINUX]

From 85273d0f19e6314f69f323d581b46e00392167be Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 22 Dec 2019 07:13:48 +0000
Subject: [PATCH 0506/1147] 0517: setting tag

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 27b22a3..58d5b31 100644
--- a/user.js
+++ b/user.js
@@ -360,6 +360,7 @@ user_pref("browser.ping-centre.telemetry", false);
 /* 0517: disable Form Autofill
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
+ * [SETTING] Options>Privacy&Security>Forms and Autofill>Autofill addresses (FF73+)
  * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill
  * [2] https://www.ghacks.net/2017/05/24/firefoxs-new-form-autofill-is-awesome/ ***/
 user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]

From 315de066ecee8501853f045926a622c3fe5f750e Mon Sep 17 00:00:00 2001
From: rusty-snake <print_hello_world+Public@protonmail.com>
Date: Tue, 24 Dec 2019 11:49:19 +0000
Subject: [PATCH 0507/1147] typo (#870)

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 58d5b31..ca6dc62 100644
--- a/user.js
+++ b/user.js
@@ -1617,7 +1617,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("browser.download.autohideButton", false); // [FF57+]
    // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
    // user_pref("toolkit.legacyUserProfileCustomizations.stylesheets", true); // [FF68+] allow userChrome/userContent
-   // user_pref("ui.systemUsesDarkTheme", 1); // [[FF67+] override OS: 0=light, 1=dark
+   // user_pref("ui.systemUsesDarkTheme", 1); // [FF67+] override OS: 0=light, 1=dark
 /* CONTENT BEHAVIOR ***/
    // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
    // user_pref("clipboard.autocopy", false); // disable autocopy default [LINUX]

From 18ad40a5c603f176a4f835cb72b89a3cc33255a7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 25 Dec 2019 02:14:49 +0000
Subject: [PATCH 0508/1147] systemUsesDarkTheme -> RFP Alts

---
 user.js | 6 ++++--
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index ca6dc62..17413cf 100644
--- a/user.js
+++ b/user.js
@@ -1439,7 +1439,7 @@ user_pref("privacy.firstparty.isolate", true);
       FF65: pointerEvent.pointerid (1492766)
  ** 1485266 - disable exposure of system colors to CSS or canvas (see 4615) (FF67+)
  ** 1407366 - enable inner window letterboxing (see 4504) (FF67+)
- ** 1540726 - return "light" with prefers-color-scheme (FF67+)
+ ** 1540726 - return "light" with prefers-color-scheme (see 4616) (FF67+)
       [1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
  ** 1564422 - spoof audioContext outputLatency (FF70+)
  ** 1595823 - spoof audioContext sampleRate (FF72+)
@@ -1569,6 +1569,9 @@ user_pref("dom.w3c_pointer_events.enabled", false);
   // [SETUP-CHROME] Might affect CSS in themes and extensions
   // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876
 user_pref("ui.use_standins_for_native_colors", true);
+// 4616: enforce prefers-color-scheme as light [FF67+]
+  // 0=light, 1=dark : This overrides your OS value
+user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
 // * * * /
 // ***/
 
@@ -1617,7 +1620,6 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("browser.download.autohideButton", false); // [FF57+]
    // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
    // user_pref("toolkit.legacyUserProfileCustomizations.stylesheets", true); // [FF68+] allow userChrome/userContent
-   // user_pref("ui.systemUsesDarkTheme", 1); // [FF67+] override OS: 0=light, 1=dark
 /* CONTENT BEHAVIOR ***/
    // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
    // user_pref("clipboard.autocopy", false); // disable autocopy default [LINUX]

From e431b324c8433117c90e3e5d72eed258bc54d613 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 8 Jan 2020 02:53:25 +0000
Subject: [PATCH 0509/1147] FF72 deprecated

---
 user.js | 27 +++++++++++++++++----------
 1 file changed, 17 insertions(+), 10 deletions(-)

diff --git a/user.js b/user.js
index 17413cf..aaddac3 100644
--- a/user.js
+++ b/user.js
@@ -113,7 +113,6 @@ user_pref("browser.newtab.preload", false);
 /* 0105a: disable Activity Stream telemetry ***/
 user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
 user_pref("browser.newtabpage.activity-stream.telemetry", false);
-user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
 /* 0105b: disable Activity Stream Snippets
  * Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
  * [1] https://abouthome-snippets-service.readthedocs.io/ ***/
@@ -238,7 +237,6 @@ user_pref("toolkit.telemetry.shutdownPingSender.enabled", false); // [FF55+]
 user_pref("toolkit.telemetry.updatePing.enabled", false); // [FF56+]
 user_pref("toolkit.telemetry.bhrPing.enabled", false); // [FF57+] Background Hang Reporter
 user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // [FF57+]
-user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+]
 /* 0331: disable Telemetry Coverage
  * [1] https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/ ***/
 user_pref("toolkit.telemetry.coverage.opt-out", true); // [HIDDEN PREF]
@@ -1265,14 +1263,6 @@ user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
  * [WARNING] This will break a LOT of sites' functionality AND extensions!
  * You are better off using an extension for more granular control ***/
    // user_pref("dom.storage.enabled", false);
-/* 2720: enforce IndexedDB (IDB) as enabled
- * IDB is required for extensions and Firefox internals (even before FF63 in [1])
- * To control *website* IDB data, control allowing cookies and service workers, or use
- * Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize
- * on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically
- * via an extension. Note that IDB currently cannot be sanitized by host.
- * [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/ ***/
-user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
 /* 2730: disable offline cache ***/
 user_pref("browser.cache.offline.enable", false);
 /* 2740: disable service worker cache and cache storage
@@ -1677,6 +1667,23 @@ user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
    // [-] https://bugzilla.mozilla.org/1574480
 user_pref("offline-apps.allow_by_default", false);
 // * * * /
+// FF72
+// 0105a: disable Activity Stream telemetry
+   // [-] https://bugzilla.mozilla.org/1597697
+user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
+// 0330: disable Hybdrid Content telemetry
+   // [-] https://bugzilla.mozilla.org/1520491
+user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+]
+// 2720: enforce IndexedDB (IDB) as enabled
+   // IDB is required for extensions and Firefox internals (even before FF63 in [1])
+   // To control *website* IDB data, control allowing cookies and service workers, or use
+   // Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize
+   // on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically
+   // via an extension. Note that IDB currently cannot be sanitized by host.
+   // [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/
+   // [-] https://bugzilla.mozilla.org/1488583
+user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From e1022c2e72010c6d7b3db458c7b1c7e6f1193879 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 14 Jan 2020 17:38:22 +0000
Subject: [PATCH 0510/1147] 72-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index aaddac3..a0421ca 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 19 December 2019
-* version 72-alpha
+* date: 20 January 2020
+* version 72-beta
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 5d2c5de11cb333f0e6332005858565bb8dfecb88 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 15 Jan 2020 02:53:07 +0000
Subject: [PATCH 0511/1147] fixup deprecated ESR-cycle version

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index a0421ca..b88fc78 100644
--- a/user.js
+++ b/user.js
@@ -1637,8 +1637,8 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
-     Documentation denoted as [-]. Items deprecated prior to FF68 have been archived at [1], which
-     also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
+     Documentation denoted as [-]. Items deprecated in FF68 or earlier have been archived at [1],
+     which also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
      [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/123
 ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");

From 7619e312de497a53344f2532832482cc26cfb580 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 24 Jan 2020 16:48:16 +0000
Subject: [PATCH 0512/1147] 72 final

---
 user.js | 14 +++++++-------
 1 file changed, 7 insertions(+), 7 deletions(-)

diff --git a/user.js b/user.js
index b88fc78..e8bdaa7 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 20 January 2020
-* version 72-beta
+* date: 24 January 2020
+* version 72
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
@@ -83,10 +83,10 @@
 user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong with it?");
 
 /* 0000: disable about:config warning
- * The XUL version can still be accessed in FF71+ @ chrome://global/content/config.xul
- * and in FF73+ @ chrome://global/content/config.xhtml ***/
-user_pref("general.warnOnAboutConfig", false); // for the XUL version
-user_pref("browser.aboutConfig.showWarning", false); // for the new HTML version [FF71+]
+ * FF71-72: chrome://global/content/config.xul
+ * FF73+: chrome://global/content/config.xhtml ***/
+user_pref("general.warnOnAboutConfig", false); // XUL/XHTML version
+user_pref("browser.aboutConfig.showWarning", false); // HTML version [FF71+]
 
 /*** [SECTION 0100]: STARTUP ***/
 user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
@@ -358,7 +358,7 @@ user_pref("browser.ping-centre.telemetry", false);
 /* 0517: disable Form Autofill
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
- * [SETTING] Options>Privacy&Security>Forms and Autofill>Autofill addresses (FF73+)
+ * [SETTING] Options>Privacy & Security>Forms and Autofill>Autofill addresses (FF74+)
  * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill
  * [2] https://www.ghacks.net/2017/05/24/firefoxs-new-form-autofill-is-awesome/ ***/
 user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]

From cd9fc110b0c23d0cc8be34ccbff1839fbd8ca0fa Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 10 Feb 2020 16:47:17 +0000
Subject: [PATCH 0513/1147] v1.2

look for `lock` file instead of `webappsstore.sqlite-shm` to detect if firefox is running or not (with this profile)

see https://github.com/ghacksuserjs/ghacks-user.js/pull/405#issuecomment-581447586 and follow-up comments.

Thanks @atomGit for reporting the issue and @rusty-snake for confirming it.
---
 prefsCleaner.sh | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index 360c2ea..d8185cd 100644
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -2,7 +2,7 @@
 
 ## prefs.js cleaner for Linux/Mac
 ## author: @claustromaniac
-## version: 1.1
+## version: 1.2
 
 ## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
 
@@ -27,7 +27,7 @@ fQuit() {
 fFF_check() {
 	# there are many ways to see if firefox is running or not, some more reliable than others
 	# this isn't elegant and might not be future-proof but should at least be compatible with any environment
-	while [ -e webappsstore.sqlite-shm ]; do
+	while [ -e lock ]; do
 		echo -e "\nThis Firefox profile seems to be in use. Close Firefox and try again.\n"
 		read -p "Press any key to continue."
 	done
@@ -58,7 +58,7 @@ echo -e "\n\n"
 echo "                   ╔══════════════════════════╗"
 echo "                   ║     prefs.js cleaner     ║"
 echo "                   ║    by claustromaniac     ║"
-echo "                   ║           v1.1           ║"
+echo "                   ║           v1.2           ║"
 echo "                   ╚══════════════════════════╝"
 echo -e "\nThis script should be run from your Firefox profile directory.\n"
 echo "It will remove any entries from prefs.js that also exist in user.js."

From 03f558b09caa59a4fd45c4edba10443ec3052ab8 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 10 Feb 2020 17:12:08 +0000
Subject: [PATCH 0514/1147] nit: 0517 SETTING

we don't include `Options>` in [SETTING] lines
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index e8bdaa7..b3ee05f 100644
--- a/user.js
+++ b/user.js
@@ -358,7 +358,7 @@ user_pref("browser.ping-centre.telemetry", false);
 /* 0517: disable Form Autofill
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
- * [SETTING] Options>Privacy & Security>Forms and Autofill>Autofill addresses (FF74+)
+ * [SETTING] Privacy & Security>Forms and Autofill>Autofill addresses (FF74+)
  * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill
  * [2] https://www.ghacks.net/2017/05/24/firefoxs-new-form-autofill-is-awesome/ ***/
 user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]

From 1ce1f7449462ff7509e08b9dc38613f87366c143 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 12 Feb 2020 12:03:29 +0000
Subject: [PATCH 0515/1147] Update user.js

---
 user.js | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index b3ee05f..1289e37 100644
--- a/user.js
+++ b/user.js
@@ -1429,7 +1429,7 @@ user_pref("privacy.firstparty.isolate", true);
       FF65: pointerEvent.pointerid (1492766)
  ** 1485266 - disable exposure of system colors to CSS or canvas (see 4615) (FF67+)
  ** 1407366 - enable inner window letterboxing (see 4504) (FF67+)
- ** 1540726 - return "light" with prefers-color-scheme (see 4616) (FF67+)
+ ** 1494034 - return "light" with prefers-color-scheme (see 4616) (FF67+)
       [1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
  ** 1564422 - spoof audioContext outputLatency (FF70+)
  ** 1595823 - spoof audioContext sampleRate (FF72+)
@@ -1555,12 +1555,12 @@ user_pref("dom.w3c_pointer_events.enabled", false);
 // * * * /
 // FF67+
 // 4615: [2618] disable exposure of system colors to CSS or canvas [FF44+]
-  // [NOTE] See second listed bug: may cause black on black for elements with undefined colors
-  // [SETUP-CHROME] Might affect CSS in themes and extensions
-  // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876
+   // [NOTE] See second listed bug: may cause black on black for elements with undefined colors
+   // [SETUP-CHROME] Might affect CSS in themes and extensions
+   // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876
 user_pref("ui.use_standins_for_native_colors", true);
 // 4616: enforce prefers-color-scheme as light [FF67+]
-  // 0=light, 1=dark : This overrides your OS value
+   // 0=light, 1=dark : This overrides your OS value
 user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
 // * * * /
 // ***/

From 5f3e3b2691d0348cbd9ab7f33172fe6d05657ca1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 14 Feb 2020 01:00:02 +0000
Subject: [PATCH 0516/1147] VR default prompt, RFP info, start 73-alpha

---
 user.js | 18 ++++++++++++------
 1 file changed, 12 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 1289e37..57d89c9 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 24 January 2020
-* version 72
+* date: 14 February 2020
+* version 73-alpha
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
@@ -1080,10 +1080,6 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * [NOTE] From FF52+ Battery Status API is only available in chrome/privileged code. see [1]
  * [1] https://bugzilla.mozilla.org/1313580 ***/
    // user_pref("dom.battery.enabled", false);
-/* 2504: disable virtual reality devices
- * Optional protection depending on your connected devices
- * [1] https://developer.mozilla.org/docs/Web/API/WebVR_API ***/
-   // user_pref("dom.vr.enabled", false);
 /* 2505: disable media device enumeration [FF29+]
  * [NOTE] media.peerconnection.enabled should also be set to false (see 2001)
  * [1] https://wiki.mozilla.org/Media/getUserMedia
@@ -1104,6 +1100,15 @@ user_pref("dom.webaudio.enabled", false);
  * [1] https://github.com/WICG/media-capabilities
  * [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
    // user_pref("media.media-capabilities.enabled", false);
+/* 2520: disable virtual reality devices
+ * Optional protection depending on your connected devices
+ * [1] https://developer.mozilla.org/docs/Web/API/WebVR_API ***/
+   // user_pref("dom.vr.enabled", false);
+/* 2521: set a default permission for Virtual Reality (see 2520) [FF73+]
+ * 0=always ask (default), 1=allow, 2=block
+ * [SETTING] to add site exceptions: Page Info>Permissions>Access Virtual Reality Devices
+ * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Virtual Reality>Settings ***/
+   // user_pref("permissions.default.xr", 0);
 
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
@@ -1433,6 +1438,7 @@ user_pref("privacy.firstparty.isolate", true);
       [1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
  ** 1564422 - spoof audioContext outputLatency (FF70+)
  ** 1595823 - spoof audioContext sampleRate (FF72+)
+ ** 1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]

From 64f34f147179b5ade799149a55bde8626af3058b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 15 Feb 2020 12:55:59 +0000
Subject: [PATCH 0517/1147] 73-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 57d89c9..455e791 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 14 February 2020
-* version 73-alpha
+* date: 15 February 2020
+* version 73-beta
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 1afd52de6ee2055956266319035eb11516688bbc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 22 Feb 2020 13:56:30 +0000
Subject: [PATCH 0518/1147] 0306: minor tweak

There is no "show more details about an addon" anymore since they moved to the new html/card layout
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 455e791..6b2cc2e 100644
--- a/user.js
+++ b/user.js
@@ -204,8 +204,8 @@ user_pref("app.update.auto", false);
  * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
    // user_pref("extensions.update.autoUpdateDefault", false);
 /* 0306: disable extension metadata
- * used when installing/updating an extension, and in daily background update checks: if false, it
- * hides the expanded text description (if it exists) when you "show more details about an addon" ***/
+ * used when installing/updating an extension, and in daily background update checks:
+ * when false, extension detail tabs will have no description ***/
    // user_pref("extensions.getAddons.cache.enabled", false);
 /* 0308: disable search engine updates (e.g. OpenSearch)
  * [NOTE] This does not affect Mozilla's built-in or Web Extension search engines

From e67a0c868d0264b643a832c71b10743c7287e0e9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 25 Feb 2020 00:20:19 +0000
Subject: [PATCH 0519/1147] Update troubleshooting-help.md

---
 .github/ISSUE_TEMPLATE/troubleshooting-help.md | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
index 02cc07a..8aedf4c 100644
--- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -8,11 +8,11 @@ assignees: ''
 ---
 
 Before you proceed...
-  - Keep reading this. Seriously.
-  - Note that we do not support forks (i.e. IceCat, Pale Moon, WaterFox, etc).
-  - Make sure you searched for the `[Setup` tags in the `user.js`.
+  - Issues will be closed as invalid if you do not [Troubleshoot](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.4-Troubleshooting), including
+     - confirming the problem is caused by the `user.js`
+     - searching the `[Setup` tags in the `user.js`
   - Search the GitHub repository. The information you need is most likely here already.
-  - Check out our [troubleshooting](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.4-Troubleshooting) wiki page, including steps to see if the problem is caused by the `user.js` or an extension.
+  - Note: We do not support forks
 
 See also:
   - Extension breakage due to prefs [issue 391](https://github.com/ghacksuserjs/ghacks-user.js/issues/391)

From a542701ba5b6c2341ef3028c4a28d8ea08a3f9ed Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 25 Feb 2020 00:21:42 +0000
Subject: [PATCH 0520/1147] Update troubleshooting-help.md

---
 .github/ISSUE_TEMPLATE/troubleshooting-help.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
index 8aedf4c..4cf0a19 100644
--- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -8,7 +8,7 @@ assignees: ''
 ---
 
 Before you proceed...
-  - Issues will be closed as invalid if you do not [Troubleshoot](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.4-Troubleshooting), including
+  - Issues will be closed as invalid if you do not [troubleshoot](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.4-Troubleshooting), including
      - confirming the problem is caused by the `user.js`
      - searching the `[Setup` tags in the `user.js`
   - Search the GitHub repository. The information you need is most likely here already.

From 4139630635319861969568b816b7a9ff3e2028c1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 12 Mar 2020 03:37:46 +0000
Subject: [PATCH 0521/1147] 73 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 6b2cc2e..5aa2c34 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 15 February 2020
-* version 73-beta
+* date: 11 March 2020
+* version 73
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 615ebeda2f315e9f43e5825f80870e818d72ad8d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 12 Mar 2020 03:43:31 +0000
Subject: [PATCH 0522/1147] start 74-alpha

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 5aa2c34..d6010db 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
 * date: 11 March 2020
-* version 73
+* version 74-alpha
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 24777c9ac2013a17751919f090f9696a1a413456 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Thu, 12 Mar 2020 03:44:52 +0000
Subject: [PATCH 0523/1147] FF74: 0203 updates (#904)

---
 user.js | 11 +++++++++--
 1 file changed, 9 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index d6010db..f30e0b9 100644
--- a/user.js
+++ b/user.js
@@ -152,8 +152,8 @@ user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely decease
    // user_pref("permissions.default.geo", 2);
 /* 0203: use Mozilla geolocation service instead of Google when geolocation is enabled
  * Optionally enable logging to the console (defaults to false) ***/
-user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
-   // user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
+user_pref("geo.provider.network.url", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
+   // user_pref("geo.provider.network.logging.enabled", true); // [HIDDEN PREF]
 /* 0204: disable using the OS's geolocation service ***/
 user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
 user_pref("geo.provider.use_corelocation", false); // [MAC]
@@ -1690,6 +1690,13 @@ user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+]
    // [-] https://bugzilla.mozilla.org/1488583
 user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
 // * * * /
+// FF74
+// 0203: use Mozilla geolocation service instead of Google when geolocation is enabled
+   // Optionally enable logging to the console (defaults to false)
+   // [-] https://bugzilla.mozilla.org/1613627
+user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
+   // user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 4ddf60cf32dc1b22cd5061dc4471dbf635a3ad1d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 12 Mar 2020 03:56:13 +0000
Subject: [PATCH 0524/1147] 0203: make sure users know these are 74+ prefs

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index f30e0b9..1d5f666 100644
--- a/user.js
+++ b/user.js
@@ -150,7 +150,7 @@ user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely decease
  * [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
    // user_pref("permissions.default.geo", 2);
-/* 0203: use Mozilla geolocation service instead of Google when geolocation is enabled
+/* 0203: use Mozilla geolocation service instead of Google when geolocation is enabled [FF74+]
  * Optionally enable logging to the console (defaults to false) ***/
 user_pref("geo.provider.network.url", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
    // user_pref("geo.provider.network.logging.enabled", true); // [HIDDEN PREF]

From 6f7e09ad431966a78f8b78e57de7b024f3547e2c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 12 Mar 2020 05:23:57 +0000
Subject: [PATCH 0525/1147] 1704 deprecated, add 1703

---
 user.js | 13 +++++++++----
 1 file changed, 9 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 1d5f666..9b855eb 100644
--- a/user.js
+++ b/user.js
@@ -867,10 +867,10 @@ user_pref("privacy.userContext.ui.enabled", true);
 /* 1702: enable Container Tabs [FF50+]
  * [SETTING] General>Tabs>Enable Container Tabs ***/
 user_pref("privacy.userContext.enabled", true);
-/* 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
- * 0=no menu (default), 1=show when clicked, 2=show on long press
- * [1] https://bugzilla.mozilla.org/1328756 ***/
-user_pref("privacy.userContext.longPressBehavior", 2);
+/* 1703: set behaviour on "+ Tab" button to display container menu on left click [FF74+]
+ * [NOTE] The menu is always shown on long press and right click
+ * [SETTING] General>Tabs>Enable Container Tabs>Settings>Select a container for each new tab ***/
+   // user_pref("privacy.userContext.newTabContainerOnLeftClick.enabled", true);
 
 /*** [SECTION 1800]: PLUGINS ***/
 user_pref("_user.js.parrot", "1800 syntax error: the parrot's pushing up daisies!");
@@ -1696,6 +1696,11 @@ user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
    // [-] https://bugzilla.mozilla.org/1613627
 user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
    // user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
+// 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
+   // 0=no menu (default), 1=show when clicked, 2=show on long press
+   // [1] https://bugzilla.mozilla.org/1328756
+   // [-] https://bugzilla.mozilla.org/1606265
+user_pref("privacy.userContext.longPressBehavior", 2);
 // * * * /
 // ***/
 

From b6e2a3f64f030fa3586984f294931d3d0334cfbd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 12 Mar 2020 14:44:14 +0000
Subject: [PATCH 0526/1147] one of the 2012 webgl prefs deprecated

---
 user.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 9b855eb..e6c5df8 100644
--- a/user.js
+++ b/user.js
@@ -918,7 +918,6 @@ user_pref("webgl.disabled", true);
 user_pref("webgl.enable-webgl2", false);
 /* 2012: limit WebGL ***/
 user_pref("webgl.min_capability_mode", true);
-user_pref("webgl.disable-extensions", true);
 user_pref("webgl.disable-fail-if-major-performance-caveat", true);
 /* 2022: disable screensharing ***/
 user_pref("media.getusermedia.screensharing.enabled", false);
@@ -1701,6 +1700,9 @@ user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?ke
    // [1] https://bugzilla.mozilla.org/1328756
    // [-] https://bugzilla.mozilla.org/1606265
 user_pref("privacy.userContext.longPressBehavior", 2);
+// 2012: limit WebGL
+   // [-] https://bugzilla.mozilla.org/1477756
+user_pref("webgl.disable-extensions", true);
 // * * * /
 // ***/
 

From 187692af660838c3650c96d0f7f57a4e5cc84ec7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 19 Mar 2020 11:36:03 +0000
Subject: [PATCH 0527/1147] enforce disabled system + prefixed colors

---
 user.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/user.js b/user.js
index e6c5df8..e6a1cb7 100644
--- a/user.js
+++ b/user.js
@@ -1186,6 +1186,9 @@ user_pref("pdfjs.disabled", false); // [DEFAULT: false]
 /* 2621: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS]
  * [1] https://www.ghacks.net/2016/03/25/block-firefox-chrome-windows-store/ ***/
 user_pref("network.protocol-handler.external.ms-windows-store", false);
+/* 2622: enforce no system colors; they can be fingerprinted
+ * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
+user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
 
 /** DOWNLOADS ***/
 /* 2650: discourage downloading to desktop

From fe1b03bd2aafd6f9193d5ef2068192c3fcc9e01b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 27 Mar 2020 12:36:16 +0000
Subject: [PATCH 0528/1147] tls downgrades -> session only

---
 user.js | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index e6a1cb7..e9c6f8a 100644
--- a/user.js
+++ b/user.js
@@ -658,7 +658,9 @@ user_pref("security.ssl.require_safe_negotiation", true);
  * [1] https://www.ssllabs.com/ssl-pulse/ ***/
    // user_pref("security.tls.version.min", 3);
    // user_pref("security.tls.version.max", 4);
-/* 1203: disable SSL session tracking [FF36+]
+/* 1203: enforce TLS 1.0 and 1.1 downgrades as session only */
+user_pref("security.tls.version.enable-deprecated", false);
+/* 1204: disable SSL session tracking [FF36+]
  * SSL Session IDs are unique, last up to 24hrs in Firefox, and can be used for tracking
  * [SETUP-PERF] Relax this if you have FPI enabled (see 4000) *AND* you understand the
  * consequences. FPI isolates these, but it was designed with the Tor protocol in mind,
@@ -667,12 +669,12 @@ user_pref("security.ssl.require_safe_negotiation", true);
  * [2] https://bugzilla.mozilla.org/967977
  * [3] https://arxiv.org/abs/1810.07304 ***/
 user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
-/* 1204: disable SSL Error Reporting
+/* 1205: disable SSL Error Reporting
  * [1] https://firefox-source-docs.mozilla.org/browser/base/sslerrorreport/preferences.html ***/
 user_pref("security.ssl.errorReporting.automatic", false);
 user_pref("security.ssl.errorReporting.enabled", false);
 user_pref("security.ssl.errorReporting.url", "");
-/* 1205: disable TLS1.3 0-RTT (round-trip time) [FF51+]
+/* 1206: disable TLS1.3 0-RTT (round-trip time) [FF51+]
  * [1] https://github.com/tlswg/tls13-spec/issues/1001
  * [2] https://blog.cloudflare.com/tls-1-3-overview-and-q-and-a/ ***/
 user_pref("security.tls.enable_0rtt_data", false);

From ee35d7c70df0ee3423012dbd365e3430e7023b4a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 27 Mar 2020 12:44:06 +0000
Subject: [PATCH 0529/1147] 2421: ion/jit and extensions note

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index e9c6f8a..426ad8d 100644
--- a/user.js
+++ b/user.js
@@ -1055,6 +1055,7 @@ user_pref("dom.vibrator.enabled", false);
  * [6] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
 user_pref("javascript.options.asmjs", false);
 /* 2421: disable Ion and baseline JIT to help harden JS against exploits
+ * [NOTE] In FF75+ these no longer affect extensions (1599226)
  * [WARNING] If false, causes the odd site issue and there is also a performance loss
  * [1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817 ***/
    // user_pref("javascript.options.ion", false);

From f0945743b7ac4ca1d04fffbe62b33270ea7b85f5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 27 Mar 2020 16:20:41 +0000
Subject: [PATCH 0530/1147] 2662: clarify 4503 needed, #912

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 426ad8d..d800bbd 100644
--- a/user.js
+++ b/user.js
@@ -1221,7 +1221,7 @@ user_pref("browser.download.hide_plugins_without_extensions", false);
  * [1] archived: https://archive.is/DYjAM ***/
 user_pref("extensions.enabledScopes", 5); // [HIDDEN PREF]
 user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
-/* 2662: disable webextension restrictions on certain mozilla domains (also see 4503) [FF60+]
+/* 2662: disable webextension restrictions on certain mozilla domains (you also need 4503) [FF60+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
    // user_pref("extensions.webextensions.restrictedDomains", "");
 

From 55ae994972c6b27fb40b121b07aeed6c2e781e4d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 28 Mar 2020 13:18:34 +0000
Subject: [PATCH 0531/1147] 2421 fixup Ion/Jit note

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index d800bbd..1131884 100644
--- a/user.js
+++ b/user.js
@@ -1055,7 +1055,7 @@ user_pref("dom.vibrator.enabled", false);
  * [6] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
 user_pref("javascript.options.asmjs", false);
 /* 2421: disable Ion and baseline JIT to help harden JS against exploits
- * [NOTE] In FF75+ these no longer affect extensions (1599226)
+ * [NOTE] Disabling JIT also disables Ion. In FF75+ disabling Ion no longer affects extensions (1599226)
  * [WARNING] If false, causes the odd site issue and there is also a performance loss
  * [1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817 ***/
    // user_pref("javascript.options.ion", false);

From e7d20867cb50c0f934bc3883ce60e16ec69a82ef Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 6 Apr 2020 00:39:52 +0000
Subject: [PATCH 0532/1147] 2623 delegation 2421 ion/jit tweak

---
 user.js | 13 +++++++++----
 1 file changed, 9 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 1131884..4bf0cb3 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 11 March 2020
-* version 74-alpha
+* date: 05 April 2020
+* version 74-beta
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
@@ -1055,8 +1055,7 @@ user_pref("dom.vibrator.enabled", false);
  * [6] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
 user_pref("javascript.options.asmjs", false);
 /* 2421: disable Ion and baseline JIT to help harden JS against exploits
- * [NOTE] Disabling JIT also disables Ion. In FF75+ disabling Ion no longer affects extensions (1599226)
- * [WARNING] If false, causes the odd site issue and there is also a performance loss
+ * [WARNING] Disabling Ion/JIT can cause some site issues and performance loss
  * [1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817 ***/
    // user_pref("javascript.options.ion", false);
    // user_pref("javascript.options.baselinejit", false);
@@ -1192,6 +1191,12 @@ user_pref("network.protocol-handler.external.ms-windows-store", false);
 /* 2622: enforce no system colors; they can be fingerprinted
  * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
 user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
+/* 2623: disable permissions delegation [FF73+]
+ * Currently applies to cross-origin geolocation, camera, mic and screen-sharing
+ * permissions, and fullscreen requests. Disabling delegation means any prompts
+ * for these will show/use their correct 3rd party origin
+ * [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion */
+user_pref("permissions.delegation.enabled", false);
 
 /** DOWNLOADS ***/
 /* 2650: discourage downloading to desktop

From 94c83519f2230ffca2387b7a27e2f938f0902f95 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 8 Apr 2020 07:08:36 +0000
Subject: [PATCH 0533/1147] 74 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 4bf0cb3..024eda2 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 05 April 2020
-* version 74-beta
+* date: 07 April 2020
+* version 74
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 7e71b6663c9a4e24a6d42ccdeb72a9f33c5980db Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 8 Apr 2020 07:12:14 +0000
Subject: [PATCH 0534/1147] 75-alpha, add 105e, closes #922

---
 user.js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 024eda2..8f0c031 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
 * date: 07 April 2020
-* version 74
+* version 75-alpha
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
@@ -125,6 +125,9 @@ user_pref("browser.newtabpage.activity-stream.showSponsored", false);
 user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false); // [FF66+]
 /* 0105d: disable Activity Stream recent Highlights in the Library [FF57+] ***/
    // user_pref("browser.library.activity-stream.enabled", false);
+/* 0105e: disable Activity Stream Top Sites
+ * The new "megabar" in FF75+ suggests top sites even if you don't use AS */
+user_pref("browser.newtabpage.activity-stream.feeds.topsites", false);
 /* 0110: start Firefox in PB (Private Browsing) mode
  * [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed
  * [WARNING] The P in PB mode is misleading: it means no "persistent" disk storage such as history,

From d2da48c215a7ee06ce97f10aab0a894afb4c427a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 8 Apr 2020 08:01:07 +0000
Subject: [PATCH 0535/1147] revert top sites, see #922

---
 user.js | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/user.js b/user.js
index 8f0c031..23a015c 100644
--- a/user.js
+++ b/user.js
@@ -125,9 +125,6 @@ user_pref("browser.newtabpage.activity-stream.showSponsored", false);
 user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false); // [FF66+]
 /* 0105d: disable Activity Stream recent Highlights in the Library [FF57+] ***/
    // user_pref("browser.library.activity-stream.enabled", false);
-/* 0105e: disable Activity Stream Top Sites
- * The new "megabar" in FF75+ suggests top sites even if you don't use AS */
-user_pref("browser.newtabpage.activity-stream.feeds.topsites", false);
 /* 0110: start Firefox in PB (Private Browsing) mode
  * [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed
  * [WARNING] The P in PB mode is misleading: it means no "persistent" disk storage such as history,

From 8c7149c6a5762b75e14d38c6c36558be26a4ae69 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Apr 2020 06:07:13 +0000
Subject: [PATCH 0536/1147] 2421: Ion/JIT trusted principals, closes #914

---
 user.js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 23a015c..38b232d 100644
--- a/user.js
+++ b/user.js
@@ -1054,11 +1054,14 @@ user_pref("dom.vibrator.enabled", false);
  * [5] https://www.mozilla.org/security/advisories/mfsa2017-05/#CVE-2017-5400
  * [6] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
 user_pref("javascript.options.asmjs", false);
-/* 2421: disable Ion and baseline JIT to help harden JS against exploits
+/* 2421: disable Ion and baseline JIT to harden against JS exploits [SETUP-HARDEN]
+ * [NOTE] In FF75+, when **both** Ion and JIT are disabled, **and** the new pref
+ * hidden pref is enabled, then Ion can still be used by extensions (1599226)
  * [WARNING] Disabling Ion/JIT can cause some site issues and performance loss
  * [1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817 ***/
    // user_pref("javascript.options.ion", false);
    // user_pref("javascript.options.baselinejit", false);
+   // user_pref("javascript.options.jit_trustedprincipals", true); // [FF75+] [HIDDEN PREF]
 /* 2422: disable WebAssembly [FF52+] [SETUP-PERF]
  * [NOTE] In FF71+ this no longer affects extensions (1576254)
  * [1] https://developer.mozilla.org/docs/WebAssembly ***/

From d2dd0c2ab4d0671312c70b278d84265ea6b85bcc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 11 Apr 2020 02:51:17 +0000
Subject: [PATCH 0537/1147] tls stats update

- Go to https://telemetry.mozilla.org/
- click `measurement dashboard`
- select `SSL_HANDSHAKE_VERSION`

I looked at Nightly 75 (0.26 and 0.01) and Nightly 76 (0.2 and 0)
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 38b232d..06edde9 100644
--- a/user.js
+++ b/user.js
@@ -654,7 +654,7 @@ user_pref("security.ssl.require_safe_negotiation", true);
 /* 1202: control TLS versions with min and max
  * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
  * [WARNING] Leave these at default, otherwise you alter your TLS fingerprint.
- * Firefox telemetry (April 2019) shows only 0.5% of TLS web traffic uses 1.0 or 1.1
+ * Firefox telemetry (April 2020) shows only 0.25% of TLS web traffic uses 1.0 or 1.1
  * [1] https://www.ssllabs.com/ssl-pulse/ ***/
    // user_pref("security.tls.version.min", 3);
    // user_pref("security.tls.version.max", 4);

From 97c5378e52fe29f98317f671f8fd95aee6fddd63 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Apr 2020 16:23:48 +0000
Subject: [PATCH 0538/1147] 1007: *forceMediaMemoryCache PB mode

---
 user.js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 06edde9..2ee8e11 100644
--- a/user.js
+++ b/user.js
@@ -396,7 +396,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
 /* 0701: disable IPv6
  * IPv6 can be abused, especially regarding MAC addresses. They also do not play nice
  * with VPNs. That's even assuming your ISP and/or router and/or website can handle it.
- * Firefox telemetry (April 2019) shows only 5% of all connections are IPv6.
+ * Firefox telemetry (April 2019) shows only 5% of all connections are IPv6
  * [NOTE] This is just an application level fallback. Disabling IPv6 is best done at an
  * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
  * then this won't make much difference. If you are masking your IP, then it can only help.
@@ -596,6 +596,9 @@ user_pref("browser.cache.disk.enable", false);
  * [NOTE] This means any permission changes are session only
  * [1] https://bugzilla.mozilla.org/967812 ***/
    // user_pref("permissions.memory_only", true); // [HIDDEN PREF]
+/* 1007: disable media cache from writing to disk in Private Browsing Mode [FF75+]
+ * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB Mode */
+   //user_pref("browser.privatebrowsing.forceMediaMemoryCache", false);
 
 /** SESSIONS & SESSION RESTORE ***/
 /* 1020: exclude "Undo Closed Tabs" in Session Restore ***/

From deae6e14f989710ebdfddafa21e2406efb79795b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Apr 2020 16:38:12 +0000
Subject: [PATCH 0539/1147] 75 deprecated

---
 user.js | 8 ++++++--
 1 file changed, 6 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 2ee8e11..605ec27 100644
--- a/user.js
+++ b/user.js
@@ -158,12 +158,11 @@ user_pref("geo.provider.network.url", "https://location.services.mozilla.com/v1/
 user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
 user_pref("geo.provider.use_corelocation", false); // [MAC]
 user_pref("geo.provider.use_gpsd", false); // [LINUX]
-/* 0205: disable GeoIP-based search results
+/* 0205: disable GeoIP-based search defaults
  * [NOTE] May not be hidden if Firefox has changed your settings due to your locale
  * [1] https://trac.torproject.org/projects/tor/ticket/16254
  * [2] https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections#w_geolocation-for-default-search-engine ***/
 user_pref("browser.search.region", "US"); // [HIDDEN PREF]
-user_pref("browser.search.geoip.url", "");
 /* 0206: disable geographically specific results/search engines e.g. "browser.search.*.US"
  * i.e. ignore all of Mozilla's various search engines in multiple locales ***/
 user_pref("browser.search.geoSpecificDefaults", false);
@@ -1721,6 +1720,11 @@ user_pref("privacy.userContext.longPressBehavior", 2);
    // [-] https://bugzilla.mozilla.org/1477756
 user_pref("webgl.disable-extensions", true);
 // * * * /
+// FF75
+// 0205: disable GeoIP-based search defaults URL
+   // [-] https://bugzilla.mozilla.org/1589618
+user_pref("browser.search.geoip.url", "");
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From b695468c7e0e39a614aebf47c5e4c0ad78749766 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Apr 2020 18:07:12 +0000
Subject: [PATCH 0540/1147] remove 0205

---
 user.js | 12 +-----------
 1 file changed, 1 insertion(+), 11 deletions(-)

diff --git a/user.js b/user.js
index 605ec27..af3dd1c 100644
--- a/user.js
+++ b/user.js
@@ -7,7 +7,7 @@
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
 
 * releases: These are end-of-stable-life-cycle legacy archives.
-            *Always* use the master branch user.js for a current up-to-date version.
+            *Always* use the master branch user.js for a current up-to-date version
        url: https://github.com/ghacksuserjs/ghacks-user.js/releases
 
 * README:
@@ -158,11 +158,6 @@ user_pref("geo.provider.network.url", "https://location.services.mozilla.com/v1/
 user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
 user_pref("geo.provider.use_corelocation", false); // [MAC]
 user_pref("geo.provider.use_gpsd", false); // [LINUX]
-/* 0205: disable GeoIP-based search defaults
- * [NOTE] May not be hidden if Firefox has changed your settings due to your locale
- * [1] https://trac.torproject.org/projects/tor/ticket/16254
- * [2] https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections#w_geolocation-for-default-search-engine ***/
-user_pref("browser.search.region", "US"); // [HIDDEN PREF]
 /* 0206: disable geographically specific results/search engines e.g. "browser.search.*.US"
  * i.e. ignore all of Mozilla's various search engines in multiple locales ***/
 user_pref("browser.search.geoSpecificDefaults", false);
@@ -1720,11 +1715,6 @@ user_pref("privacy.userContext.longPressBehavior", 2);
    // [-] https://bugzilla.mozilla.org/1477756
 user_pref("webgl.disable-extensions", true);
 // * * * /
-// FF75
-// 0205: disable GeoIP-based search defaults URL
-   // [-] https://bugzilla.mozilla.org/1589618
-user_pref("browser.search.geoip.url", "");
-// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From ba83c555cc78bb60f40c0d7b20cc643d02c26c62 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Apr 2020 18:10:34 +0000
Subject: [PATCH 0541/1147] geo default search engines

browser.search.geoip.url is deprecated in 75, the prefs are only used on first run, and we don't mess with search engines as that is a user choice
---
 scratchpad-scripts/ghacks-clear-[removed].js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
index ab22f90..fbde545 100644
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ b/scratchpad-scripts/ghacks-clear-[removed].js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 19-December-2019
+ Last updated: 12-April-2020
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -218,6 +218,9 @@
     /* 71-beta */
     'media.block-autoplay-until-in-foreground',
     'middlemouse.paste',
+    /* 75-beta */
+    'browser.search.geoip.url',
+    'browser.search.region',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 394b6915995383968e12d923f0b4d63c0ff6b4e9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 13 Apr 2020 04:55:10 +0000
Subject: [PATCH 0542/1147] 2421: grammar fix

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index af3dd1c..9725a5e 100644
--- a/user.js
+++ b/user.js
@@ -1052,7 +1052,7 @@ user_pref("dom.vibrator.enabled", false);
  * [6] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
 user_pref("javascript.options.asmjs", false);
 /* 2421: disable Ion and baseline JIT to harden against JS exploits [SETUP-HARDEN]
- * [NOTE] In FF75+, when **both** Ion and JIT are disabled, **and** the new pref
+ * [NOTE] In FF75+, when **both** Ion and JIT are disabled, **and** the new
  * hidden pref is enabled, then Ion can still be used by extensions (1599226)
  * [WARNING] Disabling Ion/JIT can cause some site issues and performance loss
  * [1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817 ***/

From d7c276b3fe6fec1ea6f7b33333e1142b812687d7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 13 Apr 2020 06:17:54 +0000
Subject: [PATCH 0543/1147] 2402: clipboardevents -> inactive, #887

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 9725a5e..ee57bcc 100644
--- a/user.js
+++ b/user.js
@@ -1024,14 +1024,14 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
 /* 2401: disable website control over browser right-click context menu
  * [NOTE] Shift-Right-Click will always bring up the browser right-click context menu ***/
    // user_pref("dom.event.contextmenu.enabled", false);
-/* 2402: disable website access to clipboard events/content
- * [SETUP-WEB] This will break some sites functionality such as pasting into facebook, wordpress
+/* 2402: disable website access to clipboard events/content [SETUP-HARDEN]
+ * [NOTE] This will break some sites' functionality e.g. Outlook, Twitter, Facebook, Wordpress
  * This applies to onCut/onCopy/onPaste events - i.e. it requires interaction with the website
  * [WARNING] If both 'middlemouse.paste' and 'general.autoScroll' are true (at least one
  * is default false) then enabling this pref can leak clipboard content, see [2]
  * [1] https://www.ghacks.net/2014/01/08/block-websites-reading-modifying-clipboard-contents-firefox/
  * [2] https://bugzilla.mozilla.org/1528289 */
-user_pref("dom.event.clipboardevents.enabled", false);
+   // user_pref("dom.event.clipboardevents.enabled", false);
 /* 2404: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
  * this disables document.execCommand("cut"/"copy") to protect your clipboard
  * [1] https://bugzilla.mozilla.org/1170911 ***/

From dd162d9f489686d821d4a53377e15d7fab16dd15 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 14 Apr 2020 00:16:03 +0000
Subject: [PATCH 0544/1147] 1007 fixups

---
 user.js | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index ee57bcc..fa3ad93 100644
--- a/user.js
+++ b/user.js
@@ -590,9 +590,10 @@ user_pref("browser.cache.disk.enable", false);
  * [NOTE] This means any permission changes are session only
  * [1] https://bugzilla.mozilla.org/967812 ***/
    // user_pref("permissions.memory_only", true); // [HIDDEN PREF]
-/* 1007: disable media cache from writing to disk in Private Browsing Mode [FF75+]
- * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB Mode */
-   //user_pref("browser.privatebrowsing.forceMediaMemoryCache", false);
+/* 1007: disable media cache from writing to disk in Private Browsing [FF75+]
+ * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB */
+user_pref("browser.privatebrowsing.forceMediaMemoryCache", true);
+user_pref("media.memory_cache_max_size", 16384);
 
 /** SESSIONS & SESSION RESTORE ***/
 /* 1020: exclude "Undo Closed Tabs" in Session Restore ***/

From b90e72370c5fca05e13f91bef873fcb4b3104d05 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 14 Apr 2020 00:28:00 +0000
Subject: [PATCH 0545/1147] 1007 fixup what FF75+ applies to

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index fa3ad93..e9ed7f5 100644
--- a/user.js
+++ b/user.js
@@ -590,9 +590,9 @@ user_pref("browser.cache.disk.enable", false);
  * [NOTE] This means any permission changes are session only
  * [1] https://bugzilla.mozilla.org/967812 ***/
    // user_pref("permissions.memory_only", true); // [HIDDEN PREF]
-/* 1007: disable media cache from writing to disk in Private Browsing [FF75+]
+/* 1007: disable media cache from writing to disk in Private Browsing
  * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB */
-user_pref("browser.privatebrowsing.forceMediaMemoryCache", true);
+user_pref("browser.privatebrowsing.forceMediaMemoryCache", true); // [FF75+]
 user_pref("media.memory_cache_max_size", 16384);
 
 /** SESSIONS & SESSION RESTORE ***/

From d455c500a6c74058b3eb71d8349586d2e1de0072 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 15 Apr 2020 14:44:14 +0000
Subject: [PATCH 0546/1147] 75-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index e9ed7f5..4bbad65 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 07 April 2020
-* version 75-alpha
+* date: 15 April 2020
+* version 75-beta
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From dff5bb478a830ac186a2318ac3d09dc7ae6919a7 Mon Sep 17 00:00:00 2001
From: W <wolf@wolfsden.cz>
Date: Thu, 16 Apr 2020 04:04:13 +0000
Subject: [PATCH 0547/1147] 0211: add possible breakage for CJK input methods

---
 user.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 4bbad65..a7c2ec8 100644
--- a/user.js
+++ b/user.js
@@ -168,7 +168,9 @@ user_pref("browser.search.geoSpecificDefaults.url", "");
  * [TEST] https://addons.mozilla.org/about ***/
 user_pref("intl.accept_languages", "en-US, en");
 /* 0211: enforce US English locale regardless of the system locale
- * [1] https://bugzilla.mozilla.org/867501 ***/
+ * [SETUP-WEB] May break some input methods e.g xim/ibus for CJK languages, see [2]
+ * [1] https://bugzilla.mozilla.org/867501
+ * [2] https://bugzilla.mozilla.org/1629630 ***/
 user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 /* 0212: enforce fallback text encoding to match en-US
  * When the content or server doesn't declare a charset the browser will

From 3366e0aa162006aa7343f92c87b38c5c52c9bd11 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Apr 2020 08:52:48 +0000
Subject: [PATCH 0548/1147] 75 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index a7c2ec8..a101af0 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 15 April 2020
-* version 75-beta
+* date: 23 April 2020
+* version 75
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From bd384622db70eaf6893d32a0c1c4b99d5516fa5b Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 29 Apr 2020 12:00:10 +0000
Subject: [PATCH 0549/1147] Update troubleshooter.js (#935)

extensions.blocklist.pingCountTotal is not used anymore in FF76+
---
 scratchpad-scripts/troubleshooter.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/scratchpad-scripts/troubleshooter.js b/scratchpad-scripts/troubleshooter.js
index 1cce763..61488f0 100644
--- a/scratchpad-scripts/troubleshooter.js
+++ b/scratchpad-scripts/troubleshooter.js
@@ -1,5 +1,5 @@
 
-/*** ghacks-user.js troubleshooter.js v1.6.0 ***/
+/*** ghacks-user.js troubleshooter.js v1.6.1 ***/
 
 (function() {
 
@@ -107,7 +107,7 @@
   ]
 
   // any runtime-set pref that everyone will have and that can be safely reset
-  const oFILLER = { type: 64, name: 'extensions.blocklist.pingCountTotal', value: -1 };
+  const oFILLER = { type: 64, name: 'app.update.lastUpdateTime.browser-cleanup-thumbnails', value: 1580000000 };
 
   function getMyList(arr) {
     const aRet = [];

From 0ea1605642e67db9f930cb79680a3b1b78a74b62 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 30 Apr 2020 18:52:27 +0000
Subject: [PATCH 0550/1147] start 76-alpha, 2605 default

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index a101af0..7419fe0 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 23 April 2020
-* version 75
+* date: 30 April 2020
+* version 76-alpha
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
@@ -1132,7 +1132,7 @@ user_pref("browser.pagethumbnails.capturing_disabled", true); // [HIDDEN PREF]
 /* 2605: block web content in file processes [FF55+]
  * [SETUP-WEB] You may want to disable this for corporate or developer environments
  * [1] https://bugzilla.mozilla.org/1343184 ***/
-user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false);
+user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false); // [DEFAULT: false FF76+]
 /* 2606: disable UITour backend so there is no chance that a remote page can use it ***/
 user_pref("browser.uitour.enabled", false);
 user_pref("browser.uitour.url", "");

From c0780df24d9798462daf3380d47d0c5c5e6bbf83 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 30 Apr 2020 21:50:50 +0000
Subject: [PATCH 0551/1147] 1401: PDF breakage, closes #937

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 7419fe0..3068a21 100644
--- a/user.js
+++ b/user.js
@@ -779,7 +779,7 @@ user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 /* 1401: disable websites choosing fonts (0=block, 1=allow)
  * This can limit most (but not all) JS font enumeration which is a high entropy fingerprinting vector
- * [SETUP-WEB] Disabling fonts can uglify the web a fair bit.
+ * [SETUP-WEB] Can break some PDFs (missing text). Limiting to default fonts can "uglify" the web
  * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Allow pages to choose... ***/
 user_pref("browser.display.use_document_fonts", 0);
 /* 1403: disable icon fonts (glyphs) and local fallback rendering

From 14aaec71fb192eaab78365d54b0b76a2d5845860 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 4 May 2020 07:34:23 +0000
Subject: [PATCH 0552/1147] 76 deprecated

---
 user.js | 7 +++++--
 1 file changed, 5 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 3068a21..a46e1da 100644
--- a/user.js
+++ b/user.js
@@ -272,12 +272,11 @@ user_pref("network.connectivity-service.enabled", false);
 /*** [SECTION 0400]: BLOCKLISTS / SAFE BROWSING (SB) ***/
 user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
 /** BLOCKLISTS ***/
-/* 0401: enforce Firefox blocklist, but sanitize blocklist url
+/* 0401: enforce Firefox blocklist
  * [NOTE] It includes updates for "revoked certificates"
  * [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/
  * [2] https://trac.torproject.org/projects/tor/ticket/16931 ***/
 user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
-user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
 
 /** SAFE BROWSING (SB)
     Safe Browsing has taken many steps to preserve privacy. *IF* required, a full url is never
@@ -1718,6 +1717,10 @@ user_pref("privacy.userContext.longPressBehavior", 2);
    // [-] https://bugzilla.mozilla.org/1477756
 user_pref("webgl.disable-extensions", true);
 // * * * /
+// FF76
+// 0401: sanitize blocklist url
+user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From e38e253c25ebee28d4ecaa96d2f5cd68e3d86e1d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 4 May 2020 10:49:07 +0000
Subject: [PATCH 0553/1147] oophs, forgot deprecation source

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index a46e1da..4785166 100644
--- a/user.js
+++ b/user.js
@@ -1719,6 +1719,7 @@ user_pref("webgl.disable-extensions", true);
 // * * * /
 // FF76
 // 0401: sanitize blocklist url
+   // [-] https://bugzilla.mozilla.org/1618188
 user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
 // * * * /
 // ***/

From 919d4bfe961c6fa798c78472835eb1a839149cee Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 4 May 2020 10:52:25 +0000
Subject: [PATCH 0554/1147] godamnit, also move related reference

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 4785166..fcc75b3 100644
--- a/user.js
+++ b/user.js
@@ -274,8 +274,7 @@ user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
 /** BLOCKLISTS ***/
 /* 0401: enforce Firefox blocklist
  * [NOTE] It includes updates for "revoked certificates"
- * [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/
- * [2] https://trac.torproject.org/projects/tor/ticket/16931 ***/
+ * [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/ ***/
 user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
 
 /** SAFE BROWSING (SB)
@@ -1719,6 +1718,7 @@ user_pref("webgl.disable-extensions", true);
 // * * * /
 // FF76
 // 0401: sanitize blocklist url
+   // [2] https://trac.torproject.org/projects/tor/ticket/16931
    // [-] https://bugzilla.mozilla.org/1618188
 user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
 // * * * /

From 07117c65c19f5d02af77cc578927481c72e958f5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 7 May 2020 05:13:19 +0000
Subject: [PATCH 0555/1147] RFP spoofs FF78+

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index fcc75b3..d0f7767 100644
--- a/user.js
+++ b/user.js
@@ -1413,7 +1413,8 @@ user_pref("privacy.firstparty.isolate", true);
       FF57: The version number will match current ESR (1393283, 1418672, 1418162, 1511763)
       FF59: The OS will be reported as Windows, OSX, Android, or Linux (to reduce breakage) (1404608)
       FF66: The OS in HTTP Headers will be reduced to Windows or Android (1509829)
-      FF68: Reported OS versions updated to Windows 10, OS 10.14, and Adnroid 8.1 (1511434)
+      FF68: Reported OS versions updated to Windows 10, OS 10.14, and Android 8.1 (1511434)
+      FF78: Reported OS versions updated to OS 10.15 and Android 9.0 (1635011)
  ** 1369319 - disable device sensor API (see 4604) (FF56+)
  ** 1369357 - disable site specific zoom (see 4605) (FF56+)
  ** 1337161 - hide gamepads from content (see 4606) (FF56+)

From 27d72eda9eed2c065cc6397e4e9b03c86ffa6424 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 7 May 2020 06:20:10 +0000
Subject: [PATCH 0556/1147] 1244: https-only-mode

---
 user.js | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/user.js b/user.js
index d0f7767..eb4735f 100644
--- a/user.js
+++ b/user.js
@@ -736,6 +736,10 @@ user_pref("security.mixed_content.block_display_content", true);
 /* 1243: block unencrypted requests from Flash on encrypted pages to mitigate MitM attacks [FF59+]
  * [1] https://bugzilla.mozilla.org/1190623 ***/
 user_pref("security.mixed_content.block_object_subrequest", true);
+/* 1244: enable https-only-mode [FF76+]
+ * [NOTE] This is experimental
+ * [1] https://bugzilla.mozilla.org/1613063 */
+   // user_pref("dom.security.https_only_mode", true);
 
 /** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro] ***/
 /* 1261: disable 3DES (effective key size < 128)

From bb1e5bfd54c5281f372e596712b91c8444c1c785 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 7 May 2020 14:56:49 +0000
Subject: [PATCH 0557/1147] 76-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index eb4735f..c953fa6 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 30 April 2020
-* version 76-alpha
+* date: 7 May 2020
+* version 76-beta
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 4bc5b89cfe6f599747ba50160fc4aa3bded421d1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 15 May 2020 23:18:11 +0000
Subject: [PATCH 0558/1147] 4500: RFP changes 78+ re canvas

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index c953fa6..8050498 100644
--- a/user.js
+++ b/user.js
@@ -1432,7 +1432,7 @@ user_pref("privacy.firstparty.isolate", true);
  ** 1354633 - limit MediaError.message to a whitelist (FF57+)
  ** 1382533 - enable fingerprinting resistance for Presentation API (FF57+)
       This blocks exposure of local IP Addresses via mDNS (Multicast DNS)
- **  967895 - enable site permission prompt before allowing canvas data extraction (FF58+)
+ **  967895 - spoof canvas and enable site permission prompt before allowing canvas data extraction (FF58+)
       FF59: Added to site permissions panel (1413780) Only prompt when triggered by user input (1376865)
  ** 1372073 - spoof/block fingerprinting in MediaDevices API (FF59+)
       Spoof: enumerate devices reports one "Internal Camera" and one "Internal Microphone" if
@@ -1455,6 +1455,7 @@ user_pref("privacy.firstparty.isolate", true);
  ** 1564422 - spoof audioContext outputLatency (FF70+)
  ** 1595823 - spoof audioContext sampleRate (FF72+)
  ** 1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74+)
+ ** 1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]

From ff9bf76e5255b70265a1457252e4486f4e3c53f5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 24 May 2020 18:09:46 +0000
Subject: [PATCH 0559/1147] 76 final, save some bytes in RFP section

---
 user.js | 18 +++++++++---------
 1 file changed, 9 insertions(+), 9 deletions(-)

diff --git a/user.js b/user.js
index 8050498..367cd22 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 7 May 2020
-* version 76-beta
+* date: 24 May 2020
+* version 76
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
@@ -1412,13 +1412,13 @@ user_pref("privacy.firstparty.isolate", true);
       This spoof *shouldn't* affect core chrome/Firefox performance
  ** 1217238 - reduce precision of time exposed by javascript (FF55+)
  ** 1369303 - spoof/disable performance API (see 2410-deprecated, 4602, 4603) (FF56+)
- ** 1333651 & 1383495 & 1396468 - spoof Navigator API (see section 4700) (FF56+)
-      FF56: The version number will be rounded down to the nearest multiple of 10
-      FF57: The version number will match current ESR (1393283, 1418672, 1418162, 1511763)
-      FF59: The OS will be reported as Windows, OSX, Android, or Linux (to reduce breakage) (1404608)
-      FF66: The OS in HTTP Headers will be reduced to Windows or Android (1509829)
-      FF68: Reported OS versions updated to Windows 10, OS 10.14, and Android 8.1 (1511434)
-      FF78: Reported OS versions updated to OS 10.15 and Android 9.0 (1635011)
+ ** 1333651 & 1383495 & 1396468 - spoof User Agent & Navigator API (see section 4700) (FF56+)
+      FF56: Version: rounded down to the nearest multiple of 10
+      FF57: Version: match current ESR (1393283, 1418672, 1418162, 1511763)
+      FF59: OS: Windows, OSX, Android, or Linux (to reduce breakage) (1404608)
+      FF66: OS: HTTP Headers reduced to Windows or Android (1509829)
+      FF68: OS: updated to Windows 10, OS 10.14, and Android 8.1 (1511434)
+      FF78: OS: updated to OS 10.15 and Android 9.0 (1635011)
  ** 1369319 - disable device sensor API (see 4604) (FF56+)
  ** 1369357 - disable site specific zoom (see 4605) (FF56+)
  ** 1337161 - hide gamepads from content (see 4606) (FF56+)

From 868882ae3321c66bf979e455b0ab4731bdb22f71 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 24 May 2020 18:11:55 +0000
Subject: [PATCH 0560/1147] start 77-alpha

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 367cd22..d35ef0d 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
 * date: 24 May 2020
-* version 76
+* version 77-alpha
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 3edc48da56ad77c156f108a4889834d033ddc38f Mon Sep 17 00:00:00 2001
From: Matt Loberg <mloberg@users.noreply.github.com>
Date: Tue, 26 May 2020 06:54:55 -0500
Subject: [PATCH 0561/1147] fix updater.sh when dealing with multiple overrides
 (#947)

thanks @mloberg !
---
 updater.sh | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/updater.sh b/updater.sh
index 226a492..5c06a9c 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## ghacks-user.js updater for macOS and Linux
 
-## version: 2.5
+## version: 2.6
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac
 
@@ -313,8 +313,10 @@ update_userjs () {
 
   # apply overrides
   if [ "$SKIPOVERRIDE" = false ]; then
-    while IFS=',' read -ra FILE; do
-      add_override "$FILE"
+    while IFS=',' read -ra FILES; do
+      for FILE in "${FILES[@]}"; do
+        add_override "$FILE"
+      done
     done <<< "$OVERRIDE"
   fi
 

From f69d92e6ddc4c855686601caa391fda5a953ebaa Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 29 May 2020 12:23:17 +0000
Subject: [PATCH 0562/1147] 1244: https upgrade local

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index d35ef0d..a5ce6cb 100644
--- a/user.js
+++ b/user.js
@@ -739,7 +739,8 @@ user_pref("security.mixed_content.block_object_subrequest", true);
 /* 1244: enable https-only-mode [FF76+]
  * [NOTE] This is experimental
  * [1] https://bugzilla.mozilla.org/1613063 */
-   // user_pref("dom.security.https_only_mode", true);
+   // user_pref("dom.security.https_only_mode", true); // [FF76+]
+   // user_pref("dom.security.https_only_mode.upgrade_local", true); // [FF77+]
 
 /** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro] ***/
 /* 1261: disable 3DES (effective key size < 128)

From f6e6de844430fa64440ae230061720839e8282be Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 29 May 2020 12:41:59 +0000
Subject: [PATCH 0563/1147] 77 deprecated

---
 user.js | 18 +++++++++++-------
 1 file changed, 11 insertions(+), 7 deletions(-)

diff --git a/user.js b/user.js
index a5ce6cb..d5b3f7c 100644
--- a/user.js
+++ b/user.js
@@ -506,9 +506,6 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
 /* 0850d: disable location bar autofill
  * [1] https://support.mozilla.org/en-US/kb/address-bar-autocomplete-firefox#w_url-autocomplete ***/
    // user_pref("browser.urlbar.autoFill", false);
-/* 0850e: disable location bar one-off searches [FF51+]
- * [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/ ***/
-   // user_pref("browser.urlbar.oneOffSearches", false);
 /* 0860: disable search and form history
  * [SETUP-WEB] Be aware thet autocomplete form data can be read by third parties, see [1] [2]
  * [NOTE] We also clear formdata on exit (see 2803)
@@ -1132,10 +1129,6 @@ user_pref("browser.helperApps.deleteTempFileOnExit", true);
 /* 2604: disable page thumbnail collection
  * look in profile/thumbnails directory - you may want to clean that out ***/
 user_pref("browser.pagethumbnails.capturing_disabled", true); // [HIDDEN PREF]
-/* 2605: block web content in file processes [FF55+]
- * [SETUP-WEB] You may want to disable this for corporate or developer environments
- * [1] https://bugzilla.mozilla.org/1343184 ***/
-user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false); // [DEFAULT: false FF76+]
 /* 2606: disable UITour backend so there is no chance that a remote page can use it ***/
 user_pref("browser.uitour.enabled", false);
 user_pref("browser.uitour.url", "");
@@ -1729,6 +1722,17 @@ user_pref("webgl.disable-extensions", true);
    // [-] https://bugzilla.mozilla.org/1618188
 user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
 // * * * /
+// FF77
+// 0850e: disable location bar one-off searches [FF51+]
+   // [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/
+   // [-] https://bugzilla.mozilla.org/1628926
+   // user_pref("browser.urlbar.oneOffSearches", false);
+// 2605: block web content in file processes [FF55+]
+   // [SETUP-WEB] You may want to disable this for corporate or developer environments
+   // [1] https://bugzilla.mozilla.org/1343184
+   // [-] https://bugzilla.mozilla.org/1603007
+user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false);
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From ecc62554e5493c6b6e51a237358ad61e092c679b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 1 Jun 2020 15:27:38 +0000
Subject: [PATCH 0564/1147] 2608: remote debugging: default value, closes #950

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index d5b3f7c..ade9208 100644
--- a/user.js
+++ b/user.js
@@ -1138,7 +1138,7 @@ user_pref("browser.uitour.url", "");
 user_pref("devtools.chrome.enabled", false);
 /* 2608: disable remote debugging
  * [1] https://trac.torproject.org/projects/tor/ticket/16222 ***/
-user_pref("devtools.debugger.remote-enabled", false);
+user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
 /* 2609: disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
  * [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#misc
  * [1] https://bugzilla.mozilla.org/1173199 ***/

From 05580f5e99ccbe02646c9062acd137e51b55a8d2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 2 Jun 2020 20:48:41 +0000
Subject: [PATCH 0565/1147] 0709 hotfix, #923, #951

---
 user.js | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/user.js b/user.js
index ade9208..bf9672e 100644
--- a/user.js
+++ b/user.js
@@ -441,6 +441,11 @@ user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
  * [4] https://en.wikipedia.org/wiki/GIO_(software) ***/
 user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
 
+/*** [SECTION 0709]: HOTFIX for FF77, FIXED in FF78 ***/
+/* 0709: disabling UNC can cause extension storage to fail
+ * [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/923 ***/
+user_pref("network.file.disable_unc_paths", false); // [HIDDEN PREF]
+
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
      Change items 0850 and above to suit for privacy vs convenience and functionality. Consider
      your environment (no unwanted eyeballs), your device (restricted access), your device's

From 683ef63b37bbdc3e19787b9a53a0c8547980d857 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 5 Jun 2020 03:08:16 +0000
Subject: [PATCH 0566/1147] RFP alts: prefers-reduced-motion

---
 user.js | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index bf9672e..b71c1e4 100644
--- a/user.js
+++ b/user.js
@@ -1444,7 +1444,7 @@ user_pref("privacy.firstparty.isolate", true);
       FF60: Fix keydown/keyup events (1438795)
  ** 1337157 - disable WebGL debug renderer info (see 4613) (FF60+)
  ** 1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62+)
- ** 1479239 - return "no-preference" with prefers-reduced-motion (FF63+)
+ ** 1479239 - return "no-preference" with prefers-reduced-motion (see 4617) (FF63+)
  ** 1363508 - spoof/suppress Pointer Events (see 4614) (FF64+)
       FF65: pointerEvent.pointerid (1492766)
  ** 1485266 - disable exposure of system colors to CSS or canvas (see 4615) (FF67+)
@@ -1584,6 +1584,10 @@ user_pref("ui.use_standins_for_native_colors", true);
 // 4616: enforce prefers-color-scheme as light [FF67+]
    // 0=light, 1=dark : This overrides your OS value
 user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
+// 4617: enforce prefers-reduced-motion as no-preference [FF63+]
+   // 0=no-preference, 1=reduce
+user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
+
 // * * * /
 // ***/
 

From b07cf1f03dd68dcb5e4c103dce163ecb740e417d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 5 Jun 2020 03:10:09 +0000
Subject: [PATCH 0567/1147] remove extra line from last commit, save one byte

---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index b71c1e4..d7475f0 100644
--- a/user.js
+++ b/user.js
@@ -1587,7 +1587,6 @@ user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
 // 4617: enforce prefers-reduced-motion as no-preference [FF63+]
    // 0=no-preference, 1=reduce
 user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
-
 // * * * /
 // ***/
 

From 9d78e050ee69aa5326bbac5205da840e1ed29678 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 12 Jun 2020 17:39:28 +0000
Subject: [PATCH 0568/1147] 77-beta

---
 user.js | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index d7475f0..add068a 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 24 May 2020
-* version 77-alpha
+* date: 12 Jun 2020
+* version 77-beta
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
@@ -755,8 +755,8 @@ user_pref("security.mixed_content.block_object_subrequest", true);
    // user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
 /* 1263: disable DHE (Diffie-Hellman Key Exchange)
  * [1] https://www.eff.org/deeplinks/2015/10/how-to-protect-yourself-from-nsa-attacks-1024-bit-DH ***/
-   // user_pref("security.ssl3.dhe_rsa_aes_128_sha", false);
-   // user_pref("security.ssl3.dhe_rsa_aes_256_sha", false);
+   // user_pref("security.ssl3.dhe_rsa_aes_128_sha", false); // [DEFAULT: false FF79+]
+   // user_pref("security.ssl3.dhe_rsa_aes_256_sha", false); // [DEFAULT: false FF79+]
 /* 1264: disable the remaining non-modern cipher suites as of FF52 ***/
    // user_pref("security.ssl3.rsa_aes_128_sha", false);
    // user_pref("security.ssl3.rsa_aes_256_sha", false);
@@ -1595,8 +1595,8 @@ user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
      to use RFP (4500) or an extension, in which case they become POINTLESS.
      (a) Many of the components that make up your UA can be derived by other means.
          And when those values differ, you provide more bits and raise entropy.
-         Examples of leaks include navigator objects, date locale/formats, iframes,
-         headers, tcp/ip attributes, feature detection, and **many** more.
+         Examples of leaks include workers, navigator objects, date locale/formats,
+         iframes, headers, tcp/ip attributes, feature detection, and **many** more.
      ALL values below intentionally left blank - use RFP, or get a vetted, tested
          extension and mimic RFP values to *lower* entropy, or randomize to *raise* it
 ***/

From b9100488cb60f863b3b42e0728ebea7c43c6ddfb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 14 Jun 2020 10:26:10 +0000
Subject: [PATCH 0569/1147] 77 final

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index add068a..bf68880 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 12 Jun 2020
-* version 77-beta
+* date: 14 Jun 2020
+* version 77
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
@@ -1078,7 +1078,7 @@ user_pref("javascript.options.wasm", false);
    // user_pref("dom.IntersectionObserver.enabled", false);
 /* 2429: enable (limited but sufficient) window.opener protection [FF65+]
  * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
-user_pref("dom.targetBlankNoOpener.enabled", true);
+user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF78+]
 
 /*** [SECTION 2500]: HARDWARE FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");

From 48f258ff5302ac6cb8421fa6d3788135a682abe6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 14 Jun 2020 10:28:32 +0000
Subject: [PATCH 0570/1147] start 78-alpha

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index bf68880..d6ecb37 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
 * date: 14 Jun 2020
-* version 77
+* version 78-alpha
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From f573200aa8ba37d9941d7ff8fd5e70896a0c0735 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 18 Jun 2020 02:29:54 +0000
Subject: [PATCH 0571/1147] ciphers in ESR78

[1496639](https://bugzilla.mozilla.org/show_bug.cgi?id=1496639)
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index d6ecb37..de76f44 100644
--- a/user.js
+++ b/user.js
@@ -755,8 +755,8 @@ user_pref("security.mixed_content.block_object_subrequest", true);
    // user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
 /* 1263: disable DHE (Diffie-Hellman Key Exchange)
  * [1] https://www.eff.org/deeplinks/2015/10/how-to-protect-yourself-from-nsa-attacks-1024-bit-DH ***/
-   // user_pref("security.ssl3.dhe_rsa_aes_128_sha", false); // [DEFAULT: false FF79+]
-   // user_pref("security.ssl3.dhe_rsa_aes_256_sha", false); // [DEFAULT: false FF79+]
+   // user_pref("security.ssl3.dhe_rsa_aes_128_sha", false); // [DEFAULT: false ESR78 & FF79+]
+   // user_pref("security.ssl3.dhe_rsa_aes_256_sha", false); // [DEFAULT: false ESR78 & FF79+]
 /* 1264: disable the remaining non-modern cipher suites as of FF52 ***/
    // user_pref("security.ssl3.rsa_aes_128_sha", false);
    // user_pref("security.ssl3.rsa_aes_256_sha", false);

From 4be0a80720f4d7af22bc103b3dc075ef55d47d88 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 24 Jun 2020 17:26:25 +0000
Subject: [PATCH 0572/1147] update trac tor tickets (#958)

and some other minor tweaks
---
 user.js | 46 ++++++++++++++++++++++++----------------------
 1 file changed, 24 insertions(+), 22 deletions(-)

diff --git a/user.js b/user.js
index de76f44..0c77f86 100644
--- a/user.js
+++ b/user.js
@@ -177,7 +177,7 @@ user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
  * fallback to the "Current locale" based on your application language
  * [SETTING] General>Language and Appearance>Fonts and Colors>Advanced>Text Encoding for Legacy Content
  * [TEST] https://hsivonen.com/test/moz/check-charset.htm
- * [1] https://trac.torproject.org/projects/tor/ticket/20025 ***/
+ * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/20025 ***/
 user_pref("intl.charset.fallback.override", "windows-1252");
 
 /*** [SECTION 0300]: QUIET FOX
@@ -390,7 +390,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
 /* 0701: disable IPv6
  * IPv6 can be abused, especially regarding MAC addresses. They also do not play nice
  * with VPNs. That's even assuming your ISP and/or router and/or website can handle it.
- * Firefox telemetry (April 2019) shows only 5% of all connections are IPv6
+ * [STATS] Firefox telemetry (June 2020) shows only 5% of all connections are IPv6
  * [NOTE] This is just an application level fallback. Disabling IPv6 is best done at an
  * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
  * then this won't make much difference. If you are masking your IP, then it can only help.
@@ -430,13 +430,13 @@ user_pref("network.proxy.socks_remote_dns", true);
    // user_pref("network.ftp.enabled", false);
 /* 0709: disable using UNC (Uniform Naming Convention) paths [FF61+]
  * [SETUP-CHROME] Can break extensions for profiles on network shares
- * [1] https://trac.torproject.org/projects/tor/ticket/26424 ***/
+ * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/26424 ***/
 user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
 /* 0710: disable GIO as a potential proxy bypass vector
  * Gvfs/GIO has a set of supported protocols like obex, network, archive, computer, dav, cdda,
  * gphoto2, trash, etc. By default only smb and sftp protocols are accepted so far (as of FF64)
  * [1] https://bugzilla.mozilla.org/1433507
- * [2] https://trac.torproject.org/23044
+ * [2] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/23044
  * [3] https://en.wikipedia.org/wiki/GVfs
  * [4] https://en.wikipedia.org/wiki/GIO_(software) ***/
 user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
@@ -653,10 +653,10 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
 user_pref("security.ssl.require_safe_negotiation", true);
 /* 1202: control TLS versions with min and max
  * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
+ * [STATS] Firefox telemetry (June 2020) shows only 0.16% of SSL handshakes use 1.0 or 1.1
  * [WARNING] Leave these at default, otherwise you alter your TLS fingerprint.
- * Firefox telemetry (April 2020) shows only 0.25% of TLS web traffic uses 1.0 or 1.1
  * [1] https://www.ssllabs.com/ssl-pulse/ ***/
-   // user_pref("security.tls.version.min", 3);
+   // user_pref("security.tls.version.min", 3); // [DEFAULT: 3 FF78+]
    // user_pref("security.tls.version.max", 4);
 /* 1203: enforce TLS 1.0 and 1.1 downgrades as session only */
 user_pref("security.tls.version.enable-deprecated", false);
@@ -715,7 +715,7 @@ user_pref("security.pki.sha1_enforcement_level", 1);
  * 0=disable detecting Family Safety mode and importing the root
  * 1=only attempt to detect Family Safety mode (don't import the root)
  * 2=detect Family Safety mode and import the root
- * [1] https://trac.torproject.org/projects/tor/ticket/21686 ***/
+ * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21686 ***/
 user_pref("security.family_safety.mode", 0);
 /* 1222: disable intermediate certificate caching (fingerprinting attack vector) [FF41+] [RESTART]
  * [NOTE] This affects login/cert/key dbs. The effect is all credentials are session-only.
@@ -726,12 +726,12 @@ user_pref("security.family_safety.mode", 0);
  * PKP (Public Key Pinning) 0=disabled 1=allow user MiTM (such as your antivirus), 2=strict
  * [SETUP-WEB] If you rely on an AV (antivirus) to protect your web browsing
  * by inspecting ALL your web traffic, then leave at current default=1
- * [1] https://trac.torproject.org/projects/tor/ticket/16206 ***/
+ * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16206 ***/
 user_pref("security.cert_pinning.enforcement_level", 2);
 
 /** MIXED CONTENT ***/
 /* 1240: disable insecure active content on https pages
- * [1] https://trac.torproject.org/projects/tor/ticket/21323 ***/
+ * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21323 ***/
 user_pref("security.mixed_content.block_active_content", true); // [DEFAULT: true]
 /* 1241: disable insecure passive content (such as images) on https pages [SETUP-WEB] ***/
 user_pref("security.mixed_content.block_display_content", true);
@@ -755,8 +755,8 @@ user_pref("security.mixed_content.block_object_subrequest", true);
    // user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
 /* 1263: disable DHE (Diffie-Hellman Key Exchange)
  * [1] https://www.eff.org/deeplinks/2015/10/how-to-protect-yourself-from-nsa-attacks-1024-bit-DH ***/
-   // user_pref("security.ssl3.dhe_rsa_aes_128_sha", false); // [DEFAULT: false ESR78 & FF79+]
-   // user_pref("security.ssl3.dhe_rsa_aes_256_sha", false); // [DEFAULT: false ESR78 & FF79+]
+   // user_pref("security.ssl3.dhe_rsa_aes_128_sha", false); // [DEFAULT: false FF78+]
+   // user_pref("security.ssl3.dhe_rsa_aes_256_sha", false); // [DEFAULT: false FF78+]
 /* 1264: disable the remaining non-modern cipher suites as of FF52 ***/
    // user_pref("security.ssl3.rsa_aes_128_sha", false);
    // user_pref("security.ssl3.rsa_aes_256_sha", false);
@@ -764,8 +764,10 @@ user_pref("security.mixed_content.block_object_subrequest", true);
 /** UI (User Interface) ***/
 /* 1270: display warning on the padlock for "broken security" (if 1201 is false)
  * Bug: warning padlock not indicated for subresources on a secure page! [2]
+ * [STATS] SSL Labs (June 2020) reports 98.8% of sites have secure renegotiation [3]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
- * [2] https://bugzilla.mozilla.org/1353705 ***/
+ * [2] https://bugzilla.mozilla.org/1353705
+ * [3] https://www.ssllabs.com/ssl-pulse/ ***/
 user_pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
 /* 1271: control "Add Security Exception" dialog on SSL warnings
  * 0=do neither 1=pre-populate url 2=pre-populate url + pre-fetch cert (default)
@@ -789,7 +791,7 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 user_pref("browser.display.use_document_fonts", 0);
 /* 1403: disable icon fonts (glyphs) and local fallback rendering
  * [1] https://bugzilla.mozilla.org/789788
- * [2] https://trac.torproject.org/projects/tor/ticket/8455 ***/
+ * [2] https://gitlab.torproject.org/legacy/trac/-/issues/8455 ***/
    // user_pref("gfx.downloadable_fonts.enabled", false); // [FF41+]
    // user_pref("gfx.downloadable_fonts.fallback_delay", -1);
 /* 1404: disable rendering of SVG OpenType fonts
@@ -962,7 +964,7 @@ user_pref("dom.disable_window_move_resize", true);
  * This stops malicious window sizes and some screen resolution leaks.
  * You can still right-click a link and open in a new window.
  * [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#screen
- * [1] https://trac.torproject.org/projects/tor/ticket/9881 ***/
+ * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
 user_pref("browser.link.open_newwindow", 3);
 user_pref("browser.link.open_newwindow.restriction", 0);
 /* 2204: disable Fullscreen API (requires user interaction) to prevent screen-resolution leaks
@@ -1142,7 +1144,7 @@ user_pref("browser.uitour.url", "");
  * [1] https://github.com/pyllyukko/user.js/issues/179#issuecomment-246468676 ***/
 user_pref("devtools.chrome.enabled", false);
 /* 2608: disable remote debugging
- * [1] https://trac.torproject.org/projects/tor/ticket/16222 ***/
+ * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16222 ***/
 user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
 /* 2609: disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
  * [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#misc
@@ -1154,7 +1156,7 @@ user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
  * [1] https://bugzilla.mozilla.org/1216893 ***/
    // user_pref("svg.disabled", true);
 /* 2611: disable middle mouse click opening links from clipboard
- * [1] https://trac.torproject.org/projects/tor/ticket/10089 ***/
+ * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/10089 ***/
 user_pref("middlemouse.contentLoadURL", false);
 /* 2614: limit HTTP redirects (this does not control redirects with HTML meta tags or JS)
  * [NOTE] A low setting of 5 or under will probably break some sites (e.g. gmail logins)
@@ -1507,8 +1509,8 @@ user_pref("_user.js.parrot", "4600 syntax error: the parrot's crossed the Jordan
 // 4601: [2514] spoof (or limit?) number of CPU cores [FF48+]
    // [NOTE] *may* affect core chrome/Firefox performance, will affect content.
    // [1] https://bugzilla.mozilla.org/1008453
-   // [2] https://trac.torproject.org/projects/tor/ticket/21675
-   // [3] https://trac.torproject.org/projects/tor/ticket/22127
+   // [2] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21675
+   // [3] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/22127
    // [4] https://html.spec.whatwg.org/multipage/workers.html#navigator.hardwareconcurrency
    // user_pref("dom.maxHardwareConcurrency", 2);
 // * * * /
@@ -1520,7 +1522,7 @@ user_pref("dom.enable_resource_timing", false);
 user_pref("dom.enable_performance", false);
 // 4604: [2512] disable device sensor API
    // Optional protection depending on your device
-   // [1] https://trac.torproject.org/projects/tor/ticket/15758
+   // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/15758
    // [2] https://blog.lukaszolejnik.com/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api/
    // [3] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1357733,1292751
    // user_pref("device.sensors.enabled", false);
@@ -1531,7 +1533,7 @@ user_pref("dom.enable_performance", false);
 user_pref("browser.zoom.siteSpecific", false);
 // 4606: [2501] disable gamepad API - USB device ID enumeration
    // Optional protection depending on your connected devices
-   // [1] https://trac.torproject.org/projects/tor/ticket/13023
+   // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/13023
    // user_pref("dom.gamepad.enabled", false);
 // 4607: [2503] disable giving away network info [FF31+]
    // e.g. bluetooth, cellular, ethernet, wifi, wimax, other, mixed, unknown, none
@@ -1547,7 +1549,7 @@ user_pref("media.webspeech.synth.enabled", false);
 // * * * /
 // FF57+
 // 4610: [2506] disable video statistics - JS performance fingerprinting [FF25+]
-   // [1] https://trac.torproject.org/projects/tor/ticket/15757
+   // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/15757
    // [2] https://bugzilla.mozilla.org/654550
 user_pref("media.video_stats.enabled", false);
 // 4611: [2509] disable touch events
@@ -1555,7 +1557,7 @@ user_pref("media.video_stats.enabled", false);
    // 0=disabled, 1=enabled, 2=autodetect
    // Optional protection depending on your device
    // [1] https://developer.mozilla.org/docs/Web/API/Touch_events
-   // [2] https://trac.torproject.org/projects/tor/ticket/10286
+   // [2] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/10286
    // user_pref("dom.w3c_touch_events.enabled", 0);
 // * * * /
 // FF59+

From 77ecef8be3a0a6b1a0f32c9d9ef501478065b00f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Jun 2020 12:16:57 +0000
Subject: [PATCH 0573/1147] 78 deprecated, add 2032 (#962)

---
 user.js | 15 ++++++++++++---
 1 file changed, 12 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 0c77f86..f3b08b6 100644
--- a/user.js
+++ b/user.js
@@ -943,8 +943,10 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
  * [NOTE] You can set exceptions under site permissions
  * [SETTING] Privacy & Security>Permissions>Autoplay>Settings>Default for all websites ***/
    // user_pref("media.autoplay.default", 5);
-/* 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] ***/
-user_pref("media.autoplay.enabled.user-gestures-needed", false);
+/* 2031: disable autoplay of HTML5 media if you interacted with the site [FF78+]
+ * 0=sticky (default), 1=transient, 2=user
+ * [1] https://html.spec.whatwg.org/multipage/interaction.html#sticky-activation ***/
+user_pref("media.autoplay.blocking_policy", 2);
 
 /*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/
 user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
@@ -1635,7 +1637,6 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("full-screen-api.warning.timeout", 0);
 /* APPEARANCE ***/
    // user_pref("browser.download.autohideButton", false); // [FF57+]
-   // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
    // user_pref("toolkit.legacyUserProfileCustomizations.stylesheets", true); // [FF68+] allow userChrome/userContent
 /* CONTENT BEHAVIOR ***/
    // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
@@ -1743,6 +1744,14 @@ user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozi
    // [-] https://bugzilla.mozilla.org/1603007
 user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false);
 // * * * /
+// FF78
+// 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] - replaced by 'media.autoplay.blocking_policy'
+   // [-] https://bugzilla.mozilla.org/1509933
+user_pref("media.autoplay.enabled.user-gestures-needed", false);
+// 5000's: disable chrome animations - replaced FF77+ by 'ui.prefersReducedMotion' (4617)
+   // [-] https://bugzilla.mozilla.org/1640501
+   // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
+// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From aaf6cb33d7d74b6e8b4e0384254745719ab42d5c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Jun 2020 12:37:32 +0000
Subject: [PATCH 0574/1147] 4617 restart

- at least for disabling chrome animations
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index f3b08b6..73c3b03 100644
--- a/user.js
+++ b/user.js
@@ -1588,7 +1588,7 @@ user_pref("ui.use_standins_for_native_colors", true);
 // 4616: enforce prefers-color-scheme as light [FF67+]
    // 0=light, 1=dark : This overrides your OS value
 user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
-// 4617: enforce prefers-reduced-motion as no-preference [FF63+]
+// 4617: enforce prefers-reduced-motion as no-preference [FF63+] [RESTART]
    // 0=no-preference, 1=reduce
 user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
 // * * * /

From 488a82562601d6cddb045347e5ae7d734e0a49dd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Jun 2020 15:48:13 +0000
Subject: [PATCH 0575/1147] update weak ciphers/tests etc, closes #931 (#963)

- adds the new tests including the non-JS JA3

Co-authored-by: rusty-snake <41237666+rusty-snake@users.noreply.github.com>
Co-authored-by: earthlng <earthlng@users.noreply.github.com>
---
 user.js | 25 +++++++++++++++++--------
 1 file changed, 17 insertions(+), 8 deletions(-)

diff --git a/user.js b/user.js
index 73c3b03..4af746f 100644
--- a/user.js
+++ b/user.js
@@ -637,6 +637,8 @@ user_pref("browser.shell.shortcutFavicons", false);
 /*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
    Your cipher and other settings can be used in server side fingerprinting
    [TEST] https://www.ssllabs.com/ssltest/viewMyClient.html
+   [TEST] https://browserleaks.com/ssl
+   [TEST] https://ja3er.com/
    [1] https://www.securityartwork.es/2017/02/02/tls-client-fingerprinting-with-bro/
 ***/
 user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
@@ -744,22 +746,29 @@ user_pref("security.mixed_content.block_object_subrequest", true);
    // user_pref("dom.security.https_only_mode", true); // [FF76+]
    // user_pref("dom.security.https_only_mode.upgrade_local", true); // [FF77+]
 
-/** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro] ***/
-/* 1261: disable 3DES (effective key size < 128)
+/** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro]
+ * These are all the ciphers still using SHA-1 and CBC which are weaker than the available alternatives. (see "Cipher Suites" in [1])
+ * Additionally some have other weaknesses like key sizes of 128 (or lower) [2] and/or no Perfect Forward Secrecy [3].
+ * [1] https://browserleaks.com/ssl
+ * [2] https://en.wikipedia.org/wiki/Key_size
+ * [3] https://en.wikipedia.org/wiki/Forward_secrecy
+ ***/
+/* 1261: disable 3DES (effective key size < 128 and no PFS)
  * [1] https://en.wikipedia.org/wiki/3des#Security
  * [2] https://en.wikipedia.org/wiki/Meet-in-the-middle_attack
  * [3] https://www-archive.mozilla.org/projects/security/pki/nss/ssl/fips-ssl-ciphersuites.html ***/
    // user_pref("security.ssl3.rsa_des_ede3_sha", false);
-/* 1262: disable 128 bits ***/
-   // user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
-   // user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
 /* 1263: disable DHE (Diffie-Hellman Key Exchange)
  * [1] https://www.eff.org/deeplinks/2015/10/how-to-protect-yourself-from-nsa-attacks-1024-bit-DH ***/
    // user_pref("security.ssl3.dhe_rsa_aes_128_sha", false); // [DEFAULT: false FF78+]
    // user_pref("security.ssl3.dhe_rsa_aes_256_sha", false); // [DEFAULT: false FF78+]
-/* 1264: disable the remaining non-modern cipher suites as of FF52 ***/
-   // user_pref("security.ssl3.rsa_aes_128_sha", false);
-   // user_pref("security.ssl3.rsa_aes_256_sha", false);
+/* 1264: disable the remaining non-modern cipher suites as of FF78 (in order of preferred by FF) ***/
+   // user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false);
+   // user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
+   // user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
+   // user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false);
+   // user_pref("security.ssl3.rsa_aes_128_sha", false); // no PFS
+   // user_pref("security.ssl3.rsa_aes_256_sha", false); // no PFS
 
 /** UI (User Interface) ***/
 /* 1270: display warning on the padlock for "broken security" (if 1201 is false)

From 618f7bed3f693f0931689740b2ce540e64b0e651 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 29 Jun 2020 15:49:11 +0000
Subject: [PATCH 0576/1147] 0850a: add top sites FF78+

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 4af746f..5260324 100644
--- a/user.js
+++ b/user.js
@@ -495,11 +495,12 @@ user_pref("browser.urlbar.usepreloadedtopurls.enabled", false);
  * [1] https://bugzilla.mozilla.org/1348275 ***/
 user_pref("browser.urlbar.speculativeConnect.enabled", false);
 /* 0850a: disable location bar suggestion types
- * If all three suggestion types are false, search engine keywords are disabled
+ * If the first three suggestion types are false, search engine keywords are disabled
  * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest ***/
    // user_pref("browser.urlbar.suggest.history", false);
    // user_pref("browser.urlbar.suggest.bookmark", false);
    // user_pref("browser.urlbar.suggest.openpage", false);
+   // user_pref("browser.urlbar.suggest.topsites", false); // [FF78+]
 /* 0850c: disable location bar dropdown
  * This value controls the total number of entries to appear in the location bar dropdown
  * [NOTE] Items (bookmarks/history/openpages) with a high "frecency"/"bonus" will always

From b5b04454e0710920ce3ad427c50eeeb904a22842 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 1 Jul 2020 03:46:52 +0000
Subject: [PATCH 0577/1147] 0850a search keywords fixup

---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 5260324..abd98a3 100644
--- a/user.js
+++ b/user.js
@@ -495,7 +495,6 @@ user_pref("browser.urlbar.usepreloadedtopurls.enabled", false);
  * [1] https://bugzilla.mozilla.org/1348275 ***/
 user_pref("browser.urlbar.speculativeConnect.enabled", false);
 /* 0850a: disable location bar suggestion types
- * If the first three suggestion types are false, search engine keywords are disabled
  * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest ***/
    // user_pref("browser.urlbar.suggest.history", false);
    // user_pref("browser.urlbar.suggest.bookmark", false);

From 3d18af19e3936beecca8506dc57319a428b98dc2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 5 Jul 2020 14:02:25 +0000
Subject: [PATCH 0578/1147] various, #959 (#967)

Co-authored-by: rusty-snake
---
 user.js | 12 +++++++++---
 1 file changed, 9 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index abd98a3..e6916a0 100644
--- a/user.js
+++ b/user.js
@@ -125,6 +125,9 @@ user_pref("browser.newtabpage.activity-stream.showSponsored", false);
 user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false); // [FF66+]
 /* 0105d: disable Activity Stream recent Highlights in the Library [FF57+] ***/
    // user_pref("browser.library.activity-stream.enabled", false);
+/* 0105e: clear default topsites
+ * [NOTE] This does not block you from adding your own ***/
+user_pref("browser.newtabpage.activity-stream.default.sites", "");
 /* 0110: start Firefox in PB (Private Browsing) mode
  * [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed
  * [WARNING] The P in PB mode is misleading: it means no "persistent" disk storage such as history,
@@ -175,7 +178,7 @@ user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 /* 0212: enforce fallback text encoding to match en-US
  * When the content or server doesn't declare a charset the browser will
  * fallback to the "Current locale" based on your application language
- * [SETTING] General>Language and Appearance>Fonts and Colors>Advanced>Text Encoding for Legacy Content
+ * [SETTING] General>Language and Appearance>Fonts and Colors>Advanced>Text Encoding for Legacy Content (FF72-)
  * [TEST] https://hsivonen.com/test/moz/check-charset.htm
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/20025 ***/
 user_pref("intl.charset.fallback.override", "windows-1252");
@@ -205,7 +208,7 @@ user_pref("app.update.auto", false);
    // user_pref("extensions.getAddons.cache.enabled", false);
 /* 0308: disable search engine updates (e.g. OpenSearch)
  * [NOTE] This does not affect Mozilla's built-in or Web Extension search engines
- * [SETTING] General>Firefox Updates>Automatically update search engines ***/
+ * [SETTING] General>Firefox Updates>Automatically update search engines (FF72-) ***/
 user_pref("browser.search.update", false);
 /* 0309: disable sending Flash crash reports ***/
 user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
@@ -1502,6 +1505,9 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
  * When default true (FF62+) this no longer masks the RFP chrome resizing activity
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
+/* 4520: disable chrome animations [FF77+] [RESTART]
+ * [NOTE] pref added in FF63, but applied to chrome in FF77. RFP spoofs this for web content ***/
+user_pref("ui.prefersReducedMotion", 1); // [HIDDEN PREF]
 
 /*** [SECTION 4600]: RFP ALTERNATIVES
    * non-RFP users:
@@ -1757,7 +1763,7 @@ user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false);
 // 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] - replaced by 'media.autoplay.blocking_policy'
    // [-] https://bugzilla.mozilla.org/1509933
 user_pref("media.autoplay.enabled.user-gestures-needed", false);
-// 5000's: disable chrome animations - replaced FF77+ by 'ui.prefersReducedMotion' (4617)
+// 5000's: disable chrome animations - replaced FF77+ by 'ui.prefersReducedMotion' (4520)
    // [-] https://bugzilla.mozilla.org/1640501
    // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
 // * * * /

From d0060fed3cf52008178dc11271018b5296dfb2e0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 8 Jul 2020 13:18:38 +0000
Subject: [PATCH 0579/1147] 2031: use exceptions if you need to, #969

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index e6916a0..3875297 100644
--- a/user.js
+++ b/user.js
@@ -957,6 +957,7 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
    // user_pref("media.autoplay.default", 5);
 /* 2031: disable autoplay of HTML5 media if you interacted with the site [FF78+]
  * 0=sticky (default), 1=transient, 2=user
+ * [NOTE] If you have trouble with some video sites, then add an exception (see 2030)
  * [1] https://html.spec.whatwg.org/multipage/interaction.html#sticky-activation ***/
 user_pref("media.autoplay.blocking_policy", 2);
 

From 1a389c021417833ccd688a52d05cd4b0b08734fa Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 10 Jul 2020 10:09:13 +0000
Subject: [PATCH 0580/1147] dnsResolveSingleWordsAfterSearch (#968)

---
 user.js | 10 +++++++---
 1 file changed, 7 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 3875297..ed5857e 100644
--- a/user.js
+++ b/user.js
@@ -461,9 +461,8 @@ user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
 /* 0801: disable location bar using search
  * Don't leak URL typos to a search engine, give an error message instead.
  * Examples: "secretplace,com", "secretplace/com", "secretplace com", "secret place.com"
- * [NOTE] Search buttons in the dropdown work, but hitting 'enter' in the location bar will fail
- * [TIP] You can add keywords to search engines in options (e.g. 'd' for DuckDuckGo) and
- * the dropdown will now auto-select it and you can then hit 'enter' and it will work
+ * [NOTE] This does **not** affect explicit user action such as using search buttons in the
+ * dropdown, or using keyword search shortcuts you configure in options (e.g. 'd' for DuckDuckGo)
  * [SETUP-CHROME] If you don't, or rarely, type URLs, or you use a default search
  * engine that respects privacy, then you probably don't need this ***/
 user_pref("keyword.enabled", false);
@@ -497,6 +496,11 @@ user_pref("browser.urlbar.usepreloadedtopurls.enabled", false);
 /* 0810: disable location bar making speculative connections [FF56+]
  * [1] https://bugzilla.mozilla.org/1348275 ***/
 user_pref("browser.urlbar.speculativeConnect.enabled", false);
+/* 0811: disable location bar leaking single words to a DNS provider **after searching** [FF78+]
+ * 0=never resolve single words, 1=heuristic (default), 2=always resolve
+ * [NOTE] For FF78 value 1 and 2 are the same and always resolve but that will change in future versions
+ * [1] https://bugzilla.mozilla.org/1642623 ***/
+user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
 /* 0850a: disable location bar suggestion types
  * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest ***/
    // user_pref("browser.urlbar.suggest.history", false);

From 84997386c1d1d8a08c336a52b588d0d416188e37 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 20 Jul 2020 05:24:18 +0000
Subject: [PATCH 0581/1147] 78-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index ed5857e..bbcf796 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 14 Jun 2020
-* version 78-alpha
+* date: 20 Jul 2020
+* version 78-beta
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From fe0af3bb348fb996d4635ad87d1c4f22b2a3b557 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 21 Jul 2020 10:40:01 +0000
Subject: [PATCH 0582/1147] remove 0709 duplicate, 78 final

---
 user.js | 9 ++-------
 1 file changed, 2 insertions(+), 7 deletions(-)

diff --git a/user.js b/user.js
index bbcf796..e323e8d 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 20 Jul 2020
-* version 78-beta
+* date: 21 Jul 2020
+* version 78
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
@@ -444,11 +444,6 @@ user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
  * [4] https://en.wikipedia.org/wiki/GIO_(software) ***/
 user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
 
-/*** [SECTION 0709]: HOTFIX for FF77, FIXED in FF78 ***/
-/* 0709: disabling UNC can cause extension storage to fail
- * [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/923 ***/
-user_pref("network.file.disable_unc_paths", false); // [HIDDEN PREF]
-
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
      Change items 0850 and above to suit for privacy vs convenience and functionality. Consider
      your environment (no unwanted eyeballs), your device (restricted access), your device's

From 46d03279d3e44ee94f1968992ad4eafcce68ce92 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 22 Jul 2020 12:35:13 +0000
Subject: [PATCH 0583/1147] 79 start, fixup 2429 default info

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index e323e8d..9a5cdd9 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 21 Jul 2020
-* version 78
+* date: 22 Jul 2020
+* version 79-alpha
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
@@ -1094,7 +1094,7 @@ user_pref("javascript.options.wasm", false);
    // user_pref("dom.IntersectionObserver.enabled", false);
 /* 2429: enable (limited but sufficient) window.opener protection [FF65+]
  * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
-user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF78+]
+user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
 
 /*** [SECTION 2500]: HARDWARE FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");

From df21798b81d5665e69f2dde2928ff6a5032ab555 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Jul 2020 10:53:25 +0000
Subject: [PATCH 0584/1147] Delete
 ghacks-clear-FF68inclusive-[RFP-alternatives].js

---
 ...-clear-FF68inclusive-[RFP-alternatives].js | 61 -------------------
 1 file changed, 61 deletions(-)
 delete mode 100644 scratchpad-scripts/ghacks-clear-FF68inclusive-[RFP-alternatives].js

diff --git a/scratchpad-scripts/ghacks-clear-FF68inclusive-[RFP-alternatives].js b/scratchpad-scripts/ghacks-clear-FF68inclusive-[RFP-alternatives].js
deleted file mode 100644
index dd315d6..0000000
--- a/scratchpad-scripts/ghacks-clear-FF68inclusive-[RFP-alternatives].js
+++ /dev/null
@@ -1,61 +0,0 @@
-/***
- This will reset the preferences that are under sections 4600 & 4700 in the ghacks user.js
- up to and including Firefox/ESR 68. These are the prefs that are no longer necessary,
- or they conflict with, privacy.resistFingerprinting if you have that enabled.
-
- For instructions see:
- https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
-***/
- 
-(function() {
-  let ops = [
-    /* section 4600 */
-    'dom.maxHardwareConcurrency',
-    'dom.enable_resource_timing',
-    'dom.enable_performance',
-    'device.sensors.enabled',
-    'browser.zoom.siteSpecific',
-    'dom.gamepad.enabled',
-    'dom.netinfo.enabled',
-    'media.webspeech.synth.enabled',
-    'media.video_stats.enabled',
-    'dom.w3c_touch_events.enabled',
-    'media.ondevicechange.enabled',
-    'webgl.enable-debug-renderer-info',
-    'dom.w3c_pointer_events.enabled',
-    'ui.use_standins_for_native_colors',
-    /* section 4700 */
-    'general.useragent.override',
-    'general.buildID.override',
-    'general.appname.override',
-    'general.appversion.override',
-    'general.platform.override',
-    'general.oscpu.override',
-    /* reset parrot: check your open about:config after running the script */
-    '_user.js.parrot'
-  ]
-
-  if("undefined" === typeof(Services)) {
-    alert("about:config needs to be the active tab!");
-    return;
-  }
-  
-  let c = 0;
-  for (let i = 0, len = ops.length; i < len; i++) {
-    if (Services.prefs.prefHasUserValue(ops[i])) {   
-      Services.prefs.clearUserPref(ops[i]);
-      if (!Services.prefs.prefHasUserValue(ops[i])) {
-        console.log("reset", ops[i]);
-        c++;
-      } else { console.log("failed to reset", ops[i]); }
-    }
-  }
-  
-  focus();
-  
-  let d = (c==1) ? " pref" : " prefs";
-  if (c > 0) {
-    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
-  } else { alert("nothing to reset"); }
-  
-})();

From 892b3d9d69938516cb81549b3bb68ab71bcfb2dd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Jul 2020 10:53:38 +0000
Subject: [PATCH 0585/1147] Delete ghacks-clear-FF68inclusive-[deprecated].js

---
 ...ghacks-clear-FF68inclusive-[deprecated].js | 221 ------------------
 1 file changed, 221 deletions(-)
 delete mode 100644 scratchpad-scripts/ghacks-clear-FF68inclusive-[deprecated].js

diff --git a/scratchpad-scripts/ghacks-clear-FF68inclusive-[deprecated].js b/scratchpad-scripts/ghacks-clear-FF68inclusive-[deprecated].js
deleted file mode 100644
index a3005e0..0000000
--- a/scratchpad-scripts/ghacks-clear-FF68inclusive-[deprecated].js
+++ /dev/null
@@ -1,221 +0,0 @@
-/***
- This will reset the preferences that have been deprecated by Mozilla
- and used in the ghacks user.js up to and including Firefox/ESR 68
-
- It is in reverse order, so feel free to remove sections that do not apply
-
- For instructions see:
- https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
-***/
-
-(function() {
-  let ops = [
-    /* deprecated */
-
-    /* 68 */
-    'browser.newtabpage.activity-stream.disableSnippets',
-    'browser.aboutHomeSnippets.updateUrl',
-    'lightweightThemes.update.enabled',
-    'security.csp.experimentalEnabled',
-    /* F67 */
-    'dom.event.highrestimestamp.enabled',
-    'browser.newtabpage.activity-stream.asrouter.userprefs.cfr',
-    /* 66 */
-    'browser.chrome.errorReporter.enabled',
-    'browser.chrome.errorReporter.submitUrl',
-    'network.allow-experiments',
-    /* 65 */
-    'browser.urlbar.autocomplete.enabled',
-    'browser.fixup.hide_user_pass',
-    /* 64 */
-    'browser.onboarding.enabled',
-    'devtools.webide.autoinstallADBHelper',
-    'devtools.webide.adbAddonURL',
-    'security.csp.enable_violation_events',
-    /* 63 */
-    'browser.search.countryCode',
-    'app.update.enabled',
-    'shield.savant.enabled',
-    'browser.chrome.favicons',
-    'media.autoplay.enabled',
-    'network.cookie.lifetime.days',
-    'browser.ctrlTab.previews',
-    /* 62 */
-    'plugin.state.java',
-    /* 61 */
-    'experiments.enabled',
-    'experiments.manifest.uri',
-    'experiments.supported',
-    'experiments.activeExperiment',
-    'network.jar.block-remote-files',
-    'network.jar.open-unsafe-types',
-    /* 60 */
-    'browser.newtabpage.directory.source',
-    'browser.newtabpage.enhanced',
-    'browser.newtabpage.introShown',
-    'extensions.shield-recipe-client.enabled',
-    'extensions.shield-recipe-client.api_url',
-    'browser.newtabpage.activity-stream.enabled',
-    'dom.workers.enabled',
-    /* 59 */
-    'intl.locale.matchOS',
-    'general.useragent.locale',
-    'datareporting.healthreport.about.reportUrl',
-    'dom.flyweb.enabled',
-    'security.mixed_content.use_hsts',
-    'security.mixed_content.send_hsts_priming',
-    'network.http.referer.userControlPolicy',
-    'security.xpconnect.plugin.unrestricted',
-    'media.getusermedia.screensharing.allowed_domains',
-    'camera.control.face_detection.enabled',
-    'dom.disable_window_status_change',
-    'dom.idle-observers-api.enabled',
-    /* 58 */
-    'browser.crashReports.unsubmittedCheck.autoSubmit',
-    /* 57 */
-    'social.whitelist',
-    'social.toast-notifications.enabled',
-    'social.shareDirectory',
-    'social.remote-install.enabled',
-    'social.directories',
-    'social.share.activationPanelEnabled',
-    'social.enabled',
-    'media.eme.chromium-api.enabled',
-    'devtools.webide.autoinstallFxdtAdapters',
-    'browser.casting.enabled',
-    'browser.bookmarks.showRecentlyBookmarked',
-    /* 56 */
-    'extensions.screenshots.system-disabled',
-    'extensions.formautofill.experimental',
-    /* 55 */
-    'geo.security.allowinsecure',
-    'browser.selfsupport.enabled',
-    'browser.selfsupport.url',
-    'browser.newtabpage.directory.ping',
-    'browser.formfill.saveHttpsForms',
-    'browser.formautofill.enabled',
-    'dom.enable_user_timing',
-    'dom.keyboardevent.code.enabled',
-    'browser.tabs.animate',
-    'browser.fullscreen.animate',
-    /* 54 */
-    'browser.safebrowsing.reportMalwareMistakeURL',
-    'browser.safebrowsing.reportPhishMistakeURL',
-    'media.eme.apiVisible',
-    'dom.archivereader.enabled',
-    /* 53 */
-    'security.tls.unrestricted_rc4_fallback',
-    'plugin.scan.Acrobat',
-    'plugin.scan.Quicktime',
-    'plugin.scan.WindowsMediaPlayer',
-    'media.getusermedia.screensharing.allow_on_old_platforms',
-    'dom.beforeAfterKeyboardEvent.enabled',
-    /* 52 */
-    'network.http.sendSecureXSiteReferrer',
-    'media.gmp-eme-adobe.enabled',
-    'media.gmp-eme-adobe.visible',
-    'media.gmp-eme-adobe.autoupdate',
-    'dom.telephony.enabled',
-    'dom.battery.enabled',
-    /* 51 */
-    'media.block-play-until-visible',
-    'dom.vr.oculus050.enabled',
-    'network.http.spdy.enabled.v3-1',
-    /* 50 */
-    'browser.usedOnWindows10.introURL',
-    'plugins.update.notifyUser',
-    'browser.safebrowsing.enabled',
-    'security.ssl3.ecdhe_ecdsa_rc4_128_sha',
-    'security.ssl3.ecdhe_rsa_rc4_128_sha',
-    'security.ssl3.rsa_rc4_128_md5',
-    'security.ssl3.rsa_rc4_128_sha',
-    'plugins.update.url',
-    /* 49 */
-    'loop.enabled',
-    'loop.server',
-    'loop.feedback.formURL',
-    'loop.feedback.manualFormURL',
-    'loop.facebook.appId',
-    'loop.facebook.enabled',
-    'loop.facebook.fallbackUrl',
-    'loop.facebook.shareUrl',
-    'loop.logDomains',
-    'dom.disable_window_open_feature.scrollbars',
-    'dom.push.udp.wakeupEnabled',
-    /* 48 */
-    'browser.urlbar.unifiedcomplete',
-    /* 47 */
-    'toolkit.telemetry.unifiedIsOptIn',
-    'datareporting.healthreport.about.reportUrlUnified',
-    'browser.history.allowPopState',
-    'browser.history.allowPushState',
-    'browser.history.allowReplaceState',
-    /* 46 */
-    'datareporting.healthreport.service.enabled',
-    'datareporting.healthreport.documentServerURI',
-    'datareporting.policy.dataSubmissionEnabled.v2',
-    'browser.safebrowsing.appRepURL',
-    'browser.polaris.enabled',
-    'browser.pocket.enabled',
-    'browser.pocket.api',
-    'browser.pocket.site',
-    'browser.pocket.oAuthConsumerKey',
-    /* 45 */
-    'browser.sessionstore.privacy_level_deferred',
-    /* 44 */
-    'browser.safebrowsing.provider.google.appRepURL',
-    'security.tls.insecure_fallback_hosts.use_static_list',
-    'dom.workers.sharedWorkers.enabled',
-    'dom.disable_image_src_set',
-    /* 43 */
-    'browser.safebrowsing.gethashURL',
-    'browser.safebrowsing.updateURL',
-    'browser.safebrowsing.malware.reportURL',
-    'browser.trackingprotection.gethashURL',
-    'browser.trackingprotection.updateURL',
-    'pfs.datasource.url',
-    'browser.search.showOneOffButtons',
-    /* 42 and earlier */
-    'privacy.clearOnShutdown.passwords', // 42
-    'full-screen-api.approval-required', // 42
-    'browser.safebrowsing.reportErrorURL', // 41
-    'browser.safebrowsing.reportGenericURL', // 41
-    'browser.safebrowsing.reportMalwareErrorURL', // 41
-    'browser.safebrowsing.reportMalwareURL', // 41
-    'browser.safebrowsing.reportURL', // 41
-    'plugins.enumerable_names', // 41
-    'network.http.spdy.enabled.http2draft', // 41
-    'camera.control.autofocus_moving_callback.enabled', // 37
-    'privacy.donottrackheader.value', // 36
-    'network.websocket.enabled', // 35
-    'dom.network.enabled', // 31
-    'pageThumbs.enabled', // 25
-
-    /* reset parrot: check your open about:config after running the script */
-    '_user.js.parrot'
-  ]
-
-  if("undefined" === typeof(Services)) {
-    alert("about:config needs to be the active tab!");
-    return;
-  }
-  
-  let c = 0;
-  for (let i = 0, len = ops.length; i < len; i++) {
-    if (Services.prefs.prefHasUserValue(ops[i])) {   
-      Services.prefs.clearUserPref(ops[i]);
-      if (!Services.prefs.prefHasUserValue(ops[i])) {
-        console.log("reset", ops[i]);
-        c++;
-      } else { console.log("failed to reset", ops[i]); }
-    }
-  }
-  
-  focus();
-  
-  let d = (c==1) ? " pref" : " prefs";
-  if (c > 0) {
-    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
-  } else { alert("nothing to reset"); }
-  
-})();

From 24c228df922649e74acfc4b6474926beba50c98f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Jul 2020 10:57:12 +0000
Subject: [PATCH 0586/1147] update to ESR78

---
 scratchpad-scripts/ghacks-clear-deprecated.js | 248 ++++++++++++++++++
 1 file changed, 248 insertions(+)
 create mode 100644 scratchpad-scripts/ghacks-clear-deprecated.js

diff --git a/scratchpad-scripts/ghacks-clear-deprecated.js b/scratchpad-scripts/ghacks-clear-deprecated.js
new file mode 100644
index 0000000..e3ab4e1
--- /dev/null
+++ b/scratchpad-scripts/ghacks-clear-deprecated.js
@@ -0,0 +1,248 @@
+/***
+ Version: up to and including FF/ESR78
+
+ This will reset the preferences that have been deprecated by Mozilla
+ and used in the ghacks user.js
+
+ It is in reverse order, so feel free to remove sections that do not apply
+
+ For instructions see:
+ https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
+***/
+
+(function() {
+  let ops = [
+    /* deprecated */
+
+    /* 78 */
+    'media.autoplay.enabled.user-gestures-needed',
+    'toolkit.cosmeticAnimations.enabled',
+    /* 77 */
+    'browser.urlbar.oneOffSearches',
+    'browser.tabs.remote.allowLinkedWebInFileUriProcess',
+    /* 76 */
+    'extensions.blocklist.url',
+    /* 74 */
+    'geo.wifi.uri',
+    'geo.wifi.logging.enabled',
+    'privacy.userContext.longPressBehavior',
+    'webgl.disable-extensions',
+    /* 72 */
+    'browser.newtabpage.activity-stream.telemetry.ping.endpoint',
+    'toolkit.telemetry.hybridContent.enabled',
+    'dom.indexedDB.enabled',
+    /* 71 */
+    'devtools.webide.enabled',
+    'devtools.webide.autoinstallADBExtension',
+    'offline-apps.allow_by_default',
+    /* 69 */
+    'gfx.downloadable_fonts.woff2.enabled',
+    'plugins.click_to_play',
+    'media.autoplay.allow-muted',
+    /* 68 */
+    'browser.newtabpage.activity-stream.disableSnippets',
+    'browser.aboutHomeSnippets.updateUrl',
+    'lightweightThemes.update.enabled',
+    'security.csp.experimentalEnabled',
+    /* F67 */
+    'dom.event.highrestimestamp.enabled',
+    'browser.newtabpage.activity-stream.asrouter.userprefs.cfr',
+    /* 66 */
+    'browser.chrome.errorReporter.enabled',
+    'browser.chrome.errorReporter.submitUrl',
+    'network.allow-experiments',
+    /* 65 */
+    'browser.urlbar.autocomplete.enabled',
+    'browser.fixup.hide_user_pass',
+    /* 64 */
+    'browser.onboarding.enabled',
+    'devtools.webide.autoinstallADBHelper',
+    'devtools.webide.adbAddonURL',
+    'security.csp.enable_violation_events',
+    /* 63 */
+    'browser.search.countryCode',
+    'app.update.enabled',
+    'shield.savant.enabled',
+    'browser.chrome.favicons',
+    'media.autoplay.enabled',
+    'network.cookie.lifetime.days',
+    'browser.ctrlTab.previews',
+    /* 62 */
+    'plugin.state.java',
+    /* 61 */
+    'experiments.enabled',
+    'experiments.manifest.uri',
+    'experiments.supported',
+    'experiments.activeExperiment',
+    'network.jar.block-remote-files',
+    'network.jar.open-unsafe-types',
+    /* 60 */
+    'browser.newtabpage.directory.source',
+    'browser.newtabpage.enhanced',
+    'browser.newtabpage.introShown',
+    'extensions.shield-recipe-client.enabled',
+    'extensions.shield-recipe-client.api_url',
+    'browser.newtabpage.activity-stream.enabled',
+    'dom.workers.enabled',
+    /* 59 */
+    'intl.locale.matchOS',
+    'general.useragent.locale',
+    'datareporting.healthreport.about.reportUrl',
+    'dom.flyweb.enabled',
+    'security.mixed_content.use_hsts',
+    'security.mixed_content.send_hsts_priming',
+    'network.http.referer.userControlPolicy',
+    'security.xpconnect.plugin.unrestricted',
+    'media.getusermedia.screensharing.allowed_domains',
+    'camera.control.face_detection.enabled',
+    'dom.disable_window_status_change',
+    'dom.idle-observers-api.enabled',
+    /* 58 */
+    'browser.crashReports.unsubmittedCheck.autoSubmit',
+    /* 57 */
+    'social.whitelist',
+    'social.toast-notifications.enabled',
+    'social.shareDirectory',
+    'social.remote-install.enabled',
+    'social.directories',
+    'social.share.activationPanelEnabled',
+    'social.enabled',
+    'media.eme.chromium-api.enabled',
+    'devtools.webide.autoinstallFxdtAdapters',
+    'browser.casting.enabled',
+    'browser.bookmarks.showRecentlyBookmarked',
+    /* 56 */
+    'extensions.screenshots.system-disabled',
+    'extensions.formautofill.experimental',
+    /* 55 */
+    'geo.security.allowinsecure',
+    'browser.selfsupport.enabled',
+    'browser.selfsupport.url',
+    'browser.newtabpage.directory.ping',
+    'browser.formfill.saveHttpsForms',
+    'browser.formautofill.enabled',
+    'dom.enable_user_timing',
+    'dom.keyboardevent.code.enabled',
+    'browser.tabs.animate',
+    'browser.fullscreen.animate',
+    /* 54 */
+    'browser.safebrowsing.reportMalwareMistakeURL',
+    'browser.safebrowsing.reportPhishMistakeURL',
+    'media.eme.apiVisible',
+    'dom.archivereader.enabled',
+    /* 53 */
+    'security.tls.unrestricted_rc4_fallback',
+    'plugin.scan.Acrobat',
+    'plugin.scan.Quicktime',
+    'plugin.scan.WindowsMediaPlayer',
+    'media.getusermedia.screensharing.allow_on_old_platforms',
+    'dom.beforeAfterKeyboardEvent.enabled',
+    /* 52 */
+    'network.http.sendSecureXSiteReferrer',
+    'media.gmp-eme-adobe.enabled',
+    'media.gmp-eme-adobe.visible',
+    'media.gmp-eme-adobe.autoupdate',
+    'dom.telephony.enabled',
+    'dom.battery.enabled',
+    /* 51 */
+    'media.block-play-until-visible',
+    'dom.vr.oculus050.enabled',
+    'network.http.spdy.enabled.v3-1',
+    /* 50 */
+    'browser.usedOnWindows10.introURL',
+    'plugins.update.notifyUser',
+    'browser.safebrowsing.enabled',
+    'security.ssl3.ecdhe_ecdsa_rc4_128_sha',
+    'security.ssl3.ecdhe_rsa_rc4_128_sha',
+    'security.ssl3.rsa_rc4_128_md5',
+    'security.ssl3.rsa_rc4_128_sha',
+    'plugins.update.url',
+    /* 49 */
+    'loop.enabled',
+    'loop.server',
+    'loop.feedback.formURL',
+    'loop.feedback.manualFormURL',
+    'loop.facebook.appId',
+    'loop.facebook.enabled',
+    'loop.facebook.fallbackUrl',
+    'loop.facebook.shareUrl',
+    'loop.logDomains',
+    'dom.disable_window_open_feature.scrollbars',
+    'dom.push.udp.wakeupEnabled',
+    /* 48 */
+    'browser.urlbar.unifiedcomplete',
+    /* 47 */
+    'toolkit.telemetry.unifiedIsOptIn',
+    'datareporting.healthreport.about.reportUrlUnified',
+    'browser.history.allowPopState',
+    'browser.history.allowPushState',
+    'browser.history.allowReplaceState',
+    /* 46 */
+    'datareporting.healthreport.service.enabled',
+    'datareporting.healthreport.documentServerURI',
+    'datareporting.policy.dataSubmissionEnabled.v2',
+    'browser.safebrowsing.appRepURL',
+    'browser.polaris.enabled',
+    'browser.pocket.enabled',
+    'browser.pocket.api',
+    'browser.pocket.site',
+    'browser.pocket.oAuthConsumerKey',
+    /* 45 */
+    'browser.sessionstore.privacy_level_deferred',
+    /* 44 */
+    'browser.safebrowsing.provider.google.appRepURL',
+    'security.tls.insecure_fallback_hosts.use_static_list',
+    'dom.workers.sharedWorkers.enabled',
+    'dom.disable_image_src_set',
+    /* 43 */
+    'browser.safebrowsing.gethashURL',
+    'browser.safebrowsing.updateURL',
+    'browser.safebrowsing.malware.reportURL',
+    'browser.trackingprotection.gethashURL',
+    'browser.trackingprotection.updateURL',
+    'pfs.datasource.url',
+    'browser.search.showOneOffButtons',
+    /* 42 and earlier */
+    'privacy.clearOnShutdown.passwords', // 42
+    'full-screen-api.approval-required', // 42
+    'browser.safebrowsing.reportErrorURL', // 41
+    'browser.safebrowsing.reportGenericURL', // 41
+    'browser.safebrowsing.reportMalwareErrorURL', // 41
+    'browser.safebrowsing.reportMalwareURL', // 41
+    'browser.safebrowsing.reportURL', // 41
+    'plugins.enumerable_names', // 41
+    'network.http.spdy.enabled.http2draft', // 41
+    'camera.control.autofocus_moving_callback.enabled', // 37
+    'privacy.donottrackheader.value', // 36
+    'network.websocket.enabled', // 35
+    'dom.network.enabled', // 31
+    'pageThumbs.enabled', // 25
+
+    /* reset parrot: check your open about:config after running the script */
+    '_user.js.parrot'
+  ]
+
+  if("undefined" === typeof(Services)) {
+    alert("about:config needs to be the active tab!");
+    return;
+  }
+  
+  let c = 0;
+  for (let i = 0, len = ops.length; i < len; i++) {
+    if (Services.prefs.prefHasUserValue(ops[i])) {   
+      Services.prefs.clearUserPref(ops[i]);
+      if (!Services.prefs.prefHasUserValue(ops[i])) {
+        console.log("reset", ops[i]);
+        c++;
+      } else { console.log("failed to reset", ops[i]); }
+    }
+  }
+  
+  focus();
+  
+  let d = (c==1) ? " pref" : " prefs";
+  if (c > 0) {
+    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
+  } else { alert("nothing to reset"); }
+  
+})();

From be64819ce7ed94a5c1604c49a79006d898d6bb06 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Jul 2020 10:58:22 +0000
Subject: [PATCH 0587/1147] update to ESR78

---
 .../ghacks-clear-RFP-alternatives             | 65 +++++++++++++++++++
 1 file changed, 65 insertions(+)
 create mode 100644 scratchpad-scripts/ghacks-clear-RFP-alternatives

diff --git a/scratchpad-scripts/ghacks-clear-RFP-alternatives b/scratchpad-scripts/ghacks-clear-RFP-alternatives
new file mode 100644
index 0000000..a2824ad
--- /dev/null
+++ b/scratchpad-scripts/ghacks-clear-RFP-alternatives
@@ -0,0 +1,65 @@
+/***
+ Version: up to and including FF/ESR78
+
+ This will reset the preferences that are under sections 4600 & 4700 in the
+ ghacks user.js. These are the prefs that are no longer necessary, or they
+ conflict with, privacy.resistFingerprinting if you have that enabled.
+
+ For instructions see:
+ https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
+***/
+ 
+(function() {
+  let ops = [
+    /* section 4600 */
+    'dom.maxHardwareConcurrency',
+    'dom.enable_resource_timing',
+    'dom.enable_performance',
+    'device.sensors.enabled',
+    'browser.zoom.siteSpecific',
+    'dom.gamepad.enabled',
+    'dom.netinfo.enabled',
+    'media.webspeech.synth.enabled',
+    'media.video_stats.enabled',
+    'dom.w3c_touch_events.enabled',
+    'media.ondevicechange.enabled',
+    'webgl.enable-debug-renderer-info',
+    'dom.w3c_pointer_events.enabled',
+    'ui.use_standins_for_native_colors',
+    'ui.systemUsesDarkTheme',
+    'ui.prefersReducedMotion'
+    /* section 4700 */
+    'general.useragent.override',
+    'general.buildID.override',
+    'general.appname.override',
+    'general.appversion.override',
+    'general.platform.override',
+    'general.oscpu.override',
+    /* reset parrot: check your open about:config after running the script */
+    '_user.js.parrot'
+  ]
+
+  if("undefined" === typeof(Services)) {
+    alert("about:config needs to be the active tab!");
+    return;
+  }
+  
+  let c = 0;
+  for (let i = 0, len = ops.length; i < len; i++) {
+    if (Services.prefs.prefHasUserValue(ops[i])) {   
+      Services.prefs.clearUserPref(ops[i]);
+      if (!Services.prefs.prefHasUserValue(ops[i])) {
+        console.log("reset", ops[i]);
+        c++;
+      } else { console.log("failed to reset", ops[i]); }
+    }
+  }
+  
+  focus();
+  
+  let d = (c==1) ? " pref" : " prefs";
+  if (c > 0) {
+    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
+  } else { alert("nothing to reset"); }
+  
+})();

From 52926cca7a14d49bb94a366ae5ea8843bcd1efd1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Jul 2020 10:59:19 +0000
Subject: [PATCH 0588/1147] Delete ghacks-clear-[removed].js

---
 scratchpad-scripts/ghacks-clear-[removed].js | 251 -------------------
 1 file changed, 251 deletions(-)
 delete mode 100644 scratchpad-scripts/ghacks-clear-[removed].js

diff --git a/scratchpad-scripts/ghacks-clear-[removed].js b/scratchpad-scripts/ghacks-clear-[removed].js
deleted file mode 100644
index fbde545..0000000
--- a/scratchpad-scripts/ghacks-clear-[removed].js
+++ /dev/null
@@ -1,251 +0,0 @@
-/***
- This will reset the preferences that have been removed completely from the ghacks user.js.
-
- Last updated: 12-April-2020
-
- For instructions see:
- https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
-***/
- 
-(function() {
-  let ops = [
-    /* removed in ghacks user.js v52-57 */
-    /* 52-alpha */
-    'browser.search.reset.enabled',
-    'browser.search.reset.whitelist',
-    /* 54-alpha */
-    'browser.migrate.automigrate.enabled',
-    'services.sync.enabled',
-    'webextensions.storage.sync.enabled',
-    'webextensions.storage.sync.serverURL',
-    /* 55-alpha */
-    'dom.keyboardevent.dispatch_during_composition', // default is false anyway
-    'dom.vr.oculus.enabled', // covered by dom.vr.enabled
-    'dom.vr.openvr.enabled', // ditto
-    'dom.vr.osvr.enabled', // ditto
-    'extensions.pocket.api', // covered by extensions.pocket.enabled
-    'extensions.pocket.oAuthConsumerKey', // ditto
-    'extensions.pocket.site', // ditto
-    /* 56-alpha: none */
-    /* 57-alpha */
-    'geo.wifi.xhr.timeout', // covered by geo.enabled
-    'browser.search.geoip.timeout', // ditto
-    'media.webspeech.recognition.enable', // default is false anyway
-    'gfx.layerscope.enabled', // default is false anyway
-    /* 58-alpha */
-    //  excluding these e10 settings
-       // 'browser.tabs.remote.autostart',
-       // 'browser.tabs.remote.autostart.2',
-       // 'browser.tabs.remote.force-enable',
-       // 'browser.tabs.remote.separateFileUriProcess',
-       // 'extensions.e10sBlocksEnabling',
-       // 'extensions.webextensions.remote',
-       // 'dom.ipc.processCount',
-       // 'dom.ipc.shims.enabledWarnings',
-       // 'dom.ipc.processCount.extension',
-       // 'dom.ipc.processCount.file',
-       // 'security.sandbox.content.level',
-       // 'dom.ipc.plugins.sandbox-level.default',
-       // 'dom.ipc.plugins.sandbox-level.flash',
-       // 'security.sandbox.logging.enabled',
-    'dom.presentation.controller.enabled',
-    'dom.presentation.discoverable',
-    'dom.presentation.discovery.enabled',
-    'dom.presentation.enabled',
-    'dom.presentation.receiver.enabled',
-    'dom.presentation.session_transport.data_channel.enable',
-    /* 59-alpha */
-    'browser.stopReloadAnimation.enabled',
-    'browser.tabs.insertRelatedAfterCurrent',
-    'browser.tabs.loadDivertedInBackground',
-    'browser.tabs.loadInBackground',
-    'browser.tabs.selectOwnerOnClose',
-    'browser.urlbar.clickSelectsAll',
-    'browser.urlbar.doubleClickSelectsAll',
-    'media.flac.enabled',
-    'media.mediasource.enabled',
-    'media.mediasource.mp4.enabled',
-    'media.mediasource.webm.audio.enabled',
-    'media.mediasource.webm.enabled',
-    'media.mp4.enabled',
-    'media.ogg.enabled',
-    'media.ogg.flac.enabled',
-    'media.opus.enabled',
-    'media.raw.enabled',
-    'media.wave.enabled',
-    'media.webm.enabled',
-    'media.wmf.amd.vp9.enabled',
-    'media.wmf.enabled',
-    'media.wmf.vp9.enabled',
-    'ui.submenuDelay',
-    /* 60-beta - these were all at default anyway */
-    'device.storage.enabled',
-    'general.useragent.compatMode.firefox',
-    'network.dns.blockDotOnion',
-    'network.stricttransportsecurity.preloadlist',
-    'security.block_script_with_wrong_mime',
-    'security.fileuri.strict_origin_policy',
-    'security.sri.enable',
-    /* 61-beta */
-    'browser.laterrun.enabled',
-    'browser.offline-apps.notify',
-    'browser.rights.3.shown',
-    'browser.slowStartup.maxSamples',
-    'browser.slowStartup.notificationDisabled',
-    'browser.slowStartup.samples',
-    'browser.storageManager.enabled',
-    'dom.allow_scripts_to_close_windows',
-    'dom.disable_window_flip',
-    'network.http.fast-fallback-to-IPv4',
-    'offline-apps.quota.warn',
-    'services.blocklist.signing.enforced',
-    /* 62-beta */
-    'browser.urlbar.autoFill.typed',
-    'security.tls.version.fallback-limit',
-    /* 63-beta */
-    'extensions.webextensions.keepStorageOnUninstall',
-    'extensions.webextensions.keepUuidOnUninstall',
-    'privacy.trackingprotection.ui.enabled',
-    /* 64-beta */
-    'browser.eme.ui.enabled',
-    'browser.sessionstore.max_windows_undo',
-    'network.auth.subresource-img-cross-origin-http-auth-allow',
-    'media.peerconnection.ice.tcp',
-    'media.peerconnection.identity.enabled',
-    'media.peerconnection.identity.timeout',
-    'media.peerconnection.turn.disable',
-    'media.peerconnection.use_document_iceservers',
-    'media.peerconnection.video.enabled',
-    'media.navigator.video.enabled',
-    /* 65-beta */
-    'browser.contentblocking.enabled',
-    'browser.urlbar.maxHistoricalSearchSuggestions',
-    /* 67-beta */
-    'app.update.service.enabled',
-    'app.update.silent',
-    'app.update.staging.enabled',
-    'browser.cache.disk.capacity',
-    'browser.cache.disk.smart_size.enabled',
-    'browser.cache.disk.smart_size.first_run',
-    'browser.cache.offline.insecure.enable',
-    'browser.safebrowsing.downloads.remote.url',
-    'browser.safebrowsing.provider.google.reportMalwareMistakeURL',
-    'browser.safebrowsing.provider.google.reportPhishMistakeURL',
-    'browser.safebrowsing.provider.google.reportURL',
-    'browser.safebrowsing.provider.google4.dataSharing.enabled',
-    'browser.safebrowsing.provider.google4.dataSharingURL',
-    'browser.safebrowsing.provider.google4.reportMalwareMistakeURL',
-    'browser.safebrowsing.provider.google4.reportPhishMistakeURL',
-    'browser.safebrowsing.provider.google4.reportURL',
-    'browser.safebrowsing.reportPhishURL',
-    'browser.sessionhistory.max_total_viewers',
-    'browser.urlbar.filter.javascript',
-    'canvas.capturestream.enabled',
-    'dom.imagecapture.enabled',
-    'dom.popup_maximum',
-    'gfx.offscreencanvas.enabled',
-    'javascript.options.shared_memory',
-    'media.gmp-gmpopenh264.autoupdate',
-    'media.gmp-gmpopenh264.enabled',
-    'media.gmp-manager.updateEnabled',
-    'media.gmp-manager.url',
-    'media.gmp-manager.url.override',
-    'media.gmp.trial-create.enabled',
-    'media.gmp-widevinecdm.autoupdate',
-    'network.cookie.leave-secure-alone',
-    'network.cookie.same-site.enabled',
-    'network.dnsCacheEntries',
-    'network.dnsCacheExpiration',
-    'network.proxy.autoconfig_url.include_path',
-    'pdfjs.enableWebGL',
-    'plugin.default.state',
-    'plugin.defaultXpi.state',
-    'plugin.scan.plid.all',
-    'security.data_uri.block_toplevel_data_uri_navigations',
-    'security.insecure_field_warning.contextual.enabled',
-    'security.insecure_password.ui.enabled',
-    'signon.autofillForms.http',
-    'signon.storeWhenAutocompleteOff',
-    'xpinstall.whitelist.required',
-    /* 67-beta: Blocklist, SB & TP cleanup: these were all inactive */
-    'browser.safebrowsing.downloads.remote.block_dangerous',
-    'browser.safebrowsing.downloads.remote.block_dangerous_host',
-    'browser.safebrowsing.blockedURIs.enabled',
-    'browser.safebrowsing.provider.google.gethashURL',
-    'browser.safebrowsing.provider.google.updateURL',
-    'browser.safebrowsing.provider.google4.gethashURL',
-    'browser.safebrowsing.provider.google4.updateURL',
-    'browser.safebrowsing.provider.mozilla.gethashURL',
-    'browser.safebrowsing.provider.mozilla.updateURL',
-    'browser.urlbar.userMadeSearchSuggestionsChoice',
-    'privacy.trackingprotection.annotate_channels',
-    'privacy.trackingprotection.enabled',
-    'privacy.trackingprotection.lower_network_priority',
-    'privacy.trackingprotection.pbmode.enabled',
-    'services.blocklist.addons.collection',
-    'services.blocklist.gfx.collection',
-    'services.blocklist.onecrl.collection',
-    'services.blocklist.plugins.collection',
-    'services.blocklist.update_enabled',
-    'urlclassifier.trackingTable',
-    /* 68-beta */
-    'dom.forms.datetime',
-    'font.blacklist.underline_offset',
-    'font.name.monospace.x-unicode',
-    'font.name.monospace.x-western',
-    'font.name.sans-serif.x-unicode',
-    'font.name.sans-serif.x-western',
-    'font.name.serif.x-unicode',
-    'font.name.serif.x-western',
-    'layout.css.font-loading-api.enabled',
-    'toolkit.telemetry.cachedClientID',
-    /* 69-beta */
-    'plugin.sessionPermissionNow.intervalInMinutes',
-    /* 70-beta */
-    'browser.cache.disk_cache_ssl',
-    'browser.sessionhistory.max_entries',
-    'dom.push.connection.enabled',
-    'dom.push.serverURL',
-    'extensions.getAddons.discovery.api_url',
-    'extensions.htmlaboutaddons.discover.enabled',
-    'extensions.webservice.discoverURL',
-    'intl.locale.requested',
-    'intl.regional_prefs.use_os_locales',
-    'privacy.usercontext.about_newtab_segregation.enabled',
-    'security.insecure_connection_icon.pbmode.enabled',
-    'security.insecure_connection_text.pbmode.enabled',
-    'webgl.dxgl.enabled',
-    /* 71-beta */
-    'media.block-autoplay-until-in-foreground',
-    'middlemouse.paste',
-    /* 75-beta */
-    'browser.search.geoip.url',
-    'browser.search.region',
-    /* reset parrot: check your open about:config after running the script */
-    '_user.js.parrot'
-  ]
-
-  if("undefined" === typeof(Services)) {
-    alert("about:config needs to be the active tab!");
-    return;
-  }
-  
-  let c = 0;
-  for (let i = 0, len = ops.length; i < len; i++) {
-    if (Services.prefs.prefHasUserValue(ops[i])) {   
-      Services.prefs.clearUserPref(ops[i]);
-      if (!Services.prefs.prefHasUserValue(ops[i])) {
-        console.log("reset", ops[i]);
-        c++;
-      } else { console.log("failed to reset", ops[i]); }
-    }
-  }
-  
-  focus();
-  
-  let d = (c==1) ? " pref" : " prefs";
-  if (c > 0) {
-    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
-  } else { alert("nothing to reset"); }
-  
-})();

From 10cc1224d0f951b165185abce1468a2db1fcb67b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Jul 2020 11:00:23 +0000
Subject: [PATCH 0589/1147] Create ghacks-clear-removed.js

---
 scratchpad-scripts/ghacks-clear-removed.js | 251 +++++++++++++++++++++
 1 file changed, 251 insertions(+)
 create mode 100644 scratchpad-scripts/ghacks-clear-removed.js

diff --git a/scratchpad-scripts/ghacks-clear-removed.js b/scratchpad-scripts/ghacks-clear-removed.js
new file mode 100644
index 0000000..00b6d6b
--- /dev/null
+++ b/scratchpad-scripts/ghacks-clear-removed.js
@@ -0,0 +1,251 @@
+/***
+ This will reset the preferences that have been removed completely from the ghacks user.js.
+
+ Last updated: 21-April-2020
+
+ For instructions see:
+ https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
+***/
+ 
+(function() {
+  let ops = [
+    /* removed in ghacks user.js v52-57 */
+    /* 52-alpha */
+    'browser.search.reset.enabled',
+    'browser.search.reset.whitelist',
+    /* 54-alpha */
+    'browser.migrate.automigrate.enabled',
+    'services.sync.enabled',
+    'webextensions.storage.sync.enabled',
+    'webextensions.storage.sync.serverURL',
+    /* 55-alpha */
+    'dom.keyboardevent.dispatch_during_composition', // default is false anyway
+    'dom.vr.oculus.enabled', // covered by dom.vr.enabled
+    'dom.vr.openvr.enabled', // ditto
+    'dom.vr.osvr.enabled', // ditto
+    'extensions.pocket.api', // covered by extensions.pocket.enabled
+    'extensions.pocket.oAuthConsumerKey', // ditto
+    'extensions.pocket.site', // ditto
+    /* 56-alpha: none */
+    /* 57-alpha */
+    'geo.wifi.xhr.timeout', // covered by geo.enabled
+    'browser.search.geoip.timeout', // ditto
+    'media.webspeech.recognition.enable', // default is false anyway
+    'gfx.layerscope.enabled', // default is false anyway
+    /* 58-alpha */
+    //  excluding these e10 settings
+       // 'browser.tabs.remote.autostart',
+       // 'browser.tabs.remote.autostart.2',
+       // 'browser.tabs.remote.force-enable',
+       // 'browser.tabs.remote.separateFileUriProcess',
+       // 'extensions.e10sBlocksEnabling',
+       // 'extensions.webextensions.remote',
+       // 'dom.ipc.processCount',
+       // 'dom.ipc.shims.enabledWarnings',
+       // 'dom.ipc.processCount.extension',
+       // 'dom.ipc.processCount.file',
+       // 'security.sandbox.content.level',
+       // 'dom.ipc.plugins.sandbox-level.default',
+       // 'dom.ipc.plugins.sandbox-level.flash',
+       // 'security.sandbox.logging.enabled',
+    'dom.presentation.controller.enabled',
+    'dom.presentation.discoverable',
+    'dom.presentation.discovery.enabled',
+    'dom.presentation.enabled',
+    'dom.presentation.receiver.enabled',
+    'dom.presentation.session_transport.data_channel.enable',
+    /* 59-alpha */
+    'browser.stopReloadAnimation.enabled',
+    'browser.tabs.insertRelatedAfterCurrent',
+    'browser.tabs.loadDivertedInBackground',
+    'browser.tabs.loadInBackground',
+    'browser.tabs.selectOwnerOnClose',
+    'browser.urlbar.clickSelectsAll',
+    'browser.urlbar.doubleClickSelectsAll',
+    'media.flac.enabled',
+    'media.mediasource.enabled',
+    'media.mediasource.mp4.enabled',
+    'media.mediasource.webm.audio.enabled',
+    'media.mediasource.webm.enabled',
+    'media.mp4.enabled',
+    'media.ogg.enabled',
+    'media.ogg.flac.enabled',
+    'media.opus.enabled',
+    'media.raw.enabled',
+    'media.wave.enabled',
+    'media.webm.enabled',
+    'media.wmf.amd.vp9.enabled',
+    'media.wmf.enabled',
+    'media.wmf.vp9.enabled',
+    'ui.submenuDelay',
+    /* 60-beta - these were all at default anyway */
+    'device.storage.enabled',
+    'general.useragent.compatMode.firefox',
+    'network.dns.blockDotOnion',
+    'network.stricttransportsecurity.preloadlist',
+    'security.block_script_with_wrong_mime',
+    'security.fileuri.strict_origin_policy',
+    'security.sri.enable',
+    /* 61-beta */
+    'browser.laterrun.enabled',
+    'browser.offline-apps.notify',
+    'browser.rights.3.shown',
+    'browser.slowStartup.maxSamples',
+    'browser.slowStartup.notificationDisabled',
+    'browser.slowStartup.samples',
+    'browser.storageManager.enabled',
+    'dom.allow_scripts_to_close_windows',
+    'dom.disable_window_flip',
+    'network.http.fast-fallback-to-IPv4',
+    'offline-apps.quota.warn',
+    'services.blocklist.signing.enforced',
+    /* 62-beta */
+    'browser.urlbar.autoFill.typed',
+    'security.tls.version.fallback-limit',
+    /* 63-beta */
+    'extensions.webextensions.keepStorageOnUninstall',
+    'extensions.webextensions.keepUuidOnUninstall',
+    'privacy.trackingprotection.ui.enabled',
+    /* 64-beta */
+    'browser.eme.ui.enabled',
+    'browser.sessionstore.max_windows_undo',
+    'network.auth.subresource-img-cross-origin-http-auth-allow',
+    'media.peerconnection.ice.tcp',
+    'media.peerconnection.identity.enabled',
+    'media.peerconnection.identity.timeout',
+    'media.peerconnection.turn.disable',
+    'media.peerconnection.use_document_iceservers',
+    'media.peerconnection.video.enabled',
+    'media.navigator.video.enabled',
+    /* 65-beta */
+    'browser.contentblocking.enabled',
+    'browser.urlbar.maxHistoricalSearchSuggestions',
+    /* 67-beta */
+    'app.update.service.enabled',
+    'app.update.silent',
+    'app.update.staging.enabled',
+    'browser.cache.disk.capacity',
+    'browser.cache.disk.smart_size.enabled',
+    'browser.cache.disk.smart_size.first_run',
+    'browser.cache.offline.insecure.enable',
+    'browser.safebrowsing.downloads.remote.url',
+    'browser.safebrowsing.provider.google.reportMalwareMistakeURL',
+    'browser.safebrowsing.provider.google.reportPhishMistakeURL',
+    'browser.safebrowsing.provider.google.reportURL',
+    'browser.safebrowsing.provider.google4.dataSharing.enabled',
+    'browser.safebrowsing.provider.google4.dataSharingURL',
+    'browser.safebrowsing.provider.google4.reportMalwareMistakeURL',
+    'browser.safebrowsing.provider.google4.reportPhishMistakeURL',
+    'browser.safebrowsing.provider.google4.reportURL',
+    'browser.safebrowsing.reportPhishURL',
+    'browser.sessionhistory.max_total_viewers',
+    'browser.urlbar.filter.javascript',
+    'canvas.capturestream.enabled',
+    'dom.imagecapture.enabled',
+    'dom.popup_maximum',
+    'gfx.offscreencanvas.enabled',
+    'javascript.options.shared_memory',
+    'media.gmp-gmpopenh264.autoupdate',
+    'media.gmp-gmpopenh264.enabled',
+    'media.gmp-manager.updateEnabled',
+    'media.gmp-manager.url',
+    'media.gmp-manager.url.override',
+    'media.gmp.trial-create.enabled',
+    'media.gmp-widevinecdm.autoupdate',
+    'network.cookie.leave-secure-alone',
+    'network.cookie.same-site.enabled',
+    'network.dnsCacheEntries',
+    'network.dnsCacheExpiration',
+    'network.proxy.autoconfig_url.include_path',
+    'pdfjs.enableWebGL',
+    'plugin.default.state',
+    'plugin.defaultXpi.state',
+    'plugin.scan.plid.all',
+    'security.data_uri.block_toplevel_data_uri_navigations',
+    'security.insecure_field_warning.contextual.enabled',
+    'security.insecure_password.ui.enabled',
+    'signon.autofillForms.http',
+    'signon.storeWhenAutocompleteOff',
+    'xpinstall.whitelist.required',
+    /* 67-beta: Blocklist, SB & TP cleanup: these were all inactive */
+    'browser.safebrowsing.downloads.remote.block_dangerous',
+    'browser.safebrowsing.downloads.remote.block_dangerous_host',
+    'browser.safebrowsing.blockedURIs.enabled',
+    'browser.safebrowsing.provider.google.gethashURL',
+    'browser.safebrowsing.provider.google.updateURL',
+    'browser.safebrowsing.provider.google4.gethashURL',
+    'browser.safebrowsing.provider.google4.updateURL',
+    'browser.safebrowsing.provider.mozilla.gethashURL',
+    'browser.safebrowsing.provider.mozilla.updateURL',
+    'browser.urlbar.userMadeSearchSuggestionsChoice',
+    'privacy.trackingprotection.annotate_channels',
+    'privacy.trackingprotection.enabled',
+    'privacy.trackingprotection.lower_network_priority',
+    'privacy.trackingprotection.pbmode.enabled',
+    'services.blocklist.addons.collection',
+    'services.blocklist.gfx.collection',
+    'services.blocklist.onecrl.collection',
+    'services.blocklist.plugins.collection',
+    'services.blocklist.update_enabled',
+    'urlclassifier.trackingTable',
+    /* 68-beta */
+    'dom.forms.datetime',
+    'font.blacklist.underline_offset',
+    'font.name.monospace.x-unicode',
+    'font.name.monospace.x-western',
+    'font.name.sans-serif.x-unicode',
+    'font.name.sans-serif.x-western',
+    'font.name.serif.x-unicode',
+    'font.name.serif.x-western',
+    'layout.css.font-loading-api.enabled',
+    'toolkit.telemetry.cachedClientID',
+    /* 69-beta */
+    'plugin.sessionPermissionNow.intervalInMinutes',
+    /* 70-beta */
+    'browser.cache.disk_cache_ssl',
+    'browser.sessionhistory.max_entries',
+    'dom.push.connection.enabled',
+    'dom.push.serverURL',
+    'extensions.getAddons.discovery.api_url',
+    'extensions.htmlaboutaddons.discover.enabled',
+    'extensions.webservice.discoverURL',
+    'intl.locale.requested',
+    'intl.regional_prefs.use_os_locales',
+    'privacy.usercontext.about_newtab_segregation.enabled',
+    'security.insecure_connection_icon.pbmode.enabled',
+    'security.insecure_connection_text.pbmode.enabled',
+    'webgl.dxgl.enabled',
+    /* 71-beta */
+    'media.block-autoplay-until-in-foreground',
+    'middlemouse.paste',
+    /* 75-beta */
+    'browser.search.geoip.url',
+    'browser.search.region',
+    /* reset parrot: check your open about:config after running the script */
+    '_user.js.parrot'
+  ]
+
+  if("undefined" === typeof(Services)) {
+    alert("about:config needs to be the active tab!");
+    return;
+  }
+  
+  let c = 0;
+  for (let i = 0, len = ops.length; i < len; i++) {
+    if (Services.prefs.prefHasUserValue(ops[i])) {   
+      Services.prefs.clearUserPref(ops[i]);
+      if (!Services.prefs.prefHasUserValue(ops[i])) {
+        console.log("reset", ops[i]);
+        c++;
+      } else { console.log("failed to reset", ops[i]); }
+    }
+  }
+  
+  focus();
+  
+  let d = (c==1) ? " pref" : " prefs";
+  if (c > 0) {
+    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
+  } else { alert("nothing to reset"); }
+  
+})();

From f8fd03482de41d0cad9fcce7530a282185b836aa Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Jul 2020 11:19:49 +0000
Subject: [PATCH 0590/1147] 79 deprecated

---
 user.js | 28 ++++++++++++++++++----------
 1 file changed, 18 insertions(+), 10 deletions(-)

diff --git a/user.js b/user.js
index 9a5cdd9..94c8a05 100644
--- a/user.js
+++ b/user.js
@@ -175,13 +175,6 @@ user_pref("intl.accept_languages", "en-US, en");
  * [1] https://bugzilla.mozilla.org/867501
  * [2] https://bugzilla.mozilla.org/1629630 ***/
 user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
-/* 0212: enforce fallback text encoding to match en-US
- * When the content or server doesn't declare a charset the browser will
- * fallback to the "Current locale" based on your application language
- * [SETTING] General>Language and Appearance>Fonts and Colors>Advanced>Text Encoding for Legacy Content (FF72-)
- * [TEST] https://hsivonen.com/test/moz/check-charset.htm
- * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/20025 ***/
-user_pref("intl.charset.fallback.override", "windows-1252");
 
 /*** [SECTION 0300]: QUIET FOX
      Starting in user.js v67, we only disable the auto-INSTALL of Firefox. You still get prompts
@@ -485,9 +478,6 @@ user_pref("layout.css.visited_links_enabled", false);
  * [SETTING] Search>Provide search suggestions | Show search suggestions in address bar results ***/
 user_pref("browser.search.suggest.enabled", false);
 user_pref("browser.urlbar.suggest.searches", false);
-/* 0809: disable location bar suggesting "preloaded" top websites [FF54+]
- * [1] https://bugzilla.mozilla.org/1211726 ***/
-user_pref("browser.urlbar.usepreloadedtopurls.enabled", false);
 /* 0810: disable location bar making speculative connections [FF56+]
  * [1] https://bugzilla.mozilla.org/1348275 ***/
 user_pref("browser.urlbar.speculativeConnect.enabled", false);
@@ -1685,6 +1675,24 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
      [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/123
 ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
+/* ESR78.x still uses all the following prefs
+// [NOTE] replace the * with a slash in the line above to re-enable them
+// FF79
+// 0212: enforce fallback text encoding to match en-US
+   // When the content or server doesn't declare a charset the browser will
+   // fallback to the "Current locale" based on your application language
+   // [SETTING] General>Language and Appearance>Fonts and Colors>Advanced>Text Encoding for Legacy Content (FF72-)
+   // [TEST] https://hsivonen.com/test/moz/check-charset.htm
+   // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/20025
+   // [-] https://bugzilla.mozilla.org/1603712
+user_pref("intl.charset.fallback.override", "windows-1252");
+// 0809: disable location bar suggesting "preloaded" top websites [FF54+]
+   // [1] https://bugzilla.mozilla.org/1211726
+   // [-] https://bugzilla.mozilla.org/1643639
+user_pref("browser.urlbar.usepreloadedtopurls.enabled", false);
+// * * * /
+// ***/
+
 /* ESR68.x still uses all the following prefs
 // [NOTE] replace the * with a slash in the line above to re-enable them
 // FF69

From 771e57480a1ab6cedfe2fda9330482cce3a75bdf Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Jul 2020 12:21:10 +0000
Subject: [PATCH 0591/1147] Delete ghacks-clear-RFP-alternatives

---
 .../ghacks-clear-RFP-alternatives             | 65 -------------------
 1 file changed, 65 deletions(-)
 delete mode 100644 scratchpad-scripts/ghacks-clear-RFP-alternatives

diff --git a/scratchpad-scripts/ghacks-clear-RFP-alternatives b/scratchpad-scripts/ghacks-clear-RFP-alternatives
deleted file mode 100644
index a2824ad..0000000
--- a/scratchpad-scripts/ghacks-clear-RFP-alternatives
+++ /dev/null
@@ -1,65 +0,0 @@
-/***
- Version: up to and including FF/ESR78
-
- This will reset the preferences that are under sections 4600 & 4700 in the
- ghacks user.js. These are the prefs that are no longer necessary, or they
- conflict with, privacy.resistFingerprinting if you have that enabled.
-
- For instructions see:
- https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
-***/
- 
-(function() {
-  let ops = [
-    /* section 4600 */
-    'dom.maxHardwareConcurrency',
-    'dom.enable_resource_timing',
-    'dom.enable_performance',
-    'device.sensors.enabled',
-    'browser.zoom.siteSpecific',
-    'dom.gamepad.enabled',
-    'dom.netinfo.enabled',
-    'media.webspeech.synth.enabled',
-    'media.video_stats.enabled',
-    'dom.w3c_touch_events.enabled',
-    'media.ondevicechange.enabled',
-    'webgl.enable-debug-renderer-info',
-    'dom.w3c_pointer_events.enabled',
-    'ui.use_standins_for_native_colors',
-    'ui.systemUsesDarkTheme',
-    'ui.prefersReducedMotion'
-    /* section 4700 */
-    'general.useragent.override',
-    'general.buildID.override',
-    'general.appname.override',
-    'general.appversion.override',
-    'general.platform.override',
-    'general.oscpu.override',
-    /* reset parrot: check your open about:config after running the script */
-    '_user.js.parrot'
-  ]
-
-  if("undefined" === typeof(Services)) {
-    alert("about:config needs to be the active tab!");
-    return;
-  }
-  
-  let c = 0;
-  for (let i = 0, len = ops.length; i < len; i++) {
-    if (Services.prefs.prefHasUserValue(ops[i])) {   
-      Services.prefs.clearUserPref(ops[i]);
-      if (!Services.prefs.prefHasUserValue(ops[i])) {
-        console.log("reset", ops[i]);
-        c++;
-      } else { console.log("failed to reset", ops[i]); }
-    }
-  }
-  
-  focus();
-  
-  let d = (c==1) ? " pref" : " prefs";
-  if (c > 0) {
-    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
-  } else { alert("nothing to reset"); }
-  
-})();

From 0d27689c64c6a83b74dc34cd354bf3e349fb43c6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Jul 2020 12:22:20 +0000
Subject: [PATCH 0592/1147] update to ESR78

and this time add the file extension
---
 .../ghacks-clear-RFP-alternatives.js          | 65 +++++++++++++++++++
 1 file changed, 65 insertions(+)
 create mode 100644 scratchpad-scripts/ghacks-clear-RFP-alternatives.js

diff --git a/scratchpad-scripts/ghacks-clear-RFP-alternatives.js b/scratchpad-scripts/ghacks-clear-RFP-alternatives.js
new file mode 100644
index 0000000..a2824ad
--- /dev/null
+++ b/scratchpad-scripts/ghacks-clear-RFP-alternatives.js
@@ -0,0 +1,65 @@
+/***
+ Version: up to and including FF/ESR78
+
+ This will reset the preferences that are under sections 4600 & 4700 in the
+ ghacks user.js. These are the prefs that are no longer necessary, or they
+ conflict with, privacy.resistFingerprinting if you have that enabled.
+
+ For instructions see:
+ https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
+***/
+ 
+(function() {
+  let ops = [
+    /* section 4600 */
+    'dom.maxHardwareConcurrency',
+    'dom.enable_resource_timing',
+    'dom.enable_performance',
+    'device.sensors.enabled',
+    'browser.zoom.siteSpecific',
+    'dom.gamepad.enabled',
+    'dom.netinfo.enabled',
+    'media.webspeech.synth.enabled',
+    'media.video_stats.enabled',
+    'dom.w3c_touch_events.enabled',
+    'media.ondevicechange.enabled',
+    'webgl.enable-debug-renderer-info',
+    'dom.w3c_pointer_events.enabled',
+    'ui.use_standins_for_native_colors',
+    'ui.systemUsesDarkTheme',
+    'ui.prefersReducedMotion'
+    /* section 4700 */
+    'general.useragent.override',
+    'general.buildID.override',
+    'general.appname.override',
+    'general.appversion.override',
+    'general.platform.override',
+    'general.oscpu.override',
+    /* reset parrot: check your open about:config after running the script */
+    '_user.js.parrot'
+  ]
+
+  if("undefined" === typeof(Services)) {
+    alert("about:config needs to be the active tab!");
+    return;
+  }
+  
+  let c = 0;
+  for (let i = 0, len = ops.length; i < len; i++) {
+    if (Services.prefs.prefHasUserValue(ops[i])) {   
+      Services.prefs.clearUserPref(ops[i]);
+      if (!Services.prefs.prefHasUserValue(ops[i])) {
+        console.log("reset", ops[i]);
+        c++;
+      } else { console.log("failed to reset", ops[i]); }
+    }
+  }
+  
+  focus();
+  
+  let d = (c==1) ? " pref" : " prefs";
+  if (c > 0) {
+    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
+  } else { alert("nothing to reset"); }
+  
+})();

From c4a06c4689c168c8008f72c4a2ecdcbe4da3c23e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Jul 2020 12:23:14 +0000
Subject: [PATCH 0593/1147] missing comma

---
 scratchpad-scripts/ghacks-clear-RFP-alternatives.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-RFP-alternatives.js b/scratchpad-scripts/ghacks-clear-RFP-alternatives.js
index a2824ad..1dfc5f7 100644
--- a/scratchpad-scripts/ghacks-clear-RFP-alternatives.js
+++ b/scratchpad-scripts/ghacks-clear-RFP-alternatives.js
@@ -27,7 +27,7 @@
     'dom.w3c_pointer_events.enabled',
     'ui.use_standins_for_native_colors',
     'ui.systemUsesDarkTheme',
-    'ui.prefersReducedMotion'
+    'ui.prefersReducedMotion',
     /* section 4700 */
     'general.useragent.override',
     'general.buildID.override',

From 117ab133b16b9bf91088830f5ed807c393cfdc7d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 29 Jul 2020 02:19:20 +0000
Subject: [PATCH 0594/1147] remove 0809

not deprecated, just hidden: default is false anyway
---
 user.js | 4 ----
 1 file changed, 4 deletions(-)

diff --git a/user.js b/user.js
index 94c8a05..b1bd380 100644
--- a/user.js
+++ b/user.js
@@ -1686,10 +1686,6 @@ user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
    // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/20025
    // [-] https://bugzilla.mozilla.org/1603712
 user_pref("intl.charset.fallback.override", "windows-1252");
-// 0809: disable location bar suggesting "preloaded" top websites [FF54+]
-   // [1] https://bugzilla.mozilla.org/1211726
-   // [-] https://bugzilla.mozilla.org/1643639
-user_pref("browser.urlbar.usepreloadedtopurls.enabled", false);
 // * * * /
 // ***/
 

From 091a71aade5654db4208ae3c89750cdbb5666cab Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 29 Jul 2020 02:22:09 +0000
Subject: [PATCH 0595/1147] browser.urlbar.usepreloadedtopurls.enabled

---
 scratchpad-scripts/ghacks-clear-removed.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/ghacks-clear-removed.js b/scratchpad-scripts/ghacks-clear-removed.js
index 00b6d6b..dfb63c4 100644
--- a/scratchpad-scripts/ghacks-clear-removed.js
+++ b/scratchpad-scripts/ghacks-clear-removed.js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the ghacks user.js.
 
- Last updated: 21-April-2020
+ Last updated: 28-July-2020
 
  For instructions see:
  https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -221,6 +221,8 @@
     /* 75-beta */
     'browser.search.geoip.url',
     'browser.search.region',
+    /* 79-beta */
+    'browser.urlbar.usepreloadedtopurls.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 2809854802b3756c26aa089987761f1bbd3f34ce Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 1 Aug 2020 11:03:17 +0000
Subject: [PATCH 0596/1147] font visibility / RFP (#985)

---
 user.js | 16 ++++++++++++----
 1 file changed, 12 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index b1bd380..f486017 100644
--- a/user.js
+++ b/user.js
@@ -804,7 +804,8 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
  * [2] https://en.wikipedia.org/wiki/Graphite_(SIL) ***/
 user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
- * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed.
+ * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed
+ * [NOTE] RFP in FF80+ restricts the whitelist to bundled and "Base Fonts" (see 4618)
  * [WARNING] Creating your own probably highly-unique whitelist will raise your entropy.
  * Eventually privacy.resistFingerprinting (see 4500) will cover this
  * [1] https://bugzilla.mozilla.org/1121643 ***/
@@ -911,7 +912,7 @@ user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
  * [1] https://www.privacytools.io/#webrtc ***/
 user_pref("media.peerconnection.enabled", false);
 /* 2002: limit WebRTC IP leaks if using WebRTC
- * In FF70+ these settings match Mode 4 (Mode 3 in older versions) (see [3])
+ * In FF70+ these settings match Mode 4 (Mode 3 in older versions), see [3]
  * [TEST] https://browserleaks.com/webrtc
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1189041,1297416,1452713
  * [2] https://wiki.mozilla.org/Media/WebRTC/Privacy
@@ -1092,7 +1093,7 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * Initially a Linux issue (high precision readout) that was fixed.
  * However, it is still another metric for fingerprinting, used to raise entropy.
  * e.g. do you have a battery or not, current charging status, charge level, times remaining etc
- * [NOTE] From FF52+ Battery Status API is only available in chrome/privileged code. see [1]
+ * [NOTE] From FF52+ Battery Status API is only available in chrome/privileged code, see [1]
  * [1] https://bugzilla.mozilla.org/1313580 ***/
    // user_pref("dom.battery.enabled", false);
 /* 2505: disable media device enumeration [FF29+]
@@ -1387,7 +1388,7 @@ user_pref("privacy.firstparty.isolate", true);
 /* 4002: enforce FPI restriction for window.opener [FF54+]
  * [NOTE] Setting this to false may reduce the breakage in 4001
  * FF65+ blocks postMessage with targetOrigin "*" if originAttributes don't match. But
- * to reduce breakage it ignores the 1st-party domain (FPD) originAttribute. (see [2],[3])
+ * to reduce breakage it ignores the 1st-party domain (FPD) originAttribute, see [2],[3]
  * The 2nd pref removes that limitation and will only allow communication if FPDs also match.
  * [1] https://bugzilla.mozilla.org/1319773#c22
  * [2] https://bugzilla.mozilla.org/1492607
@@ -1461,6 +1462,7 @@ user_pref("privacy.firstparty.isolate", true);
  ** 1595823 - spoof audioContext sampleRate (FF72+)
  ** 1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74+)
  ** 1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78+)
+ ** 1653987 - limit font visibility to bundled and "Base Fonts" (see 4618) (non-ANDROID) (FF80+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]
@@ -1596,6 +1598,12 @@ user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
 // 4617: enforce prefers-reduced-motion as no-preference [FF63+] [RESTART]
    // 0=no-preference, 1=reduce
 user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
+// 4618: limit font visbility (non-ANDROID) [FF79+]
+   // Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts, see [1]
+   // 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
+   // [NOTE] Bundled fonts are auto-allowed
+   // [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc
+user_pref("layout.css.font-visibility.level", 1);
 // * * * /
 // ***/
 

From 58fb1db8380d641f43fa90308c36cd15fea0bb31 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 2 Aug 2020 01:27:30 +0000
Subject: [PATCH 0597/1147] HTTPS-Only Mode UI

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index f486017..e543b20 100644
--- a/user.js
+++ b/user.js
@@ -734,6 +734,7 @@ user_pref("security.mixed_content.block_display_content", true);
 user_pref("security.mixed_content.block_object_subrequest", true);
 /* 1244: enable https-only-mode [FF76+]
  * [NOTE] This is experimental
+ * [SETTING] Privacy & Security>HTTPS-Only Mode (FF81+)
  * [1] https://bugzilla.mozilla.org/1613063 */
    // user_pref("dom.security.https_only_mode", true); // [FF76+]
    // user_pref("dom.security.https_only_mode.upgrade_local", true); // [FF77+]

From c4b7e076911e8f674ccdeaa9e3747340baf39c87 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 2 Aug 2020 01:47:48 +0000
Subject: [PATCH 0598/1147] 4500: site partitioning

---
 user.js | 10 +++++++++-
 1 file changed, 9 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index e543b20..b61dc57 100644
--- a/user.js
+++ b/user.js
@@ -1362,6 +1362,7 @@ user_pref("privacy.cpd.siteSettings", false); // Site Preferences
 user_pref("privacy.sanitize.timeSpan", 0);
 
 /*** [SECTION 4000]: FPI (FIRST PARTY ISOLATION)
+ 4001: FPI
  ** 1278037 - isolate indexedDB (FF51+)
  ** 1277803 - isolate favicons (FF52+)
  ** 1264562 - isolate OCSP cache (FF52+)
@@ -1380,11 +1381,15 @@ user_pref("privacy.sanitize.timeSpan", 0);
  ** 1506693 - isolate pdfjs range-based requests (FF68+)
  ** 1330467 - isolate site permissions (FF69+)
  ** 1534339 - isolate IPv6 (FF73+)
+ 4003: NETWORK PARTITON
+ ** 1647732 - isolate font cache (FF80+)
+ ** 1649673 - isolate speculative connections (FF80+)
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]
  * [SETUP-WEB] May break cross-domain logins and site functionality until perfected
- * [1] https://bugzilla.mozilla.org/1260931 ***/
+ * [1] https://bugzilla.mozilla.org/1260931
+ * [2] https://bugzilla.mozilla.org/1299996 [META] ***/
 user_pref("privacy.firstparty.isolate", true);
 /* 4002: enforce FPI restriction for window.opener [FF54+]
  * [NOTE] Setting this to false may reduce the breakage in 4001
@@ -1396,6 +1401,9 @@ user_pref("privacy.firstparty.isolate", true);
  * [3] https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage ***/
    // user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAULT: true]
    // user_pref("privacy.firstparty.isolate.block_post_message", true); // [HIDDEN PREF ESR]
+/* 4003: enable site partitioning (FF78+)
+ * [1] https://bugzilla.mozilla.org/1590107 [META] */
+user_pref("privacy.partition.network_state", true);
 
 /*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
    This master switch will be used for a wide range of items, many of which will

From bc832575d839794ca1c1518f4f1b708ceb91cf40 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 3 Aug 2020 14:52:21 +0000
Subject: [PATCH 0599/1147] 1003: kibibytes

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index b61dc57..3543b52 100644
--- a/user.js
+++ b/user.js
@@ -577,7 +577,7 @@ user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is m
  * [NOTE] We also clear cache on exiting Firefox (see 2803) ***/
 user_pref("browser.cache.disk.enable", false);
 /* 1003: disable memory cache
-/* capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kilobytes ***/
+ * capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kibibytes ***/
    // user_pref("browser.cache.memory.enable", false);
    // user_pref("browser.cache.memory.capacity", 0); // [HIDDEN PREF ESR]
 /* 1006: disable permissions manager from writing to disk [RESTART]
@@ -585,7 +585,7 @@ user_pref("browser.cache.disk.enable", false);
  * [1] https://bugzilla.mozilla.org/967812 ***/
    // user_pref("permissions.memory_only", true); // [HIDDEN PREF]
 /* 1007: disable media cache from writing to disk in Private Browsing
- * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB */
+ * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB ***/
 user_pref("browser.privatebrowsing.forceMediaMemoryCache", true); // [FF75+]
 user_pref("media.memory_cache_max_size", 16384);
 

From 8c2bcc0352fccb23334549db313ee7411d702f78 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 3 Aug 2020 22:50:58 +0000
Subject: [PATCH 0600/1147] 1007: bump to 64mb, see #941

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 3543b52..b27f4b4 100644
--- a/user.js
+++ b/user.js
@@ -587,7 +587,7 @@ user_pref("browser.cache.disk.enable", false);
 /* 1007: disable media cache from writing to disk in Private Browsing
  * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB ***/
 user_pref("browser.privatebrowsing.forceMediaMemoryCache", true); // [FF75+]
-user_pref("media.memory_cache_max_size", 16384);
+user_pref("media.memory_cache_max_size", 65536);
 
 /** SESSIONS & SESSION RESTORE ***/
 /* 1020: exclude "Undo Closed Tabs" in Session Restore ***/

From 0f6957bbd448005fbe6078c5abc10d4349f83e4c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 4 Aug 2020 10:18:29 +0000
Subject: [PATCH 0601/1147] 4600: add missing version section

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index b27f4b4..d284a64 100644
--- a/user.js
+++ b/user.js
@@ -1607,6 +1607,7 @@ user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
 // 4617: enforce prefers-reduced-motion as no-preference [FF63+] [RESTART]
    // 0=no-preference, 1=reduce
 user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
+// FF80+
 // 4618: limit font visbility (non-ANDROID) [FF79+]
    // Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts, see [1]
    // 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts

From 8452edb94b88af306b79cc3844f02f79a4cb5637 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 4 Aug 2020 10:25:29 +0000
Subject: [PATCH 0602/1147] 4600: see #987

---
 user.js | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index d284a64..def62a3 100644
--- a/user.js
+++ b/user.js
@@ -1590,6 +1590,10 @@ user_pref("media.ondevicechange.enabled", false);
    // [2] https://developer.mozilla.org/docs/Web/API/WEBGL_debug_renderer_info
 user_pref("webgl.enable-debug-renderer-info", false);
 // * * * /
+// FF63+
+// 4617: enforce prefers-reduced-motion as no-preference [FF63+] [RESTART]
+   // 0=no-preference, 1=reduce
+user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
 // FF65+
 // 4614: [2516] disable PointerEvents
    // [1] https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent
@@ -1604,9 +1608,6 @@ user_pref("ui.use_standins_for_native_colors", true);
 // 4616: enforce prefers-color-scheme as light [FF67+]
    // 0=light, 1=dark : This overrides your OS value
 user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
-// 4617: enforce prefers-reduced-motion as no-preference [FF63+] [RESTART]
-   // 0=no-preference, 1=reduce
-user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
 // FF80+
 // 4618: limit font visbility (non-ANDROID) [FF79+]
    // Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts, see [1]

From 172118e61b62b099f33c2ecfab619846ce15dcb6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 5 Aug 2020 01:35:10 +0000
Subject: [PATCH 0603/1147] RFP+Alts: fixup sequential numbering, see #987

---
 user.js | 18 +++++++++---------
 1 file changed, 9 insertions(+), 9 deletions(-)

diff --git a/user.js b/user.js
index def62a3..0bbfeb5 100644
--- a/user.js
+++ b/user.js
@@ -1460,12 +1460,12 @@ user_pref("privacy.partition.network_state", true);
       FF60: Fix keydown/keyup events (1438795)
  ** 1337157 - disable WebGL debug renderer info (see 4613) (FF60+)
  ** 1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62+)
- ** 1479239 - return "no-preference" with prefers-reduced-motion (see 4617) (FF63+)
- ** 1363508 - spoof/suppress Pointer Events (see 4614) (FF64+)
+ ** 1479239 - return "no-preference" with prefers-reduced-motion (see 4614) (FF63+)
+ ** 1363508 - spoof/suppress Pointer Events (see 4615) (FF64+)
       FF65: pointerEvent.pointerid (1492766)
- ** 1485266 - disable exposure of system colors to CSS or canvas (see 4615) (FF67+)
+ ** 1485266 - disable exposure of system colors to CSS or canvas (see 4616) (FF67+)
  ** 1407366 - enable inner window letterboxing (see 4504) (FF67+)
- ** 1494034 - return "light" with prefers-color-scheme (see 4616) (FF67+)
+ ** 1494034 - return "light" with prefers-color-scheme (see 4617) (FF67+)
       [1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
  ** 1564422 - spoof audioContext outputLatency (FF70+)
  ** 1595823 - spoof audioContext sampleRate (FF72+)
@@ -1591,21 +1591,21 @@ user_pref("media.ondevicechange.enabled", false);
 user_pref("webgl.enable-debug-renderer-info", false);
 // * * * /
 // FF63+
-// 4617: enforce prefers-reduced-motion as no-preference [FF63+] [RESTART]
+// 4614: enforce prefers-reduced-motion as no-preference [FF63+] [RESTART]
    // 0=no-preference, 1=reduce
 user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
-// FF65+
-// 4614: [2516] disable PointerEvents
+// FF64+
+// 4615: [2516] disable PointerEvents
    // [1] https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent
 user_pref("dom.w3c_pointer_events.enabled", false);
 // * * * /
 // FF67+
-// 4615: [2618] disable exposure of system colors to CSS or canvas [FF44+]
+// 4616: [2618] disable exposure of system colors to CSS or canvas [FF44+]
    // [NOTE] See second listed bug: may cause black on black for elements with undefined colors
    // [SETUP-CHROME] Might affect CSS in themes and extensions
    // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876
 user_pref("ui.use_standins_for_native_colors", true);
-// 4616: enforce prefers-color-scheme as light [FF67+]
+// 4617: enforce prefers-color-scheme as light [FF67+]
    // 0=light, 1=dark : This overrides your OS value
 user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
 // FF80+

From 6905187b3e14b1aea336ffcbfdf4e42126593527 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 13 Aug 2020 04:39:38 +0000
Subject: [PATCH 0604/1147] 0207/0208: region/search (#989)

---
 user.js | 7 +++++++
 1 file changed, 7 insertions(+)

diff --git a/user.js b/user.js
index 0bbfeb5..a0146e5 100644
--- a/user.js
+++ b/user.js
@@ -165,6 +165,13 @@ user_pref("geo.provider.use_gpsd", false); // [LINUX]
  * i.e. ignore all of Mozilla's various search engines in multiple locales ***/
 user_pref("browser.search.geoSpecificDefaults", false);
 user_pref("browser.search.geoSpecificDefaults.url", "");
+/* 0207: disable region updates
+ * [1] https://firefox-source-docs.mozilla.org/toolkit/modules/toolkit_modules/Region.html ***/
+user_pref("browser.region.network.url", ""); // [FF78+]
+user_pref("browser.region.update.enabled", false); // [[FF79+]
+/* 0208: set search region
+ * [NOTE] May not be hidden if Firefox has changed your settings due to your region (see 0207) ***/
+   // user_pref("browser.search.region", "US"); // [HIDDEN PREF]
 
 /** LANGUAGE / LOCALE ***/
 /* 0210: set preferred language for displaying web pages

From e16ede1cdf4167e8889e6d5ca96a54ccdc8ba826 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 13 Aug 2020 14:44:27 +0000
Subject: [PATCH 0605/1147] 79-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index a0146e5..8520511 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 22 Jul 2020
-* version 79-alpha
+* date: 13 Aug 2020
+* version 79-beta
 * authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt

From 5ed3047b7a09b075ef4f516f9b4ae861021499f0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 13 Aug 2020 15:22:38 +0000
Subject: [PATCH 0606/1147] references cleanup

---
 user.js | 30 ++++++++++--------------------
 1 file changed, 10 insertions(+), 20 deletions(-)

diff --git a/user.js b/user.js
index 8520511..3cb73ca 100644
--- a/user.js
+++ b/user.js
@@ -2,7 +2,6 @@
 * name: ghacks user.js
 * date: 13 Aug 2020
 * version 79-beta
-* authors: v52+ github | v51- www.ghacks.net
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
 
@@ -347,17 +346,14 @@ user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
  * Currently blocked by 'datareporting.healthreport.uploadEnabled' (see 0340) ***/
 user_pref("browser.ping-centre.telemetry", false);
 /* 0515: disable Screenshots
- * alternatively in FF60+, disable uploading to the Screenshots server
- * [1] https://github.com/mozilla-services/screenshots
- * [2] https://www.ghacks.net/2017/05/28/firefox-screenshots-integrated-in-firefox-nightly/ ***/
+ * alternatively in FF60+, disable uploading to the Screenshots server ***/
    // user_pref("extensions.screenshots.disabled", true); // [FF55+]
    // user_pref("extensions.screenshots.upload-disabled", true); // [FF60+]
 /* 0517: disable Form Autofill
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
  * [SETTING] Privacy & Security>Forms and Autofill>Autofill addresses (FF74+)
- * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill
- * [2] https://www.ghacks.net/2017/05/24/firefoxs-new-form-autofill-is-awesome/ ***/
+ * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill ***/
 user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
 user_pref("extensions.formautofill.available", "off"); // [FF56+]
 user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
@@ -372,16 +368,14 @@ user_pref("_user.js.parrot", "0600 syntax error: the parrot's no more!");
  * [1] https://developer.mozilla.org/docs/Web/HTTP/Link_prefetching_FAQ ***/
 user_pref("network.prefetch-next", false);
 /* 0602: disable DNS prefetching
- * [1] https://www.ghacks.net/2013/04/27/firefox-prefetching-what-you-need-to-know/
- * [2] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
+ * [1] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
 user_pref("network.dns.disablePrefetch", true);
 user_pref("network.dns.disablePrefetchFromHTTPS", true); // [HIDDEN PREF ESR] [DEFAULT: true FF70+]
 /* 0603: disable predictor / prefetching ***/
 user_pref("network.predictor.enabled", false);
 user_pref("network.predictor.enable-prefetch", false); // [FF48+]
 /* 0605: disable link-mouseover opening connection to linked server
- * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests
- * [2] https://www.ghacks.net/2015/08/16/block-firefox-from-connecting-to-sites-when-you-hover-over-links/ ***/
+ * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests ***/
 user_pref("network.http.speculative-parallel-limit", 0);
 /* 0606: disable "Hyperlink Auditing" (click tracking) and enforce same host in case
  * [1] https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ***/
@@ -429,7 +423,7 @@ user_pref("network.http.altsvc.oe", false);
  * [1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
 user_pref("network.proxy.socks_remote_dns", true);
 /* 0708: disable FTP [FF60+]
- * [1] https://www.ghacks.net/2018/02/20/firefox-60-with-new-preference-to-disable-ftp/ ***/
+ * [1] https://www.fxsitecompat.dev/en-CA/docs/2020/ftp-support-will-be-removed/ ***/
    // user_pref("network.ftp.enabled", false);
 /* 0709: disable using UNC (Uniform Naming Convention) paths [FF61+]
  * [SETUP-CHROME] Can break extensions for profiles on network shares
@@ -538,7 +532,7 @@ user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
 /* 0902: use a master password
  * There are no preferences for this. It is all handled internally.
  * [SETTING] Privacy & Security>Logins and Passwords>Use a master password
- * [1] https://support.mozilla.org/kb/use-master-password-protect-stored-logins ***/
+ * [1] https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas ***/
 /* 0903: set how often Firefox should ask for the master password
  * 0=the first time (default), 1=every time it's needed, 2=every n minutes (see 0904) ***/
 user_pref("security.ask_for_password", 2);
@@ -896,8 +890,7 @@ user_pref("_user.js.parrot", "1800 syntax error: the parrot's pushing up daisies
 /* 1803: disable Flash plugin
  * 0=deactivated, 1=ask, 2=enabled
  * ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash
- * [NOTE] You can still override individual sites via site permissions
- * [1] https://www.ghacks.net/2013/07/09/how-to-make-sure-that-a-firefox-plugin-never-activates-again/ ***/
+ * [NOTE] You can still override individual sites via site permissions ***/
 user_pref("plugin.state.flash", 0);
 /* 1820: disable GMP (Gecko Media Plugins)
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
@@ -1051,9 +1044,8 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
  * [NOTE] This will break some sites' functionality e.g. Outlook, Twitter, Facebook, Wordpress
  * This applies to onCut/onCopy/onPaste events - i.e. it requires interaction with the website
  * [WARNING] If both 'middlemouse.paste' and 'general.autoScroll' are true (at least one
- * is default false) then enabling this pref can leak clipboard content, see [2]
- * [1] https://www.ghacks.net/2014/01/08/block-websites-reading-modifying-clipboard-contents-firefox/
- * [2] https://bugzilla.mozilla.org/1528289 */
+ * is default false) then enabling this pref can leak clipboard content, see [1]
+ * [1] https://bugzilla.mozilla.org/1528289 */
    // user_pref("dom.event.clipboardevents.enabled", false);
 /* 2404: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
  * this disables document.execCommand("cut"/"copy") to protect your clipboard
@@ -1204,8 +1196,7 @@ user_pref("network.IDN_show_punycode", true);
  * CAVEAT: JS can still force a pdf to open in-browser by bundling its own code (rare)
  * [SETTING] General>Applications>Portable Document Format (PDF) ***/
 user_pref("pdfjs.disabled", false); // [DEFAULT: false]
-/* 2621: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS]
- * [1] https://www.ghacks.net/2016/03/25/block-firefox-chrome-windows-store/ ***/
+/* 2621: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS] ***/
 user_pref("network.protocol-handler.external.ms-windows-store", false);
 /* 2622: enforce no system colors; they can be fingerprinted
  * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
@@ -1780,7 +1771,6 @@ user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozi
 // * * * /
 // FF77
 // 0850e: disable location bar one-off searches [FF51+]
-   // [1] https://www.ghacks.net/2016/08/09/firefox-one-off-searches-address-bar/
    // [-] https://bugzilla.mozilla.org/1628926
    // user_pref("browser.urlbar.oneOffSearches", false);
 // 2605: block web content in file processes [FF55+]

From 815c3026b5c5287a22af197434faebf4922ccd17 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 13 Aug 2020 15:30:36 +0000
Subject: [PATCH 0607/1147] 79 final

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 3cb73ca..85adda6 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
 * date: 13 Aug 2020
-* version 79-beta
+* version 79
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
 

From 0358fdac8bc86847ac5af21dacbe2db9f1132a81 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 13 Aug 2020 15:32:45 +0000
Subject: [PATCH 0608/1147] 80-alpha

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 85adda6..056fbca 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
 * date: 13 Aug 2020
-* version 79
+* version 80-alpha
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
 

From 99aa5af3566d67ef379f4b95f7cb983f5bccda4c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 13 Aug 2020 15:34:26 +0000
Subject: [PATCH 0609/1147] password master->primary

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 056fbca..d138216 100644
--- a/user.js
+++ b/user.js
@@ -529,14 +529,14 @@ user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
  * [NOTE] This does not clear any passwords already saved
  * [SETTING] Privacy & Security>Logins and Passwords>Ask to save logins and passwords for websites ***/
    // user_pref("signon.rememberSignons", false);
-/* 0902: use a master password
+/* 0902: use a primary password
  * There are no preferences for this. It is all handled internally.
- * [SETTING] Privacy & Security>Logins and Passwords>Use a master password
+ * [SETTING] Privacy & Security>Logins and Passwords>Use a Primary Password
  * [1] https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas ***/
-/* 0903: set how often Firefox should ask for the master password
+/* 0903: set how often Firefox should ask for the primary password
  * 0=the first time (default), 1=every time it's needed, 2=every n minutes (see 0904) ***/
 user_pref("security.ask_for_password", 2);
-/* 0904: set how often in minutes Firefox should ask for the master password (see 0903)
+/* 0904: set how often in minutes Firefox should ask for the primary password (see 0903)
  * in minutes, default is 30 ***/
 user_pref("security.password_lifetime", 5);
 /* 0905: disable auto-filling username & password form fields

From 93840ca1810608fe0703767516015fe368100cd9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 13 Aug 2020 15:37:25 +0000
Subject: [PATCH 0610/1147] 0602 not hidden in ESR78

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index d138216..90f2863 100644
--- a/user.js
+++ b/user.js
@@ -370,7 +370,7 @@ user_pref("network.prefetch-next", false);
 /* 0602: disable DNS prefetching
  * [1] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
 user_pref("network.dns.disablePrefetch", true);
-user_pref("network.dns.disablePrefetchFromHTTPS", true); // [HIDDEN PREF ESR] [DEFAULT: true FF70+]
+user_pref("network.dns.disablePrefetchFromHTTPS", true); // [HIDDEN PREF ESR68 or lower] [DEFAULT: true FF70+]
 /* 0603: disable predictor / prefetching ***/
 user_pref("network.predictor.enabled", false);
 user_pref("network.predictor.enable-prefetch", false); // [FF48+]

From f9f0fffd27062d8b93dd12be5bf88cfd1d720844 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 14 Aug 2020 09:01:14 +0000
Subject: [PATCH 0611/1147] Update README.md

---
 README.md | 12 +++++-------
 1 file changed, 5 insertions(+), 7 deletions(-)

diff --git a/README.md b/README.md
index b374351..81b54a9 100644
--- a/README.md
+++ b/README.md
@@ -1,10 +1,10 @@
 ### ![][b] user.js
 A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.1-Overview) wiki page.
 
-### ![][b] ghacks user.js
-The `ghacks user.js` is a **template** which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).
+### ![][b] This user.js
+This `user.js` is a **template** which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).
 
-Everyone, experts included, should at least read the [implementation](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.3-Implementation) wiki page, as it contains important information regarding a few `ghacks user.js` settings.
+Everyone, experts included, should at least read the [implementation](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.3-Implementation) wiki page, as it contains important information regarding a few `user.js` settings.
 
 Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) if your [threat model](https://www.torproject.org/about/torusers.html.en) calls for it, or for accessing hidden services. 
 
@@ -13,14 +13,12 @@ Also be aware that this `user.js` is made specifically for desktop Firefox. Usin
 Sitemap: [Releases](https://github.com/ghacksuserjs/ghacks-user.js/releases), [changelogs](https://github.com/ghacksuserjs/ghacks-user.js/issues?utf8=%E2%9C%93&q=is%3Aissue+label%3Achangelog), [Wiki](https://github.com/ghacksuserjs/ghacks-user.js/wiki), [stickies](https://github.com/ghacksuserjs/ghacks-user.js/issues?q=is%3Aissue+is%3Aopen+label%3A%22sticky+topic%22). [diffs](https://github.com/ghacksuserjs/ghacks-user.js/issues?q=is%3Aissue+label%3Adiffs)
 
 ### ![][b] acknowledgments
-Literally thousands of sources, references and suggestions. That said...
+Literally thousands of sources, references and suggestions. Special mention to:
 
-* Martin Brinkmann at [ghacks](https://www.ghacks.net/) <sup>1</sup>
-* The ghacks community and commentators
 * [12bytes](https://12bytes.org/articles/tech/firefox/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs)
    * The 12bytes article now uses this user.js and supplements it with an additional JS hosted at [Codeberg](https://codeberg.org/12bytes.org/Firefox-user.js-supplement)
 
-<sup>1</sup> The ghacks user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015 and was [first published](https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/) at ghacks in August 2015. With Martin Brinkmann's blessing, it will keep the ghacks name.
+<sup>1</sup> This user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015, published in August 2015, and moved to GitHub in March 2017
 
 ### ![][b] [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
 

From 726d5bde30604f7a857d674d50ddaf91aadd1c19 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 14 Aug 2020 14:12:28 +0000
Subject: [PATCH 0612/1147] 0105b: stop console error, closes #992

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 90f2863..5b6f656 100644
--- a/user.js
+++ b/user.js
@@ -116,7 +116,7 @@ user_pref("browser.newtabpage.activity-stream.telemetry", false);
  * Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
  * [1] https://abouthome-snippets-service.readthedocs.io/ ***/
 user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
-user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
+user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "{\"\":\"\"}");
 /* 0105c: disable Activity Stream Top Stories, Pocket-based and/or sponsored content ***/
 user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);

From f1e0203ef4dec5bfaa5258a12db8cf7e6070685a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 15 Aug 2020 01:56:01 +0000
Subject: [PATCH 0613/1147] 0105b, cleaner value, see #992

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 5b6f656..26169cb 100644
--- a/user.js
+++ b/user.js
@@ -116,7 +116,7 @@ user_pref("browser.newtabpage.activity-stream.telemetry", false);
  * Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
  * [1] https://abouthome-snippets-service.readthedocs.io/ ***/
 user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
-user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "{\"\":\"\"}");
+user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "{}");
 /* 0105c: disable Activity Stream Top Stories, Pocket-based and/or sponsored content ***/
 user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);

From 9a37e1340c430cc9953f6a73226f286d12bd9746 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 20 Aug 2020 17:18:22 +0000
Subject: [PATCH 0614/1147] 0905: add reference, #982

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 26169cb..00e738d 100644
--- a/user.js
+++ b/user.js
@@ -542,7 +542,8 @@ user_pref("security.password_lifetime", 5);
 /* 0905: disable auto-filling username & password form fields
  * can leak in cross-site forms *and* be spoofed
  * [NOTE] Username & password is still available when you enter the field
- * [SETTING] Privacy & Security>Logins and Passwords>Autofill logins and passwords ***/
+ * [SETTING] Privacy & Security>Logins and Passwords>Autofill logins and passwords
+ * [1] https://freedom-to-tinker.com/2017/12/27/no-boundaries-for-user-identities-web-trackers-exploit-browser-login-managers/ ***/
 user_pref("signon.autofillForms", false);
 /* 0909: disable formless login capture for Password Manager [FF51+] ***/
 user_pref("signon.formlessCapture.enabled", false);

From 8d6d17d46bbb11b5b3e0c281f72266a82ebb187b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 21 Aug 2020 21:05:08 +0000
Subject: [PATCH 0615/1147] 1244: HTTPS-only mode: FF80+ site exceptions

The option is not shown if https-only-mode is not being applied. I tested with `http://asmjs.org/` since it doesn't redirect/upgrade to secure.
---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 00e738d..f67ab24 100644
--- a/user.js
+++ b/user.js
@@ -734,8 +734,9 @@ user_pref("security.mixed_content.block_display_content", true);
 /* 1243: block unencrypted requests from Flash on encrypted pages to mitigate MitM attacks [FF59+]
  * [1] https://bugzilla.mozilla.org/1190623 ***/
 user_pref("security.mixed_content.block_object_subrequest", true);
-/* 1244: enable https-only-mode [FF76+]
+/* 1244: enable HTTPS-Only mode [FF76+]
  * [NOTE] This is experimental
+ * [SETTING] to add site exceptions: Page Info>Permissions>Use insecure HTTP (FF80+)
  * [SETTING] Privacy & Security>HTTPS-Only Mode (FF81+)
  * [1] https://bugzilla.mozilla.org/1613063 */
    // user_pref("dom.security.https_only_mode", true); // [FF76+]

From b3eee6c9fd6a5497f361079389b2dd648f3fdb53 Mon Sep 17 00:00:00 2001
From: h88e22dgpeps56sg <52240714+h88e22dgpeps56sg@users.noreply.github.com>
Date: Sat, 22 Aug 2020 12:07:13 +0000
Subject: [PATCH 0616/1147] improve readability, remove lots of unnecessary
 echo commands, remove legacy arguments (#997)

Co-authored-by: TotallyLeGIT <bbkqx24kxlgvgbss@mailban.de>
---
 updater.sh | 118 +++++++++++++++++++++--------------------------------
 1 file changed, 47 insertions(+), 71 deletions(-)

diff --git a/updater.sh b/updater.sh
index 5c06a9c..d2756af 100755
--- a/updater.sh
+++ b/updater.sh
@@ -11,7 +11,7 @@
 readonly CURRDIR=$(pwd)
 
 sfp=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
-if [ -z "$sfp" ]; then sfp=${BASH_SOURCE[0]}; fi
+[ -z "$sfp" ] && sfp=${BASH_SOURCE[0]}
 readonly SCRIPT_DIR=$(dirname "${sfp}")
 
 
@@ -52,15 +52,15 @@ fi
 
 
 show_banner () {
-  echo -e "${BBLUE}\n"
-  echo '                ############################################################################'
-  echo '                ####                                                                    ####'
-  echo '                ####                           ghacks user.js                           ####'
-  echo '                ####       Hardening the Privacy and Security Settings of Firefox       ####'
-  echo '                ####           Maintained by @Thorin-Oakenpants and @earthlng           ####'
-  echo '                ####            Updater for macOS and Linux by @overdodactyl            ####'
-  echo '                ####                                                                    ####'
-  echo '                ############################################################################'
+  echo -e "${BBLUE}
+                ############################################################################
+                ####                                                                    ####
+                ####                           ghacks user.js                           ####
+                ####       Hardening the Privacy and Security Settings of Firefox       ####
+                ####           Maintained by @Thorin-Oakenpants and @earthlng           ####
+                ####            Updater for macOS and Linux by @overdodactyl            ####
+                ####                                                                    ####
+                ############################################################################"
   echo -e "${NC}\n"
   echo -e "Documentation for this script is available here: ${CYAN}https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts${NC}\n"
 }
@@ -70,43 +70,35 @@ show_banner () {
 #########################
 
 usage() {
-  echo -e "${BLUE}\nUsage: $0 [-h] [-p PROFILE] [-u] [-d] [-s] [-n] [-b] [-c] [-v] [-r] [-e] [-o OVERRIDE]\n${NC}" 1>&2  # Echo usage string to standard error
-  echo 'Optional Arguments:'
-  echo -e "\t-h,\t\t Show this help message and exit."
-  echo -e "\t-p PROFILE,\t Path to your Firefox profile (if different than the dir of this script)"
-  echo -e "\t\t\t IMPORTANT: if the path include spaces, wrap the entire argument in quotes."
-  echo -e "\t-l, \t\t Choose your Firefox profile from a list"
-  echo -e "\t-u,\t\t Update updater.sh and execute silently.  Do not seek confirmation."
-  echo -e "\t-d,\t\t Do not look for updates to updater.sh."
-  echo -e "\t-s,\t\t Silently update user.js.  Do not seek confirmation."
-  echo -e "\t-b,\t\t Only keep one backup of each file."
-  echo -e "\t-c,\t\t Create a diff file comparing old and new user.js within userjs_diffs. "
-  echo -e "\t-o OVERRIDE,\t Filename or path to overrides file (if different than user-overrides.js)."
-  echo -e "\t\t\t If used with -p, paths should be relative to PROFILE or absolute paths"
-  echo -e "\t\t\t If given a directory, all files inside will be appended recursively."
-  echo -e "\t\t\t You can pass multiple files or directories by passing a comma separated list."
-  echo -e "\t\t\t\t Note: If a directory is given, only files inside ending in the extension .js are appended"
-  echo -e "\t\t\t\t IMPORTANT: do not add spaces between files/paths.  Ex: -o file1.js,file2.js,dir1"
-  echo -e "\t\t\t\t IMPORTANT: if any files/paths include spaces, wrap the entire argument in quotes."
-  echo -e "\t\t\t\t\t Ex: -o \"override folder\" "
-  echo -e "\t-n,\t\t Do not append any overrides, even if user-overrides.js exists."
-  echo -e "\t-v,\t\t Open the resulting user.js file."
-  echo -e "\t-r,\t\t Only download user.js to a temporary file and open it."
-    echo -e "\t-e,\t\t Activate ESR related preferences."
-  echo -e
-  echo 'Deprecated Arguments (they still work for now):'
-  echo -e "\t-donotupdate,\t Use instead -d"
-  echo -e "\t-update,\t Use instead -u"
-  echo -e
+  echo
+  echo -e "${BLUE}Usage: $0 [-bcdehlnrsuv] [-p PROFILE] [-o OVERRIDE]${NC}" 1>&2  # Echo usage string to standard error
+  echo -e "
+Optional Arguments:
+    -h           Show this help message and exit.
+    -p PROFILE   Path to your Firefox profile (if different than the dir of this script)
+                 IMPORTANT: if the path includes spaces, wrap the entire argument in quotes.
+    -l           Choose your Firefox profile from a list
+    -u           Update updater.sh and execute silently.  Do not seek confirmation.
+    -d           Do not look for updates to updater.sh.
+    -s           Silently update user.js.  Do not seek confirmation.
+    -b           Only keep one backup of each file.
+    -c           Create a diff file comparing old and new user.js within userjs_diffs.
+    -o OVERRIDE  Filename or path to overrides file (if different than user-overrides.js).
+                 If used with -p, paths should be relative to PROFILE or absolute paths
+                 If given a directory, all files inside will be appended recursively.
+                 You can pass multiple files or directories by passing a comma separated list.
+                     Note: If a directory is given, only files inside ending in the extension .js are appended
+                     IMPORTANT: do not add spaces between files/paths.  Ex: -o file1.js,file2.js,dir1
+                     IMPORTANT: if any files/paths include spaces, wrap the entire argument in quotes.
+                         Ex: -o \"override folder\"
+    -n           Do not append any overrides, even if user-overrides.js exists.
+    -v           Open the resulting user.js file.
+    -r           Only download user.js to a temporary file and open it.
+    -e           Activate ESR related preferences."
+  echo
   exit 1
 }
 
-legacy_argument () {
-  echo -e "${ORANGE}\nWarning: command line arguments have changed."
-  echo -e "$1 has been deprecated and may not work in the future.\n"
-  echo -e "Please view the new options using the -h argument.${NC}"
-}
-
 #########################
 #     File Handling     #
 #########################
@@ -204,8 +196,8 @@ get_updater_version () {
 # Update updater.sh
 # Default: Check for update, if available, ask user if they want to execute it
 # Args:
-#   -donotupdate: New version will not be looked for and update will not occur
-#   -update: Check for update, if available, execute without asking
+#   -d: New version will not be looked for and update will not occur
+#   -u: Check for update, if available, execute without asking
 update_updater () {
   if [ $UPDATE = 'no' ]; then
     return 0 # User signified not to check for updates
@@ -218,9 +210,7 @@ update_updater () {
       echo -e "There is a newer version of updater.sh available. ${RED}Update and execute Y/N?${NC}"
       read -p "" -n 1 -r
       echo -e "\n\n"
-      if [[ $REPLY =~ ^[Nn]$ ]]; then
-        return 0 # Update available, but user chooses not to update
-      fi
+      [[ $REPLY =~ ^[Nn]$ ]] && return 0 # Update available, but user chooses not to update
     fi
   else
     return 0 # No update available
@@ -238,11 +228,7 @@ update_updater () {
 
 # Returns version number of a user.js file
 get_userjs_version () {
-  if [ -e $1 ]; then
-    echo "$(sed -n '4p' "$1")"
-  else
-    echo "Not detected."
-  fi
+  [ -e $1 ] && echo "$(sed -n '4p' "$1")" || echo "Not detected."
 }
 
 add_override () {
@@ -273,10 +259,10 @@ remove_comments () { # expects 2 arguments: from-file and to-file
 update_userjs () {
   declare -r newfile=$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js')
 
-  echo 'Please observe the following information:'
-  echo -e "\tFirefox profile:  ${ORANGE}$(pwd)${NC}"
-  echo -e "\tAvailable online: ${ORANGE}$(get_userjs_version $newfile)${NC}"
-  echo -e "\tCurrently using:  ${ORANGE}$(get_userjs_version user.js)\n${NC}\n"
+  echo -e "Please observe the following information:
+    Firefox profile:  ${ORANGE}$(pwd)${NC}
+    Available online: ${ORANGE}$(get_userjs_version $newfile)${NC}
+    Currently using:  ${ORANGE}$(get_userjs_version user.js)${NC}\n\n"
 
   if [ $CONFIRM = 'yes' ]; then
     echo -e "This script will update to the latest user.js file and append any custom configurations from user-overrides.js. ${RED}Continue Y/N? ${NC}"
@@ -298,9 +284,7 @@ update_userjs () {
   # backup user.js
   mkdir -p userjs_backups
   local bakname="userjs_backups/user.js.backup.$(date +"%Y-%m-%d_%H%M")"
-  if [ $BACKUP = 'single' ]; then
-    bakname='userjs_backups/user.js.backup'
-  fi
+  [ $BACKUP = 'single' ] && bakname='userjs_backups/user.js.backup'
   cp user.js "$bakname" &>/dev/null
 
   mv "${newfile}" user.js
@@ -336,14 +320,12 @@ update_userjs () {
       echo -e "Status: ${GREEN}A diff file was created:${NC} ${PWD}/${diffname}"
     else
       echo -e "Warning: ${ORANGE}Your new user.js file appears to be identical.  No diff file was created.${NC}"
-      if [ $BACKUP = 'multiple' ]; then
-        rm $bakname &>/dev/null
-      fi
+      [ $BACKUP = 'multiple' ] && rm $bakname &>/dev/null
     fi
     rm $past_nocomments $current_nocomments $pastuserjs &>/dev/null
   fi
 
-  if [ "$VIEW" = true ]; then open_file "${PWD}/user.js"; fi
+  [ "$VIEW" = true ] && open_file "${PWD}/user.js"
 }
 
 #########################
@@ -355,12 +337,6 @@ if [ $# != 0 ]; then
   # Display usage if first argument is -help or --help
   if [ $1 = '--help' ] || [ $1 = '-help' ]; then
     usage
-  elif [ $legacy_lc = '-donotupdate' ]; then
-    UPDATE='no'
-    legacy_argument $1
-  elif [ $legacy_lc = '-update' ]; then
-    UPDATE='yes'
-    legacy_argument $1
   else
     while getopts ":hp:ludsno:bcvre" opt; do
       case $opt in

From a5ab3e23d68253f41aeb86cfaa7628e1eed882d5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 22 Aug 2020 22:16:27 +0000
Subject: [PATCH 0617/1147] Update README.md

---
 README.md | 2 --
 1 file changed, 2 deletions(-)

diff --git a/README.md b/README.md
index 81b54a9..e13832d 100644
--- a/README.md
+++ b/README.md
@@ -18,8 +18,6 @@ Literally thousands of sources, references and suggestions. Special mention to:
 * [12bytes](https://12bytes.org/articles/tech/firefox/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs)
    * The 12bytes article now uses this user.js and supplements it with an additional JS hosted at [Codeberg](https://codeberg.org/12bytes.org/Firefox-user.js-supplement)
 
-<sup>1</sup> This user.js was an independent project by [Thorin-Oakenpants](https://github.com/Thorin-Oakenpants) started in early 2015, published in August 2015, and moved to GitHub in March 2017
-
 ### ![][b] [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
 
 [b]: /wikipiki/bullet01.png

From cfce521919053be2434f8c3bf428787fde50ee9f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 23 Aug 2020 14:37:18 +0000
Subject: [PATCH 0618/1147] 1409: RFP changes in FF81+ (#998)

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index f67ab24..0eccd71 100644
--- a/user.js
+++ b/user.js
@@ -809,7 +809,8 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
  * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed
- * [NOTE] RFP in FF80+ restricts the whitelist to bundled and "Base Fonts" (see 4618)
+ * [NOTE] in FF80 RFP restricts the whitelist to bundled and "Base Fonts"
+ * ...and in FF81+ the whitelist **overrides** RFP's font visibility (see 4618)
  * [WARNING] Creating your own probably highly-unique whitelist will raise your entropy.
  * Eventually privacy.resistFingerprinting (see 4500) will cover this
  * [1] https://bugzilla.mozilla.org/1121643 ***/

From 38d772e4c8721f59a361370572cdb25d777ea04a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 25 Aug 2020 14:59:41 +0000
Subject: [PATCH 0619/1147] https-only mode updates (#1001)

---
 user.js | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 0eccd71..4996b3f 100644
--- a/user.js
+++ b/user.js
@@ -735,11 +735,12 @@ user_pref("security.mixed_content.block_display_content", true);
  * [1] https://bugzilla.mozilla.org/1190623 ***/
 user_pref("security.mixed_content.block_object_subrequest", true);
 /* 1244: enable HTTPS-Only mode [FF76+]
- * [NOTE] This is experimental
+ * When "https_only_mode" (all windows) is true, "https_only_mode_pbm" (private windows only) is ignored
  * [SETTING] to add site exceptions: Page Info>Permissions>Use insecure HTTP (FF80+)
- * [SETTING] Privacy & Security>HTTPS-Only Mode (FF81+)
- * [1] https://bugzilla.mozilla.org/1613063 */
+ * [SETTING] Privacy & Security>HTTPS-Only Mode (FF80+ with browser.preferences.exposeHTTPSOnly = true)
+ * [1] https://bugzilla.mozilla.org/1613063 ***/
    // user_pref("dom.security.https_only_mode", true); // [FF76+]
+   // user_pref("dom.security.https_only_mode_pbm", true); // [FF80+]
    // user_pref("dom.security.https_only_mode.upgrade_local", true); // [FF77+]
 
 /** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro]

From c6f53c876803a4af26e1000c17455cc09f04cd9b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 26 Aug 2020 11:28:47 +0000
Subject: [PATCH 0620/1147] 2201 deprecated (dead prefs removed in 82), #979
 (#1002)

---
 user.js | 21 +++++++++++----------
 1 file changed, 11 insertions(+), 10 deletions(-)

diff --git a/user.js b/user.js
index 4996b3f..9d116d1 100644
--- a/user.js
+++ b/user.js
@@ -958,16 +958,6 @@ user_pref("media.autoplay.blocking_policy", 2);
 
 /*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/
 user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
-/* 2201: prevent websites from disabling new window features ***/
-user_pref("dom.disable_window_open_feature.close", true);
-user_pref("dom.disable_window_open_feature.location", true); // [DEFAULT: true]
-user_pref("dom.disable_window_open_feature.menubar", true);
-user_pref("dom.disable_window_open_feature.minimizable", true);
-user_pref("dom.disable_window_open_feature.personalbar", true); // bookmarks toolbar
-user_pref("dom.disable_window_open_feature.resizable", true); // [DEFAULT: true]
-user_pref("dom.disable_window_open_feature.status", true); // [DEFAULT: true]
-user_pref("dom.disable_window_open_feature.titlebar", true);
-user_pref("dom.disable_window_open_feature.toolbar", true);
 /* 2202: prevent scripts from moving and resizing open windows ***/
 user_pref("dom.disable_window_move_resize", true);
 /* 2203: open links targeting new windows in a new tab instead
@@ -1772,6 +1762,17 @@ user_pref("webgl.disable-extensions", true);
    // [2] https://trac.torproject.org/projects/tor/ticket/16931
    // [-] https://bugzilla.mozilla.org/1618188
 user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
+// 2201: prevent websites from disabling new window features
+   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507375,1660524
+user_pref("dom.disable_window_open_feature.close", true);
+user_pref("dom.disable_window_open_feature.location", true); // [DEFAULT: true]
+user_pref("dom.disable_window_open_feature.menubar", true);
+user_pref("dom.disable_window_open_feature.minimizable", true);
+user_pref("dom.disable_window_open_feature.personalbar", true); // bookmarks toolbar
+user_pref("dom.disable_window_open_feature.resizable", true); // [DEFAULT: true]
+user_pref("dom.disable_window_open_feature.status", true); // [DEFAULT: true]
+user_pref("dom.disable_window_open_feature.titlebar", true);
+user_pref("dom.disable_window_open_feature.toolbar", true);
 // * * * /
 // FF77
 // 0850e: disable location bar one-off searches [FF51+]

From 592b959c241ad3fb633a6cc4f9f766321771383c Mon Sep 17 00:00:00 2001
From: h88e22dgpeps56sg <52240714+h88e22dgpeps56sg@users.noreply.github.com>
Date: Fri, 28 Aug 2020 10:51:15 +0000
Subject: [PATCH 0621/1147] Updater.sh rework 2 (#1000)

* rework DOWNLOAD_METHOD, download_file, open_file

* remove legacy command leftover line

* return empty string if download fails and return/exit if this happens and show error message

* fix IFS var typo

* bump version

* add quotes

Co-authored-by: TotallyLeGIT <bbkqx24kxlgvgbss@mailban.de>
---
 updater.sh | 32 +++++++++++++-------------------
 1 file changed, 13 insertions(+), 19 deletions(-)

diff --git a/updater.sh b/updater.sh
index d2756af..ddd5266 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## ghacks-user.js updater for macOS and Linux
 
-## version: 2.6
+## version: 2.7
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac
 
@@ -42,9 +42,9 @@ ESR=false
 # Download method priority: curl -> wget
 DOWNLOAD_METHOD=''
 if [[ $(command -v 'curl') ]]; then
-  DOWNLOAD_METHOD='curl'
+  DOWNLOAD_METHOD='curl --max-redirs 3 -so'
 elif [[ $(command -v 'wget') ]]; then
-  DOWNLOAD_METHOD='wget'
+  DOWNLOAD_METHOD='wget --max-redirect 3 --quiet -O'
 else
   echo -e "${RED}This script requires curl or wget.\nProcess aborted${NC}"
   exit 0
@@ -104,24 +104,16 @@ Optional Arguments:
 #########################
 
 # Download files
-download_file () {
-  declare -r url=$1
+download_file () {   # expects URL as argument ($1)
   declare -r tf=$(mktemp)
-  local dlcmd=''
 
-  if [ $DOWNLOAD_METHOD = 'curl' ]; then
-    dlcmd="curl -o $tf"
-  else
-    dlcmd="wget -O $tf"
-  fi
-
-  $dlcmd "${url}" &>/dev/null && echo "$tf" || echo '' # return the temp-filename (or empty string on error)
+  $DOWNLOAD_METHOD "${tf}" "$1" && echo "$tf" || echo '' # return the temp-filename or empty string on error
 }
 
 open_file () { #expects one argument: file_path
   if [ "$(uname)" == 'Darwin' ]; then
     open "$1"
-  elif [ "$(expr substr $(uname -s) 1 5)" == "Linux" ]; then
+  elif [ "$(uname -s | cut -c -5)" == "Linux" ]; then
     xdg-open "$1"
   else
     echo -e "${RED}Error: Sorry, opening files is not supported for your OS.${NC}"
@@ -203,7 +195,8 @@ update_updater () {
     return 0 # User signified not to check for updates
   fi
 
-  declare -r tmpfile=$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.sh')
+  declare -r tmpfile="$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.sh')"
+  [ -z "${tmpfile}" ] && echo -e "${RED}Error! Could not download updater.sh${NC}" && return 1 # check if download failed
 
   if [[ $(get_updater_version "${SCRIPT_DIR}/updater.sh") < $(get_updater_version "${tmpfile}") ]]; then
     if [ $UPDATE = 'check' ]; then
@@ -238,7 +231,7 @@ add_override () {
     cat "$input" >> user.js
     echo -e "Status: ${GREEN}Override file appended:${NC} ${input}"
   elif [ -d "$input" ]; then
-    FSAVEIFS=$IFS
+    SAVEIFS=$IFS
     IFS=$'\n\b' # Set IFS
     FILES="${input}"/*.js
     for f in $FILES
@@ -257,7 +250,8 @@ remove_comments () { # expects 2 arguments: from-file and to-file
 
 # Applies latest version of user.js and any custom overrides
 update_userjs () {
-  declare -r newfile=$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js')
+  declare -r newfile="$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js')"
+  [ -z "${newfile}" ] && echo -e "${RED}Error! Could not download user.js${NC}" && return 1 # check if download failed
 
   echo -e "Please observe the following information:
     Firefox profile:  ${ORANGE}$(pwd)${NC}
@@ -333,7 +327,6 @@ update_userjs () {
 #########################
 
 if [ $# != 0 ]; then
-  readonly legacy_lc=$(echo $1 | tr '[A-Z]' '[a-z]')
   # Display usage if first argument is -help or --help
   if [ $1 = '--help' ] || [ $1 = '-help' ]; then
     usage
@@ -377,7 +370,8 @@ if [ $# != 0 ]; then
           ESR=true
           ;;
         r)
-          tfile=$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js')
+          tfile="$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js')"
+          [ -z "${tfile}" ] && echo -e "${RED}Error! Could not download user.js${NC}" && exit 1 # check if download failed
           mv $tfile "${tfile}.js"
           echo -e "${ORANGE}Warning: user.js was saved to temporary file ${tfile}.js${NC}"
           open_file "${tfile}.js"

From 5fd7f6de7e5b193f63954380e948fb8b876ea445 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 28 Aug 2020 18:27:20 +0000
Subject: [PATCH 0622/1147] 80-alpha

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 9d116d1..2788d3b 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 13 Aug 2020
-* version 80-alpha
+* date: 28 Aug 2020
+* version 80-beta
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
 

From fbe1d48fe2a934da37ce950d28edee2372d86bda Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 31 Aug 2020 19:49:00 +0000
Subject: [PATCH 0623/1147] 2203: open_newwindow values

- FYI: https://bugzilla.mozilla.org/show_bug.cgi?id=1661643
- https://hg.mozilla.org/integration/autoland/rev/12d62b074178
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 2788d3b..fa49e66 100644
--- a/user.js
+++ b/user.js
@@ -965,7 +965,7 @@ user_pref("dom.disable_window_move_resize", true);
  * You can still right-click a link and open in a new window.
  * [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#screen
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
-user_pref("browser.link.open_newwindow", 3);
+user_pref("browser.link.open_newwindow", 3); // 2=new window, 3=new tab
 user_pref("browser.link.open_newwindow.restriction", 0);
 /* 2204: disable Fullscreen API (requires user interaction) to prevent screen-resolution leaks
  * [NOTE] You can still manually toggle the browser's fullscreen state (F11),

From 8dacf6e91f055a91125a01decebfc86a145043c3 Mon Sep 17 00:00:00 2001
From: Diogo Agostinho <diogo.ps.agostinho@gmail.com>
Date: Mon, 31 Aug 2020 21:47:57 +0000
Subject: [PATCH 0624/1147] fix typo (#1005)

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index fa49e66..0a9dceb 100644
--- a/user.js
+++ b/user.js
@@ -505,7 +505,7 @@ user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
  * [1] https://support.mozilla.org/en-US/kb/address-bar-autocomplete-firefox#w_url-autocomplete ***/
    // user_pref("browser.urlbar.autoFill", false);
 /* 0860: disable search and form history
- * [SETUP-WEB] Be aware thet autocomplete form data can be read by third parties, see [1] [2]
+ * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties, see [1] [2]
  * [NOTE] We also clear formdata on exit (see 2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html

From 22d2d702beb25ef627c22f38f24ad3c6bb1756d3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 3 Sep 2020 13:02:09 +0000
Subject: [PATCH 0625/1147] 1409: obsolete RFP mention

---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 0a9dceb..4893c80 100644
--- a/user.js
+++ b/user.js
@@ -813,7 +813,6 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
  * [NOTE] in FF80 RFP restricts the whitelist to bundled and "Base Fonts"
  * ...and in FF81+ the whitelist **overrides** RFP's font visibility (see 4618)
  * [WARNING] Creating your own probably highly-unique whitelist will raise your entropy.
- * Eventually privacy.resistFingerprinting (see 4500) will cover this
  * [1] https://bugzilla.mozilla.org/1121643 ***/
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
 

From ed993d550288c30e636e5198e7aa349c5de3a5c5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 3 Sep 2020 13:04:31 +0000
Subject: [PATCH 0626/1147] 80 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 4893c80..226a724 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
-* date: 28 Aug 2020
-* version 80-beta
+* date: 03 Sep 2020
+* version 80
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
 

From 3c2bd930c3f6c25889a169d16ec4b6f60d022a72 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 3 Sep 2020 13:11:16 +0000
Subject: [PATCH 0627/1147] start 81-alpha, EOL for ESR68

---
 user.js | 100 ++------------------------------------------------------
 1 file changed, 3 insertions(+), 97 deletions(-)

diff --git a/user.js b/user.js
index 226a724..5259baa 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: ghacks user.js
 * date: 03 Sep 2020
-* version 80
+* version 81-alpha
 * url: https://github.com/ghacksuserjs/ghacks-user.js
 * license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
 
@@ -370,7 +370,7 @@ user_pref("network.prefetch-next", false);
 /* 0602: disable DNS prefetching
  * [1] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
 user_pref("network.dns.disablePrefetch", true);
-user_pref("network.dns.disablePrefetchFromHTTPS", true); // [HIDDEN PREF ESR68 or lower] [DEFAULT: true FF70+]
+user_pref("network.dns.disablePrefetchFromHTTPS", true); // [DEFAULT: true FF70+]
 /* 0603: disable predictor / prefetching ***/
 user_pref("network.predictor.enabled", false);
 user_pref("network.predictor.enable-prefetch", false); // [FF48+]
@@ -1680,7 +1680,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
-     Documentation denoted as [-]. Items deprecated in FF68 or earlier have been archived at [1],
+     Documentation denoted as [-]. Items deprecated in FF78 or earlier have been archived at [1],
      which also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
      [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/123
 ***/
@@ -1699,99 +1699,5 @@ user_pref("intl.charset.fallback.override", "windows-1252");
 // * * * /
 // ***/
 
-/* ESR68.x still uses all the following prefs
-// [NOTE] replace the * with a slash in the line above to re-enable them
-// FF69
-// 1405: disable WOFF2 (Web Open Font Format) [FF35+]
-   // [-] https://bugzilla.mozilla.org/1556991
-   // user_pref("gfx.downloadable_fonts.woff2.enabled", false);
-// 1802: enforce click-to-play for plugins
-   // [-] https://bugzilla.mozilla.org/1519434
-user_pref("plugins.click_to_play", true); // [DEFAULT: true FF25+]
-// 2033: disable autoplay for muted videos [FF63+] - replaced by 'media.autoplay.default' options (2030)
-   // [-] https://bugzilla.mozilla.org/1562331
-   // user_pref("media.autoplay.allow-muted", false);
-// * * * /
-// FF71
-// 2608: disable WebIDE and ADB extension download
-   // [1] https://trac.torproject.org/projects/tor/ticket/16222
-   // [-] https://bugzilla.mozilla.org/1539462
-user_pref("devtools.webide.enabled", false); // [DEFAULT: false FF70+]
-user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
-// 2731: enforce websites to ask to store data for offline use
-   // [1] https://support.mozilla.org/questions/1098540
-   // [2] https://bugzilla.mozilla.org/959985
-   // [-] https://bugzilla.mozilla.org/1574480
-user_pref("offline-apps.allow_by_default", false);
-// * * * /
-// FF72
-// 0105a: disable Activity Stream telemetry
-   // [-] https://bugzilla.mozilla.org/1597697
-user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
-// 0330: disable Hybdrid Content telemetry
-   // [-] https://bugzilla.mozilla.org/1520491
-user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+]
-// 2720: enforce IndexedDB (IDB) as enabled
-   // IDB is required for extensions and Firefox internals (even before FF63 in [1])
-   // To control *website* IDB data, control allowing cookies and service workers, or use
-   // Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize
-   // on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically
-   // via an extension. Note that IDB currently cannot be sanitized by host.
-   // [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/
-   // [-] https://bugzilla.mozilla.org/1488583
-user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
-// * * * /
-// FF74
-// 0203: use Mozilla geolocation service instead of Google when geolocation is enabled
-   // Optionally enable logging to the console (defaults to false)
-   // [-] https://bugzilla.mozilla.org/1613627
-user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
-   // user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
-// 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
-   // 0=no menu (default), 1=show when clicked, 2=show on long press
-   // [1] https://bugzilla.mozilla.org/1328756
-   // [-] https://bugzilla.mozilla.org/1606265
-user_pref("privacy.userContext.longPressBehavior", 2);
-// 2012: limit WebGL
-   // [-] https://bugzilla.mozilla.org/1477756
-user_pref("webgl.disable-extensions", true);
-// * * * /
-// FF76
-// 0401: sanitize blocklist url
-   // [2] https://trac.torproject.org/projects/tor/ticket/16931
-   // [-] https://bugzilla.mozilla.org/1618188
-user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
-// 2201: prevent websites from disabling new window features
-   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507375,1660524
-user_pref("dom.disable_window_open_feature.close", true);
-user_pref("dom.disable_window_open_feature.location", true); // [DEFAULT: true]
-user_pref("dom.disable_window_open_feature.menubar", true);
-user_pref("dom.disable_window_open_feature.minimizable", true);
-user_pref("dom.disable_window_open_feature.personalbar", true); // bookmarks toolbar
-user_pref("dom.disable_window_open_feature.resizable", true); // [DEFAULT: true]
-user_pref("dom.disable_window_open_feature.status", true); // [DEFAULT: true]
-user_pref("dom.disable_window_open_feature.titlebar", true);
-user_pref("dom.disable_window_open_feature.toolbar", true);
-// * * * /
-// FF77
-// 0850e: disable location bar one-off searches [FF51+]
-   // [-] https://bugzilla.mozilla.org/1628926
-   // user_pref("browser.urlbar.oneOffSearches", false);
-// 2605: block web content in file processes [FF55+]
-   // [SETUP-WEB] You may want to disable this for corporate or developer environments
-   // [1] https://bugzilla.mozilla.org/1343184
-   // [-] https://bugzilla.mozilla.org/1603007
-user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false);
-// * * * /
-// FF78
-// 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] - replaced by 'media.autoplay.blocking_policy'
-   // [-] https://bugzilla.mozilla.org/1509933
-user_pref("media.autoplay.enabled.user-gestures-needed", false);
-// 5000's: disable chrome animations - replaced FF77+ by 'ui.prefersReducedMotion' (4520)
-   // [-] https://bugzilla.mozilla.org/1640501
-   // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
-// * * * /
-// ***/
-
 /* END: internal custom pref to test for syntax errors ***/
 user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");

From 76019e6fbe957a4338a7c91de20821089b459659 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 3 Sep 2020 13:27:25 +0000
Subject: [PATCH 0628/1147] ESR78 unhidden prefs

also, the note about WebExt + SVG only applies to people using outdated versions .. so that can go too
---
 user.js | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 5259baa..0f95a51 100644
--- a/user.js
+++ b/user.js
@@ -581,7 +581,7 @@ user_pref("browser.cache.disk.enable", false);
 /* 1003: disable memory cache
  * capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kibibytes ***/
    // user_pref("browser.cache.memory.enable", false);
-   // user_pref("browser.cache.memory.capacity", 0); // [HIDDEN PREF ESR]
+   // user_pref("browser.cache.memory.capacity", 0);
 /* 1006: disable permissions manager from writing to disk [RESTART]
  * [NOTE] This means any permission changes are session only
  * [1] https://bugzilla.mozilla.org/967812 ***/
@@ -1149,7 +1149,6 @@ user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
  * [1] https://bugzilla.mozilla.org/1173199 ***/
    // user_pref("mathml.disabled", true);
 /* 2610: disable in-content SVG (Scalable Vector Graphics) [FF53+]
- * [NOTE] In FF70+ and ESR68.1.0+ this no longer affects extensions (1564208)
  * [WARNING] Expect breakage incl. youtube player controls. Best left for a "hardened" profile.
  * [1] https://bugzilla.mozilla.org/1216893 ***/
    // user_pref("svg.disabled", true);
@@ -1391,7 +1390,7 @@ user_pref("privacy.firstparty.isolate", true);
  * [2] https://bugzilla.mozilla.org/1492607
  * [3] https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage ***/
    // user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAULT: true]
-   // user_pref("privacy.firstparty.isolate.block_post_message", true); // [HIDDEN PREF ESR]
+   // user_pref("privacy.firstparty.isolate.block_post_message", true);
 /* 4003: enable site partitioning (FF78+)
  * [1] https://bugzilla.mozilla.org/1590107 [META] */
 user_pref("privacy.partition.network_state", true);

From 75a03df0f70523caa52560229f671028380ff76f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 5 Sep 2020 15:20:46 +0000
Subject: [PATCH 0629/1147] miscellaneous (#1007)

- less active prefs
   - now that ESR68 is EOL, at least a whopping two (0602, 1273)
   - also I don't know when the default changed - another whopping whole one (1240)
   - and where we do enforce/reset a pref to default, lets say that
   - this is not a definitive list, sing out if there is anything else
- IPv6 info
   - especially for Iron Heart who likes to claim that this pref breaks 5% of sites
- cleanup of settings tags now we only care abut ESR78+
---
 user.js | 20 +++++++++-----------
 1 file changed, 9 insertions(+), 11 deletions(-)

diff --git a/user.js b/user.js
index 0f95a51..85b59f4 100644
--- a/user.js
+++ b/user.js
@@ -206,8 +206,7 @@ user_pref("app.update.auto", false);
  * when false, extension detail tabs will have no description ***/
    // user_pref("extensions.getAddons.cache.enabled", false);
 /* 0308: disable search engine updates (e.g. OpenSearch)
- * [NOTE] This does not affect Mozilla's built-in or Web Extension search engines
- * [SETTING] General>Firefox Updates>Automatically update search engines (FF72-) ***/
+ * [NOTE] This does not affect Mozilla's built-in or Web Extension search engines ***/
 user_pref("browser.search.update", false);
 /* 0309: disable sending Flash crash reports ***/
 user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
@@ -352,7 +351,7 @@ user_pref("browser.ping-centre.telemetry", false);
 /* 0517: disable Form Autofill
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
- * [SETTING] Privacy & Security>Forms and Autofill>Autofill addresses (FF74+)
+ * [SETTING] Privacy & Security>Forms and Autofill>Autofill addresses
  * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill ***/
 user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
 user_pref("extensions.formautofill.available", "off"); // [FF56+]
@@ -377,16 +376,16 @@ user_pref("network.predictor.enable-prefetch", false); // [FF48+]
 /* 0605: disable link-mouseover opening connection to linked server
  * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests ***/
 user_pref("network.http.speculative-parallel-limit", 0);
-/* 0606: disable "Hyperlink Auditing" (click tracking) and enforce same host in case
+/* 0606: enforce no "Hyperlink Auditing" (click tracking)
  * [1] https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ***/
 user_pref("browser.send_pings", false); // [DEFAULT: false]
-user_pref("browser.send_pings.require_same_host", true);
+user_pref("browser.send_pings.require_same_host", true); // defense-in-depth
 
 /*** [SECTION 0700]: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
 /* 0701: disable IPv6
- * IPv6 can be abused, especially regarding MAC addresses. They also do not play nice
- * with VPNs. That's even assuming your ISP and/or router and/or website can handle it.
+ * IPv6 can be abused, especially with MAC addresses, and they do not play nice with VPNs. That's
+ * even assuming your ISP and/or router and/or website can handle it. Sites will fall back to IPv4
  * [STATS] Firefox telemetry (June 2020) shows only 5% of all connections are IPv6
  * [NOTE] This is just an application level fallback. Disabling IPv6 is best done at an
  * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
@@ -726,7 +725,7 @@ user_pref("security.family_safety.mode", 0);
 user_pref("security.cert_pinning.enforcement_level", 2);
 
 /** MIXED CONTENT ***/
-/* 1240: disable insecure active content on https pages
+/* 1240: enforce no insecure active content on https pages
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21323 ***/
 user_pref("security.mixed_content.block_active_content", true); // [DEFAULT: true]
 /* 1241: disable insecure passive content (such as images) on https pages [SETUP-WEB] ***/
@@ -785,7 +784,7 @@ user_pref("browser.ssl_override_behavior", 1);
  * [TEST] https://expired.badssl.com/ ***/
 user_pref("browser.xul.error_pages.expert_bad_cert", true);
 /* 1273: display "insecure" icon and "Not Secure" text on HTTP sites ***/
-user_pref("security.insecure_connection_icon.enabled", true); // [FF59+] [DEFAULT: true FF70+]
+   // user_pref("security.insecure_connection_icon.enabled", true); // [FF59+] [DEFAULT: true FF70+]
 user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 
 /*** [SECTION 1400]: FONTS ***/
@@ -1141,7 +1140,7 @@ user_pref("browser.uitour.url", "");
  * [SETTING] Devtools>Advanced Settings>Enable browser chrome and add-on debugging toolboxes
  * [1] https://github.com/pyllyukko/user.js/issues/179#issuecomment-246468676 ***/
 user_pref("devtools.chrome.enabled", false);
-/* 2608: disable remote debugging
+/* 2608: reset remote debugging to disabled
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16222 ***/
 user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
 /* 2609: disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
@@ -1690,7 +1689,6 @@ user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
 // 0212: enforce fallback text encoding to match en-US
    // When the content or server doesn't declare a charset the browser will
    // fallback to the "Current locale" based on your application language
-   // [SETTING] General>Language and Appearance>Fonts and Colors>Advanced>Text Encoding for Legacy Content (FF72-)
    // [TEST] https://hsivonen.com/test/moz/check-charset.htm
    // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/20025
    // [-] https://bugzilla.mozilla.org/1603712

From 9c98972d14cefa6b09fd14d74dfed1332fba2027 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 5 Sep 2020 15:42:34 +0000
Subject: [PATCH 0630/1147] misc2 (#1010)

* forceMediaMemoryCache breakage

* add back ESR68-EOL for prefsCleaner users
---
 user.js | 101 ++++++++++++++++++++++++++++++++++++++++++++++++++++++--
 1 file changed, 99 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 85b59f4..603d0ef 100644
--- a/user.js
+++ b/user.js
@@ -586,7 +586,8 @@ user_pref("browser.cache.disk.enable", false);
  * [1] https://bugzilla.mozilla.org/967812 ***/
    // user_pref("permissions.memory_only", true); // [HIDDEN PREF]
 /* 1007: disable media cache from writing to disk in Private Browsing
- * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB ***/
+ * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB
+ * [SETUP-WEB] ESR78: playback might break on subsequent loading (1650281) ***/
 user_pref("browser.privatebrowsing.forceMediaMemoryCache", true); // [FF75+]
 user_pref("media.memory_cache_max_size", 65536);
 
@@ -735,9 +736,11 @@ user_pref("security.mixed_content.block_display_content", true);
 user_pref("security.mixed_content.block_object_subrequest", true);
 /* 1244: enable HTTPS-Only mode [FF76+]
  * When "https_only_mode" (all windows) is true, "https_only_mode_pbm" (private windows only) is ignored
+ * [WARNING] This is experimental, see [1] and you can't set exceptions if FPI is enabled, see [2]
  * [SETTING] to add site exceptions: Page Info>Permissions>Use insecure HTTP (FF80+)
  * [SETTING] Privacy & Security>HTTPS-Only Mode (FF80+ with browser.preferences.exposeHTTPSOnly = true)
- * [1] https://bugzilla.mozilla.org/1613063 ***/
+ * [1] https://bugzilla.mozilla.org/1613063 [META]
+ * [2] https://bugzilla.mozilla.org/1647829 ***/
    // user_pref("dom.security.https_only_mode", true); // [FF76+]
    // user_pref("dom.security.https_only_mode_pbm", true); // [FF80+]
    // user_pref("dom.security.https_only_mode.upgrade_local", true); // [FF77+]
@@ -1696,5 +1699,99 @@ user_pref("intl.charset.fallback.override", "windows-1252");
 // * * * /
 // ***/
 
+/* ESR68.x still uses all the following prefs
+// [NOTE] replace the * with a slash in the line above to re-enable them
+// FF69
+// 1405: disable WOFF2 (Web Open Font Format) [FF35+]
+   // [-] https://bugzilla.mozilla.org/1556991
+   // user_pref("gfx.downloadable_fonts.woff2.enabled", false);
+// 1802: enforce click-to-play for plugins
+   // [-] https://bugzilla.mozilla.org/1519434
+user_pref("plugins.click_to_play", true); // [DEFAULT: true FF25+]
+// 2033: disable autoplay for muted videos [FF63+] - replaced by 'media.autoplay.default' options (2030)
+   // [-] https://bugzilla.mozilla.org/1562331
+   // user_pref("media.autoplay.allow-muted", false);
+// * * * /
+// FF71
+// 2608: disable WebIDE and ADB extension download
+   // [1] https://trac.torproject.org/projects/tor/ticket/16222
+   // [-] https://bugzilla.mozilla.org/1539462
+user_pref("devtools.webide.enabled", false); // [DEFAULT: false FF70+]
+user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
+// 2731: enforce websites to ask to store data for offline use
+   // [1] https://support.mozilla.org/questions/1098540
+   // [2] https://bugzilla.mozilla.org/959985
+   // [-] https://bugzilla.mozilla.org/1574480
+user_pref("offline-apps.allow_by_default", false);
+// * * * /
+// FF72
+// 0105a: disable Activity Stream telemetry
+   // [-] https://bugzilla.mozilla.org/1597697
+user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
+// 0330: disable Hybdrid Content telemetry
+   // [-] https://bugzilla.mozilla.org/1520491
+user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+]
+// 2720: enforce IndexedDB (IDB) as enabled
+   // IDB is required for extensions and Firefox internals (even before FF63 in [1])
+   // To control *website* IDB data, control allowing cookies and service workers, or use
+   // Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize
+   // on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically
+   // via an extension. Note that IDB currently cannot be sanitized by host.
+   // [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/
+   // [-] https://bugzilla.mozilla.org/1488583
+user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
+// * * * /
+// FF74
+// 0203: use Mozilla geolocation service instead of Google when geolocation is enabled
+   // Optionally enable logging to the console (defaults to false)
+   // [-] https://bugzilla.mozilla.org/1613627
+user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
+   // user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
+// 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
+   // 0=no menu (default), 1=show when clicked, 2=show on long press
+   // [1] https://bugzilla.mozilla.org/1328756
+   // [-] https://bugzilla.mozilla.org/1606265
+user_pref("privacy.userContext.longPressBehavior", 2);
+// 2012: limit WebGL
+   // [-] https://bugzilla.mozilla.org/1477756
+user_pref("webgl.disable-extensions", true);
+// * * * /
+// FF76
+// 0401: sanitize blocklist url
+   // [2] https://trac.torproject.org/projects/tor/ticket/16931
+   // [-] https://bugzilla.mozilla.org/1618188
+user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
+// 2201: prevent websites from disabling new window features
+   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507375,1660524
+user_pref("dom.disable_window_open_feature.close", true);
+user_pref("dom.disable_window_open_feature.location", true); // [DEFAULT: true]
+user_pref("dom.disable_window_open_feature.menubar", true);
+user_pref("dom.disable_window_open_feature.minimizable", true);
+user_pref("dom.disable_window_open_feature.personalbar", true); // bookmarks toolbar
+user_pref("dom.disable_window_open_feature.resizable", true); // [DEFAULT: true]
+user_pref("dom.disable_window_open_feature.status", true); // [DEFAULT: true]
+user_pref("dom.disable_window_open_feature.titlebar", true);
+user_pref("dom.disable_window_open_feature.toolbar", true);
+// * * * /
+// FF77
+// 0850e: disable location bar one-off searches [FF51+]
+   // [-] https://bugzilla.mozilla.org/1628926
+   // user_pref("browser.urlbar.oneOffSearches", false);
+// 2605: block web content in file processes [FF55+]
+   // [SETUP-WEB] You may want to disable this for corporate or developer environments
+   // [1] https://bugzilla.mozilla.org/1343184
+   // [-] https://bugzilla.mozilla.org/1603007
+user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false);
+// * * * /
+// FF78
+// 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] - replaced by 'media.autoplay.blocking_policy'
+   // [-] https://bugzilla.mozilla.org/1509933
+user_pref("media.autoplay.enabled.user-gestures-needed", false);
+// 5000's: disable chrome animations - replaced FF77+ by 'ui.prefersReducedMotion' (4520)
+   // [-] https://bugzilla.mozilla.org/1640501
+   // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
+// * * * /
+// ***/
+
 /* END: internal custom pref to test for syntax errors ***/
 user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");

From f606c8b8666cf14fb8104acdc30e7629f89bb3b5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 8 Sep 2020 23:49:22 +0000
Subject: [PATCH 0631/1147] 2203 values

see https://bugzilla.mozilla.org/show_bug.cgi?id=1663500 where they reverted https://bugzilla.mozilla.org/show_bug.cgi?id=1661643 where they said value 1 didn't do anything - all changes in FF82, so nothing to see here folks ... move along
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 603d0ef..5cfbe9f 100644
--- a/user.js
+++ b/user.js
@@ -966,7 +966,7 @@ user_pref("dom.disable_window_move_resize", true);
  * You can still right-click a link and open in a new window.
  * [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#screen
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
-user_pref("browser.link.open_newwindow", 3); // 2=new window, 3=new tab
+user_pref("browser.link.open_newwindow", 3); // 1=most recent window or tab 2=new window, 3=new tab
 user_pref("browser.link.open_newwindow.restriction", 0);
 /* 2204: disable Fullscreen API (requires user interaction) to prevent screen-resolution leaks
  * [NOTE] You can still manually toggle the browser's fullscreen state (F11),

From 78a7c194ebe728215f00c81edf71c6e632eb6037 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 10 Sep 2020 07:33:50 +0000
Subject: [PATCH 0632/1147] update ref links

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 5cfbe9f..2e7da6d 100644
--- a/user.js
+++ b/user.js
@@ -964,14 +964,14 @@ user_pref("dom.disable_window_move_resize", true);
 /* 2203: open links targeting new windows in a new tab instead
  * This stops malicious window sizes and some screen resolution leaks.
  * You can still right-click a link and open in a new window.
- * [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#screen
+ * [TEST] https://torzillafox.github.io/tzp/tzp.html#screen
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
 user_pref("browser.link.open_newwindow", 3); // 1=most recent window or tab 2=new window, 3=new tab
 user_pref("browser.link.open_newwindow.restriction", 0);
 /* 2204: disable Fullscreen API (requires user interaction) to prevent screen-resolution leaks
  * [NOTE] You can still manually toggle the browser's fullscreen state (F11),
  * but this pref will disable embedded video/game fullscreen controls, e.g. youtube
- * [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#screen ***/
+ * [TEST] https://torzillafox.github.io/tzp/tzp.html#screen ***/
    // user_pref("full-screen-api.enabled", false);
 /* 2210: block popup windows
  * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
@@ -1147,7 +1147,7 @@ user_pref("devtools.chrome.enabled", false);
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16222 ***/
 user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
 /* 2609: disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
- * [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#misc
+ * [TEST] https://torzillafox.github.io/tzp/tzp.html#misc
  * [1] https://bugzilla.mozilla.org/1173199 ***/
    // user_pref("mathml.disabled", true);
 /* 2610: disable in-content SVG (Scalable Vector Graphics) [FF53+]
@@ -1408,7 +1408,7 @@ user_pref("privacy.partition.network_state", true);
       [NOTE] Info only: To set a size, open a XUL (chrome) page (such as about:config) which is at
       100% zoom, hit Shift+F4 to open the scratchpad, type window.resizeTo(1366,768), hit Ctrl+R to run.
       Test your window size, do some math, resize to allow for all the non inner window elements
-      [TEST] https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html#screen
+      [TEST] https://torzillafox.github.io/tzp/tzp.html#screen
  ** 1281949 - spoof screen orientation (FF50+)
  ** 1281963 - hide the contents of navigator.plugins and navigator.mimeTypes (FF50+)
       FF53: Fixes GetSupportedNames in nsMimeTypeArray and nsPluginArray (1324044)

From c8eee094e0f10b2c15644327c6fa31fb72a24730 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 11 Sep 2020 03:23:55 +0000
Subject: [PATCH 0633/1147] update links

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 2e7da6d..77f0b41 100644
--- a/user.js
+++ b/user.js
@@ -964,14 +964,14 @@ user_pref("dom.disable_window_move_resize", true);
 /* 2203: open links targeting new windows in a new tab instead
  * This stops malicious window sizes and some screen resolution leaks.
  * You can still right-click a link and open in a new window.
- * [TEST] https://torzillafox.github.io/tzp/tzp.html#screen
+ * [TEST] https://hardenff.github.io/tzp/tzp.html#screen
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
 user_pref("browser.link.open_newwindow", 3); // 1=most recent window or tab 2=new window, 3=new tab
 user_pref("browser.link.open_newwindow.restriction", 0);
 /* 2204: disable Fullscreen API (requires user interaction) to prevent screen-resolution leaks
  * [NOTE] You can still manually toggle the browser's fullscreen state (F11),
  * but this pref will disable embedded video/game fullscreen controls, e.g. youtube
- * [TEST] https://torzillafox.github.io/tzp/tzp.html#screen ***/
+ * [TEST] https://hardenff.github.io/tzp/tzp.html#screen ***/
    // user_pref("full-screen-api.enabled", false);
 /* 2210: block popup windows
  * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
@@ -1147,7 +1147,7 @@ user_pref("devtools.chrome.enabled", false);
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16222 ***/
 user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
 /* 2609: disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
- * [TEST] https://torzillafox.github.io/tzp/tzp.html#misc
+ * [TEST] https://hardenff.github.io/tzp/tzp.html#misc
  * [1] https://bugzilla.mozilla.org/1173199 ***/
    // user_pref("mathml.disabled", true);
 /* 2610: disable in-content SVG (Scalable Vector Graphics) [FF53+]
@@ -1408,7 +1408,7 @@ user_pref("privacy.partition.network_state", true);
       [NOTE] Info only: To set a size, open a XUL (chrome) page (such as about:config) which is at
       100% zoom, hit Shift+F4 to open the scratchpad, type window.resizeTo(1366,768), hit Ctrl+R to run.
       Test your window size, do some math, resize to allow for all the non inner window elements
-      [TEST] https://torzillafox.github.io/tzp/tzp.html#screen
+      [TEST] https://hardenff.github.io/tzp/tzp.html#screen
  ** 1281949 - spoof screen orientation (FF50+)
  ** 1281963 - hide the contents of navigator.plugins and navigator.mimeTypes (FF50+)
       FF53: Fixes GetSupportedNames in nsMimeTypeArray and nsPluginArray (1324044)

From 18112f9ae86ac2b27ff93955a3d1d4aeb09e5d67 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 11 Sep 2020 21:55:12 +0000
Subject: [PATCH 0634/1147] last F time :) update TZP links

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 77f0b41..08962f3 100644
--- a/user.js
+++ b/user.js
@@ -964,14 +964,14 @@ user_pref("dom.disable_window_move_resize", true);
 /* 2203: open links targeting new windows in a new tab instead
  * This stops malicious window sizes and some screen resolution leaks.
  * You can still right-click a link and open in a new window.
- * [TEST] https://hardenff.github.io/tzp/tzp.html#screen
+ * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
 user_pref("browser.link.open_newwindow", 3); // 1=most recent window or tab 2=new window, 3=new tab
 user_pref("browser.link.open_newwindow.restriction", 0);
 /* 2204: disable Fullscreen API (requires user interaction) to prevent screen-resolution leaks
  * [NOTE] You can still manually toggle the browser's fullscreen state (F11),
  * but this pref will disable embedded video/game fullscreen controls, e.g. youtube
- * [TEST] https://hardenff.github.io/tzp/tzp.html#screen ***/
+ * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen ***/
    // user_pref("full-screen-api.enabled", false);
 /* 2210: block popup windows
  * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
@@ -1147,7 +1147,7 @@ user_pref("devtools.chrome.enabled", false);
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16222 ***/
 user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
 /* 2609: disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
- * [TEST] https://hardenff.github.io/tzp/tzp.html#misc
+ * [TEST] https://arkenfox.github.io/TZP/tzp.html#misc
  * [1] https://bugzilla.mozilla.org/1173199 ***/
    // user_pref("mathml.disabled", true);
 /* 2610: disable in-content SVG (Scalable Vector Graphics) [FF53+]
@@ -1408,7 +1408,7 @@ user_pref("privacy.partition.network_state", true);
       [NOTE] Info only: To set a size, open a XUL (chrome) page (such as about:config) which is at
       100% zoom, hit Shift+F4 to open the scratchpad, type window.resizeTo(1366,768), hit Ctrl+R to run.
       Test your window size, do some math, resize to allow for all the non inner window elements
-      [TEST] https://hardenff.github.io/tzp/tzp.html#screen
+      [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
  ** 1281949 - spoof screen orientation (FF50+)
  ** 1281963 - hide the contents of navigator.plugins and navigator.mimeTypes (FF50+)
       FF53: Fixes GetSupportedNames in nsMimeTypeArray and nsPluginArray (1324044)

From 3e4c56cf27d0b67457fa2a11e4fd26da0737833c Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 13 Sep 2020 12:16:21 +0000
Subject: [PATCH 0635/1147] arkenfox support

also fixes mixed line endings
---
 updater.bat | 21 ++++++++++++---------
 1 file changed, 12 insertions(+), 9 deletions(-)

diff --git a/updater.bat b/updater.bat
index b433678..0e883be 100644
--- a/updater.bat
+++ b/updater.bat
@@ -3,10 +3,10 @@ TITLE ghacks user.js updater
 
 REM ## ghacks-user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.10
+REM ## version: 4.11
 REM ## instructions: https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts
 
-SET v=4.10
+SET v=4.11
 
 VERIFY ON
 CD /D "%~dp0"
@@ -100,7 +100,10 @@ IF NOT EXIST user.js (
 	)
 	:exitloop
 	IF NOT "!_name!"=="" (
-		IF /I NOT "!_name!"=="!_name:ghacks=!" (
+		SET "_tempvar="
+		IF /I NOT "!_name!"=="!_name:ghacks=!" SET _tempvar=1
+		IF /I NOT "!_name!"=="!_name:arkenfox=!" SET _tempvar=1
+		IF !_tempvar! EQU 1 (
 			CALL :message "!_name! !_version:~2!,!_date!"
 		) ELSE (CALL :message "Current user.js version not recognised.")
 	) ELSE (CALL :message "Current user.js version not recognised.")
@@ -136,10 +139,10 @@ IF EXIST user.js.new (
 	IF DEFINED _rfpalts (
 		CALL :message "Activating RFP Alternatives section..."
 		CALL :activate user.js.new "[SETUP-non-RFP]"
-	)
-	IF DEFINED _esr (
-		CALL :message "Activating ESR section..."
-		CALL :activate user.js.new ".x still uses all the following prefs"
+	)
+	IF DEFINED _esr (
+		CALL :message "Activating ESR section..."
+		CALL :activate user.js.new ".x still uses all the following prefs"
 	)
 	IF DEFINED _multi (
 		FORFILES /P user.js-overrides /M *.js >nul 2>&1
@@ -216,8 +219,8 @@ ENDLOCAL
 GOTO :EOF
 
 ::::::::::::::: Activate Section :::::::::::::::
-:activate
-:: arg1 = file
+:activate
+:: arg1 = file
 :: arg2 = line substring
 SETLOCAL DisableDelayedExpansion
 (

From ae0c980d25721b3ce32a56fb37a3e07a9282be98 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 04:15:03 +0000
Subject: [PATCH 0636/1147] migration

---
 user.js | 20 ++++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)

diff --git a/user.js b/user.js
index 08962f3..05dc94d 100644
--- a/user.js
+++ b/user.js
@@ -1,22 +1,22 @@
 /******
-* name: ghacks user.js
+* name: arkenfox user.js
 * date: 03 Sep 2020
 * version 81-alpha
-* url: https://github.com/ghacksuserjs/ghacks-user.js
-* license: MIT: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/LICENSE.txt
+* url: https://github.com/arkenfox/user.js
+* license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
 * releases: These are end-of-stable-life-cycle legacy archives.
             *Always* use the master branch user.js for a current up-to-date version
-       url: https://github.com/ghacksuserjs/ghacks-user.js/releases
+       url: https://github.com/arkenfox/user.js/releases
 
 * README:
 
   0. Consider using Tor Browser if it meets your needs or fits your threat model better
      * https://www.torproject.org/about/torusers.html.en
   1. READ the full README
-     * https://github.com/ghacksuserjs/ghacks-user.js/blob/master/README.md
+     * https://github.com/arkenfox/user.js/blob/master/README.md
   2. READ this
-     * https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.3-Implementation
+     * https://github.com/arkenfox/user.js/wiki/1.3-Implementation
   3. If you skipped steps 1 and 2 above (shame on you), then here is the absolute minimum
      * Real time binary checks with Google services are disabled (0412)
      * You will still get prompts to update Firefox, but auto-installing them is disabled (0302a)
@@ -38,7 +38,7 @@
          [SETUP-HARDEN] maybe you should consider using the Tor Browser
      * [WARNING] tags are extra special and used sparingly, so heed them
   4. BACKUP your profile folder before implementing (and/or test in a new/cloned profile)
-  5. KEEP UP TO DATE: https://github.com/ghacksuserjs/ghacks-user.js/wiki#small_orange_diamond-maintenance
+  5. KEEP UP TO DATE: https://github.com/arkenfox/user.js/wiki#small_orange_diamond-maintenance
 
 * INDEX:
 
@@ -391,7 +391,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
  * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
  * then this won't make much difference. If you are masking your IP, then it can only help.
  * [TEST] https://ipleak.org/
- * [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/437#issuecomment-403740626
+ * [1] https://github.com/arkenfox/user.js/issues/437#issuecomment-403740626
  * [2] https://www.internetsociety.org/tag/ipv6-security/ (see Myths 2,4,5,6) ***/
 user_pref("network.dns.disableIPv6", true);
 /* 0702: disable HTTP2
@@ -568,7 +568,7 @@ user_pref("network.auth.subresource-http-auth-allow", 1);
      [2] https://robertheaton.com/2014/01/20/cookieless-user-tracking-for-douchebags/
      [3] https://www.grepular.com/Preventing_Web_Tracking_via_the_Browser_Cache
      [4] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
-     [5] https://github.com/ghacksuserjs/ghacks-user.js/wiki/4.2.4-Header-Editor
+     [5] https://github.com/arkenfox/user.js/wiki/4.2.4-Header-Editor
 ***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
 /** CACHE ***/
@@ -1683,7 +1683,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
      Documentation denoted as [-]. Items deprecated in FF78 or earlier have been archived at [1],
      which also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
-     [1] https://github.com/ghacksuserjs/ghacks-user.js/issues/123
+     [1] https://github.com/arkenfox/user.js/issues/123
 ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
 /* ESR78.x still uses all the following prefs

From af516315971b7c94075db1e317bee5b12dc3b781 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 04:19:03 +0000
Subject: [PATCH 0637/1147] Update LICENSE.txt

---
 LICENSE.txt | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/LICENSE.txt b/LICENSE.txt
index a18c4e2..0eed2c7 100644
--- a/LICENSE.txt
+++ b/LICENSE.txt
@@ -1,6 +1,6 @@
 MIT License
 
-Copyright (c) 2017 ghacksuserjs
+Copyright (c) 2020 arkenfox
 
 Permission is hereby granted, free of charge, to any person obtaining a copy
 of this software and associated documentation files (the "Software"), to deal

From 4c4270f1d7972c0f274dc65dc7ae83913194545d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 04:33:50 +0000
Subject: [PATCH 0638/1147] migration changes

---
 README.md | 20 ++++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)

diff --git a/README.md b/README.md
index e13832d..2c3a00c 100644
--- a/README.md
+++ b/README.md
@@ -1,23 +1,23 @@
 ### ![][b] user.js
-A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.1-Overview) wiki page.
+A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/arkenfox/user.js/wiki/1.1-Overview) wiki page.
 
-### ![][b] This user.js
-This `user.js` is a **template** which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).
+### ![][b] the arkenfox user.js
 
-Everyone, experts included, should at least read the [implementation](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.3-Implementation) wiki page, as it contains important information regarding a few `user.js` settings.
+[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
+
+The `arkenfox user.js` is a **template** which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).
+
+Everyone, experts included, should at least read the [implementation](https://github.com/arkenfox/user.js/wiki/1.3-Implementation) wiki page, as it contains important information regarding a few `user.js` settings.
 
 Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) if your [threat model](https://www.torproject.org/about/torusers.html.en) calls for it, or for accessing hidden services. 
 
-Also be aware that this `user.js` is made specifically for desktop Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.
+Also be aware that the `arkenfox user.js` is made specifically for desktop Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.
 
-Sitemap: [Releases](https://github.com/ghacksuserjs/ghacks-user.js/releases), [changelogs](https://github.com/ghacksuserjs/ghacks-user.js/issues?utf8=%E2%9C%93&q=is%3Aissue+label%3Achangelog), [Wiki](https://github.com/ghacksuserjs/ghacks-user.js/wiki), [stickies](https://github.com/ghacksuserjs/ghacks-user.js/issues?q=is%3Aissue+is%3Aopen+label%3A%22sticky+topic%22). [diffs](https://github.com/ghacksuserjs/ghacks-user.js/issues?q=is%3Aissue+label%3Adiffs)
+Sitemap: [Releases](https://github.com/arkenfox/user.js/releases), [changelogs](https://github.com/arkenfox/user.js/issues?utf8=%E2%9C%93&q=is%3Aissue+label%3Achangelog), [Wiki](https://github.com/arkenfox/user.js/wiki), [stickies](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+is%3Aopen+label%3A%22sticky+topic%22). [diffs](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+label%3Adiffs)
 
 ### ![][b] acknowledgments
 Literally thousands of sources, references and suggestions. Special mention to:
 
-* [12bytes](https://12bytes.org/articles/tech/firefox/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs)
-   * The 12bytes article now uses this user.js and supplements it with an additional JS hosted at [Codeberg](https://codeberg.org/12bytes.org/Firefox-user.js-supplement)
-
-### ![][b] [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
+ * This [12bytes article](https://12bytes.org/articles/tech/firefox/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs) which uses the `arkenfox user.js` and supplements it with an additional JS hosted at [Codeberg](https://codeberg.org/12bytes.org/Firefox-user.js-supplement)
 
 [b]: /wikipiki/bullet01.png

From ed5b15877709f7c6690f88e769bd1db1e817752f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 05:52:28 +0000
Subject: [PATCH 0639/1147] Rename ghacks-clear-RFP-alternatives.js to
 arkenfox-clear-RFP-alternatives.js

---
 ...ear-RFP-alternatives.js => arkenfox-clear-RFP-alternatives.js} | 0
 1 file changed, 0 insertions(+), 0 deletions(-)
 rename scratchpad-scripts/{ghacks-clear-RFP-alternatives.js => arkenfox-clear-RFP-alternatives.js} (100%)

diff --git a/scratchpad-scripts/ghacks-clear-RFP-alternatives.js b/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
similarity index 100%
rename from scratchpad-scripts/ghacks-clear-RFP-alternatives.js
rename to scratchpad-scripts/arkenfox-clear-RFP-alternatives.js

From 6fdda5fb627ef9758ccefe243f2a7bf059c3b398 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 05:53:09 +0000
Subject: [PATCH 0640/1147] rename as arkenfox

---
 .../{ghacks-clear-deprecated.js => arkenfox-clear-deprecated.js}  | 0
 1 file changed, 0 insertions(+), 0 deletions(-)
 rename scratchpad-scripts/{ghacks-clear-deprecated.js => arkenfox-clear-deprecated.js} (100%)

diff --git a/scratchpad-scripts/ghacks-clear-deprecated.js b/scratchpad-scripts/arkenfox-clear-deprecated.js
similarity index 100%
rename from scratchpad-scripts/ghacks-clear-deprecated.js
rename to scratchpad-scripts/arkenfox-clear-deprecated.js

From 26bca612d7ea9d86ac6e2aa4b54288e92024ee92 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 05:54:22 +0000
Subject: [PATCH 0641/1147] rename as arkenfox

---
 .../{ghacks-clear-removed.js => arkenfox-clear-removed.js}  | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)
 rename scratchpad-scripts/{ghacks-clear-removed.js => arkenfox-clear-removed.js} (98%)

diff --git a/scratchpad-scripts/ghacks-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
similarity index 98%
rename from scratchpad-scripts/ghacks-clear-removed.js
rename to scratchpad-scripts/arkenfox-clear-removed.js
index dfb63c4..8032bcc 100644
--- a/scratchpad-scripts/ghacks-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,10 +1,10 @@
 /***
- This will reset the preferences that have been removed completely from the ghacks user.js.
+ This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 28-July-2020
+ Last updated: 14-Sept-2020
 
  For instructions see:
- https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
+ https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
 ***/
  
 (function() {

From 637e5964dbadf6783ae1f1833ad5c190b315a238 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 05:56:00 +0000
Subject: [PATCH 0642/1147] update links

---
 scratchpad-scripts/arkenfox-clear-RFP-alternatives.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js b/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
index 1dfc5f7..4be4b81 100644
--- a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
+++ b/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
@@ -2,11 +2,11 @@
  Version: up to and including FF/ESR78
 
  This will reset the preferences that are under sections 4600 & 4700 in the
- ghacks user.js. These are the prefs that are no longer necessary, or they
+ arkenfox user.js. These are the prefs that are no longer necessary, or they
  conflict with, privacy.resistFingerprinting if you have that enabled.
 
  For instructions see:
- https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
+ https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
 ***/
  
 (function() {

From 1f545312fd6d11060df67d7157186e66a81c5398 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 05:57:30 +0000
Subject: [PATCH 0643/1147] update names + links

---
 scratchpad-scripts/arkenfox-clear-deprecated.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-deprecated.js b/scratchpad-scripts/arkenfox-clear-deprecated.js
index e3ab4e1..766dd33 100644
--- a/scratchpad-scripts/arkenfox-clear-deprecated.js
+++ b/scratchpad-scripts/arkenfox-clear-deprecated.js
@@ -2,12 +2,12 @@
  Version: up to and including FF/ESR78
 
  This will reset the preferences that have been deprecated by Mozilla
- and used in the ghacks user.js
+ and used in the arkenfox user.js
 
  It is in reverse order, so feel free to remove sections that do not apply
 
  For instructions see:
- https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
+ https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
 ***/
 
 (function() {

From 44e22835c128621cc13f864fcf7cf2dc1d07af13 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 05:58:39 +0000
Subject: [PATCH 0644/1147] update name

---
 scratchpad-scripts/arkenfox-clear-removed.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 8032bcc..25da048 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -9,7 +9,7 @@
  
 (function() {
   let ops = [
-    /* removed in ghacks user.js v52-57 */
+    /* removed in arkenfox user.js v52-57 */
     /* 52-alpha */
     'browser.search.reset.enabled',
     'browser.search.reset.whitelist',

From 2532ddcc18b6323459797be0697ab6a54e6f1a4b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 05:59:51 +0000
Subject: [PATCH 0645/1147] update name

---
 scratchpad-scripts/troubleshooter.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/scratchpad-scripts/troubleshooter.js b/scratchpad-scripts/troubleshooter.js
index 61488f0..a33d803 100644
--- a/scratchpad-scripts/troubleshooter.js
+++ b/scratchpad-scripts/troubleshooter.js
@@ -1,5 +1,5 @@
 
-/*** ghacks-user.js troubleshooter.js v1.6.1 ***/
+/*** arkenfox user.js troubleshooter.js v1.6.1 ***/
 
 (function() {
 

From eff4b74130272ed4dfe815c0f411512df9f51c3c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 06:05:33 +0000
Subject: [PATCH 0646/1147] migration: cleanup code references

---
 .github/ISSUE_TEMPLATE/troubleshooting-help.md | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
index 4cf0a19..9585395 100644
--- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -8,16 +8,16 @@ assignees: ''
 ---
 
 Before you proceed...
-  - Issues will be closed as invalid if you do not [troubleshoot](https://github.com/ghacksuserjs/ghacks-user.js/wiki/1.4-Troubleshooting), including
+  - Issues will be closed as invalid if you do not [troubleshoot](https://github.com/arkenfox/user.js/wiki/1.4-Troubleshooting), including
      - confirming the problem is caused by the `user.js`
      - searching the `[Setup` tags in the `user.js`
   - Search the GitHub repository. The information you need is most likely here already.
   - Note: We do not support forks
 
 See also:
-  - Extension breakage due to prefs [issue 391](https://github.com/ghacksuserjs/ghacks-user.js/issues/391)
-  - Prefs vs Recommended Extensions: Co-Existance+Enhancement | Conflicts [issue 350](https://github.com/ghacksuserjs/ghacks-user.js/issues/350)
-  - The extension CSP header modification game [issue 664](https://github.com/ghacksuserjs/ghacks-user.js/issues/664)
+  - Extension breakage due to prefs [issue 391](https://github.com/arkenfox/user.js/issues/391)
+  - Prefs vs Recommended Extensions: Co-Existance+Enhancement | Conflicts [issue 350](https://github.com/arkenfox/user.js/issues/350)
+  - The extension CSP header modification game [issue 664](https://github.com/arkenfox/user.js/issues/664)
 
 If you still need help, help us help you by providing relevant information:
   - browser version

From 6a107d4d2fbe885b2c8ee2254d7a024d56188540 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 06:06:32 +0000
Subject: [PATCH 0647/1147] migration: cleanup code references

---
 .github/ISSUE_TEMPLATE/user-js.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/.github/ISSUE_TEMPLATE/user-js.md b/.github/ISSUE_TEMPLATE/user-js.md
index 1357819..7955d27 100644
--- a/.github/ISSUE_TEMPLATE/user-js.md
+++ b/.github/ISSUE_TEMPLATE/user-js.md
@@ -9,7 +9,7 @@ assignees: ''
 
 We value feedback in general, but we value feedback from informed users more. There is no need for you to be an expert to participate (most of us aren't), but we hope that you at least understand our decisions before questioning them. We discuss all changes openly, and we do not make changes lightly. So, if you don't understand why we decided to add/remove/change a certain pref, search the repo. The answer is most certainly here.
 
-If some change we made took you by surprise (in the wrong way), remember that keeping track of changes is your responsibility. Watch the repo, read the [changelogs](https://github.com/ghacksuserjs/ghacks-user.js/issues?utf8=✓&q=is%3Aissue+label%3Achangelog), compare [releases](https://github.com/ghacksuserjs/ghacks-user.js/releases) as you update your copy of user.js, or use any other method you prefer.
+If some change we made took you by surprise (in the wrong way), remember that keeping track of changes is your responsibility. Watch the repo, read the [changelogs](https://github.com/arkenfox/user.js/issues?utf8=✓&q=is%3Aissue+label%3Achangelog), compare [releases](https://github.com/arkenfox/user.js/releases) as you update your copy of user.js, or use any other method you prefer.
 
 Clear all of this when you're ready to type.
 

From fc650522863ede373f458ac71552dc5e91a5afd8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 06:07:32 +0000
Subject: [PATCH 0648/1147] migration: cleanup code references

---
 _config.yml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/_config.yml b/_config.yml
index a8f761e..839cbe3 100644
--- a/_config.yml
+++ b/_config.yml
@@ -1,3 +1,3 @@
 theme: jekyll-theme-midnight
-title: ghacks-user.js
+title: user.js
 description: An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting

From 515d6ff8744a746021e0f9fe1091e1782d3391ba Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 06:11:35 +0000
Subject: [PATCH 0649/1147] v2.3: update repo name

---
 prefsCleaner.bat | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/prefsCleaner.bat b/prefsCleaner.bat
index 4c8f7a4..f82658a 100644
--- a/prefsCleaner.bat
+++ b/prefsCleaner.bat
@@ -3,7 +3,7 @@ TITLE prefs.js cleaner
 
 REM ### prefs.js cleaner for Windows
 REM ## author: @claustromaniac
-REM ## version: 2.2
+REM ## version: 2.3
 
 CD /D "%~dp0"
 
@@ -13,7 +13,7 @@ ECHO:
 ECHO                 ########################################
 ECHO                 ####  prefs.js cleaner for Windows  ####
 ECHO                 ####        by claustromaniac       ####
-ECHO                 ####              v2.2              ####
+ECHO                 ####              v2.3              ####
 ECHO                 ########################################
 ECHO:
 CALL :message "This script should be run from your Firefox profile directory."
@@ -101,7 +101,7 @@ ECHO        add-ons disabled. Then, restart it again normally, and see if the
 CALL :message "     problems were solved."
 ECHO:
 CALL :message "If you are able to identify the cause of your issues, please bring it up"
-ECHO   on ghacks-user.js GitHub repository.
+ECHO   on arkenfox user.js GitHub repository.
 ECHO:
 ECHO:
 PAUSE

From 16c36580406c16644aa59c84a74920adfad39b72 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 06:17:44 +0000
Subject: [PATCH 0650/1147] align look with TZP

---
 README.md | 15 ++++++++++-----
 1 file changed, 10 insertions(+), 5 deletions(-)

diff --git a/README.md b/README.md
index 2c3a00c..32849d5 100644
--- a/README.md
+++ b/README.md
@@ -1,7 +1,7 @@
-### ![][b] user.js
+### 🟪  user.js
 A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/arkenfox/user.js/wiki/1.1-Overview) wiki page.
 
-### ![][b] the arkenfox user.js
+### 🟩  the arkenfox user.js
 
 [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
 
@@ -13,11 +13,16 @@ Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Bro
 
 Also be aware that the `arkenfox user.js` is made specifically for desktop Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.
 
-Sitemap: [Releases](https://github.com/arkenfox/user.js/releases), [changelogs](https://github.com/arkenfox/user.js/issues?utf8=%E2%9C%93&q=is%3Aissue+label%3Achangelog), [Wiki](https://github.com/arkenfox/user.js/wiki), [stickies](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+is%3Aopen+label%3A%22sticky+topic%22). [diffs](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+label%3Adiffs)
+### 🟧  sitemap
 
-### ![][b] acknowledgments
+ - [Releases](https://github.com/arkenfox/user.js/releases)
+ - [changelogs](https://github.com/arkenfox/user.js/issues?utf8=%E2%9C%93&q=is%3Aissue+label%3Achangelog)
+ - [Wiki](https://github.com/arkenfox/user.js/wiki)
+ - [stickies](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+is%3Aopen+label%3A%22sticky+topic%22)
+ - [diffs](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+label%3Adiffs)
+
+### 🟥  acknowledgments
 Literally thousands of sources, references and suggestions. Special mention to:
 
  * This [12bytes article](https://12bytes.org/articles/tech/firefox/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs) which uses the `arkenfox user.js` and supplements it with an additional JS hosted at [Codeberg](https://codeberg.org/12bytes.org/Firefox-user.js-supplement)
 
-[b]: /wikipiki/bullet01.png

From ed05c644824c69d9d930bd3972959497aa50107a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 06:18:33 +0000
Subject: [PATCH 0651/1147] we no longer have github pages

---
 wikipiki/bullet01.png | Bin 3374 -> 0 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)
 delete mode 100644 wikipiki/bullet01.png

diff --git a/wikipiki/bullet01.png b/wikipiki/bullet01.png
deleted file mode 100644
index eaaacd52134f420398f84d34d82a9cf0b7101d16..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 3374
zcmV+}4bk$6P)<h;3K|Lk000e1NJLTq000yK000yS1^@s6jfou%00009a7bBm000XU
z000XU0RWnu7ytkYPiaF#P*7-ZbZ>KLZ*U+<Lqi~Na&Km7Y-Iodc-oy)XH-+^7Crag
z^g>IBfRsybQWXdwQbLP>6p<z>Aqfylh#{fb6;Z(vMMVS~$e@S=j*ftg6;Uh<iVD~V
z<RPMtgQJLw%KPDaqifc@_vX$1wbwr9tn;0-&j-K=43<bUQ8j=JsX`tR;Dg7+#^K~H
zK!FM*Z~zbpvt%K2{UZSY_<lS*D<Z%Lz5oGu(+dayz)hRLFdT>f59&ghTmgWD0l;*T
zI7<kC6aYYajzXpYKt=(8otP$50H6c_V9R4-;{Z@C0AMG7=F<Rxo%or10RUT+Ar%3j
zkpLhQWr#!oXgdI`&sK^>09Y^p6lP1rIRMx#05C~cW=H_Aw*bJ-5DT&Z2n+x)QHX^p
z00esgV8|mQcmRZ%02D^@S3L16t`O%c004NIvOKvYIYoh62rY33S640`D9%Y2D-<?i
z0%4j!F2Z@488U%158(66005wo6%pWr^Zj_v4zAA5HjcIqUoGmt2LB>rV&neh&#Q1i
z007~1e$oCcFS8neI|hJl{-P!B1ZZ9hpmq0)X0i`JwE&>$+E?>%_<lS*MWK+n+1cgf
z<k(8YLR(?VSAG6x!e78w{cQPuJpA|d;J)G{fihizM+Erb!p!tcr5w+a34~(Y=8s4G
zw+sLL9n&JjNn*KJDiq^U5^;`1nvC-@r6P$!k}1U{(*I=Q-z@tBKHoI}uxdU5dyy@u
zU1J0GOD7Ombim^G008p4Z^6_k2m^p<gW=D2|L;HjN1!DDfM!XOaR2~bL?kX$%CkSm
z2mk;?pn)o|K^yeJ7%adB9Ki+L!3+FgHiSYX#KJ-lLJDMn9CBbOtb#%)hRv`YDqt_v
zKpix|QD}yfa1JiQRk#j4a1Z)n2%f<xynzV>LC6RbVIkUx0b+_+BaR3cnT7Zv!AJxW
zizFb)h!jyGOOZ85F;a?DAXP{m@;!0_Ifq<Ex{*7`05XF7hP+2Hl!3BQJ=6@fL%FCo
z8iYoo3(#bAF`ADSpqtQgv>H8(HlgRxt7s3}k3K`kFu>>-2Q$QMFfPW!La{h336o>X
zu_CMttHv6zR;&ZNiS=X8v3CR#fknUxHUxJ<AYmRsNLWl*PS{AOARHt#5!wki2?K;t
z!Y3k=s7tgax)J%r7-BLphge7~Bi0g+6E6^Zh(p9TBoc{3GAFr^0!gu?RMHaCM$&Fl
zBk3%un>0uoBa_M6WNWeqIg~6QE69c9o#eyhGvpiOA@W-aonk<7r1(?fC{oI5N*U!4
z<uv66WtcKSRim0x-Ke2d5jBrmLam{;Qm;{ms1r1GnmNsb7D-E`t)i9F8fX`2_i3-_
zbh;7Ul^#x)&{xvS=|||7=mYe33=M`AgU5(xC>fg=2N-7=cNnjjOr{yriy6mMFgG#l
znCF=fnQv8CDz++o6_Lscl}eQ+l^ZHARH>?_s@|##Rr6KLRFA1%Q+=*RRWnoLsR`7U
zt5vF<Q0r40Q)j6=sE4X&sBct1q<&fbi3VB2Ov6t@q*0);U*o*SAPZv|vv@2aYYnT0
zb%8a+Cb7-ge0D0knEf5Qi#@8Tp*ce{N;6lpQuCB%KL_KOarm5cP6_8Ir<e17iry6O
zDdH&`rZh~sF=bq9s+O0QSgS~@QL9Jmy*94xr=6y~MY~!1fet~(N+(<=M`w@D1)b+p
z*;C!83a1uLJv#NSE~;y#8=<>IcfW3@?wFpwUVxrVZ>QdQz32KIeJ}k~{cZZE^+ya?
z2D1z#2HOnI7(B%_ac?{wFUQ;QQA1tBKtrWrm0_3Rgps+?Jfqb{jYbcQX~taRB;#$y
zZN{S}1|}gUOHJxc?wV3fxuz+mJ4`!F$IZ;mqRrNsHJd##*D~ju=bP7?-?v~|cv>vB
zsJ6IeNwVZxrdjT`yl#bBIa#GxRa#xMMy;K#CDyyGyQdMSxlWT#tDe?p!?5wT$+oGt
z8L;Kp2HUQ-ZMJ=3XJQv;x5ci*?vuTfeY$;({XGW_huIFR9a<fJbF^|4I#xQ~n$Dc=
zKYhjYmgz5NSkDm8*fZm{6U!;YX`NG>(?@3)XSs8O^N5RyOM=TTmp(3=8^+zpz2r)C
z^>JO{deZfso3oq3?Wo(Y?l$ge?uXo;%ru`Vo>?<<(8I_>;8Eq#KMS9gFl*neeosSB
zfoHYnBQIkwkyowPu(zdms`p{<7e4kra-ZWq<2*OsGTvEV%s0Td$hXT+!*8Bnh2KMe
zBmZRodjHV?r+_5^X9J0WL4jKW`}lf%A-|44I@@LTvf1rHjG(ze6+w@Jt%Bvjts!X0
z?2xS?_ve_-k<Mujg;0Lz*3buG=3$G&ehepthlN*$KaOySSQ^nWmo<0M+(UEUMEXRQ
zMBbZcF;6+KElM>iKB_KiJlZ$9G`c^=E@oNG)mWWaNo-3TIW8)$Hg0Ub-~8?KhvJ>$
z3*&nim@mj(aCxE5!t{lw7O5^0EIO7zOo&c6l<+|iDySBWCGrz@C5{St!X3hAA}`T4
z(TLbXTq+(;@<=L8dXnssyft|w#WSTW<++3>sgS%(4NTpeI-VAqb|7ssJvzNHgOZVu
zaYCvgO_R1~>SyL=cFU|~g|hy|Zi}}s9+d~lYqOB71z9Z$wnC=pR9Yz4DhIM>Wmjgu
z&56o6maCpC&F##y%G;1PobR9i?GnNg;gYtchD%p19a!eQtZF&3JaKv33gZ<8D~47E
ztUS1iwkmDaPpj=$m#%)jCVEY4fnLGNg2A-`YwHVD3gv};>)hAvT~AmqS>Lr``i7kw
zJ{5_It`yrBmlc25DBO7E8;5VoznR>Ww5hAaxn$2~(q`%A-YuS64wkBy=9dm`4cXeX
z4c}I@?e+FW+b@^RDBHV(wnMq2zdX3SWv9u`%{xC-q*U}&`cyXV(%rRT*Z6MH?i+i&
z_B8C(+grT%{XWUQ+f@NoP1R=AW&26{v-dx)iK^-Nmiuj8txj!m?Z*Ss1N{dh4z}01
z)YTo*JycSU)+_5r4#yw9{+;i4Ee$peRgIj+;v;ZGdF1K$3E%e~4LaI(jC-u%2h$&R
z9cLXcYC@Xwnns&bn)_Q~Te?roKGD|d-g^8;+aC{{G(1^(O7m37Y1-+6)01cN&y1aw
zoqc{T`P^XJqPBbIW6s}d4{z_f5Om?vMgNQEJG?v2T=KYd^0M3I6IZxbny)%vZR&LD
zJpPl@Psh8QyPB@KTx+@RdcC!KX7}kEo;S|j^u2lU7XQ}Oo;f|;z4Ll+_r>@1-xl3|
zawq-H%e&ckC+@AhPrP6BK<z=<L*0kfKU@CX*zeqbYQT4(^U>T#_XdT7&;F71j}Joy
zkC~6lh7E@6o;W@^IpRNZ{ptLtL(gQ-CY~4mqW;US7Zxvm_|@yz&e53Bp_lTPlfP|z
zrTyx_>lv@x#=^!PzR7qqF<$gm`|ZJZ+;<)Cqu&ot<a{81DF0~rvGr5Xr~8u`lav1h
z1DNytV>2z=0000WV@Og>004R=004l4008;_004mL004C`008P>0026e000+nl3&F}
z00076Nkl<Zc-qX=&r6d59LMqZo>@vnbTIPJVNwl}pr}KolPFXqsKEY%E*(M*+nk%*
z)a8$~{Ixn17}!Ox*|nr&;W3zpHuo%~eB7QrHj{ju!nebg6mGghL5KJ8`#OF2A|m|F
z_-Ejkn-KGY>iI3-e$+r25m)K)h_l2V4;&!wvl8!AQ2h#@+bkq%Aa#o3!I;NV`E|T9
zx)eIGsCpIqFEH*^h<h!>+Z43Rmg2xz2R3c|Xn5;mw`_&`CGq4~RPDgN4Z1C;9)(D2
z5n!wxn>KPdy!qj_NZ2V7cFNY=9a$bL&!Ran?pBDl>;cBwv1vmG=QrQhi_A5NyuY4p
zu1PlEHOlhvp@{0nz700-0><3fw1Lw3%uJQY?0JzlXZ~#VoMc{~7HzO>L3MFbEePI#
z1rL>4uXR2%RW349A@b@-{$?s9GhHrPpEatsEB0u!vJ+gqMb%O-pEf3}BGdasrmP}U
zB?YpIOqa;UgjKYlMUAvt&h7vcjZ}XNu_lv<yezUwBpt%kuW@w;xOxeagVdViq~rxs
zOlF95VvvTl3wef}u7N~9q`Ij!htcI3BF_tFj*wmnQlIFD@70CC0nh`G3g9q@(B&zT
zFLQ{r;it~%$=>7#t8-u%B)cHx!(sN4l2Js)a*ZNpAFGCkI>QG>a2IgZ0f~oMQ16Ch
zC+IF5W)CTOjL0Lz>>+J9sW;qU`1b(yi=cZ!4`xBV6Ot}S-J^EhPkP<Yj}<2k#(gk4
ziUF%YcjV9qSx|R@-U7+HTv=|R!El1%EE4>0KlaZ70KgcXqaelzmH+?%07*qoM6N<$
Ef@qmi<^TWy


From 7fe9784bf87d0baf1ef6053aaa7542ae5837da53 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Sep 2020 06:18:54 +0000
Subject: [PATCH 0652/1147] we no longer have github pages

---
 wikipiki/exclamation.png | Bin 3210 -> 0 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)
 delete mode 100644 wikipiki/exclamation.png

diff --git a/wikipiki/exclamation.png b/wikipiki/exclamation.png
deleted file mode 100644
index e8e4ff5fd1ec1b49fe12fe38f8eadfc775ffbfac..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 3210
zcmV;540ZE~P)<h;3K|Lk000e1NJLTq000yK000yS1^@s6jfou%00009a7bBm000XU
z000XU0RWnu7ytkYPiaF#P*7-ZbZ>KLZ*U+<Lqi~Na&Km7Y-Iodc-oy)XH-+^7Crag
z^g>IBfRsybQWXdwQbLP>6p<z>Aqfylh#{fb6;Z(vMMVS~$e@S=j*ftg6;Uh<iVD~V
z<RPMtgQJLw%KPDaqifc@_vX$1wbwr9tn;0-&j-K=43<bUQ8j=JsX`tR;Dg7+#^K~H
zK!FM*Z~zbpvt%K2{UZSY_<lS*D<Z%Lz5oGu(+dayz)hRLFdT>f59&ghTmgWD0l;*T
zI7<kC6aYYajzXpYKt=(8otP$50H6c_V9R4-;{Z@C0AMG7=F<Rxo%or10RUT+Ar%3j
zkpLhQWr#!oXgdI`&sK^>09Y^p6lP1rIRMx#05C~cW=H_Aw*bJ-5DT&Z2n+x)QHX^p
z00esgV8|mQcmRZ%02D^@S3L16t`O%c004NIvOKvYIYoh62rY33S640`D9%Y2D-<?i
z0%4j!F2Z@488U%158(66005wo6%pWr^Zj_v4zAA5HjcIqUoGmt2LB>rV&neh&#Q1i
z007~1e$oCcFS8neI|hJl{-P!B1ZZ9hpmq0)X0i`JwE&>$+E?>%_<lS*MWK+n+1cgf
z<k(8YLR(?VSAG6x!e78w{cQPuJpA|d;J)G{fihizM+Erb!p!tcr5w+a34~(Y=8s4G
zw+sLL9n&JjNn*KJDiq^U5^;`1nvC-@r6P$!k}1U{(*I=Q-z@tBKHoI}uxdU5dyy@u
zU1J0GOD7Ombim^G008p4Z^6_k2m^p<gW=D2|L;HjN1!DDfM!XOaR2~bL?kX$%CkSm
z2mk;?pn)o|K^yeJ7%adB9Ki+L!3+FgHiSYX#KJ-lLJDMn9CBbOtb#%)hRv`YDqt_v
zKpix|QD}yfa1JiQRk#j4a1Z)n2%f<xynzV>LC6RbVIkUx0b+_+BaR3cnT7Zv!AJxW
zizFb)h!jyGOOZ85F;a?DAXP{m@;!0_Ifq<Ex{*7`05XF7hP+2Hl!3BQJ=6@fL%FCo
z8iYoo3(#bAF`ADSpqtQgv>H8(HlgRxt7s3}k3K`kFu>>-2Q$QMFfPW!La{h336o>X
zu_CMttHv6zR;&ZNiS=X8v3CR#fknUxHUxJ<AYmRsNLWl*PS{AOARHt#5!wki2?K;t
z!Y3k=s7tgax)J%r7-BLphge7~Bi0g+6E6^Zh(p9TBoc{3GAFr^0!gu?RMHaCM$&Fl
zBk3%un>0uoBa_M6WNWeqIg~6QE69c9o#eyhGvpiOA@W-aonk<7r1(?fC{oI5N*U!4
z<uv66WtcKSRim0x-Ke2d5jBrmLam{;Qm;{ms1r1GnmNsb7D-E`t)i9F8fX`2_i3-_
zbh;7Ul^#x)&{xvS=|||7=mYe33=M`AgU5(xC>fg=2N-7=cNnjjOr{yriy6mMFgG#l
znCF=fnQv8CDz++o6_Lscl}eQ+l^ZHARH>?_s@|##Rr6KLRFA1%Q+=*RRWnoLsR`7U
zt5vF<Q0r40Q)j6=sE4X&sBct1q<&fbi3VB2Ov6t@q*0);U*o*SAPZv|vv@2aYYnT0
zb%8a+Cb7-ge0D0knEf5Qi#@8Tp*ce{N;6lpQuCB%KL_KOarm5cP6_8Ir<e17iry6O
zDdH&`rZh~sF=bq9s+O0QSgS~@QL9Jmy*94xr=6y~MY~!1fet~(N+(<=M`w@D1)b+p
z*;C!83a1uLJv#NSE~;y#8=<>IcfW3@?wFpwUVxrVZ>QdQz32KIeJ}k~{cZZE^+ya?
z2D1z#2HOnI7(B%_ac?{wFUQ;QQA1tBKtrWrm0_3Rgps+?Jfqb{jYbcQX~taRB;#$y
zZN{S}1|}gUOHJxc?wV3fxuz+mJ4`!F$IZ;mqRrNsHJd##*D~ju=bP7?-?v~|cv>vB
zsJ6IeNwVZxrdjT`yl#bBIa#GxRa#xMMy;K#CDyyGyQdMSxlWT#tDe?p!?5wT$+oGt
z8L;Kp2HUQ-ZMJ=3XJQv;x5ci*?vuTfeY$;({XGW_huIFR9a<fJbF^|4I#xQ~n$Dc=
zKYhjYmgz5NSkDm8*fZm{6U!;YX`NG>(?@3)XSs8O^N5RyOM=TTmp(3=8^+zpz2r)C
z^>JO{deZfso3oq3?Wo(Y?l$ge?uXo;%ru`Vo>?<<(8I_>;8Eq#KMS9gFl*neeosSB
zfoHYnBQIkwkyowPu(zdms`p{<7e4kra-ZWq<2*OsGTvEV%s0Td$hXT+!*8Bnh2KMe
zBmZRodjHV?r+_5^X9J0WL4jKW`}lf%A-|44I@@LTvf1rHjG(ze6+w@Jt%Bvjts!X0
z?2xS?_ve_-k<Mujg;0Lz*3buG=3$G&ehepthlN*$KaOySSQ^nWmo<0M+(UEUMEXRQ
zMBbZcF;6+KElM>iKB_KiJlZ$9G`c^=E@oNG)mWWaNo-3TIW8)$Hg0Ub-~8?KhvJ>$
z3*&nim@mj(aCxE5!t{lw7O5^0EIO7zOo&c6l<+|iDySBWCGrz@C5{St!X3hAA}`T4
z(TLbXTq+(;@<=L8dXnssyft|w#WSTW<++3>sgS%(4NTpeI-VAqb|7ssJvzNHgOZVu
zaYCvgO_R1~>SyL=cFU|~g|hy|Zi}}s9+d~lYqOB71z9Z$wnC=pR9Yz4DhIM>Wmjgu
z&56o6maCpC&F##y%G;1PobR9i?GnNg;gYtchD%p19a!eQtZF&3JaKv33gZ<8D~47E
ztUS1iwkmDaPpj=$m#%)jCVEY4fnLGNg2A-`YwHVD3gv};>)hAvT~AmqS>Lr``i7kw
zJ{5_It`yrBmlc25DBO7E8;5VoznR>Ww5hAaxn$2~(q`%A-YuS64wkBy=9dm`4cXeX
z4c}I@?e+FW+b@^RDBHV(wnMq2zdX3SWv9u`%{xC-q*U}&`cyXV(%rRT*Z6MH?i+i&
z_B8C(+grT%{XWUQ+f@NoP1R=AW&26{v-dx)iK^-Nmiuj8txj!m?Z*Ss1N{dh4z}01
z)YTo*JycSU)+_5r4#yw9{+;i4Ee$peRgIj+;v;ZGdF1K$3E%e~4LaI(jC-u%2h$&R
z9cLXcYC@Xwnns&bn)_Q~Te?roKGD|d-g^8;+aC{{G(1^(O7m37Y1-+6)01cN&y1aw
zoqc{T`P^XJqPBbIW6s}d4{z_f5Om?vMgNQEJG?v2T=KYd^0M3I6IZxbny)%vZR&LD
zJpPl@Psh8QyPB@KTx+@RdcC!KX7}kEo;S|j^u2lU7XQ}Oo;f|;z4Ll+_r>@1-xl3|
zawq-H%e&ckC+@AhPrP6BK<z=<L*0kfKU@CX*zeqbYQT4(^U>T#_XdT7&;F71j}Joy
zkC~6lh7E@6o;W@^IpRNZ{ptLtL(gQ-CY~4mqW;US7Zxvm_|@yz&e53Bp_lTPlfP|z
zrTyx_>lv@x#=^!PzR7qqF<$gm`|ZJZ+;<)Cqu&ot<a{81DF0~rvGr5Xr~8u`lav1h
z1DNytV>2z=0000WV@Og>004R=004l4008;_004mL004C`008P>0026e000+nl3&F}
z0005CNkl<Zc-pL$PiqrF7{-6IGdr_?+^(%n!9N5V1VJfYDuvRMh#-3N>R0gKSMcQL
z5IlMBSwXJ~p1f$O5H)F<l(g9-o827`+e$BK>Cm|h%mcr9pZ9s05!PBRbE$d4YazTb
zEL0!>TY-qBv=5Tx@abSsUKqFp<}Pe6K(hiYpp5CJ&E`Yk;KD!+ldBNjf}6z&Q0rkF
zhKFZa_T~wjHRI<Lm;nV)81uU-%hCz>0oa4KJauM$|JRZ4yM=ND4B_v87@&io9UFsF
zg$+Q$&S`&EsXx>4*sa1zU1g^{xm5@Xt#?bM+<*!wp*w>j0A-c3alha3`+YZHSZ|#I
z20%kdIm#Codov(*0S<r)hGQ5d(5O7`AdjLRLO5F1n$p?{VfZ~ZCN0A7N6_tN;_NY;
z58OL${?|Bu{w0c<Eh*bu(`m&ykI7u%w=6?Ia3jm!+=j;%K91m(2bp#O-UF_|lV|YK
zs}sMoZ_H<;e4Dxe?*msr6?HfOL~CnWq^X<b<yzdXlH{E<=8<f*KII!5?{g`+?gBh+
w{Yb8?ya?9Um+k6mFV8YKCuMQjU%<Zs08odJU>bDA7ytkO07*qoM6N<$f+=wLcmMzZ


From f61d4a0d383d9ccc9513c35f09f1290a4292a5d1 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 15 Sep 2020 11:55:28 +0000
Subject: [PATCH 0653/1147] Update prefsCleaner.sh

---
 prefsCleaner.sh | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index d8185cd..c9d92d9 100644
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -2,7 +2,7 @@
 
 ## prefs.js cleaner for Linux/Mac
 ## author: @claustromaniac
-## version: 1.2
+## version: 1.3
 
 ## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
 
@@ -58,7 +58,7 @@ echo -e "\n\n"
 echo "                   ╔══════════════════════════╗"
 echo "                   ║     prefs.js cleaner     ║"
 echo "                   ║    by claustromaniac     ║"
-echo "                   ║           v1.2           ║"
+echo "                   ║           v1.3           ║"
 echo "                   ╚══════════════════════════╝"
 echo -e "\nThis script should be run from your Firefox profile directory.\n"
 echo "It will remove any entries from prefs.js that also exist in user.js."
@@ -90,7 +90,7 @@ select option in Start Help Exit; do
 			echo "4. Rename or copy your latest backup to prefs.js."
 			echo "5. Run Firefox and see if you notice anything wrong with it."
 			echo "6. If you do notice something wrong, especially with your extensions, and/or with the UI, go to about:support, and restart Firefox with add-ons disabled. Then, restart it again normally, and see if the problems were solved."
-			echo -e "If you are able to identify the cause of your issues, please bring it up on ghacks-user.js GitHub repository.\n"
+			echo -e "If you are able to identify the cause of your issues, please bring it up on the arkenfox user.js GitHub repository.\n"
 			;;
 		Exit)
 			fQuit 0

From 42b7650d42a781b66d94516b4a849d253ef05cc8 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 15 Sep 2020 11:58:52 +0000
Subject: [PATCH 0654/1147] v2.8: arkenfox

---
 updater.sh | 14 +++++++-------
 1 file changed, 7 insertions(+), 7 deletions(-)

diff --git a/updater.sh b/updater.sh
index ddd5266..7ab21d4 100755
--- a/updater.sh
+++ b/updater.sh
@@ -1,8 +1,8 @@
 #!/usr/bin/env bash
 
-## ghacks-user.js updater for macOS and Linux
+## arkenfox user.js updater for macOS and Linux
 
-## version: 2.7
+## version: 2.8
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac
 
@@ -55,14 +55,14 @@ show_banner () {
   echo -e "${BBLUE}
                 ############################################################################
                 ####                                                                    ####
-                ####                           ghacks user.js                           ####
+                ####                          arkenfox user.js                          ####
                 ####       Hardening the Privacy and Security Settings of Firefox       ####
                 ####           Maintained by @Thorin-Oakenpants and @earthlng           ####
                 ####            Updater for macOS and Linux by @overdodactyl            ####
                 ####                                                                    ####
                 ############################################################################"
   echo -e "${NC}\n"
-  echo -e "Documentation for this script is available here: ${CYAN}https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts${NC}\n"
+  echo -e "Documentation for this script is available here: ${CYAN}https://github.com/arkenfox/user.js/wiki/3.3-Updater-Scripts${NC}\n"
 }
 
 #########################
@@ -195,7 +195,7 @@ update_updater () {
     return 0 # User signified not to check for updates
   fi
 
-  declare -r tmpfile="$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.sh')"
+  declare -r tmpfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/updater.sh')"
   [ -z "${tmpfile}" ] && echo -e "${RED}Error! Could not download updater.sh${NC}" && return 1 # check if download failed
 
   if [[ $(get_updater_version "${SCRIPT_DIR}/updater.sh") < $(get_updater_version "${tmpfile}") ]]; then
@@ -250,7 +250,7 @@ remove_comments () { # expects 2 arguments: from-file and to-file
 
 # Applies latest version of user.js and any custom overrides
 update_userjs () {
-  declare -r newfile="$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js')"
+  declare -r newfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/user.js')"
   [ -z "${newfile}" ] && echo -e "${RED}Error! Could not download user.js${NC}" && return 1 # check if download failed
 
   echo -e "Please observe the following information:
@@ -370,7 +370,7 @@ if [ $# != 0 ]; then
           ESR=true
           ;;
         r)
-          tfile="$(download_file 'https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js')"
+          tfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/user.js')"
           [ -z "${tfile}" ] && echo -e "${RED}Error! Could not download user.js${NC}" && exit 1 # check if download failed
           mv $tfile "${tfile}.js"
           echo -e "${ORANGE}Warning: user.js was saved to temporary file ${tfile}.js${NC}"

From ee3e5f01863dd99e7cd485aa0be335b7d8c45fbe Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 15 Sep 2020 12:04:54 +0000
Subject: [PATCH 0655/1147] v4.12: arkenfox

---
 updater.bat | 16 ++++++++--------
 1 file changed, 8 insertions(+), 8 deletions(-)

diff --git a/updater.bat b/updater.bat
index 0e883be..7783860 100644
--- a/updater.bat
+++ b/updater.bat
@@ -1,12 +1,12 @@
 @ECHO OFF & SETLOCAL EnableDelayedExpansion
-TITLE ghacks user.js updater
+TITLE arkenfox user.js updater
 
-REM ## ghacks-user.js updater for Windows
+REM ## arkenfox user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.11
-REM ## instructions: https://github.com/ghacksuserjs/ghacks-user.js/wiki/3.3-Updater-Scripts
+REM ## version: 4.12
+REM ## instructions: https://github.com/arkenfox/user.js/wiki/3.3-Updater-Scripts
 
-SET v=4.11
+SET v=4.12
 
 VERIFY ON
 CD /D "%~dp0"
@@ -52,7 +52,7 @@ IF DEFINED _updateb (
 		REM Uncomment the next line and comment out the PowerShell call for testing.
 		REM COPY /B /Y "!_myname!.bat" "[updated]!_myname!.bat" >nul
 		(
-			PowerShell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/updater.bat', '[updated]!_myname!.bat')"
+			PowerShell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/arkenfox/user.js/master/updater.bat', '[updated]!_myname!.bat')"
 		) >nul 2>&1
 		IF EXIST "[updated]!_myname!.bat" (
 			START /min CMD /C "[updated]!_myname!.bat" !_myparams!
@@ -111,7 +111,7 @@ IF NOT EXIST user.js (
 ECHO:
 IF NOT DEFINED _ua (
 	CALL :message "This batch should be run from your Firefox profile directory."
-	ECHO:  It will download the latest version of ghacks user.js from github and then
+	ECHO:  It will download the latest version of arkenfox user.js from github and then
 	CALL :message "append any of your own changes from user-overrides.js to it."
 	CALL :message "Visit the wiki for more detailed information."
 	ECHO:
@@ -133,7 +133,7 @@ IF DEFINED _log (
 IF EXIST user.js.new (DEL /F "user.js.new")
 CALL :message "Retrieving latest user.js file from github repository..."
 (
-	PowerShell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js', 'user.js.new')"
+	PowerShell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/arkenfox/user.js/master/user.js', 'user.js.new')"
 ) >nul 2>&1
 IF EXIST user.js.new (
 	IF DEFINED _rfpalts (

From e1d336a178b784766d05afbd84c8e006001979f4 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 15 Sep 2020 13:36:39 +0000
Subject: [PATCH 0656/1147] standardize some error codes

* 0 : successful termination
* 2 : command line syntax error
* 1 : catchall for general errors

Plus a few text improvements based on unmerged PR https://github.com/arkenfox/user.js/pull/910/commits/4fbb2be98d8d156efd0f172e24cbbf77591ef4fc
---
 updater.sh | 18 +++++++++---------
 1 file changed, 9 insertions(+), 9 deletions(-)

diff --git a/updater.sh b/updater.sh
index 7ab21d4..a27e98a 100755
--- a/updater.sh
+++ b/updater.sh
@@ -47,7 +47,7 @@ elif [[ $(command -v 'wget') ]]; then
   DOWNLOAD_METHOD='wget --max-redirect 3 --quiet -O'
 else
   echo -e "${RED}This script requires curl or wget.\nProcess aborted${NC}"
-  exit 0
+  exit 1
 fi
 
 
@@ -76,7 +76,7 @@ usage() {
 Optional Arguments:
     -h           Show this help message and exit.
     -p PROFILE   Path to your Firefox profile (if different than the dir of this script)
-                 IMPORTANT: if the path includes spaces, wrap the entire argument in quotes.
+                 IMPORTANT: If the path contains spaces, wrap the entire argument in quotes.
     -l           Choose your Firefox profile from a list
     -u           Update updater.sh and execute silently.  Do not seek confirmation.
     -d           Do not look for updates to updater.sh.
@@ -88,8 +88,8 @@ Optional Arguments:
                  If given a directory, all files inside will be appended recursively.
                  You can pass multiple files or directories by passing a comma separated list.
                      Note: If a directory is given, only files inside ending in the extension .js are appended
-                     IMPORTANT: do not add spaces between files/paths.  Ex: -o file1.js,file2.js,dir1
-                     IMPORTANT: if any files/paths include spaces, wrap the entire argument in quotes.
+                     IMPORTANT: Do not add spaces between files/paths.  Ex: -o file1.js,file2.js,dir1
+                     IMPORTANT: If any file/path contains spaces, wrap the entire argument in quotes.
                          Ex: -o \"override folder\"
     -n           Do not append any overrides, even if user-overrides.js exists.
     -v           Open the resulting user.js file.
@@ -104,13 +104,13 @@ Optional Arguments:
 #########################
 
 # Download files
-download_file () {   # expects URL as argument ($1)
+download_file () { # expects URL as argument ($1)
   declare -r tf=$(mktemp)
 
   $DOWNLOAD_METHOD "${tf}" "$1" && echo "$tf" || echo '' # return the temp-filename or empty string on error
 }
 
-open_file () { #expects one argument: file_path
+open_file () { # expects one argument: file_path
   if [ "$(uname)" == 'Darwin' ]; then
     open "$1"
   elif [ "$(uname -s | cut -c -5)" == "Linux" ]; then
@@ -211,7 +211,7 @@ update_updater () {
   mv "${tmpfile}" "${SCRIPT_DIR}/updater.sh"
   chmod u+x "${SCRIPT_DIR}/updater.sh"
   "${SCRIPT_DIR}/updater.sh" "$@" -d
-  exit 1
+  exit 0
 }
 
 
@@ -375,7 +375,7 @@ if [ $# != 0 ]; then
           mv $tfile "${tfile}.js"
           echo -e "${ORANGE}Warning: user.js was saved to temporary file ${tfile}.js${NC}"
           open_file "${tfile}.js"
-          exit 1
+          exit 0
           ;;
         \?)
           echo -e "${RED}\n Error! Invalid option: -$OPTARG${NC}" >&2
@@ -383,7 +383,7 @@ if [ $# != 0 ]; then
           ;;
         :)
           echo -e "${RED}Error! Option -$OPTARG requires an argument.${NC}" >&2
-          exit 1
+          exit 2
           ;;
       esac
     done

From c367beabe38750dfc21cd8c5da27239ed0529845 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 23 Sep 2020 12:20:59 +0000
Subject: [PATCH 0657/1147] 81-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 05dc94d..bf8cdc3 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 03 Sep 2020
-* version 81-alpha
+* date: 23 Sep 2020
+* version 81-beta
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From 4779ea78500031d3e723c211997708743a71073a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 27 Sep 2020 00:47:09 +0000
Subject: [PATCH 0658/1147] remove CSP issue, closes #1021

---
 .github/ISSUE_TEMPLATE/troubleshooting-help.md | 1 -
 1 file changed, 1 deletion(-)

diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
index 9585395..4ed3b19 100644
--- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -17,7 +17,6 @@ Before you proceed...
 See also:
   - Extension breakage due to prefs [issue 391](https://github.com/arkenfox/user.js/issues/391)
   - Prefs vs Recommended Extensions: Co-Existance+Enhancement | Conflicts [issue 350](https://github.com/arkenfox/user.js/issues/350)
-  - The extension CSP header modification game [issue 664](https://github.com/arkenfox/user.js/issues/664)
 
 If you still need help, help us help you by providing relevant information:
   - browser version

From 2391874e044be303e14f405e9c06e07c13c6dc6c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 28 Sep 2020 19:04:08 +0000
Subject: [PATCH 0659/1147] UI setting change in 81

https://bugzilla.mozilla.org/show_bug.cgi?id=1613468
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index bf8cdc3..bdb7224 100644
--- a/user.js
+++ b/user.js
@@ -1124,7 +1124,7 @@ user_pref("dom.webaudio.enabled", false);
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
 /* 2601: prevent accessibility services from accessing your browser [RESTART]
- * [SETTING] Privacy & Security>Permissions>Prevent accessibility services from accessing your browser
+ * [SETTING] Privacy & Security>Permissions>Prevent accessibility services from accessing your browser [FF80 or lower]
  * [1] https://support.mozilla.org/kb/accessibility-services ***/
 user_pref("accessibility.force_disabled", 1);
 /* 2602: disable sending additional analytics to web servers

From 421f1e361c772e70d1e59f528b7d0aa1f2290f68 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 29 Sep 2020 06:10:57 +0000
Subject: [PATCH 0660/1147] [ ] are for for prefs only

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index bdb7224..6eed776 100644
--- a/user.js
+++ b/user.js
@@ -1124,7 +1124,7 @@ user_pref("dom.webaudio.enabled", false);
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
 /* 2601: prevent accessibility services from accessing your browser [RESTART]
- * [SETTING] Privacy & Security>Permissions>Prevent accessibility services from accessing your browser [FF80 or lower]
+ * [SETTING] Privacy & Security>Permissions>Prevent accessibility services from accessing your browser (FF80 or lower)
  * [1] https://support.mozilla.org/kb/accessibility-services ***/
 user_pref("accessibility.force_disabled", 1);
 /* 2602: disable sending additional analytics to web servers

From a56ba859363f87d45b860b51560a9a3072f33b84 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 2 Oct 2020 08:33:27 +0000
Subject: [PATCH 0661/1147] remove dom.IntersectionObserver.enabled #1026

- this was made inactive in v68
- since at least FF79, when active as false, it breaks the web and browser consoles
- it breaks websites
- it breaks extensions: e.g. uBO panel functionality
- it does nothing to mitigate possible fingerprinting (which was why it was initially added as a concern) - i.e the API only provided a standardized method, it does not stop previous/earlier workarounds
---
 user.js | 5 -----
 1 file changed, 5 deletions(-)

diff --git a/user.js b/user.js
index 6eed776..7f02fdf 100644
--- a/user.js
+++ b/user.js
@@ -1073,11 +1073,6 @@ user_pref("javascript.options.asmjs", false);
  * [NOTE] In FF71+ this no longer affects extensions (1576254)
  * [1] https://developer.mozilla.org/docs/WebAssembly ***/
 user_pref("javascript.options.wasm", false);
-/* 2426: disable Intersection Observer API [FF55+]
- * [1] https://developer.mozilla.org/docs/Web/API/Intersection_Observer_API
- * [2] https://w3c.github.io/IntersectionObserver/
- * [3] https://bugzilla.mozilla.org/1243846 ***/
-   // user_pref("dom.IntersectionObserver.enabled", false);
 /* 2429: enable (limited but sufficient) window.opener protection [FF65+]
  * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
 user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]

From e89f9a5d8997210f6c9ee089e5000a2dcb244613 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 2 Oct 2020 08:36:15 +0000
Subject: [PATCH 0662/1147] dom.IntersectionObserver.enabled

commit: https://github.com/arkenfox/user.js/commit/a56ba859363f87d45b860b51560a9a3072f33b84
issue: #1026
---
 scratchpad-scripts/arkenfox-clear-removed.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 25da048..8ade622 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 14-Sept-2020
+ Last updated: 2-Oct-2020
 
  For instructions see:
  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -223,6 +223,8 @@
     'browser.search.region',
     /* 79-beta */
     'browser.urlbar.usepreloadedtopurls.enabled',
+    /* 80 */
+    'dom.IntersectionObserver.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From d5ccf4693b7cac1f9d04255187a735d51691d7a6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 7 Oct 2020 02:43:51 +1300
Subject: [PATCH 0663/1147] fixup font prefs vs RFP, fixes #1025 (#1028)

- make 1401 inactive: it affects RFP's FPing
- remove old warning/setup-web: we do not care about documenting breakage or FPing risks when we have a warning and they are inactive. If someone uses them, that's on them
- new warnings
---
 user.js | 9 ++++-----
 1 file changed, 4 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 7f02fdf..f559dae 100644
--- a/user.js
+++ b/user.js
@@ -794,9 +794,9 @@ user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 /* 1401: disable websites choosing fonts (0=block, 1=allow)
  * This can limit most (but not all) JS font enumeration which is a high entropy fingerprinting vector
- * [SETUP-WEB] Can break some PDFs (missing text). Limiting to default fonts can "uglify" the web
+ * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4618)
  * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Allow pages to choose... ***/
-user_pref("browser.display.use_document_fonts", 0);
+   // user_pref("browser.display.use_document_fonts", 0);
 /* 1403: disable icon fonts (glyphs) and local fallback rendering
  * [1] https://bugzilla.mozilla.org/789788
  * [2] https://gitlab.torproject.org/legacy/trac/-/issues/8455 ***/
@@ -812,9 +812,8 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
  * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed
- * [NOTE] in FF80 RFP restricts the whitelist to bundled and "Base Fonts"
- * ...and in FF81+ the whitelist **overrides** RFP's font visibility (see 4618)
- * [WARNING] Creating your own probably highly-unique whitelist will raise your entropy.
+ * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4618)
+ * [NOTE] In FF81+ the whitelist **overrides** RFP's font visibility (see 4618)
  * [1] https://bugzilla.mozilla.org/1121643 ***/
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
 

From c90341ddedf7e0c1ae1256d647a9470d056602c1 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 7 Oct 2020 12:10:24 +0000
Subject: [PATCH 0664/1147] 1244: HTTPS-Only mode update (#1031)

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index f559dae..54efc6f 100644
--- a/user.js
+++ b/user.js
@@ -736,7 +736,7 @@ user_pref("security.mixed_content.block_display_content", true);
 user_pref("security.mixed_content.block_object_subrequest", true);
 /* 1244: enable HTTPS-Only mode [FF76+]
  * When "https_only_mode" (all windows) is true, "https_only_mode_pbm" (private windows only) is ignored
- * [WARNING] This is experimental, see [1] and you can't set exceptions if FPI is enabled, see [2]
+ * [WARNING] This is experimental [1] and you can't set exceptions if FPI is enabled [2] (fixed in FF83)
  * [SETTING] to add site exceptions: Page Info>Permissions>Use insecure HTTP (FF80+)
  * [SETTING] Privacy & Security>HTTPS-Only Mode (FF80+ with browser.preferences.exposeHTTPSOnly = true)
  * [1] https://bugzilla.mozilla.org/1613063 [META]

From 0e10a820d9f69a446ea526ffc8a93900b8c6a620 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 13 Oct 2020 14:01:41 +0000
Subject: [PATCH 0665/1147] 81 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 54efc6f..03acb59 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 23 Sep 2020
-* version 81-beta
+* date: 13 Oct 2020
+* version 81
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From f591a8adf84346797704f683b76e6a582ecf6fcb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 13 Oct 2020 14:12:53 +0000
Subject: [PATCH 0666/1147] 82-alpha, 82 deprecated, remove old deprecated

---
 user.js | 105 ++++----------------------------------------------------
 1 file changed, 7 insertions(+), 98 deletions(-)

diff --git a/user.js b/user.js
index 03acb59..e2a9466 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
 * date: 13 Oct 2020
-* version 81
+* version 82-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -160,10 +160,6 @@ user_pref("geo.provider.network.url", "https://location.services.mozilla.com/v1/
 user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
 user_pref("geo.provider.use_corelocation", false); // [MAC]
 user_pref("geo.provider.use_gpsd", false); // [LINUX]
-/* 0206: disable geographically specific results/search engines e.g. "browser.search.*.US"
- * i.e. ignore all of Mozilla's various search engines in multiple locales ***/
-user_pref("browser.search.geoSpecificDefaults", false);
-user_pref("browser.search.geoSpecificDefaults.url", "");
 /* 0207: disable region updates
  * [1] https://firefox-source-docs.mozilla.org/toolkit/modules/toolkit_modules/Region.html ***/
 user_pref("browser.region.network.url", ""); // [FF78+]
@@ -1691,99 +1687,12 @@ user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
    // [-] https://bugzilla.mozilla.org/1603712
 user_pref("intl.charset.fallback.override", "windows-1252");
 // * * * /
-// ***/
-
-/* ESR68.x still uses all the following prefs
-// [NOTE] replace the * with a slash in the line above to re-enable them
-// FF69
-// 1405: disable WOFF2 (Web Open Font Format) [FF35+]
-   // [-] https://bugzilla.mozilla.org/1556991
-   // user_pref("gfx.downloadable_fonts.woff2.enabled", false);
-// 1802: enforce click-to-play for plugins
-   // [-] https://bugzilla.mozilla.org/1519434
-user_pref("plugins.click_to_play", true); // [DEFAULT: true FF25+]
-// 2033: disable autoplay for muted videos [FF63+] - replaced by 'media.autoplay.default' options (2030)
-   // [-] https://bugzilla.mozilla.org/1562331
-   // user_pref("media.autoplay.allow-muted", false);
-// * * * /
-// FF71
-// 2608: disable WebIDE and ADB extension download
-   // [1] https://trac.torproject.org/projects/tor/ticket/16222
-   // [-] https://bugzilla.mozilla.org/1539462
-user_pref("devtools.webide.enabled", false); // [DEFAULT: false FF70+]
-user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
-// 2731: enforce websites to ask to store data for offline use
-   // [1] https://support.mozilla.org/questions/1098540
-   // [2] https://bugzilla.mozilla.org/959985
-   // [-] https://bugzilla.mozilla.org/1574480
-user_pref("offline-apps.allow_by_default", false);
-// * * * /
-// FF72
-// 0105a: disable Activity Stream telemetry
-   // [-] https://bugzilla.mozilla.org/1597697
-user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
-// 0330: disable Hybdrid Content telemetry
-   // [-] https://bugzilla.mozilla.org/1520491
-user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+]
-// 2720: enforce IndexedDB (IDB) as enabled
-   // IDB is required for extensions and Firefox internals (even before FF63 in [1])
-   // To control *website* IDB data, control allowing cookies and service workers, or use
-   // Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize
-   // on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically
-   // via an extension. Note that IDB currently cannot be sanitized by host.
-   // [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/
-   // [-] https://bugzilla.mozilla.org/1488583
-user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
-// * * * /
-// FF74
-// 0203: use Mozilla geolocation service instead of Google when geolocation is enabled
-   // Optionally enable logging to the console (defaults to false)
-   // [-] https://bugzilla.mozilla.org/1613627
-user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
-   // user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
-// 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
-   // 0=no menu (default), 1=show when clicked, 2=show on long press
-   // [1] https://bugzilla.mozilla.org/1328756
-   // [-] https://bugzilla.mozilla.org/1606265
-user_pref("privacy.userContext.longPressBehavior", 2);
-// 2012: limit WebGL
-   // [-] https://bugzilla.mozilla.org/1477756
-user_pref("webgl.disable-extensions", true);
-// * * * /
-// FF76
-// 0401: sanitize blocklist url
-   // [2] https://trac.torproject.org/projects/tor/ticket/16931
-   // [-] https://bugzilla.mozilla.org/1618188
-user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
-// 2201: prevent websites from disabling new window features
-   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507375,1660524
-user_pref("dom.disable_window_open_feature.close", true);
-user_pref("dom.disable_window_open_feature.location", true); // [DEFAULT: true]
-user_pref("dom.disable_window_open_feature.menubar", true);
-user_pref("dom.disable_window_open_feature.minimizable", true);
-user_pref("dom.disable_window_open_feature.personalbar", true); // bookmarks toolbar
-user_pref("dom.disable_window_open_feature.resizable", true); // [DEFAULT: true]
-user_pref("dom.disable_window_open_feature.status", true); // [DEFAULT: true]
-user_pref("dom.disable_window_open_feature.titlebar", true);
-user_pref("dom.disable_window_open_feature.toolbar", true);
-// * * * /
-// FF77
-// 0850e: disable location bar one-off searches [FF51+]
-   // [-] https://bugzilla.mozilla.org/1628926
-   // user_pref("browser.urlbar.oneOffSearches", false);
-// 2605: block web content in file processes [FF55+]
-   // [SETUP-WEB] You may want to disable this for corporate or developer environments
-   // [1] https://bugzilla.mozilla.org/1343184
-   // [-] https://bugzilla.mozilla.org/1603007
-user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false);
-// * * * /
-// FF78
-// 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] - replaced by 'media.autoplay.blocking_policy'
-   // [-] https://bugzilla.mozilla.org/1509933
-user_pref("media.autoplay.enabled.user-gestures-needed", false);
-// 5000's: disable chrome animations - replaced FF77+ by 'ui.prefersReducedMotion' (4520)
-   // [-] https://bugzilla.mozilla.org/1640501
-   // user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
+// FF82
+// 0206: disable geographically specific results/search engines e.g. "browser.search.*.US"
+   // i.e. ignore all of Mozilla's various search engines in multiple locales
+   // [-] https://bugzilla.mozilla.org/1619926
+user_pref("browser.search.geoSpecificDefaults", false);
+user_pref("browser.search.geoSpecificDefaults.url", "");
 // * * * /
 // ***/
 

From 0adfddd1e2ab18b3fcbc45f6d04c4d9394149d6a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 21 Oct 2020 00:58:20 +1300
Subject: [PATCH 0667/1147] misc (#1040)

* misc

- cleanup of old release notation in comments: e.g. if it's not applicable to ESR78+
- same with default version info
- simplify and save bytes on section 4700
- update 4500 header
  - and unify the message about using extensions as counterproductive
- letterboxing
   - provide info on stepped ranged (and drop crap about FF67)
   - don't judge users who dislike seeing margins (I don't like them either, but I force my window to exact dimensions and stay there)
- screenshots uploading was disabled in FF67+ : [67 release notes](https://www.mozilla.org/en-US/firefox/67.0/releasenotes/)
   - the pref is still there (default false) but so far I'm 99% sure this pref now does anything
   - I will add it to the scatchpad script if this change sticks

* simplify 4500 RFP, see #1041

* update removed script

* tidy readme, see #1045

- also put readme before releases

* RIP FX Site Compat

* clean out RFP Alts info: the information is redundant: it's already in the readme
---
 scratchpad-scripts/arkenfox-clear-removed.js |   6 +-
 user.js                                      | 254 ++++++++-----------
 2 files changed, 110 insertions(+), 150 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 8ade622..c5e40fd 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 2-Oct-2020
+ Last updated: 18-Oct-2020
 
  For instructions see:
  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -225,6 +225,10 @@
     'browser.urlbar.usepreloadedtopurls.enabled',
     /* 80 */
     'dom.IntersectionObserver.enabled',
+    /* 82-beta */
+    'extensions.screenshots.upload-disabled',
+    'security.ssl3.dhe_rsa_aes_128_sha',
+    'security.ssl3.dhe_rsa_aes_256_sha',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]
diff --git a/user.js b/user.js
index e2a9466..7cdf263 100644
--- a/user.js
+++ b/user.js
@@ -5,40 +5,34 @@
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
-* releases: These are end-of-stable-life-cycle legacy archives.
-            *Always* use the master branch user.js for a current up-to-date version
-       url: https://github.com/arkenfox/user.js/releases
-
 * README:
 
-  0. Consider using Tor Browser if it meets your needs or fits your threat model better
-     * https://www.torproject.org/about/torusers.html.en
-  1. READ the full README
-     * https://github.com/arkenfox/user.js/blob/master/README.md
-  2. READ this
-     * https://github.com/arkenfox/user.js/wiki/1.3-Implementation
-  3. If you skipped steps 1 and 2 above (shame on you), then here is the absolute minimum
-     * Real time binary checks with Google services are disabled (0412)
-     * You will still get prompts to update Firefox, but auto-installing them is disabled (0302a)
-     * Some user data is erased on close (section 2800). Change this to suit your needs
-     * EACH RELEASE check:
-         - 4600s: reset prefs made redundant due to privacy.resistFingerprinting (RPF)
-                  or enable them as an alternative to RFP (or some of them for ESR users)
-         - 9999s: reset deprecated prefs in about:config or enable the relevant section for ESR
-     * Site breakage WILL happen
-         - There are often trade-offs and conflicts between Security vs Privacy vs Anti-Fingerprinting
-           and these need to be balanced against Functionality & Convenience & Breakage
-     * You will need to make changes, and to troubleshoot at times (choose wisely, there is always a trade-off).
-       While not 100% definitive, search for "[SETUP". If required, add each pref to your overrides section at
-       default values (or comment them out and reset them in about:config). Here are the main ones:
+  1. Consider using Tor Browser if it meets your needs or fits your threat model better
+       * https://www.torproject.org/about/torusers.html.en
+  2. Required reading: Overview, Backing Up, Implementing, and Maintenance entries
+       * https://github.com/arkenfox/user.js/wiki
+  3. If you skipped step 2, return to step 2
+  4. Make changes
+       * There are often trade-offs and conflicts between security vs privacy vs anti-fingerprinting
+         and these need to be balanced against functionality & convenience & breakage
+       * Some site breakage and unintended consequences will happen. Everyone's experience will differ
+         e.g. some user data is erased on close (section 2800), change this to suit your needs
+       * While not 100% definitive, search for "[SETUP" tags
+       * Take the wiki link in step 2 and read the Troubleshooting entry
+  5. Some tag info
        [SETUP-SECURITY] it's one item, read it
             [SETUP-WEB] can cause some websites to break
-         [SETUP-CHROME] changes how Firefox itself behaves (i.e. NOT directly website related)
+         [SETUP-CHROME] changes how Firefox itself behaves (i.e. not directly website related)
            [SETUP-PERF] may impact performance
-         [SETUP-HARDEN] maybe you should consider using the Tor Browser
-     * [WARNING] tags are extra special and used sparingly, so heed them
-  4. BACKUP your profile folder before implementing (and/or test in a new/cloned profile)
-  5. KEEP UP TO DATE: https://github.com/arkenfox/user.js/wiki#small_orange_diamond-maintenance
+              [WARNING] used sparingly, heed them
+
+* RELEASES
+
+  * Archive: https://github.com/arkenfox/user.js/releases
+  * Use the correct release that matches your Firefox version
+  * Each release
+    - run the prefsCleaner or reset deprecated prefs (9999s) and prefs made redundant by RFP (4600s)
+    - re-enable section 4600 if you don't use RFP
 
 * INDEX:
 
@@ -68,7 +62,7 @@
   4000: FPI (FIRST PARTY ISOLATION)
   4500: RFP (RESIST FINGERPRINTING)
   4600: RFP ALTERNATIVES
-  4700: RFP ALTERNATIVES (NAVIGATOR / USER AGENT (UA) SPOOFING)
+  4700: RFP ALTERNATIVES (USER AGENT SPOOFING)
   5000: PERSONAL
   9999: DEPRECATED / REMOVED / LEGACY / RENAMED
 
@@ -340,10 +334,8 @@ user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
 /* 0506: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
  * Currently blocked by 'datareporting.healthreport.uploadEnabled' (see 0340) ***/
 user_pref("browser.ping-centre.telemetry", false);
-/* 0515: disable Screenshots
- * alternatively in FF60+, disable uploading to the Screenshots server ***/
+/* 0515: disable Screenshots ***/
    // user_pref("extensions.screenshots.disabled", true); // [FF55+]
-   // user_pref("extensions.screenshots.upload-disabled", true); // [FF60+]
 /* 0517: disable Form Autofill
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
@@ -365,7 +357,7 @@ user_pref("network.prefetch-next", false);
 /* 0602: disable DNS prefetching
  * [1] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
 user_pref("network.dns.disablePrefetch", true);
-user_pref("network.dns.disablePrefetchFromHTTPS", true); // [DEFAULT: true FF70+]
+user_pref("network.dns.disablePrefetchFromHTTPS", true); // [DEFAULT: true]
 /* 0603: disable predictor / prefetching ***/
 user_pref("network.predictor.enabled", false);
 user_pref("network.predictor.enable-prefetch", false); // [FF48+]
@@ -417,8 +409,7 @@ user_pref("network.http.altsvc.oe", false);
  * as a remote Tor node will handle the DNS request
  * [1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
 user_pref("network.proxy.socks_remote_dns", true);
-/* 0708: disable FTP [FF60+]
- * [1] https://www.fxsitecompat.dev/en-CA/docs/2020/ftp-support-will-be-removed/ ***/
+/* 0708: disable FTP [FF60+] ***/
    // user_pref("network.ftp.enabled", false);
 /* 0709: disable using UNC (Uniform Naming Convention) paths [FF61+]
  * [SETUP-CHROME] Can break extensions for profiles on network shares
@@ -546,8 +537,7 @@ user_pref("signon.formlessCapture.enabled", false);
  * hardens against potential credentials phishing
  * 0=don't allow sub-resources to open HTTP authentication credentials dialogs
  * 1=don't allow cross-origin sub-resources to open HTTP authentication credentials dialogs
- * 2=allow sub-resources to open HTTP authentication credentials dialogs (default)
- * [1] https://www.fxsitecompat.com/en-CA/docs/2015/http-auth-dialog-can-no-longer-be-triggered-by-cross-origin-resources/ ***/
+ * 2=allow sub-resources to open HTTP authentication credentials dialogs (default) ***/
 user_pref("network.auth.subresource-http-auth-allow", 1);
 
 /*** [SECTION 1000]: CACHE / SESSION (RE)STORE / FAVICONS
@@ -648,7 +638,7 @@ user_pref("security.ssl.require_safe_negotiation", true);
  * [STATS] Firefox telemetry (June 2020) shows only 0.16% of SSL handshakes use 1.0 or 1.1
  * [WARNING] Leave these at default, otherwise you alter your TLS fingerprint.
  * [1] https://www.ssllabs.com/ssl-pulse/ ***/
-   // user_pref("security.tls.version.min", 3); // [DEFAULT: 3 FF78+]
+   // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
    // user_pref("security.tls.version.max", 4);
 /* 1203: enforce TLS 1.0 and 1.1 downgrades as session only */
 user_pref("security.tls.version.enable-deprecated", false);
@@ -753,10 +743,6 @@ user_pref("security.mixed_content.block_object_subrequest", true);
  * [2] https://en.wikipedia.org/wiki/Meet-in-the-middle_attack
  * [3] https://www-archive.mozilla.org/projects/security/pki/nss/ssl/fips-ssl-ciphersuites.html ***/
    // user_pref("security.ssl3.rsa_des_ede3_sha", false);
-/* 1263: disable DHE (Diffie-Hellman Key Exchange)
- * [1] https://www.eff.org/deeplinks/2015/10/how-to-protect-yourself-from-nsa-attacks-1024-bit-DH ***/
-   // user_pref("security.ssl3.dhe_rsa_aes_128_sha", false); // [DEFAULT: false FF78+]
-   // user_pref("security.ssl3.dhe_rsa_aes_256_sha", false); // [DEFAULT: false FF78+]
 /* 1264: disable the remaining non-modern cipher suites as of FF78 (in order of preferred by FF) ***/
    // user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false);
    // user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
@@ -783,7 +769,7 @@ user_pref("browser.ssl_override_behavior", 1);
  * [TEST] https://expired.badssl.com/ ***/
 user_pref("browser.xul.error_pages.expert_bad_cert", true);
 /* 1273: display "insecure" icon and "Not Secure" text on HTTP sites ***/
-   // user_pref("security.insecure_connection_icon.enabled", true); // [FF59+] [DEFAULT: true FF70+]
+   // user_pref("security.insecure_connection_icon.enabled", true); // [FF59+] [DEFAULT: true]
 user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 
 /*** [SECTION 1400]: FONTS ***/
@@ -819,9 +805,7 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
             harden it a bit: set XOriginPolicy (1603) to 1 (as per the settings below)
        harden it a bit more: set XOriginPolicy (1603) to 2 (and optionally 1604 to 1 or 2), expect breakage
      ---
-     If you want any REAL control over referers and breakage, then use an extension. Either:
-              uMatrix: limited by scope, all requests are spoofed or not-spoofed
-       Smart Referrer: granular with source<->destination, whitelists
+     If you want any REAL control over referers and breakage, then use an extension
      ---
                     full URI: https://example.com:8888/foo/bar.html?id=1234
        scheme+host+port+path: https://example.com:8888/foo/bar.html
@@ -981,9 +965,6 @@ user_pref("dom.popup_allowed_events", "click dblclick");
      including service and shared workers. Shared workers can be utilized by multiple scripts and
      communicate between browsing contexts (windows/tabs/iframes) and can even control your cache.
 
-     [NOTE] uMatrix 1.2.0+ allows a per-scope control for workers (2301-deprecated) and service workers (2302)
-              #Required reading [#] https://github.com/gorhill/uMatrix/releases/tag/1.2.0
-
      [1]    Web Workers: https://developer.mozilla.org/docs/Web/API/Web_Workers_API
      [2]         Worker: https://developer.mozilla.org/docs/Web/API/Worker
      [3] Service Worker: https://developer.mozilla.org/docs/Web/API/Service_Worker_API
@@ -1065,7 +1046,6 @@ user_pref("javascript.options.asmjs", false);
    // user_pref("javascript.options.baselinejit", false);
    // user_pref("javascript.options.jit_trustedprincipals", true); // [FF75+] [HIDDEN PREF]
 /* 2422: disable WebAssembly [FF52+] [SETUP-PERF]
- * [NOTE] In FF71+ this no longer affects extensions (1576254)
  * [1] https://developer.mozilla.org/docs/WebAssembly ***/
 user_pref("javascript.options.wasm", false);
 /* 2429: enable (limited but sufficient) window.opener protection [FF65+]
@@ -1250,14 +1230,13 @@ user_pref("security.dialog_enable_delay", 700);
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 /* 2701: disable 3rd-party cookies and site-data [SETUP-WEB]
  * 0=Accept cookies and site data, 1=(Block) All third-party cookies, 2=(Block) All cookies,
- * 3=(Block) Cookies from unvisited websites, 4=(Block) Cross-site and social media trackers (FF63+) (default FF69+)
+ * 3=(Block) Cookies from unvisited websites, 4=(Block) Cross-site and social media trackers (default)
  * [NOTE] You can set exceptions under site permissions or use an extension
  * [NOTE] Enforcing category to custom ensures ETP related prefs are always honored
  * [SETTING] Privacy & Security>Enhanced Tracking Protection>Custom>Cookies ***/
 user_pref("network.cookie.cookieBehavior", 1);
 user_pref("browser.contentblocking.category", "custom");
-/* 2702: set third-party cookies (i.e ALL) (if enabled, see 2701) to session-only
-   and (FF58+) set third-party non-secure (i.e HTTP) cookies to session-only
+/* 2702: set third-party cookies (if enabled, see 2701) to session-only
    [NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and
    .nonsecureSessionOnly=true. This allows you to keep HTTPS cookies, but session-only HTTP ones
  * [1] https://feeding.cloud.geek.nz/posts/tweaking-cookies-for-privacy-in-firefox/ ***/
@@ -1388,72 +1367,67 @@ user_pref("privacy.firstparty.isolate", true);
 user_pref("privacy.partition.network_state", true);
 
 /*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
-   This master switch will be used for a wide range of items, many of which will
-   **override** existing prefs from FF55+, often providing a **better** solution
+   RFP covers a wide range of ongoing fingerprinting solutions.
+   It is an all-or-nothing buy in: you cannot pick and choose what parts you want
 
-   IMPORTANT: As existing prefs become redundant, and some of them WILL interfere
-   with how RFP works, they will be moved to section 4600 and made inactive
+   [WARNING] Do NOT use extensions to alter RFP protected metrics
+   [WARNING] Do NOT use prefs in section 4600 with RFP as they can interfere
 
- ** 418986 - limit window.screen & CSS media queries leaking identifiable info (FF41+)
-      [NOTE] Info only: To set a size, open a XUL (chrome) page (such as about:config) which is at
-      100% zoom, hit Shift+F4 to open the scratchpad, type window.resizeTo(1366,768), hit Ctrl+R to run.
-      Test your window size, do some math, resize to allow for all the non inner window elements
+ FF41+
+    418986 - limit window.screen & CSS media queries leaking identifiable info
       [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
- ** 1281949 - spoof screen orientation (FF50+)
- ** 1281963 - hide the contents of navigator.plugins and navigator.mimeTypes (FF50+)
-      FF53: Fixes GetSupportedNames in nsMimeTypeArray and nsPluginArray (1324044)
- ** 1330890 - spoof timezone as UTC 0 (FF55+)
-      FF58: Date.toLocaleFormat deprecated (818634)
-      FF60: Date.toLocaleDateString and Intl.DateTimeFormat fixed (1409973)
- ** 1360039 - spoof navigator.hardwareConcurrency as 2 (see 4601) (FF55+)
-      This spoof *shouldn't* affect core chrome/Firefox performance
- ** 1217238 - reduce precision of time exposed by javascript (FF55+)
- ** 1369303 - spoof/disable performance API (see 2410-deprecated, 4602, 4603) (FF56+)
- ** 1333651 & 1383495 & 1396468 - spoof User Agent & Navigator API (see section 4700) (FF56+)
-      FF56: Version: rounded down to the nearest multiple of 10
-      FF57: Version: match current ESR (1393283, 1418672, 1418162, 1511763)
-      FF59: OS: Windows, OSX, Android, or Linux (to reduce breakage) (1404608)
-      FF66: OS: HTTP Headers reduced to Windows or Android (1509829)
-      FF68: OS: updated to Windows 10, OS 10.14, and Android 8.1 (1511434)
-      FF78: OS: updated to OS 10.15 and Android 9.0 (1635011)
- ** 1369319 - disable device sensor API (see 4604) (FF56+)
- ** 1369357 - disable site specific zoom (see 4605) (FF56+)
- ** 1337161 - hide gamepads from content (see 4606) (FF56+)
- ** 1372072 - spoof network information API as "unknown" when dom.netinfo.enabled = true (see 4607) (FF56+)
- ** 1333641 - reduce fingerprinting in WebSpeech API (see 4608) (FF56+)
- ** 1372069 & 1403813 & 1441295 - block geolocation requests (same as denying a site permission) (see 0201, 0202) (FF56-62)
- ** 1369309 - spoof media statistics (see 4610) (FF57+)
- ** 1382499 - reduce screen co-ordinate fingerprinting in Touch API (see 4611) (FF57+)
- ** 1217290 & 1409677 - enable fingerprinting resistance for WebGL (see 2010-12) (FF57+)
- ** 1382545 - reduce fingerprinting in Animation API (FF57+)
- ** 1354633 - limit MediaError.message to a whitelist (FF57+)
- ** 1382533 - enable fingerprinting resistance for Presentation API (FF57+)
+ FF50+
+   1281949 - spoof screen orientation
+   1281963 - hide the contents of navigator.plugins and navigator.mimeTypes (FF50+)
+ FF55+
+   1330890 - spoof timezone as UTC 0
+   1360039 - spoof navigator.hardwareConcurrency as 2 (see 4601)
+   1217238 - reduce precision of time exposed by javascript
+ FF56+
+   1369303 - spoof/disable performance API (see 4602, 4603)
+   1333651 - spoof User Agent & Navigator API (see section 4700)
+      JS: FF78+ the version is spoofed as 78, and the OS as Windows 10, OS 10.15, Android 9, or Linux
+      HTTP Headers: spoofed as Windows or Android
+   1369319 - disable device sensor API (see 4604)
+   1369357 - disable site specific zoom (see 4605)
+   1337161 - hide gamepads from content (see 4606)
+   1372072 - spoof network information API as "unknown" when dom.netinfo.enabled = true (see 4607)
+   1333641 - reduce fingerprinting in WebSpeech API (see 4608)
+ FF57+
+   1369309 - spoof media statistics (see 4610)
+   1382499 - reduce screen co-ordinate fingerprinting in Touch API (see 4611)
+   1217290 & 1409677 - enable fingerprinting resistance for WebGL (see 2010-12)
+   1382545 - reduce fingerprinting in Animation API
+   1354633 - limit MediaError.message to a whitelist
+   1382533 - enable fingerprinting resistance for Presentation API
       This blocks exposure of local IP Addresses via mDNS (Multicast DNS)
- **  967895 - spoof canvas and enable site permission prompt before allowing canvas data extraction (FF58+)
-      FF59: Added to site permissions panel (1413780) Only prompt when triggered by user input (1376865)
- ** 1372073 - spoof/block fingerprinting in MediaDevices API (FF59+)
+ FF58+
+    967895 - spoof canvas and enable site permission prompt before allowing canvas data extraction
+ FF59+
+   1372073 - spoof/block fingerprinting in MediaDevices API
       Spoof: enumerate devices reports one "Internal Camera" and one "Internal Microphone" if
              media.navigator.enabled is true (see 2505 which we chose to keep disabled)
       Block: suppresses the ondevicechange event (see 4612)
- ** 1039069 - warn when language prefs are set to non en-US (see 0210, 0211) (FF59+)
- ** 1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events (FF59+)
+   1039069 - warn when language prefs are set to non en-US (see 0210, 0211)
+   1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events
       Spoofing mimics the content language of the document. Currently it only supports en-US.
       Modifier events suppressed are SHIFT and both ALT keys. Chrome is not affected.
-      FF60: Fix keydown/keyup events (1438795)
- ** 1337157 - disable WebGL debug renderer info (see 4613) (FF60+)
- ** 1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62+)
- ** 1479239 - return "no-preference" with prefers-reduced-motion (see 4614) (FF63+)
- ** 1363508 - spoof/suppress Pointer Events (see 4615) (FF64+)
+ FF60-67
+   1337157 - disable WebGL debug renderer info (see 4613) (FF60+)
+   1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62+)
+   1479239 - return "no-preference" with prefers-reduced-motion (see 4614) (FF63+)
+   1363508 - spoof/suppress Pointer Events (see 4615) (FF64+)
       FF65: pointerEvent.pointerid (1492766)
- ** 1485266 - disable exposure of system colors to CSS or canvas (see 4616) (FF67+)
- ** 1407366 - enable inner window letterboxing (see 4504) (FF67+)
- ** 1494034 - return "light" with prefers-color-scheme (see 4617) (FF67+)
-      [1] https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme
- ** 1564422 - spoof audioContext outputLatency (FF70+)
- ** 1595823 - spoof audioContext sampleRate (FF72+)
- ** 1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74+)
- ** 1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78+)
- ** 1653987 - limit font visibility to bundled and "Base Fonts" (see 4618) (non-ANDROID) (FF80+)
+   1485266 - disable exposure of system colors to CSS or canvas (see 4616) (FF67+)
+   1407366 - enable inner window letterboxing (see 4504) (FF67+)
+   1494034 - return "light" with prefers-color-scheme (see 4617) (FF67+)
+ FF68-77
+   1564422 - spoof audioContext outputLatency (FF70+)
+   1595823 - spoof audioContext sampleRate (FF72+)
+   1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74+)
+ FF78+
+   1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78+)
+   1653987 - limit font visibility to bundled and "Base Fonts" (see 4618) (non-ANDROID) (FF80+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]
@@ -1470,22 +1444,22 @@ user_pref("privacy.resistFingerprinting", true);
    // user_pref("privacy.window.maxInnerWidth", 1000);
    // user_pref("privacy.window.maxInnerHeight", 1000);
 /* 4503: disable mozAddonManager Web API [FF57+]
- * [NOTE] As a side-effect in FF57-59 this allowed extensions to work on AMO. In FF60+ you also need
- * to sanitize or clear extensions.webextensions.restrictedDomains (see 2662) to keep that side-effect
+ * [NOTE] To allow extensions to work on AMO, you also need 2662
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
 user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDEN PREF]
 /* 4504: enable RFP letterboxing [FF67+]
- * Dynamically resizes the inner window (FF67; 200w x100h: FF68+; stepped ranges) by applying letterboxing,
- * using dimensions which waste the least content area, If you use the dimension pref, then it will only apply
- * those resolutions. The format is "width1xheight1, width2xheight2, ..." (e.g. "800x600, 1000x1000, 1600x900")
- * [SETUP-WEB] This does NOT require RFP (see 4501) **for now**, so if you're not using 4501, or you are but you're
- * not taking anti-fingerprinting seriously and a little visual change upsets you, then feel free to flip this pref
+ * Dynamically resizes the inner window by applying margins in stepped ranges, see [2]
+ * If you use the dimension pref, then it will only apply those resolutions. The format is
+ * "width1xheight1, width2xheight2, ..." (e.g. "800x600, 1000x1000, 1600x900")
+ * [SETUP-WEB] This does NOT require RFP (see 4501) **for now**, so if you're not using 4501, or you are but
+ * dislike margins being applied, then flip this pref, keeping in mind that it is effectively fingerprintable
  * [WARNING] The dimension pref is only meant for testing, and we recommend you DO NOT USE it
- * [1] https://bugzilla.mozilla.org/1407366 ***/
+ * [1] https://bugzilla.mozilla.org/1407366
+ * [2] https://hg.mozilla.org/mozilla-central/rev/6d2d7856e468#l2.32 ***/
 user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
    // user_pref("privacy.resistFingerprinting.letterboxing.dimensions", ""); // [HIDDEN PREF]
 /* 4510: disable showing about:blank as soon as possible during startup [FF60+]
- * When default true (FF62+) this no longer masks the RFP chrome resizing activity
+ * When default true this no longer masks the RFP chrome resizing activity
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
 /* 4520: disable chrome animations [FF77+] [RESTART]
@@ -1493,15 +1467,7 @@ user_pref("browser.startup.blankWindow", false);
 user_pref("ui.prefersReducedMotion", 1); // [HIDDEN PREF]
 
 /*** [SECTION 4600]: RFP ALTERNATIVES
-   * non-RFP users:
-       Enable the whole section (see the SETUP tag below)
-   * RFP users:
-       Make sure these are reset in about:config. They are redundant. In fact, some
-       even cause RFP to not behave as you would expect and alter your fingerprint
-   * ESR RFP users:
-       Reset those *up to and including* your version. Add those *after* your version
-       as active prefs in your overrides. This is assuming that the patch wasn't also
-       backported to Firefox ESR. Backporting RFP patches to ESR is rare.
+     [WARNING] Do NOT use prefs in this section with RFP as they can interfere
 ***/
 user_pref("_user.js.parrot", "4600 syntax error: the parrot's crossed the Jordan");
 /* [SETUP-non-RFP] Non-RFP users replace the * with a slash on this line to enable these
@@ -1600,32 +1566,22 @@ user_pref("layout.css.font-visibility.level", 1);
 // * * * /
 // ***/
 
-/*** [SECTION 4700]: RFP ALTERNATIVES (NAVIGATOR / USER AGENT (UA) SPOOFING)
-     This is FYI ONLY. These prefs are INSUFFICIENT(a) on their own, you need
-     to use RFP (4500) or an extension, in which case they become POINTLESS.
-     (a) Many of the components that make up your UA can be derived by other means.
-         And when those values differ, you provide more bits and raise entropy.
-         Examples of leaks include workers, navigator objects, date locale/formats,
-         iframes, headers, tcp/ip attributes, feature detection, and **many** more.
-     ALL values below intentionally left blank - use RFP, or get a vetted, tested
-         extension and mimic RFP values to *lower* entropy, or randomize to *raise* it
+/*** [SECTION 4700]: RFP ALTERNATIVES (USER AGENT SPOOFING)
+     These prefs are insufficient and leak. Use RFP and **nothing else**
+     - Many of the user agent components can be derived by other means. When those
+       values differ, you provide more bits and raise entropy. Examples include
+       workers, iframes, headers, tcp/ip attributes, feature detection, and many more
+     - Web extensions also lack APIs to fully protect spoofing
 ***/
 user_pref("_user.js.parrot", "4700 syntax error: the parrot's taken 'is last bow");
-/* 4701: navigator.userAgent ***/
-   // user_pref("general.useragent.override", ""); // [HIDDEN PREF]
-/* 4702: navigator.buildID
- * Revealed build time down to the second. In FF64+ it now returns a fixed timestamp
- * [1] https://bugzilla.mozilla.org/583181
- * [2] https://www.fxsitecompat.com/en-CA/docs/2018/navigator-buildid-now-returns-a-fixed-timestamp/ ***/
-   // user_pref("general.buildID.override", ""); // [HIDDEN PREF]
-/* 4703: navigator.appName ***/
+/* 4701: navigator DOM object overrides
+ * [WARNING] DO NOT USE ***/
    // user_pref("general.appname.override", ""); // [HIDDEN PREF]
-/* 4704: navigator.appVersion ***/
    // user_pref("general.appversion.override", ""); // [HIDDEN PREF]
-/* 4705: navigator.platform ***/
-   // user_pref("general.platform.override", ""); // [HIDDEN PREF]
-/* 4706: navigator.oscpu ***/
+   // user_pref("general.buildID.override", ""); // [HIDDEN PREF]
    // user_pref("general.oscpu.override", ""); // [HIDDEN PREF]
+   // user_pref("general.platform.override", ""); // [HIDDEN PREF]
+   // user_pref("general.useragent.override", ""); // [HIDDEN PREF]
 
 /*** [SECTION 5000]: PERSONAL
      Non-project related but useful. If any of these interest you, add them to your overrides ***/

From 9f9988527250b2797b1864dce18f5dae7a0dc547 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 20 Oct 2020 12:57:00 +0000
Subject: [PATCH 0668/1147] clean up acknowledgments

---
 README.md | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/README.md b/README.md
index 32849d5..ec755c6 100644
--- a/README.md
+++ b/README.md
@@ -22,7 +22,6 @@ Also be aware that the `arkenfox user.js` is made specifically for desktop Firef
  - [diffs](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+label%3Adiffs)
 
 ### 🟥  acknowledgments
-Literally thousands of sources, references and suggestions. Special mention to:
+Literally thousands of sources, references and suggestions. Many thanks, and much appreciated.
 
- * This [12bytes article](https://12bytes.org/articles/tech/firefox/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs) which uses the `arkenfox user.js` and supplements it with an additional JS hosted at [Codeberg](https://codeberg.org/12bytes.org/Firefox-user.js-supplement)
 

From 26d47684475830af4c9f16daae55cfce020113ca Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 21 Oct 2020 13:44:21 +0000
Subject: [PATCH 0669/1147] add media.autoplay.blocking_policy

---
 scratchpad-scripts/troubleshooter.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/troubleshooter.js b/scratchpad-scripts/troubleshooter.js
index a33d803..9284132 100644
--- a/scratchpad-scripts/troubleshooter.js
+++ b/scratchpad-scripts/troubleshooter.js
@@ -1,5 +1,5 @@
 
-/*** arkenfox user.js troubleshooter.js v1.6.1 ***/
+/*** arkenfox user.js troubleshooter.js v1.6.2 ***/
 
 (function() {
 
@@ -62,6 +62,7 @@
     'dom.webaudio.enabled',
     'media.autoplay.enabled',
     'media.autoplay.default', // FF63+
+    'media.autoplay.blocking_policy', // FF78+
 
     /* Forms */
     'browser.formfill.enable',

From e14732aad3a90a62ee15649c2c8694724ef87802 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 24 Oct 2020 12:29:31 +1300
Subject: [PATCH 0670/1147] 2031: better reference: closes #1022 (#1048)

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 7cdf263..96c3b3c 100644
--- a/user.js
+++ b/user.js
@@ -932,8 +932,9 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
    // user_pref("media.autoplay.default", 5);
 /* 2031: disable autoplay of HTML5 media if you interacted with the site [FF78+]
  * 0=sticky (default), 1=transient, 2=user
+ * Firefox's Autoplay Policy Documentation [PDF] is linked below via SUMO
  * [NOTE] If you have trouble with some video sites, then add an exception (see 2030)
- * [1] https://html.spec.whatwg.org/multipage/interaction.html#sticky-activation ***/
+ * [1] https://support.mozilla.org/questions/1293231 ***/
 user_pref("media.autoplay.blocking_policy", 2);
 
 /*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/

From c45780d79bc047568e486ac181a3a9b39df85b60 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 26 Oct 2020 10:34:54 +0000
Subject: [PATCH 0671/1147] 0701 PHP localhost + IPv6, fixes #1053

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 96c3b3c..1eabb13 100644
--- a/user.js
+++ b/user.js
@@ -378,6 +378,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
  * [NOTE] This is just an application level fallback. Disabling IPv6 is best done at an
  * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
  * then this won't make much difference. If you are masking your IP, then it can only help.
+ * [NOTE] PHP defaults to IPv6 with "localhost". Use "php -S 127.0.0.1:PORT"
  * [TEST] https://ipleak.org/
  * [1] https://github.com/arkenfox/user.js/issues/437#issuecomment-403740626
  * [2] https://www.internetsociety.org/tag/ipv6-security/ (see Myths 2,4,5,6) ***/

From ac52886ea8c54f2bee386456459c1d34c09cf265 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 26 Oct 2020 23:37:49 +1300
Subject: [PATCH 0672/1147] 2422 WASM, add reason for disabling, fixes #1037
 (#1054)

---
 user.js | 10 ++++++++--
 1 file changed, 8 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 1eabb13..0b49739 100644
--- a/user.js
+++ b/user.js
@@ -1047,8 +1047,14 @@ user_pref("javascript.options.asmjs", false);
    // user_pref("javascript.options.ion", false);
    // user_pref("javascript.options.baselinejit", false);
    // user_pref("javascript.options.jit_trustedprincipals", true); // [FF75+] [HIDDEN PREF]
-/* 2422: disable WebAssembly [FF52+] [SETUP-PERF]
- * [1] https://developer.mozilla.org/docs/WebAssembly ***/
+/* 2422: disable WebAssembly [FF52+]
+ * Vulnerabilities have increasingly been found, including those known and fixed
+ * in native programs years ago [2]. WASM has powerful low-level access, making
+ * certain attacks (brute-force) and vulnerabilities more possible
+ * [STATS] ~0.2% of websites, about half of which are for crytopmining / malvertising [2][3]
+ * [1] https://developer.mozilla.org/docs/WebAssembly
+ * [2] https://spectrum.ieee.org/tech-talk/telecom/security/more-worries-over-the-security-of-web-assembly
+ * [3] https://www.zdnet.com/article/half-of-the-websites-using-webassembly-use-it-for-malicious-purposes ***/
 user_pref("javascript.options.wasm", false);
 /* 2429: enable (limited but sufficient) window.opener protection [FF65+]
  * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/

From 07cccd538618f27d9a120db292b19999150bb111 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 3 Nov 2020 06:05:40 +1300
Subject: [PATCH 0673/1147] remove 4003: partition, see #1051 (#1057)

---
 scratchpad-scripts/arkenfox-clear-removed.js |  3 +-
 user.js                                      | 43 ++++++++------------
 2 files changed, 20 insertions(+), 26 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index c5e40fd..4e824dc 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 18-Oct-2020
+ Last updated: 02-Nov-2020
 
  For instructions see:
  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -227,6 +227,7 @@
     'dom.IntersectionObserver.enabled',
     /* 82-beta */
     'extensions.screenshots.upload-disabled',
+    'privacy.partition.network_state',
     'security.ssl3.dhe_rsa_aes_128_sha',
     'security.ssl3.dhe_rsa_aes_256_sha',
     /* reset parrot: check your open about:config after running the script */
diff --git a/user.js b/user.js
index 0b49739..955004d 100644
--- a/user.js
+++ b/user.js
@@ -1331,28 +1331,24 @@ user_pref("privacy.cpd.siteSettings", false); // Site Preferences
 user_pref("privacy.sanitize.timeSpan", 0);
 
 /*** [SECTION 4000]: FPI (FIRST PARTY ISOLATION)
- 4001: FPI
- ** 1278037 - isolate indexedDB (FF51+)
- ** 1277803 - isolate favicons (FF52+)
- ** 1264562 - isolate OCSP cache (FF52+)
- ** 1268726 - isolate Shared Workers (FF52+)
- ** 1316283 - isolate SSL session cache (FF52+)
- ** 1317927 - isolate media cache (FF53+)
- ** 1323644 - isolate HSTS and HPKP (FF54+)
- ** 1334690 - isolate HTTP Alternative Services (FF54+)
- ** 1334693 - isolate SPDY/HTTP2 (FF55+)
- ** 1337893 - isolate DNS cache (FF55+)
- ** 1344170 - isolate blob: URI (FF55+)
- ** 1300671 - isolate data:, about: URLs (FF55+)
- ** 1473247 - isolate IP addresses (FF63+)
- ** 1492607 - isolate postMessage with targetOrigin "*" (requires 4002) (FF65+)
- ** 1542309 - isolate top-level domain URLs when host is in the public suffix list (FF68+)
- ** 1506693 - isolate pdfjs range-based requests (FF68+)
- ** 1330467 - isolate site permissions (FF69+)
- ** 1534339 - isolate IPv6 (FF73+)
- 4003: NETWORK PARTITON
- ** 1647732 - isolate font cache (FF80+)
- ** 1649673 - isolate speculative connections (FF80+)
+   1278037 - indexedDB (FF51+)
+   1277803 - favicons (FF52+)
+   1264562 - OCSP cache (FF52+)
+   1268726 - Shared Workers (FF52+)
+   1316283 - SSL session cache (FF52+)
+   1317927 - media cache (FF53+)
+   1323644 - HSTS and HPKP (FF54+)
+   1334690 - HTTP Alternative Services (FF54+)
+   1334693 - SPDY/HTTP2 (FF55+)
+   1337893 - DNS cache (FF55+)
+   1344170 - blob: URI (FF55+)
+   1300671 - data:, about: URLs (FF55+)
+   1473247 - IP addresses (FF63+)
+   1492607 - postMessage with targetOrigin "*" (requires 4002) (FF65+)
+   1542309 - top-level domain URLs when host is in the public suffix list (FF68+)
+   1506693 - pdfjs range-based requests (FF68+)
+   1330467 - site permissions (FF69+)
+   1534339 - IPv6 (FF73+)
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]
@@ -1370,9 +1366,6 @@ user_pref("privacy.firstparty.isolate", true);
  * [3] https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage ***/
    // user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAULT: true]
    // user_pref("privacy.firstparty.isolate.block_post_message", true);
-/* 4003: enable site partitioning (FF78+)
- * [1] https://bugzilla.mozilla.org/1590107 [META] */
-user_pref("privacy.partition.network_state", true);
 
 /*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
    RFP covers a wide range of ongoing fingerprinting solutions.

From 910d7004c691837cfb2bcfb3ebb71933dd96a0b0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 11 Nov 2020 16:12:57 +0000
Subject: [PATCH 0674/1147] release info, fixes #1042

now we have somewhere to add things like HTTPS-Only Mode, appCache, secure downloads when we make changes that impact ESR
---
 user.js | 14 +++++++++-----
 1 file changed, 9 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 955004d..41aa7f8 100644
--- a/user.js
+++ b/user.js
@@ -26,13 +26,17 @@
            [SETUP-PERF] may impact performance
               [WARNING] used sparingly, heed them
 
-* RELEASES
+* RELEASES: https://github.com/arkenfox/user.js/releases
 
-  * Archive: https://github.com/arkenfox/user.js/releases
-  * Use the correct release that matches your Firefox version
-  * Each release
-    - run the prefsCleaner or reset deprecated prefs (9999s) and prefs made redundant by RFP (4600s)
+  * It is best to use the arkenfox release that is optimized for and matches your Firefox version
+  * EVERYONE: each release
+    - run prefsCleaner or reset deprecated prefs (9999s) and prefs made redundant by RPF (4600s)
     - re-enable section 4600 if you don't use RFP
+    ESR78
+    - If you are not using arkenfox v78... (not a definitive list)
+      - 1401: document fonts is inactive as it is now covered by RFP in FF80+
+      - 4600: some prefs may apply even if you use RFP (currently none apply as of FF84)
+      - 9999: switch the appropriate deprecated section(s) back on
 
 * INDEX:
 

From accef19af474c4aba5534325f465d45c5fb85ea1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 11 Nov 2020 16:27:43 +0000
Subject: [PATCH 0675/1147] add LSNG, fixes #1059

---
 user.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/user.js b/user.js
index 41aa7f8..caad195 100644
--- a/user.js
+++ b/user.js
@@ -1280,6 +1280,8 @@ user_pref("browser.cache.offline.enable", false);
 /* 2755: disable Storage Access API [FF65+]
  * [1] https://developer.mozilla.org/en-US/docs/Web/API/Storage_Access_API ***/
    // user_pref("dom.storage_access.enabled", false);
+/* 2760: enable Local Storage Next Generation (LSNG) [FF65+] ***/
+user_pref("dom.storage.next_gen", true);
 
 /*** [SECTION 2800]: SHUTDOWN
      You should set the values to what suits you best.

From f2fe7f02b01068be6413fa1cb7e8e65295db7527 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 11 Nov 2020 16:59:27 +0000
Subject: [PATCH 0676/1147] add 2624: window.name protection, fixes #1012

---
 user.js | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/user.js b/user.js
index caad195..c21b2d6 100644
--- a/user.js
+++ b/user.js
@@ -1183,6 +1183,10 @@ user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
  * for these will show/use their correct 3rd party origin
  * [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion */
 user_pref("permissions.delegation.enabled", false);
+/* 2624: enable "window.name" protection [FF82+]
+ * If a new page from another domain is loaded into a tab, then window.name is set to an empty string. The original
+ * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks ***/
+user_pref("privacy.window.name.update.enabled", true);
 
 /** DOWNLOADS ***/
 /* 2650: discourage downloading to desktop

From f7bee988de76778bd0ae0911e1b96b9852634974 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 11 Nov 2020 18:08:06 +0000
Subject: [PATCH 0677/1147] 0517: add creditCards.available / defense-in-depth

see https://github.com/arkenfox/user.js/issues/1038#issuecomment-713643850
---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index c21b2d6..a960ad5 100644
--- a/user.js
+++ b/user.js
@@ -347,6 +347,7 @@ user_pref("browser.ping-centre.telemetry", false);
  * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill ***/
 user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
 user_pref("extensions.formautofill.available", "off"); // [FF56+]
+user_pref("extensions.formautofill.creditCards.available", false); // [FF57+]
 user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
 user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
 /* 0518: disable Web Compatibility Reporter [FF56+]

From 8dc43cfdc21edc6e7b208bf0779869c3cacf22ac Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 11 Nov 2020 18:20:13 +0000
Subject: [PATCH 0678/1147] RFP 82+ changes

Note
 - this is not the same as 2517 which disables the API
 - RFP does not determine what is supported or not supported: so that entropy remains
 - with or without RFP, if the media config is not supported it returns false,false (so there is nothing to spoof here)
---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index a960ad5..0004cef 100644
--- a/user.js
+++ b/user.js
@@ -1440,6 +1440,7 @@ user_pref("privacy.firstparty.isolate", true);
  FF78+
    1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78+)
    1653987 - limit font visibility to bundled and "Base Fonts" (see 4618) (non-ANDROID) (FF80+)
+   1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]

From ea0eb85404bc742a72c6ab3db877ecbc7fe95c3c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 11 Nov 2020 18:23:00 +0000
Subject: [PATCH 0679/1147] 82-beta

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 0004cef..bf75735 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 13 Oct 2020
-* version 82-alpha
+* date: 11 Nov 2020
+* version 82-beta
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From d6186819f4e914dae416cebcd20896b34f5295c7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 11 Nov 2020 18:42:29 +0000
Subject: [PATCH 0680/1147] domIntersectionObserver

it was removed after 81-beta was released
---
 scratchpad-scripts/arkenfox-clear-removed.js | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 4e824dc..46886f4 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -223,9 +223,8 @@
     'browser.search.region',
     /* 79-beta */
     'browser.urlbar.usepreloadedtopurls.enabled',
-    /* 80 */
-    'dom.IntersectionObserver.enabled',
     /* 82-beta */
+    'dom.IntersectionObserver.enabled',
     'extensions.screenshots.upload-disabled',
     'privacy.partition.network_state',
     'security.ssl3.dhe_rsa_aes_128_sha',

From 5b0d173078a4ec96904e8895b6f1d5ba0463b47e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 13 Nov 2020 00:55:45 +0000
Subject: [PATCH 0681/1147] 82 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index bf75735..d0d86fd 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 11 Nov 2020
-* version 82-beta
+* date: 12 Nov 2020
+* version 82
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From ccbca41e2d73fa63908fd87c2a7d35615016e7f7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 13 Nov 2020 01:03:29 +0000
Subject: [PATCH 0682/1147] start 83 alpha, fixup 1244 setting info

`browser.preferences.exposeHTTPSOnly` is now default true
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index d0d86fd..3d6dc70 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
 * date: 12 Nov 2020
-* version 82
+* version 83-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -730,7 +730,7 @@ user_pref("security.mixed_content.block_object_subrequest", true);
  * When "https_only_mode" (all windows) is true, "https_only_mode_pbm" (private windows only) is ignored
  * [WARNING] This is experimental [1] and you can't set exceptions if FPI is enabled [2] (fixed in FF83)
  * [SETTING] to add site exceptions: Page Info>Permissions>Use insecure HTTP (FF80+)
- * [SETTING] Privacy & Security>HTTPS-Only Mode (FF80+ with browser.preferences.exposeHTTPSOnly = true)
+ * [SETTING] Privacy & Security>HTTPS-Only Mode
  * [1] https://bugzilla.mozilla.org/1613063 [META]
  * [2] https://bugzilla.mozilla.org/1647829 ***/
    // user_pref("dom.security.https_only_mode", true); // [FF76+]

From c6ddda1aa3e3000336e3e421d6af21f62208c7cf Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 17 Nov 2020 19:17:59 +0000
Subject: [PATCH 0683/1147] Update troubleshooter.js

- add `privacy.window.name.update.enabled`
- remove `media.autoplay.enabled` (removed in FF63)
- remove `dom.indexedDB.enabled` (removed in FF72)
---
 scratchpad-scripts/troubleshooter.js | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/scratchpad-scripts/troubleshooter.js b/scratchpad-scripts/troubleshooter.js
index 9284132..cce4069 100644
--- a/scratchpad-scripts/troubleshooter.js
+++ b/scratchpad-scripts/troubleshooter.js
@@ -17,7 +17,6 @@
 
     /* Storage + Cache */
     'browser.cache.offline.enable',
-    'dom.indexedDB.enabled',
     'dom.storage.enabled',
     'browser.storageManager.enabled',
     'dom.storageManager.enabled',
@@ -60,7 +59,6 @@
 
     /* Audio + Video */
     'dom.webaudio.enabled',
-    'media.autoplay.enabled',
     'media.autoplay.default', // FF63+
     'media.autoplay.blocking_policy', // FF78+
 
@@ -103,6 +101,7 @@
     'network.protocol-handler.external.ms-windows-store',
     'privacy.trackingprotection.enabled',
     'security.data_uri.block_toplevel_data_uri_navigations',
+    'privacy.window.name.update.enabled', // FF82+
 
     'last.one.without.comma'
   ]

From ef93a754cee4425efe373d6abe77dbb276380b1b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 21 Nov 2020 01:49:19 +0000
Subject: [PATCH 0684/1147] warnings always come after notes

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 3d6dc70..8a9e0f3 100644
--- a/user.js
+++ b/user.js
@@ -800,8 +800,8 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
  * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed
- * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4618)
  * [NOTE] In FF81+ the whitelist **overrides** RFP's font visibility (see 4618)
+ * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4618)
  * [1] https://bugzilla.mozilla.org/1121643 ***/
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
 

From 94712f59a3aa2064255ca8e90ca0f6f4ae0a47d3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 22 Nov 2020 17:05:34 +0000
Subject: [PATCH 0685/1147] 83 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 8a9e0f3..02273d7 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 12 Nov 2020
-* version 83-alpha
+* date: 22 Nov 2020
+* version 83
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From 0189438e46980406ca5ab15b2158606329e8a352 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 22 Nov 2020 17:11:31 +0000
Subject: [PATCH 0686/1147] start 84-alpha

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 02273d7..cfbb273 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
 * date: 22 Nov 2020
-* version 83
+* version 84-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From 699eacf1fdfc5f1f0a6394ecda306c3300d4c16c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 23 Nov 2020 06:21:31 +1300
Subject: [PATCH 0687/1147] add FPI scheme, closes #1066 (#1067)

---
 user.js | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/user.js b/user.js
index cfbb273..a7728ba 100644
--- a/user.js
+++ b/user.js
@@ -1377,6 +1377,10 @@ user_pref("privacy.firstparty.isolate", true);
  * [3] https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage ***/
    // user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAULT: true]
    // user_pref("privacy.firstparty.isolate.block_post_message", true);
+/* 4003: enable scheme with FPI [FF78+]
+ * [NOTE] Experimental: existing data and site permissions are incompatible
+ * and some site exceptions may not work e.g. HTTPS-only mode (see 1244) ***/
+   // user_pref("privacy.firstparty.isolate.use_site", true);
 
 /*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
    RFP covers a wide range of ongoing fingerprinting solutions.

From a7e4268d8b956f05b5fa01415cadd7ed43bd9f8c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 22 Nov 2020 17:25:33 +0000
Subject: [PATCH 0688/1147] 2730 appCache, closes #1055

---
 user.js | 6 ++++--
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index a7728ba..a445871 100644
--- a/user.js
+++ b/user.js
@@ -1268,8 +1268,10 @@ user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
  * [WARNING] This will break a LOT of sites' functionality AND extensions!
  * You are better off using an extension for more granular control ***/
    // user_pref("dom.storage.enabled", false);
-/* 2730: disable offline cache ***/
-user_pref("browser.cache.offline.enable", false);
+/* 2730: enforce no offline cache storage (appCache)
+ * The API is easily fingerprinted, use the "storage" pref instead ***/
+   // user_pref("browser.cache.offline.enable", false);
+user_pref("browser.cache.offline.storage.enable", false); // [FF71+] [DEFAULT: false FF84+]
 /* 2740: disable service worker cache and cache storage
  * [NOTE] We clear service worker cache on exiting Firefox (see 2803)
  * [1] https://w3c.github.io/ServiceWorker/#privacy ***/

From 91cbc1e09a15c2fb5ad151529712f4326a6b7308 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 22 Nov 2020 17:59:44 +0000
Subject: [PATCH 0689/1147] HTTPS-Only mode, closes #1047

---
 user.js | 17 +++++++++++++----
 1 file changed, 13 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index a445871..34d13dc 100644
--- a/user.js
+++ b/user.js
@@ -34,6 +34,7 @@
     - re-enable section 4600 if you don't use RFP
     ESR78
     - If you are not using arkenfox v78... (not a definitive list)
+      - 1244: HTTPS-Only mode is enabled
       - 1401: document fonts is inactive as it is now covered by RFP in FF80+
       - 4600: some prefs may apply even if you use RFP (currently none apply as of FF84)
       - 9999: switch the appropriate deprecated section(s) back on
@@ -728,14 +729,22 @@ user_pref("security.mixed_content.block_display_content", true);
 user_pref("security.mixed_content.block_object_subrequest", true);
 /* 1244: enable HTTPS-Only mode [FF76+]
  * When "https_only_mode" (all windows) is true, "https_only_mode_pbm" (private windows only) is ignored
- * [WARNING] This is experimental [1] and you can't set exceptions if FPI is enabled [2] (fixed in FF83)
- * [SETTING] to add site exceptions: Page Info>Permissions>Use insecure HTTP (FF80+)
+ * [SETTING] to add site exceptions: Page Info>HTTPS-Only mode>On/Off/Off temporarily
  * [SETTING] Privacy & Security>HTTPS-Only Mode
+ * [TEST] http://example.com [upgrade]
+ * [TEST] http://neverssl.org/ [no upgrade]
  * [1] https://bugzilla.mozilla.org/1613063 [META]
  * [2] https://bugzilla.mozilla.org/1647829 ***/
-   // user_pref("dom.security.https_only_mode", true); // [FF76+]
+user_pref("dom.security.https_only_mode", true); // [FF76+]
    // user_pref("dom.security.https_only_mode_pbm", true); // [FF80+]
-   // user_pref("dom.security.https_only_mode.upgrade_local", true); // [FF77+]
+/* 1245: enable HTTPS-Only mode for local resources [FF77+] ***/
+   // user_pref("dom.security.https_only_mode.upgrade_local", true);
+/* 1246: disable HTTP background requests [FF82+]
+ * When attempting to upgrade, if the server doesn't respond within 3 seconds, firefox
+ * sends HTTP requests requests in order to check if the server supports HTTPS or not.
+ * This is done to avoid waiting for a timeout which takes 90 seconds
+ * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1642387,1660945 ***/
+user_pref("dom.security.https_only_mode_send_http_background_request", false);
 
 /** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro]
  * These are all the ciphers still using SHA-1 and CBC which are weaker than the available alternatives. (see "Cipher Suites" in [1])

From cf53982086633cfae7f4d79f07dd0ebd6b785b16 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 22 Nov 2020 18:15:25 +0000
Subject: [PATCH 0690/1147] 1244: CRLite, closes #1065

---
 user.js | 9 +++++++++
 1 file changed, 9 insertions(+)

diff --git a/user.js b/user.js
index 34d13dc..eee9baf 100644
--- a/user.js
+++ b/user.js
@@ -717,6 +717,15 @@ user_pref("security.family_safety.mode", 0);
  * by inspecting ALL your web traffic, then leave at current default=1
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16206 ***/
 user_pref("security.cert_pinning.enforcement_level", 2);
+/* 1224: enforce CRLite [FF73+]
+ * In FF84+ it covers valid certs and in mode 2 doesn't fall back to OCSP, see [2]
+ * [1] https://bugzilla.mozilla.org/1429800 [META]
+ * [2] https://bugzilla.mozilla.org/1670985
+ * [3] https://blog.mozilla.org/security/2020/01/09/crlite-part-1-all-web-pki-revocations-compressed/
+ * [4] https://blog.mozilla.org/security/2020/01/09/crlite-part-2-end-to-end-design/
+ * [5] https://blog.mozilla.org/security/2020/01/21/crlite-part-3-speeding-up-secure-browsing/ ***/
+user_pref("security.remote_settings.crlite_filters.enabled", true);
+user_pref("security.pki.crlite_mode", 2);
 
 /** MIXED CONTENT ***/
 /* 1240: enforce no insecure active content on https pages

From fa85c9da5b357726e6f35a138d6b96b977655012 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 23 Nov 2020 10:46:30 +0000
Subject: [PATCH 0691/1147] fixup double word

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index eee9baf..c3b7b38 100644
--- a/user.js
+++ b/user.js
@@ -750,7 +750,7 @@ user_pref("dom.security.https_only_mode", true); // [FF76+]
    // user_pref("dom.security.https_only_mode.upgrade_local", true);
 /* 1246: disable HTTP background requests [FF82+]
  * When attempting to upgrade, if the server doesn't respond within 3 seconds, firefox
- * sends HTTP requests requests in order to check if the server supports HTTPS or not.
+ * sends HTTP requests in order to check if the server supports HTTPS or not.
  * This is done to avoid waiting for a timeout which takes 90 seconds
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1642387,1660945 ***/
 user_pref("dom.security.https_only_mode_send_http_background_request", false);

From 77abf35761c746d703eee454ccefadaa6a2a41a7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 6 Dec 2020 21:09:07 +0000
Subject: [PATCH 0692/1147] tidy

- shrink and remove outdated info from section 0300 header
- combine some bugzillas
- drop some references
   - 1647829 for HTTPS-Only mode
   - hardware metrics: not going to implicitly encourage users to use this pref or tell them what sizes to use
- update [STATS]
   - also remove TLS [STATS].. stats on TLS 1.0 and 1.1 are irrelevant: the default is now TLS 1.2+
- single CRLite reference for all blog articles
- save 588 bytes so all you bastards can theoretically load Firefox just that tiny bit faster
---
 user.js | 45 ++++++++++++++++++---------------------------
 1 file changed, 18 insertions(+), 27 deletions(-)

diff --git a/user.js b/user.js
index c3b7b38..b6f5990 100644
--- a/user.js
+++ b/user.js
@@ -172,19 +172,17 @@ user_pref("browser.region.update.enabled", false); // [[FF79+]
  * [TEST] https://addons.mozilla.org/about ***/
 user_pref("intl.accept_languages", "en-US, en");
 /* 0211: enforce US English locale regardless of the system locale
- * [SETUP-WEB] May break some input methods e.g xim/ibus for CJK languages, see [2]
- * [1] https://bugzilla.mozilla.org/867501
- * [2] https://bugzilla.mozilla.org/1629630 ***/
+ * [SETUP-WEB] May break some input methods e.g xim/ibus for CJK languages, see [1]
+ * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=867501,1629630 ***/
 user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 
 /*** [SECTION 0300]: QUIET FOX
-     Starting in user.js v67, we only disable the auto-INSTALL of Firefox. You still get prompts
-     to update, in one click. We have NEVER disabled auto-CHECKING, and highly discourage that.
-     Previously we also disabled auto-INSTALLING of extensions (302b).
+     We only disable the auto-INSTALL of Firefox (app) updates. You still get prompts to update,
+     and it only takes one click. We highly discourage disabling auto-CHECKING for updates.
 
-     There are many legitimate reasons to turn off auto-INSTALLS, including hijacked or monetized
-     extensions, time constraints, legacy issues, dev/testing, and fear of breakage/bugs. It is
-     still important to do updates for security reasons, please do so manually if you make changes.
+     Legitimate reasons to disable auto-INSTALLS include hijacked/monetized extensions, time
+     constraints, legacy issues, dev/testing, and fear of breakage/bugs. It is still important
+     to do updates for security reasons, please do so manually if you make changes.
 ***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
 /* 0301b: disable auto-CHECKING for extension and theme updates ***/
@@ -221,7 +219,7 @@ user_pref("extensions.htmlaboutaddons.recommendations.enabled", false);
  * [1] https://firefox-source-docs.mozilla.org/toolkit/components/telemetry/telemetry/internals/preferences.html
  * [2] https://medium.com/georg-fritzsche/data-preference-changes-in-firefox-58-2d5df9c428b5 ***/
 user_pref("toolkit.telemetry.unified", false);
-user_pref("toolkit.telemetry.enabled", false); // see [NOTE] above FF58+
+user_pref("toolkit.telemetry.enabled", false); // see [NOTE]
 user_pref("toolkit.telemetry.server", "data:,");
 user_pref("toolkit.telemetry.archive.enabled", false);
 user_pref("toolkit.telemetry.newProfilePing.enabled", false); // [FF55+]
@@ -304,7 +302,7 @@ user_pref("browser.safebrowsing.downloads.remote.url", "");
  * [SETTING] Privacy & Security>Security>... "Warn you about unwanted and uncommon software" ***/
    // user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
    // user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
-/* 0419: disable 'ignore this warning' on SB warnings
+/* 0419: disable 'ignore this warning' on SB warnings [FF45+]
  * If clicked, it bypasses the block for that session. This is a means for admins to enforce SB
  * [TEST] see github wiki APPENDIX A: Test Sites: Section 5
  * [1] https://bugzilla.mozilla.org/1226490 ***/
@@ -380,7 +378,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
 /* 0701: disable IPv6
  * IPv6 can be abused, especially with MAC addresses, and they do not play nice with VPNs. That's
  * even assuming your ISP and/or router and/or website can handle it. Sites will fall back to IPv4
- * [STATS] Firefox telemetry (June 2020) shows only 5% of all connections are IPv6
+ * [STATS] Firefox telemetry (Dec 2020) shows ~8% of all connections are IPv6
  * [NOTE] This is just an application level fallback. Disabling IPv6 is best done at an
  * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
  * then this won't make much difference. If you are masking your IP, then it can only help.
@@ -642,7 +640,6 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
 user_pref("security.ssl.require_safe_negotiation", true);
 /* 1202: control TLS versions with min and max
  * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
- * [STATS] Firefox telemetry (June 2020) shows only 0.16% of SSL handshakes use 1.0 or 1.1
  * [WARNING] Leave these at default, otherwise you alter your TLS fingerprint.
  * [1] https://www.ssllabs.com/ssl-pulse/ ***/
    // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
@@ -718,12 +715,9 @@ user_pref("security.family_safety.mode", 0);
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16206 ***/
 user_pref("security.cert_pinning.enforcement_level", 2);
 /* 1224: enforce CRLite [FF73+]
- * In FF84+ it covers valid certs and in mode 2 doesn't fall back to OCSP, see [2]
- * [1] https://bugzilla.mozilla.org/1429800 [META]
- * [2] https://bugzilla.mozilla.org/1670985
- * [3] https://blog.mozilla.org/security/2020/01/09/crlite-part-1-all-web-pki-revocations-compressed/
- * [4] https://blog.mozilla.org/security/2020/01/09/crlite-part-2-end-to-end-design/
- * [5] https://blog.mozilla.org/security/2020/01/21/crlite-part-3-speeding-up-secure-browsing/ ***/
+ * In FF84+ it covers valid certs and in mode 2 doesn't fall back to OCSP
+ * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1429800,1670985
+ * [2] https://blog.mozilla.org/security/tag/crlite/ ***/
 user_pref("security.remote_settings.crlite_filters.enabled", true);
 user_pref("security.pki.crlite_mode", 2);
 
@@ -742,8 +736,7 @@ user_pref("security.mixed_content.block_object_subrequest", true);
  * [SETTING] Privacy & Security>HTTPS-Only Mode
  * [TEST] http://example.com [upgrade]
  * [TEST] http://neverssl.org/ [no upgrade]
- * [1] https://bugzilla.mozilla.org/1613063 [META]
- * [2] https://bugzilla.mozilla.org/1647829 ***/
+ * [1] https://bugzilla.mozilla.org/1613063 [META] ***/
 user_pref("dom.security.https_only_mode", true); // [FF76+]
    // user_pref("dom.security.https_only_mode_pbm", true); // [FF80+]
 /* 1245: enable HTTPS-Only mode for local resources [FF77+] ***/
@@ -778,7 +771,7 @@ user_pref("dom.security.https_only_mode_send_http_background_request", false);
 /** UI (User Interface) ***/
 /* 1270: display warning on the padlock for "broken security" (if 1201 is false)
  * Bug: warning padlock not indicated for subresources on a secure page! [2]
- * [STATS] SSL Labs (June 2020) reports 98.8% of sites have secure renegotiation [3]
+ * [STATS] SSL Labs (Dec 2020) reports 99.0% of sites have secure renegotiation [3]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
  * [2] https://bugzilla.mozilla.org/1353705
  * [3] https://www.ssllabs.com/ssl-pulse/ ***/
@@ -1384,13 +1377,12 @@ user_pref("privacy.sanitize.timeSpan", 0);
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]
  * [SETUP-WEB] May break cross-domain logins and site functionality until perfected
- * [1] https://bugzilla.mozilla.org/1260931
- * [2] https://bugzilla.mozilla.org/1299996 [META] ***/
+ * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1260931,1299996 ***/
 user_pref("privacy.firstparty.isolate", true);
 /* 4002: enforce FPI restriction for window.opener [FF54+]
  * [NOTE] Setting this to false may reduce the breakage in 4001
  * FF65+ blocks postMessage with targetOrigin "*" if originAttributes don't match. But
- * to reduce breakage it ignores the 1st-party domain (FPD) originAttribute, see [2],[3]
+ * to reduce breakage it ignores the 1st-party domain (FPD) originAttribute, see [2] [3]
  * The 2nd pref removes that limitation and will only allow communication if FPDs also match.
  * [1] https://bugzilla.mozilla.org/1319773#c22
  * [2] https://bugzilla.mozilla.org/1492607
@@ -1476,8 +1468,7 @@ user_pref("privacy.resistFingerprinting", true);
 /* 4502: set new window sizes to round to hundreds [FF55+] [SETUP-CHROME]
  * Width will round down to multiples of 200s and height to 100s, to fit your screen.
  * The override values are a starting point to round from if you want some control
- * [1] https://bugzilla.mozilla.org/1330882
- * [2] https://hardware.metrics.mozilla.com/ ***/
+ * [1] https://bugzilla.mozilla.org/1330882 ***/
    // user_pref("privacy.window.maxInnerWidth", 1000);
    // user_pref("privacy.window.maxInnerHeight", 1000);
 /* 4503: disable mozAddonManager Web API [FF57+]

From 5c37d50f4e0c22df321d57f92c6211c9690f0335 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 7 Dec 2020 19:34:14 +0000
Subject: [PATCH 0693/1147] tidy

- remove useless `see` word for reference links
- fixup 0701
   - "do not play nice" is not measurable
   - don't reference to self as a source: people can just search "VPN leak Ipv6" or something
---
 user.js | 29 ++++++++++++++---------------
 1 file changed, 14 insertions(+), 15 deletions(-)

diff --git a/user.js b/user.js
index b6f5990..adf4864 100644
--- a/user.js
+++ b/user.js
@@ -172,7 +172,7 @@ user_pref("browser.region.update.enabled", false); // [[FF79+]
  * [TEST] https://addons.mozilla.org/about ***/
 user_pref("intl.accept_languages", "en-US, en");
 /* 0211: enforce US English locale regardless of the system locale
- * [SETUP-WEB] May break some input methods e.g xim/ibus for CJK languages, see [1]
+ * [SETUP-WEB] May break some input methods e.g xim/ibus for CJK languages [1]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=867501,1629630 ***/
 user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 
@@ -215,7 +215,7 @@ user_pref("extensions.htmlaboutaddons.recommendations.enabled", false);
  * IF unified=true then .enabled ONLY controls whether to record extended data
  * so make sure to have both set as false
  * [NOTE] FF58+ 'toolkit.telemetry.enabled' is now LOCKED to reflect prerelease
- * or release builds (true and false respectively), see [2]
+ * or release builds (true and false respectively) [2]
  * [1] https://firefox-source-docs.mozilla.org/toolkit/components/telemetry/telemetry/internals/preferences.html
  * [2] https://medium.com/georg-fritzsche/data-preference-changes-in-firefox-58-2d5df9c428b5 ***/
 user_pref("toolkit.telemetry.unified", false);
@@ -376,16 +376,15 @@ user_pref("browser.send_pings.require_same_host", true); // defense-in-depth
 /*** [SECTION 0700]: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
 /* 0701: disable IPv6
- * IPv6 can be abused, especially with MAC addresses, and they do not play nice with VPNs. That's
- * even assuming your ISP and/or router and/or website can handle it. Sites will fall back to IPv4
+ * IPv6 can be abused, especially with MAC addresses, and can leak with VPNs. That's even
+ * assuming your ISP and/or router and/or website can handle it. Sites will fall back to IPv4
  * [STATS] Firefox telemetry (Dec 2020) shows ~8% of all connections are IPv6
  * [NOTE] This is just an application level fallback. Disabling IPv6 is best done at an
  * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
  * then this won't make much difference. If you are masking your IP, then it can only help.
  * [NOTE] PHP defaults to IPv6 with "localhost". Use "php -S 127.0.0.1:PORT"
  * [TEST] https://ipleak.org/
- * [1] https://github.com/arkenfox/user.js/issues/437#issuecomment-403740626
- * [2] https://www.internetsociety.org/tag/ipv6-security/ (see Myths 2,4,5,6) ***/
+ * [1] https://www.internetsociety.org/tag/ipv6-security/ (see Myths 2,4,5,6) ***/
 user_pref("network.dns.disableIPv6", true);
 /* 0702: disable HTTP2
  * HTTP2 raises concerns with "multiplexing" and "server push", does nothing to
@@ -496,7 +495,7 @@ user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
  * [1] https://support.mozilla.org/en-US/kb/address-bar-autocomplete-firefox#w_url-autocomplete ***/
    // user_pref("browser.urlbar.autoFill", false);
 /* 0860: disable search and form history
- * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties, see [1] [2]
+ * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
  * [NOTE] We also clear formdata on exit (see 2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
@@ -593,7 +592,7 @@ user_pref("browser.sessionstore.privacy_level", 2);
 /* 1022: disable resuming session from crash ***/
    // user_pref("browser.sessionstore.resume_from_crash", false);
 /* 1023: set the minimum interval between session save operations
- * Increasing this can help on older machines and some websites, as well as reducing writes, see [1]
+ * Increasing this can help on older machines and some websites, as well as reducing writes [1]
  * Default is 15000 (15 secs). Try 30000 (30 secs), 60000 (1 min) etc
  * [SETUP-CHROME] This can also affect entries in the "Recently Closed Tabs" feature:
  * i.e. the longer the interval the more chance a quick tab open/close won't be captured.
@@ -805,7 +804,7 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
  * [1] https://wiki.mozilla.org/SVGOpenTypeFonts - iSECPartnersReport recommends to disable this ***/
 user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 /* 1408: disable graphite
- * Graphite has had many critical security issues in the past, see [1]
+ * Graphite has had many critical security issues in the past [1]
  * [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778
  * [2] https://en.wikipedia.org/wiki/Graphite_(SIL) ***/
 user_pref("gfx.font_rendering.graphite.enabled", false);
@@ -914,7 +913,7 @@ user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
  * [1] https://www.privacytools.io/#webrtc ***/
 user_pref("media.peerconnection.enabled", false);
 /* 2002: limit WebRTC IP leaks if using WebRTC
- * In FF70+ these settings match Mode 4 (Mode 3 in older versions), see [3]
+ * In FF70+ these settings match Mode 4 (Mode 3 in older versions) [3]
  * [TEST] https://browserleaks.com/webrtc
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1189041,1297416,1452713
  * [2] https://wiki.mozilla.org/Media/WebRTC/Privacy
@@ -1033,7 +1032,7 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
  * [NOTE] This will break some sites' functionality e.g. Outlook, Twitter, Facebook, Wordpress
  * This applies to onCut/onCopy/onPaste events - i.e. it requires interaction with the website
  * [WARNING] If both 'middlemouse.paste' and 'general.autoScroll' are true (at least one
- * is default false) then enabling this pref can leak clipboard content, see [1]
+ * is default false) then enabling this pref can leak clipboard content [1]
  * [1] https://bugzilla.mozilla.org/1528289 */
    // user_pref("dom.event.clipboardevents.enabled", false);
 /* 2404: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
@@ -1082,7 +1081,7 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * Initially a Linux issue (high precision readout) that was fixed.
  * However, it is still another metric for fingerprinting, used to raise entropy.
  * e.g. do you have a battery or not, current charging status, charge level, times remaining etc
- * [NOTE] From FF52+ Battery Status API is only available in chrome/privileged code, see [1]
+ * [NOTE] From FF52+ Battery Status API is only available in chrome/privileged code [1]
  * [1] https://bugzilla.mozilla.org/1313580 ***/
    // user_pref("dom.battery.enabled", false);
 /* 2505: disable media device enumeration [FF29+]
@@ -1382,7 +1381,7 @@ user_pref("privacy.firstparty.isolate", true);
 /* 4002: enforce FPI restriction for window.opener [FF54+]
  * [NOTE] Setting this to false may reduce the breakage in 4001
  * FF65+ blocks postMessage with targetOrigin "*" if originAttributes don't match. But
- * to reduce breakage it ignores the 1st-party domain (FPD) originAttribute, see [2] [3]
+ * to reduce breakage it ignores the 1st-party domain (FPD) originAttribute [2][3]
  * The 2nd pref removes that limitation and will only allow communication if FPDs also match.
  * [1] https://bugzilla.mozilla.org/1319773#c22
  * [2] https://bugzilla.mozilla.org/1492607
@@ -1476,7 +1475,7 @@ user_pref("privacy.resistFingerprinting", true);
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
 user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDEN PREF]
 /* 4504: enable RFP letterboxing [FF67+]
- * Dynamically resizes the inner window by applying margins in stepped ranges, see [2]
+ * Dynamically resizes the inner window by applying margins in stepped ranges [2]
  * If you use the dimension pref, then it will only apply those resolutions. The format is
  * "width1xheight1, width2xheight2, ..." (e.g. "800x600, 1000x1000, 1600x900")
  * [SETUP-WEB] This does NOT require RFP (see 4501) **for now**, so if you're not using 4501, or you are but
@@ -1586,7 +1585,7 @@ user_pref("ui.use_standins_for_native_colors", true);
 user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
 // FF80+
 // 4618: limit font visbility (non-ANDROID) [FF79+]
-   // Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts, see [1]
+   // Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1]
    // 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
    // [NOTE] Bundled fonts are auto-allowed
    // [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc

From 335ee84540f140f417914b17a8e3c4ced4b0fd9b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 9 Dec 2020 09:26:50 +0000
Subject: [PATCH 0694/1147] remove layout.css.visited_links_enabled, #933

This no longer has any affect since FF77+: see https://bugzilla.mozilla.org/1632765
---
 user.js | 8 --------
 1 file changed, 8 deletions(-)

diff --git a/user.js b/user.js
index adf4864..3396b9b 100644
--- a/user.js
+++ b/user.js
@@ -455,14 +455,6 @@ user_pref("keyword.enabled", false);
 user_pref("browser.fixup.alternate.enabled", false);
 /* 0803: display all parts of the url in the location bar ***/
 user_pref("browser.urlbar.trimURLs", false);
-/* 0805: disable coloring of visited links - CSS history leak
- * [NOTE] This has NEVER been fully "resolved": in Mozilla/docs it is stated it's
- * only in 'certain circumstances', also see latest comments in [2]
- * [TEST] https://earthlng.github.io/testpages/visited_links.html (see github wiki APPENDIX A on how to use)
- * [1] https://dbaron.org/mozilla/visited-privacy
- * [2] https://bugzilla.mozilla.org/147777
- * [3] https://developer.mozilla.org/docs/Web/CSS/Privacy_and_the_:visited_selector ***/
-user_pref("layout.css.visited_links_enabled", false);
 /* 0807: disable live search suggestions
 /* [NOTE] Both must be true for the location bar to work
  * [SETUP-CHROME] Change these if you trust and use a privacy respecting search engine

From aa1c2145bb8c43a302f8840bb6f0da56d997701d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 9 Dec 2020 09:30:21 +0000
Subject: [PATCH 0695/1147] layout.css.visited_links_enabled

---
 scratchpad-scripts/arkenfox-clear-removed.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 46886f4..fe86fc2 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -229,6 +229,8 @@
     'privacy.partition.network_state',
     'security.ssl3.dhe_rsa_aes_128_sha',
     'security.ssl3.dhe_rsa_aes_256_sha',
+    /* 84-beta */
+    'layout.css.visited_links_enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From feaa1c3e99f658f28dc59d6aa92ed1cfeefbe57d Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 16 Dec 2020 14:40:42 +0000
Subject: [PATCH 0696/1147] prefs update

`browser.storageManager.enabled` -- removed in FF61 (1428306)
`security.csp.experimentalEnabled` -- removed in FF68 (1386214)
`gfx.downloadable_fonts.woff2.enabled` -- removed in FF69 (1556991)
`plugin.sessionPermissionNow.intervalInMinutes` -- removed in FF70 (1581664)
`plugin.defaultXpi.state` -- removed in FF72 (1596090)
`geo.wifi.uri` -- renamed to `geo.provider.network.url` in FF74 (1613627)
`browser.tabs.remote.allowLinkedWebInFileUriProcess` -- removed in FF77 (1603007)
---
 scratchpad-scripts/troubleshooter.js | 10 ++--------
 1 file changed, 2 insertions(+), 8 deletions(-)

diff --git a/scratchpad-scripts/troubleshooter.js b/scratchpad-scripts/troubleshooter.js
index cce4069..3fec9ca 100644
--- a/scratchpad-scripts/troubleshooter.js
+++ b/scratchpad-scripts/troubleshooter.js
@@ -1,5 +1,5 @@
 
-/*** arkenfox user.js troubleshooter.js v1.6.2 ***/
+/*** arkenfox user.js troubleshooter.js v1.6.3 ***/
 
 (function() {
 
@@ -18,7 +18,6 @@
     /* Storage + Cache */
     'browser.cache.offline.enable',
     'dom.storage.enabled',
-    'browser.storageManager.enabled',
     'dom.storageManager.enabled',
 
     /* Workers, Web + Push Notifications */
@@ -33,7 +32,6 @@
     /* Fonts */
     'browser.display.use_document_fonts',
     'font.blacklist.underline_offset',
-    'gfx.downloadable_fonts.woff2.enabled',
     'gfx.font_rendering.graphite.enabled',
     'gfx.font_rendering.opentype_svg.enabled',
     'layout.css.font-loading-api.enabled',
@@ -46,12 +44,10 @@
     'dom.IntersectionObserver.enabled',
     'dom.popup_allowed_events',
     'full-screen-api.enabled',
-    'geo.wifi.uri',
     'intl.accept_languages',
     'javascript.options.asmjs',
     'javascript.options.wasm',
     'permissions.default.shortcuts',
-    'security.csp.experimentalEnabled',
 
     /* Hardware */
     'dom.vr.enabled',
@@ -87,13 +83,11 @@
 
     /* Plugins + Flash */
     'plugin.default.state',
-    'plugin.defaultXpi.state',
-    'plugin.sessionPermissionNow.intervalInMinutes',
     'plugin.state.flash',
 
     /* unlikely to cause problems */
-    'browser.tabs.remote.allowLinkedWebInFileUriProcess',
     'dom.popup_maximum',
+    'geo.provider.network.url'
     'layout.css.visited_links_enabled',
     'mathml.disabled',
     'network.auth.subresource-http-auth-allow',

From c980bda695df4232c769535fbe19327bf5ae86d8 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 16 Dec 2020 14:43:46 +0000
Subject: [PATCH 0697/1147] Update troubleshooter.js

oops
---
 scratchpad-scripts/troubleshooter.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/scratchpad-scripts/troubleshooter.js b/scratchpad-scripts/troubleshooter.js
index 3fec9ca..4c54f8f 100644
--- a/scratchpad-scripts/troubleshooter.js
+++ b/scratchpad-scripts/troubleshooter.js
@@ -87,7 +87,7 @@
 
     /* unlikely to cause problems */
     'dom.popup_maximum',
-    'geo.provider.network.url'
+    'geo.provider.network.url',
     'layout.css.visited_links_enabled',
     'mathml.disabled',
     'network.auth.subresource-http-auth-allow',

From 2cfbba14722676f6b6438e2df3a2c53b3ce6c806 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 19 Dec 2020 07:23:13 +0000
Subject: [PATCH 0698/1147] search-to-tab: FF85+

---
 user.js | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/user.js b/user.js
index 3396b9b..f8df1f9 100644
--- a/user.js
+++ b/user.js
@@ -475,6 +475,10 @@ user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
    // user_pref("browser.urlbar.suggest.bookmark", false);
    // user_pref("browser.urlbar.suggest.openpage", false);
    // user_pref("browser.urlbar.suggest.topsites", false); // [FF78+]
+/* 0850b: disable tab-to-search [FF85+]
+ * Alternatively, you can exclude on a per-engine basis by unchecking them in Options>Search
+ * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest>Search engines ***/
+   // user_pref("browser.urlbar.suggest.engines", false);
 /* 0850c: disable location bar dropdown
  * This value controls the total number of entries to appear in the location bar dropdown
  * [NOTE] Items (bookmarks/history/openpages) with a high "frecency"/"bonus" will always

From 46bab27f9455fb1c15a8993ddb17cf0c1e9bf672 Mon Sep 17 00:00:00 2001
From: ray851107 <16625236+ray851107@users.noreply.github.com>
Date: Fri, 25 Dec 2020 14:02:35 +0000
Subject: [PATCH 0699/1147] updater.sh: support custom script names (#1075)

thanks @ray851107
---
 updater.sh | 14 +++++++-------
 1 file changed, 7 insertions(+), 7 deletions(-)

diff --git a/updater.sh b/updater.sh
index a27e98a..99d9d3b 100755
--- a/updater.sh
+++ b/updater.sh
@@ -10,9 +10,9 @@
 
 readonly CURRDIR=$(pwd)
 
-sfp=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
-[ -z "$sfp" ] && sfp=${BASH_SOURCE[0]}
-readonly SCRIPT_DIR=$(dirname "${sfp}")
+SCRIPT_FILE=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
+[ -z "$SCRIPT_FILE" ] && SCRIPT_FILE=${BASH_SOURCE[0]}
+readonly SCRIPT_DIR=$(dirname "${SCRIPT_FILE}")
 
 
 #########################
@@ -198,7 +198,7 @@ update_updater () {
   declare -r tmpfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/updater.sh')"
   [ -z "${tmpfile}" ] && echo -e "${RED}Error! Could not download updater.sh${NC}" && return 1 # check if download failed
 
-  if [[ $(get_updater_version "${SCRIPT_DIR}/updater.sh") < $(get_updater_version "${tmpfile}") ]]; then
+  if [[ $(get_updater_version "$SCRIPT_FILE") < $(get_updater_version "${tmpfile}") ]]; then
     if [ $UPDATE = 'check' ]; then
       echo -e "There is a newer version of updater.sh available. ${RED}Update and execute Y/N?${NC}"
       read -p "" -n 1 -r
@@ -208,9 +208,9 @@ update_updater () {
   else
     return 0 # No update available
   fi
-  mv "${tmpfile}" "${SCRIPT_DIR}/updater.sh"
-  chmod u+x "${SCRIPT_DIR}/updater.sh"
-  "${SCRIPT_DIR}/updater.sh" "$@" -d
+  mv "${tmpfile}" "$SCRIPT_FILE"
+  chmod u+x "$SCRIPT_FILE"
+  "$SCRIPT_FILE" "$@" -d
   exit 0
 }
 

From 63d1258f2e6a60f412aa095d9e64c36bf64832d2 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Fri, 25 Dec 2020 14:03:40 +0000
Subject: [PATCH 0700/1147] updater.sh v2.9

rollout the latest changes
---
 updater.sh | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/updater.sh b/updater.sh
index 99d9d3b..5f37ebc 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## arkenfox user.js updater for macOS and Linux
 
-## version: 2.8
+## version: 2.9
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac
 

From e6cf90146abd67c78bba3206b4d76a6996f77f72 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 25 Dec 2020 15:55:01 +0000
Subject: [PATCH 0701/1147] add override recipes

---
 .github/ISSUE_TEMPLATE/troubleshooting-help.md | 1 +
 1 file changed, 1 insertion(+)

diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
index 4ed3b19..955c367 100644
--- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -15,6 +15,7 @@ Before you proceed...
   - Note: We do not support forks
 
 See also:
+  - Override Recipes [issue 1080](https://github.com/arkenfox/user.js/issues/1080)
   - Extension breakage due to prefs [issue 391](https://github.com/arkenfox/user.js/issues/391)
   - Prefs vs Recommended Extensions: Co-Existance+Enhancement | Conflicts [issue 350](https://github.com/arkenfox/user.js/issues/350)
 

From 0152b38b8bebc9e0ac35998ab9ed19668776f4f5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 25 Dec 2020 16:06:32 +0000
Subject: [PATCH 0702/1147] add override recipes link to readme steps

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index f8df1f9..a667278 100644
--- a/user.js
+++ b/user.js
@@ -25,6 +25,7 @@
          [SETUP-CHROME] changes how Firefox itself behaves (i.e. not directly website related)
            [SETUP-PERF] may impact performance
               [WARNING] used sparingly, heed them
+  6. Override Recipes: https://github.com/arkenfox/user.js/issues/1080
 
 * RELEASES: https://github.com/arkenfox/user.js/releases
 

From 8c9d0bbe7280307ff172b1a9db244344cabd424a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 27 Dec 2020 05:01:33 +0000
Subject: [PATCH 0703/1147] harden cross-domain referers, closes #1077

---
 user.js | 13 +++++--------
 1 file changed, 5 insertions(+), 8 deletions(-)

diff --git a/user.js b/user.js
index a667278..1e60234 100644
--- a/user.js
+++ b/user.js
@@ -815,10 +815,7 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
 /*** [SECTION 1600]: HEADERS / REFERERS
      Only *cross domain* referers need controlling: leave 1601, 1602, 1605 and 1606 alone
      ---
-            harden it a bit: set XOriginPolicy (1603) to 1 (as per the settings below)
-       harden it a bit more: set XOriginPolicy (1603) to 2 (and optionally 1604 to 1 or 2), expect breakage
-     ---
-     If you want any REAL control over referers and breakage, then use an extension
+     Expect some breakage: Use an extension if you need precise control
      ---
                     full URI: https://example.com:8888/foo/bar.html?id=1234
        scheme+host+port+path: https://example.com:8888/foo/bar.html
@@ -829,17 +826,17 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
 user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
 /* 1601: ALL: control when images/links send a referer
  * 0=never, 1=send only when links are clicked, 2=for links and images (default) ***/
-   // user_pref("network.http.sendRefererHeader", 2); // [DEFAULT: 2]
+   // user_pref("network.http.sendRefererHeader", 2);
 /* 1602: ALL: control the amount of information to send
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
-   // user_pref("network.http.referer.trimmingPolicy", 0); // [DEFAULT: 0]
+   // user_pref("network.http.referer.trimmingPolicy", 0);
 /* 1603: CROSS ORIGIN: control when to send a referer
  * 0=always (default), 1=only if base domains match, 2=only if hosts match
  * [SETUP-WEB] Known to cause issues with older modems/routers and some sites e.g vimeo, icloud ***/
-user_pref("network.http.referer.XOriginPolicy", 1);
+user_pref("network.http.referer.XOriginPolicy", 2);
 /* 1604: CROSS ORIGIN: control the amount of information to send [FF52+]
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
-user_pref("network.http.referer.XOriginTrimmingPolicy", 0); // [DEFAULT: 0]
+user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
 /* 1605: ALL: disable spoofing a referer
  * [WARNING] Do not set this to true, as spoofing effectively disables the anti-CSRF
  * (Cross-Site Request Forgery) protections that some sites may rely on ***/

From 9d74cb95266f60e73d4aba4a73e0623e4721082c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 30 Dec 2020 10:17:35 +0000
Subject: [PATCH 0704/1147] remove useless snippet pref

---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 1e60234..853df49 100644
--- a/user.js
+++ b/user.js
@@ -116,7 +116,6 @@ user_pref("browser.newtabpage.activity-stream.telemetry", false);
  * Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
  * [1] https://abouthome-snippets-service.readthedocs.io/ ***/
 user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
-user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "{}");
 /* 0105c: disable Activity Stream Top Stories, Pocket-based and/or sponsored content ***/
 user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);

From 755a45505fb6f00e8f712006f4799cbeb934e720 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 30 Dec 2020 10:25:26 +0000
Subject: [PATCH 0705/1147] snippets providers

`browser.newtabpage.activity-stream.asrouter.providers.snippets`

These (which landed in FF64 with snippets above) are not in the user.js, so why bother with the snippet one
- `browser.newtabpage.activity-stream.asrouter.providers.cfr`
- `browser.newtabpage.activity-stream.asrouter.providers.onboarding`

also these aren't in the user.js
- `browser.newtabpage.activity-stream.asrouter.providers.cfr-fxa`
- `browser.newtabpage.activity-stream.asrouter.providers.message-groups`
- `browser.newtabpage.activity-stream.asrouter.providers.messaging-experiments`
- `browser.newtabpage.activity-stream.asrouter.providers.whats-new-panel`

There are no privacy concerns here. At the end of the day, what Firefox connects to and sends is E2EE and only used locally in non-web content: and you have other prefs and a UI to disable them from being displayed
---
 scratchpad-scripts/arkenfox-clear-removed.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index fe86fc2..1b0be69 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 02-Nov-2020
+ Last updated: 30-Dec-2020
 
  For instructions see:
  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -230,6 +230,7 @@
     'security.ssl3.dhe_rsa_aes_128_sha',
     'security.ssl3.dhe_rsa_aes_256_sha',
     /* 84-beta */
+    'browser.newtabpage.activity-stream.asrouter.providers.snippets',
     'layout.css.visited_links_enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'

From da58f84fa6f2f978c8623e204ecdfb5a3a2bb9ed Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 30 Dec 2020 15:06:49 +0000
Subject: [PATCH 0706/1147] Update troubleshooter.js

---
 scratchpad-scripts/troubleshooter.js | 14 +++++++++-----
 1 file changed, 9 insertions(+), 5 deletions(-)

diff --git a/scratchpad-scripts/troubleshooter.js b/scratchpad-scripts/troubleshooter.js
index 4c54f8f..2fcf2fa 100644
--- a/scratchpad-scripts/troubleshooter.js
+++ b/scratchpad-scripts/troubleshooter.js
@@ -176,9 +176,9 @@
 
     if (aDbg.length == 1) return alert("narrowed it down to:\n\n"+aDbg[0].name+"\n");
     if (aDbg.length == aALL.length) {
-      let msg = "Failed to narrow it down beyond the initial "+aALL.length+" prefs. The problem is most likely caused by at least 2 prefs!\n\n";
-      msg += "Either those prefs are too far apart in the list or there are exactly 2 culprits and they just happen to be at the wrong place.\n\n";
-      msg += "In case it's the latter, the script can add a dummy pref and you can try again - Try again?";
+      const msg = "Failed to narrow it down beyond the initial "+aALL.length+" prefs. The problem is most likely caused by at least 2 prefs!\n\n" +
+            "Either those prefs are too far apart in the list or there are exactly 2 culprits and they just happen to be at the wrong place.\n\n" +
+            "In case it's the latter, the script can add a dummy pref and you can try again - Try again?";
       if (confirm(msg)) return _main([...aALL, oFILLER]);
     } else if (aDbg.length > 10 && confirm("Narrowed it down to "+aDbg.length+" prefs. Try narrowing it down further?")) {
       return _main(aDbg.reverse());
@@ -194,14 +194,18 @@
 
   const aBAK = getMyList(aPREFS);
   //console.log(aBAK.length, "user-set prefs from our list detected and their values stored.");
+  
+  const sMsg = "all detected prefs reset.\n\n" +
+        "!! KEEP THIS PROMPT OPEN AND TEST THE SITE IN ANOTHER TAB !!\n\n" +
+        "IF the problem still exists, this script can't help you - click Cancel to re-apply your values and exit.\n\n" +
+        "Click OK if your problem is fixed.";
 
   focus();
   myreset(aBAK);
-  if (!confirm("all detected prefs reset.\n\n!! KEEP THIS PROMPT OPEN AND TEST THE SITE IN ANOTHER TAB !!\n\nIF the problem still exists, this script can't help you - click cancel to re-apply your values and exit.\n\nClick OK if your problem is fixed.")) {
+  if (!confirm(sMsg)) {
     reapply(aBAK);
     return;
   }
-
   _main(aBAK);
 
 })();

From c570e4fdbd68a1cdbb3fef5d946498b5e585345f Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 30 Dec 2020 15:12:07 +0000
Subject: [PATCH 0707/1147] Update troubleshooter.js

---
 scratchpad-scripts/troubleshooter.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/scratchpad-scripts/troubleshooter.js b/scratchpad-scripts/troubleshooter.js
index 2fcf2fa..be64708 100644
--- a/scratchpad-scripts/troubleshooter.js
+++ b/scratchpad-scripts/troubleshooter.js
@@ -161,8 +161,8 @@
     reapply(aALL);
     myreset(aTmp.slice(0, _h(aTmp)));
     while (aTmp.length) {
-      alert("NOW TEST AGAIN !");
-      if (confirm("if the problem still exists click OK, otherwise click cancel.")) {
+      alert('NOW TEST AGAIN !');
+      if (confirm('if the problem still exists click OK, otherwise click Cancel.')) {
         aTmp = aTmp.slice(_h(aTmp));
       } else {
         aTmp = aTmp.slice(0, _h(aTmp));
@@ -185,7 +185,7 @@
     }
 
     alert("Narrowed it down to "+ aDbg.length.toString() +" prefs, check the console ...");
-    console.log("The problem is caused by 2 or more of these prefs:");
+    console.log('The problem is caused by 2 or more of these prefs:');
     for (const oPref of aDbg) console.log(oPref.name);
   }
 

From 27dd6aa62d1d73e9cdb0b751a7d4d4acdb893b75 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 5 Jan 2021 13:13:52 +0000
Subject: [PATCH 0708/1147] 84 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 853df49..8d3ed2c 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 22 Nov 2020
-* version 84-alpha
+* date: 05 Jan 2021
+* version 84
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From 11977e701730ba6a352d1d0bb7fe6f724688162e Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 17 Jan 2021 15:27:50 +0000
Subject: [PATCH 0709/1147] v2.4 - add strlen check for prefs.js

cmd.exe has a command line length limit of 8192 characters. Abort if prefs.js contains strings that would get dropped while recreating the new prefs.js.
---
 prefsCleaner.bat | 20 ++++++++++++++++++--
 1 file changed, 18 insertions(+), 2 deletions(-)

diff --git a/prefsCleaner.bat b/prefsCleaner.bat
index f82658a..616ec28 100644
--- a/prefsCleaner.bat
+++ b/prefsCleaner.bat
@@ -3,7 +3,7 @@ TITLE prefs.js cleaner
 
 REM ### prefs.js cleaner for Windows
 REM ## author: @claustromaniac
-REM ## version: 2.3
+REM ## version: 2.4
 
 CD /D "%~dp0"
 
@@ -13,7 +13,7 @@ ECHO:
 ECHO                 ########################################
 ECHO                 ####  prefs.js cleaner for Windows  ####
 ECHO                 ####        by claustromaniac       ####
-ECHO                 ####              v2.3              ####
+ECHO                 ####              v2.4              ####
 ECHO                 ########################################
 ECHO:
 CALL :message "This script should be run from your Firefox profile directory."
@@ -28,6 +28,7 @@ IF ERRORLEVEL 3 (EXIT /B)
 IF ERRORLEVEL 2 (GOTO :showhelp)
 IF NOT EXIST "user.js" (CALL :abort "user.js not found in the current directory." 30)
 IF NOT EXIST "prefs.js" (CALL :abort "prefs.js not found in the current directory." 30)
+CALL :strlenCheck
 CALL :FFcheck
 CALL :message "Backing up prefs.js..."
 SET "_time=%time: =0%"
@@ -50,6 +51,21 @@ ECHO:
 ECHO:  %~1
 ECHO:
 GOTO :EOF
+REM ### string length Check Function ####
+:strlenCheck
+SET /a cnt=0
+setlocal ENABLEDELAYEDEXPANSION
+FOR /F "tokens=1,* delims=:" %%G IN ('FINDSTR /N "^" prefs.js') DO (
+	ECHO:%%H >nul
+	SET /a cnt += 1
+	IF /I "%%G" NEQ "!cnt!" (
+		ECHO:
+		CALL :message "ERROR: line !cnt! in prefs.js is too long."
+		(CALL :abort "Aborting ..." 30)
+	)
+)
+endlocal
+GOTO :EOF
 REM ####### Firefox Check Function ######
 :FFcheck
 TASKLIST /FI "IMAGENAME eq firefox.exe" 2>NUL | FIND /I /N "firefox.exe">NUL

From 1f098f2eaf7b68387dfd666942f856c1176e0ca7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 17 Jan 2021 23:04:37 +0000
Subject: [PATCH 0710/1147] start 85-alpha, also fix #1090

---
 user.js | 7 +++++--
 1 file changed, 5 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 8d3ed2c..255e3b8 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 05 Jan 2021
-* version 84
+* date: 17 Jan 2021
+* version 85-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -1191,6 +1191,9 @@ user_pref("permissions.delegation.enabled", false);
  * If a new page from another domain is loaded into a tab, then window.name is set to an empty string. The original
  * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks ***/
 user_pref("privacy.window.name.update.enabled", true);
+/* 2625: disable bypassing 3rd party extension install prompts [FF82+]
+ * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1659530,1681331 ***/
+user_pref("extensions.postDownloadThirdPartyPrompt", false);
 
 /** DOWNLOADS ***/
 /* 2650: discourage downloading to desktop

From ae6c76fe546a1e21601b99cf51f89108cb57a741 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 19 Jan 2021 17:07:39 +0000
Subject: [PATCH 0711/1147] v4.13 - fix TLS issue with PowerShell

---
 updater.bat | 19 +++++++++++--------
 1 file changed, 11 insertions(+), 8 deletions(-)

diff --git a/updater.bat b/updater.bat
index 7783860..2597ac1 100644
--- a/updater.bat
+++ b/updater.bat
@@ -3,10 +3,10 @@ TITLE arkenfox user.js updater
 
 REM ## arkenfox user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.12
+REM ## version: 4.13
 REM ## instructions: https://github.com/arkenfox/user.js/wiki/3.3-Updater-Scripts
 
-SET v=4.12
+SET v=4.13
 
 VERIFY ON
 CD /D "%~dp0"
@@ -51,9 +51,7 @@ IF DEFINED _updateb (
 		CALL :message "Updating script..."
 		REM Uncomment the next line and comment out the PowerShell call for testing.
 		REM COPY /B /Y "!_myname!.bat" "[updated]!_myname!.bat" >nul
-		(
-			PowerShell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/arkenfox/user.js/master/updater.bat', '[updated]!_myname!.bat')"
-		) >nul 2>&1
+		CALL :psdownload https://raw.githubusercontent.com/arkenfox/user.js/master/updater.bat "[updated]!_myname!.bat"
 		IF EXIST "[updated]!_myname!.bat" (
 			START /min CMD /C "[updated]!_myname!.bat" !_myparams!
 		) ELSE (
@@ -132,9 +130,7 @@ IF DEFINED _log (
 )
 IF EXIST user.js.new (DEL /F "user.js.new")
 CALL :message "Retrieving latest user.js file from github repository..."
-(
-	PowerShell -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/arkenfox/user.js/master/user.js', 'user.js.new')"
-) >nul 2>&1
+CALL :psdownload https://raw.githubusercontent.com/arkenfox/user.js/master/user.js "user.js.new"
 IF EXIST user.js.new (
 	IF DEFINED _rfpalts (
 		CALL :message "Activating RFP Alternatives section..."
@@ -218,6 +214,13 @@ IF NOT "2"=="%_log%" (ECHO:)
 ENDLOCAL
 GOTO :EOF
 
+::::::::::::: Download :::::::::::::
+:psdownload
+(
+	PowerShell -Command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object Net.WebClient).DownloadFile('%~1', '%~2')"
+) >nul 2>&1
+GOTO :EOF
+
 ::::::::::::::: Activate Section :::::::::::::::
 :activate
 :: arg1 = file

From 0cbd8a13a313b5f1e489532f34f6e52dba8757a3 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 19 Jan 2021 17:17:03 +0000
Subject: [PATCH 0712/1147] Update updater.bat

---
 updater.bat | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/updater.bat b/updater.bat
index 2597ac1..43b516d 100644
--- a/updater.bat
+++ b/updater.bat
@@ -214,7 +214,7 @@ IF NOT "2"=="%_log%" (ECHO:)
 ENDLOCAL
 GOTO :EOF
 
-::::::::::::: Download :::::::::::::
+::::::::::::::: Download :::::::::::::::
 :psdownload
 (
 	PowerShell -Command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object Net.WebClient).DownloadFile('%~1', '%~2')"

From 480933484fbce3bf4e9147e5429eefbb646c91f6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 21 Jan 2021 11:17:16 +0000
Subject: [PATCH 0713/1147] 2624: windows.name default FF86+

https://bugzilla.mozilla.org/1685089
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 255e3b8..a0be1a8 100644
--- a/user.js
+++ b/user.js
@@ -1190,7 +1190,7 @@ user_pref("permissions.delegation.enabled", false);
 /* 2624: enable "window.name" protection [FF82+]
  * If a new page from another domain is loaded into a tab, then window.name is set to an empty string. The original
  * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks ***/
-user_pref("privacy.window.name.update.enabled", true);
+user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+]
 /* 2625: disable bypassing 3rd party extension install prompts [FF82+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1659530,1681331 ***/
 user_pref("extensions.postDownloadThirdPartyPrompt", false);

From c974b3252dc4bc67104382058280c5d455f9f87e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 22 Jan 2021 12:10:15 +0000
Subject: [PATCH 0714/1147] move [STATS] from 1270 to 1201, #1094

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index a0be1a8..7a78bb2 100644
--- a/user.js
+++ b/user.js
@@ -629,9 +629,11 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * if it disables renegotiations but the problem is that the browser can't know that.
  * Setting this pref to true is the only way for the browser to ensure there will be
  * no unsafe renegotiations on the channel between the browser and the server.
+ * [STATS] SSL Labs (Dec 2020) reports 99.0% of sites have secure renegotiation [4]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
  * [2] https://tools.ietf.org/html/rfc5746
- * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 ***/
+ * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
+ * [4] https://www.ssllabs.com/ssl-pulse/ ***/
 user_pref("security.ssl.require_safe_negotiation", true);
 /* 1202: control TLS versions with min and max
  * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
@@ -766,10 +768,8 @@ user_pref("dom.security.https_only_mode_send_http_background_request", false);
 /** UI (User Interface) ***/
 /* 1270: display warning on the padlock for "broken security" (if 1201 is false)
  * Bug: warning padlock not indicated for subresources on a secure page! [2]
- * [STATS] SSL Labs (Dec 2020) reports 99.0% of sites have secure renegotiation [3]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
- * [2] https://bugzilla.mozilla.org/1353705
- * [3] https://www.ssllabs.com/ssl-pulse/ ***/
+ * [2] https://bugzilla.mozilla.org/1353705 ***/
 user_pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
 /* 1271: control "Add Security Exception" dialog on SSL warnings
  * 0=do neither 1=pre-populate url 2=pre-populate url + pre-fetch cert (default)

From 59ac1727f7be79fafca792c693292f834072d771 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Fri, 22 Jan 2021 12:15:12 +0000
Subject: [PATCH 0715/1147] v4.14 - check for TLS1.2 (#1097)

---
 updater.bat | 13 +++++++++++--
 1 file changed, 11 insertions(+), 2 deletions(-)

diff --git a/updater.bat b/updater.bat
index 43b516d..a806ca6 100644
--- a/updater.bat
+++ b/updater.bat
@@ -3,10 +3,10 @@ TITLE arkenfox user.js updater
 
 REM ## arkenfox user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.13
+REM ## version: 4.14
 REM ## instructions: https://github.com/arkenfox/user.js/wiki/3.3-Updater-Scripts
 
-SET v=4.13
+SET v=4.14
 
 VERIFY ON
 CD /D "%~dp0"
@@ -28,6 +28,15 @@ SHIFT
 GOTO parse
 :endparse
 
+FOR /F %%i IN ('PowerShell -Command "[Enum]::GetNames([Net.SecurityProtocolType]) -contains 'Tls12'"') DO (
+	IF "%%i" == "False" (
+		CALL :message "Your PowerShell version doesn't support TLS1.2 ^!"
+		ECHO:  Instructions to update PowerShell are on the arkenfox wiki
+		PAUSE
+		EXIT
+	)
+)
+
 IF DEFINED _updateb (
 	REM The normal flow here goes from phase 1 to phase 2 and then phase 3.
 	IF NOT "!_myname:~0,9!"=="[updated]" (

From 306610da8e3ba7580674e6385759f2764dad3b84 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 26 Jan 2021 19:37:54 +0000
Subject: [PATCH 0716/1147] remove 2614, see #1100

---
 user.js | 4 ----
 1 file changed, 4 deletions(-)

diff --git a/user.js b/user.js
index 7a78bb2..9a33ad3 100644
--- a/user.js
+++ b/user.js
@@ -1143,10 +1143,6 @@ user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
 /* 2611: disable middle mouse click opening links from clipboard
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/10089 ***/
 user_pref("middlemouse.contentLoadURL", false);
-/* 2614: limit HTTP redirects (this does not control redirects with HTML meta tags or JS)
- * [NOTE] A low setting of 5 or under will probably break some sites (e.g. gmail logins)
- * To control HTML Meta tag and JS redirects, use an extension. Default is 20 ***/
-user_pref("network.http.redirection-limit", 10);
 /* 2615: disable websites overriding Firefox's keyboard shortcuts [FF58+]
  * 0 (default) or 1=allow, 2=block
  * [SETTING] to add site exceptions: Page Info>Permissions>Override Keyboard Shortcuts ***/

From 2dd455ef83413468a5fcccec1d4097275fc13e94 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 26 Jan 2021 19:39:33 +0000
Subject: [PATCH 0717/1147] network.http.redirection-limit, fixes #1100

---
 scratchpad-scripts/arkenfox-clear-removed.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 1b0be69..060f76c 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 30-Dec-2020
+ Last updated: 26-Jan-2021
 
  For instructions see:
  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -232,6 +232,8 @@
     /* 84-beta */
     'browser.newtabpage.activity-stream.asrouter.providers.snippets',
     'layout.css.visited_links_enabled',
+    /* 85-beta */
+    'network.http.redirection-limit',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 2f6b14ab6eb5189637592a9575924db58e6f73fd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 26 Jan 2021 19:58:57 +0000
Subject: [PATCH 0718/1147] 1201: add error code, fixes #1094

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 9a33ad3..dd05a00 100644
--- a/user.js
+++ b/user.js
@@ -624,10 +624,10 @@ user_pref("browser.shell.shortcutFavicons", false);
 user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
 /** SSL (Secure Sockets Layer) / TLS (Transport Layer Security) ***/
 /* 1201: require safe negotiation
- * Blocks connections to servers that don't support RFC 5746 [2] as they're potentially
- * vulnerable to a MiTM attack [3]. A server *without* RFC 5746 can be safe from the attack
- * if it disables renegotiations but the problem is that the browser can't know that.
- * Setting this pref to true is the only way for the browser to ensure there will be
+ * Blocks connections (SSL_ERROR_UNSAFE_NEGOTIATION) to servers that don't support RFC 5746 [2]
+ * as they're potentially vulnerable to a MiTM attack [3]. A server without RFC 5746 can be
+ * safe from the attack if it disables renegotiations but the problem is that the browser can't
+ * know that. Setting this pref to true is the only way for the browser to ensure there will be
  * no unsafe renegotiations on the channel between the browser and the server.
  * [STATS] SSL Labs (Dec 2020) reports 99.0% of sites have secure renegotiation [4]
  * [1] https://wiki.mozilla.org/Security:Renegotiation

From fa78c53114c7c5e2a9b7b61e3c0a502ae6082105 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 28 Jan 2021 03:13:36 +0000
Subject: [PATCH 0719/1147] v85

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index dd05a00..7d3ee43 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 17 Jan 2021
-* version 85-alpha
+* date: 28 Jan 2021
+* version 85
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From b6e8dcab81e74d8f8a8b3b074e702cc68590cdd5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 30 Jan 2021 00:28:28 +0000
Subject: [PATCH 0720/1147] fixup spelling mistake

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 7d3ee43..3d0e228 100644
--- a/user.js
+++ b/user.js
@@ -1576,7 +1576,7 @@ user_pref("ui.use_standins_for_native_colors", true);
    // 0=light, 1=dark : This overrides your OS value
 user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
 // FF80+
-// 4618: limit font visbility (non-ANDROID) [FF79+]
+// 4618: limit font visibility (non-ANDROID) [FF79+]
    // Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1]
    // 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
    // [NOTE] Bundled fonts are auto-allowed

From 96d558dd0c375b2350fd61dfc84f21644850624c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 31 Jan 2021 07:28:05 +0000
Subject: [PATCH 0721/1147] add window.name test

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 3d0e228..08e8630 100644
--- a/user.js
+++ b/user.js
@@ -1185,7 +1185,8 @@ user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
 user_pref("permissions.delegation.enabled", false);
 /* 2624: enable "window.name" protection [FF82+]
  * If a new page from another domain is loaded into a tab, then window.name is set to an empty string. The original
- * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks ***/
+ * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks
+ * [TEST] https://arkenfox.github.io/TZP/tests/windownamea.html ***/
 user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+]
 /* 2625: disable bypassing 3rd party extension install prompts [FF82+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1659530,1681331 ***/

From 21fcd0bd358f41ef35b33c8d26785605d054a780 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 1 Feb 2021 05:14:46 +0000
Subject: [PATCH 0722/1147] update xul/xhtml config info

- the XUL version is also pre FF71
- the XHTML version was removed in FF87+
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 08e8630..009636d 100644
--- a/user.js
+++ b/user.js
@@ -82,8 +82,8 @@
 user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong with it?");
 
 /* 0000: disable about:config warning
- * FF71-72: chrome://global/content/config.xul
- * FF73+: chrome://global/content/config.xhtml ***/
+ * FF72 or lower: chrome://global/content/config.xul
+ * FF73-86: chrome://global/content/config.xhtml ***/
 user_pref("general.warnOnAboutConfig", false); // XUL/XHTML version
 user_pref("browser.aboutConfig.showWarning", false); // HTML version [FF71+]
 

From fa5125123532c0f517d9f774aa00075a961568fb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 1 Feb 2021 17:17:16 +0000
Subject: [PATCH 0723/1147] remove widevine vis pref, see #1107

- It is controlled in both runtime and via user.js by the state of `media.eme.enabled`. Also, who cares about the vis of a ui option
- note, there is no need to add this to the removed scratchpad list
---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 009636d..3767880 100644
--- a/user.js
+++ b/user.js
@@ -890,7 +890,6 @@ user_pref("plugin.state.flash", 0);
    // user_pref("media.gmp-provider.enabled", false);
 /* 1825: disable widevine CDM (Content Decryption Module)
  * [SETUP-WEB] if you *need* CDM, e.g. Netflix, Amazon Prime, Hulu, whatever ***/
-user_pref("media.gmp-widevinecdm.visible", false);
 user_pref("media.gmp-widevinecdm.enabled", false);
 /* 1830: disable all DRM content (EME: Encryption Media Extension)
  * [SETUP-WEB] if you *need* EME, e.g. Netflix, Amazon Prime, Hulu, whatever

From 0b51e98d91851a881e248aeb68b67a485fdc1c8a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 1 Feb 2021 17:25:00 +0000
Subject: [PATCH 0724/1147] media.gmp-widevinecdm.visible, see #1107

---
 scratchpad-scripts/arkenfox-clear-removed.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 060f76c..c9883b0 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 26-Jan-2021
+ Last updated: 01-Feb-2021
 
  For instructions see:
  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -234,6 +234,8 @@
     'layout.css.visited_links_enabled',
     /* 85-beta */
     'network.http.redirection-limit',
+    /* 86-beta */
+    'media.gmp-widevinecdm.visible',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From cfaf354fe359eee6bdc219c4b75823b94f77d2c0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 2 Feb 2021 04:09:50 +0000
Subject: [PATCH 0725/1147] oophs, better start 86-alpha

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 3767880..f7ec4a1 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 28 Jan 2021
-* version 85
+* date: 01 Feb 2021
+* version 86-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From ecf99bf9e7df122f273392104ecc0f574c3252cc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 3 Feb 2021 16:45:34 +0000
Subject: [PATCH 0726/1147] 0603: add default value

AFAICT:  false 48-51: true 52-55.0.1/ESR52.1: false ever since
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index f7ec4a1..7716dc7 100644
--- a/user.js
+++ b/user.js
@@ -364,7 +364,7 @@ user_pref("network.dns.disablePrefetch", true);
 user_pref("network.dns.disablePrefetchFromHTTPS", true); // [DEFAULT: true]
 /* 0603: disable predictor / prefetching ***/
 user_pref("network.predictor.enabled", false);
-user_pref("network.predictor.enable-prefetch", false); // [FF48+]
+user_pref("network.predictor.enable-prefetch", false); // [FF48+] [DEFAULT: false]
 /* 0605: disable link-mouseover opening connection to linked server
  * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests ***/
 user_pref("network.http.speculative-parallel-limit", 0);

From a35a616de7e10b6fa37bd42a134659d2054cffc5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 4 Feb 2021 07:19:28 +0000
Subject: [PATCH 0727/1147] highlight 1603 (cross origin referer), fixes 1108

especially since we recently hardened it: also added it to the few things highlighted in the wiki
---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 7716dc7..85fe751 100644
--- a/user.js
+++ b/user.js
@@ -18,6 +18,7 @@
        * Some site breakage and unintended consequences will happen. Everyone's experience will differ
          e.g. some user data is erased on close (section 2800), change this to suit your needs
        * While not 100% definitive, search for "[SETUP" tags
+         e.g. third party images/videos not loading on some sites? check 1603
        * Take the wiki link in step 2 and read the Troubleshooting entry
   5. Some tag info
        [SETUP-SECURITY] it's one item, read it

From 82bb3f987de619ccd61b1577d0fbb9e80675b76c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 8 Feb 2021 07:20:06 +0000
Subject: [PATCH 0728/1147] 2604, closes #1111

---
 user.js | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 85fe751..424f1a9 100644
--- a/user.js
+++ b/user.js
@@ -1119,8 +1119,7 @@ user_pref("beacon.enabled", false);
 /* 2603: remove temp files opened with an external application
  * [1] https://bugzilla.mozilla.org/302433 ***/
 user_pref("browser.helperApps.deleteTempFileOnExit", true);
-/* 2604: disable page thumbnail collection
- * look in profile/thumbnails directory - you may want to clean that out ***/
+/* 2604: disable page thumbnail collection ***/
 user_pref("browser.pagethumbnails.capturing_disabled", true); // [HIDDEN PREF]
 /* 2606: disable UITour backend so there is no chance that a remote page can use it ***/
 user_pref("browser.uitour.enabled", false);

From de74f812eeb18866698ea01d6c5fa81f9deb3391 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 18 Feb 2021 15:00:06 +0000
Subject: [PATCH 0729/1147] 2012: webgl default FF86+

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 424f1a9..07d3aa0 100644
--- a/user.js
+++ b/user.js
@@ -923,7 +923,7 @@ user_pref("webgl.disabled", true);
 user_pref("webgl.enable-webgl2", false);
 /* 2012: limit WebGL ***/
 user_pref("webgl.min_capability_mode", true);
-user_pref("webgl.disable-fail-if-major-performance-caveat", true);
+user_pref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT: true FF86+]
 /* 2022: disable screensharing ***/
 user_pref("media.getusermedia.screensharing.enabled", false);
 user_pref("media.getusermedia.browser.enabled", false);

From 6505a9fefd2bf2ba9b5f804fbb53053961d8bed7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 18 Feb 2021 15:30:58 +0000
Subject: [PATCH 0730/1147] FF86 deprecated

---
 user.js | 19 ++++++++++---------
 1 file changed, 10 insertions(+), 9 deletions(-)

diff --git a/user.js b/user.js
index 07d3aa0..a5d7b82 100644
--- a/user.js
+++ b/user.js
@@ -653,11 +653,6 @@ user_pref("security.tls.version.enable-deprecated", false);
  * [2] https://bugzilla.mozilla.org/967977
  * [3] https://arxiv.org/abs/1810.07304 ***/
 user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
-/* 1205: disable SSL Error Reporting
- * [1] https://firefox-source-docs.mozilla.org/browser/base/sslerrorreport/preferences.html ***/
-user_pref("security.ssl.errorReporting.automatic", false);
-user_pref("security.ssl.errorReporting.enabled", false);
-user_pref("security.ssl.errorReporting.url", "");
 /* 1206: disable TLS1.3 0-RTT (round-trip time) [FF51+]
  * [1] https://github.com/tlswg/tls13-spec/issues/1001
  * [2] https://blog.cloudflare.com/tls-1-3-overview-and-q-and-a/ ***/
@@ -1202,8 +1197,6 @@ user_pref("extensions.postDownloadThirdPartyPrompt", false);
 user_pref("browser.download.useDownloadDir", false);
 /* 2652: disable adding downloads to the system's "recent documents" list ***/
 user_pref("browser.download.manager.addToRecentDocs", false);
-/* 2653: disable hiding mime types (Options>General>Applications) not associated with a plugin ***/
-user_pref("browser.download.hide_plugins_without_extensions", false);
 /* 2654: disable "open with" in download dialog [FF50+] [SETUP-HARDEN]
  * This is very useful to enable when the browser is sandboxed (e.g. via AppArmor)
  * in such a way that it is forbidden to run external applications.
@@ -1653,6 +1646,16 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
 /* ESR78.x still uses all the following prefs
 // [NOTE] replace the * with a slash in the line above to re-enable them
+// FF86
+// 1205: disable SSL Error Reporting
+   // [1] https://firefox-source-docs.mozilla.org/browser/base/sslerrorreport/preferences.html
+   // [-] https://bugzilla.mozilla.org/1681839
+user_pref("security.ssl.errorReporting.automatic", false);
+user_pref("security.ssl.errorReporting.enabled", false);
+user_pref("security.ssl.errorReporting.url", "");
+// 2653: disable hiding mime types (Options>General>Applications) not associated with a plugin
+   // [-] https://bugzilla.mozilla.org/1581678
+user_pref("browser.download.hide_plugins_without_extensions", false);
 // FF79
 // 0212: enforce fallback text encoding to match en-US
    // When the content or server doesn't declare a charset the browser will
@@ -1661,14 +1664,12 @@ user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
    // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/20025
    // [-] https://bugzilla.mozilla.org/1603712
 user_pref("intl.charset.fallback.override", "windows-1252");
-// * * * /
 // FF82
 // 0206: disable geographically specific results/search engines e.g. "browser.search.*.US"
    // i.e. ignore all of Mozilla's various search engines in multiple locales
    // [-] https://bugzilla.mozilla.org/1619926
 user_pref("browser.search.geoSpecificDefaults", false);
 user_pref("browser.search.geoSpecificDefaults.url", "");
-// * * * /
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From c31c825a74ca6bdf227887c069a15bc75994d1ec Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 18 Feb 2021 15:50:37 +0000
Subject: [PATCH 0731/1147] 2212: popup events, fixes DDG

https://bugzilla.mozilla.org/show_bug.cgi?id=1686045
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index a5d7b82..1175af6 100644
--- a/user.js
+++ b/user.js
@@ -961,8 +961,8 @@ user_pref("browser.link.open_newwindow.restriction", 0);
  * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
 user_pref("dom.disable_open_during_load", true);
 /* 2212: limit events that can cause a popup [SETUP-WEB]
- * default is "change click dblclick auxclick mouseup pointerup notificationclick reset submit touchend contextmenu" ***/
-user_pref("dom.popup_allowed_events", "click dblclick");
+ * default FF86+: "change click dblclick auxclick mousedown mouseup pointerdown pointerup notificationclick reset submit touchend contextmenu ***/
+user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
 
 /*** [SECTION 2300]: WEB WORKERS
      A worker is a JS "background task" running in a global context, i.e. it is different from

From d905b4387def4b3da55c9edbd893602c922d729d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 21 Feb 2021 20:52:20 +0000
Subject: [PATCH 0732/1147] deprecated: put FF86 items in the right place

---
 user.js | 20 ++++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)

diff --git a/user.js b/user.js
index 1175af6..056232a 100644
--- a/user.js
+++ b/user.js
@@ -1646,16 +1646,6 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
 /* ESR78.x still uses all the following prefs
 // [NOTE] replace the * with a slash in the line above to re-enable them
-// FF86
-// 1205: disable SSL Error Reporting
-   // [1] https://firefox-source-docs.mozilla.org/browser/base/sslerrorreport/preferences.html
-   // [-] https://bugzilla.mozilla.org/1681839
-user_pref("security.ssl.errorReporting.automatic", false);
-user_pref("security.ssl.errorReporting.enabled", false);
-user_pref("security.ssl.errorReporting.url", "");
-// 2653: disable hiding mime types (Options>General>Applications) not associated with a plugin
-   // [-] https://bugzilla.mozilla.org/1581678
-user_pref("browser.download.hide_plugins_without_extensions", false);
 // FF79
 // 0212: enforce fallback text encoding to match en-US
    // When the content or server doesn't declare a charset the browser will
@@ -1670,6 +1660,16 @@ user_pref("intl.charset.fallback.override", "windows-1252");
    // [-] https://bugzilla.mozilla.org/1619926
 user_pref("browser.search.geoSpecificDefaults", false);
 user_pref("browser.search.geoSpecificDefaults.url", "");
+// FF86
+// 1205: disable SSL Error Reporting
+   // [1] https://firefox-source-docs.mozilla.org/browser/base/sslerrorreport/preferences.html
+   // [-] https://bugzilla.mozilla.org/1681839
+user_pref("security.ssl.errorReporting.automatic", false);
+user_pref("security.ssl.errorReporting.enabled", false);
+user_pref("security.ssl.errorReporting.url", "");
+// 2653: disable hiding mime types (Options>General>Applications) not associated with a plugin
+   // [-] https://bugzilla.mozilla.org/1581678
+user_pref("browser.download.hide_plugins_without_extensions", false);
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 7c978d4e70af121d30d62f632a63162f02fb13e0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Feb 2021 20:05:25 +0000
Subject: [PATCH 0733/1147] 0708: FTP default FF88+

https://bugzilla.mozilla.org/show_bug.cgi?id=1691890
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 056232a..723dba6 100644
--- a/user.js
+++ b/user.js
@@ -415,7 +415,7 @@ user_pref("network.http.altsvc.oe", false);
  * [1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
 user_pref("network.proxy.socks_remote_dns", true);
 /* 0708: disable FTP [FF60+] ***/
-   // user_pref("network.ftp.enabled", false);
+   // user_pref("network.ftp.enabled", false); // [DEFAULT: false FF88+]
 /* 0709: disable using UNC (Uniform Naming Convention) paths [FF61+]
  * [SETUP-CHROME] Can break extensions for profiles on network shares
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/26424 ***/

From e54ae465370556713f616d0e3d11abca98385ffc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 24 Feb 2021 15:11:59 +0000
Subject: [PATCH 0734/1147] 1204: ssl session ids inactive, closes #1110

---
 user.js | 11 ++++++-----
 1 file changed, 6 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 723dba6..2767b32 100644
--- a/user.js
+++ b/user.js
@@ -645,14 +645,15 @@ user_pref("security.ssl.require_safe_negotiation", true);
 /* 1203: enforce TLS 1.0 and 1.1 downgrades as session only */
 user_pref("security.tls.version.enable-deprecated", false);
 /* 1204: disable SSL session tracking [FF36+]
- * SSL Session IDs are unique, last up to 24hrs in Firefox, and can be used for tracking
- * [SETUP-PERF] Relax this if you have FPI enabled (see 4000) *AND* you understand the
- * consequences. FPI isolates these, but it was designed with the Tor protocol in mind,
- * and the Tor Browser has extra protection, including enhanced sanitizing per Identity.
+ * SSL Session IDs are unique and last up to 24hrs in Firefox (or longer with prolongation attacks)
+ * [NOTE] These are not used in PB mode. In normal windows they are isolated when using FPI (4001)
+ * and/or containers. In FF85+ they are isolated by default (privacy.partition.network_state)
+ * [WARNING] There are perf and passive fingerprinting costs, for little to no gain. Preventing
+ * tracking via this method does not address IPs, nor handle any sanitizing of current identifiers
  * [1] https://tools.ietf.org/html/rfc5077
  * [2] https://bugzilla.mozilla.org/967977
  * [3] https://arxiv.org/abs/1810.07304 ***/
-user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
+   // user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
 /* 1206: disable TLS1.3 0-RTT (round-trip time) [FF51+]
  * [1] https://github.com/tlswg/tls13-spec/issues/1001
  * [2] https://blog.cloudflare.com/tls-1-3-overview-and-q-and-a/ ***/

From cb5cdca99dc3956cfdbf403bc97d37852b8b09c9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 24 Feb 2021 22:10:29 +0000
Subject: [PATCH 0735/1147] update adding site exceptions

- https://bugzilla.mozilla.org/show_bug.cgi?id=1692553
- also HoM is not Page Info
---
 user.js | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 2767b32..633ecae 100644
--- a/user.js
+++ b/user.js
@@ -149,7 +149,7 @@ user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely decease
 /* 0202: set a default permission for Location (see 0201) [FF58+]
  * 0=always ask (default), 1=allow, 2=block
  * [NOTE] Best left at default "always ask", fingerprintable via Permissions API
- * [SETTING] to add site exceptions: Page Info>Permissions>Access Your Location
+ * [SETTING] to add site exceptions: Ctrl+I>Permissions>Access Your Location
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
    // user_pref("permissions.default.geo", 2);
 /* 0203: use Mozilla geolocation service instead of Google when geolocation is enabled [FF74+]
@@ -726,7 +726,7 @@ user_pref("security.mixed_content.block_display_content", true);
 user_pref("security.mixed_content.block_object_subrequest", true);
 /* 1244: enable HTTPS-Only mode [FF76+]
  * When "https_only_mode" (all windows) is true, "https_only_mode_pbm" (private windows only) is ignored
- * [SETTING] to add site exceptions: Page Info>HTTPS-Only mode>On/Off/Off temporarily
+ * [SETTING] to add site exceptions: Padlock>HTTPS-Only mode>On/Off/Off temporarily
  * [SETTING] Privacy & Security>HTTPS-Only Mode
  * [TEST] http://example.com [upgrade]
  * [TEST] http://neverssl.org/ [no upgrade]
@@ -926,7 +926,7 @@ user_pref("media.getusermedia.browser.enabled", false);
 user_pref("media.getusermedia.audiocapture.enabled", false);
 /* 2024: set a default permission for Camera/Microphone [FF58+]
  * 0=always ask (default), 1=allow, 2=block
- * [SETTING] to add site exceptions: Page Info>Permissions>Use the Camera/Microphone
+ * [SETTING] to add site exceptions: Ctrl+I>Permissions>Use the Camera/Microphone
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Camera/Microphone>Settings ***/
    // user_pref("permissions.default.camera", 2);
    // user_pref("permissions.default.microphone", 2);
@@ -1008,7 +1008,7 @@ user_pref("dom.push.enabled", false);
 /* 2306: set a default permission for Notifications (both 2304 and 2305) [FF58+]
  * 0=always ask (default), 1=allow, 2=block
  * [NOTE] Best left at default "always ask", fingerprintable via Permissions API
- * [SETTING] to add site exceptions: Page Info>Permissions>Receive Notifications
+ * [SETTING] to add site exceptions: Ctrl+I>Permissions>Receive Notifications
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Notifications>Settings ***/
    // user_pref("permissions.default.desktop-notification", 2);
 
@@ -1099,7 +1099,7 @@ user_pref("dom.webaudio.enabled", false);
    // user_pref("dom.vr.enabled", false);
 /* 2521: set a default permission for Virtual Reality (see 2520) [FF73+]
  * 0=always ask (default), 1=allow, 2=block
- * [SETTING] to add site exceptions: Page Info>Permissions>Access Virtual Reality Devices
+ * [SETTING] to add site exceptions: Ctrl+I>Permissions>Access Virtual Reality Devices
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Virtual Reality>Settings ***/
    // user_pref("permissions.default.xr", 0);
 
@@ -1140,7 +1140,7 @@ user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
 user_pref("middlemouse.contentLoadURL", false);
 /* 2615: disable websites overriding Firefox's keyboard shortcuts [FF58+]
  * 0 (default) or 1=allow, 2=block
- * [SETTING] to add site exceptions: Page Info>Permissions>Override Keyboard Shortcuts ***/
+ * [SETTING] to add site exceptions: Ctrl+I>Permissions>Override Keyboard Shortcuts ***/
    // user_pref("permissions.default.shortcuts", 2);
 /* 2616: remove special permissions for certain mozilla domains [FF35+]
  * [1] resource://app/defaults/permissions ***/

From 911206eed57d4e389d6ff6df792136c79cc33cc1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 25 Feb 2021 01:22:08 +0000
Subject: [PATCH 0736/1147] 5000s: disable ctrl-q quit shortcut FF87+

https://bugzilla.mozilla.org/show_bug.cgi?id=52821 .. 21 years, old enough to drink and vote
---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 633ecae..914889b 100644
--- a/user.js
+++ b/user.js
@@ -1619,6 +1619,7 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("layout.spellcheckDefault", 2); // 0=none, 1-multi-line, 2=multi-line & single-line
 /* UX BEHAVIOR ***/
    // user_pref("browser.backspace_action", 2); // 0=previous page, 1=scroll up, 2=do nothing
+   // user_pref("browser.quitShortcut.disabled", true); // disable Ctrl-Q quit shortcut [LINUX] [MAC] [FF87+]
    // user_pref("browser.tabs.closeWindowWithLastTab", false);
    // user_pref("browser.tabs.loadBookmarksInTabs", true); // open bookmarks in a new tab [FF57+]
    // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see bugzilla 1320061 [FF53+]

From 4596d721e6479aa2341554dc9e21cd999cd704a8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 26 Feb 2021 11:39:52 +0000
Subject: [PATCH 0737/1147] 2012: make webgl.min_capability_mode inactive

- This is too minimal to be of any use, breaks too much (e.g. zoom video)
- Tor browser stopped flipping this (I *think*) about 5 years ago: it certainly hasn't been used in ESR60+ based TB builds, I checked
- we already disable webgl, so making this inactive removes yet another pref users need to flip/troubleshoot
- I will leave it in the user js for a few releases so prefsCleaner will pick it up
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 914889b..b7f0413 100644
--- a/user.js
+++ b/user.js
@@ -918,7 +918,7 @@ user_pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true); // [FF70
 user_pref("webgl.disabled", true);
 user_pref("webgl.enable-webgl2", false);
 /* 2012: limit WebGL ***/
-user_pref("webgl.min_capability_mode", true);
+   // user_pref("webgl.min_capability_mode", true);
 user_pref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT: true FF86+]
 /* 2022: disable screensharing ***/
 user_pref("media.getusermedia.screensharing.enabled", false);

From 612cfbf3134d8685a1448d9dc2500dd8b91feb6e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Feb 2021 21:18:17 +0000
Subject: [PATCH 0738/1147] 0805: re-add visited links

It can still be used to mitigate social engineering attacks (e.g. using visibility and user clicks), and advanced/targeted scripts
---
 user.js | 11 +++++++++++
 1 file changed, 11 insertions(+)

diff --git a/user.js b/user.js
index b7f0413..eec7d00 100644
--- a/user.js
+++ b/user.js
@@ -456,6 +456,17 @@ user_pref("keyword.enabled", false);
 user_pref("browser.fixup.alternate.enabled", false);
 /* 0803: display all parts of the url in the location bar ***/
 user_pref("browser.urlbar.trimURLs", false);
+/* 0805: disable coloring of visited links - CSS history leak
+ * [SETUP-HARDEN] Bulk rapid history sniffing was mitigated in 2010 [1][2]. Slower and more expensive
+ * redraw timing attacks were largely mitigated in FF77+ [3]. Using RFP (4501) further hampers timing
+ * attacks. Don't forget clearing history on close (2803). However, social engineering [2#limits][4][5]
+ * and advanced targeted timing attacks could still produce usable results
+ * [1] https://developer.mozilla.org/docs/Web/CSS/Privacy_and_the_:visited_selector
+ * [2] https://dbaron.org/mozilla/visited-privacy
+ * [3] https://bugzilla.mozilla.org/1632765
+ * [4] https://earthlng.github.io/testpages/visited_links.html (see github wiki APPENDIX A on how to use)
+ * [5] https://lcamtuf.blogspot.com/2016/08/css-mix-blend-mode-is-bad-for-keeping.html ***/
+   // user_pref("layout.css.visited_links_enabled", false);
 /* 0807: disable live search suggestions
 /* [NOTE] Both must be true for the location bar to work
  * [SETUP-CHROME] Change these if you trust and use a privacy respecting search engine

From 65fb24ff1b97ef2045aec354269934e11f274830 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Feb 2021 21:20:00 +0000
Subject: [PATCH 0739/1147] layout.css.visited_links_enabled

added back to the user.js in https://github.com/arkenfox/user.js/commit/612cfbf3134d8685a1448d9dc2500dd8b91feb6e
---
 scratchpad-scripts/arkenfox-clear-removed.js | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index c9883b0..9a89288 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 01-Feb-2021
+ Last updated: 27-Feb-2021
 
  For instructions see:
  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -231,7 +231,6 @@
     'security.ssl3.dhe_rsa_aes_256_sha',
     /* 84-beta */
     'browser.newtabpage.activity-stream.asrouter.providers.snippets',
-    'layout.css.visited_links_enabled',
     /* 85-beta */
     'network.http.redirection-limit',
     /* 86-beta */

From 7163efdd1eed4c517d9ec475cbd8bfdfde114b74 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Feb 2021 15:57:27 +0000
Subject: [PATCH 0740/1147] 1825: inactive: it is redundant, fixes #1107

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index eec7d00..75914a2 100644
--- a/user.js
+++ b/user.js
@@ -897,10 +897,10 @@ user_pref("plugin.state.flash", 0);
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
    // user_pref("media.gmp-provider.enabled", false);
 /* 1825: disable widevine CDM (Content Decryption Module)
- * [SETUP-WEB] if you *need* CDM, e.g. Netflix, Amazon Prime, Hulu, whatever ***/
-user_pref("media.gmp-widevinecdm.enabled", false);
+ * [NOTE] This is covered by the EME master switch (1830) **/
+   // user_pref("media.gmp-widevinecdm.enabled", false);
 /* 1830: disable all DRM content (EME: Encryption Media Extension)
- * [SETUP-WEB] if you *need* EME, e.g. Netflix, Amazon Prime, Hulu, whatever
+ * [SETUP-WEB] e.g. Netflix, Amazon Prime, Hulu, HBO, Disney+, Showtime, Starz, DirectTV
  * [SETTING] General>DRM Content>Play DRM-controlled content
  * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
 user_pref("media.eme.enabled", false);

From 5f9bb59b9524d97dfe9f9fa2611667e292aee1d9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Feb 2021 20:49:57 +0000
Subject: [PATCH 0741/1147] 86 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 75914a2..5f53b37 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 01 Feb 2021
-* version 86-alpha
+* date: 28 Feb 2021
+* version 86
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From 03ffb901864a57bd9273e1f8cf26bb95522cb8f8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 2 Mar 2021 20:02:41 +0000
Subject: [PATCH 0742/1147] start 87-alpha, also fixes #1129

make all inactive permissions.default = same, blocked
---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 5f53b37..5298948 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 28 Feb 2021
-* version 86
+* date: 02 March 2021
+* version 87-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -1112,7 +1112,7 @@ user_pref("dom.webaudio.enabled", false);
  * 0=always ask (default), 1=allow, 2=block
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Access Virtual Reality Devices
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Virtual Reality>Settings ***/
-   // user_pref("permissions.default.xr", 0);
+   // user_pref("permissions.default.xr", 2);
 
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");

From 844f3ce9c81f12ea1d6b2994f440916ec4bdb4b0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 5 Mar 2021 10:15:26 +0000
Subject: [PATCH 0743/1147] tidy

---
 scratchpad-scripts/arkenfox-clear-removed.js | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 9a89288..20e7305 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 27-Feb-2021
+ Last updated: 04-Mar-2021
 
  For instructions see:
  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -9,7 +9,7 @@
  
 (function() {
   let ops = [
-    /* removed in arkenfox user.js v52-57 */
+    /* removed in arkenfox user.js */
     /* 52-alpha */
     'browser.search.reset.enabled',
     'browser.search.reset.whitelist',
@@ -26,7 +26,6 @@
     'extensions.pocket.api', // covered by extensions.pocket.enabled
     'extensions.pocket.oAuthConsumerKey', // ditto
     'extensions.pocket.site', // ditto
-    /* 56-alpha: none */
     /* 57-alpha */
     'geo.wifi.xhr.timeout', // covered by geo.enabled
     'browser.search.geoip.timeout', // ditto

From 3430507ae4062761cddf018397364710375c4ae2 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 7 Mar 2021 13:29:33 +0000
Subject: [PATCH 0744/1147] v3.0 - improve readIniFile() (#1128)

- grep -c equals grep | wc -l
- make output prettier
- work with variable instead of temporary file

+ a few minor changes/cleanup
---
 updater.sh | 51 +++++++++++++++++++++------------------------------
 1 file changed, 21 insertions(+), 30 deletions(-)

diff --git a/updater.sh b/updater.sh
index 5f37ebc..e265445 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## arkenfox user.js updater for macOS and Linux
 
-## version: 2.9
+## version: 3.0
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac
 
@@ -103,7 +103,6 @@ Optional Arguments:
 #     File Handling     #
 #########################
 
-# Download files
 download_file () { # expects URL as argument ($1)
   declare -r tf=$(mktemp)
 
@@ -122,36 +121,33 @@ open_file () { # expects one argument: file_path
 
 readIniFile () { # expects one argument: absolute path of profiles.ini
   declare -r inifile="$1"
-  declare -r tfile=$(mktemp)
 
-  if [ $(grep '^\[Profile' "$inifile" | wc -l) == "1" ]; then ### only 1 profile found
-    grep '^\[Profile' -A 4 "$inifile" | grep -v '^\[Profile' > $tfile
+  # tempIni will contain: [ProfileX], Name=, IsRelative= and Path= (and Default= if present) of the only (if) or the selected (else) profile
+  if [ $(grep -c '^\[Profile' "${inifile}") -eq "1" ]; then ### only 1 profile found
+    tempIni="$(grep '^\[Profile' -A 4 "${inifile}")"
   else
-    grep -E -v '^\[General\]|^StartWithLastProfile=|^IsRelative=' "$inifile"
-    echo ''
+    echo -e "Profiles found:\n––––––––––––––––––––––––––––––"
+    ## cmd-substitution to strip trailing newlines and in quotes to keep internal ones:
+    echo "$(grep --color=never -E 'Default=[^1]|\[Profile[0-9]*\]|Name=|Path=|^$' "${inifile}")"
+    echo '––––––––––––––––––––––––––––––'
     read -p 'Select the profile number ( 0 for Profile0, 1 for Profile1, etc ) : ' -r
     echo -e "\n"
     if [[ $REPLY =~ ^(0|[1-9][0-9]*)$ ]]; then
-      grep '^\[Profile'${REPLY} -A 4 "$inifile" | grep -v '^\[Profile'${REPLY} > $tfile
-      if [[ "$?" != "0" ]]; then
-        echo "Profile${REPLY} does not exist!" && exit 1
-      fi
+      tempIni="$(grep "^\[Profile${REPLY}" -A 4 "${inifile}")" || {
+        echo -e "${RED}Profile${REPLY} does not exist!${NC}" && exit 1
+      }
     else
-      echo "Invalid selection!" && exit 1
+      echo -e "${RED}Invalid selection!${NC}" && exit 1
     fi
   fi
 
-  declare -r profpath=$(grep '^Path=' $tfile)
-  declare -r pathisrel=$(grep '^IsRelative=' $tfile)
+  # extracting 0 or 1 from the "IsRelative=" line
+  declare -r pathisrel=$(sed -n 's/^IsRelative=\([01]\)$/\1/p' <<< "${tempIni}")
 
-  rm "$tfile"
-
-  # update global variable
-  if [[ ${pathisrel#*=} == "1" ]]; then
-    PROFILE_PATH="$(dirname "$inifile")/${profpath#*=}"
-  else
-    PROFILE_PATH="${profpath#*=}"
-  fi
+  # extracting only the path itself, excluding "Path="
+  PROFILE_PATH=$(sed -n 's/^Path=\(.*\)$/\1/p' <<< "${tempIni}")
+  # update global variable if path is relative
+  [[ ${pathisrel} == "1" ]] && PROFILE_PATH="$(dirname "${inifile}")/${PROFILE_PATH}"
 }
 
 getProfilePath () {
@@ -161,16 +157,14 @@ getProfilePath () {
   if [ "$PROFILE_PATH" = false ]; then
     PROFILE_PATH="$SCRIPT_DIR"
   elif [ "$PROFILE_PATH" = 'list' ]; then
-    local ini=''
     if [[ -f "$f1" ]]; then
-      ini="$f1"
+      readIniFile "$f1" # updates PROFILE_PATH or exits on error
     elif [[ -f "$f2" ]]; then
-      ini="$f2"
+      readIniFile "$f2"
     else
       echo -e "${RED}Error: Sorry, -l is not supported for your OS${NC}"
       exit 1
     fi
-    readIniFile "$ini" # updates PROFILE_PATH or exits on error
   #else
     # PROFILE_PATH already set by user with -p
   fi
@@ -191,9 +185,7 @@ get_updater_version () {
 #   -d: New version will not be looked for and update will not occur
 #   -u: Check for update, if available, execute without asking
 update_updater () {
-  if [ $UPDATE = 'no' ]; then
-    return 0 # User signified not to check for updates
-  fi
+  [ $UPDATE = 'no' ] && return 0 # User signified not to check for updates
 
   declare -r tmpfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/updater.sh')"
   [ -z "${tmpfile}" ] && echo -e "${RED}Error! Could not download updater.sh${NC}" && return 1 # check if download failed
@@ -214,7 +206,6 @@ update_updater () {
   exit 0
 }
 
-
 #########################
 #    Update user.js     #
 #########################

From 692ed70ea9f1eddc1a72725df25197a4847110d7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 8 Mar 2021 01:49:21 +0000
Subject: [PATCH 0745/1147] remove maintenance of this comment

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 5298948..eee08bd 100644
--- a/user.js
+++ b/user.js
@@ -38,7 +38,7 @@
     - If you are not using arkenfox v78... (not a definitive list)
       - 1244: HTTPS-Only mode is enabled
       - 1401: document fonts is inactive as it is now covered by RFP in FF80+
-      - 4600: some prefs may apply even if you use RFP (currently none apply as of FF84)
+      - 4600: some prefs may apply even if you use RFP
       - 9999: switch the appropriate deprecated section(s) back on
 
 * INDEX:

From 9138e342fdccfed95c899ac795f8e7a0c6f20b55 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 10 Mar 2021 00:06:30 +0000
Subject: [PATCH 0746/1147] misc (#1136)

- 0000: remove old XUL info, dropped in FF73+
- 0201: save 3 chars
- 0350: add default status for unsubmittedCheck
- 0351: change to enforce: has been default false going back to at least FF60, including current Beta/Dev/Nightly
   - along with 0602 `network.dns.disablePrefetchFromHTTPS` and 0603 `network.predictor.enable-prefetch`, I considered making them inactive, but decided it was good to leave them active for non-stable users just in case they get flipped
- 0515: add default status
- 0850c: remove info: out of date: doesn't work lilke that anymore and can't be assed figuring it out what with megabar and urlbar2 changes
- 0871: make inactive: default false since at least FF60
   - no need to enforce for non-stable in case it is flipped. It's a pretty minor shoulder-surfer privacy issue and the previews are small. If you're not sure what this pref does. On false you get one tab shown, on true you get as many as can fit across your screen. I squeezed in 15, and after that it became a list
- fixup `***/`
- shave off six lines and almost 400 bytes for you bastards
---
 user.js | 30 ++++++++++++------------------
 1 file changed, 12 insertions(+), 18 deletions(-)

diff --git a/user.js b/user.js
index eee08bd..2eee2e0 100644
--- a/user.js
+++ b/user.js
@@ -83,9 +83,8 @@
 user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong with it?");
 
 /* 0000: disable about:config warning
- * FF72 or lower: chrome://global/content/config.xul
  * FF73-86: chrome://global/content/config.xhtml ***/
-user_pref("general.warnOnAboutConfig", false); // XUL/XHTML version
+user_pref("general.warnOnAboutConfig", false); // XHTML version
 user_pref("browser.aboutConfig.showWarning", false); // HTML version [FF71+]
 
 /*** [SECTION 0100]: STARTUP ***/
@@ -143,7 +142,7 @@ user_pref("browser.newtabpage.activity-stream.default.sites", "");
 user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");
 /** GEOLOCATION ***/
 /* 0201: disable Location-Aware Browsing
- * [NOTE] Best left at default "true", fingerprintable, is already behind a prompt (see 0202)
+ * [NOTE] Best left at default "true", fingerprintable, already behind a prompt (see 0202)
  * [1] https://www.mozilla.org/firefox/geolocation/ ***/
    // user_pref("geo.enabled", false);
 /* 0202: set a default permission for Location (see 0201) [FF58+]
@@ -251,10 +250,10 @@ user_pref("browser.discovery.enabled", false);
 /* 0350: disable Crash Reports ***/
 user_pref("breakpad.reportURL", "");
 user_pref("browser.tabs.crashReporting.sendReport", false); // [FF44+]
-user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // [FF51+]
-/* 0351: disable backlogged Crash Reports
+user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // [FF51+] [DEFAULT: false except Nightly]
+/* 0351: enforce no submission of backlogged Crash Reports [FF58+]
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send backlogged crash reports  ***/
-user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [FF58+]
+user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [DEFAULT: false]
 /* 0390: disable Captive Portal detection
  * [1] https://www.eff.org/deeplinks/2017/08/how-captive-portals-interfere-wireless-security-and-privacy
  * [2] https://wiki.mozilla.org/Necko/CaptivePortal ***/
@@ -352,7 +351,7 @@ user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
 user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
 /* 0518: disable Web Compatibility Reporter [FF56+]
  * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla ***/
-user_pref("extensions.webcompat-reporter.enabled", false);
+user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false in stable]
 
 /*** [SECTION 0600]: BLOCK IMPLICIT OUTBOUND [not explicitly asked for - e.g. clicked on] ***/
 user_pref("_user.js.parrot", "0600 syntax error: the parrot's no more!");
@@ -492,12 +491,7 @@ user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
  * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest>Search engines ***/
    // user_pref("browser.urlbar.suggest.engines", false);
 /* 0850c: disable location bar dropdown
- * This value controls the total number of entries to appear in the location bar dropdown
- * [NOTE] Items (bookmarks/history/openpages) with a high "frecency"/"bonus" will always
- * be displayed (no we do not know how these are calculated or what the threshold is),
- * and this does not affect the search by search engine suggestion (see 0807)
- * [NOTE] This setting is only useful if you want to enable search engine keywords
- * (i.e. at least one of 0850a suggestion types must be true) but you want to *limit* suggestions shown ***/
+ * This value controls the total number of entries to appear in the location bar dropdown ***/
    // user_pref("browser.urlbar.maxRichResults", 0);
 /* 0850d: disable location bar autofill
  * [1] https://support.mozilla.org/en-US/kb/address-bar-autocomplete-firefox#w_url-autocomplete ***/
@@ -519,7 +513,7 @@ user_pref("browser.taskbar.lists.frequent.enabled", false);
 user_pref("browser.taskbar.lists.recent.enabled", false);
 user_pref("browser.taskbar.lists.tasks.enabled", false);
 /* 0871: disable Windows taskbar preview [WINDOWS] ***/
-user_pref("browser.taskbar.previews.enable", false);
+   // user_pref("browser.taskbar.previews.enable", false); // [DEFAULT: false]
 
 /*** [SECTION 0900]: PASSWORDS ***/
 user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
@@ -653,7 +647,7 @@ user_pref("security.ssl.require_safe_negotiation", true);
  * [1] https://www.ssllabs.com/ssl-pulse/ ***/
    // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
    // user_pref("security.tls.version.max", 4);
-/* 1203: enforce TLS 1.0 and 1.1 downgrades as session only */
+/* 1203: enforce TLS 1.0 and 1.1 downgrades as session only ***/
 user_pref("security.tls.version.enable-deprecated", false);
 /* 1204: disable SSL session tracking [FF36+]
  * SSL Session IDs are unique and last up to 24hrs in Firefox (or longer with prolongation attacks)
@@ -897,7 +891,7 @@ user_pref("plugin.state.flash", 0);
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
    // user_pref("media.gmp-provider.enabled", false);
 /* 1825: disable widevine CDM (Content Decryption Module)
- * [NOTE] This is covered by the EME master switch (1830) **/
+ * [NOTE] This is covered by the EME master switch (1830) ***/
    // user_pref("media.gmp-widevinecdm.enabled", false);
 /* 1830: disable all DRM content (EME: Encryption Media Extension)
  * [SETUP-WEB] e.g. Netflix, Amazon Prime, Hulu, HBO, Disney+, Showtime, Starz, DirectTV
@@ -1033,7 +1027,7 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
  * This applies to onCut/onCopy/onPaste events - i.e. it requires interaction with the website
  * [WARNING] If both 'middlemouse.paste' and 'general.autoScroll' are true (at least one
  * is default false) then enabling this pref can leak clipboard content [1]
- * [1] https://bugzilla.mozilla.org/1528289 */
+ * [1] https://bugzilla.mozilla.org/1528289 ***/
    // user_pref("dom.event.clipboardevents.enabled", false);
 /* 2404: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
  * this disables document.execCommand("cut"/"copy") to protect your clipboard
@@ -1187,7 +1181,7 @@ user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
  * Currently applies to cross-origin geolocation, camera, mic and screen-sharing
  * permissions, and fullscreen requests. Disabling delegation means any prompts
  * for these will show/use their correct 3rd party origin
- * [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion */
+ * [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion ***/
 user_pref("permissions.delegation.enabled", false);
 /* 2624: enable "window.name" protection [FF82+]
  * If a new page from another domain is loaded into a tab, then window.name is set to an empty string. The original

From 95645f59a39d6a6f3b2b824b6a1c0b2f4eb22be6 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Thu, 11 Mar 2021 14:06:38 +0000
Subject: [PATCH 0747/1147] Add files via upload

---
 wikipiki/parseError.png | Bin 0 -> 3467 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)
 create mode 100644 wikipiki/parseError.png

diff --git a/wikipiki/parseError.png b/wikipiki/parseError.png
new file mode 100644
index 0000000000000000000000000000000000000000..8f8a42005986f13d2726cff807e732d4f4427dc0
GIT binary patch
literal 3467
zcmZu!cQhN&9uC#gC_z)ZvCA`BB~@CR6tzc-PP3uJUNIV*QdNRjMbW0iD7B@viy~&V
zh}ndO8i`#b4{x0F&Ut^_@!fOB@BGI1o%__xM2`)~4+H=JYzF$e761U_(fl$C<6#et
z;D#Lz489h6+JG{=Ao&n5!L^LF0Dy{Q)_wbvhxoLYzO63+z}|M$7&<-QIvw65Y@n-U
z74%^FWuJ#&J!kj<V0@bbQ}5y-UzBV#C~$%*q{;?3IaU~mul9wLcs`aj@UnJ+gilb-
z?=<%pL`77CBKxoHELu@&yQC{sG$s{OmvqGJtkJhRq*K4E-BI3#XdK+S^m${*u>8+>
z)KYi(FUkIZ?fj$*ar7Os-9jgww)wDWe{E-BbvuuS+$WkA9q1LEzBiq`O{eaVr)j(E
z_$JiuUNW8UV54cWyCsOuQKnXxr`q`X$LI2dLaBt-0cwF%LLrL_(hLkUXR1;?1X7H5
zAi)cN|BhFKNn1rr$SY*AONT3ZwP+vAz$Px+1zDHARu#5OC9N;?3k&he1K(hl+EmZ1
z((Sn8^6yBFNB~uR<ebxgA0LauBA(_58C{x;L-J11TV&Zas!bvd!7my!DsNUTI79iD
zS5_Kwqz@m6!?FcVQEg5N&D#gjnLjCKz6vNY1e?E=eYu4z5g-_!lLLKj8;+guK$b*;
z*5z^ZC|ki^v+JW02~t)WCK8vJnVFLzY7Gqym9<r>1OlNM(>^=<>T}-!b>O-xqHZ~(
zQ+h`p)V8OQ+0k;Q+VOs2ytXshimJe$Q~+^DAU=ofaZ5+Yfd=Yuxae`f^71m`#}!zQ
z&gxp#Y)y~K`SP&Z`EtrT^p;k4-0<aUR+_4E@Ty0d>GtU8!`MbwfLci6OXF@jVWGpk
zl7+J^G+oT`ddby2D+Q-F+?dWgh%i}YmLpqbeRk()2mT?;I9l4xfQP8wzd;59LJwD`
zP_)KI28o}v17x8%LAx!xd1?1`*f>774KAFce>EM~EE!qKA)1quGutMr^B=p&OD?~_
zVd4B7_?N?<H#eDQ?}ebi6NcE|D9_8e-{(eXReZsyst4~lSlJ`}pNayV*9fST+}A>=
ziEb0Mi&>GT<$<kaPc~=l<2nhSm0MSR+4CdZMJGqreZ0Nx6I*hwdKx*Do0^!E5dZw?
z^>=VV{yv|ll#>Vk^1)mIq9K0?TZIrB<LQ<cCj+qcNa>~;p0FUg&twzJFHF06UCeqH
zzXCJ*^704R3UP1{vTBz-X9*zQrVefAey6+0%%q_;8NzI!NlpPRemfV=zBF)=cY0O(
zpj6Qjf;5eH9oG;t)Jd^F3e{7ufU_TY*CH=>y1J?J&nUKrWmly!yPLXIKn2I=(W0U4
zy4{J9uHz<O=Q=rVYSyEO8ueX8qMJBDLBXHnGb?O0+Rb8t{r^b@pZyD+JrD~ikvMmk
zwj|Ha>Cj4i^|bFd^#KI{{~vnmeOZA#JJG<Q^A<BUf9(7dOtltcb52~_@H2&dqcPuQ
z|A(2HEf|j35xa&SwCjrWAGh_@I2}vy59XS%kn%aoTPeT-4ez-kF8&k!oTlC;F${pY
z96W)7LAOyPI5ZnA_(2rZ6zVbgJcdJ@c(sZEMSQAQi_fEty<G{uFfXxZOrD?rswUse
zvEAHEce6fD{!?5xYUm6|L!NP~cz7HN1D4tg?_|p3F$48_1#aZ7)cdl*R;tqkOOl>{
z&mY?ArCB1HUvN(#oR_0d>13EeG$B*ck<kK=dFE{}QiWy(W{@*pQ-g}<XHstjAz84}
z93DweLOQM<1hmiU{{ALVZDO3*>RytiU#R-*8>BlPne|>(6TaPCM0yn%G_Kh?v-hbg
zq$5C`fCGK=Y<Cv2<9#BP3sLjZlK@9i-k~(E)KVN{CQ7g0MrBvS*EI&^OFG`U4+dyQ
ziJT}l_^Ww2K6X4t<)|jo3YZ0%lW`k~5r+JAp$wi&Yd5C%e+?PkCeDUNTD2NuqB++^
zoHf8yc4CT=+NG_|*J$+FK+gdoOa{nQz@t&{i$-Fj_1~;W5U5Fsm=*@`8fiE%KCN=T
z4WSG*uJ&Ssml2&@)=wdR-Sx^f`~&En(YO+!AF<e7sNC2t)SZ=kN~dP|)*xAV&QdnW
zX|&?&^;_v?y2nwpIN*bekQnd-UYQ9;MMAZujf=4B#f8~cav1D;Kkbz{_r_697|wpZ
zRV*v`0UnR<<zc+dg8sRKB_}4b{&@Q8*jetu7GBnI4^Q{L=`&$!2+@I8M4=Y(QMr{M
z78Oel<&pTj0%U(q&mXFiXE7p_bN(89eH!%4F-ko1K{4zM`?FTB6uu6nbBw8q|B%pe
zl6~+r$Nm~IgpuyZkj9~712C#pcDoEd_NA=-6mrs3Du{n>Y!PKu(Ujq3ph$^(f+O#P
z?iS(h)anA;iq^kOF&XR+SCs;dGLui9tx0BO>}B`pV_Me}O~>84e;<KBj5#!qO-}Yb
z@dN&=<_Q5kj^{#WoSfga7VZm8IY>tFeR~_-+MvrB0~C8Fb;7K>XKPC-En?7xNeH-Q
zeF4C~W>8UIe|mXHqow%R1zr<!$+y--!kN)w5pqqI@Ln=~jeCNx_r+@o@G*(=%2+`P
zxHJ(g`7AZ6Kb1mlG$~RCyIRLoCr8OA-fKZ|`$@-cqvR9YOiR%-TqlWTuS>X=k%umR
zo)I@S>w0%o<2UGr^)lVc?!WuaE^?iO)E}$O$uHu7K+7Xe{~chl!qt#xjaH`?lC;dh
zFwXxggxj>8U+4$H<ky%7!OoZ`YX4TpL#YHa$bpUoG(3a(5WqBhq7H#*!N2Ybr>=Qa
z)}U5Au(NHHuU{$5fno|D9&yUUX_VO{>(Ti*Yk}!f7;~?jUnb6%F(T&ga5Uxp{Lo@b
zr!8Of$|N`(w&_Lbw$+@vyEP-|1To>PU{}Wl|0Mew<~K4wQETp%B#yLeW<r}`Bo#Jt
zH?*Ij4CircVQ&+B5ug7>Ilr!}@f))uwLbg<YGGooL^f9f6W2ld>;}RE*Ufr#=$S&8
zAx$0OeE}w%$3#qgy?0#NQ*+ghxr+2{tx9m~GV!OsZ`hQv()0fNT0Z4lnNN*C(%8GL
z6W_Qp<cv`@UwK4VlAF}>gAQhO+28x9MfRUzd1<a)>f7gnAtcb0Q(44|lo8(CbLdXn
zEfuYg9oE`?!6ULeZC!g_eR484@pgJv5xv)@#%GnC!N5U|g>xCq?3e(wyfnUb`Q}%~
z^*n8S^uWBWQaII1rVQQ^9Q#&<@=?ygCqu<AK;q6{f*N5O^4nfqE(T!0)g1;TqaS}2
zsmQQVSvl+0I+pPG6)50TeP3|iqXrJSv7rsbqRxuxm(VegStMlMH)cI-I>J?{SdVMt
z@&$P_*9E`INzy9`JQ-K4+@mhZQp4!Hbng=fJa#~DgiujfY_1<@l@;d^)Wx10D=%HA
z6>q}7^Y&+p+q~D31Jt5V7><OGlweccL67zlZOiANJrFKZe1R>#a_BjI7-}HRCUN0w
zmqGoOLEn(r76Y*7By=w+yQHhP!Lu<Y^+jGLOS<NSN|ZGr=_IPv;mRldgZ@pT`j2>0
zglk62mA-&?&;uZw_r-R}t0T*w>=MhFL>$<>A3;f?7=4+WYuFrz_L)()UxPD6`uX}7
zoQk?+se&+WOknJ)rqM@P0Zo)Ms(aK|ysx*dEWR((IcBEk#Et0~i=QShPV=~=7R#zR
z2#G&_qjR&z`lClq=<ZOA%PTIQi`Xt&@v6drB<*kihS8@#)LC6c$#xEbb|LlQYe&ZD
zCHP|dvr6R?-<E<af^+$d>s@Tkhn?hwLs;HJJgjaj3&H;CDu@Wc9&r|an;G3TBH5<-
z2j`wx*t=0$L4sl($#*1Z(Ntku)08WUphi(8$Bc8@QXut%VtcBS1(yP+xITYaJt$Sm
zkFUen*{PMfDQWKS4cMfHdvqm=y(}P~IANJz1k*~c`%}>57YqELl*Rf*DkYVBTsUyg
zEIULYVVDc9q8=%yV{mZ{$OSe32%%&<qb#D;?<t~LWNvO@ufKOsGqlvdmw7$uhB}Zi
za|!>>Ff=XyWXXe?+iHYs`R|~tzbv%i#7QUWO6XkYsk?7qJd<!!9%r<_%zwsKar>i;
zL+DDWUF2h#*&LA!=4X%Yq4s<5`by6qrqsF<OemHnD~?{-#y~R1di-m7Wli=`ckgB?
zZ0CnLE^krpRntuE4VA^yqgfE|u`F^(b&3sysZTRle3!SCbnBIWjfDWa0v0QQcP%6-
ze-d5bbf=^@m$GK}>?S~og-VvGta&YEZxxn;mWHA&Z;-U1b^XG?$wC3L$6QgU73JB*
zcDOwflk($zRp3k|d!0dwqE=;I%ayzKQ%y35RdiQA8!i}vDIhUKagA;`cxT)1Qcw8t
zZCo8bV^i72dy`iIFM}RVx2qo<xF^d}0{zYt;~8D7x`D6#6iRU$$92g%r??_*xbHwb
t)V3yI8s}fwAJd<Y;s1~*@53gV(BkPfUSg?T(BTIPU;s1GEz`D({3p*9w%q^#

literal 0
HcmV?d00001


From b7c80841a9c9c886906f8cadfcc28cb97d2e6406 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 14 Mar 2021 11:21:13 +0000
Subject: [PATCH 0748/1147] tweak defaults (#1140)

- don't differentiate between channels
- both can be made inactive
   - webcompat requires user action: and I don't see this as a bad thing to have in non-stable
   - unsubmitted crashReports on Nightly is probably already covered by killing the URL, so no big deal
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 2eee2e0..05ab9cd 100644
--- a/user.js
+++ b/user.js
@@ -250,7 +250,7 @@ user_pref("browser.discovery.enabled", false);
 /* 0350: disable Crash Reports ***/
 user_pref("breakpad.reportURL", "");
 user_pref("browser.tabs.crashReporting.sendReport", false); // [FF44+]
-user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // [FF51+] [DEFAULT: false except Nightly]
+   // user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // [FF51+] [DEFAULT: false]
 /* 0351: enforce no submission of backlogged Crash Reports [FF58+]
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send backlogged crash reports  ***/
 user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [DEFAULT: false]
@@ -351,7 +351,7 @@ user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
 user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
 /* 0518: disable Web Compatibility Reporter [FF56+]
  * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla ***/
-user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false in stable]
+   // user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
 
 /*** [SECTION 0600]: BLOCK IMPLICIT OUTBOUND [not explicitly asked for - e.g. clicked on] ***/
 user_pref("_user.js.parrot", "0600 syntax error: the parrot's no more!");

From 3a24c01f030ef6b83c75b1a31ad4f030dbc66179 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 17 Mar 2021 14:01:16 +0000
Subject: [PATCH 0749/1147] 0518: enforce no Web Compat Reporter

only stable is false, at the time of writing. but enforcing this for all channels is good, so no-one ends up wasting mozilla resources reporting a compat problem when they've got 200 odd prefs flipped
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 05ab9cd..019a73c 100644
--- a/user.js
+++ b/user.js
@@ -349,9 +349,9 @@ user_pref("extensions.formautofill.available", "off"); // [FF56+]
 user_pref("extensions.formautofill.creditCards.available", false); // [FF57+]
 user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
 user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
-/* 0518: disable Web Compatibility Reporter [FF56+]
+/* 0518: enforce disabling of Web Compatibility Reporter [FF56+]
  * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla ***/
-   // user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
+user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
 
 /*** [SECTION 0600]: BLOCK IMPLICIT OUTBOUND [not explicitly asked for - e.g. clicked on] ***/
 user_pref("_user.js.parrot", "0600 syntax error: the parrot's no more!");

From 3b6cd93749f3885b5cbbc54013e7342b6ce995ac Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Mar 2021 07:32:19 +0000
Subject: [PATCH 0750/1147] 1606: default Referrer Policy default

---
 user.js | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 019a73c..00b6ab3 100644
--- a/user.js
+++ b/user.js
@@ -847,8 +847,9 @@ user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
  * [NOTE] This is only a default, it can be overridden by a site-controlled Referrer Policy
  * [1] https://www.w3.org/TR/referrer-policy/
  * [2] https://developer.mozilla.org/docs/Web/HTTP/Headers/Referrer-Policy
- * [3] https://blog.mozilla.org/security/2018/01/31/preventing-data-leaks-by-stripping-path-information-in-http-referrers/ ***/
-   // user_pref("network.http.referer.defaultPolicy", 3); // [DEFAULT: 3]
+ * [3] https://blog.mozilla.org/security/2018/01/31/preventing-data-leaks-by-stripping-path-information-in-http-referrers/
+ * [4] https://blog.mozilla.org/security/2021/03/22/firefox-87-trims-http-referrers-by-default-to-protect-user-privacy/ ***/
+   // user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2 FF87+]
    // user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
 /* 1607: TOR: hide (not spoof) referrer when leaving a .onion domain [FF54+]
  * [NOTE] Firefox cannot access .onion sites by default. We recommend you use

From b592e0e592bb80141b0b4f880dc3b0069e21301c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Mar 2021 07:49:14 +0000
Subject: [PATCH 0751/1147] 87 deprecated

It is simpler to leave the PointerEvent pref where it is, until ESR78 is EOL
- FF87+ users who use RFP Alts simply add a dead pref, no harm
- This way ESR78 users don't have to worry about extra char flipping: it's the same as before: 1 flip for ESR, 1 flip for RFP Alts
---
 user.js | 9 ++++++---
 1 file changed, 6 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 00b6ab3..4729016 100644
--- a/user.js
+++ b/user.js
@@ -121,8 +121,6 @@ user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
 user_pref("browser.newtabpage.activity-stream.showSponsored", false);
 user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false); // [FF66+]
-/* 0105d: disable Activity Stream recent Highlights in the Library [FF57+] ***/
-   // user_pref("browser.library.activity-stream.enabled", false);
 /* 0105e: clear default topsites
  * [NOTE] This does not block you from adding your own ***/
 user_pref("browser.newtabpage.activity-stream.default.sites", "");
@@ -1562,8 +1560,9 @@ user_pref("webgl.enable-debug-renderer-info", false);
    // 0=no-preference, 1=reduce
 user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
 // FF64+
-// 4615: [2516] disable PointerEvents
+// 4615: [2516] disable PointerEvents [FF86 or lower]
    // [1] https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent
+   // [-] https://bugzilla.mozilla.org/1688105
 user_pref("dom.w3c_pointer_events.enabled", false);
 // * * * /
 // FF67+
@@ -1678,6 +1677,10 @@ user_pref("security.ssl.errorReporting.url", "");
 // 2653: disable hiding mime types (Options>General>Applications) not associated with a plugin
    // [-] https://bugzilla.mozilla.org/1581678
 user_pref("browser.download.hide_plugins_without_extensions", false);
+// FF87
+// 0105d: disable Activity Stream recent Highlights in the Library [FF57+]
+   // [-] https://bugzilla.mozilla.org/1689405
+   // user_pref("browser.library.activity-stream.enabled", false);
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From b1927f9de1e7a2559f0e83c484d5cb243a4d5722 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 27 Mar 2021 18:42:52 +0000
Subject: [PATCH 0752/1147] 1607 make inactive

Useless, since Firefox doesn't use Tor (and which we don't recommend). It was added for the info factor.
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 4729016..f3b34f2 100644
--- a/user.js
+++ b/user.js
@@ -853,7 +853,7 @@ user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
  * [NOTE] Firefox cannot access .onion sites by default. We recommend you use
  * the Tor Browser which is specifically designed for hidden services
  * [1] https://bugzilla.mozilla.org/1305144 ***/
-user_pref("network.http.referer.hideOnionSource", true);
+   // user_pref("network.http.referer.hideOnionSource", true);
 /* 1610: ALL: enable the DNT (Do Not Track) HTTP header
  * [NOTE] DNT is enforced with Enhanced Tracking Protection regardless of this pref
  * [SETTING] Privacy & Security>Enhanced Tracking Protection>Send websites a "Do Not Track" signal... ***/

From 46ccd9f6547bac30f57840e95a453b434051ef12 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 3 Apr 2021 14:20:39 +0000
Subject: [PATCH 0753/1147] cleanup 0600s

three prefs are default since at least 78, and one pref is redundant for a pref that has been at our default since it was added
---
 user.js | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index f3b34f2..49a3267 100644
--- a/user.js
+++ b/user.js
@@ -359,17 +359,16 @@ user_pref("network.prefetch-next", false);
 /* 0602: disable DNS prefetching
  * [1] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
 user_pref("network.dns.disablePrefetch", true);
-user_pref("network.dns.disablePrefetchFromHTTPS", true); // [DEFAULT: true]
+   // user_pref("network.dns.disablePrefetchFromHTTPS", true); // [DEFAULT: true]
 /* 0603: disable predictor / prefetching ***/
 user_pref("network.predictor.enabled", false);
-user_pref("network.predictor.enable-prefetch", false); // [FF48+] [DEFAULT: false]
+   // user_pref("network.predictor.enable-prefetch", false); // [FF48+] [DEFAULT: false]
 /* 0605: disable link-mouseover opening connection to linked server
  * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests ***/
 user_pref("network.http.speculative-parallel-limit", 0);
 /* 0606: enforce no "Hyperlink Auditing" (click tracking)
  * [1] https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ***/
-user_pref("browser.send_pings", false); // [DEFAULT: false]
-user_pref("browser.send_pings.require_same_host", true); // defense-in-depth
+   // user_pref("browser.send_pings", false); // [DEFAULT: false]
 
 /*** [SECTION 0700]: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");

From 87cd828b5b30d78e6ed7cfc660a012267cbf7ef3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 3 Apr 2021 14:25:46 +0000
Subject: [PATCH 0754/1147] browser.send_pings.require_same_host

redundant/defense-in-depth pref for `browser.send_pings` which is still at default false after six years of watching it (false is what we want)
---
 scratchpad-scripts/arkenfox-clear-removed.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 20e7305..8ec83a0 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 04-Mar-2021
+ Last updated: 03-Apr-2021
 
  For instructions see:
  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -234,6 +234,8 @@
     'network.http.redirection-limit',
     /* 86-beta */
     'media.gmp-widevinecdm.visible',
+    /* 87-beta */
+    'browser.send_pings.require_same_host',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 8f1c0044b91e7df4e7f369c71b7aed2a4ba7bdd5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 4 Apr 2021 11:07:39 +0000
Subject: [PATCH 0755/1147] 2701: add cookie behavior 5

---
 user.js | 16 +++++++++++-----
 1 file changed, 11 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 49a3267..11d46bc 100644
--- a/user.js
+++ b/user.js
@@ -1244,12 +1244,18 @@ user_pref("security.dialog_enable_delay", 700);
      accessible to websites except shared/service workers where the cookie setting *must* be "Allow"
 ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
-/* 2701: disable 3rd-party cookies and site-data [SETUP-WEB]
- * 0=Accept cookies and site data, 1=(Block) All third-party cookies, 2=(Block) All cookies,
- * 3=(Block) Cookies from unvisited websites, 4=(Block) Cross-site and social media trackers (default)
- * [NOTE] You can set exceptions under site permissions or use an extension
+/* 2701: disable or isolate 3rd-party cookies and site-data [SETUP-WEB]
+ * 0 = Accept cookies and site data
+ * 1 = (Block) All third-party cookies
+ * 2 = (Block) All cookies
+ * 3 = (Block) Cookies from unvisited websites
+ * 4 = (Block) Cross-site tracking cookies (default)
+ * 5 = (Isolate All) Cross-site cookies (TCP: Total Cookie Protection / dFPI: dynamic FPI) [1] (FF86+)
+ * Option 5 with FPI enabled (4001) is ignored and not shown, and option 4 used instead
+ * [NOTE] You can set cookie exceptions under site permissions or use an extension
  * [NOTE] Enforcing category to custom ensures ETP related prefs are always honored
- * [SETTING] Privacy & Security>Enhanced Tracking Protection>Custom>Cookies ***/
+ * [SETTING] Privacy & Security>Enhanced Tracking Protection>Custom>Cookies
+ * [1] https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/ ***/
 user_pref("network.cookie.cookieBehavior", 1);
 user_pref("browser.contentblocking.category", "custom");
 /* 2702: set third-party cookies (if enabled, see 2701) to session-only

From f77102713892d92a34f781e75840a09091a5c485 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 4 Apr 2021 11:18:54 +0000
Subject: [PATCH 0756/1147] 2720 was removed in FF72

https://bugzilla.mozilla.org/1488583
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 11d46bc..59dc5fd 100644
--- a/user.js
+++ b/user.js
@@ -1298,7 +1298,7 @@ user_pref("dom.storage.next_gen", true);
 /*** [SECTION 2800]: SHUTDOWN
      You should set the values to what suits you best.
      - "Offline Website Data" includes appCache (2730), localStorage (2710),
-       service worker cache (2740), and QuotaManager (IndexedDB (2720), asm-cache)
+       service worker cache (2740), and QuotaManager (IndexedDB, asm-cache)
      - In both 2803 + 2804, the 'download' and 'history' prefs are combined in the
        Firefox interface as "Browsing & Download History" and their values will be synced
 ***/

From ca99add0067c5644bf280a00ca26e2aaea1621f3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 4 Apr 2021 11:49:07 +0000
Subject: [PATCH 0757/1147] turn ETP on everywhere

It literally cannot hurt [1], and makes it easier for users to use custom mode with TCP/dFPI. Turning on socialtracking helps gain parity with strict mode

[1] gorhill: https://old.reddit.com/r/firefox/comments/l7xetb/network_priority_for_firefoxs_enhanced_tracking/gl9rn9n/
> All extensions and ETP work in parallel, they all inspect network requests and all make the decision to block or not, hence if they all decide to block, they will all report that they block something. ETP is a bit different than normal extension in that it will give precedence to an extension trying to redirect to a local resource, this ensures ETP works harmoniously with normal extensions.
>
> Once something is not blocked, it then goes through a DNS query, and the browser waits for the response.
>
> I will add examples of how ETP + multiple blocker extensions work together when dealing with a network request; let's say "A" and "B" are two different blockers:
>
>   - ETP=block, A=allow, B=allow: result=block
>   - ETP=allow, A=block, B=allow: result=block
>   - ETP=allow, A=allow, B=redirect: result=redirect
>   - ETP=allow, A=block, B=redirect: result=block
>   - ETP=block, A=allow, B=redirect: result=redirect
>
> So as you can see, ETP is a bit different than a normal extension in that it won't prevent redirection from happening if ever a network request is redirected by one of the normal extension.
---
 user.js | 13 +++++++++++--
 1 file changed, 11 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 59dc5fd..636ed0f 100644
--- a/user.js
+++ b/user.js
@@ -1269,7 +1269,16 @@ user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
  * [NOTE] The setting below is disabled (but not changed) if you block all cookies (2701 = 2)
  * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed ***/
    // user_pref("network.cookie.lifetimePolicy", 2);
-/* 2710: disable DOM (Document Object Model) Storage
+/* 2710: enable Enhanced Tracking Protection (ETP) in all windows
+ * [SETTING] Privacy & Security>Enhanced Tracking Protection>Custom>Tracking content
+ * [SETTING] to add site exceptions: Urlbar>ETP Shield
+ * [SETTING] to manage site exceptions: Options>Privacy & Security>Enhanced Tracking Protection>Manage Exceptions ***/
+user_pref("privacy.trackingprotection.enabled", true);
+/* 2711: enable various ETP lists ***/
+user_pref("privacy.trackingprotection.socialtracking.enabled", true);
+   // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
+   // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
+/* 2720: disable DOM (Document Object Model) Storage
  * [WARNING] This will break a LOT of sites' functionality AND extensions!
  * You are better off using an extension for more granular control ***/
    // user_pref("dom.storage.enabled", false);
@@ -1297,7 +1306,7 @@ user_pref("dom.storage.next_gen", true);
 
 /*** [SECTION 2800]: SHUTDOWN
      You should set the values to what suits you best.
-     - "Offline Website Data" includes appCache (2730), localStorage (2710),
+     - "Offline Website Data" includes appCache (2730), localStorage (2720),
        service worker cache (2740), and QuotaManager (IndexedDB, asm-cache)
      - In both 2803 + 2804, the 'download' and 'history' prefs are combined in the
        Firefox interface as "Browsing & Download History" and their values will be synced

From 728c962684db82b9dcace81aa6c1e4901caf65d2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 4 Apr 2021 12:01:49 +0000
Subject: [PATCH 0758/1147] 2402: potential clipboard leak fixed in FF89+

Thanks @gwarser for testing, creating the bugzilla, being patient, and confirming the fix
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 636ed0f..7a2eaf5 100644
--- a/user.js
+++ b/user.js
@@ -1023,8 +1023,8 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
 /* 2402: disable website access to clipboard events/content [SETUP-HARDEN]
  * [NOTE] This will break some sites' functionality e.g. Outlook, Twitter, Facebook, Wordpress
  * This applies to onCut/onCopy/onPaste events - i.e. it requires interaction with the website
- * [WARNING] If both 'middlemouse.paste' and 'general.autoScroll' are true (at least one
- * is default false) then enabling this pref can leak clipboard content [1]
+ * [WARNING] In FF88 or lower, with clipboardevents enabled, if both 'middlemouse.paste' and
+ * 'general.autoScroll' are true (at least one is default false) then the clipboard can leak [1]
  * [1] https://bugzilla.mozilla.org/1528289 ***/
    // user_pref("dom.event.clipboardevents.enabled", false);
 /* 2404: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]

From bc07ca94c09e35d1b7b4faefd68b5c8bab77677e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 4 Apr 2021 12:37:17 +0000
Subject: [PATCH 0759/1147] 1830: add [TEST]

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 7a2eaf5..10b4610 100644
--- a/user.js
+++ b/user.js
@@ -894,6 +894,7 @@ user_pref("plugin.state.flash", 0);
 /* 1830: disable all DRM content (EME: Encryption Media Extension)
  * [SETUP-WEB] e.g. Netflix, Amazon Prime, Hulu, HBO, Disney+, Showtime, Starz, DirectTV
  * [SETTING] General>DRM Content>Play DRM-controlled content
+ * [TEST] https://bitmovin.com/demos/drm
  * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
 user_pref("media.eme.enabled", false);
 

From abe37add6e39975b4372253ca7e35a5e5fbf444d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 4 Apr 2021 12:54:17 +0000
Subject: [PATCH 0760/1147] save some overrides, closes #1157

I do not think anyone will bemoan these four "personal" choices
---
 user.js | 11 ++++++-----
 1 file changed, 6 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 10b4610..46f6de9 100644
--- a/user.js
+++ b/user.js
@@ -1617,10 +1617,11 @@ user_pref("_user.js.parrot", "4700 syntax error: the parrot's taken 'is last bow
    // user_pref("general.useragent.override", ""); // [HIDDEN PREF]
 
 /*** [SECTION 5000]: PERSONAL
-     Non-project related but useful. If any of these interest you, add them to your overrides ***/
+     Non-project related but useful. If any of these interest you, add them to your overrides
+     To save some overrides, we've made a few active as they seem to be universally used ***/
 user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
 /* WELCOME & WHAT's NEW NOTICES ***/
-   // user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switch
+user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switch
    // user_pref("startup.homepage_welcome_url", "");
    // user_pref("startup.homepage_welcome_url.additional", "");
    // user_pref("startup.homepage_override_url", ""); // What's New page after updates
@@ -1647,15 +1648,15 @@ user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
    // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+, FF59 and under]
 /* UX FEATURES: disable and hide the icons and menus ***/
-   // user_pref("browser.messaging-system.whatsNewPanel.enabled", false); // What's New [FF69+]
+user_pref("browser.messaging-system.whatsNewPanel.enabled", false); // What's New toolbar icon [FF69+]
    // user_pref("extensions.pocket.enabled", false); // Pocket Account [FF46+]
    // user_pref("identity.fxaccounts.enabled", false); // Firefox Accounts & Sync [FF60+] [RESTART]
    // user_pref("reader.parse-on-load.enabled", false); // Reader View
 /* OTHER ***/
    // user_pref("browser.bookmarks.max_backups", 2);
-   // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+]
+user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+]
       // [SETTING] General>Browsing>Recommend extensions as you browse
-   // user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
+user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
       // [SETTING] General>Browsing>Recommend features as you browse
    // user_pref("network.manage-offline-status", false); // see bugzilla 620472
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)

From f0822782175932a96d0eed4fecc51c0a2bab239a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 4 Apr 2021 14:15:53 +0000
Subject: [PATCH 0761/1147] 1607: save one line and some bytes

and make it even MOAR clear we do NOT support tor over firefox
---
 user.js | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 46f6de9..b5e8478 100644
--- a/user.js
+++ b/user.js
@@ -849,8 +849,7 @@ user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
    // user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2 FF87+]
    // user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
 /* 1607: TOR: hide (not spoof) referrer when leaving a .onion domain [FF54+]
- * [NOTE] Firefox cannot access .onion sites by default. We recommend you use
- * the Tor Browser which is specifically designed for hidden services
+ * [NOTE] Firefox cannot access .onion sites by default: it is strongly recommended you just use Tor Browser
  * [1] https://bugzilla.mozilla.org/1305144 ***/
    // user_pref("network.http.referer.hideOnionSource", true);
 /* 1610: ALL: enable the DNT (Do Not Track) HTTP header

From 2071939c5e5fdb0898aadb06b37cdbc3ccb70011 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 4 Apr 2021 14:21:24 +0000
Subject: [PATCH 0762/1147] use [TOR] tags, add 1247

not that we recommend using tor over firefox: but at least the info is there for fiddlers
---
 user.js | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index b5e8478..985f68f 100644
--- a/user.js
+++ b/user.js
@@ -743,6 +743,10 @@ user_pref("dom.security.https_only_mode", true); // [FF76+]
  * This is done to avoid waiting for a timeout which takes 90 seconds
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1642387,1660945 ***/
 user_pref("dom.security.https_only_mode_send_http_background_request", false);
+/* 1247: treat .onion as a secure context [FF60+] [TOR]
+ * [NOTE] Firefox cannot access .onion sites by default: it is strongly recommended you just use Tor Browser
+ * [1] https://bugzilla.mozilla.org/1382359 ***/
+   // user_pref("dom.securecontext.whitelist_onions", true);
 
 /** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro]
  * These are all the ciphers still using SHA-1 and CBC which are weaker than the available alternatives. (see "Cipher Suites" in [1])
@@ -848,7 +852,7 @@ user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
  * [4] https://blog.mozilla.org/security/2021/03/22/firefox-87-trims-http-referrers-by-default-to-protect-user-privacy/ ***/
    // user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2 FF87+]
    // user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
-/* 1607: TOR: hide (not spoof) referrer when leaving a .onion domain [FF54+]
+/* 1607: hide (not spoof) referrer when leaving a .onion domain [FF54+] [TOR]
  * [NOTE] Firefox cannot access .onion sites by default: it is strongly recommended you just use Tor Browser
  * [1] https://bugzilla.mozilla.org/1305144 ***/
    // user_pref("network.http.referer.hideOnionSource", true);

From ada8158caf3f0c0fac7f1e4d2694fcdf7fc28b59 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 4 Apr 2021 20:33:23 +0000
Subject: [PATCH 0763/1147] v87

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 985f68f..60874a5 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 02 March 2021
-* version 87-alpha
+* date: 04 April 2021
+* version 87
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From 2da3b0192f14a47e5d48446989251e1fd9c380a0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 7 Apr 2021 09:36:01 +0000
Subject: [PATCH 0764/1147] update HTTP2 stats

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 60874a5..1569e7e 100644
--- a/user.js
+++ b/user.js
@@ -386,8 +386,8 @@ user_pref("network.dns.disableIPv6", true);
 /* 0702: disable HTTP2
  * HTTP2 raises concerns with "multiplexing" and "server push", does nothing to
  * enhance privacy, and opens up a number of server-side fingerprinting opportunities.
- * [WARNING] Disabling this made sense in the past, and doesn't break anything, but HTTP2 is
- * at 40% (December 2019) and growing [5]. Don't be that one person using HTTP1.1 on HTTP2 sites
+ * [WARNING] Disabling this made sense in the past, and doesn't break anything, but HTTP2 is over
+ * 50% of sites (April 2021) and growing [5]. Don't be that one person using HTTP1.1 on HTTP2 sites
  * [1] https://http2.github.io/faq/
  * [2] https://blog.scottlogic.com/2014/11/07/http-2-a-quick-look.html
  * [3] https://http2.github.io/http2-spec/#rfc.section.10.8

From 5dcf639d33d645df1278b5ffba1a5d8726473684 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 7 Apr 2021 09:36:56 +0000
Subject: [PATCH 0765/1147] oophs .. and start 88-alpha

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 1569e7e..dfa382f 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 04 April 2021
-* version 87
+* date: 06 April 2021
+* version 88-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From 7ad3bb9e614f77d150f359686b7afa624b1634d9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 7 Apr 2021 09:44:24 +0000
Subject: [PATCH 0766/1147] 0702: use a [STATS] tag

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index dfa382f..1d0dc7e 100644
--- a/user.js
+++ b/user.js
@@ -386,8 +386,8 @@ user_pref("network.dns.disableIPv6", true);
 /* 0702: disable HTTP2
  * HTTP2 raises concerns with "multiplexing" and "server push", does nothing to
  * enhance privacy, and opens up a number of server-side fingerprinting opportunities.
- * [WARNING] Disabling this made sense in the past, and doesn't break anything, but HTTP2 is over
- * 50% of sites (April 2021) and growing [5]. Don't be that one person using HTTP1.1 on HTTP2 sites
+ * [WARNING] Don't disable HTTP2. Don't be that one person using HTTP1.1 on HTTP2 sites
+ * [STATS] Over 50% of sites (April 2021) and growing [5]
  * [1] https://http2.github.io/faq/
  * [2] https://blog.scottlogic.com/2014/11/07/http-2-a-quick-look.html
  * [3] https://http2.github.io/http2-spec/#rfc.section.10.8

From 6c10e03ce52423d87fada431a49369c7b73a4337 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 8 Apr 2021 01:19:42 +0000
Subject: [PATCH 0767/1147] 2012: remove webgl.min_capability_mode

as promised in https://github.com/arkenfox/user.js/commit/4596d721e6479aa2341554dc9e21cd999cd704a8
---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 1d0dc7e..be4ea89 100644
--- a/user.js
+++ b/user.js
@@ -925,7 +925,6 @@ user_pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true); // [FF70
 user_pref("webgl.disabled", true);
 user_pref("webgl.enable-webgl2", false);
 /* 2012: limit WebGL ***/
-   // user_pref("webgl.min_capability_mode", true);
 user_pref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT: true FF86+]
 /* 2022: disable screensharing ***/
 user_pref("media.getusermedia.screensharing.enabled", false);

From 9b8735a87a1696a0124246b92d5c6beadf2d4567 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 8 Apr 2021 01:21:14 +0000
Subject: [PATCH 0768/1147] webgl.min_capability_mode

---
 scratchpad-scripts/arkenfox-clear-removed.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 8ec83a0..74cd070 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 03-Apr-2021
+ Last updated: 07-Apr-2021
 
  For instructions see:
  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -236,6 +236,8 @@
     'media.gmp-widevinecdm.visible',
     /* 87-beta */
     'browser.send_pings.require_same_host',
+    /* 88-beta */
+    'webgl.min_capability_mode',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From 7738e320d5a05e662c0c523ba502b0462661b28b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 15 Apr 2021 07:10:54 +0000
Subject: [PATCH 0769/1147] RFP & Presentation API

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index be4ea89..07cd486 100644
--- a/user.js
+++ b/user.js
@@ -1433,7 +1433,7 @@ user_pref("privacy.firstparty.isolate", true);
    1217290 & 1409677 - enable fingerprinting resistance for WebGL (see 2010-12)
    1382545 - reduce fingerprinting in Animation API
    1354633 - limit MediaError.message to a whitelist
-   1382533 - enable fingerprinting resistance for Presentation API
+   1382533 & 1697680 - enable fingerprinting resistance for Presentation API (FF57-87)
       This blocks exposure of local IP Addresses via mDNS (Multicast DNS)
  FF58+
     967895 - spoof canvas and enable site permission prompt before allowing canvas data extraction

From 9930cfbc077917497f54ad6d449b76432e97b697 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 17 Apr 2021 07:12:20 +0000
Subject: [PATCH 0770/1147] 0102: add setup tag #1166

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 07cd486..cc11451 100644
--- a/user.js
+++ b/user.js
@@ -92,7 +92,8 @@ user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
 /* 0101: disable default browser check
  * [SETTING] General>Startup>Always check if Firefox is your default browser ***/
 user_pref("browser.shell.checkDefaultBrowser", false);
-/* 0102: set START page (0=blank, 1=home, 2=last visited page, 3=resume previous session)
+/* 0102: set startup page [SETUP-CHROME]
+ * 0=blank, 1=home, 2=last visited page, 3=resume previous session
  * [NOTE] Session Restore is not used in PB mode (0110) and is cleared with history (2803, 2804)
  * [SETTING] General>Startup>Restore previous session ***/
 user_pref("browser.startup.page", 0);

From da9f912862172f49454b5be977e0c7d133c03b25 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 23 Apr 2021 14:25:54 +0000
Subject: [PATCH 0771/1147] 2620: disable pdfjs scripting, v88 final

---
 user.js | 9 +++++----
 1 file changed, 5 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index cc11451..c029dd5 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 06 April 2021
-* version 88-alpha
+* date: 23 April 2021
+* version 88
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -1163,17 +1163,18 @@ user_pref("webchannel.allowObject.urlWhitelist", "");
  * [3] CVE-2017-5383: https://www.mozilla.org/security/advisories/mfsa2017-02/
  * [4] https://www.xudongz.com/blog/2017/idn-phishing/ ***/
 user_pref("network.IDN_show_punycode", true);
-/* 2620: enforce Firefox's built-in PDF reader [SETUP-CHROME]
+/* 2620: enforce PDFJS, disable PDFJS scripting [SETUP-CHROME]
  * This setting controls if the option "Display in Firefox" is available in the setting below
  *   and by effect controls whether PDFs are handled in-browser or externally ("Ask" or "Open With")
  * PROS: pdfjs is lightweight, open source, and as secure/vetted as any pdf reader out there (more than most)
- *   Exploits are rare (1 serious case in 4 yrs), treated seriously and patched quickly.
+ *   Exploits are rare (one serious case in seven years), treated seriously and patched quickly.
  *   It doesn't break "state separation" of browser content (by not sharing with OS, independent apps).
  *   It maintains disk avoidance and application data isolation. It's convenient. You can still save to disk.
  * CONS: You may prefer a different pdf reader for security reasons
  * CAVEAT: JS can still force a pdf to open in-browser by bundling its own code (rare)
  * [SETTING] General>Applications>Portable Document Format (PDF) ***/
 user_pref("pdfjs.disabled", false); // [DEFAULT: false]
+user_pref("pdfjs.enableScripting", false); // [FF86+]
 /* 2621: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS] ***/
 user_pref("network.protocol-handler.external.ms-windows-store", false);
 /* 2622: enforce no system colors; they can be fingerprinted

From cfd7cd01d1ac131df8b0a0b8bccad757c0aec046 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 25 Apr 2021 11:18:39 +0000
Subject: [PATCH 0772/1147] cleanup 0500s, #1170

- they all have on/off switches
- dxr no longer exists: update URL
- don't recommend users delete files
   - saves two lines
   - they poses zero threat (they have prefs)
   - deleting them can causes unwanted console errors/noise
---
 user.js | 8 +++-----
 1 file changed, 3 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index c029dd5..08e5572 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 23 April 2021
-* version 88
+* date: 25 April 2021
+* version 89-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -312,8 +312,6 @@ user_pref("browser.safebrowsing.downloads.remote.url", "");
      built-in features to Firefox, that are hidden from the about:addons UI.
      To view your System Add-ons go to about:support, they are listed under "Firefox Features"
 
-     Some System Add-ons have no on-off prefs. Instead you can manually remove them. Note that app
-     updates will restore them. They may also be updated and possibly restored automatically (see 0505)
      * Portable: "...\App\Firefox64\browser\features\" (or "App\Firefox\etc" for 32bit)
      * Windows: "...\Program Files\Mozilla\browser\features" (or "Program Files (X86)\etc" for 32bit)
      * Mac: "...\Applications\Firefox\Contents\Resources\browser\features\"
@@ -321,7 +319,7 @@ user_pref("browser.safebrowsing.downloads.remote.url", "");
      * Linux: "/usr/lib/firefox/browser/features" (or similar)
 
      [1] https://firefox-source-docs.mozilla.org/toolkit/mozapps/extensions/addon-manager/SystemAddons.html
-     [2] https://dxr.mozilla.org/mozilla-central/source/browser/extensions
+     [2] https://searchfox.org/mozilla-central/source/browser/extensions
 ***/
 user_pref("_user.js.parrot", "0500 syntax error: the parrot's cashed in 'is chips!");
 /* 0503: disable Normandy/Shield [FF60+]

From 79c5539edb939e4c005e794119312ec7d2f3dcba Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 5 May 2021 16:41:43 +0000
Subject: [PATCH 0773/1147] goodbye flash

The prefs still exist, but won't do anything since most of the NPAPI code has been removed
---
 user.js | 22 +++++++++++++---------
 1 file changed, 13 insertions(+), 9 deletions(-)

diff --git a/user.js b/user.js
index 08e5572..96be4c4 100644
--- a/user.js
+++ b/user.js
@@ -200,10 +200,6 @@ user_pref("app.update.auto", false);
 /* 0308: disable search engine updates (e.g. OpenSearch)
  * [NOTE] This does not affect Mozilla's built-in or Web Extension search engines ***/
 user_pref("browser.search.update", false);
-/* 0309: disable sending Flash crash reports ***/
-user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
-/* 0310: disable sending the URL of the website where a plugin crashed ***/
-user_pref("dom.ipc.plugins.reportCrashURL", false);
 /* 0320: disable about:addons' Recommendations pane (uses Google Analytics) ***/
 user_pref("extensions.getAddons.showPane", false); // [HIDDEN PREF]
 /* 0321: disable recommendations in about:addons' Extensions and Themes panes [FF68+] ***/
@@ -882,11 +878,6 @@ user_pref("privacy.userContext.enabled", true);
 
 /*** [SECTION 1800]: PLUGINS ***/
 user_pref("_user.js.parrot", "1800 syntax error: the parrot's pushing up daisies!");
-/* 1803: disable Flash plugin
- * 0=deactivated, 1=ask, 2=enabled
- * ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash
- * [NOTE] You can still override individual sites via site permissions ***/
-user_pref("plugin.state.flash", 0);
 /* 1820: disable GMP (Gecko Media Plugins)
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
    // user_pref("media.gmp-provider.enabled", false);
@@ -1699,6 +1690,19 @@ user_pref("browser.download.hide_plugins_without_extensions", false);
 // 0105d: disable Activity Stream recent Highlights in the Library [FF57+]
    // [-] https://bugzilla.mozilla.org/1689405
    // user_pref("browser.library.activity-stream.enabled", false);
+// FF89
+// 0309: disable sending Flash crash reports
+   // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]
+user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
+// 0310: disable sending the URL of the website where a plugin crashed
+   // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]
+user_pref("dom.ipc.plugins.reportCrashURL", false);
+// 1803: disable Flash plugin
+  // 0=deactivated, 1=ask, 2=enabled
+  // ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash
+  // [NOTE] You can still override individual sites via site permissions
+  // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]
+user_pref("plugin.state.flash", 0); // [DEFAULT: 1]
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From ba9b3c217be47c752876d6b55166e52f2d315a8c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 8 May 2021 14:45:32 +0000
Subject: [PATCH 0774/1147] tweak 4600s: closes #1172

---
 user.js | 14 +++-----------
 1 file changed, 3 insertions(+), 11 deletions(-)

diff --git a/user.js b/user.js
index 96be4c4..85f9516 100644
--- a/user.js
+++ b/user.js
@@ -1497,20 +1497,18 @@ user_pref("ui.prefersReducedMotion", 1); // [HIDDEN PREF]
 user_pref("_user.js.parrot", "4600 syntax error: the parrot's crossed the Jordan");
 /* [SETUP-non-RFP] Non-RFP users replace the * with a slash on this line to enable these
 // FF55+
-// 4601: [2514] spoof (or limit?) number of CPU cores [FF48+]
-   // [NOTE] *may* affect core chrome/Firefox performance, will affect content.
+// 4601: [2514] spoof number of CPU cores [FF48+]
    // [1] https://bugzilla.mozilla.org/1008453
    // [2] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21675
    // [3] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/22127
    // [4] https://html.spec.whatwg.org/multipage/workers.html#navigator.hardwareconcurrency
-   // user_pref("dom.maxHardwareConcurrency", 2);
-// * * * /
+user_pref("dom.maxHardwareConcurrency", 2);
 // FF56+
 // 4602: [2411] disable resource/navigation timing
 user_pref("dom.enable_resource_timing", false);
 // 4603: [2412] disable timing attacks
    // [1] https://wiki.mozilla.org/Security/Reviews/Firefox/NavigationTimingAPI
-user_pref("dom.enable_performance", false);
+   // user_pref("dom.enable_performance", false);
 // 4604: [2512] disable device sensor API
    // Optional protection depending on your device
    // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/15758
@@ -1537,7 +1535,6 @@ user_pref("dom.netinfo.enabled", false); // [DEFAULT: true on Android]
    // [2] https://developer.mozilla.org/docs/Web/API/SpeechSynthesis
    // [3] https://wiki.mozilla.org/HTML5_Speech_API
 user_pref("media.webspeech.synth.enabled", false);
-// * * * /
 // FF57+
 // 4610: [2506] disable video statistics - JS performance fingerprinting [FF25+]
    // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/15757
@@ -1550,19 +1547,16 @@ user_pref("media.video_stats.enabled", false);
    // [1] https://developer.mozilla.org/docs/Web/API/Touch_events
    // [2] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/10286
    // user_pref("dom.w3c_touch_events.enabled", 0);
-// * * * /
 // FF59+
 // 4612: [2511] disable MediaDevices change detection [FF51+]
    // [1] https://developer.mozilla.org/docs/Web/Events/devicechange
    // [2] https://developer.mozilla.org/docs/Web/API/MediaDevices/ondevicechange
 user_pref("media.ondevicechange.enabled", false);
-// * * * /
 // FF60+
 // 4613: [2011] disable WebGL debug info being available to websites
    // [1] https://bugzilla.mozilla.org/1171228
    // [2] https://developer.mozilla.org/docs/Web/API/WEBGL_debug_renderer_info
 user_pref("webgl.enable-debug-renderer-info", false);
-// * * * /
 // FF63+
 // 4614: enforce prefers-reduced-motion as no-preference [FF63+] [RESTART]
    // 0=no-preference, 1=reduce
@@ -1572,7 +1566,6 @@ user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
    // [1] https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent
    // [-] https://bugzilla.mozilla.org/1688105
 user_pref("dom.w3c_pointer_events.enabled", false);
-// * * * /
 // FF67+
 // 4616: [2618] disable exposure of system colors to CSS or canvas [FF44+]
    // [NOTE] See second listed bug: may cause black on black for elements with undefined colors
@@ -1589,7 +1582,6 @@ user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
    // [NOTE] Bundled fonts are auto-allowed
    // [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc
 user_pref("layout.css.font-visibility.level", 1);
-// * * * /
 // ***/
 
 /*** [SECTION 4700]: RFP ALTERNATIVES (USER AGENT SPOOFING)

From 0566ded651817b0150a803652064ad9348d40d00 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 9 May 2021 17:52:38 +0000
Subject: [PATCH 0775/1147] fixup, closes #1174

---
 scratchpad-scripts/arkenfox-clear-removed.js | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 74cd070..b390a18 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 07-Apr-2021
+ Last updated: 09-May-2021
 
  For instructions see:
  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -127,7 +127,6 @@
     'browser.cache.disk.smart_size.enabled',
     'browser.cache.disk.smart_size.first_run',
     'browser.cache.offline.insecure.enable',
-    'browser.safebrowsing.downloads.remote.url',
     'browser.safebrowsing.provider.google.reportMalwareMistakeURL',
     'browser.safebrowsing.provider.google.reportPhishMistakeURL',
     'browser.safebrowsing.provider.google.reportURL',
@@ -178,7 +177,6 @@
     'browser.safebrowsing.provider.mozilla.updateURL',
     'browser.urlbar.userMadeSearchSuggestionsChoice',
     'privacy.trackingprotection.annotate_channels',
-    'privacy.trackingprotection.enabled',
     'privacy.trackingprotection.lower_network_priority',
     'privacy.trackingprotection.pbmode.enabled',
     'services.blocklist.addons.collection',

From 9419e2faabc9f88619adf9650fc190fb7688e167 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 25 May 2021 17:30:40 +0000
Subject: [PATCH 0776/1147] remove 1210

been default true since FF26 - thanks earthlng
---
 user.js | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/user.js b/user.js
index 85f9516..0c5b9ef 100644
--- a/user.js
+++ b/user.js
@@ -658,9 +658,6 @@ user_pref("security.tls.enable_0rtt_data", false);
 
 /** OCSP (Online Certificate Status Protocol)
     #Required reading [#] https://scotthelme.co.uk/revocation-is-broken/ ***/
-/* 1210: enable OCSP Stapling
- * [1] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/ ***/
-user_pref("security.ssl.enable_ocsp_stapling", true);
 /* 1211: control when to use OCSP fetching (to confirm current validity of certificates)
  * 0=disabled, 1=enabled (default), 2=enabled for EV certificates only
  * OCSP (non-stapled) leaks information about the sites you visit to the CA (cert authority)

From 9cc132e69db7688aa1d5f9ff72b99627527e5e78 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 25 May 2021 17:32:07 +0000
Subject: [PATCH 0777/1147] security.ssl.enable_ocsp_stapling

default true since FF26
---
 scratchpad-scripts/arkenfox-clear-removed.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index b390a18..5b05072 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
  This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 09-May-2021
+ Last updated: 25-May-2021
 
  For instructions see:
  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -236,6 +236,8 @@
     'browser.send_pings.require_same_host',
     /* 88-beta */
     'webgl.min_capability_mode',
+    /* 89-beta */
+    'security.ssl.enable_ocsp_stapling',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ]

From f0b5e3649d75a2b3f467a0b832eb24ee3e7d686b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 25 May 2021 17:46:45 +0000
Subject: [PATCH 0778/1147] tidy

---
 user.js | 23 ++++++++++++-----------
 1 file changed, 12 insertions(+), 11 deletions(-)

diff --git a/user.js b/user.js
index 0c5b9ef..82878bf 100644
--- a/user.js
+++ b/user.js
@@ -116,7 +116,7 @@ user_pref("browser.newtabpage.activity-stream.telemetry", false);
 /* 0105b: disable Activity Stream Snippets
  * Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
  * [1] https://abouthome-snippets-service.readthedocs.io/ ***/
-user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
+user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // [DEFAULT: false FF89+]
 /* 0105c: disable Activity Stream Top Stories, Pocket-based and/or sponsored content ***/
 user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
@@ -273,9 +273,9 @@ user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
     Firefox also takes measures such as striping out identifying parameters and since SBv4 (FF57+)
     doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
 
-    #Required reading [#] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
-    [1] https://wiki.mozilla.org/Security/Safe_Browsing
-    [2] https://support.mozilla.org/en-US/kb/how-does-phishing-and-malware-protection-work
+    [1] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
+    [2] https://wiki.mozilla.org/Security/Safe_Browsing
+    [3] https://support.mozilla.org/en-US/kb/how-does-phishing-and-malware-protection-work
 ***/
 /* 0410: disable SB (Safe Browsing)
  * [WARNING] Do this at your own risk! These are the master switches.
@@ -425,8 +425,7 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
      your environment (no unwanted eyeballs), your device (restricted access), your device's
      unattended state (locked, encrypted, forensic hardened). Likewise, you may want to check
      the items cleared on shutdown in section 2800.
-     [NOTE] The urlbar is also commonly referred to as the location bar and address bar
-     #Required reading [#] https://xkcd.com/538/
+     [1] https://xkcd.com/538/
 ***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
 /* 0801: disable location bar using search
@@ -657,7 +656,9 @@ user_pref("security.tls.version.enable-deprecated", false);
 user_pref("security.tls.enable_0rtt_data", false);
 
 /** OCSP (Online Certificate Status Protocol)
-    #Required reading [#] https://scotthelme.co.uk/revocation-is-broken/ ***/
+    [1] https://scotthelme.co.uk/revocation-is-broken/
+    [2] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/
+***/
 /* 1211: control when to use OCSP fetching (to confirm current validity of certificates)
  * 0=disabled, 1=enabled (default), 2=enabled for EV certificates only
  * OCSP (non-stapled) leaks information about the sites you visit to the CA (cert authority)
@@ -815,7 +816,7 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
        scheme+host+port+path: https://example.com:8888/foo/bar.html
             scheme+host+port: https://example.com:8888
      ---
-     #Required reading [#] https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
+     [1] https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
 ***/
 user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
 /* 1601: ALL: control when images/links send a referer
@@ -1250,8 +1251,8 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
 user_pref("network.cookie.cookieBehavior", 1);
 user_pref("browser.contentblocking.category", "custom");
 /* 2702: set third-party cookies (if enabled, see 2701) to session-only
-   [NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and
-   .nonsecureSessionOnly=true. This allows you to keep HTTPS cookies, but session-only HTTP ones
+ * [NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and
+ * .nonsecureSessionOnly=true. This allows you to keep HTTPS cookies, but session-only HTTP ones
  * [1] https://feeding.cloud.geek.nz/posts/tweaking-cookies-for-privacy-in-firefox/ ***/
 user_pref("network.cookie.thirdparty.sessionOnly", true);
 user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
@@ -1449,7 +1450,7 @@ user_pref("privacy.firstparty.isolate", true);
    1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74+)
  FF78+
    1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78+)
-   1653987 - limit font visibility to bundled and "Base Fonts" (see 4618) (non-ANDROID) (FF80+)
+   1653987 - limit font visibility to bundled and "Base Fonts" (see 4618) (Windows, Mac, some Linux) (FF80+)
    1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");

From 74f804a0567181049b7653475ba3653ee5c1643b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 25 May 2021 18:19:22 +0000
Subject: [PATCH 0779/1147] 1243: more dead flash

---
 user.js | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 82878bf..65dfd4b 100644
--- a/user.js
+++ b/user.js
@@ -716,9 +716,6 @@ user_pref("security.pki.crlite_mode", 2);
 user_pref("security.mixed_content.block_active_content", true); // [DEFAULT: true]
 /* 1241: disable insecure passive content (such as images) on https pages [SETUP-WEB] ***/
 user_pref("security.mixed_content.block_display_content", true);
-/* 1243: block unencrypted requests from Flash on encrypted pages to mitigate MitM attacks [FF59+]
- * [1] https://bugzilla.mozilla.org/1190623 ***/
-user_pref("security.mixed_content.block_object_subrequest", true);
 /* 1244: enable HTTPS-Only mode [FF76+]
  * When "https_only_mode" (all windows) is true, "https_only_mode_pbm" (private windows only) is ignored
  * [SETTING] to add site exceptions: Padlock>HTTPS-Only mode>On/Off/Off temporarily
@@ -1687,6 +1684,10 @@ user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
 // 0310: disable sending the URL of the website where a plugin crashed
    // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]
 user_pref("dom.ipc.plugins.reportCrashURL", false);
+// 1243: block unencrypted requests from Flash on encrypted pages to mitigate MitM attacks [FF59+]
+   // [1] https://bugzilla.mozilla.org/1190623
+   // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]
+user_pref("security.mixed_content.block_object_subrequest", true);
 // 1803: disable Flash plugin
   // 0=deactivated, 1=ask, 2=enabled
   // ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash

From b6d7b2bff53b1a87b8bfdbb28ba0c019eadadfbb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 1 Jun 2021 11:02:30 +0000
Subject: [PATCH 0780/1147] RFP info tweak

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 65dfd4b..bef679e 100644
--- a/user.js
+++ b/user.js
@@ -1406,7 +1406,7 @@ user_pref("privacy.firstparty.isolate", true);
  FF56+
    1369303 - spoof/disable performance API (see 4602, 4603)
    1333651 - spoof User Agent & Navigator API (see section 4700)
-      JS: FF78+ the version is spoofed as 78, and the OS as Windows 10, OS 10.15, Android 9, or Linux
+      JS: FF78+ the version is spoofed as ESR, and the OS as Windows 10, OS 10.15, Android 9 (FF91+ as 10), or Linux
       HTTP Headers: spoofed as Windows or Android
    1369319 - disable device sensor API (see 4604)
    1369357 - disable site specific zoom (see 4605)

From d973e1171415282d1a2b7a88dbafd1e6d3a0e549 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 5 Jun 2021 17:36:56 +0000
Subject: [PATCH 0781/1147] add instagram word, closes #1184

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index bef679e..42243e4 100644
--- a/user.js
+++ b/user.js
@@ -824,7 +824,7 @@ user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
    // user_pref("network.http.referer.trimmingPolicy", 0);
 /* 1603: CROSS ORIGIN: control when to send a referer
  * 0=always (default), 1=only if base domains match, 2=only if hosts match
- * [SETUP-WEB] Known to cause issues with older modems/routers and some sites e.g vimeo, icloud ***/
+ * [SETUP-WEB] Known to cause issues with older modems/routers and some sites e.g vimeo, icloud, instagram ***/
 user_pref("network.http.referer.XOriginPolicy", 2);
 /* 1604: CROSS ORIGIN: control the amount of information to send [FF52+]
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/

From ada31d4f504d666530c038d9cf75fcfbb940ba67 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 6 Jun 2021 18:01:56 +0000
Subject: [PATCH 0782/1147] v3.1 - (mostly) fix diff functionality

see #1188

this should fix the issue that "All prefs after a multi-line comment declaration, on a single line, are deleted with the remove_comments function from the updater."
---
 updater.sh | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/updater.sh b/updater.sh
index e265445..c054a22 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## arkenfox user.js updater for macOS and Linux
 
-## version: 3.0
+## version: 3.1
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac
 
@@ -236,7 +236,7 @@ add_override () {
 }
 
 remove_comments () { # expects 2 arguments: from-file and to-file
-  sed -e 's/^[[:space:]]*\/\/.*$//' -e '/^\/\*/,/\*\//d' -e '/^[[:space:]]*$/d' -e 's/);[[:space:]]*\/\/.*/);/' "$1" > "$2"
+  sed -e 's/^[[:space:]]*\/\/.*$//' -e '/^\/\*.\+\*\/[[:space:]]*$/d' -e '/^\/\*/,/\*\//d' -e '/^[[:space:]]*$/d' -e 's/);[[:space:]]*\/\/.*/);/' "$1" > "$2"
 }
 
 # Applies latest version of user.js and any custom overrides

From 6968b9a369c30f912195e56c132f6357c00ba8e8 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 6 Jun 2021 21:30:14 +0000
Subject: [PATCH 0783/1147] v3.2 - proper fix for the diff issue

- re-arrange the match patterns to fix the remaining issue of dropping lines after the 9999 block
- make it work on Mac too
- use `|` where possible so we don't need to escape the forward-slashes. That saves a few bytes and makes the pattern easier to read
---
 updater.sh | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/updater.sh b/updater.sh
index c054a22..6f761c9 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## arkenfox user.js updater for macOS and Linux
 
-## version: 3.1
+## version: 3.2
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac
 
@@ -236,7 +236,7 @@ add_override () {
 }
 
 remove_comments () { # expects 2 arguments: from-file and to-file
-  sed -e 's/^[[:space:]]*\/\/.*$//' -e '/^\/\*.\+\*\/[[:space:]]*$/d' -e '/^\/\*/,/\*\//d' -e '/^[[:space:]]*$/d' -e 's/);[[:space:]]*\/\/.*/);/' "$1" > "$2"
+  sed -e '/^\/\*.*\*\/[[:space:]]*$/d' -e '/^\/\*/,/\*\//d' -e 's|^[[:space:]]*//.*$||' -e '/^[[:space:]]*$/d' -e 's|);[[:space:]]*//.*|);|' "$1" > "$2"
 }
 
 # Applies latest version of user.js and any custom overrides

From 9018577a3e4880b881981e801891a3531c433aba Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 7 Jun 2021 11:18:40 +0000
Subject: [PATCH 0784/1147] v1.4 (#1189)

- add -s parameter to start immediately / skip prompt / run non-interactive

This is useful if the user wants to automate the process of updating the user.js and cleaning prefs.

- fQuit: error messages to stderr
- fFF_check: info msg to stderr

Better support for suppressing/redirecting stdout while still showing any error messages in the console, useful for example with `prefsCleaner.sh -s >/dev/null`
---
 prefsCleaner.sh | 49 ++++++++++++++++++++++++++++++++-----------------
 1 file changed, 32 insertions(+), 17 deletions(-)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index c9d92d9..60cf70e 100644
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -2,7 +2,7 @@
 
 ## prefs.js cleaner for Linux/Mac
 ## author: @claustromaniac
-## version: 1.3
+## version: 1.4
 
 ## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
 
@@ -20,15 +20,22 @@ cd "$(dirname "${sfp}")"
 fQuit() {
 	## change directory back to the original working directory
 	cd "${currdir}"
-	echo -e "\n$2"
+	[ $1 -eq 0 ] && echo -e "\n$2" || echo -e "\n$2" >&2
 	exit $1
 }
 
+fUsage() {
+	echo -e "\nUsage: $0 [-s]"
+	echo -e "
+Optional Arguments:
+    -s           Start immediately"
+}
+
 fFF_check() {
 	# there are many ways to see if firefox is running or not, some more reliable than others
 	# this isn't elegant and might not be future-proof but should at least be compatible with any environment
 	while [ -e lock ]; do
-		echo -e "\nThis Firefox profile seems to be in use. Close Firefox and try again.\n"
+		echo -e "\nThis Firefox profile seems to be in use. Close Firefox and try again.\n" >&2
 		read -p "Press any key to continue."
 	done
 }
@@ -54,34 +61,42 @@ fClean() {
 	done < "$1" > prefs.js
 }
 
+fStart() {
+	if [ ! -e user.js ]; then
+		fQuit 1 "user.js not found in the current directory."
+	elif [ ! -e prefs.js ]; then
+		fQuit 1 "prefs.js not found in the current directory."
+	fi
+
+	fFF_check
+	bakfile="prefs.js.backup.$(date +"%Y-%m-%d_%H%M")"
+	mv prefs.js "${bakfile}" || fQuit 1 "Operation aborted.\nReason: Could not create backup file $bakfile"
+	echo -e "\nprefs.js backed up: $bakfile"
+	echo "Cleaning prefs.js..."
+	fClean "$bakfile"
+	fQuit 0 "All done!"
+}
+
 echo -e "\n\n"
 echo "                   ╔══════════════════════════╗"
 echo "                   ║     prefs.js cleaner     ║"
 echo "                   ║    by claustromaniac     ║"
-echo "                   ║           v1.3           ║"
+echo "                   ║           v1.4           ║"
 echo "                   ╚══════════════════════════╝"
 echo -e "\nThis script should be run from your Firefox profile directory.\n"
 echo "It will remove any entries from prefs.js that also exist in user.js."
 echo "This will allow inactive preferences to be reset to their default values."
 echo -e "\nThis Firefox profile shouldn't be in use during the process.\n"
+
+[ "$1" == '-s' ] && fStart
+
 select option in Start Help Exit; do
 	case $option in
 		Start)
-			if [ ! -e user.js ]; then
-				fQuit 1 "user.js not found in the current directory."
-			elif [ ! -e prefs.js ]; then
-				fQuit 1 "prefs.js not found in the current directory."
-			fi
-
-			fFF_check
-			bakfile="prefs.js.backup.$(date +"%Y-%m-%d_%H%M")"
-			mv prefs.js "${bakfile}" || fQuit 1 "Operation aborted.\nReason: Could not create backup file $bakfile"
-			echo -e "\nprefs.js backed up: $bakfile"
-			echo "Cleaning prefs.js..."
-			fClean "$bakfile"
-			fQuit 0 "All done!"
+			fStart
 			;;
 		Help)
+			fUsage
 			echo -e "\nThis script creates a backup of your prefs.js file before doing anything."
 			echo -e "It should be safe, but you can follow these steps if something goes wrong:\n"
 			echo "1. Make sure Firefox is closed."

From efcceaf2c36e42f503cc80b9a1aae1e03f9190a8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 15 Jun 2021 09:55:42 +0000
Subject: [PATCH 0785/1147] enforce non-native widget theme

---
 user.js | 11 +++++++++--
 1 file changed, 9 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 42243e4..42500d7 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 25 April 2021
-* version 89-alpha
+* date: 15 June 2021
+* version 89
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -38,6 +38,7 @@
     - If you are not using arkenfox v78... (not a definitive list)
       - 1244: HTTPS-Only mode is enabled
       - 1401: document fonts is inactive as it is now covered by RFP in FF80+
+      - 2626: non-native widget theme is enforced
       - 4600: some prefs may apply even if you use RFP
       - 9999: switch the appropriate deprecated section(s) back on
 
@@ -1178,6 +1179,12 @@ user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+]
 /* 2625: disable bypassing 3rd party extension install prompts [FF82+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1659530,1681331 ***/
 user_pref("extensions.postDownloadThirdPartyPrompt", false);
+/* 2626: enforce non-native widget theme
+ * Security: removes/reduces system API calls, e.g. win32k API [1]
+ * Fingerprinting: provides a uniform look and feel across platforms [2]
+ * [1] https://bugzilla.mozilla.org/1381938
+ * [2] https://bugzilla.mozilla.org/1411425 ***/
+user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true FF89+]
 
 /** DOWNLOADS ***/
 /* 2650: discourage downloading to desktop

From 12c063190098b6a62e0671db0f704939678811eb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 16 Jun 2021 16:48:14 +0000
Subject: [PATCH 0786/1147] 4501: remove confusing RFP line

---
 user.js | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 42500d7..96cf304 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 15 June 2021
-* version 89
+* date: 16 June 2021
+* version 90-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -1459,7 +1459,6 @@ user_pref("privacy.firstparty.isolate", true);
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]
- * This pref is the master switch for all other privacy.resist* prefs unless stated
  * [SETUP-WEB] RFP can cause the odd website to break in strange ways, and has a few side affects,
  * but is largely robust nowadays. Give it a try. Your choice. Also see 4504 (letterboxing).
  * [1] https://bugzilla.mozilla.org/418986 ***/

From c98606430c770dab1386756c60c55c6d49e3f260 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 20 Jun 2021 09:29:38 +0000
Subject: [PATCH 0787/1147] move 2505 to RFP alts, closes #1099

---
 user.js | 46 +++++++++++++++++++++++-----------------------
 1 file changed, 23 insertions(+), 23 deletions(-)

diff --git a/user.js b/user.js
index 96cf304..cba1306 100644
--- a/user.js
+++ b/user.js
@@ -782,7 +782,7 @@ user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 /* 1401: disable websites choosing fonts (0=block, 1=allow)
  * This can limit most (but not all) JS font enumeration which is a high entropy fingerprinting vector
- * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4618)
+ * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4619)
  * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Allow pages to choose... ***/
    // user_pref("browser.display.use_document_fonts", 0);
 /* 1403: disable icon fonts (glyphs) and local fallback rendering
@@ -800,8 +800,8 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
  * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed
- * [NOTE] In FF81+ the whitelist **overrides** RFP's font visibility (see 4618)
- * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4618)
+ * [NOTE] In FF81+ the whitelist **overrides** RFP's font visibility (see 4619)
+ * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4619)
  * [1] https://bugzilla.mozilla.org/1121643 ***/
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
 
@@ -1065,11 +1065,6 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * [NOTE] From FF52+ Battery Status API is only available in chrome/privileged code [1]
  * [1] https://bugzilla.mozilla.org/1313580 ***/
    // user_pref("dom.battery.enabled", false);
-/* 2505: disable media device enumeration [FF29+]
- * [NOTE] media.peerconnection.enabled should also be set to false (see 2001)
- * [1] https://wiki.mozilla.org/Media/getUserMedia
- * [2] https://developer.mozilla.org/docs/Web/API/MediaDevices/enumerateDevices ***/
-user_pref("media.navigator.enabled", false);
 /* 2508: disable hardware acceleration to reduce graphics fingerprinting [SETUP-HARDEN]
  * [WARNING] Affects text rendering (fonts will look different), impacts video performance,
  * and parts of Quantum that utilize the GPU will also be affected as they are rolled out
@@ -1433,28 +1428,28 @@ user_pref("privacy.firstparty.isolate", true);
  FF59+
    1372073 - spoof/block fingerprinting in MediaDevices API
       Spoof: enumerate devices reports one "Internal Camera" and one "Internal Microphone" if
-             media.navigator.enabled is true (see 2505 which we chose to keep disabled)
-      Block: suppresses the ondevicechange event (see 4612)
+             media.navigator.enabled is true (see 4612 which we chose to keep disabled)
+      Block: suppresses the ondevicechange event (see 4613)
    1039069 - warn when language prefs are set to non en-US (see 0210, 0211)
    1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events
       Spoofing mimics the content language of the document. Currently it only supports en-US.
       Modifier events suppressed are SHIFT and both ALT keys. Chrome is not affected.
  FF60-67
-   1337157 - disable WebGL debug renderer info (see 4613) (FF60+)
+   1337157 - disable WebGL debug renderer info (see 4614) (FF60+)
    1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62+)
-   1479239 - return "no-preference" with prefers-reduced-motion (see 4614) (FF63+)
-   1363508 - spoof/suppress Pointer Events (see 4615) (FF64+)
+   1479239 - return "no-preference" with prefers-reduced-motion (see 4615) (FF63+)
+   1363508 - spoof/suppress Pointer Events (see 4616) (FF64+)
       FF65: pointerEvent.pointerid (1492766)
-   1485266 - disable exposure of system colors to CSS or canvas (see 4616) (FF67+)
+   1485266 - disable exposure of system colors to CSS or canvas (see 4617) (FF67+)
    1407366 - enable inner window letterboxing (see 4504) (FF67+)
-   1494034 - return "light" with prefers-color-scheme (see 4617) (FF67+)
+   1494034 - return "light" with prefers-color-scheme (see 4618) (FF67+)
  FF68-77
    1564422 - spoof audioContext outputLatency (FF70+)
    1595823 - spoof audioContext sampleRate (FF72+)
    1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74+)
  FF78+
    1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78+)
-   1653987 - limit font visibility to bundled and "Base Fonts" (see 4618) (Windows, Mac, some Linux) (FF80+)
+   1653987 - limit font visibility to bundled and "Base Fonts" (see 4619) (Windows, Mac, some Linux) (FF80+)
    1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
@@ -1549,35 +1544,40 @@ user_pref("media.video_stats.enabled", false);
    // [2] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/10286
    // user_pref("dom.w3c_touch_events.enabled", 0);
 // FF59+
-// 4612: [2511] disable MediaDevices change detection [FF51+]
+// 4612: [2505] disable media device enumeration [FF29+]
+   // [NOTE] media.peerconnection.enabled should also be set to false (see 2001)
+   // [1] https://wiki.mozilla.org/Media/getUserMedia
+   // [2] https://developer.mozilla.org/docs/Web/API/MediaDevices/enumerateDevices
+user_pref("media.navigator.enabled", false);
+// 4613: [2511] disable MediaDevices change detection [FF51+]
    // [1] https://developer.mozilla.org/docs/Web/Events/devicechange
    // [2] https://developer.mozilla.org/docs/Web/API/MediaDevices/ondevicechange
 user_pref("media.ondevicechange.enabled", false);
 // FF60+
-// 4613: [2011] disable WebGL debug info being available to websites
+// 4614: [2011] disable WebGL debug info being available to websites
    // [1] https://bugzilla.mozilla.org/1171228
    // [2] https://developer.mozilla.org/docs/Web/API/WEBGL_debug_renderer_info
 user_pref("webgl.enable-debug-renderer-info", false);
 // FF63+
-// 4614: enforce prefers-reduced-motion as no-preference [FF63+] [RESTART]
+// 4615: enforce prefers-reduced-motion as no-preference [FF63+] [RESTART]
    // 0=no-preference, 1=reduce
 user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
 // FF64+
-// 4615: [2516] disable PointerEvents [FF86 or lower]
+// 4616: [2516] disable PointerEvents [FF86 or lower]
    // [1] https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent
    // [-] https://bugzilla.mozilla.org/1688105
 user_pref("dom.w3c_pointer_events.enabled", false);
 // FF67+
-// 4616: [2618] disable exposure of system colors to CSS or canvas [FF44+]
+// 4617: [2618] disable exposure of system colors to CSS or canvas [FF44+]
    // [NOTE] See second listed bug: may cause black on black for elements with undefined colors
    // [SETUP-CHROME] Might affect CSS in themes and extensions
    // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876
 user_pref("ui.use_standins_for_native_colors", true);
-// 4617: enforce prefers-color-scheme as light [FF67+]
+// 4618: enforce prefers-color-scheme as light [FF67+]
    // 0=light, 1=dark : This overrides your OS value
 user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
 // FF80+
-// 4618: limit font visibility (non-ANDROID) [FF79+]
+// 4619: limit font visibility (non-ANDROID) [FF79+]
    // Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1]
    // 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
    // [NOTE] Bundled fonts are auto-allowed

From b93a5e334c1f66d1a2cb7b7b79dfe506805c888e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 20 Jun 2021 12:49:57 +0000
Subject: [PATCH 0788/1147] 2510 webaudio -> inactive RFP alts, closes #1194

---
 user.js | 21 +++++++++++----------
 1 file changed, 11 insertions(+), 10 deletions(-)

diff --git a/user.js b/user.js
index cba1306..928d15b 100644
--- a/user.js
+++ b/user.js
@@ -782,7 +782,7 @@ user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 /* 1401: disable websites choosing fonts (0=block, 1=allow)
  * This can limit most (but not all) JS font enumeration which is a high entropy fingerprinting vector
- * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4619)
+ * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4620)
  * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Allow pages to choose... ***/
    // user_pref("browser.display.use_document_fonts", 0);
 /* 1403: disable icon fonts (glyphs) and local fallback rendering
@@ -800,8 +800,8 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
  * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed
- * [NOTE] In FF81+ the whitelist **overrides** RFP's font visibility (see 4619)
- * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4619)
+ * [NOTE] In FF81+ the whitelist **overrides** RFP's font visibility (see 4620)
+ * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4620)
  * [1] https://bugzilla.mozilla.org/1121643 ***/
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
 
@@ -1072,9 +1072,6 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * [1] https://wiki.mozilla.org/Platform/GFX/HardwareAcceleration ***/
    // user_pref("gfx.direct2d.disabled", true); // [WINDOWS]
    // user_pref("layers.acceleration.disabled", true);
-/* 2510: disable Web Audio API [FF51+]
- * [1] https://bugzilla.mozilla.org/1288359 ***/
-user_pref("dom.webaudio.enabled", false);
 /* 2517: disable Media Capabilities API [FF63+]
  * [WARNING] This *may* affect media performance if disabled, no one is sure
  * [1] https://github.com/WICG/media-capabilities
@@ -1444,12 +1441,12 @@ user_pref("privacy.firstparty.isolate", true);
    1407366 - enable inner window letterboxing (see 4504) (FF67+)
    1494034 - return "light" with prefers-color-scheme (see 4618) (FF67+)
  FF68-77
-   1564422 - spoof audioContext outputLatency (FF70+)
-   1595823 - spoof audioContext sampleRate (FF72+)
+   1564422 - spoof audioContext outputLatency (see 4619) (FF70+)
+   1595823 - return audioContext sampleRate as 44100 (see 4619) (FF72+)
    1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74+)
  FF78+
    1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78+)
-   1653987 - limit font visibility to bundled and "Base Fonts" (see 4619) (Windows, Mac, some Linux) (FF80+)
+   1653987 - limit font visibility to bundled and "Base Fonts" (see 4620) (Windows, Mac, some Linux) (FF80+)
    1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
@@ -1576,8 +1573,12 @@ user_pref("ui.use_standins_for_native_colors", true);
 // 4618: enforce prefers-color-scheme as light [FF67+]
    // 0=light, 1=dark : This overrides your OS value
 user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
+// FF72+
+// 4619: [2510] disable Web Audio API [FF51+]
+   // [1] https://bugzilla.mozilla.org/1288359
+   // user_pref("dom.webaudio.enabled", false);
 // FF80+
-// 4619: limit font visibility (non-ANDROID) [FF79+]
+// 4620: limit font visibility (non-ANDROID) [FF79+]
    // Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1]
    // 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
    // [NOTE] Bundled fonts are auto-allowed

From a6d20eaf5b4d6fc306257cf56beb89595c6be173 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 23 Jun 2021 16:22:10 +0000
Subject: [PATCH 0789/1147] 1264: update ciphers, fixes #1196 (#1197)

---
 user.js | 6 ++++--
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 928d15b..7d5b929 100644
--- a/user.js
+++ b/user.js
@@ -740,8 +740,8 @@ user_pref("dom.security.https_only_mode_send_http_background_request", false);
    // user_pref("dom.securecontext.whitelist_onions", true);
 
 /** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro]
- * These are all the ciphers still using SHA-1 and CBC which are weaker than the available alternatives. (see "Cipher Suites" in [1])
- * Additionally some have other weaknesses like key sizes of 128 (or lower) [2] and/or no Perfect Forward Secrecy [3].
+ * These are the ciphers listed under "Cipher Suites" [1] that are either still using SHA-1 and CBC,
+ * and/or are missing Perfect Forward Secrecy [3] and/or have other weaknesses like key sizes of 128
  * [1] https://browserleaks.com/ssl
  * [2] https://en.wikipedia.org/wiki/Key_size
  * [3] https://en.wikipedia.org/wiki/Forward_secrecy
@@ -756,6 +756,8 @@ user_pref("dom.security.https_only_mode_send_http_background_request", false);
    // user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
    // user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
    // user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false);
+   // user_pref("security.ssl3.rsa_aes_128_gcm_sha256", false); // no PFS
+   // user_pref("security.ssl3.rsa_aes_256_gcm_sha384", false); // no PFS
    // user_pref("security.ssl3.rsa_aes_128_sha", false); // no PFS
    // user_pref("security.ssl3.rsa_aes_256_sha", false); // no PFS
 

From d940ffb3c6294ad30b1ffc2027b5b3b03c8744f3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 6 Jul 2021 06:32:58 +0000
Subject: [PATCH 0790/1147] 105c: add "sponsored shortcuts"

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 7d5b929..0ee1997 100644
--- a/user.js
+++ b/user.js
@@ -123,6 +123,7 @@ user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
 user_pref("browser.newtabpage.activity-stream.showSponsored", false);
 user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false); // [FF66+]
+user_pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); // [FF83+]
 /* 0105e: clear default topsites
  * [NOTE] This does not block you from adding your own ***/
 user_pref("browser.newtabpage.activity-stream.default.sites", "");

From 981462ee54cd627682038b7e5251ae706c7743be Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 6 Jul 2021 13:26:44 +0000
Subject: [PATCH 0791/1147] FF90 deprecated

---
 user.js | 22 ++++++++++++----------
 1 file changed, 12 insertions(+), 10 deletions(-)

diff --git a/user.js b/user.js
index 0ee1997..b00bb63 100644
--- a/user.js
+++ b/user.js
@@ -407,8 +407,6 @@ user_pref("network.http.altsvc.oe", false);
  * as a remote Tor node will handle the DNS request
  * [1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
 user_pref("network.proxy.socks_remote_dns", true);
-/* 0708: disable FTP [FF60+] ***/
-   // user_pref("network.ftp.enabled", false); // [DEFAULT: false FF88+]
 /* 0709: disable using UNC (Uniform Naming Convention) paths [FF61+]
  * [SETUP-CHROME] Can break extensions for profiles on network shares
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/26424 ***/
@@ -1273,10 +1271,8 @@ user_pref("privacy.trackingprotection.socialtracking.enabled", true);
  * [WARNING] This will break a LOT of sites' functionality AND extensions!
  * You are better off using an extension for more granular control ***/
    // user_pref("dom.storage.enabled", false);
-/* 2730: enforce no offline cache storage (appCache)
- * The API is easily fingerprinted, use the "storage" pref instead ***/
-   // user_pref("browser.cache.offline.enable", false);
-user_pref("browser.cache.offline.storage.enable", false); // [FF71+] [DEFAULT: false FF84+]
+/* 2730: enforce no offline cache storage (appCache) [FF71+] ***/
+user_pref("browser.cache.offline.storage.enable", false); // [DEFAULT: false FF84+]
 /* 2740: disable service worker cache and cache storage
  * [NOTE] We clear service worker cache on exiting Firefox (see 2803)
  * [1] https://w3c.github.io/ServiceWorker/#privacy ***/
@@ -1699,11 +1695,17 @@ user_pref("dom.ipc.plugins.reportCrashURL", false);
    // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]
 user_pref("security.mixed_content.block_object_subrequest", true);
 // 1803: disable Flash plugin
-  // 0=deactivated, 1=ask, 2=enabled
-  // ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash
-  // [NOTE] You can still override individual sites via site permissions
-  // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]
+   // 0=deactivated, 1=ask, 2=enabled
+   // ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash
+   // [NOTE] You can still override individual sites via site permissions
+   // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]
 user_pref("plugin.state.flash", 0); // [DEFAULT: 1]
+// FF90
+// 0708: disable FTP [FF60+]
+   // user_pref("network.ftp.enabled", false); // [DEFAULT: false FF88+]
+// 2730: disable offline cache (appCache)
+  // The API is easily fingerprinted, use "browser.cache.offline.storage.enable" instead
+  // user_pref("browser.cache.offline.enable", false);
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From f229a3cb753e59c06ab9ba43eec455db831ca452 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 7 Jul 2021 11:51:44 +0000
Subject: [PATCH 0792/1147] fixup FF90 deprecated (#1207)

---
 user.js | 13 ++++++++-----
 1 file changed, 8 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index b00bb63..2313b78 100644
--- a/user.js
+++ b/user.js
@@ -1271,8 +1271,10 @@ user_pref("privacy.trackingprotection.socialtracking.enabled", true);
  * [WARNING] This will break a LOT of sites' functionality AND extensions!
  * You are better off using an extension for more granular control ***/
    // user_pref("dom.storage.enabled", false);
-/* 2730: enforce no offline cache storage (appCache) [FF71+] ***/
-user_pref("browser.cache.offline.storage.enable", false); // [DEFAULT: false FF84+]
+/* 2730: disable offline cache (appCache)
+ * [NOTE] In FF90+ the storage (not the API) is disabled. For FF78-89 see the 2730 deprecated pref
+ * [WARNING] The API is easily fingerprinted, do not disable ***/
+   // user_pref("browser.cache.offline.enable", false);
 /* 2740: disable service worker cache and cache storage
  * [NOTE] We clear service worker cache on exiting Firefox (see 2803)
  * [1] https://w3c.github.io/ServiceWorker/#privacy ***/
@@ -1702,10 +1704,11 @@ user_pref("security.mixed_content.block_object_subrequest", true);
 user_pref("plugin.state.flash", 0); // [DEFAULT: 1]
 // FF90
 // 0708: disable FTP [FF60+]
+   // [-] https://bugzilla.mozilla.org/1574475
    // user_pref("network.ftp.enabled", false); // [DEFAULT: false FF88+]
-// 2730: disable offline cache (appCache)
-  // The API is easily fingerprinted, use "browser.cache.offline.storage.enable" instead
-  // user_pref("browser.cache.offline.enable", false);
+// 2730: enforce no offline cache storage (appCache) [FF71+]
+   // [-] https://bugzilla.mozilla.org/1694662
+user_pref("browser.cache.offline.storage.enable", false); // [DEFAULT: false FF84+]
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From a231c1e90e64d345b3002e2f2ace6aae8b17069c Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 7 Jul 2021 14:10:24 +0000
Subject: [PATCH 0793/1147] Update arkenfox-clear-RFP-alternatives.js

---
 .../arkenfox-clear-RFP-alternatives.js        | 57 ++++++++++---------
 1 file changed, 29 insertions(+), 28 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js b/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
index 4be4b81..b9a1b29 100644
--- a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
+++ b/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
@@ -1,16 +1,19 @@
 /***
- Version: up to and including FF/ESR78
+  Version: up to and including FF/ESR78
 
- This will reset the preferences that are under sections 4600 & 4700 in the
- arkenfox user.js. These are the prefs that are no longer necessary, or they
- conflict with, privacy.resistFingerprinting if you have that enabled.
+  This will reset the preferences that are under sections 4600 & 4700 in the
+  arkenfox user.js. These are the prefs that are no longer necessary, or they
+  conflict with, privacy.resistFingerprinting if you have that enabled.
 
- For instructions see:
- https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
+  For instructions see:
+  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
 ***/
- 
-(function() {
-  let ops = [
+
+(() => {
+
+  if ("undefined" === typeof(Services)) return alert('about:config needs to be the active tab!');
+
+  const aPREFS = [
     /* section 4600 */
     'dom.maxHardwareConcurrency',
     'dom.enable_resource_timing',
@@ -37,29 +40,27 @@
     'general.oscpu.override',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
-  ]
+  ];
+
+  console.clear();
 
-  if("undefined" === typeof(Services)) {
-    alert("about:config needs to be the active tab!");
-    return;
-  }
-  
   let c = 0;
-  for (let i = 0, len = ops.length; i < len; i++) {
-    if (Services.prefs.prefHasUserValue(ops[i])) {   
-      Services.prefs.clearUserPref(ops[i]);
-      if (!Services.prefs.prefHasUserValue(ops[i])) {
-        console.log("reset", ops[i]);
+  for (const sPname of aPREFS) {
+    if (Services.prefs.prefHasUserValue(sPname)) {
+      Services.prefs.clearUserPref(sPname);
+      if (!Services.prefs.prefHasUserValue(sPname)) {
+        console.info("reset", sPname);
         c++;
-      } else { console.log("failed to reset", ops[i]); }
+      } else console.warn("failed to reset", sPname);
     }
   }
-  
+
   focus();
-  
-  let d = (c==1) ? " pref" : " prefs";
-  if (c > 0) {
-    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
-  } else { alert("nothing to reset"); }
-  
+
+  const d = (c==1) ? " pref" : " prefs";
+  alert(c ? "successfully reset " + c + d + "\n\nfor details check the console" : 'nothing to reset');
+
+  return 'all done';
+
 })();
+

From 3b573bf9f0f69dcc26c6d20c41056ca4c6e7503f Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 7 Jul 2021 14:15:51 +0000
Subject: [PATCH 0794/1147] Update arkenfox-clear-RFP-alternatives.js

---
 scratchpad-scripts/arkenfox-clear-RFP-alternatives.js | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js b/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
index b9a1b29..c82c5fa 100644
--- a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
+++ b/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
@@ -11,7 +11,7 @@
 
 (() => {
 
-  if ("undefined" === typeof(Services)) return alert('about:config needs to be the active tab!');
+  if ('undefined' === typeof(Services)) return alert('about:config needs to be the active tab!');
 
   const aPREFS = [
     /* section 4600 */
@@ -49,16 +49,16 @@
     if (Services.prefs.prefHasUserValue(sPname)) {
       Services.prefs.clearUserPref(sPname);
       if (!Services.prefs.prefHasUserValue(sPname)) {
-        console.info("reset", sPname);
+        console.info('reset', sPname);
         c++;
-      } else console.warn("failed to reset", sPname);
+      } else console.warn('failed to reset', sPname);
     }
   }
 
   focus();
 
-  const d = (c==1) ? " pref" : " prefs";
-  alert(c ? "successfully reset " + c + d + "\n\nfor details check the console" : 'nothing to reset');
+  const d = (c==1) ? ' pref' : ' prefs';
+  alert(c ? 'successfully reset ' + c + d + "\n\nfor details check the console" : 'nothing to reset');
 
   return 'all done';
 

From 939d75e5ebb886708abfdd5c3cd4ade171f9a650 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 7 Jul 2021 14:25:08 +0000
Subject: [PATCH 0795/1147] Update arkenfox-clear-removed.js

---
 scratchpad-scripts/arkenfox-clear-removed.js | 52 ++++++++++----------
 1 file changed, 26 insertions(+), 26 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 5b05072..f460c6e 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,14 +1,17 @@
 /***
- This will reset the preferences that have been removed completely from the arkenfox user.js.
+  This will reset the preferences that have been removed completely from the arkenfox user.js.
 
- Last updated: 25-May-2021
+  Last updated: 25-May-2021
 
- For instructions see:
- https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
+  For instructions see:
+  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
 ***/
- 
-(function() {
-  let ops = [
+
+(() => {
+
+  if ('undefined' === typeof(Services)) return alert('about:config needs to be the active tab!');
+
+  const aPREFS = [
     /* removed in arkenfox user.js */
     /* 52-alpha */
     'browser.search.reset.enabled',
@@ -240,29 +243,26 @@
     'security.ssl.enable_ocsp_stapling',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
-  ]
+  ];
+
+  console.clear();
 
-  if("undefined" === typeof(Services)) {
-    alert("about:config needs to be the active tab!");
-    return;
-  }
-  
   let c = 0;
-  for (let i = 0, len = ops.length; i < len; i++) {
-    if (Services.prefs.prefHasUserValue(ops[i])) {   
-      Services.prefs.clearUserPref(ops[i]);
-      if (!Services.prefs.prefHasUserValue(ops[i])) {
-        console.log("reset", ops[i]);
+  for (const sPname of aPREFS) {
+    if (Services.prefs.prefHasUserValue(sPname)) {
+      Services.prefs.clearUserPref(sPname);
+      if (!Services.prefs.prefHasUserValue(sPname)) {
+        console.info('reset', sPname);
         c++;
-      } else { console.log("failed to reset", ops[i]); }
+      } else console.warn('failed to reset', sPname);
     }
   }
-  
+
   focus();
-  
-  let d = (c==1) ? " pref" : " prefs";
-  if (c > 0) {
-    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
-  } else { alert("nothing to reset"); }
-  
+
+  const d = (c==1) ? ' pref' : ' prefs';
+  alert(c ? 'successfully reset ' + c + d + "\n\nfor details check the console" : 'nothing to reset');
+
+  return 'all done';
+
 })();

From acc1376c37f6ac385f43095d1a7db4c395c97b19 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Wed, 7 Jul 2021 14:33:20 +0000
Subject: [PATCH 0796/1147] Update arkenfox-clear-deprecated.js

---
 .../arkenfox-clear-deprecated.js              | 54 +++++++++----------
 1 file changed, 27 insertions(+), 27 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-deprecated.js b/scratchpad-scripts/arkenfox-clear-deprecated.js
index 766dd33..e12f0f4 100644
--- a/scratchpad-scripts/arkenfox-clear-deprecated.js
+++ b/scratchpad-scripts/arkenfox-clear-deprecated.js
@@ -1,17 +1,20 @@
 /***
- Version: up to and including FF/ESR78
+  Version: up to and including FF/ESR78
 
- This will reset the preferences that have been deprecated by Mozilla
- and used in the arkenfox user.js
+  This will reset the preferences that have been deprecated by Mozilla
+  and used in the arkenfox user.js
 
- It is in reverse order, so feel free to remove sections that do not apply
+  It is in reverse order, so feel free to remove sections that do not apply
 
- For instructions see:
- https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
+  For instructions see:
+  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
 ***/
 
-(function() {
-  let ops = [
+(() => {
+
+  if ('undefined' === typeof(Services)) return alert('about:config needs to be the active tab!');
+
+  const aPREFS = [
     /* deprecated */
 
     /* 78 */
@@ -220,29 +223,26 @@
 
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
-  ]
+  ];
+
+  console.clear();
 
-  if("undefined" === typeof(Services)) {
-    alert("about:config needs to be the active tab!");
-    return;
-  }
-  
   let c = 0;
-  for (let i = 0, len = ops.length; i < len; i++) {
-    if (Services.prefs.prefHasUserValue(ops[i])) {   
-      Services.prefs.clearUserPref(ops[i]);
-      if (!Services.prefs.prefHasUserValue(ops[i])) {
-        console.log("reset", ops[i]);
+  for (const sPname of aPREFS) {
+    if (Services.prefs.prefHasUserValue(sPname)) {
+      Services.prefs.clearUserPref(sPname);
+      if (!Services.prefs.prefHasUserValue(sPname)) {
+        console.info('reset', sPname);
         c++;
-      } else { console.log("failed to reset", ops[i]); }
+      } else console.warn('failed to reset', sPname);
     }
   }
-  
+
   focus();
-  
-  let d = (c==1) ? " pref" : " prefs";
-  if (c > 0) {
-    alert("successfully reset " + c + d + "\n\nfor details check the Browser Console (Ctrl+Shift+J)");
-  } else { alert("nothing to reset"); }
-  
+
+  const d = (c==1) ? ' pref' : ' prefs';
+  alert(c ? 'successfully reset ' + c + d + "\n\nfor details check the console" : 'nothing to reset');
+
+  return 'all done';
+
 })();

From 31e864c16c95c4c9a4d8c4d0c151a7623b962f17 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 8 Jul 2021 06:21:53 +0000
Subject: [PATCH 0797/1147] 0913: disable windows SSO FF91+

- and make 2730 more accurate and add bugzilla
- future RFP additions will be FF91+
---
 user.js | 7 +++++--
 1 file changed, 5 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 2313b78..5d41699 100644
--- a/user.js
+++ b/user.js
@@ -536,6 +536,9 @@ user_pref("signon.formlessCapture.enabled", false);
  * 1=don't allow cross-origin sub-resources to open HTTP authentication credentials dialogs
  * 2=allow sub-resources to open HTTP authentication credentials dialogs (default) ***/
 user_pref("network.auth.subresource-http-auth-allow", 1);
+/* 0913: disable automatic authentication on Microsoft sites [FF91+] [WINDOWS]
+ * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1695693,1719301 ***/
+user_pref("network.http.windows-sso.enabled", false);
 
 /*** [SECTION 1000]: CACHE / SESSION (RE)STORE / FAVICONS
      Cache tracking/fingerprinting techniques [1][2][3] require a cache. Disabling disk (1001)
@@ -1272,7 +1275,7 @@ user_pref("privacy.trackingprotection.socialtracking.enabled", true);
  * You are better off using an extension for more granular control ***/
    // user_pref("dom.storage.enabled", false);
 /* 2730: disable offline cache (appCache)
- * [NOTE] In FF90+ the storage (not the API) is disabled. For FF78-89 see the 2730 deprecated pref
+ * [NOTE] In FF90+ the storage capability has been removed (1694662). For FF78-89 see the 2730 deprecated pref
  * [WARNING] The API is easily fingerprinted, do not disable ***/
    // user_pref("browser.cache.offline.enable", false);
 /* 2740: disable service worker cache and cache storage
@@ -1445,7 +1448,7 @@ user_pref("privacy.firstparty.isolate", true);
    1564422 - spoof audioContext outputLatency (see 4619) (FF70+)
    1595823 - return audioContext sampleRate as 44100 (see 4619) (FF72+)
    1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74+)
- FF78+
+ FF78-90
    1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78+)
    1653987 - limit font visibility to bundled and "Base Fonts" (see 4620) (Windows, Mac, some Linux) (FF80+)
    1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82+)

From 0da2ecdb4df27360d059c7e4fd2e5c658caa2aab Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 8 Jul 2021 06:41:59 +0000
Subject: [PATCH 0798/1147] keep current rather than every ESR

---
 .../arkenfox-clear-RFP-alternatives.js          | 17 ++++++++++-------
 1 file changed, 10 insertions(+), 7 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js b/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
index c82c5fa..92d619d 100644
--- a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
+++ b/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
@@ -1,10 +1,10 @@
 /***
-  Version: up to and including FF/ESR78
-
   This will reset the preferences that are under sections 4600 & 4700 in the
   arkenfox user.js. These are the prefs that are no longer necessary, or they
   conflict with, privacy.resistFingerprinting if you have that enabled.
 
+  Last updated: 08-July-2021
+
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
 ***/
@@ -25,19 +25,22 @@
     'media.webspeech.synth.enabled',
     'media.video_stats.enabled',
     'dom.w3c_touch_events.enabled',
+    'media.navigator.enabled',
     'media.ondevicechange.enabled',
     'webgl.enable-debug-renderer-info',
-    'dom.w3c_pointer_events.enabled',
+    'ui.prefersReducedMotion',
+    'dom.w3c_pointer_events.enabled', // deprecated FF87
     'ui.use_standins_for_native_colors',
     'ui.systemUsesDarkTheme',
-    'ui.prefersReducedMotion',
+    'dom.webaudio.enabled',
+    'layout.css.font-visibility.level',
     /* section 4700 */
-    'general.useragent.override',
-    'general.buildID.override',
     'general.appname.override',
     'general.appversion.override',
-    'general.platform.override',
+    'general.buildID.override',
     'general.oscpu.override',
+    'general.platform.override',
+    'general.useragent.override',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ];

From b761a9dd32f79395b0fca183ad8fe45f7e99d26f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 8 Jul 2021 07:08:38 +0000
Subject: [PATCH 0799/1147] 4505: experimental RFP prefs

and tidy up all instances (eight) of "do not use": all caps, no asterisks, immediately after [warning]
---
 user.js | 17 +++++++++++------
 1 file changed, 11 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 5d41699..79757b0 100644
--- a/user.js
+++ b/user.js
@@ -786,7 +786,7 @@ user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 /* 1401: disable websites choosing fonts (0=block, 1=allow)
  * This can limit most (but not all) JS font enumeration which is a high entropy fingerprinting vector
- * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4620)
+ * [WARNING] DO NOT USE: in FF80+ RFP covers this, and non-RFP users should use font vis (4620)
  * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Allow pages to choose... ***/
    // user_pref("browser.display.use_document_fonts", 0);
 /* 1403: disable icon fonts (glyphs) and local fallback rendering
@@ -805,7 +805,7 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
  * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed
  * [NOTE] In FF81+ the whitelist **overrides** RFP's font visibility (see 4620)
- * [WARNING] **DO NOT USE**: in FF80+ RFP covers this, and non-RFP users should use font vis (4620)
+ * [WARNING] DO NOT USE: in FF80+ RFP covers this, and non-RFP users should use font vis (4620)
  * [1] https://bugzilla.mozilla.org/1121643 ***/
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
 
@@ -1393,8 +1393,8 @@ user_pref("privacy.firstparty.isolate", true);
    RFP covers a wide range of ongoing fingerprinting solutions.
    It is an all-or-nothing buy in: you cannot pick and choose what parts you want
 
-   [WARNING] Do NOT use extensions to alter RFP protected metrics
-   [WARNING] Do NOT use prefs in section 4600 with RFP as they can interfere
+   [WARNING] DO NOT USE extensions to alter RFP protected metrics
+   [WARNING] DO NOT USE prefs in section 4600 with RFP as they can interfere
 
  FF41+
     418986 - limit window.screen & CSS media queries leaking identifiable info
@@ -1475,11 +1475,16 @@ user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDE
  * "width1xheight1, width2xheight2, ..." (e.g. "800x600, 1000x1000, 1600x900")
  * [SETUP-WEB] This does NOT require RFP (see 4501) **for now**, so if you're not using 4501, or you are but
  * dislike margins being applied, then flip this pref, keeping in mind that it is effectively fingerprintable
- * [WARNING] The dimension pref is only meant for testing, and we recommend you DO NOT USE it
+ * [WARNING] DO NOT USE: the dimension pref is only meant for testing
  * [1] https://bugzilla.mozilla.org/1407366
  * [2] https://hg.mozilla.org/mozilla-central/rev/6d2d7856e468#l2.32 ***/
 user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
    // user_pref("privacy.resistFingerprinting.letterboxing.dimensions", ""); // [HIDDEN PREF]
+/* 4505: experimental RFP [FF91+]
+ * [WARNING] DO NOT USE unless testing, see [1] comment 12
+ * [1] https://bugzilla.mozilla.org/1635603 ***/
+   // user_pref("privacy.resistFingerprinting.exemptedDomains", "*.example.invalid");
+   // user_pref("privacy.resistFingerprinting.testGranularityMask", 0);
 /* 4510: disable showing about:blank as soon as possible during startup [FF60+]
  * When default true this no longer masks the RFP chrome resizing activity
  * [1] https://bugzilla.mozilla.org/1448423 ***/
@@ -1489,7 +1494,7 @@ user_pref("browser.startup.blankWindow", false);
 user_pref("ui.prefersReducedMotion", 1); // [HIDDEN PREF]
 
 /*** [SECTION 4600]: RFP ALTERNATIVES
-     [WARNING] Do NOT use prefs in this section with RFP as they can interfere
+     [WARNING] DO NOT USE prefs in this section with RFP as they can interfere
 ***/
 user_pref("_user.js.parrot", "4600 syntax error: the parrot's crossed the Jordan");
 /* [SETUP-non-RFP] Non-RFP users replace the * with a slash on this line to enable these

From 3bb9fc713f141d794fc4adfb38d3fcf86c9307ab Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 20 Jul 2021 02:00:33 +0000
Subject: [PATCH 0800/1147] remove 1203

default false since it was added in FF71 - see https://bugzilla.mozilla.org/1579285
---
 user.js | 2 --
 1 file changed, 2 deletions(-)

diff --git a/user.js b/user.js
index 79757b0..af9c87d 100644
--- a/user.js
+++ b/user.js
@@ -641,8 +641,6 @@ user_pref("security.ssl.require_safe_negotiation", true);
  * [1] https://www.ssllabs.com/ssl-pulse/ ***/
    // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
    // user_pref("security.tls.version.max", 4);
-/* 1203: enforce TLS 1.0 and 1.1 downgrades as session only ***/
-user_pref("security.tls.version.enable-deprecated", false);
 /* 1204: disable SSL session tracking [FF36+]
  * SSL Session IDs are unique and last up to 24hrs in Firefox (or longer with prolongation attacks)
  * [NOTE] These are not used in PB mode. In normal windows they are isolated when using FPI (4001)

From 4c8c9bc01f214aee0bc60b76e4175ffff2bfca0d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 20 Jul 2021 02:02:26 +0000
Subject: [PATCH 0801/1147] security.tls.version.enable-deprecated

default false since it was added in FF71 - see https://bugzilla.mozilla.org/1579285
---
 scratchpad-scripts/arkenfox-clear-removed.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index f460c6e..e61e258 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
   This will reset the preferences that have been removed completely from the arkenfox user.js.
 
-  Last updated: 25-May-2021
+  Last updated: 20-July-2021
 
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -241,6 +241,8 @@
     'webgl.min_capability_mode',
     /* 89-beta */
     'security.ssl.enable_ocsp_stapling',
+    /* 90-beta */
+    'security.tls.version.enable-deprecated',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ];

From 44a8088481f3ee46b38f5a8549652e31a61973df Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 20 Jul 2021 02:51:52 +0000
Subject: [PATCH 0802/1147] tidy

- "enforce" is for when we set the default value
- use [WARNING] for inactive (they're inactive for a reason and people really do not need to turn them on) but less scary [NOTE] for active (tweak away at your own risk)
  - seems neater, easier and less scary for users setting up the first time: i.e they only need to initially look at active items
  - FYI: I was going to add something to LSNG (2760) that it is required for Fission, but will wait, and it struck me that 2680 was the only active item with a warning: seems inconsistent
- 2684: security delay .. make enforce mean enforce (default) ... not worth occasionally saving .3 seconds
   - for now it's one less item in differences/flips
   - might make this inactive in 91+, and add a warning
   - it has been a very long time since we added this due to bad advise/references on the internet on how to speed up Firefox
---
 user.js | 18 +++++++++---------
 1 file changed, 9 insertions(+), 9 deletions(-)

diff --git a/user.js b/user.js
index af9c87d..da504fa 100644
--- a/user.js
+++ b/user.js
@@ -25,7 +25,7 @@
             [SETUP-WEB] can cause some websites to break
          [SETUP-CHROME] changes how Firefox itself behaves (i.e. not directly website related)
            [SETUP-PERF] may impact performance
-              [WARNING] used sparingly, heed them
+              [WARNING] used on some commented out items, heed them
   6. Override Recipes: https://github.com/arkenfox/user.js/issues/1080
 
 * RELEASES: https://github.com/arkenfox/user.js/releases
@@ -172,7 +172,7 @@ user_pref("browser.region.update.enabled", false); // [[FF79+]
 /* 0210: set preferred language for displaying web pages
  * [TEST] https://addons.mozilla.org/about ***/
 user_pref("intl.accept_languages", "en-US, en");
-/* 0211: enforce US English locale regardless of the system locale
+/* 0211: use US English locale regardless of the system locale
  * [SETUP-WEB] May break some input methods e.g xim/ibus for CJK languages [1]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=867501,1629630 ***/
 user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
@@ -402,7 +402,7 @@ user_pref("network.dns.disableIPv6", true);
  * [2] https://www.mnot.net/blog/2016/03/09/alt-svc ***/
 user_pref("network.http.altsvc.enabled", false);
 user_pref("network.http.altsvc.oe", false);
-/* 0704: enforce the proxy server to do any DNS lookups when using SOCKS
+/* 0704: set the proxy server to do any DNS lookups when using SOCKS
  * e.g. in Tor, this stops your local DNS server from knowing your Tor destination
  * as a remote Tor node will handle the DNS request
  * [1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
@@ -698,13 +698,13 @@ user_pref("security.family_safety.mode", 0);
  * Saved logins and passwords are not available. Reset the pref and restart to return them.
  * [1] https://shiftordie.de/blog/2017/02/21/fingerprinting-firefox-users-with-cached-intermediate-ca-certificates-fiprinca/ ***/
    // user_pref("security.nocertdb", true); // [HIDDEN PREF]
-/* 1223: enforce strict pinning
+/* 1223: enable strict pinning
  * PKP (Public Key Pinning) 0=disabled 1=allow user MiTM (such as your antivirus), 2=strict
  * [SETUP-WEB] If you rely on an AV (antivirus) to protect your web browsing
  * by inspecting ALL your web traffic, then leave at current default=1
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16206 ***/
 user_pref("security.cert_pinning.enforcement_level", 2);
-/* 1224: enforce CRLite [FF73+]
+/* 1224: enable CRLite [FF73+]
  * In FF84+ it covers valid certs and in mode 2 doesn't fall back to OCSP
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1429800,1670985
  * [2] https://blog.mozilla.org/security/tag/crlite/ ***/
@@ -1133,7 +1133,7 @@ user_pref("middlemouse.contentLoadURL", false);
 user_pref("permissions.manager.defaultsUrl", "");
 /* 2617: remove webchannel whitelist ***/
 user_pref("webchannel.allowObject.urlWhitelist", "");
-/* 2619: enforce Punycode for Internationalized Domain Names to eliminate possible spoofing
+/* 2619: use Punycode in Internationalized Domain Names to eliminate possible spoofing
  * Firefox has *some* protections, but it is better to be safe than sorry
  * [SETUP-WEB] Might be undesirable for non-latin alphabet users since legitimate IDN's are also punycoded
  * [TEST] https://www.xn--80ak6aa92e.com/ (www.apple.com)
@@ -1185,7 +1185,7 @@ user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true FF89+]
  * 0=desktop, 1=downloads (default), 2=last used
  * [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
    // user_pref("browser.download.folderList", 2);
-/* 2651: enforce user interaction for security by always asking where to download
+/* 2651: enable user interaction for security by always asking where to download
  * [SETUP-CHROME] On Android this blocks longtapping and saving images
  * [SETTING] General>Downloads>Always ask you where to save files ***/
 user_pref("browser.download.useDownloadDir", false);
@@ -1212,12 +1212,12 @@ user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
 
 /** SECURITY ***/
 /* 2680: enforce CSP (Content Security Policy)
- * [WARNING] CSP is a very important and widespread security feature. Don't disable it!
+ * [NOTE] CSP is a very important and widespread security feature. Don't disable it!
  * [1] https://developer.mozilla.org/docs/Web/HTTP/CSP ***/
 user_pref("security.csp.enable", true); // [DEFAULT: true]
 /* 2684: enforce a security delay on some confirmation dialogs such as install, open/save
  * [1] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
-user_pref("security.dialog_enable_delay", 700);
+user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
 
 /*** [SECTION 2700]: PERSISTENT STORAGE
      Data SET by websites including

From bb48fe4ebe27fe0ca9b3de9ad8c75af8f75ea049 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 20 Jul 2021 03:34:49 +0000
Subject: [PATCH 0803/1147] RFP: 4612 is not disabled (by default)

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index da504fa..da7bea2 100644
--- a/user.js
+++ b/user.js
@@ -1427,7 +1427,7 @@ user_pref("privacy.firstparty.isolate", true);
  FF59+
    1372073 - spoof/block fingerprinting in MediaDevices API
       Spoof: enumerate devices reports one "Internal Camera" and one "Internal Microphone" if
-             media.navigator.enabled is true (see 4612 which we chose to keep disabled)
+             media.navigator.enabled is true (see 4612)
       Block: suppresses the ondevicechange event (see 4613)
    1039069 - warn when language prefs are set to non en-US (see 0210, 0211)
    1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events

From b22e349d44b578d38ee4b2ef0fbb1f9988c6df68 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 20 Jul 2021 03:38:49 +0000
Subject: [PATCH 0804/1147] make 4620 more accurate and match RFP section info

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index da7bea2..52bee1f 100644
--- a/user.js
+++ b/user.js
@@ -1585,7 +1585,7 @@ user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
    // [1] https://bugzilla.mozilla.org/1288359
    // user_pref("dom.webaudio.enabled", false);
 // FF80+
-// 4620: limit font visibility (non-ANDROID) [FF79+]
+// 4620: limit font visibility (Windows, Mac, some Linux) [FF79+]
    // Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1]
    // 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
    // [NOTE] Bundled fonts are auto-allowed

From babb9f3682c1353124939f0a7e96c3039b7b34a7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 22 Jul 2021 03:41:39 +0000
Subject: [PATCH 0805/1147] 4612: remove outdated confusing line

---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 52bee1f..448696a 100644
--- a/user.js
+++ b/user.js
@@ -1549,7 +1549,6 @@ user_pref("media.video_stats.enabled", false);
    // user_pref("dom.w3c_touch_events.enabled", 0);
 // FF59+
 // 4612: [2505] disable media device enumeration [FF29+]
-   // [NOTE] media.peerconnection.enabled should also be set to false (see 2001)
    // [1] https://wiki.mozilla.org/Media/getUserMedia
    // [2] https://developer.mozilla.org/docs/Web/API/MediaDevices/enumerateDevices
 user_pref("media.navigator.enabled", false);

From a7ba61c0d4e5af6f63a27b89e73baeb09ba146cb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 24 Jul 2021 00:52:38 +0000
Subject: [PATCH 0806/1147] 0304: background service app update [windows]

- the service implies a check is done first, I'm more concerned with the actual updating: not that updates are bad, it's about controlling when (if ever e.g. my test suite)
- since 0301 has to be done manually in Windows, 0302 is a good fallback **IF** the background service is applicable (read the link)
- clean up the numbering
---
 user.js | 12 ++++++++----
 1 file changed, 8 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 448696a..4526ca1 100644
--- a/user.js
+++ b/user.js
@@ -186,13 +186,17 @@ user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
      to do updates for security reasons, please do so manually if you make changes.
 ***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
-/* 0301b: disable auto-CHECKING for extension and theme updates ***/
-   // user_pref("extensions.update.enabled", false);
-/* 0302a: disable auto-INSTALLING Firefox updates [NON-WINDOWS FF65+]
+/* 0301: disable auto-INSTALLING Firefox updates [NON-WINDOWS FF65+]
  * [NOTE] In FF65+ on Windows this SETTING (below) is now stored in a file and the pref was removed
  * [SETTING] General>Firefox Updates>Check for updates but let you choose to install them ***/
 user_pref("app.update.auto", false);
-/* 0302b: disable auto-INSTALLING extension and theme updates (after the check in 0301b)
+/* 0302: disable auto-INSTALLING Firefox updates via a background service [FF90+] [WINDOWS]
+ * [SETTING] General>Firefox Updates>Automatically install updates>When Firefox is not running
+ * [1] https://support.mozilla.org/en-US/kb/enable-background-updates-firefox-windows ***/
+user_pref("app.update.background.scheduling.enabled", false);
+/* 0303: disable auto-CHECKING for extension and theme updates ***/
+   // user_pref("extensions.update.enabled", false);
+/* 0304: disable auto-INSTALLING extension and theme updates (after the check in 0303)
  * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
    // user_pref("extensions.update.autoUpdateDefault", false);
 /* 0306: disable extension metadata

From f24899fcac1114b0bff087280a71886fa2ec0832 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 24 Jul 2021 01:04:03 +0000
Subject: [PATCH 0807/1147] cleanup language specific links

---
 user.js | 16 ++++++++--------
 1 file changed, 8 insertions(+), 8 deletions(-)

diff --git a/user.js b/user.js
index 4526ca1..cdbd164 100644
--- a/user.js
+++ b/user.js
@@ -192,7 +192,7 @@ user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the
 user_pref("app.update.auto", false);
 /* 0302: disable auto-INSTALLING Firefox updates via a background service [FF90+] [WINDOWS]
  * [SETTING] General>Firefox Updates>Automatically install updates>When Firefox is not running
- * [1] https://support.mozilla.org/en-US/kb/enable-background-updates-firefox-windows ***/
+ * [1] https://support.mozilla.org/kb/enable-background-updates-firefox-windows ***/
 user_pref("app.update.background.scheduling.enabled", false);
 /* 0303: disable auto-CHECKING for extension and theme updates ***/
    // user_pref("extensions.update.enabled", false);
@@ -281,7 +281,7 @@ user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
 
     [1] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
     [2] https://wiki.mozilla.org/Security/Safe_Browsing
-    [3] https://support.mozilla.org/en-US/kb/how-does-phishing-and-malware-protection-work
+    [3] https://support.mozilla.org/kb/how-does-phishing-and-malware-protection-work
 ***/
 /* 0410: disable SB (Safe Browsing)
  * [WARNING] Do this at your own risk! These are the master switches.
@@ -489,7 +489,7 @@ user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
  * This value controls the total number of entries to appear in the location bar dropdown ***/
    // user_pref("browser.urlbar.maxRichResults", 0);
 /* 0850d: disable location bar autofill
- * [1] https://support.mozilla.org/en-US/kb/address-bar-autocomplete-firefox#w_url-autocomplete ***/
+ * [1] https://support.mozilla.org/kb/address-bar-autocomplete-firefox#w_url-autocomplete ***/
    // user_pref("browser.urlbar.autoFill", false);
 /* 0860: disable search and form history
  * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
@@ -999,8 +999,8 @@ user_pref("dom.serviceWorkers.enabled", false);
  * a prompt (2306). Disabling service workers alone doesn't stop Firefox polling the
  * Mozilla Push Server. To remove all subscriptions, reset your userAgentID (in about:config
  * or on start), and you will get a new one within a few seconds.
- * [1] https://support.mozilla.org/en-US/kb/push-notifications-firefox
- * [2] https://developer.mozilla.org/en-US/docs/Web/API/Push_API ***/
+ * [1] https://support.mozilla.org/kb/push-notifications-firefox
+ * [2] https://developer.mozilla.org/docs/Web/API/Push_API ***/
 user_pref("dom.push.enabled", false);
    // user_pref("dom.push.userAgentID", "");
 /* 2306: set a default permission for Notifications (both 2304 and 2305) [FF58+]
@@ -1293,7 +1293,7 @@ user_pref("privacy.trackingprotection.socialtracking.enabled", true);
  * [3] https://blog.mozilla.org/l10n/2017/03/07/firefox-l10n-report-aurora-54/ ***/
    // user_pref("dom.storageManager.enabled", false);
 /* 2755: disable Storage Access API [FF65+]
- * [1] https://developer.mozilla.org/en-US/docs/Web/API/Storage_Access_API ***/
+ * [1] https://developer.mozilla.org/docs/Web/API/Storage_Access_API ***/
    // user_pref("dom.storage_access.enabled", false);
 /* 2760: enable Local Storage Next Generation (LSNG) [FF65+] ***/
 user_pref("dom.storage.next_gen", true);
@@ -1383,7 +1383,7 @@ user_pref("privacy.firstparty.isolate", true);
  * The 2nd pref removes that limitation and will only allow communication if FPDs also match.
  * [1] https://bugzilla.mozilla.org/1319773#c22
  * [2] https://bugzilla.mozilla.org/1492607
- * [3] https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage ***/
+ * [3] https://developer.mozilla.org/docs/Web/API/Window/postMessage ***/
    // user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAULT: true]
    // user_pref("privacy.firstparty.isolate.block_post_message", true);
 /* 4003: enable scheme with FPI [FF78+]
@@ -1571,7 +1571,7 @@ user_pref("webgl.enable-debug-renderer-info", false);
 user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
 // FF64+
 // 4616: [2516] disable PointerEvents [FF86 or lower]
-   // [1] https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent
+   // [1] https://developer.mozilla.org/docs/Web/API/PointerEvent
    // [-] https://bugzilla.mozilla.org/1688105
 user_pref("dom.w3c_pointer_events.enabled", false);
 // FF67+

From f394fd0290e9399629cb1926aa656364a5dcecdd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 24 Jul 2021 01:56:46 +0000
Subject: [PATCH 0808/1147] move webgl to hardware fingerprinting

- merge into a single number, update the alt pref number
- update RFP info to reflect that it is not a cure-all
---
 user.js | 21 ++++++++++-----------
 1 file changed, 10 insertions(+), 11 deletions(-)

diff --git a/user.js b/user.js
index cdbd164..baded50 100644
--- a/user.js
+++ b/user.js
@@ -909,15 +909,6 @@ user_pref("media.peerconnection.enabled", false);
 user_pref("media.peerconnection.ice.default_address_only", true);
 user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
 user_pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true); // [FF70+]
-/* 2010: disable WebGL (Web Graphics Library)
- * [SETUP-WEB] When disabled, may break some websites. When enabled, provides high entropy,
- * especially with readPixels(). Some of the other entropy is lessened with RFP (see 4501)
- * [1] https://www.contextis.com/resources/blog/webgl-new-dimension-browser-exploitation/
- * [2] https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern ***/
-user_pref("webgl.disabled", true);
-user_pref("webgl.enable-webgl2", false);
-/* 2012: limit WebGL ***/
-user_pref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT: true FF86+]
 /* 2022: disable screensharing ***/
 user_pref("media.getusermedia.screensharing.enabled", false);
 user_pref("media.getusermedia.browser.enabled", false);
@@ -1092,6 +1083,14 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Access Virtual Reality Devices
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Virtual Reality>Settings ***/
    // user_pref("permissions.default.xr", 2);
+/* 2522: disable/limit WebGL (Web Graphics Library)
+ * [SETUP-WEB] When disabled, will break some websites. When enabled, provides high entropy,
+ * especially with readPixels(). Some of the other entropy is lessened with RFP (see 4501)
+ * [1] https://www.contextis.com/resources/blog/webgl-new-dimension-browser-exploitation/
+ * [2] https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern ***/
+user_pref("webgl.disabled", true);
+user_pref("webgl.enable-webgl2", false);
+user_pref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT: true FF86+]
 
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
@@ -1421,7 +1420,7 @@ user_pref("privacy.firstparty.isolate", true);
  FF57+
    1369309 - spoof media statistics (see 4610)
    1382499 - reduce screen co-ordinate fingerprinting in Touch API (see 4611)
-   1217290 & 1409677 - enable fingerprinting resistance for WebGL (see 2010-12)
+   1217290 & 1409677 - enable some fingerprinting resistance for WebGL
    1382545 - reduce fingerprinting in Animation API
    1354633 - limit MediaError.message to a whitelist
    1382533 & 1697680 - enable fingerprinting resistance for Presentation API (FF57-87)
@@ -1561,7 +1560,7 @@ user_pref("media.navigator.enabled", false);
    // [2] https://developer.mozilla.org/docs/Web/API/MediaDevices/ondevicechange
 user_pref("media.ondevicechange.enabled", false);
 // FF60+
-// 4614: [2011] disable WebGL debug info being available to websites
+// 4614: [2522] disable WebGL debug info being available to websites
    // [1] https://bugzilla.mozilla.org/1171228
    // [2] https://developer.mozilla.org/docs/Web/API/WEBGL_debug_renderer_info
 user_pref("webgl.enable-debug-renderer-info", false);

From cc8674c16de021bc4efeb9c714a8ffe09c3dc8c5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 24 Jul 2021 12:49:39 +0000
Subject: [PATCH 0809/1147] revert last commit

---
 scratchpad-scripts/arkenfox-clear-removed.js | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index e61e258..fe97e52 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
   This will reset the preferences that have been removed completely from the arkenfox user.js.
 
-  Last updated: 20-July-2021
+  Last updated: 24-July-2021
 
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -241,8 +241,6 @@
     'webgl.min_capability_mode',
     /* 89-beta */
     'security.ssl.enable_ocsp_stapling',
-    /* 90-beta */
-    'security.tls.version.enable-deprecated',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ];

From 18dbb56a3d143a97dc2f78e0cf63c4565c16db33 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 24 Jul 2021 12:51:15 +0000
Subject: [PATCH 0810/1147] put 1203 back

see https://github.com/arkenfox/user.js/commit/3bb9fc713f141d794fc4adfb38d3fcf86c9307ab
---
 user.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/user.js b/user.js
index baded50..164a4b9 100644
--- a/user.js
+++ b/user.js
@@ -645,6 +645,8 @@ user_pref("security.ssl.require_safe_negotiation", true);
  * [1] https://www.ssllabs.com/ssl-pulse/ ***/
    // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
    // user_pref("security.tls.version.max", 4);
+/* 1203: enforce TLS 1.0 and 1.1 downgrades as session only ***/
+user_pref("security.tls.version.enable-deprecated", false);
 /* 1204: disable SSL session tracking [FF36+]
  * SSL Session IDs are unique and last up to 24hrs in Firefox (or longer with prolongation attacks)
  * [NOTE] These are not used in PB mode. In normal windows they are isolated when using FPI (4001)

From f53f01823f482d600017d33c3c220a761c799984 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 24 Jul 2021 12:56:27 +0000
Subject: [PATCH 0811/1147] 1203 default info

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 164a4b9..a734cfa 100644
--- a/user.js
+++ b/user.js
@@ -646,7 +646,7 @@ user_pref("security.ssl.require_safe_negotiation", true);
    // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
    // user_pref("security.tls.version.max", 4);
 /* 1203: enforce TLS 1.0 and 1.1 downgrades as session only ***/
-user_pref("security.tls.version.enable-deprecated", false);
+user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
 /* 1204: disable SSL session tracking [FF36+]
  * SSL Session IDs are unique and last up to 24hrs in Firefox (or longer with prolongation attacks)
  * [NOTE] These are not used in PB mode. In normal windows they are isolated when using FPI (4001)

From b8f3d93a5cbcd431405e2915508827ac69bfaa8b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 26 Jul 2021 03:11:09 +0000
Subject: [PATCH 0812/1147] v90

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index a734cfa..55ae12a 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 16 June 2021
-* version 90-alpha
+* date: 26 July 2021
+* version 90
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From 5c93ebb54f7248bb9419ebed27ced383e65be324 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 30 Jul 2021 05:48:17 +0000
Subject: [PATCH 0813/1147] misc, closes #1220

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 55ae12a..f1a9bc3 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 26 July 2021
-* version 90
+* date: 30 July 2021
+* version 91-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -585,8 +585,7 @@ user_pref("media.memory_cache_max_size", 65536);
 /* 1020: exclude "Undo Closed Tabs" in Session Restore ***/
    // user_pref("browser.sessionstore.max_tabs_undo", 0);
 /* 1021: disable storing extra session data [SETUP-CHROME]
- * extra session data contains contents of forms, scrollbar positions, cookies and POST data
- * define on which sites to save extra session data:
+ * define on which sites to save extra session data such as form content, cookies and POST data
  * 0=everywhere, 1=unencrypted sites, 2=nowhere ***/
 user_pref("browser.sessionstore.privacy_level", 2);
 /* 1022: disable resuming session from crash ***/
@@ -1371,6 +1370,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
    1506693 - pdfjs range-based requests (FF68+)
    1330467 - site permissions (FF69+)
    1534339 - IPv6 (FF73+)
+   1721858 - WebSocket (FF92+)
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]

From eb4363dc180666554ca81a7909156e0893e80c3b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 1 Aug 2021 17:36:04 +0000
Subject: [PATCH 0814/1147] tweak info in section 2800 header, #1223

---
 user.js | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index f1a9bc3..b846464 100644
--- a/user.js
+++ b/user.js
@@ -1299,7 +1299,11 @@ user_pref("privacy.trackingprotection.socialtracking.enabled", true);
 user_pref("dom.storage.next_gen", true);
 
 /*** [SECTION 2800]: SHUTDOWN
-     You should set the values to what suits you best.
+     - Sanitizing on shutdown is all or nothing. It does not use Managed Exceptions under
+       Privacy & Security>Delete cookies and site data when Firefox is closed (1681701)
+     - If you want to keep some sites' cookies (exception as "Allow") and optionally other site
+       data but clear all the rest on close, then you need to set the "cookie" and optionally the
+       "offlineApps" prefs below to false, and to set the cookie lifetime pref to 2 (2703)
      - "Offline Website Data" includes appCache (2730), localStorage (2720),
        service worker cache (2740), and QuotaManager (IndexedDB, asm-cache)
      - In both 2803 + 2804, the 'download' and 'history' prefs are combined in the

From 06e5de43328a75b1b249987aa0c67744083729cf Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 4 Aug 2021 10:32:33 +0000
Subject: [PATCH 0815/1147] tweak windows SSO info/reference

---
 user.js | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index b846464..17ae8d1 100644
--- a/user.js
+++ b/user.js
@@ -540,8 +540,9 @@ user_pref("signon.formlessCapture.enabled", false);
  * 1=don't allow cross-origin sub-resources to open HTTP authentication credentials dialogs
  * 2=allow sub-resources to open HTTP authentication credentials dialogs (default) ***/
 user_pref("network.auth.subresource-http-auth-allow", 1);
-/* 0913: disable automatic authentication on Microsoft sites [FF91+] [WINDOWS]
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1695693,1719301 ***/
+/* 0913: disable automatic authentication on Microsoft sites [FF91+] [WINDOWS 10+]
+ * [SETTING] Privacy & Security>Logins and Passwords>Allow Windows single sign-on for...
+ * [1] https://support.mozilla.org/kb/windows-sso ***/
 user_pref("network.http.windows-sso.enabled", false);
 
 /*** [SECTION 1000]: CACHE / SESSION (RE)STORE / FAVICONS

From 404d1d466a35fada3050222261a85c0bf422a887 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 4 Aug 2021 17:23:38 +0000
Subject: [PATCH 0816/1147] update [STATS]

- just in time for ESR91
---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 17ae8d1..375908d 100644
--- a/user.js
+++ b/user.js
@@ -376,7 +376,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
 /* 0701: disable IPv6
  * IPv6 can be abused, especially with MAC addresses, and can leak with VPNs. That's even
  * assuming your ISP and/or router and/or website can handle it. Sites will fall back to IPv4
- * [STATS] Firefox telemetry (Dec 2020) shows ~8% of all connections are IPv6
+ * [STATS] Firefox telemetry (July 2021) shows ~10% of all connections are IPv6
  * [NOTE] This is just an application level fallback. Disabling IPv6 is best done at an
  * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
  * then this won't make much difference. If you are masking your IP, then it can only help.
@@ -388,7 +388,7 @@ user_pref("network.dns.disableIPv6", true);
  * HTTP2 raises concerns with "multiplexing" and "server push", does nothing to
  * enhance privacy, and opens up a number of server-side fingerprinting opportunities.
  * [WARNING] Don't disable HTTP2. Don't be that one person using HTTP1.1 on HTTP2 sites
- * [STATS] Over 50% of sites (April 2021) and growing [5]
+ * [STATS] ~46% of sites (July 2021) [5]
  * [1] https://http2.github.io/faq/
  * [2] https://blog.scottlogic.com/2014/11/07/http-2-a-quick-look.html
  * [3] https://http2.github.io/http2-spec/#rfc.section.10.8
@@ -633,7 +633,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * safe from the attack if it disables renegotiations but the problem is that the browser can't
  * know that. Setting this pref to true is the only way for the browser to ensure there will be
  * no unsafe renegotiations on the channel between the browser and the server.
- * [STATS] SSL Labs (Dec 2020) reports 99.0% of sites have secure renegotiation [4]
+ * [STATS] SSL Labs (July 2020) reports over 99% of sites have secure renegotiation [4]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
  * [2] https://tools.ietf.org/html/rfc5746
  * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555

From 92b7fb81d0ca6bfd58aeca175749b4bd2777ef20 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 4 Aug 2021 18:45:15 +0000
Subject: [PATCH 0817/1147] fixup STATS year

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 375908d..2878c4e 100644
--- a/user.js
+++ b/user.js
@@ -633,7 +633,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * safe from the attack if it disables renegotiations but the problem is that the browser can't
  * know that. Setting this pref to true is the only way for the browser to ensure there will be
  * no unsafe renegotiations on the channel between the browser and the server.
- * [STATS] SSL Labs (July 2020) reports over 99% of sites have secure renegotiation [4]
+ * [STATS] SSL Labs (July 2021) reports over 99% of sites have secure renegotiation [4]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
  * [2] https://tools.ietf.org/html/rfc5746
  * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555

From dd112a167def8de25707ced259a7f62e3d252f81 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 9 Aug 2021 20:39:47 +0000
Subject: [PATCH 0818/1147] final update

---
 ...x-clear-RFP-alternatives.js => arkenfox-clear-non-RFP.js} | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)
 rename scratchpad-scripts/{arkenfox-clear-RFP-alternatives.js => arkenfox-clear-non-RFP.js} (91%)

diff --git a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js b/scratchpad-scripts/arkenfox-clear-non-RFP.js
similarity index 91%
rename from scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
rename to scratchpad-scripts/arkenfox-clear-non-RFP.js
index 92d619d..9d251d4 100644
--- a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
+++ b/scratchpad-scripts/arkenfox-clear-non-RFP.js
@@ -3,8 +3,11 @@
   arkenfox user.js. These are the prefs that are no longer necessary, or they
   conflict with, privacy.resistFingerprinting if you have that enabled.
 
-  Last updated: 08-July-2021
+  Final update: 10-August-2021
 
+  As of v91, section 4600 is no longer recommended, and is all inactive. This
+  now includes the old 4700 section. You can reset them using prefsCleaner.
+  
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
 ***/

From d19d4ba784bb96ccc8301d59da77c0e58746bb21 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 9 Aug 2021 20:42:51 +0000
Subject: [PATCH 0819/1147] final update

in hindsight, the original name is more accurate
---
 ...kenfox-clear-non-RFP.js => arkenfox-clear-RFP-alternatives.js} | 0
 1 file changed, 0 insertions(+), 0 deletions(-)
 rename scratchpad-scripts/{arkenfox-clear-non-RFP.js => arkenfox-clear-RFP-alternatives.js} (100%)

diff --git a/scratchpad-scripts/arkenfox-clear-non-RFP.js b/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
similarity index 100%
rename from scratchpad-scripts/arkenfox-clear-non-RFP.js
rename to scratchpad-scripts/arkenfox-clear-RFP-alternatives.js

From 4b38e20f14cbb62378cad1de3628cec7250a6760 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 10 Aug 2021 00:18:19 +0000
Subject: [PATCH 0820/1147] change 4600s into do not use, #1221 (#1225)

see https://github.com/arkenfox/user.js/issues/1221#issuecomment-895623028
---
 user.js | 354 +++++++++++++++++++++++---------------------------------
 1 file changed, 146 insertions(+), 208 deletions(-)

diff --git a/user.js b/user.js
index 2878c4e..ceedf39 100644
--- a/user.js
+++ b/user.js
@@ -32,14 +32,12 @@
 
   * It is best to use the arkenfox release that is optimized for and matches your Firefox version
   * EVERYONE: each release
-    - run prefsCleaner or reset deprecated prefs (9999s) and prefs made redundant by RPF (4600s)
-    - re-enable section 4600 if you don't use RFP
+    - run prefsCleaner to reset prefs made inactive, including deprecated (9999s)
     ESR78
     - If you are not using arkenfox v78... (not a definitive list)
       - 1244: HTTPS-Only mode is enabled
       - 1401: document fonts is inactive as it is now covered by RFP in FF80+
       - 2626: non-native widget theme is enforced
-      - 4600: some prefs may apply even if you use RFP
       - 9999: switch the appropriate deprecated section(s) back on
 
 * INDEX:
@@ -69,8 +67,7 @@
   2800: SHUTDOWN
   4000: FPI (FIRST PARTY ISOLATION)
   4500: RFP (RESIST FINGERPRINTING)
-  4600: RFP ALTERNATIVES
-  4700: RFP ALTERNATIVES (USER AGENT SPOOFING)
+  4600: NON-RFP
   5000: PERSONAL
   9999: DEPRECATED / REMOVED / LEGACY / RENAMED
 
@@ -178,12 +175,12 @@ user_pref("intl.accept_languages", "en-US, en");
 user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 
 /*** [SECTION 0300]: QUIET FOX
-     We only disable the auto-INSTALL of Firefox (app) updates. You still get prompts to update,
-     and it only takes one click. We highly discourage disabling auto-CHECKING for updates.
+   We only disable the auto-INSTALL of Firefox (app) updates. You still get prompts to update,
+   and it only takes one click. We highly discourage disabling auto-CHECKING for updates.
 
-     Legitimate reasons to disable auto-INSTALLS include hijacked/monetized extensions, time
-     constraints, legacy issues, dev/testing, and fear of breakage/bugs. It is still important
-     to do updates for security reasons, please do so manually if you make changes.
+   Legitimate reasons to disable auto-INSTALLS include hijacked/monetized extensions, time
+   constraints, legacy issues, dev/testing, and fear of breakage/bugs. It is still important
+   to do updates for security reasons, please do so manually if you make changes.
 ***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
 /* 0301: disable auto-INSTALLING Firefox updates [NON-WINDOWS FF65+]
@@ -273,15 +270,15 @@ user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
 user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
 
 /** SAFE BROWSING (SB)
-    Safe Browsing has taken many steps to preserve privacy. *IF* required, a full url is never
-    sent to Google, only a PART-hash of the prefix, and this is hidden with noise of other real
-    PART-hashes. Google also swear it is anonymized and only used to flag malicious sites.
-    Firefox also takes measures such as striping out identifying parameters and since SBv4 (FF57+)
-    doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
+   Safe Browsing has taken many steps to preserve privacy. *IF* required, a full url is never
+   sent to Google, only a PART-hash of the prefix, and this is hidden with noise of other real
+   PART-hashes. Google also swear it is anonymized and only used to flag malicious sites.
+   Firefox also takes measures such as striping out identifying parameters and since SBv4 (FF57+)
+   doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
 
-    [1] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
-    [2] https://wiki.mozilla.org/Security/Safe_Browsing
-    [3] https://support.mozilla.org/kb/how-does-phishing-and-malware-protection-work
+   [1] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
+   [2] https://wiki.mozilla.org/Security/Safe_Browsing
+   [3] https://support.mozilla.org/kb/how-does-phishing-and-malware-protection-work
 ***/
 /* 0410: disable SB (Safe Browsing)
  * [WARNING] Do this at your own risk! These are the master switches.
@@ -310,18 +307,18 @@ user_pref("browser.safebrowsing.downloads.remote.url", "");
    // user_pref("browser.safebrowsing.allowOverride", false);
 
 /*** [SECTION 0500]: SYSTEM ADD-ONS / EXPERIMENTS
-     System Add-ons are a method for shipping extensions, considered to be
-     built-in features to Firefox, that are hidden from the about:addons UI.
-     To view your System Add-ons go to about:support, they are listed under "Firefox Features"
+   System Add-ons are a method for shipping extensions, considered to be
+   built-in features to Firefox, that are hidden from the about:addons UI.
+   To view your System Add-ons go to about:support, they are listed under "Firefox Features"
 
-     * Portable: "...\App\Firefox64\browser\features\" (or "App\Firefox\etc" for 32bit)
-     * Windows: "...\Program Files\Mozilla\browser\features" (or "Program Files (X86)\etc" for 32bit)
-     * Mac: "...\Applications\Firefox\Contents\Resources\browser\features\"
-            [NOTE] On Mac you can right-click on the application and select "Show Package Contents"
-     * Linux: "/usr/lib/firefox/browser/features" (or similar)
+   * Portable: "...\App\Firefox64\browser\features\" (or "App\Firefox\etc" for 32bit)
+   * Windows: "...\Program Files\Mozilla\browser\features" (or "Program Files (X86)\etc" for 32bit)
+   * Mac: "...\Applications\Firefox\Contents\Resources\browser\features\"
+          [NOTE] On Mac you can right-click on the application and select "Show Package Contents"
+   * Linux: "/usr/lib/firefox/browser/features" (or similar)
 
-     [1] https://firefox-source-docs.mozilla.org/toolkit/mozapps/extensions/addon-manager/SystemAddons.html
-     [2] https://searchfox.org/mozilla-central/source/browser/extensions
+   [1] https://firefox-source-docs.mozilla.org/toolkit/mozapps/extensions/addon-manager/SystemAddons.html
+   [2] https://searchfox.org/mozilla-central/source/browser/extensions
 ***/
 user_pref("_user.js.parrot", "0500 syntax error: the parrot's cashed in 'is chips!");
 /* 0503: disable Normandy/Shield [FF60+]
@@ -425,11 +422,11 @@ user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
 user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
 
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
-     Change items 0850 and above to suit for privacy vs convenience and functionality. Consider
-     your environment (no unwanted eyeballs), your device (restricted access), your device's
-     unattended state (locked, encrypted, forensic hardened). Likewise, you may want to check
-     the items cleared on shutdown in section 2800.
-     [1] https://xkcd.com/538/
+   Change items 0850 and above to suit for privacy vs convenience and functionality. Consider
+   your environment (no unwanted eyeballs), your device (restricted access), your device's
+   unattended state (locked, encrypted, forensic hardened). Likewise, you may want to check
+   the items cleared on shutdown in section 2800.
+   [1] https://xkcd.com/538/
 ***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
 /* 0801: disable location bar using search
@@ -546,20 +543,20 @@ user_pref("network.auth.subresource-http-auth-allow", 1);
 user_pref("network.http.windows-sso.enabled", false);
 
 /*** [SECTION 1000]: CACHE / SESSION (RE)STORE / FAVICONS
-     Cache tracking/fingerprinting techniques [1][2][3] require a cache. Disabling disk (1001)
-     *and* memory (1003) caches is one solution; but that's extreme and fingerprintable. A hardened
-     Temporary Containers configuration can effectively do the same thing, by isolating every tab [4].
+   Cache tracking/fingerprinting techniques [1][2][3] require a cache. Disabling disk (1001)
+   *and* memory (1003) caches is one solution; but that's extreme and fingerprintable. A hardened
+   Temporary Containers configuration can effectively do the same thing, by isolating every tab [4].
 
-     We consider avoiding disk cache (1001) so cache is session/memory only (like Private Browsing
-     mode), and isolating cache to first party (4001) is sufficient and a good balance between
-     risk and performance. ETAGs can also be neutralized by modifying response headers [5], and
-     you can clear the cache manually or on a regular basis with an extension.
+   We consider avoiding disk cache (1001) so cache is session/memory only (like Private Browsing
+   mode), and isolating cache to first party (4001) is sufficient and a good balance between
+   risk and performance. ETAGs can also be neutralized by modifying response headers [5], and
+   you can clear the cache manually or on a regular basis with an extension.
 
-     [1] https://en.wikipedia.org/wiki/HTTP_ETag#Tracking_using_ETags
-     [2] https://robertheaton.com/2014/01/20/cookieless-user-tracking-for-douchebags/
-     [3] https://www.grepular.com/Preventing_Web_Tracking_via_the_Browser_Cache
-     [4] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
-     [5] https://github.com/arkenfox/user.js/wiki/4.2.4-Header-Editor
+   [1] https://en.wikipedia.org/wiki/HTTP_ETag#Tracking_using_ETags
+   [2] https://robertheaton.com/2014/01/20/cookieless-user-tracking-for-douchebags/
+   [3] https://www.grepular.com/Preventing_Web_Tracking_via_the_Browser_Cache
+   [4] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
+   [5] https://github.com/arkenfox/user.js/wiki/4.2.4-Header-Editor
 ***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
 /** CACHE ***/
@@ -663,8 +660,8 @@ user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
 user_pref("security.tls.enable_0rtt_data", false);
 
 /** OCSP (Online Certificate Status Protocol)
-    [1] https://scotthelme.co.uk/revocation-is-broken/
-    [2] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/
+   [1] https://scotthelme.co.uk/revocation-is-broken/
+   [2] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/
 ***/
 /* 1211: control when to use OCSP fetching (to confirm current validity of certificates)
  * 0=disabled, 1=enabled (default), 2=enabled for EV certificates only
@@ -746,11 +743,11 @@ user_pref("dom.security.https_only_mode_send_http_background_request", false);
    // user_pref("dom.securecontext.whitelist_onions", true);
 
 /** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro]
- * These are the ciphers listed under "Cipher Suites" [1] that are either still using SHA-1 and CBC,
- * and/or are missing Perfect Forward Secrecy [3] and/or have other weaknesses like key sizes of 128
- * [1] https://browserleaks.com/ssl
- * [2] https://en.wikipedia.org/wiki/Key_size
- * [3] https://en.wikipedia.org/wiki/Forward_secrecy
+   These are the ciphers listed under "Cipher Suites" [1] that are either still using SHA-1 and CBC,
+   and/or are missing Perfect Forward Secrecy [3] and/or have other weaknesses like key sizes of 128
+   [1] https://browserleaks.com/ssl
+   [2] https://en.wikipedia.org/wiki/Key_size
+   [3] https://en.wikipedia.org/wiki/Forward_secrecy
  ***/
 /* 1261: disable 3DES (effective key size < 128 and no PFS)
  * [1] https://en.wikipedia.org/wiki/3des#Security
@@ -814,15 +811,15 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
 
 /*** [SECTION 1600]: HEADERS / REFERERS
-     Only *cross domain* referers need controlling: leave 1601, 1602, 1605 and 1606 alone
-     ---
-     Expect some breakage: Use an extension if you need precise control
-     ---
-                    full URI: https://example.com:8888/foo/bar.html?id=1234
-       scheme+host+port+path: https://example.com:8888/foo/bar.html
-            scheme+host+port: https://example.com:8888
-     ---
-     [1] https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
+   Only *cross domain* referers need controlling: leave 1601, 1602, 1605 and 1606 alone
+   ---
+   Expect some breakage: Use an extension if you need precise control
+   ---
+                  full URI: https://example.com:8888/foo/bar.html?id=1234
+     scheme+host+port+path: https://example.com:8888/foo/bar.html
+          scheme+host+port: https://example.com:8888
+   ---
+   [1] https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
 ***/
 user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
 /* 1601: ALL: control when images/links send a referer
@@ -861,12 +858,12 @@ user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
 user_pref("privacy.donottrackheader.enabled", true);
 
 /*** [SECTION 1700]: CONTAINERS
-     If you want to *really* leverage containers, we highly recommend Temporary Containers [2].
-     Read the article by the extension author [3], and check out the github wiki/repo [4].
-     [1] https://wiki.mozilla.org/Security/Contextual_Identity_Project/Containers
-     [2] https://addons.mozilla.org/firefox/addon/temporary-containers/
-     [3] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
-     [4] https://github.com/stoically/temporary-containers/wiki
+   If you want to *really* leverage containers, we highly recommend Temporary Containers [2].
+   Read the article by the extension author [3], and check out the github wiki/repo [4].
+   [1] https://wiki.mozilla.org/Security/Contextual_Identity_Project/Containers
+   [2] https://addons.mozilla.org/firefox/addon/temporary-containers/
+   [3] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
+   [4] https://github.com/stoically/temporary-containers/wiki
 ***/
 user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
 /* 1701: enable Container Tabs setting in preferences (see 1702) [FF50+]
@@ -957,17 +954,17 @@ user_pref("dom.disable_open_during_load", true);
 user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
 
 /*** [SECTION 2300]: WEB WORKERS
-     A worker is a JS "background task" running in a global context, i.e. it is different from
-     the current window. Workers can spawn new workers (must be the same origin & scheme),
-     including service and shared workers. Shared workers can be utilized by multiple scripts and
-     communicate between browsing contexts (windows/tabs/iframes) and can even control your cache.
+   A worker is a JS "background task" running in a global context, i.e. it is different from
+   the current window. Workers can spawn new workers (must be the same origin & scheme),
+   including service and shared workers. Shared workers can be utilized by multiple scripts and
+   communicate between browsing contexts (windows/tabs/iframes) and can even control your cache.
 
-     [1]    Web Workers: https://developer.mozilla.org/docs/Web/API/Web_Workers_API
-     [2]         Worker: https://developer.mozilla.org/docs/Web/API/Worker
-     [3] Service Worker: https://developer.mozilla.org/docs/Web/API/Service_Worker_API
-     [4]   SharedWorker: https://developer.mozilla.org/docs/Web/API/SharedWorker
-     [5]   ChromeWorker: https://developer.mozilla.org/docs/Web/API/ChromeWorker
-     [6]  Notifications: https://support.mozilla.org/questions/1165867#answer-981820
+   [1]    Web Workers: https://developer.mozilla.org/docs/Web/API/Web_Workers_API
+   [2]         Worker: https://developer.mozilla.org/docs/Web/API/Worker
+   [3] Service Worker: https://developer.mozilla.org/docs/Web/API/Service_Worker_API
+   [4]   SharedWorker: https://developer.mozilla.org/docs/Web/API/SharedWorker
+   [5]   ChromeWorker: https://developer.mozilla.org/docs/Web/API/ChromeWorker
+   [6]  Notifications: https://support.mozilla.org/questions/1165867#answer-981820
 ***/
 user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
 /* 2302: disable service workers [FF32, FF44-compat]
@@ -1225,18 +1222,18 @@ user_pref("security.csp.enable", true); // [DEFAULT: true]
 user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
 
 /*** [SECTION 2700]: PERSISTENT STORAGE
-     Data SET by websites including
-            cookies : profile\cookies.sqlite
-       localStorage : profile\webappsstore.sqlite
-          indexedDB : profile\storage\default
-           appCache : profile\OfflineCache
-     serviceWorkers :
+   Data SET by websites including
+          cookies : profile\cookies.sqlite
+     localStorage : profile\webappsstore.sqlite
+        indexedDB : profile\storage\default
+         appCache : profile\OfflineCache (FF89 or lower)
+   serviceWorkers :
 
-     [NOTE] indexedDB and serviceWorkers are not available in Private Browsing Mode
-     [NOTE] Blocking cookies also blocks websites access to: localStorage (incl. sessionStorage),
-     indexedDB, sharedWorker, and serviceWorker (and therefore service worker cache and notifications)
-     If you set a site exception for cookies (either "Allow" or "Allow for Session") then they become
-     accessible to websites except shared/service workers where the cookie setting *must* be "Allow"
+   [NOTE] indexedDB and serviceWorkers are not available in Private Browsing Mode
+   [NOTE] Blocking cookies also blocks websites access to: localStorage (incl. sessionStorage),
+   indexedDB, sharedWorker, and serviceWorker (and therefore service worker cache and notifications)
+   If you set a site exception for cookies (either "Allow" or "Allow for Session") then they become
+   accessible to websites except shared/service workers where the cookie setting *must* be "Allow"
 ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 /* 2701: disable or isolate 3rd-party cookies and site-data [SETUP-WEB]
@@ -1300,15 +1297,15 @@ user_pref("privacy.trackingprotection.socialtracking.enabled", true);
 user_pref("dom.storage.next_gen", true);
 
 /*** [SECTION 2800]: SHUTDOWN
-     - Sanitizing on shutdown is all or nothing. It does not use Managed Exceptions under
-       Privacy & Security>Delete cookies and site data when Firefox is closed (1681701)
-     - If you want to keep some sites' cookies (exception as "Allow") and optionally other site
-       data but clear all the rest on close, then you need to set the "cookie" and optionally the
-       "offlineApps" prefs below to false, and to set the cookie lifetime pref to 2 (2703)
-     - "Offline Website Data" includes appCache (2730), localStorage (2720),
-       service worker cache (2740), and QuotaManager (IndexedDB, asm-cache)
-     - In both 2803 + 2804, the 'download' and 'history' prefs are combined in the
-       Firefox interface as "Browsing & Download History" and their values will be synced
+   * Sanitizing on shutdown is all or nothing. It does not use Managed Exceptions under
+     Privacy & Security>Delete cookies and site data when Firefox is closed (1681701)
+   * If you want to keep some sites' cookies (exception as "Allow") and optionally other site
+     data but clear all the rest on close, then you need to set the "cookie" and optionally the
+     "offlineApps" prefs below to false, and to set the cookie lifetime pref to 2 (2703)
+   * "Offline Website Data" includes appCache (2730), localStorage (2720),
+     service worker cache (2740), and QuotaManager (IndexedDB, asm-cache)
+   * In both 2803 + 2804, the 'download' and 'history' prefs are combined in the
+     Firefox interface as "Browsing & Download History" and their values will be synced
 ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
 /* 2802: enable Firefox to clear items on shutdown (see 2803)
@@ -1409,14 +1406,14 @@ user_pref("privacy.firstparty.isolate", true);
       [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
  FF50+
    1281949 - spoof screen orientation
-   1281963 - hide the contents of navigator.plugins and navigator.mimeTypes (FF50+)
+   1281963 - hide the contents of navigator.plugins and navigator.mimeTypes
  FF55+
    1330890 - spoof timezone as UTC 0
    1360039 - spoof navigator.hardwareConcurrency as 2 (see 4601)
    1217238 - reduce precision of time exposed by javascript
  FF56+
    1369303 - spoof/disable performance API (see 4602, 4603)
-   1333651 - spoof User Agent & Navigator API (see section 4700)
+   1333651 - spoof User Agent & Navigator API (see 4650)
       JS: FF78+ the version is spoofed as ESR, and the OS as Windows 10, OS 10.15, Android 9 (FF91+ as 10), or Linux
       HTTP Headers: spoofed as Windows or Android
    1369319 - disable device sensor API (see 4604)
@@ -1501,117 +1498,53 @@ user_pref("browser.startup.blankWindow", false);
  * [NOTE] pref added in FF63, but applied to chrome in FF77. RFP spoofs this for web content ***/
 user_pref("ui.prefersReducedMotion", 1); // [HIDDEN PREF]
 
-/*** [SECTION 4600]: RFP ALTERNATIVES
-     [WARNING] DO NOT USE prefs in this section with RFP as they can interfere
+/*** [SECTION 4600]: NON-RFP
+   [WARNING] DO NOT USE with RFP. RFP already covers these, and they can interfere
+   [NOTE] These prefs will not help anti-fingerprinting. They are insufficient
+   on their own, can cause breakage, and will make you stand out
 ***/
 user_pref("_user.js.parrot", "4600 syntax error: the parrot's crossed the Jordan");
-/* [SETUP-non-RFP] Non-RFP users replace the * with a slash on this line to enable these
-// FF55+
-// 4601: [2514] spoof number of CPU cores [FF48+]
-   // [1] https://bugzilla.mozilla.org/1008453
-   // [2] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21675
-   // [3] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/22127
-   // [4] https://html.spec.whatwg.org/multipage/workers.html#navigator.hardwareconcurrency
-user_pref("dom.maxHardwareConcurrency", 2);
-// FF56+
-// 4602: [2411] disable resource/navigation timing
-user_pref("dom.enable_resource_timing", false);
-// 4603: [2412] disable timing attacks
-   // [1] https://wiki.mozilla.org/Security/Reviews/Firefox/NavigationTimingAPI
+/* 4601: spoof number of CPU cores [FF48+] ***/
+   // user_pref("dom.maxHardwareConcurrency", 2);
+/* 4602: disable Resource Timing API ***/
+   // user_pref("dom.enable_resource_timing", false);
+/* 4603: disable Navigation Timing API ***/
    // user_pref("dom.enable_performance", false);
-// 4604: [2512] disable device sensor API
-   // Optional protection depending on your device
-   // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/15758
-   // [2] https://blog.lukaszolejnik.com/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api/
-   // [3] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1357733,1292751
+/* 4604: disable device Sensor APIs ***/
    // user_pref("device.sensors.enabled", false);
-// 4605: [2515] disable site specific zoom
-   // Zoom levels affect screen res and are highly fingerprintable. This does not stop you using
-   // zoom, it will just not use/remember any site specific settings. Zoom levels on new tabs
-   // and new windows are reset to default and only the current tab retains the current zoom
-user_pref("browser.zoom.siteSpecific", false);
-// 4606: [2501] disable gamepad API - USB device ID enumeration
-   // Optional protection depending on your connected devices
-   // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/13023
+/* 4605: disable remembering site specific zoom ***/
+   // user_pref("browser.zoom.siteSpecific", false);
+/* 4606: disable gamepad API to prevent USB device ID enumeration ***/
    // user_pref("dom.gamepad.enabled", false);
-// 4607: [2503] disable giving away network info [FF31+]
-   // e.g. bluetooth, cellular, ethernet, wifi, wimax, other, mixed, unknown, none
-   // [1] https://developer.mozilla.org/docs/Web/API/Network_Information_API
-   // [2] https://wicg.github.io/netinfo/
-   // [3] https://bugzilla.mozilla.org/960426
-user_pref("dom.netinfo.enabled", false); // [DEFAULT: true on Android]
-// 4608: [2021] disable the SpeechSynthesis (Text-to-Speech) part of the Web Speech API
-   // [1] https://developer.mozilla.org/docs/Web/API/Web_Speech_API
-   // [2] https://developer.mozilla.org/docs/Web/API/SpeechSynthesis
-   // [3] https://wiki.mozilla.org/HTML5_Speech_API
-user_pref("media.webspeech.synth.enabled", false);
-// FF57+
-// 4610: [2506] disable video statistics - JS performance fingerprinting [FF25+]
-   // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/15757
-   // [2] https://bugzilla.mozilla.org/654550
-user_pref("media.video_stats.enabled", false);
-// 4611: [2509] disable touch events
-   // fingerprinting attack vector - leaks screen res & actual screen coordinates
-   // 0=disabled, 1=enabled, 2=autodetect
-   // Optional protection depending on your device
-   // [1] https://developer.mozilla.org/docs/Web/API/Touch_events
-   // [2] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/10286
+/* 4607: disable Network Information API [FF31+] ***/
+   // user_pref("dom.netinfo.enabled", false); // [DEFAULT: true on Android]
+/* 4608: disable the SpeechSynthesis (Text-to-Speech) part of the Web Speech API ***/
+   // user_pref("media.webspeech.synth.enabled", false);
+/* 4610: disable video statistics to mitigate JS performance fingerprinting [FF25+] ***/
+   // user_pref("media.video_stats.enabled", false);
+/* 4611: disable touch events: 0=disabled, 1=enabled, 2=autodetect ***/
    // user_pref("dom.w3c_touch_events.enabled", 0);
-// FF59+
-// 4612: [2505] disable media device enumeration [FF29+]
-   // [1] https://wiki.mozilla.org/Media/getUserMedia
-   // [2] https://developer.mozilla.org/docs/Web/API/MediaDevices/enumerateDevices
-user_pref("media.navigator.enabled", false);
-// 4613: [2511] disable MediaDevices change detection [FF51+]
-   // [1] https://developer.mozilla.org/docs/Web/Events/devicechange
-   // [2] https://developer.mozilla.org/docs/Web/API/MediaDevices/ondevicechange
-user_pref("media.ondevicechange.enabled", false);
-// FF60+
-// 4614: [2522] disable WebGL debug info being available to websites
-   // [1] https://bugzilla.mozilla.org/1171228
-   // [2] https://developer.mozilla.org/docs/Web/API/WEBGL_debug_renderer_info
-user_pref("webgl.enable-debug-renderer-info", false);
-// FF63+
-// 4615: enforce prefers-reduced-motion as no-preference [FF63+] [RESTART]
-   // 0=no-preference, 1=reduce
-user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
-// FF64+
-// 4616: [2516] disable PointerEvents [FF86 or lower]
-   // [1] https://developer.mozilla.org/docs/Web/API/PointerEvent
-   // [-] https://bugzilla.mozilla.org/1688105
-user_pref("dom.w3c_pointer_events.enabled", false);
-// FF67+
-// 4617: [2618] disable exposure of system colors to CSS or canvas [FF44+]
-   // [NOTE] See second listed bug: may cause black on black for elements with undefined colors
-   // [SETUP-CHROME] Might affect CSS in themes and extensions
-   // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=232227,1330876
-user_pref("ui.use_standins_for_native_colors", true);
-// 4618: enforce prefers-color-scheme as light [FF67+]
-   // 0=light, 1=dark : This overrides your OS value
-user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
-// FF72+
-// 4619: [2510] disable Web Audio API [FF51+]
-   // [1] https://bugzilla.mozilla.org/1288359
+/* 4612: disable media device enumeration [FF29+] ***/
+   // user_pref("media.navigator.enabled", false);
+/* 4613: disable MediaDevices change detection [FF51+] ***/
+   // user_pref("media.ondevicechange.enabled", false);
+/* 4614: disable WebGL debug info being available to websites ***/
+   // user_pref("webgl.enable-debug-renderer-info", false);
+/* 4615: enforce prefers-reduced-motion as no-preference: 0=no-preference, 1=reduce [FF63+] [RESTART] ***/
+   // user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
+/* 4617: disable exposure of system colors to CSS or canvas [FF44+] ***/
+   // user_pref("ui.use_standins_for_native_colors", true);
+/* 4618: enforce prefers-color-scheme as light: 0=light, 1=dark [FF67+] ***/
+   // user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
+/* 4619: disable Web Audio API [FF51+] ***/
    // user_pref("dom.webaudio.enabled", false);
-// FF80+
-// 4620: limit font visibility (Windows, Mac, some Linux) [FF79+]
-   // Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1]
-   // 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
-   // [NOTE] Bundled fonts are auto-allowed
-   // [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc
-user_pref("layout.css.font-visibility.level", 1);
-// ***/
-
-/*** [SECTION 4700]: RFP ALTERNATIVES (USER AGENT SPOOFING)
-     These prefs are insufficient and leak. Use RFP and **nothing else**
-     - Many of the user agent components can be derived by other means. When those
-       values differ, you provide more bits and raise entropy. Examples include
-       workers, iframes, headers, tcp/ip attributes, feature detection, and many more
-     - Web extensions also lack APIs to fully protect spoofing
-***/
-user_pref("_user.js.parrot", "4700 syntax error: the parrot's taken 'is last bow");
-/* 4701: navigator DOM object overrides
- * [WARNING] DO NOT USE ***/
+/* 4620: limit font visibility (Windows, Mac, some Linux) [FF79+]
+ * Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1], bundled fonts are auto-allowed
+ * 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
+ * [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc ***/
+   // user_pref("layout.css.font-visibility.level", 1);
+/* 4650: navigator DOM object overrides
+ * [WANRING] NO NOT USE: these prefs are insufficient and leak ***/
    // user_pref("general.appname.override", ""); // [HIDDEN PREF]
    // user_pref("general.appversion.override", ""); // [HIDDEN PREF]
    // user_pref("general.buildID.override", ""); // [HIDDEN PREF]
@@ -1620,8 +1553,9 @@ user_pref("_user.js.parrot", "4700 syntax error: the parrot's taken 'is last bow
    // user_pref("general.useragent.override", ""); // [HIDDEN PREF]
 
 /*** [SECTION 5000]: PERSONAL
-     Non-project related but useful. If any of these interest you, add them to your overrides
-     To save some overrides, we've made a few active as they seem to be universally used ***/
+   Non-project related but useful. If any of these interest you, add them to your overrides
+   To save some overrides, we've made a few active as they seem to be universally used
+***/
 user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
 /* WELCOME & WHAT's NEW NOTICES ***/
 user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switch
@@ -1665,9 +1599,9 @@ user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features",
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
-     Documentation denoted as [-]. Items deprecated in FF78 or earlier have been archived at [1],
-     which also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
-     [1] https://github.com/arkenfox/user.js/issues/123
+   Documentation denoted as [-]. Items deprecated in FF78 or earlier have been archived at [1],
+   which also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
+   [1] https://github.com/arkenfox/user.js/issues/123
 ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
 /* ESR78.x still uses all the following prefs
@@ -1700,6 +1634,10 @@ user_pref("browser.download.hide_plugins_without_extensions", false);
 // 0105d: disable Activity Stream recent Highlights in the Library [FF57+]
    // [-] https://bugzilla.mozilla.org/1689405
    // user_pref("browser.library.activity-stream.enabled", false);
+// 4616: disable PointerEvents
+   // [1] https://developer.mozilla.org/docs/Web/API/PointerEvent
+   // [-] https://bugzilla.mozilla.org/1688105
+   // user_pref("dom.w3c_pointer_events.enabled", false);
 // FF89
 // 0309: disable sending Flash crash reports
    // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]

From c3b7f7538c3c97331d000b08fedaa889df9e204b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 10 Aug 2021 01:21:04 +0000
Subject: [PATCH 0821/1147] i do not like mixed case lists

---
 README.md | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/README.md b/README.md
index ec755c6..39ddaa1 100644
--- a/README.md
+++ b/README.md
@@ -15,9 +15,9 @@ Also be aware that the `arkenfox user.js` is made specifically for desktop Firef
 
 ### 🟧  sitemap
 
- - [Releases](https://github.com/arkenfox/user.js/releases)
+ - [releases](https://github.com/arkenfox/user.js/releases)
  - [changelogs](https://github.com/arkenfox/user.js/issues?utf8=%E2%9C%93&q=is%3Aissue+label%3Achangelog)
- - [Wiki](https://github.com/arkenfox/user.js/wiki)
+ - [wiki](https://github.com/arkenfox/user.js/wiki)
  - [stickies](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+is%3Aopen+label%3A%22sticky+topic%22)
  - [diffs](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+label%3Adiffs)
 

From c45094fdd95b02f4d5cb70422ef953937a4d9e80 Mon Sep 17 00:00:00 2001
From: icpantsparti <35049679+icpantsparti@users.noreply.github.com>
Date: Wed, 11 Aug 2021 20:56:51 +0000
Subject: [PATCH 0822/1147] nits! (edit 2 typos) (#1232)

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index ceedf39..da72086 100644
--- a/user.js
+++ b/user.js
@@ -459,7 +459,7 @@ user_pref("browser.urlbar.trimURLs", false);
  * [5] https://lcamtuf.blogspot.com/2016/08/css-mix-blend-mode-is-bad-for-keeping.html ***/
    // user_pref("layout.css.visited_links_enabled", false);
 /* 0807: disable live search suggestions
-/* [NOTE] Both must be true for the location bar to work
+ * [NOTE] Both must be true for the location bar to work
  * [SETUP-CHROME] Change these if you trust and use a privacy respecting search engine
  * [SETTING] Search>Provide search suggestions | Show search suggestions in address bar results ***/
 user_pref("browser.search.suggest.enabled", false);
@@ -1544,7 +1544,7 @@ user_pref("_user.js.parrot", "4600 syntax error: the parrot's crossed the Jordan
  * [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc ***/
    // user_pref("layout.css.font-visibility.level", 1);
 /* 4650: navigator DOM object overrides
- * [WANRING] NO NOT USE: these prefs are insufficient and leak ***/
+ * [WARNING] NO NOT USE: these prefs are insufficient and leak ***/
    // user_pref("general.appname.override", ""); // [HIDDEN PREF]
    // user_pref("general.appversion.override", ""); // [HIDDEN PREF]
    // user_pref("general.buildID.override", ""); // [HIDDEN PREF]

From 568a05ad7dfa744fe3bf6d2afc6b97ebbaf5dff0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 14 Aug 2021 04:18:04 +0000
Subject: [PATCH 0823/1147] 2502: trim

this info is useless .. save three lines
---
 user.js | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/user.js b/user.js
index da72086..29d8c90 100644
--- a/user.js
+++ b/user.js
@@ -1055,9 +1055,6 @@ user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
 /*** [SECTION 2500]: HARDWARE FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");
 /* 2502: disable Battery Status API
- * Initially a Linux issue (high precision readout) that was fixed.
- * However, it is still another metric for fingerprinting, used to raise entropy.
- * e.g. do you have a battery or not, current charging status, charge level, times remaining etc
  * [NOTE] From FF52+ Battery Status API is only available in chrome/privileged code [1]
  * [1] https://bugzilla.mozilla.org/1313580 ***/
    // user_pref("dom.battery.enabled", false);

From 1b33f574bbfa3f3f8639a0b108e2575daffc8313 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 14 Aug 2021 04:44:50 +0000
Subject: [PATCH 0824/1147] RFP stuff

---
 user.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/user.js b/user.js
index 29d8c90..3108477 100644
--- a/user.js
+++ b/user.js
@@ -1454,6 +1454,8 @@ user_pref("privacy.firstparty.isolate", true);
    1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78+)
    1653987 - limit font visibility to bundled and "Base Fonts" (see 4620) (Windows, Mac, some Linux) (FF80+)
    1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82+)
+ FF91+
+    531915 - use fdlibm's sin, cos and tan in jsmath (FF93+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]

From 68568c1abfceea921676290cb7e4b8386b71ab5d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 16 Aug 2021 04:02:15 +0000
Subject: [PATCH 0825/1147] trim 1198 bytes (u lucky bastards!) + 13 lines

---
 user.js | 169 ++++++++++++++++++++++++++------------------------------
 1 file changed, 78 insertions(+), 91 deletions(-)

diff --git a/user.js b/user.js
index 3108477..bdf68c9 100644
--- a/user.js
+++ b/user.js
@@ -7,7 +7,7 @@
 
 * README:
 
-  1. Consider using Tor Browser if it meets your needs or fits your threat model better
+  1. Consider using Tor Browser if it meets your needs or fits your threat model
        * https://www.torproject.org/about/torusers.html.en
   2. Required reading: Overview, Backing Up, Implementing, and Maintenance entries
        * https://github.com/arkenfox/user.js/wiki
@@ -71,11 +71,12 @@
   5000: PERSONAL
   9999: DEPRECATED / REMOVED / LEGACY / RENAMED
 
+
 ******/
 
 /* START: internal custom pref to test for syntax errors
- * [NOTE] In FF60+, not all syntax errors cause parsing to abort i.e. reaching the last debug
- * pref no longer necessarily means that all prefs have been applied. Check the console right
+ * [NOTE] Not all syntax errors cause parsing to abort i.e. reaching the last debug pref
+ * no longer necessarily means that all prefs have been applied. Check the console right
  * after startup for any warnings/error messages related to non-applied prefs
  * [1] https://blog.mozilla.org/nnethercote/2018/03/09/a-new-preferences-parser-for-firefox/ ***/
 user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong with it?");
@@ -105,7 +106,7 @@ user_pref("browser.startup.homepage", "about:blank");
 user_pref("browser.newtabpage.enabled", false);
 user_pref("browser.newtab.preload", false);
 /* 0105: disable Activity Stream stuff (AS)
- * AS is the default homepage/newtab in FF57+, based on metadata and browsing behavior.
+ * AS is the default homepage/newtab based on metadata and browsing behavior
  *    **NOT LISTING ALL OF THESE: USE THE PREFERENCES UI**
  * [SETTING] Home>Firefox Home Content>...  to show/hide what you want ***/
 /* 0105a: disable Activity Stream telemetry ***/
@@ -125,7 +126,7 @@ user_pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); //
  * [NOTE] This does not block you from adding your own ***/
 user_pref("browser.newtabpage.activity-stream.default.sites", "");
 /* 0110: start Firefox in PB (Private Browsing) mode
- * [NOTE] In this mode *all* windows are "private windows" and the PB mode icon is not displayed
+ * [NOTE] In this mode all windows are "private windows" and the PB mode icon is not displayed
  * [WARNING] The P in PB mode is misleading: it means no "persistent" disk storage such as history,
  * caches, searches, cookies, localStorage, IndexedDB etc (which you can achieve in normal mode).
  * In fact, PB mode limits or removes the ability to control some of these, and you need to quit
@@ -177,10 +178,6 @@ user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 /*** [SECTION 0300]: QUIET FOX
    We only disable the auto-INSTALL of Firefox (app) updates. You still get prompts to update,
    and it only takes one click. We highly discourage disabling auto-CHECKING for updates.
-
-   Legitimate reasons to disable auto-INSTALLS include hijacked/monetized extensions, time
-   constraints, legacy issues, dev/testing, and fear of breakage/bugs. It is still important
-   to do updates for security reasons, please do so manually if you make changes.
 ***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
 /* 0301: disable auto-INSTALLING Firefox updates [NON-WINDOWS FF65+]
@@ -208,11 +205,10 @@ user_pref("extensions.getAddons.showPane", false); // [HIDDEN PREF]
 /* 0321: disable recommendations in about:addons' Extensions and Themes panes [FF68+] ***/
 user_pref("extensions.htmlaboutaddons.recommendations.enabled", false);
 /* 0330: disable telemetry
- * the pref (.unified) affects the behaviour of the pref (.enabled)
- * IF unified=false then .enabled controls the telemetry module
- * IF unified=true then .enabled ONLY controls whether to record extended data
- * so make sure to have both set as false
- * [NOTE] FF58+ 'toolkit.telemetry.enabled' is now LOCKED to reflect prerelease
+ * The "unified" pref affects the behaviour of the "enabled" pref
+ * - If "unified" is false then "enabled" controls the telemetry module
+ * - If "unified" is true then "enabled" only controls whether to record extended data
+ * [NOTE] FF58+ "toolkit.telemetry.enabled" is now LOCKED to reflect prerelease
  * or release builds (true and false respectively) [2]
  * [1] https://firefox-source-docs.mozilla.org/toolkit/components/telemetry/telemetry/internals/preferences.html
  * [2] https://medium.com/georg-fritzsche/data-preference-changes-in-firefox-58-2d5df9c428b5 ***/
@@ -281,8 +277,8 @@ user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
    [3] https://support.mozilla.org/kb/how-does-phishing-and-malware-protection-work
 ***/
 /* 0410: disable SB (Safe Browsing)
- * [WARNING] Do this at your own risk! These are the master switches.
- * [SETTING] Privacy & Security>Security>... "Block dangerous and deceptive content" ***/
+ * [WARNING] Do this at your own risk! These are the master switches
+ * [SETTING] Privacy & Security>Security>... Block dangerous and deceptive content ***/
    // user_pref("browser.safebrowsing.malware.enabled", false);
    // user_pref("browser.safebrowsing.phishing.enabled", false);
 /* 0411: disable SB checks for downloads (both local lookups + remote)
@@ -300,7 +296,7 @@ user_pref("browser.safebrowsing.downloads.remote.url", "");
  * [SETTING] Privacy & Security>Security>... "Warn you about unwanted and uncommon software" ***/
    // user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
    // user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
-/* 0419: disable 'ignore this warning' on SB warnings [FF45+]
+/* 0419: disable "ignore this warning" on SB warnings [FF45+]
  * If clicked, it bypasses the block for that session. This is a means for admins to enforce SB
  * [TEST] see github wiki APPENDIX A: Test Sites: Section 5
  * [1] https://bugzilla.mozilla.org/1226490 ***/
@@ -331,7 +327,7 @@ user_pref("app.normandy.api_url", "");
 user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
 user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
 /* 0506: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
- * Currently blocked by 'datareporting.healthreport.uploadEnabled' (see 0340) ***/
+ * Currently blocked by "datareporting.healthreport.uploadEnabled" (see 0340) ***/
 user_pref("browser.ping-centre.telemetry", false);
 /* 0515: disable Screenshots ***/
    // user_pref("extensions.screenshots.disabled", true); // [FF55+]
@@ -371,10 +367,10 @@ user_pref("network.http.speculative-parallel-limit", 0);
 /*** [SECTION 0700]: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
 /* 0701: disable IPv6
- * IPv6 can be abused, especially with MAC addresses, and can leak with VPNs. That's even
- * assuming your ISP and/or router and/or website can handle it. Sites will fall back to IPv4
+ * IPv6 can be abused, especially with MAC addresses, and can leak with VPNs: assuming
+ * your ISP and/or router and/or website is IPv6 capable. Most sites will fall back to IPv4
  * [STATS] Firefox telemetry (July 2021) shows ~10% of all connections are IPv6
- * [NOTE] This is just an application level fallback. Disabling IPv6 is best done at an
+ * [NOTE] This is an application level fallback. Disabling IPv6 is best done at an
  * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
  * then this won't make much difference. If you are masking your IP, then it can only help.
  * [NOTE] PHP defaults to IPv6 with "localhost". Use "php -S 127.0.0.1:PORT"
@@ -383,7 +379,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
 user_pref("network.dns.disableIPv6", true);
 /* 0702: disable HTTP2
  * HTTP2 raises concerns with "multiplexing" and "server push", does nothing to
- * enhance privacy, and opens up a number of server-side fingerprinting opportunities.
+ * enhance privacy, and opens up a number of server-side fingerprinting opportunities
  * [WARNING] Don't disable HTTP2. Don't be that one person using HTTP1.1 on HTTP2 sites
  * [STATS] ~46% of sites (July 2021) [5]
  * [1] https://http2.github.io/faq/
@@ -396,7 +392,7 @@ user_pref("network.dns.disableIPv6", true);
    // user_pref("network.http.spdy.enabled.http2", false);
    // user_pref("network.http.spdy.websockets", false); // [FF65+]
 /* 0703: disable HTTP Alternative Services [FF37+]
- * [SETUP-PERF] Relax this if you have FPI enabled (see 4000) *AND* you understand the
+ * [SETUP-PERF] Relax this if you have FPI enabled (see 4000) and you understand the
  * consequences. FPI isolates these, but it was designed with the Tor protocol in mind,
  * and the Tor Browser has extra protection, including enhanced sanitizing per Identity.
  * [1] https://tools.ietf.org/html/rfc7838#section-9
@@ -422,18 +418,18 @@ user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
 user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
 
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
-   Change items 0850 and above to suit for privacy vs convenience and functionality. Consider
-   your environment (no unwanted eyeballs), your device (restricted access), your device's
-   unattended state (locked, encrypted, forensic hardened). Likewise, you may want to check
-   the items cleared on shutdown in section 2800.
+   Change 0850 and above to suit for privacy vs convenience and functionality.
+   Consider your environment (no unwanted eyeballs), your device (restricted access),
+   your device's unattended state (locked, encrypted, forensic hardened). Likewise,
+   you may want to check the items cleared on shutdown in section 2800.
    [1] https://xkcd.com/538/
 ***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
 /* 0801: disable location bar using search
- * Don't leak URL typos to a search engine, give an error message instead.
+ * Don't leak URL typos to a search engine, give an error message instead
  * Examples: "secretplace,com", "secretplace/com", "secretplace com", "secret place.com"
- * [NOTE] This does **not** affect explicit user action such as using search buttons in the
- * dropdown, or using keyword search shortcuts you configure in options (e.g. 'd' for DuckDuckGo)
+ * [NOTE] This does not affect explicit user action such as using search buttons in the
+ * dropdown, or using keyword search shortcuts you configure in options (e.g. "d" for DuckDuckGo)
  * [SETUP-CHROME] If you don't, or rarely, type URLs, or you use a default search
  * engine that respects privacy, then you probably don't need this ***/
 user_pref("keyword.enabled", false);
@@ -514,7 +510,7 @@ user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
  * [SETTING] Privacy & Security>Logins and Passwords>Ask to save logins and passwords for websites ***/
    // user_pref("signon.rememberSignons", false);
 /* 0902: use a primary password
- * There are no preferences for this. It is all handled internally.
+ * There are no preferences for this. It is all handled internally
  * [SETTING] Privacy & Security>Logins and Passwords>Use a Primary Password
  * [1] https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas ***/
 /* 0903: set how often Firefox should ask for the primary password
@@ -545,12 +541,12 @@ user_pref("network.http.windows-sso.enabled", false);
 /*** [SECTION 1000]: CACHE / SESSION (RE)STORE / FAVICONS
    Cache tracking/fingerprinting techniques [1][2][3] require a cache. Disabling disk (1001)
    *and* memory (1003) caches is one solution; but that's extreme and fingerprintable. A hardened
-   Temporary Containers configuration can effectively do the same thing, by isolating every tab [4].
+   Temporary Containers configuration can effectively do the same thing, by isolating every tab [4]
 
    We consider avoiding disk cache (1001) so cache is session/memory only (like Private Browsing
    mode), and isolating cache to first party (4001) is sufficient and a good balance between
    risk and performance. ETAGs can also be neutralized by modifying response headers [5], and
-   you can clear the cache manually or on a regular basis with an extension.
+   you can clear the cache manually or on a regular basis with an extension
 
    [1] https://en.wikipedia.org/wiki/HTTP_ETag#Tracking_using_ETags
    [2] https://robertheaton.com/2014/01/20/cookieless-user-tracking-for-douchebags/
@@ -590,12 +586,10 @@ user_pref("browser.sessionstore.privacy_level", 2);
    // user_pref("browser.sessionstore.resume_from_crash", false);
 /* 1023: set the minimum interval between session save operations
  * Increasing this can help on older machines and some websites, as well as reducing writes [1]
- * Default is 15000 (15 secs). Try 30000 (30 secs), 60000 (1 min) etc
- * [SETUP-CHROME] This can also affect entries in the "Recently Closed Tabs" feature:
- * i.e. the longer the interval the more chance a quick tab open/close won't be captured.
- * This longer interval *may* affect history but we cannot replicate any history not recorded
+ * [SETUP-CHROME] This can affect entries in "Recently Closed Tabs": i.e. the
+ * longer the interval the more chance a quick tab open/close won't be captured
  * [1] https://bugzilla.mozilla.org/1304389 ***/
-user_pref("browser.sessionstore.interval", 30000);
+user_pref("browser.sessionstore.interval", 30000); // [DEFAULT: 1500]
 /* 1024: disable automatic Firefox start and session restore after reboot [FF62+] [WINDOWS]
  * [1] https://bugzilla.mozilla.org/603903 ***/
 user_pref("toolkit.winRegisterApplicationRestart", false);
@@ -603,7 +597,7 @@ user_pref("toolkit.winRegisterApplicationRestart", false);
 /** FAVICONS ***/
 /* 1030: disable favicons in shortcuts
  * URL shortcuts use a cached randomly named .ico file which is stored in your
- * profile/shortcutCache directory. The .ico remains after the shortcut is deleted.
+ * profile/shortcutCache directory. The .ico remains after the shortcut is deleted
  * If set to false then the shortcuts use a generic Firefox icon ***/
 user_pref("browser.shell.shortcutFavicons", false);
 /* 1031: disable favicons in history and bookmarks
@@ -638,7 +632,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
 user_pref("security.ssl.require_safe_negotiation", true);
 /* 1202: control TLS versions with min and max
  * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
- * [WARNING] Leave these at default, otherwise you alter your TLS fingerprint.
+ * [WARNING] Leave these at default, otherwise you alter your TLS fingerprint
  * [1] https://www.ssllabs.com/ssl-pulse/ ***/
    // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
    // user_pref("security.tls.version.max", 4);
@@ -686,8 +680,8 @@ user_pref("security.OCSP.require", true);
  * 2=deprecated option that now maps to 1
  * 3=only allowed for locally-added roots (e.g. anti-virus)
  * 4=only allowed for locally-added roots or for certs in 2015 and earlier
- * [SETUP-CHROME] When disabled, some man-in-the-middle devices (e.g. security scanners and
- * antivirus products, may fail to connect to HTTPS sites. SHA-1 is *almost* obsolete.
+ * [SETUP-CHROME] When disabled, some man-in-the-middle devices, e.g. security scanners and
+ * antivirus products, may fail to connect to HTTPS sites. SHA-1 is *almost* obsolete
  * [1] https://blog.mozilla.org/security/2016/10/18/phasing-out-sha-1-on-the-public-web/ ***/
 user_pref("security.pki.sha1_enforcement_level", 1);
 /* 1221: disable Windows 8.1's Microsoft Family Safety cert [FF50+] [WINDOWS]
@@ -732,8 +726,8 @@ user_pref("dom.security.https_only_mode", true); // [FF76+]
 /* 1245: enable HTTPS-Only mode for local resources [FF77+] ***/
    // user_pref("dom.security.https_only_mode.upgrade_local", true);
 /* 1246: disable HTTP background requests [FF82+]
- * When attempting to upgrade, if the server doesn't respond within 3 seconds, firefox
- * sends HTTP requests in order to check if the server supports HTTPS or not.
+ * When attempting to upgrade, if the server doesn't respond within 3 seconds,
+ * Firefox sends HTTP requests in order to check if the server supports HTTPS or not
  * This is done to avoid waiting for a timeout which takes 90 seconds
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1642387,1660945 ***/
 user_pref("dom.security.https_only_mode_send_http_background_request", false);
@@ -805,14 +799,13 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
  * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed
- * [NOTE] In FF81+ the whitelist **overrides** RFP's font visibility (see 4620)
+ * [NOTE] In FF81+ the whitelist overrides RFP's font visibility (see 4620)
  * [WARNING] DO NOT USE: in FF80+ RFP covers this, and non-RFP users should use font vis (4620)
  * [1] https://bugzilla.mozilla.org/1121643 ***/
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
 
 /*** [SECTION 1600]: HEADERS / REFERERS
    Only *cross domain* referers need controlling: leave 1601, 1602, 1605 and 1606 alone
-   ---
    Expect some breakage: Use an extension if you need precise control
    ---
                   full URI: https://example.com:8888/foo/bar.html?id=1234
@@ -935,8 +928,8 @@ user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
 /* 2202: prevent scripts from moving and resizing open windows ***/
 user_pref("dom.disable_window_move_resize", true);
 /* 2203: open links targeting new windows in a new tab instead
- * This stops malicious window sizes and some screen resolution leaks.
- * You can still right-click a link and open in a new window.
+ * Stops malicious window sizes and some screen resolution leaks.
+ * You can still right-click a link and open in a new window
  * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
 user_pref("browser.link.open_newwindow", 3); // 1=most recent window or tab 2=new window, 3=new tab
@@ -949,8 +942,7 @@ user_pref("browser.link.open_newwindow.restriction", 0);
 /* 2210: block popup windows
  * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
 user_pref("dom.disable_open_during_load", true);
-/* 2212: limit events that can cause a popup [SETUP-WEB]
- * default FF86+: "change click dblclick auxclick mousedown mouseup pointerdown pointerup notificationclick reset submit touchend contextmenu ***/
+/* 2212: limit events that can cause a popup [SETUP-WEB] ***/
 user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
 
 /*** [SECTION 2300]: WEB WORKERS
@@ -971,11 +963,11 @@ user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
  * Service workers essentially act as proxy servers that sit between web apps, and the
  * browser and network, are event driven, and can control the web page/site it is associated
  * with, intercepting and modifying navigation and resource requests, and caching resources.
- * [NOTE] Service worker APIs are hidden (in Firefox) and cannot be used when in PB mode.
- * [NOTE] Service workers only run over HTTPS. Service workers have no DOM access.
+ * [NOTE] Service workers require HTTPS, have no DOM access, and are not supported in PB mode [1]
  * [SETUP-WEB] Disabling service workers will break some sites. This pref is required true for
  * service worker notifications (2304), push notifications (disabled, 2305) and service worker
- * cache (2740). If you enable this pref, then check those settings as well ***/
+ * cache (2740). If you enable this pref, then check those settings as well
+ * [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1320796#c7 ***/
 user_pref("dom.serviceWorkers.enabled", false);
 /* 2304: disable Web Notifications
  * [NOTE] Web Notifications can also use service workers (2302) and are behind a prompt (2306)
@@ -984,11 +976,10 @@ user_pref("dom.serviceWorkers.enabled", false);
    // user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
 /* 2305: disable Push Notifications [FF44+]
  * Push is an API that allows websites to send you (subscribed) messages even when the site
- * isn't loaded, by pushing messages to your userAgentID through Mozilla's Push Server.
+ * isn't loaded, by pushing messages to your userAgentID through Mozilla's Push Server
  * [NOTE] Push requires service workers (2302) to subscribe to and display, and is behind
  * a prompt (2306). Disabling service workers alone doesn't stop Firefox polling the
- * Mozilla Push Server. To remove all subscriptions, reset your userAgentID (in about:config
- * or on start), and you will get a new one within a few seconds.
+ * Mozilla Push Server. To remove all subscriptions, reset your userAgentID.
  * [1] https://support.mozilla.org/kb/push-notifications-firefox
  * [2] https://developer.mozilla.org/docs/Web/API/Push_API ***/
 user_pref("dom.push.enabled", false);
@@ -1008,8 +999,8 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
 /* 2402: disable website access to clipboard events/content [SETUP-HARDEN]
  * [NOTE] This will break some sites' functionality e.g. Outlook, Twitter, Facebook, Wordpress
  * This applies to onCut/onCopy/onPaste events - i.e. it requires interaction with the website
- * [WARNING] In FF88 or lower, with clipboardevents enabled, if both 'middlemouse.paste' and
- * 'general.autoScroll' are true (at least one is default false) then the clipboard can leak [1]
+ * [WARNING] In FF88 or lower, with clipboardevents enabled, if both "middlemouse.paste" and
+ * "general.autoScroll" are true (at least one is default false) then the clipboard can leak [1]
  * [1] https://bugzilla.mozilla.org/1528289 ***/
    // user_pref("dom.event.clipboardevents.enabled", false);
 /* 2404: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
@@ -1017,9 +1008,8 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
  * [1] https://bugzilla.mozilla.org/1170911 ***/
 user_pref("dom.allow_cut_copy", false);
 /* 2405: disable "Confirm you want to leave" dialog on page close
- * Does not prevent JS leaks of the page close event.
- * [1] https://developer.mozilla.org/docs/Web/Events/beforeunload
- * [2] https://support.mozilla.org/questions/1043508 ***/
+ * Does not prevent JS leaks of the page close event
+ * [1] https://developer.mozilla.org/docs/Web/Events/beforeunload ***/
 user_pref("dom.disable_beforeunload", true);
 /* 2414: disable shaking the screen ***/
 user_pref("dom.vibrator.enabled", false);
@@ -1117,7 +1107,7 @@ user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
  * [1] https://bugzilla.mozilla.org/1173199 ***/
    // user_pref("mathml.disabled", true);
 /* 2610: disable in-content SVG (Scalable Vector Graphics) [FF53+]
- * [WARNING] Expect breakage incl. youtube player controls. Best left for a "hardened" profile.
+ * [WARNING] Expect breakage including youtube player controls
  * [1] https://bugzilla.mozilla.org/1216893 ***/
    // user_pref("svg.disabled", true);
 /* 2611: disable middle mouse click opening links from clipboard
@@ -1144,12 +1134,12 @@ user_pref("network.IDN_show_punycode", true);
 /* 2620: enforce PDFJS, disable PDFJS scripting [SETUP-CHROME]
  * This setting controls if the option "Display in Firefox" is available in the setting below
  *   and by effect controls whether PDFs are handled in-browser or externally ("Ask" or "Open With")
- * PROS: pdfjs is lightweight, open source, and as secure/vetted as any pdf reader out there (more than most)
+ * PROS: pdfjs is lightweight, open source, and as secure/vetted more than most
  *   Exploits are rare (one serious case in seven years), treated seriously and patched quickly.
  *   It doesn't break "state separation" of browser content (by not sharing with OS, independent apps).
  *   It maintains disk avoidance and application data isolation. It's convenient. You can still save to disk.
  * CONS: You may prefer a different pdf reader for security reasons
- * CAVEAT: JS can still force a pdf to open in-browser by bundling its own code (rare)
+ * CAVEAT: JS can still force a pdf to open in-browser by bundling its own code
  * [SETTING] General>Applications>Portable Document Format (PDF) ***/
 user_pref("pdfjs.disabled", false); // [DEFAULT: false]
 user_pref("pdfjs.enableScripting", false); // [FF86+]
@@ -1268,11 +1258,10 @@ user_pref("privacy.trackingprotection.socialtracking.enabled", true);
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
 /* 2720: disable DOM (Document Object Model) Storage
- * [WARNING] This will break a LOT of sites' functionality AND extensions!
- * You are better off using an extension for more granular control ***/
+ * [WARNING] This will break lots of sites and extensions! ***/
    // user_pref("dom.storage.enabled", false);
 /* 2730: disable offline cache (appCache)
- * [NOTE] In FF90+ the storage capability has been removed (1694662). For FF78-89 see the 2730 deprecated pref
+ * [NOTE] In FF90+ the storage capability has been removed (1694662)
  * [WARNING] The API is easily fingerprinted, do not disable ***/
    // user_pref("browser.cache.offline.enable", false);
 /* 2740: disable service worker cache and cache storage
@@ -1301,7 +1290,7 @@ user_pref("dom.storage.next_gen", true);
      "offlineApps" prefs below to false, and to set the cookie lifetime pref to 2 (2703)
    * "Offline Website Data" includes appCache (2730), localStorage (2720),
      service worker cache (2740), and QuotaManager (IndexedDB, asm-cache)
-   * In both 2803 + 2804, the 'download' and 'history' prefs are combined in the
+   * In both 2803 + 2804, the "download" and "history" prefs are combined in the
      Firefox interface as "Browsing & Download History" and their values will be synced
 ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
@@ -1309,11 +1298,10 @@ user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!"
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
 /* 2803: set what items to clear on shutdown (if 2802 is true) [SETUP-CHROME]
- * [NOTE] If 'history' is true, downloads will also be cleared regardless of the value
- * but if 'history' is false, downloads can still be cleared independently
- * However, this may not always be the case. The interface combines and syncs these
- * prefs when set from there, and the sanitize code may change at any time
- * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes>Settings ***/
+ * [NOTE] If "history" is true, downloads will also be cleared
+ * [NOTE] Active Logins does not refer to logins via cookies, but rather HTTP Basic Authentication [1]
+ * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes>Settings
+ * [1] https://en.wikipedia.org/wiki/Basic_access_authentication ***/
 user_pref("privacy.clearOnShutdown.cache", true);
 user_pref("privacy.clearOnShutdown.cookies", true);
 user_pref("privacy.clearOnShutdown.downloads", true); // see note above
@@ -1324,9 +1312,9 @@ user_pref("privacy.clearOnShutdown.sessions", true); // Active Logins
 user_pref("privacy.clearOnShutdown.siteSettings", false); // Site Preferences
 /* 2804: reset default items to clear with Ctrl-Shift-Del (to match 2803) [SETUP-CHROME]
  * This dialog can also be accessed from the menu History>Clear Recent History
- * Firefox remembers your last choices. This will reset them when you start Firefox.
- * [NOTE] Regardless of what you set privacy.cpd.downloads to, as soon as the dialog
- * for "Clear Recent History" is opened, it is synced to the same as 'history' ***/
+ * Firefox remembers your last choices. This will reset them when you start Firefox
+ * [NOTE] Regardless of what you set "downloads" to, as soon as the dialog
+ * for "Clear Recent History" is opened, it is synced to the same as "history" ***/
 user_pref("privacy.cpd.cache", true);
 user_pref("privacy.cpd.cookies", true);
    // user_pref("privacy.cpd.downloads", true); // not used, see note above
@@ -1342,12 +1330,11 @@ user_pref("privacy.cpd.siteSettings", false); // Site Preferences
  * [NOTE] privacy.cpd.openWindows has a bug that causes an additional window to open ***/
    // user_pref("privacy.clearOnShutdown.openWindows", true);
    // user_pref("privacy.cpd.openWindows", true);
-/* 2806: reset default 'Time range to clear' for 'Clear Recent History' (see 2804)
- * Firefox remembers your last choice. This will reset the value when you start Firefox.
- * 0=everything, 1=last hour, 2=last two hours, 3=last four hours,
- * 4=today, 5=last five minutes, 6=last twenty-four hours
- * [NOTE] The values 5 + 6 are not listed in the dropdown, which will display a
- * blank value if they are used, but they do work as advertised ***/
+/* 2806: reset default "Time range to clear" for "Clear Recent History" (see 2804)
+ * Firefox remembers your last choice. This will reset the value when you start Firefox
+ * 0=everything, 1=last hour, 2=last two hours, 3=last four hours, 4=today
+ * [NOTE] Values 5 (last 5 minutes) and 6 (last 24 hours) are not listed in the dropdown,
+ * which will display a blank value, and are not guaranteed to work ***/
 user_pref("privacy.sanitize.timeSpan", 0);
 
 /*** [SECTION 4000]: FPI (FIRST PARTY ISOLATION)
@@ -1380,7 +1367,7 @@ user_pref("privacy.firstparty.isolate", true);
  * [NOTE] Setting this to false may reduce the breakage in 4001
  * FF65+ blocks postMessage with targetOrigin "*" if originAttributes don't match. But
  * to reduce breakage it ignores the 1st-party domain (FPD) originAttribute [2][3]
- * The 2nd pref removes that limitation and will only allow communication if FPDs also match.
+ * The 2nd pref removes that limitation and will only allow communication if FPDs also match
  * [1] https://bugzilla.mozilla.org/1319773#c22
  * [2] https://bugzilla.mozilla.org/1492607
  * [3] https://developer.mozilla.org/docs/Web/API/Window/postMessage ***/
@@ -1459,13 +1446,13 @@ user_pref("privacy.firstparty.isolate", true);
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]
- * [SETUP-WEB] RFP can cause the odd website to break in strange ways, and has a few side affects,
- * but is largely robust nowadays. Give it a try. Your choice. Also see 4504 (letterboxing).
+ * [SETUP-WEB] RFP can some cause website breakage: mainly canvas, use a site exception via the urlbar
+ * RFP also has a few side effects: mainly timezone is UTC0, and websites will prefer light theme
  * [1] https://bugzilla.mozilla.org/418986 ***/
 user_pref("privacy.resistFingerprinting", true);
 /* 4502: set new window sizes to round to hundreds [FF55+] [SETUP-CHROME]
  * Width will round down to multiples of 200s and height to 100s, to fit your screen.
- * The override values are a starting point to round from if you want some control
+ * The max values are a starting point to round from if you want some control
  * [1] https://bugzilla.mozilla.org/1330882 ***/
    // user_pref("privacy.window.maxInnerWidth", 1000);
    // user_pref("privacy.window.maxInnerHeight", 1000);
@@ -1475,10 +1462,10 @@ user_pref("privacy.resistFingerprinting", true);
 user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDEN PREF]
 /* 4504: enable RFP letterboxing [FF67+]
  * Dynamically resizes the inner window by applying margins in stepped ranges [2]
- * If you use the dimension pref, then it will only apply those resolutions. The format is
- * "width1xheight1, width2xheight2, ..." (e.g. "800x600, 1000x1000, 1600x900")
- * [SETUP-WEB] This does NOT require RFP (see 4501) **for now**, so if you're not using 4501, or you are but
- * dislike margins being applied, then flip this pref, keeping in mind that it is effectively fingerprintable
+ * If you use the dimension pref, then it will only apply those resolutions.
+ * The format is "width1xheight1, width2xheight2, ..." (e.g. "800x600, 1000x1000")
+ * [SETUP-WEB] This is independent of RFP (4501). If you're not using RFP, or you are but
+ * dislike the margins, then flip this pref, keeping in mind that it is effectively fingerprintable
  * [WARNING] DO NOT USE: the dimension pref is only meant for testing
  * [1] https://bugzilla.mozilla.org/1407366
  * [2] https://hg.mozilla.org/mozilla-central/rev/6d2d7856e468#l2.32 ***/
@@ -1556,7 +1543,7 @@ user_pref("_user.js.parrot", "4600 syntax error: the parrot's crossed the Jordan
    To save some overrides, we've made a few active as they seem to be universally used
 ***/
 user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
-/* WELCOME & WHAT's NEW NOTICES ***/
+/* WELCOME & WHAT'S NEW NOTICES ***/
 user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switch
    // user_pref("startup.homepage_welcome_url", "");
    // user_pref("startup.homepage_welcome_url.additional", "");

From dcc736bb85240c63b9897d770ef08bddcd77bd29 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 16 Aug 2021 04:03:56 +0000
Subject: [PATCH 0826/1147] I meant 14 lines, u lucky bastards

---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index bdf68c9..1105839 100644
--- a/user.js
+++ b/user.js
@@ -71,7 +71,6 @@
   5000: PERSONAL
   9999: DEPRECATED / REMOVED / LEGACY / RENAMED
 
-
 ******/
 
 /* START: internal custom pref to test for syntax errors

From 7d1e244f5aef715da3488c9969305df571671a0d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 16 Aug 2021 04:10:20 +0000
Subject: [PATCH 0827/1147] 0506: clarify

oh noes! what's blocked, the pref or the ping? .. also save MOAR bytes
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 1105839..71ac044 100644
--- a/user.js
+++ b/user.js
@@ -326,7 +326,7 @@ user_pref("app.normandy.api_url", "");
 user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
 user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
 /* 0506: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
- * Currently blocked by "datareporting.healthreport.uploadEnabled" (see 0340) ***/
+ * Defense-in-depth: currently covered by 0340 ***/
 user_pref("browser.ping-centre.telemetry", false);
 /* 0515: disable Screenshots ***/
    // user_pref("extensions.screenshots.disabled", true); // [FF55+]

From 8d6ee7c0c74b0b458091164a691f90d83f39beed Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 16 Aug 2021 04:18:12 +0000
Subject: [PATCH 0828/1147] oophs

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 71ac044..6c1a4aa 100644
--- a/user.js
+++ b/user.js
@@ -588,7 +588,7 @@ user_pref("browser.sessionstore.privacy_level", 2);
  * [SETUP-CHROME] This can affect entries in "Recently Closed Tabs": i.e. the
  * longer the interval the more chance a quick tab open/close won't be captured
  * [1] https://bugzilla.mozilla.org/1304389 ***/
-user_pref("browser.sessionstore.interval", 30000); // [DEFAULT: 1500]
+user_pref("browser.sessionstore.interval", 30000); // [DEFAULT: 15000]
 /* 1024: disable automatic Firefox start and session restore after reboot [FF62+] [WINDOWS]
  * [1] https://bugzilla.mozilla.org/603903 ***/
 user_pref("toolkit.winRegisterApplicationRestart", false);

From e7872b193be81126e20da7f25d3fac4984901c7c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 16 Aug 2021 04:22:46 +0000
Subject: [PATCH 0829/1147] !yoda

no bytes were harmed in the making of this commit
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 6c1a4aa..e21c8cf 100644
--- a/user.js
+++ b/user.js
@@ -1445,7 +1445,7 @@ user_pref("privacy.firstparty.isolate", true);
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]
- * [SETUP-WEB] RFP can some cause website breakage: mainly canvas, use a site exception via the urlbar
+ * [SETUP-WEB] RFP can cause some website breakage: mainly canvas, use a site exception via the urlbar
  * RFP also has a few side effects: mainly timezone is UTC0, and websites will prefer light theme
  * [1] https://bugzilla.mozilla.org/418986 ***/
 user_pref("privacy.resistFingerprinting", true);

From 51e388ae866a2f133b575c7b3c850afdfd46a0c3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 16 Aug 2021 15:06:06 +0000
Subject: [PATCH 0830/1147] dom.storage.enabled

---
 scratchpad-scripts/arkenfox-clear-removed.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index fe97e52..6d23182 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
   This will reset the preferences that have been removed completely from the arkenfox user.js.
 
-  Last updated: 24-July-2021
+  Last updated: 16-August-2021
 
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -241,6 +241,8 @@
     'webgl.min_capability_mode',
     /* 89-beta */
     'security.ssl.enable_ocsp_stapling',
+    /* 91-beta */
+    'dom.storage.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ];

From 668e843fcea93871fefe968894309b17d520ba1c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 16 Aug 2021 15:34:57 +0000
Subject: [PATCH 0831/1147] misc

- remove 2720
   - this is a very old pref, been inactive since at least our first github release: v51
   - disabling the API is not how you control client side state: you do that by blocking cookies which also controls other state such as IDB etc
- 2700 section header
  - history/downloads is redundant
  - Offline Website Data info -> relevant item number with Active Logins info
  - ^ technically it still includes appCache for ESR78 users, but that will be moot in less than three months
- tidy RFP
  - update to FF91 userAgent spoofing: there is no Android ESR so we don't need to mention "Android 9"
  - we don't need to say if the API is enabled for mediaDevices
---
 user.js | 21 +++++++--------------
 1 file changed, 7 insertions(+), 14 deletions(-)

diff --git a/user.js b/user.js
index e21c8cf..2e1c291 100644
--- a/user.js
+++ b/user.js
@@ -1256,9 +1256,6 @@ user_pref("privacy.trackingprotection.enabled", true);
 user_pref("privacy.trackingprotection.socialtracking.enabled", true);
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
-/* 2720: disable DOM (Document Object Model) Storage
- * [WARNING] This will break lots of sites and extensions! ***/
-   // user_pref("dom.storage.enabled", false);
 /* 2730: disable offline cache (appCache)
  * [NOTE] In FF90+ the storage capability has been removed (1694662)
  * [WARNING] The API is easily fingerprinted, do not disable ***/
@@ -1287,10 +1284,6 @@ user_pref("dom.storage.next_gen", true);
    * If you want to keep some sites' cookies (exception as "Allow") and optionally other site
      data but clear all the rest on close, then you need to set the "cookie" and optionally the
      "offlineApps" prefs below to false, and to set the cookie lifetime pref to 2 (2703)
-   * "Offline Website Data" includes appCache (2730), localStorage (2720),
-     service worker cache (2740), and QuotaManager (IndexedDB, asm-cache)
-   * In both 2803 + 2804, the "download" and "history" prefs are combined in the
-     Firefox interface as "Browsing & Download History" and their values will be synced
 ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
 /* 2802: enable Firefox to clear items on shutdown (see 2803)
@@ -1298,7 +1291,8 @@ user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!"
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
 /* 2803: set what items to clear on shutdown (if 2802 is true) [SETUP-CHROME]
  * [NOTE] If "history" is true, downloads will also be cleared
- * [NOTE] Active Logins does not refer to logins via cookies, but rather HTTP Basic Authentication [1]
+ * [NOTE] Active Logins: does not refer to logins via cookies, but rather HTTP Basic Authentication [1]
+ * [NOTE] Offline Website Data: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes>Settings
  * [1] https://en.wikipedia.org/wiki/Basic_access_authentication ***/
 user_pref("privacy.clearOnShutdown.cache", true);
@@ -1389,15 +1383,15 @@ user_pref("privacy.firstparty.isolate", true);
       [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
  FF50+
    1281949 - spoof screen orientation
-   1281963 - hide the contents of navigator.plugins and navigator.mimeTypes
+   1281963 - hide contents of navigator.plugins and navigator.mimeTypes
  FF55+
-   1330890 - spoof timezone as UTC 0
+   1330890 - spoof timezone as UTC0
    1360039 - spoof navigator.hardwareConcurrency as 2 (see 4601)
    1217238 - reduce precision of time exposed by javascript
  FF56+
    1369303 - spoof/disable performance API (see 4602, 4603)
    1333651 - spoof User Agent & Navigator API (see 4650)
-      JS: FF78+ the version is spoofed as ESR, and the OS as Windows 10, OS 10.15, Android 9 (FF91+ as 10), or Linux
+      JS: FF91+ the version is spoofed as ESR, and the OS as Windows 10, OS 10.15, Android 10, or Linux
       HTTP Headers: spoofed as Windows or Android
    1369319 - disable device sensor API (see 4604)
    1369357 - disable site specific zoom (see 4605)
@@ -1411,13 +1405,12 @@ user_pref("privacy.firstparty.isolate", true);
    1382545 - reduce fingerprinting in Animation API
    1354633 - limit MediaError.message to a whitelist
    1382533 & 1697680 - enable fingerprinting resistance for Presentation API (FF57-87)
-      This blocks exposure of local IP Addresses via mDNS (Multicast DNS)
+      Blocks exposure of local IP Addresses via mDNS (Multicast DNS)
  FF58+
     967895 - spoof canvas and enable site permission prompt before allowing canvas data extraction
  FF59+
    1372073 - spoof/block fingerprinting in MediaDevices API
-      Spoof: enumerate devices reports one "Internal Camera" and one "Internal Microphone" if
-             media.navigator.enabled is true (see 4612)
+      Spoof: enumerate devices as one "Internal Camera" and one "Internal Microphone" (see 4612)
       Block: suppresses the ondevicechange event (see 4613)
    1039069 - warn when language prefs are set to non en-US (see 0210, 0211)
    1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events

From 1d63e836ee02e19b081fd7f49c8b61dbe1dc53c8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 17 Aug 2021 02:52:19 +0000
Subject: [PATCH 0832/1147] musical chairs part 1

- move 2200s into respective sections
- move FPing items into 2500s
---
 user.js | 76 +++++++++++++++++++++++++++------------------------------
 1 file changed, 36 insertions(+), 40 deletions(-)

diff --git a/user.js b/user.js
index 2e1c291..4ef5425 100644
--- a/user.js
+++ b/user.js
@@ -37,7 +37,7 @@
     - If you are not using arkenfox v78... (not a definitive list)
       - 1244: HTTPS-Only mode is enabled
       - 1401: document fonts is inactive as it is now covered by RFP in FF80+
-      - 2626: non-native widget theme is enforced
+      - 2525: non-native widget theme is enforced
       - 9999: switch the appropriate deprecated section(s) back on
 
 * INDEX:
@@ -58,7 +58,6 @@
   1700: CONTAINERS
   1800: PLUGINS
   2000: MEDIA / CAMERA / MIC
-  2200: WINDOW MEDDLING & LEAKS / POPUPS
   2300: WEB WORKERS
   2400: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT
   2500: HARDWARE FINGERPRINTING
@@ -922,28 +921,6 @@ user_pref("media.getusermedia.audiocapture.enabled", false);
  * [1] https://support.mozilla.org/questions/1293231 ***/
 user_pref("media.autoplay.blocking_policy", 2);
 
-/*** [SECTION 2200]: WINDOW MEDDLING & LEAKS / POPUPS ***/
-user_pref("_user.js.parrot", "2200 syntax error: the parrot's 'istory!");
-/* 2202: prevent scripts from moving and resizing open windows ***/
-user_pref("dom.disable_window_move_resize", true);
-/* 2203: open links targeting new windows in a new tab instead
- * Stops malicious window sizes and some screen resolution leaks.
- * You can still right-click a link and open in a new window
- * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
- * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
-user_pref("browser.link.open_newwindow", 3); // 1=most recent window or tab 2=new window, 3=new tab
-user_pref("browser.link.open_newwindow.restriction", 0);
-/* 2204: disable Fullscreen API (requires user interaction) to prevent screen-resolution leaks
- * [NOTE] You can still manually toggle the browser's fullscreen state (F11),
- * but this pref will disable embedded video/game fullscreen controls, e.g. youtube
- * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen ***/
-   // user_pref("full-screen-api.enabled", false);
-/* 2210: block popup windows
- * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
-user_pref("dom.disable_open_during_load", true);
-/* 2212: limit events that can cause a popup [SETUP-WEB] ***/
-user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
-
 /*** [SECTION 2300]: WEB WORKERS
    A worker is a JS "background task" running in a global context, i.e. it is different from
    the current window. Workers can spawn new workers (must be the same origin & scheme),
@@ -1002,14 +979,24 @@ user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!
  * "general.autoScroll" are true (at least one is default false) then the clipboard can leak [1]
  * [1] https://bugzilla.mozilla.org/1528289 ***/
    // user_pref("dom.event.clipboardevents.enabled", false);
-/* 2404: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
+/* 2403: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
  * this disables document.execCommand("cut"/"copy") to protect your clipboard
  * [1] https://bugzilla.mozilla.org/1170911 ***/
 user_pref("dom.allow_cut_copy", false);
-/* 2405: disable "Confirm you want to leave" dialog on page close
+/* 2404: disable "Confirm you want to leave" dialog on page close
  * Does not prevent JS leaks of the page close event
  * [1] https://developer.mozilla.org/docs/Web/Events/beforeunload ***/
 user_pref("dom.disable_beforeunload", true);
+/* 2405: prevent scripts from moving and resizing open windows ***/
+user_pref("dom.disable_window_move_resize", true);
+/* 2406: block popup windows
+ * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
+user_pref("dom.disable_open_during_load", true);
+/* 2407: limit events that can cause a popup [SETUP-WEB] ***/
+user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
+/* 2408: enable (limited but sufficient) window.opener protection [FF65+]
+ * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
+user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
 /* 2414: disable shaking the screen ***/
 user_pref("dom.vibrator.enabled", false);
 /* 2420: disable asm.js [FF22+] [SETUP-PERF]
@@ -1037,14 +1024,11 @@ user_pref("javascript.options.asmjs", false);
  * [2] https://spectrum.ieee.org/tech-talk/telecom/security/more-worries-over-the-security-of-web-assembly
  * [3] https://www.zdnet.com/article/half-of-the-websites-using-webassembly-use-it-for-malicious-purposes ***/
 user_pref("javascript.options.wasm", false);
-/* 2429: enable (limited but sufficient) window.opener protection [FF65+]
- * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
-user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
 
 /*** [SECTION 2500]: HARDWARE FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");
 /* 2502: disable Battery Status API
- * [NOTE] From FF52+ Battery Status API is only available in chrome/privileged code [1]
+ * [NOTE] FF52+ Battery Status API is only available in chrome/privileged code [1]
  * [1] https://bugzilla.mozilla.org/1313580 ***/
    // user_pref("dom.battery.enabled", false);
 /* 2508: disable hardware acceleration to reduce graphics fingerprinting [SETUP-HARDEN]
@@ -1076,6 +1060,22 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
 user_pref("webgl.disabled", true);
 user_pref("webgl.enable-webgl2", false);
 user_pref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT: true FF86+]
+/* 2523: enforce no system colors
+ * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
+user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
+/* 2524: open links targeting new windows in a new tab instead
+ * Stops malicious window sizes and some screen resolution leaks.
+ * You can still right-click a link and open in a new window
+ * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
+ * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
+user_pref("browser.link.open_newwindow", 3); // 1=most recent window or tab 2=new window, 3=new tab
+user_pref("browser.link.open_newwindow.restriction", 0);
+/* 2525: enforce non-native widget theme
+ * Security: removes/reduces system API calls, e.g. win32k API [1]
+ * Fingerprinting: provides a uniform look and feel across platforms [2]
+ * [1] https://bugzilla.mozilla.org/1381938
+ * [2] https://bugzilla.mozilla.org/1411425 ***/
+user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true FF89+]
 
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
@@ -1144,9 +1144,6 @@ user_pref("pdfjs.disabled", false); // [DEFAULT: false]
 user_pref("pdfjs.enableScripting", false); // [FF86+]
 /* 2621: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS] ***/
 user_pref("network.protocol-handler.external.ms-windows-store", false);
-/* 2622: enforce no system colors; they can be fingerprinted
- * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
-user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
 /* 2623: disable permissions delegation [FF73+]
  * Currently applies to cross-origin geolocation, camera, mic and screen-sharing
  * permissions, and fullscreen requests. Disabling delegation means any prompts
@@ -1161,12 +1158,11 @@ user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+]
 /* 2625: disable bypassing 3rd party extension install prompts [FF82+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1659530,1681331 ***/
 user_pref("extensions.postDownloadThirdPartyPrompt", false);
-/* 2626: enforce non-native widget theme
- * Security: removes/reduces system API calls, e.g. win32k API [1]
- * Fingerprinting: provides a uniform look and feel across platforms [2]
- * [1] https://bugzilla.mozilla.org/1381938
- * [2] https://bugzilla.mozilla.org/1411425 ***/
-user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true FF89+]
+/* 2626: disable Fullscreen API (requires user interaction)
+ * [NOTE] You can still toggle fullscreen with F11
+ * [WARNING] This is fingerprintable and will break embedded video/game FS controls, e.g. youtube
+ * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen ***/
+   // user_pref("full-screen-api.enabled", false);
 
 /** DOWNLOADS ***/
 /* 2650: discourage downloading to desktop
@@ -1276,7 +1272,7 @@ user_pref("privacy.trackingprotection.socialtracking.enabled", true);
  * [1] https://developer.mozilla.org/docs/Web/API/Storage_Access_API ***/
    // user_pref("dom.storage_access.enabled", false);
 /* 2760: enable Local Storage Next Generation (LSNG) [FF65+] ***/
-user_pref("dom.storage.next_gen", true);
+user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 
 /*** [SECTION 2800]: SHUTDOWN
    * Sanitizing on shutdown is all or nothing. It does not use Managed Exceptions under

From 77410bf86d4dd2d2ca163bbdbcfd54e65bc49ddb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 17 Aug 2021 03:08:48 +0000
Subject: [PATCH 0833/1147] musical chairs part 2

merge plugins with webrtc (camera + mic) and "media"
---
 user.js | 38 +++++++++++++++++---------------------
 1 file changed, 17 insertions(+), 21 deletions(-)

diff --git a/user.js b/user.js
index 4ef5425..598abe1 100644
--- a/user.js
+++ b/user.js
@@ -56,8 +56,7 @@
   1400: FONTS
   1600: HEADERS / REFERERS
   1700: CONTAINERS
-  1800: PLUGINS
-  2000: MEDIA / CAMERA / MIC
+  2000: PLUGINS / MEDIA / WEBRTC
   2300: WEB WORKERS
   2400: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT
   2500: HARDWARE FINGERPRINTING
@@ -868,22 +867,7 @@ user_pref("privacy.userContext.enabled", true);
  * [SETTING] General>Tabs>Enable Container Tabs>Settings>Select a container for each new tab ***/
    // user_pref("privacy.userContext.newTabContainerOnLeftClick.enabled", true);
 
-/*** [SECTION 1800]: PLUGINS ***/
-user_pref("_user.js.parrot", "1800 syntax error: the parrot's pushing up daisies!");
-/* 1820: disable GMP (Gecko Media Plugins)
- * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
-   // user_pref("media.gmp-provider.enabled", false);
-/* 1825: disable widevine CDM (Content Decryption Module)
- * [NOTE] This is covered by the EME master switch (1830) ***/
-   // user_pref("media.gmp-widevinecdm.enabled", false);
-/* 1830: disable all DRM content (EME: Encryption Media Extension)
- * [SETUP-WEB] e.g. Netflix, Amazon Prime, Hulu, HBO, Disney+, Showtime, Starz, DirectTV
- * [SETTING] General>DRM Content>Play DRM-controlled content
- * [TEST] https://bitmovin.com/demos/drm
- * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
-user_pref("media.eme.enabled", false);
-
-/*** [SECTION 2000]: MEDIA / CAMERA / MIC ***/
+/*** [SECTION 2000]: PLUGINS / MEDIA / WEBRTC ***/
 user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
 /* 2001: disable WebRTC (Web Real-Time Communication)
  * [SETUP-WEB] WebRTC can leak your IP address from behind your VPN, but if this is not
@@ -899,18 +883,30 @@ user_pref("media.peerconnection.enabled", false);
 user_pref("media.peerconnection.ice.default_address_only", true);
 user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
 user_pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true); // [FF70+]
-/* 2022: disable screensharing ***/
+/* 2003: disable screensharing ***/
 user_pref("media.getusermedia.screensharing.enabled", false);
 user_pref("media.getusermedia.browser.enabled", false);
 user_pref("media.getusermedia.audiocapture.enabled", false);
-/* 2024: set a default permission for Camera/Microphone [FF58+]
+/* 2004: set a default permission for Camera/Microphone [FF58+]
  * 0=always ask (default), 1=allow, 2=block
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Use the Camera/Microphone
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Camera/Microphone>Settings ***/
    // user_pref("permissions.default.camera", 2);
    // user_pref("permissions.default.microphone", 2);
+/* 2020: disable GMP (Gecko Media Plugins)
+ * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
+   // user_pref("media.gmp-provider.enabled", false);
+/* 2021: disable widevine CDM (Content Decryption Module)
+ * [NOTE] This is covered by the EME master switch (2022) ***/
+   // user_pref("media.gmp-widevinecdm.enabled", false);
+/* 2022: disable all DRM content (EME: Encryption Media Extension)
+ * [SETUP-WEB] e.g. Netflix, Amazon Prime, Hulu, HBO, Disney+, Showtime, Starz, DirectTV
+ * [SETTING] General>DRM Content>Play DRM-controlled content
+ * [TEST] https://bitmovin.com/demos/drm
+ * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
+user_pref("media.eme.enabled", false);
 /* 2030: disable autoplay of HTML5 media [FF63+]
- * 0=Allow all, 1=Block non-muted media (default in FF67+), 2=Prompt (removed in FF66), 5=Block all (FF69+)
+ * 0=Allow all, 1=Block non-muted media (default), 5=Block all
  * [NOTE] You can set exceptions under site permissions
  * [SETTING] Privacy & Security>Permissions>Autoplay>Settings>Default for all websites ***/
    // user_pref("media.autoplay.default", 5);

From d7208ccf344a254c2117c911ba41c38428161479 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 17 Aug 2021 03:41:56 +0000
Subject: [PATCH 0834/1147] tidy

---
 user.js | 9 ++++-----
 1 file changed, 4 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 598abe1..51d1d01 100644
--- a/user.js
+++ b/user.js
@@ -1027,20 +1027,19 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * [NOTE] FF52+ Battery Status API is only available in chrome/privileged code [1]
  * [1] https://bugzilla.mozilla.org/1313580 ***/
    // user_pref("dom.battery.enabled", false);
-/* 2508: disable hardware acceleration to reduce graphics fingerprinting [SETUP-HARDEN]
- * [WARNING] Affects text rendering (fonts will look different), impacts video performance,
- * and parts of Quantum that utilize the GPU will also be affected as they are rolled out
+/* 2508: disable hardware acceleration [SETUP-HARDEN]
+ * [WARNING] Affects rendering and performance
  * [SETTING] General>Performance>Custom>Use hardware acceleration when available
  * [1] https://wiki.mozilla.org/Platform/GFX/HardwareAcceleration ***/
    // user_pref("gfx.direct2d.disabled", true); // [WINDOWS]
    // user_pref("layers.acceleration.disabled", true);
 /* 2517: disable Media Capabilities API [FF63+]
- * [WARNING] This *may* affect media performance if disabled, no one is sure
+ * [WARNING] The API state is fingerprintable and disabling may affect performance
  * [1] https://github.com/WICG/media-capabilities
  * [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
    // user_pref("media.media-capabilities.enabled", false);
 /* 2520: disable virtual reality devices
- * Optional protection depending on your connected devices
+ * [WARNING] The API state is fingerprintable
  * [1] https://developer.mozilla.org/docs/Web/API/WebVR_API ***/
    // user_pref("dom.vr.enabled", false);
 /* 2521: set a default permission for Virtual Reality (see 2520) [FF73+]

From 41c3c0ec26ef4392169fa1d04fd5783ac03bfc8e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 17 Aug 2021 03:47:33 +0000
Subject: [PATCH 0835/1147] tweak 2522: webgl

- we already disable webgl, that's enough
- the other two prefs are not going to provide much protection if a user decides they want webgl
- "disable-fail-if-major-performance-caveat" only applies to ESR78 and will removed in the future
- one (or two) less pref(2) for users to troubleshoot/flip
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 51d1d01..27885ea 100644
--- a/user.js
+++ b/user.js
@@ -1053,8 +1053,8 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * [1] https://www.contextis.com/resources/blog/webgl-new-dimension-browser-exploitation/
  * [2] https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern ***/
 user_pref("webgl.disabled", true);
-user_pref("webgl.enable-webgl2", false);
-user_pref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT: true FF86+]
+   // user_pref("webgl.enable-webgl2", false);
+   // user_pref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT: true FF86+]
 /* 2523: enforce no system colors
  * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
 user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]

From fdc9376c69ef850ef2cc58e9da3c97f247dd0407 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 18 Aug 2021 01:50:09 +0000
Subject: [PATCH 0836/1147] tidy

- 0105*: merge into a single block
- 1220: make values more readable with spaces, like 2701 (no need for value 2), add default, update advise (get a new AV, SHA1 is dead baby)
- 2619: remove fluff
---
 user.js | 37 ++++++++++++++-----------------------
 1 file changed, 14 insertions(+), 23 deletions(-)

diff --git a/user.js b/user.js
index 27885ea..cba4c36 100644
--- a/user.js
+++ b/user.js
@@ -102,24 +102,18 @@ user_pref("browser.startup.homepage", "about:blank");
  * [SETTING] Home>New Windows and Tabs>New tabs ***/
 user_pref("browser.newtabpage.enabled", false);
 user_pref("browser.newtab.preload", false);
-/* 0105: disable Activity Stream stuff (AS)
- * AS is the default homepage/newtab based on metadata and browsing behavior
- *    **NOT LISTING ALL OF THESE: USE THE PREFERENCES UI**
+/* 0105: disable some Activity Stream items
+ * Activity Stream is the default homepage/newtab based on metadata and browsing behavior
  * [SETTING] Home>Firefox Home Content>...  to show/hide what you want ***/
-/* 0105a: disable Activity Stream telemetry ***/
 user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
 user_pref("browser.newtabpage.activity-stream.telemetry", false);
-/* 0105b: disable Activity Stream Snippets
- * Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
- * [1] https://abouthome-snippets-service.readthedocs.io/ ***/
 user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // [DEFAULT: false FF89+]
-/* 0105c: disable Activity Stream Top Stories, Pocket-based and/or sponsored content ***/
 user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
 user_pref("browser.newtabpage.activity-stream.showSponsored", false);
 user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false); // [FF66+]
 user_pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); // [FF83+]
-/* 0105e: clear default topsites
+/* 0106: clear default topsites
  * [NOTE] This does not block you from adding your own ***/
 user_pref("browser.newtabpage.activity-stream.default.sites", "");
 /* 0110: start Firefox in PB (Private Browsing) mode
@@ -263,7 +257,7 @@ user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
 user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
 
 /** SAFE BROWSING (SB)
-   Safe Browsing has taken many steps to preserve privacy. *IF* required, a full url is never
+   Safe Browsing has taken many steps to preserve privacy. If required, a full url is never
    sent to Google, only a PART-hash of the prefix, and this is hidden with noise of other real
    PART-hashes. Google also swear it is anonymized and only used to flag malicious sites.
    Firefox also takes measures such as striping out identifying parameters and since SBv4 (FF57+)
@@ -672,13 +666,11 @@ user_pref("security.OCSP.require", true);
 
 /** CERTS / HPKP (HTTP Public Key Pinning) ***/
 /* 1220: disable or limit SHA-1 certificates
- * 0=all SHA1 certs are allowed
- * 1=all SHA1 certs are blocked
- * 2=deprecated option that now maps to 1
- * 3=only allowed for locally-added roots (e.g. anti-virus)
- * 4=only allowed for locally-added roots or for certs in 2015 and earlier
- * [SETUP-CHROME] When disabled, some man-in-the-middle devices, e.g. security scanners and
- * antivirus products, may fail to connect to HTTPS sites. SHA-1 is *almost* obsolete
+ * 0 = allow all
+ * 1 = block all
+ * 3 = only allow locally-added roots (e.g. anti-virus) (default)
+ * 4 = only allow locally-added roots or for certs in 2015 and earlier
+ * [SETUP-CHROME] If you have problems, update your software: SHA-1 is obsolete
  * [1] https://blog.mozilla.org/security/2016/10/18/phasing-out-sha-1-on-the-public-web/ ***/
 user_pref("security.pki.sha1_enforcement_level", 1);
 /* 1221: disable Windows 8.1's Microsoft Family Safety cert [FF50+] [WINDOWS]
@@ -802,7 +794,7 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
 
 /*** [SECTION 1600]: HEADERS / REFERERS
-   Only *cross domain* referers need controlling: leave 1601, 1602, 1605 and 1606 alone
+   Only **cross domain** referers need controlling: leave 1601, 1602, 1605 and 1606 alone
    Expect some breakage: Use an extension if you need precise control
    ---
                   full URI: https://example.com:8888/foo/bar.html?id=1234
@@ -848,7 +840,7 @@ user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
 user_pref("privacy.donottrackheader.enabled", true);
 
 /*** [SECTION 1700]: CONTAINERS
-   If you want to *really* leverage containers, we highly recommend Temporary Containers [2].
+   If you want to really leverage containers, we recommend Temporary Containers [2].
    Read the article by the extension author [3], and check out the github wiki/repo [4].
    [1] https://wiki.mozilla.org/Security/Contextual_Identity_Project/Containers
    [2] https://addons.mozilla.org/firefox/addon/temporary-containers/
@@ -1117,7 +1109,6 @@ user_pref("permissions.manager.defaultsUrl", "");
 /* 2617: remove webchannel whitelist ***/
 user_pref("webchannel.allowObject.urlWhitelist", "");
 /* 2619: use Punycode in Internationalized Domain Names to eliminate possible spoofing
- * Firefox has *some* protections, but it is better to be safe than sorry
  * [SETUP-WEB] Might be undesirable for non-latin alphabet users since legitimate IDN's are also punycoded
  * [TEST] https://www.xn--80ak6aa92e.com/ (www.apple.com)
  * [1] https://wiki.mozilla.org/IDN_Display_Algorithm
@@ -1210,7 +1201,7 @@ user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
    [NOTE] Blocking cookies also blocks websites access to: localStorage (incl. sessionStorage),
    indexedDB, sharedWorker, and serviceWorker (and therefore service worker cache and notifications)
    If you set a site exception for cookies (either "Allow" or "Allow for Session") then they become
-   accessible to websites except shared/service workers where the cookie setting *must* be "Allow"
+   accessible to websites except shared/service workers where the cookie setting must be "Allow"
 ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 /* 2701: disable or isolate 3rd-party cookies and site-data [SETUP-WEB]
@@ -1425,7 +1416,7 @@ user_pref("privacy.firstparty.isolate", true);
    1653987 - limit font visibility to bundled and "Base Fonts" (see 4620) (Windows, Mac, some Linux) (FF80+)
    1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82+)
  FF91+
-    531915 - use fdlibm's sin, cos and tan in jsmath (FF93+)
+    531915 - use fdlibm's sin, cos and tan in jsmath (FF93+, ESR91.1+)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]
@@ -1620,7 +1611,7 @@ user_pref("dom.ipc.plugins.reportCrashURL", false);
 user_pref("security.mixed_content.block_object_subrequest", true);
 // 1803: disable Flash plugin
    // 0=deactivated, 1=ask, 2=enabled
-   // ESR52.x is the last branch to *fully* support NPAPI, FF52+ stable only supports Flash
+   // ESR52.x is the last branch to fully support NPAPI, FF52+ stable only supports Flash
    // [NOTE] You can still override individual sites via site permissions
    // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]
 user_pref("plugin.state.flash", 0); // [DEFAULT: 1]

From 08e9fb35fd9f432bd9513c62be8268691db1f5bc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 18 Aug 2021 07:16:19 +0000
Subject: [PATCH 0837/1147] update some references

---
 user.js | 8 +++-----
 1 file changed, 3 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index cba4c36..4568704 100644
--- a/user.js
+++ b/user.js
@@ -125,7 +125,7 @@ user_pref("browser.newtabpage.activity-stream.default.sites", "");
  * a temporary self-contained new session. Close all Private Windows to clear the PB mode session.
  * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
  * [1] https://wiki.mozilla.org/Private_Browsing
- * [2] https://spreadprivacy.com/is-private-browsing-really-private/ ***/
+ * [2] https://support.mozilla.org/kb/common-myths-about-private-browsing ***/
    // user_pref("browser.privatebrowsing.autostart", true);
 
 /*** [SECTION 0200]: GEOLOCATION / LANGUAGE / LOCALE ***/
@@ -240,8 +240,7 @@ user_pref("browser.tabs.crashReporting.sendReport", false); // [FF44+]
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send backlogged crash reports  ***/
 user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [DEFAULT: false]
 /* 0390: disable Captive Portal detection
- * [1] https://www.eff.org/deeplinks/2017/08/how-captive-portals-interfere-wireless-security-and-privacy
- * [2] https://wiki.mozilla.org/Necko/CaptivePortal ***/
+ * [1] https://www.eff.org/deeplinks/2017/08/how-captive-portals-interfere-wireless-security-and-privacy ***/
 user_pref("captivedetect.canonicalURL", "");
 user_pref("network.captive-portal-service.enabled", false); // [FF52+]
 /* 0391: disable Network Connectivity checks [FF65+]
@@ -310,8 +309,7 @@ user_pref("browser.safebrowsing.downloads.remote.url", "");
 user_pref("_user.js.parrot", "0500 syntax error: the parrot's cashed in 'is chips!");
 /* 0503: disable Normandy/Shield [FF60+]
  * Shield is an telemetry system (including Heartbeat) that can also push and test "recipes"
- * [1] https://wiki.mozilla.org/Firefox/Shield
- * [2] https://github.com/mozilla/normandy ***/
+ * [1] https://mozilla.github.io/normandy/ ***/
 user_pref("app.normandy.enabled", false);
 user_pref("app.normandy.api_url", "");
 /* 0505: disable System Add-on updates ***/

From e7e6cfffe852a558f870e74ab3f6bcff7f894781 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 18 Aug 2021 07:30:55 +0000
Subject: [PATCH 0838/1147] 0503: tidy

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 4568704..14492d4 100644
--- a/user.js
+++ b/user.js
@@ -308,7 +308,7 @@ user_pref("browser.safebrowsing.downloads.remote.url", "");
 ***/
 user_pref("_user.js.parrot", "0500 syntax error: the parrot's cashed in 'is chips!");
 /* 0503: disable Normandy/Shield [FF60+]
- * Shield is an telemetry system (including Heartbeat) that can also push and test "recipes"
+ * Shield is a telemetry system that can push and test "recipes"
  * [1] https://mozilla.github.io/normandy/ ***/
 user_pref("app.normandy.enabled", false);
 user_pref("app.normandy.api_url", "");

From 783786290d2278d00a3bb13d3e61678991845a5c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 18 Aug 2021 08:24:44 +0000
Subject: [PATCH 0839/1147] tidy

- geo -> warning
- merge container prefs
- remove redundant "see"s
- remove corresponding 4600's item number in RFP mitigations
   - it's pretty clear by the preference names in 4600
   - could be misconstrued that the 4600 pref is the same result
- RFP's language prompt only checks for en*, not en-US (so en-GB, en-CA etc do not get prompted)
   - https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPHelper.jsm#196
---
 user.js | 102 +++++++++++++++++++++++++++-----------------------------
 1 file changed, 49 insertions(+), 53 deletions(-)

diff --git a/user.js b/user.js
index 14492d4..13e2533 100644
--- a/user.js
+++ b/user.js
@@ -132,10 +132,10 @@ user_pref("browser.newtabpage.activity-stream.default.sites", "");
 user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");
 /** GEOLOCATION ***/
 /* 0201: disable Location-Aware Browsing
- * [NOTE] Best left at default "true", fingerprintable, already behind a prompt (see 0202)
+ * [WARNING] The API state is fingerprintable. Permission is already behind a prompt (0202)
  * [1] https://www.mozilla.org/firefox/geolocation/ ***/
    // user_pref("geo.enabled", false);
-/* 0202: set a default permission for Location (see 0201) [FF58+]
+/* 0202: set a default permission for Location (0201) [FF58+]
  * 0=always ask (default), 1=allow, 2=block
  * [NOTE] Best left at default "always ask", fingerprintable via Permissions API
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Access Your Location
@@ -154,7 +154,7 @@ user_pref("geo.provider.use_gpsd", false); // [LINUX]
 user_pref("browser.region.network.url", ""); // [FF78+]
 user_pref("browser.region.update.enabled", false); // [[FF79+]
 /* 0208: set search region
- * [NOTE] May not be hidden if Firefox has changed your settings due to your region (see 0207) ***/
+ * [NOTE] May not be hidden if Firefox has changed your settings due to your region (0207) ***/
    // user_pref("browser.search.region", "US"); // [HIDDEN PREF]
 
 /** LANGUAGE / LOCALE ***/
@@ -224,7 +224,7 @@ user_pref("datareporting.healthreport.uploadEnabled", false);
  * If disabled, no policy is shown or upload takes place, ever
  * [1] https://bugzilla.mozilla.org/1195552 ***/
 user_pref("datareporting.policy.dataSubmissionEnabled", false);
-/* 0342: disable Studies (see 0503)
+/* 0342: disable Studies
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to install and run studies ***/
 user_pref("app.shield.optoutstudies.enabled", false);
 /* 0343: disable personalized Extension Recommendations in about:addons and AMO [FF65+]
@@ -364,7 +364,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
  * then this won't make much difference. If you are masking your IP, then it can only help.
  * [NOTE] PHP defaults to IPv6 with "localhost". Use "php -S 127.0.0.1:PORT"
  * [TEST] https://ipleak.org/
- * [1] https://www.internetsociety.org/tag/ipv6-security/ (see Myths 2,4,5,6) ***/
+ * [1] https://www.internetsociety.org/tag/ipv6-security/ (Myths 2,4,5,6) ***/
 user_pref("network.dns.disableIPv6", true);
 /* 0702: disable HTTP2
  * HTTP2 raises concerns with "multiplexing" and "server push", does nothing to
@@ -381,7 +381,7 @@ user_pref("network.dns.disableIPv6", true);
    // user_pref("network.http.spdy.enabled.http2", false);
    // user_pref("network.http.spdy.websockets", false); // [FF65+]
 /* 0703: disable HTTP Alternative Services [FF37+]
- * [SETUP-PERF] Relax this if you have FPI enabled (see 4000) and you understand the
+ * [SETUP-PERF] Relax this if you have FPI enabled (4001) and you understand the
  * consequences. FPI isolates these, but it was designed with the Tor protocol in mind,
  * and the Tor Browser has extra protection, including enhanced sanitizing per Identity.
  * [1] https://tools.ietf.org/html/rfc7838#section-9
@@ -475,13 +475,13 @@ user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
    // user_pref("browser.urlbar.autoFill", false);
 /* 0860: disable search and form history
  * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
- * [NOTE] We also clear formdata on exit (see 2803)
+ * [NOTE] We also clear formdata on exit (2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
  * [2] https://bugzilla.mozilla.org/381681 ***/
 user_pref("browser.formfill.enable", false);
 /* 0862: disable browsing and download history
- * [NOTE] We also clear history and downloads on exiting Firefox (see 2803)
+ * [NOTE] We also clear history and downloads on exit (2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember browsing and download history ***/
    // user_pref("places.history.enabled", false);
 /* 0870: disable Windows jumplist [WINDOWS] ***/
@@ -503,11 +503,10 @@ user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
  * [SETTING] Privacy & Security>Logins and Passwords>Use a Primary Password
  * [1] https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas ***/
 /* 0903: set how often Firefox should ask for the primary password
- * 0=the first time (default), 1=every time it's needed, 2=every n minutes (see 0904) ***/
+ * 0=the first time (default), 1=every time it's needed, 2=every n minutes (0904) ***/
 user_pref("security.ask_for_password", 2);
-/* 0904: set how often in minutes Firefox should ask for the primary password (see 0903)
- * in minutes, default is 30 ***/
-user_pref("security.password_lifetime", 5);
+/* 0904: set how often in minutes Firefox should ask for the primary password (0903) ***/
+user_pref("security.password_lifetime", 5); // [DEFAULT: 30]
 /* 0905: disable auto-filling username & password form fields
  * can leak in cross-site forms *and* be spoofed
  * [NOTE] Username & password is still available when you enter the field
@@ -548,7 +547,7 @@ user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is m
 /* 1001: disable disk cache
  * [SETUP-PERF] If you think disk cache may help (heavy tab user, high-res video),
  * or you use a hardened Temporary Containers, then feel free to override this
- * [NOTE] We also clear cache on exiting Firefox (see 2803) ***/
+ * [NOTE] We also clear cache on exit (2803) ***/
 user_pref("browser.cache.disk.enable", false);
 /* 1003: disable memory cache
  * capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kibibytes ***/
@@ -786,7 +785,7 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
  * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed
- * [NOTE] In FF81+ the whitelist overrides RFP's font visibility (see 4620)
+ * [NOTE] In FF81+ the whitelist overrides RFP's font visibility (4620)
  * [WARNING] DO NOT USE: in FF80+ RFP covers this, and non-RFP users should use font vis (4620)
  * [1] https://bugzilla.mozilla.org/1121643 ***/
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
@@ -846,12 +845,10 @@ user_pref("privacy.donottrackheader.enabled", true);
    [4] https://github.com/stoically/temporary-containers/wiki
 ***/
 user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
-/* 1701: enable Container Tabs setting in preferences (see 1702) [FF50+]
- * [1] https://bugzilla.mozilla.org/1279029 ***/
-user_pref("privacy.userContext.ui.enabled", true);
-/* 1702: enable Container Tabs [FF50+]
+/* 1702: enable Container Tabs and it's UI setting [FF50+]
  * [SETTING] General>Tabs>Enable Container Tabs ***/
 user_pref("privacy.userContext.enabled", true);
+user_pref("privacy.userContext.ui.enabled", true);
 /* 1703: set behaviour on "+ Tab" button to display container menu on left click [FF74+]
  * [NOTE] The menu is always shown on long press and right click
  * [SETTING] General>Tabs>Enable Container Tabs>Settings>Select a container for each new tab ***/
@@ -903,7 +900,7 @@ user_pref("media.eme.enabled", false);
 /* 2031: disable autoplay of HTML5 media if you interacted with the site [FF78+]
  * 0=sticky (default), 1=transient, 2=user
  * Firefox's Autoplay Policy Documentation [PDF] is linked below via SUMO
- * [NOTE] If you have trouble with some video sites, then add an exception (see 2030)
+ * [NOTE] If you have trouble with some video sites, then add an exception (2030)
  * [1] https://support.mozilla.org/questions/1293231 ***/
 user_pref("media.autoplay.blocking_policy", 2);
 
@@ -1024,22 +1021,22 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
    // user_pref("gfx.direct2d.disabled", true); // [WINDOWS]
    // user_pref("layers.acceleration.disabled", true);
 /* 2517: disable Media Capabilities API [FF63+]
- * [WARNING] The API state is fingerprintable and disabling may affect performance
+ * [WARNING] The API state is fingerprintable. Disabling may affect performance
  * [1] https://github.com/WICG/media-capabilities
  * [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
    // user_pref("media.media-capabilities.enabled", false);
 /* 2520: disable virtual reality devices
- * [WARNING] The API state is fingerprintable
+ * [WARNING] The API state is fingerprintable. Permission is already behind a prompt (2521)
  * [1] https://developer.mozilla.org/docs/Web/API/WebVR_API ***/
    // user_pref("dom.vr.enabled", false);
-/* 2521: set a default permission for Virtual Reality (see 2520) [FF73+]
+/* 2521: set a default permission for Virtual Reality (2520) [FF73+]
  * 0=always ask (default), 1=allow, 2=block
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Access Virtual Reality Devices
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Virtual Reality>Settings ***/
    // user_pref("permissions.default.xr", 2);
 /* 2522: disable/limit WebGL (Web Graphics Library)
  * [SETUP-WEB] When disabled, will break some websites. When enabled, provides high entropy,
- * especially with readPixels(). Some of the other entropy is lessened with RFP (see 4501)
+ * especially with readPixels(). Some of the other entropy is lessened with RFP (4501)
  * [1] https://www.contextis.com/resources/blog/webgl-new-dimension-browser-exploitation/
  * [2] https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern ***/
 user_pref("webgl.disabled", true);
@@ -1237,11 +1234,10 @@ user_pref("privacy.trackingprotection.socialtracking.enabled", true);
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
 /* 2730: disable offline cache (appCache)
- * [NOTE] In FF90+ the storage capability has been removed (1694662)
- * [WARNING] The API is easily fingerprinted, do not disable ***/
+ * [WARNING] The API state is fingerprintable. Storage capability was removed in FF90+ (1694662) ***/
    // user_pref("browser.cache.offline.enable", false);
 /* 2740: disable service worker cache and cache storage
- * [NOTE] We clear service worker cache on exiting Firefox (see 2803)
+ * [NOTE] We clear service worker cache on exit (2803)
  * [1] https://w3c.github.io/ServiceWorker/#privacy ***/
    // user_pref("dom.caches.enabled", false);
 /* 2750: disable Storage API [FF51+]
@@ -1266,7 +1262,7 @@ user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
      "offlineApps" prefs below to false, and to set the cookie lifetime pref to 2 (2703)
 ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
-/* 2802: enable Firefox to clear items on shutdown (see 2803)
+/* 2802: enable Firefox to clear items on shutdown (2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
 /* 2803: set what items to clear on shutdown (if 2802 is true) [SETUP-CHROME]
@@ -1298,12 +1294,12 @@ user_pref("privacy.cpd.passwords", false); // this is not listed
 user_pref("privacy.cpd.sessions", true); // Active Logins
 user_pref("privacy.cpd.siteSettings", false); // Site Preferences
 /* 2805: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
- * [NOTE] Not needed if Session Restore is not used (see 0102) or is already cleared with history (see 2803)
- * [NOTE] privacy.clearOnShutdown.openWindows prevents resuming from crashes (see 1022)
+ * [NOTE] Not needed if Session Restore is not used (0102) or is already cleared with history (2803)
+ * [NOTE] privacy.clearOnShutdown.openWindows prevents resuming from crashes (1022)
  * [NOTE] privacy.cpd.openWindows has a bug that causes an additional window to open ***/
    // user_pref("privacy.clearOnShutdown.openWindows", true);
    // user_pref("privacy.cpd.openWindows", true);
-/* 2806: reset default "Time range to clear" for "Clear Recent History" (see 2804)
+/* 2806: reset default "Time range to clear" for "Clear Recent History" (2804)
  * Firefox remembers your last choice. This will reset the value when you start Firefox
  * 0=everything, 1=last hour, 2=last two hours, 3=last four hours, 4=today
  * [NOTE] Values 5 (last 5 minutes) and 6 (last 24 hours) are not listed in the dropdown,
@@ -1348,7 +1344,7 @@ user_pref("privacy.firstparty.isolate", true);
    // user_pref("privacy.firstparty.isolate.block_post_message", true);
 /* 4003: enable scheme with FPI [FF78+]
  * [NOTE] Experimental: existing data and site permissions are incompatible
- * and some site exceptions may not work e.g. HTTPS-only mode (see 1244) ***/
+ * and some site exceptions may not work e.g. HTTPS-only mode (1244) ***/
    // user_pref("privacy.firstparty.isolate.use_site", true);
 
 /*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
@@ -1366,21 +1362,21 @@ user_pref("privacy.firstparty.isolate", true);
    1281963 - hide contents of navigator.plugins and navigator.mimeTypes
  FF55+
    1330890 - spoof timezone as UTC0
-   1360039 - spoof navigator.hardwareConcurrency as 2 (see 4601)
+   1360039 - spoof navigator.hardwareConcurrency as 2
    1217238 - reduce precision of time exposed by javascript
  FF56+
-   1369303 - spoof/disable performance API (see 4602, 4603)
-   1333651 - spoof User Agent & Navigator API (see 4650)
+   1369303 - spoof/disable performance API
+   1333651 - spoof User Agent & Navigator API
       JS: FF91+ the version is spoofed as ESR, and the OS as Windows 10, OS 10.15, Android 10, or Linux
       HTTP Headers: spoofed as Windows or Android
-   1369319 - disable device sensor API (see 4604)
-   1369357 - disable site specific zoom (see 4605)
-   1337161 - hide gamepads from content (see 4606)
-   1372072 - spoof network information API as "unknown" when dom.netinfo.enabled = true (see 4607)
-   1333641 - reduce fingerprinting in WebSpeech API (see 4608)
+   1369319 - disable device sensor API
+   1369357 - disable site specific zoom
+   1337161 - hide gamepads from content
+   1372072 - spoof network information API as "unknown" when dom.netinfo.enabled = true
+   1333641 - reduce fingerprinting in WebSpeech API
  FF57+
-   1369309 - spoof media statistics (see 4610)
-   1382499 - reduce screen co-ordinate fingerprinting in Touch API (see 4611)
+   1369309 - spoof media statistics
+   1382499 - reduce screen co-ordinate fingerprinting in Touch API
    1217290 & 1409677 - enable some fingerprinting resistance for WebGL
    1382545 - reduce fingerprinting in Animation API
    1354633 - limit MediaError.message to a whitelist
@@ -1390,28 +1386,28 @@ user_pref("privacy.firstparty.isolate", true);
     967895 - spoof canvas and enable site permission prompt before allowing canvas data extraction
  FF59+
    1372073 - spoof/block fingerprinting in MediaDevices API
-      Spoof: enumerate devices as one "Internal Camera" and one "Internal Microphone" (see 4612)
-      Block: suppresses the ondevicechange event (see 4613)
-   1039069 - warn when language prefs are set to non en-US (see 0210, 0211)
+      Spoof: enumerate devices as one "Internal Camera" and one "Internal Microphone"
+      Block: suppresses the ondevicechange event
+   1039069 - warn when language prefs are not set to "en*" (also see 0210, 0211)
    1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events
       Spoofing mimics the content language of the document. Currently it only supports en-US.
       Modifier events suppressed are SHIFT and both ALT keys. Chrome is not affected.
  FF60-67
-   1337157 - disable WebGL debug renderer info (see 4614) (FF60+)
+   1337157 - disable WebGL debug renderer info (FF60+)
    1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62+)
-   1479239 - return "no-preference" with prefers-reduced-motion (see 4615) (FF63+)
-   1363508 - spoof/suppress Pointer Events (see 4616) (FF64+)
+   1479239 - return "no-preference" with prefers-reduced-motion (FF63+)
+   1363508 - spoof/suppress Pointer Events (FF64+)
       FF65: pointerEvent.pointerid (1492766)
-   1485266 - disable exposure of system colors to CSS or canvas (see 4617) (FF67+)
-   1407366 - enable inner window letterboxing (see 4504) (FF67+)
-   1494034 - return "light" with prefers-color-scheme (see 4618) (FF67+)
+   1485266 - disable exposure of system colors to CSS or canvas (FF67+)
+   1407366 - enable inner window letterboxing (4504) (FF67+)
+   1494034 - return "light" with prefers-color-scheme (FF67+)
  FF68-77
-   1564422 - spoof audioContext outputLatency (see 4619) (FF70+)
-   1595823 - return audioContext sampleRate as 44100 (see 4619) (FF72+)
+   1564422 - spoof audioContext outputLatency (FF70+)
+   1595823 - return audioContext sampleRate as 44100 (FF72+)
    1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74+)
  FF78-90
    1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78+)
-   1653987 - limit font visibility to bundled and "Base Fonts" (see 4620) (Windows, Mac, some Linux) (FF80+)
+   1653987 - limit font visibility to bundled and "Base Fonts" (Windows, Mac, some Linux) (FF80+)
    1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82+)
  FF91+
     531915 - use fdlibm's sin, cos and tan in jsmath (FF93+, ESR91.1+)

From 679648b33e633f1e494fcffa051672813f1e7cda Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 18 Aug 2021 09:03:16 +0000
Subject: [PATCH 0840/1147] RFP info tweak

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 13e2533..3823594 100644
--- a/user.js
+++ b/user.js
@@ -1397,7 +1397,7 @@ user_pref("privacy.firstparty.isolate", true);
    1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62+)
    1479239 - return "no-preference" with prefers-reduced-motion (FF63+)
    1363508 - spoof/suppress Pointer Events (FF64+)
-      FF65: pointerEvent.pointerid (1492766)
+   1492766 - spoof pointerEvent.pointerid (FF65+)
    1485266 - disable exposure of system colors to CSS or canvas (FF67+)
    1407366 - enable inner window letterboxing (4504) (FF67+)
    1494034 - return "light" with prefers-color-scheme (FF67+)

From 29ad768a22d4b097188f6e0dcfbbeb29aa6f13c3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 18 Aug 2021 09:08:36 +0000
Subject: [PATCH 0841/1147] RFP tweak

letterboxing is not part of RFP, it is a separate pref: bugzilla and FF version info is in 4504
---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 3823594..77c712d 100644
--- a/user.js
+++ b/user.js
@@ -1399,7 +1399,6 @@ user_pref("privacy.firstparty.isolate", true);
    1363508 - spoof/suppress Pointer Events (FF64+)
    1492766 - spoof pointerEvent.pointerid (FF65+)
    1485266 - disable exposure of system colors to CSS or canvas (FF67+)
-   1407366 - enable inner window letterboxing (4504) (FF67+)
    1494034 - return "light" with prefers-color-scheme (FF67+)
  FF68-77
    1564422 - spoof audioContext outputLatency (FF70+)

From 2ce269362e6103312cdb46200e874da62aa5cf51 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 18 Aug 2021 12:40:27 +0000
Subject: [PATCH 0842/1147] dom.battery.enabled

---
 scratchpad-scripts/arkenfox-clear-removed.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 6d23182..a2ec706 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
   This will reset the preferences that have been removed completely from the arkenfox user.js.
 
-  Last updated: 16-August-2021
+  Last updated: 18-August-2021
 
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -242,6 +242,7 @@
     /* 89-beta */
     'security.ssl.enable_ocsp_stapling',
     /* 91-beta */
+    'dom.battery.enabled',
     'dom.storage.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'

From a70c31293830625145db7035af8ec142546c4b5b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 18 Aug 2021 12:46:24 +0000
Subject: [PATCH 0843/1147] goodbye battery

- dead weight since 2017-06-13 when ESR45 reached EOL .. good riddance
- if someone does use it, it's not going to do any harm, so no need to carry it for prefsCleaner
---
 user.js | 4 ----
 1 file changed, 4 deletions(-)

diff --git a/user.js b/user.js
index 77c712d..cef74b9 100644
--- a/user.js
+++ b/user.js
@@ -1010,10 +1010,6 @@ user_pref("javascript.options.wasm", false);
 
 /*** [SECTION 2500]: HARDWARE FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");
-/* 2502: disable Battery Status API
- * [NOTE] FF52+ Battery Status API is only available in chrome/privileged code [1]
- * [1] https://bugzilla.mozilla.org/1313580 ***/
-   // user_pref("dom.battery.enabled", false);
 /* 2508: disable hardware acceleration [SETUP-HARDEN]
  * [WARNING] Affects rendering and performance
  * [SETTING] General>Performance>Custom>Use hardware acceleration when available

From dc63a752a58d591ec5c48b5c98ad815ce7bad463 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 18 Aug 2021 13:55:41 +0000
Subject: [PATCH 0844/1147] tidy 0300 + 0301

---
 user.js | 9 +++------
 1 file changed, 3 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index cef74b9..24c316d 100644
--- a/user.js
+++ b/user.js
@@ -166,13 +166,10 @@ user_pref("intl.accept_languages", "en-US, en");
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=867501,1629630 ***/
 user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 
-/*** [SECTION 0300]: QUIET FOX
-   We only disable the auto-INSTALL of Firefox (app) updates. You still get prompts to update,
-   and it only takes one click. We highly discourage disabling auto-CHECKING for updates.
-***/
+/*** [SECTION 0300]: QUIET FOX ***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
-/* 0301: disable auto-INSTALLING Firefox updates [NON-WINDOWS FF65+]
- * [NOTE] In FF65+ on Windows this SETTING (below) is now stored in a file and the pref was removed
+/* 0301: disable auto-INSTALLING Firefox updates [NON-WINDOWS]
+ * [NOTE] You will still get prompts to update, and should do so in a timely manner
  * [SETTING] General>Firefox Updates>Check for updates but let you choose to install them ***/
 user_pref("app.update.auto", false);
 /* 0302: disable auto-INSTALLING Firefox updates via a background service [FF90+] [WINDOWS]

From 7264271063c0c3c8baa1412f12ddf13511e65c91 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 19 Aug 2021 00:15:30 +0000
Subject: [PATCH 0845/1147] rusty-snake improvements, #1235

---
 user.js | 13 +++++--------
 1 file changed, 5 insertions(+), 8 deletions(-)

diff --git a/user.js b/user.js
index 24c316d..173450a 100644
--- a/user.js
+++ b/user.js
@@ -370,7 +370,7 @@ user_pref("network.dns.disableIPv6", true);
  * [STATS] ~46% of sites (July 2021) [5]
  * [1] https://http2.github.io/faq/
  * [2] https://blog.scottlogic.com/2014/11/07/http-2-a-quick-look.html
- * [3] https://http2.github.io/http2-spec/#rfc.section.10.8
+ * [3] https://datatracker.ietf.org/doc/html/rfc7540#section-10.8
  * [4] https://queue.acm.org/detail.cfm?id=2716278
  * [5] https://w3techs.com/technologies/details/ce-http2/all/all ***/
    // user_pref("network.http.spdy.enabled", false);
@@ -981,17 +981,14 @@ user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
 user_pref("dom.vibrator.enabled", false);
 /* 2420: disable asm.js [FF22+] [SETUP-PERF]
  * [1] http://asmjs.org/
- * [2] https://www.mozilla.org/security/advisories/mfsa2015-29/
- * [3] https://www.mozilla.org/security/advisories/mfsa2015-50/
- * [4] https://www.mozilla.org/security/advisories/mfsa2017-01/#CVE-2017-5375
- * [5] https://www.mozilla.org/security/advisories/mfsa2017-05/#CVE-2017-5400
- * [6] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
+ * [2] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=asm.js
+ * [3] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
 user_pref("javascript.options.asmjs", false);
 /* 2421: disable Ion and baseline JIT to harden against JS exploits [SETUP-HARDEN]
  * [NOTE] In FF75+, when **both** Ion and JIT are disabled, **and** the new
  * hidden pref is enabled, then Ion can still be used by extensions (1599226)
  * [WARNING] Disabling Ion/JIT can cause some site issues and performance loss
- * [1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817 ***/
+ * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Firefox+JIT ***/
    // user_pref("javascript.options.ion", false);
    // user_pref("javascript.options.baselinejit", false);
    // user_pref("javascript.options.jit_trustedprincipals", true); // [FF75+] [HIDDEN PREF]
@@ -1568,7 +1565,7 @@ user_pref("browser.search.geoSpecificDefaults", false);
 user_pref("browser.search.geoSpecificDefaults.url", "");
 // FF86
 // 1205: disable SSL Error Reporting
-   // [1] https://firefox-source-docs.mozilla.org/browser/base/sslerrorreport/preferences.html
+   // [1] https://firefox-source-docs.mozilla.org/main/65.0/browser/base/sslerrorreport/preferences.html
    // [-] https://bugzilla.mozilla.org/1681839
 user_pref("security.ssl.errorReporting.automatic", false);
 user_pref("security.ssl.errorReporting.enabled", false);

From f19d8508452ab96f1648f672f4c5c431264d8e33 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 19 Aug 2021 01:46:47 +0000
Subject: [PATCH 0846/1147] tidy #1235

8000s (was 4600s)
- move below personal, so user-relevant part is shorter
- swap out font vis with document fonts + font whitelist
   - font vis still has usability/visual purposes: it just won't really help much with fingerprinting
   - ESR78 users (who can't use font vis), sorry, but we made doc fonts inactive for a while now, and now recommend you don't use it anyway
---
 user.js | 155 +++++++++++++++++++++++++++-----------------------------
 1 file changed, 76 insertions(+), 79 deletions(-)

diff --git a/user.js b/user.js
index 173450a..3cfa190 100644
--- a/user.js
+++ b/user.js
@@ -36,7 +36,6 @@
     ESR78
     - If you are not using arkenfox v78... (not a definitive list)
       - 1244: HTTPS-Only mode is enabled
-      - 1401: document fonts is inactive as it is now covered by RFP in FF80+
       - 2525: non-native widget theme is enforced
       - 9999: switch the appropriate deprecated section(s) back on
 
@@ -65,8 +64,9 @@
   2800: SHUTDOWN
   4000: FPI (FIRST PARTY ISOLATION)
   4500: RFP (RESIST FINGERPRINTING)
-  4600: NON-RFP
   5000: PERSONAL
+  7000: DON'T BOTHER
+  8000: DON'T BOTHER: NON-RFP
   9999: DEPRECATED / REMOVED / LEGACY / RENAMED
 
 ******/
@@ -118,10 +118,10 @@ user_pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); //
 user_pref("browser.newtabpage.activity-stream.default.sites", "");
 /* 0110: start Firefox in PB (Private Browsing) mode
  * [NOTE] In this mode all windows are "private windows" and the PB mode icon is not displayed
- * [WARNING] The P in PB mode is misleading: it means no "persistent" disk storage such as history,
+ * [WARNING] The P in PB mode can be misleading: it means no "persistent" disk state such as history,
  * caches, searches, cookies, localStorage, IndexedDB etc (which you can achieve in normal mode).
  * In fact, PB mode limits or removes the ability to control some of these, and you need to quit
- * Firefox to clear them. PB is best used as a one off window (File>New Private Window) to provide
+ * Firefox to clear them. PB is best used as a one off window (Menu>New Private Window) to provide
  * a temporary self-contained new session. Close all Private Windows to clear the PB mode session.
  * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
  * [1] https://wiki.mozilla.org/Private_Browsing
@@ -141,7 +141,7 @@ user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely decease
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Access Your Location
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
    // user_pref("permissions.default.geo", 2);
-/* 0203: use Mozilla geolocation service instead of Google when geolocation is enabled [FF74+]
+/* 0203: use Mozilla geolocation service instead of Google if geolocation is granted [FF74+]
  * Optionally enable logging to the console (defaults to false) ***/
 user_pref("geo.provider.network.url", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
    // user_pref("geo.provider.network.logging.enabled", true); // [HIDDEN PREF]
@@ -719,7 +719,8 @@ user_pref("dom.security.https_only_mode_send_http_background_request", false);
  * [1] https://bugzilla.mozilla.org/1382359 ***/
    // user_pref("dom.securecontext.whitelist_onions", true);
 
-/** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro]
+/** CIPHERS
+   [WARNING] DO NOT USE: see the section 1200 intro
    These are the ciphers listed under "Cipher Suites" [1] that are either still using SHA-1 and CBC,
    and/or are missing Perfect Forward Secrecy [3] and/or have other weaknesses like key sizes of 128
    [1] https://browserleaks.com/ssl
@@ -762,30 +763,25 @@ user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 
 /*** [SECTION 1400]: FONTS ***/
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
-/* 1401: disable websites choosing fonts (0=block, 1=allow)
- * This can limit most (but not all) JS font enumeration which is a high entropy fingerprinting vector
- * [WARNING] DO NOT USE: in FF80+ RFP covers this, and non-RFP users should use font vis (4620)
- * [SETTING] General>Language and Appearance>Fonts & Colors>Advanced>Allow pages to choose... ***/
-   // user_pref("browser.display.use_document_fonts", 0);
-/* 1403: disable icon fonts (glyphs) and local fallback rendering
- * [1] https://bugzilla.mozilla.org/789788
- * [2] https://gitlab.torproject.org/legacy/trac/-/issues/8455 ***/
-   // user_pref("gfx.downloadable_fonts.enabled", false); // [FF41+]
-   // user_pref("gfx.downloadable_fonts.fallback_delay", -1);
-/* 1404: disable rendering of SVG OpenType fonts
+/* 1401: disable rendering of SVG OpenType fonts
  * [1] https://wiki.mozilla.org/SVGOpenTypeFonts - iSECPartnersReport recommends to disable this ***/
 user_pref("gfx.font_rendering.opentype_svg.enabled", false);
-/* 1408: disable graphite
+/* 1402: disable graphite
  * Graphite has had many critical security issues in the past [1]
  * [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778
  * [2] https://en.wikipedia.org/wiki/Graphite_(SIL) ***/
 user_pref("gfx.font_rendering.graphite.enabled", false);
-/* 1409: limit system font exposure to a whitelist [FF52+] [RESTART]
- * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed
- * [NOTE] In FF81+ the whitelist overrides RFP's font visibility (4620)
- * [WARNING] DO NOT USE: in FF80+ RFP covers this, and non-RFP users should use font vis (4620)
- * [1] https://bugzilla.mozilla.org/1121643 ***/
-   // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
+/* 1403: limit font visibility (Windows, Mac, some Linux) [FF79+]
+ * [NOTE] IN FF8)+ RFP ignores the pref and uses value 1
+ * Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1], bundled fonts are auto-allowed
+ * 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
+ * [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc ***/
+   // user_pref("layout.css.font-visibility.level", 1);
+/* 1404: disable icon fonts (glyphs) and local fallback rendering
+ * [1] https://bugzilla.mozilla.org/789788
+ * [2] https://gitlab.torproject.org/legacy/trac/-/issues/8455 ***/
+   // user_pref("gfx.downloadable_fonts.enabled", false); // [FF41+]
+   // user_pref("gfx.downloadable_fonts.fallback_delay", -1);
 
 /*** [SECTION 1600]: HEADERS / REFERERS
    Only **cross domain** referers need controlling: leave 1601, 1602, 1605 and 1606 alone
@@ -1342,7 +1338,7 @@ user_pref("privacy.firstparty.isolate", true);
    It is an all-or-nothing buy in: you cannot pick and choose what parts you want
 
    [WARNING] DO NOT USE extensions to alter RFP protected metrics
-   [WARNING] DO NOT USE prefs in section 4600 with RFP as they can interfere
+   [WARNING] DO NOT USE prefs in section 8000 with RFP as they can interfere
 
  FF41+
     418986 - limit window.screen & CSS media queries leaking identifiable info
@@ -1441,60 +1437,6 @@ user_pref("browser.startup.blankWindow", false);
  * [NOTE] pref added in FF63, but applied to chrome in FF77. RFP spoofs this for web content ***/
 user_pref("ui.prefersReducedMotion", 1); // [HIDDEN PREF]
 
-/*** [SECTION 4600]: NON-RFP
-   [WARNING] DO NOT USE with RFP. RFP already covers these, and they can interfere
-   [NOTE] These prefs will not help anti-fingerprinting. They are insufficient
-   on their own, can cause breakage, and will make you stand out
-***/
-user_pref("_user.js.parrot", "4600 syntax error: the parrot's crossed the Jordan");
-/* 4601: spoof number of CPU cores [FF48+] ***/
-   // user_pref("dom.maxHardwareConcurrency", 2);
-/* 4602: disable Resource Timing API ***/
-   // user_pref("dom.enable_resource_timing", false);
-/* 4603: disable Navigation Timing API ***/
-   // user_pref("dom.enable_performance", false);
-/* 4604: disable device Sensor APIs ***/
-   // user_pref("device.sensors.enabled", false);
-/* 4605: disable remembering site specific zoom ***/
-   // user_pref("browser.zoom.siteSpecific", false);
-/* 4606: disable gamepad API to prevent USB device ID enumeration ***/
-   // user_pref("dom.gamepad.enabled", false);
-/* 4607: disable Network Information API [FF31+] ***/
-   // user_pref("dom.netinfo.enabled", false); // [DEFAULT: true on Android]
-/* 4608: disable the SpeechSynthesis (Text-to-Speech) part of the Web Speech API ***/
-   // user_pref("media.webspeech.synth.enabled", false);
-/* 4610: disable video statistics to mitigate JS performance fingerprinting [FF25+] ***/
-   // user_pref("media.video_stats.enabled", false);
-/* 4611: disable touch events: 0=disabled, 1=enabled, 2=autodetect ***/
-   // user_pref("dom.w3c_touch_events.enabled", 0);
-/* 4612: disable media device enumeration [FF29+] ***/
-   // user_pref("media.navigator.enabled", false);
-/* 4613: disable MediaDevices change detection [FF51+] ***/
-   // user_pref("media.ondevicechange.enabled", false);
-/* 4614: disable WebGL debug info being available to websites ***/
-   // user_pref("webgl.enable-debug-renderer-info", false);
-/* 4615: enforce prefers-reduced-motion as no-preference: 0=no-preference, 1=reduce [FF63+] [RESTART] ***/
-   // user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
-/* 4617: disable exposure of system colors to CSS or canvas [FF44+] ***/
-   // user_pref("ui.use_standins_for_native_colors", true);
-/* 4618: enforce prefers-color-scheme as light: 0=light, 1=dark [FF67+] ***/
-   // user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
-/* 4619: disable Web Audio API [FF51+] ***/
-   // user_pref("dom.webaudio.enabled", false);
-/* 4620: limit font visibility (Windows, Mac, some Linux) [FF79+]
- * Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1], bundled fonts are auto-allowed
- * 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
- * [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc ***/
-   // user_pref("layout.css.font-visibility.level", 1);
-/* 4650: navigator DOM object overrides
- * [WARNING] NO NOT USE: these prefs are insufficient and leak ***/
-   // user_pref("general.appname.override", ""); // [HIDDEN PREF]
-   // user_pref("general.appversion.override", ""); // [HIDDEN PREF]
-   // user_pref("general.buildID.override", ""); // [HIDDEN PREF]
-   // user_pref("general.oscpu.override", ""); // [HIDDEN PREF]
-   // user_pref("general.platform.override", ""); // [HIDDEN PREF]
-   // user_pref("general.useragent.override", ""); // [HIDDEN PREF]
-
 /*** [SECTION 5000]: PERSONAL
    Non-project related but useful. If any of these interest you, add them to your overrides
    To save some overrides, we've made a few active as they seem to be universally used
@@ -1541,6 +1483,61 @@ user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features",
    // user_pref("network.manage-offline-status", false); // see bugzilla 620472
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 
+/*** [SECTION 8000]: DON'T BOTHER: NON-RFP
+   [WHY] They are insufficient to help anti-fingerprinting and can cause breakage
+   [WARNING] DO NOT USE with RFP. RFP already covers these, and they can interfere
+***/
+user_pref("_user.js.parrot", "8000 syntax error: the parrot's crossed the Jordan");
+/* 8001: spoof number of CPU cores [FF48+] ***/
+   // user_pref("dom.maxHardwareConcurrency", 2);
+/* 8002: disable Resource Timing API ***/
+   // user_pref("dom.enable_resource_timing", false);
+/* 8003: disable Navigation Timing API ***/
+   // user_pref("dom.enable_performance", false);
+/* 8004: disable device Sensor APIs ***/
+   // user_pref("device.sensors.enabled", false);
+/* 8005: disable remembering site specific zoom ***/
+   // user_pref("browser.zoom.siteSpecific", false);
+/* 8006: disable gamepad API to prevent USB device ID enumeration ***/
+   // user_pref("dom.gamepad.enabled", false);
+/* 8007: disable Network Information API [FF31+] ***/
+   // user_pref("dom.netinfo.enabled", false); // [DEFAULT: true on Android]
+/* 8008: disable the SpeechSynthesis (Text-to-Speech) part of the Web Speech API ***/
+   // user_pref("media.webspeech.synth.enabled", false);
+/* 8010: disable video statistics to mitigate JS performance fingerprinting [FF25+] ***/
+   // user_pref("media.video_stats.enabled", false);
+/* 8011: disable touch events: 0=disabled, 1=enabled, 2=autodetect ***/
+   // user_pref("dom.w3c_touch_events.enabled", 0);
+/* 8012: disable media device enumeration [FF29+] ***/
+   // user_pref("media.navigator.enabled", false);
+/* 8013: disable MediaDevices change detection [FF51+] ***/
+   // user_pref("media.ondevicechange.enabled", false);
+/* 8014: disable WebGL debug info being available to websites ***/
+   // user_pref("webgl.enable-debug-renderer-info", false);
+/* 8015: enforce prefers-reduced-motion as no-preference: 0=no-preference, 1=reduce [FF63+] [RESTART] ***/
+   // user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
+/* 8017: disable exposure of system colors to CSS or canvas [FF44+] ***/
+   // user_pref("ui.use_standins_for_native_colors", true);
+/* 8018: enforce prefers-color-scheme as light: 0=light, 1=dark [FF67+] ***/
+   // user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
+/* 8019: disable Web Audio API [FF51+] ***/
+   // user_pref("dom.webaudio.enabled", false);
+/* 8020: disable websites choosing fonts (0=block, 1=allow) ***/
+   // user_pref("browser.display.use_document_fonts", 0);
+/* 8021: limit system font exposure to a whitelist [FF52+] [RESTART]
+ * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed
+ * [NOTE] In FF81+ the whitelist overrides RFP and font visibility (1403)
+ * [1] https://bugzilla.mozilla.org/1121643 ***/
+   // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
+/* 8050: navigator DOM object overrides
+ * [WHY] These prefs are insufficient and leak ***/
+   // user_pref("general.appname.override", ""); // [HIDDEN PREF]
+   // user_pref("general.appversion.override", ""); // [HIDDEN PREF]
+   // user_pref("general.buildID.override", ""); // [HIDDEN PREF]
+   // user_pref("general.oscpu.override", ""); // [HIDDEN PREF]
+   // user_pref("general.platform.override", ""); // [HIDDEN PREF]
+   // user_pref("general.useragent.override", ""); // [HIDDEN PREF]
+
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
    Documentation denoted as [-]. Items deprecated in FF78 or earlier have been archived at [1],
    which also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets

From ac84da2af4b1c9454b3d97a93e67d58b1f448c38 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 19 Aug 2021 02:07:03 +0000
Subject: [PATCH 0847/1147] remove XHTML config warning

dead weight: ESR users will already be aware of and ticked the warning box by now
---
 user.js | 6 ++----
 1 file changed, 2 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 3cfa190..9e9c78c 100644
--- a/user.js
+++ b/user.js
@@ -78,10 +78,8 @@
  * [1] https://blog.mozilla.org/nnethercote/2018/03/09/a-new-preferences-parser-for-firefox/ ***/
 user_pref("_user.js.parrot", "START: Oh yes, the Norwegian Blue... what's wrong with it?");
 
-/* 0000: disable about:config warning
- * FF73-86: chrome://global/content/config.xhtml ***/
-user_pref("general.warnOnAboutConfig", false); // XHTML version
-user_pref("browser.aboutConfig.showWarning", false); // HTML version [FF71+]
+/* 0000: disable about:config warning ***/
+user_pref("browser.aboutConfig.showWarning", false);
 
 /*** [SECTION 0100]: STARTUP ***/
 user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");

From 00fa8f1b50dbc717ef9cc702679f3829d91fee05 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 19 Aug 2021 02:14:23 +0000
Subject: [PATCH 0848/1147] general.warnOnAboutConfig

https://github.com/arkenfox/user.js/commit/ac84da2af4b1c9454b3d97a93e67d58b1f448c38
---
 scratchpad-scripts/arkenfox-clear-removed.js | 35 ++++----------------
 1 file changed, 6 insertions(+), 29 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index a2ec706..040604f 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
   This will reset the preferences that have been removed completely from the arkenfox user.js.
 
-  Last updated: 18-August-2021
+  Last updated: 19-August-2021
 
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -13,15 +13,13 @@
 
   const aPREFS = [
     /* removed in arkenfox user.js */
-    /* 52-alpha */
+    /* 60 or lower */
     'browser.search.reset.enabled',
     'browser.search.reset.whitelist',
-    /* 54-alpha */
     'browser.migrate.automigrate.enabled',
     'services.sync.enabled',
     'webextensions.storage.sync.enabled',
     'webextensions.storage.sync.serverURL',
-    /* 55-alpha */
     'dom.keyboardevent.dispatch_during_composition', // default is false anyway
     'dom.vr.oculus.enabled', // covered by dom.vr.enabled
     'dom.vr.openvr.enabled', // ditto
@@ -29,12 +27,10 @@
     'extensions.pocket.api', // covered by extensions.pocket.enabled
     'extensions.pocket.oAuthConsumerKey', // ditto
     'extensions.pocket.site', // ditto
-    /* 57-alpha */
     'geo.wifi.xhr.timeout', // covered by geo.enabled
     'browser.search.geoip.timeout', // ditto
     'media.webspeech.recognition.enable', // default is false anyway
     'gfx.layerscope.enabled', // default is false anyway
-    /* 58-alpha */
     //  excluding these e10 settings
        // 'browser.tabs.remote.autostart',
        // 'browser.tabs.remote.autostart.2',
@@ -56,7 +52,6 @@
     'dom.presentation.enabled',
     'dom.presentation.receiver.enabled',
     'dom.presentation.session_transport.data_channel.enable',
-    /* 59-alpha */
     'browser.stopReloadAnimation.enabled',
     'browser.tabs.insertRelatedAfterCurrent',
     'browser.tabs.loadDivertedInBackground',
@@ -80,7 +75,6 @@
     'media.wmf.enabled',
     'media.wmf.vp9.enabled',
     'ui.submenuDelay',
-    /* 60-beta - these were all at default anyway */
     'device.storage.enabled',
     'general.useragent.compatMode.firefox',
     'network.dns.blockDotOnion',
@@ -88,7 +82,7 @@
     'security.block_script_with_wrong_mime',
     'security.fileuri.strict_origin_policy',
     'security.sri.enable',
-    /* 61-beta */
+    /* 61-68 */
     'browser.laterrun.enabled',
     'browser.offline-apps.notify',
     'browser.rights.3.shown',
@@ -101,14 +95,11 @@
     'network.http.fast-fallback-to-IPv4',
     'offline-apps.quota.warn',
     'services.blocklist.signing.enforced',
-    /* 62-beta */
     'browser.urlbar.autoFill.typed',
     'security.tls.version.fallback-limit',
-    /* 63-beta */
     'extensions.webextensions.keepStorageOnUninstall',
     'extensions.webextensions.keepUuidOnUninstall',
     'privacy.trackingprotection.ui.enabled',
-    /* 64-beta */
     'browser.eme.ui.enabled',
     'browser.sessionstore.max_windows_undo',
     'network.auth.subresource-img-cross-origin-http-auth-allow',
@@ -119,10 +110,8 @@
     'media.peerconnection.use_document_iceservers',
     'media.peerconnection.video.enabled',
     'media.navigator.video.enabled',
-    /* 65-beta */
     'browser.contentblocking.enabled',
     'browser.urlbar.maxHistoricalSearchSuggestions',
-    /* 67-beta */
     'app.update.service.enabled',
     'app.update.silent',
     'app.update.staging.enabled',
@@ -168,7 +157,6 @@
     'signon.autofillForms.http',
     'signon.storeWhenAutocompleteOff',
     'xpinstall.whitelist.required',
-    /* 67-beta: Blocklist, SB & TP cleanup: these were all inactive */
     'browser.safebrowsing.downloads.remote.block_dangerous',
     'browser.safebrowsing.downloads.remote.block_dangerous_host',
     'browser.safebrowsing.blockedURIs.enabled',
@@ -188,7 +176,6 @@
     'services.blocklist.plugins.collection',
     'services.blocklist.update_enabled',
     'urlclassifier.trackingTable',
-    /* 68-beta */
     'dom.forms.datetime',
     'font.blacklist.underline_offset',
     'font.name.monospace.x-unicode',
@@ -199,9 +186,8 @@
     'font.name.serif.x-western',
     'layout.css.font-loading-api.enabled',
     'toolkit.telemetry.cachedClientID',
-    /* 69-beta */
+    /* 69-78 */
     'plugin.sessionPermissionNow.intervalInMinutes',
-    /* 70-beta */
     'browser.cache.disk_cache_ssl',
     'browser.sessionhistory.max_entries',
     'dom.push.connection.enabled',
@@ -215,35 +201,26 @@
     'security.insecure_connection_icon.pbmode.enabled',
     'security.insecure_connection_text.pbmode.enabled',
     'webgl.dxgl.enabled',
-    /* 71-beta */
     'media.block-autoplay-until-in-foreground',
     'middlemouse.paste',
-    /* 75-beta */
     'browser.search.geoip.url',
     'browser.search.region',
-    /* 79-beta */
+    /* 79-91 */
     'browser.urlbar.usepreloadedtopurls.enabled',
-    /* 82-beta */
     'dom.IntersectionObserver.enabled',
     'extensions.screenshots.upload-disabled',
     'privacy.partition.network_state',
     'security.ssl3.dhe_rsa_aes_128_sha',
     'security.ssl3.dhe_rsa_aes_256_sha',
-    /* 84-beta */
     'browser.newtabpage.activity-stream.asrouter.providers.snippets',
-    /* 85-beta */
     'network.http.redirection-limit',
-    /* 86-beta */
     'media.gmp-widevinecdm.visible',
-    /* 87-beta */
     'browser.send_pings.require_same_host',
-    /* 88-beta */
     'webgl.min_capability_mode',
-    /* 89-beta */
     'security.ssl.enable_ocsp_stapling',
-    /* 91-beta */
     'dom.battery.enabled',
     'dom.storage.enabled',
+    'general.warnOnAboutConfig',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ];

From 93f6aea06afd0fefc37f8df84a4129e4ee1354a8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 19 Aug 2021 13:17:07 +0000
Subject: [PATCH 0849/1147] 1605: change to active enforced

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 9e9c78c..dd6452e 100644
--- a/user.js
+++ b/user.js
@@ -805,10 +805,10 @@ user_pref("network.http.referer.XOriginPolicy", 2);
 /* 1604: CROSS ORIGIN: control the amount of information to send [FF52+]
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
-/* 1605: ALL: disable spoofing a referer
- * [WARNING] Do not set this to true, as spoofing effectively disables the anti-CSRF
- * (Cross-Site Request Forgery) protections that some sites may rely on ***/
-   // user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false]
+/* 1605: ALL: enforce no spoofing of referer
+ * Spoofing effectively disables the anti-CSRF (Cross-Site Request Forgery)
+ * protections that some sites may rely on ***/
+user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false]
 /* 1606: ALL: set the default Referrer Policy [FF59+]
  * 0=no-referer, 1=same-origin, 2=strict-origin-when-cross-origin, 3=no-referrer-when-downgrade
  * [NOTE] This is only a default, it can be overridden by a site-controlled Referrer Policy

From 45c52b66201d4ded8e119530195329e3185b7465 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 19 Aug 2021 14:44:06 +0000
Subject: [PATCH 0850/1147] start section 7000s

---
 user.js | 75 +++++++++++++++++++++------------------------------------
 1 file changed, 28 insertions(+), 47 deletions(-)

diff --git a/user.js b/user.js
index dd6452e..bd4b41b 100644
--- a/user.js
+++ b/user.js
@@ -128,18 +128,7 @@ user_pref("browser.newtabpage.activity-stream.default.sites", "");
 
 /*** [SECTION 0200]: GEOLOCATION / LANGUAGE / LOCALE ***/
 user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");
-/** GEOLOCATION ***/
-/* 0201: disable Location-Aware Browsing
- * [WARNING] The API state is fingerprintable. Permission is already behind a prompt (0202)
- * [1] https://www.mozilla.org/firefox/geolocation/ ***/
-   // user_pref("geo.enabled", false);
-/* 0202: set a default permission for Location (0201) [FF58+]
- * 0=always ask (default), 1=allow, 2=block
- * [NOTE] Best left at default "always ask", fingerprintable via Permissions API
- * [SETTING] to add site exceptions: Ctrl+I>Permissions>Access Your Location
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Location>Settings ***/
-   // user_pref("permissions.default.geo", 2);
-/* 0203: use Mozilla geolocation service instead of Google if geolocation is granted [FF74+]
+/* 0203: use Mozilla geolocation service instead of Google if permission is granted [FF74+]
  * Optionally enable logging to the console (defaults to false) ***/
 user_pref("geo.provider.network.url", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
    // user_pref("geo.provider.network.logging.enabled", true); // [HIDDEN PREF]
@@ -154,8 +143,6 @@ user_pref("browser.region.update.enabled", false); // [[FF79+]
 /* 0208: set search region
  * [NOTE] May not be hidden if Firefox has changed your settings due to your region (0207) ***/
    // user_pref("browser.search.region", "US"); // [HIDDEN PREF]
-
-/** LANGUAGE / LOCALE ***/
 /* 0210: set preferred language for displaying web pages
  * [TEST] https://addons.mozilla.org/about ***/
 user_pref("intl.accept_languages", "en-US, en");
@@ -865,12 +852,6 @@ user_pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true); // [FF70
 user_pref("media.getusermedia.screensharing.enabled", false);
 user_pref("media.getusermedia.browser.enabled", false);
 user_pref("media.getusermedia.audiocapture.enabled", false);
-/* 2004: set a default permission for Camera/Microphone [FF58+]
- * 0=always ask (default), 1=allow, 2=block
- * [SETTING] to add site exceptions: Ctrl+I>Permissions>Use the Camera/Microphone
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Camera/Microphone>Settings ***/
-   // user_pref("permissions.default.camera", 2);
-   // user_pref("permissions.default.microphone", 2);
 /* 2020: disable GMP (Gecko Media Plugins)
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
    // user_pref("media.gmp-provider.enabled", false);
@@ -920,7 +901,7 @@ user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
  * [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1320796#c7 ***/
 user_pref("dom.serviceWorkers.enabled", false);
 /* 2304: disable Web Notifications
- * [NOTE] Web Notifications can also use service workers (2302) and are behind a prompt (2306)
+ * [NOTE] Web Notifications can also use service workers (2302) and are behind a prompt (7002)
  * [1] https://developer.mozilla.org/docs/Web/API/Notifications_API ***/
    // user_pref("dom.webnotifications.enabled", false); // [FF22+]
    // user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
@@ -928,18 +909,12 @@ user_pref("dom.serviceWorkers.enabled", false);
  * Push is an API that allows websites to send you (subscribed) messages even when the site
  * isn't loaded, by pushing messages to your userAgentID through Mozilla's Push Server
  * [NOTE] Push requires service workers (2302) to subscribe to and display, and is behind
- * a prompt (2306). Disabling service workers alone doesn't stop Firefox polling the
+ * a prompt (7002). Disabling service workers alone doesn't stop Firefox polling the
  * Mozilla Push Server. To remove all subscriptions, reset your userAgentID.
  * [1] https://support.mozilla.org/kb/push-notifications-firefox
  * [2] https://developer.mozilla.org/docs/Web/API/Push_API ***/
 user_pref("dom.push.enabled", false);
    // user_pref("dom.push.userAgentID", "");
-/* 2306: set a default permission for Notifications (both 2304 and 2305) [FF58+]
- * 0=always ask (default), 1=allow, 2=block
- * [NOTE] Best left at default "always ask", fingerprintable via Permissions API
- * [SETTING] to add site exceptions: Ctrl+I>Permissions>Receive Notifications
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Notifications>Settings ***/
-   // user_pref("permissions.default.desktop-notification", 2);
 
 /*** [SECTION 2400]: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT ***/
 user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");
@@ -1009,15 +984,6 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * [1] https://github.com/WICG/media-capabilities
  * [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
    // user_pref("media.media-capabilities.enabled", false);
-/* 2520: disable virtual reality devices
- * [WARNING] The API state is fingerprintable. Permission is already behind a prompt (2521)
- * [1] https://developer.mozilla.org/docs/Web/API/WebVR_API ***/
-   // user_pref("dom.vr.enabled", false);
-/* 2521: set a default permission for Virtual Reality (2520) [FF73+]
- * 0=always ask (default), 1=allow, 2=block
- * [SETTING] to add site exceptions: Ctrl+I>Permissions>Access Virtual Reality Devices
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Virtual Reality>Settings ***/
-   // user_pref("permissions.default.xr", 2);
 /* 2522: disable/limit WebGL (Web Graphics Library)
  * [SETUP-WEB] When disabled, will break some websites. When enabled, provides high entropy,
  * especially with readPixels(). Some of the other entropy is lessened with RFP (4501)
@@ -1123,11 +1089,6 @@ user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+]
 /* 2625: disable bypassing 3rd party extension install prompts [FF82+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1659530,1681331 ***/
 user_pref("extensions.postDownloadThirdPartyPrompt", false);
-/* 2626: disable Fullscreen API (requires user interaction)
- * [NOTE] You can still toggle fullscreen with F11
- * [WARNING] This is fingerprintable and will break embedded video/game FS controls, e.g. youtube
- * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen ***/
-   // user_pref("full-screen-api.enabled", false);
 
 /** DOWNLOADS ***/
 /* 2650: discourage downloading to desktop
@@ -1173,7 +1134,6 @@ user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
           cookies : profile\cookies.sqlite
      localStorage : profile\webappsstore.sqlite
         indexedDB : profile\storage\default
-         appCache : profile\OfflineCache (FF89 or lower)
    serviceWorkers :
 
    [NOTE] indexedDB and serviceWorkers are not available in Private Browsing Mode
@@ -1217,9 +1177,6 @@ user_pref("privacy.trackingprotection.enabled", true);
 user_pref("privacy.trackingprotection.socialtracking.enabled", true);
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
-/* 2730: disable offline cache (appCache)
- * [WARNING] The API state is fingerprintable. Storage capability was removed in FF90+ (1694662) ***/
-   // user_pref("browser.cache.offline.enable", false);
 /* 2740: disable service worker cache and cache storage
  * [NOTE] We clear service worker cache on exit (2803)
  * [1] https://w3c.github.io/ServiceWorker/#privacy ***/
@@ -1481,6 +1438,30 @@ user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features",
    // user_pref("network.manage-offline-status", false); // see bugzilla 620472
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 
+/*** [SECTION 7000] DON'T BOTHER ***/
+user_pref("_user.js.parrot", "8000 syntax error: the parrot's pushing up daisies!");
+/* 7001: disable APIs
+ * Location-Aware Browsing, Full Screen, offline cache (appCache), Virtual Reality
+ * [WHY] The API state is easily fingerprintable. Geo and VR are behind prompts (7002).
+ * appCache storage capability was removed in FF90. Full screen requires user interaction,
+ * and you can still toggle fullscreen with F11 ***/
+   // user_pref("geo.enabled", false);
+   // user_pref("full-screen-api.enabled", false);
+   // user_pref("browser.cache.offline.enable", false);
+   // user_pref("dom.vr.enabled", false);
+/* 7002: set default permissions
+ * Location, Camera, Microphone, Notifications [FF58+] Virtual Reality [FF73+]
+ * 0=always ask (default), 1=allow, 2=block
+ * [WHY] These are fingerprintable via Permissions API, except VR. Just add site
+ * exceptions as block for frequently visited annoying sites: i.e not global
+ * [SETTING] to add site exceptions: Ctrl+I>Permissions>
+ * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
+   // user_pref("permissions.default.geo", 0);
+   // user_pref("permissions.default.camera", 0);
+   // user_pref("permissions.default.microphone", 0);
+   // user_pref("permissions.default.desktop-notification", 0);
+   // user_pref("permissions.default.xr", 0); // Virtual Reality
+
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP
    [WHY] They are insufficient to help anti-fingerprinting and can cause breakage
    [WARNING] DO NOT USE with RFP. RFP already covers these, and they can interfere
@@ -1597,7 +1578,7 @@ user_pref("plugin.state.flash", 0); // [DEFAULT: 1]
 // 0708: disable FTP [FF60+]
    // [-] https://bugzilla.mozilla.org/1574475
    // user_pref("network.ftp.enabled", false); // [DEFAULT: false FF88+]
-// 2730: enforce no offline cache storage (appCache) [FF71+]
+// 7001: enforce no offline cache storage (appCache) [FF71+]
    // [-] https://bugzilla.mozilla.org/1694662
 user_pref("browser.cache.offline.storage.enable", false); // [DEFAULT: false FF84+]
 // ***/

From 5ab3c47b6bd5c61512a451aa65ac91ad8bb72509 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 19 Aug 2021 15:26:22 +0000
Subject: [PATCH 0851/1147] 7001: tweak

F11 has nothing to do with the API or why
---
 user.js | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/user.js b/user.js
index bd4b41b..4577a80 100644
--- a/user.js
+++ b/user.js
@@ -1443,8 +1443,7 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's pushing up daisies
 /* 7001: disable APIs
  * Location-Aware Browsing, Full Screen, offline cache (appCache), Virtual Reality
  * [WHY] The API state is easily fingerprintable. Geo and VR are behind prompts (7002).
- * appCache storage capability was removed in FF90. Full screen requires user interaction,
- * and you can still toggle fullscreen with F11 ***/
+ * appCache storage capability was removed in FF90. Full screen requires user interaction ***/
    // user_pref("geo.enabled", false);
    // user_pref("full-screen-api.enabled", false);
    // user_pref("browser.cache.offline.enable", false);

From a8e95e73107cd40a73229c571caf7a265b656301 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 20 Aug 2021 02:13:53 +0000
Subject: [PATCH 0852/1147] dexter would be proud #1235

- just to be clear, this section is not supported: not interested in references or explanations or  FF version numbers or default info etc
- "do more harm than good" - ambiguous, not interested in explaining why exactly: but FYI
  - some leak
  - most break shit
  - almost all are easily fingerprinted and the combo of them would make you really stand out
- removed the duplicate `ui.prefersReducedMotion` - this should move to personal as well
- moved `ui.systemUsesDarkTheme` to personal
---
 user.js | 59 +++++++++++++++++++--------------------------------------
 1 file changed, 19 insertions(+), 40 deletions(-)

diff --git a/user.js b/user.js
index 4577a80..0719d45 100644
--- a/user.js
+++ b/user.js
@@ -1389,6 +1389,7 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
 /* 4520: disable chrome animations [FF77+] [RESTART]
+ * 0=no-preference, 1=reduce
  * [NOTE] pref added in FF63, but applied to chrome in FF77. RFP spoofs this for web content ***/
 user_pref("ui.prefersReducedMotion", 1); // [HIDDEN PREF]
 
@@ -1410,6 +1411,7 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc
    // user_pref("full-screen-api.warning.timeout", 0);
 /* APPEARANCE ***/
    // user_pref("browser.download.autohideButton", false); // [FF57+]
+   // user_pref("ui.systemUsesDarkTheme", 1); // with RFP this only affects chrome: 0=light, 1=dark [FF67+] [HIDDEN PREF]
    // user_pref("toolkit.legacyUserProfileCustomizations.stylesheets", true); // [FF68+] allow userChrome/userContent
 /* CONTENT BEHAVIOR ***/
    // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
@@ -1462,59 +1464,36 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's pushing up daisies
    // user_pref("permissions.default.xr", 0); // Virtual Reality
 
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP
-   [WHY] They are insufficient to help anti-fingerprinting and can cause breakage
-   [WARNING] DO NOT USE with RFP. RFP already covers these, and they can interfere
+   [WHY] They are insufficient to help anti-fingerprinting and do more harm than good
+   [WARNING] DO NOT USE with RFP. RFP already covers these and they can interfere
 ***/
 user_pref("_user.js.parrot", "8000 syntax error: the parrot's crossed the Jordan");
-/* 8001: spoof number of CPU cores [FF48+] ***/
-   // user_pref("dom.maxHardwareConcurrency", 2);
-/* 8002: disable Resource Timing API ***/
-   // user_pref("dom.enable_resource_timing", false);
-/* 8003: disable Navigation Timing API ***/
-   // user_pref("dom.enable_performance", false);
-/* 8004: disable device Sensor APIs ***/
+/* 8001: disable APIs ***/
    // user_pref("device.sensors.enabled", false);
-/* 8005: disable remembering site specific zoom ***/
-   // user_pref("browser.zoom.siteSpecific", false);
-/* 8006: disable gamepad API to prevent USB device ID enumeration ***/
+   // user_pref("dom.enable_performance", false);
+   // user_pref("dom.enable_resource_timing", false);
    // user_pref("dom.gamepad.enabled", false);
-/* 8007: disable Network Information API [FF31+] ***/
-   // user_pref("dom.netinfo.enabled", false); // [DEFAULT: true on Android]
-/* 8008: disable the SpeechSynthesis (Text-to-Speech) part of the Web Speech API ***/
-   // user_pref("media.webspeech.synth.enabled", false);
-/* 8010: disable video statistics to mitigate JS performance fingerprinting [FF25+] ***/
-   // user_pref("media.video_stats.enabled", false);
-/* 8011: disable touch events: 0=disabled, 1=enabled, 2=autodetect ***/
-   // user_pref("dom.w3c_touch_events.enabled", 0);
-/* 8012: disable media device enumeration [FF29+] ***/
-   // user_pref("media.navigator.enabled", false);
-/* 8013: disable MediaDevices change detection [FF51+] ***/
-   // user_pref("media.ondevicechange.enabled", false);
-/* 8014: disable WebGL debug info being available to websites ***/
-   // user_pref("webgl.enable-debug-renderer-info", false);
-/* 8015: enforce prefers-reduced-motion as no-preference: 0=no-preference, 1=reduce [FF63+] [RESTART] ***/
-   // user_pref("ui.prefersReducedMotion", 0); // [HIDDEN PREF]
-/* 8017: disable exposure of system colors to CSS or canvas [FF44+] ***/
-   // user_pref("ui.use_standins_for_native_colors", true);
-/* 8018: enforce prefers-color-scheme as light: 0=light, 1=dark [FF67+] ***/
-   // user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
-/* 8019: disable Web Audio API [FF51+] ***/
+   // user_pref("dom.netinfo.enabled", false);
    // user_pref("dom.webaudio.enabled", false);
-/* 8020: disable websites choosing fonts (0=block, 1=allow) ***/
+/* 8002: disable other ***/
    // user_pref("browser.display.use_document_fonts", 0);
-/* 8021: limit system font exposure to a whitelist [FF52+] [RESTART]
- * If the whitelist is empty, then whitelisting is considered disabled and all fonts are allowed
- * [NOTE] In FF81+ the whitelist overrides RFP and font visibility (1403)
- * [1] https://bugzilla.mozilla.org/1121643 ***/
+   // user_pref("browser.zoom.siteSpecific", false);
+   // user_pref("dom.w3c_touch_events.enabled", 0);
+   // user_pref("media.navigator.enabled", false);
+   // user_pref("media.ondevicechange.enabled", false);
+   // user_pref("media.video_stats.enabled", false);
+   // user_pref("media.webspeech.synth.enabled", false);
+   // user_pref("webgl.enable-debug-renderer-info", false);
+/* 8003: spoof ***/
+   // user_pref("dom.maxHardwareConcurrency", 2);
    // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
-/* 8050: navigator DOM object overrides
- * [WHY] These prefs are insufficient and leak ***/
    // user_pref("general.appname.override", ""); // [HIDDEN PREF]
    // user_pref("general.appversion.override", ""); // [HIDDEN PREF]
    // user_pref("general.buildID.override", ""); // [HIDDEN PREF]
    // user_pref("general.oscpu.override", ""); // [HIDDEN PREF]
    // user_pref("general.platform.override", ""); // [HIDDEN PREF]
    // user_pref("general.useragent.override", ""); // [HIDDEN PREF]
+   // user_pref("ui.use_standins_for_native_colors", true);
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
    Documentation denoted as [-]. Items deprecated in FF78 or earlier have been archived at [1],

From cef08b63f1947847e21e40021dc3d426afe5bdb9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 20 Aug 2021 02:52:55 +0000
Subject: [PATCH 0853/1147] 4520 -> personal

---
 user.js | 11 +++++------
 1 file changed, 5 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 0719d45..7be38af 100644
--- a/user.js
+++ b/user.js
@@ -1388,10 +1388,6 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
  * When default true this no longer masks the RFP chrome resizing activity
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
-/* 4520: disable chrome animations [FF77+] [RESTART]
- * 0=no-preference, 1=reduce
- * [NOTE] pref added in FF63, but applied to chrome in FF77. RFP spoofs this for web content ***/
-user_pref("ui.prefersReducedMotion", 1); // [HIDDEN PREF]
 
 /*** [SECTION 5000]: PERSONAL
    Non-project related but useful. If any of these interest you, add them to your overrides
@@ -1411,8 +1407,11 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc
    // user_pref("full-screen-api.warning.timeout", 0);
 /* APPEARANCE ***/
    // user_pref("browser.download.autohideButton", false); // [FF57+]
-   // user_pref("ui.systemUsesDarkTheme", 1); // with RFP this only affects chrome: 0=light, 1=dark [FF67+] [HIDDEN PREF]
+   // user_pref("ui.systemUsesDarkTheme", 1); // [FF67+] [HIDDEN PREF]
+      // 0=light, 1=dark: with RFP this only affects chrome
    // user_pref("toolkit.legacyUserProfileCustomizations.stylesheets", true); // [FF68+] allow userChrome/userContent
+   // user_pref("ui.prefersReducedMotion", 1); // disable chrome animations [FF77+] [RESTART] [HIDDEN PREF]
+      // 0=no-preference, 1=reduce: with RFP this only affects chrome
 /* CONTENT BEHAVIOR ***/
    // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
    // user_pref("clipboard.autocopy", false); // disable autocopy default [LINUX]
@@ -1454,7 +1453,7 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's pushing up daisies
  * Location, Camera, Microphone, Notifications [FF58+] Virtual Reality [FF73+]
  * 0=always ask (default), 1=allow, 2=block
  * [WHY] These are fingerprintable via Permissions API, except VR. Just add site
- * exceptions as block for frequently visited annoying sites: i.e not global
+ * exceptions as allow/block for frequently visited/annoying sites: i.e. not global
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
    // user_pref("permissions.default.geo", 0);

From 2d3d8ae5b0c8d57187c808c39dbfbc1070f1a177 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 20 Aug 2021 03:12:59 +0000
Subject: [PATCH 0854/1147] alerts.showFavicons

---
 scratchpad-scripts/arkenfox-clear-removed.js | 6 ++++--
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 040604f..2ad92a9 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
   This will reset the preferences that have been removed completely from the arkenfox user.js.
 
-  Last updated: 19-August-2021
+  Last updated: 20-August-2021
 
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -205,7 +205,7 @@
     'middlemouse.paste',
     'browser.search.geoip.url',
     'browser.search.region',
-    /* 79-91 */
+    /* 79-90 */
     'browser.urlbar.usepreloadedtopurls.enabled',
     'dom.IntersectionObserver.enabled',
     'extensions.screenshots.upload-disabled',
@@ -218,6 +218,8 @@
     'browser.send_pings.require_same_host',
     'webgl.min_capability_mode',
     'security.ssl.enable_ocsp_stapling',
+    /* 91 */
+    'alerts.showFavicons',
     'dom.battery.enabled',
     'dom.storage.enabled',
     'general.warnOnAboutConfig',

From 78d953bfda9e6c91639f643a8397da3f5f9facc2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 20 Aug 2021 03:16:25 +0000
Subject: [PATCH 0855/1147] remove 1032

dead wood: marked as default false since at least v68, inactive since at least v78, and web notifications are controlled in 2300s
---
 user.js | 2 --
 1 file changed, 2 deletions(-)

diff --git a/user.js b/user.js
index 7be38af..a60750a 100644
--- a/user.js
+++ b/user.js
@@ -576,8 +576,6 @@ user_pref("browser.shell.shortcutFavicons", false);
  * control that instead; e.g. disable history, clear history on close, use PB mode
  * [NOTE] favicons.sqlite is sanitized on Firefox close, not in-session ***/
    // user_pref("browser.chrome.site_icons", false);
-/* 1032: disable favicons in web notifications ***/
-   // user_pref("alerts.showFavicons", false); // [DEFAULT: false]
 
 /*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
    Your cipher and other settings can be used in server side fingerprinting

From 95136382e1abbb8a8e6744bd049204a1988a86bd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 20 Aug 2021 13:18:43 +0000
Subject: [PATCH 0856/1147] improve 1244, closes #1047 again

---
 user.js | 11 +++++------
 1 file changed, 5 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index a60750a..49513fa 100644
--- a/user.js
+++ b/user.js
@@ -680,13 +680,12 @@ user_pref("security.pki.crlite_mode", 2);
 user_pref("security.mixed_content.block_active_content", true); // [DEFAULT: true]
 /* 1241: disable insecure passive content (such as images) on https pages [SETUP-WEB] ***/
 user_pref("security.mixed_content.block_display_content", true);
-/* 1244: enable HTTPS-Only mode [FF76+]
- * When "https_only_mode" (all windows) is true, "https_only_mode_pbm" (private windows only) is ignored
- * [SETTING] to add site exceptions: Padlock>HTTPS-Only mode>On/Off/Off temporarily
- * [SETTING] Privacy & Security>HTTPS-Only Mode
+/* 1244: enable HTTPS-Only mode in all windows [FF76+]
+ * When the top-level is HTTPS, insecure subresources are also upgraded (silent fail)
+ * [SETTING] to add site exceptions: Padlock>HTTPS-Only mode>On (after "Continue to HTTP Site")
+ * [SETTING] Privacy & Security>HTTPS-Only Mode (and manage exceptions)
  * [TEST] http://example.com [upgrade]
- * [TEST] http://neverssl.org/ [no upgrade]
- * [1] https://bugzilla.mozilla.org/1613063 [META] ***/
+ * [TEST] http://neverssl.org/ [no upgrade] ***/
 user_pref("dom.security.https_only_mode", true); // [FF76+]
    // user_pref("dom.security.https_only_mode_pbm", true); // [FF80+]
 /* 1245: enable HTTPS-Only mode for local resources [FF77+] ***/

From c9bdceb8d6fe734197655fe1fcfa3dbdc0af66e3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 20 Aug 2021 13:23:59 +0000
Subject: [PATCH 0857/1147] 1244: fix no upgrade test

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 49513fa..f7fb75a 100644
--- a/user.js
+++ b/user.js
@@ -685,7 +685,7 @@ user_pref("security.mixed_content.block_display_content", true);
  * [SETTING] to add site exceptions: Padlock>HTTPS-Only mode>On (after "Continue to HTTP Site")
  * [SETTING] Privacy & Security>HTTPS-Only Mode (and manage exceptions)
  * [TEST] http://example.com [upgrade]
- * [TEST] http://neverssl.org/ [no upgrade] ***/
+ * [TEST] http://neverssl.com/ [no upgrade] ***/
 user_pref("dom.security.https_only_mode", true); // [FF76+]
    // user_pref("dom.security.https_only_mode_pbm", true); // [FF80+]
 /* 1245: enable HTTPS-Only mode for local resources [FF77+] ***/

From 37ded2a519745850e888a374dd9e681c24a3578a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 20 Aug 2021 14:10:09 +0000
Subject: [PATCH 0858/1147] remove redundant warning

---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index f7fb75a..5006b2b 100644
--- a/user.js
+++ b/user.js
@@ -1290,7 +1290,6 @@ user_pref("privacy.firstparty.isolate", true);
    It is an all-or-nothing buy in: you cannot pick and choose what parts you want
 
    [WARNING] DO NOT USE extensions to alter RFP protected metrics
-   [WARNING] DO NOT USE prefs in section 8000 with RFP as they can interfere
 
  FF41+
     418986 - limit window.screen & CSS media queries leaking identifiable info

From 27ce48f31943a6c26403fac85bb5eaa0d7c6b7e8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 21 Aug 2021 02:00:43 +0000
Subject: [PATCH 0859/1147] trim fluff

---
 user.js | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 5006b2b..8b94f41 100644
--- a/user.js
+++ b/user.js
@@ -1491,8 +1491,7 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's crossed the Jordan
    // user_pref("ui.use_standins_for_native_colors", true);
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
-   Documentation denoted as [-]. Items deprecated in FF78 or earlier have been archived at [1],
-   which also provides a link-clickable, viewer-friendly version of the deprecated bugzilla tickets
+   Documentation denoted as [-]. Items deprecated in FF78 or earlier have been archived at [1]
    [1] https://github.com/arkenfox/user.js/issues/123
 ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");

From da0c291127529fdafc072aa781e3c0163bd0678e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 21 Aug 2021 02:26:17 +0000
Subject: [PATCH 0860/1147] update to ESR91

---
 .../arkenfox-clear-deprecated.js              | 338 +++++++++---------
 1 file changed, 161 insertions(+), 177 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-deprecated.js b/scratchpad-scripts/arkenfox-clear-deprecated.js
index e12f0f4..9ef8100 100644
--- a/scratchpad-scripts/arkenfox-clear-deprecated.js
+++ b/scratchpad-scripts/arkenfox-clear-deprecated.js
@@ -1,5 +1,5 @@
 /***
-  Version: up to and including FF/ESR78
+  Version: up to and including FF/ESR91
 
   This will reset the preferences that have been deprecated by Mozilla
   and used in the arkenfox user.js
@@ -16,210 +16,194 @@
 
   const aPREFS = [
     /* deprecated */
-
-    /* 78 */
-    'media.autoplay.enabled.user-gestures-needed',
-    'toolkit.cosmeticAnimations.enabled',
-    /* 77 */
-    'browser.urlbar.oneOffSearches',
-    'browser.tabs.remote.allowLinkedWebInFileUriProcess',
-    /* 76 */
-    'extensions.blocklist.url',
-    /* 74 */
-    'geo.wifi.uri',
-    'geo.wifi.logging.enabled',
-    'privacy.userContext.longPressBehavior',
-    'webgl.disable-extensions',
-    /* 72 */
+    /* FF79-91 */
+    'browser.cache.offline.storage.enable',
+    'browser.download.hide_plugins_without_extensions',
+    'browser.library.activity-stream.enabled',
+    'browser.search.geoSpecificDefaults',
+    'browser.search.geoSpecificDefaults.url',
+    'dom.ipc.plugins.flash.subprocess.crashreporter.enabled',
+    'dom.ipc.plugins.reportCrashURL',
+    'dom.w3c_pointer_events.enabled',
+    'intl.charset.fallback.override',
+    'network.ftp.enabled',
+    'plugin.state.flash',
+    'security.mixed_content.block_object_subrequest',
+    'security.ssl.errorReporting.automatic',
+    'security.ssl.errorReporting.enabled',
+    'security.ssl.errorReporting.url',
+    /* 69-78 */
     'browser.newtabpage.activity-stream.telemetry.ping.endpoint',
-    'toolkit.telemetry.hybridContent.enabled',
-    'dom.indexedDB.enabled',
-    /* 71 */
-    'devtools.webide.enabled',
+    'browser.tabs.remote.allowLinkedWebInFileUriProcess',
+    'browser.urlbar.oneOffSearches',
     'devtools.webide.autoinstallADBExtension',
-    'offline-apps.allow_by_default',
-    /* 69 */
+    'devtools.webide.enabled',
+    'dom.indexedDB.enabled',
+    'extensions.blocklist.url',
+    'geo.wifi.logging.enabled',
+    'geo.wifi.uri',
     'gfx.downloadable_fonts.woff2.enabled',
-    'plugins.click_to_play',
     'media.autoplay.allow-muted',
-    /* 68 */
-    'browser.newtabpage.activity-stream.disableSnippets',
+    'media.autoplay.enabled.user-gestures-needed',
+    'offline-apps.allow_by_default',
+    'plugins.click_to_play',
+    'privacy.userContext.longPressBehavior',
+    'toolkit.cosmeticAnimations.enabled',
+    'toolkit.telemetry.hybridContent.enabled',
+    'webgl.disable-extensions',
+    /* 61-68 */
+    'app.update.enabled',
     'browser.aboutHomeSnippets.updateUrl',
-    'lightweightThemes.update.enabled',
-    'security.csp.experimentalEnabled',
-    /* F67 */
-    'dom.event.highrestimestamp.enabled',
-    'browser.newtabpage.activity-stream.asrouter.userprefs.cfr',
-    /* 66 */
     'browser.chrome.errorReporter.enabled',
     'browser.chrome.errorReporter.submitUrl',
-    'network.allow-experiments',
-    /* 65 */
-    'browser.urlbar.autocomplete.enabled',
-    'browser.fixup.hide_user_pass',
-    /* 64 */
-    'browser.onboarding.enabled',
-    'devtools.webide.autoinstallADBHelper',
-    'devtools.webide.adbAddonURL',
-    'security.csp.enable_violation_events',
-    /* 63 */
-    'browser.search.countryCode',
-    'app.update.enabled',
-    'shield.savant.enabled',
     'browser.chrome.favicons',
-    'media.autoplay.enabled',
-    'network.cookie.lifetime.days',
     'browser.ctrlTab.previews',
-    /* 62 */
-    'plugin.state.java',
-    /* 61 */
+    'browser.fixup.hide_user_pass',
+    'browser.newtabpage.activity-stream.asrouter.userprefs.cfr',
+    'browser.newtabpage.activity-stream.disableSnippets',
+    'browser.onboarding.enabled',
+    'browser.search.countryCode',
+    'browser.urlbar.autocomplete.enabled',
+    'devtools.webide.adbAddonURL',
+    'devtools.webide.autoinstallADBHelper',
+    'dom.event.highrestimestamp.enabled',
+    'experiments.activeExperiment',
     'experiments.enabled',
     'experiments.manifest.uri',
     'experiments.supported',
-    'experiments.activeExperiment',
+    'lightweightThemes.update.enabled',
+    'media.autoplay.enabled',
+    'network.allow-experiments',
+    'network.cookie.lifetime.days',
     'network.jar.block-remote-files',
     'network.jar.open-unsafe-types',
-    /* 60 */
+    'plugin.state.java',
+    'security.csp.enable_violation_events',
+    'security.csp.experimentalEnabled',
+    'shield.savant.enabled',
+    /* 60 or earlier */
+    'browser.bookmarks.showRecentlyBookmarked',
+    'browser.casting.enabled',
+    'browser.crashReports.unsubmittedCheck.autoSubmit',
+    'browser.formautofill.enabled',
+    'browser.formfill.saveHttpsForms',
+    'browser.fullscreen.animate',
+    'browser.history.allowPopState',
+    'browser.history.allowPushState',
+    'browser.history.allowReplaceState',
+    'browser.newtabpage.activity-stream.enabled',
+    'browser.newtabpage.directory.ping',
     'browser.newtabpage.directory.source',
     'browser.newtabpage.enhanced',
     'browser.newtabpage.introShown',
-    'extensions.shield-recipe-client.enabled',
-    'extensions.shield-recipe-client.api_url',
-    'browser.newtabpage.activity-stream.enabled',
-    'dom.workers.enabled',
-    /* 59 */
-    'intl.locale.matchOS',
-    'general.useragent.locale',
-    'datareporting.healthreport.about.reportUrl',
-    'dom.flyweb.enabled',
-    'security.mixed_content.use_hsts',
-    'security.mixed_content.send_hsts_priming',
-    'network.http.referer.userControlPolicy',
-    'security.xpconnect.plugin.unrestricted',
-    'media.getusermedia.screensharing.allowed_domains',
-    'camera.control.face_detection.enabled',
-    'dom.disable_window_status_change',
-    'dom.idle-observers-api.enabled',
-    /* 58 */
-    'browser.crashReports.unsubmittedCheck.autoSubmit',
-    /* 57 */
-    'social.whitelist',
-    'social.toast-notifications.enabled',
-    'social.shareDirectory',
-    'social.remote-install.enabled',
-    'social.directories',
-    'social.share.activationPanelEnabled',
-    'social.enabled',
-    'media.eme.chromium-api.enabled',
-    'devtools.webide.autoinstallFxdtAdapters',
-    'browser.casting.enabled',
-    'browser.bookmarks.showRecentlyBookmarked',
-    /* 56 */
-    'extensions.screenshots.system-disabled',
-    'extensions.formautofill.experimental',
-    /* 55 */
-    'geo.security.allowinsecure',
+    'browser.pocket.api',
+    'browser.pocket.enabled',
+    'browser.pocket.oAuthConsumerKey',
+    'browser.pocket.site',
+    'browser.polaris.enabled',
+    'browser.safebrowsing.appRepURL',
+    'browser.safebrowsing.enabled',
+    'browser.safebrowsing.gethashURL',
+    'browser.safebrowsing.malware.reportURL',
+    'browser.safebrowsing.provider.google.appRepURL',
+    'browser.safebrowsing.reportErrorURL',
+    'browser.safebrowsing.reportGenericURL',
+    'browser.safebrowsing.reportMalwareErrorURL',
+    'browser.safebrowsing.reportMalwareMistakeURL',
+    'browser.safebrowsing.reportMalwareURL',
+    'browser.safebrowsing.reportPhishMistakeURL',
+    'browser.safebrowsing.reportURL',
+    'browser.safebrowsing.updateURL',
+    'browser.search.showOneOffButtons',
     'browser.selfsupport.enabled',
     'browser.selfsupport.url',
-    'browser.newtabpage.directory.ping',
-    'browser.formfill.saveHttpsForms',
-    'browser.formautofill.enabled',
-    'dom.enable_user_timing',
-    'dom.keyboardevent.code.enabled',
+    'browser.sessionstore.privacy_level_deferred',
     'browser.tabs.animate',
-    'browser.fullscreen.animate',
-    /* 54 */
-    'browser.safebrowsing.reportMalwareMistakeURL',
-    'browser.safebrowsing.reportPhishMistakeURL',
-    'media.eme.apiVisible',
-    'dom.archivereader.enabled',
-    /* 53 */
-    'security.tls.unrestricted_rc4_fallback',
-    'plugin.scan.Acrobat',
-    'plugin.scan.Quicktime',
-    'plugin.scan.WindowsMediaPlayer',
-    'media.getusermedia.screensharing.allow_on_old_platforms',
-    'dom.beforeAfterKeyboardEvent.enabled',
-    /* 52 */
-    'network.http.sendSecureXSiteReferrer',
-    'media.gmp-eme-adobe.enabled',
-    'media.gmp-eme-adobe.visible',
-    'media.gmp-eme-adobe.autoupdate',
-    'dom.telephony.enabled',
-    'dom.battery.enabled',
-    /* 51 */
-    'media.block-play-until-visible',
-    'dom.vr.oculus050.enabled',
-    'network.http.spdy.enabled.v3-1',
-    /* 50 */
+    'browser.trackingprotection.gethashURL',
+    'browser.trackingprotection.updateURL',
+    'browser.urlbar.unifiedcomplete',
     'browser.usedOnWindows10.introURL',
-    'plugins.update.notifyUser',
-    'browser.safebrowsing.enabled',
-    'security.ssl3.ecdhe_ecdsa_rc4_128_sha',
-    'security.ssl3.ecdhe_rsa_rc4_128_sha',
-    'security.ssl3.rsa_rc4_128_md5',
-    'security.ssl3.rsa_rc4_128_sha',
-    'plugins.update.url',
-    /* 49 */
+    'camera.control.autofocus_moving_callback.enabled',
+    'camera.control.face_detection.enabled',
+    'datareporting.healthreport.about.reportUrl',
+    'datareporting.healthreport.about.reportUrlUnified',
+    'datareporting.healthreport.documentServerURI',
+    'datareporting.healthreport.service.enabled',
+    'datareporting.policy.dataSubmissionEnabled.v2',
+    'devtools.webide.autoinstallFxdtAdapters',
+    'dom.archivereader.enabled',
+    'dom.battery.enabled',
+    'dom.beforeAfterKeyboardEvent.enabled',
+    'dom.disable_image_src_set',
+    'dom.disable_window_open_feature.scrollbars',
+    'dom.disable_window_status_change',
+    'dom.enable_user_timing',
+    'dom.flyweb.enabled',
+    'dom.idle-observers-api.enabled',
+    'dom.keyboardevent.code.enabled',
+    'dom.network.enabled',
+    'dom.push.udp.wakeupEnabled',
+    'dom.telephony.enabled',
+    'dom.vr.oculus050.enabled',
+    'dom.workers.enabled',
+    'dom.workers.sharedWorkers.enabled',
+    'extensions.formautofill.experimental',
+    'extensions.screenshots.system-disabled',
+    'extensions.shield-recipe-client.api_url',
+    'extensions.shield-recipe-client.enabled',
+    'full-screen-api.approval-required',
+    'general.useragent.locale',
+    'geo.security.allowinsecure',
+    'intl.locale.matchOS',
     'loop.enabled',
-    'loop.server',
-    'loop.feedback.formURL',
-    'loop.feedback.manualFormURL',
     'loop.facebook.appId',
     'loop.facebook.enabled',
     'loop.facebook.fallbackUrl',
     'loop.facebook.shareUrl',
+    'loop.feedback.formURL',
+    'loop.feedback.manualFormURL',
     'loop.logDomains',
-    'dom.disable_window_open_feature.scrollbars',
-    'dom.push.udp.wakeupEnabled',
-    /* 48 */
-    'browser.urlbar.unifiedcomplete',
-    /* 47 */
-    'toolkit.telemetry.unifiedIsOptIn',
-    'datareporting.healthreport.about.reportUrlUnified',
-    'browser.history.allowPopState',
-    'browser.history.allowPushState',
-    'browser.history.allowReplaceState',
-    /* 46 */
-    'datareporting.healthreport.service.enabled',
-    'datareporting.healthreport.documentServerURI',
-    'datareporting.policy.dataSubmissionEnabled.v2',
-    'browser.safebrowsing.appRepURL',
-    'browser.polaris.enabled',
-    'browser.pocket.enabled',
-    'browser.pocket.api',
-    'browser.pocket.site',
-    'browser.pocket.oAuthConsumerKey',
-    /* 45 */
-    'browser.sessionstore.privacy_level_deferred',
-    /* 44 */
-    'browser.safebrowsing.provider.google.appRepURL',
-    'security.tls.insecure_fallback_hosts.use_static_list',
-    'dom.workers.sharedWorkers.enabled',
-    'dom.disable_image_src_set',
-    /* 43 */
-    'browser.safebrowsing.gethashURL',
-    'browser.safebrowsing.updateURL',
-    'browser.safebrowsing.malware.reportURL',
-    'browser.trackingprotection.gethashURL',
-    'browser.trackingprotection.updateURL',
+    'loop.server',
+    'media.block-play-until-visible',
+    'media.eme.apiVisible',
+    'media.eme.chromium-api.enabled',
+    'media.getusermedia.screensharing.allow_on_old_platforms',
+    'media.getusermedia.screensharing.allowed_domains',
+    'media.gmp-eme-adobe.autoupdate',
+    'media.gmp-eme-adobe.enabled',
+    'media.gmp-eme-adobe.visible',
+    'network.http.referer.userControlPolicy',
+    'network.http.sendSecureXSiteReferrer',
+    'network.http.spdy.enabled.http2draft',
+    'network.http.spdy.enabled.v3-1',
+    'network.websocket.enabled',
+    'pageThumbs.enabled',
     'pfs.datasource.url',
-    'browser.search.showOneOffButtons',
-    /* 42 and earlier */
-    'privacy.clearOnShutdown.passwords', // 42
-    'full-screen-api.approval-required', // 42
-    'browser.safebrowsing.reportErrorURL', // 41
-    'browser.safebrowsing.reportGenericURL', // 41
-    'browser.safebrowsing.reportMalwareErrorURL', // 41
-    'browser.safebrowsing.reportMalwareURL', // 41
-    'browser.safebrowsing.reportURL', // 41
-    'plugins.enumerable_names', // 41
-    'network.http.spdy.enabled.http2draft', // 41
-    'camera.control.autofocus_moving_callback.enabled', // 37
-    'privacy.donottrackheader.value', // 36
-    'network.websocket.enabled', // 35
-    'dom.network.enabled', // 31
-    'pageThumbs.enabled', // 25
+    'plugin.scan.Acrobat',
+    'plugin.scan.Quicktime',
+    'plugin.scan.WindowsMediaPlayer',
+    'plugins.enumerable_names',
+    'plugins.update.notifyUser',
+    'plugins.update.url',
+    'privacy.clearOnShutdown.passwords',
+    'privacy.donottrackheader.value',
+    'security.mixed_content.send_hsts_priming',
+    'security.mixed_content.use_hsts',
+    'security.ssl3.ecdhe_ecdsa_rc4_128_sha',
+    'security.ssl3.ecdhe_rsa_rc4_128_sha',
+    'security.ssl3.rsa_rc4_128_md5',
+    'security.ssl3.rsa_rc4_128_sha',
+    'security.tls.insecure_fallback_hosts.use_static_list',
+    'security.tls.unrestricted_rc4_fallback',
+    'security.xpconnect.plugin.unrestricted',
+    'social.directories',
+    'social.enabled',
+    'social.remote-install.enabled',
+    'social.share.activationPanelEnabled',
+    'social.shareDirectory',
+    'social.toast-notifications.enabled',
+    'social.whitelist',
+    'toolkit.telemetry.unifiedIsOptIn',
 
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'

From 213467d91bb1bc4f5c517c2d542b11fe41422387 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 21 Aug 2021 03:21:32 +0000
Subject: [PATCH 0861/1147] remove 2517
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

- inactive since we added it in v63
- this is not how you defeat fingerprinting (unless done in an enforced set)
- for the record: not even tor browser disable this
- fingerprinting this is not cheap in gecko (for now)
- from [2]
   - decoding/encoding capabilities: "it is expected that the entropy ... isn’t going to be significant"
   - HDR detection: "... has the potential to add significant entropy .. however .. but ... thus minimizing effective entropy" - it is what it is
   - note that RFP has some mitigations in FF82+ 1461454
---
 user.js | 5 -----
 1 file changed, 5 deletions(-)

diff --git a/user.js b/user.js
index 8b94f41..59021dc 100644
--- a/user.js
+++ b/user.js
@@ -976,11 +976,6 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
  * [1] https://wiki.mozilla.org/Platform/GFX/HardwareAcceleration ***/
    // user_pref("gfx.direct2d.disabled", true); // [WINDOWS]
    // user_pref("layers.acceleration.disabled", true);
-/* 2517: disable Media Capabilities API [FF63+]
- * [WARNING] The API state is fingerprintable. Disabling may affect performance
- * [1] https://github.com/WICG/media-capabilities
- * [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
-   // user_pref("media.media-capabilities.enabled", false);
 /* 2522: disable/limit WebGL (Web Graphics Library)
  * [SETUP-WEB] When disabled, will break some websites. When enabled, provides high entropy,
  * especially with readPixels(). Some of the other entropy is lessened with RFP (4501)

From 2a011f10539a473434303165cf8a578a3ebe50e6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 21 Aug 2021 03:23:17 +0000
Subject: [PATCH 0862/1147] media.media-capabilities.enabled

see https://github.com/arkenfox/user.js/commit/213467d91bb1bc4f5c517c2d542b11fe41422387
---
 scratchpad-scripts/arkenfox-clear-removed.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 2ad92a9..efafd79 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
   This will reset the preferences that have been removed completely from the arkenfox user.js.
 
-  Last updated: 20-August-2021
+  Last updated: 21-August-2021
 
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -223,6 +223,7 @@
     'dom.battery.enabled',
     'dom.storage.enabled',
     'general.warnOnAboutConfig',
+    'media.media-capabilities.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ];

From aded0707a4ad6c91f68d81d5b0fc75578d5aa048 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 21 Aug 2021 04:39:08 +0000
Subject: [PATCH 0863/1147] misc

- renumber 0200s, 2500s
- remove 2414: doesn't apply to desktop, and I think it has been neutered in android
---
 user.js | 64 ++++++++++++++++++++++++++++-----------------------------
 1 file changed, 31 insertions(+), 33 deletions(-)

diff --git a/user.js b/user.js
index 59021dc..4ee3628 100644
--- a/user.js
+++ b/user.js
@@ -36,7 +36,7 @@
     ESR78
     - If you are not using arkenfox v78... (not a definitive list)
       - 1244: HTTPS-Only mode is enabled
-      - 2525: non-native widget theme is enforced
+      - 2502: non-native widget theme is enforced
       - 9999: switch the appropriate deprecated section(s) back on
 
 * INDEX:
@@ -58,7 +58,7 @@
   2000: PLUGINS / MEDIA / WEBRTC
   2300: WEB WORKERS
   2400: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT
-  2500: HARDWARE FINGERPRINTING
+  2500: FINGERPRINTING
   2600: MISCELLANEOUS
   2700: PERSISTENT STORAGE
   2800: SHUTDOWN
@@ -128,20 +128,20 @@ user_pref("browser.newtabpage.activity-stream.default.sites", "");
 
 /*** [SECTION 0200]: GEOLOCATION / LANGUAGE / LOCALE ***/
 user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");
-/* 0203: use Mozilla geolocation service instead of Google if permission is granted [FF74+]
+/* 0201: use Mozilla geolocation service instead of Google if permission is granted [FF74+]
  * Optionally enable logging to the console (defaults to false) ***/
 user_pref("geo.provider.network.url", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
    // user_pref("geo.provider.network.logging.enabled", true); // [HIDDEN PREF]
-/* 0204: disable using the OS's geolocation service ***/
+/* 0202: disable using the OS's geolocation service ***/
 user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
 user_pref("geo.provider.use_corelocation", false); // [MAC]
 user_pref("geo.provider.use_gpsd", false); // [LINUX]
-/* 0207: disable region updates
+/* 0203: disable region updates
  * [1] https://firefox-source-docs.mozilla.org/toolkit/modules/toolkit_modules/Region.html ***/
 user_pref("browser.region.network.url", ""); // [FF78+]
 user_pref("browser.region.update.enabled", false); // [[FF79+]
-/* 0208: set search region
- * [NOTE] May not be hidden if Firefox has changed your settings due to your region (0207) ***/
+/* 0204: set search region
+ * [NOTE] May not be hidden if Firefox has changed your settings due to your region (0203) ***/
    // user_pref("browser.search.region", "US"); // [HIDDEN PREF]
 /* 0210: set preferred language for displaying web pages
  * [TEST] https://addons.mozilla.org/about ***/
@@ -943,8 +943,6 @@ user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
 /* 2408: enable (limited but sufficient) window.opener protection [FF65+]
  * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
 user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
-/* 2414: disable shaking the screen ***/
-user_pref("dom.vibrator.enabled", false);
 /* 2420: disable asm.js [FF22+] [SETUP-PERF]
  * [1] http://asmjs.org/
  * [2] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=asm.js
@@ -968,15 +966,25 @@ user_pref("javascript.options.asmjs", false);
  * [3] https://www.zdnet.com/article/half-of-the-websites-using-webassembly-use-it-for-malicious-purposes ***/
 user_pref("javascript.options.wasm", false);
 
-/*** [SECTION 2500]: HARDWARE FINGERPRINTING ***/
+/*** [SECTION 2500]: FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");
-/* 2508: disable hardware acceleration [SETUP-HARDEN]
- * [WARNING] Affects rendering and performance
- * [SETTING] General>Performance>Custom>Use hardware acceleration when available
- * [1] https://wiki.mozilla.org/Platform/GFX/HardwareAcceleration ***/
-   // user_pref("gfx.direct2d.disabled", true); // [WINDOWS]
-   // user_pref("layers.acceleration.disabled", true);
-/* 2522: disable/limit WebGL (Web Graphics Library)
+/* 2501: enforce no system colors
+ * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
+user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
+/* 2502: enforce non-native widget theme
+ * Security: removes/reduces system API calls, e.g. win32k API [1]
+ * Fingerprinting: provides a uniform look and feel across platforms [2]
+ * [1] https://bugzilla.mozilla.org/1381938
+ * [2] https://bugzilla.mozilla.org/1411425 ***/
+user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true FF89+]
+/* 2503: open links targeting new windows in a new tab instead
+ * Stops malicious window sizes and some screen resolution leaks.
+ * You can still right-click a link and open in a new window
+ * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
+ * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
+user_pref("browser.link.open_newwindow", 3); // 1=most recent window or tab 2=new window, 3=new tab
+user_pref("browser.link.open_newwindow.restriction", 0);
+/* 2504: disable/limit WebGL (Web Graphics Library)
  * [SETUP-WEB] When disabled, will break some websites. When enabled, provides high entropy,
  * especially with readPixels(). Some of the other entropy is lessened with RFP (4501)
  * [1] https://www.contextis.com/resources/blog/webgl-new-dimension-browser-exploitation/
@@ -984,22 +992,12 @@ user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is m
 user_pref("webgl.disabled", true);
    // user_pref("webgl.enable-webgl2", false);
    // user_pref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT: true FF86+]
-/* 2523: enforce no system colors
- * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
-user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
-/* 2524: open links targeting new windows in a new tab instead
- * Stops malicious window sizes and some screen resolution leaks.
- * You can still right-click a link and open in a new window
- * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
- * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
-user_pref("browser.link.open_newwindow", 3); // 1=most recent window or tab 2=new window, 3=new tab
-user_pref("browser.link.open_newwindow.restriction", 0);
-/* 2525: enforce non-native widget theme
- * Security: removes/reduces system API calls, e.g. win32k API [1]
- * Fingerprinting: provides a uniform look and feel across platforms [2]
- * [1] https://bugzilla.mozilla.org/1381938
- * [2] https://bugzilla.mozilla.org/1411425 ***/
-user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true FF89+]
+/* 2508: disable hardware acceleration [SETUP-HARDEN]
+ * [WARNING] Affects rendering and performance
+ * [SETTING] General>Performance>Custom>Use hardware acceleration when available
+ * [1] https://wiki.mozilla.org/Platform/GFX/HardwareAcceleration ***/
+   // user_pref("gfx.direct2d.disabled", true); // [WINDOWS]
+   // user_pref("layers.acceleration.disabled", true);
 
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");

From 7cdc76ecf9a72372487de7d27821bd810e9ea589 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 21 Aug 2021 04:40:11 +0000
Subject: [PATCH 0864/1147] dom.vibrator.enabled

see https://github.com/arkenfox/user.js/commit/aded0707a4ad6c91f68d81d5b0fc75578d5aa048
---
 scratchpad-scripts/arkenfox-clear-removed.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index efafd79..5c5a352 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -222,6 +222,7 @@
     'alerts.showFavicons',
     'dom.battery.enabled',
     'dom.storage.enabled',
+    'dom.vibrator.enabled',
     'general.warnOnAboutConfig',
     'media.media-capabilities.enabled',
     /* reset parrot: check your open about:config after running the script */

From 04d648d55b4aeff5aada935356b59031ab75b482 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 22 Aug 2021 01:53:01 +0000
Subject: [PATCH 0865/1147] remove 2508

- inactive in user.js since
   - v55: gfx.direct2d.disabled
   - v67: layers.acceleration.disabled
- the way to counter hardware fingerprinting is within each API that may expose it
- this may have made some sense way back in the day, when there were less options/protections, but not any more
- [are we web render yet](https://arewewebrenderyet.com/) - yes, 100% - there is no need to cripple your browser's perf
---
 user.js | 6 ------
 1 file changed, 6 deletions(-)

diff --git a/user.js b/user.js
index 4ee3628..b681b28 100644
--- a/user.js
+++ b/user.js
@@ -992,12 +992,6 @@ user_pref("browser.link.open_newwindow.restriction", 0);
 user_pref("webgl.disabled", true);
    // user_pref("webgl.enable-webgl2", false);
    // user_pref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT: true FF86+]
-/* 2508: disable hardware acceleration [SETUP-HARDEN]
- * [WARNING] Affects rendering and performance
- * [SETTING] General>Performance>Custom>Use hardware acceleration when available
- * [1] https://wiki.mozilla.org/Platform/GFX/HardwareAcceleration ***/
-   // user_pref("gfx.direct2d.disabled", true); // [WINDOWS]
-   // user_pref("layers.acceleration.disabled", true);
 
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");

From 8bfee5b59f41aa0ad67cf421560524f7fe87625f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 22 Aug 2021 01:55:28 +0000
Subject: [PATCH 0866/1147] hardware acceleration

see https://github.com/arkenfox/user.js/commit/04d648d55b4aeff5aada935356b59031ab75b482
---
 scratchpad-scripts/arkenfox-clear-removed.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 5c5a352..a5e1a01 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
   This will reset the preferences that have been removed completely from the arkenfox user.js.
 
-  Last updated: 21-August-2021
+  Last updated: 22-August-2021
 
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -224,6 +224,8 @@
     'dom.storage.enabled',
     'dom.vibrator.enabled',
     'general.warnOnAboutConfig',
+    'gfx.direct2d.disabled',
+    'layers.acceleration.disabled',
     'media.media-capabilities.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'

From 2b26cd4f41d7d7e8e0d00ab2a7411238aac98d67 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 22 Aug 2021 05:18:54 +0000
Subject: [PATCH 0867/1147] 7000s: ciphers, #1235

- merged 3DES cipher to bottom: it is still the same order of [1]
- 3DES pref will be deprecated: pref name changes, and the cipher slated to be unavailable unless you downgrade to < TLS1.2 - see https://bugzilla.mozilla.org/show_bug.cgi?id=1724072
   - FYI: we reset TLS downgrades to session only by resetting the pref currently in 1203
- "Minimal/non-existent threat of downgrade attacks"
   - FYI: these old ciphers are about 1-2% of traffic (from memory) - but that's still significant breakage
   - So the only reason to do this would be to harden against downgrade attacks (and inadvertently use weak sites = breakage): but that doesn't fit most user's threat model: and is probably never going to happen for them. Not sure if I can word that much better and just as succinct
---
 user.js | 39 ++++++++++++++-------------------------
 1 file changed, 14 insertions(+), 25 deletions(-)

diff --git a/user.js b/user.js
index b681b28..2208639 100644
--- a/user.js
+++ b/user.js
@@ -51,7 +51,7 @@
   0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
   0900: PASSWORDS
   1000: CACHE / SESSION (RE)STORE / FAVICONS
-  1200: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
+  1200: HTTPS (SSL/TLS / OCSP / CERTS / HPKP)
   1400: FONTS
   1600: HEADERS / REFERERS
   1700: CONTAINERS
@@ -577,7 +577,7 @@ user_pref("browser.shell.shortcutFavicons", false);
  * [NOTE] favicons.sqlite is sanitized on Firefox close, not in-session ***/
    // user_pref("browser.chrome.site_icons", false);
 
-/*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
+/*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP)
    Your cipher and other settings can be used in server side fingerprinting
    [TEST] https://www.ssllabs.com/ssltest/viewMyClient.html
    [TEST] https://browserleaks.com/ssl
@@ -701,29 +701,6 @@ user_pref("dom.security.https_only_mode_send_http_background_request", false);
  * [1] https://bugzilla.mozilla.org/1382359 ***/
    // user_pref("dom.securecontext.whitelist_onions", true);
 
-/** CIPHERS
-   [WARNING] DO NOT USE: see the section 1200 intro
-   These are the ciphers listed under "Cipher Suites" [1] that are either still using SHA-1 and CBC,
-   and/or are missing Perfect Forward Secrecy [3] and/or have other weaknesses like key sizes of 128
-   [1] https://browserleaks.com/ssl
-   [2] https://en.wikipedia.org/wiki/Key_size
-   [3] https://en.wikipedia.org/wiki/Forward_secrecy
- ***/
-/* 1261: disable 3DES (effective key size < 128 and no PFS)
- * [1] https://en.wikipedia.org/wiki/3des#Security
- * [2] https://en.wikipedia.org/wiki/Meet-in-the-middle_attack
- * [3] https://www-archive.mozilla.org/projects/security/pki/nss/ssl/fips-ssl-ciphersuites.html ***/
-   // user_pref("security.ssl3.rsa_des_ede3_sha", false);
-/* 1264: disable the remaining non-modern cipher suites as of FF78 (in order of preferred by FF) ***/
-   // user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false);
-   // user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
-   // user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
-   // user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false);
-   // user_pref("security.ssl3.rsa_aes_128_gcm_sha256", false); // no PFS
-   // user_pref("security.ssl3.rsa_aes_256_gcm_sha384", false); // no PFS
-   // user_pref("security.ssl3.rsa_aes_128_sha", false); // no PFS
-   // user_pref("security.ssl3.rsa_aes_256_sha", false); // no PFS
-
 /** UI (User Interface) ***/
 /* 1270: display warning on the padlock for "broken security" (if 1201 is false)
  * Bug: warning padlock not indicated for subresources on a secure page! [2]
@@ -1444,6 +1421,18 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's pushing up daisies
    // user_pref("permissions.default.microphone", 0);
    // user_pref("permissions.default.desktop-notification", 0);
    // user_pref("permissions.default.xr", 0); // Virtual Reality
+/* 7003: disable non-modern cipher suites [1]
+ * [WHY] Passive fingerprinting. Minimal/non-existent threat of downgrade attacks
+ * [1] https://browserleaks.com/ssl ***/
+   // user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false);
+   // user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
+   // user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
+   // user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false);
+   // user_pref("security.ssl3.rsa_aes_128_gcm_sha256", false); // no PFS
+   // user_pref("security.ssl3.rsa_aes_256_gcm_sha384", false); // no PFS
+   // user_pref("security.ssl3.rsa_aes_128_sha", false); // no PFS
+   // user_pref("security.ssl3.rsa_aes_256_sha", false); // no PFS
+   // user_pref("security.ssl3.rsa_des_ede3_sha", false); // 3DES
 
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good

From cf379bcce01e88e6a442943e1b64a5ec34353968 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 22 Aug 2021 05:45:08 +0000
Subject: [PATCH 0868/1147] typos

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 2208639..f51ede8 100644
--- a/user.js
+++ b/user.js
@@ -731,7 +731,7 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
  * [2] https://en.wikipedia.org/wiki/Graphite_(SIL) ***/
 user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1403: limit font visibility (Windows, Mac, some Linux) [FF79+]
- * [NOTE] IN FF8)+ RFP ignores the pref and uses value 1
+ * [NOTE] In FF80+ RFP ignores the pref and uses value 1
  * Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1], bundled fonts are auto-allowed
  * 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
  * [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc ***/

From c55e6dcd682f275018122f0e7093d0b5208e80fb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 22 Aug 2021 08:27:15 +0000
Subject: [PATCH 0869/1147] flip order, order within groups

- note: keeping 91 separate for now for the easy info factpr
---
 scratchpad-scripts/arkenfox-clear-removed.js | 386 +++++++++----------
 1 file changed, 193 insertions(+), 193 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index a5e1a01..5120643 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -13,24 +13,205 @@
 
   const aPREFS = [
     /* removed in arkenfox user.js */
+    /* 91 */
+    'alerts.showFavicons',
+    'dom.battery.enabled',
+    'dom.storage.enabled',
+    'dom.vibrator.enabled',
+    'general.warnOnAboutConfig',
+    'gfx.direct2d.disabled',
+    'layers.acceleration.disabled',
+    'media.media-capabilities.enabled',
+    /* 79-90 */
+    'browser.newtabpage.activity-stream.asrouter.providers.snippets',
+    'browser.send_pings.require_same_host',
+    'browser.urlbar.usepreloadedtopurls.enabled',
+    'dom.IntersectionObserver.enabled',
+    'extensions.screenshots.upload-disabled',
+    'media.gmp-widevinecdm.visible',
+    'network.http.redirection-limit',
+    'privacy.partition.network_state',
+    'security.ssl.enable_ocsp_stapling',
+    'security.ssl3.dhe_rsa_aes_128_sha',
+    'security.ssl3.dhe_rsa_aes_256_sha',
+    'webgl.min_capability_mode',
+    /* 69-78 */
+    'browser.cache.disk_cache_ssl',
+    'browser.search.geoip.url',
+    'browser.search.region',
+    'browser.sessionhistory.max_entries',
+    'dom.push.connection.enabled',
+    'dom.push.serverURL',
+    'extensions.getAddons.discovery.api_url',
+    'extensions.htmlaboutaddons.discover.enabled',
+    'extensions.webservice.discoverURL',
+    'intl.locale.requested',
+    'intl.regional_prefs.use_os_locales',
+    'media.block-autoplay-until-in-foreground',
+    'middlemouse.paste',
+    'plugin.sessionPermissionNow.intervalInMinutes',
+    'privacy.usercontext.about_newtab_segregation.enabled',
+    'security.insecure_connection_icon.pbmode.enabled',
+    'security.insecure_connection_text.pbmode.enabled',
+    'webgl.dxgl.enabled',
+    /* 61-68 */
+    'app.update.service.enabled',
+    'app.update.silent',
+    'app.update.staging.enabled',
+    'browser.cache.disk.capacity',
+    'browser.cache.disk.smart_size.enabled',
+    'browser.cache.disk.smart_size.first_run',
+    'browser.cache.offline.insecure.enable',
+    'browser.contentblocking.enabled',
+    'browser.eme.ui.enabled',
+    'browser.laterrun.enabled',
+    'browser.offline-apps.notify',
+    'browser.rights.3.shown',
+    'browser.safebrowsing.blockedURIs.enabled',
+    'browser.safebrowsing.downloads.remote.block_dangerous',
+    'browser.safebrowsing.downloads.remote.block_dangerous_host',
+    'browser.safebrowsing.provider.google.gethashURL',
+    'browser.safebrowsing.provider.google.reportMalwareMistakeURL',
+    'browser.safebrowsing.provider.google.reportPhishMistakeURL',
+    'browser.safebrowsing.provider.google.reportURL',
+    'browser.safebrowsing.provider.google.updateURL',
+    'browser.safebrowsing.provider.google4.dataSharing.enabled',
+    'browser.safebrowsing.provider.google4.dataSharingURL',
+    'browser.safebrowsing.provider.google4.gethashURL',
+    'browser.safebrowsing.provider.google4.reportMalwareMistakeURL',
+    'browser.safebrowsing.provider.google4.reportPhishMistakeURL',
+    'browser.safebrowsing.provider.google4.reportURL',
+    'browser.safebrowsing.provider.google4.updateURL',
+    'browser.safebrowsing.provider.mozilla.gethashURL',
+    'browser.safebrowsing.provider.mozilla.updateURL',
+    'browser.safebrowsing.reportPhishURL',
+    'browser.sessionhistory.max_total_viewers',
+    'browser.sessionstore.max_windows_undo',
+    'browser.slowStartup.maxSamples',
+    'browser.slowStartup.notificationDisabled',
+    'browser.slowStartup.samples',
+    'browser.storageManager.enabled',
+    'browser.urlbar.autoFill.typed',
+    'browser.urlbar.filter.javascript',
+    'browser.urlbar.maxHistoricalSearchSuggestions',
+    'browser.urlbar.userMadeSearchSuggestionsChoice',
+    'canvas.capturestream.enabled',
+    'dom.allow_scripts_to_close_windows',
+    'dom.disable_window_flip',
+    'dom.forms.datetime',
+    'dom.imagecapture.enabled',
+    'dom.popup_maximum',
+    'extensions.webextensions.keepStorageOnUninstall',
+    'extensions.webextensions.keepUuidOnUninstall',
+    'font.blacklist.underline_offset',
+    'font.name.monospace.x-unicode',
+    'font.name.monospace.x-western',
+    'font.name.sans-serif.x-unicode',
+    'font.name.sans-serif.x-western',
+    'font.name.serif.x-unicode',
+    'font.name.serif.x-western',
+    'gfx.offscreencanvas.enabled',
+    'javascript.options.shared_memory',
+    'layout.css.font-loading-api.enabled',
+    'media.gmp-gmpopenh264.autoupdate',
+    'media.gmp-gmpopenh264.enabled',
+    'media.gmp-manager.updateEnabled',
+    'media.gmp-manager.url',
+    'media.gmp-manager.url.override',
+    'media.gmp-widevinecdm.autoupdate',
+    'media.gmp.trial-create.enabled',
+    'media.navigator.video.enabled',
+    'media.peerconnection.ice.tcp',
+    'media.peerconnection.identity.enabled',
+    'media.peerconnection.identity.timeout',
+    'media.peerconnection.turn.disable',
+    'media.peerconnection.use_document_iceservers',
+    'media.peerconnection.video.enabled',
+    'network.auth.subresource-img-cross-origin-http-auth-allow',
+    'network.cookie.leave-secure-alone',
+    'network.cookie.same-site.enabled',
+    'network.dnsCacheEntries',
+    'network.dnsCacheExpiration',
+    'network.http.fast-fallback-to-IPv4',
+    'network.proxy.autoconfig_url.include_path',
+    'offline-apps.quota.warn',
+    'pdfjs.enableWebGL',
+    'plugin.default.state',
+    'plugin.defaultXpi.state',
+    'plugin.scan.plid.all',
+    'privacy.trackingprotection.annotate_channels',
+    'privacy.trackingprotection.lower_network_priority',
+    'privacy.trackingprotection.pbmode.enabled',
+    'privacy.trackingprotection.ui.enabled',
+    'security.data_uri.block_toplevel_data_uri_navigations',
+    'security.insecure_field_warning.contextual.enabled',
+    'security.insecure_password.ui.enabled',
+    'security.tls.version.fallback-limit',
+    'services.blocklist.addons.collection',
+    'services.blocklist.gfx.collection',
+    'services.blocklist.onecrl.collection',
+    'services.blocklist.plugins.collection',
+    'services.blocklist.signing.enforced',
+    'services.blocklist.update_enabled',
+    'signon.autofillForms.http',
+    'signon.storeWhenAutocompleteOff',
+    'toolkit.telemetry.cachedClientID',
+    'urlclassifier.trackingTable',
+    'xpinstall.whitelist.required',
     /* 60 or lower */
+    'browser.migrate.automigrate.enabled',
+    'browser.search.geoip.timeout',
     'browser.search.reset.enabled',
     'browser.search.reset.whitelist',
-    'browser.migrate.automigrate.enabled',
+    'browser.stopReloadAnimation.enabled',
+    'browser.tabs.insertRelatedAfterCurrent',
+    'browser.tabs.loadDivertedInBackground',
+    'browser.tabs.loadInBackground',
+    'browser.tabs.selectOwnerOnClose',
+    'browser.urlbar.clickSelectsAll',
+    'browser.urlbar.doubleClickSelectsAll',
+    'device.storage.enabled',
+    'dom.keyboardevent.dispatch_during_composition',
+    'dom.presentation.controller.enabled',
+    'dom.presentation.discoverable',
+    'dom.presentation.discovery.enabled',
+    'dom.presentation.enabled',
+    'dom.presentation.receiver.enabled',
+    'dom.presentation.session_transport.data_channel.enable',
+    'dom.vr.oculus.enabled',
+    'dom.vr.openvr.enabled',
+    'dom.vr.osvr.enabled',
+    'extensions.pocket.api',
+    'extensions.pocket.oAuthConsumerKey',
+    'extensions.pocket.site',
+    'general.useragent.compatMode.firefox',
+    'geo.wifi.xhr.timeout',
+    'gfx.layerscope.enabled',
+    'media.flac.enabled',
+    'media.mediasource.enabled',
+    'media.mediasource.mp4.enabled',
+    'media.mediasource.webm.audio.enabled',
+    'media.mediasource.webm.enabled',
+    'media.mp4.enabled',
+    'media.ogg.enabled',
+    'media.ogg.flac.enabled',
+    'media.opus.enabled',
+    'media.raw.enabled',
+    'media.wave.enabled',
+    'media.webm.enabled',
+    'media.webspeech.recognition.enable',
+    'media.wmf.amd.vp9.enabled',
+    'media.wmf.enabled',
+    'media.wmf.vp9.enabled',
+    'network.dns.blockDotOnion',
+    'network.stricttransportsecurity.preloadlist',
+    'security.block_script_with_wrong_mime',
+    'security.fileuri.strict_origin_policy',
+    'security.sri.enable',
     'services.sync.enabled',
+    'ui.submenuDelay',
     'webextensions.storage.sync.enabled',
     'webextensions.storage.sync.serverURL',
-    'dom.keyboardevent.dispatch_during_composition', // default is false anyway
-    'dom.vr.oculus.enabled', // covered by dom.vr.enabled
-    'dom.vr.openvr.enabled', // ditto
-    'dom.vr.osvr.enabled', // ditto
-    'extensions.pocket.api', // covered by extensions.pocket.enabled
-    'extensions.pocket.oAuthConsumerKey', // ditto
-    'extensions.pocket.site', // ditto
-    'geo.wifi.xhr.timeout', // covered by geo.enabled
-    'browser.search.geoip.timeout', // ditto
-    'media.webspeech.recognition.enable', // default is false anyway
-    'gfx.layerscope.enabled', // default is false anyway
     //  excluding these e10 settings
        // 'browser.tabs.remote.autostart',
        // 'browser.tabs.remote.autostart.2',
@@ -46,187 +227,6 @@
        // 'dom.ipc.plugins.sandbox-level.default',
        // 'dom.ipc.plugins.sandbox-level.flash',
        // 'security.sandbox.logging.enabled',
-    'dom.presentation.controller.enabled',
-    'dom.presentation.discoverable',
-    'dom.presentation.discovery.enabled',
-    'dom.presentation.enabled',
-    'dom.presentation.receiver.enabled',
-    'dom.presentation.session_transport.data_channel.enable',
-    'browser.stopReloadAnimation.enabled',
-    'browser.tabs.insertRelatedAfterCurrent',
-    'browser.tabs.loadDivertedInBackground',
-    'browser.tabs.loadInBackground',
-    'browser.tabs.selectOwnerOnClose',
-    'browser.urlbar.clickSelectsAll',
-    'browser.urlbar.doubleClickSelectsAll',
-    'media.flac.enabled',
-    'media.mediasource.enabled',
-    'media.mediasource.mp4.enabled',
-    'media.mediasource.webm.audio.enabled',
-    'media.mediasource.webm.enabled',
-    'media.mp4.enabled',
-    'media.ogg.enabled',
-    'media.ogg.flac.enabled',
-    'media.opus.enabled',
-    'media.raw.enabled',
-    'media.wave.enabled',
-    'media.webm.enabled',
-    'media.wmf.amd.vp9.enabled',
-    'media.wmf.enabled',
-    'media.wmf.vp9.enabled',
-    'ui.submenuDelay',
-    'device.storage.enabled',
-    'general.useragent.compatMode.firefox',
-    'network.dns.blockDotOnion',
-    'network.stricttransportsecurity.preloadlist',
-    'security.block_script_with_wrong_mime',
-    'security.fileuri.strict_origin_policy',
-    'security.sri.enable',
-    /* 61-68 */
-    'browser.laterrun.enabled',
-    'browser.offline-apps.notify',
-    'browser.rights.3.shown',
-    'browser.slowStartup.maxSamples',
-    'browser.slowStartup.notificationDisabled',
-    'browser.slowStartup.samples',
-    'browser.storageManager.enabled',
-    'dom.allow_scripts_to_close_windows',
-    'dom.disable_window_flip',
-    'network.http.fast-fallback-to-IPv4',
-    'offline-apps.quota.warn',
-    'services.blocklist.signing.enforced',
-    'browser.urlbar.autoFill.typed',
-    'security.tls.version.fallback-limit',
-    'extensions.webextensions.keepStorageOnUninstall',
-    'extensions.webextensions.keepUuidOnUninstall',
-    'privacy.trackingprotection.ui.enabled',
-    'browser.eme.ui.enabled',
-    'browser.sessionstore.max_windows_undo',
-    'network.auth.subresource-img-cross-origin-http-auth-allow',
-    'media.peerconnection.ice.tcp',
-    'media.peerconnection.identity.enabled',
-    'media.peerconnection.identity.timeout',
-    'media.peerconnection.turn.disable',
-    'media.peerconnection.use_document_iceservers',
-    'media.peerconnection.video.enabled',
-    'media.navigator.video.enabled',
-    'browser.contentblocking.enabled',
-    'browser.urlbar.maxHistoricalSearchSuggestions',
-    'app.update.service.enabled',
-    'app.update.silent',
-    'app.update.staging.enabled',
-    'browser.cache.disk.capacity',
-    'browser.cache.disk.smart_size.enabled',
-    'browser.cache.disk.smart_size.first_run',
-    'browser.cache.offline.insecure.enable',
-    'browser.safebrowsing.provider.google.reportMalwareMistakeURL',
-    'browser.safebrowsing.provider.google.reportPhishMistakeURL',
-    'browser.safebrowsing.provider.google.reportURL',
-    'browser.safebrowsing.provider.google4.dataSharing.enabled',
-    'browser.safebrowsing.provider.google4.dataSharingURL',
-    'browser.safebrowsing.provider.google4.reportMalwareMistakeURL',
-    'browser.safebrowsing.provider.google4.reportPhishMistakeURL',
-    'browser.safebrowsing.provider.google4.reportURL',
-    'browser.safebrowsing.reportPhishURL',
-    'browser.sessionhistory.max_total_viewers',
-    'browser.urlbar.filter.javascript',
-    'canvas.capturestream.enabled',
-    'dom.imagecapture.enabled',
-    'dom.popup_maximum',
-    'gfx.offscreencanvas.enabled',
-    'javascript.options.shared_memory',
-    'media.gmp-gmpopenh264.autoupdate',
-    'media.gmp-gmpopenh264.enabled',
-    'media.gmp-manager.updateEnabled',
-    'media.gmp-manager.url',
-    'media.gmp-manager.url.override',
-    'media.gmp.trial-create.enabled',
-    'media.gmp-widevinecdm.autoupdate',
-    'network.cookie.leave-secure-alone',
-    'network.cookie.same-site.enabled',
-    'network.dnsCacheEntries',
-    'network.dnsCacheExpiration',
-    'network.proxy.autoconfig_url.include_path',
-    'pdfjs.enableWebGL',
-    'plugin.default.state',
-    'plugin.defaultXpi.state',
-    'plugin.scan.plid.all',
-    'security.data_uri.block_toplevel_data_uri_navigations',
-    'security.insecure_field_warning.contextual.enabled',
-    'security.insecure_password.ui.enabled',
-    'signon.autofillForms.http',
-    'signon.storeWhenAutocompleteOff',
-    'xpinstall.whitelist.required',
-    'browser.safebrowsing.downloads.remote.block_dangerous',
-    'browser.safebrowsing.downloads.remote.block_dangerous_host',
-    'browser.safebrowsing.blockedURIs.enabled',
-    'browser.safebrowsing.provider.google.gethashURL',
-    'browser.safebrowsing.provider.google.updateURL',
-    'browser.safebrowsing.provider.google4.gethashURL',
-    'browser.safebrowsing.provider.google4.updateURL',
-    'browser.safebrowsing.provider.mozilla.gethashURL',
-    'browser.safebrowsing.provider.mozilla.updateURL',
-    'browser.urlbar.userMadeSearchSuggestionsChoice',
-    'privacy.trackingprotection.annotate_channels',
-    'privacy.trackingprotection.lower_network_priority',
-    'privacy.trackingprotection.pbmode.enabled',
-    'services.blocklist.addons.collection',
-    'services.blocklist.gfx.collection',
-    'services.blocklist.onecrl.collection',
-    'services.blocklist.plugins.collection',
-    'services.blocklist.update_enabled',
-    'urlclassifier.trackingTable',
-    'dom.forms.datetime',
-    'font.blacklist.underline_offset',
-    'font.name.monospace.x-unicode',
-    'font.name.monospace.x-western',
-    'font.name.sans-serif.x-unicode',
-    'font.name.sans-serif.x-western',
-    'font.name.serif.x-unicode',
-    'font.name.serif.x-western',
-    'layout.css.font-loading-api.enabled',
-    'toolkit.telemetry.cachedClientID',
-    /* 69-78 */
-    'plugin.sessionPermissionNow.intervalInMinutes',
-    'browser.cache.disk_cache_ssl',
-    'browser.sessionhistory.max_entries',
-    'dom.push.connection.enabled',
-    'dom.push.serverURL',
-    'extensions.getAddons.discovery.api_url',
-    'extensions.htmlaboutaddons.discover.enabled',
-    'extensions.webservice.discoverURL',
-    'intl.locale.requested',
-    'intl.regional_prefs.use_os_locales',
-    'privacy.usercontext.about_newtab_segregation.enabled',
-    'security.insecure_connection_icon.pbmode.enabled',
-    'security.insecure_connection_text.pbmode.enabled',
-    'webgl.dxgl.enabled',
-    'media.block-autoplay-until-in-foreground',
-    'middlemouse.paste',
-    'browser.search.geoip.url',
-    'browser.search.region',
-    /* 79-90 */
-    'browser.urlbar.usepreloadedtopurls.enabled',
-    'dom.IntersectionObserver.enabled',
-    'extensions.screenshots.upload-disabled',
-    'privacy.partition.network_state',
-    'security.ssl3.dhe_rsa_aes_128_sha',
-    'security.ssl3.dhe_rsa_aes_256_sha',
-    'browser.newtabpage.activity-stream.asrouter.providers.snippets',
-    'network.http.redirection-limit',
-    'media.gmp-widevinecdm.visible',
-    'browser.send_pings.require_same_host',
-    'webgl.min_capability_mode',
-    'security.ssl.enable_ocsp_stapling',
-    /* 91 */
-    'alerts.showFavicons',
-    'dom.battery.enabled',
-    'dom.storage.enabled',
-    'dom.vibrator.enabled',
-    'general.warnOnAboutConfig',
-    'gfx.direct2d.disabled',
-    'layers.acceleration.disabled',
-    'media.media-capabilities.enabled',
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ];

From 8a22a90804de2a7884af3952791e0e52f4539fa2 Mon Sep 17 00:00:00 2001
From: icpantsparti <35049679+icpantsparti@users.noreply.github.com>
Date: Sun, 22 Aug 2021 16:23:51 +0000
Subject: [PATCH 0870/1147] colon insertion (#1238)

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index f51ede8..3278474 100644
--- a/user.js
+++ b/user.js
@@ -1399,7 +1399,7 @@ user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features",
    // user_pref("network.manage-offline-status", false); // see bugzilla 620472
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 
-/*** [SECTION 7000] DON'T BOTHER ***/
+/*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "8000 syntax error: the parrot's pushing up daisies!");
 /* 7001: disable APIs
  * Location-Aware Browsing, Full Screen, offline cache (appCache), Virtual Reality

From ab42deb541e2cc947fa5403596417f2afd3a2f9a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 23 Aug 2021 02:55:36 +0000
Subject: [PATCH 0871/1147] Four more items to 7000s, #1235

---
 user.js | 36 ++++++++++++------------------------
 1 file changed, 12 insertions(+), 24 deletions(-)

diff --git a/user.js b/user.js
index 3278474..ae60170 100644
--- a/user.js
+++ b/user.js
@@ -598,24 +598,8 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
  * [4] https://www.ssllabs.com/ssl-pulse/ ***/
 user_pref("security.ssl.require_safe_negotiation", true);
-/* 1202: control TLS versions with min and max
- * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
- * [WARNING] Leave these at default, otherwise you alter your TLS fingerprint
- * [1] https://www.ssllabs.com/ssl-pulse/ ***/
-   // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
-   // user_pref("security.tls.version.max", 4);
 /* 1203: enforce TLS 1.0 and 1.1 downgrades as session only ***/
 user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
-/* 1204: disable SSL session tracking [FF36+]
- * SSL Session IDs are unique and last up to 24hrs in Firefox (or longer with prolongation attacks)
- * [NOTE] These are not used in PB mode. In normal windows they are isolated when using FPI (4001)
- * and/or containers. In FF85+ they are isolated by default (privacy.partition.network_state)
- * [WARNING] There are perf and passive fingerprinting costs, for little to no gain. Preventing
- * tracking via this method does not address IPs, nor handle any sanitizing of current identifiers
- * [1] https://tools.ietf.org/html/rfc5077
- * [2] https://bugzilla.mozilla.org/967977
- * [3] https://arxiv.org/abs/1810.07304 ***/
-   // user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
 /* 1206: disable TLS1.3 0-RTT (round-trip time) [FF51+]
  * [1] https://github.com/tlswg/tls13-spec/issues/1001
  * [2] https://blog.cloudflare.com/tls-1-3-overview-and-q-and-a/ ***/
@@ -696,10 +680,6 @@ user_pref("dom.security.https_only_mode", true); // [FF76+]
  * This is done to avoid waiting for a timeout which takes 90 seconds
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1642387,1660945 ***/
 user_pref("dom.security.https_only_mode_send_http_background_request", false);
-/* 1247: treat .onion as a secure context [FF60+] [TOR]
- * [NOTE] Firefox cannot access .onion sites by default: it is strongly recommended you just use Tor Browser
- * [1] https://bugzilla.mozilla.org/1382359 ***/
-   // user_pref("dom.securecontext.whitelist_onions", true);
 
 /** UI (User Interface) ***/
 /* 1270: display warning on the padlock for "broken security" (if 1201 is false)
@@ -779,10 +759,6 @@ user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false]
  * [4] https://blog.mozilla.org/security/2021/03/22/firefox-87-trims-http-referrers-by-default-to-protect-user-privacy/ ***/
    // user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2 FF87+]
    // user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
-/* 1607: hide (not spoof) referrer when leaving a .onion domain [FF54+] [TOR]
- * [NOTE] Firefox cannot access .onion sites by default: it is strongly recommended you just use Tor Browser
- * [1] https://bugzilla.mozilla.org/1305144 ***/
-   // user_pref("network.http.referer.hideOnionSource", true);
 /* 1610: ALL: enable the DNT (Do Not Track) HTTP header
  * [NOTE] DNT is enforced with Enhanced Tracking Protection regardless of this pref
  * [SETTING] Privacy & Security>Enhanced Tracking Protection>Send websites a "Do Not Track" signal... ***/
@@ -1433,6 +1409,18 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's pushing up daisies
    // user_pref("security.ssl3.rsa_aes_128_sha", false); // no PFS
    // user_pref("security.ssl3.rsa_aes_256_sha", false); // no PFS
    // user_pref("security.ssl3.rsa_des_ede3_sha", false); // 3DES
+/* 7004: control TLS versions
+ * [WHY] Passive fingerprinting. Downgrades are still possible: behind user interaction ***/
+   // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
+   // user_pref("security.tls.version.max", 4);
+/* 7005: disable SSL session IDs [FF36+]
+ * [WHY] Passive fingerprinting and perf costs. These are session-only and isolated
+ * with network partitioning (FF85+) or when using FPI and/or containers ***/
+   // user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
+/* 7006: onions
+ * [WHY] Firefox doesn't support hidden services. Use Tor Browser ***/
+   // user_pref("dom.securecontext.whitelist_onions", true); // 1382359
+   // user_pref("network.http.referer.hideOnionSource", true); // 1305144
 
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good

From 033977fe1051abb00aa5ca4ccbedc7d34c8a82d5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 23 Aug 2021 03:39:15 +0000
Subject: [PATCH 0872/1147] move personal to last

probably more professional to keep it at the end since it isn't strictly project related. It also opens up space for `DON'T TOUCH` and `OPTIONAL OPSEC`
---
 user.js | 104 ++++++++++++++++++++++++++++----------------------------
 1 file changed, 52 insertions(+), 52 deletions(-)

diff --git a/user.js b/user.js
index ae60170..a3d87a3 100644
--- a/user.js
+++ b/user.js
@@ -64,9 +64,9 @@
   2800: SHUTDOWN
   4000: FPI (FIRST PARTY ISOLATION)
   4500: RFP (RESIST FINGERPRINTING)
-  5000: PERSONAL
   7000: DON'T BOTHER
   8000: DON'T BOTHER: NON-RFP
+  9000: PERSONAL
   9999: DEPRECATED / REMOVED / LEGACY / RENAMED
 
 ******/
@@ -1325,58 +1325,8 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
 
-/*** [SECTION 5000]: PERSONAL
-   Non-project related but useful. If any of these interest you, add them to your overrides
-   To save some overrides, we've made a few active as they seem to be universally used
-***/
-user_pref("_user.js.parrot", "5000 syntax error: this is an ex-parrot!");
-/* WELCOME & WHAT'S NEW NOTICES ***/
-user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switch
-   // user_pref("startup.homepage_welcome_url", "");
-   // user_pref("startup.homepage_welcome_url.additional", "");
-   // user_pref("startup.homepage_override_url", ""); // What's New page after updates
-/* WARNINGS ***/
-   // user_pref("browser.tabs.warnOnClose", false);
-   // user_pref("browser.tabs.warnOnCloseOtherTabs", false);
-   // user_pref("browser.tabs.warnOnOpen", false);
-   // user_pref("full-screen-api.warning.delay", 0);
-   // user_pref("full-screen-api.warning.timeout", 0);
-/* APPEARANCE ***/
-   // user_pref("browser.download.autohideButton", false); // [FF57+]
-   // user_pref("ui.systemUsesDarkTheme", 1); // [FF67+] [HIDDEN PREF]
-      // 0=light, 1=dark: with RFP this only affects chrome
-   // user_pref("toolkit.legacyUserProfileCustomizations.stylesheets", true); // [FF68+] allow userChrome/userContent
-   // user_pref("ui.prefersReducedMotion", 1); // disable chrome animations [FF77+] [RESTART] [HIDDEN PREF]
-      // 0=no-preference, 1=reduce: with RFP this only affects chrome
-/* CONTENT BEHAVIOR ***/
-   // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
-   // user_pref("clipboard.autocopy", false); // disable autocopy default [LINUX]
-   // user_pref("layout.spellcheckDefault", 2); // 0=none, 1-multi-line, 2=multi-line & single-line
-/* UX BEHAVIOR ***/
-   // user_pref("browser.backspace_action", 2); // 0=previous page, 1=scroll up, 2=do nothing
-   // user_pref("browser.quitShortcut.disabled", true); // disable Ctrl-Q quit shortcut [LINUX] [MAC] [FF87+]
-   // user_pref("browser.tabs.closeWindowWithLastTab", false);
-   // user_pref("browser.tabs.loadBookmarksInTabs", true); // open bookmarks in a new tab [FF57+]
-   // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see bugzilla 1320061 [FF53+]
-   // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [DEFAULT: false on Linux]
-   // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
-   // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+, FF59 and under]
-/* UX FEATURES: disable and hide the icons and menus ***/
-user_pref("browser.messaging-system.whatsNewPanel.enabled", false); // What's New toolbar icon [FF69+]
-   // user_pref("extensions.pocket.enabled", false); // Pocket Account [FF46+]
-   // user_pref("identity.fxaccounts.enabled", false); // Firefox Accounts & Sync [FF60+] [RESTART]
-   // user_pref("reader.parse-on-load.enabled", false); // Reader View
-/* OTHER ***/
-   // user_pref("browser.bookmarks.max_backups", 2);
-user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+]
-      // [SETTING] General>Browsing>Recommend extensions as you browse
-user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
-      // [SETTING] General>Browsing>Recommend features as you browse
-   // user_pref("network.manage-offline-status", false); // see bugzilla 620472
-   // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
-
 /*** [SECTION 7000]: DON'T BOTHER ***/
-user_pref("_user.js.parrot", "8000 syntax error: the parrot's pushing up daisies!");
+user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");
 /* 7001: disable APIs
  * Location-Aware Browsing, Full Screen, offline cache (appCache), Virtual Reality
  * [WHY] The API state is easily fingerprintable. Geo and VR are behind prompts (7002).
@@ -1454,6 +1404,56 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's crossed the Jordan
    // user_pref("general.useragent.override", ""); // [HIDDEN PREF]
    // user_pref("ui.use_standins_for_native_colors", true);
 
+/*** [SECTION 9000]: PERSONAL
+   Non-project related but useful. If any interest you, add them to your overrides
+   To save some overrides, we've made a few active as they seem to be universally used
+***/
+user_pref("_user.js.parrot", "9000 syntax error: this is an ex-parrot!");
+/* WELCOME & WHAT'S NEW NOTICES ***/
+user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switch
+   // user_pref("startup.homepage_welcome_url", "");
+   // user_pref("startup.homepage_welcome_url.additional", "");
+   // user_pref("startup.homepage_override_url", ""); // What's New page after updates
+/* WARNINGS ***/
+   // user_pref("browser.tabs.warnOnClose", false);
+   // user_pref("browser.tabs.warnOnCloseOtherTabs", false);
+   // user_pref("browser.tabs.warnOnOpen", false);
+   // user_pref("full-screen-api.warning.delay", 0);
+   // user_pref("full-screen-api.warning.timeout", 0);
+/* APPEARANCE ***/
+   // user_pref("browser.download.autohideButton", false); // [FF57+]
+   // user_pref("ui.systemUsesDarkTheme", 1); // [FF67+] [HIDDEN PREF]
+      // 0=light, 1=dark: with RFP this only affects chrome
+   // user_pref("toolkit.legacyUserProfileCustomizations.stylesheets", true); // [FF68+] allow userChrome/userContent
+   // user_pref("ui.prefersReducedMotion", 1); // disable chrome animations [FF77+] [RESTART] [HIDDEN PREF]
+      // 0=no-preference, 1=reduce: with RFP this only affects chrome
+/* CONTENT BEHAVIOR ***/
+   // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
+   // user_pref("clipboard.autocopy", false); // disable autocopy default [LINUX]
+   // user_pref("layout.spellcheckDefault", 2); // 0=none, 1-multi-line, 2=multi-line & single-line
+/* UX BEHAVIOR ***/
+   // user_pref("browser.backspace_action", 2); // 0=previous page, 1=scroll up, 2=do nothing
+   // user_pref("browser.quitShortcut.disabled", true); // disable Ctrl-Q quit shortcut [LINUX] [MAC] [FF87+]
+   // user_pref("browser.tabs.closeWindowWithLastTab", false);
+   // user_pref("browser.tabs.loadBookmarksInTabs", true); // open bookmarks in a new tab [FF57+]
+   // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see bugzilla 1320061 [FF53+]
+   // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [DEFAULT: false on Linux]
+   // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
+   // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+, FF59 and under]
+/* UX FEATURES: disable and hide the icons and menus ***/
+user_pref("browser.messaging-system.whatsNewPanel.enabled", false); // What's New toolbar icon [FF69+]
+   // user_pref("extensions.pocket.enabled", false); // Pocket Account [FF46+]
+   // user_pref("identity.fxaccounts.enabled", false); // Firefox Accounts & Sync [FF60+] [RESTART]
+   // user_pref("reader.parse-on-load.enabled", false); // Reader View
+/* OTHER ***/
+   // user_pref("browser.bookmarks.max_backups", 2);
+user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+]
+      // [SETTING] General>Browsing>Recommend extensions as you browse
+user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
+      // [SETTING] General>Browsing>Recommend features as you browse
+   // user_pref("network.manage-offline-status", false); // see bugzilla 620472
+   // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
+
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
    Documentation denoted as [-]. Items deprecated in FF78 or earlier have been archived at [1]
    [1] https://github.com/arkenfox/user.js/issues/123

From 47be7ba42fc48c2cca79675cd9b608084b558e6e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 23 Aug 2021 04:08:49 +0000
Subject: [PATCH 0873/1147] 1203 is a reset not enforce

---
 user.js | 6 ++++--
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index a3d87a3..0dcf02d 100644
--- a/user.js
+++ b/user.js
@@ -44,7 +44,7 @@
   0100: STARTUP
   0200: GEOLOCATION / LANGUAGE / LOCALE
   0300: QUIET FOX
-  0400: BLOCKLISTS / SAFE BROWSING
+  0400: SAFE BROWSING
   0500: SYSTEM ADD-ONS / EXPERIMENTS
   0600: BLOCK IMPLICIT OUTBOUND
   0700: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc
@@ -64,6 +64,8 @@
   2800: SHUTDOWN
   4000: FPI (FIRST PARTY ISOLATION)
   4500: RFP (RESIST FINGERPRINTING)
+  5000: OPTIONAL OPSEC
+  6000: DON'T TOUCH
   7000: DON'T BOTHER
   8000: DON'T BOTHER: NON-RFP
   9000: PERSONAL
@@ -598,7 +600,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
  * [4] https://www.ssllabs.com/ssl-pulse/ ***/
 user_pref("security.ssl.require_safe_negotiation", true);
-/* 1203: enforce TLS 1.0 and 1.1 downgrades as session only ***/
+/* 1203: reset TLS 1.0 and 1.1 downgrades i.e. session only ***/
 user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
 /* 1206: disable TLS1.3 0-RTT (round-trip time) [FF51+]
  * [1] https://github.com/tlswg/tls13-spec/issues/1001

From e31a6876e6ff45f2ece15c218be6c3256d0de1b7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 23 Aug 2021 04:40:29 +0000
Subject: [PATCH 0874/1147] section 6000

---
 user.js | 57 ++++++++++++++++++++++++++-------------------------------
 1 file changed, 26 insertions(+), 31 deletions(-)

diff --git a/user.js b/user.js
index 0dcf02d..2a7d2af 100644
--- a/user.js
+++ b/user.js
@@ -231,15 +231,7 @@ user_pref("network.captive-portal-service.enabled", false); // [FF52+]
  * [1] https://bugzilla.mozilla.org/1460537 ***/
 user_pref("network.connectivity-service.enabled", false);
 
-/*** [SECTION 0400]: BLOCKLISTS / SAFE BROWSING (SB) ***/
-user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
-/** BLOCKLISTS ***/
-/* 0401: enforce Firefox blocklist
- * [NOTE] It includes updates for "revoked certificates"
- * [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/ ***/
-user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
-
-/** SAFE BROWSING (SB)
+/*** [SECTION 0400]: SAFE BROWSING (SB)
    Safe Browsing has taken many steps to preserve privacy. If required, a full url is never
    sent to Google, only a PART-hash of the prefix, and this is hidden with noise of other real
    PART-hashes. Google also swear it is anonymized and only used to flag malicious sites.
@@ -250,6 +242,7 @@ user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
    [2] https://wiki.mozilla.org/Security/Safe_Browsing
    [3] https://support.mozilla.org/kb/how-does-phishing-and-malware-protection-work
 ***/
+user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
 /* 0410: disable SB (Safe Browsing)
  * [WARNING] Do this at your own risk! These are the master switches
  * [SETTING] Privacy & Security>Security>... Block dangerous and deceptive content ***/
@@ -661,9 +654,6 @@ user_pref("security.remote_settings.crlite_filters.enabled", true);
 user_pref("security.pki.crlite_mode", 2);
 
 /** MIXED CONTENT ***/
-/* 1240: enforce no insecure active content on https pages
- * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21323 ***/
-user_pref("security.mixed_content.block_active_content", true); // [DEFAULT: true]
 /* 1241: disable insecure passive content (such as images) on https pages [SETUP-WEB] ***/
 user_pref("security.mixed_content.block_display_content", true);
 /* 1244: enable HTTPS-Only mode in all windows [FF76+]
@@ -725,13 +715,10 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
    // user_pref("gfx.downloadable_fonts.fallback_delay", -1);
 
 /*** [SECTION 1600]: HEADERS / REFERERS
-   Only **cross domain** referers need controlling: leave 1601, 1602, 1605 and 1606 alone
-   Expect some breakage: Use an extension if you need precise control
-   ---
+   Expect some breakage e.g. banks: use an extension if you need precise control
                   full URI: https://example.com:8888/foo/bar.html?id=1234
      scheme+host+port+path: https://example.com:8888/foo/bar.html
           scheme+host+port: https://example.com:8888
-   ---
    [1] https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
 ***/
 user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
@@ -741,17 +728,13 @@ user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
 /* 1602: ALL: control the amount of information to send
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
    // user_pref("network.http.referer.trimmingPolicy", 0);
-/* 1603: CROSS ORIGIN: control when to send a referer
+/* 1603: control when to send a cross origin referer
  * 0=always (default), 1=only if base domains match, 2=only if hosts match
  * [SETUP-WEB] Known to cause issues with older modems/routers and some sites e.g vimeo, icloud, instagram ***/
 user_pref("network.http.referer.XOriginPolicy", 2);
-/* 1604: CROSS ORIGIN: control the amount of information to send [FF52+]
+/* 1604: control the amount of cross origin information to send [FF52+]
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
-/* 1605: ALL: enforce no spoofing of referer
- * Spoofing effectively disables the anti-CSRF (Cross-Site Request Forgery)
- * protections that some sites may rely on ***/
-user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false]
 /* 1606: ALL: set the default Referrer Policy [FF59+]
  * 0=no-referer, 1=same-origin, 2=strict-origin-when-cross-origin, 3=no-referrer-when-downgrade
  * [NOTE] This is only a default, it can be overridden by a site-controlled Referrer Policy
@@ -1059,15 +1042,6 @@ user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
    // user_pref("extensions.webextensions.restrictedDomains", "");
 
-/** SECURITY ***/
-/* 2680: enforce CSP (Content Security Policy)
- * [NOTE] CSP is a very important and widespread security feature. Don't disable it!
- * [1] https://developer.mozilla.org/docs/Web/HTTP/CSP ***/
-user_pref("security.csp.enable", true); // [DEFAULT: true]
-/* 2684: enforce a security delay on some confirmation dialogs such as install, open/save
- * [1] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
-user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
-
 /*** [SECTION 2700]: PERSISTENT STORAGE
    Data SET by websites including
           cookies : profile\cookies.sqlite
@@ -1327,6 +1301,27 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
 
+/*** [SECTION 5000]: OPTIONAL OPSEC ***/
+user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow");
+
+/*** [SECTION 6000]: DON'T TOUCH ***/
+user_pref("_user.js.parrot", "6000 syntax error: the parrot's 'istory!");
+/* 6001: enforce Firefox blocklist
+ * [WHY] It includes updates for "revoked certificates"
+ * [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/ ***/
+user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
+/* 6002: enforce no referer spoofing
+ * [WHY] Spoofing can affect CSRF (Cross-Site Request Forgery) protections ***/
+user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false]
+/* 6003: enforce CSP (Content Security Policy)
+ * [1] https://developer.mozilla.org/docs/Web/HTTP/CSP ***/
+user_pref("security.csp.enable", true); // [DEFAULT: true]
+/* 6004: enforce a security delay on some confirmation dialogs such as install, open/save
+ * [1] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
+user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
+/* 6005: enforce no insecure active content on https pages ***/
+user_pref("security.mixed_content.block_active_content", true); // [DEFAULT: true]
+
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");
 /* 7001: disable APIs

From 05b7d61735c85a1b02e61ff4f4bc48a60a637570 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 23 Aug 2021 04:54:49 +0000
Subject: [PATCH 0875/1147] 7000s: non cross origin referers

---
 user.js | 10 ++++------
 1 file changed, 4 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 2a7d2af..1c4bf51 100644
--- a/user.js
+++ b/user.js
@@ -722,12 +722,6 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
    [1] https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
 ***/
 user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
-/* 1601: ALL: control when images/links send a referer
- * 0=never, 1=send only when links are clicked, 2=for links and images (default) ***/
-   // user_pref("network.http.sendRefererHeader", 2);
-/* 1602: ALL: control the amount of information to send
- * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
-   // user_pref("network.http.referer.trimmingPolicy", 0);
 /* 1603: control when to send a cross origin referer
  * 0=always (default), 1=only if base domains match, 2=only if hosts match
  * [SETUP-WEB] Known to cause issues with older modems/routers and some sites e.g vimeo, icloud, instagram ***/
@@ -1368,6 +1362,10 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] Firefox doesn't support hidden services. Use Tor Browser ***/
    // user_pref("dom.securecontext.whitelist_onions", true); // 1382359
    // user_pref("network.http.referer.hideOnionSource", true); // 1305144
+/* 7007: referers
+ * [WHY] Only cross origin referers (1600s) need control ***/
+   // user_pref("network.http.sendRefererHeader", 2);
+   // user_pref("network.http.referer.trimmingPolicy", 0);
 
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good

From 9f08c7c0f4b79bbd8b37b5ad3321760d44866265 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 23 Aug 2021 06:04:19 +0000
Subject: [PATCH 0876/1147] 7000s: referer policy #1235

and re-number 1600s
---
 user.js | 22 +++++++++-------------
 1 file changed, 9 insertions(+), 13 deletions(-)

diff --git a/user.js b/user.js
index 1c4bf51..be73125 100644
--- a/user.js
+++ b/user.js
@@ -18,7 +18,7 @@
        * Some site breakage and unintended consequences will happen. Everyone's experience will differ
          e.g. some user data is erased on close (section 2800), change this to suit your needs
        * While not 100% definitive, search for "[SETUP" tags
-         e.g. third party images/videos not loading on some sites? check 1603
+         e.g. third party images/videos not loading on some sites? check 1601
        * Take the wiki link in step 2 and read the Troubleshooting entry
   5. Some tag info
        [SETUP-SECURITY] it's one item, read it
@@ -722,23 +722,14 @@ user_pref("gfx.font_rendering.graphite.enabled", false);
    [1] https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
 ***/
 user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
-/* 1603: control when to send a cross origin referer
+/* 1601: control when to send a cross origin referer
  * 0=always (default), 1=only if base domains match, 2=only if hosts match
  * [SETUP-WEB] Known to cause issues with older modems/routers and some sites e.g vimeo, icloud, instagram ***/
 user_pref("network.http.referer.XOriginPolicy", 2);
-/* 1604: control the amount of cross origin information to send [FF52+]
+/* 1602: control the amount of cross origin information to send [FF52+]
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
-/* 1606: ALL: set the default Referrer Policy [FF59+]
- * 0=no-referer, 1=same-origin, 2=strict-origin-when-cross-origin, 3=no-referrer-when-downgrade
- * [NOTE] This is only a default, it can be overridden by a site-controlled Referrer Policy
- * [1] https://www.w3.org/TR/referrer-policy/
- * [2] https://developer.mozilla.org/docs/Web/HTTP/Headers/Referrer-Policy
- * [3] https://blog.mozilla.org/security/2018/01/31/preventing-data-leaks-by-stripping-path-information-in-http-referrers/
- * [4] https://blog.mozilla.org/security/2021/03/22/firefox-87-trims-http-referrers-by-default-to-protect-user-privacy/ ***/
-   // user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2 FF87+]
-   // user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
-/* 1610: ALL: enable the DNT (Do Not Track) HTTP header
+/* 1603: enable the DNT (Do Not Track) HTTP header
  * [NOTE] DNT is enforced with Enhanced Tracking Protection regardless of this pref
  * [SETTING] Privacy & Security>Enhanced Tracking Protection>Send websites a "Do Not Track" signal... ***/
 user_pref("privacy.donottrackheader.enabled", true);
@@ -1366,6 +1357,11 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] Only cross origin referers (1600s) need control ***/
    // user_pref("network.http.sendRefererHeader", 2);
    // user_pref("network.http.referer.trimmingPolicy", 0);
+/* 7008: set the default Referrer Policy [FF59+]
+ * 0=no-referer, 1=same-origin, 2=strict-origin-when-cross-origin, 3=no-referrer-when-downgrade
+ * [WHY] Defaults are fine. They can be overridden by a site-controlled Referrer Policy ***/
+   // user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2 FF87+]
+   // user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
 
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good

From 3697bd8d3a3a011ecfc82e2b345dd7d6bf1880fa Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 23 Aug 2021 06:26:45 +0000
Subject: [PATCH 0877/1147] 1603 -> inactive

Yes it's pretty much useless. Yes it's fingerprintable, and what that entropy is, who knows. Since it's sent regardless with ETP, which we enable in all windows, then who cares. And if you don't use ETP in all windows, then I don't care either - just saying
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index be73125..7bbfc9a 100644
--- a/user.js
+++ b/user.js
@@ -730,9 +730,9 @@ user_pref("network.http.referer.XOriginPolicy", 2);
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
 /* 1603: enable the DNT (Do Not Track) HTTP header
- * [NOTE] DNT is enforced with Enhanced Tracking Protection regardless of this pref
+ * [NOTE] DNT is enforced with Enhanced Tracking Protection (2710)
  * [SETTING] Privacy & Security>Enhanced Tracking Protection>Send websites a "Do Not Track" signal... ***/
-user_pref("privacy.donottrackheader.enabled", true);
+   // user_pref("privacy.donottrackheader.enabled", true);
 
 /*** [SECTION 1700]: CONTAINERS
    If you want to really leverage containers, we recommend Temporary Containers [2].

From 613e55ae8c28337eb0183c6887cc3f3bd1172d3a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 23 Aug 2021 09:42:21 +0000
Subject: [PATCH 0878/1147] 7000s: add MOAR; renumber 0700s, #1235

---
 user.js | 39 ++++++++++++++-------------------------
 1 file changed, 14 insertions(+), 25 deletions(-)

diff --git a/user.js b/user.js
index 7bbfc9a..a823c21 100644
--- a/user.js
+++ b/user.js
@@ -343,38 +343,16 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
  * [TEST] https://ipleak.org/
  * [1] https://www.internetsociety.org/tag/ipv6-security/ (Myths 2,4,5,6) ***/
 user_pref("network.dns.disableIPv6", true);
-/* 0702: disable HTTP2
- * HTTP2 raises concerns with "multiplexing" and "server push", does nothing to
- * enhance privacy, and opens up a number of server-side fingerprinting opportunities
- * [WARNING] Don't disable HTTP2. Don't be that one person using HTTP1.1 on HTTP2 sites
- * [STATS] ~46% of sites (July 2021) [5]
- * [1] https://http2.github.io/faq/
- * [2] https://blog.scottlogic.com/2014/11/07/http-2-a-quick-look.html
- * [3] https://datatracker.ietf.org/doc/html/rfc7540#section-10.8
- * [4] https://queue.acm.org/detail.cfm?id=2716278
- * [5] https://w3techs.com/technologies/details/ce-http2/all/all ***/
-   // user_pref("network.http.spdy.enabled", false);
-   // user_pref("network.http.spdy.enabled.deps", false);
-   // user_pref("network.http.spdy.enabled.http2", false);
-   // user_pref("network.http.spdy.websockets", false); // [FF65+]
-/* 0703: disable HTTP Alternative Services [FF37+]
- * [SETUP-PERF] Relax this if you have FPI enabled (4001) and you understand the
- * consequences. FPI isolates these, but it was designed with the Tor protocol in mind,
- * and the Tor Browser has extra protection, including enhanced sanitizing per Identity.
- * [1] https://tools.ietf.org/html/rfc7838#section-9
- * [2] https://www.mnot.net/blog/2016/03/09/alt-svc ***/
-user_pref("network.http.altsvc.enabled", false);
-user_pref("network.http.altsvc.oe", false);
-/* 0704: set the proxy server to do any DNS lookups when using SOCKS
+/* 0702: set the proxy server to do any DNS lookups when using SOCKS
  * e.g. in Tor, this stops your local DNS server from knowing your Tor destination
  * as a remote Tor node will handle the DNS request
  * [1] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
 user_pref("network.proxy.socks_remote_dns", true);
-/* 0709: disable using UNC (Uniform Naming Convention) paths [FF61+]
+/* 0703: disable using UNC (Uniform Naming Convention) paths [FF61+]
  * [SETUP-CHROME] Can break extensions for profiles on network shares
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/26424 ***/
 user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
-/* 0710: disable GIO as a potential proxy bypass vector
+/* 0704: disable GIO as a potential proxy bypass vector
  * Gvfs/GIO has a set of supported protocols like obex, network, archive, computer, dav, cdda,
  * gphoto2, trash, etc. By default only smb and sftp protocols are accepted so far (as of FF64)
  * [1] https://bugzilla.mozilla.org/1433507
@@ -1362,6 +1340,17 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] Defaults are fine. They can be overridden by a site-controlled Referrer Policy ***/
    // user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2 FF87+]
    // user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
+/* 7009: disable HTTP2
+ * [WHY] Passive fingerprinting. ~50% of sites use HTTP2 [1]
+ * [1] https://w3techs.com/technologies/details/ce-http2/all/all ***/
+   // user_pref("network.http.spdy.enabled", false);
+   // user_pref("network.http.spdy.enabled.deps", false);
+   // user_pref("network.http.spdy.enabled.http2", false);
+   // user_pref("network.http.spdy.websockets", false); // [FF65+]
+/* 7010: disable HTTP Alternative Services [FF37+]
+ * [WHY] Already isolated by network partitioning (FF85+) and FPI ***/
+   // user_pref("network.http.altsvc.enabled", false);
+   // user_pref("network.http.altsvc.oe", false);
 
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good

From b177c73f0d185954a480e5632a4a1c242b307dab Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 23 Aug 2021 09:47:34 +0000
Subject: [PATCH 0879/1147] typo

technically it's "or" - FPI overrides network partitioning
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index a823c21..ebba09a 100644
--- a/user.js
+++ b/user.js
@@ -1348,7 +1348,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("network.http.spdy.enabled.http2", false);
    // user_pref("network.http.spdy.websockets", false); // [FF65+]
 /* 7010: disable HTTP Alternative Services [FF37+]
- * [WHY] Already isolated by network partitioning (FF85+) and FPI ***/
+ * [WHY] Already isolated by network partitioning (FF85+) or FPI ***/
    // user_pref("network.http.altsvc.enabled", false);
    // user_pref("network.http.altsvc.oe", false);
 

From 269cf965bd51022ca69823f8f66a8e402280d856 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 23 Aug 2021 10:03:13 +0000
Subject: [PATCH 0880/1147] renumber 1700s

---
 user.js | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index ebba09a..d944193 100644
--- a/user.js
+++ b/user.js
@@ -713,19 +713,18 @@ user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
    // user_pref("privacy.donottrackheader.enabled", true);
 
 /*** [SECTION 1700]: CONTAINERS
-   If you want to really leverage containers, we recommend Temporary Containers [2].
-   Read the article by the extension author [3], and check out the github wiki/repo [4].
+   Check out Temporary Containers [2], read the article [3], and visit the wiki/repo [4]
    [1] https://wiki.mozilla.org/Security/Contextual_Identity_Project/Containers
    [2] https://addons.mozilla.org/firefox/addon/temporary-containers/
    [3] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
    [4] https://github.com/stoically/temporary-containers/wiki
 ***/
 user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
-/* 1702: enable Container Tabs and it's UI setting [FF50+]
+/* 1701: enable Container Tabs and it's UI setting [FF50+]
  * [SETTING] General>Tabs>Enable Container Tabs ***/
 user_pref("privacy.userContext.enabled", true);
 user_pref("privacy.userContext.ui.enabled", true);
-/* 1703: set behaviour on "+ Tab" button to display container menu on left click [FF74+]
+/* 1702: set behaviour on "+ Tab" button to display container menu on left click [FF74+]
  * [NOTE] The menu is always shown on long press and right click
  * [SETTING] General>Tabs>Enable Container Tabs>Settings>Select a container for each new tab ***/
    // user_pref("privacy.userContext.newTabContainerOnLeftClick.enabled", true);

From 51748ea25a33295fe7cd6d2f4d8867bf9fa176f3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 24 Aug 2021 03:09:33 +0000
Subject: [PATCH 0881/1147] leverage cve keyword

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index d944193..daf5555 100644
--- a/user.js
+++ b/user.js
@@ -677,7 +677,7 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 /* 1402: disable graphite
  * Graphite has had many critical security issues in the past [1]
- * [1] https://www.mozilla.org/security/advisories/mfsa2017-15/#CVE-2017-7778
+ * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+graphite
  * [2] https://en.wikipedia.org/wiki/Graphite_(SIL) ***/
 user_pref("gfx.font_rendering.graphite.enabled", false);
 /* 1403: limit font visibility (Windows, Mac, some Linux) [FF79+]
@@ -852,7 +852,7 @@ user_pref("javascript.options.asmjs", false);
  * [NOTE] In FF75+, when **both** Ion and JIT are disabled, **and** the new
  * hidden pref is enabled, then Ion can still be used by extensions (1599226)
  * [WARNING] Disabling Ion/JIT can cause some site issues and performance loss
- * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Firefox+JIT ***/
+ * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+jit ***/
    // user_pref("javascript.options.ion", false);
    // user_pref("javascript.options.baselinejit", false);
    // user_pref("javascript.options.jit_trustedprincipals", true); // [FF75+] [HIDDEN PREF]

From 69132b588f7975fcc40bdcb95f2769bc04212d95 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 24 Aug 2021 05:43:38 +0000
Subject: [PATCH 0882/1147] 7000s: mathml, svg, #1235

---
 user.js | 18 +++++++++---------
 1 file changed, 9 insertions(+), 9 deletions(-)

diff --git a/user.js b/user.js
index daf5555..7c92f58 100644
--- a/user.js
+++ b/user.js
@@ -387,7 +387,7 @@ user_pref("keyword.enabled", false);
 user_pref("browser.fixup.alternate.enabled", false);
 /* 0803: display all parts of the url in the location bar ***/
 user_pref("browser.urlbar.trimURLs", false);
-/* 0805: disable coloring of visited links - CSS history leak
+/* 0805: disable coloring of visited links
  * [SETUP-HARDEN] Bulk rapid history sniffing was mitigated in 2010 [1][2]. Slower and more expensive
  * redraw timing attacks were largely mitigated in FF77+ [3]. Using RFP (4501) further hampers timing
  * attacks. Don't forget clearing history on close (2803). However, social engineering [2#limits][4][5]
@@ -917,14 +917,6 @@ user_pref("devtools.chrome.enabled", false);
 /* 2608: reset remote debugging to disabled
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16222 ***/
 user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
-/* 2609: disable MathML (Mathematical Markup Language) [FF51+] [SETUP-HARDEN]
- * [TEST] https://arkenfox.github.io/TZP/tzp.html#misc
- * [1] https://bugzilla.mozilla.org/1173199 ***/
-   // user_pref("mathml.disabled", true);
-/* 2610: disable in-content SVG (Scalable Vector Graphics) [FF53+]
- * [WARNING] Expect breakage including youtube player controls
- * [1] https://bugzilla.mozilla.org/1216893 ***/
-   // user_pref("svg.disabled", true);
 /* 2611: disable middle mouse click opening links from clipboard
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/10089 ***/
 user_pref("middlemouse.contentLoadURL", false);
@@ -1350,6 +1342,14 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] Already isolated by network partitioning (FF85+) or FPI ***/
    // user_pref("network.http.altsvc.enabled", false);
    // user_pref("network.http.altsvc.oe", false);
+/* 7011: disable MathML (Mathematical Markup Language) [FF51+]
+ * [WHY] Fingerprintable, breakage, threat model
+ * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=mathml ***/
+   // user_pref("mathml.disabled", true); // 1173199
+/* 7012: disable in-content SVG (Scalable Vector Graphics) [FF53+]
+ * [WHY] Fingerprintable, breakage, threat model
+ * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+svg ***/
+   // user_pref("svg.disabled", true); // 1216893
 
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good

From 35ccaff58e5aae76299a6ce41a81cdc3fb871099 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 24 Aug 2021 08:52:12 +0000
Subject: [PATCH 0883/1147] calrify password prompt, #1241

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 7c92f58..9b7c775 100644
--- a/user.js
+++ b/user.js
@@ -457,10 +457,10 @@ user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
  * There are no preferences for this. It is all handled internally
  * [SETTING] Privacy & Security>Logins and Passwords>Use a Primary Password
  * [1] https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas ***/
-/* 0903: set how often Firefox should ask for the primary password
+/* 0903: set when Firefox should prompt for the primary password
  * 0=the first time (default), 1=every time it's needed, 2=every n minutes (0904) ***/
 user_pref("security.ask_for_password", 2);
-/* 0904: set how often in minutes Firefox should ask for the primary password (0903) ***/
+/* 0904: set how long in minutes Firefox should remember the primary password (0903) ***/
 user_pref("security.password_lifetime", 5); // [DEFAULT: 30]
 /* 0905: disable auto-filling username & password form fields
  * can leak in cross-site forms *and* be spoofed

From 778421cad40d1436ca0fa2833df76bc8fd45473d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 24 Aug 2021 08:59:11 +0000
Subject: [PATCH 0884/1147] #1241

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 9b7c775..11ae8cc 100644
--- a/user.js
+++ b/user.js
@@ -458,7 +458,7 @@ user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
  * [SETTING] Privacy & Security>Logins and Passwords>Use a Primary Password
  * [1] https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas ***/
 /* 0903: set when Firefox should prompt for the primary password
- * 0=the first time (default), 1=every time it's needed, 2=every n minutes (0904) ***/
+ * 0=once per session (default), 1=every time it's needed, 2=every n minutes (0904) ***/
 user_pref("security.ask_for_password", 2);
 /* 0904: set how long in minutes Firefox should remember the primary password (0903) ***/
 user_pref("security.password_lifetime", 5); // [DEFAULT: 30]

From 7144f8b7f86a72462636fc1d86bd3d0993a642c8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 24 Aug 2021 22:51:48 +0000
Subject: [PATCH 0885/1147] cleanup continued, #1239

More minor tweaks to come. This isn't final
- 0102: ambiguous that the clearing was related to PB mode
- 0900s:
   - get rid of 0901, it has no pref, stick link in header
   - 0905: values on multi-lines use spaces = more readable
- 1000s:
   - rename as disk avoidance and remove sub-section headers
   - remove the outdated section header
- 4001: it will never be perfected, it's doing it's job
- 5500s: optional hardening
   - legit security measures, but commonality in caveats, so I made them a separate section
   - this flips graphite, asm.js and wasm from active to inactive: these are overkill: exhibit A: hundreds of millions of Firefox users
   - e.g. graphite and wasm are enabled on Tor Browser
   - new CVE keyword links
- 7000s: don't bother - two more items added
- 5000s: optional opsec and cleanout 0800s header
- re-number
   - 0900s, 1000s, 1400s, 2400s

PS: I need a new parrot: "9000 syntax error: I ran out of parrots"
---
 user.js | 360 ++++++++++++++++++++++++++------------------------------
 1 file changed, 166 insertions(+), 194 deletions(-)

diff --git a/user.js b/user.js
index 11ae8cc..dd9fd25 100644
--- a/user.js
+++ b/user.js
@@ -50,14 +50,14 @@
   0700: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc
   0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
   0900: PASSWORDS
-  1000: CACHE / SESSION (RE)STORE / FAVICONS
+  1000: DISK AVOIDANCE
   1200: HTTPS (SSL/TLS / OCSP / CERTS / HPKP)
   1400: FONTS
   1600: HEADERS / REFERERS
   1700: CONTAINERS
   2000: PLUGINS / MEDIA / WEBRTC
   2300: WEB WORKERS
-  2400: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT
+  2400: DOM (DOCUMENT OBJECT MODEL)
   2500: FINGERPRINTING
   2600: MISCELLANEOUS
   2700: PERSISTENT STORAGE
@@ -65,6 +65,7 @@
   4000: FPI (FIRST PARTY ISOLATION)
   4500: RFP (RESIST FINGERPRINTING)
   5000: OPTIONAL OPSEC
+  5500: OPTIONAL HARDENING
   6000: DON'T TOUCH
   7000: DON'T BOTHER
   8000: DON'T BOTHER: NON-RFP
@@ -90,7 +91,7 @@ user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
 user_pref("browser.shell.checkDefaultBrowser", false);
 /* 0102: set startup page [SETUP-CHROME]
  * 0=blank, 1=home, 2=last visited page, 3=resume previous session
- * [NOTE] Session Restore is not used in PB mode (0110) and is cleared with history (2803, 2804)
+ * [NOTE] Session Restore is cleared with history (2803, 2804), and not used in Private Browsing mode
  * [SETTING] General>Startup>Restore previous session ***/
 user_pref("browser.startup.page", 0);
 /* 0103: set HOME+NEWWINDOW page
@@ -116,17 +117,6 @@ user_pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); //
 /* 0106: clear default topsites
  * [NOTE] This does not block you from adding your own ***/
 user_pref("browser.newtabpage.activity-stream.default.sites", "");
-/* 0110: start Firefox in PB (Private Browsing) mode
- * [NOTE] In this mode all windows are "private windows" and the PB mode icon is not displayed
- * [WARNING] The P in PB mode can be misleading: it means no "persistent" disk state such as history,
- * caches, searches, cookies, localStorage, IndexedDB etc (which you can achieve in normal mode).
- * In fact, PB mode limits or removes the ability to control some of these, and you need to quit
- * Firefox to clear them. PB is best used as a one off window (Menu>New Private Window) to provide
- * a temporary self-contained new session. Close all Private Windows to clear the PB mode session.
- * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
- * [1] https://wiki.mozilla.org/Private_Browsing
- * [2] https://support.mozilla.org/kb/common-myths-about-private-browsing ***/
-   // user_pref("browser.privatebrowsing.autostart", true);
 
 /*** [SECTION 0200]: GEOLOCATION / LANGUAGE / LOCALE ***/
 user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");
@@ -232,11 +222,11 @@ user_pref("network.captive-portal-service.enabled", false); // [FF52+]
 user_pref("network.connectivity-service.enabled", false);
 
 /*** [SECTION 0400]: SAFE BROWSING (SB)
-   Safe Browsing has taken many steps to preserve privacy. If required, a full url is never
-   sent to Google, only a PART-hash of the prefix, and this is hidden with noise of other real
-   PART-hashes. Google also swear it is anonymized and only used to flag malicious sites.
-   Firefox also takes measures such as striping out identifying parameters and since SBv4 (FF57+)
+   SB has taken many steps to preserve privacy. If required, a full url is never sent
+   to Google, only a part-hash of the prefix, hidden with noise of other real part-hashes.
+   Firefox takes measures such as striping out identifying parameters and since SBv4 (FF57+)
    doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
+   FWIW, Google also swear it is anonymized and only used to flag malicious sites.
 
    [1] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
    [2] https://wiki.mozilla.org/Security/Safe_Browsing
@@ -361,13 +351,7 @@ user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
  * [4] https://en.wikipedia.org/wiki/GIO_(software) ***/
 user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
 
-/*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
-   Change 0850 and above to suit for privacy vs convenience and functionality.
-   Consider your environment (no unwanted eyeballs), your device (restricted access),
-   your device's unattended state (locked, encrypted, forensic hardened). Likewise,
-   you may want to check the items cleared on shutdown in section 2800.
-   [1] https://xkcd.com/538/
-***/
+/*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS ***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
 /* 0801: disable location bar using search
  * Don't leak URL typos to a search engine, give an error message instead
@@ -412,22 +396,10 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
  * [NOTE] For FF78 value 1 and 2 are the same and always resolve but that will change in future versions
  * [1] https://bugzilla.mozilla.org/1642623 ***/
 user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
-/* 0850a: disable location bar suggestion types
- * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest ***/
-   // user_pref("browser.urlbar.suggest.history", false);
-   // user_pref("browser.urlbar.suggest.bookmark", false);
-   // user_pref("browser.urlbar.suggest.openpage", false);
-   // user_pref("browser.urlbar.suggest.topsites", false); // [FF78+]
 /* 0850b: disable tab-to-search [FF85+]
  * Alternatively, you can exclude on a per-engine basis by unchecking them in Options>Search
  * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest>Search engines ***/
    // user_pref("browser.urlbar.suggest.engines", false);
-/* 0850c: disable location bar dropdown
- * This value controls the total number of entries to appear in the location bar dropdown ***/
-   // user_pref("browser.urlbar.maxRichResults", 0);
-/* 0850d: disable location bar autofill
- * [1] https://support.mozilla.org/kb/address-bar-autocomplete-firefox#w_url-autocomplete ***/
-   // user_pref("browser.urlbar.autoFill", false);
 /* 0860: disable search and form history
  * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
  * [NOTE] We also clear formdata on exit (2803)
@@ -435,120 +407,66 @@ user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
  * [2] https://bugzilla.mozilla.org/381681 ***/
 user_pref("browser.formfill.enable", false);
-/* 0862: disable browsing and download history
- * [NOTE] We also clear history and downloads on exit (2803)
- * [SETTING] Privacy & Security>History>Custom Settings>Remember browsing and download history ***/
-   // user_pref("places.history.enabled", false);
-/* 0870: disable Windows jumplist [WINDOWS] ***/
-user_pref("browser.taskbar.lists.enabled", false);
-user_pref("browser.taskbar.lists.frequent.enabled", false);
-user_pref("browser.taskbar.lists.recent.enabled", false);
-user_pref("browser.taskbar.lists.tasks.enabled", false);
-/* 0871: disable Windows taskbar preview [WINDOWS] ***/
-   // user_pref("browser.taskbar.previews.enable", false); // [DEFAULT: false]
 
-/*** [SECTION 0900]: PASSWORDS ***/
+/*** [SECTION 0900]: PASSWORDS
+   [1] https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas
+***/
 user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
-/* 0901: disable saving passwords
- * [NOTE] This does not clear any passwords already saved
- * [SETTING] Privacy & Security>Logins and Passwords>Ask to save logins and passwords for websites ***/
-   // user_pref("signon.rememberSignons", false);
-/* 0902: use a primary password
- * There are no preferences for this. It is all handled internally
- * [SETTING] Privacy & Security>Logins and Passwords>Use a Primary Password
- * [1] https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas ***/
-/* 0903: set when Firefox should prompt for the primary password
- * 0=once per session (default), 1=every time it's needed, 2=every n minutes (0904) ***/
+/* 0901: set when Firefox should prompt for the primary password
+ * 0=once per session (default), 1=every time it's needed, 2=after n minutes (0902) ***/
 user_pref("security.ask_for_password", 2);
-/* 0904: set how long in minutes Firefox should remember the primary password (0903) ***/
+/* 0902: set how long in minutes Firefox should remember the primary password (0901) ***/
 user_pref("security.password_lifetime", 5); // [DEFAULT: 30]
-/* 0905: disable auto-filling username & password form fields
+/* 0903: disable auto-filling username & password form fields
  * can leak in cross-site forms *and* be spoofed
  * [NOTE] Username & password is still available when you enter the field
  * [SETTING] Privacy & Security>Logins and Passwords>Autofill logins and passwords
  * [1] https://freedom-to-tinker.com/2017/12/27/no-boundaries-for-user-identities-web-trackers-exploit-browser-login-managers/ ***/
 user_pref("signon.autofillForms", false);
-/* 0909: disable formless login capture for Password Manager [FF51+] ***/
+/* 0904: disable formless login capture for Password Manager [FF51+] ***/
 user_pref("signon.formlessCapture.enabled", false);
-/* 0912: limit (or disable) HTTP authentication credentials dialogs triggered by sub-resources [FF41+]
+/* 0905: limit (or disable) HTTP authentication credentials dialogs triggered by sub-resources [FF41+]
  * hardens against potential credentials phishing
- * 0=don't allow sub-resources to open HTTP authentication credentials dialogs
- * 1=don't allow cross-origin sub-resources to open HTTP authentication credentials dialogs
- * 2=allow sub-resources to open HTTP authentication credentials dialogs (default) ***/
+ * 0 = don't allow sub-resources to open HTTP authentication credentials dialogs
+ * 1 = don't allow cross-origin sub-resources to open HTTP authentication credentials dialogs
+ * 2 = allow sub-resources to open HTTP authentication credentials dialogs (default) ***/
 user_pref("network.auth.subresource-http-auth-allow", 1);
-/* 0913: disable automatic authentication on Microsoft sites [FF91+] [WINDOWS 10+]
+/* 0906: disable automatic authentication on Microsoft sites [FF91+] [WINDOWS 10+]
  * [SETTING] Privacy & Security>Logins and Passwords>Allow Windows single sign-on for...
  * [1] https://support.mozilla.org/kb/windows-sso ***/
 user_pref("network.http.windows-sso.enabled", false);
 
-/*** [SECTION 1000]: CACHE / SESSION (RE)STORE / FAVICONS
-   Cache tracking/fingerprinting techniques [1][2][3] require a cache. Disabling disk (1001)
-   *and* memory (1003) caches is one solution; but that's extreme and fingerprintable. A hardened
-   Temporary Containers configuration can effectively do the same thing, by isolating every tab [4]
-
-   We consider avoiding disk cache (1001) so cache is session/memory only (like Private Browsing
-   mode), and isolating cache to first party (4001) is sufficient and a good balance between
-   risk and performance. ETAGs can also be neutralized by modifying response headers [5], and
-   you can clear the cache manually or on a regular basis with an extension
-
-   [1] https://en.wikipedia.org/wiki/HTTP_ETag#Tracking_using_ETags
-   [2] https://robertheaton.com/2014/01/20/cookieless-user-tracking-for-douchebags/
-   [3] https://www.grepular.com/Preventing_Web_Tracking_via_the_Browser_Cache
-   [4] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
-   [5] https://github.com/arkenfox/user.js/wiki/4.2.4-Header-Editor
+/*** [SECTION 1000]: DISK AVOIDANCE
+   [NOTE] Cache is isolated with network partitioning (FF85+) or when using FPI
 ***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
-/** CACHE ***/
 /* 1001: disable disk cache
- * [SETUP-PERF] If you think disk cache may help (heavy tab user, high-res video),
- * or you use a hardened Temporary Containers, then feel free to override this
+ * [SETUP-PERF] If you think disk cache helps, then feel free to override this
  * [NOTE] We also clear cache on exit (2803) ***/
 user_pref("browser.cache.disk.enable", false);
-/* 1003: disable memory cache
- * capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kibibytes ***/
-   // user_pref("browser.cache.memory.enable", false);
-   // user_pref("browser.cache.memory.capacity", 0);
-/* 1006: disable permissions manager from writing to disk [RESTART]
- * [NOTE] This means any permission changes are session only
- * [1] https://bugzilla.mozilla.org/967812 ***/
-   // user_pref("permissions.memory_only", true); // [HIDDEN PREF]
-/* 1007: disable media cache from writing to disk in Private Browsing
+/* 1002: disable media cache from writing to disk in Private Browsing
  * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB
  * [SETUP-WEB] ESR78: playback might break on subsequent loading (1650281) ***/
 user_pref("browser.privatebrowsing.forceMediaMemoryCache", true); // [FF75+]
 user_pref("media.memory_cache_max_size", 65536);
-
-/** SESSIONS & SESSION RESTORE ***/
-/* 1020: exclude "Undo Closed Tabs" in Session Restore ***/
-   // user_pref("browser.sessionstore.max_tabs_undo", 0);
-/* 1021: disable storing extra session data [SETUP-CHROME]
+/* 1003: disable storing extra session data [SETUP-CHROME]
  * define on which sites to save extra session data such as form content, cookies and POST data
  * 0=everywhere, 1=unencrypted sites, 2=nowhere ***/
 user_pref("browser.sessionstore.privacy_level", 2);
-/* 1022: disable resuming session from crash ***/
-   // user_pref("browser.sessionstore.resume_from_crash", false);
-/* 1023: set the minimum interval between session save operations
+/* 1004: set the minimum interval between session save operations
  * Increasing this can help on older machines and some websites, as well as reducing writes [1]
  * [SETUP-CHROME] This can affect entries in "Recently Closed Tabs": i.e. the
  * longer the interval the more chance a quick tab open/close won't be captured
  * [1] https://bugzilla.mozilla.org/1304389 ***/
 user_pref("browser.sessionstore.interval", 30000); // [DEFAULT: 15000]
-/* 1024: disable automatic Firefox start and session restore after reboot [FF62+] [WINDOWS]
+/* 1005: disable automatic Firefox start and session restore after reboot [FF62+] [WINDOWS]
  * [1] https://bugzilla.mozilla.org/603903 ***/
 user_pref("toolkit.winRegisterApplicationRestart", false);
-
-/** FAVICONS ***/
-/* 1030: disable favicons in shortcuts
+/* 1006: disable favicons in shortcuts
  * URL shortcuts use a cached randomly named .ico file which is stored in your
  * profile/shortcutCache directory. The .ico remains after the shortcut is deleted
  * If set to false then the shortcuts use a generic Firefox icon ***/
 user_pref("browser.shell.shortcutFavicons", false);
-/* 1031: disable favicons in history and bookmarks
- * Stored as data blobs in favicons.sqlite, these don't reveal anything that your
- * actual history (and bookmarks) already do. Your history is more detailed, so
- * control that instead; e.g. disable history, clear history on close, use PB mode
- * [NOTE] favicons.sqlite is sanitized on Firefox close, not in-session ***/
-   // user_pref("browser.chrome.site_icons", false);
 
 /*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP)
    Your cipher and other settings can be used in server side fingerprinting
@@ -613,11 +531,6 @@ user_pref("security.pki.sha1_enforcement_level", 1);
  * 2=detect Family Safety mode and import the root
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21686 ***/
 user_pref("security.family_safety.mode", 0);
-/* 1222: disable intermediate certificate caching (fingerprinting attack vector) [FF41+] [RESTART]
- * [NOTE] This affects login/cert/key dbs. The effect is all credentials are session-only.
- * Saved logins and passwords are not available. Reset the pref and restart to return them.
- * [1] https://shiftordie.de/blog/2017/02/21/fingerprinting-firefox-users-with-cached-intermediate-ca-certificates-fiprinca/ ***/
-   // user_pref("security.nocertdb", true); // [HIDDEN PREF]
 /* 1223: enable strict pinning
  * PKP (Public Key Pinning) 0=disabled 1=allow user MiTM (such as your antivirus), 2=strict
  * [SETUP-WEB] If you rely on an AV (antivirus) to protect your web browsing
@@ -672,25 +585,14 @@ user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 
 /*** [SECTION 1400]: FONTS ***/
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
-/* 1401: disable rendering of SVG OpenType fonts
- * [1] https://wiki.mozilla.org/SVGOpenTypeFonts - iSECPartnersReport recommends to disable this ***/
+/* 1401: disable rendering of SVG OpenType fonts ***/
 user_pref("gfx.font_rendering.opentype_svg.enabled", false);
-/* 1402: disable graphite
- * Graphite has had many critical security issues in the past [1]
- * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+graphite
- * [2] https://en.wikipedia.org/wiki/Graphite_(SIL) ***/
-user_pref("gfx.font_rendering.graphite.enabled", false);
-/* 1403: limit font visibility (Windows, Mac, some Linux) [FF79+]
+/* 1402: limit font visibility (Windows, Mac, some Linux) [FF79+]
  * [NOTE] In FF80+ RFP ignores the pref and uses value 1
  * Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1], bundled fonts are auto-allowed
  * 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
  * [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc ***/
    // user_pref("layout.css.font-visibility.level", 1);
-/* 1404: disable icon fonts (glyphs) and local fallback rendering
- * [1] https://bugzilla.mozilla.org/789788
- * [2] https://gitlab.torproject.org/legacy/trac/-/issues/8455 ***/
-   // user_pref("gfx.downloadable_fonts.enabled", false); // [FF41+]
-   // user_pref("gfx.downloadable_fonts.fallback_delay", -1);
 
 /*** [SECTION 1600]: HEADERS / REFERERS
    Expect some breakage e.g. banks: use an extension if you need precise control
@@ -813,58 +715,30 @@ user_pref("dom.serviceWorkers.enabled", false);
 user_pref("dom.push.enabled", false);
    // user_pref("dom.push.userAgentID", "");
 
-/*** [SECTION 2400]: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT ***/
+/*** [SECTION 2400]: DOM (DOCUMENT OBJECT MODEL) ***/
 user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");
-/* 2401: disable website control over browser right-click context menu
- * [NOTE] Shift-Right-Click will always bring up the browser right-click context menu ***/
-   // user_pref("dom.event.contextmenu.enabled", false);
-/* 2402: disable website access to clipboard events/content [SETUP-HARDEN]
- * [NOTE] This will break some sites' functionality e.g. Outlook, Twitter, Facebook, Wordpress
- * This applies to onCut/onCopy/onPaste events - i.e. it requires interaction with the website
- * [WARNING] In FF88 or lower, with clipboardevents enabled, if both "middlemouse.paste" and
- * "general.autoScroll" are true (at least one is default false) then the clipboard can leak [1]
- * [1] https://bugzilla.mozilla.org/1528289 ***/
-   // user_pref("dom.event.clipboardevents.enabled", false);
-/* 2403: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
- * this disables document.execCommand("cut"/"copy") to protect your clipboard
- * [1] https://bugzilla.mozilla.org/1170911 ***/
-user_pref("dom.allow_cut_copy", false);
-/* 2404: disable "Confirm you want to leave" dialog on page close
+/* 2401: disable "Confirm you want to leave" dialog on page close
  * Does not prevent JS leaks of the page close event
  * [1] https://developer.mozilla.org/docs/Web/Events/beforeunload ***/
 user_pref("dom.disable_beforeunload", true);
-/* 2405: prevent scripts from moving and resizing open windows ***/
+/* 2402: prevent scripts from moving and resizing open windows ***/
 user_pref("dom.disable_window_move_resize", true);
-/* 2406: block popup windows
+/* 2403: block popup windows
  * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
 user_pref("dom.disable_open_during_load", true);
-/* 2407: limit events that can cause a popup [SETUP-WEB] ***/
+/* 2404: limit events that can cause a popup [SETUP-WEB] ***/
 user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
-/* 2408: enable (limited but sufficient) window.opener protection [FF65+]
+/* 2405: enable (limited but sufficient) window.opener protection [FF65+]
  * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
 user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
-/* 2420: disable asm.js [FF22+] [SETUP-PERF]
- * [1] http://asmjs.org/
- * [2] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=asm.js
- * [3] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
-user_pref("javascript.options.asmjs", false);
-/* 2421: disable Ion and baseline JIT to harden against JS exploits [SETUP-HARDEN]
- * [NOTE] In FF75+, when **both** Ion and JIT are disabled, **and** the new
- * hidden pref is enabled, then Ion can still be used by extensions (1599226)
- * [WARNING] Disabling Ion/JIT can cause some site issues and performance loss
- * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+jit ***/
-   // user_pref("javascript.options.ion", false);
-   // user_pref("javascript.options.baselinejit", false);
-   // user_pref("javascript.options.jit_trustedprincipals", true); // [FF75+] [HIDDEN PREF]
-/* 2422: disable WebAssembly [FF52+]
- * Vulnerabilities have increasingly been found, including those known and fixed
- * in native programs years ago [2]. WASM has powerful low-level access, making
- * certain attacks (brute-force) and vulnerabilities more possible
- * [STATS] ~0.2% of websites, about half of which are for crytopmining / malvertising [2][3]
- * [1] https://developer.mozilla.org/docs/WebAssembly
- * [2] https://spectrum.ieee.org/tech-talk/telecom/security/more-worries-over-the-security-of-web-assembly
- * [3] https://www.zdnet.com/article/half-of-the-websites-using-webassembly-use-it-for-malicious-purposes ***/
-user_pref("javascript.options.wasm", false);
+/* 2406: disable website access to clipboard events/content
+ * Requires user interaction. Applies to onCut/onCopy/onPaste events
+ * [SETUP-HARDEN] Will break some sites' functionality e.g. Outlook, Twitter, Facebook, Wordpress ***/
+   // user_pref("dom.event.clipboardevents.enabled", false);
+/* 2407: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
+ * this disables document.execCommand("cut"/"copy") to protect your clipboard
+ * [1] https://bugzilla.mozilla.org/1170911 ***/
+user_pref("dom.allow_cut_copy", false);
 
 /*** [SECTION 2500]: FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");
@@ -967,22 +841,12 @@ user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+]
 user_pref("extensions.postDownloadThirdPartyPrompt", false);
 
 /** DOWNLOADS ***/
-/* 2650: discourage downloading to desktop
- * 0=desktop, 1=downloads (default), 2=last used
- * [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
-   // user_pref("browser.download.folderList", 2);
 /* 2651: enable user interaction for security by always asking where to download
  * [SETUP-CHROME] On Android this blocks longtapping and saving images
  * [SETTING] General>Downloads>Always ask you where to save files ***/
 user_pref("browser.download.useDownloadDir", false);
 /* 2652: disable adding downloads to the system's "recent documents" list ***/
 user_pref("browser.download.manager.addToRecentDocs", false);
-/* 2654: disable "open with" in download dialog [FF50+] [SETUP-HARDEN]
- * This is very useful to enable when the browser is sandboxed (e.g. via AppArmor)
- * in such a way that it is forbidden to run external applications.
- * [WARNING] This may interfere with some users' workflow or methods
- * [1] https://bugzilla.mozilla.org/1281959 ***/
-   // user_pref("browser.download.forbid_open_with", true);
 
 /** EXTENSIONS ***/
 /* 2660: lock down allowed extension directories
@@ -1137,7 +1001,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]
- * [SETUP-WEB] May break cross-domain logins and site functionality until perfected
+ * [SETUP-WEB] Will break most cross-domain logins
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1260931,1299996 ***/
 user_pref("privacy.firstparty.isolate", true);
 /* 4002: enforce FPI restriction for window.opener [FF54+]
@@ -1255,8 +1119,115 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
 
-/*** [SECTION 5000]: OPTIONAL OPSEC ***/
+/*** [SECTION 5000]: OPTIONAL OPSEC
+   Disk avoidance, application data isolation, eyeballs...
+***/
 user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow");
+/* 5001: start Firefox in PB (Private Browsing) mode
+ * [NOTE] In this mode all windows are "private windows" and the PB mode icon is not displayed
+ * [NOTE] The P in PB mode can be misleading: it means no "persistent" disk state such as history,
+ * caches, searches, cookies, localStorage, IndexedDB etc (which you can achieve in normal mode).
+ * In fact, PB mode limits or removes the ability to control some of these, and you need to quit
+ * Firefox to clear them. PB is best used as a one off window (Menu>New Private Window) to provide
+ * a temporary self-contained new session. Close all Private Windows to clear the PB mode session.
+ * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
+ * [1] https://wiki.mozilla.org/Private_Browsing
+ * [2] https://support.mozilla.org/kb/common-myths-about-private-browsing ***/
+   // user_pref("browser.privatebrowsing.autostart", true);
+/* 5002: disable memory cache
+ * capacity: -1=determine dynamically (default), 0=none, n=memory capacity in kibibytes ***/
+   // user_pref("browser.cache.memory.enable", false);
+   // user_pref("browser.cache.memory.capacity", 0);
+/* 5003: disable saving passwords
+ * [NOTE] This does not clear any passwords already saved
+ * [SETTING] Privacy & Security>Logins and Passwords>Ask to save logins and passwords for websites ***/
+   // user_pref("signon.rememberSignons", false);
+/* 5004: disable permissions manager from writing to disk [FF41+] [RESTART]
+ * [NOTE] This means any permission changes are session only
+ * [1] https://bugzilla.mozilla.org/967812 ***/
+   // user_pref("permissions.memory_only", true); // [HIDDEN PREF]
+/* 5005: disable intermediate certificate caching [FF41+] [RESTART]
+ * [NOTE] This affects login/cert/key dbs. The effect is all credentials are session-only.
+ * Saved logins and passwords are not available. Reset the pref and restart to return them ***/
+   // user_pref("security.nocertdb", true); // [HIDDEN PREF]
+/* 5006: disable favicons in history and bookmarks
+ * [NOTE] Stored as data blobs in favicons.sqlite, these don't reveal anything that your
+ * actual history (and bookmarks) already do. Your history is more detailed, so
+ * control that instead; e.g. disable history, clear history on close, use PB mode
+ * [NOTE] favicons.sqlite is sanitized on Firefox close ***/
+   // user_pref("browser.chrome.site_icons", false);
+/* 5007: exclude "Undo Closed Tabs" in Session Restore ***/
+   // user_pref("browser.sessionstore.max_tabs_undo", 0);
+/* 5008: disable resuming session from crash ***/
+   // user_pref("browser.sessionstore.resume_from_crash", false);
+/* 5009: disable "open with" in download dialog [FF50+]
+ * Application data isolation [1]
+ * [1] https://bugzilla.mozilla.org/1281959 ***/
+   // user_pref("browser.download.forbid_open_with", true);
+/* 5010: disable location bar suggestion types
+ * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest ***/
+   // user_pref("browser.urlbar.suggest.history", false);
+   // user_pref("browser.urlbar.suggest.bookmark", false);
+   // user_pref("browser.urlbar.suggest.openpage", false);
+   // user_pref("browser.urlbar.suggest.topsites", false); // [FF78+]
+/* 5011: disable location bar dropdown
+ * This value controls the total number of entries to appear in the location bar dropdown ***/
+   // user_pref("browser.urlbar.maxRichResults", 0);
+/* 5012: disable location bar autofill
+ * [1] https://support.mozilla.org/kb/address-bar-autocomplete-firefox#w_url-autocomplete ***/
+   // user_pref("browser.urlbar.autoFill", false);
+/* 5013: disable browsing and download history
+ * [NOTE] We also clear history and downloads on exit (2803)
+ * [SETTING] Privacy & Security>History>Custom Settings>Remember browsing and download history ***/
+   // user_pref("places.history.enabled", false);
+/* 5014: disable Windows jumplist [WINDOWS] ***/
+   // user_pref("browser.taskbar.lists.enabled", false);
+   // user_pref("browser.taskbar.lists.frequent.enabled", false);
+   // user_pref("browser.taskbar.lists.recent.enabled", false);
+   // user_pref("browser.taskbar.lists.tasks.enabled", false);
+/* 5015: disable Windows taskbar preview [WINDOWS] ***/
+   // user_pref("browser.taskbar.previews.enable", false); // [DEFAULT: false]
+/* 5016: discourage downloading to desktop
+ * 0=desktop, 1=downloads (default), 2=last used
+ * [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
+   // user_pref("browser.download.folderList", 2);
+
+/*** [SECTION 5500]: OPTIONAL HARDENING
+   Not recommended. Keep in mind that these can cause breakage, performance
+   issues, are mostly fingerpintable, and the threat model is practically zero
+***/
+user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
+/* 5501: disable MathML (Mathematical Markup Language) [FF51+]
+ * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=mathml ***/
+   // user_pref("mathml.disabled", true); // 1173199
+/* 5502: disable in-content SVG (Scalable Vector Graphics) [FF53+]
+ * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+svg ***/
+   // user_pref("svg.disabled", true); // 1216893
+/* 5503: disable graphite
+ * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+graphite
+ * [2] https://en.wikipedia.org/wiki/Graphite_(SIL) ***/
+   // user_pref("gfx.font_rendering.graphite.enabled", false);
+/* 5504: disable asm.js [FF22+]
+ * [1] http://asmjs.org/
+ * [2] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=asm.js
+ * [3] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
+   // user_pref("javascript.options.asmjs", false);
+/* 5505: disable Ion and baseline JIT to harden against JS exploits
+ * [NOTE] In FF75+, when **both** Ion and JIT are disabled, **and** the new
+ * hidden pref is enabled, then Ion can still be used by extensions (1599226)
+ * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+jit ***/
+   // user_pref("javascript.options.ion", false);
+   // user_pref("javascript.options.baselinejit", false);
+   // user_pref("javascript.options.jit_trustedprincipals", true); // [FF75+] [HIDDEN PREF]
+/* 5506: disable WebAssembly [FF52+]
+ * Vulnerabilities [1] have increasingly been found, including those known and fixed
+ * in native programs years ago [2]. WASM has powerful low-level access, making
+ * certain attacks (brute-force) and vulnerabilities more possible
+ * [STATS] ~0.2% of websites, about half of which are for crytopmining / malvertising [2][3]
+ * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=wasm
+ * [2] https://spectrum.ieee.org/tech-talk/telecom/security/more-worries-over-the-security-of-web-assembly
+ * [3] https://www.zdnet.com/article/half-of-the-websites-using-webassembly-use-it-for-malicious-purposes ***/
+   // user_pref("javascript.options.wasm", false);
 
 /*** [SECTION 6000]: DON'T TOUCH ***/
 user_pref("_user.js.parrot", "6000 syntax error: the parrot's 'istory!");
@@ -1342,14 +1313,15 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] Already isolated by network partitioning (FF85+) or FPI ***/
    // user_pref("network.http.altsvc.enabled", false);
    // user_pref("network.http.altsvc.oe", false);
-/* 7011: disable MathML (Mathematical Markup Language) [FF51+]
- * [WHY] Fingerprintable, breakage, threat model
- * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=mathml ***/
-   // user_pref("mathml.disabled", true); // 1173199
-/* 7012: disable in-content SVG (Scalable Vector Graphics) [FF53+]
- * [WHY] Fingerprintable, breakage, threat model
- * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+svg ***/
-   // user_pref("svg.disabled", true); // 1216893
+/* 7011: disable website control over browser right-click context menu
+ * [WHY] Just use Shift-Right-Click ***/
+   // user_pref("dom.event.contextmenu.enabled", false);
+/* 7012: disable icon fonts (glyphs) and local fallback rendering
+ * [WHY] Breakage, font fallback is equivalency, also RFP
+ * [1] https://bugzilla.mozilla.org/789788
+ * [2] https://gitlab.torproject.org/legacy/trac/-/issues/8455 ***/
+   // user_pref("gfx.downloadable_fonts.enabled", false); // [FF41+]
+   // user_pref("gfx.downloadable_fonts.fallback_delay", -1);
 
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good
@@ -1387,7 +1359,7 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's crossed the Jordan
    Non-project related but useful. If any interest you, add them to your overrides
    To save some overrides, we've made a few active as they seem to be universally used
 ***/
-user_pref("_user.js.parrot", "9000 syntax error: this is an ex-parrot!");
+user_pref("_user.js.parrot", "9000 syntax error: I ran out of parrots");
 /* WELCOME & WHAT'S NEW NOTICES ***/
 user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switch
    // user_pref("startup.homepage_welcome_url", "");
@@ -1468,7 +1440,7 @@ user_pref("browser.download.hide_plugins_without_extensions", false);
 // 0105d: disable Activity Stream recent Highlights in the Library [FF57+]
    // [-] https://bugzilla.mozilla.org/1689405
    // user_pref("browser.library.activity-stream.enabled", false);
-// 4616: disable PointerEvents
+// 8002: disable PointerEvents
    // [1] https://developer.mozilla.org/docs/Web/API/PointerEvent
    // [-] https://bugzilla.mozilla.org/1688105
    // user_pref("dom.w3c_pointer_events.enabled", false);

From 6077d09b9fc1ef613f674074e3cfece3fde85a92 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 25 Aug 2021 14:04:50 +0000
Subject: [PATCH 0886/1147] window.name -> don't touch

Also FPI FF65+ patch is not part of FPI, it is part of 4002 which is a separate pref
---
 user.js | 11 +++++------
 1 file changed, 5 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index dd9fd25..06a76a1 100644
--- a/user.js
+++ b/user.js
@@ -831,11 +831,6 @@ user_pref("network.protocol-handler.external.ms-windows-store", false);
  * for these will show/use their correct 3rd party origin
  * [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion ***/
 user_pref("permissions.delegation.enabled", false);
-/* 2624: enable "window.name" protection [FF82+]
- * If a new page from another domain is loaded into a tab, then window.name is set to an empty string. The original
- * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks
- * [TEST] https://arkenfox.github.io/TZP/tests/windownamea.html ***/
-user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+]
 /* 2625: disable bypassing 3rd party extension install prompts [FF82+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1659530,1681331 ***/
 user_pref("extensions.postDownloadThirdPartyPrompt", false);
@@ -992,7 +987,6 @@ user_pref("privacy.sanitize.timeSpan", 0);
    1344170 - blob: URI (FF55+)
    1300671 - data:, about: URLs (FF55+)
    1473247 - IP addresses (FF63+)
-   1492607 - postMessage with targetOrigin "*" (requires 4002) (FF65+)
    1542309 - top-level domain URLs when host is in the public suffix list (FF68+)
    1506693 - pdfjs range-based requests (FF68+)
    1330467 - site permissions (FF69+)
@@ -1246,6 +1240,11 @@ user_pref("security.csp.enable", true); // [DEFAULT: true]
 user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
 /* 6005: enforce no insecure active content on https pages ***/
 user_pref("security.mixed_content.block_active_content", true); // [DEFAULT: true]
+/* 6006: enforce "window.name" protection [FF82+]
+ * If a new page from another domain is loaded into a tab, then window.name is set to an empty string. The original
+ * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks
+ * [TEST] https://arkenfox.github.io/TZP/tests/windownamea.html ***/
+user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+]
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");

From 9f43d48a3222ac6f8980c4f3b1b23b7e45b0bce0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 25 Aug 2021 14:09:39 +0000
Subject: [PATCH 0887/1147] targetBlankNoOpener -> don't touch

---
 user.js | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 06a76a1..d69ab34 100644
--- a/user.js
+++ b/user.js
@@ -728,14 +728,11 @@ user_pref("dom.disable_window_move_resize", true);
 user_pref("dom.disable_open_during_load", true);
 /* 2404: limit events that can cause a popup [SETUP-WEB] ***/
 user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
-/* 2405: enable (limited but sufficient) window.opener protection [FF65+]
- * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
-user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
-/* 2406: disable website access to clipboard events/content
+/* 2405: disable website access to clipboard events/content
  * Requires user interaction. Applies to onCut/onCopy/onPaste events
  * [SETUP-HARDEN] Will break some sites' functionality e.g. Outlook, Twitter, Facebook, Wordpress ***/
    // user_pref("dom.event.clipboardevents.enabled", false);
-/* 2407: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
+/* 2406: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
  * this disables document.execCommand("cut"/"copy") to protect your clipboard
  * [1] https://bugzilla.mozilla.org/1170911 ***/
 user_pref("dom.allow_cut_copy", false);
@@ -1245,6 +1242,9 @@ user_pref("security.mixed_content.block_active_content", true); // [DEFAULT: tru
  * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks
  * [TEST] https://arkenfox.github.io/TZP/tests/windownamea.html ***/
 user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+]
+/* 6007: enforce window.opener protection [FF65+]
+ * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
+user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");

From 677b81765f652432ef0f150d794c0aaf4b06cb53 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 25 Aug 2021 15:36:15 +0000
Subject: [PATCH 0888/1147] tidy webgl

---
 user.js | 7 ++-----
 1 file changed, 2 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index d69ab34..a895298 100644
--- a/user.js
+++ b/user.js
@@ -755,11 +755,8 @@ user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true FF89+]
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
 user_pref("browser.link.open_newwindow", 3); // 1=most recent window or tab 2=new window, 3=new tab
 user_pref("browser.link.open_newwindow.restriction", 0);
-/* 2504: disable/limit WebGL (Web Graphics Library)
- * [SETUP-WEB] When disabled, will break some websites. When enabled, provides high entropy,
- * especially with readPixels(). Some of the other entropy is lessened with RFP (4501)
- * [1] https://www.contextis.com/resources/blog/webgl-new-dimension-browser-exploitation/
- * [2] https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern ***/
+/* 2504: disable WebGL (Web Graphics Library)
+ * [SETUP-WEB] If you need it then enable it. RFP still randomizes canvas for naive scripts ***/
 user_pref("webgl.disabled", true);
    // user_pref("webgl.enable-webgl2", false);
    // user_pref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT: true FF86+]

From 76c8ecd10d19a6f61ead3e7525c13b0087f898d6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 25 Aug 2021 15:56:57 +0000
Subject: [PATCH 0889/1147] tidy

---
 user.js | 73 ++++++++++++++++++++++++++++-----------------------------
 1 file changed, 36 insertions(+), 37 deletions(-)

diff --git a/user.js b/user.js
index a895298..57b9bb0 100644
--- a/user.js
+++ b/user.js
@@ -233,27 +233,27 @@ user_pref("network.connectivity-service.enabled", false);
    [3] https://support.mozilla.org/kb/how-does-phishing-and-malware-protection-work
 ***/
 user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
-/* 0410: disable SB (Safe Browsing)
+/* 0401: disable SB (Safe Browsing)
  * [WARNING] Do this at your own risk! These are the master switches
  * [SETTING] Privacy & Security>Security>... Block dangerous and deceptive content ***/
    // user_pref("browser.safebrowsing.malware.enabled", false);
    // user_pref("browser.safebrowsing.phishing.enabled", false);
-/* 0411: disable SB checks for downloads (both local lookups + remote)
- * This is the master switch for the safebrowsing.downloads* prefs (0412, 0413)
+/* 0402: disable SB checks for downloads (both local lookups + remote)
+ * This is the master switch for the safebrowsing.downloads* prefs (0403, 0404)
  * [SETTING] Privacy & Security>Security>... "Block dangerous downloads" ***/
    // user_pref("browser.safebrowsing.downloads.enabled", false);
-/* 0412: disable SB checks for downloads (remote)
+/* 0403: disable SB checks for downloads (remote)
  * To verify the safety of certain executable files, Firefox may submit some information about the
  * file, including the name, origin, size and a cryptographic hash of the contents, to the Google
  * Safe Browsing service which helps Firefox determine whether or not the file should be blocked
  * [SETUP-SECURITY] If you do not understand this, or you want this protection, then override it ***/
 user_pref("browser.safebrowsing.downloads.remote.enabled", false);
 user_pref("browser.safebrowsing.downloads.remote.url", "");
-/* 0413: disable SB checks for unwanted software
+/* 0404: disable SB checks for unwanted software
  * [SETTING] Privacy & Security>Security>... "Warn you about unwanted and uncommon software" ***/
    // user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
    // user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
-/* 0419: disable "ignore this warning" on SB warnings [FF45+]
+/* 0405: disable "ignore this warning" on SB warnings [FF45+]
  * If clicked, it bypasses the block for that session. This is a means for admins to enforce SB
  * [TEST] see github wiki APPENDIX A: Test Sites: Section 5
  * [1] https://bugzilla.mozilla.org/1226490 ***/
@@ -267,7 +267,7 @@ user_pref("browser.safebrowsing.downloads.remote.url", "");
    * Portable: "...\App\Firefox64\browser\features\" (or "App\Firefox\etc" for 32bit)
    * Windows: "...\Program Files\Mozilla\browser\features" (or "Program Files (X86)\etc" for 32bit)
    * Mac: "...\Applications\Firefox\Contents\Resources\browser\features\"
-          [NOTE] On Mac you can right-click on the application and select "Show Package Contents"
+       [NOTE] On Mac you can right-click on the application and select "Show Package Contents"
    * Linux: "/usr/lib/firefox/browser/features" (or similar)
 
    [1] https://firefox-source-docs.mozilla.org/toolkit/mozapps/extensions/addon-manager/SystemAddons.html
@@ -313,10 +313,10 @@ user_pref("network.dns.disablePrefetch", true);
 /* 0603: disable predictor / prefetching ***/
 user_pref("network.predictor.enabled", false);
    // user_pref("network.predictor.enable-prefetch", false); // [FF48+] [DEFAULT: false]
-/* 0605: disable link-mouseover opening connection to linked server
+/* 0604: disable link-mouseover opening connection to linked server
  * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests ***/
 user_pref("network.http.speculative-parallel-limit", 0);
-/* 0606: enforce no "Hyperlink Auditing" (click tracking)
+/* 0605: enforce no "Hyperlink Auditing" (click tracking)
  * [1] https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ***/
    // user_pref("browser.send_pings", false); // [DEFAULT: false]
 
@@ -371,7 +371,32 @@ user_pref("keyword.enabled", false);
 user_pref("browser.fixup.alternate.enabled", false);
 /* 0803: display all parts of the url in the location bar ***/
 user_pref("browser.urlbar.trimURLs", false);
-/* 0805: disable coloring of visited links
+/* 0804: disable live search suggestions
+ * [NOTE] Both must be true for the location bar to work
+ * [SETUP-CHROME] Change these if you trust and use a privacy respecting search engine
+ * [SETTING] Search>Provide search suggestions | Show search suggestions in address bar results ***/
+user_pref("browser.search.suggest.enabled", false);
+user_pref("browser.urlbar.suggest.searches", false);
+/* 0805: disable location bar making speculative connections [FF56+]
+ * [1] https://bugzilla.mozilla.org/1348275 ***/
+user_pref("browser.urlbar.speculativeConnect.enabled", false);
+/* 0806: disable location bar leaking single words to a DNS provider **after searching** [FF78+]
+ * 0=never resolve single words, 1=heuristic (default), 2=always resolve
+ * [NOTE] For FF78 value 1 and 2 are the same and always resolve but that will change in future versions
+ * [1] https://bugzilla.mozilla.org/1642623 ***/
+user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
+/* 0807: disable tab-to-search [FF85+]
+ * Alternatively, you can exclude on a per-engine basis by unchecking them in Options>Search
+ * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest>Search engines ***/
+   // user_pref("browser.urlbar.suggest.engines", false);
+/* 0808: disable search and form history
+ * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
+ * [NOTE] We also clear formdata on exit (2803)
+ * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
+ * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
+ * [2] https://bugzilla.mozilla.org/381681 ***/
+user_pref("browser.formfill.enable", false);
+/* 0808: disable coloring of visited links
  * [SETUP-HARDEN] Bulk rapid history sniffing was mitigated in 2010 [1][2]. Slower and more expensive
  * redraw timing attacks were largely mitigated in FF77+ [3]. Using RFP (4501) further hampers timing
  * attacks. Don't forget clearing history on close (2803). However, social engineering [2#limits][4][5]
@@ -382,31 +407,6 @@ user_pref("browser.urlbar.trimURLs", false);
  * [4] https://earthlng.github.io/testpages/visited_links.html (see github wiki APPENDIX A on how to use)
  * [5] https://lcamtuf.blogspot.com/2016/08/css-mix-blend-mode-is-bad-for-keeping.html ***/
    // user_pref("layout.css.visited_links_enabled", false);
-/* 0807: disable live search suggestions
- * [NOTE] Both must be true for the location bar to work
- * [SETUP-CHROME] Change these if you trust and use a privacy respecting search engine
- * [SETTING] Search>Provide search suggestions | Show search suggestions in address bar results ***/
-user_pref("browser.search.suggest.enabled", false);
-user_pref("browser.urlbar.suggest.searches", false);
-/* 0810: disable location bar making speculative connections [FF56+]
- * [1] https://bugzilla.mozilla.org/1348275 ***/
-user_pref("browser.urlbar.speculativeConnect.enabled", false);
-/* 0811: disable location bar leaking single words to a DNS provider **after searching** [FF78+]
- * 0=never resolve single words, 1=heuristic (default), 2=always resolve
- * [NOTE] For FF78 value 1 and 2 are the same and always resolve but that will change in future versions
- * [1] https://bugzilla.mozilla.org/1642623 ***/
-user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
-/* 0850b: disable tab-to-search [FF85+]
- * Alternatively, you can exclude on a per-engine basis by unchecking them in Options>Search
- * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest>Search engines ***/
-   // user_pref("browser.urlbar.suggest.engines", false);
-/* 0860: disable search and form history
- * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
- * [NOTE] We also clear formdata on exit (2803)
- * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
- * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
- * [2] https://bugzilla.mozilla.org/381681 ***/
-user_pref("browser.formfill.enable", false);
 
 /*** [SECTION 0900]: PASSWORDS
    [1] https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas
@@ -437,7 +437,7 @@ user_pref("network.auth.subresource-http-auth-allow", 1);
 user_pref("network.http.windows-sso.enabled", false);
 
 /*** [SECTION 1000]: DISK AVOIDANCE
-   [NOTE] Cache is isolated with network partitioning (FF85+) or when using FPI
+   [NOTE] Cache is isolated with network partitioning (FF85+) or FPI
 ***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
 /* 1001: disable disk cache
@@ -1353,7 +1353,6 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's crossed the Jordan
 
 /*** [SECTION 9000]: PERSONAL
    Non-project related but useful. If any interest you, add them to your overrides
-   To save some overrides, we've made a few active as they seem to be universally used
 ***/
 user_pref("_user.js.parrot", "9000 syntax error: I ran out of parrots");
 /* WELCOME & WHAT'S NEW NOTICES ***/

From 881a2d22eb0f977995e5b360ca06df8644ad2d6b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 25 Aug 2021 16:14:59 +0000
Subject: [PATCH 0890/1147] cleanup tags

- there was only one perf left
- warning is down to 5: two in section headers, 3 on inactive prefs: no need to mention it, people will see them if they read each item/section
---
 user.js | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 57b9bb0..7994c4c 100644
--- a/user.js
+++ b/user.js
@@ -24,8 +24,6 @@
        [SETUP-SECURITY] it's one item, read it
             [SETUP-WEB] can cause some websites to break
          [SETUP-CHROME] changes how Firefox itself behaves (i.e. not directly website related)
-           [SETUP-PERF] may impact performance
-              [WARNING] used on some commented out items, heed them
   6. Override Recipes: https://github.com/arkenfox/user.js/issues/1080
 
 * RELEASES: https://github.com/arkenfox/user.js/releases
@@ -441,7 +439,7 @@ user_pref("network.http.windows-sso.enabled", false);
 ***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
 /* 1001: disable disk cache
- * [SETUP-PERF] If you think disk cache helps, then feel free to override this
+ * [SETUP-CHROME] If you think disk cache helps perf, then feel free to override this
  * [NOTE] We also clear cache on exit (2803) ***/
 user_pref("browser.cache.disk.enable", false);
 /* 1002: disable media cache from writing to disk in Private Browsing

From 5ec4fef4ed6dc17db4f3f8d04d6d1d394e9145b2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 26 Aug 2021 05:40:59 +0000
Subject: [PATCH 0891/1147] dedupe 0808

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 7994c4c..ffed34b 100644
--- a/user.js
+++ b/user.js
@@ -394,7 +394,7 @@ user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
  * [2] https://bugzilla.mozilla.org/381681 ***/
 user_pref("browser.formfill.enable", false);
-/* 0808: disable coloring of visited links
+/* 0809: disable coloring of visited links
  * [SETUP-HARDEN] Bulk rapid history sniffing was mitigated in 2010 [1][2]. Slower and more expensive
  * redraw timing attacks were largely mitigated in FF77+ [3]. Using RFP (4501) further hampers timing
  * attacks. Don't forget clearing history on close (2803). However, social engineering [2#limits][4][5]

From 64e8dfad0a25806d6af480fb5e9f21f5934da6e9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 26 Aug 2021 05:55:11 +0000
Subject: [PATCH 0892/1147] 1004: remove setup tag

IDK if this is true: no one has ever complained, and I'm not interested in maintaining/testing it
---
 user.js | 2 --
 1 file changed, 2 deletions(-)

diff --git a/user.js b/user.js
index ffed34b..369b801 100644
--- a/user.js
+++ b/user.js
@@ -453,8 +453,6 @@ user_pref("media.memory_cache_max_size", 65536);
 user_pref("browser.sessionstore.privacy_level", 2);
 /* 1004: set the minimum interval between session save operations
  * Increasing this can help on older machines and some websites, as well as reducing writes [1]
- * [SETUP-CHROME] This can affect entries in "Recently Closed Tabs": i.e. the
- * longer the interval the more chance a quick tab open/close won't be captured
  * [1] https://bugzilla.mozilla.org/1304389 ***/
 user_pref("browser.sessionstore.interval", 30000); // [DEFAULT: 15000]
 /* 1005: disable automatic Firefox start and session restore after reboot [FF62+] [WINDOWS]

From 498a25c759edc7a28ade958b6bb1d66d75df152e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 26 Aug 2021 06:04:57 +0000
Subject: [PATCH 0893/1147] 0806: remove confusing line

---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 369b801..40f63bf 100644
--- a/user.js
+++ b/user.js
@@ -380,7 +380,6 @@ user_pref("browser.urlbar.suggest.searches", false);
 user_pref("browser.urlbar.speculativeConnect.enabled", false);
 /* 0806: disable location bar leaking single words to a DNS provider **after searching** [FF78+]
  * 0=never resolve single words, 1=heuristic (default), 2=always resolve
- * [NOTE] For FF78 value 1 and 2 are the same and always resolve but that will change in future versions
  * [1] https://bugzilla.mozilla.org/1642623 ***/
 user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
 /* 0807: disable tab-to-search [FF85+]

From 80f69a6f3d1d34f49496064d9199d885a28c6c4f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 26 Aug 2021 06:26:41 +0000
Subject: [PATCH 0894/1147] 2406: remove

This doesn't achieve anything. AFAICT, it's an old gecko only API, not used on the web: superseded by the Clipboard API (added in FF21+)
---
 user.js | 4 ----
 1 file changed, 4 deletions(-)

diff --git a/user.js b/user.js
index 40f63bf..93c1926 100644
--- a/user.js
+++ b/user.js
@@ -727,10 +727,6 @@ user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
  * Requires user interaction. Applies to onCut/onCopy/onPaste events
  * [SETUP-HARDEN] Will break some sites' functionality e.g. Outlook, Twitter, Facebook, Wordpress ***/
    // user_pref("dom.event.clipboardevents.enabled", false);
-/* 2406: disable clipboard commands (cut/copy) from "non-privileged" content [FF41+]
- * this disables document.execCommand("cut"/"copy") to protect your clipboard
- * [1] https://bugzilla.mozilla.org/1170911 ***/
-user_pref("dom.allow_cut_copy", false);
 
 /*** [SECTION 2500]: FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");

From 38dc90a947cd07f57992eabf0f56807119a44afe Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 26 Aug 2021 06:27:32 +0000
Subject: [PATCH 0895/1147] dom.allow_cut_copy

https://github.com/arkenfox/user.js/commit/80f69a6f3d1d34f49496064d9199d885a28c6c4f
---
 scratchpad-scripts/arkenfox-clear-removed.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 5120643..d53e6f5 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
   This will reset the preferences that have been removed completely from the arkenfox user.js.
 
-  Last updated: 22-August-2021
+  Last updated: 26-August-2021
 
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -15,6 +15,7 @@
     /* removed in arkenfox user.js */
     /* 91 */
     'alerts.showFavicons',
+    'dom.allow_cut_copy',
     'dom.battery.enabled',
     'dom.storage.enabled',
     'dom.vibrator.enabled',

From b5a3b54d3f9555aae97548306a56815b2f7fc9fa Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 26 Aug 2021 06:43:28 +0000
Subject: [PATCH 0896/1147] clipboard to don't bother

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 93c1926..b4dc10b 100644
--- a/user.js
+++ b/user.js
@@ -723,10 +723,6 @@ user_pref("dom.disable_window_move_resize", true);
 user_pref("dom.disable_open_during_load", true);
 /* 2404: limit events that can cause a popup [SETUP-WEB] ***/
 user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
-/* 2405: disable website access to clipboard events/content
- * Requires user interaction. Applies to onCut/onCopy/onPaste events
- * [SETUP-HARDEN] Will break some sites' functionality e.g. Outlook, Twitter, Facebook, Wordpress ***/
-   // user_pref("dom.event.clipboardevents.enabled", false);
 
 /*** [SECTION 2500]: FINGERPRINTING ***/
 user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");
@@ -1309,6 +1305,10 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [2] https://gitlab.torproject.org/legacy/trac/-/issues/8455 ***/
    // user_pref("gfx.downloadable_fonts.enabled", false); // [FF41+]
    // user_pref("gfx.downloadable_fonts.fallback_delay", -1);
+/* 7013: disable website access to clipboard events/content
+  * [WHY] Fingerprintable. Breakage. Requires user interaction, and
+  * paste only fires on focused editable fields. ***/
+   // user_pref("dom.event.clipboardevents.enabled", false);
 
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good

From 4ac17eaf787b6145f3e44759a2e0fd13660ee88c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 26 Aug 2021 06:50:46 +0000
Subject: [PATCH 0897/1147] tidy last commit

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index b4dc10b..b94104c 100644
--- a/user.js
+++ b/user.js
@@ -1305,9 +1305,9 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [2] https://gitlab.torproject.org/legacy/trac/-/issues/8455 ***/
    // user_pref("gfx.downloadable_fonts.enabled", false); // [FF41+]
    // user_pref("gfx.downloadable_fonts.fallback_delay", -1);
-/* 7013: disable website access to clipboard events/content
-  * [WHY] Fingerprintable. Breakage. Requires user interaction, and
-  * paste only fires on focused editable fields. ***/
+/* 7013: disable Clipboard API
+ * [WHY] Fingerprintable. Breakage. They (cut/copy/paste) require user
+ * interaction, and paste is limited to focused editable fields ***/
    // user_pref("dom.event.clipboardevents.enabled", false);
 
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP

From 08395de18871590730ba7139c5de631a0aa82b03 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 27 Aug 2021 10:37:54 +0000
Subject: [PATCH 0898/1147] 1273: remove inactive pref

---
 user.js | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/user.js b/user.js
index b94104c..7b88ae2 100644
--- a/user.js
+++ b/user.js
@@ -574,8 +574,7 @@ user_pref("browser.ssl_override_behavior", 1);
  * i.e. it doesn't work for HSTS discrepancies (https://subdomain.preloaded-hsts.badssl.com/)
  * [TEST] https://expired.badssl.com/ ***/
 user_pref("browser.xul.error_pages.expert_bad_cert", true);
-/* 1273: display "insecure" icon and "Not Secure" text on HTTP sites ***/
-   // user_pref("security.insecure_connection_icon.enabled", true); // [FF59+] [DEFAULT: true]
+/* 1273: display "Not Secure" text on HTTP sites ***/
 user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 
 /*** [SECTION 1400]: FONTS ***/

From 2a9cf32f45d0aabc4a6ac70f3a4a0b8f8e25a1ad Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 27 Aug 2021 10:39:40 +0000
Subject: [PATCH 0899/1147] security.insecure_connection_icon.enabled

inactive and default true
---
 scratchpad-scripts/arkenfox-clear-removed.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index d53e6f5..ca7b2f4 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
   This will reset the preferences that have been removed completely from the arkenfox user.js.
 
-  Last updated: 26-August-2021
+  Last updated: 27-August-2021
 
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -23,6 +23,7 @@
     'gfx.direct2d.disabled',
     'layers.acceleration.disabled',
     'media.media-capabilities.enabled',
+    'security.insecure_connection_icon.enabled',
     /* 79-90 */
     'browser.newtabpage.activity-stream.asrouter.providers.snippets',
     'browser.send_pings.require_same_host',

From 3b5255714339cf9726d77853d6166e5a0bc6eb36 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 28 Aug 2021 05:19:13 +0000
Subject: [PATCH 0900/1147] start removal of section 0500s

- I am no longer short one parrot
- move inactive screenshots to personal
- move FORM autofill to `0800... FORMS` - can't find it now, but this is slated to cease being a system addon and instead be "built-in"
- the rest will get swallowed into a revamped, split QUIETER FOX
---
 user.js | 54 ++++++++++++++++++++----------------------------------
 1 file changed, 20 insertions(+), 34 deletions(-)

diff --git a/user.js b/user.js
index 7b88ae2..904db6c 100644
--- a/user.js
+++ b/user.js
@@ -41,11 +41,11 @@
 
   0100: STARTUP
   0200: GEOLOCATION / LANGUAGE / LOCALE
-  0300: QUIET FOX
+  0300: QUIETER FOX
   0400: SAFE BROWSING
   0500: SYSTEM ADD-ONS / EXPERIMENTS
   0600: BLOCK IMPLICIT OUTBOUND
-  0700: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc
+  0700: DNS / PROXY / SOCKS / IPv6
   0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
   0900: PASSWORDS
   1000: DISK AVOIDANCE
@@ -141,7 +141,7 @@ user_pref("intl.accept_languages", "en-US, en");
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=867501,1629630 ***/
 user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 
-/*** [SECTION 0300]: QUIET FOX ***/
+/*** [SECTION 0300]: QUIETER FOX ***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
 /* 0301: disable auto-INSTALLING Firefox updates [NON-WINDOWS]
  * [NOTE] You will still get prompts to update, and should do so in a timely manner
@@ -257,21 +257,8 @@ user_pref("browser.safebrowsing.downloads.remote.url", "");
  * [1] https://bugzilla.mozilla.org/1226490 ***/
    // user_pref("browser.safebrowsing.allowOverride", false);
 
-/*** [SECTION 0500]: SYSTEM ADD-ONS / EXPERIMENTS
-   System Add-ons are a method for shipping extensions, considered to be
-   built-in features to Firefox, that are hidden from the about:addons UI.
-   To view your System Add-ons go to about:support, they are listed under "Firefox Features"
-
-   * Portable: "...\App\Firefox64\browser\features\" (or "App\Firefox\etc" for 32bit)
-   * Windows: "...\Program Files\Mozilla\browser\features" (or "Program Files (X86)\etc" for 32bit)
-   * Mac: "...\Applications\Firefox\Contents\Resources\browser\features\"
-       [NOTE] On Mac you can right-click on the application and select "Show Package Contents"
-   * Linux: "/usr/lib/firefox/browser/features" (or similar)
-
-   [1] https://firefox-source-docs.mozilla.org/toolkit/mozapps/extensions/addon-manager/SystemAddons.html
-   [2] https://searchfox.org/mozilla-central/source/browser/extensions
-***/
-user_pref("_user.js.parrot", "0500 syntax error: the parrot's cashed in 'is chips!");
+/*** [SECTION 0500]: SYSTEM ADD-ONS / EXPERIMENTS ***/
+user_pref("_user.js.parrot", "0500 syntax error: section is going to be removed");
 /* 0503: disable Normandy/Shield [FF60+]
  * Shield is a telemetry system that can push and test "recipes"
  * [1] https://mozilla.github.io/normandy/ ***/
@@ -283,18 +270,6 @@ user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
 /* 0506: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
  * Defense-in-depth: currently covered by 0340 ***/
 user_pref("browser.ping-centre.telemetry", false);
-/* 0515: disable Screenshots ***/
-   // user_pref("extensions.screenshots.disabled", true); // [FF55+]
-/* 0517: disable Form Autofill
- * [NOTE] Stored data is NOT secure (uses a JSON file)
- * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
- * [SETTING] Privacy & Security>Forms and Autofill>Autofill addresses
- * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill ***/
-user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
-user_pref("extensions.formautofill.available", "off"); // [FF56+]
-user_pref("extensions.formautofill.creditCards.available", false); // [FF57+]
-user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
-user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
 /* 0518: enforce disabling of Web Compatibility Reporter [FF56+]
  * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla ***/
 user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
@@ -318,7 +293,7 @@ user_pref("network.http.speculative-parallel-limit", 0);
  * [1] https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ***/
    // user_pref("browser.send_pings", false); // [DEFAULT: false]
 
-/*** [SECTION 0700]: HTTP* / TCP/IP / DNS / PROXY / SOCKS etc ***/
+/*** [SECTION 0700]: DNS / PROXY / SOCKS / IPv6 ***/
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
 /* 0701: disable IPv6
  * IPv6 can be abused, especially with MAC addresses, and can leak with VPNs: assuming
@@ -392,8 +367,18 @@ user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
  * [2] https://bugzilla.mozilla.org/381681 ***/
+/* 0809: disable Form Autofill
+ * [NOTE] Stored data is NOT secure (uses a JSON file)
+ * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
+ * [SETTING] Privacy & Security>Forms and Autofill>Autofill addresses
+ * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill ***/
+user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
+user_pref("extensions.formautofill.available", "off"); // [FF56+]
+user_pref("extensions.formautofill.creditCards.available", false); // [FF57+]
+user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
+user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
 user_pref("browser.formfill.enable", false);
-/* 0809: disable coloring of visited links
+/* 0810: disable coloring of visited links
  * [SETUP-HARDEN] Bulk rapid history sniffing was mitigated in 2010 [1][2]. Slower and more expensive
  * redraw timing attacks were largely mitigated in FF77+ [3]. Using RFP (4501) further hampers timing
  * attacks. Don't forget clearing history on close (2803). However, social engineering [2#limits][4][5]
@@ -1344,7 +1329,7 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's crossed the Jordan
 /*** [SECTION 9000]: PERSONAL
    Non-project related but useful. If any interest you, add them to your overrides
 ***/
-user_pref("_user.js.parrot", "9000 syntax error: I ran out of parrots");
+user_pref("_user.js.parrot", "9000 syntax error: the parrot's cashed in 'is chips!");
 /* WELCOME & WHAT'S NEW NOTICES ***/
 user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switch
    // user_pref("startup.homepage_welcome_url", "");
@@ -1376,9 +1361,10 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc
    // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [DEFAULT: false on Linux]
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
    // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+, FF59 and under]
-/* UX FEATURES: disable and hide the icons and menus ***/
+/* UX FEATURES ***/
 user_pref("browser.messaging-system.whatsNewPanel.enabled", false); // What's New toolbar icon [FF69+]
    // user_pref("extensions.pocket.enabled", false); // Pocket Account [FF46+]
+   // user_pref("extensions.screenshots.disabled", true); // [FF55+]
    // user_pref("identity.fxaccounts.enabled", false); // Firefox Accounts & Sync [FF60+] [RESTART]
    // user_pref("reader.parse-on-load.enabled", false); // Reader View
 /* OTHER ***/

From 2cf20c56a7d13b7c334b5b6e3f5180444c446bbf Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 28 Aug 2021 05:48:54 +0000
Subject: [PATCH 0901/1147] standardize cross origin/domain

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 904db6c..aa407de 100644
--- a/user.js
+++ b/user.js
@@ -581,11 +581,11 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
    [1] https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
 ***/
 user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
-/* 1601: control when to send a cross origin referer
+/* 1601: control when to send a cross-origin referer
  * 0=always (default), 1=only if base domains match, 2=only if hosts match
  * [SETUP-WEB] Known to cause issues with older modems/routers and some sites e.g vimeo, icloud, instagram ***/
 user_pref("network.http.referer.XOriginPolicy", 2);
-/* 1602: control the amount of cross origin information to send [FF52+]
+/* 1602: control the amount of cross-origin information to send [FF52+]
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
 /* 1603: enable the DNT (Do Not Track) HTTP header
@@ -960,7 +960,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
 ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
 /* 4001: enable First Party Isolation [FF51+]
- * [SETUP-WEB] Will break most cross-domain logins
+ * [SETUP-WEB] Breaks some cross-origin logins
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1260931,1299996 ***/
 user_pref("privacy.firstparty.isolate", true);
 /* 4002: enforce FPI restriction for window.opener [FF54+]
@@ -1261,7 +1261,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("dom.securecontext.whitelist_onions", true); // 1382359
    // user_pref("network.http.referer.hideOnionSource", true); // 1305144
 /* 7007: referers
- * [WHY] Only cross origin referers (1600s) need control ***/
+ * [WHY] Only cross-origin referers (1600s) need control ***/
    // user_pref("network.http.sendRefererHeader", 2);
    // user_pref("network.http.referer.trimmingPolicy", 0);
 /* 7008: set the default Referrer Policy [FF59+]

From 5ac8fd8f70f3e9ab60b264a572e2ad9974ac7362 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 28 Aug 2021 05:57:19 +0000
Subject: [PATCH 0902/1147] 0906: tweak, #1243

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index aa407de..2b33426 100644
--- a/user.js
+++ b/user.js
@@ -413,10 +413,10 @@ user_pref("signon.formlessCapture.enabled", false);
  * 1 = don't allow cross-origin sub-resources to open HTTP authentication credentials dialogs
  * 2 = allow sub-resources to open HTTP authentication credentials dialogs (default) ***/
 user_pref("network.auth.subresource-http-auth-allow", 1);
-/* 0906: disable automatic authentication on Microsoft sites [FF91+] [WINDOWS 10+]
+/* 0906: enforce no automatic authentication on Microsoft sites [FF91+] [WINDOWS 10+]
  * [SETTING] Privacy & Security>Logins and Passwords>Allow Windows single sign-on for...
  * [1] https://support.mozilla.org/kb/windows-sso ***/
-user_pref("network.http.windows-sso.enabled", false);
+user_pref("network.http.windows-sso.enabled", false); // [DEFAULT: false]
 
 /*** [SECTION 1000]: DISK AVOIDANCE
    [NOTE] Cache is isolated with network partitioning (FF85+) or FPI

From 4043467ad9e726244e2395f319d021b0bcf824c7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 28 Aug 2021 06:03:13 +0000
Subject: [PATCH 0903/1147] tidy

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 2b33426..78a4499 100644
--- a/user.js
+++ b/user.js
@@ -796,9 +796,6 @@ user_pref("network.protocol-handler.external.ms-windows-store", false);
  * for these will show/use their correct 3rd party origin
  * [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion ***/
 user_pref("permissions.delegation.enabled", false);
-/* 2625: disable bypassing 3rd party extension install prompts [FF82+]
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1659530,1681331 ***/
-user_pref("extensions.postDownloadThirdPartyPrompt", false);
 
 /** DOWNLOADS ***/
 /* 2651: enable user interaction for security by always asking where to download
@@ -816,6 +813,9 @@ user_pref("browser.download.manager.addToRecentDocs", false);
  * [1] archived: https://archive.is/DYjAM ***/
 user_pref("extensions.enabledScopes", 5); // [HIDDEN PREF]
 user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
+/* 2661: disable bypassing 3rd party extension install prompts [FF82+]
+ * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1659530,1681331 ***/
+user_pref("extensions.postDownloadThirdPartyPrompt", false);
 /* 2662: disable webextension restrictions on certain mozilla domains (you also need 4503) [FF60+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
    // user_pref("extensions.webextensions.restrictedDomains", "");

From 4b437771fa3886173182fce273f145a65babfc3f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 28 Aug 2021 07:11:44 +0000
Subject: [PATCH 0904/1147] oophs, thanks @eleius

fixup https://github.com/arkenfox/user.js/commit/3b5255714339cf9726d77853d6166e5a0bc6eb36
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 78a4499..61d0fab 100644
--- a/user.js
+++ b/user.js
@@ -367,6 +367,7 @@ user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
  * [2] https://bugzilla.mozilla.org/381681 ***/
+user_pref("browser.formfill.enable", false);
 /* 0809: disable Form Autofill
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
@@ -377,7 +378,6 @@ user_pref("extensions.formautofill.available", "off"); // [FF56+]
 user_pref("extensions.formautofill.creditCards.available", false); // [FF57+]
 user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
 user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
-user_pref("browser.formfill.enable", false);
 /* 0810: disable coloring of visited links
  * [SETUP-HARDEN] Bulk rapid history sniffing was mitigated in 2010 [1][2]. Slower and more expensive
  * redraw timing attacks were largely mitigated in FF77+ [3]. Using RFP (4501) further hampers timing

From 6df03e1a74863e889dc756f3a8a6f90ba78b6126 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 28 Aug 2021 08:30:12 +0000
Subject: [PATCH 0905/1147] add removed from arkenfox section

- this helps mitigate the need for scratchpad for those who use prefsCleaner
- in future, if anything was active during the ESR cycle, then it goes in here when removed
- similar to deprecated items: clean out after ESR EOL
---
 user.js | 15 +++++++++++++--
 1 file changed, 13 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 61d0fab..a4569ef 100644
--- a/user.js
+++ b/user.js
@@ -729,8 +729,6 @@ user_pref("browser.link.open_newwindow.restriction", 0);
 /* 2504: disable WebGL (Web Graphics Library)
  * [SETUP-WEB] If you need it then enable it. RFP still randomizes canvas for naive scripts ***/
 user_pref("webgl.disabled", true);
-   // user_pref("webgl.enable-webgl2", false);
-   // user_pref("webgl.disable-fail-if-major-performance-caveat", true); // [DEFAULT: true FF86+]
 
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
@@ -1213,6 +1211,19 @@ user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+]
 /* 6007: enforce window.opener protection [FF65+]
  * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
 user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
+/* 6050: prefsCleaner: reset previously active items removed from arkenfox in 79-91 ***/
+   // user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
+   // user_pref("browser.send_pings.require_same_host", "");
+   // user_pref("dom.allow_cut_copy", "");
+   // user_pref("dom.vibrator.enabled", "");
+   // user_pref("media.gmp-widevinecdm.visible", "");
+   // user_pref("network.http.redirection-limit", "");
+   // user_pref("privacy.partition.network_state", "");
+   // user_pref("security.insecure_connection_icon.enabled", ""); // [DEFAULT: true FF70+]
+   // user_pref("security.ssl.enable_ocsp_stapling", ""); // [DEFAULT: true FF26+]
+   // user_pref("webgl.disable-fail-if-major-performance-caveat", ""); // [DEFAULT: true FF86+]
+   // user_pref("webgl.enable-webgl2", "");
+   // user_pref("webgl.min_capability_mode", "");
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");

From 7e80231ac583f67883c6403e9e3c06a888fd289f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 28 Aug 2021 08:38:31 +0000
Subject: [PATCH 0906/1147] was 6005: remove mixed active

---
 user.js | 9 ++++-----
 1 file changed, 4 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index a4569ef..d14d564 100644
--- a/user.js
+++ b/user.js
@@ -1201,16 +1201,14 @@ user_pref("security.csp.enable", true); // [DEFAULT: true]
 /* 6004: enforce a security delay on some confirmation dialogs such as install, open/save
  * [1] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
 user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
-/* 6005: enforce no insecure active content on https pages ***/
-user_pref("security.mixed_content.block_active_content", true); // [DEFAULT: true]
+/* 6005: enforce window.opener protection [FF65+]
+ * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
+user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
 /* 6006: enforce "window.name" protection [FF82+]
  * If a new page from another domain is loaded into a tab, then window.name is set to an empty string. The original
  * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks
  * [TEST] https://arkenfox.github.io/TZP/tests/windownamea.html ***/
 user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+]
-/* 6007: enforce window.opener protection [FF65+]
- * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
-user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
 /* 6050: prefsCleaner: reset previously active items removed from arkenfox in 79-91 ***/
    // user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
    // user_pref("browser.send_pings.require_same_host", "");
@@ -1220,6 +1218,7 @@ user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
    // user_pref("network.http.redirection-limit", "");
    // user_pref("privacy.partition.network_state", "");
    // user_pref("security.insecure_connection_icon.enabled", ""); // [DEFAULT: true FF70+]
+   // user_pref("security.mixed_content.block_active_content", ""); // [DEFAULT: true since at least FF60]
    // user_pref("security.ssl.enable_ocsp_stapling", ""); // [DEFAULT: true FF26+]
    // user_pref("webgl.disable-fail-if-major-performance-caveat", ""); // [DEFAULT: true FF86+]
    // user_pref("webgl.enable-webgl2", "");

From 908638c9dc8f1d66c373617915220c126ed05147 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 28 Aug 2021 08:39:44 +0000
Subject: [PATCH 0907/1147] security.mixed_content.block_active_content

default true since at least FF60
---
 scratchpad-scripts/arkenfox-clear-removed.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index ca7b2f4..f202cae 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
   This will reset the preferences that have been removed completely from the arkenfox user.js.
 
-  Last updated: 27-August-2021
+  Last updated: 28-August-2021
 
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -24,6 +24,7 @@
     'layers.acceleration.disabled',
     'media.media-capabilities.enabled',
     'security.insecure_connection_icon.enabled',
+    'security.mixed_content.block_active_content',
     /* 79-90 */
     'browser.newtabpage.activity-stream.asrouter.providers.snippets',
     'browser.send_pings.require_same_host',

From a264eebcb5ae86b958329514daf590bf5618f6cb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 29 Aug 2021 03:27:46 +0000
Subject: [PATCH 0908/1147] screensharing etc

---
 scratchpad-scripts/arkenfox-clear-removed.js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index f202cae..bd99cb5 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,7 @@
 /***
   This will reset the preferences that have been removed completely from the arkenfox user.js.
 
-  Last updated: 28-August-2021
+  Last updated: 29-August-2021
 
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -22,6 +22,9 @@
     'general.warnOnAboutConfig',
     'gfx.direct2d.disabled',
     'layers.acceleration.disabled',
+    'media.getusermedia.audiocapture.enabled',
+    'media.getusermedia.browser.enabled',
+    'media.getusermedia.screensharing.enabled',
     'media.media-capabilities.enabled',
     'security.insecure_connection_icon.enabled',
     'security.mixed_content.block_active_content',

From 453fcd32cb6fdc981684d2587764f23b4689222f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 29 Aug 2021 04:10:48 +0000
Subject: [PATCH 0909/1147] remove 2003, fixes #1245

---
 user.js | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index d14d564..8c42710 100644
--- a/user.js
+++ b/user.js
@@ -626,10 +626,6 @@ user_pref("media.peerconnection.enabled", false);
 user_pref("media.peerconnection.ice.default_address_only", true);
 user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
 user_pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true); // [FF70+]
-/* 2003: disable screensharing ***/
-user_pref("media.getusermedia.screensharing.enabled", false);
-user_pref("media.getusermedia.browser.enabled", false);
-user_pref("media.getusermedia.audiocapture.enabled", false);
 /* 2020: disable GMP (Gecko Media Plugins)
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
    // user_pref("media.gmp-provider.enabled", false);
@@ -1214,6 +1210,9 @@ user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+]
    // user_pref("browser.send_pings.require_same_host", "");
    // user_pref("dom.allow_cut_copy", "");
    // user_pref("dom.vibrator.enabled", "");
+   // user_pref("media.getusermedia.audiocapture.enabled", "");
+   // user_pref("media.getusermedia.browser.enabled", "");
+   // user_pref("media.getusermedia.screensharing.enabled", "");
    // user_pref("media.gmp-widevinecdm.visible", "");
    // user_pref("network.http.redirection-limit", "");
    // user_pref("privacy.partition.network_state", "");

From a308878b118cf8e78406f38bec188e6535d38118 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 29 Aug 2021 04:50:36 +0000
Subject: [PATCH 0910/1147] finish removal of 500s and cleanup of 300s

---
 user.js | 86 ++++++++++++++++++++++++++++++---------------------------
 1 file changed, 46 insertions(+), 40 deletions(-)

diff --git a/user.js b/user.js
index 8c42710..50126b1 100644
--- a/user.js
+++ b/user.js
@@ -43,7 +43,6 @@
   0200: GEOLOCATION / LANGUAGE / LOCALE
   0300: QUIETER FOX
   0400: SAFE BROWSING
-  0500: SYSTEM ADD-ONS / EXPERIMENTS
   0600: BLOCK IMPLICIT OUTBOUND
   0700: DNS / PROXY / SOCKS / IPv6
   0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
@@ -143,6 +142,7 @@ user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 
 /*** [SECTION 0300]: QUIETER FOX ***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
+/** UPDATES ***/
 /* 0301: disable auto-INSTALLING Firefox updates [NON-WINDOWS]
  * [NOTE] You will still get prompts to update, and should do so in a timely manner
  * [SETTING] General>Firefox Updates>Check for updates but let you choose to install them ***/
@@ -156,23 +156,41 @@ user_pref("app.update.background.scheduling.enabled", false);
 /* 0304: disable auto-INSTALLING extension and theme updates (after the check in 0303)
  * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
    // user_pref("extensions.update.autoUpdateDefault", false);
-/* 0306: disable extension metadata
+/* 0305: disable extension metadata
  * used when installing/updating an extension, and in daily background update checks:
  * when false, extension detail tabs will have no description ***/
    // user_pref("extensions.getAddons.cache.enabled", false);
-/* 0308: disable search engine updates (e.g. OpenSearch)
+/* 0306: disable search engine updates (e.g. OpenSearch)
  * [NOTE] This does not affect Mozilla's built-in or Web Extension search engines ***/
 user_pref("browser.search.update", false);
-/* 0320: disable about:addons' Recommendations pane (uses Google Analytics) ***/
+/* 0307: disable System Add-on updates ***/
+user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
+user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
+
+/** RECOMMENDATIONS ***/
+/* 0320: disable recommendation pane in about:addons (uses Google Analytics) ***/
 user_pref("extensions.getAddons.showPane", false); // [HIDDEN PREF]
 /* 0321: disable recommendations in about:addons' Extensions and Themes panes [FF68+] ***/
 user_pref("extensions.htmlaboutaddons.recommendations.enabled", false);
-/* 0330: disable telemetry
+/* 0322: disable personalized Extension Recommendations in about:addons and AMO [FF65+]
+ * [NOTE] This pref has no effect when Health Reports (0331) are disabled
+ * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to make personalized extension recommendations
+ * [1] https://support.mozilla.org/kb/personalized-extension-recommendations ***/
+user_pref("browser.discovery.enabled", false);
+
+/** TELEMETRY ***/
+/* 0330: disable new data submission [FF41+]
+ * If disabled, no policy is shown or upload takes place, ever
+ * [1] https://bugzilla.mozilla.org/1195552 ***/
+user_pref("datareporting.policy.dataSubmissionEnabled", false);
+/* 0331: disable Health Reports
+ * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send technical... data ***/
+user_pref("datareporting.healthreport.uploadEnabled", false);
+/* 0332: disable telemetry
  * The "unified" pref affects the behaviour of the "enabled" pref
  * - If "unified" is false then "enabled" controls the telemetry module
  * - If "unified" is true then "enabled" only controls whether to record extended data
- * [NOTE] FF58+ "toolkit.telemetry.enabled" is now LOCKED to reflect prerelease
- * or release builds (true and false respectively) [2]
+ * [NOTE] "toolkit.telemetry.enabled" is now LOCKED to reflect prerelease (true) or release builds (false) [2]
  * [1] https://firefox-source-docs.mozilla.org/toolkit/components/telemetry/telemetry/internals/preferences.html
  * [2] https://medium.com/georg-fritzsche/data-preference-changes-in-firefox-58-2d5df9c428b5 ***/
 user_pref("toolkit.telemetry.unified", false);
@@ -184,26 +202,26 @@ user_pref("toolkit.telemetry.shutdownPingSender.enabled", false); // [FF55+]
 user_pref("toolkit.telemetry.updatePing.enabled", false); // [FF56+]
 user_pref("toolkit.telemetry.bhrPing.enabled", false); // [FF57+] Background Hang Reporter
 user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // [FF57+]
-/* 0331: disable Telemetry Coverage
+/* 0333: disable Telemetry Coverage
  * [1] https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/ ***/
 user_pref("toolkit.telemetry.coverage.opt-out", true); // [HIDDEN PREF]
 user_pref("toolkit.coverage.opt-out", true); // [FF64+] [HIDDEN PREF]
 user_pref("toolkit.coverage.endpoint.base", "");
-/* 0340: disable Health Reports
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send technical... data ***/
-user_pref("datareporting.healthreport.uploadEnabled", false);
-/* 0341: disable new data submission, master kill switch [FF41+]
- * If disabled, no policy is shown or upload takes place, ever
- * [1] https://bugzilla.mozilla.org/1195552 ***/
-user_pref("datareporting.policy.dataSubmissionEnabled", false);
-/* 0342: disable Studies
+/* 0334: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
+ * Defense-in-depth: currently covered by 0331 ***/
+user_pref("browser.ping-centre.telemetry", false);
+
+/** STUDIES ***/
+/* 0340: disable Studies
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to install and run studies ***/
 user_pref("app.shield.optoutstudies.enabled", false);
-/* 0343: disable personalized Extension Recommendations in about:addons and AMO [FF65+]
- * [NOTE] This pref has no effect when Health Reports (0340) are disabled
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to make personalized extension recommendations
- * [1] https://support.mozilla.org/kb/personalized-extension-recommendations ***/
-user_pref("browser.discovery.enabled", false);
+/* 0341: disable Normandy/Shield [FF60+]
+ * Shield is a telemetry system that can push and test "recipes"
+ * [1] https://mozilla.github.io/normandy/ ***/
+user_pref("app.normandy.enabled", false);
+user_pref("app.normandy.api_url", "");
+
+/** CRASH REPORTS ***/
 /* 0350: disable Crash Reports ***/
 user_pref("breakpad.reportURL", "");
 user_pref("browser.tabs.crashReporting.sendReport", false); // [FF44+]
@@ -211,13 +229,18 @@ user_pref("browser.tabs.crashReporting.sendReport", false); // [FF44+]
 /* 0351: enforce no submission of backlogged Crash Reports [FF58+]
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send backlogged crash reports  ***/
 user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [DEFAULT: false]
-/* 0390: disable Captive Portal detection
+
+/** OTHER ***/
+/* 0360: disable Captive Portal detection
  * [1] https://www.eff.org/deeplinks/2017/08/how-captive-portals-interfere-wireless-security-and-privacy ***/
 user_pref("captivedetect.canonicalURL", "");
 user_pref("network.captive-portal-service.enabled", false); // [FF52+]
-/* 0391: disable Network Connectivity checks [FF65+]
+/* 0361: disable Network Connectivity checks [FF65+]
  * [1] https://bugzilla.mozilla.org/1460537 ***/
 user_pref("network.connectivity-service.enabled", false);
+/* 0362: enforce disabling of Web Compatibility Reporter [FF56+]
+ * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla ***/
+user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
 
 /*** [SECTION 0400]: SAFE BROWSING (SB)
    SB has taken many steps to preserve privacy. If required, a full url is never sent
@@ -257,23 +280,6 @@ user_pref("browser.safebrowsing.downloads.remote.url", "");
  * [1] https://bugzilla.mozilla.org/1226490 ***/
    // user_pref("browser.safebrowsing.allowOverride", false);
 
-/*** [SECTION 0500]: SYSTEM ADD-ONS / EXPERIMENTS ***/
-user_pref("_user.js.parrot", "0500 syntax error: section is going to be removed");
-/* 0503: disable Normandy/Shield [FF60+]
- * Shield is a telemetry system that can push and test "recipes"
- * [1] https://mozilla.github.io/normandy/ ***/
-user_pref("app.normandy.enabled", false);
-user_pref("app.normandy.api_url", "");
-/* 0505: disable System Add-on updates ***/
-user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
-user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
-/* 0506: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
- * Defense-in-depth: currently covered by 0340 ***/
-user_pref("browser.ping-centre.telemetry", false);
-/* 0518: enforce disabling of Web Compatibility Reporter [FF56+]
- * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla ***/
-user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
-
 /*** [SECTION 0600]: BLOCK IMPLICIT OUTBOUND [not explicitly asked for - e.g. clicked on] ***/
 user_pref("_user.js.parrot", "0600 syntax error: the parrot's no more!");
 /* 0601: disable link prefetching

From a1b4aa6000b691930df59bc214d40d2f89c6ca90 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 29 Aug 2021 07:42:24 +0000
Subject: [PATCH 0911/1147] add DoH rollout pref, closes #1027

---
 user.js | 12 ++++++++++--
 1 file changed, 10 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 50126b1..64dd2ba 100644
--- a/user.js
+++ b/user.js
@@ -44,7 +44,7 @@
   0300: QUIETER FOX
   0400: SAFE BROWSING
   0600: BLOCK IMPLICIT OUTBOUND
-  0700: DNS / PROXY / SOCKS / IPv6
+  0700: DNS / DoH / PROXY / SOCKS / IPv6
   0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
   0900: PASSWORDS
   1000: DISK AVOIDANCE
@@ -299,7 +299,7 @@ user_pref("network.http.speculative-parallel-limit", 0);
  * [1] https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ***/
    // user_pref("browser.send_pings", false); // [DEFAULT: false]
 
-/*** [SECTION 0700]: DNS / PROXY / SOCKS / IPv6 ***/
+/*** [SECTION 0700]: DNS / DoH / PROXY / SOCKS / IPv6 ***/
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
 /* 0701: disable IPv6
  * IPv6 can be abused, especially with MAC addresses, and can leak with VPNs: assuming
@@ -329,6 +329,14 @@ user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
  * [3] https://en.wikipedia.org/wiki/GVfs
  * [4] https://en.wikipedia.org/wiki/GIO_(software) ***/
 user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
+/* 0705: disable DNS-over-HTTPS (DoH) rollout [FF60+]
+ * 0=off by default, 2=TRR (Trusted Recursive Resolver) first, 3=TRR only, 5=explicitly off
+ * see "doh-rollout.home-region": USA Feb 2020, Canada July 2021 [3]
+ * [1] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/
+ * [2] https://wiki.mozilla.org/Security/DOH-resolver-policy
+ * [3] https://blog.mozilla.org/en/mozilla/news/firefox-by-default-dns-over-https-rollout-in-canada/
+ * [4] https://www.eff.org/deeplinks/2020/12/dns-doh-and-odoh-oh-my-year-review-2020 ***/
+   // user_pref("network.trr.mode", 5);
 
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS ***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");

From 283bfd744ac1d7cb102e542b92b12f98d1a095b8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 29 Aug 2021 14:32:37 +0000
Subject: [PATCH 0912/1147] fixup missing 1022 reference

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 64dd2ba..cc7eb7b 100644
--- a/user.js
+++ b/user.js
@@ -935,7 +935,7 @@ user_pref("privacy.cpd.sessions", true); // Active Logins
 user_pref("privacy.cpd.siteSettings", false); // Site Preferences
 /* 2805: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
  * [NOTE] Not needed if Session Restore is not used (0102) or is already cleared with history (2803)
- * [NOTE] privacy.clearOnShutdown.openWindows prevents resuming from crashes (1022)
+ * [NOTE] privacy.clearOnShutdown.openWindows prevents resuming from crashes (also see 5008)
  * [NOTE] privacy.cpd.openWindows has a bug that causes an additional window to open ***/
    // user_pref("privacy.clearOnShutdown.openWindows", true);
    // user_pref("privacy.cpd.openWindows", true);

From 524823fd0524277d59aceedc3b7b051baf4e3b13 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 7 Sep 2021 13:35:32 +0000
Subject: [PATCH 0913/1147] proxy direct failover (#1247)

---
 user.js | 73 ++++++++++++++++++++++++++-------------------------------
 1 file changed, 33 insertions(+), 40 deletions(-)

diff --git a/user.js b/user.js
index cc7eb7b..8c27326 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 30 July 2021
-* version 91-alpha
+* date: 7 September 2021
+* version 91
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -337,6 +337,8 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
  * [3] https://blog.mozilla.org/en/mozilla/news/firefox-by-default-dns-over-https-rollout-in-canada/
  * [4] https://www.eff.org/deeplinks/2020/12/dns-doh-and-odoh-oh-my-year-review-2020 ***/
    // user_pref("network.trr.mode", 5);
+/* 0706: disable proxy direct failover for system requests [FF91+] ***/
+user_pref("network.proxy.failover_direct", false);
 
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS ***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
@@ -432,9 +434,7 @@ user_pref("network.auth.subresource-http-auth-allow", 1);
  * [1] https://support.mozilla.org/kb/windows-sso ***/
 user_pref("network.http.windows-sso.enabled", false); // [DEFAULT: false]
 
-/*** [SECTION 1000]: DISK AVOIDANCE
-   [NOTE] Cache is isolated with network partitioning (FF85+) or FPI
-***/
+/*** [SECTION 1000]: DISK AVOIDANCE ***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
 /* 1001: disable disk cache
  * [SETUP-CHROME] If you think disk cache helps perf, then feel free to override this
@@ -992,17 +992,14 @@ user_pref("privacy.firstparty.isolate", true);
 
    [WARNING] DO NOT USE extensions to alter RFP protected metrics
 
- FF41+
-    418986 - limit window.screen & CSS media queries leaking identifiable info
+    418986 - limit window.screen & CSS media queries (FF41)
       [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
- FF50+
-   1281949 - spoof screen orientation
-   1281963 - hide contents of navigator.plugins and navigator.mimeTypes
- FF55+
-   1330890 - spoof timezone as UTC0
-   1360039 - spoof navigator.hardwareConcurrency as 2
-   1217238 - reduce precision of time exposed by javascript
- FF56+
+   1281949 - spoof screen orientation (FF50)
+   1281963 - hide contents of navigator.plugins and navigator.mimeTypes (FF50-88)
+   1330890 - spoof timezone as UTC0 (FF55)
+   1360039 - spoof navigator.hardwareConcurrency as 2 (FF55)
+   1217238 - reduce precision of time exposed by javascript (FF55)
+ FF56
    1369303 - spoof/disable performance API
    1333651 - spoof User Agent & Navigator API
       JS: FF91+ the version is spoofed as ESR, and the OS as Windows 10, OS 10.15, Android 10, or Linux
@@ -1012,7 +1009,7 @@ user_pref("privacy.firstparty.isolate", true);
    1337161 - hide gamepads from content
    1372072 - spoof network information API as "unknown" when dom.netinfo.enabled = true
    1333641 - reduce fingerprinting in WebSpeech API
- FF57+
+ FF57
    1369309 - spoof media statistics
    1382499 - reduce screen co-ordinate fingerprinting in Touch API
    1217290 & 1409677 - enable some fingerprinting resistance for WebGL
@@ -1020,34 +1017,30 @@ user_pref("privacy.firstparty.isolate", true);
    1354633 - limit MediaError.message to a whitelist
    1382533 & 1697680 - enable fingerprinting resistance for Presentation API (FF57-87)
       Blocks exposure of local IP Addresses via mDNS (Multicast DNS)
- FF58+
-    967895 - spoof canvas and enable site permission prompt before allowing canvas data extraction
- FF59+
-   1372073 - spoof/block fingerprinting in MediaDevices API
+ FF58-90
+    967895 - spoof canvas and enable site permission prompt (FF58)
+   1372073 - spoof/block fingerprinting in MediaDevices API (FF59)
       Spoof: enumerate devices as one "Internal Camera" and one "Internal Microphone"
       Block: suppresses the ondevicechange event
-   1039069 - warn when language prefs are not set to "en*" (also see 0210, 0211)
-   1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events
+   1039069 - warn when language prefs are not set to "en*" (also see 0210, 0211) (FF59)
+   1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events (FF59)
       Spoofing mimics the content language of the document. Currently it only supports en-US.
       Modifier events suppressed are SHIFT and both ALT keys. Chrome is not affected.
- FF60-67
-   1337157 - disable WebGL debug renderer info (FF60+)
-   1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62+)
-   1479239 - return "no-preference" with prefers-reduced-motion (FF63+)
-   1363508 - spoof/suppress Pointer Events (FF64+)
-   1492766 - spoof pointerEvent.pointerid (FF65+)
-   1485266 - disable exposure of system colors to CSS or canvas (FF67+)
-   1494034 - return "light" with prefers-color-scheme (FF67+)
- FF68-77
-   1564422 - spoof audioContext outputLatency (FF70+)
-   1595823 - return audioContext sampleRate as 44100 (FF72+)
-   1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74+)
- FF78-90
-   1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78+)
-   1653987 - limit font visibility to bundled and "Base Fonts" (Windows, Mac, some Linux) (FF80+)
-   1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82+)
+   1337157 - disable WebGL debug renderer info (FF60)
+   1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62)
+   1479239 - return "no-preference" with prefers-reduced-motion (FF63)
+   1363508 - spoof/suppress Pointer Events (FF64)
+   1492766 - spoof pointerEvent.pointerid (FF65)
+   1485266 - disable exposure of system colors to CSS or canvas (FF67)
+   1494034 - return "light" with prefers-color-scheme (FF67)
+   1564422 - spoof audioContext outputLatency (FF70)
+   1595823 - return audioContext sampleRate as 44100 (FF72)
+   1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74)
+   1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78)
+   1653987 - limit font visibility to bundled and "Base Fonts" (Windows, Mac, some Linux) (FF80)
+   1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82)
  FF91+
-    531915 - use fdlibm's sin, cos and tan in jsmath (FF93+, ESR91.1+)
+    531915 - use fdlibm's sin, cos and tan in jsmath (FF93, ESR91.1)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]
@@ -1160,7 +1153,7 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
    // user_pref("browser.download.folderList", 2);
 
 /*** [SECTION 5500]: OPTIONAL HARDENING
-   Not recommended. Keep in mind that these can cause breakage, performance
+   Not recommended. Keep in mind that these can cause breakage and performance
    issues, are mostly fingerpintable, and the threat model is practically zero
 ***/
 user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");

From c9956d85b198ed400cf3b15a3254e1184d6722af Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 10 Sep 2021 04:32:09 +0000
Subject: [PATCH 0914/1147] 92-alpha

---
 user.js | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 8c27326..1711cc3 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 7 September 2021
-* version 91
+* date: 10 September 2021
+* version 92-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -781,7 +781,7 @@ user_pref("webchannel.allowObject.urlWhitelist", "");
  * [TEST] https://www.xn--80ak6aa92e.com/ (www.apple.com)
  * [1] https://wiki.mozilla.org/IDN_Display_Algorithm
  * [2] https://en.wikipedia.org/wiki/IDN_homograph_attack
- * [3] CVE-2017-5383: https://www.mozilla.org/security/advisories/mfsa2017-02/
+ * [3] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=punycode+firefox
  * [4] https://www.xudongz.com/blog/2017/idn-phishing/ ***/
 user_pref("network.IDN_show_punycode", true);
 /* 2620: enforce PDFJS, disable PDFJS scripting [SETUP-CHROME]
@@ -818,7 +818,7 @@ user_pref("browser.download.manager.addToRecentDocs", false);
  * [SETUP-CHROME] This will break extensions, language packs, themes and any other
  * XPI files which are installed outside of profile and application directories
  * [1] https://mike.kaply.com/2012/02/21/understanding-add-on-scopes/
- * [1] archived: https://archive.is/DYjAM ***/
+ * [1] https://archive.is/DYjAM (archived) ***/
 user_pref("extensions.enabledScopes", 5); // [HIDDEN PREF]
 user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
 /* 2661: disable bypassing 3rd party extension install prompts [FF82+]

From e5c128804cd4c89b2a624eb911edbc6de1b4ebb9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 10 Sep 2021 05:09:05 +0000
Subject: [PATCH 0915/1147] remove locale in link

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 1711cc3..89dcba1 100644
--- a/user.js
+++ b/user.js
@@ -334,7 +334,7 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
  * see "doh-rollout.home-region": USA Feb 2020, Canada July 2021 [3]
  * [1] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/
  * [2] https://wiki.mozilla.org/Security/DOH-resolver-policy
- * [3] https://blog.mozilla.org/en/mozilla/news/firefox-by-default-dns-over-https-rollout-in-canada/
+ * [3] https://blog.mozilla.org/mozilla/news/firefox-by-default-dns-over-https-rollout-in-canada/
  * [4] https://www.eff.org/deeplinks/2020/12/dns-doh-and-odoh-oh-my-year-review-2020 ***/
    // user_pref("network.trr.mode", 5);
 /* 0706: disable proxy direct failover for system requests [FF91+] ***/

From 76c1aad4be7b4f7fa462b8d93f3069c2c77c2bbd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 10 Sep 2021 13:07:04 +0000
Subject: [PATCH 0916/1147] grammar

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 89dcba1..81abd79 100644
--- a/user.js
+++ b/user.js
@@ -615,7 +615,7 @@ user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
    [4] https://github.com/stoically/temporary-containers/wiki
 ***/
 user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
-/* 1701: enable Container Tabs and it's UI setting [FF50+]
+/* 1701: enable Container Tabs and its UI setting [FF50+]
  * [SETTING] General>Tabs>Enable Container Tabs ***/
 user_pref("privacy.userContext.enabled", true);
 user_pref("privacy.userContext.ui.enabled", true);
@@ -680,7 +680,7 @@ user_pref("media.autoplay.blocking_policy", 2);
 user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
 /* 2302: disable service workers [FF32, FF44-compat]
  * Service workers essentially act as proxy servers that sit between web apps, and the
- * browser and network, are event driven, and can control the web page/site it is associated
+ * browser and network, are event driven, and can control the web page/site they are associated
  * with, intercepting and modifying navigation and resource requests, and caching resources.
  * [NOTE] Service workers require HTTPS, have no DOM access, and are not supported in PB mode [1]
  * [SETUP-WEB] Disabling service workers will break some sites. This pref is required true for

From 278336196c1d72bc83f3abd685d8ec78a8fec7a7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 11 Sep 2021 05:31:21 +0000
Subject: [PATCH 0917/1147] nit

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 81abd79..d513b1f 100644
--- a/user.js
+++ b/user.js
@@ -1306,7 +1306,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("gfx.downloadable_fonts.enabled", false); // [FF41+]
    // user_pref("gfx.downloadable_fonts.fallback_delay", -1);
 /* 7013: disable Clipboard API
- * [WHY] Fingerprintable. Breakage. They (cut/copy/paste) require user
+ * [WHY] Fingerprintable. Breakage. Cut/copy/paste require user
  * interaction, and paste is limited to focused editable fields ***/
    // user_pref("dom.event.clipboardevents.enabled", false);
 

From 1c6d63314411d2a0496f5547f4a1b46705dbc06a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 11 Sep 2021 05:35:39 +0000
Subject: [PATCH 0918/1147] more nits

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index d513b1f..e5710f9 100644
--- a/user.js
+++ b/user.js
@@ -245,7 +245,7 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
 /*** [SECTION 0400]: SAFE BROWSING (SB)
    SB has taken many steps to preserve privacy. If required, a full url is never sent
    to Google, only a part-hash of the prefix, hidden with noise of other real part-hashes.
-   Firefox takes measures such as striping out identifying parameters and since SBv4 (FF57+)
+   Firefox takes measures such as stripping out identifying parameters and since SBv4 (FF57+)
    doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
    FWIW, Google also swear it is anonymized and only used to flag malicious sites.
 
@@ -787,7 +787,7 @@ user_pref("network.IDN_show_punycode", true);
 /* 2620: enforce PDFJS, disable PDFJS scripting [SETUP-CHROME]
  * This setting controls if the option "Display in Firefox" is available in the setting below
  *   and by effect controls whether PDFs are handled in-browser or externally ("Ask" or "Open With")
- * PROS: pdfjs is lightweight, open source, and as secure/vetted more than most
+ * PROS: pdfjs is lightweight, open source, and more secure/vetted than most
  *   Exploits are rare (one serious case in seven years), treated seriously and patched quickly.
  *   It doesn't break "state separation" of browser content (by not sharing with OS, independent apps).
  *   It maintains disk avoidance and application data isolation. It's convenient. You can still save to disk.

From 044e3e76e8690934c5c89ce7969257b44bf38a6b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 25 Sep 2021 01:47:54 +0000
Subject: [PATCH 0919/1147] make 0706 more cromulent

---
 user.js | 6 ++++--
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index e5710f9..02221bc 100644
--- a/user.js
+++ b/user.js
@@ -337,8 +337,10 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
  * [3] https://blog.mozilla.org/mozilla/news/firefox-by-default-dns-over-https-rollout-in-canada/
  * [4] https://www.eff.org/deeplinks/2020/12/dns-doh-and-odoh-oh-my-year-review-2020 ***/
    // user_pref("network.trr.mode", 5);
-/* 0706: disable proxy direct failover for system requests [FF91+] ***/
-user_pref("network.proxy.failover_direct", false);
+/* 0706: disable proxy direct failover for system requests [FF91+]
+ * [WARNING] Default true is a security feature against malicious extensions
+ * [SETUP-CHROME] If you use a proxy and you trust your extensions ***/
+   // user_pref("network.proxy.failover_direct", false);
 
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS ***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");

From b37df0bcfe77ffb6521ec393a4087223fe9c4c3a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 25 Sep 2021 02:32:48 +0000
Subject: [PATCH 0920/1147] embiggen 4500, #1218

---
 user.js | 48 ++++++++++++++++++++++--------------------------
 1 file changed, 22 insertions(+), 26 deletions(-)

diff --git a/user.js b/user.js
index 02221bc..ccbb827 100644
--- a/user.js
+++ b/user.js
@@ -34,7 +34,7 @@
     ESR78
     - If you are not using arkenfox v78... (not a definitive list)
       - 1244: HTTPS-Only mode is enabled
-      - 2502: non-native widget theme is enforced
+      - 4511: non-native widget theme is enforced
       - 9999: switch the appropriate deprecated section(s) back on
 
 * INDEX:
@@ -55,7 +55,6 @@
   2000: PLUGINS / MEDIA / WEBRTC
   2300: WEB WORKERS
   2400: DOM (DOCUMENT OBJECT MODEL)
-  2500: FINGERPRINTING
   2600: MISCELLANEOUS
   2700: PERSISTENT STORAGE
   2800: SHUTDOWN
@@ -720,28 +719,6 @@ user_pref("dom.disable_open_during_load", true);
 /* 2404: limit events that can cause a popup [SETUP-WEB] ***/
 user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
 
-/*** [SECTION 2500]: FINGERPRINTING ***/
-user_pref("_user.js.parrot", "2500 syntax error: the parrot's shuffled off 'is mortal coil!");
-/* 2501: enforce no system colors
- * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
-user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
-/* 2502: enforce non-native widget theme
- * Security: removes/reduces system API calls, e.g. win32k API [1]
- * Fingerprinting: provides a uniform look and feel across platforms [2]
- * [1] https://bugzilla.mozilla.org/1381938
- * [2] https://bugzilla.mozilla.org/1411425 ***/
-user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true FF89+]
-/* 2503: open links targeting new windows in a new tab instead
- * Stops malicious window sizes and some screen resolution leaks.
- * You can still right-click a link and open in a new window
- * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
- * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
-user_pref("browser.link.open_newwindow", 3); // 1=most recent window or tab 2=new window, 3=new tab
-user_pref("browser.link.open_newwindow.restriction", 0);
-/* 2504: disable WebGL (Web Graphics Library)
- * [SETUP-WEB] If you need it then enable it. RFP still randomizes canvas for naive scripts ***/
-user_pref("webgl.disabled", true);
-
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
 /* 2601: prevent accessibility services from accessing your browser [RESTART]
@@ -1076,10 +1053,29 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
  * [1] https://bugzilla.mozilla.org/1635603 ***/
    // user_pref("privacy.resistFingerprinting.exemptedDomains", "*.example.invalid");
    // user_pref("privacy.resistFingerprinting.testGranularityMask", 0);
-/* 4510: disable showing about:blank as soon as possible during startup [FF60+]
+/* 4506: disable showing about:blank as soon as possible during startup [FF60+]
  * When default true this no longer masks the RFP chrome resizing activity
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
+/* 4510: enforce no system colors
+ * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
+user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
+/* 4511: enforce non-native widget theme
+ * Security: removes/reduces system API calls, e.g. win32k API [1]
+ * Fingerprinting: provides a uniform look and feel across platforms [2]
+ * [1] https://bugzilla.mozilla.org/1381938
+ * [2] https://bugzilla.mozilla.org/1411425 ***/
+user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true FF89+]
+/* 4512: open links targeting new windows in a new tab instead
+ * Stops malicious window sizes and some screen resolution leaks.
+ * You can still right-click a link and open in a new window
+ * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
+ * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
+user_pref("browser.link.open_newwindow", 3); // 1=most recent window or tab 2=new window, 3=new tab
+user_pref("browser.link.open_newwindow.restriction", 0);
+/* 4513: disable WebGL (Web Graphics Library)
+ * [SETUP-WEB] If you need it then enable it. RFP still randomizes canvas for naive scripts ***/
+user_pref("webgl.disabled", true);
 
 /*** [SECTION 5000]: OPTIONAL OPSEC
    Disk avoidance, application data isolation, eyeballs...
@@ -1398,7 +1394,7 @@ user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features",
    Documentation denoted as [-]. Items deprecated in FF78 or earlier have been archived at [1]
    [1] https://github.com/arkenfox/user.js/issues/123
 ***/
-user_pref("_user.js.parrot", "9999 syntax error: the parrot's deprecated!");
+user_pref("_user.js.parrot", "9999 syntax error: the parrot's shuffled off 'is mortal coil!");
 /* ESR78.x still uses all the following prefs
 // [NOTE] replace the * with a slash in the line above to re-enable them
 // FF79

From 5cdea955e779ef17df66187c6b0b4eb7f4aeb5cf Mon Sep 17 00:00:00 2001
From: a1346054 <36859588+a1346054@users.noreply.github.com>
Date: Mon, 27 Sep 2021 15:23:12 +0000
Subject: [PATCH 0921/1147] Simple maintenance improvements (#1255)

* Use direct check for existence of file

* Fix shellcheck warnings

* Unify codestyle in scripts

* Trim excess whitespace
---
 README.md                                     |  4 +-
 prefsCleaner.sh                               |  6 +-
 .../arkenfox-clear-RFP-alternatives.js        |  3 +-
 scratchpad-scripts/troubleshooter.js          |  3 +-
 updater.sh                                    | 62 +++++++++----------
 5 files changed, 37 insertions(+), 41 deletions(-)

diff --git a/README.md b/README.md
index 39ddaa1..1522a3e 100644
--- a/README.md
+++ b/README.md
@@ -9,7 +9,7 @@ The `arkenfox user.js` is a **template** which aims to provide as much privacy a
 
 Everyone, experts included, should at least read the [implementation](https://github.com/arkenfox/user.js/wiki/1.3-Implementation) wiki page, as it contains important information regarding a few `user.js` settings.
 
-Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) if your [threat model](https://www.torproject.org/about/torusers.html.en) calls for it, or for accessing hidden services. 
+Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) if your [threat model](https://www.torproject.org/about/torusers.html.en) calls for it, or for accessing hidden services.
 
 Also be aware that the `arkenfox user.js` is made specifically for desktop Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.
 
@@ -23,5 +23,3 @@ Also be aware that the `arkenfox user.js` is made specifically for desktop Firef
 
 ### 🟥  acknowledgments
 Literally thousands of sources, references and suggestions. Many thanks, and much appreciated.
-
-
diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index 60cf70e..497ebde 100644
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -20,7 +20,7 @@ cd "$(dirname "${sfp}")"
 fQuit() {
 	## change directory back to the original working directory
 	cd "${currdir}"
-	[ $1 -eq 0 ] && echo -e "\n$2" || echo -e "\n$2" >&2
+	[ "$1" -eq 0 ] && echo -e "\n$2" || echo -e "\n$2" >&2
 	exit $1
 }
 
@@ -36,7 +36,7 @@ fFF_check() {
 	# this isn't elegant and might not be future-proof but should at least be compatible with any environment
 	while [ -e lock ]; do
 		echo -e "\nThis Firefox profile seems to be in use. Close Firefox and try again.\n" >&2
-		read -p "Press any key to continue."
+		read -r -p "Press any key to continue."
 	done
 }
 
@@ -48,7 +48,7 @@ fClean() {
 		if [[ "$line" =~ $prefexp && $prefs != *"@@${BASH_REMATCH[1]}@@"* ]]; then
 			prefs="${prefs}${BASH_REMATCH[1]}@@"
 		fi
-	done <<< "`grep -E \"$prefexp\" user.js`"
+	done <<< "$(grep -E \"$prefexp\" user.js)"
 
 	while IFS='' read -r line || [[ -n "$line" ]]; do
 		if [[ "$line" =~ ^$prefexp ]]; then
diff --git a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js b/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
index 9d251d4..4821fc3 100644
--- a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
+++ b/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
@@ -7,7 +7,7 @@
 
   As of v91, section 4600 is no longer recommended, and is all inactive. This
   now includes the old 4700 section. You can reset them using prefsCleaner.
-  
+
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
 ***/
@@ -69,4 +69,3 @@
   return 'all done';
 
 })();
-
diff --git a/scratchpad-scripts/troubleshooter.js b/scratchpad-scripts/troubleshooter.js
index be64708..bd86786 100644
--- a/scratchpad-scripts/troubleshooter.js
+++ b/scratchpad-scripts/troubleshooter.js
@@ -1,4 +1,3 @@
-
 /*** arkenfox user.js troubleshooter.js v1.6.3 ***/
 
 (function() {
@@ -194,7 +193,7 @@
 
   const aBAK = getMyList(aPREFS);
   //console.log(aBAK.length, "user-set prefs from our list detected and their values stored.");
-  
+
   const sMsg = "all detected prefs reset.\n\n" +
         "!! KEEP THIS PROMPT OPEN AND TEST THE SITE IN ANOTHER TAB !!\n\n" +
         "IF the problem still exists, this script can't help you - click Cancel to re-apply your values and exit.\n\n" +
diff --git a/updater.sh b/updater.sh
index 6f761c9..a1f7070 100755
--- a/updater.sh
+++ b/updater.sh
@@ -41,9 +41,9 @@ ESR=false
 
 # Download method priority: curl -> wget
 DOWNLOAD_METHOD=''
-if [[ $(command -v 'curl') ]]; then
+if command -v curl >/dev/null; then
   DOWNLOAD_METHOD='curl --max-redirs 3 -so'
-elif [[ $(command -v 'wget') ]]; then
+elif command -v wget >/dev/null; then
   DOWNLOAD_METHOD='wget --max-redirect 3 --quiet -O'
 else
   echo -e "${RED}This script requires curl or wget.\nProcess aborted${NC}"
@@ -51,7 +51,7 @@ else
 fi
 
 
-show_banner () {
+show_banner() {
   echo -e "${BBLUE}
                 ############################################################################
                 ####                                                                    ####
@@ -103,13 +103,13 @@ Optional Arguments:
 #     File Handling     #
 #########################
 
-download_file () { # expects URL as argument ($1)
+download_file() { # expects URL as argument ($1)
   declare -r tf=$(mktemp)
 
   $DOWNLOAD_METHOD "${tf}" "$1" && echo "$tf" || echo '' # return the temp-filename or empty string on error
 }
 
-open_file () { # expects one argument: file_path
+open_file() { # expects one argument: file_path
   if [ "$(uname)" == 'Darwin' ]; then
     open "$1"
   elif [ "$(uname -s | cut -c -5)" == "Linux" ]; then
@@ -119,11 +119,11 @@ open_file () { # expects one argument: file_path
   fi
 }
 
-readIniFile () { # expects one argument: absolute path of profiles.ini
+readIniFile() { # expects one argument: absolute path of profiles.ini
   declare -r inifile="$1"
 
   # tempIni will contain: [ProfileX], Name=, IsRelative= and Path= (and Default= if present) of the only (if) or the selected (else) profile
-  if [ $(grep -c '^\[Profile' "${inifile}") -eq "1" ]; then ### only 1 profile found
+  if [ "$(grep -c '^\[Profile' "${inifile}")" -eq "1" ]; then ### only 1 profile found
     tempIni="$(grep '^\[Profile' -A 4 "${inifile}")"
   else
     echo -e "Profiles found:\n––––––––––––––––––––––––––––––"
@@ -150,7 +150,7 @@ readIniFile () { # expects one argument: absolute path of profiles.ini
   [[ ${pathisrel} == "1" ]] && PROFILE_PATH="$(dirname "${inifile}")/${PROFILE_PATH}"
 }
 
-getProfilePath () {
+getProfilePath() {
   declare -r f1=~/Library/Application\ Support/Firefox/profiles.ini
   declare -r f2=~/.mozilla/firefox/profiles.ini
 
@@ -175,8 +175,8 @@ getProfilePath () {
 #########################
 
 # Returns the version number of a updater.sh file
-get_updater_version () {
-  echo $(sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p' "$1")
+get_updater_version() {
+  echo "$(sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p' "$1")"
 }
 
 # Update updater.sh
@@ -184,14 +184,14 @@ get_updater_version () {
 # Args:
 #   -d: New version will not be looked for and update will not occur
 #   -u: Check for update, if available, execute without asking
-update_updater () {
-  [ $UPDATE = 'no' ] && return 0 # User signified not to check for updates
+update_updater() {
+  [ "$UPDATE" = 'no' ] && return 0 # User signified not to check for updates
 
   declare -r tmpfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/updater.sh')"
   [ -z "${tmpfile}" ] && echo -e "${RED}Error! Could not download updater.sh${NC}" && return 1 # check if download failed
 
   if [[ $(get_updater_version "$SCRIPT_FILE") < $(get_updater_version "${tmpfile}") ]]; then
-    if [ $UPDATE = 'check' ]; then
+    if [ "$UPDATE" = 'check' ]; then
       echo -e "There is a newer version of updater.sh available. ${RED}Update and execute Y/N?${NC}"
       read -p "" -n 1 -r
       echo -e "\n\n"
@@ -211,11 +211,11 @@ update_updater () {
 #########################
 
 # Returns version number of a user.js file
-get_userjs_version () {
-  [ -e $1 ] && echo "$(sed -n '4p' "$1")" || echo "Not detected."
+get_userjs_version() {
+  [ -e "$1" ] && echo "$(sed -n '4p' "$1")" || echo "Not detected."
 }
 
-add_override () {
+add_override() {
   input=$1
   if [ -f "$input" ]; then
     echo "" >> user.js
@@ -235,27 +235,27 @@ add_override () {
   fi
 }
 
-remove_comments () { # expects 2 arguments: from-file and to-file
+remove_comments() { # expects 2 arguments: from-file and to-file
   sed -e '/^\/\*.*\*\/[[:space:]]*$/d' -e '/^\/\*/,/\*\//d' -e 's|^[[:space:]]*//.*$||' -e '/^[[:space:]]*$/d' -e 's|);[[:space:]]*//.*|);|' "$1" > "$2"
 }
 
 # Applies latest version of user.js and any custom overrides
-update_userjs () {
+update_userjs() {
   declare -r newfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/user.js')"
   [ -z "${newfile}" ] && echo -e "${RED}Error! Could not download user.js${NC}" && return 1 # check if download failed
 
   echo -e "Please observe the following information:
     Firefox profile:  ${ORANGE}$(pwd)${NC}
-    Available online: ${ORANGE}$(get_userjs_version $newfile)${NC}
+    Available online: ${ORANGE}$(get_userjs_version "$newfile")${NC}
     Currently using:  ${ORANGE}$(get_userjs_version user.js)${NC}\n\n"
 
-  if [ $CONFIRM = 'yes' ]; then
+  if [ "$CONFIRM" = 'yes' ]; then
     echo -e "This script will update to the latest user.js file and append any custom configurations from user-overrides.js. ${RED}Continue Y/N? ${NC}"
     read -p "" -n 1 -r
     echo -e "\n"
     if [[ $REPLY =~ ^[Nn]$ ]]; then
       echo -e "${RED}Process aborted${NC}"
-      rm $newfile
+      rm "$newfile"
       return 1
     fi
   fi
@@ -269,7 +269,7 @@ update_userjs () {
   # backup user.js
   mkdir -p userjs_backups
   local bakname="userjs_backups/user.js.backup.$(date +"%Y-%m-%d_%H%M")"
-  [ $BACKUP = 'single' ] && bakname='userjs_backups/user.js.backup'
+  [ "$BACKUP" = 'single' ] && bakname='userjs_backups/user.js.backup'
   cp user.js "$bakname" &>/dev/null
 
   mv "${newfile}" user.js
@@ -295,19 +295,19 @@ update_userjs () {
     past_nocomments='userjs_diffs/past_userjs.txt'
     current_nocomments='userjs_diffs/current_userjs.txt'
 
-    remove_comments $pastuserjs $past_nocomments
-    remove_comments user.js $current_nocomments
+    remove_comments "$pastuserjs" "$past_nocomments"
+    remove_comments user.js "$current_nocomments"
 
     diffname="userjs_diffs/diff_$(date +"%Y-%m-%d_%H%M").txt"
-    diff=$(diff -w -B -U 0 $past_nocomments $current_nocomments)
-    if [ ! -z "$diff" ]; then
+    diff=$(diff -w -B -U 0 "$past_nocomments" "$current_nocomments")
+    if [ -n "$diff" ]; then
       echo "$diff" > "$diffname"
       echo -e "Status: ${GREEN}A diff file was created:${NC} ${PWD}/${diffname}"
     else
       echo -e "Warning: ${ORANGE}Your new user.js file appears to be identical.  No diff file was created.${NC}"
-      [ $BACKUP = 'multiple' ] && rm $bakname &>/dev/null
+      [ "$BACKUP" = 'multiple' ] && rm "$bakname" &>/dev/null
     fi
-    rm $past_nocomments $current_nocomments $pastuserjs &>/dev/null
+    rm "$past_nocomments" "$current_nocomments" "$pastuserjs" &>/dev/null
   fi
 
   [ "$VIEW" = true ] && open_file "${PWD}/user.js"
@@ -319,7 +319,7 @@ update_userjs () {
 
 if [ $# != 0 ]; then
   # Display usage if first argument is -help or --help
-  if [ $1 = '--help' ] || [ $1 = '-help' ]; then
+  if [ "$1" = '--help' ] || [ "$1" = '-help' ]; then
     usage
   else
     while getopts ":hp:ludsno:bcvre" opt; do
@@ -363,7 +363,7 @@ if [ $# != 0 ]; then
         r)
           tfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/user.js')"
           [ -z "${tfile}" ] && echo -e "${RED}Error! Could not download user.js${NC}" && exit 1 # check if download failed
-          mv $tfile "${tfile}.js"
+          mv "$tfile" "${tfile}.js"
           echo -e "${ORANGE}Warning: user.js was saved to temporary file ${tfile}.js${NC}"
           open_file "${tfile}.js"
           exit 0
@@ -382,7 +382,7 @@ if [ $# != 0 ]; then
 fi
 
 show_banner
-update_updater $@
+update_updater "$@"
 
 getProfilePath # updates PROFILE_PATH or exits on error
 cd "$PROFILE_PATH" && update_userjs

From 6381b1aeb9e7e4e485f4f6e7faa37d7f00b7970f Mon Sep 17 00:00:00 2001
From: a1346054 <36859588+a1346054@users.noreply.github.com>
Date: Tue, 28 Sep 2021 19:24:54 +0000
Subject: [PATCH 0922/1147] prefsCleaner.sh: Fix invalid regular expression
 (#1258)

---
 prefsCleaner.sh | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index 497ebde..7db9ef0 100644
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -48,7 +48,7 @@ fClean() {
 		if [[ "$line" =~ $prefexp && $prefs != *"@@${BASH_REMATCH[1]}@@"* ]]; then
 			prefs="${prefs}${BASH_REMATCH[1]}@@"
 		fi
-	done <<< "$(grep -E \"$prefexp\" user.js)"
+	done <<< "$(grep -E "$prefexp" user.js)"
 
 	while IFS='' read -r line || [[ -n "$line" ]]; do
 		if [[ "$line" =~ ^$prefexp ]]; then

From 8404e8a59c6c54142594f6a856bb50b46227b130 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 5 Oct 2021 03:04:14 +0000
Subject: [PATCH 0923/1147] tidy, closes #1260

---
 user.js | 22 ++++++++++++++--------
 1 file changed, 14 insertions(+), 8 deletions(-)

diff --git a/user.js b/user.js
index ccbb827..f64d4a4 100644
--- a/user.js
+++ b/user.js
@@ -131,7 +131,8 @@ user_pref("browser.region.update.enabled", false); // [[FF79+]
 /* 0204: set search region
  * [NOTE] May not be hidden if Firefox has changed your settings due to your region (0203) ***/
    // user_pref("browser.search.region", "US"); // [HIDDEN PREF]
-/* 0210: set preferred language for displaying web pages
+/* 0210: set preferred language for displaying pages
+ * [SETTING] General>Language and Appearance>Language>Choose your preferred language...
  * [TEST] https://addons.mozilla.org/about ***/
 user_pref("intl.accept_languages", "en-US, en");
 /* 0211: use US English locale regardless of the system locale
@@ -495,13 +496,14 @@ user_pref("security.tls.enable_0rtt_data", false);
    [1] https://scotthelme.co.uk/revocation-is-broken/
    [2] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/
 ***/
-/* 1211: control when to use OCSP fetching (to confirm current validity of certificates)
+/* 1211: enforce OCSP fetching to confirm current validity of certificates
  * 0=disabled, 1=enabled (default), 2=enabled for EV certificates only
  * OCSP (non-stapled) leaks information about the sites you visit to the CA (cert authority)
  * It's a trade-off between security (checking) and privacy (leaking info to the CA)
  * [NOTE] This pref only controls OCSP fetching and does not affect OCSP stapling
+ * [SETTING] Privacy & Security>Security>Certificates>Query OCSP responder servers...
  * [1] https://en.wikipedia.org/wiki/Ocsp ***/
-user_pref("security.OCSP.enabled", 1);
+user_pref("security.OCSP.enabled", 1); // [DEFAULT: true]
 /* 1212: set OCSP fetch failures (non-stapled, see 1211) to hard-fail [SETUP-WEB]
  * When a CA cannot be reached to validate a cert, Firefox just continues the connection (=soft-fail)
  * Setting this pref to true tells Firefox to instead terminate the connection (=hard-fail)
@@ -527,7 +529,7 @@ user_pref("security.pki.sha1_enforcement_level", 1);
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21686 ***/
 user_pref("security.family_safety.mode", 0);
 /* 1223: enable strict pinning
- * PKP (Public Key Pinning) 0=disabled 1=allow user MiTM (such as your antivirus), 2=strict
+ * PKP (Public Key Pinning) 0=disabled, 1=allow user MiTM (such as your antivirus), 2=strict
  * [SETUP-WEB] If you rely on an AV (antivirus) to protect your web browsing
  * by inspecting ALL your web traffic, then leave at current default=1
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16206 ***/
@@ -566,7 +568,7 @@ user_pref("dom.security.https_only_mode_send_http_background_request", false);
  * [2] https://bugzilla.mozilla.org/1353705 ***/
 user_pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
 /* 1271: control "Add Security Exception" dialog on SSL warnings
- * 0=do neither 1=pre-populate url 2=pre-populate url + pre-fetch cert (default)
+ * 0=do neither, 1=pre-populate url, 2=pre-populate url + pre-fetch cert (default)
  * [1] https://github.com/pyllyukko/user.js/issues/210 ***/
 user_pref("browser.ssl_override_behavior", 1);
 /* 1272: display advanced information on Insecure Connection warning pages
@@ -1066,14 +1068,18 @@ user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
  * [1] https://bugzilla.mozilla.org/1381938
  * [2] https://bugzilla.mozilla.org/1411425 ***/
 user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true FF89+]
-/* 4512: open links targeting new windows in a new tab instead
+/* 4512: enforce links targeting new windows to open in a new tab instead
+ * 1=most recent window or tab, 2=new window, 3=new tab
  * Stops malicious window sizes and some screen resolution leaks.
  * You can still right-click a link and open in a new window
+ * [SETTING] General>Tabs>Open links in tabs instead of new windows
  * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
-user_pref("browser.link.open_newwindow", 3); // 1=most recent window or tab 2=new window, 3=new tab
+user_pref("browser.link.open_newwindow", 3); // [DEFAULT: 3]
+/* 4513: set all open window methods to abide by "browser.link.open_newwindow" (4512)
+ * [1] https://searchfox.org/mozilla-central/source/dom/tests/browser/browser_test_new_window_from_content.js ***/
 user_pref("browser.link.open_newwindow.restriction", 0);
-/* 4513: disable WebGL (Web Graphics Library)
+/* 4520: disable WebGL (Web Graphics Library)
  * [SETUP-WEB] If you need it then enable it. RFP still randomizes canvas for naive scripts ***/
 user_pref("webgl.disabled", true);
 

From 380a88ee57a3af1fd3accf023b31e7e46f9ea855 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 5 Oct 2021 11:14:16 +0000
Subject: [PATCH 0924/1147] oophs

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index f64d4a4..7fcd110 100644
--- a/user.js
+++ b/user.js
@@ -503,7 +503,7 @@ user_pref("security.tls.enable_0rtt_data", false);
  * [NOTE] This pref only controls OCSP fetching and does not affect OCSP stapling
  * [SETTING] Privacy & Security>Security>Certificates>Query OCSP responder servers...
  * [1] https://en.wikipedia.org/wiki/Ocsp ***/
-user_pref("security.OCSP.enabled", 1); // [DEFAULT: true]
+user_pref("security.OCSP.enabled", 1); // [DEFAULT: 1]
 /* 1212: set OCSP fetch failures (non-stapled, see 1211) to hard-fail [SETUP-WEB]
  * When a CA cannot be reached to validate a cert, Firefox just continues the connection (=soft-fail)
  * Setting this pref to true tells Firefox to instead terminate the connection (=hard-fail)

From 412c8f9f94fcc058b9bf5f7dfbd824a1255a51a9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 9 Oct 2021 07:14:20 +0000
Subject: [PATCH 0925/1147] 0807 urlbar contextual suggestions, #1257

---
 user.js | 13 +++++++++----
 1 file changed, 9 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 7fcd110..2d470a5 100644
--- a/user.js
+++ b/user.js
@@ -375,18 +375,23 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
  * 0=never resolve single words, 1=heuristic (default), 2=always resolve
  * [1] https://bugzilla.mozilla.org/1642623 ***/
 user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
-/* 0807: disable tab-to-search [FF85+]
+/* 0807: disable location bar contextual suggestions [FF92+]
+ * [SETTING] Privacy & Security>Address Bar>Contextual Suggestions
+ * [1] https://blog.mozilla.org/data/2021/09/15/data-and-firefox-suggest/ ***/
+user_pref("browser.urlbar.suggest.quicksuggest", false);
+user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false);
+/* 0808: disable tab-to-search [FF85+]
  * Alternatively, you can exclude on a per-engine basis by unchecking them in Options>Search
  * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest>Search engines ***/
    // user_pref("browser.urlbar.suggest.engines", false);
-/* 0808: disable search and form history
+/* 0810: disable search and form history
  * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
  * [NOTE] We also clear formdata on exit (2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
  * [2] https://bugzilla.mozilla.org/381681 ***/
 user_pref("browser.formfill.enable", false);
-/* 0809: disable Form Autofill
+/* 0811: disable Form Autofill
  * [NOTE] Stored data is NOT secure (uses a JSON file)
  * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
  * [SETTING] Privacy & Security>Forms and Autofill>Autofill addresses
@@ -396,7 +401,7 @@ user_pref("extensions.formautofill.available", "off"); // [FF56+]
 user_pref("extensions.formautofill.creditCards.available", false); // [FF57+]
 user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
 user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
-/* 0810: disable coloring of visited links
+/* 0820: disable coloring of visited links
  * [SETUP-HARDEN] Bulk rapid history sniffing was mitigated in 2010 [1][2]. Slower and more expensive
  * redraw timing attacks were largely mitigated in FF77+ [3]. Using RFP (4501) further hampers timing
  * attacks. Don't forget clearing history on close (2803). However, social engineering [2#limits][4][5]

From 535346df87879d5526d7f6325db3f84baf6d7b33 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 10 Oct 2021 23:55:39 +0000
Subject: [PATCH 0926/1147] Delete arkenfox-clear-RFP-alternatives.js

---
 .../arkenfox-clear-RFP-alternatives.js        | 71 -------------------
 1 file changed, 71 deletions(-)
 delete mode 100644 scratchpad-scripts/arkenfox-clear-RFP-alternatives.js

diff --git a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js b/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
deleted file mode 100644
index 4821fc3..0000000
--- a/scratchpad-scripts/arkenfox-clear-RFP-alternatives.js
+++ /dev/null
@@ -1,71 +0,0 @@
-/***
-  This will reset the preferences that are under sections 4600 & 4700 in the
-  arkenfox user.js. These are the prefs that are no longer necessary, or they
-  conflict with, privacy.resistFingerprinting if you have that enabled.
-
-  Final update: 10-August-2021
-
-  As of v91, section 4600 is no longer recommended, and is all inactive. This
-  now includes the old 4700 section. You can reset them using prefsCleaner.
-
-  For instructions see:
-  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
-***/
-
-(() => {
-
-  if ('undefined' === typeof(Services)) return alert('about:config needs to be the active tab!');
-
-  const aPREFS = [
-    /* section 4600 */
-    'dom.maxHardwareConcurrency',
-    'dom.enable_resource_timing',
-    'dom.enable_performance',
-    'device.sensors.enabled',
-    'browser.zoom.siteSpecific',
-    'dom.gamepad.enabled',
-    'dom.netinfo.enabled',
-    'media.webspeech.synth.enabled',
-    'media.video_stats.enabled',
-    'dom.w3c_touch_events.enabled',
-    'media.navigator.enabled',
-    'media.ondevicechange.enabled',
-    'webgl.enable-debug-renderer-info',
-    'ui.prefersReducedMotion',
-    'dom.w3c_pointer_events.enabled', // deprecated FF87
-    'ui.use_standins_for_native_colors',
-    'ui.systemUsesDarkTheme',
-    'dom.webaudio.enabled',
-    'layout.css.font-visibility.level',
-    /* section 4700 */
-    'general.appname.override',
-    'general.appversion.override',
-    'general.buildID.override',
-    'general.oscpu.override',
-    'general.platform.override',
-    'general.useragent.override',
-    /* reset parrot: check your open about:config after running the script */
-    '_user.js.parrot'
-  ];
-
-  console.clear();
-
-  let c = 0;
-  for (const sPname of aPREFS) {
-    if (Services.prefs.prefHasUserValue(sPname)) {
-      Services.prefs.clearUserPref(sPname);
-      if (!Services.prefs.prefHasUserValue(sPname)) {
-        console.info('reset', sPname);
-        c++;
-      } else console.warn('failed to reset', sPname);
-    }
-  }
-
-  focus();
-
-  const d = (c==1) ? ' pref' : ' prefs';
-  alert(c ? 'successfully reset ' + c + d + "\n\nfor details check the console" : 'nothing to reset');
-
-  return 'all done';
-
-})();

From a764149520fdd2082b3efa5b74f1d5250d4b9ac0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 11 Oct 2021 13:56:38 +0000
Subject: [PATCH 0927/1147] v92

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 2d470a5..6e436be 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 10 September 2021
-* version 92-alpha
+* date: 11 October 2021
+* version 92
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From 85438d00e457bff692303af519da618c6372476b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 12 Oct 2021 08:23:46 +0000
Subject: [PATCH 0928/1147] v93 deprecated

---
 user.js | 13 ++++++++++---
 1 file changed, 10 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 6e436be..4e297a5 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 11 October 2021
-* version 92
+* date: 12 October 2021
+* version 93
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -1272,7 +1272,6 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("security.ssl3.rsa_aes_256_gcm_sha384", false); // no PFS
    // user_pref("security.ssl3.rsa_aes_128_sha", false); // no PFS
    // user_pref("security.ssl3.rsa_aes_256_sha", false); // no PFS
-   // user_pref("security.ssl3.rsa_des_ede3_sha", false); // 3DES
 /* 7004: control TLS versions
  * [WHY] Passive fingerprinting. Downgrades are still possible: behind user interaction ***/
    // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
@@ -1406,6 +1405,14 @@ user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features",
    [1] https://github.com/arkenfox/user.js/issues/123
 ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's shuffled off 'is mortal coil!");
+/* ESR91.x still uses all the following prefs
+// [NOTE] replace the * with a slash in the line above to re-enable them
+// FF93
+// 7003: disable non-modern cipher suites
+   // [-] https://bugzilla.mozilla.org/1724072
+   // user_pref("security.ssl3.rsa_des_ede3_sha", false); // 3DES
+// ***/
+
 /* ESR78.x still uses all the following prefs
 // [NOTE] replace the * with a slash in the line above to re-enable them
 // FF79

From 7d68a3297147d7878a14defe0d10a560252d7fd3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 25 Oct 2021 17:41:16 +0000
Subject: [PATCH 0929/1147] start 94-alpha

- and remove obsolete ESR78 notations
- note: we leave the deprecated ESR78.x section and item 6050 until v95 so users upgrading to ESR91 can easily reset those prefs with prefsCleaner
---
 user.js | 35 ++++++++++++++---------------------
 1 file changed, 14 insertions(+), 21 deletions(-)

diff --git a/user.js b/user.js
index 4e297a5..7aa3002 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 12 October 2021
-* version 93
+* date: 25 October 2021
+* version 94-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -31,10 +31,8 @@
   * It is best to use the arkenfox release that is optimized for and matches your Firefox version
   * EVERYONE: each release
     - run prefsCleaner to reset prefs made inactive, including deprecated (9999s)
-    ESR78
-    - If you are not using arkenfox v78... (not a definitive list)
-      - 1244: HTTPS-Only mode is enabled
-      - 4511: non-native widget theme is enforced
+    ESR91
+    - If you are not using arkenfox v91... (not a definitive list)
       - 9999: switch the appropriate deprecated section(s) back on
 
 * INDEX:
@@ -104,7 +102,7 @@ user_pref("browser.newtab.preload", false);
  * [SETTING] Home>Firefox Home Content>...  to show/hide what you want ***/
 user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
 user_pref("browser.newtabpage.activity-stream.telemetry", false);
-user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // [DEFAULT: false FF89+]
+user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // [DEFAULT: false]
 user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
 user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
 user_pref("browser.newtabpage.activity-stream.showSponsored", false);
@@ -127,7 +125,7 @@ user_pref("geo.provider.use_gpsd", false); // [LINUX]
 /* 0203: disable region updates
  * [1] https://firefox-source-docs.mozilla.org/toolkit/modules/toolkit_modules/Region.html ***/
 user_pref("browser.region.network.url", ""); // [FF78+]
-user_pref("browser.region.update.enabled", false); // [[FF79+]
+user_pref("browser.region.update.enabled", false); // [FF79+]
 /* 0204: set search region
  * [NOTE] May not be hidden if Firefox has changed your settings due to your region (0203) ***/
    // user_pref("browser.search.region", "US"); // [HIDDEN PREF]
@@ -321,13 +319,12 @@ user_pref("network.proxy.socks_remote_dns", true);
  * [SETUP-CHROME] Can break extensions for profiles on network shares
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/26424 ***/
 user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
-/* 0704: disable GIO as a potential proxy bypass vector
+/* 0704: disable GIO as a potential proxy bypass vector [FF60+]
  * Gvfs/GIO has a set of supported protocols like obex, network, archive, computer, dav, cdda,
  * gphoto2, trash, etc. By default only smb and sftp protocols are accepted so far (as of FF64)
  * [1] https://bugzilla.mozilla.org/1433507
- * [2] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/23044
- * [3] https://en.wikipedia.org/wiki/GVfs
- * [4] https://en.wikipedia.org/wiki/GIO_(software) ***/
+ * [2] https://en.wikipedia.org/wiki/GVfs
+ * [3] https://en.wikipedia.org/wiki/GIO_(software) ***/
 user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
 /* 0705: disable DNS-over-HTTPS (DoH) rollout [FF60+]
  * 0=off by default, 2=TRR (Trusted Recursive Resolver) first, 3=TRR only, 5=explicitly off
@@ -729,7 +726,6 @@ user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
 /* 2601: prevent accessibility services from accessing your browser [RESTART]
- * [SETTING] Privacy & Security>Permissions>Prevent accessibility services from accessing your browser (FF80 or lower)
  * [1] https://support.mozilla.org/kb/accessibility-services ***/
 user_pref("accessibility.force_disabled", 1);
 /* 2602: disable sending additional analytics to web servers
@@ -981,14 +977,13 @@ user_pref("privacy.firstparty.isolate", true);
     418986 - limit window.screen & CSS media queries (FF41)
       [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
    1281949 - spoof screen orientation (FF50)
-   1281963 - hide contents of navigator.plugins and navigator.mimeTypes (FF50-88)
    1330890 - spoof timezone as UTC0 (FF55)
    1360039 - spoof navigator.hardwareConcurrency as 2 (FF55)
    1217238 - reduce precision of time exposed by javascript (FF55)
  FF56
    1369303 - spoof/disable performance API
    1333651 - spoof User Agent & Navigator API
-      JS: FF91+ the version is spoofed as ESR, and the OS as Windows 10, OS 10.15, Android 10, or Linux
+      JS: the version is spoofed as ESR, and the OS as Windows 10, OS 10.15, Android 10, or Linux
       HTTP Headers: spoofed as Windows or Android
    1369319 - disable device sensor API
    1369357 - disable site specific zoom
@@ -1001,8 +996,6 @@ user_pref("privacy.firstparty.isolate", true);
    1217290 & 1409677 - enable some fingerprinting resistance for WebGL
    1382545 - reduce fingerprinting in Animation API
    1354633 - limit MediaError.message to a whitelist
-   1382533 & 1697680 - enable fingerprinting resistance for Presentation API (FF57-87)
-      Blocks exposure of local IP Addresses via mDNS (Multicast DNS)
  FF58-90
     967895 - spoof canvas and enable site permission prompt (FF58)
    1372073 - spoof/block fingerprinting in MediaDevices API (FF59)
@@ -1072,7 +1065,7 @@ user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
  * Fingerprinting: provides a uniform look and feel across platforms [2]
  * [1] https://bugzilla.mozilla.org/1381938
  * [2] https://bugzilla.mozilla.org/1411425 ***/
-user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true FF89+]
+user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true]
 /* 4512: enforce links targeting new windows to open in a new tab instead
  * 1=most recent window or tab, 2=new window, 3=new tab
  * Stops malicious window sizes and some screen resolution leaks.
@@ -1215,12 +1208,12 @@ user_pref("security.csp.enable", true); // [DEFAULT: true]
 user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
 /* 6005: enforce window.opener protection [FF65+]
  * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
-user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true FF79+]
+user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true]
 /* 6006: enforce "window.name" protection [FF82+]
  * If a new page from another domain is loaded into a tab, then window.name is set to an empty string. The original
  * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks
  * [TEST] https://arkenfox.github.io/TZP/tests/windownamea.html ***/
-user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+]
+user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true]
 /* 6050: prefsCleaner: reset previously active items removed from arkenfox in 79-91 ***/
    // user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
    // user_pref("browser.send_pings.require_same_host", "");
@@ -1291,7 +1284,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
 /* 7008: set the default Referrer Policy [FF59+]
  * 0=no-referer, 1=same-origin, 2=strict-origin-when-cross-origin, 3=no-referrer-when-downgrade
  * [WHY] Defaults are fine. They can be overridden by a site-controlled Referrer Policy ***/
-   // user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2 FF87+]
+   // user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2]
    // user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
 /* 7009: disable HTTP2
  * [WHY] Passive fingerprinting. ~50% of sites use HTTP2 [1]

From 094356e0739bfeae95775384d45cb01f7132c9f1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 25 Oct 2021 20:56:18 +0000
Subject: [PATCH 0930/1147] 0706: add reference

---
 user.js | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 7aa3002..553bea9 100644
--- a/user.js
+++ b/user.js
@@ -335,8 +335,9 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
  * [4] https://www.eff.org/deeplinks/2020/12/dns-doh-and-odoh-oh-my-year-review-2020 ***/
    // user_pref("network.trr.mode", 5);
 /* 0706: disable proxy direct failover for system requests [FF91+]
- * [WARNING] Default true is a security feature against malicious extensions
- * [SETUP-CHROME] If you use a proxy and you trust your extensions ***/
+ * [WARNING] Default true is a security feature against malicious extensions [1]
+ * [SETUP-CHROME] If you use a proxy and you trust your extensions
+ * [1] https://blog.mozilla.org/security/2021/10/25/securing-the-proxy-api-for-firefox-add-ons/ ***/
    // user_pref("network.proxy.failover_direct", false);
 
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS ***/

From ba92918d38757e858ed0dd98e2f6367dfe87b51a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 26 Oct 2021 10:16:42 +0000
Subject: [PATCH 0931/1147] don't disable system addon updates, closes #1251

---
 user.js | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 553bea9..e1476e7 100644
--- a/user.js
+++ b/user.js
@@ -161,9 +161,6 @@ user_pref("app.update.background.scheduling.enabled", false);
 /* 0306: disable search engine updates (e.g. OpenSearch)
  * [NOTE] This does not affect Mozilla's built-in or Web Extension search engines ***/
 user_pref("browser.search.update", false);
-/* 0307: disable System Add-on updates ***/
-user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
-user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
 
 /** RECOMMENDATIONS ***/
 /* 0320: disable recommendation pane in about:addons (uses Google Analytics) ***/
@@ -1311,6 +1308,10 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] Fingerprintable. Breakage. Cut/copy/paste require user
  * interaction, and paste is limited to focused editable fields ***/
    // user_pref("dom.event.clipboardevents.enabled", false);
+/* 7014: disable System Add-on updates
+ * [WHY] It can compromise security. System addons ship with prefs, use those ***/
+   // user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
+   // user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
 
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good

From 15158974496806e8ee9564d0b36fe0cbbb0f869f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 2 Nov 2021 16:07:42 +0000
Subject: [PATCH 0932/1147] default changes

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index e1476e7..7133ca4 100644
--- a/user.js
+++ b/user.js
@@ -1294,7 +1294,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
 /* 7010: disable HTTP Alternative Services [FF37+]
  * [WHY] Already isolated by network partitioning (FF85+) or FPI ***/
    // user_pref("network.http.altsvc.enabled", false);
-   // user_pref("network.http.altsvc.oe", false);
+   // user_pref("network.http.altsvc.oe", false); // [DEFAULT: false FF94+]
 /* 7011: disable website control over browser right-click context menu
  * [WHY] Just use Shift-Right-Click ***/
    // user_pref("dom.event.contextmenu.enabled", false);
@@ -1355,7 +1355,7 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc
    // user_pref("startup.homepage_welcome_url.additional", "");
    // user_pref("startup.homepage_override_url", ""); // What's New page after updates
 /* WARNINGS ***/
-   // user_pref("browser.tabs.warnOnClose", false);
+   // user_pref("browser.tabs.warnOnClose", false); // [DEFAULT false FF94+]
    // user_pref("browser.tabs.warnOnCloseOtherTabs", false);
    // user_pref("browser.tabs.warnOnOpen", false);
    // user_pref("full-screen-api.warning.delay", 0);

From 0f8217ad60c7284b8b0539246260088e982edf98 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 4 Nov 2021 16:18:35 +0000
Subject: [PATCH 0933/1147] cleanup sanitizing-on-close prefs

---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 7133ca4..dc5a65c 100644
--- a/user.js
+++ b/user.js
@@ -898,7 +898,7 @@ user_pref("privacy.clearOnShutdown.formdata", true); // Form & Search History
 user_pref("privacy.clearOnShutdown.history", true); // Browsing & Download History
 user_pref("privacy.clearOnShutdown.offlineApps", true); // Offline Website Data
 user_pref("privacy.clearOnShutdown.sessions", true); // Active Logins
-user_pref("privacy.clearOnShutdown.siteSettings", false); // Site Preferences
+   // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false] Site Preferences
 /* 2804: reset default items to clear with Ctrl-Shift-Del (to match 2803) [SETUP-CHROME]
  * This dialog can also be accessed from the menu History>Clear Recent History
  * Firefox remembers your last choices. This will reset them when you start Firefox
@@ -910,9 +910,9 @@ user_pref("privacy.cpd.cookies", true);
 user_pref("privacy.cpd.formdata", true); // Form & Search History
 user_pref("privacy.cpd.history", true); // Browsing & Download History
 user_pref("privacy.cpd.offlineApps", true); // Offline Website Data
-user_pref("privacy.cpd.passwords", false); // this is not listed
+   // user_pref("privacy.cpd.passwords", false); // [DEFAULT: false] this is not listed
 user_pref("privacy.cpd.sessions", true); // Active Logins
-user_pref("privacy.cpd.siteSettings", false); // Site Preferences
+   // user_pref("privacy.cpd.siteSettings", false); // [DEFAULT: false] Site Preferences
 /* 2805: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
  * [NOTE] Not needed if Session Restore is not used (0102) or is already cleared with history (2803)
  * [NOTE] privacy.clearOnShutdown.openWindows prevents resuming from crashes (also see 5008)

From bd59131d3e56b9fdafe7aa7b5889106bb9f484a9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 4 Nov 2021 22:38:16 +0000
Subject: [PATCH 0934/1147] default changes, missed one

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index dc5a65c..f2b2ff4 100644
--- a/user.js
+++ b/user.js
@@ -1055,9 +1055,9 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
  * When default true this no longer masks the RFP chrome resizing activity
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
-/* 4510: enforce no system colors
+/* 4510: disable using system colors
  * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
-user_pref("browser.display.use_system_colors", false); // [DEFAULT: false]
+user_pref("browser.display.use_system_colors", false);
 /* 4511: enforce non-native widget theme
  * Security: removes/reduces system API calls, e.g. win32k API [1]
  * Fingerprinting: provides a uniform look and feel across platforms [2]

From 17beb468f1ce5acf1438e17f7ed9490a5377f45c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 4 Nov 2021 22:44:23 +0000
Subject: [PATCH 0935/1147] tweak 1510 default info

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index f2b2ff4..bc2d1d5 100644
--- a/user.js
+++ b/user.js
@@ -1057,7 +1057,7 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
 user_pref("browser.startup.blankWindow", false);
 /* 4510: disable using system colors
  * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
-user_pref("browser.display.use_system_colors", false);
+user_pref("browser.display.use_system_colors", false); // [DEFAULT false NON-WINDOWS]
 /* 4511: enforce non-native widget theme
  * Security: removes/reduces system API calls, e.g. win32k API [1]
  * Fingerprinting: provides a uniform look and feel across platforms [2]

From f8932dced142ec5ea633bfb163bfc7579ac38a07 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 7 Nov 2021 06:48:45 +0000
Subject: [PATCH 0936/1147] remove ambiguous line

The point was that google have said (stated in policy, but fuck knows where that is located these days) that it is anonymized and not used for tracking. It's an API used by **_4 billion devices_** - the API has privacy policies for use. If a whistleblower or someone else found out that google was using this to enhance their user profiling, then all hell would break loose. And they don't even need this to fuel their ad revenue. It is provided, gratis, to the web to help ensure security - they wouldn't dare taint it and get it caught up in a privacy scandal involving **+4 billion devices_**. And in all this time (since 2007), there has been no such whistleblower or proof it is used to track or announcements by google of changes to the contrary.

Anyway, a quick search brings up
- Here is their policy - https://www.google.com/intl/en_us/privacy/browsing.html - it's empty and points to
- https://www.google.com/intl/en/chrome/privacy/
   - and if you scroll down to "Safe Browsing practices" it doesn't say anything about privacy policies for the API itself (or the owner of the API) - it just spells out what happens in chrome
- I'm not going to bother to look any further and find a history of policy changes

Anyway, this is Firefox and hashes are part hashes bundled with other real hashes - and we turned off real time binary checks. So this line can fuck the fuck off. It was meant to reassure those who want the security of real-time binary checks, that privacy "shouldn't" be an issue, but I'm not going to expand on it
---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index bc2d1d5..68d5560 100644
--- a/user.js
+++ b/user.js
@@ -242,7 +242,6 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
    to Google, only a part-hash of the prefix, hidden with noise of other real part-hashes.
    Firefox takes measures such as stripping out identifying parameters and since SBv4 (FF57+)
    doesn't even use cookies. (#Turn on browser.safebrowsing.debug to monitor this activity)
-   FWIW, Google also swear it is anonymized and only used to flag malicious sites.
 
    [1] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
    [2] https://wiki.mozilla.org/Security/Safe_Browsing

From e2e7f9c64704ab75a22a5efd911af3845a0fefdf Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 16 Nov 2021 11:56:20 +0000
Subject: [PATCH 0937/1147] font vis changes (#1275)

---
 user.js | 17 +++++++++++++----
 1 file changed, 13 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 68d5560..ec57b4a 100644
--- a/user.js
+++ b/user.js
@@ -582,12 +582,15 @@ user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 /* 1401: disable rendering of SVG OpenType fonts ***/
 user_pref("gfx.font_rendering.opentype_svg.enabled", false);
-/* 1402: limit font visibility (Windows, Mac, some Linux) [FF79+]
- * [NOTE] In FF80+ RFP ignores the pref and uses value 1
+/* 1402: limit font visibility (Windows, Mac, some Linux) [FF94+]
  * Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1], bundled fonts are auto-allowed
+ * In normal windows: uses the first applicable: RFP (4506) over TP over Standard
+ * In Private Browsing windows: uses the most restrictive between normal and private
  * 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
  * [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc ***/
-   // user_pref("layout.css.font-visibility.level", 1);
+   // user_pref("layout.css.font-visibility.private", 1);
+   // user_pref("layout.css.font-visibility.standard", 1);
+   // user_pref("layout.css.font-visibility.trackingprotection", 1);
 
 /*** [SECTION 1600]: HEADERS / REFERERS
    Expect some breakage e.g. banks: use an extension if you need precise control
@@ -1050,7 +1053,9 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
  * [1] https://bugzilla.mozilla.org/1635603 ***/
    // user_pref("privacy.resistFingerprinting.exemptedDomains", "*.example.invalid");
    // user_pref("privacy.resistFingerprinting.testGranularityMask", 0);
-/* 4506: disable showing about:blank as soon as possible during startup [FF60+]
+/* 4506: set RFP's font visibility level (1402) [FF94+] ***/
+   // user_pref("layout.css.font-visibility.resistFingerprinting", 1);
+/* 4507: disable showing about:blank as soon as possible during startup [FF60+]
  * When default true this no longer masks the RFP chrome resizing activity
  * [1] https://bugzilla.mozilla.org/1448423 ***/
 user_pref("browser.startup.blankWindow", false);
@@ -1405,6 +1410,10 @@ user_pref("_user.js.parrot", "9999 syntax error: the parrot's shuffled off 'is m
 // 7003: disable non-modern cipher suites
    // [-] https://bugzilla.mozilla.org/1724072
    // user_pref("security.ssl3.rsa_des_ede3_sha", false); // 3DES
+// FF94
+// 1402: limit font visibility (Windows, Mac, some Linux) [FF79+] - replaced by new 1402
+   // [-] https://bugzilla.mozilla.org/1715507
+   // user_pref("layout.css.font-visibility.level", 1);
 // ***/
 
 /* ESR78.x still uses all the following prefs

From 2f88ca2e40351211d95e21a52aec0eae364a26f8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 18 Nov 2021 01:28:21 +0000
Subject: [PATCH 0938/1147] misc

- move DoH so it has room to grow
- tidy privacy.clearOnShutdown, privacy.cpd
---
 user.js | 44 ++++++++++++++++++++++----------------------
 1 file changed, 22 insertions(+), 22 deletions(-)

diff --git a/user.js b/user.js
index ec57b4a..048cc8d 100644
--- a/user.js
+++ b/user.js
@@ -322,7 +322,12 @@ user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
  * [2] https://en.wikipedia.org/wiki/GVfs
  * [3] https://en.wikipedia.org/wiki/GIO_(software) ***/
 user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
-/* 0705: disable DNS-over-HTTPS (DoH) rollout [FF60+]
+/* 0705: disable proxy direct failover for system requests [FF91+]
+ * [WARNING] Default true is a security feature against malicious extensions [1]
+ * [SETUP-CHROME] If you use a proxy and you trust your extensions
+ * [1] https://blog.mozilla.org/security/2021/10/25/securing-the-proxy-api-for-firefox-add-ons/ ***/
+   // user_pref("network.proxy.failover_direct", false);
+/* 0710: disable DNS-over-HTTPS (DoH) rollout [FF60+]
  * 0=off by default, 2=TRR (Trusted Recursive Resolver) first, 3=TRR only, 5=explicitly off
  * see "doh-rollout.home-region": USA Feb 2020, Canada July 2021 [3]
  * [1] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/
@@ -330,11 +335,6 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
  * [3] https://blog.mozilla.org/mozilla/news/firefox-by-default-dns-over-https-rollout-in-canada/
  * [4] https://www.eff.org/deeplinks/2020/12/dns-doh-and-odoh-oh-my-year-review-2020 ***/
    // user_pref("network.trr.mode", 5);
-/* 0706: disable proxy direct failover for system requests [FF91+]
- * [WARNING] Default true is a security feature against malicious extensions [1]
- * [SETUP-CHROME] If you use a proxy and you trust your extensions
- * [1] https://blog.mozilla.org/security/2021/10/25/securing-the-proxy-api-for-firefox-add-ons/ ***/
-   // user_pref("network.proxy.failover_direct", false);
 
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS ***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
@@ -887,33 +887,33 @@ user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!"
 /* 2802: enable Firefox to clear items on shutdown (2803)
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
-/* 2803: set what items to clear on shutdown (if 2802 is true) [SETUP-CHROME]
+/* 2803: set/enforce what items to clear on shutdown (if 2802 is true) [SETUP-CHROME]
  * [NOTE] If "history" is true, downloads will also be cleared
- * [NOTE] Active Logins: does not refer to logins via cookies, but rather HTTP Basic Authentication [1]
- * [NOTE] Offline Website Data: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
+ * [NOTE] "sessions": Active Logins: refers to HTTP Basic Authentication [1], not logins via cookies
+ * [NOTE] "offlineApps": Offline Website Data: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes>Settings
  * [1] https://en.wikipedia.org/wiki/Basic_access_authentication ***/
-user_pref("privacy.clearOnShutdown.cache", true);
-user_pref("privacy.clearOnShutdown.cookies", true);
-user_pref("privacy.clearOnShutdown.downloads", true); // see note above
-user_pref("privacy.clearOnShutdown.formdata", true); // Form & Search History
-user_pref("privacy.clearOnShutdown.history", true); // Browsing & Download History
-user_pref("privacy.clearOnShutdown.offlineApps", true); // Offline Website Data
-user_pref("privacy.clearOnShutdown.sessions", true); // Active Logins
+user_pref("privacy.clearOnShutdown.cache", true);     // [DEFAULT: true]
+user_pref("privacy.clearOnShutdown.cookies", true);   // [DEFAULT: true]
+user_pref("privacy.clearOnShutdown.downloads", true); // [DEFAULT: true]
+user_pref("privacy.clearOnShutdown.formdata", true);  // [DEFAULT: true]
+user_pref("privacy.clearOnShutdown.history", true);   // [DEFAULT: true]
+user_pref("privacy.clearOnShutdown.sessions", true);  // [DEFAULT: true]
+user_pref("privacy.clearOnShutdown.offlineApps", true);
    // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false] Site Preferences
 /* 2804: reset default items to clear with Ctrl-Shift-Del (to match 2803) [SETUP-CHROME]
  * This dialog can also be accessed from the menu History>Clear Recent History
  * Firefox remembers your last choices. This will reset them when you start Firefox
  * [NOTE] Regardless of what you set "downloads" to, as soon as the dialog
  * for "Clear Recent History" is opened, it is synced to the same as "history" ***/
-user_pref("privacy.cpd.cache", true);
-user_pref("privacy.cpd.cookies", true);
+user_pref("privacy.cpd.cache", true);    // [DEFAULT: true]
+user_pref("privacy.cpd.cookies", true);  // [DEFAULT: true]
+user_pref("privacy.cpd.formdata", true); // [DEFAULT: true]
+user_pref("privacy.cpd.history", true);  // [DEFAULT: true]
+user_pref("privacy.cpd.sessions", true); // [DEFAULT: true]
+user_pref("privacy.cpd.offlineApps", true);
    // user_pref("privacy.cpd.downloads", true); // not used, see note above
-user_pref("privacy.cpd.formdata", true); // Form & Search History
-user_pref("privacy.cpd.history", true); // Browsing & Download History
-user_pref("privacy.cpd.offlineApps", true); // Offline Website Data
    // user_pref("privacy.cpd.passwords", false); // [DEFAULT: false] this is not listed
-user_pref("privacy.cpd.sessions", true); // Active Logins
    // user_pref("privacy.cpd.siteSettings", false); // [DEFAULT: false] Site Preferences
 /* 2805: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
  * [NOTE] Not needed if Session Restore is not used (0102) or is already cleared with history (2803)

From 34bd3c5a0409bc21f339794e602aa343afdd50e7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Nov 2021 05:40:49 +0000
Subject: [PATCH 0939/1147] consolidate/simplify sanitizing, fixes #1256

move all sanitizing on exit prefs into 2800

switch to cookie lifetime as session
- now users can utilize exceptions (as allow)
- session cookies still block service workers (which we disable anyway)
- we still block 3rd party cookies (until we move to dFPI)
- we still have defense in depth for 3rd party cookies with 2803
- we still bulk sanitize offlineApps on exit: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
   - i.e you get to keep the cookies only IF you add an exception

add `privacy.clearsitedata.cache.enabled`
---
 user.js | 74 ++++++++++++++++++++++++++++++---------------------------
 1 file changed, 39 insertions(+), 35 deletions(-)

diff --git a/user.js b/user.js
index 048cc8d..3176eaa 100644
--- a/user.js
+++ b/user.js
@@ -16,7 +16,7 @@
        * There are often trade-offs and conflicts between security vs privacy vs anti-fingerprinting
          and these need to be balanced against functionality & convenience & breakage
        * Some site breakage and unintended consequences will happen. Everyone's experience will differ
-         e.g. some user data is erased on close (section 2800), change this to suit your needs
+         e.g. some user data is erased on exit (section 2800), change this to suit your needs
        * While not 100% definitive, search for "[SETUP" tags
          e.g. third party images/videos not loading on some sites? check 1601
        * Take the wiki link in step 2 and read the Troubleshooting entry
@@ -55,7 +55,7 @@
   2400: DOM (DOCUMENT OBJECT MODEL)
   2600: MISCELLANEOUS
   2700: PERSISTENT STORAGE
-  2800: SHUTDOWN
+  2800: SHUTDOWN & SANITIZING
   4000: FPI (FIRST PARTY ISOLATION)
   4500: RFP (RESIST FINGERPRINTING)
   5000: OPTIONAL OPSEC
@@ -85,7 +85,7 @@ user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
 user_pref("browser.shell.checkDefaultBrowser", false);
 /* 0102: set startup page [SETUP-CHROME]
  * 0=blank, 1=home, 2=last visited page, 3=resume previous session
- * [NOTE] Session Restore is cleared with history (2803, 2804), and not used in Private Browsing mode
+ * [NOTE] Session Restore is cleared with history (2811, 2812), and not used in Private Browsing mode
  * [SETTING] General>Startup>Restore previous session ***/
 user_pref("browser.startup.page", 0);
 /* 0103: set HOME+NEWWINDOW page
@@ -380,7 +380,7 @@ user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false);
    // user_pref("browser.urlbar.suggest.engines", false);
 /* 0810: disable search and form history
  * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
- * [NOTE] We also clear formdata on exit (2803)
+ * [NOTE] We also clear formdata on exit (2811)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
  * [2] https://bugzilla.mozilla.org/381681 ***/
@@ -398,7 +398,7 @@ user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
 /* 0820: disable coloring of visited links
  * [SETUP-HARDEN] Bulk rapid history sniffing was mitigated in 2010 [1][2]. Slower and more expensive
  * redraw timing attacks were largely mitigated in FF77+ [3]. Using RFP (4501) further hampers timing
- * attacks. Don't forget clearing history on close (2803). However, social engineering [2#limits][4][5]
+ * attacks. Don't forget clearing history on exit (2811). However, social engineering [2#limits][4][5]
  * and advanced targeted timing attacks could still produce usable results
  * [1] https://developer.mozilla.org/docs/Web/CSS/Privacy_and_the_:visited_selector
  * [2] https://dbaron.org/mozilla/visited-privacy
@@ -439,7 +439,7 @@ user_pref("network.http.windows-sso.enabled", false); // [DEFAULT: false]
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
 /* 1001: disable disk cache
  * [SETUP-CHROME] If you think disk cache helps perf, then feel free to override this
- * [NOTE] We also clear cache on exit (2803) ***/
+ * [NOTE] We also clear cache on exit (2811) ***/
 user_pref("browser.cache.disk.enable", false);
 /* 1002: disable media cache from writing to disk in Private Browsing
  * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB
@@ -838,17 +838,6 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * [1] https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/ ***/
 user_pref("network.cookie.cookieBehavior", 1);
 user_pref("browser.contentblocking.category", "custom");
-/* 2702: set third-party cookies (if enabled, see 2701) to session-only
- * [NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and
- * .nonsecureSessionOnly=true. This allows you to keep HTTPS cookies, but session-only HTTP ones
- * [1] https://feeding.cloud.geek.nz/posts/tweaking-cookies-for-privacy-in-firefox/ ***/
-user_pref("network.cookie.thirdparty.sessionOnly", true);
-user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
-/* 2703: delete cookies and site data on close
- * 0=keep until they expire (default), 2=keep until you close Firefox
- * [NOTE] The setting below is disabled (but not changed) if you block all cookies (2701 = 2)
- * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed ***/
-   // user_pref("network.cookie.lifetimePolicy", 2);
 /* 2710: enable Enhanced Tracking Protection (ETP) in all windows
  * [SETTING] Privacy & Security>Enhanced Tracking Protection>Custom>Tracking content
  * [SETTING] to add site exceptions: Urlbar>ETP Shield
@@ -859,7 +848,7 @@ user_pref("privacy.trackingprotection.socialtracking.enabled", true);
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
 /* 2740: disable service worker cache and cache storage
- * [NOTE] We clear service worker cache on exit (2803)
+ * [NOTE] We clear service worker cache on exit (2811)
  * [1] https://w3c.github.io/ServiceWorker/#privacy ***/
    // user_pref("dom.caches.enabled", false);
 /* 2750: disable Storage API [FF51+]
@@ -876,52 +865,67 @@ user_pref("privacy.trackingprotection.socialtracking.enabled", true);
 /* 2760: enable Local Storage Next Generation (LSNG) [FF65+] ***/
 user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 
-/*** [SECTION 2800]: SHUTDOWN
-   * Sanitizing on shutdown is all or nothing. It does not use Managed Exceptions under
-     Privacy & Security>Delete cookies and site data when Firefox is closed (1681701)
-   * If you want to keep some sites' cookies (exception as "Allow") and optionally other site
-     data but clear all the rest on close, then you need to set the "cookie" and optionally the
-     "offlineApps" prefs below to false, and to set the cookie lifetime pref to 2 (2703)
-***/
+/*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
-/* 2802: enable Firefox to clear items on shutdown (2803)
+/** COOKIES + SITE DATA : ALLOWS EXCEPTIONS ***/
+/* 2801: delete cookies and site data on exit
+ * 0=keep until they expire (default), 2=keep until you close Firefox
+ * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
+ * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow
+ *   If using FPI the syntax must be https://example.com/^firstPartyDomain=example.com
+ * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
+user_pref("network.cookie.lifetimePolicy", 2);
+/* 2802: delete cache on exit [FF96+]
+ * [NOTE] We already disable disk cache (1001) and clear on exit (2811) which is more robust
+ * [1] https://bugzilla.mozilla.org/1671182 ***/
+   // user_pref("privacy.clearsitedata.cache.enabled", true);
+/* 2803: set third-party cookies to session-only
+ * [NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and
+ * .nonsecureSessionOnly=true. This allows you to keep HTTPS cookies, but session-only HTTP ones
+ * [1] https://feeding.cloud.geek.nz/posts/tweaking-cookies-for-privacy-in-firefox/ ***/
+user_pref("network.cookie.thirdparty.sessionOnly", true);
+user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
+
+/** SANITIZE ON SHUTDOWN : ALL OR NOTHING ***/
+/* 2810: enable Firefox to clear items on shutdown (2811)
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
-/* 2803: set/enforce what items to clear on shutdown (if 2802 is true) [SETUP-CHROME]
+/* 2811: set/enforce what items to clear on shutdown (if 2810 is true) [SETUP-CHROME]
+ * sanitizingOnShutdown is all or nothing, it does not allow exceptions (1681701)
  * [NOTE] If "history" is true, downloads will also be cleared
  * [NOTE] "sessions": Active Logins: refers to HTTP Basic Authentication [1], not logins via cookies
  * [NOTE] "offlineApps": Offline Website Data: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes>Settings
  * [1] https://en.wikipedia.org/wiki/Basic_access_authentication ***/
 user_pref("privacy.clearOnShutdown.cache", true);     // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.cookies", true);   // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.downloads", true); // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.formdata", true);  // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.history", true);   // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.sessions", true);  // [DEFAULT: true]
+user_pref("privacy.clearOnShutdown.cookies", false);
 user_pref("privacy.clearOnShutdown.offlineApps", true);
    // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false] Site Preferences
-/* 2804: reset default items to clear with Ctrl-Shift-Del (to match 2803) [SETUP-CHROME]
+/* 2812: reset default items to clear with Ctrl-Shift-Del (to match 2811) [SETUP-CHROME]
  * This dialog can also be accessed from the menu History>Clear Recent History
  * Firefox remembers your last choices. This will reset them when you start Firefox
  * [NOTE] Regardless of what you set "downloads" to, as soon as the dialog
  * for "Clear Recent History" is opened, it is synced to the same as "history" ***/
 user_pref("privacy.cpd.cache", true);    // [DEFAULT: true]
-user_pref("privacy.cpd.cookies", true);  // [DEFAULT: true]
 user_pref("privacy.cpd.formdata", true); // [DEFAULT: true]
 user_pref("privacy.cpd.history", true);  // [DEFAULT: true]
 user_pref("privacy.cpd.sessions", true); // [DEFAULT: true]
+user_pref("privacy.cpd.cookies", false);
 user_pref("privacy.cpd.offlineApps", true);
    // user_pref("privacy.cpd.downloads", true); // not used, see note above
    // user_pref("privacy.cpd.passwords", false); // [DEFAULT: false] this is not listed
    // user_pref("privacy.cpd.siteSettings", false); // [DEFAULT: false] Site Preferences
-/* 2805: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
- * [NOTE] Not needed if Session Restore is not used (0102) or is already cleared with history (2803)
+/* 2813: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
+ * [NOTE] Not needed if Session Restore is not used (0102) or it is already cleared with history (2811)
  * [NOTE] privacy.clearOnShutdown.openWindows prevents resuming from crashes (also see 5008)
  * [NOTE] privacy.cpd.openWindows has a bug that causes an additional window to open ***/
    // user_pref("privacy.clearOnShutdown.openWindows", true);
    // user_pref("privacy.cpd.openWindows", true);
-/* 2806: reset default "Time range to clear" for "Clear Recent History" (2804)
+/* 2814: reset default "Time range to clear" for "Clear Recent History" (2812)
  * Firefox remembers your last choice. This will reset the value when you start Firefox
  * 0=everything, 1=last hour, 2=last two hours, 3=last four hours, 4=today
  * [NOTE] Values 5 (last 5 minutes) and 6 (last 24 hours) are not listed in the dropdown,
@@ -1117,7 +1121,7 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
 /* 5006: disable favicons in history and bookmarks
  * [NOTE] Stored as data blobs in favicons.sqlite, these don't reveal anything that your
  * actual history (and bookmarks) already do. Your history is more detailed, so
- * control that instead; e.g. disable history, clear history on close, use PB mode
+ * control that instead; e.g. disable history, clear history on exit, use PB mode
  * [NOTE] favicons.sqlite is sanitized on Firefox close ***/
    // user_pref("browser.chrome.site_icons", false);
 /* 5007: exclude "Undo Closed Tabs" in Session Restore ***/
@@ -1141,7 +1145,7 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
  * [1] https://support.mozilla.org/kb/address-bar-autocomplete-firefox#w_url-autocomplete ***/
    // user_pref("browser.urlbar.autoFill", false);
 /* 5013: disable browsing and download history
- * [NOTE] We also clear history and downloads on exit (2803)
+ * [NOTE] We also clear history and downloads on exit (2811)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember browsing and download history ***/
    // user_pref("places.history.enabled", false);
 /* 5014: disable Windows jumplist [WINDOWS] ***/

From c9e4cac618acc2ed935676f73b0933378d923596 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Nov 2021 18:08:07 +0000
Subject: [PATCH 0940/1147] tweak webRTC

webRTC will be overhauled... but not today... in the meantime
- remove dead link before @dngray has a hernia
- correctly refer to the type of IP leak
---
 user.js | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 3176eaa..84de010 100644
--- a/user.js
+++ b/user.js
@@ -632,11 +632,10 @@ user_pref("privacy.userContext.ui.enabled", true);
 /*** [SECTION 2000]: PLUGINS / MEDIA / WEBRTC ***/
 user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
 /* 2001: disable WebRTC (Web Real-Time Communication)
- * [SETUP-WEB] WebRTC can leak your IP address from behind your VPN, but if this is not
- * in your threat model, and you want Real-Time Communication, this is the pref for you
- * [1] https://www.privacytools.io/#webrtc ***/
+ * [SETUP-WEB] WebRTC can leak your private network address from behind your VPN, but if this
+ * is not your threat model, and you want Real-Time Communication, this is the pref for you ***/
 user_pref("media.peerconnection.enabled", false);
-/* 2002: limit WebRTC IP leaks if using WebRTC
+/* 2002: limit WebRTC private network address leaks
  * In FF70+ these settings match Mode 4 (Mode 3 in older versions) [3]
  * [TEST] https://browserleaks.com/webrtc
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1189041,1297416,1452713

From 6b351a9458a307bfa37d0e61c7434a616f4de006 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Nov 2021 18:15:53 +0000
Subject: [PATCH 0941/1147] fixup trade-offs

anti-fingerprinting doesn't fit here: it's not a major component or priority of this user.js, and only a few prefs outside RFP (as a robust built-in browser solution that defeats naive scripts) have anything to do with it
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 84de010..10f9857 100644
--- a/user.js
+++ b/user.js
@@ -13,7 +13,7 @@
        * https://github.com/arkenfox/user.js/wiki
   3. If you skipped step 2, return to step 2
   4. Make changes
-       * There are often trade-offs and conflicts between security vs privacy vs anti-fingerprinting
+       * There are often trade-offs and conflicts between security vs privacy vs anti-tracking
          and these need to be balanced against functionality & convenience & breakage
        * Some site breakage and unintended consequences will happen. Everyone's experience will differ
          e.g. some user data is erased on exit (section 2800), change this to suit your needs

From 58d0161b67540dbf418e9bac39e2eaa2becfc169 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Nov 2021 07:05:01 +0000
Subject: [PATCH 0942/1147] add warnOnQuitShortcut, closes #1270

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 10f9857..80d0bf1 100644
--- a/user.js
+++ b/user.js
@@ -1365,6 +1365,7 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc
    // user_pref("browser.tabs.warnOnClose", false); // [DEFAULT false FF94+]
    // user_pref("browser.tabs.warnOnCloseOtherTabs", false);
    // user_pref("browser.tabs.warnOnOpen", false);
+   // user_pref("browser.tabs.warnOnQuitShortcut", false); // [FF94+]
    // user_pref("full-screen-api.warning.delay", 0);
    // user_pref("full-screen-api.warning.timeout", 0);
 /* APPEARANCE ***/

From cbfb8abf1544c3e87f412f64a9747bd1dea4a705 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Nov 2021 07:11:43 +0000
Subject: [PATCH 0943/1147] 94 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 80d0bf1..c8f88fe 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 25 October 2021
-* version 94-alpha
+* date: 23 November 2021
+* version 94
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From 6027aaa45ddaf3072d7675364a58bea9bb08440a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Nov 2021 12:02:50 +0000
Subject: [PATCH 0944/1147] fixup warnOnQuitShortcut

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index c8f88fe..2be91c2 100644
--- a/user.js
+++ b/user.js
@@ -1365,7 +1365,7 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc
    // user_pref("browser.tabs.warnOnClose", false); // [DEFAULT false FF94+]
    // user_pref("browser.tabs.warnOnCloseOtherTabs", false);
    // user_pref("browser.tabs.warnOnOpen", false);
-   // user_pref("browser.tabs.warnOnQuitShortcut", false); // [FF94+]
+   // user_pref("browser.warnOnQuitShortcut", false); // [FF94+]
    // user_pref("full-screen-api.warning.delay", 0);
    // user_pref("full-screen-api.warning.timeout", 0);
 /* APPEARANCE ***/

From 4b393b9b1220481bf544153893995ba2e4bff7d8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 24 Nov 2021 01:09:10 +0000
Subject: [PATCH 0945/1147] start 95-alpha

---
 user.js | 88 ++++-----------------------------------------------------
 1 file changed, 6 insertions(+), 82 deletions(-)

diff --git a/user.js b/user.js
index 2be91c2..639e164 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 23 November 2021
-* version 94
+* date: 24 November 2021
+* version 95-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -442,8 +442,7 @@ user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is m
  * [NOTE] We also clear cache on exit (2811) ***/
 user_pref("browser.cache.disk.enable", false);
 /* 1002: disable media cache from writing to disk in Private Browsing
- * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB
- * [SETUP-WEB] ESR78: playback might break on subsequent loading (1650281) ***/
+ * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB ***/
 user_pref("browser.privatebrowsing.forceMediaMemoryCache", true); // [FF75+]
 user_pref("media.memory_cache_max_size", 65536);
 /* 1003: disable storing extra session data [SETUP-CHROME]
@@ -1219,23 +1218,8 @@ user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true]
  * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks
  * [TEST] https://arkenfox.github.io/TZP/tests/windownamea.html ***/
 user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true]
-/* 6050: prefsCleaner: reset previously active items removed from arkenfox in 79-91 ***/
-   // user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "");
-   // user_pref("browser.send_pings.require_same_host", "");
-   // user_pref("dom.allow_cut_copy", "");
-   // user_pref("dom.vibrator.enabled", "");
-   // user_pref("media.getusermedia.audiocapture.enabled", "");
-   // user_pref("media.getusermedia.browser.enabled", "");
-   // user_pref("media.getusermedia.screensharing.enabled", "");
-   // user_pref("media.gmp-widevinecdm.visible", "");
-   // user_pref("network.http.redirection-limit", "");
-   // user_pref("privacy.partition.network_state", "");
-   // user_pref("security.insecure_connection_icon.enabled", ""); // [DEFAULT: true FF70+]
-   // user_pref("security.mixed_content.block_active_content", ""); // [DEFAULT: true since at least FF60]
-   // user_pref("security.ssl.enable_ocsp_stapling", ""); // [DEFAULT: true FF26+]
-   // user_pref("webgl.disable-fail-if-major-performance-caveat", ""); // [DEFAULT: true FF86+]
-   // user_pref("webgl.enable-webgl2", "");
-   // user_pref("webgl.min_capability_mode", "");
+/* 6050: prefsCleaner: reset previously active items removed from arkenfox FF91+ ***/
+   // placeholder
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");
@@ -1404,7 +1388,7 @@ user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features",
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
-   Documentation denoted as [-]. Items deprecated in FF78 or earlier have been archived at [1]
+   Documentation denoted as [-]. Items deprecated prior to FF91 have been archived at [1]
    [1] https://github.com/arkenfox/user.js/issues/123
 ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's shuffled off 'is mortal coil!");
@@ -1420,65 +1404,5 @@ user_pref("_user.js.parrot", "9999 syntax error: the parrot's shuffled off 'is m
    // user_pref("layout.css.font-visibility.level", 1);
 // ***/
 
-/* ESR78.x still uses all the following prefs
-// [NOTE] replace the * with a slash in the line above to re-enable them
-// FF79
-// 0212: enforce fallback text encoding to match en-US
-   // When the content or server doesn't declare a charset the browser will
-   // fallback to the "Current locale" based on your application language
-   // [TEST] https://hsivonen.com/test/moz/check-charset.htm
-   // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/20025
-   // [-] https://bugzilla.mozilla.org/1603712
-user_pref("intl.charset.fallback.override", "windows-1252");
-// FF82
-// 0206: disable geographically specific results/search engines e.g. "browser.search.*.US"
-   // i.e. ignore all of Mozilla's various search engines in multiple locales
-   // [-] https://bugzilla.mozilla.org/1619926
-user_pref("browser.search.geoSpecificDefaults", false);
-user_pref("browser.search.geoSpecificDefaults.url", "");
-// FF86
-// 1205: disable SSL Error Reporting
-   // [1] https://firefox-source-docs.mozilla.org/main/65.0/browser/base/sslerrorreport/preferences.html
-   // [-] https://bugzilla.mozilla.org/1681839
-user_pref("security.ssl.errorReporting.automatic", false);
-user_pref("security.ssl.errorReporting.enabled", false);
-user_pref("security.ssl.errorReporting.url", "");
-// 2653: disable hiding mime types (Options>General>Applications) not associated with a plugin
-   // [-] https://bugzilla.mozilla.org/1581678
-user_pref("browser.download.hide_plugins_without_extensions", false);
-// FF87
-// 0105d: disable Activity Stream recent Highlights in the Library [FF57+]
-   // [-] https://bugzilla.mozilla.org/1689405
-   // user_pref("browser.library.activity-stream.enabled", false);
-// 8002: disable PointerEvents
-   // [1] https://developer.mozilla.org/docs/Web/API/PointerEvent
-   // [-] https://bugzilla.mozilla.org/1688105
-   // user_pref("dom.w3c_pointer_events.enabled", false);
-// FF89
-// 0309: disable sending Flash crash reports
-   // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]
-user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false);
-// 0310: disable sending the URL of the website where a plugin crashed
-   // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]
-user_pref("dom.ipc.plugins.reportCrashURL", false);
-// 1243: block unencrypted requests from Flash on encrypted pages to mitigate MitM attacks [FF59+]
-   // [1] https://bugzilla.mozilla.org/1190623
-   // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]
-user_pref("security.mixed_content.block_object_subrequest", true);
-// 1803: disable Flash plugin
-   // 0=deactivated, 1=ask, 2=enabled
-   // ESR52.x is the last branch to fully support NPAPI, FF52+ stable only supports Flash
-   // [NOTE] You can still override individual sites via site permissions
-   // [-] https://bugzilla.mozilla.org/1682030 [underlying NPAPI code removed]
-user_pref("plugin.state.flash", 0); // [DEFAULT: 1]
-// FF90
-// 0708: disable FTP [FF60+]
-   // [-] https://bugzilla.mozilla.org/1574475
-   // user_pref("network.ftp.enabled", false); // [DEFAULT: false FF88+]
-// 7001: enforce no offline cache storage (appCache) [FF71+]
-   // [-] https://bugzilla.mozilla.org/1694662
-user_pref("browser.cache.offline.storage.enable", false); // [DEFAULT: false FF84+]
-// ***/
-
 /* END: internal custom pref to test for syntax errors ***/
 user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");

From 27977a16ad4a65c5e54e212c1d89dd111df039c6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 25 Nov 2021 06:49:38 +0000
Subject: [PATCH 0946/1147] 2652: browser.download.alwaysOpenPanel

FYI: https://bugzilla.mozilla.org/1738372

There is a small privacy issue with shoulder surfers, but in reality, this just needs to happen IMO
- we already prompt where to save, but even if we didn't, we also know we clicked or initiated a download
   - unless it's a drive by or user-gesture trickery - which is why we prompt
- the download icon is shown (if hidden) and the throbber/accent color go to work
- users can always click the icon to show entries (and open folder etc)
- this maintains the current behavior in FF94
---
 user.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 639e164..8c3b0ae 100644
--- a/user.js
+++ b/user.js
@@ -790,7 +790,9 @@ user_pref("permissions.delegation.enabled", false);
  * [SETUP-CHROME] On Android this blocks longtapping and saving images
  * [SETTING] General>Downloads>Always ask you where to save files ***/
 user_pref("browser.download.useDownloadDir", false);
-/* 2652: disable adding downloads to the system's "recent documents" list ***/
+/* 2652: disable downloads panel opening on every download [FF96+] ***/
+user_pref("browser.download.alwaysOpenPanel", false);
+/* 2653: disable adding downloads to the system's "recent documents" list ***/
 user_pref("browser.download.manager.addToRecentDocs", false);
 
 /** EXTENSIONS ***/

From 47de4f520bdc7ec80f440f66731df15338e74a29 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Nov 2021 09:01:39 +0000
Subject: [PATCH 0947/1147] tidy 5505

---
 user.js | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 8c3b0ae..2a7387e 100644
--- a/user.js
+++ b/user.js
@@ -1181,9 +1181,10 @@ user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
  * [3] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
    // user_pref("javascript.options.asmjs", false);
 /* 5505: disable Ion and baseline JIT to harden against JS exploits
- * [NOTE] In FF75+, when **both** Ion and JIT are disabled, **and** the new
- * hidden pref is enabled, then Ion can still be used by extensions (1599226)
- * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+jit ***/
+ * [NOTE] When both Ion and JIT are disabled, and trustedprincipals
+ * is enabled, then Ion can still be used by extensions (1599226)
+ * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+jit
+ * [2] https://microsoftedge.github.io/edgevr/posts/Super-Duper-Secure-Mode/ ***/
    // user_pref("javascript.options.ion", false);
    // user_pref("javascript.options.baselinejit", false);
    // user_pref("javascript.options.jit_trustedprincipals", true); // [FF75+] [HIDDEN PREF]

From c2ddfd60bfb486b5a7791bc899e2646c027a92d3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Nov 2021 13:22:46 +0000
Subject: [PATCH 0948/1147] tidy 79-91 removed items

---
 scratchpad-scripts/arkenfox-clear-removed.js | 19 +++++++++----------
 1 file changed, 9 insertions(+), 10 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index bd99cb5..cc8d330 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -13,30 +13,29 @@
 
   const aPREFS = [
     /* removed in arkenfox user.js */
-    /* 91 */
+    /* 79-91 */
     'alerts.showFavicons',
+    'browser.newtabpage.activity-stream.asrouter.providers.snippets',
+    'browser.send_pings.require_same_host',
+    'browser.urlbar.usepreloadedtopurls.enabled',
     'dom.allow_cut_copy',
     'dom.battery.enabled',
+    'dom.IntersectionObserver.enabled',
     'dom.storage.enabled',
     'dom.vibrator.enabled',
+    'extensions.screenshots.upload-disabled',
     'general.warnOnAboutConfig',
     'gfx.direct2d.disabled',
     'layers.acceleration.disabled',
     'media.getusermedia.audiocapture.enabled',
     'media.getusermedia.browser.enabled',
     'media.getusermedia.screensharing.enabled',
-    'media.media-capabilities.enabled',
-    'security.insecure_connection_icon.enabled',
-    'security.mixed_content.block_active_content',
-    /* 79-90 */
-    'browser.newtabpage.activity-stream.asrouter.providers.snippets',
-    'browser.send_pings.require_same_host',
-    'browser.urlbar.usepreloadedtopurls.enabled',
-    'dom.IntersectionObserver.enabled',
-    'extensions.screenshots.upload-disabled',
     'media.gmp-widevinecdm.visible',
+    'media.media-capabilities.enabled',
     'network.http.redirection-limit',
     'privacy.partition.network_state',
+    'security.insecure_connection_icon.enabled',
+    'security.mixed_content.block_active_content',
     'security.ssl.enable_ocsp_stapling',
     'security.ssl3.dhe_rsa_aes_128_sha',
     'security.ssl3.dhe_rsa_aes_256_sha',

From 4dc53722573a2bcf0052acdebe41951e94f217a1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 30 Nov 2021 13:29:19 +0000
Subject: [PATCH 0949/1147] 0603: network.predictor.enable-prefetch

make active for Nighty users - see https://bugzilla.mozilla.org/show_bug.cgi?id=1506194
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 2a7387e..5ca13db 100644
--- a/user.js
+++ b/user.js
@@ -285,7 +285,7 @@ user_pref("network.dns.disablePrefetch", true);
    // user_pref("network.dns.disablePrefetchFromHTTPS", true); // [DEFAULT: true]
 /* 0603: disable predictor / prefetching ***/
 user_pref("network.predictor.enabled", false);
-   // user_pref("network.predictor.enable-prefetch", false); // [FF48+] [DEFAULT: false]
+user_pref("network.predictor.enable-prefetch", false); // [FF48+] [DEFAULT: false]
 /* 0604: disable link-mouseover opening connection to linked server
  * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests ***/
 user_pref("network.http.speculative-parallel-limit", 0);

From cf0102f71ebe3db5287d913db818d6a814c4c96b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 2 Dec 2021 09:34:34 +0000
Subject: [PATCH 0950/1147] fixup: from being flogged to death by overseers

thanks @dngray, also save some precious bytes .. polar bears know about scarce resources
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 5ca13db..af8b477 100644
--- a/user.js
+++ b/user.js
@@ -891,7 +891,7 @@ user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
 /* 2811: set/enforce what items to clear on shutdown (if 2810 is true) [SETUP-CHROME]
- * sanitizingOnShutdown is all or nothing, it does not allow exceptions (1681701)
+ * These items do not use exceptions, it is all or nothing (1681701)
  * [NOTE] If "history" is true, downloads will also be cleared
  * [NOTE] "sessions": Active Logins: refers to HTTP Basic Authentication [1], not logins via cookies
  * [NOTE] "offlineApps": Offline Website Data: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)

From d1d20b897a1c648dfdb5c34e86264f10cc84bc38 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 4 Dec 2021 09:36:09 +0000
Subject: [PATCH 0951/1147] wiki cleanup (#1289)

---
 wikipiki/concurrent01.png | Bin 32476 -> 0 bytes
 wikipiki/concurrent02.png | Bin 106194 -> 0 bytes
 wikipiki/concurrent03.png | Bin 28466 -> 0 bytes
 wikipiki/concurrent04.png | Bin 28727 -> 0 bytes
 wikipiki/profiles01.png   | Bin 33003 -> 0 bytes
 wikipiki/profiles02.png   | Bin 26989 -> 0 bytes
 6 files changed, 0 insertions(+), 0 deletions(-)
 delete mode 100644 wikipiki/concurrent01.png
 delete mode 100644 wikipiki/concurrent02.png
 delete mode 100644 wikipiki/concurrent03.png
 delete mode 100644 wikipiki/concurrent04.png
 delete mode 100644 wikipiki/profiles01.png
 delete mode 100644 wikipiki/profiles02.png

diff --git a/wikipiki/concurrent01.png b/wikipiki/concurrent01.png
deleted file mode 100644
index 60e0c4a33c9f493409c4bc1018d7066529936223..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 32476
zcmW(61y~%-ZVx^Da46El-K|jMkmBxI+>6tqg~Q$5T?@sbxE3!CMOr9coZ`;ofBAO4
z+1;6yNis<$$wa6s%V43uLI(f<OHNiw9RNU{F9ilhc)26EaLV;kp*hRyxd8wM{(l7o
zWM-290J@5;q@=2<jgz~Rn~jq*R8CS7>g?)dW&6Pr06dp-G^{l>_J~BTS1%+K!r{pZ
zPU?hUsJcWHoFIXonF<XeA5K-UM5xw_`|ceQ*>HY1Vr(otnox}uGZK9fb&IMnHmE2(
za`b-Pr^tSx<9g@EQ`1k;-Kz7PhDp>OFlMSOj~X8wvqFLr_fOE!z~K58J1hX5))|0+
z8!V{Y9%(?pji0bE3v~}_*UNxrF~C5NQdSQqdDt_~zC?y02p$aTaZh-o0EQC)Fz;B2
zQUE3mg6E{uYXJF3fXSG-*(RXM2ADAT@5}=5oSO_E5MYo@MF`4I0HFAm;ZlIjTcB!E
zJMtZ%%Lx!zDGUe#i);X=oQ{<&P}>6ZOh7Q|0Wc=OsTLl>1R(hUCc`u|o<ML0Kp=gl
zBm9r$D`c1X1ydRI!mYG|?*a_KY%ZueI_#8;6LQ2X1pKB5rkODIKCcW??f_n#Kj-5B
zke@*KGTQS;&k5|W6BGQg&Dh3l``swd)MjRzPur7UoM8a4?(R4J#LCg|3jP)a?(kGd
zcZ_879wYzbb(B>-4y*~t-&@u>cm5AI?+W5umzK7-wie|FBn(VPbv{2?_Zj!-Jbt+K
z6Mne9{L{5T8^CQ8AcJ)Cr*Hg1v4ngw5iQv4*G`<wLkq_91H~-$fSg&YE;GTV8lFq6
zRA%%!cL{ZbL?Y97x|wH-jWyPLMA0=qpw><l<deWwZe)&lrN98ub?@1@27t46r`|b6
zFe2P0XnoS-`9$ndCZ7&~TgfH50Kj`GT6WFR2C*S907&HrFxQHcUG$Q$_MnjWBLC{e
zcrf7)mY^NzlYmH|TfoU(O_-_zB^X10)KV~;aLmCdcze`rLX(`a+55D<VT(B9+?j%N
zdl@?d(2&H3!T6?B%i$oiNL`v(FmXo64OOo!5?&N7bR?WWjangrPnJtPQWL5rOK~RR
ziXa$fDBYIub{OCed<gB3;YtpuR}-1TY?5p(7kCvcU5GJd;m(yAN0gs6<=Xg4B$~fq
zcj}7`&T^cn<Pc}iUlLTFfe)PQgZ&b9Z&=Zi%*X1et1!O|zN*!(LTrz?G@q>VK*9@n
z*Mr87<RJkyr4*OdRn%2plr4vn)AHgjqY0oP2CMZkP$!iuG}5=>-VTtMadU;~%Cgcd
z;Kku{Kzza_2Lx#GA|$yPTH_Jq>WVdI@MffE9Mx&|SSzx4Wna-GjVxQ(*P{w1vqD*h
zL$-3Z`nPzt$hN4?4A67TU@pZs8XJu2qjvJ7+mLPEZ4}FNZgH)mO!eR81)8{garzR~
z1<mR;YGLL0ydN_Ke*_W9DU?(frp&&wA-1`;t@-QThWk5(QaNo(XJ%|q=5N|x#0w8h
ztWd(Bp>S(P(kv2G5^GWqlA3hIQqtKd(jiSw0j`7e-3*)zCoNs(W@cZ)gi-Vq`4svT
zGG-3ViptW;)k+MlbFDGWxQh20pTA0L@n~#Tpv|Rz(W=Z*J<uT2u&#Jp9#&~x?xZPJ
z?5Fn_fuh&1*smg4td?JAyxB1b#V{vr@MNX3$NCcbF@SG?zV648?<eN=^hb*JD3QvF
z0zpY0c^;hx_48yaG1Sd;mz!*NWwc$!vb1x*$W?+9rVS>tQeMSYE=xoE%G9(}-7m6V
z)V|0Zbn<^aD$6PDeAljbAAl`BB+p>TAY&ajft<6ev83_4484p<Nkr)KD|@AV30XnA
zlt;H?*>QSq*L!%bqEp$bSLf~>`Dczt%}0m3vP&6EU6ck)T9g&c2@>J&d@fGH6dXe<
z|I{Rn`eBkKrYWXr>%j@F)51mb(lOFF(YAwzo3xt_gARj5^eFUH^a@J*O2?V%O0A_#
zrEeAADh~Y^|55m3A%ibVgzG2wZq{zr&#bi;6Mav8*5>l&Z<ccPTl%GX$ITs%A^L)P
zCAwPrMh(){In{Iv?bYpNxMi)%Ny=Yx7p(hh|22;^SG17UZZD#&d~J4U{%mS(Mr_^k
z{cHbmQfJcVw$Cw-BB)qlOW0p1^eOz@8eIv5w1rkPC$f*lK7YSR-Q%#<orFv-@@zKa
zk1-9{=4fQi%2*Ryx4H$Lhet&y1dg$%iLz&r4gMbP+>&>{bTL}@p1I7)YRKw4DqpEN
z=0CPQ4*Qii&YQ=StH<Lu)jurxM{Rpr3?nav(|)bWPeoECz`ALdhQpjAL8tm>ZA*zq
z<+bSvvFMekYu={lrm(;&_o|-pxIj<KaLbrVzf-Pp$eN@-&9lX`_wzJR2B!mABSr*>
z2N)pS-+22{b;pVctyo^wFCB?T=eLRzipK?32X6OPQ`rn3##d8a@1{>AOxR+FsQUd~
zm_jw(F^%f?!(<2v3(*M`i**jyeKpOM#^*8pOVVvk>P{+EYBkH6OGU7TO`eZgw36LU
zcv+y0w@qx2-AZqKUN=Wq?t=okAUpF{e#Z}8YY#`~VH-Ic7@I!C=^VpG&Rzu*eHS5R
zL>26KtU{?U#c<^}$*1BF=5nHFx-)zax>$6tK8ikTYL03C>F`BKLuN|lGg)RO@5IA|
z4n8m1?>r@}+pWP274aR4Sc<>1gmQ^8KS3S1MT9!Jf)W$rT_h^0l#-gQ_pNuVK8;mb
zhSWcOcZ_P`piDs>v2Td4Le^tLZ<Z+itEtcUlNq(%+ET}=`$xp6VCt7#mLEss4WldZ
z0@){d&qsKDc<YJHC7}vBY!tdXomF;%^};S*E9jeq$Sk4SC{@DWBAb~V=2gBN>7;%2
z>!kNqvJZIQI~v&A1hPNC&_dr1`F!x}=aG?$E{EP)lj&V(4w)!nMC4b372-5P|3$`M
zp4(($PNUr!zmgj(z6`WlOj^xY?d`0x<r-k8R;KNwVLM_iEjMDVX*V8SUcFo4Nc+LK
z(jL?-*;>>s{H?>XY-HlcTQSXI%?r&tP5$GV-%X}JZycwO$$UDlcn{}S3_7kKMMt_;
zv_M))^H%eg_j30Q*J58ID)(+u?;VV)l^tA;h7e~EA5m$rn}4>>%~Q;XXsX98upG!>
z554Ys$~p01!{W!%ipd__pmCP++S<EDTf3&j5?cNg?NhamI{W$)g*63-okZqYrgWA@
z=DmTLL7U3B==8$=s`rD;%4?i#UST~i`E$(?+vUB$*(B?;$>^MvoX>vjx4%qQ3Y&d)
z%_r9EaGXxsAnxlk@1CP}-*&v6Fg*L_epbJ-jj!`fC$mP#*kRv&U-&6$R%NI?yFK%3
ztD$}Cv3F;akJa@aS+2mu?~6{ae?-p<^SOc|zdO&povy!MU#=1T_H$);oEU3g@?bcw
z?ojD4zJMKxFG>Cmn-?>9`n7oS%ipfYBmaE*m&`RvNYLa{!etzeBywCv+*l}9=t1rq
zQ9;2CG1tevhcd}Yi%I%i;-|u=v9H8L9DX<R2R|pK)29p4&eD>)9ehh3_j?XVYgPvP
z1}VEnJbAd@UufSS^?LmBpg1X7!%^Ath59o-+uYV&YD|^gCy^#4JtHBepFf!Mu&un<
zn^1FEbtM4srUL+Y5CGghztnpG@R1V$_DujlC>;QZof3_|O9OyAs+^R#rswkEXCD*7
z`KD`qpB>r`G*D9{7*9^EP9FE@sG3@$$gE<4dS2Uc9!B^LyzfBRDvDd%B+5wWfZX)X
z;oa%GIt1c^nwl0ZOuI_WH?SsAM=A)l*|1>4!u62fc&^({cD68->Nt-}(dz1Oslocn
zX+huTsLA=1cw+6RYIoUFlFDozO0VDICA(CBbAE5kYx8yyL+27hXR_M-E9XtDiE=`N
zDSr}wIuyX_4M~rcaGkVM_Vyl$BhND5P<B{$0|m(}<G7s=(J8g{6_WwqJ`w*V^3>0r
zK_8M<QuAPgUEHy-5Sv``<&)P3tAEH<^c{zpA*xTJ$2Se_7sBf9``W)M6sV_1P7s*T
zUtOs^mhp`w9{(==k*THUWy!NDa$o26#Z@Ub@YlF}(Fs2B>5j{SJ#o80m+}PHM4=2R
z35|IuPpmY1+Q+HYp%2~oSK147<_14vI)2vcK-{{(HZgWa%x?MS?tnQ8oypFd@aW<6
zB5lz4VlyL-`Jl|IK(<@wdHVeX*=wQ2j`bA$&vzGH`&q;fX4}j*s5i&AyAKZ;gx9MA
z&kPuT_18HnW1-QZ$1<?8<0qfI1vSZjhPMK1pAM?6b42cHYC7xwtQ$kkZepS6mlwG3
zBb{hBKdizv^ZW8g&UC>8DXV4`&Z@{yA|J4r57woIq3R8HK}u-aS=n^Z@&I|-IBu@7
zP;UIX54?~OksepXa4oOGTGMe%_&6=96$B|fzj7AK!pcknCMDHM3?d096@Q=01T~|k
zZxxGo&~PxDC7`FKM!`lvKq!R=Ahv4oQwGTW#?ecOFW@=|sD0{xn8>HUJd!{%nOoy&
zMFffG15yMCAY^nY5P%7W0!X!}fD|P)H%;JFQ$f5)fCTu<;3)zCKZ8KQNCDx2xT>CT
zcrHT;B9$-!0wi4=jA<~&dSF3Mg~Un2@=qR$&;Z0MNgx44tSZyv<trwO+AehH*dB$C
zxebW~Qx_R`%tc-Ge90eBCQZ&yRbnx_<dT?!-0f!fiLX1`f6wX=y)4_{BAlPuIiy`_
zVxzf&GWDJz0Gx9L69NEW2`_MZ0!iD27{6>8KSRs)q1#;K+QX;Ewx*V~PX<fz=mC8-
z)z1TKkH-!zzu#Zo;=f4zXK3KA*S-VpnFGl5PGwaJ#cgQhUnGKs+)nx`E8NmO0GtIK
zB9G}b9DEnCB$`0wwv`^GkUFi2I8HlMT1Yg5$OGl$kHDIibxp9;^{<OS11(<Ty1!e1
zrLtLDX$n{?FeuWZ1*bEb(9;`hAi=GKO$uR&*tiKp;_>u&iot<_a7J)XQgK8NfqKLt
zlKN*kqJ~9x{Po>oN!pEgBn!O}LI@`nA|8$RA6!l-__7m<0yP1_#Q&gy;Abi*CJ0h6
z6$p>K91cje4o?18F&Kdqq6;8GL0~`{0<)9C=i$bfJIS0erHyM)??ptv=H!9b@(NkZ
zrF>D}=}h^>AV30uBIrKmw<Y>gg-o5;FjjCie4uuT#<b`jNoaXB_d85Ii?4D9q#*=%
zXPyd{kagV}?Uf{IEuW|_mzIZwTE3b40Mb=MEBBtlR70Qztf;OLfs!D10Ddzq!^iU8
zP~gK~V#n^stCf>)4Tl3Yca6`piMb-u(d3s|S{(O@X2B2TP--yMIKw-OsIfCdik}+D
z<-FwfS`n6{CG+N`tme&|181snJcuEZqYWr=-&4Uo1U9K4t9sF6MG#eBf_?Z!4=tVQ
zaGm@B7zQgJ$T($7a1Evfk0`k={#7xfzXb8%^0>fky#f=QlX;7!IIVWvA>~%MB{P&f
z$ROlBfJ=!nJP3{mp*EpMPqwiXBH$Y{m{eKS3C<Dpy+@NBMT<0Uyy+be1{KDuM5hNJ
z;v~#@1d2op8`IC6kt6VU4+G>#>ZKqn6AP(S*CbjB70#j$5QIu=ndrbKfC|!s81I@5
zmV+QE1Ws+S=P}Ar(+K*h#R%X@lymD#@|}T`gwUl^6WDMgL+0TGB&H59BeF4+fqg@&
zvaQwTkJ6>Q#j|^%C@SaRm-!daGtAm9;ZLdB&{5(YT1u)u8iluj@aSTlT91jc?~s5)
z5P+bbh;0VpEW?GU0cP`qE#3T9?kzsYkAGe}-8_tZwQU*yRa>VIrV^$Kh5;&I0tsEI
zAc=Agt>~($aymY{1x(|GaHx6SxC;vIfa><h4&N;rY+Q9|em**IfYkU96M0JAPPRF6
zOW}KJy$pG|=`e1me1zBnTjpC0c}Tt^vi<tVtDnpCVRxl+a;o*8N@3{o<DdkBrzZLV
z^?bBII07~HgQgI8W)D6?4GBoYo=KKA0jNzRE&`zdHB!6>{XC07G}TI1KZIq^rV|Yb
zeF@V-vkftxKn#f*v4qr@fVG4~JurscE;t$*4}!v|km|^T8PgH8U*X7pO^DM)8pkaD
z7Crx${*fy!krIjmNPy+i)D;knbR7$yywQ-b5vVR%-_b?OU)5hwc%{aVCWmJt#S?fy
z(Je~ID^Lth_+OF6_fz#KZDf9^jtqq6C~HWH0C3gFM3^ih0LOs<=tgzI@?hZfLG0?`
z_W5cA@%fWfniKiT!IDFh|5LZhMebK(N(1@CVhEbVSMh3TxmFZX@PF@tz|}wELIgA)
zk23dWcgH(di1+T!2eY61oPOSP?Rw=xB*5!l^3~eZ%EJOS7#~T|EtK^J@qD>Q^Iz>}
zn|CqJ2BKZr45wTFiQj0bmR0;PEsrwIY0szmRMhn@lJ7#`eG*vB1SOX;F_NP=_TBz0
zvSL+<D|a=6WiXmoc%L4LgB+IFHRb>aSzjzsA9X|l3S|<(M4(15P9!J}YCJ&|7m_WT
zW#ULtMt!ee3`GV*kbnUYnv}FS0TAR+Q#U?VMVN6qBAvYCEQTVLNSOle30JQ)p;eVk
zi{I+>O4Nvf4h*YvgOEa@P%0!E9%Kn@wURir_>CanGkFUWC?pq5qFSjSU#Nzcr70K!
z!`8J&WaQIh)8V4#)_;u(Pz7iHp-o-J1Dj4`(Rhy+u+x$uhJUbEfvdyOGLYF;x~<s1
zlVpGAOOG?AF2sVx%ex2>9@eCtWT3)A9f27D{1?PxiW<N>_V_{-HlKa#`b3wtw#dLg
z9B;2ze7ZhqS_7K;c(DBLAdt=KbQ>X}tB_Jfa%vU?@^o2~>Ga-nJzMbH7kE>s;zT99
z?$xzUs)8mU0j8S5M~D$hDPiNYEM;;#4y`Z7iRSTenJdPC(D7Mi8FF$Xhf>ki-FeGM
zu{d;(WPjt*N7AqnE{u<0Om^S$P+1Ni8CKM$+o3KV)bS+V=}XAaZ~R(rNoPr&s7b@2
zvYx}mREjpU=gv&=GSS_Ia^&x+=~Q|10ay<Kfanb*C+>q0<o_wk^OCndhR^?!<s+Tc
zpT=SVWrZgPA_7R5tjUByq`_QM03sC>Di`!6zA`ddBR)M|)#2~5ZU!%j?kJ1C4GgSX
zsSQVxsHMe~`U5o)Oc7TEayKxm?LkHHc9;tDa(c~8C5B)x-NcY&ft2c$LsJgAH>s~(
zq3@_iKhdD_GF=ihAQNfx4nWGJx7Ue%-r6kYEgN?~Z+4!oiXaiFyPAR+0b$#wcc*hA
zjPtghD&*JIUuYXxU#MVZP(OZ(m+)j!(>R8-%q~^MC|!>OK}oa(BCmg<V%>Ai4aAem
z`&>#P8H?htoeNLm@28!Hls(~>7n5tMD|OjgjGxT*@zZ@*!gQPHW)-Kml3t@G9Cxn;
z?`D~mhJwa}qgKo4GUGwfqL%Cm7Mir$5@8wg)I})jHr>-f6ZQXGhxuHzKWZaRmRk=j
zyj#+B$WY9BQM(jK;><^78hedv@$zU1cwjiADxBAW8w$uta*-0_n5k0hN-3zH>2>^$
zN#5_j+oX|!q6dt#N@Re-WubT|`POJ6Fn|_nK@hGuo~WP9^$ttF`V6260^*k=U$tXO
z9E=S>b<6#xE@ewi=&e9AiZn_y@@$EPVk<o0ahn*wL~Rn0?XLvJsYKKOj9wadB4Kzk
z1`_y&cQ!qZkV^xTix#hrb~tOdG~)v!m=QdKh2>q3rV0VwEMFu_pEhx!un`Aybpq)Q
zU%6P_>~KhCF=i{0U*Up*c$DNFQ?rsZE;Q~LC5S47B$uljm`Woi$c?W|q9t#Q2+u7g
zQ{q`nXM3|?)8C4e6^(Wlo)g8!9{vi|Rq#}*6rD=}ubz+T56QdO7-;Vw(wwNn2<E9I
zP9zHhGgcPt5Dl#z#II$Ii;9ZxPJ%O3n{-w58L86y(XLeI)k|MDW2#EMhr|;j1)Qpa
z1F+Ny2oXRqMj9wSE}mDe42X(5UlVJKY7Az{$8QGaiTkyXFSxJ5ge;)SuVdRtXQlF!
z%13qLeHgvEo*FD1E<tkd3PmQZUd|_a-S}O3-zsq&i5nvT7)Hv4VW(%%{bRz4%?J>w
zE@cu*+mr=sm#XrvRlrsQ>kG@#CgHm1Hy`9YB{G7!pbLTi$pb(`E4@PF^w~#zCH~RF
zJUdSO8Ae&zgNS6y;7k&Uk=E3N^$y430FoExC3=34arM}~_H(vt`O|T%h!vn6l?;<2
znr7TH!pA~Xg*xyOjs4BN*yc&9Of2&chDaP%JdF&ze%4#F*;YyOU;p7U>;LIiMaTbf
zaqwgD(PW<6(IhFo$i*S@5I^@if%$R7w-hgF?4`$1k+sgtXAq!x_wSq-6Bu;hh|cO2
z^Ly$8wf;Kd%(8rQRi7=`@C6(qLN$3aH0r{0D-##D$1ygi{afJ3gJ#Fr&2`e57Y}gG
zXA_Qu2+vW+<B^VQ?N<^%|6!=97{hA!UM<G=$=p*3KUG_NV};`9|A=$!7rNe8V|4o9
zl-q4GC}RET^L?7zlh7e*TB^r%UpKD~ULCP#*9i|Ua{8(7Sp*|g;<UJM9T(9ppJA8e
z=<Bev`0$l%kK(lEtALP34FEmBu1(*dH-!!hnG3Nl%myW9&Mvtaj$4%Hm{u17aDp(B
zXV;|uqNU=!0s~hNCIA#&o*NFMY2ilX=0vC3?MW%^H=*wnCpBzr510#7UA7C(JxbIt
z*w3M^9?Fm*n$Qj5AhA2b;+D#aw|6JwinSj%3|L;kT0HOdX)<W;c-~#3VQ!Dc`Ga-}
z{|u$-k-10-A^9vK=C~F5SQ1oV(0zC3?N)skC%Slfwe|y!#+y<Mnt=~M;Lsj86iZ?S
z187g1^E=H=F5uC8M>iepwkVO|hm0O@TB6te&C&C90Anyr?didZBUW7++tT*n?7+`&
zhfU>|aFtGI3h@tC?ydR&JsC-VJ(Sg}LxHl#!!<{rjV05Pj-w@~_oq!`{`Ia^4~Ap5
zs<XxAU&;PKkj8Qlco@-^md6ymC1`vRfe;2^rfM)%``EdJIBLdrSk`>{JUdTr*o<9t
zE`b*WkcIYDXdHL#4^TclEq~dW@VzY!lfF*rhm)vH^fO0DPK4p{Y}|K0|Kl<KW;fxV
zJ%#w^5Z4+6__KCys2Ut2qf-eFz`&E|9qvMqTnMF!{>ty*FzR?}EE(T(>R|iMYqecK
zWQMhy*{!hN#>B=eUPB=F*un~m87#yeeP*}wc^-)z5nOQSf(hM1<o;v<vyhUIMna<Q
zg-fVHzySk{jXfN@##;{w-1F1`H7bY(3>m;2MiA!S!GqDl3WRNwFZv}Sd1f?Ot?!B{
zhI}d0_5SWrSbhzR53pz`i6$+QX2S3Y6%EnDh7u$abD`tP^I~Cz>lcDxR5_(!r1(!C
z#ibB<+R=d1`+k+G<AswaA4la9_4?)elUA?6%Z7|Vp6AO{Tx$y~`BYO2O(}eMB2q>Q
zO4@hx$fw@35lwC0fWK%B7ve&wMP<8eG|aNmuV_3d*V;8(b@Uwv*YkGt!Fpn;3<=sy
zEl)d{d7p2a8D1tn6T+XmHBYPWPThX2W&`5*KQ1^2=f@x}F#^@~6e74W=4GnqmHWO6
zX3&G#Z3d-It3e8aqFJ|@$gj$Hl{|uD;d9q>w#LC*$09T82yn(nt(e1zotH=>fGF?H
zXe;bKt9s?_@LeiEVsu2pi#eZ@w>Yo)x1?h6XZvIkEwtBEgrq;Sh6lQqbJjP@c2@O9
zsML{Zr8g6lBJ(fR%#J?G(i$1S(-BMIdR?<f<eVjPf}9ENs>vTHIeCykT)4<H){G|T
zP%sp#oJ4TV1a7=8>F8)&qv4TXqpglI%U>a5EWFtA+asd1sX;PZQudN%j<CphmJ~Ri
zYECf)W9+IfUA09*;xkY~SmWgPGD1>|8X=5G;1^Ags|r^YW9)O#ySfg;sW|5PbKLHz
zSfXB`Y4<{l?ZMw3zi(P75&iscBI-$OmL%u#7Y;|psL%;=uW|xeSuk#-l`&D#bd?uo
zdJXvNu4=^YuJ+Zs+qN}*x5LspE^fb=Oi%g={OfHZ?mMeXA|5r+@mKyF4=T;Op3<@6
z=v@ECCf0FLDmJ=5k$xVfSC-~z^mNJO-+mjBrE=71-~Y?$x9E*Ehp)LwsFZo5?B(RK
zk^e4_48>0w?~fr;v=Cs`({DUFj1>54cslbl4jKNt=J9mq?NdIx*ExsNof#8w`1NkO
z#rh!U`7tV^Up~O}U=-u&92W&%^Ki{!g?)g$^8RM|W7J&r!%Zv39b&*sfE5f#5J=da
zQoH+C`fM_+-B0I%fG(bspS$FeKK$(IpRS(~fF4_(o#$OSk!#K8!%Q*k4g$Z&FFG8p
zo7To6`rxgpT3S_(Ls)R9|NU*u^U0!9-|U!xq40UHTCL+~N14`Z-_24~nTyBWlP9-T
zH_X$1+ew_9vqz4{li&WLj|(iy1d(&WkdGrJ4SD4#0DLm8+f}if`Y{J4S>w$t1-=LY
z_dvo6Nqih+Ec)IW2s8<2@DS114q4*OP!=hw&cq-Kx(iz-;!DE|^n-@=uM)7^U`V;D
z8<pxc;9!_~Hft~#EPU$+sk3t9Q!BKk1d#+F5K&+7(5rua?Ohk%fsTR%jaHZ3VX2Nb
zt2%nGhzW(d8_}CIF6@&`)6e1R*_$qhP0svX%9PS^D_vq~;7;Zy%4Iw&P)N9-Jwy6y
zDQWi@@F4TCp_N?XW8BmE@k5Qf5Ej7md_Tl+e7}3`)M3Ax^NbAq*O2l2xXE+vI6rH*
z@5WZ_M2P^5Zd2N#P<5t8`VzdaO56<E<|wzNZ>)a0oj}_JfIn*|o_1EPwaO2_3tM)d
zT<6(J+Mn<G6`npF)GXxcqt|}CT^t!xe$RItg1UZ?<n>hPM2Rs%Jkg0}#bLzNL16MT
zv~{!letc5f(0%&h3uW7mhk^gn$;gV=1PA-8@M+2|#gq5Jzn>rQ$^Bg_F0&;c9&mMU
z9!3LJa>bkmHEOa2-8_%Z*SdnN#oAmwIbPUpqH{wmxAR$G4ZhpWlXc>0@x7uGuoL+8
z@w-P}yVLjZ%-2u5rCDjhZgv$NzmBmyjIOV$qw>U>h)<h|yZjz87(^Z~L4(;t>zaW_
zF2g5Xp7U`ikAEZf9#dW)iM?;zIo`Aq6Rm#jc65MYCH!yjv&J1_&zJ61*B_tb-p@-a
z@AE8=GW6woJU5yyrg7|p1^}|$)w?{gyS?JvkMlTd7Z=~ih+~D&;m@s~27iU&<h^wn
z2+T5BHthNrfGg8G<bQ8$`F4t9KFq)4Ji@&6xA5_)rrpoCV<-2I%_Bwk^iz2HB|zak
z(I!t}$7O`zSl1Ut4D}0>u@E8dJe#Gy!w}f|9oVGxl`NL|#7#P5uQWy;>u>#(B_n1U
zyRxbMAl0TKAQ%e82_V^y;jEP7>I_DUK(J*%K_c+}4ma$`4-<QJAH}aplXc4nE7&O*
zCrIQSuu%$Y<cQx!M$GWDZl<TTpS?&{q9#v_%{-6DyOjoTJ}bJPwY&3l@gOWAo+2rb
zO1Q?%Egya?lYAwbdAlZ-y28Nk>u%NW^XLAG^6&CHGLHbT$kA)so^!O4wc46_E=6~|
zzPOyXS8g}MmHy91J9KNW{n80yP2xm)WPb7AUZ}%=8)!d*{I0_kWHKJ#di(>5J~{pV
z7S1sF`u$7xNl8C@Mzls{vk~v<qLVQ1zm6|YL6aSqBeU{H+DCT>aa|$`kzy%0Rb3_~
z%?2)4O1>vg7^vJma1LJ_|EKqCX<fIR#;qov902h5<9-XX%l?6Z%HTWS@4l@`3ZXIG
zc+clC4#d%qy_=^+W7-$*1+R30#iox(um7m{mv_K)o=^DNO<^^MC*LebfKc<n2k+IW
zw1?vTUR#DVpkHiNzpqEY`0ATz!H3B$^YryO(lyZvnKxd=)-3No|G9rjiZOYJ!NJ-?
zd-4Bvy>a-3Cc?OQew=4aA!PY0!F6@N+;r`JW7glxY4RV#V(I?yFT(SC10C+uz$K3T
zsMlQ{?rV5HZHnmFb_?0#)JV2!Sc@IVB+5k0dkXhsB(KL<?JX_jvTA)9mKM{SZl(XC
znM!MpiC9=lL=ZwfFaUx|E2ciqv3bS82j;mnG&v|YsWqtz)SlP^;Z$|_7PdVd1?Byn
zp7CLd9_NUcHM%=G+f-m8W{{UgWv+NIwFP?Mq;9dEs2^m4_BQ_!k%rxFJ#4&rZZXfK
zS<7isA^dAjl)Sfu5DYK|sBggGhlpU<iwP->^qLe9W=qV&dMkZ~UGn1&5NXRretsqQ
zb`DVv%Fu=z2q-qB!DJf@l|pTqjzHY7Oc($^iTY|Jtd@-X2kuZ<02eXMh7dR$?CD8B
z#$^k-4c+;QG{X;d99u+WOn+!OmnziY#?9Bg@Ap4lnHS^C#U9LX>>>U-z@+djw1FDg
zV761e=o(%}%<MeqO}}^eMcQU$>NTt9bKp70M$NeQAv18(lI8F6So?n6Ufk}L!Ti7L
zoc6&B7Ldt~$jLM5X!kUJdU~AbNiWZi@#iI+^%b|gH@W|*r8>7*eipp+>%)aFjh7t>
z|E|dRZ^PE!7PRY+kk+~nV1!5X=<`ol`59&~6hFcny$gRZA_0U+);I@AFILx{ds_ij
zihLP@I`)K}OX<a(Myy0O_RMHvU-LT($!-STV`&>UXROa6jgwJ@v|iNK2O0(a4GV7}
zGzVm=dcT`w@~(Ii$Jj#ZKZLRjs42T9z(73&wWtzg#)8lnlRQ2=1OmdZq+;V>M-WMm
zhyX=Y)3vJ)^uU<k6w?yVdj?2+Exr~80idL-`=7JUR}va44b$ESDd%;rqUvs^R0Yl!
zr30eD31#_H4L-#Czlz-QCXw@wkzphBqHsv|X>oLrM7+goOZZm!P!}H)g3b3d5Nz*)
ztvWamiHaL81EZa~%l6D^SKFl&Y4<Q?YgkF*L|}b}Sn8NJc22Xs%|Q=>4OkTwS8cHP
zr(d3T9~OfzE{@?zH3MO#VhthT;dbvIFN1{lwm?z_d7a+V1E{atDULl)IoiV`5YR6w
z0(f`0aKAWE@0fSH9%T5p9j#0{S+>qt|73B?RjI@n30&6l=!r<V`P*pS%#BPi*Ku|r
z<GB$JLR79Akg4&qVnH4-Jm1%dI~%~iA3L~weSXN{cy}$<)j{{ye?jL-_<onnPF9<^
zJVX**Chx}R;e5=%Lr&(|!QY^7P4vk|k5<;>HTUJerL|s$FD<V{ZdPsv#@8Hi81voZ
zvBMG25h_HH#399qovP6I-|4A7vv&fBYC<p0DI-w<-@k*XX<e->;6SM7bxN4=+wD1;
zcI4#LDDaD8*DM}`Jt82;-Fbj(cVi#*`JzDokd5M0Z#5d5NZd+`2w7Z+g3~}bB12<-
zxQcwA%kZ0JRp$q=jJH(7HqVH*FeU|dP#^N9)n~wsmOQ}sNzs<xRxahFxY$H8EdbkB
z95nLQ6diVjf|@_6amY5Aa%H{)&j1kA*-=LaFkqM<m;4_c#nlX<KYmCoz-q+N<~Foj
z39=l@RJA{ubtcnwBxjOLp%gmPF^AcI?yrcP>Kxbo8^C4Xc748`=kKp#l!vc!>^-2C
zBkz6pyY1utLiIP9mW^YP$hND~_Kzy=2dRHo8_Iofx?c{1mJP?>c)#0jjoRtjJ}S8%
zWd2=Xn{F~FG-#1(ar|!7PWbUadrs+5Z>~CPt=gbaX0q^D<ndS}s_k0V{owsvwYA!H
z?st(kkNwr(C##(ra&kXuV)xxPMxGb{)!-|?k;}NtIOG%SD$qUpS4<3G+%6%Tp-@-k
zTfG_}&A0H}KBD>h?GmrV+1K)_h)3ms@N1^%r^Cdz0!I9|ePNf=7^uhIA19*oRNDNv
z>*$>2wjDIs{XeZY5M%QmU`l#rA6}*#avu&_`*YtE+U|-JUSzHi{qE`bp-nk=u>5?`
zo!w;H_tAWw&dK|*?+Np?$@tgBmH)#}<fyF?p4YeD{;QA6aoulEQ~<#F`=bgL8>l?{
zcAI5KYt-npBqOTSzm7Ovm*;Wt;UctKrPI4Z*n8QZEqggG;^uc6d;2yT3h?IW&ZmrA
z>DTp+LSDya>R4Xl_TXBZv!;h!!19<e+nH5AKKb2GB-a#A2n6<X(%)k+<mamY7+-y9
zjgkLJ{?`C~uG~~i%pQXHY&k0W{qvHMBER<2Izf&KgPVoMO&|4_0E2jZ>K1)QXrOyM
zJvv<0i^2eV)LTw^fNu~R!SZw2{GH5pOAl;@7VnjPAKVDDhki?W@Q%qcDrHk+(9Z-v
zPe!hAhD`VCvIRJ>XS@cZL2CReQ=(TEN^H$dBOhkeYM3Qn6QTM3LTDe4Ch5HrJF<)c
zKU%n@4Ow%i8A<SN$h0D7_NDdall3Ff9b?9xLNnsL-nvs`Lw;kv%zSyg{X*x%*)S6i
zW!rii*V@fs55BTsy#{VES+NvNP^V{LaO6F8Oy4qy+q{B@bFtv6M+!lmMPHBSJv1*~
ze+BCg@llnN=lO}h@$E03pHCOl-Hzq4Xv`ag9$qJ}SJGHNFI<bPo%>E+f1XTwB9`#%
zdLIBSQ$Xg&yD0cak~ICsS8$`vGJR-++;@|v_xoV$xH}NbN)cRsRw{NBzpjI@K1ZWA
zAlt7EN4B>FBx&tZ(b!G1gNk?ta9g&<nG_97L8PGwf^Dy8D3B6m=a|bhnP2pQI@X@1
zx4)$1%Q;{1mB68s%?rquXjFu1R#MH!E0+brMr|yjnEv4gzS;Oe9-))J?Hqf@IGlob
zhkDsYMn#=VuCJ2n)bJ7@{WJqBqL=D@gHCE{G*ls>@;yC1rD!UM6j!7m_3bFw5PI<k
zx9`d(z88&Fh7&&beao;&-A!=|NeXt_cd9Q`8fds{YW5w?^q2J<a&-j5(PXJ&D|K{W
zk#9IB?~*ewGgO8@`Fm#E-kSg7sj0u-&8EXj%h63SWwJsxHm#NK>v1y~2dStkOwE_!
zvz6)1U>~G1Dh!Ux=$ndl*r#odj!u3%zG`{uy6k^mv5o8f@|9fd?|D#)6h2b%3d98B
zNBRbfb@7};4N_l=@Oug50=2dw4Si$Rr+5|aK{z<>TBpD!N#lP=&D{JGWL1UM7(shs
zwEdSWawfK}<FEOGIzZn~Q{W1y4Wj9MXuwYUJ}4_O6Sojck?^s99U;WI69HZv1%)<c
za_1<Q%v8j?sAE-VGUq7s6$iTiC#sX_30qZ={p&kT-v}KHWDCapSQr8<!x>|J3ARZ`
zi6HD~rT`Uj#}|&)_rcW*;qvx1$&RvYE_eVOfi(=KiIHOAjz*85;*C}g@D&W1z(yrw
z!&N<Du20||)(A5QSSp~9Y}-a95z``D@|Fx~pXm*5Ev^IHG93eka2njS$bRv9)}D2n
zTbqX1Zipk%uwS2^XNRjPwKw&FGiaOcZP)#(PmYiWrQ4X1-am}K^5EtqJ>Dt}sb;QN
zi*UxA-Nv7a1OMoVYC5i3aKtJDFd1GUB@dcd$(GDY2T<qvo*{@!ZF#+is>YwHwqnYZ
z@zIRMm~RRV41L=mKj>^gF04}JAJimeX|O;(-NIao7d&72Ks2^=9-HcHo=TWtsNis4
zObS8;Fzw-~#>1+KY@Ng6B@^8BI7w$D&D3+XN8>5;IW{3pAX%1PTG^7BJ!p=d?2CKD
z9m31Y%h+c7f3`+wYBWISD*h<gsmX%+9X9c1kHnkSM7sRdT$Fe3Cyd5z8bMjL?{V>_
z|8z6oZ5i?*@DyhtCmMBgGLv&5diN<B*{(371K{FrOi;wBB=v=k0hsT#GHuQVXnw{m
z*-ai4e=*1XQ)1J0ROlCWA>ZouGNb8&NPvZ)CUw@-Hpxd?bW##kW^L*Xxq|90tKQ^#
z&9Ik6DZ<9v7k_AjrGkwSBHIL`hZ5l_vZ~NbQ2i>`mv=t<Gyw>o2@paUf=_PICKbRO
z0e!@-xS6MY2C=?qO9S&Gy20#XJo1GJy-UK>llYWse~@!e5jalWd09;{zBU(Ic6}gM
zApU21VK%6!+{9x4;%fWTTRw<e#_l4^V9_;bF(yb5dW*Tqj|Yh_f!WqcEgOteJ1uCx
z16#_|jMZMQNP#WQy;0v{+A#jHkg^L8M&%^}RtmoZGr76g2o+c*GiTlIZB!|VeM-zZ
z@?}B)$NRRK@d%&AzfuvF5%T+zKjfxj7xIV{ITMT0xRMMRvOTuj>PW>Rk081+#)EoQ
zh3rO2ESh-Uq|jV}M7^1+K^E>2FX~oy1MtYD9bX+3Y+Xf_4}`c_TGG-@$@)`oYZsAf
zz%i{u6j_Uvht~I%DP$zR2CL)NY6ibA3E$IWAgoen^iuIbNM~}U>VrjDDPig>i>$vw
zX3^FEHo<I|jTL!bEK3auDO)fpcS8nK1)+z!@W6!by(K&mK1-?C)o?GDx_fV7MxaGs
zGg$|xwv@c4n;wp%sv}0~J0Hdf-bJQ{AcUw++aT$?4EA8dU%gJJPvYlfF?r+Mv52Q3
zQS&`Y=?+3@DA5!vxWC#<US~J#sg{bHeDNzH;-6WC__EUKq75(}+_Z#%&zh}BqO7DM
zO`oVq%OR~D>{3g>F*QINrkuSN8Bxu=#{}i`NK-DG6&C`_?yJmLBw+_?3cUl3tl9Ei
zzq^{lkwVCICI7y~-9rVFLLufpd;cx?J?cyTV*IR=fWq@<GZd-|bXme(9Awv?GoNwh
z9xVH3XGupJ`WVZb_a!W{0WzMEDYBu?5+KH$AUzaj&3>G8O<MImix_DuToO(U(qfGG
zEzNdLX{~-%?m?|@qRRSqv`tJN;)JgyrLo@;EXU_>iR~qBzN0n|TW_OLCR>+a<~ecr
zAh8n^43<ES_-TtG#fU*O?Afs1A)1-O?ClV6da;~39v8fwZKJ@IATUVFA1~Ekp@|-X
zhmD9Q0Zx!sk-e{(OE2CEp0*USkZCX<9+r!zQm=Js+Nr9=NhcJGI<L9qcXFO%m=A9K
zp(~4L#apX`hDWxBD^iByt*?xntY-QaQHhZrMnEPWj)>m(t<Pe`uX=-7D38dqN|t9d
z-dqBLpXHgKY%4BdvS6P%XUC%SUTPp9TO~2Ou+L<K)KkzyIbbd${7pVQ(777MtLwbb
zjp;@0ZxU^U$+Lq{LR|mIY-WYT-QYd^rYl4{7&hr->o1IgC*&7AJ+C;YtZh1h3=NF<
zPN&(C&Wq|gf?(su14W<2ummp*Qku}81#{$u#7pJ(jWAhCmw%&neQY^HP2`SpjR);T
zRRskXzK>(?1NYMhenF?Gmc(EYBXii8PGuZUhHMM9Ij5-2%}_Ts8H}V$3{jfl$54#7
zi4lb7dXH=kDPF2sJ*YNsF@;+#Mp&&#uuTKSGqzOm@L&ivY~41Bk8!h!_q)M)CaJh=
z{Skjc3KHqM6>h^1;SX;Uts(_KRBhqji-$H8r|iNDHR#FFUa~6&`=t<e{2J$}@lwR2
z=v`@4C1Uh{reT+5q$ASvXi$`sqtOdv={~*t@Gm~&1XKtU%#dwji{^^{KrI>)wV>*g
zzegB4W6c09g{G83W%29qi~^^$A|zE9nq+gLo!BM)v;=BCW#LB4sv#g`%}dtzha8om
zrrOhUa|J+fJ8>n~%)WnPmT0}&Z!9Y$RWpHB8<l^C#~dZWgkTC}waIU$u;n>^#18_|
z(a{q5?koR<Ii|i`Mab0-^&n_1Ba?=YDgK0v<?At%C#d2PVr-*FAhB+yypSRXiSMVZ
zo)V+}zYB|QWj_l&$0hj(lx1TzPl+p@P+O}hbXD@)FF#hA_jLb$Ow26_t4QM<<r{Ba
zG^O6RDn&Ob5*iVJ2yej=s33@fO!S)MRt0IdnL5Edc>SCf7?4ld*X8Qw$X<cbXu@yR
z#7W}F8^-&|jR;aQ<iA70VjCT9amY}_;V=yD)V`wZb1i35&7t%Ri%d|yvtwN2pcLr9
zCf9U8WRJQ?qb6Rh7A~mDf{6H$nrs5paH?m(6)u5_n%Y~VcGjidYdOzN73G_1OIl@k
zM_D<Tw60Je&CPuvsd$m}<{wv<Gbj5my@h2Y2aJ|JcY}2U0CqQ#Zox`2gZR#kmP_0w
zn$xjiG<sx*rL-@MxzH*#;8}tOtOlRyB@R~W42~44qA{v3B)2UEZ`mP|zL&|rkfpam
zLZH&cMQxC816=8KGL0>xDS6bw)<@ZBsimkMgEWUtRjHO}o@Q}N^eoD;g}C9LnCo}K
zH5o7@U#ytIX?hgizS5&AG#eT0+M!QUG8>BcA88d82K5;%e<w3DX54@?Ir;%yHLXF#
zOE+F)6Iv~Ksk%{<s1NoSR^#k0I~L!tr}6k`+)9&c2=k`05vEz+Ntp^IPcihM%d%S=
zYRS`AWWYBvIakothM}RwRgI1o!wT(#xM3Szk*<*R`g(Z;qvY**am)98Q$mR0;knjy
zgc^xDJ<ALniU~ahyDE!p1PQ`@-}y`lGQs`M7Smue?J3Q-mHzB4s7<kGF-Xim5x5GY
z7wL;;%jqyfx%z6QSm(C7qw%W5=9UpkHv=n)6_o|QWWS3nP+bW`D$<Xuvf9v^a_u}*
zKZ{b#l4PEU<4U3_fKVn-x{5=C8LY8lOm)>!>dr8eP4|%P7bJmD_#%Fvck_q7=GrE^
zUj6cFT8skTS1TlD^tG3+;DU|-OojO9RmT!?UhOdW((IBQNujC4MJ8tFSMBP$KbSO?
zb<rl#NBxrzFS!l<g4TIUO>Vo2A6f22M(2#))R<%O>a)HIXXe3odnkT0q?bao`hom+
znhTzF@J(DO0-774Gp%OXqY?0Sr({Pn@~_82bgYQ;54vzk_8m?h$>y}6M^?^E7Ti7(
z7Hu81xov^6Jaeizc9uvx_8N4H`+l&EL)g_D7NxXY*T`?Lt;b|YFJU(n3xm70cU6jE
zHbW9o<8omdUZl62)glELkrW6_7nHoOaysQ1@tnT<R!w6UAf>P0ho>hHEy}kekxnqB
z+v0PvcS15kBz&IwU1ewOMQL;rh$uFHk_@`_M0>VIb9tdTua#Z;-^`*6->EYdCU^yI
zX|YU*x;?g~z4mz+iM9c_W_Wke>xRgmm5Jk7s1n6+(3$d5X5Xx~wz(igzxH{FX0nzF
zWTrX@(|5>jrdX7k%CK-!4-{iN{E~UA<9gO-m3b!GDIJdT0U5n-9*wk2`bPx)M;&P}
zZulLZnW8TL#K*Pt=Q@Im%pKw6U5uO*2jM6&*ZI&Td1fol#0UoK!ukO8Y1sl6+kt>S
z?}A_$soSz-LB9=^*_>47?#Irp4UEZGg8SG0%kfmPHxRTu(D+of!tM~|^L(m+F(N7|
zYFO!?IgS`nr*RUiiK)<ssyO0Z_mz*%&d!Vgxzej5SMMda*;o^Da&mnbSELPhbWj&P
zNi1uD%S#U%+-<2o<B0HOB*1II;_aI^ZwSzl#y+r8<Kggr&g^{wD&{eZestxp4e@QU
zt}hP+kee@1g<9af3hM81oS;7Z^JfYnSIt1)xenpZ<y*8MPfuG=P>>`~6C+#G@H<CR
z!Ty&Ilk3MgKzVK?Xp7+gHM&*MRm$F~kq$-hV`F2p1)%8>6}$qGB1Gfc{MR?a1v4pl
z@DCBA(wDN7V3J!HULsC3E9ot){*ML*i%;$JUnBCyLE_cC5Yd{erOl(-8vTVIM_0c^
z|Jo&YE-=0Qth-JkWGz`e&{koo%Ky>m=%q#$j{K)U&sxn^e%Sk3Fy_}gd%iAs7IUK*
z&N5(!Q#9l#{r2z+;-hz?y&%2MhW?TbHE#5&$%G>gg)dkvOtS4C_VMK#m|@T-qFEa=
zMU3jZCOwgAi>*dm8U^{%YHhRXfyVh-Z~c)QI#oXV^e2)Knf{r5)g76+uZ&ePxv5$z
zPgVmD6h6c_!klb#SY%GVgYR@ySV(Vs?6j<w_iMjBsx?nceq%a#ax-LH?jX;s{_NA1
zTkHEZlSW-q+v$L(zk6H`Su6e0-Hg)Z3cH<j*7ZUw))CF=A>c4n+8F*ft5&FJDD&EJ
zjAhH8%1vbI;j{X13^{EEN)gv2?X;9453`wL5=%`cAL~yFZ7rPlng;Fp2-+%S%^$Mo
zYE%0<P)CX8*mD5M-4F3I+xxctR#<xa1~1TVs(g8qfI~Z0`qe<lV&U<N>1E@;+BqU|
zowb^%1@`iC&dWLW^6)PV{yd4(%dTsGO6!_lK!HK?N1H#NChx*cbQA(?zRIh%yt(<)
zUNGIJ0(~F#7k&U9iCmASz`&Yu4ddP{tr8F&3Mu>%1=Vk0=OAk^#U9Tr54H6D5wE59
zseiO|BD>ZiWG9hOfqpz&U)v^Ri6Z4O-12<GICmKt;{_8RT7s+fk;YO7j9G>-;+M>o
zyjzND44;U(yS7JAr88aYKCA!9^5u-?t~%oh`Bz~1=2A6vnoA)|p06N={s22H_H7F$
z0BvnuKApay)5<D5F>-a|QzS7kT{ZCPFzZz(G3KUBm9}Ri6Ly!26%gpk?f5aQk@Y!<
z=VebU^Pn<(|HlaZd(DMf8@r53@sk#NjliKBx?9#9L5}1aFD|}=!E|}o1w#_%LAz4D
z&O+~r=*UuS8xPH2G!xHf1W$8`Szj)@>MM8{c<+R^_v%VJSC(YX^Rj-QrKM^qrQ4GE
zX5P}jrj3xMS9sYG+AH*mWiudWF*pCFIV9QOg})t+sM8k>ak-YGQx_KG-RL$=D<1A}
zMAG>f1aw+PEt##xD{^13eB0BpuQ*{-E%QsBLq);3%upn?+lx)mo3V35NLUC#zoL)E
zk5^5t>{5;21{_@Pb2v??f1ceU<%g-GLWZMYpVoJi?#GhV=GdQIkdb$C<NeA>+Sfs;
zwaJ&*;o<1FCY@5)$jc8m?T2jGf7QQAY^3ODtg`D{j5Op+!=kJdtNWtEI<khk8yjSK
zz1EFMFxmL6Z&-5V`HXi@E~Ij}gHFj4RPS9Caq@{LZu#*oul^ydW2D-l6y#H#M3u2<
zs8AgiiA=TwQ#Mfk9*E^uIh2<C0+<H;j{Sk?vZ9=>zL(jggsNOLl0!dtewa3dzVHf)
zD%YpLI%KP#v${Oo_Vzo~+nqKbgn$pT14@#iuN-Lmcb2O#zRzI-l3^b*%a8RcO6vI1
zlyU@3BYw3a(8F>=LCG&y79)wZ7#KC2VYhsD;SKL|hb7~j)DM&ND_?Qq4l0FrYCl|j
z{uIY|^xN@REen>4J^j73n*EQG<6AK#{-}l@he<lWybe;?JRU6y6m^jRVq@p0maflB
zsrxaGelrCXZZRx_%_XGuBl6p|N<0nAWFEvXf^VFxV;$laVVg9>^|01;H#S7{_~}Pp
z^sCEGmLaTHyl>nWXCv|3E>W?6khPpwrXZhBk%V1OR!07Fe_=7wOsDpaZvGD36z_@A
z8wc_$*cVM-XNoIwA*7*ba{e!Nf3vX;MzLc`M~~1H>>DhTBaxd3DK-ikf5!}1@?Fr4
zdG^sz^G#zps+CA4{a=R8#r~SZ?iWQ3u?8R^OR3$y)q-`((?68+U(|>V+N_0JxDz(W
zHFd4_KLL+VSQg!sL^Pcbq0UZnZA*H&g;6f8D@7x4G`~`wMD-?Ou(!8hDO1B8B=EA+
zBjfYCm(2C$Kx9fx8YLdzh-Dd)WJC&`ipK#5p&QPG!an7{Q(SFARj?viDc!=DL>nY(
z9usYo$xo;IO*}Fc&I=nojYp8o9@|T65x<e(lF{D7hGjI05c}W={}8K%h?1S)<+wq*
zFYY!p-(Y4GQXUdWQcW;}QC<m0wDkfAqpBxD?Z`y0UO~#M7{Nxtumuwxd}4DZ<8P(k
z;w8B3e(q<l$7ZT(<=Pl%9~Sy1e9gplV42aVrm(4OYA>JSRLhvuA0ix^Nnd`a$`B^q
z8~ztfCI1v6Le&`azplPAAdaA0c5x>VAh>HFxVtUx?iSqL-62?TcXtl~f(LikAVGsW
z!QYU3-@D&^{cCrmcWlq8uBy``-WZEU6Vh$wdE6haPD`=(_1VpAKx!nm9&;eJ;cyH?
znMROz?_G6LSH-b~j$?h)CAiH>zKLF@%j!l*rFu;)CM<H~zRLNapgz^jVp0T!46%^N
zvQyaTm~)&Nb};O%OU1t(v=s6QguK#=fV`(jzVKB<gbqtxt!7EglT5FfX+^yfF2ib<
z!HP{*6(iV&o%K9fROc&l!Pmohz@c8wD>aY6KZzmYk+biqpBTB<4P#3SKaPSoH<F*6
z;bA9ZjM?m#R}M8VR*j{Jglf1+7p@*EbRB{QsT6=F!cd6Gfq)<dmScy-CTjX9F-Gdz
zgj-*T7!#hvx~_Z_qHcBCN*}2-w-Q*Q-4ccO4r9K_oY2{l^XgZQ7~Y%<Wd30YC`W)K
zV@n)^So`BdLL#B_kN_SAb@_CFI1C)hNNmfThefft9WVKcy2?bTdc?Q+HlVB4e_j3L
zGLkzp3jc;_6>=Z{4d?m`PsiP<Ad%K3-PAoT-2~A^Gg4>$ZZ)T_f3tJbqL50sNg7SK
zde1qdzw5F}-0L5I&LC7w=F_0*K~%np#rH9Wh9GD&m(iAY2o%I=8vN$dkc;T3Ckh4V
zxXeL?1BUb`Tm_bQ1gs53CQA*DQCU-)QxnImpfBJgDNXS2X?TUau~v~CiVU|nw@&$<
z(8z~q6%@p=EVTsmTg5yOG;Bf+TTKf9Z!(72tO5fOYq1e9wmgFZ1NqUSV=dp7%dth|
z?BiZgsb-@o!9!=ic31syd4p&bdm$wEU}a<pO1ylWi1g`5HUKn@r&<UhFr>r}r2Zi1
zBejI>o{k3oWKpWr{2eh$^9WOSeASA9Lgw$>fDQzvJw(z#yV9-+q@%tYaAvsdnr$fU
zFK=iL7W(t|Bq{vQKDgXuTaN)Gzk>Mp8}<QA$Hx>bv~fq0;UXr@rkEtjBpJv5m5xp?
zj+={%E!{i-CMe!wN|McK^o~E-PE6jOH|H%3#0rT*PTz&5t0R`Spif=#nJv(!INWc)
zotzlkCyb%`0-UA=9@4)#g9&;#Xz_&80N!K^x0HOCCK&-cj<_m#!g}Wneu<@+<|^TC
zx=4g0cFx|M(*ACCxeJp*K?RMOqu4X-ng!qCr30U$-vf$}jI}`ZUGv#?A=AGbkWd@W
zX!HHJNQxR-D3SVe7)nMW+ouSP>#^ou4&4GCov*bD0lld*dJ-9)hED;3ZA`x450fUa
zpN>G;<3jr2EpJuj5lVRP#d@rQde?1F8>axC>qxwudN#CI=hSc6w8cna1&Mq`zMY5?
z<2+g|R<pm;v8DtWU;M&d`S0dBfuAqQp;7r|C8>bhM1e;tL^T-7lv>=EAKT_zZj<79
z(!A(*^AjW2=fN^pKqAX;rH*xiuTdh7sHT>HWvazJ)y!fIxrofIKst;>#TE$`1pQXk
zL)}lvc{Jy!q@(i~eCGd}y_4db>(gexkt6tYaVL}V6cnL5$<>5dl&>K<E>&7+0wN9o
zE`5mFMC*~Orp?;-dNX(1xSH$<p3c?oK;L%PKMjv6c_d8JMT7*}Lu^2(nv*35p=(lo
z6+L%Rr&jo0yh@1M?!LGHr#J%>dpg_PWS;u+{3v2&aB`Xf<vET`{rlXT6UwI3{rj53
z!IW$;4<Th(IqDKziXHn*ZCDQi8zG*lsp;UgB%#0Rew^U4fofw^@bv`YtMuRXp6|DL
zNBUbwYvc!;Y)~MUbFMI??Cx9Sg$xW5o{w#Pze6x$1--A+o{2lvTkeb}2NiBlf2rwg
zW4k)>Z%=7gB%&R7dU@d&^$~@)w%oWRsbur8_-u4NRs12IJAN**n~WvoeYt-Td@eWz
z<OoaMJI{;tt%wM&3$djt4tlYn<K9R{@jK)$ca;)UEIX5vF@LOZQE&;fOiS_M&nhST
zN+EW<nnoU$g&Hljr1i(?*bG8mt98Gl>dEA6tIrGj1C@&#hzcxMBP0F$+bvsCW_!uW
zwfe7p*pymHuZJ`4Y3ZJnYhGt&0oc?j2L6}QW_#3I8c|5L+Aoz{1n(hHB;5`3Q&gon
zj0jmZ<#_5oEmFz(9M=yDJe~JFKi;*MCd2jj_e&6Y?(C)-tVcUr-yVBiw+d=#ba<=Q
zzh0bXgTg(Z#iQ}OjUY;Mye1PDQ6K}DvDJEysG|v?tsWQTGL4XJya@I6bYmAs8<Mem
z_T*}Ff$fZoO!sa_j_m2H0zGS4hWMXEgRK;c)s)=un2gBMzIS#K6^SxA^T4C}9TE8)
z<TGUR8UO{uKwYfkB<(x5)3y6K6$SpkQ=*Broo!Ooov+ieo(eCg=YFEFxtzMHcgNRz
zi71#Z+>UE~jIV#Z3%h1ozsroSsI?|w$1wZbuJ7c`nX4B_!3jT?-iU;uh?{&iyM-`R
z(EAl-tq-ftbysOl{B(O#QC|M^awj7#eS5OHpQBEcl#-(F^{3c<!`D4=Vx`4?<3!Nl
zzO^Cok#L<b>b<vorpsmO#Hl#%`ugmj?Sjd!^Fiz`b}QYhRW^(BVTb4HyLG0$HsP%t
zjmg)os6~1_sLZntSLSa1X+V#^nQ!5MLWcCXNUthH4d<Bu0q9q+SC?L-eD}^f=n^!>
z=bZ|I)n3oz6^k2HUe7U$`u^JnylzBK3xH}gGcyC&&+qas3p+bIo0`~?tupNYUYct-
zv=p|vo$0Dle8C`tKsob-iWN8=^**w?Ee(pXKeNy(9Qfq5PxQTWjRh`FtEs{1;yxl`
zBTR;_G3`&=>b#N<EbTAR6V0W1<Nblf4WH-nL*Tdl3LmO{Z*n1J<|9e7<yl#kfT?KQ
zb>Q`mKRAC_Qj)_m_j_IB<jHjr_7%07Tu<8IK0$aoFlcYVcE9;i@Qi|Tc4iSR;UP=D
zx-7tA{DGNKd38}QRcl?Kt!xu`A`$JWl>iwxQqn^Jot2r+m<hzpiVg)5#UHqE0XvhR
zK?|QyKYF_!sv6|3>#Th>oV<G?A$&U8&MW&qIGB5UjO1FAN}z2H55)vkx$6uuBDrIQ
z07(-D0iybh&HUXs-}~;gG>Q1xf0dK{*nX)c7pedjaVAS1PzyH<9%mhI?AJU;{af{&
zEa;6OKoJOlH;CpddQdZ1l)}HIT6T*f11dyIFs=T@z3cV)^>JHpV=a;F)8)na3<GtR
z&+qH><ZNDdx99DtLyoT`@O(c5Ah|1ioi&~0@bRS6S_3>_bg*Ob{H}nqdoI&kI_pwo
zKE-h@){Z;MxXP0fU8x-Rkz);_FsZ&&|EuI?71)~e^~ajY7JVHge<A)hiuKitNMtGJ
zg$UM3JjW7zSX7wb&l$eJij2E3GFEcvKTZ3Om&xqYq${D|S+3!0qL({-YfPfB)CIOU
zVR8C3ZOLI3vo2*76_u+Io9~{=M&{iae^UAUmTRr87UXfc97a|$pd>>=H+KSyD-9ku
zpYisYH>XTe?sF^N$rEX={FsG8jDQc2;@!R1{xWUHW?Rv@({Z~HnrKIKd6az@w@@6L
z&3C_K_U)TctK0`(x67E+Up|ZWiHS(YF)AZ)1FGv(3BSt{<8*-p*QMPx4@2#4@m|*9
zau1o|GZid_2quXswr!!285Jb|%^Xpr*^$ho&C>)*VMEl@WOSb&{6-*k4%dYS?<sM|
zO;2r(->5j?hI_Iad@h7|F&{8W6@c)9E9;U!a*pE5Q4_F<Is~f77Mpj5UyW(~_hP%M
z(to%P7zsW-87#;WS*RsnIl)1TY?i6S+Bo@G!iA^A7?HgfaX|ZezH>eeE<|Rtz21cZ
z1-S6&X{37RxZ3+VD8Kd@OCQVh475Df%2B}y{X$Yv@b?;9*|~%O9hvKUY~Yuwp>mzX
znp~oSGzA-NPJJ~5+$EeGD~?~b7X&o8L5GL>Y3XX~6&z(7IvN^qtJssizl-XvALr)h
zO?8h_F8haf%^_?Ie74FO&vY`CJezBJRGS6vb~6HM^z`Z+!*54eL3vr`Xy}1br!hFe
zkr9EbXV<rxI^UpvqKqdF#NvTKb^P}nKU!T>mvvjcpSVF#hR<USBgG9%a=82bDJ?ae
z8iaUVT$VIFoeO_)f$EL!fDzp7{hE>K??H_Fn^UA<yj=<mPyiZj*SAaL6f;B1GE32%
zVa_9$v7y>*w!7lg{VY%QJt^dFFxctpcR1%HyO_mMK@{!%)_CS*&`F%G3n3lLxSoIw
zh&hYRd7M=PweFosRwc)7;MhptdoQR<-P6q;Q(*_LIyQ3Zufingfzst<A{Zz#qH;QT
zmR!US29D$X3JQ2GvtAv>tK@N28XTCeX0L(4TYv83Y>*UII(NrO2XD;xY#D1k5@W_G
z&F|6F>zA^h;ZVa$HEK2J(_gRqvB+5_SXRBrADvc-?!$iMAIGd&NWE+S1dj^mgN&hw
zM#C~)YyBNsSYASkRW7rc=@s99;8?B_HkP;ahwcmaPMF$g(hs4-IaagUHlsCetlcXR
z$Z&0v;}`cu*!{k0(qu5{_5ezJ{{#-d-HaNrdf?e+Hk-U*B(4sIa>PdIw%NouY^}~}
z85fNC(eT^2xcU`U{Ch7h>q2yA9oDS|5-x(jfwExaAROq!P*}e(n(1{t%Ljvcn^~-B
zJ@V5vHZq04B@B*V>7~8jt&rN)n*x@<xtZm#d|sw%6l`-e{2C9lHB|U;>gVhXARvKo
z|C&~{PA+tN{;h0{8f#0#iiL{7{Ax<PfB*!kyoN~-nYb;RIGcT;MUJPy4t17;$ni_d
zy4NWGTJLm<78-#75?`UOsitHhBUqKXbs!;WYJ*6v^ziVo#7QOm#f%Mu0V$|Ym;|4@
z2L%!W8VZzG2g_ag$F`-ee!E~<3yn&ipoWFOgqp8zL`$N|$B}AQSa|q70qQ*?DTr=6
zS~{vSA}lg(hg4_H5@~)oU#Y1sF*6lr>jopoM4yd{YD+kRIjZQi1IRwrcXmWBzv$=`
zI$y#Wd!sNW!;@=uIm_k~D7l*aPo!$9z_y|B9C+~9Jk7RqbkuT$iu2`^T4)T(+z1@z
zlzc;ImJ_Kij)(jSp6UX@9)7#hL>S(7tck$h&IQx2!=K<m0W)!7fsw9N8Q*Y^BEg^U
zPJj76-nv4{_+6i@x&z-L!HJ7!T>zTU!S4D|E3>?LRl|V$@=KqeH*q59{Lc#&{aKB!
z<sM4aPq@1K^{xFr08hD}ayLir^SEG=kT9V^fDSz=!5^o~;)=A|e|=D$ZFfK09Zfax
zx#%AxbkFkE_N+6X%mJ1FKh`c~-mLv0<TwP5bo$55VL3H2WWYF`-wmxUEoIh~5oN6p
zEOqBl)Bqc|R!|=)-L&K*GD&c@H+~wIVxqEb5ucv#%{&q|LzbYwpUU>5|H4;E3a^_(
zcGHn0s%%qpVKjtzNzNbpD1Q&Tg=?!G`(6?XIqiO3R4c(Ou$fKs-XSwCJ}B%;V|*qU
zSaX=H-re=!&(hZNtVnRs@7m86W3rgyZ%KLAbq73Cqde|o1<A=C0t~QRH#y$4TN<bL
zZfGU(q{BU9hN~QSWY3kh$dqz~e5j#OtktP7q*Pmh0vWDCued}sG;as5z?NWIbj8RD
z!V|>fP~CngFZ>q-4j@rfx;HJ$#Y~0awZsn<?IQKUgGPfk9TX$QtJ(5|JdNw>r-jha
zSQE2coJ8cpga5574@(OQ=m-dEiq_AIfK?i2AJ)t{c&O<6*QF*~;R23ir9HSHepZg+
z)smcd+&GT^b}O9tbfas7zk-j3fkEJMh@7$O$!QS_^(56YEfR81$V}J}!$_e~HdBuK
z4OZ&$xOd*JSU+C>+0IcVI$mqNDhJ^0d44#Rfp0S~Aaj#s%@dtLg8>I-!{ndzO&$LS
zRCJb#xXf>Ax}K3??07tF*VEu?(g+;L&?m#n($(yh2bb~;0ZyOd;^Lc|n^W#x3144d
zOUrU+YZr@Jp<<$V1p8uJwyHjGT5_^&>2fP>Z4l3hYmlfnwv`DLx57Bf@Ywe}tuWAv
z6HE)f2pq)Qe>2bwSI7{U+RO~P(F-4hF85%&FEJbVFU}y>kb;CrT5Dz`*+8_){;TvA
zF7L;C0{>md0cH$l536a6Fwg9!P_Q|vRpx@2Xl+%-0^QFhHCr6$0lVR$TszC(p5*>*
zrlSfH6&M<F*2*Z376^pqCc+0BU5rJy^QSe#-U*REm-(8`uc5Rv`vO&RkLToQNTTZ&
zQTxCAH{4LUIvOSFGI_{wn@Z3y>l;t}U`KzD#6HXD`P5*rI9HX;;;@<2%nslon@7~<
zMv~)-<(nSwR|g<CX=7L<s0EGGp@4u=z4Y9M@qOP0R+ftKX@hp;iVZ0zd{Ud?`b7I5
zHrtmQR7iYBNtc1#l~zjD8A!=6Mh1Gn*5j<*7oV<jiNC*ve+z<O*#eyRa@QyJoZvpv
z`)aL=zaO!)oj<X%Qe(%Sk~90FuwG^S@fBy(<<dLF>riy;#%mT$P3T`Jb1tn#sAMiR
znI~9GaPS_#7AP!LAg)FX-yi8(ls$7E-mbeynKgN~F3CJfs{qnm0J>ab0|_wmWsPCu
zv{3;r%I`!<@C?3*nXrc=8EV&^zM4`QdaDUSIMZ-Q7|trHaj6ceX|W}_vjb0dO_ZSl
zBFDPZgHbr4+mg{_PPXn#wty?p7-jjN|1eu84x6yFa<Siaa;nxJHUi(AF8;=}tX+xd
z0qvKiJB4Zfg~C|J8H(QO+JpB_r_8%dO@D>!q~nZ}6zCi8BOti1f44uyppLn}6R7Cr
zeAq~oU3b)e12kR5K8`HuvQ&%f*8|1o8+QXhZ`g6+iFVp__;yxI_?`@lz|<NpG7qhu
zT4*(0SUD#DHR2TI{#(fXPL-KXOT^79cnKL17=<o~5tJ`e%5d%M;{K^EB?#bFaTT%6
zvlNVKQE0QYWof-FNldBHW^}hv=tQxfAXHO-YpvJg^s8$1l@pL4uA{7rb2sHv9YGbW
z2J7}NrvO^FnI$DCveKW6HhHKq8QxF7_i5n{5Y;GG6Ycx{Is^LzKqRvcm}h6lh%>kg
zDK?rf#`)Jf-GsTfV?Gj}t+$@dK8KnMf8QTIf`#Z#i=y4Sk;}A=-}ABF(HVX(-?0yy
zxGp3`nW-PHQOl@7-SMzsrq=k$+-id1gHEO>Z<ubDoDc*|{QPPJ%|0ur4rRZk5S8$!
z6V^fi-D$Sxv}@G29M4@43GDa3TjS1?hzeS@U*cUy79<!dcEUOB1(3c8I!(JeanO~d
zb)YP>C(b7%n$>vjjX>N&RK9N)0JVw;3}PX*u0ixX5}%~q?VO>WahjZa_KCSp%G(Pp
z=QWb}*k5b#V7pstyYlS!;4Jx^o!evkXzz|l-UeeM(SBPlmkG~!fF?lm1g9|Ls2%XD
zk1`aSJFLR9FT0_)R=#2_BImfDkgujaz9T?ZnDjT%v8i|PeoWyECs@o)Z|V5)TP}H%
z6gWCU73X8h-)^_WTsS%U9XaXgE&MF6f1>EbciKLmj@o+f;0N1j6Sq%)#*Y~bQuG3A
zb@jFT*GLrnZIUWg(00+^rGJh+0E_kM|J{y~t6|Q#BEblT&8@;BO<xx}3F&X);9<|!
z`}B<?{MM#~6w(ZGK`B_PLVk#r5%OC;GuLQb7*4=kCo9!D=&DBNN6bW8$02N*h7yD0
zY?}phhwlJb?VxQuIJ~Toxu0y6nSHRCqSLcc<Jb9Z(dAqFg0)|p;VV8-xzkCI_};65
zQ~OxL*j$)KJ_4EzNQqnz-x<%UE0=Q-IXXKEhZU^HQ0}^Kb|e0tw8+N}{|3_I8=XQ<
z=7-Nv&BnW-MBPt0*E}))>FpWtW}gNnj`+$DK(pK<dWrR`sj2P9b&Vn4teX4z?~P@C
z`*AbSWAh7`|B1tVBI|D5dy>CQe7e@4ORLfBm)okX=g8Ae&!AnWV;j18$z;~-eG!sZ
zs*6CCxk8t-hWMIN<9@WC-iF8iiC(|ya0OP^58s9(&2Y`JPU{!;L`KFshx`4wTvqdm
z6ZbJWOxMfjkaLX5PtUv9U0h==k!9n39xHBN06u}Vy<5k=W0%NB<zF7~!H`5NQt~KE
zwSLV1KD&V0qnyLyudbo7Z(cBYX>6nHnGUm+eUkY=u<XC#cbY;Xk_@wDaQ4*v!#_?6
zNHL<o1Rpyx(qLg8#p$7C&c>Ai>-p;SQ;)X@jruzrEdmm>(?mfeQ=o*0p|aWr%Nw}c
z{VyF`$cp}ihX57Ljv#5mP{Tn(Z*sU6IHKR8em&gTbYNnqR#$}zY7&CV2V=zBfZlzR
z;)<6%UhinP-{`da{Za7Y=BNc2vV+OC+IsV|Sz_YxzD9fJ)P4_LVbf(20_qx484dg{
z`mu@K*Bno^c6)O8y;B$s*4y3f-*UTl6)72-2(&UJXU}k8dNbE7EPeaKVI?+$E|>p{
z5B5fv(sZpxt-eZ$EHIPil%1=0lr=?W$n2_@5@l05_W}wLTzISqdvpYd1&uqPqfB{(
zW$d7&g%Gd<hz2G!${<t8f`>#;Xv9N;gZoH7&Ed2~qM@{09Df5?@9@vKtM5c5mPAvO
zLV+C!GTwpJ|ER;$*F=7*2;p#r_5KfzE&M+@wo~9l`DNH3<0C@OSt4N3R})PCe*)~|
z|3`qW+=PkpVp)TB8Mia`%@G7_jgi;YR8;Pt&j2;@c(rAczm$)Lp1uP>BxjwEcK@zS
z8H709*POcIYz`ZB+GJXK`s&(RcLf^3!=ob^8JTRILQ!69OA%=!nF7mqN7riwBfY!;
z3hB$gsd->F2{{P+3Y;Tdue;vn=B9&?3-ytLpy(INtEBIz=-gZ`d=avER_!or%YW1h
zG})^)BH{&qCA65VZ^!g?s;g8a?8iL)Nud`cESI<OG}b2l^(9y|GlDft9!%BWWSzzG
zn4Iyi8N6%t^f>!touS{C@ux$Aer*MqMt}w1E=P3<x6bT=GS1-kC?f-)Nl>#IzL}jQ
z1)gR*|FvO3AtNEnK=UGNg#Jdk;UKUCBfjyv$Sd#p#A%JksP#Ah@8?1J&WnbaQUA=H
z-U*&!AH%DfCFt*WOZgp9tXe@)78>da0}^S=0=HRF@}54SCK)@u)4miXwZk;H+)ZX)
zxiUoIF)djoNM^Y>-t^5Kz>?|N(m3_dKIh#HquoMmD$}jdVZIng@b;8Z{Bz1f%z-8x
zI#AJ8!=OOb==%}=@GgVQ`v^+%q_VP7NAT*pbg)W}ff!Whw-<WX;iz5wG2QXtd_N&d
z#q^H2<+gPMLQ&&RWFZo&p|;ugVvSlJul<_>kmWluZG75aS4^Bha~(`K*E%EE)Ty~J
zb-ov&g%h3jC(iC*+S&#79jj>H){=bd#hOz!H;X$blmWCDU5H|uy|0my&NGfspl{S0
zVVtS4w3&2wF@n^5Is1xFO5QtN-2Y7!Y!%fP!X7vePI4iEK(MM4ID+o;w+GA17CTO;
zsD$E<h@p7KUoKdySZ(Rj_s5UGRm$t5j*o(L>jXaI%-~hr%{P*OpRUTJgBGFnU3?Ye
zHjUOIkL6y5c@2Rfao$0zkxs-e@vVNNTr2)|f+n|%YMT=JHB%ps&EH~Q{9vtAP5)Vq
zeH1^B33#(pK?f#2{?~Y0X38sqFM@d9)mi&B`jca0t3>}Z>~F<yJc+kQZnN|~4r`p|
zBAAiJFvGJ3x3iG2{}zOtzoH!(eQW#gbek=2ah>jPfwTd75W1H;Dnb(`@IHv1-mchJ
zD?2&HsJ0%)qZyodV*$2Kq;}sL7TttF@yh31({IikVNwYE%lH#<16xxIIa6bf<`wek
zJnHRz5xktXZLGJFuXHK4ZN2M``z7eDsA5*bJXXng(?b(!&L@y&-r&=LXw7fK$8mOC
zz#&4$RO66BuE?PECjYV(=kOf+@E@aeUAS;Jvx4C)wM!HP+yP5Ex){}LC&KEQ8arA}
zS5+=xNS$phA3-K6>{R(LHfgwuh_Z?QurvT~oB0qDp!!yS)S>Tn1GCwkE|klo5(Zl}
zf&0XLFJtO3JcHl0rBnUCh<ny?m*cJOIRzxEU+wPH?-AZYMUpv)WOQm(pCV(u!<*5d
z^XYdKqrmC+?X|v<V1Do0PX?Vo+|Sl)=m=ICWeZuWY4WK=*vt|hH>21z418~TLy`6;
zbI*Q1a?(EB9L`&hBz=6_lzMnbOg<o*pk(QmRl1pUZPU@=0AAPlm}x9b8MPYT8&DHZ
zvdzdsdVvZok_M>H`Njl*r);l6-f3kxcH6R2-h#gMpAcCC4vy%Bf;3~99`>zP8z!vk
zCwg<AnVm-qVbbt{#6N&BAErS;Xe@-BJSA^>pujXdFxAR=1VX5gc(OPC_#rg-vp|uE
zCl41_lSHIAJaJkYf)Y-oIL{?1ljNnN?lvGi`V^qkgbW@dQSAvyv!oECNSouA^1Z2!
z7$QI&FJEqY8ozMPT5bn)kJ6jsc~vgHVxj3VMueo0VahfgQa`-x7y~SKR-*=kF+0yA
z(w7P&z{Vda9g;i<Q1yV!-gyKa&Ow6rl><+KRxw~iyfB(2o`yQs9Mw^m_1<X_0oAsb
zEg(V!{x%?z-=Jpq7B@g{>SMGdCvcfi<+gEgZxQ*?e#(ka@&Y|1|A`L##X}8Tgby<8
zA|&1-XmuyJRpmokfp3ZH(~P7&Uf?H14<0%Z99X(6Z>L|oz!{Q7idQH`un>g|f9aml
zB!6`m$9ubqU)bWA(50==aqD>r`vGCJ>8mB?FU^&Bhl&K?e2xNpB3ROr%im{znsvMw
zDvbM}d^|!|<KVkHWwoN>k}4DVnBILyB{yQQx&Kb^*lRd{J`Gmw6F+(9f$o}!*npFj
zszm>xtN+Mft;Uzv>epF=m#0M(ZiRGp7Tf0M#UZ$ai@{4>4yO;8ZsJmrJRjE<ZYYRx
zmgf)&Q9Ey;$IynOkIYr#8<$;FuX!IV8ne$kz`cyp9>hN9!Znvz#?;XU^<KhaFd!ko
zIHjuAm6XNPEc?RlavlxU6Fxh@m|oZ9CM>r1jYt2@kEeP^^A6^l5v%XGc!48q#w2P;
z_wNF5sk~VB7mR+f$dI$$Pud(F7B^-e`6&#vIZP%9mP}rP9QRWQ(_m2vbw9M9I7CRY
z(zbH2GBxUUjQ8G*nMZyGa0@mzC6Bwb3xm81tvn{>Q$fL+<&V(`Lby?Vz-x)?bDBpg
zqh19IlC-P9W06!Ax(tk`MAS~z{=Y^(vXS{iOG?W074^MVz<?8N0IAj(mK^P~31Q8P
zTN+iJLnV_OlA+!-5v0l+4wcVIiUwkhznnC70AFbZo_PZYug3#aiq4dKFHY#SyPT@(
zW=T@;xE^Lb7BvWqR&Y>4khCHUWb3FiyNTTFQFI>yezxf9uYG<?RirZ3Z;f-ToXCE_
zTkU33tXcVwQlUTJr)IaGxjOZEZhxTPJdJ>rQKkAsS6ObpO3wIgk5u`x4A)mHwfzQ1
ze5-#8dil&pEuk`un%xrM10tZx=@GsrD)lyua$(3xfa57LCdBl3u-_UM7Ula$Fxhmu
zN-3YYT6A`uNxzk5$LHa%!loe8V54Q3;hjCJ;u#7~jo<<TnoJ&Nk!0m+!?J2k`b;jH
z<?kry3B&Go7)e#!thB0h`CiV-xCv$`bRU6++f{_i&eMcAi-wND4AU)LR{uc_(Pbec
zmVO$zEg@&#fY&4k4H7+_JAUZsx8mEa-kT4uq>k3hb18o`@G8d}pr>7PQ-)z`vQl}!
zxtXTZbib58?h%$ANn=Qc2w4}?W0CNi$FZbPnhl|gX6vz&QA_-N3>w+iK6QrkU{BRW
zqY$p?C@hK=i**X~R1yjv<cJN_Fx;MHD6QxzPK(7aWt?2@k9t$Ba^U4W(z>6PvbIue
zW5`0n-LhcIy(VN)@&d%f!gSOq`F=58x8t>DYxk2Jeph1uA9slg0?RFDi3+!#`hKP3
z4bFoo&20H!>M=kf@@1NJZ*Iwix5jltquTSq2B+myUyaT|tDNwgWliXh`~<<8x~yn7
z7!wU0CJ^~oq`qTmjGCH3u0yd>rd_Mw01D??-Tin>%`6Wrk>~Za2w(88_t4=f+et<S
z>Aw5N?WcZB+3UIT^D1py_vS=`u1j@8i(}Ouhh<zsbjZ@u(hcql3kz+iuVYc{MQavm
zMX7Z<M{^gBn_#TLkEqL2M`;xOlGBujb>?uZ&Tr-thQ+d7I9Uo@v7Ju`0KS}JDIbVn
znqXZ5>{+hGxI*G}bL6OM)SRs+z&cvlVECajpDWD8h_Cug;yXZycd$Uku?emvMrhxc
ze6w^Fx2dGPs9Vbqh;RSa1EO|Q7zH^i$48NA-9mL+q~tIdQr@b64zXD_Dl-zr0wBFM
zfrH_@Gpw^*-l9K2j*)S8eKkw3g?!meJq`OP;6Tn_Rz^7>$;s;lr^zPEJHFXgJ`RI5
z2kIgfXV=THXm0*(<XMrJ<y7F{wt9)IZieed@z$G2bEMW6MxIx<pRAfv?8p=1+a&Sv
zFV%mRH!tTG4#%zi=QE%^jMm#z)QEBg&p<b#jp^cY9Q7k)rK;4{sI)uSgKVfL=}4%N
zDP_<e%||6E$#QzB)S04N@JE*YtK1;|K4j@KCE3sP6<|Xw-lh8JVA0A=)>Kej%v4ak
z8oY=jvKfscDr$`6d3@cE3(M8s5Qi;0y@r4!dl-F6U}8KCb(x0IaFkVo*KvdF=}U{8
zA3nq92^Y$uv8(kn89L^a#5mlx&Fiysu`!iQ3TpJGcnhQNkWavrc%`h|m{isqwX9u#
zD3<@LXC5f&e>U6hB>PZ(%3DPsx|wO51bvB4F-d*bxJ(~pD)aeNtHq~}AdQ`wPC@_0
z#KZIgQ6_d(skI4Yc=P2j->qV*fy&Ls#;yz5L}T6wKZXM5+cHJlg4F#9_sKA6SFz#w
z6y-wZYDkl<=>De+ZP?IaAG#;n<?sYX`pOI@)>I{mlBYeZ?3fyx!!ZO;ZK6!-THN9D
z%Z=~S@Y?)#C9=|M77bTRv9?BjoqH-VTDzF`g-QeX5-g}&bh*qNCcPu&M^@I@JzyEC
z+&q)G6*C_k=d9JHO15T*aXSYmXIE=i`x^YzkCPg;Wkl|F{jJ-EDh*0GmI~r{=|jUf
zmJJjc4!>8K<-&W(;{>#a6h2KO<0+eBhRy@F$cBa=z|CthnwSE-x*v*dt&i7&Y7%_Q
zj@KMToi*@P{HD;VodDk#b|sG#miUNtdh2OMJTl`(OlmeSYKmNz2LI_A3k|Qk?#-7+
zPWE*3-<hf$9%UbF)oV4KNYce?SJlty=Z9GqxGMf=MvNcrJPMG(3JZZ-FY8r5Eiswz
z)EQAW7I}0U>4{nFsBP@91hBNLvQgXiFClCXzN1TLH?lkl8mL9%Zn>!3sWdrkE6$Xj
z%K@yJ*s4qPksrGZ|AZu5P|AS9Cem3UQcRDiL^<R>eJoGtr~7>-VwTJND~Y((UUwHx
zkLn5)IN}<w1t1@=c$9R<j$0@%&!r!781;rAFsn5yvl#WWq;y4Zw92Td&5Lbh+I$(y
z;JAU~T>Cp=UE6lCY($Z9CYRCV^(*%{+c%D{z{~lBchya{?Rq1Y@5kb#--~mq5Cf;W
z0$n<%hp07IuZv68b*RezcqXs==`XM)BIMpR>*Oc?-6Rzs`rbUszg#Y|Z-{}u>v#R&
zb;n)2DSLBnR)_Dtl0*_mc~0~XM~3#qVEPfJQ3JG69<j~i9zt9Z!!v!#uGgalz2;nk
z)!I93SpV3F4Ao%c58+Q7co>?KQ!&IVrgJ~O83PfTL667v&zj{%r-F?4jfdMj9_i1P
zP7aqdYHvUd+T$rj_m;K|Jqj)PDp$g+Y4N3}Y;R|%q;M;u@A3E-oWIXa$0VWtLs#vy
zvBWs_bL`<w@)i{SE$8<MM+@7V;i8V+9~FtB;eGKE*R8M9T~GY?wWPZe^sguQBAc9(
zyrB_acwL>cx2G~1qLs5*C^BTfIDVRCuJ?97iKdev`7P)Ex|d5lPqg0tIK=pltN`5W
z4s85I*7!Z?60A|Ski6#+cg~->r7nN}mYV*;PUYBu2oK?YDfmwzl7C|@2(&dE8z}Jh
zG$RM{`+D!dCpCoI6OX;i1`PPm$-?ITo>PO~cYc?{0+ZGV(<b!Nv2kNN=URoh*`f^L
zhdWb7j=dMbaXg1ZectYwZub$DT~}v0oAUkrfN$b(rCG*WzoeOrZ<nmWEXC4FD*S^Y
zO8AJ1n?Ch^#bSKCb!cF)sP$EJ(*zppG6x<xM<Mcu<Aajzd`fF1vZI&}szY3ijTKdd
zZar^LX~6A*0RW@cH@QX4#<d}x>SL0eU0_7_$8cG!wZaViubuK<Ms&lBTZ}$N$0ZG0
zodZDY$`JCCmU8jL!clOQ8cZd*tv-+4vd6MW%R!!}ER_1rCJsJIh5;%nP@HFi8C;C9
zBfULlsA{$o7hb%4@u9-Z7EdRW98bl@r~F{o>8Ht;CelV(vtS4pkBXI*ATqvw*zZm>
zS!PS(x*_~xtboO`fGh@iyhxU5+E5jc?rnb8nQn9ZMA0Xd8HpW866{nR*!?{&#B4jH
z(>GNTq8WkWusa2f5tHn}%QnkpTnE&}N)>-|>m$I0prgW3!|I+|z>Qx{jiSyt=3uK2
z>(!q1f~XNt;VZ=8WnN85BLHvz#DjZ-nh8cvi9me(677N&Ej@x1wLl+w0VB7+6UUgm
z?bNz7U?s|GHG~C8Yac)t4yj5#l|P)!iLy_M2jm`*BC|2-7@oSaGK=Hv*Zgmvm04^S
z(0Ix00Wh(hf<k9_`u%gy41&zSn-g9(#1R9pgFrPp`zuzSU?YlpdKw-XcAXVnCXY&U
zkqL|@eLO^sv~<`wUV}^EcKTkqe2PusZNWyd^;;lFe4RbcWZyj`Uh~-It$mqy&FBl9
z9}Tn3&|0m5ZA5aISN3_i8r*PQ)C1VR()hROm6uh*az2|2J2-Gf7(cvdspYm_TjiqT
zql9a#jvd+#v(x&t2KNQNH#Ylt1bDKW<y{WyLZHxf9Ng022U$?z&`ebp=jCm?#+@N*
zv?WT6K2x?>G&s_^zm1&Y%|5k7Dv$t1Q~-5&sVrzySyuxla^Qhvmcx`U0DuRVLq-z+
z(T+M705S+@ECJK3O^Kr;8NmK&<1SYuB7N8b$g=J?n|aR`33?31o5NN+*@DHkC)VWc
zBbJealN93wCQ!fR&>cZVJI<9pkT1k{w<2iZ^BnxnO7KJy81PH&GgA}0ZehnU)II%=
zvf0&lE#&BU5f3=^?srp(X@KLQA(;H}u+GSF!tgTk=U1EiAIUql$BRyh*GnFB0~f0<
zaU{Y2rF703c^U3cWGevPo8Wi+Z1;zinO+P>TsaoiQ*Hp2<x}Oe9sHZM%SE?V-koqE
zpCSX_-DTynI8o!}#UF_@Lyw(3dE?bjN@}>%_mM~T-G7+n8Yc#h*&KUk(vOMZ!Urz=
zy${6}8QclKbp`)g)C)hs)@y&-$axS!Ed6gM+e7Re6d;ZQ5^1?=#WK5zVq~r-lW|{9
zK1gZ#MriOTBxOU%rbIfnA<7sJPJ*olLmP?aH`b@Of&U(@-10dkej&OQ!8n)CUUQh4
zB#nGQ<Q6XSD<%&@)DcOzSrAK|l{RCjWo6keeC5%6<su+*<^ycxvh|Ka3#N~iktyqx
zYD&Jk_)d-SL;bnD1w)2hHu4y4k+~#~NU69XmPA^1;6OgiQk%mZ<vGAWzBLVjE>9Ft
zRr<R3TyJ$~R#xTC$3}yA_60!NM1z&r(rI)X>4vmw-?<p|(^COvy^J`o+4pBZGF(Ck
zbwBG#u|`8zA|WGtDC1rxBcWdBV%xnk^?yk4-|&#W7iv9P8cvKGAL`f5V^E)(5E-bj
zlXgC>99Jv-;HHhwih>Br_q|PGP79PmWREo_$mnB(Eu46r7|`i#VJd&sXYH7zjO!cF
zkw2O>f55wM>Ahxe>pu81D{=Q{wp5|X1l|}C@ra;<$ugH0P(J|~6txnymM%*Bty=7B
z`D7;*XE3HVR=jkh4&CeU@%loCpEEsMM1-Lq2x3}eO%7S)u9h4>JSbki6p$6G2upv(
z>$d;xoqg91Gr%Z6!F$xi`@g764fhqo;T=MN?lfCod#vHBcIy5gCbRn?U0q6V3s~@D
z_qxvx0`%4OR7O~_tEHx9f~Vy)w7gW1-^|wO9u#oH%J}2#e4lL5*J$rgOA@0zgCLUO
z<8LI1Y~PKQecDvU8iw}$(6g+@!<o6?JMIr)d-CklnIL%!?&Ef%E-vmf-t=m{+@L%^
zd$YT5pOM<!PFDCzgh4{2ig{=>d_qECgH;Q7oB(tjLcq$53`LtOqi*+R%xXxFO1zr*
zLZmC$SmpE)1j=$rTycHVBrnxHX5_4ME29|;CV%Dl;IHfQRM^z4@xNqAmY)o_7(GQd
zsvem|=eAq%b_X=>(dz?hC%2#DW!3Fc46ggH2_0+TP6C`2sShb1bYMVdF%KzD<aB(D
zXb-LE6TvvM#u~44zlMRA=R|rp=##k<pd>0$3jXlC(yDuokE%&jVc$}!Ye8vn&){Dm
z{TvWQyw10XEK+bYU1&u3^Y-PKj$?3dW-hWq{3z<r7fI`Fo_xJDvm%5g41E!J0}lZb
zNJRFI7+IkZ*%8g{w1Irjy~vw5z6LovTW`<)OwrgQ#u$`}satv{Z2Pwb1F<$^e9Kh1
zOWB6Yc{lklP;h;-S2xYvrw4~O4SI27{tv&uppX4{DUmuq=Y7{#l)2EdB;rW&i4B(@
z-_}-_x(NzDCdon(D8J+r+`8}o;+ga$f-JQ4)DkS(^KCQYt{)eQLnA5mt!a$mKQ)?e
z@Q3|3HJg;W(G)w8<^eTUNyEt4Wp}knDpVyfRCHJ;y@E<;6gb9z+uEp6-Zna_hJq`x
zkwdZC{QF6*aWc;~iZSE*76oH656~3>r7-G){pdNF<w(md=<hU|Xme|3)Q8$pyXwyN
zzw*{}f_RvaN*?<0``Dg-)EkWItZR|-*%cKP44t3Jyor$F_+Lw2vz+>3IA5OUyS^*!
zd?hw$KXZTKobW4~eIz_vsHr*2^t;{N(B&<dPG|v?KVXi|b?>td)CH*Lhnq}x>jgj}
zTqtUc72MisKW#gzA%6a;fa$F-;vuH+^!a6q5%nq_LKrU?1`-OREuA{NB!cavpKogA
zZoY&gLljHIL&U?cAn`mZMA9RY3<S(w0}D$5OCgROJ&-^AEfSS`Aft%OWk}wl=5Qw;
zV8-gH-{)wAh~Nd!S7DG~)EQdBx~2T%_@vo7(Q?k*-}g#P-i0t`-;P~#Kw+>z=4ZM(
zIcNtTg_u>!)9_6)ij#(%D|skIicfq+hhq7j438>@UZ<A^k8Lyw6eA##`dsq`LQW?>
z#vJ|}i<VU`5C*UU%w|MRw%c*#t5PcYtBgxoWGS(V!IFkQcv3zTQ=Z~IfQC<3TkIt=
zJPsFYHvmHvMkIJPQXGVc*(nrABkNQ7)#7XM>N`@d@!@=utk=*&BF~c(_i#dgxqV~a
zxftKJTm$dNCq@D_$>smeP4mdYy}f4Y{&Kg&`_7JKIsgQ`V<=RylFqhZS_FkOkQJ5}
zGa^d<1e>YrZ<iXcz^P&+8tRcg-`-9k;&3x0=zo~&jf5<S6O>4B!GGz5mTjj+e1Yl0
znvF|9vW6A;z@r*Mju#%}aB*(TK;$=O{sSX}m4uf@@mWMsod`8jJha4!WC|%e3;Z_r
zx2a&B0{>oxGmUUE!KUp6Xaq{b0QjiCVV`kuu==<J|J{%G(J#QQT5F*sf{hJ918QX)
zEXd}UN^mhYMp`ssnUc&1{*|am6bVz7;nZx&M#9czB^u+t(X~-*d7m9aclt6c6d4>5
z&GP_IL6AW{1HypeVJ<Gn9IC=FsZjsN85iO*9Tjm!3o%r&(5O&;5BOKUqn@StFj%%G
z_r=jC(>wqun*cVY-_JmPABh(XARq#5aTZXwEGSQ1l?4=#i{%QLE%}cfuVL2ruEOny
z?nJbN&3C&yjVG7Larhkx>W&B)iU@#2(}EX*5ILx7GyE-QqSt?pW&VMtsGPoQ`BTUi
zW17-rRlb{ns_;tBC$9eBj|YxV8w7GoqOxFFSr&0ziG4Jk*DEv~LbF@M!*Xd{43H8@
zo={)_e2x&Q(7|^Ir&2}A8#>i)HEv@h(l{EsjzpZ*ovM~^0e+ifW@%Z{U;;D@VIf%v
zxSzrx2<H0X?@7yACAB6a<mq3bLm$vZ_QYr6KZLO49=c<^Tk*yb<o@aTcQ=}~OS#>g
zk>vA|tZIb{PxdzjkLMW9&g){vZ1;7~u`e+=Y`@@#S;#VacyqKe*kIAfDAKkqu6W1m
zkZF%FO&sOSOx&V7K5;nF$>ASev{YjJ2zHcEWa}G~{VDtN=g5p%Te>qxfU)*Ot3gE?
z#0SPJydVe=bf6ap1WN0W{d+{{{PMv%S%P%uTlR5VqZ+qNOJs}dKUjaCHwl7c$Uhav
zWRDR*%ToA@=6QxoX7>?L@-LH<+`}l&)U8a-k&ou(7uDtJK-&B!UW2DBoX>UwMt+0#
z>h|iEJ0MVe1X}kU-&rWOJ`S73)Sf%XXrjLFZnDP9g9a>#8LSB@PJF20B$QxJ&O1Ly
zK81wXF>EYO5zY43&>(P4X=E!bF;towx)vkO-rwHCD^<@q1w7LNI9QVp$U_0qLBb%C
zJor}eXO1&0Gk-|@D@Ym|<brwWiN6|;@+{71&<R>JlE6D)2%(eY(cy&A(3qXO$8e$M
zYA74kmL#oNJx5pUZ=hHji6|l>NT9tS`QItRZ}f%4ArNB_c?nSQUHhKHASxhmU4lW~
z2gR%pDO@7%INErPM10!1!M77-$R?*Gc0*+1Ufq7-Ts|%Hxw4n(Am(D_xhbJXd<%c5
zV&%2330>S%xVXF6_|rolS<-68aOgtzJrR;DD}WiR;tqxb(jsyQ3@Q?Z*_1FxFSfdo
z|DYOE@QX3q+*<v?V4axpdGE#(wgVqL@*w!S)+m-OBUUP(y*HWbKP`ssxF#u13CScG
zMg>Wg2O27Bo<m?`-p*JyNdFW``V`q-GX{q-*qRR=c|lxTr_4VdHkM!t-DrsRVHAFx
zMO#$`3opGIR{{Gfx8OHRcrY@$EqW$B|Dq%UteMAZ?)QcFrN%n3Ad$2d0(2$#$@e$>
zz$;|#d#^gcBA8f4WTfvqB`Lu1jPC^=h!EfLWe)eflN4|HsYsFe4o!3kE5M>U&1lp*
zm>wad?-Z3Yn$6-BM_G}v$*piPl=K>9dN48_A+5Nr=$eX*L@(fEnp#mM^89^{!A@oF
zXN6~m5BiXlaDhVCz0{~_I^uNEMw%TC1g}_ZzIjPbyr?V^ls3yB3V9AWRXcG-;&3Rd
z^q6j|?yvUU50%M$Hfk#?SKC~VV6b)382N^~(Yr0aQ&A9pgEyFoAxhukO)s7qJbKa$
z$T5kJ>y-UV*hn|cgC6wW=qm`9q8}cT;#^Z%_HUsr8*Vk$*VT6TtCt-t6EcwydI`--
z1ZR&$kaU4KW&}wHW(#ZQmZ#0fL(34%<Z$abF%e7B<DIGRB*2Sydhez%4!jTU4<0p>
z(8M}5cA^TPseI0TuYIri&J`<^q8~!d=`9W+h!(@EY|U-n!9^u-71WtK$2<j%^1?Mq
zLu!tF*6Ax?Oe8Y?28V}#gagHlHZ1vl=+e8YnHEND5J<*<b5hTr$c9<;3zn{;_`8;_
zzJ%nS{|MQqGzkwvd#EoYL~GQ-G>&&c^&9r#<{k?lO^`@4Ju4ST8o<mKz^|ep$rn(4
z5F_N>8{66A1WL^IsoOj{ylzB(0ze^}h~MjYsUBdn)>@rQ$8!i`@v4~-ixa~+x)eJ_
zWH_3|w4x(g1435}m}ETX-hs9yynoIGRsHQBVv&rn8G>m5r*WxaWty^$5KR&oo4^Y)
zCUB$~N0XPSaz9tIhvB;tHBw4y&nN`OOg<A?HzJV?h0{kb&xitb$OoRiSD|Odz1U(1
z@#j-_%to5xdFMiTw9yNLlka<N^^v+T!U!9>NZp1%Wz$?*8SdmNI$Nx*qc=C}fD8L^
zKhLCWx@62klt#`5?%<Im7%LnKd@-fS{EM)m;Ne$)hV7{zf9^x-Q_d_k`e8_zlKiY7
z@<-J8Y$jK!Yc{j91ABpTKH4n~94JsEjwe4_9u)C;%5hNlg4kfA@#q&|aBAME>(Of?
zjvXX$mK7E41IhyLPF5ESCE_e+OJeXj8Dv}+iJ|BRt@|PKrgl>3v(UC6ZFIBr))1Q}
zzWrEF`x^ph#!yv%$aVKY$6)4@jHZCKGhNGyAAa-q3h41M!9GT)4@<*qJRPx~s16ud
za<Sgk1tS^CoRYR7kaRj5wBS(zt0Ivj45Irg=DOy>ab4ieXYc&So`@kqe2qTK3Ll<K
z&ITX7ZgJ;|SB)YIYW}uP`qq?{9n2~SQWi{P^S&M#ypG&ep+kJ_<3zaOe23)0{QXbi
z*GyLD?(~%1sS2z`9otKs*1XQGvEkE*UV{9rlz8?J4+~<@(B$xkwFF_eML6tDbx5R`
zT=(-o+q?M^XgOzuvw{PnT`WxqjF}R;$Y*>*44S?|rk#0*kLM)VQ|{S~fHj(Q?-C#)
n3mCH7Z*MWOp9>~l{Xx~eULyRQpI?BNM}VZn<iRx}hC%-aIy-NL

diff --git a/wikipiki/concurrent02.png b/wikipiki/concurrent02.png
deleted file mode 100644
index 3571614a7cb4d7264ccc8be04c9a37191ec805c6..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 106194
zcmZr$Ra6{Jw{0Z24DK+vyAB>C4DRl(!7U-UyA#~q-2;K(t|55v-~oc$&v&2iLv^3k
z-K(nlSXJ$_BUO}S&{2p{002Ojg-WRb04(8K6G4J~dvY6|*8g@xc82P@0RSq_e+>r6
z%zpa<McGzTQbona$=%7##>p8hD=7(fc6G9{b+7~g@0A>NYYp{7e39FYe-iQ$0V(oM
zYIsOsHHqi|+(bGiN@S2+1ZBZ8o@yVKv@|@)NPYxdTwFj5o+=Ak6v{8eUCP3^;G&4A
zvBxc+BKx1+xBHVXElZ*Y)mJ%9(}>@Z(9)pXs=NVc6%yoFzk`PdhPHOu!~;=ioB<G0
zlLe*QGc^ow=O--8O!XbH2Y~UOM@0g@D`tJ?APs-TJd(&TfC&hJ`R<-5AdeJ)3y6P?
zlPCqmKfna!q|>Pb`S5_rxVhO5pu!56(EIPt0|7aA89p$8ehMWXOnxE&#<7f$0&IkU
z>S?VgX+Vbqz_pSefB?T(0S;MhD=1Lk27I3ap*8|YXaI+5L?|Nw?*o{OP*ZyYAsGPf
zhf8hY3+7tT0n?kNG8%<DXdu#o`bexUh}zn0<P1}?1kAX6rm&`&;%xn&GKjbWc`$!p
zO#ncCBHr8IUOjtHVbo4d@x`@b7_%PrBD_+WneDvnO;<UK1HhKM-|PzudlPYh5JJGm
zmqOYzcpD?se2?2`t42)m79js{Mf=M6Kix<dBy=n<@9pmXk{giFHyzXVeX;I0{;vJ(
zaPKGlbbI}~XPYLF%P>#|{_c1G#6N`+(&;4R5VN)Yc$ud*)Ym7nd8z?fvko05+#OYH
zmpG}+m@BRlsz`|>#zES-SBvdUmPa_zO<thhP87x`k+s~=9PUP*9;D;`eft&wF1wui
z78sD=0&Ie}roCRz#hzvIX@LMM*(4VLFp{ES(-><K8%6>Esr*2u`u8ON`UqLRBarsJ
zTkAu8GT{r6pc&|w07;-&1dzI#FjfaiFoaFklQEgFFNl-zd{?yzOLoR!>(^|@5OKzQ
zFh$DkW9SY<hJQbTgkws%5&>ftr9&NuM351BN7)C3$Bw1}k4E6CQpqRsLOIo<G{Blr
zvP%(HSV*|Rht5Qy5r8Y`DXd$DGbON5Rb&CJMY5xupE%@0A?l2UJ7;D*ety=BYcsJ(
z3}3;)OqC7hO1!A#Fvs^lgoxY&4jgPlKO`CiSdf#=#~Y}s(W-`s>$R%kx+1U5ryIQB
zu>+;QBlE#~Nq|ks-$Qj2bd-KU%fX~HJXkBp{K#-2s{Qm-$>s9Rbe&lD1B7N=oZ&i9
z7V4ka@i^=tp9skTej4mZNiO=11X$UIVvRZMxes%WYSf1;6<It`V(R446$|@DL`Vt?
zn0X|0H)r?9F840UF6E^@N{*ShOYxohHiO!jogC2~Xpd(P!7`oey=GCS+Io3`1{QC;
zo<vPSt6H6EcsUM_M<!%47++Stq^2-+p4f)K=GM0Ek9#N9dMdfn*BR}(@k5zEU;n`U
z^Fl)p!wVjcux232B19y#Ch{VzOIIi*nvW(L*5KghJWfBzz|3&c)M096`hu4@hLS3m
zN|#E)#I8|MSz5VKiK=;}Ij#|3VWjR``$3aieWwC>A+1WYGDqcDokZQbLa02v(z@J9
zL#)_O_c;<l_lLp{WyxaI{08Hl?jbO$IZ=~03#C1JRhUO0?*LuH<nk9!rmpm7vaV>6
z%8CMrB)1&5c9Yswij^4RPP)row!0GY0Yll>E5E1>+;hflMv_t<g$_<j1N+LfuW33}
z&??m`nd5JKwWnn{rQf8xbRPpT-Ve*s8_>&G$4|Y>IZ$6#UoS%`!&ej$ysl-dv@ank
z=#uj4bu2qe&+Rb^$W?GE+xYbD;DOYa{aNGr<3riC44Mu?6B-S|D%upG@F1^?lQ0?k
z@al!Cq~Q;7$r964)2~}0i5;`TMT;L|KVZh#4jJsw?0g*hI8;Q3Ku1X@uXv<*mZ_%L
zQOZ~<q#&d)JUKC0IQcV!H%o+biR&QiAZsaWv&}@$TaTr+ytUm@wsBXlRQIg4+c8uR
zqFbV)sb|>qp(dw>_Ged3R~c4Whf=aqRqjvgAN3clqpcNfMD=^W5LRnjKeqasTALAA
zw++_*I7|MP?Az%Z`z(Tp9=?oGMW#pQ=hp0sE2t&7kvWxpCgwZ%FYS=sT4x$G{fm32
z6=$4rz&1xcYhK2hz`DaN_$negQa)&$?W-tT7Rk{1$hTcN_iGo!t<Q7UIay6v{io%t
zb!U8MwrAmMc@sQ&jJdkpZZkhdB!8>!&5EJsrE=JBR{JSSDhFD(98j~HvnOiTEY-J_
zcvaq-o)d`Ph`Q$Oi0%mUZ*Xns8c*<lZyRYFSN`FYYaF^M=}-M?@%s677AOm#g|UW<
z416D`5Bqrc`3q%loS5LM<xS)A>HC=cj`w))<AZ8~_WEilZAMNKYAA0H(x(!qY%xMr
z{Qmr$K{VYrjsD?>Mjsj;svRa4=NzF!Jj?l&*K2l7(rr`fK`KpZBg>jo8B)h8$IB#I
z$z~_K!r#f$DK^Arr8}{xlcOW+AWsTmW2)tIbm-Z9I=u?t&e=xY@gYcOA2D?PR4~>5
zFSHE5f(@HRFil(`LP;Ry?|TqaIerZ7C5{(u9LlGDvVLnS_F2B!h+mQhOyo+JP$tFC
zNhgWjyq{<Wxl35~Izs3x61o-871px^bMZ4h!5_Iq1ix_xCnYAhNK{fPCbwE2S?^nU
zj#pcTHogoxMz^t(ry`EpHzicR(`7|zl_>qAp~tYqgxF|pscqFe894??tIB1bJe_D7
zTTS54KF@nS#qP)6N@^_$lh<Y?)7k%4Z3k%-cKNi5vV-@IIZO+oTDU!`mFeT6a@DE!
z*IK`Cbe|RN1C9E|g8Euu?2l13QT9T8kJpw?4V87+bvIi~AHs4-MDZe{YH?QyzT)}+
zVp#LuBMEmJ>&;k8X|AXm=&+c!nzK6G-(bzv$4IOEy8ji!5q){38GTc$`SkimdX@d_
zB*SV~aI0iTQLk`&w`JMr)TEG@MzO{}jRy_Bv$^#a)1^Dd*)tNK?i-$y#Z~?8+h@_y
zo>fg4O~pm4MaxIo$EI7c+Q`boyR^rThBZnbT~3GL=HQ+YsWDoYIu;hm=0r5q;(sz9
z%U}#s^t|Mpd$FSPp=-uw4{cLBOMTisyhYx;B}W%r@r?1Q-a?$G@FcS)W4DvYyv+QN
zrJnhyZ>Ha=JRv&!^JwGqlgugwW;Tzo?kBk`jZxc`!=U+O>&xkwoYWj&Keqcdlhwjj
zp9Ax$O*>4d^G=Za)|~Wf^np;f(3HVtyZdG1>K=}EyLM)spz+5e_aot#<ay=cuI#SN
z+71Kzj<e6-T70Z-4@q+Qr`G>{`*eZ-`g1WCBC`JN>a)}B;O+G${<@zl{qxj#*RmJ=
zSxvWcxA8ym)A!4g>*0%H`Y&t0&e#0yzI)|g&92GZB7_D{za(DAV@ke@&xjunLk~O7
z6%d6$w#8hZ51+~;r!A)GatU4vU&d<*@Y((D7LS*vX47X2zFvM!?)~_s<oW3PF;U&>
zQ2!8l&!{&yr_n#H$J0KqH7~OBqD@TY-7jE&hF6>WhHLeivd3hi<m6X)xb&+hb8gnv
zxBVvA9IB=W0H0|AARrh3?qA>ThXCNg0RTrP03etS00d4+#)BUKnB-?!srMS*D<{5Q
z0i=Vew^c`Hqe5B9{dRcop%U1t79b)E5X5}y7t)TK09q@D2?+^BBTQC&6X(c2#*X+9
z*DMVY$9u3iEHVvzlGdkWK84(~+RvL5i|g~;^EiBr;$rcG4vND^N4HhCJ_Se?s3rf7
zjb8=Zx1*SSTAwcB{oRF3^ZOxQLZ&oQQ(uzzhK7dTq2f;nKN++c8@O0vel_6`aN6j0
z7tDFZp|s%W6i@rgZtVAORz{|1RzgN{An6o>D11`?L#<-L@tiGw*lpAIHkO$8sIB+8
zruO*kjtC2U;Vs;@<|@yEuixRiCs`+BcSPT1xbrrCql4ehMQv?uDzi2URUekTD`*hQ
zq<UyHnZC}Tqp_%HCzgMMAyNU~RYz>k1eq!duC=Xg6*Ij_7n05|U@(!m++^L>(vst~
z@hLVoR_uOMSwqt!e1-!B4<}sTv7_XzgFyo0wMNV6RmR%(#)D`>YPTsjD9Hsg)e8Uk
zebcUK^a&IR>tQ{P!811R>L5UgKjNbtig|Tcm(TUlqLAlF`(B#9g|6pYpKzlukLMK8
zgBxG26x)Q}6m#C6L?vMQoZ-Zbt34n3m#$YeUz)OKd^VlIY%RsVOfr#w^9wh2Bo7~7
z=Z-a@G(y1r)d4EpGM=`<vb-Wr!ORteO$t|Rubt;og!CRT|ER7n)=IUevP)c;IF)0l
zKen5Hxm=%p3=_~9hJPG03$^w-*w0SOF$_LX`dO{pWYQNz@p?CW_M3<gT#)i}aq;73
z&-y9qTkj;S*wJQGA<k3LCbDtZ>=vZEq&NUmKYF~Ft8pST<TmJ?P*-cjDH&rO7bEX+
z(uuY3+oO9{NtmS5)wVqMIoT97{s{Z_5Lj_v-)HBH*xL5(F~<fdiviY4lEjl{23vBr
zd77>DFBtO(wq%=P_1}nq@XLrVgaJF&9i!pR(T>&<xwG*jSKqzqTzf|*?$g$Y<$FFj
ztvMb>vroItyZTHJL>AY-q^pBHK3)e_E`lykq_|kU81g({nSUVAoLxB&rhdbfKjBF+
z<P|bQwwTv~tP+T6`}_Ca&9%PxRyBBR2Wt6HCXCCl4<r31HGl_D<<E?tm}mX=G{x#w
zEb>8rB1~)1nxwbY^xvl76**|UmqpE5GY{7{M)gRCllW2p=k9MgN<IY#6^06qvh_HW
z&}KO-0T_DxTBzvG?|KUcq+K~qu*)Ex_KjLJjWHHtP%5qOPN+h%#C~Y0Z5p20>!KaI
z=;pMTA0=k@B3pm+S?872F|OD8r>onZSGRGU2IE{*v@QxLLrJale}PtExcw*L&*>@I
z%)r_#NggI)8@t}0Uq%+0P6wNpaGfYQ4YdWd2Fu=$g`wMbOY8<TO1^L6n~)Mr3&+c4
z;K6?)vCj6U7xn-{s&uyT53;za5=@Jn6h;w78gfj30_j-8m`R+vt_5BG9uu%d{qr*D
zbxypyYSpiEQ?PT{GUeB&`Ol6U5fmoa?;%*a7dq2kb<etqzBm^f5^kS{Y5Ji4!|43$
zs=EPN!nHXzV->f&;37)m!{#Z%!*kG0_@Wxa(~^hZi4~Yp<J07SUhH-cFDH#{ru0{H
zHEi)-nxrP}DUb9N+h<Mt&8X3GOif3!l$liuapQtTiwt^l+aX2cA!<yrNkS$coEg$c
zasHbRIYSc7XyeI+_X%&y3H;ZbL)hecrX*XPh<&DcKBl>JI6X;OJr?fwT-GG<!_?!A
z(X?F{Py?4Y|B&e4a;CwywY5b?2rgWa=?SN%Km#Rm?zg*8dYtH>Hd^cre_>(l@QW-G
zD3rg~kzhoJhh=4Dz3}et>|7z^qo$!gqJDqn9}xgR*YL&+7=vry7l;P{Sg)`F_6!Gd
zlhx;}{-<d~+*S&CqGVX1!>e;0p3nLbF|PkCczAdwvLW+{B@8{;vXm8db({XL&t#@1
z`7saRpInKS8KAk<)yKDVk>|N$%dA!HEHh;UPh$l}R`00gEahB)fl2II$Y7=o$DqVT
zf=Z>)guWdighNy$B2eieTrcT)4tf_^npIkyL!`WZqFx$E2-WOAQF``RqW13Wr_yfU
zhRc_c7)|49D6XuOvxAtgcPa}C3a*(pX#<hspweSTLwWCSV=s?9@g%D=I_j$WWH+Dj
zq+NCf3>fJ$OUve0rZ%85%I@=NQ}IjZP};&q>;y}Sf~2?6)r1~<?beMLWI9FNR4tZZ
zMrR6JL6D_?DYZi+_RLBG+kY8xJ`5)7u@sbQwswe&3Amnp2<=c)V4%gOC6~5!EYDjL
ze3(ea&~0;h9CxZd`?bvM6BKnqozkhZJ!TSX=(QUooPdTb4Z`{)NG6>odNlxdyV=%a
zZtXA`=GYc(NR;3lmt9m^bwTs*A3Y41w6gtZ8%IoU^=3i-+)eT7ff=dbw;jB;0n4)6
zzW<F_*vw$W$fCvoebc+Iq+*o~TTO~W)D6w6y|rkDR1N>EvpnPM9NHg}c6`Z8OQ|AA
zzw>@HBr2|S6*9F5v|yP2FpnK^6lzVLs*t<^ojcXl4%7ZjJt{@aCVa&pr8$pXE9g8p
zn8c2s0EXpKjLi|f1?S8*S9Yx*jX|M$mV!lBN&--I^8hphkKb=GPM3gI+wL!j_p!33
zvaUvrSIdUGl)mVc;-8Z*>MWEtveh4C{~A!?a?9DSR$5M6RaI+eTPa^gb=EzHr`^MV
zk4$xtSvrIvVq!<7If4Jaw85RCF(vot9Z))?)2Xa{>%zJvil9CARZ33G`6sSotXplz
zhe+ny6J)N1Y7F>=#oh8D!QM^nZH0~cV)*p52(KDg@j%lMrp8`(((c6Ues@E4EC{7W
z8lJ4ygm6nxKV&C6QUzU(R&L!)$QWMLV!C{&^K66Wnz{Hy<@an)E0ZNX@XxkoRjtO6
zzw<3r;b=xYSUEl2<tam_GB8FePG;476|`XhG`r}?^$g-fUrp&W2oBiwGBMdonS@zS
z)Ufw79`hS9n&xL;7^YE(52foAp^Op|#Qn8lm_l?fudc?ZwNUZmK@K*a*(Vf=O~&2n
zB6FZONI+F=P}M27{ON5c0rNfR9jd`wDo!;`p;UW|KbIM1CKNVM&WRz(@{3iWk7D-~
z^>^VjRNd;UB8&5fk)QlH>v_2SmFjVs!agg%hI2okCcSGj__C<{fq&89Q=jUyui>Fa
z|7E*Qf4bj~MK{b}ZIoEY{?9qePTkLu+M9Yc$4s4;JvUGyvC@akXw2)!7)b0iv$5Mn
z!On0>c^yG*xrE6`Itk**o5@KN&_)6yBRX>{Yic!ig93`_eE`+i^Lmv59Adok^=TYp
zOLA#t89qwwmf|Zj-k8H={o~CqUe}v>pF%-@A7H0@{@wH>>p%E(na^&xGZmC3S6HxQ
zM3g3R^5!Ve6#}5>8+R`U`2p&f!`3QI^-&$FjXVV@Ue?Ks+T+S!(qDLZ2i+By7TuXl
zn{900$90%nhU_jBl>y)Vvwib7=^wi<m!=>yb}Up;3iegZ9wK|9#M)y^+K%)w323ZM
zWPuGDmgNOhzge4Q>n{S_Et2v1E7$Ir=<h1^V7}wn6(+GS_V$69yES{p@Q1DaM`Aep
z0&X{6ebkatDl@}O%8yPl`EvctE(eONzqL9{lJOhgoQ+LmX7C~d{~5ohxBKZh?+YF<
zCA9Mkf~fTEx;Fg0>$yw0_uod=xv$@DU$Qd9Doo&{@mB2l5tYLG%S)cI&}&ny5M8_z
zLNMp!*J+B*t;~5?KTM#zX}hV+=!F4<HXb$1I?gF^S+yy0AMBLFT0da-w0E9cUQVuV
zQ5O}^#)W$p?GCGj`-v;fm`0{lvzxuA{UwQ=B&~h-1_^fbcRg|7ap%$XJzhyZj{Z%E
z&7uV=R2Z+QCa-&I7C#~6$QmT;B8+^%g0IXq6kOmeZE470P~zPUaD3MArMh4PPWWvX
zK54TEUp1SviM%dITE~4m$r5|KI`@Bi6nna^I54hra)b$RXCgY>{4~bNz47ICXY=`D
zc3vsn?eM<Laed={MaUii|4yEMJi_d~zrNZh_fYW~{#jL<zDW`5d-dSM%S(o)skO*=
z|1?3yKusSwR%-lm7D?fEOez!w->*o^f-QY{@7q~R<*b%o(DFp(+0fShg1yA%V(DF8
z(|5x{WgSytROcm?CrE|)?l}Y`n`9}SNTZu%DKXMYw%%C^^W9wDNP*V;)%$F*W>tvf
zm`Qz908o*=@%F_|1;9B<q%JcwK>K4)udUs~^4E=()}pE&KHSq)WPqL3mpN7L$@Ag|
zz;QeByvq0Sqhoo;i#|cII`WV^|9AI+aB!*}$<T`a+eJ?8kR!na{5?Ht%_I43wa+z8
zM3Wnav)225jDGhd-KvJOZf6mFZ7tY3X>6+i%+G$*@+tJn;TKlA332tL59z*td7#G3
zbYIk-z8l|pHR~KA%Hpo#CHyP$xSjRWio8w?x3;3P8UV0{cCH_S@D_W-kpKbi#(WP&
zba>{V0z0gplFARf9C>1dXqqU$ABLOiUfd45#O|h}bG`rG__OP`><;3YK_E+Da>nR^
zG6R<zn47e^Jg<>g(F;E&!$PSbDjzr_cI!-<PbdxgzIvx`$;j0K%SS$MU(3{MFm<aQ
ziV#gbqSIL_cyfg&KLvHKo16be1U_6%_|>5m+d}VIt9bpfex=1*rh5mj3=X7wQ*G3B
zpZ>$TOg+-3xU9GCIK{lw|I(I(%3Ih75OBWXkvp`dCnZLCAP~E2uJ#7RlN!@(j4s!z
zfWI|$d6)n_na}s~(iJh`yJi|yAi-jgq8cf*>YcM{<Y(a?A^+E3N4&@Ol@g;;8cP~W
zY($U-mEEtsKHG0i;tK)W?Y0`$<$^{yk-WKSw1s}<_0FHbZF8qKVnd^GJZ;Z1>7Wr_
z-n}dBCCzuyiX?F8pBtBO?385MBEPfpwi?EMY@-gPSE-|0vGk9HivdwF=l1sgg)x5!
zzFngsHuit~;q!Vfn<w_?8Ue`ftlVxu^g{;fdM-pM2aZu4oX&er`sWYG-9{#($pL^#
z*2wsG0liV@pKP21a$gSM>GXo2f`&0_>Fp#=@K=)d@aR?G;Lnekk`L28C!H$~s@Ywl
zNmwc2U%UObo{IeMyXb>bCnFf1Xfatok>$f%>JeSuKT+1$hYt^rPt&>V$usv)o;^Ts
z7{Kpg%a1EED>JEbJ%PVV3hw~9ij%rnFF&O8nv_UfyI;mPn)l1a63hzFBvK?z(fjFJ
z3h%p64X!CjS;_+(-d3evUvY2yzZw~Ge?CH#$KcdH70dd<%hpX%qWBxmQXk=$s@g78
zh}I%c_jO-biPMW9`LVUat#@}p6tOY*?v#YU-foNn?eR<C>%-wI?KW0GOT6&46;lRu
z;32r6ewsoJx3249aAfo*XC>arzr5g6cDWD;iU0ZTCcM&)_{$5ncp-zDqUGMf!v|QT
z07spiw^iR#JSZYF4ddY(uV%rvzM7o^9<6dZC<sZM2EY&pAgSLP>reoc5QoT5@YkQ8
z@lsoos%dakOYM`2?}G6HO+srcU~QiQRirfyEj10ngg5t+q#4r$Gaiab7810PYO-48
zG`5G$?4UVb%?t0~0=f9%X~?{XW)kk;j%K%C9eY5wo0Rm$!xPNl4yvX`WQw;}bxgwD
zQ$gu0<zsh&?Y|JN+nS16w1;n*X<EW+qxDMT#@i3l23-TGA}~-;V%4F|@t?4${JIHW
z9anl+GJq))BSn~!wS#-(o^lDhlQ>ai3mY?6PSjt;#=q!i+IAuhB$N|S5#AWf4C@Tz
z+^Q5D+(|7Di7;{k65&7+NChb%31mw@e5BA&Me5Ngn$Z!6j1n?!%4dOtmwY5#a|IbG
z*`xuhv)`-SB~*V%78mMmAC;spzVbj@OY{umBi>ZXDIOFMQ&BOpdw~f5B$pwiN(=r}
z1&CjU0OB`qi?56YdqGLOI1;5);lf`#3#+=uFQ=^jasyPFys>y&#QtFQPqIm581l4`
z10?Z}<ewhBv~LiQ?@}XohJ7FI5qf)v4E>i<lk5gO5@Ns!XwIFnq`F+QB0ZMw9-7kk
zU9!0*((^E_;c`FBF(|ed<r}e4w0(U2WYvU?^2U?=kxOa?g-xISd=%=0!;4LUo)NyC
z1`XNaN?x!arO8-^(G;KlIOuLna(l}rJ-?_h7~r63$~A6ds~Afp(tQ3`fcQsGI41@y
z!w;EFRa*<IqWv&L#kllGa(ARzgNJ<C<>%q>LpQnNL6?t?itI+yPePZE2ZroX)nE2P
zs9#>5s!{^BtMa8>A#B=FKO!G<<B$@>-v^-%zJefJBB_5=7yk?%WdBlG0!5arpE09R
zB7qwTX9v?0)0)SIVjR0oUR>fuo-<_>@17Q=l8_7F2P(DM%G+Th)?Q#;y;LKyV3XGT
z4$xo%xra1{G(>V1I`}GDUjFSU?=#%Ws5@@r1%Xh-22dCxBG@*$`sWB_7nT;D5Adu-
zAM3pM95>i-q;DQ*MyX}V^RZzh)&@CyPn;OrdMjf(bcd*sX~OV#g~?Af76kx?C~GzQ
zE5Br`7$U<Z9sT9j8tp{`To)-U9+O}<81kS-f^E+QsJycAMA3}=lt670eWUO2R0~O~
z!>=_;u2_S6uIO!KcuDjTqJuR#$0d*T(~Lw|Z28R=KIYADTVmL@X;8b&skusWWxMCu
zh0a#TwsDk#2pF<#RO-xVcG7p8Hb029KghYG|EzV=#ue<W@VvbH5KqO-g?=Z(oBDE^
zgVpBmS)?K-u!&wIMy^~=%;x);oa;#Uhb54<@@R_V0|NA<X+PsJ*2i-BLz~wa0(LVR
z))dh}w%btp6cKm9pk<q9#lPFG`UdMrnS#pJ)ivzLxH{vDS*CGz2_)GP13k<3K$<+C
z+4K{o+;K!~9yHJp(M}9!scq)i+fI^qijWG&GqNR`B;e23SH&+z9lM<XH9aR#N_*<A
zMYFBM`{p$b<BpsXw|Z{y0@foCbHRDu2B|Mp_>s~+VqXsObkpBQU`a~>F%eX-@C=kx
z2B{zkM&2GQ2_#x6TxRMNH3?)a;{o=4?J5B6?M=ae4c;n_9M>z>E3dNE5D%6FFcVcL
z!@=g_R4y0tQ*3`T{k7{9xxL6!TNs2Wdv+Afk#2S2zk4$C%mfibfZ$~J2{A8C2t7(n
z4Vp<l?H#0nJI^KpBSkJ15%iPd6uB{~`Qcotz-1Pd>Otg{umNKtq>)p5A!o{eUf4OJ
zz^+s2zZ-cp7d<?N)24scJa|cuynZ|X;<i5#%s?9wA<hPi6cXWrfdmzQl5Z4d73WI)
z5du(wF7zz?2v9$|#A!(h!-Bx1swbwIq9%@*G(|RpN&{0?*e<q(p%xV(uD?UjbY@K|
zo~!Q;*Rm7l?v*;2(688V5GygU#@6vr9mC+dQQc1(v9Q(tA#x?@7?5FnyFA^)$tpuz
zVl~;2`te5rw~xKPV5f=tJbmR`lZ-b<Rb}N()&kcXB1_sc?oEOqnuBfmu;Fw5%{&f5
zM;wbWonrid0PQc+@KfaC?BSh`^Pa~KvBcM_n=e|wKI!5|E?RaA>y&=Ce|~-ssc>UN
z-{QHTN=#b71R`W%W9Hmb%X+7laF(8hl2b{0#ChEnzfH~ljkL+EJYKn(JpTFR?<J<6
z^GCy-yQ#C6rOo^FXm@)_q1A9&;(Cd4!jqKD0P__zSWW1@{!rA2ip7ErE;|n8O@T5J
z?SQZx!dSIA@jezMem@8v2!aP@gmVbd-9gIJSnOj9gM(R|=c*C9HXpoxHFGw2BtAz$
z1Bdng1`_auqCAJDqoXPLo1LA4@j1HcIY6ee-eB4k4#qf^Viv-_>S$K^ck#BhvLy@N
zRGNP-N5QHrlESDr%Nzm;!#fw6Rbnp=&!2|~tsTZveA8HT=jP{|%m$;fd)mxpryRQO
zj_8u<m5tue={Pc>m*;c;gAGkn3#Q9t0TUk|pBI?%Wnb~tl$8GuZpL_J9j2<dkgn{$
z5J0_^giE~2zF7zd(1MW5-`9>8dpQioy|_y&S8k)i(b(|IxEpFN+W6lN@j9_SZQU~4
z4?F&9h65}jgDl#_WA1rjv5TPrLG^?zW8*iMAo<hadOa3wIR?-7iIIvShLT9{lRLR?
zVUnAv(kkAw$f2q}eWlI}O9m2y;HJL#H+~FtMMG0_Fmse)v95{0h{E7z2{ZLYwoWlU
zT^1BBLPoOia%**+>av%zW)1s<vl-N?9oRKyB0EJVeJ{uo=CG$rQaoc-T#OwAivyR`
zCw5^LaLwWhLrY-{lAUFnKw}HHevg92dtAcpDRE`)!jS@n4iJv^2Y>lH;?xGM-*(>q
zWi&8DR0!9Sy&gU&GfsGXc4qYLvxk$@IqO>i;A)azNaiD68<b(ooY|8r#m5CLQACBy
zIt!X<ur&O`ufyI!`XJ4QRpvn&277me$XaloM^SNr+G8<rpA%=P?es6<vG4LwGdeLS
zA>uXic1Z#m^gBqRs;K1OX&onLoE+4ukii)tLZu*NhGkru#UfrRKO~YIf#L%oJ|>=c
zZ3jo0UMEFr&7WQqUr$N`*R&|maIB_Acg6Oh5^_O9B^>9LJV~9l4ah}YvuAEpvgBBq
z6n)~=NzY^YLHK>U8h4)@`Klg<%oGWA#y>Rm<@fSP;8rZ;eENyGf8*+V2%&rJX#_4=
z2e<xCYwaZZ;-szN>Cv*|vj%~q3e9xfM$J!**u^56w=A|U+Uc0>j7ar<Cr8{KMJk52
z#S(c?Cm%Q4Ebc^bY3`+P7K46!I@|Zki$%TQoS21(ZGLx>e^dCdIGLD)#8PIL#VpaA
zwx*<!zEs;rO@#2Ua1YxaSy0c^aOVeE-pOAYjm}%@$cP)u?8D4VIr<%nI`3zhO=D2x
zps(oQ4PX9@H_c8IVD64{^-hu|CCZ8e9d^6{CM<blfYcm5eadCk^d#9!BJ%LLK0q>^
zaa-AJCon+ehevWeI?d}M-5xhX>1Q^x#+0pk23+A-4F(Qz)znOC84P$;4)?HdBnFTj
zJZ;1b91IP-ye`i2biFY9yL}=oxDNUWF(@T$4F@W}dozQ?3*M~KT8sz3TZK59yFHjh
zoq*;hj@G7-X|%)8yot;(>sG|&Us;_K`cH2RA<JIhIAZl>LcObVMS1_;Bsaea|A};$
zqYxc0*VAMDrJf!}vZb<|pN$V4t(@pPf#7`Ga}X*62&kxsGGK#we3k_ZqRDt&r<AvS
zu+~4C#`tDE47sFgDoS^9&27#uHrUQYiN1b5BG!AWlx+L(%q_2XK*}twm(t!J_wm~Q
zWYMV?_iU!G2NG2J^_hGg7MR#Hf8<kjX{arg$#M@##b@{g6?)&;5t_zOx@s<J@RCIj
zK0JJWeVo^}niRE}w9a}mTCNRo&|7fN2|gsDOg9W(F05d2ii8w3LgWYXY&x|kklT?N
zXw1iTb|Bo4whR#yVsdCmW0?uWI);7iGo`E5-{SAM0^FPLS&GvT0V)X2H;2zZ(r@&>
zu*jH5ln}}N0>d*FY?}{s?I{d{Pz2y(YS~dGFRw*h@;joaY*ep`!0=o7eP)0JO1fai
z!4Ir=3C>f<GX04#*v)2gVEYfIu^2(%HScug1mbWd+rwvNGXHIVavQOW7#w<UIP%gX
z^?3VtfYXfIfMu$T0UtUb$p5d}+wL2ufP%R!>1F^gO^BRE5|Ci6Pm@-W7)%SHi{Kr(
za-lNL*>_OaUHo@PeT#Q^?8dG$^QLWvQrWmkRV>H)Detp)sF(U-ur#Y}PGWBkZsFr)
z!B7tip4FSjQI!;|38I7_b<tbQnltu4HFk>^vt@6SN#IQM8%cC4J&uxsgQ=UYG9mX@
zoKc$%p>Ff0mDI*EL$JU~zI0LP9XK1Jktk6~7UsM2=Xu&kxC8^Vah1a6L-{6iGtR@S
z8&)*nzy^-Smb|8CQz2r;v!BeOo*Z8}=?7CtRv1`aa-c{uG(Rl}7-8fBRr2YwLBNHR
zX<mIS5Bx-@CA^F`7=sP07IiV^ME5Qx-c``K7$^zh!;v<GVUST$p(jO>{vG81&XLI_
zsUbhXV$uyB&Z>9$WEq7Lo_f8ZG_u7kuBxJQxD5O~g?dPj#Lianf|y6VSO`N4po*%{
zr*l9J0OxNB6>ESx@4wslhhA+BybSgu%NQPwxT8}mYfhcbLJv9!SU@8eZ@Sgpd>17}
zog=vr;^E=pD(WB+IF}w<&>p9TVwbP6HIaJWON^$awBhAhfUc&3BYWcg`izH2F5tsn
z))w+(9VA<dU1Ag;v)m`RZOG+I0?)m&nU10=!Kwdl8P4-vr%rM2o<~C<>gc5a;W>sy
z*KJLMH2N65c{`yMs11rp!`J(+Ai;bacYk`kz%POtO_xBq@pXdlL*u9iO++>bIWgMV
z3Sr=1UMA&y&`J_gqC&J3A#Db=8F{pmo(mwJErHHC%*><08(Y#>`1`*8OOs7Vb+SRx
zTsebG0v0@gK$<}1D#t?WD2$YB&@#cq`S--FfHZ4{5Tq9c^Zl*p*0G&ukMmr?`N(T@
zmz>N@!UW{^GT+>>8*TjCY85YW+LwLI{ydqer$=uSZZHvQY+9s-3__O9w6<8j?xCKv
z^vc*>WiIaKVKF8BMZ2j+gwJw#w#K4lZ5l}?Jy0j<o*}TbGR6<3=|2vth;!%07cn$;
zTB^h}65C1-Cfa%Zd>;vsnN$}x8fGo(cC<d&_x@s+f1<g0%YxL<uc3n`j$d3aRY8Ll
zufS=pjEWd3@-i0FUy{bCJb4?DSx+fo$d(<#$2XA=!&2W+&b`&l4`*uY35cw;6kB?N
zIdd)<Jn569cT|!TC$RMYCI_FxqYyDdVs)UY8Kg;vB8^{U_y(G}1e*58NCT*x`$k=0
z;gR3{4)b5Erw{QNgYMFZM`DdRq&sOjw|soDky6F6*UPSnfo_EmMia3Nmr1asgYTPl
zu(Uq@jbxL|M%*>(%Gi>UvZ7Gy4+LSPVB?xEThu04bc2KJTVQQf;q!KlBMuQ`PGVfX
zBXbWs8gAgsZu^p`$-g##dAS~j`F`wwpYNtfb5e(_iKt%||Ka<~6d^2sQQwUBl$K2+
zA#RFVBrG)BZ6pk41a)Sttb=8W#rkoZ4M+ar@p16$w3zR(U3T+yftC-Jr<XI&*HGG9
z_Lo$f-pfh~9R@C`0jdxInU8zM59MPz#)1)G0!ljgsHfpU>ump@kr9M{N8eEOf2zZI
z>f%`AzK1iHw;Lk+e~O|F3s)#sF57<Z_cHoc0boNf3)h9ih6aM7GFMD->|nhHShUz`
zH@TXBeG?WjaDbjHiFjlNuNfh6gm?%YyyPM^B}4X(Rwfk)43$>E!j?z`whSixXE@A|
zXd{BA8y_K)4Q%byb}k>SvcI<L>33H{TIjWYUx?$zy>Cn{sgSyB>Puej|J($j<_3Xr
z2I+8ve($!||3i}Qhfw0OUXA^$wRXVDgun|L5OBJAO{iNt<|Y{QV(O`aFvz6FK236q
z)(IPZ1deh9r2Ww2nurr@rDs0ug0bNx62a1r3X`W=&3H4Wd69&eLFuMM@D3Fk5rB%O
z>eaozKBkDz(C&{RB~b^5LiU<c9{-WQ^||horZR>+`WK^tOy+W(XQwr(c)S_qX4Lmu
z9ClDpAedHzOA8+y0*VeERSgbFXxJ&ehufm^O;C_({iv%Rf$z54jzWuvFUv=YFTnUI
zs?XBcDu8Afl1$N}d8pk+e}v5H&Hen%uuALc(VigB<wci1O44_y>Okyr;7V}bHn0S|
z-L0nR!0ayWv_xW1;qb-WsPO*Z-LL4PVPAC~1pe2W*5k~(_UPovvUA7__Awq!sn{yo
z@mPpd=4433A+efjV_twoQd>6c`#?yTD6gb0dO8Tntdd*`V=Wz~=;D&nb$*BHWg3Xk
zJsyXpQ9@H2&Ws~6@|K&B6>M8*sX&vHzT2gWEGcVBRw5N1+$T$~4mV{oiF<uFTYVD5
zM?D&%Ylgsr!yE^ERDKtLL>-ea(nv(+K<~D1H=t4^Vi>TC<wzukV?rbv3fuaw!Dk-o
z$)6@;k+J3fqu&U9mm%!HAbs8jeh7I9j<bs4*VFO9awBCc8%J)UOYmYr=d_l8_t|MH
zV|WX!c>Wkk0NV7{#aM1>!u7$yIKR`Y%|S8e<FXuez#h*y;eHB8u7We6vESdVoYfy}
zFvo91GcZ1DS!kPS87k0<DU=q$QPXwSy(~Cr=(X|m?fi9(ON%tn#AHG1<+{Ov9hz#a
z=`j|F8?|tBe*EG+cx>FYs}M*fan}9Vlbh=q2ah`BmDsE#X7GIYGEY`X&C|`vE_jiZ
z7`choEJkAA0kuihc*d%DpzbzwTBz>q>wV71LELD1M8l@m5<Td;;7N!U{5}HVw!b4>
zNe4+(FgQ{*mza73d+Cf{`=#q#sIiStlv&1dK|CWc&2;rP!n|h6*ZaT#l06q&znmGp
zRt=t6C~dILhd34Ur!27aL;}Y|?rYNa*szP066rHKozhCSoUV?UB%%*hZ@qd*7(I|}
z5hMDekTWXQ@)FcA)3{DEJjPKr$EWlIr5(;kA@eYqGq6VB`l~tLFU(NBsfq6(pIjBA
z8Td3H0ERKQ4^W}QR?SDyn_Wx+(S+dOw&1m6&253I#Zl<+tX`^X%l(hy{Ec0#Eq(1<
z7CRqWuCYth<B6SG+&>=qUiKQJhabs(uveF0ECIxk2(C{rPmzy1Zf|ZdrZ|llY*lTp
zRtZ>H;5nol6%b7M7kHaP-l!SI%_^j?524Wm6>s9-H^H^uBEK}Uot-E<*|PDa8pGzf
zvKK^(g4=O9$NhHXANlCDc6AW`>bHAwfSlEkpgLFg@SGzAl<sot0V)kIw?pbn)N-3l
zHFjZl+=l)%nvcO*6ml_wzS9lzEWOl{batcMrEWt+ToxHhv?(f7vMI2%V1rGqkkrFJ
z^-Mwm3}g<fvr>gAINbVV((T$q+{!b#zv;)`>wwHO54pTasO7Q5r52<A_~EQ6SjsoT
zrZ+wzh4K<I@&>kYLI&h?W%N<VM|Z=P)7^vcmo@*$#cTukHEE-k{0i7R(YiwuX}t*@
z0cdCGR^+2^yOR}xTZfXbdmD_y3F6FUbAA|RyZQ+%{*mUe%87)vrpz&#CyB(=vq$<r
z(%~?)dXo0cyndg|)Duq7J6fn<W!=l<w>GlPVm<%xXUlkOfh(gBVkDCP=Dpc??c@X(
zplh7*WnvGJxv}|S@tXbhf{eYc+{vbS?IdGCxjDj092}xnkRm`IGBY7`pwY&e2u)GG
z#O=eDAJf&Uir}MQNc+z~|8ZyLNE|z<=QdrQ`=#5~Ka&A#p2r^iYwj`_32586Q;Ys?
zEZFe_*p=aMUQ&t5S}#Hr(&S(MT#OwJwN7id`1Xu(*xM18o%wrDoiTZ9@aAHwrqYEV
zRTz89x^FLvq_*j@Hn<RI*FKk&IcXL$!qJS?aW~<KUdeerk&V?=wb;u~)9nsVQ)L<B
zb*04q2;kE+YbV75B_0aS6Pd?w8ZKqj%LWi41WO^S=$3}PS7g9KKEq{z4G{UER2@DD
zA*{d-0U?B7%QYQT!rR7uXjr>80a=pH<_4OS?or}7i8gI3py7|xFd(@~Ab~jz1P82;
zep#O`%PxOPRX;(p=Gt36&m_t;=^m!TvBsR?MP@Oz%J8t9(BAwE`(dH(xzeFTo#lY9
zVXv{sjj2c6iyLX8UPhrMPgMZ2OcADfsB>MU66W((D8{xoixQuBT8w!G#<LgE>SXGH
zTpeCXRxi`iS2qO)wR$QYtwV~Y8_6NcFaTgh$JrhoVeU14IazlCfm2^9ZEFz0+eZgt
zeqN))NPkkFi;nevyi}4VaEAv%u&~UvEy{!Pb)j)>q*#o+GqmK#_h&6)%yaya-t41p
zO9zDfHz&z2JvStdOr_Qjk1O)nig0TG5??TmW8N+>BwF$Xe>Y)r`iY>fmy5JfF<8Tm
zbg<HF!a~f{yJ5$*9b29DC#+RVUtWy)U+7+aEwcsYf&x#cS6)wYUN#eDHzyhuTKs^&
z9=(Z8MSfe+0!P1NDs&K{0ATsaZYnMqCobD<!NYLLqx8757Fhu+ID--!h?Em|r<14K
zl3@Mj_^m1^e%mSs`NtB~(_M;+67oBqFGBz{A@aFgQ;D#;ohwm2eG(_*1P=5;v75vC
z9QGH33VbnC(I1|0l!%5qviTqU{!)P}RUL}`d^KJq)*CtOW`dyUU@y&#prv)@Z?UU*
z^k&n&kOE7?V0Z=u^e6vdpjhD8{pa3${9gz6I!KKA@dt0nhrV$d6WySi0!kqQQQ+sk
zDUTFI@ku3ru6ZUd&FO%A$x{-Efc%F1&-)G7RSF5LQLMi)mC1yJ5QEENa*gr{YLM<?
zSRFfd7zmZH>+wI1+*s=zUphKI(uigAm(d<fKlR7mwAa<fDH@Vxp+Lkw6sF6)5g19c
zB%9G{(@{z^l4z{Kqs-KKp){22o8-5<W$|B{pY}e{Q)C2F#c}x_6;F|6xf_mewF`Jl
z7#RuA(1_j?{`wW|+IsP?4i>1qIXI2J!QbQOeF$YYx#}Bpva8?I`LmjD+@bb{r?rw+
z<y{ruv59@b&hkObyXQUD20)Kv%Gt4tILm9RB_&JA8`lpIWveX8pD{~1AGPx%-VpFR
z8S5~*eJIi_GA;I=0yeDzLy65YoyNo@k}EZBiks@6Ot-BQaS0l8L#(L`Z{9?UauPF3
zMq<x*zY6bSi$BjtCq#P6NN`E_M$DQ>Ly!j=Hd<q-h`_4y*+y>1=xtqsZYu1_q7v2Z
zYZE@>ib&g}L_2~zF)q0<wBQhxNN9>&N_un$k{Nq2;xdr{(Jg$#J6L_adDqSScZ^D;
z3Fa<b^~<5ysc0f7`~BR@BH4^<$V5QMiB2F^gBXI@8KIo<-STXd?Z|@}^$F=37(URY
z)Wxu{QM0q}GVZ|jGoQ~-w751Ogsa+l^4SP@z+-{PdLW{hpS+evwvok0m|St*^%9*7
z@0&UL@25MH$GjUs!~4(<SBI}$>nD=cnVS1&kgvNJ-WIx3eMu6Qy9Mn_Qc$KGG=woj
zdzu_2upk9}uVQ3%tG^7u*swg`E2!xMf2*O^VjSg!0PI&xENlDSS-`<5Xw);Yn_No;
z!i?cqM;oU;TKC269r<5-`>7Wh-of%wu=wq9*DV}uD2Y88A9gs|XxA=GeVV(<BKAEy
z{rBT>@%5;o7UE`6^{xZzMerd~9D9h!)m#Y^z%GDijDq@zOV9!wRpP3}2!~S;M0kvB
z&M5)y`9ljm#VUmZL8`5h8iV+lY3d*I5#1mADTU-oW2J<7o`DZYE<@b~bc+e9Kf`WX
zH0(332gaSZ%+gS2Uxsx2t=G+_aAzjwc}AU7?W5hS`XY!_SeE6A6BHm8Bc5)neUs#t
z4yf?0H4cHT{?Y61v;A!;YI2b>s!v8v;NMrDeN*0uk7+ol)r2iEeVJuR;fo|(CgPm)
z{!;t&go9NA?<Eqj`(s@T(tRceB#`BFpvq-CFvg*rm60`nNU`bFQMuu3W2@cg^pG;f
z`bOT0r|_s1QiU2x0`w`MoCaqB(%28fab#VV<7rY<eS}T+PZG$q5Tb~|>&BdQS8v73
zI9=#D=DH<U#QH3a)ECjsbWZc_3-33a;60epB2h{`#U#qq(Qd0*cUbgkKt9$((-?C7
zYkTS9Wo$755O;%(rcH_~C1q%O3qT2d^2V6>w1Z)|0OH&Y?wwwB4;h4&ywqfUK>W6C
zH%uhm`}gm=jL$vN7Nc3lp(RT&z@b5ElgRQ@rQaPo@ZH)^(daYTasz1==011bzo*i$
z>F!1rr!F1NM7M@ZHiG?-(P|J%2n;lY14EpFiZTS|odlBf%%BY%UG{a%;C3Wbn36H~
zxm1B%$kD;Wvb~UMR~1(}tuOVPE|1|7j|g$>?Xa1CtK(+<Cn4+4n(bT~SShq`)EBu5
zb*!5LJuFFnqf6{nZqjO5#TDj<1D}D$LYDNY4|!|N&$A!VH7AV*m1(zC%<0+raVXmy
zEKQAmG=qth4@YY^ZuXn(GNzDVB#@nx6zE>B!o?o%`<;}t_&%;Q+h)7<wXM>#hw88l
z<I58h6I)GX>morAu%`5ljg5B$BtMs0p0JH`Q5Ltg-9F!Lik&vkYgOxP0W{Kf9}m$0
zqVcYeg9LAM&)&_oTZV&^iTU_8(rdA9+u8Z)-V_pu%6hs#JaRhA`291HljtNYHUM2D
zpY58)eA9lEDwdHyJK#)9>LiMOH3q`7Yj`a-GWn6!ZG6?+lv#lru&6L;J8jkK04KPL
z%V)4u_|qngiL$h`zB1Rj3Cid?RWz!>gI!TwDe89SvZJpLV&GpN6AY^Dun#&rrBc<c
zth~@#`l(<;=Ed@Na@Di@aYIJP(_LdxLld5PfRw{LX17jsuiH-+`E9~OsH1Ef<~t?T
z65}_8jyEOiF|VH2A7m(mGr<mi4d{Z%?->!rvhCCMcFYRyKM#eDLU}3Nl+3RJV^=-h
zu_YLti#29+#a{ND{NGY$l~&Cda>baL`_<o~ySz8vtN%;NrjhWk*(ru?E-XaS0^a)Z
zfuzdH%1_4kV=KJ&ZzNdPzyTLS4*4Xe3pLgnp#?5mo7{kiSEmac09-Fs`0r~Q8=8hj
z&&$mb9ER9B&lc@4+m&4A3GzM#->iElaqbx>GTY`9zr9!w=Y~5mpyAlA?Y-jRA5EOg
znVzBBF0FS}ZuH%Gi*-24_%Qr6dJ8}J{9(!C@ci2Qyi#`hNpJLaOoz|#t{4=U^$wx{
zDhL5lsoLoWB*=w;VVL9usfIUtp#D65W25v6t4_wT1!JBfm}g_PCSe23!7#81s*^=i
zSz@0jtw~<5hlEC*I}3V@U=wJNqbn~0H9IIcog$&BlXvUfTR&S95R(YD5dlD`^Dz^{
zk(}E)=J!>3>VgfX@`R_Q=}=1=o`kK}&~n;}gm~NtOh>8hs*o499Ke`vx$iNQRI%W{
z-p#NXD-0IV|B}TLGU6O$GHrr|SZ}%FR*zT6`E?#=0I^NN<@?_<*KxkxY<+n{=cxfB
z(oa?mP)E&iDaTOiOdc0LU;8h-V^@^jw=X`PxPedQtiyQNLJx<<rSAStBMn}}nRMXr
zt}`D}&{Vdy$*8j5-DKX=?fHiHRR&zV036CvNgZ;j-SLoM53FI6|LW6EB8_Mr_^;0O
z`g3Aib|M_D+2HZ)cOlK{ufIR-S{xQV!hoN@<v_A*t;M#!y#WiAMt@-eCgt48n_g^S
z`9=FpEXjGcFlCP<lt&1O=%UNUUaiy&0YyUhV<z>c$K2DYVS{U5{Kzh%nAvKptCfz~
z{J!XhP#1e-3pcb>6zo$>ch9XaY8r2fBWE5vCvFSlFzRLag$%Ipqi6iJE854TEIk@U
zMjGxGhYy-*;kMI~f@?}bZ$K2aSXZ~wg**!C-JH<Kqw0%syXD}jiuH3`F#y<OiT0JH
z6?zvyB^ON5NL@NAQ>hGmEZ9FetO*~15C4j9OoPLUHP`|-ninO3dkSsq1AZ1;4@vCA
zFL8%a2*D;+BIkOg5VJ`*VZB8mZd3w3+xGFySVHT%mDWPqyI=@2P3!Iap*gP<SszjD
zan`Wg_e~Z*Qka8jq4y@Eu}j7t6Sl9a77fy{6Lr5Qh#mzT6Kk^@p8u8+Ydw_>?|ZkU
z*Pb2rsxZ4vCTid_S+xA}@81u0ZDn~WvjZdAxcR5@er>L~v>tRux<bXGAp($8WU-lV
zh_2zV0_0M_qjG8EA?dE<kwe>&3!e`1G*wk6+p7$F-TMXLgSY0DAUBcz-NoMBi;J2`
zG<dq}_6)7?+s<SoDtl`&SyGP=r&g&|5?%@O4!GORnj}=M#JTB{tXZ{$^|aC}<L`-W
z84EGeBki?#GN9S;W>&Gg0>8$kBDiAlc(mG@XmbEgS59PX31s4Zg!Dm6fdgCy70D)b
zIq6hcx$^QB1x7r|oQx<}n?<gs{AFm>B$aHWhiu2<zbJ^)$uZh;z0{QH8A{Fa#)eE)
z_eD;qwn3c}aePE?$GHmt(z*2a_p7ce`-YUT@UT6guDg4x@`JmT;zpx>rz46L^AlB-
zyFaQn)BM)qGfwSKIM%L=!%<G?42m!v6+v)N2v;KVL57+nmBwJie7{0z?nOP3D@Hdz
zv6$ak1Mi|oE$yXcX?G=4RlLwc!qV4o1Q_8+yhoo>=+Y7XN77k_#np3bcyK6Cq`13F
zvEo|X-KDs@I}~?!D{jTzDemrCytoezXTRU!SD0(|OeV6DwX$+QLXOB}!Rxpp6B~+!
z1w!J1xDd^_tZ)$x!+9$j?R6USjaBnzJvQ@IQa0RTZFZRRr3#ZI*gqvj?J&qBiUxkT
zl+7%M)C+|s9FCz}uzpfaSHnWOqX1<W)E#0SWJiG<MG*EFRQyAMkP_Mtsw?s@MD|>6
z;V?8mJ`h-A*9abi1FN!(45iv+&a1aX6w<4~6dbYA!VH$#0R(=|mwQ>wHVPEGA1{B&
zU(Wnx^P4<qXT{aZ;fOp`5sbH0a0$JYT+YP25jX;AlxG9+#zj@6&xIhvgVBu)=%goz
z%l?6Zw1F{)`vIvhQG!ELDZJaQuAbAOk_F82@Q?IC9DDS!uh;p=Y}UGruOWXDmmK#5
z-uG|8u~Ua7W@O(z^A}eAqaRHuzHkjzp%-f{BGi9lN~W-EJ$2sTPlq7VAybe~S663>
z=ilJ;u1-TK(4v1_F)kZp=N-HA;O&!&oec^Pj#T?u<~Ye7M2WTUpkyYJeDJMrTTb)q
z_?TlNv4b5Wlbj?Ke}svKcLNM3eh30Qms%9<{-Yz)S~>~^UD!RLiwjqGd5h*7xP9n4
ze=L+b*B29>|86C!(kcs)@k5}5PF;zg2LtKv7WZ}YgjLE5+I(NP84v4_T8_@2_yTQa
zjtT_axFucwDW{Z3&rcd0RmSF*p5~KK$~MnW3zW?E+Rc+SkNow^_;*mks&z+u|H#b+
zH@#NUYhDjLG!Xq+f>E7jAm;Nto(D54tnQv@iVv7x5WfacDuu%Hlziq)<v(;|uaf|M
z=a$9G{1>R+hO?_UK*ecA&$$GWaf7UDV<$Y#M4CcWcH>h^<xX#MV+LW{WFyO<CZPWe
z*4{D`VU60+8X}(l9rz<NB=|~}$9{-sln+s4j3G)WU_U_zcU0SIIaOlU;fzCP)Nx*`
zN^lJm1@o9Rj{57{ulYy<IM7K@-CC{BOkl&qp(Mq`hXs!@(ihszF&b>Ozg4^KLl*fN
zmf>obDUMt7^9Cw<D$9xn`@iD|K6F1)C0%Q&tnZX}Zy$Y$K4K4Y;<B$cV3_j`t#+70
z7nYV6m(?G@Vy7ov{ZJ6(sN1Forfb<)(9RXbCTxo89LYYurqhm%XGpB^-c#D5lMIM4
z;w%ax(OQBy-8iC^7JDQNal#~@wCU@AFqt9b2(>9@OVSAE(wf^QXeTQVxfn4v8CPwZ
z&1kd*lTJ4?hC_Lvj_kpoPjjj`P8rcU<4~DfjYry#ym!7M;Hng=dF-b1+rZwHUk&J-
zJfcYuhQ*F~*uNKXl(3{qTGkceDU@9orOH}e7ZE9(To+-<03|F1ON48CX$6WVQDvE;
zJ5lK<%6Y=gE=ERU%t4hEEYD(pYyVzshDPCD{FCjCkGtX;jK{Z-%it98J?EKSInN&Z
zcJFHAm-qoc<pW-3<d$l}1nVso(S-eoFWT<l2MgIRJ6!U_jlR)CA%c(ZeZ)S3{>FrD
zvDu`|K8=CCE>k#8q1og|Ba<^Ux%dfLZ=?&qy(mkz78u4DQlTg_BzHv`nhC~`8Z>f*
zcO8@y?yap!n@>qY1Xk0|U#+jZq6bmJ8L1|3G!=~;yud~VxYTfUR#3uBis`O=Y;aJ<
zRT0tT6b<@~N-C?NY;NB0WAw?&`^!${jHH&IYpO$yODnTFJk9yI!m$fUaqKJRa`l%U
zO4HukTas2RM8{dC*h`9=TnIQyEcx&hOmTE7f72dLsLyC~YB2mvSD$~I-A|u2j(imR
z*4?BPv;bbgiq*}JG(ZUEGX#Z~Clsa5w2C7jd(tJ^Q+24{FHM)Z@k~tQ)p%W2IMzPp
z27T^+yinPCl~=b7aNO3ydzunL-5olv-0HB>9c7G3>MQ9unrd~j+<$NDe<Xl)o9s|o
z`)2QXu*k{8bNM@98x9m<a*{v%?)O?J(cB!(Sif90bZD~6&rz=2qx#vI3|9Lq1|(=`
z%wUI*u=J_OrgC_Ub3{?QWXv6Dne20#aHK8?t&b@f(t*1(^}HIoFMSjhOd$PL%|Xfv
z5fO(#bIgr&pqmJ?ZW)~;Ep}v0584TWIzy~I##OzFgdT!;<5i3OW`Z$(;#1xelZ!K^
zYNFO%1K)fS25h1aExOerewg`I&|b-@uz}0Gd|vDU)=7MXK=rqSq^BtQh|tCSnJob=
zc2?hbwjuTsN;SF%w||*aMvjXDUW4eWONnaDu6BXibvoJi5-)GU{%UG}T3b2o^m2d9
z?)f{+Y}gZ_m)%f4D-#Rc9*>y|zyy3bn#|<3C!TG+d${brseE{Un|Gh`+f63Z*mjy^
zX43T76Xf(QMZ&=mFYcLk@wmE``|3{MgK%)5@qrBT_dXkqn&#E<L5nfydEF)RhM|Yt
zaR9E4juF{MtT4Xl|M_7i&J{mn$RLZwZU5u;y9uWBxL)RO-HNLCZ%le6b7-Gf9!f=)
z_tTU4e_;woUK;7Jt$liHG5Tb)7=eH`ky=Y@BX$)d=EA_+4~r6S-K|vz<<?OsMCN<^
zBs>+vYb#FZ$=@%_cqL{1IE}foIsF+2+a7-Ck0wIxUpOvn_#qS=?8^)D58XgZ<S6?d
zPG6)3Xl}UJvJ=^PPrmX&81s~cT?EG58PO<`R`lKF<Wx!1?g3>l0}7(MP`W-Ch-UZi
z6y?;1n+}bdSv-mdyk~P6+dhx4_5wcdhG|occt@KKF3JjbHql4}wOs#rHHa5*x}9h{
zuX3)0qd1!w1^R}ByIf57(A@1|HNBcf74_aAdl9!0roEvBIz2-lRTO27g6Pw*cot>i
z1e~s!tMSsDm0!AtJk#`T^#WQck_OwKVFH>5C000_zj^HN?gU|NI~PA%Uhvy~yO3$z
zc+1(8{;B7+rPYhZ^?sf}{SF@avio9sl&9xY<3OXRh88=p+degBo-LBENQ1%p&JIiK
zBx>gS>FgiP;5SrJ+(;k6shN?M!zD=mK|xUp4-<i)ALB6`iUY%6m1k&<X_eo?4RIrw
zEtoE%zz40_0wu$xe-)m3%sL`(+#36J0v~^%EnCaLvb+(07NGY2gPW-5vqnlf^wl^r
z${A7)$d^kOOLS~b3)CjI{mG%T(;M+j`o$=MeRYYRS~Y@H>hu%H!&Ht8=c;yg(W^H~
zr`>Rrx2%qN?v=Gc5uS6GNO+lhk1u7(HkE`l<46C*nmcTC)Sv)_%Tz(#qd*cBjnkh`
z$k*MikBMgr+ny&uIvTDM*)7wY#5^b<KmS?d|Au%vZp^m-yOV!0HYm}Ta>-@gXF4Ws
zqV<)hpY_q<{yooiWBt=rA37*tsnXBObMFiDhVSkusP--bj`^{C33A4%X34SUj|F4*
zPFDx{v{2}p*A6cmQKv(S+agy$T6MO!!up1_wypWg)gkWKBnXryh{3&T)hPd*gS(yg
z9^8B<`p1{B(PPnDBggqkY!_1B%jF(P^UY>mZMo6T4=lX$;plOE#5wIzvNxHOV|Uu0
zCHO2RvG3<`JT~O)*L|1ya<ulj`#+Nhn+_y?Mo(Y%-1RxXzg`(9D}w%xFn3(>)l6$R
z4WCq84cY3r0$zs}MU?-?$M4G+IXRHSHov<T<96$F$CLgxsn-SKSr~bqqQL;hXq}_Y
z&VWTtUE*rhK1G*@??xb_sU)j-VmLKwNc%Z$+JQIK4Tmq&fjU<(cG&NC0@ihz!vqYc
zjLs%3h#xkD(N%j*q`L|ERLPJ5xi}R(cS8;b;u~{sAry2IksKTB(u&C}5^Ba7OdN+e
z%{Ti)bHoKx9d%Po#z5A3MR^sSfNE!=`zC%?2?6)TqxI+Gtqp@^qhO<H9^Wyb$6Ogx
z-lZ?wIlp<9w_M#eoVtt)v)=a2>ohd;T)!etdAb~TQBQ|pr~YogZTFU&-_M2{1h<`d
z%$HW~^h-pOL+Sbm2vs)3QTWUp!GhDNH}8(ET3<`PAcqahVf*`!@&wSbl~z5wuw}nK
zeIeF=oF6BCKUT@A;oi&h4?+A``t;R#ZToO?^P{17xsiv<*p6$p)vxs$Fnrhodi;A+
zaPkwio*mvZAg9;?JR#F_wQbcjALc>!9Hq8!acj%T-}+24?4>Y{AhbVRMoLebC!aza
zg#55<eh_IG7j}*HChp2&W9W~e!s?sVy}mP#+p4>8CmH@pthcgFNtVm0Ex#R44Y!3t
zXXj!vJh65g9}my1eI_J<q7XvB=2)LAZ`4p8inU{M>J~Enx|pQ>bXTepOW?jzEKYme
z^6`uY()5Sy9V->QAL;&~_N&)WHb-AXzT0j#Mq^|C8-ks#@8}-mPZAzDqDTwpeA{cZ
zBc5}or|*<q|MsR@9flq>YM^L5A%HUK)Z0;suX;`UYrFS!K;HZ7t=!dD-S=KD(BstH
zi2Ju~XGP=3e#G3F3jxO(T$TvYn`sn&B+!KHyziAgik{nSNT71mv#Oe^mkDKx{Agrp
zc-H<vQjd|Z|C_-FbikfG*XC%N(gGQ6e+-Lm0FW`QTs>d%7<m()_v2^CMVU!{mEl*p
zua&nU8XFAy2fcI$6lNF$=y2%_fw)D<qpT#og|Tik*u!BgyTpIL6^bq_HHH~Gy|_b9
z1v>sEV8BLn+K(<(89k|RkdqT*@iX?}DpO_XI@&CL=*&7(sPQ(QuL}FvnYHhE{nuj9
zeSanR+uK;BUXalbnHF<#um8Kxtd4vS!Ta+q?>o;e70b23!_F|9nLK2GoC1F*ox$ZL
z8zE8WqLU0pwj<yDRYk^pDc4!YK4pKN<LNe2o<A9=G1m!!&*wU(l9{^@Mq8n6zn`+j
z7d|c9a4@||_jc<>j7`H|{Umx1oY8&q;@)Xe@7aMVN%VU9-DvK5QHJUDgc3XQ66O6q
zKap2GG-y$6N0iS{d@=RCNR6?|D#Wiz*_2R#AOLDjFk@G%|B<v<K+OG!q{7Q|JN8Ls
zhcH5IEIh5XPef1e6%FHgQ8SkTU+k9<glA(_1DV~FEZeZp-+|x81wjy2FF)H5y?Fja
z?@1>W*M{=cTmBm(8R*`(Gi33l`}RS76rnms4F8P-gWkbuKMut(yGd2f=edOQ-Fo7@
zC+mU6`Zl_XK(N_~&-(V&ZmaNv;}BeG?^RfARWNm5XwPj@W@W#Di`^F#H^H_2l~um;
z>FDY$s9$<-kXW9x!Zerf!)Scf?`E^|A~+<;cI#1Bpo--;`;^C(2%Pu7{SJ-Iwr2us
zsQ%xU+;2{rFhAd|xZiFT{a<E&_35*29K$iQ3s;v}x;}hK6LgB5!%?pe7-wFo5^}mh
zaE5roOw-%HeexCf01D6}3Ih2q3@$W(QNsG_G_%w6233HNr;4){2ZJUXbUo&czQ`x8
zU*u*rn900KOg3@c)rdberO#6zD!W8j%)ByJCKDJE8C7t5)k$YnnN#HqQ&5|Y5k;nU
zB|r0Yy=KuRC6Oo34HJ2vHLu$>#HN%9RG0X%wkl_?p@;u+E@5FTE;c^T>w29rc)#<H
z>q<2yS?4z-h|jG1n~W|hI@Nr>;<I)=tnVa@ka<X)*11vFN&lA~izi2NIP-J0;2tw|
zs{+k5QM>m=G>Sdm7DFn;r_u2k8WroFI-5cInl5hJo;Q<0mCuat4?TiNAoCp8K(-uJ
zdCaY@G7mIb7yNWuafW}8e*?s&+@S54Rs!2-RC2!<fh^D4)HGQY#aYGrXJYk3w->d!
zgKx7TZ^Q{bZV}C8mtEO=Sd_$bS=O<KaE-GasbYVqrenilesH!!#iYnYi^;V%{Xo#H
z9rg_E?YSPpKhXQD|H2v=#h=p>fKICJ$S4FIn=W1KtAF`BLq(eCeWEA#YUFwvY#)Kq
zmncf7zNma$5MId8b^by;-ReAdk^4REfMz5KxMI}>Ub@j_K>JK@W?{jS;eQxHlDfgL
zM*-7$HSmW+K#@{->>|p^jn=Eo2$6P8dU}1KX_N>9Ch@lz;rL_u3|@O`7DdM$P8~jp
zn;t{`$BhMwbqKxu8E34x7vHoENPSVvh+CAk=P<iU*Sj))gemfj3GEQxoG&*#*3t%t
zvpGMzi^=2Qu9V5wbbejuRl1kl8$My6O!D+NITgo!1qWNKz8El_N%r5edB8$VU9uIG
zbVKY*4|n&_LHYF!=uuXF4D4uht&=}opkqgvihjTSZtsP+@bqI9kJy=;&?c)zeNrr-
z^5K@WfWy(LCoy{xlRX*JEQ~k56JR-|52|y(*cm|`D9|ty&O}lUP$M7I?&3`|AGew)
z=#w6<4OAhL>ed-bA<d$Ug;Lu8o*;V;3q7U9x8(o&R2us8oi)yX$RPGod+}vRVf)<j
zRN;;al|&P`!cOgT$4I>(=RQ7iBzdZ4Z>4em*0OU;2S-@@5ft~@RbC!32T|0DqG_Cl
zTNnbf=#F+^K$W7A*p4rm+1>QF`dpz>lf^89N{og<0%h#ivOK4Cvw1X{w+j~DewJ;H
z=+`Bh#thYs8+TGX7s5KOgx|%^v(czu7Srn|*%=g<1(|~gCl3Y*9vsT6cG5(eZ7)m^
z(6}$pFYO3<4}U>D;Lp&Wn5*X94~*Jr_?Mf^4b*+1ZnW8Kw%u59)Z(7(=kbWDG16>q
zQmhY<x^9{bbJm6ftBSH~oHSuYPdW=9nfoQj;l^J2#h&kSIdT$m3>h7}HBYwlK?a-K
zlp~p?gZc;QTKV8eNE--Pum^*k6>?np)kSf&aS=_Gb=39Wg^VLjBbHR3=|%M8$RGkL
z>MR(#8U#nX_vr^xKl#*^h+cd6vl4v_`M*hg{p*ZbOg}hydY$cfQ|JEnKJ91ltGipj
zU@l;OV=Q|$tvA|GtI$2Yw5o01+(-vPGxz}S3=4|Q4V~5RjDc7xAEPgy!9%U=YZ?jt
zS7ZJaEhhSz`Cf#EXCz2G`b(!NWY$QXwQblq+`Dh;A)IeV(DiMM#&VA~-(bcI+X%|4
zAf$|K%Xk<hcmyxcESBdSL07=7&J(319jZI=yVx9-Wf~R(oWy%EJ~@+7(ay?-x09M2
zHp^X24ViZ3SayzY+1^7D{@$-z5%DLPcoEW2yR9Q6*zI(v=V}G@4y$deUy({MdDaD&
zv|}<9K1XWiCK8bR;X99m`AV+gkLB89?1o4hkga1StQo9z2tTb&H_?ZJ_!S8|0!=h>
z#MTal-f-<|Bg+Ku=tmp{6>ex1Dw@Wec5;-aj#yD!cb~$GyAOCYJr!Yb$MIc=BqO{f
zdi!WwChz!iZDob0qpjOXLgP**mhy*=9D_BXa<$mYOTp+rly3K@ov?{rrqX}Xt4<?<
zFW#M7g8Z+l#td5v8)Y<+nhQUXGS29fg<;?>&}s9E$9~^(%9cbhilI~u;#X0Kv(+bN
zQJ^x5+8)q+hg%z)ML>bkVGYzt^$rTin3q3Ohd!bj4#6GoPmQFKjx+xWGouYlW!$P+
zE6!SGnV{=-$zz5kv%f(yb90=u`>Jm@JLEKEWNbU4@Uq8mOP%8<Z?9nQegtkJuG!Ca
zZ@dJ7;+B`Yuir|p;l3?}-kzh=W1@iIQwDeg3Lq00ziK6afiV`78vTnJgC$ZX0uLj!
zk2HCp{d>@~7vwq4^c}S8!6X7tijMoa#}v&_7w&U5TZwgMu6*g7r5^u}p@ABGc6%3R
za%ZK1lt6fibbjAF$7SEWx>6wRrr{o<hZ*M+tdC#ZFf~0oscK@;&VE*HKu92zQTf;^
zbPiWV{)Wi6_+L^E`CX_XjAF)r7u1)=j^r85I_;~w65BKy11NZ_HjCDS<sc8mex6$)
z<3ms6$;Oz!+i2_kpuaP(H;CWqiq^%lL&S5d6_cLTg>q|_L9eQgck^j}F7m`4P}#t)
zD5q|8H-DMBm{Mhh5K6c`ej)BW+`}w<;C3@7UTk=y9Ep2cCs)yF`OWwD#D8S#*Kg=>
z3aA@ryXQFT(thuU&E~%u4aELlC2Cf7dorAP-Vbfy)R8a+!k0qKM5p~OfByGg5+R%Z
z^CNK1%k-Pu`%bKN?!9C#h;;blJmH%6<LVSfVcPqw{B77?%dvM+fjjp!Yx>F5J{;ZD
z<TVxcX=QyrMV1O7&_V2~clCwP@hUo^YLa8oP)!0`Oc!@z0Xn~;{zOM3dl@^zesi|T
z>b}%kU>hfjI`oO1GK%jrk_>F)PHku0lG8QWE4CbGM0)ZqfxR~=Ar~J)#AnVFsO(+5
z@XcX)P%Dr=Ye64`*W#$Vp=mfxQio#<FFxphjZd;CYcqfpZ>Z~oy)HClU{Yj-hmk>|
zD(b>cLP8xp0_`&vUtYB)?eB6l#Ii><kcfoV!RroW)nG~`#)OPOxagf9p97ayXD^UB
zQW$giuWbe+;YTGGlf4zz+!k+<*^5x6xdp+$j|BptW$dKH6X7G=FP_1a{&G^0(|a|E
z7_jj^N7Wyl`!%#=zPBN!<~|MzZ|?>lFUwOE&o5Cb9q*5~g5o`XpB-{9)K!F;Q{cs*
z_q7#xa>XS@E5Nia)vBG}0C-elnB`v{N%x1?JYDzI=<=j^RC=fcN6AyB&{kFo!i*&r
zRCw7OKD)JKb!TLac*=^l`6T9ci_8+5F*|Nod;k68(!7`R%^t9fSb0^V5Wq9I*l0DL
z__xa2Tzz?Ye0H&7B!R{fx7uymFIAfN@jPc<IV?8?fgWh9x7j+q6IQ11ThRxIpsg+<
z?{T{OY@zQS%X5^If$F)Aen}EZT}OF9nIKFlDG_nqe=IV8*qt(tcH@_ag374x8)E~?
zBpTUiy1znv2I)qXNnt|pBIe1+cyrY>Ft&2Ps<f-pEzYdOFBmdc{MaAUho<(jyWnx|
zI6!1BPd@x^*^<3>gp%V6UhR3B%n`^ufXjy}Zsv<jmL6(p^lkP#f6+U)4c`z&`*ZAA
zGtKD?&d1YOaG9$di3K|y723NK`piu)wpLT6H*fQYL2p03c!8j+5$#Y>%PGcl1I`c>
zr655fCWH7lAt%1me$C(3IzN!{jFCVA>B8~464e=KOCa4Zm>2CtTI&CFM{su~#pra{
zEyTF^UYk@l<6ayE4VF-hZ8&pt#+<sxgFi2jL4c&C{Ovi-Cm1#d(X`46SXGq}0*rO2
zqVZa4Bq?bd9Z>Qgd}{Memtr!jsTx&=6avqg1t%atWohV;sM*e&<as?WX=*jPAIAK)
zLuI3hyJ|k9aoZB`sPWKI65*o1)o62=AKXKxC^sJa=?4l-8p^dF_WU;DUT{-U=2z{y
zL-}s|J<B)A3al7VKT+?oOg-g?5$kB_$-sL)OcuvXGU|M*fdj?$6m)o(R+RAR_mr@i
zo67Jn3wC=ga@w~)#%{~;7dO4cT)rVpb)mv1bP6E|y`CHBIsM6Vwf{9lY*&CjePb+z
zL9+VBJqg}KtHd#)IuU~YizSejlYlSY{Ku&oljhw(1btLhTFq7NDBHRn78LngQQA}t
z?AZm8x6E;_=XfyA0E^oYc2yZ3PJ=Rn1rcDupr^-6N2JH=nP-W)ScsDV`T-`DsPVX*
zG$Df(TB`P|A=4#1zqG|;%NI;_%WeK5=64swvCZdxfzr+2<aKUuFBguZD}vGAN>WcT
zUQbOz`)=bJ=kZ+RE0Ul=1SJCFgi4~*UI>Th=$d`Y*6)g{^%NdR9!z)B4>QGK^heus
zMp>Kd$oDNll$CK@8Sq{neS=YJ3P3{I^QcNHP4AK}<_ZSAmsJ%=^JuZ!ZvQdvWM`j<
zuoZ<#?WHPrdC$%i)H&sglI<RS<P@gm^~~F+!j)Of&Y;DvL7-v)D>Br0GBnEnHVO$H
zPci!Oe9}W6mfMZu(|!g~BE?E66fly3jFGpGAXz^=11@7@tSXlGyc<isIP!OcLj9gp
z@cD7tmOt=&&FfCF?4oi)mI5C3R-+$ju_}7DM!9oLdNPXYTfzz$%%qhn!O6+axu6#O
zQy^~G8rIAMbMWX|HTdTwvTI=$zKPb>*483%M4NpweYFolNCQ7pkx}mgma&huxzou+
zzed-`+Tnd=DWL-r=pT<Y9-HNQDsuEOfb+=NBz&3Vak4fSnPzUMOs2n=B+_bkUhR;W
zTy>hHPvoTWHUWV~zf)R0N>)RG!u=j6lmz!dK$YKaOP3*qb~ig}+Fn_hMydI)CJeto
zQ0cqwX%OqV>=nnwcwTf8chx;gfKcD=u&LjKm0#->2NET2Xkw38zu-$?$VzKcWZzC*
z5J?rt#kkf}q%{73C*6ruB>8)Je7Zfmx~ZtKmq}IKdUH@OxnkEWN$^QUS(?}rICrz}
zT9h6$mn%)yC3T!@U9+;cxsUX3kxf@$=Tcu@s3y!>aA_<lF?3!(`cg`SF-s?~-8i3*
z*l5DDRaogrN1J$N?3HOLC3QVcBsf1Os{lcE)Ses5!YGEBH;kQX!aP53Mc3Dak;0d_
zo5T;XiZ3e4F<V;6B6Ur_g-W(O$5LGy2=IZtd{XL%r(IHx%SDb7O=>t5$-RSuets#%
zL|^WDZRvSG{vh()q-b(DZN5kOxMW5o6j5uM%HiKptgR<w4<BA7j%l*pB#NWN5OdpR
z(g@Xih4^Ts{o;%#sNW%wA>E$SfS)Jw5_>K;S?IP$N$9!q2Qydp(cUa%00PqsI$)af
zJo{_&VQt%yo$kZz35vb~HIM`MGk;7|nfEGue%)<=(`NNpwpdB)T1~P(O*um{G8&1S
zT(v+o6+>`Y4J2eT@x{ao4@5D@JgPtXB_2bNQ`@JWnub<jKUz8Bn3T@bWH2tEes{SE
zgH%-6Cz4v!G;YAPx-w)+tX$Ug^2#g$bwrhyL=0t;+y3&Ty0ZEc>}wFOhN+l^^682R
zU$cTtj&)iq>)FjhCH*aaVciPu@RSp;`GY_RzwlX;N%Tq2U=%dhSSTa^IuF_2uxu{3
zqxwt@i3nf0+rz-NZX0>k3Cul1iU}ns(m=Hxy%b~ILuvolW6bGwC|gQXICSuem93O2
zK+g!L8P!)Jo+ukWK!_yMPL>WH3s$^M2dXIwQEm7gjr<P|BZyYnzNyQ)l%zb=s2KLu
zPi<asdyCCgxA0}GjddckptqguJMGcI*i0Veh1BsRB&!o+B1B5ELgn)svYs`k3$o~<
zGMUoL>n7OuhqDzVNcmeaIj!==w|?hp)(~Y8_>pG(qGTR{yKYI<R0}mO_B&D~%+IcF
z4`=@_?5itXws|z%5RzMWMWmWf*zS4j$Rp{4zC<WTD94d`@(oF(5~4;q134oVmHh_<
z&hsU5I?Xn;-Eyw39x@s|0+6Q>wwvvXzQ4UoTH}UN_$BHqK0f((&<A0OmDGzu`3;^a
zUyUdWus__1_vObkj8Y1}B*h8Zt*^jB&sn<e7Dd416;Ooz%%3Fe`XauF#f^8=+0w#^
z6;-TE3%Yvp$yY1`5RmsZt;zvS4w?!@BdY(^0LV2vIXi<62n`JdppVh`oKxpRhW?*o
zrw5fTI*#1^{dZYHDV2e2d~~jt>{~3|+p78+y2>SWtR}T7qrGYjv>FLz6K%As0IlA&
z%cR>TPqGxe`3=Pzi#(s#>m^2=@0gh3kE`Z+a@kyU;g<rsXd7Ewt81#Lm}Ci(=H})!
z7*<wRH(p(!c==KQIlyVNGBY!S`Z;WK_@Ow_lwKf%&AZ2t@9)jQxW;cy2vEMF<nld$
zYqj6*_647<!V&w_uCI5<<a%GM&h8C)cNJ^g$d{@xci$O32_*(mPGy|)uLFp2Vca(h
zhQ$6D_`fD88rL5C6=MO58Nzwga2YBUC-+_m#hRbQnr$}^QD7*gmN;xr{8Z{JWI_3=
z*B;)+<!cVVP$Q!WdDVr&A-whNRa8`Xa<CRMq9_d{rAp?;)qUy>Z^4ZfY9ZeX@lHQy
zv|WZ-FV#FgHUOKn?l2Rei2)QQJZ#V~vA>Us$`?>$OAE7JyUSoCCNeT|wH_-4KN~d4
z=o7a7)linbQaSs<FOTGgDS?iO{<Wo!zMo1u(2~xsm-@?_%zW>qdQoI$Kz{vcMMa5n
zxh4aEzjb{>Zt>t(Rx6%9ITIprUkwl?JGk|dUL#v?w!MW5s%JQD-&*6TE-o(KX9Iik
z`zpba>|`JP8Yz*>0tt0)0l2iYl{#P;B7}$>IP2QVU~P5C`s6s@7d%z<&lCdxS7&qZ
zg{=|pdOUT!<bJci^tir1C~vfqMSUUT_f1d`SRV=V_B;Zxoe;eU)Y&t@p*G4l4vrj$
zJ_H#6IMHOKCPm^HHV;2qoaTFfGv1?pI7DEGx<^KDHEx%N>R=kb`#`5JR$UIS`G$Yz
z=|qLnK1KI4kc=%-LEznF9c&vYB&m+E@AKN~Xgm~68|HXNC(XB`$XVRd(o$bPXBV}9
z@$WuVBp+B4*VfjY>>BJ>^&a{bqp*PMW$X2(YW;KWzUQ`ba>Ez$Rf4Z+Ju;WH3h3o`
zh&A0wvXv@S(K&41+G<=FF_gKlN7iq%kAJEAVPq2lG_xX&Nq%@dFe?;k78V!p#fas-
ztEKwT+yb|GTPzAsNpK51`0EQKF-e)z1<>;h91EKHC>1Gi5;0LAghT{%di)ko7G;-X
z)V`xt(9y^7JX=unU7h`NDoezT8iZc|A@z<_*WTXV)zzg-VriepHm=xL<$Q>gMrCK8
zqt;}dI}dM>(e0M*Y@@~<(;>U%by?`a+BO}WsuIhs+UV1I*s%3JB9yW+(=>tY!*z~M
zgS+9Z<#T!Yas4pNohsQb4*KM9xO$}Tde1rDNny<G<&FFFhmxW_kvWoVv>pR~<rOs-
z;&*tP<K9r!dP}GXX1$FnRY|g!uYj1+S&<1VORZB(xhmZ-L7j?DsuGz<+gL(HNr|aU
zD&b2Px0?KZ@TlA!V~6!@BAB7Oz;?7RrJ*|1`%>@Q(TUjYpN(S6_rA;X^{u4^m*0-b
zB~OSApX~&@uXTVtWJEpj?fMR)0Q$og<}re$4U^eEQ!W3j4h*jP{`38BQ|@a{-KG$F
z{5`H|=#2Pl&5lEHTps?{M?KqmZ9WH?XgnGKoEdz+&dbAdCN2dS5C$xK4y%P+&g^c6
zn_a}|xU8?Mr?)B4i7s?aF2~~sP!TZHQwR}EI7ng?5z^?_o~*(761YMpjK&kE_oMYj
zPjv94$;$DVFR${;3#9tyPw6|ahtp46i|2^gj5eJ2<v${^CONyCC+(}W-IfbXow1lQ
zRbXbC_p8Bl{ip$^<Ldfd7PCGUI`uQVY@lEEtMy<oSd6|#ztO^PJu!s-1?034S?358
zQ5e=AykFKnr+n93WiD*0=^|Vs(&RQEa2s9g=62RTV$R+MTg^Wlw(uCV%_qDN*q6SF
zJ5D@BxzWZCpd*MPh5g)}F8rL~x<J|>{!f?9Y+|L`_l3Tu)9Lkk7?I)l-#?Fo6b;ai
zzF-9J6^Cc^(YB-97MmyUM2duhZwQcdMANTN=E%>YPO&g2Mx*fo!OGHQWac-grnH<q
zGD`c&72Mi%U#R3&IjRKFDU-ER$&I6(?P_j`KZOtwD{C+E5rv(^2;?#6$YWn8fP{E*
zz)wC0+m@%VVo_#{TCEPFi&2Ly%~iUv<Ef0gW_gRumR(*6=`g@6OFY)y!kp}r1~eFt
zW2Vm4&BtojDuJGbzI#hr&TATAVU<Hg@T3zH)brYUruLD6q22PDDh$ZiI!$;UGsMl(
zndheRbBl^!q32$Q2m7<{mL$X0I&pb5feD}flakKfP)ruTH#icL{vBYt2aAvnX|h^k
zxcOXmJ!EEP0*ebcd8ZNkMms2Wt^MEJI8)nMJ*xscmpLzKFzT*0ML(^06{B>0`oNhy
zrBDKIO}1o!?56v6leOS^oVckLl@Ql%@X}If=<{zw)gJ_aKXaxCO^fkKj4a{#`I$^(
zYkeL66LKx2<7wS(7LmnePzAU-yJhJj$U>)W;&E$vYssV)$tee;Iqz3Zm+cfo$K2$a
z=BwfMR<~B{%|D$Eq(j}=Oy@Bq--||>K=PwadHKRtlVR~;;|s_PF1x!I;;N_RtjiqV
zHC^uxfcn6IA{3KC4Xk<&z$`dftP~U3EmJC_l1;w?NJz!X<>tAbW?P+}gLNip$faGF
zvalf(9Yd?1Q{x5(6AdBJjpCKuNJg>Z$V%0!9H76hx^Md~`8``wpeLE)f|h^l6;_=5
zn=O>d<*%|LE$vs=(6C>rB_;T*BQ6ztogiOoT&F4Zsc%0nwb$p5c8%WB7EjM7&@bOr
zVEk&`_JF|x0dy8RPM7t-gs-f}Y_)~5hP8Y*X~4dTh4mdL(wyV*S5n(Xm(Z}fFkP9p
z;O=f{lCRT?+?JQ$t5d9X<mC24;dL0QP*|#Zv)S95?)16KhQd3sa&vL%xt@xQy~qI=
zkSoau{dw!NfT_<shXXp->oCJS^2ewhuDk)!)1L2x!2QDZAVm{b6AZ{a+i__bTUYNe
z8ut?=MPF~!w{~TC`LoUR`F#Dn7D04m4d^I>A9=pur@MLA1Pj?jiordd1~*2?SR($C
zM^EDjQR9Z7?t<iR?CdtH^@Gxsbsei>B1Yf8f6tJjP?NKb!eYYEHUbP?6J&2T{UNhX
zqs0z-R8(0eoBvdwH#QSgI-9?rip~WR;V-Kx%-c)!Fw4xID{r~xyql(KTjRZCTba~@
zY1YacCUSGCb*uBa?tvfsw{CR?Mdu^`8}EB8?ty^UXFkpQK3l4<`|>o@lxIH?Eflv)
zKj!@T=NcUa2M5RP;UxV}$__s+-}17m;+jrA%e*%qKYu9_DaxdpuJ;=Haj3*sE!O<x
z_xl?EH(-X?4BB~8XU`LCG%ve8<i^K)JZ!o%>vw9VgGF);o)2GdnI~7>Pr=~XNn~Y&
z!I(V1b|$<iB`Nj!a!q!pJ_Ks4)lA3kuCCiFOJhXaA1RXM)z!^uk`aSOV$wx6o9(U>
z=`0ufKTwiciRJt$n$LpbmRf9&;|73pcwk%T(fh8#h~neuc~|@Z$UB+I@9|#xd%Q=$
zA^%hM_VR*GC2$%cZ7`d3%G(T}_@H$;TiMdw>Qj&7znO_d(V&w)_6({hK}qL0?L=gv
zJF0b#<16Y@uiq=lvU9qX6vwh5SQW{eUMG%F(@@9Q_8m(eJzer$B94J1t*Y9K63ls*
z{GHFLXcFYW#ZdoweSQ6044+yy{V$g7E2NAmm&;9E7>XC@D6U=D0>Lm1=ycP=iHwUc
zxX&s=G#VOt{(nNS^*xj_sCUCV&%#c18<lE-q|_GB)s>TO?D=BK&iQ!`=AQrtYy*;T
z*$h_C+f>HnnO$cEJ@ac1pS1<_TNP<bTU*-<t+47=)@Ws5AKABhF$NDW@t53;s8t|w
zlOcI7GEz~&zbL=CodPEYe;u;8g7x7}LOYAj)bbG-F>QIxc+i)<`i#55<kL6(ahOE3
zKenX`tz<>Vze@!pVZPN05D1whU_9U5N${h`I;Batn5ISRYk*M+>v;t|zY33=80+G?
zS(a4-S?fToLGkk(c0^!q?$+90a49{Y7;sw4h%e)mb6zdRs;ieBxDUxMjZjrteQ~xm
z%1x|$;b`w~vR7iu-{o5=VC&qmnPP~Yx11#CMN8`McgWb{>~^HG!e-Myhp5xW+G%D<
zdi~s4D8bR>?p8dfttY2OyX`IRlH>YtcPyL7Z*0JMIF^!t-_B5DG4u!SOhIqUs6`-T
zGnPDf<#1GeR^0p809!t^IBon=T>7}IWT^XnWQmY4Wk<1<OqH)E*b(rep2_PR#LDvP
zQ=yPv$i%8!l|{wbQAbjoL<{DKT=_HZC41#4aqSpzXTWMHJHR_jTl~kH-NaJA=LbkA
zQAqO>!GKiNjI%2<v7#v1^-vz)jKw+HLIEPC4|j-k2d?CeVV|7j2274V6?kSX^F+H$
zo+7DSl?O|~aY|JU3KS=iuX;n{#HEXN^#bRjsiEt55Cu!2x^`aEb3ihx`r)c%5|<dT
zZJ!?kv@HMuHcQz5fw2F3^|RgmcEUfq7R3K}{yR+oJ|TGDCm-CS*D(Od3joR^*p?`@
zlJ%dm$(3J-nd1KwEU7*_#v09qpm3{o$T{z4UZQKW)A;Z8ex}HRGlVqYI@Mn+iT`99
zfX5xg6UjS)0j7BlJlA?NsO|ztF%$s53aA5#nyz{Th6cg~0-4G$Gc<hBzv1m26Y2l;
zeW_6d;F(5|b)bnfx;U+N*xT!VXchIKfaoeKsAV%*Uw(bZtl19v^1m83O8(9k<s@~C
z6G~{FUhcks?g3};xV}Cj{Q2<}D@s1E?!!2aukpDb<uKPp`?SbckKuos5(I$j5#{8M
zYc>8nDVDGqLPqRY`&wV~E@5x5UDAv^zO6OHz1{3e4|;rkPs{ax9#Hu+i2mOf#-UHO
zrJM-;*>4M{wSzmCR#J)J)b~EvxMjY3h617{RI=F{8+_7<MVbuKv<K0Ij{CDU-LKOw
ztQU<Bh=Mj(^6y|o?kb&2UJs}KKPWceIKK)C>SnGx4f)!FKr`T8$E{K1t<mAPX?2gC
zu%YfHTAMIBHzwel4`fV|S0+)c?47*Lm$S&}xBcDc_G#;fqd>O!obOM8FM#)C_ouC*
zf}fv1KQc1qvWuKI4M?OrImxQOe?<InzLfwY+xalRX_-GaOx-ab9X9fD+#mW<`M<yf
zEYZK;FRa#n#P~mh(~XvOZgl_aqclXBUVXAbpnb@a<B{`ftZi(bP3|kw-k;8Hrx^fA
z8E(Xw-+H&#TIP8z<+k7RO^-|D!>IG@$6ved>ZqAp&(7+n{BM}IJB&}r<GS?0Fep3!
z`&?{P5hOLL_q`kK4l(#ZN&oFk1p&XeMUAB@J>v%h1ozbGOTm+W#`JWRMzfOnVQlx$
zI;C4al?br5D6g;m_%(tx8}t@WW2^J;uV-`hfQ-PA6ENVqe`$&k`a7F0<5DI!U#?8K
z5Q1=w0V=1anwqPc8V8wtM*SrO9I>*M>3otxPcL-Pq=FzqTHcJ&$9<sz0R<nKfxj<K
zb<1Phf0Kb3F&@ATIq_3=>=_CHA3!lTjl=u2Fn@B24^KKR_%IQSkR<Ttf(%k!Ubq9_
z4eee3_^P@;O5poO=<ajx-#qmO4qdOw@^bb<TG88m*?!!*p^q$oc`KF2>*c`aPy25^
z9I#4c-%9G@wri3)QYvMTH_NBD?!Fx~m=S+<yb*}pg$PJe;D1X=(~lM>3y$Y}f7AAT
z%dDP?EuS~TXpqtFcKVk6aHH(ubWiy3IxSS~dONS+$9LP#kiKeu!u|q#y3{){uM@iW
z|4oi415c{8kZK(pt;meMEqnC!wD&traizesgZYCzv`|3%^APRJ+1|AWC_p(=mO@pH
z|L<RJv0F*)npV$4W~R>1Os`|<5W0tmf_(ql%TYeA|DAo8OMjnb?tT{3fdKuzU$4<|
z{^Kcu(*OVMm+aRtol@?Le*U~3R+%;)X0nRUb-dtt?DCw`vd!)Wm)`wxHa1pKadJ{;
ztTSizoIF1r-xY`sm+3tpGtbmvCv3fi0&Et?@anYfGM{t95$wGGwzB0yLkY&d=PB3+
zpT=5W$=hA&w>`)DzfF&t=8Xd;=ZW=%M}+omKJUHJVMpXNZ0wE6^0VFgsoinN@JC~m
zx8gE@1yECyD^{-4{9RdjdeL#I-|68fAraQJD)@1~bbO?%{HjQlVe@P=={)_q7tbB0
zkj+P#BJ101C#T@<u5w$}WGx_Ib`epPR9ew)&Cm{5KJQ=x=YJCcMLO!k(|%yKWeHX?
z@$CT7MaPYza>VY%=ZpH5Twg0GgK2rGRBJ1%z`61FJ$%*c4x0a2Q_E0zGHogQHX%SM
z=Q~Ce5dmsJ84|)hq1)ZH1fe%%F$kVO_^9lpj14&91jZ%*XP_U|PqM5N&R9@jNve$T
zbXOeyJ3zo=7_E9g9s8>7^B1<S4ftpS3o-M2$&#g1z%(;S{R1qpkCfTO4fgStn~cWV
zpcS?T`HAWO<SSagbTg;JUrH`1ceG_P2_hTWD~7aJUmB6j${Ch8Ot}K*53%6{Xxz)L
zZ*Q2D8-_=b^c~ntXCsF1V!B+oufKCZM+BfxJnLu-B!2?i{T5v+UJ<xR2lnpI&xQJM
z8oEiyjAhMvj0xmO+AbO|+sUVa>Y_@HLZUicLkTE!ZY(ZRjyp}^VfDd?II*M`DVN(6
zLZK-&L)8aDjG%G<nnb5X!5jLvtmioES(u4GE}Bra?)G||K;3L}iI;kzsOE|d6%l|6
zOmR5?R=Mmt1=v6<?SpK#sr0G2V~n32;?=;aMfw;B3V`)Ph5TnU`nQqz=Z+1wTLh9P
zC4W2{d&b+%B%++0fzK3f5>>4KOU{7=p`)gw3L09T|4y-rg1~iO!{Mga(IrNl`@aXX
z;ZZ#Vip&xqmZ_#Tf6Q*okRu<(oLPOEnJQm88}rX~Fl94}6xL6Z3Lc$g2`QtsWb_xt
zueT1QABuWQ_SyIhf_Mw+T3(9Fjgg915tJVuR|%AbnRtMUh{}Q<v7g;hQSk|+?$>(K
z;{T`u+^%jbS6Xh&=74~suG6%^eklCaz%D0KIv*hlgf0KI6UB%d1IN>{^Qv<5N!MJE
z&SC$d$-kwf!O%emppvA+P*+>BN|KDaHm{TaY|C9@SM!KE7y1b=Hi0B3_i%Sd;Pe+_
zGA5>;!QI`x=jvweLGU$wZbBfs4&XotIuG5k6lU2!zqg3TSY2FPEG^vCa<#X2bhvkk
zkp+mVEt;^dZg1CA9Ov-5gYUqsL+l(?$6gFr2fy0-rvRFLhp7nC#IIcg2<p&~U8B*N
zXyAIWUZ=;kg5S-T*)g2kXdb${^GQHQX7HRAkTYUCu>a^7I1dht3{xAWAUQ*aOb(#<
z3ys7E)158E3UB`6*Kp)PYRkc--6#pG)0tFJK~Pk&uy(mw>!3<PpG#L76m`c*TWGp$
z&*!vU8)lH}{l|L{2Ia1H5i`cz=OEfedU89K%kiDEUx!l4%l)ZCg4kD;FV&$t`iwkY
zIgMUwuH&-Xd1WW8($Y1+e(oxYVZ5j7=mU^ad+y%eVm?jzgs@WmXIEC&nc@LKS$c4H
z`>8qHp*iT-C@lo@XLv=06NTXWbqtY#!+7(#`^MwEP(j*0zuWHJ5z)(F*A(-StKSYU
zxD6q!)N7QwQed1UOl}ju;k2{OM0g19m+S5dCcR*|TWMO)o8cBL1!6(uUef9ukK;rn
zCb6jd$tB}U8P2LI`hIB8<CgtU(FNh`IFmqmdHz#s-aCP+qGSLFMhGp-YEGA_BPE0k
z04QrU+hp{@OX!b#xvAoiMY9ZDA7<Ilp>1is`$<R~p~7_ms}QTx&*n5-2)2a4f(poK
zz1}H(A5sPKWJ#_mRok!4g9NsT-mN#6kPy;L(3}LTGug(MQ}3?U-zZ+56#TpzsP3H?
z(9+M{P&fWb<3~y+vb&zB=1sdVs%a=mQ%a2yql4=SRTXu@xlG4Q2KU~s3K#pGXfJFQ
z#I!WTv1D$>Z%xV{qcf*GpJXh~An}^wtKEmt894tDvS3&LK-JV}?);ddo9RN9YvL(F
z1uk@p1G_>k8dl%uJInc!|Khq0=F{)~AD15oKcwu$XwaI9Ew#xKxBwP6r;UyC;wBSn
z+OiX=TNzCsOPHY$TRMjX)E7u@rul3^#7w?JD(Mskm`KcnJ%o~n24M}{Q53jh%-~0)
z8s-wNI3qh58wYzrh=BXNX5YPvn(gPLbxeSljW!bvCC=$40~-Bri~Ig`q>#Z{3>;=$
zKD_vJFY9}sryIxCO^Y}wZjX@XC-PY>lr84{h9PUSFQ@m0ANYAnLR-*{#)xSndbM5$
zZL9Q>y#IAAq?SU4I~`B$)5!k>;!52B9_O#Tln@26b98I_-NGf@>8>9TFuC)Pb$`^O
zNQxS|UgG=BNm-N+!VQ16ZJ~X~F-GCL3h4J3Z#H#CM=x&@`~DrOU_IqO<uxG&lQfM3
zk@%wqcDHBvZ1{_x>~kPOIQc<+xL#?5kI!UAi8<bXAZH%|e&xY0_>xdnXLvL`iN&LB
zBJB^K<3Le0HKnJ~ijN}8%*|~(Vo6}fJXL_6W&xn@`Sls#h5MOEQ!ODu@RA6w**EKQ
zNd#=g;SupHF!cb!(Xm-3lA7(vcBFs?f)`M@+kNDw=_{1S*6>?Cc#jyUmC!9T5$Z=d
zkDy|==4;yo)+q1kbsJ_o6I>keeDeJ#DyeSsj>kmqRM)xf|Nc-w<>$1g#`e?8tl#T!
zPy@x#R9-g_vF@@GL&&}sSyU60IrE<f4WZW_B?JU5o{9YDt+e&E!E>@MVb|+G<tve{
z8cfWOD)X%-H0q!X7PkFz5L2zx`)Bl`x)6AX7mge#{!?Ps=r<IfS+1A!wXvj-(FfDf
zUPBZq(2|@#A`F>Lj1fls%8TqbE{dlu0{WbN<k(IIpTwUC)(K0&ZNm-kOy6H*3`Jh&
z00^8-&TciY{rlE~zx*GwWFd&pb|lX;;K4<oAYnApdf%`4r?!B8N!KSC8p@x0=xwLF
zdKc&CjOJqslBxPMB2oypet`a52&hC7XN9Dot>|mM-!WJWaqzmvpj9&a87Kk;8f+O@
zi%gONnOzh@NrFCqJz$H_bt(6)E*M7&HN0e+9{_EIqAA@hVKLeeeQofopgdp@)Q0{F
z8%epqya}MSc8dVG7Mwyopjg*_zH|!u3&_=V?3D15j735e(nBQ!A!NC%Z|56r^IPc#
zjdj4vI#(nG9Dj^*$^o1QUkspO(i{-s2P$-o(y7AB1{W{&UmD0>>WkDR-^^efG6nxR
zzJ+F8(75#m+iiCRSpL*1Gd-a*m!Tj1&2~d!j0Qc@h=KIsT4z#Q4@_xp=fj1Cg_S&G
zx|Cgl0WUH#s@57HR`fg#9lzqquuS&fuTvFu6z}8ulF$u12{Y3}X|-U%{)x*h#gY9z
zI9dgoMJC@IZ8P}4yFu1nUSQp(m5uqaSkZ>(@H#)$Zarn8`v&;>@Z4?X_L0IQKnzcs
z*7f)|*&MJ1QG`ar-6P<3lBG}vEG7567HdkhXaV4^gJZ$j++jF$|M|aTTh#RwGOQ_>
zQp>KNH~P>;0#FkpZmGE=qAfn?c}M8hss8HHzz;9VG%RrN7)u#`{}f6O(Y@l<9D^ZN
zf}TL3v7FNAIN7K^#eGy!aoj$|Wy~W(rIKxWGJ3>3ARpry>07cx)&dOMRb|}jleoKB
zqV+SBM|jF;w%bkEsRmZYucrooH`LKrZlX0yB9hE#6HSf$oYiGRZrJKSb6vThzA$18
z6G)c}{<S8W$BDRKTv}-BFQG_vh=mlx+2ff9w!f-!Y8?Ahi-irW>xlT}{q7Nm(C`pt
z94w=}m++VnuVk3tgS+;5!aSJKSyF{5;i2PO=d*0M&F^ph&jd}@q5<p+zCt`}P6nGV
zSv2~KHic1zg^v2b%1C#}%%>*TMHO?|DYEJbM#9PP#35lhy~Ty&Bm!62geKWBH02?p
zdNMW>e*R5j-^P;#6$Q-kmR44V_@wWuWAe-owOtK;u?HYY%p!DhkSL^($iJCI)2H>b
z`Y*_KS^OtPkv0wV%&_q)B+wbre|KbeGT{Qk*Bq)rpkB`A&KHkXaFUv}YxTMs9n7ax
z35xIhIFFF4{}TFr-!9)!xT<R4wS@M|mJs<CK3=xr&Z^{PjFAa)vYC55nd5e=s;l{(
zHg6_hCeAKST*D@>lnsA=xPTLo5W6VH@*Smi63-AdCeyi%Uk9#ZCgog_kp+4TlrWS%
zQX#&-M<5Lg!#ckHd1Id&-ahq0fpC#iNgCann#v_SUthM@eb}kcESjEnA)coY9%+Yk
zxEP)e>gZL#U4C-=wI-H;h7Pgg6sX}TIS7RcpGHANJIS~wpW%KYFb|FrBddFVcOjc?
zc4M4(ox-72SdI^*p<-QOe29;ExI)}YSr(#<7^^?K1>&!<+va1}*tsp&NeWwj&re&E
zS&*`~EL3gxjJmjgG1ibj6Co5*WUbY&c6>i`fG!v(+C|Lu-Dzt;Nnflp9Us2zIy#)_
zU?tg!b{x8M;o00KwzY>7p|iGP>ICyz3uw08?F=`Wbp9+yZw(s5#FlX@B~5HH12jN!
z*(0H?ta@C}{bMbyG&`J3x2JN#FZO3s@+$%!r*hWSs|hw29A+PS<gBcX>%%%eduYH0
zQdT47asT)H5T0<71<nF~BuF;V^4IQMjb3iJsGFNx`{w!Bm2_i+%H?U+L(}+tU}O=6
zbBlzoW1R^~FS-?*f<qY_pNNYV5C$-}8a1gfX(HCp#Z9&trI4aJ%JnwWRgXv2pa*8`
zg$SCA#Sp>h$G5M}!4`?;s^gELYyZd9IYmj*1zWh<m}%R#ZA{y?ZQJgiwrv~Jnzn75
z)3(i9|9!hRAF67tddZb1Gx9{lj{Q}-Fl$<{$XT{GkgIO=PMu4rE*Do?VY#kEx|;$t
zl=O9%SRI{2p7Ny~+JNNM22tFK8lqlk0H{;k^&c*%p`tmXEJc_u{&<szH$Z?ivzPDY
zzGzE8AW%lB!peO<3uY7<*QNq2wq0n|^IoPlZV_2oD^P;U+(lzAUEEU-wIu&X`bb7=
zZon47ga9y#ExC-b`~VzepGQY@N@*sNN?E!Q*9Bvdp79bY2~iTo9tP{IoexS&ER-J&
z4x6M`9LB8=){j&wmjVLJx7v5B>e~N%dkWV}!yY93L@#J9Zi>cIl@KQZT5A%UM?ygW
z-J>?9grH7t14_}U#>o{97ANR=Zcd6sC(3}2;tNI(^ox(4XaePw?r*FFNBWzi*(5n`
z;Plw{>#Xp^*Q<OSZIV*&{`fW%UE(1yBT%<n!`;KC+n`k}llc#B0RW<KA^tZ${^^C8
zVv}&{N%o`#)YTDVQZ@zR*Q%UjHz|~;X@b2P2m>#<7+i>wYm8NE<?Lau+v_0|zV8DG
z&{=2>hC;{V<F-g!yXUKj;BjQ%Qg$Ma(JcG>B+j3A_ho;-V)1;2*Lj~Tt@CYBxj)%4
z?-QSLYN2%Md#SFoFaKo$<>xf;XJ(l!O}Dx$Wx40arf+d=a@n;G)?Z7VCvJ#PiQGU}
z?zDsTb!<&)2`tAr3~1B9{7_<6B;_~n5|PP%WIj|eNhAKeeI(4|_sPu1VQGfXPkVo0
zeYKGH{-j9Rd^&n?|JH=L#<H@sM1>95hf+~p0_wZq0COe{9X$dGax8Wtkxn8xKq~04
za)k(Y%_;Z3jyY|O<(Lb1f*ge?i7~hFUO<G4){?7Q>(5FW;WXi%H&p=VBZa^%WN@y*
zO;g^-AdnT9C}M48t(17dkEt#t@1~2z6q4FFiR9dz1%f019U|#uN~oZzt80N%;!g1c
zylp4letgc43=0Y%LBTfs5Ge&FJ5N=_cdd1t?V|Lja4%Q?Gg3(l4Hm+;n<LNPZ~OH)
z&t+M&j{ozaj==XJ$N%$uc0U#@KwjYOWIONsgCmX)5^${Vd1wgKiJZ6e`0gyo3w$06
z^t^65i|6{iQDNwk!gpMxsHcAXL(mg#JDl<VvRSGeV=)8tw#V_ee`5f9OS}Rfz_43@
z2<Yr^Ic0g?A$WK#KL|^WN&dKf-}!#aafhWHW7YGv?b3<%g;P;ihXUmx<r;KR@_0((
zeA2KTPyTq?uBt`W?>t`))yX`U&cD-<^CsnHQEp;d2;khUCGV{`P$V5Xr)z>S<&F?l
zMUg00A)gSDBcmm}6?=nr5`PbO#E%l;JO;_DBSwUN{fwjq>pgMY54mN!>;;?QJ4$C^
zXg_JFs>^l08%xXe*wfeZI(_c>dKAF-Yb^jK;PaX2vZQitCxsmPUZ=UDQF46OozivP
zUK^#dbpoHP0Py~Q_i<cDSppyb9D&e-t)1_f^SbNn%g<%5<MMX=yVpu#qG_&HL1rT*
z*-?Vpt|y$HuVy^aO6gG1Q9XOX0xD`p(59PYWtPwX*nvQ{K`%riL$KmrBJ4mI@tTGZ
zl&tw0!g$3&31{I79H77<9cW`k9n>5W><c^tZezgBNiagG$|C^+Uz6)XY1mwmGVr96
zmHtIy2s#Z~mVxwse?0qJw|{LG#o28%RoE?-O90ix3<CEuQmX#$8@2$4%?$IuHTu9>
z+(mQCR_Zcq6uPtNfk<IfMPdK;yow@G3X(p?gQp608*G0{;2DZ~*!FKVd2W?&yz*cD
zFmT{PUxN9g?34S4f$@)JR|sA**Wq@VRDk?2>H`rSBd;q_q`T|mT%Naw1q>bct>Eu_
z0dC{y`vG|_G7ZJs$)Y%|EKgLjgJ*SB_25&`J8G%f<9knDK(8$CEY`hu7g3)4OBCxC
zXU@z%OeTJ28NS!a5JhgQ-CW^_p8w|*hW^J0!B_A7vXi4J<`52S&f7l0hW62x(}Z)&
zX5r92nOm}{K4CFg5%ZnUjF@JN9WXv|{SEIL>afdshX$7M0ldjmYjT62%EEm};DVYJ
z74YxDeZ*O(DNCD4MBN&c+3=yRb^36jj|!X%R|ut5)_C;Tf~m!EsSE;7$;v9SQDjL8
z9v_QQ^lv7IQs9WVE5Cl@iNSDPcHRs9yCJx06;35JOjspJ{JxzP1~^RhhXNe-*39Fq
zEMNEW+{58WrNH#;LwD>otdgl4KC%ctEgqo=R903fR8`F<bB3d{H7M^!tm{7an^z*Q
z%ho=~LI?GAb(QhtCZrO|P&^)&#)qP4Fc@mJI#;*#x;z}G_J-J^FghH2feF1r)SzAR
zPhor*k_LH2?98kv8{q{il}=VH^T2rM&AmVcbi={6WGUtzeWiui6AI~h6#o~n;|~Ug
zZc1!@?|-2?-)HJTwQm(AKtWgg{l&Ttq_-#6KNoRNHTg1&L;q{a9^Zf6l0)B@EuD2m
zI0{4GWl7apo(B%_<+kG+M2XVlg(~WkMyY!fOn~cpH?}8ojOVIi%XxvULqa{X?L2e3
zqGS9j`sH!itpEL3m)CWio5%xcZ7n>0q(}Ul=+dnS_}Vn$M2aGX$C7~l*Pw*=6ZN(U
zEMOC80g?<@Qu(cdJl*xlmso1Vt3@dzU&y+9&-d5k_Iuk^T}o9nvwi2h1{&N%3S@Vv
zEYI&n-XHeO$FGj#<Q^FPHoD)pJgA2_pGWUh?~jO#R4E^p?`If3M+A^7Q1^8b4q<zC
zj&FUAs~dqmIFBy=xa0TZT$;}3xNT>7t%bb`mEQmE(MZ~k>g7?%?{-&r|NY9j6vKZQ
z6_Bm(IO<CfV87zZUSb<ov{4@FlF(+uarRGvwNeP_1KKZ(-A6^tgrI-pXJ-yntxW1`
z%BugC#HXj4+@v^@SkVBu!hdOt2CFF10t09z$6PWU>6Oo(y*~9AjAhbMLDl>F3}(+C
zJ$b`V9z9%!O{7B8^n6rwpS^jxjU#D)`|yjVA}N~76sjbc#?ii`ih79fHe9Hp#?k)%
z@Jm3xj?F?!3>aB38u%G8pLz!D<kr+w+=bF4RcJszCd!W*ze)4f>H}MTVKCAre`=gW
z8x%_(z5p_}vDW2P)ird_$@mNkFaV#ft>n|mebp)}MYZ&5iFP&ANNB(dFMb>?lrO(`
z4INVcVZ!0K!JpcO24cjU(FPGJV&JVHQi+961RRUvpAP0HIL=n0R;E@QM*^91AQ)qQ
z_7J%aC)Q;yY0zAlz+?5!f3da_<5+Bdc7vENN!x|%e6!kJQs06CUc~{UD9phCU3G*-
z!e4}wIN7XrE{r@5jhOh1ImOBV!3=l+YYuTcybRQ|)U|XtBW>~pDO<$+b&k6paY`j@
zs1VTB@w{Y^vF_kv62ZtWPdIJX<{-JDeo>X%yVZk+nmh)l(QW^Tn@w`7;STr^^&2s$
zYZO};w;hF_J;vE%DJyF$f1xQ%cYg9c{kVH{fxn$fBcnQaj`Bf@D{S>Tkfv;YY~H76
za;b^oC`GYbE(hMkQXSxsUHCAdbEXX7m9gATu}b53-1EeWXZIdLe*Uw^Njjis6I`N+
zha?CBr0C^mX<b)ZSHOfiDir>wpp16NSZ-6#-J~al*Wp&r-`@_Ylnt~x<X6I<PLbk?
za(thIcwgh;7ly&L3qbUB?N1#O9PZ>{1TazFU+C4H5B-fe)WV;9e0CJ*r}XM>87GzN
z%%!gv(lh#ZH%S#9{x#TXAmOi$1kY(-p_8aZuF}OO?vnu!Hbhzm4C@*vC5+uj<1oJ@
zk3`HG%+I1v?~igO6C=8>?4FsDXQ_x^Q5wcIj6ql!^>-4O{nkx!uE(u0H$jZIwtxy^
zbzk?ssF|)N%f}Hv-N&LU({?CDA-PFL*pUJF+aEs--I<Nl**f)~w$Bd$xNVPnOe9TE
zmjtZcKCfm5?bE<E10FCFk7k-~dr4$4ngDX`0vEt*a-qNry+CE25P_R9nOs)GGr#wy
zzp>WXOCPTkdF7`~(xMo@5u3nZ0-%}c3&Y&V*n4~9I*-9%K*HVJ#`UgW({gt@in@Fk
zj%HS>t+jg;*+?eFW@~*yuH2vXmI$BL=`eU(zp9s;BdmhJoTh6eS<PiSGc3T6_dsEY
zjdh@nb^dD|-3Nv+r6#>**(P9GAt1$w*IyGkqkrw0-&(LP@6=UUF(-tJ7j<oI<+(I<
zq$@7QvPjJm0>nwf)75G3qpT8o8FdE~YL(^5Is9(|fjL{t-=^vG(wEPMk^LXPX)-h2
zYV`$ZHGTxQrzJw+&Q98d=Lm$yK=~pPOOCGAUe8!C%kI^)$<rI=RqtnOhD4X1YfKWq
zI`u_VR<_q#XQmn_0B5wUxs7F3GD<DmYb`T@{@0b2Tr@z6y-5dfU_EHK2jI|~Eu80j
zQjn09am9St`eQoXIGm7}F!I4;KMGDvg1s<$lh)6JV3z(*VAwrK$-?c|m#&-V05kvZ
z6+6tQ7^tn7#F-JLimj#kB6xlW;H7tBQI0_@tfU4IJAhNKVptn*it;z}Nz9)%m0DJ)
zj5kSO9*<(mmo3Pc_fsmW%Bn88aMxJ>cUtI@kP-kyL@sfmP}v}GLcG%nPj-#ndP6L_
z;CD+w9E|qq0$dXVoGkR5(MWL-^7(zP<J62qC?fChOdLxq>taWEF+KS{iL(yAOGgAp
za>E@lMO3;R{L>L#hkQ4;asc-P>a+y;9(lY&Jr^kQ{(T8pq6KTFTv^c^B>*}~giwkX
zza>CqfmKzNETVY60{EYClVv7(*1D{Qd$x0N2#FM^xxwflJ^VscU@+ehBEsH_GSR|H
zg8+DS)Y9%y&nEt@ft@TgmLegRUZG`+25HAFx<Tus?rS#`rlBfNt2n#Gtg4BoG`age
z9ce<97vvamf*-hu0d4>QIUgJvluS&qmjNUGVzZ3}JqlQ0LqX!=py<vPH+C##8Fu;Q
zY?(Qnjvh7S<>f`2IMi@s0$}XAfesJHO&})3q^|(^SvnpT78wRPbe(3hrmhGAsIW*r
zZ_kt&=H@BN$r<3RUoZLy#KQa~A~M`I-A2hnAWv?5`T&*1jwRiLcur^}i&?b}01*-~
z#h4>jlVs{q5(-eD?gk@DRuHOqQMCD0J|_eN(I|@C5kV>|L`g<?76Sqz74B#U3Jx8a
z1Ohr1#Nm9I*%vdH;71an9F0rJY3zH{Jzfdf^n>2-8Q&+Jp*NF+3t|P?eu(~z36<VO
z5MYOmm)kg<1>HOQ()qgmUY5g`=X_vMJ_wXE<wmWs#xwkh3PBViE5Io)9M#JkIltF&
zUUKi!JKU-3I(+ov)r+H5t_r9#P^&heQw1Ktj6@%EL8GX`N?aVO1QkiSBKfD$sbKJ=
zIIu7rZa_~ZA$6;zq9}IRVc%M>C{4b<wPi&bl>Kat4G1Vilp?EZvD+IwI$bEj!^5*)
zVV1=ayQ(6+W+l9{66{1DBX33&ywU6jpTpeP-st$-SXEeg=PmHk7ubl9pS+GB9?rBq
zr|?@MfDl9^zZ6OVyoUr7(a2965R_g*3-@V>ABnh&8vyFyj6v*2){6vf@)xCw!B{Pj
znr2mI_jgJ5kj<2&w88cddDzd8U^RJDj?__P!q5qwEN%-%_0ZtXo_=4h$+zgAhQijw
zfn*4W2OkrBsi!okzv0wX`TZ|Pk}@d}CbkNc-Lb!s_jevI^9Y<rnyzwuL3yaF`dOYV
zb2zS}U9_6TTG?bI<S>#c5=px{KDLVD_^I)w13vAdV#bxAe4cX#;01JKt3r7I_fUzl
z(u8c}u^~$Fq>@jgk%g4_Yb4SQ;;Cq&YNXDv)|IFSr5XLKvLa5F;V<X<-|cN}p0@;F
zh*4q-r%l-lTi}ZM3K{5<_sLX`H8s8)E$-D?Dc^2L!+-!XWG#CJ#J!4&43~#Fo{e?x
z<(dt;`T!C~;>iZFpQv+K8_OH-j_%J0==8X{>Me~$`=2X%!qY%#Hz*8|iiJN@3%c45
zBQsTTAr>-r7$(G#mn2y4;Rd1r>{EAeL|N~F%y2>wBW$7J*XjY{LQZa?w#c82VO-eJ
zo3jS_llqs?8FeJg_xiU2BF6k7qn^1WQjF-O5Rf4XiM}9%em&{m=tnLRM~SfZFkG!!
zw?zq^-V}1&0lNWx<_>~;<@@19l@n{oQ?+Py0U95&A#Kh`dQt4CLQ;2eQrKF<7PlVU
z$W(>OP-Rm{aPr(OL$6K&CcO1#k7apvJN-yp1Cq+a0^f^0N=R>G;^zQ3t0=R;@FZQm
z2O}+tSl#-&;8i)>*A0TB50M}0JCshN%P_|L8n3^q#r^Hq#KCfsHSXo4!f7WGWymt#
zz_ugDBgZQhOjUt%pc;x;(5fmbDv-Q-2#CUEjMJi>skP@3BFw;$fl{wQtEa7;BvUHK
z`7Z=GH=u3TR?^j_JDnLFVLFyTGM|VZQBA1~Tzlz~b%8I;#xAPqd#^zi_m=ey99%Z5
zc|~zsk8?W1%;<Pg=8GrUf;?KVUmlCD)2h00<ViS2^#orh;!{gY8|-%AfVF+5OL(Cv
zV2i$y#rkxAQfDd%uHZeSlw+9$EI%YN51hxW02)M43PNBAE}iMIoU_<a6LGZoEtBw<
zO&RJ_#ie=Ev*1^BpJWNrKAu~w2R%MaOsFmVJLjax08DJq=_nVbShl6%k7b3z;r01F
zGAcc(k;#{_48{YI8H^^O$SlK?Rc68P=1WPbE8Xok#6hu6Zfo{E8M@3hEL={g*io$T
zWY)pzT+$HpnMhhtSm=L$8_|B4jr}g{r)H&*91J5Heix(qCjm`7riBb=OCGUgB-3)?
zkl2zzvY}f(ht!#KWsjMzFYKyOl&Ya?;D1m|N@vy+D#5zG{Ff?6ZpY_-O5pR9&gsd7
zW&%rRa1Fn_I@{|YflvD{X?w>+#<ck)%`ma8ZFhUSZ=Ar_fciJy`8mN8Vr+p1Y4AgG
zreJ^kd306#GKTarE1Rs1<ywPZ7X#uS0aey$Ae!elyYrwA4O~&bL(<J8B1-zNMt$dn
zX~sXJTH?{+dDX$#<}G1}#O~O$7DY|7oQUgCDoj#{&Z=1l2G(h&r3V`X@P_cXNGxH{
z3qUCv3uLzTQS(2uL=)nSSh9uQnOu$IQz9IV1fiRFf8~==HbTzapHS9@21rT++u>kZ
zCglO>6D!vloKKVYKv074bfDq^E+?pYdQymWTtG`QN=bSg@mgAg>+$mN_%N$7k2i~?
z&Er2WO(nMnyO!F<igw9DC-I%w`ewS2%xM9fI<hbZY+)hLpue}V;S$X1nNz13>pR`h
z;+|>=EH<dz)3f!1{k%}LW6@|RA~p;`71$C59IOJICj$rq+`9p5kB_cSSG;5V8l3Lg
zr_zzkkE0|!{NKD=I|8kzK820S@@3}#)pbZ><4rwDvjc?(9|Pk##Il1+&oe8@6UVx{
zyP>}B(iY@-=&+*R!G3KJ)qJr^QsC5?#&}v;T4hZ{nIQcD&;AlAxTzS5!o<;>LrW)`
ziDn`S+<G@+v;&WJmz_joa^@;tZQ|A^G2i$D5gm;T3mi0mr?ErU6pBI;%8-ke#3=0B
zMgr2?rI=I55+kJYA@b@ipAtTBoSh5|u-stA0_Aa`Z44@YX|DQ=O%_2x;guYfh0#&c
z2RPTBk76Q6MiYf6l5WDYzfv^kl4XttxiJs}05<2_+=s>W=XyKH)wlRw>(OK4aWyuT
z8t?1F>errm&b)W$jiq_qRLeOU&+A9>`qt7T&7X1v-($`=Bg@SJ34i2f`PIn<5vdTV
zU8vX~c}+OaqSx6*u*aBW8!i%=QG0wbsANh6>zm;{66>MivE{0rGfL4UfW7c3mePb`
znEMl7()AUBt@)j8)Vds1u4d9DO$!U3Zof~C?pru6@7_pMXhk~072<k$7T>GQTG=e6
zt}e0>&xBMLd;90%m^zYa;KKY;=pp05`VEN;wz@URjp{+%skqT%$7iryU4z5^5(Lu0
z+;>4?8e>234KyAMvNcPtM}`JPz7J)g!zNBHv0%bI4#P)PgVJ&fvphG6CNg}=x5Qk-
zgBX;X+vuDn%_DOsB^u8XKbE^7Qr9%TA_Br~7TEfSTr^f7e#}5j8Fj0Oq*l->OOgZg
zQV1#0UG1wtxEyI_^lZ-&4Ng)Ry!EkO#D32S+FfE(LJ5#WDCv>%ghboo0DFv@+Zn8)
zWG7uHsRTqJOk~3Ba43_!o_xuCZ1KWHE1@j;SWIDLrFQPm2gwotcf@xH83D^gjuX?$
z?rX<=kY1bzTsO}p!?bGzKn{*ut<M?DC_}C(kh$#q0|pxO*FVNaZBlXrlTw=L8ySfV
z+%(-DX^_)f@hh5!Lm*kw0LhoK6vhl<g7DV-e?gs`raF+`(q@I}SP!Ml)UI$_TU)=U
zGDtAm;Ki-1H-WZ!%vf9XMWpUcUJI%DBRmCd1&F`#H|hsae$wlAf8+<lW0wyzSbikw
zhBAf4<uD;_24u4gn~1`ws(F3*SwlOGmXjoUDkC~+(ofK`5j#zdv-KAkW$kKrWEJR;
zBO<c?hR9@~sK0ZU<?u%b0pgGk1Of3{=Jkr&p@q$nF630fCo@8jlX*KlvqI?05z@rO
zq~Hk-v8mSL7WBUWPT*1jQiPI((jtigO2k;D5p(qh&gg5U`B-I%x)sJ@cjL|}XasHp
z*rBSM)0D;%Ng!=rQMgiroDOy_oS;smi6$b;pfiSUvv&JPK_L!8t)}ux(Qo6EV=yA^
z#xW>XAOJ3_%Bx!{0OM;o`Z;w|Q>h2qE#EvIM?aD?FWHgDkwI;bEYZ1$8!?M;|Dh=6
zYUu|Uvn-^Rt4BDi`Vn{11yD`^ec<tt@LqilDw=tA2JN`VaA{y~+}%*B2@WXu`&Vt+
zzg>;ig1?!}o42S`X6<F$8@C=h0Zo#0#b(=WuY!U_SO0CE21?HAG5tdo{_Mea6SJ}^
zYQ(5dp&XZt4KQq34407IGIl&*u~_XfTtTWRWg0ia{J{d!VNn{FZx92Gm>*OvTHG(0
zi?=Q<*l9`GZ6fqrHVY4qeRbXp+?irHXaV$Kc|jCZ(~%Rk`qX219-~h$-JCtSh#-nI
z@@Sc?5#cl2EJTNZaq3PEi4Zpd6b!sL8&DR)OpP=R0#Xibg+d-KQZ7PSqJrM-jv~$|
zorZi)K(hFQF^$H(I7gzpu4GZ6(FapwTY@AQ7M8rk<CO>(F~9-o1)h5!897#E(UCA&
zK}2o{9M*Yr5i1TjPH6=LLMU-j%sZFJ4d`^Z&Z7BhBVWtI?$Y0f5a26m=mrJ6br{QU
zzU>{QXn&@3XHdxV9cC6ipt4Lk3YwcE6og16GmB7bn7S<QaFt4aCHI6McNV9Y3X0v)
zr5N@hql>~c{26QySdY9JoHGth9Lp~i4u`16^fcnoo~(_JDi8fAuK`Md-0e0;Rhq;1
z!buaYTWr4Hmeh4UUQ5C;%ga69B6<k^&WMOF{;OQ?G8}N4j^n#(H3CzQ3UT}3Yx<NV
z1KLW=Fa0LRmJ4Ug3zhOHE-0zqY82*2Oi+>vxwKhOE!|I0Kzgx8mJd;);h#vS)<kOW
zZzhIKE9?cE$S}3yGBU};ltEk9E3gp}5<yx@w}lCR5JCDa!zjI`p`jcbs0ga-<YJfl
z+y_r#k$S?!)oSxxEv!L}blcqzTObm`4^|@92PqVQoR3NgA<5j039knr<RWSxMqT<#
z?YdkQZ3gtt|F)mf8UtJ+B-$=>W<r}l2mhTt9aoV%bodUEV<Y~-)!dFjiDnkrg=quN
z6WPCut{~h1N)M5q)k!brHp~@x+c<2e+s#rq^tMd#{n&fQ;>U;q(EGlB*UfuSf3p@^
z>RYxf;tK4pr3A&eLd+61at;9?ONEP6P}0lWq(*Hq5>2zJ$4-FX8Ouny+V^Ne(07p(
zNq0@*SNUSfYC78TLZYq$16Hg5ZJo$_iuz}M|2cu`M)GAcgFT_?1v1$AA@9rhM~1xZ
zQXJm<T9!Tb+@9Q`8fk(~hwI2nUE5p#1OwV}$D2UU<BdN4JnPh`^B9NzU;DZ&#=f}|
z62Nw@dn>Y?&-b0l=WYE_W8rUl5P<y*PXV5P-MJ<@j;mY4SBUOEXsXT*)#t&RH`vl8
z333dwf3#`E^(EmhA{}~UPYk7!L`OX7OoAc543F|Q#?TXqCd*&l%#(ySqj|^w*kWzg
zuW=-Y6EHJ$ntsLGs8yc`PB4l-VI~SS+DJ2O5Duo3Y91*Z#j==!L{BpbakV9!$y5D<
zOtHAR3)3HrUMYl>Gbk`%)YecZpPW*nha_Ey{-(MQfu<6n;|a3Pl^W0DP5LK<L{TQy
zHbOJJ>L`a8=nSL+G8LmzK?uQ=2vRB;x)wQa^PsI^gG<Ji5lu8zRhEB#T-N-~Zu~AD
z&?3iMPP~w=pqj#9ReRw-%^Zkpe-Rv_d9C^kdw;H(QZ29=sL5^fYl6rP&?E(gLE<z#
z!Z*Bf;h#N7^AYvkx6HkgGUppqx|X0$!B*h;$;F2@C6RTZtWm<sY-WgM-1`%G3X_@;
z<2>Jn&=Qk_9xF<-Die`H?0muYa;Np^EQ-Eok$V)cr@e>+ABshDtdC{JlN$T;=JVMc
z-$BrCht1Ey)8s;(#FzoWr3cxXUz+zq<&mi3OxUOEdb#@jTJU&+=efi7nR~-F<8W>6
zWOR;lpf{aM1qL<=T=WE5BAJ*FgF72KW&CGcy{%B-GAGB~O2la(6e#W#Op*hm7LlPE
z0STcK;;W{`{VfSbERrBR78u1qoTgzNDUD%Czy{a%=h(E7bM(X?H63AaR#zTm8u3B7
z;Y1nsvWmI{a~VVsYKiiaL!<yis}B(>=w`zohKPLT^2&&T_7)RsO~--jEiIvsCaVmS
z!sOx-qh!y}W80yGV|PyoQS3yX2!)fs^lZEhJrRQh!9xHAf-nw2$$&_ITcjVuxZAV8
zB)~7Nif6SlVQdX6R14N;)M_-J-8Pa3v_N|G5ATC#xO?`LlgWqPoImemHv}$nnZ5Ko
zVhpuNGcwQ$LKLV!ey6JTabdtjB%1;B?oys&jx)(i5VaOqCtw|I2;3MGsG)D?{tsc)
z$6H>!l^gsoXWpd3m^2@`SPhvmzBxyF6sRP7v#NmG#WbC^(<IXQRpHoTJ8%hKmN^){
z&P<o(zkSaOp$I-E3X+C@?1w3xooJo{#|qDH53I2&MFE7Jhw@?__>Uqh<!EBXT9t2z
zmEyrXU%BN1{DzIvkVvy^sIe1N8I!Xy!_<t#Lw%GWHpL?uYaz*mWq;FkXa)w9fPq<&
zPovyp;L{rQx^OMc&`DtsHjphSw#_4_bt_{^v=$aAGYOHH+%Y8ILMXrV9*^a(Z<y!k
zV{F=Sjc5nOq7l2zwmVJU7^Sa?O*YmUYt$~WrsmtA$biiyRRCg)h5Ws-sPp<oaCEcr
zbCVW_w9TU>Gdaw<?_Z5kA{8sbwQYEoc;bygtXh+1Lus!@8E&ZvOsz#mM8yym=!Myf
zE*V_<`f^R@YN6E2cov9S_!S`U_*{JxtJb=vUQ595(pl<cv4}#0ZY#?xb+f&RStS_a
zIz@vT_%aYo<}G8#z#E$yf;eF#QJJ{45e^%q2O(`?(9(c5h&0Lg*>6qU?+*lw{y)~}
zvi%mX_qrdvuW2_SmNNhT(zpU4v1&eM{DFdYw*uw-Tp!nrKmVMG)z(uigeT=)FPJ~<
zyKh#9H@iEIbcZ_RhjPPyE3_at@|+8w0AWvm2;u<g+llsEecE%#Q?r)Q)IANy*EEW5
zQaR7IRq}UwM8uIYgOT`$#_PVy<+-)gu%qORZ;XvUPMO|d?8|L{g;7&V_zd)MW-ZHx
z6chJxfY_2qA2JfPBzu>c)z3(F0sN7l=4M&@%2gKdnPVjB1v$`Wd+0EjQ7oWlGoXV3
z2cQDrKg21?B;o-?*@OZ4;mlV@wD;^N!R*kN!VM=D!Rv&>x|y_TmMTazLl89%bVi!e
zW>if1ghpI2WZ+Ye{78eWYXB@OvsJ_<cmss?7R4bqg6d|C&;&Y!Fet1`QnVv*&SV~@
zUuA14<v#In)&p9m_3@=RgPPC~({sB{Fbc3hHF<(Ue&WAS<_7|^`J!;NHn}P8D2wOO
zwNi2ooLXrYk?)&4>Dc!;Agq*w3kWN9xz;}4*@g^noL)UnpFmJUwS4U1_di6ifA<s>
z_6>GrL}G}`_-%~+-$XhWamn95#uIy!PoAX65l#xE+V4e*$YYYXJhf`t;2B{jffRnH
zK(QnWMHf&mNgAWm<1lC2q6Y;4QcJhsIJOc>&Z3chG}+|vD2PQC144NTB>CShzm;!2
zTx2JpkU{_0X}_y}drl3h>)7pliF43>%*krTzt4@Q?7Y4$z2c_TTE_C>oOlg=na>o5
zCZyJxZN&kn1of{w82R71d=H6ivQzqA>*}aR5Q#Q+mV53HSKV-%UWtW(20zrUIgZ94
zCL;0WhHivp$&3+*#F2Me$^dFpCvNC}K#k*ct0^#*fnm%?CJJGM3?XFX@iQ1!mlt_z
zKSdG!XEHX+Xy(IIVs!9l@@I&WQOO?8Z$WKOG}<+=!#9u`SoF23WiGScD3vjppG^s4
zW*UkX8aCiCzcO`kqY&-Lt&z12ahkG}-S7pp84ebMo6aWIedWNS)~T0O#pV^*+c-z#
zYlw4waAWrkQqz`uA@?<*yJ_|<CnCcdj^rh3-pT&%MozjjSzB0UBT9?ty?)-Ae;>mI
zDIC^i^4qaHecd|eb-q8Vg3pq?YgrA4f~8>1G9Hl(*Az~5g(U+@z~}6KYJ(i~JE1i)
z@>Tdgujip<Ig~vJtrJ|PtWCP5&dP4-?gqe^P02>^of!Yo2$D3*NhqhRV4jtccJ{>^
z+c(5>C72RnHrv|~S)B#YCOYWqa-&ZimoD3FISzA~>n6q!$2NRdYi`Y@*PgR>*f(iZ
z7uMFco<*=t#j#DzWQchdT7zeEf}5^uCBHu}0GEb+Qsrs~K^zY<Vd@Qn0VKfZ+Yb;>
z1iv8PrQhZ+0Eo})4#)d4&h{#JtO_8rNT=fSCsX;`FkoM5|B3syv0CwbjHnr&u_qKX
zG|yI~Lk^Szwhd!~6yh``8!AeK$qLynl1%JXWA5X6sx^U=gdhXEUW(;NAe2lGg{m$;
z2q`EgvK5MKDZ`(!Fj4d@2ATztYT8xIIMYsT859JF(q{TPv1)~>3F>j#-8huh7Rj})
zB4x0%QaGVAN?f94+@#aiK#?dTGa3v-!@r0$DUBw!>buI>OUyF7N=1$Qn4b5-*S_wn
zErJ4>YsB(UGKW}xB4F`&;0(j)&_*Imfs>=!Q3nZ9DoidqJ9L8x1(@AQ*Z>*F8%-~N
z@&!8eCv2>%p`q@Q6&Ij6DF`)xi+FRw0D{Vcr2`3@OVvb@N%o$ckf9NGa!E-ujH?cl
z9Vg+>2R<x8>;IK6k2LYC&Bvv5yd(Yz5k)F&H{d}P1;s*Dt@!!Yp8_-*Q)s0=ut>}7
z${aw^Rz3eoqu&`0c9RgEMz%AOYetI+o63c*sw=)B^XG-;Uqnswf8@;ODHPqTN^Z;)
z#wB7WCmetSmwN@+;c3**pPU~fK4+m%1)(W5pkN2bbtb>R)8)Gq{0>CsUklt0DbTmW
z^<NjGR{wD<upvx*x6AeHlDVCI-hICJ{o_btLpW9U106Cm7aMM#PS^OU`6A^q9Z13^
z6h;YREJaE#ndlISXw)bc-e(E&Z`jR9MRD2{g`ZLwJ{)`qoG}R^5V##z98}=sl?5G>
z2yR*aHCAq6<bf>;L25jRX|jpP>GiI{dhN=g!J*v{W0_-80?^{Lo(_)o!KjbL3>Q(*
zJ#L?7)m?-`O_zf%Xb>`$OhhZ%OwGS;{KP%6=`=q~HaOa1C%J`9&SfYoDre*ap)42%
zWimR%szP@TGnt?bX73aV3*Z1}cI--J6T6^ddwQ{?F<Y+)qc?6Jc9m4Jam|zHOO~!$
zq^kF<xofbw6e-!dT5Ox<L?H!;3qdOYz4WA!Re2+GB{r(;*T8lphxwqNOmljvTKEX$
z!uK!JMl8@WP14eo^|Mu{Dsu(11L-Ch6M=5Sy!b=u5Quv+wx)$DjdY3Kwe&;B(j)s^
z2-Zr%m-^q=eMfV~)4bk(x95I9s|_S14|G#80B@f`aTQHZqfv}`826VU$XF}K5g-72
z)BLzN6u2e**s2>ny#(ZYiyvN8O}%IJ2FsXh!{0>cGYR^=Z_Gcnl(hIk0*c>Js&@of
z$RG(fcFdrBa1dX+F(m9ie{!oC4ao3662E?ZzAQ#DcEIayyQ~+#aUD;}D4G033M_)Q
zD;PzD24&jwl(i1fP^2mSIux^DI?iT!`M&UV55O~Bdghv$ymY@_wqdtzEKU#<0#yo9
z0)wVD0t5yG7=S$ZLhxIE07QWm(RYw;;zH;`B?wUBa6!ReKlz9PLsD(tN^QG3S|%r*
zy9IKoW}39wv%nAd^#-=u7LGISc^=&b7anwgGA0XA;o}fUju7ify`2IVm+>vpE$+sx
zUlL}$JM7P6m3&RTqK0aOVuhZ`bOzPaQL0w-+DPQr$aOn<r7@y2E@&5^VSRAI3Q&n6
z6Md+n$&agBy%z>N5ZDb3@JFi9hYwsgtYH<iBqrXosHOR!Ol;V3qDf;OwCL)X#*sm8
z2Qu9Y9Uv0a*I!tjHHfjBGOr|6L4!tcgvcvKd=w9@r;|@m(epz>j+9tcECexhggF>f
z@?-L~^k7bJVH;AZ>koiqu>wYm;wW-U5+o#xu(^24lgn#-jsn~JVcWI>(Bo`Pm_4(g
zup0O_JeR-ElJG{5<RAz*(icLh$PNwOE<Y2gH)IDWv7^Y7B5Jf-{>ECdnL-=IThnBJ
zwxrL15o75U(T=a4v>(jWz7idOEXwDZ*}uos`JNX*5!_X0M~r~3XA@HYYT8~?99a_t
z1-ym{w^R6W?Rb>0R{9NG_TysVy6U8xDrjvu{fn^|zU#2YE?xZw^{6((Kmn6Dm25y|
z)W>yLiYsg?&8UE2cO`UU=A;l_feO0=3l^ru-f<sK2HIt_nw<d;;546zY61K9Z{Y=3
z*##)b24AqXM;!JV-JXbZo^zH**VE$4^2kEi-`TPPqQ4rPTK1$=k??tlM5qBS*9&TK
zxTwDb8C|+QTT5LLZ0u|;qQsHQ8TIw$9%knQioD{%i26+bxJf}c1mAi2Y1^-~Dr^57
z_@l8znKz+-^Z4EV6j}A0*S52GdMOxLi-Z52Qk5j1pEZ%<WAL@KInU^Og!)jUQ$hRO
z-j-icV)!;mr7F_z!=s`qs))%PO<^?VLYyN<x-h0fohvhvRAEAl)tGJ;QWSJvXxUMV
z5v4_)b9Q>F*JJldQ`gOWz3OSbtxIB+(N#-_(BN6P7wqdBA!AnFvO-{EFIfh?yH4-{
z4FFH2jJ#{K_D>A2loxn<nRG0gi(Vqsnl^cDFwThHgV)L&L!P>itne)gwvQCp?_&6S
zB7kL+3k7)0`Wk)kGmJ%5diUC4@_)<WX@Lb$^2vD~6X{|Scf(m;{M%F4@#QEPxdmE~
zCEQ(GH~ml-v&$JP%R}>_y}Pj`R7N$+!#O_E<%kfk;WfyJ7ghny+J-}&yY18IuJg~Y
zEjTqEna<*@&k1l;{sEOExKd7@yptzvSUEq7YHeee+ay0y-@9VJ{?Y$q;;)OXwS`T&
zbP1NSj*a+IRSu_<Mv!59qfO2z>Zb(~IP|&5*~@7V)L;&e_c{W0Ou#k&8q7v|(N=2r
zb}y{BKLt8flL=r1a@%h`y`I1d=$b!JN;1#J2X*sE;QO7Lw|O%h*}~dInIudyiVKza
zWAwPl*)*F3(0lFYp0yJMg;Av8I&-tUvjy2P|ArlEIvo#e4<<?sqf~e>W66^m-<t3y
zgb$%Gu~oJQ4l=eHo`jWJhx!CkSqb|dCFSv!G&VY$yK^+!C1aoD=MzSm>}T0ebKi|#
zTCYIrStt|Bh27p;`%xN?J^OzQ(7=7g^$75LZ=MJW|FYTUwp4OfR^C<F=KlP>pQ=Cl
z0J70X1|<jdruy*o^2s)@k|M2gdyp^k|CDig)CDNCI+Q%Gp!lP7xt6}Dz7OUB1br`}
zeBMAocNZ|q<9ro)ZaK(e$x3sBMzO#|iCEU+v&LaHFX89}9XoH-CPbqA;@iF7y&=P5
zzfWKmfFy*U)Yt$8;n?qZLo+NyOhEvr+hi+?98S+!jeFkLagVcW=&~XmY=BXy^B*sa
zVR~8A%H)e}^#}9iC@|)}!9$NKQ0a4|7TYcUr+mfB-!aYSVsq8DE~DwXU*dg`lA9lC
z5-Kl{p5&7UOz^!(Fn=sCwf|m<C`L;NhDhX}i_z=9eDqJCirx;8s|m*8#)6&1N`hZ1
zJEcYvv_g@O-4++(<)gGs!8eAjWsO8{Y2s0j(Tb5HtDr;oTh~xq(bf*{&w22oM~N5K
zTks-94Ha66pk3aAN9F9Ya{R14_o`Q*M2~v)`I>6k#y%ln+%F60b0uX@$fj8B_Io@V
z;J<}2n7rOXE}}{~5D|F)LNK9yokr;S{@26b?+bJ{7ga=le1yXHamY8-lDX_S4cLkC
zyO-LacjVQ5gt|`us4?<tHy`+bpy5?kqy1GF^nen>-TSeirQ~2w`PEcoc3H#`#qhRC
z!wZ`*v0VQJ(dZsaJl@QC99am60CY$;j$Ry~(@Z6$t0v18<M^2G2qx^Z9Q&8ncGu^x
z-0TbZI0OaBDVNDu;cVUQ2K#T+`;L^SqL)e?8g%%>8l*ev!~X0`Aw0CW3?B{fsIaZU
zj=i$of|pN&ApILRs{Coi&WbVxYJ=)%3==_XA_y-Ljtf4;$ep5S7euAI02Qf8V64WN
z<!2fDiA+Z|mNh7GMXf{1=-EFyP(vEuYckI0ed8c!;?S4V2l3r%7!O2Hz{#1R;Uv6L
zFhPRmktnidM3w=gnJ#fkBpL9VJEKxs#2BfHuGxaA2&-Lj@xg~Ej{qAR7aMmH-t0GI
zO={)Qpvr)a>J7vOh{0!;eeBuE>fN$7;=JA;E+mR+|F<sdfRjZQIj8__KW}UQ?q1(j
zWBVm$Pv(PrRQ|H4)6*>Y7hS94#K~nSU^qLguh*%eDK2}C<xyWHMx%xuAd$r)UxGzK
zWCDnKl;fIF&}@y?i)2gDCFvmopk1b+AR(a|+Fs3bb1SV`J!B{S6vFz5QpSBg_D6P}
zdy5hzit7vX6qBu3u*2|VE6^)D`{iO$wU$WfQAh_V9i3jlN%)QpL_>ANBFY(>GHIej
zY$%*%&LqUt-h~0~fk*)hg%DeQ$ZdG#Wq*nD)w_1oRqwt!DqM5ee_3E*L(7n!GeQQ*
zAO||Xia=vB#)gcJ5wjSDZ$5;OATu|;FwE6riu73<F7IZl$JJ_E4OCV!vs7=zM|DGG
ztPtPEvwP7ZgL~Z0iOctV++F76WDb6a@)KYH{d>JvT-@B?(IQ(uj#9^D9|Iq60EiJI
z6w?{bH<KA9uSRgqwf+xfZ{q&2(po!#_Cl(YS_2X@W%<=~^zC$5*{wv(2MLqd+Gg(c
z%(6(#Q34_YOtH}AIN7b+TPyC1^&{-8v6Y&{1cGVm!omyn;xnJejnXWq$>jsvzPt73
zR}9*2JfI75=4n5Wg~7n+!#rKo!@R7N=OXHpa%4kLDR1Urf2}j4fhZvIrANCf*;0AA
z2ZFp;S6g<1NrRN;O5PlfO*3zBq<=GwDMJ)za$sP=phRg_Z&}!Z{_G1SD21T-a1SR<
zw;KHiNle3f&RWVkb^xIaZXkg|Tm`9!sF$#YUfn*d*4EdzlILwV{|l<d>uC*n3jt>z
zIAF5rdTtBtv74@#;X(TcA0M!ez)e{}S<&7O`_A-pfWMr2#D7&SYI}p`+$gNpd0-Y6
zBB^pt%2HG)IOBo!h{e!JUf4PJ4Dxz?E=OufK9jkbHPS}=@BJD<=W17}f4Ms%67pk3
zsqb0r%d}xlW0uw4%V#VZ-uuP<+c-zZUt64ob=b;w8r@&+G^w0oFdQbS);G$K$u3TT
zOARZc{CJoJ4isNOA`9fAD^n8Qh+r`t)$Eim_z!TwB_L|Ftl8{N-~b`6KUOd{*kGgw
z(D13Nlgw_;DuiJc(7CFOl9g+Ot4EA1Sh`%qP6zBXNlW4yg*J>>v$#e)4X5CnR4=s~
zCYDfz9j1)&tE~IK@R0RA_aa__4Dxi#1@;;(H0&opIN{aCrolQ&7*gwWIu?u8a175u
zyf8JwxoRv(2N<1H`crP49_3l48s?<dAtWf5%{u&1(_b|C-vvPQg`(oZUz;tzx1jy-
zl)XB?6BhYu?RF|8Ns%QD+7tjOwbJuBn0ww+TI|4x|6Sb3(%|j87hyv%Lay)5Cjy5l
z^PI+H60v|zX`>+)TS-S+hO4>RZ-t}?aZt>k_tu^!O}gupX;_(yW+lLGwKNWB1hlr<
z`vczGVlPwmZ&4~~QbO7wRl%qw^XYl=IdVG`C!t~F4(*1~AB2LS@D|I&S(t;p7tGgE
z%Ip#Nlki?aop6`z0?arSn%SdMH_@7uw!`am^UzF~jaW*eg%vZzL>08Ov(02*zAr~v
z7(Vw|uYrMh=PT;xR1N-CcJ_HLv%d)VFaA_+N;Ump@i%$CUK>w}SED_6G;%Dj+li>q
z6p0BLorEk_iVtDJk@#7d;|m6N>T;jXL<aBm>=^f8dtxuc)<%XfTomEKT7NiX>rU`J
zswwZ&NglhiQq<P$s^V-cFTYcMM6Qw?Kn_V_8)=YYAOw#V2SJpbO&C!@oP@y0>;0<^
zPB5@OJV2SO>abk-%I<Sqwgj$vSHRi3O2N(mO=ShcCOCOG8kuk0hROQ<<f4?v!Z9SX
zWuhP1PQ4?%(O5($M6}g;3pYNV){QS?4XU_S>~75Coevb*QEv0khA$(rkR9jdK7Fg}
zot!MWUGpF>OgSzpe67tB1IO0Gm^8iTdr2C5=NC7)CQeCD^oIZUEsOc~cZa~{$3UJj
zL_^0Q{J=8Sw%u=c5yv=)oCvwj(HJ9L9UAmT->$0+lSe=c)j@Sj^qL?LZrtsv{Y*rV
zixWZCZ<|2z&i+KUfBFY4vEF6pt-B}t-6UN1ZnY#M>6*P~rrT^t8bj9QyZb84v(Zj}
zSHD|Yn4dD+HP3AThJ@P1eS+)y5J{0lnf&^`U%HNUu?(p&#s1}z-~#~g^Epge(jrmG
zi50`|*c|6|)hb32!s1X`1<4*}@-y<Z<kPle)*r!Wl3urcqRi7Ce{wQ3=(t17r&~h6
z8n{8v!S+Sr>phzVke{>1Pu-dQ#bchCrCR+pM?M(_*HpeQ)04imqr6H`IE5F{+LcAw
z2gw#?p|cCkae*@$;k=+bR>Cb%c8t>qYgD<v-Z1hMgLD1z4?*CyguzrxYuoGVwJ^&p
zqrb#~H6z<=)i6TlsL#5N?#L;^YPXC!LZEXC{(6>JF%HauIHz2Y6%nLMVf5*#or1i*
zb$CwZolLOGmlRp>7sp#;@IDWDC|{cGgj=nzT^Ho*)EZp2M~EnLf(dsfNPtbfKpC8+
zj`8UHT>EB^(}wy(bmkIf6Ap^N@{Y$1(eb9kd=I^Cnt!&(Y2uf3)vs_GGd0pax>+sv
zflkdl{dxb1P9)U!rJQ>`%$#!$-q(jl^E^i@W+bS90-djEZvxJ%bQ11$isV%*n~m1Z
zStUAkg*_P~T{@C*<x^IG0))$92^~D`p_&7a2Z*4YKNOBsFPe1SYMr{_wR-Xg%Qita
zIS;hjw=C&MhVd|I0I1AQCrys+;8cT03TO|B@Y)MTmULq*686-9%|v(@m<Y~7IDYb^
zdaOIZUVnip$4_*e0M$W5u}$0T`t09=O6L;)R9LDMI5}LvFcG1^_p-qps*;)=d@>q?
z3V!6PLhnhz{`foL4{zG&{(WKoJKJSG!93@2`3HlIPIKgYCdIh2yyB80i<u19!)(g;
z%LtAC`^HUm;CN3or&jWd5m>|{Z)+;UNhbTEz%B%G2TfI0?>IQJNp?AdzQj-x99>cW
zcDA|y&0ai{!zKqp?sJK765MUU_Q&1t9i69}EPzA*n6p`4XPrjtfjR^4>q1&?+uQ5H
z6;H*W_v+UnL2mO+WKT_pOC0qb%5x4(OHU*G(I=E9g6Rl~yZ{)$ebf7!%RHOBJ3LgM
z^E(?^y9E0To4Fz|FtEIGy-nNn(2+VNF$cDT4`)^WN>C2mR0GOQ(JfW+^|RB4@Uh|-
z4<^wM&Ig^G1(U^s*uP`yjD(*Yyf9M}U)T3B31Afck&N{s4$+w=I~HuRf1m@Vj<S_D
zh<+!{uvbHe2+RDT51!1jWXFav`X&W!)P-;y0?_v^{q$IKIqE-4PR4o%n>;*m7jQ@7
zrs2!=KS<c9>(+`HIre>O1WrKNPA*oQmX>Ph=De_}si#?4Ve`436_n+;J(vqr4ez__
z_&!R<@gld<U@x0<#8l3R?6MsjAdh0W%1$7d{aB_DNT)M_nq&|T4(+osq}0ZpM2Bn~
zD(EZJ;ABk)?lmz-mqiOtk5d1rSDVZF%MozDZitiN>;d9!!U_DYE*Q34kJ7HV?{A#V
zH-5-}Jt=bemV4X!vxN=yrRh1{oJ=04^%|#{!FPM=9#0WO=)AQ)zVGJ|d?w&5gVDB;
zGIOI~<wQhxA23ZAHh)xV?#TzZa!jK1nDO_JUMR%vI6rd<bXpW1=imK3a!k`P$_wBm
zn}~89GX~^v_>1VR>HVvhW`WxA**_kVzqh+^@zFm@#L3pZ>~p-rDg&k1bs5=u-g12Q
z-Fx>m&sFoPYM0R!ZnraVn4NW<hI<wMm*>KrBUg4Q@cM^e<#mKMm1UBXC%xp@EVcF%
zr1Hd=>bz7V@tN=v`~ng*@VDSb54qYO9M;H1^^W)fT3QfKU&bFi)mu`ZaJ2s{38shW
z!*bzD^5&wXQ2`0)bS)7`26+|IFGUC(vfb(&+;92tNTgmKJVyH}yx4<nAV<kay+(!5
zEpTKA@)ZGOY@>o~;+9c^Ux^cD1U;W_fOKB(r(!U8Og>8`+5`(M0epa)&8EiaA@K91
ze*mFQx7+7=jlg@p`S5#hl^6ht1cgXeBG(*ap(QP+g&#14A4~4q!6@$%5D4t`l!i&L
zE)wytS|c+azrn8fT|C9m{GI0a++o=Agamw?U3jMnd>p-K7WF)xyhglX0uH<;SlzY#
z_tD&ExWCU!P5<~Dg4o-4Re<f*4*>vp7`nb+C-3+j|3Xke490w0@?4vj;b;Al{yvf~
z6uI8F=(iVq8#?G{$LVsPKS9tmMUjK@e!Y5fxJ|!1{dQ?ORG*5}fdDvs<$O}C|F{g+
z<36`$xn4-kCiKyV+UeXYiINlews8cF+i7${ul}$;7S+Gf_+Hug7a%aOzoNr-{;%en
zo9Uz>RsV4vq2*}@G|u1e;dF)e^^WeoIH#`Xc2^i+cI6mFnk$jrvHKvf=~`z|I~kGJ
zvKy_ztLHXQIy~7Pa}HO_VuY`(f&cwp#&dC9w6PA@#qj?~>N@C|;p(t?DN=GCoC?z!
z7sSeCA~k;)_x^F_9fv4VZ~ASwjG0O2Ix5#l;chMU{ThZi|H9_w<k|x>gZQUYlii8S
z4W{6;rHt-Z$q{a37}B<zDOu)MI~AK`(>}ReHYX^e6Cvq{;;HHG!zLr!%Rlwq^*eu0
zpn7H7?=Xdrc5vrMEghD0>m!3Bu!v<*#KKbFZ@DlWe{n`sr7})9j@EosIy}F<pN{N(
zzUI0Ro9?lhhOku+lu&i)eXt&*EDX<JZ_VrFmB)2GUbJIIh0X|TmTrI~uKnPj`=@mt
z!ZO4CnM=lz!-;^e-MP13w_}n)UbaKO{2aOOYF`_2=$_>b$$2aj5W9;hd9>>;b5Rf9
zel?Zi@RdT54iZN*^SZv*0w|r@_8-bR|2OD<rQN-Ic7NUeR`96Le`xO?1mW%inB4x3
zO*+QAc}iq(2M0Iq_AT`Mav0({H^A>~b6Re0$=UU|e~NUEl5l~+*zpWCDm0ZjpN)bL
zUQsPI@Gu{Ef-h4nuVkD-Cajz_3{8P~`^Pm>IfRzxPuU4rquU%)?Y2WR9A(1jfJc&I
zwJO?WdE&@QB%Jymmd-jZZs&RUhdafJL*a0D*8)Wg6pFi3+^x74cXxMpr?|VjyA^kM
z^7%f$yZn*la<6Q5C$l@VJM%`!5iXt_y_6@YlwjdjQa--9c2S6?86Dofwa*JCysMSl
zkcffo<1s~q(k)vDaJLUk(a46aas8H7-dv9B>rOu*G1xRrAQ42#2com}{<)HKT90&6
zL?)EW@3-BIzF!~IlTi|TRZ97PTncr-g6^|G)n`mL;`6Shr0SFx+9v6bci&XCYz+^w
znho|%-`5xk#fo|}-d6aJ+Mmd>P*?U|`9{U3sWNNz78X@HVSe00Q)bqJ1mBvRUMhjK
zPK!3YFqNGL8BVr1>E5eipk_y@kAhPhepg46r=dfi^B@-X_?O-c7YHByY58@p!HmO<
z4w97b@f+1Soix}X*oc9@$Tj?)?&AJ@G4cL*8La~S9Yp16PG|4d{tRH$T142N^|ufc
zPRmT1;O$+C>n$jSM=q{!S?m0f>^ExCXRy-IwI|pS#7W67WgDrP#@?jNjJ)=Wu1P8E
zz2S;Bqb|QwLpPK|!-U1Jfj=I27So-Fj_B-Sd4n%nK)vplY-@B>JVuHpxHBEK3zHVV
z4MnwklWQn+N(VeyOC;B033S!$caZ?9pXOxcOZOjdhe_4U=0iI9*R9?zH$akGI{h9w
zh)OKhsOrLYs@^aUd$TH^p0Z4IX|O(;61xN~?y*2>4^!H7etAbi)x8+{hU=m(70Ch)
z8h;zZzHsg02{rEmad{x&L8&a?wuu&?3FOTFM8*l$d0a&$^#TVju`oKn?WWHXY?AnP
z`aDf5A6F*7G_||ALrGeH%w~Y&|1D3_Kc1Ol2VXXQ98c5|nBWuOpPs@xxUn_|m&d=8
z6p1L%VR6*I-S1f^lO6Nr*dd<&q|DX-ve;odEkm_MmZA8l-r|qCP^p!4tSj+4jL_m_
zwx;nXEEHM&IL;8K@Fs}+5lkQqeeab|25wb#P-#>f_}k>?*<mduPs|<f>UHiD(bnP-
zeHoUH%`B|gWImi59neNFc)l@@oyAnA4#Cj#qXl-_G|AQPJX7Dp2d?T`^u8+{DVO1N
zI40ddeg<QbD+ZrMiCyvPu^6EM>yE6`p}0HZK4{px<$C#p?cKDC|A{z{jW@?D3*qhs
zH)C2i(_``j@1w3u>&eo+*C^vu!t-)UJHZ=MULDl5DRBCIc8Ghs)MCrxj}bU;QeDs?
z(X3%iXb`nA%e6PuLVsI{2LJM|C}KiP91h1L{l9annbuW$sT}87++S3DY`q)2cU}`*
z=()7@qtdo-MX@zVRA=g2w>xhx1qFcazXdcQWMKmu4jG(;+QCV8aR$h$gP6b$Cz{aJ
z<2B6`ki;UcauoG|))50uSb+|^VTaLeJLtT9HDTNz`OTIoC*JA|5w;l$sy0Y|V_^iE
zv0rOKCoyU-cKuoi%W>0B+qMs8U%)S&Q7?r|Zy_07Jt5Y4z{eP*e%)iU9<xYedb#eI
zu@{lL6roUFxf0Hzgi8x#Vv1(@_B9AOMtx|f;z@!scntUD9>_`YhSJr1xZ!To`s5PM
zQdk^{|Fj78iTuy+duz0pHw;UhPx8MQc!kmRhzuVXbvzb7UZVgvYZ;Mn>5;z4sG(7~
z9SD3hhAsDeBq87NT2`Q24JUNdw}8`>L@f#JlOxi29<5OHdgWS-QYGLBSP7$5gv+#v
zh=#da%J6hp&67fRQB+x82R<cn^ODdt{PVL!GMTVG4hKYaGBwdL8@5Id;S{;S7>i7#
z7_5=uQ%12ac!q`K4;Q#^x=>~c%x73rpGI{M-I9z&W<KcC{QR|%sSyQ29AXMbTb8}k
z=r@CwCs)yklu<<KxsZ3(nENQ9VIjzZeE#OLP{f2&{k&4r?m4mgEK|5sTFQMFjjie1
z?N*~Uc4*(?A(%xlf{KcQV*Cg8zwgb{E01Ybg$hP#Nd&smk<lW}F#m#>C~tpkNs5F=
z{@H}kUD58P;6;@u!E<l55p|Z;ud1pX$t|_(-Kq}3(-oRaUv-72m&VDtk{EA+ETXab
zMVcehb;Q`xLqZ33P_hy~DGM?_Be_zI{#{0M^+;L>1=_$&Q=n+XRDL@Yfh504D9nXi
z9!3%5`e)CtgK1bE4J!RvMKuYduo$0DoVkPOSv{r~r0pFbBqNb52t-R4YaSvgAD6l@
z2Jy+ja`0nVyo|l#KnBqvKp50@7?_d$he(9w`l8k2qah?KVfj|ggIOV2{k2ehhOJF0
zSYFZ4Auwrl#Gq1Htb3MfW(!qoU+OYn`$P`~TP`*U0E<y60vu}HuQY|^X7y`ld)I<`
zhZq>a8l5Pc{E(1Sa`z5@PCT&7lK_%~=f@#%uJM2IzWDiB6Xg?RiTTgGT%E4YaGKS2
z(YC@KglsejvJz2*7zPt7JR(;@NA(D$NGRP-4M?VA<dJbfLQd(nV^S%7<g(+OQ2{xX
zWi~t10BE_G?6^}hDvniB-0M3s@m0KF><4~PU$RgGHyIE*3KX|pQ3_o)4snODBAc{x
z6zqwtjN^uhsfs<=|EF#Y6ZdhxQekILM%MM<Ze!Jv+x-bnE8k1d?;v=R`Dn`xE{C~?
zNShS(yqJgZ$guYU?b}X)7d3w8sT{bEV|kY-g86d2IWu|I@b|V_uR2rN8gxGEAIdFQ
zFV(bcS_G2z36_i4zHvs-TNT1r{RJU@xO?l_zDKgPwe<LhOglzg(->x3i5dv8=Ma_j
zKQQq^!V;R*%}M_HBb|tENy7IHpNSdtpCdptFMFetm)eDy^pe{eAS>wSTG25Z1wn+f
z?D*L)kmKAtQ{F%!3}ab-jsoJS_<uVV*02yqK?wsc^`qnE>G=W+4cXty*V4hQaTzcj
zd7eEGgDQh>g61l_B@Y>DZDC&mSj?X1hT|wJH*1};Y7BoUqnA-u$Le0Lhf$Dz4#QZ+
ziX3X&jrq0ri7&+<V=ouIsr2F>jwaUqmI1vp0XF4y?ryq0$6aljYjXrv%T4Zj6yV<2
z-8s;THswjF152zWBpH6jg-`y9<lMYW8w&*iC#RSa?hpelwq|)~%*BO%sQ=tB6}pFb
z>d(Sv_bG<dKICwG_K7aPMp+qgH2MBs!Eg{2{mw$er3M~^t}Git#OJxzOq9lDgR-4c
zg|ZAH@9|p4-5U95dA&B$E_7BkC$kkZ1c(UNh9B;4RdF>-M+cMxY7{%Ty;M4Zr=NNy
zSi*_5_DhwkEeS~F=hK&~Gaw-B#YCz<_9<m^$PF1beUUzURGVVzx}h>bMTwDw%(S>3
z)A>3OIF~02!3ke6p*Qgba69?t%J~qgV9IGln};abU#+hsTRt1J@|;xogdKT{V34sK
zstnRiOU~5um#=MB{|O+iWGJ1e<FL;1JQ)l>UZ}6JvXTuR76T_u%Hy&f=rVP33(v87
zwU<(-EmXdd>;}v#jGY*UH}d|XFfwvlN@o-N*wkGz{ZQwyQzxJhKW)A$%5=V7ciAW+
z;apr~DI8j_EUjg$mbNIgkH%fjK;|m7X|WE5PeF_E37;D4<Vdgw(ngE3E3h)3W#k(6
z@W|G!!Hd|dV7q+@-aoZ(*$qf<f-Iy|Zl^gKUxIJ8fQ9BL@5`aq3v}o<H+eVv<1H2v
zr7SB-u83Mr9RK}VQ9UtYIUYCNUQ`#s`)K#an@O(LnBod{$rrZ5ze{!!MDw%j9d%6)
z<1QQ9={D<)C?JFBqezcV<FRDU-lOYf3j1dcDEURVqQ?GR)z9Ac7DR3OC{3BkkJJkz
znfphA;K$f10lF}OB^0}4cPeGg&1-1zjtW~!CivFR{>i0^|Mtkxl|fLMV1M8bst|pu
z<m>T+OXM(Wq?J`@F|BA2HRhZ0?!gL-7#^(s*?{3v_)4Rh2r#XM3vsCTnFbt9Z56Ls
zyhMrb^86xA)T~8{3U;wi^zam8ed;KqU4y&(wQowgoS`{pk3q5}rl=jZ+&ndch$dt^
zEjlK>hjHAU`!}UrGPK%dirr$&X`E86F>k!SWr}nIZp$PJDa`W=$q-gtCe;mn(MV<k
zen@>d(Q1*|7r;g2dvQ^m%g)6P0H|395c_kRzrM((E&QZ!3@0jkeuP7?*8VQg)q#v$
zbaJx*SA2Ld`nMXi)mC<tpxk7xSLJY;6{17=JK;z<*WD%%>;uuXA$yB4Ju1e8F7PyG
z{0&6(*GKb`{CDONOzvUGMf>Ma+fyR3$%@tnP_`!DE7YBq3m(??f)JX3%q>%{X~?@R
z9dNjb`4)Gio@*NX{yb;wW?HuWX`;m%H`RL2F;ADR@$fdnE!A;pTj=Aw>Qh;cq?HnP
z7(8mS!{45=&P=@3#^2`y90Z&$=S$O@n^|8*%mUkW=>7DO4||_7AI}zMnUR^1SzY>l
z31-lF@Y1=do{$dH3Ho^OV4D&(`v!BTmgpz8g1!coX^GO;EOI>zuWz3BrXYpT0{~kU
z7Goi*ogm5Qeb~dk3a91>umNV#Q$+>^XpNDhM&toI7!5~uKr6%)65$+KAI;6O(Fk?>
zjH_;F$k1-NgSo?rTy4PLJTkGdk?`+hjUilX8_yx1yZfeEn@UW2V{0XlubDh<ILDyI
z`1a_(pgG@g5IYDqTaq6#^~Wod`^i${{AJJUrjGOWVI`MlI_527N4s4&;FzvFY1f;d
z$C+qG^vQmB8YRHd`h;x##;4t6IiIf1#;8=Wf2j3|R(OtI%*J~a=3(Ra_AyRtu=@=N
zx`Rn;!}a1W8?vuFLASa6s{PcryTZHRG_f+(VJIAF7ZjuI`q6Y4@f8X!r?OLj;*XHW
z(zL`So0GJmjDrGIUJ$rJ;ffjlgdmNnb<e@m6Dp0%+RJk}luNaOc+5nC-z$==gATt%
zAjzUOIM<jkN9tFPf|&H!h;FRtwC`D0tqt8$l8S<i3k?N0yE-PHQLXT+AF5fdteWuv
z|Je~A*Z8Nlx%ED50xus-xUV(c2tLTHL*^aUtyM}1{RY!&{MhnhJ6FHxi9;xMfOQWT
z3h>;i<8?#KfcLbQnO&O+J2X`#Tw*>kh?mOUx19we)=hx_q4y`F&gK%g5$>?7$LU1I
zo4^11+gm8#t%R6nqm9seFj=PC`_p&BJP^ihOKiYf&SPRamp3YX+jErd-Tn>JY*m+z
zpbToZR`cyT(m_-Ua{Vb0w1MrmRFX@($NJhOga_Q-ezqFyB|%u$hRyp=Qytf{H$8t$
zEPoYPv!)`gjjJ^$hbrhtbRV$WKq<ba{Yq2ii}%YoPc#}sB$$;O>lQy~Zorn12POmH
z$JOJ_7G5@0kwlrmm-f`Bs$6FYvde~vf!+6~1U%oEy4uf%2R}GVN%!ZPq32?3<w6w~
zz#;v+0{uG!44SZif|@@U#3+yxhskEJmqd@72cgT8_vpYv2{-K!I_vrO8V^qRDy!;#
z@Fjac&EHJ=pI+8_*cO&|IbG~+7`td)7Nev4;DWTeT<7N($2&jQBaLU_`q1j`)f#?D
zlli!tGj{pn-a#nso1K780vQeRImPL6yK}0uhI#AJGcdgNyn>OYHvQr7vX|cJPSoFU
z_0=CU!`&oap^f3=iY#k!C;u!#bP)5n#o<u!-(OFLlz{Y4TiY7d5ee5lsOT?s>iPnB
z=}2}das@LbSfFqMw!(@Ug+-_8-(4@_z1xclRMTl<bRiqrNR+FI-NrXXy|sf?aQn~w
zWqK0`NeGS*wVZCI7c;{VgBy(BT(NxMh37DK2tnEU7f!dR(})^(L<kI>JiCqOgIaHC
zqhrZ`oVHQ^XiL~&Fytw#N{$9<(o>!%szyO^b~|ZP{){}Yzc2AL&sr%O8)OdeaCIy!
z#Ry3L9iH^oBqqV&hIRd91ms{#KN58~AoQM7xQXPi6^z3ZFpmdC73ZEUb#{2$GMAS2
zi;({M(lMzWX%&o##)r0g)#y?_%kA<`sMh%C0s;YSWn|R0J(YE(`rjX(JdrK0$DPLx
z-UfJRwZ=Xm_zu3rl$Vc({iR6m&!$>5%ZRjEk0GnAs4aUcE)7PPGov+7cDxghl>xks
z1%6X)4tRfU75erk%KlgE`{lr>90K<@Li)q@ZYcWL&{N50_unT!X~3zqlY&yp45+Bs
zb<0ry0pAQI7_;DfnieXx>x@TFoKEpiPk>8%?(;y@)_*X%E07}1h6o+j@pC!EREcIm
zvxo1JwM)x)gYR8MtAc>me*eziYWd!YqMcUh!s_2Y@fpEJ$!92#t7FNzySE9*r0_1)
zkV{g@{RA``hoe>NMw+-5v8XdcfjxE7<;Ce{V_uuZY9vZpljTx-0kCJq*V^{-{O39_
z)mN9G;i{W3*X4ZUwj}kd7h~<vU(prG9D%xaLkZQzc=ftQ)<%={*8JRj3<Puq+|>on
z_(_Y@0bI-{`@89*lL}4$3_}%5GO)7cRD}c8gP^C=ZcP^l%(Jn}gBI7J$`lhjR|w?m
z@lyZc^n6#>*)vi(a|lE>pcPv#l8KtOo7Neb`bQ9<2B}-#!&E0f4xMm}vR%@Y1P$^c
z1sr|AYtM(Lk;`@jUW3v{E1#pBDf}HaRu_fh>55BZ<tSrAxWNNpbP)9~d~~yK6;<AP
zrY<(D=oZD3%me0CDpqp?aHdBdRa8pc6Aatk24DTk+i5E-G!9SZf3B`NX>T@rwy70=
z4y%ZWC^4#K%&<1IUO+M248i16t(XbxXC|o`N1xZYzG<0#No44p4|NmUejZG^lS^?g
z>rjR!LB!d(VJCFH`+2BQ6WtV|GV^Mcv^&VizDx0|Us44_0C=C*Jo|?31~(oZnbi7&
zw)!NGu8J7hKp=e7jz}G<-ysJ!U4%kTq{X0^?Ltds!RP0?w6?~wQeNxtr^yS6t&X(B
z5d-DO5o+WZQR1gFB`g&Ty94z=0;3iScU|wsd-Hj5D-T=P%~k9W?K^8K#WLc+6iij&
zl0K?ByYW;<%DT<H;j+a_?alf5^x>nR8pB<2&@VIdm1?(}d=^9Ja_u&|aeQQ-Xe6OX
z9DGpe&up*lVb>g3;l<r12m_4PHBZZ3A`rSy)NUZ8BpBpEy!r?Sf_xOv`6ZdsCbC9n
zyY10l4blTKmqi*0>PW^Gon{&mcz+TGDKy&(>J+Po3>obIyy^jik`!AEu%nTC(Yg_r
zOt}wNogL{AEeO_gX{FVXVA0u}j*VES*H@d2S0fh^3scP$0g?2rmJIK(iiz$k{0_ah
zy8>BU-%JEjVbUBx+1*mFTd>+_H$PwTt7IDhJVv1Dv*EbKa;+zTCaB*SOcbFvgJBY)
zO{pKgGm&7B*fhcjy`5+p4k1>KqA)_MLLN3)iB*I6X*^F1gq#&)WJ6qm@eR5+@|SP`
z<t$2Kb5(zCqm`)(WkzY0jOsQF)Q^;zmAN^tXziBgjPA1^<hctvbt|~tF_M(`S)9vt
z|L*2553XBQ#+TX1Qof%Zx<S_`g~4m}F+qd&N-S~W{gl)9R_RnM0bm==%cYQEPk<w(
zsF?rT+bXBk@8@nfBvDa{y>bK3n%>1wK3c{>o@Dy$3L$}bt$XX~&`#<Zd&+ZchP@y8
zo+C+TIUfe|4pyXw!9!U6CdFR|WR}3%t1k8IocXaK+X9Qvt+(-!2rb=bo#zZ3ZTXzy
zw*0rZtRFqTmiO_72Xoc{t^nHIGg|7w7*Q^y9^Hs|jP@U+5PSV~KaQ^V)i?D8QK^)$
zuNm_)w;G>b5o9<mC0zK){)J(@|J+~1;7-nE9>7v|k_!opHFL7sq)At5%QYg$49P9*
zs%vo{=$meEsp1q@)PZJD!YXifxL+X4?$DV(J83!^Ub%j1HaA=nRZuQ0ofhkX#o)ks
zy>)+qQwroTnrRc{!e>1OR8rH~5y7mYt~+!?O<GPqr{K~LFh@4dTTh43&xk+HNfPAP
zKfy6#+S<95j5?|~Rb^qYSADh<FL1RH5uZ8gG@7i}VYwa(yxBQTI4v({Q3Q8X>j6&c
zilJv!#ENK1#6yt!&V>XxT|=!+w2ePEM2s9;hKna+*3ds_bL{lucrt&M_UEXEPgPfq
zz4jq52{jgC9F;tRrmV3!Z-UO|Je!%8Lr90+1OU9NUA7bi6uK*ard$yL0fEI;!V3Hp
zeF@^9{#K_`m2$Njt5r_WFDt7I4vU4p5KN0EJEJdOjc>_7psvoVq)%%uRbP#N6JVl?
za-ZL_F}`1WD|<*+!UrdbZ=lA3{_43#XN&#IF3obbyQ$7{p0(~>AT2q@hMR&=EKy=7
zuCg(!(QPx57fu}2W90I(e2N|*uqj`ww{vJ^6iwgweR?hxN12q2?c`K4uGyFfihX~7
zw_0s1m_2T6Y*eF%1qF)a6cw3{r*c$ORHS^bSiFQYruV#yXo0)n^5gTk0))ZyP8lRw
zG}~Hf15haeR3RL(>lW!BLdCXKcVqtRA>BdQH7e||B<;E%LmzKfU8?Zpv9bmRsX+ND
zo8f%$vUm?YU3Q6IZZ031JB0!4ajOnJ_RW(AXWBZzK5b&`U{91}uWwvQ6}5lyk@$l<
zvY!_NFDh>QWA9FufQ#xsR7^u|<E9sz^h1@&P;&0s(HHY!^4=dt03;Ps<hun8wuOZS
z9TsAblS*&wM|I37PGaZtK<Zr@(zgoIIAXrm{i)^Iq^jQ!^NX8|NaP6;k_#1@4<}_+
z0DO5jlCQF&0tEy>d;!eyHE<HBm4&ld?JE)#J`wu^zq-t~MThS+muA6YWPk~-5!jZn
za-901{8r~53~!+ytBrqUG*cr99X)4tQy#~J6+7(8qX`r|jgvyr41iy0r*Yf$0F6GX
z(QvF(E2Q}k3gK|gAAGt{0R_5>9W<yxz@)SU_?#JXsu#N_TJ8S|3wBP|WU$9CaedPk
zTU@tmdC2O@I#?j(y)U(ApT{*n-Y0QxVB)lM+nT!Cnm!_$7O!Ja11r^PAVHBr?~l`Y
zvSe))73Yt;QMv#v1^}v#KuTGG&m-+F+_D5dUME$WS*ePh6_=t9=p^$sMi$_a(aB0I
zEU~=7!r+AKU+5ZNW%^|xh6$>=I?Zklj7k|X6nGAaFsbBlg*s#ZU@DXOi~7Is3kV3@
z-QCqP?BD^GL53V)T(NU;soJM>$W*l<Fsj!VLxFgc7_D$)+!t5pmlvGJHsYVjyr11~
zQ;o{FbY0Jm4;=z`>ZLFbh?~7dDFvd5T0d+)jtFoGI|T_1Vl6j21v2DTslnnv%kpMy
zSl3X$9m?fD6if9WJQDLr=!OTR<4Rc}yNemHa9~JD3+Ddn(WEp0ks{q$RQ!IslLaye
z&6+7kfWV-Rw~ID9UGMcNr!oW(hY_m;p;NuLrV)J+O!bvfo%*%|z`BvQw6r`sIVr`G
zY;8T5U<tGxTx%ht2x;RzU_VPatS2y%wZRz^D9nisbl2m5n6dD0S?i2jk>`D8t}%Kl
zZE}BpE=w?MqeU1Uj(d0$TY3Az+WyD>Mz-tsKVKmS+SL?X+`mO~FSp;4Jj_&m#b_l1
zQcW#XuXr$OP9?`Eri)F9DvH15b-%GLR;stz-5fZ!%0-BYX=Ttz1G5O?dG~x$Vxs=t
zzm3`Pr$bY{-2}59lF4c<MmeR$XjLilaw@EjcM1lz1e-{QzUjMB|4!0r`em0iYBBvk
z;Ys={%f*o4KAiicXEnp=y}du%#=E)_$?^ak<X9YDzmIROwVlB8MQju-uEXMtU25!|
zEoc}|_Y_oiRmh6m6Wa1@1m5^Bq<7&QY^P4hu5Eqc*#li2vN6%S+bx%_JC-Zti39zw
z8z9lO3blY{vE<})K3jU&5PKF5?-IH{>XZ6uc;%{2LbG=xlgQ5kDZKM{n2~Fy7-axJ
zFI|+Cmnthk608OH@0ybv4AP>-uyj)#{Bmn8Jl}CsiNx!^{8$@hI@W0ZrJqD0A6NuX
znr|!)Un7GG78x{nUAA*uP(T@BRj206C=hC`j>{Bb*yDdD`jM=vU_rNx+AH((4Zr?(
z@=~kaR-MU5qB)t)g;B?Kb>=upKFN9CPHnhodU|ypCZmZVjmf#q)#-Arh3E!n;?kq_
z{Q8Ng+myKeaO3Z2iAT<<x%0;mDhj#+Wd?>fvD;BP*{6)Uv`9dymyf4$2|ew_4HCJe
z|BVHrWdwl(5VP4#{=<^kb9T7A_j7mwQ)fOkVq(1%JT*qdM3(o7WNTxwN@MG2@AgV;
zqN{ZoegqbWK(vY7_1<v5fgK6o5H3{A@#ydt>|szmQ}@qdqpiG|dOb}l;wT)%KnxZP
z5YQuCxwc=^ohNtwnojRW!eQ(*ntqL(FqY9jo(YsOuJE!OqzDUOTxzj28%%#HoXxR%
z7a{$d^gnSxUH*bzDKJ9kGM2L1P>!>bu034lCI|H!kPhAhUA>CM=>-s|qbx~e6-GbJ
z5%&D)*axVCZDJstiGLxB=<N8^ru>TurOv*(CZHSm|NVsmx`}y!Y0R7<M-UV<nnH8Q
z)N!k*si_&Kq|%T?HS;oF#c@_%Q8y`Y$#$5by6qc;Zu!aHDrR=2G>D=NkvupNWqXM_
zGi?NfvL0OQOV7b=_#8fOQ%Q_F6p9<t9T6FF4y3nV|NA8!SO16~+Xw{oU_e&}NM8c?
zO=f1MBd_-QyfYzN*Lh>5&ab1B+x9kl<Xnek#T$1URns&))_<@x`B~XbWeyjF%cOf6
z>aV0#OjQTyq`*V=tReC8|8Yz|`kEGSw(P=_8MqS<g(G5v!|r%C?8fc3)10KMc{kUk
z!+XAaqg5JI`R98(nv}{iH?SyHJOaPLeqUN4nj4UMpsVe;osj_|3%37!`A-OB42Ox+
zBrj!{@vvjh8uj=R9IenHKvX@c78VatlH`hW^+1?H(6`x#jLzrr`Q@|hzp=_?Di+_Y
z&YJCvAGGG`mH1C|H<p%~O~zBdQyLOb5bx#zO#8a!+DQ0O?|R$=q|LjN0&Suj0uZP*
zvGOA0bOy4m^*025w!@XI%<2J?r7e=J8H{FBy;tlR%;rY6%du4$-vN{Pkv1XjkGsqu
z4>7)f=ZOLZoHU-mV-E@+^=woMoaykqiq@&LUoD(8Extc(Q$?n_|FDpmO|0O{^n9PM
z;B)r6P3|p{#eZ6f{O^N`qt@8aAn^LHm!jIJ>U;jDp~v$oo8Lz{aG>mR3nY*n&;A^f
zmWR~78aOZD1O~5dU)k!+1TCuH;0+4O$>|uwdHmM1sO#w<?QQw%H-)^KM}jgHhg`ee
z!6d;S&eV&%l)?rq0~(r|T$W3ENwGuv&I-{>D=QlM=u)DZhq-}Bf#t~nfDILt?B4xa
z5Qfd5W$8|ie=w2N_OCEd1_IdGTsWSeg1|q}VgBH)No#yUVzP<zx|XpwGroz=2upf)
z8i(C9bG=<gb&sp;FVx*=3h{`Y$%JAox(>`3O>}lVQy6b%%-}uW+r4l*x-8pNZ+p&Y
zm{<!F-=Ppl@3plGj3_KDjFT5^flfSo3c2mJvtn?&4xxFuz>y~hI$*)1mqDSdXODeh
z5k}^(14~U^Z|A2rkNsbOHG~!)n@q{Mxw)m%dlBCJ9B%<p9hcV6?)kNEK?K&1=QiGL
z4u^8?4HB6i_j|M0u8r%}W}}Zac```W<iBq!xZr9<Lrbx)11-Hb?Wod!j3n=S+$2_f
z$y_FG^plO5Sz4n0nGeVd1{Mtgmo=d->R)riPf>_pq;<WWkLjv9R$Fqag!uHeRv%gN
zKJn@W5&1F+T)4d!^a`@C*8O`*O3HHU=~m7#cX4U@8!P%rz;Pm-r@>V9>7S5ag(hbd
zF<WD-)n&)aglZB~nAiv%O25H&Hjl#u_vx9mbKAeNB<FCmF;rBOx@8Z+hZZCz<e?Rj
zVq>ca{w3&x9*P|xMXsf%r?%Nv7N^rnnoS2V5D*TC^yHNWD9`Vf7M?VCF~de;^ZKf)
zN#9qv0ey;Zw(GrDJee=gf6&{;>LkO%QCb67CQHoj_h&1Z%l#6<pTmyWCN-+{x|cr_
z2gl78m!3)4U5tz?u6wc8%~W7pepz-yyZ>n@YT~fis6?BS818|w(>YsMxmgW?4q&8z
z>?|L(W)cyu*@)vYB(N;3t!e4c>jSQX;BcUYS-bC7aF4qY9<A#T{g%CDE5$KQT+i{&
ztg+A`I~X%gF3xSNXm0$_4cy)N;%_3HAMWJ|wX0~!Y}DpnH7>gq+^HLCT>8@(qLaz5
zvsFTxH5CH<1XI3enBW5bMyy)DH*~@~3YDYd)2I?=Yo!VS1FP`%`e>nsn#C{OIv-1z
zU)6}m$R2|OZp!Y@oU0hXQPT|LZ%{x8AXJ-ub7v<6bA1X?MFSt;#Ze$|hg=bv^{zl{
z!jC+wO#8x)TdN=|yXt&q^u0ue>QBwC@7WZe#lpk=U6oo#qjQ>tA+!WP_T8jr(Bq#!
zS!L_#0&Kt}j(e4Hn@cl|qR$ljcXO6lfgr$Wsc|iDaGHzESoaqd&C^JY53MUgo@lx}
zT5#O;d3%Tm{2{y`4vfug!9rF8IbTw>ErvR%_Jg{QJA%k|po7!&wyi9U)hRgAj3!Ts
zV(bjXA8zk#mgW+M^G{D_3by;U+HHW4;jD@>nWo4Qkk5pLd<ExyAG0}|RTXL=&1K0A
zDVWL3up-FlGIHSgyQg+*Taim|A)~VLiDHSQl5#S*JVHc)tvToOop1M7ZLZjm$HyA0
zhMlOD;)qXk(aU-d81_RZ2tIsoIK_!^HB=W~DZWFgX{o6YunsK-ozX-ic(6?7_#iPd
z^l$n#lE9onez^%1#};5UKI%ar{JekGv~ij($X01n4sBmqsvt{{%+Fs?11cQYE@8s@
z{6a{=#Ilhv=I}MoD_?ZlVE+4w1&lqc(<EUzMgl4SHTMasC{+sZYXCo7Z4i#Q{{>&+
z5-6r)k9(sD-y#5aD*kVKNdH#*;2U7n)`voF^!6jQwUg64@4xMSBUo$$^Rr>&r%@F0
zLhYV!VgFWUOaJd*(rEn<7|@U;K|^R*<^7WX{~zXg<N?u1Z%H5@QWo+cLJK_c|6kq)
zbaw6sgAnr+GDv0k;UAy`jd-If)C34owq0L%?iigL4xlOL2HfFg$P-;tz%Vhm_McNA
zgEYw2m#jGT)ZwQQTMC$7-GMy84-a>c!k(hL`82br{EyX=^a}oQ|2>8)(-2#fngbA}
z^dq{gxa@n#ypIu6j^rU<S=P(p&zFhhnn}Spz>wwSV|G}8c-Zhf9NDiLdpR29EBs!i
zFJ(0+Zq+W4kMEmuS|$xI+Jha!8cfrGJG}8VX1}W4b;FeD?D$-JvE`uuFv)&`%W4fC
zbOlUWNPO7$3}y#W{I7;HtEGne(7`+wVUk}J{|2*?4TP^m;G@Hrq+1pyfBAj?Mc(Uq
z45mh`)@lssz>6aB*i;naEuDQ>0Phl+1mWE+rZ?Rltbe1|nP$bGwZ_i5SZ^;1&O5rO
z7S&+c2Ek1YjOu^!x-LOguS-oDZ+uu1$m%?LP5-;K;AiXF;5v<SFeC}{9_=nVJD7uH
zxlYu$`fMMk@Ows~xFPgZi}U#x>o()j#Bt7k;TpBGiwn8Mc?S36r){z7g^!&>x=B8(
z{RHc3o~_U%L>n8rcF#q(2d2j!ApxW&0ruTePm1E|Bpff+Ni9~xeHv^?H}StCq-_=d
zlb{mWok~j_4K_&9Xg@3k;qKH2qbSs%=7WqT@hEF|!~M{~kNZW5FFJ$~;sO!kDpkMV
z=4L0<7F&Xp<@M^WrdRd56Li%<4?_4xC}VuP>}s7R9j3=2LT<;0Y!{smS=&GY@zSiS
z)&m@ZGQOni|GOz~uq%18W;(hkctX9R)^ie7?CA1T`)=U$!{d3lNu_Eh9SI9Pk?fE^
zQ<Bhaj>YK?W!d-r#4i6Pq;0D{$|?L~>B)9c7jo}C*8Otx<8^n{b97b6ZROqj@ig`y
zk^IxhqN&&0=zMGG$VKCSufs;KKPH-88d*OQxv*F|n#EhieUL(r+G65(P$iU)K5n{0
zFEc(qum%o4<kw35F&vRSHPdH1xAQ-6e0ISl6-8?{AGPmH54}%=O;GjT*X+%2A$Og!
z#N4~*MV+jjV+boRAAXkK3Gc%Gm}of-Se?>owETD5cT6l@-_MHLxr6I+@X%rn_I(0Y
z)EMmS?1=C@?|D>S2kn!Y4i`_d<KuCZ^3wqB8b2-dcdL7&<x0GCf#_5pf=uv_KC^{S
z1YbIcus!VgffavONLzn|9R3K5aHpasv-H<}Y!dHlZ1-iYacHiX9w)s0Uj?VNW9VQ(
zPqYk&Ldtp3LXeOsf)Wg^&a8jN@KVZhA{$Ql!pUZ~+T0XR%Q93@d7WXNE>;m7T}t$s
zW<3pJdVAmIz+J4HUSsKKHzf~x+09#&Rj#P2(GKd|;k)YPz0q;$)V&`1UX<K<w|v|!
z$E}PK>2D;c28gfgKmK0{DlcSMliJH_KBL?1fc{!kRtWGpqB;mVQX5+KTa3C~EYWy`
zG31HMuexjkh(S<z&DzwD8a4i-=$85U82Xln_c!nNc*Bx*w?HOAmiL`6&@Dy8FALqe
zS$3+)QlwFlNM0W|%1Gp<8d7>?uK)j4(jolSfKO_{3?~i}GZh2tgvFda<qX7rd0QF|
z6xn|A{upii0_0ND^Yj!IHQWtAI1e<~&X-Tm9f(yvzt8&gsvmT`$Qt;5g@oGt0TD%Y
z(pRMgCG=W8)K%L{pgQ3?EVq%61ozpm-g|$*0yX;mzKXDM^?wSi3nJu~SFqpuqVh7T
zu&|aIo!aSgr)qd?$j`zokCBon{?{#lcWrn*XZED^e%_=)x)XqasS3PGM{ZQ#(^)%;
z;RI7Ly=%|=wkW!&T^&EJaJn8jL7<_u@UF-HCMIkoBq4;2E>pKZhr##6A}XkBR{v9a
z^0F9M^FXF$ZAc8dp-83Em}VDog`$w3CR(q$L`?La7ge7aF3vYfip_uiWMg*T2-G!-
z5rYo}^d+#JEr0FfAx$RSFFoWU*~;aw;S|5lRQ(=rfL8msEkWe6$1=zUyJL5h9?E+x
zj`HolPGYx1FPg;gm$En+{33P=1V(jnPPD76Nd(9qc~Vpo1e1Z-z^wegl2O5lLK{Jf
zX+=~FJrDL_m8+AJA<$;-Wc**R)gar0h91+L0z-&qiNo+@-eeAaj-kp`^M5~cg)@)7
zg0?#qwL|M@UN#2RHQnFGXnuh}0C^TwEM4+n#$0tiP#gg&OpA@AZD|2$w&aVEmD(Qx
zc5=|a5cl<mI}KQLTc*VNez6NG;uN1gXLc2|av)p$N84WHhzLfWK<TB%Zb;JAR!H*&
zw6Hr2qmi%STObGba-b$6^qzTxg~gO`Ux)*Sng~06lh;eKLKfdcd5xjCYA~39%c|ur
z(tXip<K7DnqnG)N$w0qGjU4>ng!f|o&Z3Z)y45o<&vIt`bT}eau?^SGcH4J<zN)Nz
zS6?YC1{Pt0H5AP1`eHm9z%OhN%pB6qbBGMjtt^|MNPjTNcRJ@;B>S}3l_m5%6cs<<
z2LAmRGbs1|7?Q=a`*ZVc_>RmV2`j8$;1fBdNN9g<A;6&kNS8c-kn|gLGb3wrIchUu
zAu5p_0%L@w(MNp~Om%0(`D!Cq#Yu7W?$QE8%>a00e+MwCBnXxYa!Y*P6Qf0+or`0m
z=`lz1-Bn)V<*~7m6MS-c`5?Iw6a))$-Jjp*dVO|b7?0Q;h};h9euA$z9y`2oN0MZh
z9X-71HvmHAaf4zeaqLBTw$Ew*i<-|g$LsiCy^31WehMR#p3{n}6G4$HMgL7{zT}@K
z3@MyiXgA?R<Osu&VMijmSSsL?bGmGKzmyl5JjcS4A!k~*4EOPTbi>3D$3WT3EGM*Y
z2=~QttG*--i1oISPiEF%ZL|uiBnWLhRZSi@dEk$RcS$TX3l!1+_1{Nww*Ks|FehL3
zaghE|U~b~%KD;?fxCJmS@|%kjhJopVYuU;-Nkx|V7sDss!vp81C0Inz9^8lKLq=8k
z8L5%zr#`(j9X5dC#xqQ5y^SQ|18rrvEI3*(eeWBLuqO3mSatc|SYmEk5CVh|(g$1t
zT-;!wFV>^IlkL6%Mi*A3$98DZ($&?iQCq43l03LXS>v`=e&!J1<No`#OtuRU_73Be
z>=3-~uXI~|^*_wj6ceU)2|>YO*{%C4GfqT4wNU;~ex249?|bqYupl6MXUq`rrIQi2
zU2nbJ*L)Cil@f!1(NKlUrkjk8)y0{o#2%te*W3L=PedlK)5_aJo7(&?{7sjwnib*#
zV4d)JH8ne9mJ%uCeeEar_4NTkXU|E({1FH+9aSo@BAG^cud}EknrA)H+<Z6p=vsD<
z5+|l(mZwweT3HWx^@&{8FJUim`8n^ajfj@Ge05QGPxqUilpx@4rrgMr{O~(uRc25b
zsfzxp23%qEq0aVhf@z2cYIEC0*g)%ak;iqsNRFC4RDBi0cY_tx%F>ZArgqo4X$e$h
z<km}yXIWeL$s{KaqSEUgBql<y$88EZ`=y=i6&k{bVy^e+B*VeTm%ERR+><->@6v6i
zYSXiCe^G$^D2BPP6GF3AU5V5}N)Xv)Wpo+R0H;^E6p~<}>g9NcLfk<c@2j4v0hx#^
z9tj!oBOPg(G<1Ne_f_;P^0GJeAKXt^h$awJF{<B{s456aFz}r8yw9f4b5GHTw`kqP
z+<OrxOGmCr2w8j#D>Wn5$grk7e;^*u<8f}j-iXm7j0%d?W>z^IjuT3}2w%@ia5#EB
z%Ojw>;Z7uaSkU6Z(Q9U18r!trtAsR(>d2|^lOW67r_8*c)T;h=+0%VoWSx{n-SFPR
zO7OzqJ6qLp-PWxN5@^=0+9>`<Jdw`kIof(rH_2U9;WYM8*$Eqp)=dt{HhKu6=TaSS
z+ZTxeR&FqAw_<_#)eL6Y@Ym41OF;jCOowmlmmW>g1RhTf#-XKZOddn!We3Y-v|>gG
zQdAT?^)&n{MUN`0Sln6>1`wtq&a?X0C&KfcAnGp}W1k>N*mNcBD-H=qJ+r57;1IEu
zi&YVj&4=DtdNOU4PuWC3-$bk(92Cn#NJ#}CK|f1larXSBXfu3(^|!$jZ^A*9R1wsp
zn^SH>e%USg$;i-|Q={~5PY{%l=xXkw<wNWUwIx3eh*1LLv_VkvDLu>!C1|n0N-US#
za<8|HjZ9#&tMlZf%qtsLp)M;3p+<>K+6YSl%XlChFHa(>^C&mWy7S3IDA6|NS;oi~
zRhSlCHm#A#Zg*Z)C$c#7*B&u#H7;ydE9t2Nt2daX?)(_{1j0aBop|1yJqMvVGigfW
z2!rsKj9U_kv+PdvjfA+)_@cuB#ci9mu=K#($t^dkGK4q+40!LIZ4^;qPc-x{gdQmX
z6J#5I5OO$SOKXfrA`*Q-;5u)liX}Ozs)Gr2I8gb7s9n%$Anx{kMw;G<CBvvrG_hqN
z9K(hf5sGPuy~dmNyan;|kr(~dy7$L;{iSW7n&PuDQ(*VS)sDkxB+vH0g~o#mSvOc(
zkc5nBdB2PiRtkV?eh21%O()V14h~MMy54I?8KKy^7P0fi690_O2?N;3TbE7G#Z>q9
zcwtjz{9P|ohhZtqXZqeoL>_q&opmqiE?8@!Ow$FhWbPn5gr0SXP;6h~a<St5FLe$@
z=iKU-@2|oaJfbTcI4Z@XlKT5Fxk%ii2T`N~tnnn|KL{TU$%z+r5x!9!ef`rDqL#u#
z%pi_?7K+gJ3HE_bLX6@<=%#~Q&9~&U7oEqqA?sN&_GQlVSYi4r`j`i7n@I7QX$;dM
z<FLStZ;Jw4zAfPCOQD-&N3j}*k63-AktUUjr=4%QkKHcb*g522Ox9_?IE@Qz>QMV`
z7@TysgOu4qSqn?c@8lR)uCM=j!KNj?oP$D$OsIas7au#CpDnR4bv^Qzi5WI%p>!iU
z{k1$4M2{-)R94oYRc>vkg%LTu1(LEesY}xZhS=xjkAkM(QlGLd@)5j)OQ8>{Uof3N
zYFh7Ln2HNL*@Uh6G@;5-hWGcNl4E}hPl?1@ef?zbk7-Nsa6@(ZwJa<~i3kcoIk`A|
z!|<v0M{SvhHRE<sFYv5ocJ~|L<D;z0cc+lL_gi%w9A|8o{_*`9o;@<J=kl;OnO9*&
zw<WXFL?VeV-rPBieIzTD2dUq{Mw$9+&Z}0w7hfl{oOiH8^xO>%$zuBPL24V{lfv!T
zl80q9K<{|s%I1A!<odnr`&+xP9k@q{e3_~O{II*O15@W=@bM(Rhw2LmXe6V;B_rtm
z`iX>JohA$BuwsoEb8Md>k|?-VT0u#kR<)mT?+ImaBlXoV9HB}A+AGJ}z+FTMn!Y)w
zNfUL^6A_RPh7(4yrjEv>akM$M0V0$djgQB5jMzh0hi%?g-Z<2`#$g58ZAy&!bNr>#
zzbDA$GgEoMK4Jl)kS&erAz$^H)WJa90TCt~2u$&db4ia($A%{%B(Qynvh%T@1?gWR
z82kxgMzNu8mMnYv-V^S7+YdN8Fg3isjmcCQ@kn6-?~K&F1lcEt@s|EF*#*n^u}RXZ
zqO`daWCVCAw%lk-3X=f-2WBX71m|7omyK?sx)O4wZX#UUbyK5zRISNWWj~Kdo*ogu
zk9=Eo1W|WERdxl6Wz{SGBIc`e7FiF@8c)I(#vDEbqJp9J&Fg>kcJ!YK(gf7}I>Y-&
z=5Cu?0=h{JL&CvNM1k50i~>pG!fK*1CpO^2bP%^4mH5uQG#0zxt%VUieMD{h!H$=_
zR%yn5I(haFVOk_yVu-<H3%Vc*_H2w)FJ;p1SU)|rhw+9c#Znd5f9a*XlT$Bx|4Ko`
zW%b;2aY+fT?4ls~84ayP+}h5?9%m|OI9J1Fz9TC+bJ`Ch0iE$5NvueT!T0*-8Noz}
zjt;|RKP647sUSB2f@P=C;-{5G9WE9tCKqjyWDS*>Ob2!iFsQm_FEP!V*6aE8+a}gD
z`sx`jXX4{4nG#eq?Pn+J54z+X<t7govmNM4B?|nBH0_!@l0t4nWoayW7|p_JI-0G3
zgUEz*N@eD+We&0dFq7l+F<RY0|Bj54-N~_BMSLKX3wV(VSGvn81Io<>1J=DG#s9sF
z#7R$?TJRpq3yw}ozuI+4@5ici?^@D2Z8m>|#LW{BOb23?u+UH_(2h<F5r}H@SU4fi
z%?gl(BQ;=2oK%+@@$(E8d_oVR@S1y=AX=-t>-vZxX11mR#o>`5xQ2;2hklUOpvThJ
z%1e!eApQy4p0kQ(8itF3A;4=_YE<0+?f6SYdFknoF$4lmmK5V4A(Ix**E6@O(gqN>
zlKSA^(mKf?QkBwKsh$h(Vq=wwT7>qjTKfpjrgC=QigCQekYP8E=bV}>AKZLAHZBxV
z1ey2%MNZBOF4<Q#FabrX$xL6t>d$N5`|Hquo%sqocvlB%<U}18D`jV*S}y0xN#5u9
zt7-_<NWJ<cer)AW4W&&W=skzwhHolYL=a#oY<<#CpnY`}6+NC$Gek9{_2gvDqS@`d
zzRD$rVzks^ML&=Pd=xa&l`*g=R45XV;`1?L?kKmv(omsk*OIK=4>Bjo6{~iw)Styj
zrQ)(g`Lm{vV(^$iz)L9#A<-C}gQQw|G!a`O^bs*>rK_EdReq*+;=Nql-`*<iAyiN3
zP8c95Z3VD@EawJhdM+snF2%vB>~lZ+wB&n4aSei<rn49{sP8`_0>k=pyc>UQb73=L
zsO?+@DGN3@_fx45Ffw6K#k9cqCX9haF<%czTkOdYM(HvGAZo=W?Yi7E&}v5LH-Gp>
z!h^=nCmOpk{i^fZNgVjP%WBg_U<|04sZ|Pyc^5=zx(~yEXr4rFYqe*lGDN1H+Vb94
z@^BQ>P8Ep1IqIh6ydIzCOe=y@iz<gUP?~Tsly;a(*TBfXr}JAP^wKB|wx_0kxFz`%
zWyXvhV<e9&OYJID`Jjf5D?KVooa73<cQ5vT?eg58Z1CLy9^v`wQzt6uzq9|HGtSF*
z9Lf*EO9-#5taLhE09bIdLLd7COH)(K#v}1pyMufO!TYO<>kgR1R9o6Afe8k|im<qf
z&0%C>Nkt@!*h*O$${HVBQQ&o?NX95=<v1@Lg;s|K9~_O$ZG=DnLg}ggeUlLJDb<h_
z;z!8k9nE`g4K*L;rK@`#IqAo8#YL|FWhDw-pvFSy*`cgq-$ygWLn$}#gbEFMj&@#F
z?b6*T#OGm9>ia326Ozc_^)ix`w3L$(#iwXQdyU@UYv5)2l_d1g*0;)ZtL?0+xg5o<
zT(imgVy#71R`%KfFvLt=oWRo=RZUHo>n@wbLSF3xRO8$smND>RB(|zHZfO0L5lz}g
zSX-cf!Hoh{Skdu#!lb|JkdbphCJ?aC(x#=DQ~HdBirIQXFxFwoKUj|Q)~LyB5~80m
z$keXbajPZ*`%B3*>0u(tAeMZjx2pK_{o);oo8?6YtG;nw68`4tOn;yngI?W#{wW3v
zKNL-{cA$b*l)BDp)ZvnI!yNn&sAbLQSlfcg*U%%!Fg9>4V=EQmBy$<+sTG)Ea^8w*
zzo|ZSNv|YQxWgq2O!$|mQx*&W1~W`3T8zFe5JrxIvX9dH-<oo=q{+L7PwaE1t&PsZ
zO)GK<in3-Fx$qbu+<eI2GlVq4(WH7QN!{qS)?dGC!O1UIr-<Xlas<@V`Oz?cS`w9%
z`224tVSkQJn_4yGk!|wNaE?%a<rV^pzLMJ-^ItuT)f%x|!ru-eRa};exJuhZ%zs8i
zs*(bfxMZxydI<8A`n{%<CHsF|S0TnhS)wvZf(XAi_$6xSt~d>Q7}Oi>^WStBhvu>-
ze9J8r%!ksz=Ykm0cW~JfV^$h5GN`;Jv;UL95T$NrP|2Ky@q~A`p9ej|8=sE5e@xaZ
zPlKWSIe{ir11h{094V8hHs`3#1*8iUXG}T_>ZP)&{GJX%ZmUTsh#*M`77-7YskiL-
zc7%j^o2;<oQ2&l>mxHU})X5OkX8(?Qh=DY|g6OI|VxCRf)T6mh$wLPsRB;ePMhQ|)
zQ7H>hBi|T+GS(KJFLf)2OiHSk2Q;G{w-Q>lpW~`xRKM~nIsmfKP8G{pGcfi)-{6gn
z9z0!@H}o{L(S2CDveM+V8b3r#cMwC8p+EHXfw1A=iwWVY)k6IhPofv{N{acy2azy<
zfk-}fZzrpQ;mb5W{`tNf&#=bTajbd4*HZVVA)5h%ks_=NH<d3qsM|@jDM-KQ>9<il
z-P_`@8JPSpMxjeXB?8trx?IP(85*>hXg-x7Py1kLwKHFlL<`bAl^k+^wT1aDa|wN1
zeH}sMb}Ieulju`$C8j~LE7_+qM1v(Ocv&P=Hy!ciC7%R!s-UjAh{3xi3u2lql4_a{
zWGE2nEA}w8NFiJqK4wV!)Mqp{LpfG`id)Xl>L%AOfok`SPljglm#emaZ>r9?9J**`
zsle1=Mk}|KADl#JMx9o}7gs-ZNgBh=*K8K%^hQPz>$!!%>`m+!To&g4OcKtfFRSji
z)kE$8{v~^Bn@cCqg+zIu8PX+nsEdZ7a~XW!^bG`?{9C>@&z2}x6U+_uFYEIKIciS_
zBl`o1)jU71O6=~o!Ge(OWQ(PP#qnUt%by*UpDLUc3*eywRhLF}8IFmMH!8;3(2*sj
zgZr^Hq;#xYH4~Fn4u}orSuXYM3wb;(a7jsja-*xFW6g^?4F4UjYEXclGPt<DTq<@H
zgr?H125p`&9ycoge21oYKcAwJwXxQ1xRxEK_6xK7qMb2Rp&54Zmb2Lp{jY6vT?Opr
z|2f!GKJfk0x@EkL4RO<qLs$`8rtevSV_|8j-qO-!fRCWj=Dbqs16>r|y%ybv=?!PN
zx87f^fgg;T{)6qu>`X}C*O!Yro0rFhpy%lbln^!cTyc?6X`1#m_W1A+4<-p31o^Lg
zdD`WfNbXm~J*N6eA<$GzGylrE%^orPmSscm_2Mf6L#+*4_(9+)M*&r8%hU7ah1I6(
z^}DJHZLZ|epX4IwFt~`p-+G7rqU9q?#|n||{)RMxJV^#!as<8x=M5P92e}1{CJG5K
zKt&@gc{kLQF=K!QSu01cogg#ms#b0kD1|btE=zKTE_^U-h!A)-Wc*I*tkd_?g%{No
z(w5ddMkEd<($}W5M(<Ge?fZ95Dl2#oVGlQe*=iCz;n=~yrcmz9U9`!T8wNP#|K6d?
zzf<`1ExZibZT*Jw|GKk&k%qB$KDz47l|9mmD5#ghB`z2+R~kmX;dXr=e&eVr!3G^}
zjCC|6Mw{aG_r3^|8u2GySXqq1IKvIqckYk;-3_(Xr>Q!o^3!FhY4~Df-0Qy*XcH3z
zg$QoH2s7q%Ud#*veY$0kYOf~?jH&@+fk#m!hu1uJD*68b`9KE06R$d!7Rr|z?33lg
zw7iMe>JUfVuSJ~fMj@(fi<mEwRCx~We0i=Lp|gPq2(VC$8g$MH^A4FlZNtv)m)5MM
zl8QV6dU|F!^;`}cot42$C5`Q1dF!5J+}W-?Fp!-bTnd9o?q%xFaFenr1I|ifr7iy!
z`=F@oixEmt7~o7Z*Oyv=NPT9#DSKA$NUVI?fyYTmt|*fexHSxJ7`&kAeYsp$Z!ZEg
zrPE(K=kym>zkSE!PZya^iI^abA)kE{N}FGzve8eR<+5=g@LlkH534I0DVJktdV00g
zbXDU^N#=zr09C1MieQ=j&~O{;f$cS|Vadp#i03U(C5cC5w-)Ez+r$YmyiJlR{aK;V
zphhk|=Tr@7*}C-(jf98a)YTS{$p2;{FWJ93sP9k-rN<M`C`o5+gChE(Af<taY|Jyu
zHGRMlIK{aT%EDhwfxuz!2`QL>7Aov}A;mvPLI!e6Jt~b-9t4*A+J<y#blPN)nSp9y
zD+O3Pgr+rY6~PkG&TMvPHal+gs4LDp^SXN<=*<@>7IVy0(VWQaP&r(R9dF{CYko+~
zj1>TOB^tUvoylSh3SL_Y%R;0P0TQehFQB^nP!WoNCk45h^JF!Cls)a$lCrpD*Ot`M
zhY&Fm37aS;-iWuIa};_jan$q}u`kU3cuy`jq!rQEpTIeU!&BssYly!Tj|NOWQRYAb
zw+g93vp_<qO)v;uNpib0WP-{?w3j2v`+(?`s2*=Eh8Nk&l;);<H6KUm+*kq*6{Rnu
zTbFe;$tXeeVjEu4^zg6b`a<%{?MZEt5*FP2v{KnOx%$kaz{(H>Vq1TIA{za|DIfpE
zy$|Izjbf@lB_T}UGQcuo#iLAMB?_**pAbPGDbbp@3KtMk$P}tFB!pE1Om!}9483t7
zo(vuakV<gQz2Y&W9n~}B3JmAWN>c*Y#_+sbWYTS^z83|N2&xKN5|Lp*A^+*)kINfI
zPSZ^76RkWjs@R`Pp}y=eNr^$^>OPrYQWBu|27ug&)uP__oCbOI?Mh!ZmoKFPiwBX}
zc?G7gDJa+xR@p`#hBTi>=GU`J)5c(k%*AkJ93`mm@5R-Dib}bCa>XJ<B4-|d<RAXN
z1R@GCFY5+|SR}k^30h^Wq5{9!u4wN5N~00k&+y;JDp-n3dJD=KHvuOc5caEC7<&Un
zxXUN3+K<hypCC@vHAEu7qTbQkHmap@pdis0Sf#Y)rka-Cu~X6Yo^j&@`)u8oE(FLn
zH}hDuDywSv?!3T=rWE8Su(e_m+B`=q3Bh`K$WlRRSG>1=Ssd!6;4TtC9)2Ip_e!yT
z=AL9Q*^5OIungmV1{9!SnF~Y{i+KQ`QsCodL0F=-G&D{fJ@)PGT@;UdR>4s49vPPu
zLY1VDyPHm*S6$at<;)zJ<AwuR`5>RW@;5{Tg%uEmbX={CU7wPSq0Bp{dhL;NnhVKp
zaiN27u4?+Rhs?<q3g{6ZQU(+=c(hOefM`CiB@;@aDE?G5jiS*qLN-t~kVl^_UEm}o
z<ak?jk=tD(Sshk|f+x)sAeeHfq{e5b(@HC`^2KPbLTmI!GF+$Q<J%;k<%4p9ndi0S
zRJrI2fD^B`A>fUdik$;#5z#SPoCuot`3~fAhaWKG-M?<&stSs-i%r6-0szA53O`4R
zC@{<|v)jEiBV?I{0&TUHT$S|E1OfJPEk-h;h6%{&zv!9!VLoN<Y0E7BEa>A#wV<kc
zFvfE{BOWs%s-o$2+qc=zm@}p&5?Ep~k>rdsbVJjLI3g-)gsBQ5D?KZ?!3EVZG6ZCb
zG!ZduwmBlwuE(?7TtQNUDsow%cXr#6^zySB0X;o1xS+`oJPD$J^8$(L*!E{31xSsu
zZWAx}ZIJegeuy=-0%t33M}|DUGVU=I19r+H>iE&E>w0_1&Go`d)-fENP^U!{0C-C?
z{*lx7fFK^Jx|3Zjv)F|TpxwK391baG0GoJu7h(-OcE<yBNK;g=IU-c>5}oEekDqg<
zY3*aju)vu|00u`QiYRJ6kGf&M)o4M4S}YpzxNs(52samTe%=v>AGQB}V##aozWc*F
z?}?}DqKP;vsxR$|8@eHa0UteJ=9wR!d*?r%`P-|@)mRK|0xMZSN!ErHagib*=uio}
zTu|Y!K^SwFwXqAA>;jI^SJuiV02F7#tsRxk2x7tKAZPAUAQNY)R}aIAUIM{Y>N{W&
zC!ilcLR?!Ond_{tD(XJ%<2UTs&LQeb9|)Vb1_8jdi1O=S{~7=;zW8DRBqOJ|ho$F^
zkVYSNPpXW;RDIkkS*yeAb%HFa63p&Y3Q%j&^7kN|s6i8?Bz2nGeF2<QV0D?a&#E!w
z?dk5F(cDlmnT`w%G2aYeM0MM?<<seScCZ+a54Dc+PdFkv|Huy?x!;Ui9{S6je|?lV
zf8e@n|L<96T=S<p5gVh4Br1wrc*qUox0ih3j;H?d$jh%h{QQd#KKmRubVZFQ!V?k@
zrY65W?g(q{2v+jEz(H6-4k<UfWvT2uw47)ayb+@5v6JeCWi%|Zy0FR?Krrk{y|O$p
zpYmPHsFXL+<>eE}3T93;Iw^J*An!kZ+-HwI;(LEyJebb|Kq?mh?iurc|Mau3Z`$NK
zjN7Y`tV^n(6p38Iy5jyTa_V511rxL%r5d>xUWPG3Ko#mSLL89;htu*`2LLV(w-Bl!
zza>;j9F9<$%23v?TpJ^)Jjs!D)qShcTV5V$TG}&!b7mMVO$`w>g5<~})0NBtfFk)E
z62u0x_D*u?lpaf{g<K*#2mp-pWPd*Z#Bzg!)DkeMbbU@o$K%hxc*kG<ii}0#@p~SB
z;tTUXHQ3X`6a@g8st^~Is|*=xg#rNN2KxK9ZcWzLGgY-^8`pJF@P>>js>&3FbK>0K
zh9L?-6jc>|SVPx{a{yE#s-mih3^9m3(EVaKy;;a#neQr^u&X4XT#Y)}g(>KwRPm~F
zHe<09W+325R*I$L+M*y=nD3ESr1nuIge+DPhr52r{`s><9{~X0{q+3r{dqAEeD{p`
z0Pxvkj`-%E?sogQT-U28N^@iVmcap1m~-u6K;k3uEbS5*sTRLHgzOU4>Ix@4?HH<d
zh3$f}If53Ozhy&Npz^NZ3st(NR=I1bMMrj%MFIe-Eaiwu$f2+olH0Bs@rH0hP0u7#
z_3;FG*dMLY-#R)m&>tH#dw&jQGWmuE04S!CTv1bfePVer7RzTcawVW8cK8Vg%&bc$
ze){|0vxu5*YKo`QkG`_(%oC13^{6BN^4#<HT=jpSdUg4+2hIk7*WOw4gFoDH&-bnb
zfX|=u$>TnB(53%#!$a5p<d1)U;*l3#`RIoZUU2M@V&_X<dgbOvACJUifB44bE7q)?
zHEAEQ`H$|rCzeS5^1m)hC*lCG<ke-jJh3F6PAicJa&YxGb=eG-mhB|ElA8l2$oNOQ
zQzR?*(pokXTJaLso)}1(^iH-fnO-^a%JK?yQ}U^$Wf}W0#IpxdS1zdt(O&6mH~#9{
zFMmm3iM`cVfB7r5p|ONM*;ZelNvFH|dr1N_e~jdqxEUAmj4!6m{EoMZ`ag!WO5Yj8
zU}2<I*$<|)qGofw*ol;q4k&TT(C*HB4eb--;-+^oX9vp-uNiIqEyXOojLWu9Kwj>v
zzcEW|Lr6{?1;Tp8YFIL|_~E<(j-SiU2<2o{sEH6K%~0dfSVRG!z?a8}MhEK~Z6GP6
z)Amn=x;h(3vMr-5j$aQgDRR#H2M4)f#M9|yLqj5+QKMM^m^fxkVQ3HlJ~Va8G3S47
z!6!a;$ysN7bk3|3F8;5_fBnn<`OR<ddgRfDwlM%u%;yLDdlwvg<m1o3xac>xoN>Z&
zmz;G*=jJVcS^7KxWa9Co&;Q)FzVNw^A9X};SJyW#Jin*E|MahYOV<kVbX~f+i6;_@
zRG}Fp1u&qV(BiQ2mfvG_y;3|H8rU7_W%GmxuvAvruDn80)`Q=l6}BYAvI+7TVO`x<
z|M$lK`R^~=TYU9@f5kHOo_p!vZ!{4F-Ef&jJ_X2*i^xM>a`D9%KV5OWWW>Z!wf$Y(
zRlRa&y6W~*?P>C0mhP}K3~#YqQDeFhuaEJkgV*9KBRGNOn;Fzwy0k!(Kg59>YD_J;
z5_*#FDm_oKa?6M^sT2Y-rl?AUDT<=1h`6q+OEloReer{ZT<*@lKDuu6mT@gD#as>m
zn4&~tanaIFD-=F{$cF&nM>pN9YsGv1{=~Y?TgEmw4fXW_z{5{HUCifxeDiMs;8RC_
z_}$KR6GpfG_`fgF@_DXnKmeS;>fb^E3@i3kbGOgSN-J;|lT*OpL|pWg@qf%J7IA1!
zK!il1(!unRk;FpcZa(7<d%K3^;VSWgpe5j54!+fVGsZOw0-ioo)VkKu@{+pNR;DOr
z=W#p{2i*X}FzFftKa~uI6@CP3eZVJVlt855Pl*Iy|89pN6HDBvitk|vcMb}VMc}6d
z0C;a#<xfq%qEO!=IiK1XQCrp1pHK}%3shKzkFYM0Os0~+Fsz&-GL%d7_uGHQvV(;N
zQ`w9S4A{$)J>9uXJ&#7*?c)#uA9?wePaJ&E*Uvxq7x&$->so}26X(pXOD6C6``>MO
z7m3FbnYzaMjA&#H0FhWMURM`QCINtRL(Dcq*J7zuJe@|y5J4~I#et%UWW26Ue82P2
zNAG*;=|x}p@<0D@+uxTy|C`4im)!_~)e$8E;N+(ds*;V^TM6$l&A6Od<Zj6|B3eiI
zSz@^roG0iPM4rFX@%VR6`;@%G_s;zE_wHLfm@ky}z(pdFbS%+ta8L+>m`(uTt)g-9
z#TR>Q5qZg5I){pxnmqCdv0QdawU!Mhl(qlTra)lOZlvXf-@WE>WXai&Ro@3HV=j2z
zq#>Ov!!5INE7Zma4d%b=7_O1I2PmAH8tc=s1j>r11xDgiw|!eApSO>Z>g!GH+!@IZ
zCU)+y{aOGJ9~!FP))k<z04S>Z;_5d~`pAd1d?DB0KiJcA_R&W!d+RL#P-9U5IQ+ml
z$k-Vt9G^+0e*XJE2sac{RHiES3Ela~qX4k*i=PL8(~dd1y>0Z*Z~voEdzq@l(#b@o
zPP`3FVQMUT#jk$-%BoeP8XAg2Ij$E8xLZt1YPOWR;0+8o9845su(^!35<`YnM}PHf
z$<Sx}p~SG|-)GrRfZTUqrqA3A5|>zR*eLSVU*7oDU;avb|L*DYWs-WL00GySPBk^v
zGvR&-k*ZJUw43|#HxCqU9w^Am#gdx`i%%EyVF}oZFuU{vtxlkii1RAU5(@u#YEH%Q
zOiO2CFc$o&=B}EAe&Hrv8EY@d;sF|QHLEt<9TEcpoGR%J&J8LQqltK1V;unx^NJQz
z$;eP4UzdvaXBlw-NMy5+b&|L^vSKn38yeIS2`6TTD3Ycaf*OhZ=I@Vl!}$A+zYsq@
z_V1-Xz3unWcsvq|0YGy@!#{riI{<j}*=LbKBpzSi)%B$XXMX(XBQII>Gt<o#kKcUX
z{TH2n+Q*MN5&(Yv=lht-EXZMzXiQO6@%@_@UU1^!bH#y<JnyraQKL8~^tK6<8h?>n
zG56_@=+>o5=L?lrVC_;+Pk9OjL~V9a9ra%?@jz<Hz!*swf3tV{8y7$L<@ulb>Mw6(
z^$kGq)nESVfBx%BH!gnAz0ZK7HmB>Ni3Dul32|<cWUxIKd>*Mcute;nOgG=K;@^>r
zk$8D*Y}4EV4^P5j7-H}$Z*OQ!MUXI7d~wX-PpDZWyLYHTPb<9C4&6+AhLLH=#8fqO
z1``c5HA531Lp_m5Z{6l8CE<tzqg(WNe8^}dTi-SfBdfbvL`~Gy{pRm~zwVxUin$>&
z2pNkdlgWm9#uNbf%aSF(zwiEdDiuqm<LPv~uI{q`{bhb&fE!$m#!mkFH;Gfasp-*I
zUVZRi&*ifN+%VK=G?A%~CKIP#d6ix)#?q;1BL3;Czh4*}1fm-sdPvLX^Vw`XosK4x
zN;CqDQP?dBkfEi*hW<R;irph74U13cNFv)#3m(ZAC&(#R=~f<L$NYfu*3O<U{_KD1
z$Fzy337PsY{_KBJ%}vo*BD`D$03a4o>+3V9>nP`{mG;t=bXAqVBsM}MiNp4^?0FZB
zhpxh>2D#dTg|Zq~db_HI>XIn{97h;fYs2qv2munT_!ZHNOd{FXSm%9Ka$x}?TFl<X
zSWL`FZm}mK0aq16P^8#x+2wf&AQFPrcr4M-z*My`ILI}FscI~hh^10SQ4<D7ESX3(
zHY6Jw;;Fi5B0-$T5=mXt6-7bDn4&O6VG7fW#b`2V=*37h8cV0uXpA@+y2cb$jYidY
zJd%iuwqI&A7Kta+STs?WQKjw|VJ}*s2g|Kg2ESfr<|0D5mbyM0NG9NtGIWW{EgEU~
zuc&`cU=U7t%`Ei)T6#ni$>_L*12v2_jveb!x4l_g)=y0hb(uu6r>H{|%f<}e(#&|t
zTbePlZ&cNQQL+%Pil2rjc8BK^11B^hvbo5eIYt01j1@RMYb&4|P&HC$Z`qW!5p0oo
zn87i`Z%nG$bO;R2irSd5<C>Fc)AQi(F6ZtP8yy;AoC84rm^L1dt3yMXuC1!3vqI5`
z#lk0vX{SVE2~~~8Q*}ffktvY~Q<NeN0e~8frJ9;Et)r6l4Qe#XR24Wy;&Cf^5gB91
z5D_`2c)E^rgE56gRK}RdnL-3aMo~_Q1em;D2614D!XheD6m+*TwCgPq5SZQW(0%#b
z%{=dtu~s>`6m+rJ;_VWFfL^y`7KaBmotHXbSxZndBBkBQ(jUR%|0Sxh6|vnBMkI@I
z?;9<*>$Qq(tP8QeGn+`)lZ;?js!QHF^7UJ>j?k1&k8Nw|-@M6)D1Znd^#o%5r;FOt
zMJ>QI@>NS<1#G_Ls+;j>;;f8QCsY8kK>sJYT5d}Cs;Gb*fLjM*01SwQvfg5Ov%0Ls
zMnni`v-LSAOyOy`VN;1yFvf&Z)+xi$dTS=hUU6+fiCC5pn4G{MHLp#cG@&jLFZ1Lq
z)zXNl#aI*oc`ORVwRqf6R6|ubBG^hahUyWhC`?h*XjC=<n99!h{x$jRV7jR(k*SZR
zQlb|XFi>oVn>2?Q5kyq^<zeKs0VQId)m^U{_ZDH9FFS_31Bjt73Av!by0Jc=m7iYT
zESRt8t#JA@QsBEp<a9eOr#iZJ>vn5|aCUhlsh!f}RM)%2H+K&2>1{<plhE3<E)nb4
zXX0D$tmTO)ky5paYPMx_Ic$k&ml!pOcHOa9A<M6n#x0?5=}x92QA-h;UR5PsKUNED
zweeo@YdOga;px96G$}3`mKbbsXwro7&Gq#q=9<H}B{q#j2HHjg*sbBAZ^BqhlyV@O
z%dY~n)%s0Q)I?n-5{oOU8jZ!#)5zPmBl5+|1G?Li)cxHmDg>(pMDk-e9S#wLSb&0{
z0Bu79eLkW}i$KGupnOf?(RGDV<6al%Fa@>&4o53*fnh-Dh-?2cPcXT>86KK|pz??c
zI@OMD%uMc>@K)CrN+qC5nsKmlkURo0lzb2|_+FImzchlw%Nh_^q`|B8#SOn>uRBB$
zo&a1!hX2?h)5!bOv~W`tIAN|BE6~x09ZX92n<MMvK5YdhZw0zNKICmlQ9?CFMNwjj
zWHcTZEL&)Eh55UUR2c4a@86TGE_;n+-PqPaO>J95yzM^j{?<~}yjJM%d{sIbib`51
zKFNV3F*a6m<FNt}fmA}Gdi7bq^q~?D$9p`LDaRak(7Jmc&MQSqu<8=G{0%Nm$;eAz
zJb7F)VKnbmcarjjjw=ErCb_n%vn0xlvdIXD6<HX2sfT=R>}l5)Rqzyn2)M!Wy3#*%
z>c@|ZM3thhhrad{CLJ8ddVpB9#BXKqAPFpyom1c=vX$G52l|)7WMa@;M-FEd`USMp
zGYZg8plh3GP?1|$B22~7JoD9v{SxmjmA*N<L%BBZRCyo_c5K;`I1)Ma_+##U^l<|j
zkE?*JLZ7%rgGp8Se9G6B4;M&6s%A=Xb{Q6U$SMG55X=j}IhQ5AE%!|hy@~?~o<>{F
zenLnp8LCxTJk>TFD}UxxGF!Sfs+KC~nMG>wQ<T&A?A#2)PzSY$&d)vd<mQ&f?(E<$
zNH!)ZJLHr31SPu5u`<nSkf40|cxm^EJNYV@XWo>77BeC`&MqPN(YHqezhzd1@i+|e
zj#NrNuqu;H+8hzaFwqW2?v=w5RmUTvVHS10y?x9Dr+xAd5B*KkbR!uBg_(i(k|M??
zleaSk%WzojX6IF4a$T8f65wt_L~x55Wi2Xy6^OrKR9OKX$j%$|J{cj`TP@OtS&B+c
zxW6YX60mzFnru)AoSTJ-hJl8GMFTj^>S&*T{Lux2cJvPb8}{2G*&dc_#a%FsRHD|3
zhxt0lEg&lG`GbC|+1+v~RLLQU8inkGqS>SiUCj!SWVwKHXM5o^bk=a*Ybq-WOUgBp
zn*tzWh=4+oCq{?@q{$9?mr)C`GB+W*w3rb5CZKZW2$gWXbq@@T8r8V)i|0PD<ew|o
zt_KAvs*s|9qKFiV;PA<?E5<!W$;c%I1;%W`4k0nLFcU?v)T9k$$t5>k6-vpLWjhag
z+hvCJYvKAX7|hk!h@~f^^-k8P8$EZg+Tq`W3a&^eaUlc^V%Z#OIsil?k*OUMW=@^7
z&zP~}Mm4>$VN*fVc6|oe$_OEO9Tu!q|8pwgF?F~6@C!7jEfj`kyLxg2ygPIX%Y)o3
z<fPDW3n563Nt^kO=rtGIVQUu<I*j5Bq_!eqg^ix(@ZqJA+=)^-kitj=x2ggXD(Rc^
zkgQm}5jn{{j$L&y6@U}?yp*)9uP+vfe(}_kH+Ofh-MHoTHJxvFt}kj8QN&m3+6qbq
z!GM0rmHO!dtc$?&39f9HZ@mR1C6CCMB4z0LtYm+0x{y}E$e2GL0RbsIxH>{WQgtw&
zA`zZW0&(JoeH#sKSbK9m1Oy+*0(f25Ip?~r6Nzq32IpLS@eg}V8Bq{Xwf#v1M4U(=
zAo|d_u|NLYc>{%f-%zfo8$-pyKrX+de_-3%wT_A{(yxe0DF6y{^epZM5e!r~8GuuP
z0p)yH<e8wZ5*DXgLe3!)C(M0)Q$pI|k~dIpighN}5!lycfuck5NQMD`JTPA#-KFZ@
zxV}$jxi8l08RIDFL>}>uC0{{Tg`<-?W(#+6StrbL-q~psNWR-*=>hWdLn<!`+zXkM
zcN7$~cNsP=hhHwAd*$7C6KZ7Y_^}60o0N=1BdS`TOpa-2cxUU@s;%ZyZq>@<Th(%@
zq@ctKe8yGpo+>?0uNSL|t5T2|oR5I{QRV#{8XU@M`n}IQw|r+Wm#9~{VOUC^10+}j
z5+cLkVi*S3bzRqWKahxjiI@!}oO9KQOK>1&N{Ykxn||kW|1PIJRWb$1C2Gr3M5D2L
zUPv=^K_ljZ&;#WT*@`6RR_h2Z*Q<HcE}3i%QfbZCWe-6}esQJJg@TuOSf9(@c3!2x
z-Q8I?1OQMhYJEdP6|IjWbX_6k*i<dRRGvPIUXN_0;f8AJ|46FY@)}vyJjz5Qk}GOq
zjhU-Cq2c(`=T4uxeA!A<=_CL|P1mWEMe@OdlVY)`>$;|C9*acNG+omT!_aj@(==Vz
zG)>cWy;v*~w+3+{G7Li%^MwOv#7tEhaKNa*At1YnLus+O8+Ghf=d3zSa2SHp<rc8A
zgV;z3tN;pY5`GyX(f3z;0jK?kr@|Zn02SuSBrOwG4O0J0LnBrEgV>LO)jfr31wqx6
z9$1~gtvb&Xhq<3Jx1Bt$s!9hd>rD)3RB7c$41XG9CGVpv=vQ5H#u!7bSg0bcIrO;<
zM-$muEC4q+ca&7ESQJU9B$>bH*zq5%EaO6<plMn@pSLU$gL5(rUMLg{-4I4ev8WY`
z#X_N=YkIL*G>999K~}3IUDs7-LOO0QZg5_mFb&sOP2UYUMSTFF*%w$PUQor^H70Qv
z-wjj5u0;@ZE1X0_Dq$a5{i%FjILqzkX);p!MMBx7jaUI-gsR-Z>!4RNC=)!W7D(6#
z0ZFygBh><1HP?$69vd*K1h%q35_%oDD>W9Sa`b|vf7L(&RLJE#oJpnPaG{FnaQ%9Q
zu1m^sE;nQW372wZ#ODJCBm)Bjg+gIqU;qGwMIsPoaB$ED5>3;J#iF8MzK|an7|=CM
z)3~nd!V{)xnkwUnO^#w1MpgPkYeZ>P)dWKou})zCFko<<D934=u5T;qw(s4XMWI2w
z>NJrGvNhZ@exzoI@9nZp5Y7!UIM;PU*9=|fy3RQ#gWQ&f<@CmoODL&`OTGnb+8b45
z>3~B?QeHecf$^#Y?nnVi81OS1L6_99EIBL>093t2Qa-^Uc$+|Og=+3|rShD-gl&}p
z2{(oY2Lr6?s^<d??}n0AEE*B}8u|wM3Ct=71VUg4NWi2<KOdm6bLY-%HoJ4@PLgzB
z&iO!g(9jLT(1n{z(=@}-ve|5Rcehq76jfE%HOpQpVmh6^=bn3hb<?jIQ&3SDQy$zt
zaK<Sg4V}*t4`>8&dNMXTqUJc?!J&YR189l@01?Ar0CCQn86*_8wWzNi%<JSNhgGGK
zRb4UbEmE;IS8!zBY$T64LYxzEGQiL^t{VW5AL!3#2R6U_l12C^iX{>4rt~IhqSZbK
z&1H<qeXbayAXOFAlMDeFLxv0(GGvUQS=En>q4}MO29V-cKrksQndtQ{C;-gkqm3Bi
z<fK404$B#}R|dJ_Oyo^Fu(*+N1Z!8SJH1_ikoVJ&=tE@_oA%JnMECKCh?DiNsmy`t
zFtGg3oQM+<JoV_KmZtZg+`9x3nIZ%Ui$v5|JQ|Bf<B3=-7Kz5Au~;-3i>fNK-xE_e
zHr*?R?hLJ{X^D88hz17-zxc&3s-B0$i332WYfJLgPD>>^;?d1TeT7bhit{EI8~_YJ
z02pFQHvsCq3E-&4bZ4&k_F%3QkW@XZ%DN_kM9K)Lh~#l<an8vwNau#88M@Z9X=CqO
ztLsy#Z(Mfifgd`A3360KGXHC*6PtX#X8N!DHIS01Y<3p3EE~}?*~#RxD6~*;4iYz;
z$fKK2&pHeP<UpQ?jTf9r%9h@f0>OQg%kIH-FN28#Og+<;`xH>%N!3{;m2FD9^A_#0
zWEq(iNp`!sn?sksh^9>D>HmIZ@|dZ+6UF71i`Hy==g6P!zhh^wDAuZP%<Mn4{ga>k
zR3Tpoy6;%kof4a?s`A2%FC2CBQQ3h(-%Jcpgs|KJR8@KYh360d@Zp7gaoDOhA_z4U
z5fzoGkw`SEMxtsYqN)+|UuJ6Cb{`DWJx^qqIl-I*(6vAR`Pi{zZ@caHoEwEgL6wwv
z&WH(DD-UyhkZFi~xS=l3`Rhe)Fr}=DLV!D%+Ee6XRdz&U-E-ajdO6LqVi!ahZFO+<
zdxb8Y3Y^y5=hQMd=Z2;mn%1*%L*J^E-}=VaTiZLf_4NGfwH2J?Ok$L2+wErX;shCr
zln0Ym9+8pNPuCLcPLp1;)11-vZrHoCXBIPyKTVB1Aig5<+0aToBJ{b@LVO)moiHl-
zpsUCdb~0|r%!?xe;6w%|PMmXc+A)b9#E6VB1<_@e1XXmGoW>!i6aq)(Nyfr2ceg+Y
zRvv;34PSWMhq!f6OVKxT7KJe&`+o!X+0oXT%jXA%a-OrnD)GYCUeTu3ma<)lfM{rN
z==GJW-+6aEH;6c&y6@yiA6$~_#g)rf+ie<b^sq}rF^E_!?3qrQ+WzXRuk>!qKmY8j
z6$|}RO@k&)X@6ze%e~w3&;RSy5(Y<U0m%>}QAJf$MP<oUJX2p+-;~ZY)Me^Zb@i#b
zOgf!O#o|%ZO9EhUZkZs4rWNyI6!J|?O}fEPJn5viwzlto|NEOZZBi{1A!Y@BfrSz*
z08zcF9?_K9P|$WLs+1B~zVWrepcAk~*N<zdU$SXyPoY?a3RXJi>hJW54EDsZUl&fC
zb3@k)`NBZIwtnsZ{nj^I#!uL=wF>|e(FnMEfmm&t2+1OaXBLOLjVfr9oSU%}8xEw(
zc=tcT+yUFfarnT{=?sNVQ6rhiLTE`{w=GiI5##}bDw1C-!5AtjZtVni({;g#$lx52
z3=(|~#Jv!G0Z?J6AY;N2Xx?Jxn1y8sbG%};grVds60Mjut5Ua7N%2pW@MV>6Lx3U5
zcrZhYqfRk{$N+;A0vA|fvF}JMdSuN}Pl~%!1Y5m&62#a{K9dC8smsWa5t=7M-u9-5
z=#|caj54L#nuXv^2-8Fbgf!)DiXV#5VLHHFc`LmSo%3uqyK%z?K)m9LE53itHEO^l
z=EOr<W=0T?Xw1Bm*ZLTPVY#Qap;9Pl$G4CB$h>1!RUH`@(_V5p+W~e>*R^6XpU)2r
z^mo4d?)^Kqc1)etxp_+>8bjN7u<U<CkbGN?Shu7Ak%b?KXqDce-AK`u2`bqc1nBI^
zdUH*5;g(Tjy2C7SVjVAd2K#xGOHOpG(73EdRC*PBU%@!HQyhqpbHgwIkvMQp49y~X
zhNv>8FhvpGVJn9~b|-qJtoT2fJ-^Ur3k8~G!z13HUBuoHLAL9y04uUzthNM1z&Y0q
zgCXji10r$`gur<)05aP)Ml;CmC+?CCwt2_;Q4M1XdSOS;7W=-nWJak<w5xlQ^<H3W
zQ=6hhw)bov+tP00glVSRDbl8gnJJ7Z3IOLeGmz*h02nBjW!MPjuqmZ%2H;KDdso^n
zvC;vmXgVo@nIyP|ZS=bLy=v8}{rB6ixv5D7$8+MGOjy>|yw;X=`9cpW-t?GiTt+<r
zYX^tu>8FoA?)cs2E~b&eqjFQki9>O&>w2M3Sn~Me=YRIIL%E?;JZ2q}d4R-}=4jdg
z44kIIB!dNl+2hgCB0VlUt4oy2-*4F>Bnl+SrG^qpR*7kaknKLRx|ld+?ck!8*%h}-
z5bp|w_^o_U<SL{f8Av$i9GSs6ikf>en4J)UfB*_I1r?Psl_`puoM8S$UVaeAibG#F
zFsc|FZJL0}y>`R19m;nh!{JW#%5cbR+DSw}1|kF0zz~;?D8vGCPZ$7Q-7isaKobd~
z4D_A=0l=2+8)h6oe)TgOQcbZBpS1tJM~<%_onH0Kx+j12s=@g&pF7}yk4+xfF|_)h
z8&>^uU13n0`LT&BAMG61+F`zScAOCH%4kAl3>h#$Acko35CH|7cLE7)vde05T1JsX
zODvj+l~}phU&!q!3|kfOpI*E<7Ojhl@A{xd1B7YJ#k5?Zd+V0&)_mj4`e6sCaNW9f
zU--foRIds{1QeY9J2O+4Gx!$5AlPs%S@X)P@l<;3zM&_#1(noL?!}j1KKMf)+C9!;
z91*}MjXPv{Uxhdmp2V%&cN}=|ht_V~l!!!~7!gA|p~Y_6Yf5v*Y%9bpB(`D|++i+3
z0%E4bH#vuq&=&J{FdpRwicSY)6qrIb!@hWDEj&ZBcPh$VVf^pFi1)iD2y#F8LK4nP
z?%R}eG8p6BupI~@4TqabD2kjnMPZ7<R7C&@n8|ID9Q5L)<2rOWMJWXQ2*Yf$st}+$
zhYnRro#_LGk?ux7R*(w0L0|v^>E<ovBD0n|1awYjiR<(j63Uc5p7gqcRyg2elTP^W
zgXOJeoiI6;jOs;WzhgT9AeM?AabCj_=gk6ut!s9^`j>Z19%Qmw!PyyQ1OO=J1R!!G
zWX${}+#-R%mdw6iOBg8j-lCb<pYQ&4iJSfDvo6l>Ebg+;-8sEzUDQ6}r_Z{WGXrCa
zyku97wPWYbIdcwF11u*(zt<|t*tAUgrNKOf^2Y%H4EFSPzPkM5#~i5}#^0CxW8WhV
zSEJFuD_yHo%Z}~Yp`mm#343f*={leaUd@<RERr2@*A<1O5{a0q5=k8ZEs1SzYK72k
zV6j|PV!kscGD%Vmm>k`Z9Li)y);W-aB9?#J;<^V$4vwHZcw%)O7J3;Hy22zhvIrln
zq&xIoZdbXT8Q_Ts+394A7>NKMM~2AJ3`8NJX_26nOl>AX3yXwV^31ITTmM6J{q15j
z3oJ{biiEDcCi?FIRw%uP+cV34>NFg<2#te*nf!-D#1uvb5kt<98Ayms<Zn`NuN#MI
zjyt4o7KD=w>(IY5+cvpbs190DkH#YaFzqAl_I|a37KxdaBK<oCUA>8{u#Ei*nF~Z3
zJ-W#3?QnwiB_N(bQUe>TIAvpG^{~<oF3))u2a2CQ>tcZ%f4=+I_IH6It&NSlcrFbM
z^{Q;RIUWJuIH)PpIg~GkC0P>zz+i9hx>sNO^0^B>d+Mi%s4kxP^WUG`@7SaKt1~n-
zf;EFf{Dl{eJ?7{V=g5kEnGN@5*54EBT?qiWmJesgp430#OdhQ-C*OwaP^cV`tP)NV
z+%(+aoHIlQs3^=Ni6a7JHczHqBVs~}9qO?BS|GJFH$%pR1RP8$Z?4XO5jZa#negMZ
z;We|3NeZEp-0YS~Ji-<sBal^L0sz2BBHo~p4mzR7<Ulil4N&S4>=-82t?{PgnY~jG
z36KFpB!(OTtxR}vJ;=m|toj;p$zFmil)?^H6h%4|SvP_Lj43AXprk)3&`C(-52*U~
zMk6PHM#dNs_a2Y|apDRxj$8rcCRH_(d7p`s)aY4qADQxoynb8Hi6Wqu(*fYooBs9c
z-&POx<;U;Wy5PGf*0*K=pl|!Yy+3@sbNQxZeSFSGr+@s*M`{HF10|KIG!X(aWC~-%
z37I$b)(sD4)vzB+<j98%CzS(+-xLV6R7&ixES!k*$?q(P!`WD3pFn*wHDUDFU7B33
zR=aiuI06vqKG)XxWa7F0AtN*!iVybotzY)qf1i8yXHWf<xU-jDaQ+|u{D7wG%-0G+
zL|8TxP0Htpf{psb_UCvsGvV1YvTY~!k3Xa5n7@mK_3Q5$z5QSP?Pq1joV43xDuku|
zWZaS}1i;BkeiI=*GPz;6Z3%GU!9oCL1-mWJiRpME1i`6k`m#)}buQjnE674X%rbJk
z<tP>*jfk;>)fJW;N_kTSl;)xk2a;1vPWeKcG{2I(%wfz&SLaMq>36GlcIz-C*<O&a
zK#D<{;b*(V(~?wHMk87j{+2BkR5f5?D7un&?2HB=4*<AQ+%P!g6L8&9k7-w*NOT!U
z726BD4h~q=OM))h!2k`bV8>3DMd>k^Nh9RaO04{M%Snii5h`<1@cx~H9B9()@f%<2
z?$@)uYw}Be|I++#918&d_~R?vR`u5>n$nG_j+x^LsBhZ<0e3nxpk?M-K1>2YhNv(=
z0#0_%I@`5n=Bqd-Kr%w0yuReoa#8}zVM$+KpZR4?zrC=2QpR4s3vQHPH<yhix7_?w
zvHbHFeKVm%TQkkWIf_r)3CP+aB3*X@$;5OrtLd7-fdvQE2mAUqEMM{8=bru9(>`S{
zTy*{a4)k;rkiRNL_|Ax6K+|7-ZRJ6;X8POfPWacSdnSFcXVMqaU4QFqKSSJ(p_apk
zS`JU{c&>HDchj36-SVO9Li`HVkq=^NPjo0hh$-(x?vNe2MFJAMm=ent7tN~>7$Q?t
zLCh{@tCdp%96%xS)(H3!4PuB)+h4qw90@t&M7H0BtZZW9ma~T2sq-RYKxDT1usvQ3
z7y$=DW`<qRJVRS-q8Wtr*Sm*ns8vWUI{^V*mFW}^+eTOPndGxU+wKtmHANSpCC`{h
z3$ojTx+?m?Nk?_>R)!EePXU3fo|yi=Txh2#R32vY{Y7440Ux^T#S!>$P1Oc~A<BFV
z+(B-1qHjcQ4cqiM5|VImqNV4fHTeLrp|0tje{VeOv{_RRZ=ZU2`%rJbnAhTIGhTh-
zmp^>e*$1g{HPsLoOWykThWd1qJ1N-x#md_vAdVu~P9E2mt<KktORI@e)pB~y$ZpPh
zTwbN&B%jY$wY;?1;pt{n0#1f~2>(oQKSilSqGL!ZKyEIh_PXSTe1Sp;j)r>s)-PZ2
zmGjQI;I#Sn!tek5x?AtMXZq1c8oB`hUZcc%OE%;S(H-0T?-MKb0YKxL-<W@D1F^o>
z3-$Y(M{N19qV;Ds+&eJlB(GgE9G5=QuDcDSiO7KrL-1pAgL7dJi2s^yFT=1)8bll%
znOP~KF%(kYJSD;AV6}TP-%V!f(w6)~+sY%`?Tlu(7&Fz6q<nuNbs1-dX#`k`IwBG$
zV8BTDCtOi(EY&5LD)2D|B~40!ATuY?l+)zz&qA&w1+-DyHcG%TI!I1NMA=2}OCB>5
z6#VKoxAYOKzlxPG;cCch-*(%#UdA2a*HB0b2cg}06RVA2j4WtW+9{IcEJMi@v0RZ>
z=Be#Bce@}gaw`Hk9O0gNjp>%RSG@7ozdNTL-T?r~hIkU<PWU#aM%&W%pYOc5ZqsW!
zCy$?DcTIBQf>QM_vn&!u<e~iXL_XAnQZ_ao808lBO<<vkX7yXEpOgt)9v<QvrjIMp
z5{uSFue<gt`w-V%d)4J%yJp)!cc!7v{jO4Vj0Xr1*s~pc6e%fH-I^~15(5tP_HBG^
zr58nhcHJ#^-j!@@*tVu~+nP>uCykBcX71;CC;G|I3q}8q8`u6;{&U<5pX-_Qg{`x`
zXD{iUcxKD$|B3a#J}~A)d)C+ezj5{o#o3?D&-+p4|BdVaKby+Ehm^Q)fx7+~vB|Dj
zFx;wZ&^1lx1~(bcI9UM|iyDg|V+s@T6yZx2UVSF`M@^y6xnS|KF#s52hzuF|{PL#j
zhb*_0*a6sSDq?3=AOe6ma-pt+0T!eQ<<Ss@^$bXuO=k6pRo`nz@WUNi0TrTl)`53B
zk{xhhr%{nBMr*s8JTJS&RY=m5wq%&?TQQ9k@6D3U9`e{d;I2t?%L$X-R02?RS8fwv
znItTCowp4n=;{e89Uu3&K~lD(K~TucachAvN=$w?lFD7lo5OBSJ&>(Ucaj$XG-gIU
z^z&yfxVC;&hZ7lI`Hy!PQ}#P@AA8C6b=~*<=;=(lxvY;)kR6cQXXTuv+ob5}=^2JM
z$#Kg1utZ4npDkJ#1~8?oyQ&SDBwAw8y4cSaEfo9z#==G7&_7$W@EZ#kt>3zNR>Ktk
z9jg3d%?^qFDdYi?C}Ty=1DRDfEMIZy`R81C`h0oecfN7?cfN7CyyVq4R(<Z<S8<sc
zO58XEUDy4$r*8A#<UhC0yt-%d7v$BHVjln`xBnZafz-DbvS&TS#~fr|N&n>=rLI$<
zZ??Mrne2jx_?Qn><<=+n7pspICr+BK>AIooIyZE#8-|ob&yXn!15{Loz?jGYMpJna
zfj{J&3pa{D5<@gt6!MVS_#;#-CIE<}qFw7{M7tXbnVKU>FR!U>Gr_wBC|nF+2W|)v
zkxPDGFxw+ySzx6~qRr%ZtR*)b+94uOQj|^0Y9pF;+fniZp&fd12N)OtGnrn|iV^$d
zrX$2HMVYKBY{?mCWdX@niQTH$Q$9=;P9}%6O(O6IN1FLhc+Vk9MJ`QA{L2nTVQX{K
zWRs0Ga_1G0Q;16ve}iqAH)mRgwhsK}zaKdEa|h2lW=bxbf9%))e)r#-0N}t+PCNR%
zLn0Bj;^}uE|LxK^uN&3cY7@+%$8BTzQ;{*o6td!$<mprDBB+C*%KD^vOc`>6ipv|O
z>s9To@}Fd_!$y>7UF^p{__{dgx3By;&l%rXxah|}_&Nam_y=GA_LV;mf2O5%XJ@Gz
zs8<`B>pENFv20I36lnb`%RYV5@fV(cYT27|;C?guySD0@hHf8M7N8{_D;>+|n{Y<&
z_%l4~#QNR<07dKbzp=6ms=sc0_N<4DF$dLOH(qZ)lJ#~DeD2?3IRNPGM-HBLr}&<}
z>y+HFKPt{X-~JT<vI`zE#vGKo?`+;UDL3zji6vLCo;8D~-)Vbf$nh6h{i`_V#C1*A
zG|kX8P1o%<S3*LmjOmKP(BKL)*-4n`!)K@ndBLrOEt9thh&X}Cw#GPPPU#|Y1OVNN
zHrrV-C;}$v2s*=z(~A%S7ia{;nVA+TQk5+2ok)P3a9E2JFlOTwR_Wbx`%L6I5zCL|
zWCaAF5jxagPK~8q96*-cW!LHeI+9AN9}tO&66u)KuHJs}h@^}kai86|K(aH=n=DYZ
z56ZO<w2o)H8?ESzFNU~>9bTm<EG0yj0+e>QYRRock`d?32Rp=N0VhhyUG`LKZ=ICQ
z^*{Nm7azId833$LH0<AT5a+bw(btzQUI{=^H9oGnBa>`!;RndQv&qRzWr&Pf6fSm*
zAMI&mql-3FyzHyrFBKyh((E97iMn@thsFLvi0rn!Dg6ZqGK@UCsysccIN%)7EJ#GK
zm$WuE+T<F+A(IM@6YSdZ_n!!q5_+Lfc@>COC^+wWxjqE3{x@9Ti6VpRWBqRoHO=MG
zdRFX<3~c}aBjQa0PTzfs_+q1i?cCuF`wX6TCjg}GKU@4-_q)TDEid<7zM=lQ3E49r
zG{zhRM5+7FDIRcs?${qjU%Nf|$bSud?%x7za>xEKy8QQjmv1bcaxA#1O%xGuB3iQv
z_Ygy33K|Au%;1W}`ozS40J%fXL4cx9ug&?(k&sLum@lv;?kWNk(GuIpwS=A7SH!Yo
z93mAFU^feQ0gwn8Ltv(vZ|aBO^lG=Y6{^hM4htr^oJAsMP3j~`E)XHxyCt-KOJZ}=
z&x9bcV#-y7!U{1tGfApjmNJRRDY~&Q%vWL}frZoTn|vy#M-MI+CJ&-ABrn^t#qmK{
zm4x4OJ}_Y~n@LaNBjrFa3uz=OX_74x(|u~mOewp|d)28#X213W&3R%Or&Gty45!yY
z51d#}kc3Xg7}}8x0WJn{iK~$TK;MR}oQow3cRwFj5N)EDTP3%nklRtH+|($+dg7P<
zfx|u`LsTQGswkADI7J#7>M~7r^$qE;lMmEd?2L*~AR!_o0z|`ocH48gIKrUMx79X#
z*6;qjc>Ji=(?5P<=@WQi*>VEl_H|qFmK4M7xt!nn>m7ea!^V5X_jupy`#v@k0P>mr
zy7s?%sO9jwt&c@=8v#H|j`zIC17|+S#~$Q)PsQ(r>8FcT)%DM)>z_$H^?w0?ZCk0g
z9VGjy)D6!J9R76zC>(Hp;;Adx=9i5z2Ne%Ezy7-M#RJaw6n(p!Jezh22NJwPIv4H6
zxFB{%1Q3x4OC%vf0_2PUP$2-|3>g>F&k)J?NSrJ_C5}j%VW45oeuEo8B9MW$N5>)~
zG{q=K!C`1k1Iu1Pi_p+CU#!5W<&!Y`pE!v)5R}L?Jh!_~87GTo10*tie-ahCBL617
z8eEXha>L*{H*~|$4Q}SVS<->43TKL;FoiMaG95n^xk4lIYl=>7m6H&_$!(Dib0|z9
zDMOYq24=;*gn?Gv*{Y&@FZC@E+K4sx(L7<0zc2(&cKwE=;##o?af1zR=-f~h)p2Wq
zo$V1|)SBuMT1^wopj`;BCCRimWRPxfL!29#%&4fS3R77ms_I(76)pGGtGf*jnH3RA
zaBx-5trCVM;V2%uPrr{VAm@Xqf*cFiI*Ouj&LfeCyoKt&DL`JXt-Nj^k-@#iB}z1!
zX&?W+8-LBYamL9Xw*&Q;Uvc#Vk3Q-R_%t*ac8rAEeUcTXsD8C-V9ZBtAOV1(=DFLZ
zeRZhiaPeo;np*&XM>73wCkByqmwyEYg#8h=rJOTF1VnoCzEJ?Zd0#okN)}DF#mgZz
z#;`*Z!uQMULUD8oKHO~xxT(9DQF4;p?_?M{alNSJ3tFL|X}WF@7~HUOUaa|ThBnPZ
zni)WL6_}~pnv%*+fg%x^vEl+~1zqe;SRyXzNZ0E4rph@=>~J@^F~nzdxoggyhht_~
zb25mFqEN%&Hr*luAVY;Ql?nD=<_07;n)y{ecd`sgj~;yNTUE2xA~2>f2GK|~5sM{~
z@pwEAz?h<#xwPOa>whoyzCtH5ZmKbikQfq~g`gbF)DW^gjuK}9Gs#JfI;~I`RN`rd
z3YeVO-hy~=_opOsxDYTfI_&X!n`glbg+U`-M8=q+kkxX$p}w)NuY271w#^&2<%SA^
z^waA8;}n_%Ij`h~*#Y#xek>^^`VmVzJBAT5fwK9*6-Z1pvj$is5=o^}Teo(#wzkT%
zT@5%D0uTFdU%rrGthX2tAj-6k22S6<={Eo%utZ_(x*uL0O(!3FZfX0WCOwYHX2ZR~
z_Kd1RB<jDA{?RAqGyBCY2Ul|E(zZ9g*FXBB0MN4LcTDdCfMQ~NE;EC?^r_PAMt3B`
zdJ;S{A-ej$p|%49=bb*`h}fI=4~;n}`r03OW`e+*<WpDlUb?>FhW6sD^GeH4Q<r4O
zn1YNHMd2cpjR<BG!pyuvridpja;FfHEQ()2t0g3&VHnxL+(33vQDgf~nLNIId}F4r
zE}f1<B9SWSlWXHWH#A+>G<_gD*f)?}zj5>04V$^KqdwD6SC>*1m8l9t2Jh{5edILz
zkp4p?C!nB1HsW#onc9nC7-LRs?YetYYvY)>8fOagNYp^hTF!DHg5cIL_EE%t4W8HY
z+k3W*J*~ws3|mRa=L#2o{VUgAarOTD?>BYEL?A`i4WIdoa%Q)?iUR%KSh2jNwQ0Wt
zrXmCpc9nBW1;Rt~sK)&cm^SPvm$1DQ#uSCc;;~d+B3+kEr4z|?GL?=eQi)_b5sj#J
zJ0s3P<eqZF&@@9gw7%ZH4I4KuU%qVKvGdlg>$LBW>Wx&Jo+sB8zS+}v<oGdbb2|f1
zFg1EKC-~m4eggz&eA2{{pDz3+|KXy?{{2GxVTS;S?#KZl!bx?hrk0k#-ENwF?LJG-
zVp_lL;EMOXF0Zh2pU-QF36+zi*nehE{6*&8`LWk-2Y{YS*E@!XFjh{zqw$9J=xetF
zK>rzw383zQa|#EXFPvTJ2hJHd^$w3?%k|w#J7tV1iUI(P%<4-f(xMd67nj*CBcbpx
zGuCKT1tJos!Q4=Pf3`kT|A~(s)zLnIfN|?p)d_TsYU23)JQSuX4UMtJrlv_96ORSH
ze$$rcUw&=#maPp<4RxtBswUUVd%F=Yy24X#avDU((Ggf5g8*B5`o<qT76~>!)`{B?
zNpbHiM9Kyj9%Wt!P8=Kggww~2J-BVtmhH?;K_pGrX^6h@qwoKA(G72`d{fhkp2k1{
z9-p9-bFGC40KdECHn+FOCH~6xGV!nTyIXFB;kL#S6>ExUr=Vao7EPw&$y7X%iYF5B
zL@FLn#1qL_B%(;k*kl+c|C6p8MNNxFqK%CWCx7yj8`f{=?sl@GF`Z7|efK@Ty6GlF
z28=PLJiM)c(tcjz-me`x=fQQGjc}RWzjbT>hK*N$>0*H;0FcWUW}S5M<fD%Yd%g<5
z{E6c}eEbPvJB|0hK7RSv;!@yUjKSu)TlV{IKC^%6pimX>!LZtzh~|@NZtN%&3x&d9
zHrvy^^OhTb_1oXv{PK#GhOTqNY}seC(IGIa0vH%m9GY1(H3t}D#K|De4cgJ&)7wAz
z(Rs(t*ms&{5U-)efBIku5d~Mhz4obRpU-5{qeitT3RBEPM;tM+KawU1IULxW>zo?~
zH!R{ggPW~lY&W2rI0hy7fwty`sH)l#Eani7c%54|=Z{Hr=U(W&R?7os2U2uh-@3gA
z2+WS|R^3u08c8JLLiwxwrpeY)`NmT|tHoheH3=}yeGs?GVeQN(57m)fYHZyD^9#4!
z>fCxV+#+b^Hj5k~qN1wtSR|f^#^cdwJeG*7u|zBuk47RYknn(`MJ1>k1{vJYi<+is
zMNNBm&AU6cZ5tdK%;j=JLqlhtafUlaVtqG!q$Y3f?CD6w-*WdKcG)GPMsd!+d*iPO
z=*&-k0swBl{ZF}`UW4;6IX$^9l~>ggdPF|6-<r91Ww!pkapRv8{cjW#<BdorpV@E6
zKA+PP6Dn!vUAZ@ZIQwyEQOHhSv4g}+RYkNzWEmnbVaqZF0ho$NCZD`bN@6+X6#|`h
z^!92xKkw`_Gns~hUc-<N#NY%4ou*FiXlreH;Ni!2Y#d!<bY#sI?bx>MOeXfkww;M>
zOl;e>ZB3j^Y}>Z&y#8MGpI&uW-*vj`RGq4Wz1O#xD=<_Wx^Bq!qj3$W<6n;sob}5)
zN@Zv-F(=f-h^^OGspfdAY?)lXnc^I~Z3LLXlE{-o9Y;Cq@4H1C(VBXY0VrUmY-;ul
zB0tZ-2CcDe_1lCZ>IShLmy0h%!*?W{8^~aoIOBDb==C)p9x=TI+wvj~vz&l2`i&Wc
zbNPN`y-Qz&KyVyl6jG6bcw^d}DRN*DDs8qz30k=`vubMCASr;jpdc&Jz<gszRCk`W
zI&K>4E?9>zcl`L5dQnC^y5nsB`@AoaZpYPK;IT8}(cNw|igKYiTCb~Jr~73H!fXCU
zt?&1+;`{WD|70ujUeu(8MUMN(zhbHul=5pFU$N;I7O@T7?MK%!y*TqHN)Tpnby%Z4
zQ|<{Yb4VF@uAs;OU{+Ns@s#I#<0qJ~S=LjzbNjy?Hjwv!xR9YLwD;kON1Gilc2eYX
zGb_kdls)2o<SAbRvfM<DGXuG-f+kk#vg7L$UyiWW_`B!&Fr3Ch2i%a{vYXb-+~p;S
z7p!)ag8F&&ijv{3qXHaUS#TiC&@j;0C?sTb!r2P;=qSX*W~8%dljt0fz5Yz#F&n12
z;3B9=24NAeR9NkFtMEt%w##Ce$*oys)Tt7y14;V8aFn$qQXCMcknd?*u;0ygKP52Z
zEO&EBS7=%?1{b5e@_kd-7h(WL+>3K|Wq=Dp!5o=zL8*3OdAWG5qXH2DN-U0c1Hb;@
z0RTApBki#XWYTfh1;Z1fpd=+nfv+C}A<zTXJRlI;o~*Zf#_-&gm4u{ZP~82)2cOZ{
z=DaRzlmGSX)y@Fn)6)Ko9Ot&7hG>S#EW*I+f+#9re(lb2-Z0P?_{EW&b?2r&%g-fS
zuhVOSA_7KCBHjoa=D#?O>%WRWkG)Vfdpt_}gFy<lCVf<w_>TcAoFWbgmT3G44lx!2
z8Rz~84uFJgii-pUYzJCm1RF;42R4(;_;i&cWj1{XU!p<mOq-yL+;3K0T5#|zr;vfR
z^jors)xNS$`XLJYxA;8cRBS=hVKl2{@53Fg`MFWmPq5;T&RO&GtW^fAbl}oWEyq*O
z<vQ323^%`?_(ai21ZKmB!M4}niMfo(*N4j>GcyYa3|6!@j95ab!p<XfI}J~%RM?&!
z&``u|E-$~okolfoUw7<8>S2-|O}l=ggdKT57|BllU=#ev^`}VWrtE%t%hc8W8%_92
zOLgJ-KynOc))?7gO49J?_OIMf9fLkO3e&m>ji6ZM{A;3df?(SN{{kBIJUN%H7zI@(
zo}|JSLCUSgDE_K#f~7k~L*)-a)@GK<XKb{lYLT#!a4rqQ;m2xrbm)ON9P>O;m>5$u
zRgu8-=x_;<j9vllZf(b*qw2<;6=OqGIo3pdOoXOFrVaAHca3x_?kkROwTYdCn9E(S
z$r#%oHzZ&gEk2Cu@kb1|D656Pk~!<DAM40sV6S+U7b~B(#!YF^BOzq3iN?4PFm&iI
zCR!8(7dZWP#EkdivD>>H#-HG(xxqAO?8I!T|2p)005rDST8!on2-aI{b$Sp19vvN4
z0(V3#$gBB8+&fo;u?uErh4m|*^VB45MGKaHtk2bU_6zAhQ!<O-<cO;DkA&{f#o|J9
zwgx@-6~sDPLGi}`%bG$8n{s|6N_^%@h7jbY+{;ytAc^ouqN$9OM&XkQM#}Lh$OVhR
zb5|ag%%kbigVv#;b)u~!V1LT`tJ7L_wc&u^)`)$eB;+Bz#by@m^oJfku~yPo@5DZE
z7psT>%_%#N!)9qj?w#W5b-nA$T9x5cpN$@-MqlN9*>A619$)u{2`77+`;%W&buu{R
zuI-r{NqrAkuwBG-vl(H2PJ582xIZy7A_og<p5aX?d{b6?<&9q)nPE_?UFuv4$Q=v(
zxBO*FYHTLbfFTZcQyC|x@u_T{ueY7taOiYUz^F)rckU?L>w7M%mUy%!&=8+q+F4q7
z#12W0xI{}xQZXzsIk&qin!GzT@`R*;%}p^0D5hvn<%yi@zq*gucAWn)6Xdc}ll;U8
ze9LUZGfEIKI7qt5EFHq$*Kw;IaW>!*3sMaq;^e6MLMj35vIEwl+}H&JI_Ls7Kjup^
zS<pH;Ia>3vDKSt$9BtDG^ov8#N%zJtaF6YA-S?2;$wv&7^{!)c+^?iV@i}QxwAY${
z4I@BDq-h3d*Zb3st{4=Gn-s)<1JlH^Oa&Tnl?ei)vFKM<>K+I;JCL^g#v|R4WkESu
z=vre2kOB9i)p-_Ofx--fbCz@Z%)(4V^v=d*e#!HLT-)7+?<Z}c1BJKxPE>k~t?@FH
z9JU(#aRdOsWYID!K!D|;=11m`yg3IvA|L{_rkC&Qb+&ZdR_MI|2v*QmSWsGb72@7#
zt5>&I97(xE{y~U~!p8jPj_=#YT~pVHKxO{nU3~i$5%95n?dzL5S)k;Rk0*732#6u;
zn?I{`Ue~X>!LK`5eF4JV(L}bbmH$Yp=;<_0F!B1qY^@LBDt{*JCr8Dd_%;RPO-IX>
z;BHarj#ctyt2<GtMn+y;81f5(*4bkh5}BGT$va`9PczRCCDqmDs3OxGEZHDlpK>-T
zOccv|Blw0kKOw;&%K`ucVZLt@bBQH#+*WHvSS{ANi}PkL`;SL&_y84S7Thx=0+u(T
zbM_CLNi7oJ%B)G%H6j&Dj$$w%FD95fp~4Pgc-Y8}J}TdBKnVsLko0+m$p}IoN|=Yy
z1kEP06&etRYuaW0fP^4>m4@zOE1l!^u=!U_K9}kI@~=7;-0v-pYK@O^u;(eh8{yiX
z7B4T);bFela(i@5pGnxuf^fi$`@ML{R3NIx-AZvfohj^1n%il@m$X%%_e!DDX9!iU
z&(j5qoGj%YfDxEg<9-b`OyDFU{vL#?9c_n~Io+i&VU?ypOXVe7JdcceQAH>&<sV)t
zoPO`3sgr*t<swN|OW50a&88N_c`)|X@GU6NQO~fVDK*D8<1~Qkx+O;ZP{h$Owrx@f
zC{_Uo#dY*)Th9w=*@yZq+<E8EFR9xu9fAwd6QLK#+j4gWiMolhOVVRu#e*nqNFzda
zaD#I}!g%-(1pV6Mg_kILe;CQU=4~#yZ~83pb?LGA_1YJ4$>Vx-pYiXV6#;MtbVl@L
z?AL1+YT@qJFSposyq%gkX4tBAUfB}E;N^>YA2>R3L5fS9+wjl@Iw8YcVs5Gd8NzMh
zkM0{XQEgmAtZbR+tRllNFa^NJ5RR0}4^EC|T6oWwYi9od$wf?_5;UC<@p)|fj%4xF
z=sht2u&*C*-(OgO&i5x;KLO&?&eyZ`>2~?Xs)(4#tJbF)&1L%6yC3(K2|gULR5?D7
zfUDN$FCd$gtQQJgkNp=HMa!7++~eb^{{^s)PK}Tfcth{I=QiA`g#D$o#Ssz^m8#1_
zDQRn#I^q&f#^u4wmA7|6l81u_A<g}s{4?|D{4(uA5X05bADoIk#V;KQ<q3w>bY499
zG%J7@U21`h9AA4_y7(DP-tIFGB?jKj;t-&-5%q~?&oY7NH}}J7)donTVdy9T#{t99
z7lCDM2ZMra0yns>=Zyd`jkW!yKXD>i{Ucn$*vlId!2a}j%xYuw-P>Qe{d=o<@f_cT
z?BKe3>F=O0AR!-)@S>5;&Ae$Ef*d~#jf(NyFUqT)`jw1;*r3K*&zRb=&5wjEAU{7p
zW%h9rA=)6-b1lG0&)wj(Vp%<mpWo|%DU|RF1&~(%UDe+HcAVqBwqUSMMd&<YKyp<c
zdZp#?mCT&pJD`j?(f*nJhtY1&DAlwk&3*gTHT$c1SvGY!Gu2eC8*k@IGrn@l-R)d<
zM}z9zHjU%lDxl%0>b(h1uFg7Dw6Rvpt>b{{yz`YzxmJs$_URwNagM_o(RDWwaBklD
zJa^sU<bHOk0%@4?85*lQc$Bvl++8HOfspoco~5wiQmZ&ko=65=-v^2-qnn`0%(>76
z=t<b2OxTdRa&UI<%{z&LwdSajYUuhx`Lf(dJ7?u&jZ{1&E{P>XHt(WORbi#q1yBNv
zR%W2wwX1>*kr8+YSHE)>AX9Vs^MngD`k~?YLXpjS8rsg2Cv|<6F)Jd5SAOgx93F1U
zPBjDkP*Jmx6bDA+NN-9)S+FElN@=gfExGjdP`FoV3sB+woC3?Jx%2Wx>rFTsC=+9s
zEFs`z>NRk=5Dwv@C!-Y;bGh_^bwVBo^~37|j=lJyy)S-TP^$uWx5{$TDJN(wR!`{H
z1&4IoplQ&6@!EFW-xtek%bSdLOQm*S1JWE1{P65<y+$!TR!hsKTctm^1c}G~ab(ib
z_nb8o*<SWQ5PpB0%-3q(9cmx_@|jd^B;0zdMYB4B1`MEuJ7Hygg?3zF5SVk`-eYE=
zL=KPJt}JNuxXg<M!b29*C-855;Jv?}w6FtS`X@Pf7+q$uDjS)kg4pcAk^N}-9B;N&
zV6#RF_?W}(E_Zq=*Bjq^Y-xgbLEOUUDhd)r(=TTEI_Ik=uKXnZy<}BpH-*rXvwoj>
z!_saDlGi2Hf%2wD`3sgjPg_+=ZuxMfuC2$4pts%BQ47Tpi;3u?IyF>^<fOJYCl9mp
zz9>$qVqo&7zEq5O!+?JYr&ZflpPL{?j7(bgTI-uP@2~_?Zity6PJp7CHroIq$MJDM
zm=6ZR@dgW));5~f4_6}&uK`URn3Fjc%n?)FM={dtAo_d7>N)q#gOu$rlNlW90VYeW
zOIhBNf91geoVyc^I}xr+|2i!ipL_NX+@VzPr@!TiOe?xA0Qay?NZRXShkCR?P6ler
za7Ibb(D^PM)ikqFM(LKah-c^L3^o-8k=-XnE<POjic&1TJ`=_8x-c>ja&_f4@oT73
zM?@BYFNNHwkpkQFcr|5ayf(==hKh(th!aDqN~omSBA2LRfIcrg02!3+jX7Im<4=yc
zzu6(CBsC(A!3bJG>+161sfz%**HPAbGqEX5^+*l!d%cc!FPA;()T~q@i+7;u6eq_o
zjgies4H#@xfIT^&tBitlmge$3sr8EOy8H7ia+=3wpg|px=Y#CY)$^4_{+Gi{z7z1k
zgs?LB-@1NV+Z(n^cMZ6>$nY-4V&vY|1hIc(fC~&yWjO6|{)~o-ouaR8YY7Q)^liOo
zh-<yD?b)BYpZXmqLpi2Fo*rUOu0)MVI!kR>rs#M8GrYR3_cF{6vUB4;eC2c7qaE2+
z)>k+(>zj%q>YpO>idc6*y{RE&3nz%G=7;S^!KXq@wLN)?i~i75CZdfpzHGqu3qg=C
zl}C?VQ>H+s(XMDU5m)3E8jMtKV~Qo^oX@6!WwAZ7rB-z2D5&UrEsLL!2rFdNLoXS!
z04)(4GS2OWMrPblg;0VVn!L?+$WD=Dt@Kh$Pr(=k;NVZu+eSK#3d1g9*-C(BEH{b)
zGcWZMJrj@F=11`u43YZ{pYB-T%QK6-8PwZ>eg}5tZ@t;JqwL6@yTv?jXC3Fq*FyR4
zj}IRdUEhm2O}#)-JMH+VL)Xvd`+}dY;6X|{H+9!Cbu;Fh2>h-4A9QxKk27mMA9IoR
zHxPENeK17k9S2YRn>5`z_FJm}`*or#bhw|dd&g3CD;l{LmLms{PUXh!LT$R#mY!qI
zWhzV88L~>E>x`bN@GGIp3!y<G<X;H3HRekZg5^@E4eMqh{Z(|C(x5PR8GI#lqp}I|
zs9p8dFK=*X5|$LQsAvu6a4@Up>RBu7(CNO+kv6!&T!v{Bh#P0>I0E<~A`Mp3HM4M%
zh%nPfv>X^|gVbca+#~{`DpLvewLc6Q`_t2|IxZBZR@g)9uG3(Z-te#~y_iEqrfZH-
z7VPjl7x@#EMA%nZ*Mghz!$^>C4Fx0rQm(BJrEq@J%$r&R`M<tF8dH1T97%wv8W`ih
zlS#-iW975Cy&o$uF5iQWko#f&T6bOF7qXa=AJL<n)p_gGdV4sVwrTJo0d@vnkF&g5
zFs%O$g>zK3x@=XAnC~KJ-zu38r7G7ser10WIbSb@4^Mku+)^=cezV-V2?0Yif4@%$
z&|-de7;vXoNq_r3b@TE@kotZrZ~jV5)FCHvrGx<?Rd4O52qz8&R_BwC83Gh})esme
z9dvyv^_DP_bxCXJBcS3JAuym}$MdrsgQQUv1cXMw9ib#fveQp1wu!uDrqf3W5<GI<
z?<Q1S)q$V0>gmnOvZ9G$D3%xs`-Rg#GqbAoNqg*;l=7@Vs%3eqF`6~68g^ydRqhnd
zqN9e|T+~3q$(ju6a8a2Tx)FAzLvg0jU)bmKXd-^8bfvT-eKL?tl4f?yXefg)GHg=B
zA=HfU<BU~t6N<zjAqH-QaDTdfMA}Hl=fEyvGVkx2!u)MPWJ=~Ont&>@QL<j`mdgy*
zvz8PRDMF4vBDcX@!h?xbOv*eo>F$S)Lv9W83&Yv3cEcKrm6Mb3iwf+&2RA5~KP_a7
zpR!EO=IQnw3Iy~v$fQv^4ln)iSml5R02burkfw6*P;uF9l|Zewe_nmbOIPwWx0}pZ
znJr~RU_DnakE1uVSY{}hnXt>_{vF%yx5+7kA|(~NznGUk;OJjn6@8sY<V=A<f@x3i
zlnqmNB+n3ulh9I^%MV6{tj|U*kTnK6j#BW4OFw>mCZYzr46iw`iwCgw9K|<l@Dv=d
zb6NIN*Gcde9N@q^QlOgDu$Z_@CEgQ@Ff!AT(b0*M|H(uz>}8J9XvH8Qr%W6UV#G!x
z`PWmuel&q$0lLZ5ayP)rvL1WDQ02VQpw73V_Pmls7&XfyYuQ_+8!P$^F6sJ1JTHUX
zU$_C^JmXDZs)Qm4l&P%k{HKBa19w+t<9#bie+IVP=^GemAXmyFSlNPQfO}BfZ##R}
zYYbFeNWha$3pF<exE3ebQ*;=o^M{I!Y*#2$sBy6W<+9D2FcR)JibST4b!3c)4Xe_V
znMLDhuEx4>hE4M6Y_W%e6c>bM8?><x?!71Z5k_Sa6~|8~+XV$23i@=>q-~5*nrJ5f
zgmuQ0CMS({lwvPo^b13=jE1XmPSdEoUBe)B{3_%FO3`&RF^L1~A{06}oGE9;t)!rT
zYtm8Hk>RrB5Hc51j8O=ZePtRV5i(&dQ&yGP_4RVYB||v-yRf85glJ4=^o`)c17qI-
zY4^()2oxfBApPxckh1#vJ&fYX{LA-_=jZ1j`dj<*FK^GYzsDzET<$NmIiw>ZGbiRn
z9XJa9{#Cap>d{Wdu(hobbK<dZjG(B_sM5B56sV>o3yr1HZ|se;5a>90CvCsLvqGc|
zA7IAa;BBls+(CvK#vg4brV)izbnNmn&`>kOvEmG<CnN`<cMBg=3^E);&!;X>#7zQK
zohX$Of@U1DCXjHJ5`{O^5VMCvrN8z=9>3R!@I>3gl)2uV_*7rIL+OwdnSd4;bnx!v
z?b_Uc2$l(y(^J$|R#LQxvtCY7qc=EfD)(@d2{mQ4U{w|syD%RO!x&Z8ctbH1+lvql
z-65s_7!-3gHk|x1kOum1g__)csC_LY{q{EJDn`xh_U;x21_3O{>+>BTkVe_pKR@2z
z-(O7gP1K=qRzls5sgt!(7>XpleP@#k;2+>jgK1rSqnLvcZ~1bT>Ih@5t-S~{sY0qU
zMlrn0wL;;r`#}faFcB;SomR6JF2o#vPcDTT&I%W1L5@+35*_>pLzLJAF=+su9)%Rs
z@gEvVewwix6|*2o5M!)p7bbItWK=w=1Y)9TkXGlMY?v?lT)HHJap8MyABe!s8>-ZY
zrtT@8-ZrD&Ht|n+$MX_Ce)-aQ5Ww*P`oSp<KB1a(>Dk+4rkaWjv;jCgaa6`#1#|9k
z_^EJ`ZGVbu%4E}%7uwGP3u;n9)BGe6xi>mC{aYqf_#ivAD=aQ=+0E>;o4Pnp@mPls
zjohv7Sl$)^5(}otR6cpL^{ePFZ#G4g-QeKC{CpBWPAGZ`M08M!>UhyOuwO07bg6|C
zK{9AoBt{h4T+Of~u=_y;u<f#vK^j|dO4MUjSNid~{b^;Q8ABKtg#ZJ3Edha+Nd36|
z@#x1W3fo?>LS7OfDF%}M0#b((l`7b9CB(2|mugx$@MV?qDJE>P+ITXY3eLkK%A$g#
z1ozdzl33roi1}k(IA}QGoE!!Q1|YbY|8B;7C}M&(hp<qe20y=zMS40T$wb4-Q)Mvz
z_=!HcNbAw6we?Ufa^aE^&AY}$Y*CV#DX!wE*xt=|bkl)Adpl$|$hX6-VXPWvWYNi$
zy&BJC4wK1a`*c>euGgmri%cRHzBUPFT+3SdKHV}71Tq(Ybsa6bj$xc)tqJ{?tyY!D
zERs^m0F@dIYPvO>mSS~~IQ7yuDT-e&QD0JQvA$y*%cWs};GB^GeFONv1YCGDrgYd8
z6RfJb1c|+HCVrNGL5%QVLqYg+qj6b0*rQxQhd79Aj|!7y>nNbc!yzEh03mPhKo$IU
zWv)|yDBJCtGU}fl9=D`JtyM+f|LyJw9Cu*C{qFqReRtYYE~Y^p1K4g|tz~A|`q;M)
z2J{ebOhYpWyKsdH6r;41K_cg!Go+>D%02^)#7rWJ)6zMP&>CW#@j7)fM+RK!C7O3C
zg;KID80l^{B*FXbY|7zD09ltQM%EK6yTu~jWM0O0qHJoK3=xG~KX)YA?T1NMdZ8S?
z9Qgh}tEinZg@-wPE$<{pmJ~E#1&rE;qBIPkV;?6<O2Wn@YSeCGD8bOMaPZ8S@J$7z
zC^5Z9Sk&O3FzCW{^#bj)`T@}<eM!kBb*(UP6s00AC<T1v%&1M5B98Au1?+MO4if~O
zVWPSQkRY+>EuM^$pfpg1w9=OWvof*Pl(|El5hh@pn}3$?DW}|a)MN?HFZK@4)xGc4
z2CFmM-#h@syjL9NBa4wekfI{V8=XH)vzec6LZv-R;NyIBx7cWobTRB}f3NxW)ZhBT
zFkP4Y=4S0a&}&3%VaikTPr?b%zk3zm{t@I&?apS8zlYNKK|<*1xqAKEJJ-a|fdBoa
zV;~~7GgVZFn^ARk*PH3O_&2w?b@_*Twfq>OLb>1|h@qe2frD}kxmcb|dq`1!3K%xT
zCi%Z!qaF7U4bNK)!V3*<q<@_?C5qeT8n45ts6#P>O`JTzM%X-#t%;5IrFu4xmF15}
z4~Lu>WbF&YK{K0f;sc68B$Jy_(2Pp3bOx420~9^8(1Pe8u5oY<Bf%Ke>S-MFZsUTX
z1KfWli%SLuB#&}*6KZ6W;K?gtn97e3H2!%cToQzP8kV<nV@}+Tn6HR7xX9GVn4mL-
zF?-~unY|^zK8^iRmSIN@eh`<Dx+JZ`lr?K1N4mKU;lU6zF!+0Z#x#_Cc<6pS#ayL0
z#*Ph-f$>*&bHf?q@4K5P#zv<}g$}4+hVV57dC~c<-MXaV+p!&Ax5OZr3X#WkcaZZh
zdwk9gfH(m9<Xo^6Gz3Bo_d4_|<;44wIqKJozN}CP9EhK5?$*obcgj~i!=(-8QMKg5
zl*fL3EkFsR0;wxC?j~694Eev;aqy9B0w%_!v3?Jn#-H4}{u_i)vDA<A{*@$}AZ{$$
z3;}J_HwIRHKo*4p(udY(w57lE2NF!4a$tzBW2gQm4>_j+I=H_VTnxTl{JymJ+oy+z
zgKB$F^z!KF>|$@PNUae+61iVX>~u@?r^bAGDLzL^7%sV@Dw!%X7S@SI{xYd4O|}f#
zHF~v_DHGgjqgog^N}Za^?-?_i@KEeWjI`kZouFuL1|e`sa6C2#Qw|c0J_>N~ArL`h
z6xaA5<lUqwR&kuJ44AZ5Fl}rU8QKM0sQD8O{ok=gqr>}`S5sJ6oKR5PwDe`wWo5KK
zl^eqBukHc@U|0w_-B0pdbBS3<QS8E&K`86?`VI%cCpW}a`oI7;+{EA-n4EH*_QGT*
z&}G>NMtZn-AnJU&u~<D!4(!&eAox)59p>U{g9U6qyKaRps`4p9hkI&MtqD32-2fPH
z@N`=^wNOHS?kq=LI}!W{AD#IIDC2-}5QB?g4qDJqdTVk-`c`-^??2hy|9XjU&JLL@
z9#%#j96rhVKD|2sKniIF6}0WZxOuvl(r4%?syY?6vYz)1>Nz=D6`f6Of>tNX8QUb{
zn?;8)TSVySsxdcdQy0aD*X8e^;&IdQEZ5otQIv<sOvvJuFKIhR2E^!BX6lO&`Zdb$
z`ZOx^!(j9Sn1;Z?APJ3nvC#m1XflkH18E&#oG}iLYCK%!+1c4yx+-#0v{YDFR8-Ac
zlc>D`qJo@+Mqo$vQ~EoP9>47DogAO;9a00-MI=L6G+pQ{qqKcHgIdc}q8}dzm+#Lj
zDxilP%lX@iQW6`TjK4wHJixYBP72gAE8!2L-rxiNhQOD-T^4>L4@ene8~W}0?GKdW
z-b3FDDS8M%!?U0j5}y~=ZgE6;?zg?9!f)5GVGB(5J*jVJ-CW|mKf7&y<Y?v#TT;!o
zMFAK`iiCp%ib2&mR$S=M)3Nrq7<;!L^Ns`;g9>m^jBr^JIi|?Nf~YC@ahhE%mp%`t
z$siF)p~FM)gxuhxA;(D2f2c#T;f7^auJ@jd{QE30mL?r$_Go86y_z|Hq)o0+meX}8
zJv+{AL?U=0=`Bsg-vAXzs`wGd=FGm&B67^2qO3?#UcuPU7=-MKgajxnuYiR|ctnJ$
zuBZe9M7h@qk$3GWPw%VvS@FySarhtli2}Oz^mt<RzyOy+Fp-%4%(H1K0hCM(n2uX7
zKmB&?mz<>0h{&$(<^!c5=o6p%>Whbm%s$VjgVaI#0mIM)sEvpykt($Ij-W-L01|&5
z=sugo!E_1+rubS6M0d4dTcO^(ePPi4GX&Sv2>-pSJTx$N&ssNb`b|Ov1P`-5m$C9}
z-HqWWoW}hQcwal$f*Vl%q&{#G%u4HdB%w0JT2}{Gs32&PdZWFoY(AsCrc=V-IX;5^
zkb#5%4YT9SzhmcDD)yFt3U#!XUqJlMgzYv1)pDw$@ISbQ!i?f0fcVf*jDco9j}V4V
zuu#B3<Zy^!)DdeB5uiU^hcUu@Uw%r|iu1-IzkO7m#<{Y5y~-;?qrff05<FeTLQ*j>
zV-F|@ia_fJKpTMMwI9GD2f_5UjP?(p;nENcMR6q`_JlEE#2(&W9PW}F|0yDR%O`rX
zm<&CBmE+~<cPP-3r7kcaN3GLP$ejL?cp9!QEB|wUD$5vivMhgiswtj_nV5z`W|xx0
zzOV=u&>4vp>C;g)Idyh;uC1tS<sD**{UCamS?Yzx|J|jCu8%$7n5P6%$}Hb53cZt>
zGSu!FE%8s&%wcJjjm%SUAa5EMPp~wQzeexG>8fy`I#mB*E*Tt%^cRvxtqeAto-q$I
zL5Q_}-tt7Ju$4i;t$4;4Z*;`RH5{$DD$4&L%nwYgL$cf9dBp`7yD}ND9~hH$8lMu6
zxSZk(N!(tp2MR$lL2%sF{x<p5sl&?)@UyoTFqaUvss3GSh8^_iVZF21?Nfa03sK3A
zI)F;WU~{@#e4Ik)_K+F$!_XRP7kh_OAA7b)(5+xOP!0-uNB$E^<vWY{DE!%-Py=)4
z8Hz=De`_H=xrc{y>wRYUelCvha{Cse*7n=_&?quYMLfs|Xo$zh#IP8N%|G^wk3&<u
z_$^TYb@X|ro_j1MG4^**_q=qalNJzCW42p0oyy9}r7S0vR+b=nsU4Xa%55DTPft&G
zw@)e#_!u`d)E<;>-Eh>5#Q--!?p+`RW&jgol)~9`N_KDW{`jD%Fce~E%AXn?&mYz!
z3V@l@$1M;+6AoCn9M|*3%DbiN8^OQ^xQGYHY*C3K1*>e~Dg3hS&y(X9HtFSJFIDgv
zy02!q12%x)Snl%E7Z~ITMlR5)G?+rbXOP_Eea|-zS_+yBn}5mU<LNUw^OtY?t>Yzg
zyYTzO-(+W<-<UU}?Ph%$YkJU>;H{I`*)69CRNygxu@LnO4tS(lgW<$PIkycCYn~_u
zBUUMAZj6T}gr|p7V#XbBhmu{Nfe#tyT9z8OZENKW1%HEhx;@mG8t*3n0LcpAJ9p(&
z{|HK+zDBCQy*yu4!Z<lNlzgk8qyIvH+<?HRJs^J)Vhr!-cvsi+e*70o1S$k?h%<22
zq1*r7s!4@v0ZM?2gK~P6;>x!!kG8ve9Qyb+Hpg6G_3&^@Gd7KMw*0fFh3{P}$HWVg
z=_J29=ft_UAx{k~R<IT<2Py|DkkE~g6LCSV*Fm3Az=#a{q1SO|&-$Se&D0k#bDpON
z1qnt>{xnqAi`T0U0PnreTMqmOz=x8P>vimfBfu3wGWvIRbpW0fQNL?zPL~-eM5+i$
zj$0=;Y+395d6;VFTQ50hE2wI582>|$<5j2T=+LSbOEd^dG$^?25*EMt5dmV5!u?e=
zqb{!-W%uDbBA`G#zq4v#x<{Vsx4>ED_&enL^5XImuq`f9P*9|seB02vsE~%xSEnE$
z5%F3m%`R5DA2$N8F!1Bt9c}UL?cGLuJ~Y%XqM3HT#$pWwF2Ui!!a!0WQULvcBM_sV
zMWJYCa?Xnil{_UdJ7g8J-nw2!QYdKAJx)Xoj2lQ|;uaQo{bYM+eR#`2>;MK2fK#ud
z*q&m!U@_<bC?)&8kb<(s{UkXmQ^IKH7o3F@GS}n1I~LY4j6?sXPFCi|_TpfhUJ)fJ
z{lP|U55cd;`;%SavXaPv0w_sxFEeTKG1eBpIA#knRHa$Ys*Rqw++1xXUPgLeR-OIb
zGbupD*%_?e))=Q#dyOL1aI%&T05nDz-%KXDm~<#9#Sg>}niWjR#~9EnA~Q;1?^hST
zk8J2yHi)Bl6}La2l6$u+G1feIEB2R;Yclm$qFADc;ojm9w5=(8U4b0DfedyBMfSCd
zYVOn<1v7n_UQr2-79#*-JerXCM$BOJ*%Rs2&7-wr)=&-I1|Ca2)&H|#0@t_8vAMg(
zA5kv!-{RsSVPmNPH-AzueL$k}RFos41eD@(8Bcbi6L%?2X{t1WmhPQ&dQS2#Zq=V%
zftPY>U#revCJEw$8%Thbi?hk<Si_7My?7l|KT-HVY>e@6oqm8>$4HA@Ex!+?r@72_
z-43Q&AuIwSv7gg@jXVyEz@{XV6#6E{Ho;hfbyZD;H#J`hqTDfGa1B6I3NY_MK4VOY
zCv<V{g`bsY<IglLL#A4RRoRVPnc#22BWyi_!(KDI^oMj^rU1D<E-4fW1Tf5m-``3t
zRl97TRc$MmH5vnpgouD>J$XmU%2`%YV{l!6F)(U$;!7a9Uc(*UES6$&y5qd3e8LPG
z?trRRB0&-aE$y`~i5Cu2ICB5f)^thHkmF}jgV`-y3hG%VVHkE%6(rJK{R(-o?EHY~
z`J0W&VRQDuY`Ai{#?t1hMtPl7aRYZzkM3f7JNK}Nc+*#PSa{3`uloD_;KuH=$gD4K
z#8WA11fe`dM7gRQczG4(_CWkmvo8q155o9S*cz}3*kxkB2^toGrcL5Al_WVF7l3Ah
z4<rW*zbzeHMD6Hh-|77l`H*HD!UpIpSW-2Qb*TS*-9NG}{-~C#o$mO}+1ev~|Mk4>
z`}f`VyRm0F?n`l1-In#_!S$VAR!|Tmo9jeCaYJ_}X`UrvOrc;;Y4lTK0R@Fo(G#UO
z29Cr~vrjE+5+}Strr~BiMZ9Q2aA;!~01iD&THcpR4UbbvpGn>gO5<OolP$Fr4+1c-
zmLQR>tg{Yd9D~(LqXK#oGb0<dF0W5Xe&CJ#P&bo~`Fd2cHP)!Btdvf?=(_6ny&PE)
zgjU&VOMF-{YH@LL_!AC|z!(3h-FG7R)NWN3v^}?bC)Sz{0YFAaiVvUR$I0qE;Rg#I
z?3<0KS)U4E;phME3x+c>F#+scU-P@&?A+L&<!n94|Ff+|Li1|6>c7<P*_A|7gA{@e
z)Sv2iO67a*>`xV$2p5U6PCXAINkU$FuED$N+AeYJG&W<zhKCH4E44B=FDoyn`T5iL
zc2Qk-!IJ;y&sX1?fki0=Imy@R^27{wi;wqy-_JTb-!#gE<JX@YpJu<660)&KrO@vB
z;}c<8*s%yfseX<~_=Rl?ejB?zWUaWllc5s^fxwZF#(&K};Tz|4U~^pLuwUFfoX#Il
zWrG1+U0nnJDX9F{Sglv;6br>>XRqi#u6;WK`pL4gGGcUWfmNN){d`d2BAPiO24srd
zjieO-8;p&t?CeFLjPjaer-x^j>?IT?9KU{Ts8}X{*8lFg>L>EyMFwV7?CohO>wZ2o
z%7ZmLy8$0YMk?D1YN~|wBv107>Px`F%ldc1W7jEI!^ec~xKZ<hi!1MFLCS1N<mz(>
zdkY&KwM8!1V6mM&{3g5-^!5@*B8c;*dEThyl0^;Q$4vP6_y9tUwY9a$=J0Y669WKJ
zQc{Tcoc326T)w`(w5d&&|JGpPMhhkHV+eVs>SWFQmC98ck0(fCekUBbN6M&b3k{+%
zrl6OalVmLdHF<4)b5r66X1I*)W)1w!HG*v8$d}&^G8Wcyd;3}_p_l$r6;!4dW4@qw
z#29TAvZN6Op!b#aw)6^dV*+$rgDe}GwsvHoLxf?q5xIEi$fVf3y*GG5A~fHsy{}ng
z&qMLFo2(QM_fOySda~+Yx=MzlgWZ;zORwEN2tXRMiBvA1;lLjOf!-t<WoBk(2A$R!
z@_2I=rDZc%z5N``<P}V^@=1xw2%F5BE5i>T!8<g0a-P;k{RCU~IGA{B8**2R!(#?e
zs${Ln2Ev-58v*s^HS13WRb8}=;pwRY!_W3V{Dhpy==euRSGF_fXhd0THfyZnFPoLA
z;x+8sV~{``;|sYUlAr&;MU5teI6o;jCX|pza~cj=;P2KG;;=aH9arxrD;Dv(GTWmf
z5X!zdcH?SZV>i@zo6L5j9u78*_aAE968|7Xdm?35*)2Rq!bjt=&y4qXwU^kg=k&W)
zSZQ}-w~!<xrKWatbd1xJ_HJ))Z*F#Vc5Zx0(z47i^|Mr}SpWnw(@z&EIrKCO5TL`Z
zZ%JV=4LjFCOhNn-qDAsANmWQKAXM<j8>%7`6YE7yYWn7I;Iqa|?ML7KoFn4%VxyxT
z9c=-t9&(Pq-yfHWd|nK^y$Swd0~mq#toQ2o6Qgk>E)4bgyvDiHX86S1{pH>nbUIS$
zT@pq`b0pQCghMNIJJzpCf^_ER6JHjdIy@uu3qJ-Ali}&C+UnYCA{=(zh9MKZvGP{s
z#SO`-=6QYPdr1>XNu4T*(~Q>EmbTZi1XS57byxRMt&4!q+c)3qm9J_A(k-8F_}=Ry
z-n$2uY4%W=C}yZaudRX}`onlNKLhL#0~LHKU(O*NK}}uV^V411$D7ObmP`IReooe^
z)KIEn2l)Q7#j~w$pWS%HPa{Y~Y)-e{-hZFhI69U_$;YR=zc&v&8hsmP#Ylzi_fSs;
z*oBjR#CB;?`p~Q+Yd@%IMX$s}q!bn)c#?BbYCkj3@=y^413O4>HOf}}B3vy%@=VpO
zXG4A=N+FYC(mwTMVMZbgQM1d^ow5vI4#s$5;{Ju(hOkk2YJd*Hyi&B@ZbTj|xnw$b
znifLuus5h$$*uR@m8d6jFiWgfi@DrUzs+btz6aL7k@QXH%9&(yyQ17{d^PR10hg_%
zrKOa#baFIs6J=v#`}&flr|tv=WoBWfo5WBiWo~NNNU&Tg0V?~9CCdQhYh2TWlpygf
zYUUg>o#&Zzlil^z&4{_dR^2yDYy_YE&M>9~rI4*)u_auP$AbWyb~OoV5Oz?Kg`!3a
z&ZC@jG{P2N*XE{Yy%M2VhyiEv*yN-HFZTZ0*-<s!u3F3Mv*nMCiI6<WodbyIWQAe~
z036kh^=3zzMBJYvv~L5-%$K~*yi!(xLcIax1eIWa6UVkxr)J7wkB95(or+k31TFi-
z4%%ISspZZ_Ujc#zTWzTue{+ZRD;@?*;scbCE<UP*{+pN(djxHH6Gus@Ie^$xllB0m
zV76pXjJ$-xwAlQKK1u_#Bhy$GY6jRhP@<{+TXtK*C9rC3tx?lm8Pgk7z(viPaJ39%
zrIFEazmGSe;J<I|HUcRPMEBKer!+^yw&XMfue3`Gizq_88=|HE!V8V4Vq$Dcoe&6l
zTg%GKzrQ{cspK)yb&89N-=D9c{6<DbD8tAZ4$~7BRLdz6{)jNzRY{@uSfa80PPeFJ
z-d9o|bO$kKnUm@ixx_FwHT~6SsY(jmkW3!20V<}ZDM?9HV;-i96(TlbmTDA!>akfd
zgzm<+N2e_G<D?z)+#m%?m1t;Ye<l6~_ntIUcn#3vCP`}LbF)TIV0CAXx^;Q9sj4ly
zX`)FTQBVN!Aa%M@uE)xe`vHKX*P$V?uHRJPyr6*TdjkUlwP~NyilP4g$#(QR?RLeN
zmjygP-m^kl9OS>-xKt1zS_PnM;z*YVw<5nn5mz!EB4k@(HWdKSA@S>J%aDHLK>+mD
zkzb83gfyVLexKIBl&g-<D+=WluKhH4{8^Sz1gDW0UjPD-9jiDn$@~e{dq^+wn*up;
zqs+mtFiOXCwiFT&!hnAKcU&_ro6tW6=ADu%y(YifmW`_=P)`)gth6FyErLgND~IsM
zQW<BN3JmZ9!EU|M=5*|Gv9f!0HFfXh?cG&(I+4x-0s_Lv$LAtfB&pL(%TC6|wx6yV
zj%%YvX>3|z3Mx_JY9khMl&<RV8vt0Vl99D8DC>fikda-0j&_)?nxn?h1_>{xao7y_
zrM2JuxN?m(p;y=Y4~=bkrRD&}U^VjK#qR8D9fVsBWBBwBB;GaX{Xzl-FdOo9v6EL_
zonwH}qsvxqFVMkAEc3x^KmObq5@;vJLPmht#{hvDa_mP)@L_4VTUG#|nM#DR<>V>D
z2E_p>qB_8uU1EP`YprPor!F(@G*33Nxl`!!klwGT#aqASjkU4r+G1%5(dV?FFK{}i
z$N6R@oeOEB)Or~YezJ^b=f;cCa)FwkzemsKRTNqR9u_ttDvH<XNJdz=ADDA&Hko0P
zD=mPQi(OY=gxV?9WJ;dLnq}3<Jb0Z<vF6w6_Vb=#f?d!goSlKa-cy!1+s^uLou>ow
z`bzLb;KJP2*U90LPigyD?ceA}RKpyd&XdMz{^`Y|j`nsiAtK*~{Pv2s?$N}|i&wcn
z$+4wu=h7mi4}_K~_80^qM&lw-)fcQYsu6o(c5o_0VA$8zpB6tfTxT+B&iD%jS3GPR
z|9R$z@&hht-cfbbu7SWL8cbCdM2xLj$v@JXnsM+N4e|$k@K~B?XmDptttT+S<3Z}{
ztnYK8=S#uN=auFY)osB2K<b4X8^Ko%r;nWdG^90$PkK#OOC3w_km1ISCo=|lS02>-
zq6uCzq6wH@`UdGzo$k6fU-!El`aiwBBc$yJf4SE@995U!8oi6Qcw2{x70#N=*zyw-
z>jMvSF0CS&@gU*hxPY?GEX@MR2T%a@Xr~U28L3=Sk_xDsKf95)seoa{2%(fydut$l
zoJ1z=Pcxz3K0=;Fue;f|>+W^Lh$_++6>Y%HjBsNrz4s7PS0q=eeM6XGQ@nzeCr>Sv
zmxrfrS4s3-(5jEZM1g1|yRFRh;%`?+m)pCiPq%(ZnU_)Jk~RL>$AUSgK<k6+j7}8h
zJweyuvK>_T3$ZrRL80cunTy@`g^WE{vIs;_friLnr@Ck5j`0*Y?a&In)e{Cy*$+YG
z#5k>HgV<+f*>uU0o_b0)QqUiP`J<!4(W!Wu$zcjD#LzNWO)BnIhGgK?doyhAn)4JC
zSQ-9vAjDjnsIVneKpY$t{}hUAN=m~}liU)mx=uDAfBh4!JICruXEj0BZwJ>*7OT7E
z?aK}?w(Gk^-nLE2YDYCUjFxcAaZE2SFH@j0hDvvWHdQJqL(ECa$j$-;Hu?r8R4bKO
zj2BbXbqsaR-WFv1S_cLI)$|!72_fph$E^98egg|hfWZ>movuaP#U=kw{-;ad*v3fd
zM3FfKJ>Qp+e^dlys4S46`3qNAne3nYxmL)A$U@Nd!)Gs&{{F6;_O9{hG*-(sx;;ML
zl9J)KeTdm<i4Q@m_3wy;nambZiJ!2f;H9OddgDF22YX8H=W0G%i$C;yt<0Xqx_rLl
z6Qz#^);IP|F)#GY4c$`NbkXLt$YYv*!NS4{2?=rUPv}yP)XPGh$*Ia7O&>cob6lw`
z20=mvfj{B!k&CtTt`9HsXW_6ImTB&fHm=5Q@i%Cudb~f`_)Ck$5)$Cy!J$w3A1YJ-
zU^qj=J{YOrwtl^CyP!|5IQ<hSx6H}Q?sC;RjDPx6Tl?c0Z>hAUq@<>%rKaYpewc7y
zL@S<!UCE)yn|iovaC@1Gqn4O*?W-s_$89hCXZMP;YUZ^4Mi!UTMaRMM5rzo(>)QD=
z2PP_#;O~&MrutOKtj=DJmf{BJL0y16(zC_wzShUq8ZGDoJ+$L!G#*C?B7sz{#Ca|#
z$li{!oAYlar8y(S9B8zF%v*bi$K<lUy@PSmAmV|U;U%W9Q=&g7C*^fJe6}?VF6BY)
zd*Kir&ld(7rbA7qE?%@}XJ_{{SoCi8LTFSjcL5-9)dTSg3Qbf%&B$PEQEmcb1lh1P
zwKGW;j*0nGDp0K?8U*oux4y{K56MwaXGrL_0|Gws1?RB)cVic<FKf}&yLnS?&dNWX
zjFEsEHljqose_SnE-`PdAV&LAU^6ARTQOs;eMp*1%g_kwH4x?|VQu#8cuw^P`-vEQ
z(IE=W+UH{N2`QQcm2a2`g@hovArp<FLOw`1LC`E&$iWfThl?r@cZWf5F(ozm7dn4d
z3>5@~D3n7c#<SjNXk^K%<uFDtTN&5l%|9^a=`0TH7ynOfQuzbjpS<ozovESgDP5(f
zjLJ<vva%OaY8iwkO0tK6UJ2|h`ngcocI&VK53+$Ei6|4Ba{9S^phcePaJ_!N&UB-{
zmpRO?$On7xXlvtMF|)DJeX8wQTwvqn{IOM8%*9AeebMu`GdOU#Y&TGoThaMU`2?0*
zjD&|KO+`XwMZ(;mGA2}OkU}P^BPsE{e|O@f?B-;|zIiMMElAF8q%9>kF_Q=fhuu<y
z9)Qj0ZH!J(G7kXDCgsMU?{{I39?8EWO~u}q2<s(9&kjmEDWjHs364zte(p!%a9zHM
zBep|wl^cY?d8WNm!FdRYsL1#TC|JvA_XG3*g*VT&qo$^Ar@(G$3?DG2@b8`bOjT>P
zd^Y%tfH90f#0(uGpeT8Ixt<I$XyVb;T~UDx;N|rwSD~%_eKi}Ok>|%Zd6p6oP@s(h
z)9>>3-A(TX&CMWZnPf?ZD%4gqkAglUZVCrnb`doc@zh0#{&E9K9n6u$T8&)<A(_l9
z!1>XZBG)x{AtN4$9}z<fGDnu|h+~KNuiyXDIUF43w27W{9VMDLKQAw@m5w}tLEoBc
zfLtpm{skgj42?Fv2|}B$XP%@uFV9@K3|MPjOsHr~X&Utb3K%lJL;rts!J32@f=3M>
zNb`mRL6#8@4FI-22kLzZMr6Ss!m3Qwl$Mg&qJum@F>T@R(P@a?Y(Vlw<_M$qsOwpJ
zCDbs40BDAJq@+Npu*i`ulIe>j;!#V818@YwEdO$gvKtF*Yvj70iTt*eTg;XM+&tXH
zT&&xzj4%PCcv4hA8FYh1WCl?fOX8`(Ndk}=1)!59xC2F-)PEB3JJ$Ki$cTs(WoBy2
z%0A}(6YgHU+tzFF?Y27u%jgE9PE}A)aK@lzT5QIi9|0qQCk}!()ZmsQm?mB2&;1?O
zSys@%tmk?8Fe($}U?2zr;OuDqsC$2ZHv=4^{x|Gk;KZqf1~TO6B5@Fl3QZBM1dJ``
zxMwkhTi+vvl5z|+ApU~!inIRyg7o7{3o0z|f$lyZL7qsTt)=zdOKY>9dXKIVDSWkr
zb&IXfs^5xuwc1=?BXDxFKQGw6`0B{HcLPBOmqPjG)=p+t?q<Zb-l~9shPesKX}b{#
za-jQ>i9DV%`BDLM7kh-;v%=1qU+z)_(B$r($?l`2qeHHJ`iFb-a{ce7=i?Z+Q-V>|
z6Vt&XOEi~BG*>2;wX~MwKvjL!ZT7o$?$;YsrLQLAacU1X*HO1TA3@VcAlTi~;(3at
zwKMf!FRaFb9vD1D;Ba}mgX2^aN39NomJM4%H9!M^WYQfT#qzm+kv%#u2Gcd0JS+>A
zZ2f7xspF|W*}u$eyPt54^fWr{uJA{?UAl0vH0$2sB;Lm1B<pPcDi*aq%UAxa{>TID
zjChV4sdXaHIdjZ!aW!(Aj&q2gD3=0DiFipToccJ1vPAuc$X)Ow0RSO|Kc#nbgL<*}
zYrcnf6jAlPq(WC9QT2_H;{%@ip6(utD(Y<c&b&91E&lQ{Fis!L&HT0@Tr8|4EIEFY
z+v8{S(4Gdmb6C?9Q68w>jZ~A=C{H_C{+TWWdGa{{1ynNj#2vOY%0+3l@uvcR;3LDp
zrWh#(MLYii0KC&iQSLd<cXv;Bca%X7=N$SkWwR^4bC0)iPth;0(Yw5Drvx?q;&4Ax
zSJ2UGe0vab(oi9hpLXzH_QZp!(Hb7?n0oroeKSlC>0P*s^72k#_Mi=cE^zEX#9*CX
zXo0EKFh*6IKh)=bsi}VjNR&(DGJA+$Z@2k(=Q~`DRrI<9kpNqKd>DV}BH-XQH#Tf|
z(@AP`Ehd=M8Ac(a<gc0?&H^^|1m*%s0Due{$(tolF|y%!EW!YH;cY2)txbXxdkGo6
zH(sD3fyP4<K}rs;<5=-1h8OMo!OV(?-SQIgSi7k>e{cDCdwG49PNunkdieZN#Sl6<
zkq`CV`1{^*xh*2{*gSk|@Uu!gy{jE(OWBiO!{KW#;wxZXwJ+kH_<qKpLjJ4aEg0$R
zj$1<QnbP6&-KGaI8oqEk5jeWY;W}>Ms|q%X4n?wJs|MJN12Nc>j1$54tAA~`NP$6`
z<y!fkug^tGHUJ|$5Zb$R{xl>uqLD}(^}oTRJF<12S@GG)v;k8mqDLdBcO3Ka)Ma%v
z=ct+R`Slr$JVP&|=S?$;BD%DtF3u3UYOVYL+}}=YQNwqTgW~k(O{!?LsZ*V)IjNS*
zSxnj3*>iXuWW2xufg$ks4-deJMMOZbT40mQeMLS#SW}Uo|E&R&z$e9SF(ODv`9r+L
zE&}CI3zStkA;fyU`*{TJa~t>JZ?Hi@Qlr;a36*HiZytg#iX)lALQ{9(9?_92i492-
z5-%NRe@CjNBTlA8Uq2ayY7mx5ZVDE1(+y_&i}l@?#})tk)LzB8C*&<8i!K#eC_jHU
z_2(z|DUhc59dQPy>WSqtyTJlB|G;@l3E<~ChP%zQDr+=5=T_S$;KU6D$YT<pb-RYz
zlZX1hPNC={lPSP}l9P+=%0Qs_OP>h*VReQ?-QqAkz0XiiA9nRlRdj#H9CzU3>+(0i
zr1ywWY+KPs`OlWb=ut<~lPvol8XqCk#uH1CRf8$!x$E?y4RFSGx!w)D(7=NU0MHoq
z3s{iB<TZnU_Gug$rk@y+Bq$8sncDQb*qlnq|7ax(TA<LMb?#VDP;fRmTm%|d5E_|m
zMU<1y(*SpME5#9}WM2~aXmdn_zC;=t88oYz0GnH?ngTTn2JjD?LvL6V_)7;Y`jlW1
z?H~YhVKn%Gn`p_QDXOlKu+y9jNpqspGrBl{@rWtbJ<1(Sew!O8{1ruf+Q;4mJITTw
zXTlBfcWELK5+ba9oTx22y3I-xS5I9N&?NFs-$QQcGoB#4IUWC;!-@s|g^ubpS*gnm
zJG*@PJLfwiVMrui$A_1LAjzk~4j7Vk*Nd#r4o&cpO1tj$>H}0E0KjMh&#mjX-G83-
z{x_tpj`J&{>%XTDdcgq&>w(9wcXy64`xCGlK#M{$maYTMVQp@{@|}J1DIFFU3C1aj
z%v3OVfsT*fYBT&yWc@-~;_Ga0&qz|#&@g9B1Z)7#KW`WOd>hE9_}I9p8<R570lAn%
zX~zh>cEIEfm1f}J%w7(lptS{Bt#2JqN#e6RO8{R0@Ope)3KVD2gc!tu4-vg5%4TG+
zoj8gAe*IrvR~Z)77xb?PxP-WbG$P%NETGg%cPNcC2uLFxf=f3@2@6Pxq)MZJba!_*
zOCun$@8$pPectCi-|oHVIWgzVnVH|roO^K-78bU$va&DSf)Rg+{ZXoXlFCz&5tN_v
zw#hGZ-aaj=QP#|RijX8UAHn#}Ioo7hd3f_Ly5+h>GsxLO7fL5>pc~|6sOKd&MM+3F
ztRknIpa^MBg`CN3`N)BT>E94ZgMEP7?Kjzz&Bb`##_MTq4EkUK3%8v!T6$zYEf+-b
zvXG9{PV&)+#JgUjWiTI@jOIn7JUZgCpFRQuOt#kdWxbXAgpxZ`p_GNHcQfoluwoGe
z%13!~iSAa7vl3%y3ewYP-LVxuXD>fKL#hu~0W9&L%~p&kLMZM!>@X#yN=sdRu9TCA
zjI0xkxBoej(sO(*3o)+_j4_$*X8g$<Pk@bu)jr=w&)M72)+YS?xx~%sXtH6DvflkF
zJAJNV*^MXWUZf=quUNrTqxMSIVklec{sV#xe#@TkrmYJBXg>jNKICYa!iem!e2}`q
z_Nlc>6Z*P5C5fx~wm~kMe1hSvG~2ZX70z8ZFB$R3xP4ED<*v?lH&G}QxB`27z88nf
z3W>~Y3=~lURQKNMl$T1Kx1Gk0u&UzU{FBAR#&ko=(G^vGfO1~k8?8wU3R)=x5h^N}
zL*+YIWN6~GX1g(J_qO;IvI<$~3R4dk?vre&1~tunZhFGG%94$l1Z&~8rx^08#~cOm
zWV?IxlBIaEZRE!N{U|an?3!Za*n`+7a*(6cretF%;S>6Uw5%-JCr=i{Xt6ZIm=Kh+
z&xtP4{u^k^PcO65(C6(dPNLK#B&Zr~(hXRkk#ZEOG~);gUvyafv30o~92^WL8tjSP
z<ofwsW%T!m`|ST_7JPf1s?n0kqK5SH?Z*46nk7}}lN=@|&nksex@m<=aiz_y<|FJi
zBVfG2PU$LfwOSdP_*Lw;H!ZM6Bc?$BsOx(o3COTyd|Ywj&1m{w8*pt9A=ITzhe3{f
zlbH#g3~=+6j{?>^XZ!|*uh^G+3*%e0GL2riv>jG#{;a1<flB5W(%13~nIL1}ZHOQK
zSNuI+)SOcN;Q!=Elk{0x^?BmMT*BjIpAgbd$T1GJEV)-Do`mpJbL#Or9{x#9NJwBl
z&l2X|->WN86SCh<mLbBrH6ag?!q1^s=%l-zKHDA?`Z1^$S^@eQ)hk0}`V5qri0G4D
z9rX@oS`u^?d_$9G9$OFwD(J>kQIaVRi(hP?g-VFr|5-`*Sy}o*#Ryh@Q5RqY^-tRW
z7clDH+$E9Mlw|TkU3xE}frA<RkGkJw+p%9hz<~aad3)APaTsx2)>jG~rq?^%T(bhU
zNnf_YC7-^o!Z^u`#st!>S8T%#;Scl<)f1(OLQKEe7OQA99@K@Ni+s;wi=1k19v@|N
zCyYPquCy*wdUX$Q+Az+7;FW)uYOIr(M;vFJulENC!K-^NVpOs@;luZ3h|RXE+5uj2
z@*T@D{UU71s4kFSG^rF=mc6A!fYe@GA7ak@WW1c;^t_>eIM%Pkp9`b8qT!zjz1F|(
zWQmL1hpAEb1qji<IA0pf2bN&IwwN?d5l=d46Q=0aXXtaJgCOd`{&x9<m>;06-|>5$
zslToi+7{a{!`{zNoHmSD&np{KU8!V{;5{w;&gt7wa@fCxlXD%<YsClvb6veD9{dhT
zzr@}Pk{zET>u~^vO$tjg+=xuxZX6Bf9QWS2n-n0r#Ub6)ik!|eT0h?mBuOIg``{p}
zo^!GDLs~S_`iIuS85M!sV@lIcHU+o-wzL2%&%om|{f{h6L(K(SfhQS!((#0C#2Qt>
zsoFF0tcXBMs2O7*VpUj_6B%6Cj-LAU%<o|5n;!r;kiO;m8<xsDp_a@G082~V0;FrE
zs5m^d*XE`s5Jn@AL?9>=i%7kh?3+@BsE=#!e!~Qyt&o45A>a))ZbZs7KO{+MTHx19
z%5^Pvb_+{U0Y<zv%U3E!89<zM)#l;1Tt5N#c}}h-aHcHEdFCp^0+;t01#ogRZUN}{
zyQ*OIASedtc1T_qj-j0Wg^i7N-aY;X0Lz1o>=0HWqGTod$S`pMH25ELAFJ5H_Hc$I
z-<MLuC&|4DrHFfVV`WQbm=I`^{7i@vIe>xR3WeJ<+6RB*82PH7Hj4h?@#ETV#lXPw
z@~Pp`JPF}R)0AjaIO!FNf1Nz~5RCLuWhFepB^uppf<TAXU8!)Gw41ct9<BK&J7a$c
ziB&%xyX^m@`pKCQE-a+NH>K^S!j@+M?;2%_U=T3&O}?ukNq?_RJ~5qlQZG@W@JpVG
z46!21Jdq#^uFRvXX@J6RKSF^j{>A37UisOo(rbfxGHsL~*fFllr4u7lem?1)>Vg|#
z<q~eg&INj>A{pGy=0aS+BN$5tmbq>*U{Zp|4N4ubXtPNl1w%1{D$0L+qK&4%Gkvq2
zfS(6EsrmARE_rtrA$L(xQJG;Km`=3?LNc(9D2h?aZfVxJ0R<9z12xt}unIr;orsut
zbz?&|G$^N``NUUA7&DxceyralEJH{pN=91p%z%UhiHlT~(?hK60~o*(W{L?MLYE4a
zo+%Wkr<=-#LHq6lX1c25S}tVlyX2tUQg<5+ACUHt5e6`%<>`1(L!u^q=PvIvd9B*I
zOkd{Gx7=IWd4?LCCiCxkp=C7rG+*aHfk9Ov_zolZNX&UaZjRu!g3^~JP<bvK{<6Wr
zOL%g0e4Ie_@#9Ap73wC>X5?vk<E_I1T{X-2<{xscyV-B~t7AWj=x`6>v*K;Rm#S?i
zCCY?x`uqz|6DYuuIP>;1GNJ)$>+6eNv8$;Kl4bd^D-u_4tn%nqU%BF}KLV-#gfSif
zr?te_8b_)YK)xDU(9z53vbJ?}aDJ_Bs80X{-ui11F{`G#&;orKd|Wy{H&?VVyvpaW
zG?S=pDp^p_BPV;{lwQHMct<ZDeb6UW8tEP14)5H+U4;2IZWr4>A6Fe{89a{I5!mE;
z)1+}RmV*VvU0>ve#vn`Vht4rcH9Gb{>Z!Zo;qt8$iOAqK>n;()og)9W6R*nRg4zFa
zu^f8RA7;8Q!M4t?ztaLQ#Kc%SqTfx2?~9UtIiSAVCLiNgs7VyCC`{X<_&Ugm!AN4R
zFb2M@hYV(+z=t>G;4Qq5tT^diyKh_Nf=%XeoO2&~zx1HB`;1i)?R=fpJ^Dn*|JGmA
z!O-J(n$i4JvM6dfnR+V6j&#rk{Ho@_ff0E?LgIlEe4rQ(>a%*RHsR7im+~s)z}Wcs
z<CLV?8I<k9**`En0fM{7fJi;X|65=<Vg*S<|6M5EZrL0(2Y`--j7E=L*VWJCO3eeX
zMnwAo4E<*#mnmhFH3G&HX5iIQiE8Vq#Y&Idjx-}<(e7y1i!!8=NCh*cTV@hbaU70(
z<a{4guPX(ole<T#rmc7^m}%bY@Z!I0k1vb<J_Hqopac{=u$TpY;g4pS>wx~aGV)mm
z!DB_rymyW%T7u5&G_VWVhGeJ>cbzIB1_FvNDUZi2flzmNBYw9@u>W1n%y6;OkF~dB
z0S+Xj?|sU-dNspIQ1^mk3g7ldb_Ym!{XM`%Cgrs#X8v{BNyhlLp6`gew3hyeMeS-+
zk9V=ZL}SA5vAx%Dt%7(}&idXWlYP49p2T1f1A9pjQcZDEcGzf$=f!uH`Lc{^>7L!;
zmMsz0e9`ozhX8xhPNM?xX}xT(-)VhEcOrA)xGhk7xNBKp5Ss8bai#r}k|;r)ab{G4
zn>GmZa*GHq6H7h*t2kxNQ~I0$Dr!BxaJ~s%9NpxgvUqh2F&!~JwwyASiJqQ~tg^!*
zfFMs+R+bX8z?J+!H9O&t?JD8rg*Y}`?TEc+fAny<vpX^L9szBlyu85+o9nQ$?B?)D
zFc^hXi>WkHA@^Z_R0)#LXp8-fyWp$v4}NZkY3?qC^iuUdtUg+{mZ~LD2H!6czn#}{
z*2{z{VKMXZ)0Vn#l2-f?>G4;*6vXS(s;o&W6Wpzyd=;ZECX+u4<RpcwhEm3_s$5<(
ztL3bJbadI7h-A)|XHY}zMPth2MWG;k))hPpb*`PGqplre-II<a@1}nk<hyJBl-FFj
zKYEab57ao!izc2asl~}d;hOG!r0~h9CE+RtL`l7f8w-i=<xC|{aJl)d?f744may8G
z9&-MaiPJwoyRg;=B*r8G($^uwYv7$JtgblQtGsXie58AoCzhPWe^6N5x{uCMhd-zl
zjvM=gC-oT*W(@6f5u4k&xtHxQ0KUBU#XL|WR@7aIu0niXv{;OU6EE3FVLCI71ma|N
zV)f1bZ&@0gDnpk7=3`kKoSEl&5;SddGhyLCi3hZ&!|c+XBYtr33w#ABN7mq{rI~H%
zsQ%lld9OCfZq0Qguk<4-EiLfBH<r%7a<rnFv{m_<1UnD9uKD}Qd+>iHH_&HXfZSqP
z{w@>rsX>?8dW0|EIhk3`{iIH{IpMd!WVY|gs03Tg*vu=gk-*TIxDj^sv9ij})fo@@
z$dgt7Y&sx*t*JebeD|rYy#D@oeeYuWo8od~-@j~t?mr6`-M3xmKK`t14LCrc-?f!W
z7Qgw9g>%2Bioq-W1#^qW<O+GuIP_?D?1Kkb!k#%)STa;X_5(besE$<%el$vL6LWf+
zj$L=g`*_WiRs34>*gB##k@JzT*D)`modd;07pUQMDtk{7BH2~K(#g_vd8j~+UdiIJ
zXQylZiXD(>0D-#v9s0p{#PgsfWsw?OgYv_*<s}?E(M4<qHr)<prh7of1>-}_YNeCm
zDJHhzihvhC%u2f5{8kbxGt%sYqLVh-^Zr;NTMUE#tJaHvrk*<VaIcG4i?f{4rk>9A
zRa$0WS8+FycVJgH(>#mb`s5MJ-NCI8o{7xGf*^<`_9L`Uf1CC98TC>(>{><tAu?ci
zhbo$JKTKh)Lf)#d#X~W<2B*7t_dI+aokc?eO#ZzBQu*E=uU&+@M36}3GMStf5|%e!
zoX*<pK1>bKn@W_)RP}$?wG=29^CT;Sw_BW!5MF&SC359a0g2OD^sSlgWg=(|85^NS
z*kUZ}I)`=apbdv=Fa8Y1Aa7iqoE@B|Fvtld{83-vwHlscjN*Kiu8v|(BYj(y;6AbH
zu^R#h9Ymc<lTt8cS8%y@vdW!WXZ21=%{0Hp-|iCw8TrB^_ihqGno^B{4CbbpotV$f
zH7kl@APL~NkGEhl!zJM{A=I7w^&$)=oylhFMHsU#hqDt=42q0q01b006Ht_V*6uPV
zXY7kCZn$kTcNG&88@H`WkZ@RRG&0oWKg{$2Oj>GdCxLpV6bL0({z{pp;tROElloFM
z&0@g!<;c|A;pXOML|jjgVg-oO`2tI0+ZE^wr<d|hCU50=qk{x@kQU83dcPi%Z1(Ug
z-pLC5tKBPNaX%YW@^JBnp4($lZ+O?2mDR5?@axDgz?ap|-(K&mKUE9c`m1-&tv@ct
z^HAtbc=aDY3CCGeg<45;cK6J%&BRm9qGK4}y1LZ&7<u&fN?OfuVFRb$e(&!}^oI$z
z#q805nuDQ}Ui9(sSE|8V-!kxK<m~LFwQr+T;)|y<=?8hYi#u5{;n-O?t1EAmyh6+i
z>1Lj63@BXh85e_^%DtuH@|xRibVJg=j@jc)HI7^NQ%`0fibCvIg0@M*drV%`47Xtv
z-0@_1*zN$pI&(aTgi%kU<{eG^SA^Hk<MbT+LI)SBygf}`EyEoBakS(fgjeQ?)t5Ud
z|6UzeGT5(rENo-trW!M0Mp2||iw*MmTqaS2-Ta2xkhENDlJC{PmzX_sp>B4yVGGCh
zOC9|>5{G@7DtuD0bb(0ZFNXudt+wWx+;|KibCb$aP_VjME`+PR@SpqStwh7oz^d9;
zPS1^XiKer`@}|YFT%5xc7q9IkatufC>0&Lf&Lc@1jhi%5jdee#8?(yCO*)X+;3=|m
z96$^h=;^nd(oE-iw*zPbj#Y-s&#U}CFMknozp}V}zv^(5L$ProVSI(Z(a6UFrh{(w
zAzxkeQ)yFs$+g8kfMoKjLbc%`YQZZ(N9G;xyB=bzex_)!OB<%xZ0oTE&%orU$Bi6f
zf&YRZz)eP61zbn0di&ecb@Y`btgc8L7kuHVi7q4JB6L|V#gUh6m|bgDUL86klD``_
za_c-SI(}G5&@63L>f|ku!0b=T?3GXLMKJ!#<r+O$Bpgq!)6D1U0b|cwS$|hskbC~L
zMS<uXm`og~lv!S;*RZdZq^QEu$Q<~8u^~#nsESE)K}Y-g^@#=^gLt_3ylv5!&lR=@
z)Er_5ub~}TH3hTv?ClOxCldvO70&$=O*I{M9K1H8?z+6sxmB-eko3Ry-sY6cqlVdL
zv34(~9;ewob<msR_HtBWDBTus;SN+tpI8gC7nppfR>%LmbAk<X^zdh`QBb|*UPK>i
zxC8H%p|MgP!fGyl+cFjH=4l~w6}eJSx>#jjxegJ0Mu`%>NUrCSLEL|e7_&VKc}S&c
z>=SLN8)6D=CH2OdqbjqRqzE+E*ojoa;;!?4cK+?t<k$dr>7FYH3evnNCxn9mxXmU*
z+injZJ_MuD*4Nknw+DWz?m*J@x#PP+^g+n^{rl06Zc*b0=nE~Yp3&|{0~rKBK!9U^
ztejfIZ@1-=2L%+tlPfEoncm&s#y?K8t$IzG&a`%`L@iH{#w;JLc6LTn$;s93E+NFw
z%fF~z45p-{xKe-BE>6NW>fOQ$6r!Z0e1mQ}&w=0U&(&$Ye*GGZpuM>66e%_wT}W|Q
z>V9q~QC3v8O+}G;yI8tYoqEB_DoW0^ffMm7Mm8DsxsF*NE=HQTh%50Y1<lIe+|45i
z^bN&^R}VdCUm2-m^3BMIjy^BufX6*stE7>)VThm3ZM~KgNvhA!?6|YRP+@nHTW84B
zi6lxSS`s$c>vN7_z=0KlQ@Wu9ngdv2(t5D?kc#(ueV_fC%4<S@GEFs|7ZSE^b=_(C
zyihoXIr)8}B!g|>y&ir&OF_UV*;@t3=`Ix^IaE@v;408^dS*snlz_woPx*H>1bBI-
zZ{+<r+il=}_J}!5Mp?NpUnvDqKL!pZg3r98a>Gd~vVGWjujkMIhmtw;-F*5FB~z6v
z@%hu*YQ84_`7k7hVd$sev6ab|u)FEyeZOCRojIE+WTd1RK=04<)7ZZ#l&cWO)n47n
z=b`K)b6Fgp%op!Bj+l5dMEycYhjT!`D*Bs3W{xzO346So5h)uh=Vwr)^^OX#$}2Oa
zUo7>dc{lWtvL|hciP^3lezGQurRKZdtK;lp0;x!YA1ME+-o41<fJpthh~tG>Zvxf{
z_M<2bX2T!B;j1eHnZ5rkMoIOf?l5|-FwDY9M>0h9_q8P0;+K4PHqbLo9;L`dOdsD)
z*u!F^!u{o=B#5|s$TI?xkb>%SAx1lpfS{3W`ctce37Q>`0v||7`a|KE@#KiIe6Rr!
iN0YvTkndi1qG<t`3UzC5fUpk$76lnq=`y%U(Ek8ZHsuWf

diff --git a/wikipiki/concurrent03.png b/wikipiki/concurrent03.png
deleted file mode 100644
index 9c97787d62f2f83ee7df5512a2d8a809277d02b3..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 28466
zcmWhzb6n+57yjm(?M*jhvyGeEY#W<4|FSpRZnKTeZJW8-wl}-peg7EG=M2xxGtZd_
zWkqRJBqAgL08nLRAgTZWwf`?(34;FTFM43-{0k7j$>_KM05bOf9Tbq6O#lE$N;VP_
z%F5P`u8uC&j^D^-B_zndIXha~*jWI;e=9j^R_bcUctQ^wx8m~Q0m<@?s<<F>Rq?0*
zoCF#M3PcRKaEc$xxGKLeB_&~rhx5Z>Vq*iMaaEX5B9WF5_9zNsgA2nWM_;zR3vCxV
z9}Xton-_%-t8Q`{rx1EUD5)|WDqI05<>I86Tfsy9gWG$|qJc<M-vA6yqdA4k8zmI*
z=qD)12<}Db2B7|%MFs)AU$S~xKZSjupNMDZLj{CD^|~hT%7X%M08y`4@e)8(3MwEc
zokk7FhXsts%uIIy<<EdIt^dI+5Rmhj;SB}oB~#!+<tG5-*cRasz*+#Pn$nDv1hiQJ
z9839rK49rHz$&X{DFf8C0=<(M$PEAp1z=SP52XiSy#eE4O3MF$kPHAv>RL<iim?Xc
zkm27<Wi$x3QSnIz>VZBxA!unalhRGf;xpoKn?RdniZb_kW)QLma-whDi~~S^0`9-j
z-n{)ciB>Z?$sOB*X7u@_2mS+WYP$QrKUMin6acne{iffUSQ?1}1mFYg-wUWOV66?2
z^W7ezEE~{8n}Ph}6|I|Z|DPMlAMtI=%lmtKOLG0<dM2Y<zVB9jM!i~Zc29nSuMc-y
z-8)o)>;{3-u#a1P<F^XMpQaKKLrm8W;-p_&kw0EZX2Jckrfu2`IJ+uXPO*^8=o|K8
zaD;dw{Q&jMhxyJX(+iC7CKpimRT#=U;d7aR8O*&rErzyh@6H1NTz5GBnxg~31Xu@e
zPkDS?io8kZQv(5(vWZRrU<jdNRv&E?83F+SBtMX$PK@~W7Xec*{HI@VYrl|Rjk!a_
zsrviGF~pI~13oz$(^mzF(|w<)BVjORnG+@9>{YS;p7afkxliLKn$S1&XA@BFFS^b^
zL|Cz55Vi@$N;s5hq&8(N2tOnAk>ZyOELId1`A9g93RpgYONLD~Qk`5whU8kv8JaIl
zU#dMpU>INzdi~xh&6XV4pdvJf(k#(d#zPb$Re=1*+?6de4lh6Jk8=}|P&D_C!#|bQ
z=qqu;5<{%LM+68Q{dTO(gTKY=d6^KC%*N`$RVbB%M0J`~FdY$hW>fVZuvmeTy@=ef
z9^&LCq+&AK3fhWGGG*kSs5miK5P1+`LR9)_!AWKEO*HM8PyGa@>}+A$GE9^USaH}a
z7~bI${XA4y5fbdQZSl~u^+oD4STj;H4yu&LOyyaeGDMU~BP-^%4G4V6OyrEip?f)d
zzxO!yi1#S2^^kH*MV*Qs)pqDqN59Gu?qlq8?!#N8vx{jIW~#22{ZPl`iqjRZ{?VdZ
zs}fd*&FPlOHxY~{D_>k)kTOeTjc@&6Q+wpvj=7#fs+jgiYi8_N`Y7!P=GFrR^*e6x
zP`DKxVHN=bffb<#L2bH13E^xM;gC8j58G+_VFr4JqlPv^3xf}C!YERTTnbGJF$0Tw
zc|}RZMg_9QjmDUIT)Cl|Z;g}&huUsA;#_K_Mn#VDsT#4GRk=V}ScO%Yqq<0upUztZ
zyv}ch-%1iiD*5$ByPbpN$Yz9%|1nY6qE>!)3*_pjsh?Q(acAgAe<SIL5~?Ww!6(5X
z$D!4zdXsD^g0P$J^qB3ch<Hd>ns(zCxq)*@ze7)4!l}^4W}$Cek(!pOT`5zkQYn4f
z#a(k=np4sx*`f0ih$c29N2^aOZ51~OmvgALthQc?REqaSi2tsJxx%)X_(uoCqsO82
zB0aa;Fd$dKv2??;>+t!LFUy<yoBea?oivIzd?N}K{3^;Mf#3j_lcOLB%h2kTiiE*$
zQHf%c6qB^=kc75r!NPf|7%B8<n?e0us$Kg*`@upQcp3^C`7bA5E;3cWw3X182q*|B
z3{8wr6ih5+aAgUxEwUeG9cC?NZMGWg{-?{-Qr7a*LbhQ~w?yZnrPCo)mrtiyTSM2N
zQK~wpntGw5x}y}cv`sNdu`+kT>UZ5$%ScOkD`DOK68vgSi+zi)iIpk7RqH^_?~A0a
zB;R)5m^UE=)Uai=N)lZXKbIzF9DYsyjm*jH3lZOe+tgzgEA1(asU?ox7VI(lew!S%
ztXXL*e5*E>;G6KM2>GBf<}_jEEaJiS;jTS7*E=VJZLgWToUF#IzVoux+6(Rrn~Siu
zym8Jv`dl3jmp{LUCAL)dr$vzSQdn&_tNfHClme}q4=Gv9SQ50V7wcM!Jt`hdF7bu$
zg`M+ug?9ycHrO|GjK+C-TZdc6lzuzr8ij63_)~tEe|UXN1Em4fP*yMzfntGr&@Yc(
zJ`_E%BK)fs_YKSEV$u0+Vz^>)LDfO~zp5#$htJ}xDIN~fCle-Z&_b2{ju!qPm>ify
z{q{ql4Gjy``YsatEnJ&unk|jXV|q=(WfSrYNrh}=S+Obc)qa-aVi2xi{wlb_)6Us0
zGRSPHGd{1Kqb+ME|A~*8p@!SRu6y(K{3dKCX9s!L8$X?8*x;MzkIBB<&{Di|W-KQD
zR8fU+Mc(AUVi*i%c+u3?*dEleNS=KpeO6$WY3}LpB?)~7QpIZ-hA&=;X9=BLo>T)I
z#Z3EcA++W3oeHQ5>skD{c$x0x_UuCZU2MUL3Gq(i6%=2RTC7g24lLcrsw_eq-Ul3_
zT3JX_5Jqep<E!9wJ|ne=mmI0<(k(I|G+0?^S@ujsjPj*c<}yy4k2j94#`9!f=6#%F
z^<ix%wiJJt*ZNGNeb80)m9Ih2$#WHH7Z;B4yC!^<;Lpew2K#xX%5$x>8ow?YuP?TN
zhQCIGel<hco+4`??T7lFt}UJ$C~33kY&M%bf6pNn#*K)q!CA#m!}VXHTl;UHILvXh
zCu1$Ssl2kk&3wvo#`5@J<8!VaT53hwK^mF^>hekx>ZWGX`Q5$bDofe~-D*d0i$q&t
zkKoTvi_($F2>}uHBK2GKXLat2ne}Fq#Yczf3u5oid(N}@RlUxKH{p@)RShVOFY}i3
z7B8|djSnI<5f#UesW0{h)r$5`=R+_vFmDKyXf2CvbMquKLh7n<3yi1IXhUS(?>Uzq
zpHaC{HDa;{cPPI>Jok<t5H}x4QTbQgqrI!P5oXEUNvud%zKUmFXG&$MWxnW{>a{D4
z3r{bcY<Rs&uaco>a|-Hs%H61s*sL4}%_do0PetdX<oNnAKdl+B7PNRDnoVwgMR&Yx
z$8g=Ak^G1{6zCL~)W81edfl+PkFE7nE3=m0$o|CjMDRUnR%xgsyCbuvP2aZd!mF#<
z+w$R<IG1N~{kF^V3h!fKK9^5uz3axy@nPWMZWC|a&zbgZa;#(7gZ84jQ>oMFR`gtK
zSz<kGUPSMGZRv8&|7)*D{>}87^aFfo@YH+4T^zauTwF%n*mu<Lr@6ese0)11&Tq%B
zr4m!-Q#85w?*;E;HTZZeevk8~i<8so(?8O#(~^4ZeTv^sdQS;!R|oqBNxMh><6twq
z)qFYs<+0{La#^^EuC(Vv?oan&{ZxOa_NVkEi7+YY0~RLz=GBbj^XfmmNp2>i`UL>I
zr~x1#7yzC={)NW?;Km97C&mE4pAG={j)_JCQUG9XAPW&w|8M2Y*CRl4VE&!&aKm8b
zA}EN?S{e2ie1SFCI{FtCyq$HlAN>Ly1RGb~bl}2D3{IYjAZD7%h%=%9-2ZACBNtu3
zDVeFg^A)3r$--k(;PCZ5-T83i!Pf)dLI>+`1m0uQd2B7iYEsYzNfS*FClQ{GQ*MSl
z)a%KW-i~H?&|g1OB(v$-!cMU6mak|zX$=3TV#oxVP3VH%v_1KONZiwh+4OeZF?M(d
z_IQg(YCB}aP;wT52La1w`pxVnhGL*lV$`5|@l$yEyRFec0nKNxmI3_O;{ns|`8A#a
zAEnV-Y@7S~C{LIP7s<=$bo&aLXN=S{p~N1LcRl$2Vn1p&)b7=)!=b}Wf4Qc?U?}n@
zIFiv+hA3Ydy#mN%I?^|ATPRM;b{?hAIy=idyl8k6)BVQ#q+g1|Hl@hD<8XyMj$%PW
zLVwr3XOx1KlqeI?!Te;pyjVQ0PpdP-@DfrqfZiY(L!)|sGq5h6NqCx0lH_?HAzJ_G
z&sryWx=@q|VY-omhqz57n=b2zaV+C(&&_4Bh!SGtC~L#M?f4(=XV-K-;#4z1rcAg<
z5td>BK1)wx`7b@x{Nfj+nc$O|G@X0PcGq%Jx7+O=&l8&^=x;M7VTyjYBYHGn+RqnO
zg<l?4YJ|L8!W41I*{D$Sk#0u>c3FB}^Mk`C{(GCqx_nOY)jUobpSts8#&8U=T7u0Y
z%u6H-xxk%HA`ah<Ve$?KfJXBtdBK;mbo+jh{|*?BRyB?-$P3!wF=25`9tvdYpBSI3
ztfg3x8aGwP?a<1s?7d+v-5Xm~pGizC0ZcrPWpKfVC7w&pP7mCH9%xyOKn`mm&-|sP
zoAM2RRgXtWb;iv6ePW!(&jmRckS{rY#pBNV{Cnt0ZRsAj{va;c-r6^7@(6Q%>-qSH
zG+)aL7?Xl1Rh*M0in{NU?9xpT5JV0H89#UA9AQFX(m_K+%`rr=Ab>I$+)f4nkzGkm
zMr|}$aY|>nU@+DZats}`ID{NL(_^zDZnhd#*G&jZ0R>CtkpPB-ph4czB_S#hNWyzs
zIH)ij#0Ca~VZ*`V@`>%oXSF31lH`%##WiRE@(fiEfR6m^^0*pouyEFy0*rNkCqzFs
zqIjLf1{};lMSy+f!}kn~EKR`5f;UT6_PT7or$5cQ3lsYi5AzH@etBa;gTp~k7@z<M
z07~R$s(bLpjtab0g8HYb&OOKhGxnw%(3r~5B;MymiG2msm+l*1vuJa(pZjj644npW
z*S+qc0@8_3clR$1{RUD5?$19C%l)B3=pyZ=;Hl(j5A5;=KOIIoKJG0k$V~<kdVQAM
zq$fFi;+N2rG}=>5)#v}|n|XC9&3p4Twjq#22UO4|d&69UF!2sPB1y;zq@Z7Ke=)U$
ziZF$5aSRWrGv7YIsprt-_dL=HnKiS@;+OEWlS;6$md(<pvbPnI4(B4RKVr++KD=sv
zF<o)}LbUo0d(6>7tbXuW=&4vOS!sDt8PC7ic#s8}Jn@H}l|sS(k!u1fH776;2`b1~
zAu9lphg)KRPd0I3$U(reyalF^maZ8owH30!jMPJEIEWPr5uh_Mg{2ZR`7;*{0#MRp
z;UqJ0`rSGIJjC=dLFfQjDz6{pWmy`cQ-7f&$2A}T3gq8g5;DvbB97xZkv!?y9^>{w
z4uLnGRzj-o3b9<vr<8GSVW&WPl<L+SH%D=A8jlnYmyrpF%|GPy#Z;Fgljxf(^Z4Gz
z0UepZ`mKPRo(`C?1hEIiAEWjG2}A62;D`mQ;#&`=ru+|_h7h#uG6)nfx8V2s-}%tX
z1;<e&V@>DvC}YR{5sCco_G<n`pEu%7pWE`%Lb?W*x{Rce(`6ZJFB{oOT&tsGjf1-W
zQLRxVitp9b_Rb@TwInS%mJDJGszpMGhkLSl+61bx@Jbw*li%Wt7(o&`b|aG_TvoY+
zjcgQ4%Y@%upaLW#Ky@bO+zRvnIfGDLI!lpeSpa$bd#4CraW&<};=nlSmM=WUug3Bm
z>Riw6^o^VgWG`{2q@*0KqGBS1lh7y*(X(q57j!g^*%Wh2M}Y@VD~WIJ+~lBq3OiPk
z_N8a$RwQYU#)5LW=+9PeI8e&H09^n|!7WNufp)qMEI~T%sq}9!9Vpz3uOP;Okv!^D
zH5CIjiV_4us-p`6g}|xI(k-L0(3Mc1udf=GC?zPy1b~5Xu=xsFgbqbQxG7+6ZfcGr
zK7EKQYH9+_{=Mqq?6$c90MiYi05ap`<aVpc=OGc+2cqJz`RdW^(yWc>i3_Rh_gu?}
z;cJ3o=5PtwezAm<JRR{tuFfn2b=jhcR539L-FBGd#u%{1oSH2q&c5pKKiKt$bg%=?
z!D9WbRbsHH9*qxPi6B~Qvi(!XasHEVObwpRwYqNR)b@Q5GXH6j&2*9hl_JkfI<UC7
zco*HZC|&sk9ko`=<ReSD|B4$@nwDh4y=U&%b$HRQ$Orp#f(ESS#hE3ciD!`%A3E@2
zqImAy*({%y@Fqv$OliY!Lz_@_`iVBOQ^?0d2F_}X(%~>60TWHhnVW3_S4OTLlPKXU
zINU+f&z<ZyCDRH%;!VD!95W(&2Ue5Aq}{AR14?W?a!E7d&1x||S6_T?*4{(oebF)-
z2EIXC4CvZg6F2vN`AsN>(|Dg_W^c<_U}jp3KwKFj3BlorVs$CNffV3ya6~<EVjv=8
z6pw+XnLc;tSGMWH0&tjcu!L^tqD>@O8OmABiHhC<;{CeB6y}(JJZkN=a4^NdP{x=O
zeO~k7B`*A2l6f+>y$JB+kcp>Jkg|iKF#t8^tKOu&Ct_Y1UpQ6NVlc82m|McEh&auX
zcwk%i6%)Y9C{18axz-J96{C2UcD3E-gwbS>#d4@>eIXVH%rznOI;SFt0acQ(M>A8F
zJ`IXJY~~$`L$@34kGPCp1b4qxS`3rZJ>Uq)WwA6zA2c5iPaU&;Czp8?e^L*Mzx~Aw
zd%KD#WhfXv(w3S7vyaCJ+a9(~aWp0+Z+x*`S;4Z2>{w^hW`FtS8O!zEG$Yu1wR5=~
zEY!)O*Fl_&r5Bw2rXZE^1)ZAEL~?ACQ1u!PVRAxpe5c9)lTA08BRn+b$nG<jfK$B{
z%ZnCZ8iA{(x5PXbrNK0Est>(ft)rAVp^$tm{N22@oyztuys&SlH0Kn^UYuaFH7(?=
zocjz`^(KC!Kq4Gf^jPzWq#66chmU=`hiQdo`#U}~MO7|92TPNww+cxPQNE8s4$DMV
z29X1~(G-3rwZ-tI^xPs9`pEs$ZC_CQS=7o7Ze>o^7=VW(h7muf5uA|#7F7pBj&O`&
zap0rbcLFagGw3I-%MCk@`A881xHw?I%cTK9V5ab*iLb4o*|V>3Dhkz>0_d1FLjA89
zciI#Jo26NWy4{P3;ib}tEfySoO?pDb$b7O|YP!wx0(w8lWyQGWY=vVW1cANfO8|fg
z(p#{6*@;$Kcst(qzP%hG7133{j#DCj)rvivrWl($O2()R(~cq*O@yX}^G|rV^#6Ey
zG>hxL&$KlIjyBwEzf7y(NMhQow9I`u5ZROUD~3a-zh<FZP{?#aryF?eUOs$cH^+OV
zrb)<_`&@kfn2ivm=Vv9=wNGq+0=A?@i;t!|w--KuERTyDsunM?RuLwgIWk8!`VQzU
zW!T=#$0l#EHBzuJl^dMM^6!vIzWOFKeeU8@`Lh@?-PqhnN(m<HQs$nKR*76?V9C<S
zWWL6Nx%}KXK&$hB(!pji)O1O|-G=@X^#N=Yo;_*5$dgT{8HsJHrbSbcuU>^Cts>@>
zOqIDnh#SQkp^8M|iy>Mvi+Er#*Oa|INJ^eh5GbWR+jNw|O;KElO1VRhk?E@f5v?9d
z|16A2fdSjq5e_SJbY9W`AVSyY8eoV)1%Rob08Y8~qSZihkS>^Q$jbic6s8mjhk#@K
zOBg5s<Hv>XK`vbQ?F6C)H(x@NU5)`<@i?RM+18HxbpI&UyJhrC(N{Y<&N-gB>iL*_
zNPI}|Tfp=k6!@>EE?{&n{{JPyzRe@;9(t=8d9E}ltE*9r_DXFnCya**QCZ$ztodQc
z#l06^Z@X9xMX}(4H{^sP$(CSwqWwWz5KdPhqqnR(pNi#Nl<cCxc>F_iA=cppbi9%7
zC?}uVD*revYeT~4(cM{YDELGW!%I>OqFavnGDex*w#ifpem*-N8H(q(dK_&ynvn1w
zS_o3~(9OXdKXxeZR-DRy*dx3;|BoqiG<#FVfn{0yU|-OuVUQ>JHYqu^Ltkz>S^q22
zV3UQjkf<DpWh*K8@FjWsNYKP=5(Xv8XDs^mS5>-30hXm^MQ=8hY<3xyEK(#ZJ)L+l
z7OXL(m>{{2u0bwsIfSZ^z--XvGb5$;5FQjTQ%fu+DJcC_6wGD{15F-vAiewjN41_f
zIV?1}xVS{V1B*%sE;)nxaI#!)I3$7&?0ja+g?@czEnB-#Mbva3@1PQN?=MS@%ud#b
z_ak9cC0n?9!XKLbA=fh*T2o%Gm6YvJE@DA@#IdZ6L`E|*MUIGg<buGKOSnZ1i+FGx
z`83QPu5U}Nh4S?6>sDR0C@xZbd$_2n)-zK)L1Cn-iynPp7!GQ?wnsEw<c{`@8;<RD
zY!j>Lgq^){Ywu8Dx$g{CRx~|asz6XZbYZp*6CfOxMrBLSgKeHRGjQU;(5W+s-2rZv
zcj&JwjW8eC&@DJy?x4q%Z(o}FPuD72yXyOA!e76hPCR2{HyDqR9S%2WMMrqIA}-m|
zZra_6Bx3K1UInAurjp$q9XA}i{ySD56b1spi&UZ`?i~IDD*cP`ZU%R6iCNe1_l}yj
zvymEDmAoo)ymE=qCPhNKSiT_;NVtL$Ehe566{n%}!k0ftr?Jhb2J#h>1q8VZ2W40B
z7}F(u0HGlbB)SP9+bLR1zR`VEu?PFuU}-K`1qZp{Di#7siNp;@3GWAkf-n;RWApv}
zCdBig-j-r_GAQVJVHEeuKR5hP80298obw5aNm6La@8-D*?eSPbe7GHRKi2K9Q}fcX
zB~wg`)y)bUtuQh;r<Tr<zt3DiC@aJW;)MKeeUlvLYG2LgSnjJ;DJw#Wt2=UUfUC!q
zBMQQ9#k<o_7DLZcri_8SL9t~Q)kd+ow{dDUZ@Vg85xvhboge)syMAt4l09wKm(`im
zJg|WAeigC54~f3h!%yEuLC=1c$Az%Cv$u^TX+!eX_wC^g!ofJ_O+Sz4he1JW^qvoD
z^laFNT&L>Soeihp7C8jh5pt{mjYirW_g$376}Y6S74J%{3napzzHC@z;P0>7BxYyY
zkE{6}lIcobWr)D5r49e((qWM~rjF2IZaoWX*Zw$EPL3=JG?^gBi5#K-WvhDtIBEGU
z&0<3D!RU63=e#_wdn?w_j^&v2AhXrqWx3L*>txTs<UKfT9j4UCt<Pbel*|A2;l{!5
zdf3I0x2&|sh<15|di|4}&>tvRVb7<&!`8M(|7VR-$kWx>uA~3x-3&*qka36VHbY|R
zUz**;1!kYU=L~P7N0AQoC$d-b!AF6u@ydtI8YYWcgWJEKdqT;g1-czIM%;84C^z|T
zwLSLL389pHhWkGy|I{7lf5l+qz{bX+z@i&~P5?FbV@5zqx^&VZYyx+qNqOuPB&s;x
z;YGy`yC;DQ0nPnXG6CWX`FQ8m_V<Uw*EAXa!#`~a*p?J8nWBS+8Bz{n^kQfc)L^ZB
z+9O~y3WmMBi7(sc>IZBT!$qa2+0gh!b-n6yuLiHh>lYOr=#TG-|Ilq+93@5|UI|9^
z%iK@KZ9JA|*}8b;_=3#i8Y}L9YeeDubM8t)&O7MqWgu9AkbDq@R5(=A9SQDT^!Ms#
ziFvJ))6-ck;qo`TcW95mQFdqOcu-vcv}!;kh0{q3py{D=HyySyLvc=Bk9|Hd2-Ypd
zm_a{XR2t`h%>Jb(S@b5g;r$}Kn<SyV5ywVSq=(vVypnet4*@8{U_i$ok1PIoApotS
z&vjkSnsvw4wse%+k$UmBmzT<o*Si=F#qRew>D$Ct)}-XB0li2$Kin^%Z#!=Oyl0FJ
zUni>zhc@eflN_F{OI~LR9x$EEH~Kv_;-hu$o^|mDBWKqO@X_I58bfd-YqCHx5I|f7
z=SkCfVGuq!90Z@|`F89*SEqIgOEr@h0fsK3i>!DM+;3UEvu&Qr5rSg=xxbZ5ZuE4}
zFT2Tf?nO!MP9ivA0GL7-@WvJ<J5xgQzE%-;Z@`@3y<cPskZoKPklojgdSc5@cH))k
z{q<k$7Jf`5yQ^e2373F?2qc|wo@&)#$yGiL?JwB4jahcV0WPWbOU?3b^!pIVHTY*j
zv&%1^Zb8#R&4vUH&l#z)ML9NOFwp-=5)=8fKBx>p6w4?^`r(p@32*Tx$#hPhA=yO^
zW+kp9TvyCd`918ETH0xugM+C2U?Oe?m4wajiWA*j*F2UPkY7iKqhg#bbX!iSHYphy
zp5B~MQwtUkuUfzgyfTAQLZ@ip{4y!DBzw#}DVd#}BWw<ahJwGh`f?~=-fF@j#pxw5
zbM%hv?vi@;SBXSxJvP8CV*1`qjEj3E23-u3>fE;$2xN298qQc^v1=Uatf*CJ_w@N;
z+=4{AF6cMzsfB#QBkVgyxOg0Ay_-p(%tjYi%W=<@-zsL@rG{}%CBuw0I$m8X+-e?k
zH(+@8Oy>7Fch%=vEwknePoDxjg8!%#)7$P~$djzUlB7_R5F)!6MgWM_JZv)H$*jEt
z#?~Uej;+ZzvPv)d$rYl9&i_pHIyB^VZ{R_gkUMkcaejNCtLkVH#f{gbMgJf3`{3G@
ztFUtmx{ajD5M26XO)$P43K7<iyS0clcr-#K=;&})!N7Hi*zt#|%edK};oyc<oCEyE
zP?G?!)MC1IPbt_xn@63i6w<xfN<0{n7o!-66M2@BmfaT)p);$uJdJO(Te+}D^pm+{
z6LD=vZh7OG9*<K~!mrgl!m_nc6He#s)7{pqDd7I9v<iooVIszaMbv+-<X!DRt95(_
zpTAVV;Dht{xt<zUqs&fEVe%n3E`3$W40I`Uipg@2WKahgo+T#ULid`Sjfhw=4hJ$L
zCO6p(Hvtv~(Q>BD2O@~OMy)Bq!h>_R4&Fq$0H;w^U%5(~i$=CDk*+I(AySNu6((xi
z8V@=egL2i54UodYlp==^U}K3vL~G2TF`zSOW!!Dm6lP0;=byDs(@9qgV;m86BlJ2r
zywKP-I3ty*ritF~ThiF(JMMM{-c1S|^*<Fm$O<8^h)kSrOd+p7q-!<qhMcl6;UI;I
zoBZ1Yr$#jT{@b0IBt}QwVK3$f9UBR63EQqdAwJ@%OIY9Y@$dK3_iXWv7B1T>EjvHv
zFnvKz^WIaP|Ba?BGIhSzK4)rm`JL0J^^~D=-bQ{1`1e$AW?iqlT)Iu%-N}=6nxFQd
zi)i^h9Sv`A_m4{{fNQ*VpJ!_xJDgNH&sq=9JDTyeq*6oAUh8hJb_aW7)M8hT-)Lir
zDQR<^KOFspZVO&mmOPJRN{!yI0N~TNY2TisF4sP#T3^DgeU5H)+I9AQ*8i>_T`oEB
zT}O+;&{v)AvUp<JTQ);P$l547ALi=K@C{u*mVDdIxtYgv;iMt3;1EDO1oL0f)ozuX
z^9(9F*#h#`o6V3B9c}jCKf&nBS$=m`A|Yf(AAjOgdR~`NYfsX;xi4B8;oZa_y-J2%
zyQ!NW*uYlh;g{!SLxU#z(uk+uJ-J@Xmv<(yJ=cqy8)8vo2>=KysKs$Sl?JIQ!()oY
zArBF#o7(aP*doEti;Y%>jQE?&{@WQm!brek-p!J*mHvb8<F4e#(nq`6Ls{Uw<GTM<
zj+EB&%Xp>IdKdgcr|-u=?S(6f;QbL3KyW)-skmG?c=IX3b<YuEQyPH?6wt*&kw*dn
zJG`lJhJu$Rv<k$Zxb6>vy`X(wcRX8rRiuUAfBKRf7~UZBp1dM@*ZLhrdLJI8-Shjt
zB6es>V?x)Y-*iOfrP~{w85IXRvqpmQ?+1`+Gk<^LcJB)mf&xz7g<Li;!(Ocsc<nAY
z@~Sqw{JB7LpI^^4I6MTQbA6ndf!^LE=BF#>`M)EZ{!R#=gkQ_cXQ2S&$K^%zWi&w8
zZ+}Pc0~%oc+b{38R=a|_*NjZsehua8E1m1{CMI;c;rVyPXkx*N?AuC;$XYYe>A}av
zsQ<-(I10W#+`y;jo6~!ZkDuE$$3O>(=U{>mW5SpJ7#m6sl0$XUp~ULxEH%$eOJw_3
zBzN4e^&b|AKwd$(D|9&KIJ+3ogTa$<J4Fml?#QYuRvBV4>7m*o${Fi6LIdgXxC?S@
ziD-RN6j(QvxdLVY@%8a*Kh(&74Oz3q&9DhgT&BD$4=C{dT*0CNHgqCiWu;cznO_Gy
z%Ojkqro!%C{3BKalNI2hG3${D4!cotR4h<P81L9w#D8#Z&3qq>?~WZ`80kDAsqHv;
zrIH1<3gjJETz*UMGIzeW+fE_`oYwGt{L6bDY%g}VunP(w?vQEl)+;jTWHieMT~{Sv
zH?wROE1rRXC95g5tDrXdxU<=`4e#yDo{!tq>7UB}e#eEShG=QRx3^o>P@3KDvvK}^
z_ehk;_^w&vNT~tF&7a!{Q>4y=!g{~GLAf2Dy<T{K&TmD1yix(Z6&Z_fdy)7X{?|u2
zGttNaKo6<Q5)1%*yDlmZvnZK<@e6K!bCPq^etvY)ddT~`#NrOEeK#0Wy2;~m{nP0o
zHf%PJklS-@t6Fm+`@d0N+70&ozZ<~c4Yi@@jHb8RDH5NR0fg-9qbvjxHSY^Y#oWgs
z-_}t{a^(Lg8iL3=?}+(q`V{M)Cn9!91)ciH&{h$F4gZs$$Tatzwr3mU0J<<8kKpTz
zA-K|V-EZ&)VZ(DWe-e7>v}*J1{SaK|bx$JFaYZIAe7img{(EwXpXYxXY~^Ms^fKA#
z@Vp+_n#<SgP+OhryJ!(L*}eZBXdo*5=wE8|o@Q|QGO6`vGvD{^{zhrm6KzoG{r;Zp
ztq0j5EN_$7Gmhx#Z^rb;%itEpMxS|@iH8A-)hmm>&rlr+u+V9b5*L@-^{B{u)4uvp
z2Bm#-U&~DNu{O|(UI`A+iTnI^-0YE!<oNNND6skZ7#rNmb06(Sn;#CoO0u-hBF=Ze
z!XbEyBC$SyMR4#k-TRr<Q!fO}b+aBEgtc_M7Oi7Il?cY}(yXsx=R5pE&t2`C8nl<X
zsDMB=uM-#~y8ar*oG19Qij7_&6|$_<Epl?Lr&v>w_3>vviR|Mfh4$<#LHNSt$9eyQ
zQrGK&L8aJNqn}%;J(te2VnX@ulfEu!A`cMprTuWesfC(#x5cmPur7J8TghV%&n9l`
zL18sMTO)AzZ`N9(0p)5}*~GQS6nUMlzerlU<__D%Z2kOCdlb9(G7W4S94u_{g<bby
z1pX;8qEK|X{!3qTPmmgOPq9DOzkY5Scs`9Cei5uA!n9QKb(|aE$!R)xa=HAuTTp7!
zuf*Kb@ONe(y}R+_C{XWsSjp1Fa-kstjRALB;WK%JDz~3L=Q$WUVOfdO6zVIw{q!+6
zldZSyXn1_nF=IHDSBA7GxHp_C#2r0Uh4FJxfJ_jy941!bjje}DL;<ZF6!`*iqznc{
z0{M^nDolFuQ@9IuMONhEgveNpVW)!Fm{x{lWDFkK`B+67g&a6#1ka3hB^e=EHn$67
zse<gZp4JGIh32)Xk|dhUzq9KY1KQKV7uu4R%ve|vqT#R!(|>rBRg`ygL;a0hkH1_z
zI8u>`QQR8^Dw5>n|B9`Glc6(pU1^Gltg=?Zd0{}uyK<ZS4Sq8lf?*+Z9woCRb(L-9
zdq8R1`EU=Sex|&fXp>g#aj9#GXkEEnQsH&K?~uOVAjJHq(TiMfmp<yNV_$wERC&D}
zU=Q|~z8~dDC9O{72-=)%cb$8%dm1Wr91m{**YBM#u;y#i56g=$wcmYP8@%alQ-xnf
z|BNY~S9d5~)*5+j!Avn32>th0xYXeOmA*7OSk2L^iKnEm<!NBjvWL{;tQHFRuJ7}(
zlw&?Wj&F(5wpB#ZOuBA69QyKc&{mv>x`G5K{xo^ingQ@hB+>rC{&SIz5rU;Uj$l>b
z?|i+;C*|Mc8s4#wP=;4mUrF=bWDK7+<ZFM~*5<rqb|v_VyhOKN?hI9-yg$VhBDk_`
zCzDNn6#9H5uG^*)wvfHv_`dW0X8NI4x>fKt?f>~doNkZp3obCA-1XwogRuDdak0)9
z&iIm}r^nk0Sl+hv{w<<eEBxQfB;gf9Oa}a^<NZ<yTU=oMkVh|<V-L6OrOMD*{vu@c
zlEbT(zIK7M(HkF@_Zc6-G4HAz3>(08Lq_0#$#k=$c<>mk__A>^4^nP?X_e~xoL4ij
zjzU{q?Q4%Vp6jyjdC%%yUH&`QO}?a0#mpNFeY><j%-7n<cUBVY1(5gk&Pv_a!Uvof
zpz~qTFzY?+8ejrwWZt4mz_0Urez&Re+FG5LJ3o<596$dF#vDi9{IGS9SVFshm#|f>
zn$-O_nC;zxxZeqf54G?>{K<N^C)HZZQ6bC&6cq2PUWZ1M>yZmAkmt7_U!7!bvAAxm
zx!w+?H$ZcpT0Pqt4m8q1;i=e>rn$6A&rw7V7i8l`tn4fx!P|=1I*kAr!x^bEA#~(+
zvtJ=qIgoT5>l`&kZ~+D)VZt=;K*W4bgc}it=pWgV=>JHetXUF4f#B#n#+AuA?-nni
zLAuGI>7~UWa_i7}PF;j1fgiNV4NhBTn?Ix-jSF1TO7w^AGw<XSs08;rADwgcX{=Qn
zNHY_457{(SOJi{j+Km$dQH7v?>~2ASW;dcK4iKL3Yt>m0R`U}y<2V~56hq~A3!{Wl
z1~?2DDseVZaM^4RmDCLarVIfH*h%Mii!O{@TgZA>%3jXLG{IySHnSAoofIJR>6M@A
zdL-EJ*s2R_8GUNE6f||K)qh_4ca)#MFt06d{=9Y(SyJl~xa+@iescV1x?K2sk$jn#
zgq)wMpctWw20BPnb9_s3=c@nybYj;>N{_3b=7BdJ8p{fk?fRQC?6RyesBUJ%k)IZJ
z>6MsCu5?U|e^{Fy%0#njE4b9(4?9obDzJ-x48dQ>O)yHe%0>QLLBEt%B^4Ar#=tlb
zJk@S87chBTQuai(ROLH9N@TwBGM!DJjj&ul7S)d;_fdgE&Il!qQl*BzoN!t2DdwCO
z7#~M^MX>@iWxHhwc&$}$o@K<6jL^W1^fSv%uT<PWT|M+2G16RUqLOv-x(D4P_MR=M
z&=}j-&awzN@i@w>e6<on1F)z3*SeY>3xmCGZw;6mWUHvNBBdbtU(?94Z;l7>^`T)D
zJ0GRrDkOn~9G)=bmxUdUmmlim&~;j^3@TNwzZo?7zkt#OBkbm^s=e!|syHDbI!F<w
z=biS%5#fO3P@ndpSv}Np025tRR(Q;cBaTIv2&i{OB>s;>Pkg-q?pKjc^%KtARqJMu
z7*w%HzCt{0K|Xd)f+++X8RHZ0^^ZW)_3#RIZ)@yu3$hE|9vEw)>XV^qm$urTL8Sk(
z)OE;tn*Fqv8Dx;DfHC7K(?tKv?p~|04Z_ie$(AMx$!_feTx%|dNxt&Ct}5DV+sf#W
z!&4-t+vQWT0sSj<Yw52(M^7*bcN>)OmWSmL0ES!H4jNZZr9e=O!;MXx4?c_HoA>!Y
zGU7t;uXpL&ZudxS_PvO=$F!_nNQU=0AJV1JZUpuCc;`-@f4i0<=}&C``>Cu+ua|;Z
zgvBERtSp%FNBpO=*-+=LUtJxbn;E``uN?iNr8<A+k{o^&u~9S6uEl!iMn2?mxRozq
z2;1vrQp{SEnn)ORpS))<N<z$!H)}m@hIu^B`tl|^9~jymyAf$Wo?mHG)7gr6r`uq#
zij(nhC8-ZWA>~CUj0isGWZ0zXPc{Wa$Riyr>yIZ|J>9;v#W(<MsCc2AdV%&o!z4Y`
zSQ<;>FA0w$Z91IPNpJ0dq(Sil0>h5G6ptivRqgjdHT1EE=X*LFEV%qc@fT8~b*qDO
z|Mce0`ajw-NTGw`KkDOgu)1s$s3HS35^)lX;&F(OL($gnzl$j4-RMxrZulSU2yDX2
zCW@O;r~p-oRI*s`TaaKl2=z#dZ)}jXqt8Jwm29#u-z7_2->~p%rpKMfZ3rcUNy@jx
zG6?+udDXh=d0Y;o-B^9aieHadBaO)O0)q+l>o)PjIMMBV?)>)%ZEeKHWiqRS`O4Hj
z!xwv_0q}?JEpNcGcCgOF<ZD{p@JZ_jH(cz|tVEb|<hRn?7u0Ou%jBoZF6Qg$f}!od
z_1F$So%-(n+3(&5#}o-cYWV&|17Um*T`FVaonF5<l=`-PTP*P4)1O;CG#l$Ga@;;T
zg&vNlBXsI_E{r-3`pC}tJPvv^t8+hA<^2Wx-G=NRNLdd9=^d*Tv5M6b%j~_#(3Cb_
zAJ9|el69XJT$K9$=CpoEHpNJxk~_B1$T*$J(YGnqrPtKNR=Ho%ppeC(<-Y>K)Uox&
zWZSbx*A@E|kN;+^=gnqi#H3DSr9z325gXD#I*Jh+C=fAF)|XK)+zHwV;ZxC<`5FIB
zOg6C1xP`ws{#&0MnHn(weKey-nDZ%uP6}Jw3}TQZth$QAO}<z~r=MS)Af~JhD3=D!
zd=+HOIvCF+BImZroY1u`5tf~>11Kuv$jLkU<-D%93e<ZtzUiEsnZZo=dZ1zhOTG_K
zmn=pt6Qtg5D=k(p%mzD(^XHWntMlqwnv3e18bccMxEk|LZik~MnLpcUYAPzKDk|u1
z)O2pG^fhp`{#9A*pU+{esMxJI8Li0tSIeF2{{sFc?+w~r|H*6>x_>qvh+KDHEi~6R
zIm_-$4;^mdkDR!pfhHF~<As8HSfjt0-=MtgGJUtPLig{rBM^37Qq1de+O?<!I-L`j
zB?WC}=7dna<%rM={Er(h(`Cs>{I9nYqrgmP4Qy>#R7r+1QHBB}eA{y`Q)J$AFz(V<
zQ_}Z}W=R5<LiY!1aRQggm!}>|-TMh$9ZbI0OQ(B@9SCk04YLC;ar}-m?n!YKBtpeQ
z>sII|iC%x|fw~Abc9ZRS?`+Qrbj5Dhal~hBk)LPpLKPYfiBKUiYWAh;J>IYVl~Y1+
z-Tuog{_NfN(Js=fS;`S|Sk!e>8}c>6yKw;E{c*eEXqR@BY*~<4WcHCz_|Sb;6E$JE
zl|P-9*QAG9L_rAcxZ!fF;~sS}N_Oeqx0G<G_{kp)KoLAC3ykY2#bKmI0shHccHgpr
zsm=Vhk=&)&b!KfmF}zCpZP`Zt|5-QyK=9v6F@md7VsoSzuL=Vc+jxz7VvQ+*t5@`G
z8zVf1V*0F3&n&Zu@MZXoW4Ckas^gi_K<6OgEihC5QCE18@!vAj|JecB+=t5>W&shh
zU)_tn4-PX2*S)i~yk%BIgy{1fq)$m*HBa*?J%94Z9+TwJbhvS2c}v6O8<)yA>wcTe
z6s*9&2lfU)U2eMnN&)~F#kRiz=g|tBz{byuzAylg%66JyCb5|46Vd<Z@C1Or>v=}q
z^7AX9nfw**!WV~Ou|2!r+g5sBs~Eqd34IhjIJTcdcWJc^$)@>K3smx(DN>CJN-U^w
zctuc0rqr2QnA@^Rfg0tOUKvNdZi;oF^(S3BCh;*Bgn!WG|8b!!;p~RPh}Vg@*C*%3
zqbYPkW2*?p*SFUHd%N3I&nXT{q+xaKM#2nVs2b5((8b{Ht_b0WYE_X2tubRXfFdH)
zoNQ2F;nF{K6->Ao@9IbUR=>4X&yuWs+VNWRE{|40zA@zg)@7R!*W~u(;u_cQS~?y+
zQrpe_uxiGV>AFxJ79;4DwvKRTZG;#KpTi0Z6+k6!hRBoi)P5X~Gg8z}lM~b*UGvk~
z(|5O1GAhsOte&lP{VmSF8_jUTvQasD#qIU)+XLz2?>zbf-bh!U!mA&VU4r11+3#iQ
z`NoQP^m!UZ<~X1BID#Gt$GX%ba%-E@h*|Qi4fRVfMcfl_Yy`8>z?X0PLuxG@Z)bry
zZwfNmQcZPxGwby?dma?iirtDrtxIwAt{)G-_o%Vs(?^IkvI9EI<2`8bj5<Hbr&}(L
zw+dPYaZ_O5Xo08qXjzP2U%Bx=@{PD~e4%d$-Q>dhiWGUmzew?=R=jLWOUgQ}iVB|t
z|EQs!(~YIWzTG=Gy^iBuE#@vgKlkN7=W?IKU$f-Qt}w;Ov!LOo<sU4~^#(@MyZ(LI
z(2zlrrLbY5l1=3N|Ft7-_CuMD3N`fKrBt7<{{J|GY%+UWp1v@i|F6olN7F<wvR)4t
z@sU`<A@+9}%=E`^4Hwolpg&$Cl74ulb1ZnOVRhjJOaDm>I{mY&e^Qgg8Df*f8NhXd
z!=xaHQ^gMv&mcGY=8$L}hd5}YYJ~Dsx{&wKa2Mgm<MEaDASk_)6yjjsURpY}laeng
z5*A~w4l{f<rY)V7yK3L~QqyIW``^G0HF8?@DzIbmjmyy8W=FsUx$Pp7`8Z47+yaKE
zi=DjYKHM;(Za@1XhyV6?_Mw+8Z8Gaa(f*wF{oB(rp~$jDnqPf{sKzLNI%Qyx3;-l|
zsNqpbLDE(mlV#}sK=$gBBXlMaa1IBV4nDcEewooM2};%Y>iYxXx>$9_N4heV<&#hE
z1_=={@vP4bH)WU&q}DD-UOi{x-fA_MItPJWCs|uxRYPP}jTsl`Wwn~-RGc{*?$>3Z
zVSI=AEVzg%_1;NBs>Vm-{-(ImmlH>ni@T~euHJRK!_KpW>BehBwX>2=?GDUSnJ=Ae
z$Z1TYqp9L0ia|$(Qk6I;UPy+QOb5s!#lVf=c++KdD6m^8F@{lCUO<TV#^r1fzQPo%
z7esU@fBV2g(zG|TK>5pQRB-i1>Axc7+DFyFN#TG8#WLIT*#<TUC5T+E1D1aUT6u5*
z-l`!omOvB=CtQYh?7Iv?84LvkBK1a2bt-y<m0;^3p<)<okdvb4J<S1zN>BH$*8(xc
z{!*?*B3M^B-@<c3BVevrC!}I-u1KpJDY-W#SvVSf&5&?@j=p0?WvuLc*(Rm}n)7^g
zmuq&yD`~~JO^Elfv^bGp#V>oFSBRUN^UPl#|IA82$YpVsBUSr8IThgyIrU>QN~)O8
z2&p&;YtZ+^X+?HTPmMy^?5x|>fWIN9INN-Wj3i!Sr?p{&Dl9MVNINUlXt-?JyxYqI
zadIzoh$GnOV6?(zu?t1*nYIr!=1*K1VAeM6$?-dBD_RXD=|oLuIW!!{ync5h%z52c
z<sJ*eN$4!1_-%1azsW+3r5uBLcjxp(6k-@|ptg=JuU_$);Ulb={cdj-Q?5<cP?QK6
zWo>Cm*=ReF1xZu_8i=_=MWxnaO;jSZxK{tUjOy&yWw;{pnV(Tb_ScyQCmxa<{g<g2
z*&lz>IcY+v>a!@Mc&0;1Io<LND%n<O12sWXX|z%u=4P31lm7aaYuY7dn4DS8=817f
z4JOvM=Rg27MKnfyJe+cTflOFrI-PlRIJh4K3nxQ>3vEKwU@L#B-DvbuZ#~k->yw|_
z5)oZ5y5Px{#6T0n-g*JHQ+G+?=-)fx2u4ZpbrJ0}*63<IZcxs+CO5UP{k>?HjjH0k
zpiHz7{qy!MF17n1AswtFryW=a1j~A|SloQbCXGolk#aBjbe$Lcs(6#2Qel`8@KY&D
zr#uLksdpALm2vnI|D&gYFtZ^oXu(CbAthda$+|uZ)iPq#bMKqVcN)bg70+9%o$hh8
z@7{~BZINT$CbrOfpB-DROiw|NZK=EyoE8HZ_g@*HOQm->Ve--$M@qgy_k4@a@@wb<
z8WH)F<rE{^h>YVIxNBTRiTrb7Jw<$tDw2=g9Tq>v9f8{N%HRfE?Xhom5gSp(UpEf+
za3RBS2wEOAUy^lO{x-M@>{U5JFIHFIG+MhY-C32wR2j4`+=Psp!}CyAW6Y?Dwdl&X
ztksOTK$SfVy3PGit(cy1r;z<W&JTq+nlozrv8ztT>L|8GM$H&@!FFNZ(l~c^5BSoS
z7J-Q8G0=_^dN05(D|Q=QsH{vJhw}rJ@BX_*EQCLdAM?k8P0SaPA755WUAlsP7~q%`
z3voegVuE#sQ+NPqJTTimm-QvajIeB`^<A1<IgNtvMXyp+WVu$pTe$PURHxr*gXJmW
zRLQSt+27MBf{kCcBKPV+!R1EZ%P7yj#5W#_s`9UzMeIl~cdimn@i8&<@5klqpV-qK
z!-oOcChlfNrx$pV{o|0L<Vd;#kiAVEr#bHwIx(eoa9T5ElFpL+#?Gc+JAug}C|eD4
z$+^;zrT)-ue>g#{adAxH#Q*#97&wO>bt|pVG%a`~HQ);A4)JA^%K>w1(bQD~p;5f$
zKZP7TQVtFEH&E_bBfi$B+Tow~?9lS=iBstv8GR;$I?d&tWc8ew_;)?3nXdPa3=AVV
zT#Ib2jN6B~_I*waJ#%y_v~#QNg9=FEjw6XmD%3%Vve#iXoLM8K73zJX>C5d>GJT;%
z`MB7&5v!)y+!ufNzagbVNXz{-`IRwaM6$Hx7TbnikTN;MVtzL)cdLQQu$-0)C8@yJ
zy=4zm3SMyGlua3$)h^+z49VfQ=Egyvp&&X7mUSA|!(VxrP{ge(y(3cE4K!fcE@&rX
zfVUVJwOlE?4233+C|VQ~UH#E>mdN?;lx_?TR@_D`OiuUY83&pW^F$h~I%9LexngxZ
zRZ2<R%d6z0`}8->_RZA#Fsi9Xi~GB#td9JtMO8YS@c4lRC<(AC4N1rb^WPZ{b1sZP
z1*ep8{g5XVdm6_!(CXjMt|L?~^y&@G4FmW>&N!pl?LedSfU^4bYB4QWu2u^Me$hWT
z8GR*dl*Y=Vg5DQz80S8uIaqSPwDDl)JO<s78j^g}xQ|RuX<k_SY_+#_Tg@KP0_*(m
z16xYyuaaj>|I-9X_GTHlOqt&F5x$dCJ8i=&I^R#%`^hLel+Wx%M%`W7z26IjP)DpB
z$EkHDWGHR4MO%bpYmI`g)b3sW*jPc}p{Qe%Q&dOk<|A{+NP`Vxy=5^C;BcWZlrv}l
z7{*kZ7qwzgSGz~G1SoHWyLie2u-f<&4OOVn;=O$!Oi6A5dJN?dOp_3dAM>@pV0Xzm
zFc6Vgv&0df@tVds3+{ENh249h6Ua}k3F@h*2r%FX-M}QkL=ic8nf?c!L4Dw`HPM0$
zMOFaDY=dJ+pWmd>E{>`A_AJ&CH$F0>NwKz#kv#TM1ZKRo|0grOM)C+p^#cx}$Q$qB
ztA=De7`BN|@mwr3reww4hF@LKsB6Q>DKR^4c^1mt_3*gi9GN@xD#XQ@t--B1DVmz@
zjY#e6^4bmGYh7T>2ON}(6Co{@yy11tzlBiyWijot$CmP7U`1V_Wyg+3=P}ZnA`7mD
zp!EjUE-r%HT{$dD2D}%`H+CGIS7f2ZIxPapX!r257AIA=aFv|=pY;-23d+pIy^DFZ
zs?vBk^|)4e0jn-%ebBe0C;TYyuQX0BHWC79#dEJ2^kPAN8!V0_hbgd=%I=e{Q+%I`
zkrHJpyyd=ky9mS|6H#-8DxZz6+WSYPTSM*E(H8iY#n|#UVo}@SS@`wJWJXSnm5nm3
z&=jeEo=I68m~tLGqAhBKZkaVvTUdZ2MYR>!#rQHso8yaufe99mq-%-D;Cu<nC(j6l
zgFZF=bWE^tY)=46K$L~WNU0%;3kQdkEt$W$Q**`3U<<WZ6MXhz6s1hZC|s)AL~`3F
zk;;0+X-2#Ji4gNtgNqMc`zNQ4l@Vj%J*7ZmC>=9Fh5*d2lH48?i<XZwZg+e5tT71h
zJhs@7Z16Sxzv&lkJC7Fu-vMZkGtG-KD`9b|g`F_*LyO&P+gIOe{R|CR`>&1)a$hNz
zI`xi=Wm~qKb+HC!iLyhp7CKGq+~ldN1?dPamTNl_H8Byc<mWPng%AC52d&$C9nN*f
z1`Ca%ObpFMD{LAkZ0-71`X`AJ@zwsIzp&v}sktb5&^V$C-|fp|+pVn54!~pn(Hd*;
zIkSkpQ`@o%YuA%Lti&?rutQbm{viV9I<81lVu{()I=!BG7Co^Ko+PAcU5~L~QT|^`
zR~^vw^M(hKA~6sU5P=cW%@B|tAt4|lCEYFEAsr%!bazO{Xf}(Gl5(S`C^<St!*B5Y
z-5>kov(MFgx95HDdG2oU0yEVQa;w-`=-{e9R?@sBBe)>%P4&zgc?9LCP6j1wALaZi
z5FxFR1yat`<}C5-BE(W>#@wNi<IN-UG-2-Z%8@lhwmz-Y)5POmo3TWA#GJ*k$=V=1
zw)nVr)li*T1C8NAehOt<2m5~skjH#L6Sar(u{a<gyIgS?h)24@w<a}hG+5c1F`2lN
ztl@!{n@~|sU*}|FM%}~kv|O&lCrE*&2eMAmAGv$M=S8D!O0fVT7GYLqT=aT$?bBuO
zu0)qXs_6Pl$#c6*MD@tjJsZ2kdxwNnw$yhEod3RClOwuI@yrmZ^7g_<{e6umwN);C
zOg=nDWY~p&()qdPPkN8xLBv-ZRH$LI00T+_O;3(kFuW)Zh1o9!?LYj53*bqUw4v{a
zkp4EOErs5t;PK<^eO>|{uG8cV<b1UmgX)^*b22BkE`Kl($Sb%y?DAbyz<AcxHK}(K
zQ9NQ>;Db9_w{lT4%I@^=oO(Atfi#e};3%DQ2&t*c65AW?Q(kN)c~>}pqmSA|ts};q
zYVif=#mnKLdV#m^2Sv~<04-sU0AI)2Kz_-9pGlhj47#jYy}nn^ppK9-lfjmuhSc9q
zR^17-#3_5xY6s1Rge2jjP9`hHokJ|d48GzYuaTSj%B7RJ^avkA>6#*r0p+{$fCk#_
zB`peQ>oX2i9)t+1w%;k{#LdI+tpr)#8QgkmKN(|h^^g_RSah)YjzWJQ7-ook&XPw$
zQIk_RdhXDMi{~;+W1GYB!Gxdo700)H2r!oHqo_~zxWm!N$wV^>9lSr{FqRT(#Qv2_
zjc!)rhjDzXU?V5$Bf9Hr44G8rCq=?9-GNSy`>DK4rllEn3M6WAqRFdHq1R??=+K<_
zj1*miGQXANpsL!}MaI`=(Lsz#vWQ-N&4W-i<+0s`2i>4f8Ft&eyaTbf?C9xyL#i}S
zWBxzXtFF{N0XdmI-^=6YLru;7E0WVg=Z!(BEAtux8RaIGV2+KNR94yhTh3~uVsm`_
zLQHu%SuBGljOp<0DZ4%{8kl3O;X+lZRnWSGXd-K4#{g>%?L%T#HQn9_yH{xekE(E;
z&~(-w5&j`E4q`;ejDs%XeC2GaiSBiiCJRBZtq33YN-Dh_HC>|GD$?U^Du-PY^5KUn
z@a9&T-`(8yr#ii^ZZ-kp;9tmW9_(>4G{VjAsy8G4Trrp79?^cD1!2$bd^7xX;d(iO
zKs{;ig?REdO&Rsu3tIIj^tQ#S-Aj>Kjy$~w5cit*qOxpdLE2jDJ7PM%P3w)Q_|F^x
zy{pT74jcRpxe2NvJ8mW6_=Ay3>F!=B6F-AkjYx;MMK#aAh`N7aUlS716*D2G?BS(p
zRn77x<$7y*#mpWk=RnJN_*88Se_f&pLEW$E9%gG<%dY=sDo50#f?J$8;BHX^{NIR7
zfphHrCwr*p;&uBmTyiOD(U^e%5ra6j7ArEpRpB<0av1)GB}r-?Z|;HFMj>x6;^RR1
zgFwTJpL_j`LA&Awp?k~oUGCe4ta5r4@5!&OuCFeyEQxN?^yb>6+cA(;+1dq9;6hre
z3Lg)fTG$&>*Pn+7CLPI>-MnRQ)fo*M#2h(2>-loWiSXtPYU2#xKweVMl}hQ4%GR)(
zG-79M_szcPh(Ty%jDD7znVGq;mic$@Pu04R60WdxUkTFNvPdRp$s2{zeQHoFAO@dB
zYtY~Sa?4Hs+t?}9*=hXa@gvQToWn;Bn;7V)*M7wa#TE^e(-2|2Zy%*V!Hp*V1J1C=
z`x6=FL^;GaEi@kVA%5|cEa}Vr*Bn>}6A{8lK|wLrN&pUkvLBp@`LF-s+P%$gJck78
zY%5ur^}D~$otDA2lDW|3BwO%3r~syWE*W1e`V6eYym`~6R%pEtXkf+F8{@6^PoDg?
z9(5v$^u~H%Bk1{^N!H@u<Fq%`_;``3-dAxqIs$z|Qd0xUf9oYH;$qV*P2_`qojOp;
zU-Sc)ar?WG|1~N|6T65ta^`b0OW+^82hsVBzO5~SLg%%`-=8i98p?3Q5km<Pi?am5
zjjb7z8$j<T9Y<rAPCA>K6uJ(83imhv%OhI<Hko_rE{=N{Dlu3yHjSD(yAQ|`&)I%>
zGmtGT#hjliYXn=t01zEa`735?w&>5BxMI$egWIo*-ZCmp)iq6AYCeZ^l#*@DIdm!~
zKZ)lQ)xR-x&Mb0k7V4=+n9_zaFf=4)p8fv5m~&J7woO^yq;ilnYFoI_UnYgfEgl{m
zXeg2Lxb1@5>sIHPF7@=F-7kbtD3s?_O=WfUov@9KjXIMq%;rq9e!Z#G@%m&>;PEce
z9b8=4(?~`o9h)wn_wmHUc$O}@`mNQXVvOFD@DYV+5?cOTX(z;-8@$J}K&B_)Xg07Q
zxYK9LNLTj`zzI=f*l4Nb;<8oTn@|vPw!Ywt3a*!rI6Feq=3B|hea?8>zzW(Tz_ouW
z5BR>uvNf#C1_CJ6K0>tzo$hCth4`;eltmDbp3O8^@aWf_?UsbXPZ3zT;nIGKfb%~6
z6T>+c*Ud)F{x9d-;z1|7{s$|XIbfHoi&MgfZ{*rs7ruVGM?`euX6u9#Upa9W6Xw0f
z+OQ`~O--Ff?XIMxG1WPjNV4d^`a$K<`WWmo?s5J!OtB*CKqkaJq+*o@bJkB7yuy#}
zd9(aJ0eNWB?UUp`<Qp2W=+k!nr$=f#XVxH@O6zH(;yEVi>Ha{t@8Zm~$aAK|Cjn=)
zu-)|%_qEdA0(5o4W75lc)Pi%S3_Y+pqsmP9fuzHp^1NzX3G{_x@Y~g<IP#{f^N4G&
z`El@E;>B^E{g9=zLVO8l>%gw}!<!=@I`>t8ENa!i+;T<iMklpogU93vkG7C*E4gK!
z8Aq3M#wK?BeKy`{)eN)sb#BKFCd+W-%Niq8h|7zf=ia7S&TZy;*C^@cKbSzKE$lc&
zkV&qsR}|!9OH)ovtX_RjFLu1~^JqX^$823{h1%an1I5=7@tjH8a=+5yg;$m$2R~(^
ze&3<XUSg`$Y`IJ2wSjZfoT!%FIOIX#QYckLu!O{HTRlE;$rD8GLzNHjJ=mxsp5F&5
z0d<@tV|e{m^HvK2UH^@%xK-8{G?(u6MoFU#8Z4I2;?I<gP+_E`^O>K;F?FW}Zr*5^
zURNjSCwV3GM<4XvyjQfX`E4~w&10G4nZaMINit`rtNBhHX+3@$tZ(Mq-TS|=>cYSO
zgxf@fwwbg}m*9(zT>n)WA!59M-|Y-3k-xt#yoLwxc0x*DPw)tIUks86^z2`t%+4w?
zRt{0P>sS#mbY;dahS6gHp1~Km`Zs%Z1zLZpQS0<>gF#Obq*g^r`h$zLRpvZ%gNY37
zH#sBSx?|L6p_sxpQE47rWMX19^7yD{JMeJpc=7tpG)v6WgUx1ascu{*Op9$he`GAQ
zm=YBqYtrW#Kl{4$OmS=9<IwA}5%|%fZ`$Okgw2OjjViZwa!u?@DoKyB)68>wwD+g3
zSoR-l()O(Q+3>^GB;(Bn>iX4D4xX<xSCl8_hI6ae>`y2CJ>(XXJwh{j&WZ_s1hoyb
zr=2cY9*fep!zWA9JHdfL*FEJ-uBWuL;wb8v=h=t7FWbwF&8^NfsCJeMb~w<9W`6UR
ztMt>m^+}Eefmgk&W`64(w59>ur*LGg$zx``up`o=1R4RucE2CtO6oNHrcEBdHeMAv
z`JFCjoMYA}8+9w%79)@}dUZxI40lu6qOfWvx2PzMWNU;QDR}Q`9=G}QZ!&K*LzZ4j
ztXexu5j2rewsyxK#VW$XGk3H#xw@QT<|<@z$C{YIyl?uHRS8m_m@VWJ?!Vaej!{ta
zaNlD)w&)`bIb5YYaYB7GFgnN0gp_;*el*~2B$P?;$}>yIw~cVYH(uLoW1VU<ZaM$Y
z=|?iS3S7ix%KGv8eX|R!!56&OcG9{9hXj^)TI|zgtTy?V`?9)5<~w|TJgPnM3hwU~
zcKJL_JZW*Z1{AC<6-;*cI4o60Upk|1^m-#<JxZD=Nu$+g;~&?GOodj~Q^%m~+3b)e
zb|%dZTH`6|tthejQ_V*n^M8VyoAsOdlHLAsoN2fdIu%Q~OnnfaYd<Gv-Te8g?sdbP
zy>NUIT3&;eH{&U1XV^_JcmSNT`#e~Ylr26>T*5@)b^9AE+MRE=p*#gf0?;2_UQO*q
zD|6jX>5J4WK758oi1F5H&g-xA9Ju3sCT_OuEvDpR+w1ImU*J4_r4P?*-3dA8!|I2B
zzDDttI%!TXn$rop&%XhL{b5!4GLN5tLnDw$Qld<zm635ko0dYt^l(!Ans3OSm1Az_
zU(E9><__JRrn%%Ftb_DAeVp_{9dWF@`DX*~c-vB8g2%6#eT@|0{PctvaLyC`nMqQ(
z9sRq{Sc?s>ITmZGiK-6qa~=2glB~=|Z%Wx-aEdUzYl)N&9(;Y^8uz#D;!k=oFnc4u
zm-dxwz%)M4J)`l?{-mk85i@c?^C+vB3~_j{5X<V;>V8~cV;a%G7Nt<^(4h?gj-4l(
z=PFU)K_CF|X~^GA!)5|fdQrRW?ql>>NOw03rt?z1suU~G7gMIOeSH=j(fLPQ9p!gE
zc`SRjiHR`{{WBuA#m)IFld6pJxdCNwBEFH?n&@i8sEBEB@K~XIv)zbez@Ci7<~=*6
zZDAjRCvy(EmZ?H){|=sSVW$RYpE=hcpiBa{++ogYz!u&BeyZOAo{1&+VfsQH{v>Gr
zdxyT3QMcd3FVE{c%J3Xbb#Q<upLX#F@o`V*9@aL^V^@-|h-)!KbCEUo5nZyT+VoI5
zU*P#x+wr{T&n(aDqwzueVCl#BdfHgQMlDtCCCjtB_|zYH&l>*NQKet~UXmccC=+sR
zqXr~|Wyz%q-VqV~<abA3b`NP7xZSaO<93~An)bb<Z9E(qH(ZVK8_qFIzt@8HN~<5w
zNx-v0W<miPumIgn>tn`)!Qwc@eFU=jROAr0uvC>aY`-)V!z9iYNT>OFdbMlv=K@ig
zmU!?XQ6|TvIYigdDh}-65OLq+#U3rT)a1cu`dXM-%12p(U-*U#b1&U$JJ)qN+-4h%
z&c1>tY>L_WlAZpQpK0h2I?4Mw&U~1|;tQd6TZQjQ(L3B?Vh^ez<PN`K6E;jJ2<g1|
z3!SSonw(CK<v>H+i(j(noVE3xDd<Vf+M=;>NZW!%7e8ARHP5S%)}>~xjQSI=(|GD3
zS>q0m<qa`3qRz#j3n$~EYvXT{?D}Ne4mO+-RYGP7A&+<eW;1X8Ip)oN;u{I>Ws-0m
zm-b1_UO47F;^P$9YbEkwu*XimzNGaWiS=Fgm9@vCOoF8jtp(uErhRMcnq~$+q%J}B
zoxpglHou86peJ^hJ=wQ@!!OMp;JslKjhN~<d)mp;ZXgz_p5g-cAWvLVk?DU4HS(XD
z2YtNq3GRO<j_TzSbfiie6Q;%BGpV_g-1qL@|Jm3cAvTi-UK(%_-@anKw^@Uen8ql{
zZ`iViklFzPX>@p5$(gPqnDTai5bn5s5|Q2C{Wj;?X0r8|r+j1`)&#RE=Eeg6-cBZ1
z$O9x!yYk-CA-pd;Nq2&n?Owk@O{7WrY|oQHTFhCQIm2Sp+$TCNXD7*=+E!hAWKU22
z{(Ud|2p1R3Sf13!#oG2x34?`3-z?cH_?s_GWA}YFdWP<hUz|1e=ZivZ06(R6YC<m0
zDvDNP2S5{di-fUZqI4i8=(>a&y;0N%Oo6Zy(^A?jQ@rA3Kp=0%CV#Hp^l<cR+p564
zztpcfO8I0#j(0@F%nGp-tbi8}#W==|Nv?jCs3gtK&hC2M0rM%DnpjpeCfdFywz9)h
z!3glgpFZ({3yEZo^l56$U}Ms?StxoxEh;=5BBbuP$x8XSJ78pkdPu)dh`PO88xDiP
z-eyI~#~iLnem?ta^a-fEvKFC*@ZOsB?v1DZ(?Q^@;N-LUj)jW0XQFLOK=E3}G5g}U
zKae2R+UeM=Md)24s}uG#eXWa|(bu}_>guX0LzG+;ZZ(?)i~h$N80@N<y5JWQnIQMD
z_p{@-POP4kID8i%r;V3TuS`Kb*?II*SGVM#o&eAJ?jhqr{5#?dU_<XTGW&5J>DCO=
zGSjFl$$8(C$F}T=4sVSJ-qNf$TEF&nZ#--KeG(!eMMbON6i!e7Smuu3es~lVQ@_Ho
zfi~{dxw(PXyYGd0wbJKCcm{rx=g|PbOMU%%!{+jEdIPbhcmn_s`K#7gw~gQd(KA3K
z@Pk2N<Jf@n#$_=xeUf6AC;%s~l%dp03Tiu&jSc9rrpA`a<6w-}QXLiYHWyOtRr78q
zw<oSpZ>82r@ELs+mG+O>PN>rcVhxuV00WKy%t@|50G#gtpu#&0EiQJ?u=V-&7F5_2
z^ZgoVsNp$HnUdW)|LfTE(e*+8b^;TI#5-=iWXKk7zb7<FGEh!oIG+-|m>XR9uS)!v
z6}SHo!vdL7($_~t)_*Tz8gXnn=U{5E1;@+)-5v3pwMJ`e>#=@oqJPAjrXpAfcJyKq
z1zLx_MF3oFB_-^dW2=NyK`!!v5GWSFIy4JZfJA=Mh9e(Ig<S0QW2Yo<;L>#%Z@Ch(
zft^k4vRJ<h|8D|^FrzSAL8k9nWTOap2*1UG>ExlIv9X(|7<PAa`-h&PlO&B_PMfb(
zepnMtj(hW*92{-@LPwCxOuOxVe!l0ZLy87F3xdTYvXue2$_i^^MZx{=8LcK1NF4?d
z`9ZOfs<Ark&tfXK3-4eqe@Bo99Bmw-pm=9L)f~^t4#XG)nRBp}r~W8WPCWBCtW1V_
zH%~(UIf|5HphSX-PHf~e9a;sx8N4&DT`s<}XCl9}RdOHf<>EkAQ3QCng_tcKDWA=$
zs!zHvfvg~076_mbT4NPi2?`%<Z<y0Z9IZ9xz0Y<2!iI`A)G*GE@)&yNco#5Y+u)2j
z8FLPwEKlzWX>Q|mamb?jx3h$`#)8ZI368_8;MOPUrVEiHvoQfN8^3fd>N(}$LOP3z
z`M(IRvg`+%Hj)oSkJxg0D0A*37c^Y81APrvmejpJwWcakXv<OjI6WvkgFeWzo}5E2
zbYa(V#|x_?ImZhYfqDb`@s;M(PEy`PIE8?hE$Fch&k?Xm7qq$t50V_4Tw}us)Q)^f
zCqgZA`9(-^F#uhQ-Pu&zTQ)hzncy(fU1;q0LO17&u*n^_&Al90_r%|#AFr!4Wkx25
zWfKnGfP<6M*@QJkPEOaEhMwx?ov32N#BiO-?1UH2l6uZ_Y^@^{B}22bhkp^rbMy9t
zzJhSNoHcHdCY?Rar%g-UH8xDTSyy9y6pzgl;3)gA)&>T-`l#|=(+Gl*Y%!<n`mJLq
z%!%7V5ua--ld$j(EpeD!q1E~GIj_0aIq)2_5*{F|^cy{kGBc<qR<A$)ND=c|-1<5g
z6?8DtLqIx9G*hkFl$kCyl%78|W!vDzboI2~ZEsoZ*Ct<Jb{SO&&GH}T6=ps)Ye(Ue
zbvl%+&8eMau-EBuBVW%YSj`!&W1S6!&h#&&jHjZ_HSZNqY`yvUX1a2|dF1#P$K+yb
zlm}m5I{$=Xi<>GsSqyN9M%Mf8EY`y@vso3v*F0i7&?JO@vVzqzD}aT9r}EQAyLVe1
zqofxAz=q2P0hJO7Dc8idfAR=MVn}{o&K%pqt^#%zd(My0$GxrjMzRSGRCY6m_KEjC
zCeRKqyzF<|Mw?a6h_iZaC9Lz28N0C<yJgS0CCZF>ArJz7W+8-5zq(Gers~H%JVpz&
z2*q0!1UtXs5I$`1`;nqhv^PH)<GpiY5on}O$36=;QvX%+JF(3Xjs6%NedbRh<5H<*
z$!4O11LR&R{j|`T?f0eEF0{F*$YOk{7rSWxTt2NZ^UzR3J=aEE%hB;TjYccjy07xX
zH(Au4age`FPEW6cdXDNzhmMN@_czC?#5No&m3Jd{uU(2i7%NEfZF=X_lZ$#5r(+f;
zj`gO#fIn3`AF`eY(V}c+tcaeUyvgMS$mKIJ5ec@WN0BacdP`YPH`o>UmunR)X5^k8
znTn}PLY!vxr&PX2QmWu-yRTnAms*L;QNHq9V%NWf$rE_3zgFa={;;9lSfsnWvCX(*
z;(dkmopq0~yTY_7Mw6luwR5zcg(Dw(TV9)v@kv*$C*vGwwK$o7T=HN|g6m}1MMVcS
zw>@=npdywPFDEt59Pm16k5i0a&Y(;b3_gtgVZL3M)rgufMP>&Vmf`)n`0MH_O6}V~
zv#9jxFL_=|dxy#^VF5G;Q$TJ1ERkI7zZ(0R%`x}!uTjVa4~Aw=3k!*>%#skVrDp{p
z?JZ(;=A*e1KV^^S8x+Z^Dl5DH=Bt?cSE%3dwOT7}PbstfM!+QsW(K@?`KwB|OO4sS
zrjWE!hOV=Ju=(fH&X8}>SmUhxb_?<R{rN4HM+-Q4fd!Os${!&ejh+Qp$Ef3KSy>F5
zAOHlou$-T{JUiAph=~=cZKSTZ!sgiG<|**U%)o-rUi+_S3G`ef$!Z0=d{HrW<8)@9
zstVR)m&3<p;r=RCgJ?^VS#XI->t{NE)^GV9qU(EFu@g#>T)O4Dt}FU6{aEL)n8l4l
zhg**>PgZC=65G$;-EDgio0$G%b+y@sK?%=D;=_w;6W^`b+PNX@HEURCCZiW!TX70~
zWqiJuAn-Hy9Mi3pUhU0b30RwwKiV{vcyqi35BV+LI@fyM?SJqH%ZM%Z1Ty)~yPLfv
zASSY(sJx<lEX){^gf|&LvgD{TWf~&$QSked*lDd+{!VYS&y<b|A9me_sWF6i|9zi#
zen{64xT6U7mP6K=I5|23%&`b_!>?fvMjRw&-9*3V+g(WygqBGBBk=G<ladES%}L&l
zj8$;W*)ApM3Ln1&&hzR|)tkYw;TNBA>*fNxy3EP%2yv936*jDqEbzuAY}tXB%?@=G
zEap*weL{pKHgdqda<Vw3|B$x7WDjQQ#Nq>%yt|CKM@-I&WlujhXC`jQ&-i%(UvU%@
z%!M`G#2UE5k+r&)IfI?Kv&dIa*F48AoSVcz-c}KtSu5~S8658%ec5-zdxmk`b8b9h
z2<DOWf$*FE9lv98LohqzAjGUUsQgazKi_42TX$3DY-Sy)h~1N!T`}YJ>?}p~TMAPm
z(?vn=$I5E6TlJXoO%=xXY?|H78DPqCKzYcXN9_$;iPu6};~DFh9n*$dYo(9SHM^lV
z=O)Br_sI8fM>T`JOuBX0){wW^@iG%hN50kt6_0XR#y@c_pJKUrjH5|EZT?BTd^FHd
z8Uo2wVs5ylr{^Z1g6M$Q?cQm<yAdsmu4DDL4NY&@vSm%N+7x}17o~WWeA7w3UKlu=
zNQz482(AplqgV_&y?qsTa0WSh{w?)t|1?`^M*$aC&ip^>+0I!<jfH4VG^i?gB!0Yi
z9Ix|+iMQ8nLcD^$Kn!9wod~8V!GyO@r*S!RpmJMZEiHHRPBk#-mY{%}4$2uPLy4{M
za9TLLjNCG!l!imFq$oDcg&Ph)3K>|wZ?M#8bO+>2&EFF91JlSF^ne_etS@s0J2S3H
z-Z0}MTnt{yj}=5=)7kY(o=_HNqW^gLxfJMReXrgxv7>Q5LlTjgu)~{9wzk&xZXk0}
zZuc#0*~2WY>~3ZP?(Dldd1FLp%DX@Rrpp68)=v#|&o_QmE0)|2Ahk_1k<c9w;OxwM
zaD|t$N#^#ckcrdUi^TBX{o>h<_yLnbqIx$iHx>b7FSjz&6@NaHEs^=(c*O?0%%1{)
z&3nS2O~<I4%y=zAW=_pUVTPHBn?STL1)eq}?#&z6t^ESO+S)?c<n%v}pT#s}W@Z(d
z-KrVVCJ8G}^33sv3FX3>wd<S|`!Tl#Nth*&if1^>=$XKPP`g&v<C|WFfkhjX9%KTb
zYi|LiM-*1C(d2mN|5=OA`6D9Eg$&3bV0B2*v-e<Q=(d<fe^L<W9vB}ScCe~m>rA|!
ze`}ZdP6YpS9}oh6kTa~s8yUtN-L5Fza9abr^T;IL=fP7mR_uA5fx8qyh~V1IM66BX
za=UPv-JG4(V}QN%U1(O10R|pD?D$DG5|Wa|6%WB1|3@CjC`APVQ4pYRX5Op*lKRjm
z{#R;rouNwJ6#~B!;bv{y+o7YD=~kFawaFFea~6eI+<PG*G9U;6t{mRC*_-)Z8(pz7
zHTYJM(AVkuvZ@VwKCZ<O;(MI&4^_c*IbsI$+}9Q8nGiLLAa=M<Bj3c3m?!C-E#<qd
zl=1pgs-wos2({<3r>V{Txd)g{!=jttY6~S<!3ple&=bATE|(qM(6h46y*BipaGSK<
z-Ki=oxX!l7`Q`zX!L|F(sM*zBVtD|?4h)^%gPG+afC$=(fruIb|3SvcTOZkr^$b21
z`)@nj(QXBk7pq=Z6wC@<dSfQt_rft>m5I(1v3<xPJc4(rYw&jp3~4Qs8+Yalrg?jN
zz+QLXV~K67VZYUbsufH3hwRLdZNo6I7~B9L?|enUW5pV#8fkrT8vclqf}%m<``a$?
zWY!hRaKTY>z2J{8%*pH$?JxFi8yt!S!Zt~7snz=0V3w^AFXbT)5pxT`?y88DnQ=l6
z4uJi?QFAlB^YX%6)Ghk{XsA@zd83=j<;v`M56<s}K$wVm`>_AUyFBP1GiZ2sI1?v{
zN!o6PPO1%aG<A*PKOKGGEdMt%NGmqCx!z>fiPh>B9%;^JIow@)3fO&7e%HjI7ju=1
zXFnH9wmaqdvroh|5rD7z+a@s=fJb=&$~y@71Ba>*7nphY_)%F(b6XbOW}rM7R?nKg
zS9$SA%Q%lY<6=23G++3_c#%hnDd1m-n}DgM?gyD*%vI7O5v!#(8<7U6+@+f_Ck|bm
zt!*Qe-YWQu8eNleShAKFGqbr!VRGeJ%wvAp^0do(ByGx<;8vq9iw-+P{i;4Hug${$
zIGVuks42lrdRu(xlL(W&rnL3HA5qXxO=YR1v7M%G0f3n`Pobbk`&C%Hb_PrT+Z6%#
zJJ|9E30zNvNbNX>bnJ>Fd7rK~pkQrTt{n?gG}vXZhpFAX-9Q<MP>PS>jfVh}KuVY5
zq_WDqLj!`*Qs+-kHboYBcCNh7hD`#GC~bihi|dDkOw&ha^##Y4PG-a;&CXA1Z1~^3
z>ZY+cc5g;iW`0?LNB{nb74;hYzrXz!ItZ%0Xr3hhDf1`kaly6k!K#RUh}F~AJ}cTl
zL|iK5<TtUFDfoK0<S`tzLCcz^)iMSnSgk6)lpi}iprbMl=fQfK&nr#!INbT|ACp`!
zFIWf{PWmq4({>eGhi3ir*L(Hk2<L%W*+{xp+0!3$v`0^t9%SuTOa?+%pw3U6TUyv6
zYKQ=wy^&$ok?03Ca-i~3tKBsc?8s?MznQkT$xATKYN`))**h8))mzC$b=&WWFBF`c
zU5+~eKGzr>C}1llgax~k9DyKHARlG&M(8BFH5`kD)6VwC{}#+zja{D<E1`*>#m!U`
zuAI=z0krV|LbtxKmJ~SiX4*E+Z9Zk}D6Y%KYST%MZvpF(A10w8prXgv-?TH$ey1+u
z<?>+Y<<2){MXMoFXGENC*#Hd8^u_!JTAgXm17`lnF6^n>nW5NYOgkG%%R*U%TA_2^
z_xf)1*lMe}(Jg<I%kKUVcniRZsS7=HuygrM;J5eDoR2F?AsuW9#SpGfH~z&g=lkDF
z(*h0fAkSql58eOvVWGk4|IqR%`0`s9>a50M7qBsXrSAO~OWrOFcgQYSp*c3hx0`<=
z>tHL{Ij)^135=lqxtMLnr+!QoF%A98w_ulmg~E8sEKE{ph!JuZ3rsGb<`So??V5Xi
zq``=dmIb%NOC{$J*sZ&0;fKM^>UVaKJS~btz=XJB9mv1==7_Xgad%}v$9;pTIJL>v
zoB39v1($DF4sxg<IH;yp;z<9Kz_Z-*`ozn7Z2%O{c9f#i?_xds^o04QlZ&B9_3x;g
zavJcnre{61=8$K!wg`(vSiS0v|C3`F^LpP@3xDL`fk=mn)ZMYU^<Gsrd1cNc$TM==
zaXr7Z7e!?^-lY{V2o~Mq4y6l~S*4+5`*7n{_^29p`W}NM9XW2X?{m7jC2R3yv+lW3
zWE_a->{cJoxg$Lo4T2E>7~^0b%Y#_r!Vk-2Yjb~y<vFTMh$ki@Sz98+5VGWvtLaDF
zcROof`hMYUDKqw>@YLw;i=~jujD|R$AHjEqm^!i|%-8Qc!>lwheNGIHKW(-gg1y^z
z%Is<IKz-&gCNVzYv!C(&kQnerNq-`UK^69Q2Id?fvhh8w6P!=fzzm3A^V-XlQQ$ph
z#(B1yOvna-umKc6QrQiap)K<W?$d5Islt8uvu)Naoqs{S->;)nw`eShA(?4J36~jB
zQPi0a$RKQN3TzOCcmN>sNX-;7zY`|+fCXp?xzC~m0qWqzVz^rh+`n>LJkLyPptPk~
zwxb*IdbqV#E)W4KHn{dfMljEQQxIxyuzXca&cEr(ARmf=1KCQ2BMj7D7$oF3r}_mb
z#*mqGc<Ak^SOQd2Am;}Th<q${balQXi`9%dnq(v%yI?|qpEWM~FOZFFI%wk&GHG64
z{S+n#J}Yr9vDC|<FEqN%qC?UW{OW-zsZwSnqmxZP%OS}ERFQPbzy;9s*9cb#YVJGJ
z+<;r!vda(M*X88v`RwUc^2zvkV@<96J8yeyb6xZgN`cL(wV@Qr6vMKQ7D`avnT(fb
zofM54<k1s~m1}#?R`TWL<Q}rCy`S@hm^urvY<T5c4$SUCacyzr*^KuhlPNxEONjw;
zc+Ww&_dsXb(dFaGVw6B7*Ubm<c4be1Wd^AYmbMflwTn^bTDZhGIB}fCoC;n+iGavh
z++qhKEx>TR-XM}=l`#xP3knv6fN({V$cB>Wc*nJ}>EJ0lf3PxpwsfHB-nf<R4aIhj
z+3K<%2Z1bCkfwnyE5lik(t1IC*S=@$&iQGaKpJxZelnoR77sFxzzbNI$QhNO&4^gP
z9x!4#Yqk%}tbWS%HAE|gl96Zf)e<?W#@5jMx@VJ42O|B26RxL03meuu^)B`3Sx1+|
zrv6*=xL<G9e^HPr(q87*^ENEHzK4Y0VPj+OpY0fLk@ezW2#mMQmYf+RH#K}1b?Pq=
zb?KUwWJiV$Cu25wu+eThSsjKSDKFG?rJtO2zeJFm89=ExV}GV|HB$kna>yoN!`_p{
z9cTH@vY2Rm_ro9I$t%^BSUNJhZ=bN&A7^5?zCRU<t?D#t$^mua{A-^bM%uo;7t%;6
zf4nUEQgK2L8luQh%B}O-Tu(KHpp0I^;l8=Y@q5+#PBa8^f4*B8TUlZ^5vOexw+p|Y
zQ*pO>*p|S<UDD3@;@|L_;EU1*7Ka+GmnCZSDW#u3y-oAbC$MeFwk_r4r~$+;wS(%`
zDD=H5D>vnI@GT*bFgDP$B2#wkkpq}^rG8XjX+x2ArCnNPl`0+(+Q`(~cokKg$vF{e
z&+w2j(R}gV_j1ke6BtMq8LB?CfGbI>s&Y*Z%K^0?A&irxF$Vgv8GNPpyBjTNAI+8m
z<NzK#{VBq+T6zKW9G9A2*0mW)stDmm5}>s9p?zaQs+XbV$@dxld_HUbm!XT`#w+}|
z!=%&hD?oO~RNeZEQa9k+uGK^1ZQlkG)FHu$>f=DFv*+`xdBF6=sMBcI=wT57qqg={
z?G0}T+nyK2-u6o)*MW16PgcATc%J%2zCXTrpTX!T#dP>ix;|v$vB6ioqf+uq0TN->
zgmihL??+X<hB>s%=L0oAelXt);B!kqP=gRVErdnQWHD~80p)7gOSc#WC)J`~MoqR*
zx@xSbaGvqKuY!iRM%*oAh*Vv-_pyrRq!u4Lnj3!57%p#3W|<p7T^-I@_EH{e)QM!a
zqh}L^H}|6I;D1{vlxz7gG^`c|CEfm~XV$gPG5-$VAcYFp)Re}8$BXdZblVJ-M8Ut0
z?7kwzh>hMeywfSaYDOv<@py}CxpZSwQS@3G6R5J_gRV{6lB59D88)wAce*f2c$BW#
z3nu1QY<lo$Lk6_LL^OQm-#<nHzEmU~=0rD4#)WMrm29S-3~Q*__|2BQnY{emRMB6X
zTw;E$O81^Wr1u3F7kBzw=gb$`DA=853b42`Br+>UscVrN1Q>w6u%%mwO!@1^ZT(2z
z7Pr@9S#p6Qx+z<hhRR0L*x%D8&LYaSLr1x`Z+~+$xXqy{ec~**Zvx{@E~qgwpuk%>
z;@I#|`TfS`2f=>IOrJLt7Bt%CY{*DGOME<wKVBUJ_bfM}){ck0i7R|uIv)+JR1x;H
zW>7{$U5r8jCF1|QR;=9=4ra2t3D>5KJxX3wPpDd#-8(22n>B<uOy=ml{iyt$UV^K^
z@#X6=s?7AFt*z!*N}E@kbut#Cl5!=&I<|u5Gr`&KCQ=!N5ZXYX^4ts4Nqf3MDjS2G
zqNP-GvrImtfpEQVYA&a#kJ>W>!$Zo#Kd_PqUSIkmr)m>R;wwLWijU3rU&(R{MjNX<
z^8dHLJcNxqCM`eWHLJHSl{NZNK4QMRvT`&Wonp6!!%Pw0%rCvDa819@m(q3rC-cat
z&Dt|Q`!+?QACt;KlI2svnD@Hj(5-1D-tzU_<+MpEXI;lHKg4QIJ7dosb-`j`BA1>Q
zahlI+daV;&m4}*5F##+UE=8da@c`VdmV<_07Ws4~xCH`6%UrD8o~AQ&XWF>haV3-*
zC#07{DM14Y%xns{|BO}F@Ve&r`RtHcAM()`KA_T?ht8yu!R%`zwXX<(kK-P6J#nFG
zd?iN}QG%CH*mk+DT;gPgr-3>u$e1h#K2>@yr=r5s#blmItMgMfK&YrDV8hu)UZDaA
z1S$mt3gWV9txQFi3_gT7Etg@A55cS;7Ulc;5FMqPk9W$0%yRcFstq51jeCLLd<JZ7
zEp2CUM4a~ZdCcRe;#JvZHh&UAEeNyyn&<D%5^M;)Hc>7JnK(Ogs%u}`-^g~|l6q-@
z<)BESZ~;?DBywsh*BfEj|0s|*eVWW6WC!?EmtRD~sIx7yjElWQI}}I%TcXD|do?wF
zmgIDMZ{D6A-Qj|X@XIBH7lRtD6~i24S@ng{x#K~fcfx{Bya}^2<5Tn%OFmPQ+{ah1
zNlg4FB*e;w?zw@N!K?tY%DE7E)ebwZS9crG0HN~6(|A=b+V~~;C2N{yH7y(YP`L&Z
zjx}8ahVEQ)xli?!*eh{P*<JK}MO%COJo|?=gJXMb1E^s43fdYy{Wcp_+~Ak3ot;p<
zUkj2gJJ<t{H;CEqUX%K%zFy^fbaZsCn91<e8pBY?&to50P=vA(qOH-v4v%YbWiiz{
zailZI`9jVGW8W_Egbco>$<kVB(Ln8IL-nid8>K5*K1(4x@cgmbj7m&FeL|@dvmLCs
zP4-<*wz@2>xajrs(RUOSKcl`$Y?K*iPlQJ|GQ9Ay$y-LhOm5&0qf0rmU93sUf;RV9
zrHDI8ei$(E*=S1fexsO#FQgu8;Fucvr}5R4ZQiHW_@#KvmXs29pIGlT6Tsj3nI<5&
T9)|r>62LR1=a4!D^YH%x4Mr=a

diff --git a/wikipiki/concurrent04.png b/wikipiki/concurrent04.png
deleted file mode 100644
index 04321dfa34845a4817769b8956ac3183b616e913..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 28727
zcmV)iK%&2iP)<h;3K|Lk000e1NJLTq00L+L004ss0ssI2wvljl00009a7bBm000XU
z000XU0RWnu7ytkYPiaF#P*7-ZbZ>KLZ*U+<Lqi~Na&Km7Y-Iodc-oy)XH-+^7Crag
z^g>IBfRsybQWXdwQbLP>6p<z>Aqfylh#{fb6;Z(vMMVS~$e@S=j*ftg6;Uh<iVD~V
z<RPMtgQJLw%KPDaqifc@_vX$1wbwr9tn;0-&j-K=43<bUQ8j=JsX`tR;Dg7+#^K~H
zK!FM*Z~zbpvt%K2{UZSY_<lS*D<Z%Lz5oGu(+dayz)hRLFdT>f59&ghTmgWD0l;*T
zI7<kC6aYYajzXpYKt=(8otP$50H6c_V9R4-;{Z@C0AMG7=F<Rxo%or10RUT+Ar%3j
zkpLhQWr#!oXgdI`&sK^>09Y^p6lP1rIRMx#05C~cW=H_Aw*bJ-5DT&Z2n+x)QHX^p
z00esgV8|mQcmRZ%02D^@S3L16t`O%c004NIvOKvYIYoh62rY33S640`D9%Y2D-<?i
z0%4j!F2Z@488U%158(66005wo6%pWr^Zj_v4zAA5HjcIqUoGmt2LB>rV&neh&#Q1i
z007~1e$oCcFS8neI|hJl{-P!B1ZZ9hpmq0)X0i`JwE&>$+E?>%_<lS*MWK+n+1cgf
z<k(8YLR(?VSAG6x!e78w{cQPuJpA|d;J)G{fihizM+Erb!p!tcr5w+a34~(Y=8s4G
zw+sLL9n&JjNn*KJDiq^U5^;`1nvC-@r6P$!k}1U{(*I=Q-z@tBKHoI}uxdU5dyy@u
zU1J0GOD7Ombim^G008p4Z^6_k2m^p<gW=D2|L;HjN1!DDfM!XOaR2~bL?kX$%CkSm
z2mk;?pn)o|K^yeJ7%adB9Ki+L!3+FgHiSYX#KJ-lLJDMn9CBbOtb#%)hRv`YDqt_v
zKpix|QD}yfa1JiQRk#j4a1Z)n2%f<xynzV>LC6RbVIkUx0b+_+BaR3cnT7Zv!AJxW
zizFb)h!jyGOOZ85F;a?DAXP{m@;!0_Ifq<Ex{*7`05XF7hP+2Hl!3BQJ=6@fL%FCo
z8iYoo3(#bAF`ADSpqtQgv>H8(HlgRxt7s3}k3K`kFu>>-2Q$QMFfPW!La{h336o>X
zu_CMttHv6zR;&ZNiS=X8v3CR#fknUxHUxJ<AYmRsNLWl*PS{AOARHt#5!wki2?K;t
z!Y3k=s7tgax)J%r7-BLphge7~Bi0g+6E6^Zh(p9TBoc{3GAFr^0!gu?RMHaCM$&Fl
zBk3%un>0uoBa_M6WNWeqIg~6QE69c9o#eyhGvpiOA@W-aonk<7r1(?fC{oI5N*U!4
z<uv66WtcKSRim0x-Ke2d5jBrmLam{;Qm;{ms1r1GnmNsb7D-E`t)i9F8fX`2_i3-_
zbh;7Ul^#x)&{xvS=|||7=mYe33=M`AgU5(xC>fg=2N-7=cNnjjOr{yriy6mMFgG#l
znCF=fnQv8CDz++o6_Lscl}eQ+l^ZHARH>?_s@|##Rr6KLRFA1%Q+=*RRWnoLsR`7U
zt5vF<Q0r40Q)j6=sE4X&sBct1q<&fbi3VB2Ov6t@q*0);U*o*SAPZv|vv@2aYYnT0
zb%8a+Cb7-ge0D0knEf5Qi#@8Tp*ce{N;6lpQuCB%KL_KOarm5cP6_8Ir<e17iry6O
zDdH&`rZh~sF=bq9s+O0QSgS~@QL9Jmy*94xr=6y~MY~!1fet~(N+(<=M`w@D1)b+p
z*;C!83a1uLJv#NSE~;y#8=<>IcfW3@?wFpwUVxrVZ>QdQz32KIeJ}k~{cZZE^+ya?
z2D1z#2HOnI7(B%_ac?{wFUQ;QQA1tBKtrWrm0_3Rgps+?Jfqb{jYbcQX~taRB;#$y
zZN{S}1|}gUOHJxc?wV3fxuz+mJ4`!F$IZ;mqRrNsHJd##*D~ju=bP7?-?v~|cv>vB
zsJ6IeNwVZxrdjT`yl#bBIa#GxRa#xMMy;K#CDyyGyQdMSxlWT#tDe?p!?5wT$+oGt
z8L;Kp2HUQ-ZMJ=3XJQv;x5ci*?vuTfeY$;({XGW_huIFR9a<fJbF^|4I#xQ~n$Dc=
zKYhjYmgz5NSkDm8*fZm{6U!;YX`NG>(?@3)XSs8O^N5RyOM=TTmp(3=8^+zpz2r)C
z^>JO{deZfso3oq3?Wo(Y?l$ge?uXo;%ru`Vo>?<<(8I_>;8Eq#KMS9gFl*neeosSB
zfoHYnBQIkwkyowPu(zdms`p{<7e4kra-ZWq<2*OsGTvEV%s0Td$hXT+!*8Bnh2KMe
zBmZRodjHV?r+_5^X9J0WL4jKW`}lf%A-|44I@@LTvf1rHjG(ze6+w@Jt%Bvjts!X0
z?2xS?_ve_-k<Mujg;0Lz*3buG=3$G&ehepthlN*$KaOySSQ^nWmo<0M+(UEUMEXRQ
zMBbZcF;6+KElM>iKB_KiJlZ$9G`c^=E@oNG)mWWaNo-3TIW8)$Hg0Ub-~8?KhvJ>$
z3*&nim@mj(aCxE5!t{lw7O5^0EIO7zOo&c6l<+|iDySBWCGrz@C5{St!X3hAA}`T4
z(TLbXTq+(;@<=L8dXnssyft|w#WSTW<++3>sgS%(4NTpeI-VAqb|7ssJvzNHgOZVu
zaYCvgO_R1~>SyL=cFU|~g|hy|Zi}}s9+d~lYqOB71z9Z$wnC=pR9Yz4DhIM>Wmjgu
z&56o6maCpC&F##y%G;1PobR9i?GnNg;gYtchD%p19a!eQtZF&3JaKv33gZ<8D~47E
ztUS1iwkmDaPpj=$m#%)jCVEY4fnLGNg2A-`YwHVD3gv};>)hAvT~AmqS>Lr``i7kw
zJ{5_It`yrBmlc25DBO7E8;5VoznR>Ww5hAaxn$2~(q`%A-YuS64wkBy=9dm`4cXeX
z4c}I@?e+FW+b@^RDBHV(wnMq2zdX3SWv9u`%{xC-q*U}&`cyXV(%rRT*Z6MH?i+i&
z_B8C(+grT%{XWUQ+f@NoP1R=AW&26{v-dx)iK^-Nmiuj8txj!m?Z*Ss1N{dh4z}01
z)YTo*JycSU)+_5r4#yw9{+;i4Ee$peRgIj+;v;ZGdF1K$3E%e~4LaI(jC-u%2h$&R
z9cLXcYC@Xwnns&bn)_Q~Te?roKGD|d-g^8;+aC{{G(1^(O7m37Y1-+6)01cN&y1aw
zoqc{T`P^XJqPBbIW6s}d4{z_f5Om?vMgNQEJG?v2T=KYd^0M3I6IZxbny)%vZR&LD
zJpPl@Psh8QyPB@KTx+@RdcC!KX7}kEo;S|j^u2lU7XQ}Oo;f|;z4Ll+_r>@1-xl3|
zawq-H%e&ckC+@AhPrP6BK<z=<L*0kfKU@CX*zeqbYQT4(^U>T#_XdT7&;F71j}Joy
zkC~6lh7E@6o;W@^IpRNZ{ptLtL(gQ-CY~4mqW;US7Zxvm_|@yz&e53Bp_lTPlfP|z
zrTyx_>lv@x#=^!PzR7qqF<$gm`|ZJZ+;<)Cqu&ot<a{81DF0~rvGr5Xr~8u`lav1h
z1DNytV>2z=0000WV@Og>004R=004l4008;_004mL004C`008P>0026e000+nl3&F}
z003oTNkl<Zc-ri}d4Qf(bw7U2xz9UWGRY)CQI@a_1_Z1|1k_436~bo3Vu<p!e60e?
z(tz}b)c_(25wuW2WKqFt>1GTTrS%7~2-fb3poGn2LXah(gbX1hGxI+8obMlZeU|r~
zcai|paF21Ad6#Fo&%O6^md`l{FS+EBb?esMd+)t3yzoMv=WExl6%lY^eis1&|BLwz
z1Q5*c000OG6A{^pciMgqqyLvaB~trUEPlCglyE;7eas!m|2Mt}5ovv?vQ<OT?n~0)
z5Xm;2<i(bn=hb$EWLr<x_V_r_W8n6hyW4ZLu=CrV=;7_ch^Li%!_Dw`wIG(ixD_K>
zUWtf^=zg02+7BSsE$GU%mjA%|Q%mvdcDcFjPz1zmieYOko?7bXm%nU(@rYnwv4d+4
zC?WtXA|mFeK<PwgH~<039|y}1QKF4vn^w<Dw0}tHsiS|eexRyPOWLn(>2Nod=vNDL
z61H0D+hbqs?!~@7)!jp?k*!*_s=vR#udnaE`|g`EWy*Qyo%hj?ezXJvh3Vt2L~3qe
z`+#Nry~<WT2Z2^Ixy2%O3lRO4ls0ZDER^D3VXUffTRFK%+wZhIL=4<gi`?-$CEcO^
zp8T(+H^;#&DQ!O@b(;qQ)_xyrc6llOvR#02Vjsr|eG^}_eFZ1<QR!d})V?Kv2qLAi
z7ypE$=8h{$qM#W3tN~7JiJjQNU$Gh+q2@Ti+4<wa);hmbR-U+pCDB$WB@B+P1IzgD
zuHW4Rp-0W4hHfns2bog9Ka4Ki!%Bp{_AQAQFTyx`p1Bpot(~TIng?#xe4a5d@Ui0;
zeEXkopA5?VhmSq->)*TeiYu@B%2%#>e$%GzJ@&;ZQ*laPws!5>*|TT==YRg^MHgLk
z#1Ti_ci(+~`?r5<o*g2xnIJ3z!hozri?DzO5J3SH009&h3F<(2`X!UBii>VSL_2kj
zy(<+PD@<qeu3sN^0kbf(`Hldv*6a>qCn5*}nm-W$5y<O*?r7*HtWo>42s4{MS%ldi
zi$RQXXlJ^g=UQv<b~=b=ZB<HPVG&_-Ma*n(mxYDRRhd(nx7;z^S6Ksqy8>pbm2&(o
z3BqO#x<iGxBIVirZchRnJ|lkoBV9od(H|sI%fj9Ig$-zxH}jQ9e>Ap=AemPP%wbEg
zZa-<yWfjkgfn*L?Rgwx%6e_Q`x4$YjjNh0DqwP@Y6{M<)AZ<0b%IUDq9*nnnJB9rx
z#qFwMfDq8FK@|6zxZm8fwZQ4up@0CQ7+b|}!hnT^#v1G=q+n7Z0umsGf5E^CdpZ)v
zmSh2C{UUTjLZk=~5fx=!s*%}$U5!SU`JI%qKtyDxTo^3zcwkn#2p|Td4eiyK$s<;0
z5Eiraghd2|MOaviu!z>23v2Ty*caJ9J|c1>5eqPYQdyQYNM)I7WLa0%=*}8lS)*I2
zOeuv#gbEQ@w6JEKi|A%^R5;i97;|nn4$vS#L_`FLiZYcoh?L42h$>T=Jq{rVBLaxs
zTO6>u1sDJ?3^-zqvQ#x=%ZgFumx4tvtrnfcf5uDW#6`#Jyt(?$A8r24qZtAc0H6XO
zL;z8M2teSUG!wW@p@sT`(Mim3FaQ9V>8k-mKm!0E1F%~eTA*+DJ#^mu_0S_zX6*F+
zAN<o#?)vfPF1kqVIR`P%)~{dxt6%-<bD#U%@BQBI-FfGo0FY%_*c>AO6adaZShN7U
z^9i^$W=v)`7E-WIp`uJxotsiZ&FY_FX;-YW7-CsOlqex)3jz$F%>rN$1ZE*5voSag
z5DIHq1dP&PA%xld0>I3g?YUSCO4*Zo>;VsRV3#Wk2UL+FC|T5mfN18rBQH%6&Dj4i
z80nA`B*tVmYu;U|<^nW=#E{ACua^Cl1ntKh2eII*GM9}A(a4*v$GmPv*X`RDWj%IA
z8#Rh%Boxtz#LQ-S2P_nc*I3xTsptuG&?4UKk@n6RX@Q+s(%ZaA6AKHVQ3(XcMNRYh
zIt#n9GFqIjBZCwHfx@kMHAOsPl^tQ?9e!n70RhGPM#Wxycxut3iFaIZs7b-4W<H6r
z^VI5*2o${<2FN{P1QZYyW<fIVNer$MDK6$OHj~bt!h8F~&1<&;oq=cPmNo}L5N#Dr
zs~Zbz=3FA+WY)qOfQ1cSnx(=XDVf1Qn$ZFg5Rnjph*;|!C<D^SC`@6+gJw}6Ocu4p
zZZ#qTtgRXhA}kv1bYjs$q%<(HMnq<f1k8Y<FhgK8!+{`HrIezMgAz0^qtzk??*o=s
zic|w~W~}Y!(K|0{-T&s{MY^w1#lq(cRysnifpd*{Qv(>QTq6S_S(E_=P=0ZNdA%iW
zO40ek(do>-Y_tnDe+mkK1_1%ib*=#bo>;f;=3AdU<jrro=%R}*`rPLlQ>JB`H*fCm
z??2**BksEEE~S)Lno0_S(N+z9Faray00RgE8{^Gs04!Wof$Lqa)sSH1#}7MpZPcOk
z?bz;Nu{ajcLquy$%p#;w3kwp8FaV-L5Jo_9TOc9|2aI7h=m^Zr0IZo~?}>fWZi~S>
zWbvjjvsf>PJB|fBqs&^!WC!`o=9CT|-PytyL4-An0dDs{_ZeLRHjxVcTF7Szh9;CP
z&gcP%+tGq*61xPL-MR{UXs|<~uLuN-)1jk%V&2wd)_!-!2z33$cyrUNcSI@$*^HSZ
zk)J4@C|L1`R9?sWAc+(|Cf1e_r^~moBc&3Uwl^X5P$(cESiDqh>+ixE%QaF^5J^OW
z&1Y0kx1|N=fE0}hK|nDt`-ehk7EWxi0gKxpvG^}&3fNLn5Nl6F1BB5y1jM(-qQM~`
zH1I4Sj6x1%3pO?iFga}@cs?D-dL3WPnnt&Kh&JeGZA#J1nzc4NU$8PkfLTzido#F_
z?ezAB94Uo@%&bU|6thNF#;O!zW<g|y!~*2>61L7GHi$27ts{cg8UaWt0ns`q0Y(zw
z4737bWCCQZ0g%WHne{1{5u`9NEO-TDff<QBc1G$@z*2#dy6J~niaJ(J5Ydf?)q}ko
z5wT`52<MRJ&9SizfQ^PlV0H~g000G`jooQp1fdqdY33`rCCARP1hJ^8?dQ;esIhWH
z3qYO==l%=-^YeS&|K4Nzr(UsXctbWkJbd1H=iPt*{YojNRB)LWe=&+2`{N2|W(G76
z?c5)3INE9ZVNVrl>Ew#nr#G!j8mp8{5CF{~oX$pHG^k0$%$iv-F>B2%*02#I1#VMd
zHfB1o1b3-{Ol#2rSo_lWfgNi4lg80yqaq^OuLw)<xJu+X*4iCM2k)xWc_SCAfUq?j
ztsluaq`lWTIBB6`uX<n(yspS~-3~G>R!fl_6<e8w*lX3(?sr)K(9P!J-!j{}c_cAv
z#%2wopIt(65D9BQt^nlYTWm#0ZX1$u+ip$dZ^ChT?C7O&gM#P{ih6e%iWtSv#W4yN
zEru=34F(b!Uv7-F?$L<VEUj`R!K?_7NdY)Z6d`Ows={In-kFQy9KaUm12YJtAdm4R
zAv$lXvpyxVtHMqyv7b;x7?{Pl(zIsQ%o;dn*2Zfp!XV6|MYI@u#C*#Qkgzk{$&Rp(
zyaqof5eW%1Bai?C8{!U&5Fm@7(<XfohrQDfj0Vpjf&f}rL`W$_WYL;QAsYXm0wn|j
zKuD~`K%fCjqf&CwO=`Sj<jhQwn8xJ7-^N1s#$wg3^v;{$m#W2136HVh?~xcj%_msv
zJkNP-L<0Z;8U4yRnG~QwP4jj0uDP|F*Zl53);(|Dc>8Pn-@o^(O0OKh_f8zaXTVPJ
z)}RGA7RhtXCfw$1$N&1DpPzNsSyz1Ni`nSt=&{Ehd*_{Z8sH?N*f&o^07!(f(J3OD
zK@4V?a|F~Z*xp6HN^O+KZOTw2Ak{!EmsFTCgULXZg%TEK&CJYNE3LI=t(aMBt$_%I
z#Z%5K=81Kun6RZbeiC8xlY=7@*<J|-H1Zc?qKOVf{S`W(HCQZG&vjNc$H7jCpo_sN
z0SpE{A-rO+hc!Dt6nlsjX74TzFM2PPcm9Sbtq0r4VOtkqu0Uon#991U$-nBiYI8~E
zU8A0BK`Q92kvliyw|OWn{nCyvgYi_8I^z@L8|v6ox-Ent+=>rl*`HO7kD^2hzZ*cb
zd!JKKOmyE`@`e!r0zl5(GcZYRJ9EaEMK2VN^c#l_R<$Xao8>5G`xsOdodxU2#R7T7
z2UQS+tOG9ubP>hJGXnqzj1<RU@)OFeM8{qbgOoaFoeSs2L(8m1v|YR`Zkx3s<JhpU
zKLiocqP5vS0d+1)DHPVs6qH(Pz$&*M(K1EcZsfv1HsoS2z<f^-QEN?zNJ>y^&n(bx
zT9SYZ1Tp|2iLib8)@?vx4NAbyh{52o(=AND;wr!>5q1W)R%M|`@Y!R$MO57Rz<E>h
zoJU8@i4`Ct7#9<{V=HjC0ifO2|6|?r%fItAbC87}__*ZxfBtSu{K|WGnNomEv5sHk
zK(#iZwM|9xCg)9y-2ejo^wYmPanbQhFIk$2$gEkj3}kwv(*&PAcAEcq&z^%5hn)g!
zoV0Cs1c9QLuT1}pt;iZLSBZ>Wq^d-=gRn6!b*}9%T5C;O6Kk!B6rsUZOCS<qB+=|{
z3z$W7p#M0oj=5Qel34~Zx&(mqo~YOu4R)%qUl@^L$kr$9eYqSNpZ@MN2b<7*00K!U
z`nBYkb)o8_6V=BiC2}tZo4E*?Sf|(6QDEywYvF+pm=~`xj-sAM_4e+dfSuMGRKHM5
z2)!MU49AH<3PjAHg1@9wMq-_dxW#A2zp-}jdo)ECatoHEcy5*rRDcIquU}(91xC;C
za@Z-JLlrE*IzzKUG?k*gUq2ddceWHGL;^xj;{yykv;>0)qDZHIHU^IfEsk1$oF&_6
z*16_f+)w6Q>n7_Qz{EAhyGxCG9-U_3>`KANPiroT6p8x|5orbzB4vHSN}QQtco!t7
z1(X1bi#Zy4lAZk~%n9hVWYHEx0JR1iE7p<o9RUOZ7>zz^U3O$*n_^>C-Vg678Wf@}
zKAP;;n$xR1b{1Xn9!$g93{mc~j*TW3P}F@RSOq;cnvaf*KEKKM8x$atC`2+!6Cj~A
zF_oL3hNE)mjBMctK5me5`FFnNe>bRk=!~rS!t;jHsvY@&1sDx*A_EAcHqJ$m?$HrF
zHi}khB(tCIG;0<BWPa8vrLrvZ2<nYa|9cc|GU}4GHLWdE&Zj{rXCAdldz5OfMP(<6
zvn3>YU>u{V@m^|e>`c~LYehPz9Fd7g=S+rCBU<N(z|6?v7ay~jS*mR~(+5E~zF_8v
zjqbvJ9EBC_XC%NCN50(H7L1&$U<_rBptr=2Wot@$daq;H8Yh6|D!4c=JCA^OG>2_Q
zirDF?MKNAV46#OajeWeO=O`>**Y<YyxW7AqWJF@Iv)^n_-Y`YS$}KE2F`lSEB6WsE
zm@8OXv)f5L=v2r=6JztYwU{A9m5RL6RyJoGWGcK!SQtI@bPq$%k!re-l<C4AdL?2<
zQ$({s|DcKtM{G&Fs{9d;270tcLO?<yAVef2LL?;fdWhCK_0Pwgtsg5SWtjEhLYdb4
z%B*wNO|6?+kLf&T&RI8&>4^x&@dUsSadAB>)lzbaoXsf!Vyp}kQZbxh7B+?wGHYhC
z8asOyg$Zvm3sNBFJL)rN3FN;(_16LfT7*;vS^yYL7%rMQNQlg!2n86C$m^yE?CnSq
zF{Bm?pBUT`cB?1y)?s0bcBUs)L-++<xx@@}yS7t&3lt$cCjnV&);b>>BeW(a5({AF
zIQ5Jcx_o?@Kp5aXGnFvM*y&O8km-2rOw!G!IgJ^v+&gI*avS3$<E>?rj-fSJliksh
z0RYJYCpl40ysc@e&wgqIf~T=?o!2v($2GQQ3#Ge~s#43t<rd#H&tAn`6&7L5M5Ksv
z(uz<s<%oo+IadgpQJC{w11f1+?Fs?3h-MwI(?OnQF5!ekj@d%$Mt~xSn6MmDr5#Xd
zt<lqaih)cEdX@(p08<<yN`>$P#h2_bfE2A_Fws_F_FnWTkm(a(#`DUCT$`BtQ*y^k
zY!Q~M!<buJYhyw5vDod3g^;$-#1NOt5|(RBFpK!3^^>R-V`yA^FM`jOIdUjlTk8Nj
zwkt~pGhr+8ov~2_B2ty-;l#OrAsqp&o53$PYjs7NrYArkN`WFdz7a1`vQZ4C0g3?)
zx7WJ7P+7=Ca<(1D-;}^$Hd<9MM7=x3(jP>N<gB%Dp66paAJe+2a|5ErRjV;fFwZKN
zK>h$gLPEvvff11>G+3KM5JixX3?>1QFf*fb(lCP(Ve#0>CY8=FYt0hrf(G$5A}|PQ
zA?rM|>qUWblQstt1xf%6&DU(!=+J`f@^W-eW{9~vWK|Y#Bv=-+6tk*Yx^1hbXYkO*
zx_cq>DDtoi2y4wc*JERbS}A}?42T?YmOLs@bYuZIW*Uf=g&+9%jbHzg`M}8^`}2dR
z$}!V`$HpAX!;*|R0#56yWim-A3?QsoYXn48h$29a&V-q{0cs(*_6P6z)2|Bv{K3V4
zfBqpm5v~89OFnq}5r22y!2=+|j?U{WPN|kesPo;Kmxk~D!l@Vit9$ule{t&@SHAbm
zZ-4Zw%Z}T-2&t;N7sw;GoOsR+0;hcOACKF^y{NS|F?Q0JM_D_f6o8;sj7T}=sFet4
z)=ovX8UTYfgd%rS9GsbeQQAfz+Blw%2PhW~EwXYfdEMKWE<Gj$J?&@2`Fl%WaqeZ8
zhzaa`v>cL9JShl*?^mP{)CBLkiU5*ru4g;Qlops;pKXNoETI;0kz%^0fyn|d6vF{s
zic~Riy+txeR0pC}qWd^zU;Dg~C>5gQumYU$p<0#SssK!9*(&HcKHh)`$+dxPYnl8Q
zZ9*~45nWuI4b@gqTuK1i10tD+f|lS>)E2N+hI}>B>2TVld4@6pgg}aj(Ec;8KylyY
zz~JyqcROJ?xRfmCPUku6T<fNAGtZk^kLl*9)=iUt!djce4?lp#6e(l#l4udqWN6`t
zT06+3;JPLvVq<g?60_EtG-+niY$KR}EKF<|v0mMc^3#BI2;QJ4;S(_fp$5a$wJ?Ux
z2MNafWmW`?2n>V*CR4^)<CfSV?0I7(&R9oeUsJ)Eo>a6Bt$tE18YSYw8DVir#SbCH
z$sdk_0K-o_HoSWE6aV?INMOwM3?x&iKol?`W(b)J;wmU4HUYrs!0TYjt|KEO{*p$X
ze)8FeSNY4+#-K#V0dfHr&_WteGvq#-Qvmx1hM#;45DkaaIX4gyvx5I23ThJ3bHDiF
zhc5i-$F9BY{e!sS=U@2Xkw5yvvd`{Ah7(RCBFcv@5$dp0+Jun-6e7Ii;v1G6GQ-{S
z-nZWN-nt|lhh07fy5@&}cEejQyy={SW)==@5^1z%dx0P#B&>u`hyijDAk2V-P_v!n
z+Ry{E<XT&u)R1l>SF_dr+%pgKA1=f=1*8r#T@0~cK1#?!VU9wT0wS7ql(!i&YYe7Z
z#yZC-m?kJ|^(WzSO#>{M!cj;ViU?PmfLlV!R)I_?G8bdOs{^M%UN1#YOQ;!BQR1w!
zh#edZ(^fzzHCVe%k<rM&Emk>;L!RSTKnnSl*tWP!VHnHw)Oy#bFFX)uh}z%Dv28;t
zB!Wmp<cSp<7aK!FAwjWbCRu)wuXW(kS_#^gpln5`jkBn|Z&n$w1f@t3DZ~&(s!wwR
zw;#Faz0C*^n|x^!PPA@XTQeVHJ(lNVoHscXI$-DfmAICH&u0-76Lw`3K%qd1F*szc
zVqq=BNQy)NkVuF{YfXwR7lW8cKm(&DRFR*^rouTj+7~&|hWQLO>yKD#5m5>_*P?vh
zh`W3O0pmZ`25T*a$rg(OW;PB*VG+>Qn78B|6cM5*!UEQ>5KRoRB(CCC&yEfq&0DFP
zt5RavS|iw4oXs&r>&qk%Rz@`tK;U3KTjR~GZMkcw{qCEx>y=l0rrB(ogI;;XXFl=&
zT@0+>`OHJ$*sO(r0u01}T7&k~AraQOan)i}qQE@ntdKJh*Y6m<`)dw0iD=d#7u<0N
zA>#TWFg#ll40ItATClmCB7vP%m&8`t7fQsz$d4Ad2@qv1o3G57H7f+64Hu9|M2JX4
zn+pU&VM2mj6o{C-6bPy;X<<ebEi4R(CXJG#lv0*pN1BWmELGg{HGphPBv^MI=R(yU
zAB6M{8Am{f(mM;4gCvAQd>s>KC599fj_NL0rn@&fYaO$3MrP5(YzdhyP0SYXX@iu6
zRf<p{D^iNI5-6i)P<t(=a@fL3Df8p9Zv;BW&d!a|RtJ)a_+z({ScKzWTP?T-$VW%1
zB?9L#Z~<a}XKue_b_qX$=*r@WNChJEgskLHF#(O40SKs25h<cf8OQ`fS|mh@caCbp
zw-l{U6V$Y2w{)K8W1Nrad@OH{vTo{pRO>OVbFiTk@f=hS<Pw**BlHd@%Tyv?O2uZi
z3xnlU0-<Oj1VEkV2ntXst@B(HvQ`?kLL^cEnqAEh$GmkJo#Ju@40Qqx4;DeA1|(w8
z0HA<0XlY`jAsRHY0>#M0z=SBM(7M`DfXMU3#6+XWIN&W&HDc{C1k=-G&W3;=h=3MB
zG`!rR-5Hsl5}Td{=0S-fgmDHN0(maA`z(X0^HE`Hn=k%k)_(U*-Tf~v`?NvLPk#Ec
zzqstv0Pq)=efpE1z6=oGx&GmDIY94|GKnvqZ*Fy8qg)acD?d^l6VEtOpZF<!?9KaF
z>ocMYnNJbnhMzAz;^-rfIOeGN?>TDe-NUE|iPrq!m?Mrm>hR-^y7(6xh>#w=W&Zn)
zKH_~xAMr=WeD6{6d|eac2Pim+hwuI3kyqTkfoS;NFCKNp_iwr4Jx9I&`;QPl^27HY
zy>P+N3l|){@cWMtt^MI~fBG$fZ=Ze4317PVIehNkFCBZramSu;+_4{c-(|mgj))$;
z{ltaW{&E-*pS$ns(@(zraRTGzL0<*VX=HXinTirVj2IDryv1fBk)9(fBJ2bAw#J_;
zVqnxo$Ne#A%2p&40uf)m&$4*gsi8g;>gi4~Nr(ftz<$Q&%(yau;Vj{(#iY(6YDO;=
zGBV3wsk+?bTu)yE1Iu=8iGu4_i$L_R7R8I~-#AsqKZKHU&>nTHO<xWsjB}6e>i0_<
zFL7(+>^SMARVGLMC1Km|Aw>B$rudSNJ=uj#&Qx;NYH*kae-sfK5`kS)NXj$tLn=Zz
zc*hC?MrkJsl|qF`3Nz)flgN-LF(^%OK_rkOeb6T4fv3o^W^OX)taF`@>3o#)F>SC@
zHx2(@Yi-x5xQYiRzl#~{tA;{g6=L^!yGXTW&04cI>ydTNdCn#uPUrUcI?r>%<2Cd}
zEy89qF|`-WADZ1Ubk1T^1UM{ccS>f>TFg0&F`egH=cdLdYg6sWd8b@_Cw$%A9fM<1
zXco<J^^)TLW4A$1Og5j=R(0o6Y>uT;v!-V1hEzs7S4dG;22;AIw+nl^RBspcbwh7A
z_V!_KA9eRZS0D8BaZjK0_Cjwj^!Av4_f6gX(o4?G^E}V<Pk#EcH*9(Glb^oK{CVjm
z=iWDUcj)bb-d^bKm7YH6>4UC5>h8myKJ4v<-frsaR=r)=(?z{q(APy>8IUTJ<hRv<
zoU69F&23o!pd2=ThA9~3>`_M+Ktxz`^P=<N3*Y&dLkC2j{hy0Z{NT-BT`}*OOFsV4
z=a=1j$SgBkH~j44vmadg?b{C>0C?md5C6nJ&i(%JgU%ua1c0BO|B<5s0N}8te|6qI
z@vib8-+17Hn{NN)%niS|?1K+|_V2%U@JxU;|MZ^I|LKjlEx7esTyTbb<+k_i32VQ9
z^isI^hFcGw0kYxeUpVEX-@o+c1;>2pqksI#e_wFzYkzP#EWYyS*`SSS@0<z}fsG4u
z8d8uW=@$4tTy)PyPFfb9MhUilg2eP%u99QHvv+JRrT~IlBi5WXTv>3+ps)1<BH9<v
z;|e>-Q3y&k|3c`n<fpCH3NB=1N=IJVT8k4~8Da$^q@7!}WN`{GNQtv2^%0b9rp)42
zT7hME3Kw4<ul-0TX)0T1r&|5E;5YMGvlM~3&p5C}%v?bU;}R1`brpk<h(0<aV(d;p
z0u&URo)moWEtyVOflM+yAX0>+C{v`AMNLzP)up493KYkdW)Vp_Xpp81P}8x2#`1hr
zn_#EbcF}=2k^?%HuDE1XK+%XK$U1C{#K54fEgb03Xv?Y~0*W9rWDVk6=L(S!^IU1t
zxmFEi76FwZ_?p$?5tQ>h7Zz<VkHOTtM%0#_L^fSOvw4t;K!}AQ&+{zHz|sMk&F8Hb
z9S{YHw1`hZu~A_M4B|prel3ec6e3&r*w;QZzzjq-UJ_HmeFVT$l4=_g#ZD=r3>rOI
z-&C7?0zd!?O^lY&Qf)y|Sv7q_{@W!NT<(8=7e57g7QX^h`pkF8T(FA=l8~|!95crk
z$3_ns{w&5NdlAsNYCF-aBVVon4BdO3oc^`9&IAF(nTLGn<M^>(u6h6a&R+&g7kz)H
ze>rY%1bBAMio4)n@A|MO0R6!;8)WYp@o^7Z`mOU19kAzp_K|1_y!~@$95fSP!|EUZ
z6#nC<Cm!#<@%Hr_7VPD>_%$nUls~!ZEi*s>VBnw+d>H@qfwc?v*z>(hKm14MogoLG
zd)*rcAlI?W3I$BgiQ~?iiXZ~TdO8v%H3G+G4M$aYLhRC&$t{kjNg!b^RQ3seSMY{u
zDDGq3xg5&ITCL9|-uOIJW3oah%H>Pwam3?|e6!waiwX%9=x_y7ubpFdTtJQ2g<BF7
z<`SV)*s~>fE+Ps?l@RKxA5=NI)dNmA(R2HuaNyle<O0f!p%%xjs2w=&4OzyJN7E=<
z)Muq26pO35+H7(CRqJw!avB)Kq`gEjREfvF<dCmg$PsFiB4wPkiZVons7Pf*icke+
zP}P@SVzNoB9~v;yK20;vn|ZUD=S@>xPjhZ_RY5A=3+LZ-$vw7$g0&?Kh9YZ6PQ?)R
zVgx{K%yP){90?maYsx97++e5Hs1<?Ewb;xS&jd86$+_0dISRARMGPC%_*y|D6DhH-
zS6gfkv=$PDz|4TCP-zijR!9tt_AZTE7MP5ufsoMbM?_?+WSAhF$<H?R7hQ>_5Q!5p
zv}e1qXmM$*5*KW8aTSz8oJOkjaWm|hYS5IvuIU4ya|Fx?2vH%R;{*{wh5`T?a+J*p
z?}p)b!>~P=0_dLlhtVsbK)R=DfeauQ$^ddfQ-2@_8^0BSoPhu!%V^4!jJk@2?(GF<
zJ{%Q$_K0X;?|1*fPd{_#(2DmDmMgYEu{x(j#Yq8Xyyg6_J$}^T3*?;_{@s}f@cS1p
z`_#d+N)348d0x)+VBbx|fAFvi{`&kk&x{9ngG6eO*DQS`GR|OOkhqtYskkT3@4_rv
zi_SSz;teKT2-Mj_X@&wh$OkeZuEZP?OE@Y!>#I(NP9_m{iYt9k33Hk>ZFf-+RX2zl
zrc}!sv`ET~1DT=hR(&87TNM@_moeLFqxY`DxOh-)nIRwP<U&!BR)#56VyI9$W^3q@
zYGHTisIYAZ2_smh3`ObQ<HEO$o0uYT&4QMG+WNxVE+wt($1U^uN{xqH_8R!&cZSPj
zW-R*T+OkREX-&lm7MYt4H3=1=_01~El*$w-*S^T-qLdY>`oMCS^{yI9p6fi%^QLpp
z=B7N5S&_A^bfnlTPi&bRf=~m3U72+B1XNqGmJkIP2}y$hYMo;apc<5G&MDV9X+$jo
z%9cMAcI+fJuH8J>dDApYG3kW@OorwINTfhCl1V*ale{U2f@rGXB9cKrRs<%}N+Bsz
zM37C2rv{CR6rjml2T&C6(Z1}VxB^VBPJ#fC79k4Ljy0Q7xh1uxp!HJdNK++;P4DmH
z-f6u%y+)600>BIf0W$<5$Sltmh!_AA#zD_|0!_T+#O425yVEA005LH8Kq~@(>Yd8H
z)28?L)sb9*;)Dm|ueavTjJJH?<9PjPm;Bc=)*-%n`9=TrjNhC0e$(lA-N%-%5dn~A
z|NHO0Ca1k|FJl+&_1+);!-aqFlRH-Po=3d%-#_!!pRJGLdj$u*s}#o$HNd&zZO$_5
z>3hHH9Y4L~>;JRfHS@AARR9q!yypQQ#c!SUy+>G!$nf3Y`L>+A|7_;9x1Rs)4_|!E
z61e<ZD>sB@Caksfdsu3n<gB&MO(4=_cofQ7axgTt*2a3U2`e^(nnR#5TBGK0o;mAl
z&TAj<bg>hIgPOJH?rI+)^;LIW(F3p9cw}VPO2rSa_d<slqO0u?`jCe}W_`>ujy<%j
zVH*OLrGK?Cy_!&B%L2I)8r?)Ym(+zk$D#YyV-ic}!OIR`uNgora^FH60-^Otl`&-^
z`JA2Pdd9rm;6id$W<#1>wPrQ=@MnZ!gaJVviNssC?d|NC4P>hvpz+FP)<dfdYG!2l
zv@uU1YMNWfVlEY_i8>CkH8-_xvTo|UsdY2N6m8)>5l1p;740@;KD$@AE@Zx$ie<%X
zSMD><?Yh*gZ7DNmHi)PVZ0EK>t_h85Tlp`~wf$c+*LkjU<E_o}Tr`{dfNXaZ!+6pz
zLSz=Z|AjfMDHgK_if9hSIJLI!Gwq_GfFLet8R+=zHb`6JR=|1PtVhf^?OjDfH!6PD
z38^-|_e;5&oY;l&`qv-uoAuA^bif;@?7U0Qz(6*&zh`QH_q6`5{%KuPr)5+78&mtU
z{^?!))3W|)+0?0BQ>QlS{#D=Vnld$;IyLK`*3~~P>!043+MiAB@0vQTtAASewEmu{
z{n^z1o`HcWJMXg70dIWtnWy*P{|&VZKl2$8zWk}*{r7zDKmFZqU;IBO9%(;&`qzIv
zQ=WC$z4!6o`NI8+K7Pb?#tHlRzdL>}c=l(Pe$ZxSo_hT)Z<#4@`ezRN;Kd(0!g^Uh
z_Ya>ucxFwBSx>@>azY(}Wnk{9pMU#@FFf_%%;(>+<XcPT&hV-v%wF)<OCCDulgE7n
z004gfQ#ZVK_J*H*<<I}>#LJfLKETI*=(3B>89e`n!(Zc2%jgEVoyEB+RS6Jm&1jL>
z6n4{AvzW`lCe|1yAV)O{0&aQHnhT`~ILb5e8J%LPK>Gr=)<YYJw8jS;rD@uJ5WcaZ
z1JaVd4dphdSOp|1mMN$ji%_PmVhbv1rH{3**jMKZEnA#is#x2;_&c_$sIX0e&28}3
z7K(5d?L1#I#oNv`B?>DxWnCsDmOSA|*a>Jx*zK#cVJPYC$CJwaQ^99^qVKy2p|PXb
zk~6L`r9h>;aBZlzf||<lfHEK5G^lAAg@DCs!U)BbA6N1sOl?O8(7qHc=f=>?UE50z
zeQ7}iN|hs}z@W6t1Ecge!H|9<0LbD@aoem)dk#M{qt0_AL`|$UYo#@kM(->%rBB?o
zakH80oSRL}O;ZL=Kr<qOCM1&@q!en+M8HI%O$9ES`7Uf}v<yPbK*Xl}7qbZ@`YHr0
znwSuQfrY`Cp3cu87!_{xp>Xf2wZ-)X*@Z=oBiI!YCMo)KLT45`+O{i<W8dR{{rAu2
zf8x)tJnOV$|LBkA?Ej|M_H;u&27npb)_Dr8ZAcSUC!=_{_$+?`Eo3~CHU~EAdS+zo
zzF$B5&$oQ<oU6b2-#@!AT8wVyb#-+;_Sj=L-+XhU(a5sQ{8UOc8Vz6e-B%96%HCSa
zw>SH@uVh=thL;lcttJC5;=&aTg@PBWL~1b|HXLu;6I5B}x|!#Bo;UM+teH2P&C#*u
zShJbuc{A6|yqV{DZrNuV0JLjY0*<O0xIfmdZ9f)5D23vAz`jNwd!x{xHUmJJARASw
zEq3B`bUpz4U0?Npi_JB?pW0Ul3{R(2_NYEDGkQW2yQW(?X~%EuUP)@HI?_rwSNXI2
zTd@On{0ddyt$wVU;8=MVD-=&`O}A+qT#On6V|<*D&L(l0J1G>AtQmtMizf!oa<LvV
z#Ge|(j{LspOD~0r@NpB70=b&wP_%1gfdRte5|Ku2V{v^S07a_4ZWo|+?pXwM44?p+
zo<>WkkjPq`k)>O%e-YKQLIhuEN9@XO=FO3OY^2#7$(y4(AI+Pic|K}@)4G|96eHhV
z5z6EcjM8&TkGNRt3K2j|K|4dpR9Pd-8j3Q?dK%rm-Ccc+o?fN8l~SY{N+}T$&V{wH
zjCDT3`KZ>T1~^5mR&99A*14?+Da%M9DN<S1X!y?9%G81*L}ilkkWAGJB9qN&qMHDY
zItpMb2pVmMLRDUhTe}x~U&kSQU#i#b$q;!TuochEAC}xnc75$@4?N)Y|9<5qtA|$o
zcJmhVrghVkEka?A>N#jsr6sy5y%-hs;NUintR3ft^1Jb?r}XVJIOiRIcF_Y5u6gpQ
z-^ECC`Y9iH-JI8F-Va%5SRTzAb8I52<P}I%_B}LL=1_JAB9C!-SCv+|S1p<X7gwN!
z+|I~l196D~L-Mw65uN9`iEcETd9#`8KoDoGZU3-hu47E2^{5$=Orl(+2nQ|N`Tn%p
z7T)7hr93XRE-6uje5(_%r5L2}j6>|QMK*;L-BuXl^PZz2Qm_oM5X+G^K~3z$ap+)y
zt3cZ#OR`9j4c&1|y*z6OL@km&+k`w@+?tfKvnJTfv);=Zx>Xi?g-B_%P{uW6u~qq?
zLLK!&75Cb~$5ITt=)5hCb3t(tSClsN5ELk~uhABZ6=$#@)Y{aZ92?o1nW8LH4KjA8
z&EQlauIVdgW7#EOPbg)dxpNk3Yrt`CiqqQACVN++#7vF2Z%?a8d@;%nu26uxEZ<Ej
zD!EJmtXZQ*Bm(Ea%^67}6F_c`&dj-~VWe|c;YhRAmdhiIhz!K6Ns$l$BLQnfB?^E<
z(Eb#gx1$9}n`YMl$fgFb01zotV2%)3gDE+|>?*?(34<~6ZCWc78V-4egx{N84>DrS
z26V+UvANI%&ynUNu4)2NA>=35J=N3Gv*7brxEkpgwYh7NAuKi20jzkD%GiP}tx^E_
z+1)FjT=xthR!?BbK_*=kqkhFAl4Th)d!sX|o#8VsysuTFzL3bS{*LRxQ>nwpQeVZ>
z@myL`QDR0?k*0@eJ2{Kb8P?p?xz2U7*=**z*=&yG`B<}=>wK)Kb>7T%$Z>SplTdNM
z#`wfhQQ4?AkPAbW=s%WJ8}%^pRcE<^dA@MGaItCufM#~fM!XT=3AAn~EHRuzW2PD&
zY%TXyN{Q>PD?-On!<tsk;`)9<$E_;sSwc~F`3M*NE)TweLoKqlqzFliuGOu(F1Ns4
zD3c({F}$L39W_5_TUMw|P4{wsWM^!pVv8?Z<%Xc(nM6;BjZ~A+LB*GGue)-LRk1=B
zGmO-rD6VO00~w4oB%q8MCa8&Mb44)}r==(zz15^E{4Flc(I=v4gPNR&pr-TCR`(Xf
z=#G3r!9pDz#KQVQ$C#07RKsi(q-@lNl<8zG%$hVaXj>alMC%-wInPbed9Ah1o5BoW
z+6V&*pa>x`urOmr2p|@y4EYBE2u)*b20`P=7ZA~&y-aAjTo5QWUu9%#H8GmXxkShs
z0Z~zCVdRn$McCIVFeNbTVnjwDW^uj7Lx;(t^WQl?L#7JZvK1%*_{iGdtbOz`Q#=X)
zkrbkGHRaJygs56)>G2mAQiadaYNZvknZ%o9P@MJF;>`2h+*OukW`Fm;m`2bsaB^j5
z_vQOdiY<$1w*@m`>>F-r$_PlYU3IJNJ}CPT^;NL@kRcVBDQN@rV`JVcn>U*}&vmn@
z^So(7@wsLJXBtNA;zEjuZ{5d*KGbo-Nk|%DU%g$lc7W=k5kXj33NcaN>LmJP=&Z>R
zg*KuMm$)raB8oH8#5Kz;4q7O-6mxr|Cflx_JJUA&hpqBh>NUDLG-_puMt!0RRirz#
zI7`QDZG-xiUI{nW*c>&9G__x>%`K4$wo|EI075xE)VK1kfl#bLTUX1LVm-7FR0avX
ztYg=lGqy}141G7uV$IS5b~^3O6>TR)nM>Bp9D%l>N?zFl^T_R(Sg0ddD!v#s{9(Jw
zEneo1rK4Sbmq?MD4^Zg;<LU>QIC9kJRLahL*GyN43~$vv2wyUqTn8Z%#|F|Wa|<3B
zO^AnC=Z3_TbFOvXWJ_OSbo;*|5flP4aY{o`U_smb1PG99TBeC%X$AzM;KQ*G0YGc*
zoW4M|l%T03h#(9^fC8G4Z1)v*ow1!8%Ot8`(6PX@V?hxR4ZbD@K%o;|$(3j|byH0+
zRGq`x?n7>-1<o(jRK^Oee8b}NL6O*ol%gtF)Cxm`iGqjIk%RI)_a<g6-rRKEb1JPI
zJ;s=H4#V5>#oryBfMwjQhPI(K_8}9l-G&i_>?9Wu$aQY>wlt45joGQ2xgKjabIp04
zYg5L9MQcl9jche2mlX)WSnNv@I*NF}G#KpiO4tWALn@i8K*UAot%lIL!40xz&y0go
zxjY|<45~}yXmu5sok7WE^}JC1m7yj7UfOYKq(JnRQqkCG?v86^c9LpYOaLqUZ#%I#
ziz!uY?8uhbxfL8&+aADeG|<W$Tt&kc=B9&2s-h;8jdiLwH;eq7HbLB|0T~oJ8;cK%
ziuY~=aE#JGJzK}pmjuZcPr%4Mn;D~%42RZwaVahmix_#7<D$b7Jtr*Yy2TuKt#zKW
zX&lD6F*hOZP}^dX*7^LMBSZ>mT~QqXHl=`ln+a>FvuNWI)tV?X0c69aHDzqQ>&qF*
zP2t@1NOZ+JMTCv5X}Y=*A`2+{lbk6=);=<sD8^28bwdq&iq>d~AegGfrrf9PGbgM8
zNf3ybO-oVJMg)n(Sto?#a+D+##wnEew-x({YP43Y>8T=dcCv_2sX%N|*W{uDNm^HX
z7RPCm@%f2T6LIp|WAtWbp0okZDBHo>npNP8HLMVabNLd+NYl>rG+PDxqQjAe9>*hU
zc2o%)da3<#g+K%-V*EZnVbSN+<ayrIoHz5PNr=*Uo|_t0ENuFSh4>=7C_;%S>#fg-
zm~CG)7h(F50T*hxN7b2qv1W)<QzVpUkBPY9_!5<rb06eVAhWE0*o};ev>+_Ab};Z)
zqe;ot-Lqv@hTFvfTPJDAIKJ8TJ5-y(2mnz^LgdA*D=Jim%o0@BMnj9cVUa!634Paf
zj;KTInuO*^+rSP1x#n}&aqbG%ROBo7<cw4;?-F<IPkcnnxU$@CX|p>09*Ci<vipOG
z5Qs=2pn*(9jZ7IU(^NcArVgzm`}(LRMqHe_`zaWmHW$MMI1Pt3cljYM!Md1x)@G81
zt)`M~98IB;^C!f2B`SKwtc_FF7@fh~)Y>+d(b`2}nQaL`SO3JUT4Vr151XbcQAPkH
zF2&LI2D9ZtT`gGz0MUZV@@avHwMH_nqD2Hr5S1x_AjHg|5Cv^_7XYw2ftZ31wq`=y
z6djFeZCePKvoHrbk*8Y}E9wM;5~Ge|V%t-fKrRGFDjP*jghR^4K+6ruGvG=b0hE{r
zVxh>!IBi+fNDQ|&X4RIA&X^`6Hq>YO!}<ve>|3U|aDkNiRTVouLQPms;#9)Q@Yx$8
zyG~7qR>`$Zugq-$N*Nn#YL;B*TC=d^!cmt?+c?vsW>f+pGBmjWtEL!&W^KzLXj??D
zQcpJ2bLT?wAUl0R!FPwU5Zdo?As@|$w*%+6%rA~(Rbc0CgrKErk#1{~&?UE&PEskw
zUKExP$lNZ~cG|+HchnS$2L;}|)a0?mJfrq_T-1W=8g^E+gpL?PE>3~*{@S|KEVi?2
zu@IuH$uxm-3J_r-tl2I-6tRx^9DL(uOCb#Hp-UzE<L+vOc%(ftxgxaas^}@olxi44
z5L&LNDzTLUgSW~hF8kABg~Vx~%syF@O&L~`>|s5t04<x+wVI!T1;<B4>nb&?@cq?M
zP#8dg-yU3YC0bsgDeJCHwk7MPW(%LpIl98@rY$9bVqikW%%sd7YhsmTemAw?(WW?<
zl0aY@U1$+NP^eflDKfz-Bt&6A(!ho#1c<_5eZtIOfRNEO1^{94tv9R*1AvOy?96P!
zmSWW@)0oT$grmqh7UnEO%hpU{!P*BAa~GfvJ1f1D1UjbRVX4ni)SobpaeBwBooHH@
zXhEjPdllHCDy$$r9uLB7fs-B27A%4W;H;2-ij9=rmzbqwFL_&wBAy-CVo(m9SaQP$
zJ$waNRL}SKf=Eb9w{(XhjdZ7iw1jjwEDZ|MAs`?v-Q6s(G)UJj-LNzZ(*3SqfB$!$
zeb{|2b7$_IIq^B?%sCSo6sBqFj+U0JCuaWN-17ul?3L{_Z%ZZc571ulkagw3=}~j|
zjTFcmFLLPLdvXIvmRCC};&!HPi>=BfZbBj3pR#jl#9{d%%jstB==vUCL}wjii3BK1
z=BM)IZWj5w$j>JCB6dp?e=Jxivlijuiww^EP&x>m>*0;BWc@I$R)wXtzdS?SR<Vsj
zw8Y~wd8u7r1!a2EIF$Rv)tmKnl*LZ@;Tv|@ngCzYEg*Asj%12nqkrkGi>iS#_xr$Z
zmb*|$c!4Va0*-QJ3i9}}WMKuK`KW4MovHlscd3;)-c2k+4BFz04-_<>sjcBjjxY4v
zq{CD75?vJLYo#k^MD6OBzi=}Ea&*Y6(O<l%4XP#bFHa=4@12BnzRobhdo_W&qoPPJ
z!>NxykDSX;tQtj(Di@q9(+kBirz1RC49i0oSp`wO;+OSDlB}~i!w#XdFIUgI{n>Ax
zGpV$;L8qOp`bBGJl<Tyvy*gymedm_{6RG@LJ1PH)pD3i14P%rMdJRleee8#Y<{y(S
zI`|@=B)s8-5kkcrzm7I7i3bgpNP^AMB~RY#)ZOLwCy#OC1E4JuDva)VJuhDdvC=4t
zU4Pz(H@l)S$!pq;B9G|LC1dV{%TZK=-wRQx;Nt-svR+eUh*loqD(_aly!h>&J+SL8
zD^N~Y?#!B$9di#senqL5PFpZ_&-|wjRpg~XUv$BK?73kf!w(hq$@{21i3=Ph(v&^c
z%-xF$+i~Is0d<e^)9FSfV;gC=(uGU|D|wPi0%WSPda*^qW~Uh2?cU^lmq-Wsn&z75
zgBNnex5bpcQ_?ny+^oJn(r;(Hb&yo$d8FQ)XRGjqzbUZ)N${Swm(rGXDP{)^vMiNx
zs=>fmZ6{`4uEOPvDTPf`%$lYz-O;_j2EC{wU_q7HBx8Tcfoi6=P?{OkTTBb2lo-{I
zf;MVKu<n|fm72CHk@+U&{^_Jc`O;y5rPdhJIdW-z`R>oiM-ziA+;~L=71UUb&T<C^
zNVUDB%;Jo?j@*PLS*R4QwGqB1-z<O!Kq@jT>@>;m#D6sV$*6j+;*(!4@h$NNom8QM
z36cmV2THVOL+PI00@zOi7k|O&x$YqGv+(po@3r&K%5~H@B8Sx-9b)786*d$GIc@!y
zVG1l&gi4%Rg@r#JjpqXnZlCv=2eEjMj_$KCU~pmdI;S8XwXJc*Iv496bNW?Z^F@&B
zC@uLhbCpoHYadE!0ETik7fLYuntH41a}Bijb%lry3M#=&jdkDiQBj6}OT3}YbpZ8#
ziJksrOYoM?_Jwv;t}PKnm)$`sq~OKYkyKd4<q|aSYf_J=IVKe3T62awuo-m3vEY&&
z{ZV*-Mzw3r;L?xg4I+XFic)py)g}<keb(S8$revUeS3l7=6Ijcbv)y(AQ|5nW5Cv<
z8<5|ZIXi&=Yw(6cOR!$_b7EO3dEs`H6@EH0dVdq;zEfl`#6&97UlX_U2e=5!!JpA$
z7#>zC`IR=v(ZRxv;j8HlYIL#AiX^p)Kdb*6=*%#iY7U*E#l`1ult!ZM(}|zHm3CG;
z#E;H<5-DOXu{LB>xTMh9uZaGsdh!H*F~S6pHV~cZZ?$=!9k-p0fgcaR{IJ4<F8P8#
zNsxZ64}1XQmtB{$o<IK{kl(Z~x`5vy0iO$fI!Lds=P*G<4yxB(F(3-1m|faEKXYj2
zy@1e`=8wCKg%|*VQ%ZsJ<cB>8W#;U0nsN9SI!pvK5l7QF7RYnKnc#@c4zZ4_1}cH#
zBsWrKXUO)8;H<vjoFLFqu_*|6>w1J<X=3sLyLYO=RK!l`l@%e%>s02JzTvg%?OXym
z{c_532;Y7qQwbkxsTtuj<_|C)^&8VplODyEc9YL8e5((CPC?a2QHMBR^CtjB4s4Fs
zGL$OIYwX=VeU(}PJdGT<Oco6VEBf5zN1WY%s0ICl$>?fT^Zk?AZbQpG2JGwXh{<R(
z9mW5AAy~Pp^oBpq27(qneeug{1hG9YFE0EK3|949Tp1Y@6aIdxJ_=nsoW%*jbZMeb
zkT}`=xhetQ|NXD6o3R=*^Hfz9uJm75#e{quk(`avm_<{DDBgd!vziu-S||`({p+B?
zegQ%7^f@D`fT8fe4&IEk%*a|ildZPc&dF({%>SF!K5<%mKgIxLZc_JUkPu7h|3)zV
zk{I-{W%7H2V3G!m1ULI%_uuS`ONb+pY)sE2s|D*ge&GH8{>Xsvty6rZ$_2T+b@m;`
z|9dPX0NuzBHm#2O&UpxA+fAT-k^lc5CrV=mlJxv6F|rebi^}2-d1r8N@Z^Mt7ktu<
zS$H?p*%<_FEi1F@k0$%ws`}q+CC+VpG&D4H0h04P#|tkONjQ3*p)US#UKRLoAW!4}
zBizTw$LL{S2i~~oSZ6h!_1di8&gd+SjMwu1vI%V1<hYE<-B#_eqgUhgYOu{N)MPi!
z``K9~+5UA|ra!;J&H#6YO|G$bJkFoo71(75?8pr}@%>V@eH;Y`2LSxSsFzj8|CG@<
zSftkeE_gAPqE8vLqhb`rt3ca7zr2iX;xOibHWou6fP;;#nl0u(^n+EY1Pxk#2T8Ny
zkDWLhe-|d>d)TsgNVe|)7HCFfkgyc|O;8-9j~mH)=Swjr0^C~$W(n;+iJpzE^NOSq
zL^%rE%%4Ecn7taiaN?f8pN#ewKh=1xO+CCAceyi?UOokeOJ)ULoSZ-)6n+svP>Lt^
zu^_3?4Qva?Yjp8N#=B+gGf?x`R%(r)udlEF&Xxnp7-C-go=|LF%aOS^r76n|e=dzh
zL1adme1%AW&X0iWJ$+7|w7?x>+!YG(#}0v~$8;kB9v<hXhbuUO!5<zTxKC|Yo$wGl
z^5>7Dey}2wkTaW=E;8UJX^{s6LD#COQ&#zt*7g@d+Eqpmhjrs>sc*J-aPMK!WluY3
z;6oa_L$ePAc}y!m`C5%V-~=L>x7)^#t5J^uo0xfSutSjJvSv?D&myF~+Vr%utuJZ^
z8;ipTsh`u*{PcxxjhD%!s`K~_nvlATmw?|whnA<#H5gN#!%*^p;)tuHk7U^jW>`1$
zL=~$KbU3~~_5Jp`1(wzquU>T&#R-0CJjb_r?bgj4#zx{0fE$-5Xu64WAvg;YTRpz6
zppoB$6GfpR?$34ShPZjWF)g#*+2_Z0m8V~|9D}YX9OY=MCi6AtS{gwz**h|a9^%d>
z7S%+7NKrZ=;|*C`1$hl=i3EYp4l8A3AujU2M(Zj+xmmdtw!PJk_62e#_gqsPUZ%(u
z-rlx8i1!TBI=Kk%MY(A+G5jUt{uqk8+uIJ`f%d@Daf5#HyH|Wz8ppMoS2Q#ocYBzZ
zqW)c3MPOi+KQP^PXv5Nw7w&BjJ5}yDOJ{~2HOv|z^69C_$WpIU;X+Tpw0pe9haMbB
zsXKhc%60uF{(J-C{%zdB%2i}-K3?;RJP2y*L693dVwoj(XqxT45bgT7fSqI%WNCde
zB9cPo^_awN(zhX7T@K}~*-*O5tgW(nguu2fn3vscwsV?V^K)9cLoq=}$*bmVzRGH?
zd)flnPVIa7j0JXQ15WQg;d1gYx9r@r>(u+!jOvt<KyTesy0H<v3*`QGrfySnF@6=7
z_t<TK>v3o2rd~ICY9Jn)mZ%Lc@Tshzu5lpSYNR(7H1Qt#)?WN5Hw15NyH4@JhK`k8
ze}XKMwOVF@k<U~He0PtSvnW>5iLo<~1?r8&8m60<Gs@E~E2uwR6fTHO|Dn=~TY~AO
zRJKeDX&RAJEgOQUN{&!LnT*39)zyJjH?xb<S(G8+@BTJop(Y$bc{w>~rJ;z$(2vEy
zMp*J4YHejI>YJiVOC3MIr$D1ys5;le&iU1`f4@tx6}5oZ+0M$XPT(W#ky;9n+wUfN
zT{8^7KDu3RzgpSR0k=ABFuLt<HB1)@x9o6<+TsCBtRYI^Mv`Usap}G;YW;?nYWh4h
zlsu_dJI3u;#Mm5PEjT5toxv>voTW|3<#P4Kj!`zgiUr&_75YNJJ!Tl_ptjEPi}V;#
zQ)N9IN(mlyPKA#cJHIUd#5V)$gBq8#S8Er6)<?R!JJmidV0j!hKtxBAQ)d6T%w*KN
za&wM15Yabs1}}MTVbV{V64lext8qOR7zH<+v5DzyTT3@_f{Ti+V(%sv)!TU5j@vGV
zixO?HHdX7iaVuRlkHYHRu_5$8v4j3h-il;7dEl(4ylqpLqcMKLM<;b4VojZ#fKKW<
zU0M`+83q^`xZ?LG=X=wE59zB97hpauvouAL%!PDAH&}<$GH?hX_YoO&b91_N^CM>&
zskke^e&dIm^t(HI(>=Kiw_}|^2D&=Sqx0Q7u(wO-8bg^iHm(y5fA?A{5C?Y^Q1qkW
zFvkwY`PD*hGEF32dH+1>OuWW@yI>Xz+t6)q=v2b>&F_iQq($Fi;~BE4<NQTuZtgmJ
zxYo&^Y=4Su*~PF9f992tIO5d>Px96@JFk|)Ug*j)3jf@Znaky+=M~~}?tXQC{tF06
z6IJ6jh&O0)+3Xh`M_Oy8sodLNCi|q|who8a4+BVND5<CnTW(8|%CgC+sQ9W59~M@g
zhaGP@8&WTe`rc51cj4KWGn(pr>7z$}SHV>xc=`qxf4?&B+;-EHo!&%FMfOFR%%8l`
zopDUS%|axcD(?`#&CLlrejOc_vzWZf8?Rg%;Bw-DCM@1J!I$E5VS7^it@?h5Jw@7J
ziE_!Qa(YF3$!FS=X1o=%%!8B*>@Zl?j|p>n_y)ncK*@q>kA2@zWWSoaX<_0qJp$Ka
zlOa23OWsk;M@9us&YE}_#Q^KO@`%ScjU?o8+czU-=l2iRtS_d^`-01sKBA4k{Um)c
zm??hXvZL|<B4`2mtR311FRMxAw~}LDai4i-nA$>o=3lJ&-JcE=sigkNW~cF2yL2Ud
z1&9YyO^Cet+iE{=!s<G1hsAG(jh|MBX@rl4jNhiKJ}ZC=nxs|f%FMOji)Vd?b##=(
zAtH>I9S=7;tL=pP{hwjR{#R2;QK)|#j(*39quoQrr`w1do+kn=xPO-+kMqP08u2H_
zGx5*k?nBaOW0`}D5I>hk$go<g&15H{u~whtTc2_YofM|ye40uo6!U_;yj%Wau%3S;
zmIc8qTb<gWzMf$9{8`>paoG*y7A$%GA$RnB6ZPE2G$s7HAubP=5AiK|r!zp`NECc;
zTJiN#pw_U`{I0TVzm61$^Yho9<m3%PBoU;0ZB}&rnbaTseQN_X-7OV>c;d0mz87-6
zv!XIS^KvVET*g>7#EdhLN2mm3wUIa5PxGi|F>+?htsYG)K4sxQ_m9IUU3c;2DNj3}
z;kpOxW<TBUAk?q&({W0iBlQdiT@ZlIZ`j+{rXs?+uYEl5=n}ibY<`;=e(LM1%J+>V
z;3?w?6%B%HwnHO*2X8-c3aGoR?pcW+8f}V4XgNni9-)_Op_Qq?32Eifs?gtVirmoe
zU_UZ@$L~8uB~P{DQ4Cc-(SRq5u+=~9;HR7At3@z=+`IkicbB9i026a_b4aQ29fCt)
zha$9{KF2LP2>g{c3Y(~F*TcojMHFuk>mLYo^x)l*lZ)Y!)wAT7oE@<~6i$?rlMCPN
zl81`ljkv9qJ|Inj?_JL?e2);Mv0%@yO54fMu((^mp0eV6v8DS$Co6D#sUWy|V<=rs
z-`T^5pL_om0=;e(5Ry>`1YD4-gK{P(U!Ob(Hb7C;k<4@Rp*1x%m6erYG`@`>tK?Vc
zU(s!oE03`vTJZtj@k1<zVe#)Q`5xUL0b2%*Jgfx)_jN^S26E3)P-J9esJ*3ldE*yq
zEtHYRv<nAru0{-ft}=tUpDcc^s_XOn!CrMjdVW*-Ori-Pa4a{gYvh({jCr{tF+Skb
zL9mOkX8Fa=?%B9_TzC%!RMU*4LT^sDUK{=MutLYp4T+pU+#$$!RhGG<Rhh5Jeo~2b
z#OLW!{@^=0wrlRM!Oeq!fsv6~i{a$G>7t?m?RZ6vQ#g@^7f<pHcZ=o83(76UJC205
zT$+sPE_uxFE>E_>nFMlUlarH(*F~&>CLy{6IzAqri#bDJK+oCD94WF&`jp_+18*8V
z1z)^|65p+u|LC*ye!?7dWO84E>v@t8y=dBWOTGW#b*d<|=*w@8d)grM*bQN%*B<vi
zw?1{z^<zZ%ul5U9nm=#uVj8sVwX98){1CSit#8+~`sBQ6RtB|^dPzu##}mrdZtD}A
z+AyX$Q1hSR@&<!(@lyKy>gq3~M@Vpno8;)$w`-W`a$(tI#P|$Sn+=S7z&Kbkr@;@6
z=|a`J!=_n8Mh-pOW)=}49-@jwYWo3)<=B~MWm)?FETKbwD{N<BUUyS%D;=HLP;3g=
zp|G@oj-=Vnx>eTd{XG*t$%c$f?{TQ@U}1bb6F&9>zrn+gu8(;5)eN7I@MPxvnJr<H
zlkpuL9p^v(d+XoB%msLb4^A;6AI(j17Hy^rV`5`Hfk50ba>J+dP|k5DDG9o`wET~G
zO(OJk1wX<?YrcdN;?pMFL@0#FC=_2)Rl%(+HN}80V^&beaf+Z-e+`^k=`TeRU!D?)
zVkRnB1x?s4X*U*)#Sc~kE;v320EBHh@pHqs46^RG1On_{8rGIm6j1``!b5*BB$G0<
zxjlu>!uhUy3Dge}<tP?c)O~%Gas`+W<Nju!Sb3{!xs<0{FX&HVH~+#DuX9WUjxfGq
zH(|$h10y@Vu-xy%^0aj1U-aHh8-r(8oHFWG7fptcLS*tyqX_UL&QG0atohTycgs#!
z%Rn_BL<LF2+HP5pAk~zlbx4#4#(A@UAOIjFY}zOj9oNlC`WJyT*9IgJd@JnpOrP`U
zD76fql~b>w57W_hjX`N_i@=>#YL}CPEdR@S9k36yvr}S#nWib}bb|=MPD~<Fg3~fC
z<AJ{zP<R&F^Wk7tiDp)fi~he^Rp^#boRL)CK5^@2(7oz503IR=0aY1;A1{2tu#77>
zR(0QEI!qkgqyztqc6o7r?hXXfc)X{HWO|k=qoAPFUieg_{*>L4mzNhO{+J$&BW(Ru
z%hpZ=Kq8z+tgk!vTr(?hw{g4Ln5BQ}x0QZ&<-%=4VVvDSk-~plpV+@4<K#oksrD?}
zz|O6ErbM$yHN6o*0kUVS?)^3XfOHkQNFmv=-8=sm9t5nzXi_q3vueJFQAJ}%2acjA
zoeyD@f083euu2^)KJBT4Tp@U!kp?<kpK9@vSNTz-o01k>J^rL>7nL;zI6!0@^ECfa
zamwo4`3IHND@*{Z+^B=-fFtOLAE6Zy6XVicHCAQuSy`@XhLa;i%435WST7r4OtzO5
zJvkjOspzF(J9qa>?}*-Q^R7Y{Azs((VVCn(Rb5?2&uI%D>*YB^wwtgknmx9=^I$X$
zc+}*j$lA==^K#x8YVrTg-Y60-ho`uR$rm${%DeN8#7Gw$@UXc0_Bxn7R>WTtKGMOA
z(P&Q|>{c1LF(@8rvc5y3cN&GSAyxla;g)stXV3T3$v{{T_1!i%JoBCJY>V5DWA;}`
zzRVA3ar)@P>MibwsZl>8Pzk$J`=6W_CWsXv{<{Jd@XZAnA!{7t->qjVTW4)F<($#R
zSs=!f?VW8u_D~nQ*$T!L6SNx3;8pXw(_?<@@-L&ln}4QW9%w{u&{UAqII>c4(C~1(
z_6&CUb_RhO^WrM~5jX=!Xlo5YI8I>HjI*i^-@UeA9CE=`vTU7k8c|!?46xrib}(v(
zb{68taxfq2x>t6I_;PI`DlzsF3c?DSN;L6y#}0+P{cC=Ytrq^@E+O$@)Ag@~AXM^b
z8lR4lcR|?5W~|6Df-N)N(;t*Z$Ht2N8KkGH9p(bH!T73v*M>q72O0R&5yeI<>*oC)
zZ+2$O_0C3k!HX6tv&Z14#}c*o|IuCQN7s|Z*lQTJG3esyDI#pFPEFip)&FX|F)Bwd
z>G=5g;d0T*-Ti#8DBGyc5*r`?!{2kW^706?M6OO{6yYm4UP7dBTow)_{<oz}1ubNd
zsXEnODRH&=<2jo(x68kbG!E5AoT6ew!~c+Mkyys_Z*E16K2^Z<-b;-4Y_G?TV$*6^
z3SMgb6)lPhPlkgw({J&=JjcU+Z^?~h`|m2l)1CA5j}IiMk`jd0qow~mF^UOZi3AcT
z-%&6-S?R=x81(+<ABvDw{R}|C=VxJ+dT)-(IHU64`zm&NNPi|qBF4iD73@#7AN|J#
z`O%rLkddRqH`vjM1|@gXl#06kxwopEU)!X=0-)P3L?KD=Q8DIN{u>1u5EQCn_j>Bh
zmwer=WkQyJOstq7crJqnIKRLRO6W`dH+20Qp{~nh)O4S(B><^^H&1m#2>~dCc0gjY
z3=F}4>y}U&E~^+;7(_N#DupCS5YB|ym|<?}r*-aZKUc3|9KSda);aZAzv0RiY+3mJ
zzNzD)0#U&Zp&yQU=qHw!9~NdiF4Z5m)Tct!-|PixA_5gi2b^OeX^Koqe(;?*|GOOQ
zWw@Zb?NjVhjmP!PXyC;v*gSc2wf3%=rsMeb;LgW)TxcgF({sTljO>e5mN!gf^=8at
z);RFirl`Os+gxKloo<6nN)EXUx|oR}lBhy`vt#^j{sAh06L2;?>^WaMt7UamEPj<b
zKaIHfcvh8lXs(iF2!8xar9y5n7?pzMScdmT1hW_@z(4Iwk%`JR)D})mSu<%}Zq$B@
zAl|cV{buKNMdr+N1kB7wQvOpr?AvjlSVALeIbUhudAN8#QzUjVsAoKXjxgkk+*X8+
z!?+RElZLs$erK>zk-1mr7Z;hn$1RB3Z6DGu6`3O1w!ilvWVoGE$F?yZXU%2ej-MC!
z;gUN)FFagvTSd+);ddx|t+aA^i)a2b_^*UQp9DoK`_|_JBilogC1bt`zd2HjeD-4B
zai(zSAzS%d<j$os$syntMu5I8UY(&kbmLshcG_0ujiQT%{4Ca#rdoozMsA_B-0MIs
z4z=R^LI%Y*WUwQWj+1XxzWQ0f74O>XQgat3#W#DGG_zI0MlK(}K<dd8RpdUc*Oou-
zw~=YX{5|-1&yJ#&ofeszxU=xhS9EmF_N&GYP6lCR1mH+zt`_s$;udTHU8>e27K10k
zDOjR;?fx+yStc^T{HK)75L4=iMt>6DY=<wj3pdcGJ;|xlL42Wu*>Ac}yl$XlGrIjV
zocCBaaDdD=?yiC+^PvlTvl*znI%yT<+Vz~IO-A}A7uPU>L4?>kvN;=xrDW?;5k1ZP
zPm9vlS4^((;uPuGjN8;_PwT1dxIpehkK4Vl#Z*vxai+mtpTOw6uU&`tX&(vZU<k>1
zNC9NR!OGM=cZO*`KBTY6ReMnKyKaLb6T54`<5_kb|I=az5FQrm4~(jq4S+550Bc<@
z<A%8Bb=bIPC<lh(##Z)D?7|MYt+M@_AC%V7#f5!~a38UkeAj6&^OEdHTQ8ljlEt$U
z$NgZu1ihmb$VE`;tGqhp&5OJ`pz!^I-BH<OpC?cB;x8a#D^hEwm95P)(_ENRGZJ=g
z5IV;TVJs|w1!8su4o~+H9@Av;<`xVe^J#<&46g6G`_0Xfvh~IgVCUqw3VJ#j1}?e&
zSzupM2AGJQEt?&awtA}vfs)(c!(id9t#^5wi08_wYQ+Nph?fQ3_dxgY0s`wRXjjc<
z*4FBC*TKA)@?IC5(gOTwRZBau25Kt={EqjMqkKz#n?qgf0Vg^1PU1D*n-gK4k&f$2
zZsYGfG{tgWmyiXy6l_m)(Pq<----g38q7~HjURVunc*!h7*|HkuBQ_dJL{E<!OX^|
z!MKLET)MuScPst}$Zq2mp_6ftkSa%n2iT^OIn^%`^wYHAkX%psw^sT`FhimyvMqUw
z)5QXRwvovBD-Pi)iLET=K+{S8vRUNAmT`*Y%=-?CS-I>MI3}E$646Ax^|rm71mUr?
z^eG)>?&ks=URPP0G&z^#YlbN+=*+lTSOUp$J~!JbU>WIo+udV*Q#b>4NE{dwux2RF
z^%X4)id^2l3B4osr?V#A#4$sVSx^tVRDVJlG(G+IvC5kpLa~<nKf}*%Trb<M+CI-a
zh*#!WAS>J(UzPHl9me@NK}x|t)Uj}I0&WLjyv%-PNr?r4?|~U<I=M}@vG4twT(K`b
zir<(%9gaWR=e{_Ao@g6jFQ-wg0BilsAf;Mm0rgwh5D|yh)tk88y$q@sh*g;TV4FH0
z@)13kfykxMI)NckX$&C^S%@14<i~{9K}8+MZJ;I0IKQ)Wpk5J1_#m|}9BtLmCB^@s
z6rRQNl=+x0P^Ig-7HmiTI=f{*J+40Thtvc6qye8i3)r9~6f`D6)Ny*?)LF8=5Oa_4
zF>h<{5)h;iOE-C5_@f=yg@ud$*))KcE!mLHdBcUOy@rp_X!`^c5Ah;Fq=6OcawWtP
z3O>dOzjxT;xdU&85zOG}wO1WQ)9MfZCO?*H_9%Ly*~Hxh!^PyK@jN}sc7;=4mn^2x
z^pA+Qn1JKB(Evf;jD4;7&km!Uo@Tn~cg9<0+C6`Z1P9o}JxkKrXu>I@L}G*Y&z=m%
zV5<8g1~VS<9eJG5lBW*bJQ^0S4HM~_N6fkqu44V#X<MU$N?34PQ-?|@aIC<2t@|6A
zHhktu?5<}R+-NKAJB$gwoM438i=z{)<V@MCzaeXSMJ$0N;T+27>EZEkI}7f(-iUh8
z5IyZB5dRY&mw(Kn$Q0bRGc5l5aTm7=?rl2IF<MsHy5AKS$oe!u1DvC>*qbW&>w>}I
zM+YH_mfq}SXSe1tq>8#u(84>87s{U2K}}!!RPRR;;@ShAp4H7AC5E#8-g+xk)w*BW
z7exZ^Y-;v8-QbmDzD(MpR7%)loDb+_$b0qcM{Az$8Nus{euhNHjmQjdSgOe7NE<B8
zZfk~H&058?4N0-pH$gEfJp>)1-(WdpTambzYVNu*6zd<1P?MHELy8G1QcG`f^c>DV
zBH>Axxsbo9fVO@Fh$$v0(iLR~+{QY%7y*|(c<`eL63P%UrxX++><^Uj_0@D1Mxy}0
zBv*GmVWP@ds_(ML>|gyWa`G+<@fCFzQDX}fr4q0?Qe-OP!F)-O8~#lpaR8%$Jdrh>
z_cud)X3<qAEIy{l523%StYB2v%=Xmt-ahKgW>eO0`R(Vb4=O=_a2P;{N`eUUlsrc6
zuhLBw8vtMt({PHQgIZgu1FqM{11{@O-=yB;C#nf=|Iqx44&Rz98hPHVjMLn~9u7`_
z%}P66#rkC%$Za2^iTiYx|A!i~+aGTaKp>F1;CcwcM*!z}c7l*s{#T$?Dk`ew8beIQ
zN8oQsv~duuOy}Wf^@-rsOIE4Yldsdbf}I6<UOEn?8}a5EzfYa!4WsT)z{fYsXL%wg
z4jrZ7yPpEbQy8|$oi;_8o`0hW9uTcjOE&~8k;_BG(V}_B1nEa_5G<-IA%l(qKq)VS
zCIm-Uq%K4<riQq7ch#v2dU=wE>Avhl#Dz2>WEJpUF`ReqagLeW{SQZ4Y`M3jBL{^O
zVrjtUj{k=Y6G+uLq5ul>8-G#3f8gyU3hlWJ{^#Tgsy>P|5p$}le~`}HZdCO%u?(#;
z08t!N(4Y5%?LQ3n(#bWlSp$tWhPPBJ9XaDaAj_aQzw187Lg^tN@qt(Gf7cMu6c6A0
z^9&$T1tUiS2N9|K9}Er8V4>?Qj*z5q|1mL`mdd&QzX+uwGWsiypw8Yw^SlgH!9Mqm
zkRP%C9x=fySks>G9V%)JtO_e~`Gbb=|KhTyU#9EJQ3;Xcg5whUy!Px~<^La~^^!!v
zlO&eJ!kL#sLOJVNUtc$i6|zLc)ST?vmC%@b)06?x;Klu`{hX1>>V{q#%p=(c8f0Ws
zcQk%STNETh6ab1uwK3l%@LcOGLGxX7ut*0l3JS+QGoC+ln+DW$0oxFbrhk8j%{cof
zD&Z<dqd2m5K;JEJ!H}_0%yzh`y3a%XoXGwi3Kh<DZ-X-BldG^zFndFw(&w+YBz>yZ
zNO+R?00|_*I?;HQWmSgyC%hoM(P_!@Pew)lK7H98_00v%{0k}?856Y;P9l##o71=}
z)dcFQoyW>k-SAhfKH$Z(NNdPMD&#yUqHlR3f3}2Wc#LIW)&Uj|#U%2*uzDOY?eK}A
zVnpu`Wf8TwiUYZ1WKvt$WFoZ%G3_ilb7fWd1VPgHx5`pYwKb3+2q*HPNqc>OSi@bm
zdu`)kMdCwti=UJPFLU3+Gl{*EseH&+vL~}Ju<y!=TY9HynBGg|ek~Bf5Asvp7qP71
zBL^pu{o=e0OV)}2=;IWs$f92Xk@IbEFF+47_cUx%(+iIXA9XdJP<2~UgghKZhJGDk
zcuZs#r?DhfU7HzFrEpg=<tnH3z3S4xM3#aKSj3t^oM$HkIHhMHki2z%M0a_YpG;%#
zm3z!-FA`Dnygz*Avyu1ma5Jde%MN=n=m7<faFK;nEu~CL=>-AC@N`X^x?c79*~D4_
zI{L5hReQV%n<z(L#&6;1TPu<rHr9QRol3I2c}-rCg0?&*BnS%LfeVUV1J~Ye*XPka
zncgiN-8Die$3m7t@7qr@acR~8%rdnXrZT!eg%EB=*P8xNbaZ6BA9O@zTGWE64a(2l
z=k$=h;=AX*amGelnpF;n=7q;1!uqn$-27x1Y6qX03$SvO_m{qywj6K-qYTy6P)R5*
z%3A_W>xaH-0rZiIK$WLh;X_06B42vs56#_*PR02hm(JIu;{<yFc%)Pg$N)<{&-HI4
zVvpCGWja;;gTyfeAC*|MAWKQtK)3JJtxNC%R*hR9-`xtn*AWV=bQ&@;=7bz~QFS~I
zTW=DL>TiA*76@1aP|fRo!*%WWB-raD>_NzaKe64g^7L3IL*6=A=c~1pX<g>}4!qO|
z59#03eG8C5DGm_ULFH9(Xew9;MtlCtT1k2R>xYpURwJ`fEfMfnP1(rO=vBWO=io=U
zb`aHZ#>9HzkJrC5UMfGch~w1gtKui-iJUEYaZo9zo^Tp7dtKgV=O*6$%4E6qinsHL
zX<du(k~<QehvKJ%r3vcjU^K^|6bDN#06+XY9=akc<kir3L}FG6YAzD4`(+}U24<nm
zM-61tBkjm$3us<Cz;xy^fg9~t_29ko#huskfkqx3Q6upsY2JXlSm7C`w;Q5Li5<=h
z`UG2dD?MPcN0}Vrk432gUu*aeNfmr(YpOug*63tgi>#ZYJOv73#sczXB@g_PL8(y>
zH<g3QHlb1vf}eU=mUq8&>!s%|z9C(Il$&{F`+aEelP)wSA8Q{o3TieA3m=nDH!}!v
z%X^E2PFKP~KlCOkUIWnYN8jYgu;O+=s2|NN?761OvFW^J`u*!8Hz!H+>JCzP@uanR
z<eP$U!e3G!gI;{s4VQe4_X^_`08(Y?Y?~>RD>yyu0I_tX5E(pwL2u=!$D5LI_xuR@
zwbS>gWzo(k$$#(9fr8ybQkCB}!b4-(xU}$6BRN4t89abzeJm_Dlpv`mHDr4?e(gO&
z9=~$5&pmB1`LR-aC@qYP59O8neq@)zri;sylmlbUBiroPio>Jt-Ri7eIa<Uun%tk-
zUMDqSNTAfxf2ik)uddxTkPV7X(<TkgMGcl~U}TVzst4sjF56U1i>Q$kZWx3PC^yHO
ze{cW7tZ|nE>iX^@|B^BEQCjUHZSBk~a@QnH7aD`adH|p$Wi`mY&ly>T8MUc149qWd
zbY<PI6l>Ly41~&R`nG*5x|YQHWA*UOCC?I5W!{IhJwfMKx<`cExDqh!pe+|%k-U@5
z)%rEfCpBBMuW6jKPmA|vvtR$j!>C9Ryxy1?&#tz)P9m#vu!I(J%eFCk%~>bL$9C12
zFG03KwU<Wl@j_YJHr=fR$X|7dzO@v#kV*X@_Tz6BHQx{0pV|3uq&6QJoq@U}OA$qF
z^R0@X<$lC#upMZW=6tlYe@^#JK~fnD${7Z-k_^8b*7h;|*@Q@tf-*?i@CKgdMsgY^
zU3SILa1l234Ct_RsmH=x=t2g_^i<;8EyUtpbt8Li;X8r%OUrHxvA&0kUM;!die0Zw
z%F{dtEC>@fN2a+DU6ZnIPL^{n=tO}kc0mOW#i)EoO2lz#$0P(_*7zB}S2qje_udBs
z2E?d8I$h4n(qLwhl$;5vI?q<7;yZR}ags*A6>efR5uNS%k<v{U&TqX#&X)D;=!>Z}
z$Ez<MB`7R?CYL$5RVaR(Ho+CB`9ZQZkjM`+gh&;EU-Y@^aHI$M1Y#YJBM39bc4<O!
zk$w8;$isx2-Gmjkt@+seFu(WW9Lr{C4Iz*8Z@g_}BA-F2DiA5=;my`7r^=J9mt+Ek
zSC_N+-u(nf{wh_Zpc*i<I;SV+5~2QfL&iNJ9O6P^PiR!~gx2X|O(GRBS$Y@w^-Ovr
zrjuooqdT{u8oCf0En|@3;mTUTBAvvV6#r#pgsvDvW#NQ@O+2s0n&P9%bDl6+4J8XD
zkCO7w915~zIZ`6?9P;#n35S*pCQ=$>Jy@g}Hs1*P7EK-2Fz7`c@<0$38T(U%0cD7(
zHsu)Be)Tj~aN~^JbH^?Po>)b*V7GFbh;+=g;5n=y_g<Qgi^sd;m3kXD=&n|He#7IQ
zdf@FCu;XmbEY1+&!-WT2MPJo;d6iw1_k&Y*g>-fK3D%IbiawMXa)};98Vh*En7TE}
zdAoR;&U5Z@ykqg{stFg?MXAvrE{qik&OAEObz<r7j}j23*X`O@khGB=7`!4Te)Cy!
zGhdg8bKTh7^y?}X23;Z^Epk#fN1@XDDG{frYkkV-!M><IZh57kC$7(o$Vcbb`)#Gt
zqk~GG={Q6?hQ1Bs^O*r_h-Anb@(<*>*3C7gJdkgG1z*{5n2xwd7^IL{BuxDcNK4{j
z>PQhwyX%(0J;Vn(WUUI`5nu7{9y{-x=n|POS%p3pY$$(gw(VnQ53jK1ddXf(D%;!c
z#BX^;S}m_3NkuQK5I&^M_Pjz56HzCpTNOqr!{MB(Q7VaG5S?Vc_ZHBoVDo2U+Ekyb
zKdW&GD$siBkY>k9F?6d~U?(AVET=fWgi8ZEH#)rYWo8H?$=EkU*~*?(iK6CL_+MNm
z767y_wVYea7tDk>J}i&X8CJhso?{Z3=A?0r7t~M^8cJHPN&Rj2^<wh!YlX+jE>MbP
zVJ2yjW#a|;Bj$^>wH1*6Nl0FnkL!gM_w8Y{&XGXDlh#iQ><T_QmV!d{><)yTgzLBV
z%mJ@5QOAg!RrTwB@Hy7vg0sSieIg#z=XC)u|9VJ~!8;<<#hNH#{@zFtB1dqTjwxPy
zc%Ath>e8OgxMBHnHHQexw9N_q=y+n$g0ERHPr7K<m%3TDo7l40#tJWR{pb?KZwu?0
zM`J`5O|#xftGHdrFk{7II1xl$J)!BBqle=H<ZW5B+8hos+PexXT&?qEj8DTjH8X<~
zhwoNH9=?4hHRrHloruNZnjnL>S@_j1Pk)a%Y4KC3`DG<(5A+->`WCx;ptY}wq0j+3
z6wxt$NZQE`{A^M*d!g#Dl~;xa0{Qm$_ao|P)MjNJa~d?x*v{}xUZ-#`*KPHb+<GjM
zK7Wai&yZHD5y=MS24RRiv+(0S)DBr<iVZrdq8Sh&@El`UT{t-K!gH32syzZ4GYu{!
zE0+{;NyVE#>(?W<C|VOVGp-J7Pe;O3DI<||`mV2BbJTjYhUc(OLg}8g&Rg3p^{Z1z
zL8_ij@NA=#)1>z)x{?D~jWtxw;2D}+wfqVIb0rx$Anbj;NTGy1+!s)prhTz1&_%>X
z5TM?_N~$ClrR&raTX+WLD&?Q$cj(WGk#mC2=;=Z8$lpCV0R(db^MVTfdjN>0D61w@
JDP{8Y{{g;+Qtto&

diff --git a/wikipiki/profiles01.png b/wikipiki/profiles01.png
deleted file mode 100644
index c8ba7b287c39faa40038f6960e874fad5dec23e7..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 33003
zcmW(+1yEhR5<d9F-R<J;?iY7=iaWFvEfjZ(ySuv;ErsIl4uw+eqAgzB9{<}pXEMn|
zH_2x6?Iub?O&%SE1O)&9bVUUjEdYS|{PsgYux}|s%jaBg0kVsNp*sMe;{Nx;0NJ@j
z0Dz+IAT6z-VejnW>~8Pu0#=lk2D`X9+d6!(0f5hIdD?b5+D8Opx4-{MDMtpSDm!c8
zgTPu+F+q4q^vqPqSW1ypML+R1`><tY;YmjeBjMuXgJSVDS<#|VR*|4o#qpsfk<sIi
z+rB05m%DEFr(RlD#1Cq(@|tImdO>LE3Ot&8L1<M{6xds#BZI@+P<BW#3atx(1!}gY
za(||Q0qz1sMOmnOk-Faow15f%dR23JImy1fVjfFn8N&pH!Ss402`Ynv@BoNUyi_>=
zk%I}!%cR!^3gH3s2`kH8K!Xi1X9(P10D|)FvV38Hcd1nPFoj6~7}q9J2Cx?aYG?GK
zWdQ?D0MAx=PzYFM12`4+Z54pVcA$3}3$+OVp#hwlk>N}Lyf0urN<;G*2+IQS<Sz9^
zFIeia4w&CKmDMELK`SI1{0_wCilnd4PQf^>NXUZ6ZvktO4Po#1&LZXx=EdB)ngoEt
zB>cD0UOj)F#;Bj3=8tc~Fk?IJL42jQwA_8!o2hYu0Km3Kz}yQfM>9!~2x5@aOEKLk
zyuB%E;iuae+a^p%D^Pf}rhnz~A8%xf5<7nW+=D__l?J8WS&ZxZzu5Jg_3A%=xDOD0
zy1m}&-k}ZVHVKx8zuW4c{HIbzHj|7TX8CJBLH?;7_4SE-fqGEUvcrHGZ&wq?HC`q=
z_KLfVI!Y>;X^3wA)p}=>^$|{dlMiTg6o>ImVyiT<g1b>>z%uaY-MIyT%TDLMMMe-@
zkbUU(jMwX##It-M9S~%znCuDwrZTkbI^)d}BOm~fDGX+AlqCJvN5tBTNY;n&s}J?b
zoIgy8cCcRxOA5t0h|JBLsWwE4F=DEboY|aX5kk(}t7#vR;)226ulo%{%mwqo0+ip!
z*cFTnFF6XrwV+yygt3e^pos?&W`*BT^(nyP#L$ArBJnh-m6P}sxU`~mz`6?Lmtt<P
zLSKyKz9)%{0^A`_5nb|JsliQ}VvA_4(jAooBw=#JsI%4{T-gZ(g*mfsEhJ*G{6z<|
zHTIZm3F6WtoV|xcNIZidIN65>q`nHWBBxkQe5I~Ms~IL~)T@Q-jJmd(`RWCa6D-?{
z%n$D+1-77&R4`C6P+L`~1e4M7Vy__!Aj5@e_A^kYR4TX7f5*NbB(mh@`eLBKO0$fU
zfXjj98!0^~K#LP4&CSq}2&?$DRA(M%UT*%Q7R?cBRSvHL2~En_n)Ul8B%xGRFw1B-
zG!Hre<$;nysV?84<XJ*oOYgLI7`4V7m5BGS_IURYZ8EtfbxX3fHY$sBu=x^<r0R;=
zv>G(ORO0e}$`+amB~Vl@t1C`hAh9R3zjbIh^!Sdwkw&4GF{?j6aU_43aR~R%3k^L2
zKXfG0j*&Qr2#Ls!*o&wkQ>C1EA%=KFhf{#-Pv$`uW|p(A0dpI(AAZs}N}5s{eHtk<
zhfY;>dG+sVRNX7x37v#0Q*HlxIb9y@-74h8^cvmjJdHovq}p~>B9&jN?JAvhBuWDe
zpQ8{B2UG^srAsvnznblK4TDjwh?_sNQoTp7iTD)EH%R|=>ZhM4b7$r=d1s7Rbybm&
zG>;OGezVq9s;valZl>#9u7?`(0b@nRRY3G_yfda9Cem_Vl@2Z&<M-9+8R-T!3N@NF
z@_&Bt*Pm46mH&|KG<*!kkQ`BBFlLaqOPEH;JJ9~Ay-|TuL7*xod|l68{l1K}s8hzP
z=VQfbW`4J6P`-+D#c%H)2M=Wa9M3w>P7f8=@@NK#&1kfU>uA$NqC<SH&Z6WTBkLEM
z(k25C=`xEni;V5Cq>ee!k|nt~Im}pxVdGueU8iBE;Szd8dMbKl)nnDuY%SG}a;9<-
z6%mz@smZD0spTxb95JpH?t`3zoRyr-c5|c8Myzd>ZQpDZo1jMJhNo>^AH$7=49g63
zjZB*5>hkL7mOJY@E3hj%)Kb)H@|W!f8ZX+$+N#=#8~0Wb*X!Gy+Wal-ED7z}hw2AT
zQ+}lQfA^1j7DGb+@)M(m+=x8Dy~PbrSWozO_H^#4g#XaL^dk;CgBh%uRi528+zF;Z
zhdk|^1$jF{yAJoztH_ur<&X*X3~}}x(&3HKA5bNaYgdzPpZV*&oaUVVlgjmmQ~pzj
z(=WdYCV2~(@(p?1X9q^5w>0<WBv1>|INxv92B=G`2ivtC&~R9BB<a_!G`5#{Ro_~i
z5sKf4yA|w;?}`fi=KgJHHYw2CKH5H^KH!{h7QQJRNb_p_>hn4WR0Pq%*ug~wO9sD#
zeZ2GWqw0y55MH;rY5I908C%#Pi7%NDQWvt<S4U+(`ZuwT>h>UWI%(PgBU~fkaCsKV
zV&5WWAOMXa{7blgghaecqyfnsR|cQg+%IYOO_>LobeZ2dc3kR04Qxt$%;MGTj-qP<
z-+8}F471xBPA(bb87O{GCKF<3uIK;wp?mY`<m$^#-VW-nFJUIfsELbr(RBa6@Ct$|
zb{tmWbcjl%nqca=Bo=ceK`h-Rt`}WAig!PGza2Hl9RFP8s<bgPh1#V8v#L+>-=r=+
zZ`vWAGS<D0FovqcE){f@jU3^8f^1K)6StV~53bPUq(oP#YAV%~HoIfHeOu3oTAT2u
zm!Xd_?Hm+oNMrAt6KfF+*-+Y~$`5sn7+08)n(S=!ZF{Do#)Z;r@>!-%CY#6C69sb5
z3SLie`f;|C+sY!8_1VY`_J7nm3N?wkdatAG;v=v`=pojMev58nc3M)eInmFk5BNdv
zqxwGBv~N75uNCI~A5>kGy>S0OzgA96)D1WcH(M<pBJxPZ@uQ;a@zx15@B>#Fe|_E~
z{o*{{ll3dLrK)DI!+OSc-u7t!H(UNYjP&Y^{S1tc=s(w5&^Ps3POfic*Euq#7}q;P
z+oU^6dPKi<*;I^8Pl-tAl<NG`dC=iMo!@A+Sh@Q+cS`Epb;J92Y5iT-?X&n;_qr~O
zuIiHQlFg&yWAm*<eN^?)UHYSwNu8RL>&Xb*Jlr!94My8a$Kn$CyqJzw!ZOPrd5jUt
z?w7nXFE(_3bltez;T;+m8E@#(E%N3q1-kH>XRL4SHqrv6C%GLthoe;XWwu<7cJ|{t
z%Xi<^C&lNMkAM3-$*)sl=JJXfdMjP&j5(|wg)F4lUCzYjrRDhtu;2eOUoUR+J+PYI
zbi{N%`;O(YJumwjb0E?sGHrbM&Ev9ZeGgavn|^kKu$j}b$Fb;3%7XexXKrV9eTVV;
zj#Hl>t-iLmN2K`z(;NSOcwZ2_E-&Q^iEaG2@^QW$y1m{c*a&cAc%Gi<{OQGTTGyrC
zW%dtpBKcE#<I9r7yO&?9XTJg+d%X&;=6=cFB8G>~yd+&GU`it-WF<^Qphx`47Zeu~
z+L3U3K6<K<p0S>x&nJ8-ewnBzB;W|RTl%vyJ(oFGlyRAn(&OY;_I%v?hqz&VxPO?U
zd+ak0m+3#f$CEy<UtZ*AC7YP)P(N@W<E#Ds*K6(BipLb<l$2L^xXi03D;~D>H+>Uq
zrJ$t>06ug85EKdk_pfi^5deJR1b}0601(au07B<vvmrSE@FY-_k<|IT_SfIn9DnHg
zRjAoF1%Q!;)L}xgBP;I;3vbp7P(X3fWz4eGx<>ftFtQr&@v9=K&6R7kn7aX|IX!GY
zP0C)vGR&SjU3flxJXoC%PT`QqNUGaYp&kiaTQASE-#Ix*w1f9V18<QxI%qz~6*@q>
z5kGqR(aP8PzWa{*y6oU2G>=l62=qv5e9OhZJ|Lt&F4PX=?ufavv87PA8u>DC$HE10
z4g>@ITTx5iyR7OX<~eh<Li?i7*puE&ISZo&t}lc_YZV_BE8iJx5<<*!{+wDs5o57G
zX3Miu5){8eXZ>CcZV~N1&$~(M1qWSv&FoHp^c}@6F68VfbfVVWY73|JZuPC&pBRrW
zz6r-IS0NUAs7CDa-M2cR-^)fr=m<`W*kqXAp4x3$VfS?Q%geRM4Nu_aj2K3fkB?x_
z@SOcM@}V1dUvG`h>fO|*u9YTzES_$VeXOGiv+yjJXb_haG7&ja5jL^=B4bdJQ|Kk9
zt)I33fY5?SLe^Q=X;COTsVVVXhkM2QZr?s<QzHyEKtl92S3cjw^UU8pfbUk{SNx%=
zbOy^lP!O-htKHvFwYAmk@2cQQya-~x81(F{OW<~H6Kr`N4@SBEhaEJfAIlSf-oI&e
zRe8^uDRd%Z%ddWJh(G1CN~AM9fSe>*X?u<INN3>WmK{`x$ebiPKFCTst}@s(2cf+M
zCeXopdr=_~Ts#1G3R!0U0aZw~nm}S!6fz7p_MR!cIoKB7+nYWiGAa`qpx&n18ueVx
ziH*(Gcz}(?>5cYxEU)PTq;ecES{dd?!b1W2Bk{C}?WncME(6Fti=~KQVZoz7WT>z-
z3L$tvZx8?r0Ym@@6im%S4Kg7``H9OI#_5R04gidpFd-1ENJb)<a5&JRpq4OJza$k9
zOdQr**gDyyW{V>Q@HF8xz*BRg0zYYG0Q0^}ys6ml=;G_l^)h{ZYP_57ddaX4{^i}{
zl?@-z=u-M<K2SW374->t{<Y^w`_;I!_k+^;)4w!?5CAYodJ@kdr0KwxA0{fYU6z0c
zz)wzy=Kug-Bnm&NfacWcd8;)RhyM=q$Pd~i(be>Dt?Q+hqc>lnQs`3S*zMxwFY2_G
zM>mpx-p}$H1B&0RY?mEvM+n;tyrid|Bxe|5K}n>`vhv|UN}ofJ`Vd0q&U@pQ6ob?3
zO)c#Ky(7$EEvZ7xRE$@ZWh+H0mv{Vt^C&|zCYx^YJVZ|qZ@wZsi%$$^*p{26xsl71
z$C*TnWl5com1(Ss4P;*gMTsg3%gA8(nno*dVxwG&QqRE2C)2}fL+F}t6|U)sCoShy
zBMYQ4lOo}85^d=8gGR#86k-p9q<e$Fi?<;}K|u(BcRmd~FfKtHgp374E;-3aCk780
zf^{q8!A7x$n8Tn2!Gi%JNuUZ_b#jzdqvyTSmn6|?C4^hX)qzQ%fA%m@Q@>v6{;Uov
z-q8nu6j-a^meQc8Okn}?aEftRHn>q%*5E5uj2}ydr{algv6^X@nOYR3$@%nnQpq&>
z7!=&2vY*l=`LsgL4I|*D2!im_f~t|8sg#1?ds(3YKw)aeC4lvMRWNSD(eu0EOwsGN
z_d%Z5hKXB$yYbqs%^VduA{xolm%WCLWXrIpN-#Bu>PbCXfiPnaNw~hkO~XNOxf*AJ
zTd8KGl6BX4Bx*01;s6s5gK>sP6!9H3kWyiYm^pU$jmJ9-)NL$XibT&8EETUyEeF6#
z(M`iUN2SuxN-BIz9*_&fDOp6Cl$ji)D1#z*hn194(S>mFREVnc#V}^MWsY5qDtkvV
zNlE_o{u_)%!IM-W!_p(I+1z#U1oaPJ%?fQV2rA7jypxTgoK!iaLb)G|BwlsLQuJq7
z?VG)_p=O(*;w%Y8>&<7dAu&gkle1<LP@H##=NU(&D)jLjWHdm<f`uUim`0+4;3XSr
zL8_;hQOUI2$-9J0pJ}MVm`nI{%qT3h<ohygtd+woE%?9)5eB3hE5l7NUxoF1nX=kd
z^OBels&uN`mghuaVL=cuC-+4CYyr|Dt8-<3utP-ZWpNmvdf>0DGS<+1pLb9=S#UyX
zY3QN%Bon+0UeGtsjR$8;a;>`w-`D4vTjLkYgRrWUm0A`;DUdvf3ab|zHXI9at`O^3
z8J~t_(LoVChc7gPk9IVZ!97<Jo=d}f-di;Q7K?_t^Lus!*cBQ>t_h%*MOfD;bnARz
z^c~D6i6EP=NxifBRUBxigbce_XU--{ylb=$)!5`^LRMOyhAK)%{iI3m?^zBrK;g|l
zNRl7S&r$I<W!}?N`rPlXWg4voLW97oM8+R@L&AW|=~5q?XfEqDFCt4i@;ZTF2vtsS
ztdbXyyz>QOU5FPN6H<mJt<;z#9hZm=&kcNL3<IZ!Vj-lADDA?G@m*r0CS(QUWqc*s
zD3#dPnun9Ygn+1yv>X)+Q72Rv%{YSJCaW~RtTIe<%rv5#W(G$q3&$emt#%BV;M!E0
zCG*`4IWt74ImqS5H+qvA>KWxSEuD98064Xn7V8Z=+JgNYB&E-qfCCG3ozH9pKA)L-
zZv|pF`)c0C&p1^*{0Z!t^<6Vr{gFwlNQDD$9BLGo?1s*b1z}Em+v#P;)Zlu<$Amu&
zYPnqQZ7f=R2k2t2L;8B(>vsj?v7|uTf=YFI)M~u~_9&mQ5x7fOtw7>Q+?5f+c9|T}
zMx1?Q=t<s)7>wc@(Sw7Cbuy6=hBZZ(l-F!pwM9J_*)ox$fm=sZRd-Uy2BqRAy@N)~
z3_aJSv79iNnw+R5Y*l>+`N69+>VM?5{(!xa;c3gh1k20h>m+xjX1JNmD0^4wFdxxs
zGtDSQ(bB@eh++n<(gcq(Mv9tqp72F@XSGt}ivCRGCjBd)pfF#814E>#gdYp<c!-nS
zB_Qus%>m+SN>u@Z`>qr~eWNP*iPAbpR<Naa;DRn3Vj@r&jVNO3adNVK>L9(Y8daj$
z@*1F|syCq<8yP!1@&?Ei(F;bEwZTgfc??8ixEG?14Fl9UYq*7Y=CHPs12+v>%3O#Q
zuIRSA8Hx6ATXZS8N<NQ{P~UwZQC$FdgP=Tu(i%e{*?TV!n?IEE0}S-IcYIe84}Nr5
z6?7b|%eTQm%IIJ|KZqO#?~~WP;{sP`rK&h~Aj51o&oKA+Zin;OPP)Ntolob5xrFV0
z6Q2=O`i3n93XaD*tkHH@)AF~?E_N44rS~__?T8tmHwogb;>v-B6ftq4F-9$|h|n52
zJgR!^46jgU!tP=tsK^AD()9Sw%c*ovTI=kXg)QEpoc8y)*q0N;u{atkW<}C2jZSF0
z*r`N2bm=gssr<+NG$lIidIc1`Rz?7e6S+4C1E4Dt4hhl{O~FC`@=?N?@3t&^v{}z%
zK&h9Wx@_wW$Am+*88S!QCbbU=#==T0?bB7zl^thNP*JGl_i(CJAwgr^!)N0Ke`eKX
zfxuE3B!j3M55DG(gXsZz*NElTAWa3nh_d5S*7Y?l_ApV_F{$yK@nxm`#ta;?2~43x
zYHXX%B)IHUpXei4R2CA;NbQoQ^O%m4rBmh8nxD7#6y9eTuqaF&jQ}1H-?Bz6cubM{
zrn^%KzOi1x*6{M*z)PETmUfKHag5kJ`>sPL*4JX9F>%PDVmi#|rvC2I=>P;*+LrP3
zGl=@zW!AU&w|$_|6UIVzT>zomD@=B5Ql+u-EFj=#V)|&A$@5|Z;^yLcK&&!f?4!<f
zj?N-MJZCWeC(bqpkGAzk`^6^84?ikxc3Yh;sR2>Tyk{<Sy79uTm(Nx2lOEiR{!C<C
zOp|k~&E-1OTZU=oDw#<jO{MJDnzdGBDFl!ShAnkSfq_vVi5~O103*_cgtySr6%4I!
zC{&5pN{G9`7h{c1QYR7zMZ!}TA^D`w!oWjdrR0J~2U)9RiM1CCmzXg*xj{fxUFFva
za7(ueT1faYl1YL!imfF9c#3zPwr-J{>7iLDv^RG6kij8*PWx2p!p4CL7O=L&>m!SL
z`URqjgyV^OZK9SN!YYuFN{9EpGL}d|_onbRt!~p(=Z8U|2J~}GwLta!!-d-+oGmm!
z^BAA_#J@8@TEvn$ONRy)2G9zc7geeK$4xKU?Xl|(^%kGG>j7rd2=U?*t5aynI-(-u
z%Slyv3^LdRm+c3#;B!Xdy+@~q5DCNL;Iha*OKFE^(j#YO<GI9Ak933kw(f)pvv73_
z87x4fErUdQWGLm;Pnh5G=Pd&*nf(|h!>WgT=B1GP$W$7Us?)ij8!dvU-9!_}X0F0Q
zr9ic5#g$kfK#CY9D>8A^mFyCf1XJb+#w12$F8N9&o%uSdik?02lB(qbXXBnG_s-JO
zgS-i8@9!sb>NNbf6P_{5+3cniT%t?5xD(p8s<@$&oCUF^!UD2-u}3L*nrX$$`nY%+
zOO|+L58TL*`^NF2U%bXs+6!wL9s3t((qY9(aq>0jE&fHeZc);6^?KAR;yShXnW(44
zaX&J=e@1q|qb<Fb8RwQ#MJs|D4~)8)QZ+Hi`JH7WBs>|PQutr1KM?vHwAxi)w-}Ye
zQ*%ekDV}B969tJnlyDiy-IlTxWa*@lJ=26?S$f?!3_tBOJjltv`Wz{qC1l>6<M)_e
z<eh%{qwvm5@E}5-XjuH;FNBRhnJ&>>w_(4=$;>c*UN3V5eja&+0b-wrPzgQYhS@mc
zGY5M<Z})%9`gOvYXCrviM3(ncH>^KC(eCN03_IoiKppLbc|xb|hjTwA(qzXAR61l%
z0qD(dJ7<(~(TIU4S)Vs(nRIV4^!Uh|)Ni&n59hl?N<1S|iKCE=O!mGSJ*WJf;WoZI
zK{dS_KqXXp*fTs?e)SyQe0+w^&$k)fW$Y_ady0;HGNGr&#En;G$M%*1#q02rS(@Mc
zgOZi}#K$HK^GJY?jV_-Dv6kk+YJhYWmex?}SsfT7i6hBn0%sNK<P=eexF3!@@A<I-
zdh=knha3=jpOzFHOfLqtH#i7;2^aftqHZz>Emmq&$ffLv^A2~r5RH9p1L7#j=)@;A
z<2hEvcCD7Qy!#|iFlm6mLF9OXPF<|p%lAEwXoT;@ICyOtef9awNjHc8`A<Wjl#VAc
zVK4R;&<T+WiaBIP<@)Xu@GFD#2LCpqpPi47@1@o8<?1Z&kHkNu*orDzghW_cL`--X
zA9yCLHB(@<yYhH*y%ddH6F*G`chUmY<^i7(zF(mHX@6K-1XYF#K6;+ev_nvZm^ig;
zO4->DT3e<5`*(xY;CRdnE4Ou1FtI#bpdsS#%U@m$qE8YF`F{0gT+ZI7orHdm(Plq*
zRRZewcq=zc8|z6gvET>tU};jrKK!+z7c0W<f(h!!j!)GKOWfEK3@!|vyd0QvoOH|}
z9+7n5lar4Y1p%~JMX%p}uH?=JzqTG{XQh~Ro)l5Zk6A!s84oPd2B{9Dqlhoe0w0E&
z8BBO~kw&}#LEl~our*VrPv$uB140!RdWgI&7@wl#-H+W5qvFt+<D&6dt8_cj*)-B6
z?pFLSS)qLPw*Fp0B`XP$0R?n1u0$k@7$jB{k80+9ec-<YPX-4n`s<1YhQeK*j0TNH
zhQ)$FG9fVG;2B)lC{6odv+17Edm5W+SwQASR1OOqNt}ov2+dIjl7R5bQq6fxRHkVK
z?XS5<DV}7nSG|)`>Sv7Z`0!}7IczqQM0`qy-)J82%7ub7Af|(iGT^zzWopMLL?GNF
zn;HwUwuFF<{Pa^52$CT8l=8O7cntLR<<3f7`u#ew&alCoHzx9@8Pm^IZn@B!SWZrs
zmx56-(a^!gLA3mk60JbRMiw_R{#=@})SXk<=Qnq0$Y3Rx+ktCdbeeD3wk_Gykr^u0
z$;dhFJoDbZgz@XSK!w<S%F7TaXoJJY^C!#ZQ9O~`tW2N}(eAMgsAKrCj+<Nz+kZr@
zXkT~fzIF(*Trr`Z?K9=)rGchCqsa1ISg~>%%1bk^`OM%)&g^-To{j^^95ozI<R1oN
zyxF?mX(G|ZA$=qnH*KiPWYka)GGtUoz!OJ5s&Kl&!gbgru~FCUmxsu9|53HKG&_mE
zyQ}K((sPT{fr*;C9i^9@ePH~0BTk!K&jy*KNEu<>bb!6d)G8&*R1juV;=j!#7EQ>E
z6g}dBa(QogZ(&y`L_b2k*B-S@P1nwnh|8Rlmu2S`POkAZh245QP;XoGVZVN;5T#9%
z;huaACiOC3k0$C55z^uRQ7;7#oe7o7mM{A^DK(&J1j2(21Mq@CjF3u7yuLQp$BKc6
zRIfw+$NYCGW7gbRxgHB19b9j**SVtg0t^vJ0ys9`N}rHya&IA-;QqO8?L=D}n3W9N
zP)XQ`lva=Pbk*92$C;iU%k#5}o00Ya&#{^jQ@AV2m)%SxeG`!K7ZU;X-`^kHpF+_%
zFS@==XLjGE=jQ}?9ytXjE#(RA3TUfw{O<ZEvisutn9_cG*5W=jdA9NMahs6i7(2<{
zk4@{j`TfBczvZp`yfS@#hzu;u)(^r6HJ?<Nt?G`3fC>@dug`&9#_wypPh;zWzUwP7
zFy<?31%ZLzf8Q@`s+{Vhq2-u;-;zfq2Bz<hoat}>fZmxt-Naoj)jjRpqke}CelxJX
z9dUS4j_1@afz<(L`ueX=4FHfa<#U{CWq<p<1K0Ky9RSpFcn{<mD4IH-w*S1&?`nNM
zzI8TpTN&6CHUdF=8)-F=Ji-0>fue4IUO&CEi#B^q4W&?$p*1ArT*n@V#(ea3>D4TF
zx{z<qw+kvz{akeREvM(A{b!)qb3BVWR`g;R))Ib9g@obT`WlJva<tD7ea?dvm|p8d
zVjZGv2djglEhkswXT!X{e{}rJEgzE9vdfL^kf2G=cr+YBCYaAXhD_57sgty3dsIL&
z0mI5Oy6RTx!%Kmg)Ci<L!^itcL>e@AWHZk3CIGPz3RLVnVqB&bOmbH0h7bxEkXaSg
zD@$FhW$lTn3K|&fVnT1uYx&7<j(!%~@V&*_mzmkapP4fH?&U{GhS+7X;WU@V_Bjk<
zQDiW}9~6ctM+0>P9y6pF&t^X@Z%C+>X#t$~6+MC$XAA<HJ~OqQfoMSU>B|MQ;AN*)
zEa$o<`@tCXDCY|h#QlqA2wb|Nl^@d|rR!$Q`GmkX1>d&R^IOaj9sr(tI`i|5nPYKZ
z1p}WaH`xn}y8fI=bV4b;o&t1VErX`s7FatJx<_N`ht=&)K4bW@ajJ2#)6w4dZ)ie|
z4RN)@c7K#o{PDbLd*HzMYW6zt*V8(CPiKnVlkI0rv|F(J4_|Cg|4T$NFW0XZxp1OQ
zSo=TDwG!Akas`f#+NZPq9G6fxd*0^dX1<CX#`A~R)i|Z7*DED^2qAmUv=^K4at{q;
zDciUHY5VGyja1{lnbPT-|6KEP%-)`7UB|)jwHNE>qCojAHjaRUazb^#eUS}6cM2qJ
z<nj@!z^6+-iL>h~1_n>vfR<Ok>xZ9W6%t%UsP0Rh?hIo0zx{W=!}hMLJAHrY9;rV9
zGh7p^?%`V8jyTsI-A-+j2N9W1@#F;lyE01<EB*d7x1LYz`lqW;9`>A}hJMQLUt^XP
z;^Yr>`bp?JN+K6pzn6p_ruE=}D)Hxu4Rs2h?HlYbbSWYdMn0PbZN>u7N_Y~f8aznL
z+RkGvqqD!ITJst6LI|GNs!I{Z6az^cCl3~5WCD;r2XQ2FhgucGld}0WdA!%P^{R@k
z%#*6Ylv;|1#d=d7;Vn}I`YY*&JV3ZO-t%f`AV!bDAT-n20ZRYJ7=9g^$E){2Qd83R
z+6wbnC4A)b-H-@EG@0jV6;*}h@*}1^89^{P-vO?~RUClvJ(JO8o#3IH2lgk73%oM1
zlv~{5+T^zd@z&R@rv<ao6I{nvcfAvS7ZZ2PmiIMrosh8j8%&(7Z(;M!t4qg3^eAC2
zRtNDLXyQ%Bo39=Ib5j)*%;7YvP8jDf3-uyDh|E{Y_W~m%Uhe1nUS7yWI&vC3olOM_
z8gkqn-`q>^ZabmEWbK|4=M-;eiT$Ma%2UwH_g$|F{G7VA``b4;6O9)rC(*bQLUHtQ
z=t#iz`kC;?Jm@2XNnFB*nw_0n%DtNX{59-1!@$k!Z+o)W)BO}zaWf(LQ)qDjO+!EB
zkM_L~3kh%7fPniZH4gMY7=VaC!vjy(#lalm;qj~49{b@k*R#k+1MZ;h%p&zEpZjF9
zI)9h`G1=bp8B7AM^OFpTB6Y@}{u^AAvw`!s>VL6RD2{$cw^M%eMgxG@uInQ4FTh{K
zpayj!S3jgn&%mdZ_Q!Zq*Rb4n;ik<cv%vi+r_KbC-@LkC_UkiWTkq)*^F^L*{4WM>
z(1fZ-bJ<fuLbLf8BtVizI$}4QuxRwCY5&TeZTu)Fc;DMFmZ}nUr~F;dY`vE|M7EIA
z*`{dXE*eBh>_h-iber)kGHrNMoCENWC&Fm4vi$6b<-zX>tzlg>M(-heb1`7vjXR#7
zg{l;54hDBG+-?yYULXId@?6TOI)3<!+Vnyn4x6Ea7DDwm=mrz5qY{CVdqK-8Ampdc
z4{`>owbn5fVR$VH*l(~{eX<a1LI{8Y!_H0pZ4}tDPkQ>WDjwO+;<Su#IQtRo#~;~N
zgOm(W!@~&yRKBJ_6u!pN52U8v0K{NfFwpx+wzDmMG=^5tJjH(0O8!m_6y0|HkCh5!
zTiR>JPBz7ePkoiPZZoY(<c?4F>F9dM>Qn7*m4vs=kh-5b(q>lux}yH}x1m7FbKD_A
zt}DF{f`ggCC}dG~$<y7AVFcIDW4{7TTwYwnt;Tm(fZo?%FF836pU_NEwH8*Z<1xMd
zlC712g0j3`|1@a$%u)3Y`u+39%ojRXn+QbQEVzfd!n^#e9hnhYOHeTX{X<#a;g2`X
z=6b{CCyCC7yBp@@1*@aT18m%2Z2sw&r*GWq3Xd=j*D^VpAYi;c=XZlUbCycER@K^?
zHFw%S1tGzjEtR9|3bJs)y|PrgaMc)L!~pffPSPUmEs{GQ`vO8)#Y-8rl?vD|c6DCh
zh#gW5!;Mz?f*YRX?Q|(a{!ox>YKk$f2Egh4H)wWP{{{pP2GLqlg^h$cDon(ns$<$(
zT0$&oto5Ub4iyo;q(X~HI5b8Td`7T=EiQ+iKrwVX#O&<+xZ!sVxd~}kN!g*8pm1p(
zx_v4%F@$jGwe~W8@->f_?AtvGAoarzET|7zeq4|dUhzf~Q31pIFKG&OkX!&UkgB#h
zuf(W;MGYqiF9RDl6SYvDxaJ{P>i=$;yHn`xJUqwL^yHIUAl+zOsNx05{B_1lOU=7D
zU`puf2$h;$=-g22Mxo5U`%6zvUG4W+h2;HrY$K9i!t3OT3sXFR;n($6j!0CL=;gnv
zeBOO7>>4NP{ZqSNuFIqg-LL(&=}F=uo7opq;olQkD@{Ii=5dlx=A8evrBCP@Z_hUx
zwR-UQ<JoWT_xHh0AVq#M%~|4^C_$*Grpt7tXy$pp?e#Weh2Pr*DgR>SD518B)-dml
z<9PAn+h6WhR`}0S<6qvre2wf0{597Unc=u;_k_E^F|e8DEcX5O_F`<T;luT4$s1lD
zDS9bdCH^`8piGpUack_O%GeL4=bT{1v`ek3HZzgdv+qcRJv|FoqBD<ob@H1+Wv|%b
z6lK;}!Eb;r8uwN*(W<id7fN^b`p@Ta>bi~X9=&$nJi><X_nL-K@2b?14}x@Z71c?G
zLW@>d-}c`5{$wCK!k&tlp(VZN^bkfvfgOIn1NJq9Veg-^v{dGknKu;``@~Irgf9@h
zY0tvO;C_<+4Hj4b+AgZUmXIZ83wy56LB@#70dRdD%;&#KZp**>aEjFABaAqt-B-tr
zm!n#tq33ByK8|Coq>5$_r->CcE?Mi$sf+zB<DS6BTqWmJtnJ@w;7R?dU;o$%hD1~0
zAy#{1V__p_kF-U=BZl{h@VD?2-0<+In=jDTv#qwXEdqjlLIQde)D6$@sD97?fBiC@
z{W2C7#c!odEKDsdOp6|P8X9NWSXDd(X&auYK0Zocu6Zfowau`I{ujR|Un6XBK5KI}
z)6iKwJ*N>VaJiId5A=MxU|`mkNFl!3eZZ>`%l7~p6AMhhw%}wG$3^foAX^dN?cST_
zWn7FG&r>eJf8P=>x#)3g5p(+6<^B_)cy)s5s@1_d54{-o%}d62!all^inz|54(}P0
z)qw;aG^i{0E>}n8X5Gwl_3b(G0h^A`RLgxkr!!X?()D-G=V|AP4@94KIp5S@ik?Om
zIKM}M_PW=;1ddD&_57}L5fkqfk)FHlT7fqJeEhNC^c_5>&!s>^E}zk9h_gz*#Kj--
zz8Ss+o5Kd@dzYtHn!UM&08wW@Li(KqvmbuPDQJMpn(A%5NcLUjI>+;diFU(hqjXa5
zk*>ZIIs`|KKz!(wxVp=h+3pyl>kLhh=g5o8e7L|biEAIjg?8uf?fN3>vauDkaB!U7
zw02sNQNn?{-}@RSef@@OjtRO2w!cX;?s+rKC@Z?9s7RZRD`R^@O1t9Gk!;A5vEAah
zQXs^e4*0K?PXt5?*)p(Js)>y;FstevxKRaKZ3aT(Hm688S67URIzDg{m8ys{S5Nn!
zw!cJXnQAi<AzQo9^AvlmrfsjG3DawN&;6-Yj#UxPHb#jr|FDBSvB>|yXNVItg4~p4
z&iQAi`?28S-C+q--K;6Aa#|s<BoCnsL9A8|!T9RoeFHj)z){h=k7Pb`vSRTPdyyfc
z3QI~+a`e8g@W^SmvLxZHaMrYo#6*)izFT&%TG(~9#4{=C3PYZ7-@HW}9XDUk2Qu;l
zZz9YjZf^PZxD;h`pW4=6IzG+q92l>-l8<~cUin0J6i5}edklgXGGT6vFU9<HkcoD%
zJ(0M=W=Rp_ejYaiPndJSeGHJHkcTy1mP?#qU9be3A15(dms-&Dg<uo+VvT3-F=U+Q
zg%0oxQnf=5@ye?jgH)u0$>N6<yz^;s@b^+x=u@h!oA}dIPHO5@>EE32pxtZ!t^d)O
z4!2>B$};_X?W)oPMdCOWE;?~(tS?<z()TDWWYZRu2*g5#ff^$lAnZ%%tWT3)4nnd=
zV+tY(9~DY>Ng_w>A5q=IN;2FgH#{FsnqnHAZzYqx2vV37R4NIGS-B85csK<Um1#a^
zzLA;SAP`6`(Ny_BC()H6pk9#5@0R$Jq}9%w&kK`wJ*a7mk&+rsg`aF1WwZ$0=Ig%I
zch3_q#~y)$XUmCYw)LJ$m_3{d+^G9*%z(xc{^D?IINe&b!fjsVHH!@_n=yf_B)wJ4
z_bY97ibq)jzwi6L<VZZ9VYs82x-X5Ij@;<s#2qAk4E<tyZnK5gXg*>gBRSfy;9*BU
z7#v$=L$p(gT=EzDj5&7B?Q2nbaFPUnWb~9^uYyXUB5m*)^Opq8Oi#aw7;)P$Sk8M<
z97ZH8+gz|^&ZqCJH*vJI&-PQlupI=*;2GgBP=I81(F7e{n>Q;#c{0o{?fbWjHgj67
zs!x^9xN;ezEVFxo(u=jvfXnCQC?Vmvso@d8CYlk$A8(I%oB%5<j58<^=ImIxKD1Fc
zwzB0$=_o=cGUZJ%H5Y_0M$t+BNtX#CJEAMZS%jwurC`DoqL$hQ#_nkV3EF5$FqU`p
z$J7!rMeamzj6G+p%8IS9k#2i9)&*k#Cx|B2yt6k@WyD~dQ_qZjG2V=}BcfGhKW9XT
zHI(VzB5aRNB%sUbon#Kbbj9zK^d9i2lD%+N_=0e_HR)y&8g|)L?oBqbQ1{?Yo!867
zQ6Mwbj!bCKJkccDn9jI<;V4}OnK~A>Q2Z`39xa&;`@putl*TvL52j!4$n<lmev6oZ
zm6UCEbC|7c(p%v3$&%2sN;YjJ45o9vc*95~Y9p;#TaQxqQ3ZjmW<>k@a6cvPGD4xs
zMZ@mD1Er!7acF!Wgx$+NF_1Vo0a{9&7s+p}D%1VPUhX~bx78f|(eeHJ_bH0%;hxG=
z5iRT$(yiPYXx5V{@xk)2a#~A;7{>?;Y_q8eP_S&8gjD&El><SN`x0m}(UL&H_PJkw
zJCb-7`(-h$t*#gV)E_3W5<%j$Qh}}E8duvg^Gp;P;rS)G+LuA473qO&|HM=cE7m1>
zhdX2AZ~}heDx^!(H6feCYuXhjM!}R>(n;mxtsVbCQejg5be?g~4i0E>Sdh=*M_A^Y
z-HCNu(Lpu?%4ozG|ByGMtZ7ps;~f@bF_KXkkEjZ&NeLq3)h9~Y_alE4`bTFi(V#{P
zG6}Fvm7z&#7LtjlA)}tTAlv>Ne{lH0pdZgzRdM3A$(7Y)uwpKTn1^_&zNL4xu{YEr
zjz-O7CrEAdl_Z7fKqGOVXLMZw0*Qbv8^UpLz6k9ye1}h!$mDMr5w{r-p>d;nW?l}1
z4xg(~9--j_*@QJWY9WHGEokR6v=&(_y<{jY(WhvAQ!G!eN<An`ZXHWSyGb*aMs&_@
zPM-W~hBBRaBP~yI_}8P`36IMq8JR9uk6reyJf%icY!f>w{!S^mBT;Z^7Vmji(qytF
zpJ|ffH16294^*@(HTIU0Sd#{!@)RhWX=zER5Sr(x)OT^VDlpu6_}pI;g~^fT@`Mw@
zV#BnE8+9T~%OZ~q8PaOC7`@efVehoJq~N0no->JfbA3XH5NHgIu<Y>R?Lv1%nUX;=
z+m%FUpXvcBYpp)8Gopf>nLJ3oFy>I<MAvpbRV{%mDYN%hd{4pATl+y1C+>*|M<kzt
z><gK?U_65;l?Es+POdP?4s8;?@*>KixFy&Dc_4UqC_NKLn1I7`?n~nqPUWXbi(8ES
zL|y6q81C4@(gU?8GL8t6(haCTDSD8E#ffup0c-9PZ*F$JUzUPaQWp_1@o=9;7X&wj
zOxQJmCE%m3qB=!YN9UVG@lq>aUMnz}J}32nPFwL(;YF>ggM+&w0GxWBy30tP0)qh~
z#r-WY>ox?-Cy$nyjH+VuWBSYEAez)6NFnV26QOD3(sz=%5B>eCOTn+%0^al^-?Vx#
z0>w6?9(7hfGD4vThHX}*2D*f~R+d6p3f}{F3?#vDl-4AOwqh;ZS?4-ScK;j7&TeU$
zoK}t-q0T**^}dEo5jwKcOA5P?8Y7QqV!a5o1sh)L{_1zP>gX$&DnvtZ=b9UiIx!sE
zy8EZODdn>QKKVN^8TmTSvjWj{R5>25kJVE+I_;bbca}_1m~=uImQ?91_WTPAA3c+h
zg`mop$q$}rNqorE)CiCD%em<{FbkJ<t~Z&^ujm+$r4J4tX@Y6{q7iLV!C%iriVqec
z>JwFA+{{iD705&CSVP_5K?-k4QwwgV9y!;vJatr2xpHEg(F<)X+{b$elcS`R`7)O(
z^O{l$A@)~>gB03|N?rpuMAPZK6oyaq)HkCv9Fh1S22{1j3@YV)%-F9n7S`+<K2$jk
z)N(wD_jA(SyYI|p&;LE8-;7v+i>~DFzGoM-rs!t7!$fW!?BFn)sYHtrHvwzE&?5U?
zVTnUpzanKuk!_FLQPE;odblZNVKX;G#=h#kK(uT%F}T70NuQE67B3E|M>+r6x#(7v
zd~&qdvnx>*UBf}pMAjUhL(r77P>z{h{zzwqlII)w{NeA`$a4|IV^Nu2!nQi0_+I*F
zVg<OXU+r@%+aeA+ggXrf7FhvAC5ji{W)RA4s;u3`)j+H$mHe?CSr$iTeu}z0$9vU-
zHZEG|@4GSSo6yMS(y!An;T0-^siR6lu}G-Mcef>V1Vy!IM!ZR+`8bX`#%9c!ww5=U
zPg#!YbxB(l6)*!mk?0hc2fjh0+G_M#PN;5ZG>^muA%%R46!yaX8V`Rz4?^j*q25f?
zdc`q>-<Vyuj!Huo$8M)=M(dAlmp;<GJ!+r>H&TkxiWp}G_?UmQrN+etVb7CtowMo1
z)^Ml3Z%}h*&c;UYnO_TELt1V3$5BACcYsUBLCRJ<DkGj30BC4RuoyQy$wn?b7R9-c
zJ&6nojXWjkcP=a5N7~G@ro}5TMn#9ah0DOE-z$ah!mEX3zb~z&$Ey?cX)@your~Pk
z)8G!hrKi{>?5`bKdX^-Oq^nCkzjIExRnaajxiqFWhehW5Ox3RgGnJ$!%t8K3irv9m
zU|%S5@Zp#uSJ5RWD*67O9%?c}q6n%tpMtBdFKHw+W4JQ(=ab<mA%4(ITZ(-b4IK|A
z`~pFba;Jg7RXZ&B^A@lbqv*Jh8C{0tr`Rk-b{+t4@+4_FbJQwtif8m2gNgOOc@`*(
zLGRzHQHXlpsQ5t;<y~zZkxXzX+yr!m(c7$QtI4qg9OIYHlvQi|Kv6xMGLvCVWCN|n
z<oc<;GdSYW-}lYK&fzQa8o|fXBmVhzAn0G-1))`65CvnG91br0Flf_BFN^EvYjoAW
zqUg#jo1LCskQB7Y;~ZhT##G9Nd^wBVP&1xa`!n|%q<jUNQ7k!%I2Z!b8|<qkFad;8
zSf(1d<r5?{zeqv}aIlLLUnH6LI4e{CQoSA}&a+Zihfbpv=0(Q}Q7?`4GoXS(>|3H>
z{4Ewdmf?AMkTR`AN@-jdWyqBlaH2kGEvr_ABo|OhUfCpqscXmYw4cdLIXGK%loY;3
zH_Co*MWAU`Cd)%xVKVBswT@T1H@ZNcWWsur`iuq`bmz#NILQ;l`mMAniz*OT)y6dx
z&0es$BJsrcBz4m@zIZ{bTitZH84i{j+F4mcQ}V@eWg-JR0DI0gR(2>Ay7%>F3^iS0
ztM`iGkN`!ILefPwF`RyolMIDKQbjr2(e`=<dQ-TQIhz5oVa1{uk9Fb}i9@kCC#F$Q
z9+XmjnPBaEkgj7h7v`w+>4T;=8#OC%;W@rbG}pNpb)+|?V_QkeNH&8u36)+x-PyX)
z;`LL_OHW^gxj<`+oQcv?C2K|DY>a&Rvahj%`e;1EIP=*a9p0@*8gat5rdd;^%2|;}
zKOui0$Dm3TNSwi;ZEh!3#(2;}O87Zfv&0#;5O$b}My_9D$tq|mbInFWWcBD$Vn$(Z
zEqL&^d9Bp}SGRqBv!wF0-;n%$;k4zpjLuwI<}SmK&~!D~rS0x{_oyP7;svD|0#2=N
zZ;?*kz8B17Zbr5?Q|Tr#kMMr)HHRdb3l|a#PpPj^<_zq>dpfB^tD!??l+GvHf9{ie
zb7eM~Q&8RD4*^6laVNbLcB~6!6}eKUBS)8-r4*p<fwem_or1P`s_c$gDfjt49aC#D
z6)W|v5X*81N*9uU+;l7s%HF#RiDmn84cOQ_aca4A1paiBkVtnFIVb9FWsWf0qS@S6
zPO^EANxMVl`QqJ2KE!)6&SZ`ZE?X1WUyn9Z1)BzN4ra`<yl#15@1>^Z8KdWi_X!dg
zoeKOxL=M?JWvf>4ffeosEL1H46i_X3C)M502gl!$IRpN3$;lb2I4?T4US$5G{-lp%
z5<wm}7>U*FVZR~1mPNoY<5bS{XQ3w4zE`IZ9H|zWOTy3apzI~96$x3*z_OZeaxH%x
z{+mEovBJAs#A<ffvNXJKN2BeOSzl@ymh|N37NEzk!9>F3LWeG-LBx@Y#ptdk!stQ5
zCWDrv(A-s@VeGfvD;fIwZ#X+ra7T*KACXhqVx9l3^N*@$J#YkXbS?Snj3(rKs9_s#
zFa2?CB!=hviIIVU0TjUCASqe?$9+)F*7p|Y4Y9<VlZg$jrzgS)pM6U(;Ei^ZI%<$n
zaDokD<@)(wT^+D}oTM>{gK*acwvBHDn&3X-OiuZutKcMW_*OtF{$dvkjvG0)PtsE0
zJ$74TqdojgB^%v0BIIX5kX1ar!5hrdXkSQBRz^S!B{1Zf?C<X{9$Q5$9wU@uLHU29
zsYd<Lsif(ywf0sP7IQ>*OcPQ%G+^ppgW%z}yir6WcFDa&zd&UULt({0C`DyZG!h~{
zx=$hXfwnt~Z=vRa30dRt!S8|&@rLxDyKIdOBr8*FHyh$xj;X|dQoH>OP7g(_RMQ6k
z>?#*pKmE~dNZ=UT){Hggb#&ELv%!2Ct=eVJuD%fZrBnax-HWK9OeAK@V`Of2a<)<;
zJHd5?yD~0^J8m9^<mTDwd=`2qM79{$-q<h_utUPD&xOtr>rklJ!_PvGhn~%8p`ke!
zhObncme~lar@~0m0a{i&s*sTDn=5P)#(R#;#z(jwU6?-}`yHFvV|BI@j6@Ir-C`py
z!Pw(%bds308aDK`py(V*o86~TRpQ%%ZK>^jo7oRj>kHTLdpt{I$t3eW?+S>Y_6kz9
z!yVKa_OUC@ICHqDq|Iy&)3=5x6`bww5I{Z1EYxDljb86esUA_Yj)HB^Qj9-BfiYg9
zX>a-{dh2XWV)s8L_iIeg+#B0#m%p!Ss`u0TqLH7|V-rc1Ei<nnW5240N(#?n`Lw<p
za}{l-ipSJcztQp}Bc;$`aCGuT1IH=P-V1)CWxs;Khv-6<(-qm8{q(f^Yn>^!m>LFO
z9_Id5o9;gJf&YpTBp8XjW!BKs-=!f$2x`@~?R$Dl9x5S-V<myRidzGK@%?dnR*F{p
zWjOq#9PZzDXoM&N9APd~-@86cW)pMT#FC_6@JSol9HFxiOL#99+hi-Jvyt$5`zhAr
zmwV|v(4<er1bSERPfyM2f8D@oaTI4Y#0#uL<AAh`9AAI@V%G7O!`g3xg@Op05p$A4
zwh4u^NVRAc*G{A~D%ZxeCeCYa>DIwrwVyw2Jd1Q!1^{OM^hZBlx4AX+?b~`wE1_5t
zz5Sl{%g;Z54RJQv)3Rc$7|nN{6{9(S^b<48Nh;&NLS#sT0aDRP5%x$~j=ePv2c9nI
zsu6!|)~X^?&=A@*d)RhqwCxWq){^e(Cx6}lrNOVlGZk&K$3vgC)GpOrvP0o|lfiIX
zq4)Kx@!5aF)X8hmPN%5Z?92<`ee5`53;Z;;rkSD|st)(oecHLvAslK4Y6Ckfn_oS+
z>m_)b{K;<0!#$?De3ZkyIx=ViC0|?l=8VS_3|M<!{4uSk@JT0fpxibowy85dg~dC;
zhI^XR_SN#gWH{8V%qmpG(tmiz3HfmT7!wu~h9yxB|MFztU#zxJQmRi0vc6p{nP}M;
zdY|+}RG-O-L!i$Vk;L_^$Nh56$MYa3v3YU5xDk7|cI^KCC%e(@dZ$GlFS%aVcWb8<
zQ^xN7R%O$)wov_yT5`TxR_!UeACJfCf1_<;nr{0#Xw1i+Z#iIwc;f0g|7kS!h+g|>
z1v7KM*Az1iYN4n(=-lWnv3<QkCtRm=cGJ#r=#Bk!sYvfxS5_|l^A{fvxP-0Z!)Z40
z9!*U28$GZQf3^KctRu>4Z+#!DXrsZ;RJ{BC%C?8epFV*DhLMziyd9x@MO&YzxRvjG
zxyh6lDHzh`Fc~54@9#uw>FzWeZs~{^)a}n7t9e_yIKP^$JgiR9s&HzISOQia0F;K+
zPn+#EXTv-6Gy9%M0tOv8)DMeB1ek6V+4Rtf;ArHAOj!aR#D9z&-+mPMSE&e&c|5el
z)q|eX3lvboKKA{5`J0lmX?s<!di&&<Z`=q1*t@r$&ir35Rrmh<eJYjpKOo6Kf3L=4
z{UdEWfRw(XRp6BUO`2pc`A$jh<1DZy>@L3EFFR8fypE3x`0*Vd*U0@lUJ`LxU5LhA
zyMv2~h+8+@8xQezi5+;XsExbuF#K8zlkFVS)nnU*-TE*0>rVSwBa%_s4&0wcyE$e-
zTa6y3_m9&CS3YBXb2=SjZ-ViAtQLQJb*-*w>V9X^H(hj-G48ilf(oi0q3G2um4r%f
ztBkLkPoQ<FaRz3a7?9a^o-lj6dKqxcP3aYWeG~a;3#IOne<)$0yge4EsHibM%xX!i
zilO!zAnZv+!;P^w(T=S{gI1iBWBZT)cnGUj=0E9gKE*`V`{p|#Ro_hwk3!|t2a6e&
zR1VWE!$yNX{xV&&=yu6Z{`oGeI7H2UN$9&#9i&7-hNw6$*&d#n$K1$rhT#0Tl~caT
zeA)7~<piAF>u_l&<~CP3G~V~OW(~P6{C!x#E6TGWLwYu@qXbE(L76O1A3e@{y6?Eu
z;A+5$X#vzh_vXl02-ybp`iLM^l<8IT9Lx@*8HF0E8poG?ILhA9LK&(wVc{+psg~C@
zY;q#*h-tF<?g(kC(@^L8R9sblT5P-^BU{iq&5~Zu)f!o<M(`;Fdk#AuvJDoNvL}tR
zC4Ykjg3&KmW7O+Xm8Yq$PGa{Jm1e%;{jaOH42z?Qx<v<v0155{3-0c2Ay^XJ-Q9z`
zTW|^PI=H*Ly9aj(?%d}6?z!ijTfca^o2lxao-J#wy=y0m<!ChaClxQRF>t1><l0ih
z4)}1xX7jK0^r9W+mtqRCtKv=tp~LrOtOq$&N%f{fBFLm4boi$|{JR@A*m`jY{-{$Y
zrHOXk(IoLn8J|&UnIy)GIH`)-OO?lKD5cnA8x1+m4O(i*W|)?QwiJ!C{kV~-p6l#Y
z!5R~02@xrg6oDtnJNu$U=|~_6=+gm#?hQriOHwU0B^#UBcl1K#lKrO0u^+Rup#`@p
z*z8LB^o!A<6?CZ>kW+wqS`0!29#?`|1`RDX<j4YPoZn0#C{6Up6v|$5H}w;>L3@6I
zRQc?r1Abg?Q8BtKyA}3aIz@@s1kc{I^Ii*iI9t&nG~^rt1c9dzTW2JNK;6$Ya!UUF
z->z&F@;}oNBJJhy;xlZD&t|_ltvY{MQT7}Uq!_H9s|_tkZ45t>Lsy#M)4Ms>3*W;q
z4|pT9Vm{cxw0yeHM8tmieC?KCWb*0$76#ku@h|_14m|-q`_!y(3dL}al<g5`N8QdL
z<@)^!&txd6geFs-dvpdk(G(gAikK-Ec|(Be`@hbzOWdpd<)}(iSG35G9r%y<{&lqm
zp#^;oqggpQUeXey4I=*Hh&2-+DzqOIdZ@#aWCXtUW0<70Q?<WpFSua-P#n?9u~RYe
zlzw47$rgfuNBY8VW@+;tMg2BY^zr>xf&C4AlgrQ7mk=c)(Tt9c4o`+HBx?J9OE!y#
zBnJiF?FCBka{4`fYEMP?+d-FNCP*|5&?h#Qpq+jX-ZXO{fVfKnPvtVoHXsidB+Uv0
zaFIXLudg|RlqiK3>}o||Aj|m|fe+Xe+lJqyq*5t~lTkZsW?&jA>zcM&yiE!W6o(>4
z@&8U?6=G+!7ZPv`>F0>(TsD#coapI9g49~@y~v^cnd93k<|piS;u}#`%Wtfw_roRw
z0t>!f%)ecXtU+_($4L3$q1DLy^vI~DUx}N+7ljFahgQ&z1i>kFVdN)|cJHT1@e&aS
z0f9K1emaWgfZh-TQpjMU>HB?mvjK=W%C3mru#>ziEN@g#Sk#v()dKFuf2D9l4e7d5
zijA+$wDxpTGVoLc*+4kThsxuo0iUSd1q%6^X!_A>)$3Sn1pzB^;M#p}Rx*o3%+^p9
zozzqXHwhQzJ69B%X>$30=EinTDr@@#{df_QDgy}055+H`=d*gwyZIuXU@B!#&pZ0^
zeO%8XR095Y__j!8V!n83FYkHl)e~jr^VSF>uZzI*^~__s>%1Bvk7MPU{uG-SR33{n
zO%AGku~iqyhd6*Nz&5YZz$9Ir5r}uZ?61a%lq{E@`jXu5&R(x{UTaOKY(fTaBgEsR
z*zD(}OgSKQi+M=0w&8QroE9wVR2!_dcEKedPd~tZR$0s)_z`Hea`uQec=c>K4SctT
zcw&yw<^`xe@O0R}MQyK3<f1CGSITi)oR#K&eV@gOI$H(b|E||+`3y7Erqn`HlW~2C
zgJgTuhJVbUA(=gha6@G^b(sQtV;_%0=hO+Q+B|m<xNDiFP%0rMHN;F9J3zR!cg1*n
zTDJOdZuPcW^->dXJnN+WrsMTR<;CrA=g&90(Ggs=?Pr)=9euCke(f9URHHOyVOF54
zNHiHdS#U<Ispde8VAM9TI(75h*8O%gulwMnr+aDXoriW^>1CY!Yg<jp^cd}6lVA3g
z;G@wS%tU)yN^I1*QOg5uIS+y_09H$aH@^_xa;duG*Yz4G6)GbwI8`(nZ*|b#dHiT|
zf4V)*d_G3!tnd{6Q-4#GvrsARS+Ml$y!dDg_ll*J4|YNaWV4}I@+D4a`zP9O>Kd_~
zq`#}9Td{q@WHa~KD?f$xl`U*a#n|!cYt&hl%QZ8Smaj5T6IL2jz;A#3D-y2n9Of4^
zmZ)D|@_**LA)GZfEO>aCv0cCIN`7;|<IyqG$i-g$ktD}9E10zZsczyx7t2(r843~e
zC-qW*)3`4CA#vMnYOvX7@8^H=f-jC6?Vh)0M#5fRuc(p)c72#CY=2jW*LaECUn_Pk
z1O-?&UOW~)`iQ18K*4@$seEO>5p2iq>_<NDUP1i!kD|%u`U0nP<N+~0bU>h~0%<Nw
zT^U9xD=w45FVw=^T!;r6D0w^YY&h!*{%pQdFow*zI@#o4@>Eu>I}k+(%zy3wiQjRp
zZejko*ZT!HzVY&}lEKq0)1`z;Fz@fn#$4>eZ2)R?`)&W6=(uTIX3cG_-O~Anz{9vU
z2p>ZCTABo*chZex-Tmm{0`2PiBJiX)8a|zsl1=6DRqT!6k<7r70c9I4pvso!$K8Yq
z2->u#azLy5<gBb5)&8)Tlatftez#nh0Mpmkm!$1>c(PP;>@>gL=6>$6lV6dLwz^w+
zo1C=hxx5(HVdqR@rPI;!_o~%E=Xqpg1D}u7#ObggPG>6{G+BB#WIIE6x6Z=m9A>r+
zXCvKm(Qnk@jn4oBI&kuMYY<$7pG5q-Yl00@WiC|uIX19T|8j0o8fd#Sff`H%j_7jl
zc(y-nIj``%d#O8bzZ-8k_pJ9E@U_umNugt402dcmeWC%FSo5&(aDXIg8&`i^Wnti}
z)_US_btM%fLHph^cIfOlVRKdtUQN25FW=BsfdO7Mno}1Sg0~pP9;EcQDMn$U5Ino!
z^_(crH~+Y&5v?}sR)=f9D^%2fYB=e}1-Jssc>Wqt^)?$-XKQyGo*mC?cOx6LZ@M;P
zNu58P^uOl+9F^ID@OfS%5W!y29Vg%|Y2O;ne0|magU(n~EPJ*d=eUwb;QRJqxiJ6i
z92M74QGcuBbTK;lFnVPWeck+zzI|$yIWyRp53AU$y~Dy(E2)Yrd0mc_G2t6(jIAcA
zvA%M@E=b>)6c!X@Ji2WbYV6&4)mp-M>qJLYR4jEmR3Tfr%>z!l6nI)489Bdrz~+te
zGhdO$l4T8mNcL5_PYY&2Z~7n%>SF?RidnM4HZauMY`n%#=f1T#iJrDEw>>SAm5?*`
z6^BJPc;1iW^INR9xF1DZF{-g8RDwXg(4)O#J3~la>NzB_9e-2`D$&Ngy5lot)L#Y!
zUk=}1FNdC5;sRV5J}a-@-p9!&bGbVH;jprNQ)O#H?!DrJn<A5sGG7p+YbwA+CLc``
zZTB0yg3WY$;sJrUj2<;g`)?L?#?-j0X2|7>P9HU;GF*nQ8$JhC6*9b>y`NPDPVo<L
zXldZz`oMnVviR#$bHY@~1ro(g!R?aHCs;_RD9a?w5&z2O6em-tAlO>>bMwb9C!-!5
z!;99jrg%PJk_2Gb$Of+r>^Z}hrTrR0PZCs8Ycki2{=BWMbS6n!TWMN#F-S%VqBxDG
zti{M(Gfh?U+_WtErF(MfnXzp5hSHY%<g|di`ItM7C?4+AaW+4)K<}APIxs9xeL7W1
zJHHQ0N2gxKM`n_mx7hvDd5Qzi*qC%uL7sj}qUK@FWI@Y$<nJ}<8}H#{W|z^$P8{X4
z*VBtAhv0qrOd%Kw)Od2Ya!v$!(GmBt?OJM*SLnq_eZTnfm-@r+AJUN)-n=t)J40{B
zDz7J6HsDt4t2|L}=aWCQ6~}st3IFV$V0xd`UFQS^UOnVxhd+YCSAVGf{p{kn`8$qh
zp4S426$&K=#g9KafGjwg0?#OGYD?CEIN_U;ib;man!<Ma;!R~TntNQOwdaBoCgxh!
zW8c3*K~_hlzG-VvDW%S@4fn#xGv{S3OiUMu&Z8l6*7KI5hZY*FFVbh{O-Bz?Ygx^Y
zeM4ruk>+iw{Bv`2l}=rwl=1}iB@RwbPCM!f(%6c0gz&&opwmOUjZ)sFy_Ubu+|g)K
zDco|MMUuhL!f+{vXS2&>XnM!|l)4A~k?-5d<K<YSQbmFaGIy21%P&|^{1p-@Dbr9J
zi2)NTv+YRwx|jEivQJ~S>sDpg8VFRcTo!zX{fQxk+9jF~E(^abLzBg=iq2VMr*-kN
z|HimPlnh((K3-SbVkgfR1e&zE&WmA9GBMR0PqJ`(-rk;=5O|pE=6F!jQ4bu+`E0rY
z{`;pb{LN*}<c1vYRHCQzGYCF=enB~->sw~*rRP;!+>&v66z=sYx=H)vazqVm!66(-
zM(hhGqnG2hOb5JGhM)(VV6)w}&|<UgePr1no5MpEM6d1EPQrxt+!!AUw~Ey;)YPy)
znj2KLrgev|yzJ3n6b$ce0QhoBaGt^Y)#d4S4#S0~Y+~p|j_)Rd<Mf0E9*bnQ;ID=F
z1M*~JitjEo3;Y+-@6sh9onk%H-)GV!Qp-3d!7AF`|5y#&*Xq^J7prYI&5cBVm^hzK
z;b)}O*h<?@&&!_Q9WEuLG_=;Ac-~qu;En{#fRWUk|GPx3O1;i-oE19>IV5e@<~Z_t
z#7gZ~Ol$UaWC0s&?%P%0e#?2sQ=%1-$`_0FYxB~#s@sVQdUwCjF_znbS0R6gJ|<QO
z*UuIXm8*mS#Dj-aW(8&piN)K9-h0=`BkmDgg|&*WOZ$nt(($cAN3*Pjj2%Y3+(!8|
zKr?~f9{jV<4kKv}!{1DVGf~MN2lY)p;xgZ+R!^&ueO|Y{^Qpark`WHgq5syAXepDa
zk;up$7a{`lY~@W>?rI=~z@Jt>#T4h7Hg4&~!|}Ymmae1}i~(Cp{Os~6k8h&tL4$s}
zoF18AP^_0YL^$gsn=M(6n6yj&q1$dOvPzH(a-(~X4;_rY{GzQ(;)m^$u~YR;$k+NR
zR<~gva{T9)&By|Gol&^v7W1U058bGepX;t(BHc@z9S^SS+~%K#XUPf^TL0~RYU%Oi
znc4!eB6CC-<8&H`pcS34`h@7=M>3{zDsW8D5nXOa3ko>D!4Y}r>V%${qvNy2OFEq%
zR`~r^X^Lx8+`XL$yV3-^K&lu%D4eU1-=XWIxb@b?a;`t?$;n0E&{)R&>0Tq|{`!HA
zE^i83q$Dn)>I?aGgV<bgYisNJ?e_d*esR(u?#F@i`I<Y<alGb=%k(4uOkM`BDwByQ
zt%SB!KMDBZr#CSH;?pYAW=dMhMqy$fpxFsVKd}jWn-!4~EhICQr0n4eaatFdw;|XM
zWbIB_5vfM8XL8lH!8?8EkayJ<e4g&MV-{^=9NXWj`zBev1E4>T1c%q$!0DNh$Lr|N
zg7T+n&EGNyWu7k;mFU!cW~Xcf5p5=3y_;z~%LOE(UJPoNYrAg?5xnqT$)R<P(teC=
z<;0sNhe&;9=}S+{<53eb$Y}B9e5(}!`%Tu%c9~?p+%-B-knpHwKG4pLH#S{26mO&>
z6A9WsGWihE+LW?)Bzq23%l{l`b-o!AOnxb>icUkY?LV1qse$;LU?wU5blP|&;k40c
zdSF+f+4#Da<n|D$2l^Y?!Eb}}#&L7D)L9CC?fW;f?s?d1YcbKX9cScmT^lRd!Ck`3
z)WLEZQ8@nOaOAQEq22QM^vQ-Vci-}g4j!|9qBVt_#28oYa6(%O9~s(LZgSOE?v|Uq
z{HPaHR(HCVd9GRYXp^bvu~p&s{izOu61n+zP3g9V!1G0(&Z+|ki%?SOdFuh#Y<duK
z@~r^Q`UJAm<WmQHfz^_qi6h)Es}pKLRiH!Niw)!sJ!9MRy3)2b!|v~+XvS#4j|{69
zEj2L^Sx^54-n<s`+c=)jj<n4rAk8Kr7B4r0EBBgM*K`KSl0NR+h>x>;&|s_C%X^C}
zB?f`M;Uhz#A8WFYvCgB1_JXxqqIiyqtXArmOwwSqnjM$wEL2EiiYmlvJO^&cY2Q2)
z8wA=Wc*k^LvS+Btl-uqWx+uL_1uLv>Imcag6sc#q7U7+(+s~_sI#;dMaVzbn9+Kb+
z13Gk&Y@n{+{^rV#wt+y+YZp89_yS(n*9uWyPu&~8T+#?%II3A#wb)%&a!sIv$HUW%
z>IZU~e0(~Epg(41sE9x#6*P23uUSW#%oQsX=1V7Od;II;cfYNbr$q!>=CnB;PRph9
z?2fbaYF_QGQ)YPPA6MCx67LW_c^_+kwmouTRh~LsoW2X<uQ#7QHR&0MUjN6}iENpw
z4w;f%?{U#3H9$BfqmkJ5_&KvjW^F=nKaWW8esFAqU}Z!%+G~IGWu@*@a}s~GSIoNi
zb#e#)K%xB7H7fEE<`%ANsP#aiNM6REnz1`ws+g_y-&NLQ1bD?*MxP8PeSLY^Z|rfG
zj;D1C<9|49#?!cO#?IfAL`h=~7OS=!?Y58dnL6s9Ke>vVV?xKEgesnL6s|P5UArCM
z2%gjOJnCpTr_BjU6YjrU|0{je*%bI>`z&vw1CsY8LN)oy*4gQA-M+cL&A_u~%yn3T
zC>JZ~u2pZjv<Duz`STHE+qGT10$1F<@x1g%-xGCw*L`AQqbd0Oq1Z}`eLu4;Vq(?R
zzn#-^3v}0hPVfG-zyIQRb3%lqc++{8*yg$J@FHq*!-BYSmxrrFiRq8hii?Vm9P>KI
zM-;dU7cJg)v74mR{`C4JndYolpoCI?-pw=0=KtCAI5Qd&WZ85M=aR`+#LI&8awr&l
zggvyu@bb!X{xp^3bRhqB_`<e`uAr)vaqH!MwZE<*xWL=8asS7A-4p{KkDFF;F-ML1
zTXlrvtI@3$TNYgv{VMHZj@|{;jrdr*-)Jc@hF24>r0{JdoOkPM-jY@s`3|kVjaj2m
z&ki$}*D|LO(ydxhs8qpCttovf2S%;c#!K>l5$`@(^V!-!AOfjkDX~ZO>-i}!R@7&2
z1Lc|i{tfT_M(*>W)6%mwx1JwJx0nw!t=z~0F(JuAWN6C}s#0tjlBq@~=CtLqQBEjc
zOnZ+m>(5v2$FHqc`_|D@n2Xt>E9(QF1?^`sA7HGGra9fT9z~9(DJIwGKjJm!{E)z-
zpqMZiAY&x2!KTU)o>k`mNexA(4)FnTRo>al^=pft`loTOt1{N{+EQZGod7<#*SgYz
z%1$eku_7EOvm0apg=h}l5gg0&5q!Ph&h&abZ1;RRF&OuIetss4;@S$M1rO$5*hyly
zw-p~<YZHDtSJiD9Cv|ytQ5oaKY>DD+uGE8!)YSR21pN9dGxg+aWNKu&`R^x1tyXHA
zHiPhaT+S?s9I#G+ck{3?)9WHT7~FEZ%!BxeyEvDs;&B9S#me43{BgLOh1*rs(J4JP
zXpro3R0$<j5P58TczB9)LsL<)*5zFLDY+)AvGIOdnlYW<-I*Z}X6rXP@4Vn?DS%XE
zFIfM4Wr_6&AUO$eEP;wJWKq-9)KpL~$W(Biot?$N#@1+%2v7W=c!c_JSY8_$<dh08
zSY4eGG6}1+xBR0Xold>^JDEzX!z^9ghmu)3QP3D}msRlZKyg}KTp?YcaUm{qpt_TY
znD>L#F_j*GTT_8aKtja0Du>c+AQ}blD;Op9(EjcmOzJzC-oHgzlt}YV(^zP2AAVfb
zMv15jWE=P(j1)iU)*DV%aL!$|3U{p69xnLLhK^9qmIiUD^3-$T%u+fWQedDME?W5N
z_fgMml#~I(<LHu-A*Hbzrgo?N(DrH3^^XIO(QdDFM&onw@UYUh+ci!@iTxbcpRA3X
zIjEOD8sYLvWRQ9eM3aC~&BRk)#b6Ofu*Z`<)mxF@9|U3PW*wK~-Q&depE28Nh4Ht8
zs!F-)26|J~N|X;dk6l15*~Hu+eS|3&aYw>P2A9!2_gYFylm7beaWr%l7S@WiMc2Vr
zSM*&l$rT1%nIf+vwVGu<kIU9@7T#NYZR)l<n&p4j^oEKmZvNGLxEl^lXLN;}m*tn8
z@37DDChRDoOR5nwu&a!f(G6ifWdfTK{ZLLdW`QgGS$uS4ZZNR^rR<N}W3~c>?v7tr
zK2&ydGoG@%z)MPYDNUj?lq&y2_tQGB)%E*j>H^t0TMVlFO@`NuI<1!TLOwHRB}I*h
zAZ2-m6xR(UAj7EVL^v)OCulCo$youijHJ(x>sF;SG|jk$c?+v!rlBe|g}?;$49O2W
zp*_k@U@&<7Pk_^L3%I1{0CtWsO3>5%@O>E&^$d-+7fW~LZm-}ln4#Dwcd(n6BWDqq
zVS)W#$*4(_&~yQu?wLuiUd>1LauW~5B&kF>3!9pV-s-vaKBMxQ^VZgG>26dx=JDoB
ziof(XU`Q~&Cmc#AsX+DsHGzw8OuN%Q7pFv0Q~xCCqR=Ntz|p925PzTQStROj^10!!
zYbKf_xd!cg&!7V=BuJ=XDo&yxJw1wt!9>pvMHJQq{kNnxl^Z_lt_LiLWBb|pmlmZy
zZs6SMush|a4!hUA8t@TpF9;h*A@(}|#?O`D;1*hHbN!z=g*^vtL2?uFA$#0ZEIMU{
z$8CxA9z-r$jQ|LjBy%&YNprk=i&!Poho3ZfkO?;TTU%kZY-wG3s$`K=L-?SURz++3
zT^T->wcgosE+-$W$!6lBe%I~)l^@h~ipnrM@D}VXO81_gykAzM&(6wfqsFzL5<UWJ
z*sQ<zo+13GSWzCZR>hC(>oO`Jfi#AkSMygZksGApW#`y-Pur6eMG`XKNHMVXRpVq>
z6fu$0@j@J>p-pH!y|HC(^W4KxI_QsVdn(Fh?h{#IW*?~g((XEwv{CJ4Y4$#rs;`pd
z1zES1SahO*F#iyLKDvL4m}LqSr~Z_<cr}X`B&YofWRep^u1$io=V=~SJ3|cslh6jW
z)ND3WFqX{R1OA+Z*z9=7Vl*5N95JH40<h|im-*283Oc;#!#kjF!#iZH>2_iVw4Q0a
z0;hzwLN3U{bN)No+VFZge$k8zN#&0$G%Mr+Ebj~=5HrBtc4?^AI%WqgUHzmYnB82q
zCO%_p5MtP+ew(<wygZS)R`QB?H&)<4iS|6PoqWE8$TTf)<&``2x~Y|S@c$kKG6v2k
zEw<O-E88~%ee-oSWZFtq)mq2`5`E}Tpr6#cFlDiEP>_(eH9S*`O&X;<YPFDKp_p?%
z#PpM(!txbTtFB*JvfZI#`U_w!NkXUi^k2hK3|h@6%XPFdUl+lZrr9#v(#T)i-7`uX
z15??xn1l-D(i0i9-2U}p-<>SY2$a$-0&w4SzBI4Xkzq@Bj(9k`7_<ny{I|be_V&8Q
z^y6%zBjC2%W!I~{u@u&Uy}Js9>*N24Tr5>oYgO0Q|Kbf%bY0hfEU|3gT{-<*RcT7E
z*b@Rzj2;7(ES&H&QBQ)m%?hx=7$4%(wDd1##Gv_R{p`g6N`#<SBvPJ}Bxln&W9?m<
zqC{u#sCPha7h|OSA14_E6*Ff~8vwfy;760KmfrP$BD8w{CqnyvqeEzsLSINp(%`3v
z^&P550Tgw%UiJ^Zbz`=}{`f7oQCAcpZwBBn;fUN0nk_2o+VrMG`tXDvMqI`mW}q|o
zm|@S$$_PBK#>B<N0rbCaf*KLP6&c&Er<ZC>R)7hnM39;ALazg;PuUD=VuuXv?CfM^
zBRxfyekdp?Xlh!n;nAx%entQO0Uu3PI%K9sIHAcU{uDag|5(e(U=V)lBMCsWQUqAE
zbar>^cO1y|XIhJencb4xosv~ontG!Az%y?Lon7xLcmL;r0G|_IXE?v@)YGc$SrWUC
z{CHC!+wnP1&eFr+#GV!lu9RzgCN$)yOnCqQ@;+rAB@?HG&Z&*nuk2-Mi)H}&b<;Sn
zF|&DF)szlFOR0U?yDP7x48~i?9cWZa0HC$X^RzydI5QLo)G7IF${g}a?uVe7E;^>2
z*NzRRVRUa*HJ72)Pkq?OUTft^6&jD<VD_Eosq^{qocr85+Xt}dwbG=}HO0cKV`urh
zpHI*Bkpy=`jbhDc_K*+hnC*=63=by%w@<;A5oEqqH+SFd9T%mLBgpvxw?EwBKO8(-
z`a5u6$<Qo<94}ls{JLSbTy%iP2S8Q<Bq=5OT-HyeW`MD}u-|`Y{pjduE>7Ot_@E>#
ze+}>)?HBELa`>l75d=IZ5C4~`_hLTnwLV-}Zr0t4qx`5b*VNqXW`j0ge*W%V@D)3_
zUayPu5or=XLN7M|?d~$!XaEo`k%XjUJQnu;R?U}5uomwVjYjRSCRl?I2?-(UFm6+p
z>9oZf{LcBXn~T@2E^^l0_LzO>ff|A^LG!5RJCpwxVX}S4qpq9CD3PH-KGwOEk!ejH
z7WXHPvv%Bw;mWyOFd~sQVRmHmDSHW{HQ-~hvc%S;?OX4pwvDGpgOGZb&c0~tG;XFM
z!#Wy-lut2bjP~&n7U^8ByEQ6Kte?K$uV&HrUVd_@=#WjpH^8o{HZ6C|WjWC6#W}f>
z9^rtkVW@hnw;4NnIf#H5U9FR}`DHxbP0vjJzDzv#@`!z~>e%S02G+Ri-c~h4OwIG@
zXyj7$MUHkudDL1Z2VS_px><Kol|(HS)K9`!vhM<=Wwr0aQ7(EHzaW#^C6n9pfj;X~
z{Q7M(25E@Fr*v*Zv4=92x^%A`J9;%Jqea)f>)nPjA`SKTQGfEhTSC95_Uhc<&qSR~
z>Dlu*rAn~6jQ;4b`eTl|#GsA~3BX-~S`4Bc+w6yeXvYX$Y;b-belJR_&6OyIa5{<L
zUZDGH^J#E38A6)l{;3Ba3k$AJ$bd#7#K#z31Z8Q>(lD;i((d`+z`z;62z@%~sjD>A
zqewj{i#?9}J;60*lpj-~P>{R3yL+=+F#qA*irS7L{1C(Vg8!dosx3i(6x$Bxqz^Ye
ziKqzd>#AVSFBM<(3+W$UQ=c2karz#aXu7D9sj0Jw(AEXFDiinhi}UHS)9epPAXOd%
zZ0Nys{s@pfqlE^Xeh9}JW(EB=KCq%jll}i0+p_<ku_Yg2bIZphpA87<&)gBXARVh)
z(B`#SZ{>E_TYP?X3iBf5btd4nP6IwPQHq6S5aD->KY2aS0n0dmkPi#1+}FZ`7pX>`
z8crpMA22S7a;zjGda$s%D2E7DlPpmHD=ex+$$e_L_m549l1+qx{++$0nIg`y_3=r0
zKG^}!m+X9;*N+Z-CzgLn5P!h<2qHry{qSrG5{7Rg;8ZVo=UTa@;C-nAY(o$Ng(T{3
zIUc7FLV7*E=U>(W=R(mUQ5cw*(Q_`y@eT)rJBfz|>?7aV=un9)l#eyE$;tfGLpWY+
zROwb_mxh2B06GAI0&O*o^_`))?Y-UL{qk{ul?N$A)=pL0CKF;sv5lDKAlS#%?Bcy2
zFOdrgq0-z$VXYD+3GM&%?Jv_mRf5)JuL%NxKOPfeBer6TQp^GYRUEiRB5HDU69hZ&
z+_NR6DjVVqi1Y)=A_RrACho{73+PFzkm<|XyQFb8+Qe{~)=>zB6`^j?w|1&1VH{_%
zpZlHaS1&<@TtfBpk)6<$6`%iL39Q&OM#60d-VkV(Qc4PKR_WJ7xuW&%ykkxCJ_J%-
z3E!8JR<g|xzLm$k>mhwfWvOHXV%5dIxD@_(YZ5GxIryTyXv#{}!1Ll^y3au>C|3+s
zPBd#%y<aqF!e}`frnS;hV@tWkST{=QefjqHsLG%Q``6Bt<U0j}JCik>zaP%%MsJ<X
zVxY!eQm5Z{Y$N8S41VpHvuS-;=%^U_H5`zGKs(w2%l{qKn{LEN)I`|Y1Ou};&d*9q
zz7NX(NF%$?cOk<ESA=%E`B2f&ilZD;D@tH_L#|PdbaRh9&HL?XBV{-V8K2#LDXhuJ
z2m}J8XnIx;rI_0TNrN4aw;8p9_qN@G;<;EVfPT=rbenuzrvlH0Xt%4A<3wJkhH*+2
zYD@)AMAu6@CyTg(STH6t>1(50e-0odOSFlf7VRsQejH7Pz<=)0?QJ4|D)jYqPwKVS
zAowyJp|1G{H(5=>rlykrN+|~?=4<1FYbXayD91yn-?Nx@_t?ltYlO?ty9})qGfd4b
zbER}5$B6b_0a$iABmGkdxWh1vT827(k*O>MbXd&5_)<*tu&|tE<?B`84+#dpI)z6-
zlKL0IpoLTpTZ36Rk>&$ixotXku`||_sEr6Q$e46Db3iwAuM~2@>BA+u72@TG6|7pD
zg#xV=4w#3BP_dk>EZM!dZ*DhgE!mL3%$*?)(!)WKG#jcAmHJCLKYE6DD$hCdC$`@8
zlqKw}!;+8No>s2s4@y4|f8=_9q2qAw&D7v%F#kvOE_a<f-X6eTNy$sCQ{X^)mu{-_
znV-f#sTA=fMW`w$0izDbSWQEYbrPv`QHm5qdYf1OMMzEpp@+dhmaQDsHP&=_r_L%a
z6BtQJNne3|8N`Hzg%fLlHL2HH!j!4j7s*$k`NXbQ?#zXSMecsfFJ4sr7-kPhY<GTG
zB$&f^%J!KLB?H2kGK3hJdWYj|!?9$=0(AsH8yQbx_N@cpfpc<V!tuW6ipMb_qcWq$
z!IcHzkrn;Ss++I14y9n+qyWlX2?p!}P(lVrL&cP_gJah{M>xR;S_0;an)%XeZ%3uO
zO!{7D^>K9|&jsru5Es)PmX$!gDMyB$G3h1H5b2YQ0n=mnmbzU*-8VJ_PR7k<Fs+&d
zU{XjojVV(dBs=3{6ohb%q=Bc-W)x<VMSVC27rz8c^Eo*mvm|7dS^xDIsO53|$y4ZX
z92%?bsT(twoEm4EjO)V}of7hMlsY9yA^?*@nzbAY=D~HP;e4^lL1pf2Z7$Qh9r#JL
zFSgu;Gv4yZITwz_I!Io#vt?K7<$@sPsQ$DVOFRtz_XxOdsJ?gYfpM$8=r4@jtUhMF
zOBu5qDJ?!)GZc{Ml3s>{@W~gPiBWdwt}WMX;5sE#aLBfqP1855R{wi(s-IDZ!xFev
zWyt8_fbPoq$CbZ<J9D1lHE{x`Q0!T3h@5Y(^XoSB_2n_J-I!ymxK3YC90vmvGylA-
zq@<egH38e=Yts~y6r&#g@$6&On;7N@HP+#zolLBL-T|8PB5T|!V7FA+;w=>KA<(5H
zP;n98#pG;qCI7^6j&a`&SnV_tF&WMgDqKli`s#a}jaDEGZK&Ap8fGCT#E3(7`EC>0
z0Eo3~0XcuI=F7X#Pj!u2^;OwIu067UujSoveUOp>FXq9EJ4A*pW0~V(1zgv516C00
zW+pk=S16R@r_(eVGAYOcTs8e}|3!ZVc^*fYC7`zN1(<VV<s1LENYxUE^j>tuRCw?F
zZ>3!C_BPQ_gl@Yg^!v<u5hm5m$h&$<uOu$bK1bJi<pN3B7`Ohv<$SFRRSRQudpZ4W
zQW<NGQx@4TLR$T-@uK2CqO1|eS+T2h%;<w%=DyGfbmN#<k$;)gEdYeLWy&!MC2`Df
zm>1zjc;ShoFmU41vyi{uCFaz)Z*GZm1oo2O<<Zy2y$*1Vzl%ibqmdP%`6`|1j<8^1
z$@*2SLjF2Iq{j&pK?yTp$`Mjioh9iCp1$m7T*0D)$3B@ScTl~gA1F2CF+BTbA?5av
zrH8-W@jy#T|EVG_$%?r(>{l^K&neDGD!z#lAb0Kl&{o(^h_9lTSb{ggR@U>$V;Mo3
zP1&S+P<Fmur{cK)dnih$o?aD2uEM9<d6+Iab34|iNt^ukJ7D3SwUiu2Na>{*iOP&Q
zi4y6;noQO%*;#dmlWUzWs~Lk-&?+ho8wu+Yu|Q?2%Igc7G_`pdg!nD>I?#to?CTO_
z2tl$O2m?IS9sH&IYK9FM*Jmw*zZ{OMEHyT8uLhEYtfkv`y%MfPF)J9<c+Kr8a=*$v
zMDDt=H^=^qlQc4OJ>hXhRz+fbiY$c@9+8wu3`bjNT6DD>;IQ{>2mCkDE{09+kA8e<
z7OXB>B3yj?uHk<bDoSI)%t0~&--bRbA>T6@b2WIW6x%@It^Nf}lI&btinS(#YrDSM
zLx{u3I3WZ+&CyOuqG4VPBKLztDqAQ;@_oI`OiATM)qwp&D0!;3=lo+>cNid=Wmk5k
z#eI8B#RV*mGMo8Qee?L(A<bd%w{gNLPKP??UH6+Q8p%GW8hs_o;_k0%)Xno+P*^=9
z&fDbsQ9k4b#tG3}4bZ^VKiW@Tk#F`=?kN(k&q~GrV2)s&$`?%8t$YAy^WgU5Nwb$D
zRvq&+fx|;G_ECQn+^7!kfm4`^bUJdVfAZ;ExvA;yC~fSZ`JmM({*qk=?1x0ui3*$1
z>{dyWlMaca^_t3%^3eSPwhh%!cL{oMs)lj>mxAZjzT7YgEP6=57xYu9#)AJ`FEJGq
znU>ROV|ioS-{5xqsV2LMEWHs<8gvSl29_ycG!(*)nlV&mKqgCrE2y?c5rM}}Q&2*o
zE~8o%vB|hyZ`K0Dq?;-_``9Tgde8FKO*gqN>-F0;b6?q1q6u5JZa7ENB?;|*J@l7E
z*IN>~AHEUTsSX4ax%M&;C*cD15o1Sf1=Iw3>b!D%#cyS5tR~}Wvhk!726FsQCtC_~
z+<kMTNO*qH;>Ti1xzY2Nw9bNiMef)P#bu9MC*{0Re65YzH)8XVHKn|2$vH?h&oFi+
z3h?uvS5rx#osU$n3p;Gq)o#S^7}DjAUf4-XRFD(Z=&DytpL^W|)*5}aB*rW>63yyN
zSL(B@{`j@IchH?JZZ_@G2BK^{IdAamoS1F2PddvH-o}@(tRUWy{3&8qH4W>k+%p_1
zsN1~g;W=MI1iBEeEPSMWUEzIO)qW69BIC`lGmi$kA=Eq2rK)>gCbjLBmBfjc_Mis4
zw7*qx3YOiM$sfi@>$u9pKcBf4qWtg@_B|yCFNimaKf;JH&A~8GD{un9l@cixWTD;_
z<G0PYH$}qv;+HI&Thbh{?z(h?sQ{U6#sFQsfE!5rVU3APnbJN0l>e}@`$-@d0|ND*
zUo|?aDtwGB{gf(O`Ig~Vw$UoINb%CZ<B*c{70EQ0>7@-iTziR%nvSL8D}ML(d;N-S
zwjk4Kzu0Y7RyB_~Q;7-^ps=vow2tewab5DWYp-7V2TD!mzsn=9nPiQ`f*rDd{D7~X
zW7jB^rbmH-)IvAqF|pPZdd@bBFTdj0Q0qpWl|>u}u(s?IUyqTP<IHmZ^%=(x`O&Y{
z3b0Ys6Jyx0HOTC_rc}=_>R}PoHJUS++PnaPlkrW)l*w?sII+J~URo|K@UBW^QcIJ1
zy=;#7KGNa^8Pw}BM<69gSzLr6h}Y<1(5crdr<ZU0M-=&CW^*upt}@KC%tq!h#hLMm
z;pXa>@PB1QL=3HNVhQis`oS{Il^QWj^gyO(=hhzhUl=s}JCd5CL-F1o*PbPC8HFC*
zipfV#UP&oIA*gT>S_P|V2I)`8NM)gEKTD*zYF<onN<0EZS_H70Tw=swgJExKV^^tz
zRLW9v^?p*ACc`=s#!OHd`*pc|Sm67=-!M(#Alkqg<5?ip4<gYQD=L+zkg)3ZeaTfv
zoNO?YFnrwI3Z-a6z9}PVm}k@SE3LqoI0#HnmX(%)&8gClgaIj9s?yHftGpLYnC6ul
zD*n_?etXo%Nttn!yM6wN%a9am6~V!l6(mEQRZY=YJt*u1nVzcYI%A8KQzc^n0Rk#J
zI^(?nfXRU4`p|-gLj0xRnwj-7aZHO<U#f#(FKT3u0jRMt{PE+*6b=q^$@qxyQsoab
zgvVSfrs3XMlxCkF8bkL(CFJ5Gou;8Own~b#Hs3P)9Ox(5WSm$G@$0bH>QCnZ;NrQN
z=;5g#qUDydVf}Gx#k(QhxXSyc8Yos!sVnNTMAu};8u;wK%73@&u%PAgbU7BzDB$vK
zLjhoN=;%KFO>XxdUanZZG}i&>J~(wnnd|x;yoC1EZhh}iW`+10!`UqwTAo_<Zr|VZ
zT>P>DM!4ZGAwbQMN~BHGSPcR=RiZ#opS;1ex+<mxh!JGJvcj(QG7_7-Q!!uM6x8YB
zP>+FRP;W|620bX@T~mCUNnte3vjkLWBZj|_k3pBj4Y6^^2LO=-I+>PJ^$_X%HM~>r
zkqQBEP8I2Uj1h+>JBwv0^`3P}p?;xEy4IKN0%m)PH0_>_NHC+b@4Y(rxV&t6dv%#h
zDnBfUqBCc`-XUXrew^Y?1jL?zdhL3~^XaxO_4DAwgy2>P8MtvP>_wansH@vvYG`;d
z?g2lu$}w7Q)U&Ut%<a1qxnF6KeqQg8P7fsVILNNIT3)s7K~Cp&v1aG5G#H2i2(w2(
z*4ccvY;o+)aLkusDrTyYQ)SAf?RLKLVB(o;GT`U_(Mkzztb7HL!*hEl>GirnGsM`$
zX!qcc4Fe6$a*K;i>7nn|)|ND5o8#@t5;70|Oj0O%(753%khVs?oq<tLm)9K*+LfJk
z?g*OYYb~BO*4Udc<S60*wI<M2x4anc{}V*|TZDWM#plOas;nFoR;=freB{ag=YrAl
zlRS8-k0mmY9B&0d76#+rhs5{%Uo@e>u`xDs3fr7+Ox0tzE(rE3m2yt#CN9z|h8rr@
ziZB*3w0Nb5h-4r@js1f!c?W^BbZl|}Omfx^pviVU%&m>ciWo<}qmwx<Fux?bQ?g+o
z7s$aHCrq;v6J{q#=q5-em;3hTpf2*+T##QV8oiHQjR9*-1Q0EyGajFf0|TWAjVqx3
zGmLykCw<<<c>r2T7QD>h3KW6UIMA%1p|0Mf+2j)<@c?_~@K4$!lahWA6BEN`r^JUg
z?86U#^k^TI*XavBmZLr;aRGFC&1W%n$quu9_RA?Fs&letgP!ayN3(-+7RCj_5X7|;
z87#1@Oj6nX_7UQu$^8R=uNXBrZ;o6sAI}red37$K0e(w;e;i$9xC4^{JPQ*flg5<?
zAj;`I<WTnoSy@1R2+gPiCD?E;%vIE{#Q%6Wr~kc}aA(0pI}TsygKXIM{KN8uH?fum
zvx<%Hh`@U91$}%DXwE2Lv!51XBgM!62k7jN0_ZT+y1(5spVB`7O0`kEUx3~YF_!%9
zPV?sZ!1}wEmgoO1z^k2FyQR=udj!8zWDsQ;mhrQgXR_VR#f3yXm>{9~CQbzHu?&Ew
z+g?4w9>{zhom9e<ZUHXz*z^qMCu%+mkCV?-Z_d&`6!IxYWFYXk^(@UGYI78J9Rdit
zleFC=3T#Eqd2SE<V#O5+N0Dv4^_xK$%o>L9dS@rJ)>QtfGplZ_T8jm+o{T@p2Pn!R
z`Of9z69TTELSX`tF{x)%nG!TddbR6c&%<DUWJqbv(x30V=$ea@mSBVh`Jme<wERb!
z&3}+@wVJ!i-3~u+X!t)>e3Xjj7JY6w+-6zkYwuz`8<+zQ+j+lTa`IeBh9aCrv=(Oj
z1^U)HikU1SU!ajPX16d3`~hAGx*sF6dUe&Hno&q*F83Zls4+gxmsX5%A>#P#%8btk
z_DEjk;&XlsC`Sz5pei)?%hk1h`nqv=&ioM-O7r=kKjoG9i#nkI-mI|YnS6)7s3pTq
zdQnMDdomcljsuLY9$+Ss>O;8sCBQat8<I5Z`^?H9wAf%?1Upa|f@hqe+Ge|n)l|1z
zXY{VLQ^Lbn%r5`4!?1q2Tz%)sTWzx^#re>C2HgW&{>kY-U0!a*n4P3bS>mbs|Ilho
zS4Y5hR=Gs{9}H|X)=UxmUMnZX+&EU38|6$PIPj>avTOsta#?rVU145PJp|(T_&wMl
zhNoF|k(`IKwph{8(*HO9%sp+A3-SdWjFONIn<OM8uHW*cbMIj#D=Dk1yKVQcd-|w)
z{+624i)SO`@q?V=-)ovlDs7gQRzi-+Jsuc#rsws3xMnpQ@!K?5*kIX{;c*zHKOXp~
zQ%Sxh{xj3&)axRbB*^~FI*9QXe_P$-*%ohk(=$**Cbr4t8ue$t5eEFH!nhF~1_pRZ
z+U|#$Pq^p^oL5)8*v=9)Y+f!-IZvso2cv8@?j-MWYKUm=RgPQgEG(kF@!u^IS>t>+
z8Tudc&S0h9s=N&Df75q!$7S15f)5$)XHEP29roxCQE@18>v0_^Gj{+}XDIZ$U)Q&@
zGr)OoC`W))R+{+}+l?oCY2==6AW9TU)E_Do>kJeGN`QL<nj3Zc^!oIg#!actu5e7z
z45+qY1S>BgAS<O4V1VNWUBtTWF28>@s7!T&G=#*W8|$3^`JNyPh4y21+pR&8XgX?2
zHcp#OWUd?QibxRG*2rNgTU4e`>dqkqZZ|$q1)wl|pro4`#AVSJg2fNj{Xqn=QV?2+
zdn*GJx1e;351>+^5H@Y7q$j7uNPS~7P3b3vBk=m#b=$@+Xye`+Enb@X>k)<!#@*th
zU><SO|K|D>EmD6S{V&{E>?KqJ^Z^4b<V*GZtPC+lEZsmPQkfbjF30tjM~2;A^SbRd
zptVupUfNv6c=wO@ctY@SP;=P%Xx8j-Iv-od!)_vjUqcq|1km{d2hw?*N;s!{Kw=n>
zf#0VRD5gxagMN47`P19?Uc74Y?Ipd{J3sB0o09~HuIzu}e;Cx9SBLPisAzLuZ*_Ip
z8#NnEg`h_UP&2?QZudu)cAVw$`KAct)GP|y+rx@r@hAlVTu++qzv2N+k0WNCe{!aS
zK9>1HH;BS&u3W@;38_K8LU254fJmb|r%Q2L6g|}9b3FBMj8zFd5FzyYK#0(7J!159
z7UA>*bOI3C{?@$~%)Z_MQ~zVKr3$Qk_h|gZ{cL0R59ONvMj$A&ezgB^2{AlHzpx2*
zf&^2cF>bZQcYM3@D-;d3ijY8AD6CP40uz+cdt`zV1DiZJgQ!5$j4;L{tXKzNAeBW#
zV?IQbeZsKzdhx<dihi<R|Er1Y3(fbAP;Zf9j<UE!V)~!5_<x${Br%oDKrvT$j@=h1
z&?q#BCMOmGv|3w+ZYusCwCxaiUN?~X<GEJ_VvJbvbeY|BGHY9&3j&0Lih_&!9Yl%<
zK_vv=R>E-qKrs#8y26x1+?k&3->}5<yT%?ZGMWG0!dUX<^e<f6mM_LN*Q?D(#zj#X
zF&P;aN!;Llls~UmC>n$k?l3os`J)IvRPQ^72|-I{p%6Q+gPIhIVjnSwH%kbXL<UL2
z@Xx>Wb8w%Qk7W~aEhBl$l9S$sgm#iqMDy!UKt(4n>ex{)t9j`Rkw@?NeW99-MzOd0
zl5QqUbye)e`Ol{<_+Ol8TA<E2-*H6AnmY*9-#F)I`p@Ec*Y1|{w!26hkL}j0aRX(`
z-mF83uZgIen629>`Pv2`5-~sAD2~<{k3?akbU!w5sIl?D;)p(B!_SVY&)zL=zAhJQ
zs2F2Rtmw?>%vII34{M{i_?^u3`=g9XqoD94S5H3(5VWrw2ZX16%*GcCcoBu@2^KrU
z@xz5{8${N+mCSx0o=okijZfoDi(I`d%Zo#!83SUMoWD|CLT0%~^`_(aA!Btw<jAGS
zvi#LZkMS7S4hB9q&;G|*hHT9W*5@UU&o7se=D6G-fLn&PB^+=Ccysrgqq={&k(YT5
z8*azt9dGFnAt?}Q@Dhe3i*}trEr#D8&_GNc*+O_2K1tcy8>BGl%uKJ0e>B8%QAjN|
z603*ajcW<t5oM%(HXN)W7Sf<kgr6{oI19c};^lUOR^|<Qei!Dq0-jiI0>OjIlN?LU
zzH6)+usas8Pm^o>H#Bzuh+wW67>$82pGUL8oS#~zvcY|d^b#_j_lHJB4G@yd+6H~t
z<Vm(=-qi0F9_S132P1-oHmM*aGvGlu?T&dip`wn#zWL0jUAbNCre{baLa&6q$ZEac
zKP8`|z@67W#z_gF6Bii9np>FZ(4Us(8^&71U2?j+iAy~6NnGz@q{yg%acBd!xe($<
z6cHuiv8Q4Xm{AG2+Z8GOiwda{H+y_h4?h}w;TLB<IiH)Rlo+4(Ky&1Q-GOiW*4%#a
z?BHq@CN3=8mB#H5^oeNPjtn;ezLOX?6+YRAkJwvHy3L0|0-W-iAQgw>m)Uqce51R?
z#rd0<`E?spv7~V6w_0_CE*4U^E^fA(M7Vj0h>o#E=S<&8VNvU77qO_ALa(vt#7#al
z(dz|=pq(ta+(116M8L&{y_gsYf#|Hu`<_A{2At3kVv>SG1HLwr#-O-@zcwE5P!ZV5
zP<#>~j<F8S{(37Yge0s2%0XrB30i=~M}vo3BecAq&U)C6^K;9t!*63i^0f&OkQ<fh
zq?;qp=R}1#gtUwj@J;;|5NEr}r}DDHd*sq?i$=u_51oU~XV*E(qHc}Ua}>CJUy-!|
z_l=tKir7K5JJIT&lH^O!FsJANYHmOsVi0l~tBIWO3h8FEwUg7$-q;_;#=m~QHl-+{
zKoXf2kkfkp7vyUPF}SU9W;C9y<I&s)Qm_vPBhVYnHE8ANBvh!d2)~7YMi2`@29x(e
z3oc8bo0a>Fu8Sw%P?i#-qmjyRcmI}8_HTjxj>euN1Wl6HNca$BQk7p+i27X-3;Y8c
zAulj14r<#EcuMdK!jf6XS=%|s`r0BpO>!BumuShhT~1R@Q+A!g#S+X%*co+M#c;ng
ziK^?<tGEe}zHR;P&KPIEL}WN8n506`WePV#M(mJri%9uwdZICa6XN^TxLZ7N!=PM=
znu-Sth}xXe0=D<067A3)qW+vW0<N5LHDLP-0VN49M!;k=;aEU2at@Av9_xkl_3n-?
zzh)v|H=VouO*UHr{LPXsIRwH@_B7*BWwwcurH9Q#Mw@j``An68q?l%t{qAoP(I8~}
zdcX|<RBH0cP*>3uUha1uSKTYb9a=U+1%>#&-^qx{r7tiu@sckfCa>CH8T!F69S=2F
zgcwhIUp7<<Ii)^W+{ozx)&U$`zlrcX<UO2icp4=+Zwt?!NS^2=lrPAKlmq=HUeR?+
zFep1cSnW&G!kbwr2VC8DfyesYn63yhwv$fGn>7(an?6EHIFZqrBmsX~u{<a}oWH&W
zC6muM=1i9QW_v@9Wm~&TF3ww{L}HnQNNM;fP|LZdk;=KoTKIg8;xB%pN{q4GqR<3-
ztUiGM>~pyS6WHeWf1%ePhD#W24fop9vP@p@#VtRMnCemr{uU^bY(M~l{=k0}z`_GT
z9Hz}5-E;}JvD9|8&3o3Edoa0fwL%m$K;R%_WpxT*R<~zsE7_vK2<Q|MILxH7P76d(
z^aB=ski-jp^!VH)-Q0_fTy2dprs=Y-Z4Cbq?j|%<wdU;h=sDW+%n~at=l3YA>mE3O
z?gR*_Q-c1CP<x9*t88siY9DR+F=eCN%e#kDe{z1cf`+8U-=Goe5jc_#?5E_rRx{8w
zkgREH)YBq*O@09Oko@I*7^^e(GM6!N_j$TWWu;pb-SzasLgz_cTYEi8$4g4gYPt5|
zq-LU;-$D$u^H)~nWvqul8wvbIwG%W-U^`n)pjx-(R;u=yY=4%MApPVc^(e`(8G)Js
z*hcHC&;^X}OF~a)21ahso-;`R0cFRLD|WK@&s`p#5LT4mj9QN@Q8rAm9ir2oAv(3c
zA(KztgOM|0ZAkaP6Jjcjnol{_p{+pj?_`f|wc5(@<_&7M`imJUKc58xhLpIR7+6Ht
G@BaaJk#0Ev

diff --git a/wikipiki/profiles02.png b/wikipiki/profiles02.png
deleted file mode 100644
index 71b30769f09353c5778724619d84a575c4260701..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 26989
zcmZs?bx<757cRUw2|<E{06~KVcXxM!y9al777gz11ousFcM0w;ixXTIhrRp$zN)Y8
zAGfQgrnjfNy62pp)6aSOY~*((Y4rDm?*RY+x~z<ZDgXdC0K3>x;bApom3v39+dC&2
z9ajJV4d=fL4v>}e831^%Y%MPS{kxT;o1?3hqZ65|xHy@Ui=&0LojCyDwVJDDsjhbP
zN$`I2R!lx3Fh$-`6%Un6RV+FXH<6l-{2i8D1o^KOJeA&$l9Gr-e+wcI;^G2h@KhK+
zM7>`|*&{EE3n_|-8hzgOEwWwgxIdV9Yg`gKtiH*upF-(D{g5WZuEH7kp+b!0<5tM<
zz|i&{lSt5eN+$poYW)v#*VnIbfQJA90eXralr8|A*Blxuphq#ghviE+6!TatQy(rc
z6t2fDkw+di5Emfg6DL**5Rrll%*~)y0~8<vjK|DOcLCoS0md}IgE>H8?n9<896&FH
z91pG_5kQ7x9w7m+;s;buX+}u`v{?YS7V-nUfMrGii>#J~4B&S&pl1>btqy?t0l=aX
z5%vv$=nF9Z`}M0AAT$$zD|M|Ua7AB>bw~%3RA!w(D<!XFkRB?dGm4fL6AA64EIvIh
zmkGQ{mIzaycP0T_5C`Vg%{Ty1kcbC++nZOfNsQXbNv^mi3?s(lZe%Ehsp;<9{#2Ed
z2mr9{7BKV1z+6ul$d4Ro|5iwKj%a0wR^WagZBd6Q(g-LxTGhI7`cF2JzY<zkR`&Py
zmgNS-^h`#z{NF75jC!<Q?H&UJUhW}VT|1OPYz9Hnh!0zR<F^VWU#61Yg_^D(#7n<4
zqd{MY=O_kbO<T3;aCcR(o#Q03Vs6+<C?ds@z70~%LVxUl8J-b@z?^{JHbQW|iHzk2
zW(arkG+5ehJv;XRz;(N0?>sFkLZDU1_LL{|Likm>fC><3A)Dk302oS8GO3T&3lF0L
z01^d3biYN3ZhJp7^dNufMOyDgdokt;6{8&J6T=dF|0D2=i}APWU@_XC6TgY+jG5;}
zh&g&xtbQgtVKDV+v|tE2VLq9l=JnEc1ieEP{fmlYLcSUSXBwsbH4YU&Gwgx9R|XL~
znv!fJ0#}7XK9N&~RW(YTOhbnFTF?caH(Xz;Es_5(fGzmtXNNRvN>H7O;QWV1@z!!~
z!ceI~wCNvitXc7&3bLnN8VChrxPBc@S6N}M#tVrLv-JG?jKV%($HFw!FZPFr;a#%X
z*dL1O4^=~izcs57+9M%mQ-3@Wv4bRg-f<y%ijkR+h{|XyXe%wtl#_j-<oLMyj{6-#
zs7fCVMRK`(19jWS$AQnLY^>qhG7MiAvEy-=v3w)M2e>J*BgNThS`*-9{}ijwV$Vv=
zI;eg<VyMXGkRkk<JhJ-3who0ig@KIzZ`fY$UjH8Z9?>58wch(&QxWIl2elnq)lnNc
zf_<!gj(ueF3^q}XqAb;o@?Yv7IpcN3YJN4Tf>grGaX8$wcqc+W$;y}16sFD*TH#yW
zTZ8_&wSC-3B~ePB)|wqVlKz+e58>AH1Nu+Akl_eRT7vA)D4#6}JU@dn6iNx^q6vo8
zS-4qGG7d8_GaWUw>6+;L@DfMgr^=;LrxMXIt5;N(R&G|JY20XxsmE6ss`=MSX|Sv9
zR=k@}tJ0{<{eGfGq-I&cUmjj*S?;JVTpXbD8i}mauh6e7UaV5^$7r`>hz!k)px%pt
z+!np+r+X0R0QH}V6+aKU_Ka8J_GrP%ieJ3q>~ic{^{O{17Q!gI8O{$mZc6VCY0J`Y
z0-`o?FTU-3BP!)kXk|6mx2;S|Pt&fFsZyzuKI!DDJuAyC?UZcSc@Dx59hRffr;)ad
zpG3+%R9jKoD0^S_Nl}mwQp;3nTSD}!UBa{5q3k>(ugfqnPr<Ql)4TKV>5D(}tNN?`
zQyE11gEn&g2TJ6%50jq-205J_1&Eo4*RE8=4f;jIOH5Kt(zinsTW17{7NlaOFk`HT
z^mi$D?T74#il~vP$*JWPj}_0eR25rGzm@VU@GA^Yj87C!EM{_M3$iY;9cCY9FJ*(9
zjdi_r8JfzQTFhnZ_H;{i&YL<M!gP6cO0+d}4eF(8a%-p-+iTj(K9;pAB`a0sEn4>f
zzG@n2s%R$oy}yjSR@-FX<ZohWif`FGSlfS|+?nj(<{$eih=Lxzf>A}ROB~?Z;DXDi
z$+wv`nR71eKX{vV#B8ZOg*COzzT1Q|_HDpAS1o%^+7jQg)ivZMB05q&c#J7sh$)+B
zXyb3^o}3%R*<jme7LuD?pWSy>z6LtyI=4O#U(X-s$p4n7!|poW|5toVWq(E(EkBjT
z7F->mEUp}6*?9Ps*^D_+t7hqUbBSl=y~zc>(4CM={;trj0QV-_rjF4#cTe-*<}u}d
z$2_AjusHB5^as=jIs+&Rq=K_Vhzt@9(u03~@bM$>juYlvGry}_ITMX3Xcfg1jSsE~
z-tVm;xB7dUP(yxym@%0+X^j!~J>cKsG>XZANpyd}2b!?(Fs+}$aZVB1gfpz^oSrl5
z;;vwcCy6wP&1_3nWnK`Y94DPnC6kT7Dt8-4oA3~mh0gebcCNOpo%|PGCc0WK2fHrt
z%h^r%PVNrct}lKD^Iroe?_ZOBw_#<UDwwbt_|ilaB9wSiE=95E%0I<WUE_FC#l83L
zBkr@LV4mTciC7lbrz26imZ4MhNjgpJ;Pj>(WG`XZZw;lXNa#>NSJ=qr%lnk&L1xb;
z$k)jll9ZU>ELKUbnA~J}Y<XbeF;;CJR`)jO5Z%m7l8Q27Tc1#kq{H~WNv!mrx-RV!
z9ZH?0xt2xuMC2%MT2&tX#MyZL=vo4I&P6`-47(3|JE^JUr@R&;vGze{wGD5bfV217
z`&~RF`k$J})dDS1O?37P%2j7t>9ql!)IN%~L597f!M%-ewkK#B@At#}Pu7>t43xE*
zb-;}#Pd{^sgzzGxYH`=_)A4}IwCi5`MB$F3-I?nt4HZ=btv{wLW-X2mHW~BuFw!d1
z57IFl&{tL)(7~DwXOKI|HRkjQ+O_tOCh^vyZh@8#^Rki234USqV)a|~Cv~p#*^Ne%
zr3Z(Zb0Xi4JC4(ZHNB4eSD}%vH4Qio#RZE6^Jm%T`g`Hp$jYOKv}b#R8YO$@vtfi;
zgjbZW7)?v9^9#hYg6gXAi}WYb7{jDpZ@CwqjObkG8nHP;J71k7y!Vdo-+}K*(D_z9
zVtlK&QRYZJh%JekZN##!v!t@svYz!!_1cujg=Q9yH+^2D*GMsQI0SUO<!;nRtXGeM
z=aMb2r($wbbNvID9@mZ63Y&Zn%_hM%n2r~1SZ>?1lF;Zw{to_0{p%LD>$<gl9IY0u
zED)cO{juAzz+3X1@^E`jdsc0$zHRHdPiLdA#r+Xc9{1$NZKwCuC+Olr9<Sg==Z%l!
z{op+W{AnY=h30i~tbN6k=Demuxx?sI<V<u$d?S28Snq9p`C=Vt)8koiGqWyzj~o^<
z^_B>U#}r43&x{}YiT?8>k4K1?cSqRe_2{KceCo#(bsqj(;oDd({wL;uhlP`+$(f9q
zU+LHB$=&vTC9lUlCj_9ip}rxKt`RSGR>ND(=d)hVbx-1pA~2@%o*x;I7HakQ2ckAz
z_MA+RoD4-o$hdhiV`p6Z4|bZ#s44;gK2!ieU<d&42!-8YIMkg505~=V0QfQh0DQ+J
zqd_ScRLGE(5LNeDJ<avb!ChFmpQ@=ev;Z%Q8vi8uM1YSq9aK<Gi-Fq9Et<c_3eOsd
zvulj(OkVEXPs^65!Y+y(^g!vIKzS`vEJ|*ZAgL3>hsrkb8`RIR!QQE{vHx1s=IfK6
z3itEobsojWL2JYJL~{W&#jD|u2?!=b{lD{0IEO7g6}p0s@hN>KcFPjdG3(_bps~5c
z#7xXo)kRlTuF{m{yQ1sjS}p`*Vb|uF9CE(F4@>m)Xj4qVWW*xw?vU;N@YEK$s)XB<
z@J+8NOlq*t#@4w3J2rMqowS)o<2eW;$KVD?3T%G`O7=ICX`>D3CAC4$^MN-l{1+{+
zS--SA&yuWJK65Bm@fjI(UGxkolAgbu&Q&H$^B&d+u|yA=a%E2?G9frXXJ*(v1m;kK
z5$8bCt6i9yUh)1bOpPVQ#l>Z1dJJh9Y2Rc!j<ePRS})VpZd}*|941siZ5xD#VreA<
z65>9UBPqtTpla{)#%|#ANOqsAm=n231nNi1Pyl%-R;0|xQKqL-*Ws@f%)5)VaFq!O
z5mfR}vQR9s4)`B~PJ7Fdbzo+2%Q-2e@lemxPWWjiK8{52sjB%cFVSLjYO+TjMKr<K
z<4bK#wadBReJb~+SCIkT7j_GU?ts@qy;9Yoh;X0*-_1F>`(ZBh@gQfc#+!4979SoJ
zPBKw}nu=;<xk`FAAISZTX)E0gS=S%b!2kf@0igh_U>Q}XTmxUo^I*sD(0)8c*7NvG
z|DU#0%CUICr|9jk(rI0HqnSnFp;(N9EFryHF0BASDz0dP%ym6GT~*GR_OG#hw$C3_
z2Gq}8c6UK3ijRif7hU{D1}7e^6>H)evDPtY<dk9`qU_k@A|W=7{c|-#?5?BJdwb>}
zp~v6)&{UF8DhU80eZ}A7m5Zw|G|=%3<aS0pl;dMLp4f-UqvyRoOC$fIM>T0X#s#&I
zUaZAX-TJi3a3q`@)m|jjK3<$0=Sdz*30cLzpHt@{79D@F5Ur6y6KG8<i}%-|1Gc-4
zr+QsbefyfFnJxQED+gu`PNmlGKO&uLWs+vds4^RV#Lv{Yl%;R_-vrLZGrrw8TFB(7
ziHV4exe+KROn6=X$}gkJI@PfJp>wwe0wAJdQG66bJ=8~qgAW9t8e>TNxa^FF2V5Q4
zMjuyBHvQ|tmAq=)!MCi`B%EVN+NSnA(*@O+HZ5*?UY^zUmID<Qey$d+sVF2)x;ZxY
zm5A%cGK@tPhDKD_u^74EtXDK+zMW4$x*i(b`7CVD=a5WP{Rw)VJ%m0GN~RfVKkoOM
zd4w=z3UcV|GmUP<R23hG<AB~Cz}-AIBcOLn!Af*8Ndixc{Gj87&bJp{NtG5XAx0_y
z{J6!OhX0dHonLL`sG;Ry&IudCN3j#4C&)SLT~l!E1yn<=(;iC=9w72V$&<?6pQVC+
zJ|9@TQ&qDP0%E5&M^$=<bzISh1`k__Jcm!oPO?eG(*@@0tmrFZ$9#5AK(KdL+qQb@
zNk_kL*QVaCs;!`IzTwE!tDTo-7BAyU2GHKKJ$=!;QMXxhSGDR(9$owWUh7Z3_QNvv
z_g=Fi*m6?MdCi+H^{=Pz(ua4Q_)c<_!sk}D+!nccaviu6e^4WqaIk;vw_<A*%=3YA
zF~tuD+zqrio3-Da(~s4S{IGdja;g4WmKO_PGb7aKY^3Sh&I-3>D&=k6@;V|z#a2kw
z^S``NtMBH~xLEiceLtB*DI1FQO-4U8CMenWUP;({Qs;2q#y~e$+SSY2<6?d=tVjVl
zzh)S5zG}R}C4BUYq0RlYZo2MT0SUiO`UW?<{Xg7%aIJ7}dNKKu{)IEY?O7ah`q<3$
zcMyHWoX&*{SBt&_Xt=79L<3T8qnXa2CKkMQQsc>YLPSWYU#r{Rzw3h0df-#PV#h(4
zT~YQF6own-B@m;c=rl@To|RmQuI?VO>}Wbc?pi%FTH`7cqntIsNAqvYVq8_vmj0cs
zQ1Pm!2ji!v5;NV!xz8KX|I+M_GCswKnsHaV_G#&I37Ms>>N<UYs-0Nn3TS5}=ocwc
zi6cBht#^AK`H3)ma!*{9|L4)FGkwV0NNuT&jFr=J-!S*^dYUl2d9s98pn7wx&bN%|
z+ZTfGvp9zajxRTX+0OX84s>4(k1xNshp!0Uc5Iw1K5YG3ddExUboN)uwfk*lGRqa6
z#IqBoIv36seTair$l94(>lr#^SSh!%vf|21!~bZtv5J?qx2O`rq}4fhbnB(xsKLAP
z$;`BF#!5j(#_B*MRHt+uO3iSn?u1!Hct~eySjm^M)Z2kU@~p8^Q4cn>jdjuL))w;h
zc#N*;tds6G{MC)uM1C=|zC4P5c<?P^krmiTWYI17$6$Y+%`<zMYiag{xX{zl?IA)3
zU%2hH&+Y5^1L`09+LDz<okImb-#g@)j<nrIy(>NezRt{ah3`d-B!0!jWT79X*l74U
zT33DVwEL@p>gwEH2tI_Lk`|H5RNNwxsNb0xgd98BGR3xkn>x$xx;-qyR_to2oRiOg
z99y#fcCapFohD?B@Kmf@D`%OsXHwWZcIr^GxSiS(luSuhz+5+D$CYh!>h2IfeB@D)
zHOeE;lC5ZwJYvU|JpuUcy(i-@-dS0ZRce#9S|uGnKaU%0qtrZhb~V3zqF_<<Lxv@L
zA~G@(AcEaa@biV%g*<Y@G_u0M%SDM-gV)wL=6&h=QZ`VC5ApnNg89DRzEKhQ%Z(9p
zd<(A~X$Q*vWIm9&<6e~LEHv004-_9qy`*?SP-7PB$&o_ZQBJKef4;vT7MJ0EwpMRB
zb>4%~kT#=r*d*Sb){187==er87c7<N!6EalBt>;dJO4H`mOZ>w9zf!AU44?+tug-q
z;TS)`#8>N0J+@KKm9MJR!X)OkojnB!@-WQIKTy()6nCh(%?aldG@oZWLmw6<E(AI6
zHio4@IxN&dEAe^d6}AQLObaGu!DEOKT~6OQ6m6Z_2nhuiI3YC3c@qkX%JK@bT-21b
zQuW0dRD-CqkwwFp#0?rGe15l=f7ED{veBtQdNma_o^9(&>CvjAqO6$;Z5ed04&8T+
zhZOiF;4@Z6H7R#0^DHfQEf*=?8<&F;5){a4#ZoQpdceW%=f&w_-~O|2YbY1JoyiPo
zvb{Dox#B|%jZDNiJCl-(G38)TX)MO}7y3YVjLZivJ0Qo>A#r#BVWXKS1?SVIY?_ob
z-}pTyh^`^uwK|qR?2Am#oIW4Tx@{v;oO6ZanAJwR&s$%IG`?QQ`18`CGWyM9$TOZg
z*5~Am00*=on)S=(NpiD;af02o`acW2iv{&twmcolqP_5)U8QTWbEaGBDBOf+<>Gt<
z`;HCtU#(r3hd!6wj&u|I1>~NU07>XJ{C?~=sf~yQh6jg}@NZm33zPDw9Y)3EOKF!%
ztahLLBLzYSpBCD?HyiF+kNQ=UV-&f-RE*@^`E|Ch&$e$b`CzES;pQ0);D^!DI}<`s
zO~ppN?M0Ka@Y|^oX|9k@%dgt=mlbyRg+pTZMhHfG7YENNI!1d@Q|W=9#zN+trBWUT
z{g1;kQpe}LxlZ5i%9@H2!-*ekM-D=QZTly~d7S4Ubi=NIQym{S`BO)tQu=QT0<~=$
zIVwsTN*c$FYL0>$C$au{vBX@B;|3Y{rb-VDxMb>za81Hb6xHuN4+}pHv8jcD<$=x>
zHO86CEPD4?>39-;gf(Vu*Vtl<N|5KUMc&r<1ADBtWF4UyPh}}}y!k2gdT^dhX+PcT
z%~|X!{`_dOnz*pNojG2|y+^e(+D$M*|L5uSh+5qPhZ_ivg`>9SbV?%l^eVEDXKf5*
zNHtIg|9f)8|H9Cy0nt!Di--qp?LfECeU{C04MvUO>-F+kQrJ!Rqo`o4-=EDqP~p#-
zYUd*Tij|t%Nl;qtX<If5v$DylMWq0Lu$^o-jrrrue7f8PvbjmO<UZrAKd8r{Z~DUP
z+y*C*)%AscKLc{NlyftEANG<&sE@}|^LBaoy&V(xW}X*BDl~J8$tS#~_UD*%E%5K&
zOWf*fK6YaqRw;dj1nN>pOh~`si3=Z6&yiZ0QjUP^53wH<NTM&%lsFVPL(APlZxRa}
zmg4>f5bq%#78|zATm070lP`j8=J%vV;q@5)E3d;#M>C9l?o9tovc6bk9?QvTaBINS
z^GmPPMo{e}^VrU`8m$x={6&<)IMa<8v0~!ilGa4y!$zwk{SNMs(?7qVg@NYXOheK9
zpC04**=TV@%NS|>rxi%CN~ItK6~gQLdgEieOYqf9KT?rVz7f`S#hGzy_c)v9_G!k(
zjc+eAQzM)<zHnAEiwvEqJDyvr%})sqSHD8~IB0@B${0cx|JB(g&Zo{~q%p1@3GDfi
zOAmj%1EH+uUn;~QdNBc8e@F);-PrDrXB?FW!qxuF*CRP@_%uGC&6GPlB3~4vDed}}
zCXENG$+Uj@Vid@GR;)*OU%$lN!CU5d@776=QFfmfR(1bH0HN)pw8qv4M7Y>MRst*H
zVto|!tZFBU7e#AAO9oEHn$m*~1xmVyMf?0nd-7am4w`kJXZvrmvH%fOE5g@@U1b~F
z6I{uIoU&3&08Y|?B6af8iSOEcSs66c7DRjxS;`OnX1(`|O$tFyuG3+Xz_QX9TP<uW
zYYP`3(a~J=zVtv*-!8Yky61lU2mfA@G(vuDBNIJsM9Z>?O$t9*Ay&^_ukYH;CtZM@
z{IEhOx)^RC3=<qBYAQA;hwv|2$%1_R$8SrTg0-g@cDUzjonZzj+l^TP+VlP*wY$qk
z=O%BU2YIGAg$wAHWpVct>rZ3TV-IY9ojF%d=;PD*tvKGuNG$&MZiVR5{Z$Ixe&z!I
zhtAvHU^cMvx+(=xGEGJ<IO&Hb*SV1Yb%!HYdk)D+H)99+^@O~EQ?O}iHO4%hs|~k|
zTv&tp-(&xr(sjs#QCE$Cb@SSpM|(k@hBB_ca51LaR9K$)ulvU76T*LKXgZx_f_T_-
z*s4B3y5u<caD~}fb(E9&Rg(lP(*>V@NV5J#4l(7Rl`85jW*&)@ZC-bgFB}=CHB0f{
z*aSj-t2Va3<AzX<L>2zfbD7GikyGLzh?SDFHghyM{5Qj>lFAWfE@v$wTXB4l<68Po
ziPzor_+!qSOT1uh2C|^W?^^%%nXZq&JPM%O!Dk`&P0#kR|H4eV&g$R+<qsb14!>4~
zyqK>)dd4Uh37!9jS*WsbTn2<2vMo(!|EseVHMA_7ay)J1gGb_kwOM?y!;W=~`8mww
z(+Cmn?1;zIa;?$X&pdEAGhBL%Cs^hvMWJKeB1@vJ#u{4M@>yrL*X%%M@E=EZsV**t
z@zo?%4Bw7^8@)cP(m+qL!n=j{P{1cAb=;`&dS2`PbE(_`tZej*<g>#|@`Qsa-ltKX
zmSURNKa4PsG859?ZPY2t830@Mj8Nk879c5A=k1Q8aLI6Nb!46N#qL4#3Nnh}w{CyC
zHghtIr(F=dAozms$dN<b3SP3$1%0Wg%H)zLiEw2TaV2Mf#gwwe(o=cV$tp!zQk>1h
zo&JYP?L~&HpK&GA%z3FeJEfZqQMw-6Y}4J6M}9PikC)NtA2z%KW7TK>qI{3BhJ)?8
zD4_sRq_Q@}_khEx_N>otP}pLZ=HH%*H+I`>o_jsl7XcK0LJsz1HZ<7gW_f?mjS+u<
zEmjK5=H|mPxfKqKy8bp0Fs{l1#{b2rt$F41C?SSQ-g>d2_Y1|yOnm_v&28o9ilZ`R
zXu^@xg`HKUFVc+>si3b(OU0*>szqKLFmmTk>E?{x%EN$Q+Iu6#8Plr7+y+Ks_CGI>
zN2Kp8-K?}5g&sw@MQI+h&|5}s4v*jlT-l_TW6E4UE#QS2P}ujn;h_8|xeuJd&&Rm(
z1%e{#V-mrilfasAD73J@xLsyvB&NzoNiAkd=XEMrvRZd>f1X8&&;w25-&`&ekz<|~
z*m4h<gCoJ`SoS^mAPgNb+)YfMNHXB|areIVnI94M>)H4Y$!EUDl1&N@pzh(l*z8=J
z{-uQgD6_lRWF|(3Jn=*Iov?P=O!_Ax4Y+EbPa=qZev7K}zOhi8%lZ;mSV)mQad#;X
z%<=Na?A%*UkN-Qw)Rx3Hp{C{j_vDiSTe8C2y(W@OACGa5B53fQd-zKZ>6%{sBssGo
z@%e-#qn%^cKkZ>tJwEFDwXj~2f07rQgU3CC{7x_S0m(0q(KuISTe~^XiMIR4=4!xn
zv*l1bNH8HW?aOyn!9c8Kui0YRPtjC+&5!G@N&ff4d;C8w_hPFBeX-k&s7gu+V_(0-
zsolK!*Rf3fNE$gv-c%nW`$btnc;iJ-Q5EJ&!&Z+{Qr<AyB+$D~hE#1JhKTAK?7S-s
zy(p`<m|s*U<@b@0A^S)nf<;z`xS*k7shrQ6sffp=CoUesAS;A-(BTMuOM^pzK7_-Z
zj8_HfxvSmb?4n{7v(lkZxVRgrNlXY?8|!56c+V-Gg};=BnOJkoW;3@nx?MX*ezKt)
zaXnLj+w;FASLTXygK7-@I{Xi_0_X(n9ngd>i^v3SqZVOpS-3#fPXd1;nRv)e<usH{
zXGcP+pdQcB-7lrK={JNIY33Z+<|WEZ6;oa}x8JtZM_`Q5W*BR&_4>YvhHCn`U>nAS
z>RY3etdwda10e99QB)`Z4jwSRb_rr!8wLm91o8yDd|r~wg&k??pRPe`unMHLdGVhd
zg`aQFe0O8H?Vm2|ixFq4w3x;IdV>9zj-8KKA7+>~38feEveed25ASSLp+e#`cYk8I
zs6B?GOFPF^pvsvRj#&RJDRM;>d_AUKPO`g0Efm}eaVTn~iavH6CfjH_zS_^;8)f<`
zvF6oYQD>0#R?}`g$)r`G!jT8Ei?%v>x9l8<*Ri*$U98d=Dpvr(c22?PgD5Lu@S!Vq
zLT<)dHa6EayAB)A`{z+1T+PE&LAV*A`B-G|Jmz1#f_a^{3f4`Q;+L;SCU;YfVo7ox
zIS9wb#so=}qme0IcoZ`;{m=iNx(*{Xh!+aD#OW?S{vO|;KG=En90?Q(XvdNk@6Qtr
z(<>E29nv;6Ei7E#Xlh=1S-*Ofj9+(>kGG*wUxNdTBPReN0NhAY#>Q-J%E1WvIX;di
z*18Me<cYk%h~t~&;~*kInXH_om;G90o60KSLx}8aZQF6dgvar`b^6%IYc~~HT}n>M
zY?aoO=qGv2bi*oW)1;yQ=@5}L6(!{t;eZZzi=(*yMxGU+V6w!~X^(bJIg@4Z2u#aI
zM|BLoEfq~dt<QVI7e1G@Rno;HvRlZ;0JcDaK+c}#_A{cl%ic#|S614o0vB7+$dB*1
zVw94J?z~IDfn!J|K&(i8j>9r!u1F4tMyc&COSE#y`)<8;HH%O~BUZ{xN=j<UL2&$_
z80yyvoRhNc?%MeIfrL_46-J<@G3x227+s(UKLpKKo$`Avw?KWcKtzb56f12O`@bB!
ztkNqv6xlNsDl4UCmiG4cNCbU8e?XSyQeWa&7OXJc!X5i<`@Dars3hk$&mX@UNBnec
zyFV>lpS02GYfeR-;hu{T5CJNJMrZ)Z)$--RyH|OFzC$Wg3~51WL9MS(cU;-HWn->8
z1DO|H&*zuhqvr<6KQSicWmwS2|6@2G5A%ofWm%He*Vk=9olTw>n_h!tsIzc60^Zjr
zpzgT0U7)0j&)w-tjUIPMFPUtTT<^Y{w}xCOauO?RZ%STbUeb^E3jKD?Ys47R{{Dg`
z^A61?vlY_fYHDg!vT{mFN{Wh#3JNLaI$CQ#k;~>*3ZUgM-U^mtV#ceh6<*On;^7!)
z8|_PH9=qORSbKG3n+kMw3}t0yu(=3QQBkq7vVQv(iM8X>8j8h~KDO<I$kFh42Ge?R
zNlD35qB-x^ui|Ouprxux8*%Y|7-OxRCqVFGMuRAd_5aANePlVi%u}#Ot5Fn};T<r}
z+@3@J9c?gz_%5y}Rx$ctY#3ihTl!ypqXGerVd}Ov8LEr7^S|YadJWDepZnTOgr~dN
zCHnY$KHpj?i4<;>bAgKUXL)<Y*w!}&xO0W0%)~UCj)P%2mu~8Td0KjX)X`}+Nvu7#
z-T9T{k>-s8kZ_~dLWd3%k2asfp+)FI)ydlrQBBaO3l3~2JZ(M@Matazc;ha$aI-ye
zFZBB$_2f-=Z*q(q{9R%%G=q*IbfDEZX4sJHlVwKxQ+jYSowlU4=uk`D``54jC1>(7
z^n=+H!o*sdy&+i+uh%pBuDyDAu~gXso9^dB9u=*;ik=gwI$}Pv)hagWN>YnBWd|Mt
zV=Y^=dC_mws=e*(FsQ8Z@ZcI2FFgF&QUOb>Fm+hx^YcCEZPEVp1oLGkZ;^^X;2A`8
z1BuW}7ImklPTz#yLGKtZ?Yxsz2+P=`u&zi&-obIdKHV_Z*ZBk4y&j;Gf*;5}<HHA{
z^?I#!oAv3wtC|CU_b52R%>Q>6MOCgfahMjI|F&#nCLj&HF(TS*?cPFPgkk_E@Gqlp
z)0T2*j1U47CYvdZHw+O-bd+<l)~*=7%J>#WS3qd!;Y0uo{?@+&#GRQ!u@d*4E3Z#=
zavEHj$8tTGs-A~&NWNzr$jN*JARoWp#yy`MG;loY^l!e_4oH>~0r5^sRo6*$ZR3+a
zN<iRUmwau`7@x{Z20(Pzb6gx7?mZBoZu|LB_Aora&hWnMs9A7>DSX-x#h2W}Zp^D`
zS4S%0j<PpL|7Di{=?P078W=~FkxZ)BASRJA%)tb6&}Xnc1aCbiw*{%)L-qcOnQytk
z1Cl9OXptw@cGU;h>No#BpBo`y0;SlbB{T~kaF~-@<d>24^2Rz(Hi~|c5*v5`9W)L9
z%U6rkHntY@vF@AQ*9lOy&LhUD{mo`%k4`or`imn*Mu&2+0nX2wr=>E)z@9Rq#h0bx
zKPD)6J`8&KlRoEj5eUL<r*E1Z#3#l?dLJ6_il&=)6Fo0tU&`%^h%eNU(cj8~l3j|?
z!{gDI&VJ{BYUm#qlp*HbXEIKYwrCboX~Vh-Wz7pz5TOKr$YOSBollwO$?YPKASaV@
z?3mt3aih|<)p9_8u|Gm>jpCUtUnk?DAQc=OwkO;&Wb|RYWBtE;_*RpSC^W0ZCCvTy
z+TJvOTEB4m{FOn^J%dBTa$PgvF%vY2)C#O#v8?jW?C7R09=z&q>f}b35^62607viY
zZED`N$bO}d`$CN<wANv>O1!&EIyT{{U{vqTPA>BHDmv)2d^=(yw)H@B5n?VvkHOwh
zBNE;9b)(r_WpIl6W$KT1*c&m_;Aynr{%*wvmIDMaR=HN6TrRSf%h>+8UHI&KUe?uE
zfYT%|XT^QeoqG2R83BMx1N>LQFr)6ahb0ix;@CTKl~FT>p=6_tx+CTO?w6KcG?MTo
zwcT5F?g#v`vc;n&UqbbkgKYa<XzRLPoxqczq{s|T=#cLo=GXkErEuXRe0}(?l)|S`
z)@*c-npVLZ?x$hlED0GUdB(d-&A3&&e*8{>IIO?`_CxUV&Q8Lo5KUdt?zMCBczZsf
zo7y52X<dtFx=3$^W^_W2X^)(BXSbVXBusGqRgL1X<tF3;{rjb^(upo6i3m8cFD88G
zBRt?04Gq{}JoZscrlIfcjkq2K{Tb|gF}3l0NU&0KCbG=?`fmy0(=bnJubI$w#nSud
z!~`btzmg$XfX{A*|L*5+l!ZuW@x>&*#fzr4J_}nw+se-9#rs;3F<HveZ54oWB9s&a
z<|AWC>YR}IKjxTSeCE&m)-&}-ACXW87AWDdN}GeQq3^K*2^_V$gqqNcus5TGD{v!M
zDI!lb<o^Me3@)e3@{?jOp#gKk4Ux3NrmbisPq*6Vzb@XuA<T+_&2sU?Xq$f~P>5WL
zx1e7&$>GFgy7QqW*N4NJ>)wz+=5znD^Hyhjk~6Pxs7eDXNZ^{dhq!n_Jdn)3%vN)#
zLz3Q)b#6VUXMdTK-t29R9x>tfwf1KLCB6GzF!f!Ua&8Gzsy9dJ)1Z19rD9s9lWTwX
z&rK?Gi}j+mA}tva3IKLwGZp~5XrOr(%!Z|zR#P2gq&%j3<VetRU*Rc)6xnl?8VyFX
zWz_}g*6pqPaCf}Sm2I8Bd+q1L+Shh*=p^Er)YEsq4}GINTx{>&xW4o3<!^!*KkFg)
zjWXs3ONj7kYThjoc&-x`vA7Mt3BO+UTS{qssjv&5iSwlk8G4D1CDoEcEH=yLI)}Kw
z!`Ek8R5eg*|Iw@9&->k(r^W9|4Yn{DWnV#gH=8(_!^-n&VXd6Ui{*L?`jrRjoau5K
zbT?M$>Pr0XK6k##=C|kgCwWOSY7aGqv{Y}Y{6-JA=3W601*f;7D@P##jhPK!0+~O>
z$}ibIfbhcKwcdo`v1?8#kf!9mA+Ea`Nkn_TJVZ<G>aKhuFNU7oe+W^*aU{iZ{;m>N
z0{huxIL&<yd=^B3KG|Q!)$lEEk$2vNDH{p#u={`acq(wdP=0YcVq`^o<qx<n-|Xbi
z?|$0O$FOom$>Mn_m=m-qIQ#YAJca~0ox(u!s4gGj0=K&#)VV(Z8~>#mG5Szls#IUg
z3~a5u*0w_`rt(RhAJ8z9Gt$|brQ8YJtH$L8V?OZLS#HN!x`Mh?KKS!kNG`Z<>V`)#
zA<W{EGM+vYjdeGV_wamkvHtyh;&_qGA!n2iy^ab$&o2dCJRYoBBYkzRKxcBKc-ZH2
zcImG|V~kJw>2rL?#*BcKq@scyBR~b=)w71SlYAUOFg?plv{84%WctLbRT7%2P6Beg
z7d^_*G;MSj&2E>-a;PJkI8x{VODD(&og1(nK!@<zCx|%6oXkBglCB2ms}Li8UsDfo
z{0bkDphV94US5!ch6NBi5KE)Yz*EBZ9gOV4hA$pEZ(OqVGEFFba1zZ2?*-g}GOaQx
zau=WJ_zc8(oO*d@fUHz-i4hFN=hl@iC!V2y|9B|MvnIga+B6D=?mo?`et3V?nG*sF
z8EC+UFL=;`;h}`ZB0K1g?H43iv5Bxu3>CdhOB`zt`>uc)p<X==6+a{QKY(N(r7W@y
zKg}WuJLE;HLwt`fqN4B-hNi4Cg8^<g|CK@kk^tlB|FzYX!-Wepgh6tdwE^4>KSa@5
z84L|S&wpFJyTcgyAU+g;L7PW=rQ=;-5CX~`hE0j}@nVafIHzR7WI4XHat^On5$OJ3
z8gGFSsekA7@(8=7?X7oe@EG%Z=JeMZ9aAbq%M{kT)1v$4KZ9+nSqA*g#7!Ev|7NOu
z<MRlPG6CQ9v|R7TkJv4h%=KKPH#w*Uzt&5-Q-6-2fFZI3rO~5$&Sb|{LnGjEqs9&J
z4aev)GfS4+sA}qgKtJG*SL4HG`Tk9MHOX~P@m3PFqq8*DM?*{R=I9{Su=((3BA8!4
z_wIhGWRx8j@hmURuhZOk)BQD$bQ3xvP2@-b)QY}UM@?`Waim%s{TT}sF$#F;rjdMh
z@q3LQX4ZGt*Z)+Vb<^|v3iCsL{hO8R{qn1wYkVz%9+zkJiw36y_{D)NofH-&@P0G*
z7YgJ+pv`Hr2rUc?o`;-L?s4$w2hN8|_Y*V#OJ(DqR@l3HZ{)52;(l{=JZOg|`MN0w
z+)Dc&yn1%eEO|nm(oaD7<(Zw=9S&2qxof&UxKUU=dS$o#0m9cS$*y1>NU{*X>3E~B
z?2X7U;C|Ea?9P7S`P@^ugQ%c!<3#(MnV!$>a5cwhV?&zbJ}3`hb+E<VX<k1(s-=-X
zbe0W9->VZBu35~lo}YTXkTaY{YXy)?{CFJPxk|d<@zXs)AOD!uLu)TDjJbwE!mG~e
zGJnr?%5}O9GB1&Fy*NwDq@Y{@Bm`^#N}OhtL^p)n{HMD>!oup#ENg7PAJZx*3f#MC
z1Yd=LtIqcztxd2Vxc%@|8D<>wYo6~Lc+Ei5Cz=4%tqIbx14r;|mY%u>zh=P4&%7qc
zfYa3mHap^(qfO46$ib>x$VoWHhnxdg9813Lb?uv_(__iO!IUp#3NXD@5`;a}&~)2W
zx6=;u#B$5!SG+}1MIk;TH)EsS{C>5T%?;cnq#nDR20q2f#9(#wbIX5gMOx;Ap06l-
zT+fTxHH`|&rz>u>P)ly4v$eyYR|rDFeqV-eS8n<YY_~lgjOFtOi4J1~ucnTKpV#05
zdxc+r?dML_LofSY{f$p{2;%MG0A$U=b*^vd0AIrvTl+iZ=Z>pM48Z4?xpb|KwK=Va
zaD0c&x7!BKxRcn2ru!vXGT_ya)1#38-OKz@yrhTsS>=+C$AydNLJES@M~F6H>lP~T
zGEWo^0Gz);M#~)EZ@ghLuY*zG!~KAyfm_Zu_V4~+3j8*!UMzCI{@)Wsfbi8+{==%x
zm&YE0P%9cVhj7fMo&vaGMq!=DTUaF2Z`T#Yi@VLo#SLO_CLwUk^-#M-Ob*NLO)P!L
zl8Ti7F0l3~^>GdYq4@-AgZO?$*k_)4jwE46XNo5Z=tOPCGy4D_R4;{QD##Eq&fyHl
z@9i5j2Q<rnCvVXN7dSlj`FBnFH&wp9tdNjU6AQX;?(ekUYs7byS$aQeO*mFDvZ@8b
zbw2;ZCk6>H!HAk+``7oL+Ll1&Q|~uRAkpP%RPG|)RR1CA1JU!Q8NG+D)@g$foAcNz
z^y=dJVCEx#4ZVku@0{nw3t00PEK0|Dq2Uk`OVg_uO-jTxkaq~Ydn6u%^{HLHs($GA
zE$j1HEYe%NF!ZK4{SLez#etp87)<|-za%!8H{*o}V+uoN7^D9;O0Bk++45bGE0%UV
zpMx`oK){I#H`?l(f!Ai6>EShLAAk3A{w4e8*B>iSc;~-`y071|g_hf-K|Uvo#5foE
z^H+zaW$s9Tb+4tE-|hpztnGHDF7I>_@6$|a5??81nox<f;qAWMQ7@DCli2Snv?{t<
zLZ{Uo^;Rn@Do16eUe3!yRGUj%iQ}G*b$#nb*zdy$)ZJ5Fj^x|b<k^zVEcIb_kyAs1
zF*?(R(6v=JFLz$?@s}DN6X!pASvBu`A)U%GNrKzf{U?TW`LN_+`nob9|C(bL(R5i)
zWiQLlV@(65Km%aM8MhGt5F}K;(Pdx(6rS2w-Ci}pG4_`X<LlryC-YlFIHmOu5p1<<
zk$2A(FoYWx&fvU3-_Yzd&lpR^TWs%5%K-~<U!+el%|KtyTyK!|Ty$MC7|EvBtcKx@
z?D#lro~m?2{ZTiCoHE`ZQC7Q}9}jzWn>L9|x#b9MGX?MCn3xt)y@!<@9@iGdE9u$)
zeGt1%-haM@%_8sFZ*1!3dRsV~zU=LO%Acm{>(rpVa0UVZ`t;0}E{|>~U5^XsphF52
zJwyVq3;}P}L4clp)lND*F_>^cXE5pVBpqWH_U_gz_+pE3HZn3E8!_j!X@FD@o%oJ(
zmC~OE;$4T)r}VE6Lr8%tYhURlDH3vMPl&j?8SCxTb)Vg=mTOjQo6mh%gttg@Uaoih
zJ4^2!hPr5KFkg`kpPuXdc<P`2>`&M@ERo`iZKp{Y{g{^r0$GI5NtX7}=apX^^Rqn-
zHhU&rJURTg?6=1Mm;oLc`E-_`_pc{LUQh)iZ6jU_%?k`+d^pGlJ!!W#b8~@%DKM{F
z0#%FO8-3NS<!kT0qDzociIGAGRVpCx*qH`<XI8t2x1dqBeXhQ3adF|teS&?v4Us;{
zWW&6K49i$P@MO7eI58ClU_QVXuUCC&bmu(MG0;<QonJMCv|MzlWCz>~6L$$iZ)|3C
zTY#z${+sQVliQ8JO(cNR^(!R%wok2$uFe+%IdXJeeVVH34#JPFb*#qe(uTZc9^^c9
zr*yi>(pq1bG+PWGyT%8s(8T4<cC+8vMX@_f2wkQPB?`Um#6VA+=9ho}(@~?Tx-b9u
z`z%D*F+@)q^6$a*3e?SvR&II8SLj;XcGpN_c|6v2Vb{AKou5IXv#B6xf3Nlp@i5pG
z3d}*9<i+p0H_aiO!v_>JD6R<m-W~hGpujeQqDOeH8YbKVS^Wfm9Psy<osFtZ;Wx>|
zWW1!5^khF+o4n4argE1O$SdLFRvHboJR1Svw3Iv+KuQ(m|GKLj*LKG3$_4+S19*(M
zj1FLNnLS;YdfP*>mAxx}x1!iwU({gtwP%Rb4-P=-dz^1b@73XUEG{{<c_-Y~tk*(S
zP@gEaP$NIA-&jRTzlJIjVEejhD_8`)@6hzRMd=a(L-y*1rGNS{9*Ijh5O9)Dw)8?K
zgfG*kX$~K**8-fxF0>z(Op<A;JbQ1uTtC5<PiamP20y;c=YHVT(I&SeTp&%p|2u$N
zSsoU4V~0+fx^KSRq(5i?d8HH)wcL;!(9$^6jLutPZ(Z)#w0{Exy7m7J;5IUQxfO=6
z1+8~g#BU1!wUX1XJKmd7OPaCzvK(%-Vf1!9rpCSLCml^k!wIob^bbeOP|_u(<KujV
z_o?_hXd-=-Q}ftsg!#9muNHLox@1sv3mFcmFLY|VKrh}f^7p+6{rEKZvUMHZSJxeI
z+1C$_FH{6z3jO&p+SdxT6f8*h>o&g34`|(jXyG@OwA$y}xvkjNyWVU*jB&SP@SvD`
z`dch=8q})-Ay3<L8V4uHNf%%X9{=01frc2?-E$k5ukuZ*WY?j!8&vZ*Zxx^UQfWx`
zq|!_+pQ$gX1vip_{VeI~fxb#&%&Zh2RU_76>geNaI~sDcncmWe_N$wzrZ2U$z}s$+
zkkfptZ@&M?sEZ_<=h)v4b}&nMzQ^(%741*kpBu}wS?*)%?Z!oJ7O;QJFz{Ccr(%4r
zE`-JF8*rTetLpG?nL3@dJU@vo3Tj9KL(MydLf#$5sKly_W(?6Ts5399S5~Ch<jjho
zLLgd34rb99zA$@wF5rLa6rcAICpSlEq2BS1v)@5Zam-33H}l(1G{*lJ$#jb0_~kg_
zrd%QShT69GfZ6)CyVC^_Oo^3mHLMG-rmKPf!}mUH$>`W|@c+SXQP%%}ItnhJ5V{P2
zF{0Lt5^(SmV*jg+P7B_d?U@g9%%(sMb`#Pkq_wQFaVGnZ8;!W0=(=#i{jYfZZ>~x4
zOCVV~L&|JrC7q;7j8qXNXIG0D>PNAE-3pi~SYiSs$`%#}z4e<x8;U$WGV;AzMgR5e
zpBN@b<+eOtWIc;84pyUU0f_Qg2D48R9LCUAls0^fG#J_uAx8~1B}D0M=pW*U{?RgG
z(7t$5T~X6`Pwdxj$MRIHX<shbhBFBBCfsgz#Q}hb@uS+}T1<<(e9&cE6sXCEXcDcL
z=LVY$=H>Q>lA-FBPTbuK65-uY4slfa*ed(YaayKq(OK#m)3NNmZ~M&h5K>^i>LM-t
zfH_o7&9fiFHX*x!T*-$R|Fv{cOj6~2jY&z<?4KyMriRQ`54#dGe<D4!eys!#ku>w7
z8QL+I8_>H_Vy;qjnSTM@DH%$U<&{<P$DDMG&uKAm&F1@?iL1WlRX#Kr3{l^(;qklF
zBXZPw1!HV-s&c$5j*SgbZusDd2FQfF{Zz^?b<%M!tVA&xB=wFKDbVtw&`OGvC^y{Z
z6q6`9^^{p*Q_X1VW7*f&QdQEJB>Y?yToGI`eo|nF0^#|gQ^8xur-bh9{o6u3Axn3O
zF`v`+Q`~9Eui`oeOait6JFclb!FDR2<9nDm;Pyl=!)-}wTQd#@wlHA=H_2qHr2jV8
zQQ4lvKAM@%&J5uxUsCGyklc=|&mX8T`P+fyJt$udSLUzcJ<{>bM5sHC1QV5RI(ml}
zve-ABoA`;&+R$)w`j_}{JgKnV^6wJ)bS^FBHQbj-kGI0S?IBcUG*3H%nm9s}mUn{<
zlBT1XwZ-Z;Eyo_NQn0u<jSARc5cL}FJMX3n{xajy>irY9ntFR}ggI*6V5Z^TLGKe-
zNE-?5w|s%7dE~UhniN&JrKw<@ld<<Zo}hx5CoaP-ROXYksG}GH_VdpBP13i^@UPNw
zU-;at0s`L3@&gE8cFWN|y<FMu?_DP$q^J@KCg9Nb;g}E0>o4ifcPbUa4*Z3q%wbZ{
z*id(Ol|s64kt)|^&KS)^28cyaQ#u-s6lTK0Gzz1r2EEbBk>EXSBzebmzi+j>ej2AU
z)Pmb;=cVrV(VfmgbG&u|0RA%f)-PaxHlx?7jk$xYG^h}KefY`>3Q=P&GZcJCUV(Ob
zl{v_=rhKuI<mg!7r?AR2T-S?3PD%0E$YHM?R?wiC)6Z#x6X75rt5?WDw&l{6$4^Zk
zr?;9sQ{^GZYLIhBLs~qsV5Ii3Z_TLuFO^z9b@Rn=+N(FQJ<NUX{nildzH$9x{hN|j
z24`>KIffk!{FRvB7eNehoF^U(!7KUQ;AZ#zFU{=Vn<dVs29CY@D3Ml155#YKfW8on
zu*J_rh@Mk~HCbETU%8}M&jixGmB3MzRA#$QX2L#{`H2c?r>8N&yV5~i21&H*C>s3m
zmIr|G$V7+;Vu9PtwT{~REanmb-m~W(=Ey=33jd|P!A>u!?e-SuoEz9rkb$lS5Xi|g
zh+mwkZ-pd3vk3Wbg*_o*?SaFk0!k%LwZBWjRQv){RvI22BPwEQPn*MIHBv9Notd^Z
zQnk*ec2|+t$LfNV+Wf|TQgD0(*^1mSGDaY>LEana78VS~bcIqA%#C_(C_2EiEO!5X
z?ek!R+6uF-h-~Ho9J$E%-iocRqsGa6PtK!*XZ_cgX*9j=NsN>fWlda36=YDRhe-D#
zHFNlWa`uhaFJr@ZxR{!_<_B*A4GPQwm&5W4KBbH73j|aTW>vIH=uDC-)Xd;NKw*GF
zw)R#xmm3@dtsZ7_>OXKvFZj<#eq<xOAgoSzgAAG<RkTz0soGJW5Ia?qjOq&i7G9w3
z<24!2&EreLul?lYr(ibLW}gFY!;73Jyue0}@cbDsE?Ixq_Mtb!8kd{&MQ)TsnauFh
z)`XBU+HRn>jn?Aly9Qi)#%NWCZ>w_AeRsdi$r~TInIg0!mkC-kdPyTI#GDkNg|P>q
zab2*LgAQ7HI*NaB`)5UofI_61ub#JI|6EN}9vkp#Vyd4eCg6Xk#^n<Dwi5#$`R|^;
zzQVq@hQFG8nkpWMq&Dl$fWY8`v#_)y^SIue-D<&8mz?W1n~DP@0EPv!1xV)pngdfF
zZz!iBuX#tr<gzSsE1rrQGuWt=HUrzKqDDT-b8lZ4KB<+2I(!f<q-M69|0frxGhww(
zUGdf6N8rEtr0hfRf@YhQcQl1eTIAgIS0jRv{3g>AAJjkejFNhoDSOXnYkwoOmU%cF
znHv=N;Wm&znfurtPhHdqc5bLZO5~m(gsRiNB3-P1_%S9^zr2voga}W6emSC|5a%;P
z!PJaG7+MKR`V)eO1h|&Ruw%UJzEVd{TThY<8BQZv&LT>f-3N@N?r*Je*-0Ci&?u8s
z<DQh}mRO1Au@Nk)$%j@o1f;R)=wKumsj{Ih4n&hN5(;R4`}v|%e~sYM9MHXU0{s0>
z2X>xidTMO0I1+^PjPhIvUoW<Xab)<wqo7k3dTRcTH*M@wjy35~L&L7ZGfj7ZI+w>g
zMBs5HhWAFHyhYNt-sT{H>}Ql)(nq<qHakZ3MMdk>LXOU|8n@G}S2VtOtyl-4VB<@g
zQi@u=O?6t%wC`Mx*m>@<S8<CPaRu4&WM_j&m~YE+!x&7PaF0|dqYO1G?A?1kn)0VU
zuR@$%5Am@6`s&=IqW_U!chlxMUkF862eaQ>vu6-|`2R{MV$|VE$L}GBq!kY~ws%`6
zF|q`~YOscIep%qO?Dv-X-Pi^=|9{62W$YJecA9X9Zfm{}%fu*+lE&Xx^+WFpcBTe!
zo5Ovm7<q!}{g171=P+6-`k1EBc+~=ODpnJ@riGHln<I6)yweKHQ0h}_=`j`j&Bk)2
z5!gi(9X7%&7;`%O7JXJL?S5#LR~BY?Tq>qsWHSps`I*^wy=Nr=BRyf*yITB4i*_H$
zBA>g4*9sa0BH=1ni(j+)4U!Jt%5_yFpxsif9*-M;bY+oNN?q^J$%M!fhLpLG=xOt4
z!uEM%dILnXD3_v@s<&^hMM&sFX_^wzl(@Pf7M>WzgqUZFm(2kgNYmcbzEZ56>W-BU
zLamM83HUwiaBh<I&>%;%;trF)V}ol?BgXwFs^B6$HuW+I7+f$8XxW*#1?lU7b^j2k
zz6<a;rFo=a>WEtF1i8yP8)le3O<FgAccgQf`0U;e)_X!H+Op@8#?5jq>nw5S<Znvf
zx3wdqgwop;LTdDOr<7|iy1?AKZ5IbILJPbS6YEQTgb4}EGoO?(YNXx!4vha#8Q%d7
zXVk7c7>p7|ixOody66NEHHh9tFVRaPqC{_l=+XOV!C<sRCkTQl(OdKqz4u=3C;vL<
zo_p?Ev%Y0!e0zO+&%59KJkMJ`KmY4=WMzpp4;~26+d3>zu4+HmYc}yID8ai6k9=<A
zvV7ea3#13pK4w9Z@7<5y78$2YQu^vg^Uay$!fK>|ZGGt%>T80`e4EyimIuSzR57qA
zW<K4gcX`SlO>C!ogXJW%r8uJTtt1<Q0e5IR%gJn3v@dy@emkHZ8qMc0b>XH=dNMcd
z2pHm+eA$Vod^#1`+n153CkSQc8X#0;Uv+EsaZq0W`)cd?-RXydh|fHJ&cA7;c4NHn
zCMsQN(u#oxJ3-ntihNP2nj1Z#$q8AEPkJ>lGZFW1rXPFoS0i@#J3YUwoZwC)c?w1A
zUl?+j|7o~2^{~kl%Q`R1$`}8ghBIP?iA#9yNyPY(wmJmQJCS7zwiFxyXRR!2$5s=v
z*Xk9j+~Z;VX1#z!iB+qf#FZQewJ@|2X1N#TO%&Ig>qsZ}XBTSvc3;}sGXZCTseNq6
zS^FD%_2A}Uu@(0}$F`Pgg-@xLzNeNnpM<w%%lG!;qOT+^OirL<MO0G?xX^O`?9L$~
z9bw06EGkpt5q0}o)qKg`DFi`>35;eqepl8@m9Ln@2eRWLab|}-=aPojIH^zBA0pQC
zEGd2qw+fQ+_t(*SYrbh{>c_IedO6731Ugk2R9<;A+i><X9d%>?P=KTjObT92E7`pR
z%BEj`)qtWJP}b@b2s}FlfbjqK0*hL}C`<~#IRRie&pVM6HNt!RJdLJQ7y^TY+g@E>
z{riY?<eAWAt6vps&fFgj1H8leY9Va~p!5&7Q^`O!GRTuyn+EPFeDv%|j`2RiM#jKa
zy)w_`@UZ_`0SP?Y(o^OUlAI%l78x!LB^~LvNUgD!5{2~mkt5z#glWYRr5?5sAH87#
zNvbJv`S84}4f2c~iMfhbeiqBd%d2UuYu3zUZT1QZ?l>m?sx-}-V{8E$&6;8MMRl#G
z9-1+)zWn!9UM}&bz>`E;IE)3E{LONzALrx?k$9r<v69C(lB0X};3=<<+)2#mCHSBz
zBP9v=c_&exWdL*#tcRU3B?A!3AMW7^B^w}ty9lM!<XM_ZHT6Q24B##d=fl3eEkU05
zD_4V&l20rN%;O^!@BJ#tfzLs>0AIRi9{=NF3#OB(W=?S+1SS<*6S#4D|D`Rq)bI|Y
zYw+b!w3c_ZfY-ijXC8hlD{^|vy&oa$48$WgH#cLBNDuG|kB?m<I))2W>8N?`=Y8~#
zs^m#DG?fYGf^~#PxMz*A?{7$VXkg{z8(9;9pn+(kL!6;-JbDUq6l#2Il8^=^!6P$;
zF6M7%0??S~B;@o6PMYiw0nMcLEIV<A-1$WARxNGq#Iigoh(fAt5z3A;`PasM71z$`
zCF*GGmntI8^5XX-pZg8q6OwUxhIjspnxx6qTC>v><InwQ5s%-%{WEy$xt5jTc~i2o
z^TK4FF^yLSsG3}O9?93KrG4b7T|TjO;yLROZ5*n@1^f=Iv$gLOfB`b}5abB>sD_ry
zBGV_%6kfa@_Oi&y%OEJ?>NtT%g)%?E4(P0qw$Shgx6u>WF^b*1?-UzE@1fB3h1}z(
z%@Sozvagy3sUAMGsp4bzwmiU>*=kt1eZflPs*9KSEq^>zp^fAM^GsR&TJJ7F%Kq4x
z9um$vY{>J@yrC&&1A$S0nhkJ-rem4>XP_-&zmHA+^56d(JLbB}2PIroDwd{8`4pYC
z9iB}}u?ef8ckuaKX#Tt(HcG>9TwMP(v{VPMuJEdM-glY}P5a9pQEXea^ccvE<(12<
z`j>~vA<AW0_jrzYBzAyHSYjg}&f9M@p5o%_IuY!2Dx<ngK2-}+_Y4LsSFX}lvq7}C
z-8KrB9K&GaPxn`2L4qTnhML4-GVV%Cg6e!58F>%2v?8I4tG8q;9CV@MC%Ax(5oK9U
zAzi$ZzF<}+sS;?=8Q9vU5NmJG=Y*iYeKfue87jkIyx{OeSg`8H6kP2M9i8pyR<>e6
zNxP#myUKB7-r1JlTj&tSNKO7UJ4<eWg-7_8-$7w-;M&{+$+quTZyT>o%S|W^5w+P}
z!*Tr&e;)<E%w65<9hep$(b@By)s0eGCO2M8(7VM}E8Qc58<qjv=QOV}Z@Tg!Tf`^o
zKc4lyuzZ(}a5BOd`~G`TED9&JxpwwD0fnDXw#MaxPek8ceI7vGI8rf<zSMtki>MN9
zb@57uNkNR{Da|jZkqLGQ8a*k-p<Jo=#z>vwu&43l$&=i&GEPQDnK%Xzy*w-^Atj}S
zf;{_<Q^B!6L&e%t|2Y9U8~`)YZbv_^4|{W8MZccV`Zdoh%F$#{>o8&DM$>QsC;<@S
zU@@P|<GuNL8-4|izm?-%tmlCJLZg2LKKWEd<((D{#6o?OY<+y1elE7Wx60!iDmM|Q
z2Isx(sH&+M-}z{5X-OGH!6x;b5b?L&Q|?!I(NBlH+3$o<IJwCqq7yntPyW|ZqA{A0
zMS>}OzZN9u<<>|wdr}w_Bh6)_YV24GUM(??77HKN0~9zHCIptljwn*a*&kautq=Um
zIBGt3B-Bsi#s=wO9bPmGkB_S5`arz7DCCxxwnPD=`Ls92vN)lc$HC8>W4zrYC>ocN
zvTWesH8Q^aTJYvED-X{`jUeIVT;o{nU*s!&t(VrKG(dcO#+x48sWcrKnyIGx1@%&m
z%i5Szcl*ObblIlEv81duiIqKvAG_A?=c-rMgq3SA)Q3d(eqX=x*`NV|3^wu5>K3Fx
z*dIEWlaeeOnPLgZH6v4N@P<e><$rH2jP@4kBqd(P-^uN|s*Yx$Nf2UKkc){Oh3S;m
zv}F<6G|2m_2Uh&-H#XM>6s5xSfxq=xa?Z9YQldI1)*s+t^tN&FrwTMCTKr-H)$1?m
z+jD9=3ocnM)$Wc%*cT$0L-IfSZN)Sn7=%a_+s)*!|FrSTy$7~$Q=Ne0Yj+i!aWuDI
zLP|8ua|cm`@aVgFD10VPWL{X$HPyE0ILXfbYOb<Yd<}u&{q6n2+|<<Dh4fVdug%Rf
zJHc5r$GYwQ#lQ1YSBvlM=K~`<FwT5+Qyw66&g~&uCqrBzH|CpjQ_7Pdx|_rPT7p>z
z))Sq8HEKyt|CA*`k1O{JU=4^+<9J9XWCxuc+V_X}1G*p(_f1n;$R!><2prjHE#*fK
zrmoou+&KCLd~zwy?{^6&d@FT~y;!VO-dekBP*k-OXvFU0imsH!!h}y<e>f+Cy*qiV
z_AHYNTn{q~f2}Yb7OSRehJqT7#3!F~{9@5~YPuX@qD$9<Q$tk`T8MNeXc3b5+i$q;
z2YxqL_stJes0HKBtJ%Uk_rxpx<a)bjp4`G}7xw}L1o7zw!dW@rnWQDFadqyht4gcA
zsj-Ay+y1m_4PFTGy_?FSWvLT=Ti(*($2iRkzCE7WBMhz{^XvaKU_yOSx}&xxM&s`F
zguJ`&Rc{r|Q_U!8)xx#ug=>%Gbu#<HU=Y!Pn5N@mX@pxd_Xe_T76g)Q{CX5PEksWL
z2t1C#e#t5L(E#X|B!00q8TP2*Zr$jP?&cs5NZONR$qyl**_^B_=v`@Bw0Sb8$@MH%
zExPAs<f-bCt}6&g+11w84*$aM=VSvACR@T@(%COHPfS)yZk_?AG?`-A)AcJyHb#XV
z32G6ZTYN{`$0;taQ0qmrQkFJLdnLxalQC{>XqWZKLNj@x&#{mw&pEv43k$+oCYGn(
zc$!`TCG1=!?CfI0gJOmoqM4<orRncE=H(&Nlz`n1h@_<{Ru&c@31wFSOQ8|5VUHGS
zHMv(2MP&sId5`4^(0;y_dj&7byiax*;FWpariL>3RrTcC@D35<Si-Z%-+FbaSpeWA
zvjj`|DCFDFG?goIpCmEs%^(KO=9x9Ny1T$FFFv;`u3c<|M)Gl?Nr`F;Dcv77{L}Mi
zZ^1Db8>e-vi)j(I{p@0W|A1Ye({bQkXr@ECC7C`RS;n{gnl9CM`R2KPgQK50cBQxM
zY)?MlV<F3*xdqcl8e>4E?y4*Jnax8$%#80<Bv4aeoz=Gpn`zOg64=C6|Jc~>S}HU9
zGD?<{;2ea)crap>H(d-Uij{XheZ!HA9coUnv{2(h8eopS$HQNh(qkP4KAgt8BMS$F
zx&B*e+II`p+2iZ?z7yCjU{QGUrv3A{l;xq*AN3cy>bQ!Ezczz;B479!nJX&36f1@#
zOt+!qNR9<lOSli_3{sf~F6`>%YLi^MwRZxKK84f4&oY}?%o*dLnr|#}GOk%Y_h)VL
z&l}DEEg=QpYk~S=^@F&8P_cCso~+xdFGM+xeQ^f7zjUZH9lxw#B@%g<FmzH0`>_nl
zx0I2=v*IvWi>C)*MCC(p`q%Nc|4583|4UcObq{NHmZUrpXz*4qQciAcK^v@q$7Exa
z6jYUfN))}TL*7DXn&6=yz6S4-)$jno@uNmBzkY)#m-bew{(u%Us2#C6`dYp0kzx23
zCF5rEJ6}-Bvu{AFG*e^wW=?-h%dIyRfTr+@h}iy(xkvkFNm8YQ;v!cgKxKswiY;F$
z0NR?BfN#wI)QMawRGr`5pZ3~TAdoJf^M0Bww)bogP23M}Cz6By{SSpU<Hq+Zm>L@E
zplXSVx8+os1;Lh@Xast#{nZtEkwLx*;tYZg)2$j)?VmA^6ne-Lr{3mA^b{z+wX_&}
z@1WtC%^=?YQ3Q18wp|W+mZQ_6l#fFv>Q0TD)<k|kNvhr|kB!qWdvCk@FtUDb3&L(V
ztM8SEM#Bgb-VM(bY9w2$29@itK_rt(pnzgh3EGdO%a;X7GcWGSYKCQc|5Dp^+|o2C
zOg}4`TrB4oue%dt{r@B$re8T8UI3D_U8_(Mpc0+UeD9Qdv}W{;FO4*Th6OFlub3rx
z9A1IJxDrnWsBg*1)GX}#O$YqtAl%i&1njN&YR5w-U9rhKGh2uA&%VJAUQ~S}<>)eK
ze!(@&%Ee+Ju2^ovq?As!riQnAarxZY&)8RDcYN*QitgztrX@DAl(Hm}qxynQ{{bg~
zy-1zc;$P6BS1>Ie+=Ucez`Dh);(KEgzi}G$LE<j9yh<|=u=Ux5*P@}eo~i((YrP^j
zoKp2*$-k#oy;US;+-pMigx{$P8q4%i9y!3aZ%8ii&_!{t=AATF&rVhTmx{xQ>vc@3
zcNVuqQ(8<d`J5GCCBKH=nW`gek+;`#QzO$f+9s$xlX7~@ChX-$B;RYD6@g717~v-2
z+a18GXn*>fOZe*;@poeoD5W}cDdG+SU?V3?e*ho>FM#i{{?`R?FhDN*hn9j18f*ZL
zK}j|9c1)#2!IFY>w%FV`wD$~hXKT;={v&{5EUaVS4Gjl*?j%pKxUb#-jk@q2iQ6Oi
z#c!ACKX?`D48xz;+-a#)Jbe@;n>%E~O>yk!YN6L@Phu-V!M7u1#xNRRxCtHYO|7-W
zIhkrNIXPHm`Swrid1(h|J+`T;^GxJ5cB`cJi_0qq>5;{#dq6pLI$zdP@xtmiMZri>
zx!cC@%4Tsnt&pSXn>X}p>m>IyF!s$<8O{kOY@E^llTvS>z@^E<2$N1+<ZrlZY3cEj
zYD62wbj`bIAT&TsLgIC@nV6hBQLIz0o-3OZ_jrBP#39M{5y_@xLZfT!#!6apw@Owb
zztGL>pSHGd;TkrW1{;rc)e;`{85>o3k0-z>Bm=+YlMOw_xeUr}W^nWLA`-<vUH{p5
zb*dEei^4pz)Udwd9(J1e-DFD!x-eQsE_Q@vrx?FBn?eS8LOI?WB|LRiwyrp0{v!g=
zj6e+H>Rj(GT!miT62<VNHqsI1sG(J^s5CRKr)x$Iu<nfA;#bGq1UoUXXmG3W8shG9
z;zyFDM^_AeVICxWW5q7DMl6R`0(g4$%25HXc$)LLB}`tQWz}?>FrLJsf6`AaVJ`Ad
z#BUFBT3N`>BBpH83b!bkloCQn9nvaHcnjfD2k7Tvb|213nxr$|WJlx^fKzN`?;3`P
zsS>J)O@VWS_ogaCN{KY(<JyiBG{P0aff>~#*%}aU$}sXO8UZ(LU@a}LT)e@NyWy-G
zs3-9G<Y2TmFXj;5L?OIqb_#V00c#}aPgH-eN3q+c{H0sH{rhiOjQ=x;&dC11Rk8Pe
z#$Vr<NBN!_vnla8<#@<@I)M&j>HhCAqF+uN1ImdlX{47o?Cs%=+?D(U?qQGLp;=Gu
z2|a(2Gne>TY{VC+zTvBNt2ewqr|tGdM?U{F?Jp|74d)?%uZsnU=VVd>O@1gy8ma+t
zqMa*N2qO1N7y12%NJy?ffc{_i@-q&F{^w5~WyQ9AC=fJF?-<Qq!0-X`AfH7PJ*{4e
zf}*uRAW&&2I#d@BRLZz{-t}&|#(jNcD@^3TnJS_1P@@8BMbHhWkdUK>&{u#kgTUv+
zbZ}UPfzou9;0VL&Luo8!^rF{H1voii7UnSY-x9y!43N0r!9=04crs87v_O!IKiUIb
zFhKb*x}@a7)y=8g4UNkS9x~W*Gxmh*#PQ2JDO4yyuoqe^(Xe8O>$!2vNZVLK<^735
z<)ML4CNwOV(4sILrc;=L4w3Zl#d1(l$s0A$F_ITBFw>BdGOH+IP*8va6{8h63^H+$
zMdM(1e@zfu(9_VzL1;k%B!N)e<nKJgk5qAhL9$ae#TnM5mny#GS)4%O2vMMlcBCLa
zjzmK<u1{W`mk)1JnxQg=IP@)X93=w@J!?=`5ah8CRGU}@nwHHxgGH(dmgH2Nx-?FB
zuTLO}<8G15S~~5Y=~FJ4>NSBVFGm3_2x`0#Cy3{mu8#V>)pp1Xa=Yq5JIqq@Q4S%J
zHo4_YP<POT5jsZ2+QtE2=G<p;EI5oK@K1*RmK$=6Y0uakjtiDZ@~4p8{Z&7t=d-??
zGwUi4q8zpw1a_9vFjG(f`g$-)$A;odGqp>EqCw~-{3#eT-?wfD(YdA4)eT}_ceC@+
zUO+(pE!rLI#wj1PskMznU~^bNoPB3yHDXXa2zNUr4_|5bd1E<!suoN2SO`Q8L843+
zCjV5JHI^a(0+Ip~fuumtFF3nIQWzf=3Ei$LDtx*8D(efHeRqCa-Utp*hUlQdVdT?&
z<cmk|ak&QfLWMG7Jl+i$ztpbP8R3u8(9TyWDCpmHsc%F$gV5k;)-ClwaXUt<q@lY2
zji~jB-^p=#^trD~;PFP{^qt52x!`!)0VAKa;Z+YU2qe^Wm_s=cne}1kyg-MRaN4O;
zz|+F?s=^+9%Xep7v5e-&Hc8_+6wEQQYES?INnw6OuwYnrWP1usX7^M`CQ(=;Y=3WQ
zNcvCWhnM(6(INE2p*9WPt)-*0ch(y>m4$Rhu4kKlqJgv5s>U8DhO5~3zJ3_gcWXfJ
z$fNQ3`B_5Hf_rzCgW(SkpiHE<%)_elZuX!{Fnz7%)N(?sa{IK;xwAF1AS*!dS-EsC
zIS_exCt#SYr<{vQwxe2!yn-S$kSMBLEeJu258Kp`e#6>^wF>E-!bCe#aPDwOyF<Jg
z4YYuIgu8GQ?bErT-ApALoq~J&KsNeZ3?Z~M4f_h5ZTiU4AP6*)N0v1=QUl3?V3&fR
z!7<1qd88Q7<6!6#Zr378%4aV`Zy&h(S}M|V(wOi%cM{*UETERGcAS3Vr7r>|R)&^x
zdEG-U`?up0aKwB-T&Li!qqSm^M}FuOGLLj-0+Yi7q3Cr`X-70(Xe-c!YEE4rC5|+i
zZ2NVr(`VlofAh%rPvaq`XhS#`77WsG@ga}YOf+y!yP+SKUMLst%vrZ!=*a0GXe!0+
zgXxdvI3(%oyJhU&uy`u+Ir-XB)&9|rK#S8g^zsUjd2N+AqK?A$*ALVdq#QZHB#6KT
zkf9?}5JMf*kXRa>0L}-RLo1i{IqZ34kCr|3W`HZ|!fy0|_|@bTkdnnx|2MWgtM1JV
zNwl}$^`nV(u0nm^y4$lpoSIz^&uico(86X`QzI3SlD#onwUO_mR*au%gwu@<@uz+f
z&x*$Q>qEuiNYow$zO3dKVR}}2dY;y|&nTm?;)hK6+2WM&!x`jx<-+4^&=$??9`w0G
z|9K6B<y5<7Zp%-m)&M+HLq~!Zu$&YWDh*)*Kaqk+o*X0G#h~DN-VXlHzj@I-rM2(!
zNyuA*OyP=B+^v#OC^fhX1Qx<<Q&%Jc*K2fW`Gbgf`YJ*667CY~?3ebc)czRUP+~_w
z3MFU>0}+6v27KDom4W~LGJ6f<A)7h76?MaHz3F7dUI0Y)6lfe&EXx=Iq7Q(<SU}m9
z;jk_;He}8bVqM&P2_^*LY?-x5LZ6uR22uKBK=<#K!yxqj>(Phx(3Eb#^|O!gj?wX=
zL3f=mFv;NorY-z8H`kq*V8@$$pU2)vR!A!jb4zNBgyX%d1N8nepvQ17)Ba6M7*4Cd
zTF!vUlGmdwj0wN60ieg5^u(LT3=3KiB(@Tzc32)%3Sz|vR0LLh>EqkkYE|tATT7`y
zfff@Km@1MG*vy%PIPCi^6t!2Y3dhZcdj)v;%l-C=<mnV9KSz=R{y8B9z5pwP;)BT|
zab*MS;r4KW^T(j5SnZo`l8G!;oQ0Np5SHOz{R|jZ2aIw?MEZtSfi+(%S?k412tarp
znmIpHg9>5zfMEq>x1>VZB!Et8=-{B{bHCn!01POn1e5^X-&VUtfSZY>leF~K!0vav
zg&r<?lP_5Ed8H+rOK$>Ss}B~dqp~AgU1us1Wh^Bz?3{2u_h~6A`pTzriw{jnt-#_p
zZ^1kPV7n-wdy;}c)TJalnPiO0&MF@8BT5Em`!b%~Y}s`QIluh@l7z?+(-T8+AO}~M
z3t7itigjB>hD!Ps&lnP+wSV~z>QNdTu%ZB6woE?YA+pl<B2qU8VgVa&Wzk`K=Y=0G
z4S`BAgsl%NhJqHrK~FL08}c^i#IeyYOOR<OUOk{G-*dQgCxc$nO|!Vz?ki|sd{_|_
zj-wJh2-0fBAk3wJ5XGqLVTG;pQn|}<!4nclB)tcUz!>z6#@b0M{{C#?UldUbhObFM
zF_x4A)WG@P!+TPHfso9#q)Iub1o?xY=&%6kma}7dC`?LF#)n=D{WAI(&EI)ZyQ$(S
zA5tzZkA>G<Nu3m^q@`q#3T2RYpMrunA|1r6TLjRk07+E%+@uZrvH$uJf*5r3tywit
z(qG(Z^NJ(khoKFs$1=5BDao?a0)xE4$BvtdOy)kjE3Xom1q{3xNt_Mizr*lcO!tfK
z0$m0&<M^+m*t~y8j45kn#SznMG0hkgLfeAXw6zJ7ob;?J-f~kYF#&xco>AaaumR(c
zgcn)JAr-jFH~HD9Ae&iB?PnO8G5FGPVQ(MDg>~_wp*IxJEsqA$;=qPeJ)M?eKg44F
zp=rnu{jPg+Eb>^nt#4H%7=eLC!dcbh<PXPCKjo{iWLC2ckZ6LL48)Tx>{gSeF_vL0
z#IfL5At*r*Tskz9Asj^SRH}Kg?!KfQxQq|FA!Ct`BbAZoW@cbwVhe{Wgu~<t$TVSb
zh(Q|N%-4I5N0}7$|3<$G2IZ48N2<3K{*JPei3@F$K*BU*C}Sz;4MEJX(7a<6F{43i
zpKy(}56mEl6hq}CA}J{|HZ?XSB`A822ylC5xDpJ3h?!*Ea{WEtuw3GU{529-Li=3B
zP#!};H%@qrR*xN}y&5S~s^z4FMZ9badk~gHC<8O9KL=@)`Ds*NKvNwbC@`m_q_o}G
zuyTe!?X^jI3>oh3AO(e5XlOXGY6>L(V##0%+OSiwh;L2EVX$E9F2d@N@bBg2>rRum
z1HI1o+>UD_dlE|uHRLZ`9ofB=P=YbLZNy~)b=3%j89&v*q$sf6!&5dr*_hYd5wCEZ
zDH1%<rTk;aWS&uw1?naBN%Jr=6)@%JQAIJKM?!i8n2!)gbt;Y%lxR$`qg(<TY%;M?
zOqym=U%KDQ1_Es(*;SO#{3$e|Hh#VsbCADOiG2YJYE7}=Wu{cdk+)5?r8L6F;=@V1
zlh=r2bk=!!Y1+z4uMro+7lsdNC(HyY*URL17~>E#I^4D2$1~odNZ}0mmR2A4l85qZ
zS?T2um7R$zM4>nm^l><ki4j0l(lEyiwUrz9ER?UdxK-wX=p|ueD<b9bBc&kI84|!7
z5PTD<J}uL<AxKC3Aq<s1o;(9EHW2v$d@z$_CDH#Ae)|`Vvz6An2$^4Gxi4NKf?tT;
z%W$o{n4nk64+y}+ZxGMj%5-WS-1FqD9}Do2nBON(?tuQA1b5{Jz=2{wny`@-F~{}L
zok6`;vRw68OU>HM*#=i-GEk)Y<2qQ7ItRU^#o2bi&tQNv%emA+L)h(2Jo6XVyTxKM
zG3_R{?JKP2-}m&ObNP3JWicFk%J%dE%w1C(E)w4>cPaGt0I#&~!Y=VW6$g4GbEw9z
zH$qy^=u6%CT2|}znjP{iEu*-K-=YZ9*E%<*SC^_vN~&-yLpUQe)%Bi<Ic^7tz2{WH
z6O*_J{gR1HNesd-YMuz`kTj2Qc^U-m$Y!7tb|mkjRYQykl<A8IvYN($DBQIM>tb>T
zqUYSRjGvL8k})IG1ts;Wn;NE?JuiE%!o~6D7z!MnPmm$bX&PlU8(oNM&9kIPY>+=u
z#7FJv;^LjL;t)>i)Ypx|RfK)kM>AKi`*e-o&1(rQR0z|IOlav$7oUjfGz-wPzr*+q
zx$Wt`2yS}bX*-<gvOMMGovYJiWfOd7bws#PMt(M{b4}lp!T5bw&*1!Fk1h6e9-<i4
zLlMs)&w~SVSa49A`E0kAd1v!WC7f?<p`B953B4cjw?)3{eNQa*+Essf6aF)YU4LVf
zuiu+T!Z*&Pvb3VIgfLFEUAF(wOjSKZs)WWg9w@ps2|0~@A~Y~L2n`TU-Ye?%aM!GE
zvM_TT@~6H#h|CgtGHk_aDCFY$SEoONk<smwPO8YLo0BtbrnpOMdinv@x*YX`2XsD-
zC;Q+2BEBv2%d4oh8eueIjXGl!W{NuHEzZ~uO#a>6_*t^bPp&a~WYFZ|ott>H?@m3c
zIMhdos0jCYf}BevxfrYRa2WSte{%+p)f2P-Hk3Q6oY&`E$<$aqsUzgZN6nTF-7NhT
z&Y<OBh<BzG%H$<XvP=1GGqA7KB>EfM<O{*xd7k;K=DE*Y#iMRn1}|DC#`ZH`v4_##
zK!iK}3$EXMn?JJKmXH?znfAw!x=-0afP<aAl=4$cPDKZMfhzt`Pml86UZxo9?QFHj
z&z_AVAG`E;5hoMO%P<;wW#!olOG}gOxxXiMWRvk}CB(1s=8jtWwKGIr&*jEa`CP3B
z#<QMJs`>Qy3x!x^&S(Gme226-w2Jg(#D0{+QMdJI?<wiX{`(&n>NiUVia;BVL7L9E
z15o-J){CC8ebk=Cw((brqzlAgiLe?{B=7sf<_mhzTVLna!Lf#r3jXD^!WVU3HV%Bs
zUF(Tj%>s*Jx}|PU8*9_?PEc-py&RP~$upGsYwFRAubpqrXHFhJJ@)8vOFCa7=6lU?
z%6{8*R<MgZ#q*Jbelfw$%k^ZA{7q|@ZZc9eH$>+*;qyQK^qC?p%+;3}By~I=xhPT-
zlM)j@(v{$BC&r7o2!`8+n5l5jJMQf7&VKjecNA*0!Vq9%Q)3Rrimp6uKS<-V-d;m(
zs$`WG6@7cTyw`ZMCOGqeuHJEdQ-XqdJ?~dNrMY2u>G!Q0w};`jP`ZcFhTJYE!>i{6
ziDXw)?}xO%dw&QZis-?`K1U1^iJ9|31-rUw>NlH{#LpnEW4YRgzKi!WutQDX-b$ao
zxct^`*Y6i892~7W?=yH7RVGf}@ZK_p=)nDrO5-Ax2{C($NVcQzwwz)=kod7PHg+2J
z=*u5;-w)Jkb=}5Ip0bWvK0pz(&LgsC)(fGZKd%{XKr_d3znk$2Zzejg@t6N%Ou^P-
zE>v+8>CY$=b8WobF4_djDeU?uKJ?IcUPRTA+&r}37ofbeigabH-7JgVeQivcXJz%8
zR^%ZkGNgw|DR4}EJ0s;hD@jX7(7qhe);BiRo6Wr%zs|z^e&p(ntbKyQM~uinW4zj-
z+a8hTVH0aT;Xc01TVlGJM(@h!s%@mN9_V;KemNa=Fep@D+9vu0y;fO~8a+=`&EjY5
zlLBg2S5ETsBIJpyL*EL$eqf%k#neJcY3XxKBcC$lsgm|P?b1%$$QYgPe}BYrwHwV(
z3Old<j(ze<s>8+kV83&1qYpSKSxP*sSIQ^wS!SxvI=CZPlEU(?xYTDt1{GvyG;3@h
z@K3KsZF^|`BA%MrJrmUa)c%!?{o}^1&I<C(P0;vEnV(413U!5jR*Fw(@G8Rh(|f*V
z7GrPN{>pOgF+2OIjN7AFykN;VGEN?PECLlOw@S}m-D*?xtV17LC$t~Vja#47?cX<T
zjGmQ=d-p=7&t%8dv>&)Btg4!Lm<%R+T230I`y`KJ-_~6h7pH}%V^cOP>hLb(<9kmy
z%zdr6*}YUz`ZDA`-6wd}{Pg5*PQMZN<Inw);L9w&*E+9`(tfF?`Oa6x>fs^FYmy^P
z8n!wPp1eYCcqy5@<Fe(Q(L;QkXS+)_2(9**&`PN+I(*~j=-k>>g6X@)f9+bhui(9Q
z(jR9;Mk0$W_4)9AgiA{1^o4@__Npv?DT`9?RB7~Z28jEXJmO(Ab!IhGRw;|;@j_&|
zSjtMVW9Q~({@*8QDHN3WH1!e_OGKCI;Kaz^`rJz$P3cT;@e^8(1;!R%J<oQG7p)cI
zU{}0zUXJ*lv?|dab4hom^Lm@=IZ;Q|lQ;0JkE6zYi{nE&XIrUp2{ESJsi>{(j|H<9
z3NFtP@<lk5-L@!MM*k{O=k`Pcv-w03UyIjN;IjCZlM?dJx>fd?mFCGrz@oi);paK!
zqsNYBdU;H_<22!Bymu>pccH2>-yA?TxW?CXuDP$B6vY)}ncRw(lfGufL0eax|Gv=}
z4!D~fXb)$9fZ;dI{S0BZ-Bfa45v$P$e6%S*7Ru9JkXf&F){R3)4=3epvE4w^ar<8k
zj)zjA3)Bz_Qq1yYMUrIH?o9nrP5OI+5@3@UQ;9S8u^K*eZQEZmjBInkzl@g^nUkZz
zL+jd|E;e?>rN_s*8GkbS{X|Z2BPlImGgepS&KFAt3l#GK>r3y?@6k)ECN5Z{4i$e{
zH(7R{7IhBox;IbhyeSvYm}4XZX=zWJd=L_41X6TR^0lA)no(C}Hz7UmLh4Z`n?u!Z
z(YtX$o}QHMXUUoA(T4I1N>^PgyR*|7{TU)|Ds?xfrh;?;P6}&%A~V%$({Z2P1lwu3
bqXWsIKMd=&bvXq3*@NU|RHVzKOyU0rTkX@S


From fd860e6c6985cfa2469fc78ae4d784bdf9a9a473 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 4 Dec 2021 10:23:59 +0000
Subject: [PATCH 0952/1147] flip RFP newwin max values, closes #1286

---
 user.js | 15 +++++++--------
 1 file changed, 7 insertions(+), 8 deletions(-)

diff --git a/user.js b/user.js
index af8b477..cf9df45 100644
--- a/user.js
+++ b/user.js
@@ -8,7 +8,7 @@
 * README:
 
   1. Consider using Tor Browser if it meets your needs or fits your threat model
-       * https://www.torproject.org/about/torusers.html.en
+       * https://2019.www.torproject.org/about/torusers.html
   2. Required reading: Overview, Backing Up, Implementing, and Maintenance entries
        * https://github.com/arkenfox/user.js/wiki
   3. If you skipped step 2, return to step 2
@@ -479,7 +479,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * no unsafe renegotiations on the channel between the browser and the server.
  * [STATS] SSL Labs (July 2021) reports over 99% of sites have secure renegotiation [4]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
- * [2] https://tools.ietf.org/html/rfc5746
+ * [2] https://datatracker.ietf.org/doc/html/rfc5746
  * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
  * [4] https://www.ssllabs.com/ssl-pulse/ ***/
 user_pref("security.ssl.require_safe_negotiation", true);
@@ -1031,12 +1031,11 @@ user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs")
  * RFP also has a few side effects: mainly timezone is UTC0, and websites will prefer light theme
  * [1] https://bugzilla.mozilla.org/418986 ***/
 user_pref("privacy.resistFingerprinting", true);
-/* 4502: set new window sizes to round to hundreds [FF55+] [SETUP-CHROME]
- * Width will round down to multiples of 200s and height to 100s, to fit your screen.
- * The max values are a starting point to round from if you want some control
+/* 4502: set new window size rounding max values [FF55+]
+ * [SETUP-CHROME] sizes round down in hundreds: width to 200s and height to 100s, to fit your screen
  * [1] https://bugzilla.mozilla.org/1330882 ***/
-   // user_pref("privacy.window.maxInnerWidth", 1000);
-   // user_pref("privacy.window.maxInnerHeight", 1000);
+user_pref("privacy.window.maxInnerWidth", 1600);
+user_pref("privacy.window.maxInnerHeight", 900);
 /* 4503: disable mozAddonManager Web API [FF57+]
  * [NOTE] To allow extensions to work on AMO, you also need 2662
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
@@ -1221,7 +1220,7 @@ user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true]
  * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks
  * [TEST] https://arkenfox.github.io/TZP/tests/windownamea.html ***/
 user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true]
-/* 6050: prefsCleaner: reset previously active items removed from arkenfox FF91+ ***/
+/* 6050: prefsCleaner: reset previously active items removed from arkenfox FF92+ ***/
    // placeholder
 
 /*** [SECTION 7000]: DON'T BOTHER ***/

From 9d61992c8cc2a46fb58ea79866aced25e3574d9b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 5 Dec 2021 19:49:32 +0000
Subject: [PATCH 0953/1147] don't clear offlineApps on shutdown, #1291

- in v94 we switched to cookies lifetime as session, so users could use site exceptions to retain selected cookies (to stay logged in one assumes)
- that mean not deleting all cookies on shutdown
- but some login methods/types require more than cookies and also need the "site data" part of "cookies + site data" - that's the offlineApps part
- note: all site data (and cookies) is still cleared on close except site exceptions
---
 user.js | 9 +++++----
 1 file changed, 5 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index cf9df45..4087fc3 100644
--- a/user.js
+++ b/user.js
@@ -902,8 +902,9 @@ user_pref("privacy.clearOnShutdown.downloads", true); // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.formdata", true);  // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.history", true);   // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.sessions", true);  // [DEFAULT: true]
+user_pref("privacy.clearOnShutdown.offlineApps", false); // [DEFAULT: false]
 user_pref("privacy.clearOnShutdown.cookies", false);
-user_pref("privacy.clearOnShutdown.offlineApps", true);
+   // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false]
    // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false] Site Preferences
 /* 2812: reset default items to clear with Ctrl-Shift-Del (to match 2811) [SETUP-CHROME]
  * This dialog can also be accessed from the menu History>Clear Recent History
@@ -914,11 +915,11 @@ user_pref("privacy.cpd.cache", true);    // [DEFAULT: true]
 user_pref("privacy.cpd.formdata", true); // [DEFAULT: true]
 user_pref("privacy.cpd.history", true);  // [DEFAULT: true]
 user_pref("privacy.cpd.sessions", true); // [DEFAULT: true]
+user_pref("privacy.cpd.offlineApps", false); // [DEFAULT: false]
 user_pref("privacy.cpd.cookies", false);
-user_pref("privacy.cpd.offlineApps", true);
    // user_pref("privacy.cpd.downloads", true); // not used, see note above
-   // user_pref("privacy.cpd.passwords", false); // [DEFAULT: false] this is not listed
-   // user_pref("privacy.cpd.siteSettings", false); // [DEFAULT: false] Site Preferences
+   // user_pref("privacy.cpd.passwords", false); // [DEFAULT: false] not listed
+   // user_pref("privacy.cpd.siteSettings", false); // [DEFAULT: false]
 /* 2813: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
  * [NOTE] Not needed if Session Restore is not used (0102) or it is already cleared with history (2811)
  * [NOTE] privacy.clearOnShutdown.openWindows prevents resuming from crashes (also see 5008)

From ec595c3b95909998695a714e96dfcf2a29823ba1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 5 Dec 2021 19:59:33 +0000
Subject: [PATCH 0954/1147] fixup duplicate line

---
 user.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/user.js b/user.js
index 4087fc3..5f06eb4 100644
--- a/user.js
+++ b/user.js
@@ -905,7 +905,6 @@ user_pref("privacy.clearOnShutdown.sessions", true);  // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.offlineApps", false); // [DEFAULT: false]
 user_pref("privacy.clearOnShutdown.cookies", false);
    // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false]
-   // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false] Site Preferences
 /* 2812: reset default items to clear with Ctrl-Shift-Del (to match 2811) [SETUP-CHROME]
  * This dialog can also be accessed from the menu History>Clear Recent History
  * Firefox remembers your last choices. This will reset them when you start Firefox

From b60a888da3c9df3862b9dbaff1b1ac2621e67db2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 6 Dec 2021 14:45:47 +0000
Subject: [PATCH 0955/1147] update WebRTC, closes #1282

---
 user.js | 27 +++++++++++++++++----------
 1 file changed, 17 insertions(+), 10 deletions(-)

diff --git a/user.js b/user.js
index 5f06eb4..6064f03 100644
--- a/user.js
+++ b/user.js
@@ -631,18 +631,25 @@ user_pref("privacy.userContext.ui.enabled", true);
 /*** [SECTION 2000]: PLUGINS / MEDIA / WEBRTC ***/
 user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
 /* 2001: disable WebRTC (Web Real-Time Communication)
- * [SETUP-WEB] WebRTC can leak your private network address from behind your VPN, but if this
- * is not your threat model, and you want Real-Time Communication, this is the pref for you ***/
-user_pref("media.peerconnection.enabled", false);
-/* 2002: limit WebRTC private network address leaks
- * In FF70+ these settings match Mode 4 (Mode 3 in older versions) [3]
+ * Firefox uses mDNS hostname obfuscation on desktop (except Windows7/8) and the
+ * private IP is NEVER exposed, except if required in TRUSTED scenarios; i.e. after
+ * you grant device (microphone or camera) access
+ * [SETUP-HARDEN] Test first. Windows7/8 users only: behind a proxy who never use WebRTC
  * [TEST] https://browserleaks.com/webrtc
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1189041,1297416,1452713
- * [2] https://wiki.mozilla.org/Media/WebRTC/Privacy
- * [3] https://tools.ietf.org/html/draft-ietf-rtcweb-ip-handling-12#section-5.2 ***/
+ * [1] https://groups.google.com/g/discuss-webrtc/c/6stQXi72BEU/m/2FwZd24UAQAJ
+ * [2] https://datatracker.ietf.org/doc/html/draft-ietf-mmusic-mdns-ice-candidates#section-3.1.1 ***/
+   // user_pref("media.peerconnection.enabled", false);
+/* 2002: force WebRTC inside the proxy [FF70+] ***/
+user_pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true);
+/* 2003: force a single network interface for ICE candidates generation [FF42+]
+ * When using a system-wide proxy, it uses the proxy interface
+ * [1] https://developer.mozilla.org/en-US/docs/Web/API/RTCIceCandidate
+ * [2] https://wiki.mozilla.org/Media/WebRTC/Privacy ***/
 user_pref("media.peerconnection.ice.default_address_only", true);
-user_pref("media.peerconnection.ice.no_host", true); // [FF51+]
-user_pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true); // [FF70+]
+/* 2004: force exclusion of private IPs from ICE candidates [FF51+]
+ * [SETUP-HARDEN] This will protect your private IP even in TRUSTED scenarios after you
+ * grant device access, but often results in breakage on video-conferencing platforms ***/
+   // user_pref("media.peerconnection.ice.no_host", true);
 /* 2020: disable GMP (Gecko Media Plugins)
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
    // user_pref("media.gmp-provider.enabled", false);

From fec5168203edf80768d67fef3eda664b0c899cc6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 8 Dec 2021 04:28:47 +0000
Subject: [PATCH 0956/1147] 95 deprecated

---
 user.js | 12 ++++++++----
 1 file changed, 8 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 6064f03..69e0fae 100644
--- a/user.js
+++ b/user.js
@@ -370,9 +370,9 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
  * [1] https://bugzilla.mozilla.org/1642623 ***/
 user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
 /* 0807: disable location bar contextual suggestions [FF92+]
- * [SETTING] Privacy & Security>Address Bar>Contextual Suggestions
+ * [SETTING] Privacy & Security>Address Bar>Suggestions from...
  * [1] https://blog.mozilla.org/data/2021/09/15/data-and-firefox-suggest/ ***/
-user_pref("browser.urlbar.suggest.quicksuggest", false);
+user_pref("browser.urlbar.suggest.quicksuggest.nonsponsored", false); // [FF95+]
 user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false);
 /* 0808: disable tab-to-search [FF85+]
  * Alternatively, you can exclude on a per-engine basis by unchecking them in Options>Search
@@ -1363,11 +1363,11 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc
    // user_pref("full-screen-api.warning.timeout", 0);
 /* APPEARANCE ***/
    // user_pref("browser.download.autohideButton", false); // [FF57+]
-   // user_pref("ui.systemUsesDarkTheme", 1); // [FF67+] [HIDDEN PREF]
-      // 0=light, 1=dark: with RFP this only affects chrome
    // user_pref("toolkit.legacyUserProfileCustomizations.stylesheets", true); // [FF68+] allow userChrome/userContent
    // user_pref("ui.prefersReducedMotion", 1); // disable chrome animations [FF77+] [RESTART] [HIDDEN PREF]
       // 0=no-preference, 1=reduce: with RFP this only affects chrome
+   // user_pref("ui.systemUsesDarkTheme", 1); // [FF67+] [HIDDEN PREF]
+      // 0=light, 1=dark: with RFP this only affects chrome
 /* CONTENT BEHAVIOR ***/
    // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
    // user_pref("clipboard.autocopy", false); // disable autocopy default [LINUX]
@@ -1411,6 +1411,10 @@ user_pref("_user.js.parrot", "9999 syntax error: the parrot's shuffled off 'is m
 // 1402: limit font visibility (Windows, Mac, some Linux) [FF79+] - replaced by new 1402
    // [-] https://bugzilla.mozilla.org/1715507
    // user_pref("layout.css.font-visibility.level", 1);
+// FF95
+// 0807: disable location bar contextual suggestions [FF92+] - replaced by new 0807
+   // [-] https://bugzilla.mozilla.org/1735976
+user_pref("browser.urlbar.suggest.quicksuggest", false);
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 7e1b92567ca2bb76ad358d0fc786fd60b3cf7970 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 8 Dec 2021 12:13:47 +0000
Subject: [PATCH 0957/1147] 95 final

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 69e0fae..af1d2a6 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 24 November 2021
-* version 95-alpha
+* date: 8 December 2021
+* version 95
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 

From 72cc4d176ea08b4373e437f9f3f44e92da547c92 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 11:41:18 +0000
Subject: [PATCH 0958/1147] 0706: network.proxy.allow_bypass, closes #1292

---
 user.js | 10 ++++++++--
 1 file changed, 8 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index af1d2a6..c0993af 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 8 December 2021
-* version 95
+* date: 9 December 2021
+* version 96-alpha
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -327,6 +327,12 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
  * [SETUP-CHROME] If you use a proxy and you trust your extensions
  * [1] https://blog.mozilla.org/security/2021/10/25/securing-the-proxy-api-for-firefox-add-ons/ ***/
    // user_pref("network.proxy.failover_direct", false);
+/* 0706: disable proxy bypass for system request failures [FF95+]
+ * RemoteSettings, UpdateService, Telemetry [1]
+ * [WARNING] If false, this will break the fallback for some security features
+ * [SETUP-CHROME] If you use a proxy and you understand the security impact
+ * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1732792,1733994,1733481 ***/
+   // user_pref("network.proxy.allow_bypass", false); // [HIDDEN PREF]
 /* 0710: disable DNS-over-HTTPS (DoH) rollout [FF60+]
  * 0=off by default, 2=TRR (Trusted Recursive Resolver) first, 3=TRR only, 5=explicitly off
  * see "doh-rollout.home-region": USA Feb 2020, Canada July 2021 [3]

From fe75baa79f407c2dd2368c4170265c10f0904da9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 11:44:51 +0000
Subject: [PATCH 0959/1147] move DNT to DON'T BOTHER

---
 user.js | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index c0993af..3784ca6 100644
--- a/user.js
+++ b/user.js
@@ -612,10 +612,6 @@ user_pref("network.http.referer.XOriginPolicy", 2);
 /* 1602: control the amount of cross-origin information to send [FF52+]
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
-/* 1603: enable the DNT (Do Not Track) HTTP header
- * [NOTE] DNT is enforced with Enhanced Tracking Protection (2710)
- * [SETTING] Privacy & Security>Enhanced Tracking Protection>Send websites a "Do Not Track" signal... ***/
-   // user_pref("privacy.donottrackheader.enabled", true);
 
 /*** [SECTION 1700]: CONTAINERS
    Check out Temporary Containers [2], read the article [3], and visit the wiki/repo [4]
@@ -1318,6 +1314,9 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] It can compromise security. System addons ship with prefs, use those ***/
    // user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
    // user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
+/* 7015: enable the DNT (Do Not Track) HTTP header
+ * [WHY] DNT is enforced with Tracking Protection (2710) ***/
+   // user_pref("privacy.donottrackheader.enabled", true);
 
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good

From f7bba92c71cc71455b0128fc4f4c739eae1cca16 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 12:28:45 +0000
Subject: [PATCH 0960/1147] cleanout FPI section

farewell parrot
---
 user.js | 39 ++-------------------------------------
 1 file changed, 2 insertions(+), 37 deletions(-)

diff --git a/user.js b/user.js
index 3784ca6..e1475cc 100644
--- a/user.js
+++ b/user.js
@@ -941,45 +941,10 @@ user_pref("privacy.cpd.cookies", false);
  * which will display a blank value, and are not guaranteed to work ***/
 user_pref("privacy.sanitize.timeSpan", 0);
 
-/*** [SECTION 4000]: FPI (FIRST PARTY ISOLATION)
-   1278037 - indexedDB (FF51+)
-   1277803 - favicons (FF52+)
-   1264562 - OCSP cache (FF52+)
-   1268726 - Shared Workers (FF52+)
-   1316283 - SSL session cache (FF52+)
-   1317927 - media cache (FF53+)
-   1323644 - HSTS and HPKP (FF54+)
-   1334690 - HTTP Alternative Services (FF54+)
-   1334693 - SPDY/HTTP2 (FF55+)
-   1337893 - DNS cache (FF55+)
-   1344170 - blob: URI (FF55+)
-   1300671 - data:, about: URLs (FF55+)
-   1473247 - IP addresses (FF63+)
-   1542309 - top-level domain URLs when host is in the public suffix list (FF68+)
-   1506693 - pdfjs range-based requests (FF68+)
-   1330467 - site permissions (FF69+)
-   1534339 - IPv6 (FF73+)
-   1721858 - WebSocket (FF92+)
-***/
+/*** [SECTION 4000]: FPI (FIRST PARTY ISOLATION) ***/
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
-/* 4001: enable First Party Isolation [FF51+]
- * [SETUP-WEB] Breaks some cross-origin logins
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1260931,1299996 ***/
+/* 4001: enable First Party Isolation [FF51+] ***/
 user_pref("privacy.firstparty.isolate", true);
-/* 4002: enforce FPI restriction for window.opener [FF54+]
- * [NOTE] Setting this to false may reduce the breakage in 4001
- * FF65+ blocks postMessage with targetOrigin "*" if originAttributes don't match. But
- * to reduce breakage it ignores the 1st-party domain (FPD) originAttribute [2][3]
- * The 2nd pref removes that limitation and will only allow communication if FPDs also match
- * [1] https://bugzilla.mozilla.org/1319773#c22
- * [2] https://bugzilla.mozilla.org/1492607
- * [3] https://developer.mozilla.org/docs/Web/API/Window/postMessage ***/
-   // user_pref("privacy.firstparty.isolate.restrict_opener_access", true); // [DEFAULT: true]
-   // user_pref("privacy.firstparty.isolate.block_post_message", true);
-/* 4003: enable scheme with FPI [FF78+]
- * [NOTE] Experimental: existing data and site permissions are incompatible
- * and some site exceptions may not work e.g. HTTPS-only mode (1244) ***/
-   // user_pref("privacy.firstparty.isolate.use_site", true);
 
 /*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
    RFP covers a wide range of ongoing fingerprinting solutions.

From 97322d6e8bcf5082cfee601e480c520f0008a422 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 12:31:38 +0000
Subject: [PATCH 0961/1147] various inactive FPI prefs

---
 scratchpad-scripts/arkenfox-clear-removed.js | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index cc8d330..17e39e2 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -13,6 +13,10 @@
 
   const aPREFS = [
     /* removed in arkenfox user.js */
+    /* 92+ */
+    'privacy.firstparty.isolate.block_post_message',
+    'privacy.firstparty.isolate.restrict_opener_access',
+    'privacy.firstparty.isolate.use_site',
     /* 79-91 */
     'alerts.showFavicons',
     'browser.newtabpage.activity-stream.asrouter.providers.snippets',

From 0634a568efeca4d837a34dae47b1a3b14c85dccd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 13:45:46 +0000
Subject: [PATCH 0962/1147] remove redundant site data prefs

we've never used these
- service workers are disabled (or soon to be covered by dFPI when enabled) and sanitizing is already done (or will be done via enhanced cookie cleaning)
- storage API, storage access API: we sanitize on close, and sites are isolated by eTLD+1
---
 user.js | 15 ---------------
 1 file changed, 15 deletions(-)

diff --git a/user.js b/user.js
index e1475cc..f26212d 100644
--- a/user.js
+++ b/user.js
@@ -856,21 +856,6 @@ user_pref("privacy.trackingprotection.enabled", true);
 user_pref("privacy.trackingprotection.socialtracking.enabled", true);
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
-/* 2740: disable service worker cache and cache storage
- * [NOTE] We clear service worker cache on exit (2811)
- * [1] https://w3c.github.io/ServiceWorker/#privacy ***/
-   // user_pref("dom.caches.enabled", false);
-/* 2750: disable Storage API [FF51+]
- * The API gives sites the ability to find out how much space they can use, how much
- * they are already using, and even control whether or not they need to be alerted
- * before the user agent disposes of site data in order to make room for other things.
- * [1] https://developer.mozilla.org/docs/Web/API/StorageManager
- * [2] https://developer.mozilla.org/docs/Web/API/Storage_API
- * [3] https://blog.mozilla.org/l10n/2017/03/07/firefox-l10n-report-aurora-54/ ***/
-   // user_pref("dom.storageManager.enabled", false);
-/* 2755: disable Storage Access API [FF65+]
- * [1] https://developer.mozilla.org/docs/Web/API/Storage_Access_API ***/
-   // user_pref("dom.storage_access.enabled", false);
 /* 2760: enable Local Storage Next Generation (LSNG) [FF65+] ***/
 user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 

From 83602baa38e70bf8a4a87837ab1cc5f5cff87bf8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 13:47:57 +0000
Subject: [PATCH 0963/1147] misc site storage/data prefs

been inactive since jesus was a baby
---
 scratchpad-scripts/arkenfox-clear-removed.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index 17e39e2..b78cc94 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -14,6 +14,9 @@
   const aPREFS = [
     /* removed in arkenfox user.js */
     /* 92+ */
+    'dom.caches.enabled',
+    'dom.storageManager.enabled',
+    'dom.storage_access.enabled',
     'privacy.firstparty.isolate.block_post_message',
     'privacy.firstparty.isolate.restrict_opener_access',
     'privacy.firstparty.isolate.use_site',

From 1fc43574d6cb0a229892738d7b9117a4e4f1fa2c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 14:00:21 +0000
Subject: [PATCH 0964/1147] move "cookie" permission info into 2801

---
 user.js | 18 ++++--------------
 1 file changed, 4 insertions(+), 14 deletions(-)

diff --git a/user.js b/user.js
index f26212d..298366f 100644
--- a/user.js
+++ b/user.js
@@ -54,7 +54,7 @@
   2300: WEB WORKERS
   2400: DOM (DOCUMENT OBJECT MODEL)
   2600: MISCELLANEOUS
-  2700: PERSISTENT STORAGE
+  2700: ETP (ENHANCED TRACKING PROTECTION)
   2800: SHUTDOWN & SANITIZING
   4000: FPI (FIRST PARTY ISOLATION)
   4500: RFP (RESIST FINGERPRINTING)
@@ -819,19 +819,7 @@ user_pref("extensions.postDownloadThirdPartyPrompt", false);
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
    // user_pref("extensions.webextensions.restrictedDomains", "");
 
-/*** [SECTION 2700]: PERSISTENT STORAGE
-   Data SET by websites including
-          cookies : profile\cookies.sqlite
-     localStorage : profile\webappsstore.sqlite
-        indexedDB : profile\storage\default
-   serviceWorkers :
-
-   [NOTE] indexedDB and serviceWorkers are not available in Private Browsing Mode
-   [NOTE] Blocking cookies also blocks websites access to: localStorage (incl. sessionStorage),
-   indexedDB, sharedWorker, and serviceWorker (and therefore service worker cache and notifications)
-   If you set a site exception for cookies (either "Allow" or "Allow for Session") then they become
-   accessible to websites except shared/service workers where the cookie setting must be "Allow"
-***/
+/*** [SECTION 2700]: ETP (Enhanced Tracking Protection) ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 /* 2701: disable or isolate 3rd-party cookies and site-data [SETUP-WEB]
  * 0 = Accept cookies and site data
@@ -864,6 +852,8 @@ user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!"
 /** COOKIES + SITE DATA : ALLOWS EXCEPTIONS ***/
 /* 2801: delete cookies and site data on exit
  * 0=keep until they expire (default), 2=keep until you close Firefox
+ * [NOTE] A "cookie" permission also controls localStorage/sessionStorage, idexedDB.
+ * sharedWorkers and serviceWorkers required an `Allow` permission
  * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow
  *   If using FPI the syntax must be https://example.com/^firstPartyDomain=example.com

From 5d508e42422ab910dfd3155f223f0a0cab216808 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 14:05:47 +0000
Subject: [PATCH 0965/1147] move LSNG to don't touch

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 298366f..580d006 100644
--- a/user.js
+++ b/user.js
@@ -844,8 +844,6 @@ user_pref("privacy.trackingprotection.enabled", true);
 user_pref("privacy.trackingprotection.socialtracking.enabled", true);
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
-/* 2760: enable Local Storage Next Generation (LSNG) [FF65+] ***/
-user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
@@ -1169,6 +1167,8 @@ user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true]
  * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks
  * [TEST] https://arkenfox.github.io/TZP/tests/windownamea.html ***/
 user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true]
+/* 0607: enforce Local Storage Next Generation (LSNG) [FF65+] ***/
+user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 /* 6050: prefsCleaner: reset previously active items removed from arkenfox FF92+ ***/
    // placeholder
 

From de28689e76f16820f4e34acb3fc850b2b47418df Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 14:13:39 +0000
Subject: [PATCH 0966/1147] flip from FPI to dFPI

I will tidy and expand 2700 entries later
---
 user.js | 52 ++++++++++++++++++++--------------------------------
 1 file changed, 20 insertions(+), 32 deletions(-)

diff --git a/user.js b/user.js
index 580d006..d00c8e5 100644
--- a/user.js
+++ b/user.js
@@ -56,7 +56,6 @@
   2600: MISCELLANEOUS
   2700: ETP (ENHANCED TRACKING PROTECTION)
   2800: SHUTDOWN & SANITIZING
-  4000: FPI (FIRST PARTY ISOLATION)
   4500: RFP (RESIST FINGERPRINTING)
   5000: OPTIONAL OPSEC
   5500: OPTIONAL HARDENING
@@ -819,31 +818,14 @@ user_pref("extensions.postDownloadThirdPartyPrompt", false);
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
    // user_pref("extensions.webextensions.restrictedDomains", "");
 
-/*** [SECTION 2700]: ETP (Enhanced Tracking Protection) ***/
+/*** [SECTION 2700]: ETP (ENHANCED TRACKING PROTECTION) ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
-/* 2701: disable or isolate 3rd-party cookies and site-data [SETUP-WEB]
- * 0 = Accept cookies and site data
- * 1 = (Block) All third-party cookies
- * 2 = (Block) All cookies
- * 3 = (Block) Cookies from unvisited websites
- * 4 = (Block) Cross-site tracking cookies (default)
- * 5 = (Isolate All) Cross-site cookies (TCP: Total Cookie Protection / dFPI: dynamic FPI) [1] (FF86+)
- * Option 5 with FPI enabled (4001) is ignored and not shown, and option 4 used instead
- * [NOTE] You can set cookie exceptions under site permissions or use an extension
- * [NOTE] Enforcing category to custom ensures ETP related prefs are always honored
- * [SETTING] Privacy & Security>Enhanced Tracking Protection>Custom>Cookies
- * [1] https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/ ***/
-user_pref("network.cookie.cookieBehavior", 1);
-user_pref("browser.contentblocking.category", "custom");
-/* 2710: enable Enhanced Tracking Protection (ETP) in all windows
- * [SETTING] Privacy & Security>Enhanced Tracking Protection>Custom>Tracking content
+/* 2701: enable Enhanced Tracking Protection's (ETP) Strict Mode [FF86+]
+ * Strict Mode enables Total Cookie Protection (dFPI /dynamic FPI)
+ * [1] https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/
  * [SETTING] to add site exceptions: Urlbar>ETP Shield
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Enhanced Tracking Protection>Manage Exceptions ***/
-user_pref("privacy.trackingprotection.enabled", true);
-/* 2711: enable various ETP lists ***/
-user_pref("privacy.trackingprotection.socialtracking.enabled", true);
-   // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
-   // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
+user_pref("browser.contentblocking.category", "strict");
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
@@ -914,11 +896,6 @@ user_pref("privacy.cpd.cookies", false);
  * which will display a blank value, and are not guaranteed to work ***/
 user_pref("privacy.sanitize.timeSpan", 0);
 
-/*** [SECTION 4000]: FPI (FIRST PARTY ISOLATION) ***/
-user_pref("_user.js.parrot", "4000 syntax error: the parrot's pegged out");
-/* 4001: enable First Party Isolation [FF51+] ***/
-user_pref("privacy.firstparty.isolate", true);
-
 /*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
    RFP covers a wide range of ongoing fingerprinting solutions.
    It is an all-or-nothing buy in: you cannot pick and choose what parts you want
@@ -1169,6 +1146,10 @@ user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true]
 user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true]
 /* 0607: enforce Local Storage Next Generation (LSNG) [FF65+] ***/
 user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
+/* 6008: enforce no First Party Isolation [FF51+]
+ * [WARNING] FPI is no longer supported and is replaced by network partitioning (FF85+)
+ * and dFPI (2701), and enabling FPI disables those ***/
+user_pref("privacy.firstparty.isolate", false); // [DEFAULT: false]
 /* 6050: prefsCleaner: reset previously active items removed from arkenfox FF92+ ***/
    // placeholder
 
@@ -1210,8 +1191,8 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
    // user_pref("security.tls.version.max", 4);
 /* 7005: disable SSL session IDs [FF36+]
- * [WHY] Passive fingerprinting and perf costs. These are session-only and isolated
- * with network partitioning (FF85+) or when using FPI and/or containers ***/
+ * [WHY] Passive fingerprinting and perf costs. These are session-only
+ * and isolated with network partitioning (FF85+) and/or containers ***/
    // user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
 /* 7006: onions
  * [WHY] Firefox doesn't support hidden services. Use Tor Browser ***/
@@ -1234,7 +1215,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("network.http.spdy.enabled.http2", false);
    // user_pref("network.http.spdy.websockets", false); // [FF65+]
 /* 7010: disable HTTP Alternative Services [FF37+]
- * [WHY] Already isolated by network partitioning (FF85+) or FPI ***/
+ * [WHY] Already isolated by network partitioning (FF85+) ***/
    // user_pref("network.http.altsvc.enabled", false);
    // user_pref("network.http.altsvc.oe", false); // [DEFAULT: false FF94+]
 /* 7011: disable website control over browser right-click context menu
@@ -1255,8 +1236,15 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("extensions.systemAddon.update.enabled", false); // [FF62+]
    // user_pref("extensions.systemAddon.update.url", ""); // [FF44+]
 /* 7015: enable the DNT (Do Not Track) HTTP header
- * [WHY] DNT is enforced with Tracking Protection (2710) ***/
+ * [WHY] DNT is enforced with Tracking Protection which is used in ETP Strict (2701) ***/
    // user_pref("privacy.donottrackheader.enabled", true);
+/* 7016: customize ETP settings
+ * [WHY] Just use strict which sets these at runtime (2701) ***/
+   // user_pref("network.cookie.cookieBehavior", 5);
+   // user_pref("privacy.trackingprotection.enabled", true);
+   // user_pref("privacy.trackingprotection.socialtracking.enabled", true);
+   // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
+   // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
 
 /*** [SECTION 8000]: DON'T BOTHER: NON-RFP
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good

From 4d5abd6cc39ab67a52578c7849e1076198009925 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 14:18:25 +0000
Subject: [PATCH 0967/1147] tweak 8000 title

lets not encourage non-RFP users to see this as a sign to use them
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index d00c8e5..12dfb76 100644
--- a/user.js
+++ b/user.js
@@ -61,7 +61,7 @@
   5500: OPTIONAL HARDENING
   6000: DON'T TOUCH
   7000: DON'T BOTHER
-  8000: DON'T BOTHER: NON-RFP
+  8000: DON'T BOTHER: FINGERPRINTING
   9000: PERSONAL
   9999: DEPRECATED / REMOVED / LEGACY / RENAMED
 
@@ -1246,7 +1246,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
 
-/*** [SECTION 8000]: DON'T BOTHER: NON-RFP
+/*** [SECTION 8000]: DON'T BOTHER: FINGERPRINTING
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good
    [WARNING] DO NOT USE with RFP. RFP already covers these and they can interfere
 ***/

From 8860c90abf5c1fb0f87661c3327ae4e75992be13 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 14:31:41 +0000
Subject: [PATCH 0968/1147] make service workers inactive

currently 3rd party service workers are blocked in FF95 when dFPI is enabled (which this version has should anyone update to 96-alpha)
   - but I get an error even on first party - https://arkenfox.github.io/TZP/tzp.html#storage
   - I get : service worker | test : enabled | failed: SecurityError
in FF96+ service workers they are covered by dFPI
  - see https://bugzilla.mozilla.org/show_bug.cgi?id=1731999
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 12dfb76..8e93194 100644
--- a/user.js
+++ b/user.js
@@ -698,7 +698,7 @@ user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
  * service worker notifications (2304), push notifications (disabled, 2305) and service worker
  * cache (2740). If you enable this pref, then check those settings as well
  * [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1320796#c7 ***/
-user_pref("dom.serviceWorkers.enabled", false);
+   // user_pref("dom.serviceWorkers.enabled", false);
 /* 2304: disable Web Notifications
  * [NOTE] Web Notifications can also use service workers (2302) and are behind a prompt (7002)
  * [1] https://developer.mozilla.org/docs/Web/API/Notifications_API ***/

From d5bc6715cd3d416b5c09af6be8d5a561df9de19a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 16:14:36 +0000
Subject: [PATCH 0969/1147] remove web workers section

farewell parrot
---
 user.js | 67 ++++++++++++++++++---------------------------------------
 1 file changed, 21 insertions(+), 46 deletions(-)

diff --git a/user.js b/user.js
index 8e93194..aca695b 100644
--- a/user.js
+++ b/user.js
@@ -51,7 +51,6 @@
   1600: HEADERS / REFERERS
   1700: CONTAINERS
   2000: PLUGINS / MEDIA / WEBRTC
-  2300: WEB WORKERS
   2400: DOM (DOCUMENT OBJECT MODEL)
   2600: MISCELLANEOUS
   2700: ETP (ENHANCED TRACKING PROTECTION)
@@ -675,46 +674,6 @@ user_pref("media.eme.enabled", false);
  * [1] https://support.mozilla.org/questions/1293231 ***/
 user_pref("media.autoplay.blocking_policy", 2);
 
-/*** [SECTION 2300]: WEB WORKERS
-   A worker is a JS "background task" running in a global context, i.e. it is different from
-   the current window. Workers can spawn new workers (must be the same origin & scheme),
-   including service and shared workers. Shared workers can be utilized by multiple scripts and
-   communicate between browsing contexts (windows/tabs/iframes) and can even control your cache.
-
-   [1]    Web Workers: https://developer.mozilla.org/docs/Web/API/Web_Workers_API
-   [2]         Worker: https://developer.mozilla.org/docs/Web/API/Worker
-   [3] Service Worker: https://developer.mozilla.org/docs/Web/API/Service_Worker_API
-   [4]   SharedWorker: https://developer.mozilla.org/docs/Web/API/SharedWorker
-   [5]   ChromeWorker: https://developer.mozilla.org/docs/Web/API/ChromeWorker
-   [6]  Notifications: https://support.mozilla.org/questions/1165867#answer-981820
-***/
-user_pref("_user.js.parrot", "2300 syntax error: the parrot's off the twig!");
-/* 2302: disable service workers [FF32, FF44-compat]
- * Service workers essentially act as proxy servers that sit between web apps, and the
- * browser and network, are event driven, and can control the web page/site they are associated
- * with, intercepting and modifying navigation and resource requests, and caching resources.
- * [NOTE] Service workers require HTTPS, have no DOM access, and are not supported in PB mode [1]
- * [SETUP-WEB] Disabling service workers will break some sites. This pref is required true for
- * service worker notifications (2304), push notifications (disabled, 2305) and service worker
- * cache (2740). If you enable this pref, then check those settings as well
- * [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1320796#c7 ***/
-   // user_pref("dom.serviceWorkers.enabled", false);
-/* 2304: disable Web Notifications
- * [NOTE] Web Notifications can also use service workers (2302) and are behind a prompt (7002)
- * [1] https://developer.mozilla.org/docs/Web/API/Notifications_API ***/
-   // user_pref("dom.webnotifications.enabled", false); // [FF22+]
-   // user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
-/* 2305: disable Push Notifications [FF44+]
- * Push is an API that allows websites to send you (subscribed) messages even when the site
- * isn't loaded, by pushing messages to your userAgentID through Mozilla's Push Server
- * [NOTE] Push requires service workers (2302) to subscribe to and display, and is behind
- * a prompt (7002). Disabling service workers alone doesn't stop Firefox polling the
- * Mozilla Push Server. To remove all subscriptions, reset your userAgentID.
- * [1] https://support.mozilla.org/kb/push-notifications-firefox
- * [2] https://developer.mozilla.org/docs/Web/API/Push_API ***/
-user_pref("dom.push.enabled", false);
-   // user_pref("dom.push.userAgentID", "");
-
 /*** [SECTION 2400]: DOM (DOCUMENT OBJECT MODEL) ***/
 user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");
 /* 2401: disable "Confirm you want to leave" dialog on page close
@@ -728,6 +687,19 @@ user_pref("dom.disable_window_move_resize", true);
 user_pref("dom.disable_open_during_load", true);
 /* 2404: limit events that can cause a popup [SETUP-WEB] ***/
 user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
+/* 2410: disable Web Notifications
+ * [NOTE] Web Notifications are behind a prompt (7002) ***/
+   // user_pref("dom.webnotifications.enabled", false); // [FF22+]
+   // user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
+/* 2411: disable Push Notifications [FF44+]
+ * Push allows websites to send you subscribed messages through Mozilla's Push Server,
+ * and requires service workers to subscribe to and display, and is behind a prompt (7002)
+ * [NOTE] Disabling service workers alone doesn't stop Firefox polling the Mozilla Push Server
+ * [NOTE] To remove all subscriptions, reset your userAgentID
+ * [1] https://support.mozilla.org/kb/push-notifications-firefox
+ * [2] https://developer.mozilla.org/docs/Web/API/Push_API ***/
+user_pref("dom.push.enabled", false);
+   // user_pref("dom.push.userAgentID", "");
 
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
@@ -821,7 +793,7 @@ user_pref("extensions.postDownloadThirdPartyPrompt", false);
 /*** [SECTION 2700]: ETP (ENHANCED TRACKING PROTECTION) ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 /* 2701: enable Enhanced Tracking Protection's (ETP) Strict Mode [FF86+]
- * Strict Mode enables Total Cookie Protection (dFPI /dynamic FPI)
+ * [NOTE] ETP Strict Mode enables Total Cookie Protection (TCP)
  * [1] https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/
  * [SETTING] to add site exceptions: Urlbar>ETP Shield
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Enhanced Tracking Protection>Manage Exceptions ***/
@@ -833,7 +805,7 @@ user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!"
 /* 2801: delete cookies and site data on exit
  * 0=keep until they expire (default), 2=keep until you close Firefox
  * [NOTE] A "cookie" permission also controls localStorage/sessionStorage, idexedDB.
- * sharedWorkers and serviceWorkers required an `Allow` permission
+ * sharedWorkers and serviceWorkers require an `Allow` permission
  * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow
  *   If using FPI the syntax must be https://example.com/^firstPartyDomain=example.com
@@ -1147,8 +1119,8 @@ user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true]
 /* 0607: enforce Local Storage Next Generation (LSNG) [FF65+] ***/
 user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 /* 6008: enforce no First Party Isolation [FF51+]
- * [WARNING] FPI is no longer supported and is replaced by network partitioning (FF85+)
- * and dFPI (2701), and enabling FPI disables those ***/
+ * [WARNING] Replaced with network partitioning (FF85+) and TCP (2701),
+ * and enabling FPI disables those. FPI is no longer maintained ***/
 user_pref("privacy.firstparty.isolate", false); // [DEFAULT: false]
 /* 6050: prefsCleaner: reset previously active items removed from arkenfox FF92+ ***/
    // placeholder
@@ -1215,7 +1187,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("network.http.spdy.enabled.http2", false);
    // user_pref("network.http.spdy.websockets", false); // [FF65+]
 /* 7010: disable HTTP Alternative Services [FF37+]
- * [WHY] Already isolated by network partitioning (FF85+) ***/
+ * [WHY] Already isolated with network partitioning (FF85+) ***/
    // user_pref("network.http.altsvc.enabled", false);
    // user_pref("network.http.altsvc.oe", false); // [DEFAULT: false FF94+]
 /* 7011: disable website control over browser right-click context menu
@@ -1245,6 +1217,9 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("privacy.trackingprotection.socialtracking.enabled", true);
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
+/* 7017: disable service workers [FF32, FF44-compat]
+ * [WHY] Already isolated (FF96+) with TCP (2701) or blocked in 3rd parties (FF95 or lower) ***/
+   // user_pref("dom.serviceWorkers.enabled", false);
 
 /*** [SECTION 8000]: DON'T BOTHER: FINGERPRINTING
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good

From d9f49bdf1fc7950bbaeb1882ee9e0d0fef31b9f9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 16:17:53 +0000
Subject: [PATCH 0970/1147] make 7017 clearer

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index aca695b..2c216a7 100644
--- a/user.js
+++ b/user.js
@@ -1218,7 +1218,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
 /* 7017: disable service workers [FF32, FF44-compat]
- * [WHY] Already isolated (FF96+) with TCP (2701) or blocked in 3rd parties (FF95 or lower) ***/
+ * [WHY] Already isolated (FF96+) with TCP (2701) or blocked with TCP in 3rd parties (FF95 or lower) ***/
    // user_pref("dom.serviceWorkers.enabled", false);
 
 /*** [SECTION 8000]: DON'T BOTHER: FINGERPRINTING

From ec7cb6a491feced2ab2f89880fc3c0538dbdf130 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 9 Dec 2021 17:17:52 +0000
Subject: [PATCH 0971/1147] 2702: partition service workers

---
 user.js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 2c216a7..63579c1 100644
--- a/user.js
+++ b/user.js
@@ -798,6 +798,8 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * [SETTING] to add site exceptions: Urlbar>ETP Shield
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Enhanced Tracking Protection>Manage Exceptions ***/
 user_pref("browser.contentblocking.category", "strict");
+/* 2702: enable state partitioning of service workers [FF96+] ***/
+user_pref("privacy.partition.serviceWorkers", true);
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
@@ -1218,7 +1220,8 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
 /* 7017: disable service workers [FF32, FF44-compat]
- * [WHY] Already isolated (FF96+) with TCP (2701) or blocked with TCP in 3rd parties (FF95 or lower) ***/
+ * [WHY] Already isolated (FF96+) with TCP (2701) behind a pref (2702)
+ * or blocked with TCP in 3rd parties (FF95 or lower) ***/
    // user_pref("dom.serviceWorkers.enabled", false);
 
 /*** [SECTION 8000]: DON'T BOTHER: FINGERPRINTING

From 13e5fe17b195ac1e6aa04e57fdca9052f2cfee0e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 11 Dec 2021 06:56:43 +0000
Subject: [PATCH 0972/1147] remove rfpalts (#1288)

---
 updater.bat | 11 ++---------
 1 file changed, 2 insertions(+), 9 deletions(-)

diff --git a/updater.bat b/updater.bat
index a806ca6..badd778 100644
--- a/updater.bat
+++ b/updater.bat
@@ -3,10 +3,10 @@ TITLE arkenfox user.js updater
 
 REM ## arkenfox user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.14
+REM ## version: 4.15
 REM ## instructions: https://github.com/arkenfox/user.js/wiki/3.3-Updater-Scripts
 
-SET v=4.14
+SET v=4.15
 
 VERIFY ON
 CD /D "%~dp0"
@@ -23,7 +23,6 @@ IF /I "%~1"=="-merge" (SET _merge=1)
 IF /I "%~1"=="-updatebatch" (SET _updateb=1)
 IF /I "%~1"=="-singlebackup" (SET _singlebackup=1)
 IF /I "%~1"=="-esr" (SET _esr=1)
-IF /I "%~1"=="-rfpalts" (SET _rfpalts=1)
 SHIFT
 GOTO parse
 :endparse
@@ -141,10 +140,6 @@ IF EXIST user.js.new (DEL /F "user.js.new")
 CALL :message "Retrieving latest user.js file from github repository..."
 CALL :psdownload https://raw.githubusercontent.com/arkenfox/user.js/master/user.js "user.js.new"
 IF EXIST user.js.new (
-	IF DEFINED _rfpalts (
-		CALL :message "Activating RFP Alternatives section..."
-		CALL :activate user.js.new "[SETUP-non-RFP]"
-	)
 	IF DEFINED _esr (
 		CALL :message "Activating ESR section..."
 		CALL :activate user.js.new ".x still uses all the following prefs"
@@ -320,8 +315,6 @@ ECHO:     Run without user input.
 CALL :message "  -singleBackup"
 ECHO:     Use a single backup file and overwrite it on new updates, instead of
 ECHO:     cumulative backups. This was the default behaviour before v4.3.
-CALL :message "  -rfpAlts"
-ECHO:     Activate RFP Alternatives section
 CALL :message "  -updateBatch"
 ECHO:     Update the script itself on execution, before the normal routine.
 CALL :message ""

From 1f0dc1853df76853f6559a2ddc99a4b98db76ea3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 11 Dec 2021 09:13:09 +0000
Subject: [PATCH 0973/1147] merge scratchpads into one

---
 scratchpad-scripts/arkenfox-clear-removed.js | 202 ++++++++++++++++++-
 1 file changed, 199 insertions(+), 3 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-clear-removed.js
index b78cc94..d928daf 100644
--- a/scratchpad-scripts/arkenfox-clear-removed.js
+++ b/scratchpad-scripts/arkenfox-clear-removed.js
@@ -1,7 +1,9 @@
 /***
-  This will reset the preferences that have been removed completely from the arkenfox user.js.
+  This will reset the preferences that have been
+  - removed from the arkenfox user.js.
+  - deprecated by Mozilla but used in the arkenfox user.js in the past
 
-  Last updated: 29-August-2021
+  Last updated: 11-December-2021
 
   For instructions see:
   https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
@@ -12,7 +14,201 @@
   if ('undefined' === typeof(Services)) return alert('about:config needs to be the active tab!');
 
   const aPREFS = [
-    /* removed in arkenfox user.js */
+    /* DEPRECATED */
+    /* FF92+ */
+    'browser.urlbar.suggest.quicksuggest', // 95
+    'layout.css.font-visibility.level', // 94
+    'security.ssl3.rsa_des_ede3_sha', // 93
+    /* FF79-91 */
+    'browser.cache.offline.storage.enable',
+    'browser.download.hide_plugins_without_extensions',
+    'browser.library.activity-stream.enabled',
+    'browser.search.geoSpecificDefaults',
+    'browser.search.geoSpecificDefaults.url',
+    'dom.ipc.plugins.flash.subprocess.crashreporter.enabled',
+    'dom.ipc.plugins.reportCrashURL',
+    'dom.w3c_pointer_events.enabled',
+    'intl.charset.fallback.override',
+    'network.ftp.enabled',
+    'plugin.state.flash',
+    'security.mixed_content.block_object_subrequest',
+    'security.ssl.errorReporting.automatic',
+    'security.ssl.errorReporting.enabled',
+    'security.ssl.errorReporting.url',
+    /* 69-78 */
+    'browser.newtabpage.activity-stream.telemetry.ping.endpoint',
+    'browser.tabs.remote.allowLinkedWebInFileUriProcess',
+    'browser.urlbar.oneOffSearches',
+    'devtools.webide.autoinstallADBExtension',
+    'devtools.webide.enabled',
+    'dom.indexedDB.enabled',
+    'extensions.blocklist.url',
+    'geo.wifi.logging.enabled',
+    'geo.wifi.uri',
+    'gfx.downloadable_fonts.woff2.enabled',
+    'media.autoplay.allow-muted',
+    'media.autoplay.enabled.user-gestures-needed',
+    'offline-apps.allow_by_default',
+    'plugins.click_to_play',
+    'privacy.userContext.longPressBehavior',
+    'toolkit.cosmeticAnimations.enabled',
+    'toolkit.telemetry.hybridContent.enabled',
+    'webgl.disable-extensions',
+    /* 61-68 */
+    'app.update.enabled',
+    'browser.aboutHomeSnippets.updateUrl',
+    'browser.chrome.errorReporter.enabled',
+    'browser.chrome.errorReporter.submitUrl',
+    'browser.chrome.favicons',
+    'browser.ctrlTab.previews',
+    'browser.fixup.hide_user_pass',
+    'browser.newtabpage.activity-stream.asrouter.userprefs.cfr',
+    'browser.newtabpage.activity-stream.disableSnippets',
+    'browser.onboarding.enabled',
+    'browser.search.countryCode',
+    'browser.urlbar.autocomplete.enabled',
+    'devtools.webide.adbAddonURL',
+    'devtools.webide.autoinstallADBHelper',
+    'dom.event.highrestimestamp.enabled',
+    'experiments.activeExperiment',
+    'experiments.enabled',
+    'experiments.manifest.uri',
+    'experiments.supported',
+    'lightweightThemes.update.enabled',
+    'media.autoplay.enabled',
+    'network.allow-experiments',
+    'network.cookie.lifetime.days',
+    'network.jar.block-remote-files',
+    'network.jar.open-unsafe-types',
+    'plugin.state.java',
+    'security.csp.enable_violation_events',
+    'security.csp.experimentalEnabled',
+    'shield.savant.enabled',
+    /* 60 or earlier */
+    'browser.bookmarks.showRecentlyBookmarked',
+    'browser.casting.enabled',
+    'browser.crashReports.unsubmittedCheck.autoSubmit',
+    'browser.formautofill.enabled',
+    'browser.formfill.saveHttpsForms',
+    'browser.fullscreen.animate',
+    'browser.history.allowPopState',
+    'browser.history.allowPushState',
+    'browser.history.allowReplaceState',
+    'browser.newtabpage.activity-stream.enabled',
+    'browser.newtabpage.directory.ping',
+    'browser.newtabpage.directory.source',
+    'browser.newtabpage.enhanced',
+    'browser.newtabpage.introShown',
+    'browser.pocket.api',
+    'browser.pocket.enabled',
+    'browser.pocket.oAuthConsumerKey',
+    'browser.pocket.site',
+    'browser.polaris.enabled',
+    'browser.safebrowsing.appRepURL',
+    'browser.safebrowsing.enabled',
+    'browser.safebrowsing.gethashURL',
+    'browser.safebrowsing.malware.reportURL',
+    'browser.safebrowsing.provider.google.appRepURL',
+    'browser.safebrowsing.reportErrorURL',
+    'browser.safebrowsing.reportGenericURL',
+    'browser.safebrowsing.reportMalwareErrorURL',
+    'browser.safebrowsing.reportMalwareMistakeURL',
+    'browser.safebrowsing.reportMalwareURL',
+    'browser.safebrowsing.reportPhishMistakeURL',
+    'browser.safebrowsing.reportURL',
+    'browser.safebrowsing.updateURL',
+    'browser.search.showOneOffButtons',
+    'browser.selfsupport.enabled',
+    'browser.selfsupport.url',
+    'browser.sessionstore.privacy_level_deferred',
+    'browser.tabs.animate',
+    'browser.trackingprotection.gethashURL',
+    'browser.trackingprotection.updateURL',
+    'browser.urlbar.unifiedcomplete',
+    'browser.usedOnWindows10.introURL',
+    'camera.control.autofocus_moving_callback.enabled',
+    'camera.control.face_detection.enabled',
+    'datareporting.healthreport.about.reportUrl',
+    'datareporting.healthreport.about.reportUrlUnified',
+    'datareporting.healthreport.documentServerURI',
+    'datareporting.healthreport.service.enabled',
+    'datareporting.policy.dataSubmissionEnabled.v2',
+    'devtools.webide.autoinstallFxdtAdapters',
+    'dom.archivereader.enabled',
+    'dom.battery.enabled',
+    'dom.beforeAfterKeyboardEvent.enabled',
+    'dom.disable_image_src_set',
+    'dom.disable_window_open_feature.scrollbars',
+    'dom.disable_window_status_change',
+    'dom.enable_user_timing',
+    'dom.flyweb.enabled',
+    'dom.idle-observers-api.enabled',
+    'dom.keyboardevent.code.enabled',
+    'dom.network.enabled',
+    'dom.push.udp.wakeupEnabled',
+    'dom.telephony.enabled',
+    'dom.vr.oculus050.enabled',
+    'dom.workers.enabled',
+    'dom.workers.sharedWorkers.enabled',
+    'extensions.formautofill.experimental',
+    'extensions.screenshots.system-disabled',
+    'extensions.shield-recipe-client.api_url',
+    'extensions.shield-recipe-client.enabled',
+    'full-screen-api.approval-required',
+    'general.useragent.locale',
+    'geo.security.allowinsecure',
+    'intl.locale.matchOS',
+    'loop.enabled',
+    'loop.facebook.appId',
+    'loop.facebook.enabled',
+    'loop.facebook.fallbackUrl',
+    'loop.facebook.shareUrl',
+    'loop.feedback.formURL',
+    'loop.feedback.manualFormURL',
+    'loop.logDomains',
+    'loop.server',
+    'media.block-play-until-visible',
+    'media.eme.apiVisible',
+    'media.eme.chromium-api.enabled',
+    'media.getusermedia.screensharing.allow_on_old_platforms',
+    'media.getusermedia.screensharing.allowed_domains',
+    'media.gmp-eme-adobe.autoupdate',
+    'media.gmp-eme-adobe.enabled',
+    'media.gmp-eme-adobe.visible',
+    'network.http.referer.userControlPolicy',
+    'network.http.sendSecureXSiteReferrer',
+    'network.http.spdy.enabled.http2draft',
+    'network.http.spdy.enabled.v3-1',
+    'network.websocket.enabled',
+    'pageThumbs.enabled',
+    'pfs.datasource.url',
+    'plugin.scan.Acrobat',
+    'plugin.scan.Quicktime',
+    'plugin.scan.WindowsMediaPlayer',
+    'plugins.enumerable_names',
+    'plugins.update.notifyUser',
+    'plugins.update.url',
+    'privacy.clearOnShutdown.passwords',
+    'privacy.donottrackheader.value',
+    'security.mixed_content.send_hsts_priming',
+    'security.mixed_content.use_hsts',
+    'security.ssl3.ecdhe_ecdsa_rc4_128_sha',
+    'security.ssl3.ecdhe_rsa_rc4_128_sha',
+    'security.ssl3.rsa_rc4_128_md5',
+    'security.ssl3.rsa_rc4_128_sha',
+    'security.tls.insecure_fallback_hosts.use_static_list',
+    'security.tls.unrestricted_rc4_fallback',
+    'security.xpconnect.plugin.unrestricted',
+    'social.directories',
+    'social.enabled',
+    'social.remote-install.enabled',
+    'social.share.activationPanelEnabled',
+    'social.shareDirectory',
+    'social.toast-notifications.enabled',
+    'social.whitelist',
+    'toolkit.telemetry.unifiedIsOptIn',
+
+    /* REMOVED */
     /* 92+ */
     'dom.caches.enabled',
     'dom.storageManager.enabled',

From 4ebabbb5692a25df6a5bf43911f13d078bb44e4e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 11 Dec 2021 09:13:51 +0000
Subject: [PATCH 0974/1147] Delete arkenfox-clear-deprecated.js

---
 .../arkenfox-clear-deprecated.js              | 232 ------------------
 1 file changed, 232 deletions(-)
 delete mode 100644 scratchpad-scripts/arkenfox-clear-deprecated.js

diff --git a/scratchpad-scripts/arkenfox-clear-deprecated.js b/scratchpad-scripts/arkenfox-clear-deprecated.js
deleted file mode 100644
index 9ef8100..0000000
--- a/scratchpad-scripts/arkenfox-clear-deprecated.js
+++ /dev/null
@@ -1,232 +0,0 @@
-/***
-  Version: up to and including FF/ESR91
-
-  This will reset the preferences that have been deprecated by Mozilla
-  and used in the arkenfox user.js
-
-  It is in reverse order, so feel free to remove sections that do not apply
-
-  For instructions see:
-  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
-***/
-
-(() => {
-
-  if ('undefined' === typeof(Services)) return alert('about:config needs to be the active tab!');
-
-  const aPREFS = [
-    /* deprecated */
-    /* FF79-91 */
-    'browser.cache.offline.storage.enable',
-    'browser.download.hide_plugins_without_extensions',
-    'browser.library.activity-stream.enabled',
-    'browser.search.geoSpecificDefaults',
-    'browser.search.geoSpecificDefaults.url',
-    'dom.ipc.plugins.flash.subprocess.crashreporter.enabled',
-    'dom.ipc.plugins.reportCrashURL',
-    'dom.w3c_pointer_events.enabled',
-    'intl.charset.fallback.override',
-    'network.ftp.enabled',
-    'plugin.state.flash',
-    'security.mixed_content.block_object_subrequest',
-    'security.ssl.errorReporting.automatic',
-    'security.ssl.errorReporting.enabled',
-    'security.ssl.errorReporting.url',
-    /* 69-78 */
-    'browser.newtabpage.activity-stream.telemetry.ping.endpoint',
-    'browser.tabs.remote.allowLinkedWebInFileUriProcess',
-    'browser.urlbar.oneOffSearches',
-    'devtools.webide.autoinstallADBExtension',
-    'devtools.webide.enabled',
-    'dom.indexedDB.enabled',
-    'extensions.blocklist.url',
-    'geo.wifi.logging.enabled',
-    'geo.wifi.uri',
-    'gfx.downloadable_fonts.woff2.enabled',
-    'media.autoplay.allow-muted',
-    'media.autoplay.enabled.user-gestures-needed',
-    'offline-apps.allow_by_default',
-    'plugins.click_to_play',
-    'privacy.userContext.longPressBehavior',
-    'toolkit.cosmeticAnimations.enabled',
-    'toolkit.telemetry.hybridContent.enabled',
-    'webgl.disable-extensions',
-    /* 61-68 */
-    'app.update.enabled',
-    'browser.aboutHomeSnippets.updateUrl',
-    'browser.chrome.errorReporter.enabled',
-    'browser.chrome.errorReporter.submitUrl',
-    'browser.chrome.favicons',
-    'browser.ctrlTab.previews',
-    'browser.fixup.hide_user_pass',
-    'browser.newtabpage.activity-stream.asrouter.userprefs.cfr',
-    'browser.newtabpage.activity-stream.disableSnippets',
-    'browser.onboarding.enabled',
-    'browser.search.countryCode',
-    'browser.urlbar.autocomplete.enabled',
-    'devtools.webide.adbAddonURL',
-    'devtools.webide.autoinstallADBHelper',
-    'dom.event.highrestimestamp.enabled',
-    'experiments.activeExperiment',
-    'experiments.enabled',
-    'experiments.manifest.uri',
-    'experiments.supported',
-    'lightweightThemes.update.enabled',
-    'media.autoplay.enabled',
-    'network.allow-experiments',
-    'network.cookie.lifetime.days',
-    'network.jar.block-remote-files',
-    'network.jar.open-unsafe-types',
-    'plugin.state.java',
-    'security.csp.enable_violation_events',
-    'security.csp.experimentalEnabled',
-    'shield.savant.enabled',
-    /* 60 or earlier */
-    'browser.bookmarks.showRecentlyBookmarked',
-    'browser.casting.enabled',
-    'browser.crashReports.unsubmittedCheck.autoSubmit',
-    'browser.formautofill.enabled',
-    'browser.formfill.saveHttpsForms',
-    'browser.fullscreen.animate',
-    'browser.history.allowPopState',
-    'browser.history.allowPushState',
-    'browser.history.allowReplaceState',
-    'browser.newtabpage.activity-stream.enabled',
-    'browser.newtabpage.directory.ping',
-    'browser.newtabpage.directory.source',
-    'browser.newtabpage.enhanced',
-    'browser.newtabpage.introShown',
-    'browser.pocket.api',
-    'browser.pocket.enabled',
-    'browser.pocket.oAuthConsumerKey',
-    'browser.pocket.site',
-    'browser.polaris.enabled',
-    'browser.safebrowsing.appRepURL',
-    'browser.safebrowsing.enabled',
-    'browser.safebrowsing.gethashURL',
-    'browser.safebrowsing.malware.reportURL',
-    'browser.safebrowsing.provider.google.appRepURL',
-    'browser.safebrowsing.reportErrorURL',
-    'browser.safebrowsing.reportGenericURL',
-    'browser.safebrowsing.reportMalwareErrorURL',
-    'browser.safebrowsing.reportMalwareMistakeURL',
-    'browser.safebrowsing.reportMalwareURL',
-    'browser.safebrowsing.reportPhishMistakeURL',
-    'browser.safebrowsing.reportURL',
-    'browser.safebrowsing.updateURL',
-    'browser.search.showOneOffButtons',
-    'browser.selfsupport.enabled',
-    'browser.selfsupport.url',
-    'browser.sessionstore.privacy_level_deferred',
-    'browser.tabs.animate',
-    'browser.trackingprotection.gethashURL',
-    'browser.trackingprotection.updateURL',
-    'browser.urlbar.unifiedcomplete',
-    'browser.usedOnWindows10.introURL',
-    'camera.control.autofocus_moving_callback.enabled',
-    'camera.control.face_detection.enabled',
-    'datareporting.healthreport.about.reportUrl',
-    'datareporting.healthreport.about.reportUrlUnified',
-    'datareporting.healthreport.documentServerURI',
-    'datareporting.healthreport.service.enabled',
-    'datareporting.policy.dataSubmissionEnabled.v2',
-    'devtools.webide.autoinstallFxdtAdapters',
-    'dom.archivereader.enabled',
-    'dom.battery.enabled',
-    'dom.beforeAfterKeyboardEvent.enabled',
-    'dom.disable_image_src_set',
-    'dom.disable_window_open_feature.scrollbars',
-    'dom.disable_window_status_change',
-    'dom.enable_user_timing',
-    'dom.flyweb.enabled',
-    'dom.idle-observers-api.enabled',
-    'dom.keyboardevent.code.enabled',
-    'dom.network.enabled',
-    'dom.push.udp.wakeupEnabled',
-    'dom.telephony.enabled',
-    'dom.vr.oculus050.enabled',
-    'dom.workers.enabled',
-    'dom.workers.sharedWorkers.enabled',
-    'extensions.formautofill.experimental',
-    'extensions.screenshots.system-disabled',
-    'extensions.shield-recipe-client.api_url',
-    'extensions.shield-recipe-client.enabled',
-    'full-screen-api.approval-required',
-    'general.useragent.locale',
-    'geo.security.allowinsecure',
-    'intl.locale.matchOS',
-    'loop.enabled',
-    'loop.facebook.appId',
-    'loop.facebook.enabled',
-    'loop.facebook.fallbackUrl',
-    'loop.facebook.shareUrl',
-    'loop.feedback.formURL',
-    'loop.feedback.manualFormURL',
-    'loop.logDomains',
-    'loop.server',
-    'media.block-play-until-visible',
-    'media.eme.apiVisible',
-    'media.eme.chromium-api.enabled',
-    'media.getusermedia.screensharing.allow_on_old_platforms',
-    'media.getusermedia.screensharing.allowed_domains',
-    'media.gmp-eme-adobe.autoupdate',
-    'media.gmp-eme-adobe.enabled',
-    'media.gmp-eme-adobe.visible',
-    'network.http.referer.userControlPolicy',
-    'network.http.sendSecureXSiteReferrer',
-    'network.http.spdy.enabled.http2draft',
-    'network.http.spdy.enabled.v3-1',
-    'network.websocket.enabled',
-    'pageThumbs.enabled',
-    'pfs.datasource.url',
-    'plugin.scan.Acrobat',
-    'plugin.scan.Quicktime',
-    'plugin.scan.WindowsMediaPlayer',
-    'plugins.enumerable_names',
-    'plugins.update.notifyUser',
-    'plugins.update.url',
-    'privacy.clearOnShutdown.passwords',
-    'privacy.donottrackheader.value',
-    'security.mixed_content.send_hsts_priming',
-    'security.mixed_content.use_hsts',
-    'security.ssl3.ecdhe_ecdsa_rc4_128_sha',
-    'security.ssl3.ecdhe_rsa_rc4_128_sha',
-    'security.ssl3.rsa_rc4_128_md5',
-    'security.ssl3.rsa_rc4_128_sha',
-    'security.tls.insecure_fallback_hosts.use_static_list',
-    'security.tls.unrestricted_rc4_fallback',
-    'security.xpconnect.plugin.unrestricted',
-    'social.directories',
-    'social.enabled',
-    'social.remote-install.enabled',
-    'social.share.activationPanelEnabled',
-    'social.shareDirectory',
-    'social.toast-notifications.enabled',
-    'social.whitelist',
-    'toolkit.telemetry.unifiedIsOptIn',
-
-    /* reset parrot: check your open about:config after running the script */
-    '_user.js.parrot'
-  ];
-
-  console.clear();
-
-  let c = 0;
-  for (const sPname of aPREFS) {
-    if (Services.prefs.prefHasUserValue(sPname)) {
-      Services.prefs.clearUserPref(sPname);
-      if (!Services.prefs.prefHasUserValue(sPname)) {
-        console.info('reset', sPname);
-        c++;
-      } else console.warn('failed to reset', sPname);
-    }
-  }
-
-  focus();
-
-  const d = (c==1) ? ' pref' : ' prefs';
-  alert(c ? 'successfully reset ' + c + d + "\n\nfor details check the console" : 'nothing to reset');
-
-  return 'all done';
-
-})();

From 93874bda436f6365832c1ecaeb691013bab516c6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 11 Dec 2021 09:14:59 +0000
Subject: [PATCH 0975/1147] rename

---
 .../{arkenfox-clear-removed.js => arkenfox-cleanup.js}            | 0
 1 file changed, 0 insertions(+), 0 deletions(-)
 rename scratchpad-scripts/{arkenfox-clear-removed.js => arkenfox-cleanup.js} (100%)

diff --git a/scratchpad-scripts/arkenfox-clear-removed.js b/scratchpad-scripts/arkenfox-cleanup.js
similarity index 100%
rename from scratchpad-scripts/arkenfox-clear-removed.js
rename to scratchpad-scripts/arkenfox-cleanup.js

From 460951df9e54a24540181a74379a12aaffa7798e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 11 Dec 2021 09:37:45 +0000
Subject: [PATCH 0976/1147] tidy, add instructions

---
 scratchpad-scripts/arkenfox-cleanup.js | 27 ++++++++++++++++++++++----
 1 file changed, 23 insertions(+), 4 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index d928daf..17de71a 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -1,12 +1,29 @@
 /***
   This will reset the preferences that have been
-  - removed from the arkenfox user.js.
-  - deprecated by Mozilla but used in the arkenfox user.js in the past
+  - removed from the arkenfox user.js
+  - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
   Last updated: 11-December-2021
 
-  For instructions see:
-  https://github.com/arkenfox/user.js/wiki/3.1-Resetting-Inactive-Prefs-[Scripts]
+  Instructions:
+  - [optional] close Firefox and backup your profile
+  - [optional] disable your network connection [1]
+  - start Firefox
+  - load about:config and press Ctrl+Shift+K to open the Web Console for about:config
+    - using about:config is important, so the script has the right permissions
+  - paste this script
+  - if you edited the list of prefs in the script, make sure the last pref does not have a trailing comma
+  - hit enter
+  - check the Info output to see which prefs were reset
+  - restart
+     - some prefs require a restart
+     - a restart will reapply your user.js
+  - [optional] re-enable your network connection
+ 
+  [1] Blocking Firefox from the internet ensures it cannot act on your reset preferences in the
+  period before you restart it, such as app and extension auto-updating, or downloading unwanted
+  components (GMP etc). It depends on what you're resetting and how long before you restart.
+
 ***/
 
 (() => {
@@ -435,6 +452,8 @@
        // 'dom.ipc.plugins.sandbox-level.default',
        // 'dom.ipc.plugins.sandbox-level.flash',
        // 'security.sandbox.logging.enabled',
+
+    /* IMPORTANT: last active pref must not have a trailing comma */ 
     /* reset parrot: check your open about:config after running the script */
     '_user.js.parrot'
   ];

From af109d4696a3f8142a1023974b2a3713a89b030a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 11 Dec 2021 11:15:34 +0000
Subject: [PATCH 0977/1147] tweak 7016

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 63579c1..279dd42 100644
--- a/user.js
+++ b/user.js
@@ -1213,8 +1213,9 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] DNT is enforced with Tracking Protection which is used in ETP Strict (2701) ***/
    // user_pref("privacy.donottrackheader.enabled", true);
 /* 7016: customize ETP settings
- * [WHY] Just use strict which sets these at runtime (2701) ***/
+ * [WHY] Arkenfox only supports strict which sets these at runtime (2701) ***/
    // user_pref("network.cookie.cookieBehavior", 5);
+   // user_pref("privacy.partition.network_state.ocsp_cache", true);
    // user_pref("privacy.trackingprotection.enabled", true);
    // user_pref("privacy.trackingprotection.socialtracking.enabled", true);
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]

From 7ec13c0323f53a959eaa7f21b425b30290112e12 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 11 Dec 2021 12:22:00 +0000
Subject: [PATCH 0978/1147] sharedWorkers tweak

tested in FF91+. Seems as if sharedWorkers no longer requires an explicit `Allow`
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 279dd42..3827e00 100644
--- a/user.js
+++ b/user.js
@@ -806,8 +806,8 @@ user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!"
 /** COOKIES + SITE DATA : ALLOWS EXCEPTIONS ***/
 /* 2801: delete cookies and site data on exit
  * 0=keep until they expire (default), 2=keep until you close Firefox
- * [NOTE] A "cookie" permission also controls localStorage/sessionStorage, idexedDB.
- * sharedWorkers and serviceWorkers require an `Allow` permission
+ * [NOTE] A "cookie" block permission also controls localStorage/sessionStorage, idexedDB,
+ * sharedWorkers and serviceWorkers. serviceWorkers require an `Allow` permission
  * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow
  *   If using FPI the syntax must be https://example.com/^firstPartyDomain=example.com

From 54810e333f4b9ef442ab66eeb412efcdcfe81eda Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 11 Dec 2021 19:17:43 +0000
Subject: [PATCH 0979/1147] typo

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 3827e00..23ba046 100644
--- a/user.js
+++ b/user.js
@@ -806,7 +806,7 @@ user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!"
 /** COOKIES + SITE DATA : ALLOWS EXCEPTIONS ***/
 /* 2801: delete cookies and site data on exit
  * 0=keep until they expire (default), 2=keep until you close Firefox
- * [NOTE] A "cookie" block permission also controls localStorage/sessionStorage, idexedDB,
+ * [NOTE] A "cookie" block permission also controls localStorage/sessionStorage, indexedDB,
  * sharedWorkers and serviceWorkers. serviceWorkers require an `Allow` permission
  * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow

From 8cdb30cc0811ae3f2198aeb24c330993f5192400 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Dec 2021 00:26:12 +0000
Subject: [PATCH 0980/1147] make cookie pref active

@SkewedZeppelin ... https://github.com/arkenfox/user.js/issues/1051#issuecomment-991806497
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 23ba046..99a62e8 100644
--- a/user.js
+++ b/user.js
@@ -798,6 +798,7 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * [SETTING] to add site exceptions: Urlbar>ETP Shield
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Enhanced Tracking Protection>Manage Exceptions ***/
 user_pref("browser.contentblocking.category", "strict");
+user_pref("network.cookie.cookieBehavior", 5);
 /* 2702: enable state partitioning of service workers [FF96+] ***/
 user_pref("privacy.partition.serviceWorkers", true);
 
@@ -1214,7 +1215,6 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("privacy.donottrackheader.enabled", true);
 /* 7016: customize ETP settings
  * [WHY] Arkenfox only supports strict which sets these at runtime (2701) ***/
-   // user_pref("network.cookie.cookieBehavior", 5);
    // user_pref("privacy.partition.network_state.ocsp_cache", true);
    // user_pref("privacy.trackingprotection.enabled", true);
    // user_pref("privacy.trackingprotection.socialtracking.enabled", true);

From f836e553635ffe057d49c591e6256d46158ccdf0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Dec 2021 13:31:01 +0000
Subject: [PATCH 0981/1147] tidy ETP stuff

---
 user.js | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 99a62e8..8fea2f0 100644
--- a/user.js
+++ b/user.js
@@ -792,13 +792,12 @@ user_pref("extensions.postDownloadThirdPartyPrompt", false);
 
 /*** [SECTION 2700]: ETP (ENHANCED TRACKING PROTECTION) ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
-/* 2701: enable Enhanced Tracking Protection's (ETP) Strict Mode [FF86+]
+/* 2701: enable ETP Strict Mode [FF86+]
  * [NOTE] ETP Strict Mode enables Total Cookie Protection (TCP)
  * [1] https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/
  * [SETTING] to add site exceptions: Urlbar>ETP Shield
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Enhanced Tracking Protection>Manage Exceptions ***/
 user_pref("browser.contentblocking.category", "strict");
-user_pref("network.cookie.cookieBehavior", 5);
 /* 2702: enable state partitioning of service workers [FF96+] ***/
 user_pref("privacy.partition.serviceWorkers", true);
 
@@ -1214,7 +1213,9 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] DNT is enforced with Tracking Protection which is used in ETP Strict (2701) ***/
    // user_pref("privacy.donottrackheader.enabled", true);
 /* 7016: customize ETP settings
- * [WHY] Arkenfox only supports strict which sets these at runtime (2701) ***/
+ * [WHY] Arkenfox only supports strict (2701) which sets these at runtime ***/
+   // user_pref("network.cookie.cookieBehavior", 5);
+   // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault", true);
    // user_pref("privacy.partition.network_state.ocsp_cache", true);
    // user_pref("privacy.trackingprotection.enabled", true);
    // user_pref("privacy.trackingprotection.socialtracking.enabled", true);

From c8c86262d7dc21cfc1329cfc7fafdb286149d21d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Dec 2021 13:51:25 +0000
Subject: [PATCH 0982/1147] enforce SmartBlock shims

---
 user.js | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 8fea2f0..bdaf498 100644
--- a/user.js
+++ b/user.js
@@ -798,7 +798,7 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * [SETTING] to add site exceptions: Urlbar>ETP Shield
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Enhanced Tracking Protection>Manage Exceptions ***/
 user_pref("browser.contentblocking.category", "strict");
-/* 2702: enable state partitioning of service workers [FF96+] ***/
+/* 2710: enable state partitioning of service workers [FF96+] ***/
 user_pref("privacy.partition.serviceWorkers", true);
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
@@ -1124,6 +1124,10 @@ user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
  * [WARNING] Replaced with network partitioning (FF85+) and TCP (2701),
  * and enabling FPI disables those. FPI is no longer maintained ***/
 user_pref("privacy.firstparty.isolate", false); // [DEFAULT: false]
+/* 6009: enforce SmartBlock shims [FF81+]
+ * In FF96+ these are listed in about:compat
+ * [1] https://blog.mozilla.org/security/2021/03/23/introducing-smartblock/ ***/
+user_pref("extensions.webcompat.enable_shims", true); // [DEFAULT: true]
 /* 6050: prefsCleaner: reset previously active items removed from arkenfox FF92+ ***/
    // placeholder
 

From 8bc25b552db5fb1d0fbe5cd248bbc15c4aa216db Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Dec 2021 15:30:53 +0000
Subject: [PATCH 0983/1147] expand 0650 to include any removed item

this should reduce any dependency on the scratchpad script
---
 user.js | 9 +++++++--
 1 file changed, 7 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index bdaf498..77f79c1 100644
--- a/user.js
+++ b/user.js
@@ -1128,8 +1128,13 @@ user_pref("privacy.firstparty.isolate", false); // [DEFAULT: false]
  * In FF96+ these are listed in about:compat
  * [1] https://blog.mozilla.org/security/2021/03/23/introducing-smartblock/ ***/
 user_pref("extensions.webcompat.enable_shims", true); // [DEFAULT: true]
-/* 6050: prefsCleaner: reset previously active items removed from arkenfox FF92+ ***/
-   // placeholder
+/* 6050: prefsCleaner: reset items removed from arkenfox FF92+ ***/
+   // user_pref(""dom.caches.enabled", "");
+   // user_pref(""dom.storageManager.enabled", "");
+   // user_pref(""dom.storage_access.enabled", "");
+   // user_pref(""privacy.firstparty.isolate.block_post_message", "");
+   // user_pref(""privacy.firstparty.isolate.restrict_opener_access", "");
+   // user_pref(""privacy.firstparty.isolate.use_site", "");
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");

From 8de87de0506c7a508958920e24ff2ca0b7026c98 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Dec 2021 15:41:55 +0000
Subject: [PATCH 0984/1147] update 0704: GIO, closes #1050 (#1300)

https://bugzilla.mozilla.org/show_bug.cgi?id=1666725
---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 77f79c1..5560119 100644
--- a/user.js
+++ b/user.js
@@ -313,9 +313,9 @@ user_pref("network.proxy.socks_remote_dns", true);
  * [SETUP-CHROME] Can break extensions for profiles on network shares
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/26424 ***/
 user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
-/* 0704: disable GIO as a potential proxy bypass vector [FF60+]
- * Gvfs/GIO has a set of supported protocols like obex, network, archive, computer, dav, cdda,
- * gphoto2, trash, etc. By default only smb and sftp protocols are accepted so far (as of FF64)
+/* 0704: disable GIO as a potential proxy bypass vector
+ * Gvfs/GIO has a set of supported protocols like obex, network, archive, computer,
+ * dav, cdda, gphoto2, trash, etc. By default only sftp is accepted (FF87+)
  * [1] https://bugzilla.mozilla.org/1433507
  * [2] https://en.wikipedia.org/wiki/GVfs
  * [3] https://en.wikipedia.org/wiki/GIO_(software) ***/

From 78297132b421115da2820da133c24f53de3bb658 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Dec 2021 15:44:39 +0000
Subject: [PATCH 0985/1147] fix syntax

---
 user.js | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 5560119..1ae1f9c 100644
--- a/user.js
+++ b/user.js
@@ -1129,12 +1129,12 @@ user_pref("privacy.firstparty.isolate", false); // [DEFAULT: false]
  * [1] https://blog.mozilla.org/security/2021/03/23/introducing-smartblock/ ***/
 user_pref("extensions.webcompat.enable_shims", true); // [DEFAULT: true]
 /* 6050: prefsCleaner: reset items removed from arkenfox FF92+ ***/
-   // user_pref(""dom.caches.enabled", "");
-   // user_pref(""dom.storageManager.enabled", "");
-   // user_pref(""dom.storage_access.enabled", "");
-   // user_pref(""privacy.firstparty.isolate.block_post_message", "");
-   // user_pref(""privacy.firstparty.isolate.restrict_opener_access", "");
-   // user_pref(""privacy.firstparty.isolate.use_site", "");
+   // user_pref("dom.caches.enabled", "");
+   // user_pref("dom.storageManager.enabled", "");
+   // user_pref("dom.storage_access.enabled", "");
+   // user_pref("privacy.firstparty.isolate.block_post_message", "");
+   // user_pref("privacy.firstparty.isolate.restrict_opener_access", "");
+   // user_pref("privacy.firstparty.isolate.use_site", "");
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");

From c269ac9f7d8226fdc53da74754a0441809ac3c7b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 13 Dec 2021 03:49:42 +0000
Subject: [PATCH 0986/1147] remove duplicate

---
 scratchpad-scripts/arkenfox-cleanup.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 17de71a..c209797 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -152,7 +152,6 @@
     'datareporting.policy.dataSubmissionEnabled.v2',
     'devtools.webide.autoinstallFxdtAdapters',
     'dom.archivereader.enabled',
-    'dom.battery.enabled',
     'dom.beforeAfterKeyboardEvent.enabled',
     'dom.disable_image_src_set',
     'dom.disable_window_open_feature.scrollbars',

From 238f1545f4de5b873e9e717c458c200a049c73e5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 13 Dec 2021 14:15:25 +0000
Subject: [PATCH 0987/1147] =?UTF-8?q?fixup=20thanks=20#fxbrit=20have=20a?=
 =?UTF-8?q?=20=F0=9F=8D=A5=20fish=20cake?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 1ae1f9c..88af5a7 100644
--- a/user.js
+++ b/user.js
@@ -1231,7 +1231,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
 /* 7017: disable service workers [FF32, FF44-compat]
- * [WHY] Already isolated (FF96+) with TCP (2701) behind a pref (2702)
+ * [WHY] Already isolated (FF96+) with TCP (2701) behind a pref (2710)
  * or blocked with TCP in 3rd parties (FF95 or lower) ***/
    // user_pref("dom.serviceWorkers.enabled", false);
 

From 7811e912f479e1b1036ab30328d89f5d1ef7422f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 14 Dec 2021 13:25:46 +0000
Subject: [PATCH 0988/1147] make push notifications inactive

- they require SWers which are already blocked by virtue of permissions being session only
- also remove "dom.push.userAgentID" as this means prefsCleaner resets it and would wipe user's subscriptions
   - not adding "dom.push.userAgentID" to the cleanup script for the same reason
---
 user.js | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 88af5a7..3e150a3 100644
--- a/user.js
+++ b/user.js
@@ -695,11 +695,10 @@ user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
  * Push allows websites to send you subscribed messages through Mozilla's Push Server,
  * and requires service workers to subscribe to and display, and is behind a prompt (7002)
  * [NOTE] Disabling service workers alone doesn't stop Firefox polling the Mozilla Push Server
- * [NOTE] To remove all subscriptions, reset your userAgentID
+ * [NOTE] To remove all subscriptions, reset "dom.push.userAgentID"
  * [1] https://support.mozilla.org/kb/push-notifications-firefox
  * [2] https://developer.mozilla.org/docs/Web/API/Push_API ***/
-user_pref("dom.push.enabled", false);
-   // user_pref("dom.push.userAgentID", "");
+   // user_pref("dom.push.enabled", false);
 
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
@@ -807,7 +806,7 @@ user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!"
 /* 2801: delete cookies and site data on exit
  * 0=keep until they expire (default), 2=keep until you close Firefox
  * [NOTE] A "cookie" block permission also controls localStorage/sessionStorage, indexedDB,
- * sharedWorkers and serviceWorkers. serviceWorkers require an `Allow` permission
+ * sharedWorkers and serviceWorkers. serviceWorkers require an "Allow" permission
  * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow
  *   If using FPI the syntax must be https://example.com/^firstPartyDomain=example.com

From 93f0ff89c8ff54e74b1d0cc9e27a41f653c33812 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 15 Dec 2021 00:05:03 +0000
Subject: [PATCH 0989/1147] move web notifcations to don't bother

---
 user.js | 23 +++++++++++------------
 1 file changed, 11 insertions(+), 12 deletions(-)

diff --git a/user.js b/user.js
index 3e150a3..3e19e34 100644
--- a/user.js
+++ b/user.js
@@ -687,18 +687,6 @@ user_pref("dom.disable_window_move_resize", true);
 user_pref("dom.disable_open_during_load", true);
 /* 2404: limit events that can cause a popup [SETUP-WEB] ***/
 user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
-/* 2410: disable Web Notifications
- * [NOTE] Web Notifications are behind a prompt (7002) ***/
-   // user_pref("dom.webnotifications.enabled", false); // [FF22+]
-   // user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
-/* 2411: disable Push Notifications [FF44+]
- * Push allows websites to send you subscribed messages through Mozilla's Push Server,
- * and requires service workers to subscribe to and display, and is behind a prompt (7002)
- * [NOTE] Disabling service workers alone doesn't stop Firefox polling the Mozilla Push Server
- * [NOTE] To remove all subscriptions, reset "dom.push.userAgentID"
- * [1] https://support.mozilla.org/kb/push-notifications-firefox
- * [2] https://developer.mozilla.org/docs/Web/API/Push_API ***/
-   // user_pref("dom.push.enabled", false);
 
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
@@ -1179,6 +1167,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
 /* 7006: onions
  * [WHY] Firefox doesn't support hidden services. Use Tor Browser ***/
    // user_pref("dom.securecontext.whitelist_onions", true); // 1382359
+   // user_pref("dom.securecontext.allowlist_onions", true); // [FF97+] 1382359/1744006
    // user_pref("network.http.referer.hideOnionSource", true); // 1305144
 /* 7007: referers
  * [WHY] Only cross-origin referers (1600s) need control ***/
@@ -1233,6 +1222,16 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] Already isolated (FF96+) with TCP (2701) behind a pref (2710)
  * or blocked with TCP in 3rd parties (FF95 or lower) ***/
    // user_pref("dom.serviceWorkers.enabled", false);
+/* 7018: disable Web Notifications
+ * [WHY] Web Notifications are behind a prompt (7002)
+ * [1] https://blog.mozilla.org/en/products/firefox/block-notification-requests/ ***/
+   // user_pref("dom.webnotifications.enabled", false); // [FF22+]
+   // user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
+/* 7019: disable Push Notifications [FF44+]
+ * [WHY] Push requires subscription
+ * [NOTE] To remove all subscriptions, reset "dom.push.userAgentID"
+ * [1] https://support.mozilla.org/kb/push-notifications-firefox ***/
+   // user_pref("dom.push.enabled", false);
 
 /*** [SECTION 8000]: DON'T BOTHER: FINGERPRINTING
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good

From bb56056a68906ddd178f64ab0b016c8bbe9786fb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 15 Dec 2021 19:23:03 +0000
Subject: [PATCH 0990/1147] explain 0-RTT

---
 user.js | 7 +++++--
 1 file changed, 5 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 3e19e34..4d70fd3 100644
--- a/user.js
+++ b/user.js
@@ -481,7 +481,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * safe from the attack if it disables renegotiations but the problem is that the browser can't
  * know that. Setting this pref to true is the only way for the browser to ensure there will be
  * no unsafe renegotiations on the channel between the browser and the server.
- * [STATS] SSL Labs (July 2021) reports over 99% of sites have secure renegotiation [4]
+ * [STATS] SSL Labs (July 2021) reports over 99% of top sites have secure renegotiation [4]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
  * [2] https://datatracker.ietf.org/doc/html/rfc5746
  * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
@@ -490,8 +490,11 @@ user_pref("security.ssl.require_safe_negotiation", true);
 /* 1203: reset TLS 1.0 and 1.1 downgrades i.e. session only ***/
 user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
 /* 1206: disable TLS1.3 0-RTT (round-trip time) [FF51+]
+ * This data is not forward secret, as it is encrypted solely under keys derived using
+ * the offered PSK. There are no guarantees of non-replay between connections
  * [1] https://github.com/tlswg/tls13-spec/issues/1001
- * [2] https://blog.cloudflare.com/tls-1-3-overview-and-q-and-a/ ***/
+ * [2] https://www.rfc-editor.org/rfc/rfc9001.html#name-replay-attacks-with-0-rtt
+ * [3] https://blog.cloudflare.com/tls-1-3-overview-and-q-and-a/ ***/
 user_pref("security.tls.enable_0rtt_data", false);
 
 /** OCSP (Online Certificate Status Protocol)

From 6675225ec4a40bdb7d38b299893cd5b472b60c3a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Dec 2021 06:36:39 +0000
Subject: [PATCH 0991/1147] make 0301 inactive

auto-updating is not a security nor a privacy risk, by default it should be enabled and it's on end-users if they want to disable it - does not affect windows users
---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 4d70fd3..56be810 100644
--- a/user.js
+++ b/user.js
@@ -142,7 +142,7 @@ user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the
 /* 0301: disable auto-INSTALLING Firefox updates [NON-WINDOWS]
  * [NOTE] You will still get prompts to update, and should do so in a timely manner
  * [SETTING] General>Firefox Updates>Check for updates but let you choose to install them ***/
-user_pref("app.update.auto", false);
+   // user_pref("app.update.auto", false);
 /* 0302: disable auto-INSTALLING Firefox updates via a background service [FF90+] [WINDOWS]
  * [SETTING] General>Firefox Updates>Automatically install updates>When Firefox is not running
  * [1] https://support.mozilla.org/kb/enable-background-updates-firefox-windows ***/
@@ -945,7 +945,7 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
    // user_pref("privacy.resistFingerprinting.exemptedDomains", "*.example.invalid");
    // user_pref("privacy.resistFingerprinting.testGranularityMask", 0);
 /* 4506: set RFP's font visibility level (1402) [FF94+] ***/
-   // user_pref("layout.css.font-visibility.resistFingerprinting", 1);
+   // user_pref("layout.css.font-visibility.resistFingerprinting", 1); // [DEFAULT: 1]
 /* 4507: disable showing about:blank as soon as possible during startup [FF60+]
  * When default true this no longer masks the RFP chrome resizing activity
  * [1] https://bugzilla.mozilla.org/1448423 ***/

From d48d3ad29a095eb0bd467040c9db5482a79dc516 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Dec 2021 21:20:28 +0000
Subject: [PATCH 0992/1147] remove browser.eme.ui.enabled

---
 scratchpad-scripts/arkenfox-cleanup.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index c209797..6aa8c31 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -287,7 +287,6 @@
     'browser.cache.disk.smart_size.first_run',
     'browser.cache.offline.insecure.enable',
     'browser.contentblocking.enabled',
-    'browser.eme.ui.enabled',
     'browser.laterrun.enabled',
     'browser.offline-apps.notify',
     'browser.rights.3.shown',

From 87bd8683fa384c0e9932230c8957ac0717a0b430 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Dec 2021 21:22:41 +0000
Subject: [PATCH 0993/1147] 2022: add browser.eme.ui.enabled

for those who want to remove DRM prompts and have no intention of enabling it
---
 user.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/user.js b/user.js
index 56be810..3930e10 100644
--- a/user.js
+++ b/user.js
@@ -660,11 +660,13 @@ user_pref("media.peerconnection.ice.default_address_only", true);
  * [NOTE] This is covered by the EME master switch (2022) ***/
    // user_pref("media.gmp-widevinecdm.enabled", false);
 /* 2022: disable all DRM content (EME: Encryption Media Extension)
+ * Optionally hide the setting which also removes the DRM prompt
  * [SETUP-WEB] e.g. Netflix, Amazon Prime, Hulu, HBO, Disney+, Showtime, Starz, DirectTV
  * [SETTING] General>DRM Content>Play DRM-controlled content
  * [TEST] https://bitmovin.com/demos/drm
  * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
 user_pref("media.eme.enabled", false);
+   // user_pref("browser.eme.ui.enabled", false);
 /* 2030: disable autoplay of HTML5 media [FF63+]
  * 0=Allow all, 1=Block non-muted media (default), 5=Block all
  * [NOTE] You can set exceptions under site permissions

From d2510b014d768d867c9f83ba7cded0a1bf280b52 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 23 Dec 2021 23:42:28 +0000
Subject: [PATCH 0994/1147] move updates to personal

updating (app, extensions, ext cache) is not a privacy issue
- if you're willing to use Firefox but not trust updating, then I have two bricks to sell you: users who wish to disable it (to check changes first etc) and update in a timely manner, then that is on them - including any prompt fatigue
- same goes for extensions: the end-user installed them (and arkenfox only recommends a very select few) - the onus is on the end-user

The remaining ones I will deal with later
---
 user.js | 23 +++++++++--------------
 1 file changed, 9 insertions(+), 14 deletions(-)

diff --git a/user.js b/user.js
index 3930e10..3d95610 100644
--- a/user.js
+++ b/user.js
@@ -139,23 +139,10 @@ user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 /*** [SECTION 0300]: QUIETER FOX ***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
 /** UPDATES ***/
-/* 0301: disable auto-INSTALLING Firefox updates [NON-WINDOWS]
- * [NOTE] You will still get prompts to update, and should do so in a timely manner
- * [SETTING] General>Firefox Updates>Check for updates but let you choose to install them ***/
-   // user_pref("app.update.auto", false);
 /* 0302: disable auto-INSTALLING Firefox updates via a background service [FF90+] [WINDOWS]
  * [SETTING] General>Firefox Updates>Automatically install updates>When Firefox is not running
  * [1] https://support.mozilla.org/kb/enable-background-updates-firefox-windows ***/
 user_pref("app.update.background.scheduling.enabled", false);
-/* 0303: disable auto-CHECKING for extension and theme updates ***/
-   // user_pref("extensions.update.enabled", false);
-/* 0304: disable auto-INSTALLING extension and theme updates (after the check in 0303)
- * [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle) ***/
-   // user_pref("extensions.update.autoUpdateDefault", false);
-/* 0305: disable extension metadata
- * used when installing/updating an extension, and in daily background update checks:
- * when false, extension detail tabs will have no description ***/
-   // user_pref("extensions.getAddons.cache.enabled", false);
 /* 0306: disable search engine updates (e.g. OpenSearch)
  * [NOTE] This does not affect Mozilla's built-in or Web Extension search engines ***/
 user_pref("browser.search.update", false);
@@ -660,7 +647,7 @@ user_pref("media.peerconnection.ice.default_address_only", true);
  * [NOTE] This is covered by the EME master switch (2022) ***/
    // user_pref("media.gmp-widevinecdm.enabled", false);
 /* 2022: disable all DRM content (EME: Encryption Media Extension)
- * Optionally hide the setting which also removes the DRM prompt
+ * Optionally hide the setting which also disables the DRM prompt
  * [SETUP-WEB] e.g. Netflix, Amazon Prime, Hulu, HBO, Disney+, Showtime, Starz, DirectTV
  * [SETTING] General>DRM Content>Play DRM-controlled content
  * [TEST] https://bitmovin.com/demos/drm
@@ -1286,6 +1273,14 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc
    // user_pref("browser.warnOnQuitShortcut", false); // [FF94+]
    // user_pref("full-screen-api.warning.delay", 0);
    // user_pref("full-screen-api.warning.timeout", 0);
+/* UPDATES ***/
+   // user_pref("app.update.auto", false); // [NON-WINDOWS] disable auto app updates
+     // [NOTE] You will still get prompts to update, and should do so in a timely manner
+     // [SETTING] General>Firefox Updates>Check for updates but let you choose to install them
+   // user_pref("extensions.update.enabled", false); // disable extension and theme update checks
+   // user_pref("extensions.update.autoUpdateDefault", false); // disable installing extension and theme updates
+      // [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle)
+   // user_pref("extensions.getAddons.cache.enabled", false); // disable extension metadata (extension detail tab)
 /* APPEARANCE ***/
    // user_pref("browser.download.autohideButton", false); // [FF57+]
    // user_pref("toolkit.legacyUserProfileCustomizations.stylesheets", true); // [FF68+] allow userChrome/userContent

From 7e18f8b47365d0b4155b83809830bfd10735c164 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 24 Dec 2021 06:01:41 +0000
Subject: [PATCH 0995/1147] tweak 2011

- FF85+ switched to using application regional locale
   - go to about:support > Internationalization & Localization (almost at the very end)
   - look at Application > Regional Preferences
- add test
---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 3d95610..4e82ff5 100644
--- a/user.js
+++ b/user.js
@@ -131,8 +131,9 @@ user_pref("browser.region.update.enabled", false); // [FF79+]
  * [SETTING] General>Language and Appearance>Language>Choose your preferred language...
  * [TEST] https://addons.mozilla.org/about ***/
 user_pref("intl.accept_languages", "en-US, en");
-/* 0211: use US English locale regardless of the system locale
+/* 0211: use en-US locale regardless of the system or region locale
  * [SETUP-WEB] May break some input methods e.g xim/ibus for CJK languages [1]
+ * [TEST] https://arkenfox.github.io/TZP/tests/formatting.html
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=867501,1629630 ***/
 user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 

From 2787da7f90b31b19d3549b61a77210b79bd1166b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 24 Dec 2021 06:04:38 +0000
Subject: [PATCH 0996/1147] Update README.md

---
 README.md | 1 +
 1 file changed, 1 insertion(+)

diff --git a/README.md b/README.md
index 1522a3e..80ceef9 100644
--- a/README.md
+++ b/README.md
@@ -20,6 +20,7 @@ Also be aware that the `arkenfox user.js` is made specifically for desktop Firef
  - [wiki](https://github.com/arkenfox/user.js/wiki)
  - [stickies](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+is%3Aopen+label%3A%22sticky+topic%22)
  - [diffs](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+label%3Adiffs)
+ - [common questions and answers](https://github.com/arkenfox/user.js/issues?q=is%3Aissue+label%3Aanswered)
 
 ### 🟥  acknowledgments
 Literally thousands of sources, references and suggestions. Many thanks, and much appreciated.

From 7016c2050d20d53242c30eaf0b3beca947e172f6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 30 Dec 2021 03:15:56 +0000
Subject: [PATCH 0997/1147] move TLS 1.0/1.1 downgrades to don't bother

https://bugzilla.mozilla.org/show_bug.cgi?id=1745678
---
 user.js | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 4e82ff5..804f901 100644
--- a/user.js
+++ b/user.js
@@ -475,8 +475,6 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
  * [4] https://www.ssllabs.com/ssl-pulse/ ***/
 user_pref("security.ssl.require_safe_negotiation", true);
-/* 1203: reset TLS 1.0 and 1.1 downgrades i.e. session only ***/
-user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
 /* 1206: disable TLS1.3 0-RTT (round-trip time) [FF51+]
  * This data is not forward secret, as it is encrypted solely under keys derived using
  * the offered PSK. There are no guarantees of non-replay between connections
@@ -1108,6 +1106,10 @@ user_pref("privacy.firstparty.isolate", false); // [DEFAULT: false]
  * In FF96+ these are listed in about:compat
  * [1] https://blog.mozilla.org/security/2021/03/23/introducing-smartblock/ ***/
 user_pref("extensions.webcompat.enable_shims", true); // [DEFAULT: true]
+/* 6010: enforce/reset TLS 1.0/1.1 downgrades to session only
+ * [NOTE] In FF97+ the TLS 1.0/1.1 downgrade UX was removed
+ * [TEST] https://tls-v1-1.badssl.com:1010/ ***/
+user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
 /* 6050: prefsCleaner: reset items removed from arkenfox FF92+ ***/
    // user_pref("dom.caches.enabled", "");
    // user_pref("dom.storageManager.enabled", "");
@@ -1150,7 +1152,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("security.ssl3.rsa_aes_128_sha", false); // no PFS
    // user_pref("security.ssl3.rsa_aes_256_sha", false); // no PFS
 /* 7004: control TLS versions
- * [WHY] Passive fingerprinting. Downgrades are still possible: behind user interaction ***/
+ * [WHY] Passive fingerprinting and security ***/
    // user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
    // user_pref("security.tls.version.max", 4);
 /* 7005: disable SSL session IDs [FF36+]

From 06b8d8bfa3a8fd63083be4aaa1afbe0d21df8814 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 7 Jan 2022 17:29:26 +0000
Subject: [PATCH 0998/1147] move 0362 to don't touch

---
 user.js | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 804f901..a6f8472 100644
--- a/user.js
+++ b/user.js
@@ -219,9 +219,6 @@ user_pref("network.captive-portal-service.enabled", false); // [FF52+]
 /* 0361: disable Network Connectivity checks [FF65+]
  * [1] https://bugzilla.mozilla.org/1460537 ***/
 user_pref("network.connectivity-service.enabled", false);
-/* 0362: enforce disabling of Web Compatibility Reporter [FF56+]
- * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla ***/
-user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
 
 /*** [SECTION 0400]: SAFE BROWSING (SB)
    SB has taken many steps to preserve privacy. If required, a full url is never sent
@@ -1110,6 +1107,10 @@ user_pref("extensions.webcompat.enable_shims", true); // [DEFAULT: true]
  * [NOTE] In FF97+ the TLS 1.0/1.1 downgrade UX was removed
  * [TEST] https://tls-v1-1.badssl.com:1010/ ***/
 user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
+/* 6011: enforce disabling of Web Compatibility Reporter [FF56+]
+ * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla
+ * [WHY] To prevent wasting Mozilla's time with a custom setup ***/
+user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
 /* 6050: prefsCleaner: reset items removed from arkenfox FF92+ ***/
    // user_pref("dom.caches.enabled", "");
    // user_pref("dom.storageManager.enabled", "");

From ab7380c93b244992234e33c424f4bd7579f8e53e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 11 Jan 2022 09:21:37 +0000
Subject: [PATCH 0999/1147] HoM: tweak background request info

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index a6f8472..0d9bf72 100644
--- a/user.js
+++ b/user.js
@@ -543,8 +543,8 @@ user_pref("dom.security.https_only_mode", true); // [FF76+]
 /* 1245: enable HTTPS-Only mode for local resources [FF77+] ***/
    // user_pref("dom.security.https_only_mode.upgrade_local", true);
 /* 1246: disable HTTP background requests [FF82+]
- * When attempting to upgrade, if the server doesn't respond within 3 seconds,
- * Firefox sends HTTP requests in order to check if the server supports HTTPS or not
+ * When attempting to upgrade, if the server doesn't respond within 3 seconds, Firefox sends
+ * a top-level HTTP request without path in order to check if the server supports HTTPS or not
  * This is done to avoid waiting for a timeout which takes 90 seconds
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1642387,1660945 ***/
 user_pref("dom.security.https_only_mode_send_http_background_request", false);

From 926a2d4ac8ee7971090583c1ff190b714c227bd9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Jan 2022 05:09:17 +0000
Subject: [PATCH 1000/1147] v96 deprecated, #1325

also tidy the description to reflect that the setting is hidden
---
 user.js | 10 ++++++----
 1 file changed, 6 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js
index 0d9bf72..c46cf19 100644
--- a/user.js
+++ b/user.js
@@ -140,10 +140,6 @@ user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 /*** [SECTION 0300]: QUIETER FOX ***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
 /** UPDATES ***/
-/* 0302: disable auto-INSTALLING Firefox updates via a background service [FF90+] [WINDOWS]
- * [SETTING] General>Firefox Updates>Automatically install updates>When Firefox is not running
- * [1] https://support.mozilla.org/kb/enable-background-updates-firefox-windows ***/
-user_pref("app.update.background.scheduling.enabled", false);
 /* 0306: disable search engine updates (e.g. OpenSearch)
  * [NOTE] This does not affect Mozilla's built-in or Web Extension search engines ***/
 user_pref("browser.search.update", false);
@@ -1339,6 +1335,12 @@ user_pref("_user.js.parrot", "9999 syntax error: the parrot's shuffled off 'is m
 // 0807: disable location bar contextual suggestions [FF92+] - replaced by new 0807
    // [-] https://bugzilla.mozilla.org/1735976
 user_pref("browser.urlbar.suggest.quicksuggest", false);
+// FF96
+// 0302: disable auto-INSTALLING Firefox updates via a background service + hide the setting [FF90+] [WINDOWS]
+   // [SETTING] General>Firefox Updates>Automatically install updates>When Firefox is not running
+   // [1] https://support.mozilla.org/kb/enable-background-updates-firefox-windows
+   // [-] https://bugzilla.mozilla.org/1738983
+user_pref("app.update.background.scheduling.enabled", false);
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From bc2aba3829f6bbe5e5f8739f120cc6f6f251ffba Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 12 Jan 2022 05:25:31 +0000
Subject: [PATCH 1001/1147] move last update pref to personal

---
 user.js | 11 ++++-------
 1 file changed, 4 insertions(+), 7 deletions(-)

diff --git a/user.js b/user.js
index c46cf19..a9d2a0e 100644
--- a/user.js
+++ b/user.js
@@ -139,11 +139,6 @@ user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 
 /*** [SECTION 0300]: QUIETER FOX ***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
-/** UPDATES ***/
-/* 0306: disable search engine updates (e.g. OpenSearch)
- * [NOTE] This does not affect Mozilla's built-in or Web Extension search engines ***/
-user_pref("browser.search.update", false);
-
 /** RECOMMENDATIONS ***/
 /* 0320: disable recommendation pane in about:addons (uses Google Analytics) ***/
 user_pref("extensions.getAddons.showPane", false); // [HIDDEN PREF]
@@ -1275,8 +1270,10 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc
    // user_pref("full-screen-api.warning.timeout", 0);
 /* UPDATES ***/
    // user_pref("app.update.auto", false); // [NON-WINDOWS] disable auto app updates
-     // [NOTE] You will still get prompts to update, and should do so in a timely manner
-     // [SETTING] General>Firefox Updates>Check for updates but let you choose to install them
+      // [NOTE] You will still get prompts to update, and should do so in a timely manner
+      // [SETTING] General>Firefox Updates>Check for updates but let you choose to install them
+   // user_pref("browser.search.update", false); // disable search engine updates (e.g. OpenSearch)
+      // [NOTE] This does not affect Mozilla's built-in or Web Extension search engines
    // user_pref("extensions.update.enabled", false); // disable extension and theme update checks
    // user_pref("extensions.update.autoUpdateDefault", false); // disable installing extension and theme updates
       // [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle)

From 7a4676fe2dcb5bf55974b5cbc82f8353114175d3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 15 Jan 2022 05:25:11 +0000
Subject: [PATCH 1002/1147] make 1601 setup tag more explicit, closes #1326

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index a9d2a0e..d321a4f 100644
--- a/user.js
+++ b/user.js
@@ -573,7 +573,6 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
    // user_pref("layout.css.font-visibility.trackingprotection", 1);
 
 /*** [SECTION 1600]: HEADERS / REFERERS
-   Expect some breakage e.g. banks: use an extension if you need precise control
                   full URI: https://example.com:8888/foo/bar.html?id=1234
      scheme+host+port+path: https://example.com:8888/foo/bar.html
           scheme+host+port: https://example.com:8888
@@ -582,7 +581,8 @@ user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
 /* 1601: control when to send a cross-origin referer
  * 0=always (default), 1=only if base domains match, 2=only if hosts match
- * [SETUP-WEB] Known to cause issues with older modems/routers and some sites e.g vimeo, icloud, instagram ***/
+ * [SETUP-WEB] Breakage: older modems/routers and some sites e.g banks, vimeo, icloud, instagram
+ * If "2" is too strict, then override to "0" and use Smart Referer (Strict mode + add exceptions) ***/
 user_pref("network.http.referer.XOriginPolicy", 2);
 /* 1602: control the amount of cross-origin information to send [FF52+]
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/

From 09d62d2302c2306f5430a397596667ff167edce7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 16 Jan 2022 02:31:57 +0000
Subject: [PATCH 1003/1147] remove 1273: "not Secure" text on insecure sites

AF has been using HTTPS-Only mode since v84, the interstitial is more than ample, padlock is still marked as insecure
---
 user.js | 2 --
 1 file changed, 2 deletions(-)

diff --git a/user.js b/user.js
index d321a4f..22e5141 100644
--- a/user.js
+++ b/user.js
@@ -555,8 +555,6 @@ user_pref("browser.ssl_override_behavior", 1);
  * i.e. it doesn't work for HSTS discrepancies (https://subdomain.preloaded-hsts.badssl.com/)
  * [TEST] https://expired.badssl.com/ ***/
 user_pref("browser.xul.error_pages.expert_bad_cert", true);
-/* 1273: display "Not Secure" text on HTTP sites ***/
-user_pref("security.insecure_connection_text.enabled", true); // [FF60+]
 
 /*** [SECTION 1400]: FONTS ***/
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");

From b5bf2ee0171d6bf4a428f944054f778b47a7deb9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 16 Jan 2022 02:34:21 +0000
Subject: [PATCH 1004/1147] oophs, add removed item from last commit to 6050

---
 user.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/user.js b/user.js
index 22e5141..0037897 100644
--- a/user.js
+++ b/user.js
@@ -1107,6 +1107,7 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
    // user_pref("privacy.firstparty.isolate.block_post_message", "");
    // user_pref("privacy.firstparty.isolate.restrict_opener_access", "");
    // user_pref("privacy.firstparty.isolate.use_site", "");
+   // user_pref("security.insecure_connection_text.enabled", "");
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");

From 83b6d64e67d663603ff9e52a5b6627d7927ba86f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 16 Jan 2022 02:36:08 +0000
Subject: [PATCH 1005/1147] security.insecure_connection_text.enabled

AF has been using HTTPS-Only mode since v84, the interstitial is more than ample, padlock is still marked as insecure
---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 6aa8c31..9d2ec12 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 11-December-2021
+  Last updated: 16-January-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -232,6 +232,7 @@
     'privacy.firstparty.isolate.block_post_message',
     'privacy.firstparty.isolate.restrict_opener_access',
     'privacy.firstparty.isolate.use_site',
+    'security.insecure_connection_text.enabled',
     /* 79-91 */
     'alerts.showFavicons',
     'browser.newtabpage.activity-stream.asrouter.providers.snippets',

From ac0820a5dc00e04fe14fc2a74ba75e590883293c Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 21 Jan 2022 03:48:06 +0000
Subject: [PATCH 1006/1147] add last bits about ETP Strict/dFPI, closes #1337

---
 user.js | 13 ++++++++++---
 1 file changed, 10 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 0037897..9c60d66 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 * name: arkenfox user.js
-* date: 9 December 2021
-* version 96-alpha
+* date: 21 January 2021
+* version 96
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -757,11 +757,18 @@ user_pref("extensions.postDownloadThirdPartyPrompt", false);
 /*** [SECTION 2700]: ETP (ENHANCED TRACKING PROTECTION) ***/
 user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin' choir invisible!");
 /* 2701: enable ETP Strict Mode [FF86+]
- * [NOTE] ETP Strict Mode enables Total Cookie Protection (TCP)
+ * ETP Strict Mode enables Total Cookie Protection (TCP)
+ * [NOTE] Adding site exceptions disables all ETP protections for that site and increases the risk of
+ * cross-site state tracking e.g. exceptions for SiteA and SiteB means PartyC on both sites is shared
  * [1] https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/
  * [SETTING] to add site exceptions: Urlbar>ETP Shield
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Enhanced Tracking Protection>Manage Exceptions ***/
 user_pref("browser.contentblocking.category", "strict");
+/* 2702: disable ETP web compat features [FF93+]
+ * [SETUP-HARDEN] Includes skip lists, heuristics (SmartBlock) and automatic grants
+ * [1] https://blog.mozilla.org/security/2021/07/13/smartblock-v2/
+ * [2] https://hg.mozilla.org/mozilla-central/rev/e5483fd469ab#l4.12 ***/
+   // user_pref("privacy.antitracking.enableWebcompat", false);
 /* 2710: enable state partitioning of service workers [FF96+] ***/
 user_pref("privacy.partition.serviceWorkers", true);
 

From 10044fcaf77bfe19f2b90c606232f0a9e83401c9 Mon Sep 17 00:00:00 2001
From: fabrizio <fxbrit@tuta.io>
Date: Sat, 22 Jan 2022 01:49:48 +0000
Subject: [PATCH 1007/1147] typos #1342 (#1343)

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 9c60d66..e80a95c 100644
--- a/user.js
+++ b/user.js
@@ -1,6 +1,6 @@
 /******
 * name: arkenfox user.js
-* date: 21 January 2021
+* date: 21 January 2022
 * version 96
 * url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
@@ -1089,7 +1089,7 @@ user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true]
  * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks
  * [TEST] https://arkenfox.github.io/TZP/tests/windownamea.html ***/
 user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true]
-/* 0607: enforce Local Storage Next Generation (LSNG) [FF65+] ***/
+/* 6007: enforce Local Storage Next Generation (LSNG) [FF65+] ***/
 user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 /* 6008: enforce no First Party Isolation [FF51+]
  * [WARNING] Replaced with network partitioning (FF85+) and TCP (2701),

From cc7ca9d0fa3d4ca4c929ad55c218b9bf3d0daffa Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 29 Jan 2022 05:24:41 +0000
Subject: [PATCH 1008/1147] cleanup dead images (#1353)

---
 wikipiki/backup01.png   | Bin 5639 -> 0 bytes
 wikipiki/overview01.png | Bin 19862 -> 0 bytes
 wikipiki/overview02.png | Bin 11179 -> 0 bytes
 wikipiki/overview03.png | Bin 18001 -> 0 bytes
 4 files changed, 0 insertions(+), 0 deletions(-)
 delete mode 100644 wikipiki/backup01.png
 delete mode 100644 wikipiki/overview01.png
 delete mode 100644 wikipiki/overview02.png
 delete mode 100644 wikipiki/overview03.png

diff --git a/wikipiki/backup01.png b/wikipiki/backup01.png
deleted file mode 100644
index e10f1ea228659521464f6508b74a1369f0d4dc03..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 5639
zcmc&&cTiJrm%b?Ar3XPlY7`q%Rf-_RL=C7^snQ}K-2e)qBtS3(Q4#P{K&1*u6Dbj-
zcfqJs=_En~q#Jq&HGJ{6JKxTJJF~O<&Ft(y=iYhCIrq$Y-t#>7eQaW+$Hy(k4FCY&
zHT^3$0f4QU_5KCqWLfOm*h>I7)Oqa+%seQC_Cq&XTw_0Jx%N~;L~Xb~=QLT1ZZBe2
zWhh;FjAGX~X{Pj0SYtrMSJHaO_m^1dlCbNG6IZ{Cg{L*2ciw%8SRKq-Y>uiKN;`7x
zd{%n)_k|Y|%cohP`d?)506^n25Dr`#_!o_$4p?l}@F=&7yMQs?n~XHx+Z!+3@Yi}W
zLG@`}9p8Pq_)w{sid|kAuF|0;FlwpOK00x4(g0<tRQ8O6Mjy_lRBLw5HH_1vSE$7;
z^yMLYNIll2*jexkoss_#3Il=N8Fg?n+|z)YUp5FMF1UqPo($??lBKK25hYs21ex#@
zv^b#$EaA=@(A@fBYBUYoC<xkRY@(~uKEkQQhJYdR6VqdWM4UEfhJ=0>H6(H0L_($F
z<wn62#H9-eXC>;bSQ<Bc7A;dIKY2C?-*#wgOTUU2x(#lbOHr`*ePwAg^2vuWY3t%!
zc=qsmKDA>i5k)&YZnGNcS*6}$gienRt8p8RdN=<m@g|Q9+*;r4W^z{=bj>HXT#l81
z>=q7T%^oj7_|}&~zx7%ew5Z%l$5us{kge!<mv@p5mOYk%%Ydl#{y0Gm)pvtRvY<BY
z08lln3ewClMQ(TJR#jK&eNYuEx9V>*7BXOA781p+vhX@<k%!|i|5!xcJ&sY0D;K%p
z6T@##u3JfK!GelD&1&zRAv<BId8TJXWZ;1N;0(TGJKuD>*j@tVqW?<F0^S7{V7ep<
zX!2&2^`Y}H1IWH`$_8H9mDs*~x+g+eYs8)N@zo^;IEkssb?)HMN`$V(_apg{kR)2W
z(-A;J%n{<bUBcOBs>0PgvFt7Y(YDJ(5b8@3hxd<)5HJ@{%Nf`=c&@MzA*`y3QOSAC
z1qU>$HyTvAflET{M**nU|Er1M9LrU2c#_){CTN_#d(5GJHFUi+Xm@<ADz|_!OWN5k
z43a|EnlHAtIqexEYY(L(eDN0xsHMo3RrT~%`t{;s|Dv?IgM)@~n+q1iVr1)lLsZdT
zWIlPpzsP;!0l7jbKh&^|G5rSZVLT7BMn7d!qV|Ju*~X+4t<9jAedv}`W#_+Xoc3Yv
zU2n1u$fS+Buh9E&Zhm9OE_#wHDeE*&*icRz*lZdLM!(37ciRvm9~!K3x^lru;VEc5
z9Vjp9YWyVZn5g$_&ar$Y_th|odg|{0PjjiO*8AjjK)uhmipPxItvZpuaP>yfhI_8>
zO!ZP{gWvbM9^rHh(e2i=Ctrq?+x)c%Z05NF381*Lk2Rt_y7KTQsg?=G&$BY*y9#Uh
zW-EOY+@c=vP&DW@7@tHlxpY+eXC~gPf$4mjB1aEJjsPF$yuBvo5G5n#_2P#1cZF6t
zzO1`^#f`9gn+&SX25C=`-TnDfDYLXZl(XIR%5*e}m1I^-HqAUE)=Vj)EM`LUW?KRV
zg;VQ%5o|w9wkwJ&{QaQ3!2V&pS8JGLeaJMwz(kV8sBx`s-R`Bjt^WKQNQ4l<(jv=R
z>>IjtfER96qRJ1CTJ0Fye9v$KrL#P}^u$x=rs|gy&XpY^basApJ!L;%oqx~J#z6on
z{&>23IOqQBebcAPC1g=42ML{;hbUK4_rw@+Za8#N-KtJ9hhrcE+fvOlzZz_XJwBS=
z1bte746)x*O@o$2rWO7zx@$OUCcSmuA{FW%r-Izd(R9i|q-$t;XT3;J{G8XSHC3$q
zs#pY-Y4>AJU44+-hSikz`<4fqL$14&O0|tNaYl4wNBS-Vex4umlG&9=Y7fm%wLvTX
z^0SF=3saP&=#}5AlU3P9<H!tKQh5)vaJn0}mp52m*I`7dDdO2gW1)So#n2C*d`I@z
zT1v=Gp%{&us#xs~rAGRq@nE03`L1VQcEV1+qYBL3{_zYK+}Rv*zV)`<uPODsyv~A!
z^Kj&;`JeS%6FFC&`mB$7R4g&YIUJXgOD|TkQn@^6)>n1jLBL+T1L5d;Dz_qXUShTw
z+vzgb=e{I%k80Jl-HlPO*1R)GUhe{B(Y;7U*@KUxg<3Ma23~`emOlo|Mo*3%VPCB-
z!r{o<4=T4>2Tx=Qcn`O7X84IU2Fj2X?MTmbw-{oq&K0QLgYU*=J!DW(kZKCH63S~Y
z&exeyp{;lkbk_72g3VN0+VH_A{OF5aebA6<j4`Cz$iEa?7OK<Dg;Bb{dk3K-;2}o%
zXk3f6%^E?763|wI^uvTv(-<1r-MN3XN}<D}P?jSjRIDe(DET^MZql%U+KcZFtWO$Y
zm3FN!4*DC)Vl%S8P5aj}Z5iIkYk3YC;sf9L7aFDngF0t1QqIY^xZmt{1^O3*5qT9}
zKZEbi!$g0_XDi7)@RFfPkkd#*&1cm>`$=Ez8?j!_R<{SMPsZuptHYcq%J%AYsOOL9
zrpqgjA91Yna3Gy8&SBI{24}IR(+}O4&WPML(<!R!TJI}H*tfeS*UuMM@$kd*mxa@k
z2e2>P=Zb#t%9lJ!4Y;9MesY0=`t{CqTI1e``8xj(b=848{qDQar`A=6lj`}4^606b
zx`i!wp=*gU#26aw*Ab5(tE7iT!-^5zR%&e@op#Oe`2`3XkKWwKBGD`@qdp^byLZR#
zULB&J6<i`?IKhL%F|X-Zgz}vDBYI$pCws<p^ODk#Y1}>9_DFV%n>v#kXutyxbo-ee
zFn<h;2^hq=bqEoN$kUl!W9LJU!r%~__06?b+vWW4eR+l6bj!Fij0XV={nWkR7eIR#
zzkWTQ%E}`-3_(=F{lXarGB~D1>lm>=V{><wSvSH0O25l>8My!LjZJ^x)j|ByID`On
zpZqUR2=Gi5|9@pZ4n!<XO>qL@(J+Wn3n@;T4dBw`X+G7k7m*eZ3%Vcy0IGrnp-Yf`
zmo)Ld`&bG}Uk_pguqb&JZ03T3Y*0zq1vVDLy_Eq^g+tlH{n^LZS$RAwB0+afE)X_X
z=}eP?-o1$%#Id-=@rwALmD}pfN?fQ2lD;ojYS1#QN*?{~D$BjsmH=E<Kdfdim^)I5
znyI<7vMTF1#@jqj4Gc_!%D35tsFl|?tq2hS<w{t@($~cU%hLi!2^+G^9XTES_ZbPI
zgh^204A_QK=Y`J`SzjvJ(g<_sIuNS)VIxEpBaf>O@e8vQI5a8RgY8$zuI+jxI5xN)
z;X+<RE=Os3%7?9;J55@N0qxPz{LQxaRMQ_%A~2{@;nK~7N^OajvGwciZs*S?ceLCs
z7Z&$OzO`KaK>;x6bH^_U1Fde~F7+U8f0udp1^QG<klg$MV=UI;X_ku#j#;_b_S+|F
zMsUnk*0s%$zS!}Bw<5;6b838UeWz-(zi>Gi_|oK#H{q9^Ac+uctkDMv<=<aTYC9t{
zpn)8YZzRWa5$aC2V%F81JS6!JCnnF)H~VQnMNR^1F2}n-<K8D3t;(2Z@l6xl&u{QG
zS4ZPRx<H@eDW@>B?JmRjg75<?&bOiBIS962PTf#*yup!?LtT`xJw2_eZ3jc`cd$&w
zGSlYE$(iQ+zKJ~Ni%>3GoDpP&ons&Slk@ZqV#*D(jHnoEPDI#s-+he)z8x$fu|M;(
zUsZZ6)I9fQ1M``lsf+%*#bLaOtd%>_pdB0AdXAnZxJAjZgh&~6amKjew$^6u`(Y67
z@^9F}Jtmae3@#Z!&UJ7B0W7=_auLy2&jG-G7L@9#GAUmhPO<^Y5Q0!6GLh{ch>C@#
z0IYM+^G|RbyamZbO6!KP1IMA@DW@48E<o{+S(cCq=U8_y58(UwzsKo+_PSf$&>&JX
z;=P1Su0CEfV)TPb6$o3n`<IIcVYGmY%NrX*o>UEVTwI(}1%>ZF=0<+};FXepIWslo
zy5#3}`L8pw77aZPay9?$DEJ^ukidQvcHtcR(QYODGuE))Ln!;!RmedC``8x<;Zg$#
zXAMgn!9!+5VEU|KnahxUyT@3&TmJ1F`2`N5O@`vO=}cc{`$)r-mq?2wL7bS<(PD6}
zp&A|HEvwc<n;xGlZ{xWyli2CJF<M|2mC5H_+@h7OlRW96yDE1t*}UO#xtrJIN6FHw
zE1PCT4@|ImnRwrtn`95-C`0&yEwQK5bYsYtn558xK{B-Q%4fm7LpbZbkxPPi)=d;*
zS0`#V3WI1B+v&L~J1d10R`V?=hQ|9WWD41OKkf2PJWu?wQPEJBqz;C^GRnC|lC+AN
zlKe;$^`I%ototL)WL?UoOBL!@2k%3?t(<ZQB!~ARp^=W)eFX{oImUFy<CNgwvf0k2
zRVnlW?UW9fz7qz)G2N$!W+%mtfdZ}iUsejYS)h#RY#*4-CS2E*478I>3V3U{uKIo5
z-~Nw(sZs?#%H?r^X0w^Xa`OE4N9%S=ryG#iPG8u@VBoTaRKhix)6}(Wro$1n{<vCQ
zH%OXZWMJT4o=o!xyZ$)K(G|VX^z~6zXQ;6&(i9_UKiQLYL>24Npjtnk6a+6929?Gm
zj#rF(7U9&o?@=8dSE=mYXXb=%{kX3oQaX%l!Ts_`%6vhQ?-+cy>(jZdZCtY%Yah^j
z7F|-O__AW?B@u_dUUKH;M?NEzU1*NybbfiRzu~R6Ov7AE+i#7WT&V>=tHibdX1iA-
zRqAiB8Q$7DYo%|OWSd=T4)ajfCYd{1@5xrgjxDW8PiaRC{>E^z!~j_hTV>}pjl~RG
z7DTRz!DhIcSL4pzJhML&<h3=qMZF;=n8sM9Gk=2c;4<sqS-j^pTH5w1*yBwVk=pVk
zi*MGoKFRf{Q=svlWjbRcXQj;J<V0|EZZDnl`Pxp$Ca)eP-Ok%fvTyptbnMv=wf#D@
zUi^aE>HTHD^>cgDn9#M*;YVUIRh=27QW(kx`8)mU@ekTg5x&I3ST9K8n3)zyPPYOX
z-D<$|^;}SS!Lg+$C`-y58awl<3!HSe9Glk4*{a&b95r0sYCD{?bplKf%+OHvAUqUS
zt7jy!wA7W;I0x}o3teP=zT+Vf?xTH|lrX9*NzzHM)djUBpRcrE7Z99HCc0?;-U&J7
z#9d-n_C{XptghQg?s^PWl;a5ck+@(r!gcNoVlSnDuM=&q7hrbRn3nWJK6=;h9?8Gl
z@czZm<$8A@pJTynQ%ZmZAx_OR*<vi$XF_aK!=WO+Kr^Q{M(`IIYw98cPUIlkd}TG6
zVG$*~P9Noqplgw-I+`d|F#G;!=-E%T{ceQv*dGjq`fH@ZyK;e<TLCNjmlyMr29637
ziVnRnjPS+NWPPM<4^K}!#m?sG6~Jb2Q^Pw)GNdGW)H<P(Hz1$mW1vs%<jn$B5=~$G
zw77CfBSnYtCA@FX48diZJ;^t1#xRUs70p$H7_rHf{!heo&&UFqNAnyRYN)ryF^Q6o
znNPoJq-Gn#hI0XwnW1T~U1#WAuVbPK*FcjxYMP8|@5{4u*z227A@}+jZswdwP4|;L
zpCe^RCL*xx5lil`%lmTqKjOrXdL+Bv6(tPho7yTz<sh8DAs~oiF>PZF&#Wu9q(!W8
z7<0x(K5NI_>}dwnyt(^>K%3JMw<>tFO9}~H>>IPE4R7m<Cx%efGfVuR73C|mnGXa%
znO%!vu5H`hAoj%u+HBlLDvzhso97fc%|U{~Tt;v+ev{Zar`M~cjrnD{(@FOePn5SW
z_=#G?+0d+=F}0n2c?TbsN6JqByr7^+tSvT%m7i7h{5@D&Tv!VwRaigF|DFVUq|*9j
z_^iU5K=YNvRyGkgZnWr&qvYNyeUG4yy$=T1hUdQ5K=|9`_lIfn-~-d6U@jhd1=YWJ
zOsuz#{pfu-#E1j-sPj*I-pHc-YyBIJ_q_wc-yo%RLLe;Ch&a%8A~+;O_z%bYgC^#g
zOo!hAHSZcO4|!JzF&K=9^o!#EJGE5`z0#l)wgUqCEU5;37{IXXpWIltUN!>FQBen&
zYuz2QU0m8)TD)O+HXy9<z?gT%MBI0&F5K;anfm~+qj^jIynps*d^r%lECXJ=Vhc2G
z2ofYS6@c42U^D;s!+>%ayJM6)4<M?GFS%UC0X&t44IL%#13t6<Dj+B}U_uWP@aWI>
zd2O(w;PtBxl>*vNzV93?*8c4CiX}aK<Sa{HTfb*Ss3WMX^`fI7e(Ci3eB>*I0ViEN
z=WMA00DKZRhL9Z!a*Rcs>XfLIXu8u$OG+=UgAq4giHwfaqQ8s$9iS={O}8Y6owT$K
ztw|X2bP0SZTlm*r9gyKg?1s0B9`&}mshq$TH0oM&^OJXj!;vOg>D9HAmD<olzWqAw
zs2!K<UOYhK(nF-Yv%zEU)^DPygsjHZJ-IGnmWQRto`7r#5<O+53`bGRIG6pA1GpWu
zKMs^+ds}=aAy)~-_Djq{b00%R^^8&{kv&y{(Dd(%J{iZ%nLTZiC7D3dn)_dUzAHgs
zdUVH^0|2kj2DC3%Qz7f31r${1eY>?<M}~>Yo7va`z(aLBRO_&eB5FDMpevT>kk4~#
z2X;Ervg%;jH3(;0{J>!#d@M!=Y_mv0ETyDI$n88e3D&8!jt=e3|9<;*5335wTFe3W
z|517Vxw<Tb2uSNZB9TZ<a%yEHk{*#l<5W5TG#1mLAwfZqKSJook2|Oe%Hyc0s3v3O
pzh>BhpU+uJKm5JmKg_Q5*H}nyzRuw-)&(zc?W)n0BKU3m-vNVfia`JX

diff --git a/wikipiki/overview01.png b/wikipiki/overview01.png
deleted file mode 100644
index 2c8f3b60d732604803fe1bd7eef5ec361d5f790f..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 19862
zcma&NV_;;>*7x0+*qLO4i6*vfPi)(m*tTukwryJzOl(eUzdduEbKmDY&xiN<knXPR
z-qm}ps=aH~Z~a%Oth5L`3?>W!0Du=06_N)4K9K-F&p~|xzFyH~umazpZA8`V0RUK(
zKYt*Av<wUY07k}CP*7I(hqZ&X{SRv!JTXB*JR3V}V^a$w0KjD>Q^7=0;TVnkVdGXn
zBE%;_!de~`3Qt}j+~-Ry2?ahhl6VMy?k`li-p}8^gJF&2gn&jx`9z?~QNe}5EJN<$
z=SBJFhlGv2Y`f>1FLpc}OujcR@f=p%WY$kZ_CUcUi89JD`@oe7;C|lnA08Om-lO63
zg(0#5AVJj|;@iIwf&d=9xVR_@dLX+1ATIN;P=Fq(^d36w;19$TfmBTpp8${^hgdcV
zD4#C?KDQ`=A^@K-h)-q;i2@)844^x1puY={r3UDddLPUKd@>(X-9Z2v3HYcWIk5md
z6r&I!zz<G9#k6wRcYrD#;ES=u06Sor8bBweVk`=%X$JI6A;H!Gpx^*>av_1_05Ere
z?g$~F3m_mB@J0Aqh3ks43h9sn=&95?u2v%U@4gyP)V7c+Dm1ucQ)1|pUs&`$>80_}
z^tq;fW$<M}+`5?n0CHkcf!5x<xlAEcO-->xH6iFwpL9cf5a{dgzVA<$+wcJZ+YVl{
z?^Lw)m_D2kK9=u!#OGi?v|)1`AHt365cwJbImat1H#UEK^F24F_1CZcy}f1e0RauY
zF%{2ulRljul{bqgFRs^zyREJrB3}kAUlFj!t-gs{$wKVuIOqWVwS#Dp*Jjv{SDbl*
z0WtknRf;dWa>%w(LTM2<421-t0&(Pn#B(2pJDXH5pgfz*fEqI%5cgQ>5-kJJdkIn`
zRfnFP2LRx@-MaTD85F3`5C83H=Z_2CH<27-fRC|QoGk#LEks14I9AU)3<UrP<@i$6
z@MGQfVo>!!VE2Nr^}@dDvIGba4fF{h3BVZoVB6`ESNI8#1x?oAQ0UVB<ila=k^2!8
zZ-YS7r__SLZG-r%2bI-J*5L~c#y<juqKCf{0-_(LN*D!&o*MXw-zy4+98QEc8uCSs
zKq8h|lwLke5l=}J=bGE@6ML|xa9b?r2!O%wHK;>`KEbz6j{7HEqhM<ZD`tRj9_);v
z1ASUFT2A_mT>~a}1WWGWO!*JQm1rKpVY;3p3`oWS3p$#iet}vxD(HBF@mhikxbh*)
z8s!Sm_Ru?n=~`znWZ&;S&@5oi0(g43{GzIos?y7%C3x6GOrKYvS)oA#<oZYn;!7kN
zNZLL>4PfXq&<CrEQV}j9N2AapxrYc2uo5AM3Nnzk#(Wa1El`|8o)ez4k|#W-Dotk+
z#UzX$T`@GTgJe&j!lN7s+{@hS-(%dv+QYxrfXUS7vn_a3*ddc2GZX*1kF?LU4`GzT
zz^{~_Ccj>itN58YT3w(rw@JQQF1Q4R$uW(6(jQGsqOdYAaUSyr`i}?G>LZ7?&+Cb}
z(#bO_bK}P%N6AN^x6W|zL8$)2Atq#B(=i}1Oujl}RHsN5eVq^gI;=>?N`IPin2MNc
zt)xoPMB#xNI|h>|o=B32MM0}rT2@rHQ3k7YqcpA<U8=3%StYE*sIXfK{WGatsVr0W
zQ~^uDq?EHHxXh%)T9LQFOYJQbLakr2Uq-M%E~i#!w_^wo*5GTs3l+XOe0h+gFY^FN
z?c^^HCyMrzH=Oox?y}Ncc0opQMwNQ`n*?KC$lVm%#|#H)=tHvN<QuQBjV~AEJLFhJ
zOp>kiMw;ejNy$m7<)Y<s<szq@ELCU4nMIx7+tprt5%`D2Ni|7DOrod2GY=JhDXbU6
z6r)LTbKF(Yl$jS|<+ckscUu*or(|_$`(#O47jL+B9zJ7x(!MFaSw0uviNL8s)WZ=$
ztinxUa1AosT65vh4zFIx32OE82^Q)l>LqUn#J0|I<u3?F3L{3C4r%TZ?OG054&{?T
zkl>R@NS#QXr^!pT7LgZmN^(jLPfkqcO)jP~r*qRUF&w5JrZ1&$HtVXps8cnSG_@Fs
z)$OSlshu}<SOu!Hs}-s$scY2>S7ufcFSb{<7k@5pm5!G#&ssF;ueoX(Z7Oa4TC=|l
zv0Bw++2pBbqK|IUJXqC#9^V=7+2$Gf#tjJ{{0pHRM;*t@zQOJbhcd@T+Em6lujk-x
z(lM=x>NL{yGUIL&$~gIeX{JK@yod?9Nvpm8O-OjCgx@$#G7n8U*3kM$=bpI3ovqfk
z+uU7ddVPA|S;=bkIm@}}dGK2H1XDJ7mKvk|O#g`BmfZd<FKl)qo%v>kmyDo{uSw$}
zA*}&ztV-olO>?1h*@NB%I?p|iUG^@|E*I+t!-ks91Zz+8Nb|T%zjc;Q;HIEA;fLXe
z+s7=R*oPRz1T@r_-&f<)%cGkIes>fv$EwkN-LEtLh@4h_RQ_ncO27TyO8g%qzhf%#
z9}ZKdVy8?I0%g697H1&!4)ntNz2Ha#g9BB9c%y7WR554ilbM}o*97f1g`S0ygf`Mm
z=w;Zesl}Noc*<zZxK>!(nA&)UXpGe+7F07;#VjPS*=Z=MSgb6%Heb(ff_E}^V0Yco
zQ)oxDY+Q4v`fdY@(MoBMsW_7OBtxXx5-$0XC`!;Gh_6wciKAd#`*8Y92xw<nW<!<*
zH7RhVuSF@O+~R)6b}+jV4Kfx|?Y9Pymd12Q!b`5Fb7Y~VIpJ9{aC3Ch`^Uw`*b0>4
zOT{;toR}OKJB?Qu1=hU}T7@^$;wD0ln%BovfU8l%Gzk<PDXNn#Q9#z27^xU{Plk@M
zCzWSWPM%HFkFCbAW?W={oFVriZ^tzi21%$;<ES2VR+zEZaoM`A!tA1gQwAwRRB*L~
zHBneD$dsR{Bv*NLlDJ8k`)c=&`Smt}n4iKb!R!Zmo~|vOY00S4s%<vvJqKlC@t}r=
zRef1SPe%1#CR=ma#|pL{>rP!uXeccoXf>QRo-;l^*r3kRKu9V}K1fEeg8#MB0Kci+
zaCUe9eU&zOl5Dlzze%t)zniP2!>D+4YLb&zu|V-w@mZ1Od~Ur_Z|Tu$_8iN-<DTjF
z!m38c!yC_N*QyeTlGK9ng3*iEOZ@|HRcP7qW73PIR;9G1?b$Hs9OxS)Awttq>(2$8
zIc`Py=tas?5rpAyUGJF}&eZTM@Jf*xLpy{vLauwq573(rxbPe+P7&@E+mQ3$oN!EV
zXw3xDuG56m71CZb^flUKCU|BSPd40MMOMEdW-xK7xr*N?j+(9<`_0FjTu(=2CT4ni
z(LAl`uI4ql9~w+;nju<Wv>`cc&wc+0KjiG-oYK5*ak#Eq-A7SrQAw-j(6KymIN^Ga
zpO+bK&uCApYSlDvJ$LJDbT@uD#>!%yTEFddy+Zp~T*zYQUhlkdvwj$SxZ6Zq_p&2>
zn;LKb<xF~B*&)-RbIW(e|4VQ^c!5{reQo(-&D*TUIp=0}P2>S0(0}?p_AVMx5Ij0H
zdOQd|=roIshn;<g*Y553wODZ4aGE3w{XOq}yb2wS*6VTMbZKffWi~hYIyt`E(xdS0
zr04W&_3BXH5N_9~3nRVut@6uRuk)HS&PDzvqRgHLo;TUYkEhx@g_+`)_^<KtA7G#<
zH?Iba)T_XF6VE_YUJ3wkBL)C``~iTc58(ST0N_Xm0G#Lo030a*0J?RY&Y&;=AkZr&
z#INYG^1IXBMsX>X_W5)-qX#<f-ijE{@8`N1_vH_&TRa#%d}s%L;Rq!W7#I|gLL1@M
zEc4+~15V~r+f;FOMFg65D`V{JI?^oj=rTT|{4bz{O56M_HpEDH0uFhQb_qEm<?X}-
zxe?F!+aQM-^M}#vw2sxC?q?h8ZeHEupX*i4J)`d`?<yPb=VaQrr(aFTcD7%!A1`Mn
zHRAd3kf6+wK72L*d;k+?2m9p9my;m)r}3!}8`!{;9mD_M1`^r+pN6kI0`LeDRD#`~
z1|NCwe>DDe_CH<y>+C*;L6l>SY{japV%n~l_uZu>j`tOgsn^YyV`G4~+v|55!P=TC
zr^BGo%}sAGz$IS2hjpFh+Gmtb?hz{MM`bau++*m|%b(qlAMvKv23b{02b!vz9UmiE
zhTRNiFMFn4bv?Jp&4=B&SQz$$YO-7tisi3nm~4^p5_(Q0N3Ppk`UoNpegZ03o^p5F
zW!7X)$Z|2m9Ur2;R<g#UVY%0G)sB?(JzWK5PQ6ugmwjEUtSMG2N#VKS+|oVy(~`p_
z-djTUBvkpB)N^_b<*tfU6|0kKn|6hR$e!6;lh6SRAO}LSoVz>p@Th1;A7+I7*;akJ
z<`Nec7T|*(TIyvy$w)e3D#OP1Wu4XI$;J`;k%M9Y+07agtC~B5r^+!aLge@W_I7v(
zgFN?~&dOomiED`Z%BL`;73UNx>dgE)_Y!$R00!o%1U>8Wv+YI2PfMjLzyqJVhRl~z
znvPb;)O~p4hn$#rN<dX^_~8pqSErJrHUW|*S-1VKco+Z(H|TT!;=0Em#V%3}OeWQ_
zB=>&D7b0%I>o}P(d+_co$<=;vt=|jDtY2FEInZHG%L2NRrsRrF*{J1F;rPcyFxZL&
z8xU<9f27i#kBWUtfS_s3DPkdo?(N0nw5g5aV8*fu%Cf79PY>Fz9Y`wFHJ&j;QLJp@
zVZ~(Zbn9bgI+AB$WEmT-Dr$jK4k{F5$0b7FgBD!s4COz>I5WdyKC2u@1$*FANZw%~
zon3IgZ|iEqW=;1tDEmbNc!dymC!608&Uf_vVsi0RKlLVZoyR0n)JhLuNj+JwueW}F
zyXQ4r0d&H`j;?*Y66WqTLAhkm4PI-Gu}qvbI>||V=Qw{UokOh{OlDbU>LSoGK}`!<
z`T|Z>H-^qVoVsu+kE<_73Ul$6?kRXU#+LWo!t`_{et44Vzb2plxF7@cP?ue37s;KF
zs~Lcvu8uwCId$L6eD{)k@wdNJ-*Abaw$?pg-Npvx2V4vAw0b9M7K#pc4{&R1tXMf-
z)8V`rxu5gaTdU3wZgxd!N=gIA2~3P76QV7psNTkqf)h~eB8NK6{9WCn%Bu%!x4h_<
z7Tju4z?mbBWXCw{X&`eR-lUN3%<QBS+UvnJbgh;l+)Y5(GOC2)aZ>_+WxyDi2^!Q^
z`vGbYm7XISh^*}a(x$UNPvh4X+YtaZ5gLbMcX<(lnv%4kaK{KmSq$dE3qfTkLrgR(
zkI&f6Q%dPl7&wPbo@-{~sPWtfXCmUW>#taHHNU8I+otpu4Py^{4gPpQqUIs+d`8Xl
z`F=$nC4A0Npdw#-L5i;>3)5h<Y!PU5kP&BdYF^5ZX4OvR7CSICMuU70Npl+iM0^DD
z;7o(PXg1`EOetkP$lGRS>gd&zo+jd?8Xa@FdNH_2N5^>XqB#)YC?{!$1UlZq_w7YO
z1<xK8a%R#U&x7mDog+_vHMLPkO*5|-&A+w?9uO?7;rZiNVRLu;=y~_l4#|9JX_?B}
z0ZS75Ml~kJT?SU>pI?#>$7+ylU5G3<vUX2SqxWYAww++}Z~=2tL*O4<4#Y5SJk9Kf
zY=QK^XNgs<Bqq%D-8-FBQY2t_IbbzK<EYc(YNJh+Dqf5v9v5(XTqKk%xc+53nWkPY
zhU@ol?oFN}apd?!+QkUt>@25nrOY#g=3G4V#rC(U0xlE_1L@X-6{@)-jwV4S1p1Gj
zP<?$}F=iUEpY)^xKky}F3RU$d@@rJ}Vd5C$?HjjQ=Z`ZOQ>1(#M@jN?bdBK>R2b8)
zju;Ur`}4fVV}lIsw!|%Dh~`FVAX6Gv1v=H*io5h=Y%sqyuY^emc4M4kbNg2fl?8Q-
zL_?{11~EC;++lZm$?0gVr=TpWjbtgktW*&*|6DwLuDZjX(Yt+yzxix!ui<=CB2IfH
zo_rHm+EGh!>8tnzX6avA+r^Yq?01XA&k?cm+ucsf00DAs#NS@Is#QIlZF0|9tL2YL
z-42=i;?1SCW%!6a8S5-2P?{?NFO1r9!)Z|Xfs)+A`v#%R(E<jc)FDPBA7=g5MN_l(
z_BB;yxwRNox%^mQfEY%F@ar-YdXem%xoS9U%7rYG_j<d?;F}H4(duf)k%gy&EEoXd
zy1l-hR^lw?dOsa-*^#v+7cHNJ2?$F-iO|tGjhUP9OFL(`Bm1*7?ePV${>NJOU#rol
z!VFYcM22z9`*h{7rsq5pOw3a(%xrSWsB*mdjUk2`WcN{n4V`XQ#w@g2?qm9k>S}W2
z-Q(#(90c&yr+gZ-@YlIh=G(8)^kE!dR2DIjtvy0DYtniIb0oHU)r(M7B($(sOX3UM
zZ@(|>w|qSV{gLNYoY3FeE5|QM*_;ctJ!TYtZHIy^v4t<KybNNCjBHLIokTigB#V9{
zr_7l+8Jd)<HYLIJWnB03o1KeSZ%c4Z9Hr_&M8NV~nElKHMeUbiQ#OLZ6j~lNx#F?x
z*I_7Xg90n~P(iZmYWy<g8XGT9>f1xRj=T47Ue|bx0nlE9#n?&%4Gdo?6DX5|!Igbu
z*b0h}ZR;|`Jpu;QL*v!J+K@4R4tgXkNI$(9{Dhl?Nms@VGlC31QgOQJ6~U#l{tQZA
zjGDY3yja$;xUKuh*uhSDqWGk+P)dA4FE0^{y(+t>BZz&XTyvy?)oP2V12*K&85Ds^
z;u$>;;;F}fSzVw;jBcJ5Vrq2cPFT|;OhOcu#ilkaC5p|uvqyKLZ#8CC-nKl)S2_7J
z{ut?No{lmd-Gsvcr3LfqRBng8snXoCN9jY|$x(~}R@j<(h~PR5+M5|6tIc+}&lLSC
z>lQ~`_OGR5y04#8`5gnbDh7R1SRklse&_5Fn<(*%cCZbMu8^1SZWS)G>PRxGgk4Lp
zVM|1QClHSo%m#X_WhPsLD!%Z*p_2!GF+I)Ma{TvTn!5f95?!m^lbGv1;-DM~X*nK|
zw&ac>b;3d!m}zauuMDx<@;*s5WjiN6>Q9xAd6BW=iFw5|${qbBIvLFxu*0I1ICVpR
z9HUsF8zH(V?oH$Fg4xMQ_C@8e6;hwiq<Nxizl5j=o>zsT#m-1gS7}Y|5`{F_KR$+y
zWMDJ{q#&?P-489u7}YJvJ@otSxOLGdO7_*f$N4bE!g8Ga7C4axhmlytFdGxB*SC%`
zeA*WF=u|s{f<Oc{gFjQ@l`=(%B(8BLoAQizsM5YQj~Y$qAY}1x(Dym2SV=%fvI_0^
z@NW>8<8c&m%@OcVVCRDWW@rV+8DTs2bp3qCBntKkKj`t|<L%q~srMVtlb)jw+v0yk
zemn4jqqF)3x08-T*MgAOfhlDLO){Caud-rp6^e65F)l9TO=!n4+8!-yHLCfo@&xQ=
z)0B_#BE*3Q<+vOL=-+tUMjpD0?FaYsmc_H6dQ}6bA-S4P(JjWyr(H@KgsIensx&;e
zrJ!2Sch?Vx90k1gX<kp_z0f0HPNdm644#^uia_{IW(7Ivd2g$;5jX<ZPCQHR%d>CW
z0XTEcI8&J~w>u_Pw_3rGDUvU46h5Ik+3i-40I1f57rVHv_upl-nhv6yj>~MU2@TAo
z&^DVdw|N84C&_ogxzorBiGAVSGS*Tp7x1m9X)kVMPaFW3$)EflCp|hAckdX<O9VxN
zXlxWCPMNhG45LoGjfUpP0t4S0e&}U`gfnpj*oVBWd&M75|G0y5W|(&ru)3R4BqAc7
zl##|`rtW?FwIK7{OW^>*f!}?7T#W2jz-XyL7w=6I5M5L!_!|4$_(`Ese7pa%ReMI(
zMA~n@Ybnc0iQpKWr-tn=eXfCLu7Q*qKgs10uwvUj-pP3jbgRhmKxeKbW^s03Nh>n;
zG?pv5X4=AbNb5BTYG$Z68uU0j`)(fg<ugA7z#QGxY@h~`UHL;|!K!s6s13aKE4uSj
zvz-8k^s1kCr_B`kp7I4#h(Ap+!g0G3$@<G}K0i7fu}F95^p}R6Glh}O)ZO>H)^HT0
zY>rFxl=@NTC7@^c#CB%7wJ{t%A%T7Nft>1<;laG6B_KY&*VvT|2BZ9D!RZr_q3Q8F
z8z?F_q)a}%Y9eIA5#SxNpJqNAe{9IUL_7iiK5m(7hwkNQ)nkK43vE*mJMYX*4VU>c
zLQ`qmetoua$F1n<%BY0r!K8)|8*Ug$QClRLaz>Ms1;hN+*KoR;%YzAI)^H#EwCkn5
z{E&v`;Cd{hW<u4jlpz>(<4SdrY@ZDN%tY|qnmh6R7j-c{>VsAE%e#?&9|XXv-Sgcv
zA7t0*7Y|7gL?&R(%2^-{iVYts)au1rOP&^Gb0SoLRyZ3vo`n;@b{227c^}-`&S)u?
zhVeYW*{ex&=r`{lAoiq$FY4O7&eJV{^s2|rj<HTN4O;Ap{F24fMqHLU?IenwRz3qX
zH|Z2G(VhuKmqY~pX|19Uy7$qs!1L{L*815YDK6f4)u@Lttu7Y(beoRB!bBu9_PB71
zksq(uMe{8?>onQ#V@7XH!Cvw+a1i&mHu@?m;y-^uq$9O(Szgw%O$+*Ks%Xux_nP?>
z5-1Jbk3`sVWDb09ld`vyR<GoToXUnVBD{NT;Lvx_kxjl9@V-(!ce-}uipiW+rFS@P
zFFy8V9;flAoSB(HOo1`LI&X!g@FKqtYQ0w$M_a+0oyMX!7@{~aOZS)5GT@52)4i|e
z7FhGV{alm1gyyE6gaU{`_+Pkeug^@0;HoZZ#`WTfcG`f!>SW)P3WMhO{}7duH#@J}
za4z0|#O)V#=0OSw=-K9=7Wi~eo^41+G|`%;CWKyA;7?}xsO67djnIk`KY+nT#G*i_
z&Ydc~c*K!@hFIGAuA`ZUGC=IY{{>Tmf>3R|DSF=NJPmla<@Sp>?+gXnf76mpwf^+b
zaLDtVY~R$-FM^0uHHAumEsijFNsRjuVARikD2<GUkRk6fY@n8}5OvXIv6Idz*lp8x
zcK?K}r_Vo?&9?%4%793|K5Obq?AzWUPU5UPKawAtr)!V|ufHc=X~=wAhk4aIs&^Gq
zb!&Ncxce|GaogO^-wb%!m;sA3OmE+M{T;6n8vL;%8+Gyf!f)8=ZOK&R0mlob=XGzu
z!)&XJZUDb`EO@y}zbZ)0aM{s8XG^05B@HLfDa4?>IQZDmvg$_n^}bl3u(`D%+4)2<
z?YJEw>{`%Sm5QD~4IOs+X1S`is3AXkG^ruonT&AF0i2ip7w{s%Y3WHTGy<nKI2$T^
zzLAi=?%QqSL>pO}R@v*16XEdoVc|Es>CEMPG~m8&5H@k6KwSk5nSh&9$Aw-RGlTcT
zJSOd~It#UCs$e2t6nA4hNaBq^)<6FA?OqO>u390BgT5MN8t24Np7=uqDx_w}O_=eA
ziZf_&xe2n7p#m^=TDz@?NGmXrDoOtYY5xNg@VzdN!m~_&R9OG;D57HzJ1FXmG&)!&
z_n)YvGfD}JZD+Ws-b^ng`_WDA#vOlSesX<hi}mIEKKj>M9Q{bYJXnYzck{4;BTN>T
z#9Lrbp+Ci5HPKh0uJG!qDp=nIpn+kdgLYv;eN&DMt6oiGVe9ek#xG(O;o#Y-gQELD
zUfw<`q6(=2A`FKlN@`2)sUPXZX$&fnyxh-{3Nuq;OeSGwF#Za&O`338(HrGg{S5hc
zLU#O8mC=nOe|Oai3P2)YDWo4qXVToOE9rpP(0s=R67BjCD{o+94~#XjCeHcsNmT%v
zg6Pu^oE=#4F=?={oy>&?HCPJpy`FV<w|Mm(dNLFMU8@=;aV%U<IY&orec5cgLoA)f
zmFKmb0}nLtvadh@06MwfB!};I?XJD;fo4^ts;WXvK3Yo=8t6FKi&koDcPZVpj91QE
zFVhOOt*D)Ns+u)TWlgtABsK98{g);DmQDD&a|sojj$_B^fXn|kqCUwq0)iGY8+-72
z`3cAj?1J1io0{z=DH!ml=UJYn?_Kyw_F5@fWe4q=0WN>T+SZxFi9Q>QajfuoKu(w5
z^qTJJFa>NUUAn@Vr&iQ{igNNVTG}29Zw-ZRUaNa!bxx6e3evXcDeWbd<Xz(%Yf0u+
z@E#!Mkk>oXSLg->UWHQ5|GA+LR+{(U^W(DC6UFFR`8oHsWc25sf247X`BzeR)&qn*
z>zv;e!~G|vl&vRF)r|C|509Q&T19|k5sC1@aI)PbYSKEV?`vwEKfChNC^ThB@J?~x
z^<Es)xJXc^fpckL-NOre6r8!yMlIn`z2y6vG{O{XYt>@Xl-eB#8XErE*iE~%+S5#$
zUhW9Cek&AoHjcEVA9g2>;1EoF*YL4VR}G)u_uXh$z|_W#N#;xR-ghX7ryAQ0oE{*O
z=&~ga9%-ZD`tfww-gbGQ0l>-Evdk~)bZqt8!o4gT(`nI_td9OvPPza3tS)k?)9)=w
z%JIm8006YlkxjK?`+QiChqwWriJI@KKmpjhi>-E@P;7u6mSs-Zo^1!>wA&u4+lVyj
z33bboGAl{gb<R}_G@VJadgy%RqO3m*pc)Uz0J2ghOX-SOn9yF@kQHN}Pg<$vXGtYw
zn6pfLjEV%mpq!ym=JZ!A9E^qbhz!+)ER6zu8m@=1;ToK$gi&?%<`&4NPdQxo`{z?6
z$?U#E**mG?q=6mN{YT85+mL4(;o7)uS=)luR2<ETioLUksQ&&`MbqJmZ<$Wxl$TRf
z3%8-!rvn8zIAgEsLW5LR8VgnOgXWFCU{PO9_f#=7<0T8%Cor)X|LJg_Wqlk7oY$Lp
zk{dDHG$r%%UX_K6D>#td-z836BaMgnh<mwbn0}b8X|WYK<d>{Zd_Ruo{n97`1+*7!
z+_02gt6IkYuE;>npZ{~dGbC(NA!oiVRCd;@Aa+J-8Rm7t3x_#JzU+C^%*roAa0fo%
zB>fUN{u<(M^x(nw1qC!p;X`AWI%$+B{#HpU+e+MlJ;Th*Er#l(Grq=iCXwj*f;&RE
zzPe~#KXHDZo@JZm;5qBurCN$ANlei9gFaCtn`&s3z>DrK;i04dSp18Cj(;E;!=wYp
zA)GPF7JuC+*#HSf${486_}PGq$!S2X^05-Kx6c*j^d_l>Yw#*{=4`AL!!tTUs%(U9
zKnW7q5uKZ}ELqi*Jt9>L*)9x(k&1c5k*&FW)vcKDK0(i7ymePS!N4!~F5rXh_n<F3
z5DeNYNZdSmLAKLr(^*g3-rdnI5h5h5H)D?{S}7PP3F7*&w_8qaaW7o63?JQL9S|-=
zvIBHat#Fkz<`p+oQ6EK*HmO#1%_?Z&e<sY@H&vgh%L`h1(%^YwJMjh2o}%9^X!Fli
zi4PKEbbm)4s%+YsgPMkPkmN??vaXd(Ixn?euGf`lsfjWDKlb_oDPW+2PvAvb-%6^q
zU8a#rr)}>mIjXN;`N!`&F3c!_Oan4y$xwjaA!I=qYL_HfCdS(~dmPm=>2h8sKv(wF
zXO{8Etio(09{00Qt@;TNcHDR9<M$=#wM12tZh9=CZP>P!^V#ud+1hQvB+=*XsTwRf
zOzSP+Kk|R}tr@~cTU3Jf40kaVzR}u0delap`@2@%HoC}|DMFI>?eINQHBayt|7G7)
z$RVCS|G~EZ0o_1MezG<Cc>ZEpnY^OD$(!|A@zKG4wHCB@0lA2mB6TY1JtFru;5eGX
zy^X@1XUt8~mn^vKHH($y=E=Ukk#YrOj%~nhQZV76=T5k=kz#So+`5ZkNOWG){}kTR
zUdk$@KB{}!mLU6poOkgyys@G#v*ohizjzpJBAd{tDf{Cw{!wDH%@r-l(unYs494Ko
zdP1p%StLcbyoC-0w<D5vt7bwbvjf8-cXWo=OC$;}x6-V4o`2Dnd;vBhh1Z<2NB+TG
zxli%V!hPJie=!H%+k*rr01$tu?Uidf;Xd-XRViqSABbA*rThDQ<8Ei0y5|j+*X4bp
zqyum5SFJgu4<~QA>l=k(dN3>u#nX#KFrDpo@N^a~=oY`%Q`DvwFRJVOt#Kg=qOp_p
zr<$vuMhflLD9$YW9bKl6%Me?+xmU_#bX#I6JQ^0PfSw@4cKeNVM4HxBqoDP=v!fA?
z8ndz^lqy!r%-y8v=+tjCKM<DE6Z_ji@ci)D83mtjx2|r8oue&d%3Lg`r!YBMp@ZNN
z&k$Mk=Og&FWdh$WA}txAnnrZ$N{h`kVy>xz4Nc&gQ@=fbP!xOA<fNnd+oEXSEJR-k
z#mM3Exh={r2_*I<ns5jqsHZWC*cV2~IW5Z02T>cn`Oy}9%WSo18?cNe>b$8d)rw0Y
zfN&f{Z9rbJemhT$^KiI@{N}mAdppc(#`7A$FcFtw$2Ib}p;MIQ-r8hpp*Q71Sy@<g
zUzULEb-Qlf^*he#Xw{|leoJ*A%6UuqtXE-#>;0UQl%gu@+KN#itsXow)3xb9^5Du@
zr+1SZ%VVr`gu0c{g}^YJDckNA4It|MOy_@`SLgM|qW$)jmrh;}3%X4aXSrV<va0C3
z9QLgxS}^+^$K}oPL5B)a+R~#y|AfMQh!0eat{-v(Qpks!>c&s&>Vu@Myk0j(I1q7p
zbr>veGYjiba4BK+@f&1t7CW8GkGMZD_v+U#Z6uC+^6On)&aRt0i4{_NxUKkcxx9FG
zZxGwV{fe8d#uQnM%Em5!acbR;^;O!22m;`u_Y$TwtPO=^H$a!tS3CU5uHB`3a@Ype
z(vNC@JFwug0mZCiB=#SsG^}akHW7Wc)`sJgV=vRhP#2RD&JbVE%&6if1uJrt!jMiU
z1|(V`XD(#uQcZP0W3oUZ<iga#67u_(8&_QpD;M=Q^*#Y8!kqPntC|+OuioFJIkvcG
z)}9VYs&d=x^FaZ^ZC=b*%2zxNnno-tNCnVXoW+2x4aK_7Wi{~L_EfhTqh7Af-)oVn
z>xqnAOilDCy44pj%<Rt{kN~Xdhzd{}>vzha1d$#NBDQf>7g!Lu>1u^y<a(J8r-kx#
zvbXNHZMUu1>V?B&XueO?csPq%o<2o8S=Tx9KF9*tebpX)guDHF-f56N67yIxhE(qn
z29Jyo2(vR8>}izx5e`W2qjn#A2gBVMy<Ji*JT=mZ-(@-B_vu(H`-istWTf9xrdTCX
z?En#3UfWxyhPd7j@){>+*-Kdo2t>{sJT7K(R($AENbcuG$+qY9J93PRlibkrq^!iO
z+EZWewM7PmXD&she?b9<yN%-8Mh8}#k+%QL5z^E_nXvuWsM*d^!#(z9>0Ip5>dErx
zX%|TvKLY)C{YkU#Y_l<d&l@r4E4q2=*NuT2f7p1_AvnO%QCH{gYGfC61Sz55TXp=p
zoH__V&4_dU+(9R?yih#G(U^dmI9%d+Vq+3e<9JiC?Mvnk%0s-d=J3%9_5tUe(V4=0
zICzR^(sk-yNT^jo&IG)HPvTtVQTh4^1-FWfgiA@9@epxMNL|nyg~uTb1Qe&k4whEg
zPnKCG&Lw~eS8~Sj9|Sat+KqyFR#V(*;|>uAgQqEP+6Pp)A^ovbZLA-t{Xru9;HSgi
zys~f!LcHysVq^6?cm=8WB<#noHgj<xtTtPBX*X~37oD42WUzV5zk=on4$Ek>cw8!<
zZujsDoedu1Bs6HdiJjC7Y7;a24MA9KalSC{;DlC;3m4ovSc3j}rtxq8{%Bs0o<e)T
zhPB99q}HEw>~2ZS)OKwihjYnB6tZ}Cb^C<pO`Mm`kSTs_TGjws!@K-rbFadW4l^<f
z7VK>N)D*_!8eXxTsq<=}X@>UFV(>s=it9J<s}kQzE=EfomR$2&4l!)z^=k||uQSCK
zuh2Jn1Co+A--k<R_8ZA)4`Y^DOrna`-c7$o#Xhu6M<BK@eQ)|9-qC8=Qa<M%b)|!f
z3u?u)T;gO0ZbdR~XY-OwSPPrJ5Schui}uPyGsLZeed+-{RxRbX*@mP{=C{d7zSR?&
zowWH(&+V%<WzY~1<DQY^_&V5K*D0lk@}MwfCfbMdO<6Xl;#_Is#Zv9q1*XS;a{6s2
z(9MBc;;Ke-_{S){-Sb)4JcFKnny?*smK|5gqu6SAyPr6TUv}r`|HvNW<EhI4G5-H#
zm@||>_2aZ@K=Ea2C)T;{vwn)xM&7k+kAJ+|KQBLrm4rhl*eO$VNX{`g_FjB0i%R(A
z^}fABFQ!AoA#OOgf_DYRs?JgYZXhDv{RYwHS>_j%Swp}tIX6JmNtIIYIY(7{OXi!S
zZGb?lfp|(X#@KkP^t{k=?0cX0X8_*d<C`~~zT0y$Y4JO}%XRCkCpir)m_1BEA8(N*
z&%GH8&(mA5C7IXR=-GUex63rhRynixeJ1Ff_TH7X_Q(2JDBq!wmSj#seg_{)JQKZG
zITFzmV~U(=t1OESL&5kg93xa#<BY`Vc|^CniKh(=G@eoC?%lft%4I?2N1Dgb^AyPI
z!QJ~R%HJQaF5>LseRu!hMRBC}m5<u#grpY(cH4}X%}WbT53`vr-gL-47Gx8xR5F&$
zz|^k^HeK7>VDIt?;D8eSE>$$P)YXNn+WfZgdbZ(r_srDeJ%fLu4@~JBA;sUuEkrop
zu+fV##$1m0+-U}`%^C19cDUGR!Snn=f-3(sK!lUWLoY@P63?`nt*|5YE&p<HvOXyI
zG<Y8dB;W>&vG9hn8|+cWO$X+6_Zu!qAFEl%=-p`Aqz-(Q=+8kgj{ShO+|Th1G92_`
z_AoGaCUp5Vc6xZjR9n!-q9zpHVn)lh*I=iYKUyxX?m=O*5b4UKB;TTa6FecaJhpob
z4jZa3rygm$-%U2zFZUh_m!9Y6yDeaufEM(Pfzyix-$_c&1&FE&xS8hBkN_!zBe9--
z90}POOHzt<8gQOCjD_x!2d5N3|B)(85&R=$_`k5jR2c}+$m;E7i?f{@8zrx4tn}UL
zXkil5{(SE@-TUTm6Yuxk+|M^Tc6ojzvSVubcqGS0;J{c*GBm*Qd!fv0^|v?PY>jvF
zr|FN2J(Xgf54H7=>kkw;ew0Oq5V5qBf@JXchUDjoC0XURY+*MAnWd(Ys(6ac28@XG
z%d`%0Nm6saZJCdy1KJPob)AkEP>&C9kEc76_uIq6?8nNBZ=o=0eB`86oIF75NRFZW
zf<)}Z4=Y(22*k1(5~WgsE9<>9dM88S?-;<L1JD3y3`O>@D=7uB_q_APT@KTi-5+j@
zS!s`RE+gH@s7$`{(%7_;f3J)Xb|-P_xJ`HJ`0vV8;$WxAuQ&sYY;A%5rB$0$W!2##
zIVN_lLzDC{^|<+1GyAABg2^uQjFo2k2KEV{A1C}637nIZt2neIrn+98+-*4qFljp0
zH@4E>Bva+iI3jC4hCjSd!pC-KyDz7byYC`thulAQt^Gd|OLG2<5Ojzbha_-@+`!CD
z7H7CF&nucH^K5O#JHHhkN0K&yXCc;z<@>W0TdTu4ReV$4<p95&VL81V_;`udX}w+f
zZQTti>AAmp!S(sIS_oW9wH`P;HCdrzZVULF<|U^6Nf;Z&rh0KC6hA&?+ClM)rKA+7
zC=^}s*voQ+maU!sF#6Y_q>KOmsUkfA+&3&NeF?=5#HTy6q+%TYP8{v({if~6OTNc%
ztk&;^l3!EXm3x)iw|A5{i_V?j8c%E|dTYk`_LWhCATY`A%q*Q&eTIhe2NPp~>#HCB
z$z_pkG=jv3{-pneWh+M8@@|A;3vzD%50#q|Rn=w<LDFXj6bKCsH<P8DGh4X{pw^_$
za1t6gLJ~0b><b%9`&(q1EtKr?W?%q815fe;2o2i%lW{DVwLgIA(_sNcZgrtOlkC@~
z^8-rd!5d|uUZf=mLJLl<>j2j<i8aM?&O80#8@-x3hsYcEmqVD(;I2Thv)~#E*usRF
zQ|nR(?)HG4@}6fJl@XyThbKYrW@QldaL;TUEDza@{E`;om$H;bCSbm>9b+Tv3n9}8
zFl0ZTIN<SyfJv>|O~A#_&-T5HEOM6}Q6md6b$7AXL3Eb~>ERTXWbF4}<V?%x#oOg*
z&D0DLpQ!l^d+LN0n?f}4%aRTQWgYa)l3N#*L(Ppri`0bV!&k71U4{;*2T&3&SJ5*J
zs(_xIbaq8#><g;Z{9zAOn6Zp&8wYzGkb9c{88($u>W@~Wv2>i^tkmR>lH>DbU@{(5
z{GuF?!$}0@hD&YOtfiZtVJB*AIv=*RrB6o_0>vz7G~ui@k7=NQ2-6>yrdg4AQ2&;b
zq%rP)Uu3y={ZG2&okCHPkfPxeE=A3QNQaXL`n;O<{8lf~#XgTOzUxverdRoZ<7wPq
zIL?arXz%Q1*KLq=%mLZ#@V}%8naBX>6vQ}KvwNbasN6grwW*2A93^zP3ZDIVg%WW)
zz4)UOPIoOGt*G?LZu$iabO3t!Oz%BczoR7M0xp5t<da`+v%!d}-rNHl&I~#l*>6n)
z&P`B?K<1?*Bysjy?i~x@&cBh34Thc0s&PMT6!+$yu<*$0J(6tM0*$X)#!lmc1JFZn
zl}Wi24tVL3{tp%u>*W-)psCHgs(Vq<Y~1)OK(2hP7h&jU(2%|kCBHQB{rB{a@Aq9>
zM#*O}JqOZe$V|{^EGC>n#>@>XvP$bIL$&^}$uyg5hcd;KvjvdGMw-O}ZUMeGuscmS
z|5m3AS7fBlV8eBIGAQW>!uzl%gU-CD!{p)8DB}wSWg!%u?tpLT9%0$wj86YPbx4Vj
zU1_zOb|&o>KS@&<Q^Oa*e!{6hA@OX(lU&itV<&`{F8`vc4xwdW&%RvU=nyreMVuta
z^}o^(N(?OjjLt(1w?DTsD^xtIp|ic+9D6!24ETOC7;32`eE<tl30lk@*9c~r(W5x3
zpGw7Ce0pbEv*AEhmAuoSSwTQ`9L{`mkFBE9?Vlfmf)Kna8v}c~?qwpM1>Hnn{Kfl!
z^&$P_-F(wuCrEny4ddmY0%-GF`_IsXxB&&}5xtO>`M*@=t**Y=VoR&!<>=56!+}4!
zeaOdAl`+I`0&|H%^z<?7kz-%Ow~<oU{rBL3dYF5Dl{gHSJTx;-i8cZIpfkNHh1oT0
zbdjc{M(%=E1B*V(iM!6Rc&l1Pwp3n>#}~u0fp09BcbZHiB?bLQ>-@Pb9Mjx6kME*`
z9?|`41qxI0*tQYzpeh7t6q^O8$q-#5$8=`(7o(1m?ASJhh*N6h?^T<0-%70}fR!cA
z^}ku94v$*dRaF*dRN<Cpa^OGhrM=Ml+4+dIQ$OawD;Rj1rr?De)j7y`_T!o=6!jn7
zg+H5FXU|DX4LSzEgr^|XY96yND>Ltbq|~n-z}2DqNCuDe{zXl7+?3{=63;CHH#Vzk
zRl64F&E_);stYlsou6z<8i3ZJ)O%Vk#bKJA+JhWxbPA4+Zu5_Sg`<FoDn)i)F1hA9
zT!U-F2)KSh2t0VDVE>!xo<zonV>@)0JRphwZVn<L?1J)IBh(rL%t~NVO{qA1m@C<_
z{Rs<d(6&AIB7IxV$vvz43AqSJ|B*ZPQ9#;O{1dB6BMnr0MFxfa%~w!CWPIF<U{V0X
z)|`a;+v1Fp&=P}BxCkpHVuri?Ianxm=8*_MxzhKduThn$;WH*3!7iT*s;LN0mfge%
zm7W-ela&LKV2U#qq=aw~sWkjd`c5$PVdx^Y)z=mGDGB#Obl%b|7DJ;#)T6+YM&&0c
z_6k&!h!GD+njyk7)8gGR7$W*UD@F=kR*d4CktIF7L0e6kIyHM>kE&1pTqNBSo9urv
z6#h&)Sm$^BC$;byrcr!}#b^f=e=Y0qLSa$PL-G(4Ty8A%AR#}pFfzU{MQKE;mP!J*
z!Z$N5+dXBJj4C~~Pf;J4%N>}vPS;P}%zn*3PN>g}Cj6B@Df#16fyYAN#gOH&SXEgT
zcd;mGO7^%y0Di7fD%IsXRQBQ1OM=!ZTj~@uY+eG&0=WpvXJ&NzN`JKx8O8}A2a84?
zrxRPRbG@%|23CoxaFb~`eG<VH2pLTM43I|BQF|CEr9jO?)X$9YakXKYTB_;}A$%05
z@5;GK^$wE?B#WQ>E?gstuC8RW<fSX5*=tGjg5c;aC!igY@r$b?#4Uo1;pcV-3@R5S
zYVS=nCw}6xczhYZ!ptWoa#>_MFDszM+`MNXx<BX<_o_v+Com(Sr>>7l*H=@Hfoc0i
z=Vaz3twWMub4$Cux2Q)^`!$W3BOn_=?d8+(G4Xra6<vI{Od{1_uHXdl(#pBw$ugt4
zGj-gkETTOFY{XSYn{m#Gtwjf9T{-p#_7YG~2u^D1dHqw8v`T{Xze--~qFOZO{{BhP
z608={$FDIJxVK1^*!Rzm{Nw1-#v&HRVdneNq&=5yB=;pYpa@58KUL^h^Y`)VoB_Sj
z4if&_+S!Tdj+*w4KF89KaCd;}S8Vg`O}mhgG`<jHitiG&RGsN{)E*Q=R1v`rePzAk
z-20-N7%nitSQt%~D!PjK7#N@b;Qp)Q)f@Evw~)hRn>_emlYHhM%&F-@;CUK9#{7Oe
zh@Rp3c6^0yJ175ovV{Bga(H#p@jrUqFQs%~z<ix+n|AvAi^`u|SJxjIZe<S}P{-S`
ztwH=0SVUUUukeA}&a=A{gEVd68XfzO_|``A4l(>s*b!Xb^*Ntk4nzM>%8Yw-Y_?0&
zKgpbF_wz=;QO!<jL8A!uXF306?_}cJW0J?ms~wJk^7OWpzI1tMrs512qs*g_lE&JF
z>-rPF@8FeTg((a8`L2c%{?zJUFn=@mu}|Kb#3ZadYkp^3h$vbEP$M|f^HR1_@Ta*f
zqPux<Suo5YBF~bOHi=}AsjV>8{ppCIH0Mbz%*e^ZZqn!#Ws0bijA_|Cz&`C*CNuwk
zWSt427>^<fPIlBVj<qn#c8-1xmlcd$*7X<kVcJvDfIk9K^354?QezQpYN4N!HppFe
z^(SMp{5N%9D6K67(;1T(A>wcIW_7DSPnk|)kB(1Cyw(m(uHz;H3|zhbFDa(-T_Ry&
z#vteZKwwB3G|6^3gtAtoP<L4xV@d&fID~tojkNjgA;TTA2^Bui+L`)eZl-j~?Xe%7
zsdMN-1QS~&-T<=s<Ds3tw9sS#+%_d`IZZr_I^oxPj~gUy4K<SE!Q5VL!i;%L_BbUs
z)6$Y~rJA^Mlmdbtm*x3wn-+NR)|!noXOjI?T`YS)zT%8!Y}*E8IdjAE{heDQIsTja
zFZC}8hjs{ujYf=Ov<UF`nA;i3<A{^IX?CfEi$4edWcg?aybceIh*gGTD@c0SmggNY
z8h<_PwGCk-w8TOlQW1wP>qpvEP(u=!xxoplGH<!g@Z(jaB-D=~4V1YDT7^MVa;3z>
znwi<t@pUr=@cj$a6Cw>`{#Q!*PXnk=|JfUVwf?ZGPTSbn<;_J{a(R5vWB}<`PAuuI
z$dF0>_Eqp0dj6Zzy@S%dN5Y+pWvf;??|z!f{zFGCdkLndwW4}?3b#d*lPQLH<Rm&g
zK7v})7;SSX9=fjDu+DF`SQ&Of!mfs-$Z3kzP*`3r7dMMuA#Qo&m#1jn(C*vHbQ8T_
z$}DwJc{Z`R>A)=;wb~7;<%@b26k+kE*Y1FfjM8oPQ4V{9g?tnwDz7PJm)y;>Qjfxw
znY-9SuL4fY`%57Xz-QE+wtI%@fZNdHaxu3drY}r|m(I!g!tLr3ZR<Vo8<)4SqBhd`
z@8w3&p3Llp4lmTY$$oI~#Mie%!4zQTz(gh*<PxvjWB8&fJM2f%>7+O*?!@m6Fx}nK
z@gk>9v}+4L7ti_2TKFD8!QILPy`FeF&!%N7fDimPr^61`Z<=;MqSbD+IveY#yP!Br
zs%fpvF-)EPjgeP#1{+A}gNdh{jQH)0gKm#|cMm1baaZw_u2!;u83;QRI4s<iZx#bZ
zU;R6>Y=0$LHEk@jfCAFp+M2*8z+$qPe>TqG|56i_ItccX3A#rTlcAnWt%}EDn>v^P
zrkq7vuKygwYD&0+?J99`5S|m43aEGv-4c1J-0YN(i;jBV%AbA-et#6649=EiP~$1a
zMr7!ENG?6puCm0`NMYO%H!m&iq$mvd=J}9D+g^b4%%WYz&4yOHi_@aye))wVy8C4+
zG_1V1!#z6Yz=GevB&(7=-t~1|<<fZ?BHNC_PU0Lc3+flfR55lZIAAWDXF|8Fq~hD3
z%X+H1_qv!)#+rDT)ly{n#zYzpOcrSFWe&N{t5_GpO#{!!hy!{7`Rn^&tX6#cv^#)K
zA<EJydCABGK6CB$u`|{Y2-CX^mycEjj7hna(FO#5WOG!wUntMIzZWi=v~O=G&H0L$
z++42gTfT@FG5ESO_!+*AcFG`{SN)kz|4RT0xO}!_Gv-`RBO?MOT!#+7IiX(}3Q<q)
zYYzX6uV=Rp*~dn%dhLv*W~IE~O~&hBrOjkvSXmGmp-6`kzcS5Cbs>KMJikGcFrJwM
z<`{kG$4JIW_K)bC&R8~F%Nv)SQvg0;J6g-N<&}5V9p2sX2rh_B&hM?E=C9{#M*yGL
zDjlf~r4B?KmDEX8Fw?%FDRMvyYoZ0MlQMtIy|W7tw9nQ5YQ<t~r!?^}wJ;#*$?E)n
z0`11X{teoDJ~W7VWn=)ziqK(@7-Njd*X4*aifanE4qWmm8x(1bTEnHJ?LbqN$Y@{V
z_uoe+qrK_<JkxDF@zS8wuz;1}|HakEY4!ma+;4ro^M7(Mg-t(Kd8@g}aYWBMJTHId
zX@=9J;gR4PCf~tIDE}8$Pr6?rzxrukOUD(bz~cA2BDZQRnDrtEJ5hg8GxJn`T@&G<
zC@%JJjU&*GsGH^6w6BI1iZ2q*{}Wbc>>?#3RA{WgDMSUtC^a#jNk1sHs+WPOnUKuM
z*R>Q(|6Yd!Xs}LW;)a~rH5Lt|r=RmCZ|N}On$Q|gx?Vl^r(QhceiD0thMBAfB7Z||
zS8yQWLu!#tlPepoJ|r;k>h$a#yx9E>W_|FZ!Gey2D@w)QYw3#B1cAQ!dIOj4rE@}!
z3n@7NYl{-wXTyKEc}2+hQNnJwASc{fm;JC#*P%$|g~e4Co0l>p1YdAec83KpU%1%s
z>mRbRI>Sk3+IbuI(<Hb<+zc!deyzv(-pGRkSuHtI^!RuM;?E<;uWxX0(}|ZuW6hqb
zrd+)_gn8+0N7>13f1QSL>&*<a_6e9y@p(0YUQaky6qivb#PNCS6@DQxK@E_zbQ2%p
zc;9&mp1HnW{lHjgeEiFb0(rjarqgBH9q0kSuJsJ#iMX7+H2>w1>f5#z#mRx>lGaYP
zX2ro-1-`P4XvlT{dpJKM&u?w?g`UdA(4Mwss`1`4ou~ntA4_=36qP2I^DP(;nzj`;
z#ALkuvD$+U&l`tG`hlRNUg}<_!?#e5g}PEwV6DTZz%}5Na&`4f12D6o1~1mK+Yb|#
zMXcJv!ut@8elmMU#hzV5^)DRG@1C|+uP)7wtN2=QHmJo<jM6*3@gE}E0Hps?Md>+i
zhu&7oP%J&pqwCn*-xUwTnuP^AHgd8`zP`Wbiw07D0g8nF6f^Cir)AY3$h^7BZfASb
z(;dK6Iq8m1_*1_iSfqw#Zc84UgJ8aqFRe8+)5|QG+dr4#1EVsmwj5iyTip$BLm9iD
z^cA(O$`^zDZXu^h{;8DuV<UliK>fvwi4I&8r}F-5<We{@B17}O{?U$~PVf|!X6sCG
zI^FWh94D4$N>=t^*Q}uy!EwNMpQ(Q+RkHF^qW(cx76VWfv+j;HK9R4Lq{QaAb1%AL
zA>H`k$j%0Xeo*l53Mb;!KNU_JI0~hof#|8trE7D0l~D1JIOt2-gUWwkry*(UIK1V^
zQV76bq&32Vi2g-UUL!lawRbVv-K5Ye5+c2l(T*o7+`%fC?pes#)&Cba+1?%uY#QM|
z+A1L=A`@fLY+&ut&z}cGVoDuN;en3rk)o2w2ftY`B0{g-hRk<qzbEGcs~&WV8aAo4
zkC1?MX%s3@(A35r47r8u^Nx0)!{nLX5h=ZRhix{0#ZxnfnN!bsCuX*?b2?H~mCxk6
z!z~NS7GnWM4%^GEuR#i9(CJvNeKU8nA%PTb?aN=dq=5iV<&SJ>qlB8a?%9u%{%=hY
z0j-R%YPvedABn=*WP_6%Dy-=g+TQ<2nxdlpS*3s_Wb1RNb?f%G9%~T5^~g4E>H^7F
z3KD=ZKeIB&MTxd}CM|RBJmD6jDO*oE+D!lDZgk8qMH=B)A^6vOQ<2w){AoS+|5;*%
z@Rgt8eQ(1vm^t}=7Z}V7o6q-o8kJnnA>3Bjf5dh`U6t1OMz*zPoTj(|5%f1gW4e)6
z8qJveX6w3KJRRPZix_Dv9Ob*(hOwduc_PkC`$A(B;WubuBrrf8t}<jH_Rwb&U||!j
z!>kF~b;akD#=n#Zt>G=;-<3-b7c3x`5apfG)|?jgYJag*IRfT-%mIua6aM1d6HZ?l
zu*ed~qo@GE^NBy^K<j7zzh3VAAL?}v0Qk5OIuptflBJL`8e5jJUWv&vrlgcPWH6i%
zUE~`3I>=HdW8a;u4H|nU`<hV5&M?N(FlZXd?tJIg>)zAr{BVD{ulo-?uh;YZ@OeI;
z=kxwNPS2&WKe4IjSDR+)x9)7Xhcwh<1xx<*j<l3q#M!QnwdoLwfV>mQKHY}ePN{hR
zD8u&(RY);RFCvxYg1if5zQSyk?B;wg6RT7UV)1#RZc!~9BmD)5fsN6YJ<+Qtx|;4g
z{~IHHS}mlHT4@MIpxp=9@8iXuq!HcL1_W1Ggvl?1Od7(_v2hIHmBr;>3NgpJ;7{$R
z9)AY!s}I^X(4v<3%F8YSS!^VHkY%7=dLFHODv;z>E3wQbG3~HX2q|U(9u_Y;e<Zj=
z>HdZ8(Ons%iXy8UzYl;xJ6<>Qrq7YWu1j~*GWa*<o?UwaM|>MjN}*5Ntw{RV$Pr$+
zkBOs0PIk06L)(iil#lA4DFjn9P<5Gh?M_;0Oj10m{+M2`EwF~7D%((vKQNip|0~W%
zz)bk=$1g^1g)S-u87YV7mH~4|oo`Nzis(rO!<wH@FUqSWs@>+$aqKr<+F;Qi01Jg6
z!k2g1Qvi^duLBo=vRiO@#3FK9pRfNz;}pu*-?@LY+S<gqsPrAjbNAf%s6LK`6~`Zk
zgcQ;hmIv3c>(+dEff(R{QXm<}3gfdMg}qqsL`E}7qJ*tjxM#si=P;QXVYKwK1BN3k
zbma;=Y`;=dP=CMj#&L#orV=4G!7a43O_=n_Mkh*<5(h*sOcm}mzx^rbrO@oojyfmi
zfn@&mz&j^(X)b37GNAC`U=<b2yjUS%CMPqNEPZ{tw(yeE#>}6~Zp*ca!|#Zgm;<=;
z0ngEiH{0O?@t-)9`N)u<v(^h$SuO7K(!B;>2vMx^;_Vu~lCC6cNJ^vSasdU0+)qD*
zaG>>65+Xw-t=CrDIJ*QK`WRlP4D~(e;$gQmNjWHT&_L}d;|BQ)bW7;868iRq6~=@I
zNi_(k_RR%3Z{NiOo!5B&?bDjTMCP)~<E!zld?}l%NvUD@tB$F?NCdWbS8}t!p|NHW
z!g2OM>T0BXDTZ3v<2~2P%M0DB9=QeYan(I!$S{%{A2H?RCVLD=ZUCE%{gVokoEY}M
zAvA7zSxps<0J7)*4-XnJ1wfCPR?2t-cXQ{>WW=iZw&Th;J7cGSVlNULiR(mNYzvk_
z@3<1DK_C$wdOy}(r*7UYS=jq+&F_*c%_YTo$T~8?D;}kz>lj#<0|ROjp7o=_T%q&5
zVA@bv*Sq8??Haw3xoT}qmyh%3g;cewbjP9)%15!<)W{7&E|jU?WNfOveQB<|ICc}&
z<d-icF1p_W&;H80&xlLoeO03}pjc7v;N}`Ze{1_I50|-}G^g4vSh^L8oE^U4)5DOU
z`UR!>t}RRy5F=pJ(yFAii5KR^TLb?r->xv3$aSYKOoZ8=&?JYTsyUHonOmgwjG{W<
z9#R4r2<n%;7su0-Q@dsYID)>qe!5tAu6DkEHu@=I%D-m-1(MjOwSfy_dUk%xRQZ5k
zcV7SMA#wV9nNj8Zo%vV=F$>Dc#===hm@iBk*rt?H{Eiuno;DRgJ`$Yj;R+$WhO&0Q
z*tH%<V6x0qo8in|SxpMDLgLhw-4Ez#zuL!SX8xFn&g604T0D=IMtbBZ)P2%YDUo|B
z;e-?wxu#v+`*7<E9;a`H42;=wk-h8imr{Wk#V=!A-<tR?uFup=4!3Ato@47vdwAPJ
z5IC;{aVy}wFsUA1LL_gI_1D8zbWKyx-wha0`q=QujvBdX#)$JZ#d|3`z0*gd@xPlL
zN&rww*aTL3syTXF_HPZ2b(#h@G(tYie`Jb*T(y)dc$yow%Z1Fv*jAp-%FWDPVpq^=
zGRrjX)d>M|_47>q^(I}u{KHz^UwF5Ih!mFG36<5eifnt~^!}m3m-*Uj2n043G5J!l
zZZ_fO)M$+&#vwWWZ;)^iO|U7>u|em}gN7B5lrPOgz5%Tcc@>jhGS#vw-TD~;0~sQl
z9)7wEl$3tOm%ePib3qz&KGSp;*BT}Y%>hh@pSR+zzf+EM5pY9fh0_w!pNYsXflV~`
z@jlDN3$A^oPFl{Lb8ZrwvGlz=!c${;DMgIYyL>IoJjq4*5yIwfaRC@KcCVr>h?ta0
zL1^jLDWp2~f`a4MCN&$UKl)u<eAC@+amfXKp9AEOxN1ro3b<94B&#=)8eN5#gVL1!
z)Q&W>8u^@g^vnaikLS?-(#buS5h}fd0F$=~QfFGv#HiEk5V=?Yz*)8z-s64(CZhxP
z{5xaK5rNwF!7nMZqsn3```y<R$=T74w}#rg%T(Ls{M=k&xJ9W1Bi?HpgV4zOy-L^O
z9vYs%Lv#W?yP2tZ@L5~eIlw9AYdfPdO%bHwwKtDx<8-eU<2iG+)54e(_H4vN-YCGk
z`^9s^_hZe+{hjW07E1p1Xgms^RrUa+npH2?Z6bJ3vpX<8mt`MfeOPZmc(o>2TQLM#
z_fF0Ci+KQtpHn^5(q?;l*kArvZc~Clas#Ql{~@21P2jG0R~}cxdy4HcHhS{hL0XSI
zSH(9OBir|(yBms*@UTZ=petkGKDA!>YjB_O#-LKAzG#bblP<Th+r8W~E-gr^-IQks
zu|GLyFXx(X|A#jW+vuEQoMwAfdm~SfUWAjL!0mz&4PunLx<gW4nG20`hfC`$5O7jc
z4735~D>RYPvbYq;xT0O3Wo^(e4%_$cxG$`Xgpe&tv4-A2zdC6VPu1%{PS{KdSSX#?
zqsRS8p>nYe_@4Zaqxn8X@#8NH7bE`%KRURaIdlR|D>NGhjf7nQKE41M8JJxyyJ8#q
E2f+KbJOBUy

diff --git a/wikipiki/overview02.png b/wikipiki/overview02.png
deleted file mode 100644
index 28638fbf1573b81b22378f15a93373b8214557ae..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 11179
zcmb8UbyQr>wk^B~A&`(D!QCN2gS$5tER6(r*T!9gLvVM3ySuwfaEIUy!3ox{^E>xD
z_ulV}_s6R-x^`9Vs$Hw9_FQxB)gfQxB;LKje**x(J1I$!0sy?AhLziqUcmB*SBluM
z%WE4+HG2R+#`yb#15(m(0pN|inW*TOFQyO&h`lMqhEz&al+?x!Vr*t<1OP5e>53*w
ziU-*Iw`*4-(!oA)(hvnKBvJ*DFdxilYFe__XrF`0ek@{vyU@kNUJ?vu1;a-~_<Y9#
z)4vUUvw*lwmL1`j6C67Hu;HF#G1q##JN8^RFR)j7nO-x2*opKuL6Q~B?(?=tgc$vo
z-#~Bw#x|pn?;A=R01c_ekj(yx0uH$I;^U(u??h||;9RDWk$_Iw)Xq<YK~U5~kz`Fc
zAAh(`hiEQoBp*yb$Sp!79}p6U^GQ#lRs^zM0=gpx`dh#k20)j_dv_Y}Nxw^WhXXX?
z$gtqDq5)D2qhJtV$_tcEd<_)?R6hZj#?rmqzybsCNlL|75~yqdI>*tFs{y39z$b8U
zz(?SvJD@vALE!@UCj*$`7b<+`bmeG!w6L8@uI6i^<QDVQKw_{(R8e6h{xB|uLx;(s
z_d+j4h_Tx>8IQ%64fWUMC;((dW5HH?`Q$Q=Qa(P;5mAq#!*JN~3QDf8zxBK`QDP$m
z02>Zolh5=_HTXWfuY9bYv#CyBnrb6wIo^gDSECBm0a*u2Dwj5Y_eShTRMX<(&i3}g
z=Ux#Fy<rv4XOnK7PL(IiKVE!~x7WYgHz|Etw0tFA-u>zxy^_fzoQQetufMVzDe>5V
z41FY;ChwKfZ&Ibj+ycM1jR2*5zhucH4-tv^*he)5HQZdMe}ETQX9p_H1>oGH849%w
z;BTa9&{Q2dH*W#pq6N}5^8pFo$JB3Q!Wnud_#}}<1^5_C#n=LXHi(i@X}Csk00{s<
zS-!ND!UR`cxb&T`2)htgx{x1rIs8Q^d%H!@MBW(s5ZdW}Ed3_(A#kjch*p<rMu>>5
z6Kon7YlFhrt=x#hZ-aWThm_Ivq1E^GOW{Ez3_Y@?U^x9yRf-5CoaBHzvM$M&@53lb
zhk`M|<kHdXlFSOBN~Fq?L>K&aFSvs=#hasf2LYCEkAbZc%yGWeVE&o6b)rp$ocR9Y
z*~mW)9hg%hv9nTt+STIof9LqI_p`(lbtzInbl_9xJ}x3_ujMDk{vMGkF8bH81|wDE
zrEg36@hiWU!ncH68%$I=zkKg2*7=&_rLzdB9<i{bs*I}Kf@C2nAtf97(reDw@c!U#
z8uHje>00V$^gq40`Yg;rs*>~+bMGTDn9$sVMSD3Z--n2@&@@H8kgCd6ntDGaK4q;y
zaX?>`$|i|V5j(VGXi<&G9Y;?}HyE&;zTLCUx=pZ6cA@bmU0=vH_fB#1gTk=+XS^M>
z9k!iUMoBEf$~h?ttA#(5(Agu^Maq8ED^!4k3NhFmQ@F?cu%)E)%Ch69@lA0|Z_O(9
z9h%Ws<B8=Gf2vH497yaZ?!#X>zkL^o<u?#)@&PXu7ZKM4&l$HONhTj}It*_>=@TdO
zQPN&AYBEGwmA0PN11oy?P5kG0>UaWLCZ(d{{NlA@WaUfc5v9l?ZAH&=ab;G;t)ka6
z2_?$K>0gc%2^39=cngDyO$s4Og1KI5Pa&_=dSrU!MRUPfRXSU({iMhScr`BcWESsA
z0v&zXd#S6&7CoG3TauoLTEh5?i+*s6vVLY&sZqF$GZsYLO0vC6bC7$z_n{#1(kpZg
z^X%j1M}mAdnI>i<O^f1$#01q6$r5mh#8DeZ`AI=~ew$c}+Ji5O@W5vpO&ST4$Z>@9
zJ;g=E)q*z#*s}aQ*X4}G7I_3eT0qVn)&-|Y8SUCW88VQ9HP^PidqPj9C#5H=`+{qU
zx2msd-cr6=emjoK*T-%P;Ui)iSUv}fYV`<-=IO=jC2sgfH%;>8%!-GLqkcE**W9Aq
zvg)_$&!K)rO-3y(dnkLFq9EIp|1qCehF4}_Y;-JpY%ZBSm7jT@WiNFvbv|{yL08>H
zoxZ-XzR^gkdRskT?X<qtIzXLUEl*WhU8_dCEWM0suBEJ{0KK3|E>^B2W6q?f^1Obi
zzNi7Oa%bVya(TT~y{DduK8{I4UwO}IY+I~nvuF4dKjOQfMU)aEbs{hOT02ahuRLoh
z<7uaYo_$vd2TUfa6KE3)tXuUMBOiOs(iKyuB}{Nkn(X~9gTq3kzl|^^3NWS;^sf%K
zZGU#Sw$<8jo4QU<tx4@ZDO|2N<v2Av4O+<@Wy}1Sp~h<evu9BB7kFn<5IHmclf`<e
zm%OOFuSwk=1(N|&v`X20Wka5G@vYt&j=+t8UFMd+79Zyt%bJ?bC}(HGV8e)f4<th;
zU|rOk0%{0#gH8ekK2&ff@FBj!z8Wtc?%X`cIwAylmW^(z7f*!0XEh092}gb_`?k|n
zMrJyA992ekyO%T`J#K~)@WpF??kA$&u3lJ=*ISx^pa7LX!3djRRs2cjM0V%N6;b<j
z&^;&tw3ceZEYDrR@R^-fpqSB|Z;7*+ty!?2(O7MCRyAE!%2Jw;n~}Dh!`iZa{qf{7
zXfu5idCMIqiD^*F#`VW|_f<dvb`j%ydY%L!nP54txZlEPw1wE;sV*>_sUqIEb`y1*
zkTXqkOa?EAYSI$RT}aZ(y2Ttvx3arZ_Oa&C?=<<-6h*blypvf?<;lQKaU!*1;pb^%
z_KS&*vK1*NlZ~x6IW*Zdb{Z))3aEbWvkq%uB92EKvZ#qFMNngSQ!kRgucZEAo))p%
z#7M=sV=QEtJE0_lZtP^VW_US@Gwm!Bdh)*e{YFfEUZAuJ1Ci=(Td6sBHJ`2P@|!Iz
z1iHYluS)qEL+fd+X5~vxR1(X*+Nj-REqt}RhQD>y!C4$3E5F$Z@H|?XKhcs`Wl~$O
z)4LB$ClJ622`$H5#!1BTUih%$vO^FA8SY44iK{It>1{HcFrG3#*j;1D&_GEjPTWmI
zv3|F>RQqoIYwgMPjo30%;@F4f7QcGYrkoDG##W<(q46<ZL8V-!E2VoSj?<~tI=%Tj
z>&a6B_tqP><Jo16*4rn6q4s5EIAz&c<5{BzsfU_d!SayegS&(WE3Gm)E8CL+_$l}&
zL<*Gp`KFm!qA7kQg~&O&BMFoNlJ@8HGiQc(9PgCF)A~0lY(TEt2e+@+Z;9XWEIEC5
zFWo?#CUGJ%A!0HYNx4W7PgP8L(9qXtmLC<EoI6}|dz4rvK}}=hQ*-@%sWfD^bntCD
z*5qR1dwP7jrx)X&72W0RdiOnp@pW@l$XPR*!^V^tG;EKzm3Lh8qS4`^dU*#!rBNlN
zf=9>d(BY8pId)oppe3y(rMyYgqUqGFt<K%}_JAORbA0ux&Gj4`Iyala&A-}q=?1y&
zyS-k=UiGr0c^V&SS#+j3Eo+r;)wvQn5ndEs4Vo3ycwSjJTk$sUbk4e*T#>ka72r4V
z9DN;$DvA)9961vBF7POWOMshuQ_$||;ITk-!f=8*1LryWd88Z%o5|~L_Go^5GHLQh
z;zeR?hm}X((_!ZkUd3{McRz9akP9ob_SM&ilP>2KXQH#5byWFn4^r<BP}4tE*NQ(2
z9%AugW1%nMlP(_(SQ(aKdXv;ZQb85~+^7J+#}5GhKw;Md0C4;S0EfB&z>@?3IFJ~f
zK5<yrIVq5^lFQQZs+9wVN(#;If&S#K#$c>(28-BLew}iDrkj18rFC6|y=?wJY3z^F
ziS-#W!l$}cX<B3=Mb3iyCV$M1Ct7cw4q2x(@`Bw+Ib<e&sf|~@s%A!{lE@Gx-Ey+o
zHxMGFsW-wvdNu6CN;c=!sJv6GaL^|LNq}~s3Vc0Sb8B*h@H<v~ZUzCs0WA{~YCx1!
zH3wwvJ4{XcP!5Wt!`38%0sw|_X^2B<iI>;TpPw{7KlMMhfMy<cD2Tng9^l2cZb@Qj
zkYB#on2(K*$2u(g)vEVCsM_uNaBWRH%@XiY!?XL!)ZXWvUIP{MoH}80@y;sjX~|%C
z9N+4ZS6<~||1xvpEkn$@?X9dwK}Q$HpwjpLV-??FWiK;`2mmCTT%{8k!^xK2HTa;<
zW36ihk)@2d?$FE4$q-F){Pe+-8$qX|Nbmcnc$N0LeWwN}^T(;em(DuhawKim@J@bs
z1h}<%IXGa_5CFP2*LD|n?bO*zMw!S=B+Zb~j-$4=sJ7#_bEMm!PiJxW{Le2YY~aGM
z*F7#}Nzsy0QuMog`uyneigGAW8R(HU;H4AN(}{{za^G;U9>2A6Z)&<Yot#Ix$sJ2x
zys@))M3>d(S&~{lOz?>Q`tS;fs*O@?ctrj)lKH3x8HlGsWK@!rUV~=4?8T}i9=O1!
zLYMuURz1#wGUGpg6mP$Fb{2%D?rb?Tsqiny(}`vMdLEmZnbCRvbLOoiAY7ZZr$Y-h
z{y-{5@9Ge(UA*>L-y;~(yL4mc7~RowFeXQyP5hDoNU9+#Q1{k)zUVC2AzB;oYY{HN
zStoZB2_=Lhzeucj2=bUyBU5+WrbK>wD;khiR8%DNYfdLl{^wmx!uq~<qG#r{-S!VL
zEW2tk*0cTG)S(uy8F?V-l1$?C$v0aOUaUA^#Gw__CHMIaI=XC?cYc0;;o+g$<-1Ii
zRh`M%nq2}AsP+!puIEsG9?C@Wl&FJ=bJDCN4sz95@Mdd&#F0)dSkLo4h2A}OOs+v6
zD<%$y_S71-Mxvp&IGIdoE}PyRw=NR7x;^4$!NIxZFVV5skIU#Ls8U)fom6Q9sH*)h
zP~JUsnCNLaqJzO&_V$j>({(h4L>UK<A~#>?TG_s8YlFJ;!xq-CX4%iQ`m{qWO5<*R
zPpSTiX~DIE_fextINQN>Y(0c_BgD>%=~Uy!CSE$~ol>F?k;G$@%T31Hd%Hhxk)%K9
z9`TbQ$$DOnDftAS-c+bRgjIXStBj{W?gZ3pb{)6aoBynKq_`ZYNLQdwx(q!(<p~xw
zJI#4)SwkD<pX{upy{*k0&!DtT9cRDoNWhDVJ&<y!2N}buN5eizj?2%i%Q4vQ!IHH%
z*hrL0BSAx3DjoJpNHBr_)CYbhhaIifA5~{XSel-cZa!?&AO02Z_+WN1HJN{~Pt~7F
zr9)_>@jg53=8gRbj<!KdtcG@*Y`ut)Wb*i$lyvA9S2$fp|Fm19ReXczRp_PGEeuHS
z<lWTv`ZXVo^wvm1ObtES<7D>j?qDy*&eFAagZ1T*pt7TnwKg<Xh_o_C_gnCA#`AWp
zN~=5?_?e`vdVDzI+w1HV>C7i7QZ%l|#myEraQkMYZ)Z;(31fC^7rWT@Lt!cRu*q_L
z+X^hvJ2@^0&E<{z@q=dUD+e-LDuWB{sv;ieRnelc#WBWIvkEoqDCgHHBJs#nxLk``
zVuK4WQ!*XG=tN7K?5gBs7VIk#bF6_+N4+eSyXQC_1rGP2w+G=8D9?IkXW<eHBkEgw
zAhu`6hyfk6IOV%iDl{Y+sm%4k_7cSmL8&<R=luqJ&rJ#5#fGDWmc^w>FtIMN=dm^^
zS|7SH$8lNyX@0(3vE@RG?9o(2C>#()+?HkyHCSVobNh4B*Wh(`BF&rG+I%@w0)0Hj
z<Cx)K5zuk7RCj4i4z8}=8%rI?9_PabS69~r{ESIYPha(LWS%q(I5={>+%*!kZF79$
zBcm`fGBSbogd>1rcj%z}baY35;yJMuPV>SpYiiD%Ebl`5asKq1>Gj#fUJSjk5<|9M
zG`Wl~N!b1@ZJ$_LOj+e@R~B2i*N=<EUnLu?5HD8hx7oq_@kXwmADp}Btq*U^kJFx%
zMqE$vrmnm2dIficp<<1CS9}M-r|IViS#~CLd3Zkaneyz%!*L!nl<{GVKq~0=9Ogo^
zfiO;A0GaS|cPy3WN>25|P)4HYA}B6CJvLU<H)E%RKIsnJ7Z6Do9Q>;J9XB`qYU^=Y
zTH1P|iiyra`Ey*`(b01al*6UMaejw|eElr3Y5*;xE?m?7>^$PP`}(41QFVEFQ<L@7
zS!P^<Tm-|)+=`|I==qeIWBht|vd{e}CAB2Pvz#fyOqo-KlT!ub&y&7R#bruIv$~6i
zE)R&%qila?m&Ys};$&X_$qjZ9?Bd{eJ&4In$hv>gdHnui8v#a0g3qX#LnKtX0&VAm
z6#@(<T7-Wfh%&OWLnMI-?ORgAXFm(Q*2L@V4*r-aWB+j$!~0Xu@|$yxmf&WN;TSAX
z4ggWfZG_|(Yub0i5*DL<I@Ouigm{^PUeF(O25Ac&;GlO!-V|+bpT|-^3HIgV#j=T*
z4!6HcQCcn@v8Q3$c>MxMqH9b0P~?@ac<njysfql#wYE41gV2nHaeJ_RCg)B7#-<{2
z4o@*4B3v&ke1LRpn^KRU@g5#VvO?-3V`E}uhB2kZ#k6s-2o|OA_`(A2XE*?eAtexl
z^+4i=SqQdMxOmA5tBt<6+?$Xf13E3^^5&1gupn5}%R72R06?>Y-6ew+{>lEU_ILbH
zbZosljJrHx=j?uax<LsCkZx1XjiqvCx*Zk;AmePpS_}iPh*Vpg&xkkQ{fqejVSmzX
z*!aIP;J<5sn>sCDbEi5rAUQ!oC#X42tQQ+<$kBN_%v-Dm`eSCWb$<%PS*}Fix4i%)
zC5ClK3KyCnyhIJl@)+R0@$}SSxtw5Q)BRC&9M~dB^#?z?Zg2251TH|If>5q=JYWJz
zm~77>6Y_Ag=j_!gPi#f&bZSxRkrX`Wyz<;{mMz<&QJ)xX*Y)ZGthT5!Z~{p~85aUk
zbyxH9mp!0dPv@^P5LnlphDm(UsI?tP$U_dMF3;exGY$^^YSmEY`8_zeJky@2L#P&J
zFO_$^PV*IWsA%<jJ@=^>UBxH$b&*<vdpvT>R&;+9CC1;Hm48xl0(_dV?e?z-ZhoXc
z;A^PonpT-P=S(h}3(m;bn%%aiV-=uYXL|K`r38zm{8Pc0><P23TUy^Yf%`m4>e^@r
zU$=Df1lu#q_3DE!-j9Jt*z{Ub1)AkQV#0ar`P$AeqFF^9HX4t<p}~K(rf;%=S&L1-
zBVgYYG5y!3_>%FrT3M>G48@wmFyp~}p|EjtQ{0J1FVM>rjx)>yO4w@PfziGwQP5M+
z%_6Gu@yh%{b?PzXZ9IK;&<MT;?P6;C`)n^Y&b@I4vU#GjfhQ0M>*zb`gMiYl_URR&
zzzow>Hb<NiS_t^aS61_Be-sV<UHYHn<}wHL$*5KXmM-ZbH%2scE!@U-r=1)s)Tm=R
zFa47xB7zQmPf~H{6*fM19+t$nuZ8hMfbMu8A=xS6DKke3$0XWN&_M8ZB(Bo&%B{x|
zq2y3bT5$)s+IC?2N9;g~CG16*Plm0=vL0b`aN$LE2m&FpbF`@;A`De=s8W!nj{;+w
zRpWQR(=|kA1h25-t)c|C==t@(z}jqVO79okC6cujSBTTJvvjmYKuXn`9l!275wgWr
zzP)~?)05iwKuv&660N90(<rf+^Am%Dgos<hBFCFWJsD=H^^KhzD*x2fRQK~OQ3J^#
z&7pTrouN(+SM@HhwfC0NL|}h^!sq6#%hkz4k`vzc7BR_+V-l+FmlOO}H4LQLM|+w$
z!TTZ;v+)}B3kg%b*GCvXF8k7C&bhkKCdtV*&J`n17xb5HuV<oDH*QqYVN;?EO&why
zG?`FPP^5A~`te=>gFm(9WOBXG(HBpg;y%KB0PQv@EP5)$_PZtnrpKdTj^eKu_$T|X
z+6S1cNID{;p`qD3U2WkK1pqt>Pj64%=f^)@9niHlcP=RaNG7APx;=h=ddSPmTU^A2
zIUJ!uDUZP>`#qF#G(f0dhy?bO|8yL>;}{vL1bBGDYA_pEL{QLY=jY|+<g!6PH_TZ*
zt)6+^ww-x0!7oWu6OCx{Hmi}?QBza*4-A0GfenNgzTeH5k{#&nPxg&JdL+PXmpa>d
z`2x;K5dhH7(phub45z9_>vBYy{yM8RLSThAClTHZ%kJCp{h~WTXaIBoYEyV#rwA^M
zGz#T$)jav9IY{u43A#03O=V$Sps%9Km}1Qws?HS_>1Vw3Y%(zUk?~E7*Uefroq7SX
zN+jl$T|X1?()E(mQuFORuLX23A+{p@du4rpCgcP0^UwROIVGa;JD2Cc%oFqYGa(<F
zF!+!T=QUVof_>4Fy7=IF*sju{nOZ%%E~iw9wurE${yxjUP*wM~w31Eb{|=qh!n4-+
zO3PrT`IXOOXW$1TdZQa<O(N^bwne7u(p>4{XBrBX_VX%VCE|%r8XW2Q<JHeK4aq{o
zt-rgGe=vUPcshYl7&6Z8NI62cEh>JnP0w{M+yxqigUY7S5d&hd+tPd*m7cw~o^NRJ
z^EWq_Pw)B5G*Z2$E6F2+O&7GhU0ojn^|LqAtva;rf9LJS=DIk`(*+FCwemWh--KfI
zf!Msxe@Tzgn-@+aFnu|$toZX-eY4c2A;*>(M<N1yEWX~TpON{>x;FbR@rN?CXbHCC
za%h&2>d{rcs5KHx?8r{_qGcC&Z`FA{d}YM-=)%T5T=hJ-(6(cNaEbn}Im7sp!_H>j
z?z2f>&hY!7v0!Mo*AiLB3rnkeS-;cPMuKhuuO_v*;Hk<DQ<Bw?OZd8XBTfh}%IG&W
z*D#PO4HUG=F>%_mYW$8wzh}GYTUjV7pWk)5{@9926m+W1KnMw(^7Xs^o2-k?@fQ@&
zi1W|G5RY`s1*8t08v@7ZT3bY%o7&sk*Z9*K^zCz0UHcr4OU;dyOjozs+p^`Z<&KE!
zQEqLj;yyyeu!xLC%$JV#3+<+(IbY)8Id%`E{#3u6AtC%=WeS0;uMcX!8S_=vG<v7h
zQNsSa-nGxFp>(%kZfN(ir*DKHKubfL&m$uMrwW~@RZ=8J8X9PS@!09&)%A5lh_NBC
z9pvwOBr5W1?&2$3Z3AcJr!{&M<&Z8D3t@pBEacb0fzt7MpD$N`yACjU{rn7?adU0V
zFV>|)SB~EeapYYw_wyUSxETv~Pymbex+k48p9?V(TM2x$Wc2=ivT&83vxsJx<-G2B
z8-Syoq}PgGF~U?e?)l*LCKLmo{nON)yzCex<(0O%T%_>k+(^&K2tkN?k*#a{PlW=4
zN!SunmlG4k7ey3F><<r%>)&H-j|d<oO}<_VJrd;;i72)w%7X1|2Xq=ECEe=AeDLWp
zqalC&QMh#t>)8Za{P0-(UH#!^4iRVF`pz{+L$&&Pw!z}X>0YLHScdEM2~UE!f&HOu
z&<dKNht6Ifj*iD(x^p&O1DN-GI!778NpGPvQ)ObT4KM$A^+2<qtg>zmfk=vo&G2Cx
z`FS4sg+b=ot%$OUAANIZFyT)@S2Dr^2vc<%g^{Pde|(#pi^XZF&Lz7uNHs}f_$%{I
zdJ_$l6s`|h&%IT&S^MLMvPUIpyxgv`%k%U7+i1ro2s-$MKod&wyM0^xq|;*GIn4!K
zluPMhEpKM6)cx_fY~1;nGFLx9b=5+$iM^q}`fRm?)n|Gz_7Dqa^grhLUQT(MYMafn
zZVIDnxmwh-rNQo)ij9RHP`q~jRtx(x3l(*3Wbzpa{9qtf|GSgUTj%$<4kw|&N~g$k
zgv#c1`IUFUW#80%B+^je3a>UdTH3kK4T>`lwCFIsLt7XV=_QJXP4o^P2|j*e9vC9`
z?4A3rOEd53$CWSBWh7F30BlrRI>^CjUsASbqX+voLgkyqFSx}P#I!vI33C*Zax#2;
ze0>XO*O7$3Mn2hX#JCVkB-IR7*0k%IU2fn?h0NLbovK&*3?Hf~=L!6QWB$UAG=f46
zFpo{Sq6^ImRkq^R@vnQd68bi6c@T_=CIlYnCoVsr`~2pL;B`ElNnp@m$!Z(DQuVsK
zk2X@tEjdEf5maz|IMZ>+=uH0Ra%~6b=JWf>@F$oMDmPC&pQ|V+d}JEO9OZ)vME~y`
z<<Mpp$Yag=l3doOe>r)Y3soNP3lWo_-8xSvw>J5@#-ChaDwnb?k=6UzV+9!iv3Wl~
z{x^3N9nj3#+5K*U$xq6>#2U**7EBmnP@)Koz()BK!l-EwR`@6TTT8m!wI!4Q@l7yk
zx5BidrG4w~RrW}f=OYs9Jj;UbbvMxGMDOyY5Qhb3K*;^&l^w9Vg0;R;narwB_bG8S
zqr%%wQx0_;2SAT*>W<nh%i<T|6OAbEKdrO__1@OiIk<$^IhBMMK&q&WQ+xDDGxh>}
zn-HbN>50(M-#KxwhAz{G`39d^@Rro5zxB}37%>g+=TWw>`N1w!?M6_l9(wIoIdX9E
za<=~$50g%IVRiK7VIStJupTh_z*6~w1CAP|hAj@QQ)3wY#!`-c#dIEc_$K7c!s0-S
zXhS5|b@R&}2D%;Bs%q-A7|f8ND@`kiw1h-hjc93X{+_wJhPax@I<pC)^jCw^-){Oc
zPG3!!2PX=uzM8+l_H#KM<Jb|Pohz#NQVvHNuP3QYFvh`*T_v3~%R#%QQbcE^<f<iC
z%}pQ3r8D5iaRRm!GmY1OQ8V_wncr>5nBDebd3?s8OBB4ehJ-_Y(milu`9cKc?CAPE
zxFV7>nJYbGu%z8guV1_kBtFMP%hsP}Y51K6-lUpm81tm!m>XHbLnn2Y`)fICFFv3k
zq(!iJ7uU6EqbgEcn{+|#*3hGcPhKlgGfv8g@ip~6xTg6#^4imHoNP+$=QI-4=|jk+
zr<L4XNQ5&BL?X<7X16lf<N^1{9Q_=mxoA$|N`ZiWjgRI;>ZnwAUMpWPnI7GI!MrUy
zY~4`jV7OMK2mUmS3}!+0KK<#XA5N!Xg?Wbj>Ota-WA{mT)fXH$Wiiya(JeckmRIq&
ziUSeX=e^0Lll&|gt*?A?e>u33PaScME$yFOpM%nh#0&d(m(&ev*}0Y0qL~HAB(g0*
z%#Z-18LZDL(QJ*V`><Yt*9waS6xzYY9-E{$+9<GHkO6`Gv=}23O@A6PCzVF92*_Yv
zIj4m)CtKDgp7G9Y<f$LDAF1jj&l*;8S<YZJkx*;E3n{p)cpjBe`}J*9{^pbKHJcG<
zs;iA&HGhw2de>fGXki!Jsy!FFd4K04P7wp?<F7$cOdQu^RwJU038jL4iE>nH1ke$z
z&(FO-7h#LVKm?~`FzpS|WP)q~A&(*AZBad-{mmQTwP884ZSQRpI>aZ~cv?jmPWJ|c
z{|6UKz#H-Pt2x-`nAE4rSN}tM{#%avMEQ}!6x?6%4So>TL5P>-j-Md{j}|j8>^Qix
z?KViRp27+7Xns&|Ov+(zyr87s&h@XFV@$OfwyfFc1wgHs)Q>?UF*R5)RqE8MS3?sX
zUYSUoNN1=p+K3|5y{%WY@<yG!mvwvJ{21lvN@lkU!v}eq;3ExRB=_PzZZg-nVO^|K
zhcd3?*2B{HVd;jkCTdDEA?bPBJJ&YiW4mTP;p<P0<8-?@aVm3zuGjjZcXHZUOaBXM
z>e+5yzh*cGe!W2TR;Wds3^nX|!rh6~8QgF%u#&?`9eQk9T1$vPnWfxd$f5sX*KIFf
zI>e)C74X*=OkbJGAu`RV)tHaURvCK+m>=5t#QBpc^Rq4IW}b1*EtOH1SSh7>iPuz1
z3?JFWjFAz9%Kfx<$J9X2XU4)vvP$^LFe%Nk6Ts~$7vbQOf<SQihWh;W-X%6<Oi!&4
znV*?+lztm&XYjL10nJ4*L>+g>e-AZgba`^~7!BK={_X3tIDV52nAe%M)EH)$V0Yye
z`c`yAMv%!8jNxhaKfwk1FK}_7ORPY@Ae6Ww#Of6FmSo#H;z@Xrkjr_znybBEzL4t1
zh?7ZcjGR6QS)k!1L}wcPeiH6r=SKsPaP-+$ob8zwNEdhRS0!*?%RP2Vb(l{K@i!}E
z&j<>4Krmn)_yQIU=BoPntc`NSSuKB!_#jbB^IC;2lsma<j#`ek+%3i@_?C!wZUDoi
zdTDf$Fv{-2$%pd)!<gH@G1j@OUR5tq-t*%k;`{k)?)OHQA+B`vIptrPLvz=ye8s!)
zb6UPtmA>+W%Q3e--m&R^yTP`wbKw#)6YFnr4nr1qvfN6>@puoH=dELD#i%)pDj~;V
z=n4VGSG%`bgpz!bEs(aqU?arN*bCtbciX3$bHzcl{fnz3oBzhuW%R#srAIOr+85)b
z1$OLm0y!gK49ua~>VNyV1d#d~qFxxyF{1~b8u*g5!uj+v&nIzhKCC2P1t8pP1NU6a
zL&E5Q&<aJkM;v3U8+^Afj4vj8LjE7n)un@=EDMRwKC{I$VkP_N{O)oC$X&Cv{+@hC
zz*p0r$O=OoPr8=hB-Ec3pu7w{v!QG?qBf!X)Zor-cfj8AK3@Y7O<y>GtWQJO!2d3Y
z(6*ZpHM)QMq}xM$n0vxNE<fdBwd}A9<J{BA#Bt7Mx(rbkA2rH<Es(37lA!!`acCEo
zHuFPnYrFV(365f~^TmtV{FcG&h0vBSRXtjUujg@RYb^3b!)7vmD_+k3BG=BcaSd@E
zjHWgvI@S+3ddE)JXg6*z|9xouFz&Kk+MYVasylMOiO;b9qq9Pl91J?UPCiNjWXj4g
z=tQD?|I2XZ1Xz&b8Fr51Rz{jdLTu4ACQsqin-BHmY*Ng=i^i{4aoY@I1wxfQxzf68
z^x185n<+lYlWaH~xUmhlhS|7ESq>&MLc)5q3tiW{KkV_*T=XZ<_qHAxO{l?+XNip<
z!7d#<wt^Dna#%drUy$3v)s&^vnJK&mI;+qBBDh##`Q12OSTlh!=dzS^F)F-P`XXTS
z<+L$*ILp8e)kk=X%`0af{$z{nBrLw+p`N;!qCG7^aS#ZG8ksN{Y7+cRtR>of;=U;N
z{ev3u!-0V)&W|mtb5qQm@|mAV>Y7LS8(VwD?#^~9QSI-lqCc1*Fu7$J4!h1TGR#&P
zczRsPk0DgRk)Fc{Hu#E1u7>vB-IEX9q!|6MvZ;O!*NPn_-r4ZG{9yD4jW44bdU%cj
z;^+7=#99+sS{GNSp~wY-O*er&I*qNA)rqXDC4|T32fyEo!49K?V$M+bvV8t?gZ9Av
za4C#r^m588iS~XaFT=eb+d9>Nu;bCA1O@E5lFQ}Lx)tSxAAgNq$p4Fv65GG{@c)N*
zkpF{scC_Tp5;4gVEK$NLzYunxAu-x(YHuPa*1`$B*l<rI4f>x53FZ_6MH7<%Krq#m
zspm2R0B-?{XVT-U!h#0>sqlmbVKDkvDAF+QSH-vD{07O*+eS={jEwGYiYMKc84g6G
zqFHz%n(o|wT5<)`i|n{h6<mU(24(4E@!OajZ-I^SI~0j-4P(1{mat(wgcu*~2+a#)
zm6&`fT_%1;mBHL32O>0E+P5FqhF44ji{DGiRZVO}QH+ratH=5xUzUE{`(M<fqV;d;
zq1GC}+=*Ig(Y5uEx``bUj{nryO=sK}KR@$-A)b^UZg#(B8pQPCv{&Re5fO(vtqXJL
zOdNejk84HzVROPj-S=kfA6H+Jckq{mzzGW6drdTRhD7D{A}zDMww4j^%J4P<SWRIl
zQic%_LjH%KxF9lRs{i1he2L)^YFFmoKQY*~W|8`I-E8^)l6QD+L)4x~CHFR5v$;>(
zZ)bKKB4%K;)pM_&Q$TU|zJSrh$ai$RR-`wIRVxZRsO`&TdjNRcRc<?+8;^I(l6jyz
z>bKmYJ+@qmKuC8vo?@Kna1k9DK}2%K^_RfgYd3?j)cw^t%-Wumv7e=^!6PwTJS6WH
zy)FzWK$b3Iix?@BSsD%nSlI-s6p;UtlB1=!EAzXCPy3bpmxxlkSjO91FcEe$gd)+4
zVQW+pz8&sB?zaaSC<>xfRPKgBtKYMtisPnLYVm~QAOTW-C7aXiB%9gUjhFT{${(s7
zarLA9OKZC}(*u)#c2X>!h1I72?_!$Q!7l6nU~FPsFVs$wQLcc7ye(q7)c;wVM7}rK
z+<(cU9IM1_`wb!O*&uFa6a~0GJ*lCa<?v0ozP+6HQX-e~>p>ki6E}4-OD2=%7OsWa
zsSPR~Uejt^nXeLfB>C9)y!!I_v16YZJzsKr!aMyp4|$Z3m%fB;RkrK@R(MJxOjQ{z
z|AHCaKQ#0&m@WSg8p<4j(a@=uVwpu^aaueRZ?<3=X&0sy5H)z(bLHpp;cX}C8X)u{
z*+Pc!+|#<3fHYe&5)}Y?-<xgcIJkr&QvOAk4`o*;K1|yEXMA4-B@~9S|BMO#|NdI|
hcZYupF&j`+fct}7If7RmCTut$B_;<d7t#Ipe*i8<k`({|

diff --git a/wikipiki/overview03.png b/wikipiki/overview03.png
deleted file mode 100644
index 12197106b94567957dfe1d5d812264aeed982cee..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 18001
zcmZ^q1y~$So34i>NYLQ!?(PnQTX5Il?(QzZ-5r9vyE_DT2=4BFCg1+M`=32$>$;es
zt9oj>tE=9p>bYyezRQZiL1RG!001}%ai9VK@QDln0E3761j=D*lUfA5eYF)=cK`rj
zkpKRH0n#!s003w?GhyNH-%V{CZ5&K(YzZWUg$Zo!ZH&z<jQ{}Gl}tqwCB-8&-iM7_
zA*oQ`1SuN@R44)kp$K1;STZWYuiqp?33HcG<$DlCM804T=Y)Qait_!5Do+C&4!s1q
zOPCiGkRKX8`m*JbZ?Vw+us`wMu*i2%ev?@@1=$S+n<UOG&*}?XB7}$dCt#?5aBG)N
zzz>?l7Vr(K&XCaIjTj8@=*`1JP1Ft92>^4Qg@FQe%cOTR;Dmf291Eptf%yi4bvwp#
zNJ06c00i8lgo*$HqF}z6DP)R(oG$>qu^$FIfbX;bJ#wG@S%7cmW2y%jKr?|56)Yzf
zK!9u%3Iv#P1InjV!bJdT3;+~kseVqt5-os1Le*FtP~8ORp8N(=3xI+JFvy1nQ3Aer
z0Q825iCqDKsQ?twYgL{r>dJ2iRG^kht>tMU;S}-Hgrc>BR8^(JqnMOHr$%AZ|D>NL
zK-cS*ipk{1g7D{N9016PMFrjM&712aeC6aMTT~;wF70s_#0Qaq!Or{MRGF;+0I=og
zJ^fBYUx($(4dH9`o=1BA#Z(6-$LS%$xE4X60g!XFqIzTdw{1jnV_KG%_jY%eB>ROl
z^+#2`-c5RSyH(#TpS*cqAMXBiZj<;iY5R$NdHmBmek)ywGZptW&|qypTI{t6=HnH2
zmZ)FCphb-eWk(*#E()0T^M<LAC`>4ha)5N^!*F|(=H)ZrCM%%YoDa++miCwSkI(l~
z<lodBySE<zfa^A!o;eDr&%UMsTT?C{7yNHxIivtzV~IFB06+&wLZ>uZ$3FxG0049R
zsHz3AZ+kFkx*>3Sz}I?UUiH`lg-H5)g}w<v8~Wnd>rs~b3sD45RO3?V(a#CsvUJOv
z2FKgN)AcGh!}HoAJnKVc^-#3?ef=Uh427&uxDpCx5UxfX1%;j(^hnqv{sk$5gkU5T
zMV?41mQ|clAzX<-SseG8*Zvb{h?Zz;EcY;g$^SLDU5qiouU4LS4z@wK<rh0vplBY<
zZ$n4Mv}m-P^xyXNSiC>kau0r&nIf!2^9c_zbRS|sGWT0D&<*wp)o{>!jsG!LLsSl1
zHi%WNQvSIu?C!@@jmsA#KauXQY+qc22=ws;#nq(MWS7K$5#W%pAg+96|N1#lzL%UR
z{+CoeSu5gGKZXGlV~CnK4e<g}G&21+k5J)$b`qp8VJ7mHm`@Tl1xhnWGomxr3dBb=
zCFv~USj6!oD~1-ekemrL1k}SpyP3OvyUe@TyM))8(3u7Tb_I`$+Y}0;=8~9u-}YGc
zAdFI&1eNpC6xM&`Dj~8)YY0{3HY!xfhx|fjaZ2Ny2tbpNDy+y$oW(LlH+?XxI&^GB
zTu;Q4P5!MqGj=3)n0)y8)&&+W7&Txh)Pw>v9Rm`>1k(khDn+^ob2b8VNQr@+@g(IS
z6(Q9|S&gcZ$`dtq6gp8dkt`9Lie9Otw5W8W6h`?*c}yv~L`Tu9QdF5)ai`?#TvC~G
zY3BD6MQlZr67F9ir6#{@l=ut0)!)J()cd6S<b(_4b82*V+6M_>eqh$Q(hyp}l?6Nb
zvG$YIOe}jkQ?;eM;kHHamX_pl3NuSGtJW#pBpCBU?xff~W;n`zJ)kH~zVQy<K)ImY
zro=8{k#1o$(y}N`N={NM6EBl56Fcc(t2`^tEb0(xQ-AS;7aWo#*CH1)iJk<{JWyO#
zTrY+$Mw8*?x~rrswJ5~SZ3DV=Sr?zDWOeHJW=Y!=Z@6_FJmYxLzbU<0Js01J!Ky*j
z!ID6%!cJoF46xeS@Zi!9tzO9sYxfBV7wRYKCvOGDwoLQn&x=NiBK$NP)Y>80u^O}*
z%qN2&BP5fOIhHw3Q;=yXqAcQ;=9V6s7@x?SSV(0}=Ve@EI!HfAUrgU@($jF&plSTo
z*lZ+GyQ@*8e%{z_9i+jjUZ|$5p<O3hky$~y&{ok_j9A<v8!uaywP4a$ebqS9Ski=9
zy|)ChTG?pT=%sIBfNs(>P}z4L-x2TC>J|CM3kesp3}1$;f$Qy1Z;!&I!nKh$nQ_kV
zHE^4BL~o)t^=)d2d8ZM1jI!S>Q!#y3%mm$}#UbD(G$KsOe~d1fk1id1aDBLASJLs$
zPJ7FJ<}Ne6F1`2c*J{-{+qv0!$XfO|OEzVeI<v#?zG2}%@_W<#FxiO=7MtbXa>8<c
zCJhI~^grlhRVx;&n+jb@AM`KK`R@7bvv>G*c-S|XHq>>;*}I#Do5tk&Y_fENHidnN
zKMX(IKc)f2zNBC#pTqnF{WL$lJi2=lc17`Xts33eE}seh%xMus6^!<;@ZamHAT%95
zjj14fI7pd{oiu|F`tE(W@EcNpUq7PH8<spMBuF)wKgu>#4QrY)nbl=_P1s=*_zX+}
zZls$q%5hfFO0rV%mC~8>tgyGTwDJ$q8LN-at7WQ5SW4k=(ot2iSzC5)zMkELY-eu6
z?0BH3&<|_dy5&yx-Ubz;mCzy4a3u*yhsts!Tnc`p`i1tB^cvZPGz!|S7q{1hh<=)F
zI&?``iwaNnTAWJ8J?=ENoz;zGfVq%nuO*PYB&J;&PI^6^D+?{nnZSyPm#c#@ATBn>
zPN<YnCce?+*ks?>d92(hsP=upI--dlFA;LYqAsQ!T%8uWQK;xpNrPgM3bNM3NY%J&
zB5ag1sVs|n;%vNbbTx)O<0AXx45=4sE3UCHSW1-^S8cze+?=zP$IfjPdIuGpI#>mw
zoToXwk;-abuIx-Txzf9X%w5L9Pp4<pzo!Ar;siz+dN0W9WNq<GTTYE$eX~LTIXDxW
z4>c^j5@i)V8P#WrV$F3AJH%$RD|IcQzND<b#c;}a#`tJ|gEmVOKB+W$KN;Q{Zh561
zZd0ZH?CxG<l|FfbVzn)xQMe_)i>JBWsCZ;@f}3BdK<QTLS&8j@X1zgw@zHwv9NVM)
zp5=6YRkQu!jc=rLRT)fKX5M(-=tbhC?t#BDtn}zH>BUOBLe|ReZ0PgM=Ql`V_{PPS
zxp~|fUL}R-1?m$q_#ynx_sk0yS~xa1<;aY|ZDL!X+wRfB*Ubk!IIb1vpC08~khA#C
zxF)#t=0a)LX`<<hX)l@vnyqr<eA5fZ8}6@StM~{REIjINk~c~tW-CYjv+*X^Q$I5k
zGrhd&p4RkM^BO%4eoStfBiLNDeskQK5&4KX;BM!h)VgkVysll{Lso58O{?P4wK{e@
z=6R2wl^bfyXiKYX(XwbcckgKMFn&0~&SIZjzwL0lLi<>l&*J1=@3?Wdc^G)O+eBOU
zwkLm^9BW&4AwREZmuuI(6*v=I7G4jT=hu8+Te?{DG4FQCxtU%Qdw>WEn0k-Bi$)Lz
zk4}vq3x*3m$>QMS<lN@Be>-|D7M?PkBFjR5&wC%ML`S3dew;s9oSaUX&P~2fj_<Pa
zEPOleKEbS79qb*%>l|@qX4JV=c{%HGS#!a?$lpYe+w~;yq4+R;s<~7AUHlS{86W@g
z<#Wo->knqyRnUBs;D@+^3;^Ix3IO;9002)Pp!XvHz=;6>IMxFIxKaQBbelNc0Z{;e
z+fxE4sN}kG+Tr7<xSV*<#yAQ42S!B@tXDyV3MSv2X6TB#Z4H4nG$^I9#Gc-GB))zO
zOI$LscVyI}NK<4#+HWQgb&>z;-uYHXpuIwcwD7X)Ou*)kNJ!hF@!o+@^?t*(D7cQF
zu~M=Uji*%5V6|pss3&iB=N+x8t#L*>__eQZuUkgz9^R)8lYA!G9T$m{rBz;M7GFU3
z0RVJMlF`#6WX8ypuXOqFyMuvph++ch{uaf52Hj}cuvgN!TT9o6;<{R*^?1xjO6W76
z$0T>-lPd8lS=Vbgi#iLIjP_)ya#`HE<aj!f9h0P#)XVcT!x8{cO(P?Fbb~<DHN|^J
z-qphR&xcmL5>L0Yy`64P_7J$l8rLyai5f6xy6lX9%$F*kx@XWLB1=`kOYuOKfxcgF
zL|t1=jU&VoU&Za?0bk|8>s{+;|FX(km4UAzDRi)SVFP3J`cL-9o=f<}+w@=v`(R^e
z5?K`Rfpj{YWIr=8aOTsz`Q76q2Lv_%kd&PqpZwxMRBQEt`*B6Bi*=3vf>&vR|H9`J
z^)j05Q;K~PWpy8AZM?9J;PWWVf|Z$-WjyG+9H5K@6caPoP(xGsB$X5&A3shV&dgTl
z7_9T={bP9t<|6BCA|=-C?j^FVaXP*Yoo>3Uf!;Gsz7`D7otK)ik|$S)|M49CvU1U3
zTeL}`^E6)!9-@P_Q5o(k#*RFF`!~HIbh&7f7eT#E`*^;#`KYoyx&C@>sBFjsm%Ozp
zDlYE2s(QbocacV{IC-lw`k=!=rA?Y^4aMKFrp@z8(T%t}esHnEZnN7aPYw-r*S7=!
zs26rm739SEv!2ePoHtdG*K=kL@V|9XXhcyUMxMFu@gFdo1pO*FgJy=+C1d8Cot>RN
z4Djjr5l*IS`rPuI%&E&n54!1XY1ydmQ`}7Hosk{JLvn!LKspX(7uNCuXD#jdwzD#j
zg(t5|2nd`#%|1FZqr&erdtbZo+M6<aEP8SvB65H4%4BQSz5j~O{<hdfx#YZCnH74?
z=k&g3IK7F&Hh4ZW9Qko`_aQR$G4bIkBjbHR?UWt#{?hfn{#=6ok&V!`!WUnoFHcQG
zG@VG0XB85?c&;XOyIc9EI^jx{<ZB^3+)I~>*IA_%aMc_e+hv{OY9s<FgghyGDyzJ^
zZ3~yX5mEP!jcmPfWpIb|H2=FnD#h0NWfVFd@d^Y$O=Wz~gA+oT<ou)JB<pnL9<z=S
z)Y~^(@4q5S=qB#dPBwb*`Z%2|`Yhkb-zjcD$$V@f%*qqF^Qb9Yu|LNfJy@slKj`{A
z?LEL||9<0txhZM#)_DAiC}S?0IrHZ9M9w~u&5!rGLhYkD&C;yWRCe*P;OTbl8JjKs
zaW|c<^lr_|>vM#@`c4>$4oCO4+aHEZE}PNJ*jRCDi`mxbEQYDgWw+fQ)K<SU-)988
zJ$|ro3AD-J0Of_jxG1+p!B8T@v@wdxo$GKQ*6H|nxNXhCl#^|=QlK|G4?WAJa9FsU
zx+^Q>tQGXv>gJ(03c7&-sC#x_CASwauJJ#7d=}pH6CW<6`1aRQVE9(k9;SdOX<Ec&
zJK9k-d8+S?dDr}%wI8EhKOKC}<z6F9Su~p5!b5M{d~VX4yy%hS-}zTbCneYSDf1d!
zY(7Bc?(g?E(PrjDlRi<R>`Qzb;%<J)O|c)Xos1JMtA7W~k01Gej;jS0)}>55!hSti
zUM#KLt%i<fsZKAEkB5e$&(;`^e@{qkuXZk1HD``Pd)z&blmY^i`7nv+Z;T`)={$5u
zNltlJBYt56^p+WuyVG1OZ?caKs5fl*ea=t$QSZIpab8TBU!y|Fe6mk)S2JP~eHM@+
zMT-Xx*yApaPltVk>hBkV_{}e2qMhyW7HZo#M;GMH_1LW3up*15^J@EsT&5$D$?4>m
zw|1(iXwSaG0szCX^aq1WXu2uL{N86zkee?n>%#PK`0i$pA6{ozFbzRui=kCAH}s(K
zT$(XorpjDam!_Ve%*okqHUdg!INn)@VbixSprV6zj%lryv?=j2mA&29gQ-PC-evjM
zF4YQ+JNK)D6SK2*ZVP*RyrzpMe=_!Ga<dM*+rZa}PezRux?@=r$)J`|X>Yv`ieo}*
zkC&rEyz|B@vZC)C)hwyC8W+U$cm-a{>Ui0u=Y8~lGVXZG<_ilt3ynifVe7~aSv+65
zD~-V(g#oC2)qzKRd-Or=YI<RJ(|wBbV%g<4?s6lZIe$5RoYTmosAHd|V8$s^t<stB
zARkZIEuSpJA<{^UPfwSc-pK1(=ebKBeAmSe3l+6Cb#PE`o#$+6Y58dWp*q=t-R3=Z
z{%rGl^?~ZT;%O)@xBD@4cFG#Kh?6VF_iFB8enh|Ctf`{8x}^4EXn7judMDxfRu&oA
z0Az9A`4Zvqw%dC%WC0q@h#r;n{q@eQ=jN7cA}nlVkM5vuu-Xve<3(UhG}+m9_7d4(
zkjmdupr-e%^*j=Zu0Ah!zJZ&Mp3@2N-5Xd#pl8_SfA9IQ(|o1^+iA+?f0*4o*Q1NN
zZTbv~sfF~y5t~;ePcEk0-Wz0<wpVXQ%``I?;Y<ZiMq4)JiMV_^ZJny`tstk#usB&5
z*co!N+4)}E@`w4pE-QD0HD1?yPbUTWHQlw2@R@yksDHCv;!4pnoK2!9kZ!q25Is@V
z<xK5mmu`aq04PVHCzsjw&SXA+$)dEMc)Xdhi;~SN9N~&5eo}}&eF6TJ-1scr+V60E
zRWhFe0>QCuP)>SxkbkupfH|?!U@`r5xxe)K+Wr=FLB1jc>^SiG=%6y1Pn?H;%`gT|
z&`WLj8mU_VCg?xFm@livLJr6i8;eyoZ@}sRW$7Vy*WrNP|2b99{_j~S|91Qv9F&0;
zvi38PhMfH1{q03An{R*sG%1jt?6v=Rf2;C&J2_db8UkerILEa3H5AKb_ilhbBMtwz
zs=qS^0NLLQ{-4LbBcMuRa?AHQWS#Xlr;EBCZ%RRlYUhI6#+wO2`ILL*wgUIvqN{_y
z%`#TJpt_nN{<*YZu%=4Sp!>sBr3p<SJdK}{d4EdI%D%@aTTR3WlqAe&Pb*#q@%gi*
zqvl*daSiFI3IPKlvpg5R_=XA*69IQc%#jslMNMIcBFeE*8-`B5<AzjNLS`T-3{Ot%
zgJ)!Eb2{H4AyEtF9@*?3&7p6R+rRx3b<MW;KqE#yy0o?9>kMR7gIip3#xos2PlO1e
z+$?ML@(`@65;lw51@$f7Pg<liWorA`Bcx@!11m4Cws+XdSeeBmqDlHTl#I;v?3n>I
zDKX~)3~+O_r-ggDIM?odxJW()H>#B#Tnh&TzQZ3Jl>uL(*yax<y!8>DB&t60`rMw)
z4IqeSE*J6c*s^)p#X-eqZog^Dj4Q4CZ40VxVGw2DU{-A>Hd;%2oq#}O-Ymq-d;^&2
zBr35jpd5nop=e43fgLxC$I0k<lhdsfQ`{ekggK6IGyg`*uv=GAk~^v=EbOOK#lB3d
zMYe_h<2OfxF_=8qEcjA86ft+9V`xS@hDv#%NZdDxl|17XLl^F6#XXs3YCEyYkYne?
z`HF~J*Cl0{SoigQE3+Mc;oOq-bQYkXddOjc*Km^;hr+La+B=*#!w@tVre5FuJwH47
zCpR8WMkcRe$)&#MkA-s<Hpz<1?JnWYyhDJh9CsBGqm;w2>)jdwqSex4&a#_(3?>C(
zz;JLa@7$>){5kiEl48Tf+Mm}JxfAG?RXjP!#5oQsHP2rKMUuD%h`DiTtsT1cZteyP
zg+SF@>fCp4s%bmLepE9Gj5(ANN+zI^f}%3U(N+B&Ol$%D(n@nwgrhr`KaiAbBS-mr
z^w4ZJfdr$IJCC4FTogP4>DThaek6<g1?961Zj>gdA#>^Zq{p_jcMHnv!S%=pzx61N
zaN)%l#a4xr=13qkuFy;+s56!kg^%+{{~c6l-?@)?On4k?bB`!E<sezH%>p`eOMb53
zT7*K7T2JOfdRB^c>LMT^V(KzlUi#o%bnqPW`dG(2<lUS81p3dr-&4%m+VCUFe+&af
zuE^jJt+q|qlc*p+wtM<T)vxJ^6bC>pj_ss%=q#?SRX|9kpm^vW!y<z7RrBRf!zwa7
zZdb2tP_ThTy}Ju)5ZCH+B1wxkEkz<pih^a5nu`1>oo+svk!He0(ImA+M1M_bPFR>w
z$r<ulgg>ez1+XqG9m^Pk+V$)nsDCxy_k|x4bWbJgoSPP=3}^W{G(3Yt%a5wCKSN|Y
zvtlE|Bis^)KLP98#1(t(ayQ-yspwXJZPCJ;&DfWQ7NMx@wB#@MPc+a@xvLu3Hg8Qf
z=H|6hZGe4+4=O56VW$XHFVI16f#U`PxU%h5A)InM4i94|slsC8@j}h$UBb*<AXXwt
z=rA&L8Z5<_mU*9fkjPaHcjn8Gn@F>e`#%uZ7rNRoeMZ88j&*loM8|?wu%+lf8s#uZ
zzyI?FWi?%6q+ZwLI@TW=M~&RNu^^1<<oQI(8r9m7#wp$+t6hMYWUmsdAYZb2P2=)o
zzGiW*5}fky$W@hBBzmOMeEbL-m<WAPjGJqS@@W$QRRv>=3Lv1RKQO;+DJmkn@9OGv
zvyL&nbgbJq4EUyg<H8~5a(`}SYD$$a=KVoT`f+GDG)>0WvBs}~^UTe~KCk>0vGAV=
z1bVjMABUa%94L80tTsl$LTzPpxf?ko`F-+&r-Uv(qtG}`pfOs~WlmD2dd-h0BhtJM
zKg30*_d&D5r0YUDNHVjdkNd6N*`rrpUU6n~TJ8-Ouhg!3k|0elx>;d(Ip0Bv0|%9b
zm4`>re4HBKOH?*@4698bl=~YL-Ro+ml8-%vBK(bQv{79=-a9$I0ETtwO=Ls85fM2v
zWp9rpiweqZ*XJ(L4?%q5Qz}kMDr)pDj10^4PS1li05D2W4FM9B*lv0WQ0V_B$p423
zbnk*h;9tk_HF10U`+VL%kx9V-1Rld{$pwq$>db6x_qRuiut*?ng>1p3UQX8aE}1>D
zxBvDGswyQTh@CSUkGB^Jq%;cv{J-+{kEZ;iR{yOrzNiQvgBlblLb{+6)L`R<fp>Rz
za#=ir(SVq=28+e_>*TK2efF+Y@Eg+fmD(ANrc;^8xw*OBT@v>%zH`9*>GD+i<+-H9
zg;pczti8XLIMS12Mb^rI0rUnt9Gu6KEzQRyEpXfasw6-M9<apSHwK1jWRJvgosaN<
za`_?mKHC!P!aYk7Z6wM4)Na2khJQ|p@%Fg+{*o<G+5T!v2?V2#UHTbow#8%(IpO?H
zAH6Vw7DUYdZ2Q7nxYc`H^F?QJH`76EqeEzZ$j5p39>27*-NPt&2Fts>Snu}73qo3Q
zDQA5AlZUrsfjX5yLiGR`OqWX~-+LYJZO!_IG;n?>8b3@l9ou{D+Wv7ZmSmRfZoSY_
z>IUI-0+V>_wds7rbj&%^wNT%q=dc5xM3bo6eVp5jcdX_5+(z`qkzTd9;V?ujsg{?x
zt0n&9`pO)Z#+3~Re(03xP{}RtT-WVk-PlpThzTi+W@$qJDI%a}6qcTxN-Obw)3&rB
zL$oC4kG{)W&HgbmKYu%Obf{^4oA<9@PI6%KJ-JEQ9iI0UgVZE#9_6VDyL%VG7d&e%
zb-tlw7a3k<u~wDav!psPUr%k?8#?Bl+mG#cP|c9BWE(UdQy|CYK-KfC@#fW?juT^@
zReqQ<>zbDz7ohr`HnD@&tDEolO+Hr<x&<eD?ffh&=7=cKp;)qCXLAQuw0+9eEB#2i
zq>44h`r0>Gp+4w?-wQog2(`gV<z8Q_kCO->=yyzBNaHC!lSkQ~&~0MX;BI)6U|AWX
znH;LIjINOA5*bG5^d9PYsfp7UKLg!*c86&<x+cdEbbpzMZdY6HT6+CW?1|YJoGP2V
zlJPE+3tjWBLE9H9#p7d}>m^vFRaI3NcoVBFU4q|r2ywBM2Yxc8MLY4YsbjkoKVeYk
zd(;bzCp6V%&{bO`Eoih7RJrem3pB1^+XcDrM6%CJE_#-~pN5{>T3DQvK-|Y>!%N%k
zVPW{FQeHOt9Q0X-?bFk$V%bEZp<Hze3d{E#(i-aoN;uxbU&YhikWVIR630KKmpui;
zvXbi(Dfr%PrFP(uUOVGiTk(#MyXJqJM*S&wx9>Sh{RjD5<ngYt<dyYtd%O#uIT?{T
z9#%twO(j{Ly>?d4YDu^Z3zta63-)2Sv~VErxS^Wqa3)No>f`ZspLDg_{E^a^+DP_I
zPX~8*uE|esJXwy5drc`0o9^LAr-A+ulPDiGYTn)kyA^}uu1PaIEGrsw0&~)EB2TZ<
zkurJIkxlnaXh$;{xl%R`<`!dRVQdFdcwffNeM@Wj#zRKJ94hl!+zw7%yj|6&myNUi
z*Q@Y7_?>UsZk&=ovfr>TZibAM;?CZp&pmA)hv3#<6OUc^s)22~K5t%Jmy?hUG?7A1
zSIXoSP=<Cqw2T}#gV;6{8n}DpW63_Qxvv3ztJsEI&U*J)u1_JGEz*!1PdN>DmqZkK
z2AaFb_kXMX?vdvnIC>*Sr<DZ07IxUZ?-_1<+#hDMzNbmt(69$rK%7fT2?=%5X8^g7
z(DJID!m@XPlk(A~Fp-i#F2zi&{k|2%O%);1$9HsnLxvyqZQ9RXd&9FH-jFzJcRb^%
z?E-4lK1XY)O!Frui|y`~p$^|Fg^x>{XwlFnr-z9`11ItA<#h$(jCutZRtxF5@Qvdh
zWS}VIMMsww*(B&9>St@27vhvY7qD=t;b*On$$JO>dR2?n=DE4ww0Uo{!R7OLXJCGE
zvYA@czWR_lXLq`2xEk?ace2Tr7<Uy_|08w&q44gqxgvoQDLUop7_yfN3qek5wp|wg
z&aWt<SD5$u{dwHv$*R5fdv)8SS6Jvd_$p1vRCbf|Vn^mLKNAv{sb(AXRhok-%~1ay
z0_wLm&=+VH>A9>I9vU=~E<@Xnc#W+X=bktH*p?2yu^2dV6LmAs9x0DCkU7FESuepp
zYU$sUXaH&{VBnS`I2a{rRFLI;r?_3Qs1hMUyoCakY;jc9)zyI(4KVv-maEqt4=atE
z$f}DM9g8aOmlvCkx`X0=PuHL|P2C-AZ38W&)?VrA$E6};NeVhKxUmhWfS{z|%Cn8b
z=K9{pUQ5&j;K~WmyJ(NGYPnss(UNR_ob7rh6NMg!$I$`BdcEn64AA;Xj~>wdvs}H7
z%wk`Pt-+|U!8#Sm;|DD}`jivsB%1K#I<FUJN6?zbH|X=!-v!mbN#8#UtbdNxt_)`)
zrXkX2t+$Cj)5@H68oGSewvKj*-DBd`QlXV+>d9&uFc=xd52Fy-GY%Om&D_y815c>+
zGvM4wQUdokk}<a$flso=1iRVVOTnc}9@E!3b|XsE?-XHL%21&dfzVikVL<dcLx&^+
zW{en+5!DU!BZ9Z4t#|>ALn370npV%wp>4@tgq$1=a|X_wUBE+`my=y-1dZi7q*E@Y
zC^{UY!ILtRf3TS+>qPG|(Zq;vU4gGWJgwM3NUKyd&KPf$E+UCQv~~autCh{eK54(I
zjGr7awU)0)ruSgmJhbDvgr8{~w<!p1L7ACkMINC;p~;^egrq{SBk#Y|vC&V~K}y-!
ztD#ULh1ueW#py{2C5TP*$^bRW#*9vniOT*Y+(`Uw6V>gq^dMM+lG-f<$A-Y2g6~jw
zzo;_lsFNjwm&6`&rj6!BKY`7d8(GD+E*YFzN3-Wfl4$*bxphU&(>6=Uk0E12Y=xvc
zBbzj2MU?+Tc5<q~D~5t`JE;D}tHke@l8TZ+S9}3h9C$xUurjb>JCtZErr<$>Fqh??
zsDz%$cD`zp94MkH<SUvhOu~pQfdDb1g57dnJd9m@e}hKMR6K(gB$-Im1uc0<nl}Fv
zKs_^drR!J+zG%qU^wMq|f&pM%%5aWfXFR`e9@(ljA8?bWtPFFH3Kegd7YMGP$_wp^
zZep(iUp~ih@esON(V+a*shlp2VC3(%%k<672!BG9Xj^FuttrHa)AU424Pu~Bz9v$J
zmL&3xs_;lQKf`(tT<d4$(HTuqlH>N%U?0h9##fP4T$S9}(^^vgNPVNXsnk<C<n%|G
zGd=|z$^qZ}*PisA`|y!|6akFeMC@CG8a2CelUyXTy-3v;aH2acMI_7LzX}5DG7<H_
z(=slbqlX3j_w?`@7LM)J<3&TCUlHTO6iXy3wo^=U=~;i4afHL(K8>Sse_eG>Qm|k_
z*1X<ECw~*97K`;m8yM*)(%R8yvMa5C$V+WVq}M^Ar;AYYz_OA~B+Il<NY)QHBe0RK
zR|#1zYY)a~EDc;pra~JiHCm5n5l3S$Ck#@b8V$oQ>G|R&d6%IDEe{4;=+1UX?W|Dq
z&c3YezR*x7AEv&mZMt0_<jFh<ZbX`K2YLw8WAbVj#!E5Pq+$*8#&ZhIW!&Yp=}Kt%
zNwj?CQY%PyKtv*0U2}p>qS7B+R!XuzswdbY{d>NGdKmQ?*}EOwjaj`Yvs*`)UDdeY
zeW(<}cQlPHv=GlTnRC04vC;IXvUl}gKn*u$fCw+T_PI$aB0-zPNhGUoHvhd2Dq^Y?
zTR=5&gw(*%9ThaJyVs6BQH9Fb#gFy?F#W26%N!!>9fzxJ0idhbsGdWs79DvR{c;r3
zlh}5oYWa*IIGM$cP(kc)_l80QtfPn58T)5o#!=3M!0w$RcxZj1rw-qWJ>x)aA6DfG
zRijf>0jENFYM$?m#db~=4o9NK5?binp<P?sCm@g|DOhrNNN>MA%)L{5LsODhRY_>m
zG9BU1UQAUc@9a0vonZl(Hcw`~+VE&(&}A~2anjk&N&y4F%2cSW13PGt#`#(Q^ce>i
z%xmNPUX=k2&S`Fjd{cYO0(^B2@$2&59huHH$(ccLiN3mt{k3A!t3t3X5&wY3&LZck
zA>3Ndv-U&g3kR<=8EvZMc|(^}3Z$@a6Z6LuQ3;%8%<5cZc=(!{@@OG&X@7gyfOT?*
zw_VNpL4Lh5(R#a`d6(Kodc6WTuc}I~`gmxN)3|{RjcEm4GAcbS&DWY6dmZ<qLQ9J^
zNp}Y-J8N3dbP6=qkhfwPx?Sjcn7=G^U)R>7A(MOdn8YThD)5Gg_3B9^eluj__{!4e
z$#s9B;Ogvo=SRoRgF`{M^=6VItpd3K3fYE8P~{+h>VH|k{5uU(o51fy3FG;Ay^$jH
zUEX>gjPUz-l0z_dvH&Y^-I=1Hw@J%h+4Udes|lw;iy)P-f=Iuihqsg>6B})dtEC-P
zE}-*N884(L@hy4LIIN4jA-_bTzQJ*{M7;Cam?uVNT*~mdiu5t6QG?ZWe((-&@Ch6C
z3SL&m)bX!EmpaL$#~g<*bLR7b9sL`7Y4)A7lZW-nl;E^(A6=I#O8wB9T*pgilL$Jh
zIz}?vcN1KK90KEAq>g({25=(ca41S0bv8ahx9={Po^v&-Iamd6=#*0O>p~plP_FG+
zUt?LyddxVKbo&Q%V|AfSUdXd-oP#No`fv!Qyved)S|(~ZUy|{6(Zk0)Mx0Z_>b^_>
zxRpO~L7)w6Cmgpd^#o|-V`|4S>O?JXmBJzf%8=1Y_>fcHk8S$V{S&#7%+BZ(bIKyh
z2L-n*HSF*Wt2t?RWUfEY{197erJ@wjuu|jD^K}73x%V^YYrB1Qs#rIIUV|}hiePHy
z-L+K?ZhLhvOIbo+q{tP0_ucDnJp93JdsR7<PG!@pJ(A`=eZh0+Xun0b@6M3fMQN2$
zHHFXFJTI^t?-VM(65_cE*-Pe?!oShPbT7BfK)RekhGL!MteP{n-jQgda_W2Hh*S^*
z6nxwTi*|*RUsIQA>m=1OQ(Z?vqCb1rTu}%Tr94zSO&$&;o{fJwHx8Smznx+##!z%>
z$GAc!90@Jv)J4N-2uGIgwBeC{zKueGh(J->kuFWQZVDNPPfi>Fy|!&k5eXTG%%Yjw
zy9|&8FPj=2sHR1hLX}9u?cQKY-l3fT7|IH1Ta(ctj6*SS2vZEwT*JeUT^^SEPVLmP
zzVStZs$}5o{wl8eW)YRVm@`R@(;T^sQCV~Q0;~P(A9HGRI7B<~Jz^taRqM+1v>Bez
zY!TB^mRsI+UtdzxV9U<ygp1?%w)4xb$V3W3LvI1nhF;m6=<7P4WF;Z=N$c;spT1HY
ztn-$05Z3NVreN}xX6Cr@K>}6~Hj;`*i6^gli0nmQ73sZ+e$5_+DBT!s#b)ZmFpcg)
zb#b2K!m3d>VTGEOg>zKcYGHuS)$Zon7TA~hiCZZ>**xDR7DD7H@IKK$4}UKu(zm#<
z=)$zcd_q;Zhk1AoaK3J0aZ4o8C)W>;D^S29tSQf1((V)$9&M!9l*v?mT6~^>rw0E-
z_Fpztf3-3yrXIxDqBpZ%X@*-$oO4uO;7q4-koqTed1f;45{A)UsmZY&d^0PVJVI!@
z*z_5ZMQ)7HGsmQJv1`;2%7&=eTgYVMEor#VMKhKC5R-ZMNym;bs66RESvkY|-R_Ll
zeM8}su*RtpyH;1l644s`nm7_vs<Vj0Dar?@>S4$KWojvbW_4bLvfLLak08BltENX!
zp1zz&WQE+nLO<(R|C|VE75q)P^c9`C3O)WrV!V)jDFZV3?E5Ho%5DAn?f#fQF(+`f
zT3KXEa4CzFsACb*b7!mB;e4;@<+Xrct>pUQX?XEK6_b|AfE#nuH6>8Y2|}|liMLy7
zDL~f}G<}Mv-#oSDJaFV{z2xD#FZf>aYtG6osjcRC$-?}M@47)3=es(tvHnf*-p9db
zrUV0*b8G~dg8^*I#Ff25l_Qw!q~Oab&mH%T#RKw=fxO~E9%R{?!je0nXSp85yu-Ht
za7hY+9%yzr@Hoh73;$N#jP&sIl<Z_M_IX&3e(1z(`M4ei&pv1D><S*DTxCl=uWCw;
zjMv8K`4#fa9jzFhsaAN3_;Yv<vl-WcfYhw3xkSO8<U4tuxSG@Nz3mj=4fT4X&U4A1
z63t_05#SN!r-jmJNe6Pi#Q+cASfNR}{4tPVP%<%mBY3NwDZ34lQxpctvo^dc4b{Qb
zb@W*I+}@RuhLqxQSd&N2jP+mTfdY!>k<uk6Qhb9dn0q3%EK&N|53axPRz1vC{I(64
zty4Prre<5aAKJM0R_KSxu#^$^P)E@2I2Y7J3O0voD5D2QQ^DDg(roln7zK_38YWu3
z=#T<zrPOMs_S4|0?W((7l|-GJ;9Ev}Vh|c>mlznw&`F5u$Z8-9E9U4QbL_vps{fmh
zw1RZ!|8Hp}PErN*`2Jmj0DM1LER+k9gLW<yCii(SfKU!V&GeGyzX;3!aKk_rt>a%E
z8z5wNh}4&ze0zDw=JN^{1i5D*Lv0V_`00K;FD_Q;MuW0^PYE18TYvyhPzUHU|8Gry
zzyE)*90FnW3A>EbUXb(Zb9JEnHw|vOY`hxcm4ZC|BTeqtMQ;xu=VhW;aeaM#vO8so
z$RD~r{k|Vp<<_*mD6BpT#^c%lsgI+e6gOA2toabh@6DHrQ*!YMph9x3i_d_^r7nys
zd!S6jgvV7MeQ1tWUsEtBk8@<%hNji)ejpVbmljS7VjfZNZgDkT`C<nY)GcVI<TIzV
z`@vN%U)+|do3~`A8VKs}l$|_~3lMZHZb;}k@3aBk;XpjKS)Qh?>CfKUm^?1$RL|s}
zQ^P$Ovj^@T;2j1$Sb?NQL9wgjrKb02HmQe*GSZhTcluN`)PkFz0sFIKEnI)9O5EOl
zSIK2zC$#Xv8DWQpzT!^Ks)pU;T9r=6zxLu?$LoBEgxuWD_rn4UwyJoKt@uFRFsOLt
zCP!UmLTf#AOI&{ojVKKZt#K=@!$~>lBs7%Forjo9Yyd5fRynFSEDNvncO(P4;I^~r
z{X*ip&B<Z1AxTd>MTs5C>=&zLq@$~!;>XI@tZdiI#lhUGl~(0p^DjsJN$5aK9$Y05
z>beb_Lp9je)5;IT;(m^=7n!ghId{G-9!<AZ-Hy^im_Ms5(?mbIsxC_-x@!$v1<mF{
zgcRG@%|iWa;in~DVr*V)3%=w2ZEqA0ju8ehfJ*B~Zdq|=k1#oQS{l%z=E5|fXYmvS
zrs^*aM}!B<4j`(soOMVIlJ;Y+j#~tYR;sTA>uzodn7<1_#KIYQ{8~Q3S#zl`DKg(|
z>3MR<UO=^P;?07mDzQ_le*7*WlgQOiBt**U<k4k%bK74o6;>&vD)jcIl($n9N<H(P
z;TNTXqG2eA^prBp?3kUP6G`Y+H`w8#AKf~B36pee7c9%ci!SCDj59dCb@gv2!NtXs
zL{g&;BV7O?nUxL~3Twou`IJ)HD;L(cMTOnSHf;3IZMb$QA(aosj)e<$*kLGKfd$&d
z%bKbpD5-8BWW~TqljA(&HtBk3C_F1~p9OEuHUr@$tcclmwD=89axFs);ZZBvvkQ-e
zhzUd`{(Nw3c(~1Zysr^lh@4GhgncQyJC!fm+VCdIdyfqZ-<H85TIru|rB#N19|#DG
ztliZG7KMXaob9;z_gPG9v$(KQLDBC!0<&-qq{jOmizad$F7KdBXt;p|)4OvjXs5<I
zY6<%{jqg+v424TH|58Soe<|YvTG$U|L1g40g;nwuba3i~@1e%X?5yLkDwiu~VZGa_
zAz!`WLHDH4=FqwLTW>{7P~G)sblp`I28fn=@)BdCqTf)(f`^*A#1;ka2z9&(D`_>#
z_i5tH6znM>%21XMI*5UYkcDQ}U1k3tTM&^D7I9K;|4UqClo@Tlf2$MkptHwz{sg$R
z9M;8Oayg8NWv8jaVB>NBR?zbYy<n4Ai!`p?K+kians8d>ZRJ5cODEP#EM0ao#Z>mo
zg_x<-)rKJi2?q+%-MIlB3rfMC@1e7acKvK;JuiqWc|XQ#jcu-y!VpPS$s9W>La2@(
zucgd!oIF?^V(c?p#ffS5%83f|6q@$b&j(9?RF!DMDEu9{m3c+LOXbGP59Ek+#EW8*
z5)0f9XFpI?Xya4>0S%qW`9BUaGBT$=J|Q=21k-<xj3-7Q2y6E*Y_rZ!*JpqKRuYYV
zeHW8_pB{<Im+^FO@u}yyb#b&VEkh!b{3il|o-OqIw3m-91u)2bV-z;XS+zvCLr_9A
zB;S8Y`20NqmE#yRMiqSK#Z{_yeTdS+ZQF38oTR(o|5NS?hWfY&K%6ZwKd-2uD?j_0
zn@4F!FH?}E2hXlBrcUhOmn{dCsky7G|6GbH03f1LGLP9R5Ga%jitZ*qvgzj^0@1)h
zB$(>_{?*G43J}wwGnw)2jflveEAwzRQCdQMtF>f{{x>4P7o3Tcftea_1U=0(Zz$km
z9RNrW)PwuG<<Czy4g_-k4dDOVT8NDN2kF?vgx4zux#TB+z<o>$y+oCIow23m>CtR4
z1_@|y47@$FN-cfYt3vVY-Y&r{NS_!uVQlR2c-;dLK}u5&#`gtO`+x5=_&4FB#(R%!
z_)Zbn2|A$~gDfQU_~ay;$ITxPjDXc*vGQ$?-sfq;#+w=DKkc{W^o){{l93UKzn);2
zXudkLZfyxIb%oOy3eOlw$*K=^WLdC`(m#QGJCB3Yl>fjxTp+Ixlt37#+9f#oGibI-
zV*3xN`SX$eTI>LK;ant-H<sXh?Y1`@&9|n=@O;(v_P`&n<@U6t5c)}ls0NdGw%2G4
zKJDyP7q23o7Fx{vcI)0lvM*@<$Jh3Z5$=Pic8{Ra=#SHwGkzs)w}(;KLe^JTxt_zJ
zdwdppWd}0yn}^p!@j4}63jK)BXx<lEUauw|hd<gnQbS9l@%fP=+1Ov3_x3JZh$V_-
zj@zV`llJkK(wRkjpKR7UrjyRNt|a^J{ii+n#T$WocPTD2?nw@N>zhCKk8~<!Ev6Bo
zX^cEXy&cFu_IBnm)GjSKaH5utewSPW*SoII+a?ZsrHx2<)T=xENYEey5;1jTm71yE
zy0(-oI3pDVd-~3we@x7idwaW@;2}<%y1adtKgs%(=Pyjl@9}i18L2An{Gi5MI6Srq
zx9QgGU;>6Hv%&eILcFRqP%PC>fV{NnYT;3K<~qMONIgTwl40I($%v3t0;=Av*#l^@
zoGQk$qWv*#+&QN<FG2lj+2)^3jc;c*AKU0%;)`Q$KBo2aL=<?4tQkl}!VwK^?`m~g
zpC!DLWgC)0+&V12z3alhNj=pIw|-K}etgoOrxk?N8JxP8B9n)Z#o1fX?qoIKZhsSJ
zSsAC9{9R+3&>+zX97gL1obGw9j?t053%m9oiPdcP$xO!Y{66)wUw?gg`T1|Mrs8L`
zFYok701>GQpRz0Hfz1lp)a0%<MOGzUUENLIv?d3ifSh(AF1FHeOd}Tj6Yu6awsYAV
zMitQqQ@<2S8xu}#y+xXe21h}iyKz)M%Levs=sOT(D9EgOQhQrQT;Ez)SWtvJCFaLX
z*&bzOc&}9WWA!l^vW_&Nt5M0afkjKP?G+H5=Rd7E-VPOic#6ACuDvgpLER)ucEhfE
z1BYoY+X*ZHob)k!a7yl;@vN=5r=(tq66R53WFJpFC8&0j6JX7cOeAct&$*Fbc+N=!
z=XhAmDL1ubfP1Yxf=!C3>86h18V~HhQB#AVJW@ugf5&j6V^v+w?}eo5)s)VbKpA4&
zbUy9h-a2N0U%T=gRgT#(9(3NJkS=`%hs&UR|55Y$+CQurnR-Q2=w@2q@XPO4DpvUQ
zQz}+E5X7L)Y-nc+Ifauq_U9IoRFSPFlX;+0<^jq-yiyS2kq@-Q%&sSwFJ3Qe^Xew}
zz}s~B@4Zj=T@Fs@KKNhQHx8o5evz!c;IBXZxs1kceWISf@YD-)?s|WIar~2sV6Ki8
zbi7?AtARMY?W$p5yC2EE@x7jFR4$4B<5K7eGNg%p*zvUcl=bo&q01o^zWqkf;$%zY
zJ8+<JnEdo_wK?~|JE+8iXsu=%m}cZ@zlkT5iMcT3&DOCdQ4n#$78eteQh@)q5HbK?
zPU-Me$6z+P$;t5HQkcd_DVJm{+WOiD<D!HX5$rXycOb)uLzwq@ueJTj6n9vZXC#&L
z#$^*RVNakXO0@}t+4RqF-$=V>qx}21bEI^1m&5&Jfw_a|;TDL~6x3-rvDizkh3p@V
zB0xpLZ+Q5$NN0d9!nD}Pq@1(_Lfp);nvbU~IsX+({;7tj&2|5*YxC7*lgsn{Rp0pf
zWFxDpZTlm6&E|N+VkaKF?PP;5KIQ6XZFln8N8#&5XG1&%R%F)GA^aFKCakRFOus7m
zn@>@Ax1`8Z?rrMS^{T5;uAWQg3licwOrtt{HowhTr3bhC=PB{?EW6FxM)k?;rf=W@
zf-280n-)7w(mm&`Qqu#LQnjdm;$D&(CWO{)hWb-s4;I5`Z+>3S@x`kX52Vd7E3_%H
z&p3p2#hZsU7chVr)cz<{gN6(+_xoYPqD};m=nxU0&}XM*VqyYXG@y+qFE{RaTr^m9
zkylo3dQ?@sZf$lQb^eU~bh8J7@Wv;Yh8CLe&7;aqA6vx+3XJq1DzgFFQXrsUvGe3?
zx3PQnvD^G}5^!k`=-zN6T(v){+H6j+y(;#(llh5~g3HkkiuK)j9-N@%Q;!b77ZW5`
zG7JA=`Rh!i_k$YNbXg~$lhjb?O<wNL4*%|7gMs{K2f)8c-+!~5>g|yN^n5tB;`M$I
zYXM=Ek#mUFHM|R=F(c>Za*aGge_n@(fw)9|B>C{s3HW4X?xD6BXbPjx1NMWoCD32S
z(&kp;aB0?=KJE97F>-6sCHJ+@-2kcjJR?9RScOJ7Y<)Aj9?|m(Jv=a!BYr>{XdDqn
z4DHC;@De%>kDiWY-L$%n`bYXc==gA0AmT60`DRi}f2HO>p5>m(u$e9IeuM`@!%aVA
zIY-xlH)5nl5Zk*0Q-5*OunC(|u3=R;(XL!Y8V>T8!$6MV91?izV@1m1tdXO7Ln2!M
z`^LE&?>Wk9!<<WDU@zj#BoFp1{WqGtl_>;fIBT-;2NNru3=@Q;jooSr1rnq!jwq6z
zq(F-3w4n6RdX?m{rFjvR9?FCGzim?0ugVUC*{@*Khkt1Pbx0!j+p)Ydm$nLBB5Y0c
zxnTZSY2=qr1@ogTL{2pWE9-bRLf8_`-ROr`RKT_w3Nb<%OCm=Er4^Zs5p$xvZkdJU
zLiZ>NhQr7@sAq-G@+IZJ`n|~|SV>?)DPhY(H3kqxdI=>i;)R6FPDK=S4gZwtcFBc?
zR|Wzig+jy)*y8YD3o6*`*X3f_WzP<1MGa*OX`vITM7&WGeoL{GVS=d?B=2+`8pBkM
z7+62JO~5k(%&R%i$l89ao!Q0r8O?{^<SA$&-{By}nwR;(YAOQ}eei8;3}9;iBA&qQ
zh6aW2US({lc%xr#hK&fWNBPnsf&C@DwAKh?_P-aBt6{^X@(r-lHN>%AlqF{~MLE|;
zVVW_tXIIswX^;AEB10q^Ig!JexXXo#myM*nvHC`zvzeE*$=I&aSG)>16vDy8o&wkd
z&QRmSD18|Yso4()3~IL3ri4gmMzO2zVSvXiMI=i(@)BQ7xQV-=Sva@s@MHbHjP>xC
zSIqC#l0|;Idm<)7E>?)w7+{<d(ly6WwL`%?yh){XMru5xDO@lmYup{6mwgUUi2||7
z@c1y1=D|M0Z6!@OAhQLvZaamJ7Fx|c%SsBB4A&k7eILZC;6{pR1$>>V8yush^4AJ_
zWtwp1u~u@k7#eFeVd%Q7L}Y%2fUnmH$DA!Fd7m&O?<{|-o)#Fq+0?e(mRp$QBh?MJ
z{q8q|c{0v`8I|NX0X>Ag<oxQ5iE2W9sVMWZiC=}bsxE3q>?Jg!w3?oCN%f>4P6y2B
zoD=92Q5tew`IRxKmu`gx9)Jw$VX7-KuRB=#v!;>8*Y3zWI;jDth{<|6H1)l-@J}o0
zYdaw4l^s|0t?qkR{k1V5+?}p<ZHkFlz&U;a+oF@t=d^>0h-uXlLSGCmIehj+83YTT
z2m62;6-k>zu8^O5btJX~Mb-unwg>z|FP{^7_8nWaWL0!)agDB{`?0Ik3P+%&7Y2jG
ziDUgb3ehkR@1H@;G?ZgjFx_wX<Ouqk8TC`UXZ@Z*xKRkJR)ezT366wAff}<2Sm9#7
zpf0B^RYNuHx0mUizf3mNlm;#_Cc0<b4f)P9w!JCAz4BLJ=Q109_ZXorw?`4-;~)sK
zIX@Y98=~TqgD%r>#$M}BQF186XO#+-H7E~tk`&O7q(UZOCCb`3a+=aXgEQYnPjq^h
zNu0mdHfC2nXeiy&C9xn9CN9_{eWFE9YFp}aZ^Rc!D=(QdooH@DhZVPJlZ}JtmGo96
zy0VdTCV3Jh!nCq^c^pcI8RJ?<X&%1D#ylE$Y?i;hD}0^K<89lZZA#3n4A|<nGv{5?
z&Tdu+?Os_PSeJqbbCNQ!q4rxtn~qvXLk-E`V6XjlMrwJXIq`O1X?slrG@bf8)_RHc
zeJ`~9O`yvC_KeJE$z&h>r-<m83*F(P1AF4A2!}0gkxZSR98Wh3FHawjL6q2)<GWDr
z%alNBIs9L8GfeXBujTf?tY09tK}G*~Spq7t61w0r9R4C(=L)aBqBA$!`y~TcLz<MC
z&WZKcbNt8g$CWcrp<xmSS7HJC-<2|cQZkK2qxUU-LpSqH`T-LLRoqLfN>7eFDHI+5
zAMpKjoaW(^G*I_tz;CJQv{pCK7_u;SdCLH8;mjGt<T6J1HgV4^Z0y_C&y)P1G{@Ji
zo4A?LvB|Vl1s>h(s)361fBCqkQd1kXfJPZIziG#7dxkUz46kf3IFf`j!}x3E3;SoX
zG8IiTW}A5niAQCsfC>d_PSUx5@cXMi*YzibY*qeQvwP;7Q_^u&c?pCpO$I+^w<j$q
z-t3YSCjCzSAIUZNfLl0-a*Z<s{1Na38F&ZYy`ij^P-7n7j)?MW=0B9qP@cUb^`0em
z2iZ-5JGg&<<hsg7j_NH+O#OVVkdbs{NtxeANrR1$<aFgsiNB&NWIkkxa+b)tqeszH
zr-}0n5?tkAHEz^8bQ+0}-g8To<|-90zZgduNsNMi(gO<TYM%x`n@~+)izW541Tny$
z3dLq5<VvKj6m@0}V+#6*yOq1VvriLt-M$h^NX7+vlU{?*sH6w}k*fuPL4F&=yoApn
zTU%jQRsUNDur3V|CSX@f8!w32zh?$~;T2tdSS0j`qn|=<OdybX8P~WfgkO~E_nxyy
zdv3LDQn4*ZJScugI`nT2t)>ek7x*?ehXD`9;ol*NP*uL9>e(^%d!e9E(-?F9`Xd$5
zKwUq*xY55YE93`lHbY5nCPg~U8t2Liz46<XBW$Tg_6I`m+V+(WGs4Nwo^qgDAX4b;
zjLf_4vV;`~I}k}jKXJyd?-@ML&YkBgwI=9sKZWMDmAv^>=l9+gA~k6Jf`Z47aB7=X
zO;_Jlp1T1jnAcLYPPitRbQbkR#ZZgjzUPVjy!5owqGYa6#?ja_pNuuAeEQv>Za}uT
zQJbTBN!k(toB!?(vLeHlMJ*0$(KSUnqu1>;+=86?U&Ng&WW3lR{H0vZ{UADzjHqH>
z|DH;Ye*~{WsfJ?j$AKb(MfiqPBc7CGXrS;o%IJn*3Zo#B{&?x`|JkS0cLlFqs)&{H
zd9g9bRz1Ic#iBPot*zGDvrmEwaGwu1R~*s#q-U~ntE;C0c>X;?#pqqkchTIUDc5#O
zJ`%`rTD|R7PZU>qX?tkd<WoskHmzK{ZHca+yGo9mxbcNqe$tmMkJfHe-}{+O{lZnD
zbz5ftIBuFV_nOq%CtuavrXJ9l?z^)qt5+;4pxb%hH?{9O4yQi#Js$dBCq!xO9?6D9
z^JdFl+j(}D>w)PT{9`w;Z%NQ=+{%(|^qKJuurzP6*c<2C=(rv@1GnUA*3a6Was!1o
zQ$^%Lj^x(p#mRJV=&J)K!=|5}`snGT9nKGg&$p!WI~?(vEIQ*H=iARy-ISQCy>*Q)
zy!{GnH%$=u^SNpl)1(R!`P`i|l5Pgtl+{U2-1jH*m5?+?rAPmMwN+1R4z9d%Xq&^7
zOUlQl9lI33S;?J#ZuW}j-DYl@Ut$UcYB%TpV|pmd!?C*Y<_h19OpQyw7fqTQCs)p}
z8|Xqc-Q%ozRh=0I30Jd@u5G#gSgrkZR{6{yf8^Fb*rFX;Ug(f-p1D@f{r!QSMJH1y
z)TJC0J9p%|)Qe9Qli#nqWVx_*-=z;Zn=QX*de&q*R7`xZVD0*qcV8E_184j6f1UXq
z1B~bC{F^7l2TniZ$=<XyS@y*7YtJq|+TeH@SR}93*!JdWTlZT#`K4=xUOwv${(V$R
z8C-VTbb!k4>|z_;Xx3T}u^sH(eqr(#r~Qr3^%h$beed`={Uv`uYnha4f<?SIj4U>=
zO`E<n_8D0G&DqAKH5t6BEZVbTN*u#Lg?8%8o4Pyx)UZM)-XoMYS%H=fD@=9(4L%`_
u1tHBhKxQ(q4;g_sui(-KFY3iU{^w_K-&h`YD}@idJH^x0&t;ucLK6UklE)|j


From 45043537d8318cce73f4d77a7595b3a1d0829487 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 30 Jan 2022 03:20:59 +0000
Subject: [PATCH 1009/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 80ceef9..b76dd2e 100644
--- a/README.md
+++ b/README.md
@@ -7,7 +7,7 @@ A `user.js` is a configuration file that can control hundreds of Firefox setting
 
 The `arkenfox user.js` is a **template** which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).
 
-Everyone, experts included, should at least read the [implementation](https://github.com/arkenfox/user.js/wiki/1.3-Implementation) wiki page, as it contains important information regarding a few `user.js` settings.
+Everyone, experts included, should at least read the [wiki](https://github.com/arkenfox/user.js/wiki), as it contains important information regarding a few `user.js` settings.
 
 Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) if your [threat model](https://www.torproject.org/about/torusers.html.en) calls for it, or for accessing hidden services.
 

From 0d9de9174ad011d94645660e2780cf1b1f79d14d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 30 Jan 2022 03:23:06 +0000
Subject: [PATCH 1010/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index b76dd2e..38f7293 100644
--- a/README.md
+++ b/README.md
@@ -1,5 +1,5 @@
 ### 🟪  user.js
-A `user.js` is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the [overview](https://github.com/arkenfox/user.js/wiki/1.1-Overview) wiki page.
+A `user.js` is a configuration file that can control Firefox settings - for a more technical breakdown and explanation, you can read more in the [wiki](https://github.com/arkenfox/user.js/wiki/2.1-User.js)
 
 ### 🟩  the arkenfox user.js
 

From 4c74f1bffb4242ec613168307566d593c6fb4401 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 30 Jan 2022 08:53:08 +0000
Subject: [PATCH 1011/1147] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 38f7293..2f33ad9 100644
--- a/README.md
+++ b/README.md
@@ -9,7 +9,7 @@ The `arkenfox user.js` is a **template** which aims to provide as much privacy a
 
 Everyone, experts included, should at least read the [wiki](https://github.com/arkenfox/user.js/wiki), as it contains important information regarding a few `user.js` settings.
 
-Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) if your [threat model](https://www.torproject.org/about/torusers.html.en) calls for it, or for accessing hidden services.
+Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) if your [threat model](https://2019.www.torproject.org/about/torusers.html) calls for it, or for accessing hidden services.
 
 Also be aware that the `arkenfox user.js` is made specifically for desktop Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.
 

From 89bee0e3612be471d427cd81540bd54db1955c9d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 31 Jan 2022 03:08:22 +1300
Subject: [PATCH 1012/1147] Add files via upload

---
 wikipiki/rfpCanvas.png | Bin 0 -> 5559 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)
 create mode 100644 wikipiki/rfpCanvas.png

diff --git a/wikipiki/rfpCanvas.png b/wikipiki/rfpCanvas.png
new file mode 100644
index 0000000000000000000000000000000000000000..97488cc218750d38ec88771429a35f1e323370dd
GIT binary patch
literal 5559
zcma);RZyHwn1w$A!6CQ=hG2o<!QDML4DLF(1b24}K?fK#xI=K)2_7Io@W4O_5a36L
z1Y7>C+TE+&+KWD?>-5{*)o=C16R)YRh==_W8vp=2WhFUn06+<On!m+Fe^RnXLhzGe
zxholZ0ss#2zXJux&8GkWYz+rlSxrrQH!n9&dpCDlWm#ET_xEmg4$ig!;I|6Xfq-=m
z$i$JGmoh4GVHqlJ+N7AY+A@h@Bxy{nbXWxM;^>N3NVNtD<>k?+z7)lwrlf==k!rEy
zCSZTZ*rh8;i7bsvn7G{zEOlDyLH?Y6XkC`ruf2e^%wh~+;$|uFYVn8RR>{y1{)mK+
zjBW37N`+%Hx&s85EjDzX_Y5e&O^BEn8~p%AAAsVwfP)DPsO1g3rH*}kaVP^dK?#dO
z8SqLIQo#%(0i*&_WXb_41(YyY4wDX0ga%klT3aCiO%A|<IrQfO5C*$}2BHAQ8FZv5
zMQH#nv2C0jU@r>P&gvz|0|sva5<8U<Vc<Il@K#yhP6=pi2L@&caGC*3T;Q!%Tr>-S
z76@2;VPNnBqM!hY!nwZK8CyNUKI>Dbpv_{PjKcEa#+V!)82b90G;d~<$=OH*ET38C
zN^uVPLn(Q}`Ck0Em;!*JG}5QnUflc5;MdR02&A;(n{yoYqd(GHSs@<wW^3G~0ASlI
zWbT2TtL0^wD0-O7L&@tCG<!3gB5!1(UGod6R-ou$RsX{M-`>a<f9PCU+1uUy{%%CZ
z*m6QY_yICxKA?Z^{3k^04te#XZ-+6Q$243K?dHeO)TL?}_3THiD693Ksfu^)IFEOr
z1^N+Xt4;$}5`-3!M~Yl-(gjZ$eZ0&^meJSqk2X77?6;^ATl_$yqXbG|8b_t6HR`nr
zGl7BEzzz}s&b!?PzrDdk4YQBjp7nh^mAqFhdJTlxDSz|;05ds8PVhvFBped}<ch*s
z8>Oi(2PxPG(5VNXuMgtfSqMbQFpdn#5XfNLgi*h@V5yCec@s0;2x7J1`X&Y98_=?k
zNq5KR9MbK;7k7X0*AlZ}@J&xR7Mk=IOkzvA)i@NZ1OtW?Omb-S4c(v;8c`x6?RXrC
z7QIRuzY@200+?1;33M+0{+V#Bi9%PJ=of$|;x48~kvk*2SxfvIZmVo(rQpjbg%X^v
zHeTGhsbocYU*CUzDV`)yy#KYv{>5slge?5+z%L36-Vx`woMXc>O+xHg>DH4?^tHG(
zV=o)^YEir6udHXAe9?%)<p;0?(0pZREor2c3{(x&zbjSJQZw=qu3`ydp+;#9G1I44
zs(fbZBK$K#Va3B8YoNr=utbzf%ta6wCp#j@NE9#2!`%7dnR3%7@I2AH!n~_C!vT9$
z9-q=nhV=1O8>eOr;S6?KwlC4Uu-)NZ-d(C)x^rV}n3a^rryHG}H`)`9?<n^O_W1VD
zZF6{}bxU)#H!6$4g#4*SGIhmm+6`K<mBf7Bxx&+tWXdXKbtRb#FYU?gkq!;Nyt)WC
zGHKMazv|CV9w`3G{)Kw!i;EXS8VQesyrImaz@UIo`cgFHsFqVMBvQh`Zw0xJa`vGw
zpl-SbtZl48q-hh_neQ^0GO1X(z*W`d)tl8gx)-{W;M6KJo#1)}U0xkT71p<`8r^D`
z=8+DS4x~!7GPW90=?0ek6k>QEk8U`uI;<i4Nvo*I9MLmIi(^gM;>S+sgjW;e9nL?(
z)HJ;k<ipyXa}VlH6tAu-7MA6G$E)9>eUV`&iGj%RxXJfY$J&2Wk$n-8ut{>tvcp1E
z&ZpYRZENCGot2$sP@`0%Rik*+D^P!20W0s7?>4**$Crk`V>V${grv?qhwbaE=xkJA
zSCFZRi(J)nRy&nZ6?e<|_PbV`<P`Log%zl}Rc!kA?*F9@=DG*pyZo)VQp7btZ^30m
zU&EcD5F6$9a1#S@!Pm~TWKD;qWXmiwEwi_y(mLnFN*5K96<#DcjF})95iVmcW2H>!
zOms{tYKLkkx!P)-<t*i*s-mj!>8a_G=_M$Co;de1&wk#1-g4enyM>XT5qn!@TZgT3
z^R7|3;YnMMYqXKDVVQxhk!g!U9jxy4Qg>Z<1z|;}db)Z|!4hP+@vLpUt*V`}aqm0&
zT78>KTd*a>iX75DT0eY}-kToW6`Xu8j)51uf?oqN0)=>feorEzC$gD4lYb%^JbIaR
zzy&dwC7Auri)bUBWEpXQ>EtaaLdYSVo{<-EiSa5ClbqQSoOx7Z8((^N-+5hmm~IEm
zU%~QP@`jEp*BVX)P8?2R*9)ik3Rwyac|E@lf06y6wKpe;Q<(YIX{$CwLslak(z?&U
zWzChQU$@-YUglekv^*u3xR!Wdh>$>t32yRi8k$cD4zz!1pVSz3D=?4Vk_}~ew0R78
zoC7MtUZX%z<HM!Hji24#1O(Cbr$~yd*<LrV97`t^bxM;;r$*F8><!k@*?;-{p^gr@
zpEHv-<A5Kn8S-oCD~9Dy%f#UjT;}N5X#E(;6!$oTmvh|N{JwMRvYuOVf90~|HuE6d
z8o~`6@Az3IsyQ9SRt3BGx+KRq?F^?D4PXY!&MMTxoUHW%uFid1cgGj8JFp!bL?C$%
z*B4WF|KgdU%jgQSDo!GHkt`|IICY_nf20XmE6I{xpA-AOPQmsc0u4dvx#k4s;=aq8
zu+pfXE3v8teEgl(!|%^H%3H?1*BQlJ^`S=<Pjw?tq<}2fht`EhT%?yf@?+Wu51DE@
zwe&W~A>^l>&t$D_bo0ZgYhpVWO(w>;Q_F|i=Y|~EZ8GJ*z(#MDSuvU+w)%Gc)A19+
zSv3W0)5lXS6Kfv?^G^#OkBNqewm-I&#i;0WfDC^2);bC|i+T93VIxSNv&HD4*NSx{
zw6VG@YSbL-XV-`HG6kqPg_{jdL=3i~I33~WV(&!<AFVGRn`#(v8E&;&{*8fANsz`T
z)RU}{XOo70f3xnlM-}Tf(GOkE_*_*p(rGhmH*a_FbCaXM7(c5z`)4-3E8fcLXS^-F
z&&OBS@@rh#({I+gBim#<OZ&w-dTcAkXQo9Z!JojF;J;vjllhHS%jFx_xf80uo@>6}
zi)+R`$a{(LzBOGGUA0BKMcZ5D+ZLo`eSG!7P1dc8X`Q-@$1xmr9`zoB0l#gz^V=e5
zUL35Qy2N&*h!20&_W(Qf<-ilb(@oAF+hK5*^WQx{Vr?O5@I+R9k^*bDF&19=fFK|)
zN15F7T!lQH+*@NS<1URUiMgf2&44?_wO23l`NRzU-(7&m9aaw_7SbW-vq`W_Sa1mE
zpLL71lD5Eo>zOUb7jCCr1YX<o@{fu8qCKKBCg&Yq=gn(-#QGijxeX%bE{9%+Vh`yH
z8u0G??%euL6Q|CTfZo<XJLCaXf#A%>Wv~Ak+2hh;fw1^S??r$cauj*BMYa+0p80-e
zvU|ms`J}E#qsRPG>R5V3b|ZFC()eNh`{{b9<A86`#oW3g5<NO{_95*m^@Z&7RA}mC
z3|`Dpfsll-@Q&pB`-8g**;$)erULSZl84E9ax$)vo5iE$nYo;~;_UP6^nRD1virk<
zBg%%gv7s@VzHvWZZnI0h+v7psbzjhF>DCL4-5}b~H;?vznyz%dR@|mjrl&umq2^rN
zS@UwNJ@F>3wUV|P00g`SfUrma`1APW2LRyx761+{06-)M0La}wnvW_xVd##soHW>P
z^*2mQ)p(f_9$L28tgC~THXi1xNm|369BVoM^9RR8l%1L0e7u;P5f--m#fNz%X=krD
zJ*0;-L=o9aN!Xq54`e@$YVTZGu47GCTSa`vs?4_qE94%a@%e@Qs%F{9`n_$oMt=L!
z**c;nNRmZ+WN-|5JM*XT5eXwc|8}--<`+kc8S&4ECOsVinl!;S`IE@qJeMXwBMf;G
z=_vF6Jr<%U@YklfT<GTleYp)eK5FGjWQ0fTsz&u2{E=StedB+v^AH|i_YtG#Dt-CS
zp8n%h`zs0A?mdSw&W#C&yY$q3TXa&&SF^n%2TQjZ*;!|&p%Sx+R8)6Wd=sKbc!$>!
zMgQaPAaz7y=xrU^RhaNa-KlkQPs}Xe)IMJSkI^#0&TmU9scvX}CeyyDL1_zq>|a@=
zNw+o5TdoV4qk6W^`K+@;h6M}nGc?|wDU73TI);i@cog6K@&;>azuY_a7R+`9S>Lo=
z<hw?jXCg1kUWsd*D!3ws28nM^vAM1u5^wu%#aeD?${BR;Y;V}8xk1|(T^A!+n^O+d
zayRlf-aWjXlEoUJ#{)yC)aaPIyNkI@p-76*11kLT@*zsX+vKUEaIO?{>VBaR>3_xJ
zZs%t7Eb*U2#DC|6{}uil4gF6s=2JOTYUk#;#~uCCt|yBS3i-GA$)3*oclpU^Q_Q2x
z%Q8I&1stt-RSQ6nJ!OwOkiHO{U^yt-zdNSJ%!vJPt36X|44s@t`lME<!MuDfLxKqQ
zi~W0xctOfm!bNqmD7k0hf-Wk<XHk^}jG+)Qa@6OO`t*uE<QpeUDbLna*r@C3-uatG
zvA_u~R(p<*c$^MlkGUL1@WRusZ}3rfkWH!Q+1;-lQ>ldC%RCqz0))zhO>BH5U(X&}
z5%3_y9rC92Hug~A$8DI#X7?!7edv^b(AIZTFO1%pbjCuYh@i!Diw7&_^ob<~lHjoC
z87-w#qu;PjJSsz(GC3T(dh(CHJGHQ?76gJwGcpF&j$He0WF?0O`Dw)Ba5_cz&t#m3
zf(Ix0^mdW!Y?0!stj5(}ow%<qXB%A{N>3e+His6|O#6s-$X-IGwjt`2w!d51{Fvyg
zD@8@lgcP8OP>0Tw66^uN4C<{|Eft}M3O>50Z}lSepTe#S;nY_*UF-byEFN=vwY5%Y
z6&nWoNf!v_zcy_FMpZ2XJC88Lvd`T!h3e`*Xtq;irs(?UfjKr&*ZL;lKRofW+vg_i
zDUzi+TqB;bW0Xg+uD-nLfxznwOPwYt%kK;WsZPS;rkZ?&W@AE+A9bkD5l=%$%vdMr
zS{s5clNwl~$mY;COxTzsO=;`gC_>pICtUrU?>8hNASXJDv*l2!!o|@6s@KJou1QQ?
z+|wU>rQiG6fL>Ki%9Q4{0r%z2l}paLibCD*g>1yc8^O+^_$k}JtU8EFHcIAi9mLlN
z|9<VjR2!Bm@*26;qFX~&<EblTQIrwhdA{^r#cA`g*r2j#ZI1UW$u*)=$*ACzk18m|
zg!<9)`etFLwf)OTp|Lb_wb#VUKC8@txOG}DgP^M|Iro)!9YDslu~?eK(VtI*lnNQD
zoGz4Uqe&=+7an)12APZ12lQHJw<T?ivP_bxoSwRnXzvI88NdvlnGe?2i*~xYiOB)C
z2^lrbs3|gANB-#9oKoo5Bh&j_^;%0&T-9p_TBjfRlgf&<){`s7RwK*_Us8)+RTx}c
zHJl1RBlPxfQ@CDRRR+y2qFg`sBnYk*GUw(dPqoD@A(ow5m=N|AZU@2qs6zx`<U+z5
z>GsE;xPJMK+n0}C6Vk*MR+c6AnRQfUo_K=}OC*kyxXUuj_*N^Qy)<*N(s9~QjkYxQ
zCx30jKjW#8W@O8I484=%xZ<POUHRp?yK{qF`1j&zj(~&7cbCaO+esmAVhu3WI{vvn
zCpJj<RcnW|A9Rerf5|9v)sF3gd@)F#`Lj2a3~9pdPkb!R6+9^54LUt?wj_raLY$br
z?`W6zW;!^(y7Twpi$KAu;{xAPI{Xhj3oWYp;T<9^-9kFTb*<-j&LUh#OX*OfP2FWm
zwfwo&PWidRm4duQpJK-p=({S9K!>DMU1Q4t7*Bh)t1U^Y?8bPtUi<qymPu!@N%?8l
zs^BDKSyT+}ws&*R=h-AMJUlyv(+y_BTa*vM9WYa-v@?n@Gy3SsfJ3ipiVNroSQ$Ix
z*34}C-34R0PZKKXQ8rNmCv~nK)vMU-?p$dtxc)Q0BG_0^1q`Hw*GjK67agtVGzk_Y
z73V}B@D1|gG}BN0lQ$GNj@ILGrfzxj-`7wfdT~9gd!89A22AvQqT0|)`a7!Nu{>Rq
z5d^X}gp5OS#6%~@kH~3d28G4og|l6%E{mfExT9;i3v!Xuj<$J5tt+Np-M!ylf*W<G
znJv5pxF03Kxeo2E5gMlL?X9Q!u5$LDby0Cf>Fyk!rR$xrzx_$E?6XXvlTwVE?%yz+
zqE2%B!<IKSk3M!8VQ#V64)g)<@b81Y&jJsQ<|jN~SqQqKg7JO}x*4h1Pp4Ld!cI1K
zZ8mYu%4aDbJ8`7EW5kSk3nZzNH}=$(h$|8(nLr`x7)LD+)bd*h<ntWnfgY~4hX*t9
zZCwFt8#87fs@8Ijtn&2Zj_G)HCVfSr^eXu#r*+@vrk)Rd4>70n8%I0pm5qWY_zm#F
zt*-UO{4uNASllTC`~0<SCL>lP*-7Re#TvWQ5&Ni311CA-&*y!MEmI0pQ&oP#MEwr)
z9?>T#H9oR~pIXVZ@l~2x${M;Wv6Fe1BxRv>{9N$RoA!WbCW%{9-&Nwg%R)<f@avi#
z9Cy4F&#5gMsCYf#z3qs6OP;c%<?QBy5xaD{+3riuQo%99;!F{hsH%;>8I%%=>M4&O
z+^%YIuNjT3S8(pxRsL%Cl@>J1y@qX5(}^V$%~O~1bR`l_P$U1WVDg*(&69Uz^Vom{
zN%?!8j1(Nl#MGRvu?dSj$o4L#A9t<)$sKKkX8EbixR&}HmzoCLjScnk1e52J6LC8=
zLcif{6kX*#T;2H{-gt6}t)FglQmkt&c0b~i?>jSBHvPhX;}vT$=N|Pk5$a+aqXr@7
zk4H_pDPAP=ykGdoQM{FmSCJSaX(jYq$-M@wmEz@ww}z;D!mEiDJbV;HC+01*M9nw#
z5nUy@p|Z@GU5130pNU`4Ga+69QsqM{G|lasfWW$inz(Epm=P~3I2ME|c5aJ@1lQx9
z{AFIn92cVsPI3M_F$%RlhH{JKv>g6yKilS{td0d?grOtHN{L}X26cTtaB8JVYscu4
z$?R?MdmH@Z(?978bi0TSPQ=-&9uM`2T?gFlv(JwIlwXHaWm7E2-4Ke^sIX=-55-qC
zA#ykd9Oofb*vH!qmGcDekjx_%2Vx^up{7p|wNoM|qxs3JN7Z_7Ciw?rO)B`Zsat3<
zr<o8u3?dAc_Nyg?n@^>LDjG8)ul1y<L*I2DXg&OWV!r<bzo=)lbu|Ak{`)^^(Puvt
a6<F#%&SYTX4}2nHKv`a0u3p9>;y(aXA*!wb

literal 0
HcmV?d00001


From 917e3fe1aad0be2ae93787e4cbaeb33112a6f8c1 Mon Sep 17 00:00:00 2001
From: xfzv <78810647+xfzv@users.noreply.github.com>
Date: Sun, 6 Feb 2022 12:23:20 +0000
Subject: [PATCH 1013/1147] Update wiki link for updater options (#1364)

---
 updater.bat | 4 ++--
 updater.sh  | 4 ++--
 2 files changed, 4 insertions(+), 4 deletions(-)

diff --git a/updater.bat b/updater.bat
index badd778..eef06f0 100644
--- a/updater.bat
+++ b/updater.bat
@@ -3,8 +3,8 @@ TITLE arkenfox user.js updater
 
 REM ## arkenfox user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.15
-REM ## instructions: https://github.com/arkenfox/user.js/wiki/3.3-Updater-Scripts
+REM ## version: 4.16
+REM ## instructions: https://github.com/arkenfox/user.js/wiki/5.1-Updater-[Options]#-windows
 
 SET v=4.15
 
diff --git a/updater.sh b/updater.sh
index a1f7070..8295720 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## arkenfox user.js updater for macOS and Linux
 
-## version: 3.2
+## version: 3.3
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac
 
@@ -62,7 +62,7 @@ show_banner() {
                 ####                                                                    ####
                 ############################################################################"
   echo -e "${NC}\n"
-  echo -e "Documentation for this script is available here: ${CYAN}https://github.com/arkenfox/user.js/wiki/3.3-Updater-Scripts${NC}\n"
+  echo -e "Documentation for this script is available here: ${CYAN}https://github.com/arkenfox/user.js/wiki/5.1-Updater-[Options]#-maclinux${NC}\n"
 }
 
 #########################

From 562127be87ff1115f1d5c7bebd5890efd801b064 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 6 Feb 2022 15:27:50 +0000
Subject: [PATCH 1014/1147] Update troubleshooting-help.md

---
 .../ISSUE_TEMPLATE/troubleshooting-help.md    | 35 ++++++++++---------
 1 file changed, 18 insertions(+), 17 deletions(-)

diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
index 955c367..5e8c1f6 100644
--- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -7,23 +7,24 @@ assignees: ''
 
 ---
 
-Before you proceed...
-  - Issues will be closed as invalid if you do not [troubleshoot](https://github.com/arkenfox/user.js/wiki/1.4-Troubleshooting), including
-     - confirming the problem is caused by the `user.js`
-     - searching the `[Setup` tags in the `user.js`
-  - Search the GitHub repository. The information you need is most likely here already.
-  - Note: We do not support forks
+<!--
 
-See also:
-  - Override Recipes [issue 1080](https://github.com/arkenfox/user.js/issues/1080)
-  - Extension breakage due to prefs [issue 391](https://github.com/arkenfox/user.js/issues/391)
-  - Prefs vs Recommended Extensions: Co-Existance+Enhancement | Conflicts [issue 350](https://github.com/arkenfox/user.js/issues/350)
+Issues will be closed as invalid if you do not troubleshoot first, or if you ignore the steps in the template.
 
-If you still need help, help us help you by providing relevant information:
-  - browser version
-  - Steps to Reproduce (STR)
-  - actual result
-  - expected result
-  - anything else you deem worth mentioning
+We do not support forks.
+
+-->
+
+https://github.com/arkenfox/user.js/wiki/5.2-Troubleshooting
+- [ ] _I have read the troubleshooting guide, done the checks and confirmed this is caused by arkenfox:_
+
+Information
+  - Browser version & OS:
+  - Steps to Reproduce (STR):
+  - Expected result:
+  - Actual result:
+  - Console errors and warnings:
+  - Anything else you deem worth mentioning:
+
+---
 
-Clear all of this when you're ready to type.

From d61da93aad93904ba3deaf20ead1f5fcde1369cd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 6 Feb 2022 15:30:25 +0000
Subject: [PATCH 1015/1147] Update troubleshooting-help.md

---
 .github/ISSUE_TEMPLATE/troubleshooting-help.md | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
index 5e8c1f6..a27d59e 100644
--- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -15,10 +15,10 @@ We do not support forks.
 
 -->
 
-https://github.com/arkenfox/user.js/wiki/5.2-Troubleshooting
-- [ ] _I have read the troubleshooting guide, done the checks and confirmed this is caused by arkenfox:_
+🟥 https://github.com/arkenfox/user.js/wiki/5.2-Troubleshooting
+- [ ] I have read the troubleshooting guide, done the checks and confirmed this is caused by arkenfox
 
-Information
+🟪 INFO
   - Browser version & OS:
   - Steps to Reproduce (STR):
   - Expected result:
@@ -27,4 +27,3 @@ Information
   - Anything else you deem worth mentioning:
 
 ---
-

From 58e2618b9ddb436867f1701733a07ab286eb1b3f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 9 Feb 2022 20:00:43 +0000
Subject: [PATCH 1016/1147] dom.securecontext.whitelist_onions

replaced by dom.securecontext.allowlist_onions - https://bugzilla.mozilla.org/1744006
---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 9d2ec12..af6193f 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 16-January-2022
+  Last updated: 9-February-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -34,6 +34,7 @@
     /* DEPRECATED */
     /* FF92+ */
     'browser.urlbar.suggest.quicksuggest', // 95
+    'dom.securecontext.whitelist_onions', // 97
     'layout.css.font-visibility.level', // 94
     'security.ssl3.rsa_des_ede3_sha', // 93
     /* FF79-91 */

From a98b73c64e2e0b505efb6b23d34e6c5d90abe2c8 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 14 Feb 2022 00:15:00 +1300
Subject: [PATCH 1017/1147] v97 (#1346)

---
 user.js | 64 ++++++++++++++++++++++++++++++---------------------------
 1 file changed, 34 insertions(+), 30 deletions(-)

diff --git a/user.js b/user.js
index e80a95c..9098913 100644
--- a/user.js
+++ b/user.js
@@ -1,25 +1,24 @@
 /******
-* name: arkenfox user.js
-* date: 21 January 2022
-* version 96
-* url: https://github.com/arkenfox/user.js
+*    name: arkenfox user.js
+*    date: 12 February 2022
+* version: 97
+*     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
 * README:
 
   1. Consider using Tor Browser if it meets your needs or fits your threat model
        * https://2019.www.torproject.org/about/torusers.html
-  2. Required reading: Overview, Backing Up, Implementing, and Maintenance entries
+  2. Read the entire wiki
        * https://github.com/arkenfox/user.js/wiki
   3. If you skipped step 2, return to step 2
-  4. Make changes
+  4. Make changes in a user-overrides.js
        * There are often trade-offs and conflicts between security vs privacy vs anti-tracking
          and these need to be balanced against functionality & convenience & breakage
        * Some site breakage and unintended consequences will happen. Everyone's experience will differ
          e.g. some user data is erased on exit (section 2800), change this to suit your needs
        * While not 100% definitive, search for "[SETUP" tags
          e.g. third party images/videos not loading on some sites? check 1601
-       * Take the wiki link in step 2 and read the Troubleshooting entry
   5. Some tag info
        [SETUP-SECURITY] it's one item, read it
             [SETUP-WEB] can cause some websites to break
@@ -159,7 +158,7 @@ user_pref("datareporting.policy.dataSubmissionEnabled", false);
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send technical... data ***/
 user_pref("datareporting.healthreport.uploadEnabled", false);
 /* 0332: disable telemetry
- * The "unified" pref affects the behaviour of the "enabled" pref
+ * The "unified" pref affects the behavior of the "enabled" pref
  * - If "unified" is false then "enabled" controls the telemetry module
  * - If "unified" is true then "enabled" only controls whether to record extended data
  * [NOTE] "toolkit.telemetry.enabled" is now LOCKED to reflect prerelease (true) or release builds (false) [2]
@@ -235,16 +234,16 @@ user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
  * To verify the safety of certain executable files, Firefox may submit some information about the
  * file, including the name, origin, size and a cryptographic hash of the contents, to the Google
  * Safe Browsing service which helps Firefox determine whether or not the file should be blocked
- * [SETUP-SECURITY] If you do not understand this, or you want this protection, then override it ***/
+ * [SETUP-SECURITY] If you do not understand this, or you want this protection, then override this ***/
 user_pref("browser.safebrowsing.downloads.remote.enabled", false);
-user_pref("browser.safebrowsing.downloads.remote.url", "");
+   // user_pref("browser.safebrowsing.downloads.remote.url", ""); // Defense-in-depth
 /* 0404: disable SB checks for unwanted software
  * [SETTING] Privacy & Security>Security>... "Warn you about unwanted and uncommon software" ***/
    // user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
    // user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
 /* 0405: disable "ignore this warning" on SB warnings [FF45+]
  * If clicked, it bypasses the block for that session. This is a means for admins to enforce SB
- * [TEST] see github wiki APPENDIX A: Test Sites: Section 5
+ * [TEST] see https://github.com/arkenfox/user.js/wiki/Appendix-A-Test-Sites#-mozilla
  * [1] https://bugzilla.mozilla.org/1226490 ***/
    // user_pref("browser.safebrowsing.allowOverride", false);
 
@@ -263,7 +262,9 @@ user_pref("network.predictor.enable-prefetch", false); // [FF48+] [DEFAULT: fals
 /* 0604: disable link-mouseover opening connection to linked server
  * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests ***/
 user_pref("network.http.speculative-parallel-limit", 0);
-/* 0605: enforce no "Hyperlink Auditing" (click tracking)
+/* 0605: disable mousedown speculative connections on bookmarks and history [FF98+] ***/
+user_pref("browser.places.speculativeConnect.enabled", false);
+/* 0610: enforce no "Hyperlink Auditing" (click tracking)
  * [1] https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ***/
    // user_pref("browser.send_pings", false); // [DEFAULT: false]
 
@@ -306,7 +307,7 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
  * [WARNING] If false, this will break the fallback for some security features
  * [SETUP-CHROME] If you use a proxy and you understand the security impact
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1732792,1733994,1733481 ***/
-   // user_pref("network.proxy.allow_bypass", false); // [HIDDEN PREF]
+   // user_pref("network.proxy.allow_bypass", false); // [HIDDEN PREF FF95-96]
 /* 0710: disable DNS-over-HTTPS (DoH) rollout [FF60+]
  * 0=off by default, 2=TRR (Trusted Recursive Resolver) first, 3=TRR only, 5=explicitly off
  * see "doh-rollout.home-region": USA Feb 2020, Canada July 2021 [3]
@@ -323,8 +324,7 @@ user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
  * Examples: "secretplace,com", "secretplace/com", "secretplace com", "secret place.com"
  * [NOTE] This does not affect explicit user action such as using search buttons in the
  * dropdown, or using keyword search shortcuts you configure in options (e.g. "d" for DuckDuckGo)
- * [SETUP-CHROME] If you don't, or rarely, type URLs, or you use a default search
- * engine that respects privacy, then you probably don't need this ***/
+ * [SETUP-CHROME] Override this if you trust and use a privacy respecting search engine ***/
 user_pref("keyword.enabled", false);
 /* 0802: disable location bar domain guessing
  * domain guessing intercepts DNS "hostname not found errors" and resends a
@@ -338,7 +338,7 @@ user_pref("browser.fixup.alternate.enabled", false);
 user_pref("browser.urlbar.trimURLs", false);
 /* 0804: disable live search suggestions
  * [NOTE] Both must be true for the location bar to work
- * [SETUP-CHROME] Change these if you trust and use a privacy respecting search engine
+ * [SETUP-CHROME] Override these if you trust and use a privacy respecting search engine
  * [SETTING] Search>Provide search suggestions | Show search suggestions in address bar results ***/
 user_pref("browser.search.suggest.enabled", false);
 user_pref("browser.urlbar.suggest.searches", false);
@@ -452,11 +452,11 @@ user_pref("browser.shell.shortcutFavicons", false);
 user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
 /** SSL (Secure Sockets Layer) / TLS (Transport Layer Security) ***/
 /* 1201: require safe negotiation
- * Blocks connections (SSL_ERROR_UNSAFE_NEGOTIATION) to servers that don't support RFC 5746 [2]
- * as they're potentially vulnerable to a MiTM attack [3]. A server without RFC 5746 can be
- * safe from the attack if it disables renegotiations but the problem is that the browser can't
- * know that. Setting this pref to true is the only way for the browser to ensure there will be
- * no unsafe renegotiations on the channel between the browser and the server.
+ * Blocks connections to servers that don't support RFC 5746 [2] as they're potentially vulnerable to a
+ * MiTM attack [3]. A server without RFC 5746 can be safe from the attack if it disables renegotiations
+ * but the problem is that the browser can't know that. Setting this pref to true is the only way for the
+ * browser to ensure there will be no unsafe renegotiations on the channel between the browser and the server
+ * [SETUP-WEB] SSL_ERROR_UNSAFE_NEGOTIATION: is it worth overriding this for that one site?
  * [STATS] SSL Labs (July 2021) reports over 99% of top sites have secure renegotiation [4]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
  * [2] https://datatracker.ietf.org/doc/html/rfc5746
@@ -580,7 +580,7 @@ user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
 /* 1601: control when to send a cross-origin referer
  * 0=always (default), 1=only if base domains match, 2=only if hosts match
  * [SETUP-WEB] Breakage: older modems/routers and some sites e.g banks, vimeo, icloud, instagram
- * If "2" is too strict, then override to "0" and use Smart Referer (Strict mode + add exceptions) ***/
+ * If "2" is too strict, then override to "0" and use Smart Referer extension (Strict mode + add exceptions) ***/
 user_pref("network.http.referer.XOriginPolicy", 2);
 /* 1602: control the amount of cross-origin information to send [FF52+]
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
@@ -598,7 +598,7 @@ user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
  * [SETTING] General>Tabs>Enable Container Tabs ***/
 user_pref("privacy.userContext.enabled", true);
 user_pref("privacy.userContext.ui.enabled", true);
-/* 1702: set behaviour on "+ Tab" button to display container menu on left click [FF74+]
+/* 1702: set behavior on "+ Tab" button to display container menu on left click [FF74+]
  * [NOTE] The menu is always shown on long press and right click
  * [SETTING] General>Tabs>Enable Container Tabs>Settings>Select a container for each new tab ***/
    // user_pref("privacy.userContext.newTabContainerOnLeftClick.enabled", true);
@@ -766,8 +766,10 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
 user_pref("browser.contentblocking.category", "strict");
 /* 2702: disable ETP web compat features [FF93+]
  * [SETUP-HARDEN] Includes skip lists, heuristics (SmartBlock) and automatic grants
+ * Opener Heuristics are granted for 30 days and Redirect Heuristics for 15 minutes, see [3]
  * [1] https://blog.mozilla.org/security/2021/07/13/smartblock-v2/
- * [2] https://hg.mozilla.org/mozilla-central/rev/e5483fd469ab#l4.12 ***/
+ * [2] https://hg.mozilla.org/mozilla-central/rev/e5483fd469ab#l4.12
+ * [3] https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning#storage_access_heuristics ***/
    // user_pref("privacy.antitracking.enableWebcompat", false);
 /* 2710: enable state partitioning of service workers [FF96+] ***/
 user_pref("privacy.partition.serviceWorkers", true);
@@ -781,7 +783,6 @@ user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!"
  * sharedWorkers and serviceWorkers. serviceWorkers require an "Allow" permission
  * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow
- *   If using FPI the syntax must be https://example.com/^firstPartyDomain=example.com
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
 user_pref("network.cookie.lifetimePolicy", 2);
 /* 2802: delete cache on exit [FF96+]
@@ -952,7 +953,7 @@ user_pref("browser.link.open_newwindow", 3); // [DEFAULT: 3]
  * [1] https://searchfox.org/mozilla-central/source/dom/tests/browser/browser_test_new_window_from_content.js ***/
 user_pref("browser.link.open_newwindow.restriction", 0);
 /* 4520: disable WebGL (Web Graphics Library)
- * [SETUP-WEB] If you need it then enable it. RFP still randomizes canvas for naive scripts ***/
+ * [SETUP-WEB] If you need it then override it. RFP still randomizes canvas for naive scripts ***/
 user_pref("webgl.disabled", true);
 
 /*** [SECTION 5000]: OPTIONAL OPSEC
@@ -1029,8 +1030,8 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
    // user_pref("browser.download.folderList", 2);
 
 /*** [SECTION 5500]: OPTIONAL HARDENING
-   Not recommended. Keep in mind that these can cause breakage and performance
-   issues, are mostly fingerpintable, and the threat model is practically zero
+   Not recommended. Overriding these can cause breakage and performance issues,
+   they are mostly fingerprintable, and the threat model is practically nonexistent
 ***/
 user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
 /* 5501: disable MathML (Mathematical Markup Language) [FF51+]
@@ -1125,7 +1126,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("geo.enabled", false);
    // user_pref("full-screen-api.enabled", false);
    // user_pref("browser.cache.offline.enable", false);
-   // user_pref("dom.vr.enabled", false);
+   // user_pref("dom.vr.enabled", false); // [DEFAULT: false FF97+]
 /* 7002: set default permissions
  * Location, Camera, Microphone, Notifications [FF58+] Virtual Reality [FF73+]
  * 0=always ask (default), 1=allow, 2=block
@@ -1159,7 +1160,6 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
 /* 7006: onions
  * [WHY] Firefox doesn't support hidden services. Use Tor Browser ***/
-   // user_pref("dom.securecontext.whitelist_onions", true); // 1382359
    // user_pref("dom.securecontext.allowlist_onions", true); // [FF97+] 1382359/1744006
    // user_pref("network.http.referer.hideOnionSource", true); // 1305144
 /* 7007: referers
@@ -1344,6 +1344,10 @@ user_pref("browser.urlbar.suggest.quicksuggest", false);
    // [1] https://support.mozilla.org/kb/enable-background-updates-firefox-windows
    // [-] https://bugzilla.mozilla.org/1738983
 user_pref("app.update.background.scheduling.enabled", false);
+// FF97
+// 7006: onions - replaced by new 7006 "allowlist"
+   // [-] https://bugzilla.mozilla.org/1744006
+   // user_pref("dom.securecontext.whitelist_onions", true); // 1382359
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 41468d0d0bf287589e9ab2c012aa0eded1388610 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 13 Feb 2022 13:11:26 +0000
Subject: [PATCH 1018/1147] Update troubleshooting-help.md

---
 .github/ISSUE_TEMPLATE/troubleshooting-help.md | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
index a27d59e..ea7f92f 100644
--- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -11,12 +11,14 @@ assignees: ''
 
 Issues will be closed as invalid if you do not troubleshoot first, or if you ignore the steps in the template.
 
-We do not support forks.
+We do not support forks or no-longer supported releases.
 
 -->
 
+
 🟥 https://github.com/arkenfox/user.js/wiki/5.2-Troubleshooting
 - [ ] I have read the troubleshooting guide, done the checks and confirmed this is caused by arkenfox
+   - _unchecked issues ~~may~~ will closed as invalid_
 
 🟪 INFO
   - Browser version & OS:

From 4bd17611df133b8ab3077df495ab7197c1844eea Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 13 Feb 2022 13:11:55 +0000
Subject: [PATCH 1019/1147] Update troubleshooting-help.md

---
 .github/ISSUE_TEMPLATE/troubleshooting-help.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
index ea7f92f..ee0a8c7 100644
--- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -18,7 +18,7 @@ We do not support forks or no-longer supported releases.
 
 🟥 https://github.com/arkenfox/user.js/wiki/5.2-Troubleshooting
 - [ ] I have read the troubleshooting guide, done the checks and confirmed this is caused by arkenfox
-   - _unchecked issues ~~may~~ will closed as invalid_
+   - _unchecked issues ~~may~~ will be closed as invalid_
 
 🟪 INFO
   - Browser version & OS:

From ba052105de3c4be2e34cf103f08b2f28c6d5b496 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 14 Feb 2022 05:38:13 +1300
Subject: [PATCH 1020/1147] Add files via upload

---
 wikipiki/rfpCanvasException.png | Bin 0 -> 7765 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)
 create mode 100644 wikipiki/rfpCanvasException.png

diff --git a/wikipiki/rfpCanvasException.png b/wikipiki/rfpCanvasException.png
new file mode 100644
index 0000000000000000000000000000000000000000..6889f80924c3cff60b656dd56ec70f266ebd04f1
GIT binary patch
literal 7765
zcmXw8WmFwakR1ZSEx1b{xVyW%yA#|Y1a}X?gF6J5Ai-T9!QCEi4<`ioecztlAJbja
zr@QA=*VL`5+c9b?vS`Re$N&JK$;(M;002xNR2D#lhqf)BIXIvllB=A)2LPa8|M$QE
zSvdp%fUIgKDXFGr>+;3L!`8)>LS9mm!qwfy+Ro7m0K8XoHEpyskMM-=Hm)TUql14a
zx@h1cQfNrT2IC~rFi;|4DnwHjuHdToeUO%hBOWP;hK-L8{*J58g!&D68DWpIC_bz>
z`rGK!wqLQsV&~n##B0-%2&DQdw{Z%g7ZEj0j#HgG7_~xz?88<VXmEIYk3}p5nc5Y=
zL~Q&_>G47Z1KbA+2{C@`Md$`#yys95fnMe8UN(}bH;iM6Oe2`!aG2gNNqmZk!8m}J
zZ@fe)ASMG7oSQ+T2^7EqW@DBXyMP)qU`88sFb4$Z-e>y30ERy(abXIQ019lYXeq!}
z5U8Hg`6dnMu>m;Nii7;XGBdy?uWKy_)U^P;lb9$C03s^DrXC$Z55V~WW+PNo-avRJ
zfFtuySLl+l78Ak%J*mtFp*CuM=@3IiW;X;~T^2IBNqKxm93Jy`=2>Da{XUt593fm7
zTUX-%P>_TR)%NPedlJ2Na*`*$8QqlmxCj32qlLxp>;6=gs~7-me+is<Wnyh43KoP9
zc6u%PbPi{0f>Pjl7i-;sA=U&G9IfhJx&C)H(uIj_D=YhZd&>%g5{BlZx&f~?{ieOT
zFOCm^LeF<MTirX<AsogbvT*lX{o~h4B_vbHNZ}T12MMyzEhul#q;nq!<t^Iu7;tvg
zvE1UNvc6w&lzfblNTwh9H2d~>XOrm(R%DYKsIwP=@k?SZH@1YmRiwq#`_j8}2LS&%
zT>9qe5MhID!?vfq-Y!I6WD7n4!PfH0ZUA5+Ma`l$+9(P_1OTam5QaK&;_E&Fre1iG
zzV~Z=D9>g*;S$t?{SufG$e)8r+|B5#LnY`UC+bKU%vk5eNV$5|Z6i}$(OLSnThWDG
zF&@nk^ZMvILy+LaM-Z{iDOaOmEWYVc#UtWpM%+{O$-!a8Qd9hi#!>&Mn8Yo|uJKKa
zLR*gXpRoHo{wO1v_9Vd(fFtxdvQw7*M@WOZ@H}dhWLr5eQMgPI%Jk<i>{$tT1=-W?
zzlnsu^Atj+t86h=6GS9IY`upB2%LkCY%IeA67_scNGX<M^&hKItA>f{bgE%HVs0#_
z>b>BwLZo|<c;LJwD9p*k<@A*FRF>t+DM+ZfKCB|~BEg2M_tSn%DOdbW)BfRMkide2
zJxWiGiE0rm0h<-mFIsYtml`WZl7qG_@tu7APpw(3S(#a94XPuiifk@9BC3=>tDhYj
z5cq#EQ811~?B(ta>~Zc9?@|6UM9#GkbNhL(xkINhYOg@JkGapa4{w#hA+BAVrLkUK
zsP%z6!9b#>uvz1mdQ>?!muD9LL>QjDVo6O=>Ku_RzU`geufs3xAJ$XJRMMw)XUC3Y
z57Q4}uf0&wB5}h&(Kd91*#rm#HiTXTzcQ3c3Fl%7L0W9Q>?awJOpHtyZ9Rr&27lb7
zQRGyGRGL&`23D<#%F@b>N)+uY?J=!{3KPwMS{ZFl&D{#5`LrtS%3QS*O=3-(3c>QI
zN}F;QEzzHW`Y$o?`U6S>s**p|3+hdGJBKMyED0OEnJ695sv<o@xCd$KCszEwGIV6T
zkaolhS5_4AOL8i3>NaXz{je5A*v)Xe&-tQ)1feTSzY6@efpbB>Lr+}FrPRi5W#mwq
zmY$|pC0C_hC417vQ+rmHTiPYvq5l+uE)G(lHKLWZNtk?}3(;KBTrWc|!&4R(xT$5S
zbSNP%?2z*6aV|U0$m=!<&Qo$J+wkdvJdy;kzG%HTJ(k_bqUymnqEf?yQ6~w6hPd5a
zgh*LI;7fH$;{h?r67y8^^zHDZwi%(~1(`S*jPG{CM!VFzPQy;a#We6Vlr)OU$I9nf
z8p>^@^reDIf=Zx?@rj~|#Z2yOVfG~sNH!#UDSNZU%)r}#skywl)k?l$&!ANQyt&gk
z!hm1DL{HnmxKXAix8~DgM@>iBhq5-66qTyHMVo=T%jQ4L6)l8y`^)g)+GeNb0CO7)
ze4Cb`+JW<wu9SfGfVdZ71hl9X^eR#V(m;>j?l=NE0vlPAIp?AQL)U3XtTuX6m{ZG~
zyUo~R^n-S}n%Q%*HuyGe9${C}u`!CFV=U<+EZM}v>myxz3SVyAjJJJfZ*sF6v-{7=
z!N1OV&h5^l*7C=>^6B&RIX$KaMkKe?_h&>=@>AIyHmd_wB~?RgnjloHmaIv-HA{6Z
zC0><x<`?)Pw<7NOyCS<nyc--F`ljQ&y)7dxW2yr#d8QGYl0j5&pWl4nW`MHbPcSyH
zF(Kk1hVP#4ef=qW;zb3(R<{i+XX4)r+Qf0i6GCf3_xoxnZAVTMYbfs^8IwtqcIXjm
zfrpFJ2<8Xou>*mqv=LDex{;#suF-l#GwkWyUNdWw9-C5+QfX2f**5H|{J)qLxEVw$
zS?q;YdE2?#MTc3e^~V?Va`ogL6-oG67;1T(9lJN5&#t0&a(7U6{qQqbM~q#43Mc!o
zBg*h9Sg@D`(!`XaRrr4V6~|;K$NT>2AGX)0cx0b`(tewdtTQ|_(aVxX3}h<*<QSBF
zlTVX6xqYaII7^uJ+rnup5<8X9l-9Ea^6;|0QaEu43v{uEB_}1iNmNoQr!?Cf+Z<Sb
z9jmsAXm}lRj%{HjOGWtO(3n{LUY{AcS)%k%%Ybf)0inUhO4qt)B4(67ttyXk;%vNe
z6r9MLbCLgchSiU?o!nd!si@0Ls&~*;ZO`8z<mLlL-o<^-7^wqaE!6t0nZap6wdzba
zy*99m##h-P#H4RDw66)q;RHn+c|RiHWNqopSXGZzf3wN_F*27}1UKeeEe;qz9XDv1
zZq0k2ILc+TCv)w`?~1Cyw$D@6v(`rk8_aoz=xLSd2kGd}Xe+C~(KdB{pWWO_gIUuj
z=)fIe&5~`!JwmOWR%L%CCj>>cerjE7J!<is&#pI_FWo!OoD=(X-g2ETfDJqEUPS(M
zgSBC_l^3iRte)hb8t+7FV=9mC)1I7+YgC-v&OorUurCNy=*>%Q^9!W2!de;$i;O3-
z=pgd$*W3#)W;7l&?YNxb9V%BTpS`0yq|G}rG=bHx-~Fn$5$4FhlG>26+Dl~p%aX~~
z%z84kFl<*H7nxZ+-tc{v1(Rdsa0%)AC|qg%v0FU~olCL#H}yR?H8&uT<zdYXT-59b
zv7Fqr$8fo5$NaKAEBzJ=5$qJ4H2T;2<zEAMA6vIoH|v*xsnhY7W1-iSIaN?cPDfU4
zn~_7?xo=mKpY`1laUSpF`gNDjCEnZOLLR^Hde@b&%iYl3%_iP@pgZl$<XFdw7wvgX
zr)sC^wb+^XisX9Kf~eu^+VaI(kbSRL!PU%~>>YeW*wky%O#+7G`-IGdu}HMYlRQ2V
ze*PU%_m`vRGRdjWQ#5(_uSKt8wfK0ff%gk1OOrDhGll8@(o=ez{7YVrdrt^|frtBt
z$-4h|bF!OU>pY$Hd98VoUKDR)sP6ew1kt_OKGff6PM1BU5T>NO!NF!+JzH`zgQ58*
zg{7Q^G648~0)XH!0C;$V_D2BV$p!$&X3*R;0|4+{l1+zX0028!UP@fcd-XIoNDW7~
z8PszhhNcjFM-!Sgf}Amg{9P2uS(tJ=%FO#U+QCAGqM^IfR~$3iR*cIr+0zDr-2pSv
zG_{6_TVF~?(HIUPyj*)mk0^Y$4_P8nBZW@S5~idtk?rM`p!6v7$eD=XN61yhF~h+|
zHzd#F;*7Iw>dfxc-^5@vm;y00gH5T3653OMR59Vizgw1~mZ@K`iWYY~!I0evy@MUa
z`2Zbu0Bt^vO&!|yNTTOcAX*ghy`G;VU=JUSedgd35U`m2IrAs_=*Cyb{~l8yH(uwX
zIHu*&rRcd2mw8TiO3GaMExX+;bu)(hE1b9xeI&`K$`9MknHe{uTWRP=Rd1rDc6aMp
zLn#pd@xh5>?%g9nMfYc_!Ic%liVC|{pDR4)jn0Vq`QPeiQ|s%b_BWz4)2?V}XiEh;
zZ`kMO=UiauGJ*q))<_90EiMg>ul++q@5%k^P*hYVm)khel9JSyTU=Nb6fyMIkMafY
zaEXYU?)OrZfZpM_BtEZmM!5IycW%$XROgmQ8lwK!Gx_X(w~q3VxBK0M`>TA>{!~WK
z-#dt*-p9*mH=mrmx?PgKY*cDj6>3#(?d*j1_xt1E;T2R>#dg6iH+(`jY#!WQtTDXb
z3NvnX-R{&zecXw~;u93KJX>9$+27yCJv=_{FIApN-t+eMMqJDl@<G<Eo!{R3<1XK@
zSgjxXNioghY*jlH^1G>N#-19n|0~sN7{b*DLc)lmqIaLI&#g$ilWJ>OK3fwNz0A*Z
z{Ycl{nl8kmrg0{9+k}A$k&}yVp%e9Q#i6Gctg+av)^BwE_xU05<NZR_(zHDlqJ_Ue
zV4G3=$Ov7vafk0T-78de=o(qOBg+4_N>SyI&H3i$?k-_tQzrdTW7y)zG$o2%cp(iN
zb+<cqTVIkX<WBBStf^j!%SxPMrM7?zTq@Q*H8eFD!D}0HTL=d?7p49M2iSc<_;i5y
zMc;((8)k#m&t_+tOlMpME8+sOdX^oJjx{82b9B}H7lXY#H_0N2N$~CKifYo!zVHau
zo%r@ZjU8yk=+#rG(~~o;wlE@Ei$%=x5r29$(TlK&<Skclmekv_*nA`>Hy1R)d)($>
z8e&cWhtR|Ejm#VSNB2^qiLZ9&cvfo!)u3!FXGz!(VXJ5D_t8%4@R_EUDMxBuFdR*p
zSH{{%nML=1h+S&O)F5e|7SAfo#$%1>lB;g_V}5w1?;Hbm(0kV&JeDSGe}M~)B(Z@i
z(S_m#BAuZe{@G#&Q`0tiL&MLvrz_sKD>llbr>CdG>!EH}sjxN<N+d9*D|!VrH-_zH
z<lAcs-@I{a`TXv=;KJ;k&?Yy$!hT&SF<#4lmj_`0_$)cHVq(F2SFrEi$#k}L`1=4v
zM71z%j(f*na%p6JeBJ{Eh1*1FtQd8bT^k!4boBh+`}?Q#AmlhW(FFx!jOz;LVH#~1
z3i~t!E)DAvUSbuAup%>R40n_olcv_TJxK1@{DPRr!)<`1*LAwbqbmx?&l&>5xqX7d
z#j}CU63gFDc;{RG+*T3qTW-OjR(2Au;swX<PmgR&d#p9acN7=G&lJm^vOiVBJ8B5E
zGA&nq-rwk&gWsG#8rv7Fdh@#k%Uhm}n)NBx`)6cRLj;=Ft$*B{Z2hW?VqrwpbL&-d
z@gQ7dC$M$lAj9)@1$%&&o=Iw%%)vtt9R+(jqFNh8>JkkBf%_%2i}qBPo$5cYRPKd8
zZ-kN^MiR+ZL)3iuHX09?G$Ly_7%K9>EiR4fo%7K_Kigh9JKyDqzTskF4U%KTegEFy
z7xtjn=^e6=(>=3I{H7wm5`PBX1li={ZV$&1Q^oXQ=ClG<M-_Atl;oAsMu<*F+P{O^
z$d5=5S}Odl0E#FHB%S!}ML%qT*`DA<W)k8sLAA8*O-!FZ_{gmGJ_MnK(#{>O`s2?R
zn3Uk)F&R*5eh7A82WtLy%rZ5F#KG*F522Q$GYzcgfB(Jf(Uc-<Smim;`AtWn`AMUP
zvns0cPe#kFRJAp3vK5OO5KVs~rL$sPjytq`1_{Nk^xdPX6>ZtfzkvJ<eAd31o`?Am
z*x~APhehq@X(2n#LYKvnNNy5`7>kqCCIX+ysAk5ll<vhEQXRv(Kvmty)t^`b3npWi
zEtn$_PqEzy!UPW;=tyKqZ5za{X<V|Rv`pK=O-&amjrBOMf*%&o@L}mcwYYY+eBd+k
z#qE{2yb;=QDDP2@#%nvOumwp-F%%bSHSan)Gbn)3ObKFMIOujDe{YuXBXP75;NT>R
z`MHZkAmf=~v$K-_f!(3Hf$vCVcBiy-5U>2Dx1V2eXD61pcpn|pvt#%y*p0`_jNM^s
zey6*Ncuj^5<a)vk>h)@5G>VgG(nW(b<;#3+w^PwMX9V4FmbP3USRJpE*c8=D)qsS?
zAvvbm0~Nd+qOhJ>seBXb-@p5i*VBm!b<i7rA2m=7|HZk1wkD-M7(AeP!77%W&g%_p
z_U4IrS1!&0>ND9Ojrv$UDDW0?Ya&mmcBU6IcPS)rJ2ql|(-yvd`JP}^vQ=_gU&62a
zEwZSYt@_&syN`We3)@JAhN#x8W&VEU(NIM_7t74lOxxI03U~fdJVTwzwd_lF#63SL
zZ)`l2*?87E)mCNaGLL>GKmz#?WM%dK^>GPRN?Ljs3eGbg#YL!73;CjNsmkaD%h}u$
z9<Qni=wC97%<raWVD8%|;eMAT<)U<^w_@}GwdqL0=JlA}A_iP(=o$z4Ap*)I@PY5u
z!xZ9o?VUK%Phys<`F`Wp{Pur0M1@XdoTI-HNN_NfkC4!OF-`q-a^E;wbUi5D)hB~P
zCRc|m^YAN@a*f#ivlYOCw)u7AKdp8>x(3~gTgX!;)<0ZB@QBbhhp|4lC>l+*BJ9vh
zKN}kx(=m-lX;fgv)vm9vLnED<UWUtMbx+Oo+L};xJ1q)r(M3X$kug92((T-cimJ4)
zFH!;9fxrZ7FYe#Az=<!KOPx$m^w07cNoo_L@d#0BMr%qgT6VIHt2x-ajWg*6K2$Re
zu%CiBCeDTK|Lq9&8_p1!P$cr=yH=`xA?sq>+~kVm+(fZ;YUlb0emM9#jgydoXEmVY
zDR-{gjTF;ukWv;wU1PIz#1{yRjIYHG%P`L$V{L%Aa&vPFb<zv!)nmuUyLbeH)zy*j
zAD9n>i;8e8r4)JLqL{d1ibB<6ISmGexVH|$Gj5ySSY94WbsxNL$F);pCmK)z+V*SR
zPv#NSFW(9iGx>u&KiLcKB)Ys>v5`D#e$>y2(-_#z<EME-8d(9P{ki+Eo_IxHIMr;{
z#G0mU2({$Rb#jVbW>)bcsns9yqSwu>VUg=hok~v<9q}_jeHubm0|Cy)_CXe^C^6MG
z8&O!%w8_Wp4R)GbqhpMh7eTrd?Cf~~Mw%??RJ^?8U%!4$HZ5dJ^S=K}sq@POHZtk9
zITjkrx6ao)7Imfk(3WtaP+yFo!R2o?T~zG`^Fv`*&p|zHBS_ry_W-vW`H$fXy4^Fu
zyM8xAz|_{QH6W4WW>f8l)<mhz>NjMySRbr7`pA#{#GYC9hy5s++bt-_gleT#ku1<^
z><806f)bulzjKe%-&xXN6)&?b=c1rS&eH0jD@`<@BXMpONqGfr<QC-+9~@McY!uu~
zUC5fPFmFxxSf%_mM1olybpI~gV;_G3Fj@1kPc&+??}eYI&>wCjXNLp(K-}tZFaSC}
z2N?}tgq@en8nBG1q^QUXz1&x)H1vkN8aFg$K<3O?cx~i$tIwawlq?u()l)xT79+ld
z@Nn;{67SVj=i;IrYIJfuRTAelf|%Z3-8$Q(dreu3i(~!vc?|NPPJ~A5iR7Q)^$xGg
zOAz_D?j7^%jRnqsrg)=Nca%Q|u8R&Bvt5NI$nErFXoVA~E~a>b=miTu1_GzCGtG`M
zvIeUxJZM@_4_FA?2oywy2IN!g`YrsWT*2jbZfB_g<2H>bZiiRDP^J$9GHZk>vbXo6
zG(_3zX}FQAduUMj1Zf5hYR29>;nqh7aS@Dt5QTBwe6f@=K#nT7QHswedBgU4h9<G4
z(>*5C|C@~i!6v`R(*vN{H|okIxX)Pvb$lQS17u|ioh2Dq2_cL+Iy@qLi&rR{gJJ7T
zHlO_||M&8;4~4Zem|nAVYsoaIBvld<D^tja!`IL6@~mZZ=lS7^i=z4PJ~!tTJHd}E
z1cvh*LAGp8ylifJLDzI>XDIe^(a^<wlEiCyWu~7JvEusrdaExCfiLixuT&{B)B`d(
zQy^p&nR8s9|47{0J`oZYwi_=01Vwo&4i2pI^Sx^%i*i0bzO4sHKIrkrWoroE^e0UH
zQ1s^EbAHN17F!sX(<+zH-5M$zDl<VS0SiYaD(ZmQB+A~i)9j@x7nx`vs^3!uFmi=G
z=vv>B|BYUAWIu7Yh4K)}!%&P|s<IIXOFu#D5sX6wBMquR8CGwlru^^BZuOm>2n~&F
z3xOP2hR)HW1(uFv6U@AhzORwRZ?>ySYJ)D86=avurd10?ZEb{C2bs=BB|kf-nwRE`
z2g<j$%rI(h+lQ77CG*N4LQtg@3}7vjwhvuSc(8FU4cT|_MSxz=5`Jo#O6Cs-E~4it
z!8bu$KLMGqdVc<P-7;Ra&}xMT=knw|1|X-PAhSA&lk%_2Pa7&9NIm;HuD8FRD_gOA
z<nn`x5yD<jVQ-Jb?8Mz2z0Om@DJwf$c`{#Qf^1@90?!jV6XlqU1ZO0#cqWG^Exu1Y
z#L=+J1S9SMCp7GxwAJO!nDG5I20HTRC$3xefGlCaZ2KL#PIo=4r648g{WWGXEmy74
z`p`k5pX(EcsH*M8I5c1s&g5X7W><-BwqB*`gRRe-B%sGyp_MQV13(RMb>O9@T@qq4
zRZvp$9(AC1ZZ5WF>4fmJ4WzKD1HpJ*nC=w>v9+@^w_3Bcm(caXh$j(_H@2&&_Alg#
z#editnb|!&J~w|u`&pkq6zi|PSzxule_(BRNQ(80y!c`+%qYm@xL@~0NnTlU=#RUO
zGqm~nvlMBxvT}B-B;B9sai7fpacMr!^2z@y&a=EiII8xX3=j(l!&_PLsm|+p%H?fu
z_meu?ZZwr6^D>IFG}$Z|%66$v;fgvq`Q-8ITWUQc^TKD9hl7bVn%eJFvI)Bryo=C+
zV52+k@hYxk+DH#<t>BrwOP(HY`pYIUu@&u!gA;Y~Kn!m~Ri3kA=>!cwzcB?iCzpiD
z{S7GwT(HEcS8wqNsKduM%}z_h>wIny)v0DPDtB{>q45OjKG%~>s-Q3bJs@{2K8lQ)
zWM*c*Kgb@7j#d0!XHzavt5=UTG?d>6G49zIIUb@N8yG-=zVB}Jk!)Pz%=Mg_g0@cg
zf*XQJ8wrBWA%FiOs{0L|LQ+5rW475*QTVU-ATOnyf@zYhF-E%QjtErtjtQroQMOyF
zYTgS&$F+!q{#BloU0RT+GieWWJ^_4rZ7qje;99KQ<)ZH)nNa9?AJzTCgQ7c+gcAXL
zC^`xNmbu&dATlvZI^Tz;E8CS9qS1!$gW!?q#fI>!r`tp;4Z6)246=|J&U=h>JLq;h
z3vsGJyT8iXnq!Z+ar}OcaQ?E)2=T#mpw$U{@hy%)73n}oVV1V(cEis?aRC1ZVm->U
zOCUtD;h~Kskl9mw?sB<aLesBbE#+_L9T!^=NJ6(rm}F&D$9VJZXyUB(xe@F9g0YOJ
zC+_1T!QTFUgVVtz_s{fy|J>hu<_RvL1O~q1K~QBu-6HUe{U!r3*dW)PLH17KY_{@h
z=-9<DjoFmxE!3k|BzP%bco`OpcV8tPwW=Wt1J8}i_m?ZIG*jj2ZsUdq22i2^mXdNi
z?AV;8r&7VPNK;O(wR}D758jib35fUnz-qBM(@+)a6NCg^CV$!HInAzp!z07Zk7m<9
zJUMqt2iVFH5JZNYpvpSNy@@gzKXQQM871wrlarzMeg3euoFwL`5pkaQtUOx-q9uKv
zkyJ)Dd=`H0p%ELYsZBJH`J7s)FMl_|NNCG5BY?kx^b9Vd{Hf$O9=d(l&Yx8p9`*iv
zM1E<&c6<5<C|<Ih%0rdv#6y+&1p>Rc3}2)(TR3s$V^I3tpOPzW48@|IX1oQid^GA@
z?iD2S&u`nG;LXw_{Pamy`Yi3E;c4Tg%l}zryoNSUMDjJi13O8(N;0WaI6&#d`^uUz
z?QO|ot!qgcn`bzadkzV|+u4lwl@?1spFv&!@)L7t8R|>0qI-Ohqb%ct4?^ANqp|Ce
z9JCtREXGihHv;S9`HDJN*hoS{)?L#^8q}Mc&AR-c`@$3x3VTMj3|9|s9}d{3id(L`
zy?dvyjSbVk_intWLAyew*9@ZimfMQa^;37EUsOgO9*@eLpVz>OC}yZ)*&SHkmqVZU
z0@~jRiwcXGk~15H5+DZzbR9k%!Nijaej^WTm4)SiFPJcn8QH(O1aJEGZS<jw-d#@z
zV}?uRxp~8<1U?Wd*KA5wITgWB{x72?WJk9k2_>20p}f`qlU&5FL4Y88v&x>&;S7|w
O1LUPuq-rJ1LjMP~Z54L_

literal 0
HcmV?d00001


From 382b9181dfb9d4d6ae010af526e7410383137fd5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 20 Feb 2022 19:00:32 +1300
Subject: [PATCH 1021/1147] Add files via upload

---
 wikipiki/uboCustom.png | Bin 0 -> 12439 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)
 create mode 100644 wikipiki/uboCustom.png

diff --git a/wikipiki/uboCustom.png b/wikipiki/uboCustom.png
new file mode 100644
index 0000000000000000000000000000000000000000..2b8c443aa48bb8c40ea41cc80e259d4a554a5e62
GIT binary patch
literal 12439
zcmbt)cT`hP*KQOAR1g&b=_(dFN>h51-g^fH>Agcj6#)SO=`~d8CDMBrq9CCYAXF&<
zVn9j=5E5?qz4u%9UGM$wU3abfN6tApGqca^J+t>b`<aQ>(om$l$#4?@08lC`z0m;x
zu7ZirwdAD4YvdDB6XNZLyOOaN0C0=?@^=N0mGb}qxT)zNC#R)l@8<31W$)(xP+3my
zp}VJ>t%I`-0N_6l*0s~q-KLemE*;6LehN)db<?3Cf2boH8+t$S8Rw%LcT_$-Dww0u
z?!7B7e~s}+{wI?7_|VTZ+T0W|H)qM#9~H)j7k!Eu!mWaeoMt+(n<IoqxFoXb5L`b>
z)<aH_rX-*(6iQJp%W`)m9Qu85b)8o_?B)}9z#a1X_m8~rY*zp$!Q$dvk9)|v09X7c
zZ;=Cf)U$hDFhyNZ?Z{@DT?zeorN=w*wJLe&eSkDDUbX}vt#Bn2obgN-kbe#EcG%i#
z4WPvXc>6qLa}p2=KFI`K0hp#dqPdcv2zW?s^XU!1UJOt*Y7iq2FnR&FZ>#!U1Tf13
zc%f`)s|5Jg4CsN~xm5=srvSXr{uIFhxCR2e{lUiO5BQh~xUX<vD8A2Ca|g*uv{YuD
zc<U1p`7l#*9uG1@LtYkkm@*yLec^Xk-(^Yj_620p^M?sitsMRW0P+)Qh}s_F{b9Fj
zU@+nMrrVZ0JKdxgkFBiM2pgl7?$Q9js(0`>ft#<MAykYs)P+#^boZLQ#jSiFY^-e^
zm2@K@e|z5W(EZXj@&#X7=jJxn*Jo9}%bLC$G7KWv^;z~9;+;=}#m}*rm9F1U!uZX@
z6tA7E^!++gD`px^y7AF!VKYJTy!qC}IrHS>@5)xKMx6K8wC{PuzsdT1$Y1<8S~iJe
z;OWH0``^plI1<TaA;33B$t$2lo-%W5l4I59cZ|Gyeq#ZEgLb#xDRy#_Q2X%JQNN2l
zDZFC-Q$VP#a*_uCVDaV&uij9-6qFnQc#|K-`AvrLsP_SP4=Gdc^@ZMB=Wm5S%0Btt
zCwoWs=KD}4&$k>^A7t4hN4_z0zU7;eW)|$xwvSA9zs=jH-*Q{Ro$Blzd2TOzN7#*P
zGC#<v-#wcDbj2#hh%KI+E;HifQLoaqd$CU*{`_=b`>|@GkkU(?7`=!3O3Vimo>xVp
z%oN%Z#eM+zKb%K)D85VytJ9X4qG*(BEqlfAQK9hG*n97nSqZfH*<+p!3=*G(3y@=#
z_Ehr;l5)@&JzEdR1im}J;2rFjt$odXBiVYm_Hh+O<sid1gDR5tXpHq}t>3kKVe&mU
zgs=I@K77X_qhzFJq%o^h_K@j`;NAHfuWpch)b4x!IJr!<;aS_=)9(+g_+LgDDRHyS
z+)JS5y94?p_x;tAd(m?I&s)D-Rj&Q2H*s%5VZv31ZJWD1TTqFCE&1pCd#5@wkreKS
zTt6b#!R!6&0_%+Hj}A<4f~}-IzMkm*X4e^VRH5Ivvmv-aYLme)qhFMzvshN3cULIE
zM7Fx1Ne7}GRYoo7lO-||POGe1TwRzt$zV@sk9B}-dAHqNOl8qXA2Xa7-d5a7-y%8k
zqo9nW35R~NW2eu4K=#0n-tPe<L#>2<GL{~y_u|z{R0cAWD$`Bhh_i_^kS1~HW~xf+
zvs6Y-KE3jal8U8@Tl$Ck!+Htj7P>(-3i<-NYvnhl(kk^Uz*;C>MqRsdv9hQNyD~RD
zsjtDt_-In&ezks0xv$#!wU%oggAZ?6)7SfRKXRh1jPwZ;`u?nTWG>K`vpoaP+#V}Y
zQC=V-C!iu=Sg&)KVk<?qmf>-d<E?Q6$zGa%7#y>7e~;rg2V;q#TI)+2GpCBQ^faSN
zrAqBeMO3G74Z0Lu(kb6=j0?Lh166r$_FT~}0d^gX)Sc5^EWKGut1cmmso||~DrPKb
zf8*EfTDqH&+hq}&tL9d^6wrx0V+!KK>)~C_N->HQMx^x=Pe>6Ium|D;LLP47%zRM9
zzP6lszqDNOyVQ5-s~;0v$Hj}L72*`AK06GWtvy+D8FU#edPe%}(KA)`9rfKT9re}{
zjuJ67F*WGOuaUx$nM|Q<iI;GGWHvGzp1s`s*2Le0yQ!?H#YVYq-K4~Lx2eN5!bHTl
z*ht^Ryk4OiT>W&Wy}G^hZfUDVvPNa@j9ve?{idHy<<0cpHfBi?HBBx}LGSFW=<J#Y
zYWjDRJClRjg5vNJWRy{Jw=0=Vn1j6<JnxGdh%RNpa(1PH29DCU`Rt5F?~Kk0tTj;&
zb9{FI>t;_X+R@pydW9c;ij7wNFwC1S$(zkMxcH-UUBw&YVZI8Sz<{&sv-{9x2*|GR
zuETEBLf$XIJdRvr0k5(CA95?&8{<;9@={+oEms9=%4vq#H6q#gtoafRtKr|8i~TCF
z@Al{<k0m|x)+E=&UoG)38C(8()zkc=d04aGE!Q$)SuTX_;{65iVjNH!`t*t&NpzS@
znCVsA2{7<ccf6D+!sfVc4lVOJzg31tCgDT%hmGFqNA^Gde5rnfMP|SfVGg$=w1T&0
z#>n1nzKiV-rg$C^6=4`D74QDZh++I?x{%-af}Gd#o3l4*Z<ey{UTTU!cvOTqB`bIx
z#phqO3ARZM^4c2znl=I(DLbn&iSTmP2)jCWEuW(gqke;b-&zCFW$^tlcMm9l^&Lf&
z(w6hy;}%VmR{Ny!I_0m-9nLb^&rc7i{hr3(4CrI-vwO@pE<FBeR?du*MdLt;QyrM}
zC$U2);K_hMG51F6$LHl=I@BoD7PCcjX|sGEy6{VgcD@WxO8nv>Tk%Lexyf$FZqwFx
zxXLD?jxgXF+swz3O7_#K{!7($W1gE$vL#!3ChTxdvN}5(L)-3==pm7`%3Q7y^so9M
z#Ftk&dwCb=dwus-lbVVnRSkKVjW#>097XEHJpvFn*J!SDMH-M+iMPZwak@-vR-z5l
zYl1tU0o9$tEP97N^fq2`Lfz88xe*bBT7aX?HI4X;mmA-mMS>Y6X`*9l?jz{ZX+mb%
z7yLIEquhqNGZ#`C$}7LOz8|%nu-)EV;>k6=omP>)nSR@qa&EqXa@n8(jX9P_@THHi
zBih58<XVfm#alXTN`Jye#H94T>K*Bw=?U*nEH=J_pSX_iGJ-me1^-MVOgpf6$)8;a
z{VV$F)3(z#IAvTtR;nhtV*4Zw=VD&1;o^aYl1z}`$=Gf;!CR-MnI|OlbP{H`P>Q#q
ztX%}~o*xgTFr|K6&fsr0_csCS+t?e+SQbjrdEd{Vs#UT{R$pd2W<E#Rtb;6tY~3uJ
zsg-G)<}b<dnVluzxgvs<Do0S<I6&o4@2A83_J_%2yMxis;8bu>Fz@NYTSQ?K2x$#l
zcBFFKYrEsUIw5}%ixle+gP9$)cpuauHmD6-46`7jmM%NqJK}`oNlj>bPJ32OtC>^l
zF0iu^WQ*Nq%zXu0Jn9VCr@fe&&J~eZ>^uazVF$37W!lAH&*ym9aQmF!^WEwW%?`^W
zX|&9o++x(Ulqq3hc5flXvBxj}aC|`#OBxYAN=U>cP|00S$V?cHq>M!6zLpdb`7Py%
z-##yu8+||eESHW@NEoi6qvZ=enMT23;~C=x=?Ce_-7bN}_?;dUJp?h>H^|cU(_i4F
z#gPFH-RrmD$GlgxOr^OV_%MY1!v3@tqdQiLOQugwzPLt`ad>Vmz=I&-&4<=XI_dxb
z@F@Tg8V&%QUJ&ow0D#X60AS}W03ezH0MNN5Sq>-w08jgr-^l3s&;MBjx$EnH*xR>s
zR-(J6wfY61y)JvTgiR#{`lKnfA^-MU(T2tEiMiS-SzlEWKiqBjQQR4?^WtWf8H+)L
zDLH@Bl7=(iw$g-!v~u~_!3%NmkK!wj?<pxsGv4EWrh_DSu*@NAN4YeAV0BYJ<OCf%
zRX1W!(L_ud{V9&wjtGnaV-c=}M7#o!-nvG-7F@o1=zW#g^RXMmN7?89O;J7yBar=q
zur$|(Bd860&MnKs#D4vHR^}wtSV8#pk{Mqot#7&a7q^sm5g1BJ@t`aif5!Fr@rS<l
z_&H}`{E=?9iAl{4l-2aS%kRgR0tV5k!Yd?&Wqv0vx;#81ZQkYD>3o)j(xH;<eek^A
z^9@M)_L8N9{C3X>Jg>8ok5D&=Y>){jb?OO~xj#W!R$Q#Cu5K8p5gXmA-XAHit3>{D
zAeK(gG9>K-;Oqeefm+)GtFL_2#1eKm;=28s;HYC3jjPBwM`HW4(@`@2PRaK_w5~qy
z<99Y{h@_xbkpTorcrOKoJS)Dc+cggjy+Xo~!6@kugzt|P(B33{SA++A)FA4uRNj*U
zIUa{thTPmFMOMa>QG6<VI~I0}ex7O!DfgU;vX|8o9Ui6V8rZdy0aUbW<^Tk7U)q+~
zoOrn-dgZ??+-5En1L&0ZZjiSgT&M{nL0gVa&dij|&mW5V)mT(lS0{ZfD+_aU?NWKS
zC_VU@zPh2|ejL45`;+p5)xxS7>iK#*z6cV)M_4?rYt?j7^!&CXASQ;Pj6*l+J~JBM
z8B|-#Ha$OIK|*%Bvh}oLVnWCJ+&{IVLPN(L9@MGmFjr@nn&DpxZ)j-1355`(9M%ST
zMBVdq`mTmDN+&E>@Xek;&JvKjQ@s)wb6y~eE-k+5+5A{=+nDB&_9h_cyWRUS*VYYN
zi6gBFF88LUrtQ86h3T1GIF;17dD4A)`f}V}UInq!@(KzSAs4%y1`J}ppZNs@%BnO3
z16$-7U)A_the?2r9oGi^js_VS^|Z9U-lAimp`j_JvotFscFS$yLq@Gp1S)Ur8nSz_
zZbEP4zN-O@V*XL+?lf8ge4X(^KWb<x`3X%IxcG{8GrNZhF!bRoMN5aUT#nf>_2)L;
z>E*h~_vsxjb~P(8AFF0mnzzTtY1K3TF>MVtv(_kbr<aU%tT$ZIduPg_dF*w-fyCL-
z<mmLQf4M5wZl;R<axkK(Sc^RI{`&(FF)=X{+mp*gTlsmP9nmWvo1&o!hUMS>@&R{S
zudAr4j(d$t6it?Pdv!uhb2cHCHFIp@HC%^u_S3vW3;<xPD|%ay6qcV#hvHJ6ur=P6
z=_vS2FJRKV;938~;ey}^>EW0INw&A!QJZt|po1?5JS!Wr6ZcBECF1Al;e~R&t$O+s
zmxY!&p&Bp3Ih2IA*%j(I0&ediB!{Re&mC=Ek#?IX&)X!!o|ne6vd=8oU8Iw~S!8<Q
z4h!<t4YklHKj^V_81$7W5&<H6o&&kJ??Uf`sLImZ(hWvEuIW0=AJ9sq-T&pS>^Rj+
zLvpmeg$7EX?lxmA77|Nd9pg3lYRt;sS(y6hSXQ;D4(Law+d9Kh#_<<<i2P<lzRBie
zA<m#h7QE-juWgh-P~xFaGCIgHZf6Pe5(2@*=aq<6>`r(aQhlp8oZXEt?HaGIht3Uq
zOaeOVhv7hwhI3UAl&Epmu~l*LBIJh>R;qV)=2$msCOb2;Ae=10{$L$6kEl`H+p01a
z5VZe-&D-`mE@^87K|5dpg9)sa`)km7M379P6IerEzf=t*D<B}Cr|&Z))cpj)Vlrxq
zhxzy)*Gc~Eky1*Myf}AD`l_7#%yFvhL2Am8Gj=(J<2bU}8mb{AD0tSb#lx;+ViI$Y
zdT;9QYFg-?-&|_xd3koKgpmH3Ysw6y!!*i(8*YH~8TmZG`77-Jx#^Iuld5}?Alm#J
z!q9l2{B%2G%_o6ns_j+<qc)_lHJ~p2ZH4E}JiVkxN0Qx*gCNsq;sqEkyC1W68BO@A
z5^@&~T(WRT?JH?c{L7rs3pbD~>K6FWa_qMC>B(F(y-0Q{`2KDeF<krVtZ)Y+a@)Et
zuu-WPDFTGcKkGW|r^Cg)x8-?1+ElZe&hM&^U3KuO<*aA%XdfU<?^sFbjuk?m;9ieR
zJH!ZI6PnyUCNKEeZJw`b2$`Yl4*q^;S5kYf-I6#3BsRmmj(j`2ChqE?gtyS$51JhE
zj;v&2BSrdAk(4S%ty=wpx(Rd-WUC-(Aut>Y9H!eTo<1O7<pD0zSnW+H7MUDn(C&cE
zBUf+uFdmH;B<oDHu($*oI2Bh^YMur$1dZnMb;=?mZpATMVAp?QTl%sNk8vBr=|s;X
z&he44R4(-z_syJL`U7z!569fb;c=V5x~QCst!*T)W!G<7&p3s+7>{b}iLcRFq8JN!
z(`&hMuhZmb>UzW)H*dyxZ>S`bQn^wMg_BWv-hzdbDQ+*cp0P-6zs}Q<3hv-s0WmT#
z*fbh&zV!G|SR_Xdj+t~}dkUuVtt=D**(4nxdB-@d-->msd*$(Y-KrSWDmlNN)joWR
z^W4b6(DdB4?_Z!=AMz5Qt$YD$+ze?pGYzNA8ANCN{Wx<W+~diGAF)gK&TFvRy{fO0
z^&+IvfHzPUmwO?dN;p=JO$D!0Y#iHcK7lG%tWMsSmInKRI{i`n@QYEfWQF<#;hRa;
z#Zp)g2ecY<T}3S^C8fq;zG_iyA<rbYY2gJ-z#)198d6*or9mpOh;$mn09|xzVk&93
z=&eV$K1Bd${^A;zo5+UWVeuM%dO>9|qRMQ8tx>aIz11fT+uokM6$HcKK#5_;bB5x!
zrqjDmVPCpL|3>rX;uIJ{O1UG^LC(i5EN+2P=YRdoTgJ9td5bPvpKqtcehpVNyO8qP
zX~@dT@<F)NUWRm1${0_~ZQubD^$tb6TqMQ*DWTRHT2@{@$MZH<%5raK1GDix`k3l(
zy`7Vgy;cf$T0xeeLm^SZ;#Kr&KXhtps*31>6-`YVY>I;|!1oX{hl$feOr23=o9x!c
zupzKx2}~6yf(kluk0q`jDa1gqwe_y#kdo>3!;{os{(AL_N*lQ04>_wJe5>4#--;ro
zO3wA49gZsL=q&Q$=Y-@kkJD9^b#*(JO^w-_!`Rw~^lR+n+9YQ2e`n)|sE*Dn_%DVr
zuksF4w5M2%xUkIni=Wz4#d|Nh)LVEIDk|ZAkv28+Dl6B<MkK)7hwv7lD7g0!6G1&S
zagP0awRGOCTJuF@Sx|A?YXqFfO_`x|wW!$5X++~g<aW`#rK(bHi51*ab0=2HZH8Gh
zXzj4zDJT>N=3b>uftdc0`9*8rNjDnArtdPtm^myi*}$}lS+qHJSc7L!&~HVvK*ovd
z`qr_D4~7Ho=gB}^PdO!ntCq3eA8XUU5zV{@3R<*!CGh^oTS|ue8$PP%=ci*JCNiq{
z38E8~AcBvbtDSH}kW<KI_y^}f95qMhj;}J|g=!$f_DP}##>6+ZOm~jhCO-)}o=dlo
z$cJIgJLiA<wX)gr8Lm28e=>X9ZO$|}8FlRL(;#7Xnk8vfXg~|3U=U*T+eOiWo;yd)
zd6K~B?7`1)2CaK#JGP_WG%FFsG@~K;Dw2v<y#2PkNtLbt{!v=-UNTAF+<MxK&}XeE
zbS+pl@P|@ncbZKufs5)6B7n~C%i|4r#*R|W$Eb}i0mo96!?5X5l?RiZ-Al@pgsr&`
z5yuEj{9gyAy*b?y4a}~JtNq`_Y<kv<<&=!qGS$^Cbtalev%+F-rJyBVY-xFUtLdP&
zu&{-Wu5SIM31(;SR+N=_rW|&*1)i$(yjV1kXNBkxL70OBcGyv(ATm;chL$jJ)b~9=
zjBw;|ad*gD&BpMCu=j{jRo|az&QZ&Jq<M2?-k+1RcE{E$$LP~m)>${GSf5>Ux>zX6
zpj5I`QUq-&h@DfHERCRjz0qcVPK=ute)zz(Ag+ZGWuctJ67_&5-?t-8$D<^tngu4*
z#S|ms+Egn<3*21~L_x0Yzpv!JZE~9ZBLVEpm*<ldQeWQXLa*<!qg(K};UH3&scY*T
zCMX^Wn?9v950lNz><uR?Z))OQK_iLkiH3AZZn5+ar$bHxA964?Hu^A#`+pgA@jG_3
zXr1`_NRHI$?}`j@3arl~iGOf^o}zDnjsrQA<GW=A=l4K)pj~>XIB0rdVZmwMabphX
z@aFS}HaSV3LcK1YswkK9YUr}3++3IYX7xgwnHMom#xT<f{_f%kOl1z;r2^ab3as~R
zQ`i@+NdVDI%~18LlLO4R^vrDdX$5+YZgg7|iTRF<Gw!Ku6IYzT{-iYapmW>K`fcj|
z*t{*a=H;OJ?;6Q4z4j*j@A&DO=OZMMLvzDI)sC4%LkN;1x{xL3SzcU*VKce{k)Pn3
zGes1RiFi~gG!wj0<P5TK{zKkuT9cTV$RHJ5MFhQ1ILa(whe*^S%UR+dD$3J#u!O_J
z8+bKRw^YMvET27&S!_@U4-;E6yXf{Tp5r-D&k`J0BzLCDgt_koCYdEU1=^P7AZ&Bs
zt!S7>?xi`2f)ONghBbl?=O?ul)zv5(jB{h|7y*AAc|OFYYOYz&NXhCt&IRH23TjN+
zU#)&obL?HlYl3|$hI*+lGDjHh_C#6gOIk$+quTnJN>Aw{1AJ2}&8Sns)(`qcR&Q+l
zN;ou`@k8<|u_?BGnEQBoQI-!8^9!nC_F+M3S9p5r;Q8RAfnjimE;s5;zL`L|zK$Th
z25$mW^X!#t#j0I^arzgr&Ahs2=R%LjG^Sm~T%o!si&gibs}As}iZWAP<ugYNK+gS;
zaP?Gr(p=%!)Z$wDwkclYMzGsr!X%$zFk5wtDxXbLHxR13%sxh)({Jl$aMsmsw#K{X
z?-*Bdomq@^+!{5rg_b8dN_yguHIZlXP@lep&N-bwuK#WcN6?}yr5GO#A49$sa(E5C
zHISNcl%+7c5U8)MO+v#crgNE{5dXQjxYX?Z^(G}I0$mg*esC!wA_K03g}AqG1Q7x|
z;o&mL&zG&w-kg=@1=o<V2KERop3o=|0r_N^_RE?LLw&HP=`I0pi6X*ycXd8?b{!d+
zM3fBunrPpuS=v5V>Ssjo>46Qj8!gcUBm0~)2@G#uUMk$Oj~)EnYR=cyqE)JympE-w
zUTJ75X!{FY^KhQnE5=t{)P1_Bt|@y|q<NcLvDYu;%MB!}u1-^Tz)*wZ0DHA%>)ihL
zv+L+t549|p3`xTwjzFD=8q;~Y2I~Pb$*X^C(JgMRPM_Z|#+!4(Kd&_7Pp2o&HX<>z
zQTI+PYfb}ooI`!G_Dna>6GN%lh}Z(xbOUkAX8>}AH_m@vXYWVIw=SDK&t4+X$aJ|G
zl4UK8W3g8^Zeb?!_Wm4`h0pM`4i_0ZzBd}q6tGLX%}P)pYN2iQ`&wQ|xM`h~zvs!{
zS2a?xbK1F<?>?>w3buq?jPV6~xJ9Llgb=8SY05q@U#%{rcxI;h0x@d&c*ph<#}ws8
z*@=$tuUYDnOSAUn0X?q2hCZ0EV0=wnxoBD$x+dmyQT{`cr`Z;M+2Tfs=Jb~9pLcdH
zO0|m=*f}fkl^%{xC{Z5gLhM`{hJ+YJ<#kKcCjPFXc}{!6`X!iz*91fGMWVQlL#LEK
z&2ZH1Ahnfi09iZ5z`_IrMEA3DKeCn);Pc5B@m_<zolCd6-0JHanwpMtEqJ`MH#cqJ
z{qmi|Z*1sX(@?yDr@|u}94-KIgij!dS)#b!6|#0VLDLK$Z}tE&Z<+r0{6;=D0!Ab(
zbU0sZR0hpD3;!#HFZc8I&AvJYm9@iXTBqDpJ9T80!cQsmF02Gjd#I`kTo3;?9t@Bz
zjSn`K{#W)t;hFlOb(Q3UAG2lKlv3|Q=LXi$vGNLt-xg|gsrdcM2Jxmp4HxUMxY&o%
zHZ}-qOTThnah^z!YVz+SPRFO_9sXfgWq<HmbmR}G^J(9aW<9KbBp2EB`}B9_Q0Eyj
zpQmIJ*CQb_^`2ChD*B%^%kI&;pws;ez0=(4l07FEm+3|)II;ZIc1gCY&YL&aBK(-^
z=bX>BONE7AS?+@v8(L56g3tFAF(|ku{tQ#PwA!pr>`P@AA&1wzqLj$B{6O*DyW}Il
zaS*jjisBz8=pUZq-<Tls%RScrx1xVzH~zELe-{12H~nv%$Um+Av*=$e)&HgF!wkfW
zF1^Ob2IAN@fS(>*<m2+uepyUOB)SxR95s;>9}I=e^EjWsRE~z_<!BafLn_`n*j3v^
z->edA<P9Gp0RXl@1zy`YplGeEsg9*q;y$L3?r3IL;b}>CIfe3&zphPgfyXwkE={CF
z?0pr2qq5P=U=1X&q?d_NemYdRT{&dKV`P=VW{w&fLLZ)(81&x50joCZOqSs~hM|q4
zlK}<9eQ1C=t*C$kReBX!!wj^cP@alozgj|u_a_UB;iA{nl670L%%q{n2fOiGD(VZ*
zDj6EZo-0RZwnn}<tJoDesJlm<oZ_|aT75v#^s-)07!yi-(J+veUpnkt@k>-5M=WkB
zmW|e=7AKA=Flg&D>pN|0^SD#Sn3zS7wEBR<$71dFWzVCG8gS|N?>?f`d9I?+iDfDF
zSf6aC1^e;BsFZrsECR?{b4$B(gS^~Hp!ug`ZCUWJI7rDtOw+VV=hv3E36U|Bru)19
zaC{MX9%0G#?%Pi$B%#Dm7`@Y{UZHJXgg*|D2~6ULtLW6u)Chq>+7zHlGr!HSpFt%u
zl_i?vI?B_MNGCn;J6Rv|B5t<d_IHVfS)>+C*wJ)jp$w1#)6K^;vNz5K4+rYER%xp0
zL^M5tCGRab?9o>rs-;aMr^^zji0rB~-<U%)Jl2<0-}*Oqo@Oe7^`@tIhpx8)Muz9_
z^<vT7&}A$2u}N1dO8PmF!d~XChm&~lSME5ZI#7gYA9wRe4V><dW5^ct&TB*UbYJ9a
z5T}IP?|U@j;4#Vm3G8B?k>7&kD^@;}D)|ALI<*j4^yrnj^f~|cnqStGE+qtg)Szcs
zG2S@YdF<56<}UeFUOxBHzCILGVt<hqa~x3xM%Gf`{6e}m&OA@e@Z%zjr_)MKNDe!!
zyM&7m?C`7Ai7b#vx>~S37WU1Fvm)9-+VHm<gg71l&Het3qy10M{J#|ar~CaQFw}LN
zZ;C$nCHmFb^g=qOJ`Y3X(B%Z5KQdme6eUbw6imsvqpDvy{h1XL^xh)!k0m9x)9_bY
zQ{`?POhknjKV1^Yw`?MjGigywuj6{X)+U~)NRZ=kSVJO9Vr3PnnzVyre4;EDwNyyJ
z<0=~)^>N3{Q+~_fqHjdyAan<4j5~>)A`-1iOd2QLf(0gNUO#m}!uZh(#wBae$|uT1
z;HILkKHlPC%}yL-_q7O^79Kv$#hf8_>0A0uyq%i*DvpkIkJ;E3En?%F*hS|HP2D;N
z(3ti0pKX|#Y=@u3(+7Kzu!}aJJgZ9%1iW{FW&F04R@T#|i{cmcD_<Lo+rOEXbo961
z0eG@17{|hl5^_0MS8jMuj2ExuN(J17b1U_n7g98gZ3o-Hb+p`xX<dAm9*@GA?A#0`
zdiAjWx2f0t*_`!Vkm7h2-O9!V$!@y-qq<icX>8`h?o~x^qt_arr?SVEK=@5<{axE#
zQV@F>3?*={lgeD`xrQESgqm8wESyw+JnITTdif@Jut#JqI`wQ|N(9{eH^Z1S8z>ze
ztvr7@gKfn0ZNY{3Xl0cJor3SB5+6z<xjO&o$FXbZSp6QJXFmK2`u2+$p=JzyMibLh
zGcvyBu=zQq8d7b#7pITtm}?~66Ywf7q)W+aQ8y5BY(8w%xVL3+N?eQ10wp*dA6C-?
z07u}lx#BS0ByT-85!t2rU&JhmyJDGN)9I-LTHK{p<z-QvwKPu!pN7t+i8AL*;Z%B~
zDb)@({%zY4mTJgqv1CeqAnEI6M6+ua#AA0m(-oJ1O0h9*U9#dJZfmPZRNlp@-xXx+
z=k-TC#9<|gghkF%&mZjcJC;d|$AwL%D@@bxzBYsl4e>vQdAI3REh;jkzV?a!>KzxK
zScO{zamK;~m7;YU8pt@mmY0iEotl^;>_-5AmBCx!q$BHLo1g}dE(S-<Bdrw*P8QT>
z2P&H!1tW2}@~=CGj(-ZOeS%r-%6QGs!e%G{0N0K&5%FUUyzi>Pob!YtBN98&!=c<S
zG{1J^@Z>J7(9E>bWhj%!s$ox5N=_2%1al32sGO^jmJDYE9P7~%h_x+P%C|~ZG2Uo#
z$?IU<p|Np%lDK!`+B3FIFAlO>NqG`ma*@5-TTr}*+WxM<JZH{bZWJ5C^*)pEan<1L
zGRou+vVra&+|ht1@1jxsk`3#?v!#TyGt%a6{`*@^0j8$e@ywO^Pf3UYqS{iCZiOP3
zvhg|a-Ac+=1+*l;PG!}G$%g+x+tYG<L4M<5iU6?Gz<3zb;1$2f*UrMtpI#}on_H|;
zT$%9AnyJZW9|ZBP#_z|cij!tkR7;;JrLAV=J|a@>PG=IdKdo4~+Ga+Ru)7lZQLGx%
z)y+$V85yg<tpdH~ZP@c^#Qc1N-(J`^Xc!SCc&C54I6f;}a1(9l^HJU1>FOLN&c4ds
znZ%skfP;>D_1wUO!8pbu0=_d(4FYi^lIu|zJT|11=28{D^;{S+<n$33ci=TIcVFBm
zqhc9PWP=I;y{kxXGpzvef9AYC5_i<xt)pP0H!Y_jn_Wzve>;4u)$?e&RHCEGs;kwX
zYvz_b1OR$`c-9f9%dlDYf53ati1Q<$_IMt<5V6)tO5(mh@}q`w+g=xrU7Pr(MZ|mS
z%eJ8FWysARzI(Yh^G{5bW~BlP1#rZC`eCq*X@Uy{sQl!m3^IXeRs6X#B)%ZZITEk+
zMkUwrwSp_fps#syY04*Z`3J$G?LVU?cK__f{XHa%%?G+ezj!U{rhviK9a*R{f~XnQ
zAU;7W1_8tIqI!I$d~jn<r~<+ETL}g3h(J45u6ND>zPQ>{Lu-2{j(~ZzqvG8qG{@V3
zGf7tnf@#8VU@*Qu;=qfTyJu@F8>Cf#w=Maema2bmu%SjjDb;zn`gV}Xo~=bL0rf+z
zk>?c`+}E5|{&|Y=o{248!)X$?DbCga;h8Mfy%;sW+vilu%oBUhG!1x=K~>Y~z232|
zU*qbtOz$&~!Ht>5OYH@1?H<1O%d_k=&hyKBfQU1tH$cuOEvC5<zYve85%D{Mc?BR{
z?BM8SBK@E)@V<1x0^)7n`LzN2U}~M?sa2Y=OV)HS=J(9xZ%|f!RP~g*{Ce<!b;tZq
z1K%bnP5heU&!dX^XPS_0DibEUUkwZ!#r_txnP!=-!0T~`{;pnk46P$A%2GOXaCJ;#
z*7JxJNELo65kXVv)tTFw9U0^d>5@J?EoW=4G`6O{&Q1iwP|(3aU<w4vuUgM+`2A6n
zW(Z;~(dG<tatAxQPe{2BI<-p|1wPQ}0HMzt1C(`gXx)bO2B1R0^FE<L*grCu1-D7y
zo)Vw^1I(^X$$<-~@ip&Q>vJvKQ72DuLh4&YEaXg}vIv0D%3?0~WSrgLkcRDehp~-p
zq>^bc55d{_2H(JD+%{_NWl_A@HR9JBu!Id{W=DM+7P#h-z^R-1Zb92g$`!wPCj@yT
z1hYhwM+F`yl@lSDxp12nM~<fdnTQWI!1!yHI(wGbKq}MRfufZztv@4efJc3LNZVG+
zr$2F=7D?Nw9f)%ojY^n$)6W2XeX!H8r@2LH1El@QaN0swB6`ok@)OpnYv|1&m+V~1
zpP*?vN4M~9QBTXXea=a3s-J_)BQ@NM5RDO3+4r=KCaK)+>~tUHv|5cg!`9qR?_C=s
za5j?y?x-8Q$|ImfrScjFCtM_P&mr;>d^hXOK^R~9CPbAvZqbi*gGIKJY^VBf?o2N*
z-8pF<VR8q_a(KKQVtUTZ)!RU~jIlFNB<wtD$%T#WJX#1MAM?dG$%N!xS!JFK9z6_}
zV*Lf&Jg<g0!45YMBP?fDQ|-tlz)y`M*Lbu>Yv(*rdjhbF+U@QoG2CInn#+rImf<9B
zLqr8kU04cfX(<6V=KPsA*IP*|HGH%c5e*WQxxOF&o~8Q@wd#S;B>F15rEs?TsX$PI
zpRw*s=(@`Eazpe`wXd1}0FOZzN*y6I96&s>lf1g)@<C4<-8S)qH`P(HMys#r3U8un
zvuY$hGt;uLN~5)byg9y3ug<UbcOWM6w9{Xxyl4VF-{2Pg+uRUX-{4>wwm`RCS*6-&
z{xnil$ZTUKuqx)4OC&J6{QRB+sQg{Pu<Qah6hS}8Px86{Cg`GW^Yy%H8eye=|I7()
zt2W=*9fY-S_lRxgcqKA>Kw;->uDBCKoPxr{-Sau;5H0zRTE*V;1?zc95?58|eB|Dl
zKsj3oW-NSdENC};xyfmXlq8t+qmLR+Y&6P)>D1IR9gM_-hx)lt@u{VmK_<Vey5aZq
zz)}J~z~l!lLM(eS%-MvUPHHJu(FM}}7Xp?|QhMx?k7f61LbS%@7bAekNfb5peYY%o
zS|>>5YN`_C`o%X@^(Eh@+}ZR8f|FMe^<VEHoAi*5g-#|N_w>rMc5bS3*Eav%x#=LA
zb4FS(8l$OY;M%z6gB-Qs*>&0Q>~yvxLv-L6xr#rY0MKU&+@qN$X<Yg<*F1K&g)s2z
zK2wbIZ@=N_V0O}Eh_`>C+PQUyjx|MIN*ONYa=7%W1xK9tQ|fekb%#3}^jj^RERw9i
zGW97v7F`1a1Bio%Ijd-bep{T6H>2=dVf5@h2?u+7bmvE*A=Mi%V7=aIcI7kopKNK@
zTWCx=^qNVi6g#DD8R3kz6P_tKHL>c-o~w;0`>R77;&Ib05Oj_R6n)Jk8Ji{SV_=*;
zx-ROjTEEt~p5Zb7tkbqEYC`CG<dRAK>G_oQLXir)5%r*Mq=1kjq%|(C{HJQIln*1e
z>>j72FK&!uk#{6>E{y*cNG!aJEDv2@dCYg>i=Lr&o3Fv^k27I+!?P0fzd?#HyL)}l
z7Cbrho1hP5ns3QYdTA;)4J^Ohgmj*iOVx`W7*a`i=I;IRa=Mdu1stpvRZB&ffwLh`
z-G@XM4n9v7-MAk4!ngvRn-@|O-{SbRgZ9^h-vFpfY2Nd;d>)@8@vXf8nq*<^<aDdO
z)nB8AK7CG0Yr<mfJlBiZtVPjlR5@$fOlt*CnqM;1V3k;`<$smTLA}>)e+rEReNJ8V
zv9x}rKIjchup_t4@}P*uO18L!7^LycwOI5U-Q4rw4<5`FwP@b+tHC}{ZAR}4E&U1-
zBbm|mso|Lu(u{Ue%l67itYt}BG~D#+3iWxPF-ovz%Conav6zgzC6t!wAxYduZc5TZ
zl+OA3zRwJXGDWq8pivsIYFAde&Dq_mds66mr{#0!?pkxQS--VFoiv`|*9IdEOZY|<
zz(ukOh=s$>!Jw-Rn)NRGpsEu$zA%`vEioDa|7z#{?9H+46T@cg$+^40v4rac3i8v8
z+rP#4K=zhtikbeuoZ7lzQlr_U@Wi^?&EgWx&=WO<I={};_j5>$Y3`=a{l5aRqgjfh
z%*pF{RPRCvry&*tNZ%~ySck~%?~t^=uSx_i(>R`#FD80NrMv_LN@!@9V3e>a2EFGy
z!SgXig$IFh$|RIvKA5u3=>)qy_!Ndxb904v9xJ%h<$%sS@wHSr$Z<MmQEw%B`UG6g
z3`*9{!S`d1b!NSa^NttvoqDd$@AMzRirlS1S}#Lu;^>0#3nZ{ZY0F!e6iv&%?DG&1
zGx3Sp^Z3tP=-#8tV<!)t_d2nPscD4N%d<V9HMepa8ymA;?cMn2lusM4JFnSEPGMo;
zKMCVjTMzx+yS*8gCsn*%R?NDCNvtnH(O6@c?!EtdN`86ywXK7mpZ}^Cu;LxR-7x3;
zPj>39zLN6CT9oba<9`Xv`d_s^fBK~5<D=eVb6jLZlzGSXQhs>kZRU!Tlh^<B=BgOz
zxXQ%D#H{((Xs$$Mfn1d1QpfW^f`z&H+L^?cPqVWgO<KYwWm}q;2(FBVs1M_p5nC@1
zJNww4Ley<$9fiR);;zf|WWd(gBgf0LO)|GyOD~T%k<)1Yf9BPpODh*tfNqtFdrrX!
R5u!+dvb@Hd8rioW{s+z(rN96H

literal 0
HcmV?d00001


From 6b6ed86b6ceb5b4eb99d0132509abeebff74b5ca Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 24 Feb 2022 00:26:15 +0000
Subject: [PATCH 1022/1147] Update troubleshooting-help.md

---
 .github/ISSUE_TEMPLATE/troubleshooting-help.md | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
index ee0a8c7..b5c7564 100644
--- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -9,7 +9,7 @@ assignees: ''
 
 <!--
 
-Issues will be closed as invalid if you do not troubleshoot first, or if you ignore the steps in the template.
+Issues will be closed as invalid if you do not troubleshoot first, or if you ignore the required info in the template.
 
 We do not support forks or no-longer supported releases.
 
@@ -20,7 +20,7 @@ We do not support forks or no-longer supported releases.
 - [ ] I have read the troubleshooting guide, done the checks and confirmed this is caused by arkenfox
    - _unchecked issues ~~may~~ will be closed as invalid_
 
-🟪 INFO
+🟪 REQUIRED INFO
   - Browser version & OS:
   - Steps to Reproduce (STR):
   - Expected result:

From 4f3f789f2837547d0e65609d96cbf8d5510390d6 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 25 Feb 2022 23:15:01 +1300
Subject: [PATCH 1023/1147] Add files via upload

---
 wikipiki/smartReferer.png | Bin 0 -> 37523 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)
 create mode 100644 wikipiki/smartReferer.png

diff --git a/wikipiki/smartReferer.png b/wikipiki/smartReferer.png
new file mode 100644
index 0000000000000000000000000000000000000000..c64b93a9c6b9368a9fe7c92087f577fbd1c1914e
GIT binary patch
literal 37523
zcma%ibzGF+^Y0=G5`q#UElMLGjii8pv@}R}v(n9iba!`4cXyY7wA3!JbS<znEPK(<
z_jBWS?|t3-$FtAtIeTJe&Y3ea?>Q&ri@fABOcG200Psxe^Cu+$;86wufMW0z?V*I-
z=0*3z3**~oO$Pt~3;)l90!U4N1pr_wScr*z`C<-q1Ui@lzrB_c6MOy59%yP|Z2|ze
zE@mj3sVMKh6ubnViOK}~#LEDc2%o-I5)Jbqh@oYq!gwwnOqH`hsM!5NT>LTVP<AkC
zWTa0xq2fF2P|V-x8&tWGetE&6Be!cFc~*06ms?}^_47j8W$=vJ3G}X~*omJx6uEq`
zi$y73tojZ14XkajeDuYn{swsdwAPr)0r3_EaOEu^!1SgIy#s*aI*s)d&?T4F^`0yU
ziMuD7qK)F?kJ9BB!z=UDhXC-=JyNs~@KFNACnK3w8Ib)Lpg(G42nBp$2I$j)wx$6-
z8CNMDC;+W^DngX(7{F_Mli*JPbACYCgj%RLK;u1tz*MI11K>9^;JuW(>1RMyBcN;i
zIaUqeDK_A}VsHQh;IRilf9UO7SAc&CfI#9@UEqYN;`uh?gQQYw1e&Qoi2G_iWwt|C
zS7)K1AD1FxBH%W7WRUuirN=FWnBA8XcNP8<0LYFZeBc(2a2>~~7$4`3Y{1cD-s?m|
zzA-d}-fvEne)|XjtT}p5-oIn5CGp`$^Rc<lr8#<Ru8WoJbQxw^gZr@_kiEO84*&K?
zHsU$a%?k^g8yml+`$V-2M%2CT&3g2@)DhO#-U4@*=c^s-)V}OGzLJlxR(pP)$rg}J
z#A5gxE^kFi-Zf$&@5ra$^hp^uYcLW(74hsMKc$Al*$du;h{iJX(@Y_a*CFq2QH3B}
zfGSHN6pt9@A38>;7cz9uH5|LvF9CqlR$%uG{ZmvQbHB9-7bHv=A(>4B@G+H&wF3Zj
zKT)%&jMNGbJ_P_iW&1K#iIARkzk1h&M%Mjgxf|<FpW9!Qy01s{xhSTw51G9_L)mvx
z`oOU&az=gDnUCb0U5e&`ao=!QdQ_Wm1i#_l7(C7Frf>7bcq}sX6yJbqF&M=#RO4;r
zQ=*iBE2{3#kMY8&Uk?WpD87-2;rh&`6sq!C^)vaYp#7r{LD~{6G5kXS_V0IrZIW#9
zzBP)1GuZWF%|CcZ{3UX+ei=KmrAEEXPWxqFM<N)`owNO`)Esv)N=R(*eb>$_bdEmj
z_bdawqSd_bFyf3xtKXDimky9rsg<F&hMXHsRJ%OJ^A+#H;C}2P`r3d(<g<pXhWzi(
zKVFkjbG}%_;K4xkSL~sC6Zb==j<)5+b>AyPcD5jm&+p#O;YH!IKKBR~>*Jxu3lU?d
zYmR;-Rh_Rgg*PQJWvldd_g!%s=Vy|)al?zoRyF7!;@`by8VcCR*y!Eh*dX1YI@Q9=
zF#Kqjf2F)muQXyQO}zPhlXDZzB$-`AH7`|Z<wuUn3$CcIqUAXaN|lO1Kkzx7Qa_CO
zy_AwED9=rpCNU>6zqF{_acp_9l0YG!^h<qebXRgGX$SSp1^Zbbq2FMz89i~@EA&@p
z#4fKYlVuBur^AQ`Ro?Tk?I&-i;HCgoH5eNhJqcq*FcYK`XcI^oSyhTl3QNExSgLT<
zQI)7-U1hHd2~`edXfei2VyS9L#+Q9%Qf0GZ{vSalW<P)`!uj5sh!8Z*UfEs+v3$ks
zYCUM%z-ufc;#${tR94SQ1D$-i`e>`i7CfC9Tayvwtzm*C#W^3uIHWn$Yn9;fro!mZ
zWV@?$M|q5G`l2MbcPN+u#<0#nTF5Ee%x0o(Rg##Ls8Ra4RIyZYzn#0{uqdOjUA$HE
z))z-)P?}DgPSPxD{7J^P@`Cb85oXa#IYGYj3YHS90@9q;PcEIdMMue*9lAc5vcMv+
zTl@A6nHMWU1z~ejbS{alfmVx6jkbh6{z{;q%MK_&&N{esq9~@*`%$dGAi*GM%|E7j
zQXp?uB0>T;++si*N)5Fcuo=jsMWdynm66+%J4#iOYc6Cc<d@}_9US{PmOD0=!j&e-
zHqXADww*Sg25Hp)>iYFv!;gk06RDbwuZ5aN4Q;joUq5ITXsCYGsg)?tD5sfgEpIJ)
zQPeCSCtsR5XVzPF(lFdm+(=xt`5SGiqQR!Y%fQT#$gHuyqW37SJ<hAeD*_>i{w!z#
zr<D9Fxwk`|JprE@A2@Y9{YcoW|15Er)l6gJ`NVGyXaoKzL!U*4a@w?{8If7DgC9IN
zEJWt}C`*zMOB(6G%24};wBxy*&YJtwc}7}oTF>E+rOG4jBa5S;<*c8aSqzz)91g#F
zhs0JDHz$R$vJ&1~LCU-p#1wqZ>bKvr8nMQxm(N!<7PypL8o-EzE`;o}ph8dq9xyvt
zQ|~8FSL0CQs6sC=Q!fA_26~G$M!F*>0YyGEC}yZ3z9PO_k8ZErJ*he)h543DE@~DI
zMZ&Y2MF>TrzL$UB>@KG=A3BIGr@Guu9*-HfzzO)`y)*X<-C)Zgtk)ZxE+8mCJy1CE
zTd)SnBwG@f%jB|{1LV`qr^HX-G&44Z50%W)T#P~`ES3U`JT06p!UHU(nm=bXGBl*D
zWyn6TFjjEeT6aM14&g!T8S7Y3529q&A)Rk-IpaNN0Yxv1S@7QRC4Q6*mgkK>7J1J2
z<7GI_DZUF$B&J&rd5_r})=BQk;NN1}j1=;xpBd%cV-I55xZJ4wISSrwHv7{RN4Lp7
zlU+&U%Y2#Y{Mv?HkguK1FE%FHPPBwdF0R3B&uq)od9=(Vpys~cHms4AA_0Basy4dp
zi6%2<gJ|K7%2)b%M)Vpp6Lr(hv5=7uiKUrLV~0O$N0y>_(qUQ1L%bfmwb+J&KpAyr
za*eI_GRqG&0(Ndom{7teOo3`>Wdcp14U9Ik3Z;kYNfqAhwC-|NzPjBb-@EHktoE@~
zF*gIe_Lt`mbrdvMH6ir|H-Q<XLWCiq6$DE}Nra%^^vkZBq(Q)u&Xnc&y5iElX5$Id
zDbw98Fmt9BPGU*YRuYcwvxUXFXArfz!}AOACDx=d`lVLC2C?S6PJyO2lcM4AF@9l{
ze3dhm8x`)Osg-(z`77JWBT|pH3(kYtC9SqggwSxuk}8U-+^p%W$*t6F?WJ%<NXhP1
z;;oHNxx9_t;UMZ1Dgym2PQ!fj%q;nopo&t|9Mire&LCySeFn^h`5E^!)rj<g^|#+X
zxozxTVn8k_p7AX@hkKN*p-)pflbeyVT8gHgrb?tKr`~EAYPBf*6q=md1H0czE>Ys9
za|&p>NyAl!Ef#mbPsf>^PK0M9WO#YATrcY{<u-V18;wIOae=Uw=Z<Sr;>fUV{x<$`
z?b9a5)0(ACeDx;v)Ji@*n?1)pf%~{=g~8VJ*3^n-ZL8)Z_x5@Z)5~4bOrG(Tvv#+W
zm&m!<%nyPq?QnPCW&h<l<mHODJso0vv~|IS?x?&?p-u1X<Dtlc*h<i>u-5(ZZ`d-(
zvdbkKKDjJ;i5B2DaUXLYg)8<XDkW+(@LAw~Ca=(k59`AAh~2v)u?gb|+DxMR-22fA
zqL-}RSF`)`<CDpgIZ3BUah*1v1&F<_ed5Zcft~@1j$v00Hr+F|+rw^`WfyW-9t2lm
z!}B$W9%+7EeXjhg=r)cxE)Mw^H5q<q#KFAu;BUS*`m7`e0Jzft06u;Iz%}yWy$b+1
zy$1mH^Z@|AWB`B&7^~MW0RRMbNPQAfaa}xEaq}cNM_irEn>qKUd}4Zp(nCW}k47c(
zK|o}OsQR~FJ(*f|f*8}>R~wts*HS7tKyyOe?DFq#f&^9GJ=OJjjY<9d^G9)iYHbXa
zn$~7#v#ra)1KW#nG`tO0VM<)jrnHoalY39+i}tLP1yvoEJ%cy?&qbe7eL|h0e*Ex$
z_=uJN^ZS%as_4(J|MOT!%)bRvd;xz8s5Abl_j!upZ$0W=g8yT~=zQhB{RQ*Jj_>VB
zfAsd&`TLz-w)3IDw2|vkeBbAP3i2Nc3Kyu?{^{qLOq}XJB-mm8OUu7w{7cKf#Qi(Q
zzqI)OOWeN=rHcGN{vG7s8vpjRekRAK+6C-jdUpNH^*{XWS4#jB3Z=wbM}K@iL@7i`
z<^tjWWzCH6wzycrx3KGd*ZcQe5m0q(sClPi_CnJtoF+Z1_K}HenWu^cz3h8AVyZuV
z1=srQ*(*l5|2$ARMlwE0)}K*P1XmLw_u<GN2a81K2$A=4KPl@APBO>t%tt#dI$UHv
z5|hxn;{WP$rzR%+GbV4`3|zX1_^uP2Al(a2K8;lW;(V>o$g+ou5n*w9F7dStgc{I2
zSqjU}mC?g-`kXfmW=?N}i=`fpikC7bF$pRZ6I6KX^C^VO6v=V$)07t39|G^+8oYSu
zyiclhK0zMeq}+DV+BFpsT%wloLv}Z^)PXNEz5>9>xZHi+42!Gt(D}9NU^d_3nI)87
zf+HwWn?t@J2}d+@GX2auiE00>Gx#Ntbo#i$bFPRRwQ2wI(&4s?rB2#9{MoP4bWeDe
z@aeSVe8!g8mGXVdJw{+1w&%E5|0GNUxj6mP)dUqC%DiV*tI4x35sL-ZKNYOKI>>JO
z_-9Ee3d_3}OskNLaDLNf_krEsVQ*G+O}9O9pEmw%iPG?xSM5{ncLga%4H<ZQnquIQ
zoSPR9Au+XgZAhP>-s)bwFLY|3Ug6LeTC(&_`<mk$S-;x7pz}PNtOx!$<P;d&vA9}!
zyK%M_#X4^4iF@UK?dT2f>HO_h#o>3<o~75&x{6MgYUOqe!*$TAG`cIge3e<^bnAIP
zXG5TXLbP&amg&8P6DYu&MrqObeyc$2WD}g!kVjLs9|ro|^G7Lyr<ry?F}&}7pn3L?
zH3&*$ek4so&Xj+mzHecFY?b;FM!j~mR`n^t$A8iV{^fy-hb6#qw2`P%*P1@UtyA1m
zg`b(9s8YZ4c)R`+q<&8QdRTI`CF=xAA!jh5M3HjJ>inoGDN6T_oDz{O=75sHYO4@t
z8p#K{J`AeWI9ounISd6j9!wGi!wB3u8;Bldd*BQ+iT%-pBF(8?!RhkmQIT3Z?;}j_
zx@!pi^vB(!Ava5ZGf|kD0zDH|&Vf-Zme9Zq-g_Go<meSK1eYvIO@~7JdiY9@Mis!U
zBn3oud!c^iJ+agZ5|4_VaO1xewQW0kGY-U7g@8suS#GJ7m7w5OH0Mo$R*~7Yv7fhy
z$GTTjiyViUW+_~jfZ}pI3u{z`Ybxh=9)aklW$UkxYl(zRx1zBY&e!;V-(u(OyFqH*
z7r5OcnqKUOUz>zOG6t`F5`Mb=ZqpMsakU&+&DFa98IBIzJmr?F-dFVmtzsn_3l6~d
zZ_zSxVQf@UI{4C>h;85H%Sw$~a?H@NR)}t2)NNhvNd@Q^V$Q65^ktzy-_<_L`rQCY
z=Bb$HIpq3oEr!OEv>XQhyVcn_7YDHp)Zq!6?9A0CXIgS95V|Vl?90V5z-CCz=I`Sh
zVIg2%HuHdKy+8}4*%}U$B%F;~T^_|bqvxv3{8}by6r3)EBg!Tjv6mT{mAGzjS701I
z;tu8Rq&=bSVrOD!l6ItlxpJN4klA|@j!drFVdCv%LbBe{4A4}pc6W;<A1|_m&#Buf
zY`x8QbJ_jP9Rf^}gA(x+P9h5FH1^HKEA@n==g7OoT{?3pZ?ifRj#kj@Au|v=o5tcY
z7L@%uH<Fe8=x@4?GTfa9Ae8v++VzM_6mt$kZcvsJzs*J4$O=zB+i^t!L1R;5YnE5M
z-ZAA-D{VxOdeWmR2a(j-NYHG9p1$=B8?PN<98k6vPabB1g{y0Gx;BH9ytHk6@0BOf
zxI|$vUN@R|se|`-+m0Piexj=Wy@;e;3NQOhp>L@XFjQh}b#<clgTNgXPNZi#qBFhs
zq>gG%UfOr+Jqgd|@u~-X3sh4&5D}S&3d`LnM5ia=ip%o?9U=B;0xW>og^CVx=Iy+F
zGEndC-mr#~PTIpA{w+4JE*zs$@V!sfa;+s3P)@g}k!-zoP<WdZu%s*G<}8#&F3@Mj
zA!KYu_?u7rCl^=;>~Y3&<YC9fkNXJ1vR0sQ@o0OpV7p#KoS*yNZ#e8S^OJBH;iOJ0
z+!eXIMtyjN4r+T)c`uA_AL6_}M9*c~yi4QDn!xGlK3AxAg|hK>vi2T@sF~_qEcNoI
zD9mbOxesP6FXl1yQ+5o+yIef-(7d~1?2v%2?*q46+z(s-*iU&EIxqK?OV#wRs?7<G
z+;Wd(m$!?)Z6J^O&1cf#^US$+!@A)Ta(3F>(Nn&0pXr%$7CN-M^2=_|n_A9j*pP2y
zG3RnsTaT&hS3$eNo45Oe(>u4l)Q7r377FG*`S|**Fae=J7x1g0N?KX{b!6-Jj?T<6
zER4A3!{RZnv;=ax1Ixi!*w7eUkoPBY#3ym=^QqAERx1D17%MP$zMp84z4*l#J}K(2
zCbwfb>01|8fngzyA_$Q#M+}|m^5ATep7`a<<MBp-U(?;2XV&f4V{~qJw8j&KQj;TP
zz1|{rK3Uoe8E{{C(1hvyaWpw8Pmy^0#b4WR<~6n3S~jJ7FZ_dXFvEByeEngwwiEGS
zxmp$Xt~)13ZiPUsd%Q##zt)dRzwynl<c_Yh5=?FF@$iem2)g{$<R~0ql$m!hwJ){U
zj+3XzaonVM6dD*Z&`1f7Vt9B!!Xu&c5>rrQ1aw=$#`HQQG3i2U>&^*JaAB|rIKH*Z
z+G&7P1+616lDK~RP-qKh6@w0kr|8g5M>VGx+@S<>(LQ5nWQgQqRBx@I`}7^}X#K{Q
zlP>Mt{z#s;rx8-Zar0S!W>Lyar&hidPG2$=!rx3tAF+qED3%ab*ngePpq;@^-|j8Y
zR9XgGs^c1{TPS;jjjCMhXWDDM>_33+Jblq#Bz1NF{9?+hX`*&yCXEx_g|I=I?jyp}
z?ry?+qW6L)x%u5|wwqIaoCL8Xi3kgCb`yvrmtdO6@SfW;qRt8ZdNnH@vg+slZ2>!R
zna>B3kMu{UxFxbG^y;1$@6467<hj8K+_YL}-u-mx2RgiqETbZt`fzAgw??x;n*7H=
zIV=t9P4BitwM#4VCoj?2V!y7+w*U&%znj+D-mwuT(@KcqpV5ZwM8vVx`;;VzI;dx>
zww6twrH*AOGU}k4^j6WWO0_&MVXA8Fz?F7YkoO2QVKpg+q2-26H9H(t?j#w1yMp6h
ztr~|q$16XfF47&DwJ9U@JnF2rN#}>HX%K(pZ$YpZL=sZ22RtdIpW<r42Kk^*&z%f}
z9;*CGG?><1tFTh?A#h*5F$24wfM0DsOh%Usatqpv7BLOmnB5g#d*c&^W)H)vJiSub
z2%vjlE8S{u+w6V9qv`CE7(o>sd#+h#zDZBm%MrBY$o*XGRI;1UEsw@u*Rv<t1n$tS
z<WzF4dMw!hi$<eG(j3*6?;WPYUf!5TYDAO9dMxJL%fsbW381L*J6DAGDja!wza?`u
zTt4mU@zY47bIT!mEUYjZapghRD0(>+c30rS-PwGD^U{+&G}Mn@^JbWZg<?)HGQ;Kg
z6at}w<``%rhAf>CcBBp-;cKiXbM0G|@0MK!arLI-szEJb{YKssz@HYz5gnnoL}gnd
z*d^(bzv1IpY+=J5M|~H5$m3Q$E`ys|eBukF>FNE1+4rLFdFY+`lT4>Qf4tOjuJcol
z<PKI37w5ylwIz0`<x`yU`L<6d6BGqCR>I>;P03pjTa@g!-p%;)mK0Nnr^r5+1In+o
zjKQ_;xRdlOQ6;dYRX=CWLm+sMF`H45J+>ZHts1Y$Y0Eu^IXAV1Fl!H~V0cUa$3wG2
z`;n9&4*}-z2u4S#wPc;j@9xOOnj^Zy$R=0FVEo^q>MN!hmh%VHWXod@&ZMRX<1?*m
zyRY6gK2!VN!_^{jA8Y-_&{PT28*Qn^E`ZSA3BrD~V;1&1R!o!UUO8=lbj+WZCstk-
zKR&R$Equ#^2fD-mNV3t27qkSjxIKzfscR2^&^lkG-{dr$%*(!8#SM6B%IF23>G?&|
zE;9>HM?s1UTX?cskK}N?<fhj>Wz)#F#nnYL8OAW--|=+*`uuhk)ER0QPid)PcdsO)
zy2&~X>7`odjY{pO>RjpM!dwEaD`)T6V=Qh!z3szmKy&-6v}`$@jN8?tXo<K=o~b6s
ztn{x$e`)QVSz^UA&?wE2!vTpI-qX1*>Wm=Sy)g?zENYDypD9~pTilaIeNU#<r^zau
zYSYWff1k>^tpUmMTU)!cL7pEK8E^a%E!FsN{<I_m%a!4W#kF=a7+g7>NGD`U@XDJ6
zzc;vD+9H+y*cOXs9vsptMl$A7mU9hGUnNxfhaDW+46y3ZV@V9=c?2paDUBa2Cs&Rq
zzSzjJp($2P7FE_ScHcXsc3zJ9U?OkxMqC3j%1|`>H?AA!Y{2rKVJ!6y;}lWm<oo*6
zor`d#qM%KTBm&n<TvRjU{9JkxPf`x<9pY&eiJk5b9mz6aLPW+BPQ-k>t8z(D{!h#$
z#n*lF<c-{9T@wH`E;I~%b?<kYKMZ&3N+YH|wfIrRsLI^ME81CM%fU5dYt(6`*k|5j
zLI$SHoRdk!9E9edC@?yo<K2nM$W7>57eYdviasYh;rH07FNrjk%u}5dqAgagj}8{I
zdU+6YEy`Z=d`kEHX%Z01_||`Tq23MemljBSNfdpI5MfmE_%ez3S`w!<wXv#hK1-<o
zeewr`<Sp`h9#8n7^>R9#n<eL5veK~BaR~Eo%-g5=(dzfQ9FxHefmG|<<V9B0<d65b
z^Mt*;->hB|+O#S!v@oH2U(gR$Hlu1Sy!hIQ#3u5-2s|e}kgn|rE%rS}j6sq+UtdAm
zy%ZW|N}FA}fx8|(AYpaKjk#U5pIJ@yd2MeLcmp|_>Jhl}-!B@+_3zJO(rakzD2MUS
zzd}+3a5pthd&kmTA;#XLcTY~*C2sE}A_LYBOoVCbU(uSAM96gH9d;HeyN_w4t1tKY
zYTbvk%l(9ZoqPx6BC62aX*U@1Xy0bIv&<J`s!6$-@M3>!$^T8aIUt19Q!Q$EWCfeQ
z$tOfvDDEn=x?(Fa4VMkrql7szqy1?s$NY2JeNUg9o$ZY%_hBJqtXxm1M;MF7as41S
zqb3y_l{28cM`VB2q50da-WM>dFYu&Wd$G)QK$^GRrD~Mn++i>WRUFTsL*rHpSU47n
ztdiQwd48@>sb}kZ#$-~jobGi{RL9+W>ySi0KB^@LjfDZsAN1aH9%Ps<uXhKI(JF#G
zW39}Vn|thz8a>*E0V;O$JG|A}g3OLyHuT?W=48oNZh@b4c)djkPB}-z_gr<C2@d7F
z(NcJdTq&;?p*H*c&G`_ncmkjFC$gTtKK4)>4|C1tw)QsxOSbYT?rflLfBHi#$V3UN
z5`@ow|4cTp0AS3HG=;z?*S{py<N-mi4G-2SqdGdTNqcc0SB5rrI-#WyHybNxN*j<b
ziTR)I{GrD_xDgj;bI+&q$-G$Ch=Za(chE(7$2y77mbz)zT+-z%yD-#TtZZI$r-Mmt
z?!HAZVtcJH*yf@hmA9_OG#wfm<+9h8tiZK73u>>A^jaQF<&D&G;#Hdy0<Q0X+R2pv
zut{u<BcL`IY_*oue7xULhuju2u2%j$<;MQV`)Ep<ySSMjfv&wG+q~f3ivh}$HPBE)
zgVTm@i^D{`rhpZuahC)R5a*zw%=aC%7+2??JI*NU+}SKp?!9&&STI8*u2=avOWI}#
z`Eoz3l&c9ZFzO7pt>AMi5gXyyR-jN{8%C5X?v^^b_Gm&+mDX{?Am8tCy>G#nwF7X&
zoXclaM-AwSCf7hafueb_%dp8t2I%$a9P#oP6PRasas5kB&08CYH?_j22%U83i3v;G
z(G7zaa+kC>QadF^bevy?q0Hgd_vz+}y9}#6n0NvtwbsC-?CW*EarB&_?g^%Ehx)~v
z?a@vExm8NhIr;p@;yS4heOo<?TV`Z7!L0~zXYJ|F^q@(+PM_)9Ltuu;mg6J5?B9b_
zS#oS!$_A)&T1(Xo_eOFygXJwh#}>Eb(h-%7MwUZ&;e_)&hB$@BS9<%R>CAPMWm{d3
z;hek)-sa-m_;lfy_gJ!+xF_CfV^BGy=5P-8;T=&f@W!kQ#bo-Wy;52J>!}Xw8(bLW
zo_N+T*&>(%@qo1MNu|8!z*c(vt0HwJ^KD?4S+|YX!hGh0t64u4PPuD8=sn9Fdn1m`
zVA|(donPKgyIN#RbM*(uLZ8BP(hr}K_g;8OnbE+k`MNJYF|yJmjit32P4V}-Lv0~R
zXMRksm)XFj(%tE$RvjC79m@LGIP<!^u^ch7AIt;wiNtvbaB>@Im3!l^Fw+M|iHY8>
zS6>lnMA1Wp_i#dR5s`XB6pWW(-qUi(-O9~t);&G^vPre5S#z{4q!D@UDjVPm{o2<p
zhEh!+s>T-pn?~Skf|Xgps#9Yq=!xsuE~#Dwl>TSVFL0t6#D=xsb6!<Bz83WgkV#2>
zqF{`OFqm<++}&98KJLOOfUVv3FExH`EVo*qTAHVERvcX!Owz)Maoe1&+U2;pccix-
zu5imMwz?G?u>zT}YMg{#j{OMs3!?p1#7bs9kA-7xsBFj5yW|ued(i*&s&t}h;5pL(
z-B;5k0;RpF`DrhTIT>Vb2v-(K4fyMT&{lO}MNz>z+2G=hIs{P(^TvEY2%qY{xMqgK
zYUH!#wQCb!+!sT#VjS~zNO`X|g<f-Q2-=&(TUF$eEz`X_pS$Ea+I);R@pVZzYHzCX
z$C7hd)*&=PC!CweJ7qNIoz;^X1(-J2%K#G6h)#dEjcNbVb+nbZ!SoPI`t_0Rd`yFl
z!9M5$C1^FV<E((l+KuKuVaGkp${hMO9W9&yiXSdFCc{9}6xqO#KhrYjMl#X6c;mv}
ztT%H#Q*|yudFw7TH)BF(mBw?vfOHou4AgFT)2AsK_dMNNR244Oj40>1W!1Q($>{ZV
zcNz;?)q<HO!&I!Z<+O&Rh(}gVJbAPr5H!yq^B3s2Tq;ZZQaU$kNj3_`x2{I&TFn76
zZahUqUfyvcuykgWB!!u3LGP^U1wC+Rw$(Id=g)xfR$?%15-XN(kDPS@Q7?!7e$p)o
zt-RBs&<3Y|-K(r`)@`>_VQcqZ<@*E^zujInbUI0UP60(D3DMQlSJk&ZWhp%S3M`vf
z_ae92<BP1`l4~Dqr?}Oe=O7kMr!p>>PNG0t`Mhxp9_IzWvmHLm+WSyvNb>=OPVIG)
zo1W?Why6Hp@I~k7F^6tC;F2ZSnM2tJHOM^foM#KN>6Kpl`UnOp)mq9U>w~2}haQ~|
z0e$Q)%jK6cyDsboD=zHINx79=h4*XY%t0T`JAax?>9h~IowHJ59MLwg$Dc8$wZR8&
z_!10=!PN0L6n-tX!20bYCjQfj9xpaS&-H5G30JmKas}h-3&FnI%8HF&%uX_W@@a0b
zr~;AcH9p)}v@>K(IOWv0)Eyk0dw&!tFA{-4X0>NUW;CAWeuON%**Cjo@|Zo84Sa6)
zbapeB;xr&x^zN6Tclnq_1>$q&ko4M0Q`|c$xYVcZTWOkWdsn-QnCXX|2M5UBc(xu5
z;(}u<H^r-~<-gwzx^fe-yBI5SK)`!|>{5`^Q0nycGHRv_(YtKmdytV5uuYGTS-6|t
zSO|mazvJ2d!@Ev@oxuN!jX(Xb!2Q42_`gm61=Ue5C<Iv&=>LF(qQUOf4rU^K+nYoo
zB)>Cf`Kg~i`!O0lO7rx=LG2^{C|`;7w-y@R166+-<aQ5B|C2BH|A6HGI`{uuUg6({
z>DN+btQ49VgB2@ONHt^#_?b>oXXLLzGe2E2<Souc8P3(^r7*Oj(tf|7jDs$5&B5_W
z)R|EKdDiir0O@w)L+?_23N!cO%V6e+qm`*0u+6(lj==s0RL9BKv-L8wW}SfUQBidT
zsL=KNjkM;cAgZKklc7yVV)j5R;@<mNRz=;Q++~;ciOgA;LtCjo*SAP{ttDSO;IQZ4
zK&vgE<1-6KVEE=a;@e7ophm{9$v`w`3$9yidaZ4fyPfCAE5@*wlWXIe)Q``u+xTmx
zw!Y#Baj)kax_~p1rfGg0I8016hy7MSw|zCYPtZ;wZ`zSL2LFSQP-mPUOWZ;fF2sWN
zn})NTB3Ea9l+!6?tHH;T<D*6=O*kLX2ijE~NbEM+R+V!*4xt}b%*)f~4oG34`?wYR
zU($<z8AC^&O0BV{0w3Sto>n+VW*eX5TnJojXDgrdyJ*@mf~?VRB{l4ry@p++1*dkM
zfFJHbzD#*B`}D+0(~MSJT&Iw6vY72c<h7eaJ1A@PGtvQs$!CMy8(RH9YSkf;mKBo~
z#R>6SBK1ss?S4CcH6Qd><Zp+s-6?<h$`jp!pBCAzEDn|_A4gT>^)>~x@!=)POG7W_
zFHvvZyy}4BMMOHCaN8y32n(y6-lpA?3>@+gN&Qg1stZNf?)_xg)sZZ5`8av;W0J$M
zh^uY?T*ODoW#6LFTRrsY^66t6ZqdzPVlo)!SfP%5kcpZ$Ya89--qurTH8UkO6$i%7
zu>qX;4gz~=u-@P+mUrK4gxwY3xNaecw|voe@t5pA9xo?%u%E(*hK+W*__h=#B0lgS
zD)xt5@}?ga3%d+rLI)iro9EFusDY(@=}Lj$NlN-&4`yhrvt_mnpIZVivJf3NPI%0%
zoiwX?jBor$09K$R$|0wN?epf*vOyW)2JnxdPyDLsqv5-wcTtHIx<t`k14YyQ;Do|-
zx|Hg(cNA+8pzStb8PewB=1uA^l<jQYlS6*v=Ozc+J-b{O7Jck@P8(C!My~5xD+{fM
zJhi;Qa|@CpoH?g~R_E=L-%k6<TQaYqDQQ;7?(km@OZVG})uzm=3WjU@u(DT9hdP(n
zn)_|%^_NjxMN4mWSyq8rmt|s~J;qc15FA`9ynEnfC#f$C@jAQ(!FJ&*ZU>8k5&M>M
zD%*4Ek38=dub6cCQkL`}3PE;Q3f&oJ=hiTx)W@`TFAm?XrKL*Bg?3c99gk)5m2<Z6
zyI_NASWL<~f^bGJls_0M3W5zFAHUl=muglE<TSgn=Z;PAZkNx3pMQW1bbfWC?G$?0
zWj;?4R}k^6{Gu`r81lGj)9UJ!8ht}ormR-Ae_~}Nk0R7kAz!~O+u3Z|iDTqyFI~xD
zRM(*?W%xqnf|7*FjkNpnEnn9_l=;hJYZJ?^Q{X&{%6v|XfBS7uR+$xXB~Gn;xo|y>
z(%`p^3SG0+QR@3<P09yCT(`=d7NmEuw%+h%U{&HiY+tdCfwYp9N4i5zI1fVgf{v%$
z<IYX_+Qp&DYewEFGtZlUEzJkK4Vp11;HX-zysSoslT>Jrr*#C=790JhbWCz*jYJB@
zvCmDKe*MfogOo>}Cv8Fpz6|qupIO>^&X(T?8}ohPD=-bHkvGA<b{MPA0;?`^jD?Ji
z#XYz29^eNid0W?C7N-)9tXio|Z2g^}=@dl#%#;Ckm`hZ#6p<dK%w;xDm&r2M%^M+C
zE0R`c1-MXSq{Yf3@YSH4(Xy6X_)=%^QqW@ow7Ci$^u9D#=Q9|3*W#e)qJ8SE>C3~w
zgB)WgS`Rg|Ie|{LG!_>L4X>r9sJ$fTs=>4$dae_K_X)rJ)sgb2!LrhNiy{`2Z}^s*
z*^ReN>c}3IjT<BP*zWBtI5sk~XJ<63S-dRJ3w&)nxh}CiLi#e(&RIw9$lTQ9-Ikcz
z+E-R*SEe87I-tz|$UOWj-y-HeHnGru&3dC9?rFrWQ^*|m?T_79N2lp*XZeeJ{A-TP
zgg*SIge1M}|1<aeuL-j|JrH!)W>oyg!kim!kADxI7`^<bmtZuyqWQmA$0xs9$y+~L
zl|VtW>D0dZjK9@+9mGejN#5;-H`WB2$Ny8*I`ki-I=Om4r{$BbOLP)VX!nQiW!nF4
z`4(s%udDp0_~+zvGkTMPe=^^ky#F`TYe~a{hhc}aH?@g(bJ3od$gDM3@1?nLS*Ft(
zDCp4<yNdCEeo@s-G4y@dY1u~`%=q?*nl4KL(lIZ+`XH?IDm1NKGQmzC>zW;IJE<!;
zIg$NsG_iF=6GB~92SH0tq&<+|_;bfZuQl@LkqbQ0B2(jbi}3wgEB`BYFRS(hV(@?u
z-CV$+XfUO;{pmH}?#KlSUG%;<=$vJc`jdYa<r<PMQVMkuLSR>r_m~$v5y+Cil>Zpy
zi#_@jbYH6g={KGJ{3Uw<4?tLb-~xm7s;Ue2;lUuYJL<pNZ(dC8|LS;5O0V@uTAYPr
zucLl$Hm$f6Yp7u?TdxxZ3__&n&O|sC7!QQh#wz6{cX|*iPZ<f%KR^HEm2t%KW7=-*
z)82>Onkh<CC-Qv^M%d#ET&tdVRf0CY*pW;b-rt+Kt1VxVF)(+qk2Fbd4&_A7yAx{R
z@Chb;ColQGW)v_me@mbHR%hA@k2%2`f4+e=_XmB#_)1;XcIU11Ag5Pz;Txq$(^OhQ
zLPB0LoUTRQ?m}N_AKo~=f;JN^WXKoO89}RZnbD>YQa*xe*Za<IykzkS<V9sayQef2
zYG&gx=*H*r@vY6xojrbTljLRwOKDy>S*LUP2sPdZXv^^ryGvxMJR&I{lV-49%3Pll
zdYfE7_R>Z0{?r=dcjNp)WqgUlY1tIzTCwl`^(-n=(<-Q0g+^}!SydUI+aiayjf7zx
zB*-+mLi6r^ys;OwW0hDI&OApoW24a#^1*sYKnSwQ;d_mOuFL2X_Jd~04sVt{1&gyf
zhjT@nwgzJE{gTSHB$dLrtL#fDqDOVQ<8e>RXG5d?wuaQ5YxdT3=jgVtuQ%jc(H5gj
zPbxf}CnyQeFu;q#ZQ)-!*yUiwPDtqxkRD+z3q(Y9>4I52f2u>7kRl3Qhv%15MoGzD
zwm)~1%@Yw5anHQZpyb(BJ(D`6D>dcqD2o2Ol_v)m!j!s4ZIg@@uKt(mx@5VwAqk<-
z=D;6xO7=#1!9XlVdRErK_u+9RlG8I%G!v7H)~U2D6;S&RlTLz1?suCE_&Pjyw`ng}
zuu7PvU=HwS#|x6y#U-LHgwti42`ZKy`Ed6Ut<9;sD)gv9{Mt-c2vJE1_sMdP=)elU
zv@Yj^ZP5fd3I@&Yhwc2j#)FOI=4usP5O`k_jtYYT<gHVr``0l%x>&cJCbhQf{Fyo&
zhZuMi`!b#0>Ks-^=mUZu0vtsZBACGK!hR?UHvYLLvU~hKXSWb>2JwLz)prz4nNnWm
z%FAA6gdDafrQxBcw3|%$1dNCmYGy8`!_<(Dth|N8HV;r%u+tL?m1jl_AU&l%uIUE!
z3<*quFJ`hj{p)rCKlk?e5#Bsu{3g{N_d7p;1Q^cGp7FaHrDSJM_jQvcbNZB4xCa+>
z2%*O>xlAcx+C*4JNV<Y}au=*m_nw~*-DDG77|<gO)NX|jW;|Un@v6o~BwHj9OGhh}
z?4dDjU!$c!O3l!RLqkH#qy+?d+d-f%EW|gWtER0@zVGT-HLpH08ok^K@cKn2SXszw
zK>2c-()7Gdk;}vh5!YGXVdSTj=UTtoDJw<U-}d=@29I)@Y;6V7BFn%#pg3|yc{xSw
zELf)1{6uG-jg0h4QJi%|%j0(XhVkCzT@Y<cq=l~J?&`Lcd?g*YJBN~Wt@ZDNjKR#V
z*~W{!xlrZ#_U_oxbDf;*zzsFfK&jn|HGrIzN@v)s?9T)OOEb{4Iu_8?agF1Z=(%D=
z)QPHXH`SJ9gbc-Qt%wtC1%<CjejlGKag~ODoSdRd?kJ9}sbNo?0EOk^5ZQ%HeV32W
zD(YvlQ{D9u378fU7pHk2>oLd(9!c#*D{=~LwLf8c$Iy~U)wuMAHlu?*;Zd4g4!z;!
zHp|G!2tCM%kE7w0ikh1LEa6Qtgj22~`C9pArJjK6C?cEZ6(sFvyAh!bEg~~O9<qD+
zOdt#KGGHFZv~J3<V(Y3xL=|(!tn#F9TRvSLz3{_#k3naBXqm9<D06T9iJj>?w!brJ
z_TDQ@8|(F+jTfHHnP50`s)g5&-K8uKWQvbco<^1HYf`%NOYh&+98}gJUes7Gqw-wm
z05=!p9}^GVZ_wKkMK80ic69H5T}lZRCDXV()4$^2M^MV&KGcA8DAcSihR8~(g9#^7
zab3D8FWQFjf#~rrPQTFQ3J73ji17WuW!sF+S6**3!Z>Z4nsKEWD%!5mR3?Qu<xq;l
ziGk3Q4#X~x)m!obInz3rt6$*QJ*zjRn!?7_V+#Ab(mZZ{%b7|)Lr+L25<lms&uGR>
zzoVtz(0rN`tYlv|RvK41<M)#Sf`oF8tH~Ir<ie0b2E1QY3y1Vhs7TUpgv_T$g_lX4
zh4b^ykuL4YSocX`d1J4cUNWfXsMC)uIf^p`q}UUFou#r8F&yO~Xn+mT*azx7gm?Q+
z^$xp|)*F^+QA$4)dDyefQIRX_-G^Xt14YJ+Rt6P!BEG5^E}7*kdEvCKj!GU61qF{E
zC36plp67$mXx%#estjJe3iRc^k*FvX%p<aX@Dv12;Vv~cOTw=bFr~wcp0Jt`W)Ys7
zeFbytQW&f{x0WXW-nLbIJ}fRN>8rQn6Nd43-J-$KTDPN4JK1#PUbG6c;_@Pnatx={
z@2&KqA3RJR-F7U54(8?UcL)KE$JV7CbtLDVmTj55tDy#xo8HgoAow3>7(Q`c056q!
zR}B*H3z={viESH66TkuTb!Ibd5uW$gXxxZqVRDu|iB(A!t*i=1#;-l2VNBonMu*(?
zxP&gr+t^zIVUS%s?FvR&SpmXL6?Ju^S7?O2X0;a6Xxuh8_^4f-v6Z62zn<K6p7U|o
z@p)~2=oK>G)AN!v7_7)=ikS4{ul8Ou`>_vvqf@|f;NIVYYtJV4g#fO0Va?r=uJZ0a
zI>IsEs$~l(mhZ0O?tiZ{BS>wh0#-g`d^ez~s@kNTptxjvu5Pds2+H|LzVO|0g)(aI
zdyH%H<0ABFPCr(j&(i&3nEe)&(GHuV8@irP5~Rq>r{N)oC-e~|bBDZ@^hC2amI5VM
z2@KIHrx};Ouek!m$#)jDYUHWLn=iiyYVC5KxF%LPKUl)`b)mBy`~zh87zJvTeEUSF
z9RaZp@O8cU+g3qaWcRZ!>?Y@-Guk}q>GyK&bE<@`g+37i3rO6%QBZU}rgO6;u+_kN
zb3yC&WSJ1R##2|QwWhpMDfAL63cEMErG-RiUP?nCrNiU?=cyZhN^Es_QTx2iZsuzK
zIJ9`zs7<{mC6HC3L&)#Q8NIzanYO;KH+&ItbG1irS8)~ClN)`#P|9@3u;E9BAE$ZO
z2E)>JM=G7dmuk7;>_-due5{1Cv#Ru}4(>}y`pu;)JB1>u2}k@S`YV(KZJkRx0Twuy
z6g-aDy&nsNd(am`Q`FD5g%=40n(h?8oPb@-(a3_n3!A4FhEzMzWEH1ikG>Mwj@)-U
z2jlAhq;4_6-ux;AjTvh}zA98#U3K<&k1g0^CD=qU%~>tJo2AtIwvm%gV8DenV)-Kb
zZ6Ui=<bnz5RZL6N2!Wq{f|!it4p%y+oHBjGv=dy0+6}3uqZ6^Tk_eymQlUN+Q~0?l
z*~)#IH={KfcLV*>Tz8sSprXE5bYynUZB@Sz4-J1_Go`5)vV8;#H3zLwA9Yj+k_zb_
z>7;O$E5qio*XJ`9mFv9aJYAei7kQL0e^y>9e)3p!a{6|6Wd~z8fH5%fM=l*kGFdo2
zcv>K#j2DO_Q>n@N7xK6L)l;SWDypiA_t&<ep9|nL+*bpZTJvBk(#s=J56p!){DP_q
za;b>C2_5%YL5lNPJ-Z|JF|vyT1(Tm=!q=U-=4Tsh`L^1lS}h@idC+h1F}E`cDRue5
z@=4kuBP(K5h-L)10_=7z_}~n7OMM=vxG0KT&x`>l4fnd-C{)JbcYxg7o&*}8l|No=
zamn>kWV_y!Pbbpr^-;l>eLq&o@J_lwSsl2}b2^Y(1NDvonvA(Od2hM$d0tSZ38rbn
zHPLPFoan9&#JDA|jt@F>zNA#+L(+j(hkE+<WF*k>ByG*nj4eo2=MO<0_hO&>1FB{M
zX%-}g>28v_yZ@(I)lc~DN;B)C$dmls+@8)#rbDEn)0qtC1P^sm;TLc-bG&y*p$8GR
zyGwzXB30`%<%g44)VpPne24v#dV>1S)Y2uQYL~`AP}gjdci%Sl>RxG>Myox1n9@^e
z$)UPYp2O@V&|22yXAcpv!7H%xZ}sEtB;+R;@1A0w-daKo?Zc)Nlt+gD8@V!`%JUSc
z^TG{C@ie@f5Y!TPZ@rP%$Q53$a5^xcGSG3Y)Fmg^p2BB^{q7naNQ@?}2@EtkqS*C<
zlJzsC%nyXuR!)d)77G7-n-@%u>!ZjzcvSh^u5B&}!sFXG^XjDs(0KTuDfy&R)3kj{
zvR&5uUf$lJksUZAr0ZeHA6T6Zk^34-0w;O$gnxJfBGp~`R#XVUve~Uk+RW{N-s-%`
zG1>t3a9`<rpE%nhoNPY24S$)Z(eyToe476&Qw`?pq#`2Q)zqJd2Vk9#_xk+<!CqPe
zMWk;b;YO*nT51*I_397)3}Ns4g*JO;^2*)5mISTu<KP*J-c)zzG13r&cM*9YE~e-l
zw);WlC0`Aj34?R@?;QqxoN{%s<(%73hiM=Zyew(22EHo6g+4lYrvuShO(!D4uDK8S
zuzNo-EqtGojnS?_?|rW*+3;nhgj`DU;%aoN#fjPp*|_l<qv-iI$)8}E?tElEVk8*^
zoY|44K*09Hjfstdga(LgaRJ<E5qbz4bkIR#%;40~R)nS16QybPA?^0yna*>=^|aaK
zLa82AWsT-zG$CRSd<9R7_ZL8Z;>(o`Y&UEC!rf9Rmqg*C{hFq;3KLGNx$qaPp2JzF
zi7c29vWe(HAxVb*<R@Gv{z47sZvIFX5;1g$H&D*-_ZjQA))i{%$Mb|&Ok&auoHhjT
zQ;udnddw`gQixcau3Df$GA9rmekOb$=9XtU$ASe(?PFH3Jpn&`A|+*%0^jV#2I!O5
z9`Ow&t1odNYeL?!c?9);o+cPe<-*-{pb8tnF&cR3S16a)Z-n0<ge!SiS@tPC<EYJ{
z2B{vhuBv38%mdMWeh%YKlQ1-VlWL0YsfWJN^Bx-y56^tAEalRXk(X?c4I95z(6_H|
z3+#`+e8f01YNf`Xpu}l86Kpz`dW{7CP<)#%Pe&0&VTT+UVZ_6aqi1zlclM}S;7sLF
z=rgU&+2@mH&}JcOskj|QJ9ZWLZSAbhg5F{q9Um|2)~u=k-wOGCcu{qMLQVbK0xa+%
zX>^{J^nrt-w&j4OLy>7tkY-MlRcTSf{gb20_?It@ru`oVmb7kF3Z+F9o*qGu2dNaQ
zW^X<9LCavMlYUxWe|v836y?5o^%uqrN%aZQv<r?J9yR?``@^Q^MNDaP8$V_E%KcRF
z060OtAe|T`lCd<NUR#B(HQvYy(tA{c2U$EAVik2Q9-=1{kDYXiq~c6p1<I?c(iHA`
z)XIo5jDhrLIU@??(hM8vt}0)YmXy@7{8Il_XCX(N{fI){pmw2cQ}b3;U0q32GsGbI
z#XhDdYRv*?Y}^EvrsDDW3g4`0tp%s;vcE(GNzjbqW>nOQ?OO(hh1O0H6B9zYRL-2T
zGVE#2Uc(KU4ZmA!cSyS6i+j`lya!+06x6>^ER!U&vvj%G1X`>qJMegbr+PC5^=5C}
zFZGga@Q&Tp%~J!N4&U65S{okX-x<imEBiE=vL$}<amj@>$*o5CtR2==q;X>RBDsJa
zhh>O_ORLH7U<6J%YgJ@d%_GV|Wrec)>kHg)6Z3GR`W0J+Y-An`Zn^Y?Q|F=<O&5p9
z)mVj<-G-z2u7U@FQT}knVccDY&kKE_izmDbwH9{W)oGFX@}#-T&)M9qp1jNpNb8$*
ziaPq#OS=|$>|NiEat(g`NTE2OV>qy5LA>N`6&d8dgU<^{ontb0fkweZQGLVY&&$tH
zU_O<Pky>cbNaxxKE;e{@Fb9ojQV9t+Pjl3Q9p3NOWrYSx%IN2=$Pw>e|7w-kZ&9$Z
z!So`tf-H_i&>6rHBvLvf7@pcmzcUUX{?E<mra6nt%FeuZD$IZFH_65M;O@tM!?a_m
zk$L(Df|3{5{2BQC0egZ_{c}&@Ul{CP*y-Pt%74B5@b4WDJ2c*1*skYceWw(`KZk(c
zKw;_HFq6#KtnPnqW0*w-UJ=Xw4@B;Nx?s^4qAdNebRIO1SbBK0y&ES#wNLFSm8DVA
z^QU$f>~i=z^Tj`YbaBdId`4x%7W@9%|9QRF$3K7CQfK|i8vRdw{VxdM|BH?Pt>M2{
zRf_DUQiMzhTV06!5n6&Yh&qg}o$DtDU<6}cLhQmXeRmEgClt5@6EXT92#?GJ_~U!R
z_W|c8q*=KTROE#)FjaW7Sq@m`vCPNb3K`Q9UImIW6}VpB3*F7z7GXabf+-J@w@y}8
zS@j6nQnLG%+x2}A@imnJEF0J*+WmnHsdoiZ>iW`5_ISxmlEE8F#o~7zkVb*3JHndn
zi1qRiAVNQbM=mZj6ch3`<(bo~rN?P#jNLbmilgZ01@SI?KZ4UndGC%NG_S~P0_=F?
z$ws98jS4UrnNZ^bo41B!ianr&c+?N%(`^!HPg@wiqHVE#IIYY}mUVK_^X%K9zC>v%
zt$#*jmN4Uw{7E>bhM)<7viiI=2e3}`!K<`HdQ%mdPgCMtX`!^L3yZD}BVsBKjAwh>
z+oY<UNL=rC&V2aPULY)ecpEAU?(z4OHOdU@tM8%Q?%qOf(-poKd75oZ!sh9sgYU26
zZwO_tUke+iDHxNLDW7s3k_tWue>);p-HH5sXEKZ*mM$wH0Rr`4eCvKf6dN;{^`|6?
zqMiE7gQ(;$^Es%WaFsu<vz&J!n2f2|Ra1&(b0Q2IBxEmz0dCGoKX!V%)HW%<e2B5o
z+KS9=ei<x(`Uj&yZL*SjF>kV6yD!xb^}3y|gsl9D;}3lLpe1SiwRTD%U`po}v(3A(
zcB$A(SreI$#i`R>^QIH0b9P*{+|K&TamvB*)BUwx0_XGf3dG9l)vl}Vv~EVTE^2Jh
zmz^U&%x%gVn<6eUF(>r9lu2{UiQ{f?UL)>Z6r}?q3?Nc640T+mNp53xbZ-WBKMfe1
z-94(|XWpvtM%`I*0jPIO1{~Otcg+ob)g-i|OZP*^MeW+X%ghvPJzj#`heGZz)XxqU
zo)p170BE=rv>^|v(_jv!-7~sOt&YOyUs3~=@|s-A42Sa}wZC?=%MN%=Oh{dYZkaLL
zOLHD9?-OfJzuh!OJ6<wt?^7-zbndnjb#C4aUNX`$!WsFb=n4X9h6X_=$|#_tlA2mz
z?+Nh)^D-c#<r-N*;EIHTwCm0=3V|j0Wo6-;a7gZtUUBW*x?l{QvO{Qb=aE;9;knuz
z8MmvEYV#FgB7x3m^peesB@K{W?Y*v|Vo0epIyPfE4kII@Z_F}(11hN*qMJX^q={Q-
zJe($Q7RPX~m<5_WL+|Zr^8#oxVd|BF8U*E44Wol^NR(nr@j>I#Jv)TgtY@AU%6mnN
z_*F<wb8^ZV{mR}?;X4;0aTDgjrVt3<*nsCH7R}Ia&DZRCznN-h`Yp{cv!nh<Z3@&x
zIzduWX_kf`qC6%PItf>(BvlA_Zl*tlp|3p|Z~?adMC$ccUAgaQV)VpS06cw6!N~1J
zSVv;{C;;LWv2@rCJ^7-!ixT>~we%t4n{>*MZd_9kke$wNX-TaUu6QjBLg#ncI_d94
z?MmDEBpdAOr3bud=oM3~$8kJv%wbs?R0iqX8uyp{ACQCEwa!HD{D^Zx9!L-x#3?1v
zK>t->qYkNNZPS!q;gU^%zAiL1=gY3n?q@1Jo05<7<=5-ZtqTa97xr@IckUMl&or3Q
z<LIKIT2?lOp$MkT4zD+KSo&gOweygI^#^z{lcXtAZw1Nnb)dIwd@k87q5ctQwhz^j
zyuc@>NC3q;xFa(|%4`Kn&@|C{2^qfetxb+)p`;Fo&W9T_cI3Y;7AMt6K;<6e%if`Q
zYfc(9=mC!@G)M(Ij?AFqVd3Myf3^b3!@GCl+Q)~t>0FBx<=zT6S6?J(v=<7*rE<@B
z-Nu~E>IDfcl$*$89)RjEXD%OfwKdfnQL&Y2!p1-AW2X#u_I-$u6Nt}{it7Z2Lis~W
zO#h9#w~UIaZ~KN-6ch=OZUt%SZUyP?ZfS<@R0(NBKpLb`O1ev8=y2$v8wMC)=zR9*
zd0zEg_q*;7?|RpI{lIcy_RQ=(d;gE)SI4%S6ZlNRVI&XfWTROsju=X3MKx}F7pYr&
z3|fKG=~gH&e0!al>hNw@WI5tHW0jo1XiH(zm2-gy&Gn-UUua0a^<O(zB2yp`=Eum?
zx>_F$7+17P#|eOXjw|vcYI$wIcKXM@P7M+2cB&uVXhvyP1buVkNQT(S>X~X@A+bih
z#%C5+3u;b>YDEb_GILkk%)Un@Aq<s6Q0Rre@6+Q{oH)Uza+}HV_Jb90b0U?mlFqc#
zti1>MrKYHp8h}|#+}*aue>iE-R|#KI4<(k8L;IN;uzYzj=Nvn#tL<S>+I`8KhKCJX
zwm0;?yb<S$>EB1og67^9s0(zIesp81H6}u}Ij6IeC+|8EHF#eN^Aw^G%Fs*J`qX<z
zmAH~^Sg)q~kU!w&dy3lrbKdTAdq+fiU%J5Yc+Ubg*^h<oZ!u?D>VBCH>Ot_YQL~9E
z)m04ps_*Abc&~$NXjCclBTMVq9p^U}Q!lQZN;_(n+;l<3as!$ozqmcA-oRWs{p10j
z!+X*YUC>ah;qw9q4shriWCN10-OZf_yXnr4ml<J4I}<uh<?IRN4lQ_&obnF&LnJ72
zH|=^M?P2;2dDiGwN|*L)n+?%UU74O&guDFQws`2aPE|MCT75@go8J)ftOaKg{pRX0
zbJIYH$<GPQTrEtvB0QIYYk~pr%YB;{QPq!#^t8&e=o88-DNb6;i&V<kj%~bNXJ!-`
zOblB3U1EK8SfHDB+<lXOGCj1DIr!Ca_N}CCPEuwG`?aM@4<=vE*MCxtn4xlK1`Cba
z0Ug;X4#vv;XMPKG=V_*2X5F~APFo`e^Gym+(!(h?`j{w9zmfEQ=vtxA&~ORV+pvSB
zyw1aO7hpTdc01Y?eCJ=u^UGxRtpkU8rO`qQN>9~7TlEdT2E0iVnpA0pGKpC~=fhmF
zOekJz*7377<S6(dh-9->rwsm55H~*;NEh<fn{>QzXu5ELi{dKVsF(N=@s3)|5%Jkl
zPnr|%#|v{7E48?HR+fz4?(<yqh0<B*)WEhVKY2>AIH-^L-8o`jP@Za`PVD(r0Z7sl
zHf_{+css>9Yudgz4*KIUkqa-uyTbTIFafy$7n-;)uIuc#1&h4(_8l)mhA*B%xD<=`
z(&)VG9!2WJgG&w0@dkc*Qbj{x$N3pBUWI+nV(q~hPmppkDuJK8qTiglid>@t?tnQ$
zTbJwI&WH4!3{i9g-k;EF&u25WHQrd?!%Xa!lJ(%r%)3|wJ}^e2!$%&h%wme(-SDY$
z)jJ~RZw*SI7c~dFYLi}i?7lpyJRoC8z9{=07)MxNUzZS{T&%&TU>*c^la96DLrnQG
zJaqBe3{DJ`0vGDxg_*>bxGy98f|*)UDFBC<l;p{nrmn8;&Du+EI@ecHr;nxXttC(%
z%N@Z)&%~5-g`o2^GxHJfsP%!-n;v`!SaB67)V_L7x+Oj7ipiYAlpg+N|8N;SZHU7;
zv%<a&Q9U?Wzg;Wxwu3v6XicF3)kA-vU+#M#3v+o5Hb~7!auC|Hk?CLz$-IOtW$#U0
zV622-k$Ud-G6S6(pa=q2J((Z<ddUvIohyH{AMlybpaARo;o_|yS+s*5Gqp2mf~phv
zCEYWN(Y}c480!?G?nyiXx39JiUZBTL`L=BlU*(-M8-o1<tR)w%bs$_$4f;2v%Ei36
zK=<d&GYr^ZGi`Tn?;QZyXhx=@D>V4p>50iV6&FypHOtCPk*10vMH0rGT&4%f3YWqN
z=5O&qc!3CVzhlIyv8dkJ>t6Ij^OSYXjPn336%7rS91MOXXT1eNr+TX9<nEdI&XrM^
zdVrAMp<nDp#e#ls>&~MaZ2%`qHu3!88bl3E4J&n6PX?&a;$M!9McGyTom=;N!icr<
z1_Yu4OG)|CNj>)_{0AoNlJeh!b6j9XlzEN|yghm82h)wGwk&mvVmx+JKfk`71kbv6
zgfPFL%^03<Hk$Oy<GeNz>Cqf$`Yw7q3d9)KVsx3bTS%wwbf^WF!c?@*{9LA24i;Sn
z$^n)S{6&AT>3OZ$OHN-(DK-q0)Kiz}Z;b$iPvzAbowIj^yZvl<)aPMFW?WYUVDY5<
zaa40PtNiMm#+fL45_OF&6T+mVccrXLaJjwJQ7LZ(=8E<0w3*#Wop@<t^jQ91>~Eui
zn;W-o44N{%kjD7ygCEw_$L(**zPIh37!x(rvS3rh7((b2P}F^)Gk84e(xmwI9{94D
zqVJQ=hpygiBj7e+E`PYrniNv<V1Vf)u4z!w(OGL=XWKVQcI%sXXxKdF76`QUWYHXb
zebE5PsG_2>wJ;=W(+3C!hjjS)*2|9ZOYS~b4tD`EEwO*Cxnt&QMa9p{YEiJ0KsrEg
zF1cRZQ0V7d16M=oS6k{idu(&__ip#;T+3^C6)F{v!4SHIR5vd#ek`z4Krtf|Q<&?Z
zxp?OwuOUDSh$^<=!`j>v5)!-?;!VN5r&&2HE5_G7?*c0-;3Yg50bdwUL{_TlTvinr
z6rr_xgmQGi_cdD|5YaFP{G?_-xcch1{Syc!p+4K_nq+%6euM>+HuS}_IQBuOxV8;~
zCtrtLOYCm_>i5}Q-jquEY+vH(EhJ3L^(^7%Pk6SW_e$e=WSRp*t|)Kx(M{HACNZxu
z3MDfq%H%N0FKH$jDogB3H7TbUkJfqY1!C8kT8p*0)&AR3i8)8?I0xl<TjjyJ8Q05Z
zgX>8PEp_!*L$W-0$Cg(e&0<3$oe(t6LhP&<m3&c6pvdk9IFhy&G&TKPs1*ReEEY1#
zv<-8Cm%7q3zO6Osv(*FiAv2nc{8N|<#;s@vTQ&vXhuX=G8U&5a`xx=K$&rnF{Z*P;
z9k&$P7P%+E6F3*O+R(}B8_$c?BI<pu3{&z*QYw3H(8HTMI8&u<*cb<$KtIdo?SJ<-
z=XiS4uR74Q4J>K~QNAEm-@d*U%fXb>W+uh`PTb*xQK`&}VKLvM(E_1^P8WcaftKkY
z{K-T=ZZ&7oEu!Lr&VA=i@g94umYaD?p-0>Sj1iP?N3DBdO-tT^lV4n^E&~@+9ppIy
z;d<%9WWp_|W^Lh@SNW-P_y>tuL%z5rCHpR}#DlHw6w<JJ1yS6mU-sJ!<hJ6gJ7!J?
zNzd$-1Do&>Zf2$_{hp2!lBI+5?LZ+Is3<wjJi+wat!qu|B9+i`aT_I-zpXf#%rSYn
z<PrBJySr&U6a1ho`qiY1=Y=IF16d>eX2|mnZSQ-2eBW|-L&{&8lA7(}3R{f!Lyk9{
zG-b2gVA9(+4!yCH)lV#i{_vHu6H&5Z*?iS;nhYu2wz6VkD=7)2kj^DXQ=*3AkTI3T
zvZoT27K4{Nv&p2FxW)NS^IjV|OomDG2{*E{_PhY81^$bD>+A2g{*}v45d&~o_)(<1
z-4>N9hK75$j#=^9GOgd5F8QvUdT>`6B~(=_P9=E(T2fs--YjLLSjT0@T@bi-6B0CD
z(9)_H?j4my^4i3|s<a5Z=@;qiH&EAV9Oa72&3$`Y^FBtHA{`*KMvHYg<#A^d=fHvi
z@XikufL$gFZMPu4yRLP2H6*6Y^h(TfiVUL!?b-7zoUpLLW(47HT9N6;v>os!52~uk
zYM}~ZADV~!9{Lr-Bxj-CLIUnSV%ntQE2NwjdyFL9HbD^L=BDs)S%9d_-hssZljKV~
zJH8eR6{xgUK-!<iS^?CvHC@S@E@-rKtD9>EmPM|$H4ejJX2H0(b5QPr#)N<_T?p6h
zF}MZ$(fgQ^>qmmjpjx_-+tJfxAl^4e+p@+APOLh6st)s7Gt!vkVzx6E`GNU9tVES@
z-E7c@@M2TTgRKOj>d(H)UXvoZ@4glD<AOmj1|zjAac>{SFW!#{QZo+tuu}Lz^IEA2
zy9Mkv&7(<*vO>ya(c%tfWc}gr{xT`Qchl?q?X-pSxq*XZQ>V<IaUo;FcV!t;xU4^@
zh6Df9n!-VTexp-ZEnw0luQimWb;tWv9kmM29Te)Kz&s5jZaPs#W#tYN#SC8y3+ZFL
z(~JL1A1SO|Md4dZRIo}}Z+_XfXO!&1*SGI^^bk6A&)y&Rm>>1YWrO$g&g3}PK5Vqd
z&lPP&$G96pOctH%sWQ;9<|Loygpi^<@0=D#I-U8#a;2V9KMx9xxk>`4KY(^ZvSLma
zs>HZSoR&4W3-L?4+qJ$4?VbF%y`lTN`x6WK`*H5aI*A&FR?U926Guu6_(yfGSM*~1
zgpw<^1t$Pc(ghx9N9@v*@xoVNIMKx`Iy8<NX)VM2<f!=egs-c@T4!f0{uXFJPAxH9
zv^kEM(&ph0F#S<fr$zzwyRA21T+!G|cI^VD!5A1>r8?1kbPw*Q6_)=%)V?PZR6Hz_
zA+K{x4r_>ZyY8w4{Q8dpV7`Ue5;RgAZXorK{%z?lm`l|Y^!HY?1-8}_@ksD#9cf&@
zq)q5E{<%}0dsq4Ac0oSEkbQpRqqFCr2`Y9A**j|642z4#t~<F{nLot?_3jCJUVA*A
zGCi>v!xiVhI>MM|rmCAI7o5VcKwrMqo2S~#Y@Ifu^!ha6O{%025VLG`c|YDVrMc<2
zH1}BCtPW!_<K>W1-9v7k{e!@P1-ov8)AvNsVDO9JgW;GZ)x}?EnM;S<!)(`c*<YO=
zMont|N@nw+|0uTXxA|?WDPZJ6Ho$wXHx13_&X4P3H0>W<kqzJRw2G-CS-n1enfQ$S
zv>LFFM5&q(BP;Me12%gd{_7P7)W~C>F1K_#i=!GJXzlVVR9uUXG3gGMBih6II22`V
zJa0%4%1gU;q~-8~u96dhgmCWe*cA%qjDsV%YX&v<_Jjk{BERe^C!hwAQG4+6s^(q{
zov%jDa8P-b&MAiuB}I3WFW$7ryx0&f+)<ffr|PX^YE18dFX^}omrm`Re76r`N>-o)
zHSvd#3ky^skOMEpq9ntLhjj4~<D|>9bVeN+*8MSSqc0Nc(RiqHr!FD23qQk6F$I~e
zy>=w>S@?tGAkP-_zgn%GYl66ZDEc`U@>Nb=MK@h(&0p7~<tN|1cz%ic`{A^iI0NTU
z1HNCk)B+0^tyW9xyS3!OE4S9#TB^6^EYvRz%e7#5BOhKfP<~FXCmVOc(^;YYT<+%I
z$qSt^CAam}qezuom$RPr7#7cEO_p81$eQ&~LM66g;@^Ijd9|i8F}?GOgu1fiU|5CQ
ztYn){NldGms@mal;Pk`t`49!^S%97homeq6sIw>^Q*WTh?8ZKeINmjQcthJShP;+J
zU&S{4OOF{D^WNw(v64XnjO<a`@Te)pu+URF$x`H+27le<Ba^VlPF3uGl;xqz;H7t}
zqPhNcIfCp^@8m^uvm3oC*%~AU;V4kjia(N4^NmE7d`WxD{K~hpi!U9k?Zy5t<~)w8
zH32g7x>`F#S+RCNpq$j(*z{}L($;-3-GV8Akd&G(FCj`S653=rYI6@s)IyNUDq7;x
z((a+d1O*IA!{323>R=&9NzmZ#Tm?bLdd6nA1T_N#a#s?gZyoF_YkKGCH@7*y7qMj-
z`smVGpzq=QA+cuUKE57ytl6dxI5cEyJ<qZ6eI7Gp;e*sl#vQe4Ro+@!eopse5^h?d
z)NlO`5el=sIYtjJU|OAwkxv_vF2{=0GA6xvL)O3O9uxxr1eHrez1ih&kf&aeIbFhs
zFqVv)^ir1>o+45aULb@tV7LTMN~gsqG=x}r9^0)9vy>T|R`l|7fu%loP%wj4Q#`6M
zT|JN<Jjht{rPV8T%7NtWn)cSU`VH^H3pl|iQuWex*2$I8>&uH9ixqm9kyk7?TFHif
zX$micxQ7{$_n3Rg7s8~-q<rgU^5l?HOIlkBJ<(ekeK)8b<GOnm`&~?f(-!;`@2N?i
zWQ!e730w*vQbsqT7$L4C%{yKZo{J8hk#3+BThH0e29px<EddIpwqeVY<Tix3T#_Jj
z1huY`q@@96mBUVrWCoqya#BG10oRA8o)8Q&OQs1Py(1oae4m%p(Zkn>=@gts_~;6O
zQF{4u{&790>>SRz3bRW?&Ezn)pwvCBAMcM2oKAfr$fl8QTBi&4NM_##EPJw3+@B7b
zbF%)gAOG^MKBhP-`+7Ng&l&sd7avSPbP-2Zr?p_uRe-_poYqzjI#Sw9byf_29!-JC
zz`N)`lgGU2F7wpf9Q@mCaCy0z@6pBK%gw6k<%Z)hR}CVhh|}iXO35cCU^R-=tv=aH
znvakRJh6E_gAcl6<$;K)KeD<D#Y&mNx=tj_H;+wD9;A*ysBB9|PIYp&<R431-o3u7
zobuBi@-;VJn1yaAqH$DM)(FO-w9Rq5O{Ghk9c4anuw_i$PSFepcxKD=Q81tPEH$|D
zq`|b+-+zk#=}2E8dzl}_BOTz<Nh6Slyj{2)-p@Ypx#6??bbF3m64%26?R4tm_c$rq
zF4P{`Zm{I_u!Z`eGX)+D`#1>EYYzo>WigR<73)@fv5#wB+nXhJToGfZd}$ze+KatE
z`)YrV=u?p?%@CStyjJ4<t5^DN;6?+-wA#-`j%c+Kb+J7S=QMnV`CjidDDn5t$dx!Z
zqNV)=`eG-{k~ufTzQ$L(h<;VB)pR6}=3qK!zZ;(2-OUw+OJ-D-w!3<}?4IH0-ub9o
zsA)kq`6fXQvKlmF+2tK6I>D*cX(PURPSCVWGCQ<DsciL8F&|z%NeqgNz(CO(tCPx*
zsvgIO9V0r1V?F!Ag=0Fy;uZ`E#l{2`Ab_mK9!0`^K+80tMGHXK9BUF8nckZh-D}PO
zd3rsZm?-GfDEvCcZSDmF1C9a&Xb9sI8}9&p-iyBebWfliYfSI#d~-*L0-Gn5Jh30=
zgx7!<aP-nkDEnmrJsH)P0+{5h#>hg@NdmF9VsXRDG|La)7^wm;#G4&=QUFx}`0T-~
zbZ%@~8Xg`i1gV1pZDVDqp8&k+tq=uD<D7uUj;lb<%@^OQsk%7|J087~6;g%}mPA|#
zmyDufH`nV)7zIKa(aH8<VR_lwXwz3&HpdIGexuzuXAfx5+0k;j=N2iF%3kkRR-6-Z
ztiLPzVPD;PZjW&>Zxh+3L?MPE)IC-`B~yytyQL4gyl}LG&A?q0#IH^o02wVb<orz$
zUP``~7VEuM4jHdo9S6P^7>?htlsB1m=E$y}LvhQCNiEB>g@+e6UD~2%#NV2vcf%(>
zHcS{m-Luy84od3x*w{`+O?OD+r2Q)F@l;-4j?wT`kCQXlkAmy>*kd$3Hk%?XZzQ%I
zjEezXw%%b=dxA&AZTB*4g4jCJwn$J_$ZXtAU^sTu<#~(0+%JZ|L^-~}IK}$dKa<}6
zXG1))`%Tl8HD_}g!t?)CYI6F`CzbYd))@8#So)INwRQNY9*56<L$^4HkF+<j<MH!t
z{&MBt&D6Vs_LFa^WMAa3(F=|{yhWucsdp#$uSFmml7n^Ww&hQMi=Bns<@-09%4LGd
z2xII!HLW*y9@m_;cyI(hs%&mOiLDL2+;G6UeAM_AL~nAe2JtGJI=xcHD&rqmY)?d)
zU?o=wsO7V3rM4AW-CxWg^R^Ly<DdScYhn@^<*=FIxjARoN7pCWw|zA_LpD_~a&1xi
zFh--Q=FAkI(d`V6f@JpTEo(;-h*)IpIchCcp^(u|PheHm7cw0LSCOu0=Ty~Vg>4b1
z*-yI=ibpIELdpd8_tVYJ^#Sc)3RlQ%?SoFcc<q^Fyb8Z0NrlBcSw4FHyXXA+AW+r)
zb8@o61hjFJzjS@fJ@b)SIcq-^C&F9=#2LS2(wburf>_M;zcn|HtG}Wb-)jnXKhx~f
z<)~9=soj~YBJp)mo(4@c%Uf9R$n9u-S~nnuaM>ovS57O|MUwEp9QI9}BQu-ppB8Ft
zz{^t~<C&~6axDG{eM(X^vg$jv`1FgV1t(~Rqb7T#D$w^ZQL1-ffR+=H8SmMTIBpy)
zH-Fnwg$3Fd&)ra>LF66B=bL}Zs?vq2%N|^ptLj!;JNS+IX3keJjBkz?pa2$BS*4uS
z%~SfkE~1Sd7iwptrWK1}GoAP(aCppbfY7M}r_c0{{|MOvx`;pJTI`$1k>Y>01-)7d
zRO5mr@l7R{^h_?w2NGE4%s!vz=LPf`q7S#gEfp^GU%5eQ+z!(d{)z>GC`A)z0do9x
zzHVaXV{A?WOziAVTJb=aU|^e?vuk;cE^AyY27O9Vw3v%v1Ix0mY*4dwZ@DgB<~{${
zZeZ=)wARcA2j3@xeu-WR%d2ooPx?`bX|&SUK&XfE%nCY3e6~{A#A-kqw)Ix-clRne
z26OO<X}oL<`_L%h-2c&X_HmHQNuY?TQ^;K}_(=gFQhm32($I(=0}iy_p1<EKD_}=v
ze$B*MvHrC>y+1Gbg(?XNy4vYi7)9GF@vQie(^b2m3U1rA!A7ISg=GgLU-L8n!{PgE
zZh*BA5;|%@z3tDVw^K7lzyx`@9>@=w;yJ4oI@MP)Yz+|6<D}ic8hN^|*uNY)5jUzc
ziPkl=UpMO3(a@kVdEgmY2jfz}J-s1Amj#dVa0kZ6`%b)^MMe4e>2r!A_Mum^GMZ^3
zuC@IuX(RvIceC$;gjIKJB9Lb*Rhcp{X42~4YH2;1Jkam_ds*JaI-grFStYD`R-&Z`
zGr7Qb71e#Uch~6RZW8L<809|3%gxbG*V$F2B7F}DfU~R9MlM%7n6^!^AZ|Iqp`xY=
zb5~$W`iHHuY9B=+?nc+#<{q;WgONf0vCs6~<MBL216C^5h1`ugN{B!J+NJR2bnL=s
z!`n%cLl5Ob7`+=?H=k4nX^6@FQ<|UVgzeeY)&8yDUOiL^cndTlqj#d6bC0#x2kM{D
zoA1tI({o_hn%i&bHYoYO+d%yQ4~f;sPm(77t3VqMJ$v_bV#q)?*5t|M5W-ZGSx2t6
zcmCRaFVfMbiRU1}Bt@^6m8b)BL;3-$)5@jz+O(ENwYcWKoylC<YIAJ9F@LM**AXlb
z-7R4)VyBW?@fm9Mq;(2vFk1A;VMG7axk>r$!P?}p@rGVR6H^14X{5_)J<d!bT7<2p
zrLC!ll=1-ecx(>C&Qyuoc|HTH#B)XJ@BI?OirX6BNE4n)JP*puw@&jg<e-RoKWCpV
z>MoFegI^gGbpI(XZpq3=`$b1SW%SRVKQsJgk+OS1L$lIPs?TB@paA($^VoOiU~_8M
z9e6gof))3s;a;;Z;qcHIuSCewg5qQpE~8m1828hTHDC)PYn+obH>Uxr_l>g{l+3ja
zb9#8!JuWFp-B$0OnK`ob_4djDP9W%R_Zp)V1h2QZH;Hz$0WEbfx_|BAwnx=%OqrrY
zj%1Y8OcgQyJdCLXtN{2+_Kk{2KxsLHQ6nvX*Zcq|;N-#x_sXqdd;q*=d;&k4*k}Le
zZ?5cgago-Tf^#|@c>1r2sAm%lzeae0UAgK_hL1I<_O+&$VJz@u4NLjxBN7CSOR}$n
z1N?RYZ{MvuovviA$g9EX6ku^@V8EVLf>afP!tjdP<Z!6QiLcTg1)U1c+=A6CjhnOl
zu;+MY_@q)u%P*Fpv|R4x+o5CjfBY^gtiARt-BCbC^X=CDxD9_oO(W!Y5HeXG!VtvA
z1X%YpG`Q_+(O~wL+rHk_B7I2C0*P12q=noJZrl5T$2f{D9029=J3;xs8^ZdVF+h?Z
ze|v8J(-QQz=jK1t<9|Qz9~=H>db}XWK<ru22x)EG_%>>vp1!!7D&ZXx{*#fNP45)S
z^ZR<^Dvv$`_J+9Z2K})Pp>MoQIjY(8oy5gWYt>g}h;&bq+I!4*)pY1y#aq8y>Na!>
zqTIa}9F(1q`GNH4m_Sm-e3E}B;W8X48m*pY(3YG_+`io-j_({dC_x#tTu?v!C51IV
zo77ewL3>wv88{%zLA~7RVre-?-OR=KL$oDc7Oryhb&WKW`ud38laz?m{q8wt<S&I3
zbP=sX9@)J1IF<6;7x?aQmi-%_gi+b?`A<h5b()dEG;?|2I0Jj#sRIV~P$)|8AmXO?
z%HN73|IsOnP`KYuk10A|aP#9B)0F+otlq2a0FI3A636O>=iWb)Zypv^a$6XVXZl~G
zI{q!w55#;{XUzKn@(I_wj5MC$A!U^P{C%vj(EM+5iiF9*3DfG)EGPY=cMC5C`etLu
zh-isu2d;bC9SC%IpUeS&sJd^PNpCkN_(vzFGdD*XFxulBpd(zEq$DZAS2lq0d(;i+
zcEd_xN%_PyTQ6*gfivKDr`7#EuECfws;H5tooi_=hTH_&bXAT5>70?Yz7d2{Q^<b_
z_}M+CB7Y0P2b5m$O8ZKEg4cs&jAse#j}cSC0eCG5!{-RCa-Y+pNYfW(1XsMq_?5hB
zT7+jxkYQ5caIXhC&yjn>2kEJJ|0LUR^Wv%hWbLQRL{`&NZS7PqVh>h>ZuljS`A|Ol
zPNVG$CHvA&i^d0n<kHL;oe5g&D)y~mSvML3T=}K`ail!*+3?WxcQU~8p`eMHm=z!1
zz{m)E%SXtW2x&RM$@Wz~aJc2$8-}yvw%i{ee_^&qdBuX$3DzS$<#aY)05#}pzk05B
z`OD+iQvu5j#I`hUViB-tDFp*soUB8IHqzzmR8K~PdRDqxbzBdG{_Ga3>1r1N$;Oed
z@cZ|0Rp281!@4zFNKFPVt>?uQL$+BXt=m^$%UGdvJ%~f2IrvEgvp-H0aelW{a}xHG
zO96lzKv6mzE<j9urYa?O77SUs7DNR;O`}%N*xY8rd)1cvs#(_P!9UeBqDo;mFd@ti
z3`XRXR%A=h`36CqX<R1oGnKU8)7_j{wmrg3Z&7FD(eMYwCcc^nvh9^j{hlsn#3$dW
zxkL|T#tz5+FI^_|q(p`mN0Z4#vplO%bcJ${2Ia+{iOxf)HQ#fttl$gfS`_Qp4hfE6
zCYs{ghIPX3i2#FM^0N5-kF~NtfWJxk+)^Mm*g*ZQc?eV3dgh1!)FD#eWdmXldt`~w
zb!9SMv;m$Yb?m(l$YsiDJr=MLE|X~)i3WcA4cV+xs;jo#8^0COgSoPFD%XM90dVPn
z{3$IjpWQSY2Hib?Z}`~NLS^KuN@=(i;tmg;g(#GiiPzTfoecn&6xZs{Hz-#a`N(Aq
zxVnL>?EN9Z<XJ1hw^%dm!RXS0^H?R*QpXEyT3G-D#VFtcLF|<Lb2uL_1`4pu2OxF{
zFQypjuDp!?z7~L^4QTDCv9^E4TfYg6`)h9X-z(qWx#Zt#0JgZfyzx-l^i6<TNNv%=
zp$01MhWrcapS8n!0jWQgX2vZIG`+HpPm;AEqIv2gE2vQp!Y2oB`@X}qC*6u+YE{3f
z+)c!mkkQZ@Kb2xMa`7y@4RWEX1T%b5=r=8}@EcSyHxIsLirJRJlFRoG#(nU-)jl`=
zXLQJ*J(|$*eu$=8hHCwdcS7GY>XLXj*5)>!1&wU$_83@gE0;E<QhxD8w3`9A;bwW7
zZhI>D<Y4UR{3xBZz;X^#RO<Jc1=$-cAs21_#tk#PV9IRlV^=^~I0XT@5>;aPB;hYy
zcVxA%$6V)`x-b8UfgIlsLgWK#iQbJZsd-vC${C}T-P+&P8<>yuHl_cVnbF=TaX+!q
z46RX2^Yv9gzh37xg7*?ejr~j40idqoDrBI{cZc$oiM8_yRsL2OiFaq?y3QXHW_6>A
z_<uT29jt?iJTYtBPs(Nc1EVe$IrUrCiSt|a@VKzD4rXKpa4oRcl%<=ng}KvDu|M3~
zbfa^j*ty$wGD&INPQbbST~)t4nyqE^wXUvQbg@^8MhT^<ovuPa7I{a3Q0JoN{is%A
zwh1`?q+3SPD0C0B5RL-uExCw$%dWVYu#1Fe(>>@D>jClL+DcGo3z)EW2Byw9K_nIJ
zQ{~wWX@z)2j}_{*1|zRb2=kV_0-XZ>k9{b*P{zJSln8G3FC@P5^CUtXs=QtBdd#oX
z)bTp+2jp`*NCbdFAobzVw{z~C#PC5grY#Io{hx;e^>)0NeagTU;SHoY-_aH751Uha
zEj#l)Q7-V)AxIWfC30ODCZ6|y%oNVOQ<b|`PMF-V`h-Ox@EvP<jAn+zxMbx<xex+G
zVvfDq(;u)l=g@DRa<25W!eJ5lFkP4@o@1q0Z`9KFXjjb4dF}GCcE<F8(W#FQlbGf@
z$IoSapK8Us%tY~r&y$n;RfMHtx$UWl^){q@D@&Ls%DZdV%In{@#CQ9h3cb1b{OxTi
zWuM>a+fP|FpL4JddyOc}(+9C~**Tyjw`3Ze6W^l|FI>l&R4;3WeOc)<;5+4aLjoQ!
z3r&E;mNg(D%oeNc0ktC-vJF2sT#8%3(NF?NVYQ;%Dtk1+sntPbK`F#7`u@;{6?=>&
zMHnviBoNu(KK;7foGW`ugrg~XG4fw<+$ALS|3&6lEBYRk*wAoLiG@F1BPpqlNxyE+
zUjP47>X_S|`~MHjF;K$3st=k0?FHBJcc_ILd+p<>M^>8+rzIm}9sUGkTxMXVl>I5F
z^0yAp)vWfadp&xcC;`+K#kQnI9V?QPn6|sp0F<=xUss25zTf!xh0Q~kK&mPua;QPX
zYGDc#C8Si-$$tA`#ri(Yem*hZkY+KcW)q~$c%m&ymU+2R$xZFPkOO9J5isjgfVo)4
zH&74c=&rkh$}%b4qwkj*qin6L?41(uSM(z}^&>MPy)#$xS-w5GpoQXwgsTq(xyLpz
z;Z390r#TN+DfaW6CQ|*|sN*aAZRfUJRhteKCce~U8Td%->nw<q36rSWw=KxZ>W%Dv
zegSwp)HK}z!I%7#bP|px!ZbmP@Bqo7EwP8W#g$s8m>e8-6>8YRqqmytxU9+uat%gN
z-?{VNCdtJR{Mh{(wmTBwWui-voIEX5!AF@F-5IJNv|?+T(voq%c*q95Q6ccN>PcN1
zAM2jvDZO7wztFe-tD*=iP$<tAc5p#p)P0|$7I36qnwuo$%BE8c+3*Z3{QBbDWJCHD
zQ%-l&iPsAxOm)&_Q;73}i*`hG!_QaJUf*oQ083&r6IO-!l4`@S=N*_5O>uf-JXOcD
z6NX}pZc%vi!B=B`Y=V!ac6gOGy}AtwCtn&}EZd?UclrKsWuBuGZF50s_b_`^8lJ#M
z8LDDv@N^%=X`CGH-tIIn>)%d3ORywK1zS&C^h{pAtLdlSw&Ec)m?lVdyhSgi8)H6{
z_V~T(#L)FSu{qs#H@?2&Rq%cKa1v6$v*zgA>|7If8v*q?nZ}_bLhSo9nO|tJD8%8~
zWa7ivZ;-NH5oYX$-hQ~PqhLV5t1NPX<d#W8%PMvj4h%b$6$&qkaZRmaKsXSUT4rE6
z0hA|2xB5b`jD!j=BTcwi=(Cjk(OelbK!;ye&@3*K|Ni~EB!mlqwbwF{{cD}O?w6UY
zzX9$C3Rr`Tsw!1V{*rqmfO+o%G_y>6qTqq2E8r^#3k$mg_%-c#1X&WPcN`jiqvP<e
z7h*IoUc7m!G#T~Iomd6B!^HU`P1_AzX<&Q~7#M!1g?IqB4qyX9uZxwY=I3XiH_U$o
z(An8Kl@>UcuJc~Ko<gYZjc$8WTdtBi%n=l%wa~ypiy}8)>aLMBXVVngKTz0v&Wyr3
zgGh2;PhV*FaXPjv5?0Sr+5+waQ&ZJ3r!cMsdB{UXR!3j`QfDrO@o(_=x0FihDftrQ
zW(t*n+ah*5nrv9wh5JV-P|fZ~gA6YHO3VK^57M4zS|x}<xZv9oi(0e{a8Vd0*h4rQ
zel8tDy^Gt>438R5T)o)FxFvnP&`RVj{MPD_OxG~iT>>U<04oJGjvSVpP3U_N5nWob
zpG3*zis<l$7Xpr=r>QgB(Rj6+EBdENQbmHUhTWXERL8t*6Dj#!v%Ib^ZAmj5POjg;
zBDuPeTysYGwm|xZ^ilm2qgI-&_`f=_v~`(+S!tkg1>g%w+TRHFZy@>?&kQti=+6}a
zr7(%l5?$1K^2g;^vjT3f@-`aG473(hQ$E}|J&??q%FqGLibwbMZHO`wk0&LH3CW-o
z3sn<uAv1iaGTa;dSDS@dqcper<L$N<UkT;J<?9P=J$^v0hZd@%5?kjL`)oa!zbt*K
z@YvtZZ!OAeCeo-QJ{9-L@7MZ`5&$py)^*8OLl2IPc8WW80oQj4><;|kZvm~^Ct#P_
z0q1mhf$Rj={WbJ2nZ6u;o<(NplGGl^idJkSkaA=1H03Wf;oGy+F3f*~Y{vEm3+Y0f
z&$fu0w0yJ8$ErYA2(vo8I<CdZciGkaLLzseyHhy(a?H(5AblCw$8JaBHesE#R!1Bg
zyTui><ksoPr&2`@KzjrO32|QwV|7lk2%$3IT&~BloA8LoXqO)*EJXl;!?qp6`q@@v
zxiR)=ZdTQgN=sSo%m=qWqo$#hG4UU5!fI=yd)9i&dLBA8d;$j8g`y(GXF(+63)?j~
zA|rI1@%*X1(_hgu;G3)j#W44rf*0yRe+%n6({EWs`#uReWRbUwSA4;+kApM&@Rp!1
zkg2<;y0OLqa@x~N{9G?BFxQ|i1H`TdmnBCM3sA=`c){AIfM>FlrCKpS%G#x{Z8v`%
zdethkt2YSQ@p`?+I?!*Xvo3laW3*t8m?R{T%HslBror+&`Ro1yvN2N!LXtoxP(84>
zwhO0VS?lrq=3^R!pEo35Jx41Oi$1T8Q8?;z&O%N+fmtN=@Z&rVBA&XSwd85})SAeW
z!W4F()p{x0)NzS#82uL+u=~HEps&KB5@z52x8CLdfrHk<3GCORQ<ucVEvN)Qs)q#s
z`1p8rO@01e${`@S&Fa+z*N!3y;-<C6Ceb);oc*bl5>{2RlCzyD&B%TYtX%Lc3l}PA
z=6yf@Y;7Cl46PRawF->?mR=&$u%!2vkMh?q8I4`5MAg3N-7fkB3bV+Z!3b(Hrsl}Z
zm^z{Y$ou0W{x_jg#!b}YPJG2=&pWrokpurog7!*(t{fPrH1K|_c#2IbrE}XCQOs`z
z+Hel0wfH9k-JzR~$oLwiTw_tv;&uA?O7Chn0-)8DZj$fhN1G5?k+9E@ouxwW$CpW2
zn;D-2I`p{>phLGy5AcyRkamoePn&`Txlq4m!R{Y3|5(_&=EsYV&H>q=GBBJM>(pVQ
zVm+tfPN!H!cxPdal_=)f{TC&iokBC!uBPW&Yx_>oEk_iHcOt%0!Z2Jcjpq-GtNY1a
zg7nVJ+?5%NFp^!y<$EJz{kXy4^BchNk2G+)H;UVbPyeMeS5xHwqgQyQd5FLNFt4~G
zh5~b%RTj3L6KPxy)sJ({usYAm29Iv15^n(AK&V?_YbjxDqQftj*%<5e*1+qG>zy74
znX+43%yU8dF}HXDqTi=l2b-fnI$oJ?Ty-AEig4+3gy)3=5iORKBR?=k`hi#|E^@?T
zD5_&TbqScmawzx}gYAa@t5_4`lz*$tl~VSvM2u5V^$1w<E+f&BI3Ious&+|KeM{6S
zVxT+loyK;HXS#7=C>=*JYLd2vL*9ky{DE2BppRMq06v;&RegvFS>Z<>-L)|SaDyG;
ze68S>-{Yp(9xhCDY_hC1x5RQphw1G~e;KTOsFuJ>>%G}Hv6rDXucem*IwMkZ<}R9v
zo#AqkSQV)GOraU=1}dBrXlCWbe{>M23fyPPNwrLDt}vb+{rMG_!b%h3^MNM@Ag$g}
zEWoXWV!jd+y9boli39Q9vMdl6?gh#&py^K8@c?!DVC@l0Vs&f2^=s$@k(0lRaT0A6
zi7V@=VM~Oi<y9(G$G$@Wtou<y`GOikL-==b{148V@y9J-p7_Hj+h`T@G|Xkxtq{Qh
z<Ac?_5PP9ROM+D%9<nf7LoC!i%gU-Kc=Ld~eE_Cal|atm<2)b`8wap!K)v;<e>@^B
zD;qvTyTJEg;_jQ5bo~6W6&z9{Yxl%Lr~ZXz&THb0N}7kqz1SHv1d_qd1W6-jHHd^I
zDDBa?Rg7&53mRN@#^`KvQc)gq<lvEQ{$?9xOn-&AWN`GUi>)B;LkBGoD3UkYEvgpo
zWVJvQ<zUq+UK^!pnd^na;C@iWpi3Ux7dA%thuC!z`zN`qxc@(p%hjh<6*@2*Gw}o@
zfs7<J`9FDXHvj{pfX7s6zUBa1`xg=UuMG45MF9V6-9?t>|83~>KN;qKZ1{I!|C@MG
zeAEcsyel@%S47z7B;REtqJHti<GXzB#qrHPtrnLjWPtTH@fmVb8Us?(7>Hwd^}F9o
zYxh3d>{@K^Ftz{7ZpzgD6u9L@kb<o$+`JEf1fL!6ExP&-zq?C33*>h0_#XBO0A6-6
z)8+FU(2D~g`0A9sngUE8QR(gF?tPmh$>z2lh(Y2ioRXhqO%jM|Fg*4R`&VIX^)>J&
z(uyLYHeRw(rZ;={kVCYV&Nbv^5|e=Ws7R{7MR7Qz`L1oS%i-#QN^Po;myqJd>Fdik
ziURG5IKk-^Nus)sz2`$hED~{<fTND&`O_fvh^{*rM4wb(H7y|D%QtcY_~DoiFS8(>
zQqo$Ci(bD8EA;0>GA)f`ev^*f%h2vxB`#Xpi&8orbx$-UNx{sF8@3`3!XG{!cN;xg
z`{@75y-w!l+Z-|N815?Qi`P(=#NWnWU!50S4FiYpw<i*d-7V0(HTm_@RI<FxBpXT#
zrT90Mm)b&~qT()qh~=G&p$g6e71ByV|86&Ndntxs)o>$>`e@9@x3Z-q#5LDJ3|sSR
z=j5B}SA1HA=TGF`GHd+BH)lkXGd(D79J5_Pe%66p+`#YOdA*D+p0DhY2cv5Tk8w2o
z3Ok8Rsf`^LU1-Y}JuMI~u&+z>9SE^SWtU|zei10hvc5($UI>^#jmGBmEZAY1_FZev
zck(d`fpK{2t9|~!x8-x{Klp%9zb6D!kBDpYA_;oYB47=lFI%CXelv;5NZ9&wnZ4{_
zyU-4fKvzJS>WRC)ZEKasRR(6}<iHZH{Cdkgk7DP2J3MCsPKZ*4DT;l$J$-5$(epx3
zX!G{~+)6ADoNOpaqt-^@F4X0Yw7gJey~{0uTO;sO5;%PT(?p7U3N6L3MMl4WM09fU
z(P{e4(DYv;M#x0{(*Qd@z<vUQfLgBLx?`B9Z08|jH|#EtLrh)`)tW#P6Sa(q@_CyR
z@B!=U?=MA{iRm(f+jbu9YXeD!=Q6*@#iklYM;jXk@;}I5d@m~5oh<fhRTTaB4ThSK
zYO&w>i^_;G+~noTA8WVd>vlz8wvp=o_CqF_xho@{!lL>HNAid{dt@5#%bQt4V5V=f
zls~FksEfYeHAa5EH6Zh;8SZuNo@k>H<&9QZ;{w<TfJ$vEqvcRsX?Z*Qye!(fIgR*4
zt*`M^?Cdx|B&EKOz1ia#%?mDcXiG&!cxPws*9Kr&7|TTF$B}CTa)2RlF>KAAo8C@R
zkqc_}0dbK^KOaSXrnDBpVa$%gV=o2B{+!X<l(XA>YxIY#)W1$r@`FLhJG=bV>^ou6
zr8_GCJTS08Svmf#S^d58{Oba8_P*-!k=nZa65Xy%hALxV*z@6Z#$$t1?CC_#uCUI+
ztQDIC(b&j$nU=!j>#vRZvp_qXPCPE_0~USz?(}&dC^BWrl5v@N*(fY8U@Q|;-QlCt
z&P_-@TZ}6-+OKrcs$IqVc&p8)>#`Y5F_;`Pbq*_S20mE~ZwTmVN#l3;;TEIP0p|Wl
zqt^N}?1T52MA3zfgYkby5ykO`0R_8TH!1uF&Mx<so$_1voU@}ri`pS42s{4yDV8&p
zqT)D)Hm)^erl5y@YSv&(Q3r5s+4|^JfdPM$J+Jw@{A!w&TbAzn1J2KqLg4h>L+#Uq
zj!OoAArNBXAOS_a`~ErxL_0Z$-M4RL_7agb>k3ikcnUmAg9G44hpN|#diXcz+<h6n
zU@gl{0LObZ53SqESC`dXb7V6fM|z5nz7nTj-X=u`kr!WXo6-&uD|v6bT^;5ldh|~5
z6_Ez&faOG9%(eV6RZV;0J5>=QA#zmlS_BocI7-u>NU{bQ9igclKQ5P_k`%lH8wsuy
zsf}lmb5nJ-slfbGCccQ=day@_M<fe*k@3!P#k<o?)Zxr1Iq2D}_jtQg^4dg6GzQtv
z`oQacxIfrSjQ#Yg)(4nl%p_+y3-K6XaUeGmRQ!P<RqUlfP(2u{)m*$Al5ax>N(eGr
z0XBzsO%?2YHOPptrKId%<H}h{;Qi#h`D81AOdR`m<#gJ+Es_ZAxnX?7*PXFKjBCLu
zQe86%Z!a_>vo#DF`i7G4Frcr0s?B^5?V~6~`M3xJ|Cmp$mM;X$SHb85c!H$g3So0S
z8FoZWLRM+zQeAT*xGWTH`~7B;2I*f^xs|cB5wNBaOx8H2(d~s`>>{ubtz0NE`&V!)
zhLV{osc$G&zu^dVo)VfS8U5<_BQ9B4k#-BgPPzcEcsCxwPu)E`sr84~4|Z7S%^fc^
z3QLSe*tvs$eNf_m+xYoWpqzFFf8uWbYn>5UO#m~cj?())lQO(vg722JS=a`qf2k5W
zp;AjE`<cgZ5lI>GpA<8;q@B2x*HRH)b>g+5ia-ZdRsDbWL$h^nOH~O#&~IcWJ_~&>
zDk@g1#9elfQaB`{2#h>kFHe}d)X`<5UlZrxOw93)rm~%V!%;J28DTAH*B`#T*lY&Q
zrU``l%3G{M3o~+h8wPC>%XWBRhO{n&CM;y0tfyJ@<<L<sCX1B8^%xz4{z4t=zA!#)
z0ORJ`zJ_|SkoMvxcD#S5!7`WuJ{+jMUTeJs@hfoN%7~p{l6jq%HC2K`R7aN!yZBqH
zL)k;Q!3nCq0mUbiWvaT7?9oE3RD%q+Nz(}JFXuduaFz`w`4xi7AHH1qg2g$#COYKX
ztFdJrPter%zR>TN=}=zEr0Qz9pJfato9RFi&vW+2nMI>eBbPLxLI$=0%AMxdzb(#<
zk++Sp9bWao&=q?_5$opCH^KVi9>!2CSs(q^A*x4P<0)4$i091d>f_Pw40$_KhLI*j
zbq!Hef`V~7J9=BMZD*<if6kJ}=U35a<o#k&h)vYHPqzFI6Lj<^UZQ^mgA=KAe;J<1
zqzgPq^aZFQc6N+hu7e4G33P=316-hs&cTU<pVYt_HL4#wW{TA*y$cdP*Sb-fn`1Gy
z^gM4hSNa9D1x8igyEO_PPtMTnE1<ORT5?nd;{B?`PPNo$k(!<uGx;|3ZZFpTzW~N)
z6$-#170&9+@GQ9ITOV{-8l>{NNU7X3ix1fJvTrD>ZJ{)UNFW^xt5~<A^c`PtcX6qC
zXNp#J^?${!fJ3uRAOCKQFnc%GJU<bCboJmtAk;SCn(=QqierfT8-v0`3Oc}4xsg01
z642rmd7l#IT~%P*NYr?N6+%VAe=sDfq+nu2!*M`t!{+D&je<@A@zKxWQ-b32H`k@k
z-q`Pif8`@)>2E9F7P9spP^w`H1^>@@673fl@o(m*ocNFewvWEuvGY=N3Tpu3jJ75~
zw5M6ykzVO#_>|K97Qya)riE~o)RL=#*)Z&QU=AUB-E6LQJi$>p#Q|#)6Q08z{OLSZ
zBCY7QC{~*Suh%4=7TG1riGM>WzUk+xnbU@>lRfxX{}$?)KO&+`5tzk>_uKU4EnYbt
z+DNW<?{O3d))V3N_r4%Dg*ic~;!bK+y$>6oHEm!1?4MAUJx79VE~HV#E6=*Td-$QO
zh)v&QP8ItPUz83u<?rj|)+qq`UeSh<MG^#RyUcPa%wF31TyMXc+g9%*a8g{8jFcLL
zodvDCE^g~}5;4j{1cr`=Mz&tRcas;$5+SaR1{sS{!aVUorQJ3G`%Z@+2L*mFZ>?wv
zBF&rSu*|oXqLP}LJk!%L2PdU+TM1boM9g8{&%MrRg~8WJ6X$|c@af^`t1m|vtrMSG
z1F1S*w3oh?Veruh=Bat)G@crlz=C&rc&+D{9w6;ldT43|5SfEMULC!e5cgeMr4e~}
zc;MQ9SjI{l%c1Jpr12czcGov%`rI4mh(f|TaAqy?YCao{e5f)6H9uPT%SKj|mLsJ%
z^1ZtD@W@b~Bu_D~7z8P`BK;w8wfj)|nkqU_l{Unr69@5c#Qi6qw#b<;i@aUh<!!ei
z<N*Aa4@moP62Y%XrzQDg3RDW*aG>f+d31$nm<&VSSIq2*Z8XeVWnj`Ft2Ae<oyd&L
z%kWK#S~(&YHyLv9MWu7;Gr|1Iz=`f9o*&D2jJ6B6YN~59{SM!`cpUP?6)tsVyf|t|
zy8=0=XlgFC-q^xw?%Bh}(W<%6a08a!Q&%<Zak%?yM_QBMQSklz%K%oabjlCyz3ti+
zy4-m<RnNJ3WC1+&sIC;Ba+u+$B`lBg<{StH;l12wHyzZ)KWs5eUe`Q)-0cVr9CkcU
zu}rF`dK)~#*M=rH`OEJRMTqywACcEfWyUzc<6~>n7MwuB$S+d$Wa1%+2P2*NapEt(
zZj=Gy`^rCO>g5<XFuo@J!!wTc)AXsnC3}$t>xNW}Pk%2`0fLfv2;MW38guFiZKk{<
z#sACurOUeh!}tpKJv2PxkZKO{EarMfN1D-4oCs})^}j9bmtCQd-Y+;JWk`$Mej497
zk7TA^{dQ-~W4PWb|DI2?q|dc(kz4t8q!4R7dZyZYrmHMaN<CG}<OCessxVS8S@`H7
zkYD26yqGC0Q|fr(;d7T-vU+)iU&86=+s&AJ6MA|P4iruvx45#3eMK>foW3@W4zLv-
zy3d0|x9n!B9s&M1sKKt10Pa%~lUiGKjd~e*`P|=zg)FC)ZZ6PFBs$zp?hkj655(9#
z%O-#E0p4(VT-P~(%LlJHFCJ{V-fZFR!RsS7EN(vf+4IU;zo4T70Hu9x>Y+1X2##lZ
zo+M&@up9~kX3he>cHk`zYacv&{u~%)_69B+z0^z~F98w<6os2ZK*G2}b5no-Bt*1M
zO^3;xILV9!q<Gqh!8WV!w<}&nb`+R&1_Uut-+|R26hN?ly9&As1QxU6Wq>d=FzRp$
zNJ-D&5D6+&N<_XdO$B=X?x|rC(HL->eeDpoK)R+;cGnw*4;R3UC#r5Lu5M&tat?a>
zMjlrevmw!kb)l=0^F|?71-D=%sY|chKZb6*3HV&$0{&U|E-67T&8pcaX3?X}nt;&F
zvl+6}!7lAGBM4W{1To0)jW>Cqq^hdw7|(e(!$ewXA$`H{*~VryLS@}=554gP?I8^E
z0?1nebJdQcm%_T(_q_+(HmI8|R)h^DQj4;7v4s^Uf)#A3kcjz6NvK3=+oE%WO94T-
zp8(tp&eZRbO)hvMwe}Icd?jWFrB^7aUIK8M{bpL=)%Ne9PY(p-07J;`Ly+7ePYcJr
z1!ENGB9yMGsqKa_Z(Ezk#0g+k^5Sa^ISYkjw<9$bn|4F>6+P3dcP-~IvZ?HGOPH&>
zsH$4CV$}X{<jvJ%1NaL~;dqsv{h?zY+q|9(>tnzJR?CY^q7J&tOAksx(O|?yNy(5j
zf=YE~*;)<cLgLN2b&lbDdq!duG>eB{lK$RLV46=-faeXAHe*F2*AE5ymIzd5E_>#r
zibOz#fQQ9uzKNJePizeT#dAtu5?=c^akL88l%Dsrw3Rf7myZPOfv<SURe&AiI&Bl)
zOF>5iIO{{-;lFF}cP8A>T-K?i@-=nI18ju_!@i+a=uF^VwN%%>s5gM&D7xu9Vg?w}
z>;KsUHX#MPSTgp8Y=xHqCEXfR9FpSsr+pClY4~9D$fjTIOr~+a^*EU?mEXmJ)7-OB
zZ6-t;Bw%3XW)X>a!(nrtf9qL`E7nPi)b!tIf6n@mV^Rry-v)oXBQB}S05kM{f7()X
zw2<V;IP;`Lp}@9y2!sD+@&&$PaT%Qdd^hL`dkmrTX~UCj|7x?d_>V-hecrBrxlsVM
z2S^nDQ`9KLpdC25v622AUF0vWN`cE(`J0<XSbO)Q&$HHDIZVGXN-6by_drh`Kt#8!
zv2Thv3kQJ2qnj5gmJn~;?G7U7mb^#r>=}ah)M7b}$S*r+TuEW0+4KW6@m~^&1oNjO
z4S>reB$-LI?(#g9Z-4YTD&{s09`uJ_b|=R#9wdS|>H+R^4!^VOfA|o)TDSN5F_r{b
z$3DkICG{=|3$~TzCM#!fj1hEZLn`uYtUhzJ`|B}JMuyX;tjdqSbsjxDp|a@W^G_Xt
zKF-L%q*fYmv?tu*_ywFMCx3?%K6XikRtC=k4spI+>zUUg=lwawmDBIJBrO(@ImI3o
z^nXbmsvQxF5?ofi<nYL4+ic0?Y`P|xXXXn0{L$ne@FCeF@7r+D{<S8a?ag5Uv!Hz6
zB8$9YD|+>@9MYFxwfF#wo_V<ij{h1+8CX~DnOBGiMQ&8Y3OVtUJ=EFN&6tjqoJQe4
zJT&qGx@H9k)k&{bwAVR(1-vOZjc$JFYwN8`uP;N?<(^mQ5sg}}zG(dAUhgw;ka@(d
zM?xUX+ri<1Z1vrLK@hYs9;O-~dC2}KlIBUxATznMcBSVdV$P4T<y0S!+NC^UOZV(*
zzK5D^7SWX~X1-<a?bto}w10y0w8H+ORRQ{0#m@dgk)MBOv{KV`q%i7)r^Zx+nH11d
z-H8ck9pL_0@3`1J`!T!IUJ4Q)Ah^bC_9yKrXh-(PDyN784DWCw?LwIO!HlH%lfK8Q
zVT9-W(OMqlLIg2c6#A)rf;^7dx=@4P7gS=q6d!T;i!7V+T!A<zSd)&z>M{kM==+=O
zVaW!JemT+Ao5_p+d}_ijEAg#z6CK%^^IB43NpYVrL#Mc%rLBe?|6~v992<q{%_TSE
zG!%7!$UGtc>aFj?t=$E);Idn2L?Qjv-?7B5;CM#{kQ%-oI`z1QqFXg7tZGk1<eDD4
zpz<ED8Qv^U5D=@>i|_{H^gnd6Em84Xd^}M~Iv_k8ljS-m_p<Q2*yM4jSzUD@@0N9*
z@5N6|vS?Whaj-?vLmSI|<Y}5|{nW?5Gjw<&Tg2(4@(cTZjMn~kp@V1vMB(^5_fCUJ
z=&1vvv0(5rpo)<RV1+XWBgq-$;yflpIs9+&z!+5$<7Ow)254$A{Xb(2MaUS#k1k&}
zOA;vR?U#)VSTC$q?^UVfz%|BPR4HlQ>BgsFK5xs-qp$BK9}B-)1%^XrWwE&dqdTIl
zw{haEfexJMLcZg&^8c)a<*Vifnb_|PY*Jb~{>!bd<uWLh?LYo~bD7iv_Z8ltHu^RH
zkj1+}=ZX9?(^|SP<n6{QO2>Q`zGnN~&CjfB5fhW~*Czg0OGk2sYRswoY^(o0C_5&z
zAGGeo>*mKJ>htQfT;C=?nBUyUxk=1`-A3@a!-5Zm8yG+R-RN{gsT?>{_G+RMO0(A7
zFz{40cU!&c8`PGo+_&Id;K3ls`xU!(#rsZ5tJ;5McgJB>-3(AWczZB-TY}fzc8jVl
zteJanRS7@Wej%6M-~4+Ea52k-qCT++)e05Sm%rTY6Pod5M&Y$o7Q0XH!mD+FYh>mc
zE`IoSP5q%4hAAsvB){mtESmec+xNwf(hWyV?H3&fdghop+rvlmnJ*r9d{-o{BnH}e
zcm=VSkLAsslj}5QOCDpii`X^o-DLR(I~yPDzo=r+8Y<aSf3Mov<6x1T&NYLxCw@O&
z^`S)_(YCsG_3(+`d8T|Dz{^SM8Z4VTZoa$WDF)davF9nQ(fF$B`sU0$)%^)P+iidF
zOkWQwRFiUJW3qLWkNy7lGeh|JrK-E$e-3Y*uKar4^LZa7ZN5}(G1N)B`sV4M7lrx%
zKZ$)jaKGucWQB6ziywdgH8@#|-2Y>7v2NZE36c3<WHzk(yCr)0<EOv;6c0^Tee$kU
z(WUm1iS+Zi(|a<T)&Y-weFHpdsN}AKrsm8~Me2FmOS8-%Ew0xQi==@E0Rfj(ctoMh
z{2Vq=ez#o2@u~Jw504C&&1t@cJG0gsf2izVzU=P4ziakoI+nKBv4Kv90Bx4AUbE}2
z<88KMN<lF-wfXn<SeEVXJ#`9n;6-Prr{HVwY*zJ|2)9?ePd{A(Y)j4n9ts|63Ow|}
zNz=7->+B^<mTWLA*=>8TYEr-{&;fN_U0T3K-Lw33;7*DIy)FkIKL>3W?0WL##%E>V
z{)5}+D~>6I@%W;)(FAMvI2|{&wCvnu)cz-AwZ&u8BX?heawu?(-J&Vq<?lUlj=auU
zHJ`uM_?pSt`7$m4?1~B^5AIi$*)>1^_krA3QR!zto4)P4Vt)Vg#8ds(o*l?t{I|Y>
zX?<n*d!P5FOQO!~N<Ip#_V)d9{`sm)q}$^!cW(Nch$F`KS>67*e|yq-lx)}itWs|P
ztpVcx|LayKa69yE;gxHjKYCxo?P&#Sq;M!c`m^E6jzVSN0TQqLkIeN;Z^?E89b4xD
zTFei;7rAm-W>9G8+r38)@<d091Mi0bZGE^B{b=RuT`a&EQl<ErkR>9p1-r}roMX<z
zw;`&+grTFx9l^^N?&E`9T72;VnlyY?3N#3hJP!s_2OpAV`|+QdVUz9E+o@+nwle^M
Mr>mdKI;Vst0E*AI)Bpeg

literal 0
HcmV?d00001


From 0d83307b14760c9231f67e6f1e99bfbd7b586650 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 27 Feb 2022 10:44:04 +0000
Subject: [PATCH 1024/1147] Update troubleshooting-help.md

---
 .github/ISSUE_TEMPLATE/troubleshooting-help.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/.github/ISSUE_TEMPLATE/troubleshooting-help.md b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
index b5c7564..b8c876b 100644
--- a/.github/ISSUE_TEMPLATE/troubleshooting-help.md
+++ b/.github/ISSUE_TEMPLATE/troubleshooting-help.md
@@ -1,7 +1,7 @@
 ---
 name: Troubleshooting help
 about: Ask for help to solve problems with user.js
-title: ''
+title: 'follow instructions or this will be closed as invalid'
 labels: ''
 assignees: ''
 

From d9af90d05f477e5e25f8d9f545eeb7fe0a235d2a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 10 Mar 2022 13:44:10 +1300
Subject: [PATCH 1025/1147] v98 (#1372)

---
 user.js | 21 +++++++++++++--------
 1 file changed, 13 insertions(+), 8 deletions(-)

diff --git a/user.js b/user.js
index 9098913..ac2aae3 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 12 February 2022
-* version: 97
+*    date: 10 March 2022
+* version: 98
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -514,8 +514,11 @@ user_pref("security.family_safety.mode", 0);
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16206 ***/
 user_pref("security.cert_pinning.enforcement_level", 2);
 /* 1224: enable CRLite [FF73+]
- * In FF84+ it covers valid certs and in mode 2 doesn't fall back to OCSP
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1429800,1670985
+ * 0 = disabled
+ * 1 = consult CRLite but only collect telemetry (default)
+ * 2 = consult CRLite and enforce both "Revoked" and "Not Revoked" results
+ * 3 = consult CRLite and enforce "Not Revoked" results, but defer to OCSP for "Revoked" (FF99+)
+ * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1429800,1670985,1753071
  * [2] https://blog.mozilla.org/security/tag/crlite/ ***/
 user_pref("security.remote_settings.crlite_filters.enabled", true);
 user_pref("security.pki.crlite_mode", 2);
@@ -646,7 +649,7 @@ user_pref("media.eme.enabled", false);
    // user_pref("media.autoplay.default", 5);
 /* 2031: disable autoplay of HTML5 media if you interacted with the site [FF78+]
  * 0=sticky (default), 1=transient, 2=user
- * Firefox's Autoplay Policy Documentation [PDF] is linked below via SUMO
+ * Firefox's Autoplay Policy Documentation (PDF) is linked below via SUMO
  * [NOTE] If you have trouble with some video sites, then add an exception (2030)
  * [1] https://support.mozilla.org/questions/1293231 ***/
 user_pref("media.autoplay.blocking_policy", 2);
@@ -851,6 +854,8 @@ user_pref("privacy.sanitize.timeSpan", 0);
     418986 - limit window.screen & CSS media queries (FF41)
       [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
    1281949 - spoof screen orientation (FF50)
+   1281963 - hide the contents of navigator.plugins and navigator.mimeTypes (FF50)
+      FF53: fixes GetSupportedNames in nsMimeTypeArray and nsPluginArray (1324044)
    1330890 - spoof timezone as UTC0 (FF55)
    1360039 - spoof navigator.hardwareConcurrency as 2 (FF55)
    1217238 - reduce precision of time exposed by javascript (FF55)
@@ -1211,7 +1216,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("privacy.trackingprotection.socialtracking.enabled", true);
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
-/* 7017: disable service workers [FF32, FF44-compat]
+/* 7017: disable service workers
  * [WHY] Already isolated (FF96+) with TCP (2701) behind a pref (2710)
  * or blocked with TCP in 3rd parties (FF95 or lower) ***/
    // user_pref("dom.serviceWorkers.enabled", false);
@@ -1236,7 +1241,7 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's crossed the Jordan
    // user_pref("dom.enable_performance", false);
    // user_pref("dom.enable_resource_timing", false);
    // user_pref("dom.gamepad.enabled", false);
-   // user_pref("dom.netinfo.enabled", false);
+   // user_pref("dom.netinfo.enabled", false); // [DEFAULT: false NON-ANDROID: false ANDROID FF99+]
    // user_pref("dom.webaudio.enabled", false);
 /* 8002: disable other ***/
    // user_pref("browser.display.use_document_fonts", 0);
@@ -1303,7 +1308,7 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc
    // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see bugzilla 1320061 [FF53+]
    // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [DEFAULT: false on Linux]
    // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
-   // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+, FF59 and under]
+   // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+]
 /* UX FEATURES ***/
 user_pref("browser.messaging-system.whatsNewPanel.enabled", false); // What's New toolbar icon [FF69+]
    // user_pref("extensions.pocket.enabled", false); // Pocket Account [FF46+]

From e00497fd513b479ae7684b3cddbf6d8dd3b521bf Mon Sep 17 00:00:00 2001
From: matthias-z <11502234+matthias-z@users.noreply.github.com>
Date: Sat, 19 Mar 2022 07:46:08 +0000
Subject: [PATCH 1026/1147] Fix newline issue when downloading files in
 updater.sh (#1397)

---
 updater.sh | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/updater.sh b/updater.sh
index 8295720..fcdc29f 100755
--- a/updater.sh
+++ b/updater.sh
@@ -106,7 +106,7 @@ Optional Arguments:
 download_file() { # expects URL as argument ($1)
   declare -r tf=$(mktemp)
 
-  $DOWNLOAD_METHOD "${tf}" "$1" && echo "$tf" || echo '' # return the temp-filename or empty string on error
+  $DOWNLOAD_METHOD "${tf}" "$1" &>/dev/null && echo "$tf" || echo '' # return the temp-filename or empty string on error
 }
 
 open_file() { # expects one argument: file_path

From b4225baaf2f8d15f856efbaea7c936d218e5ed7d Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sat, 19 Mar 2022 07:47:46 +0000
Subject: [PATCH 1027/1147] Update updater.sh

---
 updater.sh | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/updater.sh b/updater.sh
index fcdc29f..74f378c 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## arkenfox user.js updater for macOS and Linux
 
-## version: 3.3
+## version: 3.4
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac
 

From 64bc683c3f98da0d28240a36664493c841836bbe Mon Sep 17 00:00:00 2001
From: i-c-u-p <96894903+i-c-u-p@users.noreply.github.com>
Date: Fri, 8 Apr 2022 07:03:43 +0000
Subject: [PATCH 1028/1147] Made prefsCleaner.sh executable (#1416)

Changed permissions of prefsCleaner.sh from 644 to 755 to be able to run it via "./prefsCleaner.sh" with out first executing "chmod +x prefsCleaner.sh".
---
 prefsCleaner.sh | 0
 1 file changed, 0 insertions(+), 0 deletions(-)
 mode change 100644 => 100755 prefsCleaner.sh

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
old mode 100644
new mode 100755

From 81561840a189d4e84751eceae205292a50f0c0e2 Mon Sep 17 00:00:00 2001
From: fxbrit <fxbrit@tuta.io>
Date: Fri, 8 Apr 2022 11:43:39 +0200
Subject: [PATCH 1029/1147] deprecate security.csp.enable

---
 user.js | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/user.js b/user.js
index ac2aae3..e3944d8 100644
--- a/user.js
+++ b/user.js
@@ -1081,9 +1081,6 @@ user_pref("extensions.blocklist.enabled", true); // [DEFAULT: true]
 /* 6002: enforce no referer spoofing
  * [WHY] Spoofing can affect CSRF (Cross-Site Request Forgery) protections ***/
 user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false]
-/* 6003: enforce CSP (Content Security Policy)
- * [1] https://developer.mozilla.org/docs/Web/HTTP/CSP ***/
-user_pref("security.csp.enable", true); // [DEFAULT: true]
 /* 6004: enforce a security delay on some confirmation dialogs such as install, open/save
  * [1] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
 user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]

From eb98f06d69610644db94860f3927e97b24b2d1ca Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 8 Apr 2022 21:28:16 +0000
Subject: [PATCH 1030/1147] security.csp.enable

https://bugzilla.mozilla.org/1754301
---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index af6193f..29df9cd 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 9-February-2022
+  Last updated: 8-April-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -36,6 +36,7 @@
     'browser.urlbar.suggest.quicksuggest', // 95
     'dom.securecontext.whitelist_onions', // 97
     'layout.css.font-visibility.level', // 94
+    'security.csp.enable', // 99
     'security.ssl3.rsa_des_ede3_sha', // 93
     /* FF79-91 */
     'browser.cache.offline.storage.enable',

From 9aae0a62b03150e1c09d434ea51fe196751e9a75 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 8 Apr 2022 21:30:22 +0000
Subject: [PATCH 1031/1147] tidy deprecated, misc RFP changes

---
 user.js | 12 +++++++++---
 1 file changed, 9 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index e3944d8..c0cce4a 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 10 March 2022
-* version: 98
+*    date: 9 April 2022
+* version: 99
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -854,7 +854,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
     418986 - limit window.screen & CSS media queries (FF41)
       [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
    1281949 - spoof screen orientation (FF50)
-   1281963 - hide the contents of navigator.plugins and navigator.mimeTypes (FF50)
+   1281963 - hide the contents of navigator.plugins and navigator.mimeTypes (FF50-99)
       FF53: fixes GetSupportedNames in nsMimeTypeArray and nsPluginArray (1324044)
    1330890 - spoof timezone as UTC0 (FF55)
    1360039 - spoof navigator.hardwareConcurrency as 2 (FF55)
@@ -899,6 +899,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
    1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82)
  FF91+
     531915 - use fdlibm's sin, cos and tan in jsmath (FF93, ESR91.1)
+   1756280 - enforce navigator.pdfViewerEnabled as true and plugins/mimeTypes as hard-coded values (FF100)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]
@@ -1350,6 +1351,11 @@ user_pref("app.update.background.scheduling.enabled", false);
 // 7006: onions - replaced by new 7006 "allowlist"
    // [-] https://bugzilla.mozilla.org/1744006
    // user_pref("dom.securecontext.whitelist_onions", true); // 1382359
+// FF99
+// 6003: enforce CSP (Content Security Policy)
+   // [1] https://developer.mozilla.org/docs/Web/HTTP/CSP
+   // [-] https://bugzilla.mozilla.org/1754301
+user_pref("security.csp.enable", true); // [DEFAULT: true]
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 7ff46e02dd33588c0298f7432e7742c53765d2ea Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 5 May 2022 23:33:44 +0000
Subject: [PATCH 1032/1147] v100 deprecated

https://bugzilla.mozilla.org/1752621 - replaced with network.http.http2* prefs
---
 scratchpad-scripts/arkenfox-cleanup.js | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 29df9cd..4d8c4ec 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 8-April-2022
+  Last updated: 5-May-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -35,6 +35,10 @@
     /* FF92+ */
     'browser.urlbar.suggest.quicksuggest', // 95
     'dom.securecontext.whitelist_onions', // 97
+    'network.http.spdy.enabled', // 100
+    'network.http.spdy.enabled.deps',
+    'network.http.spdy.enabled.http2',
+    'network.http.spdy.websockets',
     'layout.css.font-visibility.level', // 94
     'security.csp.enable', // 99
     'security.ssl3.rsa_des_ede3_sha', // 93

From d6b26e75588bcd4311251c68912d3c77b8c6e996 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 10 May 2022 06:49:38 +1200
Subject: [PATCH 1033/1147] v100 (#1423)

---
 user.js | 24 +++++++++++++++---------
 1 file changed, 15 insertions(+), 9 deletions(-)

diff --git a/user.js b/user.js
index c0cce4a..814b424 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 9 April 2022
-* version: 99
+*    date: 9 May 2022
+* version: 100
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -741,6 +741,9 @@ user_pref("browser.download.useDownloadDir", false);
 user_pref("browser.download.alwaysOpenPanel", false);
 /* 2653: disable adding downloads to the system's "recent documents" list ***/
 user_pref("browser.download.manager.addToRecentDocs", false);
+/* 2654: enable user interaction for security by always asking how to handle new mimetypes [FF101+]
+ * [SETTING] General>Files and Applications>What should Firefox do with other files ***/
+user_pref("browser.download.always_ask_before_handling_new_types", true);
 
 /** EXTENSIONS ***/
 /* 2660: lock down allowed extension directories
@@ -1174,13 +1177,6 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] Defaults are fine. They can be overridden by a site-controlled Referrer Policy ***/
    // user_pref("network.http.referer.defaultPolicy", 2); // [DEFAULT: 2]
    // user_pref("network.http.referer.defaultPolicy.pbmode", 2); // [DEFAULT: 2]
-/* 7009: disable HTTP2
- * [WHY] Passive fingerprinting. ~50% of sites use HTTP2 [1]
- * [1] https://w3techs.com/technologies/details/ce-http2/all/all ***/
-   // user_pref("network.http.spdy.enabled", false);
-   // user_pref("network.http.spdy.enabled.deps", false);
-   // user_pref("network.http.spdy.enabled.http2", false);
-   // user_pref("network.http.spdy.websockets", false); // [FF65+]
 /* 7010: disable HTTP Alternative Services [FF37+]
  * [WHY] Already isolated with network partitioning (FF85+) ***/
    // user_pref("network.http.altsvc.enabled", false);
@@ -1209,6 +1205,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] Arkenfox only supports strict (2701) which sets these at runtime ***/
    // user_pref("network.cookie.cookieBehavior", 5);
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault", true);
+   // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true); // [FF100+]
    // user_pref("privacy.partition.network_state.ocsp_cache", true);
    // user_pref("privacy.trackingprotection.enabled", true);
    // user_pref("privacy.trackingprotection.socialtracking.enabled", true);
@@ -1356,6 +1353,15 @@ user_pref("app.update.background.scheduling.enabled", false);
    // [1] https://developer.mozilla.org/docs/Web/HTTP/CSP
    // [-] https://bugzilla.mozilla.org/1754301
 user_pref("security.csp.enable", true); // [DEFAULT: true]
+// FF100
+// 7009: disable HTTP2 - replaced by network.http.http2* prefs
+   // [WHY] Passive fingerprinting. ~50% of sites use HTTP2 [1]
+   // [1] https://w3techs.com/technologies/details/ce-http2/all/all
+   // [-] https://bugzilla.mozilla.org/1752621
+   // user_pref("network.http.spdy.enabled", false);
+   // user_pref("network.http.spdy.enabled.deps", false);
+   // user_pref("network.http.spdy.enabled.http2", false);
+   // user_pref("network.http.spdy.websockets", false); // [FF65+]
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From ea139e3ef8810149d90df8637984f2444282745e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 9 May 2022 19:25:18 +0000
Subject: [PATCH 1034/1147] long standing defaults

- FF79+ dom.targetBlankNoOpener.enabled - https://bugzilla.mozilla.org/show_bug.cgi?id=1522083
- FF86+ privacy.window.name.update.enabled - https://bugzilla.mozilla.org/show_bug.cgi?id=1685089
---
 scratchpad-scripts/arkenfox-cleanup.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 4d8c4ec..411d790 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -235,9 +235,11 @@
     'dom.caches.enabled',
     'dom.storageManager.enabled',
     'dom.storage_access.enabled',
+    'dom.targetBlankNoOpener.enabled',
     'privacy.firstparty.isolate.block_post_message',
     'privacy.firstparty.isolate.restrict_opener_access',
     'privacy.firstparty.isolate.use_site',
+    'privacy.window.name.update.enabled',
     'security.insecure_connection_text.enabled',
     /* 79-91 */
     'alerts.showFavicons',

From 662eddbc2124d9d09774da7d5bc385f45c287c0d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 1 Jun 2022 13:51:19 +0000
Subject: [PATCH 1035/1147] network.cookie.thirdparty

---
 scratchpad-scripts/arkenfox-cleanup.js | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 411d790..042649d 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -32,7 +32,7 @@
 
   const aPREFS = [
     /* DEPRECATED */
-    /* FF92+ */
+    /* 92-102 */
     'browser.urlbar.suggest.quicksuggest', // 95
     'dom.securecontext.whitelist_onions', // 97
     'network.http.spdy.enabled', // 100
@@ -42,7 +42,7 @@
     'layout.css.font-visibility.level', // 94
     'security.csp.enable', // 99
     'security.ssl3.rsa_des_ede3_sha', // 93
-    /* FF79-91 */
+    /* 79-91 */
     'browser.cache.offline.storage.enable',
     'browser.download.hide_plugins_without_extensions',
     'browser.library.activity-stream.enabled',
@@ -231,11 +231,13 @@
     'toolkit.telemetry.unifiedIsOptIn',
 
     /* REMOVED */
-    /* 92+ */
+    /* 92-102 */
     'dom.caches.enabled',
     'dom.storageManager.enabled',
     'dom.storage_access.enabled',
     'dom.targetBlankNoOpener.enabled',
+    'network.cookie.thirdparty.sessionOnly',
+    'network.cookie.thirdparty.nonsecureSessionOnly',
     'privacy.firstparty.isolate.block_post_message',
     'privacy.firstparty.isolate.restrict_opener_access',
     'privacy.firstparty.isolate.use_site',

From 36c942e88743b6535dbd80fa17232ede357b14e1 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Jun 2022 12:45:13 +0000
Subject: [PATCH 1036/1147] browser.urlbar.trimURLs

see #1473
---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 042649d..1216e70 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 5-May-2022
+  Last updated: 12-June-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -232,6 +232,7 @@
 
     /* REMOVED */
     /* 92-102 */
+    'browser.urlbar.trimURLs',
     'dom.caches.enabled',
     'dom.storageManager.enabled',
     'dom.storage_access.enabled',

From 1a899966a911dc2b69a808095ac7836bef5e214b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 13 Jun 2022 01:38:27 +1200
Subject: [PATCH 1037/1147] v101 (#1443)

---
 user.js | 62 +++++++++++++++++++--------------------------------------
 1 file changed, 21 insertions(+), 41 deletions(-)

diff --git a/user.js b/user.js
index 814b424..fdd7e63 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 9 May 2022
-* version: 100
+*    date: 12 June 2022
+* version: 101
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -310,10 +310,10 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
    // user_pref("network.proxy.allow_bypass", false); // [HIDDEN PREF FF95-96]
 /* 0710: disable DNS-over-HTTPS (DoH) rollout [FF60+]
  * 0=off by default, 2=TRR (Trusted Recursive Resolver) first, 3=TRR only, 5=explicitly off
- * see "doh-rollout.home-region": USA Feb 2020, Canada July 2021 [3]
+ * see "doh-rollout.home-region": USA 2019, Canada 2021, Russia/Ukraine 2022 [3]
  * [1] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/
  * [2] https://wiki.mozilla.org/Security/DOH-resolver-policy
- * [3] https://blog.mozilla.org/mozilla/news/firefox-by-default-dns-over-https-rollout-in-canada/
+ * [3] https://support.mozilla.org/en-US/kb/firefox-dns-over-https
  * [4] https://www.eff.org/deeplinks/2020/12/dns-doh-and-odoh-oh-my-year-review-2020 ***/
    // user_pref("network.trr.mode", 5);
 
@@ -334,8 +334,6 @@ user_pref("keyword.enabled", false);
  * intend to), can leak sensitive data (e.g. query strings: e.g. Princeton attack),
  * and is a security risk (e.g. common typos & malicious sites set up to exploit this) ***/
 user_pref("browser.fixup.alternate.enabled", false);
-/* 0803: display all parts of the url in the location bar ***/
-user_pref("browser.urlbar.trimURLs", false);
 /* 0804: disable live search suggestions
  * [NOTE] Both must be true for the location bar to work
  * [SETUP-CHROME] Override these if you trust and use a privacy respecting search engine
@@ -400,7 +398,8 @@ user_pref("security.password_lifetime", 5); // [DEFAULT: 30]
  * can leak in cross-site forms *and* be spoofed
  * [NOTE] Username & password is still available when you enter the field
  * [SETTING] Privacy & Security>Logins and Passwords>Autofill logins and passwords
- * [1] https://freedom-to-tinker.com/2017/12/27/no-boundaries-for-user-identities-web-trackers-exploit-browser-login-managers/ ***/
+ * [1] https://freedom-to-tinker.com/2017/12/27/no-boundaries-for-user-identities-web-trackers-exploit-browser-login-managers/
+ * [2] https://homes.esat.kuleuven.be/~asenol/leaky-forms/ ***/
 user_pref("signon.autofillForms", false);
 /* 0904: disable formless login capture for Password Manager [FF51+] ***/
 user_pref("signon.formlessCapture.enabled", false);
@@ -493,14 +492,6 @@ user_pref("security.OCSP.enabled", 1); // [DEFAULT: 1]
 user_pref("security.OCSP.require", true);
 
 /** CERTS / HPKP (HTTP Public Key Pinning) ***/
-/* 1220: disable or limit SHA-1 certificates
- * 0 = allow all
- * 1 = block all
- * 3 = only allow locally-added roots (e.g. anti-virus) (default)
- * 4 = only allow locally-added roots or for certs in 2015 and earlier
- * [SETUP-CHROME] If you have problems, update your software: SHA-1 is obsolete
- * [1] https://blog.mozilla.org/security/2016/10/18/phasing-out-sha-1-on-the-public-web/ ***/
-user_pref("security.pki.sha1_enforcement_level", 1);
 /* 1221: disable Windows 8.1's Microsoft Family Safety cert [FF50+] [WINDOWS]
  * 0=disable detecting Family Safety mode and importing the root
  * 1=only attempt to detect Family Safety mode (don't import the root)
@@ -515,9 +506,9 @@ user_pref("security.family_safety.mode", 0);
 user_pref("security.cert_pinning.enforcement_level", 2);
 /* 1224: enable CRLite [FF73+]
  * 0 = disabled
- * 1 = consult CRLite but only collect telemetry (default)
+ * 1 = consult CRLite but only collect telemetry
  * 2 = consult CRLite and enforce both "Revoked" and "Not Revoked" results
- * 3 = consult CRLite and enforce "Not Revoked" results, but defer to OCSP for "Revoked" (FF99+)
+ * 3 = consult CRLite and enforce "Not Revoked" results, but defer to OCSP for "Revoked" (FF99+, default FF100+)
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1429800,1670985,1753071
  * [2] https://blog.mozilla.org/security/tag/crlite/ ***/
 user_pref("security.remote_settings.crlite_filters.enabled", true);
@@ -589,16 +580,11 @@ user_pref("network.http.referer.XOriginPolicy", 2);
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
 
-/*** [SECTION 1700]: CONTAINERS
-   Check out Temporary Containers [2], read the article [3], and visit the wiki/repo [4]
-   [1] https://wiki.mozilla.org/Security/Contextual_Identity_Project/Containers
-   [2] https://addons.mozilla.org/firefox/addon/temporary-containers/
-   [3] https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21
-   [4] https://github.com/stoically/temporary-containers/wiki
-***/
+/*** [SECTION 1700]: CONTAINERS ***/
 user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
 /* 1701: enable Container Tabs and its UI setting [FF50+]
- * [SETTING] General>Tabs>Enable Container Tabs ***/
+ * [SETTING] General>Tabs>Enable Container Tabs
+ * https://wiki.mozilla.org/Security/Contextual_Identity_Project/Containers ***/
 user_pref("privacy.userContext.enabled", true);
 user_pref("privacy.userContext.ui.enabled", true);
 /* 1702: set behavior on "+ Tab" button to display container menu on left click [FF74+]
@@ -795,12 +781,6 @@ user_pref("network.cookie.lifetimePolicy", 2);
  * [NOTE] We already disable disk cache (1001) and clear on exit (2811) which is more robust
  * [1] https://bugzilla.mozilla.org/1671182 ***/
    // user_pref("privacy.clearsitedata.cache.enabled", true);
-/* 2803: set third-party cookies to session-only
- * [NOTE] .sessionOnly overrides .nonsecureSessionOnly except when .sessionOnly=false and
- * .nonsecureSessionOnly=true. This allows you to keep HTTPS cookies, but session-only HTTP ones
- * [1] https://feeding.cloud.geek.nz/posts/tweaking-cookies-for-privacy-in-firefox/ ***/
-user_pref("network.cookie.thirdparty.sessionOnly", true);
-user_pref("network.cookie.thirdparty.nonsecureSessionOnly", true); // [FF58+]
 
 /** SANITIZE ON SHUTDOWN : ALL OR NOTHING ***/
 /* 2810: enable Firefox to clear items on shutdown (2811)
@@ -865,8 +845,8 @@ user_pref("privacy.sanitize.timeSpan", 0);
  FF56
    1369303 - spoof/disable performance API
    1333651 - spoof User Agent & Navigator API
-      JS: the version is spoofed as ESR, and the OS as Windows 10, OS 10.15, Android 10, or Linux
-      HTTP Headers: spoofed as Windows or Android
+      version: spoofed as ESR (FF102+ this is limited to Android)
+      OS: JS spoofed as Windows 10, OS 10.15, Android 10, or Linux | HTTP Headers spoofed as Windows or Android
    1369319 - disable device sensor API
    1369357 - disable site specific zoom
    1337161 - hide gamepads from content
@@ -1088,14 +1068,6 @@ user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false]
 /* 6004: enforce a security delay on some confirmation dialogs such as install, open/save
  * [1] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
 user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
-/* 6005: enforce window.opener protection [FF65+]
- * Makes rel=noopener implicit for target=_blank in anchor and area elements when no rel attribute is set ***/
-user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true]
-/* 6006: enforce "window.name" protection [FF82+]
- * If a new page from another domain is loaded into a tab, then window.name is set to an empty string. The original
- * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks
- * [TEST] https://arkenfox.github.io/TZP/tests/windownamea.html ***/
-user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true]
 /* 6007: enforce Local Storage Next Generation (LSNG) [FF65+] ***/
 user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 /* 6008: enforce no First Party Isolation [FF51+]
@@ -1114,13 +1086,20 @@ user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
  * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla
  * [WHY] To prevent wasting Mozilla's time with a custom setup ***/
 user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
+/* 6012: disable SHA-1 certificates ***/
+user_pref("security.pki.sha1_enforcement_level", 1); // [DEFAULT: 1 FF102+]
 /* 6050: prefsCleaner: reset items removed from arkenfox FF92+ ***/
+   // user_pref("browser.urlbar.trimURLs", "");
    // user_pref("dom.caches.enabled", "");
    // user_pref("dom.storageManager.enabled", "");
    // user_pref("dom.storage_access.enabled", "");
+   // user_pref("dom.targetBlankNoOpener.enabled", "");
+   // user_pref("network.cookie.thirdparty.sessionOnly", "");
+   // user_pref("network.cookie.thirdparty.nonsecureSessionOnly", "");
    // user_pref("privacy.firstparty.isolate.block_post_message", "");
    // user_pref("privacy.firstparty.isolate.restrict_opener_access", "");
    // user_pref("privacy.firstparty.isolate.use_site", "");
+   // user_pref("privacy.window.name.update.enabled", "");
    // user_pref("security.insecure_connection_text.enabled", "");
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
@@ -1207,6 +1186,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault", true);
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true); // [FF100+]
    // user_pref("privacy.partition.network_state.ocsp_cache", true);
+   // user_pref("privacy.query_stripping.enabled", true); // [FF101+] [ETP FF102+]
    // user_pref("privacy.trackingprotection.enabled", true);
    // user_pref("privacy.trackingprotection.socialtracking.enabled", true);
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]

From c21b9faefc0d99ab4f91836ceddc68a2a52ff9cb Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 14 Jun 2022 07:01:01 +0000
Subject: [PATCH 1038/1147] dom.storage.next_gen

---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 1216e70..435bae7 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 12-June-2022
+  Last updated: 14-June-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -35,6 +35,7 @@
     /* 92-102 */
     'browser.urlbar.suggest.quicksuggest', // 95
     'dom.securecontext.whitelist_onions', // 97
+    'dom.storage.next_gen', // 102
     'network.http.spdy.enabled', // 100
     'network.http.spdy.enabled.deps',
     'network.http.spdy.enabled.http2',

From 3fcc711c5acc24032fb9ee5d6b104f6dde0a2315 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 1 Jul 2022 02:42:16 +0000
Subject: [PATCH 1039/1147] network.cookie.lifetimePolicy

https://bugzilla.mozilla.org/buglist.cgi?bug_id=1681493,1681495,1681498,1759665
---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 435bae7..e86dc4b 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 14-June-2022
+  Last updated: 30-June-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -41,6 +41,7 @@
     'network.http.spdy.enabled.http2',
     'network.http.spdy.websockets',
     'layout.css.font-visibility.level', // 94
+    'network.cookie.lifetimePolicy', // 102 [technically removed in 104]
     'security.csp.enable', // 99
     'security.ssl3.rsa_des_ede3_sha', // 93
     /* 79-91 */

From d466cf694e56265a325d3cf6c6248a6e596e60aa Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 1 Jul 2022 08:15:39 +0000
Subject: [PATCH 1040/1147] two password prefs

https://bugzilla.mozilla.org/1767099
---
 scratchpad-scripts/arkenfox-cleanup.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index e86dc4b..5db8b48 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 30-June-2022
+  Last updated: 1-July-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -42,7 +42,9 @@
     'network.http.spdy.websockets',
     'layout.css.font-visibility.level', // 94
     'network.cookie.lifetimePolicy', // 102 [technically removed in 104]
+    'security.ask_for_password', // 102
     'security.csp.enable', // 99
+    'security.password_lifetime', // 102
     'security.ssl3.rsa_des_ede3_sha', // 93
     /* 79-91 */
     'browser.cache.offline.storage.enable',

From ceacc9dd74086478d43ccf3a4f0bd5befda53a43 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 2 Jul 2022 00:43:25 +0000
Subject: [PATCH 1041/1147] v102 (#1477)

---
 user.js | 80 +++++++++++++++++++++++++++++++--------------------------
 1 file changed, 43 insertions(+), 37 deletions(-)

diff --git a/user.js b/user.js
index fdd7e63..f1f9355 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 12 June 2022
-* version: 101
+*    date: 1 July 2022
+* version: 102
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -82,7 +82,7 @@ user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
 user_pref("browser.shell.checkDefaultBrowser", false);
 /* 0102: set startup page [SETUP-CHROME]
  * 0=blank, 1=home, 2=last visited page, 3=resume previous session
- * [NOTE] Session Restore is cleared with history (2811, 2812), and not used in Private Browsing mode
+ * [NOTE] Session Restore is cleared with history (2811, 2820), and not used in Private Browsing mode
  * [SETTING] General>Startup>Restore previous session ***/
 user_pref("browser.startup.page", 0);
 /* 0103: set HOME+NEWWINDOW page
@@ -389,11 +389,6 @@ user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
    [1] https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas
 ***/
 user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!");
-/* 0901: set when Firefox should prompt for the primary password
- * 0=once per session (default), 1=every time it's needed, 2=after n minutes (0902) ***/
-user_pref("security.ask_for_password", 2);
-/* 0902: set how long in minutes Firefox should remember the primary password (0901) ***/
-user_pref("security.password_lifetime", 5); // [DEFAULT: 30]
 /* 0903: disable auto-filling username & password form fields
  * can leak in cross-site forms *and* be spoofed
  * [NOTE] Username & password is still available when you enter the field
@@ -522,7 +517,7 @@ user_pref("security.mixed_content.block_display_content", true);
  * [SETTING] to add site exceptions: Padlock>HTTPS-Only mode>On (after "Continue to HTTP Site")
  * [SETTING] Privacy & Security>HTTPS-Only Mode (and manage exceptions)
  * [TEST] http://example.com [upgrade]
- * [TEST] http://neverssl.com/ [no upgrade] ***/
+ * [TEST] http://httpforever.com/ [no upgrade] ***/
 user_pref("dom.security.https_only_mode", true); // [FF76+]
    // user_pref("dom.security.https_only_mode_pbm", true); // [FF80+]
 /* 1245: enable HTTPS-Only mode for local resources [FF77+] ***/
@@ -758,7 +753,7 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
 user_pref("browser.contentblocking.category", "strict");
 /* 2702: disable ETP web compat features [FF93+]
  * [SETUP-HARDEN] Includes skip lists, heuristics (SmartBlock) and automatic grants
- * Opener Heuristics are granted for 30 days and Redirect Heuristics for 15 minutes, see [3]
+ * Opener and redirect heuristics are granted for 30 days, see [3]
  * [1] https://blog.mozilla.org/security/2021/07/13/smartblock-v2/
  * [2] https://hg.mozilla.org/mozilla-central/rev/e5483fd469ab#l4.12
  * [3] https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning#storage_access_heuristics ***/
@@ -768,26 +763,17 @@ user_pref("privacy.partition.serviceWorkers", true);
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
-/** COOKIES + SITE DATA : ALLOWS EXCEPTIONS ***/
-/* 2801: delete cookies and site data on exit
- * 0=keep until they expire (default), 2=keep until you close Firefox
- * [NOTE] A "cookie" block permission also controls localStorage/sessionStorage, indexedDB,
- * sharedWorkers and serviceWorkers. serviceWorkers require an "Allow" permission
- * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
- * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
-user_pref("network.cookie.lifetimePolicy", 2);
-/* 2802: delete cache on exit [FF96+]
- * [NOTE] We already disable disk cache (1001) and clear on exit (2811) which is more robust
- * [1] https://bugzilla.mozilla.org/1671182 ***/
-   // user_pref("privacy.clearsitedata.cache.enabled", true);
-
-/** SANITIZE ON SHUTDOWN : ALL OR NOTHING ***/
+/** SANITIZE ON SHUTDOWN: ALLOWS COOKIES + SITE DATA EXCEPTIONS FF102+ ***/
 /* 2810: enable Firefox to clear items on shutdown (2811)
- * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes ***/
+ * [NOTE] Exceptions: A "cookie" block permission also controls "offlineApps" (see note in 2811).
+ * serviceWorkers require an "Allow" permission. For cross-domain logins, add exceptions for
+ * both sites e.g. https://www.youtube.com (site) + https://accounts.google.com (single sign on)
+ * [WARNING] Be selective with what cookies you keep, as they also disable partitioning (1767271)
+ * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes
+ * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow (when on the website in question)
+ * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
 /* 2811: set/enforce what items to clear on shutdown (if 2810 is true) [SETUP-CHROME]
- * These items do not use exceptions, it is all or nothing (1681701)
  * [NOTE] If "history" is true, downloads will also be cleared
  * [NOTE] "sessions": Active Logins: refers to HTTP Basic Authentication [1], not logins via cookies
  * [NOTE] "offlineApps": Offline Website Data: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
@@ -798,10 +784,16 @@ user_pref("privacy.clearOnShutdown.downloads", true); // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.formdata", true);  // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.history", true);   // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.sessions", true);  // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.offlineApps", false); // [DEFAULT: false]
-user_pref("privacy.clearOnShutdown.cookies", false);
+user_pref("privacy.clearOnShutdown.offlineApps", true);
+user_pref("privacy.clearOnShutdown.cookies", true);
    // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false]
-/* 2812: reset default items to clear with Ctrl-Shift-Del (to match 2811) [SETUP-CHROME]
+/* 2812: delete cache on exit [FF96+]
+ * [NOTE] We already disable disk cache (1001) and clear on exit (2811) which is more robust
+ * [1] https://bugzilla.mozilla.org/1671182 ***/
+   // user_pref("privacy.clearsitedata.cache.enabled", true);
+
+/** SANITIZE MANUAL: ALL OR NOTHING ***/
+/* 2820: reset default items to clear with Ctrl-Shift-Del [SETUP-CHROME]
  * This dialog can also be accessed from the menu History>Clear Recent History
  * Firefox remembers your last choices. This will reset them when you start Firefox
  * [NOTE] Regardless of what you set "downloads" to, as soon as the dialog
@@ -815,13 +807,13 @@ user_pref("privacy.cpd.cookies", false);
    // user_pref("privacy.cpd.downloads", true); // not used, see note above
    // user_pref("privacy.cpd.passwords", false); // [DEFAULT: false] not listed
    // user_pref("privacy.cpd.siteSettings", false); // [DEFAULT: false]
-/* 2813: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
+/* 2821: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
  * [NOTE] Not needed if Session Restore is not used (0102) or it is already cleared with history (2811)
  * [NOTE] privacy.clearOnShutdown.openWindows prevents resuming from crashes (also see 5008)
  * [NOTE] privacy.cpd.openWindows has a bug that causes an additional window to open ***/
    // user_pref("privacy.clearOnShutdown.openWindows", true);
    // user_pref("privacy.cpd.openWindows", true);
-/* 2814: reset default "Time range to clear" for "Clear Recent History" (2812)
+/* 2822: reset default "Time range to clear" for "Clear Recent History" (2820)
  * Firefox remembers your last choice. This will reset the value when you start Firefox
  * 0=everything, 1=last hour, 2=last two hours, 3=last four hours, 4=today
  * [NOTE] Values 5 (last 5 minutes) and 6 (last 24 hours) are not listed in the dropdown,
@@ -841,7 +833,6 @@ user_pref("privacy.sanitize.timeSpan", 0);
       FF53: fixes GetSupportedNames in nsMimeTypeArray and nsPluginArray (1324044)
    1330890 - spoof timezone as UTC0 (FF55)
    1360039 - spoof navigator.hardwareConcurrency as 2 (FF55)
-   1217238 - reduce precision of time exposed by javascript (FF55)
  FF56
    1369303 - spoof/disable performance API
    1333651 - spoof User Agent & Navigator API
@@ -883,6 +874,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
  FF91+
     531915 - use fdlibm's sin, cos and tan in jsmath (FF93, ESR91.1)
    1756280 - enforce navigator.pdfViewerEnabled as true and plugins/mimeTypes as hard-coded values (FF100)
+   1692609 - reduce JS timing precision to 16.67ms (previously FF55+ was capped at 100ms) (FF102)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]
@@ -975,7 +967,7 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
 /* 5005: disable intermediate certificate caching [FF41+] [RESTART]
  * [NOTE] This affects login/cert/key dbs. The effect is all credentials are session-only.
  * Saved logins and passwords are not available. Reset the pref and restart to return them ***/
-   // user_pref("security.nocertdb", true); // [HIDDEN PREF]
+   // user_pref("security.nocertdb", true); // [HIDDEN PREF in FF101 or lower]
 /* 5006: disable favicons in history and bookmarks
  * [NOTE] Stored as data blobs in favicons.sqlite, these don't reveal anything that your
  * actual history (and bookmarks) already do. Your history is more detailed, so
@@ -1068,8 +1060,6 @@ user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false]
 /* 6004: enforce a security delay on some confirmation dialogs such as install, open/save
  * [1] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
 user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
-/* 6007: enforce Local Storage Next Generation (LSNG) [FF65+] ***/
-user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 /* 6008: enforce no First Party Isolation [FF51+]
  * [WARNING] Replaced with network partitioning (FF85+) and TCP (2701),
  * and enabling FPI disables those. FPI is no longer maintained ***/
@@ -1142,7 +1132,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
 /* 7005: disable SSL session IDs [FF36+]
  * [WHY] Passive fingerprinting and perf costs. These are session-only
  * and isolated with network partitioning (FF85+) and/or containers ***/
-   // user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF]
+   // user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF in FF101 or lower]
 /* 7006: onions
  * [WHY] Firefox doesn't support hidden services. Use Tor Browser ***/
    // user_pref("dom.securecontext.allowlist_onions", true); // [FF97+] 1382359/1744006
@@ -1342,6 +1332,22 @@ user_pref("security.csp.enable", true); // [DEFAULT: true]
    // user_pref("network.http.spdy.enabled.deps", false);
    // user_pref("network.http.spdy.enabled.http2", false);
    // user_pref("network.http.spdy.websockets", false); // [FF65+]
+// FF102
+   // 0901: set when Firefox should prompt for the primary password
+   // 0=once per session (default), 1=every time it's needed, 2=after n minutes (0902)
+   // [-] https://bugzilla.mozilla.org/1767099
+user_pref("security.ask_for_password", 2);
+   // 0902: set how long in minutes Firefox should remember the primary password (0901)
+   // [-] https://bugzilla.mozilla.org/1767099
+user_pref("security.password_lifetime", 5); // [DEFAULT: 30]
+   // 2801: delete cookies and site data on exit - replaced by sanitizeOnShutdown* (2810)
+   // 0=keep until they expire (default), 2=keep until you close Firefox
+   // [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
+   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1681493,1681495,1681498,1759665
+user_pref("network.cookie.lifetimePolicy", 2);
+   // 6007: enforce Local Storage Next Generation (LSNG) [FF65+]
+   // [-] https://bugzilla.mozilla.org/1764696
+user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From c6ab6c4b4895d533c872085ebb6f3b6c78627d80 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 18 Jul 2022 10:38:43 +0000
Subject: [PATCH 1042/1147] v102.1 (#1507)

revert back to relying on network.cookie.lifetimePolicy
---
 user.js | 63 ++++++++++++++++++++++++++++-----------------------------
 1 file changed, 31 insertions(+), 32 deletions(-)

diff --git a/user.js b/user.js
index f1f9355..43a44f5 100644
--- a/user.js
+++ b/user.js
@@ -1,6 +1,6 @@
 /******
 *    name: arkenfox user.js
-*    date: 1 July 2022
+*    date: 18 July 2022
 * version: 102
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
@@ -333,7 +333,7 @@ user_pref("keyword.enabled", false);
  * as the 411 for DNS errors?), privacy issues (why connect to sites you didn't
  * intend to), can leak sensitive data (e.g. query strings: e.g. Princeton attack),
  * and is a security risk (e.g. common typos & malicious sites set up to exploit this) ***/
-user_pref("browser.fixup.alternate.enabled", false);
+user_pref("browser.fixup.alternate.enabled", false); // [DEFAULT: false FF104+]
 /* 0804: disable live search suggestions
  * [NOTE] Both must be true for the location bar to work
  * [SETUP-CHROME] Override these if you trust and use a privacy respecting search engine
@@ -493,11 +493,10 @@ user_pref("security.OCSP.require", true);
  * 2=detect Family Safety mode and import the root
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21686 ***/
 user_pref("security.family_safety.mode", 0);
-/* 1223: enable strict pinning
- * PKP (Public Key Pinning) 0=disabled, 1=allow user MiTM (such as your antivirus), 2=strict
- * [SETUP-WEB] If you rely on an AV (antivirus) to protect your web browsing
- * by inspecting ALL your web traffic, then leave at current default=1
- * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16206 ***/
+/* 1223: enable strict PKP (Public Key Pinning)
+ * 0=disabled, 1=allow user MiTM (default; such as your antivirus), 2=strict
+ * [SETUP-WEB] MOZILLA_PKIX_ERROR_KEY_PINNING_FAILURE: If you rely on an AV (antivirus) to protect
+ * your web browsing by inspecting ALL your web traffic, then override to current default ***/
 user_pref("security.cert_pinning.enforcement_level", 2);
 /* 1224: enable CRLite [FF73+]
  * 0 = disabled
@@ -763,17 +762,26 @@ user_pref("privacy.partition.serviceWorkers", true);
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
-/** SANITIZE ON SHUTDOWN: ALLOWS COOKIES + SITE DATA EXCEPTIONS FF102+ ***/
-/* 2810: enable Firefox to clear items on shutdown (2811)
- * [NOTE] Exceptions: A "cookie" block permission also controls "offlineApps" (see note in 2811).
- * serviceWorkers require an "Allow" permission. For cross-domain logins, add exceptions for
- * both sites e.g. https://www.youtube.com (site) + https://accounts.google.com (single sign on)
- * [WARNING] Be selective with what cookies you keep, as they also disable partitioning (1767271)
- * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes
- * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow (when on the website in question)
+/** COOKIES + SITE DATA : ALLOWS EXCEPTIONS ***/
+/* 2801: delete cookies and site data on exit
+ * 0=keep until they expire (default), 2=keep until you close Firefox
+ * [NOTE] A "cookie" block permission also controls localStorage/sessionStorage, indexedDB,
+ * sharedWorkers and serviceWorkers. serviceWorkers require an "Allow" permission
+ * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
+ * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
+user_pref("network.cookie.lifetimePolicy", 2);
+/* 2802: delete cache on exit [FF96+]
+ * [NOTE] We already disable disk cache (1001) and clear on exit (2811) which is more robust
+ * [1] https://bugzilla.mozilla.org/1671182 ***/
+   // user_pref("privacy.clearsitedata.cache.enabled", true);
+
+/** SANITIZE ON SHUTDOWN : ALL OR NOTHING ***/
+/* 2810: enable Firefox to clear items on shutdown (2811)
+ * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
 /* 2811: set/enforce what items to clear on shutdown (if 2810 is true) [SETUP-CHROME]
+ * These items do not use exceptions, it is all or nothing (1681701)
  * [NOTE] If "history" is true, downloads will also be cleared
  * [NOTE] "sessions": Active Logins: refers to HTTP Basic Authentication [1], not logins via cookies
  * [NOTE] "offlineApps": Offline Website Data: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
@@ -784,13 +792,9 @@ user_pref("privacy.clearOnShutdown.downloads", true); // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.formdata", true);  // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.history", true);   // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.sessions", true);  // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.offlineApps", true);
-user_pref("privacy.clearOnShutdown.cookies", true);
-   // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false]
-/* 2812: delete cache on exit [FF96+]
- * [NOTE] We already disable disk cache (1001) and clear on exit (2811) which is more robust
- * [1] https://bugzilla.mozilla.org/1671182 ***/
-   // user_pref("privacy.clearsitedata.cache.enabled", true);
+user_pref("privacy.clearOnShutdown.offlineApps", false); // [DEFAULT: false]
+user_pref("privacy.clearOnShutdown.cookies", false);
+   // user_pref("privacy.clearOnShutdown.siteSettings", false);
 
 /** SANITIZE MANUAL: ALL OR NOTHING ***/
 /* 2820: reset default items to clear with Ctrl-Shift-Del [SETUP-CHROME]
@@ -805,12 +809,11 @@ user_pref("privacy.cpd.sessions", true); // [DEFAULT: true]
 user_pref("privacy.cpd.offlineApps", false); // [DEFAULT: false]
 user_pref("privacy.cpd.cookies", false);
    // user_pref("privacy.cpd.downloads", true); // not used, see note above
-   // user_pref("privacy.cpd.passwords", false); // [DEFAULT: false] not listed
-   // user_pref("privacy.cpd.siteSettings", false); // [DEFAULT: false]
+   // user_pref("privacy.cpd.passwords", false);
+   // user_pref("privacy.cpd.siteSettings", false);
 /* 2821: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
  * [NOTE] Not needed if Session Restore is not used (0102) or it is already cleared with history (2811)
- * [NOTE] privacy.clearOnShutdown.openWindows prevents resuming from crashes (also see 5008)
- * [NOTE] privacy.cpd.openWindows has a bug that causes an additional window to open ***/
+ * [NOTE] privacy.clearOnShutdown.openWindows prevents resuming from crashes (also see 5008) ***/
    // user_pref("privacy.clearOnShutdown.openWindows", true);
    // user_pref("privacy.cpd.openWindows", true);
 /* 2822: reset default "Time range to clear" for "Clear Recent History" (2820)
@@ -976,7 +979,8 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
    // user_pref("browser.chrome.site_icons", false);
 /* 5007: exclude "Undo Closed Tabs" in Session Restore ***/
    // user_pref("browser.sessionstore.max_tabs_undo", 0);
-/* 5008: disable resuming session from crash ***/
+/* 5008: disable resuming session from crash
+ * [TEST] about:crashparent ***/
    // user_pref("browser.sessionstore.resume_from_crash", false);
 /* 5009: disable "open with" in download dialog [FF50+]
  * Application data isolation [1]
@@ -1340,11 +1344,6 @@ user_pref("security.ask_for_password", 2);
    // 0902: set how long in minutes Firefox should remember the primary password (0901)
    // [-] https://bugzilla.mozilla.org/1767099
 user_pref("security.password_lifetime", 5); // [DEFAULT: 30]
-   // 2801: delete cookies and site data on exit - replaced by sanitizeOnShutdown* (2810)
-   // 0=keep until they expire (default), 2=keep until you close Firefox
-   // [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
-   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1681493,1681495,1681498,1759665
-user_pref("network.cookie.lifetimePolicy", 2);
    // 6007: enforce Local Storage Next Generation (LSNG) [FF65+]
    // [-] https://bugzilla.mozilla.org/1764696
 user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]

From a5e75c4bd3b23ea6537d1d6cbb488e6e95c06ecc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 18 Jul 2022 11:27:05 +0000
Subject: [PATCH 1043/1147] fixup network.cookie.lifetimePolicy

migration code was backed out in FF102.1
---
 scratchpad-scripts/arkenfox-cleanup.js | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 5db8b48..0dce2a9 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 1-July-2022
+  Last updated: 18-July-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -32,6 +32,8 @@
 
   const aPREFS = [
     /* DEPRECATED */
+    /* 103+ */
+    'network.cookie.lifetimePolicy', // 103 [technically removed in 104]
     /* 92-102 */
     'browser.urlbar.suggest.quicksuggest', // 95
     'dom.securecontext.whitelist_onions', // 97
@@ -41,7 +43,6 @@
     'network.http.spdy.enabled.http2',
     'network.http.spdy.websockets',
     'layout.css.font-visibility.level', // 94
-    'network.cookie.lifetimePolicy', // 102 [technically removed in 104]
     'security.ask_for_password', // 102
     'security.csp.enable', // 99
     'security.password_lifetime', // 102

From 4b4248157a400200387cb521606c90f1fb6ebe2f Mon Sep 17 00:00:00 2001
From: Brad Smith <bradster@infinitewarp.com>
Date: Sun, 24 Jul 2022 09:10:06 -0400
Subject: [PATCH 1044/1147] make updater.sh check explicitly for Y/y instead of
 N/n (#1511)

thanks @infinitewarp
---
 updater.sh | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/updater.sh b/updater.sh
index 74f378c..b36cc2a 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,9 +2,9 @@
 
 ## arkenfox user.js updater for macOS and Linux
 
-## version: 3.4
+## version: 3.5
 ## Author: Pat Johnson (@overdodactyl)
-## Additional contributors: @earthlng, @ema-pe, @claustromaniac
+## Additional contributors: @earthlng, @ema-pe, @claustromaniac, @infinitewarp
 
 ## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_updater() )
 
@@ -195,7 +195,7 @@ update_updater() {
       echo -e "There is a newer version of updater.sh available. ${RED}Update and execute Y/N?${NC}"
       read -p "" -n 1 -r
       echo -e "\n\n"
-      [[ $REPLY =~ ^[Nn]$ ]] && return 0 # Update available, but user chooses not to update
+      ! [[ $REPLY =~ ^[Yy]$ ]] && return 0 # Update available, but user chooses not to update
     fi
   else
     return 0 # No update available
@@ -253,7 +253,7 @@ update_userjs() {
     echo -e "This script will update to the latest user.js file and append any custom configurations from user-overrides.js. ${RED}Continue Y/N? ${NC}"
     read -p "" -n 1 -r
     echo -e "\n"
-    if [[ $REPLY =~ ^[Nn]$ ]]; then
+    if ! [[ $REPLY =~ ^[Yy]$ ]]; then
       echo -e "${RED}Process aborted${NC}"
       rm "$newfile"
       return 1

From 996881aef184246a011ac29382e91d634cda7b65 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 24 Jul 2022 13:11:28 +0000
Subject: [PATCH 1045/1147] Update updater.sh

---
 updater.sh | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/updater.sh b/updater.sh
index b36cc2a..bf275c5 100755
--- a/updater.sh
+++ b/updater.sh
@@ -195,10 +195,10 @@ update_updater() {
       echo -e "There is a newer version of updater.sh available. ${RED}Update and execute Y/N?${NC}"
       read -p "" -n 1 -r
       echo -e "\n\n"
-      ! [[ $REPLY =~ ^[Yy]$ ]] && return 0 # Update available, but user chooses not to update
+      [[ $REPLY =~ ^[Yy]$ ]] || return 0   # Update available, but user chooses not to update
     fi
   else
-    return 0 # No update available
+    return 0   # No update available
   fi
   mv "${tmpfile}" "$SCRIPT_FILE"
   chmod u+x "$SCRIPT_FILE"

From ded7c01a08c296cf27a1b7c39d1abc66d7f6e046 Mon Sep 17 00:00:00 2001
From: xfzv <78810647+xfzv@users.noreply.github.com>
Date: Sat, 30 Jul 2022 12:22:32 +0000
Subject: [PATCH 1046/1147] Back up prefs.js to `prefsjs_backups` directory
 (#1514)

---
 prefsCleaner.sh | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index 7db9ef0..e83c2fd 100755
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -69,7 +69,8 @@ fStart() {
 	fi
 
 	fFF_check
-	bakfile="prefs.js.backup.$(date +"%Y-%m-%d_%H%M")"
+	mkdir -p prefsjs_backups
+	bakfile="prefsjs_backups/prefs.js.backup.$(date +"%Y-%m-%d_%H%M")"
 	mv prefs.js "${bakfile}" || fQuit 1 "Operation aborted.\nReason: Could not create backup file $bakfile"
 	echo -e "\nprefs.js backed up: $bakfile"
 	echo "Cleaning prefs.js..."

From ecb63e82c9e6ec1d0b027e9b3d583b3ab3a5e368 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sat, 30 Jul 2022 12:23:27 +0000
Subject: [PATCH 1047/1147] Update prefsCleaner.sh

---
 prefsCleaner.sh | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index e83c2fd..da2cfe9 100755
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -2,7 +2,7 @@
 
 ## prefs.js cleaner for Linux/Mac
 ## author: @claustromaniac
-## version: 1.4
+## version: 1.5
 
 ## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
 
@@ -82,7 +82,7 @@ echo -e "\n\n"
 echo "                   ╔══════════════════════════╗"
 echo "                   ║     prefs.js cleaner     ║"
 echo "                   ║    by claustromaniac     ║"
-echo "                   ║           v1.4           ║"
+echo "                   ║           v1.5           ║"
 echo "                   ╚══════════════════════════╝"
 echo -e "\nThis script should be run from your Firefox profile directory.\n"
 echo "It will remove any entries from prefs.js that also exist in user.js."

From 6e53e841f78c512f4d1eedb6a2409df746eea979 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 31 Jul 2022 10:50:24 +0000
Subject: [PATCH 1048/1147] security.pki.sha1_enforcement_level

---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 0dce2a9..e3fafda 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 18-July-2022
+  Last updated: 31-August-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -34,6 +34,7 @@
     /* DEPRECATED */
     /* 103+ */
     'network.cookie.lifetimePolicy', // 103 [technically removed in 104]
+    'security.pki.sha1_enforcement_level', // 103
     /* 92-102 */
     'browser.urlbar.suggest.quicksuggest', // 95
     'dom.securecontext.whitelist_onions', // 97

From 0dba33688fe468aca9b58c60910201afb3b89f60 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 17 Aug 2022 19:24:38 +0000
Subject: [PATCH 1049/1147] v103 (#1508)

---
 user.js | 113 ++++++++++++++++++++++++++++++--------------------------
 1 file changed, 61 insertions(+), 52 deletions(-)

diff --git a/user.js b/user.js
index 43a44f5..8ae66eb 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 18 July 2022
-* version: 102
+*    date: 18 August 2022
+* version: 103
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -30,8 +30,9 @@
   * It is best to use the arkenfox release that is optimized for and matches your Firefox version
   * EVERYONE: each release
     - run prefsCleaner to reset prefs made inactive, including deprecated (9999s)
-    ESR91
-    - If you are not using arkenfox v91... (not a definitive list)
+    ESR102
+    - If you are not using arkenfox v102-1... (not a definitive list)
+      - 2815: clearOnShutdown cookies + offlineApps should be false
       - 9999: switch the appropriate deprecated section(s) back on
 
 * INDEX:
@@ -82,7 +83,7 @@ user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
 user_pref("browser.shell.checkDefaultBrowser", false);
 /* 0102: set startup page [SETUP-CHROME]
  * 0=blank, 1=home, 2=last visited page, 3=resume previous session
- * [NOTE] Session Restore is cleared with history (2811, 2820), and not used in Private Browsing mode
+ * [NOTE] Session Restore is cleared with history (2811), and not used in Private Browsing mode
  * [SETTING] General>Startup>Restore previous session ***/
 user_pref("browser.startup.page", 0);
 /* 0103: set HOME+NEWWINDOW page
@@ -119,6 +120,7 @@ user_pref("geo.provider.network.url", "https://location.services.mozilla.com/v1/
 user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
 user_pref("geo.provider.use_corelocation", false); // [MAC]
 user_pref("geo.provider.use_gpsd", false); // [LINUX]
+user_pref("geo.provider.use_geoclue", false); // [FF102+] [LINUX]
 /* 0203: disable region updates
  * [1] https://firefox-source-docs.mozilla.org/toolkit/modules/toolkit_modules/Region.html ***/
 user_pref("browser.region.network.url", ""); // [FF78+]
@@ -219,6 +221,7 @@ user_pref("network.connectivity-service.enabled", false);
    [1] https://feeding.cloud.geek.nz/posts/how-safe-browsing-works-in-firefox/
    [2] https://wiki.mozilla.org/Security/Safe_Browsing
    [3] https://support.mozilla.org/kb/how-does-phishing-and-malware-protection-work
+   [4] https://educatedguesswork.org/posts/safe-browsing-privacy/
 ***/
 user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
 /* 0401: disable SB (Safe Browsing)
@@ -344,9 +347,9 @@ user_pref("browser.urlbar.suggest.searches", false);
  * [1] https://bugzilla.mozilla.org/1348275 ***/
 user_pref("browser.urlbar.speculativeConnect.enabled", false);
 /* 0806: disable location bar leaking single words to a DNS provider **after searching** [FF78+]
- * 0=never resolve single words, 1=heuristic (default), 2=always resolve
+ * 0=never resolve, 1=use heuristics, 2=always resolve
  * [1] https://bugzilla.mozilla.org/1642623 ***/
-user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
+user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0); // [DEFAULT: 0 FF104+]
 /* 0807: disable location bar contextual suggestions [FF92+]
  * [SETTING] Privacy & Security>Address Bar>Suggestions from...
  * [1] https://blog.mozilla.org/data/2021/09/15/data-and-firefox-suggest/ ***/
@@ -622,17 +625,6 @@ user_pref("media.peerconnection.ice.default_address_only", true);
  * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
 user_pref("media.eme.enabled", false);
    // user_pref("browser.eme.ui.enabled", false);
-/* 2030: disable autoplay of HTML5 media [FF63+]
- * 0=Allow all, 1=Block non-muted media (default), 5=Block all
- * [NOTE] You can set exceptions under site permissions
- * [SETTING] Privacy & Security>Permissions>Autoplay>Settings>Default for all websites ***/
-   // user_pref("media.autoplay.default", 5);
-/* 2031: disable autoplay of HTML5 media if you interacted with the site [FF78+]
- * 0=sticky (default), 1=transient, 2=user
- * Firefox's Autoplay Policy Documentation (PDF) is linked below via SUMO
- * [NOTE] If you have trouble with some video sites, then add an exception (2030)
- * [1] https://support.mozilla.org/questions/1293231 ***/
-user_pref("media.autoplay.blocking_policy", 2);
 
 /*** [SECTION 2400]: DOM (DOCUMENT OBJECT MODEL) ***/
 user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");
@@ -762,41 +754,43 @@ user_pref("privacy.partition.serviceWorkers", true);
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
-/** COOKIES + SITE DATA : ALLOWS EXCEPTIONS ***/
-/* 2801: delete cookies and site data on exit
- * 0=keep until they expire (default), 2=keep until you close Firefox
- * [NOTE] A "cookie" block permission also controls localStorage/sessionStorage, indexedDB,
- * sharedWorkers and serviceWorkers. serviceWorkers require an "Allow" permission
- * [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
- * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
-user_pref("network.cookie.lifetimePolicy", 2);
-/* 2802: delete cache on exit [FF96+]
- * [NOTE] We already disable disk cache (1001) and clear on exit (2811) which is more robust
- * [1] https://bugzilla.mozilla.org/1671182 ***/
-   // user_pref("privacy.clearsitedata.cache.enabled", true);
-
-/** SANITIZE ON SHUTDOWN : ALL OR NOTHING ***/
-/* 2810: enable Firefox to clear items on shutdown (2811)
- * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes ***/
+/* 2810: enable Firefox to clear items on shutdown
+ * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes | Settings ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
+
+/** SANITIZE ON SHUTDOWN: IGNORES "ALLOW" SITE EXCEPTIONS ***/
 /* 2811: set/enforce what items to clear on shutdown (if 2810 is true) [SETUP-CHROME]
- * These items do not use exceptions, it is all or nothing (1681701)
  * [NOTE] If "history" is true, downloads will also be cleared
  * [NOTE] "sessions": Active Logins: refers to HTTP Basic Authentication [1], not logins via cookies
- * [NOTE] "offlineApps": Offline Website Data: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
- * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes>Settings
  * [1] https://en.wikipedia.org/wiki/Basic_access_authentication ***/
 user_pref("privacy.clearOnShutdown.cache", true);     // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.downloads", true); // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.formdata", true);  // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.history", true);   // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.sessions", true);  // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.offlineApps", false); // [DEFAULT: false]
-user_pref("privacy.clearOnShutdown.cookies", false);
-   // user_pref("privacy.clearOnShutdown.siteSettings", false);
+   // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false]
+/* 2812: set Session Restore to clear on shutdown (if 2810 is true) [FF34+]
+ * [NOTE] Not needed if Session Restore is not used (0102) or it is already cleared with history (2811)
+ * [NOTE] If true, this prevents resuming from crashes (also see 5008) ***/
+   // user_pref("privacy.clearOnShutdown.openWindows", true);
 
-/** SANITIZE MANUAL: ALL OR NOTHING ***/
+/** SANITIZE ON SHUTDOWN: RESPECTS "ALLOW" SITE EXCEPTIONS FF103+ ***/
+/* 2815: set "Cookies" and "Site Data" to clear on shutdown (if 2810 is true) [SETUP-CHROME]
+ * [NOTE] Exceptions: A "cookie" block permission also controls "offlineApps" (see note below).
+ * serviceWorkers require an "Allow" permission. For cross-domain logins, add exceptions for
+ * both sites e.g. https://www.youtube.com (site) + https://accounts.google.com (single sign on)
+ * [NOTE] "offlineApps": Offline Website Data: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
+ * [WARNING] Be selective with what sites you "Allow", as they also disable partitioning (1767271)
+ * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow (when on the website in question)
+ * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
+user_pref("privacy.clearOnShutdown.cookies", true); // Cookies
+user_pref("privacy.clearOnShutdown.offlineApps", true); // Site Data
+/* 2816: set cache to clear on exit [FF96+]
+ * [NOTE] We already disable disk cache (1001) and clear on exit (2811) which is more robust
+ * [1] https://bugzilla.mozilla.org/1671182 ***/
+   // user_pref("privacy.clearsitedata.cache.enabled", true);
+
+/** SANITIZE MANUAL: IGNORES "ALLOW" SITE EXCEPTIONS ***/
 /* 2820: reset default items to clear with Ctrl-Shift-Del [SETUP-CHROME]
  * This dialog can also be accessed from the menu History>Clear Recent History
  * Firefox remembers your last choices. This will reset them when you start Firefox
@@ -809,13 +803,9 @@ user_pref("privacy.cpd.sessions", true); // [DEFAULT: true]
 user_pref("privacy.cpd.offlineApps", false); // [DEFAULT: false]
 user_pref("privacy.cpd.cookies", false);
    // user_pref("privacy.cpd.downloads", true); // not used, see note above
+   // user_pref("privacy.cpd.openWindows", false); // Session Restore
    // user_pref("privacy.cpd.passwords", false);
    // user_pref("privacy.cpd.siteSettings", false);
-/* 2821: clear Session Restore data when sanitizing on shutdown or manually [FF34+]
- * [NOTE] Not needed if Session Restore is not used (0102) or it is already cleared with history (2811)
- * [NOTE] privacy.clearOnShutdown.openWindows prevents resuming from crashes (also see 5008) ***/
-   // user_pref("privacy.clearOnShutdown.openWindows", true);
-   // user_pref("privacy.cpd.openWindows", true);
 /* 2822: reset default "Time range to clear" for "Clear Recent History" (2820)
  * Firefox remembers your last choice. This will reset the value when you start Firefox
  * 0=everything, 1=last hour, 2=last two hours, 3=last four hours, 4=today
@@ -918,7 +908,7 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
 user_pref("browser.startup.blankWindow", false);
 /* 4510: disable using system colors
  * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
-user_pref("browser.display.use_system_colors", false); // [DEFAULT false NON-WINDOWS]
+user_pref("browser.display.use_system_colors", false); // [DEFAULT: false NON-WINDOWS]
 /* 4511: enforce non-native widget theme
  * Security: removes/reduces system API calls, e.g. win32k API [1]
  * Fingerprinting: provides a uniform look and feel across platforms [2]
@@ -1080,8 +1070,6 @@ user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
  * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla
  * [WHY] To prevent wasting Mozilla's time with a custom setup ***/
 user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
-/* 6012: disable SHA-1 certificates ***/
-user_pref("security.pki.sha1_enforcement_level", 1); // [DEFAULT: 1 FF102+]
 /* 6050: prefsCleaner: reset items removed from arkenfox FF92+ ***/
    // user_pref("browser.urlbar.trimURLs", "");
    // user_pref("dom.caches.enabled", "");
@@ -1176,7 +1164,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("privacy.donottrackheader.enabled", true);
 /* 7016: customize ETP settings
  * [WHY] Arkenfox only supports strict (2701) which sets these at runtime ***/
-   // user_pref("network.cookie.cookieBehavior", 5);
+   // user_pref("network.cookie.cookieBehavior", 5); // [DEFAULT: 5 FF103+]
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault", true);
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true); // [FF100+]
    // user_pref("privacy.partition.network_state.ocsp_cache", true);
@@ -1242,7 +1230,7 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc
    // user_pref("startup.homepage_welcome_url.additional", "");
    // user_pref("startup.homepage_override_url", ""); // What's New page after updates
 /* WARNINGS ***/
-   // user_pref("browser.tabs.warnOnClose", false); // [DEFAULT false FF94+]
+   // user_pref("browser.tabs.warnOnClose", false); // [DEFAULT: false FF94+]
    // user_pref("browser.tabs.warnOnCloseOtherTabs", false);
    // user_pref("browser.tabs.warnOnOpen", false);
    // user_pref("browser.warnOnQuitShortcut", false); // [FF94+]
@@ -1269,6 +1257,14 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc
    // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
    // user_pref("clipboard.autocopy", false); // disable autocopy default [LINUX]
    // user_pref("layout.spellcheckDefault", 2); // 0=none, 1-multi-line, 2=multi-line & single-line
+/* HTML5 MEDIA AUTOPLAY ***/
+   // [NOTE] You can set exceptions under site permissions
+   // user_pref("media.autoplay.default", 5); // [FF63+]
+      // 0=Allow all, 1=Block non-muted media (default), 5=Block all
+      // [SETTING] Privacy & Security>Permissions>Autoplay>Settings>Default for all websites
+   // user_pref("media.autoplay.blocking_policy", 2); // disable autoplay if you interacted with the site [FF78+]
+      // 0=sticky (default), 1=transient, 2=user
+      // [1] https://support.mozilla.org/questions/1293231 // links to Autoplay Policy Documentation (PDF)
 /* UX BEHAVIOR ***/
    // user_pref("browser.backspace_action", 2); // 0=previous page, 1=scroll up, 2=do nothing
    // user_pref("browser.quitShortcut.disabled", true); // disable Ctrl-Q quit shortcut [LINUX] [MAC] [FF87+]
@@ -1349,5 +1345,18 @@ user_pref("security.password_lifetime", 5); // [DEFAULT: 30]
 user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 // ***/
 
+/* ESR102.x still uses all the following prefs
+// [NOTE] replace the * with a slash in the line above to re-enable them
+// FF103
+   // 2801: delete cookies and site data on exit - replaced by sanitizeOnShutdown* (2810)
+   // 0=keep until they expire (default), 2=keep until you close Firefox
+   // [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
+   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1681493,1681495,1681498,1759665
+user_pref("network.cookie.lifetimePolicy", 2);
+// 6012: disable SHA-1 certificates
+   // [-] https://bugzilla.mozilla.org/1766687
+user_pref("security.pki.sha1_enforcement_level", 1); // [DEFAULT: 1 FF102+]
+// ***/
+
 /* END: internal custom pref to test for syntax errors ***/
 user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");

From 05abe82136a02b33c3eb71c47577d7bc5f375b58 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 18 Aug 2022 20:12:42 +0000
Subject: [PATCH 1050/1147] v105

partition SWers by default: https://bugzilla.mozilla.org/show_bug.cgi?id=1784900
---
 user.js | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/user.js b/user.js
index 8ae66eb..4c00428 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 18 August 2022
-* version: 103
+*    date: 30 August 2022
+* version: 104
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -750,7 +750,7 @@ user_pref("browser.contentblocking.category", "strict");
  * [3] https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning#storage_access_heuristics ***/
    // user_pref("privacy.antitracking.enableWebcompat", false);
 /* 2710: enable state partitioning of service workers [FF96+] ***/
-user_pref("privacy.partition.serviceWorkers", true);
+user_pref("privacy.partition.serviceWorkers", true); // [DEFAULT: true FF105+]
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");

From 848290898da60d64dfaeb804228bb5528364042d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 22 Aug 2022 16:02:07 +0000
Subject: [PATCH 1051/1147] svg opentype fonts -> optional, see #1529

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 4c00428..7091d41 100644
--- a/user.js
+++ b/user.js
@@ -549,8 +549,6 @@ user_pref("browser.xul.error_pages.expert_bad_cert", true);
 
 /*** [SECTION 1400]: FONTS ***/
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
-/* 1401: disable rendering of SVG OpenType fonts ***/
-user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 /* 1402: limit font visibility (Windows, Mac, some Linux) [FF94+]
  * Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1], bundled fonts are auto-allowed
  * In normal windows: uses the first applicable: RFP (4506) over TP over Standard
@@ -1041,6 +1039,8 @@ user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
  * [2] https://spectrum.ieee.org/tech-talk/telecom/security/more-worries-over-the-security-of-web-assembly
  * [3] https://www.zdnet.com/article/half-of-the-websites-using-webassembly-use-it-for-malicious-purposes ***/
    // user_pref("javascript.options.wasm", false);
+/* 5507: disable rendering of SVG OpenType fonts ***/
+   // user_pref("gfx.font_rendering.opentype_svg.enabled", false);
 
 /*** [SECTION 6000]: DON'T TOUCH ***/
 user_pref("_user.js.parrot", "6000 syntax error: the parrot's 'istory!");

From ff8d63f7e428462e0864ca1c20740e8631f96437 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Aug 2022 16:42:32 +0000
Subject: [PATCH 1052/1147] remove dead prefs

https://bugzilla.mozilla.org/show_bug.cgi?id=1745248 - they migrated to `.supported` prefs (values detect or off)
---
 user.js | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 7091d41..0aedc06 100644
--- a/user.js
+++ b/user.js
@@ -372,8 +372,6 @@ user_pref("browser.formfill.enable", false);
  * [SETTING] Privacy & Security>Forms and Autofill>Autofill addresses
  * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill ***/
 user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
-user_pref("extensions.formautofill.available", "off"); // [FF56+]
-user_pref("extensions.formautofill.creditCards.available", false); // [FF57+]
 user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
 user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
 /* 0820: disable coloring of visited links
@@ -1083,6 +1081,9 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
    // user_pref("privacy.firstparty.isolate.use_site", "");
    // user_pref("privacy.window.name.update.enabled", "");
    // user_pref("security.insecure_connection_text.enabled", "");
+/* 6051: prefsCleaner: reset items removed from arkenfox FF102+ ***/
+   // user_pref("extensions.formautofill.available", "off"); // [FF56+]
+   // user_pref("extensions.formautofill.creditCards.available", false); // [FF57+]
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");

From 2b2e151f45b372bc99ef7cdffe86fa1fe6f24298 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Aug 2022 16:52:38 +0000
Subject: [PATCH 1053/1147] extensions.formautofill

https://bugzilla.mozilla.org/1745248 - migrated to .supported in FF99
---
 scratchpad-scripts/arkenfox-cleanup.js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index e3fafda..b430f20 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 31-August-2022
+  Last updated: 23-August-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -237,6 +237,9 @@
     'toolkit.telemetry.unifiedIsOptIn',
 
     /* REMOVED */
+    /* 103+ */
+    'extensions.formautofill.available',
+    'extensions.formautofill.creditCards.available',
     /* 92-102 */
     'browser.urlbar.trimURLs',
     'dom.caches.enabled',

From 61f01f81fdc57846012001009cba603928f62e75 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Aug 2022 16:53:27 +0000
Subject: [PATCH 1054/1147] tidy

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 0aedc06..85b642c 100644
--- a/user.js
+++ b/user.js
@@ -1082,8 +1082,8 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
    // user_pref("privacy.window.name.update.enabled", "");
    // user_pref("security.insecure_connection_text.enabled", "");
 /* 6051: prefsCleaner: reset items removed from arkenfox FF102+ ***/
-   // user_pref("extensions.formautofill.available", "off"); // [FF56+]
-   // user_pref("extensions.formautofill.creditCards.available", false); // [FF57+]
+   // user_pref("extensions.formautofill.available", "");
+   // user_pref("extensions.formautofill.creditCards.available", "");
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");

From d040b95ed293548cbdff13c0c10367807ac0ec30 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Aug 2022 17:29:47 +0000
Subject: [PATCH 1055/1147] also reset the prefs migrated to

.supported also hides/shows the UI. There is no need for this, it is overkill (and users might never be able to work out how to get them back). The .enabled prefs are enough to toggle the checkboxes IF they show based on .supportedCountries (which relies on browser.search.region)
---
 user.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/user.js b/user.js
index 85b642c..bf3df89 100644
--- a/user.js
+++ b/user.js
@@ -1083,7 +1083,9 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
    // user_pref("security.insecure_connection_text.enabled", "");
 /* 6051: prefsCleaner: reset items removed from arkenfox FF102+ ***/
    // user_pref("extensions.formautofill.available", "");
+   // user_pref("extensions.formautofill.addresses.supported", "");
    // user_pref("extensions.formautofill.creditCards.available", "");
+   // user_pref("extensions.formautofill.creditCards.supported", "");
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");

From 06bfef8fd155fdf62e409c30cd1d68572f0c8b41 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Aug 2022 17:33:55 +0000
Subject: [PATCH 1056/1147] extensions.formautofill

add migrated prefs for completeness - see comment in https://github.com/arkenfox/user.js/commit/d040b95ed293548cbdff13c0c10367807ac0ec30
---
 scratchpad-scripts/arkenfox-cleanup.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index b430f20..1d2b1f0 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -239,7 +239,9 @@
     /* REMOVED */
     /* 103+ */
     'extensions.formautofill.available',
+    'extensions.formautofill.addresses.supported',
     'extensions.formautofill.creditCards.available',
+    'extensions.formautofill.creditCards.supported',
     /* 92-102 */
     'browser.urlbar.trimURLs',
     'dom.caches.enabled',

From 5780b6d19750b165e42d4c7e698337eeea8bfa97 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 23 Aug 2022 17:51:35 +0000
Subject: [PATCH 1057/1147] move Form Autofill to 5000s

---
 user.js | 17 +++++++++--------
 1 file changed, 9 insertions(+), 8 deletions(-)

diff --git a/user.js b/user.js
index bf3df89..7f16d55 100644
--- a/user.js
+++ b/user.js
@@ -366,14 +366,6 @@ user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false);
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
  * [2] https://bugzilla.mozilla.org/381681 ***/
 user_pref("browser.formfill.enable", false);
-/* 0811: disable Form Autofill
- * [NOTE] Stored data is NOT secure (uses a JSON file)
- * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
- * [SETTING] Privacy & Security>Forms and Autofill>Autofill addresses
- * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill ***/
-user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
-user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
-user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
 /* 0820: disable coloring of visited links
  * [SETUP-HARDEN] Bulk rapid history sniffing was mitigated in 2010 [1][2]. Slower and more expensive
  * redraw timing attacks were largely mitigated in FF77+ [3]. Using RFP (4501) further hampers timing
@@ -999,6 +991,15 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
  * 0=desktop, 1=downloads (default), 2=last used
  * [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
    // user_pref("browser.download.folderList", 2);
+/* 5017: disable Form Autofill
+ * If .supportedCountries includes your region (browser.search.region) and .supported
+ * is "detect" (default), then the UI will show. Stored data is not secure, uses JSON
+ * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
+ * [SETTING] Privacy & Security>Forms and Autofill>Autofill addresses
+ * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill ***/
+   // user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
+   // user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
+   // user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
 
 /*** [SECTION 5500]: OPTIONAL HARDENING
    Not recommended. Overriding these can cause breakage and performance issues,

From 74be763f6065c9df00918a7ebe8fec5f6b3a8563 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 24 Aug 2022 05:53:46 +0000
Subject: [PATCH 1058/1147] add OCSP hard-fail error code

---
 user.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 7f16d55..7dd0812 100644
--- a/user.js
+++ b/user.js
@@ -470,7 +470,8 @@ user_pref("security.tls.enable_0rtt_data", false);
  * [SETTING] Privacy & Security>Security>Certificates>Query OCSP responder servers...
  * [1] https://en.wikipedia.org/wiki/Ocsp ***/
 user_pref("security.OCSP.enabled", 1); // [DEFAULT: 1]
-/* 1212: set OCSP fetch failures (non-stapled, see 1211) to hard-fail [SETUP-WEB]
+/* 1212: set OCSP fetch failures (non-stapled, see 1211) to hard-fail
+ * [SETUP-WEB] SEC_ERROR_OCSP_SERVER_ERROR
  * When a CA cannot be reached to validate a cert, Firefox just continues the connection (=soft-fail)
  * Setting this pref to true tells Firefox to instead terminate the connection (=hard-fail)
  * It is pointless to soft-fail when an OCSP fetch fails: you cannot confirm a cert is still valid (it

From e38f02bc22e15e2e90bc50a413e4fd68c43a0640 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 28 Aug 2022 00:31:59 +0000
Subject: [PATCH 1059/1147] add extra bugzilla

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 7dd0812..f2e931f 100644
--- a/user.js
+++ b/user.js
@@ -1356,7 +1356,7 @@ user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
    // 2801: delete cookies and site data on exit - replaced by sanitizeOnShutdown* (2810)
    // 0=keep until they expire (default), 2=keep until you close Firefox
    // [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
-   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1681493,1681495,1681498,1759665
+   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1681493,1681495,1681498,1759665,1764761
 user_pref("network.cookie.lifetimePolicy", 2);
 // 6012: disable SHA-1 certificates
    // [-] https://bugzilla.mozilla.org/1766687

From 3c73bc1e56e94d025edb732e34fc169bb5ab3e94 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 11 Sep 2022 02:39:08 +0000
Subject: [PATCH 1060/1147] 2720: add APS

---
 user.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/user.js b/user.js
index f2e931f..d6faae2 100644
--- a/user.js
+++ b/user.js
@@ -1,6 +1,6 @@
 /******
 *    name: arkenfox user.js
-*    date: 30 August 2022
+*    date: 11 September 2022
 * version: 104
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
@@ -740,6 +740,8 @@ user_pref("browser.contentblocking.category", "strict");
    // user_pref("privacy.antitracking.enableWebcompat", false);
 /* 2710: enable state partitioning of service workers [FF96+] ***/
 user_pref("privacy.partition.serviceWorkers", true); // [DEFAULT: true FF105+]
+/* 2720: enable APS (Always Partitioning Storage) [FF104+] */
+user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", true);
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");

From 4bc98005ec0ae56726a38d0854c645b407194278 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 1 Oct 2022 20:33:58 +0000
Subject: [PATCH 1061/1147] activity-stream.feeds.snippets

---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 1d2b1f0..877b597 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 23-August-2022
+  Last updated: 1-October-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -238,6 +238,7 @@
 
     /* REMOVED */
     /* 103+ */
+    'browser.newtabpage.activity-stream.feeds.snippets',
     'extensions.formautofill.available',
     'extensions.formautofill.addresses.supported',
     'extensions.formautofill.creditCards.available',

From 95ecd3e328eb9be993b23d876d8b2e142e306322 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 3 Oct 2022 07:18:30 +0000
Subject: [PATCH 1062/1147] browser.newtab.preload

---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 877b597..7a7cfb1 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 1-October-2022
+  Last updated: 3-October-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -238,6 +238,7 @@
 
     /* REMOVED */
     /* 103+ */
+    'browser.newtab.preload',
     'browser.newtabpage.activity-stream.feeds.snippets',
     'extensions.formautofill.available',
     'extensions.formautofill.addresses.supported',

From 958acf9c2ec920113ffeacfdf7f562e8d435de06 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 3 Oct 2022 13:47:30 +0000
Subject: [PATCH 1063/1147] activity-stream.feeds.discoverystreamfeed

---
 scratchpad-scripts/arkenfox-cleanup.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 7a7cfb1..9764fb7 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -239,6 +239,7 @@
     /* REMOVED */
     /* 103+ */
     'browser.newtab.preload',
+    'browser.newtabpage.activity-stream.feeds.discoverystreamfeed',
     'browser.newtabpage.activity-stream.feeds.snippets',
     'extensions.formautofill.available',
     'extensions.formautofill.addresses.supported',

From 4e3a64b5a10d5f8329ab2af503770e5276beca20 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 4 Oct 2022 17:15:19 +0000
Subject: [PATCH 1064/1147] v105 (#1541)

---
 user.js | 50 +++++++++++++++++++++++++-------------------------
 1 file changed, 25 insertions(+), 25 deletions(-)

diff --git a/user.js b/user.js
index d6faae2..85f1f36 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 11 September 2022
-* version: 104
+*    date: 5 October 2022
+* version: 105
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -87,25 +87,17 @@ user_pref("browser.shell.checkDefaultBrowser", false);
  * [SETTING] General>Startup>Restore previous session ***/
 user_pref("browser.startup.page", 0);
 /* 0103: set HOME+NEWWINDOW page
- * about:home=Activity Stream (default, see 0105), custom URL, about:blank
+ * about:home=Firefox Home (default, see 0105), custom URL, about:blank
  * [SETTING] Home>New Windows and Tabs>Homepage and new windows ***/
 user_pref("browser.startup.homepage", "about:blank");
 /* 0104: set NEWTAB page
- * true=Activity Stream (default, see 0105), false=blank page
+ * true=Firefox Home (default, see 0105), false=blank page
  * [SETTING] Home>New Windows and Tabs>New tabs ***/
 user_pref("browser.newtabpage.enabled", false);
-user_pref("browser.newtab.preload", false);
-/* 0105: disable some Activity Stream items
- * Activity Stream is the default homepage/newtab based on metadata and browsing behavior
- * [SETTING] Home>Firefox Home Content>...  to show/hide what you want ***/
-user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
-user_pref("browser.newtabpage.activity-stream.telemetry", false);
-user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // [DEFAULT: false]
-user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
-user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
-user_pref("browser.newtabpage.activity-stream.showSponsored", false);
-user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false); // [FF66+]
-user_pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); // [FF83+]
+/* 0105: disable sponsored content on Firefox Home (Activity Stream)
+ * [SETTING] Home>Firefox Home Content ***/
+user_pref("browser.newtabpage.activity-stream.showSponsored", false); // [FF58+] Pocket > Sponsored Stories
+user_pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); // [FF83+] Sponsored shortcuts
 /* 0106: clear default topsites
  * [NOTE] This does not block you from adding your own ***/
 user_pref("browser.newtabpage.activity-stream.default.sites", "");
@@ -183,6 +175,9 @@ user_pref("toolkit.coverage.endpoint.base", "");
 /* 0334: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
  * Defense-in-depth: currently covered by 0331 ***/
 user_pref("browser.ping-centre.telemetry", false);
+/* 0335: disable Firefox Home (Activity Stream) telemetry ***/
+user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
+user_pref("browser.newtabpage.activity-stream.telemetry", false);
 
 /** STUDIES ***/
 /* 0340: disable Studies
@@ -276,7 +271,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
 /* 0701: disable IPv6
  * IPv6 can be abused, especially with MAC addresses, and can leak with VPNs: assuming
  * your ISP and/or router and/or website is IPv6 capable. Most sites will fall back to IPv4
- * [STATS] Firefox telemetry (July 2021) shows ~10% of all connections are IPv6
+ * [STATS] Firefox telemetry (Sept 2022) shows ~8% of successful connections are IPv6
  * [NOTE] This is an application level fallback. Disabling IPv6 is best done at an
  * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
  * then this won't make much difference. If you are masking your IP, then it can only help.
@@ -400,7 +395,7 @@ user_pref("network.auth.subresource-http-auth-allow", 1);
 /* 0906: enforce no automatic authentication on Microsoft sites [FF91+] [WINDOWS 10+]
  * [SETTING] Privacy & Security>Logins and Passwords>Allow Windows single sign-on for...
  * [1] https://support.mozilla.org/kb/windows-sso ***/
-user_pref("network.http.windows-sso.enabled", false); // [DEFAULT: false]
+   // user_pref("network.http.windows-sso.enabled", false); // [DEFAULT: false]
 
 /*** [SECTION 1000]: DISK AVOIDANCE ***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
@@ -416,10 +411,6 @@ user_pref("media.memory_cache_max_size", 65536);
  * define on which sites to save extra session data such as form content, cookies and POST data
  * 0=everywhere, 1=unencrypted sites, 2=nowhere ***/
 user_pref("browser.sessionstore.privacy_level", 2);
-/* 1004: set the minimum interval between session save operations
- * Increasing this can help on older machines and some websites, as well as reducing writes [1]
- * [1] https://bugzilla.mozilla.org/1304389 ***/
-user_pref("browser.sessionstore.interval", 30000); // [DEFAULT: 15000]
 /* 1005: disable automatic Firefox start and session restore after reboot [FF62+] [WINDOWS]
  * [1] https://bugzilla.mozilla.org/603903 ***/
 user_pref("toolkit.winRegisterApplicationRestart", false);
@@ -444,7 +435,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * but the problem is that the browser can't know that. Setting this pref to true is the only way for the
  * browser to ensure there will be no unsafe renegotiations on the channel between the browser and the server
  * [SETUP-WEB] SSL_ERROR_UNSAFE_NEGOTIATION: is it worth overriding this for that one site?
- * [STATS] SSL Labs (July 2021) reports over 99% of top sites have secure renegotiation [4]
+ * [STATS] SSL Labs (Sept 2022) reports over 99.3% of top sites have secure renegotiation [4]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
  * [2] https://datatracker.ietf.org/doc/html/rfc5746
  * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
@@ -740,8 +731,9 @@ user_pref("browser.contentblocking.category", "strict");
    // user_pref("privacy.antitracking.enableWebcompat", false);
 /* 2710: enable state partitioning of service workers [FF96+] ***/
 user_pref("privacy.partition.serviceWorkers", true); // [DEFAULT: true FF105+]
-/* 2720: enable APS (Always Partitioning Storage) [FF104+] */
-user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", true);
+/* 2720: enable APS (Always Partitioning Storage) ***/
+user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", true); // [FF104+]
+user_pref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", false); // [FF105+]
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
@@ -1086,6 +1078,9 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
    // user_pref("privacy.window.name.update.enabled", "");
    // user_pref("security.insecure_connection_text.enabled", "");
 /* 6051: prefsCleaner: reset items removed from arkenfox FF102+ ***/
+   // user_pref("browser.newtab.preload", "");
+   // user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", "");
+   // user_pref("browser.newtabpage.activity-stream.feeds.snippets", "");
    // user_pref("extensions.formautofill.available", "");
    // user_pref("extensions.formautofill.addresses.supported", "");
    // user_pref("extensions.formautofill.creditCards.available", "");
@@ -1264,6 +1259,9 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switc
    // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
    // user_pref("clipboard.autocopy", false); // disable autocopy default [LINUX]
    // user_pref("layout.spellcheckDefault", 2); // 0=none, 1-multi-line, 2=multi-line & single-line
+/* FIREFOX HOME CONTENT ***/
+   // user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false); // Recommended by Pocket
+   // user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
 /* HTML5 MEDIA AUTOPLAY ***/
    // [NOTE] You can set exceptions under site permissions
    // user_pref("media.autoplay.default", 5); // [FF63+]
@@ -1293,6 +1291,8 @@ user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", fa
       // [SETTING] General>Browsing>Recommend extensions as you browse
 user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
       // [SETTING] General>Browsing>Recommend features as you browse
+   // user_pref("browser.sessionstore.interval", 30000); // minimum interval between session save operations
+      // Increasing this may help on older machines and some websites, as well as reducing writes (1304389)
    // user_pref("network.manage-offline-status", false); // see bugzilla 620472
    // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
 

From db04bc44f2982ae8e39f10d056bc7cfe7804d4fd Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 4 Oct 2022 17:34:45 +0000
Subject: [PATCH 1065/1147] some inactive prefs at default since 102+

- dom.vr.enabled - false FF97+
- network.http.altsvc.oe - false FF94+
- dom.netinfo.enabled - android joined desktop as false FF99+
- browser.tabs.warnOnClose - falsefalse FF94+
---
 scratchpad-scripts/arkenfox-cleanup.js | 8 ++++++--
 1 file changed, 6 insertions(+), 2 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 9764fb7..c176784 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 3-October-2022
+  Last updated: 5-October-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -241,10 +241,14 @@
     'browser.newtab.preload',
     'browser.newtabpage.activity-stream.feeds.discoverystreamfeed',
     'browser.newtabpage.activity-stream.feeds.snippets',
-    'extensions.formautofill.available',
+    'browser.tabs.warnOnClose',
+    'dom.netinfo.enabled',
+    'dom.vr.enabled',
     'extensions.formautofill.addresses.supported',
+    'extensions.formautofill.available',
     'extensions.formautofill.creditCards.available',
     'extensions.formautofill.creditCards.supported',
+    'network.http.altsvc.oe',
     /* 92-102 */
     'browser.urlbar.trimURLs',
     'dom.caches.enabled',

From 51f3fdbd87570488d8bac7d8e9aa5965ef9e0566 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 8 Oct 2022 14:08:55 +0000
Subject: [PATCH 1066/1147] devtools.chrome.enabled

default false in stable, dev, beta, nightly
---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index c176784..dd44842 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 5-October-2022
+  Last updated: 8-October-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -242,6 +242,7 @@
     'browser.newtabpage.activity-stream.feeds.discoverystreamfeed',
     'browser.newtabpage.activity-stream.feeds.snippets',
     'browser.tabs.warnOnClose',
+    'devtools.chrome.enabled',
     'dom.netinfo.enabled',
     'dom.vr.enabled',
     'extensions.formautofill.addresses.supported',

From f4187632faef76df4de0cbb0cdc7199f22fadd76 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 8 Oct 2022 19:38:05 +0000
Subject: [PATCH 1067/1147] browser.ssl_override_behavior

the code behind it was removed in FF68 - https://bugzilla.mozilla.org/show_bug.cgi?id=1530348
---
 scratchpad-scripts/arkenfox-cleanup.js | 1 +
 1 file changed, 1 insertion(+)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index dd44842..f839a14 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -241,6 +241,7 @@
     'browser.newtab.preload',
     'browser.newtabpage.activity-stream.feeds.discoverystreamfeed',
     'browser.newtabpage.activity-stream.feeds.snippets',
+    'browser.ssl_override_behavior',
     'browser.tabs.warnOnClose',
     'devtools.chrome.enabled',
     'dom.netinfo.enabled',

From 60dd839081dfa8347a49789923ed4bd0c154d93a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 4 Nov 2022 16:03:29 +0000
Subject: [PATCH 1068/1147] dom.disable_beforeunload, #1575

---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index f839a14..1e98e9b 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 8-October-2022
+  Last updated: 4-November-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -244,6 +244,7 @@
     'browser.ssl_override_behavior',
     'browser.tabs.warnOnClose',
     'devtools.chrome.enabled',
+    'dom.disable_beforeunload',
     'dom.netinfo.enabled',
     'dom.vr.enabled',
     'extensions.formautofill.addresses.supported',

From 8a65c5a7bad0ec764d968b0941ebdf01bdcd2408 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 6 Nov 2022 13:28:40 +0000
Subject: [PATCH 1069/1147] v106 (#1558)

---
 user.js | 236 +++++++++++---------------------------------------------
 1 file changed, 44 insertions(+), 192 deletions(-)

diff --git a/user.js b/user.js
index 85f1f36..6eba484 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 5 October 2022
-* version: 105
+*    date: 6 November 2022
+* version: 106
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -61,7 +61,7 @@
   6000: DON'T TOUCH
   7000: DON'T BOTHER
   8000: DON'T BOTHER: FINGERPRINTING
-  9000: PERSONAL
+  9000: NON-PROJECT RELATED
   9999: DEPRECATED / REMOVED / LEGACY / RENAMED
 
 ******/
@@ -78,9 +78,6 @@ user_pref("browser.aboutConfig.showWarning", false);
 
 /*** [SECTION 0100]: STARTUP ***/
 user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
-/* 0101: disable default browser check
- * [SETTING] General>Startup>Always check if Firefox is your default browser ***/
-user_pref("browser.shell.checkDefaultBrowser", false);
 /* 0102: set startup page [SETUP-CHROME]
  * 0=blank, 1=home, 2=last visited page, 3=resume previous session
  * [NOTE] Session Restore is cleared with history (2811), and not used in Private Browsing mode
@@ -519,10 +516,6 @@ user_pref("dom.security.https_only_mode_send_http_background_request", false);
  * [1] https://wiki.mozilla.org/Security:Renegotiation
  * [2] https://bugzilla.mozilla.org/1353705 ***/
 user_pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
-/* 1271: control "Add Security Exception" dialog on SSL warnings
- * 0=do neither, 1=pre-populate url, 2=pre-populate url + pre-fetch cert (default)
- * [1] https://github.com/pyllyukko/user.js/issues/210 ***/
-user_pref("browser.ssl_override_behavior", 1);
 /* 1272: display advanced information on Insecure Connection warning pages
  * only works when it's possible to add an exception
  * i.e. it doesn't work for HSTS discrepancies (https://subdomain.preloaded-hsts.badssl.com/)
@@ -608,10 +601,6 @@ user_pref("media.eme.enabled", false);
 
 /*** [SECTION 2400]: DOM (DOCUMENT OBJECT MODEL) ***/
 user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");
-/* 2401: disable "Confirm you want to leave" dialog on page close
- * Does not prevent JS leaks of the page close event
- * [1] https://developer.mozilla.org/docs/Web/Events/beforeunload ***/
-user_pref("dom.disable_beforeunload", true);
 /* 2402: prevent scripts from moving and resizing open windows ***/
 user_pref("dom.disable_window_move_resize", true);
 /* 2403: block popup windows
@@ -636,10 +625,6 @@ user_pref("browser.pagethumbnails.capturing_disabled", true); // [HIDDEN PREF]
 /* 2606: disable UITour backend so there is no chance that a remote page can use it ***/
 user_pref("browser.uitour.enabled", false);
 user_pref("browser.uitour.url", "");
-/* 2607: disable various developer tools in browser context
- * [SETTING] Devtools>Advanced Settings>Enable browser chrome and add-on debugging toolboxes
- * [1] https://github.com/pyllyukko/user.js/issues/179#issuecomment-246468676 ***/
-user_pref("devtools.chrome.enabled", false);
 /* 2608: reset remote debugging to disabled
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16222 ***/
 user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
@@ -805,14 +790,12 @@ user_pref("privacy.sanitize.timeSpan", 0);
     418986 - limit window.screen & CSS media queries (FF41)
       [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
    1281949 - spoof screen orientation (FF50)
-   1281963 - hide the contents of navigator.plugins and navigator.mimeTypes (FF50-99)
-      FF53: fixes GetSupportedNames in nsMimeTypeArray and nsPluginArray (1324044)
    1330890 - spoof timezone as UTC0 (FF55)
    1360039 - spoof navigator.hardwareConcurrency as 2 (FF55)
  FF56
    1369303 - spoof/disable performance API
    1333651 - spoof User Agent & Navigator API
-      version: spoofed as ESR (FF102+ this is limited to Android)
+      version: android version spoofed as ESR
       OS: JS spoofed as Windows 10, OS 10.15, Android 10, or Linux | HTTP Headers spoofed as Windows or Android
    1369319 - disable device sensor API
    1369357 - disable site specific zoom
@@ -825,7 +808,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
    1217290 & 1409677 - enable some fingerprinting resistance for WebGL
    1382545 - reduce fingerprinting in Animation API
    1354633 - limit MediaError.message to a whitelist
- FF58-90
+ FF58+
     967895 - spoof canvas and enable site permission prompt (FF58)
    1372073 - spoof/block fingerprinting in MediaDevices API (FF59)
       Spoof: enumerate devices as one "Internal Camera" and one "Internal Microphone"
@@ -847,10 +830,9 @@ user_pref("privacy.sanitize.timeSpan", 0);
    1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78)
    1653987 - limit font visibility to bundled and "Base Fonts" (Windows, Mac, some Linux) (FF80)
    1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82)
- FF91+
     531915 - use fdlibm's sin, cos and tan in jsmath (FF93, ESR91.1)
    1756280 - enforce navigator.pdfViewerEnabled as true and plugins/mimeTypes as hard-coded values (FF100)
-   1692609 - reduce JS timing precision to 16.67ms (previously FF55+ was capped at 100ms) (FF102)
+   1692609 - reduce JS timing precision to 16.67ms (previously FF55+ was 100ms) (FF102)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]
@@ -1064,23 +1046,13 @@ user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
  * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla
  * [WHY] To prevent wasting Mozilla's time with a custom setup ***/
 user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
-/* 6050: prefsCleaner: reset items removed from arkenfox FF92+ ***/
-   // user_pref("browser.urlbar.trimURLs", "");
-   // user_pref("dom.caches.enabled", "");
-   // user_pref("dom.storageManager.enabled", "");
-   // user_pref("dom.storage_access.enabled", "");
-   // user_pref("dom.targetBlankNoOpener.enabled", "");
-   // user_pref("network.cookie.thirdparty.sessionOnly", "");
-   // user_pref("network.cookie.thirdparty.nonsecureSessionOnly", "");
-   // user_pref("privacy.firstparty.isolate.block_post_message", "");
-   // user_pref("privacy.firstparty.isolate.restrict_opener_access", "");
-   // user_pref("privacy.firstparty.isolate.use_site", "");
-   // user_pref("privacy.window.name.update.enabled", "");
-   // user_pref("security.insecure_connection_text.enabled", "");
-/* 6051: prefsCleaner: reset items removed from arkenfox FF102+ ***/
+/* 6050: prefsCleaner: reset items removed from arkenfox FF102+ ***/
    // user_pref("browser.newtab.preload", "");
    // user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", "");
    // user_pref("browser.newtabpage.activity-stream.feeds.snippets", "");
+   // user_pref("browser.ssl_override_behavior", "");
+   // user_pref("devtools.chrome.enabled", "");
+   // user_pref("dom.disable_beforeunload", "");
    // user_pref("extensions.formautofill.available", "");
    // user_pref("extensions.formautofill.addresses.supported", "");
    // user_pref("extensions.formautofill.creditCards.available", "");
@@ -1089,13 +1061,12 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");
 /* 7001: disable APIs
- * Location-Aware Browsing, Full Screen, offline cache (appCache), Virtual Reality
- * [WHY] The API state is easily fingerprintable. Geo and VR are behind prompts (7002).
+ * Location-Aware Browsing, Full Screen, offline cache (appCache)
+ * [WHY] The API state is easily fingerprintable. Geo is behind a prompt (7002).
  * appCache storage capability was removed in FF90. Full screen requires user interaction ***/
    // user_pref("geo.enabled", false);
    // user_pref("full-screen-api.enabled", false);
    // user_pref("browser.cache.offline.enable", false);
-   // user_pref("dom.vr.enabled", false); // [DEFAULT: false FF97+]
 /* 7002: set default permissions
  * Location, Camera, Microphone, Notifications [FF58+] Virtual Reality [FF73+]
  * 0=always ask (default), 1=allow, 2=block
@@ -1143,7 +1114,6 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
 /* 7010: disable HTTP Alternative Services [FF37+]
  * [WHY] Already isolated with network partitioning (FF85+) ***/
    // user_pref("network.http.altsvc.enabled", false);
-   // user_pref("network.http.altsvc.oe", false); // [DEFAULT: false FF94+]
 /* 7011: disable website control over browser right-click context menu
  * [WHY] Just use Shift-Right-Click ***/
    // user_pref("dom.event.contextmenu.enabled", false);
@@ -1195,163 +1165,45 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    [WARNING] DO NOT USE with RFP. RFP already covers these and they can interfere
 ***/
 user_pref("_user.js.parrot", "8000 syntax error: the parrot's crossed the Jordan");
-/* 8001: disable APIs ***/
-   // user_pref("device.sensors.enabled", false);
-   // user_pref("dom.enable_performance", false);
-   // user_pref("dom.enable_resource_timing", false);
-   // user_pref("dom.gamepad.enabled", false);
-   // user_pref("dom.netinfo.enabled", false); // [DEFAULT: false NON-ANDROID: false ANDROID FF99+]
-   // user_pref("dom.webaudio.enabled", false);
-/* 8002: disable other ***/
-   // user_pref("browser.display.use_document_fonts", 0);
-   // user_pref("browser.zoom.siteSpecific", false);
-   // user_pref("dom.w3c_touch_events.enabled", 0);
-   // user_pref("media.navigator.enabled", false);
-   // user_pref("media.ondevicechange.enabled", false);
-   // user_pref("media.video_stats.enabled", false);
-   // user_pref("media.webspeech.synth.enabled", false);
-   // user_pref("webgl.enable-debug-renderer-info", false);
-/* 8003: spoof ***/
-   // user_pref("dom.maxHardwareConcurrency", 2);
-   // user_pref("font.system.whitelist", ""); // [HIDDEN PREF]
-   // user_pref("general.appname.override", ""); // [HIDDEN PREF]
-   // user_pref("general.appversion.override", ""); // [HIDDEN PREF]
-   // user_pref("general.buildID.override", ""); // [HIDDEN PREF]
-   // user_pref("general.oscpu.override", ""); // [HIDDEN PREF]
-   // user_pref("general.platform.override", ""); // [HIDDEN PREF]
-   // user_pref("general.useragent.override", ""); // [HIDDEN PREF]
-   // user_pref("ui.use_standins_for_native_colors", true);
+/* 8001: prefsCleaner: reset items useless for anti-fingerprinting ***/
+   // user_pref("browser.display.use_document_fonts", "");
+   // user_pref("browser.zoom.siteSpecific", "");
+   // user_pref("device.sensors.enabled", "");
+   // user_pref("dom.enable_performance", "");
+   // user_pref("dom.enable_resource_timing", "");
+   // user_pref("dom.gamepad.enabled", "");
+   // user_pref("dom.maxHardwareConcurrency", "");
+   // user_pref("dom.w3c_touch_events.enabled", "");
+   // user_pref("dom.webaudio.enabled", "");
+   // user_pref("font.system.whitelist", "");
+   // user_pref("general.appname.override", "");
+   // user_pref("general.appversion.override", "");
+   // user_pref("general.buildID.override", "");
+   // user_pref("general.oscpu.override", "");
+   // user_pref("general.platform.override", "");
+   // user_pref("general.useragent.override", "");
+   // user_pref("media.navigator.enabled", "");
+   // user_pref("media.ondevicechange.enabled", "");
+   // user_pref("media.video_stats.enabled", "");
+   // user_pref("media.webspeech.synth.enabled", "");
+   // user_pref("ui.use_standins_for_native_colors", "");
+   // user_pref("webgl.enable-debug-renderer-info", "");
 
-/*** [SECTION 9000]: PERSONAL
-   Non-project related but useful. If any interest you, add them to your overrides
-***/
+/*** [SECTION 9000]: NON-PROJECT RELATED ***/
 user_pref("_user.js.parrot", "9000 syntax error: the parrot's cashed in 'is chips!");
-/* WELCOME & WHAT'S NEW NOTICES ***/
-user_pref("browser.startup.homepage_override.mstone", "ignore"); // master switch
-   // user_pref("startup.homepage_welcome_url", "");
-   // user_pref("startup.homepage_welcome_url.additional", "");
-   // user_pref("startup.homepage_override_url", ""); // What's New page after updates
-/* WARNINGS ***/
-   // user_pref("browser.tabs.warnOnClose", false); // [DEFAULT: false FF94+]
-   // user_pref("browser.tabs.warnOnCloseOtherTabs", false);
-   // user_pref("browser.tabs.warnOnOpen", false);
-   // user_pref("browser.warnOnQuitShortcut", false); // [FF94+]
-   // user_pref("full-screen-api.warning.delay", 0);
-   // user_pref("full-screen-api.warning.timeout", 0);
-/* UPDATES ***/
-   // user_pref("app.update.auto", false); // [NON-WINDOWS] disable auto app updates
-      // [NOTE] You will still get prompts to update, and should do so in a timely manner
-      // [SETTING] General>Firefox Updates>Check for updates but let you choose to install them
-   // user_pref("browser.search.update", false); // disable search engine updates (e.g. OpenSearch)
-      // [NOTE] This does not affect Mozilla's built-in or Web Extension search engines
-   // user_pref("extensions.update.enabled", false); // disable extension and theme update checks
-   // user_pref("extensions.update.autoUpdateDefault", false); // disable installing extension and theme updates
-      // [SETTING] about:addons>Extensions>[cog-wheel-icon]>Update Add-ons Automatically (toggle)
-   // user_pref("extensions.getAddons.cache.enabled", false); // disable extension metadata (extension detail tab)
-/* APPEARANCE ***/
-   // user_pref("browser.download.autohideButton", false); // [FF57+]
-   // user_pref("toolkit.legacyUserProfileCustomizations.stylesheets", true); // [FF68+] allow userChrome/userContent
-   // user_pref("ui.prefersReducedMotion", 1); // disable chrome animations [FF77+] [RESTART] [HIDDEN PREF]
-      // 0=no-preference, 1=reduce: with RFP this only affects chrome
-   // user_pref("ui.systemUsesDarkTheme", 1); // [FF67+] [HIDDEN PREF]
-      // 0=light, 1=dark: with RFP this only affects chrome
-/* CONTENT BEHAVIOR ***/
-   // user_pref("accessibility.typeaheadfind", true); // enable "Find As You Type"
-   // user_pref("clipboard.autocopy", false); // disable autocopy default [LINUX]
-   // user_pref("layout.spellcheckDefault", 2); // 0=none, 1-multi-line, 2=multi-line & single-line
-/* FIREFOX HOME CONTENT ***/
-   // user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false); // Recommended by Pocket
-   // user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
-/* HTML5 MEDIA AUTOPLAY ***/
-   // [NOTE] You can set exceptions under site permissions
-   // user_pref("media.autoplay.default", 5); // [FF63+]
-      // 0=Allow all, 1=Block non-muted media (default), 5=Block all
-      // [SETTING] Privacy & Security>Permissions>Autoplay>Settings>Default for all websites
-   // user_pref("media.autoplay.blocking_policy", 2); // disable autoplay if you interacted with the site [FF78+]
-      // 0=sticky (default), 1=transient, 2=user
-      // [1] https://support.mozilla.org/questions/1293231 // links to Autoplay Policy Documentation (PDF)
-/* UX BEHAVIOR ***/
-   // user_pref("browser.backspace_action", 2); // 0=previous page, 1=scroll up, 2=do nothing
-   // user_pref("browser.quitShortcut.disabled", true); // disable Ctrl-Q quit shortcut [LINUX] [MAC] [FF87+]
-   // user_pref("browser.tabs.closeWindowWithLastTab", false);
-   // user_pref("browser.tabs.loadBookmarksInTabs", true); // open bookmarks in a new tab [FF57+]
-   // user_pref("browser.urlbar.decodeURLsOnCopy", true); // see bugzilla 1320061 [FF53+]
-   // user_pref("general.autoScroll", false); // middle-click enabling auto-scrolling [DEFAULT: false on Linux]
-   // user_pref("ui.key.menuAccessKey", 0); // disable alt key toggling the menu bar [RESTART]
-   // user_pref("view_source.tab", false); // view "page/selection source" in a new window [FF68+]
-/* UX FEATURES ***/
-user_pref("browser.messaging-system.whatsNewPanel.enabled", false); // What's New toolbar icon [FF69+]
-   // user_pref("extensions.pocket.enabled", false); // Pocket Account [FF46+]
-   // user_pref("extensions.screenshots.disabled", true); // [FF55+]
-   // user_pref("identity.fxaccounts.enabled", false); // Firefox Accounts & Sync [FF60+] [RESTART]
-   // user_pref("reader.parse-on-load.enabled", false); // Reader View
-/* OTHER ***/
-   // user_pref("browser.bookmarks.max_backups", 2);
-user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+]
-      // [SETTING] General>Browsing>Recommend extensions as you browse
-user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
-      // [SETTING] General>Browsing>Recommend features as you browse
-   // user_pref("browser.sessionstore.interval", 30000); // minimum interval between session save operations
-      // Increasing this may help on older machines and some websites, as well as reducing writes (1304389)
-   // user_pref("network.manage-offline-status", false); // see bugzilla 620472
-   // user_pref("xpinstall.signatures.required", false); // enforced extension signing (Nightly/ESR)
+/* 9001: disable welcome notices ***/
+user_pref("browser.startup.homepage_override.mstone", "ignore");
+/* 9002: disable General>Browsing>Recommend extensions/features as you browse [FF67+] ***/
+user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false);
+user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false);
+/* 9003: disable What's New toolbar icon [FF69+] ***/
+user_pref("browser.messaging-system.whatsNewPanel.enabled", false);
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
    Documentation denoted as [-]. Items deprecated prior to FF91 have been archived at [1]
    [1] https://github.com/arkenfox/user.js/issues/123
 ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's shuffled off 'is mortal coil!");
-/* ESR91.x still uses all the following prefs
-// [NOTE] replace the * with a slash in the line above to re-enable them
-// FF93
-// 7003: disable non-modern cipher suites
-   // [-] https://bugzilla.mozilla.org/1724072
-   // user_pref("security.ssl3.rsa_des_ede3_sha", false); // 3DES
-// FF94
-// 1402: limit font visibility (Windows, Mac, some Linux) [FF79+] - replaced by new 1402
-   // [-] https://bugzilla.mozilla.org/1715507
-   // user_pref("layout.css.font-visibility.level", 1);
-// FF95
-// 0807: disable location bar contextual suggestions [FF92+] - replaced by new 0807
-   // [-] https://bugzilla.mozilla.org/1735976
-user_pref("browser.urlbar.suggest.quicksuggest", false);
-// FF96
-// 0302: disable auto-INSTALLING Firefox updates via a background service + hide the setting [FF90+] [WINDOWS]
-   // [SETTING] General>Firefox Updates>Automatically install updates>When Firefox is not running
-   // [1] https://support.mozilla.org/kb/enable-background-updates-firefox-windows
-   // [-] https://bugzilla.mozilla.org/1738983
-user_pref("app.update.background.scheduling.enabled", false);
-// FF97
-// 7006: onions - replaced by new 7006 "allowlist"
-   // [-] https://bugzilla.mozilla.org/1744006
-   // user_pref("dom.securecontext.whitelist_onions", true); // 1382359
-// FF99
-// 6003: enforce CSP (Content Security Policy)
-   // [1] https://developer.mozilla.org/docs/Web/HTTP/CSP
-   // [-] https://bugzilla.mozilla.org/1754301
-user_pref("security.csp.enable", true); // [DEFAULT: true]
-// FF100
-// 7009: disable HTTP2 - replaced by network.http.http2* prefs
-   // [WHY] Passive fingerprinting. ~50% of sites use HTTP2 [1]
-   // [1] https://w3techs.com/technologies/details/ce-http2/all/all
-   // [-] https://bugzilla.mozilla.org/1752621
-   // user_pref("network.http.spdy.enabled", false);
-   // user_pref("network.http.spdy.enabled.deps", false);
-   // user_pref("network.http.spdy.enabled.http2", false);
-   // user_pref("network.http.spdy.websockets", false); // [FF65+]
-// FF102
-   // 0901: set when Firefox should prompt for the primary password
-   // 0=once per session (default), 1=every time it's needed, 2=after n minutes (0902)
-   // [-] https://bugzilla.mozilla.org/1767099
-user_pref("security.ask_for_password", 2);
-   // 0902: set how long in minutes Firefox should remember the primary password (0901)
-   // [-] https://bugzilla.mozilla.org/1767099
-user_pref("security.password_lifetime", 5); // [DEFAULT: 30]
-   // 6007: enforce Local Storage Next Generation (LSNG) [FF65+]
-   // [-] https://bugzilla.mozilla.org/1764696
-user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
-// ***/
-
 /* ESR102.x still uses all the following prefs
 // [NOTE] replace the * with a slash in the line above to re-enable them
 // FF103
@@ -1362,7 +1214,7 @@ user_pref("dom.storage.next_gen", true); // [DEFAULT: true FF92+]
 user_pref("network.cookie.lifetimePolicy", 2);
 // 6012: disable SHA-1 certificates
    // [-] https://bugzilla.mozilla.org/1766687
-user_pref("security.pki.sha1_enforcement_level", 1); // [DEFAULT: 1 FF102+]
+   // user_pref("security.pki.sha1_enforcement_level", 1); // [DEFAULT: 1]
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From a93047e6c9fb4d6756ceb89a58a080a604280ce7 Mon Sep 17 00:00:00 2001
From: iTawkins <100447932+iTawkins@users.noreply.github.com>
Date: Sun, 13 Nov 2022 14:31:17 +0000
Subject: [PATCH 1070/1147] Improves usability by clarifying desired action
 (#1583)

---
 prefsCleaner.sh | 1 +
 1 file changed, 1 insertion(+)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index da2cfe9..99b8981 100755
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -88,6 +88,7 @@ echo -e "\nThis script should be run from your Firefox profile directory.\n"
 echo "It will remove any entries from prefs.js that also exist in user.js."
 echo "This will allow inactive preferences to be reset to their default values."
 echo -e "\nThis Firefox profile shouldn't be in use during the process.\n"
+echo -e "\nIn order to proceed, select a command below by entering its corresponding number.\n"
 
 [ "$1" == '-s' ] && fStart
 

From 365e76bc9f2c9bf30509ce5f1aec6627ad84c84b Mon Sep 17 00:00:00 2001
From: junoslukan <junos.lukan@protonmail.com>
Date: Sun, 13 Nov 2022 14:37:26 +0000
Subject: [PATCH 1071/1147] Format date and time consistently. (#1580)

* Format date and time consistently.

Co-authored-by: junos <junos.lukan@ijs.si>
Co-authored-by: earthlng <earthlng@users.noreply.github.com>
---
 prefsCleaner.bat | 11 +++++++----
 updater.bat      |  9 +++++----
 2 files changed, 12 insertions(+), 8 deletions(-)

diff --git a/prefsCleaner.bat b/prefsCleaner.bat
index 616ec28..7591c0e 100644
--- a/prefsCleaner.bat
+++ b/prefsCleaner.bat
@@ -3,7 +3,7 @@ TITLE prefs.js cleaner
 
 REM ### prefs.js cleaner for Windows
 REM ## author: @claustromaniac
-REM ## version: 2.4
+REM ## version: 2.5
 
 CD /D "%~dp0"
 
@@ -13,7 +13,7 @@ ECHO:
 ECHO                 ########################################
 ECHO                 ####  prefs.js cleaner for Windows  ####
 ECHO                 ####        by claustromaniac       ####
-ECHO                 ####              v2.4              ####
+ECHO                 ####              v2.5              ####
 ECHO                 ########################################
 ECHO:
 CALL :message "This script should be run from your Firefox profile directory."
@@ -30,9 +30,12 @@ IF NOT EXIST "user.js" (CALL :abort "user.js not found in the current directory.
 IF NOT EXIST "prefs.js" (CALL :abort "prefs.js not found in the current directory." 30)
 CALL :strlenCheck
 CALL :FFcheck
+
 CALL :message "Backing up prefs.js..."
-SET "_time=%time: =0%"
-COPY /B /V /Y prefs.js "prefs-backup-%date:/=-%_%_time::=.%.js"
+FOR /F "usebackq tokens=1,2 delims==" %%i IN (`wmic os get LocalDateTime /VALUE 2^>NUL`) DO IF '.%%i.'=='.LocalDateTime.' SET ldt=%%j
+SET ldt=%ldt:~0,8%_%ldt:~8,6%
+COPY /B /V /Y prefs.js "prefs-backup-%ldt%.js"
+
 CALL :message "Cleaning prefs.js..."
 CALL :cleanup
 CALL :message "All done!"
diff --git a/updater.bat b/updater.bat
index eef06f0..83499c2 100644
--- a/updater.bat
+++ b/updater.bat
@@ -3,10 +3,10 @@ TITLE arkenfox user.js updater
 
 REM ## arkenfox user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.16
+REM ## version: 4.17
 REM ## instructions: https://github.com/arkenfox/user.js/wiki/5.1-Updater-[Options]#-windows
 
-SET v=4.15
+SET v=4.17
 
 VERIFY ON
 CD /D "%~dp0"
@@ -177,8 +177,9 @@ IF EXIST user.js.new (
 		IF DEFINED _singlebackup (
 			MOVE /Y user.js user.js.bak >nul
 		) ELSE (
-			SET "_time=!time: =0!"
-			MOVE /Y user.js "user-backup-!date:/=-!_!_time::=.!.js" >nul
+			FOR /F "usebackq tokens=1,2 delims==" %%i IN (`wmic os get LocalDateTime /VALUE 2^>NUL`) DO IF '.%%i.'=='.LocalDateTime.' SET ldt=%%j
+			SET ldt=%ldt:~0,8%_%ldt:~8,6%
+			MOVE /Y user.js "user-backup-%ldt%.js" >nul
 		)
 		REN user.js.new user.js
 		CALL :message "Update complete."

From 5a366493e029d04103b7f2c25c4eee6dc9b40176 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 19 Nov 2022 04:04:59 +0000
Subject: [PATCH 1072/1147] dom.disable_open_during_load

default true since at least FF60
---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 1e98e9b..892361f 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 4-November-2022
+  Last updated: 19-November-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -245,6 +245,7 @@
     'browser.tabs.warnOnClose',
     'devtools.chrome.enabled',
     'dom.disable_beforeunload',
+    'dom.disable_open_during_load',
     'dom.netinfo.enabled',
     'dom.vr.enabled',
     'extensions.formautofill.addresses.supported',

From cc0f05388f6c721c358e89372caac604f84fd0d9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 21 Nov 2022 00:36:37 +0000
Subject: [PATCH 1073/1147] v107 (#1579)

---
 user.js | 44 ++++++++++++++++++++------------------------
 1 file changed, 20 insertions(+), 24 deletions(-)

diff --git a/user.js b/user.js
index 6eba484..37c3bd0 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 6 November 2022
-* version: 106
+*    date: 21 November 2022
+* version: 107
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -112,8 +112,8 @@ user_pref("geo.provider.use_gpsd", false); // [LINUX]
 user_pref("geo.provider.use_geoclue", false); // [FF102+] [LINUX]
 /* 0203: disable region updates
  * [1] https://firefox-source-docs.mozilla.org/toolkit/modules/toolkit_modules/Region.html ***/
-user_pref("browser.region.network.url", ""); // [FF78+]
 user_pref("browser.region.update.enabled", false); // [FF79+]
+   // user_pref("browser.region.network.url", ""); // [FF78+] Defense-in-depth
 /* 0204: set search region
  * [NOTE] May not be hidden if Firefox has changed your settings due to your region (0203) ***/
    // user_pref("browser.search.region", "US"); // [HIDDEN PREF]
@@ -491,8 +491,8 @@ user_pref("security.remote_settings.crlite_filters.enabled", true);
 user_pref("security.pki.crlite_mode", 2);
 
 /** MIXED CONTENT ***/
-/* 1241: disable insecure passive content (such as images) on https pages [SETUP-WEB] ***/
-user_pref("security.mixed_content.block_display_content", true);
+/* 1241: disable insecure passive content (such as images) on https pages ***/
+   // user_pref("security.mixed_content.block_display_content", true); // Defense-in-depth (see 1244)
 /* 1244: enable HTTPS-Only mode in all windows [FF76+]
  * When the top-level is HTTPS, insecure subresources are also upgraded (silent fail)
  * [SETTING] to add site exceptions: Padlock>HTTPS-Only mode>On (after "Continue to HTTP Site")
@@ -603,9 +603,6 @@ user_pref("media.eme.enabled", false);
 user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");
 /* 2402: prevent scripts from moving and resizing open windows ***/
 user_pref("dom.disable_window_move_resize", true);
-/* 2403: block popup windows
- * [SETTING] Privacy & Security>Permissions>Block pop-up windows ***/
-user_pref("dom.disable_open_during_load", true);
 /* 2404: limit events that can cause a popup [SETUP-WEB] ***/
 user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
 
@@ -624,7 +621,7 @@ user_pref("browser.helperApps.deleteTempFileOnExit", true);
 user_pref("browser.pagethumbnails.capturing_disabled", true); // [HIDDEN PREF]
 /* 2606: disable UITour backend so there is no chance that a remote page can use it ***/
 user_pref("browser.uitour.enabled", false);
-user_pref("browser.uitour.url", "");
+   // user_pref("browser.uitour.url", ""); // Defense-in-depth
 /* 2608: reset remote debugging to disabled
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16222 ***/
 user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
@@ -648,16 +645,16 @@ user_pref("webchannel.allowObject.urlWhitelist", "");
  * [3] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=punycode+firefox
  * [4] https://www.xudongz.com/blog/2017/idn-phishing/ ***/
 user_pref("network.IDN_show_punycode", true);
-/* 2620: enforce PDFJS, disable PDFJS scripting [SETUP-CHROME]
+/* 2620: enforce PDFJS, disable PDFJS scripting
  * This setting controls if the option "Display in Firefox" is available in the setting below
  *   and by effect controls whether PDFs are handled in-browser or externally ("Ask" or "Open With")
- * PROS: pdfjs is lightweight, open source, and more secure/vetted than most
- *   Exploits are rare (one serious case in seven years), treated seriously and patched quickly.
+ * [WHY] pdfjs is lightweight, open source, and secure: the last exploit was June 2015 [1]
  *   It doesn't break "state separation" of browser content (by not sharing with OS, independent apps).
  *   It maintains disk avoidance and application data isolation. It's convenient. You can still save to disk.
- * CONS: You may prefer a different pdf reader for security reasons
- * CAVEAT: JS can still force a pdf to open in-browser by bundling its own code
- * [SETTING] General>Applications>Portable Document Format (PDF) ***/
+ * [NOTE] JS can still force a pdf to open in-browser by bundling its own code
+ * [SETUP-CHROME] You may prefer a different pdf reader for security/workflow reasons
+ * [SETTING] General>Applications>Portable Document Format (PDF)
+ * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=pdf.js+firefox ***/
 user_pref("pdfjs.disabled", false); // [DEFAULT: false]
 user_pref("pdfjs.enableScripting", false); // [FF86+]
 /* 2621: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS] ***/
@@ -717,8 +714,8 @@ user_pref("browser.contentblocking.category", "strict");
 /* 2710: enable state partitioning of service workers [FF96+] ***/
 user_pref("privacy.partition.serviceWorkers", true); // [DEFAULT: true FF105+]
 /* 2720: enable APS (Always Partitioning Storage) ***/
-user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", true); // [FF104+]
-user_pref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", false); // [FF105+]
+user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", true); // [FF104+] [DEFAULT: true FF109+}
+user_pref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", false); // [FF105+] [DEFAULT: false FF109+]
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
@@ -809,7 +806,6 @@ user_pref("privacy.sanitize.timeSpan", 0);
    1382545 - reduce fingerprinting in Animation API
    1354633 - limit MediaError.message to a whitelist
  FF58+
-    967895 - spoof canvas and enable site permission prompt (FF58)
    1372073 - spoof/block fingerprinting in MediaDevices API (FF59)
       Spoof: enumerate devices as one "Internal Camera" and one "Internal Microphone"
       Block: suppresses the ondevicechange event
@@ -925,7 +921,7 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
 /* 5005: disable intermediate certificate caching [FF41+] [RESTART]
  * [NOTE] This affects login/cert/key dbs. The effect is all credentials are session-only.
  * Saved logins and passwords are not available. Reset the pref and restart to return them ***/
-   // user_pref("security.nocertdb", true); // [HIDDEN PREF in FF101 or lower]
+   // user_pref("security.nocertdb", true);
 /* 5006: disable favicons in history and bookmarks
  * [NOTE] Stored as data blobs in favicons.sqlite, these don't reveal anything that your
  * actual history (and bookmarks) already do. Your history is more detailed, so
@@ -1053,6 +1049,7 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
    // user_pref("browser.ssl_override_behavior", "");
    // user_pref("devtools.chrome.enabled", "");
    // user_pref("dom.disable_beforeunload", "");
+   // user_pref("dom.disable_open_during_load", "");
    // user_pref("extensions.formautofill.available", "");
    // user_pref("extensions.formautofill.addresses.supported", "");
    // user_pref("extensions.formautofill.creditCards.available", "");
@@ -1082,8 +1079,8 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
 /* 7003: disable non-modern cipher suites [1]
  * [WHY] Passive fingerprinting. Minimal/non-existent threat of downgrade attacks
  * [1] https://browserleaks.com/ssl ***/
-   // user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false);
-   // user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
+   // user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false); // [DEFAULT: false FF109+]
+   // user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false); // [DEFAULT: false FF109+]
    // user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
    // user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false);
    // user_pref("security.ssl3.rsa_aes_128_gcm_sha256", false); // no PFS
@@ -1097,7 +1094,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
 /* 7005: disable SSL session IDs [FF36+]
  * [WHY] Passive fingerprinting and perf costs. These are session-only
  * and isolated with network partitioning (FF85+) and/or containers ***/
-   // user_pref("security.ssl.disable_session_identifiers", true); // [HIDDEN PREF in FF101 or lower]
+   // user_pref("security.ssl.disable_session_identifiers", true);
 /* 7006: onions
  * [WHY] Firefox doesn't support hidden services. Use Tor Browser ***/
    // user_pref("dom.securecontext.allowlist_onions", true); // [FF97+] 1382359/1744006
@@ -1146,8 +1143,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
    // user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [DEFAULT: true]
 /* 7017: disable service workers
- * [WHY] Already isolated (FF96+) with TCP (2701) behind a pref (2710)
- * or blocked with TCP in 3rd parties (FF95 or lower) ***/
+ * [WHY] Already isolated with TCP (2701) behind a pref (2710) ***/
    // user_pref("dom.serviceWorkers.enabled", false);
 /* 7018: disable Web Notifications
  * [WHY] Web Notifications are behind a prompt (7002)

From 5eaa8196e2bb77a8f126781c6f290af93d091070 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 22 Nov 2022 19:00:47 +0000
Subject: [PATCH 1074/1147] v4.18 - fix backup filename

---
 updater.bat | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/updater.bat b/updater.bat
index 83499c2..40a6d10 100644
--- a/updater.bat
+++ b/updater.bat
@@ -3,10 +3,10 @@ TITLE arkenfox user.js updater
 
 REM ## arkenfox user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.17
+REM ## version: 4.18
 REM ## instructions: https://github.com/arkenfox/user.js/wiki/5.1-Updater-[Options]#-windows
 
-SET v=4.17
+SET v=4.18
 
 VERIFY ON
 CD /D "%~dp0"
@@ -178,8 +178,8 @@ IF EXIST user.js.new (
 			MOVE /Y user.js user.js.bak >nul
 		) ELSE (
 			FOR /F "usebackq tokens=1,2 delims==" %%i IN (`wmic os get LocalDateTime /VALUE 2^>NUL`) DO IF '.%%i.'=='.LocalDateTime.' SET ldt=%%j
-			SET ldt=%ldt:~0,8%_%ldt:~8,6%
-			MOVE /Y user.js "user-backup-%ldt%.js" >nul
+			SET ldt=!ldt:~0,8!_!ldt:~8,6!
+			MOVE /Y user.js "user-backup-!ldt!.js" >nul
 		)
 		REN user.js.new user.js
 		CALL :message "Update complete."

From 6789dc7fefac5594d958a065463b4dc9d265c089 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Tue, 22 Nov 2022 19:50:50 +0000
Subject: [PATCH 1075/1147] fix typo

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 37c3bd0..c3eaab9 100644
--- a/user.js
+++ b/user.js
@@ -714,7 +714,7 @@ user_pref("browser.contentblocking.category", "strict");
 /* 2710: enable state partitioning of service workers [FF96+] ***/
 user_pref("privacy.partition.serviceWorkers", true); // [DEFAULT: true FF105+]
 /* 2720: enable APS (Always Partitioning Storage) ***/
-user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", true); // [FF104+] [DEFAULT: true FF109+}
+user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", true); // [FF104+] [DEFAULT: true FF109+]
 user_pref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", false); // [FF105+] [DEFAULT: false FF109+]
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/

From 40e8e1acbe55dd266a280ab40ab418ca8d9646ec Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 28 Nov 2022 08:11:40 +0000
Subject: [PATCH 1076/1147] beacon.enabled, see #1586

---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 892361f..3928978 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 19-November-2022
+  Last updated: 28-November-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -238,6 +238,7 @@
 
     /* REMOVED */
     /* 103+ */
+    'beacon.enabled',
     'browser.newtab.preload',
     'browser.newtabpage.activity-stream.feeds.discoverystreamfeed',
     'browser.newtabpage.activity-stream.feeds.snippets',

From 45d23f8d75c4cd23be26cfcb32689e60ebbad072 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 2 Dec 2022 10:19:29 +0000
Subject: [PATCH 1077/1147] region prefs, #1590

---
 scratchpad-scripts/arkenfox-cleanup.js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 3928978..fa4409b 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 28-November-2022
+  Last updated: 2-December-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -242,6 +242,9 @@
     'browser.newtab.preload',
     'browser.newtabpage.activity-stream.feeds.discoverystreamfeed',
     'browser.newtabpage.activity-stream.feeds.snippets',
+    'browser.region.network.url',
+    'browser.region.update.enabled',
+    'browser.search.region',
     'browser.ssl_override_behavior',
     'browser.tabs.warnOnClose',
     'devtools.chrome.enabled',

From e4a85c30c129cf664cc8a39705bb070fce828d33 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 5 Dec 2022 18:48:51 +0000
Subject: [PATCH 1078/1147] security.tls.version.enable-deprecated

the UI for downgrading was removed in FF94, default is false
---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index fa4409b..15f59d7 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 2-December-2022
+  Last updated: 5-December-2022
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -257,6 +257,7 @@
     'extensions.formautofill.creditCards.available',
     'extensions.formautofill.creditCards.supported',
     'network.http.altsvc.oe',
+    'security.tls.version.enable-deprecated',
     /* 92-102 */
     'browser.urlbar.trimURLs',
     'dom.caches.enabled',

From 12ca83b550866882c338b354de53287664332560 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sat, 10 Dec 2022 14:00:23 +0000
Subject: [PATCH 1079/1147] v1.6 - autoupdate

---
 prefsCleaner.sh | 83 ++++++++++++++++++++++++++++++++++++++++++-------
 1 file changed, 71 insertions(+), 12 deletions(-)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index 99b8981..dee3f70 100755
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -2,33 +2,54 @@
 
 ## prefs.js cleaner for Linux/Mac
 ## author: @claustromaniac
-## version: 1.5
+## version: 1.6
 
 ## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
 
-currdir=$(pwd)
+## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_prefsCleaner() )
+
+readonly CURRDIR=$(pwd)
 
 ## get the full path of this script (readlink for Linux, greadlink for Mac with coreutils installed)
-sfp=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
+SCRIPT_FILE=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)
 
 ## fallback for Macs without coreutils
-if [ -z "$sfp" ]; then sfp=${BASH_SOURCE[0]}; fi
+[ -z "$SCRIPT_FILE" ] && SCRIPT_FILE=${BASH_SOURCE[0]}
 
-## change directory to the Firefox profile directory
-cd "$(dirname "${sfp}")"
+
+AUTOUPDATE=true
+QUICKSTART=false
+
+## download method priority: curl -> wget
+DOWNLOAD_METHOD=''
+if command -v curl >/dev/null; then
+	DOWNLOAD_METHOD='curl --max-redirs 3 -so'
+elif command -v wget >/dev/null; then
+	DOWNLOAD_METHOD='wget --max-redirect 3 --quiet -O'
+else
+	AUTOUPDATE=false
+	echo -e "No curl or wget detected.\nAutomatic self-update disabled!"
+fi
 
 fQuit() {
 	## change directory back to the original working directory
-	cd "${currdir}"
+	cd "${CURRDIR}"
 	[ "$1" -eq 0 ] && echo -e "\n$2" || echo -e "\n$2" >&2
 	exit $1
 }
 
 fUsage() {
-	echo -e "\nUsage: $0 [-s]"
+	echo -e "\nUsage: $0 [-ds]"
 	echo -e "
 Optional Arguments:
-    -s           Start immediately"
+    -s           Start immediately
+    -d           Don't auto-update prefsCleaner.sh"
+}
+
+download_file() { # expects URL as argument ($1)
+  declare -r tf=$(mktemp)
+
+  $DOWNLOAD_METHOD "${tf}" "$1" &>/dev/null && echo "$tf" || echo '' # return the temp-filename or empty string on error
 }
 
 fFF_check() {
@@ -40,6 +61,24 @@ fFF_check() {
 	done
 }
 
+## returns the version number of a prefsCleaner.sh file
+get_prefsCleaner_version() {
+	echo "$(sed -n '5 s/.*[[:blank:]]\([[:digit:]]*\.[[:digit:]]*\)/\1/p' "$1")"
+}
+
+## updates the prefsCleaner.sh file based on the latest public version
+update_prefsCleaner() {
+	declare -r tmpfile="$(download_file 'https://raw.githubusercontent.com/arkenfox/user.js/master/prefsCleaner.sh')"
+	[ -z "$tmpfile" ] && echo -e "Error! Could not download prefsCleaner.sh" && return 1 # check if download failed
+
+	[[ $(get_prefsCleaner_version "$SCRIPT_FILE") == $(get_prefsCleaner_version "$tmpfile") ]] && return 0
+
+	mv "$tmpfile" "$SCRIPT_FILE"
+	chmod u+x "$SCRIPT_FILE"
+	"$SCRIPT_FILE" -s -d
+	exit 0
+}
+
 fClean() {
 	# the magic happens here
 	prefs="@@"
@@ -78,19 +117,37 @@ fStart() {
 	fQuit 0 "All done!"
 }
 
+
+while getopts "sd" opt; do
+	case $opt in
+		s)
+			QUICKSTART=true
+			;;
+		d)
+			AUTOUPDATE=false
+			;;
+	esac
+done
+
+## change directory to the Firefox profile directory
+cd "$(dirname "${SCRIPT_FILE}")"
+
+[ "$AUTOUPDATE" = true ] && update_prefsCleaner
+
 echo -e "\n\n"
 echo "                   ╔══════════════════════════╗"
 echo "                   ║     prefs.js cleaner     ║"
 echo "                   ║    by claustromaniac     ║"
-echo "                   ║           v1.5           ║"
+echo "                   ║           v1.6           ║"
 echo "                   ╚══════════════════════════╝"
 echo -e "\nThis script should be run from your Firefox profile directory.\n"
 echo "It will remove any entries from prefs.js that also exist in user.js."
 echo "This will allow inactive preferences to be reset to their default values."
 echo -e "\nThis Firefox profile shouldn't be in use during the process.\n"
-echo -e "\nIn order to proceed, select a command below by entering its corresponding number.\n"
 
-[ "$1" == '-s' ] && fStart
+[ "$QUICKSTART" = true ] && fStart
+
+echo -e "\nIn order to proceed, select a command below by entering its corresponding number.\n"
 
 select option in Start Help Exit; do
 	case $option in
@@ -114,3 +171,5 @@ select option in Start Help Exit; do
 			;;
 	esac
 done
+
+fQuit 0

From 7135907b2fe13fa55eb8ebf162603037f83e353c Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sat, 10 Dec 2022 14:35:48 +0000
Subject: [PATCH 1080/1147] Update prefsCleaner.sh

---
 prefsCleaner.sh | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index dee3f70..052905e 100755
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -75,7 +75,7 @@ update_prefsCleaner() {
 
 	mv "$tmpfile" "$SCRIPT_FILE"
 	chmod u+x "$SCRIPT_FILE"
-	"$SCRIPT_FILE" -s -d
+	"$SCRIPT_FILE" "$@" -d
 	exit 0
 }
 
@@ -132,7 +132,7 @@ done
 ## change directory to the Firefox profile directory
 cd "$(dirname "${SCRIPT_FILE}")"
 
-[ "$AUTOUPDATE" = true ] && update_prefsCleaner
+[ "$AUTOUPDATE" = true ] && update_prefsCleaner "$@"
 
 echo -e "\n\n"
 echo "                   ╔══════════════════════════╗"

From f5e54b4a709ca3d58e12e7524e71d3cd7f994515 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 2 Jan 2023 17:15:24 +0000
Subject: [PATCH 1081/1147] revert security.tls.version.enable-deprecated

we kept it in the user js
---
 scratchpad-scripts/arkenfox-cleanup.js | 1 -
 1 file changed, 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 15f59d7..6743ca7 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -257,7 +257,6 @@
     'extensions.formautofill.creditCards.available',
     'extensions.formautofill.creditCards.supported',
     'network.http.altsvc.oe',
-    'security.tls.version.enable-deprecated',
     /* 92-102 */
     'browser.urlbar.trimURLs',
     'dom.caches.enabled',

From be376afc1ef9ee6c1eb305768af1da4a3eb1ca1e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 8 Jan 2023 15:20:22 +0000
Subject: [PATCH 1082/1147] v108 (#1606)

---
 user.js | 37 ++++++++++++++++---------------------
 1 file changed, 16 insertions(+), 21 deletions(-)

diff --git a/user.js b/user.js
index c3eaab9..6a150db 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 21 November 2022
-* version: 107
+*    date: 9 January 2023
+* version: 108
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -110,13 +110,6 @@ user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
 user_pref("geo.provider.use_corelocation", false); // [MAC]
 user_pref("geo.provider.use_gpsd", false); // [LINUX]
 user_pref("geo.provider.use_geoclue", false); // [FF102+] [LINUX]
-/* 0203: disable region updates
- * [1] https://firefox-source-docs.mozilla.org/toolkit/modules/toolkit_modules/Region.html ***/
-user_pref("browser.region.update.enabled", false); // [FF79+]
-   // user_pref("browser.region.network.url", ""); // [FF78+] Defense-in-depth
-/* 0204: set search region
- * [NOTE] May not be hidden if Firefox has changed your settings due to your region (0203) ***/
-   // user_pref("browser.search.region", "US"); // [HIDDEN PREF]
 /* 0210: set preferred language for displaying pages
  * [SETTING] General>Language and Appearance>Language>Choose your preferred language...
  * [TEST] https://addons.mozilla.org/about ***/
@@ -268,6 +261,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
 /* 0701: disable IPv6
  * IPv6 can be abused, especially with MAC addresses, and can leak with VPNs: assuming
  * your ISP and/or router and/or website is IPv6 capable. Most sites will fall back to IPv4
+ * [SETUP-WEB] PR_CONNECT_RESET_ERROR: this pref *might* be the cause
  * [STATS] Firefox telemetry (Sept 2022) shows ~8% of successful connections are IPv6
  * [NOTE] This is an application level fallback. Disabling IPv6 is best done at an
  * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
@@ -477,7 +471,7 @@ user_pref("security.OCSP.require", true);
 user_pref("security.family_safety.mode", 0);
 /* 1223: enable strict PKP (Public Key Pinning)
  * 0=disabled, 1=allow user MiTM (default; such as your antivirus), 2=strict
- * [SETUP-WEB] MOZILLA_PKIX_ERROR_KEY_PINNING_FAILURE: If you rely on an AV (antivirus) to protect
+ * [SETUP-WEB] MOZILLA_PKIX_ERROR_KEY_PINNING_FAILURE
  * your web browsing by inspecting ALL your web traffic, then override to current default ***/
 user_pref("security.cert_pinning.enforcement_level", 2);
 /* 1224: enable CRLite [FF73+]
@@ -565,10 +559,8 @@ user_pref("privacy.userContext.ui.enabled", true);
 /*** [SECTION 2000]: PLUGINS / MEDIA / WEBRTC ***/
 user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
 /* 2001: disable WebRTC (Web Real-Time Communication)
- * Firefox uses mDNS hostname obfuscation on desktop (except Windows7/8) and the
- * private IP is NEVER exposed, except if required in TRUSTED scenarios; i.e. after
- * you grant device (microphone or camera) access
- * [SETUP-HARDEN] Test first. Windows7/8 users only: behind a proxy who never use WebRTC
+ * Firefox desktop uses mDNS hostname obfuscation and the private IP is never exposed until
+ * required in TRUSTED scenarios; i.e. after you grant device (microphone or camera) access
  * [TEST] https://browserleaks.com/webrtc
  * [1] https://groups.google.com/g/discuss-webrtc/c/6stQXi72BEU/m/2FwZd24UAQAJ
  * [2] https://datatracker.ietf.org/doc/html/draft-ietf-mmusic-mdns-ice-candidates#section-3.1.1 ***/
@@ -603,7 +595,7 @@ user_pref("media.eme.enabled", false);
 user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");
 /* 2402: prevent scripts from moving and resizing open windows ***/
 user_pref("dom.disable_window_move_resize", true);
-/* 2404: limit events that can cause a popup [SETUP-WEB] ***/
+/* 2404: limit events that can cause a pop-up [SETUP-WEB] ***/
 user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
 
 /*** [SECTION 2600]: MISCELLANEOUS ***/
@@ -611,9 +603,6 @@ user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curta
 /* 2601: prevent accessibility services from accessing your browser [RESTART]
  * [1] https://support.mozilla.org/kb/accessibility-services ***/
 user_pref("accessibility.force_disabled", 1);
-/* 2602: disable sending additional analytics to web servers
- * [1] https://developer.mozilla.org/docs/Web/API/Navigator/sendBeacon ***/
-user_pref("beacon.enabled", false);
 /* 2603: remove temp files opened with an external application
  * [1] https://bugzilla.mozilla.org/302433 ***/
 user_pref("browser.helperApps.deleteTempFileOnExit", true);
@@ -829,6 +818,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
     531915 - use fdlibm's sin, cos and tan in jsmath (FF93, ESR91.1)
    1756280 - enforce navigator.pdfViewerEnabled as true and plugins/mimeTypes as hard-coded values (FF100)
    1692609 - reduce JS timing precision to 16.67ms (previously FF55+ was 100ms) (FF102)
+   1422237 - return "srgb" with color-gamut (FF110)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting [FF41+]
@@ -1034,18 +1024,20 @@ user_pref("privacy.firstparty.isolate", false); // [DEFAULT: false]
  * In FF96+ these are listed in about:compat
  * [1] https://blog.mozilla.org/security/2021/03/23/introducing-smartblock/ ***/
 user_pref("extensions.webcompat.enable_shims", true); // [DEFAULT: true]
-/* 6010: enforce/reset TLS 1.0/1.1 downgrades to session only
- * [NOTE] In FF97+ the TLS 1.0/1.1 downgrade UX was removed
+/* 6010: enforce no TLS 1.0/1.1 downgrades
  * [TEST] https://tls-v1-1.badssl.com:1010/ ***/
 user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
 /* 6011: enforce disabling of Web Compatibility Reporter [FF56+]
  * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla
  * [WHY] To prevent wasting Mozilla's time with a custom setup ***/
 user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
-/* 6050: prefsCleaner: reset items removed from arkenfox FF102+ ***/
+/* 6050: prefsCleaner: reset previously active items removed from arkenfox FF102+ ***/
+   // user_pref("beacon.enabled", "");
    // user_pref("browser.newtab.preload", "");
    // user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", "");
    // user_pref("browser.newtabpage.activity-stream.feeds.snippets", "");
+   // user_pref("browser.region.network.url", "");
+   // user_pref("browser.region.update.enabled", "")
    // user_pref("browser.ssl_override_behavior", "");
    // user_pref("devtools.chrome.enabled", "");
    // user_pref("dom.disable_beforeunload", "");
@@ -1194,6 +1186,9 @@ user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", fa
 user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false);
 /* 9003: disable What's New toolbar icon [FF69+] ***/
 user_pref("browser.messaging-system.whatsNewPanel.enabled", false);
+/* 9004: disable seach terms [FF110+]
+ * [SETTING] Search > SearchBar > Use the address bar for search and navigation > Show search terms instead of URL... ***/
+user_pref("browser.urlbar.showSearchTerms.enabled", false);
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
    Documentation denoted as [-]. Items deprecated prior to FF91 have been archived at [1]

From 62a68f08147123b0c2c288ffdecc3f03e4ab1ae8 Mon Sep 17 00:00:00 2001
From: icpantsparti2 <101484718+icpantsparti2@users.noreply.github.com>
Date: Sun, 8 Jan 2023 16:48:25 +0000
Subject: [PATCH 1083/1147] v108 (#1613)

nit: add a ';' to the end of line 1040
---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index 6a150db..6cb9953 100644
--- a/user.js
+++ b/user.js
@@ -1037,7 +1037,7 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
    // user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", "");
    // user_pref("browser.newtabpage.activity-stream.feeds.snippets", "");
    // user_pref("browser.region.network.url", "");
-   // user_pref("browser.region.update.enabled", "")
+   // user_pref("browser.region.update.enabled", "");
    // user_pref("browser.ssl_override_behavior", "");
    // user_pref("devtools.chrome.enabled", "");
    // user_pref("dom.disable_beforeunload", "");

From b99dd27de828be13530ce2f48c9178d34f5f82ab Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 27 Jan 2023 01:07:25 +0000
Subject: [PATCH 1084/1147] browser.startup.blankWindow, #1618

---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 6743ca7..6e06248 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 5-December-2022
+  Last updated: 27-January-2023
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -239,6 +239,7 @@
     /* REMOVED */
     /* 103+ */
     'beacon.enabled',
+    'browser.startup.blankWindow',
     'browser.newtab.preload',
     'browser.newtabpage.activity-stream.feeds.discoverystreamfeed',
     'browser.newtabpage.activity-stream.feeds.snippets',

From 82591911670943e629f5bc0a83adb95b2e5909ed Mon Sep 17 00:00:00 2001
From: Keith Harrison <keithh@protonmail.com>
Date: Sun, 5 Feb 2023 14:06:49 +0000
Subject: [PATCH 1085/1147] prefsCleaner.bat: add -unattended flag (#1616)

* prefsCleaner.bat: add -unattended flag

Usage:
  prefsCleaner.bat -unattended

Skips the prompt for user input and proceeds when -unattended is specified. If omitted, default behaviour is unchanged.

---------

Signed-off-by: Keith Harrison <keithh@protonmail.com>
Co-authored-by: earthlng <earthlng@users.noreply.github.com>
---
 prefsCleaner.bat | 17 +++++++++++------
 1 file changed, 11 insertions(+), 6 deletions(-)

diff --git a/prefsCleaner.bat b/prefsCleaner.bat
index 7591c0e..d266b3f 100644
--- a/prefsCleaner.bat
+++ b/prefsCleaner.bat
@@ -3,17 +3,19 @@ TITLE prefs.js cleaner
 
 REM ### prefs.js cleaner for Windows
 REM ## author: @claustromaniac
-REM ## version: 2.5
+REM ## version: 2.6
 
 CD /D "%~dp0"
 
+IF /I "%~1"=="-unattended" (SET _ua=1)
+
 :begin
 ECHO:
 ECHO:
 ECHO                 ########################################
 ECHO                 ####  prefs.js cleaner for Windows  ####
 ECHO                 ####        by claustromaniac       ####
-ECHO                 ####              v2.5              ####
+ECHO                 ####              v2.6              ####
 ECHO                 ########################################
 ECHO:
 CALL :message "This script should be run from your Firefox profile directory."
@@ -22,10 +24,13 @@ CALL :message "This will allow inactive preferences to be reset to their default
 ECHO   This Firefox profile shouldn't be in use during the process.
 CALL :message ""
 TIMEOUT 1 /nobreak >nul
-CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
-CLS
-IF ERRORLEVEL 3 (EXIT /B)
-IF ERRORLEVEL 2 (GOTO :showhelp)
+
+IF NOT DEFINED _ua (
+	CHOICE /C SHE /N /M "Start [S] Help [H] Exit [E]"
+	CLS
+	IF ERRORLEVEL 3 (EXIT /B)
+	IF ERRORLEVEL 2 (GOTO :showhelp)
+)
 IF NOT EXIST "user.js" (CALL :abort "user.js not found in the current directory." 30)
 IF NOT EXIST "prefs.js" (CALL :abort "prefs.js not found in the current directory." 30)
 CALL :strlenCheck

From 73884850632ffe284f76881786f7d5903b917f58 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 7 Feb 2023 00:02:45 +0000
Subject: [PATCH 1086/1147] v109 (#1614)

---
 user.js | 24 ++++++++++--------------
 1 file changed, 10 insertions(+), 14 deletions(-)

diff --git a/user.js b/user.js
index 6cb9953..4217d61 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 9 January 2023
-* version: 108
+*    date: 7 February 2023
+* version: 109
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -471,8 +471,7 @@ user_pref("security.OCSP.require", true);
 user_pref("security.family_safety.mode", 0);
 /* 1223: enable strict PKP (Public Key Pinning)
  * 0=disabled, 1=allow user MiTM (default; such as your antivirus), 2=strict
- * [SETUP-WEB] MOZILLA_PKIX_ERROR_KEY_PINNING_FAILURE
- * your web browsing by inspecting ALL your web traffic, then override to current default ***/
+ * [SETUP-WEB] MOZILLA_PKIX_ERROR_KEY_PINNING_FAILURE ***/
 user_pref("security.cert_pinning.enforcement_level", 2);
 /* 1224: enable CRLite [FF73+]
  * 0 = disabled
@@ -595,8 +594,6 @@ user_pref("media.eme.enabled", false);
 user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");
 /* 2402: prevent scripts from moving and resizing open windows ***/
 user_pref("dom.disable_window_move_resize", true);
-/* 2404: limit events that can cause a pop-up [SETUP-WEB] ***/
-user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
 
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
@@ -606,8 +603,6 @@ user_pref("accessibility.force_disabled", 1);
 /* 2603: remove temp files opened with an external application
  * [1] https://bugzilla.mozilla.org/302433 ***/
 user_pref("browser.helperApps.deleteTempFileOnExit", true);
-/* 2604: disable page thumbnail collection ***/
-user_pref("browser.pagethumbnails.capturing_disabled", true); // [HIDDEN PREF]
 /* 2606: disable UITour backend so there is no chance that a remote page can use it ***/
 user_pref("browser.uitour.enabled", false);
    // user_pref("browser.uitour.url", ""); // Defense-in-depth
@@ -853,10 +848,6 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
    // user_pref("privacy.resistFingerprinting.testGranularityMask", 0);
 /* 4506: set RFP's font visibility level (1402) [FF94+] ***/
    // user_pref("layout.css.font-visibility.resistFingerprinting", 1); // [DEFAULT: 1]
-/* 4507: disable showing about:blank as soon as possible during startup [FF60+]
- * When default true this no longer masks the RFP chrome resizing activity
- * [1] https://bugzilla.mozilla.org/1448423 ***/
-user_pref("browser.startup.blankWindow", false);
 /* 4510: disable using system colors
  * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
 user_pref("browser.display.use_system_colors", false); // [DEFAULT: false NON-WINDOWS]
@@ -963,6 +954,10 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
    // user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
    // user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
    // user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
+/* 5017: limit events that can cause a pop-up ***/
+   // user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
+/* 5018: disable page thumbnail collection ***/
+   // user_pref("browser.pagethumbnails.capturing_disabled", true); // [HIDDEN PREF]
 
 /*** [SECTION 5500]: OPTIONAL HARDENING
    Not recommended. Overriding these can cause breakage and performance issues,
@@ -1033,6 +1028,7 @@ user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
 user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
 /* 6050: prefsCleaner: reset previously active items removed from arkenfox FF102+ ***/
    // user_pref("beacon.enabled", "");
+   // user_pref("browser.startup.blankWindow", "");
    // user_pref("browser.newtab.preload", "");
    // user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", "");
    // user_pref("browser.newtabpage.activity-stream.feeds.snippets", "");
@@ -1186,8 +1182,8 @@ user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", fa
 user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false);
 /* 9003: disable What's New toolbar icon [FF69+] ***/
 user_pref("browser.messaging-system.whatsNewPanel.enabled", false);
-/* 9004: disable seach terms [FF110+]
- * [SETTING] Search > SearchBar > Use the address bar for search and navigation > Show search terms instead of URL... ***/
+/* 9004: disable search terms [FF110+]
+ * [SETTING] Search>Search Bar>Use the address bar for search and navigation>Show search terms instead of URL... ***/
 user_pref("browser.urlbar.showSearchTerms.enabled", false);
 
 /*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED

From ca022d8c2d2d8b2e149fd34a696284759e566f4e Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Fri, 10 Mar 2023 09:21:21 +0000
Subject: [PATCH 1087/1147] v4.19 - use Powershell for locale-independent TS

---
 updater.bat | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/updater.bat b/updater.bat
index 40a6d10..f6174f7 100644
--- a/updater.bat
+++ b/updater.bat
@@ -3,10 +3,10 @@ TITLE arkenfox user.js updater
 
 REM ## arkenfox user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.18
+REM ## version: 4.19
 REM ## instructions: https://github.com/arkenfox/user.js/wiki/5.1-Updater-[Options]#-windows
 
-SET v=4.18
+SET v=4.19
 
 VERIFY ON
 CD /D "%~dp0"
@@ -177,8 +177,7 @@ IF EXIST user.js.new (
 		IF DEFINED _singlebackup (
 			MOVE /Y user.js user.js.bak >nul
 		) ELSE (
-			FOR /F "usebackq tokens=1,2 delims==" %%i IN (`wmic os get LocalDateTime /VALUE 2^>NUL`) DO IF '.%%i.'=='.LocalDateTime.' SET ldt=%%j
-			SET ldt=!ldt:~0,8!_!ldt:~8,6!
+			FOR /F "delims=" %%# IN ('powershell get-date -format "{yyyyMMdd_HHmmss}"') DO @SET ldt=%%#
 			MOVE /Y user.js "user-backup-!ldt!.js" >nul
 		)
 		REN user.js.new user.js

From d13f39d9f9c4dae6f7034fe8b4f29e5893a5abdc Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Mar 2023 03:26:12 +0000
Subject: [PATCH 1088/1147] v110 (#1629)

---
 user.js | 22 +++++++++++-----------
 1 file changed, 11 insertions(+), 11 deletions(-)

diff --git a/user.js b/user.js
index 4217d61..bf931b2 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 7 February 2023
-* version: 109
+*    date: 12 March 2023
+* version: 110
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -557,13 +557,6 @@ user_pref("privacy.userContext.ui.enabled", true);
 
 /*** [SECTION 2000]: PLUGINS / MEDIA / WEBRTC ***/
 user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
-/* 2001: disable WebRTC (Web Real-Time Communication)
- * Firefox desktop uses mDNS hostname obfuscation and the private IP is never exposed until
- * required in TRUSTED scenarios; i.e. after you grant device (microphone or camera) access
- * [TEST] https://browserleaks.com/webrtc
- * [1] https://groups.google.com/g/discuss-webrtc/c/6stQXi72BEU/m/2FwZd24UAQAJ
- * [2] https://datatracker.ietf.org/doc/html/draft-ietf-mmusic-mdns-ice-candidates#section-3.1.1 ***/
-   // user_pref("media.peerconnection.enabled", false);
 /* 2002: force WebRTC inside the proxy [FF70+] ***/
 user_pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true);
 /* 2003: force a single network interface for ICE candidates generation [FF42+]
@@ -954,9 +947,9 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
    // user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
    // user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
    // user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
-/* 5017: limit events that can cause a pop-up ***/
+/* 5018: limit events that can cause a pop-up ***/
    // user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
-/* 5018: disable page thumbnail collection ***/
+/* 5019: disable page thumbnail collection ***/
    // user_pref("browser.pagethumbnails.capturing_disabled", true); // [HIDDEN PREF]
 
 /*** [SECTION 5500]: OPTIONAL HARDENING
@@ -1143,6 +1136,13 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [NOTE] To remove all subscriptions, reset "dom.push.userAgentID"
  * [1] https://support.mozilla.org/kb/push-notifications-firefox ***/
    // user_pref("dom.push.enabled", false);
+/* 7020: disable WebRTC (Web Real-Time Communication)
+ * [WHY] Firefox desktop uses mDNS hostname obfuscation and the private IP is never exposed until
+ * required in TRUSTED scenarios; i.e. after you grant device (microphone or camera) access
+ * [TEST] https://browserleaks.com/webrtc
+ * [1] https://groups.google.com/g/discuss-webrtc/c/6stQXi72BEU/m/2FwZd24UAQAJ
+ * [2] https://datatracker.ietf.org/doc/html/draft-ietf-mmusic-mdns-ice-candidates#section-3.1.1 ***/
+   // user_pref("media.peerconnection.enabled", false);
 
 /*** [SECTION 8000]: DON'T BOTHER: FINGERPRINTING
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good

From e2e8c4ea8f9c8034a2ff72fe3c2d4a4a89404c10 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 13 Mar 2023 07:13:07 +0000
Subject: [PATCH 1089/1147] add arkenfox/gui

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 2f33ad9..1a27d8a 100644
--- a/README.md
+++ b/README.md
@@ -7,7 +7,7 @@ A `user.js` is a configuration file that can control Firefox settings - for a mo
 
 The `arkenfox user.js` is a **template** which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).
 
-Everyone, experts included, should at least read the [wiki](https://github.com/arkenfox/user.js/wiki), as it contains important information regarding a few `user.js` settings.
+Everyone, experts included, should at least read the [wiki](https://github.com/arkenfox/user.js/wiki), as it contains important information regarding a few `user.js` settings. There is also an [interactive current release](https://arkenfox.github.io/gui/), thanks to [icpantsparti2](https://github.com/icpantsparti2).
 
 Note that we do *not* recommend connecting over Tor on Firefox. Use the [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) if your [threat model](https://2019.www.torproject.org/about/torusers.html) calls for it, or for accessing hidden services.
 

From bdaa2867b923669361a8527065e919c839668599 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 19 Mar 2023 11:16:40 +0000
Subject: [PATCH 1090/1147] v2.7 - use Powershell for locale-independent TS

fixes #1624
---
 prefsCleaner.bat | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/prefsCleaner.bat b/prefsCleaner.bat
index d266b3f..2e3403f 100644
--- a/prefsCleaner.bat
+++ b/prefsCleaner.bat
@@ -3,7 +3,7 @@ TITLE prefs.js cleaner
 
 REM ### prefs.js cleaner for Windows
 REM ## author: @claustromaniac
-REM ## version: 2.6
+REM ## version: 2.7
 
 CD /D "%~dp0"
 
@@ -15,7 +15,7 @@ ECHO:
 ECHO                 ########################################
 ECHO                 ####  prefs.js cleaner for Windows  ####
 ECHO                 ####        by claustromaniac       ####
-ECHO                 ####              v2.6              ####
+ECHO                 ####              v2.7              ####
 ECHO                 ########################################
 ECHO:
 CALL :message "This script should be run from your Firefox profile directory."
@@ -37,8 +37,7 @@ CALL :strlenCheck
 CALL :FFcheck
 
 CALL :message "Backing up prefs.js..."
-FOR /F "usebackq tokens=1,2 delims==" %%i IN (`wmic os get LocalDateTime /VALUE 2^>NUL`) DO IF '.%%i.'=='.LocalDateTime.' SET ldt=%%j
-SET ldt=%ldt:~0,8%_%ldt:~8,6%
+FOR /F "delims=" %%# IN ('powershell get-date -format "{yyyyMMdd_HHmmss}"') DO @SET ldt=%%#
 COPY /B /V /Y prefs.js "prefs-backup-%ldt%.js"
 
 CALL :message "Cleaning prefs.js..."

From c84c419544cbbe4442190cc6325b926b519d8db5 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 30 Mar 2023 04:50:25 +0000
Subject: [PATCH 1091/1147] v111 (#1650)

---
 user.js | 12 +++++++-----
 1 file changed, 7 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index bf931b2..3e3b84c 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 12 March 2023
-* version: 110
+*    date: 30 March 2023
+* version: 111
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -262,7 +262,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
  * IPv6 can be abused, especially with MAC addresses, and can leak with VPNs: assuming
  * your ISP and/or router and/or website is IPv6 capable. Most sites will fall back to IPv4
  * [SETUP-WEB] PR_CONNECT_RESET_ERROR: this pref *might* be the cause
- * [STATS] Firefox telemetry (Sept 2022) shows ~8% of successful connections are IPv6
+ * [STATS] Firefox telemetry (Feb 2023) shows ~9% of successful connections are IPv6
  * [NOTE] This is an application level fallback. Disabling IPv6 is best done at an
  * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
  * then this won't make much difference. If you are masking your IP, then it can only help.
@@ -426,7 +426,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * but the problem is that the browser can't know that. Setting this pref to true is the only way for the
  * browser to ensure there will be no unsafe renegotiations on the channel between the browser and the server
  * [SETUP-WEB] SSL_ERROR_UNSAFE_NEGOTIATION: is it worth overriding this for that one site?
- * [STATS] SSL Labs (Sept 2022) reports over 99.3% of top sites have secure renegotiation [4]
+ * [STATS] SSL Labs (Feb 2023) reports over 99.3% of top sites have secure renegotiation [4]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
  * [2] https://datatracker.ietf.org/doc/html/rfc5746
  * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
@@ -875,7 +875,7 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
  * caches, searches, cookies, localStorage, IndexedDB etc (which you can achieve in normal mode).
  * In fact, PB mode limits or removes the ability to control some of these, and you need to quit
  * Firefox to clear them. PB is best used as a one off window (Menu>New Private Window) to provide
- * a temporary self-contained new session. Close all Private Windows to clear the PB mode session.
+ * a temporary self-contained new session. Close all private windows to clear the PB session.
  * [SETTING] Privacy & Security>History>Custom Settings>Always use private browsing mode
  * [1] https://wiki.mozilla.org/Private_Browsing
  * [2] https://support.mozilla.org/kb/common-myths-about-private-browsing ***/
@@ -951,6 +951,8 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
    // user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
 /* 5019: disable page thumbnail collection ***/
    // user_pref("browser.pagethumbnails.capturing_disabled", true); // [HIDDEN PREF]
+/* 5020: disable Windows native notifications and use app notications instead [FF111+] [WINDOWS] ***/
+   // user_pref("alerts.useSystemBackend.windows.notificationserver.enabled", false);
 
 /*** [SECTION 5500]: OPTIONAL HARDENING
    Not recommended. Overriding these can cause breakage and performance issues,

From f2e4a79ca0220aa2ad87e76ff59f5cbc37c5f373 Mon Sep 17 00:00:00 2001
From: Celestial Nebula <41875671+CelestialNebula@users.noreply.github.com>
Date: Sat, 22 Apr 2023 11:52:26 +0000
Subject: [PATCH 1092/1147] updater.sh/prefsCleaner.sh: Check for root and
 abort (#1651)

* updater.sh/prefsCleaner.sh: Check for root and abort

Check if running as root and if any files have the owner/group as root|wheel.
Abort on both.

Should (hopefully) prevent stuff like: https://github.com/arkenfox/user.js/issues/1587
Discussion: https://github.com/arkenfox/user.js/pull/1595

---------

Co-authored-by: Mohammed Anas <triallax@tutanota.com>
Co-authored-by: earthlng <earthlng@users.noreply.github.com>
---
 prefsCleaner.sh | 15 +++++++++++++--
 updater.sh      | 13 ++++++++++++-
 2 files changed, 25 insertions(+), 3 deletions(-)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index 052905e..9aa89f0 100755
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -2,12 +2,23 @@
 
 ## prefs.js cleaner for Linux/Mac
 ## author: @claustromaniac
-## version: 1.6
+## version: 1.7
 
 ## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
 
 ## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_prefsCleaner() )
 
+# Check if running as root and if any files have the owner/group as root/wheel.
+if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
+	printf 'You shouldn't run this with elevated privileges (such as with doas/sudo).\n'
+	exit 1
+elif [ -n "$(find ./ -user 0 -o -group 0)" ]; then
+	printf 'It looks like this script was previously run with elevated privileges,
+you will need to change ownership of the following files to your user:\n'
+	find . -user 0 -o -group 0
+	exit 1
+fi
+
 readonly CURRDIR=$(pwd)
 
 ## get the full path of this script (readlink for Linux, greadlink for Mac with coreutils installed)
@@ -138,7 +149,7 @@ echo -e "\n\n"
 echo "                   ╔══════════════════════════╗"
 echo "                   ║     prefs.js cleaner     ║"
 echo "                   ║    by claustromaniac     ║"
-echo "                   ║           v1.6           ║"
+echo "                   ║           v1.7           ║"
 echo "                   ╚══════════════════════════╝"
 echo -e "\nThis script should be run from your Firefox profile directory.\n"
 echo "It will remove any entries from prefs.js that also exist in user.js."
diff --git a/updater.sh b/updater.sh
index bf275c5..0f544d0 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,12 +2,23 @@
 
 ## arkenfox user.js updater for macOS and Linux
 
-## version: 3.5
+## version: 3.6
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac, @infinitewarp
 
 ## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_updater() )
 
+# Check if running as root and if any files have the owner/group as root/wheel.
+if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
+	printf 'You shouldn't run this with elevated privileges (such as with doas/sudo).\n'
+	exit 1
+elif [ -n "$(find ./ -user 0 -o -group 0)" ]; then
+	printf 'It looks like this script was previously run with elevated privileges,
+you will need to change ownership of the following files to your user:\n'
+	find . -user 0 -o -group 0
+	exit 1
+fi
+
 readonly CURRDIR=$(pwd)
 
 SCRIPT_FILE=$(readlink -f "${BASH_SOURCE[0]}" 2>/dev/null || greadlink -f "${BASH_SOURCE[0]}" 2>/dev/null)

From 7a1d0a92af95d152349830d027648fa299b9bcba Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 23 Apr 2023 09:13:13 +0000
Subject: [PATCH 1093/1147] v3.7 - fix syntax error

---
 updater.sh | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/updater.sh b/updater.sh
index 0f544d0..9f4b46b 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## arkenfox user.js updater for macOS and Linux
 
-## version: 3.6
+## version: 3.7
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac, @infinitewarp
 
@@ -10,7 +10,7 @@
 
 # Check if running as root and if any files have the owner/group as root/wheel.
 if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
-	printf 'You shouldn't run this with elevated privileges (such as with doas/sudo).\n'
+	printf 'You shouldn\'t run this with elevated privileges (such as with doas/sudo).\n'
 	exit 1
 elif [ -n "$(find ./ -user 0 -o -group 0)" ]; then
 	printf 'It looks like this script was previously run with elevated privileges,

From d50c772d7d28b0a49e19e5ded6dcb0c4e52717be Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sun, 23 Apr 2023 09:14:03 +0000
Subject: [PATCH 1094/1147] v1.8 - fix syntax error

---
 prefsCleaner.sh | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index 9aa89f0..c62f070 100755
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -2,7 +2,7 @@
 
 ## prefs.js cleaner for Linux/Mac
 ## author: @claustromaniac
-## version: 1.7
+## version: 1.8
 
 ## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
 
@@ -10,7 +10,7 @@
 
 # Check if running as root and if any files have the owner/group as root/wheel.
 if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
-	printf 'You shouldn't run this with elevated privileges (such as with doas/sudo).\n'
+	printf 'You shouldn\'t run this with elevated privileges (such as with doas/sudo).\n'
 	exit 1
 elif [ -n "$(find ./ -user 0 -o -group 0)" ]; then
 	printf 'It looks like this script was previously run with elevated privileges,
@@ -149,7 +149,7 @@ echo -e "\n\n"
 echo "                   ╔══════════════════════════╗"
 echo "                   ║     prefs.js cleaner     ║"
 echo "                   ║    by claustromaniac     ║"
-echo "                   ║           v1.7           ║"
+echo "                   ║           v1.8           ║"
 echo "                   ╚══════════════════════════╝"
 echo -e "\nThis script should be run from your Firefox profile directory.\n"
 echo "It will remove any entries from prefs.js that also exist in user.js."

From 2f4b93a18fe610435f7142c3a23baa7e247d9613 Mon Sep 17 00:00:00 2001
From: bol0gna <75225753+bol0gna@users.noreply.github.com>
Date: Mon, 24 Apr 2023 12:56:29 -0400
Subject: [PATCH 1095/1147] fix escape character, should close #1667 (#1668)

---
 updater.sh | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/updater.sh b/updater.sh
index 9f4b46b..6a3d1f2 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## arkenfox user.js updater for macOS and Linux
 
-## version: 3.7
+## version: 3.8
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac, @infinitewarp
 
@@ -10,7 +10,7 @@
 
 # Check if running as root and if any files have the owner/group as root/wheel.
 if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
-	printf 'You shouldn\'t run this with elevated privileges (such as with doas/sudo).\n'
+	printf "You shouldn\'t run this with elevated privileges (such as with doas/sudo).\n"
 	exit 1
 elif [ -n "$(find ./ -user 0 -o -group 0)" ]; then
 	printf 'It looks like this script was previously run with elevated privileges,

From b117916207862d4785f6da32d48cbe4420372434 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Mon, 24 Apr 2023 16:58:19 +0000
Subject: [PATCH 1096/1147] Update prefsCleaner.sh

---
 prefsCleaner.sh | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index c62f070..f36732c 100755
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -2,7 +2,7 @@
 
 ## prefs.js cleaner for Linux/Mac
 ## author: @claustromaniac
-## version: 1.8
+## version: 1.9
 
 ## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
 
@@ -10,7 +10,7 @@
 
 # Check if running as root and if any files have the owner/group as root/wheel.
 if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
-	printf 'You shouldn\'t run this with elevated privileges (such as with doas/sudo).\n'
+	printf "You shouldn't run this with elevated privileges (such as with doas/sudo).\n"
 	exit 1
 elif [ -n "$(find ./ -user 0 -o -group 0)" ]; then
 	printf 'It looks like this script was previously run with elevated privileges,
@@ -149,7 +149,7 @@ echo -e "\n\n"
 echo "                   ╔══════════════════════════╗"
 echo "                   ║     prefs.js cleaner     ║"
 echo "                   ║    by claustromaniac     ║"
-echo "                   ║           v1.8           ║"
+echo "                   ║           v1.9           ║"
 echo "                   ╚══════════════════════════╝"
 echo -e "\nThis script should be run from your Firefox profile directory.\n"
 echo "It will remove any entries from prefs.js that also exist in user.js."

From bc5add9450ddc16c48d315913c43dba34baf4a24 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 4 May 2023 23:31:33 +0000
Subject: [PATCH 1097/1147] v112 (#1654)

---
 user.js | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/user.js b/user.js
index 3e3b84c..7b0962d 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 30 March 2023
-* version: 111
+*    date: 4 May 2023
+* version: 112
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -491,7 +491,7 @@ user_pref("security.pki.crlite_mode", 2);
  * [SETTING] to add site exceptions: Padlock>HTTPS-Only mode>On (after "Continue to HTTP Site")
  * [SETTING] Privacy & Security>HTTPS-Only Mode (and manage exceptions)
  * [TEST] http://example.com [upgrade]
- * [TEST] http://httpforever.com/ [no upgrade] ***/
+ * [TEST] http://httpforever.com/ | http://http.rip [no upgrade] ***/
 user_pref("dom.security.https_only_mode", true); // [FF76+]
    // user_pref("dom.security.https_only_mode_pbm", true); // [FF80+]
 /* 1245: enable HTTPS-Only mode for local resources [FF77+] ***/
@@ -1007,8 +1007,8 @@ user_pref("network.http.referer.spoofSource", false); // [DEFAULT: false]
  * [1] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
 user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
 /* 6008: enforce no First Party Isolation [FF51+]
- * [WARNING] Replaced with network partitioning (FF85+) and TCP (2701),
- * and enabling FPI disables those. FPI is no longer maintained ***/
+ * [WARNING] Replaced with network partitioning (FF85+) and TCP (2701), and enabling FPI
+ * disables those. FPI is no longer maintained except at Tor Project for Tor Browser's config ***/
 user_pref("privacy.firstparty.isolate", false); // [DEFAULT: false]
 /* 6009: enforce SmartBlock shims [FF81+]
  * In FF96+ these are listed in about:compat

From 04e6e77439bfa6e3f6b7b9c5e0afac7f74f0586a Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Fri, 5 May 2023 10:56:08 +0000
Subject: [PATCH 1098/1147] v3.9 - fix #1670

---
 updater.sh | 24 +++++++++++++++---------
 1 file changed, 15 insertions(+), 9 deletions(-)

diff --git a/updater.sh b/updater.sh
index 6a3d1f2..88e6e33 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,20 +2,15 @@
 
 ## arkenfox user.js updater for macOS and Linux
 
-## version: 3.8
+## version: 3.9
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac, @infinitewarp
 
 ## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_updater() )
 
-# Check if running as root and if any files have the owner/group as root/wheel.
+# Check if running as root
 if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
-	printf "You shouldn\'t run this with elevated privileges (such as with doas/sudo).\n"
-	exit 1
-elif [ -n "$(find ./ -user 0 -o -group 0)" ]; then
-	printf 'It looks like this script was previously run with elevated privileges,
-you will need to change ownership of the following files to your user:\n'
-	find . -user 0 -o -group 0
+	printf "You shouldn't run this with elevated privileges (such as with doas/sudo).\n"
 	exit 1
 fi
 
@@ -396,6 +391,17 @@ show_banner
 update_updater "$@"
 
 getProfilePath # updates PROFILE_PATH or exits on error
-cd "$PROFILE_PATH" && update_userjs
+cd "$PROFILE_PATH" || exit 1
+
+# Check if any files have the owner/group as root/wheel.
+if [ -n "$(find ./ -user 0 -o -group 0)" ]; then
+	printf 'It looks like this script was previously run with elevated privileges,
+you will need to change ownership of the following files to your user:\n'
+	find . -user 0 -o -group 0
+	cd "$CURRDIR"
+	exit 1
+fi
+
+update_userjs
 
 cd "$CURRDIR"

From c34531b67e0b9d162331fa92dc0eae2548d13fc7 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 21 Jun 2023 03:29:51 +0000
Subject: [PATCH 1099/1147] 114 deprecated

---
 scratchpad-scripts/arkenfox-cleanup.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 6e06248..9245fc4 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 27-January-2023
+  Last updated: 21-June-2023
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -34,6 +34,8 @@
     /* DEPRECATED */
     /* 103+ */
     'network.cookie.lifetimePolicy', // 103 [technically removed in 104]
+    'privacy.clearsitedata.cache.enabled', // 114
+    'privacy.resistFingerprinting.testGranularityMask', // 114
     'security.pki.sha1_enforcement_level', // 103
     /* 92-102 */
     'browser.urlbar.suggest.quicksuggest', // 95

From 84d515abfc631f1c824211bc609960a430ba334a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 10 Jul 2023 12:44:53 +0000
Subject: [PATCH 1100/1147] extensions.formautofill.heuristics.enabled

---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 9245fc4..7c3f150 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 21-June-2023
+  Last updated: 11-July-2023
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -33,6 +33,7 @@
   const aPREFS = [
     /* DEPRECATED */
     /* 103+ */
+    'extensions.formautofill.heuristics.enabled', // 114
     'network.cookie.lifetimePolicy', // 103 [technically removed in 104]
     'privacy.clearsitedata.cache.enabled', // 114
     'privacy.resistFingerprinting.testGranularityMask', // 114

From 47f152ac90d5962e0cd29ebcf8b607caa650d41d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 10 Jul 2023 13:35:52 +0000
Subject: [PATCH 1101/1147] browser.cache.offline.enable

---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 7c3f150..94aaa73 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -32,7 +32,8 @@
 
   const aPREFS = [
     /* DEPRECATED */
-    /* 103+ */
+    /* 103-115 */
+    'browser.cache.offline.enable', // 115
     'extensions.formautofill.heuristics.enabled', // 114
     'network.cookie.lifetimePolicy', // 103 [technically removed in 104]
     'privacy.clearsitedata.cache.enabled', // 114

From 6151d664acced94364e7e3a075e6ac3ca555ef48 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 19 Jul 2023 20:38:31 +0000
Subject: [PATCH 1102/1147] middlemouse.contentLoadURL

---
 scratchpad-scripts/arkenfox-cleanup.js | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 94aaa73..5c0191a 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 11-July-2023
+  Last updated: 20-July-2023
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -241,7 +241,7 @@
     'toolkit.telemetry.unifiedIsOptIn',
 
     /* REMOVED */
-    /* 103+ */
+    /* 103-115 */
     'beacon.enabled',
     'browser.startup.blankWindow',
     'browser.newtab.preload',
@@ -261,6 +261,7 @@
     'extensions.formautofill.available',
     'extensions.formautofill.creditCards.available',
     'extensions.formautofill.creditCards.supported',
+    'middlemouse.contentLoadURL',
     'network.http.altsvc.oe',
     /* 92-102 */
     'browser.urlbar.trimURLs',

From 4d78abf2bfafbbcb03f8f6d6aaaf7e69b7cfee4e Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 26 Jul 2023 04:37:00 +0000
Subject: [PATCH 1103/1147] v115 (#1680)

---
 user.js | 67 ++++++++++++++++++++++++++++++++++++---------------------
 1 file changed, 42 insertions(+), 25 deletions(-)

diff --git a/user.js b/user.js
index 7b0962d..5ed7c08 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 4 May 2023
-* version: 112
+*    date: 26 July 2023
+* version: 115
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -116,7 +116,6 @@ user_pref("geo.provider.use_geoclue", false); // [FF102+] [LINUX]
 user_pref("intl.accept_languages", "en-US, en");
 /* 0211: use en-US locale regardless of the system or region locale
  * [SETUP-WEB] May break some input methods e.g xim/ibus for CJK languages [1]
- * [TEST] https://arkenfox.github.io/TZP/tests/formatting.html
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=867501,1629630 ***/
 user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 
@@ -296,10 +295,11 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
  * [WARNING] If false, this will break the fallback for some security features
  * [SETUP-CHROME] If you use a proxy and you understand the security impact
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1732792,1733994,1733481 ***/
-   // user_pref("network.proxy.allow_bypass", false); // [HIDDEN PREF FF95-96]
+   // user_pref("network.proxy.allow_bypass", false);
 /* 0710: disable DNS-over-HTTPS (DoH) rollout [FF60+]
- * 0=off by default, 2=TRR (Trusted Recursive Resolver) first, 3=TRR only, 5=explicitly off
+ * 0=default, 2=increased (TRR (Trusted Recursive Resolver) first), 3=max (TRR only), 5=off
  * see "doh-rollout.home-region": USA 2019, Canada 2021, Russia/Ukraine 2022 [3]
+ * [SETTING] Privacy & Security>DNS over HTTPS
  * [1] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/
  * [2] https://wiki.mozilla.org/Security/DOH-resolver-policy
  * [3] https://support.mozilla.org/en-US/kb/firefox-dns-over-https
@@ -602,9 +602,6 @@ user_pref("browser.uitour.enabled", false);
 /* 2608: reset remote debugging to disabled
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16222 ***/
 user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
-/* 2611: disable middle mouse click opening links from clipboard
- * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/10089 ***/
-user_pref("middlemouse.contentLoadURL", false);
 /* 2615: disable websites overriding Firefox's keyboard shortcuts [FF58+]
  * 0 (default) or 1=allow, 2=block
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Override Keyboard Shortcuts ***/
@@ -642,6 +639,8 @@ user_pref("network.protocol-handler.external.ms-windows-store", false);
  * for these will show/use their correct 3rd party origin
  * [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion ***/
 user_pref("permissions.delegation.enabled", false);
+/* 2624: disable middle click on new tab button opening URLs or searches using clipboard [FF115+] */
+user_pref("browser.tabs.searchclipboardfor.middleclick", false); // [DEFAULT: false NON-LINUX]
 
 /** DOWNLOADS ***/
 /* 2651: enable user interaction for security by always asking where to download
@@ -727,10 +726,6 @@ user_pref("privacy.clearOnShutdown.sessions", true);  // [DEFAULT: true]
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
 user_pref("privacy.clearOnShutdown.cookies", true); // Cookies
 user_pref("privacy.clearOnShutdown.offlineApps", true); // Site Data
-/* 2816: set cache to clear on exit [FF96+]
- * [NOTE] We already disable disk cache (1001) and clear on exit (2811) which is more robust
- * [1] https://bugzilla.mozilla.org/1671182 ***/
-   // user_pref("privacy.clearsitedata.cache.enabled", true);
 
 /** SANITIZE MANUAL: IGNORES "ALLOW" SITE EXCEPTIONS ***/
 /* 2820: reset default items to clear with Ctrl-Shift-Del [SETUP-CHROME]
@@ -758,11 +753,11 @@ user_pref("privacy.sanitize.timeSpan", 0);
 /*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
    RFP covers a wide range of ongoing fingerprinting solutions.
    It is an all-or-nothing buy in: you cannot pick and choose what parts you want
+   [TEST] https://arkenfox.github.io/TZP/tzp.html
 
    [WARNING] DO NOT USE extensions to alter RFP protected metrics
 
     418986 - limit window.screen & CSS media queries (FF41)
-      [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
    1281949 - spoof screen orientation (FF50)
    1330890 - spoof timezone as UTC0 (FF55)
    1360039 - spoof navigator.hardwareConcurrency as 2 (FF55)
@@ -801,19 +796,23 @@ user_pref("privacy.sanitize.timeSpan", 0);
    1595823 - return audioContext sampleRate as 44100 (FF72)
    1607316 - spoof pointer as coarse and hover as none (ANDROID) (FF74)
    1621433 - randomize canvas (previously FF58+ returned an all-white canvas) (FF78)
+   1506364 - return "no-preference" with prefers-contrast (FF80)
    1653987 - limit font visibility to bundled and "Base Fonts" (Windows, Mac, some Linux) (FF80)
    1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82)
     531915 - use fdlibm's sin, cos and tan in jsmath (FF93, ESR91.1)
    1756280 - enforce navigator.pdfViewerEnabled as true and plugins/mimeTypes as hard-coded values (FF100)
    1692609 - reduce JS timing precision to 16.67ms (previously FF55+ was 100ms) (FF102)
    1422237 - return "srgb" with color-gamut (FF110)
+   1794628 - return "none" with inverted-colors (FF114)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
-/* 4501: enable privacy.resistFingerprinting [FF41+]
+/* 4501: enable privacy.resistFingerprinting
  * [SETUP-WEB] RFP can cause some website breakage: mainly canvas, use a site exception via the urlbar
  * RFP also has a few side effects: mainly timezone is UTC0, and websites will prefer light theme
+ * [NOTE] pbmode applies if true and the original pref is false
  * [1] https://bugzilla.mozilla.org/418986 ***/
-user_pref("privacy.resistFingerprinting", true);
+user_pref("privacy.resistFingerprinting", true); // [FF41+]
+   // user_pref("privacy.resistFingerprinting.pbmode", true); // [FF114+]
 /* 4502: set new window size rounding max values [FF55+]
  * [SETUP-CHROME] sizes round down in hundreds: width to 200s and height to 100s, to fit your screen
  * [1] https://bugzilla.mozilla.org/1330882 ***/
@@ -822,7 +821,7 @@ user_pref("privacy.window.maxInnerHeight", 900);
 /* 4503: disable mozAddonManager Web API [FF57+]
  * [NOTE] To allow extensions to work on AMO, you also need 2662
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
-user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDEN PREF]
+user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDEN PREF FF57-108]
 /* 4504: enable RFP letterboxing [FF67+]
  * Dynamically resizes the inner window by applying margins in stepped ranges [2]
  * If you use the dimension pref, then it will only apply those resolutions.
@@ -838,7 +837,6 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
  * [WARNING] DO NOT USE unless testing, see [1] comment 12
  * [1] https://bugzilla.mozilla.org/1635603 ***/
    // user_pref("privacy.resistFingerprinting.exemptedDomains", "*.example.invalid");
-   // user_pref("privacy.resistFingerprinting.testGranularityMask", 0);
 /* 4506: set RFP's font visibility level (1402) [FF94+] ***/
    // user_pref("layout.css.font-visibility.resistFingerprinting", 1); // [DEFAULT: 1]
 /* 4510: disable using system colors
@@ -941,12 +939,10 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
 /* 5017: disable Form Autofill
  * If .supportedCountries includes your region (browser.search.region) and .supported
  * is "detect" (default), then the UI will show. Stored data is not secure, uses JSON
- * [NOTE] Heuristics controls Form Autofill on forms without @autocomplete attributes
  * [SETTING] Privacy & Security>Forms and Autofill>Autofill addresses
  * [1] https://wiki.mozilla.org/Firefox/Features/Form_Autofill ***/
    // user_pref("extensions.formautofill.addresses.enabled", false); // [FF55+]
    // user_pref("extensions.formautofill.creditCards.enabled", false); // [FF56+]
-   // user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
 /* 5018: limit events that can cause a pop-up ***/
    // user_pref("dom.popup_allowed_events", "click dblclick mousedown pointerdown");
 /* 5019: disable page thumbnail collection ***/
@@ -1021,6 +1017,9 @@ user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
  * Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla
  * [WHY] To prevent wasting Mozilla's time with a custom setup ***/
 user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
+/* 6012: enforce Quarantined Domains [FF115+]
+ * [WHY] https://support.mozilla.org/kb/quarantined-domains */
+user_pref("extensions.quarantinedDomains.enabled", true); // [DEFAULT: true]
 /* 6050: prefsCleaner: reset previously active items removed from arkenfox FF102+ ***/
    // user_pref("beacon.enabled", "");
    // user_pref("browser.startup.blankWindow", "");
@@ -1037,16 +1036,16 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
    // user_pref("extensions.formautofill.addresses.supported", "");
    // user_pref("extensions.formautofill.creditCards.available", "");
    // user_pref("extensions.formautofill.creditCards.supported", "");
+   // user_pref("middlemouse.contentLoadURL", "");
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");
 /* 7001: disable APIs
- * Location-Aware Browsing, Full Screen, offline cache (appCache)
- * [WHY] The API state is easily fingerprintable. Geo is behind a prompt (7002).
- * appCache storage capability was removed in FF90. Full screen requires user interaction ***/
+ * Location-Aware Browsing, Full Screen
+ * [WHY] The API state is easily fingerprintable.
+ * Geo is behind a prompt (7002). Full screen requires user interaction ***/
    // user_pref("geo.enabled", false);
    // user_pref("full-screen-api.enabled", false);
-   // user_pref("browser.cache.offline.enable", false);
 /* 7002: set default permissions
  * Location, Camera, Microphone, Notifications [FF58+] Virtual Reality [FF73+]
  * 0=always ask (default), 1=allow, 2=block
@@ -1194,9 +1193,9 @@ user_pref("browser.urlbar.showSearchTerms.enabled", false);
 ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's shuffled off 'is mortal coil!");
 /* ESR102.x still uses all the following prefs
-// [NOTE] replace the * with a slash in the line above to re-enable them
+// [NOTE] replace the * with a slash in the line above to re-enable active ones
 // FF103
-   // 2801: delete cookies and site data on exit - replaced by sanitizeOnShutdown* (2810)
+// 2801: delete cookies and site data on exit - replaced by sanitizeOnShutdown* (2810)
    // 0=keep until they expire (default), 2=keep until you close Firefox
    // [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
    // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1681493,1681495,1681498,1759665,1764761
@@ -1204,6 +1203,24 @@ user_pref("network.cookie.lifetimePolicy", 2);
 // 6012: disable SHA-1 certificates
    // [-] https://bugzilla.mozilla.org/1766687
    // user_pref("security.pki.sha1_enforcement_level", 1); // [DEFAULT: 1]
+// FF114
+// 2816: set cache to clear on exit [FF96+]
+   // [NOTE] We already disable disk cache (1001) and clear on exit (2811) which is more robust
+   // [1] https://bugzilla.mozilla.org/1671182
+   // [-] https://bugzilla.mozilla.org/1821651
+   // user_pref("privacy.clearsitedata.cache.enabled", true);
+// 4505: experimental RFP [FF91+]
+   // [-] https://bugzilla.mozilla.org/1824235
+   // user_pref("privacy.resistFingerprinting.testGranularityMask", 0);
+// 5017: disable Form Autofill heuristics
+   // Heuristics controls Form Autofill on forms without @autocomplete attributes
+   // [-] https://bugzilla.mozilla.org/1829670
+   // user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
+// FF115
+   // 7001: disable offline cache (appCache)
+   // [NOTE] appCache storage capability was removed in FF90
+   // [-] https://bugzilla.mozilla.org/1677718
+   // user_pref("browser.cache.offline.enable", false);
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 915f39959c7e077f00477e6ce34a0f9f9e3e7c6b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 14 Aug 2023 03:27:30 +0000
Subject: [PATCH 1104/1147] external.ms-windows-store, fixes #1142

---
 scratchpad-scripts/arkenfox-cleanup.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 5c0191a..706fbfc 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 20-July-2023
+  Last updated: 14-August-2023
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -241,6 +241,8 @@
     'toolkit.telemetry.unifiedIsOptIn',
 
     /* REMOVED */
+    /* 116+ */
+    'network.protocol-handler.external.ms-windows-store',
     /* 103-115 */
     'beacon.enabled',
     'browser.startup.blankWindow',

From f1831e947bae0940bf8525447345c96ca27924ea Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 26 Aug 2023 06:45:37 +0000
Subject: [PATCH 1105/1147] media.gmp-widevinecdm.enabled

this adds nothing, users can use `media.eme.enabled` if this is their threat model
---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 706fbfc..87556da 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 14-August-2023
+  Last updated: 26-August-2023
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -242,6 +242,7 @@
 
     /* REMOVED */
     /* 116+ */
+    'media.gmp-widevinecdm.enabled',
     'network.protocol-handler.external.ms-windows-store',
     /* 103-115 */
     'beacon.enabled',

From 576da2e2363d326ebefb962fd1b149b68bc88284 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 26 Aug 2023 07:08:23 +0000
Subject: [PATCH 1106/1147] Delete smartReferer.png

---
 wikipiki/smartReferer.png | Bin 37523 -> 0 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)
 delete mode 100644 wikipiki/smartReferer.png

diff --git a/wikipiki/smartReferer.png b/wikipiki/smartReferer.png
deleted file mode 100644
index c64b93a9c6b9368a9fe7c92087f577fbd1c1914e..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001

literal 37523
zcma%ibzGF+^Y0=G5`q#UElMLGjii8pv@}R}v(n9iba!`4cXyY7wA3!JbS<znEPK(<
z_jBWS?|t3-$FtAtIeTJe&Y3ea?>Q&ri@fABOcG200Psxe^Cu+$;86wufMW0z?V*I-
z=0*3z3**~oO$Pt~3;)l90!U4N1pr_wScr*z`C<-q1Ui@lzrB_c6MOy59%yP|Z2|ze
zE@mj3sVMKh6ubnViOK}~#LEDc2%o-I5)Jbqh@oYq!gwwnOqH`hsM!5NT>LTVP<AkC
zWTa0xq2fF2P|V-x8&tWGetE&6Be!cFc~*06ms?}^_47j8W$=vJ3G}X~*omJx6uEq`
zi$y73tojZ14XkajeDuYn{swsdwAPr)0r3_EaOEu^!1SgIy#s*aI*s)d&?T4F^`0yU
ziMuD7qK)F?kJ9BB!z=UDhXC-=JyNs~@KFNACnK3w8Ib)Lpg(G42nBp$2I$j)wx$6-
z8CNMDC;+W^DngX(7{F_Mli*JPbACYCgj%RLK;u1tz*MI11K>9^;JuW(>1RMyBcN;i
zIaUqeDK_A}VsHQh;IRilf9UO7SAc&CfI#9@UEqYN;`uh?gQQYw1e&Qoi2G_iWwt|C
zS7)K1AD1FxBH%W7WRUuirN=FWnBA8XcNP8<0LYFZeBc(2a2>~~7$4`3Y{1cD-s?m|
zzA-d}-fvEne)|XjtT}p5-oIn5CGp`$^Rc<lr8#<Ru8WoJbQxw^gZr@_kiEO84*&K?
zHsU$a%?k^g8yml+`$V-2M%2CT&3g2@)DhO#-U4@*=c^s-)V}OGzLJlxR(pP)$rg}J
z#A5gxE^kFi-Zf$&@5ra$^hp^uYcLW(74hsMKc$Al*$du;h{iJX(@Y_a*CFq2QH3B}
zfGSHN6pt9@A38>;7cz9uH5|LvF9CqlR$%uG{ZmvQbHB9-7bHv=A(>4B@G+H&wF3Zj
zKT)%&jMNGbJ_P_iW&1K#iIARkzk1h&M%Mjgxf|<FpW9!Qy01s{xhSTw51G9_L)mvx
z`oOU&az=gDnUCb0U5e&`ao=!QdQ_Wm1i#_l7(C7Frf>7bcq}sX6yJbqF&M=#RO4;r
zQ=*iBE2{3#kMY8&Uk?WpD87-2;rh&`6sq!C^)vaYp#7r{LD~{6G5kXS_V0IrZIW#9
zzBP)1GuZWF%|CcZ{3UX+ei=KmrAEEXPWxqFM<N)`owNO`)Esv)N=R(*eb>$_bdEmj
z_bdawqSd_bFyf3xtKXDimky9rsg<F&hMXHsRJ%OJ^A+#H;C}2P`r3d(<g<pXhWzi(
zKVFkjbG}%_;K4xkSL~sC6Zb==j<)5+b>AyPcD5jm&+p#O;YH!IKKBR~>*Jxu3lU?d
zYmR;-Rh_Rgg*PQJWvldd_g!%s=Vy|)al?zoRyF7!;@`by8VcCR*y!Eh*dX1YI@Q9=
zF#Kqjf2F)muQXyQO}zPhlXDZzB$-`AH7`|Z<wuUn3$CcIqUAXaN|lO1Kkzx7Qa_CO
zy_AwED9=rpCNU>6zqF{_acp_9l0YG!^h<qebXRgGX$SSp1^Zbbq2FMz89i~@EA&@p
z#4fKYlVuBur^AQ`Ro?Tk?I&-i;HCgoH5eNhJqcq*FcYK`XcI^oSyhTl3QNExSgLT<
zQI)7-U1hHd2~`edXfei2VyS9L#+Q9%Qf0GZ{vSalW<P)`!uj5sh!8Z*UfEs+v3$ks
zYCUM%z-ufc;#${tR94SQ1D$-i`e>`i7CfC9Tayvwtzm*C#W^3uIHWn$Yn9;fro!mZ
zWV@?$M|q5G`l2MbcPN+u#<0#nTF5Ee%x0o(Rg##Ls8Ra4RIyZYzn#0{uqdOjUA$HE
z))z-)P?}DgPSPxD{7J^P@`Cb85oXa#IYGYj3YHS90@9q;PcEIdMMue*9lAc5vcMv+
zTl@A6nHMWU1z~ejbS{alfmVx6jkbh6{z{;q%MK_&&N{esq9~@*`%$dGAi*GM%|E7j
zQXp?uB0>T;++si*N)5Fcuo=jsMWdynm66+%J4#iOYc6Cc<d@}_9US{PmOD0=!j&e-
zHqXADww*Sg25Hp)>iYFv!;gk06RDbwuZ5aN4Q;joUq5ITXsCYGsg)?tD5sfgEpIJ)
zQPeCSCtsR5XVzPF(lFdm+(=xt`5SGiqQR!Y%fQT#$gHuyqW37SJ<hAeD*_>i{w!z#
zr<D9Fxwk`|JprE@A2@Y9{YcoW|15Er)l6gJ`NVGyXaoKzL!U*4a@w?{8If7DgC9IN
zEJWt}C`*zMOB(6G%24};wBxy*&YJtwc}7}oTF>E+rOG4jBa5S;<*c8aSqzz)91g#F
zhs0JDHz$R$vJ&1~LCU-p#1wqZ>bKvr8nMQxm(N!<7PypL8o-EzE`;o}ph8dq9xyvt
zQ|~8FSL0CQs6sC=Q!fA_26~G$M!F*>0YyGEC}yZ3z9PO_k8ZErJ*he)h543DE@~DI
zMZ&Y2MF>TrzL$UB>@KG=A3BIGr@Guu9*-HfzzO)`y)*X<-C)Zgtk)ZxE+8mCJy1CE
zTd)SnBwG@f%jB|{1LV`qr^HX-G&44Z50%W)T#P~`ES3U`JT06p!UHU(nm=bXGBl*D
zWyn6TFjjEeT6aM14&g!T8S7Y3529q&A)Rk-IpaNN0Yxv1S@7QRC4Q6*mgkK>7J1J2
z<7GI_DZUF$B&J&rd5_r})=BQk;NN1}j1=;xpBd%cV-I55xZJ4wISSrwHv7{RN4Lp7
zlU+&U%Y2#Y{Mv?HkguK1FE%FHPPBwdF0R3B&uq)od9=(Vpys~cHms4AA_0Basy4dp
zi6%2<gJ|K7%2)b%M)Vpp6Lr(hv5=7uiKUrLV~0O$N0y>_(qUQ1L%bfmwb+J&KpAyr
za*eI_GRqG&0(Ndom{7teOo3`>Wdcp14U9Ik3Z;kYNfqAhwC-|NzPjBb-@EHktoE@~
zF*gIe_Lt`mbrdvMH6ir|H-Q<XLWCiq6$DE}Nra%^^vkZBq(Q)u&Xnc&y5iElX5$Id
zDbw98Fmt9BPGU*YRuYcwvxUXFXArfz!}AOACDx=d`lVLC2C?S6PJyO2lcM4AF@9l{
ze3dhm8x`)Osg-(z`77JWBT|pH3(kYtC9SqggwSxuk}8U-+^p%W$*t6F?WJ%<NXhP1
z;;oHNxx9_t;UMZ1Dgym2PQ!fj%q;nopo&t|9Mire&LCySeFn^h`5E^!)rj<g^|#+X
zxozxTVn8k_p7AX@hkKN*p-)pflbeyVT8gHgrb?tKr`~EAYPBf*6q=md1H0czE>Ys9
za|&p>NyAl!Ef#mbPsf>^PK0M9WO#YATrcY{<u-V18;wIOae=Uw=Z<Sr;>fUV{x<$`
z?b9a5)0(ACeDx;v)Ji@*n?1)pf%~{=g~8VJ*3^n-ZL8)Z_x5@Z)5~4bOrG(Tvv#+W
zm&m!<%nyPq?QnPCW&h<l<mHODJso0vv~|IS?x?&?p-u1X<Dtlc*h<i>u-5(ZZ`d-(
zvdbkKKDjJ;i5B2DaUXLYg)8<XDkW+(@LAw~Ca=(k59`AAh~2v)u?gb|+DxMR-22fA
zqL-}RSF`)`<CDpgIZ3BUah*1v1&F<_ed5Zcft~@1j$v00Hr+F|+rw^`WfyW-9t2lm
z!}B$W9%+7EeXjhg=r)cxE)Mw^H5q<q#KFAu;BUS*`m7`e0Jzft06u;Iz%}yWy$b+1
zy$1mH^Z@|AWB`B&7^~MW0RRMbNPQAfaa}xEaq}cNM_irEn>qKUd}4Zp(nCW}k47c(
zK|o}OsQR~FJ(*f|f*8}>R~wts*HS7tKyyOe?DFq#f&^9GJ=OJjjY<9d^G9)iYHbXa
zn$~7#v#ra)1KW#nG`tO0VM<)jrnHoalY39+i}tLP1yvoEJ%cy?&qbe7eL|h0e*Ex$
z_=uJN^ZS%as_4(J|MOT!%)bRvd;xz8s5Abl_j!upZ$0W=g8yT~=zQhB{RQ*Jj_>VB
zfAsd&`TLz-w)3IDw2|vkeBbAP3i2Nc3Kyu?{^{qLOq}XJB-mm8OUu7w{7cKf#Qi(Q
zzqI)OOWeN=rHcGN{vG7s8vpjRekRAK+6C-jdUpNH^*{XWS4#jB3Z=wbM}K@iL@7i`
z<^tjWWzCH6wzycrx3KGd*ZcQe5m0q(sClPi_CnJtoF+Z1_K}HenWu^cz3h8AVyZuV
z1=srQ*(*l5|2$ARMlwE0)}K*P1XmLw_u<GN2a81K2$A=4KPl@APBO>t%tt#dI$UHv
z5|hxn;{WP$rzR%+GbV4`3|zX1_^uP2Al(a2K8;lW;(V>o$g+ou5n*w9F7dStgc{I2
zSqjU}mC?g-`kXfmW=?N}i=`fpikC7bF$pRZ6I6KX^C^VO6v=V$)07t39|G^+8oYSu
zyiclhK0zMeq}+DV+BFpsT%wloLv}Z^)PXNEz5>9>xZHi+42!Gt(D}9NU^d_3nI)87
zf+HwWn?t@J2}d+@GX2auiE00>Gx#Ntbo#i$bFPRRwQ2wI(&4s?rB2#9{MoP4bWeDe
z@aeSVe8!g8mGXVdJw{+1w&%E5|0GNUxj6mP)dUqC%DiV*tI4x35sL-ZKNYOKI>>JO
z_-9Ee3d_3}OskNLaDLNf_krEsVQ*G+O}9O9pEmw%iPG?xSM5{ncLga%4H<ZQnquIQ
zoSPR9Au+XgZAhP>-s)bwFLY|3Ug6LeTC(&_`<mk$S-;x7pz}PNtOx!$<P;d&vA9}!
zyK%M_#X4^4iF@UK?dT2f>HO_h#o>3<o~75&x{6MgYUOqe!*$TAG`cIge3e<^bnAIP
zXG5TXLbP&amg&8P6DYu&MrqObeyc$2WD}g!kVjLs9|ro|^G7Lyr<ry?F}&}7pn3L?
zH3&*$ek4so&Xj+mzHecFY?b;FM!j~mR`n^t$A8iV{^fy-hb6#qw2`P%*P1@UtyA1m
zg`b(9s8YZ4c)R`+q<&8QdRTI`CF=xAA!jh5M3HjJ>inoGDN6T_oDz{O=75sHYO4@t
z8p#K{J`AeWI9ounISd6j9!wGi!wB3u8;Bldd*BQ+iT%-pBF(8?!RhkmQIT3Z?;}j_
zx@!pi^vB(!Ava5ZGf|kD0zDH|&Vf-Zme9Zq-g_Go<meSK1eYvIO@~7JdiY9@Mis!U
zBn3oud!c^iJ+agZ5|4_VaO1xewQW0kGY-U7g@8suS#GJ7m7w5OH0Mo$R*~7Yv7fhy
z$GTTjiyViUW+_~jfZ}pI3u{z`Ybxh=9)aklW$UkxYl(zRx1zBY&e!;V-(u(OyFqH*
z7r5OcnqKUOUz>zOG6t`F5`Mb=ZqpMsakU&+&DFa98IBIzJmr?F-dFVmtzsn_3l6~d
zZ_zSxVQf@UI{4C>h;85H%Sw$~a?H@NR)}t2)NNhvNd@Q^V$Q65^ktzy-_<_L`rQCY
z=Bb$HIpq3oEr!OEv>XQhyVcn_7YDHp)Zq!6?9A0CXIgS95V|Vl?90V5z-CCz=I`Sh
zVIg2%HuHdKy+8}4*%}U$B%F;~T^_|bqvxv3{8}by6r3)EBg!Tjv6mT{mAGzjS701I
z;tu8Rq&=bSVrOD!l6ItlxpJN4klA|@j!drFVdCv%LbBe{4A4}pc6W;<A1|_m&#Buf
zY`x8QbJ_jP9Rf^}gA(x+P9h5FH1^HKEA@n==g7OoT{?3pZ?ifRj#kj@Au|v=o5tcY
z7L@%uH<Fe8=x@4?GTfa9Ae8v++VzM_6mt$kZcvsJzs*J4$O=zB+i^t!L1R;5YnE5M
z-ZAA-D{VxOdeWmR2a(j-NYHG9p1$=B8?PN<98k6vPabB1g{y0Gx;BH9ytHk6@0BOf
zxI|$vUN@R|se|`-+m0Piexj=Wy@;e;3NQOhp>L@XFjQh}b#<clgTNgXPNZi#qBFhs
zq>gG%UfOr+Jqgd|@u~-X3sh4&5D}S&3d`LnM5ia=ip%o?9U=B;0xW>og^CVx=Iy+F
zGEndC-mr#~PTIpA{w+4JE*zs$@V!sfa;+s3P)@g}k!-zoP<WdZu%s*G<}8#&F3@Mj
zA!KYu_?u7rCl^=;>~Y3&<YC9fkNXJ1vR0sQ@o0OpV7p#KoS*yNZ#e8S^OJBH;iOJ0
z+!eXIMtyjN4r+T)c`uA_AL6_}M9*c~yi4QDn!xGlK3AxAg|hK>vi2T@sF~_qEcNoI
zD9mbOxesP6FXl1yQ+5o+yIef-(7d~1?2v%2?*q46+z(s-*iU&EIxqK?OV#wRs?7<G
z+;Wd(m$!?)Z6J^O&1cf#^US$+!@A)Ta(3F>(Nn&0pXr%$7CN-M^2=_|n_A9j*pP2y
zG3RnsTaT&hS3$eNo45Oe(>u4l)Q7r377FG*`S|**Fae=J7x1g0N?KX{b!6-Jj?T<6
zER4A3!{RZnv;=ax1Ixi!*w7eUkoPBY#3ym=^QqAERx1D17%MP$zMp84z4*l#J}K(2
zCbwfb>01|8fngzyA_$Q#M+}|m^5ATep7`a<<MBp-U(?;2XV&f4V{~qJw8j&KQj;TP
zz1|{rK3Uoe8E{{C(1hvyaWpw8Pmy^0#b4WR<~6n3S~jJ7FZ_dXFvEByeEngwwiEGS
zxmp$Xt~)13ZiPUsd%Q##zt)dRzwynl<c_Yh5=?FF@$iem2)g{$<R~0ql$m!hwJ){U
zj+3XzaonVM6dD*Z&`1f7Vt9B!!Xu&c5>rrQ1aw=$#`HQQG3i2U>&^*JaAB|rIKH*Z
z+G&7P1+616lDK~RP-qKh6@w0kr|8g5M>VGx+@S<>(LQ5nWQgQqRBx@I`}7^}X#K{Q
zlP>Mt{z#s;rx8-Zar0S!W>Lyar&hidPG2$=!rx3tAF+qED3%ab*ngePpq;@^-|j8Y
zR9XgGs^c1{TPS;jjjCMhXWDDM>_33+Jblq#Bz1NF{9?+hX`*&yCXEx_g|I=I?jyp}
z?ry?+qW6L)x%u5|wwqIaoCL8Xi3kgCb`yvrmtdO6@SfW;qRt8ZdNnH@vg+slZ2>!R
zna>B3kMu{UxFxbG^y;1$@6467<hj8K+_YL}-u-mx2RgiqETbZt`fzAgw??x;n*7H=
zIV=t9P4BitwM#4VCoj?2V!y7+w*U&%znj+D-mwuT(@KcqpV5ZwM8vVx`;;VzI;dx>
zww6twrH*AOGU}k4^j6WWO0_&MVXA8Fz?F7YkoO2QVKpg+q2-26H9H(t?j#w1yMp6h
ztr~|q$16XfF47&DwJ9U@JnF2rN#}>HX%K(pZ$YpZL=sZ22RtdIpW<r42Kk^*&z%f}
z9;*CGG?><1tFTh?A#h*5F$24wfM0DsOh%Usatqpv7BLOmnB5g#d*c&^W)H)vJiSub
z2%vjlE8S{u+w6V9qv`CE7(o>sd#+h#zDZBm%MrBY$o*XGRI;1UEsw@u*Rv<t1n$tS
z<WzF4dMw!hi$<eG(j3*6?;WPYUf!5TYDAO9dMxJL%fsbW381L*J6DAGDja!wza?`u
zTt4mU@zY47bIT!mEUYjZapghRD0(>+c30rS-PwGD^U{+&G}Mn@^JbWZg<?)HGQ;Kg
z6at}w<``%rhAf>CcBBp-;cKiXbM0G|@0MK!arLI-szEJb{YKssz@HYz5gnnoL}gnd
z*d^(bzv1IpY+=J5M|~H5$m3Q$E`ys|eBukF>FNE1+4rLFdFY+`lT4>Qf4tOjuJcol
z<PKI37w5ylwIz0`<x`yU`L<6d6BGqCR>I>;P03pjTa@g!-p%;)mK0Nnr^r5+1In+o
zjKQ_;xRdlOQ6;dYRX=CWLm+sMF`H45J+>ZHts1Y$Y0Eu^IXAV1Fl!H~V0cUa$3wG2
z`;n9&4*}-z2u4S#wPc;j@9xOOnj^Zy$R=0FVEo^q>MN!hmh%VHWXod@&ZMRX<1?*m
zyRY6gK2!VN!_^{jA8Y-_&{PT28*Qn^E`ZSA3BrD~V;1&1R!o!UUO8=lbj+WZCstk-
zKR&R$Equ#^2fD-mNV3t27qkSjxIKzfscR2^&^lkG-{dr$%*(!8#SM6B%IF23>G?&|
zE;9>HM?s1UTX?cskK}N?<fhj>Wz)#F#nnYL8OAW--|=+*`uuhk)ER0QPid)PcdsO)
zy2&~X>7`odjY{pO>RjpM!dwEaD`)T6V=Qh!z3szmKy&-6v}`$@jN8?tXo<K=o~b6s
ztn{x$e`)QVSz^UA&?wE2!vTpI-qX1*>Wm=Sy)g?zENYDypD9~pTilaIeNU#<r^zau
zYSYWff1k>^tpUmMTU)!cL7pEK8E^a%E!FsN{<I_m%a!4W#kF=a7+g7>NGD`U@XDJ6
zzc;vD+9H+y*cOXs9vsptMl$A7mU9hGUnNxfhaDW+46y3ZV@V9=c?2paDUBa2Cs&Rq
zzSzjJp($2P7FE_ScHcXsc3zJ9U?OkxMqC3j%1|`>H?AA!Y{2rKVJ!6y;}lWm<oo*6
zor`d#qM%KTBm&n<TvRjU{9JkxPf`x<9pY&eiJk5b9mz6aLPW+BPQ-k>t8z(D{!h#$
z#n*lF<c-{9T@wH`E;I~%b?<kYKMZ&3N+YH|wfIrRsLI^ME81CM%fU5dYt(6`*k|5j
zLI$SHoRdk!9E9edC@?yo<K2nM$W7>57eYdviasYh;rH07FNrjk%u}5dqAgagj}8{I
zdU+6YEy`Z=d`kEHX%Z01_||`Tq23MemljBSNfdpI5MfmE_%ez3S`w!<wXv#hK1-<o
zeewr`<Sp`h9#8n7^>R9#n<eL5veK~BaR~Eo%-g5=(dzfQ9FxHefmG|<<V9B0<d65b
z^Mt*;->hB|+O#S!v@oH2U(gR$Hlu1Sy!hIQ#3u5-2s|e}kgn|rE%rS}j6sq+UtdAm
zy%ZW|N}FA}fx8|(AYpaKjk#U5pIJ@yd2MeLcmp|_>Jhl}-!B@+_3zJO(rakzD2MUS
zzd}+3a5pthd&kmTA;#XLcTY~*C2sE}A_LYBOoVCbU(uSAM96gH9d;HeyN_w4t1tKY
zYTbvk%l(9ZoqPx6BC62aX*U@1Xy0bIv&<J`s!6$-@M3>!$^T8aIUt19Q!Q$EWCfeQ
z$tOfvDDEn=x?(Fa4VMkrql7szqy1?s$NY2JeNUg9o$ZY%_hBJqtXxm1M;MF7as41S
zqb3y_l{28cM`VB2q50da-WM>dFYu&Wd$G)QK$^GRrD~Mn++i>WRUFTsL*rHpSU47n
ztdiQwd48@>sb}kZ#$-~jobGi{RL9+W>ySi0KB^@LjfDZsAN1aH9%Ps<uXhKI(JF#G
zW39}Vn|thz8a>*E0V;O$JG|A}g3OLyHuT?W=48oNZh@b4c)djkPB}-z_gr<C2@d7F
z(NcJdTq&;?p*H*c&G`_ncmkjFC$gTtKK4)>4|C1tw)QsxOSbYT?rflLfBHi#$V3UN
z5`@ow|4cTp0AS3HG=;z?*S{py<N-mi4G-2SqdGdTNqcc0SB5rrI-#WyHybNxN*j<b
ziTR)I{GrD_xDgj;bI+&q$-G$Ch=Za(chE(7$2y77mbz)zT+-z%yD-#TtZZI$r-Mmt
z?!HAZVtcJH*yf@hmA9_OG#wfm<+9h8tiZK73u>>A^jaQF<&D&G;#Hdy0<Q0X+R2pv
zut{u<BcL`IY_*oue7xULhuju2u2%j$<;MQV`)Ep<ySSMjfv&wG+q~f3ivh}$HPBE)
zgVTm@i^D{`rhpZuahC)R5a*zw%=aC%7+2??JI*NU+}SKp?!9&&STI8*u2=avOWI}#
z`Eoz3l&c9ZFzO7pt>AMi5gXyyR-jN{8%C5X?v^^b_Gm&+mDX{?Am8tCy>G#nwF7X&
zoXclaM-AwSCf7hafueb_%dp8t2I%$a9P#oP6PRasas5kB&08CYH?_j22%U83i3v;G
z(G7zaa+kC>QadF^bevy?q0Hgd_vz+}y9}#6n0NvtwbsC-?CW*EarB&_?g^%Ehx)~v
z?a@vExm8NhIr;p@;yS4heOo<?TV`Z7!L0~zXYJ|F^q@(+PM_)9Ltuu;mg6J5?B9b_
zS#oS!$_A)&T1(Xo_eOFygXJwh#}>Eb(h-%7MwUZ&;e_)&hB$@BS9<%R>CAPMWm{d3
z;hek)-sa-m_;lfy_gJ!+xF_CfV^BGy=5P-8;T=&f@W!kQ#bo-Wy;52J>!}Xw8(bLW
zo_N+T*&>(%@qo1MNu|8!z*c(vt0HwJ^KD?4S+|YX!hGh0t64u4PPuD8=sn9Fdn1m`
zVA|(donPKgyIN#RbM*(uLZ8BP(hr}K_g;8OnbE+k`MNJYF|yJmjit32P4V}-Lv0~R
zXMRksm)XFj(%tE$RvjC79m@LGIP<!^u^ch7AIt;wiNtvbaB>@Im3!l^Fw+M|iHY8>
zS6>lnMA1Wp_i#dR5s`XB6pWW(-qUi(-O9~t);&G^vPre5S#z{4q!D@UDjVPm{o2<p
zhEh!+s>T-pn?~Skf|Xgps#9Yq=!xsuE~#Dwl>TSVFL0t6#D=xsb6!<Bz83WgkV#2>
zqF{`OFqm<++}&98KJLOOfUVv3FExH`EVo*qTAHVERvcX!Owz)Maoe1&+U2;pccix-
zu5imMwz?G?u>zT}YMg{#j{OMs3!?p1#7bs9kA-7xsBFj5yW|ued(i*&s&t}h;5pL(
z-B;5k0;RpF`DrhTIT>Vb2v-(K4fyMT&{lO}MNz>z+2G=hIs{P(^TvEY2%qY{xMqgK
zYUH!#wQCb!+!sT#VjS~zNO`X|g<f-Q2-=&(TUF$eEz`X_pS$Ea+I);R@pVZzYHzCX
z$C7hd)*&=PC!CweJ7qNIoz;^X1(-J2%K#G6h)#dEjcNbVb+nbZ!SoPI`t_0Rd`yFl
z!9M5$C1^FV<E((l+KuKuVaGkp${hMO9W9&yiXSdFCc{9}6xqO#KhrYjMl#X6c;mv}
ztT%H#Q*|yudFw7TH)BF(mBw?vfOHou4AgFT)2AsK_dMNNR244Oj40>1W!1Q($>{ZV
zcNz;?)q<HO!&I!Z<+O&Rh(}gVJbAPr5H!yq^B3s2Tq;ZZQaU$kNj3_`x2{I&TFn76
zZahUqUfyvcuykgWB!!u3LGP^U1wC+Rw$(Id=g)xfR$?%15-XN(kDPS@Q7?!7e$p)o
zt-RBs&<3Y|-K(r`)@`>_VQcqZ<@*E^zujInbUI0UP60(D3DMQlSJk&ZWhp%S3M`vf
z_ae92<BP1`l4~Dqr?}Oe=O7kMr!p>>PNG0t`Mhxp9_IzWvmHLm+WSyvNb>=OPVIG)
zo1W?Why6Hp@I~k7F^6tC;F2ZSnM2tJHOM^foM#KN>6Kpl`UnOp)mq9U>w~2}haQ~|
z0e$Q)%jK6cyDsboD=zHINx79=h4*XY%t0T`JAax?>9h~IowHJ59MLwg$Dc8$wZR8&
z_!10=!PN0L6n-tX!20bYCjQfj9xpaS&-H5G30JmKas}h-3&FnI%8HF&%uX_W@@a0b
zr~;AcH9p)}v@>K(IOWv0)Eyk0dw&!tFA{-4X0>NUW;CAWeuON%**Cjo@|Zo84Sa6)
zbapeB;xr&x^zN6Tclnq_1>$q&ko4M0Q`|c$xYVcZTWOkWdsn-QnCXX|2M5UBc(xu5
z;(}u<H^r-~<-gwzx^fe-yBI5SK)`!|>{5`^Q0nycGHRv_(YtKmdytV5uuYGTS-6|t
zSO|mazvJ2d!@Ev@oxuN!jX(Xb!2Q42_`gm61=Ue5C<Iv&=>LF(qQUOf4rU^K+nYoo
zB)>Cf`Kg~i`!O0lO7rx=LG2^{C|`;7w-y@R166+-<aQ5B|C2BH|A6HGI`{uuUg6({
z>DN+btQ49VgB2@ONHt^#_?b>oXXLLzGe2E2<Souc8P3(^r7*Oj(tf|7jDs$5&B5_W
z)R|EKdDiir0O@w)L+?_23N!cO%V6e+qm`*0u+6(lj==s0RL9BKv-L8wW}SfUQBidT
zsL=KNjkM;cAgZKklc7yVV)j5R;@<mNRz=;Q++~;ciOgA;LtCjo*SAP{ttDSO;IQZ4
zK&vgE<1-6KVEE=a;@e7ophm{9$v`w`3$9yidaZ4fyPfCAE5@*wlWXIe)Q``u+xTmx
zw!Y#Baj)kax_~p1rfGg0I8016hy7MSw|zCYPtZ;wZ`zSL2LFSQP-mPUOWZ;fF2sWN
zn})NTB3Ea9l+!6?tHH;T<D*6=O*kLX2ijE~NbEM+R+V!*4xt}b%*)f~4oG34`?wYR
zU($<z8AC^&O0BV{0w3Sto>n+VW*eX5TnJojXDgrdyJ*@mf~?VRB{l4ry@p++1*dkM
zfFJHbzD#*B`}D+0(~MSJT&Iw6vY72c<h7eaJ1A@PGtvQs$!CMy8(RH9YSkf;mKBo~
z#R>6SBK1ss?S4CcH6Qd><Zp+s-6?<h$`jp!pBCAzEDn|_A4gT>^)>~x@!=)POG7W_
zFHvvZyy}4BMMOHCaN8y32n(y6-lpA?3>@+gN&Qg1stZNf?)_xg)sZZ5`8av;W0J$M
zh^uY?T*ODoW#6LFTRrsY^66t6ZqdzPVlo)!SfP%5kcpZ$Ya89--qurTH8UkO6$i%7
zu>qX;4gz~=u-@P+mUrK4gxwY3xNaecw|voe@t5pA9xo?%u%E(*hK+W*__h=#B0lgS
zD)xt5@}?ga3%d+rLI)iro9EFusDY(@=}Lj$NlN-&4`yhrvt_mnpIZVivJf3NPI%0%
zoiwX?jBor$09K$R$|0wN?epf*vOyW)2JnxdPyDLsqv5-wcTtHIx<t`k14YyQ;Do|-
zx|Hg(cNA+8pzStb8PewB=1uA^l<jQYlS6*v=Ozc+J-b{O7Jck@P8(C!My~5xD+{fM
zJhi;Qa|@CpoH?g~R_E=L-%k6<TQaYqDQQ;7?(km@OZVG})uzm=3WjU@u(DT9hdP(n
zn)_|%^_NjxMN4mWSyq8rmt|s~J;qc15FA`9ynEnfC#f$C@jAQ(!FJ&*ZU>8k5&M>M
zD%*4Ek38=dub6cCQkL`}3PE;Q3f&oJ=hiTx)W@`TFAm?XrKL*Bg?3c99gk)5m2<Z6
zyI_NASWL<~f^bGJls_0M3W5zFAHUl=muglE<TSgn=Z;PAZkNx3pMQW1bbfWC?G$?0
zWj;?4R}k^6{Gu`r81lGj)9UJ!8ht}ormR-Ae_~}Nk0R7kAz!~O+u3Z|iDTqyFI~xD
zRM(*?W%xqnf|7*FjkNpnEnn9_l=;hJYZJ?^Q{X&{%6v|XfBS7uR+$xXB~Gn;xo|y>
z(%`p^3SG0+QR@3<P09yCT(`=d7NmEuw%+h%U{&HiY+tdCfwYp9N4i5zI1fVgf{v%$
z<IYX_+Qp&DYewEFGtZlUEzJkK4Vp11;HX-zysSoslT>Jrr*#C=790JhbWCz*jYJB@
zvCmDKe*MfogOo>}Cv8Fpz6|qupIO>^&X(T?8}ohPD=-bHkvGA<b{MPA0;?`^jD?Ji
z#XYz29^eNid0W?C7N-)9tXio|Z2g^}=@dl#%#;Ckm`hZ#6p<dK%w;xDm&r2M%^M+C
zE0R`c1-MXSq{Yf3@YSH4(Xy6X_)=%^QqW@ow7Ci$^u9D#=Q9|3*W#e)qJ8SE>C3~w
zgB)WgS`Rg|Ie|{LG!_>L4X>r9sJ$fTs=>4$dae_K_X)rJ)sgb2!LrhNiy{`2Z}^s*
z*^ReN>c}3IjT<BP*zWBtI5sk~XJ<63S-dRJ3w&)nxh}CiLi#e(&RIw9$lTQ9-Ikcz
z+E-R*SEe87I-tz|$UOWj-y-HeHnGru&3dC9?rFrWQ^*|m?T_79N2lp*XZeeJ{A-TP
zgg*SIge1M}|1<aeuL-j|JrH!)W>oyg!kim!kADxI7`^<bmtZuyqWQmA$0xs9$y+~L
zl|VtW>D0dZjK9@+9mGejN#5;-H`WB2$Ny8*I`ki-I=Om4r{$BbOLP)VX!nQiW!nF4
z`4(s%udDp0_~+zvGkTMPe=^^ky#F`TYe~a{hhc}aH?@g(bJ3od$gDM3@1?nLS*Ft(
zDCp4<yNdCEeo@s-G4y@dY1u~`%=q?*nl4KL(lIZ+`XH?IDm1NKGQmzC>zW;IJE<!;
zIg$NsG_iF=6GB~92SH0tq&<+|_;bfZuQl@LkqbQ0B2(jbi}3wgEB`BYFRS(hV(@?u
z-CV$+XfUO;{pmH}?#KlSUG%;<=$vJc`jdYa<r<PMQVMkuLSR>r_m~$v5y+Cil>Zpy
zi#_@jbYH6g={KGJ{3Uw<4?tLb-~xm7s;Ue2;lUuYJL<pNZ(dC8|LS;5O0V@uTAYPr
zucLl$Hm$f6Yp7u?TdxxZ3__&n&O|sC7!QQh#wz6{cX|*iPZ<f%KR^HEm2t%KW7=-*
z)82>Onkh<CC-Qv^M%d#ET&tdVRf0CY*pW;b-rt+Kt1VxVF)(+qk2Fbd4&_A7yAx{R
z@Chb;ColQGW)v_me@mbHR%hA@k2%2`f4+e=_XmB#_)1;XcIU11Ag5Pz;Txq$(^OhQ
zLPB0LoUTRQ?m}N_AKo~=f;JN^WXKoO89}RZnbD>YQa*xe*Za<IykzkS<V9sayQef2
zYG&gx=*H*r@vY6xojrbTljLRwOKDy>S*LUP2sPdZXv^^ryGvxMJR&I{lV-49%3Pll
zdYfE7_R>Z0{?r=dcjNp)WqgUlY1tIzTCwl`^(-n=(<-Q0g+^}!SydUI+aiayjf7zx
zB*-+mLi6r^ys;OwW0hDI&OApoW24a#^1*sYKnSwQ;d_mOuFL2X_Jd~04sVt{1&gyf
zhjT@nwgzJE{gTSHB$dLrtL#fDqDOVQ<8e>RXG5d?wuaQ5YxdT3=jgVtuQ%jc(H5gj
zPbxf}CnyQeFu;q#ZQ)-!*yUiwPDtqxkRD+z3q(Y9>4I52f2u>7kRl3Qhv%15MoGzD
zwm)~1%@Yw5anHQZpyb(BJ(D`6D>dcqD2o2Ol_v)m!j!s4ZIg@@uKt(mx@5VwAqk<-
z=D;6xO7=#1!9XlVdRErK_u+9RlG8I%G!v7H)~U2D6;S&RlTLz1?suCE_&Pjyw`ng}
zuu7PvU=HwS#|x6y#U-LHgwti42`ZKy`Ed6Ut<9;sD)gv9{Mt-c2vJE1_sMdP=)elU
zv@Yj^ZP5fd3I@&Yhwc2j#)FOI=4usP5O`k_jtYYT<gHVr``0l%x>&cJCbhQf{Fyo&
zhZuMi`!b#0>Ks-^=mUZu0vtsZBACGK!hR?UHvYLLvU~hKXSWb>2JwLz)prz4nNnWm
z%FAA6gdDafrQxBcw3|%$1dNCmYGy8`!_<(Dth|N8HV;r%u+tL?m1jl_AU&l%uIUE!
z3<*quFJ`hj{p)rCKlk?e5#Bsu{3g{N_d7p;1Q^cGp7FaHrDSJM_jQvcbNZB4xCa+>
z2%*O>xlAcx+C*4JNV<Y}au=*m_nw~*-DDG77|<gO)NX|jW;|Un@v6o~BwHj9OGhh}
z?4dDjU!$c!O3l!RLqkH#qy+?d+d-f%EW|gWtER0@zVGT-HLpH08ok^K@cKn2SXszw
zK>2c-()7Gdk;}vh5!YGXVdSTj=UTtoDJw<U-}d=@29I)@Y;6V7BFn%#pg3|yc{xSw
zELf)1{6uG-jg0h4QJi%|%j0(XhVkCzT@Y<cq=l~J?&`Lcd?g*YJBN~Wt@ZDNjKR#V
z*~W{!xlrZ#_U_oxbDf;*zzsFfK&jn|HGrIzN@v)s?9T)OOEb{4Iu_8?agF1Z=(%D=
z)QPHXH`SJ9gbc-Qt%wtC1%<CjejlGKag~ODoSdRd?kJ9}sbNo?0EOk^5ZQ%HeV32W
zD(YvlQ{D9u378fU7pHk2>oLd(9!c#*D{=~LwLf8c$Iy~U)wuMAHlu?*;Zd4g4!z;!
zHp|G!2tCM%kE7w0ikh1LEa6Qtgj22~`C9pArJjK6C?cEZ6(sFvyAh!bEg~~O9<qD+
zOdt#KGGHFZv~J3<V(Y3xL=|(!tn#F9TRvSLz3{_#k3naBXqm9<D06T9iJj>?w!brJ
z_TDQ@8|(F+jTfHHnP50`s)g5&-K8uKWQvbco<^1HYf`%NOYh&+98}gJUes7Gqw-wm
z05=!p9}^GVZ_wKkMK80ic69H5T}lZRCDXV()4$^2M^MV&KGcA8DAcSihR8~(g9#^7
zab3D8FWQFjf#~rrPQTFQ3J73ji17WuW!sF+S6**3!Z>Z4nsKEWD%!5mR3?Qu<xq;l
ziGk3Q4#X~x)m!obInz3rt6$*QJ*zjRn!?7_V+#Ab(mZZ{%b7|)Lr+L25<lms&uGR>
zzoVtz(0rN`tYlv|RvK41<M)#Sf`oF8tH~Ir<ie0b2E1QY3y1Vhs7TUpgv_T$g_lX4
zh4b^ykuL4YSocX`d1J4cUNWfXsMC)uIf^p`q}UUFou#r8F&yO~Xn+mT*azx7gm?Q+
z^$xp|)*F^+QA$4)dDyefQIRX_-G^Xt14YJ+Rt6P!BEG5^E}7*kdEvCKj!GU61qF{E
zC36plp67$mXx%#estjJe3iRc^k*FvX%p<aX@Dv12;Vv~cOTw=bFr~wcp0Jt`W)Ys7
zeFbytQW&f{x0WXW-nLbIJ}fRN>8rQn6Nd43-J-$KTDPN4JK1#PUbG6c;_@Pnatx={
z@2&KqA3RJR-F7U54(8?UcL)KE$JV7CbtLDVmTj55tDy#xo8HgoAow3>7(Q`c056q!
zR}B*H3z={viESH66TkuTb!Ibd5uW$gXxxZqVRDu|iB(A!t*i=1#;-l2VNBonMu*(?
zxP&gr+t^zIVUS%s?FvR&SpmXL6?Ju^S7?O2X0;a6Xxuh8_^4f-v6Z62zn<K6p7U|o
z@p)~2=oK>G)AN!v7_7)=ikS4{ul8Ou`>_vvqf@|f;NIVYYtJV4g#fO0Va?r=uJZ0a
zI>IsEs$~l(mhZ0O?tiZ{BS>wh0#-g`d^ez~s@kNTptxjvu5Pds2+H|LzVO|0g)(aI
zdyH%H<0ABFPCr(j&(i&3nEe)&(GHuV8@irP5~Rq>r{N)oC-e~|bBDZ@^hC2amI5VM
z2@KIHrx};Ouek!m$#)jDYUHWLn=iiyYVC5KxF%LPKUl)`b)mBy`~zh87zJvTeEUSF
z9RaZp@O8cU+g3qaWcRZ!>?Y@-Guk}q>GyK&bE<@`g+37i3rO6%QBZU}rgO6;u+_kN
zb3yC&WSJ1R##2|QwWhpMDfAL63cEMErG-RiUP?nCrNiU?=cyZhN^Es_QTx2iZsuzK
zIJ9`zs7<{mC6HC3L&)#Q8NIzanYO;KH+&ItbG1irS8)~ClN)`#P|9@3u;E9BAE$ZO
z2E)>JM=G7dmuk7;>_-due5{1Cv#Ru}4(>}y`pu;)JB1>u2}k@S`YV(KZJkRx0Twuy
z6g-aDy&nsNd(am`Q`FD5g%=40n(h?8oPb@-(a3_n3!A4FhEzMzWEH1ikG>Mwj@)-U
z2jlAhq;4_6-ux;AjTvh}zA98#U3K<&k1g0^CD=qU%~>tJo2AtIwvm%gV8DenV)-Kb
zZ6Ui=<bnz5RZL6N2!Wq{f|!it4p%y+oHBjGv=dy0+6}3uqZ6^Tk_eymQlUN+Q~0?l
z*~)#IH={KfcLV*>Tz8sSprXE5bYynUZB@Sz4-J1_Go`5)vV8;#H3zLwA9Yj+k_zb_
z>7;O$E5qio*XJ`9mFv9aJYAei7kQL0e^y>9e)3p!a{6|6Wd~z8fH5%fM=l*kGFdo2
zcv>K#j2DO_Q>n@N7xK6L)l;SWDypiA_t&<ep9|nL+*bpZTJvBk(#s=J56p!){DP_q
za;b>C2_5%YL5lNPJ-Z|JF|vyT1(Tm=!q=U-=4Tsh`L^1lS}h@idC+h1F}E`cDRue5
z@=4kuBP(K5h-L)10_=7z_}~n7OMM=vxG0KT&x`>l4fnd-C{)JbcYxg7o&*}8l|No=
zamn>kWV_y!Pbbpr^-;l>eLq&o@J_lwSsl2}b2^Y(1NDvonvA(Od2hM$d0tSZ38rbn
zHPLPFoan9&#JDA|jt@F>zNA#+L(+j(hkE+<WF*k>ByG*nj4eo2=MO<0_hO&>1FB{M
zX%-}g>28v_yZ@(I)lc~DN;B)C$dmls+@8)#rbDEn)0qtC1P^sm;TLc-bG&y*p$8GR
zyGwzXB30`%<%g44)VpPne24v#dV>1S)Y2uQYL~`AP}gjdci%Sl>RxG>Myox1n9@^e
z$)UPYp2O@V&|22yXAcpv!7H%xZ}sEtB;+R;@1A0w-daKo?Zc)Nlt+gD8@V!`%JUSc
z^TG{C@ie@f5Y!TPZ@rP%$Q53$a5^xcGSG3Y)Fmg^p2BB^{q7naNQ@?}2@EtkqS*C<
zlJzsC%nyXuR!)d)77G7-n-@%u>!ZjzcvSh^u5B&}!sFXG^XjDs(0KTuDfy&R)3kj{
zvR&5uUf$lJksUZAr0ZeHA6T6Zk^34-0w;O$gnxJfBGp~`R#XVUve~Uk+RW{N-s-%`
zG1>t3a9`<rpE%nhoNPY24S$)Z(eyToe476&Qw`?pq#`2Q)zqJd2Vk9#_xk+<!CqPe
zMWk;b;YO*nT51*I_397)3}Ns4g*JO;^2*)5mISTu<KP*J-c)zzG13r&cM*9YE~e-l
zw);WlC0`Aj34?R@?;QqxoN{%s<(%73hiM=Zyew(22EHo6g+4lYrvuShO(!D4uDK8S
zuzNo-EqtGojnS?_?|rW*+3;nhgj`DU;%aoN#fjPp*|_l<qv-iI$)8}E?tElEVk8*^
zoY|44K*09Hjfstdga(LgaRJ<E5qbz4bkIR#%;40~R)nS16QybPA?^0yna*>=^|aaK
zLa82AWsT-zG$CRSd<9R7_ZL8Z;>(o`Y&UEC!rf9Rmqg*C{hFq;3KLGNx$qaPp2JzF
zi7c29vWe(HAxVb*<R@Gv{z47sZvIFX5;1g$H&D*-_ZjQA))i{%$Mb|&Ok&auoHhjT
zQ;udnddw`gQixcau3Df$GA9rmekOb$=9XtU$ASe(?PFH3Jpn&`A|+*%0^jV#2I!O5
z9`Ow&t1odNYeL?!c?9);o+cPe<-*-{pb8tnF&cR3S16a)Z-n0<ge!SiS@tPC<EYJ{
z2B{vhuBv38%mdMWeh%YKlQ1-VlWL0YsfWJN^Bx-y56^tAEalRXk(X?c4I95z(6_H|
z3+#`+e8f01YNf`Xpu}l86Kpz`dW{7CP<)#%Pe&0&VTT+UVZ_6aqi1zlclM}S;7sLF
z=rgU&+2@mH&}JcOskj|QJ9ZWLZSAbhg5F{q9Um|2)~u=k-wOGCcu{qMLQVbK0xa+%
zX>^{J^nrt-w&j4OLy>7tkY-MlRcTSf{gb20_?It@ru`oVmb7kF3Z+F9o*qGu2dNaQ
zW^X<9LCavMlYUxWe|v836y?5o^%uqrN%aZQv<r?J9yR?``@^Q^MNDaP8$V_E%KcRF
z060OtAe|T`lCd<NUR#B(HQvYy(tA{c2U$EAVik2Q9-=1{kDYXiq~c6p1<I?c(iHA`
z)XIo5jDhrLIU@??(hM8vt}0)YmXy@7{8Il_XCX(N{fI){pmw2cQ}b3;U0q32GsGbI
z#XhDdYRv*?Y}^EvrsDDW3g4`0tp%s;vcE(GNzjbqW>nOQ?OO(hh1O0H6B9zYRL-2T
zGVE#2Uc(KU4ZmA!cSyS6i+j`lya!+06x6>^ER!U&vvj%G1X`>qJMegbr+PC5^=5C}
zFZGga@Q&Tp%~J!N4&U65S{okX-x<imEBiE=vL$}<amj@>$*o5CtR2==q;X>RBDsJa
zhh>O_ORLH7U<6J%YgJ@d%_GV|Wrec)>kHg)6Z3GR`W0J+Y-An`Zn^Y?Q|F=<O&5p9
z)mVj<-G-z2u7U@FQT}knVccDY&kKE_izmDbwH9{W)oGFX@}#-T&)M9qp1jNpNb8$*
ziaPq#OS=|$>|NiEat(g`NTE2OV>qy5LA>N`6&d8dgU<^{ontb0fkweZQGLVY&&$tH
zU_O<Pky>cbNaxxKE;e{@Fb9ojQV9t+Pjl3Q9p3NOWrYSx%IN2=$Pw>e|7w-kZ&9$Z
z!So`tf-H_i&>6rHBvLvf7@pcmzcUUX{?E<mra6nt%FeuZD$IZFH_65M;O@tM!?a_m
zk$L(Df|3{5{2BQC0egZ_{c}&@Ul{CP*y-Pt%74B5@b4WDJ2c*1*skYceWw(`KZk(c
zKw;_HFq6#KtnPnqW0*w-UJ=Xw4@B;Nx?s^4qAdNebRIO1SbBK0y&ES#wNLFSm8DVA
z^QU$f>~i=z^Tj`YbaBdId`4x%7W@9%|9QRF$3K7CQfK|i8vRdw{VxdM|BH?Pt>M2{
zRf_DUQiMzhTV06!5n6&Yh&qg}o$DtDU<6}cLhQmXeRmEgClt5@6EXT92#?GJ_~U!R
z_W|c8q*=KTROE#)FjaW7Sq@m`vCPNb3K`Q9UImIW6}VpB3*F7z7GXabf+-J@w@y}8
zS@j6nQnLG%+x2}A@imnJEF0J*+WmnHsdoiZ>iW`5_ISxmlEE8F#o~7zkVb*3JHndn
zi1qRiAVNQbM=mZj6ch3`<(bo~rN?P#jNLbmilgZ01@SI?KZ4UndGC%NG_S~P0_=F?
z$ws98jS4UrnNZ^bo41B!ianr&c+?N%(`^!HPg@wiqHVE#IIYY}mUVK_^X%K9zC>v%
zt$#*jmN4Uw{7E>bhM)<7viiI=2e3}`!K<`HdQ%mdPgCMtX`!^L3yZD}BVsBKjAwh>
z+oY<UNL=rC&V2aPULY)ecpEAU?(z4OHOdU@tM8%Q?%qOf(-poKd75oZ!sh9sgYU26
zZwO_tUke+iDHxNLDW7s3k_tWue>);p-HH5sXEKZ*mM$wH0Rr`4eCvKf6dN;{^`|6?
zqMiE7gQ(;$^Es%WaFsu<vz&J!n2f2|Ra1&(b0Q2IBxEmz0dCGoKX!V%)HW%<e2B5o
z+KS9=ei<x(`Uj&yZL*SjF>kV6yD!xb^}3y|gsl9D;}3lLpe1SiwRTD%U`po}v(3A(
zcB$A(SreI$#i`R>^QIH0b9P*{+|K&TamvB*)BUwx0_XGf3dG9l)vl}Vv~EVTE^2Jh
zmz^U&%x%gVn<6eUF(>r9lu2{UiQ{f?UL)>Z6r}?q3?Nc640T+mNp53xbZ-WBKMfe1
z-94(|XWpvtM%`I*0jPIO1{~Otcg+ob)g-i|OZP*^MeW+X%ghvPJzj#`heGZz)XxqU
zo)p170BE=rv>^|v(_jv!-7~sOt&YOyUs3~=@|s-A42Sa}wZC?=%MN%=Oh{dYZkaLL
zOLHD9?-OfJzuh!OJ6<wt?^7-zbndnjb#C4aUNX`$!WsFb=n4X9h6X_=$|#_tlA2mz
z?+Nh)^D-c#<r-N*;EIHTwCm0=3V|j0Wo6-;a7gZtUUBW*x?l{QvO{Qb=aE;9;knuz
z8MmvEYV#FgB7x3m^peesB@K{W?Y*v|Vo0epIyPfE4kII@Z_F}(11hN*qMJX^q={Q-
zJe($Q7RPX~m<5_WL+|Zr^8#oxVd|BF8U*E44Wol^NR(nr@j>I#Jv)TgtY@AU%6mnN
z_*F<wb8^ZV{mR}?;X4;0aTDgjrVt3<*nsCH7R}Ia&DZRCznN-h`Yp{cv!nh<Z3@&x
zIzduWX_kf`qC6%PItf>(BvlA_Zl*tlp|3p|Z~?adMC$ccUAgaQV)VpS06cw6!N~1J
zSVv;{C;;LWv2@rCJ^7-!ixT>~we%t4n{>*MZd_9kke$wNX-TaUu6QjBLg#ncI_d94
z?MmDEBpdAOr3bud=oM3~$8kJv%wbs?R0iqX8uyp{ACQCEwa!HD{D^Zx9!L-x#3?1v
zK>t->qYkNNZPS!q;gU^%zAiL1=gY3n?q@1Jo05<7<=5-ZtqTa97xr@IckUMl&or3Q
z<LIKIT2?lOp$MkT4zD+KSo&gOweygI^#^z{lcXtAZw1Nnb)dIwd@k87q5ctQwhz^j
zyuc@>NC3q;xFa(|%4`Kn&@|C{2^qfetxb+)p`;Fo&W9T_cI3Y;7AMt6K;<6e%if`Q
zYfc(9=mC!@G)M(Ij?AFqVd3Myf3^b3!@GCl+Q)~t>0FBx<=zT6S6?J(v=<7*rE<@B
z-Nu~E>IDfcl$*$89)RjEXD%OfwKdfnQL&Y2!p1-AW2X#u_I-$u6Nt}{it7Z2Lis~W
zO#h9#w~UIaZ~KN-6ch=OZUt%SZUyP?ZfS<@R0(NBKpLb`O1ev8=y2$v8wMC)=zR9*
zd0zEg_q*;7?|RpI{lIcy_RQ=(d;gE)SI4%S6ZlNRVI&XfWTROsju=X3MKx}F7pYr&
z3|fKG=~gH&e0!al>hNw@WI5tHW0jo1XiH(zm2-gy&Gn-UUua0a^<O(zB2yp`=Eum?
zx>_F$7+17P#|eOXjw|vcYI$wIcKXM@P7M+2cB&uVXhvyP1buVkNQT(S>X~X@A+bih
z#%C5+3u;b>YDEb_GILkk%)Un@Aq<s6Q0Rre@6+Q{oH)Uza+}HV_Jb90b0U?mlFqc#
zti1>MrKYHp8h}|#+}*aue>iE-R|#KI4<(k8L;IN;uzYzj=Nvn#tL<S>+I`8KhKCJX
zwm0;?yb<S$>EB1og67^9s0(zIesp81H6}u}Ij6IeC+|8EHF#eN^Aw^G%Fs*J`qX<z
zmAH~^Sg)q~kU!w&dy3lrbKdTAdq+fiU%J5Yc+Ubg*^h<oZ!u?D>VBCH>Ot_YQL~9E
z)m04ps_*Abc&~$NXjCclBTMVq9p^U}Q!lQZN;_(n+;l<3as!$ozqmcA-oRWs{p10j
z!+X*YUC>ah;qw9q4shriWCN10-OZf_yXnr4ml<J4I}<uh<?IRN4lQ_&obnF&LnJ72
zH|=^M?P2;2dDiGwN|*L)n+?%UU74O&guDFQws`2aPE|MCT75@go8J)ftOaKg{pRX0
zbJIYH$<GPQTrEtvB0QIYYk~pr%YB;{QPq!#^t8&e=o88-DNb6;i&V<kj%~bNXJ!-`
zOblB3U1EK8SfHDB+<lXOGCj1DIr!Ca_N}CCPEuwG`?aM@4<=vE*MCxtn4xlK1`Cba
z0Ug;X4#vv;XMPKG=V_*2X5F~APFo`e^Gym+(!(h?`j{w9zmfEQ=vtxA&~ORV+pvSB
zyw1aO7hpTdc01Y?eCJ=u^UGxRtpkU8rO`qQN>9~7TlEdT2E0iVnpA0pGKpC~=fhmF
zOekJz*7377<S6(dh-9->rwsm55H~*;NEh<fn{>QzXu5ELi{dKVsF(N=@s3)|5%Jkl
zPnr|%#|v{7E48?HR+fz4?(<yqh0<B*)WEhVKY2>AIH-^L-8o`jP@Za`PVD(r0Z7sl
zHf_{+css>9Yudgz4*KIUkqa-uyTbTIFafy$7n-;)uIuc#1&h4(_8l)mhA*B%xD<=`
z(&)VG9!2WJgG&w0@dkc*Qbj{x$N3pBUWI+nV(q~hPmppkDuJK8qTiglid>@t?tnQ$
zTbJwI&WH4!3{i9g-k;EF&u25WHQrd?!%Xa!lJ(%r%)3|wJ}^e2!$%&h%wme(-SDY$
z)jJ~RZw*SI7c~dFYLi}i?7lpyJRoC8z9{=07)MxNUzZS{T&%&TU>*c^la96DLrnQG
zJaqBe3{DJ`0vGDxg_*>bxGy98f|*)UDFBC<l;p{nrmn8;&Du+EI@ecHr;nxXttC(%
z%N@Z)&%~5-g`o2^GxHJfsP%!-n;v`!SaB67)V_L7x+Oj7ipiYAlpg+N|8N;SZHU7;
zv%<a&Q9U?Wzg;Wxwu3v6XicF3)kA-vU+#M#3v+o5Hb~7!auC|Hk?CLz$-IOtW$#U0
zV622-k$Ud-G6S6(pa=q2J((Z<ddUvIohyH{AMlybpaARo;o_|yS+s*5Gqp2mf~phv
zCEYWN(Y}c480!?G?nyiXx39JiUZBTL`L=BlU*(-M8-o1<tR)w%bs$_$4f;2v%Ei36
zK=<d&GYr^ZGi`Tn?;QZyXhx=@D>V4p>50iV6&FypHOtCPk*10vMH0rGT&4%f3YWqN
z=5O&qc!3CVzhlIyv8dkJ>t6Ij^OSYXjPn336%7rS91MOXXT1eNr+TX9<nEdI&XrM^
zdVrAMp<nDp#e#ls>&~MaZ2%`qHu3!88bl3E4J&n6PX?&a;$M!9McGyTom=;N!icr<
z1_Yu4OG)|CNj>)_{0AoNlJeh!b6j9XlzEN|yghm82h)wGwk&mvVmx+JKfk`71kbv6
zgfPFL%^03<Hk$Oy<GeNz>Cqf$`Yw7q3d9)KVsx3bTS%wwbf^WF!c?@*{9LA24i;Sn
z$^n)S{6&AT>3OZ$OHN-(DK-q0)Kiz}Z;b$iPvzAbowIj^yZvl<)aPMFW?WYUVDY5<
zaa40PtNiMm#+fL45_OF&6T+mVccrXLaJjwJQ7LZ(=8E<0w3*#Wop@<t^jQ91>~Eui
zn;W-o44N{%kjD7ygCEw_$L(**zPIh37!x(rvS3rh7((b2P}F^)Gk84e(xmwI9{94D
zqVJQ=hpygiBj7e+E`PYrniNv<V1Vf)u4z!w(OGL=XWKVQcI%sXXxKdF76`QUWYHXb
zebE5PsG_2>wJ;=W(+3C!hjjS)*2|9ZOYS~b4tD`EEwO*Cxnt&QMa9p{YEiJ0KsrEg
zF1cRZQ0V7d16M=oS6k{idu(&__ip#;T+3^C6)F{v!4SHIR5vd#ek`z4Krtf|Q<&?Z
zxp?OwuOUDSh$^<=!`j>v5)!-?;!VN5r&&2HE5_G7?*c0-;3Yg50bdwUL{_TlTvinr
z6rr_xgmQGi_cdD|5YaFP{G?_-xcch1{Syc!p+4K_nq+%6euM>+HuS}_IQBuOxV8;~
zCtrtLOYCm_>i5}Q-jquEY+vH(EhJ3L^(^7%Pk6SW_e$e=WSRp*t|)Kx(M{HACNZxu
z3MDfq%H%N0FKH$jDogB3H7TbUkJfqY1!C8kT8p*0)&AR3i8)8?I0xl<TjjyJ8Q05Z
zgX>8PEp_!*L$W-0$Cg(e&0<3$oe(t6LhP&<m3&c6pvdk9IFhy&G&TKPs1*ReEEY1#
zv<-8Cm%7q3zO6Osv(*FiAv2nc{8N|<#;s@vTQ&vXhuX=G8U&5a`xx=K$&rnF{Z*P;
z9k&$P7P%+E6F3*O+R(}B8_$c?BI<pu3{&z*QYw3H(8HTMI8&u<*cb<$KtIdo?SJ<-
z=XiS4uR74Q4J>K~QNAEm-@d*U%fXb>W+uh`PTb*xQK`&}VKLvM(E_1^P8WcaftKkY
z{K-T=ZZ&7oEu!Lr&VA=i@g94umYaD?p-0>Sj1iP?N3DBdO-tT^lV4n^E&~@+9ppIy
z;d<%9WWp_|W^Lh@SNW-P_y>tuL%z5rCHpR}#DlHw6w<JJ1yS6mU-sJ!<hJ6gJ7!J?
zNzd$-1Do&>Zf2$_{hp2!lBI+5?LZ+Is3<wjJi+wat!qu|B9+i`aT_I-zpXf#%rSYn
z<PrBJySr&U6a1ho`qiY1=Y=IF16d>eX2|mnZSQ-2eBW|-L&{&8lA7(}3R{f!Lyk9{
zG-b2gVA9(+4!yCH)lV#i{_vHu6H&5Z*?iS;nhYu2wz6VkD=7)2kj^DXQ=*3AkTI3T
zvZoT27K4{Nv&p2FxW)NS^IjV|OomDG2{*E{_PhY81^$bD>+A2g{*}v45d&~o_)(<1
z-4>N9hK75$j#=^9GOgd5F8QvUdT>`6B~(=_P9=E(T2fs--YjLLSjT0@T@bi-6B0CD
z(9)_H?j4my^4i3|s<a5Z=@;qiH&EAV9Oa72&3$`Y^FBtHA{`*KMvHYg<#A^d=fHvi
z@XikufL$gFZMPu4yRLP2H6*6Y^h(TfiVUL!?b-7zoUpLLW(47HT9N6;v>os!52~uk
zYM}~ZADV~!9{Lr-Bxj-CLIUnSV%ntQE2NwjdyFL9HbD^L=BDs)S%9d_-hssZljKV~
zJH8eR6{xgUK-!<iS^?CvHC@S@E@-rKtD9>EmPM|$H4ejJX2H0(b5QPr#)N<_T?p6h
zF}MZ$(fgQ^>qmmjpjx_-+tJfxAl^4e+p@+APOLh6st)s7Gt!vkVzx6E`GNU9tVES@
z-E7c@@M2TTgRKOj>d(H)UXvoZ@4glD<AOmj1|zjAac>{SFW!#{QZo+tuu}Lz^IEA2
zy9Mkv&7(<*vO>ya(c%tfWc}gr{xT`Qchl?q?X-pSxq*XZQ>V<IaUo;FcV!t;xU4^@
zh6Df9n!-VTexp-ZEnw0luQimWb;tWv9kmM29Te)Kz&s5jZaPs#W#tYN#SC8y3+ZFL
z(~JL1A1SO|Md4dZRIo}}Z+_XfXO!&1*SGI^^bk6A&)y&Rm>>1YWrO$g&g3}PK5Vqd
z&lPP&$G96pOctH%sWQ;9<|Loygpi^<@0=D#I-U8#a;2V9KMx9xxk>`4KY(^ZvSLma
zs>HZSoR&4W3-L?4+qJ$4?VbF%y`lTN`x6WK`*H5aI*A&FR?U926Guu6_(yfGSM*~1
zgpw<^1t$Pc(ghx9N9@v*@xoVNIMKx`Iy8<NX)VM2<f!=egs-c@T4!f0{uXFJPAxH9
zv^kEM(&ph0F#S<fr$zzwyRA21T+!G|cI^VD!5A1>r8?1kbPw*Q6_)=%)V?PZR6Hz_
zA+K{x4r_>ZyY8w4{Q8dpV7`Ue5;RgAZXorK{%z?lm`l|Y^!HY?1-8}_@ksD#9cf&@
zq)q5E{<%}0dsq4Ac0oSEkbQpRqqFCr2`Y9A**j|642z4#t~<F{nLot?_3jCJUVA*A
zGCi>v!xiVhI>MM|rmCAI7o5VcKwrMqo2S~#Y@Ifu^!ha6O{%025VLG`c|YDVrMc<2
zH1}BCtPW!_<K>W1-9v7k{e!@P1-ov8)AvNsVDO9JgW;GZ)x}?EnM;S<!)(`c*<YO=
zMont|N@nw+|0uTXxA|?WDPZJ6Ho$wXHx13_&X4P3H0>W<kqzJRw2G-CS-n1enfQ$S
zv>LFFM5&q(BP;Me12%gd{_7P7)W~C>F1K_#i=!GJXzlVVR9uUXG3gGMBih6II22`V
zJa0%4%1gU;q~-8~u96dhgmCWe*cA%qjDsV%YX&v<_Jjk{BERe^C!hwAQG4+6s^(q{
zov%jDa8P-b&MAiuB}I3WFW$7ryx0&f+)<ffr|PX^YE18dFX^}omrm`Re76r`N>-o)
zHSvd#3ky^skOMEpq9ntLhjj4~<D|>9bVeN+*8MSSqc0Nc(RiqHr!FD23qQk6F$I~e
zy>=w>S@?tGAkP-_zgn%GYl66ZDEc`U@>Nb=MK@h(&0p7~<tN|1cz%ic`{A^iI0NTU
z1HNCk)B+0^tyW9xyS3!OE4S9#TB^6^EYvRz%e7#5BOhKfP<~FXCmVOc(^;YYT<+%I
z$qSt^CAam}qezuom$RPr7#7cEO_p81$eQ&~LM66g;@^Ijd9|i8F}?GOgu1fiU|5CQ
ztYn){NldGms@mal;Pk`t`49!^S%97homeq6sIw>^Q*WTh?8ZKeINmjQcthJShP;+J
zU&S{4OOF{D^WNw(v64XnjO<a`@Te)pu+URF$x`H+27le<Ba^VlPF3uGl;xqz;H7t}
zqPhNcIfCp^@8m^uvm3oC*%~AU;V4kjia(N4^NmE7d`WxD{K~hpi!U9k?Zy5t<~)w8
zH32g7x>`F#S+RCNpq$j(*z{}L($;-3-GV8Akd&G(FCj`S653=rYI6@s)IyNUDq7;x
z((a+d1O*IA!{323>R=&9NzmZ#Tm?bLdd6nA1T_N#a#s?gZyoF_YkKGCH@7*y7qMj-
z`smVGpzq=QA+cuUKE57ytl6dxI5cEyJ<qZ6eI7Gp;e*sl#vQe4Ro+@!eopse5^h?d
z)NlO`5el=sIYtjJU|OAwkxv_vF2{=0GA6xvL)O3O9uxxr1eHrez1ih&kf&aeIbFhs
zFqVv)^ir1>o+45aULb@tV7LTMN~gsqG=x}r9^0)9vy>T|R`l|7fu%loP%wj4Q#`6M
zT|JN<Jjht{rPV8T%7NtWn)cSU`VH^H3pl|iQuWex*2$I8>&uH9ixqm9kyk7?TFHif
zX$micxQ7{$_n3Rg7s8~-q<rgU^5l?HOIlkBJ<(ekeK)8b<GOnm`&~?f(-!;`@2N?i
zWQ!e730w*vQbsqT7$L4C%{yKZo{J8hk#3+BThH0e29px<EddIpwqeVY<Tix3T#_Jj
z1huY`q@@96mBUVrWCoqya#BG10oRA8o)8Q&OQs1Py(1oae4m%p(Zkn>=@gts_~;6O
zQF{4u{&790>>SRz3bRW?&Ezn)pwvCBAMcM2oKAfr$fl8QTBi&4NM_##EPJw3+@B7b
zbF%)gAOG^MKBhP-`+7Ng&l&sd7avSPbP-2Zr?p_uRe-_poYqzjI#Sw9byf_29!-JC
zz`N)`lgGU2F7wpf9Q@mCaCy0z@6pBK%gw6k<%Z)hR}CVhh|}iXO35cCU^R-=tv=aH
znvakRJh6E_gAcl6<$;K)KeD<D#Y&mNx=tj_H;+wD9;A*ysBB9|PIYp&<R431-o3u7
zobuBi@-;VJn1yaAqH$DM)(FO-w9Rq5O{Ghk9c4anuw_i$PSFepcxKD=Q81tPEH$|D
zq`|b+-+zk#=}2E8dzl}_BOTz<Nh6Slyj{2)-p@Ypx#6??bbF3m64%26?R4tm_c$rq
zF4P{`Zm{I_u!Z`eGX)+D`#1>EYYzo>WigR<73)@fv5#wB+nXhJToGfZd}$ze+KatE
z`)YrV=u?p?%@CStyjJ4<t5^DN;6?+-wA#-`j%c+Kb+J7S=QMnV`CjidDDn5t$dx!Z
zqNV)=`eG-{k~ufTzQ$L(h<;VB)pR6}=3qK!zZ;(2-OUw+OJ-D-w!3<}?4IH0-ub9o
zsA)kq`6fXQvKlmF+2tK6I>D*cX(PURPSCVWGCQ<DsciL8F&|z%NeqgNz(CO(tCPx*
zsvgIO9V0r1V?F!Ag=0Fy;uZ`E#l{2`Ab_mK9!0`^K+80tMGHXK9BUF8nckZh-D}PO
zd3rsZm?-GfDEvCcZSDmF1C9a&Xb9sI8}9&p-iyBebWfliYfSI#d~-*L0-Gn5Jh30=
zgx7!<aP-nkDEnmrJsH)P0+{5h#>hg@NdmF9VsXRDG|La)7^wm;#G4&=QUFx}`0T-~
zbZ%@~8Xg`i1gV1pZDVDqp8&k+tq=uD<D7uUj;lb<%@^OQsk%7|J087~6;g%}mPA|#
zmyDufH`nV)7zIKa(aH8<VR_lwXwz3&HpdIGexuzuXAfx5+0k;j=N2iF%3kkRR-6-Z
ztiLPzVPD;PZjW&>Zxh+3L?MPE)IC-`B~yytyQL4gyl}LG&A?q0#IH^o02wVb<orz$
zUP``~7VEuM4jHdo9S6P^7>?htlsB1m=E$y}LvhQCNiEB>g@+e6UD~2%#NV2vcf%(>
zHcS{m-Luy84od3x*w{`+O?OD+r2Q)F@l;-4j?wT`kCQXlkAmy>*kd$3Hk%?XZzQ%I
zjEezXw%%b=dxA&AZTB*4g4jCJwn$J_$ZXtAU^sTu<#~(0+%JZ|L^-~}IK}$dKa<}6
zXG1))`%Tl8HD_}g!t?)CYI6F`CzbYd))@8#So)INwRQNY9*56<L$^4HkF+<j<MH!t
z{&MBt&D6Vs_LFa^WMAa3(F=|{yhWucsdp#$uSFmml7n^Ww&hQMi=Bns<@-09%4LGd
z2xII!HLW*y9@m_;cyI(hs%&mOiLDL2+;G6UeAM_AL~nAe2JtGJI=xcHD&rqmY)?d)
zU?o=wsO7V3rM4AW-CxWg^R^Ly<DdScYhn@^<*=FIxjARoN7pCWw|zA_LpD_~a&1xi
zFh--Q=FAkI(d`V6f@JpTEo(;-h*)IpIchCcp^(u|PheHm7cw0LSCOu0=Ty~Vg>4b1
z*-yI=ibpIELdpd8_tVYJ^#Sc)3RlQ%?SoFcc<q^Fyb8Z0NrlBcSw4FHyXXA+AW+r)
zb8@o61hjFJzjS@fJ@b)SIcq-^C&F9=#2LS2(wburf>_M;zcn|HtG}Wb-)jnXKhx~f
z<)~9=soj~YBJp)mo(4@c%Uf9R$n9u-S~nnuaM>ovS57O|MUwEp9QI9}BQu-ppB8Ft
zz{^t~<C&~6axDG{eM(X^vg$jv`1FgV1t(~Rqb7T#D$w^ZQL1-ffR+=H8SmMTIBpy)
zH-Fnwg$3Fd&)ra>LF66B=bL}Zs?vq2%N|^ptLj!;JNS+IX3keJjBkz?pa2$BS*4uS
z%~SfkE~1Sd7iwptrWK1}GoAP(aCppbfY7M}r_c0{{|MOvx`;pJTI`$1k>Y>01-)7d
zRO5mr@l7R{^h_?w2NGE4%s!vz=LPf`q7S#gEfp^GU%5eQ+z!(d{)z>GC`A)z0do9x
zzHVaXV{A?WOziAVTJb=aU|^e?vuk;cE^AyY27O9Vw3v%v1Ix0mY*4dwZ@DgB<~{${
zZeZ=)wARcA2j3@xeu-WR%d2ooPx?`bX|&SUK&XfE%nCY3e6~{A#A-kqw)Ix-clRne
z26OO<X}oL<`_L%h-2c&X_HmHQNuY?TQ^;K}_(=gFQhm32($I(=0}iy_p1<EKD_}=v
ze$B*MvHrC>y+1Gbg(?XNy4vYi7)9GF@vQie(^b2m3U1rA!A7ISg=GgLU-L8n!{PgE
zZh*BA5;|%@z3tDVw^K7lzyx`@9>@=w;yJ4oI@MP)Yz+|6<D}ic8hN^|*uNY)5jUzc
ziPkl=UpMO3(a@kVdEgmY2jfz}J-s1Amj#dVa0kZ6`%b)^MMe4e>2r!A_Mum^GMZ^3
zuC@IuX(RvIceC$;gjIKJB9Lb*Rhcp{X42~4YH2;1Jkam_ds*JaI-grFStYD`R-&Z`
zGr7Qb71e#Uch~6RZW8L<809|3%gxbG*V$F2B7F}DfU~R9MlM%7n6^!^AZ|Iqp`xY=
zb5~$W`iHHuY9B=+?nc+#<{q;WgONf0vCs6~<MBL216C^5h1`ugN{B!J+NJR2bnL=s
z!`n%cLl5Ob7`+=?H=k4nX^6@FQ<|UVgzeeY)&8yDUOiL^cndTlqj#d6bC0#x2kM{D
zoA1tI({o_hn%i&bHYoYO+d%yQ4~f;sPm(77t3VqMJ$v_bV#q)?*5t|M5W-ZGSx2t6
zcmCRaFVfMbiRU1}Bt@^6m8b)BL;3-$)5@jz+O(ENwYcWKoylC<YIAJ9F@LM**AXlb
z-7R4)VyBW?@fm9Mq;(2vFk1A;VMG7axk>r$!P?}p@rGVR6H^14X{5_)J<d!bT7<2p
zrLC!ll=1-ecx(>C&Qyuoc|HTH#B)XJ@BI?OirX6BNE4n)JP*puw@&jg<e-RoKWCpV
z>MoFegI^gGbpI(XZpq3=`$b1SW%SRVKQsJgk+OS1L$lIPs?TB@paA($^VoOiU~_8M
z9e6gof))3s;a;;Z;qcHIuSCewg5qQpE~8m1828hTHDC)PYn+obH>Uxr_l>g{l+3ja
zb9#8!JuWFp-B$0OnK`ob_4djDP9W%R_Zp)V1h2QZH;Hz$0WEbfx_|BAwnx=%OqrrY
zj%1Y8OcgQyJdCLXtN{2+_Kk{2KxsLHQ6nvX*Zcq|;N-#x_sXqdd;q*=d;&k4*k}Le
zZ?5cgago-Tf^#|@c>1r2sAm%lzeae0UAgK_hL1I<_O+&$VJz@u4NLjxBN7CSOR}$n
z1N?RYZ{MvuovviA$g9EX6ku^@V8EVLf>afP!tjdP<Z!6QiLcTg1)U1c+=A6CjhnOl
zu;+MY_@q)u%P*Fpv|R4x+o5CjfBY^gtiARt-BCbC^X=CDxD9_oO(W!Y5HeXG!VtvA
z1X%YpG`Q_+(O~wL+rHk_B7I2C0*P12q=noJZrl5T$2f{D9029=J3;xs8^ZdVF+h?Z
ze|v8J(-QQz=jK1t<9|Qz9~=H>db}XWK<ru22x)EG_%>>vp1!!7D&ZXx{*#fNP45)S
z^ZR<^Dvv$`_J+9Z2K})Pp>MoQIjY(8oy5gWYt>g}h;&bq+I!4*)pY1y#aq8y>Na!>
zqTIa}9F(1q`GNH4m_Sm-e3E}B;W8X48m*pY(3YG_+`io-j_({dC_x#tTu?v!C51IV
zo77ewL3>wv88{%zLA~7RVre-?-OR=KL$oDc7Oryhb&WKW`ud38laz?m{q8wt<S&I3
zbP=sX9@)J1IF<6;7x?aQmi-%_gi+b?`A<h5b()dEG;?|2I0Jj#sRIV~P$)|8AmXO?
z%HN73|IsOnP`KYuk10A|aP#9B)0F+otlq2a0FI3A636O>=iWb)Zypv^a$6XVXZl~G
zI{q!w55#;{XUzKn@(I_wj5MC$A!U^P{C%vj(EM+5iiF9*3DfG)EGPY=cMC5C`etLu
zh-isu2d;bC9SC%IpUeS&sJd^PNpCkN_(vzFGdD*XFxulBpd(zEq$DZAS2lq0d(;i+
zcEd_xN%_PyTQ6*gfivKDr`7#EuECfws;H5tooi_=hTH_&bXAT5>70?Yz7d2{Q^<b_
z_}M+CB7Y0P2b5m$O8ZKEg4cs&jAse#j}cSC0eCG5!{-RCa-Y+pNYfW(1XsMq_?5hB
zT7+jxkYQ5caIXhC&yjn>2kEJJ|0LUR^Wv%hWbLQRL{`&NZS7PqVh>h>ZuljS`A|Ol
zPNVG$CHvA&i^d0n<kHL;oe5g&D)y~mSvML3T=}K`ail!*+3?WxcQU~8p`eMHm=z!1
zz{m)E%SXtW2x&RM$@Wz~aJc2$8-}yvw%i{ee_^&qdBuX$3DzS$<#aY)05#}pzk05B
z`OD+iQvu5j#I`hUViB-tDFp*soUB8IHqzzmR8K~PdRDqxbzBdG{_Ga3>1r1N$;Oed
z@cZ|0Rp281!@4zFNKFPVt>?uQL$+BXt=m^$%UGdvJ%~f2IrvEgvp-H0aelW{a}xHG
zO96lzKv6mzE<j9urYa?O77SUs7DNR;O`}%N*xY8rd)1cvs#(_P!9UeBqDo;mFd@ti
z3`XRXR%A=h`36CqX<R1oGnKU8)7_j{wmrg3Z&7FD(eMYwCcc^nvh9^j{hlsn#3$dW
zxkL|T#tz5+FI^_|q(p`mN0Z4#vplO%bcJ${2Ia+{iOxf)HQ#fttl$gfS`_Qp4hfE6
zCYs{ghIPX3i2#FM^0N5-kF~NtfWJxk+)^Mm*g*ZQc?eV3dgh1!)FD#eWdmXldt`~w
zb!9SMv;m$Yb?m(l$YsiDJr=MLE|X~)i3WcA4cV+xs;jo#8^0COgSoPFD%XM90dVPn
z{3$IjpWQSY2Hib?Z}`~NLS^KuN@=(i;tmg;g(#GiiPzTfoecn&6xZs{Hz-#a`N(Aq
zxVnL>?EN9Z<XJ1hw^%dm!RXS0^H?R*QpXEyT3G-D#VFtcLF|<Lb2uL_1`4pu2OxF{
zFQypjuDp!?z7~L^4QTDCv9^E4TfYg6`)h9X-z(qWx#Zt#0JgZfyzx-l^i6<TNNv%=
zp$01MhWrcapS8n!0jWQgX2vZIG`+HpPm;AEqIv2gE2vQp!Y2oB`@X}qC*6u+YE{3f
z+)c!mkkQZ@Kb2xMa`7y@4RWEX1T%b5=r=8}@EcSyHxIsLirJRJlFRoG#(nU-)jl`=
zXLQJ*J(|$*eu$=8hHCwdcS7GY>XLXj*5)>!1&wU$_83@gE0;E<QhxD8w3`9A;bwW7
zZhI>D<Y4UR{3xBZz;X^#RO<Jc1=$-cAs21_#tk#PV9IRlV^=^~I0XT@5>;aPB;hYy
zcVxA%$6V)`x-b8UfgIlsLgWK#iQbJZsd-vC${C}T-P+&P8<>yuHl_cVnbF=TaX+!q
z46RX2^Yv9gzh37xg7*?ejr~j40idqoDrBI{cZc$oiM8_yRsL2OiFaq?y3QXHW_6>A
z_<uT29jt?iJTYtBPs(Nc1EVe$IrUrCiSt|a@VKzD4rXKpa4oRcl%<=ng}KvDu|M3~
zbfa^j*ty$wGD&INPQbbST~)t4nyqE^wXUvQbg@^8MhT^<ovuPa7I{a3Q0JoN{is%A
zwh1`?q+3SPD0C0B5RL-uExCw$%dWVYu#1Fe(>>@D>jClL+DcGo3z)EW2Byw9K_nIJ
zQ{~wWX@z)2j}_{*1|zRb2=kV_0-XZ>k9{b*P{zJSln8G3FC@P5^CUtXs=QtBdd#oX
z)bTp+2jp`*NCbdFAobzVw{z~C#PC5grY#Io{hx;e^>)0NeagTU;SHoY-_aH751Uha
zEj#l)Q7-V)AxIWfC30ODCZ6|y%oNVOQ<b|`PMF-V`h-Ox@EvP<jAn+zxMbx<xex+G
zVvfDq(;u)l=g@DRa<25W!eJ5lFkP4@o@1q0Z`9KFXjjb4dF}GCcE<F8(W#FQlbGf@
z$IoSapK8Us%tY~r&y$n;RfMHtx$UWl^){q@D@&Ls%DZdV%In{@#CQ9h3cb1b{OxTi
zWuM>a+fP|FpL4JddyOc}(+9C~**Tyjw`3Ze6W^l|FI>l&R4;3WeOc)<;5+4aLjoQ!
z3r&E;mNg(D%oeNc0ktC-vJF2sT#8%3(NF?NVYQ;%Dtk1+sntPbK`F#7`u@;{6?=>&
zMHnviBoNu(KK;7foGW`ugrg~XG4fw<+$ALS|3&6lEBYRk*wAoLiG@F1BPpqlNxyE+
zUjP47>X_S|`~MHjF;K$3st=k0?FHBJcc_ILd+p<>M^>8+rzIm}9sUGkTxMXVl>I5F
z^0yAp)vWfadp&xcC;`+K#kQnI9V?QPn6|sp0F<=xUss25zTf!xh0Q~kK&mPua;QPX
zYGDc#C8Si-$$tA`#ri(Yem*hZkY+KcW)q~$c%m&ymU+2R$xZFPkOO9J5isjgfVo)4
zH&74c=&rkh$}%b4qwkj*qin6L?41(uSM(z}^&>MPy)#$xS-w5GpoQXwgsTq(xyLpz
z;Z390r#TN+DfaW6CQ|*|sN*aAZRfUJRhteKCce~U8Td%->nw<q36rSWw=KxZ>W%Dv
zegSwp)HK}z!I%7#bP|px!ZbmP@Bqo7EwP8W#g$s8m>e8-6>8YRqqmytxU9+uat%gN
z-?{VNCdtJR{Mh{(wmTBwWui-voIEX5!AF@F-5IJNv|?+T(voq%c*q95Q6ccN>PcN1
zAM2jvDZO7wztFe-tD*=iP$<tAc5p#p)P0|$7I36qnwuo$%BE8c+3*Z3{QBbDWJCHD
zQ%-l&iPsAxOm)&_Q;73}i*`hG!_QaJUf*oQ083&r6IO-!l4`@S=N*_5O>uf-JXOcD
z6NX}pZc%vi!B=B`Y=V!ac6gOGy}AtwCtn&}EZd?UclrKsWuBuGZF50s_b_`^8lJ#M
z8LDDv@N^%=X`CGH-tIIn>)%d3ORywK1zS&C^h{pAtLdlSw&Ec)m?lVdyhSgi8)H6{
z_V~T(#L)FSu{qs#H@?2&Rq%cKa1v6$v*zgA>|7If8v*q?nZ}_bLhSo9nO|tJD8%8~
zWa7ivZ;-NH5oYX$-hQ~PqhLV5t1NPX<d#W8%PMvj4h%b$6$&qkaZRmaKsXSUT4rE6
z0hA|2xB5b`jD!j=BTcwi=(Cjk(OelbK!;ye&@3*K|Ni~EB!mlqwbwF{{cD}O?w6UY
zzX9$C3Rr`Tsw!1V{*rqmfO+o%G_y>6qTqq2E8r^#3k$mg_%-c#1X&WPcN`jiqvP<e
z7h*IoUc7m!G#T~Iomd6B!^HU`P1_AzX<&Q~7#M!1g?IqB4qyX9uZxwY=I3XiH_U$o
z(An8Kl@>UcuJc~Ko<gYZjc$8WTdtBi%n=l%wa~ypiy}8)>aLMBXVVngKTz0v&Wyr3
zgGh2;PhV*FaXPjv5?0Sr+5+waQ&ZJ3r!cMsdB{UXR!3j`QfDrO@o(_=x0FihDftrQ
zW(t*n+ah*5nrv9wh5JV-P|fZ~gA6YHO3VK^57M4zS|x}<xZv9oi(0e{a8Vd0*h4rQ
zel8tDy^Gt>438R5T)o)FxFvnP&`RVj{MPD_OxG~iT>>U<04oJGjvSVpP3U_N5nWob
zpG3*zis<l$7Xpr=r>QgB(Rj6+EBdENQbmHUhTWXERL8t*6Dj#!v%Ib^ZAmj5POjg;
zBDuPeTysYGwm|xZ^ilm2qgI-&_`f=_v~`(+S!tkg1>g%w+TRHFZy@>?&kQti=+6}a
zr7(%l5?$1K^2g;^vjT3f@-`aG473(hQ$E}|J&??q%FqGLibwbMZHO`wk0&LH3CW-o
z3sn<uAv1iaGTa;dSDS@dqcper<L$N<UkT;J<?9P=J$^v0hZd@%5?kjL`)oa!zbt*K
z@YvtZZ!OAeCeo-QJ{9-L@7MZ`5&$py)^*8OLl2IPc8WW80oQj4><;|kZvm~^Ct#P_
z0q1mhf$Rj={WbJ2nZ6u;o<(NplGGl^idJkSkaA=1H03Wf;oGy+F3f*~Y{vEm3+Y0f
z&$fu0w0yJ8$ErYA2(vo8I<CdZciGkaLLzseyHhy(a?H(5AblCw$8JaBHesE#R!1Bg
zyTui><ksoPr&2`@KzjrO32|QwV|7lk2%$3IT&~BloA8LoXqO)*EJXl;!?qp6`q@@v
zxiR)=ZdTQgN=sSo%m=qWqo$#hG4UU5!fI=yd)9i&dLBA8d;$j8g`y(GXF(+63)?j~
zA|rI1@%*X1(_hgu;G3)j#W44rf*0yRe+%n6({EWs`#uReWRbUwSA4;+kApM&@Rp!1
zkg2<;y0OLqa@x~N{9G?BFxQ|i1H`TdmnBCM3sA=`c){AIfM>FlrCKpS%G#x{Z8v`%
zdethkt2YSQ@p`?+I?!*Xvo3laW3*t8m?R{T%HslBror+&`Ro1yvN2N!LXtoxP(84>
zwhO0VS?lrq=3^R!pEo35Jx41Oi$1T8Q8?;z&O%N+fmtN=@Z&rVBA&XSwd85})SAeW
z!W4F()p{x0)NzS#82uL+u=~HEps&KB5@z52x8CLdfrHk<3GCORQ<ucVEvN)Qs)q#s
z`1p8rO@01e${`@S&Fa+z*N!3y;-<C6Ceb);oc*bl5>{2RlCzyD&B%TYtX%Lc3l}PA
z=6yf@Y;7Cl46PRawF->?mR=&$u%!2vkMh?q8I4`5MAg3N-7fkB3bV+Z!3b(Hrsl}Z
zm^z{Y$ou0W{x_jg#!b}YPJG2=&pWrokpurog7!*(t{fPrH1K|_c#2IbrE}XCQOs`z
z+Hel0wfH9k-JzR~$oLwiTw_tv;&uA?O7Chn0-)8DZj$fhN1G5?k+9E@ouxwW$CpW2
zn;D-2I`p{>phLGy5AcyRkamoePn&`Txlq4m!R{Y3|5(_&=EsYV&H>q=GBBJM>(pVQ
zVm+tfPN!H!cxPdal_=)f{TC&iokBC!uBPW&Yx_>oEk_iHcOt%0!Z2Jcjpq-GtNY1a
zg7nVJ+?5%NFp^!y<$EJz{kXy4^BchNk2G+)H;UVbPyeMeS5xHwqgQyQd5FLNFt4~G
zh5~b%RTj3L6KPxy)sJ({usYAm29Iv15^n(AK&V?_YbjxDqQftj*%<5e*1+qG>zy74
znX+43%yU8dF}HXDqTi=l2b-fnI$oJ?Ty-AEig4+3gy)3=5iORKBR?=k`hi#|E^@?T
zD5_&TbqScmawzx}gYAa@t5_4`lz*$tl~VSvM2u5V^$1w<E+f&BI3Ious&+|KeM{6S
zVxT+loyK;HXS#7=C>=*JYLd2vL*9ky{DE2BppRMq06v;&RegvFS>Z<>-L)|SaDyG;
ze68S>-{Yp(9xhCDY_hC1x5RQphw1G~e;KTOsFuJ>>%G}Hv6rDXucem*IwMkZ<}R9v
zo#AqkSQV)GOraU=1}dBrXlCWbe{>M23fyPPNwrLDt}vb+{rMG_!b%h3^MNM@Ag$g}
zEWoXWV!jd+y9boli39Q9vMdl6?gh#&py^K8@c?!DVC@l0Vs&f2^=s$@k(0lRaT0A6
zi7V@=VM~Oi<y9(G$G$@Wtou<y`GOikL-==b{148V@y9J-p7_Hj+h`T@G|Xkxtq{Qh
z<Ac?_5PP9ROM+D%9<nf7LoC!i%gU-Kc=Ld~eE_Cal|atm<2)b`8wap!K)v;<e>@^B
zD;qvTyTJEg;_jQ5bo~6W6&z9{Yxl%Lr~ZXz&THb0N}7kqz1SHv1d_qd1W6-jHHd^I
zDDBa?Rg7&53mRN@#^`KvQc)gq<lvEQ{$?9xOn-&AWN`GUi>)B;LkBGoD3UkYEvgpo
zWVJvQ<zUq+UK^!pnd^na;C@iWpi3Ux7dA%thuC!z`zN`qxc@(p%hjh<6*@2*Gw}o@
zfs7<J`9FDXHvj{pfX7s6zUBa1`xg=UuMG45MF9V6-9?t>|83~>KN;qKZ1{I!|C@MG
zeAEcsyel@%S47z7B;REtqJHti<GXzB#qrHPtrnLjWPtTH@fmVb8Us?(7>Hwd^}F9o
zYxh3d>{@K^Ftz{7ZpzgD6u9L@kb<o$+`JEf1fL!6ExP&-zq?C33*>h0_#XBO0A6-6
z)8+FU(2D~g`0A9sngUE8QR(gF?tPmh$>z2lh(Y2ioRXhqO%jM|Fg*4R`&VIX^)>J&
z(uyLYHeRw(rZ;={kVCYV&Nbv^5|e=Ws7R{7MR7Qz`L1oS%i-#QN^Po;myqJd>Fdik
ziURG5IKk-^Nus)sz2`$hED~{<fTND&`O_fvh^{*rM4wb(H7y|D%QtcY_~DoiFS8(>
zQqo$Ci(bD8EA;0>GA)f`ev^*f%h2vxB`#Xpi&8orbx$-UNx{sF8@3`3!XG{!cN;xg
z`{@75y-w!l+Z-|N815?Qi`P(=#NWnWU!50S4FiYpw<i*d-7V0(HTm_@RI<FxBpXT#
zrT90Mm)b&~qT()qh~=G&p$g6e71ByV|86&Ndntxs)o>$>`e@9@x3Z-q#5LDJ3|sSR
z=j5B}SA1HA=TGF`GHd+BH)lkXGd(D79J5_Pe%66p+`#YOdA*D+p0DhY2cv5Tk8w2o
z3Ok8Rsf`^LU1-Y}JuMI~u&+z>9SE^SWtU|zei10hvc5($UI>^#jmGBmEZAY1_FZev
zck(d`fpK{2t9|~!x8-x{Klp%9zb6D!kBDpYA_;oYB47=lFI%CXelv;5NZ9&wnZ4{_
zyU-4fKvzJS>WRC)ZEKasRR(6}<iHZH{Cdkgk7DP2J3MCsPKZ*4DT;l$J$-5$(epx3
zX!G{~+)6ADoNOpaqt-^@F4X0Yw7gJey~{0uTO;sO5;%PT(?p7U3N6L3MMl4WM09fU
z(P{e4(DYv;M#x0{(*Qd@z<vUQfLgBLx?`B9Z08|jH|#EtLrh)`)tW#P6Sa(q@_CyR
z@B!=U?=MA{iRm(f+jbu9YXeD!=Q6*@#iklYM;jXk@;}I5d@m~5oh<fhRTTaB4ThSK
zYO&w>i^_;G+~noTA8WVd>vlz8wvp=o_CqF_xho@{!lL>HNAid{dt@5#%bQt4V5V=f
zls~FksEfYeHAa5EH6Zh;8SZuNo@k>H<&9QZ;{w<TfJ$vEqvcRsX?Z*Qye!(fIgR*4
zt*`M^?Cdx|B&EKOz1ia#%?mDcXiG&!cxPws*9Kr&7|TTF$B}CTa)2RlF>KAAo8C@R
zkqc_}0dbK^KOaSXrnDBpVa$%gV=o2B{+!X<l(XA>YxIY#)W1$r@`FLhJG=bV>^ou6
zr8_GCJTS08Svmf#S^d58{Oba8_P*-!k=nZa65Xy%hALxV*z@6Z#$$t1?CC_#uCUI+
ztQDIC(b&j$nU=!j>#vRZvp_qXPCPE_0~USz?(}&dC^BWrl5v@N*(fY8U@Q|;-QlCt
z&P_-@TZ}6-+OKrcs$IqVc&p8)>#`Y5F_;`Pbq*_S20mE~ZwTmVN#l3;;TEIP0p|Wl
zqt^N}?1T52MA3zfgYkby5ykO`0R_8TH!1uF&Mx<so$_1voU@}ri`pS42s{4yDV8&p
zqT)D)Hm)^erl5y@YSv&(Q3r5s+4|^JfdPM$J+Jw@{A!w&TbAzn1J2KqLg4h>L+#Uq
zj!OoAArNBXAOS_a`~ErxL_0Z$-M4RL_7agb>k3ikcnUmAg9G44hpN|#diXcz+<h6n
zU@gl{0LObZ53SqESC`dXb7V6fM|z5nz7nTj-X=u`kr!WXo6-&uD|v6bT^;5ldh|~5
z6_Ez&faOG9%(eV6RZV;0J5>=QA#zmlS_BocI7-u>NU{bQ9igclKQ5P_k`%lH8wsuy
zsf}lmb5nJ-slfbGCccQ=day@_M<fe*k@3!P#k<o?)Zxr1Iq2D}_jtQg^4dg6GzQtv
z`oQacxIfrSjQ#Yg)(4nl%p_+y3-K6XaUeGmRQ!P<RqUlfP(2u{)m*$Al5ax>N(eGr
z0XBzsO%?2YHOPptrKId%<H}h{;Qi#h`D81AOdR`m<#gJ+Es_ZAxnX?7*PXFKjBCLu
zQe86%Z!a_>vo#DF`i7G4Frcr0s?B^5?V~6~`M3xJ|Cmp$mM;X$SHb85c!H$g3So0S
z8FoZWLRM+zQeAT*xGWTH`~7B;2I*f^xs|cB5wNBaOx8H2(d~s`>>{ubtz0NE`&V!)
zhLV{osc$G&zu^dVo)VfS8U5<_BQ9B4k#-BgPPzcEcsCxwPu)E`sr84~4|Z7S%^fc^
z3QLSe*tvs$eNf_m+xYoWpqzFFf8uWbYn>5UO#m~cj?())lQO(vg722JS=a`qf2k5W
zp;AjE`<cgZ5lI>GpA<8;q@B2x*HRH)b>g+5ia-ZdRsDbWL$h^nOH~O#&~IcWJ_~&>
zDk@g1#9elfQaB`{2#h>kFHe}d)X`<5UlZrxOw93)rm~%V!%;J28DTAH*B`#T*lY&Q
zrU``l%3G{M3o~+h8wPC>%XWBRhO{n&CM;y0tfyJ@<<L<sCX1B8^%xz4{z4t=zA!#)
z0ORJ`zJ_|SkoMvxcD#S5!7`WuJ{+jMUTeJs@hfoN%7~p{l6jq%HC2K`R7aN!yZBqH
zL)k;Q!3nCq0mUbiWvaT7?9oE3RD%q+Nz(}JFXuduaFz`w`4xi7AHH1qg2g$#COYKX
ztFdJrPter%zR>TN=}=zEr0Qz9pJfato9RFi&vW+2nMI>eBbPLxLI$=0%AMxdzb(#<
zk++Sp9bWao&=q?_5$opCH^KVi9>!2CSs(q^A*x4P<0)4$i091d>f_Pw40$_KhLI*j
zbq!Hef`V~7J9=BMZD*<if6kJ}=U35a<o#k&h)vYHPqzFI6Lj<^UZQ^mgA=KAe;J<1
zqzgPq^aZFQc6N+hu7e4G33P=316-hs&cTU<pVYt_HL4#wW{TA*y$cdP*Sb-fn`1Gy
z^gM4hSNa9D1x8igyEO_PPtMTnE1<ORT5?nd;{B?`PPNo$k(!<uGx;|3ZZFpTzW~N)
z6$-#170&9+@GQ9ITOV{-8l>{NNU7X3ix1fJvTrD>ZJ{)UNFW^xt5~<A^c`PtcX6qC
zXNp#J^?${!fJ3uRAOCKQFnc%GJU<bCboJmtAk;SCn(=QqierfT8-v0`3Oc}4xsg01
z642rmd7l#IT~%P*NYr?N6+%VAe=sDfq+nu2!*M`t!{+D&je<@A@zKxWQ-b32H`k@k
z-q`Pif8`@)>2E9F7P9spP^w`H1^>@@673fl@o(m*ocNFewvWEuvGY=N3Tpu3jJ75~
zw5M6ykzVO#_>|K97Qya)riE~o)RL=#*)Z&QU=AUB-E6LQJi$>p#Q|#)6Q08z{OLSZ
zBCY7QC{~*Suh%4=7TG1riGM>WzUk+xnbU@>lRfxX{}$?)KO&+`5tzk>_uKU4EnYbt
z+DNW<?{O3d))V3N_r4%Dg*ic~;!bK+y$>6oHEm!1?4MAUJx79VE~HV#E6=*Td-$QO
zh)v&QP8ItPUz83u<?rj|)+qq`UeSh<MG^#RyUcPa%wF31TyMXc+g9%*a8g{8jFcLL
zodvDCE^g~}5;4j{1cr`=Mz&tRcas;$5+SaR1{sS{!aVUorQJ3G`%Z@+2L*mFZ>?wv
zBF&rSu*|oXqLP}LJk!%L2PdU+TM1boM9g8{&%MrRg~8WJ6X$|c@af^`t1m|vtrMSG
z1F1S*w3oh?Veruh=Bat)G@crlz=C&rc&+D{9w6;ldT43|5SfEMULC!e5cgeMr4e~}
zc;MQ9SjI{l%c1Jpr12czcGov%`rI4mh(f|TaAqy?YCao{e5f)6H9uPT%SKj|mLsJ%
z^1ZtD@W@b~Bu_D~7z8P`BK;w8wfj)|nkqU_l{Unr69@5c#Qi6qw#b<;i@aUh<!!ei
z<N*Aa4@moP62Y%XrzQDg3RDW*aG>f+d31$nm<&VSSIq2*Z8XeVWnj`Ft2Ae<oyd&L
z%kWK#S~(&YHyLv9MWu7;Gr|1Iz=`f9o*&D2jJ6B6YN~59{SM!`cpUP?6)tsVyf|t|
zy8=0=XlgFC-q^xw?%Bh}(W<%6a08a!Q&%<Zak%?yM_QBMQSklz%K%oabjlCyz3ti+
zy4-m<RnNJ3WC1+&sIC;Ba+u+$B`lBg<{StH;l12wHyzZ)KWs5eUe`Q)-0cVr9CkcU
zu}rF`dK)~#*M=rH`OEJRMTqywACcEfWyUzc<6~>n7MwuB$S+d$Wa1%+2P2*NapEt(
zZj=Gy`^rCO>g5<XFuo@J!!wTc)AXsnC3}$t>xNW}Pk%2`0fLfv2;MW38guFiZKk{<
z#sACurOUeh!}tpKJv2PxkZKO{EarMfN1D-4oCs})^}j9bmtCQd-Y+;JWk`$Mej497
zk7TA^{dQ-~W4PWb|DI2?q|dc(kz4t8q!4R7dZyZYrmHMaN<CG}<OCessxVS8S@`H7
zkYD26yqGC0Q|fr(;d7T-vU+)iU&86=+s&AJ6MA|P4iruvx45#3eMK>foW3@W4zLv-
zy3d0|x9n!B9s&M1sKKt10Pa%~lUiGKjd~e*`P|=zg)FC)ZZ6PFBs$zp?hkj655(9#
z%O-#E0p4(VT-P~(%LlJHFCJ{V-fZFR!RsS7EN(vf+4IU;zo4T70Hu9x>Y+1X2##lZ
zo+M&@up9~kX3he>cHk`zYacv&{u~%)_69B+z0^z~F98w<6os2ZK*G2}b5no-Bt*1M
zO^3;xILV9!q<Gqh!8WV!w<}&nb`+R&1_Uut-+|R26hN?ly9&As1QxU6Wq>d=FzRp$
zNJ-D&5D6+&N<_XdO$B=X?x|rC(HL->eeDpoK)R+;cGnw*4;R3UC#r5Lu5M&tat?a>
zMjlrevmw!kb)l=0^F|?71-D=%sY|chKZb6*3HV&$0{&U|E-67T&8pcaX3?X}nt;&F
zvl+6}!7lAGBM4W{1To0)jW>Cqq^hdw7|(e(!$ewXA$`H{*~VryLS@}=554gP?I8^E
z0?1nebJdQcm%_T(_q_+(HmI8|R)h^DQj4;7v4s^Uf)#A3kcjz6NvK3=+oE%WO94T-
zp8(tp&eZRbO)hvMwe}Icd?jWFrB^7aUIK8M{bpL=)%Ne9PY(p-07J;`Ly+7ePYcJr
z1!ENGB9yMGsqKa_Z(Ezk#0g+k^5Sa^ISYkjw<9$bn|4F>6+P3dcP-~IvZ?HGOPH&>
zsH$4CV$}X{<jvJ%1NaL~;dqsv{h?zY+q|9(>tnzJR?CY^q7J&tOAksx(O|?yNy(5j
zf=YE~*;)<cLgLN2b&lbDdq!duG>eB{lK$RLV46=-faeXAHe*F2*AE5ymIzd5E_>#r
zibOz#fQQ9uzKNJePizeT#dAtu5?=c^akL88l%Dsrw3Rf7myZPOfv<SURe&AiI&Bl)
zOF>5iIO{{-;lFF}cP8A>T-K?i@-=nI18ju_!@i+a=uF^VwN%%>s5gM&D7xu9Vg?w}
z>;KsUHX#MPSTgp8Y=xHqCEXfR9FpSsr+pClY4~9D$fjTIOr~+a^*EU?mEXmJ)7-OB
zZ6-t;Bw%3XW)X>a!(nrtf9qL`E7nPi)b!tIf6n@mV^Rry-v)oXBQB}S05kM{f7()X
zw2<V;IP;`Lp}@9y2!sD+@&&$PaT%Qdd^hL`dkmrTX~UCj|7x?d_>V-hecrBrxlsVM
z2S^nDQ`9KLpdC25v622AUF0vWN`cE(`J0<XSbO)Q&$HHDIZVGXN-6by_drh`Kt#8!
zv2Thv3kQJ2qnj5gmJn~;?G7U7mb^#r>=}ah)M7b}$S*r+TuEW0+4KW6@m~^&1oNjO
z4S>reB$-LI?(#g9Z-4YTD&{s09`uJ_b|=R#9wdS|>H+R^4!^VOfA|o)TDSN5F_r{b
z$3DkICG{=|3$~TzCM#!fj1hEZLn`uYtUhzJ`|B}JMuyX;tjdqSbsjxDp|a@W^G_Xt
zKF-L%q*fYmv?tu*_ywFMCx3?%K6XikRtC=k4spI+>zUUg=lwawmDBIJBrO(@ImI3o
z^nXbmsvQxF5?ofi<nYL4+ic0?Y`P|xXXXn0{L$ne@FCeF@7r+D{<S8a?ag5Uv!Hz6
zB8$9YD|+>@9MYFxwfF#wo_V<ij{h1+8CX~DnOBGiMQ&8Y3OVtUJ=EFN&6tjqoJQe4
zJT&qGx@H9k)k&{bwAVR(1-vOZjc$JFYwN8`uP;N?<(^mQ5sg}}zG(dAUhgw;ka@(d
zM?xUX+ri<1Z1vrLK@hYs9;O-~dC2}KlIBUxATznMcBSVdV$P4T<y0S!+NC^UOZV(*
zzK5D^7SWX~X1-<a?bto}w10y0w8H+ORRQ{0#m@dgk)MBOv{KV`q%i7)r^Zx+nH11d
z-H8ck9pL_0@3`1J`!T!IUJ4Q)Ah^bC_9yKrXh-(PDyN784DWCw?LwIO!HlH%lfK8Q
zVT9-W(OMqlLIg2c6#A)rf;^7dx=@4P7gS=q6d!T;i!7V+T!A<zSd)&z>M{kM==+=O
zVaW!JemT+Ao5_p+d}_ijEAg#z6CK%^^IB43NpYVrL#Mc%rLBe?|6~v992<q{%_TSE
zG!%7!$UGtc>aFj?t=$E);Idn2L?Qjv-?7B5;CM#{kQ%-oI`z1QqFXg7tZGk1<eDD4
zpz<ED8Qv^U5D=@>i|_{H^gnd6Em84Xd^}M~Iv_k8ljS-m_p<Q2*yM4jSzUD@@0N9*
z@5N6|vS?Whaj-?vLmSI|<Y}5|{nW?5Gjw<&Tg2(4@(cTZjMn~kp@V1vMB(^5_fCUJ
z=&1vvv0(5rpo)<RV1+XWBgq-$;yflpIs9+&z!+5$<7Ow)254$A{Xb(2MaUS#k1k&}
zOA;vR?U#)VSTC$q?^UVfz%|BPR4HlQ>BgsFK5xs-qp$BK9}B-)1%^XrWwE&dqdTIl
zw{haEfexJMLcZg&^8c)a<*Vifnb_|PY*Jb~{>!bd<uWLh?LYo~bD7iv_Z8ltHu^RH
zkj1+}=ZX9?(^|SP<n6{QO2>Q`zGnN~&CjfB5fhW~*Czg0OGk2sYRswoY^(o0C_5&z
zAGGeo>*mKJ>htQfT;C=?nBUyUxk=1`-A3@a!-5Zm8yG+R-RN{gsT?>{_G+RMO0(A7
zFz{40cU!&c8`PGo+_&Id;K3ls`xU!(#rsZ5tJ;5McgJB>-3(AWczZB-TY}fzc8jVl
zteJanRS7@Wej%6M-~4+Ea52k-qCT++)e05Sm%rTY6Pod5M&Y$o7Q0XH!mD+FYh>mc
zE`IoSP5q%4hAAsvB){mtESmec+xNwf(hWyV?H3&fdghop+rvlmnJ*r9d{-o{BnH}e
zcm=VSkLAsslj}5QOCDpii`X^o-DLR(I~yPDzo=r+8Y<aSf3Mov<6x1T&NYLxCw@O&
z^`S)_(YCsG_3(+`d8T|Dz{^SM8Z4VTZoa$WDF)davF9nQ(fF$B`sU0$)%^)P+iidF
zOkWQwRFiUJW3qLWkNy7lGeh|JrK-E$e-3Y*uKar4^LZa7ZN5}(G1N)B`sV4M7lrx%
zKZ$)jaKGucWQB6ziywdgH8@#|-2Y>7v2NZE36c3<WHzk(yCr)0<EOv;6c0^Tee$kU
z(WUm1iS+Zi(|a<T)&Y-weFHpdsN}AKrsm8~Me2FmOS8-%Ew0xQi==@E0Rfj(ctoMh
z{2Vq=ez#o2@u~Jw504C&&1t@cJG0gsf2izVzU=P4ziakoI+nKBv4Kv90Bx4AUbE}2
z<88KMN<lF-wfXn<SeEVXJ#`9n;6-Prr{HVwY*zJ|2)9?ePd{A(Y)j4n9ts|63Ow|}
zNz=7->+B^<mTWLA*=>8TYEr-{&;fN_U0T3K-Lw33;7*DIy)FkIKL>3W?0WL##%E>V
z{)5}+D~>6I@%W;)(FAMvI2|{&wCvnu)cz-AwZ&u8BX?heawu?(-J&Vq<?lUlj=auU
zHJ`uM_?pSt`7$m4?1~B^5AIi$*)>1^_krA3QR!zto4)P4Vt)Vg#8ds(o*l?t{I|Y>
zX?<n*d!P5FOQO!~N<Ip#_V)d9{`sm)q}$^!cW(Nch$F`KS>67*e|yq-lx)}itWs|P
ztpVcx|LayKa69yE;gxHjKYCxo?P&#Sq;M!c`m^E6jzVSN0TQqLkIeN;Z^?E89b4xD
zTFei;7rAm-W>9G8+r38)@<d091Mi0bZGE^B{b=RuT`a&EQl<ErkR>9p1-r}roMX<z
zw;`&+grTFx9l^^N?&E`9T72;VnlyY?3N#3hJP!s_2OpAV`|+QdVUz9E+o@+nwle^M
Mr>mdKI;Vst0E*AI)Bpeg


From 61a9f9d37a566d5e03e8e218bbc94f7d7631117b Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 27 Aug 2023 01:49:42 +0000
Subject: [PATCH 1107/1147] v115.1 (#1703)

The .1 refers to arkenfox, and has nothing to do with Firefox's versioning. This will better align ESR115 users' defaults with AF moving forward
---
 user.js | 81 +++++++++++++++++++++++++--------------------------------
 1 file changed, 35 insertions(+), 46 deletions(-)

diff --git a/user.js b/user.js
index 5ed7c08..ebb40a6 100644
--- a/user.js
+++ b/user.js
@@ -1,6 +1,6 @@
 /******
 *    name: arkenfox user.js
-*    date: 26 July 2023
+*    date: 27 August 2023
 * version: 115
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
@@ -18,7 +18,6 @@
        * Some site breakage and unintended consequences will happen. Everyone's experience will differ
          e.g. some user data is erased on exit (section 2800), change this to suit your needs
        * While not 100% definitive, search for "[SETUP" tags
-         e.g. third party images/videos not loading on some sites? check 1601
   5. Some tag info
        [SETUP-SECURITY] it's one item, read it
             [SETUP-WEB] can cause some websites to break
@@ -42,13 +41,13 @@
   0300: QUIETER FOX
   0400: SAFE BROWSING
   0600: BLOCK IMPLICIT OUTBOUND
-  0700: DNS / DoH / PROXY / SOCKS / IPv6
+  0700: DNS / DoH / PROXY / SOCKS
   0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
   0900: PASSWORDS
   1000: DISK AVOIDANCE
   1200: HTTPS (SSL/TLS / OCSP / CERTS / HPKP)
   1400: FONTS
-  1600: HEADERS / REFERERS
+  1600: REFERERS
   1700: CONTAINERS
   2000: PLUGINS / MEDIA / WEBRTC
   2400: DOM (DOCUMENT OBJECT MODEL)
@@ -255,20 +254,8 @@ user_pref("browser.places.speculativeConnect.enabled", false);
  * [1] https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ***/
    // user_pref("browser.send_pings", false); // [DEFAULT: false]
 
-/*** [SECTION 0700]: DNS / DoH / PROXY / SOCKS / IPv6 ***/
+/*** [SECTION 0700]: DNS / DoH / PROXY / SOCKS ***/
 user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
-/* 0701: disable IPv6
- * IPv6 can be abused, especially with MAC addresses, and can leak with VPNs: assuming
- * your ISP and/or router and/or website is IPv6 capable. Most sites will fall back to IPv4
- * [SETUP-WEB] PR_CONNECT_RESET_ERROR: this pref *might* be the cause
- * [STATS] Firefox telemetry (Feb 2023) shows ~9% of successful connections are IPv6
- * [NOTE] This is an application level fallback. Disabling IPv6 is best done at an
- * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
- * then this won't make much difference. If you are masking your IP, then it can only help.
- * [NOTE] PHP defaults to IPv6 with "localhost". Use "php -S 127.0.0.1:PORT"
- * [TEST] https://ipleak.org/
- * [1] https://www.internetsociety.org/tag/ipv6-security/ (Myths 2,4,5,6) ***/
-user_pref("network.dns.disableIPv6", true);
 /* 0702: set the proxy server to do any DNS lookups when using SOCKS
  * e.g. in Tor, this stops your local DNS server from knowing your Tor destination
  * as a remote Tor node will handle the DNS request
@@ -308,13 +295,6 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
 
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS ***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
-/* 0801: disable location bar using search
- * Don't leak URL typos to a search engine, give an error message instead
- * Examples: "secretplace,com", "secretplace/com", "secretplace com", "secret place.com"
- * [NOTE] This does not affect explicit user action such as using search buttons in the
- * dropdown, or using keyword search shortcuts you configure in options (e.g. "d" for DuckDuckGo)
- * [SETUP-CHROME] Override this if you trust and use a privacy respecting search engine ***/
-user_pref("keyword.enabled", false);
 /* 0802: disable location bar domain guessing
  * domain guessing intercepts DNS "hostname not found errors" and resends a
  * request (e.g. by adding www or .com). This is inconsistent use (e.g. FQDNs), does not work
@@ -527,18 +507,13 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
    // user_pref("layout.css.font-visibility.standard", 1);
    // user_pref("layout.css.font-visibility.trackingprotection", 1);
 
-/*** [SECTION 1600]: HEADERS / REFERERS
+/*** [SECTION 1600]: REFERERS
                   full URI: https://example.com:8888/foo/bar.html?id=1234
      scheme+host+port+path: https://example.com:8888/foo/bar.html
           scheme+host+port: https://example.com:8888
    [1] https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
 ***/
 user_pref("_user.js.parrot", "1600 syntax error: the parrot rests in peace!");
-/* 1601: control when to send a cross-origin referer
- * 0=always (default), 1=only if base domains match, 2=only if hosts match
- * [SETUP-WEB] Breakage: older modems/routers and some sites e.g banks, vimeo, icloud, instagram
- * If "2" is too strict, then override to "0" and use Smart Referer extension (Strict mode + add exceptions) ***/
-user_pref("network.http.referer.XOriginPolicy", 2);
 /* 1602: control the amount of cross-origin information to send [FF52+]
  * 0=send full URI (default), 1=scheme+host+port+path, 2=scheme+host+port ***/
 user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
@@ -571,17 +546,6 @@ user_pref("media.peerconnection.ice.default_address_only", true);
 /* 2020: disable GMP (Gecko Media Plugins)
  * [1] https://wiki.mozilla.org/GeckoMediaPlugins ***/
    // user_pref("media.gmp-provider.enabled", false);
-/* 2021: disable widevine CDM (Content Decryption Module)
- * [NOTE] This is covered by the EME master switch (2022) ***/
-   // user_pref("media.gmp-widevinecdm.enabled", false);
-/* 2022: disable all DRM content (EME: Encryption Media Extension)
- * Optionally hide the setting which also disables the DRM prompt
- * [SETUP-WEB] e.g. Netflix, Amazon Prime, Hulu, HBO, Disney+, Showtime, Starz, DirectTV
- * [SETTING] General>DRM Content>Play DRM-controlled content
- * [TEST] https://bitmovin.com/demos/drm
- * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
-user_pref("media.eme.enabled", false);
-   // user_pref("browser.eme.ui.enabled", false);
 
 /*** [SECTION 2400]: DOM (DOCUMENT OBJECT MODEL) ***/
 user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");
@@ -631,8 +595,6 @@ user_pref("network.IDN_show_punycode", true);
  * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=pdf.js+firefox ***/
 user_pref("pdfjs.disabled", false); // [DEFAULT: false]
 user_pref("pdfjs.enableScripting", false); // [FF86+]
-/* 2621: disable links launching Windows Store on Windows 8/8.1/10 [WINDOWS] ***/
-user_pref("network.protocol-handler.external.ms-windows-store", false);
 /* 2623: disable permissions delegation [FF73+]
  * Currently applies to cross-origin geolocation, camera, mic and screen-sharing
  * permissions, and fullscreen requests. Disabling delegation means any prompts
@@ -933,8 +895,8 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
 /* 5015: disable Windows taskbar preview [WINDOWS] ***/
    // user_pref("browser.taskbar.previews.enable", false); // [DEFAULT: false]
 /* 5016: discourage downloading to desktop
- * 0=desktop, 1=downloads (default), 2=last used
- * [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
+ * 0=desktop, 1=downloads (default), 2=custom
+ * [SETTING] To set your custom default "downloads": General>Downloads>Save files to ***/
    // user_pref("browser.download.folderList", 2);
 /* 5017: disable Form Autofill
  * If .supportedCountries includes your region (browser.search.region) and .supported
@@ -949,6 +911,12 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
    // user_pref("browser.pagethumbnails.capturing_disabled", true); // [HIDDEN PREF]
 /* 5020: disable Windows native notifications and use app notications instead [FF111+] [WINDOWS] ***/
    // user_pref("alerts.useSystemBackend.windows.notificationserver.enabled", false);
+/* 5021: disable location bar using search
+ * Don't leak URL typos to a search engine, give an error message instead
+ * Examples: "secretplace,com", "secretplace/com", "secretplace com", "secret place.com"
+ * [NOTE] This does not affect explicit user action such as using search buttons in the
+ * dropdown, or using keyword search shortcuts you configure in options (e.g. "d" for DuckDuckGo) ***/
+   // user_pref("keyword.enabled", false);
 
 /*** [SECTION 5500]: OPTIONAL HARDENING
    Not recommended. Overriding these can cause breakage and performance issues,
@@ -989,6 +957,25 @@ user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
    // user_pref("javascript.options.wasm", false);
 /* 5507: disable rendering of SVG OpenType fonts ***/
    // user_pref("gfx.font_rendering.opentype_svg.enabled", false);
+/* 5508: disable all DRM content (EME: Encryption Media Extension)
+ * Optionally hide the UI setting which also disables the DRM prompt
+ * [SETTING] General>DRM Content>Play DRM-controlled content
+ * [TEST] https://bitmovin.com/demos/drm
+ * [1] https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-we-just-lost-web-what-we-learned-it-and-what-we-need-do-next ***/
+   // user_pref("media.eme.enabled", false);
+   // user_pref("browser.eme.ui.enabled", false);
+/* 5509: disable IPv6 if using a VPN
+ * This is an application level fallback. Disabling IPv6 is best done at an OS/network
+ * level, and/or configured properly in system wide VPN setups.
+ * If you see PR_CONNECT_RESET_ERROR, this pref *might* be the cause
+ * [NOTE] PHP defaults to IPv6 with "localhost". Use "php -S 127.0.0.1:PORT"
+ * [TEST] https://ipleak.org/
+ * [1] https://www.internetsociety.org/tag/ipv6-security/ (Myths 2,4,5,6) ***/
+   // user_pref("network.dns.disableIPv6", true);
+/* 5510: control when to send a cross-origin referer
+ * 0=always (default), 1=only if base domains match, 2=only if hosts match
+ * [NOTE] Will cause breakage: older modems/routers and some sites e.g banks, vimeo, icloud, instagram ***/
+   // user_pref("network.http.referer.XOriginPolicy", 2);
 
 /*** [SECTION 6000]: DON'T TOUCH ***/
 user_pref("_user.js.parrot", "6000 syntax error: the parrot's 'istory!");
@@ -1037,6 +1024,8 @@ user_pref("extensions.quarantinedDomains.enabled", true); // [DEFAULT: true]
    // user_pref("extensions.formautofill.creditCards.available", "");
    // user_pref("extensions.formautofill.creditCards.supported", "");
    // user_pref("middlemouse.contentLoadURL", "");
+/* 6051: prefsCleaner: reset previously active items removed from arkenfox FF115+ ***/
+   // user_pref("network.protocol-handler.external.ms-windows-store", "");
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");
@@ -1082,7 +1071,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("dom.securecontext.allowlist_onions", true); // [FF97+] 1382359/1744006
    // user_pref("network.http.referer.hideOnionSource", true); // 1305144
 /* 7007: referers
- * [WHY] Only cross-origin referers (1600s) need control ***/
+ * [WHY] Only cross-origin referers (1602, 5510) matter ***/
    // user_pref("network.http.sendRefererHeader", 2);
    // user_pref("network.http.referer.trimmingPolicy", 0);
 /* 7008: set the default Referrer Policy [FF59+]

From ba173d49205ee927ed62e81e606569d98f531d38 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 28 Aug 2023 04:15:07 +0000
Subject: [PATCH 1108/1147] layout.css.font-visibility.resistFingerprinting

---
 scratchpad-scripts/arkenfox-cleanup.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 87556da..d3d8a98 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 26-August-2023
+  Last updated: 28-August-2023
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -32,6 +32,8 @@
 
   const aPREFS = [
     /* DEPRECATED */
+    /* 116+ */
+    'layout.css.font-visibility.resistFingerprinting', // 116
     /* 103-115 */
     'browser.cache.offline.enable', // 115
     'extensions.formautofill.heuristics.enabled', // 114

From dfd5589c3dae1723b8239ad9c46e114c2f851ed2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 16 Sep 2023 07:08:33 +0000
Subject: [PATCH 1109/1147] v117 deprecated

---
 scratchpad-scripts/arkenfox-cleanup.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index d3d8a98..652709e 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 28-August-2023
+  Last updated: 16-September-2023
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -33,7 +33,9 @@
   const aPREFS = [
     /* DEPRECATED */
     /* 116+ */
+    'dom.webnotifications.serviceworker.enabled', // 117
     'layout.css.font-visibility.resistFingerprinting', // 116
+    'security.family_safety.mode', // 117
     /* 103-115 */
     'browser.cache.offline.enable', // 115
     'extensions.formautofill.heuristics.enabled', // 114

From 1e6e211a061b592a176087fe9f6843249852cad2 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 17 Sep 2023 07:17:40 +0000
Subject: [PATCH 1110/1147] v117 (#1710)

---
 user.js | 65 ++++++++++++++++++++++++++++++++++++++++-----------------
 1 file changed, 46 insertions(+), 19 deletions(-)

diff --git a/user.js b/user.js
index ebb40a6..5e54f30 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 27 August 2023
-* version: 115
+*    date: 17 September 2023
+* version: 117
 *     url: https://github.com/arkenfox/user.js
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
@@ -33,6 +33,8 @@
     - If you are not using arkenfox v102-1... (not a definitive list)
       - 2815: clearOnShutdown cookies + offlineApps should be false
       - 9999: switch the appropriate deprecated section(s) back on
+  * ESR115
+    - use https://github.com/arkenfox/user.js/releases/tag/115.1
 
 * INDEX:
 
@@ -283,15 +285,23 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
  * [SETUP-CHROME] If you use a proxy and you understand the security impact
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1732792,1733994,1733481 ***/
    // user_pref("network.proxy.allow_bypass", false);
-/* 0710: disable DNS-over-HTTPS (DoH) rollout [FF60+]
- * 0=default, 2=increased (TRR (Trusted Recursive Resolver) first), 3=max (TRR only), 5=off
+/* 0710: enable DNS-over-HTTPS (DoH) [FF60+]
+ * 0=default, 2=increased (TRR (Trusted Recursive Resolver) first), 3=max (TRR only), 5=off (no rollout)
  * see "doh-rollout.home-region": USA 2019, Canada 2021, Russia/Ukraine 2022 [3]
  * [SETTING] Privacy & Security>DNS over HTTPS
  * [1] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/
  * [2] https://wiki.mozilla.org/Security/DOH-resolver-policy
  * [3] https://support.mozilla.org/en-US/kb/firefox-dns-over-https
  * [4] https://www.eff.org/deeplinks/2020/12/dns-doh-and-odoh-oh-my-year-review-2020 ***/
-   // user_pref("network.trr.mode", 5);
+   // user_pref("network.trr.mode", 3);
+/* 0711: disable skipping DoH when parental controls are enabled [FF70+] ***/
+user_pref("network.dns.skipTRR-when-parental-control-enabled", false);
+/* 0712: set DoH provider
+ * The custom uri is the value shown when you "Choose provider>Custom>"
+ * [NOTE] If you USE custom then "network.trr.uri" should be set the same
+ * [SETTING] Privacy & Security>DNS over HTTPS>Increased/Max>Choose provider ***/
+   // user_pref("network.trr.uri", "https://example.dns");
+   // user_pref("network.trr.custom_uri", "https://example.dns");
 
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS ***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
@@ -443,12 +453,6 @@ user_pref("security.OCSP.enabled", 1); // [DEFAULT: 1]
 user_pref("security.OCSP.require", true);
 
 /** CERTS / HPKP (HTTP Public Key Pinning) ***/
-/* 1221: disable Windows 8.1's Microsoft Family Safety cert [FF50+] [WINDOWS]
- * 0=disable detecting Family Safety mode and importing the root
- * 1=only attempt to detect Family Safety mode (don't import the root)
- * 2=detect Family Safety mode and import the root
- * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21686 ***/
-user_pref("security.family_safety.mode", 0);
 /* 1223: enable strict PKP (Public Key Pinning)
  * 0=disabled, 1=allow user MiTM (default; such as your antivirus), 2=strict
  * [SETUP-WEB] MOZILLA_PKIX_ERROR_KEY_PINNING_FAILURE ***/
@@ -499,7 +503,7 @@ user_pref("browser.xul.error_pages.expert_bad_cert", true);
 user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 /* 1402: limit font visibility (Windows, Mac, some Linux) [FF94+]
  * Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1], bundled fonts are auto-allowed
- * In normal windows: uses the first applicable: RFP (4506) over TP over Standard
+ * In normal windows: uses the first applicable: RFP over TP over Standard
  * In Private Browsing windows: uses the most restrictive between normal and private
  * 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
  * [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc ***/
@@ -769,7 +773,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable privacy.resistFingerprinting
- * [SETUP-WEB] RFP can cause some website breakage: mainly canvas, use a site exception via the urlbar
+ * [SETUP-WEB] RFP can cause some website breakage: mainly canvas, use a canvas site exception via the urlbar
  * RFP also has a few side effects: mainly timezone is UTC0, and websites will prefer light theme
  * [NOTE] pbmode applies if true and the original pref is false
  * [1] https://bugzilla.mozilla.org/418986 ***/
@@ -799,8 +803,6 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
  * [WARNING] DO NOT USE unless testing, see [1] comment 12
  * [1] https://bugzilla.mozilla.org/1635603 ***/
    // user_pref("privacy.resistFingerprinting.exemptedDomains", "*.example.invalid");
-/* 4506: set RFP's font visibility level (1402) [FF94+] ***/
-   // user_pref("layout.css.font-visibility.resistFingerprinting", 1); // [DEFAULT: 1]
 /* 4510: disable using system colors
  * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
 user_pref("browser.display.use_system_colors", false); // [DEFAULT: false NON-WINDOWS]
@@ -967,7 +969,7 @@ user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
 /* 5509: disable IPv6 if using a VPN
  * This is an application level fallback. Disabling IPv6 is best done at an OS/network
  * level, and/or configured properly in system wide VPN setups.
- * If you see PR_CONNECT_RESET_ERROR, this pref *might* be the cause
+ * [SETUP-WEB] PR_CONNECT_RESET_ERROR
  * [NOTE] PHP defaults to IPv6 with "localhost". Use "php -S 127.0.0.1:PORT"
  * [TEST] https://ipleak.org/
  * [1] https://www.internetsociety.org/tag/ipv6-security/ (Myths 2,4,5,6) ***/
@@ -976,6 +978,11 @@ user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
  * 0=always (default), 1=only if base domains match, 2=only if hosts match
  * [NOTE] Will cause breakage: older modems/routers and some sites e.g banks, vimeo, icloud, instagram ***/
    // user_pref("network.http.referer.XOriginPolicy", 2);
+/* 5511: set DoH bootstrap address [FF89+]
+ * Firefox uses the system DNS to initially resolve the IP address of your DoH server.
+ * When set to a valid, working value that matches your "network.trr.uri" (0712) Firefox
+ * won't use the system DNS. If the IP doesn't match then DoH won't work ***/
+   // user_pref("network.trr.bootstrapAddr", "10.0.0.1") // [HIDDEN PREF]
 
 /*** [SECTION 6000]: DON'T TOUCH ***/
 user_pref("_user.js.parrot", "6000 syntax error: the parrot's 'istory!");
@@ -1116,11 +1123,10 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
 /* 7017: disable service workers
  * [WHY] Already isolated with TCP (2701) behind a pref (2710) ***/
    // user_pref("dom.serviceWorkers.enabled", false);
-/* 7018: disable Web Notifications
+/* 7018: disable Web Notifications [FF22+]
  * [WHY] Web Notifications are behind a prompt (7002)
  * [1] https://blog.mozilla.org/en/products/firefox/block-notification-requests/ ***/
-   // user_pref("dom.webnotifications.enabled", false); // [FF22+]
-   // user_pref("dom.webnotifications.serviceworker.enabled", false); // [FF44+]
+   // user_pref("dom.webnotifications.enabled", false);
 /* 7019: disable Push Notifications [FF44+]
  * [WHY] Push requires subscription
  * [NOTE] To remove all subscriptions, reset "dom.push.userAgentID"
@@ -1212,5 +1218,26 @@ user_pref("network.cookie.lifetimePolicy", 2);
    // user_pref("browser.cache.offline.enable", false);
 // ***/
 
+/* ESR115.x still uses all the following prefs
+// [NOTE] replace the * with a slash in the line above to re-enable active ones
+// FF116
+// 4506: set RFP's font visibility level (1402) [FF94+]
+   // [-] https://bugzilla.mozilla.org/1838415
+   // user_pref("layout.css.font-visibility.resistFingerprinting", 1); // [DEFAULT: 1]
+// FF117
+// 1221: disable Windows Microsoft Family Safety cert [FF50+] [WINDOWS]
+   // 0=disable detecting Family Safety mode and importing the root
+   // 1=only attempt to detect Family Safety mode (don't import the root)
+   // 2=detect Family Safety mode and import the root
+   // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21686
+   // [-] https://bugzilla.mozilla.org/1844908
+user_pref("security.family_safety.mode", 0);
+// 7018: disable service worker Web Notifications [FF44+]
+   // [WHY] Web Notifications are behind a prompt (7002)
+   // [1] https://blog.mozilla.org/en/products/firefox/block-notification-requests/
+   // [-] https://bugzilla.mozilla.org/1842457
+   // user_pref("dom.webnotifications.serviceworker.enabled", false);
+// ***/
+
 /* END: internal custom pref to test for syntax errors ***/
 user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");

From 3f6fcc13f0b8dcdcadf75edc55c62bb7148ab876 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 18 Sep 2023 08:31:22 +0000
Subject: [PATCH 1111/1147] permissions.delegation.enabled

---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 652709e..998974c 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 16-September-2023
+  Last updated: 18-September-2023
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -35,6 +35,7 @@
     /* 116+ */
     'dom.webnotifications.serviceworker.enabled', // 117
     'layout.css.font-visibility.resistFingerprinting', // 116
+    'permissions.delegation.enabled', // 118
     'security.family_safety.mode', // 117
     /* 103-115 */
     'browser.cache.offline.enable', // 115

From 50af4b9af4295375207eac05b2b89e05830fbd9f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 18 Sep 2023 08:34:35 +0000
Subject: [PATCH 1112/1147] remove old prefs

---
 scratchpad-scripts/arkenfox-cleanup.js | 407 +------------------------
 1 file changed, 1 insertion(+), 406 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 998974c..2878031 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -1,5 +1,5 @@
 /***
-  This will reset the preferences that have been
+  This will reset the preferences that since FF91 have been
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
@@ -57,193 +57,6 @@
     'security.csp.enable', // 99
     'security.password_lifetime', // 102
     'security.ssl3.rsa_des_ede3_sha', // 93
-    /* 79-91 */
-    'browser.cache.offline.storage.enable',
-    'browser.download.hide_plugins_without_extensions',
-    'browser.library.activity-stream.enabled',
-    'browser.search.geoSpecificDefaults',
-    'browser.search.geoSpecificDefaults.url',
-    'dom.ipc.plugins.flash.subprocess.crashreporter.enabled',
-    'dom.ipc.plugins.reportCrashURL',
-    'dom.w3c_pointer_events.enabled',
-    'intl.charset.fallback.override',
-    'network.ftp.enabled',
-    'plugin.state.flash',
-    'security.mixed_content.block_object_subrequest',
-    'security.ssl.errorReporting.automatic',
-    'security.ssl.errorReporting.enabled',
-    'security.ssl.errorReporting.url',
-    /* 69-78 */
-    'browser.newtabpage.activity-stream.telemetry.ping.endpoint',
-    'browser.tabs.remote.allowLinkedWebInFileUriProcess',
-    'browser.urlbar.oneOffSearches',
-    'devtools.webide.autoinstallADBExtension',
-    'devtools.webide.enabled',
-    'dom.indexedDB.enabled',
-    'extensions.blocklist.url',
-    'geo.wifi.logging.enabled',
-    'geo.wifi.uri',
-    'gfx.downloadable_fonts.woff2.enabled',
-    'media.autoplay.allow-muted',
-    'media.autoplay.enabled.user-gestures-needed',
-    'offline-apps.allow_by_default',
-    'plugins.click_to_play',
-    'privacy.userContext.longPressBehavior',
-    'toolkit.cosmeticAnimations.enabled',
-    'toolkit.telemetry.hybridContent.enabled',
-    'webgl.disable-extensions',
-    /* 61-68 */
-    'app.update.enabled',
-    'browser.aboutHomeSnippets.updateUrl',
-    'browser.chrome.errorReporter.enabled',
-    'browser.chrome.errorReporter.submitUrl',
-    'browser.chrome.favicons',
-    'browser.ctrlTab.previews',
-    'browser.fixup.hide_user_pass',
-    'browser.newtabpage.activity-stream.asrouter.userprefs.cfr',
-    'browser.newtabpage.activity-stream.disableSnippets',
-    'browser.onboarding.enabled',
-    'browser.search.countryCode',
-    'browser.urlbar.autocomplete.enabled',
-    'devtools.webide.adbAddonURL',
-    'devtools.webide.autoinstallADBHelper',
-    'dom.event.highrestimestamp.enabled',
-    'experiments.activeExperiment',
-    'experiments.enabled',
-    'experiments.manifest.uri',
-    'experiments.supported',
-    'lightweightThemes.update.enabled',
-    'media.autoplay.enabled',
-    'network.allow-experiments',
-    'network.cookie.lifetime.days',
-    'network.jar.block-remote-files',
-    'network.jar.open-unsafe-types',
-    'plugin.state.java',
-    'security.csp.enable_violation_events',
-    'security.csp.experimentalEnabled',
-    'shield.savant.enabled',
-    /* 60 or earlier */
-    'browser.bookmarks.showRecentlyBookmarked',
-    'browser.casting.enabled',
-    'browser.crashReports.unsubmittedCheck.autoSubmit',
-    'browser.formautofill.enabled',
-    'browser.formfill.saveHttpsForms',
-    'browser.fullscreen.animate',
-    'browser.history.allowPopState',
-    'browser.history.allowPushState',
-    'browser.history.allowReplaceState',
-    'browser.newtabpage.activity-stream.enabled',
-    'browser.newtabpage.directory.ping',
-    'browser.newtabpage.directory.source',
-    'browser.newtabpage.enhanced',
-    'browser.newtabpage.introShown',
-    'browser.pocket.api',
-    'browser.pocket.enabled',
-    'browser.pocket.oAuthConsumerKey',
-    'browser.pocket.site',
-    'browser.polaris.enabled',
-    'browser.safebrowsing.appRepURL',
-    'browser.safebrowsing.enabled',
-    'browser.safebrowsing.gethashURL',
-    'browser.safebrowsing.malware.reportURL',
-    'browser.safebrowsing.provider.google.appRepURL',
-    'browser.safebrowsing.reportErrorURL',
-    'browser.safebrowsing.reportGenericURL',
-    'browser.safebrowsing.reportMalwareErrorURL',
-    'browser.safebrowsing.reportMalwareMistakeURL',
-    'browser.safebrowsing.reportMalwareURL',
-    'browser.safebrowsing.reportPhishMistakeURL',
-    'browser.safebrowsing.reportURL',
-    'browser.safebrowsing.updateURL',
-    'browser.search.showOneOffButtons',
-    'browser.selfsupport.enabled',
-    'browser.selfsupport.url',
-    'browser.sessionstore.privacy_level_deferred',
-    'browser.tabs.animate',
-    'browser.trackingprotection.gethashURL',
-    'browser.trackingprotection.updateURL',
-    'browser.urlbar.unifiedcomplete',
-    'browser.usedOnWindows10.introURL',
-    'camera.control.autofocus_moving_callback.enabled',
-    'camera.control.face_detection.enabled',
-    'datareporting.healthreport.about.reportUrl',
-    'datareporting.healthreport.about.reportUrlUnified',
-    'datareporting.healthreport.documentServerURI',
-    'datareporting.healthreport.service.enabled',
-    'datareporting.policy.dataSubmissionEnabled.v2',
-    'devtools.webide.autoinstallFxdtAdapters',
-    'dom.archivereader.enabled',
-    'dom.beforeAfterKeyboardEvent.enabled',
-    'dom.disable_image_src_set',
-    'dom.disable_window_open_feature.scrollbars',
-    'dom.disable_window_status_change',
-    'dom.enable_user_timing',
-    'dom.flyweb.enabled',
-    'dom.idle-observers-api.enabled',
-    'dom.keyboardevent.code.enabled',
-    'dom.network.enabled',
-    'dom.push.udp.wakeupEnabled',
-    'dom.telephony.enabled',
-    'dom.vr.oculus050.enabled',
-    'dom.workers.enabled',
-    'dom.workers.sharedWorkers.enabled',
-    'extensions.formautofill.experimental',
-    'extensions.screenshots.system-disabled',
-    'extensions.shield-recipe-client.api_url',
-    'extensions.shield-recipe-client.enabled',
-    'full-screen-api.approval-required',
-    'general.useragent.locale',
-    'geo.security.allowinsecure',
-    'intl.locale.matchOS',
-    'loop.enabled',
-    'loop.facebook.appId',
-    'loop.facebook.enabled',
-    'loop.facebook.fallbackUrl',
-    'loop.facebook.shareUrl',
-    'loop.feedback.formURL',
-    'loop.feedback.manualFormURL',
-    'loop.logDomains',
-    'loop.server',
-    'media.block-play-until-visible',
-    'media.eme.apiVisible',
-    'media.eme.chromium-api.enabled',
-    'media.getusermedia.screensharing.allow_on_old_platforms',
-    'media.getusermedia.screensharing.allowed_domains',
-    'media.gmp-eme-adobe.autoupdate',
-    'media.gmp-eme-adobe.enabled',
-    'media.gmp-eme-adobe.visible',
-    'network.http.referer.userControlPolicy',
-    'network.http.sendSecureXSiteReferrer',
-    'network.http.spdy.enabled.http2draft',
-    'network.http.spdy.enabled.v3-1',
-    'network.websocket.enabled',
-    'pageThumbs.enabled',
-    'pfs.datasource.url',
-    'plugin.scan.Acrobat',
-    'plugin.scan.Quicktime',
-    'plugin.scan.WindowsMediaPlayer',
-    'plugins.enumerable_names',
-    'plugins.update.notifyUser',
-    'plugins.update.url',
-    'privacy.clearOnShutdown.passwords',
-    'privacy.donottrackheader.value',
-    'security.mixed_content.send_hsts_priming',
-    'security.mixed_content.use_hsts',
-    'security.ssl3.ecdhe_ecdsa_rc4_128_sha',
-    'security.ssl3.ecdhe_rsa_rc4_128_sha',
-    'security.ssl3.rsa_rc4_128_md5',
-    'security.ssl3.rsa_rc4_128_sha',
-    'security.tls.insecure_fallback_hosts.use_static_list',
-    'security.tls.unrestricted_rc4_fallback',
-    'security.xpconnect.plugin.unrestricted',
-    'social.directories',
-    'social.enabled',
-    'social.remote-install.enabled',
-    'social.share.activationPanelEnabled',
-    'social.shareDirectory',
-    'social.toast-notifications.enabled',
-    'social.whitelist',
-    'toolkit.telemetry.unifiedIsOptIn',
 
     /* REMOVED */
     /* 116+ */
@@ -284,224 +97,6 @@
     'privacy.firstparty.isolate.use_site',
     'privacy.window.name.update.enabled',
     'security.insecure_connection_text.enabled',
-    /* 79-91 */
-    'alerts.showFavicons',
-    'browser.newtabpage.activity-stream.asrouter.providers.snippets',
-    'browser.send_pings.require_same_host',
-    'browser.urlbar.usepreloadedtopurls.enabled',
-    'dom.allow_cut_copy',
-    'dom.battery.enabled',
-    'dom.IntersectionObserver.enabled',
-    'dom.storage.enabled',
-    'dom.vibrator.enabled',
-    'extensions.screenshots.upload-disabled',
-    'general.warnOnAboutConfig',
-    'gfx.direct2d.disabled',
-    'layers.acceleration.disabled',
-    'media.getusermedia.audiocapture.enabled',
-    'media.getusermedia.browser.enabled',
-    'media.getusermedia.screensharing.enabled',
-    'media.gmp-widevinecdm.visible',
-    'media.media-capabilities.enabled',
-    'network.http.redirection-limit',
-    'privacy.partition.network_state',
-    'security.insecure_connection_icon.enabled',
-    'security.mixed_content.block_active_content',
-    'security.ssl.enable_ocsp_stapling',
-    'security.ssl3.dhe_rsa_aes_128_sha',
-    'security.ssl3.dhe_rsa_aes_256_sha',
-    'webgl.min_capability_mode',
-    /* 69-78 */
-    'browser.cache.disk_cache_ssl',
-    'browser.search.geoip.url',
-    'browser.search.region',
-    'browser.sessionhistory.max_entries',
-    'dom.push.connection.enabled',
-    'dom.push.serverURL',
-    'extensions.getAddons.discovery.api_url',
-    'extensions.htmlaboutaddons.discover.enabled',
-    'extensions.webservice.discoverURL',
-    'intl.locale.requested',
-    'intl.regional_prefs.use_os_locales',
-    'media.block-autoplay-until-in-foreground',
-    'middlemouse.paste',
-    'plugin.sessionPermissionNow.intervalInMinutes',
-    'privacy.usercontext.about_newtab_segregation.enabled',
-    'security.insecure_connection_icon.pbmode.enabled',
-    'security.insecure_connection_text.pbmode.enabled',
-    'webgl.dxgl.enabled',
-    /* 61-68 */
-    'app.update.service.enabled',
-    'app.update.silent',
-    'app.update.staging.enabled',
-    'browser.cache.disk.capacity',
-    'browser.cache.disk.smart_size.enabled',
-    'browser.cache.disk.smart_size.first_run',
-    'browser.cache.offline.insecure.enable',
-    'browser.contentblocking.enabled',
-    'browser.laterrun.enabled',
-    'browser.offline-apps.notify',
-    'browser.rights.3.shown',
-    'browser.safebrowsing.blockedURIs.enabled',
-    'browser.safebrowsing.downloads.remote.block_dangerous',
-    'browser.safebrowsing.downloads.remote.block_dangerous_host',
-    'browser.safebrowsing.provider.google.gethashURL',
-    'browser.safebrowsing.provider.google.reportMalwareMistakeURL',
-    'browser.safebrowsing.provider.google.reportPhishMistakeURL',
-    'browser.safebrowsing.provider.google.reportURL',
-    'browser.safebrowsing.provider.google.updateURL',
-    'browser.safebrowsing.provider.google4.dataSharing.enabled',
-    'browser.safebrowsing.provider.google4.dataSharingURL',
-    'browser.safebrowsing.provider.google4.gethashURL',
-    'browser.safebrowsing.provider.google4.reportMalwareMistakeURL',
-    'browser.safebrowsing.provider.google4.reportPhishMistakeURL',
-    'browser.safebrowsing.provider.google4.reportURL',
-    'browser.safebrowsing.provider.google4.updateURL',
-    'browser.safebrowsing.provider.mozilla.gethashURL',
-    'browser.safebrowsing.provider.mozilla.updateURL',
-    'browser.safebrowsing.reportPhishURL',
-    'browser.sessionhistory.max_total_viewers',
-    'browser.sessionstore.max_windows_undo',
-    'browser.slowStartup.maxSamples',
-    'browser.slowStartup.notificationDisabled',
-    'browser.slowStartup.samples',
-    'browser.storageManager.enabled',
-    'browser.urlbar.autoFill.typed',
-    'browser.urlbar.filter.javascript',
-    'browser.urlbar.maxHistoricalSearchSuggestions',
-    'browser.urlbar.userMadeSearchSuggestionsChoice',
-    'canvas.capturestream.enabled',
-    'dom.allow_scripts_to_close_windows',
-    'dom.disable_window_flip',
-    'dom.forms.datetime',
-    'dom.imagecapture.enabled',
-    'dom.popup_maximum',
-    'extensions.webextensions.keepStorageOnUninstall',
-    'extensions.webextensions.keepUuidOnUninstall',
-    'font.blacklist.underline_offset',
-    'font.name.monospace.x-unicode',
-    'font.name.monospace.x-western',
-    'font.name.sans-serif.x-unicode',
-    'font.name.sans-serif.x-western',
-    'font.name.serif.x-unicode',
-    'font.name.serif.x-western',
-    'gfx.offscreencanvas.enabled',
-    'javascript.options.shared_memory',
-    'layout.css.font-loading-api.enabled',
-    'media.gmp-gmpopenh264.autoupdate',
-    'media.gmp-gmpopenh264.enabled',
-    'media.gmp-manager.updateEnabled',
-    'media.gmp-manager.url',
-    'media.gmp-manager.url.override',
-    'media.gmp-widevinecdm.autoupdate',
-    'media.gmp.trial-create.enabled',
-    'media.navigator.video.enabled',
-    'media.peerconnection.ice.tcp',
-    'media.peerconnection.identity.enabled',
-    'media.peerconnection.identity.timeout',
-    'media.peerconnection.turn.disable',
-    'media.peerconnection.use_document_iceservers',
-    'media.peerconnection.video.enabled',
-    'network.auth.subresource-img-cross-origin-http-auth-allow',
-    'network.cookie.leave-secure-alone',
-    'network.cookie.same-site.enabled',
-    'network.dnsCacheEntries',
-    'network.dnsCacheExpiration',
-    'network.http.fast-fallback-to-IPv4',
-    'network.proxy.autoconfig_url.include_path',
-    'offline-apps.quota.warn',
-    'pdfjs.enableWebGL',
-    'plugin.default.state',
-    'plugin.defaultXpi.state',
-    'plugin.scan.plid.all',
-    'privacy.trackingprotection.annotate_channels',
-    'privacy.trackingprotection.lower_network_priority',
-    'privacy.trackingprotection.pbmode.enabled',
-    'privacy.trackingprotection.ui.enabled',
-    'security.data_uri.block_toplevel_data_uri_navigations',
-    'security.insecure_field_warning.contextual.enabled',
-    'security.insecure_password.ui.enabled',
-    'security.tls.version.fallback-limit',
-    'services.blocklist.addons.collection',
-    'services.blocklist.gfx.collection',
-    'services.blocklist.onecrl.collection',
-    'services.blocklist.plugins.collection',
-    'services.blocklist.signing.enforced',
-    'services.blocklist.update_enabled',
-    'signon.autofillForms.http',
-    'signon.storeWhenAutocompleteOff',
-    'toolkit.telemetry.cachedClientID',
-    'urlclassifier.trackingTable',
-    'xpinstall.whitelist.required',
-    /* 60 or lower */
-    'browser.migrate.automigrate.enabled',
-    'browser.search.geoip.timeout',
-    'browser.search.reset.enabled',
-    'browser.search.reset.whitelist',
-    'browser.stopReloadAnimation.enabled',
-    'browser.tabs.insertRelatedAfterCurrent',
-    'browser.tabs.loadDivertedInBackground',
-    'browser.tabs.loadInBackground',
-    'browser.tabs.selectOwnerOnClose',
-    'browser.urlbar.clickSelectsAll',
-    'browser.urlbar.doubleClickSelectsAll',
-    'device.storage.enabled',
-    'dom.keyboardevent.dispatch_during_composition',
-    'dom.presentation.controller.enabled',
-    'dom.presentation.discoverable',
-    'dom.presentation.discovery.enabled',
-    'dom.presentation.enabled',
-    'dom.presentation.receiver.enabled',
-    'dom.presentation.session_transport.data_channel.enable',
-    'dom.vr.oculus.enabled',
-    'dom.vr.openvr.enabled',
-    'dom.vr.osvr.enabled',
-    'extensions.pocket.api',
-    'extensions.pocket.oAuthConsumerKey',
-    'extensions.pocket.site',
-    'general.useragent.compatMode.firefox',
-    'geo.wifi.xhr.timeout',
-    'gfx.layerscope.enabled',
-    'media.flac.enabled',
-    'media.mediasource.enabled',
-    'media.mediasource.mp4.enabled',
-    'media.mediasource.webm.audio.enabled',
-    'media.mediasource.webm.enabled',
-    'media.mp4.enabled',
-    'media.ogg.enabled',
-    'media.ogg.flac.enabled',
-    'media.opus.enabled',
-    'media.raw.enabled',
-    'media.wave.enabled',
-    'media.webm.enabled',
-    'media.webspeech.recognition.enable',
-    'media.wmf.amd.vp9.enabled',
-    'media.wmf.enabled',
-    'media.wmf.vp9.enabled',
-    'network.dns.blockDotOnion',
-    'network.stricttransportsecurity.preloadlist',
-    'security.block_script_with_wrong_mime',
-    'security.fileuri.strict_origin_policy',
-    'security.sri.enable',
-    'services.sync.enabled',
-    'ui.submenuDelay',
-    'webextensions.storage.sync.enabled',
-    'webextensions.storage.sync.serverURL',
-    //  excluding these e10 settings
-       // 'browser.tabs.remote.autostart',
-       // 'browser.tabs.remote.autostart.2',
-       // 'browser.tabs.remote.force-enable',
-       // 'browser.tabs.remote.separateFileUriProcess',
-       // 'extensions.e10sBlocksEnabling',
-       // 'extensions.webextensions.remote',
-       // 'dom.ipc.processCount',
-       // 'dom.ipc.shims.enabledWarnings',
-       // 'dom.ipc.processCount.extension',
-       // 'dom.ipc.processCount.file',
-       // 'security.sandbox.content.level',
-       // 'dom.ipc.plugins.sandbox-level.default',
-       // 'dom.ipc.plugins.sandbox-level.flash',
-       // 'security.sandbox.logging.enabled',
 
     /* IMPORTANT: last active pref must not have a trailing comma */ 
     /* reset parrot: check your open about:config after running the script */

From 336300a274a7721616d7e8109facca984b05f727 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 18 Sep 2023 08:39:50 +0000
Subject: [PATCH 1113/1147] v118 removed

these are all at default now as of at least ESR115
---
 scratchpad-scripts/arkenfox-cleanup.js | 9 +++++++--
 1 file changed, 7 insertions(+), 2 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 2878031..e06b998 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -32,7 +32,7 @@
 
   const aPREFS = [
     /* DEPRECATED */
-    /* 116+ */
+    /* 116-128 */
     'dom.webnotifications.serviceworker.enabled', // 117
     'layout.css.font-visibility.resistFingerprinting', // 116
     'permissions.delegation.enabled', // 118
@@ -59,9 +59,14 @@
     'security.ssl3.rsa_des_ede3_sha', // 93
 
     /* REMOVED */
-    /* 116+ */
+    /* 116-128 */
+    'browser.fixup.alternate.enabled',
+    'browser.urlbar.dnsResolveSingleWordsAfterSearch',
     'media.gmp-widevinecdm.enabled',
     'network.protocol-handler.external.ms-windows-store',
+    'privacy.partition.always_partition_third_party_non_cookie_storage',
+    'privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage',
+    'privacy.partition.serviceWorkers',
     /* 103-115 */
     'beacon.enabled',
     'browser.startup.blankWindow',

From f0513b7e64160c80f6e2430a5f3155ee855abdcf Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 18 Sep 2023 11:41:47 +0000
Subject: [PATCH 1114/1147] inactive prefs no longer needed

encryption prefs false since FF109, taskbar since jesus or whatever
---
 scratchpad-scripts/arkenfox-cleanup.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index e06b998..fea7a68 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -61,12 +61,15 @@
     /* REMOVED */
     /* 116-128 */
     'browser.fixup.alternate.enabled',
+    'browser.taskbar.previews.enable',
     'browser.urlbar.dnsResolveSingleWordsAfterSearch',
     'media.gmp-widevinecdm.enabled',
     'network.protocol-handler.external.ms-windows-store',
     'privacy.partition.always_partition_third_party_non_cookie_storage',
     'privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage',
     'privacy.partition.serviceWorkers',
+    'security.ssl3.ecdhe_ecdsa_aes_128_sha',
+    'security.ssl3.ecdhe_ecdsa_aes_256_sha',
     /* 103-115 */
     'beacon.enabled',
     'browser.startup.blankWindow',

From bd2e5b8d1d477951d929ea7d79ceb7a13fc322a4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 18 Sep 2023 11:47:49 +0000
Subject: [PATCH 1115/1147] undo encryption

they're not default false since 108, that was nightly only
---
 scratchpad-scripts/arkenfox-cleanup.js | 2 --
 1 file changed, 2 deletions(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index fea7a68..d8ddf31 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -68,8 +68,6 @@
     'privacy.partition.always_partition_third_party_non_cookie_storage',
     'privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage',
     'privacy.partition.serviceWorkers',
-    'security.ssl3.ecdhe_ecdsa_aes_128_sha',
-    'security.ssl3.ecdhe_ecdsa_aes_256_sha',
     /* 103-115 */
     'beacon.enabled',
     'browser.startup.blankWindow',

From 56f51203bf4fea8aa778b792269205d275a62665 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 21 Sep 2023 12:36:35 +0000
Subject: [PATCH 1116/1147] point to archived version

---
 scratchpad-scripts/arkenfox-cleanup.js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index d8ddf31..e2487fc 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,10 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  Last updated: 18-September-2023
+  There is an archived version at https://github.com/arkenfox/user.js/issues/1080
+  if you want the full list prior to FF118
+
+  Last updated: 22-September-2023
 
   Instructions:
   - [optional] close Firefox and backup your profile

From 6e79d1bba6a932480a938bec5c2cee0388e586b9 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 29 Sep 2023 10:52:55 +0000
Subject: [PATCH 1117/1147] deprecated v118

---
 scratchpad-scripts/arkenfox-cleanup.js | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index e2487fc..6f783a4 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -6,7 +6,7 @@
   There is an archived version at https://github.com/arkenfox/user.js/issues/1080
   if you want the full list prior to FF118
 
-  Last updated: 22-September-2023
+  Last updated: 29-September-2023
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -37,7 +37,10 @@
     /* DEPRECATED */
     /* 116-128 */
     'dom.webnotifications.serviceworker.enabled', // 117
+    'layout.css.font-visibility.private', // 118
     'layout.css.font-visibility.resistFingerprinting', // 116
+    'layout.css.font-visibility.standard', // 118
+    'layout.css.font-visibility.trackingprotection', // 118
     'permissions.delegation.enabled', // 118
     'security.family_safety.mode', // 117
     /* 103-115 */

From f54d632da585a08185c6164017d79315c331181f Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Sat, 7 Oct 2023 10:33:49 +0000
Subject: [PATCH 1118/1147] v2.0 - improve root check

---
 prefsCleaner.sh | 25 ++++++++++++-------------
 1 file changed, 12 insertions(+), 13 deletions(-)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index f36732c..6586609 100755
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -2,23 +2,12 @@
 
 ## prefs.js cleaner for Linux/Mac
 ## author: @claustromaniac
-## version: 1.9
+## version: 2.0
 
 ## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
 
 ## DON'T GO HIGHER THAN VERSION x.9 !! ( because of ASCII comparison in update_prefsCleaner() )
 
-# Check if running as root and if any files have the owner/group as root/wheel.
-if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
-	printf "You shouldn't run this with elevated privileges (such as with doas/sudo).\n"
-	exit 1
-elif [ -n "$(find ./ -user 0 -o -group 0)" ]; then
-	printf 'It looks like this script was previously run with elevated privileges,
-you will need to change ownership of the following files to your user:\n'
-	find . -user 0 -o -group 0
-	exit 1
-fi
-
 readonly CURRDIR=$(pwd)
 
 ## get the full path of this script (readlink for Linux, greadlink for Mac with coreutils installed)
@@ -143,13 +132,23 @@ done
 ## change directory to the Firefox profile directory
 cd "$(dirname "${SCRIPT_FILE}")"
 
+# Check if running as root and if any files have the owner/group as root/wheel.
+if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
+	fQuit 1 "You shouldn't run this with elevated privileges (such as with doas/sudo)."
+elif [ -n "$(find ./ -user 0 -o -group 0)" ]; then
+	printf 'It looks like this script was previously run with elevated privileges,
+you will need to change ownership of the following files to your user:\n'
+	find . -user 0 -o -group 0
+	fQuit 1
+fi
+
 [ "$AUTOUPDATE" = true ] && update_prefsCleaner "$@"
 
 echo -e "\n\n"
 echo "                   ╔══════════════════════════╗"
 echo "                   ║     prefs.js cleaner     ║"
 echo "                   ║    by claustromaniac     ║"
-echo "                   ║           v1.9           ║"
+echo "                   ║           v2.0           ║"
 echo "                   ╚══════════════════════════╝"
 echo -e "\nThis script should be run from your Firefox profile directory.\n"
 echo "It will remove any entries from prefs.js that also exist in user.js."

From 3fdcb28b8f1992b66e43582810488413b39ebdb3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 18 Oct 2023 14:03:40 +0000
Subject: [PATCH 1119/1147] v118 (#1724)

---
 user.js | 212 ++++++++++++++++++++++++--------------------------------
 1 file changed, 92 insertions(+), 120 deletions(-)

diff --git a/user.js b/user.js
index 5e54f30..4798b8a 100644
--- a/user.js
+++ b/user.js
@@ -1,8 +1,9 @@
 /******
 *    name: arkenfox user.js
-*    date: 17 September 2023
-* version: 117
-*     url: https://github.com/arkenfox/user.js
+*    date: 18 October 2023
+* version: 118
+*    urls: https://github.com/arkenfox/user.js [repo]
+*        : https://arkenfox.github.io/gui/ [interactive]
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
 
 * README:
@@ -26,15 +27,15 @@
 
 * RELEASES: https://github.com/arkenfox/user.js/releases
 
-  * It is best to use the arkenfox release that is optimized for and matches your Firefox version
-  * EVERYONE: each release
-    - run prefsCleaner to reset prefs made inactive, including deprecated (9999s)
-    ESR102
-    - If you are not using arkenfox v102-1... (not a definitive list)
-      - 2815: clearOnShutdown cookies + offlineApps should be false
-      - 9999: switch the appropriate deprecated section(s) back on
-  * ESR115
-    - use https://github.com/arkenfox/user.js/releases/tag/115.1
+  * Use the arkenfox release that matches your Firefox version
+    - DON'T wait for arkenfox to update Firefox, nothing major changes these days
+  * Each release
+    - run prefsCleaner to reset prefs made inactive, including deprecated (9999)
+  * ESR
+    - It is recommended to not use the updater, or you will get a later version which may cause issues.
+      So you should manually append your overrides (and keep a copy), and manually update when you
+      change ESR releases (arkenfox is already past that release)
+    - If you decide to keep updating, then the onus is on - also see section 9999
 
 * INDEX:
 
@@ -48,7 +49,6 @@
   0900: PASSWORDS
   1000: DISK AVOIDANCE
   1200: HTTPS (SSL/TLS / OCSP / CERTS / HPKP)
-  1400: FONTS
   1600: REFERERS
   1700: CONTAINERS
   2000: PLUGINS / MEDIA / WEBRTC
@@ -56,14 +56,14 @@
   2600: MISCELLANEOUS
   2700: ETP (ENHANCED TRACKING PROTECTION)
   2800: SHUTDOWN & SANITIZING
-  4500: RFP (RESIST FINGERPRINTING)
+  4500: RFP (resistFingerprinting)
   5000: OPTIONAL OPSEC
   5500: OPTIONAL HARDENING
   6000: DON'T TOUCH
   7000: DON'T BOTHER
   8000: DON'T BOTHER: FINGERPRINTING
   9000: NON-PROJECT RELATED
-  9999: DEPRECATED / REMOVED / LEGACY / RENAMED
+  9999: DEPRECATED / RENAMED
 
 ******/
 
@@ -132,6 +132,9 @@ user_pref("extensions.htmlaboutaddons.recommendations.enabled", false);
  * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to make personalized extension recommendations
  * [1] https://support.mozilla.org/kb/personalized-extension-recommendations ***/
 user_pref("browser.discovery.enabled", false);
+/* 0323: disable shopping experience [FF116+]
+ * [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1840156#c0 ***/
+user_pref("browser.shopping.experience2023.enabled", false); // [DEFAULT: false]
 
 /** TELEMETRY ***/
 /* 0330: disable new data submission [FF41+]
@@ -269,11 +272,11 @@ user_pref("network.proxy.socks_remote_dns", true);
 user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
 /* 0704: disable GIO as a potential proxy bypass vector
  * Gvfs/GIO has a set of supported protocols like obex, network, archive, computer,
- * dav, cdda, gphoto2, trash, etc. By default only sftp is accepted (FF87+)
+ * dav, cdda, gphoto2, trash, etc. From FF87-117, by default only sftp was accepted
  * [1] https://bugzilla.mozilla.org/1433507
  * [2] https://en.wikipedia.org/wiki/GVfs
  * [3] https://en.wikipedia.org/wiki/GIO_(software) ***/
-user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF]
+user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF] [DEFAULT: "" FF118+]
 /* 0705: disable proxy direct failover for system requests [FF91+]
  * [WARNING] Default true is a security feature against malicious extensions [1]
  * [SETUP-CHROME] If you use a proxy and you trust your extensions
@@ -305,36 +308,30 @@ user_pref("network.dns.skipTRR-when-parental-control-enabled", false);
 
 /*** [SECTION 0800]: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS ***/
 user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
-/* 0802: disable location bar domain guessing
- * domain guessing intercepts DNS "hostname not found errors" and resends a
- * request (e.g. by adding www or .com). This is inconsistent use (e.g. FQDNs), does not work
- * via Proxy Servers (different error), is a flawed use of DNS (TLDs: why treat .com
- * as the 411 for DNS errors?), privacy issues (why connect to sites you didn't
- * intend to), can leak sensitive data (e.g. query strings: e.g. Princeton attack),
- * and is a security risk (e.g. common typos & malicious sites set up to exploit this) ***/
-user_pref("browser.fixup.alternate.enabled", false); // [DEFAULT: false FF104+]
-/* 0804: disable live search suggestions
+/* 0801: disable location bar making speculative connections [FF56+]
+ * [1] https://bugzilla.mozilla.org/1348275 ***/
+user_pref("browser.urlbar.speculativeConnect.enabled", false);
+/* 0802: disable location bar contextual suggestions [FF92+]
+ * [SETTING] Privacy & Security>Address Bar>Suggestions from...
+ * [1] https://blog.mozilla.org/data/2021/09/15/data-and-firefox-suggest/ ***/
+user_pref("browser.urlbar.suggest.quicksuggest.nonsponsored", false); // [FF95+]
+user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false);
+/* 0803: disable live search suggestions
  * [NOTE] Both must be true for the location bar to work
  * [SETUP-CHROME] Override these if you trust and use a privacy respecting search engine
  * [SETTING] Search>Provide search suggestions | Show search suggestions in address bar results ***/
 user_pref("browser.search.suggest.enabled", false);
 user_pref("browser.urlbar.suggest.searches", false);
-/* 0805: disable location bar making speculative connections [FF56+]
- * [1] https://bugzilla.mozilla.org/1348275 ***/
-user_pref("browser.urlbar.speculativeConnect.enabled", false);
-/* 0806: disable location bar leaking single words to a DNS provider **after searching** [FF78+]
- * 0=never resolve, 1=use heuristics, 2=always resolve
- * [1] https://bugzilla.mozilla.org/1642623 ***/
-user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0); // [DEFAULT: 0 FF104+]
-/* 0807: disable location bar contextual suggestions [FF92+]
- * [SETTING] Privacy & Security>Address Bar>Suggestions from...
- * [1] https://blog.mozilla.org/data/2021/09/15/data-and-firefox-suggest/ ***/
-user_pref("browser.urlbar.suggest.quicksuggest.nonsponsored", false); // [FF95+]
-user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false);
-/* 0808: disable tab-to-search [FF85+]
- * Alternatively, you can exclude on a per-engine basis by unchecking them in Options>Search
- * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest>Search engines ***/
-   // user_pref("browser.urlbar.suggest.engines", false);
+/* 0805: disable urlbar trending search suggestions [FF118+]
+ * [SETTING] Search>Search Suggestions>Show trending search suggestions (FF119) ***/
+user_pref("browser.urlbar.trending.featureGate", false);
+/* 0806: disable urlbar suggestions ***/
+user_pref("browser.urlbar.addons.featureGate", false); // [FF115+]
+user_pref("browser.urlbar.mdn.featureGate", false); // [FF117+] [HIDDEN PREF]
+user_pref("browser.urlbar.pocket.featureGate", false); // [FF116+] [DEFAULT: false]
+user_pref("browser.urlbar.weather.featureGate", false); // [FF108+] [DEFAULT: false]
+/* 0807: disable urlbar clipboard suggestions [FF118+] ***/
+   // user_pref("browser.urlbar.clipboard.featureGate", false); // [DEFAULT: false]
 /* 0810: disable search and form history
  * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
  * [NOTE] We also clear formdata on exit (2811)
@@ -342,6 +339,10 @@ user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false);
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
  * [2] https://bugzilla.mozilla.org/381681 ***/
 user_pref("browser.formfill.enable", false);
+/* 0815: disable tab-to-search [FF85+]
+ * Alternatively, you can exclude on a per-engine basis by unchecking them in Options>Search
+ * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest>Search engines ***/
+   // user_pref("browser.urlbar.suggest.engines", false);
 /* 0820: disable coloring of visited links
  * [SETUP-HARDEN] Bulk rapid history sniffing was mitigated in 2010 [1][2]. Slower and more expensive
  * redraw timing attacks were largely mitigated in FF77+ [3]. Using RFP (4501) further hampers timing
@@ -499,18 +500,6 @@ user_pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
  * [TEST] https://expired.badssl.com/ ***/
 user_pref("browser.xul.error_pages.expert_bad_cert", true);
 
-/*** [SECTION 1400]: FONTS ***/
-user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
-/* 1402: limit font visibility (Windows, Mac, some Linux) [FF94+]
- * Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1], bundled fonts are auto-allowed
- * In normal windows: uses the first applicable: RFP over TP over Standard
- * In Private Browsing windows: uses the most restrictive between normal and private
- * 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
- * [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc ***/
-   // user_pref("layout.css.font-visibility.private", 1);
-   // user_pref("layout.css.font-visibility.standard", 1);
-   // user_pref("layout.css.font-visibility.trackingprotection", 1);
-
 /*** [SECTION 1600]: REFERERS
                   full URI: https://example.com:8888/foo/bar.html?id=1234
      scheme+host+port+path: https://example.com:8888/foo/bar.html
@@ -558,11 +547,9 @@ user_pref("dom.disable_window_move_resize", true);
 
 /*** [SECTION 2600]: MISCELLANEOUS ***/
 user_pref("_user.js.parrot", "2600 syntax error: the parrot's run down the curtain!");
-/* 2601: prevent accessibility services from accessing your browser [RESTART]
- * [1] https://support.mozilla.org/kb/accessibility-services ***/
-user_pref("accessibility.force_disabled", 1);
-/* 2603: remove temp files opened with an external application
- * [1] https://bugzilla.mozilla.org/302433 ***/
+/* 2603: remove temp files opened from non-PB windows with an external application
+ * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=302433,1738574 ***/
+user_pref("browser.download.start_downloads_in_tmp_dir", true); // [FF102+]
 user_pref("browser.helperApps.deleteTempFileOnExit", true);
 /* 2606: disable UITour backend so there is no chance that a remote page can use it ***/
 user_pref("browser.uitour.enabled", false);
@@ -599,12 +586,6 @@ user_pref("network.IDN_show_punycode", true);
  * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=pdf.js+firefox ***/
 user_pref("pdfjs.disabled", false); // [DEFAULT: false]
 user_pref("pdfjs.enableScripting", false); // [FF86+]
-/* 2623: disable permissions delegation [FF73+]
- * Currently applies to cross-origin geolocation, camera, mic and screen-sharing
- * permissions, and fullscreen requests. Disabling delegation means any prompts
- * for these will show/use their correct 3rd party origin
- * [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion ***/
-user_pref("permissions.delegation.enabled", false);
 /* 2624: disable middle click on new tab button opening URLs or searches using clipboard [FF115+] */
 user_pref("browser.tabs.searchclipboardfor.middleclick", false); // [DEFAULT: false NON-LINUX]
 
@@ -625,8 +606,7 @@ user_pref("browser.download.always_ask_before_handling_new_types", true);
 /* 2660: lock down allowed extension directories
  * [SETUP-CHROME] This will break extensions, language packs, themes and any other
  * XPI files which are installed outside of profile and application directories
- * [1] https://mike.kaply.com/2012/02/21/understanding-add-on-scopes/
- * [1] https://archive.is/DYjAM (archived) ***/
+ * [1] https://archive.is/DYjAM ***/
 user_pref("extensions.enabledScopes", 5); // [HIDDEN PREF]
 user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
 /* 2661: disable bypassing 3rd party extension install prompts [FF82+]
@@ -653,11 +633,6 @@ user_pref("browser.contentblocking.category", "strict");
  * [2] https://hg.mozilla.org/mozilla-central/rev/e5483fd469ab#l4.12
  * [3] https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning#storage_access_heuristics ***/
    // user_pref("privacy.antitracking.enableWebcompat", false);
-/* 2710: enable state partitioning of service workers [FF96+] ***/
-user_pref("privacy.partition.serviceWorkers", true); // [DEFAULT: true FF105+]
-/* 2720: enable APS (Always Partitioning Storage) ***/
-user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", true); // [FF104+] [DEFAULT: true FF109+]
-user_pref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", false); // [FF105+] [DEFAULT: false FF109+]
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
@@ -716,7 +691,7 @@ user_pref("privacy.cpd.cookies", false);
  * which will display a blank value, and are not guaranteed to work ***/
 user_pref("privacy.sanitize.timeSpan", 0);
 
-/*** [SECTION 4500]: RFP (RESIST FINGERPRINTING)
+/*** [SECTION 4500]: RFP (resistFingerprinting)
    RFP covers a wide range of ongoing fingerprinting solutions.
    It is an all-or-nothing buy in: you cannot pick and choose what parts you want
    [TEST] https://arkenfox.github.io/TZP/tzp.html
@@ -730,7 +705,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
  FF56
    1369303 - spoof/disable performance API
    1333651 - spoof User Agent & Navigator API
-      version: android version spoofed as ESR
+      version: android version spoofed as ESR (FF119 or lower)
       OS: JS spoofed as Windows 10, OS 10.15, Android 10, or Linux | HTTP Headers spoofed as Windows or Android
    1369319 - disable device sensor API
    1369357 - disable site specific zoom
@@ -772,7 +747,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
    1794628 - return "none" with inverted-colors (FF114)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
-/* 4501: enable privacy.resistFingerprinting
+/* 4501: enable RFP
  * [SETUP-WEB] RFP can cause some website breakage: mainly canvas, use a canvas site exception via the urlbar
  * RFP also has a few side effects: mainly timezone is UTC0, and websites will prefer light theme
  * [NOTE] pbmode applies if true and the original pref is false
@@ -787,7 +762,7 @@ user_pref("privacy.window.maxInnerHeight", 900);
 /* 4503: disable mozAddonManager Web API [FF57+]
  * [NOTE] To allow extensions to work on AMO, you also need 2662
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
-user_pref("privacy.resistFingerprinting.block_mozAddonManager", true); // [HIDDEN PREF FF57-108]
+user_pref("privacy.resistFingerprinting.block_mozAddonManager", true);
 /* 4504: enable RFP letterboxing [FF67+]
  * Dynamically resizes the inner window by applying margins in stepped ranges [2]
  * If you use the dimension pref, then it will only apply those resolutions.
@@ -894,8 +869,6 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
    // user_pref("browser.taskbar.lists.frequent.enabled", false);
    // user_pref("browser.taskbar.lists.recent.enabled", false);
    // user_pref("browser.taskbar.lists.tasks.enabled", false);
-/* 5015: disable Windows taskbar preview [WINDOWS] ***/
-   // user_pref("browser.taskbar.previews.enable", false); // [DEFAULT: false]
 /* 5016: discourage downloading to desktop
  * 0=desktop, 1=downloads (default), 2=custom
  * [SETTING] To set your custom default "downloads": General>Downloads>Save files to ***/
@@ -952,7 +925,7 @@ user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
  * Vulnerabilities [1] have increasingly been found, including those known and fixed
  * in native programs years ago [2]. WASM has powerful low-level access, making
  * certain attacks (brute-force) and vulnerabilities more possible
- * [STATS] ~0.2% of websites, about half of which are for crytopmining / malvertising [2][3]
+ * [STATS] ~0.2% of websites, about half of which are for cryptomining / malvertising [2][3]
  * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=wasm
  * [2] https://spectrum.ieee.org/tech-talk/telecom/security/more-worries-over-the-security-of-web-assembly
  * [3] https://www.zdnet.com/article/half-of-the-websites-using-webassembly-use-it-for-malicious-purposes ***/
@@ -982,7 +955,7 @@ user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
  * Firefox uses the system DNS to initially resolve the IP address of your DoH server.
  * When set to a valid, working value that matches your "network.trr.uri" (0712) Firefox
  * won't use the system DNS. If the IP doesn't match then DoH won't work ***/
-   // user_pref("network.trr.bootstrapAddr", "10.0.0.1") // [HIDDEN PREF]
+   // user_pref("network.trr.bootstrapAddr", "10.0.0.1"); // [HIDDEN PREF]
 
 /*** [SECTION 6000]: DON'T TOUCH ***/
 user_pref("_user.js.parrot", "6000 syntax error: the parrot's 'istory!");
@@ -1014,7 +987,7 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
 /* 6012: enforce Quarantined Domains [FF115+]
  * [WHY] https://support.mozilla.org/kb/quarantined-domains */
 user_pref("extensions.quarantinedDomains.enabled", true); // [DEFAULT: true]
-/* 6050: prefsCleaner: reset previously active items removed from arkenfox FF102+ ***/
+/* 6050: prefsCleaner: previously active items removed from arkenfox 102-114 ***/
    // user_pref("beacon.enabled", "");
    // user_pref("browser.startup.blankWindow", "");
    // user_pref("browser.newtab.preload", "");
@@ -1031,8 +1004,21 @@ user_pref("extensions.quarantinedDomains.enabled", true); // [DEFAULT: true]
    // user_pref("extensions.formautofill.creditCards.available", "");
    // user_pref("extensions.formautofill.creditCards.supported", "");
    // user_pref("middlemouse.contentLoadURL", "");
-/* 6051: prefsCleaner: reset previously active items removed from arkenfox FF115+ ***/
+/* 6051: prefsCleaner: previously active items removed from arkenfox 115-127 ***/
+   // user_pref("accessibility.force_disabled", "");
+   // user_pref("browser.fixup.alternate.enabled", "");
+   // user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", "");
    // user_pref("network.protocol-handler.external.ms-windows-store", "");
+   // user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", "");
+   // user_pref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", "");
+   // user_pref("privacy.partition.serviceWorkers", "");
+/* 6052: prefsCleaner: deprecated ESR102 items from FF103-115 ***/
+   // user_pref("browser.cache.offline.enable", "");
+   // user_pref("extensions.formautofill.heuristics.enabled", "");
+   // user_pref("network.cookie.lifetimePolicy", "");
+   // user_pref("privacy.clearsitedata.cache.enabled", "");
+   // user_pref("privacy.resistFingerprinting.testGranularityMask", "");
+   // user_pref("security.pki.sha1_enforcement_level", "");
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");
@@ -1057,8 +1043,8 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
 /* 7003: disable non-modern cipher suites [1]
  * [WHY] Passive fingerprinting. Minimal/non-existent threat of downgrade attacks
  * [1] https://browserleaks.com/ssl ***/
-   // user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false); // [DEFAULT: false FF109+]
-   // user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false); // [DEFAULT: false FF109+]
+   // user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
+   // user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false);
    // user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
    // user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false);
    // user_pref("security.ssl3.rsa_aes_128_gcm_sha256", false); // no PFS
@@ -1110,8 +1096,10 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] DNT is enforced with Tracking Protection which is used in ETP Strict (2701) ***/
    // user_pref("privacy.donottrackheader.enabled", true);
 /* 7016: customize ETP settings
+ * [NOTE] FPP (fingerprintingProtection) is ignored when RFP (4501) is enabled
  * [WHY] Arkenfox only supports strict (2701) which sets these at runtime ***/
-   // user_pref("network.cookie.cookieBehavior", 5); // [DEFAULT: 5 FF103+]
+   // user_pref("network.cookie.cookieBehavior", 5); // [DEFAULT: 5]
+   // user_pref("privacy.fingerprintingProtection", true); // [FF114+] [ETP FF119+]
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault", true);
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true); // [FF100+]
    // user_pref("privacy.partition.network_state.ocsp_cache", true);
@@ -1182,42 +1170,8 @@ user_pref("browser.messaging-system.whatsNewPanel.enabled", false);
  * [SETTING] Search>Search Bar>Use the address bar for search and navigation>Show search terms instead of URL... ***/
 user_pref("browser.urlbar.showSearchTerms.enabled", false);
 
-/*** [SECTION 9999]: DEPRECATED / REMOVED / LEGACY / RENAMED
-   Documentation denoted as [-]. Items deprecated prior to FF91 have been archived at [1]
-   [1] https://github.com/arkenfox/user.js/issues/123
-***/
+/*** [SECTION 9999]: DEPRECATED / RENAMED ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's shuffled off 'is mortal coil!");
-/* ESR102.x still uses all the following prefs
-// [NOTE] replace the * with a slash in the line above to re-enable active ones
-// FF103
-// 2801: delete cookies and site data on exit - replaced by sanitizeOnShutdown* (2810)
-   // 0=keep until they expire (default), 2=keep until you close Firefox
-   // [SETTING] Privacy & Security>Cookies and Site Data>Delete cookies and site data when Firefox is closed
-   // [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1681493,1681495,1681498,1759665,1764761
-user_pref("network.cookie.lifetimePolicy", 2);
-// 6012: disable SHA-1 certificates
-   // [-] https://bugzilla.mozilla.org/1766687
-   // user_pref("security.pki.sha1_enforcement_level", 1); // [DEFAULT: 1]
-// FF114
-// 2816: set cache to clear on exit [FF96+]
-   // [NOTE] We already disable disk cache (1001) and clear on exit (2811) which is more robust
-   // [1] https://bugzilla.mozilla.org/1671182
-   // [-] https://bugzilla.mozilla.org/1821651
-   // user_pref("privacy.clearsitedata.cache.enabled", true);
-// 4505: experimental RFP [FF91+]
-   // [-] https://bugzilla.mozilla.org/1824235
-   // user_pref("privacy.resistFingerprinting.testGranularityMask", 0);
-// 5017: disable Form Autofill heuristics
-   // Heuristics controls Form Autofill on forms without @autocomplete attributes
-   // [-] https://bugzilla.mozilla.org/1829670
-   // user_pref("extensions.formautofill.heuristics.enabled", false); // [FF55+]
-// FF115
-   // 7001: disable offline cache (appCache)
-   // [NOTE] appCache storage capability was removed in FF90
-   // [-] https://bugzilla.mozilla.org/1677718
-   // user_pref("browser.cache.offline.enable", false);
-// ***/
-
 /* ESR115.x still uses all the following prefs
 // [NOTE] replace the * with a slash in the line above to re-enable active ones
 // FF116
@@ -1237,6 +1191,24 @@ user_pref("security.family_safety.mode", 0);
    // [1] https://blog.mozilla.org/en/products/firefox/block-notification-requests/
    // [-] https://bugzilla.mozilla.org/1842457
    // user_pref("dom.webnotifications.serviceworker.enabled", false);
+// FF118
+// 1402: limit font visibility (Windows, Mac, some Linux) [FF94+]
+   // Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1], bundled fonts are auto-allowed
+   // In normal windows: uses the first applicable: RFP over TP over Standard
+   // In Private Browsing windows: uses the most restrictive between normal and private
+   // 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
+   // [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc
+   // [-] https://bugzilla.mozilla.org/1847599
+   // user_pref("layout.css.font-visibility.private", 1);
+   // user_pref("layout.css.font-visibility.standard", 1);
+   // user_pref("layout.css.font-visibility.trackingprotection", 1);
+// 2623: disable permissions delegation [FF73+]
+   // Currently applies to cross-origin geolocation, camera, mic and screen-sharing
+   // permissions, and fullscreen requests. Disabling delegation means any prompts
+   // for these will show/use their correct 3rd party origin
+   // [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion
+   // [-] https://bugzilla.mozilla.org/1697151
+   // user_pref("permissions.delegation.enabled", false);
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 35e8def0b1e5ecf1198e7efe41cfe6aa0415b320 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 18 Oct 2023 14:59:33 +0000
Subject: [PATCH 1120/1147] network.dns.skipTRR-when-parental-control-enabled

---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 6f783a4..edb18c9 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -6,7 +6,7 @@
   There is an archived version at https://github.com/arkenfox/user.js/issues/1080
   if you want the full list prior to FF118
 
-  Last updated: 29-September-2023
+  Last updated: 18-October-2023
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -41,6 +41,7 @@
     'layout.css.font-visibility.resistFingerprinting', // 116
     'layout.css.font-visibility.standard', // 118
     'layout.css.font-visibility.trackingprotection', // 118
+    'network.dns.skipTRR-when-parental-control-enabled', // 119
     'permissions.delegation.enabled', // 118
     'security.family_safety.mode', // 117
     /* 103-115 */

From e2681baec38e7ad09fe1f81c6da5ff84c81b7117 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 1 Nov 2023 22:02:55 +0000
Subject: [PATCH 1121/1147] javascript.use_us_english_locale

https://bugzilla.mozilla.org/1846224
---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index edb18c9..18de648 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -6,7 +6,7 @@
   There is an archived version at https://github.com/arkenfox/user.js/issues/1080
   if you want the full list prior to FF118
 
-  Last updated: 18-October-2023
+  Last updated: 2-November-2023
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -37,6 +37,7 @@
     /* DEPRECATED */
     /* 116-128 */
     'dom.webnotifications.serviceworker.enabled', // 117
+    'javascript.use_us_english_locale', // 119
     'layout.css.font-visibility.private', // 118
     'layout.css.font-visibility.resistFingerprinting', // 116
     'layout.css.font-visibility.standard', // 118

From d94d68245f77665546f9b736f430540295e6229e Mon Sep 17 00:00:00 2001
From: Tad <tad@spotco.us>
Date: Thu, 2 Nov 2023 16:18:47 -0400
Subject: [PATCH 1122/1147] Add favicon for Mull

Signed-off-by: Tad <tad@spotco.us>
---
 wikipiki/logo-mull.png | Bin 0 -> 1566 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)
 create mode 100644 wikipiki/logo-mull.png

diff --git a/wikipiki/logo-mull.png b/wikipiki/logo-mull.png
new file mode 100644
index 0000000000000000000000000000000000000000..d80042f89f667fa7bd1370547fdf5a16030eac4c
GIT binary patch
literal 1566
zcmV+(2I2XMP)<h;3K|Lk000e1NJLTq001BW001Be1^@s6b9#F8000H$Nkl<ZSi{wq
zZA?>F7{|M0Zr|pX#l%f}Z_j-JT3T8zv{0a>Edna)bW#LL@4bBq$v!O0KF&p>+4jL~
zI%AA3i^(>pU#2c`x-4-spz&q%1)T`UOG}3@6o`t6Q&I5QITvnMO3Ri^=l0<r;Bxc)
zf9IU%dG2#G0HAr6()=d?dbzh>9HriRg$Ohoo_|_q=QPc8t}PH>B_f^*z_2zP7@|TG
zSTLpWI29VeKlcyOLEk?CB8CxO3iL4Ip>9^X-ph#NSfB`r6EP%(2*564{Jp*&w&t&b
z9hTLw&$tHKSxE&trtAz3*v19sVYub^*`^_FXzw5$JQ_jL@dzUyh#+xu6v^Hb+WObk
zcYBchGch}z?Srq)t6{6K5<V_i0SAm;1tOx8ztG@d2Z>Rwvl2WW&oq5teFFyR5Ny{~
zpFs#65p~wKq@7a!msru1M9$jIb8O2Nrs~2KR)qDoWl&k+o+hueLU}jJNQW>$@F)pZ
z>8_Xo;BvX3E~^N5!~h0Rbd?H3G68fjO|fjA1tJ5_L7m<P74GsG0M#D%Bmk0IG{aQr
zI})ra4M0&*5!m%+$VFTN;77W)H50(M+{#lbfQ9Fw%xH$PlHwTvOWp3|9SDC#f;Bm+
zr>)##u_R2BwVrmJ$OQ0Smh+4XkgP(%GHoaP&Z@~AK=K|9PO5iEu-zta0>F(4%|=sN
z0Jko;KNCO&XS|jUpun65i#)Cbz%I+1%KHOM;9bpao%}Km)<FUu&2EHs1<Rm}Pj60y
z^I?pXY8rrX1IIl|2S8MwlLzlxm%?E~-PHL@UALI#xk|kb&JWBZM}ZS;Y&8-xnyVV5
zg7H*<E~Y7-$y}9}7oZFIANDiy-d^lEqZR8ByE~I9%d#^nAsOHj<Lg(A^x1qy2ouNe
zOZzR@$W-_&DC>5raZXMSIGs)<H|%!1@~oedI#K~Ha*bWYK+SrO%L#c#!wdi`mwjgg
z?~$hg4D00iIN&JOql>ifbR{xHi4nsv;B+{^Q&tSlA_2-BWneOypobQJO$9i^HFOA;
zJn%S6q1t5!hs^?RXBp&Vaf<PhEOYD_TX(*f^*`!kq&qRX>9qs^4z@eF!(l!6lCEjd
z>-FHkE84JbE%+Mhpu{SGAPCS$NtaRq&T{pgwn9Mx{bbWeu(YBaT&2ahnhcM3a*I#m
zcgB({CZ-GQRRH327^zvEs_ps}=UwIHP-?Y+0|$1Nm4MM`geWDorvkKb4W0RB6Sy6A
zaM=k6u6=wAn@u&BQ`<FBACkszpb(7#f}uDS-i8DIo(gb{4nmE?b5HFLrKP1x4#X(A
zYeo*RjXh+m38Y%@%gf#OyI6l3bMamuBY*ZAD>bWqAeL?ih^`>{zDFp!Z8n>goFD)<
zsNg^<Kqu>0nh-hjf_yVn6&Bw)$NR?8t$u0;2Kuo#Isc8B%vJqD)t^kR4E*d?DggfG
zk0xh(3s-wKlewxWEq$mNqC+I3k6`_T^)Lg(xE<*SiMb7B4`u3vC4A0^atxdyj{ly>
zu=0mdR&MP@a%%(y+BL%qLtI=NT#Exfo^2O)=oYt1I_rf&ZEz&hx8Mr$-}H0Vj!(I&
zQ?socLrmaL@w#rEoTC|`0|IWtd*a$q{fIVLcymE`;SD;hk88sX%2+lvu3euz_Xn!^
zVa^Mi4K=XIxCFk*UX^Sx*2y+qS2G>={DXZcD0Z?TV-#mSKKJ5oB#FI9+Bd)i3pKbB
zpPOy28`1`=u;E?RxD~Adw?R<Kk@N{ut{zDFEiwu417G_m2$Jr`XmQD`b0hZtTf-$D
zS|k+!e+OVWnw%9#Rj5g~jLU<|Op`irLO&w~p6I;*n;%ypx+p(*kTC&J$(i6B(~www
zgpp1>@r%hY9m-E0-@9oM0*no0&IWC4<Fo|3ibA%hax=ooy7RB5;wTb7e`;5=j$H2x
zxNmGx8&RAJcJ?w-kJ5;cG>S`W8x%Cp`B(0SH#y%+>hBT8JNN&6IenJ;10M|{r9y|-
Q$^ZZW07*qoM6N<$g8weihyVZp

literal 0
HcmV?d00001


From 96210522d8ed072565c3d5abcbcdb0a024aa7e01 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 2 Nov 2023 20:36:12 +0000
Subject: [PATCH 1123/1147] Add favicon for LibreWolf

---
 wikipiki/logo-librewolf.png | Bin 0 -> 1253 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)
 create mode 100644 wikipiki/logo-librewolf.png

diff --git a/wikipiki/logo-librewolf.png b/wikipiki/logo-librewolf.png
new file mode 100644
index 0000000000000000000000000000000000000000..0bb9299cb2ce9fa60787c4abdaee86f6af98dd26
GIT binary patch
literal 1253
zcmaKqeK6Ds9L9g8$-6{~)49&eo-ScabdB_ayzDZY6_Rw`dU4|-=3J+otvf<*r@|q5
z>$qiY)@xp3$;%>XR#<hyid*Vb-goibp5~gnnVXw=zR&kF&&>1R6H9ZpQ&#v$fglKF
z2YVYA>EHC%$;n9FCMT|mAXXaEsIImEh%yj&Krok81S02eW-Wu%3qTYuvlOJtUv_E!
z9zG=hg!e6J@&W#b|Fb9!|E(1TkYQmJ3#$tuTL?Ke<k?VQL!}67ilABqH4fA{&?v_G
zVr(deW(jo4pj!^Ta_CpUpaP@{e0Cq7S7J*gOsZg74RSTMRbzV%EFNH2EiCI`Rfm0C
z?B~L|9`+4zcnE4EoEqWW2wD?dnn7>Ip%%Ecz=MawJb3bOq!nJR@NLKOM>x@epvU;S
z6Q?^7+=-AU2z`QZKECDSTo=B73Pv|B_8__!F}=9di&z2T1c(>lav!et;rcVA_9JHy
zzYHOF2)_!!6rx}ltYH+5fHQ*P5tNLgbQEQys1%_}glZ9L#_(VawPUCo19u$t<9PTA
z{I}?N2f-xzCh=k#!Wq1r#po=4pMz))<8yd5kJt0~V;&P?yb<HA7}E=wS-|W9<`yAY
z!om_3m#`$A2=MXwjq=jz><n{prW3Mq@=D4o8k$<#x(1}J#^gh8?jDC3(J^tC6O)pE
zPDxF>&24IKX>IT14+&q2#>OY7rsw9xlIK)~Ug_@49BlTvYH9^=WskV5SQj;zoq14D
zVie>-5||pUTQIVtJZt0lc$z=r><*GkaN3$07-5odPp#v{_)us~y-?D6y=!yvq?b2)
zi%G<pI3)}7T!O+)GjlN0&A+s&zuiCfMwx0uTmz#cy|8Mlgkrk$Ky1JT#XPww=H@Uz
zjq7{7si%wwT-h^wYCYVK9t|HnYje>q>RgqQy*JSq#GEzv>w8Db?qSU9>5~*s^4}aB
zGMf_Z*krBb7oXwK5D`lcc|h72^uyh6*76vo`*u5~-M*7`t9klaV6t(7C&Bve+Roet
zruNy4$l%<Tb%u(z<=gXS+SLy&PKG`1ZegFXPZ9)sRFPkwUA${6>y=4a!!_c`)Ot7G
zE4V+JA9&2hub(~2SzY%jC4>GI`DUbBTk5Ugy`M1XmTx@6Rf{F%Df`Exj*1l&8fDmF
zvSjW0z+EvuNi%yhjTp`>y^*UaR>sY={MQ3FEl)l@uCxPPUDS4i8hI67w4PYaP?B+R
zW-XsJZAvFu&rjHEc)3${M6(w6wE1N9K3DBjVJ<NP)T1S1GUZPGDh0|1PJ`Cgvuz+b
z@|cW3H(}&Q(v|S_dC0#qprsd0t;@9*J7x@C6Gxp=yYVW@x7M?t!?K=sBM*~!ghY41
zpXM}CncWw$(!<h|Dx73E9<z6<UC^k@3h~wYVuQ6Pv-^aJPPs%S(YK|Pl9r=nA#X{)
xq5sqQO6~ZFZcVL@M61wrzA&UCmCPe0;x{8Z|MUQz2<Zk12U};G!u?-f_!CRX$>jh5

literal 0
HcmV?d00001


From 29bb5a35f0908143f395b86263746988168c7966 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 2 Nov 2023 21:17:15 +0000
Subject: [PATCH 1124/1147] rename/add icons (#1760)

---
 .../{logo-librewolf.png => icon-librewolf.png}   | Bin
 wikipiki/{logo-mull.png => icon-mull.png}        | Bin
 wikipiki/icon-mullvadbrowser.png                 | Bin 0 -> 1237 bytes
 wikipiki/icon-torbrowser.png                     | Bin 0 -> 2044 bytes
 4 files changed, 0 insertions(+), 0 deletions(-)
 rename wikipiki/{logo-librewolf.png => icon-librewolf.png} (100%)
 rename wikipiki/{logo-mull.png => icon-mull.png} (100%)
 create mode 100644 wikipiki/icon-mullvadbrowser.png
 create mode 100644 wikipiki/icon-torbrowser.png

diff --git a/wikipiki/logo-librewolf.png b/wikipiki/icon-librewolf.png
similarity index 100%
rename from wikipiki/logo-librewolf.png
rename to wikipiki/icon-librewolf.png
diff --git a/wikipiki/logo-mull.png b/wikipiki/icon-mull.png
similarity index 100%
rename from wikipiki/logo-mull.png
rename to wikipiki/icon-mull.png
diff --git a/wikipiki/icon-mullvadbrowser.png b/wikipiki/icon-mullvadbrowser.png
new file mode 100644
index 0000000000000000000000000000000000000000..f5381b62a0d4809a258f70acad763ba9c1f25af1
GIT binary patch
literal 1237
zcmV;`1S<Q9P)<h;3K|Lk000e1NJLTq001BW001Be1^@s6b9#F8000D>Nkl<ZcwX(6
zONd<66UKkv?e6r1dFTI^BxH0#5=?w1LCi}hqM|DUQ50NeA?|}4vl1bSh!S096*1yc
z+zA@cj0?d>9LFe#n)J+=hXhGahUuQ3?mp#^;vAZ}c5ii&Z*lJ_PF0<+>Z^0P{M)z%
z(Seb}Cq@R>lwLu$ivVN-jLvn22*KR$Kn4U1hscOw8Nq_vfyzR&d9?cR(ds`E*!0X>
zr!wgX21o{$_RSx@BQRehq0TjcnYmMnb;yl(=01AqC=QBrqP?^^kb!wVP>MCfBoh*5
z&Lc94zR3cNJPaAeE*yCRVY!*k#LUL~|B?an;x${l&DR~;rF}CuCDxa#Di>Ob#!4KR
znH+Q_V67TR=2X%1W1o{i#)p;t%r36OItr9fFc1id;ZmI=<7Y54vdp{n#!rU;6u?AJ
z0?QaE&BXdTAj}G2B_66>qVj7$fQS%SVq`pi`vv|tP^73j<`NNF4crSs)}27RxrBiD
zc>2l9SQ}_(5CoH>O#ZRJ%#D&Egh3og35^dmd0>U~;d?I83`WaDD}a5mM4U_O-GL={
zh?$FqGO$8`ws>&I91|Dsq%ytaPHAG?cxo#g7{5euut^p~$^6QOW&^Nzcy|J{8U(LK
zz8fI;J)<bbHe6%>mg}6oFhr%=6dl;LvCLh!EwE+NWwOB*7Vxf_2(6`bVGunea7UT6
z`U~T+eQow^|B;Dbp5WrOKcfHuniyNhW82Q4ffj}X;rcX}qJ=~+2^wI+@GBD&Af@-%
z#>*VoI?vSHT1{Q4B8i<FhS@tl%kbz8C>WSL1dmyfz>wr=tUH0wTqahOo}|M;hRSXB
z-u*4-FCOCD>{S!e#Q1jhY@0;=Eli}T1bKM7Aq)a$JtYXsHIT?bFuz!2cx?+Z7#o{o
z-;N58%#Ep9uiO4@Ga4S9hk_wfBH<9hB|t(J)P;aEAOvqeSS$b#)4!J?l$p415fuab
z?*EGKetv;QtEGMSypLAM0ZdoQ%-4!MynWFlGrwKn(weEq5H35@<P&u?fWYe?{NFx#
zb5Ue4JaU~!cYni;g;9n^ue<g^y!_rejy+cefrpxZh+Iw4gMd$~B*RR^p^4KRm^@d|
z<W!l1JC{)@u>0PxY1G%Ez5oHfJimssQ?g^v2B8>7`VIi72LWfAzHfL?Vi9g8dhJv{
z2j6W#meDs*qp!b~{9b%}09wm3Ye&sNHzi0pMXzgUMkdKDVA0!Btasu2(h7+I?pPnd
zoFgWte=9I^RX{-U5aJ~Y0eKEWF9NK-rvfRSV?-Q3)z2#UcnOhUxaDH{zJ&6BQVAZ9
z<&yY29Yh{T5)sPxI?FQQ3AzzTXDc0~m^@|lD)Pl!=Q<IVVe+ly(p`dlMKKAaw|W<k
zD<2^t%X#-E;99w6$4?F^4%*C>LL^2Ap<5>aIQ?0f$>|abn04y!UcCvVmV=I;9E3bU
z<N)X-6FJ%GPs`THPeP>PvhFir@I$Vo+&bBb%&I*_09xHy2o)l7nvQH9DbYLuY|crC
z;(@t;8%v8QvHSQc*(ijmW>$ZdYPHIL1-I}wde@9m!FAfg00000NkvXXu0mjfs$V|y

literal 0
HcmV?d00001

diff --git a/wikipiki/icon-torbrowser.png b/wikipiki/icon-torbrowser.png
new file mode 100644
index 0000000000000000000000000000000000000000..ad7e8d1d3e70ad8a3262ccc4a4baacf91a2131b5
GIT binary patch
literal 2044
zcmV<Y2Lt$tP)<h;3K|Lk000e1NJLTq001BW001Be1^@s6b9#F800009a7bBm000XU
z000XU0RWnu7ytkO0drDELIAGL9O(c600d`2O+f$vv5yP<VFdsH2a!ocK~#7F%~xG)
z99I?o&g}f{|Jsi0q$JIzvD&l=icM8Yc?dzON_jw0iz?a*Nb-Wj3wD4P#7lyNsGwEW
zh(}Q37bFmE8dOC*6g5SmKR}grn>ex465A<p?AWo__SpL~GnaGkot<5m76)G1k!NS_
z-<<D!=R4<K1E26kw>$CF{)K{DF#9M>93Y7Od>27R{=&sFe<Z9JWS3KRs_a<qYu_&S
zzI40a-4K8@Y}@t#CB%SXQ9<?z2qKUW{62c|JPCd`4U<w<TDW$K94j^9CXy#Zgu{=&
z*)j2d130~Jc_5L*QNuFwg2ei{La)Ah^BvU;Dhb#k30H!!(&So69;U0Iz_BO(mK*+`
z0le^V<+xQa2FX}AS;*fO1A-cTW2)D3P1s=y-k6Qxh6}OmNB|(Uh)PfXJ%8l30sQ`<
z$_cALhYTZfRL)`wqMufqS-F)RMZyL$TWoY~&mq^DflVnakD8c#xh7PcBzr_BpL)CF
z@P+_>`?-bVZdZb19yzS1wT!oxslJOBMwkvk2ASx%GmE>wRKVSjbRt_wVPQPL=m`&N
zbAejUe?#9acdcW>Xm6bO?Cc>UB?g5dh+`-CM!-LzXtsrJhY<WE`7Xl{gnF(w6JYGc
zRlM<&3Rc-@=e;H#_+b|00Dc%!7>L2)J@W$}$-s$S(?!^cSJORqG3u1;X|`n)p$X6|
zL_PfOZN7~9ih%clKx5W{W2X2{i&QpA5C5ou{B{%bml}BEXBDktLIvK+j>8i>7S}Q0
z!#HTB6UDI2Lm@q5w}obcBm=S$a9h61dAYkxY`Wh<@7Ge;`<*PZY*5Z!TM2OPrwgb|
z`sljP!uCg9YA_3aAo6uLHTWMP@I!IPun`#umBd4S29o};MZXS#i0558<%!AH*0B69
zA8y`2KZDq|&q2T_t1BU1e_lC?T~DN8BuRxr1mb(gi&qOVfM4yraeyo;N{*Ta0vR*S
zfHI^#mU=)muG`*CpKgvd#OO;N-g{+LNptr%GAjOZ&eBW+<7YfrDZ<XLB;m7Qn28R+
z?27?30{_cMD5sRCnri(nV;)Av7!QwydOTt!*=1;va{JnwRq@X6mLMH@@Vj{gz7Ud$
zskhb?3*8(F*_OaqK?h<0+_yKBYSwC(v4wnBci3jI2}H4?HL?5aS?ql#3o8Se6*To$
z6?0>CWbQCk?3r>*zgxq~tdBc(J4m>sK=~o|#{j}0?2{F*MYCx0vIR&!)g6UFN=2@B
zvIcq|NlDM7c=6A3tIFf8pLZz;AXs=}`a(_hx!ndyP#lV)Y@14efhhP)mlcRsoe}Nj
zr!8-FK_T@-Ypk%%f}LY#mIdao)>U7+JE63sayr!WOcr7gsw6MO03_;qJ%A$&G;2JX
zB{W2<PnQR3*=^gPxKEbkx)y3wGbGj8i)e`osUL*#G7Z4TLcJymp`J#1%Td(^+OXby
zbn$I&MB%zJzE%maIPHVCWo9Fx#+I)8GTv&vmD2NM2xUn4buk9e2>r>x3p?_m74hB-
zgyKKi0wQlC812Rvt~GG^l{IG4VNnU}+?Q7U<FBt!WDJ{jI%>_#m72-~zDCfdfwQcz
zzBSK>lQa<Rp=!5_kO<K#+f5+q_uQ}Nsk$WNWD1i)y7$pEw%qSx=|%%n=T-Vqcdvt7
zkBQm$YVekP6;n>3vK&-d;D`QciF9GECPN+<oK{hi8PH0>W|qkOUuEh8l`$c0e=vy$
zo-8PEXP%uEGS>3D{g3Aq+JF3EQHoMAz@ItW(tzofjYgxgx)Ky*4R=z!7b~ShG`C>U
z@?I7!tqJbse5YJD*ZTepiv8O7Uw$)(sgartq4b>gJeEU+8JRr4$^ay-V&WIxJ*Q&^
zN{hTR2`b62&)=vj!bz0@eW;1g0a23bLyig$eeqkJ*z;Hxot%c=ypJ<KpT)?_OKP%{
zHt@{QR<-EeKP@u|Un3_mjP@*0>a@)vW?|58h{COz8oIW)I^7~c>V$}PVaY(m&g_*M
ztt|z(`F?=P2L=psxvD4OWC%|WeFpi>CZ@`3`0L4eX!gV;7rq!kyc;SO5FV56c@-av
zb9H?fKn#PZnFSPg()mADaQW30+?uNE0mhnRqfeK%qNmqY)Sr2FrY(lX(Nguk39M6e
z+x7j-_;KzWl<uW6e9Y>xVVXvq1@Q?b%F)q_W$g){;Wqc?(fd#*zVOtY>PU8Nq>2}R
zd>u7U!{w!==T`1ncO?7BL+KCF<0tuXP%bkqLVlAYGC32XC52d<#<usB*m`=C=-H7+
zZc_%1lS27a6>q;#5pnHCF#No?>+pwdeeALPNM^jmE)F0f&$5WJ9k$94+cDzeaMxF_
ztNE5~qFza3dD_DGpBt#H>MdQfgP{+5z99h3#MnXp$WbCbtVBALDkd_7?W%ag>Ey~*
zC#o&+X{So-a+YT<^5%Q&Id50#<7{mBui2n`sc4wyK~Bm;Y`fT68BqX=Xl|-h0-yy@
z_{+dtEtMAg7ysM$Z~LE9c^%1KIlv`!zd_W;Rj`i%<<({-J>}xU7|wF6PX}hTypiEg
a&Gm1|sgw5)O}6a-0000<MNUMnLSTYVf#Kx<

literal 0
HcmV?d00001


From fc251637635cce451067aa448a66f803f8c4d577 Mon Sep 17 00:00:00 2001
From: Tiagoquix <30274161+Tiagoquix@users.noreply.github.com>
Date: Fri, 10 Nov 2023 20:52:23 -0300
Subject: [PATCH 1125/1147] Correct archived version link in
 arkenfox-cleanup.js (#1763)

---
 scratchpad-scripts/arkenfox-cleanup.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 18de648..1e8df4d 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -3,7 +3,7 @@
   - removed from the arkenfox user.js
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
-  There is an archived version at https://github.com/arkenfox/user.js/issues/1080
+  There is an archived version at https://github.com/arkenfox/user.js/issues/123
   if you want the full list prior to FF118
 
   Last updated: 2-November-2023

From f95c6829fe3c0fcc478756d7acbc55020d78b141 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 19 Nov 2023 09:56:47 +0000
Subject: [PATCH 1126/1147] fixup date/reference

---
 scratchpad-scripts/arkenfox-cleanup.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 1e8df4d..6956979 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -4,7 +4,7 @@
   - deprecated by Mozilla but listed in the arkenfox user.js in the past
 
   There is an archived version at https://github.com/arkenfox/user.js/issues/123
-  if you want the full list prior to FF118
+  if you want the full list since jesus
 
   Last updated: 2-November-2023
 

From fd72683abe15de5cf57574125b64879e809cf5c4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 20 Nov 2023 02:49:16 +0000
Subject: [PATCH 1127/1147] v119 (#1757)

---
 user.js | 98 ++++++++++++++++++++++-----------------------------------
 1 file changed, 37 insertions(+), 61 deletions(-)

diff --git a/user.js b/user.js
index 4798b8a..1772671 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 18 October 2023
-* version: 118
+*    date: 20 November 2023
+* version: 119
 *    urls: https://github.com/arkenfox/user.js [repo]
 *        : https://arkenfox.github.io/gui/ [interactive]
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
@@ -40,7 +40,7 @@
 * INDEX:
 
   0100: STARTUP
-  0200: GEOLOCATION / LANGUAGE / LOCALE
+  0200: GEOLOCATION
   0300: QUIETER FOX
   0400: SAFE BROWSING
   0600: BLOCK IMPLICIT OUTBOUND
@@ -100,7 +100,7 @@ user_pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); //
  * [NOTE] This does not block you from adding your own ***/
 user_pref("browser.newtabpage.activity-stream.default.sites", "");
 
-/*** [SECTION 0200]: GEOLOCATION / LANGUAGE / LOCALE ***/
+/*** [SECTION 0200]: GEOLOCATION ***/
 user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");
 /* 0201: use Mozilla geolocation service instead of Google if permission is granted [FF74+]
  * Optionally enable logging to the console (defaults to false) ***/
@@ -109,16 +109,8 @@ user_pref("geo.provider.network.url", "https://location.services.mozilla.com/v1/
 /* 0202: disable using the OS's geolocation service ***/
 user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
 user_pref("geo.provider.use_corelocation", false); // [MAC]
-user_pref("geo.provider.use_gpsd", false); // [LINUX]
+user_pref("geo.provider.use_gpsd", false); // [LINUX] [HIDDEN PREF]
 user_pref("geo.provider.use_geoclue", false); // [FF102+] [LINUX]
-/* 0210: set preferred language for displaying pages
- * [SETTING] General>Language and Appearance>Language>Choose your preferred language...
- * [TEST] https://addons.mozilla.org/about ***/
-user_pref("intl.accept_languages", "en-US, en");
-/* 0211: use en-US locale regardless of the system or region locale
- * [SETUP-WEB] May break some input methods e.g xim/ibus for CJK languages [1]
- * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=867501,1629630 ***/
-user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
 
 /*** [SECTION 0300]: QUIETER FOX ***/
 user_pref("_user.js.parrot", "0300 syntax error: the parrot's not pinin' for the fjords!");
@@ -268,7 +260,7 @@ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost
 user_pref("network.proxy.socks_remote_dns", true);
 /* 0703: disable using UNC (Uniform Naming Convention) paths [FF61+]
  * [SETUP-CHROME] Can break extensions for profiles on network shares
- * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/26424 ***/
+ * [1] https://bugzilla.mozilla.org/1413868 ***/
 user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
 /* 0704: disable GIO as a potential proxy bypass vector
  * Gvfs/GIO has a set of supported protocols like obex, network, archive, computer,
@@ -297,8 +289,6 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF] [DEFAULT: ""
  * [3] https://support.mozilla.org/en-US/kb/firefox-dns-over-https
  * [4] https://www.eff.org/deeplinks/2020/12/dns-doh-and-odoh-oh-my-year-review-2020 ***/
    // user_pref("network.trr.mode", 3);
-/* 0711: disable skipping DoH when parental controls are enabled [FF70+] ***/
-user_pref("network.dns.skipTRR-when-parental-control-enabled", false);
 /* 0712: set DoH provider
  * The custom uri is the value shown when you "Choose provider>Custom>"
  * [NOTE] If you USE custom then "network.trr.uri" should be set the same
@@ -311,11 +301,11 @@ user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
 /* 0801: disable location bar making speculative connections [FF56+]
  * [1] https://bugzilla.mozilla.org/1348275 ***/
 user_pref("browser.urlbar.speculativeConnect.enabled", false);
-/* 0802: disable location bar contextual suggestions [FF92+]
+/* 0802: disable location bar contextual suggestions
  * [SETTING] Privacy & Security>Address Bar>Suggestions from...
  * [1] https://blog.mozilla.org/data/2021/09/15/data-and-firefox-suggest/ ***/
 user_pref("browser.urlbar.suggest.quicksuggest.nonsponsored", false); // [FF95+]
-user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false);
+user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false); // [FF92+]
 /* 0803: disable live search suggestions
  * [NOTE] Both must be true for the location bar to work
  * [SETUP-CHROME] Override these if you trust and use a privacy respecting search engine
@@ -354,6 +344,10 @@ user_pref("browser.formfill.enable", false);
  * [4] https://earthlng.github.io/testpages/visited_links.html (see github wiki APPENDIX A on how to use)
  * [5] https://lcamtuf.blogspot.com/2016/08/css-mix-blend-mode-is-bad-for-keeping.html ***/
    // user_pref("layout.css.visited_links_enabled", false);
+/* 0830: enable separate default search engine in Private Windows and its UI setting
+ * [SETTING] Search>Default Search Engine>Choose a different default search engine for Private Windows only ***/
+user_pref("browser.search.separatePrivateDefault", true); // [FF70+]
+user_pref("browser.search.separatePrivateDefault.ui.enabled", true); // [FF71+]
 
 /*** [SECTION 0900]: PASSWORDS
    [1] https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas
@@ -396,7 +390,7 @@ user_pref("browser.sessionstore.privacy_level", 2);
 /* 1005: disable automatic Firefox start and session restore after reboot [FF62+] [WINDOWS]
  * [1] https://bugzilla.mozilla.org/603903 ***/
 user_pref("toolkit.winRegisterApplicationRestart", false);
-/* 1006: disable favicons in shortcuts
+/* 1006: disable favicons in shortcuts [WINDOWS]
  * URL shortcuts use a cached randomly named .ico file which is stored in your
  * profile/shortcutCache directory. The .ico remains after the shortcut is deleted
  * If set to false then the shortcuts use a generic Firefox icon ***/
@@ -417,7 +411,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * but the problem is that the browser can't know that. Setting this pref to true is the only way for the
  * browser to ensure there will be no unsafe renegotiations on the channel between the browser and the server
  * [SETUP-WEB] SSL_ERROR_UNSAFE_NEGOTIATION: is it worth overriding this for that one site?
- * [STATS] SSL Labs (Feb 2023) reports over 99.3% of top sites have secure renegotiation [4]
+ * [STATS] SSL Labs (Nov 2023) reports over 99.5% of top sites have secure renegotiation [4]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
  * [2] https://datatracker.ietf.org/doc/html/rfc5746
  * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
@@ -462,7 +456,7 @@ user_pref("security.cert_pinning.enforcement_level", 2);
  * 0 = disabled
  * 1 = consult CRLite but only collect telemetry
  * 2 = consult CRLite and enforce both "Revoked" and "Not Revoked" results
- * 3 = consult CRLite and enforce "Not Revoked" results, but defer to OCSP for "Revoked" (FF99+, default FF100+)
+ * 3 = consult CRLite and enforce "Not Revoked" results, but defer to OCSP for "Revoked" (default)
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1429800,1670985,1753071
  * [2] https://blog.mozilla.org/security/tag/crlite/ ***/
 user_pref("security.remote_settings.crlite_filters.enabled", true);
@@ -471,7 +465,7 @@ user_pref("security.pki.crlite_mode", 2);
 /** MIXED CONTENT ***/
 /* 1241: disable insecure passive content (such as images) on https pages ***/
    // user_pref("security.mixed_content.block_display_content", true); // Defense-in-depth (see 1244)
-/* 1244: enable HTTPS-Only mode in all windows [FF76+]
+/* 1244: enable HTTPS-Only mode in all windows
  * When the top-level is HTTPS, insecure subresources are also upgraded (silent fail)
  * [SETTING] to add site exceptions: Padlock>HTTPS-Only mode>On (after "Continue to HTTP Site")
  * [SETTING] Privacy & Security>HTTPS-Only Mode (and manage exceptions)
@@ -603,12 +597,13 @@ user_pref("browser.download.manager.addToRecentDocs", false);
 user_pref("browser.download.always_ask_before_handling_new_types", true);
 
 /** EXTENSIONS ***/
-/* 2660: lock down allowed extension directories
- * [SETUP-CHROME] This will break extensions, language packs, themes and any other
- * XPI files which are installed outside of profile and application directories
+/* 2660: limit allowed extension directories
+ * 1=profile, 2=user, 4=application, 8=system, 16=temporary, 31=all
+ * The pref value represents the sum: e.g. 5 would be profile and application directories
+ * [SETUP-CHROME] Breaks usage of files which are installed outside allowed directories
  * [1] https://archive.is/DYjAM ***/
 user_pref("extensions.enabledScopes", 5); // [HIDDEN PREF]
-user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
+   // user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
 /* 2661: disable bypassing 3rd party extension install prompts [FF82+]
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1659530,1681331 ***/
 user_pref("extensions.postDownloadThirdPartyPrompt", false);
@@ -625,7 +620,7 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin
  * [1] https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/
  * [SETTING] to add site exceptions: Urlbar>ETP Shield
  * [SETTING] to manage site exceptions: Options>Privacy & Security>Enhanced Tracking Protection>Manage Exceptions ***/
-user_pref("browser.contentblocking.category", "strict");
+user_pref("browser.contentblocking.category", "strict"); // [HIDDEN PREF]
 /* 2702: disable ETP web compat features [FF93+]
  * [SETUP-HARDEN] Includes skip lists, heuristics (SmartBlock) and automatic grants
  * Opener and redirect heuristics are granted for 30 days, see [3]
@@ -703,7 +698,6 @@ user_pref("privacy.sanitize.timeSpan", 0);
    1330890 - spoof timezone as UTC0 (FF55)
    1360039 - spoof navigator.hardwareConcurrency as 2 (FF55)
  FF56
-   1369303 - spoof/disable performance API
    1333651 - spoof User Agent & Navigator API
       version: android version spoofed as ESR (FF119 or lower)
       OS: JS spoofed as Windows 10, OS 10.15, Android 10, or Linux | HTTP Headers spoofed as Windows or Android
@@ -716,7 +710,6 @@ user_pref("privacy.sanitize.timeSpan", 0);
    1369309 - spoof media statistics
    1382499 - reduce screen co-ordinate fingerprinting in Touch API
    1217290 & 1409677 - enable some fingerprinting resistance for WebGL
-   1382545 - reduce fingerprinting in Animation API
    1354633 - limit MediaError.message to a whitelist
  FF58+
    1372073 - spoof/block fingerprinting in MediaDevices API (FF59)
@@ -741,7 +734,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
    1653987 - limit font visibility to bundled and "Base Fonts" (Windows, Mac, some Linux) (FF80)
    1461454 - spoof smooth=true and powerEfficient=false for supported media in MediaCapabilities (FF82)
     531915 - use fdlibm's sin, cos and tan in jsmath (FF93, ESR91.1)
-   1756280 - enforce navigator.pdfViewerEnabled as true and plugins/mimeTypes as hard-coded values (FF100)
+   1756280 - enforce navigator.pdfViewerEnabled as true and plugins/mimeTypes as hard-coded values (FF100-115)
    1692609 - reduce JS timing precision to 16.67ms (previously FF55+ was 100ms) (FF102)
    1422237 - return "srgb" with color-gamut (FF110)
    1794628 - return "none" with inverted-colors (FF114)
@@ -973,10 +966,9 @@ user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
  * [WARNING] Replaced with network partitioning (FF85+) and TCP (2701), and enabling FPI
  * disables those. FPI is no longer maintained except at Tor Project for Tor Browser's config ***/
 user_pref("privacy.firstparty.isolate", false); // [DEFAULT: false]
-/* 6009: enforce SmartBlock shims [FF81+]
- * In FF96+ these are listed in about:compat
+/* 6009: enforce SmartBlock shims (about:compat) [FF81+]
  * [1] https://blog.mozilla.org/security/2021/03/23/introducing-smartblock/ ***/
-user_pref("extensions.webcompat.enable_shims", true); // [DEFAULT: true]
+user_pref("extensions.webcompat.enable_shims", true); // [HIDDEN PREF] [DEFAULT: true]
 /* 6010: enforce no TLS 1.0/1.1 downgrades
  * [TEST] https://tls-v1-1.badssl.com:1010/ ***/
 user_pref("security.tls.version.enable-deprecated", false); // [DEFAULT: false]
@@ -987,38 +979,13 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
 /* 6012: enforce Quarantined Domains [FF115+]
  * [WHY] https://support.mozilla.org/kb/quarantined-domains */
 user_pref("extensions.quarantinedDomains.enabled", true); // [DEFAULT: true]
-/* 6050: prefsCleaner: previously active items removed from arkenfox 102-114 ***/
-   // user_pref("beacon.enabled", "");
-   // user_pref("browser.startup.blankWindow", "");
-   // user_pref("browser.newtab.preload", "");
-   // user_pref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", "");
-   // user_pref("browser.newtabpage.activity-stream.feeds.snippets", "");
-   // user_pref("browser.region.network.url", "");
-   // user_pref("browser.region.update.enabled", "");
-   // user_pref("browser.ssl_override_behavior", "");
-   // user_pref("devtools.chrome.enabled", "");
-   // user_pref("dom.disable_beforeunload", "");
-   // user_pref("dom.disable_open_during_load", "");
-   // user_pref("extensions.formautofill.available", "");
-   // user_pref("extensions.formautofill.addresses.supported", "");
-   // user_pref("extensions.formautofill.creditCards.available", "");
-   // user_pref("extensions.formautofill.creditCards.supported", "");
-   // user_pref("middlemouse.contentLoadURL", "");
-/* 6051: prefsCleaner: previously active items removed from arkenfox 115-127 ***/
+/* 6050: prefsCleaner: previously active items removed from arkenfox 115-127 ***/
    // user_pref("accessibility.force_disabled", "");
-   // user_pref("browser.fixup.alternate.enabled", "");
    // user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", "");
    // user_pref("network.protocol-handler.external.ms-windows-store", "");
    // user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", "");
    // user_pref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", "");
    // user_pref("privacy.partition.serviceWorkers", "");
-/* 6052: prefsCleaner: deprecated ESR102 items from FF103-115 ***/
-   // user_pref("browser.cache.offline.enable", "");
-   // user_pref("extensions.formautofill.heuristics.enabled", "");
-   // user_pref("network.cookie.lifetimePolicy", "");
-   // user_pref("privacy.clearsitedata.cache.enabled", "");
-   // user_pref("privacy.resistFingerprinting.testGranularityMask", "");
-   // user_pref("security.pki.sha1_enforcement_level", "");
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");
@@ -1103,7 +1070,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault", true);
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true); // [FF100+]
    // user_pref("privacy.partition.network_state.ocsp_cache", true);
-   // user_pref("privacy.query_stripping.enabled", true); // [FF101+] [ETP FF102+]
+   // user_pref("privacy.query_stripping.enabled", true); // [FF101+]
    // user_pref("privacy.trackingprotection.enabled", true);
    // user_pref("privacy.trackingprotection.socialtracking.enabled", true);
    // user_pref("privacy.trackingprotection.cryptomining.enabled", true); // [DEFAULT: true]
@@ -1160,7 +1127,7 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's crossed the Jordan
 /*** [SECTION 9000]: NON-PROJECT RELATED ***/
 user_pref("_user.js.parrot", "9000 syntax error: the parrot's cashed in 'is chips!");
 /* 9001: disable welcome notices ***/
-user_pref("browser.startup.homepage_override.mstone", "ignore");
+user_pref("browser.startup.homepage_override.mstone", "ignore"); // [HIDDEN PREF]
 /* 9002: disable General>Browsing>Recommend extensions/features as you browse [FF67+] ***/
 user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false);
 user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false);
@@ -1209,6 +1176,15 @@ user_pref("security.family_safety.mode", 0);
    // [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion
    // [-] https://bugzilla.mozilla.org/1697151
    // user_pref("permissions.delegation.enabled", false);
+// FF119
+// 0211: use en-US locale regardless of the system or region locale
+   // [SETUP-WEB] May break some input methods e.g xim/ibus for CJK languages [1]
+   // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=867501,1629630
+   // [-] https://bugzilla.mozilla.org/1846224
+   // user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
+// 0711: disable skipping DoH when parental controls are enabled [FF70+]
+   // [-] https://bugzilla.mozilla.org/1586941
+user_pref("network.dns.skipTRR-when-parental-control-enabled", false);
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From e4dd5aa4283560e538b4009039175018e24cdc28 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Fri, 24 Nov 2023 13:35:14 +0000
Subject: [PATCH 1128/1147] updater.sh v4.0

- removed group root/wheel check
---
 updater.sh | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/updater.sh b/updater.sh
index 88e6e33..72c77fc 100755
--- a/updater.sh
+++ b/updater.sh
@@ -2,7 +2,7 @@
 
 ## arkenfox user.js updater for macOS and Linux
 
-## version: 3.9
+## version: 4.0
 ## Author: Pat Johnson (@overdodactyl)
 ## Additional contributors: @earthlng, @ema-pe, @claustromaniac, @infinitewarp
 
@@ -393,11 +393,11 @@ update_updater "$@"
 getProfilePath # updates PROFILE_PATH or exits on error
 cd "$PROFILE_PATH" || exit 1
 
-# Check if any files have the owner/group as root/wheel.
-if [ -n "$(find ./ -user 0 -o -group 0)" ]; then
+# Check if any files have the owner as root/wheel.
+if [ -n "$(find ./ -user 0)" ]; then
 	printf 'It looks like this script was previously run with elevated privileges,
 you will need to change ownership of the following files to your user:\n'
-	find . -user 0 -o -group 0
+	find . -user 0
 	cd "$CURRDIR"
 	exit 1
 fi

From 4a510a4b4ceda8a177831a77309f2faccf7e18d5 Mon Sep 17 00:00:00 2001
From: earthlng <earthlng@users.noreply.github.com>
Date: Fri, 24 Nov 2023 13:38:25 +0000
Subject: [PATCH 1129/1147] prefsCleaner.sh v2.1

- remove group root/wheel check
---
 prefsCleaner.sh | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/prefsCleaner.sh b/prefsCleaner.sh
index 6586609..b9739b2 100755
--- a/prefsCleaner.sh
+++ b/prefsCleaner.sh
@@ -2,7 +2,7 @@
 
 ## prefs.js cleaner for Linux/Mac
 ## author: @claustromaniac
-## version: 2.0
+## version: 2.1
 
 ## special thanks to @overdodactyl and @earthlng for a few snippets that I stol..*cough* borrowed from the updater.sh
 
@@ -132,13 +132,13 @@ done
 ## change directory to the Firefox profile directory
 cd "$(dirname "${SCRIPT_FILE}")"
 
-# Check if running as root and if any files have the owner/group as root/wheel.
+# Check if running as root and if any files have the owner as root/wheel.
 if [ "${EUID:-"$(id -u)"}" -eq 0 ]; then
 	fQuit 1 "You shouldn't run this with elevated privileges (such as with doas/sudo)."
-elif [ -n "$(find ./ -user 0 -o -group 0)" ]; then
+elif [ -n "$(find ./ -user 0)" ]; then
 	printf 'It looks like this script was previously run with elevated privileges,
 you will need to change ownership of the following files to your user:\n'
-	find . -user 0 -o -group 0
+	find . -user 0
 	fQuit 1
 fi
 
@@ -148,7 +148,7 @@ echo -e "\n\n"
 echo "                   ╔══════════════════════════╗"
 echo "                   ║     prefs.js cleaner     ║"
 echo "                   ║    by claustromaniac     ║"
-echo "                   ║           v2.0           ║"
+echo "                   ║           v2.1           ║"
 echo "                   ╚══════════════════════════╝"
 echo -e "\nThis script should be run from your Firefox profile directory.\n"
 echo "It will remove any entries from prefs.js that also exist in user.js."

From 33a84b608c8a1f871c6ce9c4d2b932dc57078fae Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 4 Feb 2024 20:09:30 +0000
Subject: [PATCH 1130/1147] v122 (#1764)

---
 user.js | 37 +++++++++++++++++++++++++++++++------
 1 file changed, 31 insertions(+), 6 deletions(-)

diff --git a/user.js b/user.js
index 1772671..bd7c46f 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 20 November 2023
-* version: 119
+*    date: 5 February 2024
+* version: 122
 *    urls: https://github.com/arkenfox/user.js [repo]
 *        : https://arkenfox.github.io/gui/ [interactive]
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
@@ -56,6 +56,7 @@
   2600: MISCELLANEOUS
   2700: ETP (ENHANCED TRACKING PROTECTION)
   2800: SHUTDOWN & SANITIZING
+  4000: FPP (fingerprintingProtection)
   4500: RFP (resistFingerprinting)
   5000: OPTIONAL OPSEC
   5500: OPTIONAL HARDENING
@@ -686,8 +687,32 @@ user_pref("privacy.cpd.cookies", false);
  * which will display a blank value, and are not guaranteed to work ***/
 user_pref("privacy.sanitize.timeSpan", 0);
 
+/*** [SECTION 4000]: FPP (fingerprintingProtection)
+   RFP (4501) overrides FPP
+
+   In FF118+ FPP is on by default in private windows (4001) and in FF119+ is controlled
+   by ETP (2701). FPP will also use Remote Services in future to relax FPP protections
+   on a per site basis for compatibility (pref coming).
+
+   1826408 - restrict fonts to system (kBaseFonts + kLangPackFonts) (Windows, Mac, some Linux)
+      https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc
+   1858181 - subtly randomize canvas per eTLD+1, per session and per window-mode (FF120+)
+***/
+user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
+/* 4001: enable FPP in PB mode [FF114+]
+ * [NOTE] In FF119+, FPP for all modes (7106) is enabled with ETP Strict (2701) ***/
+   // user_pref("privacy.fingerprintingProtection.pbmode", true); // [DEFAULT: true FF118+]
+/* 4002: set global FPP overrides [FF114+]
+ * Controls what protections FPP uses globally, including "RFPTargets" (despite the name these are
+ * not used by RFP) e.g. "+AllTargets,-CSSPrefersColorScheme" or "-AllTargets,+CanvasRandomization"
+ * [NOTE] Be aware that not all RFP protections are necessarily in RFPTargets
+ * [WARNING] Not recommended. Either use RFP or FPP at defaults
+ * [1] https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPTargets.inc ***/
+   // user_pref("privacy.fingerprintingProtection.overrides", "");
+
 /*** [SECTION 4500]: RFP (resistFingerprinting)
-   RFP covers a wide range of ongoing fingerprinting solutions.
+   RFP overrides FPP (4000)
+
    It is an all-or-nothing buy in: you cannot pick and choose what parts you want
    [TEST] https://arkenfox.github.io/TZP/tzp.html
 
@@ -741,8 +766,8 @@ user_pref("privacy.sanitize.timeSpan", 0);
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable RFP
- * [SETUP-WEB] RFP can cause some website breakage: mainly canvas, use a canvas site exception via the urlbar
- * RFP also has a few side effects: mainly timezone is UTC0, and websites will prefer light theme
+ * [SETUP-WEB] RFP can cause some website breakage: mainly canvas, use a canvas site exception via the urlbar.
+ * RFP also has a few side effects: mainly timezone is UTC, and websites will prefer light theme
  * [NOTE] pbmode applies if true and the original pref is false
  * [1] https://bugzilla.mozilla.org/418986 ***/
 user_pref("privacy.resistFingerprinting", true); // [FF41+]
@@ -1069,7 +1094,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("privacy.fingerprintingProtection", true); // [FF114+] [ETP FF119+]
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault", true);
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true); // [FF100+]
-   // user_pref("privacy.partition.network_state.ocsp_cache", true);
+   // user_pref("privacy.partition.network_state.ocsp_cache", true); // [DEFAULT: true FF123+]
    // user_pref("privacy.query_stripping.enabled", true); // [FF101+]
    // user_pref("privacy.trackingprotection.enabled", true);
    // user_pref("privacy.trackingprotection.socialtracking.enabled", true);

From c2f191448c0af23c961053b8e450f6c8a71e5567 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 6 Jun 2024 20:21:14 +0000
Subject: [PATCH 1131/1147] v126 (#1816)

---
 user.js | 127 +++++++++++++++++++++++++++++++++++++++-----------------
 1 file changed, 89 insertions(+), 38 deletions(-)

diff --git a/user.js b/user.js
index bd7c46f..fdc692e 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 5 February 2024
-* version: 122
+*    date: 7 June 2024
+* version: 126
 *    urls: https://github.com/arkenfox/user.js [repo]
 *        : https://arkenfox.github.io/gui/ [interactive]
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
@@ -35,7 +35,7 @@
     - It is recommended to not use the updater, or you will get a later version which may cause issues.
       So you should manually append your overrides (and keep a copy), and manually update when you
       change ESR releases (arkenfox is already past that release)
-    - If you decide to keep updating, then the onus is on - also see section 9999
+    - If you decide to keep updating, then the onus is on you - also see section 9999
 
 * INDEX:
 
@@ -95,8 +95,8 @@ user_pref("browser.startup.homepage", "about:blank");
 user_pref("browser.newtabpage.enabled", false);
 /* 0105: disable sponsored content on Firefox Home (Activity Stream)
  * [SETTING] Home>Firefox Home Content ***/
-user_pref("browser.newtabpage.activity-stream.showSponsored", false); // [FF58+] Pocket > Sponsored Stories
-user_pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); // [FF83+] Sponsored shortcuts
+user_pref("browser.newtabpage.activity-stream.showSponsored", false); // [FF58+]
+user_pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); // [FF83+] Shortcuts>Sponsored shortcuts
 /* 0106: clear default topsites
  * [NOTE] This does not block you from adding your own ***/
 user_pref("browser.newtabpage.activity-stream.default.sites", "");
@@ -158,9 +158,6 @@ user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // [FF57+]
 user_pref("toolkit.telemetry.coverage.opt-out", true); // [HIDDEN PREF]
 user_pref("toolkit.coverage.opt-out", true); // [FF64+] [HIDDEN PREF]
 user_pref("toolkit.coverage.endpoint.base", "");
-/* 0334: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
- * Defense-in-depth: currently covered by 0331 ***/
-user_pref("browser.ping-centre.telemetry", false);
 /* 0335: disable Firefox Home (Activity Stream) telemetry ***/
 user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
 user_pref("browser.newtabpage.activity-stream.telemetry", false);
@@ -303,12 +300,14 @@ user_pref("_user.js.parrot", "0800 syntax error: the parrot's ceased to be!");
  * [1] https://bugzilla.mozilla.org/1348275 ***/
 user_pref("browser.urlbar.speculativeConnect.enabled", false);
 /* 0802: disable location bar contextual suggestions
- * [SETTING] Privacy & Security>Address Bar>Suggestions from...
+ * [NOTE] The UI is controlled by the .enabled pref
+ * [SETTING] Search>Address Bar>Suggestions from...
  * [1] https://blog.mozilla.org/data/2021/09/15/data-and-firefox-suggest/ ***/
-user_pref("browser.urlbar.suggest.quicksuggest.nonsponsored", false); // [FF95+]
-user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false); // [FF92+]
+   // user_pref("browser.urlbar.quicksuggest.enabled", false); // [FF92+] [DEFAULT: false]
+   // user_pref("browser.urlbar.suggest.quicksuggest.nonsponsored", false); // [FF95+] [DEFAULT: false]
+   // user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false); // [FF92+] [DEFAULT: false]
 /* 0803: disable live search suggestions
- * [NOTE] Both must be true for the location bar to work
+ * [NOTE] Both must be true for live search to work in the location bar
  * [SETUP-CHROME] Override these if you trust and use a privacy respecting search engine
  * [SETTING] Search>Provide search suggestions | Show search suggestions in address bar results ***/
 user_pref("browser.search.suggest.enabled", false);
@@ -321,8 +320,9 @@ user_pref("browser.urlbar.addons.featureGate", false); // [FF115+]
 user_pref("browser.urlbar.mdn.featureGate", false); // [FF117+] [HIDDEN PREF]
 user_pref("browser.urlbar.pocket.featureGate", false); // [FF116+] [DEFAULT: false]
 user_pref("browser.urlbar.weather.featureGate", false); // [FF108+] [DEFAULT: false]
+user_pref("browser.urlbar.yelp.featureGate", false); // [FF124+] [DEFAULT: false]
 /* 0807: disable urlbar clipboard suggestions [FF118+] ***/
-   // user_pref("browser.urlbar.clipboard.featureGate", false); // [DEFAULT: false]
+   // user_pref("browser.urlbar.clipboard.featureGate", false); // [DEFAULT: true FF125+]
 /* 0810: disable search and form history
  * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
  * [NOTE] We also clear formdata on exit (2811)
@@ -332,7 +332,7 @@ user_pref("browser.urlbar.weather.featureGate", false); // [FF108+] [DEFAULT: fa
 user_pref("browser.formfill.enable", false);
 /* 0815: disable tab-to-search [FF85+]
  * Alternatively, you can exclude on a per-engine basis by unchecking them in Options>Search
- * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest>Search engines ***/
+ * [SETTING] Search>Address Bar>When using the address bar, suggest>Search engines ***/
    // user_pref("browser.urlbar.suggest.engines", false);
 /* 0820: disable coloring of visited links
  * [SETUP-HARDEN] Bulk rapid history sniffing was mitigated in 2010 [1][2]. Slower and more expensive
@@ -412,7 +412,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
  * but the problem is that the browser can't know that. Setting this pref to true is the only way for the
  * browser to ensure there will be no unsafe renegotiations on the channel between the browser and the server
  * [SETUP-WEB] SSL_ERROR_UNSAFE_NEGOTIATION: is it worth overriding this for that one site?
- * [STATS] SSL Labs (Nov 2023) reports over 99.5% of top sites have secure renegotiation [4]
+ * [STATS] SSL Labs (May 2024) reports over 99.7% of top sites have secure renegotiation [4]
  * [1] https://wiki.mozilla.org/Security:Renegotiation
  * [2] https://datatracker.ietf.org/doc/html/rfc5746
  * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
@@ -517,6 +517,12 @@ user_pref("privacy.userContext.ui.enabled", true);
  * [NOTE] The menu is always shown on long press and right click
  * [SETTING] General>Tabs>Enable Container Tabs>Settings>Select a container for each new tab ***/
    // user_pref("privacy.userContext.newTabContainerOnLeftClick.enabled", true);
+/* 1703: set external links to open in site-specific containers [FF123+]
+ * [SETUP-WEB] Depending on your container extension(s) and their settings
+ * true=Firefox will not choose a container (so your extension can)
+ * false=Firefox will choose the container/no-container (default)
+ * [1] https://bugzilla.mozilla.org/1874599 ***/
+   // user_pref("browser.link.force_default_user_context_id_for_external_opens", true);
 
 /*** [SECTION 2000]: PLUGINS / MEDIA / WEBRTC ***/
 user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
@@ -583,6 +589,11 @@ user_pref("pdfjs.disabled", false); // [DEFAULT: false]
 user_pref("pdfjs.enableScripting", false); // [FF86+]
 /* 2624: disable middle click on new tab button opening URLs or searches using clipboard [FF115+] */
 user_pref("browser.tabs.searchclipboardfor.middleclick", false); // [DEFAULT: false NON-LINUX]
+/* 2630: disable content analysis by DLP (Data Loss Prevention) agents
+ * DLP agents are background processes on managed computers that allow enterprises to monitor locally running
+ * applications for data exfiltration events, which they can allow/block based on customer defined DLP policies.
+ * [1] https://github.com/chromium/content_analysis_sdk */
+user_pref("browser.contentanalysis.default_allow", false); // [FF124+] [DEFAULT: false]
 
 /** DOWNLOADS ***/
 /* 2651: enable user interaction for security by always asking where to download
@@ -636,51 +647,70 @@ user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!"
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes | Settings ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
 
-/** SANITIZE ON SHUTDOWN: IGNORES "ALLOW" SITE EXCEPTIONS ***/
+/** SANITIZE ON SHUTDOWN: IGNORES "ALLOW" SITE EXCEPTIONS | v2 migration is FF128+ ***/
 /* 2811: set/enforce what items to clear on shutdown (if 2810 is true) [SETUP-CHROME]
- * [NOTE] If "history" is true, downloads will also be cleared
- * [NOTE] "sessions": Active Logins: refers to HTTP Basic Authentication [1], not logins via cookies
- * [1] https://en.wikipedia.org/wiki/Basic_access_authentication ***/
+ * [NOTE] If "history" is true, downloads will also be cleared ***/
 user_pref("privacy.clearOnShutdown.cache", true);     // [DEFAULT: true]
+user_pref("privacy.clearOnShutdown_v2.cache", true);  // [FF128+] [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.downloads", true); // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.formdata", true);  // [DEFAULT: true]
 user_pref("privacy.clearOnShutdown.history", true);   // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.sessions", true);  // [DEFAULT: true]
+user_pref("privacy.clearOnShutdown_v2.historyFormDataAndDownloads", true); // [FF128+] [DEFAULT: true]
    // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false]
+   // user_pref("privacy.clearOnShutdown_v2.siteSettings", false); // [FF128+] [DEFAULT: false]
 /* 2812: set Session Restore to clear on shutdown (if 2810 is true) [FF34+]
  * [NOTE] Not needed if Session Restore is not used (0102) or it is already cleared with history (2811)
  * [NOTE] If true, this prevents resuming from crashes (also see 5008) ***/
    // user_pref("privacy.clearOnShutdown.openWindows", true);
 
-/** SANITIZE ON SHUTDOWN: RESPECTS "ALLOW" SITE EXCEPTIONS FF103+ ***/
+/** SANITIZE ON SHUTDOWN: RESPECTS "ALLOW" SITE EXCEPTIONS FF103+ | v2 migration is FF128+ ***/
 /* 2815: set "Cookies" and "Site Data" to clear on shutdown (if 2810 is true) [SETUP-CHROME]
  * [NOTE] Exceptions: A "cookie" block permission also controls "offlineApps" (see note below).
  * serviceWorkers require an "Allow" permission. For cross-domain logins, add exceptions for
  * both sites e.g. https://www.youtube.com (site) + https://accounts.google.com (single sign on)
  * [NOTE] "offlineApps": Offline Website Data: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
+ * [NOTE] "sessions": Active Logins (has no site exceptions): refers to HTTP Basic Authentication [1], not logins via cookies
  * [WARNING] Be selective with what sites you "Allow", as they also disable partitioning (1767271)
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow (when on the website in question)
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
+ * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings
+ * [1] https://en.wikipedia.org/wiki/Basic_access_authentication ***/
 user_pref("privacy.clearOnShutdown.cookies", true); // Cookies
 user_pref("privacy.clearOnShutdown.offlineApps", true); // Site Data
+user_pref("privacy.clearOnShutdown.sessions", true);  // Active Logins [DEFAULT: true]
+user_pref("privacy.clearOnShutdown_v2.cookiesAndStorage", true) // Cookies, Site Data, Active Logins [FF128+]
 
-/** SANITIZE MANUAL: IGNORES "ALLOW" SITE EXCEPTIONS ***/
-/* 2820: reset default items to clear with Ctrl-Shift-Del [SETUP-CHROME]
- * This dialog can also be accessed from the menu History>Clear Recent History
+/** SANITIZE SITE DATA: IGNORES "ALLOW" SITE EXCEPTIONS ***/
+/* 2820: set manual "Clear Data" items [SETUP-CHROME] [FF128+]
+ * Firefox remembers your last choices. This will reset them when you start Firefox
+ * [SETTING] Privacy & Security>Browser Privacy>Cookies and Site Data>Clear Data ***/
+user_pref("privacy.clearSiteData.cache", true);
+user_pref("privacy.clearSiteData.cookiesAndStorage", false); // keep false until it respects "allow" site exceptions
+user_pref("privacy.clearSiteData.historyFormDataAndDownloads", true);
+   // user_pref("privacy.clearSiteData.siteSettings", false);
+
+/** SANITIZE HISTORY: IGNORES "ALLOW" SITE EXCEPTIONS | clearHistory migration is FF128+ ***/
+/* 2830: set manual "Clear History" items, also via Ctrl-Shift-Del [SETUP-CHROME]
  * Firefox remembers your last choices. This will reset them when you start Firefox
  * [NOTE] Regardless of what you set "downloads" to, as soon as the dialog
- * for "Clear Recent History" is opened, it is synced to the same as "history" ***/
+ * for "Clear Recent History" is opened, it is synced to the same as "history"
+ * [SETTING] Privacy & Security>History>Custom Settings>Clear History ***/
 user_pref("privacy.cpd.cache", true);    // [DEFAULT: true]
+user_pref("privacy.clearHistory.cache", true);
 user_pref("privacy.cpd.formdata", true); // [DEFAULT: true]
 user_pref("privacy.cpd.history", true);  // [DEFAULT: true]
+   // user_pref("privacy.cpd.downloads", true); // not used, see note above
+user_pref("privacy.clearHistory.historyFormDataAndDownloads", true);
+user_pref("privacy.cpd.cookies", false);
 user_pref("privacy.cpd.sessions", true); // [DEFAULT: true]
 user_pref("privacy.cpd.offlineApps", false); // [DEFAULT: false]
-user_pref("privacy.cpd.cookies", false);
-   // user_pref("privacy.cpd.downloads", true); // not used, see note above
+user_pref("privacy.clearHistory.cookiesAndStorage", false);
    // user_pref("privacy.cpd.openWindows", false); // Session Restore
    // user_pref("privacy.cpd.passwords", false);
    // user_pref("privacy.cpd.siteSettings", false);
-/* 2822: reset default "Time range to clear" for "Clear Recent History" (2820)
+   // user_pref("privacy.clearHistory.siteSettings", false);
+
+/** SANITIZE MANUAL: TIMERANGE ***/
+/* 2840: set "Time range to clear" for "Clear Data" (2820) and "Clear History" (2830)
  * Firefox remembers your last choice. This will reset the value when you start Firefox
  * 0=everything, 1=last hour, 2=last two hours, 3=last four hours, 4=today
  * [NOTE] Values 5 (last 5 minutes) and 6 (last 24 hours) are not listed in the dropdown,
@@ -692,15 +722,15 @@ user_pref("privacy.sanitize.timeSpan", 0);
 
    In FF118+ FPP is on by default in private windows (4001) and in FF119+ is controlled
    by ETP (2701). FPP will also use Remote Services in future to relax FPP protections
-   on a per site basis for compatibility (pref coming).
+   on a per site basis for compatibility (4003).
 
    1826408 - restrict fonts to system (kBaseFonts + kLangPackFonts) (Windows, Mac, some Linux)
       https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc
    1858181 - subtly randomize canvas per eTLD+1, per session and per window-mode (FF120+)
 ***/
-user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
+user_pref("_user.js.parrot", "4000 syntax error: the parrot's bereft of life!");
 /* 4001: enable FPP in PB mode [FF114+]
- * [NOTE] In FF119+, FPP for all modes (7106) is enabled with ETP Strict (2701) ***/
+ * [NOTE] In FF119+, FPP for all modes (7016) is enabled with ETP Strict (2701) ***/
    // user_pref("privacy.fingerprintingProtection.pbmode", true); // [DEFAULT: true FF118+]
 /* 4002: set global FPP overrides [FF114+]
  * Controls what protections FPP uses globally, including "RFPTargets" (despite the name these are
@@ -709,6 +739,8 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
  * [WARNING] Not recommended. Either use RFP or FPP at defaults
  * [1] https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPTargets.inc ***/
    // user_pref("privacy.fingerprintingProtection.overrides", "");
+/* 4003: disable remote FPP overrides [FF127+] ***/
+   // user_pref("privacy.fingerprintingProtection.remoteOverrides.enabled"; false);
 
 /*** [SECTION 4500]: RFP (resistFingerprinting)
    RFP overrides FPP (4000)
@@ -720,7 +752,6 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
 
     418986 - limit window.screen & CSS media queries (FF41)
    1281949 - spoof screen orientation (FF50)
-   1330890 - spoof timezone as UTC0 (FF55)
    1360039 - spoof navigator.hardwareConcurrency as 2 (FF55)
  FF56
    1333651 - spoof User Agent & Navigator API
@@ -740,7 +771,7 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
    1372073 - spoof/block fingerprinting in MediaDevices API (FF59)
       Spoof: enumerate devices as one "Internal Camera" and one "Internal Microphone"
       Block: suppresses the ondevicechange event
-   1039069 - warn when language prefs are not set to "en*" (also see 0210, 0211) (FF59)
+   1039069 - warn when language prefs are not set to "en*" (FF59)
    1222285 & 1433592 - spoof keyboard events and suppress keyboard modifier events (FF59)
       Spoofing mimics the content language of the document. Currently it only supports en-US.
       Modifier events suppressed are SHIFT and both ALT keys. Chrome is not affected.
@@ -763,6 +794,9 @@ user_pref("_user.js.parrot", "1400 syntax error: the parrot's bereft of life!");
    1692609 - reduce JS timing precision to 16.67ms (previously FF55+ was 100ms) (FF102)
    1422237 - return "srgb" with color-gamut (FF110)
    1794628 - return "none" with inverted-colors (FF114)
+   1554751 - return devicePixelRatio as 2 (previously FF41+ was 1) (FF127)
+   1787790 - normalize system fonts (FF128)
+   1835987 - spoof timezone as Atlantic/Reykjavik (previously FF55+ was UTC) (FF128)
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable RFP
@@ -796,6 +830,12 @@ user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
  * [WARNING] DO NOT USE unless testing, see [1] comment 12
  * [1] https://bugzilla.mozilla.org/1635603 ***/
    // user_pref("privacy.resistFingerprinting.exemptedDomains", "*.example.invalid");
+/* 4506: disable RFP spoof english prompt [FF59+]
+ * 0=prompt, 1=disabled, 2=enabled (requires RFP)
+ * [NOTE] When changing from value 2, preferred languages ('intl.accept_languages') is not reset.
+ * [SETUP-WEB] when enabled, sets 'en-US, en' for displaying pages and 'en-US' as locale.
+ * [SETTING] General>Language>Choose your preferred language for displaying pages>Choose>Request English... ***/
+user_pref("privacy.spoof_english", 1);
 /* 4510: disable using system colors
  * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
 user_pref("browser.display.use_system_colors", false); // [DEFAULT: false NON-WINDOWS]
@@ -867,7 +907,7 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
  * [1] https://bugzilla.mozilla.org/1281959 ***/
    // user_pref("browser.download.forbid_open_with", true);
 /* 5010: disable location bar suggestion types
- * [SETTING] Privacy & Security>Address Bar>When using the address bar, suggest ***/
+ * [SETTING] Search>Address Bar>When using the address bar, suggest ***/
    // user_pref("browser.urlbar.suggest.history", false);
    // user_pref("browser.urlbar.suggest.bookmark", false);
    // user_pref("browser.urlbar.suggest.openpage", false);
@@ -1108,7 +1148,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [1] https://blog.mozilla.org/en/products/firefox/block-notification-requests/ ***/
    // user_pref("dom.webnotifications.enabled", false);
 /* 7019: disable Push Notifications [FF44+]
- * [WHY] Push requires subscription
+ * [WHY] Website "push" requires subscription, and the API is required for CRLite (1224)
  * [NOTE] To remove all subscriptions, reset "dom.push.userAgentID"
  * [1] https://support.mozilla.org/kb/push-notifications-firefox ***/
    // user_pref("dom.push.enabled", false);
@@ -1119,6 +1159,10 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [1] https://groups.google.com/g/discuss-webrtc/c/6stQXi72BEU/m/2FwZd24UAQAJ
  * [2] https://datatracker.ietf.org/doc/html/draft-ietf-mmusic-mdns-ice-candidates#section-3.1.1 ***/
    // user_pref("media.peerconnection.enabled", false);
+/* 7021: enable GPC (Global Privacy Control) in non-PB windows
+ * [WHY] Passive and active fingerprinting. Mostly redundant with Tracking Protection
+ * in ETP Strict (2701) and sanitizing on close (2800s) ***/
+   // user_pref("privacy.globalprivacycontrol.enabled", true);
 
 /*** [SECTION 8000]: DON'T BOTHER: FINGERPRINTING
    [WHY] They are insufficient to help anti-fingerprinting and do more harm than good
@@ -1156,8 +1200,6 @@ user_pref("browser.startup.homepage_override.mstone", "ignore"); // [HIDDEN PREF
 /* 9002: disable General>Browsing>Recommend extensions/features as you browse [FF67+] ***/
 user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false);
 user_pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false);
-/* 9003: disable What's New toolbar icon [FF69+] ***/
-user_pref("browser.messaging-system.whatsNewPanel.enabled", false);
 /* 9004: disable search terms [FF110+]
  * [SETTING] Search>Search Bar>Use the address bar for search and navigation>Show search terms instead of URL... ***/
 user_pref("browser.urlbar.showSearchTerms.enabled", false);
@@ -1210,6 +1252,15 @@ user_pref("security.family_safety.mode", 0);
 // 0711: disable skipping DoH when parental controls are enabled [FF70+]
    // [-] https://bugzilla.mozilla.org/1586941
 user_pref("network.dns.skipTRR-when-parental-control-enabled", false);
+// FF123
+// 0334: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
+   // Defense-in-depth: currently covered by 0331
+   // [-] https://bugzilla.mozilla.org/1868988
+user_pref("browser.ping-centre.telemetry", false);
+// FF126
+// 9003: disable What's New toolbar icon [FF69+]
+   // [-] https://bugzilla.mozilla.org/1724300
+user_pref("browser.messaging-system.whatsNewPanel.enabled", false);
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From 9655743d8cc558e04e0742ff10d51cdda1b3c9ff Mon Sep 17 00:00:00 2001
From: eleius <42178466+eleius@users.noreply.github.com>
Date: Fri, 7 Jun 2024 20:53:34 +0000
Subject: [PATCH 1132/1147] fixup missing semicolon (#1850)

---
 user.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user.js b/user.js
index fdc692e..01954cc 100644
--- a/user.js
+++ b/user.js
@@ -677,7 +677,7 @@ user_pref("privacy.clearOnShutdown_v2.historyFormDataAndDownloads", true); // [F
 user_pref("privacy.clearOnShutdown.cookies", true); // Cookies
 user_pref("privacy.clearOnShutdown.offlineApps", true); // Site Data
 user_pref("privacy.clearOnShutdown.sessions", true);  // Active Logins [DEFAULT: true]
-user_pref("privacy.clearOnShutdown_v2.cookiesAndStorage", true) // Cookies, Site Data, Active Logins [FF128+]
+user_pref("privacy.clearOnShutdown_v2.cookiesAndStorage", true); // Cookies, Site Data, Active Logins [FF128+]
 
 /** SANITIZE SITE DATA: IGNORES "ALLOW" SITE EXCEPTIONS ***/
 /* 2820: set manual "Clear Data" items [SETUP-CHROME] [FF128+]

From 47cbf5b9740ef59ed866874346d3fee3379f8da3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 7 Jun 2024 21:36:53 +0000
Subject: [PATCH 1133/1147] fixup sysntax, tidy

---
 user.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/user.js b/user.js
index 01954cc..8087d85 100644
--- a/user.js
+++ b/user.js
@@ -322,7 +322,7 @@ user_pref("browser.urlbar.pocket.featureGate", false); // [FF116+] [DEFAULT: fal
 user_pref("browser.urlbar.weather.featureGate", false); // [FF108+] [DEFAULT: false]
 user_pref("browser.urlbar.yelp.featureGate", false); // [FF124+] [DEFAULT: false]
 /* 0807: disable urlbar clipboard suggestions [FF118+] ***/
-   // user_pref("browser.urlbar.clipboard.featureGate", false); // [DEFAULT: true FF125+]
+   // user_pref("browser.urlbar.clipboard.featureGate", false);
 /* 0810: disable search and form history
  * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
  * [NOTE] We also clear formdata on exit (2811)
@@ -740,7 +740,7 @@ user_pref("_user.js.parrot", "4000 syntax error: the parrot's bereft of life!");
  * [1] https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPTargets.inc ***/
    // user_pref("privacy.fingerprintingProtection.overrides", "");
 /* 4003: disable remote FPP overrides [FF127+] ***/
-   // user_pref("privacy.fingerprintingProtection.remoteOverrides.enabled"; false);
+   // user_pref("privacy.fingerprintingProtection.remoteOverrides.enabled", false);
 
 /*** [SECTION 4500]: RFP (resistFingerprinting)
    RFP overrides FPP (4000)

From 6446d73cf572fcdf631534a5a51276a64eec4a2d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Fri, 14 Jun 2024 06:14:26 +0000
Subject: [PATCH 1134/1147] add deprecated since FF119

---
 scratchpad-scripts/arkenfox-cleanup.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 6956979..1948d07 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -6,7 +6,7 @@
   There is an archived version at https://github.com/arkenfox/user.js/issues/123
   if you want the full list since jesus
 
-  Last updated: 2-November-2023
+  Last updated: 14-June-2024
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -36,6 +36,8 @@
   const aPREFS = [
     /* DEPRECATED */
     /* 116-128 */
+    'browser.messaging-system.whatsNewPanel.enabled', // 126
+    'browser.ping-centre.telemetry', // 123
     'dom.webnotifications.serviceworker.enabled', // 117
     'javascript.use_us_english_locale', // 119
     'layout.css.font-visibility.private', // 118

From 23caf6961483e0e55544cd4f3594734d0aa35cf0 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 22 Jun 2024 15:44:54 +0000
Subject: [PATCH 1135/1147] v127 deprecated

---
 scratchpad-scripts/arkenfox-cleanup.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 1948d07..5155259 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -6,7 +6,7 @@
   There is an archived version at https://github.com/arkenfox/user.js/issues/123
   if you want the full list since jesus
 
-  Last updated: 14-June-2024
+  Last updated: 23-June-2024
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -36,6 +36,7 @@
   const aPREFS = [
     /* DEPRECATED */
     /* 116-128 */
+    'browser.contentanalysis.default_allow', // 127
     'browser.messaging-system.whatsNewPanel.enabled', // 126
     'browser.ping-centre.telemetry', // 123
     'dom.webnotifications.serviceworker.enabled', // 117
@@ -47,6 +48,7 @@
     'network.dns.skipTRR-when-parental-control-enabled', // 119
     'permissions.delegation.enabled', // 118
     'security.family_safety.mode', // 117
+    'widget.non-native-theme.enabled', // 127
     /* 103-115 */
     'browser.cache.offline.enable', // 115
     'extensions.formautofill.heuristics.enabled', // 114

From ff5c959cb9b5a65ede9aab82b00cbb283b160e14 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 9 Jul 2024 05:49:23 +0000
Subject: [PATCH 1136/1147] geo.provider*

---
 scratchpad-scripts/arkenfox-cleanup.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 5155259..50bcb8a 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -6,7 +6,7 @@
   There is an archived version at https://github.com/arkenfox/user.js/issues/123
   if you want the full list since jesus
 
-  Last updated: 23-June-2024
+  Last updated: 9-July-2024
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -75,6 +75,8 @@
     'browser.fixup.alternate.enabled',
     'browser.taskbar.previews.enable',
     'browser.urlbar.dnsResolveSingleWordsAfterSearch',
+    'geo.provider.network.url',
+    'geo.provider.network.logging.enabled',
     'media.gmp-widevinecdm.enabled',
     'network.protocol-handler.external.ms-windows-store',
     'privacy.partition.always_partition_third_party_non_cookie_storage',

From 11582f905a21971eb5869b48ef8c3f2d4eac4d89 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Tue, 6 Aug 2024 04:37:00 +0000
Subject: [PATCH 1137/1147] geo.provider.use_gpsd

https://bugzilla.mozilla.org/show_bug.cgi?id=1803234 - removed in FF131

and it doesn't work: https://bugzilla.mozilla.org/show_bug.cgi?id=1763347
---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 50bcb8a..21e3438 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -6,7 +6,7 @@
   There is an archived version at https://github.com/arkenfox/user.js/issues/123
   if you want the full list since jesus
 
-  Last updated: 9-July-2024
+  Last updated: 6-August-2024
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -77,6 +77,7 @@
     'browser.urlbar.dnsResolveSingleWordsAfterSearch',
     'geo.provider.network.url',
     'geo.provider.network.logging.enabled',
+    'geo.provider.use_gpsd',
     'media.gmp-widevinecdm.enabled',
     'network.protocol-handler.external.ms-windows-store',
     'privacy.partition.always_partition_third_party_non_cookie_storage',

From f906f7f3b41fe3f6aaa744980431f4fdcd086379 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 26 Aug 2024 08:41:28 +0000
Subject: [PATCH 1138/1147] v128 (#1862)

---
 user.js | 122 ++++++++++++++++++++++++++++++++------------------------
 1 file changed, 69 insertions(+), 53 deletions(-)

diff --git a/user.js b/user.js
index 8087d85..1dbf7d2 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 7 June 2024
-* version: 126
+*    date: 26 August 2024
+* version: 128
 *    urls: https://github.com/arkenfox/user.js [repo]
 *        : https://arkenfox.github.io/gui/ [interactive]
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
@@ -57,7 +57,7 @@
   2700: ETP (ENHANCED TRACKING PROTECTION)
   2800: SHUTDOWN & SANITIZING
   4000: FPP (fingerprintingProtection)
-  4500: RFP (resistFingerprinting)
+  4500: OPTIONAL RFP (resistFingerprinting)
   5000: OPTIONAL OPSEC
   5500: OPTIONAL HARDENING
   6000: DON'T TOUCH
@@ -103,14 +103,9 @@ user_pref("browser.newtabpage.activity-stream.default.sites", "");
 
 /*** [SECTION 0200]: GEOLOCATION ***/
 user_pref("_user.js.parrot", "0200 syntax error: the parrot's definitely deceased!");
-/* 0201: use Mozilla geolocation service instead of Google if permission is granted [FF74+]
- * Optionally enable logging to the console (defaults to false) ***/
-user_pref("geo.provider.network.url", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
-   // user_pref("geo.provider.network.logging.enabled", true); // [HIDDEN PREF]
 /* 0202: disable using the OS's geolocation service ***/
 user_pref("geo.provider.ms-windows-location", false); // [WINDOWS]
 user_pref("geo.provider.use_corelocation", false); // [MAC]
-user_pref("geo.provider.use_gpsd", false); // [LINUX] [HIDDEN PREF]
 user_pref("geo.provider.use_geoclue", false); // [FF102+] [LINUX]
 
 /*** [SECTION 0300]: QUIETER FOX ***/
@@ -236,7 +231,7 @@ user_pref("network.prefetch-next", false);
 /* 0602: disable DNS prefetching
  * [1] https://developer.mozilla.org/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control ***/
 user_pref("network.dns.disablePrefetch", true);
-   // user_pref("network.dns.disablePrefetchFromHTTPS", true); // [DEFAULT: true]
+user_pref("network.dns.disablePrefetchFromHTTPS", true);
 /* 0603: disable predictor / prefetching ***/
 user_pref("network.predictor.enabled", false);
 user_pref("network.predictor.enable-prefetch", false); // [FF48+] [DEFAULT: false]
@@ -284,7 +279,7 @@ user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF] [DEFAULT: ""
  * [SETTING] Privacy & Security>DNS over HTTPS
  * [1] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/
  * [2] https://wiki.mozilla.org/Security/DOH-resolver-policy
- * [3] https://support.mozilla.org/en-US/kb/firefox-dns-over-https
+ * [3] https://support.mozilla.org/kb/firefox-dns-over-https
  * [4] https://www.eff.org/deeplinks/2020/12/dns-doh-and-odoh-oh-my-year-review-2020 ***/
    // user_pref("network.trr.mode", 3);
 /* 0712: set DoH provider
@@ -303,13 +298,13 @@ user_pref("browser.urlbar.speculativeConnect.enabled", false);
  * [NOTE] The UI is controlled by the .enabled pref
  * [SETTING] Search>Address Bar>Suggestions from...
  * [1] https://blog.mozilla.org/data/2021/09/15/data-and-firefox-suggest/ ***/
-   // user_pref("browser.urlbar.quicksuggest.enabled", false); // [FF92+] [DEFAULT: false]
-   // user_pref("browser.urlbar.suggest.quicksuggest.nonsponsored", false); // [FF95+] [DEFAULT: false]
-   // user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false); // [FF92+] [DEFAULT: false]
+user_pref("browser.urlbar.quicksuggest.enabled", false); // [FF92+]
+user_pref("browser.urlbar.suggest.quicksuggest.nonsponsored", false); // [FF95+]
+user_pref("browser.urlbar.suggest.quicksuggest.sponsored", false); // [FF92+]
 /* 0803: disable live search suggestions
  * [NOTE] Both must be true for live search to work in the location bar
  * [SETUP-CHROME] Override these if you trust and use a privacy respecting search engine
- * [SETTING] Search>Provide search suggestions | Show search suggestions in address bar results ***/
+ * [SETTING] Search>Show search suggestions | Show search suggestions in address bar results ***/
 user_pref("browser.search.suggest.enabled", false);
 user_pref("browser.urlbar.suggest.searches", false);
 /* 0805: disable urlbar trending search suggestions [FF118+]
@@ -323,9 +318,13 @@ user_pref("browser.urlbar.weather.featureGate", false); // [FF108+] [DEFAULT: fa
 user_pref("browser.urlbar.yelp.featureGate", false); // [FF124+] [DEFAULT: false]
 /* 0807: disable urlbar clipboard suggestions [FF118+] ***/
    // user_pref("browser.urlbar.clipboard.featureGate", false);
+/* 0808: disable recent searches [FF120+]
+ * [NOTE] Recent searches are cleared with history (2811)
+ * [1] https://support.mozilla.org/kb/search-suggestions-firefox ***/
+   // user_pref("browser.urlbar.recentsearches.featureGate", false);
 /* 0810: disable search and form history
- * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
  * [NOTE] We also clear formdata on exit (2811)
+ * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
  * [2] https://bugzilla.mozilla.org/381681 ***/
@@ -377,8 +376,8 @@ user_pref("network.auth.subresource-http-auth-allow", 1);
 /*** [SECTION 1000]: DISK AVOIDANCE ***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
 /* 1001: disable disk cache
- * [SETUP-CHROME] If you think disk cache helps perf, then feel free to override this
- * [NOTE] We also clear cache on exit (2811) ***/
+ * [NOTE] We also clear cache on exit (2811)
+ * [SETUP-CHROME] If you think disk cache helps perf, then feel free to override this ***/
 user_pref("browser.cache.disk.enable", false);
 /* 1002: disable media cache from writing to disk in Private Browsing
  * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB ***/
@@ -530,7 +529,7 @@ user_pref("_user.js.parrot", "2000 syntax error: the parrot's snuffed it!");
 user_pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true);
 /* 2003: force a single network interface for ICE candidates generation [FF42+]
  * When using a system-wide proxy, it uses the proxy interface
- * [1] https://developer.mozilla.org/en-US/docs/Web/API/RTCIceCandidate
+ * [1] https://developer.mozilla.org/docs/Web/API/RTCIceCandidate
  * [2] https://wiki.mozilla.org/Media/WebRTC/Privacy ***/
 user_pref("media.peerconnection.ice.default_address_only", true);
 /* 2004: force exclusion of private IPs from ICE candidates [FF51+]
@@ -592,8 +591,10 @@ user_pref("browser.tabs.searchclipboardfor.middleclick", false); // [DEFAULT: fa
 /* 2630: disable content analysis by DLP (Data Loss Prevention) agents
  * DLP agents are background processes on managed computers that allow enterprises to monitor locally running
  * applications for data exfiltration events, which they can allow/block based on customer defined DLP policies.
+ * 0=Block all requests, 1=Warn on all requests (which lets the user decide), 2=Allow all requests
  * [1] https://github.com/chromium/content_analysis_sdk */
-user_pref("browser.contentanalysis.default_allow", false); // [FF124+] [DEFAULT: false]
+user_pref("browser.contentanalysis.enabled", false); // [FF121+] [DEFAULT: false]
+user_pref("browser.contentanalysis.default_result", 0); // [FF127+] [DEFAULT: 0]
 
 /** DOWNLOADS ***/
 /* 2651: enable user interaction for security by always asking where to download
@@ -638,12 +639,14 @@ user_pref("browser.contentblocking.category", "strict"); // [HIDDEN PREF]
  * Opener and redirect heuristics are granted for 30 days, see [3]
  * [1] https://blog.mozilla.org/security/2021/07/13/smartblock-v2/
  * [2] https://hg.mozilla.org/mozilla-central/rev/e5483fd469ab#l4.12
- * [3] https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning#storage_access_heuristics ***/
+ * [3] https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning#storage_access_heuristics ***/
    // user_pref("privacy.antitracking.enableWebcompat", false);
 
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
 /* 2810: enable Firefox to clear items on shutdown
+ * [NOTE] In FF129+ clearing "siteSettings" on shutdown (2811), or manually via site data (2820) and
+ * via history (2830), will no longer remove sanitize on shutdown "cookie and site data" site exceptions (2815) 
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes | Settings ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
 
@@ -665,9 +668,8 @@ user_pref("privacy.clearOnShutdown_v2.historyFormDataAndDownloads", true); // [F
 
 /** SANITIZE ON SHUTDOWN: RESPECTS "ALLOW" SITE EXCEPTIONS FF103+ | v2 migration is FF128+ ***/
 /* 2815: set "Cookies" and "Site Data" to clear on shutdown (if 2810 is true) [SETUP-CHROME]
- * [NOTE] Exceptions: A "cookie" block permission also controls "offlineApps" (see note below).
- * serviceWorkers require an "Allow" permission. For cross-domain logins, add exceptions for
- * both sites e.g. https://www.youtube.com (site) + https://accounts.google.com (single sign on)
+ * [NOTE] Exceptions: A "cookie" permission also controls "offlineApps" (see note below). For cross-domain logins,
+ * add exceptions for both sites e.g. https://www.youtube.com (site) + https://accounts.google.com (single sign on)
  * [NOTE] "offlineApps": Offline Website Data: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
  * [NOTE] "sessions": Active Logins (has no site exceptions): refers to HTTP Basic Authentication [1], not logins via cookies
  * [WARNING] Be selective with what sites you "Allow", as they also disable partitioning (1767271)
@@ -722,7 +724,9 @@ user_pref("privacy.sanitize.timeSpan", 0);
 
    In FF118+ FPP is on by default in private windows (4001) and in FF119+ is controlled
    by ETP (2701). FPP will also use Remote Services in future to relax FPP protections
-   on a per site basis for compatibility (4003).
+   on a per site basis for compatibility (4004).
+
+   https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPTargetsDefault.inc
 
    1826408 - restrict fonts to system (kBaseFonts + kLangPackFonts) (Windows, Mac, some Linux)
       https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc
@@ -733,19 +737,27 @@ user_pref("_user.js.parrot", "4000 syntax error: the parrot's bereft of life!");
  * [NOTE] In FF119+, FPP for all modes (7016) is enabled with ETP Strict (2701) ***/
    // user_pref("privacy.fingerprintingProtection.pbmode", true); // [DEFAULT: true FF118+]
 /* 4002: set global FPP overrides [FF114+]
- * Controls what protections FPP uses globally, including "RFPTargets" (despite the name these are
- * not used by RFP) e.g. "+AllTargets,-CSSPrefersColorScheme" or "-AllTargets,+CanvasRandomization"
- * [NOTE] Be aware that not all RFP protections are necessarily in RFPTargets
- * [WARNING] Not recommended. Either use RFP or FPP at defaults
+ * uses "RFPTargets" [1] which despite the name these are not used by RFP
+ * e.g. "+AllTargets,-CSSPrefersColorScheme,-JSDateTimeUTC" = all targets but allow prefers-color-scheme and do not change timezone
+ * e.g. "-AllTargets,+CanvasRandomization,+JSDateTimeUTC" = no targets but do use FPP canvas and change timezone
+ * [NOTE] Not supported by arkenfox. Either use RFP or FPP at defaults
  * [1] https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPTargets.inc ***/
    // user_pref("privacy.fingerprintingProtection.overrides", "");
-/* 4003: disable remote FPP overrides [FF127+] ***/
+/* 4003: set granular FPP overrides
+ * JSON format: e.g."[{\"firstPartyDomain\": \"netflix.com\", \"overrides\": \"-CanvasRandomization,-FrameRate,\"}]"
+ * [NOTE] Not supported by arkenfox. Either use RFP or FPP at defaults ***/
+   // user_pref("privacy.fingerprintingProtection.granularOverrides", "");
+/* 4004: disable remote FPP overrides [FF127+] ***/
    // user_pref("privacy.fingerprintingProtection.remoteOverrides.enabled", false);
 
-/*** [SECTION 4500]: RFP (resistFingerprinting)
+/*** [SECTION 4500]: OPTIONAL RFP (resistFingerprinting)
    RFP overrides FPP (4000)
 
-   It is an all-or-nothing buy in: you cannot pick and choose what parts you want
+   FF128+ Arkenfox by default uses FPP (automatically enabled with ETP Strict). For most people
+   this is all you need. To use RFP instead, add RFP (4501) to your overrides, and optionally
+   add letterboxing (4504), spoof_english (4506), and webgl (4520).
+
+   RFP is an all-or-nothing buy in: you cannot pick and choose what parts you want
    [TEST] https://arkenfox.github.io/TZP/tzp.html
 
    [WARNING] DO NOT USE extensions to alter RFP protected metrics
@@ -800,13 +812,12 @@ user_pref("_user.js.parrot", "4000 syntax error: the parrot's bereft of life!");
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable RFP
- * [SETUP-WEB] RFP can cause some website breakage: mainly canvas, use a canvas site exception via the urlbar.
- * RFP also has a few side effects: mainly timezone is UTC, and websites will prefer light theme
  * [NOTE] pbmode applies if true and the original pref is false
- * [1] https://bugzilla.mozilla.org/418986 ***/
-user_pref("privacy.resistFingerprinting", true); // [FF41+]
+ * [SETUP-WEB] RFP can cause some website breakage: mainly canvas, use a canvas site exception via the urlbar.
+ * RFP also has a few side effects: mainly that timezone is GMT, and websites will prefer light theme ***/
+   // user_pref("privacy.resistFingerprinting", true); // [FF41+]
    // user_pref("privacy.resistFingerprinting.pbmode", true); // [FF114+]
-/* 4502: set new window size rounding max values [FF55+]
+/* 4502: set RFP new window size max rounded values [FF55+]
  * [SETUP-CHROME] sizes round down in hundreds: width to 200s and height to 100s, to fit your screen
  * [1] https://bugzilla.mozilla.org/1330882 ***/
 user_pref("privacy.window.maxInnerWidth", 1600);
@@ -815,7 +826,7 @@ user_pref("privacy.window.maxInnerHeight", 900);
  * [NOTE] To allow extensions to work on AMO, you also need 2662
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
 user_pref("privacy.resistFingerprinting.block_mozAddonManager", true);
-/* 4504: enable RFP letterboxing [FF67+]
+/* 4504: enable letterboxing [FF67+]
  * Dynamically resizes the inner window by applying margins in stepped ranges [2]
  * If you use the dimension pref, then it will only apply those resolutions.
  * The format is "width1xheight1, width2xheight2, ..." (e.g. "800x600, 1000x1000")
@@ -824,14 +835,12 @@ user_pref("privacy.resistFingerprinting.block_mozAddonManager", true);
  * [WARNING] DO NOT USE: the dimension pref is only meant for testing
  * [1] https://bugzilla.mozilla.org/1407366
  * [2] https://hg.mozilla.org/mozilla-central/rev/6d2d7856e468#l2.32 ***/
-user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
+   // user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
    // user_pref("privacy.resistFingerprinting.letterboxing.dimensions", ""); // [HIDDEN PREF]
-/* 4505: experimental RFP [FF91+]
- * [WARNING] DO NOT USE unless testing, see [1] comment 12
- * [1] https://bugzilla.mozilla.org/1635603 ***/
+/* 4505: disable RFP by domain [FF91+] ***/
    // user_pref("privacy.resistFingerprinting.exemptedDomains", "*.example.invalid");
 /* 4506: disable RFP spoof english prompt [FF59+]
- * 0=prompt, 1=disabled, 2=enabled (requires RFP)
+ * 0=prompt, 1=disabled, 2=enabled
  * [NOTE] When changing from value 2, preferred languages ('intl.accept_languages') is not reset.
  * [SETUP-WEB] when enabled, sets 'en-US, en' for displaying pages and 'en-US' as locale.
  * [SETTING] General>Language>Choose your preferred language for displaying pages>Choose>Request English... ***/
@@ -839,12 +848,6 @@ user_pref("privacy.spoof_english", 1);
 /* 4510: disable using system colors
  * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
 user_pref("browser.display.use_system_colors", false); // [DEFAULT: false NON-WINDOWS]
-/* 4511: enforce non-native widget theme
- * Security: removes/reduces system API calls, e.g. win32k API [1]
- * Fingerprinting: provides a uniform look and feel across platforms [2]
- * [1] https://bugzilla.mozilla.org/1381938
- * [2] https://bugzilla.mozilla.org/1411425 ***/
-user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true]
 /* 4512: enforce links targeting new windows to open in a new tab instead
  * 1=most recent window or tab, 2=new window, 3=new tab
  * Stops malicious window sizes and some screen resolution leaks.
@@ -856,9 +859,8 @@ user_pref("browser.link.open_newwindow", 3); // [DEFAULT: 3]
 /* 4513: set all open window methods to abide by "browser.link.open_newwindow" (4512)
  * [1] https://searchfox.org/mozilla-central/source/dom/tests/browser/browser_test_new_window_from_content.js ***/
 user_pref("browser.link.open_newwindow.restriction", 0);
-/* 4520: disable WebGL (Web Graphics Library)
- * [SETUP-WEB] If you need it then override it. RFP still randomizes canvas for naive scripts ***/
-user_pref("webgl.disabled", true);
+/* 4520: disable WebGL (Web Graphics Library) ***/
+   // user_pref("webgl.disabled", true);
 
 /*** [SECTION 5000]: OPTIONAL OPSEC
    Disk avoidance, application data isolation, eyeballs...
@@ -971,7 +973,7 @@ user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
  * [2] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=asm.js
  * [3] https://rh0dev.github.io/blog/2017/the-return-of-the-jit/ ***/
    // user_pref("javascript.options.asmjs", false);
-/* 5505: disable Ion and baseline JIT to harden against JS exploits
+/* 5505: disable Ion and baseline JIT to harden against JS exploits [RESTART]
  * [NOTE] When both Ion and JIT are disabled, and trustedprincipals
  * is enabled, then Ion can still be used by extensions (1599226)
  * [1] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox+jit
@@ -1000,8 +1002,8 @@ user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
 /* 5509: disable IPv6 if using a VPN
  * This is an application level fallback. Disabling IPv6 is best done at an OS/network
  * level, and/or configured properly in system wide VPN setups.
- * [SETUP-WEB] PR_CONNECT_RESET_ERROR
  * [NOTE] PHP defaults to IPv6 with "localhost". Use "php -S 127.0.0.1:PORT"
+ * [SETUP-WEB] PR_CONNECT_RESET_ERROR
  * [TEST] https://ipleak.org/
  * [1] https://www.internetsociety.org/tag/ipv6-security/ (Myths 2,4,5,6) ***/
    // user_pref("network.dns.disableIPv6", true);
@@ -1047,6 +1049,9 @@ user_pref("extensions.quarantinedDomains.enabled", true); // [DEFAULT: true]
 /* 6050: prefsCleaner: previously active items removed from arkenfox 115-127 ***/
    // user_pref("accessibility.force_disabled", "");
    // user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", "");
+   // user_pref("geo.provider.network.url", "");
+   // user_pref("geo.provider.network.logging.enabled", "");
+   // user_pref("geo.provider.use_gpsd", "");
    // user_pref("network.protocol-handler.external.ms-windows-store", "");
    // user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", "");
    // user_pref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", "");
@@ -1261,6 +1266,17 @@ user_pref("browser.ping-centre.telemetry", false);
 // 9003: disable What's New toolbar icon [FF69+]
    // [-] https://bugzilla.mozilla.org/1724300
 user_pref("browser.messaging-system.whatsNewPanel.enabled", false);
+// FF127
+  // 2630: disable content analysis by DLP (Data Loss Prevention) agents - replaced by default_result
+  // [-] https://bugzilla.mozilla.org/1880314
+user_pref("browser.contentanalysis.default_allow", false);
+// 4511: enforce non-native widget theme
+   // Security: removes/reduces system API calls, e.g. win32k API [1]
+   // Fingerprinting: provides a uniform look and feel across platforms [2]
+   // [1] https://bugzilla.mozilla.org/1381938
+   // [2] https://bugzilla.mozilla.org/1411425
+   // [-] https://bugzilla.mozilla.org/1848899
+user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true]
 // ***/
 
 /* END: internal custom pref to test for syntax errors ***/

From bc6a2ba1450cc03952c5a09c25dc3d900be51249 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 6 Nov 2024 15:24:03 +0000
Subject: [PATCH 1139/1147] network.http.referer.hideOnionSource

since it was flipped to true for TB, not much point keeping it
---
 scratchpad-scripts/arkenfox-cleanup.js | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 21e3438..9cb7411 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -71,6 +71,8 @@
     'security.ssl3.rsa_des_ede3_sha', // 93
 
     /* REMOVED */
+    /* 129-140 */
+    'network.http.referer.hideOnionSource',
     /* 116-128 */
     'browser.fixup.alternate.enabled',
     'browser.taskbar.previews.enable',

From c6cfa10c0b647dc87fe08027af3fc086f9df72b3 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 7 Nov 2024 09:50:47 +0000
Subject: [PATCH 1140/1147] webchannel.allowObject.urlWhitelist

---
 scratchpad-scripts/arkenfox-cleanup.js | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 9cb7411..3e074b0 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -6,7 +6,7 @@
   There is an archived version at https://github.com/arkenfox/user.js/issues/123
   if you want the full list since jesus
 
-  Last updated: 6-August-2024
+  Last updated: 7-November-2024
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -35,6 +35,8 @@
 
   const aPREFS = [
     /* DEPRECATED */
+    /* 129-140 */
+    'webchannel.allowObject.urlWhitelist', // 132
     /* 116-128 */
     'browser.contentanalysis.default_allow', // 127
     'browser.messaging-system.whatsNewPanel.enabled', // 126

From eae5762d29f18115fbffd73d89bd9e2510b25427 Mon Sep 17 00:00:00 2001
From: Mizuki Nguyen <49761211+MagicalDrizzle@users.noreply.github.com>
Date: Sat, 9 Nov 2024 19:55:49 +0700
Subject: [PATCH 1141/1147] Add missing -command argument in powershell call
 (#1909)

* updater: add missing PowerShell argument

* prefcleaner: add missing PowerShell argument
---
 prefsCleaner.bat | 6 +++---
 updater.bat      | 4 ++--
 2 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/prefsCleaner.bat b/prefsCleaner.bat
index 2e3403f..62ca5f0 100644
--- a/prefsCleaner.bat
+++ b/prefsCleaner.bat
@@ -3,7 +3,7 @@ TITLE prefs.js cleaner
 
 REM ### prefs.js cleaner for Windows
 REM ## author: @claustromaniac
-REM ## version: 2.7
+REM ## version: 2.8
 
 CD /D "%~dp0"
 
@@ -15,7 +15,7 @@ ECHO:
 ECHO                 ########################################
 ECHO                 ####  prefs.js cleaner for Windows  ####
 ECHO                 ####        by claustromaniac       ####
-ECHO                 ####              v2.7              ####
+ECHO                 ####              v2.8              ####
 ECHO                 ########################################
 ECHO:
 CALL :message "This script should be run from your Firefox profile directory."
@@ -37,7 +37,7 @@ CALL :strlenCheck
 CALL :FFcheck
 
 CALL :message "Backing up prefs.js..."
-FOR /F "delims=" %%# IN ('powershell get-date -format "{yyyyMMdd_HHmmss}"') DO @SET ldt=%%#
+FOR /F "delims=" %%# IN ('powershell -command get-date -format "{yyyyMMdd_HHmmss}"') DO @SET ldt=%%#
 COPY /B /V /Y prefs.js "prefs-backup-%ldt%.js"
 
 CALL :message "Cleaning prefs.js..."
diff --git a/updater.bat b/updater.bat
index f6174f7..bc1078a 100644
--- a/updater.bat
+++ b/updater.bat
@@ -3,7 +3,7 @@ TITLE arkenfox user.js updater
 
 REM ## arkenfox user.js updater for Windows
 REM ## author: @claustromaniac
-REM ## version: 4.19
+REM ## version: 4.20
 REM ## instructions: https://github.com/arkenfox/user.js/wiki/5.1-Updater-[Options]#-windows
 
 SET v=4.19
@@ -177,7 +177,7 @@ IF EXIST user.js.new (
 		IF DEFINED _singlebackup (
 			MOVE /Y user.js user.js.bak >nul
 		) ELSE (
-			FOR /F "delims=" %%# IN ('powershell get-date -format "{yyyyMMdd_HHmmss}"') DO @SET ldt=%%#
+			FOR /F "delims=" %%# IN ('powershell -command get-date -format "{yyyyMMdd_HHmmss}"') DO @SET ldt=%%#
 			MOVE /Y user.js "user-backup-!ldt!.js" >nul
 		)
 		REN user.js.new user.js

From b8f18a3d91e01e44bde7879dd13325b43fab74ab Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Jan 2025 15:49:26 +0000
Subject: [PATCH 1142/1147] v133 (#1892)

---
 user.js | 54 +++++++++++++++++++++++++++++++++++++-----------------
 1 file changed, 37 insertions(+), 17 deletions(-)

diff --git a/user.js b/user.js
index 1dbf7d2..96eba49 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 26 August 2024
-* version: 128
+*    date: 13 January 2025
+* version: 133
 *    urls: https://github.com/arkenfox/user.js [repo]
 *        : https://arkenfox.github.io/gui/ [interactive]
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
@@ -312,10 +312,11 @@ user_pref("browser.urlbar.suggest.searches", false);
 user_pref("browser.urlbar.trending.featureGate", false);
 /* 0806: disable urlbar suggestions ***/
 user_pref("browser.urlbar.addons.featureGate", false); // [FF115+]
+user_pref("browser.urlbar.fakespot.featureGate", false); // [FF130+] [DEFAULT: false]
 user_pref("browser.urlbar.mdn.featureGate", false); // [FF117+] [HIDDEN PREF]
 user_pref("browser.urlbar.pocket.featureGate", false); // [FF116+] [DEFAULT: false]
 user_pref("browser.urlbar.weather.featureGate", false); // [FF108+] [DEFAULT: false]
-user_pref("browser.urlbar.yelp.featureGate", false); // [FF124+] [DEFAULT: false]
+user_pref("browser.urlbar.yelp.featureGate", false); // [FF124+]
 /* 0807: disable urlbar clipboard suggestions [FF118+] ***/
    // user_pref("browser.urlbar.clipboard.featureGate", false);
 /* 0808: disable recent searches [FF120+]
@@ -372,6 +373,9 @@ user_pref("network.auth.subresource-http-auth-allow", 1);
  * [SETTING] Privacy & Security>Logins and Passwords>Allow Windows single sign-on for...
  * [1] https://support.mozilla.org/kb/windows-sso ***/
    // user_pref("network.http.windows-sso.enabled", false); // [DEFAULT: false]
+/* 0907: enforce no automatic authentication on Microsoft sites [FF131+] [MAC]
+ * On macOS, SSO only works on corporate devices ***/
+   // user_pref("network.http.microsoft-entra-sso.enabled", false); // [DEFAULT: false]
 
 /*** [SECTION 1000]: DISK AVOIDANCE ***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
@@ -379,7 +383,7 @@ user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is m
  * [NOTE] We also clear cache on exit (2811)
  * [SETUP-CHROME] If you think disk cache helps perf, then feel free to override this ***/
 user_pref("browser.cache.disk.enable", false);
-/* 1002: disable media cache from writing to disk in Private Browsing
+/* 1002: set media cache in Private Browsing to in-memory and increase its maximum size
  * [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB ***/
 user_pref("browser.privatebrowsing.forceMediaMemoryCache", true); // [FF75+]
 user_pref("media.memory_cache_max_size", 65536);
@@ -564,8 +568,6 @@ user_pref("devtools.debugger.remote-enabled", false); // [DEFAULT: false]
 /* 2616: remove special permissions for certain mozilla domains [FF35+]
  * [1] resource://app/defaults/permissions ***/
 user_pref("permissions.manager.defaultsUrl", "");
-/* 2617: remove webchannel whitelist ***/
-user_pref("webchannel.allowObject.urlWhitelist", "");
 /* 2619: use Punycode in Internationalized Domain Names to eliminate possible spoofing
  * [SETUP-WEB] Might be undesirable for non-latin alphabet users since legitimate IDN's are also punycoded
  * [TEST] https://www.xn--80ak6aa92e.com/ (www.apple.com)
@@ -646,7 +648,7 @@ user_pref("browser.contentblocking.category", "strict"); // [HIDDEN PREF]
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
 /* 2810: enable Firefox to clear items on shutdown
  * [NOTE] In FF129+ clearing "siteSettings" on shutdown (2811), or manually via site data (2820) and
- * via history (2830), will no longer remove sanitize on shutdown "cookie and site data" site exceptions (2815) 
+ * via history (2830), will no longer remove sanitize on shutdown "cookie and site data" site exceptions (2815)
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes | Settings ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
 
@@ -728,6 +730,9 @@ user_pref("privacy.sanitize.timeSpan", 0);
 
    https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPTargetsDefault.inc
 
+   [NOTE] RFPTargets + granular overrides are somewhat experimental and may produce unexpected results
+   - e.g. FrameRate can only be controlled per process, not per origin
+
    1826408 - restrict fonts to system (kBaseFonts + kLangPackFonts) (Windows, Mac, some Linux)
       https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc
    1858181 - subtly randomize canvas per eTLD+1, per session and per window-mode (FF120+)
@@ -763,7 +768,6 @@ user_pref("_user.js.parrot", "4000 syntax error: the parrot's bereft of life!");
    [WARNING] DO NOT USE extensions to alter RFP protected metrics
 
     418986 - limit window.screen & CSS media queries (FF41)
-   1281949 - spoof screen orientation (FF50)
    1360039 - spoof navigator.hardwareConcurrency as 2 (FF55)
  FF56
    1333651 - spoof User Agent & Navigator API
@@ -790,7 +794,7 @@ user_pref("_user.js.parrot", "4000 syntax error: the parrot's bereft of life!");
    1337157 - disable WebGL debug renderer info (FF60)
    1459089 - disable OS locale in HTTP Accept-Language headers (ANDROID) (FF62)
    1479239 - return "no-preference" with prefers-reduced-motion (FF63)
-   1363508 - spoof/suppress Pointer Events (FF64)
+   1363508 & 1826051 - spoof/suppress Pointer Events (FF64, FF132)
    1492766 - spoof pointerEvent.pointerid (FF65)
    1485266 - disable exposure of system colors to CSS or canvas (FF67)
    1494034 - return "light" with prefers-color-scheme (FF67)
@@ -806,9 +810,15 @@ user_pref("_user.js.parrot", "4000 syntax error: the parrot's bereft of life!");
    1692609 - reduce JS timing precision to 16.67ms (previously FF55+ was 100ms) (FF102)
    1422237 - return "srgb" with color-gamut (FF110)
    1794628 - return "none" with inverted-colors (FF114)
-   1554751 - return devicePixelRatio as 2 (previously FF41+ was 1) (FF127)
    1787790 - normalize system fonts (FF128)
    1835987 - spoof timezone as Atlantic/Reykjavik (previously FF55+ was UTC) (FF128)
+   1834307 - always use smooth scrolling (FF132)
+   1918202 - spoof screen orientation based on spoofed screen size and platform (FF132)
+      previously it always returned landscape-primary and an angle of 0 (FF50+)
+   1390465 - load all subtitles in WebVTT (Video Text Tracks) (FF133)
+   1873382 - make spoofed devicePixelRatio and CSS media queries match (FF133)
+      previously FF41+ devicePixelRatio was hardcoded as 1 and FF127+ as 2
+      previously FF41+ CSS media queries were spoofed as zoom level at a devicePixelRatio of 1
 ***/
 user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs");
 /* 4501: enable RFP
@@ -834,10 +844,12 @@ user_pref("privacy.resistFingerprinting.block_mozAddonManager", true);
  * dislike the margins, then flip this pref, keeping in mind that it is effectively fingerprintable
  * [WARNING] DO NOT USE: the dimension pref is only meant for testing
  * [1] https://bugzilla.mozilla.org/1407366
- * [2] https://hg.mozilla.org/mozilla-central/rev/6d2d7856e468#l2.32 ***/
+ * [2] https://hg.mozilla.org/mozilla-central/rev/7211cb4f58ff#l5.13 ***/
    // user_pref("privacy.resistFingerprinting.letterboxing", true); // [HIDDEN PREF]
    // user_pref("privacy.resistFingerprinting.letterboxing.dimensions", ""); // [HIDDEN PREF]
-/* 4505: disable RFP by domain [FF91+] ***/
+/* 4505: disable RFP by domain [FF91+]
+ * [NOTE] Working examples: "arkenfox.github.io", "*github.io"
+ * Non-working examples: "https://arkenfox.github.io", "github.io", "*arkenfox.github.io" ***/
    // user_pref("privacy.resistFingerprinting.exemptedDomains", "*.example.invalid");
 /* 4506: disable RFP spoof english prompt [FF59+]
  * 0=prompt, 1=disabled, 2=enabled
@@ -848,6 +860,8 @@ user_pref("privacy.spoof_english", 1);
 /* 4510: disable using system colors
  * [SETTING] General>Language and Appearance>Fonts and Colors>Colors>Use system colors ***/
 user_pref("browser.display.use_system_colors", false); // [DEFAULT: false NON-WINDOWS]
+/* 4511: disable using system accent colors ***/
+user_pref("widget.non-native-theme.use-theme-accent", false); // [DEFAULT: false WINDOWS]
 /* 4512: enforce links targeting new windows to open in a new tab instead
  * 1=most recent window or tab, 2=new window, 3=new tab
  * Stops malicious window sizes and some screen resolution leaks.
@@ -1096,10 +1110,6 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [WHY] Passive fingerprinting and perf costs. These are session-only
  * and isolated with network partitioning (FF85+) and/or containers ***/
    // user_pref("security.ssl.disable_session_identifiers", true);
-/* 7006: onions
- * [WHY] Firefox doesn't support hidden services. Use Tor Browser ***/
-   // user_pref("dom.securecontext.allowlist_onions", true); // [FF97+] 1382359/1744006
-   // user_pref("network.http.referer.hideOnionSource", true); // 1305144
 /* 7007: referers
  * [WHY] Only cross-origin referers (1602, 5510) matter ***/
    // user_pref("network.http.sendRefererHeader", 2);
@@ -1136,9 +1146,11 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
  * [NOTE] FPP (fingerprintingProtection) is ignored when RFP (4501) is enabled
  * [WHY] Arkenfox only supports strict (2701) which sets these at runtime ***/
    // user_pref("network.cookie.cookieBehavior", 5); // [DEFAULT: 5]
-   // user_pref("privacy.fingerprintingProtection", true); // [FF114+] [ETP FF119+]
+   // user_pref("network.cookie.cookieBehavior.optInPartitioning", true); // [ETP FF132+]
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault", true);
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true); // [FF100+]
+   // user_pref("privacy.bounceTrackingProtection.mode", 1); // [FF131+] [ETP FF133+]
+   // user_pref("privacy.fingerprintingProtection", true); // [FF114+] [ETP FF119+]
    // user_pref("privacy.partition.network_state.ocsp_cache", true); // [DEFAULT: true FF123+]
    // user_pref("privacy.query_stripping.enabled", true); // [FF101+]
    // user_pref("privacy.trackingprotection.enabled", true);
@@ -1279,5 +1291,13 @@ user_pref("browser.contentanalysis.default_allow", false);
 user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true]
 // ***/
 
+/* ESR128.x still uses all the following prefs
+// [NOTE] replace the * with a slash in the line above to re-enable active ones
+// FF132
+/* 2617: remove webchannel whitelist
+   // [-] https://bugzilla.mozilla.org/1275612
+   // user_pref("webchannel.allowObject.urlWhitelist", "");
+// ***/
+
 /* END: internal custom pref to test for syntax errors ***/
 user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");

From 80fa110f499d3d3f6763ea5db0f015e1a3bc3ad4 Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Jan 2025 19:01:32 +0000
Subject: [PATCH 1143/1147] dom.securecontext.allowlist_onions

---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 3e074b0..8153642 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -6,7 +6,7 @@
   There is an archived version at https://github.com/arkenfox/user.js/issues/123
   if you want the full list since jesus
 
-  Last updated: 7-November-2024
+  Last updated: 13-January-2024
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -74,6 +74,7 @@
 
     /* REMOVED */
     /* 129-140 */
+    'dom.securecontext.allowlist_onions',
     'network.http.referer.hideOnionSource',
     /* 116-128 */
     'browser.fixup.alternate.enabled',

From c25187332e19c633b956a6755a7971a6591d3e8d Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sun, 12 Jan 2025 19:02:07 +0000
Subject: [PATCH 1144/1147] fix the year

---
 scratchpad-scripts/arkenfox-cleanup.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 8153642..34d1ba5 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -6,7 +6,7 @@
   There is an archived version at https://github.com/arkenfox/user.js/issues/123
   if you want the full list since jesus
 
-  Last updated: 13-January-2024
+  Last updated: 13-January-2025
 
   Instructions:
   - [optional] close Firefox and backup your profile

From 9bba5788aa07f67b37abc025782113a43c717b7f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Wed, 5 Mar 2025 07:21:39 +0000
Subject: [PATCH 1145/1147] legacy sanitizing prefs

In FF128 these were used to migrate to
- clearOnShutdown to clearOnShutdown_v2
- cpd to clearHistory

They are then no longer used.

The migration can be checked with
- privacy.sanitize.clearOnShutdown.hasMigratedToNewPrefs2
- privacy.sanitize.cpd.hasMigratedToNewPrefs2

Note: in FF136 there was another migration, where it changes the `ToNewPrefs2` to false
- privacy.sanitize.clearOnShutdown.hasMigratedToNewPrefs3
- privacy.sanitize.cpd.hasMigratedToNewPrefs3

AFAICT, cpd.hasMigrated* doesn't migrate until you open the clear history dialog.
---
 scratchpad-scripts/arkenfox-cleanup.js | 15 ++++++++++++++-
 1 file changed, 14 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 34d1ba5..58a0e1f 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -6,7 +6,7 @@
   There is an archived version at https://github.com/arkenfox/user.js/issues/123
   if you want the full list since jesus
 
-  Last updated: 13-January-2025
+  Last updated: 5-March-2025
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -76,6 +76,19 @@
     /* 129-140 */
     'dom.securecontext.allowlist_onions',
     'network.http.referer.hideOnionSource',
+    'privacy.clearOnShutdown.cache',
+    'privacy.clearOnShutdown.cookies',
+    'privacy.clearOnShutdown.downloads',
+    'privacy.clearOnShutdown.formdata',
+    'privacy.clearOnShutdown.history',
+    'privacy.clearOnShutdown.offlineApps',
+    'privacy.clearOnShutdown.sessions',
+    'privacy.cpd.cache',
+    'privacy.cpd.cookies',
+    'privacy.cpd.formdata',
+    'privacy.cpd.history',
+    'privacy.cpd.offlineApps',
+    'privacy.cpd.sessions',
     /* 116-128 */
     'browser.fixup.alternate.enabled',
     'browser.taskbar.previews.enable',

From 3d76c74c80485931425464fec0e59d6cb461677a Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Thu, 6 Mar 2025 02:52:08 +0000
Subject: [PATCH 1146/1147] v135 (#1929)

---
 user.js | 290 +++++++++++++++++++++++---------------------------------
 1 file changed, 118 insertions(+), 172 deletions(-)

diff --git a/user.js b/user.js
index 96eba49..08c51ca 100644
--- a/user.js
+++ b/user.js
@@ -1,7 +1,7 @@
 /******
 *    name: arkenfox user.js
-*    date: 13 January 2025
-* version: 133
+*    date: 6 March 2025
+* version: 135
 *    urls: https://github.com/arkenfox/user.js [repo]
 *        : https://arkenfox.github.io/gui/ [interactive]
 * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
@@ -63,6 +63,7 @@
   6000: DON'T TOUCH
   7000: DON'T BOTHER
   8000: DON'T BOTHER: FINGERPRINTING
+  8500: TELEMETRY
   9000: NON-PROJECT RELATED
   9999: DEPRECATED / RENAMED
 
@@ -82,7 +83,7 @@ user_pref("browser.aboutConfig.showWarning", false);
 user_pref("_user.js.parrot", "0100 syntax error: the parrot's dead!");
 /* 0102: set startup page [SETUP-CHROME]
  * 0=blank, 1=home, 2=last visited page, 3=resume previous session
- * [NOTE] Session Restore is cleared with history (2811), and not used in Private Browsing mode
+ * [NOTE] Session Restore is cleared with history (2811+), and not used in Private Browsing mode
  * [SETTING] General>Startup>Restore previous session ***/
 user_pref("browser.startup.page", 0);
 /* 0103: set HOME+NEWWINDOW page
@@ -116,8 +117,8 @@ user_pref("extensions.getAddons.showPane", false); // [HIDDEN PREF]
 /* 0321: disable recommendations in about:addons' Extensions and Themes panes [FF68+] ***/
 user_pref("extensions.htmlaboutaddons.recommendations.enabled", false);
 /* 0322: disable personalized Extension Recommendations in about:addons and AMO [FF65+]
- * [NOTE] This pref has no effect when Health Reports (0331) are disabled
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to make personalized extension recommendations
+ * [NOTE] This pref has no effect when Health Reports (8501) are disabled
+ * [SETTING] Privacy & Security>Firefox Data Collection and Use>Allow personalized extension recommendations
  * [1] https://support.mozilla.org/kb/personalized-extension-recommendations ***/
 user_pref("browser.discovery.enabled", false);
 /* 0323: disable shopping experience [FF116+]
@@ -125,41 +126,13 @@ user_pref("browser.discovery.enabled", false);
 user_pref("browser.shopping.experience2023.enabled", false); // [DEFAULT: false]
 
 /** TELEMETRY ***/
-/* 0330: disable new data submission [FF41+]
- * If disabled, no policy is shown or upload takes place, ever
- * [1] https://bugzilla.mozilla.org/1195552 ***/
-user_pref("datareporting.policy.dataSubmissionEnabled", false);
-/* 0331: disable Health Reports
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send technical... data ***/
-user_pref("datareporting.healthreport.uploadEnabled", false);
-/* 0332: disable telemetry
- * The "unified" pref affects the behavior of the "enabled" pref
- * - If "unified" is false then "enabled" controls the telemetry module
- * - If "unified" is true then "enabled" only controls whether to record extended data
- * [NOTE] "toolkit.telemetry.enabled" is now LOCKED to reflect prerelease (true) or release builds (false) [2]
- * [1] https://firefox-source-docs.mozilla.org/toolkit/components/telemetry/telemetry/internals/preferences.html
- * [2] https://medium.com/georg-fritzsche/data-preference-changes-in-firefox-58-2d5df9c428b5 ***/
-user_pref("toolkit.telemetry.unified", false);
-user_pref("toolkit.telemetry.enabled", false); // see [NOTE]
-user_pref("toolkit.telemetry.server", "data:,");
-user_pref("toolkit.telemetry.archive.enabled", false);
-user_pref("toolkit.telemetry.newProfilePing.enabled", false); // [FF55+]
-user_pref("toolkit.telemetry.shutdownPingSender.enabled", false); // [FF55+]
-user_pref("toolkit.telemetry.updatePing.enabled", false); // [FF56+]
-user_pref("toolkit.telemetry.bhrPing.enabled", false); // [FF57+] Background Hang Reporter
-user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // [FF57+]
-/* 0333: disable Telemetry Coverage
- * [1] https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/ ***/
-user_pref("toolkit.telemetry.coverage.opt-out", true); // [HIDDEN PREF]
-user_pref("toolkit.coverage.opt-out", true); // [FF64+] [HIDDEN PREF]
-user_pref("toolkit.coverage.endpoint.base", "");
 /* 0335: disable Firefox Home (Activity Stream) telemetry ***/
 user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
 user_pref("browser.newtabpage.activity-stream.telemetry", false);
 
 /** STUDIES ***/
 /* 0340: disable Studies
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to install and run studies ***/
+ * [SETTING] Privacy & Security>Firefox Data Collection and Use>Install and run studies ***/
 user_pref("app.shield.optoutstudies.enabled", false);
 /* 0341: disable Normandy/Shield [FF60+]
  * Shield is a telemetry system that can push and test "recipes"
@@ -173,7 +146,7 @@ user_pref("breakpad.reportURL", "");
 user_pref("browser.tabs.crashReporting.sendReport", false); // [FF44+]
    // user_pref("browser.crashReports.unsubmittedCheck.enabled", false); // [FF51+] [DEFAULT: false]
 /* 0351: enforce no submission of backlogged Crash Reports [FF58+]
- * [SETTING] Privacy & Security>Firefox Data Collection & Use>Allow Firefox to send backlogged crash reports  ***/
+ * [SETTING] Privacy & Security>Firefox Data Collection and Use>Send backlogged crash reports  ***/
 user_pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // [DEFAULT: false]
 
 /** OTHER ***/
@@ -261,7 +234,7 @@ user_pref("network.file.disable_unc_paths", true); // [HIDDEN PREF]
  * [1] https://bugzilla.mozilla.org/1433507
  * [2] https://en.wikipedia.org/wiki/GVfs
  * [3] https://en.wikipedia.org/wiki/GIO_(software) ***/
-user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF] [DEFAULT: "" FF118+]
+user_pref("network.gio.supported-protocols", ""); // [HIDDEN PREF] [DEFAULT: ""]
 /* 0705: disable proxy direct failover for system requests [FF91+]
  * [WARNING] Default true is a security feature against malicious extensions [1]
  * [SETUP-CHROME] If you use a proxy and you trust your extensions
@@ -320,11 +293,11 @@ user_pref("browser.urlbar.yelp.featureGate", false); // [FF124+]
 /* 0807: disable urlbar clipboard suggestions [FF118+] ***/
    // user_pref("browser.urlbar.clipboard.featureGate", false);
 /* 0808: disable recent searches [FF120+]
- * [NOTE] Recent searches are cleared with history (2811)
+ * [NOTE] Recent searches are cleared with history (2811+)
  * [1] https://support.mozilla.org/kb/search-suggestions-firefox ***/
    // user_pref("browser.urlbar.recentsearches.featureGate", false);
 /* 0810: disable search and form history
- * [NOTE] We also clear formdata on exit (2811)
+ * [NOTE] We also clear formdata on exit (2811+)
  * [SETUP-WEB] Be aware that autocomplete form data can be read by third parties [1][2]
  * [SETTING] Privacy & Security>History>Custom Settings>Remember search and form history
  * [1] https://blog.mindedsecurity.com/2011/10/autocompleteagain.html
@@ -337,7 +310,7 @@ user_pref("browser.formfill.enable", false);
 /* 0820: disable coloring of visited links
  * [SETUP-HARDEN] Bulk rapid history sniffing was mitigated in 2010 [1][2]. Slower and more expensive
  * redraw timing attacks were largely mitigated in FF77+ [3]. Using RFP (4501) further hampers timing
- * attacks. Don't forget clearing history on exit (2811). However, social engineering [2#limits][4][5]
+ * attacks. Don't forget clearing history on exit (2811+). However, social engineering [2#limits][4][5]
  * and advanced targeted timing attacks could still produce usable results
  * [1] https://developer.mozilla.org/docs/Web/CSS/Privacy_and_the_:visited_selector
  * [2] https://dbaron.org/mozilla/visited-privacy
@@ -380,7 +353,7 @@ user_pref("network.auth.subresource-http-auth-allow", 1);
 /*** [SECTION 1000]: DISK AVOIDANCE ***/
 user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!");
 /* 1001: disable disk cache
- * [NOTE] We also clear cache on exit (2811)
+ * [NOTE] We also clear cache on exit (2811+)
  * [SETUP-CHROME] If you think disk cache helps perf, then feel free to override this ***/
 user_pref("browser.cache.disk.enable", false);
 /* 1002: set media cache in Private Browsing to in-memory and increase its maximum size
@@ -442,13 +415,14 @@ user_pref("security.tls.enable_0rtt_data", false);
  * [1] https://en.wikipedia.org/wiki/Ocsp ***/
 user_pref("security.OCSP.enabled", 1); // [DEFAULT: 1]
 /* 1212: set OCSP fetch failures (non-stapled, see 1211) to hard-fail
- * [SETUP-WEB] SEC_ERROR_OCSP_SERVER_ERROR
+ * [SETUP-WEB] SEC_ERROR_OCSP_SERVER_ERROR | SEC_ERROR_OCSP_UNAUTHORIZED_REQUEST
  * When a CA cannot be reached to validate a cert, Firefox just continues the connection (=soft-fail)
  * Setting this pref to true tells Firefox to instead terminate the connection (=hard-fail)
  * It is pointless to soft-fail when an OCSP fetch fails: you cannot confirm a cert is still valid (it
  * could have been revoked) and/or you could be under attack (e.g. malicious blocking of OCSP servers)
  * [1] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/
- * [2] https://www.imperialviolet.org/2014/04/19/revchecking.html ***/
+ * [2] https://www.imperialviolet.org/2014/04/19/revchecking.html
+ * [3] https://letsencrypt.org/2024/12/05/ending-ocsp/ ***/
 user_pref("security.OCSP.require", true);
 
 /** CERTS / HPKP (HTTP Public Key Pinning) ***/
@@ -463,7 +437,7 @@ user_pref("security.cert_pinning.enforcement_level", 2);
  * 3 = consult CRLite and enforce "Not Revoked" results, but defer to OCSP for "Revoked" (default)
  * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1429800,1670985,1753071
  * [2] https://blog.mozilla.org/security/tag/crlite/ ***/
-user_pref("security.remote_settings.crlite_filters.enabled", true);
+user_pref("security.remote_settings.crlite_filters.enabled", true); // [DEFAULT: true FF137+]
 user_pref("security.pki.crlite_mode", 2);
 
 /** MIXED CONTENT ***/
@@ -647,41 +621,33 @@ user_pref("browser.contentblocking.category", "strict"); // [HIDDEN PREF]
 /*** [SECTION 2800]: SHUTDOWN & SANITIZING ***/
 user_pref("_user.js.parrot", "2800 syntax error: the parrot's bleedin' demised!");
 /* 2810: enable Firefox to clear items on shutdown
- * [NOTE] In FF129+ clearing "siteSettings" on shutdown (2811), or manually via site data (2820) and
+ * [NOTE] In FF129+ clearing "siteSettings" on shutdown (2811+), or manually via site data (2820+) and
  * via history (2830), will no longer remove sanitize on shutdown "cookie and site data" site exceptions (2815)
  * [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes | Settings ***/
 user_pref("privacy.sanitize.sanitizeOnShutdown", true);
 
-/** SANITIZE ON SHUTDOWN: IGNORES "ALLOW" SITE EXCEPTIONS | v2 migration is FF128+ ***/
-/* 2811: set/enforce what items to clear on shutdown (if 2810 is true) [SETUP-CHROME]
- * [NOTE] If "history" is true, downloads will also be cleared ***/
-user_pref("privacy.clearOnShutdown.cache", true);     // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown_v2.cache", true);  // [FF128+] [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.downloads", true); // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.formdata", true);  // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown.history", true);   // [DEFAULT: true]
-user_pref("privacy.clearOnShutdown_v2.historyFormDataAndDownloads", true); // [FF128+] [DEFAULT: true]
-   // user_pref("privacy.clearOnShutdown.siteSettings", false); // [DEFAULT: false]
-   // user_pref("privacy.clearOnShutdown_v2.siteSettings", false); // [FF128+] [DEFAULT: false]
-/* 2812: set Session Restore to clear on shutdown (if 2810 is true) [FF34+]
- * [NOTE] Not needed if Session Restore is not used (0102) or it is already cleared with history (2811)
+/** SANITIZE ON SHUTDOWN: IGNORES "ALLOW" SITE EXCEPTIONS ***/
+/* 2811: set/enforce clearOnShutdown items (if 2810 is true) [SETUP-CHROME] [FF128+] ***/
+user_pref("privacy.clearOnShutdown_v2.cache", true); // [DEFAULT: true]
+user_pref("privacy.clearOnShutdown_v2.historyFormDataAndDownloads", true); // [DEFAULT: true]
+   // user_pref("privacy.clearOnShutdown_v2.siteSettings", false); // [DEFAULT: false]
+/* 2812: set/enforce clearOnShutdown items [FF136+] ***/
+user_pref("privacy.clearOnShutdown_v2.browsingHistoryAndDownloads", true); // [DEFAULT: true]
+user_pref("privacy.clearOnShutdown_v2.downloads", true);
+user_pref("privacy.clearOnShutdown_v2.formdata", true);
+/* 2813: set Session Restore to clear on shutdown (if 2810 is true) [FF34+]
+ * [NOTE] Not needed if Session Restore is not used (0102) or it is already cleared with history (2811+)
  * [NOTE] If true, this prevents resuming from crashes (also see 5008) ***/
    // user_pref("privacy.clearOnShutdown.openWindows", true);
 
-/** SANITIZE ON SHUTDOWN: RESPECTS "ALLOW" SITE EXCEPTIONS FF103+ | v2 migration is FF128+ ***/
-/* 2815: set "Cookies" and "Site Data" to clear on shutdown (if 2810 is true) [SETUP-CHROME]
- * [NOTE] Exceptions: A "cookie" permission also controls "offlineApps" (see note below). For cross-domain logins,
- * add exceptions for both sites e.g. https://www.youtube.com (site) + https://accounts.google.com (single sign on)
- * [NOTE] "offlineApps": Offline Website Data: localStorage, service worker cache, QuotaManager (IndexedDB, asm-cache)
- * [NOTE] "sessions": Active Logins (has no site exceptions): refers to HTTP Basic Authentication [1], not logins via cookies
+/** SANITIZE ON SHUTDOWN: RESPECTS "ALLOW" SITE EXCEPTIONS ***/
+/* 2815: set "Cookies" and "Site Data" to clear on shutdown (if 2810 is true) [SETUP-CHROME] [FF128+]
+ * [NOTE] Exceptions: For cross-domain logins, add exceptions for both sites
+ * e.g. https://www.youtube.com (site) + https://accounts.google.com (single sign on)
  * [WARNING] Be selective with what sites you "Allow", as they also disable partitioning (1767271)
  * [SETTING] to add site exceptions: Ctrl+I>Permissions>Cookies>Allow (when on the website in question)
- * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings
- * [1] https://en.wikipedia.org/wiki/Basic_access_authentication ***/
-user_pref("privacy.clearOnShutdown.cookies", true); // Cookies
-user_pref("privacy.clearOnShutdown.offlineApps", true); // Site Data
-user_pref("privacy.clearOnShutdown.sessions", true);  // Active Logins [DEFAULT: true]
-user_pref("privacy.clearOnShutdown_v2.cookiesAndStorage", true); // Cookies, Site Data, Active Logins [FF128+]
+ * [SETTING] to manage site exceptions: Options>Privacy & Security>Permissions>Settings ***/
+user_pref("privacy.clearOnShutdown_v2.cookiesAndStorage", true);
 
 /** SANITIZE SITE DATA: IGNORES "ALLOW" SITE EXCEPTIONS ***/
 /* 2820: set manual "Clear Data" items [SETUP-CHROME] [FF128+]
@@ -691,30 +657,24 @@ user_pref("privacy.clearSiteData.cache", true);
 user_pref("privacy.clearSiteData.cookiesAndStorage", false); // keep false until it respects "allow" site exceptions
 user_pref("privacy.clearSiteData.historyFormDataAndDownloads", true);
    // user_pref("privacy.clearSiteData.siteSettings", false);
+/* 2821: set manual "Clear Data" items [FF136+] ***/
+user_pref("privacy.clearSiteData.browsingHistoryAndDownloads", true);
+user_pref("privacy.clearSiteData.formdata", true);
 
-/** SANITIZE HISTORY: IGNORES "ALLOW" SITE EXCEPTIONS | clearHistory migration is FF128+ ***/
-/* 2830: set manual "Clear History" items, also via Ctrl-Shift-Del [SETUP-CHROME]
+/** SANITIZE HISTORY: IGNORES "ALLOW" SITE EXCEPTIONS ***/
+/* 2830: set manual "Clear History" items, also via Ctrl-Shift-Del [SETUP-CHROME] [FF128+]
  * Firefox remembers your last choices. This will reset them when you start Firefox
- * [NOTE] Regardless of what you set "downloads" to, as soon as the dialog
- * for "Clear Recent History" is opened, it is synced to the same as "history"
  * [SETTING] Privacy & Security>History>Custom Settings>Clear History ***/
-user_pref("privacy.cpd.cache", true);    // [DEFAULT: true]
-user_pref("privacy.clearHistory.cache", true);
-user_pref("privacy.cpd.formdata", true); // [DEFAULT: true]
-user_pref("privacy.cpd.history", true);  // [DEFAULT: true]
-   // user_pref("privacy.cpd.downloads", true); // not used, see note above
-user_pref("privacy.clearHistory.historyFormDataAndDownloads", true);
-user_pref("privacy.cpd.cookies", false);
-user_pref("privacy.cpd.sessions", true); // [DEFAULT: true]
-user_pref("privacy.cpd.offlineApps", false); // [DEFAULT: false]
+user_pref("privacy.clearHistory.cache", true); // [DEFAULT: true]
 user_pref("privacy.clearHistory.cookiesAndStorage", false);
-   // user_pref("privacy.cpd.openWindows", false); // Session Restore
-   // user_pref("privacy.cpd.passwords", false);
-   // user_pref("privacy.cpd.siteSettings", false);
-   // user_pref("privacy.clearHistory.siteSettings", false);
+user_pref("privacy.clearHistory.historyFormDataAndDownloads", true); // [DEFAULT: true]
+   // user_pref("privacy.clearHistory.siteSettings", false); // [DEFAULT: false]
+/* 2831: set manual "Clear History" items [FF136+] ***/
+user_pref("privacy.clearHistory.browsingHistoryAndDownloads", true); // [DEFAULT: true]
+user_pref("privacy.clearHistory.formdata", true);
 
 /** SANITIZE MANUAL: TIMERANGE ***/
-/* 2840: set "Time range to clear" for "Clear Data" (2820) and "Clear History" (2830)
+/* 2840: set "Time range to clear" for "Clear Data" (2820+) and "Clear History" (2830+)
  * Firefox remembers your last choice. This will reset the value when you start Firefox
  * 0=everything, 1=last hour, 2=last two hours, 3=last four hours, 4=today
  * [NOTE] Values 5 (last 5 minutes) and 6 (last 24 hours) are not listed in the dropdown,
@@ -740,7 +700,7 @@ user_pref("privacy.sanitize.timeSpan", 0);
 user_pref("_user.js.parrot", "4000 syntax error: the parrot's bereft of life!");
 /* 4001: enable FPP in PB mode [FF114+]
  * [NOTE] In FF119+, FPP for all modes (7016) is enabled with ETP Strict (2701) ***/
-   // user_pref("privacy.fingerprintingProtection.pbmode", true); // [DEFAULT: true FF118+]
+   // user_pref("privacy.fingerprintingProtection.pbmode", true); // [DEFAULT: true]
 /* 4002: set global FPP overrides [FF114+]
  * uses "RFPTargets" [1] which despite the name these are not used by RFP
  * e.g. "+AllTargets,-CSSPrefersColorScheme,-JSDateTimeUTC" = all targets but allow prefers-color-scheme and do not change timezone
@@ -763,7 +723,6 @@ user_pref("_user.js.parrot", "4000 syntax error: the parrot's bereft of life!");
    add letterboxing (4504), spoof_english (4506), and webgl (4520).
 
    RFP is an all-or-nothing buy in: you cannot pick and choose what parts you want
-   [TEST] https://arkenfox.github.io/TZP/tzp.html
 
    [WARNING] DO NOT USE extensions to alter RFP protected metrics
 
@@ -771,8 +730,8 @@ user_pref("_user.js.parrot", "4000 syntax error: the parrot's bereft of life!");
    1360039 - spoof navigator.hardwareConcurrency as 2 (FF55)
  FF56
    1333651 - spoof User Agent & Navigator API
-      version: android version spoofed as ESR (FF119 or lower)
-      OS: JS spoofed as Windows 10, OS 10.15, Android 10, or Linux | HTTP Headers spoofed as Windows or Android
+      JS: spoofed as Windows 10, OS 10.15, Android 10, or Linux
+      HTTP Header: spoofed as Windows 10 or Android 10.15 until FF136 then matches JS spoof
    1369319 - disable device sensor API
    1369357 - disable site specific zoom
    1337161 - hide gamepads from content
@@ -867,7 +826,6 @@ user_pref("widget.non-native-theme.use-theme-accent", false); // [DEFAULT: false
  * Stops malicious window sizes and some screen resolution leaks.
  * You can still right-click a link and open in a new window
  * [SETTING] General>Tabs>Open links in tabs instead of new windows
- * [TEST] https://arkenfox.github.io/TZP/tzp.html#screen
  * [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/9881 ***/
 user_pref("browser.link.open_newwindow", 3); // [DEFAULT: 3]
 /* 4513: set all open window methods to abide by "browser.link.open_newwindow" (4512)
@@ -935,7 +893,7 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
  * [1] https://support.mozilla.org/kb/address-bar-autocomplete-firefox#w_url-autocomplete ***/
    // user_pref("browser.urlbar.autoFill", false);
 /* 5013: disable browsing and download history
- * [NOTE] We also clear history and downloads on exit (2811)
+ * [NOTE] We also clear history and downloads on exit (2811+)
  * [SETTING] Privacy & Security>History>Custom Settings>Remember browsing and download history ***/
    // user_pref("places.history.enabled", false);
 /* 5014: disable Windows jumplist [WINDOWS] ***/
@@ -1060,16 +1018,20 @@ user_pref("extensions.webcompat-reporter.enabled", false); // [DEFAULT: false]
 /* 6012: enforce Quarantined Domains [FF115+]
  * [WHY] https://support.mozilla.org/kb/quarantined-domains */
 user_pref("extensions.quarantinedDomains.enabled", true); // [DEFAULT: true]
-/* 6050: prefsCleaner: previously active items removed from arkenfox 115-127 ***/
-   // user_pref("accessibility.force_disabled", "");
-   // user_pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", "");
-   // user_pref("geo.provider.network.url", "");
-   // user_pref("geo.provider.network.logging.enabled", "");
-   // user_pref("geo.provider.use_gpsd", "");
-   // user_pref("network.protocol-handler.external.ms-windows-store", "");
-   // user_pref("privacy.partition.always_partition_third_party_non_cookie_storage", "");
-   // user_pref("privacy.partition.always_partition_third_party_non_cookie_storage.exempt_sessionstorage", "");
-   // user_pref("privacy.partition.serviceWorkers", "");
+/* 6050: prefsCleaner: reset previously active items removed from arkenfox FF128+ ***/
+   // user_pref("privacy.clearOnShutdown.cache", "");
+   // user_pref("privacy.clearOnShutdown.cookies", "");
+   // user_pref("privacy.clearOnShutdown.downloads", "");
+   // user_pref("privacy.clearOnShutdown.formdata", "");
+   // user_pref("privacy.clearOnShutdown.history", "");
+   // user_pref("privacy.clearOnShutdown.offlineApps", "");
+   // user_pref("privacy.clearOnShutdown.sessions", "");
+   // user_pref("privacy.cpd.cache", "");
+   // user_pref("privacy.cpd.cookies", "");
+   // user_pref("privacy.cpd.formdata", "");
+   // user_pref("privacy.cpd.history", "");
+   // user_pref("privacy.cpd.offlineApps", "");
+   // user_pref("privacy.cpd.sessions", "");
 
 /*** [SECTION 7000]: DON'T BOTHER ***/
 user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!");
@@ -1151,7 +1113,7 @@ user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies
    // user_pref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true); // [FF100+]
    // user_pref("privacy.bounceTrackingProtection.mode", 1); // [FF131+] [ETP FF133+]
    // user_pref("privacy.fingerprintingProtection", true); // [FF114+] [ETP FF119+]
-   // user_pref("privacy.partition.network_state.ocsp_cache", true); // [DEFAULT: true FF123+]
+   // user_pref("privacy.partition.network_state.ocsp_cache", true); // [DEFAULT: true]
    // user_pref("privacy.query_stripping.enabled", true); // [FF101+]
    // user_pref("privacy.trackingprotection.enabled", true);
    // user_pref("privacy.trackingprotection.socialtracking.enabled", true);
@@ -1210,6 +1172,58 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's crossed the Jordan
    // user_pref("ui.use_standins_for_native_colors", "");
    // user_pref("webgl.enable-debug-renderer-info", "");
 
+/*** [SECTION 8500]: TELEMETRY
+   Arkenfox does not consider Firefox telemetry to be a privacy or security concern - comments below.
+   But since most arkenfox users prefer it disabled, we'll do that rather than cause overrides.
+
+   Opt-out
+   - Telemetry is essential: a browser engine is a _very_ large complex beast costing billions to maintain
+   - Opt-in telemetry _does not_ work and results in data that is unrepresentative and may be misleading
+   Choice
+   - Every new profile on first use provides data collection/use policy and the abillty to opt-out
+   - It can be disabled at any time (Settings>Privacy & Security>Data Collection and Use) 
+   Data
+   - no PII (Personally Identifiable Information)
+   - can be viewed in about:telemetry
+   - uses Prio [1][2][3], Glean [4], Oblivious HTTP [5][6]
+
+   [1] https://crypto.stanford.edu/prio/
+   [2] https://hacks.mozilla.org/2018/10/testing-privacy-preserving-telemetry-with-prio/
+   [3] https://blog.mozilla.org/security/2019/06/06/next-steps-in-privacy-preserving-telemetry-with-prio/
+   [4] https://firefox-source-docs.mozilla.org/toolkit/components/glean/index.html
+   [5] https://firefox-source-docs.mozilla.org/toolkit/components/glean/user/ohttp.html
+   [6] https://blog.mozilla.org/en/tag/oblivious-http/
+***/
+user_pref("_user.js.parrot", "8500 syntax error: the parrot's off the twig!");
+/* 8500: disable new data submission [FF41+]
+ * If disabled, no policy is shown or upload takes place, ever
+ * [1] https://bugzilla.mozilla.org/1195552 ***/
+user_pref("datareporting.policy.dataSubmissionEnabled", false);
+/* 8501: disable Health Reports
+ * [SETTING] Privacy & Security>Firefox Data Collection and Use>Send technical... data ***/
+user_pref("datareporting.healthreport.uploadEnabled", false);
+/* 0802: disable telemetry
+ * The "unified" pref affects the behavior of the "enabled" pref
+ * - If "unified" is false then "enabled" controls the telemetry module
+ * - If "unified" is true then "enabled" only controls whether to record extended data
+ * [NOTE] "toolkit.telemetry.enabled" is now LOCKED to reflect prerelease (true) or release builds (false) [2]
+ * [1] https://firefox-source-docs.mozilla.org/toolkit/components/telemetry/telemetry/internals/preferences.html
+ * [2] https://medium.com/georg-fritzsche/data-preference-changes-in-firefox-58-2d5df9c428b5 ***/
+user_pref("toolkit.telemetry.unified", false);
+user_pref("toolkit.telemetry.enabled", false); // see [NOTE]
+user_pref("toolkit.telemetry.server", "data:,");
+user_pref("toolkit.telemetry.archive.enabled", false);
+user_pref("toolkit.telemetry.newProfilePing.enabled", false); // [FF55+]
+user_pref("toolkit.telemetry.shutdownPingSender.enabled", false); // [FF55+]
+user_pref("toolkit.telemetry.updatePing.enabled", false); // [FF56+]
+user_pref("toolkit.telemetry.bhrPing.enabled", false); // [FF57+] Background Hang Reporter
+user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // [FF57+]
+/* 8503: disable Telemetry Coverage
+ * [1] https://blog.mozilla.org/data/2018/08/20/effectively-measuring-search-in-firefox/ ***/
+user_pref("toolkit.telemetry.coverage.opt-out", true); // [HIDDEN PREF]
+user_pref("toolkit.coverage.opt-out", true); // [FF64+] [HIDDEN PREF]
+user_pref("toolkit.coverage.endpoint.base", "");
+
 /*** [SECTION 9000]: NON-PROJECT RELATED ***/
 user_pref("_user.js.parrot", "9000 syntax error: the parrot's cashed in 'is chips!");
 /* 9001: disable welcome notices ***/
@@ -1223,74 +1237,6 @@ user_pref("browser.urlbar.showSearchTerms.enabled", false);
 
 /*** [SECTION 9999]: DEPRECATED / RENAMED ***/
 user_pref("_user.js.parrot", "9999 syntax error: the parrot's shuffled off 'is mortal coil!");
-/* ESR115.x still uses all the following prefs
-// [NOTE] replace the * with a slash in the line above to re-enable active ones
-// FF116
-// 4506: set RFP's font visibility level (1402) [FF94+]
-   // [-] https://bugzilla.mozilla.org/1838415
-   // user_pref("layout.css.font-visibility.resistFingerprinting", 1); // [DEFAULT: 1]
-// FF117
-// 1221: disable Windows Microsoft Family Safety cert [FF50+] [WINDOWS]
-   // 0=disable detecting Family Safety mode and importing the root
-   // 1=only attempt to detect Family Safety mode (don't import the root)
-   // 2=detect Family Safety mode and import the root
-   // [1] https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/21686
-   // [-] https://bugzilla.mozilla.org/1844908
-user_pref("security.family_safety.mode", 0);
-// 7018: disable service worker Web Notifications [FF44+]
-   // [WHY] Web Notifications are behind a prompt (7002)
-   // [1] https://blog.mozilla.org/en/products/firefox/block-notification-requests/
-   // [-] https://bugzilla.mozilla.org/1842457
-   // user_pref("dom.webnotifications.serviceworker.enabled", false);
-// FF118
-// 1402: limit font visibility (Windows, Mac, some Linux) [FF94+]
-   // Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts [1], bundled fonts are auto-allowed
-   // In normal windows: uses the first applicable: RFP over TP over Standard
-   // In Private Browsing windows: uses the most restrictive between normal and private
-   // 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
-   // [1] https://searchfox.org/mozilla-central/search?path=StandardFonts*.inc
-   // [-] https://bugzilla.mozilla.org/1847599
-   // user_pref("layout.css.font-visibility.private", 1);
-   // user_pref("layout.css.font-visibility.standard", 1);
-   // user_pref("layout.css.font-visibility.trackingprotection", 1);
-// 2623: disable permissions delegation [FF73+]
-   // Currently applies to cross-origin geolocation, camera, mic and screen-sharing
-   // permissions, and fullscreen requests. Disabling delegation means any prompts
-   // for these will show/use their correct 3rd party origin
-   // [1] https://groups.google.com/forum/#!topic/mozilla.dev.platform/BdFOMAuCGW8/discussion
-   // [-] https://bugzilla.mozilla.org/1697151
-   // user_pref("permissions.delegation.enabled", false);
-// FF119
-// 0211: use en-US locale regardless of the system or region locale
-   // [SETUP-WEB] May break some input methods e.g xim/ibus for CJK languages [1]
-   // [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=867501,1629630
-   // [-] https://bugzilla.mozilla.org/1846224
-   // user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
-// 0711: disable skipping DoH when parental controls are enabled [FF70+]
-   // [-] https://bugzilla.mozilla.org/1586941
-user_pref("network.dns.skipTRR-when-parental-control-enabled", false);
-// FF123
-// 0334: disable PingCentre telemetry (used in several System Add-ons) [FF57+]
-   // Defense-in-depth: currently covered by 0331
-   // [-] https://bugzilla.mozilla.org/1868988
-user_pref("browser.ping-centre.telemetry", false);
-// FF126
-// 9003: disable What's New toolbar icon [FF69+]
-   // [-] https://bugzilla.mozilla.org/1724300
-user_pref("browser.messaging-system.whatsNewPanel.enabled", false);
-// FF127
-  // 2630: disable content analysis by DLP (Data Loss Prevention) agents - replaced by default_result
-  // [-] https://bugzilla.mozilla.org/1880314
-user_pref("browser.contentanalysis.default_allow", false);
-// 4511: enforce non-native widget theme
-   // Security: removes/reduces system API calls, e.g. win32k API [1]
-   // Fingerprinting: provides a uniform look and feel across platforms [2]
-   // [1] https://bugzilla.mozilla.org/1381938
-   // [2] https://bugzilla.mozilla.org/1411425
-   // [-] https://bugzilla.mozilla.org/1848899
-user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true]
-// ***/
-
 /* ESR128.x still uses all the following prefs
 // [NOTE] replace the * with a slash in the line above to re-enable active ones
 // FF132

From 7f852e94fc80fd0aa19f1c948319974e3301187f Mon Sep 17 00:00:00 2001
From: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Mon, 21 Apr 2025 15:04:04 +0000
Subject: [PATCH 1147/1147] media.ondevicechange.enabled

---
 scratchpad-scripts/arkenfox-cleanup.js | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/scratchpad-scripts/arkenfox-cleanup.js b/scratchpad-scripts/arkenfox-cleanup.js
index 58a0e1f..3434fc7 100644
--- a/scratchpad-scripts/arkenfox-cleanup.js
+++ b/scratchpad-scripts/arkenfox-cleanup.js
@@ -6,7 +6,7 @@
   There is an archived version at https://github.com/arkenfox/user.js/issues/123
   if you want the full list since jesus
 
-  Last updated: 5-March-2025
+  Last updated: 21-April-2025
 
   Instructions:
   - [optional] close Firefox and backup your profile
@@ -36,6 +36,7 @@
   const aPREFS = [
     /* DEPRECATED */
     /* 129-140 */
+    'media.ondevicechange.enabled', // 137
     'webchannel.allowObject.urlWhitelist', // 132
     /* 116-128 */
     'browser.contentanalysis.default_allow', // 127