This is an automated email from the git hooks/post-receive script.
richard pushed a commit to branch tor-browser-102.3.0esr-12.0-2 in repository tor-browser.
The following commit(s) were added to refs/heads/tor-browser-102.3.0esr-12.0-2 by this push: new 54e941e99e2b squash! Firefox preference overrides. 54e941e99e2b is described below
commit 54e941e99e2b5841edf10cb05b1b4b71bcb81f19 Author: Richard Pospesel richard@torproject.org AuthorDate: Tue Oct 11 21:45:59 2022 +0000
squash! Firefox preference overrides.
Bug 24686: Set network.http.tailing.enabled to true --- browser/app/profile/001-base-profile.js | 5 +++++ 1 file changed, 5 insertions(+)
diff --git a/browser/app/profile/001-base-profile.js b/browser/app/profile/001-base-profile.js index 6489ac3c5076..c6b088434b79 100644 --- a/browser/app/profile/001-base-profile.js +++ b/browser/app/profile/001-base-profile.js @@ -253,6 +253,11 @@ pref("network.protocol-handler.warn-external.news", true); pref("network.protocol-handler.warn-external.nntp", true); pref("network.protocol-handler.warn-external.snews", true); pref("network.proxy.allow_bypass", false); // #40682 +// Lock to 'true', which is already the firefox default, to prevent users +// from making themselves fingerprintable by disabling. This pref +// alters content load order in a page. See tor-browser#24686 +pref("network.http.tailing.enabled", true, locked); + // Make sure we don't have any GIO supported protocols (defense in depth // measure) pref("network.gio.supported-protocols", "");
tor-commits@lists.torproject.org