Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Privacy
  3. Was anybody else just burned by the Tor Browser flatpak?

Was anybody else just burned by the Tor Browser flatpak?

Scheduled Pinned Locked Moved Privacy
privacy
36 Posts 13 Posters 2 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • N [email protected]

    And by burned, I mean "realize they have been burning for over a year". I'm referring to a bug in the Tor Browser flatpak that prevented the launcher from updating the actual browser, despite the launcher itself updating every week or so. The fix requires manual intervention, and this was never communicated to users. The browser itself also doesn't alert the user that it is outdated. The only reason I found out today was because the NoScript extension broke due to the browser being so old.

    To make matters worse, the outdated version of the browser that I had, differs from the outdated version reported in the Github thread. In other words, if you were hoping that at least everybody affected by the bug would be stuck at the same version (and thus have the same fingerprint), that doesn't seem to be the case.

    This is an extreme fingerprinting vulnerability. In fact I checked my fingerprint on multiple websites, and I had a unique fingerprint even with javascript disabled. So in other words, despite following the best privacy and security advice of:

    1. using Tor Browser
    2. disabling javascript
    3. keeping software updated

    My online habits have been tracked for over a year. Even if Duckduckgo or Startpage doesn't fingerprint users, Reddit sure does (to detect ban evasions, etc), and we all know 90% of searches lead to Reddit, and that Reddit sells data to Google. So I have been browsing the web for over a year with a false sense of security, all the while most of my browsing was linked to a single identity, and that much data is more than enough to link it to my real identity.

    How was I supposed to catch this? Manually check the About page of my browser to make sure the number keeps incrementing? Browse the Github issue tracker before bed? Is all this privacy and security advice actually good, or does it just give people a false sense of security, when in reality the software isn't maintained enough for those recommendations to make a difference? Sorry for the rant, it's just all so tiring.

    F This user is from outside of this forum
    F This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #14

    Flatpaks have always been really buggy for me. Most of them require at least some amount of tinkering in flatseal to get them running properly, others require some amount of specialized care. I find if you need something running properly and cannot afford hidden bugs then it's best to try to get something made for your distro if possible.

    N 1 Reply Last reply
    0
    • N [email protected]

      Not to mention:

      • better isolation between apps, no dependency conflicts
      • ability to rollback to previous versions
      • easily set environment variables and other launch options persistently
      • transactional updates so if something weird happens during an update, the flatpak won't be left in a corrupted state
      L This user is from outside of this forum
      L This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #15
      • ability to rollback to previous versions

      I think apt handles this, as well, no?

      All the other reasons are very valid, though!
      Especially the transactional updates!

      N 1 Reply Last reply
      0
      • N [email protected]

        And by burned, I mean "realize they have been burning for over a year". I'm referring to a bug in the Tor Browser flatpak that prevented the launcher from updating the actual browser, despite the launcher itself updating every week or so. The fix requires manual intervention, and this was never communicated to users. The browser itself also doesn't alert the user that it is outdated. The only reason I found out today was because the NoScript extension broke due to the browser being so old.

        To make matters worse, the outdated version of the browser that I had, differs from the outdated version reported in the Github thread. In other words, if you were hoping that at least everybody affected by the bug would be stuck at the same version (and thus have the same fingerprint), that doesn't seem to be the case.

        This is an extreme fingerprinting vulnerability. In fact I checked my fingerprint on multiple websites, and I had a unique fingerprint even with javascript disabled. So in other words, despite following the best privacy and security advice of:

        1. using Tor Browser
        2. disabling javascript
        3. keeping software updated

        My online habits have been tracked for over a year. Even if Duckduckgo or Startpage doesn't fingerprint users, Reddit sure does (to detect ban evasions, etc), and we all know 90% of searches lead to Reddit, and that Reddit sells data to Google. So I have been browsing the web for over a year with a false sense of security, all the while most of my browsing was linked to a single identity, and that much data is more than enough to link it to my real identity.

        How was I supposed to catch this? Manually check the About page of my browser to make sure the number keeps incrementing? Browse the Github issue tracker before bed? Is all this privacy and security advice actually good, or does it just give people a false sense of security, when in reality the software isn't maintained enough for those recommendations to make a difference? Sorry for the rant, it's just all so tiring.

        leraje@lemmy.blahaj.zoneL This user is from outside of this forum
        leraje@lemmy.blahaj.zoneL This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #16

        On the face of it, that is a massive own goal. TOR project surely has a fediverse account or a blog or something to announce these things. This should be common knowledge.

        N 1 Reply Last reply
        0
        • S [email protected]

          I don't understand the hate for flatpak. I wouldn't even be on Linux if it wasn't for flatpaks. I tried to switch many times over the years and it was such a PITA. With flatpaks I made the switch about a year ago and it finally stuck. Even got my wife to switch.

          9 This user is from outside of this forum
          9 This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #17

          There are quite a few reasons to avoid flatpaks tbh.

          • You have no control over the dependencies. A flatpack can include a very old dependency and there is nothing you can do about it. You are at the mercy of the developer.

          • Many Flatpak applications available on flathub. Do not rely on the provided process isolation without first reviewing the related flatpak permission manifest for common sandbox escape issues.

          • Running untrusted code is never safe; sandboxing cannot change this. It can be a false sense of security.

          • It is generally not a good idea to run unattended updates via systemd, as the applications can get new permissions without the user aware of the changes. See this blogpost for examples

          • Flatpak does not run on the linux-hardened kernel unless you do additional kernel modifications that could have negative security implications.

          S jackbydev@programming.devJ 2 Replies Last reply
          0
          • leraje@lemmy.blahaj.zoneL [email protected]

            On the face of it, that is a massive own goal. TOR project surely has a fediverse account or a blog or something to announce these things. This should be common knowledge.

            N This user is from outside of this forum
            N This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #18

            Are you saying that this bug would have been reported there? I don't think I ever saw it, and I honestly doubt it was ever posted there. Unless you're talking about the browser update announcements, but I would still need to check the Help > About page of my browser to notice that it didn't match the latest version. As mentioned in my post, the Flatpak was updating like usual, the updates just weren't affecting the browser.

            Really, the main reason I made the post was to see if anybody else was affected, and see how other people avoided the bug. And aside from one other user, it really seems like nobody else was affected, which is surprising to me. The only reasons I can come up with are:

            1. nobody installs Tor Browser using the Flatpak
            2. everybody manually checks their browser versions
            3. everybody installed or re-installed Tor Browser within the last year

            Based on the comments I suspect #1 is the main cause. Which makes me lose trust in Flatpaks quite a bit. After all, if nobody is using them, then maintainers have less incentive to maintain them, and the worse they get.

            leraje@lemmy.blahaj.zoneL 1 Reply Last reply
            0
            • L [email protected]
              • ability to rollback to previous versions

              I think apt handles this, as well, no?

              All the other reasons are very valid, though!
              Especially the transactional updates!

              N This user is from outside of this forum
              N This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #19

              Technically rollbacks are possible using regular packages, but in practice multiple packages will share dependencies and prevent you from downgrading just one of them. This is why it's important that Flatpaks isolate dependencies between apps.

              L 1 Reply Last reply
              0
              • U [email protected]

                It has been fixed for a while for new installs, bit I agree, there should have been some kind of notification, that manual intervention is required. It was even mentioned in the bug report, so I don’t know why the dev neglected to implement the notification

                N This user is from outside of this forum
                N This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #20

                It sounds as though you were aware of this bug already. How did you find out? Did you notice it yourself or was there a notification somewhere?

                U 1 Reply Last reply
                0
                • F [email protected]

                  Flatpaks have always been really buggy for me. Most of them require at least some amount of tinkering in flatseal to get them running properly, others require some amount of specialized care. I find if you need something running properly and cannot afford hidden bugs then it's best to try to get something made for your distro if possible.

