-
Notifications
You must be signed in to change notification settings - Fork 519
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MOAR stuff to look at #533
Comments
Posted by 8 months ago
https://blog.torproject.org/new-sslv3-attack-found-disable-sslv3-torbrowser In TOR version 1
https://trac.torproject.org/projects/tor/ticket/12609 still included in TOR |
aa okey |
yes now I see. just thought - advertisement |
this is also https://wiki.mozilla.org/Blocklisting/Blocked_Graphics_Drivers at the very end of the page |
I would argue OK, and the rest? |
My English is running out. Whatever the outcome, you're right, this is your repository = your rules. My (no one unnecessary opinion) I will keep to myself |
Well, with the "Pull requests" I hurried. hahha |
About promo links and even telemetry... lets say we trust mozilla and anonymizing those data, then I do not see any reason to block those, since mozilla also needs feedback to make things better... whatever you decide is just fine. File Handle API looks quite dangerous. I do not see any reason that some 3rd party stuff can make/modify files, even if its sandboxed or limited only to firefox profile. It smells like hell to new supercookie and other abusements. I would disable |
@crssi 2 ye 3 |
Cheers |
1.can argue about that fooooooooooorever.
Cheers |
Doh... stupid me. 😄 Thx Thorin |
TLS 1.0 and 1.1 are still secure. Sure, later versions are more secure, but 98% of the web is already upgraded - less than 2% of sites use < v1.2. So it's not very likely you would come across a site that requires it, but if you did, what's the point in breaking it. Mozilla and Chrome already have plans to deprecate TLS 1.0 & 1.1, and force that last 2% of sites. TLS settings can be FP'ed without JS. By sticking with the defaults, I do not see any security issues, but an increase in potential anti-FPing. TBH, the chances of either (i.e being FP'ed with TLS as a entropy point, or being compromised due to TLS<1.2) are slim to non anyway. Any arguments, please see @earthlng
|
OT or maybe not (due to FS)... does |
@crssi I was having trouble playing the video. watched, or rather wanted to see the (pirated) movies to different sites. player refused to work. Thought that broke that that in the adblock list = no. then I thought that because of blocking third-party cookies (Firefox 63) = nope.Disable this setting (by process of elimination, trial and error) = works upd Actually, I turned off this pref. (although it was on youtube and twitch ooooh, how useful) upd in fact, in OLDER versions of firefox was a very good expansion block (ungodly) flash player and html5. |
@bogachenko obviously we are in the same club about expressions in english, I am also not good at that. The player refused to work when I know I had numerous problems in the past with upper set, but did tried yesterday all kind of video providers I could remember and there were not problems. It looks like mozilla has sorted out those in the last year or two. FF now does not start to play until tab focus anymore. Cheers |
like this? You're all English speaking here. British / Canadians / Americans and Australians. Not? hm
at I'm just saying that some sites break down. Perhaps that is the fault of the company that makes the player (not the Mozilla Foundation), who then use sites with pirated videos. I put from Russia with love |
they're working on making it default-prompt which should land soonish. see meta bug - only 4 open tickets left atm If you want to test the new prompt-based autoplay even though it might not be fully polished yet, you can do so by setting the prefs like this: // Switch block autoplay logic to v2, and enable UI.
pref("media.autoplay.enabled.user-gestures-needed", true);
// Allow asking for permission to autoplay to appear in UI.
pref("media.autoplay.ask-permission", true);
// Set Firefox to block autoplay, asking for permission by default.
pref("media.autoplay.default", 2); // 0=Allowed, 1=Blocked, 2=Prompt |
found another one that makes us stand out more than necessary for no good reason:
permissions can be read by sites and AFAIK RFP always rejects geolocation requests with "denied" anyway. I'm not sure if RFP geolocation can be overruled with site permissions but either way I think we should enforce the default permission which is prompt. test: press ctrl+shift+k and run this navigator.permissions.query({name:'geolocation'}).then(e => console.log("permission for geolocation:", e.state, "(default is prompt)")); |
No idea why you always get "granted". Did you test it on a site where you set a site permission for geolocation? |
There also seems to be a bug with the implementation in that it always reports the default permission instead of the actual permission set in Page Info->Permissions, fe |
ctrl+shift+k allows you to run code in the context of that site (where you clicked ctrl+shift+k).
not really. I assumed the whole purpose of the permissions API is to allow sites to query if they have a certain permission but it apparently doesn't take site permissions into consideration.
it matters what we set as default
no |
as of FF64 the permissions API itself only supports geolocation, notifications/push and persistent-storage. 1-liner for the Permissions API to query all permissions currently listed at https://developer.mozilla.org/en-US/docs/Web/API/Permissions/query: for (const a of [ 'accelerometer', 'accessibility-events', 'ambient-light-sensor', 'background-sync', 'camera', 'clipboard-read', 'clipboard-write', 'geolocation', 'gyroscope', 'magnetometer', 'microphone', 'midi', 'notifications', 'payment-handler', 'persistent-storage', 'push' ]) navigator.permissions.query({name:a}).then(e => console.log("permission for", a, ":", e.state)).catch(console.log); Don't run it on a privileged page ;) camera and mic permissions are probably queryable but would need certain prefs enabled like
👍 |
"prompt" all of a sudden eh? ;) |
0201b + 2305 |
what for? your buddy @earthlng wrote good settings.
which "it seems" helped me. not sure. but so far there are no problems. maybe I'm search bad?
https://bugzilla.mozilla.org/show_bug.cgi?id=1127784 when TRUE (and rebooting the browser) nothing has changed |
@Thorin-Oakenpants hell, I constantly forget about it ... my fool |
taking an opportunity, do you understand in the |
Been there, done that. |
Hi, and thank you for your never-ending work on ghacks.
I'd like to enable a minimum level of telemetry, to contribute data that supports privacy-centric efforts at Mozilla, but I don't want to over-share. I think the least possible level of sharing is achieved with: user_pref("toolkit.telemetry.unified", true); // 330 Can you tell me if this is right? Or, can the "health report" be sent with toolkit.telemetry.unified = false? |
What do you say about this?
|
@Thorin-Oakenpants blue button - "Try again." It's unpleasant, but if it's very IMPORTANT... you probably don't need to remove this setting |
@Woofy-Wolf extended telemetry is force-disabled in Release versions anyway so if you want to enable basic telemetry I think you'll probably have to comment-out and reset all of |
@Thorin-Oakenpants well disable, so disable. |
@Thorin-Oakenpants I understood you |
@Thorin-Oakenpants Question (translation difficulties): what does it mean to move to 5000s 5000s what's this? |
strings? or what? |
Understood |
@Thorin-Oakenpants like this #544 ? 😊 |
I'd prefer to wait with changing autoplay until they land default-prompt in 64 or 65 |
damn |
👍 |
snip
The text was updated successfully, but these errors were encountered: