Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Privacy
  3. Was anybody else just burned by the Tor Browser flatpak?

Was anybody else just burned by the Tor Browser flatpak?

Scheduled Pinned Locked Moved Privacy
privacy
36 Posts 13 Posters 2 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • N [email protected]

    Done, reposted to [email protected] and [email protected]. Though maybe [email protected] was unnecessary because this post is already on the lemmy.ml instance...

    otter@lemmy.caO This user is from outside of this forum
    otter@lemmy.caO This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #8

    Thanks!

    I think it's still helpful for people that primarily use the subscribed feed, in case they are subscribed to [email protected], but not [email protected]

    1 Reply Last reply
    0
    • 9 [email protected]

      What are the benefits of flatpacks? Like why not just install the actual Tor browser on your system? The one that is released and maintained by The Tor Project?

      T This user is from outside of this forum
      T This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #9

      Flatland are supposed to be cross-distro. Maintainers only have one package to look after instead of several

      L 1 Reply Last reply
      0
      • T [email protected]

        Flatland are supposed to be cross-distro. Maintainers only have one package to look after instead of several

        L This user is from outside of this forum
        L This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #10

        And they give you more control over the permissions that you give the application; packages from apt, yay, etc. get full filesystem access by default even if they contain a bug or malicious code, flatpaks can be walled off by you very well.

        N 1 Reply Last reply
        0
        • L [email protected]

          And they give you more control over the permissions that you give the application; packages from apt, yay, etc. get full filesystem access by default even if they contain a bug or malicious code, flatpaks can be walled off by you very well.

          N This user is from outside of this forum
          N This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #11

          Not to mention:

          • better isolation between apps, no dependency conflicts
          • ability to rollback to previous versions
          • easily set environment variables and other launch options persistently
          • transactional updates so if something weird happens during an update, the flatpak won't be left in a corrupted state
          S L 2 Replies Last reply
          0
          • N [email protected]

            And by burned, I mean "realize they have been burning for over a year". I'm referring to a bug in the Tor Browser flatpak that prevented the launcher from updating the actual browser, despite the launcher itself updating every week or so. The fix requires manual intervention, and this was never communicated to users. The browser itself also doesn't alert the user that it is outdated. The only reason I found out today was because the NoScript extension broke due to the browser being so old.

            To make matters worse, the outdated version of the browser that I had, differs from the outdated version reported in the Github thread. In other words, if you were hoping that at least everybody affected by the bug would be stuck at the same version (and thus have the same fingerprint), that doesn't seem to be the case.

            This is an extreme fingerprinting vulnerability. In fact I checked my fingerprint on multiple websites, and I had a unique fingerprint even with javascript disabled. So in other words, despite following the best privacy and security advice of:

            1. using Tor Browser
            2. disabling javascript
            3. keeping software updated

            My online habits have been tracked for over a year. Even if Duckduckgo or Startpage doesn't fingerprint users, Reddit sure does (to detect ban evasions, etc), and we all know 90% of searches lead to Reddit, and that Reddit sells data to Google. So I have been browsing the web for over a year with a false sense of security, all the while most of my browsing was linked to a single identity, and that much data is more than enough to link it to my real identity.

            How was I supposed to catch this? Manually check the About page of my browser to make sure the number keeps incrementing? Browse the Github issue tracker before bed? Is all this privacy and security advice actually good, or does it just give people a false sense of security, when in reality the software isn't maintained enough for those recommendations to make a difference? Sorry for the rant, it's just all so tiring.

            U This user is from outside of this forum
            U This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #12

            It has been fixed for a while for new installs, bit I agree, there should have been some kind of notification, that manual intervention is required. It was even mentioned in the bug report, so I don’t know why the dev neglected to implement the notification

            N 1 Reply Last reply
            0
            • N [email protected]

              Not to mention:

              • better isolation between apps, no dependency conflicts
              • ability to rollback to previous versions
              • easily set environment variables and other launch options persistently
              • transactional updates so if something weird happens during an update, the flatpak won't be left in a corrupted state
              S This user is from outside of this forum
              S This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #13

              I don't understand the hate for flatpak. I wouldn't even be on Linux if it wasn't for flatpaks. I tried to switch many times over the years and it was such a PITA. With flatpaks I made the switch about a year ago and it finally stuck. Even got my wife to switch.

              9 1 Reply Last reply
              0
              • N [email protected]

                And by burned, I mean "realize they have been burning for over a year". I'm referring to a bug in the Tor Browser flatpak that prevented the launcher from updating the actual browser, despite the launcher itself updating every week or so. The fix requires manual intervention, and this was never communicated to users. The browser itself also doesn't alert the user that it is outdated. The only reason I found out today was because the NoScript extension broke due to the browser being so old.

                To make matters worse, the outdated version of the browser that I had, differs from the outdated version reported in the Github thread. In other words, if you were hoping that at least everybody affected by the bug would be stuck at the same version (and thus have the same fingerprint), that doesn't seem to be the case.

                This is an extreme fingerprinting vulnerability. In fact I checked my fingerprint on multiple websites, and I had a unique fingerprint even with javascript disabled. So in other words, despite following the best privacy and security advice of:

                1. using Tor Browser
                2. disabling javascript
                3. keeping software updated

                My online habits have been tracked for over a year. Even if Duckduckgo or Startpage doesn't fingerprint users, Reddit sure does (to detect ban evasions, etc), and we all know 90% of searches lead to Reddit, and that Reddit sells data to Google. So I have been browsing the web for over a year with a false sense of security, all the while most of my browsing was linked to a single identity, and that much data is more than enough to link it to my real identity.

                How was I supposed to catch this? Manually check the About page of my browser to make sure the number keeps incrementing? Browse the Github issue tracker before bed? Is all this privacy and security advice actually good, or does it just give people a false sense of security, when in reality the software isn't maintained enough for those recommendations to make a difference? Sorry for the rant, it's just all so tiring.

                F This user is from outside of this forum
                F This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #14

                Flatpaks have always been really buggy for me. Most of them require at least some amount of tinkering in flatseal to get them running properly, others require some amount of specialized care. I find if you need something running properly and cannot afford hidden bugs then it's best to try to get something made for your distro if possible.

                N 1 Reply Last reply
                0
                • N [email protected]

                  Not to mention:

                  • better isolation between apps, no dependency conflicts
                  • ability to rollback to previous versions
                  • easily set environment variables and other launch options persistently
                  • transactional updates so if something weird happens during an update, the flatpak won't be left in a corrupted state
                  L This user is from outside of this forum
                  L This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #15
                  • ability to rollback to previous versions

                  I think apt handles this, as well, no?

                  All the other reasons are very valid, though!
                  Especially the transactional updates!

                  N 1 Reply Last reply
                  0
                  • N [email protected]

                    And by burned, I mean "realize they have been burning for over a year". I'm referring to a bug in the Tor Browser flatpak that prevented the launcher from updating the actual browser, despite the launcher itself updating every week or so. The fix requires manual intervention, and this was never communicated to users. The browser itself also doesn't alert the user that it is outdated. The only reason I found out today was because the NoScript extension broke due to the browser being so old.

                    To make matters worse, the outdated version of the browser that I had, differs from the outdated version reported in the Github thread. In other words, if you were hoping that at least everybody affected by the bug would be stuck at the same version (and thus have the same fingerprint), that doesn't seem to be the case.

                    This is an extreme fingerprinting vulnerability. In fact I checked my fingerprint on multiple websites, and I had a unique fingerprint even with javascript disabled. So in other words, despite following the best privacy and security advice of:

                    1. using Tor Browser
                    2. disabling javascript
                    3. keeping software updated

                    My online habits have been tracked for over a year. Even if Duckduckgo or Startpage doesn't fingerprint users, Reddit sure does (to detect ban evasions, etc), and we all know 90% of searches lead to Reddit, and that Reddit sells data to Google. So I have been browsing the web for over a year with a false sense of security, all the while most of my browsing was linked to a single identity, and that much data is more than enough to link it to my real identity.

                    How was I supposed to catch this? Manually check the About page of my browser to make sure the number keeps incrementing? Browse the Github issue tracker before bed? Is all this privacy and security advice actually good, or does it just give people a false sense of security, when in reality the software isn't maintained enough for those recommendations to make a difference? Sorry for the rant, it's just all so tiring.

                    leraje@lemmy.blahaj.zoneL This user is from outside of this forum
                    leraje@lemmy.blahaj.zoneL This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #16

                    On the face of it, that is a massive own goal. TOR project surely has a fediverse account or a blog or something to announce these things. This should be common knowledge.

                    N 1 Reply Last reply
                    0
                    • S [email protected]

                      I don't understand the hate for flatpak. I wouldn't even be on Linux if it wasn't for flatpaks. I tried to switch many times over the years and it was such a PITA. With flatpaks I made the switch about a year ago and it finally stuck. Even got my wife to switch.

                      9 This user is from outside of this forum
                      9 This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #17

                      There are quite a few reasons to avoid flatpaks tbh.

                      • You have no control over the dependencies. A flatpack can include a very old dependency and there is nothing you can do about it. You are at the mercy of the developer.

                      • Many Flatpak applications available on flathub. Do not rely on the provided process isolation without first reviewing the related flatpak permission manifest for common sandbox escape issues.

                      • Running untrusted code is never safe; sandboxing cannot change this. It can be a false sense of security.

                      • It is generally not a good idea to run unattended updates via systemd, as the applications can get new permissions without the user aware of the changes. See this blogpost for examples

                      • Flatpak does not run on the linux-hardened kernel unless you do additional kernel modifications that could have negative security implications.

                      S jackbydev@programming.devJ 2 Replies Last reply
                      0
                      • leraje@lemmy.blahaj.zoneL [email protected]

                        On the face of it, that is a massive own goal. TOR project surely has a fediverse account or a blog or something to announce these things. This should be common knowledge.

                        N This user is from outside of this forum
                        N This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #18

                        Are you saying that this bug would have been reported there? I don't think I ever saw it, and I honestly doubt it was ever posted there. Unless you're talking about the browser update announcements, but I would still need to check the Help > About page of my browser to notice that it didn't match the latest version. As mentioned in my post, the Flatpak was updating like usual, the updates just weren't affecting the browser.

                        Really, the main reason I made the post was to see if anybody else was affected, and see how other people avoided the bug. And aside from one other user, it really seems like nobody else was affected, which is surprising to me. The only reasons I can come up with are:

                        1. nobody installs Tor Browser using the Flatpak
                        2. everybody manually checks their browser versions
                        3. everybody installed or re-installed Tor Browser within the last year

                        Based on the comments I suspect #1 is the main cause. Which makes me lose trust in Flatpaks quite a bit. After all, if nobody is using them, then maintainers have less incentive to maintain them, and the worse they get.

                        leraje@lemmy.blahaj.zoneL 1 Reply Last reply
                        0
                        • L [email protected]
                          • ability to rollback to previous versions

                          I think apt handles this, as well, no?

                          All the other reasons are very valid, though!
                          Especially the transactional updates!

                          N This user is from outside of this forum
                          N This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #19

                          Technically rollbacks are possible using regular packages, but in practice multiple packages will share dependencies and prevent you from downgrading just one of them. This is why it's important that Flatpaks isolate dependencies between apps.

                          L 1 Reply Last reply
                          0
                          • U [email protected]

                            It has been fixed for a while for new installs, bit I agree, there should have been some kind of notification, that manual intervention is required. It was even mentioned in the bug report, so I don’t know why the dev neglected to implement the notification

                            N This user is from outside of this forum
                            N This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #20

                            It sounds as though you were aware of this bug already. How did you find out? Did you notice it yourself or was there a notification somewhere?

                            U 1 Reply Last reply
                            0
                            • F [email protected]

                              Flatpaks have always been really buggy for me. Most of them require at least some amount of tinkering in flatseal to get them running properly, others require some amount of specialized care. I find if you need something running properly and cannot afford hidden bugs then it's best to try to get something made for your distro if possible.

                              N This user is from outside of this forum
                              N This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #21

                              I've had the opposite experience, and started using Flatpaks after running into dependency conflicts once or twice when updating my system. Though I admit I've run into bugs with Flatpaks as well, just nothing as painful as a dependency conflict.

                              F 1 Reply Last reply
                              0
                              • N [email protected]

                                I've had the opposite experience, and started using Flatpaks after running into dependency conflicts once or twice when updating my system. Though I admit I've run into bugs with Flatpaks as well, just nothing as painful as a dependency conflict.

                                F This user is from outside of this forum
                                F This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #22

                                Probably depends on distro i guess. I use manjaro and all the official packages are really clean on my system, but as soon as an aur package fails to build then the pain begins.

                                1 Reply Last reply
                                0
                                • N [email protected]

                                  Are you saying that this bug would have been reported there? I don't think I ever saw it, and I honestly doubt it was ever posted there. Unless you're talking about the browser update announcements, but I would still need to check the Help > About page of my browser to notice that it didn't match the latest version. As mentioned in my post, the Flatpak was updating like usual, the updates just weren't affecting the browser.

                                  Really, the main reason I made the post was to see if anybody else was affected, and see how other people avoided the bug. And aside from one other user, it really seems like nobody else was affected, which is surprising to me. The only reasons I can come up with are:

                                  1. nobody installs Tor Browser using the Flatpak
                                  2. everybody manually checks their browser versions
                                  3. everybody installed or re-installed Tor Browser within the last year

                                  Based on the comments I suspect #1 is the main cause. Which makes me lose trust in Flatpaks quite a bit. After all, if nobody is using them, then maintainers have less incentive to maintain them, and the worse they get.

                                  leraje@lemmy.blahaj.zoneL This user is from outside of this forum
                                  leraje@lemmy.blahaj.zoneL This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #23

                                  No, no, I'm saying it should have been reported there and I don't get why they didn't share it.

                                  N 1 Reply Last reply
                                  0
                                  • leraje@lemmy.blahaj.zoneL [email protected]

                                    No, no, I'm saying it should have been reported there and I don't get why they didn't share it.

                                    N This user is from outside of this forum
                                    N This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #24

                                    Ah my mistake, yes a social media post or blog post from them would have been nice

                                    1 Reply Last reply
                                    0
                                    • 9 [email protected]

                                      There are quite a few reasons to avoid flatpaks tbh.

                                      • You have no control over the dependencies. A flatpack can include a very old dependency and there is nothing you can do about it. You are at the mercy of the developer.

                                      • Many Flatpak applications available on flathub. Do not rely on the provided process isolation without first reviewing the related flatpak permission manifest for common sandbox escape issues.

                                      • Running untrusted code is never safe; sandboxing cannot change this. It can be a false sense of security.

                                      • It is generally not a good idea to run unattended updates via systemd, as the applications can get new permissions without the user aware of the changes. See this blogpost for examples

                                      • Flatpak does not run on the linux-hardened kernel unless you do additional kernel modifications that could have negative security implications.

                                      S This user is from outside of this forum
                                      S This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #25

                                      Sure, but I came from Windows. Is the security situation better over there? Flatpaks just work. I only install verified flatpaks, and I remove most permissions with flatseal before even launching it.

                                      9 1 Reply Last reply
                                      0
                                      • S [email protected]

                                        Sure, but I came from Windows. Is the security situation better over there? Flatpaks just work. I only install verified flatpaks, and I remove most permissions with flatseal before even launching it.

                                        9 This user is from outside of this forum
                                        9 This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #26

                                        If your distro doesn't work unless you use Flatpaks, then stick to flatpaks ig

                                        1 Reply Last reply
                                        0
                                        • N [email protected]

                                          It sounds as though you were aware of this bug already. How did you find out? Did you notice it yourself or was there a notification somewhere?

                                          U This user is from outside of this forum
                                          U This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #27

                                          Ah sry, i just read through the bug report to get a grasp of the timeline.

                                          1 Reply Last reply
                                          1
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups