Leaking silhouettes of cross-origin images
https://blog.mozilla.org/attack-and-defense/2021/01/11/leaking-silhouettes-of-cross-origin-images/ [blog.mozilla.org]
2021-01-13 06:07
tags:
browser
exploit
graphics
security
sidechannel
turtles
web
This is a writeup of a vulnerability I found in Chromium and Firefox that could allow a malicious page to read some parts of an image located on an origin it is not supposed to be able to access. Although technically interesting, it is quite limited in scope—I am not aware of any major websites it could’ve been used against. As of November 17th, 2020, the vulnerability has been fixed in the most recent versions of both browsers.
The time that it takes CanvasRenderingContext2D.drawImage to draw a pixel depends on whether it is fully transparent, opaque, or semi-transparent. By timing a bunch of calls to drawImage, we can reliably infer the transparency of each pixel in a cross-origin image, which is enough to, for example, read text on a transparent background, like this:
source: HN
Introducing Firefox Send
https://blog.mozilla.org/blog/2019/03/12/introducing-firefox-send-providing-free-file-transfers-while-keeping-your-personal-information-private/ [blog.mozilla.org]
2019-03-13 00:46
tags:
cloud
storage
web
Send is a free encrypted file transfer service that allows users to safely and simply share files from any browser.
source: L
Blocking Top-Level Navigations to data URLs for Firefox 58
https://blog.mozilla.org/security/2017/11/27/blocking-top-level-navigations-data-urls-firefox-58/ [blog.mozilla.org]
2017-12-01 02:12
tags:
browser
html
ux
web
End users rely on the address bar of a web browser to identify what web page they are on. However, most end users are not aware of the concept of a data URL which can contain a legitimate address string making the end user believe they are browsing a particular web page. In reality, attacker provided data URLs can show disguised content tricking end users into providing their credentials. The fact that the majority of end users are not aware that data URLs can encode untrusted content makes them popular amongst scammers for spoofing and particularly for phishing attacks.
source: HN
Verified cryptography for Firefox 57
https://blog.mozilla.org/security/2017/09/13/verified-cryptography-firefox-57/ [blog.mozilla.org]
2017-09-14 00:09
tags:
browser
compsci
crypto
security
update
This is a very exciting development and Mozilla has partnered with INRIA and Project Everest (Microsoft Research, CMU, INRIA) to bring components from their formally verified HACL* cryptographic library into NSS, the security engine which powers Firefox.
source: L
NoScript’s Migration to WebExtensions APIs
https://blog.mozilla.org/addons/2017/08/01/noscripts-migration-to-webextensions-apis/ [blog.mozilla.org]
2017-08-07 07:01
tags:
browser
javascript
library
update
The so-called “legacy” add-on technology which NoScript has been built with is going to be banned very soon; therefore, like too often in real life, it’s either migrate or die.
source: L
Update on Multi-Process Firefox
https://blog.mozilla.org/futurereleases/2016/12/21/update-on-multi-process-firefox/ [blog.mozilla.org]
2016-12-22 01:15
tags:
browser
concurrency
perf
release
security
Beyond Firefox 50, we have more work to do to enable multi-process Firefox for users with as yet unsupported extensions. In Firefox 51, if all testing goes according to plan, we’ll be enabling multi-process Firefox for users with extensions that are not explicitly marked as incompatible with multi-process Firefox.
Introducing Firefox Focus
https://blog.mozilla.org/blog/2016/11/17/introducing-firefox-focus-a-free-fast-and-easy-to-use-private-browser-for-ios/ [blog.mozilla.org]
2016-11-18 00:51
tags:
browser
iphone
release
iOS browser with less tracking.