MOZILLA FIREFOX. ANONYMOUS SETTING.

Carder

Professional
Messages
2,619
Reputation
9
Reaction score
1,716
Points
113
Mozilla Firefox is a free open source browser (based on the well-known TOR Browser). Also, mozilla firefox is well suited for typing, while initially it still needs to be configured.

Configuring Anonymity

Each browser has the ability to configure itself using different utilities. Now we will use one of them and add / change some parameters to increase our anonymity with you.

(Everything was done in firefox quantum version 61.0.1 (64)

Enter the following code into the address bar: about: config (Since there are really a lot of rules here, we will use the search :).

First of all, we remove the sending of reports to developers:

Code:
breakpad.reportURL - erase the value

browser.tabs.crashReporting.email - erase the value

browser.tabs.crashReporting.emailMe - value: false

browser.tabs.crashReporting.sendReport - false

datareporting.healthreport.infoURL - erase the value

datareporting.healthreport.uploadEnabled - false

datareporting.policy.dataSubmissionEnabled - false

extensions.getAddons.cache.enabled - false

security.ssl.errorReporting.automatic - false

Now turn off location detection:

Code:
browser.geolocation.warning.infoURL - erase the value

browser.search.countryCode - put any country (default: RU, I have US)

browser.search.geoip.url - erase the value

browser.search.geoip.timeout - value: 0

browser.search.geoSpecificDefaults.url - erase the value

browser.search.geoSpecificDefaults - false

browser.search.region - put any country (default: RU, I have US)

browser.search.suggest.enabled - false

geo.enabled - false

geo.wifi.uri - erase value

We prohibit access to hardware devices (web cameras, microphone, and so on):

Code:
dom.gamepad.enabled - false

dom.gamepad.non_standard_events.enable - false

dom.imagecapture.enabled - false

dom.presentation.discoverable - false

dom.presentation.discovery.enabled - false

dom.presentation.enabled - false

dom.presentation.tcp_server.debug - false

media.getusermedia.aec_enabled - false

media.getusermedia.agc_enabled - false

media.getusermedia.audiocapture.enabled - false

media.getusermedia.browser.enable - false

media.getusermedia.noise_enabled - false

media.getusermedia.screensharing.enabled - false

media.navigator.enabled - false

media.navigator.permission.disabled - false

media.navigator.video.enabled - false

media.video_stats.enabled - false

media.webspeech.recognition.enable - false

dom.netinfo.enabled - false

media.webspeech.recognition.enable - false

media.webspeech.synth.enabled - false

Sending data to mozilla and google servers (must have):

Code:
browser.safebrowsing.downloads.enabled - false

services.sync.prefs.sync.browser.safebrowsing.downloads.enabled - false

browser.safebrowsing.downloads.remote.block_dangerous_host - false

browser.safebrowsing.downloads.remote.block_dangerous - false

browser.safebrowsing.downloads.remote.block_potentially_unwanted - false

browser.safebrowsing.downloads.remote.block_uncommon - false

browser.safebrowsing.downloads.remote.enabled - false

browser.safebrowsing.downloads.remote.url - leave blank

browser.safebrowsing.malware.enabled - false

services.sync.prefs.sync.browser.safebrowsing.malware.enabled - false

browser.safebrowsing.provider.google.gethashURL - false

browser.safebrowsing.provider.google.lists - false

browser.safebrowsing.provider.google.reportURL - erase the value

browser.safebrowsing.provider.google.updateURL - erase

browser.safebrowsing.provider.google.updateURL - erase

browser.safebrowsing.provider.mozilla.lists - erase

browser.safebrowsing.provider.mozilla.updateURL - erase

browser.safebrowsing.reportPhishURL - erase

services.sync.prefs.sync.browser.safebrowsing.malware.enable - false

Synchronization with servers:

identity.fxaccounts.auth.uri - erase

services.sync.engine.addons - false

services.sync.engine.bookmarks - false

services.sync.engine.history - false

services.sync.engine.passwors - false

services.sync.engine.prefs - false

services.sync.engine.tabs - false

services.sync.fxa.privacyURL - erase

services.sync.fxa.termsURL - Erase

Disable telemetry (information about ssl certificates, etc.):

Code:
dom.ipc.plugins.flash.subprocess.crashreporter.enabled - false

dom.ipc.plugins.reportCrashURL - false

network.allow-experiments - false

security.ssl.errorReporting.enabled - false

toolkit.crashreporter.infoURL - erase the value

toolkit.telemetry.archive.enable - false

toolkit.telemetry.cachedClientID - erase

toolkit.telemetry.rejected - true

toolkit.telemetry.server - erase

toolkit.telemetry.unified - false

Be sure to turn off WebRTC:

media.peerconnection.enabled - false

media.peerconnection.ice.default_address_only - false

media.peerconnection.ice.relay_only - true

media.peerconnection.identity.enabled - false

media.peerconnection.identity.timeout - 1

media.peerconnection.turn.disable - true

media.peerconnection.use_document_iceservers - false

media.peerconnection.video.enabled - false

Disable automatic browser updates, as well as search plugins:

Code:
app.update.auto = false

app.update.enabled = false

app.update.mode = 0

browser.search.update = false

Disable sending browser performance data:

datareporting.healthreport.service.enabled = false

datareporting.healthreport.uploadEnabled = false

datareporting.policy.dataSubmissionEnabled = false

Cancel caching in Firefox:

Code:
network.http.use-cache= false

browser.cache.offline.enable= false

browser.cache.disk.enable= false

browser.cache.disk_cache_ssl= false

browser.cache.memory.enable= false

network.http.keep-alive.timeout = 600

network.http.max-persistent-connections-per-proxy = 16

network.cookie.lifetimePolicy = 2

network.http.sendRefererHeader = 0

network.http.sendSecureXSiteReferrer = false

network.protocol-handler.external = false [Include all subparameters in the value false]

network.protocol-handler.warn-external = true [Include all subparameters in the value false]

network.http.pipelining = true

network.http.pipelining.maxrequests = 8

network.http.proxy.keep-alive = true

network.http.proxy.pipelining = true

network.prefetch-next = false

browser.cache.disk.enable = false

browser.cache.offline.enable = false

browser.sessionstore.privacy_level = 2

browser.sessionhistory.max_entries = 2

browser.display.use_document_fonts = 0

dom.battery.enabled = false

intl.charsetmenu.browser.cache = ISO-8859-9, windows-1252, windows-1251, ISO-8859-1, UTF-8

extensions.blocklist.enabled = false

network.proxy.no_proxies_on = (empty)

default localhost, 127.0.0.1

The following code disables usage statistics:

Code:
toolkit.telemetry.enabled = false

Option to disable Firefox's ability to connect to third-party servers (Telefonica) without permission:

Code:
loop.enabled = false

We block sites that monitor users. Not to be confused with DNT, which only "asks" sites not to track you. Forced blocking is also carried out here.

Code:
browser.search.suggest.enabled = tru

Disable website activity tracking:

Code:
browser.send_pings is false

Disable WebGL:

Code:
webgl.disabled в true.

dom.enable_performance = false

dom.battery.enabled = false

network.dns.disablePrefetch = true

network.http.accept.default = text / html, application / xhtml + xml, application / xml; q = 0.9, * / *; q = 0.8
 

Carding

Professional
Messages
2,829
Reputation
17
Reaction score
2,081
Points
113

Building a set of useful plugins for Firefox​

Mozilla Firefox has an army of dedicated fans. This is not surprising: the browser has proven itself to be reliable, fast, and most importantly easily extensible with a variety of plugins. Among them a whole set of tools for increasing anonymity and privacy. They allow you to turn "Fire Fox" into a powerful secure browser that will block user surveillance. In this article, we will look at the most interesting of them.

Of course, nothing prevents you from downloading Tor Browser, which, by the way, is based on Firefox itself, or installing one of the protected browsers. But if you are already used to Firefox, as to comfortable home Slippers, carefully store links in the "Favorites" since the days of Windows XP, and in General are not inclined to change, extensions created by independent developers will come to the rescue. You can use them to block tracking from Internet resources, change geolocation data, modify the browser's fingerprint, and do many other cool and useful things.

Privacy Possum
This is probably one of the most well-known plugins for Firefox, designed to combat surveillance by blocking and falsifying data collected by various tracking scripts. Privacy Possum prevents the acceptance of cookies, blocks the set-cookie and referrer HTTP headers, and also distorts the browser's fingerprint, which makes fingerprinting difficult.

INFO
Sites can track the user not only using cookies, but also thanks to the so-called browser fingerprint. Moreover, in addition to the data of the browser itself (such as the User Agent), the "fingerprint" includes information about the OS version and bit depth, screen resolution, and other parameters of the hardware and software configuration of the machine transmitted to the outside. Such a "fingerprint", of course, is not unique, but with a certain degree of reliability it allows you to identify the user.

The plugin doesn't have any advanced settings: you can turn it on or off, and on the configuration page, disable automatic updates and allow it to run in a private window.

scale_1200

After installing Privacy Possum, I was extremely curious about what the Panopticlick test, which we used last time to check protected browsers, would say about its work. The test showed that the plugin really blocks cookies and advertising trackers, and with the help of the Webkay website, we found out that when the extension is enabled, the browser leaves much less information about itself than without it in fact, in addition to the IP address, only the processor bit rate, OS version and Firefox itself leaked out. The result, frankly, is quite at the level of some Comodo Dragon.

Trace
Another plugin that "breaks" the fingerprinting mechanism by substituting data sent to remote servers, including changing HTTP headers. The purple-scarlet and orange background of the settings page seems to hint that the authors of the addon don't like to joke — everything is serious here!

scale_1200

This is what the Trace settings look like

Trace works with lists of domains divided into categories, but in the free version of the plugin, only the basic list, a set of Facebook subdomains, and a list of sites that mine cryptocurrencies using JavaScript are available. All other categories - such as video trackers, sites that like to send push notifications, and resources that send spam-are available only to premium subscribers.

TrackMeNot
This plugin is designed to combat search query tracking. Every user knows the hard way: it's enough to search the Internet for a shovel once, and for the next week you'll be admiring ads for rakes, hoes, and even motorcycle cultivators. This phenomenon is countered by TrackMeNot, which sends search engines randomized queries that make their electronic brains boil and melt. There are more settings for this plugin, but they are all, in General, simple and clear.

scale_1200

TrackMeNot plugin settings

Here you can, for example, enable or disable burst mode - sending requests specifically to the search engine in which the user is currently looking for something, select the search engines used from the list, or add your own one there. Other settings include the frequency of sending requests and logging, which can be disabled if desired. The plugin has been translated into six languages, but there is no Russian among them.

Decentralizes
This addon protects against tracking via CDN by sending a lot of requests to public CDN services like YandexCDN, GHL, and MaxCDN. Like any useful invention, CDN benefits not only ordinary users, but also merchants who want to know as much as possible about these users, and better yet, everything.

INFO

A CDN (Content Delivery Network), or content delivery (and distribution) network, is a distributed hardware and software infrastructure that accelerates the delivery of content to end users. Physically, this is implemented as follows: identical content is placed on several geographically dispersed servers in order to reduce the waiting time and data loading when accessing such a server. The same system usually uses scripts for collecting statistics and monitoring traffic, which can be used to track users.

scale_1200

In the Decentralizes settings, you can create a white list of trusted domains

Blocking and spoofing CDN requests can break some sites, so the plugin replaces local files downloaded from the network where necessary. The extension is also not rich in settings, but on the configuration page you can add domains to the whitelist and CDN filtering will not be applied to them.

Change Geolocation
The name of this addon speaks for itself: it allows you to threaten the southern Central, sitting somewhere in Mytishchi, that is, change the geolocation in Firefox.

scale_1200

Change Geolocation plugin settings

By default, the plugin suggests using the Greenwich historic district in London as the current geo location, but if you want, you can set any coordinates in the settings by moving somewhere in SOHO. To do this, enter the desired latitude and longitude and, if necessary, specify other parameters of the geolocation API. Obviously, the plugin will not help in the fight against algorithms that determine the user's location by IP address, but it can deceive all other sites.

HTTPS everywhere
A fairly simple, but extremely useful plugin that forces the browser to force https to be enabled when connecting to sites that support it, even if you typed the http prefix in the address bar. After installing the extension, an icon appears in the Firefox toolbar. by clicking on it, you can deactivate the plugin, enable or disable the forced blocking of unencrypted HTTP requests, and also add the site opened in the browser to the list of exceptions by clicking one button. Quite a useful tool for anyone who cares about their own safety.

FoxyProxy
A well-known, very popular and highly sought-after plugin that allows you to add a function similar to the advertised VPN in Opera to Firefox. Just enter the address and port of any free proxy server in the addon settings, after which you can enable or disable it with one click — and all blocked Internet resources become available again as if by magic.

scale_1200

FoxyProxy plugin settings

FoxyProxy supports multiple proxy servers at once, so you can quickly switch between them if a service from the list suddenly falls off. For greater convenience, the addon allows you to import previously created settings or a pre-prepared proxy list, as well as export it for transfer to another computer. Many server types are supported: HTTP, HTTPS, SOCKS 5 and 4, WPAD and PAC URL-there are plenty to choose from. In General, this plugin is a must-have for every Firefox user. If you haven't installed it yet, hurry up to correct this omission.

NoScript
It is known that scripts are most often the main cause of leakage of confidential data in the browser and privacy violations. In Tor Browser, NoScript mode is available out of the box. in Firefox, you can enable It by installing the plugin of the same name.

scale_1200

NoScript plugin settings

The extension divides all sites into three categories - "default", "trusted" and "untrusted". For the first category, only some of the most "secure" types of scripts are allowed, trusted ones are allowed everything, and on untrusted sites, scripts, respectively, are completely banned. You can edit lists and move a site from one category to another on the Per-Site Permissions tab in the plugin settings window. Since NoScript mode quite often breaks the structure of web pages, you can temporarily disable the addon for the current site or immediately add it to the trusted ones by clicking one button in the Firefox toolbar. As in the previous case, NoScript supports importing and exporting settings, which allows you to quickly transfer them from one system to another.

uBlock Origin and uMatrix
Two plugins from the same developer. the first one is designed to block ads, and the second one is designed to intercept and block browser requests. The uBlock Origin extension has a huge number of settings, which are not so easy to deal with on the go.

scale_1200

UBlock Origin plugin settings

Here you can set the types of blocked content and change the display of statistics, edit filter lists, create your own filters and filter rules. In the settings, you can create a whitelist of domains that will not be subject to content filtering, as well as import rules and settings from another computer.

The uMatrix plugin is configured in a similar way - the user can edit the rules for filtering requests, the blacklist of domains that will be blocked, and a number of privacy settings. These include automatic deletion of blocked and session cookies, clearing the contents of the browser's local storage at specified intervals, blocking all attempts to audit hyperlinks, prohibiting downloading mixed content from web pages simultaneously via HTTP and HTTPS, and some others.

Of course, to understand the parameters of these Addons, you will have to spend some time. But it's worth it: if you set everything up correctly, you won't need other ad blockers and content filters.

Google search link fix
This is a simple plugin that blocks the collection of statistics about clicks on links in Google search results. Install it if you don't want to share information about the search results that interest you with the good Corporation. Or use Yandex.

Facebook Container
An addon from Firefox developers aimed specifically at Facebook. Instagram blocks Facebook's collection of user data not only within Facebook itself, but also on all affiliated sites, including Instagram and Messenger. In addition, the Facebook Like and Share buttons placed on any web page track that you have visited this page, even if you have not clicked them, provided that you are logged in to the social network. Facebook Container blocks this activity and removes "spy" buttons from web pages.

Use this plugin if you don't want to share your web browsing history with mark Zuckerberg and send him information about your online activity.

Undoubtedly, this list of plugins is far from complete if you want, you can find many other free extensions for Firefox that will make your browser even more secure and take care of your privacy. We have reviewed only the most well-known of them, which can meet most of the needs of even the most sophisticated user.
 

Teacher

Professional
Messages
2,673
Reputation
9
Reaction score
681
Points
113
Mozilla Firefox Privacy Settings ⚙️

Privacy settings and thought i should share with someone that probably care for a bit more anonymity online.

About Config Settings:

Firefox allows the users to modify the configuration settings.

Open Firefox and type "about:config" in the URL bar.

You will see the following message:
"This might void your warranty! Changing these advanced settings can be harmful to the stability, security and performance of this application. You should only continue if you are sure of what you are doing."

Accept the risks. To change most of the settings, double click the setting to toggle the slider between "True" and "False".

For other parameters you need to provide a number. You should search the for desired parameter, in the search bar of "about:config" page...

About:Config Recommended Parameter Values:

privacy.trackingprotection.enabled: True | as it blocks website's tracking

geo.enabled: False | as it disables Firefox from sharing the user's location data

browser.safebrowsing.phishing.enabled: False | as it disables Google's "Safe Browsing" and "Phishing" protection. Otherwise, Google scans and stores the sites for the presence of malwares.

browser.safebrowsing.malware.enabled: False | as it disables Google's ability to scan and store sites for the presence of malwares.

dom.event.clipboardevents.enabled: False | as many websites request a notification, if we copy an image or text. Setting the slider to "False" disables this ability of the websites.

media.navigator.enabled: False | as it disables the website's ability to see webcam and micro-phone (On/Off) status

dom.battery.enabled: False | as it disables the website's ability to see the exact battery levels

WebRTC: (Web Real - Time Communications): ?

WebRTC is a new communication protocol that relies on JavaScript. It can leak our actual IP address behind the VPN. Hence, consider the following settings:
media.peerconnection.enabled: False
media.peerconnection.turn.disable: True
media.peerconnection.use_document_iceservers: False
media.peerconnection.video.enabled: False
media.peerconnection.identity.timeout: 1

Unfortunately, WebRTC cannot be fully disabled in Google Chrome.

Additional Recommended Changes:

For furtherance of privacy, you may apply following additional changes:

privacy.firstparty.isolate: True | Isolates all the browser identifiers (e.g. cookies) to prevent tracking across different domains

privacy.resistFingerprinting: True | Makes Firefox more resistant to browser finger-printing

browser.cache.offline.enable: False | Disables offline cache

browser.sessionstore.max_tabs_undo: 0 | Even when Firefox is barred from remembering history, closed tabs are stored temporarily at Menu > History > Recently Closed Tabs.

browser.urlbar.speculativeConnect.enabled: False |Disables pre-loading of auto-complete URLs. Firefox preloads URLs that auto-complete when user types in the address bar. A concern if URLs suggested are not the intended ones.

network.cookie.cookieBehavior: 1 | Disables cookies
0 = Accepts all cookies by default
1 = Only accepts from the originating site (blocks third-party cookies)
2 = Blocks all cookies by default

network.cookie.lifetimePolicy: 2 | Cookies are deleted at the end of the session
0 = Accepts cookies normally
1 = Prompts for each cookie
2 = Accepts for current session only
3 = Accepts for N days

network.http.referer.trimmingPolicy: 2 | Sends only the scheme, host and port in the Referer header
0 = Sends the full URL in the Referer header
1 = Sends the URL without its query string in the Referer header
2 = Sends only the scheme, host and port in the Referer header

webgl.disabled: True | WebGL is a potential security risk.

browser.sessionstore.privacy_level: 2 | This preference controls when to store extra information about a session: contents of forms, scroll-bar positions, cookies and POST data.
0 = Stores extra session data for any site.
1 = Stores extra session data for unencrypted (non-HTTPS) sites only.
2 = Never stores extra session data.

extensions.blocklist.url: https://blocklists.settings.services.mozilla.com/v1/blocklist/3/ / / | Limits the amount of identifiable information sent when requesting the Mozilla’s harmful extension block-list. Optionally, the block-list can be disabled entirely by setting

extensions.blocklist.enabled to false for increased privacy, but decreased security.

These customised settings, provide greater degree of protection.
 

Lord777

Professional
Messages
2,581
Reputation
15
Reaction score
1,320
Points
113
Firefox setting [anonymity] 2021

a61f243d7de0d3dd0307b.jpg


FireFox is one of the best browsers for working in carding, most likely many will agree with me, but not everyone knows about such a gimmick as about: config

In short, this is a utility that contains the rules responsible for the operation of firefox (access of sites to geodata, telemetry, and much more), today I will share my addons and try to configure firefox for safe surfing on the network, let's start:

(Everything was done in firefox quantum version 61.0.1 (64))

Enter in the address bar:
Code:
about: config

Since there are really a lot of rules here, we will use the search:

First, let's remove the sending of reports:
Code:
breakpad.reportURL - erase the value
browser.tabs.crashReporting.email - erase the value
browser.tabs.crashReporting.emailMe - value: false
browser.tabs.crashReporting.sendReport is false
datareporting.healthreport.infoURL - clear the value
datareporting.healthreport.uploadEnabled is false
datareporting.policy.dataSubmissionEnabled is false
extensions.getAddons.cache.enabled - false
security.ssl.errorReporting.automatic - false

Now the location:
Code:
browser.geolocation.warning.infoURL - erase value
browser.search.countryCode - put any country (default: RU, I have US)
browser.search.geoip.url - Erase the value
browser.search.geoip.timeout - value: 0
browser.search.geoSpecificDefaults.url - delete the value
browser.search.geoSpecificDefaults is false
browser.search.region - put any country (default: RU, I have US)
browser.search.suggest.enabled is false
geo.enabled - false
geo.wifi.uri - erase the value

We remove access to hardware devices (cameras, microphones, etc.):
Code:
dom.gamepad.enabled - false
dom.gamepad.non_standard_events.enable - false
dom.imagecapture.enabled - false
dom.presentation.discoverable - false
dom.presentation.discovery.enabled - false
dom.presentation.enabled - false
dom.presentation.tcp_server.debug - false
media.getusermedia.aec_enabled - false
media.getusermedia.agc_enabled - false
media.getusermedia.audiocapture.enabled - false
media.getusermedia.browser.enable - false
media.getusermedia.noise_enabled - false
media.getusermedia.screensharing.enabled - false
media.navigator.enabled - false
media.navigator.permission.disabled - false
media.navigator.video.enabled - false
media.video_stats.enabled - false
media.webspeech.recognition.enable - false
dom.netinfo.enabled - false
media.webspeech.recognition.enable - false
media.webspeech.synth.enabled - false

Sending data to mozilla and google servers (must have):
Code:
browser.safebrowsing.downloads.enabled is false
services.sync.prefs.sync.browser.safebrowsing.downloads.enabled is false
browser.safebrowsing.downloads.remote.block_dangerous_host is false
browser.safebrowsing.downloads.remote.block_dangerous is false
browser.safebrowsing.downloads.remote.block_potentially_unwanted is false
browser.safebrowsing.downloads.remote.block_uncommon is false
browser.safebrowsing.downloads.remote.enabled is false
browser.safebrowsing.downloads.remote.url - leave blank
browser.safebrowsing.malware.enabled is false
services.sync.prefs.sync.browser.safebrowsing.malware.enabled is false
browser.safebrowsing.provider.google.gethashURL is false
browser.safebrowsing.provider.google.lists is false
browser.safebrowsing.provider.google.reportURL - erase the value
browser.safebrowsing.provider.google.updateURL - erase
browser.safebrowsing.provider.google.updateURL - erase
browser.safebrowsing.provider.mozilla.lists - erase
browser.safebrowsing.provider.mozilla.updateURL - Erase
browser.safebrowsing.reportPhishURL - Erase
services.sync.prefs.sync.browser.safebrowsing.malware.enable - false

Sync and other persimmon:
Code:
identity.fxaccounts.auth.uri - erase
services.sync.engine.addons - false
services.sync.engine.bookmarks is false
services.sync.engine.history is false
services.sync.engine.passwors - false
services.sync.engine.prefs - false
services.sync.engine.tabs is false
services.sync.fxa.privacyURL - Erase
services.sync.fxa.termsURL - Erase

Telemetry:
Code:
dom.ipc.plugins.flash.subprocess.crashreporter.enabled - false
dom.ipc.plugins.reportCrashURL - false
network.allow-experiments is false
security.ssl.errorReporting.enabled - false
toolkit.crashreporter.infoURL - erase value
toolkit.telemetry.archive.enable - false
toolkit.telemetry.cachedClientID - Erase
toolkit.telemetry.rejected - true
toolkit.telemetry.server - erase
toolkit.telemetry.unified - false

Disable WebRTC:
Code:
media.peerconnection.enabled - false
media.peerconnection.ice.default_address_only - false
media.peerconnection.ice.relay_only - true
media.peerconnection.identity.enabled - false
media.peerconnection.identity.timeout - 1
media.peerconnection.turn.disable - true
media.peerconnection.use_document_iceservers - false
media.peerconnection.video.enabled - false

Options to disable automatic browser refresh
Code:
app.update.auto = false
app.update.enabled = false
app.update.mode = 0

Option to disable automatic update of search plugins
Code:
browser.search.update = false

Options to disable sending Firefox performance data
Code:
datareporting.healthreport.service.enabled = false
datareporting.healthreport.uploadEnabled = false
datareporting.policy.dataSubmissionEnabled = false

Disables usage statistics
Code:
toolkit.telemetry.enabled = false

Option to disable Firefox's ability to connect to third-party servers (Telefonica) without permission.
Code:
loop.enabled = false

Option to disable a third-party service for managing the list of articles that are deferred for reading.
Code:
browser.pocket.enabled = false

Unlike all of the above, this option, on the contrary, should be enabled. This is necessary to actively block sites that are known for their inappropriate user tracking behavior. Not to be confused with DNT, which only "asks" sites not to track you. Forced blocking is also carried out here.
Code:
browser.search.suggest.enabled = true

Disable website activity tracking
Code:
browser.send_pings is false

Disable direct DNS request
The default is false, that is, disabled. If you use TOR or a proxy, then in this case the browser will make a request to the DNS not directly, but through a proxy
Code:
network.proxy.socks_remote_dns - true

Disable WebGL.
Code:
webgl.disabled to true.
dom.enable_performance = false
dom.battery.enabled = false
network.dns.disablePrefetch = true
network.http.accept.default = text / html, application / xhtml + xml, application / xml; q = 0.9, * / *; q = 0.8

Disable caching in Firefox
Code:
network.http.use-cache = false
browser.cache.offline.enable = false
browser.cache.disk.enable = false
browser.cache.disk_cache_ssl = false
browser.cache.memory.enable = false
network.http.keep-alive.timeout = 600
network.http.max-persistent-connections-per-proxy = 16
network.cookie.lifetimePolicy = 2
network.http.sendRefererHeader = 0
network.http.sendSecureXSiteReferrer = false
network.protocol-handler.external = false [Include all subparameters in the value false]
network.protocol-handler.warn-external = true [Enable all subparameters to true]
network.http.pipelining = true
network.http.pipelining.maxrequests = 8
network.http.proxy.keep-alive = true
network.http.proxy.pipelining = true
network.prefetch-next = false
browser.cache.disk.enable = false
browser.cache.offline.enable = false
browser.sessionstore.privacy_level = 2
browser.sessionhistory.max_entries = 2
browser.display.use_document_fonts = 0
dom.battery.enabled = false
intl.charsetmenu.browser.cache = ISO-8859-9, windows-1252, windows-1251, ISO-8859-1, UTF-8
extensions.blocklist.enabled = false
network.proxy.no_proxies_on = (empty)
default localhost, 127.0.0.1

Cookies or Cookies - if you want to be invisible for statistics, do not want to be recognized by the site, then you will have to disable cookies in your browser. You should not completely disable it, as on the vast majority of sites you will feel uncomfortable and some functions will simply not work. But if you need to visit a certain resource "without traces" then Firefox has a great tool - this is Private Browsing. You can connect it at any time. Tools - Start Private Browsing

With about: config that's all, we'll discuss the extensions that I consider mandatory for installation (if it seems pop, I'm sorry, if someone doesn't know)

1) HTTPS Everywhere - the utility blocks http requests to prevent data leakage through an unprotected protocol.
2) User-Agent Switcher - replaces the user agent with the one selected by the user, all the most popular platforms (even mobile) are available. Well suited for driving in different sites (Previously, brute Ebay was beaten with it)
3) uBlock Origin is just an adblock with filters, blackjack and ... well, you get the idea
4) FoxyProxy Standart - firefox has a function for adding a proxy, but I think this thing is more convenient
5) Privacy Badger & Disconnect - track and block all oddities on sites
6) Web Developer - cookie editor, disable css, and other utilities for web developer
7) NoScript is a hardcore extension, the name symbolizes
 
Top