[HN Gopher] Gaining access to anyones Arc browser without them e...
       ___________________________________________________________________
        
       Gaining access to anyones Arc browser without them even visiting a
       website
        
       Author : xyzeva
       Score  : 1053 points
       Date   : 2024-09-19 23:04 UTC (23 hours ago)
        
 (HTM) web link (kibty.town)
 (TXT) w3m dump (kibty.town)
        
       | ko_pivot wrote:
       | This is such a fantastic bug. Firebase security rules (like with
       | other BaaS systems like Firebase) have this weird default that is
       | hard to describe. Basically, if I write my own API, I will set
       | the userId of the record (a 'boost' in this case) to the userId
       | from the session, rather than passing it in the request payload.
       | _It would never even occur_ to a developer writing their own API
       | past a certain level of experience to let the client pass (what
       | is supposed to be) their own userId to a protected API route.
       | 
       | On the other hand, with security rules you are trying to imagine
       | every possible misuse of the system regardless of what its
       | programmed use actually is.
        
         | nottorp wrote:
         | > On the other hand, with security rules you are trying to
         | imagine every possible misuse of the system regardless of what
         | its programmed use actually is.
         | 
         | Tbh you're doing it wrong if you go that way.
         | 
         | Default deny, and then you only have to imagine the legitimate
         | uses.
        
           | sorrythanks wrote:
           | And then when you imagine the legitimate uses you have to
           | imagine how allowing those legitimate uses could be misused.
           | You always need to think red and blue.
        
           | ko_pivot wrote:
           | Fair enough, but my point is more conceptual, in that you
           | still have to write `boost.userId == auth.userId` as an
           | allowed pattern rather than making that pattern the only
           | technically possible result, which is the convention in a
           | traditional API.
        
         | kevincox wrote:
         | For inserts yes, but for updates I've frequently seen cases
         | where people just stuff the whole request into their ORM or
         | document store. It is pretty easy to think "the owner can
         | update the document" without realizing that there are some
         | fields (that the official client doesn't set) that shouldn't be
         | updated (like the owner or created timestamp).
         | 
         | The correct solution is likely default-deny auth for every
         | single field. Then you at least have to explicitly make the
         | owner field writable, and hopefully consider the impact of
         | transfering this object to another user.
        
       | upghost wrote:
       | Article great, cute doge even better. Here's my upvote!
        
         | ars wrote:
         | The dog is actually a cat named Neko.
         | 
         | https://en.wikipedia.org/wiki/Neko_(software)
        
           | DoreenMichele wrote:
           | To be clear, it's a cat named "cat" in Japanese.
        
         | upghost wrote:
         | I got downvoted for calling it a dog??
         | 
         | Now that's ruff!!
        
           | robbiewxyz wrote:
           | Good pun :)
           | 
           | HN tends to be a little hard on brief comments. My current
           | understanding is that comments with little substance are
           | totally acceptable provided they're good natured.
           | 
           | For example this comment by dang "There's nothing wrong with
           | submitting a comment saying just "Thanks.""
           | https://news.ycombinator.com/item?id=37251836.
           | 
           | Also from the guidelines "Comments should get more thoughtful
           | and substantive, not less, as a topic gets more divisive":
           | this post's topic doesn't likely qualify as divisive.
        
           | efilife wrote:
           | Wait until you see that this got downvoted too. HN is a toxic
           | place
        
       | bhaney wrote:
       | There are a lot of major security vulnerabilities in the world
       | that were made understandably, and can be forgiven if they're
       | handled responsibly and fixed.
       | 
       | This is not one of them. In my opinion, this shows a kind of
       | reputation-ruining incompetency that would convince me to never
       | use Arc ever again.
        
         | aaomidi wrote:
         | You'd think that a company shipping a browser would pay a
         | little more attention to security rules.
         | 
         | Also, shame on firebase for not making this a bit more idiot
         | proof.
         | 
         | And really? $2500? That's it? You could've owned literally
         | every user of Arc... The NSA would've paid a couple more zeros
         | on that.
        
           | nemomarx wrote:
           | Are there a lot of Arc users? It seems like a pretty niche
           | browser even compared to other niches.
        
             | shepherdjerred wrote:
             | Having arbitrary browser access would be pretty valuable,
             | even for just a small number of users.
        
             | viraptor wrote:
             | Lots of developers and power users make a good chunk of
             | Arc's use base. If you're after some interesting
             | credentials then "every Arc user" is a perfect group with
             | little noise.
        
               | nicce wrote:
               | > power users
               | 
               | Not that many. Most power users don't like to be forced
               | for logging in, before they are able to use the browser.
        
               | sulandor wrote:
               | confirmed
               | 
               | i don't even like logging in WHILE using the browser and
               | have never heard of arc
        
               | doix wrote:
               | If I had to guess, the typical Arc user is a Mac user in
               | tech. It doesn't run on Linux, most windows users
               | wouldn't run it, and non-tech people haven't heard of it.
               | 
               | Then most engineering IC people will most likely run
               | Firefox or Chrome, so you're probably looking at
               | designers/founders/managers as your target.
               | 
               | Probably some interesting targets there, but not the type
               | that the NSA cares about. Just pure conjecture on my part
               | of course ;).
        
               | umanwizard wrote:
               | The only person I ever saw using Arc was a designer at a
               | tech startup, so this checks out.
        
               | cassianoleal wrote:
               | I've seen quite a few. In one of my clients's Slack there
               | are at least a couple people advocating for it all the
               | time. They're mostly DLs or in similar roles. I also know
               | at least one developer who uses it.
               | 
               | I used it for a while for a very limited use case. Some
               | interesting concepts. Mostly I found it annoying though.
               | I also didn't like the sign-in thing but still wanted to
               | experiment. I have dropped it altogether and kept Firefox
               | as main browser (as it's been for many years) and Safari
               | as a secondary. Both work much better overall for my
               | needs.
        
             | Imustaskforhelp wrote:
             | my brother uses arc browser , he is a developer . I think
             | he saw it from somebody using it (maybe theo t3 or some
             | other creator he watches) , and he found it cool (plus
             | there were lot of videos flooded with saying arc is really
             | great IDK)
             | 
             | If someone finds something cool on the internet. They are
             | going to try it , given that they are capable to do so.
             | 
             | He had a mac so he was able to do so , Even I tried to run
             | arc on windows once when it was really beta and only
             | available to mac (I think now it supports windows not sure)
             | 
             | I just kindly want to state that if the nsa could've bought
             | this exploit , they could've simply waited and maybe even
             | promote arc themselves (seems unlikely)
             | 
             | Maybe they could've tried to promote the numbers of arc
             | users by trying to force google and microsoft search engine
             | through some secret shady company advertising / writing
             | blog posts for arc / giving arch funding or like how we
             | know that there are secret courts in america
             | 
             | ( and since these search engines basically constitutes for
             | a high percentage of discovery of stuff by search engine by
             | users)
             | 
             | People could've credited the success to arc in that case
             | for getting more users but the real winner would've been
             | NSA.
        
               | timeon wrote:
               | > He had a mac so he was able to do so
               | 
               | How? I have mac as well but when I've download it some
               | time ago it required login. Has that changed?
        
               | adiabatty wrote:
               | No. You still need to create a login.
               | 
               | Everyone else at work likes it, so I signed up with my
               | work e-mail address and use it for work. All of my
               | complicated browsing needs are done for work, so there's
               | a good fit there.
        
           | Thorrez wrote:
           | The page says $2,000.
        
           | Imustaskforhelp wrote:
           | yes. I feel sad that now we have created an incentive where
           | selling to the govt.'s is often much lucrative than telling
           | to the vulnerable party (arc in this case)
           | 
           | (just imagine , this author was great for telling the company
           | , this is also a cross platform exploit with very serious
           | issues (I think arc is available on ios as well))
           | 
           | how many of such huge vulnerabilities exist but we just don't
           | know about it , because the author hasn't disclosed it to the
           | public or vulnerable party but rather nsa or some govt.
           | agency
        
           | prmoustache wrote:
           | > You could've owned literally every user of Arc... The NSA
           | would've paid a couple more zeros on that.
           | 
           | only the 17 users they have.
           | 
           | Shouldn't a government sue you if you try to sell him out
           | vuln unless you personally know people in charge?
        
             | netdevnet wrote:
             | I guess not since they used the services of a company that
             | could exploit vulns in ios
        
             | girvo wrote:
             | Arc has a lot more than 17 users. It's surprisingly
             | popular.
        
           | 255kb wrote:
           | Firestore rules are in "lock mode" (no read or write allowed)
           | by default since a long time. Then, everything is ultra well
           | explained in the docs.
           | 
           | I was already aware of it when being a noob dev 10 years ago,
           | and could easily write a rule to enforce auth + ownership in
           | the rules. No way, seasoned devs can miss that.
        
           | rmbyrro wrote:
           | A couple? A vuln like this is worth >$1M very easily on the
           | market.
        
         | endigma wrote:
         | Also, firebase? seriously? this is a company with like, low
         | level software engineers on payroll, and they are using a CRUD
         | backend in a box. cost effective I guess? I wouldn't even have
         | firebase on the long list for a backend if I were architecting
         | something like this. Especially when feature-parity competitors
         | like Supabase just wrap a normal DBMS and auth model.
        
           | JumpCrisscross wrote:
           | > _low level software engineers on payroll_
           | 
           | How does The Browser Company make money? They're giving their
           | product away for free.
           | 
           | Browsers are complicated. It doesn't inspire confidence that
           | the folks in charge of that complexity can't get their heads
           | around a business model.
           | 
           | (Aside: none of their stated company values have anything to
           | do with the product or engineering [1]. They're all about how
           | people feel.)
           | 
           | [1] https://thebrowser.company/values/
        
             | coffeeling wrote:
             | They don't have a business model yet, is the thing.
        
             | bschmidt1 wrote:
             | Well, it's an app that users access all their online info
             | through - bank, email, search, work, social - everything.
             | Even an open-source, decentralized, blockchain, grass-fed,
             | organic, extra virgin, written in nothing but HTML,
             | released by W3C itself browser could monetize just ~5% of
             | market share if users are downloading their build (or if
             | its baked into the source), considering how much a browser
             | reveals about its user and to the extent the user can be
             | retargeted for: Ads, marketing, surveillance, analytics.
             | 
             | The biggest opportunity has to be driving search traffic to
             | the major search providers all these browsers partner with.
             | 
             | Could also get acquired by a major browser vendor if you
             | have a better product and people are downloading it more
             | than the major ones, especially if both are based on the
             | same underlying engine. Even Firefox still sucks to this
             | day. I'm using it right now (Waterfox) the product still
             | sucks! I know of some browser vendors acquiring others,
             | especially as mobile took off and it was hard to get it
             | right.
             | 
             | Seems like the opportunity is similar to that of social
             | media but slightly more modern because nobody uses new
             | social media anymore but people are trying out new browsers
             | (and you get richer user/usage data).
        
             | pjerem wrote:
             | > Browsers are complicated. It doesn't inspire confidence
             | that the folks in charge of that complexity can't get their
             | heads around a business model.
             | 
             | Unfortunately you are also describing Mozilla here.
        
           | throwaway48540 wrote:
           | I don't see an issue, using something like Firebase is what a
           | smart engineer would do. Just this one piece of logic is a
           | problem.
        
             | notoverthere wrote:
             | I tend to agree with this. Why re-invent the wheel by
             | spending engineering effort building a CRUD backend?
             | 
             | If you're trying to bring value to market, focus on your
             | core differentiator and use existing tooling for your
             | boilerplate stuff.
        
               | serial_dev wrote:
               | It's the "chrome replacement we have been waiting for",
               | but (if I read this right), my data is still sent to
               | Firebase? Also it's a browser, not a "tinder but for
               | cats" startup idea I'm writing for my cousin for a beer.
               | 
               | It's not only not a smart engineering decision, it's also
               | a terrible product, reputation and marketing decision.
        
