FF77 is scheduled for release June 2nd
FF77 release notes [when ready]
[FF77 for developers](https://developer.mozilla.org/docs/Mozilla/Firefox/Releases/77)
FF77 compatibility
FF77 security advisories
109 diffs ( 58 new, 33 gone, 18 different )
ALL DONE - https://github.com/ghacksuserjs/ghacks-user.js/commit/f6e6de844430fa64440ae230061720839e8282be
0850e pref("browser.urlbar.oneOffSearches", true); - 16289262605 pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false); - 1603007==NEW ==REMOVED or HIDDEN ==CHANGEDclick me for details
pref("accessibility.ARIAReflection.enabled", false);
pref("apz.windows.force_disable_direct_manipulation", true);
pref("browser.find.anonymous_content.enabled", true);
pref("browser.newtabpage.activity-stream.asrouter.providers.messaging-experiments", "{\"id\":\"messaging-experiments\",\"enabled\":true,\"type\":\"remote-experiments\",\"messageGroups\":[\"cfr\",\"whats-new-panel\",\"moments-page\",\"snippets\",\"cfr-fxa\"],\"updateCycleInMs\":3600000}");
pref("browser.tabs.documentchannel.parent-initiated", true);
pref("browser.tabs.documentchannel.ppdc", true);
pref("browser.urlbar.restyleSearches", false);
pref("devtools.contenttoolbox.webconsole.input.context", false);
pref("devtools.debugger.features.frame-step", true);
pref("devtools.experiment.f12.shortcut_disabled", false);
pref("devtools.inspector.compatibility.target-browsers", "");
pref("dom.security.https_only_mode.upgrade_onion", false);
pref("dom.security.https_only_mode_ever_enabled", false);
pref("dom.window.content.untrusted.enabled", true);
pref("editor.truncate_user_pastes", false);
pref("extensions.blocklist.addonItemURL", "https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/");
pref("extensions.blocklist.useMLBF", false);
pref("extensions.blocklist.useMLBF.stashes", false);
pref("gfx.vsync.force-disable-waitforvblank", false);
pref("gfx.webrender.gl-debug-message-critical-note", false);
pref("gfx.webrender.gl-debug-message-print", false);
pref("gfx.webrender.use-optimized-shaders", true);
pref("identity.sync.useOAuthForSyncToken", false);
pref("image.avif.enabled", false);
pref("image.honor_orientation_metadata.natural_size", true);
pref("image.honor-orientation-metadata", true);
pref("javascript.options.mem.gc_high_frequency_large_heap_growth", 150);
pref("javascript.options.mem.gc_high_frequency_small_heap_growth", 300);
pref("javascript.options.mem.gc_large_heap_incremental_limit", 110);
pref("javascript.options.mem.gc_large_heap_size_min_mb", 500);
pref("javascript.options.mem.gc_small_heap_incremental_limit", 140);
pref("javascript.options.mem.gc_small_heap_size_max_mb", 100);
pref("javascript.options.wasm_reftypes", true);
pref("layout.css.grid-template-masonry-value.enabled", false);
pref("layout.css.is-where-selectors.enabled", false);
pref("media.getdisplaymedia.enabled", true);
pref("media.testing-only-events", false);
pref("network.data.max-uri-length-mobile", 2097152);
pref("pdfjs.enablePermissions", false);
pref("privacy.restrict3rdpartystorage.expiration_visited", 2592000);
pref("privacy.restrict3rdpartystorage.heuristic.recently_visited", true);
pref("privacy.restrict3rdpartystorage.heuristic.recently_visited_time", 600);
pref("privacy.trackingprotection.testing.report_blocked_node", false);
pref("privacy.webrtc.allowSilencingNotifications", false);
pref("privacy.webrtc.legacyGlobalIndicator", true);
pref("privacy.webrtc.sharedTabWarning", false);
pref("prompts.defaultModalType", 3);
pref("prompts.modalType.confirmAuth", 2);
pref("prompts.modalType.insecureFormSubmit", 2);
pref("services.blocklist.addons-mlbf.checked", 0);
pref("services.blocklist.addons-mlbf.collection", "addons-bloomfilters");
pref("services.blocklist.addons-mlbf.signer", "remote-settings.content-signature.mozilla.org");
pref("services.sync.prefs.sync.intl.regional_prefs.use_os_locales", true);
pref("signon.showAutoCompleteImport", "");
pref("toolkit.asyncshutdown.report_writes_after", 20000);
pref("toolkit.osKeyStore.loglevel", "Warn");
pref("webgl.prototype.ipc-pcq", 0);
pref("apz.frame_delay.enabled", true);
pref("browser.aboutwelcome.log", "warn");
pref("browser.fixup.dns_first_for_single_words", false);
pref("browser.fixup.typo.scheme", true);
pref("browser.osKeyStore.loglevel", "Warn");
pref("browser.stopReloadAnimation.enabled", true);
pref("browser.tabs.multiselect", true);
pref("browser.tabs.showAudioPlayingIcon", true);
pref("browser.ui.scroll-toolbar-threshold", 10);
pref("browser.urlbar.update1", true);
pref("browser.urlbar.update1.view.stripHttps", true);
pref("browser.xul.error_pages.enabled", true);
pref("devtools.debugger.source-maps-enabled", true);
pref("devtools.inspector.use-new-box-model-highlighter", false);
pref("dom.mozBrowserFramesEnabled", true);
pref("dom.registerProtocolHandler.insecure.enabled", false);
pref("extensions.webservice.discoverURL", "https://discovery.addons.mozilla.org/%LOCALE%/firefox/discovery/pane/%VERSION%/%OS%/%COMPATIBILITY_MODE%");
pref("gfx.vsync.use-waitforvblank", false);
pref("javascript.options.mem.gc_avoid_interrupt_factor", 100);
pref("javascript.options.mem.gc_dynamic_heap_growth", true);
pref("javascript.options.mem.gc_dynamic_mark_slice", true);
pref("javascript.options.mem.gc_high_frequency_heap_growth_max", 300);
pref("javascript.options.mem.gc_high_frequency_heap_growth_min", 150);
pref("javascript.options.mem.gc_high_frequency_high_limit_mb", 500);
pref("javascript.options.mem.gc_high_frequency_low_limit_mb", 100);
pref("javascript.options.mem.gc_non_incremental_factor", 112);
pref("layout.css.contain.enabled", true);
pref("network.disable.ipc.security", true);
pref("privacy.purge_trackers.logging.enabled", false);
pref("security.identityblock.show_extended_validation", false);
pref("signon.management.overrideURI", "about:logins?filter=%DOMAIN%");
pref("browser.contentblocking.report.monitor.how_it_works.url", "https://monitor.firefox.com/about"); // prev: "https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/monitor-faq"
pref("browser.newtabpage.activity-stream.asrouter.providers.message-groups", "{\"id\":\"message-groups\",\"enabled\":false,\"type\":\"remote-settings\",\"bucket\":\"message-groups\",\"updateCycleInMs\":3600000}"); // prev: "{\"id\":\"message-groups\",\"enabled\":true,\"type\":\"remote-settings\",\"bucket\":\"message-groups\",\"updateCycleInMs\":3600000}"
pref("browser.safebrowsing.provider.google.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?site="); // prev: "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&site="
pref("browser.safebrowsing.provider.google4.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?site="); // prev: "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&site="
pref("browser.tabs.remote.separatePrivilegedContentProcess", true); // prev: false
pref("browser.urlbar.maxCharsForSearchSuggestions", 100); // prev: 20
pref("devtools.netmonitor.columnsData", "[{\"name\":\"status\",\"minWidth\":30,\"width\":5}, {\"name\":\"method\",\"minWidth\":30,\"width\":5}, {\"name\":\"domain\",\"minWidth\":30,\"width\":10}, {\"name\":\"file\",\"minWidth\":30,\"width\":25}, {\"name\":\"url\",\"minWidth\":30,\"width\":25},{\"name\":\"initiator\",\"minWidth\":30,\"width\":10},{\"name\":\"type\",\"minWidth\":30,\"width\":5},{\"name\":\"transferred\",\"minWidth\":30,\"width\":10},{\"name\":\"contentSize\",\"minWidth\":30,\"width\":5},{\"name\":\"waterfall\",\"minWidth\":150,\"width\":15}]"); // prev: "[{\"name\":\"status\",\"minWidth\":30,\"width\":5}, {\"name\":\"method\",\"minWidth\":30,\"width\":5}, {\"name\":\"domain\",\"minWidth\":30,\"width\":10}, {\"name\":\"file\",\"minWidth\":30,\"width\":25}, {\"name\":\"url\",\"minWidth\":30,\"width\":25}, {\"name\":\"cause\",\"minWidth\":30,\"width\":10},{\"name\":\"initiator\",\"minWidth\":30,\"width\":10},{\"name\":\"type\",\"minWidth\":30,\"width\":5},{\"name\":\"transferred\",\"minWidth\":30,\"width\":10},{\"name\":\"contentSize\",\"minWidth\":30,\"width\":5},{\"name\":\"waterfall\",\"minWidth\":150,\"width\":15}]"
pref("devtools.netmonitor.visibleColumns", "[\"status\",\"method\",\"domain\",\"file\",\"initiator\",\"type\",\"transferred\",\"contentSize\",\"waterfall\"]"); // prev: "[\"status\",\"method\",\"domain\",\"file\",\"cause\",\"type\",\"transferred\",\"contentSize\",\"waterfall\"]"
pref("dom.quotaManager.useDOSDevicePathSyntax", true); // prev: false
pref("gfx.omta.background-color", true); // prev: false
pref("gfx.webrender.enable-item-cache", true); // prev: false
pref("layout.css.image-orientation.initial-from-image", true); // prev: false
pref("network.auth.confirmAuth.enabled", true); // prev: false
pref("network.http.http3.default-qpack-table-size", 0); // prev: 65536
pref("privacy.purge_trackers.logging.level", "Error"); // prev: "Warn"
pref("signon.management.page.os-auth.enabled", false); // prev: true
accessibility.ARIAReflection.enabled apz.frame_delay.enabled apz.windows.force_disable_direct_manipulation browser.aboutwelcome.log browser.contentblocking.report.monitor.how_it_works.url browser.find.anonymous_content.enabled browser.fixup.dns_first_for_single_words browser.fixup.typo.scheme browser.newtabpage.activity-stream.asrouter.providers.message-groups browser.newtabpage.activity-stream.asrouter.providers.messaging-experiments browser.osKeyStore.loglevel browser.safebrowsing.provider.google.reportURL browser.safebrowsing.provider.google4.reportURL browser.stopReloadAnimation.enabled browser.tabs.documentchannel.parent-initiated browser.tabs.documentchannel.ppdc browser.tabs.multiselect browser.tabs.remote.allowLinkedWebInFileUriProcess browser.tabs.remote.separatePrivilegedContentProcess browser.tabs.showAudioPlayingIcon browser.ui.scroll-toolbar-threshold browser.urlbar.maxCharsForSearchSuggestions browser.urlbar.oneOffSearches browser.urlbar.restyleSearches browser.urlbar.update1 browser.urlbar.update1.view.stripHttps browser.xul.error_pages.enabled devtools.contenttoolbox.webconsole.input.context devtools.experiment.f12.shortcut_disabled devtools.inspector.compatibility.target-browsers devtools.inspector.use-new-box-model-highlighter dom.mozBrowserFramesEnabled dom.quotaManager.useDOSDevicePathSyntax dom.registerProtocolHandler.insecure.enabled dom.security.https_only_mode.upgrade_local dom.security.https_only_mode.upgrade_onion dom.security.https_only_mode_ever_enabled dom.window.content.untrusted.enabled editor.truncate_user_pastes extensions.blocklist.addonItemURL extensions.blocklist.useMLBF extensions.blocklist.useMLBF.stashes extensions.webservice.discoverURL gfx.color_management.mode gfx.omta.background-color gfx.vsync.force-disable-waitforvblank gfx.vsync.use-waitforvblank gfx.webrender.enable-item-cache gfx.webrender.gl-debug-message-critical-note gfx.webrender.gl-debug-message-print gfx.webrender.use-optimized-shaders identity.sync.useOAuthForSyncToken image.avif.enabled image.honor_orientation_metadata.natural_size image.honor-orientation-metadata javascript.options.mem.gc_avoid_interrupt_factor javascript.options.mem.gc_dynamic_heap_growth javascript.options.mem.gc_dynamic_mark_slice javascript.options.mem.gc_high_frequency_heap_growth_max javascript.options.mem.gc_high_frequency_heap_growth_min javascript.options.mem.gc_high_frequency_high_limit_mb javascript.options.mem.gc_high_frequency_large_heap_growth javascript.options.mem.gc_high_frequency_low_limit_mb javascript.options.mem.gc_high_frequency_small_heap_growth javascript.options.mem.gc_large_heap_incremental_limit javascript.options.mem.gc_large_heap_size_min_mb javascript.options.mem.gc_non_incremental_factor javascript.options.mem.gc_small_heap_incremental_limit javascript.options.mem.gc_small_heap_size_max_mb javascript.options.wasm_reftypes layout.css.always-repaint-on-unvisited layout.css.contain.enabled layout.css.grid-template-masonry-value.enabled layout.css.image-orientation.initial-from-image layout.css.is-where-selectors.enabled layout.css.notify-of-unvisited media.getdisplaymedia.enabled media.testing-only-events network.data.max-uri-length-mobile network.disable.ipc.security network.http.http3.default-qpack-table-size privacy.purge_trackers.logging.enabled privacy.purge_trackers.logging.level privacy.restrict3rdpartystorage.expiration_visited privacy.restrict3rdpartystorage.heuristic.recently_visited privacy.restrict3rdpartystorage.heuristic.recently_visited_time privacy.trackingprotection.testing.report_blocked_node privacy.webrtc.allowSilencingNotifications privacy.webrtc.legacyGlobalIndicator privacy.webrtc.sharedTabWarning prompts.defaultModalType prompts.modalType.confirmAuth prompts.modalType.insecureFormSubmit security.identityblock.show_extended_validation services.blocklist.addons-mlbf.checked services.blocklist.addons-mlbf.collection services.blocklist.addons-mlbf.signer services.sync.prefs.sync.intl.regional_prefs.use_os_locales signon.management.overrideURI signon.management.page.os-auth.enabled signon.showAutoCompleteImport toolkit.asyncshutdown.report_writes_after toolkit.osKeyStore.loglevel webgl.prototype.ipc-pcqsome bugzilla tickets
Bug 1628418 - ARIA reflection: implement AccessibilityRole interface
Bug 1630781 - Eliminate the frame_delay pref, assume it true everywhere.
Bug 1635243. Only use WS_EX_LAYERED | WS_EX_TRANSPARENT on the compositor window on nightly for now.
Bug 1632357. Add a pref to disable adding the WS_EX_LAYERED style to the compositor window.
Bug 1631668 - Consolidate messaging-system and about:welcome logging, add additional logs
Bug 1617783 - Add JSWindowActors to about:welcome
Bug 1602096 - update 'How it works' link on Firefox Monitor Card.
Bug 1627643 - Allow to find and display selection native anonymous content.
Bug 1496578 - convert nsDefaultURIFixup to URIFixup.jsm.
Bug 1496578 - convert nsDefaultURIFixup to URIFixup.jsm.
Bug 1633009 - Disable the Remote Settings message-group provider because it is not used
Bug 1578754 - Implement groups configuration for Messaging System content
Bug 1631456 - Create a CFR message loader for ExperimentAPI
Bug 1631879 - Update the name of the osKeyStore log preference now that it has moved to toolkit.
Bug 1194529 - Update OSKeyStore pref names now that the module is moved.
Bug 1408779 - link to report why page has been classified as malicious/deceptive/... should have variables %NAME% and %LOCALE% replaced
Bug 1408779 - link to report why page has been classified as malicious/deceptive/... should have variables %NAME% and %LOCALE% replaced
Bug 1629953 - Use prefers-reduced-motion media query for the stop/reload button animation.
Bug 1632098 - P3. Enable the ParentProcessDocumentChannel.
Bug 1602318 - Enable parent initiated loads pref.
Bug 1602318 - Initiate document loads in the parent process in parallel with setting up the content process side.
Bug 1602318 - Start loads directly from CanonicalBrowsingContext when possible.
Bug 1632098 - P3. Enable the ParentProcessDocumentChannel.
Bug 1607984 - P17. Put ParentProcessDocumentChannel behind a pref.
Bug 1634013 - Remove the browser.tabs.multiselect pref
Bug 1603007 - Remove allowLinkedWebInFileUriProcess
Bug 1626583 - Always disable allowLinkedWebInFileUriProcess
Bug 1603006 - Ignore allowLinkedWebInFile when documentChannel is enabled
Bug 1621269 - Disable the privileged about content process on Linux64 ccov builds.
Bug 1617983 - Re-enable separate privileged about content process for about:home, about:newtab, about:welcome on Nightly.
Bug 1634012 - Remove the browser.tabs.showAudioPlayingIcon pref.r=dao
Bug 1627716 - Remove APZ/composition code related to DynamicToolbarAnimator.
Bug 1618769 - Increase max chars for search suggestions, and don't fetch suggestions at all when max is reached due to paste.
Bug 1628926 - Remove the browser.urlbar.oneOffSearches pref.
Bug 1626946 - Remove search suggestions that dupe a search history result.
Bug 1627988 - Remove the browser.urlbar.update1.view.stripHttps pref.
Bug 1627969 - Remove the megabar pref.
Bug 1617029 - Enable urlbar.update1.* prefs (quantumbar update 1) on Release.
Bug 1616880 - Allow tabbing through urlbar results when there's a search string.
Bug 1613869 - Enable urlbar.update1.* prefs on early Beta.
Bug 1613699 - Rename browser.urlbar.update1.expandTextOnFocus pref to ...update2...
Bug 1613608 - Enable Interventions in Nightly but not in xpcshell tests.
Bug 1613608 - Enable Interventions in Nightly.
Bug 1608766 - Disable tabbing through results after focusing the Urlbar with the keyboard, behind a pref.
Bug 1606917 - Port the Interventions experiment into a new provider.
Bug 1609699 - Rename browser.urlbar.searchTips pref to browser.urlbar.update1.searchTips.
Bug 1603780 - Set browser.urlbar.update1.expandTextOnFocus default value in Nightly.
Bug 1601339 - Disable expandTextOnFocus.
Bug 1627988 - Remove the browser.urlbar.update1.view.stripHttps pref.
Bug 1617029 - Enable urlbar.update1.* prefs (quantumbar update 1) on Release.
Bug 1592780 - Empty alerts when browser.xul.error_pages.enabled=false,
Bug 1628346 - Add a dedicated context selector pref for content toolbox.
Bug 1630228 - Basic implementation to disable F12 until toolbox opens
Bug 1590981: Make target browsers persistent.
Bug 1607755 - Remove box model highlighter implementation with setupInParent()
Bug 1630691: Part 2 - Get rid of the "dom.mozBrowserFramesEnabled" pref.
Bug 1632133 - Enable DOS device path syntax for quota storage by default;
Bug 1626846 - Disable useDOSDevicePathSyntax for QuotaStorage on Windows;
Bug 1597267 - Remove dom.registerProtocolHandler.insecure.enabled
Bug 1631384 - Added upgrade exceptions for HTTPS Only Mode.
Bug 1631384 - Added upgrade exceptions for HTTPS Only Mode.
Bug 1620244 - Retention telemetry for HTTPS Only Mode.
Bug 1632143 - Disable window.content in early betas
Bug 1632116 - Introduce dom.window.content.untrusted.enabled
Bug 1320229 - allow user pastes longer than input maxlength
Bug 1620621 - Add bloomfilter-based blocklist for addons
Bug 1620621 - Implement blocklist stashing behind pref
Bug 1620621 - Add bloomfilter-based blocklist for addons
Bug 1620621 - Implement blocklist stashing behind pref
Bug 1620438 - Remove references to extensions.webservice.discoverURL.
Bug 455077 - Enable color management for all CSS/images, not just tagged images.
Bug 1535532 - Enable background color animations on the compositor by default on all channels.
Bug 1630389 - Enable WaitForVBlank by default on Windows 10
Bug 1630389 - Enable WaitForVBlank by default on Windows 10
Bug 1628137 - Switch to using WaitForVBlank for vsync on Windows
Bug 1633842 - Enable WR item cache
Bug 1616412 - Enable WebRender display item caching
Bug 1632096 - Forward WebRender gl(ANGLE) error message to gfx critical note
Bug 1632096 - Forward WebRender gl(ANGLE) error message to gfx critical note
Bug 1604615 - Use optimized shader source in webrender.
Bug 1631830 - Fetch Sync tokens with OAuth behind a pref
Bug 1625363 - AVIF (AV1 Image File Format): experimental support.
Bug 1630165 - Remove nightly-only gate from naturalWidth/naturalHeight honoring orientation metadata.
Bug 1566316 - Make naturalWidth/naturalHeight on images honor orientation metadata.
Bug 1616411 - Part 3: Make RasterImage deal with and apply image orientation.
Bug 1630961 - Remove unused heurisitic to delaying GCs that may cause resets
Bug 1633405 - Remove dynamic GC options that are enabled everywhere
Bug 1633405 - Remove dynamic GC options that are enabled everywhere
Bug 1633457 - Rename some GC parameters for clarity
Bug 1633457 - Rename some GC parameters for clarity
Bug 1633457 - Rename some GC parameters for clarity
Bug 1633457 - Rename some GC parameters for clarity
Bug 1633457 - Rename some GC parameters for clarity
Bug 1633457 - Rename some GC parameters for clarity
Bug 1633752 - Calculate non-incremental threshold based on heap size and increase it for smaller heaps
Bug 1633457 - Rename some GC parameters for clarity
Bug 1633752 - Calculate non-incremental threshold based on heap size and increase it for smaller heaps
Bug 1633752 - Calculate non-incremental threshold based on heap size and increase it for smaller heaps
Bug 1633457 - Rename some GC parameters for clarity
Bug 1618595: Disable Cranelift on aarch64 when reftypes are enabled;
Bug 1632765 - Turn on some more :visited privacy mitigations.
Bug 1626458 part 1: Remove pref for CSS Containment (layout.css.contain.enabled)
Bug 1623819 - Part 1: Fix a few initial values in Rust property definitions.
Bug 1607954 part 1 - [css-grid][css-align] Implement style system support for Masonry layout.
Bug 1616411 - Part 2: Don't bother passing in the size to OrientedImage::OrientSurface.
Bug 1623820 - Part 2: Make image-orientation initial value change be Nightly only.
Bug 1509418 - Enable the feature in Nightly.
Bug 1629735 - Implement parsing / selector-matching for :is() and :where().
Bug 1632765 - Turn on some more :visited privacy mitigations.
Bug 1624181 - Omit getDisplayMedia() function on android to aid feature detection.
Bug 1625615 - part5 : add test-only attribute and event for media element.
Bug 1626687 - Do not handle data URIs larger than 2M on mobile
Bug 1322254 - Remove network.disable.ipc.security pref
Bug 1628460 - Turn off qpack dynamic table.
Bug 1628743 - Enable cookie purging by default in Nightly, clean up logging prefs.
Bug 1599262 - Purge site data after identifying tracking site via cookies.
Bug 1628743 - Enable cookie purging by default in Nightly, clean up logging prefs.
Bug 1624863 - Rewrite PurgeTrackerService.jsm logging to use console.createInstance
Bug 1616585 - add heuristic for visited redirection;
Bug 1616585 - add heuristic for visited redirection;
Bug 1616585 - add heuristic for visited redirection;
Bug 1608516 - Part 3: Add a pref to prevent sending unnecessary IPC if we are not in testing.
Bug 1637336 - Add a preference that uses an alternative WebRTC screen sharing permission panel configuration.
Bug 1636207 - Fork the WebRTC global indicator for a refresh.
Bug 1634796 - Add a panel that warns users before switching tabs when sharing the window over WebRTC.
Bug 1615588 - Extended nsIPromptService to support tab modal prompts.
Bug 1629808 - Updated ConfirmAuth dialogs to be tab modal and re-enabled them.
Bug 616849 - Made insecure form submission prompt tab modal.
Bug 1599729 - Remove security.identityblock.show_extended_validation pref and related UI code.
Bug 1620621 - Add bloomfilter-based blocklist for addons
Bug 1620621 - Add bloomfilter-based blocklist for addons
Bug 1620621 - Add bloomfilter-based blocklist for addons
Bug 1379910 - Add Preference option to change the locale strategy for regional preferences
Bug 1569253 - remove old password manager UI.
Bug 1636511 - Disable the OS auth feature in about:logins on Release and Beta.
Bug 1626138 - Add a temporary pref to disable the OS auth prompt.
Bug 1618311 - Contextually suggest importing passwords as an autocomplete entry
Bug 1610134: Part 1: add timeout pref that turns on late write checking to see if it's possible to crash browser earlier.
Bug 1631879 - Update the name of the osKeyStore log preference now that it has moved to toolkit.
Bug 1621762: Part 7 - Add IpdlQueue actor traits to WebGLParent/WebGLChild
I think we can remove 0850c, 0850d, 0850e (b is already gone and e is deprecated this release: that the oneOffSearches). The urlbar is now switched to the new awesomebar (and urlbar1 prefs removed) and those prefs (c + d), AFAIK, relate to the old one, but we should check. It also wouldn't surprise me if everything we know about the location bar is up for re-checking: e.g. if all suggestion types are disabled, are search engine keywords still disabled, etc. I mean, they rebuilt all the logic around their UX studies
Anyway: maxRichResults (c) and autofill (d) have nothing to do with privacy and oneOffSearches (e) doesn't either, but at least that's deprecated now. I get the shoulder surfer aspect of it, but that's on the end user: even Tor Browser doesn't cover this. You can't code OpSec.
TBH: if you're like me and don't like the urlbar doing anything except being static (no suggestions, not UI changes, no movements, no color changes), then I've simply been using chrome css
^^ I am using 0850c and 0850d. And both are still valid in FF 76.
Don't know about 77 yet.
dom.security.https_only_mode.upgrade_local:
If true and HTTPS-only mode is enabled, requests
to local IP addresses are also upgraded
dom.security.https_only_mode.upgrade_onion:
If true and HTTPS-only mode is enabled, requests
to .onion hosts are also upgraded
dom.security.https_only_mode_ever_enabled:
WARNING: Don't ever update that pref manually! It is only used
for telemetry purposes and allows to reason about retention of
the pref dom.security.https_only_mode from above.
Telemetry is disabled and reseting this in the user.js would be useless.
https://github.com/ghacksuserjs/ghacks-user.js/issues/923 is an issue again in FF77 !! (but it only affects Windows)
The good news is that the problem is apparently already fixed in FF78+ (1634267).
So we can either temporarily set 0709 to false or add dom.quotaManager.useDOSDevicePathSyntax=false for the 77 release.
useDOSDevicePathSyntax=true is supposed to fix issues when file paths exceed the path limit on Windows so I think the better option is to just set 0709 to false.
(We should set it to false instead of making it inactive, for people who don't run the prefsCleaner after every update)
Linux and Mac users can add 0709 to their user-overrides if they deem it necessary but it's a pretty edge-case protection anyways and losing it for 1 release isn't too bad either, IMO.
speaking of breakage - did you get that email I sent about changes to the origin attributes and thus to the naming conventions? I don't have the email anymore so I can't find the ticket quickly. I hope we don't end up with a migration mess like when they applied OA to extensions
this is the link you sent me: https://bugzilla.mozilla.org/show_bug.cgi?id=1558932#c16
FYI just found these 2 in FF78beta1 which sound like they're related:
pref("privacy.dynamic_firstparty.use_site", true);
pref("privacy.firstparty.isolate.use_site", false);
update: both prefs were implemented in 1637516
updated OP for the final release.
Only 1 difference since RC1: the change to gfx.color_management.mode didn't land
Sorry if I missed this somewhere, but Firefox release on Windows just updated to v77. With ghacksuserjs, extensions seem to be messed up. For example, trying to view the uBlock Origin settings page only shows the header bar but no content. This issue seems to affect other extensions as well. Without ghacksuserjs, there is no issue. Suggestions on a setting I should adjust? Thanks!

