User.js: ToDo: diffs FF62-FF63

Created on 10 Sep 2018  路  56Comments  路  Source: arkenfox/user.js

FF63 is scheduled for release 23th Oct

FF63 Release notes [when ready]
[FF63 for developers](https://developer.mozilla.org/en-US/docs/Mozilla/Firefox/Releases/63)
FF63 compatibility
FF63 security advisories

199 diffs ( 122 new, 56 gone, 21 different )

misc:

new in v63.0:

removed, renamed or hidden in v63.0:

changed in v63.0:


ignore

click me for details

==NEW

pref("accessibility.typeaheadfind.manual", true);
pref("apz.allow_double_tap_zooming", true);
pref("browser.bookmarks.editDialog.showForNewBookmarks", true);
pref("browser.contentblocking.allowlist.annotations.enabled", true);
pref("browser.contentblocking.allowlist.storage.enabled", true);
pref("browser.contentblocking.cookies-site-data.ui.reject-trackers.enabled", true);
pref("browser.contentblocking.cookies-site-data.ui.reject-trackers.recommended", true);
pref("browser.contentblocking.fastblock.control-center.ui.enabled", false);
pref("browser.contentblocking.fastblock.ui.enabled", false);
pref("browser.contentblocking.global-toggle.enabled", false);
pref("browser.contentblocking.introCount", 0);
pref("browser.contentblocking.rejecttrackers.control-center.ui.enabled", true);
pref("browser.contentblocking.rejecttrackers.reportBreakage.enabled", true);
pref("browser.contentblocking.rejecttrackers.ui.enabled", true);
pref("browser.contentblocking.rejecttrackers.ui.recommended", true);
pref("browser.contentblocking.reportBreakage.enabled", false);
pref("browser.contentblocking.reportBreakage.url", "https://tracking-protection-issues.herokuapp.com/new");
pref("browser.contentblocking.trackingprotection.control-center.ui.enabled", true);
pref("browser.contentblocking.trackingprotection.ui.enabled", true);
pref("browser.contentblocking.ui.enabled", true);
pref("browser.ctrlTab.recentlyUsedOrder", true);
pref("browser.fastblock.enabled", false);
pref("browser.fastblock.limit", 0);
pref("browser.fastblock.timeout", 5000);
pref("browser.newtabpage.activity-stream.asrouter.devtoolsEnabled", false);
pref("browser.newtabpage.activity-stream.asrouter.messageProviders", "[{\"id\":\"onboarding\",\"type\":\"local\",\"localProvider\":\"OnboardingMessageProvider\",\"enabled\":false,\"cohort\":0},{\"id\":\"snippets\",\"type\":\"remote\",\"url\":\"https://snippets.cdn.mozilla.net/us-west/bundles/bundle_d6d90fb9098ce8b45e60acf601bcb91b68322309.json\",\"updateCycleInMs\":14400000,\"enabled\":false},{\"id\":\"cfr\",\"type\":\"local\",\"localProvider\":\"CFRMessageProvider\",\"enabled\":false,\"cohort\":\"\"}]");
pref("browser.newtabpage.activity-stream.pocketCta", "{\"cta_button\":\"\",\"cta_text\":\"\",\"cta_url\":\"\",\"use_cta\":false}");
pref("browser.tabs.remote.separatePrivilegedContentProcess", false);
pref("devtools.aboutdebugging.collapsibilities.installedExtension", false);
pref("devtools.aboutdebugging.collapsibilities.otherWorker", false);
pref("devtools.aboutdebugging.collapsibilities.serviceWorker", false);
pref("devtools.aboutdebugging.collapsibilities.sharedWorker", false);
pref("devtools.aboutdebugging.collapsibilities.tab", false);
pref("devtools.aboutdebugging.collapsibilities.temporaryExtension", false);
pref("devtools.aboutdebugging.network-locations", "[]");
pref("devtools.aboutdebugging.new-enabled", false);
pref("devtools.debugger.features.autocomplete-expressions", false);
pref("devtools.debugger.features.component-pane", false);
pref("devtools.debugger.features.map-await-expression", false);
pref("devtools.debugger.features.map-expression-bindings", true);
pref("devtools.inspector.chrome.three-pane-enabled", false);
pref("devtools.promote.accessibility", 1);
pref("devtools.remote.adb.extensionID", "[email protected]");
pref("devtools.responsive.leftAlignViewport.enabled", false);
pref("devtools.responsive.show-setting-tooltip", true);
pref("dom.animations-api.compositing.enabled", false);
pref("dom.animations-api.getAnimations.enabled", false);
pref("dom.animations-api.implicit-keyframes.enabled", false);
pref("dom.animations-api.timelines.enabled", false);
pref("dom.datatransfer.mozAtAPIs", true);
pref("dom.events.asyncClipboard", true);
pref("dom.events.asyncClipboard.dataTransfer", false);
pref("dom.events.testing.asyncClipboard", false);
pref("dom.ipc.keepProcessesAlive.privileged", 1);
pref("dom.ipc.processCount.privileged", 1);
pref("dom.payments.defaults.saveAddress", true);
pref("dom.payments.defaults.saveCreditCard", false);
pref("dom.payments.response.timeout", 5000);
pref("dom.pointer-lock.enabled", true);
pref("dom.ua_widget.enabled", false);
pref("dom.visualviewport.enabled", false);
pref("dom.vr.process.enabled", false);
pref("dom.vr.service.enabled", false);
pref("dom.webgpu.enable", false);
pref("dom.window.event.enabled", false);
pref("editor.inline_table_editing.enabled_by_default", true);
pref("editor.positioning.enabled_by_default", true);
pref("editor.resizing.enabled_by_default", true);
pref("extensions.getAddons.langpacks.url", "https://services.addons.mozilla.org/api/v3/addons/language-tools/?app=firefox&type=language&appversion=%VERSION%");
pref("extensions.webextensions.enablePerformanceCounters", false);
pref("gfx.webrender.debug.show-overdraw", false);
pref("gfx.webrender.dl.dump-content", false);
pref("gfx.webrender.dl.dump-parent", false);
pref("gfx.webrender.force-disabled", false);
pref("identity.fxaccounts.autoconfig.uri", "");
pref("identity.fxaccounts.commands.enabled", false);
pref("intl.multilingual.enabled", false);
pref("intl.tsf.hack.allow_to_stop_hacking_on_build_17643_or_later", false);
pref("io.activity.enabled", false);
pref("layout.css.motion-path.enabled", false);
pref("layout.css.offset-logical-properties.enabled", false);
pref("layout.css.overflow.moz-scrollbars.enabled", false);
pref("layout.css.overflow-break.intrinsic-size", false);
pref("layout.css.scrollbar-width.enabled", false);
pref("layout.css.unknown-webkit-pseudo-element", false);
pref("layout.css.use-counters.enabled", false);
pref("layout.css.xul-box-display-values.content.enabled", true);
pref("layout.css.xul-tree-pseudos.content.enabled", true);
pref("marionette.log.truncate", true);
pref("media.allowed-to-play.enabled", false);
pref("media.autoplay.allow-extension-background-pages", true);
pref("media.autoplay.allow-muted", true);
pref("media.autoplay.ask-permission", false);
pref("media.autoplay.block-event.enabled", false);
pref("media.autoplay.block-webaudio", false);
pref("media.autoplay.enabled.user-gestures-needed", false);
pref("media.benchmark.vp9.fps", 0);
pref("media.benchmark.vp9.versioncheck", 0);
pref("media.peerconnection.sdp.rust.compare", false);
pref("media.peerconnection.sdp.rust.enabled", false);
pref("media.setsinkid.enabled", false);
pref("network.cookie.quotaPerHost", 150);
pref("network.dns.resolver-thread-extra-idle-time-seconds", 60);
pref("network.http.send_window_size", 1024);
pref("network.proxy.enable_wpad_over_dhcp", true);
pref("network.trr.disable-ECS", true);
pref("network.trr.max-fails", 5);
pref("prio.publicKeyA", "35AC1C7576C7C6EDD7FED6BCFC337B34D48CB4EE45C86BEEFB40BD8875707733");
pref("prio.publicKeyB", "26E6674E65425B823F1F1D5F96E3BB3EF9E406EC7FBA7DEF8B08A35DD135AF50");
pref("privacy.restrict3rdpartystorage.expiration", 2592000);
pref("security.csp.reporting.script-sample.max-length", 40);
pref("security.pki.mitm_detected", false);
pref("services.settings.poll_interval", 86400);
pref("services.sync.prefs.sync.browser.contentblocking.enabled", true);
pref("services.sync.prefs.sync.browser.ctrlTab.recentlyUsedOrder", true);
pref("urlclassifier.trackingAnnotationTable", "test-track-simple,base-track-digest256");
pref("urlclassifier.trackingAnnotationWhitelistTable", "test-trackwhite-simple,mozstd-trackwhite-digest256");

==REMOVED or HIDDEN

pref("accessibility.typeaheadfind.enabletimeout", true);
pref("browser.chromeURL", "chrome://browser/content/");
pref("browser.contentHandlers.types.0.title", "chrome://browser-region/locale/region.properties");
pref("browser.contentHandlers.types.0.type", "application/vnd.mozilla.maybe.feed");
pref("browser.contentHandlers.types.0.uri", "chrome://browser-region/locale/region.properties");
pref("browser.contentHandlers.types.1.title", "chrome://browser-region/locale/region.properties");
pref("browser.contentHandlers.types.1.type", "application/vnd.mozilla.maybe.feed");
pref("browser.contentHandlers.types.1.uri", "chrome://browser-region/locale/region.properties");
pref("browser.contentHandlers.types.2.title", "chrome://browser-region/locale/region.properties");
pref("browser.contentHandlers.types.2.type", "application/vnd.mozilla.maybe.feed");
pref("browser.contentHandlers.types.2.uri", "chrome://browser-region/locale/region.properties");
pref("browser.contentHandlers.types.3.title", "chrome://browser-region/locale/region.properties");
pref("browser.contentHandlers.types.3.type", "application/vnd.mozilla.maybe.feed");
pref("browser.contentHandlers.types.3.uri", "chrome://browser-region/locale/region.properties");
pref("browser.contentHandlers.types.4.title", "chrome://browser-region/locale/region.properties");
pref("browser.contentHandlers.types.4.type", "application/vnd.mozilla.maybe.feed");
pref("browser.contentHandlers.types.4.uri", "chrome://browser-region/locale/region.properties");
pref("browser.contentHandlers.types.5.title", "chrome://browser-region/locale/region.properties");
pref("browser.contentHandlers.types.5.type", "application/vnd.mozilla.maybe.feed");
pref("browser.contentHandlers.types.5.uri", "chrome://browser-region/locale/region.properties");
pref("browser.newtabpage.activity-stream.asrouter.snippetsUrl", "");
pref("browser.newtabpage.activity-stream.asrouterExperimentEnabled", false);
pref("browser.newtabpage.activity-stream.asrouterOnboardingCohort", 0);
pref("browser.newtabpage.activity-stream.feeds.theme", true);
pref("browser.newtabpage.activity-stream.section.topstories.showDisclaimer", true);
pref("browser.newtabpage.activity-stream.tippyTop.service.endpoint", "https://activity-stream-icons.services.mozilla.com/v1/icons.json.br");
pref("browser.showQuitWarning", false);
pref("devtools.browserconsole.html", false);
pref("devtools.debugger.component-stack-visible", true);
pref("devtools.debugger.features.component-stack", false);
pref("dom.animations-api.element-animate.enabled", true);
pref("extensions.webextensions.themes.enabled", true);
pref("gfx.webrender.async-scene-build", true);
pref("identity.fxaccounts.messages.enabled", false);
pref("layout.accessiblecaret.bar.enabled", false);
pref("layout.accessiblecaret.bar.width", "2.0");
pref("layout.css.all-shorthand.enabled", true);
pref("layout.css.property-append-only", false);
pref("layout.css.unset-value.enabled", true);
pref("media.ogg.flac.enabled", true);
pref("media.wmf.amd.vp9.enabled", false);
pref("network.cookie.prefsMigrated", false);
pref("privacy.trackingprotection.storagerestriction.enabled", false);
pref("services.sync.prefs.sync.browser.ctrlTab.previews", true);
pref("services.sync.prefs.sync.network.cookie.lifetime.days", true);
pref("shield.savant.loglevel", "warn");
pref("svg.marker-improvements.enabled", true);
pref("webgl.webgl2-compat-mode", false);

==CHANGED

pref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts.searchEngines", ""); // prev: "google"
pref("browser.safebrowsing.provider.mozilla.lists", "base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256,ads-track-digest256,social-track-digest256,analytics-track-digest256,fastblock1-track-digest256,fastblock1-trackwhite-digest256,fastblock2-track-digest256,fastblock2-trackwhite-digest256,fastblock3-track-digest256"); // prev: "base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256,ads-track-digest256,social-track-digest256,analytics-track-digest256"
pref("browser.translation.engine", "Google"); // prev: "bing"
pref("devtools.accessibility.enabled", true); // prev: false
pref("devtools.debugger.features.skip-pausing", true); // prev: false
pref("devtools.inspector.fonteditor.enabled", true); // prev: false
pref("devtools.inspector.fonthighlighter.enabled", true); // prev: false
pref("devtools.toolbox.selectedTool", "inspector"); // prev: "webconsole"
pref("dom.animations-api.core.enabled", true); // prev: false
pref("dom.clearSiteData.enabled", true); // prev: false
pref("dom.webcomponents.customelements.enabled", true); // prev: false
pref("dom.webcomponents.shadowdom.enabled", true); // prev: false
pref("extensions.webextensions.background-delayed-startup", true); // prev: false
pref("layout.css.prefixes.device-pixel-ratio-webkit", true); // prev: false
pref("layout.css.webkit-appearance.enabled", true); // prev: false
pref("media.av1.enabled", false); // prev: true
pref("network.trr.request-timeout", 1500); // prev: 3000
pref("network.trr.uri", "https://mozilla.cloudflare-dns.com/dns-query"); // prev: ""
pref("urlclassifier.disallow_completions", "test-malware-simple,test-harmful-simple,test-phish-simple,test-unwanted-simple,test-track-simple,test-trackwhite-simple,test-block-simple,goog-downloadwhite-digest256,base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256,goog-passwordwhite-proto,ads-track-digest256,social-track-digest256,analytics-track-digest256,fastblock1-track-digest256,fastblock1-trackwhite-digest256,fastblock2-track-digest256,fastblock2-trackwhite-digest256,fastblock3-track-digest256"); // prev: "test-malware-simple,test-harmful-simple,test-phish-simple,test-unwanted-simple,test-track-simple,test-trackwhite-simple,test-block-simple,goog-downloadwhite-digest256,base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256,goog-passwordwhite-proto,ads-track-digest256,social-track-digest256,analytics-track-digest256"

diffs enhancement task

Most helpful comment

nobody seems to really care anyway

I do, and I really appreciate your doing. :heart:

Nobody but us 2 contributes

I would, but I have to admit that I am way not as smart as you two :cry:

I am sure that most of other followers also belong to "my club" regarding upper saying. :wink: ,

All 56 comments

some bugzilla tickets

  • accessibility.typeaheadfind.enabletimeout
    Bug 260562 - Remove obsolete accessibility.typeaheadfind.enabletimeout preference.

  • accessibility.typeaheadfind.manual
    Bug 1418033 - Make it possible to disable fast find.

  • app.update.enabled
    Bug 1420514 - Remove app.update.enabled from prefs files

  • apz.allow_double_tap_zooming
    Bug 1479549 Add a pref to disable double tap zooming in APZ

  • browser.bookmarks.editDialog.showForNewBookmarks
    Bug 1459878 - Add "Show editor when saving" checkbox to the Bookmark panel.

  • browser.chrome.favicons
    Bug 1453751: Load favicons in the content process. r=mak, r=gijs, r=aswan,

  • browser.chromeURL
    Bug 1476333 - Refer to AppConstants.BROWSER_CHROME_URL to get the browser URL from the frontend;r=Gijs

  • browser.contentblocking.cookies-site-data.ui.reject-trackers.enabled
    Bug 1487178 - Ensure that the Firefox configuration is up to date for the Content Blocking project;
    Bug 1483378 - Part 5: Remove the old Cookies & Site Data UI;
    Bug 1483378 - Part 4: Enable hiding the "reject trackers" menu item based on a preference;

  • browser.contentblocking.cookies-site-data.ui.reject-trackers.recommended
    Bug 1487178 - Ensure that the Firefox configuration is up to date for the Content Blocking project;
    Bug 1483378 - Part 1: Update the Cookies and Site Data UI in the Preferences window;

  • browser.contentblocking.enabled
    Bug 1486092 - Part 1: Move the browser.contentblocking.enabled pref to StaticPrefs;
    Bug 1482281 - Sync contentblocking pref.
    Bug 1476217 - Part 1 - Update Tracking Protection preferences for Content Blocking.

  • browser.contentblocking.fastblock.control-center.ui.enabled
    Bug 1487178 - Ensure that the Firefox configuration is up to date for the Content Blocking project;
    Bug 1485199 - Add prefs for hiding the other two categories in the Content Blocking section of the Control Centre;

  • browser.contentblocking.fastblock.ui.enabled
    Bug 1487178 - Ensure that the Firefox configuration is up to date for the Content Blocking project;
    Bug 1486414 - Add prefs to hide the Trackers and FastBlock categories in the Content Blocking preferences;

  • browser.contentblocking.introCount
    Bug 1484583 - Update Tracking Protection UI tour for Content Blocking.

  • browser.contentblocking.rejecttrackers.control-center.ui.enabled
    Bug 1487178 - Ensure that the Firefox configuration is up to date for the Content Blocking project;
    Bug 1484312 - Add UI for restricting third-party cookies to the Control Centre;

  • browser.contentblocking.rejecttrackers.ui.enabled
    Bug 1487178 - Ensure that the Firefox configuration is up to date for the Content Blocking project;
    Bug 1484769 - Part 1: Update the Content Blocking section of the Preferences UI to add Third-Party Cookies options;

  • browser.contentblocking.rejecttrackers.ui.recommended
    Bug 1487178 - Ensure that the Firefox configuration is up to date for the Content Blocking project;
    Bug 1484769 - Part 1: Update the Content Blocking section of the Preferences UI to add Third-Party Cookies options;

  • browser.contentblocking.reportBreakage.enabled
    Bug 1474238 - Add a "report breakage" dialog for Tracking Protection.

  • browser.contentblocking.reportBreakage.url
    Bug 1474238 - Add a "report breakage" dialog for Tracking Protection.

  • browser.contentblocking.trackingprotection.control-center.ui.enabled
    Bug 1487178 - Ensure that the Firefox configuration is up to date for the Content Blocking project;
    Bug 1485199 - Add prefs for hiding the other two categories in the Content Blocking section of the Control Centre;

  • browser.contentblocking.trackingprotection.ui.enabled
    Bug 1487178 - Ensure that the Firefox configuration is up to date for the Content Blocking project;
    Bug 1486414 - Add prefs to hide the Trackers and FastBlock categories in the Content Blocking preferences;

  • browser.contentblocking.ui.enabled
    Bug 1476217 - Part 1 - Update Tracking Protection preferences for Content Blocking.

  • browser.contentHandlers.types.0.title
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.0.type
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.0.uri
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.1.title
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.1.type
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.1.uri
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.2.title
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.2.type
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.2.uri
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.3.title
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.3.type
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.3.uri
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.4.title
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.4.type
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.4.uri
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.5.title
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.5.type
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.contentHandlers.types.5.uri
    Bug 1477670 - remove web feed handling prefs and tidy up user-set prefs if they exist,

  • browser.ctrlTab.previews
    Bug 1473595 - Enable "Ctrl+Tab cycles through tabs in recently used order" feature by default in new profiles.

  • browser.ctrlTab.recentlyUsedOrder
    Bug 1473595 - Enable "Ctrl+Tab cycles through tabs in recently used order" feature by default in new profiles.

  • browser.fastblock.enabled
    Bug 1474280 - Part 1: Cancel timed-out trackers;
    Bug 1480443 - Enable FastBlock by default on Nightly.

  • browser.fastblock.timeout
    Bug 1474280 - Part 1: Cancel timed-out trackers;

  • browser.showQuitWarning
    Bug 1438499 - show 'close multiple tabs' warning dialog when quitting,

  • browser.startup.homepage
    Bug 721211: consolidate home page retrieval code, make it support non-localized prefs,

  • browser.tabs.remote.separatePrivilegedContentProcess
    Bug 1469072 - Add infrastructure to move Activity Stream into its own content process.

  • browser.translation.engine
    Bug 1488232 - add a Google translation backend,

  • devtools.aboutdebugging.collapsibilities.installedExtension
    Bug 1477603 - Part 3: Collapse/expand by the preferences.

  • devtools.aboutdebugging.collapsibilities.otherWorker
    Bug 1477603 - Part 3: Collapse/expand by the preferences.

  • devtools.aboutdebugging.collapsibilities.serviceWorker
    Bug 1477603 - Part 3: Collapse/expand by the preferences.

  • devtools.aboutdebugging.collapsibilities.sharedWorker
    Bug 1477603 - Part 3: Collapse/expand by the preferences.

  • devtools.aboutdebugging.collapsibilities.tab
    Bug 1477603 - Part 3: Collapse/expand by the preferences.

  • devtools.aboutdebugging.collapsibilities.temporaryExtension
    Bug 1477603 - Part 3: Collapse/expand by the preferences.

  • devtools.aboutdebugging.network-locations
    Bug 1482054 - Create module to manage network locations;r=daisuke

  • devtools.aboutdebugging.new-enabled
    Bug 1471795 - Part 1: Implement basis of 'This Firefox' page.

  • devtools.aboutdebugging.showSystemAddons
    Bug 1425347 - Hide system add-ons by default in about:debugging

  • devtools.accessibility.enabled
    Bug 1482454 - enabled accessibility panel by default.

  • devtools.browserconsole.html
    Bug 1469341 - Remove the XUL wrapper document for the Browser Console;r=nchevobbe
    Bug 1456663 - Add a preference to open webconsole.html directly in the Browser Console;r=nchevobbe

  • devtools.debugger.features.map-await-expression
    Bug 1485471 - Update Debugger Frontend v85.
    Bug 1481628 - Update Debugger Frontend v80.

  • devtools.inspector.chrome.three-pane-enabled
    Bug 1472309 - Don't enable the 3 pane inspector by default on the browser toolbox.

  • devtools.inspector.fonteditor.enabled
    Bug 1485326 - Set the Font Editor pref to true for all channels.
    Bug 1470375 - Set the font editor pref to true in Nightly builds.

  • devtools.inspector.fonthighlighter.enabled
    Bug 1486720 - Enable font highlighter.
    Bug 1440855 - New font text-run highlighter used from the font inspector

  • devtools.promote.accessibility
    Bug 1482454 - Display a "New" indicator to promote the accessibility panel.

  • devtools.responsive.leftAlignViewport.enabled
    Bug 1467572 - Part 17: Implement left alignment of viewports.

  • devtools.responsive.show-setting-tooltip
    Bug 1467572 - Part 18: Show an onboarding tooltip for the setting menu button in RDM.

  • devtools.toolbox.selectedTool
    Bug 1471952 - change default tool to Inspector

  • dom.animations-api.compositing.enabled
    Bug 1471814 - Add a preference for {Document,Element}.getAnimations();

  • dom.animations-api.core.enabled
    Bug 1476158 - Enable dom.animations-api.core.enabled on beta/release;
    Bug 1471814 - Add a preference for {Document,Element}.getAnimations();

  • dom.animations-api.element-animate.enabled
    Bug 1475162 - Drop dom.animations-api.element-animate.enabled pref;

  • dom.animations-api.getAnimations.enabled
    Bug 1471814 - Add a preference for {Document,Element}.getAnimations();

  • dom.animations-api.implicit-keyframes.enabled
    Bug 1471814 - Add a preference for {Document,Element}.getAnimations();

  • dom.animations-api.timelines.enabled
    Bug 1471814 - Add a preference for Web Animations timelines;

  • dom.clearSiteData.enabled
    Bug 1268889 - Implement Clear-Site-Data header - part 2 - pref,

  • dom.datatransfer.mozAtAPIs
    Bug 1453153 - Initial removal of moz* APIs in DataTransfer,

  • dom.events.asyncClipboard
    Bug 1479935 - Enable async clipboard readText and writeText APIs by default,
    Bug 1461465 - Implement async Clipboard APIs

  • dom.events.asyncClipboard.dataTransfer
    Bug 1461465 - Implement async Clipboard APIs

  • dom.events.testing.asyncClipboard
    Bug 1461465 - Implement async Clipboard APIs

  • dom.ipc.keepProcessesAlive.privileged
    Bug 1469072 - Add infrastructure to move Activity Stream into its own content process.

  • dom.ipc.processCount.privileged
    Bug 1469072 - Add infrastructure to move Activity Stream into its own content process.

  • dom.payments.defaults.saveAddress
    Bug 1477106 - Use a pref to set default checkedness for "Save card to Firefox" and "Save address to Firefox" checkboxes.

  • dom.payments.defaults.saveCreditCard
    Bug 1477106 - Use a pref to set default checkedness for "Save card to Firefox" and "Save address to Firefox" checkboxes.

  • dom.payments.response.timeout
    Bug 1447773 - Time out PaymentResponse after 5 seconds.

  • dom.pointer-lock.enabled
    Bug 1486297 - Add a pref for Pointer Lock API so that user can disable it.

  • dom.ua_widget.enabled
    bug 1431255, disable ua widgets, since they break tests when shadow DOM is enabled,
    Bug 1431255 - Part I, Add dom.ua_widget.enabled pref and enable for Desktop Nightly only

  • dom.visualviewport.enabled
    Bug 1357785 - Expose the Visual Viewport API to web content.

  • dom.vr.process.enabled
    Bug 1430038 - Part 1: Add VR process to the process list;

  • dom.vr.service.enabled
    Bug 1466699 - Implement VRService thread

  • dom.webcomponents.customelements.enabled
    Bug 1471947, bug 1471948 - Enable Shadow DOM and Custom Elements in release builds,

  • dom.webcomponents.shadowdom.enabled
    Bug 1471947, bug 1471948 - Enable Shadow DOM and Custom Elements in release builds,
    Bug 1471814 - Add a preference for {Document,Element}.getAnimations();
    Bug 1460069 - enable Shadow DOM in Nightly,

  • dom.webgpu.enable
    Bug 1469376 - Initial stubs for WebGPU sketch API. -

  • editor.inline_table_editing.enabled_by_default
    Bug 1449564 - part 4: Make users can show Gecko specific editing UIs with new prefs

  • editor.positioning.enabled_by_default
    Bug 1449564 - part 4: Make users can show Gecko specific editing UIs with new prefs

  • editor.resizing.enabled_by_default
    Bug 1449564 - part 4: Make users can show Gecko specific editing UIs with new prefs

  • extensions.getAddons.langpacks.url
    Bug 1429610 Add internal api to look up available language packs

  • extensions.webextensions.background-delayed-startup
    Bug 1457224 Enable delayed background page startup on Nightly

  • extensions.webextensions.enablePerformanceCounters
    Bug 1468550 - Track webextension activity -

  • extensions.webextensions.themes.enabled
    Bug 1477775 - Remove extensions.webextensions.themes.enabled preference.

  • gfx.webrender.async-scene-build
    Bug 1474576 - Remove the async scene building pref.
    Bug 1452845 - Turn on async scene building by default.

  • gfx.webrender.debug.show-overdraw
    Bug 1485538 - Expose WebRender's "show overdraw" debug mode behind a pref.

  • gfx.webrender.dl.dump-content
    Bug 1475637 - Add a mechanism for dumping an interleaved display list.

  • gfx.webrender.dl.dump-parent
    Bug 1475637 - Add a mechanism for dumping an interleaved display list.

  • gfx.webrender.force-disabled
    Bug 1463911 - Add a pref to force-disable WR.

  • identity.fxaccounts.autoconfig.uri
    Bug 1480815 - Define fxa autoconfig pref by default.

  • identity.fxaccounts.commands.enabled
    Bug 1484461 - Disable FxA commands
    Bug 1483979 - Enable fxa commands
    Bug 1466933 - Implement FxA commands.

  • identity.fxaccounts.messages.enabled
    Bug 1466933 - Implement FxA commands.
    Bug 1442133 - FxA messages client implementation.

  • intl.multilingual.enabled
    Bug 1469684 - Allow switching between installed locales

  • intl.tsf.hack.allow_to_stop_hacking_on_build_17643_or_later
    Bug 1481153 - part 4: Should stop hacking the result of TSFTextStore::GetTextExt() when Win10 build 17643 only in Nightly or early Beta

  • io.activity.enabled
    Bug 1470073 - Make IOActivityMonitor timer optional -

  • layout.accessiblecaret.bar.enabled
    Bug 1347048 - Remove AccessibleCaret's selection bar support.

  • layout.accessiblecaret.bar.width
    Bug 1347048 - Remove AccessibleCaret's selection bar support.

  • layout.css.all-shorthand.enabled
    Bug 1459524 - Removed layout.css.all-shorthand.enabled pref -

  • layout.css.motion-path.enabled
    Bug 1429298 - Part 7: Tests.
    Bug 1429298 - Part 1: Define the preference for motion-path.

  • layout.css.moz-document.url-prefix-hack.enabled
    Bug 1448225 - Convert StylePrefs to StaticPrefs.

  • layout.css.offset-logical-properties.enabled
    Bug 1464782: Put offset-* aliases behind a pref.

  • layout.css.overflow.moz-scrollbars.enabled
    Bug 1481125 - Put overflow: -moz-scrollbar-* behind pref.

  • layout.css.overflow-break.intrinsic-size
    Bug 1484587 - Put the behavior that overflow-wrap: break-word affecting intrinsic size behind a pref and disable it by default.

  • layout.css.prefixes.device-pixel-ratio-webkit
    Bug 1448225 - Convert StylePrefs to StaticPrefs.

  • layout.css.property-append-only
    Bug 1473180 part 3 - Use the new algorithm for setting property.
    Bug 1461285 part 3 - Have the CSSOM appending behavior behind a pref and only enable it on Nightly.

  • layout.css.scrollbar-width.enabled
    Bug 1475033 part 3 - Add scrollbar-width property.

  • layout.css.unknown-webkit-pseudo-element
    Bug 1424106 - Accept unknown webkit pseudo-element.

  • layout.css.unset-value.enabled
    Bug 1211330 - Removed CSS pref layout.css.unset-value.enabled -

  • layout.css.use-counters.enabled
    Bug 1425700 - Hook the use counters into StyleSheet parsing.

  • layout.css.webkit-appearance.enabled
    Bug 1428676 pt 4. Move pref layout.css.webkit-appearance.enabled to StaticPrefList.h.
    Bug 1429713 part 1 - Add a -webkit-appearance alias for -moz-appearance (behind a pref).

  • layout.css.xul-box-display-values.content.enabled
    Bug 1477553: Hide display: -moz-box|-moz-inline-box from content on Nightly and early beta.

  • layout.css.xul-tree-pseudos.content.enabled
    Bug 1480054: Restrict XUL tree pseudos on nightly and early-beta.

  • media.allowed-to-play.enabled
    Bug 1478208 - Implement HTMLMediaElement.allowedToPlay.

  • media.autoplay.allow-extension-background-pages
    Bug 1466926 - part2 : add a new preference to control autoplay from background script.

  • media.autoplay.allow-muted
    Bug 1477477 - Add preference for autoplaying muted media.

  • media.autoplay.ask-permission
    Bug 1476853 - Enable block autoplay on Nightly only on desktop.
    Bug 1463919 - Have HTMLMediaElement ask for autoplay permission when playback otherwise blocked.

  • media.autoplay.block-event.enabled
    Bug 1463919 - Tests for prompting for permission to autoplay.

  • media.autoplay.block-webaudio
    Bug 1476853 - Don't block WebAudio autoplay by default.

  • media.autoplay.default
    Bug 1470082 - Change autoplay checkbox to combobox.
    Bug 1476853 - Enable block autoplay on Nightly only on desktop.

  • media.autoplay.enabled
    Bug 1470082 - Change autoplay checkbox to combobox.
    Bug 1476853 - Enable block autoplay on Nightly only on desktop.

  • media.autoplay.enabled.user-gestures-needed
    Bug 1476853 - Enable block autoplay on Nightly only on desktop.

  • media.av1.enabled
    Bug 1476975 - P1. Make media.av1.enabled pref public.

  • media.benchmark.vp9.fps
    Bug 1409664 - P24. Make IsVP9DecodeFast usable on any thread.

  • media.benchmark.vp9.versioncheck
    Bug 1409664 - P24. Make IsVP9DecodeFast usable on any thread.

  • media.media-capabilities.enabled
    Bug 1480190 - Enable media-capablities extension by default.
    Bug 1482243 - Place Screen's MediaCapabilities behind a different pref.
    Bug 1409664 - P1. Add MediaCapabilities skeleton IDL.

  • media.media-capabilities.screen.enabled
    Bug 1482243 - Place Screen's MediaCapabilities behind a different pref.

  • media.ogg.flac.enabled
    Bug 1448222 - Remove MediaPrefs.
    Bug 1409664 - P6. Remove flac in ogg preference.

  • media.peerconnection.sdp.rust.compare
    Bug 1477072: Enabled media.peerconnection.sdp.rust.enabled in Nightly,
    Bug 1476750: Updated preferences controlling Rust SDP Parse behavior,

  • media.peerconnection.sdp.rust.enabled
    Bug 1477072: Enabled media.peerconnection.sdp.rust.enabled in Nightly,
    Bug 1476750: Updated preferences controlling Rust SDP Parse behavior,

  • media.setsinkid.enabled
    Bug 1152401 - Create pref to enable enumeration of output devices.

  • media.wmf.amd.vp9.enabled
    Bug 1470754 - Remove AMD VP9 MFT support
    Bug 1461268 - P1. Disable AMD VP9 decoder.

  • network.cookie.lifetime.days
    Bug 1457170 - Get rid of nsICookieService::ACCEPT_FOR_N_DAYS,

  • network.cookie.prefsMigrated
    Bug 1430095 - Get rid of network.cookie.prefsMigrated, network.cookie.lifetime.enabled and network.cookie.lifetime.behavior prefs,

  • network.cookie.quotaPerHost
    Bug 1357676 - Implement batch eviction

  • network.dns.resolver-thread-extra-idle-time-seconds
    Bug 1478732 - Change nsHostResolver to dispatch one resolver task per native lookup
    Bug 1471280 - Add new pref for how much longer resolver threads should remain idle

  • network.http.send_window_size
    Bug 1280629 - Part 1: Suspend the http channel if the child process is not able to consume on time.

  • network.proxy.enable_wpad_over_dhcp
    Bug 356831 - Proxy autodiscovery doesn't check DHCP (option 252)

  • network.trr.disable-ECS
    bug 1466462 - TRR: disable EDNS Client Subnet by default

  • prio.publicKeyA
    Bug 1421501 - WebIDL and DOM for PrioEncoder

  • prio.publicKeyB
    Bug 1421501 - WebIDL and DOM for PrioEncoder

  • privacy.restrict3rdpartystorage.expiration
    Bug 1475236 - Expiration time for the anti-tracking permission should be controllable via pref,

  • privacy.trackingprotection.storagerestriction.enabled
    Bug 1470578 - Rename the anti-tracking pref,
    Bug 1461921 - Block storage access for third-parties on the tracking protection list - part 1 - Pref and Blocking check,

  • privacy.trackingprotection.ui.enabled
    Bug 1476879 - Remove the privacy.trackingprotection.ui.enabled pref.

  • security.csp.enable_violation_events
    Bug 1476820 - Convert some VarCache prefs in dom/security/ to use StaticPrefs.

  • security.pki.mitm_detected
    Bug 1480704 - Detect the presents of a MITM.

  • services.blocklist.update_enabled
    Bug 1458917 - Register dedicated timer for Remote Settings

  • services.settings.poll_interval
    Bug 1458917 - Register dedicated timer for Remote Settings

  • services.sync.prefs.sync.browser.contentblocking.enabled
    Bug 1482281 - Sync contentblocking pref.

  • services.sync.prefs.sync.browser.ctrlTab.previews
    Bug 1473595 - Enable "Ctrl+Tab cycles through tabs in recently used order" feature by default in new profiles.

  • services.sync.prefs.sync.browser.ctrlTab.recentlyUsedOrder
    Bug 1473595 - Enable "Ctrl+Tab cycles through tabs in recently used order" feature by default in new profiles.

  • services.sync.prefs.sync.network.cookie.lifetime.days
    Bug 1457170 - Get rid of nsICookieService::ACCEPT_FOR_N_DAYS,

  • shield.savant.enabled
    Bug 1457226 - Revert Savant Shield study commits;

  • shield.savant.loglevel
    Bug 1457226 - Revert Savant Shield study commits;

  • svg.marker-improvements.enabled
    Bug 1479272 - remove svg.marker-improvements.enabled pref

  • urlclassifier.trackingAnnotationTable
    Bug 1461515 - Split tracking annotations from tracking protection.

  • urlclassifier.trackingAnnotationWhitelistTable
    Bug 1461515 - Split tracking annotations from tracking protection.

  • webgl.webgl2-compat-mode
    Bug 1482301 - Remove webgl.webgl2-compat-mode.

pref("privacy.restrict3rdpartystorage.expiration", 2592000);

That's a max age of 30 days

btw how do you grab the prefs ?

with a fixed and slightly edited version of this

63b11 changes since 63b4

new

pref("browser.contentblocking.allowlist.annotations.enabled", true);
pref("browser.contentblocking.allowlist.storage.enabled", true);
pref("browser.contentblocking.global-toggle.enabled", true);
pref("browser.contentblocking.reportBreakage.enabled", false); // true in 63b4
pref("browser.fastblock.limit", 0);
pref("browser.newtabpage.activity-stream.asrouter.devtoolsEnabled", false);
pref("browser.newtabpage.activity-stream.asrouter.messageProviders", string); // string in 63b4
pref("dom.window.event.enabled", false);
pref("editor.inline_table_editing.enabled_by_default", true); // false in 63b4
pref("editor.positioning.enabled_by_default", true); // false in 63b4
pref("editor.resizing.enabled_by_default", true); // false in 63b4
pref("intl.tsf.hack.allow_to_stop_hacking_on_build_17643_or_later", false); // true in 63b4
pref("layout.css.xul-box-display-values.content.enabled", true); // false in 63b4
pref("layout.css.xul-tree-pseudos.content.enabled", true); // false in 63b4
pref("services.sync.engine.bookmarks.validation.enabled", true);
pref("services.sync.engine.passwords.validation.enabled", true);

removed

pref("browser.newtabpage.activity-stream.asrouterExperimentEnabled", false);
pref("geo.provider.ms-windows-location", false);

changed

pref("browser.newtabpage.activity-stream.telemetry.ut.events", true); // prev: false
pref("browser.safebrowsing.provider.mozilla.lists", long-string); // prev: long-string
pref("dom.keyboardevent.dispatch_during_composition", true); // prev: false
pref("font.name-list.sans-serif.zh-TW", font-list); // prev: "Arial, PMingLiU, MingLiU, MingLiU-ExtB"
pref("geo.wifi.uri", "https://location.services.mozilla.com/..."); // prev: "https://www.googleapis.com/..."
pref("layout.css.moz-document.url-prefix-hack.enabled", false); // prev: true
pref("network.tcp.tcp_fastopen_enable", true); // prev: false
pref("urlclassifier.disallow_completions", long-string); // prev: long-string

EDIT: updated 1st post

browser.contentblocking.* - We don't need to do anything with these IMO

@fmarier "browser.contentblocking.reportBreakage.enabled" - reporting breakage: is that user initiated (i.e not automatic)? TIA

we should enforce browser.contentblocking.enabled=true because cookie blocking doesn't work if it's set to false. I tend to agree that we can ignore the rest of browser.contentblocking.*, at least for now.

"browser.contentblocking.reportBreakage.enabled" - reporting breakage: is that user initiated (i.e not automatic)?

It controls whether or not the "report broken site" button shows up. It doesn't send anything unless the user clicks on it and submits a breakage report.

Is browser.contentblocking.ui.enabled meant to be false. 1476217 and gets flipped in 64?

do we want to do something about AS? disable snippets, pocket and telemetry maybe, just in case?

user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
user_pref("browser.newtabpage.activity-stream.telemetry", false);
user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");

They're working on making media autoplay default-prompt but IDK if it will land in FF63 or not.
If it doesn't land I'd say we just keep blocking autoplay for now. Once it lands we can comment it out and use FF's default-prompt.

As for the rest do you see anything we should add? I don't

FYI: am kinda super uber tied up for a few days. Will wait for earthlng's final diff and will get onto this in about 3 or 4 days. Feel free to move shit to the ignore pile

new items that pique my interest by name alone (i know some at default false)

  • browser.tabs.remote.separatePrivilegedContentProcess
  • dom.datatransfer.mozAtAPIs
  • dom.webgpu.enable
  • holy crap there's a massive spider 2 feet away from me on the wall
  • dom.window.event.enabled
  • network.http.send_window_size
  • network.proxy.enable_wpad_over_dhcp
  • privacy.restrict3rdpartystorage.expiration

But yeah, not much here TBH. If you feel like doing the deprecated commit (and perhaps update the sticky issue) that would be cool

:spider: update: he's now 4 feet away

moved from new to ignore

pref("devtools.aboutdebugging.network-locations", "[]");
pref("devtools.aboutdebugging.new-enabled", false);
pref("devtools.aboutdebugging.showSystemAddons", false);
pref("dom.animations-api.compositing.enabled", false);
pref("dom.animations-api.getAnimations.enabled", false);
pref("dom.animations-api.implicit-keyframes.enabled", false);
pref("dom.animations-api.timelines.enabled", false);
pref("dom.vr.process.enabled", false);
pref("dom.vr.service.enabled", false);
pref("extensions.getAddons.langpacks.url", "https://services.addons.mozilla.org/api/v3/addons/language-tools/?app=firefox&type=language&appversion=%VERSION%");
pref("extensions.webextensions.enablePerformanceCounters", false);
pref("identity.fxaccounts.autoconfig.uri", "");
pref("identity.fxaccounts.commands.enabled", false);
pref("layout.css.motion-path.enabled", false);
pref("layout.css.offset-logical-properties.enabled", false);
pref("layout.css.overflow.moz-scrollbars.enabled", false);
pref("layout.css.overflow-break.intrinsic-size", false);
pref("layout.css.scrollbar-width.enabled", false);
pref("layout.css.unknown-webkit-pseudo-element", false);
pref("layout.css.use-counters.enabled", false);
pref("layout.css.xul-box-display-values.content.enabled", true);
pref("layout.css.xul-tree-pseudos.content.enabled", true);
pref("media.benchmark.vp9.fps", 0);
pref("media.benchmark.vp9.versioncheck", 0);
pref("media.peerconnection.sdp.rust.compare", false);
pref("media.peerconnection.sdp.rust.enabled", false);
pref("network.cookie.quotaPerHost", 150);
pref("network.dns.resolver-thread-extra-idle-time-seconds", 60);
pref("security.csp.reporting.script-sample.max-length", 40);

also

pref("apz.allow_double_tap_zooming", true);
pref("browser.ctrlTab.recentlyUsedOrder", true);
pref("browser.fastblock.enabled", false);
pref("browser.fastblock.limit", 0);
pref("browser.fastblock.timeout", 5000);
pref("dom.events.asyncClipboard", true);
pref("dom.events.asyncClipboard.dataTransfer", false);
pref("dom.events.testing.asyncClipboard", false);
pref("dom.payments.response.timeout", 5000);

/* 0513: disable Follow On Search (FF53+)
 * Just DELETE the XPI file in your System Add-ons directory
 * [1] https://blog.mozilla.org/data/2017/06/05/measuring-search-in-firefox/ ***/

follow-on-search is now builtin in FF63 as well ie no longer a system addon. Remove 0513 ? Deleting unwanted SAs is already mentioned in the header anyway.

Leave it in for ESR60?, just change it to (FF53-62)?

follow-on-search is now builtin in FF63 as well ie no longer a system addon

Please tell me there is a way to disable this shit. I don't want any counting of engine use or anything locally - and yeah, can you tell me for sure that the channel used to send this is totally fucking off. PS: all my engines are self added, not the defaults, does this help?


Also, just quietly, devtools.aboutdebugging.showSystemAddons (under ignore new) is default false. Wouldn't this be better as true? We could still stick it under system addons, eg 0507 or something - yeah/no?

I think it's behind the telemetry flags now and only works on builtin SE's anyway.

I doubt that too many of our users would ever debug system addons, IDK.

man I'm having a hard time following your PR. I'll add the deprecated items to the deprecated sticky first. Then I'll download and do a diff locally (using the github compare sucks a tad). Then assuming all is well I will squash and merge, and then we can discuss the issues you raised in it, cuz I am confused :)

I doubt that too many of our users would ever debug system addons, IDK.

I'm in there sometimes, and it's a nice way to spot if you forgot to delete the xpis. But IDK, overkill

yeah IDK. We can list it at the top "for visibility" so those few who're interested might see it.
System addons become less and less of an issue because FF64 also removed onboarding and Pocket will be builtin. Only 4 left in FF64 atm: 2 webcompat, autofill and screenshots. No idea why the new Firefox Monitor doesn't show up for me, maybe they're not bundling it on purpose for some reason, IDK

63.0 changes since 63b11

new

pref("browser.contentblocking.fastblock.control-center.ui.enabled", false); true in 63b11
pref("browser.contentblocking.fastblock.ui.enabled", false); true in 63b11
pref("browser.contentblocking.global-toggle.enabled", false); true in 63b11
pref("browser.contentblocking.rejecttrackers.reportBreakage.enabled", true);
pref("browser.contentblocking.ui.enabled", true); false in 63b11
pref("network.trr.max-fails", 5);

changed

pref("app.update.channel", "beta"); // prev: "release"
pref("app.update.url.details", "https://www.mozilla.org/%LOCALE%/firefox/beta/notes"); // prev: "https://www.mozilla.org/%LOCALE%/firefox/notes"
pref("app.update.url.manual", "https://www.mozilla.org/firefox/beta"); // prev: "https://www.mozilla.org/firefox/"
pref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts", true); // prev: false
pref("network.trr.request-timeout", 1500); // prev: 3000
pref("network.trr.uri", "https://mozilla.cloudflare-dns.com/dns-query"); // prev: ""
pref("toolkit.telemetry.enabled", true); // prev: false

EDIT: updated 1st post

because FF64 also removed onboarding and Pocket

Well at least those two have a pref (for now, touch wood). I'm starting to feel like system addon's are test beds (with system addon updates). Maybe it's mandate changed. I thought it's original purpose was for something else. OK, I'll just shove that pref to the list for visibility - DONE

PS: with your 63.0 changes since 63b11 in the post above, I'll leave OP alone so you can work your magic

No idea why the new Firefox Monitor doesn't show up for me

I guess it will turn up in major releases (probably point releases). And I'm on portable which is a complete package each time, and it hasn't shown yet from memory (not sure if in 62.0.3).

I actually thought that it was pushed via system addon updates (outside of full installs) - do you have user_pref("extensions.systemAddon.update.url blanked?

Do we need to do anything with F Monitor? Is there a pref, or does it do nothing unless you sign up for it?

follow-on-search is now builtin in FF63 as well ie no longer a system addon

Leave it in for ESR60?, just change it to (FF53-62)?

I'd just remove it. Removing unwanted SAs is mentioned in the section header and the link ... meh.
AFAIK follow-on-search just adds utm=ff or something like that to 2ndary etc searches on builtin SEs like google etc. It funds mozilla and is actually a nice way to support them IMO. And it doesn't cost you anything like fe. donations would. The engines already know that someone is using FF anyway.

do you have user_pref("extensions.systemAddon.update.url blanked?

yes

Do we need to do anything with F Monitor? Is there a pref, or does it do nothing unless you sign up for it?

IDK I haven't looked at it yet. I don't think you need to sign up for it though

what about - TWO: DELETE the XPI file in your System Add-ons directory (note this get reinstalled on app updates) in 0514? That can go as well IMO

^^ well we need to deal to AS overall don't we, since it's no longer a SA?

I'm just about to push the deprecated. Need coffee, and then we can look at what else. Start moving more crap to ignore if you like, but no hurry man - we finish this in our own time.

part 2: says to sign up

well yes if you want to be notified for future breaches but you can also just re-check from time to time without signing up

extensions.systemAddon.update.url blanked = yes: well, there's why then

all I was saying is that it doesn't appear to be bundled atm. I've updated my testing nightly and it wasn't even bundled there, that's all I know.

FF search: do you mean to the deprecated section or entirely?

entirely remove it. Without a pref to it there's no need to move it to 9999 IMO

^ OK. AFAIK F Monitor wouldn't "do" anything unless it had your details. IDK, maybe it tries to grab it from forms?

If you go to https://github.com/ghacksuserjs/ghacks-user.js - do you see environments in the top nav, after commits, branches, releases ? WTF is an environment. It's only just shown up (IDK, in the last week maybe?)

https://blog.mozilla.org/futurereleases/2018/06/25/testing-firefox-monitor-a-new-security-tool/

In the meantime, check out and download the latest version of Firefox Quantum for the desktop in order to use the Firefox Monitor feature when it becomes available.

probably just hasn't been rolled out to everyone yet and therefore not bundled either

be4 I forget: do we need to do anything with the 2 checkbox options for 3rd party cookies? I haven't got a 63 set up here to check what prefs the options control:

No. they're controlled by network.cookie.cookieBehavior

/* 0514: disable Activity Stream (FF54+)
 * Activity Stream is the default homepage/newtab in FF57+. It is based on metadata and browsing behavior,
 * and includes telemetry and web content such as snippets, top stories (pocket), top sites, etc.
 *  - ONE: make sure to set your "home" and "newtab" to about:blank (or use an extension to control them)
 *  - TWO: DELETE the XPI file in your System Add-ons directory (note this get reinstalled on app updates)
 * And/or you can try to control the ever-growing, ever-changing "browser.newtabpage.activity-stream.*" prefs
 * [FF63+] Activity Stream (AS) is now builtin and no longer an easily deletable system addon!
 *     We'll clean this up and move to a new number when ESR67 is released.
 * [1] https://wiki.mozilla.org/Firefox/Activity_Stream
 * [2] https://www.ghacks.net/2016/02/15/firefox-mockups-show-activity-stream-new-tab-page-and-share-updates/ ***/
user_pref("browser.library.activity-stream.enabled", false); // (FF57+)
/* 0514a: disable AS Snippets ***/
user_pref("browser.newtabpage.activity-stream.disableSnippets", true);
user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); // [SETTING] Home>Firefox Home Content>Snippets
/* 0514b: disable AS Top Stories and other Pocket-based and/or sponsored content ***/
user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false); // [SETTING] Home>Firefox Home Content>Highlights>Pages Saved to Pocket
user_pref("browser.newtabpage.activity-stream.showSponsored", false);
/* 0514c: disable AS telemetry ***/
user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
user_pref("browser.newtabpage.activity-stream.telemetry", false);
user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");

I think we need more than this, but it's a start :+1: just commit it

if you're thinking of browser.newtabpage.activity-stream.asrouterExperimentEnabled, that was removed in 63 and is even listed under "removed, renamed or hidden"

no, I was thinking of other prefs that still allow "things to happen" (even if only locally = persistent data) as per one other previous thread which I can't find, but its old now, and I think we should revisit AS in totality at some stage in the near future, and the whole AS morphs too fast to keep track, and at the time we just said "delete the xpi"

Speaking of which, we should drop that line, because as you said, its in the header section. But wait .. there's MOAR. We do not need to keep anything for ESR users. ESR users are on v60, and we have an archived 60 for them. Case in point - you removed the FollowOn Search entry. I don't like the AS section at all now - it's as messy AF. We either do it now (move to proper section), or create a new ticket to do it after beta - please advise

IMO it can wait until ESR67 but if you want to change it now go for it

Some AS entries were discussed on #396

Should we rename Tracking Protection in the user,js to Content Blocking (or at least append it)?

/* 0426: enforce Content Blocking (required to block cookies) (FF63+) ***/
user_pref("browser.contentblocking.enabled", true); // default: true
  • Where do we put this? I think it should be under hardware because most of it falls back to that - e.g. battery(it was in the spec)?, resolutions, gpu info(?) etc
  • Do we really need the second pref? (I assume the first is a master switch, and even then, the second is false and we could add it if they ever flip it)
  • It's all a bit vague on the FP'ing side of things and IANAExpert. I guess since it's only just been enabled, it's early days and we could block it with lilttle to no breakage. Here are some RFPs required for Media Capabilities. But overall, from most of my reading, it seems most of this is already available (but is it protected? eg screen res).
/* 2517: disable Media Capabilities API (FF63+)
 [1] https://github.com/WICG/media-capabilities
 [2] https://wicg.github.io/media-capabilities/#security-privacy-considerations ***/
user_pref("media.media-capabilities.enabled", false);
user_pref("media.media-capabilities.screen.enabled", false); // default: false

Should we rename Tracking Protection in the user,js to Content Blocking (or at least append it)?

rename: IMO no because TP is 1 part of Content Blocking. append: sure, why not

Where do we put this?

yeah under HW makes sense. But I'm not sure if we should add this at all. We keep disabling stuff because it could theoretically be used for FPing while there's no indication that it's really used that way. But disabling it definitely puts us in a very small group. I'm not sure if there's really anything too unique that could be gathered from MC because most devices will have similar capabilities.
The sad thing is that it looks like they have a patch ready to address these issues in MC since 5 months but it's just sitting there waiting to be looked at and commited :(

Do we really need the second pref?

no we can ignore the 2nd pref

we could add it if they ever flip it

that's assuming we keep doing the diffs. This issue is 2 months old and FF63 is out for almost 3 weeks now and we're still working on it. Do we really want to continue doing the ToDo: Diffs issues if we can't finish them in time for a new FF release? Nobody but us 2 contributes and nobody seems to really care anyway.

ps: other things off the top of my head that make us pretty unique for no good reason IMHO ...

  • security.tls.version.min = 3
  • full-screen-api.enabled = false

nobody seems to really care anyway

I do, and I really appreciate your doing. :heart:

Nobody but us 2 contributes

I would, but I have to admit that I am way not as smart as you two :cry:

I am sure that most of other followers also belong to "my club" regarding upper saying. :wink: ,

Well, TBH, we (pants and earthlng) do what we do when we do it. The time frame is not set in concrete. The last commit to do with these diffs was 15 days ago (AS stuff), and all that's been left are the two prefs, one of which is at default, and the other we're not even sure on. The master copy is always the up to date version (but I get it, some people might wait for a release).

Yup, it would be nice to always pump these out within a few days, but shit happens (as per my email). I/we could have wrapped this up weeks ago, except I was actually kind of thinking "blah, lets see what happens when I (we) do nothing". Seems at times we're not appreciated.

That said, if the information is there (i.e the diffs are generated), then it will be actioned - build it and they shall come. This release has just been a bit of a bad time personally. But yeah, I too feel like WTF, why bother anymore.

Anyway, lets wrap this puppy up. I have some questions (see next post).

Content Blocking (required to block cookies) (FF63+) - is this required for ANY control of cookies (and said related localStorage), i.e network.cookie.cookieBehavior could be any value - i.e all cookies now go thru CB?

@fmarier for good measure edit: i.e browser.contentblocking.enabled=true

re MC API, I am inclined to disable it for now. Now that it's hit 63, maybe they can get on with those RFP patches (which I am sure will be before the next ESR cycle). It's new (so just imagine you're on ESR and it doesn't exist) so I doubt it will affect end users for quiet a while - we can always revisit it. And we already disable HWA, and DRM/GMP stuff, and I imagine this already affects it? I'd rather be consistent just for now.

actually, I reopen it - if you're happy then close it, and I'll take that as a signal to create a release

is this (browser.contentblocking.enabled) required for ANY control of cookies

yes. It's the master switch for content blocking which atm is TP and cookie-blocking.
Because we have the cookie part in another section I wouldn't add Content-Blocking to the header or subheader in 0400. This pref was also removed again in FF65 and we can delete it from the user.js for FF65 because nobody needs it anymore then and it's not in ESR either. (or Waterfox, etc)

That said, if the information is there (i.e the diffs are generated), then it will be actioned

creating the diffs is easy, actioning them is the tedious part but okay I'll create a issue for the current 64 beta diff and we'll see how it goes.

So why bother to add the pref in the first place. I'll remove it then.

If you really want it in, then lets add in under 2707 for two releases?

I think more people disable TP than cookie-blocking and that's why it fits better under 0400 IMO.
Let's add it for 2 releases to make sure cookie blocking (and TP) works as expected.

done, can we do a release now?

yes please, it's about time :)

wot the heck man? I've been waiting on you for ages now :trolleybus:

nobody seems to really care anyway

I do care and I also appreciate new people coming here, like Mr. bogachenko.

Was this page helpful?
0 / 5 - 0 ratings

Related issues

Thorin-Oakenpants picture Thorin-Oakenpants  路  4Comments

Just-me-ghacks picture Just-me-ghacks  路  6Comments

Thorin-Oakenpants picture Thorin-Oakenpants  路  4Comments

crssi picture crssi  路  3Comments

earthlng picture earthlng  路  6Comments