• 设为首页
  • 点击收藏
  • 手机版
    手机扫一扫访问
    迪恩网络手机版
  • 关注官方公众号
    微信扫一扫关注
    公众号

amq/firefox-debloat: Stop Firefox leaking data about you

原作者: [db:作者] 来自: 网络 收藏 邀请

开源软件名称:

amq/firefox-debloat

开源软件地址:

https://github.com/amq/firefox-debloat

开源编程语言:


开源软件介绍:

This list aims to block core Firefox features which actively leak data to third-party services (as opposed to attempts of sites to track you or otherwise passively collect information). As it isn't always easy to draw a strict line, the most critical passive data faucets like WebRTC are also mentioned.

We are not breaking the browsing experience, so you won't find things like spoofing referrers and canvas properties here.

To change the settings open about:config.

Google Safe Browsing

Leaks the browsing history to Google. Note that disabling Safe Browsing exposes you to a risk of not being stopped from visiting malicious or phishing sites.

browser.safebrowsing.enabled = false
browser.safebrowsing.downloads.enabled = false
browser.safebrowsing.malware.enabled = false

Firefox stats collecting

Stability and performance reports.

datareporting.healthreport.service.enabled = false
datareporting.healthreport.uploadEnabled = false

Usage statistics.

toolkit.telemetry.unified = false
toolkit.telemetry.enabled = false

Encrypted Media Extensions (DRM)

A binary plugin (closed-source) is shipped with Firefox since v38. It enables playback of encrypted media and lets you use e.g. Netflix without Microsoft Silverlight. To completely remove the plugin you would have to install an EME-free build of Firefox.

media.eme.enabled = false
media.gmp-eme-adobe.enabled = false

Firefox Hello

Firefox connects to third-party (Telefonica) servers without asking for permission.

loop.enabled = false

Pocket integration

A third-party service for managing a reading list of articles.

browser.pocket.enabled = false

Search suggestions

Everything you type in the search box is sent to the search engine. Suggestions based on local history will still work.

browser.search.suggest.enabled = false

WebRTC

Leaks the real IP when using VPN/TOR. Description and demo.

media.peerconnection.enabled = false

Instead of completely disabling WebRTC you could also make it connect over the default route only using:

media.peerconnection.ice.default_address_only = true

Geolocation

geo.enabled = false

Adobe Flash

plugin.state.flash = 0

Important changes

0.1 - initial commit

0.2 - removed mention of Reader mode (it doesn't leak data*) and added browser.safebrowsing.remoteLookups (it is confirmed to stop leaking data to Google while keeping Safe Browsing on*).

0.3 - browser.safebrowsing.remoteLookups turned out to do nothing after all. Actually, it was removed. Requests to the Google Safe Search API are not made often, so at first I thought they were gone.

0.4 - removed mention of Tracking Protection, because while blocking trackers, it "uses the same API as Google Safe Browsing". I would recommend using uBlock for this purpose instead.

0.5 - added toolkit.telemetry.unified, Adobe Flash and media.peerconnection.ice.default_address_only.

* tested using Fiddler


Pull requests are welcome.


Discussion of HN




鲜花

握手

雷人

路过

鸡蛋
该文章已有0人参与评论

请发表评论

全部评论

专题导读
热门推荐
阅读排行榜

扫描微信二维码

查看手机版网站

随时了解更新最新资讯

139-2527-9053

在线客服(服务时间 9:00~18:00)

在线QQ客服
地址:深圳市南山区西丽大学城创智工业园
电邮:jeky_zhao#qq.com
移动电话:139-2527-9053

Powered by 互联科技 X3.4© 2001-2213 极客世界.|Sitemap