Bug#827395: [privacy] not as 'secure by default'

Ivan Shmakov ivan at siamics.net
Fri Oct 6 16:15:53 UTC 2017


>>>>> Narcis Garcia <debianlists at actiu.net> writes:

 > Note: trek.eu.org link provided by Trek is not working.

	I’ve just checked and [1] does work for me.  (Note though that
	‘www’ has to be there.)  An archived copy [2] is also available.

[1] http://www.trek.eu.org/text/firefox-tuning.html
[2] https://web.archive.org/web/20170411151300/http://www.trek.eu.org/text/firefox-tuning.html

 > Why a non-private browsing?  User activity should be assumed as
 > private by default.

	Or at least there should be an easier (and more prominently
	presented) way for the user to opt out.

 > Proposed defaults:

 > browser.newtabpage.directory.ping = ""
 > browser.newtabpage.directory.source = ""

	Personally, I’ve disabled all the ‘safebrowsing’, ‘update’, and
	similar options I could find.  Also, just to be sure, I’ve
	uniformly replaced nearly every single URI in prefs.js like:

user_pref("browser.safebrowsing.provider.mozilla.updateURL", "http://browser.safebrowsing.provider.mozilla.updateurl.unwanted.nowhere.invalid/");

	Now I can refer to my HTTP proxy logs for the possible attempts
	to disclose my use of Firefox to third parties (like my ISP,
	employer, and whatever the entity it tries to connect to.)

	Which seem to be surprisingly few (and the last one below is due
	to xul-ext-noscript, not Firefox proper):

browser.newtabpage.directory.source
browser.safebrowsing.provider.mozilla.updateurl
browser.search.geoip.url
extensions.blocklist.url
noscript.abe.wanipcheckurl

	Can at least the ‘safebrowsing’ one please be fixed to respect
	the whatever ‘browser.safebrowsing.*.enabled = false’ setting
	applicable?  Can there be also options to cleanly disable the
	‘newtabpage.directory’ and ‘search.geoip’ functions as well?

	TIA.

 > captivedetect.canonicalURL = ""
 > app.update.url = ""
 > browser.safebrowsing.downloads.remote.url = ""

[…]

 > browser.safebrowsing.reportPhishURL = ""
 > browser.search.geoSpecificDefaults.url = ""
 > browser.search.geoip.url = ""

	I think it should also include browser.search.suggest.enabled =
	false, which appears rather important as “search suggestions”
	result in even the partial input being communicated to a remote
	party.  (Which may even be a genuinely sensitive information –
	like one’s password – by the way of pure accident.)

	It’s basically Firefox’ very own remote keyboard logger!

 > browser.tabs.crashReporting.sendReport = false
 > datareporting.healthreport.service.enabled = false
 > datareporting.healthreport.uploadEnabled = false
 > datareporting.policy.dataSubmissionEnabled = false
 > security.ssl.errorReporting.enabled = false
 > security.ssl.errorReporting.url = ""
 > security.ssl.errorReporting.automatic = ""
 > browser.startup.homepage = "https://start.duckduckgo.com/"

	I believe it should rather be about:blank, file:/, or something
	like that – not requiring any network access whatsoever.

 > devtools.gcli.imgurUploadURL = ""

[…]

 > devtools.webide.templatesURL = ""
 > experiments.manifest.uri = ""
 > geo.wifi.uri = ""
 > identity.mobilepromo.android = ""
 > identity.mobilepromo.ios = ""
 > security.ssl.errorReporting.url = ""
 > toolkit.telemetry.server = ""
 > webextensions.storage.sync.enabled = false

-- 
FSF associate member #7257  http://am-1.org/~ivan/    7D17 4A59 6A21 3D97 6DDB



More information about the pkg-mozilla-maintainers mailing list