summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorThomas Groman <tgroman@nuegia.net>2020-03-17 15:06:22 -0700
committerThomas Groman <tgroman@nuegia.net>2020-03-17 15:06:22 -0700
commitf428692de8b59ab89a66502c079e1823dfda8aeb (patch)
treea5741c67704cb27343fac8f4e260fbbacc984d8c
parent4695bd51e28ca0a7709342e55ae66f34379686c5 (diff)
downloadwebbrowser-f428692de8b59ab89a66502c079e1823dfda8aeb.tar
webbrowser-f428692de8b59ab89a66502c079e1823dfda8aeb.tar.gz
webbrowser-f428692de8b59ab89a66502c079e1823dfda8aeb.tar.lz
webbrowser-f428692de8b59ab89a66502c079e1823dfda8aeb.tar.xz
webbrowser-f428692de8b59ab89a66502c079e1823dfda8aeb.zip
Always ask before screensharing no matter who it is28.8.4
-rw-r--r--branding/shared/pref/preferences.inc5
1 files changed, 5 insertions, 0 deletions
diff --git a/branding/shared/pref/preferences.inc b/branding/shared/pref/preferences.inc
index 6c84256..9f7c7d8 100644
--- a/branding/shared/pref/preferences.inc
+++ b/branding/shared/pref/preferences.inc
@@ -87,6 +87,7 @@ pref("image.mem.decode_bytes_at_a_time", 65536); //larger chunks
// Make sure we shortcut out of a11y to save walking unnecessary code
pref("accessibility.force_disabled", 1);
+// ===| Privacy |==============================================================
// Disable OCSP Stapling which sends every website visited to the CA's server
// and is easily defeatable by sending a '3' response code making the whole
// standard meaningless to protect against MITM attacks with stolen privkeys.
@@ -100,8 +101,12 @@ pref("security.OCSP.enabled", 0);
pref("security.ssl.must_staple", true);
pref("security.OCSP.require", true);
+// Enable Oppurtunistic encryption for HTTP/2 alt-service by default
pref("network.http.altsvc.oe", true);
+// Do not preload exceptions for anybody to capture screen
+pref("media.getusermedia.screensharing.allowed_domains", "");
+
// ============================================================================
// ===| DevTools |=============================================================