| ... | 
... | 
@@ -101,6 +101,12 @@ pref("browser.pagethumbnails.capturing_disabled", true); | 
| 
101
 | 
101
 | 
 // pref("privacy.exposeContentTitleInWindow", false);
 | 
| 
102
 | 
102
 | 
 // pref("privacy.exposeContentTitleInWindow.pbm", false);
 | 
| 
103
 | 
103
 | 
 
  | 
| 
 
 | 
104
 | 
+// tor-browser#42054: Opt-out from any built-in backup system, even though
  | 
| 
 
 | 
105
 | 
+// local, as it might be a violation of our standalone mode.
  | 
| 
 
 | 
106
 | 
+// Users can still opt-in if they wish.
  | 
| 
 
 | 
107
 | 
+pref("browser.backup.enabled", false);
 | 
| 
 
 | 
108
 | 
+pref("browser.backup.scheduled.enabled", false);
 | 
| 
 
 | 
109
 | 
+
  | 
| 
104
 | 
110
 | 
 // Empty clipboard content from private windows on exit (tor-browser#42154)
  | 
| 
105
 | 
111
 | 
 pref("browser.privatebrowsing.preserveClipboard", false);
 | 
| 
106
 | 
112
 | 
 
  | 
| ... | 
... | 
@@ -251,6 +257,9 @@ pref("privacy.trackingprotection.fingerprinting.enabled", false); | 
| 
251
 | 
257
 | 
 pref("privacy.trackingprotection.socialtracking.enabled", false);
 | 
| 
252
 | 
258
 | 
 pref("privacy.socialtracking.block_cookies.enabled", false);
 | 
| 
253
 | 
259
 | 
 pref("privacy.annotate_channels.strict_list.enabled", false);
 | 
| 
 
 | 
260
 | 
+// tor-browser#43178: for defense-in-depth, avoid remote overrides to FPP.
  | 
| 
 
 | 
261
 | 
+// Notice that it should not apply to RFP anyway...
  | 
| 
 
 | 
262
 | 
+pref("privacy.fingerprintingProtection.remoteOverrides.enabled", false);
 | 
| 
254
 | 
263
 | 
 
  | 
| 
255
 | 
264
 | 
 // Disable the Pocket extension (Bug #18886 and #31602)
  | 
| 
256
 | 
265
 | 
 pref("extensions.pocket.enabled", false);
 | 
| ... | 
... | 
@@ -284,6 +293,9 @@ pref("browser.newtabpage.activity-stream.asrouter.providers.messaging-experiment | 
| 
284
 | 
293
 | 
 // Disable fetching asrouter.ftl and related console errors (tor-browser#40763).
  | 
| 
285
 | 
294
 | 
 pref("browser.newtabpage.activity-stream.asrouter.useRemoteL10n", false);
 | 
| 
286
 | 
295
 | 
 
  | 
| 
 
 | 
296
 | 
+// tor-browser#42054: make sure search result telemetry is disabled.
  | 
| 
 
 | 
297
 | 
+pref("browser.search.serpEventTelemetryCategorization.enabled", false);
 | 
| 
 
 | 
298
 | 
+
  | 
| 
287
 | 
299
 | 
 // tor-browser#42872, #42555: Disable translations.
  | 
| 
288
 | 
300
 | 
 // Translation have a bad UX in 128 (and with our config). Maybe we will
  | 
| 
289
 | 
301
 | 
 // re-enable after auditing and fixing the UX.
  | 
| ... | 
... | 
@@ -444,9 +456,6 @@ pref("pdfjs.disabled", false, locked); | 
| 
444
 | 
456
 | 
 #endif
  | 
| 
445
 | 
457
 | 
 // Bug 40057: Ensure system colors are not used for CSS4 colors
  | 
| 
446
 | 
458
 | 
 pref("browser.display.use_system_colors", false);
 | 
| 
447
 | 
 
 | 
-// Enforce non-native widget theme (true by default, defense in depth).
  | 
| 
448
 | 
 
 | 
-// Provides a uniform look and feel across platforms. Added with tor-browser#41496.
  | 
| 
449
 | 
 
 | 
-pref("widget.non-native-theme.enabled", true);
 | 
| 
450
 | 
459
 | 
 // tor-browser#41676: Set the TZ environment variable as a defense-in-depth.
  | 
| 
451
 | 
460
 | 
 // TODO: Remove this in ESR-128, as it has been removed in 116 with Bug 1837582.
  | 
| 
452
 | 
461
 | 
 pref("privacy.resistFingerprinting.testing.setTZtoUTC", true);
 | 
| ... | 
... | 
@@ -524,7 +533,9 @@ pref("network.http.http2.websockets", true, locked); | 
| 
524
 | 
533
 | 
 pref("network.http.http2.enable-hpack-dump", false, locked);
 | 
| 
525
 | 
534
 | 
 
  | 
| 
526
 | 
535
 | 
 // tor-browser#23044: Make sure we don't have any GIO supported protocols
  | 
| 
527
 | 
 
 | 
-// (defense in depth measure)
  | 
| 
 
 | 
536
 | 
+// (defense in depth measure).
  | 
| 
 
 | 
537
 | 
+// As of Firefox 118 (Bug 1843763), upstream does not add any protocol by
  | 
| 
 
 | 
538
 | 
+// default, but setting it to blank seems a good idea (tor-browser#42054).
  | 
| 
528
 | 
539
 | 
 pref("network.gio.supported-protocols", "");
 | 
| 
529
 | 
540
 | 
 pref("media.peerconnection.enabled", false); // Disable WebRTC interfaces
 | 
| 
530
 | 
541
 | 
 // Mullvad Browser enables WebRTC by default, meaning that there the following prefs
  | 
| ... | 
... | 
@@ -631,9 +642,6 @@ pref("security.cert_pinning.enforcement_level", 2); | 
| 
631
 | 
642
 | 
 // Don't load OS client certs.
  | 
| 
632
 | 
643
 | 
 pref("security.osclientcerts.autoload", false);
 | 
| 
633
 | 
644
 | 
 
  | 
| 
634
 | 
 
 | 
-// Don't allow MitM via Microsoft Family Safety, see bug 21686
  | 
| 
635
 | 
 
 | 
-pref("security.family_safety.mode", 0);
 | 
| 
636
 | 
 
 | 
-
  | 
| 
637
 | 
645
 | 
 // Don't allow MitM via enterprise roots, see bug 30681
  | 
| 
638
 | 
646
 | 
 pref("security.enterprise_roots.enabled", false);
 | 
| 
639
 | 
647
 | 
 
  |