Privacy Tools Guide

Firefox is the only major browser developed by a non-profit. It’s the best privacy browser if configured correctly—but the default settings leave you exposed to trackers and advertisers. This guide hardens Firefox without causing widespread site breakage (the common problem with overly aggressive privacy configs).

The Privacy Problem Firefox Solves

Most browsers (Chrome, Edge, Safari) are built by corporations that profit from your data:

Firefox is built by Mozilla, a nonprofit. They don’t sell your data. But they use Google as default search (revenue sharing), and many default settings are permissive for compatibility.

This guide locks Firefox down while keeping sites functional.

The Balance: Privacy vs. Breakage

Aggressive privacy settings break ~5% of sites:

This guide targets 95%+ functionality. If you want 99.9% privacy, you’ll lose some sites.

Step 1: Firefox Settings (about:preferences)

Privacy & Security → Enhanced Tracking Protection

Current setting: Standard
Better setting: Strict
Effect: Blocks known trackers, requires site whitelisting for breakage
Breakage: <1%

Click: Settings → Privacy & Security → Enhanced Tracking Protection → Strict

Cookies and Site Data

Current: "Allow all cookies"
Better: "Only from sites you visit"
Best: "Block all cookies" (requires whitelisting)
Recommendation: "Only from sites you visit"

Firefox → Preferences → Privacy → Cookies and Site Data → “Only from sites you visit”

Explanation:

Site Permissions

Location: Block by default
Microphone: Block by default
Camera: Block by default
Notification: Block always

Firefox → Preferences → Privacy → Permissions

You’ll manually grant permissions to sites that need them (rare).

DNS over HTTPS

Current: Off
Better: On (with Cloudflare or Mozilla)
Effect: ISP can't see which sites you visit
Breakage: <0.1%

Firefox → Preferences → Privacy & Security → DNS over HTTPS → Enable with Cloudflare

Why this matters: Without DNS over HTTPS, your ISP sees every site you visit (sold to advertisers). With it, only Cloudflare sees (and Cloudflare has a better privacy policy than ISPs).

Step 2: about:config Advanced Settings

Enter about:config in address bar and confirm you’ll be careful.

Core Privacy Settings

// Disable telemetry
datareporting.policy.dataSubmissionEnabled = false
datareporting.healthreport.uploadEnabled = false
toolkit.telemetry.enabled = false
toolkit.telemetry.archive.enabled = false

// Disable pocket integration (reading list, ads)
extensions.pocket.enabled = false

// Disable studies (Mozilla experiments)
app.studies.enabled = false

// Disable Firefox profiling (send usage data)
profiler.enabled = false

// Disable crash reports
breakpad.reportURL = ""

Tracking Protection Settings

// Prevent DOM-based tracking
privacy.trackingprotection.enabled = true
privacy.trackingprotection.cryptomining.enabled = true
privacy.trackingprotection.fingerprinting.enabled = true

// Disable third-party tracking (Strict mode)
network.cookie.sameSite.laxByDefault = true

// Disable floating tracking parameters
privacy.query_stripping.enabled = true
privacy.query_stripping.enabled.pbmode = true

Fingerprinting Protection

Websites track you by fingerprinting (your unique browser config):

// Randomize user agent for privacy
// (slightly increases breakage, recommend leaving off)
privacy.resistFingerprinting = false  // True breaks some auth, keeping false

// Reduce entropy in reports
privacy.reduceTimerPrecision = true
privacy.reduceTimerPrecision.microseconds = 1000

// Disable WebGL (reduces fingerprinting)
webgl.disabled = false  // Breaking; disable only if needed

// Disable battery API (reveals low power states)
dom.battery.enabled = false

Network Security

// Require HTTPS for all connections (upgrade http:// to https://)
dom.security.https_only_mode = true
dom.security.https_only_mode_ever_enabled = true

// Enforce strict CSP (prevents XSS attacks)
security.csp.enable = true

// Disable HTTP Basic Auth (uses plaintext passwords)
network.http.keep-alive.timeout = 300

Third-Party Restrictions

// Block third-party frames
privacy.partition.network_state = true
privacy.partition.network_state_isolation = true

// Disable OCSP (prevents sites from learning what you've visited)
security.OCSP.enabled = 0  // Value 0 disables OCSP

Step 3: Privacy Extensions (Minimal Set)

Avoid extension bloat (each extension is an attack surface). Use only 3-4:

uBlock Origin (Ad/Tracker Blocking)

Install from: addons.mozilla.org

Configuration:

  1. Click uBlock icon → Dashboard
  2. Go to “Filter lists” tab
  3. Enable recommended lists:
    • uBlock filters
    • EasyList (ads)
    • EasyPrivacy (tracking)
    • Fanboy’s Annoyance List (social media widgets)
    • Peter Lowe’s Ad/Tracking list

Settings → Behavior:

Why uBlock Origin:

Bitwarden (Password Manager)

Install from: addons.mozilla.org

Bitwarden reduces password reuse (biggest security problem). Each site gets unique password.

Configuration:

Decentraleyes (CDN Privacy)

Install from: addons.mozilla.org

Blocks requests to centralized CDNs (Cloudflare, Google Fonts, Bootstrap). Replaces with local versions.

Effect:

Configuration: Zero setup required; works silently.

SimpleLogin (Email Masking)

Install from: addons.mozilla.org (optional, only if you care about email privacy)

Creates alias email addresses for every site signup. Forwards to your real email, preventing trackers from connecting your email across sites.

Cost: $99/year (alternative: use email provider’s alias feature)

When to use:

When to skip:

Why it matters: Advertisers buy email lists and cross-reference to build profiles. Aliases prevent this linking.

Testing Your Configuration

Test 1: Check Tracker Blocking

Visit: https://cookiepedia.co.uk/

Expected: Site should show you’re blocking most trackers. Compare to default browser.

Test 2: Check DNS over HTTPS

Visit: https://1.1.1.1/dns/

Expected: Shows “DNS over HTTPS working” (green).

Test 3: Check Fingerprinting Resistance

Visit: https://browserleaks.com/

Expected:

Test 4: Common Sites Still Work

✓ Gmail / Yahoo Mail
✓ Banking sites (some may require whitelisting)
✓ YouTube / Netflix
✓ Reddit / Twitter
✓ Amazon / shopping sites
? Corporate intranets (may require HTTPS exceptions)

If a critical site breaks:

  1. Click the uBlock origin icon
  2. Click the power button to whitelist that domain for that session
  3. Reload page
  4. If it works, add to permanent whitelist

Whitelist process:

  1. Click uBlock → Dashboard
  2. “Whitelist” tab
  3. Add domain

Avoiding Fingerprinting While Maintaining Functionality

The Fingerprinting Tradeoff

Aggressive privacy:

privacy.resistFingerprinting = true  // But breaks many sites

Balanced (recommended):

privacy.resistFingerprinting = false  // Fingerprinting possible
privacy.reduceTimerPrecision = true    // Reduced timing attack surface

Browser fingerprinting is complex. Truly defeating it requires tools like Tor Browser, which is slower. For normal browsing, the above balance is good.

Site Breakage: Troubleshooting

Scenario 1: Login Page Doesn’t Work

Cause: HTTPS only mode or strict cookies

Fix:

  1. Temporarily disable HTTPS only mode for that domain:
    about:preferences → Privacy & Security → HTTPS only mode → Off
    
  2. Or whitelist in uBlock Origin

Permanent fix: Report to site (HTTPS not working is their bug)

Scenario 2: Video Won’t Play

Cause: uBlock Origin blocking ad/tracking scripts

Fix:

  1. Click uBlock icon
  2. Power button to whitelist that domain
  3. Reload
  4. Click icon again, check “Media” and “Scripts” categories

Scenario 3: Payment Page Errors

Cause: Overly aggressive privacy preventing form submission

Fix:

  1. Enable HTTPS only mode OFF for that domain
  2. Disable Enhanced Tracking Protection for that domain
  3. Complete payment
  4. Re-enable after

Note: Legitimate payment sites should work with your privacy settings. If they don’t, they have trust/security problems.

Advanced: Container Tabs

For maximum privacy, use Firefox Containers (separate cookie jars per domain):

Install: Multi-Account Containers extension
Configuration:
- Create containers: Work, Personal, Banking, Shopping
- Assign sites to containers
- Cookies never cross containers

Effect:

Tradeoff: Slightly inconvenient (must remember container assignments)

Privacy Maintenance Checklist

Monthly:

Quarterly:

Annually:

Built by theluckystrike — More at zovo.one