mirror of
https://git.sr.ht/~seirdy/seirdy.one
synced 2024-12-17 22:32:10 +00:00
340 lines
26 KiB
Text
340 lines
26 KiB
Text
The following applies to minimal websites that focus primarily on text. It does not apply to websites that have a lot of non-textual content. It also does not apply to websites that focus more on generating revenue or pleasing investors than being good websites.
|
||
|
||
This is a "living document" that I add to as I receive feedback.
|
||
|
||
=> https://git.sr.ht/~seirdy/seirdy.one/log/master/item/content/posts/website-best-practices.gmi See the changelog
|
||
|
||
I realize not everybody's going to ditch the Web and switch to Gemini or Gopher today (that'll take, like, a month at the longest). Until that happens, here's a non-exhaustive, highly-opinionated list of best practices for websites that focus primarily on text:
|
||
|
||
* Final page weight under 50kb without images, and under 200kb with images. Page weight should usually be much smaller; these are upper-bounds for exceptional cases.
|
||
* Works in Lynx, w3m, links (both graphics and text mode), NetSurf, and Dillo
|
||
* Works with popular article-extractors (e.g. Readability) and HTML-to-Markdown converters. This is a good way to verify that your site uses simple HTML and works with most non-browser article readers (e.g. ebook converters, PDF exports).
|
||
* No scripts or interactivity (preferably enforced at the CSP level)
|
||
* No cookies
|
||
* No animations
|
||
* No fonts--local or remote--besides sans-serif and monospace. More on this below.
|
||
* No referrers
|
||
* No requests after the page finishes loading
|
||
* No 3rd-party resources (preferably enforced at the CSP level)
|
||
* No lazy loading (more on this below)
|
||
* No custom colors OR explicitly set the both foreground and background colors. More on this below.
|
||
* A maximum line length for readability
|
||
* Server configured to support compression (gzip, optionally Brotli and Zstandard as well). It's a free speed boost.
|
||
* Supports dark mode via a CSS media feature and/or works with most "dark mode" browser addons. More on this below.
|
||
* A good score on Mozilla's HTTP Observatory. A bare minimum would be 50, but it shouldn't be too hard to hit 100.
|
||
* Optimized images. More on image optimization below.
|
||
* All images labeled with alt-text. The page should make sense without images.
|
||
* Probably HTTP/2. Maybe even HTTP/3. Run some tests to see if this is worth it if you're so inclined.
|
||
* Works well with Tor. More on this below.
|
||
|
||
=> https://observatory.mozilla.org/ HTTP Observatory
|
||
|
||
Earlier revisions of this post generated some responses I thought I should address below. Special thanks to the IRC and Lobsters users who gave good feedback!
|
||
|
||
=> https://lobste.rs/s/akcw1m Lobsters thread
|
||
|
||
## Security
|
||
|
||
One of the defining differences between textual websites and advanced Web 2.0 sites/apps is safety. Most browser vulnerabilities are related to modern Web features like JavaScript and WebGL. The simplicity of basic textual websites *should* guarantee some extra safety; however, webmasters need to take some additional measures to ensure limited use of "modern" risky features.
|
||
|
||
### TLS
|
||
|
||
All of the simplicity in the world won't protect a page from unsafe content injection by an intermediary. Proper use of TLS protects against page alteration in transit and ensures a limited degree of privacy. Test your TLS setup with these tools:
|
||
|
||
=> https://testssl.sh/ testssl.sh
|
||
=> https://webbkoll.dataskydd.net/ Webbkoll
|
||
|
||
### Scripts and the Content Security Policy
|
||
|
||
Consider taking hardening measures to maximize the security benefits made possible by the simplicity of textual websites, starting with script removal.
|
||
|
||
JavaScript and WebAssembly are responsible for the bulk of modern web exploits. Ideally, a text-oriented site can enforce a scripting ban at the content security policy (CSP) level.
|
||
|
||
=> https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP CSP on MDN
|
||
|
||
For example, here's the CSP for https://seirdy.one:
|
||
|
||
```
|
||
default-src 'none';
|
||
img-src 'self' data:;
|
||
style-src 'sha256-Amup01ZIYjs1kyVZqHYW1tGhvlStSHIoFDKATF7L7VI='; style-src-attr 'none';
|
||
frame-ancestors 'none'; base-uri 'none'; form-action 'none';
|
||
manifest-src 'self';
|
||
upgrade-insecure-requests;
|
||
sandbox allow-same-origin
|
||
```
|
||
|
||
"script-src: 'none'" is implied by "default-src: 'none'", causing a compliant browser to forbid the loading of scripts. Furthermore, the "sandbox" CSP directive forbids a wide variety) of potentially insecure actions.
|
||
|
||
=> https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/sandbox "sandbox" CSP directive on MDN
|
||
|
||
While "script-src" restricts script loading, "sandbox" can also restrict script execution with stronger defenses against script injection (e.g. by a browser addon).¹ I added the `allow-same-origin` parameter so that these addons will still be able to function.²
|
||
|
||
### If you must enable scripts
|
||
|
||
Please use progressive enhancement³ throughout your site; every feature possible should be optional, and scripting is no exception.
|
||
|
||
I'm sure you're a great person, but your readers might not know that; don't expect them to trust your website. Your scripts should look as safe as possible to an untrusting eye. Avoid requesting permissions or using sensitive APIs:
|
||
|
||
=> https://browserleaks.com/javascript JavaScript Browser Information (BrowserLeaks)
|
||
|
||
Finally, consider using your CSP to restrict script loading. If you must use inline scripts, selectively allow them with a hash or nonce. Some recent directives restrict and enforce proper use of trusted types.
|
||
|
||
=> https://web.dev/trusted-types/ Trusted types
|
||
=> https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/trusted-types CSP trusted types on MDN
|
||
|
||
## About fonts
|
||
|
||
If you really want, you could use serif instead of sans-serif; however, serif fonts tend to look worse on low-res monitors. Not every screen's DPI has three digits.
|
||
|
||
To ship custom fonts is to assert that branding is more important than user choice. That might very well be a reasonable thing to do; branding isn't evil! That being said, textual websites in particular don't benefit much from branding. Beyond basic layout and optionally supporting dark mode, authors generally shouldn't dictate the presentation of their websites; that should be the job of the user agent. Most websites are not important enough to look completely different from the rest of the user's system.
|
||
|
||
A personal example: I set my preferred fonts in my computer's fontconfig settings. Now every website that uses sans-serif will have my preferred font. Sites with sans-serif blend into the users' systems instead of sticking out.
|
||
|
||
### But most users don't change their fonts...
|
||
|
||
The "users don't know better and need us to make decisions for them" mindset isn't without merits; however, in my opinion, it's overused. Using system fonts doesn't make your website harder to use, but it does make it smaller and stick out less to the subset of users who care enough about fonts to change them. This argument isn't about making software easier for non-technical users; it's about branding by asserting a personal preference.
|
||
|
||
### Can't users globally override stylesheets instead?
|
||
|
||
It's not a good idea to require users to automatically override website stylesheets. Doing so would break websites that use fonts such as Font Awesome to display vector icons. We shouldn't have these users constantly battle with websites the same way that many adblocking/script-blocking users (myself included) already do when there's a better option.
|
||
|
||
That being said, many users *do* actually override stylesheets. We shouldn't *require* them to do so, but we should keep our pages from breaking in case they do. Pages following this article's advice will probably work perfectly well in these cases without any extra effort.
|
||
|
||
### But wouldn't that allow a website to fingerprint with fonts?
|
||
|
||
I don't know much about fingerprinting, except that you can't do font enumeration without JavaScript. Since text-based websites that follow these best-practices don't send requests after the page loads and have no scripts, they shouldn't be able to fingerprint via font enumeration.
|
||
|
||
Other websites can still fingerprint via font enumeration using JavaScript. They don't need to stop at seeing what sans-serif maps to: they can see all the available fonts on a user's system, the user's canvas fingerprint, window dimensions, etc. Some of these can be mitigated with Firefox's "privacy.resistFingerprinting" setting, but that setting also understandably overrides user font preferences.
|
||
|
||
Ultimately, surveillance self-defense on the web is an arms race full of trade-offs. If you want both privacy and customizability, the web is not the place to look; try Gemini or Gopher instead.
|
||
|
||
## About lazy loading
|
||
|
||
Lazy loading often frustrates users on slow connections. I think I can speak for some of these users: mobile data near my home has a number of "dead zones" with abysmal download speeds, and my home's Wi-Fi repeater setup occasionally results in packet loss rates above 60% (!!).
|
||
|
||
Users on poor connections have better things to do than idly wait for pages to load. They might open multiple links in background tabs to wait for them all to load at once, or switch to another window/app and come back when loading finishes. They might also open links while on a good connection before switching to a poor connection. For example, I often open 10-20 links on Wi-Fi before going out for a walk in a mobile-data dead-zone. A Reddit user reading an earlier version of this article described a similar experience when travelling by train:
|
||
|
||
=> https://i.reddit.com/r/web_design/comments/k0dmpj/an_opinionated_list_of_best_practices_for_textual/gdmxy4u/ u/Snapstromegon's comment
|
||
|
||
Unfortunately, pages with lazy loading don't finish loading off-screen images in the background. To load this content ahead of time, users need to switch to the loading page and slowly scroll to the bottom to ensure that all the important content appears on-screen and starts loading. Website owners shouldn't expect users to have to jump through these ridiculous hoops.
|
||
|
||
A similar attribute that I *do* recommend is the "decoding" attribute. I typically use `decoding="async"` so that image decoding can be deferred.
|
||
|
||
=> https://developer.mozilla.org/en-US/docs/Web/HTML/Element/Img#attr-decoding <img> decoding on MDN
|
||
|
||
### Wouldn't this be solved by combining lazy loading with pre-loading/pre-fetching?
|
||
|
||
A large number of users with poor connections also have capped data, and would prefer that pages don't decide to predictively load many pages ahead-of-time for them. Some go so far as to disable this behavior to avoid data overages. Savvy privacy-conscious users also generally disable pre-loading since linked content may employ dark patterns like tracking without consent.
|
||
|
||
Users who click a link *choose* to load a full page. Loading pages that a user hasn't clicked on is making a choice for that user.
|
||
|
||
### Can't users on poor connections disable images?
|
||
|
||
I have two responses:
|
||
|
||
1. If an image isn't essential, you shouldn't include it inline.
|
||
2. Yes, users could disable images. That's *their* choice. If your page uses lazy loading, you've effectively (and probably unintentionally) made that choice for a large number of users.
|
||
|
||
## About custom colors
|
||
|
||
Some users' browsers set default page colors that aren't black-on-white. For instance, Linux users who enable GTK style overrides might default to having white text on a dark background. Websites that explicitly set foreground colors but leave the default background color (or vice-versa) end up being difficult to read. Here's what this page would look like if it messed with the colors carelessly:
|
||
|
||
=> gemini://seirdy.one/misc/website_colors.png Screenshot of this page with some unreadable text
|
||
|
||
It's got a grey background, a header with unreadable black/grey text, and unreadable white-on-white code snippets
|
||
|
||
## Dark themes
|
||
|
||
If you do explicitly set colors, please also include a dark theme using a media query:
|
||
|
||
```
|
||
@media (prefers-color-scheme: dark)
|
||
```
|
||
|
||
For more info, read the relevant docs:
|
||
|
||
=> https://developer.mozilla.org/en-US/docs/Web/CSS/@media/prefers-color-scheme prefers-color-scheme docs on MDN
|
||
|
||
When setting colors, especially with a dark background, I recommend checking your page's contrast using Advanced Perceptual Contrast Algorithm (APCA) values. You can do so in an online checker or Chromium's developer tools (you might have to enable them in a menu for experimental preferences.
|
||
|
||
=> https://www.myndex.com/APCA/simple Online ACPA Contrast Calculator
|
||
|
||
Blue and purple links on a black background have much worse perceptual contrast than yellow or green links. Also, remember that the darker the background, the less battery your website will require devices with OLED screens.
|
||
|
||
CSS filters such as "invert" are quite expensive to run, so they should be used sparingly. Simply inverting your page's colors to provide a dark theme could slow it down or cause a user's fans to spin.
|
||
|
||
## Image optimization
|
||
|
||
Some image optimization tools I use:
|
||
|
||
=> https://pngquant.org pngquant (lossy)
|
||
=> https://github.com/shssoichiro/oxipng Oxipng (lossless)
|
||
=> https://github.com/tjko/jpegoptim jpegoptim (lossless or lossy)
|
||
=> https://developers.google.com/speed/webp/docs/cwebp cwebp (lossless or lossy)
|
||
=> https://github.com/AOMediaCodec/libavif avifenc (lossless or lossy), included in libavif
|
||
|
||
I put together a quick script to losslessly optimize images using these programs in my dotfile repo:
|
||
|
||
=> https://git.sr.ht/~seirdy/dotfiles/tree/3b722a843f3945a1bdf98672e09786f0213ec6f6/Executables/shell-scripts/bin/optimize-image optimize-image
|
||
|
||
You also might want to use the HTML "<picture>" element, using JPEG/PNG as a fallback for more efficient formats such as WebP or AVIF.
|
||
|
||
=> https://developer.mozilla.org/en-US/docs/Web/HTML/Element/picture <picture> docs on MDN
|
||
|
||
Most of my images will probably be screenshots that start as PNGs. My typical flow:
|
||
|
||
1. Re-size and crop the image. Convert to grayscale if colors aren't important.
|
||
2. Lossy compression with pngquant
|
||
3. Losslessly optimize the result with Oxipng and its Zopfli backend (slow)
|
||
4. Also create a lossless WebP from the lossy PNG and a lossy WebP from the source image, using cwebp. Pick the smaller of the two.
|
||
5. Include the resulting WebP in the page, with a fallback to the PNG using a `<picture>` element.
|
||
6. Create a lossy AVIF image from the original source image, and include it in the `<picture>` element if it's smaller than the WebP.
|
||
7. If the image is too light, repeat for a dark version of the image to display with a `prefers-dark-mode` media query.
|
||
|
||
Here's a sample command to compress a PNG using ImageMagick, pngquant, and oxipng. It shrinks the image, turns it grayscale, reduces the color palette, and then applies lossless Zopfli compression:
|
||
|
||
``` sh
|
||
convert -resize 75% original.png -colorspace GRAY -format png - \
|
||
| pngquant -s 1 12 - \
|
||
| oxipng -o max -Z --fix - --out compressed.png
|
||
```
|
||
|
||
It might seem odd to create a lossless WebP from a lossy PNG, but I've found that it's often the best way to get the smallest possible image at the minimum acceptable quality for screenshots with solid backgrounds.
|
||
|
||
In general, avoid using inline images just for decoration. Only use an image if it has a clear purpose that significantly adds to the content in a way that text can't replace, and provide alt-text as a fallback. Any level of detail that isn't necessary for getting the point across should be removed with lossy compression and cropping. Some conventional wisdom for image compression doesn't hold up when compressing this aggressively; for instance, I've found that extremely aggressive dithering and PNG compression of small black-and-white images consistently surpasses JPEG compression.
|
||
|
||
If you want to include a profile photo (e.g., if your website is part of the IndieWeb), I recommend re-using one of your favicons. Doing so should be harmless since most browsers will fetch and cache favicons anyway.
|
||
|
||
If you really want to go overboard with PNG optimization, you can try a tool like Efficient Compression Tool:
|
||
|
||
=> https://github.com/fhanau/Efficient-Compression-Tool Efficient Compression Tool on GitHub
|
||
|
||
## Layout
|
||
|
||
This is possibly the most subjective item I'm including, and the item with the most exceptions. Consider it more of a weak suggestion than hard advice. Use your own judgement.
|
||
|
||
A simple layout looks good at a variety of window sizes, rendering responsive layout changes unnecessary. Textual websites really don't need more than a single column; readers should be able to scan a page top-to-bottom, left-to-right (or right-to-left, depending on the locale) exactly once to read all its content. Verify this using the horizontal-line test: mentally draw a horizontal line across your page, and make sure it doesn't intersect more than one (1) item. Keeping a single-column layout that doesn't require responsive layout changes ensures smooth window re-sizing.
|
||
|
||
Exceptions exist: one or two very simple responsive changes won't hurt. For example, the only responsive layout change on my website (https://seirdy.one) is a single CSS declaration to switch between inline and multi-line navigation links at the top of the page:
|
||
|
||
```
|
||
@media (min-width: 32rem) {
|
||
nav li {
|
||
display: inline;
|
||
}
|
||
}
|
||
```
|
||
|
||
Nontrivial use of width-selectors, in CSS or "<source>" tags, is actually a powerful vector for JS-free fingerprinting:
|
||
|
||
=> https://matt.traudt.xyz/posts/how-css-alone-can-help-track-you-YF4ciVY6/ How CSS alone can help track you
|
||
|
||
### What about sidebars?
|
||
|
||
Sidebars are probably unnecessary, and can be quite annoying to readers who re-size windows frequently. This is especially true for tiling window manager users like me: we frequently shrink windows to a fraction of their original size. When this happens on a website with a sidebar, one of two things happens:
|
||
|
||
1. The site's responsive design kicks in: the sidebar vanishes and its elements move elsewhere. This can be quite CPU-heavy, as the browser has to both re-wrap the text *and* handle a complex layout change. Frequent window re-sizers will experience lag and battery loss, and might need a moment to figure out where everything went.
|
||
2. The site doesn't use responsive design. The navbar and main content are now squeezed together. Readers will probably close the page.
|
||
|
||
Neither situation looks great.
|
||
|
||
### Sidebar alternatives
|
||
|
||
Common items in sidebars include article tags, an author bio, and an index of entries; these aren't useful while reading an article. Consider putting them in the article footer or--even better--dedicated pages. This does mean that readers will have to navigate to a different page to see that content, but they probably prefer things that way; almost nobody who clicked on "An opinionated list of best practices for textual websites" did so because they wanted to read my bio.
|
||
|
||
Don't boost engagement by providing readers with information they didn't ask for; earn engagement with good content, and let readers navigate to your other pages *after* they've decided they want to read more.
|
||
|
||
## Tor
|
||
|
||
Many people use Tor out of necessity. On Tor, additional constraints apply.
|
||
|
||
For one, Tor users are encouraged to set the Tor Browser Bundle's (TBB) security settings to "safest".
|
||
|
||
=> https://tb-manual.torproject.org/en-US/security-settings/ TBB Security Settings
|
||
|
||
This disables scripts, MathML, some fonts, SVG images, and other features:
|
||
|
||
=> https://gitweb.torproject.org/torbutton.git/tree/modules/security-prefs.js Torbutton security-prefs source code
|
||
|
||
If your site has any SVG images, be sure to provide a fallback to raster formats using a "<picture>" element.
|
||
|
||
Additionally, hopping between nodes in Tor circuits incurs latency, worsening the impacts of requiring multiple requests and round-trips. Try to minimise the number of requests to view a page.
|
||
|
||
If you use a CDN or some overcomplicated website security stack, make sure it doesn't block Tor users or require them to enable JS to complete a CAPTCHA. To go above and beyond, try mirroring your site to an onion service to reduce the need for exit nodes.
|
||
|
||
## Testing
|
||
|
||
If your site is simple enough, it should automatically handle the vast majority of edge-cases. Different devices and browsers all have their quirks, but they generally have one thing in common: they understand semantic, backward-compatible HTML.
|
||
|
||
In addition to standard testing, I recommend testing with unorthodox setups that are unlikely to be found in the wild. If a website doesn't look good in one of these tests, there's a good chance that it uses an advanced Web feature that can serve as a point of failure in other cases. Simple sites should be able to look good in a variety of situations out of the box.
|
||
|
||
Your page should easily pass the harshest of tests without any extra effort if its HTML meets basic standards for well-written code (overlooking bad formatting and a lack of comments). Even if you use a complex static site generator, the final HTML should be simple, readable, and semantic.
|
||
|
||
### Sample unorthodox tests
|
||
|
||
These tests start out pretty reasonable, but gradually get more insane as you go down. Once again, use your judgement.
|
||
|
||
1. Evaluate the heaviness and complexity of your scripts (if any) by testing with your browser's JIT compilation disabled.⁴
|
||
2. Test using the Tor browser with the safest security level enabled (disables JS and other features).
|
||
3. Load just the HTML. No CSS, no images, etc. Try loading without inline CSS as well for good measure.
|
||
4. Print out the site in black-and-white, preferably with a simple laser printer.
|
||
5. Test with a screen reader.
|
||
6. Test keyboard navigability with the tab key. Even without specifying tab indices, tab selection should follow a logical order if you keep the layout simple.
|
||
7. Test in textual browsers: lynx, links, w3m, ELinks, edbrowse, EWW, Netrik, etc.
|
||
8. Read the (prettified/indented) HTML source itself and parse it with your brain. See if anything seems illogical or unnecessary. Imagine giving someone a printout of your page's <body> along with a whiteboard. If they have a basic knowledge of HTML tags, would they be able to draw something resembling your website?
|
||
9. Test in an online website translator tool.
|
||
10. Test on something ridiculous: try your old e-reader's embedded browser, combine an HTML-to-EPUB converter and an EPUB-to-PDF converter, or stack multiple article-extraction utilities on top of each other. Be creative and enjoy breaking your site. When something breaks, examine the breakage and see if you can fix it by simplifying your page.
|
||
11. Build a time machine. Travel decades--or perhaps centuries--into the future. Keep going forward until the WWW is breathing its last breath. Test your site on future browsers. Figuring out how to transfer your files onto their computers might take some time, but you have a time machine so that shouldn't be too hard. When you finish, go back in time to meet Benjamin Franklin:
|
||
|
||
=> https://xkcd.com/567/ xkcd: Urgent Mission
|
||
|
||
I'm still on step 10, trying to find new ways to break this page. If you come up with a new test, please share it:
|
||
|
||
=> mailto:~seirdy/seirdy.one-comments@lists.sr.ht Mailing list for this website
|
||
|
||
## Other places to check out
|
||
|
||
The 250kb club gathers websites at or under 250kb, and also rewards websites that have a high ratio of content size to total size.
|
||
|
||
=> https://250kb.club/ The 250kb Club
|
||
|
||
The 10 KB Club does the same with a 10kb homepage budget (excluding favicons and webmanifest icons). It also has guidelines for noteworthiness, to avoid low-hanging fruit like mostly-blank pages.
|
||
|
||
=> https://10kbclub.com/ The 10 KB Club
|
||
|
||
My favorite website club has to be the XHTML Club by Bradley Taunt, the creator of the original 1mb.club.
|
||
|
||
=> https://xhtml.club the eXtreme HyperText Movement for Luddites
|
||
=> https://uglyduck.ca Bradley Taunt's homepage
|
||
|
||
Motherfucking Website generated a lot of buzz when it was created:
|
||
|
||
=> https://motherfuckingwebsite.com/ Motherfucking Website
|
||
|
||
Motherfucking Website inspired several unofficial sequels that tried to gently improve upon it. My favorite:
|
||
|
||
=> https://bestmotherfucking.website/ Best Motherfucking Website
|
||
|
||
The WebBS calculator compares a page's size with the size of a PNG screenshot of the full page content, encouraging site owners to minimize the ratio of the two:
|
||
|
||
=> https://www.webbloatscore.com/ Web Bloat Score Calculator
|
||
|
||
One resource I found useful (that eventually featured this article!) was the “Your page content” section of Bill Dietrich’s comprehensive guide to setting up your personal website:
|
||
|
||
=> https://www.billdietrich.me/YourPersonalWebSite.html#PageContent Your Personal Website
|
||
|
||
## Notes
|
||
|
||
¹ Many addons function by injecting content into pages; this significantly weakens many aspects of the browser security model (e.g. site and origin isolation) and should be avoided if at all possible. On sensitive pages with content such as public key fingerprints, I recommend setting a blank `sandbox` directive even if it means breaking these addons.
|
||
|
||
² Some addons will have reduced functionality; for instance, Tridactyl can't create an <iframe> for its command window. I consider this to be worthwhile since the most important functionality is still available, and because authors shouldn't feel compelled to support security weakening. I say this as someone who uses Tridactyl often.
|
||
|
||
=> https://github.com/tridactyl/tridactyl Tridactyl
|
||
|
||
³ Here's an overview of PE and my favorite write-up on the subject.
|
||
|
||
=> https://en.wikipedia.org/wiki/Progressive_enhancement Progressive Enhancement (Wikipedia)
|
||
=> https://whalecoiner.com/articles/progressive-enhancement Yes, progressive enhancement is a fucking moral argument
|
||
|
||
⁴ Consider disabling the JIT for your normal browsing too; doing so removes whole classes of vulnerabilities. In Firefox, toggle javascript.options.ion, javascript.options.baselinejit, javascript.options.native_regexp, javascript.options.asmjs, and javascript.options.wasm in about:config; in Chromium, run chromium with `--js-flags='--jitless'`; in the Tor Browser, set the security level to "Safer".
|