Hardening Zen

[Zen's Logo]

Privacy by Default?

I really like the Zen Browser. It’s the first Firefox fork in a long time that actually feels modern without being bloated or meh like LibreWolf. The tiling... the vertical tabs... the shortcuts.. And the performance is so snappy. And where Zen can shine is if you search for some specific settings in about:config, you might notice some of them have a little lock icon next to them. This means the Zen developers have locked these settings to false. They've essentially welded the door shut so telemetry can't be turned back on. However, being based on Firefox means it still inherits some of Mozilla’s questionable defaults. Here is how I clean it up.

The Easy Settings

Before diving into everything else, go to the standard settings page. Under Privacy & Security, set Enhanced Tracking Protection to 'Strict'. This is the most basic thing you can do.

And then, scroll down and do the rest of the obvious things, such as DNS over HTTPS and others. Zen is better than vanilla Firefox about this, but it’s good to make sure the doors are locked.

Deep Dive Into about:config

Type about:config in your URL bar. You’ll get a warning. Click 'Accept the Risk and Continue'.

Search for these specifically. Some might be set already, but double-checking is free.

Preventing IP Leaks

WebRTC is great for video calls, but it's notorious for leaking your real IP address even if you're using a VPN. If you don't use your browser for Discord calls or something, disable this:

If you absolutely need WebRTC but want to stay safe, toggle media.peerconnection.ice.default_address_only to true instead.

Extension Minimalism

One of the biggest mistakes people make when "hardening" a browser is installing twenty different privacy extensions. This actually makes you more unique because your specific combination of extensions creates a unique fingerprint. If you've actually been learning along with this guide, you'll know we enabled privacy.resistFingerprinting.block_mozAddonManager, which blocks the most direct way a website can "poll" your browser to see exactly what is installed. However, there is a concept called Extension Fingerprinting via Behavior. Even if a site can't see the list of your extensions, it can see what they do to the page.

uBlock Origin: This is non-negotiable. It's not just for ads, the rest of what this extension can do is so overlooked. It treats trackers, malware-distributing domains, and "pop-under" scripts with the same hostility. You can also disable JavaScript (Satan) globally or for individual sites, and unlike other blockers, it's highly optimized. It can also automatically clean up those ugly tracking strings at the end of URLs. AND, it's open source. Get it, and go over to the settings dashboard and enable "I am an advanced user" and start configuring it. Because you definitely are an advanced user.

Note about user.js templates

I hope some Arkenfox chud has not thought to themselves that this is stupid and people should just use Arkenfox. Arkenfox is bound to break websites beyond usability and can actually interfere with Zen's unique interface and features. And because of that, using Arkenfox may actually make you more unique, not less. Zen already integrates Betterfox into the engine.


After all of this, some sites will break. Bank portals and "modern" corporate sites hate when they can't fingerprint you. When that happens, don't lower your security. Find a better way to access the service, or don't use it at all.

Close the tab, restart the browser, and you're good to go.