Skip to content

Releases: celenityy/Phoenix

2025.08.06.1

07 Aug 04:06
3990d7f
Compare
Choose a tag to compare

Changes

  • Disabled WASM-Ion JIT instead of WASM-Baseline JIT by default. - (Details: 1)
  • Decreased the lifetime of certain content processes. - (Details: 1, 2)
  • Enabled the Integrity-Policy header by default. - (Details: 1)
  • Required resources loaded by MV2 extensions to be specified under web_accessible_resources in the extension's manifest by default. - (Details: 1)
  • Updated the list of quarantined/restricted domains. - (Details: 1)
  • Other minor tweaks, fixes, and adjustments.

Android-only

  • Blocked websites from prompting to access geolocation by default. - (Details: 1)
  • Blocked websites from prompting to display notifications by default. - (Details: 1)
  • Increased the number of processes to improve performance and security. - (Details: 1)
  • Prevented over-allocation of webCOOP+COEP processes, due to upstream setting an incorrect value for dom.ipc.processCount.webCOOP+COEP. - (Details: 1)
  • Updated the list of domains excluded from DNS over HTTPS by default. - (Details: 1, 2, 3, 4)

Desktop-only

  • Enabled a toggle to easily configure exceptions for Firefox Translations, located at about:preferences#general, which can be found by navigating to Languages -> Firefox Translations -> Exceptions.... - (Details: 1)

Codeberg: See here for more details.

GitLab: See here for more details.

GitHub: See here for more details.


:)

2025.07.30.1

30 Jul 06:04
5f4267c
Compare
Choose a tag to compare

  • Other minor tweaks, fixes, and adjustments.

Codeberg: See here for more details.

GitLab: See here for more details.

GitHub: See here for more details.


:)

2025.07.11.1

12 Jul 00:58
7354140
Compare
Choose a tag to compare

⚠️ IMPORTANT NOTE FOR MACOS INTEL USERS:

To ensure Phoenix continues to work properly, you must run the migration script with the following command in your terminal:

/bin/zsh -c "$(curl --cert-status --doh-cert-status --no-insecure --no-proxy-insecure --no-sessionid --no-ssl --no-ssl-allow-beast --no-ssl-auto-client-cert --no-ssl-no-revoke --no-ssl-revoke-best-effort --proto -all,https --proto-default https --proto-redir -all,https --show-error -sSL https://gitlab.com/celenityy/Phoenix/-/raw/pages/installer_scripts/macos_migrate.sh)"

Note that this ONLY impacts Intel macOS users.

Apologies for any inconvenience, and thank you for your time, patience, and support.



  • DESKTOP: Updated environment variables to disable ASan crash reporting and SSLKEYLOGGING. - APPLE SILICON USERS: Please expand this and see the attached note below!

    See details: https://codeberg.org/celenity/Phoenix/commit/e74226995f4defd0385ae4c92e4b1599c42b97f3

    NOTE: macOS (Apple Silicon) users must run the environment variable update script with the following command in your terminal to add the new environment updates:

    /bin/zsh -c "$(curl --cert-status --doh-cert-status --no-insecure --no-proxy-insecure --no-sessionid --no-ssl --no-ssl-allow-beast --no-ssl-auto-client-cert --no-ssl-no-revoke --no-ssl-revoke-best-effort --proto -all,https --proto-default https --proto-redir -all,https --show-error -sSL https://gitlab.com/celenityy/Phoenix/-/raw/pages/installer_scripts/macos_new_env.sh)"

    This is NOT necessary for macOS (Intel) users, as these are automatically added as part of the migration script.

  • DESKTOP: Updated built-in DoH resolvers.

    See details: https://codeberg.org/celenity/Phoenix/commit/ff290bb6a5bd6f9c490e83178762aff8847a4750

    doh-rollout.provider-list -> [{"uri":"https://dns.quad9.net/dns-query","UIName":"Quad9 🇨🇭","autoDefault":true},{"uri":"https://dns.adguard-dns.com/dns-query","UIName":"AdGuard 🇨🇾","autoDefault":false},{"uri":"https://unfiltered.adguard-dns.com/dns-query","UIName":"AdGuard (Unfiltered) 🇨🇾","autoDefault":false},{"uri":"https://mozilla.cloudflare-dns.com/dns-query","UIName":"Cloudflare 🇺🇸","autoDefault":false},{"uri":"https://security.cloudflare-dns.com/dns-query","UIName":"Cloudflare (Malware Protection) 🇺🇸","autoDefault":false},{"uri":"https://dns0.eu","UIName":"DNS0 🇫🇷","autoDefault":false},{"uri":"https://zero.dns0.eu","UIName":"DNS0 (ZERO) 🇫🇷","autoDefault":false},{"uri":"https://base.dns.mullvad.net/dns-query","UIName":"Mullvad (Base) 🇸🇪","autoDefault":false},{"uri":"https://dns.mullvad.net/dns-query","UIName":"Mullvad (Unfiltered) 🇸🇪","autoDefault":false},{"uri":"https://firefox.dns.nextdns.io/","UIName":"NextDNS 🇺🇸","autoDefault":false},{"uri":"https://wikimedia-dns.org/dns-query","UIName":"Wikimedia 🇺🇸","autoDefault":false}]

  • Prevented Firefox from adding random recently visited sites to shortcuts/pins on the browser homepage by default.

    See details: https://codeberg.org/celenity/Phoenix/commit/a453d2e3615df89fc20b196506d7e04c3c6be6e9

    places.frecency.bookmarkVisitBonus -> 0
    places.frecency.linkVisitBonus -> 0
    places.frecency.permRedirectVisitBonus -> 0
    places.frecency.redirectSourceVisitBonus -> 0
    places.frecency.tempRedirectVisitBonus -> 0
    places.frecency.typedVisitBonus -> 0
    places.frecency.unvisitedBookmarkBonus -> 0
    places.frecency.unvisitedTypedBonus -> 0

...

Read more

2025.06.24.1

24 Jun 09:59
be7a3ed
Compare
Choose a tag to compare

⚠️ IMPORTANT NOTE FOR DESKTOP USERS OF GECKO MEDIA PLUGINS (OpenH264, Widevine):

While we don't support the use of Gecko Media Plugins and the plug-in it provides (OpenH264, Widevine), for users who do use this functionality at their own discretion: To continue receiving updates to your installed plug-ins, you must set media.gmp-manager.updateEnabled to true in your about:config.



  • Removed unnecessary Safe Browsing prefs to avoid extra complexity and confusion.

    See details: https://codeberg.org/celenity/Phoenix/commit/c1e05f405abf34cec6c008e24749a9a25a377346

    browser.safebrowsing.features.blockedURIs.update
    browser.safebrowsing.features.consentmanager.annotate.update
    browser.safebrowsing.features.cryptomining.annotate.update
    browser.safebrowsing.features.cryptomining.update
    browser.safebrowsing.features.downloads.update
    browser.safebrowsing.features.emailtracking.update
    browser.safebrowsing.features.fingerprinting.annotate.update
    browser.safebrowsing.features.fingerprinting.update
    browser.safebrowsing.features.malware.update
    browser.safebrowsing.features.phishing.update
    browser.safebrowsing.features.socialtracking.annotate.update
    browser.safebrowsing.features.socialtracking.update
    browser.safebrowsing.features.trackingAnnotation.update
    browser.safebrowsing.features.trackingProtection.update
    browser.safebrowsing.provider.mozilla.updateURL

  • Switched to using the 'browser.safebrowsing.provider.google.lists' pref to disable the legacy (v2.2) Safe Browsing API, instead of 'browser.safebrowsing.provider.google.gethashURL' & 'browser.safebrowsing.provider.google.updateURL'.

    See details: https://codeberg.org/celenity/Phoenix/commit/a2b850709cd4da44da3d464d095e6376e35bfb7d + https://codeberg.org/celenity/Phoenix/commit/990c968e1e68b6d7e92c0c0c9127e63a03973fe2

    browser.safebrowsing.provider.google.gethashURL -> https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    browser.safebrowsing.provider.google.updateURL -> https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2&key=%GOOGLE_SAFEBROWSING_API_KEY%
    browser.safebrowsing.provider.google.lists -> disabled
    browser.safebrowsing.provider.google.lists.default -> goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,googpub-phish-shavar,goog-malware-shavar,goog-unwanted-shavar

  • Created a separate Safe Browsing provider for the IronFox proxy endpoint, and made it easier for users to switch between using the proxied vs. unproxied standard Google endpoint.

    See details: https://codeberg.org/celenity/Phoenix/commit/990c968e1e68b6d7e92c0c0c9127e63a03973fe2

    browser.safebrowsing.provider.google4.advisoryName -> Google Safe Browsing (Unproxied)
    browser.safebrowsing.provider.google4.gethashURL -> https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST
    browser.safebrowsing.provider.google4.lists -> disabled
    browser.safebrowsing.provider.google4.lists.default -> goog-badbinurl-proto,goog-downloadwhite-proto,goog-phish-proto,googpub-phish-proto,goog-malware-proto,goog-unwanted-proto,goog-harmful-proto
    browser.safebrowsing.provider.google4.updateURL -> https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST
    browser.safebrowsing.provider.ironfox.advisoryName -> Google Safe Browsing (Proxied by IronFox)
    browser.safebrowsing.provider.ironfox.advisoryURL -> https://developers.google.com/safe-browsing/v4/advisory
    browser.safebrowsing.provider.ironfox.dataSharing.enabled -> false
    browser.safebrowsing.provider.ironfox.dataSharingURL ->
    browser.safebrowsing.provider.ironfox.gethashURL -> https://safebrowsing.ironfoxoss.org/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST
    browser.safebrowsing.provider.ironfox.lists -> goog-badbinurl-proto,goog-downloadwhite-proto,goog-phish-proto,googpub-phish-proto,goog-malware-proto,goog-unwanted-proto,goog-harmful-proto
    browser.safebrowsing.provider.ironfox.nextupdatetime -> 1
    browser.safebrowsing.provider.ironfox.pver -> 4
    browser.safebrowsing.provider.ironfox.reportMalwareMistakeURL -> https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=
    browser.safebrowsing.provider.ironfox.reportPhishMistakeURL -> https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla&url=
    browser.safebrowsing.provider.ironfox.reportURL -> https://transparencyreport.google.com/safe-browsing/search?url=
    browser.safebrowsing.provider.ironfox.updateURL -> `https://safebrowsing.ironfoxoss.org/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=...

Read more

2025.06.12.1

13 Jun 01:14
46718a6
Compare
Choose a tag to compare

⚠️ THIS RELEASE IS ONLY FOR ANDROID USERS.

The latest version of Phoenix for other platforms (GNU/Linux, macOS, and Windows) is still 2025.06.10.1.



Codeberg: See here for more details.

GitLab: See here for more details.

GitHub: See here for more details.


:)

2025.06.10.1

11 Jun 03:12
899ae2a
Compare
Choose a tag to compare

  • Blocked cakepay.com from extracting (randomized) canvas data.

    See details: https://codeberg.org/celenity/Phoenix/commit/4bd2aae6b4af45c8fa7157d9b13c842cb886de4a

    non-Android: privacy.fingerprintingProtection.granularOverrides -> [{"firstPartyDomain":"cakepay.com","overrides":"+CanvasExtractionBeforeUserInputIsBlocked"}]
    Android: privacy.fingerprintingProtection.granularOverrides -> [{"firstPartyDomain":"cakepay.com","overrides":"+CanvasExtractionBeforeUserInputIsBlocked,+CanvasImageExtractionPrompt"}]


Codeberg: See here for more details.

GitLab: See here for more details.

GitHub: See here for more details.


:)

2025.06.06.1

06 Jun 05:55
1cd3b47
Compare
Choose a tag to compare

  • Prevented notifying websites if users switch focus/active windows by default.

    focusmanager.testmode -> true

  • Allowed users to exclude URLs from Enhanced Tracking Protection from the about:config.

    See details: https://codeberg.org/celenity/Phoenix/commit/606ad3cc3d733c179359d38b2be83f66dcbd0602

    urlclassifier.features.consentmanager.annotate.skipURLs ->
    urlclassifier.features.cryptomining.skipURLs ->
    urlclassifier.features.emailtracking.skipURLs ->
    urlclassifier.features.fingerprinting.skipURLs ->
    urlclassifier.features.socialtracking.skipURLs ->
    urlclassifier.trackingSkipURLs ->

  • Disabled timezone spoofing for Google domains in first party contexts by default to prevent CAPTCHAs.

    See details: https://codeberg.org/celenity/Phoenix/commit/ecce20e5b8dab1dba50d87d02f13f7ea1d8e973e

    NOTE: You can re-enable timezone spoofing for Google domains in first party contexts by setting privacy.fingerprintingProtection.granularOverrides in your about:config to:

    [{"firstPartyDomain":"google.ad","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ae","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.al","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.am","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.as","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.at","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.az","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ba","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.be","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.bf","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.bg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.bi","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.bj","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.bs","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.bt","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.by","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ca","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cat","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cd","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cf","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ch","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ci","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cl","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cn","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ao","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.bw","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ck","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.cr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.id","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.il","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.in","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.jp","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ke","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.kr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ls","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ma","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.mz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.nz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.th","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.tz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ug","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.uk","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.uz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.ve","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.vi","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.za","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.zm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.co.zw","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.af","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ag","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ar","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.au","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.bd","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.bh","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.bn","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.bo","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.br","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.bz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.co","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.cu","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.cy","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.do","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ec","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.eg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.et","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.fj","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.gh","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.gi","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.gt","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.hk","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.jm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.kh","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.kw","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.lb","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ly","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.mm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.mt","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.mx","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.my","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.na","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ng","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ni","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.np","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.om","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.pa","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.pe","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.pg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ph","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.pk","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.pr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.py","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.qa","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.sa","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.sb","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.sg","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.sl","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.sv","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.tj","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.tr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.tw","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.ua","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.uy","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.vc","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.com.vn","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cv","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.cz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.de","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.dj","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.dk","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.dm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.dz","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.ee","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.es","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.fi","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.fm","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"google.fr","overrides":"+JSDateTimeUTC"},{"firstPartyDomain":"go...
Read more

2025.06.02.2

02 Jun 21:31
fb1f785
Compare
Choose a tag to compare

⚠️ THIS RELEASE IS ONLY FOR WINDOWS USERS.

The latest version of Phoenix for other platforms (Android, GNU/Linux, and macOS) is still 2025.06.02.1.



Codeberg: See here for more details.

GitLab: See here for more details.

GitHub: See here for more details.


:)

2025.06.02.1

02 Jun 05:46
60c5248
Compare
Choose a tag to compare

⚠️ IMPORTANT NOTE FOR MACOS USERS:

This release changes Phoenix's approach on macOS to be far closer to our approach on other platforms, such as Linux - without compromising security. This comes at the cost of improved performance, allows for easier use of Extended/Phoenix's specialized configs, etc.

For Phoenix to continue working properly on your system in the future, you MUST migrate your installation. You can easily upgrade with the following script we created:

/bin/zsh -c "$(curl --cert-status --doh-cert-status --no-insecure --no-proxy-insecure --no-sessionid --no-ssl --no-ssl-allow-beast --no-ssl-auto-client-cert --no-ssl-no-revoke --no-ssl-revoke-best-effort --proto -all,https --proto-default https --proto-redir -all,https --show-error -sSL https://gitlab.com/celenityy/Phoenix/-/raw/pages/installer_scripts/macos_migrate.sh)"

We apologize for any inconvenience, and thank you for your time, patience, and support of the project.



  • Fixed an issue that prevented **add-ons** from syncing properly with Firefox Sync.

    extensions.getAddons.get.url -> https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
    services.sync.addons.trustedSourceHostnames -> addons.mozilla.org

  • Prevented automatically granting MV3 extensions optional host permissions by default.

    extensions.originControls.grantByDefault -> false

  • Enabled anti-spoof confirmation prompts.

    network.auth.confirmAuth.enabled -> true

  • Updated the built-in query stripping list with new additions from Brave.

    See details: https://codeberg.org/celenity/Phoenix/commit/ed69003fb8f0a015d3707e953fa8cb29977723e2

    privacy.query_stripping.strip_list -> __hsfp __hssc __hstc __s _bhlid _branch_match_id _branch_referrer _gl _hsenc _kx _openstat at_recipient_id at_recipient_list bbeml bsft_clkid bsft_uid dclid et_rid fb_action_ids fb_comment_id fbclid gbraid gclid guce_referrer guce_referrer_sig hsCtaTracking igshid irclickid mc_eid mkt_tok ml_subscriber ml_subscriber_hash msclkid mtm_cid oft_c oft_ck oft_d oft_id oft_ids oft_k oft_lk oft_sk oly_anon_id oly_enc_id pk_cid rb_clickid s_cid sc_customer sc_eh sc_uid srsltid ss_email_id twclid unicorn_click_id vero_conv vero_id vgo_ee wbraid wickedid yclid ymclid ysclid

Read more

2025.05.11.1

12 May 06:45
4dd8da2
Compare
Choose a tag to compare

  • Enabled tracking protection against CMPs (Cookie/consent managers) by default, in all browsing windows.

    privacy.trackingprotection.consentmanager.annotate_channels -> true
    privacy.trackingprotection.consentmanager.skip.enabled -> false
    privacy.trackingprotection.consentmanager.skip.pbmode.enabled -> false

  • Enabled an additional plug-in blocklist (mozplugin-block-digest256) from Mozilla (Like Nightly).

    urlclassifier.blockedTable -> moztest-block-simple,mozplugin-block-digest256

  • Disabled network connectivity status monitoring.

    See details: https://bugzilla.mozilla.org/show_bug.cgi?id=620472

    network.manage-offline-status -> false
    network.offline-mirrors-connectivity -> false

    DESKTOP (Red Hat/Fedora-specific):

    offline.autoDetect -> false
    toolkit.networkmanager.disable -> true

  • Instead of blocking all mixed display content unconditionally, we now only block mixed display content if it can't be upgraded to HTTPS.

    See details: mozilla/policy-templates#1141

    security.mixed_content.block_display_content -> false

  • Set proxy extensions (if installed) to start as soon as possible, instead of waiting for the first browser window to open.

    extensions.webextensions.early_background_wakeup_on_request -> true

  • Prevented HTTP/3 from being disabled if enterprise policies are configured.

    network.http.http3.disable_when_third_party_roots_found -> false

  • Limited/restricted CSP reporting as much as possible (We still block these requests by default with uBlock Origin).

    security.csp.reporting.limit.count -> 1
    security.csp.reporting.limit.timespan -> 999999999
    security.csp.reporting.script-sample.max-length -> 0
    security.csp.truncate_blocked_uri_for_frame_navigations -> true

  • DESKTOP: Set the browser to check for updates hourly (instead of the default of 6 hours in foreground and 7 hours in background).

    app.update.background.interval -> 3600
    app.update.interval -> 3600

  • DESKTOP: Set the browser to immediately prompt users when an update is ready, and ensured the binary is always old enough to check for updates.

    app.update.checkInstallTime.days -> 0
    app.update.promptWaitTime -> 0

  • DESKTOP: Enabled Code Integrity Guard (CIG) for pre-spawn (for Windows users).

    See details: mozilla/policy-templates#1141

    security.sandbox.cig.prespawn.enabled -> true

  • DESKTOP: Enabled Shadow Stacks (for Windows users).

    See details: https://wikipedia.org/wiki/Shadow_stack

    security.sandbox.content.shadow-stack.enabled -> true
    security.sandbox.gmp.shadow-stack.enabled -> true
    security.sandbox.gpu.shadow-stack.enabled -> true
    security.sandbox.rdd.shadow-stack.enabled -> true
    security.sandbox.socket.shadow-stack.enabled -> true

  • DESKTOP: Set the browser to always warn on unprivileged namespaces (for Linux users).

    security.sandbox.warn_unprivileged_namespaces -> true

  • Disabled various new telemetry pings.

    browser.engagement.ctrlTab.has-used -> true
    telemetry.glean.internal.finalInactive -> false
    telemetry.glean.internal.maxPingsPerMinute -> 0

    DESKTOP:

    browser.engagement.downloads-button.has-used -> true
    browser.engagement.fxa-toolbar-menu-button.has-used -> true
    browser.engagement.home-button.has-used -> true
    browser.engagement.library-button.has-used -> true
    browser.engagement.search_counts.pbm -> false
    browser.engagement.sidebar-button.has-used -> true
    browser.engagement.total_uri_count.pbm -> false
    browser.newtabpage.activity-stream.telemetry.privatePing.enabled -> false
    browser.newtabpage.activity-stream.telemetry.surfaceId ->
    browser.newtabpage.ping.enabled -> false

  • Disabled the automatic upload of profiler data (from 'about:logging') to Mozilla by default.

    toolkit.aboutLogging.uploadProfileToCloud -> false

  • Removed Mozilla's new OHTTP telemetry endpoints.

    DESKTOP:

    browser.newtabpage.activity-stream.discoverystream.ohttp.configURL ->
    browser.newtabpage.activity-stream.discoverystream.ohttp.relayURL ->

    ANDROID:

    network.ohttp.configURL ->
    network.ohttp.relayURL ->

  • Added placeholder IDs to certain (primarily telemetry-related) preferences, to reduce breakage and protect against potential fingerprinting.

    asanreporter.clientid -> unknown
    datareporting.dau.cachedUsageProfileGroupID -> b0bacafe-b0ba-cafe-b0ba-cafeb0bacafe

    DESKTOP:

    browser.contentblocking.cfr-milestone.milestone-shown-time -> 999999999
    browser.contextual-services.contextId -> {foo-123-foo}
    browser.startup.homepage_override.buildID -> 20181001000000

  • Cleaned up and removed more tracking parameters and unnecessary information (ex. locale) from various Mozilla links/URLs.

    app.support.baseURL -> https://support.mozilla.org/kb/
    extensions.abuseReport.amoFormURL -> https://addons.mozilla.org/feedback/addon/%addonID%/
    extensions.blocklist.addonItemURL -> https://addons.mozilla.org/blocked-addon/%addonID%/%addonVersion%/
    extensions.getAddons.get.url -> https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%
    `extensions.update.background.url...

Read more