This guide contains updated recommendations and privacy tweaks for Firefox, revised to reflect the latest version and new features for 2022.
Mozilla Firefox is one of the best browsers available that combines strong privacy protection features, good security, active development, and regular updates. The newest version of Firefox is fast, light-weight, and packed full of privacy and security features.
It is for this reason that I consider Firefox to be the best all-around browser for privacy and security. It remains a solid alternative to some of the other options, such as Google Chrome, Microsoft Edge, and Safari.
Another great aspect of Firefox is that it is highly customizable, which is the point of this guide. Below we will go over how you can customize Firefox to give you the security and privacy you desire, while still working well for day-to-day browsing.
But before we jump in, let’s cover some important details.
Important considerations before starting
There are many factors to consider when configuring Firefox to meet your needs, including your threat model and browsing preferences. In other words, there is no “one-size-fits-all” configuration that will work for everyone. This guide is a basic overview covering some of the different configurations options.
Before you start modifying Firefox and installing a bunch of add-ons, it’s important to consider browser fingerprinting.
Browser fingerprinting
The issue of browser fingerprinting (or device fingerprinting) is a big topic that covers all the different ways you can be tracked and identified by your system and various settings. All of the different add-ons you install and preference modifications you make to Firefox are inputs that can potentially be used to identify and track you.
Herein lies the catch-22: the more browser add-ons you install and settings you modify, the more likely you will stand out from the crowd and be easier to track. There are solutions for this and the latest version of Firefox does offer some fingerprinting protection. I discuss this problem and also provide solutions in the browser fingerprinting guide.
And that leads us to the next point that…
More is not always better
When it comes to browser add-ons and modifications, you don’t want to be like that kid who puts every topping imaginable on his ice cream. Similarly, more is not always better with Firefox browser add-ons.
Aside from the issue of browser fingerprinting, having too many add-ons may slow down performance and break things. Many of the popular Firefox add-ons also fulfill the same functions and are redundant when used together.
Therefore it is best to strike a balanced approach. Install and modify only what you think will be useful and necessary for your specific situation.
Proceed with caution
Modifying some of these settings may interfere with your browsing experience and break some websites (they won’t load properly). Therefore taking an incremental approach may be the best way to proceed. You can continue to install add-ons and adjust your settings as you see what works best for your needs.
This allows you to modify the settings, create exceptions, or add sites to a whitelist.
Firefox privacy tweaks
Before you get going with Firefox you may want to adjust the following settings for better privacy.
Note: if you are a Mac OS user, you will see the word “Preferences” in your menu rather than “Options” as it is listed below.
Disable Firefox telemetry
With the latest version of Firefox, it is configured to share “technical and interaction data” with Mozilla. This includes the ability to “install and run studies” on your computer. You can learn more about these studies and data collection practices, but I’d recommend disabling these settings.
To disable go to Open Menu (three bars at the top right corner of the browser) > Options > Privacy & Security > Firefox Data Collection and Use and then uncheck the boxes as you see below:
You can also disable data sharing with Firefox for Android by going to Menu > Options > Privacy > Data Choices and then uncheck all three categories for Telemetry, Crash Reporter, and Mozilla Location Service.
Note: You can also disable this in the About:Config settings with toolkit.telemetry.enabled set to false.
Change the default search engine in Firefox
Firefox now uses Google as the default search engine, but there are other private search engines you can use instead.
To do this, go to Menu > Options > Search > Default Search Engine. Firefox does not provide you with very many alternatives directly in the settings area. However, you can view more options by going down to One-Click Search Engines and then click Find more search engines to see the other alternatives.
See our guide on private search engines to dive into this topic more.
Firefox also has a guide on modifying your search engine preferences.
Firefox Content Blocking
Another great new feature with Firefox is Content Blocking. This customizable feature will automatically block “content that tracks the sites you visit and profiles you.” You can choose between Standard, Strict, and Custom modes, which allow you to block:
- Cookies
- Tracking content
- Cyrptominers
- Fingerprinters
To adjust the Firefox Content Blocking settings, go to Menu > Options > Privacy and Security > Content Blocking and then select which mode you want to use.
The Standard setting may be the best balance for regular users. Firefox warns that Strict mode may “cause some websites to break.” However, you can still…
Disable content blocking for specific sites
It’s easy to disable content blocking for certain trusted sites. Simply enter the website URL, then click the “i” icon to the left of the address bar, then click the grey button to “Turn off Blocking for This Site.”
Another benefit of Firefox’s Content Blocking feature is that it can save your data and improve page load speeds.
The “Do Not Track” request
Firefox also has an option to request that websites “do not track” you online. This is simply an HTTP header field that you can easily enable. However, the key word here is request, because this is not actually blocking anything. We have also learned that many websites simply ignore these requests.
In addition to being ignored by most sites, this is also a value that can be used for browser fingerprinting purposes, as explained here. Therefore I no longer recommend enabling or modifying the Do Not Track settings, which you’ll find in the Content Blocking settings area.
You can learn more about the Do Not Track feature here.
Firefox About:Config settings
Aside from the general Menu settings we used above, you can also make a number of different modifications using about:config.
Note: If you made all of the changes above, you may notice that some of these settings are already updated in about:config. We will still cover the different about:config since some people prefer to modify settings in this area, rather than through the general Menu.
To access these configuration settings, simply enter about:config into the URL bar and hit enter. You will then be prompted with a warning screen stating “This might void your warranty.” Just click “I accept the risk” to continue.
After proceeding, you will see a large list of preferences, which each include a status, type, and value.
These preferences will be listed in alphabetical order and are easily searchable from the search bar near the top.
Modifying preferences – You can modify any of these Firefox preferences by simply double clicking the preference name. If the preference is a “boolean” type, then double clicking will change the value to true or false. If the preference is an “integer” or “string” type, double clicking will open a box to change the value.
Here are my recommended changes:
Disable WebRTC:
media.peerconnection.enabled (WebRTC) = false
WebRTC stands for “Web Real-Time Communication” and it allows for voice, video chat, and P2P sharing through your browser. Unfortunately, this capability can also expose your real IP address through browser STUN requests, even if you are using a good VPN service. (This is called a WebRTC leak.)
To disable WebRTC in Firefox simply enter media.peerconnection.enabled into the search bar and then double click the value to change it to false.
Aside from Firefox, the WebRTC vulnerability also affects Chrome, Opera, Brave, and other Chromium-based browsers. Safari is also in the process of implementing WebRTC.
Note: If you disable WebRTC, services like Google Meet and Whereby may not work.
Resist Fingerprinting:
privacy.resistFingerprinting = true
Changing this preference to true will help to make Firefox more resistant to browser fingerprinting.
Note: There are many factors that go into browser fingerprinting and the ability of an adversary to identify you. See the browser fingerprinting guide for additional details.
privacy.trackingprotection.fingerprinting.enabled = true
This is a new preference with Firefox 67+ to block fingerprinting.
privacy.trackingprotection.cryptomining.enabled = true
Another new preference with Firefox 67+, this will block cryptominers.
First party isolate
privacy.firstparty.isolate = true
Changing this to true will isolate cookies to the first party domain, which prevents tracking across multiple domains. First party isolation also does much more than isolating cookies, it affects: cookies, cache, HTTP Authentication, DOM Storage, Flash cookies, SSL and TLS session resumption, Shared Workers, blob URIs, SPDY and HTTP/2, automated cross-origin redirects, window.name, auto-form fill, HSTS and HPKP supercookies, broadcast channels, OCSP, favicons, mediasource URIs and Mediastream, speculative and prefetched connections.
This preference was added in late 2017 as part of the Tor Uplift Project.
Tracking protection
privacy.trackingprotection.enabled = true
Another new update, this is Mozilla’s built-in tracking protection feature. This will use a Disconnect.me filter list, but may be redundant if you are using uBlock Origin 3rd party filters.
Disable geolocation tracking
geo.enabled = false
Setting this to false will disable geolocation tracking, which may be requested by a site you are visiting. As explained by Mozilla, this preference is enabled by default and utilizes Google Location Services to pinpoint your location. In order to do that, Firefox sends Google:
- your computer’s IP address
- information about nearby wireless access points
- a random client identifier, which is assigned by Google (expires every two weeks)
Before this data is sent to Google, you would first get a request by the site you are visiting. Therefore you do have control over this, even if geo remains enabled.
media.navigator.enabled = false
Setting this preference to false will block websites from being able to track the microphone and camera status of your device.
network.cookie.cookieBehavior
This is an integer type preference with different values. Here are the cookie preference options:
- 0 = Accept all cookies by default
- 1 = Only accept from the originating site (block third-party cookies)
- 2 = Block all cookies by default
- 3 = Block cookies from unvisited sites
- 4 = New Cookie Jar policy (prevent storage access to trackers)
Any selection between 1 and 4 would improve privacy. The New Cookie Jar policy (value 4) offers more protection, but it may also break the functionality of some websites. Ghacks has a discussion of the New Cookie Jar policy here.
network.cookie.lifetimePolicy = 2
This is another integer type preference that you should set to a value of 2. This preference determines when cookies are deleted. Here are the different options:
- 0 = Accept cookies normally
- 1 = Prompt for each cookie
- 2 = Accept for current session only
- 3 = Accept for N days
With a value of 2, websites you visit should work without any problems, and all cookies will be automatically deleted at the end of the session.
network.dns.disablePrefetch = true
Setting this preference to true will disable Firefox from “prefetching” DNS requests. While advanced domain name resolution may slightly improve page load speeds, this also comes with some risks, as described in this paper.
network.prefetch-next = false
Similar to prefetching DNS requests above, setting this preference to false will prevent pages from being prefetched by Firefox. Mozilla has deployed this feature to speed up web pages that you might visit. However, it will use up resources and poses a risk to privacy. This is another example of performance at the price of privacy.
Disable WebGL:
webgl.disabled = true
WebGL is a potential security risk, which is why it is best disabled by setting webgl.disabled to true. Another issue with WebGL is that it can be used to fingerprint your device.
You can get more information on the WebGL issue here and here.
dom.event.clipboardevents.enabled = false
This prevents websites from getting notifications if you copy, paste, or cut something from the page.
media.eme.enabled = false
This disables the playback of DRM-controlled HTML5 content. See details here.
Firefox “safe browsing” preferences
There are many recommendations to disable the Safe Browsing feature in Firefox due to privacy concerns and potential Google tracking. However, these concerns are based on an older version of the Safe Browsing feature, which would utilize “real-time lookup” of website URLs. This method has not been in use since 2011 – explained further here.
If a URL is needed, Firefox takes the following precautions to protect user privacy, as explained by François Marier, a security engineer for Mozilla:
- Query string parameters are stripped from URLs we check as part of the download protection feature.
- Cookies set by the Safe Browsing servers to protect the service from abuse are stored in a separate cookie jar so that they are not mixed with regular browsing/session cookies.
- When requesting complete hashes for a 32-bit prefix, Firefox throws in a number of extra “noise” entries to obfuscate the original URL further.
Therefore I would conclude that disabling Safe Browsing would give you no tangible privacy benefits, while also being a security risk. That being said, if you still want to disable this feature, here’s how in the about:config area:
- browser.safebrowsing.phishing.enabled = false
- browser.safebrowsing.malware.enabled = false
Firefox privacy and security add-ons
There are some great Firefox browser add-ons that will give you more privacy and security. With that being said, many of the add-ons we previously recommended are no longer necessary thanks to Firefox’s upgraded privacy and security settings.
Note: When looking for Firefox add-ons, be sure to consider what you need in relation to the preferences you modified above. Some add-ons will be redundant and not necessary depending on your Firefox preferences and the other add-ons you are using.
uBlock Origin
uBlock Origin is an efficient, light-weight blocker that filters both ads and tracking. It has risen to popularity as a powerful alternative to Adblock Plus, which allows “acceptable ads” that many users disdain. One added benefit of uBlock Origin is that it can significantly improve performance and page load speed.
Another great feature with uBlock Origin is the ability to whitelist certain websites. Given that many sites will block access if they detect an ad-blocker, the ability to whitelist will come in handy. uBlock Origin is free and entirely open source.
NoScript
NoScript is a script-blocker that allows you to identify/block scripts running on websites. While it does give you control, NoScript can be a pain to get configured properly. It breaks many websites, which requires you to tweak and configure the options. If you are already using uBlock Origin, then you probably don’t need to be using NoScript.
This is definitely not an add-on for the casual user or those who don’t have the patience to devote some time into configuration.
Using a VPN with Firefox
Firefox currently offers a VPN (virtual private network) called Mozilla VPN. However, this is just a rebranded version of Mullvad and I have seen many users complaining on various forums about the lack of support when things go wrong.
Note that while some VPNs offer browser extensions for Firefox, these are fundamentally different from a full VPN. A VPN will run on your operating system (not just your browser) and encrypt all internet traffic on your operating system. This is different from a browser extension that only wraps your browsing traffic inside an additional layer of encryption.
Additionally, some Firefox VPN extensions are actually just an extension of the desktop VPN application. These “extensions” literally just extend control of the VPN to a convenient browser interface. We discuss this and more in our guide on the best VPNs for Firefox.
Firefox DNS over HTTPS (DoH) is not a great idea
Just like with Firefox Private Network, the implementation of DNS over HTTPS also relies on Cloudflare infrastructure. In fact, it makes Cloudflare the central processing point for all DNS requests in the Firefox browser by default.
While DNS over HTTPS may sound advantageous in some respects, there are also potential concerns. Rather than going over why, you can read the article, Centralised DoH is bad for privacy, in 2019 and beyond, which concludes:
Centralised DoH is currently a privacy net negative since anyone that could see your metadata can still see your metadata when DNS is moved to a third party. Additionally, that third party then gets a complete log per device of all DNS queries, in a way that can even be tracked across IP addresses.
Even if further privacy leaks are plugged, DoH to a third party remains at best a partial solution, one that should not be relied upon as a serious security layer, since it will be hard to plug everything, especially if non-CDN content providers survive.
Encrypting DNS is good, but if this could be done without involving additional parties, that would be better.
And for actual privacy on untrusted networks, nothing beats a VPN, except possibly not using hostile networks.
Many people also assume that encrypted third-party DNS will somehow offer privacy and anonymity. This is a false assumption. Your IP address and location remains exposed with everything you do online, while your ISP will still be able to see the websites you visit (IP addresses) even if it’s no longer handling DNS requests. In conclusion, a good VPN will offer much more protection than DoH through Cloudflare.
To disable DNS over HTTPS (DoH) in Firefox go to Menu > Options > General and then scroll down to Network Settings and click the Settings button. In the box that opens, scroll down to Enable DNS over HTTPS, where it can be enabled or disabled.
user.js Firefox hardening
For more information and resources on Firefox hardening, see here: user.js Firefox hardening.
As explained on their GitHub page, this is a “configuration file that can control hundreds of Firefox settings. For a more technical breakdown and explanation, you can read more on the overview wiki page.”
Their Wiki page is also full of great information.
Firefox privacy conclusion
In my opinion, Firefox remains the best all-around, mainstream browser on the market for privacy when it is modified as recommended above.
While many of the configurations and add-ons discussed in this guide will go a long way to giving you more privacy, there is one issue that remains: concealing your IP address and location. To do this, a good VPN service is necessary. The Tor network also achieves this end, but it comes with the drawbacks of slow speeds, risks, and limitations (only works in a browser).
For more options in addition to Firefox, see the secure browser guide.
I find NoScript to be a very nice “panic button” for when the shit hits the fan – I leave it off for normal browsing, and if I should happen to end up in unknown/dangerous territory, I simply halt everything with one click.
Many thanks, Sven. Not sure how I even came across it, but I’ve wished for just such an article for a long time. Firefox is now a safer place to search from.
cheers,
Hello admin i have a question should i use privacy possum and if yes then whats the difference between privacy possum and decentraleyes extension
Hello, Privacy Possum blocks 3rd party cookies and fingerprinting which Firefox can do now. Privacy Possum doesn’t block ads or trackers and hasn’t been updated in 2 years so far.
Decentraleyes complements content blocker like Privacy Possum by serving files/libraries locally rather than from 3rd party delivery network.
Hello Sven again,
Re Jitsi Meet, which uses WebRTC, I wonder what would be the risk level, if I enabled WebRTC?
I wonder if the WebRTC leak situation has been sorted for Jitsi Meet?
Additionally, while I configured WebRTC following this guide: media.peerconnection.enabled (WebRTC) = false
I also turned media.peerconnection.dtmf.enabled to false – since I was there. Should I have left that alone??
Shall I go back and turn it back to True?
Thank you very much!
Hi Sparrow,
I am going to uninstall/reinstall Firefox and follow Sven’s guide exactly
Easiest way for me to get it all correct.
Hi Sven,
Is there in about:config, a setting that would prevent the websites from getting notifications – when I print a page? Below setting is for copy, paste or cut. But what about for printing?
dom.event.clipboardevents.enabled = false
This prevents websites from getting notifications if you copy, paste, or cut something from the page.
Sometimes, when I try to print or make a PDF of a page, the webpage tells me that I shouldn’t print, or am printing too much, or would not allow me to print at all.
Please advise which setting in about:config refers to printing?
Thank you for comprehensive guide!
Not sure on this one sparrow, but someone else may chime in.
I don’t know about config, but maybe try turning off JavaScript, script or CSS and see if printing is deterred?
Hello Restorer,
Thank you for your comment. I already have JS disabled normally with No Script. I need to look up what is CSS and what other scripts are there.
Am wondering how to prevent websites from knowing that I am printing…….?
If there are settings available for privacy re copy, paste or cut – why not also for printing, in about:config?
Anyone? Please advise.
Hi Sven and RP Community,
How To Geek has an article on recent privacy changes to Firefox.
These appear to relate to sending key strokes of searches to Mozilla and one’s chosen search engine to enhance search results. The feature is also being reported as auto applied with an opt-out option. The feature is not currently deployed in my country and is not in my browser. What are people’s thoughts?
https://www.howtogeek.com/760425/firefox-now-sends-your-address-bar-keystrokes-to-mozilla/
Regards,
BoBeX
Hi BoBeX, thanks for sharing.
Hi Sven,
I was reviewing my browser settings with your guide and have noticed that the config: network.cookie.cookieBehavior appears to be updated and includes option integer value 5. I searched the option and found “5 Reject (known) trackers and partition third-party storage.”
I do not know how reliable this information is.
I checked recent posts to see if this has been mentioned but I certainly didn’t review the entire 320 so please excuse if this has been mentioned before.
Great guide by the way. I have read it before but it is good to review. I was using two extensions I know realise were redundant.
Regards,
BoBeX
Wasn’t there a setting to block firefox from viewing the plugins/extenstions installed?
Matter : about:config on Android
Dear Sven,
Thanks for all the work you do, vast and precise, beyond my ability to grasp it all quickly. I especially appreciate your – How to Secure Your Android Device and Have More Privacy – Guide.
As for implementing the herein Firefox Privacy Guide, I was not able to access the: ( about:config ) page when (about:config) was typed in the URL bar. Little help was found on forums, except to say the Stable version of Firefox for Android does not enable (about:config), or the retreival of its page.
The version of Firefox I tried to enable it, just installed from Google Play is 92.1.1 (Build #2015832083), on Android 10.
I tried online and offline, with Computer Version option switched off, and on.
I wondered if you could provide guidance, or opinion to us on the matter.
Thanks so much! And please stay safe in this new era.
@Otarie, @Mike, @Bronco, @Sven,
I marked these individuals as well since they are also really good and up to date with these kind of things.
From what I see you have to download their Nightly Version to access it.
https://android.stackexchange.com/questions/237146/how-do-i-open-aboutconfig-in-firefox-on-android
As such I think there may, MAY, be a few things going on.
Mike pointed out that they are looking at Microsoft since the end of their contract with Google is coming up.
Second, I wonder if they are wanting to start setting the stage for a more closed version that does not allow the options as it is a money stream (maybe as this is my opinion).
If the deal with Microsoft goes through, Microsoft would want more info than FF can get with these changes possible. To keep the add revenue flowing, Microsoft asked Firefox to keep everyone from making the changes.
Just my thoughts.
is there a test page for all those leaks? 🙂
Hi.
Could you make an article with chrome://flags/ privacy and security enhancements, analog to present “Firefox About:Config settings” session, dedicated to Brave and Ungoogled Chromium browsers?
EFF will their deprecate HTTPS Everywhere extension, and it will be in maintenance mode for 2022. With so many browsers, like Firefox and Brave, having features to push websites to use https, this is not surprising.
https://www.eff.org/deeplinks/2021/09/https-actually-everywhere
The developers of the iOS privacy browser SnowHaze have released an add-on for Firefox users. It reminds me of DuckDuckGo’s extension in many ways. None the less, for those of you who would like to look at it or try it out, here is a link:
https://addons.mozilla.org/en-US/firefox/addon/snowhaze/
More extensions makes fingerprint MORE UNIQUE [sic]
Desktop firefox is wholly UNACCEPTABLE without privacy enhancing
user.js
Added to profile directory
https://github.com/arkenfox/user.js
By contrast Chrome is 100% UNACCEPTABLE always
Chrome is built from Chromium
Chrome is a fork of Chromium
The only acceptable forks of Chromium have been de-googled
https://github.com/Eloston/ungoogled-chromium
on mobile Bromite. On ios DuckDuckGo
Take Google blocking to the next level with NextDNS. Lists: OISD, No Google, No facebook, microsoft spy. Block newly registered domains.
Stop whinging about privacy while using gmail or other google services.
In the context of cloudflare dns and using firefox browser, firefox says that they collect very less info and most of it is deleted in 24 hours.
See the cloudflare policy when using firefox:
developers.cloudflare.com/1.1.1.1/privacy/firefox
Info collected as permanent log
1. Total number of requests processed by each Cloudflare co-location facility
2. Aggregate list of all domain names requested
3. Samples of domain names queried along with the times of such queries
SO AFTER ALL THIS IS THIS SAFE AND NOT MEANS WHAT IS THE SOLUTION THAN SIMPLY SENDING IT IN HTTP
Firefox lies about privacy. Look at their documentation for “Normandy”. Then review their absurdly false privacy policy.
Default firefox is orders of magnitude less self injurious than chrome.
Then what is the true privacy policy of them and what they collect
Hello,
Great help and clarity.
Thanks
Thanks a lot, this was very helpful! Great explanations 🙂
Hello!
Very good job.
Many thanks, Sven Taylor.
Hi Sven,
I have a question please?
I recently updated && upgraded my Linux machine, this included Firefox (FF) updates.
When I opened FF my default search engine had reverted to Google. Inspecting the privacy settings, many were returned to defaults.
Is there any sense in this?
Also another question please?
Is there any privacy / security issue with creating a FF account and using this same account across VM clients and hosts?
Regards,
BoBeX
I don’t think that is a problem, and you can change the default search engine.
Hi Sven,
I need a little more guidance. I don’t understand “draft” and the search engine results on “draft search engine” return nothing of use.
Regards,
BoBeX
Sorry, that was a typo with autocorrect. It should read “default search engine.”
You can check how your browser is unique on https://amiunique.org/
Someone mentioned this extension on the Secure Browser page so I thought I would bring this up here. One other add-on you might want to consider placing on your Firefox browser is ClearURLs. The extension is open source and automatically removes tracking elements from URLs that could compromise your privacy while you’re browsing. The below article gives an overview about the add-on and ClearURLs is also available for Google Chrome.
https://www.ghacks.net/2019/07/30/clearurls-extension-firefox-chrome/
Checked Firefox ‘Preferences’ to see if anything was changed ‘by itself’, found fpn.firefox.com listed in the exceptions for “Warn you when websites try to install add-ons”, which means I would not have been warned if, somehow, this Firefox Private Network got installed. I don’t see how it could get installed without me doing it, but since I don’t want to use it at all and did not create this exception, I do not understand how it ‘appeared’ in the exception box as allowed again! I don’t live in the US and I don’t have a FF account, don’t want to use FPN. Since links relating to FPN have ‘showed up’ in the exceptions several times by now, I wonder whether this is a reason to not trust FF as a browser. I would really appreciate some feedback from restoreprivacy, whether this is completely normal, questionable or something to worry about with FF. Thanks! (left same comment also on your FPN review)
I just learned that after resistFingerprinting = true Firefox will report the UTC timezone.
At first sight it does not look a big issue, but for example using Tutanota calendar in the browser will store every event in a wrong time.
privacy.resistFingerprinting = true breaks the Surfshark browser extension
yeah, it does. @Sven, how about mentioning this, since you promote Surfshark (which I’m grateful for)?
privacy.firstparty.isolate = true broke Discus for me. Couldn’t log on.
In my modified version of Firefox, it seems somewhere my settings are broken or not compatible with Express VPN’s WebRTC Leak check. I get an error message saying the leak test is incomplete.
I have come to understand that the extension DecentralEyes is reportedly not updated very often and, if so, there is an alternative. LocalCDN is a fork of DecentralEyes and supposedly updated more often and has more features.
The maker of LocalCDN replied to some comments on a Reddit thread a short time ago addressing a comparison between the two extensions and issues raised by chat participants about DecentralEyes too.
https://www.reddit.com/r/privacytoolsIO/comments/j6lv30/should_i_use_localcdn_instead_of_decentraleyes/
A few days ago, the Electronic Frontier Foundation is going to adopt DuckDuckGo’s Smarter Encryption for its HTTPS Everywhere extension. This is very interesting since Mozilla equips HTTPS protection in Firefox that users can select to use.
https://www.eff.org/deeplinks/2021/04/https-everywhere-now-uses-duckduckgos-smarter-encryption
Hey Sven,
Thanks for the guide! I almost never go into the about:config so thank you for explaining what each setting is. I have “fixed” FireFox now!
Some thing you might be interested in checking out from what I’ve use:
Addons:
Firefox Multi-Account Containers (containerizes your cookies if you have to use service like FaceBook and Google)
OneTab (Similar to using Favorites or Pinning tabs but makes saving many tabs a snap with a click of a button, it’s closing the website which is really helpful to minimize connections you aren’t actively using)
about:config
plugin.scan.plid.all = false (removes websites ability to scan for user’s plugins)
I came across your website recently and immediately liked what I read.
I tried implementing your some of your suggestions (above), but should have proceeded with much more caution [As in, “Modifying some of these settings may interfere with your browsing experience and break some websites (they won’t load properly). Therefore taking an incremental approach may be the best way to proceed.”] Firefox did not take well to my changes (whatever they were).
Is there a way to reset Firefox to the settings I had before? (BTW: My computer runs Linux.)
You could try a complete reinstall.
Just be sure to purge the old files.
https://www.fosslinux.com/13881/how-to-clean-uninstall-and-reinstall-firefox-in-ubuntu.htm
Scroll down to the 2nd point and follow the code.
There may also be a reset button in the menu or settings to revert everything back.
Sorry I can’t be more precise.
just go to home folder, unhide hidden folders find .config and there is mozzila folder, delete the default-release profile
Hey Sven! I just wanted to say thank you for this invaluable guide. As a user who knows next nothing about programming but who is aware and attentive to online privacy, this guide has been a gawdsend.
Happy to help!
Kodachi Linux have a lot of this browser add ons pre installed. The distro offers lots of browsers with various level of add ons, and one browser they call ghack. Can I trust Eagle Eye? They offer free VPN, but I use my own VPN, but hesitate to use this linux for shopping or banking.
[https://www.digi77.com/linux-kodachi/]