From nobody Fri Jun 03 00:22:49 2022 X-Original-To: freebsd-arm@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id B44F11B60D8C for ; Fri, 3 Jun 2022 00:23:03 +0000 (UTC) (envelope-from irontree043111@gmail.com) Received: from mail-yb1-xb2f.google.com (mail-yb1-xb2f.google.com [IPv6:2607:f8b0:4864:20::b2f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4LDk9z00Tbz3MK1; Fri, 3 Jun 2022 00:23:03 +0000 (UTC) (envelope-from irontree043111@gmail.com) Received: by mail-yb1-xb2f.google.com with SMTP id l204so11131073ybf.10; Thu, 02 Jun 2022 17:23:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Y5tD7nQ8U64gQmRiietL35l8xBKp6IkBRCi5SIn49ts=; b=lkX4KM/LR0/VMAD67Ftt2N+OqlD4cBjot8LF94znHpyVnQL7146NPRuuKmdHUc+sO9 pT0QhiXOn0K5z1GfScXu1OB9vQSfjUmc0+k/2tfpsEihZO+J8Tl/cP+ttICvHKYFpB7m JdjtDQsL2rdG4+4csfA6CQu3wJ0lcUioRaHKiARFJ04AOg3krFpPN7oeFCG7eJAsSXg3 eA6ekatTiswgjU48rxvEhLijesCoeW9Z8oDcmQw+sqogySZ7+RH8baSAb5UAkVtghpqs 9Nt36RCu/kP56v7M3HUyU7L2IDmQzFz1UD9kslsK8QH5xvtYksitGt/Gt/wRNvZbUWPk h0mQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Y5tD7nQ8U64gQmRiietL35l8xBKp6IkBRCi5SIn49ts=; b=RdT6sAOXc2pIDkdfKImZT9iXiAW6tOAXEC2bdwdGp4ybDIxv73D4gCDFJoYyZ4Nmwb Iv8QOwntxpMED8BCI5nSvejRi9+oqsTXyGAepLNTNV3woEGRwACM8c9gTicEOgB6nX2+ Jd3lPqk8x89hyUSnJ/i02N/QdErTAjsLaOtlD9+EyMnBobmicImobOHDmByTZagP3jKL 6T8c6eJSZ3b0GmTU3kTU4f7rAVXBKdZv6ioUc09337tMo+W0TVElbPUXJhxeE/95JnWi g/VRIXIKZQMYrp0+Wuheiv7wm4mwvFZgWrHP+SU0xLHlqW1jLrtvAfZeI07sN6a5+6Os /TMQ== X-Gm-Message-State: AOAM5301QB1lLzzjxFT9RubRcMk+kaprnXjPLiht+pf5LiT/+fIrLNku WCZrPqhcY1+Dc8Hu+b9OPG7+5ZJ7aIytHDni064B9pGDYsw= X-Google-Smtp-Source: ABdhPJzbI1YhjrDnTjiE9gJVVkwSq87Nncb3NZlTMZhlc8eAWhp6wSvrLFLNFWaIX8qrkc0j5jwopBnu2WibRctikEA= X-Received: by 2002:a05:6902:110e:b0:644:daff:1e6f with SMTP id o14-20020a056902110e00b00644daff1e6fmr8758387ybu.569.1654215782308; Thu, 02 Jun 2022 17:23:02 -0700 (PDT) List-Id: Porting FreeBSD to ARM processors List-Archive: https://lists.freebsd.org/archives/freebsd-arm List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-arm@freebsd.org MIME-Version: 1.0 References: <20220602230000.GL30607@FreeBSD.org> <20220603000428.GM30607@FreeBSD.org> In-Reply-To: From: Robert Montano Date: Thu, 2 Jun 2022 17:22:49 -0700 Message-ID: Subject: Re: FreeBSD build hardware? To: Glen Barber Cc: Mark Millard , "Wall, Stephen" , "freebsd-arm@FreeBSD.org" Content-Type: multipart/alternative; boundary="000000000000161fa405e080207e" X-Rspamd-Queue-Id: 4LDk9z00Tbz3MK1 X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20210112 header.b="lkX4KM/L"; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of irontree043111@gmail.com designates 2607:f8b0:4864:20::b2f as permitted sender) smtp.mailfrom=irontree043111@gmail.com X-Spamd-Result: default: False [-1.96 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; URI_COUNT_ODD(1.00)[3]; MID_RHS_MATCH_FROMTLD(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-0.96)[-0.956]; FROM_EQ_ENVFROM(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20210112]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; NEURAL_HAM_LONG(-1.00)[-1.000]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::b2f:from]; MLMMJ_DEST(0.00)[freebsd-arm]; FREEMAIL_CC(0.00)[yahoo.com,redcom.com,freebsd.org]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-ThisMailContainsUnwantedMimeParts: N --000000000000161fa405e080207e Content-Type: text/plain; charset="UTF-8" This is what I get when I try to do anything basically.......,....... # Overrides for Extension Preferences # Tor Browser Bundle # Do not edit this file. # # This file is modified from a file included in the Tor Browser Bundle. # # Copyright 2017 The Tor Project. See LICENSE.tor for licensing information. # HTTPS Everywhere Preferences: user_pref("extensions.https_everywhere._observatory.popup_shown", true); user_pref("extensions.https_everywhere.toolbar_hint_shown", true); # NoScript Preferences: # In order to disable all