Leave all site settings permissions at ask to allow. Check browser anonymity or security with TorZillaPrint & Browser Leaks.
See the Arkenfox wiki.
Librewolf
Add Arkenfox’s user.js & Luke Smith’s overrides:
- Make a new browser profile: β
about:profilesβCreate a New Profile - Append the overrides to Arkenfox.
- Place both
.jsfiles in the new profile (root directory). - Place
updater.sh&prefsCleaner.shin there. - Run both every once in a while.
Alternatively, there’s an AUR package.
Fennec F-Droid
Enable ETP: β Settings β Privacy and Security β
Enhanced Tracking Protection β Enhanced Tracking Protection β β Strict β β Allow Fennec to automatically apply exceptions... β β Tell websites not to share & sell data
Add Arkenfox’s user.js & Luke Smith’s overrides (requires root):
- Append the overrides to the user.js file.
- Place it at
/data/data/org.mozilla.fennec_fdroid/files/mozilla/XXXXXXXX.default/ - Set its owner & group to Fennec.
To enable installing extensions as normal, append this to the user.js:
user_pref("privacy.resistFingerprinting.block_mozAddonManager", "false")
Extensions
- π uBlock Origin – Blocks ads & scripts.
- πͺ I still don’t care about cookies – Removes annoying cookie banners.
- π³ LocalCDN – Emulates CDNs locally.
- π― LibRedirect – Redirects sites to privacy front-ends.
Set uBlock to hard or medium mode.
Enable AdGuard URL Tracking Protection & import Actually Legitimate URL Shortener Tool in uBlock. Both of these are pre-enabled on desktop.
Fix WebRTC leak with uBlock on mobile: β β Prevent WebRTC from leaking local IP addresses
Additionally these may be useful:
- ποΈ Stylus – Changes any website’s colors.
- π Violentmonkey – Runs userscripts.
DNS over HTTPS
Enable DoH if not using Tor or I2P.
Librewolf: β Settings β Privacy and Security β DNS over HTTPS β β Max Protection β Choose provider: Mullvad (No Filtering)
Fennec: β Settings β Privacy and Security β DNS over HTTPS β β Max Protection β Choose provider: Custom β
Provider: https://dns.mullvad.net/dns-query
Tor & I2P
Official Firefox config for I2P.
The relevant about:config values are:
network.proxy.socks localhost
network.proxy.socks_port 4444 // 4447 for I2Pd, 9050 for Tor.
network.proxy.type 1 // 1 = enable, 5 = use system proxy
Remember to set this:
network.dns.disabled true
Otherwise if the proxy isn’t running or connected .onion
& .i2p addresses will be sent to your VPN or ISP.