Firefox to Beef Up Privacy with Tor Settings -

Firefox to Beef Up Privacy with Tor Settings

Douglas Crawford

Douglas Crawford

July 7, 2016

Using the Tor Browser is widely considered to be the most secure and anonymous way to surf the internet. This is, of course, largely due to the fact that the Tor Browser routes all its connections through the Tor network. Being a privacy-oriented piece of software, however, the Tor browser is also especially “hardened” to improve its security. The Tor Browser is a modified version of the open source Firefox browser by Mozilla, but many of  the Tor Browser’s additional privacy settings are not suitable for mainstream Firefox users, as they can “break” websites.

Mozilla, however, in clear acknowledgment of the privacy and security benefits that Tor Browser settings bring, has started to integrate some of the these features into its mainstream Firefox browser.

Firefox 50 Nightly

Firefox Nightly builds are experimental releases of the browser that allow fans to test new features before they are released as stable patches for mainstream users. Firefox 50 Nightly introduces the following features from the Tor Browser:

1. It blocks enumeration of plugins and MIME types

Websites can install scripts that ask for information such as a list of all installed fonts and plugins, supported data types (so-called MIME types), screen resolution, system colors and more. These are used to help fingerprint your browser. This is a technique that uses your browser’s attributes to uniquely identify you, and then track you as you surf the web.

By blocking requests for the plugins and MIME types used by your browser, Firefox will make fingerprinting it more difficult.

Firefox to Beef Up Privacy with Tor Settings

Without setting enabled

Panoptoclick results with setting

With this setting enabled.

I should note, though, that Panoptoclick still regards my browser fingerprint as being unique (one in 136,223, rather than the one in 136,184 it was before enabling the setting). Oh well. This may at least in part be due to the fact that Panoptoclick takes canvas fingerprinting into account while judging a browser’s uniqueness.

Because it is an experimental feature, this setting needs to be manually enabled. It does not exist by default, so you need to create it. To do this in Firefox 50 Nightly:

a. Open about:config.

b. Right-click anywhere in the about:config window -> New -> Boolean.

c. Enter privacy.resistFingerprinting as the preference name, and hit OK.

Fingerprinting 2
d. Select value = true, and hit OK.

privacy.resistFingerprinting2. It returns value of 0 for screen.orientation.angle, and “landscape-primary” for screen.orientation.type when requested by websites

Again, these are attributes used for browser fingerprinting.

3. It removes the “open with” option from the download dialog

Hands up! I’m not really sure why this is considered a vulnerability, but it is! To turn this feature on:

a. Open about:config (or stay on the page if it is already open) and search for .

b. Double-click anywhere on the parameter to change it to true.


Although the changes are fairly minor at present, it is great to see Firefox start to incorporate Tor Browser’s improved privacy settings into its mainstream offering. This is especially true as privacy is Firefox’s big advantage when compared to its commerce-led competition.

Although currently available only to Nightly users, we can expect these changes to appear in the stable build very soon. More Tor Browser patches are planned for future releases.

Douglas Crawford

I am a freelance writer, technology enthusiast, and lover of life who enjoys spinning words and sharing knowledge for a living. You can now follow me on Twitter - @douglasjcrawf.

4 responses to “Firefox to Beef Up Privacy with Tor Settings

  1. It should be the Safebrowsing cookie. If so, it is in its own “cookie jar”, i.e. it is not sent to Google when you visit their website, only when Safe browsing databases are updated (they are meant to protect people from malware, phishing and stuff).

    If you disable safebrowsing (not recommended unless you know what you are doing), that cookie should disappear.

  2. Like Firefox ,best for me and I do hope they keep it up. Even Firefox os wish they continue so devs compile customs ROMs for diff high end phones merge with ROMs which allow signature spoofing.
    One thing I hate about Firefox is the cookie from always runs at startup and I can’t seem to find ways to remove it cept for using self destruct cookie add-on.
    P.s I wish their marketplace apps can work on android just like installing play store or apks would be cool!!!

    1. AnonNoob

      Admittedly I haven’t noticed the Google cookie at startup, but then i always use Self-destructing cookies add-on.

Leave a Reply

Your email address will not be published. Required fields are marked *