Create a gist now

Instantly share code, notes, and snippets.

What would you like to do?
Firefox bullshit removal via about:config

Firefox bullshit removal

Due to the incessant swarm of complete and utter nonsense that has been forcing its way into Firefox over time, I've decided to start collecting my personal list of “must-have” about:config tweaks required to turn Firefox into a functional brower.

NOTE: Unfortunately this is somewhat out of date. The comments link to some resources that may be more up-to-date. Patches welcome.


These can be used for nefarious purposes and to bypass access restrictions.


JavaScript spy vectors

These can be used for fingerprinting or data collection about the host system.


Pocket integration

This is a proprietary tie-in service that is a risk to your privacy.

  1. Drag the “pocket” icon off your toolbar. This step is important.
  2. browser.pocket.enabled=false


This is an inter-browser communication standard that is a very significant risk to your privacy and can be used to break out of VPN tunnels, proxies and unmask local users.



This is a significant breach of your personal freedom and security.


GeoLocation / Beacon

These can be used for tracking and fingerprinting services and are harmful to your privacy


Safe browsing

This requires Firefox to communicate with a third party, Google by default, and also sends them metadata about your downloads.


Social media integration

This anti-feature lets social media platforms integrate directly into your browser


Device tracking/statistics

These can be used to fingerprint your system and track you.


Tracking protection

This makes Firefox block known tracking domains by default.


DNT Header

This makes Firefox include a DNT (“do not track”) header in its request. Theoretically, this would opt-out of tracking services for some services, but unfortunately it makes your fingerprint much more trackable, as this header is not too common. Enable if it you want, but it's probably best to leave it off to prevent tracking.


Stat tracking / telemetry

These are used by Mozilla to spy on you, and are as such a significant risk to privacy.


Link pre-fetching

These will make Firefox connect with arbitrary links on a page by the simple act of hovering over them, without your explicit permission.


Cryptography hardening

This disables algorithms that are known to be weak or broken, and prevents most common attack vectors. Be warned that this may break some older websites that are not compatible with modern protocols.

General settings


Disable unnecessary protocols

This disables older protocols that are known to be weak or entirely broken (3DES, RC4 and MD5).


Perfect forward secrecy

If you (additionally) want to force the usage of PFS, the only enabled ciphers should be of the ecdhe/dhe variants. Might break lots of stuff.


Force TLS 1.2

This disables TLS 1.0 and TLS 1.1 completely, which increases security as these older protocols may be used as attack vectors. (Note that TLS technically contains a mechanism for preventing protocol degradation attacks, but it requires participation from both the client and the server - which is not a guarantee in practice)


Recommended addons (bonus)

In addition to the above settings, I personally recommend the usage of at least the following addons:

  • HTTPS Everywhere: Prefer HTTPS over HTTP even for sites that do not force HSTS.
  • μBlock₀: Block access to all known ads, malware domains, badware, and other malicious scripts and domains.
  • uMatrix or NoScript+RequestPolicy: Block scripts, images, CSS, objects and other (possibly external) requests by default, using a whitelist to selectively allow them. This is highly recommended as they all pose significant threats to security and privacy.

alexbel commented Sep 13, 2015

@haasn, great list. Is there a plugin which does it automatically?

lmas commented Sep 14, 2015

Great indeed, but I'm missing links to pages with more info about each issue.

For example, could someone clarify the issue with websockets and why they can be used for "nefarious purposes and to bypass access restrictions." (that's some strong wording)? All I found on that was some IPv6 bug which apparently was fixed in firefox12...

wiiaboo commented Sep 17, 2015

Note: dom.event.clipboardevents.enabled=false breaks Google Docs.

Najoj commented Dec 30, 2015

Good list. How about adding these tweaks mentioned on Ghacks which has to do with Telemetry pings?

calestyo commented Jan 3, 2016

I just found that project via a Debian bug.... it may be worth to consider joining your efforts with one of the already existing such projects, e.g. ... there are already many such guides how to make FF suck less, and it's just an awful effort to check them all and they contain all different information.

btw: Some stuff of your list is outdated,... e.g. network.websocket.enabled doesn't exist anymore... and many others are missing ;-)

I just wrote a message in reply to @allo- and also mentioned you @haasn . Me @gunnersson also have a list of settings. Maybe they could be integrated all together. Any comments?

MrYar commented Jul 4, 2016

Thank you for your work. Here's some suggestions for updates

browser.beacon.enabled has been renamed to beacon.enabled

Also: this one doesn't change to false when unchecking datareporting in preferences. Suggest adding to list.

According to this
It says the master switch for turning off the data reporting is the following (and takes precedence over the datareporting.healthreport.uploadEnabled)

Master switch for datareporting:

timmc commented Jul 13, 2016

It seems a bit much saying that the telemetry allows Mozilla to "spy" on you.

MrYar commented Sep 3, 2016

Fork created, with some minor changes for firefox 47.0.1

Thanks again haasn.

MrYar commented Jan 8, 2017

I have made some updates to my fork. They include about twice the number of hardening changes, and the method of implementing is far easier. Just create a file called "user.js" in the mozilla user directory (given on the fork), and paste all the code. No more manually entering in each change.

akoppa commented Jan 19, 2017

Be aware! Some suggested changes will render some pages useless. For instance if you apply all the .ssl. modifications you will not be able to sign in at IMDB. I'm paranoid too, but not to such extend.

Is there a firefox minus bullshit fork ?

allo- commented Mar 8, 2017

I added some stuff from your list as issues on, live instance on
They will be integrated as soon as i write descriptions and check if they are already covered by other settings.
If you like to contribute, any help is welcome. See for the settings format or have a look at the profiles branch, which will bring a more modular format.

Hello everybody. Any chance to get this as an addon to switch option on/off? Would pledge if needed on Kickstarter or Indiegogo!
So what do you think?

dontknowsquat commented Mar 23, 2017

hello fellow geeks well i did everything as proscribed in this and now when i run firefox ver 42 after i installed the following addons exts. from the links here
1)request policy
2) https every where
3) redirect control
4) proxy switcher

now in facebook, my email accounts, all the graphics radio buttons are all shown broken, any ideas before i change everything back ???
can i use an old profile jon file etc

dankles commented Apr 30, 2017

I now use this to enable/disable privacy about:config features. Thought you guys might find it useful.

sergeevabc commented Jun 28, 2017

Typo to fix: browser.beacen.enabled=false -> beacon.enabled=false.

vn971 commented Jul 24, 2017

@haasn @sergeevabc indeed, please fix the typo. (Feel free to delete my comment after an edit.)

vn971 commented Jul 24, 2017

security.tls.version.min=1 -- this can be removed, it's already defaulted to 1.

kgbm3 commented Jul 28, 2017

@Najoj Ghacks does have a great user.js script, like you said.. It's at:

"The most comprehensive Firefox user.js has been updated July 3, 2016" & there are, in fact, several URLs through which it's accessible.

^^ Similar to what @nodiscc had posted, a (custom) user.js

@calestyo it might help to mention what's missing like @MrYar has done: "Thank you for your work. Here's some suggestions for updates".

I wanted to add (another) two links, just what I'd run into -recently- configuring Android 6.0 Firefox (Beta); trying to get the uBlock Origins WebExtension:

The last link is really (!) cool, it lists some very nice open-source apps!

@Najoj Ghacks does have a great user.js script, like you said.. It's at: [DO NOT USE] .. it has been at github for 6 months now. And instead of a one-man band and 6 monthly updates at ghacks, its now so much better "crowd-sourced" and massively superior to before, and always right up to date (stable) even with one character switches to flip on ESR 52.x preferences and loads more. That ghacks article should be removed

Thorin-Oakenpants commented Aug 29, 2017

After a very quick casual glance, the above md contains quite some factual errors, such as safe browsing connecting to google, and quite a few deprecated preferences, although I fully understand it's an old unmaintained copy

Great stuff you have! Some additional suggestions from my side...

Dear all!

Great stuff you have! Some additional suggestions from my side...

Please, have a look at and, to be more precise, at !

That's my repo and project. There's no intention of bad rivalry, but just good competition by me. In fact, there are many users and repos at GitHub of similar idea and content.

But it would be my intention to bring them all a bit together for sharing and collecting.

Maybe, in this way Mozilla Firefox and Mozilla Thunderbird could be a real joy for many people...

Thank you and kind regards,


jawz101 commented Oct 4, 2017

if you want any preferences to sync across devices using Firefox Sync account, create additional config preferences with the prefix "services.sync.prefs.sync." and then set it to true.

create a new boolean for device.sensors.enabled
it would be
and set it to true.
then it'll sync across your devices. I don't think it will sync with mobile Firefox, though, but at least desktops. I've been doing this for a few years.

network.IDN_show_punycode = true

stops IDN phishing

Waterfox is perhaps a better starting point for a secure and private Firefox.

Hi, this sounds great. I can't use the latest Firefox (Quanutm) because of the annoying WHITE SCREEN FLASH and also, it breaks several plugins. Any recommendations for this?

hreese commented Jan 13, 2018

Source code for the pocket extension was open-sourced recently:

Isn't the answer to the implied question to use the Tor browser?

CAFxX commented Jan 13, 2018

Funny that the stated goal of improving user privacy is undermined by the suggestions in this gist: by using non-standard configurations you are easier to track...

Also, I would advise against messing with your cryptography settings unless you know what you are doing (and, in case it wasn't clear, "I read it on a random gist" doesn't even come close to clear this bar).

People please do not disable Websockets OMG

Thanks for the info!

"required to turn Firefox into a functional brower" should be "required to turn Firefox into a functional browser" ("browser", not "brower").


I maintain a fork with most of the important changes here, along with a PKGBUILD for Arch Linux users. I manage to get changes out within 24 hours, usually.

@quantumproducer Hi, this sounds great. I can't use the latest Firefox (Quanutm) because of the annoying WHITE SCREEN FLASH and also, it breaks several plugins. Any recommendations for this?

You have to disable the background for tab render areas - it gets shown while the tab is in the process of rendering. Reddit thread about it here:

Hey, webgl and websockets aren't exactly bullshit. Perhaps more explanation about each option is needed, given some people can blindly copy these settings thinking they're just improving security without side effects.

It'd be really cool to a shell script that can do all these things idempotently. It sucks switching computers.

It might be worth considering Brave browser. I recently switched over Firefox because it focuses on privacy. They are planning on integrating a TOR private browsing tab. Really good stuff and it's by the guy who made JavaScript.

yb66 commented Jan 14, 2018

@CAFxX If you have a problem with any specific setting then say so, give your reasoning instead of dismissing settings vaguely and out of hand because it's a "random" gist, which has to be one of the worst reasons I could think of for ignoring information.

hiragashi commented Jan 15, 2018

@casecoded .... "the guy who made JavaScript" is the man that was forcibly shamed into resigning as the CEO of Mozilla. A co-founder. Built it up and then they ejected him because at some stage in his life he legally donated his own private cash to a political party that others didn't agree with.

Isn't mob outrage and targetted smear campaigns just grand?

also to haasn that owns this gist, you were told 2 years ago about a spelling mistake clear as day in the beacon setting and not a single thing has been done about it other than posting your links on social media platforms to spread the word on how great it is. Read your comments, think about what the person is writing and fix your shit up I guess. People are gonna come here blindly copy paste into about:config find that half the settings are missing and the other half dont show up because of blatant spelling mistakes and just look elsewhere for assistance

Setting security.OCSP.require to true breaks a lot of functionality, particularly around anything related to Google, in case anyone was having trouble after applying some of these settings

CAFxX commented Jan 21, 2018

@yb66 if you re-read my comment you will find the reasoning for not using non-standard configurations is right there: because you are easier to track (and that defeats the implicit goal of most tweaks in this gist, see all the author's remarks about "avoiding fingerprinting" and "user privacy"). See e.g.

About my point about the random gist about cryptographic "suggestions": I'm sorry if I wasn't clear enough. Let me rephrase: you should never trust opinions about how to do or not do cryptography from sources that the cryptographic community does not consider to be respectable. I have nothing against the author of this gist but, as I stated, it does not come even close to clearing that bar. (note that a simple way for the author to clear that bar would be to provide references to respectable sources as to why he's changing cryptographic settings - something that is conspicuously missing from the gist)

I hope my comment is clearer now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment