Files
I2P_in_Private_Browsing_Mod…/privacy.js

376 lines
9.1 KiB
JavaScript
Raw Normal View History

2019-06-29 01:43:16 -04:00
function getChrome() {
2019-10-06 15:18:10 -04:00
if (chrome.runtime.getBrowserInfo == undefined) {
return true;
}
return false;
2019-06-29 01:43:16 -04:00
}
2019-05-02 17:31:11 -04:00
function onSet(result) {
2019-10-06 15:18:10 -04:00
if (result) {
console.log("->: Value was updated");
} else {
console.log("-X: Value was not updated");
}
2019-05-02 17:31:11 -04:00
}
// This disables queries to centralized databases of bad URLs to screen for
// risky sites in your browser
function disableHyperlinkAuditing() {
2019-10-06 15:18:10 -04:00
if (!getChrome()) {
var setting = browser.privacy.websites.hyperlinkAuditingEnabled.set({
value: false
});
console.log("Disabling hyperlink auditing/val=", {
value: false
});
setting.then(onSet);
}
2019-05-02 17:31:11 -04:00
}
// This enables first-party isolation
function enableFirstPartyIsolation() {
2019-10-06 15:18:10 -04:00
if (!getChrome()) {
var setting = browser.privacy.websites.firstPartyIsolate.set({
value: true
});
console.log("Enabling first party isolation/val=", {
value: true
});
setting.then(onSet);
}
2019-05-02 17:31:11 -04:00
}
// This rejects tracking cookies and third-party cookies but it
// LEAVES "Persistent" Cookies unmodified in favor of an option in the content
// interface for now
function disableEvilCookies() {
2019-10-06 15:18:10 -04:00
if (!getChrome()) {
var getting = browser.privacy.websites.cookieConfig.get({});
getting.then(got => {
var setting = browser.privacy.websites.cookieConfig.set({
value: {
behavior: "reject_third_party",
nonPersistentCookies: got.value.nonPersistentCookies
}
});
console.log("Setting cookie behavior/val=", {
value: {
behavior: "reject_third_party",
nonPersistentCookies: got.value.nonPersistentCookies
}
});
setting.then(onSet);
});
}
2019-05-02 17:31:11 -04:00
}
// Make sure that they're gone
/*function disableBadCookies(){
var setting = browser.privacy.websites.thirdPartyCookiesAllowed.set({
value: false
});
console.log("Disabling third party cookies/val=", {
value: false
})
setting.then(onSet);
}*/
// this disables the use of referrer headers
function disableReferrers() {
2019-10-06 15:18:10 -04:00
if (!getChrome()) {
var setting = browser.privacy.websites.referrersEnabled.set({
value: false
});
console.log("Disabling referrer headers/val=", {
value: false
});
setting.then(onSet);
}
2019-05-02 17:31:11 -04:00
}
// enable fingerprinting resistent features(letterboxing and stuff)
function enableResistFingerprinting() {
2019-10-06 15:18:10 -04:00
if (!getChrome()) {
var setting = browser.privacy.websites.referrersEnabled.set({
value: true
});
console.log("Enabling resist fingerprinting/val=", {
value: true
});
setting.then(onSet);
}
2019-05-02 17:31:11 -04:00
}
// This is essentially a blocklist of clearnet web-sites known to do bad tracking
function enableTrackingProtection() {
2019-10-06 15:18:10 -04:00
if (!getChrome()) {
var setting = browser.privacy.websites.trackingProtectionMode.set({
value: "always"
});
console.log("Enabling tracking protection/val=", {
value: "always"
});
setting.then(onSet);
}
2019-05-02 17:31:11 -04:00
}
// This disables protected content, which is a form of digital restrictions
// management dependent on identifying information
function disableDigitalRestrictionsManagement() {
2019-10-06 15:18:10 -04:00
if (!getChrome()) {
var gettingInfo = browser.runtime.getPlatformInfo();
gettingInfo.then(got => {
if (got.os == "win") {
var setting = browser.privacy.websites.protectedContentEnabled.set({
value: false
});
2019-10-06 15:18:10 -04:00
console.log(
"Setting Protected Content(Digital Restrictions Management) false/val=",
{
value: false
}
);
setting.then(onSet);
}
});
}
2019-05-02 17:31:11 -04:00
}
function setAllPrivacy() {
2019-10-06 15:18:10 -04:00
disableHyperlinkAuditing();
enableFirstPartyIsolation();
disableEvilCookies();
disableReferrers();
enableTrackingProtection();
enableResistFingerprinting();
disableDigitalRestrictionsManagement();
2019-05-02 17:31:11 -04:00
}
2019-10-06 15:18:10 -04:00
setAllPrivacy();
2019-05-02 17:31:11 -04:00
function ResetPeerConnection() {
2019-10-06 15:18:10 -04:00
if (!getChrome()) {
browser.privacy.network.peerConnectionEnabled.set({
value: false
});
2019-10-06 15:18:10 -04:00
browser.privacy.network.networkPredictionEnabled.set({
value: false
});
}
chrome.privacy.network.webRTCIPHandlingPolicy.set({
value: "disable_non_proxied_udp"
});
console.log("Re-disabled WebRTC");
2019-05-02 17:31:11 -04:00
}
function EnablePeerConnection() {
2019-10-06 15:18:10 -04:00
if (!getChrome()) {
browser.privacy.network.peerConnectionEnabled.set({
value: true
});
browser.privacy.network.networkPredictionEnabled.set({
value: false
});
2019-10-06 15:18:10 -04:00
}
chrome.privacy.network.webRTCIPHandlingPolicy.set({
value: "disable_non_proxied_udp"
});
console.log("Enabled WebRTC");
2019-05-02 17:31:11 -04:00
}
2019-10-06 15:18:10 -04:00
ResetPeerConnection();
2019-05-02 17:31:11 -04:00
function ResetDisableSavePasswords() {
2019-10-06 15:18:10 -04:00
browser.privacy.services.passwordSavingEnabled.set({
value: false
});
console.log("Re-disabled saved passwords");
2019-05-02 17:31:11 -04:00
}
function EnableSavePasswords() {
2019-10-06 15:18:10 -04:00
browser.privacy.services.passwordSavingEnabled.set({
value: true
});
console.log("Enabled saved passwords");
2019-05-02 17:31:11 -04:00
}
//ResetDisableSavePasswords()
var defaultSettings = {
2019-10-06 15:18:10 -04:00
since: "forever",
dataTypes: ["downloads", "passwords", "formData", "localStorage", "history"]
2019-05-02 17:31:11 -04:00
};
var appSettings = {
2019-10-06 15:18:10 -04:00
since: "forever",
dataTypes: [""]
2019-05-02 17:31:11 -04:00
};
function onError(e) {
2019-10-06 15:18:10 -04:00
console.error(e);
2019-05-02 17:31:11 -04:00
}
function checkStoredSettings(storedSettings) {
2019-10-06 15:18:10 -04:00
chrome.storage.local.set(appSettings);
2019-05-02 17:31:11 -04:00
}
if (!getChrome()) {
2019-10-06 15:18:10 -04:00
const gettingStoredSettings = browser.storage.local.get();
gettingStoredSettings.then(checkStoredSettings, onError);
2019-06-29 01:43:16 -04:00
}
2019-05-02 17:31:11 -04:00
function clearCookiesContext(cookieStoreId) {}
2019-05-02 17:31:11 -04:00
function forgetBrowsingData(storedSettings) {
2019-10-06 15:18:10 -04:00
function getSince(selectedSince) {
if (selectedSince === "forever") {
return 0;
2019-05-02 17:31:11 -04:00
