This Firefox vulnerability may have been tracking all your private Tor identities – even in Private Mode



  • Researchers uncovered a flaw in Firefox and Tor Browser that allowed websites to generate hidden, stable identifiers without cookies.
  • The issue stemmed from IndexedDB behavior, enabling persistent fingerprinting even in private browsing or Tor’s “New Identity” mode.
  • Mozilla and Tor quickly patched the vulnerability, with fixes included in Firefox 150 and Tor Browser 15.0.10.

Browsers like Mozilla Firefox and Tor Browser contained a vulnerability where websites could create a hidden ID from browser sessions without using cookies or otherwise obvious tracking methods.

The vulnerability was discovered by security researchers Dai Nguyen and Martin Bajanik of Fingerprint. In an in-depth report published earlier this week, the duo said the issue allowed websites to derive a “unique, deterministic, and stable process-lifetime identifier” from the order of entries returned by IndexedDB, even when users expect “stronger isolation”.

https://cdn.mos.cms.futurecdn.net/RVj9UaDvw5MKobyrDh4bsR-1920-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

Leave a reply

Please enter your comment!
Please enter your name here

spot_imgspot_img