gitlab celenityy/Phoenix 2025.06.24.1

latest releases: 2025.08.06.1, 2025.07.30.1, 2025.07.11.1...
2 months ago

⚠️ IMPORTANT NOTE FOR DESKTOP USERS OF GECKO MEDIA PLUGINS (OpenH264, Widevine):

While we don't support the use of Gecko Media Plugins and the plug-in it provides (OpenH264, Widevine), for users who do use this functionality at their own discretion: To continue receiving updates to your installed plug-ins, you must set media.gmp-manager.updateEnabled to true in your about:config.



  • Removed unnecessary Safe Browsing prefs to avoid extra complexity and confusion.

    See details: https://codeberg.org/celenity/Phoenix/commit/c1e05f405abf34cec6c008e24749a9a25a377346

    browser.safebrowsing.features.blockedURIs.update
    browser.safebrowsing.features.consentmanager.annotate.update
    browser.safebrowsing.features.cryptomining.annotate.update
    browser.safebrowsing.features.cryptomining.update
    browser.safebrowsing.features.downloads.update
    browser.safebrowsing.features.emailtracking.update
    browser.safebrowsing.features.fingerprinting.annotate.update
    browser.safebrowsing.features.fingerprinting.update
    browser.safebrowsing.features.malware.update
    browser.safebrowsing.features.phishing.update
    browser.safebrowsing.features.socialtracking.annotate.update
    browser.safebrowsing.features.socialtracking.update
    browser.safebrowsing.features.trackingAnnotation.update
    browser.safebrowsing.features.trackingProtection.update
    browser.safebrowsing.provider.mozilla.updateURL

  • Switched to using the 'browser.safebrowsing.provider.google.lists' pref to disable the legacy (v2.2) Safe Browsing API, instead of 'browser.safebrowsing.provider.google.gethashURL' & 'browser.safebrowsing.provider.google.updateURL'.

    See details: https://codeberg.org/celenity/Phoenix/commit/a2b850709cd4da44da3d464d095e6376e35bfb7d + https://codeberg.org/celenity/Phoenix/commit/990c968e1e68b6d7e92c0c0c9127e63a03973fe2

    browser.safebrowsing.provider.google.gethashURL -> https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    browser.safebrowsing.provider.google.updateURL -> https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2&key=%GOOGLE_SAFEBROWSING_API_KEY%
    browser.safebrowsing.provider.google.lists -> disabled
    browser.safebrowsing.provider.google.lists.default -> goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,googpub-phish-shavar,goog-malware-shavar,goog-unwanted-shavar

  • Created a separate Safe Browsing provider for the IronFox proxy endpoint, and made it easier for users to switch between using the proxied vs. unproxied standard Google endpoint.

    See details: https://codeberg.org/celenity/Phoenix/commit/990c968e1e68b6d7e92c0c0c9127e63a03973fe2

    browser.safebrowsing.provider.google4.advisoryName -> Google Safe Browsing (Unproxied)
    browser.safebrowsing.provider.google4.gethashURL -> https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST
    browser.safebrowsing.provider.google4.lists -> disabled
    browser.safebrowsing.provider.google4.lists.default -> goog-badbinurl-proto,goog-downloadwhite-proto,goog-phish-proto,googpub-phish-proto,goog-malware-proto,goog-unwanted-proto,goog-harmful-proto
    browser.safebrowsing.provider.google4.updateURL -> https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST
    browser.safebrowsing.provider.ironfox.advisoryName -> Google Safe Browsing (Proxied by IronFox)
    browser.safebrowsing.provider.ironfox.advisoryURL -> https://developers.google.com/safe-browsing/v4/advisory
    browser.safebrowsing.provider.ironfox.dataSharing.enabled -> false
    browser.safebrowsing.provider.ironfox.dataSharingURL ->
    browser.safebrowsing.provider.ironfox.gethashURL -> https://safebrowsing.ironfoxoss.org/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST
    browser.safebrowsing.provider.ironfox.lists -> goog-badbinurl-proto,goog-downloadwhite-proto,goog-phish-proto,googpub-phish-proto,goog-malware-proto,goog-unwanted-proto,goog-harmful-proto
    browser.safebrowsing.provider.ironfox.nextupdatetime -> 1
    browser.safebrowsing.provider.ironfox.pver -> 4
    browser.safebrowsing.provider.ironfox.reportMalwareMistakeURL -> https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=
    browser.safebrowsing.provider.ironfox.reportPhishMistakeURL -> https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=
    browser.safebrowsing.provider.ironfox.reportURL -> https://transparencyreport.google.com/safe-browsing/search?url=
    browser.safebrowsing.provider.ironfox.updateURL -> https://safebrowsing.ironfoxoss.org/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST

  • DESKTOP: Disabled Firefox Messaging System targeting information background updates.

    app.update.background.messaging.targeting.snapshot.intervalSec -> -1

  • DESKTOP: Added flags to indicate the jurisdiction of our built-in DoH resolvers.

    See details: https://codeberg.org/celenity/Phoenix/commit/3c7013a53aa6129cb625a03b92034194a80257cb

    doh-rollout.provider-list -> [{"uri":"https://dns.quad9.net/dns-query","UIName":"Quad9 - Real-time Malware Protection - 🇨🇭","autoDefault":true},{"uri":"https://zero.dns0.eu","UIName":"DNS0 (ZERO) - Hardened Real-time Malware Protection - 🇫🇷","autoDefault":false},{"uri":"https://dns0.eu","UIName":"DNS0 - Real-time Malware Protection - 🇫🇷","autoDefault":false},{"uri":"https://base.dns.mullvad.net/dns-query","UIName":"Mullvad (Base) - Ad/Tracking/Limited Malware Protection - 🇸🇪","autoDefault":false},{"uri":"https://dns.adguard-dns.com/dns-query","UIName":"AdGuard (Public) - Ad/Tracking Protection - 🇨🇾","autoDefault":false},{"uri":"https://dns.mullvad.net/dns-query","UIName":"Mullvad - Unfiltered - 🇸🇪","autoDefault":false},{"uri":"https://wikimedia-dns.org/dns-query","UIName":"Wikimedia - Unfiltered - 🇺🇸","autoDefault":false},{"uri":"https://firefox.dns.nextdns.io/","UIName":"NextDNS (Public) - Unfiltered - 🇺🇸","autoDefault":false},{"uri":"https://unfiltered.adguard-dns.com/dns-query","UIName":"AdGuard (Public) - Unfiltered - 🇨🇾","autoDefault":false},{"uri":"https://kids.dns0.eu","UIName":"DNS0 - Kids - 🇫🇷","autoDefault":false},{"uri":"https://family.dns.mullvad.net/dns-query","UIName":"Mullvad (Family) - 🇸🇪","autoDefault":false},{"uri":"https://family.adguard-dns.com/dns-query","UIName":"AdGuard (Public) - Family Protection - 🇨🇾","autoDefault":false},{"uri":"https://extended.dns.mullvad.net/dns-query","UIName":"Mullvad (Extended) - Ad/Tracking/Limited Malware/Social Media Protection - 🇸🇪","autoDefault":false},{"uri":"https://all.dns.mullvad.net/dns-query","UIName":"Mullvad (All) - Ad/Tracking/Limited Malware/Social Media/Adult/Gambling Protection - 🇸🇪","autoDefault":false},{"uri":"https://security.cloudflare-dns.com/dns-query","UIName":"Cloudflare - Malware Protection - 🇺🇸","autoDefault":false},{"uri":"https://mozilla.cloudflare-dns.com/dns-query","UIName":"Cloudflare - Unfiltered (Stricter privacy policy) - 🇺🇸","autoDefault":false},{"uri":"https://family.cloudflare-dns.com/dns-query","UIName":"Cloudflare - Adult Content/Malware Protection - 🇺🇸","autoDefault":false}]

  • SPECIALIZED CONFIGS: Hid various UI elements.

    See details: https://codeberg.org/celenity/Phoenix/commit/540b07e30b3d51fb310c19be5d85fac5bc759b4d + https://codeberg.org/celenity/Phoenix/commit/e70d2fe3bbb793c8b8e888fac8a3652ac0faebfd + https://codeberg.org/celenity/Phoenix/commit/5937a6482e1678762c39f3043dc8635379b2807d

    browser.newtabpage.activity-stream.system.showWeather -> false
    browser.search.widget.inNavBar -> false
    browser.tabs.groups.smart.enabled -> false
    browser.urlbar.addons.featureGate -> false
    browser.urlbar.contextualSearch.enabled -> false
    browser.urlbar.mdn.featureGate -> false
    browser.urlbar.quickactions.showPrefs -> false
    browser.urlbar.recentsearches.featureGate -> false
    browser.urlbar.scotchBonnet.disableOneOffs -> true
    browser.urlbar.scotchBonnet.enableOverride -> false
    browser.urlbar.searchModeSwitcher.featureGate -> false
    browser.urlbar.searchRestrictKeywords.featureGate -> false
    browser.urlbar.secondaryActions.featureGate -> false
    browser.urlbar.trending.featureGate -> false
    browser.urlbar.update2.engineAliasRefresh -> false
    browser.urlbar.weather.featureGate -> false
    browser.urlbar.wikipedia.featureGate -> false
    extensions.formautofill.addresses.supported -> off
    extensions.formautofill.creditCards.supported -> off
    signon.firefoxRelay.feature -> not available
    signon.generation.available -> false
    security.webauthn.show_ms_settings_link -> false

  • DESKTOP: Added a separate section for LibreWolf prefs, configured their allowed 'Remote Settings' collections to match what we use for IronFox, and enabled update checks when navigating to 'About LibreWolf' by default.

    See details: https://codeberg.org/celenity/Phoenix/commit/b9fb7582d1b770cd4c4442690dab6059a6d9a39c

    librewolf.aboutMenu.checkVersion -> true
    librewolf.services.settings.allowedCollections -> blocklists/addons,blocklists/addons-bloomfilters,blocklists/gfx,main/addons-manager-settings,main/anti-tracking-url-decoration,main/bounce-tracking-protection-exceptions,main/fingerprinting-protection-overrides,main/partitioning-exempt-urls,main/password-recipes,main/query-stripping,main/remote-permissions,main/tracking-protection-lists,main/third-party-cookie-blocking-exempt-urls,main/translations-models,main/translations-wasm,main/url-classifier-exceptions,main/url-classifier-skip-urls,main/url-parser-default-unknown-schemes-interventions,security-state/cert-revocations,security-state/ct-logs,security-state/intermediates,security-state/onecrl
    librewolf.services.settings.allowedCollectionsFromDump -> blocklists/addons,blocklists/addons-bloomfilters,blocklists/gfx,main/anti-tracking-url-decoration,main/cookie-banner-rules-list,main/moz-essential-domain-fallbacks,main/password-recipes,main/remote-permissions,main/translations-models,main/translations-wasm,main/url-classifier-skip-urls,main/url-parser-default-unknown-schemes-interventions,security-state/intermediates,security-state/onecrl

  • Various other tweaks and additions.
    ___

Codeberg: See here for more details.

GitLab: See here for more details.

GitHub: See here for more details.


:)

Don't miss a new Phoenix release

NewReleases is sending notifications on new releases.