I thought it would be helpful for all the good people of Lemmy World if we shared our browser setups.
I’m mostly a laptop user when it comes to the Internet. I’ve been using Firefox with the Ublock Origin addon and it makes browsing the web so much less ad filled.
For youtube specifically I’ve had the best results with Chrome and an extension called Clear Skies for ad skipping.
Share you own browser setup. What do you use to surf the wild waves of the web to avoid the sharks and the sharp rocks?
I call my secretary and she faxes me screenshots, she cuts out the ads.
Firefox with the Ublock Origin and Privacy Badger add-ons. I also run Adguard Home on my home network, which I think helps a bit.
This, plus Consent-o-matic. I run Diversion instead of AdBlock Home, though
Too bad there’s no Concent-o-matic for Firefox Android. I’ll definitely give it a try on desktop.
If you’re already using a whole second browser just for YouTube, may I suggest looking into FreeTube? It’s a great YouTube desktop client.
Just Firefox/Librewolf with uBlock Origin is enough. The more extensions you add, the larger the attack surface and chance of site breakage. A common mistake many do is to add multiple blockers on top of uBO which will decrease uBO’s ability to defuse various anti-adblocks. This also includes addons like Privacy Badger, Ghostery, DuckDuckGo Privacy Essentials, etc. uBO have good enough privacy protection enabled by default. If you want more, enable some other privacy filter lists. And if you know what you’re doing, enable hard mode by blocking all 3rd party requests and JavaScript.
If you want to feel more secure when adding more extensions to your browser, then only use Firefox addons that are recommended by Mozilla. Those extensions have gone through a review process to make sure they don’t contain anything malicious.
If you’re like me and don’t care about recommendations and being able to comment, then use Freetube with sponsorblock enabled.
NoScript is missing a lot here. Ublock doesnt really block much tracking, you need to break every site by default and then allow javascript only from trusted origins. This is the opposite of UBlocks badness enumeration, it is manual work and is waaaay more secure and private.
No Browser without noscript to block everything by default, manually allowing all trusted sites, is private. Ublock may allow this but the UI is too slow to use it generally
There only is a lack of a database or something to share such a config. I use it for years so my noscript list is quite big
Phone: firefox android with ublock origin, darkreader, privacy badger, ruffle, and search by image
Laptop: firefox linux with ublock origin, darkreader, privacy badger, ruffle, search by image, multi-account containers, and flagfoxI recommend Mull and Librewolf for the respective platforms. They are way more private.
Flagfox should not be used, it sends every site you visit to random servers of theirs, which is basically really invasive tracking.
This is the way
Firefox mobile works with Jerboa too for web containers
I didn’t think the account containers worked on mobile
Firefox
• Multi-Account Containers
• uBlock Origin
• NoScript
• Cookie AutoDelete
• Link Text and Location Copier
• DownThemAll!I also made multiple Firefox profiles and made desktop shortcuts to launch each profile using these switches:
-P ProfileName
-no-remoteAnd I’ve got ad-blocking enabled on my UniFi router. Probably set up a PiHole later this year.
On KDE you can create a desktop entry with actions so you can launch a profile using right click and the list, very cool
Desktop: Firefox + uBlock + SponsorBlock (for youtube) + Consent-O-Matic + Tampermonkey w/ YouTube HD script (force 1080p resolution)
Mobile: Fennec (Firefox fork) + uBlock + Consent-O-Matic, for youtube I’m using NewPipe with Sponsorblock
Daily Driver - Vivaldi with any applicable EFF plugins and custom settings aimed at security and privacy.
2nd Daily Driver (usually on a separate screen) - Firefox configured with any applicable EFF plugins and settings put at the most restrictive and forgetful to facilitate privacy and security.
Mobile - Literally the same as above to the extent i have the ability to ^^
Why would you have 2 daily drivers?
Tracking mostly. If i need to visit a site that i want to know the absolute minimum about me or my accounts, i use Firefox. Vivaldi is secured well, but I’m logged in to various accounts for convenience there. I have a 3 monitor set up so it’s easy to just have it open on a separate screen.
Just switch user agents
How do you mean?
A user agent is a string it sends the website you’re connecting to so it can know what rendering engine you have and which browser you use and so on. But, the dark side of user agents is that websites can use this to track you. So, if you don’t want them to do so you can change it either manually or by using a browser extension. I recommend you to make your user agent look like chrome’s, as this is the most popular browser and you will not be tracked as easily.
I don’t know… Sounds like I’d have to trust another extension to do the user agent stuff in the background… I’m sure that’s a solid solution for a lot of use cases, but i might just keep my method for now.
If the extension is FOSS then you can trust it.
Instead of forget everything I recommend to keep session and create cookie exceptions for selected sites. So you will stay logged in there and have a normally working browser, that is just as private
Good advice, but for how i have my workflow set up, it makes more sense for me to have it set on full amnesia. Vivaldi is what i use if i need persistence.
You can use profiles if you want different use cases. I dont think “increased attack surface” is the biggest problem, but you have 2 browsers that are both updated, take up RAM etc.
You could just use different Firefox profiles, using a custom desktop entry with actions and one action for every profile, example:
desktop entry
[Desktop Entry] Name=Firefox Comment=Web Browser GenericName=Web Browser Exec=firefox %u Type=Application Icon=firefox Categories=Network;WebBrowser; MimeType=text/html;text/xml;application/xhtml+xml;application/vnd.mozilla.xul+xml;application/rss+xml;application/rdf+xml;image/gif;image/jpeg;image/png;x-scheme-handler/http;x-scheme-handler/https; Actions=Private;Work;PrivateWindow;Insecure [Desktop Action Private] Name=Open Private Profile Exec=firefox -p private %u [Desktop Action Work] Name=Open Work Profile Exec=firefox -p work %u [Desktop Action PrivateWindow] Name=Open Private Window Exec=firefox -p private --private-window %u [Desktop Action Insecure] Name=Open Insecure Profile Exec=mullvad-exclude firefox -p insecure %u
This was so cool to find out, and in KDE (and likely other desktops) you can access those actions using right click.
You can also change such a workflow to do
launch app && rm -rf ~/appdirectory
which will enforce to always delete everything without needing to trust that app. I do that for the flatpak app “Decoder” which is great but wants to save a history without an opt-out, and as I use it for password sharing (generate a QR code locally on my phone)That’s pretty neat… I’ll look in to it. Than you for the info.
Mobile and Laptop: Brave
FF and uBO have been mentioned many times already, so I’ll say use encrypted DNS with blocking on your browser like Mullvad, Aha Blitz, or ControlD.
Librewolf/Firefox+Arkenfox
Addons:
- Ublock origin
- noscript (default to block everything, trusted still blocks “LAN, other, ping”
-
- fingerprint defender (multiple addons)
- add custom search engine
- temporary container, multi account containers
- dark background light text
- undo close tab
- simple tab groups
- offline qr code generator
- libredirect (updated version of privacy redirect)
Android: Mull with my custom Addon collection and mostly the same addons, Firefox Translate installed manually
Use Profiles for different setups, not different browsers.
firefox -p
. I have one seperated for Captive portals (doesnt enforce HTTPS) and Netflix (DRM, unhardened because Netflix sucks)On Linux Desktop, I generally use Librewolf (although I also use Vanilla Firefox and Ungoogled Chromium depending on the use case). I do also modify Librewolf a bit further in about:config, and have styled it to be much more minimal using userChrome.css.
Some of my favorite Extensions include:
- Alter
- ByPass Paywalls
- Chameleon
- Classic mode for Wikipedia
- Dark Reader
- NoScript
- OneTab
- StackOverflow/Exchange Prettifier
- uBlock Origin
- Vimium
I have others, but these are the ones that have been game changers. I also browse using DuckDuckGo Lite which cuts back on the distractions and loads fast. The use of DuckDuckGo Bangs also allows for very fast browsing and getting the info I need quickly.
On my Android phone, I use the Mull, Vanadium, and Vanilla Chromium browsers for various use cases, with Mull being the go to. There are a more limited set of extensions on Mull, but have managed to get it very similar, using uBlock, NoScript, DarkReader, DDG Lite, and have used this filter list with ublock to get pretty much the same effect as ByPass Paywalls.
Obviously, I generally have a very different experience browsing the web than most, and generally am not bombarded by ads as I also use Invidious, NewPipe, SponsorBlock, and yt-dlp (which has a sponsorblock flag btw) to grab any vids/music I want. Hope these resources help someone out.
A uBlock Origin filter is already enabled for bypassing paywalls in LibreWolf by default. So using ByPass Paywalls is mostly unnecesarry.
A 1970’s dumb terminal dialed up through an acoustic coupler to a mainframe running Lynx…
I have an iphone so, safari.
Laptop is waterfox w/Ublock, 1pass & darkreader.
Waterfox feels very fast & secure to me. I really like it for my laptop.
I’ll have to check out Waterfox. Looks great.
It IS great!
Safari with 1Blocker, Adblock Pro, AdGuard, Consent-o-matic, Ghostery, and Vinegar
Ghostery is extremely shady and should not be used. Also piling up adblockers is really bad, use one and that should be enough.
Look at badness enumeration to understand that reasoning.
What is shady about Ghostery?
https://en.m.wikipedia.org/wiki/Ghostery#Criticism
They tracked users by sending every domain to their servers even though using dumb badness enumeration (possible via a quickly updated local blocklist).