Skip to content

Dashboard: Settings

Raymond Hill edited this page Oct 1, 2021 · 111 revisions

Figure 1

General

Make use of context menu where appropriate

If checked, this gives permission for uBlock to add items in the browser's context menu which are meant to improve convenience.


Color-blind friendly

Currently mostly useful for users who checked "I am an advanced user" (see below).


Enable cloud storage support

See Cloud storage documentation.


I am an advanced user

If you check this, this will enable uBlock's dynamic filtering, and the dynamic filtering pane will become available from uBlock's popup UI.

Unchecking this disables the dynamic filtering. And the dynamic filtering pane in the popup UI will no longer be available.

Advanced user mode also gives access to the advanced settings (normally hidden), and enables the ability to filter behind-the-scene network requests.

You should avoid playing with advanced features and settings unless you understand fully what you are doing.


Privacy

Disable pre-fetching

Checking this will disable prefetching in your browser. When prefetching is enabled, the browser can still establish connections to remote servers even if the resource from these remote servers are meant to be blocked by uBlock.

This prevents the browser from bypassing uBlock's filtering engine before establishing connections to remote servers.

Mozilla's "Link prefetching FAQ":

Privacy implications Along with the referral and URL-following implications already mentioned above, prefetching will generally cause the cookies of the prefetched site to be accessed.

Google's "Make webpages load faster":

If you turn this setting on in Chrome, websites (and any of their embedded resources) that are prerendered or prefetched may set and read their own cookies as if you had visited them before -- even if you don’t visit the prerendered or prefetched pages after all.

IMPORTANT NOTE:

On Chromium 51 and above (including browsers based on Chromium 51 and above), this setting is completely unreliable, as it does not cause DNS lookups, preconnections and prefetches to be reliably blocked, because Chromium allows web pages to override that user setting. For details, see:


Disable hyperlink auditing

Checking this will prevent hyperlink auditing. Hyperlink auditing is best summarized as "phone home" feature (or more accurately "phone anywhere") meant to inform one or more servers of which links you click on (and when). The details are well explained here and the case of why such feature is harmful to users is well argued here.


Prevent WebRTC from leaking local IP address

Option removed from desktop browsers in uBlock Origin v1.38.

Browsers now obfuscate LAN addresses by mDNS:

Option is still available in Android Firefox, because obfuscation is still not implemented there: "Support mDNS hostname obfuscation on Android"

Details

highlighted Prevent WebRTC from leaking local IP address preference

Background info: STUN IP Address requests for WebRTC

Test case: Prevent WebRTC from leaking local IP address

Keep in mind that this feature is to prevent leakage of your non-internet-facing IP adresses. The purpose of this feature is not to hide your current internet-facing IP address -- so be cautious to not misinterpret the results of the tests above. For example, if you use a VPN, your internet-facing IP address is that of the VPN, so your ISP-provided IP address should not be visible to outside world with this setting checked. However, if you are not behind any VPN or proxy, your ISP-provided IP address will be visible regardless of this setting.

Caveats:

  • Chromium-based browsers:
    • the feature works only on version 42 and above.
  • Firefox:
    • due to differences in handling of network connections by different browsers, before version 1.18.12 WebRTC was completely disabled if Firefox was not configured to use proxy. Related issue: #3009

Block CSP reports

Enabled by default in Firefox in 1.31.3rc1 to mitigate fingerprinting attempts described in LiCybora/NanoDefenderFirefox#196.

You can block network requests made as a result of your browser reporting Content Security Policy violations ("CSP reports") to a remote server (which can be 3rd-party to the site where the violation occurred).

Important: disabling CSP reporting is not something which will break web pages, the purpose of CSP reporting is strictly a development tool for web sites.

Consider this excerpt from Reporting API / Privacy Considerations (my emphasis):

8.6. Disabling Reporting

[...]

That said, it can’t be the case that this general benefit be allowed to take priority over the ability of a user to individually opt-out of such a system. Sending reports costs bandwidth, and potentially could reveal some small amount of additional information above and beyond what a website can obtain in-band ([NETWORK-ERROR-LOGGING], for instance). User agents MUST allow users to disable reporting with some reasonable amount of granularity in order to maintain the priority of constituencies espoused in [HTML-DESIGN-PRINCIPLES].

There is currently no way to easily toggle CSP reporting in either Chromium or Firefox. This per-site switch is to address this shortcoming.

Note that as opposed to all other network requests, behind-the-scene network requests which are actual CSP reports will also be filtered out according to this setting. So if you globally disable CSP reporting in uBO, this will also apply to behind-the-scene network requests.

Note that the blocking of CSP reports is implemented as a per-site switch internally in uBO, so this means that an advanced user could create rules in the My rules pane in the dashboard to allow a more granular control of the blocking of CSP reports. For example:

no-csp-reports: example.com false

The above rule means CSP reports would not be blocked on example.com when CSP reports are blocked globally. The reverse will also work:

no-csp-reports: example.com true

The above rule means CSP reports would be blocked on example.com when CSP reports are not blocked globally.


Uncloak canonical names

higlighted Uncloak canonical names preference

From uBO 1.34.0 and above. Before 1.34.0, this was an advanced setting since 1.25.0.

Enable/disable the uncloaking of canonical names -- enabled by default.

For background information see "What's CNAME of your game? This DNS-based tracking defies your browser privacy defenses".

The setting will be disabled on platforms not supporting this feature. It's currently supported only on Firefox.

In some edge cases, it might be necessary to disable this setting to prevent network-related issues. For example, "Pages load slowly when uBlock Origin is installed", which occurred when funneling network requests through a proxy.

Important note when using extension-based proxy service: Extension-based proxy services are often done on-the-fly through a browser API, and in such case uBO's own DNS queries to uncloak canonical names will NOT be caught and proxied by an extension-based proxy service. So you may want to disable this setting when using an extension-based proxy service.


Default behavior

Please see: "Per site switches"


Backup/restore section

buttons

The bottom-most section is for you to easily backup/restore/reset all settings in uBlock.

It's done by saving text file to location specified by your browser.

It is suggested you backup all your settings regularly.

Clone this wiki locally