}
2019-10-06 15:18:10 -04:00
const times = {
hour: () => {
return 1000 * 60 * 60;
},
day: () => {
return 1000 * 60 * 60 * 24;
},
week: () => {
return 1000 * 60 * 60 * 24 * 7;
}
};
const sinceMilliseconds = times[selectedSince].call();
return Date.now() - sinceMilliseconds;
}
function getTypes(selectedTypes) {
let dataTypes = {};
for (let item of selectedTypes) {
dataTypes[item] = true;
2019-05-02 17:31:11 -04:00
}
2019-10-06 15:18:10 -04:00
return dataTypes;
}
const since = getSince(defaultSettings.since);
const dataTypes = getTypes(defaultSettings.dataTypes);
function notify() {
let dataTypesString = Object.keys(dataTypes).join(", ");
let sinceString = new Date(since).toLocaleString();
browser.notifications.create({
type: "basic",
title: "Removed browsing data",
message: `Removed ${dataTypesString}\n for i2pbrowser`
2019-10-06 15:18:10 -04:00
});
}
2019-05-02 17:31:11 -04:00
function deepCleanHistory(historyItems) {
console.log("Deep cleaning history");
for (item of historyItems) {
if (i2pHost(item.url)) {
browser.history.deleteUrl({
url: item.url
});
browser.browsingData.removeCache({});
console.log("cleared Cache");
browser.browsingData
.removePasswords({
hostnames: [i2pHostName(item.url)],
since: since
})
.then(onGot);
console.log("cleared Passwords");
browser.browsingData
.removeDownloads({
hostnames: [i2pHostName(item.url)],
since: since
})
.then(onGot);
console.log("cleared Downloads");
browser.browsingData
.removeFormData({
hostnames: [i2pHostName(item.url)],
since: since
})
.then(onGot);
console.log("cleared Form Data");
browser.browsingData
.removeLocalStorage({
hostnames: [i2pHostName(item.url)],
since: since
})
.then(onGot);
console.log("cleared Local Storage");
contexts = browser.contextualIdentities.query({
name: "i2pbrowser"
});
function deepCleanCookies(cookies) {
for (cookie of cookies) {
var removing = browser.cookies.remove({
firstPartyDomain: cookie.firstPartyDomain,
name: cookie.name,
url: item.url
});
removing.then(onGot, onError);
}
2019-10-16 17:29:21 -04:00
console.log("Cleared cookies")
}
function deepCleanContext(cookieStoreIds) {
for (cookieStoreId of cookieStoreIds) {
var removing = browser.cookies.getAll({
firstPartyDomain: null,
storeId: cookieStoreId.cookieStoreId
});
removing.then(deepCleanCookies, onError);
}
}
contexts.then(deepCleanContext, onError);
}
}
notify();
}
var searching = browser.history.search({
text: "i2p",
startTime: 0
});
searching.then(deepCleanHistory);
2019-06-29 00:32:03 -04:00
2019-10-06 15:18:10 -04:00
setAllPrivacy();
ResetPeerConnection();
2019-05-02 17:31:11 -04:00
}
2019-07-10 02:29:38 -04:00
function i2pHostName(url) {
let hostname = "";
if (url.indexOf("://") > -1) {
hostname = url.split("/")[2];
} else {
hostname = url.split("/")[0];
}
return hostname;
}
function i2pHost(url) {
let hostname = i2pHostName(url);
return hostname.endsWith(".i2p");
}
2019-07-10 02:29:38 -04:00
function onGot(contexts) {
if (contexts != null) {
for (let context of contexts) {
console.log(context);
}
2019-10-06 15:18:10 -04:00
}
2019-07-10 02:29:38 -04:00
}
function onError(e) {
2019-10-06 15:18:10 -04:00
console.error(e);
2019-07-10 02:29:38 -04:00
}
//browser.contextualIdentities.query("i2pbrowser").then(clearCookiesContext, onError);