               | notoverthere wrote:
               | I'm not disagreeing about the severity of the security
               | vulnerability that has been uncovered - to be clear, it's
               | an absolute shocker of a bug. It's really disappointing
               | to see.
               | 
               | But I still disagree that the use of Firebase, in and of
               | itself, is a bad engineering decision. It's just a tool,
               | and it's up to you how you use it.
               | 
               | Firebase gives you all features needed to secure your
               | backend. But if you configure it incorrectly, then
               | _that's_ where the poor engineering comes into play. It
               | should have been tested more comprehensively.
               | 
               | Sure. You could build your own backend rather than using
               | a Backend-as-a-Service platform. But for what gain? If
               | you don't test it properly, you'll still be at risk of
               | security holes.
        
               | shermantanktop wrote:
               | > a "tinder but for cats" startup idea
               | 
               | Needs a name. Meowr? Hissr?
        
               | duskwuff wrote:
               | Yowlr. (Which is apparently a dubstep musician.)
        
         | Imustaskforhelp wrote:
         | I agree & disagree.
         | 
         | Browsers are very important part of our life. If someone
         | compromises our browsers , they basically compromise every
         | single aspect of privacy and can lead to insane scams.
         | 
         | And because arc browser is new , they wanted to build fast and
         | so they used tools like firebase / firestore to be capable of
         | moving faster (they are a startup)
         | 
         | Now I have read the article but I am still not sure how much of
         | this can be contributed to firebase or arc
         | 
         | On the following page from same author (I think)
         | https://env.fail/posts/firewreck-1 , tldr states
         | 
         | - Firebase allows for easy misconfiguration of security rules
         | with zero warnings
         | 
         | - This has resulted in hundreds of sites exposing a total of
         | ~125 Million user records, including plaintext passwords &
         | sensitive billing information
         | 
         | So because firebase advocates itself to the developers as being
         | safe yet not being safe , I think arc succumbed to it.
         | 
         | firestore has a tendency to not abide by the system proxy
         | settings in the Swift SDK for firebase, so going off my hunch,
         | 
         | Also , you say that you have been convinced to never use arc
         | again.
         | 
         | Did you know that chrome gives an unfair advantage to its user
         | sites by giving system information (core usage etc.) and some
         | other things which are not supposed to be seen by browsers only
         | to the websites starting with *.google.com ?
         | 
         | this is just recently discovered , just imagine if something
         | more serious is also just waiting in the shadows Couldn't this
         | also be considered a major security vulnerability just waiting
         | to be happen if some other exploit like this can be discovered
         | / google.com is leaked and now your cpu information and way
         | more other stuff which browsers shouldn't know is with a
         | malicious threat actor ?
        
           | prmoustache wrote:
           | You do know that there are more than chrome and arc right?
        
           | nine_k wrote:
           | I very much agree with the idea that browsers are security-
           | sensitive software, unlike, say, a picture editor, and more
           | like an ssh server. It should be assumed to be constantly
           | under attack.
           | 
           | And browser development is exactly _not_ the area where I
           | would like to see the  "move fast, break things" attitude.
           | While firebase may be sloppy with security and thus unfit for
           | certain purposes, I would expect competent developers of a
           | browser to do due diligence before considering to use it, or
           | whatever else, for anything even remotely related to
           | security. Or, if they want to experiment, I'd rather that be
           | opt-in, and come with a big banner: _" This is experimental
           | software. DO NOT attempt to access your bank account, or your
           | real email account, or your social media accounts"_.
           | 
           | With that, I don't see much exploit potential in learning
           | stats like the number of cores on your machine. Maybe
           | slightly more chances of fingerprinting, but nothing
           | comparable to the leak through improper usage of firebase.
        
           | IggleSniggle wrote:
           | > Did you know that chrome gives an unfair advantage to its
           | user sites by giving system information (core usage etc.) and
           | some other things which are not supposed to be seen by
           | browsers only to the websites starting with *.google.com ?
           | 
           | That's pretty interesting. Where can I learn more about this?
        
             | chucksmash wrote:
             | I recall there being a thread with way more discussion at
             | the time, but I can't put my finger on that thread right
             | now. This post has some information:
             | 
             | https://news.ycombinator.com/item?id=35152419
        
           | jaharios wrote:
           | >>Did you know that chrome gives an unfair advantage to its
           | user sites by giving system information (core usage etc.) and
           | some other things which are not supposed to be seen by
           | browsers only to the websites starting with *.google.com ?
           | 
           | Yeah so using chrome based browsers like Arc is giving more
           | power to Google to do shady stuff while also being a victim
           | of the third party unsafe code.
        
         | arcisbad wrote:
         | This convinced me to never use Arc again. I created a small
         | guide to migrate from it to an open-source alternative:
         | https://gist.github.com/clouedoc/4acc8355782f394152d8ce19cea...
         | 
         | TL;DR: it's not possible to export data from Arc, but it's
         | possible to copy-paste the folder to a Chrome profile, and
         | Firefox and other browsers will detect&import it.
        
           | Sakos wrote:
           | Unfortunately, Zen Browser simply isn't an alternative. If
           | you like Arc, then Zen's UI for tabs and splitting views
           | isn't really anywhere close to satisfying the same needs.
        
             | EraYaN wrote:
             | At least Firefox seems to be borrowing some of the UI
             | features slowly. At least the Mozilla Foundation is very
             | public with their wants and goals.
        
             | EraYaN wrote:
             | Firefox seems to be borrowing some of the UI features
             | slowly (at least the vertical tabs). And at least the
             | Mozilla Foundation is very public with their wants and
             | goals.
        
           | trumad wrote:
           | I also wrote a guide on ARC features that work better on
           | Firefox: https://thannymack.com/#Arc%20features%20that%20work
           | %20bette...
        
         | tailspin2019 wrote:
         | The mandatory account just to try Arc was always a massive red
         | flag to me - and led to me never trying it. Now I'm glad I
         | didn't!
        
           | shermantanktop wrote:
           | You could have just borrowed someone else's, it appears.
        
             | mdaniel wrote:
             | Ironically, that would help the privacy concerns since it
             | would intermingle all traffic in their analytics system.
             | Win-win!
        
           | bschmidt1 wrote:
           | No Linux version prevented me from trying it, didn't even get
           | to the account wall, who knows if there's a pay wall. Perhaps
           | the "moat" concept was misunderstood.
        
         | gwd wrote:
         | On the other hand, this is pretty impressive:
         | aug 25 5:48pm: got initial contact over signal (encrypted) with
         | arc co-founder hursh         aug 25 6:02pm: vulnerability poc
         | executed on hursh's arc account         aug 25 6:13pm: added to
         | slack channel after details disclosed over encrypted format
         | aug 26 9:41pm: vulnerability patched, bounty awarded
         | sep 6 7:49pm: cve assigned (CVE-2024-45489)
         | 
         | Four hours from out-of-the-blue initial contact until a fix
         | pushed is pretty good, even given how simple this fix probably
         | was.
         | 
         | EDIT: Oh, the date changed; so it was 28 hours until fix. Still
         | decent; and half an hour from initial contact to "Join our
         | slack channel" is incredibly fast response time.
        
           | tadzik_ wrote:
           | 28 hours (note the date), but still
        
           | Rygian wrote:
           | Reacting fast is the least the vendor could do. Bare minimum.
           | This should not be applauded. It should be treated as "well,
           | at least they reacted at a reasonable speed so the root cause
           | was probably not malice".
           | 
           | In other words, a quick turnaround with a fix does not lessen
           | the impact of being negligent about security when designing
           | the product.
        
             | darby_nine wrote:
             | > Reacting fast is the least the vendor could do.
             | 
             | And yet, so few do. Let's remind ourselves the bar sank
             | into the floor a long time ago.
        
             | gwd wrote:
             | > Reacting fast is the least the vendor could do.
             | 
             | It's certainly the least a vendor _should_ do, but it 's
             | absolutely not the least a vendor _could_ do, as we see the
             | vast majority of vendors do far, far less. It 's worth
             | holding people up and saying, "This is how you should be
             | doing it."
        
           | ActionHank wrote:
           | "They put the bandaid over the wound caused by a flagrant
           | disregard for the users privacy, security, and safety."
           | 
           | Phew, glad that's over and will never happen again.
        
         | ForHackernews wrote:
         | What is Arc?
        
           | homebrewer wrote:
           | https://news.ycombinator.com/item?id=36862546
        
         | rpastuszak wrote:
         | Honestly I've always considered Arc to be a wolf in sheep's
         | clothing, especially when it comes to privacy.
         | 
         | 50-60mm cash at 500mm (!) valuation and no business model is a
         | big red flag when it comes to something as important, as
         | personal as a browser. This is not a charity. Someone, somehow
         | will have to pay for that.
        
           | danpalmer wrote:
           | Yeah I'm so torn. It's honestly the best browser UX I've
           | seen, the right combination of vertical tabs, auto archiving,
           | spaces/collections, sync, etc. I don't care for Easels, but
           | the core is good.
           | 
           | Except... the growth hacks have started to creep in. They
           | overlay an advert for their own AI services on top of regular
           | Google search results pages in their mobile app. Not even a
           | browser chrome UI element, it's literally over the page
           | content. That feels like a huge violation of what it means to
           | be a browser.
           | 
           | I don't want their AI features. I don't want growth hacks. I
           | don't want to sign in except for sync. I'd happily pay $40 a
           | year for Arc as a product-focused-product, but as a VC-
           | focused-product it's heading downhill.
        
             | rawsta wrote:
             | Have you tried Vivaldi? It's really customizable and has a
             | lot of features.
        
             | jwells89 wrote:
             | It does get a lot right and feels smooth in ways that
             | Chrome, the various Chrome-clones, and Firefox just don't.
             | It's also ironically the only browser even trying to feel
             | native on Windows, using WinUI/WinAppSDK for its UI there,
             | despite originally being Mac only.
             | 
             | It's unfortunate that other cross platform browsers have
             | such a strong tendency to phone in these little things,
             | because they really do add up to make for a nicer
             | experience.
        
             | HungSu wrote:
             | You might like Zen Browser https://zen-browser.app/
        
               | emptysongglass wrote:
               | Or Floorp: https://floorp.app
        
             | mthoms wrote:
             | I'm torn for the same reason: The UX hits all the right
             | notes for me and I've tried every MacOS browser under the
             | sun. I'm an ADHD sufferer and there's something about their
             | combination of features and UI that just lets me get stuff
             | done. And I don't even touch their AI features.
             | 
             | This is all really sad news.
        
       | imglorp wrote:
       | OP is talking about the Arc browser, not the Arc language, the
       | Arc "Atomic React" project, or any of scores of other projects
       | with that name.
        
         | throwaway984393 wrote:
         | https://arc.net/faq
         | 
         | I'm definitely not the target audience... Even after reading
         | the faq I have no idea what it does
        
           | efilife wrote:
           | I don't understand what you do not get. In the link you sent
           | they claim to be a privacy oriented web browser based on
           | chromium
        
           | __jonas wrote:
           | It's a browser (chromium based) with a really nice UI that
           | people love, I am intrigued but haven't used it because I
           | find the requirement to create an account off-putting.
        
           | Vegenoid wrote:
           | The "what makes Arc different from other browsers" section is
           | particularly funny.
           | 
           | > Arc is to your ex-browser what the iPhone was to
           | cellphones. Or as one of our members said "like moving from a
           | PC to a Mac." It's from the future -- and just feels great.
        
           | PufPufPuf wrote:
           | As a person that recently started using it: it has something
           | like "tree style tabs", and sort of a hybrid merge of the
           | concepts of tabs and bookmarks. In other words, the tabs work
           | more like files on disk -- open/closed, sorted into folders.
           | I'm probably not explaining it well either, but I encourage
           | you to try it if you ever wanted to experiment with
           | alternative tab management (tree style tab, tab groups etc).
           | It's a concept that clicked for me quickly once I started
           | using it, and now I'm angry since I want to use Firefox for
           | philosophical reasons but don't want to go back to regular
           | tabs.
        
       | water-data-dude wrote:
       | I just wanted to say, I enjoyed the little pixel art cat that
       | runs towards wherever you click immensely. It's one of those fun,
       | whimsical little touches that I don't see all that often. A
       | reminder that the internet can be a fun, whimsical place if we
       | want it to be :)
        
         | mceachen wrote:
         | It's doing great for being a 35-year-old cat!
         | 
         | https://en.wikipedia.org/wiki/Neko_(software)
        
         | TiredOfLife wrote:
         | On desktop it follows the mouse no need to click.
        
         | Semaphor wrote:
         | As I didn't get that, it seems like the dev honors prefers-
         | reduced-motion, and doesn't display it in that case. Excellent
         | of them, give joy to those who want it, prevent annoyances for
         | those who hate them.
        
           | mzs wrote:
           | Same for me, on FF you can override it with:
           | about:config         ui.prefersReducedMotion = 0
           | 
           | https://developer.mozilla.org/en-
           | US/docs/Web/CSS/@media/pref...
        
           | jeroenhd wrote:
           | It does:
           | https://github.com/adryd325/oneko.js/blob/main/oneko.js
           | const isReducedMotion =
           | window.matchMedia(`(prefers-reduced-motion: reduce)`) ===
           | true ||              window.matchMedia(`(prefers-reduced-
           | motion: reduce)`).matches === true;                      if
           | (isReducedMotion) return;
           | 
           | Simple but effective. More websites should include this
           | check. Well done, adryd325!
        
         | johndough wrote:
         | On Debian, you can install and run the cat with
         | sudo apt install oneko         oneko &
         | 
         | Makes a great gift for colleagues who leave their computer
         | unattended.
        
           | bbarnett wrote:
           | Well that was a rabbit hole.
           | 
           | Current version is hard to even see with high-res screens. A
           | few checks shows endless ports, code from the 90s and before,
           | and all sorts of other fun.
           | 
           | Wonder if the author will reply.
        
           | 0x1ceb00da wrote:
           | You have sudo access to your colleagues computers?
        
             | johndough wrote:
             | I don't, but I run the same system configuration, so I can
             | compile it on my computer, transfer it and run it.
             | 
             | Alternatively, if a compiler such as gcc is available, you
             | could also run                   # https seems to be broken
             | on this website currently         wget http://www.daidouji.
             | com/oneko/distfiles/oneko-1.2.sakura.5.tar.gz         tar
             | -xf oneko-1.2.sakura.5.tar.gz         cd
             | oneko-1.2.sakura.5/         gcc oneko.c -lX11 -lm -o oneko
             | ./oneko &         cd ..         # remove all traces
             | rm -r oneko-1.2.sakura.5 oneko-1.2.sakura.5.tar.gz
        
         | lukan wrote:
         | I did not. On the firefox mobile browser it was just using
         | screen space.
        
         | nkrisc wrote:
         | And here I was wishing it would go away and trying to find a
         | way to hide it because on my phone it was always covering text.
         | Firefox reader mode worked.
        
         | brettermeier wrote:
         | It is distracting and annoyed me, I stopped reading because of
         | it.
        
           | lelandfe wrote:
           | I thought it just ran around on the top line of the header,
           | and was quite taken with it. I then scrolled and it followed
           | me right into the middle of a paragraph. Less taken, but
           | cat's gonna cat.
        
         | wpietri wrote:
         | For the curious, that specific cat goes back to 1989:
         | 
         | https://en.wikipedia.org/wiki/Neko_(software)
        
         | zendaven wrote:
         | I guess it's removed? I don't see it. On Windows Chrome.
        
         | hbn wrote:
         | It's cute but I just can't focus on the article knowing the cat
         | is gonna move every time I move my mouse or scroll. I popped
         | open my console and deleted him. Sorry, kitty
        
         | jonny_eh wrote:
         | I found it, like an actual cat, extremely distracting.
        
       | userbinator wrote:
       | _while researching, i saw some data being sent over to the
       | server, like this query everytime you visit a site_
       | 
       | I'm not surprised in the least --- basically the vast majority of
       | software these days is spyware. Looking at Arc's privacy page, it
       | appears to be mainly marketing fluff similar to what I've seen
       | from other companies. I have yet to find a privacy policy that
       | says frankly "we only know your IP and time you downloaded the
       | software, for the few weeks before the server logs are
       | overwritten."
        
         | nickisnoble wrote:
         | Yeah, and no mention of if they addressed this.
        
           | SushiHippie wrote:
           | According to their blog post
           | https://arc.net/blog/CVE-2024-45489-incident-response they
           | fixed it:
           | 
           | > We've fixed the issues with leaking your current website on
           | navigation while you had the Boost editor open. We don't log
           | these requests anywhere, and if you didn't have the Boosts
           | editor open these requests were not made. Regardless this is
           | against our privacy policy and should have never been in the
           | product to begin with.
        
         | latexr wrote:
         | > I have yet to find a privacy policy that says frankly "we
         | only know your IP and time you downloaded the software, for the
         | few weeks before the server logs are overwritten."
         | 
         | Not with those exact words, but that's Alfred. Server
         | connections are done only to validate the license and check for
         | updates, and you can even disable that.
         | 
         | https://www.alfredapp.com/terms/
         | 
         | > Alfred only contacts our server when activating your
         | Powerpack license in order to validate it, as well as
         | periodically checking for new software updates. You can disable
         | the software update check in the Update preferences, but we
         | recommend keeping this enabled to ensure that you always have
         | the latest version for security reasons and to make the most of
         | the awesome new features!
        
         | hypeatei wrote:
         | Seeing "privacy focused" in any sort of mission statement is
         | almost becoming an indicator of the opposite (I'm sure there's
         | a word for this)
         | 
         | I'd rather a company have simple goals that can be explained in
         | a sentence or two. No hand wavey BS like "we care about your
         | privacy"
        
       | supriyo-biswas wrote:
       | Great research. As I've said elsewhere, Firebase's authentication
       | model is inherently broken and causes loads of issues, and people
       | would be better off writing a small microservice or serverless
       | function that fronts Firebase.
       | 
       | Also, for anyone trying to read the article, they should put
       | `/oneko.js` in their adblocker.
        
         | Aaron2222 wrote:
         | > Also, for anyone trying to read the article, they should put
         | `/oneko.js` in their adblocker.
         | 
         | Only if you hate cats, pixel art, or are easily distracted.
        
           | hunter2_ wrote:
           | I suspect it's that they hate are easily distracted (if
           | "hate" falls outside of the series, such that it applies
           | beyond just "cats")!
        
           | nottorp wrote:
           | Looks like someone already added it to uBlock Origin since I
           | see no cat.
           | 
           | Or maybe the cat doesn't support Firefox...
        
             | doix wrote:
             | Did you enable the ui.prefersReducedMotion setting? That
             | hides the cat from what I can tell
        
               | nottorp wrote:
               | Hmm not that I remember. But I have reduced motion
               | enabled on my phone system wide and maybe that synced to
               | my desktop on its own.
               | 
               | Which is scary come to think of it.
        
               | nottorp wrote:
               | Too late to edit... i just got around to checking and I
               | do have system wide reduced motion and reduced
               | transparency on this laptop. I'm sure I didn't set it up
               | on there, just on the phone.
               | 
               | I think Apple is starting to sync too much...
        
               | latexr wrote:
               | That seems like a perfectly reasonable thing to sync.
               | Accessibility settings are exactly the type of thing you
               | shouldn't have to configure again and again on every
               | device.
               | 
               | Either way, you can disable syncing of system settings.
        
               | nottorp wrote:
               | > That seems like a perfectly reasonable thing to sync.
               | Accessibility settings are exactly the type of thing you
               | shouldn't have to configure again and again on every
               | device.
               | 
               | No, because I disabled motion on my phone because the
               | wiggling of icons on the main screen annoyed me, not
               | because I have motion sickness. Nothing wiggles on the
               | desktop (yet). This option doesn't even belong in
               | accessibility IMO, it should be a "stop annoying me"
               | section.
               | 
               | > Either way, you can disable syncing of system settings.
               | 
               | Where? The same spot where I can disable syncing the
               | clipboard? I.e. somewhere deep in an undocumented file?
        
               | latexr wrote:
               | Gotta be honest, the aggressive and unreasonable snark
               | completely turns me off from helping you. It feels that
               | regardless of the obviousness of the setting, you'll find
               | some nitpick to shout back at me about it. Since I don't
               | work for Apple or yourself, I don't have to justify their
               | choices or be the recipient of your unjustified and
               | unprompted bad humour. I'm making a conscious choice to
               | not soil my Friday on account of some internet rando.
               | You're on your own for this one.
               | 
               | I genuinely wish you a calm weekend and peaceful start of
               | the week.
        
               | nottorp wrote:
               | Thanks for the martyrdom but last time I checked
               | clipboard syncing it was a package with everything that
               | gets synced, including sms forwarding etc on Apple. If
               | there is a way to disable syncing granularly it's not
               | documented anywhere.
        
               | dgellow wrote:
               | Ah thanks, that explains why I don't see the cat
               | everybody mentions
        
             | eru wrote:
             | I use uBlock Origin and Firefox (on Mac) and see the cat.
        
           | Milner08 wrote:
           | Im dyslexic and I tend to use the pointer to follow what I am
           | reading to help me. The cat was annoying as hell. I just had
           | to hide the element in the DOM before i could read more than
           | a few lines. Infuriating design choice to make it follow the
           | pointer.
        
         | zachrip wrote:
         | It's really not hard to build this safely in firebase, this
         | could've been authored the same way in node too. I think
         | whoever authored this either majorly cut corners or just isn't
         | experienced enough to understand how to write authenticated
         | controllers like this. This should scare people away from this
         | browser, it's such a basic thing to mess up and it shouldn't
         | have happened.
        
         | Sakos wrote:
         | > Firebase's authentication model is inherently broken
         | 
         | I'm not very familiar with Firebase. In what way is it broken
         | and what issues does it cause?
        
           | supriyo-biswas wrote:
           | The fact that clients write directly into the database and
           | that it's widely encouraged.
           | 
           | There are security rules in Firebase to prevent this, but
           | bolt-on security models that the user has to explicitly
           | enable haven't shown to work.
        
       | shepherdjerred wrote:
       | $2000 is an insulting amount for such a huge vuln
        
         | isoprophlex wrote:
         | Yeah, you have to have some solid backbone not to sell this off
         | to some malicious party for 20-50x that amount...
        
           | saagarjha wrote:
           | A malicious party who wants a vulnerability in a browser
           | effectively nobody uses?
        
           | umanwizard wrote:
           | Am I too optimistic? I feel like most regular people I know
           | wouldn't sell this off. Most people are not antisocial
           | criminals by nature, and also wouldn't know how to contact a
           | "state actor" even if they wanted to.
        
             | pityJuke wrote:
             | > also wouldn't know how to contact a "state actor" even if
             | they wanted to.
             | 
             | That's why brokerages like Zerodium exist - you can sell it
             | to them, and they'll sell it onto state actors.
        
               | apitman wrote:
               | How does this work in practice? What systems are in place
               | to prevent someone selling an exploit and then turning
               | around and disclosing it properly as soon as they have
               | the money, potentially getting even more money through
               | legal channels? Is there some sort of escrow?
        
             | diggan wrote:
             | > Am I too optimistic? I feel like most regular people I
             | know wouldn't sell this off.
             | 
             | Probably you're just used to a relatively good life, not a
             | bad thing :)
             | 
             | Image being able to sell this off for $20,000 (although I
             | think you could ask for more, seems to be a really bad
             | vulnerability) in a marketplace, for >90% of the world
             | that's a pretty good amount of money that you could survive
             | a long time on or add a lot of additional quality to your
             | life.
        
