Closed ghost closed 2 years ago
Protocol, application and network layer attacks exist for the Tor network as with other networks, mix nets/mesh nets included.
This novel attack uses a seemingly benign frame or other piece of data that is not known to most browsers, that utilizes the same signed-in data that allows you to access content across the web (in layman's, this is how you can view YouTube content off-site and receive the same suggestions as you would logged into the site normally).
Independent research has shown that properly isolating your browsing habits for different sites and using containerized browsing has a significant increase in threat mitigation for specific attacks including XSS and side channel attacks like this. The technique requires you to stay logged into a site to be able to access certain content embeds like Youtube videos, Google docs and others. To easily mitigate you should be using containers.
Containerized browsing habits (similar to Qubes OS VMs per app) can be used to protect your privacy by utilizing compartmentalization to separate your different tasks.
I'll explain using my own setup for simplicity's sake.
This doesn't appear to be a new threat, just a new technique, via CPU cache side channel.
Good OPSEC and browser compartmentalization will mitigate. Whether that's using Qubes AppVMs, Firefox Multi-Account Containers extension, multiple browsers or multiple devices.
Interesting that this is a targeted attack. If the threat actor already knows my email or twitter handle and is actively targeting me I have possibly already slipped up somewhere. The user correlation threat described in the Wired article is very realistic.
I wonder if this attack works against Tor Browser when configured to 'Safest' security level? Also can't tell from the paper if this attack works against Brave or not?
I am hesitant to recommend installing a browser extension. There are better ways to defend against this. Might still be worth a mention in the guide.
It's worth noting that this attack isn't prevented by isolating browsers into separate VMs, as it leverages a CPU cache side-channel. While installing an extension isn't ideal, it's possibly a suitable stop-gap until the issue is fixed in browsers/hypervisors
I just pushed the fix. Closing.
Could everyone review this? (why I assigned everyone). Initially reported by @pterocles.
Question being: Should we recommend all users to install that extension? Even Tor Browser users?
Introduction/Explanation:
Paper:
Repository of mitigating extension:
Extension links on stores:
Media Articles: