I could not live without Imagus.
https://addons.mozilla.org/en-US/firefox/addon/imagus/
Although IQfy has built-in zoom on hover functionality, this baby works everywhere and has some neat features.
uBlacklist is a new one that's pretty good. It lets you remove specific websites from your search results, and works with most search engines.
Make sure to add the pinterest list.
https://addons.mozilla.org/en-US/firefox
/addon/ublacklist/
Switching to a fork.
IceCat, LibreWolf, whatever fits your needs best.
Mozilla Firefox is crap, though. The default configuration (as of 2022) is an insult to its users.
uMatrix >very granular control over what content gets allowed/blocked and where >you can set it to allow only what you need and block everything else >unmaintained, but still usable (so long as web standards don't evolve or a vulnerability isn't discovered)
uBlock Origin >well-maintained >medium/advanced modes to block scripts, though less granular than uMatrix >can hide elements (1st-party ads, social media buttons, cookie notices, etc) and remove URL referrers
ff2mpv
KeePassXC-Browser
LibRedirect >supports frontends for various sites >uses a random instance for each redirect, evening the load across instances >includes some TOR and I2P instances
Redirector
Simple Tab Groups or Tree Style Tab >STG for those who loved classic FF's tab groups feature >TST if you don't have a portrait monitor (you'll want to hide the stock tabs with userChrome.css)
Stylus
Vimium C
ViolentMonkey
>privacy add-ons you likely don't need
anti-fingerprinting extensions (enable Resist Fingerprinting)
ClearURLs, NeatURLs, Skip Redirect (uBO covers these, possibly Redirector too)
HTTPS Everywhere (enable HTTPS-Only Mode)
LibreJS (only meant for blocking proprietary JS, little control over anything else)
LocalCDN/Decentraleyes (setting Enhanced Tracking Protection to Strict makes these irrelevant)
Multi-Account Containers (useful for logging into multiple accounts at once, but Strict ETP makes this redundant)
>LocalCDN/Decentraleyes (setting Enhanced Tracking Protection to Strict makes these irrelevant)
That's not really true, you are still sending the website domains to the CDN in most cases.
If that's an issue is up to you but the Strict setting doesn't change this.
CDNs usually don't place cookies, so this doesn't make a difference.
2 years ago
Anonymous
>CDN extensions never really improved privacy as far as sharing your IP address was concerned and their usage is fingerprintable as this Tor Project developer points out. They are the wrong tool for the job and are not a substitute for a good VPN or Tor. Its worth noting the resources for Decentraleyes are hugely out of date and would not be likely used anyway.
2 years ago
Anonymous
>>CDN extensions never really improved privacy as far as sharing your IP address was concerned
When they inject you are not making a request so you're sharing your IP less then. If the resource is missing you are downloading from the CDN but without the website name so the CDN doesn't know what domain you are browsing when you use it.
>their usage is fingerprintable as this Tor Project developer points out
Not a problem if the website just uses the javascript cdn due to convenience, which is why most websites use these cdn linked scripts.
>Its worth noting the resources for Decentraleyes are hugely out of date and would not be likely used anyway.
Decentraleyes is outdated. For LocalCDN if a resource is missing, the extension will download it without sending the website name in the request. This works for supported providers. Here is a list:
https://codeberg.org/nobody/LocalCDN/src/branch/main/CDN.txt
2 years ago
Anonymous
Even LocalCDN barely works, it's all snake oil. Just use a VPN if you're concerned about your IP leaking to a CDN.
ublock origin should be the only extension you're using. anything else is BLOAT
SUPER MEGA GLOWBlack person BASED
Why do you need extensions? They'll be deprecated by Mozilla next year anyway
I could not live without Imagus.
https://addons.mozilla.org/en-US/firefox/addon/imagus/
Although IQfy has built-in zoom on hover functionality, this baby works everywhere and has some neat features.
thanks a lot Black person
Violentmonkey until it breaks in a year or two.
ublock origin (medium mode)
jshelter
privacy.firstparty.isolate true
https://coveryourtracks.eff.org/
Thank me later.
uBlacklist is a new one that's pretty good. It lets you remove specific websites from your search results, and works with most search engines.
Make sure to add the pinterest list.
https://addons.mozilla.org/en-US/firefox
/addon/ublacklist/
Interesting. This would purge all those useless pinterest.com hits.
>uBlacked
Looks based, installing it rn
Spammer here, I use Simple Form Fill and QR Code addons a lot
Don't accept webp. Works flawlessly. I saw my last save-as webp requester a year ago.
https://github.com/jscher2000/dont-accept-webp
You should use New Things Bad addon
https://addons.mozilla.org/en-US/firefox/addon/multithreaded-download-manager/
https://addons.mozilla.org/firefox/addon/clipboard2file/
https://addons.mozilla.org/firefox/addon/enhanced-h264ify/
https://addons.mozilla.org/firefox/addon/crxviewer/
https://addons.mozilla.org/firefox/addon/ublock-origin/
you dont really need h264ify unless you are on some old-ass thinkpas/pc that cant support vp9 hardware decoding
ublock is a musthave
also i use kellyc image downloader to view e-girl hentai from reactor after it got banned
Dark reader so my eyes don't die
ublock
dark reader
bitwarden
sponsorblock
violentmonkey
But guys I'm using Brave plx hook me up some cool add-ons thnx
tard question but how do I get IQfy to remember to use Tomorrow without saving cookies?
its tedious setting to tomorrow over and over and over again
Youtube age bypass, cause fricking logging in to youtube.
https://github.com/zerodytrash/Simple-YouTube-Age-Restriction-Bypass/
uBlock Origin
LibreJS
ClearURLs
HTTPS Everywhere
Decentraleyes
Vim Vixen
>HTTPS Everywhere
Discontinued by EFF, they said use the browser setting now.
installing brave
>What are the best Fire-ACK!
*dilates*
Switching to a fork.
IceCat, LibreWolf, whatever fits your needs best.
Mozilla Firefox is crap, though. The default configuration (as of 2022) is an insult to its users.
Stop bloating your browser.
uMatrix
>very granular control over what content gets allowed/blocked and where
>you can set it to allow only what you need and block everything else
>unmaintained, but still usable (so long as web standards don't evolve or a vulnerability isn't discovered)
uBlock Origin
>well-maintained
>medium/advanced modes to block scripts, though less granular than uMatrix
>can hide elements (1st-party ads, social media buttons, cookie notices, etc) and remove URL referrers
ff2mpv
KeePassXC-Browser
LibRedirect
>supports frontends for various sites
>uses a random instance for each redirect, evening the load across instances
>includes some TOR and I2P instances
Redirector
Simple Tab Groups or Tree Style Tab
>STG for those who loved classic FF's tab groups feature
>TST if you don't have a portrait monitor (you'll want to hide the stock tabs with userChrome.css)
Stylus
Vimium C
ViolentMonkey
>privacy add-ons you likely don't need
anti-fingerprinting extensions (enable Resist Fingerprinting)
ClearURLs, NeatURLs, Skip Redirect (uBO covers these, possibly Redirector too)
HTTPS Everywhere (enable HTTPS-Only Mode)
LibreJS (only meant for blocking proprietary JS, little control over anything else)
LocalCDN/Decentraleyes (setting Enhanced Tracking Protection to Strict makes these irrelevant)
Multi-Account Containers (useful for logging into multiple accounts at once, but Strict ETP makes this redundant)
>LocalCDN/Decentraleyes (setting Enhanced Tracking Protection to Strict makes these irrelevant)
That's not really true, you are still sending the website domains to the CDN in most cases.
If that's an issue is up to you but the Strict setting doesn't change this.
https://www.privacyguides.org/blog/2021/12/01/firefox-privacy-2021-update/
CDNs usually don't place cookies, so this doesn't make a difference.
>CDN extensions never really improved privacy as far as sharing your IP address was concerned and their usage is fingerprintable as this Tor Project developer points out. They are the wrong tool for the job and are not a substitute for a good VPN or Tor. Its worth noting the resources for Decentraleyes are hugely out of date and would not be likely used anyway.
>>CDN extensions never really improved privacy as far as sharing your IP address was concerned
When they inject you are not making a request so you're sharing your IP less then. If the resource is missing you are downloading from the CDN but without the website name so the CDN doesn't know what domain you are browsing when you use it.
>their usage is fingerprintable as this Tor Project developer points out
Not a problem if the website just uses the javascript cdn due to convenience, which is why most websites use these cdn linked scripts.
>Its worth noting the resources for Decentraleyes are hugely out of date and would not be likely used anyway.
Decentraleyes is outdated. For LocalCDN if a resource is missing, the extension will download it without sending the website name in the request. This works for supported providers. Here is a list:
https://codeberg.org/nobody/LocalCDN/src/branch/main/CDN.txt
Even LocalCDN barely works, it's all snake oil. Just use a VPN if you're concerned about your IP leaking to a CDN.
vimmium c (dev is china wiener sucking chink tho)
sidebery