Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
T
Tor Browser
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 1,527
    • Issues 1,527
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge Requests 0
    • Merge Requests 0
  • Operations
    • Operations
    • Incidents
  • Analytics
    • Analytics
    • Repository
    • Value Stream
  • Wiki
    • Wiki
  • Members
    • Members
  • Activity
  • Graph
  • Create a new issue
  • Commits
  • Issue Boards
Collapse sidebar

GitLab is used only for code review, issue tracking and project management. Canonical locations for source code are still https://gitweb.torproject.org/ https://git.torproject.org/ and git-rw.torproject.org.

  • The Tor Project
  • Applications
  • Tor Browser
  • Issues
  • #40048

Closed
Open
Opened Jul 31, 2020 by Kathleen Brade@bradeDeveloper

Disable various ESR78 features via prefs

From #33534 (closed):

  • browser.region.network.scan --> false
  • browser.region.network.url --> ""
    • Obtain WiFi location information from a Mozilla server.
  • browser.tabs.remote.separatedMozillaDomains --> ""
    • This is a list of mozilla domains which are allowed to be loaded in a privileged process.
  • browser.urlbar.dnsResolveSingleWordsAfterSearch --> false
    • DNS look up is done for single word terms after a search fails.
  • browser.urlbar.suggest.topsites --> false
  • browser.urlbar.update1.interventions --> false
  • browser.urlbar.update1.searchTips --> false
  • corroborator.enabled --> false
    • Triggers detection of corruption (e.g. in omni.ja) and reporting via telemetry. Avoid doing wasted work.
  • device.storage.enabled --> false (Android)
  • dom.push.enabled --> false
  • dom.w3c_pointer_events.multiprocess.android.enabled --> false (Android)
  • messaging-system.rsexperimentloader.enabled --> false (about:newtab)
  • network.trr.resolvers --> ""
    • part of DoH; "defense in depth"
  • privacy.socialtracking.block_cookies.enabled --> false
    • part of tracking protection
  • security.pki.crlite_mode --> 0
    • This is 1 by default which is a non-enforcing mode focused on collecting telemetry. We should set it to 0 to avoid downloading data from Mozilla.
  • signon.management.page.breach-alerts.enabled --> false
    • Firefox displays critical alerts in the Lockwise password manager when a website is breached.
  • signon.management.page.mobileAndroidURL --> ""
  • signon.management.page.mobileAppleURL --> ""
    • about:logins page to redirect users to Google Play and Apple's App Store for obtaining Mozilla's LockWise mobile apps.
  • trailhead.firstrun.branches --> ""
    • For Firefox developers to enable experiments.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Tor Browser: 10.0
Milestone
Tor Browser: 10.0
Assign milestone
Time tracking
None
Due date
None
Reference: tpo/applications/tor-browser#40048