瀏覽代碼

create 4600s: RFP alternatives

Thorin-Oakenpants 7 年之前
父節點
當前提交
13aa4a0290
共有 1 個文件被更改,包括 10 次插入0 次删除
  1. 10 0
      user.js

+ 10 - 0
user.js

@@ -1592,6 +1592,16 @@ user_pref("privacy.resistFingerprinting", true); // (hidden pref) (not hidden FF
 user_pref("privacy.window.maxInnerWidth", 1600); // (hidden pref)
 user_pref("privacy.window.maxInnerWidth", 1600); // (hidden pref)
 user_pref("privacy.window.maxInnerHeight", 900); // (hidden pref)
 user_pref("privacy.window.maxInnerHeight", 900); // (hidden pref)
 
 
+/*** 4600: RFP (4500) ALTERNATIVES [SETUP]
+   * IF you DO use RFP (see 4500) then you DO NOT need these redundant prefs. In fact,
+     some even cause RFP to not behave as you would expect and alter your fingerprint.
+     Make sure they are RESET in about:config as per your Firefox version
+   * IF you DO NOT use RFP or are on ESR... read on
+***/
+/* [NOTE] ESR52.x and non-RFP users replace the * with a slash on this line to enable these
+// * * * /
+// ***/
+
 /*** 4700: RFP (4500) ALTERNATIVES - NAVIGATOR / USER AGENT (UA) SPOOFING
 /*** 4700: RFP (4500) ALTERNATIVES - NAVIGATOR / USER AGENT (UA) SPOOFING
      Spoofing your UA to *LOWER* entropy *does* *not* *work*. It may even cause site breakage
      Spoofing your UA to *LOWER* entropy *does* *not* *work*. It may even cause site breakage
      depending on your values. Even if you spoof, like TBB (Tor Browser Bundle) does, as the
      depending on your values. Even if you spoof, like TBB (Tor Browser Bundle) does, as the