arkenfox / user.js

Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening
MIT License
9.99k stars 512 forks source link

ToDo: diffs FF62-FF63 #501

Closed earthlng closed 5 years ago

earthlng commented 6 years ago

FF63 is scheduled for release 23th Oct

FF63 Release notes [when ready] FF63 for developers FF63 compatibility FF63 security advisories

199 diffs ( 122 new, 56 gone, 21 different )

misc:

new in v63.0:

removed, renamed or hidden in v63.0:

changed in v63.0:


ignore

click me for details

==NEW ```js pref("accessibility.typeaheadfind.manual", true); pref("apz.allow_double_tap_zooming", true); pref("browser.bookmarks.editDialog.showForNewBookmarks", true); pref("browser.contentblocking.allowlist.annotations.enabled", true); pref("browser.contentblocking.allowlist.storage.enabled", true); pref("browser.contentblocking.cookies-site-data.ui.reject-trackers.enabled", true); pref("browser.contentblocking.cookies-site-data.ui.reject-trackers.recommended", true); pref("browser.contentblocking.fastblock.control-center.ui.enabled", false); pref("browser.contentblocking.fastblock.ui.enabled", false); pref("browser.contentblocking.global-toggle.enabled", false); pref("browser.contentblocking.introCount", 0); pref("browser.contentblocking.rejecttrackers.control-center.ui.enabled", true); pref("browser.contentblocking.rejecttrackers.reportBreakage.enabled", true); pref("browser.contentblocking.rejecttrackers.ui.enabled", true); pref("browser.contentblocking.rejecttrackers.ui.recommended", true); pref("browser.contentblocking.reportBreakage.enabled", false); pref("browser.contentblocking.reportBreakage.url", "https://tracking-protection-issues.herokuapp.com/new"); pref("browser.contentblocking.trackingprotection.control-center.ui.enabled", true); pref("browser.contentblocking.trackingprotection.ui.enabled", true); pref("browser.contentblocking.ui.enabled", true); pref("browser.ctrlTab.recentlyUsedOrder", true); pref("browser.fastblock.enabled", false); pref("browser.fastblock.limit", 0); pref("browser.fastblock.timeout", 5000); pref("browser.newtabpage.activity-stream.asrouter.devtoolsEnabled", false); pref("browser.newtabpage.activity-stream.asrouter.messageProviders", "[{\"id\":\"onboarding\",\"type\":\"local\",\"localProvider\":\"OnboardingMessageProvider\",\"enabled\":false,\"cohort\":0},{\"id\":\"snippets\",\"type\":\"remote\",\"url\":\"https://snippets.cdn.mozilla.net/us-west/bundles/bundle_d6d90fb9098ce8b45e60acf601bcb91b68322309.json\",\"updateCycleInMs\":14400000,\"enabled\":false},{\"id\":\"cfr\",\"type\":\"local\",\"localProvider\":\"CFRMessageProvider\",\"enabled\":false,\"cohort\":\"\"}]"); pref("browser.newtabpage.activity-stream.pocketCta", "{\"cta_button\":\"\",\"cta_text\":\"\",\"cta_url\":\"\",\"use_cta\":false}"); pref("browser.tabs.remote.separatePrivilegedContentProcess", false); pref("devtools.aboutdebugging.collapsibilities.installedExtension", false); pref("devtools.aboutdebugging.collapsibilities.otherWorker", false); pref("devtools.aboutdebugging.collapsibilities.serviceWorker", false); pref("devtools.aboutdebugging.collapsibilities.sharedWorker", false); pref("devtools.aboutdebugging.collapsibilities.tab", false); pref("devtools.aboutdebugging.collapsibilities.temporaryExtension", false); pref("devtools.aboutdebugging.network-locations", "[]"); pref("devtools.aboutdebugging.new-enabled", false); pref("devtools.debugger.features.autocomplete-expressions", false); pref("devtools.debugger.features.component-pane", false); pref("devtools.debugger.features.map-await-expression", false); pref("devtools.debugger.features.map-expression-bindings", true); pref("devtools.inspector.chrome.three-pane-enabled", false); pref("devtools.promote.accessibility", 1); pref("devtools.remote.adb.extensionID", "adb@mozilla.org"); pref("devtools.responsive.leftAlignViewport.enabled", false); pref("devtools.responsive.show-setting-tooltip", true); pref("dom.animations-api.compositing.enabled", false); pref("dom.animations-api.getAnimations.enabled", false); pref("dom.animations-api.implicit-keyframes.enabled", false); pref("dom.animations-api.timelines.enabled", false); pref("dom.datatransfer.mozAtAPIs", true); pref("dom.events.asyncClipboard", true); pref("dom.events.asyncClipboard.dataTransfer", false); pref("dom.events.testing.asyncClipboard", false); pref("dom.ipc.keepProcessesAlive.privileged", 1); pref("dom.ipc.processCount.privileged", 1); pref("dom.payments.defaults.saveAddress", true); pref("dom.payments.defaults.saveCreditCard", false); pref("dom.payments.response.timeout", 5000); pref("dom.pointer-lock.enabled", true); pref("dom.ua_widget.enabled", false); pref("dom.visualviewport.enabled", false); pref("dom.vr.process.enabled", false); pref("dom.vr.service.enabled", false); pref("dom.webgpu.enable", false); pref("dom.window.event.enabled", false); pref("editor.inline_table_editing.enabled_by_default", true); pref("editor.positioning.enabled_by_default", true); pref("editor.resizing.enabled_by_default", true); pref("extensions.getAddons.langpacks.url", "https://services.addons.mozilla.org/api/v3/addons/language-tools/?app=firefox&type=language&appversion=%VERSION%"); pref("extensions.webextensions.enablePerformanceCounters", false); pref("gfx.webrender.debug.show-overdraw", false); pref("gfx.webrender.dl.dump-content", false); pref("gfx.webrender.dl.dump-parent", false); pref("gfx.webrender.force-disabled", false); pref("identity.fxaccounts.autoconfig.uri", ""); pref("identity.fxaccounts.commands.enabled", false); pref("intl.multilingual.enabled", false); pref("intl.tsf.hack.allow_to_stop_hacking_on_build_17643_or_later", false); pref("io.activity.enabled", false); pref("layout.css.motion-path.enabled", false); pref("layout.css.offset-logical-properties.enabled", false); pref("layout.css.overflow.moz-scrollbars.enabled", false); pref("layout.css.overflow-break.intrinsic-size", false); pref("layout.css.scrollbar-width.enabled", false); pref("layout.css.unknown-webkit-pseudo-element", false); pref("layout.css.use-counters.enabled", false); pref("layout.css.xul-box-display-values.content.enabled", true); pref("layout.css.xul-tree-pseudos.content.enabled", true); pref("marionette.log.truncate", true); pref("media.allowed-to-play.enabled", false); pref("media.autoplay.allow-extension-background-pages", true); pref("media.autoplay.allow-muted", true); pref("media.autoplay.ask-permission", false); pref("media.autoplay.block-event.enabled", false); pref("media.autoplay.block-webaudio", false); pref("media.autoplay.enabled.user-gestures-needed", false); pref("media.benchmark.vp9.fps", 0); pref("media.benchmark.vp9.versioncheck", 0); pref("media.peerconnection.sdp.rust.compare", false); pref("media.peerconnection.sdp.rust.enabled", false); pref("media.setsinkid.enabled", false); pref("network.cookie.quotaPerHost", 150); pref("network.dns.resolver-thread-extra-idle-time-seconds", 60); pref("network.http.send_window_size", 1024); pref("network.proxy.enable_wpad_over_dhcp", true); pref("network.trr.disable-ECS", true); pref("network.trr.max-fails", 5); pref("prio.publicKeyA", "35AC1C7576C7C6EDD7FED6BCFC337B34D48CB4EE45C86BEEFB40BD8875707733"); pref("prio.publicKeyB", "26E6674E65425B823F1F1D5F96E3BB3EF9E406EC7FBA7DEF8B08A35DD135AF50"); pref("privacy.restrict3rdpartystorage.expiration", 2592000); pref("security.csp.reporting.script-sample.max-length", 40); pref("security.pki.mitm_detected", false); pref("services.settings.poll_interval", 86400); pref("services.sync.prefs.sync.browser.contentblocking.enabled", true); pref("services.sync.prefs.sync.browser.ctrlTab.recentlyUsedOrder", true); pref("urlclassifier.trackingAnnotationTable", "test-track-simple,base-track-digest256"); pref("urlclassifier.trackingAnnotationWhitelistTable", "test-trackwhite-simple,mozstd-trackwhite-digest256"); ``` ==REMOVED or HIDDEN ```js pref("accessibility.typeaheadfind.enabletimeout", true); pref("browser.chromeURL", "chrome://browser/content/"); pref("browser.contentHandlers.types.0.title", "chrome://browser-region/locale/region.properties"); pref("browser.contentHandlers.types.0.type", "application/vnd.mozilla.maybe.feed"); pref("browser.contentHandlers.types.0.uri", "chrome://browser-region/locale/region.properties"); pref("browser.contentHandlers.types.1.title", "chrome://browser-region/locale/region.properties"); pref("browser.contentHandlers.types.1.type", "application/vnd.mozilla.maybe.feed"); pref("browser.contentHandlers.types.1.uri", "chrome://browser-region/locale/region.properties"); pref("browser.contentHandlers.types.2.title", "chrome://browser-region/locale/region.properties"); pref("browser.contentHandlers.types.2.type", "application/vnd.mozilla.maybe.feed"); pref("browser.contentHandlers.types.2.uri", "chrome://browser-region/locale/region.properties"); pref("browser.contentHandlers.types.3.title", "chrome://browser-region/locale/region.properties"); pref("browser.contentHandlers.types.3.type", "application/vnd.mozilla.maybe.feed"); pref("browser.contentHandlers.types.3.uri", "chrome://browser-region/locale/region.properties"); pref("browser.contentHandlers.types.4.title", "chrome://browser-region/locale/region.properties"); pref("browser.contentHandlers.types.4.type", "application/vnd.mozilla.maybe.feed"); pref("browser.contentHandlers.types.4.uri", "chrome://browser-region/locale/region.properties"); pref("browser.contentHandlers.types.5.title", "chrome://browser-region/locale/region.properties"); pref("browser.contentHandlers.types.5.type", "application/vnd.mozilla.maybe.feed"); pref("browser.contentHandlers.types.5.uri", "chrome://browser-region/locale/region.properties"); pref("browser.newtabpage.activity-stream.asrouter.snippetsUrl", ""); pref("browser.newtabpage.activity-stream.asrouterExperimentEnabled", false); pref("browser.newtabpage.activity-stream.asrouterOnboardingCohort", 0); pref("browser.newtabpage.activity-stream.feeds.theme", true); pref("browser.newtabpage.activity-stream.section.topstories.showDisclaimer", true); pref("browser.newtabpage.activity-stream.tippyTop.service.endpoint", "https://activity-stream-icons.services.mozilla.com/v1/icons.json.br"); pref("browser.showQuitWarning", false); pref("devtools.browserconsole.html", false); pref("devtools.debugger.component-stack-visible", true); pref("devtools.debugger.features.component-stack", false); pref("dom.animations-api.element-animate.enabled", true); pref("extensions.webextensions.themes.enabled", true); pref("gfx.webrender.async-scene-build", true); pref("identity.fxaccounts.messages.enabled", false); pref("layout.accessiblecaret.bar.enabled", false); pref("layout.accessiblecaret.bar.width", "2.0"); pref("layout.css.all-shorthand.enabled", true); pref("layout.css.property-append-only", false); pref("layout.css.unset-value.enabled", true); pref("media.ogg.flac.enabled", true); pref("media.wmf.amd.vp9.enabled", false); pref("network.cookie.prefsMigrated", false); pref("privacy.trackingprotection.storagerestriction.enabled", false); pref("services.sync.prefs.sync.browser.ctrlTab.previews", true); pref("services.sync.prefs.sync.network.cookie.lifetime.days", true); pref("shield.savant.loglevel", "warn"); pref("svg.marker-improvements.enabled", true); pref("webgl.webgl2-compat-mode", false); ``` ==CHANGED ```js pref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts.searchEngines", ""); // prev: "google" pref("browser.safebrowsing.provider.mozilla.lists", "base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256,ads-track-digest256,social-track-digest256,analytics-track-digest256,fastblock1-track-digest256,fastblock1-trackwhite-digest256,fastblock2-track-digest256,fastblock2-trackwhite-digest256,fastblock3-track-digest256"); // prev: "base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256,ads-track-digest256,social-track-digest256,analytics-track-digest256" pref("browser.translation.engine", "Google"); // prev: "bing" pref("devtools.accessibility.enabled", true); // prev: false pref("devtools.debugger.features.skip-pausing", true); // prev: false pref("devtools.inspector.fonteditor.enabled", true); // prev: false pref("devtools.inspector.fonthighlighter.enabled", true); // prev: false pref("devtools.toolbox.selectedTool", "inspector"); // prev: "webconsole" pref("dom.animations-api.core.enabled", true); // prev: false pref("dom.clearSiteData.enabled", true); // prev: false pref("dom.webcomponents.customelements.enabled", true); // prev: false pref("dom.webcomponents.shadowdom.enabled", true); // prev: false pref("extensions.webextensions.background-delayed-startup", true); // prev: false pref("layout.css.prefixes.device-pixel-ratio-webkit", true); // prev: false pref("layout.css.webkit-appearance.enabled", true); // prev: false pref("media.av1.enabled", false); // prev: true pref("network.trr.request-timeout", 1500); // prev: 3000 pref("network.trr.uri", "https://mozilla.cloudflare-dns.com/dns-query"); // prev: "" pref("urlclassifier.disallow_completions", "test-malware-simple,test-harmful-simple,test-phish-simple,test-unwanted-simple,test-track-simple,test-trackwhite-simple,test-block-simple,goog-downloadwhite-digest256,base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256,goog-passwordwhite-proto,ads-track-digest256,social-track-digest256,analytics-track-digest256,fastblock1-track-digest256,fastblock1-trackwhite-digest256,fastblock2-track-digest256,fastblock2-trackwhite-digest256,fastblock3-track-digest256"); // prev: "test-malware-simple,test-harmful-simple,test-phish-simple,test-unwanted-simple,test-track-simple,test-trackwhite-simple,test-block-simple,goog-downloadwhite-digest256,base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256,goog-passwordwhite-proto,ads-track-digest256,social-track-digest256,analytics-track-digest256" ```

earthlng commented 6 years ago
some bugzilla tickets

* accessibility.typeaheadfind.enabletimeout Bug [260562](https://bugzilla.mozilla.org/show_bug.cgi?id=260562) - Remove obsolete accessibility.typeaheadfind.enabletimeout preference. * accessibility.typeaheadfind.manual Bug [1418033](https://bugzilla.mozilla.org/show_bug.cgi?id=1418033) - Make it possible to disable fast find. * app.update.enabled Bug [1420514](https://bugzilla.mozilla.org/show_bug.cgi?id=1420514) - Remove app.update.enabled from prefs files * apz.allow_double_tap_zooming Bug [1479549](https://bugzilla.mozilla.org/show_bug.cgi?id=1479549) Add a pref to disable double tap zooming in APZ * browser.bookmarks.editDialog.showForNewBookmarks Bug [1459878](https://bugzilla.mozilla.org/show_bug.cgi?id=1459878) - Add "Show editor when saving" checkbox to the Bookmark panel. * browser.chrome.favicons Bug [1453751](https://bugzilla.mozilla.org/show_bug.cgi?id=1453751): Load favicons in the content process. r=mak, r=gijs, r=aswan, * browser.chromeURL Bug [1476333](https://bugzilla.mozilla.org/show_bug.cgi?id=1476333) - Refer to AppConstants.BROWSER_CHROME_URL to get the browser URL from the frontend;r=Gijs * browser.contentblocking.cookies-site-data.ui.reject-trackers.enabled Bug [1487178](https://bugzilla.mozilla.org/show_bug.cgi?id=1487178) - Ensure that the Firefox configuration is up to date for the Content Blocking project; Bug [1483378](https://bugzilla.mozilla.org/show_bug.cgi?id=1483378) - Part 5: Remove the old Cookies & Site Data UI; Bug [1483378](https://bugzilla.mozilla.org/show_bug.cgi?id=1483378) - Part 4: Enable hiding the "reject trackers" menu item based on a preference; * browser.contentblocking.cookies-site-data.ui.reject-trackers.recommended Bug [1487178](https://bugzilla.mozilla.org/show_bug.cgi?id=1487178) - Ensure that the Firefox configuration is up to date for the Content Blocking project; Bug [1483378](https://bugzilla.mozilla.org/show_bug.cgi?id=1483378) - Part 1: Update the Cookies and Site Data UI in the Preferences window; * browser.contentblocking.enabled Bug [1486092](https://bugzilla.mozilla.org/show_bug.cgi?id=1486092) - Part 1: Move the browser.contentblocking.enabled pref to StaticPrefs; Bug [1482281](https://bugzilla.mozilla.org/show_bug.cgi?id=1482281) - Sync contentblocking pref. Bug [1476217](https://bugzilla.mozilla.org/show_bug.cgi?id=1476217) - Part 1 - Update Tracking Protection preferences for Content Blocking. * browser.contentblocking.fastblock.control-center.ui.enabled Bug [1487178](https://bugzilla.mozilla.org/show_bug.cgi?id=1487178) - Ensure that the Firefox configuration is up to date for the Content Blocking project; Bug [1485199](https://bugzilla.mozilla.org/show_bug.cgi?id=1485199) - Add prefs for hiding the other two categories in the Content Blocking section of the Control Centre; * browser.contentblocking.fastblock.ui.enabled Bug [1487178](https://bugzilla.mozilla.org/show_bug.cgi?id=1487178) - Ensure that the Firefox configuration is up to date for the Content Blocking project; Bug [1486414](https://bugzilla.mozilla.org/show_bug.cgi?id=1486414) - Add prefs to hide the Trackers and FastBlock categories in the Content Blocking preferences; * browser.contentblocking.introCount Bug [1484583](https://bugzilla.mozilla.org/show_bug.cgi?id=1484583) - Update Tracking Protection UI tour for Content Blocking. * browser.contentblocking.rejecttrackers.control-center.ui.enabled Bug [1487178](https://bugzilla.mozilla.org/show_bug.cgi?id=1487178) - Ensure that the Firefox configuration is up to date for the Content Blocking project; Bug [1484312](https://bugzilla.mozilla.org/show_bug.cgi?id=1484312) - Add UI for restricting third-party cookies to the Control Centre; * browser.contentblocking.rejecttrackers.ui.enabled Bug [1487178](https://bugzilla.mozilla.org/show_bug.cgi?id=1487178) - Ensure that the Firefox configuration is up to date for the Content Blocking project; Bug [1484769](https://bugzilla.mozilla.org/show_bug.cgi?id=1484769) - Part 1: Update the Content Blocking section of the Preferences UI to add Third-Party Cookies options; * browser.contentblocking.rejecttrackers.ui.recommended Bug [1487178](https://bugzilla.mozilla.org/show_bug.cgi?id=1487178) - Ensure that the Firefox configuration is up to date for the Content Blocking project; Bug [1484769](https://bugzilla.mozilla.org/show_bug.cgi?id=1484769) - Part 1: Update the Content Blocking section of the Preferences UI to add Third-Party Cookies options; * browser.contentblocking.reportBreakage.enabled Bug [1474238](https://bugzilla.mozilla.org/show_bug.cgi?id=1474238) - Add a "report breakage" dialog for Tracking Protection. * browser.contentblocking.reportBreakage.url Bug [1474238](https://bugzilla.mozilla.org/show_bug.cgi?id=1474238) - Add a "report breakage" dialog for Tracking Protection. * browser.contentblocking.trackingprotection.control-center.ui.enabled Bug [1487178](https://bugzilla.mozilla.org/show_bug.cgi?id=1487178) - Ensure that the Firefox configuration is up to date for the Content Blocking project; Bug [1485199](https://bugzilla.mozilla.org/show_bug.cgi?id=1485199) - Add prefs for hiding the other two categories in the Content Blocking section of the Control Centre; * browser.contentblocking.trackingprotection.ui.enabled Bug [1487178](https://bugzilla.mozilla.org/show_bug.cgi?id=1487178) - Ensure that the Firefox configuration is up to date for the Content Blocking project; Bug [1486414](https://bugzilla.mozilla.org/show_bug.cgi?id=1486414) - Add prefs to hide the Trackers and FastBlock categories in the Content Blocking preferences; * browser.contentblocking.ui.enabled Bug [1476217](https://bugzilla.mozilla.org/show_bug.cgi?id=1476217) - Part 1 - Update Tracking Protection preferences for Content Blocking. * browser.contentHandlers.types.0.title Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.0.type Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.0.uri Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.1.title Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.1.type Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.1.uri Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.2.title Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.2.type Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.2.uri Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.3.title Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.3.type Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.3.uri Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.4.title Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.4.type Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.4.uri Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.5.title Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.5.type Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.contentHandlers.types.5.uri Bug [1477670](https://bugzilla.mozilla.org/show_bug.cgi?id=1477670) - remove web feed handling prefs and tidy up user-set prefs if they exist, * browser.ctrlTab.previews Bug [1473595](https://bugzilla.mozilla.org/show_bug.cgi?id=1473595) - Enable "Ctrl+Tab cycles through tabs in recently used order" feature by default in new profiles. * browser.ctrlTab.recentlyUsedOrder Bug [1473595](https://bugzilla.mozilla.org/show_bug.cgi?id=1473595) - Enable "Ctrl+Tab cycles through tabs in recently used order" feature by default in new profiles. * browser.fastblock.enabled Bug [1474280](https://bugzilla.mozilla.org/show_bug.cgi?id=1474280) - Part 1: Cancel timed-out trackers; Bug [1480443](https://bugzilla.mozilla.org/show_bug.cgi?id=1480443) - Enable FastBlock by default on Nightly. * browser.fastblock.timeout Bug [1474280](https://bugzilla.mozilla.org/show_bug.cgi?id=1474280) - Part 1: Cancel timed-out trackers; * browser.showQuitWarning Bug [1438499](https://bugzilla.mozilla.org/show_bug.cgi?id=1438499) - show 'close multiple tabs' warning dialog when quitting, * browser.startup.homepage Bug [721211](https://bugzilla.mozilla.org/show_bug.cgi?id=721211): consolidate home page retrieval code, make it support non-localized prefs, * browser.tabs.remote.separatePrivilegedContentProcess Bug [1469072](https://bugzilla.mozilla.org/show_bug.cgi?id=1469072) - Add infrastructure to move Activity Stream into its own content process. * browser.translation.engine Bug [1488232](https://bugzilla.mozilla.org/show_bug.cgi?id=1488232) - add a Google translation backend, * devtools.aboutdebugging.collapsibilities.installedExtension Bug [1477603](https://bugzilla.mozilla.org/show_bug.cgi?id=1477603) - Part 3: Collapse/expand by the preferences. * devtools.aboutdebugging.collapsibilities.otherWorker Bug [1477603](https://bugzilla.mozilla.org/show_bug.cgi?id=1477603) - Part 3: Collapse/expand by the preferences. * devtools.aboutdebugging.collapsibilities.serviceWorker Bug [1477603](https://bugzilla.mozilla.org/show_bug.cgi?id=1477603) - Part 3: Collapse/expand by the preferences. * devtools.aboutdebugging.collapsibilities.sharedWorker Bug [1477603](https://bugzilla.mozilla.org/show_bug.cgi?id=1477603) - Part 3: Collapse/expand by the preferences. * devtools.aboutdebugging.collapsibilities.tab Bug [1477603](https://bugzilla.mozilla.org/show_bug.cgi?id=1477603) - Part 3: Collapse/expand by the preferences. * devtools.aboutdebugging.collapsibilities.temporaryExtension Bug [1477603](https://bugzilla.mozilla.org/show_bug.cgi?id=1477603) - Part 3: Collapse/expand by the preferences. * devtools.aboutdebugging.network-locations Bug [1482054](https://bugzilla.mozilla.org/show_bug.cgi?id=1482054) - Create module to manage network locations;r=daisuke * devtools.aboutdebugging.new-enabled Bug [1471795](https://bugzilla.mozilla.org/show_bug.cgi?id=1471795) - Part 1: Implement basis of 'This Firefox' page. * devtools.aboutdebugging.showSystemAddons Bug [1425347](https://bugzilla.mozilla.org/show_bug.cgi?id=1425347) - Hide system add-ons by default in about:debugging * devtools.accessibility.enabled Bug [1482454](https://bugzilla.mozilla.org/show_bug.cgi?id=1482454) - enabled accessibility panel by default. * devtools.browserconsole.html Bug [1469341](https://bugzilla.mozilla.org/show_bug.cgi?id=1469341) - Remove the XUL wrapper document for the Browser Console;r=nchevobbe Bug [1456663](https://bugzilla.mozilla.org/show_bug.cgi?id=1456663) - Add a preference to open webconsole.html directly in the Browser Console;r=nchevobbe * devtools.debugger.features.map-await-expression Bug [1485471](https://bugzilla.mozilla.org/show_bug.cgi?id=1485471) - Update Debugger Frontend v85. Bug [1481628](https://bugzilla.mozilla.org/show_bug.cgi?id=1481628) - Update Debugger Frontend v80. * devtools.inspector.chrome.three-pane-enabled Bug [1472309](https://bugzilla.mozilla.org/show_bug.cgi?id=1472309) - Don't enable the 3 pane inspector by default on the browser toolbox. * devtools.inspector.fonteditor.enabled Bug [1485326](https://bugzilla.mozilla.org/show_bug.cgi?id=1485326) - Set the Font Editor pref to true for all channels. Bug [1470375](https://bugzilla.mozilla.org/show_bug.cgi?id=1470375) - Set the font editor pref to true in Nightly builds. * devtools.inspector.fonthighlighter.enabled Bug [1486720](https://bugzilla.mozilla.org/show_bug.cgi?id=1486720) - Enable font highlighter. Bug [1440855](https://bugzilla.mozilla.org/show_bug.cgi?id=1440855) - New font text-run highlighter used from the font inspector * devtools.promote.accessibility Bug [1482454](https://bugzilla.mozilla.org/show_bug.cgi?id=1482454) - Display a "New" indicator to promote the accessibility panel. * devtools.responsive.leftAlignViewport.enabled Bug [1467572](https://bugzilla.mozilla.org/show_bug.cgi?id=1467572) - Part 17: Implement left alignment of viewports. * devtools.responsive.show-setting-tooltip Bug [1467572](https://bugzilla.mozilla.org/show_bug.cgi?id=1467572) - Part 18: Show an onboarding tooltip for the setting menu button in RDM. * devtools.toolbox.selectedTool Bug [1471952](https://bugzilla.mozilla.org/show_bug.cgi?id=1471952) - change default tool to Inspector * dom.animations-api.compositing.enabled Bug [1471814](https://bugzilla.mozilla.org/show_bug.cgi?id=1471814) - Add a preference for {Document,Element}.getAnimations(); * dom.animations-api.core.enabled Bug [1476158](https://bugzilla.mozilla.org/show_bug.cgi?id=1476158) - Enable dom.animations-api.core.enabled on beta/release; Bug [1471814](https://bugzilla.mozilla.org/show_bug.cgi?id=1471814) - Add a preference for {Document,Element}.getAnimations(); * dom.animations-api.element-animate.enabled Bug [1475162](https://bugzilla.mozilla.org/show_bug.cgi?id=1475162) - Drop dom.animations-api.element-animate.enabled pref; * dom.animations-api.getAnimations.enabled Bug [1471814](https://bugzilla.mozilla.org/show_bug.cgi?id=1471814) - Add a preference for {Document,Element}.getAnimations(); * dom.animations-api.implicit-keyframes.enabled Bug [1471814](https://bugzilla.mozilla.org/show_bug.cgi?id=1471814) - Add a preference for {Document,Element}.getAnimations(); * dom.animations-api.timelines.enabled Bug [1471814](https://bugzilla.mozilla.org/show_bug.cgi?id=1471814) - Add a preference for Web Animations timelines; * dom.clearSiteData.enabled Bug [1268889](https://bugzilla.mozilla.org/show_bug.cgi?id=1268889) - Implement Clear-Site-Data header - part 2 - pref, * dom.datatransfer.mozAtAPIs Bug [1453153](https://bugzilla.mozilla.org/show_bug.cgi?id=1453153) - Initial removal of moz* APIs in DataTransfer, * dom.events.asyncClipboard Bug [1479935](https://bugzilla.mozilla.org/show_bug.cgi?id=1479935) - Enable async clipboard readText and writeText APIs by default, Bug [1461465](https://bugzilla.mozilla.org/show_bug.cgi?id=1461465) - Implement async Clipboard APIs * dom.events.asyncClipboard.dataTransfer Bug [1461465](https://bugzilla.mozilla.org/show_bug.cgi?id=1461465) - Implement async Clipboard APIs * dom.events.testing.asyncClipboard Bug [1461465](https://bugzilla.mozilla.org/show_bug.cgi?id=1461465) - Implement async Clipboard APIs * dom.ipc.keepProcessesAlive.privileged Bug [1469072](https://bugzilla.mozilla.org/show_bug.cgi?id=1469072) - Add infrastructure to move Activity Stream into its own content process. * dom.ipc.processCount.privileged Bug [1469072](https://bugzilla.mozilla.org/show_bug.cgi?id=1469072) - Add infrastructure to move Activity Stream into its own content process. * dom.payments.defaults.saveAddress Bug [1477106](https://bugzilla.mozilla.org/show_bug.cgi?id=1477106) - Use a pref to set default checkedness for "Save card to Firefox" and "Save address to Firefox" checkboxes. * dom.payments.defaults.saveCreditCard Bug [1477106](https://bugzilla.mozilla.org/show_bug.cgi?id=1477106) - Use a pref to set default checkedness for "Save card to Firefox" and "Save address to Firefox" checkboxes. * dom.payments.response.timeout Bug [1447773](https://bugzilla.mozilla.org/show_bug.cgi?id=1447773) - Time out PaymentResponse after 5 seconds. * dom.pointer-lock.enabled Bug [1486297](https://bugzilla.mozilla.org/show_bug.cgi?id=1486297) - Add a pref for Pointer Lock API so that user can disable it. * dom.ua_widget.enabled bug [1431255](https://bugzilla.mozilla.org/show_bug.cgi?id=1431255), disable ua widgets, since they break tests when shadow DOM is enabled, Bug [1431255](https://bugzilla.mozilla.org/show_bug.cgi?id=1431255) - Part I, Add dom.ua_widget.enabled pref and enable for Desktop Nightly only * dom.visualviewport.enabled Bug [1357785](https://bugzilla.mozilla.org/show_bug.cgi?id=1357785) - Expose the Visual Viewport API to web content. * dom.vr.process.enabled Bug [1430038](https://bugzilla.mozilla.org/show_bug.cgi?id=1430038) - Part 1: Add VR process to the process list; * dom.vr.service.enabled Bug [1466699](https://bugzilla.mozilla.org/show_bug.cgi?id=1466699) - Implement VRService thread * dom.webcomponents.customelements.enabled Bug [1471947](https://bugzilla.mozilla.org/show_bug.cgi?id=1471947), bug [1471948](https://bugzilla.mozilla.org/show_bug.cgi?id=1471948) - Enable Shadow DOM and Custom Elements in release builds, * dom.webcomponents.shadowdom.enabled Bug [1471947](https://bugzilla.mozilla.org/show_bug.cgi?id=1471947), bug [1471948](https://bugzilla.mozilla.org/show_bug.cgi?id=1471948) - Enable Shadow DOM and Custom Elements in release builds, Bug [1471814](https://bugzilla.mozilla.org/show_bug.cgi?id=1471814) - Add a preference for {Document,Element}.getAnimations(); Bug [1460069](https://bugzilla.mozilla.org/show_bug.cgi?id=1460069) - enable Shadow DOM in Nightly, * dom.webgpu.enable Bug [1469376](https://bugzilla.mozilla.org/show_bug.cgi?id=1469376) - Initial stubs for WebGPU sketch API. - * editor.inline_table_editing.enabled_by_default Bug [1449564](https://bugzilla.mozilla.org/show_bug.cgi?id=1449564) - part 4: Make users can show Gecko specific editing UIs with new prefs * editor.positioning.enabled_by_default Bug [1449564](https://bugzilla.mozilla.org/show_bug.cgi?id=1449564) - part 4: Make users can show Gecko specific editing UIs with new prefs * editor.resizing.enabled_by_default Bug [1449564](https://bugzilla.mozilla.org/show_bug.cgi?id=1449564) - part 4: Make users can show Gecko specific editing UIs with new prefs * extensions.getAddons.langpacks.url Bug [1429610](https://bugzilla.mozilla.org/show_bug.cgi?id=1429610) Add internal api to look up available language packs * extensions.webextensions.background-delayed-startup Bug [1457224](https://bugzilla.mozilla.org/show_bug.cgi?id=1457224) Enable delayed background page startup on Nightly * extensions.webextensions.enablePerformanceCounters Bug [1468550](https://bugzilla.mozilla.org/show_bug.cgi?id=1468550) - Track webextension activity - * extensions.webextensions.themes.enabled Bug [1477775](https://bugzilla.mozilla.org/show_bug.cgi?id=1477775) - Remove extensions.webextensions.themes.enabled preference. * gfx.webrender.async-scene-build Bug [1474576](https://bugzilla.mozilla.org/show_bug.cgi?id=1474576) - Remove the async scene building pref. Bug [1452845](https://bugzilla.mozilla.org/show_bug.cgi?id=1452845) - Turn on async scene building by default. * gfx.webrender.debug.show-overdraw Bug [1485538](https://bugzilla.mozilla.org/show_bug.cgi?id=1485538) - Expose WebRender's "show overdraw" debug mode behind a pref. * gfx.webrender.dl.dump-content Bug [1475637](https://bugzilla.mozilla.org/show_bug.cgi?id=1475637) - Add a mechanism for dumping an interleaved display list. * gfx.webrender.dl.dump-parent Bug [1475637](https://bugzilla.mozilla.org/show_bug.cgi?id=1475637) - Add a mechanism for dumping an interleaved display list. * gfx.webrender.force-disabled Bug [1463911](https://bugzilla.mozilla.org/show_bug.cgi?id=1463911) - Add a pref to force-disable WR. * identity.fxaccounts.autoconfig.uri Bug [1480815](https://bugzilla.mozilla.org/show_bug.cgi?id=1480815) - Define fxa autoconfig pref by default. * identity.fxaccounts.commands.enabled Bug [1484461](https://bugzilla.mozilla.org/show_bug.cgi?id=1484461) - Disable FxA commands Bug [1483979](https://bugzilla.mozilla.org/show_bug.cgi?id=1483979) - Enable fxa commands Bug [1466933](https://bugzilla.mozilla.org/show_bug.cgi?id=1466933) - Implement FxA commands. * identity.fxaccounts.messages.enabled Bug [1466933](https://bugzilla.mozilla.org/show_bug.cgi?id=1466933) - Implement FxA commands. Bug [1442133](https://bugzilla.mozilla.org/show_bug.cgi?id=1442133) - FxA messages client implementation. * intl.multilingual.enabled Bug [1469684](https://bugzilla.mozilla.org/show_bug.cgi?id=1469684) - Allow switching between installed locales * intl.tsf.hack.allow_to_stop_hacking_on_build_17643_or_later Bug [1481153](https://bugzilla.mozilla.org/show_bug.cgi?id=1481153) - part 4: Should stop hacking the result of TSFTextStore::GetTextExt() when Win10 build 17643 only in Nightly or early Beta * io.activity.enabled Bug [1470073](https://bugzilla.mozilla.org/show_bug.cgi?id=1470073) - Make IOActivityMonitor timer optional - * layout.accessiblecaret.bar.enabled Bug [1347048](https://bugzilla.mozilla.org/show_bug.cgi?id=1347048) - Remove AccessibleCaret's selection bar support. * layout.accessiblecaret.bar.width Bug [1347048](https://bugzilla.mozilla.org/show_bug.cgi?id=1347048) - Remove AccessibleCaret's selection bar support. * layout.css.all-shorthand.enabled Bug [1459524](https://bugzilla.mozilla.org/show_bug.cgi?id=1459524) - Removed layout.css.all-shorthand.enabled pref - * layout.css.motion-path.enabled Bug [1429298](https://bugzilla.mozilla.org/show_bug.cgi?id=1429298) - Part 7: Tests. Bug [1429298](https://bugzilla.mozilla.org/show_bug.cgi?id=1429298) - Part 1: Define the preference for motion-path. * layout.css.moz-document.url-prefix-hack.enabled Bug [1448225](https://bugzilla.mozilla.org/show_bug.cgi?id=1448225) - Convert StylePrefs to StaticPrefs. * layout.css.offset-logical-properties.enabled Bug [1464782](https://bugzilla.mozilla.org/show_bug.cgi?id=1464782): Put offset-* aliases behind a pref. * layout.css.overflow.moz-scrollbars.enabled Bug [1481125](https://bugzilla.mozilla.org/show_bug.cgi?id=1481125) - Put overflow: -moz-scrollbar-* behind pref. * layout.css.overflow-break.intrinsic-size Bug [1484587](https://bugzilla.mozilla.org/show_bug.cgi?id=1484587) - Put the behavior that overflow-wrap: break-word affecting intrinsic size behind a pref and disable it by default. * layout.css.prefixes.device-pixel-ratio-webkit Bug [1448225](https://bugzilla.mozilla.org/show_bug.cgi?id=1448225) - Convert StylePrefs to StaticPrefs. * layout.css.property-append-only Bug [1473180](https://bugzilla.mozilla.org/show_bug.cgi?id=1473180) part 3 - Use the new algorithm for setting property. Bug [1461285](https://bugzilla.mozilla.org/show_bug.cgi?id=1461285) part 3 - Have the CSSOM appending behavior behind a pref and only enable it on Nightly. * layout.css.scrollbar-width.enabled Bug [1475033](https://bugzilla.mozilla.org/show_bug.cgi?id=1475033) part 3 - Add scrollbar-width property. * layout.css.unknown-webkit-pseudo-element Bug [1424106](https://bugzilla.mozilla.org/show_bug.cgi?id=1424106) - Accept unknown webkit pseudo-element. * layout.css.unset-value.enabled Bug [1211330](https://bugzilla.mozilla.org/show_bug.cgi?id=1211330) - Removed CSS pref layout.css.unset-value.enabled - * layout.css.use-counters.enabled Bug [1425700](https://bugzilla.mozilla.org/show_bug.cgi?id=1425700) - Hook the use counters into StyleSheet parsing. * layout.css.webkit-appearance.enabled Bug [1428676](https://bugzilla.mozilla.org/show_bug.cgi?id=1428676) pt 4. Move pref layout.css.webkit-appearance.enabled to StaticPrefList.h. Bug [1429713](https://bugzilla.mozilla.org/show_bug.cgi?id=1429713) part 1 - Add a -webkit-appearance alias for -moz-appearance (behind a pref). * layout.css.xul-box-display-values.content.enabled Bug [1477553](https://bugzilla.mozilla.org/show_bug.cgi?id=1477553): Hide display: -moz-box|-moz-inline-box from content on Nightly and early beta. * layout.css.xul-tree-pseudos.content.enabled Bug [1480054](https://bugzilla.mozilla.org/show_bug.cgi?id=1480054): Restrict XUL tree pseudos on nightly and early-beta. * media.allowed-to-play.enabled Bug [1478208](https://bugzilla.mozilla.org/show_bug.cgi?id=1478208) - Implement HTMLMediaElement.allowedToPlay. * media.autoplay.allow-extension-background-pages Bug [1466926](https://bugzilla.mozilla.org/show_bug.cgi?id=1466926) - part2 : add a new preference to control autoplay from background script. * media.autoplay.allow-muted Bug [1477477](https://bugzilla.mozilla.org/show_bug.cgi?id=1477477) - Add preference for autoplaying muted media. * media.autoplay.ask-permission Bug [1476853](https://bugzilla.mozilla.org/show_bug.cgi?id=1476853) - Enable block autoplay on Nightly only on desktop. Bug [1463919](https://bugzilla.mozilla.org/show_bug.cgi?id=1463919) - Have HTMLMediaElement ask for autoplay permission when playback otherwise blocked. * media.autoplay.block-event.enabled Bug [1463919](https://bugzilla.mozilla.org/show_bug.cgi?id=1463919) - Tests for prompting for permission to autoplay. * media.autoplay.block-webaudio Bug [1476853](https://bugzilla.mozilla.org/show_bug.cgi?id=1476853) - Don't block WebAudio autoplay by default. * media.autoplay.default Bug [1470082](https://bugzilla.mozilla.org/show_bug.cgi?id=1470082) - Change autoplay checkbox to combobox. Bug [1476853](https://bugzilla.mozilla.org/show_bug.cgi?id=1476853) - Enable block autoplay on Nightly only on desktop. * media.autoplay.enabled Bug [1470082](https://bugzilla.mozilla.org/show_bug.cgi?id=1470082) - Change autoplay checkbox to combobox. Bug [1476853](https://bugzilla.mozilla.org/show_bug.cgi?id=1476853) - Enable block autoplay on Nightly only on desktop. * media.autoplay.enabled.user-gestures-needed Bug [1476853](https://bugzilla.mozilla.org/show_bug.cgi?id=1476853) - Enable block autoplay on Nightly only on desktop. * media.av1.enabled Bug [1476975](https://bugzilla.mozilla.org/show_bug.cgi?id=1476975) - P1. Make media.av1.enabled pref public. * media.benchmark.vp9.fps Bug [1409664](https://bugzilla.mozilla.org/show_bug.cgi?id=1409664) - P24. Make IsVP9DecodeFast usable on any thread. * media.benchmark.vp9.versioncheck Bug [1409664](https://bugzilla.mozilla.org/show_bug.cgi?id=1409664) - P24. Make IsVP9DecodeFast usable on any thread. * media.media-capabilities.enabled Bug [1480190](https://bugzilla.mozilla.org/show_bug.cgi?id=1480190) - Enable media-capablities extension by default. Bug [1482243](https://bugzilla.mozilla.org/show_bug.cgi?id=1482243) - Place Screen's MediaCapabilities behind a different pref. Bug [1409664](https://bugzilla.mozilla.org/show_bug.cgi?id=1409664) - P1. Add MediaCapabilities skeleton IDL. * media.media-capabilities.screen.enabled Bug [1482243](https://bugzilla.mozilla.org/show_bug.cgi?id=1482243) - Place Screen's MediaCapabilities behind a different pref. * media.ogg.flac.enabled Bug [1448222](https://bugzilla.mozilla.org/show_bug.cgi?id=1448222) - Remove MediaPrefs. Bug [1409664](https://bugzilla.mozilla.org/show_bug.cgi?id=1409664) - P6. Remove flac in ogg preference. * media.peerconnection.sdp.rust.compare Bug [1477072](https://bugzilla.mozilla.org/show_bug.cgi?id=1477072): Enabled media.peerconnection.sdp.rust.enabled in Nightly, Bug [1476750](https://bugzilla.mozilla.org/show_bug.cgi?id=1476750): Updated preferences controlling Rust SDP Parse behavior, * media.peerconnection.sdp.rust.enabled Bug [1477072](https://bugzilla.mozilla.org/show_bug.cgi?id=1477072): Enabled media.peerconnection.sdp.rust.enabled in Nightly, Bug [1476750](https://bugzilla.mozilla.org/show_bug.cgi?id=1476750): Updated preferences controlling Rust SDP Parse behavior, * media.setsinkid.enabled Bug [1152401](https://bugzilla.mozilla.org/show_bug.cgi?id=1152401) - Create pref to enable enumeration of output devices. * media.wmf.amd.vp9.enabled Bug [1470754](https://bugzilla.mozilla.org/show_bug.cgi?id=1470754) - Remove AMD VP9 MFT support Bug [1461268](https://bugzilla.mozilla.org/show_bug.cgi?id=1461268) - P1. Disable AMD VP9 decoder. * network.cookie.lifetime.days Bug [1457170](https://bugzilla.mozilla.org/show_bug.cgi?id=1457170) - Get rid of nsICookieService::ACCEPT_FOR_N_DAYS, * network.cookie.prefsMigrated Bug [1430095](https://bugzilla.mozilla.org/show_bug.cgi?id=1430095) - Get rid of network.cookie.prefsMigrated, network.cookie.lifetime.enabled and network.cookie.lifetime.behavior prefs, * network.cookie.quotaPerHost Bug [1357676](https://bugzilla.mozilla.org/show_bug.cgi?id=1357676) - Implement batch eviction * network.dns.resolver-thread-extra-idle-time-seconds Bug [1478732](https://bugzilla.mozilla.org/show_bug.cgi?id=1478732) - Change nsHostResolver to dispatch one resolver task per native lookup Bug [1471280](https://bugzilla.mozilla.org/show_bug.cgi?id=1471280) - Add new pref for how much longer resolver threads should remain idle * network.http.send_window_size Bug [1280629](https://bugzilla.mozilla.org/show_bug.cgi?id=1280629) - Part 1: Suspend the http channel if the child process is not able to consume on time. * network.proxy.enable_wpad_over_dhcp Bug [356831](https://bugzilla.mozilla.org/show_bug.cgi?id=356831) - Proxy autodiscovery doesn't check DHCP (option 252) * network.trr.disable-ECS bug [1466462](https://bugzilla.mozilla.org/show_bug.cgi?id=1466462) - TRR: disable EDNS Client Subnet by default * prio.publicKeyA Bug [1421501](https://bugzilla.mozilla.org/show_bug.cgi?id=1421501) - WebIDL and DOM for PrioEncoder * prio.publicKeyB Bug [1421501](https://bugzilla.mozilla.org/show_bug.cgi?id=1421501) - WebIDL and DOM for PrioEncoder * privacy.restrict3rdpartystorage.expiration Bug [1475236](https://bugzilla.mozilla.org/show_bug.cgi?id=1475236) - Expiration time for the anti-tracking permission should be controllable via pref, * privacy.trackingprotection.storagerestriction.enabled Bug [1470578](https://bugzilla.mozilla.org/show_bug.cgi?id=1470578) - Rename the anti-tracking pref, Bug [1461921](https://bugzilla.mozilla.org/show_bug.cgi?id=1461921) - Block storage access for third-parties on the tracking protection list - part 1 - Pref and Blocking check, * privacy.trackingprotection.ui.enabled Bug [1476879](https://bugzilla.mozilla.org/show_bug.cgi?id=1476879) - Remove the privacy.trackingprotection.ui.enabled pref. * security.csp.enable_violation_events Bug [1476820](https://bugzilla.mozilla.org/show_bug.cgi?id=1476820) - Convert some VarCache prefs in dom/security/ to use StaticPrefs. * security.pki.mitm_detected Bug [1480704](https://bugzilla.mozilla.org/show_bug.cgi?id=1480704) - Detect the presents of a MITM. * services.blocklist.update_enabled Bug [1458917](https://bugzilla.mozilla.org/show_bug.cgi?id=1458917) - Register dedicated timer for Remote Settings * services.settings.poll_interval Bug [1458917](https://bugzilla.mozilla.org/show_bug.cgi?id=1458917) - Register dedicated timer for Remote Settings * services.sync.prefs.sync.browser.contentblocking.enabled Bug [1482281](https://bugzilla.mozilla.org/show_bug.cgi?id=1482281) - Sync contentblocking pref. * services.sync.prefs.sync.browser.ctrlTab.previews Bug [1473595](https://bugzilla.mozilla.org/show_bug.cgi?id=1473595) - Enable "Ctrl+Tab cycles through tabs in recently used order" feature by default in new profiles. * services.sync.prefs.sync.browser.ctrlTab.recentlyUsedOrder Bug [1473595](https://bugzilla.mozilla.org/show_bug.cgi?id=1473595) - Enable "Ctrl+Tab cycles through tabs in recently used order" feature by default in new profiles. * services.sync.prefs.sync.network.cookie.lifetime.days Bug [1457170](https://bugzilla.mozilla.org/show_bug.cgi?id=1457170) - Get rid of nsICookieService::ACCEPT_FOR_N_DAYS, * shield.savant.enabled Bug [1457226](https://bugzilla.mozilla.org/show_bug.cgi?id=1457226) - Revert Savant Shield study commits; * shield.savant.loglevel Bug [1457226](https://bugzilla.mozilla.org/show_bug.cgi?id=1457226) - Revert Savant Shield study commits; * svg.marker-improvements.enabled Bug [1479272](https://bugzilla.mozilla.org/show_bug.cgi?id=1479272) - remove svg.marker-improvements.enabled pref * urlclassifier.trackingAnnotationTable Bug [1461515](https://bugzilla.mozilla.org/show_bug.cgi?id=1461515) - Split tracking annotations from tracking protection. * urlclassifier.trackingAnnotationWhitelistTable Bug [1461515](https://bugzilla.mozilla.org/show_bug.cgi?id=1461515) - Split tracking annotations from tracking protection. * webgl.webgl2-compat-mode Bug [1482301](https://bugzilla.mozilla.org/show_bug.cgi?id=1482301) - Remove webgl.webgl2-compat-mode.

Atavic commented 6 years ago

pref("privacy.restrict3rdpartystorage.expiration", 2592000);

That's a max age of 30 days

theWalkingDuck commented 6 years ago

btw how do you grab the prefs ?

earthlng commented 6 years ago

with a fixed and slightly edited version of this

earthlng commented 5 years ago

63b11 changes since 63b4

new

pref("browser.contentblocking.allowlist.annotations.enabled", true); pref("browser.contentblocking.allowlist.storage.enabled", true); pref("browser.contentblocking.global-toggle.enabled", true); pref("browser.contentblocking.reportBreakage.enabled", false); // true in 63b4 pref("browser.fastblock.limit", 0); pref("browser.newtabpage.activity-stream.asrouter.devtoolsEnabled", false); pref("browser.newtabpage.activity-stream.asrouter.messageProviders", string); // string in 63b4 pref("dom.window.event.enabled", false); pref("editor.inline_table_editing.enabled_by_default", true); // false in 63b4 pref("editor.positioning.enabled_by_default", true); // false in 63b4 pref("editor.resizing.enabled_by_default", true); // false in 63b4 pref("intl.tsf.hack.allow_to_stop_hacking_on_build_17643_or_later", false); // true in 63b4 pref("layout.css.xul-box-display-values.content.enabled", true); // false in 63b4 pref("layout.css.xul-tree-pseudos.content.enabled", true); // false in 63b4 pref("services.sync.engine.bookmarks.validation.enabled", true); pref("services.sync.engine.passwords.validation.enabled", true);

removed

pref("browser.newtabpage.activity-stream.asrouterExperimentEnabled", false); pref("geo.provider.ms-windows-location", false);

changed

pref("browser.newtabpage.activity-stream.telemetry.ut.events", true); // prev: false pref("browser.safebrowsing.provider.mozilla.lists", long-string); // prev: long-string pref("dom.keyboardevent.dispatch_during_composition", true); // prev: false pref("font.name-list.sans-serif.zh-TW", font-list); // prev: "Arial, PMingLiU, MingLiU, MingLiU-ExtB" pref("geo.wifi.uri", "https://location.services.mozilla.com/..."); // prev: "https://www.googleapis.com/..." pref("layout.css.moz-document.url-prefix-hack.enabled", false); // prev: true pref("network.tcp.tcp_fastopen_enable", true); // prev: false pref("urlclassifier.disallow_completions", long-string); // prev: long-string

EDIT: updated 1st post

earthlng commented 5 years ago

we should enforce browser.contentblocking.enabled=true because cookie blocking doesn't work if it's set to false. I tend to agree that we can ignore the rest of browser.contentblocking.*, at least for now.

fmarier commented 5 years ago

"browser.contentblocking.reportBreakage.enabled" - reporting breakage: is that user initiated (i.e not automatic)?

It controls whether or not the "report broken site" button shows up. It doesn't send anything unless the user clicks on it and submits a breakage report.

earthlng commented 5 years ago

do we want to do something about AS? disable snippets, pocket and telemetry maybe, just in case?

user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
user_pref("browser.newtabpage.activity-stream.telemetry", false);
user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");

They're working on making media autoplay default-prompt but IDK if it will land in FF63 or not. If it doesn't land I'd say we just keep blocking autoplay for now. Once it lands we can comment it out and use FF's default-prompt.

As for the rest do you see anything we should add? I don't

earthlng commented 5 years ago
/* 0513: disable Follow On Search (FF53+)
 * Just DELETE the XPI file in your System Add-ons directory
 * [1] https://blog.mozilla.org/data/2017/06/05/measuring-search-in-firefox/ ***/

follow-on-search is now builtin in FF63 as well ie no longer a system addon. Remove 0513 ? Deleting unwanted SAs is already mentioned in the header anyway.

earthlng commented 5 years ago

I think it's behind the telemetry flags now and only works on builtin SE's anyway.

