OldSchoolOnline / FFCK

🦊 'hardening' by CHEF-KOCH

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

[][][][][]  []  [][][][] [][][][][] [][][][][]  [][][][][]  []       []
[]              [][]  [] []         []          []      []    []   []
[][][]      []  [][]  [] [][][]     [][][]      []      []      []
[]          []  []  []   []         []          []      []    []   []
[]          []  []    [] [][][][][] []          [][][][][]  []       [] about:config

Firefox About:Config Tricks & Hardening (based on kb.mozillazine.org, 12bytes.org, user.js project)

Speed up and harden your Mozilla Firefox Browser!
				==== Introduced by CHEF-KOCH ====

Matrix Twitter Follow Discord Say Thanks!

Project Overview

This project provides a hardened user.js (and some other files) which are designed for everyone to drag & drop into his Firefox profile folder, the process can of course be automated via scripts/programs.

  • More is not always better and can lead into problems (website breakage).
  • FFCK project does hope to provide a middle way between privacy and a normal daily usage habit without breaking too much.
  • FFCK project does not believe in FUD or claims made-up without evidence.
  • FFCK project does not care about backward-compatibility to older/outdated Browser versions.
  • FFCK project does not explain web standards or is designed to talk about web security policy mechanism, Mozilla itself has an entire portal for this.
  • FFCK project is not a documentation for each about:config flag.

Project Goals

  • Harden the browser against known data disclosure or code execution vulnerabilities (see Security aspect).
  • Harden the browser's encryption (cipher suites, protocols, trusted CAs).
  • Limit possibilities to uniquely identify the browser/device using browser fingerprinting.
  • Limit the browser from storing anything even remotely sensitive persistently.
  • Limit the possibilities to track the user through web analytics.
  • Reduce the overall attack surface by disabling various features.
  • Still be usable in daily use environment.

Privacy aspect

Several changes you can make within the Firefox options (and the invisible ones via about:config) might reducing the overall attack surface, they can be tested against several test pages to check wherever they work or not. Those pages are mostly PoC pages to prove that certain things can be exploited or are vulnerable, however those changes are highly depending on the settings and Browser version and need to be constantly maintained to adopt new changes which are might coming from the Browser or new web standards itself.

Security aspect

The project list is not designed to secure Firefox, it is designed to bring as much as privacy (via about:flags changes) as possible. The project owner does not believe that the configuration increases any security aspect of the Browser, there was never a proof given that a about:config really has an impact on the overall security level of each individual config user.

Possible Problems:

  • An attacker can use the open source list to find weaknesses (forgotten flags, mistakes or find other strategies to bypass it)
  • The Browser itself ignores several flags or the provided options are bugged or entirely broken
  • The flags are depending on the Browser source code which basically spoken means that if the source is flawed or doesn't worked as advertised an attacker can find its way around with new a Proof of concept (PoC) which might not even public available.
  • About:config changes does not migrate attacks like MITM, data leaks, source code problems, exploits, 0day or other spoofing attacks which might be unknown.

Archiving more security is way harder than trying to build defenses against privacy related attacks because those two things are not the same and the philosophy (in my opinion) must be that important problems have to be always addresses by the Browser itself without the need to change some flags/options. Stay away from "Ultimative Firefox Privacy & Security Guides" those are in 99% of all cases clickbait and are very soon outdated, browser security itself is very very hard to archive if not almost impossible and needs constantly to be monitored.

Why I'm still fingerprintable?

Test pages like Panopticlick have several problems which needs to be addresses and that's why they are not 100% reliable -in the real-world.

  • The uniqueness of a test pages such as Panopticlick are only relative to how many visitors the test-website had or how many are in the database found. Compared to the real-world it is only a small percentage. This basically means if a lot of e.g. Tor users/browsers visiting the website and you then do your test with Chrome you will be displayed as more unique because the Chrome Browser is more often used (statistically spoken). However, even if such pages testing older Browser clients you will rank higher (more unique) on their database because statistical outdated Browser ID's are way les often used (and tested).
  • Randomized fingerprint values are questionable. In fact it does not prevent you from getting fingerprinted at all, the ID itself would more unique because it changes with every single visited page, that means you are overall spoken faster identifiable since no one else was to the same time on the same time with this particular fingerprint. This is also the reason why Tor users getting the same fingerprint because it makes it impossible to identify which user was one which page with which fingerprint (because they are all the same).
  • A test pages does not covers every scenario, it is possible that new tricks (unknown ones) are already available on the internet which are (not yet) covered.
  • You don't need to hide/fake every possible outcome because that forces a website to develop new techniques to bypass it - as often done e.g. The New York Times detects ad-blockers and each time this got "fixed" it ended up with more trackers & anti-adblock scripts. The goal should be to swim with the mass.
  • The test page or the results itself can be manipulated to fake the results or to corrupt the database (with wrong results).

How do I switch from Chrome to Firefox?

There are several pages you can read to make your switch easier:

About

🦊 'hardening' by CHEF-KOCH

License:GNU General Public License v3.0


Languages

Language:TypeScript 100.0%