Skip to content

Commit

Permalink
Allow SVG
Browse files Browse the repository at this point in the history
Disabling SVG breaks way too many sites nowadays.

Relates (at least) to:

* #323
* #362
* #399
* #422
  • Loading branch information
pyllyukko committed Oct 3, 2018
1 parent 6e1e480 commit 6ee951e
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 5 deletions.
2 changes: 0 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -204,7 +204,6 @@ Settings that do not belong to other sections or are user specific preferences.
* Disable Displaying Javascript in History URLs [ [1](http://kb.mozillazine.org/Browser.urlbar.filter.javascript) ]
* Disable asm.js [ [1](http://asmjs.org/) [2](https://www.mozilla.org/en-US/security/advisories/mfsa2015-29/) [3](https://www.mozilla.org/en-US/security/advisories/mfsa2015-50/) [4](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2712) ]
* Disable SVG in OpenType fonts [ [1](https://wiki.mozilla.org/SVGOpenTypeFonts) [2](https://github.com/iSECPartners/publications/tree/master/reports/Tor%20Browser%20Bundle) ]
* Disable in-content SVG rendering (Firefox >= 53)
* Disable video stats to reduce fingerprinting threat [ [1](https://bugzilla.mozilla.org/show_bug.cgi?id=654550) [2](https://github.com/pyllyukko/user.js/issues/9#issuecomment-100468785) [3](https://github.com/pyllyukko/user.js/issues/9#issuecomment-148922065) ]
* Don't reveal build ID
* Prevent font fingerprinting [ [1](https://browserleaks.com/fonts) [2](https://github.com/pyllyukko/user.js/issues/120) ]
Expand Down Expand Up @@ -422,7 +421,6 @@ Hardening your often implies a trade-off with ease-of-use and comes with reduced
* Disabling clipboard events breaks Ctrl+C/X/V copy/cut/paste functionaility in JS-based web applications (Google Docs...)
* Disabling clipboard operations will break legitimate JS-based "copy to clipboard" functionality
* Enabling Mixed Display Content blocking can prevent images/styles... from loading properly when connection to the website is only partially secured
* Disabling SVG support breaks many UI elements on many sites
* Disabling nonessential protocols breaks all interaction with custom protocols such as mailto:, irc:, magnet: ... and breaks opening third-party mail/messaging/torrent/... clients when clicking on links with these protocols
* Disabling system add-on updates prevents Mozilla from "hotfixing" your browser to patch critical problems (one possible use case from the documentation)
* Containers are not available in Private Browsing mode
Expand Down
6 changes: 3 additions & 3 deletions user.js
Original file line number Diff line number Diff line change
Expand Up @@ -302,11 +302,11 @@ user_pref("javascript.options.asmjs", false);
// https://github.com/iSECPartners/publications/tree/master/reports/Tor%20Browser%20Bundle
user_pref("gfx.font_rendering.opentype_svg.enabled", false);

// PREF: Disable in-content SVG rendering (Firefox >= 53)
// NOTICE: Disabling SVG support breaks many UI elements on many sites
// PREF: Disable in-content SVG rendering (Firefox >= 53) (disabled)
// NOTICE-DISABLED: Disabling SVG support breaks many UI elements on many sites
// https://bugzilla.mozilla.org/show_bug.cgi?id=1216893
// https://github.com/iSECPartners/publications/raw/master/reports/Tor%20Browser%20Bundle/Tor%20Browser%20Bundle%20-%20iSEC%20Deliverable%201.3.pdf#16
user_pref("svg.disabled", true);
//user_pref("svg.disabled", true);


// PREF: Disable video stats to reduce fingerprinting threat
Expand Down

0 comments on commit 6ee951e

Please sign in to comment.