Skip to main content

The FBI hacked into Firefox, and Mozilla wants to know how

FBI Headquarters
Image used with permission by copyright holder
Mozilla wants to know how the FBI broke into its browser, and is using an ongoing court case to force the government to do it. The case revolves around the Tor Browser, a Firefox-based browser that allows individuals to browse the web anonymously and deter surveillance.

FBI agents somehow broke into the browser of Jay Michaud in an effort to catch him in the alleged act of downloading child pornography. While Mozilla is obviously not taking Michaud’s side in the case, the organization felt it important to know how exactly agents got into Tor in the first place.

Recommended Videos

“At this point, no one (including us) outside the government knows what vulnerability was exploited and whether it resides in any of our code base,” Mozilla’s chief legal and business officer Denelle Dixon-Thayer said in a Wednesday blog post.

What makes this case interesting is the judge’s ruling surrounding the disclosure of how the hack was done. U.S. District Court Judge Robert Bryan ordered the FBI to disclose the nature of the vulnerability to Michaud’s defense team, but also forbid the groups from disclosing the vulnerability to either Tor or Mozilla, whose browsers may be somehow vulnerable.

“We don’t believe that this makes sense because it doesn’t allow the vulnerability to be fixed before it is more widely disclosed,” Dixon-Thayer argued.

Judge Bryan’s decision is curious, and could show a lack of understanding of how security flaws are disclosed. While the courts have a valid reason for protecting the right of the FBI to perform its investigation the best way it sees fit, innocent Tor and Firefox users might be at risk. The security community has long had a policy of alerting software developers to any discovered flaw to the software makers themselves first.

The thought is, if the developers get wind of the vulnerability first — any potential effects from malicious use would be minimized. Here, Mozilla has no idea what is wrong with its browser, so there’s no way to fix it.

“We are on the side of the hundreds of millions of users who could benefit from timely disclosure,” Dixon-Thayer said. A full copy of Mozilla’s amicus curiae brief is available from the organization’s website.

Ed Oswald
For fifteen years, Ed has written about the latest and greatest in gadgets and technology trends. At Digital Trends, he's…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more