473 lines
24 KiB
Diff
473 lines
24 KiB
Diff
--- a/browser/app/profile/firefox.js
|
|
+++ b/browser/app/profile/firefox.js
|
|
@@ -255,7 +255,7 @@ pref("browser.touchmode.auto", false);
|
|
#endif
|
|
|
|
// At startup, check if we're the default browser and prompt user if not.
|
|
-pref("browser.shell.checkDefaultBrowser", true);
|
|
+pref("browser.shell.checkDefaultBrowser", false);
|
|
pref("browser.shell.shortcutFavicons",true);
|
|
pref("browser.shell.mostRecentDateSetAsDefault", "");
|
|
pref("browser.shell.skipDefaultBrowserCheckOnFirstRun", true);
|
|
@@ -265,7 +265,7 @@ pref("browser.defaultbrowser.notificationbar", false);
|
|
|
|
// 0 = blank, 1 = home (browser.startup.homepage), 2 = last visited page, 3 = resume previous browser session
|
|
// The behavior of option 3 is detailed at: http://wiki.mozilla.org/Session_Restore
|
|
-pref("browser.startup.page", 1);
|
|
+pref("browser.startup.page", 0);
|
|
pref("browser.startup.homepage", "chrome://branding/locale/browserconfig.properties");
|
|
// Whether we should skip the homepage when opening the first-run page
|
|
pref("browser.startup.firstrunSkipsHomepage", true);
|
|
@@ -327,7 +327,7 @@ pref("browser.urlbar.suggest.history",
|
|
pref("browser.urlbar.suggest.bookmark", true);
|
|
pref("browser.urlbar.suggest.openpage", true);
|
|
pref("browser.urlbar.suggest.searches", true);
|
|
-pref("browser.urlbar.userMadeSearchSuggestionsChoice", false);
|
|
+pref("browser.urlbar.userMadeSearchSuggestionsChoice", true);
|
|
// The suggestion opt-in notification will be shown on 4 different days.
|
|
pref("browser.urlbar.daysBeforeHidingSuggestionsPrompt", 4);
|
|
pref("browser.urlbar.lastSuggestionsPromptDate", 20160601);
|
|
@@ -372,7 +372,7 @@ pref("browser.download.manager.resumeOnW
|
|
pref("browser.download.animateNotifications", true);
|
|
|
|
// This records whether or not the panel has been shown at least once.
|
|
-pref("browser.download.panel.shown", false);
|
|
+pref("browser.download.panel.shown", true);
|
|
|
|
#ifndef XP_MACOSX
|
|
pref("browser.helperApps.deleteTempFileOnExit", true);
|
|
@@ -459,7 +459,7 @@ pref("browser.photon.structure.enabled",
|
|
// Tabbed browser
|
|
pref("browser.tabs.closeWindowWithLastTab", true);
|
|
pref("browser.tabs.insertRelatedAfterCurrent", true);
|
|
-pref("browser.tabs.warnOnClose", true);
|
|
+pref("browser.tabs.warnOnClose", false);
|
|
pref("browser.tabs.warnOnCloseOtherTabs", true);
|
|
pref("browser.tabs.warnOnOpen", true);
|
|
pref("browser.tabs.maxOpenBeforeWarn", 15);
|
|
@@ -643,7 +643,7 @@ pref("browser.xul.error_pages.enabled",
|
|
pref("browser.xul.error_pages.expert_bad_cert", false);
|
|
|
|
// Enable captive portal detection.
|
|
-pref("network.captive-portal-service.enabled", true);
|
|
+pref("network.captive-portal-service.enabled", false);
|
|
|
|
// If true, network link events will change the value of navigator.onLine
|
|
pref("network.manage-offline-status", true);
|
|
@@ -1262,7 +1262,7 @@ pref("browser.newtab.preload", true);
|
|
// Remembers if the about:newtab intro has been shown
|
|
// NOTE: This preference is unused but was not removed in case
|
|
// this information will be valuable in the future.
|
|
-pref("browser.newtabpage.introShown", false);
|
|
+pref("browser.newtabpage.introShown", true);
|
|
|
|
// Toggles the content of 'about:newtab'. Shows the grid when enabled.
|
|
pref("browser.newtabpage.enabled", true);
|
|
--- a/browser/branding/official/pref/firefox-branding.js
|
|
+++ b/browser/branding/official/pref/firefox-branding.js
|
|
@@ -3,7 +3,7 @@
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
pref("startup.homepage_override_url", "");
|
|
-pref("startup.homepage_welcome_url", "https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/firstrun/");
|
|
+pref("startup.homepage_welcome_url", "about:blank");
|
|
pref("startup.homepage_welcome_url.additional", "");
|
|
// Interval: Time between checks for a new version (in seconds)
|
|
pref("app.update.interval", 43200); // 12 hours
|
|
--- a/build/application.ini.in
|
|
+++ b/build/application.ini.in
|
|
@@ -41,7 +41,7 @@ MaxVersion=@GRE_MILESTONE@
|
|
|
|
[XRE]
|
|
#ifdef MOZ_PROFILE_MIGRATOR
|
|
-EnableProfileMigrator=1
|
|
+EnableProfileMigrator=0
|
|
#endif
|
|
|
|
#if MOZ_CRASHREPORTER
|
|
--- a/modules/libpref/init/all.js
|
|
+++ b/modules/libpref/init/all.js
|
|
@@ -31,7 +31,7 @@ pref("general.useragent.site_specific_ov
|
|
|
|
pref("general.config.obscure_value", 13); // for MCD .cfg files
|
|
|
|
-pref("general.warnOnAboutConfig", true);
|
|
+pref("general.warnOnAboutConfig", false);
|
|
|
|
// maximum number of dated backups to keep at any time
|
|
pref("browser.bookmarks.max_backups", 5);
|
|
@@ -411,7 +411,7 @@ pref("media.opus.enabled", true);
|
|
pref("media.wave.enabled", true);
|
|
pref("media.webm.enabled", true);
|
|
|
|
-pref("media.eme.chromium-api.enabled", true);
|
|
+pref("media.eme.chromium-api.enabled", false);
|
|
pref("media.eme.chromium-api.video-shmems", 6);
|
|
|
|
#ifdef MOZ_APPLEMEDIA
|
|
@@ -474,7 +474,7 @@ pref("media.navigator.video.use_tmmbr", false);
|
|
pref("media.navigator.audio.use_fec", true);
|
|
pref("media.navigator.video.red_ulpfec_enabled", false);
|
|
|
|
-pref("media.peerconnection.dtmf.enabled", true);
|
|
+pref("media.peerconnection.dtmf.enabled", false);
|
|
|
|
pref("media.webrtc.debug.trace_mask", 0);
|
|
pref("media.webrtc.debug.multi_log", false);
|
|
@@ -484,15 +484,15 @@ pref("media.webrtc.debug.aec_dump_max_size", 4194304); // 4MB
|
|
|
|
pref("media.navigator.video.default_width",0); // adaptive default
|
|
pref("media.navigator.video.default_height",0); // adaptive default
|
|
-pref("media.peerconnection.enabled", true);
|
|
-pref("media.peerconnection.video.enabled", true);
|
|
+pref("media.peerconnection.enabled", false);
|
|
+pref("media.peerconnection.video.enabled", false);
|
|
pref("media.navigator.video.max_fs", 12288); // Enough for 2048x1536
|
|
pref("media.navigator.video.max_fr", 60);
|
|
pref("media.navigator.video.h264.level", 31); // 0x42E01f - level 3.1
|
|
pref("media.navigator.video.h264.max_br", 0);
|
|
pref("media.navigator.video.h264.max_mbps", 0);
|
|
pref("media.peerconnection.video.h264_enabled", false);
|
|
-pref("media.peerconnection.video.vp9_enabled", true);
|
|
+pref("media.peerconnection.video.vp9_enabled", false);
|
|
pref("media.getusermedia.aec", 1);
|
|
pref("media.getusermedia.browser.enabled", false);
|
|
pref("media.getusermedia.channels", 0);
|
|
@@ -514,7 +514,7 @@ pref("media.peerconnection.ice.link_local", false); // Set only for testing IPV6
|
|
pref("media.peerconnection.ice.force_interface", ""); // Limit to only a single interface
|
|
pref("media.peerconnection.ice.relay_only", false); // Limit candidates to TURN
|
|
pref("media.peerconnection.use_document_iceservers", true);
|
|
-pref("media.peerconnection.identity.enabled", true);
|
|
+pref("media.peerconnection.identity.enabled", false);
|
|
pref("media.peerconnection.identity.timeout", 10000);
|
|
pref("media.peerconnection.ice.stun_client_maximum_transmits", 7);
|
|
pref("media.peerconnection.ice.trickle_grace_period", 5000);
|
|
@@ -525,7 +525,7 @@ pref("media.peerconnection.ice.proxy_only", false);
|
|
// These values (aec, agc, and noice) are from media/webrtc/trunk/webrtc/common_types.h
|
|
// kXxxUnchanged = 0, kXxxDefault = 1, and higher values are specific to each
|
|
// setting (for Xxx = Ec, Agc, or Ns). Defaults are all set to kXxxDefault here.
|
|
-pref("media.peerconnection.turn.disable", false);
|
|
+pref("media.peerconnection.turn.disable", true);
|
|
#if defined(MOZ_WEBRTC_HARDWARE_AEC_NS)
|
|
pref("media.getusermedia.aec_enabled", false);
|
|
pref("media.getusermedia.noise_enabled", false);
|
|
@@ -1386,7 +1386,7 @@ pref("privacy.donottrackheader.enabled",
|
|
// the popup will be called when the popup is dismissed.
|
|
pref("privacy.permissionPrompts.showCloseButton", false);
|
|
// Enforce tracking protection in all modes
|
|
-pref("privacy.trackingprotection.enabled", false);
|
|
+pref("privacy.trackingprotection.enabled", true);
|
|
// Enforce tracking protection in Private Browsing mode
|
|
pref("privacy.trackingprotection.pbmode.enabled", true);
|
|
// Annotate channels based on the tracking protection list in all modes
|
|
@@ -1700,7 +1700,7 @@ pref("network.http.network-changed.timeo
|
|
|
|
// The maximum number of current global half open sockets allowable
|
|
// when starting a new speculative connection.
|
|
-pref("network.http.speculative-parallel-limit", 6);
|
|
+pref("network.http.speculative-parallel-limit", 0);
|
|
|
|
// Whether or not to block requests for non head js/css items (e.g. media)
|
|
// while those elements load.
|
|
@@ -2014,7 +2014,7 @@ pref("network.dns.get-ttl", true);
|
|
pref("network.dnsCacheExpirationGracePeriod", 60);
|
|
|
|
// This preference can be used to turn off DNS prefetch.
|
|
-pref("network.dns.disablePrefetch", false);
|
|
+pref("network.dns.disablePrefetch", true);
|
|
|
|
// This preference controls whether .onion hostnames are
|
|
// rejected before being given to DNS. RFC 7686
|
|
@@ -2053,7 +2053,7 @@ pref("network.dir.format", 2);
|
|
|
|
// enables the prefetch service (i.e., prefetching of <link rel="next"> and
|
|
// <link rel="prefetch"> URLs).
|
|
-pref("network.prefetch-next", true);
|
|
+pref("network.prefetch-next", false);
|
|
// enables the preloading (i.e., preloading of <link rel="preload"> URLs).
|
|
pref("network.preload", true);
|
|
|
|
@@ -2558,7 +2558,7 @@ pref("security.allow_chrome_frames_insid
|
|
pref("services.settings.server", "https://firefox.settings.services.mozilla.com/v1");
|
|
|
|
// Blocklist preferences
|
|
-pref("extensions.blocklist.enabled", true);
|
|
+pref("extensions.blocklist.enabled", false);
|
|
// OneCRL freshness checking depends on this value, so if you change it,
|
|
// please also update security.onecrl.maximum_staleness_in_seconds.
|
|
pref("extensions.blocklist.interval", 86400);
|
|
@@ -4162,7 +4162,7 @@ pref("browser.drag_out_of_frame_style",
|
|
|
|
// Middle-mouse handling
|
|
pref("middlemouse.paste", true);
|
|
-pref("middlemouse.contentLoadURL", true);
|
|
+pref("middlemouse.contentLoadURL", false);
|
|
pref("middlemouse.openNewWindow", true);
|
|
pref("middlemouse.scrollbarPosition", true);
|
|
|
|
@@ -4225,7 +4225,7 @@ pref("browser.drag_out_of_frame_style",
|
|
|
|
// Middle-mouse handling
|
|
pref("middlemouse.paste", true);
|
|
-pref("middlemouse.contentLoadURL", true);
|
|
+pref("middlemouse.contentLoadURL", false);
|
|
pref("middlemouse.openNewWindow", true);
|
|
pref("middlemouse.scrollbarPosition", true);
|
|
|
|
@@ -4583,7 +4583,7 @@ pref("signon.masterPasswordReprompt.time
|
|
|
|
// Satchel (Form Manager) prefs
|
|
pref("browser.formfill.debug", false);
|
|
-pref("browser.formfill.enable", true);
|
|
+pref("browser.formfill.enable", false);
|
|
pref("browser.formfill.expire_days", 180);
|
|
pref("browser.formfill.agedWeight", 2);
|
|
pref("browser.formfill.bucketSize", 1);
|
|
@@ -4695,7 +4695,7 @@ pref("gl.ignore-dx-interop2-blacklist", false);
|
|
pref("gl.use-tls-is-current", 0);
|
|
|
|
pref("webgl.force-enabled", false);
|
|
-pref("webgl.disabled", false);
|
|
+pref("webgl.disabled", true);
|
|
pref("webgl.disable-angle", false);
|
|
pref("webgl.disable-wgl", false);
|
|
pref("webgl.min_capability_mode", false);
|
|
@@ -4909,13 +4909,13 @@ pref("layers.force-active", false);
|
|
pref("layers.gralloc.disable", false);
|
|
|
|
// Enable/Disable the geolocation API for content
|
|
-pref("geo.enabled", true);
|
|
+pref("geo.enabled", false);
|
|
|
|
// Timeout for outbound network geolocation provider XHR
|
|
pref("geo.wifi.xhr.timeout", 60000);
|
|
|
|
// Enable/Disable the orientation API for content
|
|
-pref("device.sensors.enabled", true);
|
|
+pref("device.sensors.enabled", false);
|
|
|
|
// Enable/Disable the device storage API for content
|
|
pref("device.storage.enabled", false);
|
|
@@ -5029,7 +5029,7 @@ pref("dom.vibrator.max_vibrate_ms", 1000
|
|
pref("dom.vibrator.max_vibrate_list_len", 128);
|
|
|
|
// Battery API
|
|
-pref("dom.battery.enabled", true);
|
|
+pref("dom.battery.enabled", false);
|
|
|
|
// Push
|
|
|
|
@@ -5181,8 +5181,8 @@ pref("social.directories", "https://acti
|
|
// remote-install allows any website to activate a provider, with extended UI
|
|
// notifying user of installation. we can later pref off remote install if
|
|
// necessary. This does not affect whitelisted and directory installs.
|
|
-pref("social.remote-install.enabled", true);
|
|
-pref("social.toast-notifications.enabled", true);
|
|
+pref("social.remote-install.enabled", false);
|
|
+pref("social.toast-notifications.enabled", false);
|
|
|
|
// Disable idle observer fuzz, because only privileged content can access idle
|
|
// observers (bug 780507).
|
|
@@ -5320,21 +5320,15 @@ pref("dom.flyweb.enabled", false);
|
|
pref("dom.mapped_arraybuffer.enabled", true);
|
|
|
|
// The tables used for Safebrowsing phishing and malware checks.
|
|
-pref("urlclassifier.malwareTable", "goog-malware-shavar,goog-unwanted-shavar,test-malware-simple,test-unwanted-simple");
|
|
+pref("urlclassifier.malwareTable", "");
|
|
|
|
-#ifdef MOZILLA_OFFICIAL
|
|
-// In the official build, we are allowed to use google's private
|
|
-// phishing list "goog-phish-shavar". See Bug 1288840.
|
|
-pref("urlclassifier.phishTable", "goog-phish-shavar,test-phish-simple");
|
|
-#else
|
|
-pref("urlclassifier.phishTable", "googpub-phish-shavar,test-phish-simple");
|
|
-#endif
|
|
+pref("urlclassifier.phishTable", "");
|
|
|
|
// Tables for application reputation.
|
|
-pref("urlclassifier.downloadAllowTable", "goog-downloadwhite-digest256");
|
|
-pref("urlclassifier.downloadBlockTable", "goog-badbinurl-shavar");
|
|
+pref("urlclassifier.downloadAllowTable", "");
|
|
+pref("urlclassifier.downloadBlockTable", "");
|
|
|
|
-pref("urlclassifier.disallow_completions", "test-malware-simple,test-phish-simple,test-unwanted-simple,test-track-simple,test-trackwhite-simple,test-block-simple,goog-downloadwhite-digest256,base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256");
|
|
+pref("urlclassifier.disallow_completions", "");
|
|
|
|
// The table and update/gethash URLs for Safebrowsing phishing and malware
|
|
// checks.
|
|
@@ -5356,58 +5350,54 @@ pref("urlclassifier.update.timeout_ms", 90000);
|
|
pref("urlclassifier.alternate_error_page", "blocked");
|
|
|
|
// Enable phishing protection
|
|
-pref("browser.safebrowsing.phishing.enabled", true);
|
|
+pref("browser.safebrowsing.phishing.enabled", false);
|
|
|
|
// Enable malware protection
|
|
-pref("browser.safebrowsing.malware.enabled", true);
|
|
+pref("browser.safebrowsing.malware.enabled", false);
|
|
|
|
-#ifdef MOZILLA_OFFICIAL
|
|
-pref("browser.safebrowsing.downloads.enabled", true);
|
|
-#else
|
|
pref("browser.safebrowsing.downloads.enabled", false);
|
|
-#endif
|
|
-pref("browser.safebrowsing.downloads.remote.enabled", true);
|
|
+pref("browser.safebrowsing.downloads.remote.enabled", false);
|
|
pref("browser.safebrowsing.downloads.remote.timeout_ms", 10000);
|
|
pref("browser.safebrowsing.downloads.remote.url", "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_API_KEY%");
|
|
-pref("browser.safebrowsing.downloads.remote.block_dangerous", true);
|
|
-pref("browser.safebrowsing.downloads.remote.block_dangerous_host", true);
|
|
-pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", true);
|
|
-pref("browser.safebrowsing.downloads.remote.block_uncommon", true);
|
|
+pref("browser.safebrowsing.downloads.remote.block_dangerous", false);
|
|
+pref("browser.safebrowsing.downloads.remote.block_dangerous_host", false);
|
|
+pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
|
|
+pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
|
|
pref("browser.safebrowsing.debug", false);
|
|
|
|
// The protocol version we communicate with google server.
|
|
pref("browser.safebrowsing.provider.google.pver", "2.2");
|
|
-pref("browser.safebrowsing.provider.google.lists", "goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,googpub-phish-shavar,goog-malware-shavar,goog-unwanted-shavar");
|
|
-pref("browser.safebrowsing.provider.google.updateURL", "https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2&key=%GOOGLE_API_KEY%");
|
|
-pref("browser.safebrowsing.provider.google.gethashURL", "https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2");
|
|
-pref("browser.safebrowsing.provider.google.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site=");
|
|
-pref("browser.safebrowsing.provider.google.reportPhishMistakeURL", "https://%LOCALE%.phish-error.mozilla.com/?hl=%LOCALE%&url=");
|
|
-pref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", "https://%LOCALE%.malware-error.mozilla.com/?hl=%LOCALE%&url=");
|
|
-pref("browser.safebrowsing.provider.google.advisoryURL", "https://developers.google.com/safe-browsing/v4/advisory");
|
|
-pref("browser.safebrowsing.provider.google.advisoryName", "Google Safe Browsing.");
|
|
+pref("browser.safebrowsing.provider.google.lists", "");
|
|
+pref("browser.safebrowsing.provider.google.updateURL", "");
|
|
+pref("browser.safebrowsing.provider.google.gethashURL", "");
|
|
+pref("browser.safebrowsing.provider.google.reportURL", "");
|
|
+pref("browser.safebrowsing.provider.google.reportPhishMistakeURL", "");
|
|
+pref("browser.safebrowsing.provider.google.reportMalwareMistakeURL", "");
|
|
+pref("browser.safebrowsing.provider.google.advisoryURL", "");
|
|
+pref("browser.safebrowsing.provider.google.advisoryName", "");
|
|
|
|
// Prefs for v4.
|
|
pref("browser.safebrowsing.provider.google4.pver", "4");
|
|
-pref("browser.safebrowsing.provider.google4.lists", "goog-badbinurl-proto,goog-downloadwhite-proto,goog-phish-proto,googpub-phish-proto,goog-malware-proto,goog-unwanted-proto");
|
|
-pref("browser.safebrowsing.provider.google4.updateURL", "https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_API_KEY%&$httpMethod=POST");
|
|
-pref("browser.safebrowsing.provider.google4.gethashURL", "https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_API_KEY%&$httpMethod=POST");
|
|
-pref("browser.safebrowsing.provider.google4.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site=");
|
|
-pref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", "https://%LOCALE%.phish-error.mozilla.com/?hl=%LOCALE%&url=");
|
|
-pref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", "https://%LOCALE%.malware-error.mozilla.com/?hl=%LOCALE%&url=");
|
|
-pref("browser.safebrowsing.provider.google4.advisoryURL", "https://developers.google.com/safe-browsing/v4/advisory");
|
|
-pref("browser.safebrowsing.provider.google4.advisoryName", "Google Safe Browsing.");
|
|
+pref("browser.safebrowsing.provider.google4.lists", "");
|
|
+pref("browser.safebrowsing.provider.google4.updateURL", "");
|
|
+pref("browser.safebrowsing.provider.google4.gethashURL", "");
|
|
+pref("browser.safebrowsing.provider.google4.reportURL", "");
|
|
+pref("browser.safebrowsing.provider.google4.reportPhishMistakeURL", "");
|
|
+pref("browser.safebrowsing.provider.google4.reportMalwareMistakeURL", "");
|
|
+pref("browser.safebrowsing.provider.google4.advisoryURL", "");
|
|
+pref("browser.safebrowsing.provider.google4.advisoryName", "");
|
|
|
|
-pref("browser.safebrowsing.reportPhishURL", "https://%LOCALE%.phish-report.mozilla.com/?hl=%LOCALE%&url=");
|
|
+pref("browser.safebrowsing.reportPhishURL", "");
|
|
|
|
// The table and global pref for blocking plugin content
|
|
-pref("browser.safebrowsing.blockedURIs.enabled", true);
|
|
-pref("urlclassifier.blockedTable", "test-block-simple,mozplugin-block-digest256");
|
|
+pref("browser.safebrowsing.blockedURIs.enabled", false);
|
|
+pref("urlclassifier.blockedTable", "");
|
|
|
|
// The protocol version we communicate with mozilla server.
|
|
pref("browser.safebrowsing.provider.mozilla.pver", "2.2");
|
|
-pref("browser.safebrowsing.provider.mozilla.lists", "base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256");
|
|
-pref("browser.safebrowsing.provider.mozilla.updateURL", "https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2");
|
|
-pref("browser.safebrowsing.provider.mozilla.gethashURL", "https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2");
|
|
+pref("browser.safebrowsing.provider.mozilla.lists", "");
|
|
+pref("browser.safebrowsing.provider.mozilla.updateURL", "");
|
|
+pref("browser.safebrowsing.provider.mozilla.gethashURL", "");
|
|
// Set to a date in the past to force immediate download in new profiles.
|
|
pref("browser.safebrowsing.provider.mozilla.nextupdatetime", "1");
|
|
// Block lists for tracking protection. The name values will be used as the keys
|
|
@@ -5417,13 +5407,13 @@ pref("browser.safebrowsing.provider.mozilla.lists.base.description", "mozstdDesc
|
|
pref("browser.safebrowsing.provider.mozilla.lists.content.name", "mozfullName");
|
|
pref("browser.safebrowsing.provider.mozilla.lists.content.description", "mozfullDesc2");
|
|
|
|
-pref("urlclassifier.flashAllowTable", "allow-flashallow-digest256");
|
|
-pref("urlclassifier.flashAllowExceptTable", "except-flashallow-digest256");
|
|
-pref("urlclassifier.flashTable", "block-flash-digest256");
|
|
-pref("urlclassifier.flashExceptTable", "except-flash-digest256");
|
|
-pref("urlclassifier.flashSubDocTable", "block-flashsubdoc-digest256");
|
|
-pref("urlclassifier.flashSubDocExceptTable", "except-flashsubdoc-digest256");
|
|
-pref("urlclassifier.flashInfobarTable", "except-flashinfobar-digest256");
|
|
+pref("urlclassifier.flashAllowTable", "");
|
|
+pref("urlclassifier.flashAllowExceptTable", "");
|
|
+pref("urlclassifier.flashTable", "");
|
|
+pref("urlclassifier.flashExceptTable", "");
|
|
+pref("urlclassifier.flashSubDocTable", "");
|
|
+pref("urlclassifier.flashSubDocExceptTable", "");
|
|
+pref("urlclassifier.flashInfobarTable", "");
|
|
|
|
pref("plugins.http_https_only", true);
|
|
pref("plugins.flashBlock.enabled", false);
|
|
@@ -5499,10 +5499,10 @@ pref("dom.wakelock.enabled", false);
|
|
// The URL of the Firefox Accounts auth server backend
|
|
pref("identity.fxaccounts.auth.uri", "https://api.accounts.firefox.com/v1");
|
|
|
|
-pref("beacon.enabled", true);
|
|
+pref("beacon.enabled", false);
|
|
|
|
// Camera prefs
|
|
-pref("camera.control.face_detection.enabled", true);
|
|
+pref("camera.control.face_detection.enabled", false);
|
|
|
|
|
|
// SW Cache API
|
|
@@ -5546,7 +5546,7 @@ pref("browser.search.suggest.enabled", t
|
|
pref("browser.search.reset.enabled", false);
|
|
pref("browser.search.reset.whitelist", "");
|
|
pref("browser.search.geoSpecificDefaults", false);
|
|
-pref("browser.search.geoip.url", "https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY%");
|
|
+pref("browser.search.geoip.url", "");
|
|
pref("browser.search.geoip.timeout", 3000);
|
|
|
|
#ifdef MOZ_OFFICIAL_BRANDING
|
|
@@ -5560,7 +5560,7 @@ pref("browser.search.official", true);
|
|
//pref("media.gmp-manager.url.override", "");
|
|
|
|
// Update service URL for GMP install/updates:
|
|
-pref("media.gmp-manager.url", "https://aus5.mozilla.org/update/3/GMP/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%/update.xml");
|
|
+pref("media.gmp-manager.url", "");
|
|
|
|
// When |media.gmp-manager.cert.requireBuiltIn| is true or not specified the
|
|
// final certificate and all certificates the connection is redirected to before
|
|
@@ -5585,14 +5585,14 @@ pref("media.gmp-manager.cert.requireBuiltIn", true);
|
|
// IMPORTANT! app.update.certs.* prefs should also be updated if these
|
|
// are updated.
|
|
pref("media.gmp-manager.cert.checkAttributes", true);
|
|
-pref("media.gmp-manager.certs.1.issuerName", "CN=DigiCert SHA2 Secure Server CA,O=DigiCert Inc,C=US");
|
|
-pref("media.gmp-manager.certs.1.commonName", "aus5.mozilla.org");
|
|
-pref("media.gmp-manager.certs.2.issuerName", "CN=thawte SSL CA - G2,O=\"thawte, Inc.\",C=US");
|
|
-pref("media.gmp-manager.certs.2.commonName", "aus5.mozilla.org");
|
|
+pref("media.gmp-manager.certs.1.issuerName", "");
|
|
+pref("media.gmp-manager.certs.1.commonName", "");
|
|
+pref("media.gmp-manager.certs.2.issuerName", "");
|
|
+pref("media.gmp-manager.certs.2.commonName", "");
|
|
|
|
// Whether or not to perform reader mode article parsing on page load.
|
|
// If this pref is disabled, we will never show a reader mode icon in the toolbar.
|
|
-pref("reader.parse-on-load.enabled", true);
|
|
+pref("reader.parse-on-load.enabled", false);
|
|
|
|
// After what size document we don't bother running Readability on it
|
|
// because it'd slow things down too much
|
|
--- a/toolkit/components/telemetry/healthreport-prefs.js
|
|
+++ b/toolkit/components/telemetry/healthreport-prefs.js
|
|
@@ -4,9 +4,9 @@
|
|
|
|
/* global pref */
|
|
|
|
-pref("datareporting.healthreport.infoURL", "https://www.mozilla.org/legal/privacy/firefox.html#health-report");
|
|
+pref("datareporting.healthreport.infoURL", "");
|
|
|
|
// Health Report is enabled by default on all channels.
|
|
-pref("datareporting.healthreport.uploadEnabled", true);
|
|
+pref("datareporting.healthreport.uploadEnabled", false);
|
|
|
|
-pref("datareporting.healthreport.about.reportUrl", "https://fhr.cdn.mozilla.net/%LOCALE%/v4/");
|
|
+pref("datareporting.healthreport.about.reportUrl", "");
|