The Tor team announced another major release today, the release is available from the Tor Browser Project page and also from our distribution directory. The biggest change seems the new UI re-design on the welcome screen among the Next generation of Onion Services.
Security related changes from Firefox were also merged into the current release.
Decentraleyes by Thomas Rientjes recently got an update and is now available in version 2.0.2, the biggest change is that is now compatible with Chrome and Opera, besides this it also was tested with Pale Moon and the ESR Firefox version. Basically you install the addon and then check against a test page if it’s working or not.
Malwarebytes now has an add-on available for Firefox on AMO. The extension in beta, has this description: “Detects and Protects against malware, scams and deceptive advertising on the web”. But do you really need it? I know there are a lot of Malwarebytes fans out there and their main-product is mostly good to go – So here we are and asking ” Do we need another extension to secure our Browser?”.
Some websites have code to “break out” of
IFRAME enclosures, meaning that if a page
A is loaded as an
IFRAME inside a parent page
A redirects the outer window to
if (top.location.href != self.location.href) top.location.href = self.location.href;
It isn’t a must-have extension (in my opinion) and it can break some websites but it can be beneficial if it works. I remember it used to very popular and the popularity died down a bit because certificates are very cheap these days. I once used it and liked it at the time, but I removed it a very long ago because I’ve not a need for it anymore.
By the way just as a general note, about the encrypted traffic between the browser and the target destination. Banking malware can actually intercept SSL and this technique is known as “WebInject“. The older technique for banking malware is called “Form-grabbing“, but that only covers HTTP communication, not HTTPS. SSL data will be decrypted by the browser client post-communication, and this is where banking malware can abuse this (exploit) to retrieve the decrypted SSL data via WebInject. Another would be messing with the certificates on the system. Some Anti-Virus programs do this and it can open opportunity for a Man-In-The-Middle (MITM) attack.
- Johnny assumes HTTPS Everywhere automatically switches sites to HTTPS when available. So when he hits a login over HTTP he shrugs and says “I guess they don’t have HTTPS” and fills in the login anyway.
- Johnny realizes that more and more, with HTTPS Everywhere installed he doesn’t need to worry about the lock icon in the URL bar. After all, if HTTPS is available HTTPS Everywhere will automatically switch him over, and if it isn’t, there is nothing he can do about it anyway.
- Johnny isn’t aware that HTTPS Everywhere is automatically sending a fingerprint of every HTTPS site he visits to HTTPS Observatory (allowing them to track his browsing if they wanted).
- The extension might be infected/faked or collects data. Less extension -> lower attack surface.
- High memory usage to parse the integrated rule list.
Malware these days is using HTTPS (as mentioned) more than ever before, increasing by the day. This is why modern gateway appliances are all going to be required to do SSL scanning. Deep inspection takes a locally installed Root certificates but normal SSL inspection doesn’t. HTTPS Everywhere isn’t required at all when you do SSL validation at the UTM level.
With this little trick you prevent 3rd-Party Firefox Apps from intercepting your Browser, which allows to restrict certain functions. It works as some kind of isolation.
The Negative Impact of using Firefox Accessibility Service
- Impact Firefox browsing performance
- Prevent web surfing monitoring/logging
- Stability may be adversely affected
- Instant and visible improvement in FF performance
Examples of Accessibility Services
Ability to inspect, monitor, visualize, and alter web page content hosted within Firefox.
- Assistive Technologies
- Do not disable Firefox Accessibility Service if you or someone who shares your device accesses the web through Firefox using any type of physical impairment assistive software. (Intended use of Firefox Accessibility Service).
- Anti-Virus and Anti-Malware Browser Plugins
- Often described as “browser protections” promoting security improvements, these features rarely add valuable security to Firefox and other browsers. Most are poorly designed and poorly tested, and can inadvertently disable more effective security measures built into Firefox.
- Enterprise or Educational Monitoring and Access
- Niche Shareware or Freeware applications
- Mozilla does not support or sanction this use of Accessibility Service.
- Malware and Adware
- Abused by malware, if present, to monitor user behavior or access user information on the web.
- What is the Accessibility Service Indicator? | Firefox Help (support.mozilla.org)
The popular Bookmark Checker got today flagged by Google as malware without any reason, it’s unclear if it was really malware or not. Personally I used the extension for years and the source code was always clean. The Google Chrome Store points now to an 404 page.