Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

[question/suggestion] Support for extension (+ settings) #26

Closed
emanruse opened this issue Jan 5, 2024 · 10 comments
Closed

[question/suggestion] Support for extension (+ settings) #26

emanruse opened this issue Jan 5, 2024 · 10 comments

Comments

@emanruse
Copy link

emanruse commented Jan 5, 2024

I have just found this interesting project.

Background for the issue

Currently, I use disposables based on whonix-ws-dvm. I customize the DVM:

http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Tor_Browser/Advanced_Users#DVM_Template_Customization

because there is no other way to both persist extensions and user.js. uBlock Origin and uMatrix are very good for additional privacy protection. However, the block lists they support need regular updating to keep them fresh. This requires regular starting of the DVM to update them. Additionally, this whole "discouraged" procedure of running torbrowser in the DVM makes it challenging to re-apply all the settings upon each update of Tor Browser (through Tor Browser downloader ran in the DVM).

Question / Suggestion

Is it possible to also install/configure/update extensions in such split-configuration?

Example usage:

  1. Have the software (torbrowser) in the whonix-ws-dvm, as usual, without customizing that DVM
  2. Then, have extensions (uBlock Origin, uMatrix) installed in another DVM with a mechanism to auto-refresh their block lists in the DVM. That same DVM can be used also for other browser customizations.
  3. Have as many DVMs, similar to that from 2, as necessary.
  4. Use the browser by starting disposables based on a DVM from 3.
  5. Ideally, somehow combine that with firewall restrictions (which I am still researching for). I am mentioning that because in Qubes it might be possible to have such firewall rules for each disposable (and/or DVM).

Note: I am aware that installing random extensions can compromise anonymity etc. if one doesn't know what one is doing. In the described scenario, I am rather envisioning usage with so called "hard blocking" rules for uBO/uM without JS, even with blocked (or limited to 1st party) CSS/Images, so "leaking" to other parties is extremely limited (much more than with default "stock" Tor Browser browser).

@rustybird
Copy link
Owner

Note: I am aware that installing random extensions can compromise anonymity etc.

This warning is not just about malicious extensions spying on you though. It's much bleaker: Any changes you make to how Tor Browser operates (as far as the website can observe) will generally decrease the size of your anonymity set, i.e. make you more fingerprintable.

An individually installed ad blocker is pretty much the worst case, because it changes what resources a website can request over the network, how the website is rendered, and how you interact with the website, all of which are observable and they're specific to the ad blocker, its version, the configured filter lists, and their version.

Of course I hate ads as much as anyone, and would love to block them. In a Tor Browser context, the only viable approach I can see is to try and blend in with the Tails crowd, by somehow replicating their exact Tor Browser setup (which ships an ad blocker). The extension and filter list versions should then simply be frozen to whatever they are in the latest Tails release. It's a lot of work... But it's orthogonal to Split Browser.

@rustybird rustybird closed this as not planned Won't fix, can't repro, duplicate, stale Jan 8, 2024
@emanruse
Copy link
Author

emanruse commented Jan 9, 2024 via email

@adrelanos
Copy link

I don't quite see how a website can fingerprint better a user who simply blocks 3rd party requests, unless the 1st party also owns the 3rd party and deliberately correlates all HTTP requests between the two hosts.

There's a lot stuff. You could look into what Tor Browser does and/or https://www.whonix.org/wiki/Data_Collection_Techniques

To my mind, if blending in the crowd should be considered, the crowd should be the biggest one (Android).

I don't see how blending in with the Android crowd would be technically possible. Technically it's not even a crowd. It's just a huge number of easily trackable individuals. I assume that most don't use any anti-fingerprinting which is consistent with real life surveys. The Android crowd isn't 1 shared identifier. So it's hard to blend in unless somehow simulating always being a unique, new, different fingerprinting. I don't know any project that works on that. Tor Browser is the biggest project working towards a shared fingerprint.

@emanruse
Copy link
Author

emanruse commented Jan 12, 2024 via email

@adrelanos
Copy link

adrelanos commented Jan 12, 2024 via email

@emanruse
Copy link
Author

emanruse commented Jan 12, 2024 via email

@adrelanos
Copy link

adrelanos commented Jan 13, 2024 via email

@emanruse
Copy link
Author

emanruse commented Jan 13, 2024 via email

@adrelanos
Copy link

When I say research, I mean something like https://www.freehaven.net/anonbib/ - high quality, comprehensive, a structured approach, defined methods, mostly group effort, group consensus, discussed with other researchers, ideally peer reviewed.

Since this is complex stuff, I am not touching it but referring to The Tor Project (TPO) because they're working with researchers.

If that interests you, I suggest to get in touch with other researchers. Good research could actually result in TPO to changing the browser defaults.

@emanruse
Copy link
Author

emanruse commented Jan 13, 2024 via email

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants