Skip to content

Tags

Tags give the ability to mark specific points in history as being important
  • 2025.06.24.1 Release: 2025.06.24.1
    **<details><summary>⚠️ IMPORTANT NOTE FOR DESKTOP USERS OF GECKO MEDIA PLUGINS (OpenH264, Widevine)**:</summary>
    
    **While we don't support the use of Gecko Media Plugins and the plug-in it provides** *(`OpenH264`, `Widevine`)*, for users who *do* use this functionality at their own discretion: To continue receiving updates to your installed plug-ins, you **must** set `media.gmp-manager.updateEnabled` to `true` in your [`about:config`](about:config).
    
    </details>
    
    <br>
    
    ____
    
    * <details><summary>Prevented PDF.js from attempting to load/convert unknown binary files.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/76509aeb06da6ef33d928975d20758aa8ad13bb1
        
        `pdfjs.handleOctetStream` -> `false`
    
    </details>
    
    * <details><summary>Enforced using the internal font renderer when viewing PDFs with PDF.js.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/0fc24596cb379cd6404e17e72f7bacd392552eeb
        
        `pdfjs.disableFontFace` -> `true`
    
    </details>
    
    * <details><summary>Forced PDFs to be downloaded/viewed locally, and enabled a prompt before opening PDF.js by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/d786f2561b812f824eb29c29c44f04747a81e5df
        
        **ANDROID**: `browser.download.force_save_internally_handled_attachments` -> `true`
        `browser.download.open_pdf_attachments_inline` -> `false`
        `pdfjs.disableRange` -> `true`
        `pdfjs.disableStream` -> `true`
    
    </details>
    
    * <details><summary>Enabled Private Network Access Restrictions.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/481d2042382a6382cf2e3bb9a600a98e463c76c2 + https://codeberg.org/celenity/Phoenix/commit/0eaee7308dd0ff1154649a3022e198bd6e3d75a3
        
        `network.lna.block_trackers` -> `true`
        `network.lna.blocking` -> `true`
        `network.lna.enabled` -> `true`
    
    </details>
    
    * <details><summary>Strengthened Bounce Tracking Protection to protect against all bounce trackers, instead of just those who access cookies/storage.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/643c214d5f36fb6d02692d14fa164804e81f1631
        
        `privacy.bounceTrackingProtection.requireStatefulBounces` -> `false`
    
    </details>
    
    * <details><summary>Enabled blocking of known fingerprinters classified as "anti-fraud".</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/561ef26af3bcb88f9d71d499ad79ae3de7c058a1
        
        `privacy.trackingprotection.antifraud.annotate_channels` -> `true`
        `privacy.trackingprotection.antifraud.skip.enabled` -> `false`
        `privacy.trackingprotection.antifraud.skip.pbmode.enabled` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Added policy to block tracking cookies.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/e9dbd0a59c513e1bf385365b85dde831dcd19c8f
        
        `Cookies` -> `RejectTracker` -> `true`
    
    </details>
    
    * <details><summary>Disabled the Web Share API.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/042de50a5c69e9e71b1a3954f0745c814bcfa357
        
        `dom.webshare.enabled` -> `false`
        `dom.webshare.requireinteraction` -> `true`
    
    </details>
    
    * <details><summary>Disabled the File System Access API.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/583d8bb1e20600e8c7753c9bf9a856063b94995c
    
        `dom.fs.enabled` -> `false`
    
    </details>
    
    * <details><summary>Blocked invalid cookies - Currently on Nightly.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/ee14d1a3c9c9e5f5bdc4abd6c6b7c4f72788f83a
        
        `extensions.cookie.rejectWhenInvalid` -> `true`
    
    </details>
    
    * <details><summary>Disabled requests to '0.0.0.0'.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/5090159fc1f3882cac9fe68ded588def766d631c
    
        `network.socket.ip_addr_any.disabled` -> `true`
    
    </details>
    
    
    
    * <details><summary>Fixed a syntax error that prevented cookie banner rules from being applied properly.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/issues/147 + https://codeberg.org/celenity/Phoenix/commit/c600fd56160a36a83bf49f63ff0c014c177fe08a
    
    </details>
    
    * **<details><summary>ANDROID**: Fixed a syntax error that prevented our FPP overrides from being applied properly.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/pulls/146 - *Thanks to @FaFre 💜*
    
    </details>
    
    * <details><summary>Fixed support links.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/4b8ae92aaf4dc4e83576054f9117c276c18092d1
    
    </details>
    
    * <details><summary>Enabled PDF.js Alt Text functionality, but disabled "Automatic" Alt Text by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/8d2f4e0f7640aaa55b11aa2f1b06dd0befc52d73
        
        `pdfjs.enableAltText` -> `true`
        `pdfjs.enableAltTextForEnglish` -> `true`
        `pdfjs.enableAltTextModelDownload` -> `false`
        `pdfjs.enableGuessAltText` -> `true`
        `pdfjs.enableNewAltTextWhenAddingImage` -> `true`
        `pdfjs.enableUpdatedAddImage` -> `true`
    
    </details>
    
    * <details><summary>Removed unnecessary Safe Browsing prefs to avoid extra complexity and confusion.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/c1e05f405abf34cec6c008e24749a9a25a377346
        
        `browser.safebrowsing.features.blockedURIs.update`
        `browser.safebrowsing.features.consentmanager.annotate.update`
        `browser.safebrowsing.features.cryptomining.annotate.update`
        `browser.safebrowsing.features.cryptomining.update`
        `browser.safebrowsing.features.downloads.update`
        `browser.safebrowsing.features.emailtracking.update`
        `browser.safebrowsing.features.fingerprinting.annotate.update`
        `browser.safebrowsing.features.fingerprinting.update`
        `browser.safebrowsing.features.malware.update`
        `browser.safebrowsing.features.phishing.update`
        `browser.safebrowsing.features.socialtracking.annotate.update`
        `browser.safebrowsing.features.socialtracking.update`
        `browser.safebrowsing.features.trackingAnnotation.update`
        `browser.safebrowsing.features.trackingProtection.update`
        `browser.safebrowsing.provider.mozilla.updateURL`
    
    </details>
    
    * <details><summary>Switched to using the 'browser.safebrowsing.provider.google.lists' pref to disable the legacy (v2.2) Safe Browsing API, instead of 'browser.safebrowsing.provider.google.gethashURL' & 'browser.safebrowsing.provider.google.updateURL'.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/a2b850709cd4da44da3d464d095e6376e35bfb7d + https://codeberg.org/celenity/Phoenix/commit/990c968e1e68b6d7e92c0c0c9127e63a03973fe2
        
        `browser.safebrowsing.provider.google.gethashURL` -> `https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2`
        `browser.safebrowsing.provider.google.updateURL` -> `https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2&key=%GOOGLE_SAFEBROWSING_API_KEY%`
        `browser.safebrowsing.provider.google.lists` -> `disabled`
        `browser.safebrowsing.provider.google.lists.default` -> `goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,googpub-phish-shavar,goog-malware-shavar,goog-unwanted-shavar`
    
    </details>
    
    * <details><summary>Created a separate Safe Browsing provider for the IronFox proxy endpoint, and made it easier for users to switch between using the proxied vs. unproxied standard Google endpoint.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/990c968e1e68b6d7e92c0c0c9127e63a03973fe2
        
        `browser.safebrowsing.provider.google4.advisoryName` -> `Google Safe Browsing (Unproxied)`
        `browser.safebrowsing.provider.google4.gethashURL` -> `https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST`
        `browser.safebrowsing.provider.google4.lists` -> `disabled`
        `browser.safebrowsing.provider.google4.lists.default` -> `goog-badbinurl-proto,goog-downloadwhite-proto,goog-phish-proto,googpub-phish-proto,goog-malware-proto,goog-unwanted-proto,goog-harmful-proto`
        `browser.safebrowsing.provider.google4.updateURL` -> `https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST`
        `browser.safebrowsing.provider.ironfox.advisoryName` -> `Google Safe Browsing (Proxied by IronFox)`
        `browser.safebrowsing.provider.ironfox.advisoryURL` -> `https://developers.google.com/safe-browsing/v4/advisory`
        `browser.safebrowsing.provider.ironfox.dataSharing.enabled` -> `false`
        `browser.safebrowsing.provider.ironfox.dataSharingURL` -> ` `
        `browser.safebrowsing.provider.ironfox.gethashURL` -> `https://safebrowsing.ironfoxoss.org/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST`
        `browser.safebrowsing.provider.ironfox.lists` -> `goog-badbinurl-proto,goog-downloadwhite-proto,goog-phish-proto,googpub-phish-proto,goog-malware-proto,goog-unwanted-proto,goog-harmful-proto`
        `browser.safebrowsing.provider.ironfox.nextupdatetime` -> `1`
        `browser.safebrowsing.provider.ironfox.pver` -> `4`
        `browser.safebrowsing.provider.ironfox.reportMalwareMistakeURL` -> `https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=`
        `browser.safebrowsing.provider.ironfox.reportPhishMistakeURL` -> `https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=`
        `browser.safebrowsing.provider.ironfox.reportURL` -> `https://transparencyreport.google.com/safe-browsing/search?url=`
        `browser.safebrowsing.provider.ironfox.updateURL` -> `https://safebrowsing.ironfoxoss.org/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST`
    
    </details>
    
    * <details><summary>Switched to using the 'media.gmp-manager.updateEnabled' pref to disable GMP (Gecko Media Plugins), instead of 'media.gmp-provider.enabled'.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/59c345e27c46e2bacaf1547bcfdb7c893637b271 + https://codeberg.org/celenity/Phoenix/commit/915de4e16ef0cc54ebd396b5d0bafcbdd9f80bba
        
        `media.gmp-manager.updateEnabled` -> `false`
        `media.gmp-provider.enabled` -> `true`
    
    </details>
    
    * <details><summary>Adjusted the DRM/EME prefs.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/eb47b359e8f8d435175f57abd40084e4fb4838f4 + https://codeberg.org/celenity/Phoenix/issues/108#issuecomment-5522324
        
        `media.eme.require-app-approval` -> `true`
        
        **Removed**:
        
        `media.clearkey.persistent-license.enabled`
        `media.clearkey.test-key-systems.enabled`
        `media.eme.wmf.clearkey.enabled`
        `media.gmp-widevinecdm.visible`
        `media.gmp-widevinecdm-l1.visible`
    
    </details>
    
    * <details><summary>Disabled 'nsNotifyAddrListener'.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/8c284fdd0202dafd4f77d7eed3a4a864ce1feeb1 + https://codeberg.org/celenity/Phoenix/commit/db3fd67a588ccd676ba5f0dac36c79eec47835b6
        
        `network.notify.changed` -> `false`
        `network.notify.dnsSuffixList` -> `false`
        `network.notify.initial_call` -> `false`
        `network.notify.IPv6` -> `false`
        `network.notify.resolvers` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Added keyword shortcuts for our included search engines.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/02e5d2442221043e28ab597beed1f0a02c006f6f
    
    </details>
    
    * **<details><summary>DESKTOP**: Enabled OHTTP for Merino (Firefox suggestions from Mozilla) and Mozilla's Ad Routing Service (MARS) if enabled.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/5eadfd7fe3e8b0e8c0e4083089fa08ce4b38681f
        
        `browser.newtabpage.activity-stream.discoverystream.merino-provider.ohttp.enabled` -> `true`
        `browser.newtabpage.activity-stream.unifiedAds.ohttp.enabled` -> `true`
    
    </details>
    
    * **<details><summary>DESKTOP**: Fixed the Weather on Firefox Home ('about:home') if enabled.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/46082efc5e9cd25c57a81baebb253c154e735c1b
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled AMP search suggestions.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/24748ed4e35de05c48046a7b4d6f9e79fa2dec42
        
        `browser.urlbar.amp.featureGate` -> `false`
        `browser.urlbar.suggest.amp` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled Wikipedia search suggestions by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/a9486f0ce6fe7c2a967e2c11ebbfb20d48e61feb
        
        `browser.urlbar.suggest.wikipedia` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled "New Tab Messaging" on Firefox Home ('about:home').</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/a8df9683b36cf24df3a3034c9b55bd85a310508e
    
        `browser.newtabpage.activity-stream.feeds.newtabmessaging` -> `false`
    
    </details>
    
    * <details><summary>Disabled fetching Firefox Relay's "allowlist" (list of sites known to support Relay) and fetching Password Manager rules remotely by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/0f1e81205123b3236e3551def2e5361fe761b089
        
        `signon.firefoxRelay.allowListRemoteSettingsCollection` -> ` `
        `signon.recipes.remoteRecipes.enabled` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled Firefox Messaging System targeting information background updates.</summary>
        
        `app.update.background.messaging.targeting.snapshot.intervalSec` -> `-1`
    
    </details>
    
    * **<details><summary>DESKTOP**: Added flags to indicate the jurisdiction of our built-in DoH resolvers.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/3c7013a53aa6129cb625a03b92034194a80257cb
        
        `doh-rollout.provider-list` -> `[{"uri":"https://dns.quad9.net/dns-query","UIName":"Quad9 - Real-time Malware Protection - 🇨🇭","autoDefault":true},{"uri":"https://zero.dns0.eu","UIName":"DNS0 (ZERO) - Hardened Real-time Malware Protection - 🇫🇷","autoDefault":false},{"uri":"https://dns0.eu","UIName":"DNS0 - Real-time Malware Protection - 🇫🇷","autoDefault":false},{"uri":"https://base.dns.mullvad.net/dns-query","UIName":"Mullvad (Base) - Ad/Tracking/Limited Malware Protection - 🇸🇪","autoDefault":false},{"uri":"https://dns.adguard-dns.com/dns-query","UIName":"AdGuard (Public) - Ad/Tracking Protection - 🇨🇾","autoDefault":false},{"uri":"https://dns.mullvad.net/dns-query","UIName":"Mullvad - Unfiltered - 🇸🇪","autoDefault":false},{"uri":"https://wikimedia-dns.org/dns-query","UIName":"Wikimedia - Unfiltered - 🇺🇸","autoDefault":false},{"uri":"https://firefox.dns.nextdns.io/","UIName":"NextDNS (Public) - Unfiltered - 🇺🇸","autoDefault":false},{"uri":"https://unfiltered.adguard-dns.com/dns-query","UIName":"AdGuard (Public) - Unfiltered - 🇨🇾","autoDefault":false},{"uri":"https://kids.dns0.eu","UIName":"DNS0 - Kids - 🇫🇷","autoDefault":false},{"uri":"https://family.dns.mullvad.net/dns-query","UIName":"Mullvad (Family) - 🇸🇪","autoDefault":false},{"uri":"https://family.adguard-dns.com/dns-query","UIName":"AdGuard (Public) - Family Protection - 🇨🇾","autoDefault":false},{"uri":"https://extended.dns.mullvad.net/dns-query","UIName":"Mullvad (Extended) - Ad/Tracking/Limited Malware/Social Media Protection - 🇸🇪","autoDefault":false},{"uri":"https://all.dns.mullvad.net/dns-query","UIName":"Mullvad (All) - Ad/Tracking/Limited Malware/Social Media/Adult/Gambling Protection - 🇸🇪","autoDefault":false},{"uri":"https://security.cloudflare-dns.com/dns-query","UIName":"Cloudflare - Malware Protection - 🇺🇸","autoDefault":false},{"uri":"https://mozilla.cloudflare-dns.com/dns-query","UIName":"Cloudflare - Unfiltered (Stricter privacy policy) - 🇺🇸","autoDefault":false},{"uri":"https://family.cloudflare-dns.com/dns-query","UIName":"Cloudflare - Adult Content/Malware Protection - 🇺🇸","autoDefault":false}]`
    
    </details>
    
    * **<details><summary>SPECIALIZED CONFIGS**: Hid various UI elements.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/540b07e30b3d51fb310c19be5d85fac5bc759b4d + https://codeberg.org/celenity/Phoenix/commit/e70d2fe3bbb793c8b8e888fac8a3652ac0faebfd + https://codeberg.org/celenity/Phoenix/commit/5937a6482e1678762c39f3043dc8635379b2807d
        
        `browser.newtabpage.activity-stream.system.showWeather` -> `false`
        `browser.search.widget.inNavBar` -> `false`
        `browser.tabs.groups.smart.enabled` -> `false`
        `browser.urlbar.addons.featureGate` -> `false`
        `browser.urlbar.contextualSearch.enabled` -> `false`
        `browser.urlbar.mdn.featureGate` -> `false`
        `browser.urlbar.quickactions.showPrefs` -> `false`
        `browser.urlbar.recentsearches.featureGate` -> `false`
        `browser.urlbar.scotchBonnet.disableOneOffs` -> `true`
        `browser.urlbar.scotchBonnet.enableOverride` -> `false`
        `browser.urlbar.searchModeSwitcher.featureGate` -> `false`
        `browser.urlbar.searchRestrictKeywords.featureGate` -> `false`
        `browser.urlbar.secondaryActions.featureGate` -> `false`
        `browser.urlbar.trending.featureGate` -> `false`
        `browser.urlbar.update2.engineAliasRefresh` -> `false`
        `browser.urlbar.weather.featureGate` -> `false`
        `browser.urlbar.wikipedia.featureGate` -> `false`
        `extensions.formautofill.addresses.supported` -> `off`
        `extensions.formautofill.creditCards.supported` -> `off`
        `signon.firefoxRelay.feature` -> `not available`
        `signon.generation.available` -> `false`
        `security.webauthn.show_ms_settings_link` -> `false`
    
    </details>
    
    * <details><summary>Enabled local machine learning by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/c450925d4ea20124377bfa011676f1898ce398d7
        
        `browser.ml.enable` -> `true`
        `extensions.ml.enabled` -> `true`
    
    </details>
    
    
    * **<details><summary>DESKTOP**: Disabled the use of AI to "suggest tabs and a name for tab groups" by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/dfbbf28281699af166dfb6dbf561dd01f53417b6
    
        `browser.tabs.groups.smart.optin` -> `false`
        `browser.tabs.groups.smart.userEnabled` -> `false`
    
    </details>
    
    * <details><summary>Disabled PDF.js automatic hyperlinks by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/0da6006a527676b48de869c547e42070317399f8
        
        `pdfjs.enableAutoLinking` -> `false`
    
    </details>
    
    * <details><summary>Set PDF.js to update URLs when changing pages by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/562f82a46aff03c207c9415f3cf8953ff63ae18e
        
        `pdfjs.historyUpdateUrl` -> `true`
    
    </details>
    
    * **<details><summary>SPECIALIZED CONFIGS**: Thanks to our recent changes, switched to using 'browser.helperApps.showOpenOptionForPdfJS' to disable PDF.js, instead of 'pdfjs.disabled',  to avoid fingerprinting.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/813d5b917f07a86352101343074af01ca8d7e25e
        
        `browser.helperApps.showOpenOptionForPdfJS` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Enabled support for color wallpapers without fetching them remotely by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/1ea256af4ace66389afa790acb4c344b3e928e3e
        
        `browser.newtabpage.activity-stream.feeds.wallpaperfeed` -> `false`
        `browser.newtabpage.activity-stream.newtabWallpapers.enabled` -> `true`
        `browser.newtabpage.activity-stream.newtabWallpapers.v2.enabled` -> `true`
    
    </details>
    
    * <details><summary>Added notes to help prevent users from making themselves unnecessarily fingerprintable.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/c1604022e85532d9b46d22f6c5667c1ef2cbfb58
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled search tips.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/efee01bd7a8756460e96f5ba1ab6bef8c94a14b6
        
        `browser.urlbar.searchTips.test.ignoreShowLimits` -> `false`
        `browser.urlbar.tipShownCount.searchTip_onboard` -> `999`
        `browser.urlbar.tipShownCount.searchTip_redirect` -> `999`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled "exposure" telemetry.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/efee01bd7a8756460e96f5ba1ab6bef8c94a14b6
        
        `browser.urlbar.exposureResults` -> ` `
        `browser.urlbar.keywordExposureResults` -> ` `
        `browser.urlbar.showExposureResults` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Prevented fetching minimum keyword lengths from Nimbus.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/efee01bd7a8756460e96f5ba1ab6bef8c94a14b6
        
        `browser.urlbar.addons.minKeywordLength` -> `4`
        `browser.urlbar.fakespot.minKeywordLength` -> `4`
        `browser.urlbar.weather.minKeywordLength` -> `4`
        `browser.urlbar.yelp.minKeywordLength` -> `4`
    
    </details>
    
    * <details><summary>Fixed the value of the 'datareporting.policy.dataSubmissionPolicyNotifiedTime' pref.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/ec071ec937b9eeac9d4ecc46b56bbeecd486e5c6
        
        `datareporting.policy.dataSubmissionPolicyNotifiedTime` -> `32503679999000`
    
    </details>
    
    
    * **<details><summary>DESKTOP**: Fixed the 'SkipTermsOfUse' policy.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/9df91dbd513bc144f6f7fa00926ab48b8a8adc7b
        
        `SkipTermsOfUse` -> `true`
    
    </details>
    
    * <details><summary>Disable reading to and writing from the 'NimbusEnrollments' table database.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/7f1c95015aff750cfd3a0a226cc7eff45a3bb86a
        
        `nimbus.profilesdatastoreservice.enabled` -> `false`
        `nimbus.profilesdatastoreservice.read.enabled` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Enabled the ability to inspect/debug local tabs from 'about:debugging' by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/0da825a5ec17c722152f16699254156c143c2830
        
        `devtools.aboutdebugging.local-tab-debugging` -> `true`
    
    </details>
    
    * **<details><summary>DESKTOP** *(non-macOS)*: Added policy to enable the menu bar by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/67c7e648802f823195fc1579ed31aa323ba7c537
        
        `DisplayMenuBar` -> `default-on`
    
    </details>
    
    * **<details><summary>DESKTOP**: Added a separate section for LibreWolf prefs, configured their allowed 'Remote Settings' collections to match what we use for IronFox, and enabled update checks when navigating to 'About LibreWolf' by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/b9fb7582d1b770cd4c4442690dab6059a6d9a39c
        
        `librewolf.aboutMenu.checkVersion` -> `true`
        `librewolf.services.settings.allowedCollections` -> `blocklists/addons,blocklists/addons-bloomfilters,blocklists/gfx,main/addons-manager-settings,main/anti-tracking-url-decoration,main/bounce-tracking-protection-exceptions,main/fingerprinting-protection-overrides,main/partitioning-exempt-urls,main/password-recipes,main/query-stripping,main/remote-permissions,main/tracking-protection-lists,main/third-party-cookie-blocking-exempt-urls,main/translations-models,main/translations-wasm,main/url-classifier-exceptions,main/url-classifier-skip-urls,main/url-parser-default-unknown-schemes-interventions,security-state/cert-revocations,security-state/ct-logs,security-state/intermediates,security-state/onecrl`
        `librewolf.services.settings.allowedCollectionsFromDump` -> `blocklists/addons,blocklists/addons-bloomfilters,blocklists/gfx,main/anti-tracking-url-decoration,main/cookie-banner-rules-list,main/moz-essential-domain-fallbacks,main/password-recipes,main/remote-permissions,main/translations-models,main/translations-wasm,main/url-classifier-skip-urls,main/url-parser-default-unknown-schemes-interventions,security-state/intermediates,security-state/onecrl`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled filtering adult content on Firefox Home ('about:home') by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/11ce445347a59db76113123b48445a9b40399e2b
    
        `browser.newtabpage.activity-stream.filterAdult` -> `false`
    
    </details>
    
    * <details><summary>If Link Preview is enabled, disabled censorship of results by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/4f95ccb30d74b9ab9d51ef50c8af2b13a5c6477e
        
        `browser.ml.linkPreview.blockListEnabled` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Enabled the ability to inspect/debug local tabs from 'about:debugging' by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/0da825a5ec17c722152f16699254156c143c2830
        
        `devtools.aboutdebugging.local-tab-debugging` -> `true`
    
    </details>
    
    * **<details><summary>DESKTOP** *(non-macOS)*: Added policy to enable the menu bar by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/67c7e648802f823195fc1579ed31aa323ba7c537
        
        `DisplayMenuBar` -> `default-on`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled "Send to Device" email promotions.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/4123c932beb31098cb39842266bfdbe61c77f235
        
        `browser.send_to_device_locales` -> ` `
    
    </details>
    
    * Various other tweaks and additions.
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.06.12.1...2025.06.24.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.06.12.1...2025.06.24.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.06.12.1...2025.06.24.1) for more details.
    ___
    
    :)
  • 2025.06.12.1 Release: 2025.06.12.1
    **⚠️ THIS RELEASE IS ONLY FOR ANDROID USERS**. 
    
    The latest version of Phoenix for other platforms *(GNU/Linux, macOS, and Windows)* is still [`2025.06.10.1`](https://codeberg.org/celenity/Phoenix/releases/tag/2025.06.10.1).
    ___
    
    * <details><summary>Fixed an Android-specific issue that broke file uploads.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/issues/141 + https://codeberg.org/ironfox-oss/IronFox/issues/78 + https://gitlab.com/ironfox-oss/IronFox/-/issues/116 + https://codeberg.org/celenity/Phoenix/commit/fadb5d99433ba098dba3110d7725b9e3d68e98b4
    
        `network.file.path_blacklist` -> ` `
    
    </details>
    
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.06.10.1...2025.06.12.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.06.10.1...2025.06.12.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.06.10.1...2025.06.12.1) for more details.
    ___
    
    :)
  • 2025.06.10.1
    899ae2a7 · Build 2025.06.10.1 ·
    Release: 2025.06.10.1
    ____
    
    * <details><summary>Fixed typing issues experienced by users in certain cases.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/d7ecac4671232101e04df80b587793bedc9ea7b0
    
        `focusmanager.testmode` -> `false`
    
    </details>
    
    * <details><summary>Updated FPP overrides to unbreak cakepay.com.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/issues/143
    
        `privacy.fingerprintingProtection.granularOverrides` -> `[{"firstPartyDomain":"cakepay.com","overrides":"-WebGLRenderInfo"}]`
    
    </details>
    
    * <details><summary>Blocked cakepay.com from extracting (randomized) canvas data.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/4bd2aae6b4af45c8fa7157d9b13c842cb886de4a
    
        **non-Android**: `privacy.fingerprintingProtection.granularOverrides` -> `[{"firstPartyDomain":"cakepay.com","overrides":"+CanvasExtractionBeforeUserInputIsBlocked"}]`
        **Android**: `privacy.fingerprintingProtection.granularOverrides` -> `[{"firstPartyDomain":"cakepay.com","overrides":"+CanvasExtractionBeforeUserInputIsBlocked,+CanvasImageExtractionPrompt"}]`
    
    </details>
    
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.06.06.1...2025.06.10.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.06.06.1...2025.06.10.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.06.06.1...2025.06.10.1) for more details.
    ___
    
    :)
  • 2025.06.06.1 Release: 2025.06.06.1
    ____
    
    * **<details><summary>WINDOWS**: Fixed a crash that occurred for certain users upon entering uBlock Origin's Dashboard.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/8d3e9daa96f5eda94a6305cc901de3645036c7ec + https://codeberg.org/celenity/Phoenix/issues/110
    
        `security.sandbox.content.shadow-stack.enabled` -> `false`
    
    </details>
    
    
    * <details><summary>Blocked ports currently known to be abused by Android apps for tracking/fingerprinting.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/87f9e1ba6a5c570c8ca7c1664f07272ea04a9bd3
    
        `network.security.ports.banned` -> `29009, 29010, 30102, 30103, 12387, 12388, 12580, 12581, 12582, 12583, 12584, 12585, 12586, 12587, 12588, 12589, 12590, 12591`
    
    </details>
    
    * <details><summary>Prevented notifying websites if users switch focus/active windows by default.</summary>
    
        `focusmanager.testmode` -> `true`
    
    </details>
    
    * <details><summary>Allowed users to add URLs to Enhanced Tracking Protection from the about:config.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/606ad3cc3d733c179359d38b2be83f66dcbd0602
    
        `urlclassifier.trackingAnnotationTable.testEntries` -> ` `
    
    </details>
    
    * <details><summary>Allowed users to exclude URLs from Enhanced Tracking Protection from the about:config.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/606ad3cc3d733c179359d38b2be83f66dcbd0602
    
        `urlclassifier.features.consentmanager.annotate.skipURLs` -> ` `
        `urlclassifier.features.cryptomining.skipURLs` -> ` `
        `urlclassifier.features.emailtracking.skipURLs` -> ` `
        `urlclassifier.features.fingerprinting.skipURLs` -> ` `
        `urlclassifier.features.socialtracking.skipURLs` -> ` `
        `urlclassifier.trackingSkipURLs` -> ` `
    
    </details>
    
    * <details><summary>Disabled timezone spoofing for Google domains in first party contexts by default to prevent CAPTCHAs.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/ecce20e5b8dab1dba50d87d02f13f7ea1d8e973e
    
        **NOTE**: You can re-enable timezone spoofing for Google domains in first party contexts by setting `privacy.fingerprintingProtection.granularOverrides` in your `about:config` to:
    
        ```sh
        [{"firstPartyDomain":"google.ad","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ae","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.al","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.am","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.as","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.at","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.az","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ba","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.be","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.bf","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.bg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.bi","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.bj","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.bs","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.bt","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.by","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ca","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cat","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cd","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cf","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ch","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ci","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cl","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cn","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ao","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.bw","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ck","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.cr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.id","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.il","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.in","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.jp","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ke","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.kr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ls","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ma","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.mz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.nz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.th","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.tz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ug","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.uk","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.uz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ve","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.vi","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.za","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.zm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.zw","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.af","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ag","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ar","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.au","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.bd","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.bh","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.bn","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.bo","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.br","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.bz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.co","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.cu","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.cy","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.do","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ec","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.eg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.et","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.fj","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.gh","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.gi","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.gt","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.hk","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.jm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.kh","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.kw","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.lb","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ly","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.mm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.mt","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.mx","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.my","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.na","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ng","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ni","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.np","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.om","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.pa","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.pe","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.pg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ph","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.pk","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.pr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.py","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.qa","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.sa","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.sb","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.sg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.sl","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.sv","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.tj","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.tr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.tw","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ua","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.uy","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.vc","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.vn","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cv","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.de","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.dj","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.dk","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.dm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.dz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ee","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.es","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.fi","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.fm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.fr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ga","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ge","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.gg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.gl","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.gm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.gr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.gy","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.hn","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.hr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ht","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.hu","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ie","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.im","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.iq","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.is","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.it","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.je","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.jo","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.kg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ki","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.kz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.la","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.li","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.lk","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.lt","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.lu","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.lv","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.md","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.me","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.mg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.mk","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ml","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.mn","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.mu","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.mv","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.mw","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ne","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.nl","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.no","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.nr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.nu","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.pl","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.pn","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ps","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.pt","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ro","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.rs","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ru","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.rw","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.sc","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.se","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.sh","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.si","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.sk","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.sn","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.so","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.sm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.sr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.st","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.td","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.tg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.tl","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.tm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.tn","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.to","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.tt","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.vu","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ws","overrides":"+JSDateTimeUTC"}]
        ```
    
    </details>
    
    * **<details><summary>NON-ANDROID**: Cleaned-up/removed subjective entries from the add-on blocklist.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/8a1375583a3d18ac640bcec3cf22ebd3a9a45787
    
    </details>
    
    * <details><summary>Disabled the Federated Credential Management (FedCM) API by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/baa32623a9043592e9798923ec60e06abd00f6ae
        
        `dom.security.credentialmanagement.identity.enabled` -> `false`
        `dom.security.credentialmanagement.identity.heavyweight.enabled` -> `false`
        `dom.security.credentialmanagement.identity.lightweight.enabled` -> `false`
    
    </details>
    
    * <details><summary>Disabled DNS over HTTPS performance measurements.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/f051a4ba270a1eb721a3bbab7dcacec9eb52a888
    
        `doh-rollout.trrRace.canonicalDomain` -> ` `
        `doh-rollout.trrRace.complete` -> `true`
        `doh-rollout.trrRace.enabled` -> `false`
        `doh-rollout.trrRace.popularDomains` -> ` `
        `doh-rollout.trrRace.randomSubdomainCount` -> `0`
    
    </details>
    
    * <details><summary>Allowed zooming out beyond the initial scale of websites by default.</summary>
        
        `apz.allow_zooming_out` -> `true`
    
    </details>
    
    * <details><summary>Blocked animepahe.ru from extracting canvas data by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/bb9a4849bf2a8795d076c9adf4432b8755c2afb7
        
        **non-Android**: `privacy.fingerprintingProtection.granularOverrides` -> `"firstPartyDomain":"animepahe.ru","overrides":"+CanvasExtractionBeforeUserInputIsBlocked"}`
        **Android**: `privacy.fingerprintingProtection.granularOverrides` -> `{"firstPartyDomain":"animepahe.ru","overrides":"+CanvasExtractionBeforeUserInputIsBlocked,+CanvasImageExtractionPrompt"}`
    
    </details>
    
    * Other minor tweaks and additions.
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.06.02.2...2025.06.06.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.06.02.2...2025.06.06.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.06.02.2...2025.06.06.1) for more details.
    ___
    
    :)
  • 2025.06.02.2 Release: 2025.06.02.2
    **⚠️ THIS RELEASE IS ONLY FOR WINDOWS USERS**. 
    
    The latest version of Phoenix for other platforms *(Android, GNU/Linux, and macOS)* is still [`2025.06.02.1`](https://codeberg.org/celenity/Phoenix/releases/tag/2025.06.02.1).
    ___
    
    * <details><summary>Fixed a Windows-specific issue that caused crashes on certain webpages.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/8597ea3f13f1a3b0cbf228104177c018a6172553
    
        `security.sandbox.content.level` -> `8`
    
    </details>
    
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.06.02.1...2025.06.02.2) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.06.02.1...2025.06.02.2) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.06.02.1...2025.06.02.2) for more details.
    ___
    
    :)
  • 2025.06.02.1 Release: 2025.06.02.1
    **<details><summary>⚠️ IMPORTANT NOTE FOR MACOS USERS**:</summary>
    
    This release changes Phoenix's approach on macOS to be far closer to our approach on other platforms, such as Linux - without compromising security. This comes at the cost of improved performance, allows for easier use of `Extended`/Phoenix's `specialized` configs, etc.
    
    For Phoenix to continue working properly on your system in the future, you **MUST** migrate your installation. You can easily upgrade with the following script we created:
    
    ```sh
    /bin/zsh -c "$(curl --cert-status --doh-cert-status --no-insecure --no-proxy-insecure --no-sessionid --no-ssl --no-ssl-allow-beast --no-ssl-auto-client-cert --no-ssl-no-revoke --no-ssl-revoke-best-effort --proto -all,https --proto-default https --proto-redir -all,https --show-error -sSL https://gitlab.com/celenityy/Phoenix/-/raw/pages/installer_scripts/macos_migrate.sh)"
    ```
    
    We apologize for any inconvenience, and thank you for your time, patience, and support of the project.
    
    </details>
    
    <br>
    
    ____
    
    * <details><summary>Removed our built-in search "extensions" in favor of Mozilla's "SearchEngines" Policy.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/issues/100
    
    </details>
    
    * <details><summary>Added a Phoenix-specific ("Phoenix filters") list to uBlock Origin, enabled by default. This list includes filters designed specifically to work with Phoenix and derivatives (such as IronFox) - Currently just used to unbreak Smartblock Embed Placeholders on Desktop.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/ffba31c239aaec49eca59b25083d3c2c6ae8bdfd
    
    </details>
    
    * <details><summary>Fixed an issue that prevented **add-ons** from syncing properly with Firefox Sync.</summary>
    
        `extensions.getAddons.get.url` -> `https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%`
        `services.sync.addons.trustedSourceHostnames` -> `addons.mozilla.org`
    
    </details>
    
    * <details><summary>Enabled Origin-keyed agent clustering by default (Like Chromium).</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/d02e51b2044963cf1e92b3c2eb606e278dfd25e0
    
        `dom.origin_agent_cluster.default` -> `true`
    
    </details>
    
    * <details><summary>Prevented automatically granting MV3 extensions optional host permissions by default.</summary>
    
        `extensions.originControls.grantByDefault` -> `false`
    
    </details>
    
    * <details><summary>Prevented extensions from opening pop-ups to remote websites.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/b4ed9435b3e540e0faf3c2d633cda4ef923bed59
    
        `extensions.manifestV2.actionsPopupURLRestricted` -> `true`
    
    </details>
    
    * <details><summary>Allowed enabling/disabling extensions per-container (if containers are enabled).</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/daed676a27274a8c7cf1dddbb2b3221ce629dfbb
        
        `extensions.userContextIsolation.enabled` -> `true`
    
    </details>
    
    * <details><summary>Disabled back/forward cache (bfcache) by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/815451d28cbc378ed0f4bd1202288223ce18e561
    
        `browser.sessionhistory.max_total_viewers` -> `0`
        `fission.bfcacheInParent` -> `false`
    
    </details>
    
    * <details><summary>Disabled WebMIDI by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/39b3c752a217f4322d755167db78314719aa1325
        
        `dom.sitepermsaddon-provider.enabled` -> `false`
    
    </details>
    
    * <details><summary>Explicitly disabled WebDriver BiDi experimental commands and events (notable for Nightly users).</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/dfe42b4f0c1aebbd8ad8fdc46f9ab405578a2d51
        
        `remote.experimental.enabled` -> `false`
    
    </details>
    
    * <details><summary>Hardened GPU sandboxing.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/d7aeb08a0485e29b36bb0b175cc46ac1c99016a0
    
        `security.sandbox.gpu.level` -> `2`
    
    </details>
    
    * **<details><summary>WINDOWS**: Strengthened content process sandboxing.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/9c2d38f219fad79760883e16a74f454065d6e958
    
        `security.sandbox.content.level` -> `20`
    
    </details>
    
    * <details><summary>Disabled add-on sideloading.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/740e9004672049f3b78a6f055103ab0539af8305
    
        `extensions.sideloadScopes` -> `0`
    
    </details>
    
    * <details><summary>Prevented add-ons from direct URL requests and "file://" from installing without permission.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/d6c8f7afe343f60fe78bb37c21cfd661d6d95d5d
    
        `xpinstall.whitelist.directRequest` -> `false`
        `xpinstall.whitelist.fileRequest` -> `false`
    
    </details>
    
    * <details><summary>Disabled the use of remote Cookie Banner Reduction rules, and instead set the rules locally.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/802bd62094df3b0cc832f14fbeaa9f82ea1a99a4
    
    </details>
    
    * <details><summary>Enabled anti-spoof confirmation prompts.</summary>
        
        `network.auth.confirmAuth.enabled` -> `true`
    
    </details>
    
    * <details><summary>Disabled CSP reporting by default (Currently works on Nightly).</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/3787ec26bb5494788fad16b5908550a53f70c3e8
        
        `security.csp.reporting.enabled` -> `false`
    
    </details>
    
    * <details><summary>Prevented HTTPS-First (if used instead of HTTPS-Only Mode) from automatically exempting domains from HTTPS.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/bd9fe3039845c86374bf94543383f66d852aa128
    
        `dom.security.https_first_add_exception_on_failure` -> `false`
    
        **DESKTOP**:
    
        `dom.security.https_first_add_exception_on_failiure` -> `false`
    
    </details>
    
    * <details><summary>Prevented exposing WebGL renderer info, regardless of if FPP/RFP (or the "WebGLRenderInfo" target) is active.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/3c37613a7b318d56e168f2e36bdf3efa6d448470
        
        `webgl.enable-renderer-query` -> `false`
        `webgl.override-unmasked-renderer` -> `Mozilla`
        `webgl.override-unmasked-vendor` -> `Mozilla`
    
    </details>
    
    * <details><summary>Disabled file:///net by default.</summary>
    
        See details: https://bugzilla.mozilla.org/show_bug.cgi?id=1412081
    
        `network.file.path_blacklist` -> `/net`
    
    </details>
    
    * <details><summary>Set a fixed temporary storage limit to protect against fingerprinting.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/a294751076e65e47faeb361b99a7e78907235bb2
        
        `dom.quotaManager.temporaryStorage.fixedLimit` -> `52428800`
    
    </details>
    
    * <details><summary>Enabled VP9 regardless of performance benchmarks by default, to protect against fingerprinting.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/89c70435cc21f92896425f75aa53fdd503490c34
    
        `media.benchmark.vp9.threshold` -> `0`
    
    </details>
    
    * <details><summary>Disabled WebRTC history.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/d8b105b75d81ebdfb45d6b8165855717620efc33
    
        `media.aboutwebrtc.hist.enabled` -> `false`
    
    </details>
    
    * <details><summary>Disabled pre-allocation of content processes, due to fingerprinting concerns.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/506f9dfd621b577c2227ff1933b889771c43cffb
        
        `dom.ipc.processPrelaunch.enabled` -> `false`
        `dom.ipc.processPrelaunch.fission.number` -> `0`
    
    </details>
    
    * <details><summary>Set Firefox to always load bundled fonts (if available), regardless of device memory, to protect against fingerprinting.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/7143f871e011417a3438a7edefe98cc7bd46d08b
        
        `gfx.bundled-fonts.activate` -> `1`
    
    </details>
    
    * **<details><summary>ANDROID**: Set Firefox to always use the standard "Noto Color Emoji" font, instead of custom ones (such as Samsung's) if available, to protect against fingerprinting.</summary>
    
        See details: https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43023
        
        `font.name-list.emoji` -> `Noto Color Emoji`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled the ability to switch locales without restarting, due to fingerprinting concerns.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/5c79df93ed815bc729276e3563a7cad87bcf1417
    
        `intl.multilingual.liveReload` -> `false`
        `intl.multilingual.liveReloadBidirectional` -> `false`
    
    </details>
    
    * <details><summary>Updated the built-in query stripping list with new additions from Brave.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/ed69003fb8f0a015d3707e953fa8cb29977723e2
        
        `privacy.query_stripping.strip_list` -> `__hsfp __hssc __hstc __s _bhlid _branch_match_id _branch_referrer _gl _hsenc _kx _openstat at_recipient_id at_recipient_list bbeml bsft_clkid bsft_uid dclid et_rid fb_action_ids fb_comment_id fbclid gbraid gclid guce_referrer guce_referrer_sig hsCtaTracking igshid irclickid mc_eid mkt_tok ml_subscriber ml_subscriber_hash msclkid mtm_cid oft_c oft_ck oft_d oft_id oft_ids oft_k oft_lk oft_sk oly_anon_id oly_enc_id pk_cid rb_clickid s_cid sc_customer sc_eh sc_uid srsltid ss_email_id twclid unicorn_click_id vero_conv vero_id vgo_ee wbraid wickedid yclid ymclid ysclid`
    
    </details>
    
    * <details><summary>Fixed an issue with redirects from "urldefense.com" caused by our query parameter stripping.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/5364984abb5a333900fe4da228220cb34ff906b8
        
        `privacy.query_stripping.allow_list` -> `urldefense.com`
    
    </details>
    
    * **<details><summary>WINDOWS**: Prevented prompting users to open system settings and enable Microsoft's Location Services.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/c336f9c0d9f05004cfbaed6f4a965c56d51eff6d
    
        `geo.prompt.open_system_prefs` -> `false`
    
    </details>
    
    * **<details><summary>LINUX**: Prevented unconditionally providing high location accuracy.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/c7ba61151e0806275288dd0b08b064183bcea06c
    
        `geo.provider.geoclue.always_high_accuracy` -> `false`
    
    </details>
    
    * <details><summary>Ensured users have full control over Nimbus recipes/experiments.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/b714ca561a6e16e1e0289a261966568039b38541
        
        `nimbus.debug` -> `true`
        `nimbus.validation.enabled` -> `false`
    
    </details>
    
    * <details><summary>Increased video buffering for cellular connections.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/5c7d6707ba5ff00291f4be0807e1ccda5e0dbdb5
        
        `media.cache_readahead_limit.cellular` -> `7200`
        `media.cache_resume_threshold.cellular` -> `3600`
        `media.throttle-cellular-regardless-of-download-rate` -> `false`
    
    </details>
    
    * <details><summary>Increased the file-backed media cache size for cellular connections.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/5c7d6707ba5ff00291f4be0807e1ccda5e0dbdb5
        
        `media.cache_size.cellular` -> `512000`
    
    </details>
    
    * <details><summary>Enabled higher-performance pinch zoom by default.</summary>
    
        `gfx.webrender.low-quality-pinch-zoom` -> `true`
    
    </details>
    
    * **<details><summary>DESKTOP**: Improved the reliability of extension storage sync.</summary>
    
        `services.sync.extension-storage.skipPercentageChance` -> `0`
    
    </details>
    
    * Other minor tweaks, fixes, and additions.
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.05.11.1...2025.06.02.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.05.11.1...2025.06.02.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.05.11.1...2025.06.02.1) for more details.
    ___
    
    :)
  • 2025.05.11.1 Release: 2025.05.11.1
    ____
    
    * <details><summary>Prevented third parties from setting cookies unless the third party already has cookies as a first party (Like Safari).</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/72b9578d04c5c16df27b4e51849ddd44781ab0d8
        
        `privacy.dynamic_firstparty.limitForeign` -> `true`
    
    </details>
    
    * <details><summary>Limited maximum cookie lifetime to 6 months/180 days (Like Brave).</summary>
    
        See details: https://github.com/brave/brave-browser/issues/3443 + https://github.com/fmarier/brave-core/commit/4d222df50a8dfaaabb31e9f2c5070c4db5ba8fd5
    
        `network.cookie.maxageCap` -> `15552000`
    
    </details>
    
    * <details><summary>Enabled tracking protection against CMPs (Cookie/consent managers) by default, in all browsing windows.</summary>
        
        `privacy.trackingprotection.consentmanager.annotate_channels` -> `true`
        `privacy.trackingprotection.consentmanager.skip.enabled` -> `false`
        `privacy.trackingprotection.consentmanager.skip.pbmode.enabled` -> `false`
    
    </details>
    
    * <details><summary>Enabled an additional plug-in blocklist (mozplugin-block-digest256) from Mozilla (Like Nightly).</summary>
    
        `urlclassifier.blockedTable` -> `moztest-block-simple,mozplugin-block-digest256`
    
    </details>
    
    * <details><summary>Disabled network connectivity status monitoring.</summary>
    
        See details: https://bugzilla.mozilla.org/show_bug.cgi?id=620472
    
        `network.manage-offline-status` -> `false`
        `network.offline-mirrors-connectivity` -> `false`
    
        **DESKTOP** *(Red Hat/Fedora-specific)*:
    
        `offline.autoDetect` -> `false`
        `toolkit.networkmanager.disable` -> `true`
    
    </details>
    
    * <details><summary>Instead of blocking all mixed display content unconditionally, we now only block mixed display content if it can't be upgraded to HTTPS.</summary>
    
        See details: https://github.com/mozilla/policy-templates/issues/1141
    
        `security.mixed_content.block_display_content` -> `false`
    
    </details>
    
    * <details><summary>Disabled the automatic import of OS client authentication certificates by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/62285ea38b6bdab2d06e0376848169c2a2e06a24
    
        `security.osclientcerts.autoload` -> `false`
    
    </details>
    
    * <details><summary>Disabled the Wi-Fi Tickler to prevent proxy bypasses.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/458bb0cb0ff7a9cf5beaba476b888bfb7ec48eb0
        
        `network.tickle-wifi.enabled` -> `false`
    
    </details>
    
    * <details><summary>Set proxy extensions (if installed) to start as soon as possible, instead of waiting for the first browser window to open.</summary>
    
        `extensions.webextensions.early_background_wakeup_on_request` -> `true`
    
    </details>
    
    * <details><summary>Prevented HTTP/3 from being disabled if enterprise policies are configured.</summary>
    
        `network.http.http3.disable_when_third_party_roots_found` -> `false`
    
    </details>
    
    * **<details><summary>ANDROID**: Disabled TLS session identifiers.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/38ec7461f1e437f502ba7f82d2d836b0386e03dd
        
        `security.ssl.disable_session_identifiers` -> `true`
    
    </details>
    
    * <details><summary>Limited/restricted CSP reporting as much as possible (We still block these requests by default with uBlock Origin).</summary>
    
        `security.csp.reporting.limit.count` -> `1`
        `security.csp.reporting.limit.timespan` -> `999999999`
        `security.csp.reporting.script-sample.max-length` -> `0`
        `security.csp.truncate_blocked_uri_for_frame_navigations` -> `true`
    
    </details>
    
    * **<details><summary>DESKTOP**: Set the browser to check for updates hourly (instead of the default of 6 hours in foreground and 7 hours in background).</summary>
    
        `app.update.background.interval` -> `3600`
        `app.update.interval` -> `3600`
    
    </details>
    
    * **<details><summary>DESKTOP**: Set the browser to immediately prompt users when an update is ready, and ensured the binary is always old enough to check for updates.</summary>
    
        `app.update.checkInstallTime.days` -> `0`
        `app.update.promptWaitTime` -> `0`
    
    </details>
    
    * <details><summary>Disabled the Battery API.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/b4e578ed809ca5d63b20ff22bda78cb76f5d4d07
    
        `dom.battery.enabled` -> `false`
    
    </details>
    
    * <details><summary>Disabled the Clipboard API.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/e16d6048a13b685c35d51371fd067a6e5fde5714
    
        `dom.events.asyncClipboard.clipboardItem` -> `false`
        `dom.events.asyncClipboard.readText` -> `false`
        `dom.events.testing.asyncClipboard` -> `false`
    
    </details>
    
    * <details><summary>Disabled online speech recognition.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/aea7d4ba2d80f0bc0154ee0da3b07aca476aecae
    
        `media.webspeech.service.endpoint` -> `data;`
    
    </details>
    
    * <details><summary>Disabled scanning add-on scopes on launch.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/4660fcd9ac90bde34dc230ca58f3fe3f76d9267e
    
        `extensions.startupScanScopes` -> `0`
    
    </details>
    
    * <details><summary>Disabled Gecko Media Plugins (GMP).</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/cc6fb2c13054c1ff6cb2fe1469591b0272e84c78
        
        `media.gmp-provider.enabled` -> `false`
    
    </details>
    
    * **<details><summary>ANDROID**: Disabled HLS.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/0abcbeac89d9eaa4b2d6c0b8a573f6815ebb72b6
        
        `media.hls.enabled` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Enabled Arbitrary Code Guard (ACG) (for Windows users).</summary>
    
        See details: https://medium.com/@boutnaru/the-windows-security-journey-acg-arbitrary-code-guard-74b08a8bd1e5
    
        `security.sandbox.gmp.acg.enabled` -> `true`
        `security.sandbox.rdd.acg.enabled` -> `true`
        `security.sandbox.utility-wmf.acg.enabled` -> `true`
    
    </details>
    
    * **<details><summary>DESKTOP**: Enabled Code Integrity Guard (CIG) for pre-spawn (for Windows users).</summary>
    
        See details: https://github.com/mozilla/policy-templates/issues/1141
    
        `security.sandbox.cig.prespawn.enabled` -> `true`
    
    </details>
    
    * **<details><summary>DESKTOP**: Enabled Shadow Stacks (for Windows users).</summary>
    
        See details: https://wikipedia.org/wiki/Shadow_stack
    
        `security.sandbox.content.shadow-stack.enabled` -> `true`
        `security.sandbox.gmp.shadow-stack.enabled` -> `true`
        `security.sandbox.gpu.shadow-stack.enabled` -> `true`
        `security.sandbox.rdd.shadow-stack.enabled` -> `true`
        `security.sandbox.socket.shadow-stack.enabled` -> `true`
    
    </details>
    
    * **<details><summary>DESKTOP**: Set the browser to always warn on unprivileged namespaces (for Linux users).</summary>
    
        `security.sandbox.warn_unprivileged_namespaces` -> `true`
    
    </details>
    
    * **<details><summary>ANDROID**: Disabled sending console output to logcat by default. </summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/dcadf87f3daacdd554f2de358be77cd568c67646
        
        `consoleservice.logcat` -> `false`
        `geckoview.console.enabled` -> `false`
    
    </details>
    
    * <details><summary>Disabled various new telemetry pings.</summary>
    
        `browser.engagement.ctrlTab.has-used` -> `true`
        `telemetry.glean.internal.finalInactive` -> `false`
        `telemetry.glean.internal.maxPingsPerMinute` -> `0`
    
        **DESKTOP**:
    
        `browser.engagement.downloads-button.has-used` -> `true`
        `browser.engagement.fxa-toolbar-menu-button.has-used` -> `true`
        `browser.engagement.home-button.has-used` -> `true`
        `browser.engagement.library-button.has-used` -> `true`
        `browser.engagement.search_counts.pbm` -> `false`
        `browser.engagement.sidebar-button.has-used` -> `true`
        `browser.engagement.total_uri_count.pbm` -> `false`
        `browser.newtabpage.activity-stream.telemetry.privatePing.enabled` -> `false`
        `browser.newtabpage.activity-stream.telemetry.surfaceId` -> ` `
        `browser.newtabpage.ping.enabled` -> `false`
    
    </details>
    
    * <details><summary>Disabled the automatic upload of profiler data (from 'about:logging') to Mozilla by default.</summary>
    
        `toolkit.aboutLogging.uploadProfileToCloud` -> `false`
    
    </details>
    
    * <details><summary>Removed Mozilla's new OHTTP telemetry endpoints.</summary>
    
        **DESKTOP**:
    
        `browser.newtabpage.activity-stream.discoverystream.ohttp.configURL` -> ` `
        `browser.newtabpage.activity-stream.discoverystream.ohttp.relayURL` -> ` `
    
        **ANDROID**:
    
        `network.ohttp.configURL` -> ` `
        `network.ohttp.relayURL` -> ` `
    
    </details>
    
    * <details><summary>Added placeholder IDs to certain (primarily telemetry-related) preferences, to reduce breakage and protect against potential fingerprinting.</summary>
    
        `asanreporter.clientid` -> `unknown`
        `datareporting.dau.cachedUsageProfileGroupID` -> `b0bacafe-b0ba-cafe-b0ba-cafeb0bacafe`
    
        **DESKTOP**:
    
        `browser.contentblocking.cfr-milestone.milestone-shown-time` -> `999999999`
        `browser.contextual-services.contextId` -> `{foo-123-foo}`
        `browser.startup.homepage_override.buildID` -> `20181001000000`
    
    </details>
    
    * <details><summary>Cleaned up and removed more tracking parameters and unnecessary information (ex. locale) from various Mozilla links/URLs.</summary>
    
        `app.support.baseURL` -> `https://support.mozilla.org/kb/`
        `extensions.abuseReport.amoFormURL` -> `https://addons.mozilla.org/feedback/addon/%addonID%/`
        `extensions.blocklist.addonItemURL` -> `https://addons.mozilla.org/blocked-addon/%addonID%/%addonVersion%/`
        `extensions.getAddons.get.url` -> `https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%`
        `extensions.update.background.url` -> `https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID%&version=%ITEM_VERSION%&status=%ITEM_STATUS%&appID=%APP_ID%&appVersion=%APP_VERSION%&updateType=%UPDATE_TYPE%`
        `extensions.update.url` -> `https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID%&version=%ITEM_VERSION%&status=%ITEM_STATUS%&appID=%APP_ID%&appVersion=%APP_VERSION%&updateType=%UPDATE_TYPE%`
        `pdfjs.altTextLearnMoreUrl` -> `https://support.mozilla.org/kb/pdf-alt-text`
        `signon.firefoxRelay.learn_more_url` -> `https://support.mozilla.org/kb/relay-integration#w_frequently-asked-questions`
        `signon.firefoxRelay.privacy_policy_url` -> `https://www.mozilla.org/privacy/subscription-services/`
        `signon.firefoxRelay.terms_of_service_url` -> `https://www.mozilla.org/privacy/subscription-services/`
    
        **ANDROID**:
    
        `extensions.getAddons.search.browseURL` -> `https://addons.mozilla.org/android/search?q=%TERMS%`
    
        **DESKTOP**:
    
        `app.releaseNotesURL` -> `https://www.mozilla.org/firefox/%VERSION%/releasenotes`
        `app.releaseNotesURL.aboutDialog"` -> `https://www.mozilla.org/firefox/%VERSION%/releasenotes`
        `app.releaseNotesURL.prompt` -> `https://www.mozilla.org/firefox/%VERSION%/releasenotes`
        `app.update.url.details` -> `https://www.mozilla.org/firefox/notes`
        `app.update.url.manual` -> `https://www.mozilla.org/firefox/new`
        `browser.contentblocking.report.cookie.url` -> `https://support.mozilla.org/kb/trackers-and-scripts-firefox-blocks-enhanced-track#w_cross-site-tracking-cookies`
        `browser.contentblocking.report.cryptominer.url` -> `https://support.mozilla.org/kb/trackers-and-scripts-firefox-blocks-enhanced-track#w_cryptominers`
        `browser.contentblocking.report.fingerprinter.url` -> `https://support.mozilla.org/kb/trackers-and-scripts-firefox-blocks-enhanced-track#w_fingerprinters`
        `browser.contentblocking.report.lockwise.how_it_works.url` -> `https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins`
        `browser.contentblocking.report.social.url` -> `https://support.mozilla.org/kb/trackers-and-scripts-firefox-blocks-enhanced-track#w_social-media-trackers`
        `browser.contentblocking.report.tracker.url` -> `https://support.mozilla.org/kb/trackers-and-scripts-firefox-blocks-enhanced-track#w_tracking-content`
        `browser.dictionaries.download.url` -> `https://addons.mozilla.org/language-tools/`
        `browser.search.searchEnginesURL` -> `https://addons.mozilla.org/firefox/search-engines/`
        `browser.xr.warning.infoURL` -> `https://support.mozilla.org/kb/webxr-permission-info-page`
        `extensions.getAddons.link.url` -> `https://addons.mozilla.org/`
        `extensions.getAddons.search.browseURL` -> `https://addons.mozilla.org/search?q=%TERMS%`
        `lightweightThemes.getMoreURL` -> `https://addons.mozilla.org/themes/`
    
    </details>
    
    * **<details><summary>DESKTOP**: Removed Mozilla's feedback URL & the about:home support article (which definitely isn't relevant to us...).</summary>
    
        `app.feedback.baseURL` -> ` `
        `browser.newtabpage.activity-stream.support.url` -> ` `
    
    </details>
    
    * <details><summary>Removed unnecessary partner attribution identifiers, to protect against fingerprinting.</summary>
    
        `app.distributor` -> ` `
        `app.distributor.channel` -> ` `
        `mozilla.partner.id` -> ` `
    
        **DESKTOP**:
    
        `browser.search.param.search_rich_suggestions` -> ` `
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled Mozilla's new Ad Routing Service (MARS) OHTTP provider & ad reporting.</summary>
    
        `browser.newtabpage.activity-stream.discoverystream.reportAds.enabled` -> `false`
        `browser.newtabpage.activity-stream.unifiedAds.ohttp.enabled` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled Mozilla's new Firefox Suggest (Merino) OHTTP provider.</summary>
    
        `browser.newtabpage.activity-stream.discoverystream.merino-provider.ohttp.enabled` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled ('inferred') 'personalization' on about:home</summary>
    
        `browser.newtabpage.activity-stream.discoverystream.sections.personalization.enabled` -> `false`
        `browser.newtabpage.activity-stream.discoverystream.sections.personalization.inferred.enabled` -> `false`
        `browser.newtabpage.activity-stream.discoverystream.sections.personalization.inferred.user.enabled` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled new about:home mobile promotions.</summary>
    
        **DESKTOP**:
    
        `browser.newtabpage.activity-stream.mobileDownloadModal.enabled` -> `false`
        `browser.newtabpage.activity-stream.mobileDownloadModal.variant-a` -> `false`
        `browser.newtabpage.activity-stream.mobileDownloadModal.variant-b` -> `false`
        `browser.newtabpage.activity-stream.mobileDownloadModal.variant-c` -> `false``
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled the new about:home Fakespot promotion card.</summary>
    
        `browser.shopping.experience2023.newPositionCard.hasSeen` -> `true`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled the 'Revised Pocket Story Card UI' on about:home</summary>
    
        See details: https://searchfox.org/mozilla-central/source/toolkit/components/nimbus/FeatureManifest.yaml
    
        `browser.newtabpage.activity-stream.discoverystream.sections.cards.enabled` -> `false`
    
    </details>
    
    * <details><summary>Enabled various performance optimizations.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/6a7263d95b16d77c961e886248cc4f15f3ac8c8c + https://codeberg.org/celenity/Phoenix/commit/f4295b0baa3905b6527741a91e1a26808303ca9f
        
        `network.fetchpriority.enabled` -> `true`
        `javascript.options.mem.gc_parallel_marking` -> `true`
        `javascript.options.wasm_branch_hinting` -> `true`
        `javascript.options.wasm_relaxed_simd` -> `true`
        `javascript.options.wasm_simd_avx` -> `true`
    
    </details>
    
    * **<details><summary>DESKTOP**: Enabled advanced performance settings at about:preferences#general by default.</summary>
    
        `browser.preferences.defaultPerformanceSettings.enabled` -> `false`
    
    </details>
    
    * <details><summary>Lowered the network priority of known trackers (if not blocked...).</summary>
        
       `privacy.trackingprotection.lower_network_priority` -> `true`
    
    </details>
    
    * <details><summary>Disabled the ability for websites to prevent disabling Picture-in-Picture.</summary>
    
        `media.videocontrols.picture-in-picture.respect-disablePictureInPicture` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Enabled the ability to download and switch locales (as well as the ability to switch without restarting...</summary>
    
        `intl.multilingual.downloadEnabled` -> `true`
        `intl.multilingual.enabled` -> `true`
        `intl.multilingual.liveReload` -> `true`
        `intl.multilingual.liveReloadBidirectional` -> `true`
    
    </details>
    
    * <details><summary>Ensured that uBlock Origin (if enabled) can always run on restricted/quarantined domains by default.</summary>
    
        `extensions.quarantineIgnoredByUser.uBlock0@raymondhill.net` -> `true`
    
    </details>
    
    * <details><summary>Disabled Mozilla's remote fingerprinting protection overrides by default (for now) to re-enable canvas randomization for Google domains</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/776c3921efbe355ce9ba4549c06a312ecb5447f6
        
        `privacy.fingerprintingProtection.remoteOverrides.enabled` -> `false`
    
    </details>
    
    * <details><summary>Disabled Mozilla's 'Remote Permissions' by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/f203b52b1ae49cd3cf5dbfaa21df541e642c50a4
        
        `permissions.manager.remote.enabled` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Temporarily switched the Web Compatibility Reporter URL from Mozilla's to our issue tracker, as it's currently impossible to fully disable it due to an upstream bug...</summary>
    
        See details: https://bugzilla.mozilla.org/show_bug.cgi?id=1963764
    
        `ui.new-webcompat-reporter.new-report-endpoint` -> `https://phoenix.celenity.dev/issues`
    
    </details>
    
    * **<details><summary>DESKTOP**: Stopped locking the value of 'security.cert_pinning.enforcement_level', to ensure users can still access the pinned domains if ex. certs are changed/become outdated.</summary></details>
    
    * Various other changes...
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.04.27.1...2025.05.11.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.04.27.1...2025.05.11.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.04.27.1...2025.05.11.1) for more details.
    ___
    
    :)
  • 2025.04.27.1 Release: 2025.04.27.1
    **<details><summary>NOTE FOR MACOS USERS**:</summary>
    
    This release adds environment variables for macOS users to disable Mozilla's Crash Reporter *(like we already set for Linux)*, which will be set by default for new Phoenix installations going  forward, but won't have an impact on current installs. While it's **not** required to add these environment variables to continue using Phoenix, macOS users with existing installations are **highly recommended** to add them due to the privacy benefits. You can easily set them up by running the following script:
    
    ```sh
    /bin/zsh -c "$(curl --cert-status --doh-cert-status --no-insecure --no-proxy-insecure --no-sessionid --no-ssl --no-ssl-allow-beast --no-ssl-auto-client-cert --no-ssl-no-revoke --no-ssl-revoke-best-effort --proto -all,https --proto-default https --proto-redir -all,https --show-error -sSL https://gitlab.com/celenityy/Phoenix/-/raw/pages/installer_scripts/macos_env.sh)"
    ```
    </details>
    
    <br>
    
    **NOTE**: Additionally, macOS **(Intel)** is now officially supported. Simply run the [installation script](https://codeberg.org/celenity/Phoenix#install) *(or do a manual installation if you prefer...)*, and choose `Intel` when prompted. :) **This is in addition to [various other improvements to the macOS install/uninstall scripts](https://codeberg.org/celenity/Phoenix/commits/branch/pages/installer_scripts/macos_install.sh).**
    
    It should also be noted that as of this release, **Swisscows** has been removed a default search engine due to concerns regarding [false marketing of their VPN](https://accounts.swisscows.com/products/vpn) and [spreading false claims about other services, such as Signal](https://awiebe.org/warum-man-signal-nicht-trauen-sollte/).
    ____
    
    * **<details><summary>DESKTOP**: Updated our uBlock Origin config (assets.json) per latest upstream changes.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/0d26adf11e2c0e62a053ebb0cf3edb78ab9331ea + https://github.com/gorhill/uBlock/commits/master/assets/assets.json
    
    </details>
    
    * **<details><summary>DESKTOP**: Added a 'Quick fixes' list to uBlock Origin + enabled it by default to allow us to fix issues caused by our config/default filterlists significantly faster (while waiting on the respective author to fix the issue upstream).</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/src/branch/pages/uBlock/quick-fixes.txt
    
    </details>
    
    * **<details><summary>ANDROID**: Temporarily excluded various captive portal domains from DNS over HTTPS by default to avoid breakage, as Firefox on Android currently doesn't have a UI to fallback (unlike Desktop).</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/f1a13b77521942740248a66e7b74442392c0e0ef
        
        `network.trr.excluded-domains` -> `aainflight.com,acwifi.com,aircanadawifi.com,airtime.geemedia.com,alaskawifi.com,amtrakconnect.com,amtrakwifi.com,ana-inflight-wifi.com,app-yoda.arubathena.com,aruba.odyssys.net,arubanetworks.com,arubanetworks.com.cn,asset-acms.anuvu.cloud,auth.hpe.com,bap.aws.opennetworkexchange.net,btwifi.com,captive.o2wifi.co.uk,captive-2020.aio.cloudauth.net,captive-2022.aio.cloudauth.net,captivemgr.o2wifi.net.uk,captiveportal-login.belex.com,carnivalwifi.com,cbp-guest.cbp.dhs.gov,cdnhotspot.afd.azureedge.net,cdnhotspot.azureedge.net,central.access.network,cfr-mprtuam-01.cops.us1.pr.anuvu.cloud,checkout.aa.com,cloud.imedia.ie,connect.edge.ihg.com,connect-edge.ihg.com,connected.xfinity.com,controller.access.network,cust.blueprintrf.com,deltawifi.com,device-yoda2.arubadev.cloud.hpe.com,dlrguest-captive.disney.com,ee-wifi.ee.co.uk,etihadwi-fly.com,fedsso.yum.com,flyfi.com,freewlan.sbb.ch,gogoinair.com,gogoinflight.com,gp1.wendys.com,guestinternet.com,guestinternet.com.s3-website-us-east-1.amazonaws.com,hiltonwifi.com,hotspotportals.com,hs.imedia.ie,httpforever.com,iceportal.de,inflight.pacwisp.net,inflight-wifi.com,inflightinternet.com,internal2-public-device-nc-nlb-b71ba3c951b09682.elb.us-west-2.amazonaws.com,internal2-public-device-nlb-2e2273d4267c0682.elb.us-west-2.amazonaws.com,internetupgrade.marriott.com,kong-gtw-portal-apse2prod5-lb-1386339370.ap-southeast-2.elb.amazonaws.com,kong-gtw-portal-eu-lb-1104785228.eu-central-1.elb.amazonaws.com,kong-gtw-portal-mec1prod6-lb-2104849938.me-central-1.elb.amazonaws.com,kong-gtw-portal-production-lb-686216184.us-west-1.elb.amazonaws.com,kong-gtw-portal-use1prod2-lb-291057632.us-east-1.elb.amazonaws.com,krisworld.singaporeair.com,kw.sq.com,landing.sbb.ch,loggedin.wifigem.it,login.attwifi.com,login.cloud5.com,login.cloudi-fi.net,login.innflux.com,login.wifigem.com,login.windstream.com,login-awe-cluster.attwifi.com,login-federated.windstream.com,lounge.aa.com,lpv.attwifi.com,lufthansa-flynet.com,managedwifi.xfinity.com,massportwifi.com,marriottwifi.com,medallionclass.com,mscwifi.com,msftguest-virtual.partners.extranet.microsoft.com,mt1.datavalet.io,network-auth.com,neverssl.com,nossl.com,ofc-yoda2.arubadev.cloud.hpe.com,onboard.eurostar.com,onboard.sbb.ch,onboardicafe.com,portal.ac2.mist.com,portal.ac5.mist.com,portal.ac6.mist.com,portal.eu.mist.com,portal.gc1.mist.com,portal.gc2.mist.com,portal.gc3.mist.com,portal.mist.com,portal.moovmanage.com,qa-connect-edge.ihg.com,rcs.arubathena.com,rcs-m.arubathena.com,rcs-ng-yoda2.arubadev.cloud.hpe.com,regio-guide.de,rsc.att.com,rsc.wayport.net,rougewifi.com,sbux-j3.datavalet.io,sbux-portal.globalreachtech.com,sbux-portal.odyssys.net,secure.11os.com,secure.datavalet.io,secure.wayport.net,secure-login.attwifi.com,service.thecloud.net,shop.ba.com,singaporeair-krisworld.com,sso.wendys.com,stage.connect.edge.ihg.com,starbucks-east.datavalet.io,stay.marriottbonvoy.com,southwestwifi.com,thalysnet.com,thd.cloudauth.net,timhortonswifi.com,tvgreyhound.com,unitedprivatescreening.com,unitedwifi.com,universal-orlando.ampthink.com,viasat.com,virginwifi.com,wanderingwifi.com,we.windstream.com,weconnect.wendys.com,wifi.airasia.com,wifi.bahn.de,wifi.cathaypacific.com,wifi.delta.com,wifi.esa.com,wifi.kfc.com,wifi1.kfc.com,wifi2.kfc.com,wifi.panerabread.com,wifi.singaporeair.com,wifi.sncf,wifi.starbucks.com,wifi.tgv-lyria.com,wifi.tgvlyria.com,wifi.united.com,wifi.united.com.edgekey.net,wifi.we.co,wifi.xfinity.com,wifi-viarail.ca,wifi-xdb.boingohotspot.net,wifihotspot.io,wifilauncher.com,wifilauncher.com.s3-website.us-east-1.amazonaws.com,wifilrn-ch2-1p.xfinity.com,wifionboard.com,wirelessportal.americanexpress.com,wirelessportal.americanexpress.com.akadns.net,wirelessportal2.americanexpress.com.akadns.net,wlb1-1579773356.us-east-1.elb.amazonaws.com,yoda-cgqa.arubathena.com,yoda-cgqa-elb.arubathena.com,yoda2-ofc-nlb-f4f923213a2189c7.elb.us-west-2.amazonaws.com,yoda2-public-device-nlb-8343995ce4714f6f.elb.us-west-2.amazonaws.com,yoda2-rcs-nlb-0c9df3882f3f7416.elb.us-west-2.amazonaws.com,zugportal.de`
    
    </details>
    
    * <details><summary>Enforced the internal Content Security Policy (CSP).</summary>
    
        See details: https://developer.mozilla.org/docs/Web/HTTP/Guides/CSP
    
        `security.browser_xhtml_csp.report-only` -> `false`
    
    </details>
    
    * <details><summary>Explicitly disabled JPEG-XL by default due to security concerns in its current state. </summary>
    
        See details: https://github.com/mozilla/standards-positions/pull/1064
        
        `image.jxl.enabled` -> `false`
    
    </details>
    
    * <details><summary>Prevented bypassing DNS over HTTPS for '/etc/HOSTS' entries by default to protect against HOSTS file hijacking.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/7ac281d87af2f65ed900e7f10f093311b472cfe5
    
        `network.trr.exclude-etc-hosts` -> `false`
    
    </details>
    
    * <details><summary>Prevented websites from automatically refreshing by default on all configs instead of just 'Extended'.</summary>
    
       `browser.meta_refresh_when_inactive.disabled` -> `true`
    
       **DESKTOP**: `accessibility.blockautorefresh` -> `true`
    
    </details>
    
    * <details><summary>Stopped setting a stricter media autoplay policy in Phoenix 'Extended', due to it causing breakage and not really being privacy/security related (though still nice to have).</summary>
    
       See details: https://codeberg.org/celenity/Phoenix/commit/e8fa1a3215d8693c728620551b4ee0fae09a83dd
    
       `media.autoplay.blocking_policy` -> `0`
    
    </details>
    
    * <details><summary>Disabled add-on metadata updates by default.</summary>
    
        See details: https://blog.mozilla.org/addons/how-to-opt-out-of-add-on-metadata-updates/
        
        `extensions.getAddons.cache.enabled` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled Firefox Sync feature recommendations.</summary>
    
        `identity.fxaccounts.toolbar.syncSetup.panelAccessed` -> `true`
    
    </details>
    
    * <details><summary>Disabled Firefox Translations feature recommendations.</summary>
    
        `browser.translations.panelShown` -> `true`
    
    </details>
    
    * <details><summary>Disabled Mozilla's GeoIP/Region Service.</summary>
        
        `browser.region.local-geocoding` -> `false`
        `browser.search.region` -> `US`
    
    </details>
    
    * <details><summary>Disabled Mozilla 's Terms of Use.</summary>
    
        `datareporting.policy.dataSubmissionPolicyAcceptedVersion` -> `999`
        `datareporting.policy.dataSubmissionPolicyNotifiedTime` -> `999999999`
        
        **DESKTOP**: In addition to these prefs, we're also using the new [`SkipTermsOfUse`](https://mozilla.github.io/policy-templates/#skiptermsofuse) policy:
        
        `SkipTermsOfUse` -> `true`
    
    </details>
    
    * **<details><summary>SPECIALIZED CONFIGS**: Disabled AMRemoteSettings.</summary>
    
        See details: https://searchfox.org/mozilla-central/source/toolkit/mozapps/extensions/docs/AMRemoteSettings-overview.rst + https://searchfox.org/mozilla-central/source/toolkit/mozapps/extensions/AddonManager.sys.mjs
        
        `extensions.remoteSettings.disabled` -> `true`
    
    </details>
    
    * **<details><summary>SPECIALIZED CONFIGS**: Disabled Geolocation network scanning for redundancy.</summary>
    
        `geo.provider.network.scan` -> `false`
        `network.wifi.scanning_period` -> `0`
    
    </details>
    
    * **<details><summary>SPECIALIZED CONFIGS**: Disabled Remote Permissions.</summary>
    
        See details: https://searchfox.org/mozilla-central/source/extensions/permissions/docs/remote.rst + https://searchfox.org/mozilla-central/source/extensions/permissions/RemotePermissionService.sys.mjs + https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/remote-permissions/changeset?_expected=0
        
        `permissions.manager.remote.enabled` -> `false`
    
    </details>
    
    * <details><summary>Disabled spoofing WebGL renderer info on 'moviezapiya.fun' by default to fix breakage.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/issues/95
        
        `privacy.fingerprintingProtection.granularOverrides` -> `{"firstPartyDomain":"moviezapiya.fun","overrides":"-WebGLRenderInfo"}`
    
    </details>
    
    * **<details><summary>ANDROID**: Allowed 'gsi.go.jp', 'harkins.com', 'megacloud.blog', 'megacloud.store', 'nperf.com' & 'pogospike.com' to extract randomized canvas data by default (if the target is enabled) to fix breakage.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/d0a57128f03f9e6381bb5a22b900901faecb7013 + https://codeberg.org/celenity/Phoenix/commit/7868acadf94ee47a8b69d46eef1c25b8076989b8 + https://codeberg.org/celenity/Phoenix/commit/e6d8e52c01a732b57d5681ac258abe586c3d48fb
        
        `privacy.fingerprintingProtection.granularOverrides` -> `{"firstPartyDomain":"gsi.go.jp","overrides":"-CanvasExtractionBeforeUserInputIsBlocked,-CanvasImageExtractionPrompt"},{"firstPartyDomain":"harkins.com","overrides":"-CanvasExtractionBeforeUserInputIsBlocked,-CanvasImageExtractionPrompt"},{"firstPartyDomain":"megacloud.blog","overrides":"-CanvasExtractionBeforeUserInputIsBlocked,-CanvasImageExtractionPrompt"},{"firstPartyDomain":"megacloud.store","overrides":"-CanvasExtractionBeforeUserInputIsBlocked,-CanvasImageExtractionPrompt"},{"firstPartyDomain":"nperf.com","overrides":"-CanvasExtractionBeforeUserInputIsBlocked,-CanvasImageExtractionPrompt"},{"firstPartyDomain":"pogospike.com","overrides":"-CanvasExtractionBeforeUserInputIsBlocked,-CanvasImageExtractionPrompt"}`
    
    </details>
    
    * **<details><summary>ANDROID**: Disabled spoofing screen coordinates on 'letterboxd.com' by default to properly display the mobile page instead of desktop.</summary>
        
        See details: https://github.com/webcompat/web-bugs/issues/150661
        
        `privacy.fingerprintingProtection.granularOverrides` -> `{"firstPartyDomain":"letterboxd.com","overrides":"-ScreenRect"}`
    
    </details>
    
    * **<details><summary>DESKTOP**: Blocked canvas data extraction before user input on 'cloudflare.com', 'riverside.fm', 'stacksocial.com', 'tiktok.com', 'tileman.io', 'usps.com', & 'yahoo.com' by default.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/d5b6477c783ed715e704c129ab3b364f7884419e + https://codeberg.org/celenity/Phoenix/commit/b3616823f0b82998e7bdec0e48d40b6e0643c452 + https://codeberg.org/celenity/Phoenix/commit/17c90cf95bb632d1cc1636719da9fd2ff920c5bb
        
        `privacy.fingerprintingProtection.granularOverrides` -> `{"firstPartyDomain":"cloudflare.com","overrides":"+CanvasExtractionBeforeUserInputIsBlocked"},{"firstPartyDomain":"riverside.fm","overrides":"+CanvasExtractionBeforeUserInputIsBlocked"},{"firstPartyDomain":"stacksocial.com","overrides":"+CanvasExtractionBeforeUserInputIsBlocked"},{"firstPartyDomain":"tiktok.com","overrides":"+CanvasExtractionBeforeUserInputIsBlocked"},{"firstPartyDomain":"tileman.io","overrides":"+CanvasExtractionBeforeUserInputIsBlocked"},{"firstPartyDomain":"usps.com","overrides":"+CanvasExtractionBeforeUserInputIsBlocked"},{"firstPartyDomain":"yahoo.com","overrides":"+CanvasExtractionBeforeUserInputIsBlocked"}`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled spoofing screen coordinates on 'barnesandnoble.com' by default to unbreak account sign-in.</summary>
        
        `privacy.fingerprintingProtection.granularOverrides` -> `{"firstPartyDomain":"barnesandnoble.com","overrides":"-ScreenRect"}`
    
    </details>
    
    * **<details><summary>DESKTOP**: Disabled pausing on debugger statements by default.</summary>
    
       `devtools.debugger.pause-on-debugger-statement` -> `false`
    
    </details>
    
    * **<details><summary>DESKTOP**: Enabled display of default/browser styles in the Inspector by default.</summary>
    
        `devtools.inspector.showUserAgentStyles` -> `true`
    
    </details>
    
    * <details><summary>Added 'classify-client.nonprod.webservices.mozgcp.net', 'classify-client.prod.webservices.mozgcp.net', 'location.services.mozilla.com', 'locprod2-elb-us-west-2.prod.mozaws.net', 'nonprod.classify-client.nonprod.webservices.mozgcp.net', & 'prod.classify-client.prod.webservices.mozgcp.net' to the internal domain blocklist.</summary>
    
        `network.dns.localDomains` -> `classify-client.nonprod.webservices.mozgcp.net,classify-client.prod.webservices.mozgcp.net,location.services.mozilla.com,locprod2-elb-us-west-2.prod.mozaws.net,nonprod.classify-client.nonprod.webservices.mozgcp.net,prod.classify-client.prod.webservices.mozgcp.net'`
    
    </details>
    
    * **<details><summary>APPLE MAPS SPECIALIZED CONFIG**: Added 'securemetrics.apple.com.cn', 'securemvt.apple.com.cn', & 'smoot-api-glb.v.aaplimg.com' to the internal domain blocklist.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/5aacd001fce8087518444dfc7da107000bd88a30
        
        `network.dns.localDomains` -> `securemetrics.apple.com.cn,securemvt.apple.com.cn,smoot-api-glb.v.aaplimg.com`
    
    </details>
    
    * **<details><summary>GOOGLE MAPS + YOUTUBE SPECIALIZED CONFIGS**: Added 'app-ads-services.com' to the internal domain blocklist.</summary>
        
        `network.dns.localDomains` -> `app-ads-services.com`
    
    </details>
    
    * **<details><summary>NIGHTLY**: Enabled isolation of resources (ex. referrers & cookies) injected by extensions by default - Currently only supported on Firefox Nightly.</summary>
    
        `privacy.antitracking.isolateContentScriptResources` -> `true`
    
    </details>
    
    * <details><summary>Added built-in example 'templates'/internal preferences to make it easier for users to set custom FPP (Fingerprinting Protection) overrides if needed.</summary>
        
       See details: https://codeberg.org/celenity/Phoenix/commit/ea8b20c4748acb96ed4b3e365d1d7d5efb6ce81b
    
        `privacy.fingerprintingProtection.granularOverrides.0.example` -> `[{"firstPartyDomain":"example1.invalid","overrides":"+ProtectionIWantToEnableOnThisWebsite,-ProtectionIWantToDisableOnThisWebsite"},{"thirdPartyDomain":"example2.invalid","overrides":"+ThirdPartyDomainsAreSupportedTheSameWayToo"}]`
        `privacy.fingerprintingProtection.overrides.0.example` -> `+ProtectionIWantToEnableGlobally,-ProtectionIWantToDisableGlobally`
    
    </details>
    
    * <details><summary>Added a built-in note/internal preference so people don't freak out when they see RFP (Resist Fingerprinting) isn't enabled...</summary>
        
       See details: https://codeberg.org/celenity/Phoenix/commit/538ee9f7c423371a02e5a688b29173c29c500d33
    
        `privacy.resistFingerprinting.0.note` -> `RFP is disabled on purpose.`
        `privacy.resistFingerprinting.1.note` -> `We use a hardened configuration of FPP instead.`
        `privacy.resistFingerprinting.2.note` -> `Using RFP is not recommended or supported.`
    
    </details>
    
    * Other tweaks & fixes
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.04.15.1...2025.04.27.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.04.15.1...2025.04.27.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.04.15.1...2025.04.27.1) for more details.
    ___
    
    :)
  • 2025.04.15.1 Release: 2025.04.15.1
    ____
    
    * <details><summary>Prevented Firefox from automatically using the system's proxy configuration by default, due to security concerns, and to ensure the user is always in control and making the conscious decision to use a proxy, if they do at all.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/commit/d0ac438c3c464ecc15798b07da73f9db61d688b3
        
        `network.proxy.type` -> `0`
    
    </details>
    
    
    * <details><summary>Re-enabled the Baseline Interpreter by default, and instead disabled eager baseline hints.</summary>
    
        See details: https://codeberg.org/celenity/Phoenix/issues/93
        
        `javascript.options.blinterp` -> `true`
        `javascript.options.jithints` -> `false`
    
    </details>
    
    * <details><summary>Disabled automatic storage access grants by default.</summary>
    
        `dom.storage_access.auto_grants` -> `false`
        `dom.storage_access.max_concurrent_auto_grants` -> `1`
    
    </details>
    
    * <details><summary>Enabled the ability to add signatures to PDFs.</summary>
    
        `pdfjs.enableSignatureEditor` -> `true`
    
    </details>
    
    * <details><summary>Disabled collection/generation of wireframes by default.</summary>
    
        See details: https://searchfox.org/mozilla-central/source/browser/components/sessionstore/PageWireframes.sys.mjs
        
        `browser.history.collectWireframes` -> `false`
    
    </details>
    
    * <details><summary>Disabled the insecure 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA' &  'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA' ciphers (like Chromium, Firefox Nightly, & Tor Browser).</summary>
    
        See details: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/issues/361#note_3089049 + https://bugzilla.mozilla.org/show_bug.cgi?id=1600437
        
        `security.ssl3.ecdhe_ecdsa_aes_128_sha` -> `false`
        `security.ssl3.ecdhe_ecdsa_aes_256_sha` -> `false`
    
    </details>
    
    * <details><summary>Set external links in PDFs to open in new tabs/windows by default.</summary>
    
        `pdfjs.externalLinkTarget` -> `2`
    
    </details>
    
    * <details><summary>Explicitly set per-site process isolation (Fission) to always isolate everything. </summary>
    
        See details: https://searchfox.org/mozilla-central/source/dom/ipc/ProcessIsolation.cpp
        
        `fission.webContentIsolationStrategy` -> `1`
    
    </details>
    
    * <details><summary>Disabled the 'data collection' permission for browser extensions.</summary>
    
        See details: https://searchfox.org/mozilla-central/source/toolkit/locales-preview/dataCollectionPermissions.ftl
        
        `extensions.dataCollectionPermissions.enabled` -> `false`
    
    </details>
    
    * <details><summary>Enabled Add-on Manager Remote Settings by default to expose the preference via the about:config.</summary>
    
        See details: https://searchfox.org/mozilla-central/source/toolkit/mozapps/extensions/docs/AMRemoteSettings-overview.rst
        
        `extensions.remoteSettings.disabled` -> `false`
    
    </details>
    
    * <details><summary>Set additional preferences to ensure the Reporting API is never active for redundancy.</summary>
    
        `dom.reporting.delivering.maxFailures` -> `0`
        `dom.reporting.delivering.maxReports` -> `0`
    
    </details>
    
    * **<details><summary>DESKTOP**: Set the 'devtools.debugger.remote-enabled' & 'xpinstall.enabled' to reset per-session for Linux users. This is already the current behavior for other platforms, but it wasn't working for Linux users due to a misconfiguration.</summary>
        
       See details: https://codeberg.org/celenity/Phoenix/commit/f20c044998a091e3fb9502633bc231acc618ba0b
    
    </details>
    
    * **<details><summary>DESKTOP**: Updated environment variables to disable Mozilla's Crash Reporter.</summary>
    
        See details: https://firefox-source-docs.mozilla.org/toolkit/crashreporter/crashreporter/index.html#user-specified-environment-variables
        
        ```sh
        export MOZ_CRASHREPORTER=;
        export MOZ_CRASHREPORTER_DISABLE=1;
        export MOZ_CRASHREPORTER_NO_REPORT=1;
        export MOZ_CRASHREPORTER_URL="data;";
        ```
        
        *Previously, we just set `MOZ_CRASHREPORTER` to `0`.*
    
    </details>
    
    * <details><summary>Added www.anonymco.com to our internal domain blocklist.</summary>
    
        `network.dns.localDomains` -> `250analytics.com,a.omappapi.com,ads.allizom.org,ads.mozilla.org,ads.nonprod.webservices.mozgcp.net,ads.prod.webservices.mozgcp.net,analytics.getpocket.com,analytics.google.com,analytics.withgoogle.com,anf1.fuzzing.mozilla.org,anonymco.com,asan-nightly-frontend-elb-1348905149.us-east-2.elb.amazonaws.com,braze.com,contile.services.mozilla.com,contile-images.services.mozilla.com,crash-reports.allizom.org,crash-reports.mozilla.com,crash-reports-xpsp2.mozilla.com,crash-stacks.mozilla.com,crash-stats.allizom.org,crash-stats.mozilla.com,crash-stats.mozilla.org,dap.services.mozilla.com,dap.nonprod.webservices.mozgcp.net,dap.prod.webservices.mozgcp.net,dap-09-3.api.divviup.org,discovery.addons.allizom.org,discovery.addons.mozilla.org,discovery.addons-dev.allizom.org,divviup.org,download-stats.mozilla.org,download-stats.r53-2.services.mozilla.com,experimenter.services.mozilla.com,experimenter.nonprod.webservices.mozgcp.net,experimenter.prod.webservices.mozgcp.net,fhr.data.mozilla.com,fhr.r53-2.services.mozilla.com,firefox-android-home-recommendations.getpocket.com,fuzzing.mozilla.org,google-analytics.com,google-analytics-cn.com,googleanalytics.com,googlesyndication.com,googlesyndication-cn.com,googletagmanager.com,googletagmanager-cn.com,googletagservices.com,googletagservices-cn.com,improving.duckduckgo.com,incoming.telemetry.mozilla.org,incoming.thunderbird.net,incoming-telemetry.thunderbird.net,merino.nonprod.cloudops.mozgcp.net,merino.prod.cloudops.mozgcp.net,merino.services.mozilla.com,metrics-content.duckduckgo.com,mozilla-ohttp.fastly-edge.com,new-sentry.gitlab.net,normandy.cdn.mozilla.net,normandy.nonprod.cloudops.mozgcp.net,normandy.prod.cloudops.mozgcp.net,normandy-cdn.services.mozilla.com,ohttp-gateway.prod.webservices.mozgcp.net,omappapi.com,pagead2.googlesyndication.com,pipeline-incoming-prod-elb-149169523.us-west-2.elb.amazonaws.com,prod.experimenter.prod.webservices.mozgcp.net,prod.ohttp-gateway.prod.webservices.mozgcp.net,sdk.iad-05.braze.com,sentry.gitlab.net,sentry.io,sentry.nonprod.cloudops.mozgcp.net,sentry.prod.cloudops.mozgcp.net,sitereview.zscaler.com,snippets.allizom.org,snippets.cdn.mozilla.net,snippets.mozilla.com,snippets-prod.frankfurt.moz.works,snippets-prod.moz.works,snippets-prod.oregon-b.moz.works,snippets-stage.moz.works,snippets-stage.oregon-b.moz.works,snowplow.trx.gitlab.net,snowplowalb-1011729428.us-east-1.elb.amazonaws.com,snowplowprd.trx.gitlab.net,snowplowprdnlb-1490493263.us-east-2.elb.amazonaws.com,socorro.nonprod.webservices.mozgcp.net,socorro.prod.webservices.mozgcp.net,socorro-collector.services.mozilla.com,socorro-webapp-allizom.stage.mozaws.net,socorro-webapp.services.mozilla.com,spocs.getpocket.com,spocs.getpocket.dev,spocs.mozilla.net,ssl.google-analytics.com,ssl-google-analytics.l.google.com,start.fedoraproject.org,start.thunderbird.net,start.ubuntu.com,start-stage.thunderbird.net,symbolication.services.mozilla.com,symbols.mozilla.org,tagmanager.google.com,talkback.mozilla.org,talkback-public.mozilla.org,talkback-reports.mozilla.org,telemetry-coverage.mozilla.org,telemetry-coverage.r53-2.services.mozilla.com,telemetry-incoming.r53-2.services.mozilla.com,telemetry-prod-1054754349.us-east-1.elb.amazonaws.com,updates.thunderbird.net,updates-stage.thunderbird.net,use-application-dns.net,vf.startpage.com,www.250analytics.com,www.anonymco.com,www.google-analytics.com,www.google-analytics-cn.com,www.googleanalytics.com,www.googlesyndication.com,www.googlesyndication-cn.com,www.googletagmanager.com,www.googletagmanager-cn.com,www.googletagservices.com,www.googletagservices-cn.com,www.sentry.io,www-google-analytics.l.google.com,www-googletagmanager.l.google.com`
    
    </details>
    
    * **<details><summary>APPLE MAPS SPECIALIZED CONFIG**: Added various Apple domains to the domain blocklist.</summary>
    
        `api.smoot.apple.com`, `ca.iadsdk.apple.com`, `cf.iadsdk.apple.com`, `cstat.g.apple.com`, `cstat-origin.apple.com`, `daf.xp.apple.com`, `fbs.smoot.apple.com`, `probe.me.apple-dns.net`, `skadnetwork.iad-apple.com.akadns.net`, & `tr.iadsdk.apple.com`
    
        `network.dns.localDomains` -> `250analytics.com,a.omappapi.com,ads.allizom.org,ads.mozilla.org,ads.nonprod.webservices.mozgcp.net,ads.prod.webservices.mozgcp.net,analytics.getpocket.com,analytics.google.com,analytics.withgoogle.com,anf1.fuzzing.mozilla.org,anonymco.com,asan-nightly-frontend-elb-1348905149.us-east-2.elb.amazonaws.com,braze.com,contile.services.mozilla.com,contile-images.services.mozilla.com,crash-reports.allizom.org,crash-reports.mozilla.com,crash-reports-xpsp2.mozilla.com,crash-stacks.mozilla.com,crash-stats.allizom.org,crash-stats.mozilla.com,crash-stats.mozilla.org,dap.services.mozilla.com,dap.nonprod.webservices.mozgcp.net,dap.prod.webservices.mozgcp.net,dap-09-3.api.divviup.org,discovery.addons.allizom.org,discovery.addons.mozilla.org,discovery.addons-dev.allizom.org,divviup.org,download-stats.mozilla.org,download-stats.r53-2.services.mozilla.com,experimenter.services.mozilla.com,experimenter.nonprod.webservices.mozgcp.net,experimenter.prod.webservices.mozgcp.net,fhr.data.mozilla.com,fhr.r53-2.services.mozilla.com,firefox-android-home-recommendations.getpocket.com,fuzzing.mozilla.org,google-analytics.com,google-analytics-cn.com,googleanalytics.com,googlesyndication.com,googlesyndication-cn.com,googletagmanager.com,googletagmanager-cn.com,googletagservices.com,googletagservices-cn.com,improving.duckduckgo.com,incoming.telemetry.mozilla.org,incoming.thunderbird.net,incoming-telemetry.thunderbird.net,merino.nonprod.cloudops.mozgcp.net,merino.prod.cloudops.mozgcp.net,merino.services.mozilla.com,metrics-content.duckduckgo.com,mozilla-ohttp.fastly-edge.com,new-sentry.gitlab.net,normandy.cdn.mozilla.net,normandy.nonprod.cloudops.mozgcp.net,normandy.prod.cloudops.mozgcp.net,normandy-cdn.services.mozilla.com,ohttp-gateway.prod.webservices.mozgcp.net,omappapi.com,pagead2.googlesyndication.com,pipeline-incoming-prod-elb-149169523.us-west-2.elb.amazonaws.com,prod.experimenter.prod.webservices.mozgcp.net,prod.ohttp-gateway.prod.webservices.mozgcp.net,sdk.iad-05.braze.com,sentry.gitlab.net,sentry.io,sentry.nonprod.cloudops.mozgcp.net,sentry.prod.cloudops.mozgcp.net,sitereview.zscaler.com,snippets.allizom.org,snippets.cdn.mozilla.net,snippets.mozilla.com,snippets-prod.frankfurt.moz.works,snippets-prod.moz.works,snippets-prod.oregon-b.moz.works,snippets-stage.moz.works,snippets-stage.oregon-b.moz.works,snowplow.trx.gitlab.net,snowplowalb-1011729428.us-east-1.elb.amazonaws.com,snowplowprd.trx.gitlab.net,snowplowprdnlb-1490493263.us-east-2.elb.amazonaws.com,socorro.nonprod.webservices.mozgcp.net,socorro.prod.webservices.mozgcp.net,socorro-collector.services.mozilla.com,socorro-webapp-allizom.stage.mozaws.net,socorro-webapp.services.mozilla.com,spocs.getpocket.com,spocs.getpocket.dev,spocs.mozilla.net,ssl.google-analytics.com,ssl-google-analytics.l.google.com,start.fedoraproject.org,start.thunderbird.net,start.ubuntu.com,start-stage.thunderbird.net,symbolication.services.mozilla.com,symbols.mozilla.org,tagmanager.google.com,talkback.mozilla.org,talkback-public.mozilla.org,talkback-reports.mozilla.org,telemetry-coverage.mozilla.org,telemetry-coverage.r53-2.services.mozilla.com,telemetry-incoming.r53-2.services.mozilla.com,telemetry-prod-1054754349.us-east-1.elb.amazonaws.com,updates.thunderbird.net,updates-stage.thunderbird.net,use-application-dns.net,vf.startpage.com,www.250analytics.com,www.google-analytics.com,www.google-analytics-cn.com,www.googleanalytics.com,www.googlesyndication.com,www.googlesyndication-cn.com,www.googletagmanager.com,www.googletagmanager-cn.com,www.googletagservices.com,www.googletagservices-cn.com,www.sentry.io,www-google-analytics.l.google.com,www-googletagmanager.l.google.com,ab.apple.com.akadns.net,acfeedbackws.icloud.com,advertising.apple.com,advp.apple.com,amsui.apple.com,api.smoot.apple.com,api-adservices.apple.com,api-smoot.apple.com,applemediaservices.com,bag-smoot.apple.com,bag-smoot.v.aaplimg.com,ca.iadsdk.apple.com,cdn-xp-ingest-ab.v.aaplimg.com,cdn-xp-ingest.edge.apple,cf.iadsdk.apple.com,cstat.apple.com,cstat.apple.com.edgesuite.net,cstat.cdn-apple.com,cstat.g.aaplimg.com,cstat.g.apple.com,cstat-lb.apple.com.akadns.net,cstat-origin.apple.com,daf.xp.apple.com,databeacon.apple.com,datacollection.apple.com,dejavu.apple.com,experiments.apple.com,experiments.apple.com.edgekey.net,fbs.smoot.apple.com,feedbackws.fe2.apple-dns.net,feedbackws.fe.apple-dns.cn,feedbackws.fe.apple-dns.net,feedbackws.icloud.com,feedbackws.icloud.com.cn,gsp10.apple-mapkit.com,gsp10-ssl.apple.com,gsp10-ssl.ls-apple.com.akadns.net,iad.apple.com,iad-apple.com.akadns.net,iadcontent.apple.com,iadcontent-lb.apple.com.akadns.net,iadmoo.apple.com,iadsdk.apple.com,iadsdk.apple.com.akadns.net,iadsdk.apple.com.edgekey.net,iadworkbench.apple.com,images-mercury.mzstatic.com,images-mercury.v.aaplimg.com,launch.apple.com,marketing.services.apple,me.apple-dns.net,metrics.apple.com,metrics.icloud.com,metrics.mzstatic.com,msc-dct-prod.msc.apple.com,parsec.apple.com,partiality.itunes.apple.com,partiality.itunes-apple.com.akadns.net,partiality.itunes.apple.com.edgekey.net,performance-partners.apple.com,prd-usw2-requestattribution-iad.apple.com,probe.me.apple-dns.net,proxy-skadnetwork.apple.com,qa-iad.apple.com,qwapi.com,radarsubmissions.apple.com,radarsubmissions.apple.com.akadns.net,sdkintg-iad.apple.com,sdkintgiad.apple.com,searchads.apple.com,searchads.apple.com.edgesuite.net,searchads.lb-apple.com.akadns.net,securemetrics.apple.com,securemetrics.v.aaplimg.com,securemvt.apple.com,securemvt.v.aaplimg.com,skadnetwork.iad-apple.com.akadns.net,smoot.apple.cn,smoot.apple.com,smoot-apple.com.akadns.net,smoot.apple.com.cn,smoot.g.aaplimg.com,smoot.v.aaplimg.com,smoot-feedback.v.aaplimg.com,smoot-searchv2-ause1c.v.aaplimg.com,speedtracer.apple.com,stg-iad.apple.com,supportmetrics.apple.com,supportmetrics.v.aaplimg.com,supportmetrics-uat.apple.com,tr.iadsdk.apple.com,uxintg-iad.apple.com,uxintgiad.apple.com,xp.apple.com,xp.apple.com.edgekey.net,xp.itunes-apple.com.akadns.net,xp-cdn.apple.com,xp-daf.apple.com.edgekey.net,xp-daf.itunes-apple.com.akadns.net`
    
    </details>
    
    * Other tweaks & fixes
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.04.11.1...2025.04.15.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.04.11.1...2025.04.15.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.04.11.1...2025.04.15.1) for more details.
    ___
    
    :)
  • 2025.04.11.1 Release: 2025.04.11.1
    ____
    
    * Heavily optimized and significantly improved the performance of our [uBlock Origin configuration](https://codeberg.org/celenity/Phoenix/src/branch/pages/uBlock/assets.json) - **See [here](https://gitlab.com/ironfox-oss/IronFox/-/releases/v137.0.1#update-your-ublock-origin-configuration) for details on the recommended way to update**.
    
    * **DESKTOP**: Added back `Cloudflare` & `NextDNS` as built-in DNS over HTTPS providers, in addition to Cloudflare's `Malware Protection` & `Family Protection` variants. **Note that we still use `Quad9` by default**. **It should also be noted** that the built-in standard, `Cloudflare` **`Unfiltered`** DNS provider has a [stricter privacy policy](https://developers.cloudflare.com/1.1.1.1/privacy/cloudflare-resolver-firefox/) than the `Malware Protection` & `Family Protection` variants, [due to a contract with Mozilla](https://wiki.mozilla.org/Security/DOH-resolver-policy). - `doh-rollout.provider-list` -> `[{"uri":"https://dns.quad9.net/dns-query","UIName":"Quad9 - Real-time Malware Protection","autoDefault":true},{"uri":"https://zero.dns0.eu","UIName":"DNS0 (ZERO) - Hardened Real-time Malware Protection","autoDefault":false},{"uri":"https://dns0.eu","UIName":"DNS0 - Real-time Malware Protection","autoDefault":false},{"uri":"https://base.dns.mullvad.net/dns-query","UIName":"Mullvad (Base) - Ad/Tracking/Limited Malware Protection","autoDefault":false},{"uri":"https://dns.adguard-dns.com/dns-query","UIName":"AdGuard (Public) - Ad/Tracking Protection","autoDefault":false},{"uri":"https://dns.mullvad.net/dns-query","UIName":"Mullvad - Unfiltered","autoDefault":false},{"uri":"https://wikimedia-dns.org/dns-query","UIName":"Wikimedia - Unfiltered","autoDefault":false},{"uri":"https://firefox.dns.nextdns.io/","UIName":"NextDNS (Public) - Unfiltered","autoDefault":false},{"uri":"https://unfiltered.adguard-dns.com/dns-query","UIName":"AdGuard (Public) - Unfiltered","autoDefault":false},{"uri":"https://kids.dns0.eu","UIName":"DNS0 - Kids","autoDefault":false},{"uri":"https://family.dns.mullvad.net/dns-query","UIName":"Mullvad (Family)","autoDefault":false},{"uri":"https://family.adguard-dns.com/dns-query","UIName":"AdGuard (Public) - Family Protection","autoDefault":false},{"uri":"https://extended.dns.mullvad.net/dns-query","UIName":"Mullvad (Extended) - Ad/Tracking/Limited Malware/Social Media Protection","autoDefault":false},{"uri":"https://all.dns.mullvad.net/dns-query","UIName":"Mullvad (All) - Ad/Tracking/Limited Malware/Social Media/Adult/Gambling Protection","autoDefault":false},{"uri":"https://security.cloudflare-dns.com/dns-query","UIName":"Cloudflare - Malware Protection","autoDefault":false},{"uri":"https://mozilla.cloudflare-dns.com/dns-query","UIName":"Cloudflare - Unfiltered (Stricter privacy policy)","autoDefault":false},{"uri":"https://family.cloudflare-dns.com/dns-query","UIName":"Cloudflare - Adult Content/Malware Protection","autoDefault":false}]`
    
    * **DESKTOP**: Disabled installation of add-ons by default, and reset it back to `false` per-session. **Note that this has no impact on already installed add-ons, and has no impact on updates. Additionally, Firefox will prompt you to re-enable the ability to install add-ons when you attempt to install one**. To be absolutely clear, I will **never** remove the ability for users to install add-ons in Phoenix. All this does is add an extra layer of protection by ensuring the ability to install add-ons is only enabled when users need it, and disabled the rest of the time. - `xpinstall.enabled` -> `false`
    
    * **DESKTOP**: Extensions can now be installed from sources outside of the AMO *(`addons.mozilla.org`)* and our built-in exceptions. **INSTALLING EXTENSIONS FROM OUTSIDE OF THE AMO IS STRONGLY NOT RECOMMENDED**. This gives users greater freedom and control over their browsing experience, which is one of Phoenix's primary goals, and it also has other benefits. For instance, with the previous approach, users couldn't override and prevent the sources we allowed *(ex. the AMO)* from being able to install extensions if they desired. This is no longer the case, meaning users can have an even safer browsing experience if they desire. I believe that the new defenses we've added in this release allow this to be done in a safe way, as we can ensure extensions are only installed when users make the explicit, conscious decision to install them.
    
    * **DESKTOP**: Removed our built-in custom add-on recommendations from `about:addons`, as they're incompatible with our recent changes, simply unnecessary, and provide a better, cleaner UX when disabled. We'll just leave these recommendations on our [wiki page](https://codeberg.org/celenity/Phoenix/wiki/Recommended-Extensions). - `extensions.getAddons.discovery.api_url` & `extensions.recommendations.privacyPolicyUrl` -> ` `, `extensions.getAddons.showPane` -> `false`
    
    * **DESKTOP**: Stopped enforcing extension updates via policies to ensure that users can always disable if desired, **though this is STRONGLY discouraged**.
    
    * **ANDROID**: Explicitly enabled the ability to install add-ons by default to expose the setting via the `about:config`. *(Unlike desktop, Firefox unfortunately doesn't prompt users on mobile to re-enable this functionality, so we won't set it there by default, but we can still expose it via the `about:config` to make it easier for users to disable on their own if desired)* - `xpinstall.enabled` -> `true`
    
    * Enabled [HTTPS-First](https://support.mozilla.org/kb/https-first) for local addresses & unknown suffixes - `dom.security.https_first_for_local_addresses` & `dom.security.https_first_for_unknown_suffixes` -> `true`
    
    * Excluded third party trackers from storage access auto grants *(if enabled)* by default - `dom.storage_access.auto_grants.exclude_third_party_trackers` -> `true`
    
    * Further hardened the extension [Content Security Policy](https://developer.mozilla.org/docs/Web/HTTP/Guides/CSP). - `extensions.webextensions.base-content-security-policy` -> `script-src 'self' 'unsafe-inline'; upgrade-insecure-requests;`
    
    * Added a built-in domain blocklist/firewall, primarily consisting of various Mozilla ad/telemetry domains we want to ensure we never connect to, and ads/trackers/etc. that appear on their services. We'll also include domains that appear on other built-in/default connections/services, but we'll generally prefer to keep it limited in favor of ex. uBlock Origin. We've also customized the list for our **specialized** configs on desktop, to include ads/telemetry/trackers/etc. that appear on those services. - `network.dns.localDomains` -> `250analytics.com,a.omappapi.com,ads.allizom.org,ads.mozilla.org,ads.nonprod.webservices.mozgcp.net,ads.prod.webservices.mozgcp.net,analytics.getpocket.com,analytics.google.com,analytics.withgoogle.com,anf1.fuzzing.mozilla.org,anonymco.com,asan-nightly-frontend-elb-1348905149.us-east-2.elb.amazonaws.com,braze.com,contile.services.mozilla.com,contile-images.services.mozilla.com,crash-reports.allizom.org,crash-reports.mozilla.com,crash-reports-xpsp2.mozilla.com,crash-stacks.mozilla.com,crash-stats.allizom.org,crash-stats.mozilla.com,crash-stats.mozilla.org,dap.services.mozilla.com,dap.nonprod.webservices.mozgcp.net,dap.prod.webservices.mozgcp.net,dap-09-3.api.divviup.org,discovery.addons.allizom.org,discovery.addons.mozilla.org,discovery.addons-dev.allizom.org,divviup.org,download-stats.mozilla.org,download-stats.r53-2.services.mozilla.com,experimenter.services.mozilla.com,experimenter.nonprod.webservices.mozgcp.net,experimenter.prod.webservices.mozgcp.net,fhr.data.mozilla.com,fhr.r53-2.services.mozilla.com,firefox-android-home-recommendations.getpocket.com,fuzzing.mozilla.org,google-analytics.com,google-analytics-cn.com,googleanalytics.com,googlesyndication.com,googlesyndication-cn.com,googletagmanager.com,googletagmanager-cn.com,googletagservices.com,googletagservices-cn.com,improving.duckduckgo.com,incoming.telemetry.mozilla.org,incoming.thunderbird.net,incoming-telemetry.thunderbird.net,merino.nonprod.cloudops.mozgcp.net,merino.prod.cloudops.mozgcp.net,merino.services.mozilla.com,metrics-content.duckduckgo.com,mozilla-ohttp.fastly-edge.com,new-sentry.gitlab.net,normandy.cdn.mozilla.net,normandy.nonprod.cloudops.mozgcp.net,normandy.prod.cloudops.mozgcp.net,normandy-cdn.services.mozilla.com,ohttp-gateway.prod.webservices.mozgcp.net,omappapi.com,pagead2.googlesyndication.com,pipeline-incoming-prod-elb-149169523.us-west-2.elb.amazonaws.com,prod.experimenter.prod.webservices.mozgcp.net,prod.ohttp-gateway.prod.webservices.mozgcp.net,sdk.iad-05.braze.com,sentry.gitlab.net,sentry.io,sentry.nonprod.cloudops.mozgcp.net,sentry.prod.cloudops.mozgcp.net,sitereview.zscaler.com,snippets.allizom.org,snippets.cdn.mozilla.net,snippets.mozilla.com,snippets-prod.frankfurt.moz.works,snippets-prod.moz.works,snippets-prod.oregon-b.moz.works,snippets-stage.moz.works,snippets-stage.oregon-b.moz.works,snowplow.trx.gitlab.net,snowplowalb-1011729428.us-east-1.elb.amazonaws.com,snowplowprd.trx.gitlab.net,snowplowprdnlb-1490493263.us-east-2.elb.amazonaws.com,socorro.nonprod.webservices.mozgcp.net,socorro.prod.webservices.mozgcp.net,socorro-collector.services.mozilla.com,socorro-webapp-allizom.stage.mozaws.net,socorro-webapp.services.mozilla.com,spocs.getpocket.com,spocs.getpocket.dev,spocs.mozilla.net,ssl.google-analytics.com,ssl-google-analytics.l.google.com,start.fedoraproject.org,start.thunderbird.net,start.ubuntu.com,start-stage.thunderbird.net,symbolication.services.mozilla.com,symbols.mozilla.org,tagmanager.google.com,talkback.mozilla.org,talkback-public.mozilla.org,talkback-reports.mozilla.org,telemetry-coverage.mozilla.org,telemetry-coverage.r53-2.services.mozilla.com,telemetry-incoming.r53-2.services.mozilla.com,telemetry-prod-1054754349.us-east-1.elb.amazonaws.com,updates.thunderbird.net,updates-stage.thunderbird.net,use-application-dns.net,vf.startpage.com,www.250analytics.com,www.google-analytics.com,www.google-analytics-cn.com,www.googleanalytics.com,www.googlesyndication.com,www.googlesyndication-cn.com,www.googletagmanager.com,www.googletagmanager-cn.com,www.googletagservices.com,www.googletagservices-cn.com,www.sentry.io,www-google-analytics.l.google.com,www-googletagmanager.l.google.com`
    
    * **DESKTOP**: Disabled `What's New` Pages by default - `startup.homepage_override_nimbus_disable_wnp` -> `true`
    
    * Added additional pref to ensure we never fetch experiments from Nimbus/Normandy - `app.normandy.run_interval_seconds` -> `0`
    
    * Disabled (in)activity-based ping submission for redundancy. - `telemetry.fog.test.activity_limit` & `telemetry.fog.test.inactivity_limit` -> `-1`
    
    * Disabled the `sync` ping for redundancy. - `services.sync.telemetry.maxEventsCount` & `services.sync.telemetry.maxPayloadCount` -> `0`, `services.sync.telemetry.submissionInterval` -> `999999999`
    
    * Prevented the `Telemetry` component from initializing. - `toolkit.telemetry.initDelay` -> `999999999`
    
    * Opted out of requesting crash reports for background processes from users - `browser.crashReports.crashPull` -> `false` & `browser.crashReports.requestedNeverShowAgain` -> `true`
    
    * **DESKTOP**: Added additional prefs to disable Mozilla promotions - `browser.contentblocking.report.mobile-android.url`, `browser.contentblocking.report.mobile-ios.url`, & `browser.contentblocking.report.vpn.url` -> ` `
    
    * **APPLE MAPS SPECIALIZED CONFIG**: Updated the link from `beta.maps.apple.com` to `maps.apple.com` - `browser.newtabpage.pinned` -> `[{"url":"https://maps.apple.com/","label":"Apple Maps"}]`
    
    * **ELEMENT SPECIALIZED CONFIG**: Updated FPP overrides to disable timezone spoofing for more Element instances by default - `privacy.fingerprintingProtection.granularOverrides` -> `[{"firstPartyDomain":"arcticfoxes.net","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"aria.im","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"bitcoinist.org","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"chatwave.org","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"cinny.in","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"duesen.chat","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"element.io","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"flieger.chat","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"g24.at","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"gemeinsam.jetzt","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"gnulinux.club","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"hot-chilli.im","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"kde.org","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"kosmikdog.eu","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"mozilla.org","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"mtrx.nz","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"neat.chat","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"nitro.chat","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"nope.chat","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"oblak.be","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"pcriot.org","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"pendora.io","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"rollenspiel.chat","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"socialnetwork24.com","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"studichat.de","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"synod.im","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"the-apothecary.club","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"transfem.dev","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"unredacted.org","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"utwente.io","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"we2.ee","overrides":"-JSDateTimeUTC"},{"firstPartyDomain":"yatrix.org","overrides":"-JSDateTimeUTC"}]`
    
    * Hid the Title Bar by default - `browser.tabs.inTitlebar` -> `1`
    
    * Cleaned-up files/improved organization
    
    * Other tweaks & fixes
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.04.02.1...2025.04.11.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.04.02.1...2025.04.11.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.04.02.1...2025.04.11.1) for more details.
    ___
    
    :)
  • 2025.04.02.1
    176d5bd4 · Build 2025.04.02.1 ·
    Release: 2025.04.02.1
    ____
    
    * Phoenix's uBlock Origin configuration, add-on recommendations, and other resources are now downloaded from GitLab instead of Codeberg. Unfortunately, Codeberg is currently too unreliable and unable to properly serve these files, but we hope we'll be able to use them again for downloading these resources in the future.
    
    * **DESKTOP**: WebGL is now blocked by default for **all configs** via uBlock Origin. This approach is beneficial to users and heavily improves usability, as it allows users to override it on a per-site basis. See [here](https://gitlab.com/ironfox-oss/IronFox/-/releases/v137.0.0#per-site-webgl-control) for more details. **Users with existing Phoenix installs are highly recommended to enable these `Block WebGL` filterlists in uBlock Origin**. This is especially important for Phoenix **`Extended`** users, as we no longer set `webgl.disabled` to `true` by default in favor of this new approach.
    
    * Disabled `Dry Run` mode to enforce [Bounce Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_bounce-tracking-protection). - `privacy.bounceTrackingProtection.enableDryRunMode` -> `false`
    
    * Disabled [Storage Access Heuristics](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning#storage_access_heuristics) by default for **all configs** - `privacy.restrict3rdpartystorage.heuristic.opened_window_after_interaction`, `privacy.restrict3rdpartystorage.heuristic.recently_visited`, `privacy.restrict3rdpartystorage.heuristic.redirect`, & `privacy.restrict3rdpartystorage.heuristic.window_open` -> `false`
    
    * Disabled the new `Navigation` [Storage Access Heuristic](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning#storage_access_heuristics) by default - `privacy.restrict3rdpartystorage.heuristic.navigation` -> `false`
    
    * Stopped spoofing the locale reported by the [Internationalization API](https://hacks.mozilla.org/2014/12/introducing-the-javascript-internationalization-api/) to `en-US` by default, as this is useless since we don't also spoof the `Accept-Language HTTP Header` by default, and it's likely doing more harm than good. - `privacy.fingerprintingProtection.overrides` -> `-JSLocale`
    
    * **DESKTOP**: Disable the [updated wallpaper experience](https://searchfox.org/mozilla-central/source/toolkit/components/nimbus/FeatureManifest.yaml#1422) to prevent an unsolicited connection to `https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/newtab-wallpapers-v2/...` on every browser launch when navigating to `about:home` - `browser.newtabpage.activity-stream.newtabWallpapers.v2.enabled` -> `false`
    
    * **DESKTOP**: Spoofed the [Beacon API](https://developer.mozilla.org/docs/Web/API/Beacon_API) *(`navigator.sendBeacon()`)* to always return `true` via uBlock Origin, despite us not supporting it *(similar to Cromite)*. This improves privacy by improving fingerprinting protection *(so we don't stick out from standard Firefox users for disabling this API)* & breaking a large amount of trackers, and it also fixes unnecessary breakage/compatibility issues - ex. https://gitlab.com/ironfox-oss/IronFox/-/issues/43 - **Users with existing Phoenix installs are highly recommended to enable this `Beacon API Stub` filterlist in uBlock Origin**. Users who previously set `beacon.enabled` to `true` are also now highly recommended to set it back to `false`.
    
    * **DESKTOP**: Switched links for the built-in `ABPindo`, `ABPVN`, `Actually Legitimate URL Shortener Tool`, `Dandelion Sprout's Annoyances List`, `Dandelion Sprout's Anti-Malware List`, `Dandelion Sprout's Serbo-Croatian filters`, `Dandelion Sprouts nordiske filtre`, & `Steven Black (Unified)` uBlock Origin filterlists from GitHub to GitLab due to superior privacy practices
    
    * **DESKTOP**: Added an additional pref to disable `mozAddonManager`. - `extensions.webapi.enabled` -> `false`
    
    * **ANDROID**: Explicitly enabled `mozAddonManager` to prevent issues and ensure users are able to install add-ons from `addons.mozilla.org`. - `extensions.webapi.enabled` -> `true`, `privacy.resistFingerprinting.block_mozAddonManager` -> `false` 
    
    * **DESKTOP**: Removed [several unnecessary built-in filterlists](https://codeberg.org/celenity/Phoenix/commit/841769096f9519fa935d1b769e5bf721c9c70e73) from our uBlock Origin configuration.
    
    * Enabled zoom for all websites by default, even if they try to block it... - `browser.ui.zoom.force-user-scalable` - `true`
    
    * Cleaned-up files/improved organization
    
    * Other minor tweaks & fixes
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.03.25.1...2025.04.02.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.03.25.1...2025.04.02.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.03.25.1...2025.04.02.1) for more details.
    ___
    
    :)
  • 2025.03.25.1
    7bfa489e · Build 2025.03.25.1 ·
    Release: 2025.03.25.1
    ____
    
    * Disabled `Dry Run` to enforce [Cookies Having Independent Partitioned State *(CHIPS)*](https://developer.mozilla.org/docs/Web/Privacy/Privacy_sandbox/Partitioned_cookies) - `network.cookie.chips.partitionLimitDryRun` -> `false`
    
    * Enabled [Messaging Layer Security](https://blog.mozilla.org/mozilla/messaging-layer-security-is-now-an-internet-standard/) - `dom.origin-trials.mls.state` -> `1`
    
    * Added an additional pref to enforce strict MIME types - `dom.workers.importScripts.enforceStrictMimeType` -> `true`
    
    * Prevented Glean from initializing on shutdown - `telemetry.fog.init_on_shutdown` -> `false`
    
    * Forced telemetry pings to be sent to `localhost` *(with an invalid port)* instead of Mozilla's remote servers *(if somehow enabled...)* for redundancy/defense in depth - `telemetry.fog.test.localhost_port` -> `70000`
    
    * Disabled pacing requests to improve performance- *https://codeberg.org/celenity/Phoenix/issues/84* - `network.http.pacing.requests.enabled` -> `false`
    
    * Increased TLS token caching to improve performance - *https://codeberg.org/celenity/Phoenix/issues/84* - `network.ssl_tokens_cache_capacity` -> `10240`
    
    * Enabled [CSS Masonry Layout](https://www.smashingmagazine.com/native-css-masonry-layout-css-grid/) - *https://codeberg.org/celenity/Phoenix/issues/84* - `layout.css.grid-template-masonry-value.enabled` -> `true`
    
    * Prevented including the space next to words when double-clicking/selecting text - *https://codeberg.org/celenity/Phoenix/issues/84* - `layout.word_select.eat_space_to_next_word` -> `false`
    
    * **DESKTOP**: Added Unified Search button [to easily switch search engines from the URL Bar](ttps://windowsreport.com/firefox-tests-dedicated-address-bar-button-for-easier-search-engine-switching/) - `browser.urlbar.scotchBonnet.enableOverride` -> `true`
    
    * **DESKTOP**: Disabled AI Chat `Link Preview` - `browser.ml.linkPreview.enabled` -> `false`
    
    * **DESKTOP**: Disabled tab hover previews by default - `browser.tabs.hoverPreview.enabled` & `browser.tabs.hoverPreview.showThumbnails` -> `false`
    
    * **DESKTOP**: Disabled annoying `Actions` URL Bar Shortcut by default - `browser.urlbar.shortcuts.actions` -> `false`
    
    * **DESKTOP**: Enabled Backup UI settings *(at `about:preferences#general`)* - `browser.backup.preferences.ui.enabled` -> `true`
    
    * **DESKTOP**: Exposed `browser.newtabpage.activity-stream.debug` via the `about:config` - `browser.newtabpage.activity-stream.debug` -> `false`
    
    * **DESKTOP**: Unlocked `toolkit.contentRelevancy.log`
    
    * Disabled timezone spoofing for [more Element instances](https://codeberg.org/celenity/Phoenix/commit/5b78c7ba676b07c06b6039073e0acb06b03277fe) by default
    
    * **DESKTOP**: Re-enabled spoofing WebGL render capability for `apple.com`, as Apple Maps no longer requires it
    
    * **SPECIALIZED CONFIGS**: Disabled [`BackupService`](https://searchfox.org/mozilla-central/source/browser/components/backup/content/debug.html) - `browser.backup.enabled` -> `false`
    
    * **SPECIALIZED CONFIGS**: Hid the Sidebar toolbar button by default - `browser.uiCustomization.state` -> `{\"placements\":{\"widget-overflow-fixed-list\":[],\"unified-extensions-area\":[\"_aecec67f-0d10-4fa7-b7c7-609a2db280cf_-browser-action\"],\"nav-bar\":[\"back-button\",\"forward-button\",\"vertical-spacer\",\"stop-reload-button\",\"urlbar-container\",\"_testpilot-containers-browser-action\",\"fxa-toolbar-menu-button\",\"reset-pbm-toolbar-button\",\"developer-button\",\"ublock0_raymondhill_net-browser-action\",\"_446900e4-71c2-419f-a6a7-df9c091e268b_-browser-action\",\"downloads-button\",\"unified-extensions-button\"],\"toolbar-menubar\":[\"menubar-items\"],\"TabsToolbar\":[\"tabbrowser-tabs\",\"new-tab-button\"],\"vertical-tabs\":[],\"PersonalToolbar\":[\"personal-bookmarks\"]},\"seen\":[\"reset-pbm-toolbar-button\",\"developer-button\",\"_testpilot-containers-browser-action\",\"ublock0_raymondhill_net-browser-action\",\"_446900e4-71c2-419f-a6a7-df9c091e268b_-browser-action\",\"_aecec67f-0d10-4fa7-b7c7-609a2db280cf_-browser-action\"],\"dirtyAreaCache\":[\"nav-bar\",\"vertical-tabs\",\"PersonalToolbar\",\"unified-extensions-area\",\"TabsToolbar\",\"toolbar-menubar\"],\"currentVersion\":21,\"newElementCount\":5}`
    
    * **APPLE MAPS**, **DISCORD**, & **ELEMENT** SPECIALIZED CONFIGS: Disabled [Cookie Banner Reduction](https://support.mozilla.org/kb/cookie-banner-reduction) - `cookiebanners.bannerClicking.enabled`, `cookiebanners.cookieInjector.enabled`, `cookiebanners.service.enableGlobalRules`, `cookiebanners.service.enableGlobalRules.subFrames`, & `cookiebanners.ui.desktop.enabled` -> `false`, `cookiebanners.service.mode` & `cookiebanners.service.mode.privateBrowsing` -> `0`
    
    * **APPLE MAPS** SPECIALIZED CONFIG: Disabled containers and hid Firefox Multi-Account Containers by default - `privacy.userContext.enabled` & `privacy.userContext.ui.enabled` -> `false`, `browser.uiCustomization.state` -> `{\"placements\":{\"widget-overflow-fixed-list\":[],\"unified-extensions-area\":[\"_testpilot-containers-browser-action\"],\"nav-bar\":[\"back-button\",\"forward-button\",\"vertical-spacer\",\"stop-reload-button\",\"urlbar-container\",\"fxa-toolbar-menu-button\",\"reset-pbm-toolbar-button\",\"developer-button\",\"ublock0_raymondhill_net-browser-action\",\"downloads-button\",\"unified-extensions-button\"],\"toolbar-menubar\":[\"menubar-items\"],\"TabsToolbar\":[\"tabbrowser-tabs\",\"new-tab-button\"],\"vertical-tabs\":[],\"PersonalToolbar\":[\"personal-bookmarks\"]},\"seen\":[\"reset-pbm-toolbar-button\",\"developer-button\",\"_testpilot-containers-browser-action\",\"ublock0_raymondhill_net-browser-action\"],\"dirtyAreaCache\":[\"nav-bar\",\"vertical-tabs\",\"PersonalToolbar\",\"unified-extensions-area\",\"TabsToolbar\",\"toolbar-menubar\"],\"currentVersion\":21,\"newElementCount\":4}`
    
    * Improved organization
    
    * Other minor tweaks & fixes
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.03.20.1...2025.03.25.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.03.20.1...2025.03.25.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.03.20.1...2025.03.25.1) for more details.
    ___
    
    :)
  • 2025.03.20.1
    c841aa47 · Build 2025.03.20.1 ·
    Release: 2025.03.20.1
    ____
    
    * Cleaned up and re-organized preferences...
    
    * Disabled [Basic authentication over HTTP](https://chromeenterprise.google/policies/#BasicAuthOverHttpEnabled) by default - `network.http.basic_http_auth.enabled` -> `false`
    
    * **DESKTOP**: Enabled + customized the new Sidebar by default - `sidebar.backupState` -> `{\"command\":\"\",\"launcherWidth\":0,\"launcherExpanded\":false,\"launcherVisible\":false}`, `sidebar.main.tools` -> `bookmarks,syncedtabs,history`, `sidebar.revamp` -> `true`, & `sidebar.visibility` -> `hide-sidebar`
    
    * **DESKTOP**: Enabled syncing for the **`sidebar.main.tools`** & **`sidebar.revamp`** preferences - `services.sync.prefs.sync.sidebar.main.tools` & `services.sync.prefs.sync.sidebar.revamp` -> `true`
    
    * DESKTOP - **WINDOWS**: Enabled [Taskbar Tabs](https://windowsreport.com/firefox-is-bringing-web-apps-to-windows-11-with-taskbar-tabs-first-look/) *(PWAs)* by default - currently only supported on **Nightly** - `browser.taskbarTabs.enabled` -> `true`
    
    * Added a FPP override for **`citybbq.com`** to fix display estimated delivery times - `privacy.fingerprintingProtection.granularOverrides` -> `{\"firstPartyDomain\": \"citybbq.com\", \"overrides\": \"-JSDateTimeUTC\"}`
    
    * **ANDROID**: Added a FPP override for **`jerseymikes.com`** to fix map display issues - `privacy.fingerprintingProtection.granularOverrides` -> `{\"firstPartyDomain\": \"jerseymikes.com\", \"overrides\": \"-CanvasExtractionBeforeUserInputIsBlocked,-CanvasImageExtractionPrompt\"}`
    
    * Other minor tweaks & fixes
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.03.12.1...2025.03.20.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.03.12.1...2025.03.20.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.03.12.1...2025.03.20.1) for more details.
    ___
    
    :)
  • 2025.03.12.1
    4338c1fa · Build 2025.03.12.1 ·
    Release: 2025.03.12.1
    ____
    
    * **DESKTOP**: Fixed clicking tiles on `about:home` - *https://codeberg.org/celenity/Phoenix/issues/80* - `browser.newtabpage.activity-stream.feeds.places` -> `true`
    
    * **DESKTOP**:  Fixed an issue for Firefox Sync users that use both Phoenix & standard Firefox that created an empty `Thought-provoking stories` section on the `about:home` that appeared on the standard Firefox instance - `services.sync.prefs.sync.browser.newtabpage.activity-stream.sectionOrder` -> `false`
    
    * Third party trackers are now excluded from TCP/dFPI [storage access heuristics](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning#storage_access_heuristics) by default - `privacy.restrict3rdpartystorage.heuristic.exclude_third_party_trackers` -> `true`
    
    * Added **[`Picky`](https://addons.mozilla.org/firefox/addon/ciuvo/)** to the extension blocklist, due to it tracking users and following poor privacy practices
    
    * **DESKTOP**: Removed [uBlock Origin settings](https://codeberg.org/celenity/Phoenix/commit/ef7e414584e1d325cc414893f5756f893f12d650) from policies, as setting them in this way prevents users from overriding the settings if desired. **We still set our own `assets.json`**, and we'll set these values again in the future once/if uBlock Origin adds support for configuring settings as **defaults** rather than *only* **enforcing** them
    
    * **DESKTOP**: Added [`HUGE AI Blocklist`](https://raw.githubusercontent.com/laylavish/uBlockOrigin-HUGE-AI-Blocklist/main/list.txt) & [`NUCLEAR AI Blocklist`](https://raw.githubusercontent.com/laylavish/uBlockOrigin-HUGE-AI-Blocklist/main/additional_list_nuclear.txt) to uBlock Origin *(under `Annoyances`)* - *https://codeberg.org/celenity/Phoenix/issues/71*
    
    * **DISCORD** & **ELEMENT** **SPECIALIZED CONFIGS**: Stopped blocking the notification permission prompt by default, as it might be useful for users - *https://codeberg.org/celenity/Phoenix/issues/77* - `permissions.default.desktop-notification` -> `0`
    
    * Other minor tweaks & fixes
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.03.05.1...2025.03.12.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.03.05.1...2025.03.12.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.03.05.1...2025.03.12.1) for more details.
    ___
    
    :)
  • 2025.03.05.1 Release: 2025.03.05.1
  • 2025.02.28.1 Release: 2025.02.28.1
    2025.02.28.1
    
    ⚠️ **ALL DESKTOP USERS ARE RECOMMENDED TO UPDATE TO THIS RELEASE ASAP**. This release mitigates [CVE-2025-27091](https://www.cve.org/CVERecord?id=CVE-2025-27091) *(high severity)* from Firefox upstream, [which Mozilla has not yet fixed]( https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2025-27091)...
    ____
    
    * Disabled OpenH264 to mitigate [CVE-2025-27091](https://www.cve.org/CVERecord?id=CVE-2025-27091), and due to [other security concerns](https://codeberg.org/celenity/Phoenix/commit/12f161dce776b313e611851492e3f79f6f143f69)... - `media.ffmpeg.allow-openh264`, `media.gmp-gmpopenh264.enabled`, `media.gmp-gmpopenh264.provider.enabled`, & `media.gmp-gmpopenh264.visible` -> `false`
    
    * Temporarily disabled [Download Spam Prevention](https://bugzilla.mozilla.org/show_bug.cgi?id=1731668) by default, as it's unfortunately still too buggy/experimental... - `browser.download.enable_spam_prevention` -> `false`
    
    * **DESKTOP**: Fixed a bug that prevented uBlock Origin's `assets.json` from updating after first set-up - **Note that you MUST reset uBlock Origin by navigating to Settings -> Reset to default settings... to receive the updated configuration**. You can back up your current settings using the **`Back up to file...`** option, and restore your settings after the reset is complete with the **`Restore from file...`** option. Apologies for any convenience, the fix here should help ensure this isn't a problem in the future...
    
    * **DESKTOP**: Disabled the ability for uBlock Origin's built-in filterlists to [use filters requiring trust](https://github.com/gorhill/uBlock/wiki/Dashboard:-My-filters#allow-custom-filters-requiring-trust), due to security concerns.
    
    * **DESKTOP**: Added new filterlists to uBlock Origin that allow the user to block **SVG**, **WebGL**, **WebGPU**, and **WebRTC** per-site. Users are **highly** recommended to use these filters *(with the exception of **WebGPU** - very few websites use it so we fully disable it via `dom.webgpu.enabled`, though this filter may prove useful for the future if WebGPU does become adopted...)*, and see if it suits them - due to the significant privacy & security advantages. **`Block SVG`** is located under **`Malware protection, security`**, while **`Block WebGL`** and **`Block WebRTC`** are located under **`Multipurpose`**. This is **especially** important for Phoenix **Extended** users, as it's likely we'll stop completely disabling WebGL *(`webgl.disabled`)* in the future, due to this list. - **Please report any breakage caused by these lists [here](https://codeberg.org/celenity/BadBlock/issues).**
    
    * Hardened extension CSP policies to disable WebAssembly *(without breaking Firefox Translations... ;))* & upgrade insecure network requests - https://codeberg.org/celenity/Phoenix/commit/58eca0f015c2beacc216182085ddcc37e0348064
    
    * Enabled [Add-on Distribution Control](https://groups.google.com/g/firefox-dev/c/U7GpHE4R-ZY) *(Install Origins)* by default - `extensions.install_origins.enabled` -> `true`
    
    * Enabled the [Sanitizer API](https://github.com/WICG/sanitizer-api) by default - `dom.security.sanitizer.enabled` -> `true`
    
    * Set Firefox to sync with [Remote Settings](https://remote-settings.readthedocs.io/) hourly, rather than once a day by default, as Remote Settings is used for various security-critical functionality *(Ex. CRLite/revocation checks, malicious add-on blocklists, etc)*, so we want to make sure users are up to date ASAP - `services.settings.poll_interval` -> `3600`
    
    * **DESKTOP**: The Firefox logo is now hidden on `about:home` by default - `browser.newtabpage.activity-stream.logowordmark.alwaysVisible` -> `false`
    
    * **SPECIALIZED CONFIGS**: Stopped automatically loading websites on browser launch - as uBlock Origin is unfortunately unable to filter on the profile's first launch
    
    * **SPECIALIZED CONFIGS**: The search bar is now hidden from `about:home` by default - `browser.newtabpage.activity-stream.showSearch` -> `false`
    
    * Other minor tweaks, fixes, & enhancements
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2024.02.21.1...2025.02.28.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenity/Phoenix/-/compare/2024.02.21.1...2025.02.28.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2024.02.21.1...2025.02.28.1) for more details.
    ___
    
    :)
  • 2025.02.21.1 Release: 2025.02.21.1
    2025.02.21.1
    
    ____
    
    * Re-enabled WebAssembly (WASM) for extensions *(when WASM is disabled)* to unbreak Firefox Translations - `javascript.options.wasm_trustedprincipals` -> `true` - https://codeberg.org/ironfox-oss/IronFox/issues/15
    
    * **DESKTOP**: Removed **Ecosia**, **Qwant**, and **Qwant Junior** as default search engines, due to privacy concerns
    
    * **DESKTOP** *(Flatpak)*: Added support for Phoenix `Extended` & specialized configs - *(See updated instructions [here](https://phoenix.celenity.dev#extended-installation) and [here](https://phoenix.celenity.dev#specialized-configs))*
    
    * **DESKTOP** *(macOS)*: Fixed an issue that prevented Phoenix `Extended` & specialized configs from being properly applied in certain cases
    
    * **DESKTOP**: Added specialized configs for **Apple Maps** & **Google Maps**
    
    * **SPECIALIZED CONFIGS**: Disabled PDF.js by default - `pdfjs.disabled` -> `true`
    
    * **SPECIALIZED CONFIGS**: Disabled tab hover previews by default - `browser.tabs.hoverPreview.enabled` & `browser.tabs.hoverPreview.showThumbnails` -> `false`
    
    * **SPECIALIZED CONFIGS**: Enabled cursor *(arrow key)* navigation by default - `accessibility.browsewithcaret` -> `true`
    
    * Enabled H264 hardware decoding by default - `media.webrtc.hw.h264.enabled` -> `true`
    
    * **DESKTOP** *(non-macOS)*: All preferences have been removed from `phoenix.cfg` & `policies.json` - now they are **all** configured exclusively by `phoenix-desktop.js` to improve organization & efficiency.
    
    * **DESKTOP** *(macOS)*: All preferences have been removed from policies - now they are **all** configured exclusively by `phoenix.cfg`,to improve organization & efficiency.
    
    * **DESKTOP**: Removed unnecessary entries from our built-in cookie blocklist to improve performance
    
    * Other minor tweaks, fixes, & enhancements
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2024.02.18.1...2025.02.21.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenity/Phoenix/-/compare/2024.02.18.1...2025.02.21.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2024.02.18.1...2025.02.21.1) for more details.
    ___
    
    :)
  • 2024.02.18.1 Release: 2025.02.18.1
    2024.02.18.1
    
    **Phoenix now officially supports Flatpaks! 🎉**. Simply install `phoenix-flatpak` rather than `phoenix` or `phoenix-arch` from your package manager. If you prefer, you can also just run the [installation script](https://phoenix.celenity.dev#install) - where Flatpaks have now also been added as an option after selecting your distribution.
    
    The only caveat is that your Firefox Flatpak **must** be installed on the **system** level. We unfortunately don't yet support **user** Flatpaks, but we're hoping to in the near future.
    
    Additionally, Phoenix for **macOS** has significantly improved - most notably: **you are now no longer required to give your Terminal the `App Management` permission to receive updates!**, resulting in a significant security improvement for your system.
    
    **NOTE:** To continue receiving updates, macOS users **must** run the migration script with the command below, depending on your location of Firefox:
    
    **System**:
    ```sh
    bash -c "$(wget -O- https://codeberg.org/celenity/Phoenix/raw/branch/pages/macos/migration/system.sh 2>/dev/null)"
    ```
    
    **User**:
    ```sh
    bash -c "$(wget -O- https://codeberg.org/celenity/Phoenix/raw/branch/pages/macos/migration/user.sh 2>/dev/null)"
    ```
    
    After running the migration script, macOS users must **also** run the new installation script:
    
    ```sh
    bash -c "$(wget -O- https://codeberg.org/celenity/Phoenix/raw/branch/pages/installer_scripts/macos_install.sh 2>/dev/null)"
    ```
    
    Apologies for any inconvenience caused here... but I hope this major security improvement and step forward for Phoenix will make up for it. ;)
    ____
    
    * Disabled [automatic updates for OpenSearch engines](https://developer.mozilla.org/docs/Web/XML/Guides/OpenSearch#supporting_automatic_updates_for_opensearch_plugins) by default due to security & privacy concerns - `browser.search.update` -> `false`
    
    * Disabled timezone spoofing *(`-JSDateTimeUTC`)* for `chipotle.com` to fix order confirmation/estimated arrival times by default
    
    * **DESKTOP**: Specified `type` for preferences configured in policies to ensure that they are always set correctly...
    
    * **DESKTOP**: Specified specific add-on IDs in links for extensions installed from the AMO in our recommendations and policies - *(Credit to [Brace](https://codeberg.org/divested/brace/commit/a3122affe756a610c737071342f5ad550ea0acfc))*
    
    * **SPECIALIZED CONFIGS**: Disabled geolocation, narrator, and tab groups by default - `browser.tabs.groups.enabled`, `geo.provider.use_corelocation`, `geo.provider.use_geoclue`, & `narrate.enabled` -> `false`, `geo.provider.network.url` -> ` `
    
    * Removed various *(mostly regional)* search engines with questionable privacy practices for ESR/Thunderbird *([Dove](https://dove.celenity.dev)* - https://codeberg.org/celenity/Phoenix/commit/fdb894425fc4ac5dcfd0fa284fe289ecd1980266
    
    * Organized and cleaned up more preferences...
    
    * Other minor tweaks, fixes, & adjustments
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.02.14.1...2024.02.18.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenity/Phoenix/-/compare/2025.02.14.1...2024.02.18.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.02.14.1...2024.02.18.1) for more details.
    ___
    
    :)
  • 2025.02.14.1 Release: 2025.02.14.1
    2025.02.14.1
    
    ____
    
    * **DESKTOP**: Disabled the Windows [Media Foundation Engine](https://learn.microsoft.com/windows/win32/medfound/about-the-media-foundation-sdk) for video playback, due to display issues encountered by some users *(notably on `www.youtube.com`)* - `media.wmf.media-engine.enabled` -> `0`
    
    * **DESKTOP**: Disabled sharing unnecessary version info as part of [Firefox Sync](https://support.mozilla.org/kb/sync) - `services.sync.sendVersionInfo` -> `false`
    
    * **DESKTOP**: Enabled [Tab Groups](https://www.ghacks.net/2024/12/03/how-to-enable-tab-groups-in-firefox/) by default - `browser.tabs.groups.enabled` -> `true`
    
    * Updated the default list of languages automatically translated with [Firefox Translation](https://support.mozilla.org/kb/website-translation) - `browser.translations.alwaysTranslateLanguages` -> `bg,ca,cs,da,de,el,en,es,et,fi,fr,hr,hu,id,it,ja,ko,lv,lt,nl,pl,pt,ro,ru,sk,sl,sr,sv,tr,uk,vi,zh-Hans`
    
    * **DESKTOP**: Disabled sidebar animations by default to improve Firefox's performance and responsiveness - `sidebar.animation.enabled` -> `false`
    
    * Removed various *(mostly regional)* search engines with questionable privacy practices for ESR/Thunderbird *([Dove](https://dove.celenity.dev)* - https://codeberg.org/celenity/Phoenix/commit/fdb894425fc4ac5dcfd0fa284fe289ecd1980266
    
    * Organized and cleaned up more preferences...
    
    * Other minor tweaks, fixes, & adjustments
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.02.13.1...2025.02.14.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenity/Phoenix/-/compare/2025.02.13.1...2025.02.14.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.02.13.1...2025.02.14.1) for more details.
    ___
    
    :)
  • 2025.02.13.1
    6034e8f9 · Fix Telemetry logging ·
    Release: 2025.02.13.1
    2025.02.13.1
    
    The major focus of this release has been boring, under the hood changes - with the goal to clean up Phoenix and remove unnecessary preferences/files/etc.
    ____
    
    * **DESKTOP**: Our [configuration of uBlock Origin](https://codeberg.org/celenity/Phoenix/wiki/Content-Blocking.md) has been tweaked to **significantly** improve performance and efficiency. Specifically, we disabled ` HaGeZi's Threat Intelligence Feeds` by default in favor of ` HaGeZi's Threat Intelligence Feeds - Mini`, disabled `HaGeZi - Multi PRO++` by default in favor of `HaGeZi - Multi ULTIMATE - Mini`, and disabled `Dandelion Sprout's Annoyances List` by default. Additionally, the `HaGeZi - Fake`, `HaGeZi - Multi PRO mini`, `HaGeZi - Multi PRO++ mini`, and `HaGeZi - Pop-up Ads` lists have been added to the built-in selection of filterlists, but are **not** enabled by default. **Note that you may need to reset uBlock Origin by navigating to `Settings` -> `Reset to default settings...` to receive the updated configuration**. You can back up your current settings using the **`Back up to file...`** option, and restore your settings after the reset is complete with the **`Restore from file...`** option
    
    * Firefox Sync has been configured to **not** sync any items by default, meaning nothing is synced without explicit user consent *(controlled via the checkboxes at `about:preferences#sync`)* - `services.sync.engine.addons`, `services.sync.engine.addresses`, `services.sync.engine.bookmarks`, `services.sync.engine.creditcards`, `services.sync.engine.history`, `services.sync.engine.passwords`, `services.sync.engine.prefs`, & `services.sync.engine.tabs` -> `false`
    
    * If Web Assembly (WASM) is disabled *(`javascript.options.wasm`)*, WASM is now *also* disabled for extensions - `javascript.options.wasm_trustedprincipals` -> `false`
    
    * Disabled adding downloads to `recent documents` by default - `browser.download.manager.addToRecentDocs` -> `false`
    
    * **DESKTOP**: Disabled certain UI animations by default to improve Firefox's performance and responsiveness - `ui.panelAnimations` & `ui.swipeAnimationEnabled` -> `0`, `ui.prefersReducedMotion` -> `1`
    
    * **DESKTOP**: Disabled [Windows Media Foundation](https://learn.microsoft.com/windows/win32/medfound/about-the-media-foundation-sdk) for protected content *(DRM)*, but also enabled it for standard content - `media.wmf.media-engine.enabled` -> `3`
    
    * Set `toolkit.telemetry.log.level`, `ui.hideCursorWhileTyping`, `ui.prefersReducedTransparency`, `ui.scrollToClick`, & `ui.useAccessibilityTheme` to their default values, so that they can be easily set in the `about:config`... - `toolkit.telemetry.loglevel` -> `Error`, `ui.prefersReducedTransparency` & `ui.useAccessibilityTheme` -> `0`, `ui.scrollToClick` -> `1`
    
    * **YOUTUBE SPECIALIZED CONFIG**: Disabled [Trusted Types](https://w3c.github.io/trusted-types/dist/spec/) by default [due to issues with Picture-in-Picture](https://bugzilla.mozilla.org/show_bug.cgi?id=1947672) - `dom.security.trusted_types.enabled` -> `false`
    
    * Various other tweaks, fixes, enhancements, and adjustments.
    ___
    
    Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.02.01.1...2025.02.13.1) for more details.
    
    GitLab: See [here](https://gitlab.com/celenity/Phoenix/-/compare/2025.02.01.1...2025.02.13.1) for more details.
    
    GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.02.01.1...2025.02.13.1) for more details.
    ___
    
    :)