-
-
Notifications
You must be signed in to change notification settings - Fork 207
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Great browser re-write-reboot #298
Comments
I'd be in favour of making a general requirement that all software needs a good vunerability disclosure protocal/bug bounty program. We can use the open source guidelines from #24 :
Otherwise seems pretty good 👍🏼 |
At this point I'm also thinking we'll strip the fingerprinting section as that is horribly out of date. |
Here is my proposal:
Librewolf already bundles in ublock origin and containers by default. This makes the recommendation for those extensions unnecessary, and there will be fewer variations between different Librewolf installations. It still should be noted that bundling in ublock origin weakens site isolation, but site isolation isn't even enabled by default upstream and most people would want an adblocker for convenience anyways, so there is little harm in recommending Librewolf over Firefox. There are 2 outstanding issues that I have made on their GitLab: If these issues are resolved, Librewolf will be fairly resistant against fingerprinting as well. If we want more security, we can recommend a set of tweaks mentioned in https://gitlab.com/librewolf-community/settings/-/blob/master/librewolf.cfg, but quite frankly, it is pretty good as is by default. We should also recommend enabling OSCP queries for additional security. There is little harm in querying for OSCP since we already recommend that everyone uses a VPN anyways. We don't even need to mention enabling HTTPS everywhere with Librewolf because it is already enabled by default.
Bromite is more fingerprinting resistant than Brave (https://fingerprintjs.com/ works just fine against Brave but has trouble fingerprinting Bromite), contains none of the unnecessary features, and includes a built in adblocker. The only thing to recommend on Bromite is to disable JIT for additional security.
|
Also, I plan to be pretty verbose in my explanation on why these browsers are recommended, just like how I did it for Android OS recommendations. |
Update: I did look at DuckDuckGo on IOS and it's apparently just Safari with a skin? I don't see the point of it so I removed it in my PR for now. |
Yeah I think we should test it and see how it performs... generally I do not think Firefox based stuff on android is a good idea because you can't escape using the chromium webview anyways... and having 2 different engines = more attack surface Tor Browser on android is not resistant at all so I am not sure if mull would handle fingerprinting well |
Very sceptical about replacing Firefox with Librewolf. Even if its up to date now, all Firefox forks I've seen like this die sooner than later because the team will move on. It takes a hell of a lot to maintain a browser properly. Firefox has Mozilla. Librewolf doesn't. |
I don't agree with not linking Tor Browser for Android just because Orbot is available. Also this leaves out a Gecko based Android browser. I also don't really like that Librewolf isn't source-built in any distros. Related: My proposal:
Mobile
|
Just my two cents regarding browsers: As long as Librewolf can deliver updates fast, it is a good alternative for people who want to use Firefox, but don't want to configure it. The only things I didn't like in their settings was RFP letterboxing set to false and the already mentioned OCSP stuff. Although I would for sure like to keep Firefox with Arkenfox and uBlockOrigin and maybe "skip redirect". On Linux using MAC should be recommended for Firefox because of their worse security compared to Chromium. On Ubuntu distributions there are ready-to-use AppArmor profiles and for Tor browser there is Tor Browser Launcher. Or use a lightweight VM. Firefox without further configuration is not an option tbh, because of no isolation (FPI or similar) and telemetry. At least a few settings need to be changed like disabling telemetry, enabling some form of isolation (e.g. ETP to strict), changing search engine and installing uBlockOrigin. I don't like Firefox browsers on Android because their sandbox is really weak and the horribly designed usability. Would completely avoid them. Or at least educate people, that this could be a problem. Only exception is Tor browser, to not stick out, despite it's weaker anti-fingerprinting (compared to desktop). Bromite is a solid browser and even GrapheneOS recommends it as their secondary browser, which is really something. Brave is also a very good browser, with a lot of privacy features built-in, which allows you to avoid extensions completly. Only very few changes advised and most of the bad stuff is opt-in, while having the better security of Chromium browsers. |
For the record, I don't think LibreWolf is a bad browser. I just am sceptical about its long-term stability in regards to updates and such.
Have been using Bromite for a while. Cannot recommend it enough. |
I just want to make this clear that I recommended librewolf because it has sane defaults for the most part, with firefox you need to install arkenfox or something, and arkenfox isn't very tolerable for most people. We need something with sane defaults for everyone to use. I would be skeptical if librewolf was new as well, but they are about a year old or more now and the project is still going well. |
@SkewedZeppelin I don't think that many people use tails in the first place, so I don't think recommending ublock with tor browser is a good idea, it just makes people stand out more As for routing normal browsers through tor... yeah, they are usually not recommended because they can be fingerprinted. The problem here is that Tor on Android is not fingerprinting resistant like it is on Desktop at all, and it inherits a lot of security deficiencies from Firefox ESR, so I don't even know what the proper approach should be here. |
@PhysicsIsAwesome Brave is not as resistant as Bromite (as I explained in my proposal), and it just contains a lot of unnecessary stuff that increases the attack surface. I just see no reason why anyone should ever use Brave over Bromite |
I don't have that much experience with Brave on mobile. I should have made clear, that I mainly meant the desktop version. If you mean by "failing", that you get the same ID by revisiting on fingerprintjs, then on my smartphone, I get the same ID on revisit for both Brave and Bromite (cleared website data, cookies and changed IP). However, there are two ways how to not fail such a test. First by changing ID, second by sharing your ID with a lot of other users. The second one is not as easily verifiable as the first one, since you rely on other users to do the same. And tbh for more advanced fingerprinting tests, like a combination of creepjs and browserleaks.com, all browsers fail for the first category, but some succeed for the second. Maybe I will write more about fingerprinting next time. |
Strange. I does not manage to fingerprint bromite for me. Do you have JIT enabled? |
You could also get the same ID on such a test, because the test is not good enough. As an example the script could only detect that you use Brave on Android with fingerprinting resistance set to strict and give every user with this config the same ID. Then you revisit and think, fuck it fingerprinted my browser successfully, but in fact it didn't. Long story short, these test sites have to be handled with care. |
Yes |
No, I did test it with other Brave users. Each of us got a different ID. Could you disable JIT on Bromite and test again? |
Same result. No change in ID. I still haven't come to a conclusion, how important browser fingerprinting is in the wild. Especially on smartphones, which are way more homogeneous (same device type number usually gets sold a lot of times (100.000 to 10s of millions) and has the same hardware and same OS (including version, assuming most people update properly)) than desktop computers, where you simply can install a different OS, or change parts of your hardware or simple things like screen resolution or install fonts. Tracking by browser fingerprinting is also (as far as I know) legally prohibited by GDPR as long as you click on the cookie banners "allow only necessary" (then it's only allowed for security measures). If I understood Arkenfox correctly, he says that there are just too many other easier ways to track aside from fingerprinting, that have proven to work reliably for years for the vast majority of browsers and that tracking by advanced fingerprinting may simply not be economical enough (see this comment). Considering this, it should take priority to take care of the other tracking mechanisms first and anti-fingerprinting second. |
I would question recommending Librewolf over Firefox. Librewolf maintainers doesn't seem "techy" enough to decide what should be configured and what not. Just to quote a comment:
They continued the discussion in another issue (arkenfox/user.js#1218), and here's his summary:
Some other resources that might be helpful: |
One thing I don't understand, why would you recommend Apple users to use Safari (because they're already trusting a closed source OS and Webkit is open-source), and not advice Windows users to use Microsoft edge (also trusting a closed source OS and Chromium is open-source)? |
Actually all the browsers in ios (other than safari ) are just colored skin of safari itself . That's why |
outdated and no longer relevant For the record @fxbrit and myself have been working together behind the scenes since then (it'll be seven months next week). Most changes (in LW) have come from fxbrit (and the other LW team members) taking on board that initial criticism, and cleaning it up themselves - i.e deprecated prefs, redundant prefs, some silly ones, etc. Right now the differences between AF and LW are minimal Of active prefs that flip from default values (and excluding a bunch for reasons [1])
most of those aren't really consequential, but we do intend to go through them. AF (94-alpha) flips 154 prefs (total). LW flips approx Also, and I can't stress this enough: fxbrit does his OWN research (and ultimately comes to the same conclusions) and is just as knowledgeable and capable as any girl - in fact, we have benefited from each other's discussions, and I consider him to be a very cool fish [1] items not considered:
|
That in itself isn't the reason. If that were the case then it would just be a matter of preference. The reason is it's better to share data with Apple than Apple + a 3rd party. |
There is way more to browser privacy than involving a third party as browser vendor, which usually doesn't matter since you can disable telemetry on most browsers. What is Edge doing to prevent Cross-Origin Identifier Linkability and Cross-Origin Fingerprinting Linkability ? |
That involves trusting that it will actually respect your wish and stop telemetry, but fair. |
Description
This is mostly a tracking issue, as this page has been out of date for quite some time. There are threads on here, the old privacytools issue tracker and the discussions tab such as:
Closes: privacytools/privacytools.io#2081
Closes: privacytools/privacytools.io#2184
Closes: #69
Closes: #243
Closes: #245
Closes: #246
Closes: #261
Closes: https://github.com/privacyguides/privacyguides.org/discussions/59
Closes: https://github.com/privacyguides/privacyguides.org/discussions/90
Closes: https://github.com/privacyguides/privacyguides.org/discussions/88
Closes: https://github.com/privacyguides/privacyguides.org/discussions/124
Closes: https://github.com/privacyguides/privacyguides.org/discussions/231
The new browser page is going to be more instructional and split into two main sections, Firefox and Chromium. Under that we anticipate a Desktop and Mobile subheading with specific recommendations and instructions for those recommendations.
General information will be before both sections.
Chromium based browsers
Desktop
Mobile
Gecko based browsers
Desktop
Mobile
Criteria
The text was updated successfully, but these errors were encountered: