![]() |
|
![]() |
| And what, you’re going to find them a new CTO? What kind of magical world do you live in where problems are solved by leaders resigning, instead of stepping up and taking accountability? |
![]() |
| Well, the current team perhaps.
But it's also likely part of the startup mentally of "move fast and break things", which is not entirely compatible with the goal of the browser. |
![]() |
| > We’re also bolstering our security team, and have hired a new senior security engineer.
Is there a reason why you don’t have any security-specific positions open on your careers site? |
![]() |
| Ya this is fair! Honestly this was our first bounty ever awarded and we could have been more thoughtful. We’re currently setting up a proper program and based on that rubric will adjust accordingly. |
![]() |
| I think OP mean to say "this bug could let an attacker gain $200k of value easily", though you are right the market clearing price for such a vulnerability is probably low due to huge supply. |
![]() |
| Thanks for the response.
While people might nitpick on how things were handled, the fact that you checked if anyone was affected and fixed it promptly is a good thing. |
![]() |
| It is not really nitpicking, given the severity.
Being prompt on a vulnerability of this magnitude should be considered "meeting the standard" at best. |
![]() |
| I just want to call out that there is a lot of blame put on firebase here in the comments but I think that's just people parroting stuff they don't actually know about (I don't use firebase, I have tried it out in the past though). This isn't some edge case or hard to solve thing in firebase, this is the easy stuff.
The real issue here is that someone wrote an api that trusted the client to tell it who they were. At the end of the day this is an amateur mistake that likely took a 1 line diff to fix. Don't believe me? Check out the docs: https://firebase.google.com/docs/rules/rules-and-auth#cloud-... - `request.auth` gives you the user id you need (`request.auth.uid`). |
![]() |
| Nobody reads docs dude. They copy and paste stack overflow answers, and now, copilot answers, which is going to be based on stack overflow ultimately anyway. |
![]() |
| At the end of the day this is an amateur mistake
God I wish. More than one of my coworkers has made this exact mistake with our (thankfully internal) front-end apps. |
![]() |
| It's cute but I just can't focus on the article knowing the cat is gonna move every time I move my mouse or scroll. I popped open my console and deleted him. Sorry, kitty |
![]() |
| And here I was wishing it would go away and trying to find a way to hide it because on my phone it was always covering text. Firefox reader mode worked. |
![]() |
| I thought it just ran around on the top line of the header, and was quite taken with it. I then scrolled and it followed me right into the middle of a paragraph. Less taken, but cat's gonna cat. |
![]() |
| I trashed Arc immediately after install when I found out having an account was mandatory. That seemed so silly, like toothbrushes-requiring-wifi absurd. How much moreso now. |
![]() |
| Truly. I was looking for a privacy respecting Chromium-based browser to use for Web MiniDisc (https://web.minidisc.wiki/) and came across some enthusiastic praise for Arc. I downloaded it and it immediately wanted me to create an account to even use it. How can that possibly respect my privacy? It went right in the trash.
|
![]() |
| What is also strange that I only found out about account after download. Like it was standard thing for the browser. (Sure there are optional accounts in others but login-walled browser?) |
![]() |
| In 2024 it is considered normal for an _operating_system_ to require an account, an information that is potentially passed around to any app running on it. |
![]() |
| Can you explain how you could get someone else's user id? I get that this is still a big vulnerability but am trying to understand how that would happen. |
![]() |
| Them acknowledging the issue, then fixing it within 28 hours isn't good enough for you? That kind of response makes me happy to continue using Arc. |
![]() |
| Vivaldi feels like a cross platform port in all the ways I try to avoid. I understand the feature set is good, but it doesn't feel nice to use. Hard to state exactly why though. |
![]() |
| > Browsers are complicated. It doesn't inspire confidence that the folks in charge of that complexity can't get their heads around a business model.
Unfortunately you are also describing Mozilla here. |
![]() |
| Unfortunately, Zen Browser simply isn't an alternative. If you like Arc, then Zen's UI for tabs and splitting views isn't really anywhere close to satisfying the same needs. |
![]() |
| At least Firefox seems to be borrowing some of the UI features slowly. At least the Mozilla Foundation is very public with their wants and goals. |
![]() |
| Firefox seems to be borrowing some of the UI features slowly (at least the vertical tabs). And at least the Mozilla Foundation is very public with their wants and goals. |
![]() |
| Lots of developers and power users make a good chunk of Arc's use base. If you're after some interesting credentials then "every Arc user" is a perfect group with little noise. |
![]() |
| I agree & disagree.
Browsers are very important part of our life. If someone compromises our browsers , they basically compromise every single aspect of privacy and can lead to insane scams. And because arc browser is new , they wanted to build fast and so they used tools like firebase / firestore to be capable of moving faster (they are a startup) Now I have read the article but I am still not sure how much of this can be contributed to firebase or arc On the following page from same author (I think) https://env.fail/posts/firewreck-1 , tldr states - Firebase allows for easy misconfiguration of security rules with zero warnings - This has resulted in hundreds of sites exposing a total of ~125 Million user records, including plaintext passwords & sensitive billing information So because firebase advocates itself to the developers as being safe yet not being safe , I think arc succumbed to it. firestore has a tendency to not abide by the system proxy settings in the Swift SDK for firebase, so going off my hunch, Also , you say that you have been convinced to never use arc again. Did you know that chrome gives an unfair advantage to its user sites by giving system information (core usage etc.) and some other things which are not supposed to be seen by browsers only to the websites starting with *.google.com ? this is just recently discovered , just imagine if something more serious is also just waiting in the shadows Couldn't this also be considered a major security vulnerability just waiting to be happen if some other exploit like this can be discovered / google.com is leaked and now your cpu information and way more other stuff which browsers shouldn't know is with a malicious threat actor ? |
![]() |
| It's a little worse than that. From now on, blackhats will have a favorite #1 browser to pentest, at least for the next few weeks.
And who's going to take the bet that they'll find nothing? Not me. |
![]() |
| > also wouldn’t know how to contact a “state actor” even if they wanted to.
That's why brokerages like Zerodium exist - you can sell it to them, and they'll sell it onto state actors. |
![]() |
| Nice article, but this is hard to read without proper capitalization. My brain uses capitals to scan beginning and ending of text. |
![]() |
| Arc was recommended to me by a friend. I deleted upon finding out I needed an account to use it. The excuse Arc gives is in case you want to sync. I'm capable of opting into that. |
![]() |
| > Also, for anyone trying to read the article, they should put `/oneko.js` in their adblocker.
Only if you hate cats, pixel art, or are easily distracted. |
![]() |
| Hmm not that I remember. But I have reduced motion enabled on my phone system wide and maybe that synced to my desktop on its own.
Which is scary come to think of it. |
![]() |
| > Firebase's authentication model is inherently broken
I'm not very familiar with Firebase. In what way is it broken and what issues does it cause? |
![]() |
| OP is talking about the Arc browser, not the Arc language, the Arc "Atomic React" project, or any of scores of other projects with that name. |
![]() |
| It's a browser (chromium based) with a really nice UI that people love, I am intrigued but haven't used it because I find the requirement to create an account off-putting. |
![]() |
| I’ve been using Arc since it was private, and I really like the browser. The company’s posture on this topic has pretty much made me drop it entirely. It’s beyond abysmal. |
![]() |
| i'm rooting for them to succeed, but if the concern is security, switching your daily driver browser to a brand-new browser that's still in alpha is unfortunately not a good idea. |
![]() |
| Fascinating vulnerability, and a fascinating way to catch it. Kudos.
BTW, on Arc's website on "Security" there still is no mention of this vulnerability (as of 20th Sep 2024, 2:32 pm PT) Check it out - https://arc.net/security Apparently the company had contracted with one Latacora for "regular outside security reviews and trainings across a wide range of different systems". Elsewhere on the page, it says "Arc uses GCP Firebase for user authentication, storage for Notes & Easels, and Cloud Functions for certain application features like referral code generation. All data stored in Firebase is encrypted-at-rest by default." |
![]() |
| > I have yet to find a privacy policy that says frankly "we only know your IP and time you downloaded the software, for the few weeks before the server logs are overwritten."
Not with those exact words, but that’s Alfred. Server connections are done only to validate the license and check for updates, and you can even disable that. https://www.alfredapp.com/terms/ > Alfred only contacts our server when activating your Powerpack license in order to validate it, as well as periodically checking for new software updates. You can disable the software update check in the Update preferences, but we recommend keeping this enabled to ensure that you always have the latest version for security reasons and to make the most of the awesome new features! |
![]() |
| For some time I asked why doesn't Arc let me sync my passwords.
After seeing this level of incompetence, I am happy they didn't attempt that. Yet. |
![]() |
| It is troubling that the browser that cannot be used anonymously displayed questionable behavior adjacent to the mechanism that tells The Browser Company every time you are watching porn |
![]() |
| Some flights have a free tier of wifi that allows messaging apps. Google Voice and Google Hangouts usually work on those so wouldn't be surprised if some other Google services make it through. |
![]() |
| Even in Safari, you can remove tabs from toolbar (but it is not possible to hide toolbar itself) and have them in sidebar - there are also tab groups.
But experience is probably different. |
![]() |
| For context: what is this 'arc' that the blog post mentions? I presumes it's not Paul Graham's Lisp dialect in this context?
EDIT: seems to be a browser or so? |
![]() |
| Good pun :)
HN tends to be a little hard on brief comments. My current understanding is that comments with little substance are totally acceptable provided they're good natured. For example this comment by dang "There's nothing wrong with submitting a comment saying just "Thanks."" https://news.ycombinator.com/item?id=37251836. Also from the guidelines "Comments should get more thoughtful and substantive, not less, as a topic gets more divisive": this post's topic doesn't likely qualify as divisive. |
![]() |
| Browser is an user agent. Chrome is an advertisement company agent running on your PC, collecting data for that advertising company.
People often confuse these two, but they’re the polar opposites. |
![]() |
| hmm gee I wonder was it worth to value the bug bounty at $2500 given the severity of both the bug and sheer lack skills of the browser company staff...it might even be a reputation destroyed event... |
![]() |
| I would feel more comfortable if your super promises were all on a blockchain, and we made No Backsie NFTs so people could clearly see these were legitimate and bid on them. |
![]() |
| They claim so much and their browsers' code is 100% proprietary so it's impossiblen to verify their lies. This is what triggered the bullshit detector in my head |
I'm really sorry about this, both the vuln itself and the delayed comms around it, and really appreciate all the feedback here – everything from disappointment to outrage to encouragement. It holds us accountable to do better, and makes sure we prioritize this moving forward. Thank you so much.