--- firefox-52.0esr.bak/browser/app/profile/firefox.js 2017-03-09 +++ firefox-52.0esr/browser/app/profile/firefox.js 2017-03-09 @@ -206,7 +206,7 @@ #endif // At startup, check if we're the default browser and prompt user if not. -pref("browser.shell.checkDefaultBrowser", true); +pref("browser.shell.checkDefaultBrowser", false); pref("browser.shell.shortcutFavicons",true); pref("browser.shell.mostRecentDateSetAsDefault", ""); #ifdef RELEASE_OR_BETA @@ -220,7 +220,7 @@ // 0 = blank, 1 = home (browser.startup.homepage), 2 = last visited page, 3 = resume previous browser session // The behavior of option 3 is detailed at: http://wiki.mozilla.org/Session_Restore -pref("browser.startup.page", 1); +pref("browser.startup.page", 0); pref("browser.startup.homepage", "chrome://branding/locale/browserconfig.properties"); // Whether we should skip the homepage when opening the first-run page pref("browser.startup.firstrunSkipsHomepage", false); @@ -294,7 +294,7 @@ pref("browser.urlbar.suggest.bookmark", true); pref("browser.urlbar.suggest.openpage", true); pref("browser.urlbar.suggest.searches", false); -pref("browser.urlbar.userMadeSearchSuggestionsChoice", false); +pref("browser.urlbar.userMadeSearchSuggestionsChoice", true); // 4 here means the suggestion notification will be automatically // hidden the 4th day, so it will actually be shown on 3 different days. pref("browser.urlbar.daysBeforeHidingSuggestionsPrompt", 4); @@ -344,7 +344,7 @@ pref("browser.download.animateNotifications", true); // This records whether or not the panel has been shown at least once. -pref("browser.download.panel.shown", false); +pref("browser.download.panel.shown", true); #ifndef XP_MACOSX pref("browser.helperApps.deleteTempFileOnExit", true); @@ -419,7 +419,7 @@ // Tabbed browser pref("browser.tabs.closeWindowWithLastTab", true); pref("browser.tabs.insertRelatedAfterCurrent", true); -pref("browser.tabs.warnOnClose", true); +pref("browser.tabs.warnOnClose", false); pref("browser.tabs.warnOnCloseOtherTabs", true); pref("browser.tabs.warnOnOpen", true); pref("browser.tabs.maxOpenBeforeWarn", 15); @@ -596,7 +596,7 @@ pref("browser.xul.error_pages.expert_bad_cert", false); // Enable captive portal detection. -pref("network.captive-portal-service.enabled", true); +pref("network.captive-portal-service.enabled", false); // If true, network link events will change the value of navigator.onLine pref("network.manage-offline-status", true); @@ -1155,7 +1155,7 @@ // Remembers if the about:newtab intro has been shown // NOTE: This preference is unused but was not removed in case // this information will be valuable in the future. -pref("browser.newtabpage.introShown", false); +pref("browser.newtabpage.introShown", true); // Toggles the content of 'about:newtab'. Shows the grid when enabled. pref("browser.newtabpage.enabled", true); --- firefox-52.0esr.bak/browser/branding/official/pref/firefox-branding.js 2017-03-09 +++ firefox-52.0esr/browser/branding/official/pref/firefox-branding.js 2017-03-09 @@ -3,8 +3,7 @@ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ pref("startup.homepage_override_url", ""); -pref("startup.homepage_welcome_url", "https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/firstrun/"); -pref("startup.homepage_welcome_url.additional", ""); +pref("startup.homepage_welcome_url", "about:blank"); // Interval: Time between checks for a new version (in seconds) pref("app.update.interval", 43200); // 12 hours // The time interval between the downloading of mar file chunks in the --- firefox-52.0esr.bak/build/application.ini 2017-03-09 +++ firefox-52.0esr/build/application.ini 2017-03-09 @@ -43,7 +43,7 @@ [XRE] #ifdef MOZ_PROFILE_MIGRATOR -EnableProfileMigrator=1 +EnableProfileMigrator=0 #endif #if MOZ_CRASHREPORTER --- firefox-52.0esr.bak/toolkit/components/telemetry/healthreport-prefs.js 2017-03-09 +++ firefox-52.0esr/toolkit/components/telemetry/healthreport-prefs.js 2017-03-09 @@ -5,6 +5,6 @@ pref("datareporting.healthreport.infoURL", "https://www.mozilla.org/legal/privacy/firefox.html#health-report"); // Health Report is enabled by default on all