AKB3000003: Firefox – additional security, telemetry and privacy tweaks
By @Microfix
Published 15 Feb 2017 rev 1.1
These tweaks are for both Windows and Linux firefox browsers:
Edit by NightOwl:
Forgot the 1st rule in computing..backup, backup before making changes.
Thanks PKCano, Can you put your backup comment at the start of the tweak tutorial?
The Firefox profile is in C:\Users\”UserID”\AppData\Roaming\Mozilla\Firefox\Profiles\”an arbitrary numeric string”\ – it contains bookmarks, settings, add-ons, extensions, features, etc.
You need to backup your FireFox pre-changes Profile before making changes, in case something unexpected goes wrong when making changes, so you can restore your pre-changes Profile if something has gone wrong!
Open up firefox and in the address bar type: about:config
A popup will appear ‘Here be Dragons’ accept the risks and proceed.
Then in the filter search either copy and paste the string or edit value.
To change string values, double click the string to change.
Security: Additional browser security
For the LOGJAM vulnerability follow the steps below:
1) Type: security.ssl3.dhe_rsa_aes_128_sha set to FALSE
2) Type security.ssl3.dhe_rsa_aes_256_sha set to FALSE
Disable SSL 3.0 to be immune from the POODLE attack:
1) Type: security.tls.version.min set to 1 to enforce TLS.
2) Type: security.tls.version.max set to 3, which enables TLS 1.1 and 1.2 (default in FF v50+)
Telemetry blocking:
1) Type: toolkit.telemetry.unified set to FALSE
2) Type: toolkit.telemetry.archive.enabled set to FALSE
3) Type: toolkit.telemetry.enabled set to FALSE
4) Type: datareporting.policy.dataSubmissionEnabled set to FALSE
5) Type: datareporting.policy.dataSubmissionEnabled.v2 set to FALSE (Pre v50 firefox)
6) Type: datareporting.healthreport.uploadEnabled set to FALSE
Additional Privacy Tweaks:
1) Type: browser.privatebrowsing.autostart set to TRUE (if you prefer private browsing all the time)
2) Type: dom.event.clipboardevents.enabled set to FALSE (hides Copy & Paste from Website tracking)
3) Type: dom.storage.enabled set to FALSE (prevent DOM Storage tracking by websites) Refer to #95310 for caution
4) Type: geo.enabled set to FALSE (geolocation prevention via websites, explicit or not)
5) Type: geo.wifi.uri set to 127.0.0.1 (Loopback related to geolocation and not to google host)
6) Type: privacy.trackingprotection.enabled set to TRUE (enables a blocklist via disconnect on cross site tracking)
Disclaimer: I am not reponsible for borking your firefox, try these at your own risk.
I can assure you that they all work on our live and VM systems.