scripts by default, uncomment the following line... # user_pref("capability.policy.maonoscript.javascript.enabled", "noAccess"); # and comment out the following line user_pref("capability.policy.maonoscript.javascript.enabled", "allAccess"); user_pref("capability.policy.maonoscript.sites", "[System+Principal] about: about:tbupdate about:tor chrome: resource: blob: mediasource: moz-extension: moz-safe-about: about:neterror about:certerror about:feeds about:tabcrashed about:cache"); user_pref("noscript.default", "[System+Principal] about: about:tbupdate about:tor chrome: resource: blob: mediasource: moz-extension: moz-safe-about: about:neterror about:certerror about:feeds about:tabcrashed about:cache"); user_pref("noscript.mandatory", "[System+Principal] about: about:tbupdate about:tor chrome: resource: blob: mediasource: moz-extension: moz-safe-about: about:neterror about:certerror about:feeds about:tabcrashed about:cache"); user_pref("noscript.ABE.enabled", false); user_pref("noscript.ABE.notify", false); user_pref("noscript.ABE.wanIpAsLocal", false); user_pref("noscript.confirmUnblock", false); user_pref("noscript.contentBlocker", true); user_pref("noscript.firstRunRedirection", false); user_pref("noscript.global", true); user_pref("noscript.gtemp", ""); user_pref("noscript.opacizeObject", 3); user_pref("noscript.forbidWebGL", true); user_pref("noscript.forbidFonts", true); user_pref("noscript.options.tabSelectedIndexes", "5,0,0"); user_pref("noscript.policynames", ""); user_pref("noscript.secureCookies", true); user_pref("noscript.showAllowPage", false); user_pref("noscript.showBaseDomain", false); user_pref("noscript.showDistrust", false); user_pref("noscript.showRecentlyBlocked", false); user_pref("noscript.showTemp", false); user_pref("noscript.showTempToPerm", false); user_pref("noscript.showUntrusted", false); user_pref("noscript.STS.enabled", false); user_pref("noscript.subscription.lastCheck", -142148139); user_pref("noscript.temp", ""); user_pref("noscript.untrusted", ""); user_pref("noscript.forbidMedia", true); user_pref("noscript.allowWhitelistUpdates", false); user_pref("noscript.fixLinks", false); // Now handled by plugins.click_to_play // Not in this one. user_pref("noscript.forbidFlash", true); user_pref("noscript.forbidSilverlight", true); user_pref("noscript.forbidJava", true); user_pref("noscript.forbidPlugins", true); // Usability tweaks user_pref("noscript.showPermanent", false); user_pref("noscript.showTempAllowPage", true); user_pref("noscript.showRevokeTemp", true); user_pref("noscript.notify", false); user_pref("noscript.autoReload", true); user_pref("noscript.autoReload.allTabs", false); user_pref("noscript.cascadePermissions", true); user_pref("noscript.restrictSubdocScripting", true); user_pref("noscript.showVolatilePrivatePermissionsToggle", false); user_pref("noscript.volatilePrivatePermissions", true); user_pref("noscript.clearClick", 0); user_pref("intl.locale.matchOS", false); user_pref("extensions.https_everywhere._observatory.enabled", false); user_pref("extensions.https_everywhere.options.autoUpdateRulesets", false); user_pref("extensions.https_everywhere.globalEnabled", false); user_pref("extensions.https_everywhere._observatory.submit_during_tor", false); user_pref("extensions.https_everywhere._observatory.submit_during_nontor", false); user_pref("extensions.https_everywhere._observatory.use_custom_proxy", true); user_pref("extensions.https_everywhere._observatory.proxy_host", "127.0.0.1"); user_pref("extensions.https_everywhere._observatory.proxy_port", 4444); user_pref("extensions.torbutton.use_nontor_proxy", true); user_pref("extensions.torlauncher.start_tor", false); user_pref("extensions.torlauncher.prompt_at_startup", false); //user_pref("", false); //For socket conversion: in the future, I'll need to make TBB communicate with //i2p over a unix socket. Fortunately, this is how you do that. It will be //configurable in a similar way to the host:port configuration when that happens. //user_pref("extensions.torlauncher.socks_port_use_ipc", ); //user_pref("extensions.torlauncher.socks_ipc_path", ""); //user_pref("extensions.torlauncher.start_tor", false); //user_pref("extensions.torlauncher.default_bridge_type", ""); //user_pref("extensions.torlauncher.prompt_at_startup", false); // Resist-fingerprinting and first-party isolation enable user_pref("privacy.resistFingerprinting", true); user_pref("privacy.firstparty.isolate", true); // Use i2p http proxy for all connections and set homepage to safe local form. // DON'T allow access to the admin panel from the profile we browse i2p with. user_pref("network.proxy.no_proxies_on", ""); user_pref("network.proxy.type", 1); user_pref("network.proxy.http", "127.0.0.1"); user_pref("network.proxy.http_port", 4444); user_pref("network.proxy.ssl", "127.0.0.1"); user_pref("network.proxy.ssl_port", 4444); user_pref("network.proxy.ftp", "127.0.0.1"); user_pref("network.proxy.ftp_port", 4444); user_pref("network.proxy.socks", "127.0.0.1"); user_pref("network.proxy.socks_port", 4444); user_pref("network.proxy.share_proxy_settings", true); user_pref("network.proxy.socks_remote_dns", true); user_pref("browser.startup.homepage", "about:blank"); // Privacy-harden and disable irrelevant features. user_pref("app.normandy.api_url", ""); user_pref("app.normandy.enabled", false); user_pref("app.update.auto", false); user_pref("app.update.enabled", false); user_pref("beacon.enabled", false); user_pref("browser.aboutHomeSnippets.updateUrl", ""); user_pref("browser.cache.disk_cache_ssl", false); user_pref("browser.cache.disk.enable", false); user_pref("browser.cache.offline.enable", false); user_pref("browser.disableResetPrompt", true); user_pref("browser.display.use_document_fonts", 0); user_pref("browser.fixup.alternate.enabled", false); user_pref("browser.formfill.enable", false); user_pref("browser.library.activity-stream.enabled", false); user_pref("browser.newtabpage.activity-stream.disableSnippets", true); user_pref("browser.newtabpage.activity-stream.enabled", false); user_pref("browser.newtabpage.activity-stream.feeds.section.highlights", false); user_pref("browser.newtabpage.activity-stream.feeds.snippets", false); user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false); user_pref("browser.newtabpage.activity-stream.feeds.topsites", false); user_pref("browser.newtabpage.activity-stream.prerender", false); user_pref("browser.newtabpage.activity-stream.showSearch", false); user_pref("browser.newtabpage.enhanced", false); user_pref("browser.newtabpage.introShown", true); user_pref("browser.newtab.preload", false); user_pref("browser.onboarding.enabled", false); user_pref("browser.pagethumbnails.capturing_disabled", true); user_pref("browser.safebrowsing.appRepURL", ""); user_pref("browser.safebrowsing.blockedURIs.enabled", false); user_pref("browser.safebrowsing.downloads.enabled", false); user_pref("browser.safebrowsing.downloads.remote.enabled", false); user_pref("browser.safebrowsing.downloads.remote.url", ""); user_pref("browser.safebrowsing.enabled", false); user_pref("browser.safebrowsing.malware.enabled", false); user_pref("browser.safebrowsing.phishing.enabled", false); user_pref("browser.search.geoip.timeout", 1); user_pref("browser.search.suggest.enabled", false); user_pref("browser.selfsupport.url", ""); user_pref("browser.send_pings", false); user_pref("browser.shell.checkDefaultBrowser", false); user_pref("browser.startup.homepage_override.mstone", "ignore"); user_pref("browser.startup.page", 0); user_pref("browser.toolbarbuttons.introduced.pocket-button", true); user_pref("browser.urlbar.speculativeConnect.enabled", false); user_pref("browser.urlbar.trimURLs", false); user_pref("datareporting.healthreport.uploadEnabled", false); user_pref("datareporting.policy.dataSubmissionEnabled", false); user_pref("dom.battery.enabled", false); user_pref("dom.enable_performance", false); user_pref("dom.enable_performance_navigation_timing", false); user_pref("dom.enable_resource_timing", false); user_pref("dom.event.clipboardevents.enabled", false); user_pref("dom.gamepad.enabled", false); user_pref("dom.indexedDB.enabled", false); user_pref("dom.min_timeout_value", 400); user_pref("dom.push.connection.enabled", false); user_pref("dom.push.enabled", false); user_pref("dom.serviceWorkers.enabled", false); user_pref("dom.serviceWorkers.interception.enabled", false); user_pref("dom.storage.enabled", false); user_pref("dom.webaudio.enabled", false); user_pref("extensions.autoDisableScopes", 14); user_pref("extensions.getAddons.cache.enabled", false); user_pref("extensions.getAddons.showPane", false); user_pref("extensions.pocket.enabled", false); user_pref("extensions.screenshots.disabled", true); user_pref("extensions.webservice.discoverURL", ""); user_pref("geo.enabled", false); user_pref("geo.wifi.uri", ""); user_pref("gfx.downloadable_fonts.disable_cache", true); user_pref("javascript.options.shared_memory", false); user_pref("layout.css.visited_links_enabled", false); user_pref("media.autoplay.enabled", false); user_pref("media.cache_size", 0); user_pref("media.navigator.enabled", false); user_pref("media.peerconnection.enabled", false); user_pref("media.video_stats.enabled", false); user_pref("captivedetect.canonicalURL", ""); user_pref("network.captive-portal-service.enabled", false); user_pref("network.cookie.cookieBehavior", 1); user_pref("network.cookie.lifetimePolicy", 2); user_pref("network.dns.disablePrefetch", true); user_pref("network.http.referer.spoofSource", true); user_pref("network.http.referer.trimmingPolicy", 2); user_pref("network.http.referer.XOriginPolicy", 2); user_pref("network.prefetch-next", false); user_pref("privacy.donottrackheader.enabled", true); user_pref("privacy.donottrackheader.value", 1); user_pref("toolkit.telemetry.archive.enabled", false); user_pref("toolkit.telemetry.coverage.opt-out", true); user_pref("toolkit.telemetry.enabled", false); user_pref("toolkit.telemetry.server", ""); user_pref("toolkit.telemetry.unified", false); user_pref("webgl.disabled", true); user_pref("browser.chrome.errorReporter.infoURL", ""); user_pref("breakpad.reportURL", ""); user_pref("browser.newtabpage.activity-stream.default.sites", ""); //user_pref("browser.newtabpage.activity-stream.default.sites", " http://planet.i2p/,http://legwork.i2p/,http://i2pwiki.i2p/,http://i2pforums.i2p/,http://zzz.i2p/ "); On Thu, Jun 2, 2022, 5:07 PM Robert Montano wrote: > Glen this software was side loaded on my phone without permission. I'm not > sure if arch program is default or added because arm 64 wasn't there in the > beginning that I could see. It's like a entity has control of my phone with > google software and Apache also > > On Thu, Jun 2, 2022, 5:04 PM Glen Barber wrote: > >> On Thu, Jun 02, 2022 at 04:10:23PM -0700, Mark Millard wrote: >> > On 2022-Jun-2, at 16:00, Glen Barber wrote: >> > >> > > On Thu, Jun 02, 2022 at 09:04:28PM +0000, Wall, Stephen wrote: >> > >> Does anyone know what hardware FreeBSD is using to build the ARM >> releases of FreeBSD 13? >> > >> >> > > >> > > They are cross-built on amd64 hardware. >> > > >> > >> > It was unclear to me if the original question was trying >> > to span aarch64 as well vs., say, just spanning armv7/armv6. >> > >> > aarch64 may well have a different answer. >> > >> >> No. All architectures are built on amd64 hardware. >> >> Glen >> >> --000000000000161fa405e080207e Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
This is what I get when I try to do anything basically...= ....,.......
# Overrides for Extension Preferences
# Tor Browser Bundle
# Do not edit this fi= le.
#
# This file is modified= from a file included in the Tor Browser Bundle.
#
# Copyright 2017 The Tor Project.=C2=A0 See LICENSE.t= or for licensing information.

# HTTPS Everywhere Preferences:
user_pref(&quo= t;extensions.https_everywhere._observatory.popup_shown", true);
<= div dir=3D"auto">user_pref("extensions.https_everywhere.toolbar_hint_s= hown", true);

# NoS= cript Preferences:
# In order to disable all scripts= by default, uncomment the following line...
# user_= pref("capability.policy.maonoscript.javascript.enabled", "no= Access");
# and comment out the following line<= /div>
user_pref("capability.policy.maonoscript.javasc= ript.enabled", "allAccess");
user_pre= f("capability.policy.maonoscript.sites", "[System+Principal]= about: about:tbupdate about:tor chrome: resource: blob: mediasource: moz-e= xtension: moz-safe-about: about:neterror about:certerror about:feeds about:= tabcrashed about:cache");
user_pref("noscr= ipt.default", "[System+Principal] about: about:tbupdate about:tor= chrome: resource: blob: mediasource: moz-extension: moz-safe-about: about:= neterror about:certerror about:feeds about:tabcrashed about:cache");
user_pref("noscript.mandatory", "[Syst= em+Principal] about: about:tbupdate about:tor chrome: resource: blob: media= source: moz-extension: moz-safe-about: about:neterror about:certerror about= :feeds about:tabcrashed about:cache");
user_pre= f("noscript.ABE.enabled", false);
user_pre= f("noscript.ABE.notify", false);
user_pref= ("noscript.ABE.wanIpAsLocal", false);
user= _pref("noscript.confirmUnblock", false);
u= ser_pref("noscript.contentBlocker", true);
user_pref("noscript.firstRunRedirection", false);
user_pref("noscript.global", true);
user_pref("noscript.gtemp", "");
user_pref("noscript.opacizeObject", 3);
user_pref("noscript.forbidWebGL", true);
user_pref("noscript.forbidFonts", true);
user_pref("noscript.options.tabSelectedIndexes", "5,0,0&quo= t;);
user_pref("noscript.policynames", &qu= ot;");
user_pref("noscript.secureCookies&q= uot;, true);
user_pref("noscript.showAllowPage&= quot;, false);
user_pref("noscript.showBaseDoma= in", false);
user_pref("noscript.showDistr= ust", false);
user_pref("noscript.showRece= ntlyBlocked", false);
user_pref("noscript.= showTemp", false);
user_pref("noscript.sho= wTempToPerm", false);
user_pref("noscript.= showUntrusted", false);
user_pref("noscrip= t.STS.enabled", false);
user_pref("noscrip= t.subscription.lastCheck", -142148139);
user_pr= ef("noscript.temp", "");
user_pr= ef("noscript.untrusted", "");
us= er_pref("noscript.forbidMedia", true);
use= r_pref("noscript.allowWhitelistUpdates", false);
user_pref("noscript.fixLinks", false);
// Now handled by plugins.click_to_play // Not in this one.
user_pref("noscript.forbidFlash", true);
user_pref("noscript.forbidSilverlight", true);
user_pref("noscript.forbidJava", true);
user_pref("noscript.forbidPlugins", true);
// Usability tweaks
user_pref("n= oscript.showPermanent", false);
user_pref("= ;noscript.showTempAllowPage", true);
user_pref(= "noscript.showRevokeTemp", true);
user_pre= f("noscript.notify", false);
user_pref(&qu= ot;noscript.autoReload", true);
user_pref("= ;noscript.autoReload.allTabs", false);
user_pre= f("noscript.cascadePermissions", true);
us= er_pref("noscript.restrictSubdocScripting", true);
user_pref("noscript.showVolatilePrivatePermissionsToggle&quo= t;, false);
user_pref("noscript.volatilePrivate= Permissions", true);
user_pref("noscript.c= learClick", 0);

use= r_pref("intl.locale.matchOS", false);

=
user_pref("extensions.https_everywhere._observ= atory.enabled", false);
user_pref("extensi= ons.https_everywhere.options.autoUpdateRulesets", false);
user_pref("extensions.https_everywhere.globalEnabled",= false);
user_pref("extensions.https_everywhere= ._observatory.submit_during_tor", false);
user_= pref("extensions.https_everywhere._observatory.submit_during_nontor&qu= ot;, false);
user_pref("extensions.https_everyw= here._observatory.use_custom_proxy", true);
use= r_pref("extensions.https_everywhere._observatory.proxy_host", &qu= ot;127.0.0.1");
user_pref("extensions.http= s_everywhere._observatory.proxy_port", 4444);
<= br>
user_pref("extensions.torbutton.use_nontor_= proxy", true);
user_pref("extensions.torla= uncher.start_tor", false);
user_pref("exte= nsions.torlauncher.prompt_at_startup", false);
= //user_pref("", false);


//For socket conversion: in the futur= e, I'll need to make TBB communicate with
//i2p = over a unix socket. Fortunately, this is how you do that. It will be
<= div dir=3D"auto">//configurable in a similar way to the host:port configura= tion when that happens.
//user_pref("extensions= .torlauncher.socks_port_use_ipc", );
//user_pre= f("extensions.torlauncher.socks_ipc_path", "");

//user_pref("extensions.to= rlauncher.start_tor", false);
//user_pref("= ;extensions.torlauncher.default_bridge_type", "");
//user_pref("extensions.torlauncher.prompt_at_startup&qu= ot;, false);

// Resist-f= ingerprinting and first-party isolation enable

<= /div>
user_pref("privacy.resistFingerprinting", = true);
user_pref("privacy.firstparty.isolate&qu= ot;, true);

// Use i2p h= ttp proxy for all connections and set homepage to safe local form.

// DON'T allow access to the= admin panel from the profile we browse i2p with.
us= er_pref("network.proxy.no_proxies_on", "");
user_pref("network.proxy.type", 1);
user_pref("network.proxy.http", "127.0.0.1");
user_pref("network.proxy.http_port", 4444);
user_pref("network.proxy.ssl", "127.0.= 0.1");
user_pref("network.proxy.ssl_port&q= uot;, 4444);
user_pref("network.proxy.ftp"= , "127.0.0.1");
user_pref("network.pr= oxy.ftp_port", 4444);
user_pref("network.p= roxy.socks", "127.0.0.1");
user_pref(= "network.proxy.socks_port", 4444);
user_pr= ef("network.proxy.share_proxy_settings", true);
user_pref("network.proxy.socks_remote_dns", true);
user_pref("browser.startup.homepage", "about:= blank");

// Privacy= -harden and disable irrelevant features.
user_pref(&= quot;app.normandy.api_url", "");
user= _pref("app.normandy.enabled", false);
user= _pref("app.update.auto", false);
user_pref= ("app.update.enabled", false);
user_pref(&= quot;beacon.enabled", false);
user_pref("b= rowser.aboutHomeSnippets.updateUrl", "");
user_pref("browser.cache.disk_cache_ssl", false);
user_pref("browser.cache.disk.enable", false);
=
user_pref("browser.cache.offline.enable", false= );
user_pref("browser.disableResetPrompt",= true);
user_pref("browser.display.use_document= _fonts", 0);
user_pref("browser.fixup.alte= rnate.enabled", false);
user_pref("browser= .formfill.enable", false);
user_pref("brow= ser.library.activity-stream.enabled", false);
u= ser_pref("browser.newtabpage.activity-stream.disableSnippets", tr= ue);
user_pref("browser.newtabpage.activity-str= eam.enabled", false);
user_pref("browser.n= ewtabpage.activity-stream.feeds.section.highlights", false);
user_pref("browser.newtabpage.activity-stream.feeds.snip= pets", false);
user_pref("browser.newtabpa= ge.activity-stream.feeds.telemetry", false);
us= er_pref("browser.newtabpage.activity-stream.feeds.topsites", fals= e);
user_pref("browser.newtabpage.activity-stre= am.prerender", false);
user_pref("browser.= newtabpage.activity-stream.showSearch", false);
user_pref("browser.newtabpage.enhanced", false);
user_pref("browser.newtabpage.introShown", true);
=
user_pref("browser.newtab.preload", false);
user_pref("browser.onboarding.enabled", false= );
user_pref("browser.pagethumbnails.capturing_= disabled", true);
user_pref("browser.safeb= rowsing.appRepURL", "");
user_pref(&q= uot;browser.safebrowsing.blockedURIs.enabled", false);
user_pref("browser.safebrowsing.downloads.enabled", fal= se);
user_pref("browser.safebrowsing.downloads.= remote.enabled", false);
user_pref("browse= r.safebrowsing.downloads.remote.url", "");
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", f= alse);
user_pref("browser.safebrowsing.phishing= .enabled", false);
user_pref("browser.sear= ch.geoip.timeout", 1);
user_pref("browser.= search.suggest.enabled", false);
user_pref(&quo= t;browser.selfsupport.url", "");
user= _pref("browser.send_pings", false);
user_p= ref("browser.shell.checkDefaultBrowser", false);
user_pref("browser.startup.homepage_override.mstone", &quo= t;ignore");
user_pref("browser.startup.page", 0);
user_pref("browser.toolbarbuttons.introduced.pocket-button",= true);
user_pref("browser.urlbar.speculativeCo= nnect.enabled", false);
user_pref("browser= .urlbar.trimURLs", false);
user_pref("data= reporting.healthreport.uploadEnabled", false);
= user_pref("datareporting.policy.dataSubmissionEnabled", false);
user_pref("dom.battery.enabled", false);
user_pref("dom.enable_performance", false);<= /div>
user_pref("dom.enable_performance_navigation_ti= ming", false);
user_pref("dom.enable_resou= rce_timing", false);
user_pref("dom.event.= clipboardevents.enabled", false);
user_pref(&qu= ot;dom.gamepad.enabled", false);
user_pref(&quo= t;dom.indexedDB.enabled", false);
user_pref(&qu= ot;dom.min_timeout_value", 400);
user_pref(&quo= t;dom.push.connection.enabled", false);
user_pr= ef("dom.push.enabled", false);
user_pref(&= quot;dom.serviceWorkers.enabled", false);
user_= pref("dom.serviceWorkers.interception.enabled", false);
user_pref("dom.storage.enabled", false);
user_pref("dom.webaudio.enabled", false);
user_pref("extensions.autoDisableScopes", 14);
=
user_pref("extensions.getAddons.cache.enabled",= false);
user_pref("extensions.getAddons.showPa= ne", false);
user_pref("extensions.pocket.= enabled", false);
user_pref("extensions.sc= reenshots.disabled", true);
user_pref("ext= ensions.webservice.discoverURL", "");
user_pref("geo.enabled", false);
user_pre= f("geo.wifi.uri", "");
user_pref= ("gfx.downloadable_fonts.disable_cache", true);
user_pref("javascript.options.shared_memory", false);
=
user_pref("layout.css.visited_links_enabled", f= alse);
user_pref("media.autoplay.enabled",= false);
user_pref("media.cache_size", 0);=
user_pref("media.navigator.enabled", fals= e);
user_pref("media.peerconnection.enabled&quo= t;, false);
user_pref("media.video_stats.enable= d", false);
user_pref("captivedetect.canon= icalURL", "");
user_pref("networ= k.captive-portal-service.enabled", false);
user= _pref("network.cookie.cookieBehavior", 1);
user_pref("network.cookie.lifetimePolicy", 2);
user_pref("network.dns.disablePrefetch", true);
user_pref("network.http.referer.spoofSource", true);<= /div>
user_pref("network.http.referer.trimmingPolicy&= quot;, 2);
user_pref("network.http.referer.XOri= ginPolicy", 2);
user_pref("network.prefetc= h-next", false);
user_pref("privacy.donott= rackheader.enabled", true);
user_pref("pri= vacy.donottrackheader.value", 1);
user_pref(&qu= ot;toolkit.telemetry.archive.enabled", false);
= user_pref("toolkit.telemetry.coverage.opt-out", true);
user_pref("toolkit.telemetry.enabled", false);
=
user_pref("toolkit.telemetry.server", "&qu= ot;);
user_pref("toolkit.telemetry.unified"= ;, false);
user_pref("webgl.disabled", tru= e);
user_pref("browser.chrome.errorReporter.inf= oURL", "");
user_pref("breakpad.= reportURL", "");
user_pref("brow= ser.newtabpage.activity-stream.default.sites", "");
//user_pref("browser.newtabpage.activity-stream.default= .sites", "http://planet.i2p/,ht= tp://legwork.i2p/,http://i2pwiki.i2p/,http://i2pforums.i2p/,http://zzz.i2p/= ");

On Thu, Jun 2, 2022, 5:07 PM Robert Montano <irontree043111@gmail.com> w= rote:
Glen this s= oftware was side loaded on my phone without permission. I'm not sure if= arch program is default or added because arm 64 wasn't there in the be= ginning that I could see. It's like a entity has control of my phone wi= th google software and Apache also

On Thu, Jun 2, 2022, 5:04 PM Glen Barber = <gjb@freebsd.org> wrote:
On = Thu, Jun 02, 2022 at 04:10:23PM -0700, Mark Millard wrote:
> On 2022-Jun-2, at 16:00, Glen Barber <gjb@FreeBSD.org> wrote: >
> > On Thu, Jun 02, 2022 at 09:04:28PM +0000, Wall, Stephen wrote: > >> Does anyone know what hardware FreeBSD is using to build the = ARM releases of FreeBSD 13?
> >>
> >
> > They are cross-built on amd64 hardware.
> >
>
> It was unclear to me if the original question was trying
> to span aarch64 as well vs., say, just spanning armv7/armv6.
>
> aarch64 may well have a different answer.
>

No.=C2=A0 All architectures are built on amd64 hardware.

Glen

--000000000000161fa405e080207e--