channels. -pref("datareporting.healthreport.uploadEnabled", true); +pref("datareporting.healthreport.uploadEnabled", false); pref("datareporting.healthreport.about.reportUrl", "https://fhr.cdn.mozilla.net/%LOCALE%/v4/"); --- firefox-52.0esr.bak/modules/libpref/init/all.js 2017-03-09 +++ firefox-52.0esr/modules/libpref/init/all.js 2017-03-09 @@ -29,7 +29,7 @@ pref("general.config.obscure_value", 13); // for MCD .cfg files -pref("general.warnOnAboutConfig", true); +pref("general.warnOnAboutConfig", false); // maximum number of dated backups to keep at any time pref("browser.bookmarks.max_backups", 5); @@ -1523,7 +1523,7 @@ // The maximum number of current global half open sockets allowable // when starting a new speculative connection. -pref("network.http.speculative-parallel-limit", 6); +pref("network.http.speculative-parallel-limit", 0); // Whether or not to block requests for non head js/css items (e.g. media) // while those elements load. @@ -1859,7 +1859,7 @@ pref("network.dir.format", 2); // enables the prefetch service (i.e., prefetching of URLs). -pref("network.prefetch-next", true); +pref("network.prefetch-next", false); // enables the predictive service pref("network.predictor.enabled", true); @@ -2179,7 +2179,7 @@ pref("services.settings.server", "https://firefox.settings.services.mozilla.com/v1"); // Blocklist preferences -pref("extensions.blocklist.enabled", true); +pref("extensions.blocklist.enabled", false); // OneCRL freshness checking depends on this value, so if you change it, // please also update security.onecrl.maximum_staleness_in_seconds. pref("extensions.blocklist.interval", 86400); @@ -3912,7 +3912,7 @@ // Middle-mouse handling pref("middlemouse.paste", true); -pref("middlemouse.contentLoadURL", true); +pref("middlemouse.contentLoadURL", false); pref("middlemouse.openNewWindow", true); pref("middlemouse.scrollbarPosition", true); @@ -3975,7 +3975,7 @@ // Middle-mouse handling pref("middlemouse.paste", true); -pref("middlemouse.contentLoadURL", true); +pref("middlemouse.contentLoadURL", false); pref("middlemouse.openNewWindow", true); pref("middlemouse.scrollbarPosition", true); @@ -4371,7 +4371,7 @@ // Satchel (Form Manager) prefs pref("browser.formfill.debug", false); -pref("browser.formfill.enable", true); +pref("browser.formfill.enable", false); pref("browser.formfill.expire_days", 180); pref("browser.formfill.saveHttpsForms", true); pref("browser.formfill.agedWeight", 2); @@ -5061,18 +5061,18 @@ pref("dom.mapped_arraybuffer.enabled", true); // The tables used for Safebrowsing phishing and malware checks. -pref("urlclassifier.malwareTable", "goog-malware-shavar,goog-unwanted-shavar,test-malware-simple,test-unwanted-simple"); +pref("urlclassifier.malwareTable", ""); #ifdef MOZILLA_OFFICIAL // In the official build, we are allowed to use google's private // phishing list "goog-phish-shavar". See Bug 1288840. -pref("urlclassifier.phishTable", "goog-phish-shavar,test-phish-simple"); +pref("urlclassifier.phishTable", ""); #else -pref("urlclassifier.phishTable", "googpub-phish-shavar,test-phish-simple"); +pref("urlclassifier.phishTable", ""); #endif // Tables for application reputation. -pref("urlclassifier.downloadBlockTable", "goog-badbinurl-shavar"); +pref("urlclassifier.downloadBlockTable", ""); #ifdef XP_WIN // Only download the whitelist on Windows, since the whitelist is @@ -5106,48 +5106,48 @@ pref("urlclassifier.alternate_error_page", "blocked"); // Enable phishing protection -pref("browser.safebrowsing.phishing.enabled", true); +pref("browser.safebrowsing.phishing.enabled", false); // Enable malware protection -pref("browser.safebrowsing.malware.enabled", true); +pref("browser.safebrowsing.malware.enabled", false); -pref("browser.safebrowsing.downloads.enabled", true); -pref("browser.safebrowsing.downloads.remote.enabled", true); +pref("browser.safebrowsing.downloads.enabled", false); +pref("browser.safebrowsing.downloads.remote.enabled", false); pref("browser.safebrowsing.downloads.remote.timeout_ms", 10000); -pref("browser.safebrowsing.downloads.remote.url", "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_API_KEY%"); -pref("browser.safebrowsing.downloads.remote.block_dangerous", true); -pref("browser.safebrowsing.downloads.remote.block_dangerous_host", true); -pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", true); -pref("browser.safebrowsing.downloads.remote.block_uncommon", true); +pref("browser.safebrowsing.downloads.remote.url", ""); +pref("browser.safebrowsing.downloads.remote.block_dangerous", false); +pref("browser.safebrowsing.downloads.remote.block_dangerous_host", false); +pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false); +pref("browser.safebrowsing.downloads.remote.block_uncommon", false); pref("browser.safebrowsing.debug", false); // The protocol version we communicate with google server. pref("browser.safebrowsing.provider.google.pver", "2.2"); -pref("browser.safebrowsing.provider.google.lists", "goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,googpub-phish-shavar,goog-malware-shavar,goog-unwanted-shavar"); -pref("browser.safebrowsing.provider.google.updateURL", "https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2&key=%GOOGLE_API_KEY%"); -pref("browser.safebrowsing.provider.google.gethashURL", "https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2"); -pref("browser.safebrowsing.provider.google.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site="); +pref("browser.safebrowsing.provider.google.lists", ""); +pref("browser.safebrowsing.provider.google.updateURL", ""); +pref("browser.safebrowsing.provider.google.gethashURL", ""); +pref("browser.safebrowsing.provider.google.reportURL", ""); // Prefs for v4. pref("browser.safebrowsing.provider.google4.pver", "4"); -pref("browser.safebrowsing.provider.google4.lists", "goog-phish-proto,googpub-phish-proto,goog-malware-proto,goog-unwanted-proto"); -pref("browser.safebrowsing.provider.google4.updateURL", "https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_API_KEY%"); -pref("browser.safebrowsing.provider.google4.gethashURL", "https://safebrowsing.googleapis.com/v4/fullHashes:find?$req=%REQUEST_BASE64%&$ct=application/x-protobuf&key=%GOOGLE_API_KEY%"); -pref("browser.safebrowsing.provider.google4.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site="); - -pref("browser.safebrowsing.reportPhishMistakeURL", "https://%LOCALE%.phish-error.mozilla.com/?hl=%LOCALE%&url="); -pref("browser.safebrowsing.reportPhishURL", "https://%LOCALE%.phish-report.mozilla.com/?hl=%LOCALE%&url="); -pref("browser.safebrowsing.reportMalwareMistakeURL", "https://%LOCALE%.malware-error.mozilla.com/?hl=%LOCALE%&url="); +pref("browser.safebrowsing.provider.google4.lists", ""); +pref("browser.safebrowsing.provider.google4.updateURL", ""); +pref("browser.safebrowsing.provider.google4.gethashURL", ""); +pref("browser.safebrowsing.provider.google4.reportURL", ""); + +pref("browser.safebrowsing.reportPhishMistakeURL", ""); +pref("browser.safebrowsing.reportPhishURL", ""); +pref("browser.safebrowsing.reportMalwareMistakeURL", ""); // The table and global pref for blocking plugin content -pref("browser.safebrowsing.blockedURIs.enabled", true); +pref("browser.safebrowsing.blockedURIs.enabled", false); pref("urlclassifier.blockedTable", "test-block-simple,mozplugin-block-digest256"); // The protocol version we communicate with mozilla server. pref("browser.safebrowsing.provider.mozilla.pver", "2.2"); -pref("browser.safebrowsing.provider.mozilla.lists", "base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256"); -pref("browser.safebrowsing.provider.mozilla.updateURL", "https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2"); -pref("browser.safebrowsing.provider.mozilla.gethashURL", "https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2"); +pref("browser.safebrowsing.provider.mozilla.lists", ""); +pref("browser.safebrowsing.provider.mozilla.updateURL", ""); +pref("browser.safebrowsing.provider.mozilla.gethashURL", ""); // Set to a date in the past to force immediate download in new profiles. pref("browser.safebrowsing.provider.mozilla.nextupdatetime", "1"); // Block lists for tracking protection. The name values will be used as the keys