             | timeon wrote:
             | Opportunity makes a thief. Most people does not have the
             | opportunity even if they have skill.
        
         | dgellow wrote:
         | Yeah, that was my first reaction. I'm really surprised they
         | were cheap on this
        
         | bruh2 wrote:
         | Judging by blog posts on HN, I got the impression that these
         | vulnerabilities are often not rewarded at all, or rewarded by a
         | minuscule amount. It almost seems like companies are begging
         | hackers to sell these exploits. Perhaps because they aren't
         | penalized by the regulator for breaches?
        
           | Spivak wrote:
           | They offer a low price because the risk of tanking your
           | career, landing yourself in jail, and the fact that the
           | researcher probably doesn't know how to line up a sale means
           | the company is the only buyer.
           | 
           | I would go the other way, companies offer low bug bounties
           | because they don't want researchers to discover them in the
           | first place. This looks terrible for Arc despite the fact if
           | left undisclosed it probably would have continued to be
           | unexploited for years to come.
        
       | monroewalker wrote:
       | Can we have Arc added to the title of the post to better alert
       | people who use or know people who use the browser?
        
         | gcr wrote:
         | Huge agree. I didn't realize this applied to me the first time
         | I saw this story yesterday. It was the rename that got me to
         | click.
         | 
         | Honestly I strongly feel the title should be "fundamental bug
         | in Arc browser (CVE 123-4567)" or similar.
        
       | ahoef wrote:
       | Nice article, but this is hard to read without proper
       | capitalization. My brain uses capitals to scan beginning and
       | ending of text.
        
         | michaelt wrote:
         | If you were using Arc you could add a Boost for "Case: toggle
         | between different capitalization settings - they will apply to
         | all text on the webpage" [1]
         | 
         | /s
         | 
         | [1] https://resources.arc.net/hc/en-
         | us/articles/19212718608151-B...
        
           | ramonverse wrote:
           | this made me laugh. 10/10
        
           | 63stack wrote:
           | Depending on the version you are using, you might not even
           | need to add it, someone else might just add it for you!
        
         | Aachen wrote:
         | I was similarly fascinated by the stylistic choices made here.
         | No capitalisation of even any names, no hyphen in a compound
         | adjective, but dots and commas and spaces are deemed necessary,
         | also before "and" where the word clearly acts as separator
         | already. If you look at the waveform of speech, we have no
         | spaces between regular words so, if they want to eliminate
         | unnecessary flourishes... though perhaps (since text largely
         | lacks intonation markers) that makes it too unreadable compared
         | to the other changes. All this is somehow at least as
         | fascinating to me as the vulnerability being described!
        
           | latexr wrote:
           | It's just another dumb social media trend, like tYpiNg LiKe
           | tHiS. Hopefully it too will phase out. Search for "lowercase
           | trend" and you'll find reports of it going years back,
           | there's nothing worth being fascinated about.
           | 
           | It has seeped into HN as well. Look closely and you'll notice
           | several commenters type like that.
        
             | Wingy wrote:
             | I use it to indicate tone. Proper capitalization and
             | punctuation reads with a formal, cold tone.
             | 
             | lowercase without caps reads with a warmer, informal tone
             | 
             | there's a Tom Scott Language Files video documenting it:
             | https://www.youtube.com/watch?v=fS4X1JfX6_Q
        
               | bluehatbrit wrote:
               | That's really interesting, I personally don't read those
               | tone differences based on the casing. Neither approach
               | carries different warmth or formality to me at all.
               | 
               | I wonder if this is a regional or generational thing?
        
               | latexr wrote:
               | > I wonder if this is a regional or generational thing?
               | 
               | Generational is a good bet:
               | 
               | https://news.ycombinator.com/item?id=41537994
        
               | Wingy wrote:
               | It's definitely primarily generational. In my experience,
               | capitalization-as-tone is used by many Generation Z
               | people. On the other hand, it is not widely used by older
               | generations, or the younger Generation Alpha.
        
               | latexr wrote:
               | > lowercase without caps reads with a warmer, informal
               | tone
               | 
               | Personally, and I'm certain I'm not alone on this, it
               | reads as annoying. It's harder to follow and looks as if
               | the writer didn't care to do the bare minimum to make the
               | text accessible and clear to the reader.
               | 
               | > there's a Tom Scott Language Files video documenting it
               | 
               | Per that video (thank you for sharing), capital letters
               | "make a paragraph easier to read" and "context matters"
               | and "the conventions change fairly quickly" and typing in
               | all lowercase is " _sometimes_ okay".
               | 
               | This is a post _documenting_ a serious browser
               | vulnerability, shared to the wide internet, not an
               | informal conversation between buddies. Clarity matters. I
               | don't fully buy the tone argument and find words and
               | sentence structure are more important. Take the following
               | two examples:
               | 
               | > Just heard about your promotion, you beautiful bastard!
               | Let's go get pissed to celebrate, on me!
               | 
               | And:
               | 
               | > good afternoon mrs bartlet. the limousine will be
               | available in twenty minutes. i would also like to
               | apologise for my behaviour yesterday when i inadvertently
               | insulted your husband it was a faux pas i promise will
               | not be repeated. my resignation will be on your desk by
               | noon.
               | 
               | I get that language evolves. You do you. Personally I
               | hope this trend subsides like so many others before it.
               | Maybe you don't like to read properly structured text and
               | prefer all lowercase. My preference is the reverse. And
               | that's OK, we don't all have to be the same. I merely
               | wish that people who prefer a certain style understand
               | not everyone will see it the same way they do (and I'm
               | including myself).
        
               | Wingy wrote:
               | That's true. I agree with you that anything less than a
               | formal tone would be, and is, inappropriate for this
               | context. I also respect that you prefer standard
               | capitalization and punctuation at all times. Being aware
               | of the audience is critical for any writer.
        
               | bigstrat2003 wrote:
               | > lowercase without caps reads with a warmer, informal
               | tone
               | 
               | No, it reads as "I'm uneducated and don't know how to
               | write the English language properly". It's incredibly
               | obnoxious for people to use as an affectation.
        
               | scblock wrote:
               | Relax, buddy.
        
               | AnimalMuppet wrote:
               | To me, proper capitalization is easier to parse - not
               | massively so, but a little bit. So writing without caps
               | is a bit of a jerk move. You're making it harder for me
               | to read, either because you're lazy or because you want
               | to affect a style. In either case it's a bit of a jerk
               | move.
               | 
               | It's more of a jerk move when it's done on a discussion
               | board, because what you write once is read multiple
               | times. So the cost multiplies, but (if due to laziness)
               | the benefit only occurs once.
               | 
               | Now, in something like texting, I understand, when you're
               | trying to type on that teeny phone keyboard. It's harder
               | to hit the shift key when you don't have a spare finger
               | because you're only using one. But for something like
               | here, take the time and the effort to make it better for
               | your readers.
        
               | Wingy wrote:
               | On a formal discussion board like this, I don't believe
               | an informal tone is correct. To me, it doesn't make it
               | harder to read, but it does come across as mildly
               | disrespectful of the environment.
               | 
               | When texting on a phone, the default is to automatically
               | capitalize. Using all-lowercase requires more work than
               | doing nothing. It isn't lazy or even more efficient to go
               | back and replace your "I"s with "i"s. With the right
               | reader, it's done to give them a better idea of the tone
               | you wish to deliver.
               | 
               | With that said, it requires a certain degree of audience
               | awareness. Many people do not interpret lack of
               | capitalization the same way I do, as evidenced by this
               | thread. On my phone, I have auto-capitalization disabled.
               | When texting someone for the first time, I tend to use
               | proper capitalization, even if I want a casual tone. I
               | just did a typing test with capitalization and
               | punctuation and scored 55 wpm on my phone. It's a choice
               | I make and it varies based on audience, and intended
               | tone. Effort, on the other hand, is not a factor.
        
               | PKop wrote:
               | It's extremely irritating, distracting, and breaks focus
               | on the content instead of the annoying stylistic choice,
               | just an fyi..but I imagine you probably like that this is
               | true and purposely try to annoy the people that aren't in
               | the little club. If not, then I suggest not doing it. The
               | tone I perceive from it is "F**** the reader"
        
               | Aachen wrote:
               | > ... you probably like that this is true and purposely
               | try to annoy ...
               | 
               | I don't know if you meant to direct this at the person
               | you're replying to but I'm convinced the overwhelming
               | majority of people don't get out of bed in the morning
               | with any of that in mind
               | 
               | It's comments like these that make me reconsider what
               | hateful meanings others might read into my communications
               | or mistakes
        
               | PKop wrote:
               | Yes I mean this to anyone repeatedly, consciously
               | fighting natural convention and muscle memory to
               | purposely type every letter in lowercase, knowing that
               | this produces in the reader a slight dissonance and
               | distraction constantly, and choosing to do this instead
               | of using convention that everyone understands so that
               | "syntax" does not become the focus and instead the
               | content of the message does.
               | 
               | Otherwise they're "drawing attention" to the style and
               | themselves for narcissistic reasons. I would simply
               | assume they'd have to know the annoyance this brings to
               | the reader, so I assume it's on purpose.
               | 
               | I would feel the same about someone writing code in a
               | consistently purposeful unorthodox style and against
               | convention in such an obvious and effortful way that no
               | one is used to. Personally, and YMMV, I like to _try_ to
               | write in as clear a way as I can to get my point across
               | as much as possible. Useless stylistic fluff in something
               | that isn 't poetry, seems counter to that purpose.
               | 
               | >mistakes
               | 
               | It's not a mistake though to ensure every letter one
               | writes is not following convention and English syntax.
               | Accidents and mistakes are a different thing.
        
             | squigz wrote:
             | Strange to label a failure to capitalize words as a "dumb
             | social media trend", as I'm sure people have been doing
             | that for many years prior to social media.
             | 
             | And nobody tYpEs lIkE tHiS except when making a joke.
        
               | latexr wrote:
               | > Strange to label a failure to capitalize words
               | 
               | It's not a _failure_ , it's a conscious choice.
               | 
               | > as I'm sure people have been doing that for many years
               | prior to social media.
               | 
               | But now it's happening more frequently. That's what
               | "trend" means. It doesn't mean it never happened before.
               | 
               | > And nobody tYpEs lIkE tHiS except when making a joke.
               | 
               | Just because you don't know people like that, does not
               | mean they don't exist. The world is bigger than one
               | person's knowledge. I personally knew several teenagers
               | who did it for all their communication, before
               | smartphones. The speed at which they were able to do it
               | was astounding.
        
               | Aachen wrote:
               | What do you mean by "before" social media here? Surely
               | not handwritten or typewritered letters, I guess you mean
               | like 2005-2010ish?
               | 
               | The term wasn't popular then but with reddit's and
               | Facebook's infancies being twenty years ago, "social
               | media" (which I understand to refer to platforms where
               | you can talk to people and post things about different
               | topics, so broader and more person-oriented than an SMF
               | forum but narrower than the WWW) have been around for a
               | while
               | 
               | The first time I saw lowercase writing like this was two
               | years ago on the Discord guild/community of a game which
               | got popular on tiktok. I don't know the average age but
               | the (statistical) mode was probably in the range of 13-16
        
             | segasaturn wrote:
             | Social media? I remember people doing the lowercase thing
             | back on IRC. It was an indicator of informality and
             | "coolness".
        
         | ocean_moist wrote:
         | Young people (like me) use lowercaps like that all the time.
         | Around 50% of the young people I know purposefully turn off
         | auto-caps on their phone.
         | 
         | Why? I really couldn't say. I think we just like the feel of
         | it. The only reason I type with proper capitalization on HN and
         | my blog is because I know older people read it.
        
       | orliesaurus wrote:
       | I wish we didn't have to sign up to use a browser in the future
        
         | sulandor wrote:
         | just don't use browsers that do
        
         | soundnote wrote:
         | With Brave you don't need to, even for sync.
        
       | bestest wrote:
       | the developers working with firebase should enforce common-sense
       | document crud restrictions in the rules. that's just how firebase
       | is. everyone knows it.
       | 
       | now, when talking about ARC BROWSER, i am seriously starting to
       | doubt the competence of the team. I mean, if the rules are broken
       | (no tests? no rules whatsoever?), what else is broken with ARC?
       | are we to await a data leak from ARC?
       | 
       | any browser recommendations with proper vertical tabs and
       | basically everything working like it does in ARC?
        
         | fold3 wrote:
         | Did you took a look at the zen browser? It's an arc clone based
         | on Firefox https://zen-browser.app/
        
           | bestest wrote:
           | nice. will probably try it in the future.
           | 
           | but the for-some-reason-not-obvious revelation that it's just
           | a product that some team somewhere is working on and the fact
           | that a browser is an important piece of software brought me
           | back to safari (not sure if joke's on me, but in this case I
           | trust apple engineers to do a more thorough job in ensuring
           | my data is secure).
        
           | tomaskafka wrote:
           | I did. It's like 20 % an Arc clone, and 80 % of UX papercuts.
           | Like, you can't have 'add tab' button on top when the new tab
           | gets added to the bottom. Or that one sidebar button opens a
           | side window to the right of the sidebar, while another below
           | it opens the favorites to the left and moves the whole
           | sidebar from underneath your mouse.
           | 
           | Looks like a minimal effort css restyle of Firefox.
        
           | currymj wrote:
           | i'm rooting for them to succeed, but if the concern is
           | security, switching your daily driver browser to a brand-new
           | browser that's still in alpha is unfortunately not a good
           | idea.
        
             | radicaldreamer wrote:
             | It's not in Alpha though, they've been around for years and
             | have launched formally.
        
         | Wingy wrote:
         | Zen and MS Edge have proper vertical tabs.
        
         | adhamsalama wrote:
         | Try Firefox with Sideberry extension.
        
         | soundnote wrote:
         | Brave. Vertical tabs, privacy, everything sync is e2ee (unlike
         | eg. Edge).
         | 
         | Vivaldi may also be worth a look. Similar setup: User-oriented
         | team, vertical tabs, e2ee sync. If you like a thorough browser
         | history, I think Vivaldi keeps a more detailed browsing history
         | than most other Chromium browsers.
        
           | tomaskafka wrote:
           | Brave is VC funded and needing to extract a billion of value.
           | Just like Arc.
        
       | jongjong wrote:
       | This is a nice investigation and a great read. Sad that they
       | don't normally do bug bounties. $2000 seems small considering the
       | severity of this vulnerability. Though I guess the size and
       | finances of the company is a factor. It takes some serious
       | skills, effort and luck to discover something like that. It
       | should be well compensated.
        
       | ainiriand wrote:
       | Start -> Control Panel -> Programs and Features -> Search 'Arc'
       | -> Uninstall.
        
         | erdinc wrote:
         | ...said Windows user.
        
       | whatevermom wrote:
       | I'm ashamed I fell for Arc and even recommended it to my friends,
       | as someone whose job is exactly this but with Android apps :(
        
         | efilife wrote:
         | They claim so much and their browsers' code is 100% proprietary
         | so it's impossiblen to verify their lies. This is what
         | triggered the bullshit detector in my head
        
           | latexr wrote:
           | > They claim so much and their browsers' code is 100%
           | proprietary
           | 
           | Far from me to defend Arc (I dislike it for several reasons)
           | but it's based on Chromium so it's far from 100% proprietary.
           | Don't Edge, Vivaldi, and even Chrome have proprietary layers
           | on top of the open-source Chromium?
        
             | soundnote wrote:
             | Vivaldi's inhouse UI code isn't open source, but is visible
             | for users to verify AFAIK.
        
       | Borgz wrote:
       | According to this article, Arc requires an account and sends
       | Google's Firebase the hostname of every page you visit along with
       | your user ID. Does this make Arc the least private web browser
       | currently being used?
        
         | causal wrote:
         | I trashed Arc immediately after install when I found out having
         | an account was mandatory. That seemed so silly, like
         | toothbrushes-requiring-wifi absurd. How much moreso now.
        
           | scblock wrote:
           | Truly. I was looking for a privacy respecting Chromium-based
           | browser to use for Web MiniDisc (https://web.minidisc.wiki/)
           | and came across some enthusiastic praise for Arc. I
           | downloaded it and it immediately wanted me to create an
           | account to even use it. How can that possibly respect my
           | privacy? It went right in the trash.
        
             | timeon wrote:
             | What is also strange that I only found out about account
             | after download. Like it was standard thing for the browser.
             | (Sure there are optional accounts in others but login-
             | walled browser?)
        
               | roywiggins wrote:
               | Windows is practically login-walled[0] at this point so I
               | imagine people are slowly getting to expect it.
               | 
               | [0] witness the magic incantations needed
               | https://www.tomshardware.com/how-to/install-
               | windows-11-witho...
        
               | ziddoap wrote:
               | Another strange thing about the account... They have a
               | little section under "Security" FAQ (lol) that says:
               | 
               | > _" Why does Arc require an account to use?"_
               | 
               | The answer is:
               | 
               | > _" Here's a link to our forum that explains the
               | rationale behind requiring an account to use Arc: Why do
               | I need an account?"_
               | 
               | That link goes to here: https://resources.arc.net/hc/en-
               | us/articles/19401542261911-B...
               | 
               | Which... Doesn't explain why you need an account!
        
               | radicaldreamer wrote:
               | They want an easy path to onboard you into paying for
               | stuff.
        
           | DevX101 wrote:
           | I did the same. Requiring an account for a browser is
           | immediately disqualifying. I don't care how many features it
           | has.
        
           | jonny_eh wrote:
           | Even Chrome wouldn't dare
        
           | macintux wrote:
           | I had the same response when I downloaded Dart and discovered
           | that a programming language thought it was acceptable to send
           | telemetry.
        
         | AzzyHN wrote:
         | I think OperaGX wins that award
        
         | mrweasel wrote:
         | I'm also left wondering: How broken would Arc be, if Firebase
         | was to go down?
        
           | diggan wrote:
           | I guess it's relatively easy to test, add the Firebase domain
           | to your host file and point it to 127.0.0.1 and try to use
           | the browser.
           | 
           | Sometimes things like this handle connection failures better
           | than "never-ending connection attempts", so you might want to
           | try to add a throttle or something too for the traffic
           | between the domain and the browser, might also trip it up.
        
         | ARandomerDude wrote:
         | "Arc is the Chrome replacement I've been waiting for." [1]
         | 
         | > https://arc.net/
         | 
         | I guess now we know why they frame it that way.
        
       | eru wrote:
       | For context: what is this 'arc' that the blog post mentions? I
       | presumes it's not Paul Graham's Lisp dialect in this context?
       | 
       | EDIT: seems to be a browser or so?
        
         | flinth_ wrote:
         | Yes it's a new browser who tries to change the UX from
         | traditional browsers: https://arc.net/
        
       | maipen wrote:
       | Very small bounty, but I honestly believe this arc thing won't
       | last long...
       | 
       | Browsers are hard and my only choice has been chrome and will
       | remain so for the long foreseeable future.
       | 
       | When I was younger I would enjoy switching to firefox, opera,
       | etc..
       | 
       | But I always came back to chrome because it just worked and
       | always performed when I needed.
       | 
       | Chrome/chromium is the safest browser.
       | 
       | People tend to fall for the shiny new thing and then realize it
       | was just hype.
       | 
       | Please be very careful about what software you choose to perform
       | most of your activities.
       | 
       | The same applies to these "new ai IDEs" that keep popping up
       | every other say.
        
         | appendix-rock wrote:
         | ...Firefox as an alternative to Chrome!? Am I really that old!?
         | 
         | I used Chrome for years and years, right from when it first
         | came out. Since then, I switched back to Firefox, and have used
         | it for years. It works perfectly fine.
        
         | lcnPylGDnU4H9OF wrote:
         | > Chrome/chromium is the safest browser.
         | 
         | Why do you say that?
        
         | tomaskafka wrote:
         | Browser is an user agent. Chrome is an advertisement company
         | agent running on your PC, collecting data for that advertising
         | company.
         | 
         | People often confuse these two, but they're the polar
         | opposites.
        
       | __jonas wrote:
       | The vulnerability has been patched, but I suppose the browser
       | still makes a firebase query for every website you visit?
       | 
       | That's pretty bad, whether or not they track these requests, just
       | seems wasteful.
        
       | instagraham wrote:
       | >privacy concerns >while researching, i saw some data being sent
       | over to the server, like this query everytime you visit a site:
       | 
       | > firebase .collection("boosts") .where("creatorID", "==",
       | "UvMIUnuxJ2h0E47fmZPpHLisHn12") .where("hostPattern", "==",
       | "www.google.com");
       | 
       | > the hostPattern being the site you visit, this is against arc's
       | privacy policy which clearly states arc does not know which sites
       | you visit.
        
         | soared wrote:
         | What sort of data does Arc track? Our plain-english Privacy
         | Policy summarizes it well:
         | 
         | We don't know which websites you visit
        
           | nfm wrote:
           | From the quoted snippet, every page load is leaking both the
           | domain and authed user's ID to Firebase.
        
             | Cthulhu_ wrote:
             | Yeah but if they super promise to not look at incoming
             | Firebase queries they're not tracking you, right?
        
               | bschmidt1 wrote:
               | The super promise died with crypto, now you have to add
               | no backsies. My site uses No Backsies Proofs (NBPs) which
               | are encrypted to prove that all my super promises are
               | backed by a no backsie which is stored in the no backsie
               | vault in Antarctica.
        
               | fouc wrote:
               | Later on moxie ends up writing a quick review of NBPs
               | 
               | > Instead of storing the data on-chain, NBPs instead
               | contain a URL that points to the data. What surprised me
               | about the standards was that there's no hash commitment
               | for the data located at the URL. Looking at many of the
               | NBPs on popular marketplaces being sold for tens,
               | hundreds, or millions of dollars, that URL often just
               | points to some VPS running Apache somewhere. Anyone with
               | access to that machine, anyone who buys that domain name
               | in the future, or anyone who compromises that machine can
               | change the image, title, description, etc for the NBP to
               | whatever they'd like at any time (regardless of whether
               | or not they "own" the token). There's nothing in the NBP
               | spec that tells you what the image "should" be, or even
               | allows you to confirm whether something is the "correct"
               | image.
        
               | ruined wrote:
               | this is why my startup is launching backsies rollups for
               | the blob, with null-effect prebacksies. this way everyone
               | can be assured that any backsies issued are technically
               | equivalent to just not making the original agreement! if
               | you can discover a post-agreement backsie within the
               | availability period of 0 days, and we can confirm it,
               | we'll pay you $2,000 no backsies. so we have a market
               | incentive not to lie to you. it's very efficient
        
               | fouc wrote:
               | indeed, the market efficiency of a house of cards built
               | on sand and thin ice cannot be overstated
        
               | LegitShady wrote:
               | I would feel more comfortable if your super promises were
               | all on a blockchain, and we made No Backsie NFTs so
               | people could clearly see these were legitimate and bid on
               | them.
        
         | wredue wrote:
         | Maybe I am just stupid, but this *super* smells of arc being
         | able to inject whatever they want in to literally any of your
         | websites and this dude just figured out that he could also do
         | that.
         | 
         | This does not seem like a browser capability I want.
        
           | timeon wrote:
           | seems like it is the case:
           | https://news.ycombinator.com/item?id=41601332
        
       | trallnag wrote:
       | How could one sell a vulnerability like this to let's say Mossad?
       | Write them an email?
        
         | who-shot-jr wrote:
         | Page them :)
        
         | diggan wrote:
         | https://www.mossad.gov.il/contact-us/en
         | 
         | Interestingly enough, contains a field for entering your
         | Father's name (but not your mother's).
        
