Privacy Vulnerability in Firefox and TOR Browsers
嗯,用户让我总结一篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我得仔细阅读文章内容,找出关键点。 文章主要讲的是Fingerprint安全公司发现了一个隐私漏洞,影响Firefox和TOR浏览器。这个漏洞允许网站即使在用户使用隐私模式或TOR的情况下也能追踪用户。 Mozilla已经修复了这个问题,在Firefox 150版本中解决了。 漏洞的原因是浏览器在检索非敏感存储元数据时缺乏足够的熵,导致数据检索过程中的元数据呈现方式不够随机,从而生成了基于用户系统的独特格式。这使得用户的浏览器可以被指纹识别,进而被追踪。 这对重视隐私的人来说是个大问题,因为TOR和隐私模式本来是用来防止追踪的。Fingerprint公司负责任地报告了这个漏洞,Mozilla及时修复了它。作者还提到随着新一代AI模型的出现,可能会发现更多类似的问题。 现在我要把这些信息浓缩到100字以内。首先说明谁发现了漏洞:Fingerprint安全公司。然后说明影响:Firefox和TOR浏览器的隐私模式下追踪用户。接着说明修复情况:Mozilla已修复。最后指出问题的重要性:威胁隐私保护措施。 这样组合起来就是:“Fingerprint安全公司发现Firefox和TOR浏览器在隐私模式下存在追踪漏洞,Mozilla已修复该问题。此漏洞利用浏览器检索元数据的独特方式生成唯一标识,威胁用户的匿名性和隐私保护措施。” 这样既涵盖了主要信息,又控制在字数内。 </think> Fingerprint安全公司发现Firefox和TOR浏览器在隐私模式下存在追踪漏洞,Mozilla已修复该问题。此漏洞利用浏览器检索元数据的独特方式生成唯一标识,威胁用户的匿名性和隐私保护措施。 2026-4-23 21:58:0 Author: securityboulevard.com(查看原文) 阅读量:12 收藏

The post Privacy Vulnerability in Firefox and TOR Browsers appeared first on Information Security Strategy.

The security company Fingerprint discovered how on Firefox browsers, websites could track users even if they used private browsing tabs or the anonymity focused TOR browser. Mozilla closed the vulnerability in Firefox 150, that was released on April 21st 2026.

This vulnerability is another example how a subtle lack of entropy in the software industry can undermine privacy and security.

The vulnerability is around how browsers retrieve non-sensitive stored metadata. The retrieval of database metadata is ordered in a specific way that can be unique to the user’s browser. This could allow the fingerprinting of systems, allowing tracking, that could persist even with full privacy protections are in place.

Essentially, the data retrieval process lacked sufficient entropy in how it presented metadata, creating consistently unique formats based on individual systems, allowing users to be matched and therefore tracked.

This is a big deal to people who wish to protect their privacy. Using TOR and private browsing are popular ways to keep others from tracking your online activities, but this flaw could partially undermine such measures.

Great job to Fingerprint in identifying and responsibly reporting the vulnerability so Mozilla could close the weakness.

I expect more such issues to be discovered across browsers as the next generation of AI models are released, like Anthropic’s Claude Mythos.

*** This is a Security Bloggers Network syndicated blog from Information Security Strategy authored by Matthew Rosenquist. Read the original post at: https://infosecstrategy.blogspot.com/2026/04/privacy-vulnerability-in-firefox-and.html


文章来源: https://securityboulevard.com/2026/04/privacy-vulnerability-in-firefox-and-tor-browsers/
如有侵权请联系:admin#unsafe.sh