[tor-commits] [tor-browser/tor-browser-91.2.0esr-11.0-1] fixup! TB4: Tor Browser's Firefox preference overrides.

sysrqb at torproject.org sysrqb at torproject.org
Tue Nov 2 20:20:45 UTC 2021


commit 57b1cff33bc2e2d3902978dda1c4098805691138
Author: Matthew Finkel <sysrqb at torproject.org>
Date:   Mon Nov 1 20:29:48 2021 +0000

    fixup! TB4: Tor Browser's Firefox preference overrides.
---
 browser/app/profile/000-tor-browser.js | 25 -------------------------
 1 file changed, 25 deletions(-)

diff --git a/browser/app/profile/000-tor-browser.js b/browser/app/profile/000-tor-browser.js
index ed8c4c8c80dd..867bcf2b662f 100644
--- a/browser/app/profile/000-tor-browser.js
+++ b/browser/app/profile/000-tor-browser.js
@@ -48,7 +48,6 @@ pref("browser.disableResetPrompt", true);
 // Disk activity: Disable Browsing History Storage
 pref("browser.privatebrowsing.autostart", true);
 pref("browser.cache.disk.enable", false);
-pref("browser.cache.offline.enable", false);
 pref("permissions.memory_only", true);
 pref("network.cookie.lifetimePolicy", 2);
 pref("security.nocertdb", true);
@@ -69,8 +68,6 @@ pref("browser.sessionstore.privacy_level", 2);
 // Use the in-memory media cache and increase its maximum size (#29120)
 pref("browser.privatebrowsing.forceMediaMemoryCache", true);
 pref("media.memory_cache_max_size", 16384);
-// Disable site-specific browsing to avoid sharing site icons with the OS.
-pref("browser.ssb.enabled", false);
 
 // Misc privacy: Remote
 pref("browser.send_pings", false);
@@ -164,7 +161,6 @@ pref("dom.serviceWorkers.enabled", false);
 pref("dom.push.enabled", false);
 
 // Fingerprinting
-pref("webgl.disable-extensions", true);
 pref("webgl.disable-fail-if-major-performance-caveat", true);
 pref("webgl.enable-webgl2", false);
 pref("gfx.downloadable_fonts.fallback_delay", -1);
@@ -177,9 +173,7 @@ pref("privacy.resistFingerprinting", true);
 pref("privacy.resistFingerprinting.block_mozAddonManager", true); // Bug 26114
 pref("dom.webaudio.enabled", false); // Bug 13017: Disable Web Audio API
 pref("dom.w3c_touch_events.enabled", 0); // Bug 10286: Always disable Touch API
-pref("dom.w3c_pointer_events.enabled", false);
 pref("dom.vr.enabled", false); // Bug 21607: Disable WebVR for now
-// Disable randomised Firefox HTTP cache decay user test groups (Bug: 13575)
 pref("security.webauth.webauthn", false); // Bug 26614: Disable Web Authentication API for now
 // Disable SAB, no matter if the sites are cross-origin isolated.
 pref("dom.postMessage.sharedArrayBuffer.withCOOP_COEP", false);
@@ -241,8 +235,6 @@ pref("network.protocol-handler.warn-external.snews", true);
 // Make sure we don't have any GIO supported protocols (defense in depth
 // measure)
 pref("network.gio.supported-protocols", "");
-pref("plugin.disable", true); // Disable to search plugins on first start
-pref("plugin.state.flash", 0); // Disable for defense-in-depth
 pref("media.peerconnection.enabled", false); // Disable WebRTC interfaces
 // Disables media devices but only if `media.peerconnection.enabled` is set to
 // `false` as well. (see bug 16328 for this defense-in-depth measure)
@@ -278,9 +270,6 @@ pref("network.file.disable_unc_paths", true);
 // Enhance our treatment of file:// to avoid proxy bypasses (see Mozilla's bug
 // 1412081)
 pref("network.file.path_blacklist", "/net");
-// Make sure no enterprise policy can interfere with our proxy settings, see
-// #29916.
-pref("browser.policies.testing.disallowEnterprise", true);
 
 // Security slider
 pref("svg.in-content.enabled", true);
@@ -308,24 +297,15 @@ pref("extensions.autoDisableScopes", 0);
 pref("extensions.bootstrappedAddons", "{}");
 pref("extensions.checkCompatibility.4.*", false);
 pref("extensions.databaseSchema", 3);
-pref("extensions.enabledAddons", "https-everywhere%40eff.org:3.1.4,%7B73a6fe31-595d-460b-a920-fcc0f8843232%7D:2.6.6.1,torbutton%40torproject.org:1.5.2,ubufox%40ubuntu.com:2.6,%7B972ce4c6-7e08-4474-a285-3208198ce6fd%7D:17.0.5");
-pref("extensions.enabledItems", "langpack-en-US at firefox.mozilla.org:,{73a6fe31-595d-460b-a920-fcc0f8843232}:1.9.9.57,{e0204bd5-9d31-402b-a99d-a6aa8ffebdca}:1.2.4,{972ce4c6-7e08-4474-a285-3208198ce6fd}:3.5.8");
 pref("extensions.enabledScopes", 5); // AddonManager.SCOPE_PROFILE=1 | AddonManager.SCOPE_APPLICATION=4
 pref("extensions.pendingOperations", false);
-pref("xpinstall.whitelist.add", "");
-pref("xpinstall.whitelist.add.36", "");
 // We don't know what extensions Mozilla is advertising to our users and we
 // don't want to have some random Google Analytics script running either on the
 // about:addons page, see bug 22073, 22900 and 31601.
 pref("extensions.getAddons.showPane", false);
 pref("extensions.htmlaboutaddons.recommendations.enabled", false);
-// Show our legacy extensions directly on about:addons and get rid of the
-// warning for the default theme.
-pref("extensions.legacy.exceptions", "{972ce4c6-7e08-4474-a285-3208198ce6fd},torbutton at torproject.org");
 // Bug 26114: Allow NoScript to access addons.mozilla.org etc.
 pref("extensions.webextensions.restrictedDomains", "");
-// Bug 28896: Make sure our bundled WebExtensions are running in Private Browsing Mode
-pref("extensions.allowPrivateBrowsingByDefault", true);
 // Don't give Mozilla-recommended third-party extensions special privileges.
 pref("extensions.postDownloadThirdPartyPrompt", false);
 
@@ -355,11 +335,6 @@ pref("security.certerrors.mitm.auto_enable_enterprise_roots", false);
 pref("extensions.langpacks.signatures.required", false);
 #endif
 
-// Avoid report TLS errors to Mozilla. We might want to repurpose this feature
-// one day to help detecting bad relays (which is bug 19119). For now we just
-// hide the checkbox, see bug 22072.
-pref("security.ssl.errorReporting.enabled", false);
-
 // Workaround for https://bugs.torproject.org/13579. Progress on
 // `about:downloads` is only shown if the following preference is set to `true`
 // in case the download panel got removed from the toolbar.



More information about the tor-commits mailing list