📜 ⬆️ ⬇️

Big Data resistance 1 or elusive Joe. Internet anonymity, anti-detection, anti-tracking for anti-you and anti-us

Good time reading, dear readers of Habr.

Read recently a number of articles, including on Habré, on digital prints of browsers and shadowing users on the Internet. For example, the article Anonymous Browser Identification and Internet Trap magazine Forbes magazine, the “Technology” section - “Big Data”.

Or maybe I don't want to be considered! Only, I'm afraid, the irony is that this is also an imprint, and, moreover, apparently, the main reason for the appearance of prints. IMHO, only one way. With regard to FireFox, if all the foxes in unison, and each individually, begin to yelp, that they are ordinary standard foxes, and not a torus, not chrome and not makos.
')
But, out of academic interest, in order to preserve the individuality of foxes and in response to the next intrigues of wild capitalism, I want to offer the following cunning plan to the court of esteemed Habrasoobschestva.

I want to make a reservation right away - I am not a specialist in the field of network security or anonymity, I did not belong to anonymous groups, I was not found out to be anonymous, I swear I don’t see the darknet age.

Target operating systems and browsers


Windows 10 x64 and Firefox 62.0.3.

NOT what it is about


The fact that Winda sends telemetry and everything related to the configuration of Winda itself, as well as questions about antiviruses and firewalls, does not fit the article. Like going to the Internet at night, from under the table and from the refrigerator, via Thor browser, which is via VirtualBox with Tails, which is via Quad VPN and also Whonix (above).

I suggest, for the purity of the experiment, create a new profile FireFox
I think the simplest is:



In order to see how the proposed upgrade affects fox performance
I propose to install this: Page Speed ​​Monitor



(this is the page load time). If you click on it, then there is detailed information.



On the following points. There, in two cases, it is proposed to clear the history and cookies of the profile. Be careful if you are logged in to Habré!

1. Saw the banal technology of surveillance. Redirect
ProofProof

Yandex, however, wrote that it was the other way round, for encryption and anonymity , like it was really proof , but not to stumble about every garbage at every step:


In the Clean Links settings
- IMHO it is better to remove the checkbox "highlight the cleaned links" and you can, temporarily, put "show messages" in order to observe the effect.
- You can enable the option “make clickable links clickable”
- Replace the string "Skip Links ..." with
\/ServiceLogin|imgres\?|searchbyimage\?|watch%3Fv|auth\?client_id|signup|bing\.com\/widget|oauth|openid\.ns|\.mcstatic\.com|sVidLoc|[Ll]ogout|submit\?url=|magnet:|(?:google|yandex)\.(?:com|ru)\/\w*captcha\w*[\/?]|(?:google|yandex)\.(?:com|ru)\/.+\.(?:google|yandex) 

- Add to exceptions - a comma, then google.com, google.com, yandex.ru, ru.wikipedia.org, en.wikipedia.org, passport.yandex.ru

It must be remembered that it may still not work on some sites, then there will not be a redirect to where it should be, but it is still part of good protection, t.ch. from phishing, ana problem sites can be turned off or add to the white list

2. Cut out the traditional technology of surveillance. Cookies
2.1. You must install the add-on First Party Isolation .

A button will appear . Do not press it before moving to the test site. Before you return here, it should be returned to its original state.

True, the author here broke the same system. When pressed, it is pale (on), but not pressed (off).

2.2. Go to the website Cookie Tester .

Set Cookie.



“Press” the set button. And click on the website on "Refresh"



Here you can read Improving privacy in Firefox .

A'lya sandbox. When the button is pressed, the insulation is turned on, and when it is pressed, it is turned off (and by default it for some reason is indeed turned off).

Two states "isolated" and "not isolated." At the same time, “not isolated” - for all sites one, and “isolated” - for each site is individual and one site does not have access to another.

The same is true for one site - if you now press the button here, Habr will not see the cookie. But calculate the second entry. Therefore, dismiss without severance pay.

But, on the other hand, cookies will not be transmitted to different sites anymore, when the button is on, the sites will no longer see cookies, so it will be difficult for them to be watched. Although Evercookies and other nanotechnologies do not work, I found out.

Suggestion for use:
Leave the button on. As far as I read, there may be a case when there are problems with authorization (sometimes the site sends one to another, but its own, that is, “legally”). Then it will be necessary to disable it on this site (if you log in, turn it on, you will be logged out). But I have not yet met such sites.

3. Cut out the innovative technology of surveillance. Evercookies
3.1. Need to install the Multi-Account Containers add -on.

3.2. Run into trouble (no fox will suffer)

Good description Evercookie on Habré .

Cookies are cross-domain, but some of them will not help anymore - the previous item will not give. And with HTML5 canvas, etc. A fox cannot do anything (or rather, maybe, but in a highly sophisticated way and it would be better not to - see below). By the way, CCleaner demolishes them cleaned, but along with the history, cookies and other useful things.

Site with Evercookie , You must first click the top button, then the bottom button.



Grabbed off:

On the panel FireFox need to click: . Skip any welcome messages (“Next” button) and wait



Then, on the ruins of the taboo chapel tabs choose:



The container is generally any, they are the same, the names are different.

Ever-ik Fail:

You can read in detail here.

Suggestion for use:
All social networks, payments, etc., as an option, isolate from everything else by assigning them to the default container. It is only inconvenient that all links clicked inside the container opens in the same container.

By the way, one more profit from this technology, although it is so obvious, but still.
If everything is distributed among the containers in the mail (if FireFox is the default browser or the web form of the mail is open) and in the internet, it will be possible to check if you got there, where you wanted, if something important:

There is another technology, on top of these temporary-containers , which is oriented on tabs, and not on domains (although you can add a dependency, you can isolate a domain in one container, you can even subdomains).

And at closing can rub the whole story. And now would remove Evercookie from the canvas — they are there, or without (I checked, sir). But IMHO - still damp. FierFox tabs jump, sometimes close, etc. etc. And it slows down.

Evercookie, on the site, it's better to delete



until the next call.

4. To clean the previously cut
The previously mentioned add-on "Cookie-AutoDelete" did not justify itself.
Cause
Cookies-AutoDelete turned out to be, albeit completely implicitly, but incompatible with the technology of the first part isolation level
As everyone understands - isolation is achieved by isolation (this is not you), including and cookies, in connection with which FireFox puts appropriate "marks" in the database of cookies.sqlite. And Cookies-AutoDelete interrupts it with its “CookiesAutoDelete” label (checked with SQLiteStudio )

I can offer Cookiebro to replace Cookies-AutoDelete
- It is compatible
- Although in English, but easily configured
Cookies editor available
There are security settings for the treasured favorite cookies.

Selected - implies proof about compatibility
Secure - transmit only via https
Http Only - transmit only via http. This is not in the sense of https! see above. It is in the sense - not to give Java and other potentially dangerous junk access, but to transfer only in the old manner, in the http header
Host Only - do not give access to subdomains to the delicacy (in the example, only yandex.ru would have access, but Yandex.Music, etc. - no)

The disadvantage is that the favorite cookie is preserved, you need to add the site to the white list, and the cookies for the site can be over 9000. Probably it somehow costs too, but I was not looking.
Another minus - wherever you are registered, you must add to the white list (at the beginning with Habr, you unlock the cookie every 5 minutes, because the cookie was deleted with this frequency until this whistle bored).

Reliably cuts out the E-tag along with the updated from paragraph 5 (with the inclusion of the “Limit tab history” option added in paragraph 5)

Suggestion for use:
To adjust all the previous ones and this item and it seems, you can score on cookies and stuff, the whole structure should be deleted by itself. And train each counter site is not necessary. Plus, pump the CCleaner according to the instructions in the article about the “forseniki” and configure it to delete everything else and compress the base.

5. To cut ETag and other under-leveled nanotechnologies
Addon Chameleon . WebExtension from Random Agent Spoofe.

Text changed due to update of proposed addon

Would suggest the following settings:

Options tab
- Set Enable script injection - otherwise half of the functionality will not work.
- Set protect window.name - BUT! Enabled option breaks the “I'm not a robot” captcha, or do not turn it on or remember it and turn it off in such cases
- Enable tracking protection - probably not necessary, better then put uBlock and hide it (see. Below). Otherwise, the "edblokupertye" sites will start to snap.
- Disable WebSockets - IMHO is not necessary, then half of the services does not work.
- Set Limit tab history - Limits access to history for sites (presumably up to 2 visits)
- Spoof Client Rects - you can not expose, the following addition is also able to
- Screen size spoofing - I suggest to choose “Custom” and set the resolution manually (see below “average fox temperature”)
- Enable 1st party isolation is the same as the one set in item 1. button.
- Resist fingerprinting , IMHO - not worth it (prints, see below). FireFox, instead of pretending to be a rag, begins for some reason to pretend to be a Tor browser.



And Tor, as you know, few places like + will stop working half of the other add-on functionality + the window at the start of the browser ceases to unfold in full screen, for someone koit, not otherwise.

Headers tab
- Set the Disable Authorization - The browser allows you to send hidden authentication data to third-party sites, the inclusion of this option stops this disgrace. But it may be difficult to authorize on some sites.
- Enable DNT (Do Not Track) - Enable message sending (do not track). Sites, of course, or ignore or pretend not. IMHO - set (according to various data - it is recommended, it is not, depending on the number of browsers that have been tested and a set of statistics on this parameter, because the choice is set or not - from the point of view of “not standing out”, but not functional)
- Set Spoof If-None-Match - Write random number in ETags
- Spoof X-Forwarded-For - If you set, for example, the IP of the Netherlands, it will add it to the HTTP header and the site will decide that this is the IP of the computer, based on what the poorly configured proxies add to the header. Those. it seems like the IP of the computer is an IP proxy, and the IP in the header is the other way around and the IP from the header is placed in the site log. But here, in my opinion, it’s better not to, the provider over IP will be banned, like a left proxy. Another question is that when using a proxy, it may be relevant so that if it is fig, the real IP does not pass in the header.
- Disable Referer - IMHO not needed. Turns off the referenes, you can not, for example, return when turning pages on the site to the previous page
- Set Spoof Source Referer (encloses it when going to the site - referring to it)
- Set Upgrade Insecure Requests - automatically request a website via https if it works in both modes (http and https)
- Referer X Origin Policy - transfer the base domain to the referee. “Match base domain” is recommended (but not sure that it will not break anything, if for some reason within the domain it is important which subdomain you have changed from). Example: for example.com, news.example.com, blog.example.com - example.com will be referred to.
- Rferer Trimming Policy - trim the transmitted referrer. “Scheme, host, port, path” is recommended. Example: for example.com link: 8080 / page? Privacy = false & trackingid = XYZ, will be transmitted - example.com : 8080 / page
- Set Spoof Accept-Encoding - will replace HTTP_ACCEPT_ENCODING with gzip, deflate. It seems to be no problem
- Spoof Accept-Language - language, “eu-US” is recommended, but sites may attempt to issue content in this language.

I suggest choosing the average temperature for the fox as follows: switch user agents within the versions of the original OS and within the versions of FireFox (why - see the next article). I think a couple of versions of the Fox 61 and 62 and Windows 7 with Windows 10 will fit, the screen size is 1366x768 or “any” , more specifically, you can specify more here StatCounter .

It should be borne in mind that changing the user agent with the investment tool - any add-ons, such as “GoogleTranslate” are rented by the real user agent, since packets past the chameleon slips.

Masking costs
- If you pretend to be a mobile phone - I think everyone knows the consequences
- Pretending to be Google Chrome is fraught, Google will take over its (and even redirects will stop laying), but it will begin to quietly feed a disguised fox with something inedible for it with which it will start to lag, and on YouTube you know what happens to disappear besides the video that was opened
- The customer-oriented M $ will persistently push the installation packages for the OS that is exhibited in the user agent, even if it is KolibriOS
- Attempts to replace fonts are a sure way to stay without Google Doc
- Attempts to cast an IP address through the headers permanently lead to an awkward situation: they do not allow Google, content from Yandex, with traditional Russian hospitality, they cut it out, and Dak Dac-Go and StartPage are not interesting, you can get there without such tricks

6. Dopill the remaining spherical Schrödinger cats in Faraday cages
Install CanvasBlocker . Return to the site with EverCookie, again create problems for yourself, but while they are created will be:



And now it is possible (attention, authorization on Habré!) To clear the history of FireFox in the usual way (that is, as it does in this scheme Cookie-AutoDelete). Return to that site and click restore cookies.



It hung on his request for the canvas noodles, but racially correct and with little difference from what he expected.

Difference:



Replaces canvas, audio, history, window, domRect. Just change it for each request - IMHO, that in the middle of the street, start changing clothes (there is a frequency in the settings).

You can test it on the BrowserLeaks website and on the Additional website.

There is another addition, such as NoScript - ScriptSafe . It also adds random noise to the fingerprint of Claudia. But with a 10-finger print, no ice.

7. Privatize the Fox and wean her alien homeland to love
IMHO, the main problem of fox privacy is in bugs, more precisely in their use, and in geolocation. And it’s not even about FireFox and Google, but about the geotagging itself . Especially when using VPN - file, on IP you are Leo Tolstoy, and on MAC - Muscovite is simple. The rest is really so, throwing with a pitchfork on the GCLI screenshots is somehow not constructive.

The reason for the trouble with geolocation: this one here and the like. Therefore, I would suggest geolocation in FireFox not to disconnect, but use secure connections , something to mock with the MAC address , all the more, it can already be built in, despite all the research of the British military scientists , since a) find protection from this circumvention ( it already exists too, but you need to google and study) and not to MAC's surprise - I think everything is clear b) not everyone uses every wunderwalf and other neural networks, but they connect to MAC. And disabling access to geolocation in FireFox, except that it disorients the fox and saw out the search in Google Map, but the problem of vykhhnivaniya at every corner of shorts with a hood at half price
IMHO - will not solve
Turning off geolocation will help prevent, perhaps, such an option (exaggerated for clarity): we visited the tourist bureau while we waited to visit the site, the geolocation turned on quietly, the location and login data were fixed, the next time the site was entered, the banner vacation? Let's go to the boas! ”- as a result, under suspicion of the KGB and personally Comrade Stalin.

By the way, the main reason for such browsers and epochal hedgehogs battle with snakes is not because of the nontrivial intrigues of enemy intelligence, but because of innovation curves like the HTML5 ping attribute , which is potentially able to pass the user to all advertisers and special services of the world, if they are entered there through space, and zapilivaniya anywhere navigator functionality. Hence, this whole bother with unexpected access of sites to batteries, sensors, languages, user agents and other livers, and that is typical of such osmium-187, it manages to work without any connection with geolocation and even where the adapter is wi-fi By definition, there is no and can not be, suddenly punching the user by IP and returning data through Geolocation, which blows the brain to novice programmers.


Privatization option for users
Please pay attention to the comment ainu . Separate file regarding the safe privatization of the fox - without fail, lay out , go for a week . And at the moment you can:
1. Go to the profile folder (there, instead of x - numbers \ letters), something like this: C: \ Users \ User \ AppData \ Roaming \ Mozilla \ Firefox \ Profiles \ xxxxx.defalut
2. See if there is a user.js file
3. If there is - you need to open it, if not - create it.
4. From the code below - move the blocks there:
  • potential security holes;
  • potential leakage;
  • potential prints;
  • perhaps - an extra load (I do not think that the functionality of sending statistics Mozill is relevant for you);


5. Save the file, restart the fox.

6. This file - user.js can be saved and used after reinstalling FireFox.
But there are two ambushes:
Number of times. It must be remembered that it takes precedence over the settings, that is, if there is a value = true for something, it will be impossible to prove to FireFox that it = false through about: config. It will be necessary to edit the file.
Number two . Deleting a file will not lead to the expected deprivatization of the fox, but to predictable attempts to recall what has been changed there and to reflect on how to live with it now. Therefore, in the file I wrote the “default settings”. In order to “roll back” these changes, in which case, it will be necessary in this file to change the settings to those specified by default.
But the point is this : at every launch, FireFox, having smelled this file, reads it and changes its tinctures. They remain so changed, even if there is no file, but then malicious attempts to change these settings in the fox itself will not be rolled, it will again read them from the file when it is loaded.

6. If the Internet comes up, you will need to open the file with a new one, find the record and change true to false:
 user_pref("network.dns.disableIPv6", <b>false</b>); 

(which is, in fact, very unlikely, especially if you do not know what it is. this protocol is promising, but not common)

7. In the same place, open the SiteSecurityServiceState file, delete the contents, close and save. Set the attribute "read only". For fidelity, it would be good to delete the user’s rights to it, but this is, in principle, superfluous.

Disclaimer
I apologize to the respected educated Habrasoobschestva, in the process of research, I read a lot of forums, there is a suspicion that the case may smell kerosene.

After such an “optimization”, if you do not remove the unnecessary, for example, the reproduction of DRM (on U-tuba and Netflix), the Fox will become extremely private, but nobody needs it. For 127.0.0.1, you will not expel it with a stick then, and if you expel it, then it will have its paw twisted or the tail will fall off, especially if you have dns configured on ipv6. And if this is done on the mobile (there the sensors are turned off, it is not anonymously, but for the desktop PC) it will become, in addition, also unfocused. Please check everything carefully and if you test, it is best on the test profile.

user.js
 /*   FIREFOX QUANTUM 62.0.3 (64-) */ //------------------------------------------------------------------------------------------------------------------------- /*     */ //------------------------------------------------------------------------------------------------------------------------- /*      ,        .  :     ,  http://127.0.0.1:631,      CUPS   :  : localhost, 127.0.0.1 */ user_pref("network.proxy.no_proxies_on", ""); /*      Firefox OS    Wi-Fi  :  : true */ user_pref("devtools.remote.wifi.scan", false); /*  ,    (  -        about:support)  :  : resource://app/defaults/permissions */ user_pref("permissions.manager.defaultsUrl", ""); /* HTML5.        (HTML5   ping,  <a ping="http://ping.site" href="http://site.com")      URI,   ,     .  :  : false */ user_pref("browser.send_pings.require_same_host", false); user_pref("browser.send_pings", false); /*   IPv6   DNS.  :   DNS    IPv6  : true */ user_pref("network.dns.disableIPv6", true); /*    ,    SSL-.  :         : true */ user_pref("browser.cache.disk_cache_ssl", false); /* Offline App Cache.        . : ( ). ,      https://web.telegram.org/ -     ,   .  ?  :  : true */ user_pref("browser.offline-apps.notify", true); user_pref("offline-apps.allow_by_default", false); /*       " ":  :          : true */ user_pref("browser.download.manager.addToRecentDocs", false); /* Firefox Hello (Telefonica).     . (Firefox    ) */ user_pref("loop.enabled", false); //------------------------------------------------------------------------------------------------------------------------- /*   */ //------------------------------------------------------------------------------------------------------------------------- /* WebRTC   (    , -  ..).  IP-,  .. ,      (  VPN)  : ,   ,      : true */ user_pref("media.peerconnection.enabled", false); //   , -  peerconnection   FireFox,      .     user_pref("media.peerconnection.identity.enabled", false); /* WebRTC WG.   -       Media Capture Task Force  : */ user_pref("media.getusermedia.browser.enabled", false); // : false user_pref("media.getusermedia.screensharing.enabled", false); // : true /*  DNS-  SOCKS-,     (    ).  DNS :    (!)   ; ,   ""  true -    DNS   ; false -   DNS  localhost ( ,   DNS  -).     ,    DNS-,       , ..      :  : false */ user_pref("network.proxy.socks_remote_dns", true); /*   DNS       DNS      VPN  :  .  : false */ user_pref("network.dns.disablePrefetch", true); /*         .     -     -.  :  .   ( .. : Ghostery, app.telemetry Page Speed Monitor)  : true */ user_pref("dom.enable_performance", false); //        user_pref("dom.enable_performance_observer", false); //         user_pref("dom.enable_performance_navigation_timing", false); //Resource Timing API (    ) /*       (    : LAN, Wifi, 3G   )  :  : true */ user_pref("dom.netinfo.enabled", false); /*   ( ).     +     :  .   ,   100500 ,  1-2,   .   -  .  */ //DNS lookups, TCP handshakes  TLS handshakes user_pref("network.predictor.enabled", false); // : true user_pref("network.predictor.enable-hover-on-ssl", false); // : false //  ,         user_pref("network.prefetch-next", false); // : true //        user_pref("network.http.speculative-parallel-limit", 0); // : 6 //------------------------------------------------------------------------------------------------------------------------- /*   */ //------------------------------------------------------------------------------------------------------------------------- /* HTML5.       HTML5-,      :  : true */ user_pref("media.video_stats.enabled", false); /* WebGL.  3D-  JavaScript.   .        WebGL.  3D-  JavaScript  : */ user_pref("webgl.disable-extensions", false);//  : false user_pref("webgl.min_capability_mode", true);//  : false user_pref("webgl.enable-debug-renderer-info", false);//  : true /* WebGL OffscreenCanvas     WebGL   ,   API OffscreenCanvas  ServiceWorkers (     ).    ServiceWorkers (. )  :  : false */ user_pref("gfx.offscreencanvas.enabled", false); /* GamePad  ,            .  .  :  GamePad  : true */ user_pref("dom.gamepad.enabled", false); //------------------------------------------------------------------------------------------------------------------------- /*  -   */ //------------------------------------------------------------------------------------------------------------------------- /*    .    ,      :  : true */ user_pref("browser.slowStartup.notificationDisabled", false); /*         :  : true */ user_pref("beacon.enabled", false); /*   ,   Mozilla  :         : "            "      detectportal.firefox.com.  : */ user_pref("network.captive-portal-service.enabled", false); // : true user_pref("network.captive-portal-service.minInterval", 0); // : 60000 user_pref("captivedetect.maxRetryCount", 0); // : 5 /*        :  : true */ user_pref("datareporting.healthreport.service.enable", false); user_pref("datareporting.healthreport.uploadEnabled", false); user_pref("datareporting.policy.dataSubmissionEnabled", false); user_pref("security.ssl.errorReporting.enabled", false); user_pref("security.ssl.errorReporting.automatic", false); user_pref("security.ssl.errorReporting.url", ""); // : https://incoming.telemetry.mozilla.org/submit/sslreports/ user_pref("datareporting.healthreport.infoURL", ""); // : https://www.mozilla.org/legal/privacy/firefox.html#health-report user_pref("datareporting.policy.firstRunURL", ""); // : https://www.mozilla.org/privacy/firefox/ user_pref("breakpad.reportURL", ""); // : https://crash-stats.mozilla.com/report/index/ /*       :  : true */ user_pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false); user_pref("dom.ipc.plugins.reportCrashURL", false); /*    .  :  : true */ user_pref("toolkit.telemetry.enabled", false); user_pref("toolkit.telemetry.archive.enable", false); user_pref("toolkit.telemetry.unified", false); user_pref("toolkit.telemetry.bhrPing.enabled", false); user_pref("toolkit.telemetry.bhrPing.enabled", false); user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); user_pref("toolkit.telemetry.newProfilePing.enabled", false); user_pref("toolkit.telemetry.reportingpolicy.firstRun", false); user_pref("toolkit.telemetry.shutdownPingSender.enabled", false); user_pref("toolkit.telemetry.shutdownPingSender.enabledFirstSession", false); user_pref("toolkit.telemetry.updatePing.enabled", false); user_pref("toolkit.telemetry.debugSlowSql", false); user_pref("toolkit.telemetry.hybridContent.enabled", false); user_pref("browser.newtabpage.activity-stream.telemetry", false); user_pref("browser.newtabpage.activity-stream.telemetry.ut.events", false); user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false); user_pref("security.ssl.errorReporting.enabled", false); user_pref("browser.ping-centre.telemetry", false); user_pref("devtools.onboarding.telemetry.logged", false); user_pref("toolkit.telemetry.server", ""); // : https://incoming.telemetry.mozilla.org user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", ""); //// :https://tiles.services.mozilla.com/v4/links/activity-stream user_pref("toolkit.telemetry.cachedClientID", ""); /*    :  : true */ user_pref("network.allow-experiments", false); /*         .  : Firefox,      ,     "Get Add-ons"      -     : true */ user_pref("extensions.getAddons.cache.enabled", false); /*          :  : true */ user_pref("browser.cache.offline.enable", false); //------------------------------------------------------------------------------------------------------------------------- /*  -   */ //------------------------------------------------------------------------------------------------------------------------- /* WebGL.  3D-  JavaScript.   ,      : https://habr.com/post/190388/ */ user_pref("webgl.disabled", true); // : false /* Snippets.    ,    Snippets ("").   Firefox,    (about:home),          . */ user_pref("browser.aboutHomeSnippets.updateUrl", ""); // : https://snippets.cdn.mozilla.net/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%/ user_pref("browser.newtabpage.activity-stream.disableSnippets", true); // : false user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // : false /* WebRTC   (    , -  ..). */ user_pref("media.peerconnection.enabled", false); // : false user_pref("media.peerconnection.ice.default_address_only", false); // : false user_pref("media.peerconnection.ice.tcp", false); // : false user_pref("media.peerconnection.identity.enabled", false); // : false user_pref("media.peerconnection.rtpsourcesapi.enabled", false); // : false user_pref("media.peerconnection.simulcast", false); // : false user_pref("media.peerconnection.video.enabled", false); // : false user_pref("media.peerconnection.video.vp9_enabled", false); // : false user_pref("media.peerconnection.use_document_iceservers", false); // : false /* SSDP. .          -   */ user_pref("browser.casting.enabled", false); /* WebSpeech.     */ user_pref("media.webspeech.synth.enabled", false); user_pref("media.webspeech.test.fake_recognition_service", false); user_pref("media.webspeech.test.fake_fsm_events", false); user_pref("media.webspeech.test.enable", false); user_pref("media.webspeech.synth.force_global_queue", false); user_pref("media.webspeech.recognition.force_enable", false); user_pref("media.webspeech.recognition.enable", false); /* GCLI.     Imgur.com */ user_pref("devtools.gcli.underscoreSrc", ""); user_pref("devtools.gcli.lodashSrc", ""); user_pref("devtools.gcli.jquerySrc", ""); user_pref("devtools.gcli.imgurUploadURL", ""); user_pref("devtools.gcli.imgurClientID", ""); /* WebVR.     */ user_pref("dom.vr.require-gesture", false); user_pref("dom.vr.poseprediction.enabled", false); user_pref("dom.vr.openvr.enabled", false); user_pref("dom.vr.oculus.invisible.enabled", false); user_pref("dom.vr.oculus.enabled", false); user_pref("dom.vr.enabled", false); user_pref("dom.vr.test.enabled", false); user_pref("dom.vr.puppet.enabled", false); user_pref("dom.vr.osvr.enabled", false); user_pref("dom.vr.external.enabled", false); user_pref("dom.vr.autoactivate.enabled", false); user_pref("dom.vr.autoactivate.enabled", false); /* WebCompat     https://webcompat.com        ,      : https://addons.mozilla.org/ru/firefox/addon/webcompatcom-reporter/ */ user_pref("media.decoder-doctor.new-issue-endpoint", ""); // : https://webcompat.com/issues/new user_pref("extensions.webcompat-reporter.newIssueEndpoint", ""); // : https://webcompat.com/issues/new user_pref("media.decoder-doctor.wmf-disabled-is-failure", true); // : false user_pref("media.decoder-doctor.verbose", false); // : false //------------------------------------------------------------------------------------------------------------------------- /*  -   */ //------------------------------------------------------------------------------------------------------------------------- /*   Google  (GeoIP     )  :  .     ,              .      US,  RU */ user_pref("geo.enabled", false); // : true user_pref("geo.wifi.uri", ""); // : https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_API_KEY% user_pref("browser.geolocation.warning.infoUR", ""); // : https://www.mozilla.org/%LOCALE%/firefox/geolocation/ //GeoIP user_pref("browser.search.geoSpecificDefaults", false); // : true user_pref("browser.search.geoip.url", ""); // : https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY% user_pref("browser.search.countryCode", "US"); // : RU user_pref("browser.search.region", "US"); // : RU /* ,           " "  : " "    */ user_pref("extensions.getAddons.compatOverides.url", ""); // :https://services.addons.mozilla.org/api/v3/addons/compat-override/?guid=%IDS%&lang=%LOCALE% user_pref("extensions.getAddons.compatOverides.url", ""); // :https://services.addons.mozilla.org/api/v3/addons/search/?guid=%IDS%&lang=%LOCALE% user_pref("extensions.getAddons.compatOverides.url", ""); // :https://addons.mozilla.org/%LOCALE%/firefox/ user_pref("extensions.getAddons.compatOverides.url", ""); // :https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION% user_pref("extensions.getAddons.compatOverides.url", ""); // : https://addons.mozilla.org/%LOCALE%/firefox/themes/?src=firefox user_pref("extensions.webservice.discoverURL", ""); // : https://discovery.addons.mozilla.org/%LOCALE%/firefox/discovery/pane/%VERSION%/%OS%/%COMPATIBILITY_MODE% /* Pocket.              : */ user_pref("extensions.pocket.enabled", false); user_pref("extensions.pocket.site", ""); // : getpocket.com user_pref("extensions.pocket.api", ""); // : api.getpocket.com user_pref("extensions.pocket.oAuthConsumerKey", ""); /*  DRM (" () ", EME).  :  -  Netflix */ user_pref("media.eme.enabled", false); user_pref("media.gmp-eme-adobe.enabled", false); /*  FireFox */ user_pref("identity.fxaccounts.enabled", false); // : true user_pref("identity.fxaccounts.remote.profile.uri", ""); // : https://profile.accounts.firefox.com/v1 user_pref("identity.fxaccounts.remote.oauth.uri", ""); // : https://oauth.accounts.firefox.com/v1 user_pref("identity.fxaccounts.auth.uri", ""); // : https://api.accounts.firefox.com/v1 user_pref("identity.fxaccounts.remote.root", ""); // : https://accounts.firefox.com/ user_pref("browser.newtabpage.activity-stream.fxaccounts.endpoint", ""); // : https://accounts.firefox.com/ user_pref("identity.sync.tokenserver.uri", ""); // : https://token.services.mozilla.com/1.0/sync/1.5 /*  */ user_pref("services.sync.engine.addons", false); // : true user_pref("services.sync.engine.bookmarks", false); // : true user_pref("services.sync.engine.history", false); user_pref("services.sync.engine.passwords", false); user_pref("services.sync.engine.prefs", false); user_pref("services.sync.engine.tabs", false); user_pref("services.sync.engine.bookmarks.buffer", false); // : false user_pref("services.sync.engine.creditcards", false); // : false user_pref("services.sync.engine.creditcards.available", false); // : false user_pref("services.sync.engine.addresses", false); // : false user_pref("services.sync.engine.addresses.available", false); // : false user_pref("services.sync.fxa.privacyURL", ""); // : services.sync.fxa.privacyURL user_pref("services.sync.fxa.termsURL", ""); // : https://accounts.firefox.com/legal/terms user_pref("services.sync.declinedEngines", ""); // : "" /*  Push-.          ,    -  (  ,  ) */ user_pref("dom.push.userAgentID" , ""); user_pref("dom.push.serverURL", ""); // : wss://push.services.mozilla.com/ user_pref("dom.push.alwaysConnect", false); user_pref("dom.push.enabled", false); user_pref("dom.push.connection.enabled", false); user_pref("dom.push.alwaysConnect", false); user_pref("dom.push.maxQuotaPerSubscription", 0); user_pref("dom.webnotifications.enabled", false); user_pref("dom.webnotifications.requireinteraction.enabled", false); user_pref("dom.webnotifications.serviceworker.enabled", false); /* ServiceWorkers        Push- ,      ,   -    .    -    push-   . https://habr.com/company/2gis/blog/345552/ , ,  ,   -   ,      */ user_pref("dom.serviceWorkers.enabled", false); user_pref("dom.serviceWorkers.testUpdateOverOneDay", false); user_pref("dom.serviceWorkers.parent_intercept", false); user_pref("devtools.serviceWorkers.testing.enabled", false); /*   SPDY https://ru.wikipedia.org/wiki/SPDY   -  Google,   -        -    */ user_pref("network.http.spdy.enabled", false); user_pref("network.http.spdy.enabled.deps", false); user_pref("network.http.spdy.enabled.http2", false); //------------------------------------------------------------------------------------------------------------------------- /*  */ //------------------------------------------------------------------------------------------------------------------------- /*     (    ) */ user_pref("device.sensors.enabled", false); /*   (    ) */ user_pref("dom.battery.enabled", false); /*       (    ) */ user_pref("dom.vibrator.enabled", false); /*      -: */ user_pref("media.navigator.enabled", false); //------------------------------------------------------------------------------------------------------------------------- /*   */ //------------------------------------------------------------------------------------------------------------------------- //     .       -   user_pref("network.http.max-persistent-connections-per-server", 8); // 6 user_pref("network.http.max-connections", 1500); //900 //------------------------------------------------------------------------------------------------------------------------- /*  */ //------------------------------------------------------------------------------------------------------------------------- //      user_pref("layout.spellcheckDefault", 2); // : 1 //      user_pref("browser.urlbar.autoFill", true); //false //          user_pref("layout.word_select.eat_space_to_next_word", false); //        . // "      ?" user_pref("dom.disable_beforeunload", true); // : false // ,      user_pref("browser.display.focus_ring_on_anything", true); // : false user_pref("browser.display.focus_ring_width", 0); // : 1 //    user_pref("media.autoplay.enabled", false); 


, - : \User\AppData\Roaming\Mozilla\Firefox\Profiles\xxxxx.defalut. SiteSecurityServiceState (supercookie), .

DNS over HTTP .

10 VPN .

IpLeak .

And go hunting for hunters. To do this:

1. Download Lightbeam
2. Profile must be clean (no banner cutters!). Build the route Yandex-Google-Ok-Vk-YouTube
3. Look at the result. Something like that.



It’s only necessary to take into account that Lightbeam reduces everything, even if it has nothing to do with surveillance. All APIs, share access, etc. And combines the sites that share them. And most importantly, based on this image, do not try to add something to the rules. The second question in Google for the query “yastatic” is “how to remove”. This is static, not statistics. And now Lightbeam wonders why their rating has fallen, and users - why their “pictures are not gay”.

4. Put uBlock Origin, cover itNano Defender , otherwise when entering qaru content suddenly turns around the other way and turns over the image, put HTTPS Everywhere (which is also true of Zombie cookies ), Decentraleyes , Privacy Badger , add, IMHO, Malwarebytes , it’s like from all free add-ons best of all blocked phishing sites on the list.
Configure Privacy Badger


Configure Malwarebytes
1. «Enable protection» «Enable advertising/tracker protection». , «» .
2. , ( , , , ..): browserprint.info, ipcheck.info, iphones.ru, ip-check.info, lolzteam.net

Configure uBlock Origin


Having run, between Yandex and Google got the result. He was



delighted that he broke the system, but he suspected Badger of treason, in Google, he suspiciously quieted something. I re-read the article, it seems that everyone got drunk. But at the end of the writing of the article, I got here , and I realized that all the fuss is poking and the languor of the spirit is unlikely to become much more private, if only in the village, in the wilderness, in Saratov, but it can be even safer with all this. With advertising, uBlock will cope with it, and even if I am suddenly offered a favorite sort of coffee in a dark alley, well and good.

But if the passport data falls into the wrong hands, it will be compared with the help of a bigdat with what gateways and at what time we walk. In general, I look, one patch of abusereleased. Now wait for the service pack.

Source: https://habr.com/ru/post/424559/


All Articles