       | pknerd wrote:
       | Man I miss these kinds of detective posts on HN
        
         | causal wrote:
         | Upvote them, definitely something that makes HN special.
        
       | bmelton wrote:
       | > i discovered that there was a arc featured called easels,
       | easels          > are a whiteboard like interface, and you can
       | share them with people,          > and they can view them on the
       | web. when i clicked the share button          > however, there
       | was no requests in my mitmproxy instance, so whats          >
       | happening here?
       | 
       | I first noticed this on a flight to Paris. I was building a
       | Flutter app using Firestore, and tho I had not paid for the
       | onboard wifi (I was doing local development) I was connected and
       | all of my Firestore calls were succeeding.
       | 
       | I thought this was novel, and assumed it was just something to do
       | with websockets, so I switched to another, non-firebase-but-yes-
       | websockets project and noticed it didn't work.
       | 
       | At the time, I debated moving calls to Firebase just so that I
       | could work for free while I was on flights, but realized the ROI
       | wasn't remotely there. Glad to finally have someone else
       | acknowledge it happening, and give some insight as to why.
        
       | tomaskafka wrote:
       | For some time I asked why doesn't Arc let me sync my passwords.
       | 
       | After seeing this level of incompetence, I am happy they didn't
       | attempt that.
       | 
       | Yet.
        
       | hollywood_court wrote:
       | Thank you for sharing this. I have been using Arc since the first
       | week of beta.
       | 
       | The fact that they don't even mentioned this bug/fix on any of
       | their social media is quite alarming.
       | 
       | I enjoyed my time with Arc, but I can't possibly see myself
       | continuing to use it after the way they handled this.
        
         | Sakos wrote:
         | Them acknowledging the issue, then fixing it within 28 hours
         | isn't good enough for you? That kind of response makes me happy
         | to continue using Arc.
        
           | tomaskafka wrote:
           | They afaik never said that they 'fixed' the issue where
           | they're sending Google your every visited url.
        
           | chenmike wrote:
           | I'm in the same boat as GP. Was invited early, loved the Arc
           | UX far more than any other browser. I've recommended it to
           | many people.
           | 
           | As many other comments have pointed out, this vulnerability
           | is such a rookie mistake that I don't think I can trust them
           | again after this without understanding what factors in their
           | security/engineering culture led to it. Patching this one
           | issue isn't enough.
        
           | ziddoap wrote:
           | > _Them acknowledging the issue, then fixing it within 28
           | hours isn 't good enough for you?_
           | 
           | Are you not concerned with the yet to be discovered
           | vulnerabilities?
           | 
           | What is concerning is the nature of the vulnerability and how
           | it speaks to their security culture (which is obviously non-
           | existent). This also revealed that their privacy policy is
           | pure marketing fluff, completely disconnected from (and, in
           | fact, counter to) their actions.
           | 
           | If you are comfortable using a browser (probably the software
           | with the largest risk and attack surface on your device) that
           | had an embarrassingly rudimentary vulnerability, made by a
           | company who lie about the most important promise of their
           | privacy policy, then I've got a calculator app for you.
        
           | hollywood_court wrote:
           | Where did they acknowledge the issue? There's nothing about
           | this issue on their website or their Twitter feed.
        
             | radicaldreamer wrote:
             | They only acknowledged the issue after the write up from
             | the researcher and claimed they thought they didn't need to
             | include it in the release notes because it was a "backend
             | fix".
        
       | phyllistine wrote:
       | Yeah with this and the privacy zinger at the end its definitely
       | time my monthlong experiment with arc comes to a close. Too bad
       | that the thing theyre actually proud of, the tabbing UX, was
       | actually really good.
        
       | exabrial wrote:
       | I roasted them on HN when they announced their product: Browsing
       | the interest should not require an account. Its an "HTML Client",
       | absolutely absurd. Hopefully they sit down and reconsider their
       | choices.
        
       | lemonberry wrote:
       | Arc was recommended to me by a friend. I deleted upon finding out
       | I needed an account to use it. The excuse Arc gives is in case
       | you want to sync. I'm capable of opting into that.
        
         | timeon wrote:
         | "in case" is good excuse if the account is optional. Which is
         | not case here.
        
       | zachrip wrote:
       | I just want to call out that there is a lot of blame put on
       | firebase here in the comments but I think that's just people
       | parroting stuff they don't actually know about (I don't use
       | firebase, I have tried it out in the past though). This isn't
       | some edge case or hard to solve thing in firebase, this is the
       | easy stuff.
       | 
       | The real issue here is that someone wrote an api that trusted the
       | client to tell it who they were. At the end of the day this is an
       | amateur mistake that likely took a 1 line diff to fix. Don't
       | believe me? Check out the docs:
       | https://firebase.google.com/docs/rules/rules-and-auth#cloud-... -
       | `request.auth` gives you the user id you need
       | (`request.auth.uid`).
        
         | tr3ntg wrote:
         | As someone with an app built on firebase, yes. As the author
         | rightly points out, it's very easy to misconfigure, but basic
         | security practices like these are highlighted in bright, bold
         | warning text in the Firebase docs.
         | 
         | Security rules are meant to be taken seriously, and it's your
         | only line of defense.
        
           | bichiliad wrote:
           | I think a system that makes it this easy to shoot yourself in
           | the foot is probably not a great system. Documentation is
           | important, and I'm glad it's clear and obvious, but humans
           | make mistakes. You'd hope that the mistakes have less dire
           | consequences.
        
           | swatcoder wrote:
           | > bold warning text in the Firebase docs.
           | 
           | Unfortunately, we currently have an industry where highly
           | paid "engineers" unironically believe that their job can be
           | done by reading/watching random tutorials, googling for
           | StackOverflow answers, and pasting code from gists.
           | 
           | Attentively reading documentation or developing a mental
           | model of how your tools work so that you know how they are
           | built to be handled does not make it on to any job listing
           | bullet points. It presumably fell off the bottom in favor of
           | team spirit or brand enthusiasm or whatever.
           | 
           | How many tutorials, community answers, and gists do you think
           | conveyed that warning?
        
             | ggregoire wrote:
             | Reading/watching random tutorials and asking basic
             | questions on SO __instead of reading the official docs__ is
             | a trend I've observed for the last 10 years. Even for stuff
             | pretty well documented like Python, Postgres, React, etc.
        
               | prilo wrote:
               | I often wonder how much this can be attributed to the
               | pretty awful SEO of most documentation. I write mostly
               | Python at work and it's infuriating how often
               | GeeksForGeeks, W3Schools, Programiz, or RealPython pop up
               | when I'm just trying to reference like, the arg order of
               | a builtin, or the particular behavior. Django is worse, I
               | often feel like I can't even find the doc when I know
               | it's there and read it before.
        
               | kevin_thibedeau wrote:
               | Documentation is largely static content. It isn't their
               | job to play SEO games to convince search engines to
               | surface it in the query results. Documentation is not a
               | revenue generator for Google so it gets buried below the
               | sites with Doubleclick ads.
        
               | Vegenoid wrote:
               | Attempting to find the relevant docs page via search
               | engines is generally not a good way to go, you should go
               | to the documentation and search from there. Bookmark the
               | landing page of the documentation.
        
               | jetbalsa wrote:
               | This is why I switched to Kagi.com it gives me results
               | that are much more sane for things I'm looking for when
               | it comes to a programming stance
        
               | kchr wrote:
               | For native documentation, why not just search the
               | official docs at https://docs.python.org/ ?
               | 
               | I find it to be very discoverable if you are looking for
               | docs about a specific function or module.
        
               | zo1 wrote:
               | Most official documentation is awful, and just an API
               | reference. It's (almost) like asking someone to learn
               | english and then pointing them to a dictionary.
               | 
               | And that's because a lot of devs think it's perfectly
               | dandy to just put perfunctory docstrings in their
               | methods, point it at whatever "doc generation" tool, wire
               | it up to a github.io domain and call it a day.
               | 
               | There is a reason people crave, want and seek things like
               | SO and blog-posts. They're packed full of insight,
               | working examples and just plain old "how TF do you use
               | this thing". Oh and of course, the "this problem A didn't
               | work when using setup B and C, and that's because of
               | reasons X,Y,Z. Here, try H,I & K and it'll work.
        
               | macintux wrote:
               | I remember writing a Twitter library when that was a
               | thing, and being severely disappointed at the quality of
               | the API documentation. There seemed to be little choice
               | other than to experiment to see what responses you'd
               | receive (and hope that it wouldn't change underneath
               | you). Same was often true with some of the GitHub APIs,
               | although it's been a few years since I've spent time with
               | them.
        
               | yunwal wrote:
               | > Most official documentation is awful
               | 
               | This goes doubly so for google cloud documentation.
               | Firebase docs are decent, but if you're a developer who's
               | gotten used to google's documentation style I could see
               | skipping right over it.
        
             | pphysch wrote:
             | "don't trust the client / validate inputs" is software
             | security 101
        
               | dbalatero wrote:
               | For sure, I think the issue is - at what point in an
               | engineer's development is that fact hammered home? For me
               | it was hanging out with friends and learning fundamentals
               | together, and then even more reinforced in the security
               | course I took in college. For others, they might skip
               | that elective in school (or their bootcamp will gloss
               | over it), and they learn it the hard way later on the
               | job?
               | 
               | That said, ideally code review/peer review/design review
               | would catch things like this. If this was a feature
               | implemented by an engineer that wouldn't know any better,
               | they should have at least some help from others around
               | them.
        
               | Vegenoid wrote:
               | The issue is not about supporting engineers, this isn't a
               | pile-on to some poor engineer. It's about choosing secure
               | software, and avoiding software (particularly critical
               | and vulnerable software like a web browser) from orgs
               | that have built severe vulnerabilities into their
               | software by incorrectly implementing something
               | foundational to computer security.
               | 
               | There are many smart engineers who I would not trust to
               | build my web browser because they lack the domain
               | knowledge to do so. That's not a slight on them. But if a
               | company hired those people to make a web browser, I
               | wouldn't trust that org's software.
        
             | JohnMakin wrote:
             | This may or may not be fair, but in my view, the type of
             | person that would opt for a firebase solution is probably
             | the type of person most vulnerable to foot guns.
        
             | jahewson wrote:
             | Sadly true, but Firestore has a security rules emulator and
             | encourages you to write unit tests for it! There's just so
             | many levels of "ignored all reasonable practices" here.
             | Where's the code review? Where's the security/privacy
             | audit?
        
             | 725686 wrote:
             | Nah, just ask ChatGPT.
        
               | firewolf34 wrote:
               | ChatGPT would have probably parrotted the bold text. It
               | is always super concerned about risks.
        
           | wredue wrote:
           | Nobody reads docs dude. They copy and paste stack overflow
           | answers, and now, copilot answers, which is going to be based
           | on stack overflow ultimately anyway.
        
             | NewJazz wrote:
             | Just with less context and review.
        
             | BobaFloutist wrote:
             | Maybe docs should try to be consistently more accurate, up
             | to date, and legible than (even) stack overflow answers - \
             | _ ( tsu ) _ / -
        
               | roywiggins wrote:
               | None of that matters if it doesn't show up first or
               | second in Google results.
        
               | Vegenoid wrote:
               | I have heard this said by many people: "I don't look at
               | documentation because it usually is inaccurate/out of
               | date"
               | 
               | There's plenty of people sharing anecdata about bad docs,
               | and I've dealt with my fair share. But my anecdata is
               | that engineers who habitually go to the docs directly and
               | read them gain a better understanding and write better
               | software than those who do not. I believe that most
               | software for engineers has documentation that is more
               | informative than stack overflow and blog posts.
        
           | rakoo wrote:
           | > it's very easy to misconfigure, but basic security
           | practices like these are highlighted in bright, bold warning
           | text in the Firebase docs.
           | 
           | I'm sorry but if the whole design is "one big database shared
           | with everyone and we must manually configure the database for
           | auth" there is a problem that's deeper than just having to
           | read the doc. It means the basic understanding of what it
           | means to keep data as private as possible is not understood.
           | A shared database only works when the server accesses it, not
           | when client has direct access.
           | 
           | What Arc needs is to segregate _each_ user 's data in a
           | different place, in the design of the database, not as part
           | of configuration of custom code. Make it impossible to list
           | all user's data, or even users. When, not if, an id is
           | guessed, related data becomes accessible by someone else;
           | make it so that someone else still can't read it, or can't
           | replace it.
        
         | NewJazz wrote:
         | _At the end of the day this is an amateur mistake_
         | 
         | God I wish. More than one of my coworkers has made this exact
         | mistake with our (thankfully internal) front-end apps.
        
           | albedoa wrote:
           | Are you defining amateurs as people who are not your
           | coworkers? It can still be an amateur mistake.
        
             | randomdata wrote:
             | Coworker implies paid work, and therefore they are not
             | amateurs. They very well may make the same mistakes, but
             | those mistakes would be professional mistakes.
        
               | JohnMakin wrote:
               | Why this level of pedantry when the meaning is absolutely
               | clear? A professional can make an amateur mistake. This
               | makes perfect sense. That isn't implying the professional
               | is actually an amateur, but that he made a mistake that
               | an amateur would make.
        
               | ghodith wrote:
               | For some added pedantry: aren't all the mistakes that a
               | professional might make, also ones an amateur would make?
               | 
               | In fact, it seems like an amateur is likely to run into
               | all mistakes more often, thereby making all mistakes
               | amateur mistakes; unless there some class of mistake that
               | amateurs are better at avoiding?
        
               | digging wrote:
               | There are probably mistakes an amateur cannot make
               | because they can't penetrate the problems where the
               | mistakes would be made.
        
               | albedoa wrote:
               | That is some next-level bad faith. Impressive.
        
         | kfarr wrote:
         | Agreed, if I understand correctly the fix to this issue would
         | be the following rules inside of a "match" statement in
         | firestore.rules which is plainly documented as firebase
         | firestore security 101:
         | 
         | ```
         | 
         | // Allow create new object if user is authenticated
         | 
         | allow create: if request.auth != null;
         | 
         | // Allow update or delete document if user is owner of document
         | 
         | allow update, delete: if request.auth.uid ==
         | resource.data.ownerUID
         | 
         | ```
        
         | bcrosby95 wrote:
         | It's interesting to see software engineers going from rolling
         | their own auth, to not rolling their own auth, to not even
         | noticing this quite blatant security problem.
         | 
         | It doesn't matter if you roll your own auth or not, you need to
         | understand a very basic fundamental of it all: never trust the
         | client.
        
       | mcpar-land wrote:
       | Every single thing I've heard about Arc browser has been a
       | massive red flag. Turns out it was even worse than I thought!
        
       | tnorthcutt wrote:
       | https://www.crunchbase.com/organization/the-browser-company/...
       | 
       | > Total Funding Amount $68M
       | 
       |  _the browser company normally does not do bug bounties, but for
       | this catastrophic of a vuln, they decided to award me with $2,000
       | USD_
       | 
       | I'm struggling to put into words how disappointing I find this.
        
         | nicolasmontone wrote:
         | This is 100% company culture, probably the ones that decide
         | this kind of things are not technical or don't understand how
         | important is this.
        
           | ggregoire wrote:
           | They disclosed the vulnerability directly to the co-founder
           | CTO.
           | 
           | > the timeline for the vulnerability:
           | 
           | > aug 25 5:48pm: got initial contact over signal (encrypted)
           | with arc co-founder hursh
           | 
           | > aug 25 6:02pm: vulnerability poc executed on hursh's arc
           | account
        
         | gspencley wrote:
         | I've got a different take. If they're in the VC phase, that
         | means they are not self sufficient. The amount of funding that
         | they've raised is no indication what-so-ever of a) how much of
         | that funding has actually been realized / received b) what
         | their overhead is and c) what their overall financial picture
         | looks like.
         | 
         | I do wish that more companies would take privacy and security
         | seriously. And bug bounty programs are great. But they're not
         | always within the budget of companies and the fact that they
         | decided to award this security researcher regardless of having
         | no such program is a massive win in my opinion and shows how
         | much they value this particular contribution.
        
           | tnorthcutt wrote:
           | Thanks for the reply! I think I disagree with you, mostly
           | because it seems like this particular bug could have been
           | company-destroying because of the potential reputation hit if
           | it was exploited on a wide scale.
           | 
           | But regardless, I appreciate your perspective and it gives me
           | some stuff to consider I hadn't previously.
        
           | cmsj wrote:
           | I think we all know that tech debt often lives forever, so if
           | you're going to start a browser company, you simply must be
           | thinking about security/privacy from day one. If the VC model
           | doesn't make that possible, then the only reasonable
           | conclusion is that browsers shouldn't be a thing that VC
           | funded startups work on.
        
             | gspencley wrote:
             | I appreciate your response, and largely agree with you. But
             | you can take security seriously without having a program in
             | place to pay non employees for work they did without you
             | asking them to.
             | 
             | Also, while I love companies that have bug bounty
             | programs... I don't think any company without such a
             | program is under any obligation to pay someone just because
             | they volunteered their time without the company knowing
             | about it or soliciting the work in any way.
             | 
             | So the fact that they did in this case, despite having no
             | program, is what I'm choosing to focus on.
             | 
             | I want to share a personal anecdote to put my opinion into
             | more perspective. I owned a small business operating a for-
             | profit website for 18 years, for 15 of those years it was
             | my primary source of income. I had no employees other than
             | myself. It was just me on my own working from home. I
             | earned enough to pay the bills, but I'm currently earning
             | 2x what my business earned at its peak traffic by being an
             | employee. So it's not like I had money to be paying
             | people... it was pretty much an average software engineer's
             | salary in terms of what I brought in.
             | 
             | Anyway, over those 18 years I had a few dealings with some
             | white-hats who were very nice and clued me in to some
             | issues. I thanked them and when they politely asked if "we"
             | (because they didn't know any better) had a program it was
             | a non-issue when I explained that I'm too broke as a one-
             | person shop trying to feed a family to be paying out
             | anything substantial but I could PayPal a cup of coffee or
             | something for their trouble. But then I had a few dealings
             | with complete shady assholes who tried to extort money out
             | of me by threatening to exploit what they had found and go
             | public and basically drag my reputation through the mud.
             | 
             | Experiences with the latter group make me sympathize a lot
             | more with companies that decide to have a policy of just
             | blanket not dealing with outside security researchers, to
             | take the information and then deal with the fixes
             | internally and quietly.
        
       | shermantanktop wrote:
       | User identity _must_ be derived from security context, typically
       | at the edge of the system.
       | 
       | But it's so much easier for developers to think of userid as just
       | another parameter, and they forget, and oops now they trust a
       | random user-supplied parameter.
        
       | fredgrott wrote:
       | hmm gee I wonder was it worth to value the bug bounty at $2500
       | given the severity of both the bug and sheer lack skills of the
       | browser company staff...it might even be a reputation destroyed
       | event...
        
       | oefrha wrote:
       | > firestore has a tendency to not abide by the system proxy
       | settings in the Swift SDK for firebase, so going off my hunch, i
       | wrote a frida script to dump the relevant calls.
       | 
       | As someone who has done some reverse engineering of macOS apps
       | but haven't used anything beyond Charles' macOS proxy feature,
       | this looks very painful. Is there a proxy app that maybe acts as
       | a VPN so that basically every HTTP request is guaranteed to go
       | through it, so that you don't need to write a hundred lines of
       | bespoke Frida just to capture requests?
       | 
       | Edit: On second thought Proxifier should work for this purpose.
        
         | ibash wrote:
         | mitmproxy.org can act as a wireguard vpn iirc
        
         | dongcarl wrote:
         | To add to u/ibash's comment, mitmproxy correctly implements a
         | macOS network extension: https://mitmproxy.org/posts/local-
         | redirect/macos/
         | 
         | I assume you'll have to install a root cert in order to
         | introspect HTTPS traffic though.
        
       | kfarr wrote:
       | Instead of knee jerk firebase is bad, can we discuss how this
       | could be abated properly with firebase rules for firestore?
       | 
       | Is this the rule that was missing for arcs boosts or whatever
       | object?
       | 
       | ```                 match /objects/{object} {               //
       | Allow create new object if user is authenticated
       | allow create: if request.auth != null;                // Allow
       | update or delete document if user is owner of document
       | allow update, delete: if request.auth.uid ==
       | resource.data.ownerUID            }
       | 
       | ```
        
       | seanvelasco wrote:
       | eva (kibty.town) and mr. bruh never disappoint!
        
       | tech_ken wrote:
       | Oop and I just convinced my wife and brother to move over :o
       | 
       | Props to her, she asked about the security and privacy of the
       | browser and I played it off with some fanboy propaganda. Lesson
       | learned on that one. If I only care about the vertical tabs,
       | workspaces, and a (decent) mobile app are there any good
       | equivalents right now?
        
         | diggan wrote:
         | > If I only care about the vertical tabs, workspaces, and a
         | (decent) mobile app are there any good equivalents right now?
         | 
         | I use Firefox mostly because of Sideberry (which does vertical
         | tree-style tabs) which also integrates with "containers", so
         | you can have something similar to workspaces but more
         | isolation. Otherwise there is also "profiles" that probably
         | offer even more isolation between the different profiles.
        
         | jonjojojon wrote:
         | Firefox with extensions? The current vertical tabs extensions
         | are not nearly as nice, but Mozilla is working on native
         | vertical tabs. Syncing and Workspaces are already better with
         | Firefox then with Arc.
        
         | soundnote wrote:
         | I just use Brave with a shitton of profiles. That does cause
         | problems for mobile use since no Android browser dev has
         | bothered with proper profiles or ability to install multiple
         | copies of the browser, except for Google I guess.
        
       | treyd wrote:
       | How is this "Arc boost" system not just a more limited ad-hoc
       | version of what WebExtensions already provide?
        
       | ha470 wrote:
       | I'm Hursh, cofounder and CTO of The Browser Company (the company
       | that makes Arc). Even though no users were affected and we
       | patched it right away, the hypothetical depth of this
       | vulnerability is unacceptable. We've written up some technical
       | details and how we'll improve in the future (including moving off
       | Firebase and setting up a proper bug bounty program) here:
       | https://arc.net/blog/CVE-2024-45489-incident-response.
       | 
       | I'm really sorry about this, both the vuln itself and the delayed
       | comms around it, and really appreciate all the feedback here -
       | everything from disappointment to outrage to encouragement. It
       | holds us accountable to do better, and makes sure we prioritize
       | this moving forward. Thank you so much.
        
         | rachofsunshine wrote:
         | Comments further down are concerned that on each page load,
         | you're sending both the URL and a(n identifiable?) user ID to
         | TBC. You may want to comment on that, since I think it's
         | reasonable to say that those of us using not-Chrome (I don't
         | use Arc personally, but I'm definitely in the 1% of browser
         | users) are likely to also be the sort of person concerned with
         | privacy. Vulnerabilities happen, but sending browsing data
         | seems like a deliberate design choice.
        
           | mthoms wrote:
           | I think that is addressed in the post. Apparently the URL was
           | only sent under certain conditions and has since been
           | addressed:
           | 
           | >We've fixed the issues with leaking your current website on
           | navigation while you had the Boost editor open. We don't log
           | these requests anywhere, and if you didn't have the Boosts
           | editor open these requests were not made. Regardless this is
           | against our privacy policy and should have never been in the
           | product to begin with.
           | 
           | Given the context (boosts need to know the URL they apply to
           | after all) this indeed was a "deliberate design choice" but
           | not in the manner you appear to be suggesting. It's still
           | very worrisome, I agree.
        
         | tyho wrote:
         | There isn't really anything you can do to convince me that your
         | team has the expertise to maintain a browser after this. It
         | doesn't matter that you have fixed it, your team is clearly not
         | capable of writing a secure browser, now or ever.
         | 
         | I think this should be a resigning matter for the CTO.
        
           | avarun wrote:
           | And what, you're going to find them a new CTO? What kind of
           | magical world do you live in where problems are solved by
           | leaders resigning, instead of stepping up and taking
           | accountability?
        
             | smt88 wrote:
             | Taking accountability can and should include admitting
             | you're the wrong person for the job and resigning.
        
               | radicaldreamer wrote:
               | CTO is simply a title, the proper response here would be
               | to hire a head of security and build it into the culture
               | from the ground up.
               | 
               | I'm looking at all of the Arc Max features which probably
               | need to be architected correctly to be secure/privacy-
               | preserving.
               | 
               | They could take a lot of inspiration from iCloud Private
               | Relay and iOS security architectures in addition to
               | really understanding the Chrome security model.
        
               | kiddingright wrote:
               | If the devs didn't take security seriously before, why
               | would another node in the communication graph change
               | anything?
        
           | Insanity wrote:
           | Well, the current team perhaps.
           | 
           | But it's also likely part of the startup mentally of "move
           | fast and break things", which is not entirely compatible with
           | the goal of the browser.
        
           | pembrook wrote:
           | Surprise surprise, turns out it takes a looong time for every
           | software startup to finally strip out all the hacky stuff
           | from their MVP days. Apparently nobody on this startup
           | community forum has ever built a startup before.
           | 
           | Pro tip: if stuff like this so violently upsets you, never be
           | an early adopter of anything. Wait 5-10 years and then make
           | your move.
           | 
           | Personally, I expect stuff like this from challenger
           | alternatives, this is the way it should be. There is no such
           | thing as a new, bug-free software product. Software gets good
           | by gaining adoption and going through battle testing, it's
           | never the other way around like some big company worker would
           | imagine.
        
             | kiddingright wrote:
             | This is a fucking joke, right? If some random person on the
             | internet figured this out, why don't we expect the people
             | whose job it is to actually write this code to either a) do
             | it right the first time, or b) catch egregious bugs before
             | they're released? Nobody's asking for perfect software,
             | we're just asking for software that isn't riddled with
             | 0-days. If that's offensive, maybe it's better to just
             | switch fields?
        
         | bloopernova wrote:
         | Will you be increasing the bug bounty payout? $2,000 is a tiny
         | fraction of what this bug is worth, I hope you will pay the
         | discoverer a proper bounty.
         | 
         | You've been handed a golden opportunity to set the right
         | course.
        
           | JumpCrisscross wrote:
           | > _$2,000 is a tiny fraction of what this bug is worth_
           | 
           | The Browser Company raises $50mm at a $550mm post-money
           | valuation in March [1]. They've raised $125mm altogether.
           | 
           | Unless they're absolute asshats, they'll increase the bug
           | payout. But people act truly when they don't think they're
           | being watched--a vulnerability of this magnitude was worth
           | $2k to this company. That's...eyebrow raising.
           | 
           | [1] https://techcrunch.com/2024/03/21/the-browser-company-
           | raises...
        
             | shuckles wrote:
             | "We will let anyone run arbitrary JavaScript on all your
             | web pages if you send them a referral link" is surely a 6-7
             | figure vulnerability for a web browser. That this
             | vulnerability was discoverable using about two steps of
             | analysis tools suggests many more issues are in the
             | product.
        
         | ayhanfuat wrote:
         | Was the post written for HN users only? I cannot see it on your
         | blog page (https://arc.net/blog). It's not posted on your
         | twitter either. Your whole handling seems to be responding only
         | if there is enough noise about it.
        
           | titaniumtown wrote:
           | Not a good look it not being on the main page! I personally
           | use [zen browser](https://github.com/zen-browser/desktop); I
           | like the ideas of Arc, but it always seemed sketchy to me,
           | especially it being Chromium-based and closed-source.
        
             | zamadatix wrote:
             | Heads up: HN doesn't support link naming markdown and some
             | of the extra characters broke the hyperlink.
             | 
             | In case the parent can't fix it in time for the edit
             | window: https://github.com/zen-browser/desktop
        
               | apitman wrote:
               | I wouldn't be surprised if some HN client apps support
               | markdown.
        
           | sushid wrote:
           | Hursh, can you please respond to the above commenter? As an
           | early adopter, I find it fairly troubling to see a company
           | that touts transparency hide the blog post and only publicly
           | "own up to it" within the confines of a single HN thread.
        
             | wahnfrieden wrote:
             | Pretty obvious now that Arc will only share security alerts
             | with the people who "catch" them at it - as few as possible
             | 
             | Leaves no choice but for this community to make the rest of
             | the Arc community aware of it as they refuse the
             | transparency
        
             | ha470 wrote:
             | We're working on a proper security bulletin site that will
             | have these front and center! This was a bit of a stopgap
             | for now.
        
         | tanx16 wrote:
         | > We're also bolstering our security team, and have hired a new
         | senior security engineer.
         | 
         | Is there a reason why you don't have any security-specific
         | positions open on your careers site?
        
         | _kidlike wrote:
         | no mention of the pitiful bounty reward (2000 usd). only sorry
         | and thanks. Please award this person a proper bounty.
        
         | exdsq wrote:
         | $2000 is an absurdly small bounty here - you should up that
        
           | radicaldreamer wrote:
           | 50k or 100k would be far more appropriate given the severity
           | of this issue. But overall, this makes me think there's
           | probably a lot more vulnerabilities in Arc that are
           | undiscovered/unpatched.
           | 
           | Also, there's the whole notion of every URL you visit being
           | sent to Firebase -- were these logged? Awful for a browser.
        
         | ibash wrote:
         | Thanks for the response.
         | 
         | While people might nitpick on how things were handled, the fact
         | that you checked if anyone was affected and fixed it promptly
         | is a good thing.
        
           | ziddoap wrote:
           | It is not really nitpicking, given the severity.
           | 
           | Being prompt on a vulnerability of this magnitude should be
           | considered "meeting the standard" at best.
        
         | NegativeLatency wrote:
         | Only $2k for an exploit like this?
        
         | mirzap wrote:
         | Pay the guy properly. $2000 is an insult. It should be $50k.
         | This kind of bug could be sold for 100-200k easily.
        
           | JumpCrisscross wrote:
           | > _This kind of bug could be sold for 100-200k easily_
           | 
           | Maybe not. If the browser is that buggy, there may be plenty
           | of these lying around. The company itself is pricing the
           | vulnerability at $2k. That should speak volumes to their
           | internal view of their product.
        
             | shuckles wrote:
             | I think OP mean to say "this bug could let an attacker gain
             | $200k of value easily", though you are right the market
             | clearing price for such a vulnerability is probably low due
             | to huge supply.
        
             | radicaldreamer wrote:
             | Many engineers at SV startups use Arc on a daily basis.
             | This bug could've resulted in the compromise of multiple
             | companies, probably including crypto exchanges. A browser
             | bug of this severity is extremely valuable, even for a
             | niche browser like Arc.
        
         | zo1 wrote:
         | Until this individual comes back and responds to at least a few
         | of the questions/comments, I don't think we should even pay
         | attention to this marketing-dept-written post. They basically
         | want this to go away, and answering any questions would raise
         | more issues most likely, so they just seemed to have done the
         | bare minimum and left it at that. It's 3 hours later now, they
         | might as well have not even posted anything here.
        
         | msephton wrote:
         | I misread your name as Hush which is kind of fitting
         | considering how you're trying to make this go away
        
         | FactKnower69 wrote:
         | remember when reading this that this guy's company is valued at
         | a billion dollars and his comp is 10x yours if not more. we
         | live in a meritocracy
        
         | kernal wrote:
         | >Arc brought order to the chaos that was my online life.
         | There's no going back.
         | 
         | Bringing the chaos back like it's 1999.
        
         | metadat wrote:
         | Hursh / ha470, where did you go? There are lots of good
         | questions in the replies to your thread, yet you went dark
         | immediately after posting more than 8 hours ago. It's hard to
         | imagine what could be more pressing than addressing people's
         | concerns after a major security incident such as this.
         | 
         | To be honest, I'm a bit disappointed. For future reference,
         | this doesn't seem like a good strategy to contain reputational
         | damage.
        
       | cmsj wrote:
       | I read this from another source and I was a substantial way into
       | it before it became obvious what Arc is.
       | 
       | Blog authors: stop assuming I know about the existence of every
       | piece of software.
       | 
       | (also maybe occasionally consider using the Shift key on your
       | keyboard so you can capitalise things :)
        
       | rockostrich wrote:
       | It would be nice if I could download a version of the Arc browser
       | with the cloud bits removed. I use it because of the UI/UX and
       | pretty much ignore everything else. Really if there was a browser
       | that let me keep organized spaces in a left panel plus create
       | split screen views then it would immediately convince me to
       | switch from Arc.
        
       | Insanity wrote:
       | Damn, that is bad. While I enjoyed reading through the write-up,
       | I think a "summary section" at the top would have benefited me
       | lol.
       | 
       | Someone recently recommended Arc to me, I installed it on my
       | macbook and then never actually used it when I realized there's
       | no Linux version available, and I like a consistent browser
       | experience across all my devices.
        
         | radicaldreamer wrote:
         | You can use some Arc AI features to summarize it for you :)
        
       | gsanderson wrote:
       | Yikes.
       | 
       | I tried Arc a while ago but switched back to Chrome. Quite glad I
       | did now.
        
       | omertoast wrote:
       | $2000 is an insult, good luck getting tips for your future vulns.
        
       | segasaturn wrote:
       | It is remarkable that Arc has taken billions of dollars in VC
       | cash but makes these rookie mistakes in securing their own
       | backend that all of their users are accessing. Where are those
       | billions of dollars going? Is it all just in marketing?
        
         | imiric wrote:
         | You seem surprised. This is the MO of many tech companies.
        
         | radicaldreamer wrote:
         | Probably the line of thinking is that security can be a back
         | burner issue until product market fit is achieved.
         | 
         | Doesn't matter if you build the most secure product if nobody
         | is using it, right? Where that breaks down is that a browser
         | MUST be relatively secure, otherwise you've given up the whole
         | ballgame.
        
       | merco wrote:
       | Great catch ! Also very cool to know a bit more about the tech
       | they are using.
        
       | ARandomerDude wrote:
       | I'm amazed by how profoundly stupid this vulnerability is. To get
       | arbitrary code execution, you literally just send somebody else's
       | user ID, which is fairly trivial to obtain.
       | 
       | I don't work at FAANG. I just work at some company that makes
       | crap products you don't actually need, and even I would never
       | build this kind of bug.
       | 
       | But these people want to build a _web browser_ , with all the
       | security expertise and moral duty that implies?! Wow.
        
       | aanet wrote:
       | Fascinating vulnerability, and a fascinating way to catch it.
       | Kudos.
       | 
       | BTW, on Arc's website on "Security" there still is no mention of
       | this vulnerability (as of 20th Sep 2024, 2:32 pm PT)
       | 
       | Check it out - https://arc.net/security
       | 
       | Apparently the company had contracted with one Latacora for
       | "regular outside security reviews and trainings across a wide
       | range of different systems".
       | 
       | Elsewhere on the page, it says "Arc uses GCP Firebase for user
       | authentication, storage for Notes & Easels, and Cloud Functions
       | for certain application features like referral code generation.
       | All data stored in Firebase is encrypted-at-rest by default."
        
         | radicaldreamer wrote:
         | The security page explicitly claims that Arc doesn't log what
         | you're doing, giving URLs as an example, but this vulnerability
         | claims every URL is being sent up to Firebase.
        
       | nusl wrote:
       | I've been using Arc since it was private, and I really like the
       | browser. The company's posture on this topic has pretty much made
       | me drop it entirely. It's beyond abysmal.
        
       ___________________________________________________________________
       (page generated 2024-09-20 23:00 UTC)