--- a/browser/app/profile/firefox.js +++ b/browser/app/profile/firefox.js @@ -242,7 +242,7 @@ pref("general.autoScroll", true); pref("browser.uidensity", 0); // At startup, check if we're the default browser and prompt user if not. -pref("browser.shell.checkDefaultBrowser", true); +pref("browser.shell.checkDefaultBrowser", false); pref("browser.shell.shortcutFavicons",true); pref("browser.shell.mostRecentDateSetAsDefault", ""); pref("browser.shell.skipDefaultBrowserCheckOnFirstRun", true); @@ -252,7 +252,7 @@ pref("browser.defaultbrowser.notificatio // 0 = blank, 1 = home (browser.startup.homepage), 2 = last visited page, 3 = resume previous browser session // The behavior of option 3 is detailed at: http://wiki.mozilla.org/Session_Restore -pref("browser.startup.page", 1); +pref("browser.startup.page", 0); pref("browser.startup.homepage", "chrome://branding/locale/browserconfig.properties"); // Whether we should skip the homepage when opening the first-run page pref("browser.startup.firstrunSkipsHomepage", true); @@ -325,7 +325,7 @@ pref("browser.urlbar.suggest.history", pref("browser.urlbar.suggest.bookmark", true); pref("browser.urlbar.suggest.openpage", true); pref("browser.urlbar.suggest.searches", true); -pref("browser.urlbar.userMadeSearchSuggestionsChoice", false); +pref("browser.urlbar.userMadeSearchSuggestionsChoice", true); // The suggestion opt-in notification will be shown on 4 different days. pref("browser.urlbar.daysBeforeHidingSuggestionsPrompt", 4); pref("browser.urlbar.lastSuggestionsPromptDate", 20160601); @@ -370,7 +370,7 @@ pref("browser.download.manager.resumeOnW pref("browser.download.animateNotifications", true); // This records whether or not the panel has been shown at least once. -pref("browser.download.panel.shown", false); +pref("browser.download.panel.shown", true); #ifndef XP_MACOSX pref("browser.helperApps.deleteTempFileOnExit", true); @@ -453,7 +453,7 @@ pref("browser.photon.structure.enabled", // Tabbed browser pref("browser.tabs.closeWindowWithLastTab", true); pref("browser.tabs.insertRelatedAfterCurrent", true); -pref("browser.tabs.warnOnClose", true); +pref("browser.tabs.warnOnClose", false); pref("browser.tabs.warnOnCloseOtherTabs", true); pref("browser.tabs.warnOnOpen", true); pref("browser.tabs.maxOpenBeforeWarn", 15); @@ -630,7 +630,7 @@ pref("browser.xul.error_pages.enabled", pref("browser.xul.error_pages.expert_bad_cert", false); // Enable captive portal detection. -pref("network.captive-portal-service.enabled", true); +pref("network.captive-portal-service.enabled", false); // If true, network link events will change the value of navigator.onLine pref("network.manage-offline-status", true); @@ -1243,7 +1243,7 @@ pref("browser.newtab.preload", true); // Remembers if the about:newtab intro has been shown // NOTE: This preference is unused but was not removed in case // this information will be valuable in the future. -pref("browser.newtabpage.introShown", false); +pref("browser.newtabpage.introShown", true); // Toggles the content of 'about:newtab'. Shows the grid when enabled. pref("browser.newtabpage.enabled", true); --- a/browser/branding/official/pref/firefox-branding.js +++ b/browser/branding/official/pref/firefox-branding.js @@ -3,7 +3,7 @@ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ pref("startup.homepage_override_url", ""); -pref("startup.homepage_welcome_url", "https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/firstrun/"); +pref("startup.homepage_welcome_url", "about:blank"); pref("startup.homepage_welcome_url.additional", ""); // Interval: Time between checks for a new version (in seconds) pref("app.update.interval", 43200); // 12 hours --- a/build/application.ini.in +++ b/build/application.ini.in @@ -41,7 +41,7 @@ MaxVersion=@GRE_MILESTONE@ [XRE] #ifdef MOZ_PROFILE_MIGRATOR -EnableProfileMigrator=1 +EnableProfileMigrator=0 #endif #if MOZ_CRASHREPORTER --- a/modules/libpref/init/all.js +++ b/modules/libpref/init/all.js @@ -30,7 +30,7 @@ pref("general.useragent.site_specific_ov pref("general.config.obscure_value", 13); // for MCD .cfg files -pref("general.warnOnAboutConfig", true); +pref("general.warnOnAboutConfig", false); // maximum number of dated backups to keep at any time pref("browser.bookmarks.max_backups", 5); @@ -397,7 +397,7 @@ pref("media.opus.enabled", true); pref("media.wave.enabled", true); pref("media.webm.enabled", true); -pref("media.eme.chromium-api.enabled", true); +pref("media.eme.chromium-api.enabled", false); pref("media.eme.chromium-api.video-shmems", 4); #ifdef MOZ_APPLEMEDIA @@ -468,8 +468,8 @@ pref("media.webrtc.debug.aec_dump_max_si #ifdef MOZ_WIDGET_GONK pref("media.navigator.video.default_width", 320); pref("media.navigator.video.default_height", 240); -pref("media.peerconnection.enabled", true); -pref("media.peerconnection.video.enabled", true); +pref("media.peerconnection.enabled", false); +pref("media.peerconnection.video.enabled", false); pref("media.navigator.video.max_fs", 1200); // 640x480 == 1200mb pref("media.navigator.video.max_fr", 30); pref("media.navigator.video.h264.level", 12); // 0x42E00C - level 1.2 @@ -1331,7 +1331,7 @@ pref("privacy.donottrackheader.enabled", // the popup will be called when the popup is dismissed. pref("privacy.permissionPrompts.showCloseButton", false); // Enforce tracking protection in all modes -pref("privacy.trackingprotection.enabled", false); +pref("privacy.trackingprotection.enabled", true); // Enforce tracking protection in Private Browsing mode pref("privacy.trackingprotection.pbmode.enabled", true); // Annotate channels based on the tracking protection list in all modes @@ -1641,7 +1641,7 @@ pref("network.http.network-changed.timeo // The maximum number of current global half open sockets allowable // when starting a new speculative connection. -pref("network.http.speculative-parallel-limit", 6); +pref("network.http.speculative-parallel-limit", 0); // Whether or not to block requests for non head js/css items (e.g. media) // while those elements load. @@ -1949,7 +1949,7 @@ pref("network.dns.get-ttl", true); pref("network.dnsCacheExpirationGracePeriod", 60); // This preference can be used to turn off DNS prefetch. -pref("network.dns.disablePrefetch", false); +pref("network.dns.disablePrefetch", true); // This preference controls whether .onion hostnames are // rejected before being given to DNS. RFC 7686 @@ -1983,7 +1983,7 @@ pref("network.ftp.idleConnectionTimeout" pref("network.dir.format", 2); // enables the prefetch service (i.e., prefetching of URLs). -pref("network.prefetch-next", true); +pref("network.prefetch-next", false); // enables the predictive service pref("network.predictor.enabled", true); @@ -2474,7 +2474,7 @@ pref("security.allow_chrome_frames_insid pref("services.settings.server", "https://firefox.settings.services.mozilla.com/v1"); // Blocklist preferences -pref("extensions.blocklist.enabled", true); +pref("extensions.blocklist.enabled", false); // OneCRL freshness checking depends on this value, so if you change it, // please also update security.onecrl.maximum_staleness_in_seconds. pref("extensions.blocklist.interval", 86400); @@ -4090,7 +4090,7 @@ pref("browser.drag_out_of_frame_style", // Middle-mouse handling pref("middlemouse.paste", true); -pref("middlemouse.contentLoadURL", true); +pref("middlemouse.contentLoadURL", false); pref("middlemouse.openNewWindow", true); pref("middlemouse.scrollbarPosition", true); @@ -4153,7 +4153,7 @@ pref("browser.drag_out_of_frame_style", // Middle-mouse handling pref("middlemouse.paste", true); -pref("middlemouse.contentLoadURL", true); +pref("middlemouse.contentLoadURL", false); pref("middlemouse.openNewWindow", true); pref("middlemouse.scrollbarPosition", true); @@ -4511,7 +4511,7 @@ pref("signon.masterPasswordReprompt.time // Satchel (Form Manager) prefs pref("browser.formfill.debug", false); -pref("browser.formfill.enable", true); +pref("browser.formfill.enable", false); pref("browser.formfill.expire_days", 180); pref("browser.formfill.agedWeight", 2); pref("browser.formfill.bucketSize", 1); @@ -4618,7 +4618,7 @@ pref("gl.multithreaded", true); pref("gl.ignore-dx-interop2-blacklist", false); pref("webgl.force-enabled", false); -pref("webgl.disabled", false); +pref("webgl.disabled", true); pref("webgl.disable-angle", false); pref("webgl.disable-wgl", false); pref("webgl.min_capability_mode", false); @@ -4832,13 +4832,13 @@ pref("layers.gralloc.disable", false); pref("webrender.highlight-painted-layers", false); // Enable/Disable the geolocation API for content -pref("geo.enabled", true); +pref("geo.enabled", false); // Timeout for outbound network geolocation provider XHR pref("geo.wifi.xhr.timeout", 60000); // Enable/Disable the orientation API for content -pref("device.sensors.enabled", true); +pref("device.sensors.enabled", false); // Enable/Disable the device storage API for content pref("device.storage.enabled", false); @@ -4950,7 +4950,7 @@ pref("dom.vibrator.max_vibrate_ms", 1000 pref("dom.vibrator.max_vibrate_list_len", 128); // Battery API -pref("dom.battery.enabled", true); +pref("dom.battery.enabled", false); // Push @@ -5102,8 +5102,8 @@ pref("social.directories", "https://acti // remote-install allows any website to activate a provider, with extended UI // notifying user of installation. we can later pref off remote install if // necessary. This does not affect whitelisted and directory installs. -pref("social.remote-install.enabled", true); -pref("social.toast-notifications.enabled", true); +pref("social.remote-install.enabled", false); +pref("social.toast-notifications.enabled", false); // Disable idle observer fuzz, because only privileged content can access idle // observers (bug 780507). @@ -5241,26 +5241,26 @@ pref("dom.flyweb.enabled", false); pref("dom.mapped_arraybuffer.enabled", true); // The tables used for Safebrowsing phishing and malware checks. -pref("urlclassifier.malwareTable", "goog-malware-shavar,goog-unwanted-shavar,test-malware-simple,test-unwanted-simple"); +pref("urlclassifier.malwareTable", ""); #ifdef MOZILLA_OFFICIAL // In the official build, we are allowed to use google's private // phishing list "goog-phish-shavar". See Bug 1288840. -pref("urlclassifier.phishTable", "goog-phish-shavar,test-phish-simple"); +pref("urlclassifier.phishTable", ""); #else -pref("urlclassifier.phishTable", "googpub-phish-shavar,test-phish-simple"); +pref("urlclassifier.phishTable", ""); #endif // Tables for application reputation. #ifdef NIGHTLY_BUILD -pref("urlclassifier.downloadAllowTable", "goog-downloadwhite-digest256,goog-downloadwhite-proto"); -pref("urlclassifier.downloadBlockTable", "goog-badbinurl-shavar,goog-badbinurl-proto"); +pref("urlclassifier.downloadAllowTable", ""); +pref("urlclassifier.downloadBlockTable", ""); #else -pref("urlclassifier.downloadAllowTable", "goog-downloadwhite-digest256"); -pref("urlclassifier.downloadBlockTable", "goog-badbinurl-shavar"); +pref("urlclassifier.downloadAllowTable", ""); +pref("urlclassifier.downloadBlockTable", ""); #endif // NIGHTLY_BUILD -pref("urlclassifier.disallow_completions", "test-malware-simple,test-phish-simple,test-unwanted-simple,test-track-simple,test-trackwhite-simple,test-block-simple,test-flashallow-simple,testexcept-flashallow-simple,test-flash-simple,testexcept-flash-simple,test-flashsubdoc-simple,testexcept-flashsubdoc-simple,goog-downloadwhite-digest256,base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256"); +pref("urlclassifier.disallow_completions", ""); // The table and update/gethash URLs for Safebrowsing phishing and malware // checks. @@ -5282,55 +5282,55 @@ pref("urlclassifier.update.timeout_ms", pref("urlclassifier.alternate_error_page", "blocked"); // Enable phishing protection -pref("browser.safebrowsing.phishing.enabled", true); +pref("browser.safebrowsing.phishing.enabled", false); // Enable malware protection -pref("browser.safebrowsing.malware.enabled", true); +pref("browser.safebrowsing.malware.enabled", false); -pref("browser.safebrowsing.downloads.enabled", true); -pref("browser.safebrowsing.downloads.remote.enabled", true); +pref("browser.safebrowsing.downloads.enabled", false); +pref("browser.safebrowsing.downloads.remote.enabled", false); pref("browser.safebrowsing.downloads.remote.timeout_ms", 10000); pref("browser.safebrowsing.downloads.remote.url", "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_API_KEY%"); -pref("browser.safebrowsing.downloads.remote.block_dangerous", true); -pref("browser.safebrowsing.downloads.remote.block_dangerous_host", true); -pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", true); -pref("browser.safebrowsing.downloads.remote.block_uncommon", true); +pref("browser.safebrowsing.downloads.remote.block_dangerous", false); +pref("browser.safebrowsing.downloads.remote.block_dangerous_host", false); +pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false); +pref("browser.safebrowsing.downloads.remote.block_uncommon", false); pref("browser.safebrowsing.debug", false); // The protocol version we communicate with google server. pref("browser.safebrowsing.provider.google.pver", "2.2"); -pref("browser.safebrowsing.provider.google.lists", "goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,googpub-phish-shavar,goog-malware-shavar,goog-unwanted-shavar"); -pref("browser.safebrowsing.provider.google.updateURL", "https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2&key=%GOOGLE_API_KEY%"); -pref("browser.safebrowsing.provider.google.gethashURL", "https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2"); -pref("browser.safebrowsing.provider.google.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site="); -pref("browser.safebrowsing.provider.google.reportPhishMistakeURL", "https://%LOCALE%.phish-error.mozilla.com/?hl=%LOCALE%&url="); -pref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", "https://%LOCALE%.malware-error.mozilla.com/?hl=%LOCALE%&url="); +pref("browser.safebrowsing.provider.google.lists", ""); +pref("browser.safebrowsing.provider.google.updateURL", ""); +pref("browser.safebrowsing.provider.google.gethashURL", ""); +pref("browser.safebrowsing.provider.google.reportURL", ""); +pref("browser.safebrowsing.provider.google.reportPhishMistakeURL", ""); +pref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", ""); // Prefs for v4. pref("browser.safebrowsing.provider.google4.pver", "4"); -pref("browser.safebrowsing.provider.google4.lists", "goog-badbinurl-proto,goog-downloadwhite-proto,goog-phish-proto,googpub-phish-proto,goog-malware-proto,goog-unwanted-proto"); -pref("browser.safebrowsing.provider.google4.updateURL", "https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_API_KEY%&$httpMethod=POST"); +pref("browser.safebrowsing.provider.google4.lists", ""); +pref("browser.safebrowsing.provider.google4.updateURL", ""); #ifdef NIGHTLY_BUILD -pref("browser.safebrowsing.provider.google4.gethashURL", "https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_API_KEY%&$httpMethod=POST"); +pref("browser.safebrowsing.provider.google4.gethashURL", ""); #else pref("browser.safebrowsing.provider.google4.gethashURL", ""); #endif // NIGHTLY_BUILD -pref("browser.safebrowsing.provider.google4.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site="); -pref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", "https://%LOCALE%.phish-error.mozilla.com/?hl=%LOCALE%&url="); -pref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", "https://%LOCALE%.malware-error.mozilla.com/?hl=%LOCALE%&url="); +pref("browser.safebrowsing.provider.google4.reportURL", ""); +pref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", ""); +pref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", ""); -pref("browser.safebrowsing.reportPhishURL", "https://%LOCALE%.phish-report.mozilla.com/?hl=%LOCALE%&url="); +pref("browser.safebrowsing.reportPhishURL", ""); // The table and global pref for blocking plugin content -pref("browser.safebrowsing.blockedURIs.enabled", true); -pref("urlclassifier.blockedTable", "test-block-simple,mozplugin-block-digest256"); +pref("browser.safebrowsing.blockedURIs.enabled", false); +pref("urlclassifier.blockedTable", ""); // The protocol version we communicate with mozilla server. pref("browser.safebrowsing.provider.mozilla.pver", "2.2"); -pref("browser.safebrowsing.provider.mozilla.lists", "base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256"); -pref("browser.safebrowsing.provider.mozilla.updateURL", "https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2"); -pref("browser.safebrowsing.provider.mozilla.gethashURL", "https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2"); +pref("browser.safebrowsing.provider.mozilla.lists", ""); +pref("browser.safebrowsing.provider.mozilla.updateURL", ""); +pref("browser.safebrowsing.provider.mozilla.gethashURL", ""); // Set to a date in the past to force immediate download in new profiles. pref("browser.safebrowsing.provider.mozilla.nextupdatetime", "1"); // Block lists for tracking protection. The name values will be used as the keys @@ -5428,10 +5428,10 @@ pref("dom.wakelock.enabled", false); // The URL of the Firefox Accounts auth server backend pref("identity.fxaccounts.auth.uri", "https://api.accounts.firefox.com/v1"); -pref("beacon.enabled", true); +pref("beacon.enabled", false); // Camera prefs -pref("camera.control.face_detection.enabled", true); +pref("camera.control.face_detection.enabled", false); // SW Cache API @@ -5484,7 +5484,7 @@ pref("browser.search.suggest.enabled", t pref("browser.search.reset.enabled", false); pref("browser.search.reset.whitelist", ""); pref("browser.search.geoSpecificDefaults", false); -pref("browser.search.geoip.url", "https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY%"); +pref("browser.search.geoip.url", ""); pref("browser.search.geoip.timeout", 3000); #ifdef MOZ_OFFICIAL_BRANDING @@ -5499,7 +5499,7 @@ pref("browser.search.official", true); //pref("media.gmp-manager.url.override", ""); // Update service URL for GMP install/updates: -pref("media.gmp-manager.url", "https://aus5.mozilla.org/update/3/GMP/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%/update.xml"); +pref("media.gmp-manager.url", ""); // When |media.gmp-manager.cert.requireBuiltIn| is true or not specified the // final certificate and all certificates the connection is redirected to before @@ -5524,15 +5524,15 @@ pref("media.gmp-manager.cert.requireBuil // IMPORTANT! app.update.certs.* prefs should also be updated if these // are updated. pref("media.gmp-manager.cert.checkAttributes", true); -pref("media.gmp-manager.certs.1.issuerName", "CN=DigiCert SHA2 Secure Server CA,O=DigiCert Inc,C=US"); -pref("media.gmp-manager.certs.1.commonName", "aus5.mozilla.org"); -pref("media.gmp-manager.certs.2.issuerName", "CN=thawte SSL CA - G2,O=\"thawte, Inc.\",C=US"); -pref("media.gmp-manager.certs.2.commonName", "aus5.mozilla.org"); +pref("media.gmp-manager.certs.1.issuerName", ""); +pref("media.gmp-manager.certs.1.commonName", ""); +pref("media.gmp-manager.certs.2.issuerName", ""); +pref("media.gmp-manager.certs.2.commonName", ""); #endif // Whether or not to perform reader mode article parsing on page load. // If this pref is disabled, we will never show a reader mode icon in the toolbar. -pref("reader.parse-on-load.enabled", true); +pref("reader.parse-on-load.enabled", false); // After what size document we don't bother running Readability on it // because it'd slow things down too much --- a/toolkit/components/telemetry/healthreport-prefs.js +++ b/toolkit/components/telemetry/healthreport-prefs.js @@ -4,9 +4,9 @@ /* global pref */ -pref("datareporting.healthreport.infoURL", "https://www.mozilla.org/legal/privacy/firefox.html#health-report"); +pref("datareporting.healthreport.infoURL", ""); // Health Report is enabled by default on all channels. -pref("datareporting.healthreport.uploadEnabled", true); +pref("datareporting.healthreport.uploadEnabled", false); -pref("datareporting.healthreport.about.reportUrl", "https://fhr.cdn.mozilla.net/%LOCALE%/v4/"); +pref("datareporting.healthreport.about.reportUrl", "");