If you are on OpenBSD simply type in terminal as root pkg_add -Iv iridium
as root.
For other operating systems, you can get directions here.
Turn off the internet.
Go to advanced settings and turn off Allow Chromium sign-in, Safe browsing, Send a Do Not Track request with your browsing traffic, and Allow sites to check if you have payment methods saved.
After that, turn the internet back on and relaunch Iridium.
Go to content settings under advanced settings.
Turn off JavaScript.
You can add websites you trust to the whitelist if you want.
Go to Manage search engines and remove Qwant, DuckDuckGo, Bing, and Yahoo! from the search engine list.
Add a new search engine by adding Searx
to the Search engine box, search.disroot.org
to the Keyword box, and https://search.disroot.org/?q=%s
to the URL section.
You could also use another Searx instance instead.
Finally, remove Google from the search engine list.
Type this into the search bar chrome://extensions
.
Turn on Developer mode.
Now to install an extension manually, navigate to the directory that contains the crx file.
Then drag the .crx file to the browser.
Finally click "Add Extension" when it pops up.
Download the crx file here.
Install the extension manually (see step three for more info).
There is no need to configure it.
Download the crx file here.
Install the extension manually (see step three for more info).
Go to uBlock Orgin's dashboard and make sure the option Prevent WebRTC from leaking local IP addresses
is enabled.
Download the crx file here.
Install the extension manually (see step three for more info).
Click on the HTTPS Everywhere icon and enable "encrypt all sites eligible" option.
Download the .crx file here.
Install the extension manually (see step three for more info).
Go to Auto History Wipe options and Check the Clear Download History, Clear Website Data, Clear Cache, and Clear Form Autofill Data.
Download the crx file here.
Install the extension manually (see step three for more info).
Click on the Extension and type in the first box Accept
.
Type in the second box text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
.
Click on the plus sign again, and then you should press the "Request Header" button.
Type in the first box Accept-Encoding
.
Type in the second box gzip, deflate, br
.
Click on the plus sign for the final time, and then "Request Header" for the final time.
Type in the first box Accept-Language
.
Type in the second box en-US,en;q=0.5
.
Download the crx file here.
Install the extension manually (see step three for more info).
Go to UserAgent-Spoofer's options.
Add This is your new user agent
to the New User-agent name.
Add Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0
to the New User-Agent String.
Add Chrome
to the Group.
Add x
to the Indicator Flag.
Then finally, click Add.
Now enable the setting by clicking on the UserAgent-Spoofer extension, clicking on Chrome, and clicking on This is your new user agent.
Download the crx file here.
Install the extension manually (see step three for more info).
There is no need to configure it.
This extension is made to block websites that use Cloudflare.
Chromium by default whitelists the chrome store. Because of this extensions won't work. Here is an easy fix.
Download the hosts file here (You can also use wget).
Copy the hosts file to /etc/hosts as root.
You could also just echo "0.0.0.0 chrome.google.com" >> /etc/hosts
as root instead.
This is my setup that I use! I hope you like it.
Back to the front page