This Firefox vulnerability could have tracked all of your private Tor identities – even in private mode


  • Researchers uncovered a bug in Firefox and Tor Browser that allowed websites to generate hidden, stable identifiers without cookies.
  • The problem stemmed from IndexedDB behavior, which enables persistent fingerprinting even in private browsing or Tor’s “New Identity” mode.
  • Mozilla and Tor quickly fixed the vulnerability with fixes included in Firefox 150 and Tor Browser 15.0.10.

Browsers such as Mozilla Firefox and Tor Browser contained a vulnerability where websites could create a hidden ID from browser sessions without using cookies or other obvious tracking methods.

The vulnerability was discovered by security researchers Dai Nguyen and Martin Bajanik of Fingerprint. In an in-depth report published earlier this week, the duo said the issue allowed websites to derive a “unique, deterministic, and stable process-lifetime identifier” from the sequence of records returned by IndexedDB, even when users expect “stronger isolation.”

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top