![]() work in progress, prototyping - 4604 - 1357733 is a duplicate of [1359076](https://bugzilla.mozilla.org/show_bug.cgi?id=1359076) which was non-stable -> [1462308](https://bugzilla.mozilla.org/show_bug.cgi?id=1462308) which I listed for now, where certain Sensor APIs were disabled in FF62+ - see [this](https://developer.mozilla.org/en-US/docs/Mozilla/Firefox/Releases/62#APIs_2) - so swap 1357733 with 1462308 - remove tor ticket: it adds nothing: it just says, ooh, flip this pref - 4604: part two: we need to update what the threat is - added MDN Sensor API status page - I need to check but AFAIK, only orientation and motion is left: motion has some precision (that's the 1292751 bugzilla) - left in for now: the PoC - but 99% sure (see above bullet point) it doesn't apply anymore to FF - 4606: we don't need the tor issue: the FP info is listed in the description (USB device ID enumeration) - 4607: wicg is all we need - 4610: bugzilla adds nothing, it's just a reference to the pref being added, tor ticket also adds nothing: FPing issue is in description anyway, that's four more lines less noise |
||
---|---|---|
.github/ISSUE_TEMPLATE | ||
scratchpad-scripts | ||
wikipiki | ||
.gitattributes | ||
.travis.yml | ||
_config.yml | ||
LICENSE.txt | ||
prefsCleaner.bat | ||
prefsCleaner.sh | ||
README.md | ||
updater.bat | ||
updater.sh | ||
user.js |
🟪 user.js
A user.js
is a configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the overview wiki page.
🟩 the arkenfox user.js
The arkenfox user.js
is a template which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).
Everyone, experts included, should at least read the implementation wiki page, as it contains important information regarding a few user.js
settings.
Note that we do not recommend connecting over Tor on Firefox. Use the Tor Browser if your threat model calls for it, or for accessing hidden services.
Also be aware that the arkenfox user.js
is made specifically for desktop Firefox. Using it as-is in other Gecko-based browsers can be counterproductive, especially in the Tor Browser.
🟧 sitemap
🟥 acknowledgments
Literally thousands of sources, references and suggestions. Many thanks, and much appreciated.