safing-intel-data/portmaster/notifications.yaml
2025-04-07 09:51:46 +02:00

102 lines
4.8 KiB
YAML

---
notifications:
# Estimated available space:
# 7 lines at
# 50-60 characters per line
# resuling in about 350-400 characters
filterlist-trim-oisd-nsfw:
title: "Optimizing OISD-NSFW Filter List"
message: |
Portmaster has been using the OISD-NSFW filter list for a long time now. While this is a high quality list, it has grown very fast in the last years and is beginning to impact Portmaster performance.
Fortunately, OISD offers a smaller variant of their NSFW list, which Portmaster will switch to in the coming days. This change is automatic and there is nothing you have to do.
In case you want to continue using the [complete OISD-NSFW filter list](https://oisd.nl/setup), you can still [download it manually from HERE](https://oisd.nl/setup) and tell Portmaster to use it by configuring the Customer Filter List setting.
match: 'Config.filter/lists.#[%\"NSFW\"] exists or Config.filter/lists.#[%\"NSFWM\"] exists or Config.filter/lists.#[%\"OISD-NSFW\"] exists'
type: 1 # Warning
availableActions:
- text: "OISD Website"
type: open-url
payload: https://oisd.nl
release-announcement-v1-6-2:
title: "What's New in v1.6"
message: "[Read about importing and exporting settings and app profiles](https://safing.io/blog/2023/12/11/Portmaster-v1.6/?source=Portmaster). Thank you for using Portmaster!"
match: "Version startswith 1.6."
availableActions:
- text: "Read Blog"
type: open-url
payload: https://safing.io/blog/2023/12/11/Portmaster-v1.6/?source=Portmaster
removing-network-rating:
title: "Removing Deprecated Network Rating"
message: |
The deprecated feature "Network Rating" will be fully removed beginning of December 2023.
[Read about why this happens now and what we have planned for the future instead.](https://safing.io/blog/2023/11/08/removing-deprecated-network-rating/?source=Portmaster)
match: "Config.core/enableNetworkRating is true"
type: 1 # Warning
showOnSystem: true
repeat: 72h # 3 days
availableActions:
- text: "Read Blog"
type: open-url
payload: https://safing.io/blog/2023/11/08/removing-deprecated-network-rating/?source=Portmaster
- text: "Change Setting"
type: open-setting
payload:
Key: core/enableNetworkRating
dangerous-setting-global-allow-incoming:
title: "Dangerous Setting: Incoming Connections"
message: |
You have disabled "Force Block Incoming Connections" globally. This allows incoming connections for every application by default. This is dangerous and we encourage you to enable this setting globally and then deactivate it for apps that need incoming connections.
match: "Config.filter/blockInbound exists and Config.filter/blockInbound is false and Config.core/expertiseLevel not sameas developer"
type: 3 # Error
repeat: 168h # 1 week
availableActions:
- text: "Change Setting"
type: open-setting
payload:
Key: filter/blockInbound
release-channel-staging-warning:
title: "Using Staging Releases"
message: |
Portmaster is set to the "Staging" release channel. This channel is used to test releases and should not be used unless instructed to and only for a short duration. Releases in this channel might contain unreleased and highly experimental code.
match: "Updates.Channel sameas staging"
type: 1 # Warning
repeat: 168h # 1 week
availableActions:
- text: "Change Channel"
type: open-setting
payload:
Key: core/releaseChannel
release-channel-support-warning:
title: "Using Support Releases"
message: |
Portmaster is set to the "Support" release channel. This channel is used to release special versions custom made for specific users for debugging and testing. Do not use unless instructed to and only for a short duration. Releases in this channel might contain unreleased and highly experimental code.
match: "Updates.Channel sameas support"
type: 1 # Warning
repeat: 168h # 1 week
availableActions:
- text: "Change Channel"
type: open-setting
payload:
Key: core/releaseChannel
updates-disabled:
title: "Updates Disabled"
message: |
Automatic updates are completely disabled through configuration. Please note that this is potentially dangerous, as this also affects security updates as well as the filter lists and threat intelligence feeds. It is recommended to at least enable automatic intelligence data updates.
match: "Config.core/automaticUpdates is false and Config.core/automaticIntelUpdates is false"
type: 1 # Warning
repeat: 168h # 1 week
availableActions:
- text: "Change Setting"
type: open-setting
payload:
Key: core/automaticIntelUpdates