                  N This user is from outside of this forum
                  N This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #21

                  I've had the opposite experience, and started using Flatpaks after running into dependency conflicts once or twice when updating my system. Though I admit I've run into bugs with Flatpaks as well, just nothing as painful as a dependency conflict.

                  F 1 Reply Last reply
                  0
                  • N [email protected]

                    I've had the opposite experience, and started using Flatpaks after running into dependency conflicts once or twice when updating my system. Though I admit I've run into bugs with Flatpaks as well, just nothing as painful as a dependency conflict.

                    F This user is from outside of this forum
                    F This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #22

                    Probably depends on distro i guess. I use manjaro and all the official packages are really clean on my system, but as soon as an aur package fails to build then the pain begins.

                    1 Reply Last reply
                    0
                    • N [email protected]

                      Are you saying that this bug would have been reported there? I don't think I ever saw it, and I honestly doubt it was ever posted there. Unless you're talking about the browser update announcements, but I would still need to check the Help > About page of my browser to notice that it didn't match the latest version. As mentioned in my post, the Flatpak was updating like usual, the updates just weren't affecting the browser.

                      Really, the main reason I made the post was to see if anybody else was affected, and see how other people avoided the bug. And aside from one other user, it really seems like nobody else was affected, which is surprising to me. The only reasons I can come up with are:

                      1. nobody installs Tor Browser using the Flatpak
                      2. everybody manually checks their browser versions
                      3. everybody installed or re-installed Tor Browser within the last year

                      Based on the comments I suspect #1 is the main cause. Which makes me lose trust in Flatpaks quite a bit. After all, if nobody is using them, then maintainers have less incentive to maintain them, and the worse they get.

                      leraje@lemmy.blahaj.zoneL This user is from outside of this forum
                      leraje@lemmy.blahaj.zoneL This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #23

                      No, no, I'm saying it should have been reported there and I don't get why they didn't share it.

                      N 1 Reply Last reply
                      0
                      • leraje@lemmy.blahaj.zoneL [email protected]

                        No, no, I'm saying it should have been reported there and I don't get why they didn't share it.

                        N This user is from outside of this forum
                        N This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #24

                        Ah my mistake, yes a social media post or blog post from them would have been nice

                        1 Reply Last reply
                        0
                        • 9 [email protected]

                          There are quite a few reasons to avoid flatpaks tbh.

                          • You have no control over the dependencies. A flatpack can include a very old dependency and there is nothing you can do about it. You are at the mercy of the developer.

                          • Many Flatpak applications available on flathub. Do not rely on the provided process isolation without first reviewing the related flatpak permission manifest for common sandbox escape issues.

                          • Running untrusted code is never safe; sandboxing cannot change this. It can be a false sense of security.

                          • It is generally not a good idea to run unattended updates via systemd, as the applications can get new permissions without the user aware of the changes. See this blogpost for examples

                          • Flatpak does not run on the linux-hardened kernel unless you do additional kernel modifications that could have negative security implications.

                          S This user is from outside of this forum
                          S This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #25

                          Sure, but I came from Windows. Is the security situation better over there? Flatpaks just work. I only install verified flatpaks, and I remove most permissions with flatseal before even launching it.

                          9 1 Reply Last reply
                          0
                          • S [email protected]

                            Sure, but I came from Windows. Is the security situation better over there? Flatpaks just work. I only install verified flatpaks, and I remove most permissions with flatseal before even launching it.

                            9 This user is from outside of this forum
                            9 This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #26

                            If your distro doesn't work unless you use Flatpaks, then stick to flatpaks ig

                            1 Reply Last reply
                            0
                            • N [email protected]

                              It sounds as though you were aware of this bug already. How did you find out? Did you notice it yourself or was there a notification somewhere?

                              U This user is from outside of this forum
                              U This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #27

                              Ah sry, i just read through the bug report to get a grasp of the timeline.

                              1 Reply Last reply
                              1
                              0
                              • N [email protected]

                                Technically rollbacks are possible using regular packages, but in practice multiple packages will share dependencies and prevent you from downgrading just one of them. This is why it's important that Flatpaks isolate dependencies between apps.

                                L This user is from outside of this forum
                                L This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #28

                                Thanks for the clear explanation!

                                1 Reply Last reply
                                0
                                • 9 [email protected]

                                  There are quite a few reasons to avoid flatpaks tbh.

                                  • You have no control over the dependencies. A flatpack can include a very old dependency and there is nothing you can do about it. You are at the mercy of the developer.

                                  • Many Flatpak applications available on flathub. Do not rely on the provided process isolation without first reviewing the related flatpak permission manifest for common sandbox escape issues.

                                  • Running untrusted code is never safe; sandboxing cannot change this. It can be a false sense of security.

                                  • It is generally not a good idea to run unattended updates via systemd, as the applications can get new permissions without the user aware of the changes. See this blogpost for examples

                                  • Flatpak does not run on the linux-hardened kernel unless you do additional kernel modifications that could have negative security implications.

                                  jackbydev@programming.devJ This user is from outside of this forum
                                  jackbydev@programming.devJ This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #29

                                  Most of those points are true for non flatpak things as well though.

                                  9 1 Reply Last reply
                                  0
                                  • jackbydev@programming.devJ [email protected]

                                    Most of those points are true for non flatpak things as well though.

                                    9 This user is from outside of this forum
                                    9 This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #30

                                    Care to explain?

                                    jackbydev@programming.devJ 1 Reply Last reply
                                    0
                                    • 9 [email protected]

                                      Care to explain?

                                      jackbydev@programming.devJ This user is from outside of this forum
                                      jackbydev@programming.devJ This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #31

                                      Non flatpak things aren't sandboxed either.

                                      9 1 Reply Last reply
                                      0
                                      • N [email protected]

                                        And by burned, I mean "realize they have been burning for over a year". I'm referring to a bug in the Tor Browser flatpak that prevented the launcher from updating the actual browser, despite the launcher itself updating every week or so. The fix requires manual intervention, and this was never communicated to users. The browser itself also doesn't alert the user that it is outdated. The only reason I found out today was because the NoScript extension broke due to the browser being so old.

                                        To make matters worse, the outdated version of the browser that I had, differs from the outdated version reported in the Github thread. In other words, if you were hoping that at least everybody affected by the bug would be stuck at the same version (and thus have the same fingerprint), that doesn't seem to be the case.

                                        This is an extreme fingerprinting vulnerability. In fact I checked my fingerprint on multiple websites, and I had a unique fingerprint even with javascript disabled. So in other words, despite following the best privacy and security advice of:

                                        1. using Tor Browser
                                        2. disabling javascript
                                        3. keeping software updated

                                        My online habits have been tracked for over a year. Even if Duckduckgo or Startpage doesn't fingerprint users, Reddit sure does (to detect ban evasions, etc), and we all know 90% of searches lead to Reddit, and that Reddit sells data to Google. So I have been browsing the web for over a year with a false sense of security, all the while most of my browsing was linked to a single identity, and that much data is more than enough to link it to my real identity.

                                        How was I supposed to catch this? Manually check the About page of my browser to make sure the number keeps incrementing? Browse the Github issue tracker before bed? Is all this privacy and security advice actually good, or does it just give people a false sense of security, when in reality the software isn't maintained enough for those recommendations to make a difference? Sorry for the rant, it's just all so tiring.

                                        C This user is from outside of this forum
                                        C This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #32

                                        I downloaded the tor browser binary which runs standalone. Why does it need to be a flatpak?

                                        N 1 Reply Last reply
                                        0
                                        • jackbydev@programming.devJ [email protected]

                                          Non flatpak things aren't sandboxed either.

                                          9 This user is from outside of this forum
                                          9 This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #33

                                          Not entirely true. There is other sandbox software out there (such as firejail, distrobox, docker, bubblejail, any VM products, etc) although they should also be cautious about claiming to be more secure. Flatpak, however, is not considered a sandbox by some.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups