And by burned, I mean “realize they have been burning for over a year”. I’m referring to a bug in the Tor Browser flatpak that prevented the launcher from updating the actual browser, despite the launcher itself updating every week or so. The fix requires manual intervention, and this was never communicated to users. The browser itself also doesn’t alert the user that it is outdated. The only reason I found out today was because the NoScript extension broke due to the browser being so old.
To make matters worse, the outdated version of the browser that I had, differs from the outdated version reported in the Github thread. In other words, if you were hoping that at least everybody affected by the bug would be stuck at the same version (and thus have the same fingerprint), that doesn’t seem to be the case.
This is an extreme fingerprinting vulnerability. In fact I checked my fingerprint on multiple websites, and I had a unique fingerprint even with javascript disabled. So in other words, despite following the best privacy and security advice of:
- using Tor Browser
- disabling javascript
- keeping software updated
My online habits have been tracked for over a year. Even if Duckduckgo or Startpage doesn’t fingerprint users, Reddit sure does (to detect ban evasions, etc), and we all know 90% of searches lead to Reddit, and that Reddit sells data to Google. So I have been browsing the web for over a year with a false sense of security, all the while most of my browsing was linked to a single identity, and that much data is more than enough to link it to my real identity.
How was I supposed to catch this? Manually check the About page of my browser to make sure the number keeps incrementing? Browse the Github issue tracker before bed? Is all this privacy and security advice actually good, or does it just give people a false sense of security, when in reality the software isn’t maintained enough for those recommendations to make a difference? Sorry for the rant, it’s just all so tiring.
Edit: I want to clarify that this is not an attack on the lone dev maintaining the Tor Browser flatpak. They mention in the issue that they were fairly busy last year. I just wanted to know how other people handled this issue.
😬
Could be worth sharing this around so more people are aware of it. !privacy@lemmy.dbzer0.com and !opensource@programming.dev maybe? I can cross post it myself, but I’m not as familiar with the topic to respond to comments/questions
Done, reposted to linux@lemmy.ml and privacy@lemmy.dbzer0.com. Though maybe linux@lemmy.ml was unnecessary because this post is already on the lemmy.ml instance…
Thanks!
I think it’s still helpful for people that primarily use the subscribed feed, in case they are subscribed to !linux@lemmy.ml, but not !privacy@lemmy.ml
On the face of it, that is a massive own goal. TOR project surely has a fediverse account or a blog or something to announce these things. This should be common knowledge.
Are you saying that this bug would have been reported there? I don’t think I ever saw it, and I honestly doubt it was ever posted there. Unless you’re talking about the browser update announcements, but I would still need to check the Help > About page of my browser to notice that it didn’t match the latest version. As mentioned in my post, the Flatpak was updating like usual, the updates just weren’t affecting the browser.
Really, the main reason I made the post was to see if anybody else was affected, and see how other people avoided the bug. And aside from one other user, it really seems like nobody else was affected, which is surprising to me. The only reasons I can come up with are:
- nobody installs Tor Browser using the Flatpak
- everybody manually checks their browser versions
- everybody installed or re-installed Tor Browser within the last year
Based on the comments I suspect #1 is the main cause. Which makes me lose trust in Flatpaks quite a bit. After all, if nobody is using them, then maintainers have less incentive to maintain them, and the worse they get.
No, no, I’m saying it should have been reported there and I don’t get why they didn’t share it.
Ah my mistake, yes a social media post or blog post from them would have been nice
It has been fixed for a while for new installs, bit I agree, there should have been some kind of notification, that manual intervention is required. It was even mentioned in the bug report, so I don’t know why the dev neglected to implement the notification
It sounds as though you were aware of this bug already. How did you find out? Did you notice it yourself or was there a notification somewhere?
Ah sry, i just read through the bug report to get a grasp of the timeline.
yeah that’s a pretty huge yikes.
Flatpaks have always been really buggy for me. Most of them require at least some amount of tinkering in flatseal to get them running properly, others require some amount of specialized care. I find if you need something running properly and cannot afford hidden bugs then it’s best to try to get something made for your distro if possible.
I’ve had the opposite experience, and started using Flatpaks after running into dependency conflicts once or twice when updating my system. Though I admit I’ve run into bugs with Flatpaks as well, just nothing as painful as a dependency conflict.
Probably depends on distro i guess. I use manjaro and all the official packages are really clean on my system, but as soon as an aur package fails to build then the pain begins.
I think Tor Project is implementing a better version of Linux package. The current Flatpak one is more of a Python wrapper to download the browser rather than an actual browser. It was developed by an independent open source developer later took over by Tor Project since it was very popular. Hopefully it will be fixed in future.
I hope so, Flatpaks are becoming the default way of installing packages, especially with the rise of atomic distros.
I’m not a Tor user, so please forgive my ignorance. Why would you say the browser being outdated means you were being tracked?
It’s impossible to know for sure whether you are tracked or not, but even the most basic fingerprinting mechanisms check browser version, and Reddit has advanced fingerprinting mechanisms to detect ban evasion. Couple that with the fact that 90% of my searches led me to Reddit, and it’s easy to conclude that Reddit correlated all my visits using my fingerprint, and thus has a history of all the things I have searched and been interested in for the past year, and sold that to Google. And Google has enough data on me from back when I used to use Google services, that they were probably able to link that activity to my real identity.
Removed by mod