**<details><summary>⚠️ IMPORTANT NOTE FOR MACOS USERS**:</summary>
This release changes Phoenix's approach on macOS to be far closer to our approach on other platforms, such as Linux - without compromising security. This comes at the cost of improved performance, allows for easier use of `Extended`/Phoenix's `specialized` configs, etc.
For Phoenix to continue working properly on your system in the future, you **MUST** migrate your installation. You can easily upgrade with the following script we created:
```sh
/bin/zsh -c "$(curl --cert-status --doh-cert-status --no-insecure --no-proxy-insecure --no-sessionid --no-ssl --no-ssl-allow-beast --no-ssl-auto-client-cert --no-ssl-no-revoke --no-ssl-revoke-best-effort --proto -all,https --proto-default https --proto-redir -all,https --show-error -sSL https://gitlab.com/celenityy/Phoenix/-/raw/pages/installer_scripts/macos_migrate.sh)"
```
We apologize for any inconvenience, and thank you for your time, patience, and support of the project.
</details>
<br>
____
* <details><summary>Removed our built-in search "extensions" in favor of Mozilla's "SearchEngines" Policy.</summary>
See details: https://codeberg.org/celenity/Phoenix/issues/100
</details>
* <details><summary>Added a Phoenix-specific ("Phoenix filters") list to uBlock Origin, enabled by default. This list includes filters designed specifically to work with Phoenix and derivatives (such as IronFox) - Currently just used to unbreak Smartblock Embed Placeholders on Desktop.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/ffba31c239aaec49eca59b25083d3c2c6ae8bdfd
</details>
* <details><summary>Fixed an issue that prevented **add-ons** from syncing properly with Firefox Sync.</summary>
`extensions.getAddons.get.url` -> `https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%`
`services.sync.addons.trustedSourceHostnames` -> `addons.mozilla.org`
</details>
* <details><summary>Enabled Origin-keyed agent clustering by default (Like Chromium).</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/d02e51b2044963cf1e92b3c2eb606e278dfd25e0
`dom.origin_agent_cluster.default` -> `true`
</details>
* <details><summary>Prevented automatically granting MV3 extensions optional host permissions by default.</summary>
`extensions.originControls.grantByDefault` -> `false`
</details>
* <details><summary>Prevented extensions from opening pop-ups to remote websites.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/b4ed9435b3e540e0faf3c2d633cda4ef923bed59
`extensions.manifestV2.actionsPopupURLRestricted` -> `true`
</details>
* <details><summary>Allowed enabling/disabling extensions per-container (if containers are enabled).</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/daed676a27274a8c7cf1dddbb2b3221ce629dfbb
`extensions.userContextIsolation.enabled` -> `true`
</details>
* <details><summary>Disabled back/forward cache (bfcache) by default.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/815451d28cbc378ed0f4bd1202288223ce18e561
`browser.sessionhistory.max_total_viewers` -> `0`
`fission.bfcacheInParent` -> `false`
</details>
* <details><summary>Disabled WebMIDI by default.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/39b3c752a217f4322d755167db78314719aa1325
`dom.sitepermsaddon-provider.enabled` -> `false`
</details>
* <details><summary>Explicitly disabled WebDriver BiDi experimental commands and events (notable for Nightly users).</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/dfe42b4f0c1aebbd8ad8fdc46f9ab405578a2d51
`remote.experimental.enabled` -> `false`
</details>
* <details><summary>Hardened GPU sandboxing.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/d7aeb08a0485e29b36bb0b175cc46ac1c99016a0
`security.sandbox.gpu.level` -> `2`
</details>
* **<details><summary>WINDOWS**: Strengthened content process sandboxing.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/9c2d38f219fad79760883e16a74f454065d6e958
`security.sandbox.content.level` -> `20`
</details>
* <details><summary>Disabled add-on sideloading.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/740e9004672049f3b78a6f055103ab0539af8305
`extensions.sideloadScopes` -> `0`
</details>
* <details><summary>Prevented add-ons from direct URL requests and "file://" from installing without permission.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/d6c8f7afe343f60fe78bb37c21cfd661d6d95d5d
`xpinstall.whitelist.directRequest` -> `false`
`xpinstall.whitelist.fileRequest` -> `false`
</details>
* <details><summary>Disabled the use of remote Cookie Banner Reduction rules, and instead set the rules locally.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/802bd62094df3b0cc832f14fbeaa9f82ea1a99a4
</details>
* <details><summary>Enabled anti-spoof confirmation prompts.</summary>
`network.auth.confirmAuth.enabled` -> `true`
</details>
* <details><summary>Disabled CSP reporting by default (Currently works on Nightly).</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/3787ec26bb5494788fad16b5908550a53f70c3e8
`security.csp.reporting.enabled` -> `false`
</details>
* <details><summary>Prevented HTTPS-First (if used instead of HTTPS-Only Mode) from automatically exempting domains from HTTPS.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/bd9fe3039845c86374bf94543383f66d852aa128
`dom.security.https_first_add_exception_on_failure` -> `false`
**DESKTOP**:
`dom.security.https_first_add_exception_on_failiure` -> `false`
</details>
* <details><summary>Prevented exposing WebGL renderer info, regardless of if FPP/RFP (or the "WebGLRenderInfo" target) is active.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/3c37613a7b318d56e168f2e36bdf3efa6d448470
`webgl.enable-renderer-query` -> `false`
`webgl.override-unmasked-renderer` -> `Mozilla`
`webgl.override-unmasked-vendor` -> `Mozilla`
</details>
* <details><summary>Disabled file:///net by default.</summary>
See details: https://bugzilla.mozilla.org/show_bug.cgi?id=1412081
`network.file.path_blacklist` -> `/net`
</details>
* <details><summary>Set a fixed temporary storage limit to protect against fingerprinting.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/a294751076e65e47faeb361b99a7e78907235bb2
`dom.quotaManager.temporaryStorage.fixedLimit` -> `52428800`
</details>
* <details><summary>Enabled VP9 regardless of performance benchmarks by default, to protect against fingerprinting.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/89c70435cc21f92896425f75aa53fdd503490c34
`media.benchmark.vp9.threshold` -> `0`
</details>
* <details><summary>Disabled WebRTC history.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/d8b105b75d81ebdfb45d6b8165855717620efc33
`media.aboutwebrtc.hist.enabled` -> `false`
</details>
* <details><summary>Disabled pre-allocation of content processes, due to fingerprinting concerns.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/506f9dfd621b577c2227ff1933b889771c43cffb
`dom.ipc.processPrelaunch.enabled` -> `false`
`dom.ipc.processPrelaunch.fission.number` -> `0`
</details>
* <details><summary>Set Firefox to always load bundled fonts (if available), regardless of device memory, to protect against fingerprinting.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/7143f871e011417a3438a7edefe98cc7bd46d08b
`gfx.bundled-fonts.activate` -> `1`
</details>
* **<details><summary>ANDROID**: Set Firefox to always use the standard "Noto Color Emoji" font, instead of custom ones (such as Samsung's) if available, to protect against fingerprinting.</summary>
See details: https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43023
`font.name-list.emoji` -> `Noto Color Emoji`
</details>
* **<details><summary>DESKTOP**: Disabled the ability to switch locales without restarting, due to fingerprinting concerns.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/5c79df93ed815bc729276e3563a7cad87bcf1417
`intl.multilingual.liveReload` -> `false`
`intl.multilingual.liveReloadBidirectional` -> `false`
</details>
* <details><summary>Updated the built-in query stripping list with new additions from Brave.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/ed69003fb8f0a015d3707e953fa8cb29977723e2
`privacy.query_stripping.strip_list` -> `__hsfp __hssc __hstc __s _bhlid _branch_match_id _branch_referrer _gl _hsenc _kx _openstat at_recipient_id at_recipient_list bbeml bsft_clkid bsft_uid dclid et_rid fb_action_ids fb_comment_id fbclid gbraid gclid guce_referrer guce_referrer_sig hsCtaTracking igshid irclickid mc_eid mkt_tok ml_subscriber ml_subscriber_hash msclkid mtm_cid oft_c oft_ck oft_d oft_id oft_ids oft_k oft_lk oft_sk oly_anon_id oly_enc_id pk_cid rb_clickid s_cid sc_customer sc_eh sc_uid srsltid ss_email_id twclid unicorn_click_id vero_conv vero_id vgo_ee wbraid wickedid yclid ymclid ysclid`
</details>
* <details><summary>Fixed an issue with redirects from "urldefense.com" caused by our query parameter stripping.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/5364984abb5a333900fe4da228220cb34ff906b8
`privacy.query_stripping.allow_list` -> `urldefense.com`
</details>
* **<details><summary>WINDOWS**: Prevented prompting users to open system settings and enable Microsoft's Location Services.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/c336f9c0d9f05004cfbaed6f4a965c56d51eff6d
`geo.prompt.open_system_prefs` -> `false`
</details>
* **<details><summary>LINUX**: Prevented unconditionally providing high location accuracy.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/c7ba61151e0806275288dd0b08b064183bcea06c
`geo.provider.geoclue.always_high_accuracy` -> `false`
</details>
* <details><summary>Ensured users have full control over Nimbus recipes/experiments.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/b714ca561a6e16e1e0289a261966568039b38541
`nimbus.debug` -> `true`
`nimbus.validation.enabled` -> `false`
</details>
* <details><summary>Increased video buffering for cellular connections.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/5c7d6707ba5ff00291f4be0807e1ccda5e0dbdb5
`media.cache_readahead_limit.cellular` -> `7200`
`media.cache_resume_threshold.cellular` -> `3600`
`media.throttle-cellular-regardless-of-download-rate` -> `false`
</details>
* <details><summary>Increased the file-backed media cache size for cellular connections.</summary>
See details: https://codeberg.org/celenity/Phoenix/commit/5c7d6707ba5ff00291f4be0807e1ccda5e0dbdb5
`media.cache_size.cellular` -> `512000`
</details>
* <details><summary>Enabled higher-performance pinch zoom by default.</summary>
`gfx.webrender.low-quality-pinch-zoom` -> `true`
</details>
* **<details><summary>DESKTOP**: Improved the reliability of extension storage sync.</summary>
`services.sync.extension-storage.skipPercentageChance` -> `0`
</details>
* Other minor tweaks, fixes, and additions.
___
Codeberg: See [here](https://codeberg.org/celenity/Phoenix/compare/2025.05.11.1...2025.06.02.1) for more details.
GitLab: See [here](https://gitlab.com/celenityy/Phoenix/-/compare/2025.05.11.1...2025.06.02.1) for more details.
GitHub: See [here](https://github.com/celenityy/Phoenix/compare/2025.05.11.1...2025.06.02.1) for more details.
___
:)