LibreWolf is a great privacy oriented Browser for desktop. But there is no version for android or IOS . There are some like mull but they have their own problems. Mobile phones stay with us most of the day. So we need extra privacy for it.
LibreWolf is a great privacy oriented Browser for desktop. But there is no version for android or IOS . There are some like mull but they have their own problems. Mobile phones stay with us most of the day. So we need extra privacy for it.
This always gets downvoted, because it’s a painful truth, but Chromium on Android is significantly more secure than Firefox.
There is a reason why the default included browser on GrapheneOS, Vanadium, is a Chromium fork.
So I’m sorry, until Firefox on Android catches up to Chromium, another Firefox fork isn’t going to make the impact on the ecosystem that you think it is.
I’m not saying you can’t or shouldn’t use Firefox forks on Android, I’m saying do so being aware of their limitations relative to Chromium forks, such as Cromite, or Mulch, the latter being the same dev as Mull. That same dev also has a lengthy write-up going over the technical details of why Chromium is more secure than Firefox on Android.
This has nothing to do with desktop browser engines, this is specifically and exclusively in regards to Android browsers
It’s because you are making extreme claims without any sources.
what divestOS is actually saying:
https://divestos.org/pages/browsers
Pretty sure I told you where you could find more information, as well as pointing out that the default browser on Graphene is a hardened Chromium browser, not Firefox Gecko.
But okay, here, I can even do that little bit of searching for you:
https://divestos.org/pages/browsers
You’re wrong
Source: same as yours. My butt.
Source: The developer of Mull, Mulch, & DivestOS
Corrected. Firefox is less secure than Chromium-based browsers.
And if you had that in your butt the whole time, you should’ve gotten it out earlier.
Personally I would argue that allowing users to install extensions, mostly adblockers, you remove what’s probably the single most common real world vector for attackers, ads. So while chromium browsers may be more secure I would say you’re probably less likely to run into a problem with a firefox based browser with ublock origin on it, mobile or desktop.
Interesting. What security risks are you talking about exactly? Do you have a link?
I know Chromium is faster and more responsive on Android but I haven’t read much about security differences yet. With Chromium being pre-installed and signed by the OS vendor, I always assumed the risk of exploiting the Chromium process was higher instead of lower.
I’m not sure what threat model you’re protecting yourself from if the Android sandbox isn’t good enough for either to be honest, but I suppose there’s risk in hijacking the browser too.
See the replies below regarding per-site process isolation.
I see. I don’t think missing that is enough of a problem for me to switch browsers, it is rather unfortunate that it’s still missing on Android.
It means that one malicious site can compromise your entire phone.
No it doesn’t? It means that a malicious site that can take over a browser process can also take over connections/accounts on websites that share the same browser process by bypassing mechanisms such as CORS.
This isolation mode is also pretty effective against things like side channel attacks, though real mitigations of those bugs require kernel/microcode updates.
To take over your phone, you need at least a sandbox escape exploit to break out of the browser app space, a privilege escalation exploit to get past selinux and other such protections, and even then the damage you can do is quite limited unless you’ve gained root access. Site isolation exploits can be used as the first step in a chain of exploits, but it’s not a very important part when it comes to preventing privileged RCE.
https://grapheneos.org/usage#web-browsing
That sounds like the exposed attack surface is a lot more than just whatever sites are running under your Firefox process.
But what do I know, I’m not a developer of security-hardened Android forks, so I just have to pick which randos on the internet I choose to believe. When the developers of DivestOS and GrapheneOS both have lengthy write-ups on why chromium base browsers are significantly more secure, I’m going to believe them because I don’t have the low level technical knowledge to refute what they’re saying.
If a third part web browser “bypasses or cripples” OS sandboxing, then any app can. Seems like Graphene’s hardening isn’t very good for third party apps in that case.
Firefox doesn’t use Android’s API for sandboxing processes from each other, but that sandboxing isn’t what’s protecting your phone from getting taken over. There are many layers of security present within Android and process isolation for web content is just one of them.
I’m sure Graphene’s fork of Chrome is more secure than Firefox (especially with JIT turned off) but that doesn’t mean running Firefox presents any risk.
Android’s design is such that I should be able to install a random app and see no adverse effects other than battery drain/high network load without clicking through dozens of security prompts. If that’s not the case, there’s a vulnerability in the Android layer that needs patching, such as the Qualcomm vulnerability that was released recently.
With open security holes like that, not even Chrome’s site isolation is going to protect you
Right, so if Gecko based browsers can cause that kind of security concern on Graphene, what does that mean for people using Android ROMs that are not hardened, or, OEM variants that do not receive regular security updates?
Any app installed by a user that takes advantage of an active and unpatched CVE, can do all sorts of actions to compromise an entire phone, or critical parts of it. Are you saying that’s not the case?
The difference between a compromised app, and a browser, is that even a “safe” Firefox install is used to browse a near infinite possibility of websites, any number of which might be running an active campaign targeting unpatched Android vulnerabilities.
It sounds like you’re saying that despite Firefox Geckos significantly larger attack surface, the fact that Chromium doesn’t eliminate all risk, means there’s no difference.