This Firefox vulnerability may have been tracking all of your private Tor identities, even in private mode.



  • Researchers discovered a flaw in Firefox and Tor Browser that allowed websites to generate stable, hidden identifiers without cookies.
  • The issue arose from the behavior of IndexedDB, which allows persistent fingerprinting even in private browsing or Tor’s “New Identity” mode.
  • Mozilla and Tor quickly patched the vulnerability, with fixes included in Firefox 150 and Tor Browser 15.0.10.

Browsers such as Mozilla Firefox and Tor Browser contained a vulnerability where websites could create a hidden ID of browser sessions without using cookies or obvious tracking methods.

The vulnerability was discovered by security researchers Dai Nguyen and Martin Bajanik of Fingerprint. In an in-depth report published earlier this week, the duo said the issue allowed websites to derive a “unique, deterministic, and stable identifier of process duration” from the order of entries returned by IndexedDB, even when users expect “stronger isolation.”

Leave a Comment

Your email address will not be published. Required fields are marked *