Home > Cyber News > Tor Browser Version 10.0.18 Fixes User Tracking Vulnerability
CYBER NEWS

Tor Browser Version 10.0.18 Fixes User Tracking Vulnerability

Tor Browser Version 10.0.18 Fixes User Tracking Vulnerability-sensorstechforum
If you are using the Tor Browser, you should get the latest update immediately. Tor Browser 10.0.18 fixes a series of issues, one of which is a vulnerability that could allow sites to track users by fingerprinting their installed apps.

Scheme Flooding Vulnerability Fixed in Tor Browser 10.0.18

The vulnerability was disclosed last month by FingerprintJS. The firm defined the issue as a “scheme flooding,” enabling user tracking across various browsers by using the apps installed on users’ devices.

“In our research into anti-fraud techniques, we have discovered a vulnerability that allows websites to identify users reliably across different desktop browsers and link their identities together. The desktop versions of Tor Browser, Safari, Chrome, and Firefox are all affected,” said FingerprintJS’s Konstantin Darutkin in an article detailing the discovery.




The researchers decided to refer to the flaw as scheme flooding, as it utilizes custom URL schemes as an attack vector. The vulnerability also uses information about the installed apps on a user’s computer so that it assigns a permanent unique identifier in case the user switches browsers, uses incognito mode, or a VPN.

Even though the scheme flooding issue affects several browsers, it seems to be especially concerning for Tor users. The reason is simple – Tor users rely on the browser to protect their identity and IP address, while this vulnerability allows user tracking across different browsers. It could also enable various sites and entities to track the user’s real IP address when they switch to a “regular” browser such as Chrome or Firefox.

Fortunately, the vulnerability has been addressed in Tor Browser 10.0.18. It is curious to mention that the Tor project fixed the privacy bug by setting the ‘network.protocol-handler.external’ setting to false.

In February 2021, another privacy bug related to the built-in Tor mode was patched in the Brave browser. The bug was spotted by bug hunter known as xiaoyinl, and reported to Brave via its HackerOne bug bounty program. The Brave browser has been famous for its built-in Tor feature. However, the privacy mode which should allow anonymous browsing on the dark web started leaking the .onion domains to DNS servers configured for non-Tor websites. This could then allow the DNS operators or other threat actors to reveal the hidden services the user required.

Not the first time the Tor browser is found prone to user fingerprinting

In March 2016, independent security researcher Jose Carlos Norte also discovered that Tor users could be fingerprinted. User fingerprinting illustrates the ways of tracking various operations and details about the user’s online habits.




As pointed out by Norte, fingerprinting is specifically threatening to the Tor user since data stored while he surfs the Web (through Tor) can be later compared to data taken from the user’s regular browser. This is what the researcher said several years ago:

One common problem that tor browser tries to address is user fingerprinting. If a website is able to generate a unique fingerprint that identifies each user that enters the page, then it is possible to track the activity of this user in time, for example, correlate visits of the user during an entire year, knowing that its the same user. Or even worse, it could be possible to identify the user if the fingerprint is the same in tor browser and in the normal browser used to browse internet. It is very important for the tor browser to prevent any attempt on fingerprinting the user.

The researcher also outlined several methods via which Tor users could be fingerprinted, such as mouse speed fingerprinting and unning a CPU-intensive JavaScript operation in the browser.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree