Date: Thu, 2 Jun 2022 17:22:49 -0700 From: Robert Montano <irontree043111@gmail.com> To: Glen Barber <gjb@freebsd.org> Cc: Mark Millard <marklmi@yahoo.com>, "Wall, Stephen" <stephen.wall@redcom.com>, "freebsd-arm@FreeBSD.org" <freebsd-arm@freebsd.org> Subject: Re: FreeBSD build hardware? Message-ID: <CABzjivf8b7cfUZ=LOXRKsUFhAttrr8_zn_BYEv2tdV9oqvWr8g@mail.gmail.com> In-Reply-To: <CABzjive7SHjqe=2f4FDn9iGLp_ny3%2BtYRORdeGFZ1wr8f5u3Wg@mail.gmail.com> References: <MN2PR09MB466771CE27C1C6D134B6ABB1EEDE9@MN2PR09MB4667.namprd09.prod.outlook.com> <20220602230000.GL30607@FreeBSD.org> <A9455293-CF80-425E-8B56-D2FCF9433BC5@yahoo.com> <20220603000428.GM30607@FreeBSD.org> <CABzjive7SHjqe=2f4FDn9iGLp_ny3%2BtYRORdeGFZ1wr8f5u3Wg@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--000000000000161fa405e080207e Content-Type: text/plain; charset="UTF-8" This is what I get when I try to do anything basically.......,....... # Overrides for Extension Preferences # Tor Browser Bundle # Do not edit this file. # # This file is modified from a file included in the Tor Browser Bundle. # # Copyright 2017 The Tor Project. See LICENSE.tor for licensing information. # HTTPS Everywhere Preferences: user_pref("extensions.https_everywhere._observatory.popup_shown", true); user_pref("extensions.https_everywhere.toolbar_hint_shown", true); # NoScript Preferences: # In order to disable all scripts by default, uncomment the following line... # user_pref("capability.policy.maonoscript.javascript.enabled", "noAccess"); # and comment out the following line user_pref("capability.policy.maonoscript.javascript.enabled", "allAccess"); user_pref("capability.policy.maonoscript.sites", "[System+Principal] about: about:tbupdate about:tor chrome: resource: blob: mediasource: moz-extension: moz-safe-about: about:neterror about:certerror about:feeds about:tabcrashed about:cache"); user_pref("noscript.default", "[System+Principal] about: about:tbupdate about:tor chrome: resource: blob: mediasource: moz-extension: moz-safe-about: about:neterror about:certerror about:feeds about:tabcrashed about:cache"); user_pref("noscript.mandatory", "[System+Principal] about: about:tbupdate about:tor chrome: resource: blob: mediasource: moz-extension: moz-safe-about: about:neterror about:certerror about:feeds about:tabcrashed about:cache"); user_pref("noscript.ABE.enabled", false); user_pref("noscript.ABE.notify", false); user_pref("noscript.ABE.wanIpAsLocal", false); user_pref("noscript.confirmUnblock", false); user_pref("noscript.contentBlocker", true); user_pref("noscript.firstRunRedirection", false); user_pref("noscript.global", true); user_pref("noscript.gtemp", ""); user_pref("noscript.opacizeObject", 3); user_pref("noscript.forbidWebGL", true); user_pref("noscript.forbidFonts", true); user_pref("noscript.options.tabSelectedIndexes", "5,0,0"); user_pref("noscript.policynames", ""); user_pref("noscript.secureCookies", true); user_pref("noscript.showAllowPage", false); user_pref("noscript.showBaseDomain", false); user_pref("noscript.showDistrust", false); user_pref("noscript.showRecentlyBlocked", false); user_pref("noscript.showTemp", false); user_pref("noscript.showTempToPerm", false); user_pref("noscript.showUntrusted", false); user_pref("noscript.STS.enabled", false); user_pref("noscript.subscription.lastCheck", -142148139); user_pref("noscript.temp", ""); user_pref("noscript.untrusted", ""); user_pref("noscript.forbidMedia", true); user_pref("noscript.allowWhitelistUpdates", false); user_pref("noscript.fixLinks", false); // Now handled by plugins.click_to_play // Not in this one. user_pref("noscript.forbidFlash", true); user_pref("noscript.forbidSilverlight", true); user_pref("noscript.forbidJava", true); user_pref("noscript.forbidPlugins", true); // Usability tweaks user_pref("noscript.showPermanent", false); user_pref("noscript.showTempAllowPage", true); user_pref("noscript.showRevokeTemp", true); user_pref("noscript.notify", false); user_pref("noscript.autoReload", true); user_pref("noscript.autoReload.allTabs", false); user_pref("noscript.cascadePermissions", true); user_pref("noscript.restrictSubdocScripting", true); user_pref("noscript.showVolatilePrivatePermissionsToggle", false); user_pref("noscript.volatilePrivatePermissions", true); user_pref("noscript.clearClick", 0); user_pref("intl.locale.matchOS", false); user_pref("extensions.https_everywhere._observatory.enabled", false); user_pref("extensions.https_everywhere.options.autoUpdateRulesets", false); user_pref("extensions.https_everywhere.globalEnabled", false); user_pref("extensions.https_everywhere._observatory.submit_during_tor", false); user_pref("extensions.https_everywhere._observatory.submit_during_nontor", false); user_pref("extensions.https_everywhere._observatory.use_custom_proxy", true); user_pref("extensions.https_everywhere._observatory.proxy_host", "127.0.0.1"); user_pref("extensions.https_everywhere._observatory.proxy_port", 4444); user_pref("extensions.torbutton.use_nontor_proxy", true); user_pref("extensions.torlauncher.start_tor", false); user_pref("extensions.torlauncher.prompt_at_startup", false); //user_pref("", false); //For socket conversion: in the future, I'll need to make TBB communicate with //i2p over a unix socket. Fortunately, this is how you do that. It will be //configurable in a similar way to the host:port configuration when that happens. //user_pref("extensions.torlauncher.socks_port_use_ipc", ); //user_pref("extensions.torlauncher.socks_ipc_path", ""); //user_pref("extensions.torlauncher.start_tor", false); //user_pref("extensions.torlauncher.default_bridge_type", ""); //user_pref("extensions.torlauncher.prompt_at_startup", false); // Resist-fingerprinting and first-party isolation enable user_pref("privacy.resistFingerprinting", true); user_pref("privacy.firstparty.isolate", true); // Use i2p http proxy for all connections and set homepage to safe local form. // DON'T allow access to the admin panel from the profile we browse i2p with. user_pref("network.proxy.no_proxies_on", ""); user_pref("network.proxy.type", 1); user_pref("network.proxy.http", "127.0.0.1"); user_pref("network.proxy.http_port", 4444); user_pref("network.proxy.ssl", "127.0.0.1"); user_pref("network.proxy.ssl_port", 4444); user_pref("network.proxy.ftp", "127.0.0.1"); user_pref("network.proxy.ftp_port", 4444); user_pref("network.proxy.socks", "127.0.0.1"); user_pref("network.proxy.socks_port", 4444); user_pref("network.proxy.share_proxy_settings", true); user_pref("network.proxy.socks_remote_dns", true); user_pref("browser.startup.homepage", "about:blank"); // Privacy-harden and disable irrelevant features. user_pref("app.normandy.api_url", ""); user_pref("app.normandy.enabled", false); user_pref("app.update.auto", false); user_pref("app.update.enabled", false); user_pref("beacon.enabled", false); user_pref("browser.aboutHomeSnippets.updateUrl", ""); user_pref("browser.cache.disk_cache_ssl", false); user_pref("browser.cache.disk.enable", false); user_pref("browser.cache.offline.enable", false); user_pref("browser.disableResetPrompt", true); user_pref("browser.display.use_document_fonts", 0); user_pref("browser.fixup.alternate.enabled", false); user_pref("browser.formfill.enable", false); user_pref("browser.library.activity-stream.enabled", false); user_pref("browser.newtabpage.activity-stream.disableSnippets", true); user_pref("browser.newtabpage.activity-stream.enabled", false); user_pref("browser.newtabpage.activity-stream.feeds.section.highlights", false); user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false); user_pref("browser.newtabpage.activity-stream.feeds.topsites", false); user_pref("browser.newtabpage.activity-stream.prerender", false); user_pref("browser.newtabpage.activity-stream.showSearch", false); user_pref("browser.newtabpage.enhanced", false); user_pref("browser.newtabpage.introShown", true); user_pref("browser.newtab.preload", false); user_pref("browser.onboarding.enabled", false); user_pref("browser.pagethumbnails.capturing_disabled", true); user_pref("browser.safebrowsing.appRepURL", ""); user_pref("browser.safebrowsing.blockedURIs.enabled", false); user_pref("browser.safebrowsing.downloads.enabled", false); user_pref("browser.safebrowsing.downloads.remote.enabled", false); user_pref("browser.safebrowsing.downloads.remote.url", ""); user_pref("browser.safebrowsing.enabled", false); user_pref("browser.safebrowsing.malware.enabled", false); user_pref("browser.safebrowsing.phishing.enabled", false); user_pref("browser.search.geoip.timeout", 1); user_pref("browser.search.suggest.enabled", false); user_pref("browser.selfsupport.url", ""); user_pref("browser.send_pings", false); user_pref("browser.shell.checkDefaultBrowser", false); user_pref("browser.startup.homepage_override.mstone", "ignore"); user_pref("browser.startup.page", 0); user_pref("browser.toolbarbuttons.introduced.pocket-button", true); user_pref("browser.urlbar.speculativeConnect.enabled", false); user_pref("browser.urlbar.trimURLs", false); user_pref("datareporting.healthreport.uploadEnabled", false); user_pref("datareporting.policy.dataSubmissionEnabled", false); user_pref("dom.battery.enabled", false); user_pref("dom.enable_performance", false); user_pref("dom.enable_performance_navigation_timing", false); user_pref("dom.enable_resource_timing", false); user_pref("dom.event.clipboardevents.enabled", false); user_pref("dom.gamepad.enabled", false); user_pref("dom.indexedDB.enabled", false); user_pref("dom.min_timeout_value", 400); user_pref("dom.push.connection.enabled", false); user_pref("dom.push.enabled", false); user_pref("dom.serviceWorkers.enabled", false); user_pref("dom.serviceWorkers.interception.enabled", false); user_pref("dom.storage.enabled", false); user_pref("dom.webaudio.enabled", false); user_pref("extensions.autoDisableScopes", 14); user_pref("extensions.getAddons.cache.enabled", false); user_pref("extensions.getAddons.showPane", false); user_pref("extensions.pocket.enabled", false); user_pref("extensions.screenshots.disabled", true); user_pref("extensions.webservice.discoverURL", ""); user_pref("geo.enabled", false); user_pref("geo.wifi.uri", ""); user_pref("gfx.downloadable_fonts.disable_cache", true); user_pref("javascript.options.shared_memory", false); user_pref("layout.css.visited_links_enabled", false); user_pref("media.autoplay.enabled", false); user_pref("media.cache_size", 0); user_pref("media.navigator.enabled", false); user_pref("media.peerconnection.enabled", false); user_pref("media.video_stats.enabled", false); user_pref("captivedetect.canonicalURL", ""); user_pref("network.captive-portal-service.enabled", false); user_pref("network.cookie.cookieBehavior", 1); user_pref("network.cookie.lifetimePolicy", 2); user_pref("network.dns.disablePrefetch", true); user_pref("network.http.referer.spoofSource", true); user_pref("network.http.referer.trimmingPolicy", 2); user_pref("network.http.referer.XOriginPolicy", 2); user_pref("network.prefetch-next", false); user_pref("privacy.donottrackheader.enabled", true); user_pref("privacy.donottrackheader.value", 1); user_pref("toolkit.telemetry.archive.enabled", false); user_pref("toolkit.telemetry.coverage.opt-out", true); user_pref("toolkit.telemetry.enabled", false); user_pref("toolkit.telemetry.server", ""); user_pref("toolkit.telemetry.unified", false); user_pref("webgl.disabled", true); user_pref("browser.chrome.errorReporter.infoURL", ""); user_pref("breakpad.reportURL", ""); user_pref("browser.newtabpage.activity-stream.default.sites", ""); //user_pref("browser.newtabpage.activity-stream.default.sites", " http://planet.i2p/,http://legwork.i2p/,http://i2pwiki.i2p/,http://i2pforums.i2p/,http://zzz.i2p/ "); On Thu, Jun 2, 2022, 5:07 PM Robert Montano <irontree043111@gmail.com> wrote: > Glen this software was side loaded on my phone without permission. I'm not > sure if arch program is default or added because arm 64 wasn't there in the > beginning that I could see. It's like a entity has control of my phone with > google software and Apache also > > On Thu, Jun 2, 2022, 5:04 PM Glen Barber <gjb@freebsd.org> wrote: > >> On Thu, Jun 02, 2022 at 04:10:23PM -0700, Mark Millard wrote: >> > On 2022-Jun-2, at 16:00, Glen Barber <gjb@FreeBSD.org> wrote: >> > >> > > On Thu, Jun 02, 2022 at 09:04:28PM +0000, Wall, Stephen wrote: >> > >> Does anyone know what hardware FreeBSD is using to build the ARM >> releases of FreeBSD 13? >> > >> >> > > >> > > They are cross-built on amd64 hardware. >> > > >> > >> > It was unclear to me if the original question was trying >> > to span aarch64 as well vs., say, just spanning armv7/armv6. >> > >> > aarch64 may well have a different answer. >> > >> >> No. All architectures are built on amd64 hardware. >> >> Glen >> >> --000000000000161fa405e080207e Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable <div dir=3D"auto">This is what I get when I try to do anything basically...= ....,.......<div dir=3D"auto"># Overrides for Extension Preferences<div dir= =3D"auto"># Tor Browser Bundle</div><div dir=3D"auto"># Do not edit this fi= le.</div><div dir=3D"auto">#</div><div dir=3D"auto"># This file is modified= from a file included in the Tor Browser Bundle.</div><div dir=3D"auto">#</= div><div dir=3D"auto"># Copyright 2017 The Tor Project.=C2=A0 See LICENSE.t= or for licensing information.</div><div dir=3D"auto"><br></div><div dir=3D"= auto"># HTTPS Everywhere Preferences:</div><div dir=3D"auto">user_pref(&quo= t;extensions.https_everywhere._observatory.popup_shown", true);</div><= div dir=3D"auto">user_pref("extensions.https_everywhere.toolbar_hint_s= hown", true);</div><div dir=3D"auto"><br></div><div dir=3D"auto"># NoS= cript Preferences:</div><div dir=3D"auto"># In order to disable all scripts= by default, uncomment the following line...</div><div dir=3D"auto"># user_= pref("capability.policy.maonoscript.javascript.enabled", "no= Access");</div><div dir=3D"auto"># and comment out the following line<= /div><div dir=3D"auto">user_pref("capability.policy.maonoscript.javasc= ript.enabled", "allAccess");</div><div dir=3D"auto">user_pre= f("capability.policy.maonoscript.sites", "[System+Principal]= about: about:tbupdate about:tor chrome: resource: blob: mediasource: moz-e= xtension: moz-safe-about: about:neterror about:certerror about:feeds about:= tabcrashed about:cache");</div><div dir=3D"auto">user_pref("noscr= ipt.default", "[System+Principal] about: about:tbupdate about:tor= chrome: resource: blob: mediasource: moz-extension: moz-safe-about: about:= neterror about:certerror about:feeds about:tabcrashed about:cache");</= div><div dir=3D"auto">user_pref("noscript.mandatory", "[Syst= em+Principal] about: about:tbupdate about:tor chrome: resource: blob: media= source: moz-extension: moz-safe-about: about:neterror about:certerror about= :feeds about:tabcrashed about:cache");</div><div dir=3D"auto">user_pre= f("noscript.ABE.enabled", false);</div><div dir=3D"auto">user_pre= f("noscript.ABE.notify", false);</div><div dir=3D"auto">user_pref= ("noscript.ABE.wanIpAsLocal", false);</div><div dir=3D"auto">user= _pref("noscript.confirmUnblock", false);</div><div dir=3D"auto">u= ser_pref("noscript.contentBlocker", true);</div><div dir=3D"auto"= >user_pref("noscript.firstRunRedirection", false);</div><div dir= =3D"auto">user_pref("noscript.global", true);</div><div dir=3D"au= to">user_pref("noscript.gtemp", "");</div><div dir=3D"a= uto">user_pref("noscript.opacizeObject", 3);</div><div dir=3D"aut= o">user_pref("noscript.forbidWebGL", true);</div><div dir=3D"auto= ">user_pref("noscript.forbidFonts", true);</div><div dir=3D"auto"= >user_pref("noscript.options.tabSelectedIndexes", "5,0,0&quo= t;);</div><div dir=3D"auto">user_pref("noscript.policynames", &qu= ot;");</div><div dir=3D"auto">user_pref("noscript.secureCookies&q= uot;, true);</div><div dir=3D"auto">user_pref("noscript.showAllowPage&= quot;, false);</div><div dir=3D"auto">user_pref("noscript.showBaseDoma= in", false);</div><div dir=3D"auto">user_pref("noscript.showDistr= ust", false);</div><div dir=3D"auto">user_pref("noscript.showRece= ntlyBlocked", false);</div><div dir=3D"auto">user_pref("noscript.