We found a stable Firefox identifier linking all your private Tor identities
Tor Browser & Firefox Response
- Commenters note Tor Browser quickly rebases on Firefox ESR; an updated Tor Browser was released the day after Mozilla’s fix.
- Some see this as evidence of a healthy responsible-disclosure process; others criticize the article’s alarmist title given the bug’s limited lifetime (process only, reset on restart).
Nature and Impact of the Vulnerability
- Identifier is:
- Process-scoped, not machine/profile persistent.
- Shared across origins via a global mapping of database names to UUIDs.
- Stable for the lifetime of the Firefox/Tor Browser process and survives “New Identity” in Tor Browser.
- Key risk: linking multiple Tor identities or private/public sessions within the same browser process; several note this is serious for high-risk users but not a “forever ID.”
Ethics and Business of Fingerprinting
- Debate over why a fingerprinting company would disclose:
- One side: disclosure builds trust, avoids depending on a single bug, and denies competitors an advantage.
- Others suspect marketing or downplay the severity.
- Some argue all fingerprinting is inherently exploitative and should be treated as a vulnerability; others distinguish between “side effects of normal APIs” and true bugs.
Fingerprinting vs. Vulnerabilities
- Long back-and-forth over whether fingerprinting equals “exploiting a bug.”
- One camp: any non–opt-in identifier is a privacy vulnerability.
- Another: using exposed info (headers, fonts, canvas) is not automatically an exploit unless it bypasses explicit technical countermeasures.
Mitigations & Opsec Practices (Tor, Qubes, Tails, JS)
- IndexedDB ID is cleared on full browser restart; several emphasize always closing Tor Browser between distinct identities.
- Tails (without persistence) and fresh disposable VMs are highlighted as strong mitigations; however:
- Misuse of Qubes (reusing the same disposable VM) remains vulnerable; separate VMs per identity are required.
- JavaScript:
- Some say disabling JS increases fingerprint uniqueness but removes many tracking vectors.
- Others argue Tor should default to JS off; disagreement remains on the net benefit.
Browser Design, Web Standards, and Permissions
- Many criticize expanding web APIs (IndexedDB, canvas, etc.) as fingerprinting surface with marginal user benefit.
- Suggestions:
- Stricter origin scoping and permission prompts for potentially identifying APIs.
- Standardized or randomized responses for fonts, timezones, window size.
- “Ultra-minimal” or read-only browsers with no storage, JS, or forms, though others note this itself becomes a niche, fingerprintable profile.
User Attitudes, Tracking, and Law
- Discussion on whether “most users don’t care” about tracking:
- Some argue users are unaware or feel powerless, not truly indifferent.
- Others point to support for surveillance-style legislation as evidence of low concern.
- In the EU context, one side claims fingerprinting without consent is already illegal under GDPR; another calls for explicit bans and active anti-fingerprinting duties for browsers.
Research & Alternative Architectures
- Commenters mention active academic work on fingerprinting at privacy conferences and anonymization bibliographies.
- Remote browser isolation / “browser in a box” setups are proposed as another way to keep state ephemeral and off the user’s machine, though trade-offs and trust issues are noted.