Brave is a popular privacy focused web-browser. Founded in 2015, by Brendan Eich, one of the original Mozilla founders, Brave got in the spotlight from day one. Being based on chromium, its main feature is built in advertisement and tracker blocking. Despite that, today the company behind it is in hot water for their approach to privacy.
The Security Flaw
Being privacy focused, brave decided to implement Tor functionality directly into their browser. Simply enable Tor mode, and you are able to browse onion sites anonymously through your normal browser. Most users would expect this feature to be safe, but what they didn't know is that every request they made was being leaked.
About a month ago, on the 13th of January, a user submitted a flaw to Brave's bug bounty program. A flaw was found in the browser that pipes .onion requests through the users DNS. This results in a fingerprint revealing the destination and the IP of the users. To make matters worse, most people use the default DNS provided by their ISP meaning they have direct access to this information.
- However, they'll be the first to tell you that Brave isn't as private as TOR. In fact, in Brave's version of private mode, they've introduced a 'New Private Window with TOR' feature to appease their critics. It's basically Brave browser with TOR enabled. The Bottom Line: Brave vs.
- Brave offers users two alternatives to Chrome's Incognito mode. Private Windows will clear your cookies and saved site data at the end of every session, just like Incognito mode. Private Windows with Tor routes your normal Internet connection through the Tor network, in which each step is kept anonymous.
The Negligence
Despite receiving information about this flaw in mid January, the team behind brave did not rush to fix the issue. About 2 weeks after the team received the information, the first patch was released but was limited only for the beta-version of the browser. The plan was to make the update public on the official release of version 1.21.x, which would have taken at-least 2 more weeks. Hearing this news, the public became outraged and the story picked up some steam. Brave was quick to cover up their tracks, releasing the patch sooner.
Conclusion
Being a privacy focused browser, privacy is something users expected. Brave decided to prove them wrong. Security flaws are expected in almost every piece of software. It's the actions after the flaw is found that dictate your views on privacy. Brave showed its users that privacy is not its top priority. After being aware of the flaw for weeks, the team neglected it and did not even seem to rush, Instead they took their time to fix it.
Brave Introduces Beta of Private Tabs with Tor for Enhanced Privacy while Browsing This new functionality, currently in beta, integrates Tor into the browser and gives users a new browsing mode that helps protect their privacy not only on device but over the network.
A bug in a ad restraint member of Brave's Tor underline caused a browser to trickle users' DNS queries
Brave, one of a top-rated browsers for privacy, has bound a bug in a Private Windows with Tor underline that leaked a .onion URLs for websites visited by users. According to a report by an unknown researcher, a browser's built-in Tor mode – that takes private browsing to a new turn by permitting users to navigate to .onion websites on a dim web though carrying to implement Tor – was leaking Domain Name System (DNS) requests for a websites.
'If you're regulating Brave we substantially use it given we design a certain turn of privacy/anonymity. Piping .onion requests by DNS where your ISP or DNS provider can see that you made a ask for an .onion site defeats that purpose,' reads a post.
Brave Web Browser Tor Mode
RELATED READING: 3 ways to crop a web anonymously
The researcher found that when a ask is done for a .onion domain while regulating Private Window with Tor, a ask creates a approach to a DNS server and is tagged with a Internet Protocol (IP) residence of a requester.
'This shouldn't happen. There isn't any reason for Brave to try to solve a .onion domain by normal means as it would with a unchanging clearnet site,' pronounced a researcher. As a result, if we used Tor with Brave and accessed a Tor website, your internet use provider (ISP) or DNS provider competence be means to tell that a ask for that specific website was done from your IP address.
According to a tweet by Brave's Chief Information Security Officer Yan Zhu, Brave was already wakeful of a emanate given it was formerly reported on HackerOne. It has given pushed out a hotfix to solve a issue, that was traced to a browser's adblocking member that used a apart DNS query.
for confidence researchers looking during Tor windows in Brave, note this underline is presented to users as unchanging private windows that use a Tor substitute for softened network privacy, NOT an homogeneous to Tor Browser in terms of anonymity or leakproofing. https://t.co/xYUwsFhXbtpic.twitter.com/H6VuRYsArg
Conclusion
Being a privacy focused browser, privacy is something users expected. Brave decided to prove them wrong. Security flaws are expected in almost every piece of software. It's the actions after the flaw is found that dictate your views on privacy. Brave showed its users that privacy is not its top priority. After being aware of the flaw for weeks, the team neglected it and did not even seem to rush, Instead they took their time to fix it.
Brave Introduces Beta of Private Tabs with Tor for Enhanced Privacy while Browsing This new functionality, currently in beta, integrates Tor into the browser and gives users a new browsing mode that helps protect their privacy not only on device but over the network.
A bug in a ad restraint member of Brave's Tor underline caused a browser to trickle users' DNS queries
Brave, one of a top-rated browsers for privacy, has bound a bug in a Private Windows with Tor underline that leaked a .onion URLs for websites visited by users. According to a report by an unknown researcher, a browser's built-in Tor mode – that takes private browsing to a new turn by permitting users to navigate to .onion websites on a dim web though carrying to implement Tor – was leaking Domain Name System (DNS) requests for a websites.
'If you're regulating Brave we substantially use it given we design a certain turn of privacy/anonymity. Piping .onion requests by DNS where your ISP or DNS provider can see that you made a ask for an .onion site defeats that purpose,' reads a post.
Brave Web Browser Tor Mode
RELATED READING: 3 ways to crop a web anonymously
The researcher found that when a ask is done for a .onion domain while regulating Private Window with Tor, a ask creates a approach to a DNS server and is tagged with a Internet Protocol (IP) residence of a requester.
'This shouldn't happen. There isn't any reason for Brave to try to solve a .onion domain by normal means as it would with a unchanging clearnet site,' pronounced a researcher. As a result, if we used Tor with Brave and accessed a Tor website, your internet use provider (ISP) or DNS provider competence be means to tell that a ask for that specific website was done from your IP address.
According to a tweet by Brave's Chief Information Security Officer Yan Zhu, Brave was already wakeful of a emanate given it was formerly reported on HackerOne. It has given pushed out a hotfix to solve a issue, that was traced to a browser's adblocking member that used a apart DNS query.
for confidence researchers looking during Tor windows in Brave, note this underline is presented to users as unchanging private windows that use a Tor substitute for softened network privacy, NOT an homogeneous to Tor Browser in terms of anonymity or leakproofing. https://t.co/xYUwsFhXbtpic.twitter.com/H6VuRYsArg
— yan (@bcrypt) February 19, 2021
The Chromium-based browser initial expelled a Beta of Private tabs with Tor in Jun 2018 in a bid to strengthen a remoteness of users not usually on their inclination though over a network as well. 'Private Tabs with Tor assistance strengthen Brave users from ISPs (Internet Service Providers), guest Wi-Fi providers, and visited sites that might be examination their Internet tie or even tracking and collecting IP addresses, a device's Internet identifier,' reads its blog touting a new feature. In 2020 it also launched its own Tor Onion Service.