I doubt that too many of our users would ever debug system addons, IDK.

earthlng commented 5 years ago

yeah IDK. We can list it at the top "for visibility" so those few who're interested might see it. System addons become less and less of an issue because FF64 also removed onboarding and Pocket will be builtin. Only 4 left in FF64 atm: 2 webcompat, autofill and screenshots. No idea why the new Firefox Monitor doesn't show up for me, maybe they're not bundling it on purpose for some reason, IDK

earthlng commented 5 years ago

63.0 changes since 63b11

new

pref("browser.contentblocking.fastblock.control-center.ui.enabled", false); true in 63b11 pref("browser.contentblocking.fastblock.ui.enabled", false); true in 63b11 pref("browser.contentblocking.global-toggle.enabled", false); true in 63b11 pref("browser.contentblocking.rejecttrackers.reportBreakage.enabled", true); pref("browser.contentblocking.ui.enabled", true); false in 63b11 pref("network.trr.max-fails", 5);

changed

pref("app.update.channel", "beta"); // prev: "release" pref("app.update.url.details", "https://www.mozilla.org/%LOCALE%/firefox/beta/notes"); // prev: "https://www.mozilla.org/%LOCALE%/firefox/notes" pref("app.update.url.manual", "https://www.mozilla.org/firefox/beta"); // prev: "https://www.mozilla.org/firefox/" pref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts", true); // prev: false pref("network.trr.request-timeout", 1500); // prev: 3000 pref("network.trr.uri", "https://mozilla.cloudflare-dns.com/dns-query"); // prev: "" pref("toolkit.telemetry.enabled", true); // prev: false

EDIT: updated 1st post

earthlng commented 5 years ago

follow-on-search is now builtin in FF63 as well ie no longer a system addon

Leave it in for ESR60?, just change it to (FF53-62)?

I'd just remove it. Removing unwanted SAs is mentioned in the section header and the link ... meh. AFAIK follow-on-search just adds utm=ff or something like that to 2ndary etc searches on builtin SEs like google etc. It funds mozilla and is actually a nice way to support them IMO. And it doesn't cost you anything like fe. donations would. The engines already know that someone is using FF anyway.

earthlng commented 5 years ago

do you have user_pref("extensions.systemAddon.update.url blanked?

yes

Do we need to do anything with F Monitor? Is there a pref, or does it do nothing unless you sign up for it?

IDK I haven't looked at it yet. I don't think you need to sign up for it though

earthlng commented 5 years ago

what about - TWO: DELETE the XPI file in your System Add-ons directory (note this get reinstalled on app updates) in 0514? That can go as well IMO

earthlng commented 5 years ago

part 2: says to sign up

well yes if you want to be notified for future breaches but you can also just re-check from time to time without signing up

extensions.systemAddon.update.url blanked = yes: well, there's why then

all I was saying is that it doesn't appear to be bundled atm. I've updated my testing nightly and it wasn't even bundled there, that's all I know.

earthlng commented 5 years ago

FF search: do you mean to the deprecated section or entirely?

entirely remove it. Without a pref to it there's no need to move it to 9999 IMO

earthlng commented 5 years ago

https://blog.mozilla.org/futurereleases/2018/06/25/testing-firefox-monitor-a-new-security-tool/

In the meantime, check out and download the latest version of Firefox Quantum for the desktop in order to use the Firefox Monitor feature when it becomes available.

probably just hasn't been rolled out to everyone yet and therefore not bundled either

earthlng commented 5 years ago

No. they're controlled by network.cookie.cookieBehavior

earthlng commented 5 years ago
/* 0514: disable Activity Stream (FF54+)
 * Activity Stream is the default homepage/newtab in FF57+. It is based on metadata and browsing behavior,
 * and includes telemetry and web content such as snippets, top stories (pocket), top sites, etc.
 *  - ONE: make sure to set your "home" and "newtab" to about:blank (or use an extension to control them)
 *  - TWO: DELETE the XPI file in your System Add-ons directory (note this get reinstalled on app updates)
 * And/or you can try to control the ever-growing, ever-changing "browser.newtabpage.activity-stream.*" prefs
 * [FF63+] Activity Stream (AS) is now builtin and no longer an easily deletable system addon!
 *     We'll clean this up and move to a new number when ESR67 is released.
 * [1] https://wiki.mozilla.org/Firefox/Activity_Stream
 * [2] https://www.ghacks.net/2016/02/15/firefox-mockups-show-activity-stream-new-tab-page-and-share-updates/ ***/
user_pref("browser.library.activity-stream.enabled", false); // (FF57+)
/* 0514a: disable AS Snippets ***/
user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // [SETTING] Home>Firefox Home Content>Snippets
/* 0514b: disable AS Top Stories and other Pocket-based and/or sponsored content ***/
user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false); // [SETTING] Home>Firefox Home Content>Highlights>Pages Saved to Pocket
user_pref("browser.newtabpage.activity-stream.showSponsored", false);
/* 0514c: disable AS telemetry ***/
user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
user_pref("browser.newtabpage.activity-stream.telemetry", false);
user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
earthlng commented 5 years ago

if you're thinking of browser.newtabpage.activity-stream.asrouterExperimentEnabled, that was removed in 63 and is even listed under "removed, renamed or hidden"

earthlng commented 5 years ago

IMO it can wait until ESR67 but if you want to change it now go for it

Atavic commented 5 years ago

Some AS entries were discussed on #396

earthlng commented 5 years ago

Should we rename Tracking Protection in the user,js to Content Blocking (or at least append it)?

rename: IMO no because TP is 1 part of Content Blocking. append: sure, why not

Where do we put this?

yeah under HW makes sense. But I'm not sure if we should add this at all. We keep disabling stuff because it could theoretically be used for FPing while there's no indication that it's really used that way. But disabling it definitely puts us in a very small group. I'm not sure if there's really anything too unique that could be gathered from MC because most devices will have similar capabilities. The sad thing is that it looks like they have a patch ready to address these issues in MC since 5 months but it's just sitting there waiting to be looked at and commited :(

Do we really need the second pref?

no we can ignore the 2nd pref

we could add it if they ever flip it

that's assuming we keep doing the diffs. This issue is 2 months old and FF63 is out for almost 3 weeks now and we're still working on it. Do we really want to continue doing the ToDo: Diffs issues if we can't finish them in time for a new FF release? Nobody but us 2 contributes and nobody seems to really care anyway.

ps: other things off the top of my head that make us pretty unique for no good reason IMHO ...

crssi commented 5 years ago

nobody seems to really care anyway

I do, and I really appreciate your doing. :heart:

Nobody but us 2 contributes

I would, but I have to admit that I am way not as smart as you two :cry:

I am sure that most of other followers also belong to "my club" regarding upper saying. :wink: ,

earthlng commented 5 years ago

is this (browser.contentblocking.enabled) required for ANY control of cookies

yes. It's the master switch for content blocking which atm is TP and cookie-blocking. Because we have the cookie part in another section I wouldn't add Content-Blocking to the header or subheader in 0400. This pref was also removed again in FF65 and we can delete it from the user.js for FF65 because nobody needs it anymore then and it's not in ESR either. (or Waterfox, etc)

That said, if the information is there (i.e the diffs are generated), then it will be actioned

creating the diffs is easy, actioning them is the tedious part but okay I'll create a issue for the current 64 beta diff and we'll see how it goes.

earthlng commented 5 years ago

I think more people disable TP than cookie-blocking and that's why it fits better under 0400 IMO. Let's add it for 2 releases to make sure cookie blocking (and TP) works as expected.

earthlng commented 5 years ago

yes please, it's about time :)

Atavic commented 5 years ago

nobody seems to really care anyway

I do care and I also appreciate new people coming here, like Mr. bogachenko.