@collinbarrett see https://github.com/ghacksuserjs/ghacks-user.js/issues/951
this is the link you sent me
It's ~a tad~ ~somewhat~ ~quite~ fucking hard to follow ATM. There's a lot of dFPI stuff going on, and then baku is busy adding isolate* prefs (some sort of partitioning ), and then there's a bunch of over-arching tickets about principals and OA's
OT: anyone know the css for userChrome to modify the awesomebar and searchbar blue outlines when they have focus (as show in the top part of the pic)

@collinbarrett , @crssi https://github.com/ghacksuserjs/ghacks-user.js/commit/05580f5e99ccbe02646c9062acd137e51b55a8d2
Added to the master so no-one needs an override: I'll remove it some time well after 78 lands and it's known to be fixed
If anyone has a reddit account ... this totally looks like the UNC / DOS Path problem - just point them to #923 - TIA
anyone know the css for userChrome to modify the awesomebar and searchbar blue outlines when they have focus
Maybe https://www.reddit.com/r/FirefoxCSS/comments/fxez4e/remove_new_megabar_grow_shrink_effect/fmvadbr/
OT: anyone know the css for userChrome to modify the awesomebar and searchbar blue outlines when they have focus (as show in the top part of the pic)
I use this.
#urlbar[focused] > #urlbar-background{
border-color:hsla(240,5%,5%,.35) !important;
box-shadow: 0 1px 6px rgba(0,0,0,.1) !important;
}
^^ thanks (I'll check it out), and @gwarser that helped with the css property name
this works for urlbar: cannot for the life of me get the selectors right for searchbar (the one on the right)
#urlbar, .searchbar-textbox {
--toolbar-field-focus-border-color: #202124 !important;
}

my bad, didn't realize you needed both, this should work.
#urlbar[focused="true"] > #urlbar-background,
#searchbar:focus-within{
this should work
Excellent .. have a socially distanced hug 馃
I think they fully broke 1633. Now its user_pref("ui.prefersReducedMotion", 1);. Can somebody confirm or its my imagination?
Classic urlbar CSS for Firefox 77
#urlbar[breakout][breakout-extend] {
top: 5px !important;
left: 0px !important;
width: 100% !important;
padding: 0px !important;
}
#urlbar[breakout][breakout-extend] > #urlbar-input-container {
height: var(--urlbar-height) !important;
padding: 0 !important;
}
#urlbar[breakout][breakout-extend] > #urlbar-background {
animation: none !important;;
}
#urlbar[breakout][breakout-extend] > #urlbar-background {
box-shadow: none !important;
}
#urlbar-results {
padding-top: 0 !important;
padding-bottom: 0 !important;
}
.urlbarView-body-inner {
border-top: 0px !important;
}
Yes. Im talking about toolkit.cosmeticAnimations.enabled in personal section. For exemple look on refresh page button with ui.prefersReducedMotion;1 and without it.
So its bad idea use ui.prefersReducedMotion;1? Somehowe rise entropy or something? I`am not disable RFP.
Here's the meta bug - there are at least 5 bugs in all of the ones for FF77 (I queried all 77 bugs) where the title indicates a change to UI animations to use PRM
The pref in the personal section will eventually be deprecated. Just use your custom chrome css. But long term the idea is that RFP exempts the UI (chrome) etc.
Yes, javascript can query what your prefers motion and prefers color etc are - so RFP locks that down to the default, otherwise it's just another bit of data that can be used overall in your fingerprint
@Thorin-Oakenpants
pref("privacy.dynamic_firstparty.use_site", true); pref("privacy.firstparty.isolate.use_site", false);
Quoting FF Devs:
"We can keep FPI/dFPI have the same behavior here, and (if necessary, ) use another pref to control whether we should use site or not. The pref may keep some backward-compatibility for special cases, e.g. Tor Browser, and we can turn this pref on to use "site"."
"The first pieces of dynamic first-party isolation (DFPI) landed in Nightly. DFPI is an experimental approach to isolating all third party cookies and storage, similar to FPI (which is enabled by default in the Tor Browser and is also supported by Firefox). The most important difference between DFPI and FPI is that DFPI will adhere to exceptions granted through the storage access API and thus ensure better web compatibility. "
https://wiki.mozilla.org/Firefox_Security_Newsletter/FSN-2020-Q1
Thanks. I'm aware of all that and for the user.js I'm tracking it in #930
Edit: if FPI is on, dPFI is ignored, and until dFPI is enabled by default (which could be quite some time) there's nothing to do: and the longer it takes, the more bugs they fix and the more dFPI covers etc