diff --git a/articles/surf.html b/articles/surf.html index 1acf0cc..b65bf78 100644 --- a/articles/surf.html +++ b/articles/surf.html @@ -1,38 +1,38 @@ - - Surf - Spyware Watchdog - + + Surf - Spyware Watchdog +
- -
- Surf Logo -

- From their website: "surf is a simple web browser based on WebKit2/GTK+. It is able to display websites and follow links."[1] Program tested: v2.0 for Linux. Mitmproxy was used to check for connections. -

-

Spyware Level: Not Spyware

-

- Surf makes no unsolicited requests at all. - It is also fully libre software under the expat license. It was tested in conjuction with tabbed, another piece of software developed by the same people for use with surf, it adds support for tabs. From a privacy standpoint, this browser is an excellent choice. -

-

Surf requires proxychains to connect to Tor, as it only supports HTTP proxies, not SOCKS (which is what Tor uses).

-
-
- -
- + + diff --git a/articles/surf_fr.html b/articles/surf_fr.html index 41da973..25e1295 100644 --- a/articles/surf_fr.html +++ b/articles/surf_fr.html @@ -31,7 +31,7 @@

Si vous voulez editer cet article ou contribuer sur vos propres article(s), contactez nous sur XMPP a spyware@conference.nuegia.net, ou visitez le repo Git a Codeberg.

Toutes les contributions doivent etre sous license CC0 pour etre acceptées.

- CC0 License + CC0 License diff --git a/guides/firefox.html b/guides/firefox.html index 2381b18..b1bc9c3 100644 --- a/guides/firefox.html +++ b/guides/firefox.html @@ -1,145 +1,137 @@ - - - - - - Spyware Watchdog - - - -
-

Mozilla Firefox Spyware Mitigation Guide

-

- Back to Home
- Back to Firefox -

- -

- After configuring Mozilla Firefox according to this guide it's rating changes like so: -

-

Spyware Rating: High => Not Spyware

-

- Before beginning this guide it is important that you try and cross-reference it with other guides, - to see which prespective on this topic is the best way to do it for you. At the bottom of the page are links - to other guides and projects like this one. You should strongly consider this as - you may find other guides more useful than this one. -

-

- Mozilla Firefox has a huge amount of spyware features, but they all can be disabled by using predefined profile settings. - To do this you need to create new Firefox profile: -

- Then open your Firefox user profiles directory. It should be located at: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
OS Path
Windows 7 %APPDATA%\Mozilla\Firefox\Profiles\XXXXXXXX.your_profile_name
Linux ~/.mozilla/firefox/XXXXXXXX.your_profile_name
OS X ~/Library/Application Support/Firefox/Profiles/XXXXXXXX.your_profile_name
Android /data/data/org.mozilla.firefox/files/mozilla/XXXXXXXX.your_profile_name
Sailfish OS + Alien Dalvik /opt/alien/data/data/org.mozilla.firefox/files/mozilla/XXXXXXXX.your_profile_name
Windows (portable) [firefox directory]\Data\profile\
-

-

- Delete everything from the new profile and get ghack's user.js
-

- You may want to edit the file to your needs, if so - -

-

- If you want to disable OCSP as well, you should also add this to your user.js. These settings are seperated - because while OCSP is a privacy breach it is also a security feature, and so whether to have it on or off should - be thought about before continuing. You can read about OCSP here: - https://scotthelme.co.uk/revocation-is-broken/ - [web.archive.org] . The problem is, that OCSP is a form of phoning home, and you might not want to make those requests. -

- - user_pref("security.ssl.enable_ocsp_stapling", false);
- user_pref("security.OCSP.enabled", 0);
- user_pref("security.OCSP.require", false);
-
-

- With this installation method, if you change any of user.js settings through about:config or Firefox preferences dialogs, - they will be reset to the user.js defined values after you restart Firefox. - This makes sure they're always back to secure defaults when starting the browser. - At the end you need to delete several default plugins in Firefox directory at \Mozilla Firefox\browser\features\ that can violate privacy: -

- - -

- It is highly recommended to also check other user.js template settings from ongoing "ghacks-user.js project"[1] for further hardening Firefox privacy, security and anti-fingerprinting. -

-
- -

Other Guides

-

-These are other guides and projects to help protect your privacy using Firefox. It's important to look at -other prespectives instead of reading JUST this guide. So you should be comparing all of the -guides that you can find to hear everyone's ideas about how this should be done, before you -finish setting Firefox up. Librefox is less of a guide and more of a project and series of tools and settings -you can download to help you make Firefox private. -

- Firefox: Privacy Related "about:config" Tweaks - [web.archive.org] - [archive.is]
- Firefox Privacy – The Complete How-To Guide - [web.archive.org] - [archive.is]
- Librefox: Firefox with privacy enhancements - [web.archive.org] - [archive.is]
-
-

Sources

-

-

- 1. - ghacksuserjs/ghacks-user.js - [web.archive.org] - [archive.is] -
- -

-
-

- This guide was created on 10/8/2018
- This guide was last updated on 4/2/2020 -

-

- If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on Codeberg. All contributions must be liscenced under the CC0 liscence to be accepted. -

- CC0 Liscence -
- + + + + + Mozilla Firefox Spyware Mitigation Guide - Spyware Watchdog + + + +
+ +
+ Firefox Logo +

Mozilla Firefox Spyware Mitigation Guide

+

This guide was tested working with Firefox version 74.

+

After configuring Mozilla Firefox with ghacks-user.js, according to this guide it's rating changes like so:

+

Spyware Rating: HighNot Spyware

+

The ghacks user.js is a template which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage (but it will happen).[2]

+
+

+ Before beginning this guide it is important that you try and cross-reference it with other guides, + to see which prespective on this topic is the best way to do it for you. At the bottom of the page are links + to other guides and projects like this one. You should strongly consider this as + you may find other guides more useful than this one. +

+
+

For extra privacy & security, disconnect your computer from the internet while following this guide, so that Firefox is unable to phone home by accident.

+
+

+ Mozilla Firefox has a huge amount of spyware features, but they can all be disabled by using predefined profile settings. + To do this you need to create new Firefox profile: +

+

Then open your Firefox user profiles directory. It should be located at:

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
OSPath
Windows 7%APPDATA%\Mozilla\Firefox\Profiles\XXXXXXXX.your_profile_name
Linux ~/.mozilla/firefox/XXXXXXXX.your_profile_name
OS X~/Library/Application Support/Firefox/Profiles/XXXXXXXX.your_profile_name
Android/data/data/org.mozilla.firefox/files/mozilla/XXXXXXXX.your_profile_name
Sailfish OS + Alien Dalvik/opt/alien/data/data/org.mozilla.firefox/files/mozilla/XXXXXXXX.your_profile_name
Windows (portable)[firefox directory]\Data\profile\
+
+

Delete everything from the new profile and get ghacks user.js:

+ cd /path/to/your/profile && rm -r * && wget https://raw.githubusercontent.com/ghacksuserjs/ghacks-user.js/master/user.js +

You may want to edit the file to your needs, if so:

+ $EDITOR user.js +

+ If you want to disable OCSP as well, you should also add this to your user.js. These settings are seperated + because while OCSP is a privacy breach, it is also a security feature. It works by contacting other servers to verify the authenticity of the address you are connecting to. +

+

+ You should think about it before making a decision. You can read more about OCSP here: + https://scotthelme.co.uk/revocation-is-broken/ + [web.archive.org].

+ + user_pref("security.ssl.enable_ocsp_stapling", false);
+ user_pref("security.OCSP.enabled", 0);
+ user_pref("security.OCSP.require", false);
+
+

+ With this installation method, if you change any of the settings in user.js through about:config or Firefox preferences dialogs, + they will be reset to the user.js defined values after you restart Firefox. + This makes sure they're always back to secure defaults when starting the browser. + At the end you need to delete several default plugins in Firefox directory at /path/to/firefox/browser/features (ie /usr/lib/firefox/browser/features/) that can violate privacy: +

+ +

+ It is highly recommended to also check other user.js template settings from ongoing "ghacks-user.js project"[1] for further hardening Firefox privacy, security and anti-fingerprinting. +

+
+

Run firefox -no-remote -ProfileManager again and start the profile you created. Delete any others if needed. Check to make sure, after the first start, that another profile which does not use ghacks was not created by Firefox.

+
+

Other Guides

+

+ These are other guides and projects to help protect your privacy using Firefox. It's important to look at + other perspectives instead of reading JUST this guide. So you should be comparing all of the + guides that you can find to hear everyone's ideas about how this should be done, before you + finish setting Firefox up. Librewolf is less of a guide and more of a project and series of tools and settings + you can download to help you make Firefox private. +

+
    +
  1. Privacy Related "about:config" Tweaks to Firefox [web.archive.org] [archive.is]
  2. +
  3. Firefox Privacy – The Complete How-To Guide [web.archive.org] [archive.is]
  4. +
  5. Librewolf, Firefox with privacy enhancements
  6. +
+
+

Sources

+
    +
  1. https://commons.wikimedia.org/wiki/File:Firefox_logo,_2019.svg (Firefox Logo)
  2. +
  3. ghacksuserjs/ghacks-user.js [web.archive.org] [archive.is]
  4. +
  5. https://github.com/ghacksuserjs/ghacks-user.js/blob/master/README.md
  6. +
+
+

+ If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on Codeberg. All contributions must be liscenced under the CC0 liscence to be accepted. +

+ CC0 Liscence +
+
+ + diff --git a/style2.css b/style2.css index 6a62205..8c61942 100644 --- a/style2.css +++ b/style2.css @@ -28,6 +28,9 @@ a { a:hover { color: #094561; } +:target a { + color: #959800; +} .img-link a:hover { border: none; } @@ -37,13 +40,52 @@ img { margin-right: auto; margin-bottom: 2vh; margin-top: 1vh; + width: 155px; +} +.icon { + width: 77px } hr { border: 1px solid #1A1A1A; } +ul { + max-width: 780px; + margin-left: auto; + margin-right: auto; +} +table, th, td { + text-align: center; + border: 1px solid white; + margin-left: auto; + margin-right: auto; + max-width: 780px; +} +td { + padding-right: 10px; + padding-left: 10px; +} +code { + text-align: left; + display: inline-block; + font-family: Monospace; + color: #890000; + border: 1px solid #890000; + margin: 2px; + padding-left: 5px; + padding-right: 5px; +} +.big-code { + display: block; + margin-left: auto; + margin-right: auto; + margin-top: 10px; + margin-bottom: 10px; + max-width: 500px; +} .nav { margin-top: 0.5vh; margin-left: 0.6vw; + margin-right: 0.6vw; } .nav a { text-decoration: none; @@ -51,6 +93,9 @@ hr { .green { color: #00981B; } +.orange { + color: #FF6100; +} .case { border: 2px solid #1A1A1A; border-radius: 15px; @@ -59,6 +104,9 @@ hr { margin-bottom: 3vh; margin-top: 3vh; } +.right { + float: right; +} .main { min-height: 60vh; }