summaryrefslogtreecommitdiffstats
path: root/debian/local
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-06-12 05:43:23 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-06-12 05:43:23 +0000
commit11212d10b899164c0e70839af09ccf29102b2e50 (patch)
tree35d9c5f7ffdf207f1eea834623a80665d799e763 /debian/local
parentuser.js: Setting startup to restore previous session. (diff)
downloadfirefox-11212d10b899164c0e70839af09ccf29102b2e50.tar.xz
firefox-11212d10b899164c0e70839af09ccf29102b2e50.zip
user.js: Disabling safe browsing.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'debian/local')
-rw-r--r--debian/local/pref/user.js14
1 files changed, 7 insertions, 7 deletions
diff --git a/debian/local/pref/user.js b/debian/local/pref/user.js
index 89a08d1b9b..7c1b36e87a 100644
--- a/debian/local/pref/user.js
+++ b/debian/local/pref/user.js
@@ -205,28 +205,28 @@ user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
/* 0401: disable SB (Safe Browsing)
* [WARNING] Do this at your own risk! These are the master switches
* [SETTING] Privacy & Security>Security>... Block dangerous and deceptive content ***/
- // user_pref("browser.safebrowsing.malware.enabled", false);
- // user_pref("browser.safebrowsing.phishing.enabled", false);
+user_pref("browser.safebrowsing.malware.enabled", false);
+user_pref("browser.safebrowsing.phishing.enabled", false);
/* 0402: disable SB checks for downloads (both local lookups + remote)
* This is the master switch for the safebrowsing.downloads* prefs (0403, 0404)
* [SETTING] Privacy & Security>Security>... "Block dangerous downloads" ***/
- // user_pref("browser.safebrowsing.downloads.enabled", false);
+user_pref("browser.safebrowsing.downloads.enabled", false);
/* 0403: disable SB checks for downloads (remote)
* To verify the safety of certain executable files, Firefox may submit some information about the
* file, including the name, origin, size and a cryptographic hash of the contents, to the Google
* Safe Browsing service which helps Firefox determine whether or not the file should be blocked
* [SETUP-SECURITY] If you do not understand this, or you want this protection, then override this ***/
user_pref("browser.safebrowsing.downloads.remote.enabled", false);
- // user_pref("browser.safebrowsing.downloads.remote.url", ""); // Defense-in-depth
+user_pref("browser.safebrowsing.downloads.remote.url", ""); // Defense-in-depth
/* 0404: disable SB checks for unwanted software
* [SETTING] Privacy & Security>Security>... "Warn you about unwanted and uncommon software" ***/
- // user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
- // user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
+user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
+user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
/* 0405: disable "ignore this warning" on SB warnings [FF45+]
* If clicked, it bypasses the block for that session. This is a means for admins to enforce SB
* [TEST] see https://github.com/arkenfox/user.js/wiki/Appendix-A-Test-Sites#-mozilla
* [1] https://bugzilla.mozilla.org/1226490 ***/
- // user_pref("browser.safebrowsing.allowOverride", false);
+user_pref("browser.safebrowsing.allowOverride", true);
/*** [SECTION 0600]: BLOCK IMPLICIT OUTBOUND [not explicitly asked for - e.g. clicked on] ***/
user_pref("_user.js.parrot", "0600 syntax error: the parrot's no more!");