= showTemp", false);</div><div dir=3D"auto">user_pref("noscript.sho= wTempToPerm", false);</div><div dir=3D"auto">user_pref("noscript.= showUntrusted", false);</div><div dir=3D"auto">user_pref("noscrip= t.STS.enabled", false);</div><div dir=3D"auto">user_pref("noscrip= t.subscription.lastCheck", -142148139);</div><div dir=3D"auto">user_pr= ef("noscript.temp", "");</div><div dir=3D"auto">user_pr= ef("noscript.untrusted", "");</div><div dir=3D"auto">us= er_pref("noscript.forbidMedia", true);</div><div dir=3D"auto">use= r_pref("noscript.allowWhitelistUpdates", false);</div><div dir=3D= "auto">user_pref("noscript.fixLinks", false);</div><div dir=3D"au= to">// Now handled by plugins.click_to_play // Not in this one.</div><div d= ir=3D"auto">user_pref("noscript.forbidFlash", true);</div><div di= r=3D"auto">user_pref("noscript.forbidSilverlight", true);</div><d= iv dir=3D"auto">user_pref("noscript.forbidJava", true);</div><div= dir=3D"auto">user_pref("noscript.forbidPlugins", true);</div><di= v dir=3D"auto">// Usability tweaks</div><div dir=3D"auto">user_pref("n= oscript.showPermanent", false);</div><div dir=3D"auto">user_pref("= ;noscript.showTempAllowPage", true);</div><div dir=3D"auto">user_pref(= "noscript.showRevokeTemp", true);</div><div dir=3D"auto">user_pre= f("noscript.notify", false);</div><div dir=3D"auto">user_pref(&qu= ot;noscript.autoReload", true);</div><div dir=3D"auto">user_pref("= ;noscript.autoReload.allTabs", false);</div><div dir=3D"auto">user_pre= f("noscript.cascadePermissions", true);</div><div dir=3D"auto">us= er_pref("noscript.restrictSubdocScripting", true);</div><div dir= =3D"auto">user_pref("noscript.showVolatilePrivatePermissionsToggle&quo= t;, false);</div><div dir=3D"auto">user_pref("noscript.volatilePrivate= Permissions", true);</div><div dir=3D"auto">user_pref("noscript.c= learClick", 0);</div><div dir=3D"auto"><br></div><div dir=3D"auto">use= r_pref("intl.locale.matchOS", false);</div><div dir=3D"auto"><br>= </div><div dir=3D"auto">user_pref("extensions.https_everywhere._observ= atory.enabled", false);</div><div dir=3D"auto">user_pref("extensi= ons.https_everywhere.options.autoUpdateRulesets", false);</div><div di= r=3D"auto">user_pref("extensions.https_everywhere.globalEnabled",= false);</div><div dir=3D"auto">user_pref("extensions.https_everywhere= ._observatory.submit_during_tor", false);</div><div dir=3D"auto">user_= pref("extensions.https_everywhere._observatory.submit_during_nontor&qu= ot;, false);</div><div dir=3D"auto">user_pref("extensions.https_everyw= here._observatory.use_custom_proxy", true);</div><div dir=3D"auto">use= r_pref("extensions.https_everywhere._observatory.proxy_host", &qu= ot;127.0.0.1");</div><div dir=3D"auto">user_pref("extensions.http= s_everywhere._observatory.proxy_port", 4444);</div><div dir=3D"auto"><= br></div><div dir=3D"auto">user_pref("extensions.torbutton.use_nontor_= proxy", true);</div><div dir=3D"auto">user_pref("extensions.torla= uncher.start_tor", false);</div><div dir=3D"auto">user_pref("exte= nsions.torlauncher.prompt_at_startup", false);</div><div dir=3D"auto">= //user_pref("", false);</div><div dir=3D"auto"><br></div><div dir= =3D"auto"><br></div><div dir=3D"auto">//For socket conversion: in the futur= e, I'll need to make TBB communicate with</div><div dir=3D"auto">//i2p = over a unix socket. Fortunately, this is how you do that. It will be</div><= div dir=3D"auto">//configurable in a similar way to the host:port configura= tion when that happens.</div><div dir=3D"auto">//user_pref("extensions= .torlauncher.socks_port_use_ipc", );</div><div dir=3D"auto">//user_pre= f("extensions.torlauncher.socks_ipc_path", "");</div><d= iv dir=3D"auto"><br></div><div dir=3D"auto">//user_pref("extensions.to= rlauncher.start_tor", false);</div><div dir=3D"auto">//user_pref("= ;extensions.torlauncher.default_bridge_type", "");</div><div= dir=3D"auto">//user_pref("extensions.torlauncher.prompt_at_startup&qu= ot;, false);</div><div dir=3D"auto"><br></div><div dir=3D"auto">// Resist-f= ingerprinting and first-party isolation enable</div><div dir=3D"auto"><br><= /div><div dir=3D"auto">user_pref("privacy.resistFingerprinting", = true);</div><div dir=3D"auto">user_pref("privacy.firstparty.isolate&qu= ot;, true);</div><div dir=3D"auto"><br></div><div dir=3D"auto">// Use i2p h= ttp proxy for all connections and set homepage to safe local form.</div><di= v dir=3D"auto"><br></div><div dir=3D"auto">// DON'T allow access to the= admin panel from the profile we browse i2p with.</div><div dir=3D"auto">us= er_pref("network.proxy.no_proxies_on", "");</div><div d= ir=3D"auto">user_pref("network.proxy.type", 1);</div><div dir=3D"= auto">user_pref("network.proxy.http", "127.0.0.1");</di= v><div dir=3D"auto">user_pref("network.proxy.http_port", 4444);</= div><div dir=3D"auto">user_pref("network.proxy.ssl", "127.0.= 0.1");</div><div dir=3D"auto">user_pref("network.proxy.ssl_port&q= uot;, 4444);</div><div dir=3D"auto">user_pref("network.proxy.ftp"= , "127.0.0.1");</div><div dir=3D"auto">user_pref("network.pr= oxy.ftp_port", 4444);</div><div dir=3D"auto">user_pref("network.p= roxy.socks", "127.0.0.1");</div><div dir=3D"auto">user_pref(= "network.proxy.socks_port", 4444);</div><div dir=3D"auto">user_pr= ef("network.proxy.share_proxy_settings", true);</div><div dir=3D"= auto">user_pref("network.proxy.socks_remote_dns", true);</div><di= v dir=3D"auto">user_pref("browser.startup.homepage", "about:= blank");</div><div dir=3D"auto"><br></div><div dir=3D"auto">// Privacy= -harden and disable irrelevant features.</div><div dir=3D"auto">user_pref(&= quot;app.normandy.api_url", "");</div><div dir=3D"auto">user= _pref("app.normandy.enabled", false);</div><div dir=3D"auto">user= _pref("app.update.auto", false);</div><div dir=3D"auto">user_pref= ("app.update.enabled", false);</div><div dir=3D"auto">user_pref(&= quot;beacon.enabled", false);</div><div dir=3D"auto">user_pref("b= rowser.aboutHomeSnippets.updateUrl", "");</div><div dir=3D"a= uto">user_pref("browser.cache.disk_cache_ssl", false);</div><div = dir=3D"auto">user_pref("browser.cache.disk.enable", false);</div>= <div dir=3D"auto">user_pref("browser.cache.offline.enable", false= );</div><div dir=3D"auto">user_pref("browser.disableResetPrompt",= true);</div><div dir=3D"auto">user_pref("browser.display.use_document= _fonts", 0);</div><div dir=3D"auto">user_pref("browser.fixup.alte= rnate.enabled", false);</div><div dir=3D"auto">user_pref("browser= .formfill.enable", false);</div><div dir=3D"auto">user_pref("brow= ser.library.activity-stream.enabled", false);</div><div dir=3D"auto">u= ser_pref("browser.newtabpage.activity-stream.disableSnippets", tr= ue);</div><div dir=3D"auto">user_pref("browser.newtabpage.activity-str= eam.enabled", false);</div><div dir=3D"auto">user_pref("browser.n= ewtabpage.activity-stream.feeds.section.highlights", false);</div><div= dir=3D"auto">user_pref("browser.newtabpage.activity-stream.feeds.snip= pets", false);</div><div dir=3D"auto">user_pref("browser.newtabpa= ge.activity-stream.feeds.telemetry", false);</div><div dir=3D"auto">us= er_pref("browser.newtabpage.activity-stream.feeds.topsites", fals= e);</div><div dir=3D"auto">user_pref("browser.newtabpage.activity-stre= am.prerender", false);</div><div dir=3D"auto">user_pref("browser.= newtabpage.activity-stream.showSearch", false);</div><div dir=3D"auto"= >user_pref("browser.newtabpage.enhanced", false);</div><div dir= =3D"auto">user_pref("browser.newtabpage.introShown", true);</div>= <div dir=3D"auto">user_pref("browser.newtab.preload", false);</di= v><div dir=3D"auto">user_pref("browser.onboarding.enabled", false= );</div><div dir=3D"auto">user_pref("browser.pagethumbnails.capturing_= disabled", true);</div><div dir=3D"auto">user_pref("browser.safeb= rowsing.appRepURL", "");</div><div dir=3D"auto">user_pref(&q= uot;browser.safebrowsing.blockedURIs.enabled", false);</div><div dir= =3D"auto">user_pref("browser.safebrowsing.downloads.enabled", fal= se);</div><div dir=3D"auto">user_pref("browser.safebrowsing.downloads.= remote.enabled", false);</div><div dir=3D"auto">user_pref("browse= r.safebrowsing.downloads.remote.url", "");</div><div dir=3D"= auto">user_pref("browser.safebrowsing.enabled", false);</div><div= dir=3D"auto">user_pref("browser.safebrowsing.malware.enabled", f= alse);</div><div dir=3D"auto">user_pref("browser.safebrowsing.phishing= .enabled", false);</div><div dir=3D"auto">user_pref("browser.sear= ch.geoip.timeout", 1);</div><div dir=3D"auto">user_pref("browser.= search.suggest.enabled", false);</div><div dir=3D"auto">user_pref(&quo= t;browser.selfsupport.url", "");</div><div dir=3D"auto">user= _pref("browser.send_pings", false);</div><div dir=3D"auto">user_p= ref("browser.shell.checkDefaultBrowser", false);</div><div dir=3D= "auto">user_pref("browser.startup.homepage_override.mstone", &quo= t;ignore");</div><div dir=3D"auto">user_pref("<a href=3D"http://b= rowser.startup.page">browser.startup.page</a>", 0);</div><div dir=3D"a= uto">user_pref("browser.toolbarbuttons.introduced.pocket-button",= true);</div><div dir=3D"auto">user_pref("browser.urlbar.speculativeCo= nnect.enabled", false);</div><div dir=3D"auto">user_pref("browser= .urlbar.trimURLs", false);</div><div dir=3D"auto">user_pref("data= reporting.healthreport.uploadEnabled", false);</div><div dir=3D"auto">= user_pref("datareporting.policy.dataSubmissionEnabled", false);</= div><div dir=3D"auto">user_pref("dom.battery.enabled", false);</d= iv><div dir=3D"auto">user_pref("dom.enable_performance", false);<= /div><div dir=3D"auto">user_pref("dom.enable_performance_navigation_ti= ming", false);</div><div dir=3D"auto">user_pref("dom.enable_resou= rce_timing", false);</div><div dir=3D"auto">user_pref("dom.event.= clipboardevents.enabled", false);</div><div dir=3D"auto">user_pref(&qu= ot;dom.gamepad.enabled", false);</div><div dir=3D"auto">user_pref(&quo= t;dom.indexedDB.enabled", false);</div><div dir=3D"auto">user_pref(&qu= ot;dom.min_timeout_value", 400);</div><div dir=3D"auto">user_pref(&quo= t;dom.push.connection.enabled", false);</div><div dir=3D"auto">user_pr= ef("dom.push.enabled", false);</div><div dir=3D"auto">user_pref(&= quot;dom.serviceWorkers.enabled", false);</div><div dir=3D"auto">user_= pref("dom.serviceWorkers.interception.enabled", false);</div><div= dir=3D"auto">user_pref("dom.storage.enabled", false);</div><div = dir=3D"auto">user_pref("dom.webaudio.enabled", false);</div><div = dir=3D"auto">user_pref("extensions.autoDisableScopes", 14);</div>= <div dir=3D"auto">user_pref("extensions.getAddons.cache.enabled",= false);</div><div dir=3D"auto">user_pref("extensions.getAddons.showPa= ne", false);</div><div dir=3D"auto">user_pref("extensions.pocket.= enabled", false);</div><div dir=3D"auto">user_pref("extensions.sc= reenshots.disabled", true);</div><div dir=3D"auto">user_pref("ext= ensions.webservice.discoverURL", "");</div><div dir=3D"auto"= >user_pref("geo.enabled", false);</div><div dir=3D"auto">user_pre= f("geo.wifi.uri", "");</div><div dir=3D"auto">user_pref= ("gfx.downloadable_fonts.disable_cache", true);</div><div dir=3D"= auto">user_pref("javascript.options.shared_memory", false);</div>= <div dir=3D"auto">user_pref("layout.css.visited_links_enabled", f= alse);</div><div dir=3D"auto">user_pref("media.autoplay.enabled",= false);</div><div dir=3D"auto">user_pref("media.cache_size", 0);= </div><div dir=3D"auto">user_pref("media.navigator.enabled", fals= e);</div><div dir=3D"auto">user_pref("media.peerconnection.enabled&quo= t;, false);</div><div dir=3D"auto">user_pref("media.video_stats.enable= d", false);</div><div dir=3D"auto">user_pref("captivedetect.canon= icalURL", "");</div><div dir=3D"auto">user_pref("networ= k.captive-portal-service.enabled", false);</div><div dir=3D"auto">user= _pref("network.cookie.cookieBehavior", 1);</div><div dir=3D"auto"= >user_pref("network.cookie.lifetimePolicy", 2);</div><div dir=3D"= auto">user_pref("network.dns.disablePrefetch", true);</div><div d= ir=3D"auto">user_pref("network.http.referer.spoofSource", true);<= /div><div dir=3D"auto">user_pref("network.http.referer.trimmingPolicy&= quot;, 2);</div><div dir=3D"auto">user_pref("network.http.referer.XOri= ginPolicy", 2);</div><div dir=3D"auto">user_pref("network.prefetc= h-next", false);</div><div dir=3D"auto">user_pref("privacy.donott= rackheader.enabled", true);</div><div dir=3D"auto">user_pref("pri= vacy.donottrackheader.value", 1);</div><div dir=3D"auto">user_pref(&qu= ot;toolkit.telemetry.archive.enabled", false);</div><div dir=3D"auto">= user_pref("toolkit.telemetry.coverage.opt-out", true);</div><div = dir=3D"auto">user_pref("toolkit.telemetry.enabled", false);</div>= <div dir=3D"auto">user_pref("toolkit.telemetry.server", "&qu= ot;);</div><div dir=3D"auto">user_pref("toolkit.telemetry.unified"= ;, false);</div><div dir=3D"auto">user_pref("webgl.disabled", tru= e);</div><div dir=3D"auto">user_pref("browser.chrome.errorReporter.inf= oURL", "");</div><div dir=3D"auto">user_pref("breakpad.= reportURL", "");</div><div dir=3D"auto">user_pref("brow= ser.newtabpage.activity-stream.default.sites", "");</div><di= v dir=3D"auto">//user_pref("browser.newtabpage.activity-stream.default= .sites", "<a href=3D"http://planet.i2p/,http://legwork.i2p/,http:= //i2pwiki.i2p/,http://i2pforums.i2p/,http://zzz.i2p/">http://planet.i2p/,ht= tp://legwork.i2p/,http://i2pwiki.i2p/,http://i2pforums.i2p/,http://zzz.i2p/= </a>");</div></div></div><br><div class=3D"gmail_quote"><div dir=3D"lt= r" class=3D"gmail_attr">On Thu, Jun 2, 2022, 5:07 PM Robert Montano <<a = href=3D"mailto:irontree043111@gmail.com">irontree043111@gmail.com</a>> w= rote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex= ;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"auto">Glen this s= oftware was side loaded on my phone without permission. I'm not sure if= arch program is default or added because arm 64 wasn't there in the be= ginning that I could see. It's like a entity has control of my phone wi= th google software and Apache also</div><br><div class=3D"gmail_quote"><div= dir=3D"ltr" class=3D"gmail_attr">On Thu, Jun 2, 2022, 5:04 PM Glen Barber = <<a href=3D"mailto:gjb@freebsd.org" target=3D"_blank" rel=3D"noreferrer"= >gjb@freebsd.org</a>> wrote:<br></div><blockquote class=3D"gmail_quote" = style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">On = Thu, Jun 02, 2022 at 04:10:23PM -0700, Mark Millard wrote:<br> > On 2022-Jun-2, at 16:00, Glen Barber <gjb@FreeBSD.org> wrote:<br= > > <br> > > On Thu, Jun 02, 2022 at 09:04:28PM +0000, Wall, Stephen wrote:<br= > > >> Does anyone know what hardware FreeBSD is using to build the = ARM releases of FreeBSD 13?<br> > >> <br> > > <br> > > They are cross-built on amd64 hardware.<br> > > <br> > <br> > It was unclear to me if the original question was trying<br> > to span aarch64 as well vs., say, just spanning armv7/armv6.<br> > <br> > aarch64 may well have a different answer.<br> > <br> <br> No.=C2=A0 All architectures are built on amd64 hardware.<br> <br> Glen<br> <br> </blockquote></div> </blockquote></div> --000000000000161fa405e080207e--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CABzjivf8b7cfUZ=LOXRKsUFhAttrr8_zn_BYEv2tdV9oqvWr8g>