### Extensions * Privacy Badger * HTTPS Everywhere * NoScript * UBlock Origin * UBlock Matrix * Decentraleyes ### Configuration * media.peerconnection.enabled = false Disable WebRTC leaks * privacy.firstparty.isolate = true <del>Note: Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.</del> **Note** : Not working with Cookie AutoDelete addon with Firefox v60 or above. * privacy.resistFingerprinting = true Redundant if you are already using uBlock Origin 3rd party filters. * privacy.trackingprotection.enabled = true * privacy.trackingprotection.cryptomining.enabled = true * browser.cache.offline.enable = false * browser.safebrowsing.malware.enabled = false Disable Google Safe Browsing malware checks. Security risk, but privacy improvement. * browser.safebrowsing.phishing.enabled = false Disable Google Safe Browsing and phishing protection. Security risk, but privacy improvement. * browser.send_pings = false The attribute would be useful for letting websites track visitors' clicks. * browser.sessionstore.max_tabs_undo = 0 Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs. * browser.urlbar.speculativeConnect.enabled = false Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. [Source](https://www.ghacks.net/2017/07/24/disable-preloading-firefox-autocomplete-urls/) * dom.battery.enabled = false Website owners can track the battery status of your device. [Source](https://www.reddit.com/r/privacytoolsIO/comments/3fzbgy/you_may_be_tracked_by_your_battery_status_of_your/) * dom.event.clipboardevents.enabled = false Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected. * dom.gamepad.enabled = false Disable gamepad API to prevent USB device enumeration * dom.vr.enabled = false Disable virtual reality devices APIs * dom.vibrator.enabled = false Disable vibrator APIs * dom.enable_resource_timing = false Disable resource timing APIs * dom.maxHardwareConcurrency = 2 Spoof dual-core processors * geo.enabled = false Disables geolocation. * media.eme.enabled = false Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. [Details](https://support.mozilla.org/kb/enable-drm#w_opt-out-of-cdm-playback-uninstall-cdms-and-stop-all-cdm-downloads) DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox. * media.gmp-widevinecdm.enabled = false Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. [Details](https://support.mozilla.org/kb/enable-drm#w_disable-the-google-widevine-cdm-without-uninstalling) * media.navigator.enabled = false Websites can track the microphone and camera status of your device. // [Cookies preferences](https://developer.mozilla.org/en-US/docs/Mozilla/Cookies_Preferences) * network.cookie.cookieBehavior = 4 // network.cookie.cookieBehavior = 1 using value 4 because Umatrix already blocks third party cookies Disable cookies 0 = accept all cookies by default 1 = only accept from the originating site (block third party cookies) 2 = block all cookies by default 3 = use p3p settings (note: this is only applicable to older Mozilla Suite and Seamonkey versions.) 4 = Storage access policy: Block cookies from trackers * network.cookie.lifetimePolicy = 2 cookies are deleted at the end of the session 0 = Accept cookies normally 1 = Prompt for each cookie 2 = Accept for current session only 3 = Accept for N days * network.http.referer.trimmingPolicy = 2 Send only the scheme, host, and port in the Referer header 0 = Send the full URL in the Referer header 1 = Send the URL without its query string in the Referer header 2 = Send only the scheme, host, and port in the Referer header * network.http.referer.XOriginPolicy = 2 Only send Referer header when the full hostnames match. (Note: if you notice significant breakage, you might try 1 combined with an XOriginTrimmingPolicy tweak below.) Source 0 = Send Referer in all cases 1 = Send Referer to same eTLD sites 2 = Send Referer only when the full hostnames match * network.http.referer.XOriginTrimmingPolicy = 2 When sending Referer across origins, only send scheme, host, and port in the Referer header of cross-origin requests. Source 0 = Send full url in Referer 1 = Send url without query string in Referer 2 = Only send scheme, host, and port in Referer * webgl.disabled = true WebGL is a potential security risk. [Source](https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern) * browser.sessionstore.privacy_level = 2 This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data. [Details](http://kb.mozillazine.org/Browser.sessionstore.privacy_level) 0 = Store extra session data for any site. (Default starting with Firefox 4.) 1 = Store extra session data for unencrypted (non-HTTPS) sites only. (Default before Firefox 4.) 2 = Never store extra session data. * network.IDN_show_punycode = true Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice. [Source](https://krebsonsecurity.com/2018/03/look-alike-domains-and-visual-confusion/#more-42636) * extensions.blocklist.url = https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%20/%20/ Limit the amount of identifiable information sent when requesting the Mozilla harmful extension blocklist. Optionally, the blocklist can be disabled entirely by setting extensions.blocklist.enabled to false for increased privacy, but decreased security. [Source](https://old.reddit.com/r/privacytoolsIO/comments/9uqeew/firefox_tip_sanitize_firefox_blocklist_url_so_it/) ---------------------------------------------------------------------------------------------------------------------- * dom.storage.enabled = false Web storage is build in feature of HTML5, and unlike cookies, the stored information impossible to monitor and selectively delete. And it's enabled by default in most of modern browser. * browser.search.region = US * browser.search.geoip.url = "" // disable geographically specific results/search engines e.g. "browser.search.*.US" * browser.search.geoSpecificDefaults = false * browser.search.geoSpecificDefaults.url = "" // use Mozilla geolocation service instead of Google when geolocation is enabled * geo.wifi.uri;https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY% // Disbale IPv6 * network.dns.disableIPv6 = true // * browser.formfill.enable = false // This can leak your locale if not en-US * dom.forms.datetime = false // disable old SSL/TLS "insecure" renegotiation (vulnerable to a MiTM attack) // source: https://github.com/ghacksuserjs/ghacks-user.js/blob/master/user.js#653 * security.ssl.require_safe_negotiation = true **Tools :** **Browser leaks test :** 1. [browserleaks.com/](https://browserleaks.com/) 2. [dnsleaktest.com/](https://www.dnsleaktest.com/) **Source :** 1. [Security and privacy-related preferences](http://kb.mozillazine.org/Category:Security_and_privacy-related_preferences) 2. [DRM](https://support.mozilla.org/en-US/kb/enable-drm#w_opt-out-of-cdm-playback-uninstall-cdms-and-stop-all-cdm-downloads) 3. [Tor Browser Design](https://www.torproject.org/projects/torbrowser/design/) 4. [Tor browser profile](https://gitweb.torproject.org/tor-browser.git/tree/browser/app/profile?h=tor-browser-60.7.0esr-8.5-1) 5. IceCat browser profile