this post was submitted on 10 Oct 2024
186 points (91.2% liked)

Android

27742 readers
574 users here now

DROID DOES

Welcome to the droidymcdroidface-iest, Lemmyest (Lemmiest), test, bestest, phoniest, pluckiest, snarkiest, and spiciest Android community on Lemmy (Do not respond)! Here you can participate in amazing discussions and events relating to all things Android.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules


1. All posts must be relevant to Android devices/operating system.


2. Posts cannot be illegal or NSFW material.


3. No spam, self promotion, or upvote farming. Sources engaging in these behavior will be added to the Blacklist.


4. Non-whitelisted bots will be banned.


5. Engage respectfully: Harassment, flamebaiting, bad faith engagement, or agenda posting will result in your posts being removed. Excessive violations will result in temporary or permanent ban, depending on severity.


6. Memes are not allowed to be posts, but are allowed in the comments.


7. Posts from clickbait sources are heavily discouraged. Please de-clickbait titles if it needs to be submitted.


8. Submission statements of any length composed of your own thoughts inside the post text field are mandatory for any microblog posts, and are optional but recommended for article/image/video posts.


Community Resources:


We are Android girls*,

In our Lemmy.world.

The back is plastic,

It's fantastic.

*Well, not just girls: people of all gender identities are welcomed here.


Our Partner Communities:

!android@lemmy.ml


founded 1 year ago
MODERATORS
 

LibreWolf is a great privacy oriented Browser for desktop. But there is no version for android or IOS . There are some like mull but they have their own problems. Mobile phones stay with us most of the day. So we need extra privacy for it.

top 50 comments
sorted by: hot top controversial new old
[–] circuscritic@lemmy.ca 22 points 6 days ago* (last edited 6 days ago) (8 children)

This always gets downvoted, because it's a painful truth, but Chromium on Android is significantly more secure than Firefox.

There is a reason why the default included browser on GrapheneOS, Vanadium, is a Chromium fork.

So I'm sorry, until Firefox on Android catches up to Chromium, another Firefox fork isn't going to make the impact on the ecosystem that you think it is.

I'm not saying you can't or shouldn't use Firefox forks on Android, I'm saying do so being aware of their limitations relative to Chromium forks, such as Cromite, or Mulch, the latter being the same dev as Mull. That same dev also has a lengthy write-up going over the technical details of why Chromium is more secure than Firefox on Android.

This has nothing to do with desktop browser engines, this is specifically and exclusively in regards to Android browsers

[–] skullgiver@popplesburger.hilciferous.nl 9 points 5 days ago (1 children)

Interesting. What security risks are you talking about exactly? Do you have a link?

I know Chromium is faster and more responsive on Android but I haven't read much about security differences yet. With Chromium being pre-installed and signed by the OS vendor, I always assumed the risk of exploiting the Chromium process was higher instead of lower.

I'm not sure what threat model you're protecting yourself from if the Android sandbox isn't good enough for either to be honest, but I suppose there's risk in hijacking the browser too.

[–] circuscritic@lemmy.ca 5 points 5 days ago* (last edited 5 days ago) (2 children)

See the replies below regarding per-site process isolation.

[–] skullgiver@popplesburger.hilciferous.nl 1 points 5 days ago (1 children)

I see. I don't think missing that is enough of a problem for me to switch browsers, it is rather unfortunate that it's still missing on Android.

[–] circuscritic@lemmy.ca 2 points 5 days ago (1 children)

It means that one malicious site can compromise your entire phone.

[–] skullgiver@popplesburger.hilciferous.nl 1 points 5 days ago* (last edited 5 days ago) (1 children)

No it doesn't? It means that a malicious site that can take over a browser process can also take over connections/accounts on websites that share the same browser process by bypassing mechanisms such as CORS.

This isolation mode is also pretty effective against things like side channel attacks, though real mitigations of those bugs require kernel/microcode updates.

To take over your phone, you need at least a sandbox escape exploit to break out of the browser app space, a privilege escalation exploit to get past selinux and other such protections, and even then the damage you can do is quite limited unless you've gained root access. Site isolation exploits can be used as the first step in a chain of exploits, but it's not a very important part when it comes to preventing privileged RCE.

[–] circuscritic@lemmy.ca 4 points 5 days ago* (last edited 5 days ago) (1 children)

Avoid Gecko-based browsers like Firefox as they're currently much more vulnerable to exploitation and inherently add a huge amount of attack surface. Gecko doesn't have a WebView implementation (GeckoView is not a WebView implementation), so it has to be used alongside the Chromium-based WebView rather than instead of Chromium, which means having the remote attack surface of two separate browser engines instead of only one. Firefox / Gecko also bypass or cripple a fair bit of the upstream and GrapheneOS hardening work for apps. Worst of all, Firefox does not have internal sandboxing on Android.

https://grapheneos.org/usage#web-browsing

That sounds like the exposed attack surface is a lot more than just whatever sites are running under your Firefox process.

But what do I know, I'm not a developer of security-hardened Android forks, so I just have to pick which randos on the internet I choose to believe. When the developers of DivestOS and GrapheneOS both have lengthy write-ups on why chromium base browsers are significantly more secure, I'm going to believe them because I don't have the low level technical knowledge to refute what they're saying.

[–] skullgiver@popplesburger.hilciferous.nl 1 points 5 days ago (1 children)

If a third part web browser "bypasses or cripples" OS sandboxing, then any app can. Seems like Graphene's hardening isn't very good for third party apps in that case.

Firefox doesn't use Android's API for sandboxing processes from each other, but that sandboxing isn't what's protecting your phone from getting taken over. There are many layers of security present within Android and process isolation for web content is just one of them.

I'm sure Graphene's fork of Chrome is more secure than Firefox (especially with JIT turned off) but that doesn't mean running Firefox presents any risk.

Android's design is such that I should be able to install a random app and see no adverse effects other than battery drain/high network load without clicking through dozens of security prompts. If that's not the case, there's a vulnerability in the Android layer that needs patching, such as the Qualcomm vulnerability that was released recently.

With open security holes like that, not even Chrome's site isolation is going to protect you

[–] circuscritic@lemmy.ca 4 points 5 days ago* (last edited 5 days ago) (1 children)

Right, so if Gecko based browsers can cause that kind of security concern on Graphene, what does that mean for people using Android ROMs that are not hardened, or, OEM variants that do not receive regular security updates?

Any app installed by a user that takes advantage of an active and unpatched CVE, can do all sorts of actions to compromise an entire phone, or critical parts of it. Are you saying that's not the case?

The difference between a compromised app, and a browser, is that even a "safe" Firefox install is used to browse a near infinite possibility of websites, any number of which might be running an active campaign targeting unpatched Android vulnerabilities.

It sounds like you're saying that despite Firefox Geckos significantly larger attack surface, the fact that Chromium doesn't eliminate all risk, means there's no difference.

[–] skullgiver@popplesburger.hilciferous.nl 0 points 5 days ago* (last edited 5 days ago) (1 children)

I still don't really see what "that kind of security concern" is in this context. Same-site isolation protects two websites from each other, nothing more. The isolation API Chromium uses to drop permissions on some of its threads are used to limit the potential of a single exploit, but they don't prevent things like the Qualcomm vulnerability from being abused.

It's not like any website can just break a web browser, they need to exploit the browser in the first place.

For unpatched people, that means they're in trouble. Luckily, Android is so fragmented that there is no exploit that'll get root access on all devices. It's hard to even get root access on the same model of phone. In practice, drive-by malware is actually quite rare for how many unpatched Android phone are out there.

There is probably more risk in using Firefox than there is in using Chromium, but the additional protections here are quite overstated in my opinion. You can't get enough layers of defence when you're a human rights activist or whatever (but then you'd use an iPhone in lockdown mode anyway), but just because Firefox doesn't implement a particular API doesn't mean your phone can be taken over by any website you visit. You need a complex chain of exploits directly targeting your phone's hardware and software configuration to get anything more than a force closed browser tab.

As for the attack surface, Chromium implements a significantly larger API and provides a significantly larger attack surface, with permissions and code to do things like access USB drives and open serial ports. I'd say the huge chunk of Chromium-only browser features leave Chromium with a larger attack surface, not a smaller one.

I personally prefer the additional privacy improvements Firefox brings over the two layers of malware protection that patched versions of Chromium provide. I'm no Khashoggi and I don't work on any nuclear plants, I'll probably be Fine™️ and so will you.

[–] circuscritic@lemmy.ca 4 points 5 days ago* (last edited 5 days ago) (2 children)

It's like you're arguing because you like to argue, and can't admit that you're wrong. So you keep finding new ways to qualify your response in the hopes that I forget what this is even about.

Chromium is significantly more secure than Firefox Gecko on Android. That is according to the developers of probably the two most well regarded hardened Android ROMs.

One of which, Graphene, even advises completely avoiding Gecko based browsers.

Which is what I said in my original comment, well, the part about relative security.

You've also claimed that at most, a malicious android application can only harm battery life and cause network issues, which is objectively false. I'm honestly kind of confused why you even said that, but whatever.

I never said no one should use Firefox based browsers on Android, I just said they weren't as secure and that user should understand the risks associated with them.

But what I'm most confused and perplexed by, is your insistence that only high risk individuals should be concerned with using a browser that comes with, at minimum, double the attack service they're exposed to when browsing the web.

Again, that is per the GrapheneOS wiki/FAQ.

I mean, we're not talking about some hardcore and incredibly inconvenient levels of unnecessary OPSEC for the sake of OPSEC, we're talking about a browser.

Tell you what, if you post a link to your GitHub showing me the hardened Android ROM that you develop, or heavily contribute to, I would be happy to revise my opinion on your credibility versus those developers.

load more comments (2 replies)
[–] saywhatisabigw@lemmy.world 2 points 5 days ago (2 children)

It's because you are making extreme claims without any sources.

[–] circuscritic@lemmy.ca 6 points 5 days ago

Pretty sure I told you where you could find more information, as well as pointing out that the default browser on Graphene is a hardened Chromium browser, not Firefox Gecko.

But okay, here, I can even do that little bit of searching for you:

https://divestos.org/pages/browsers

[–] Akip@discuss.tchncs.de 6 points 5 days ago

what divestOS is actually saying:

While DivestOS includes a Gecko based browser for privacy reasons, Chromium based browsers have many security advantages. It is up to the user to choose their preference.

https://divestos.org/pages/browsers

it really sucks tho, because most chromium forks still force you to use a google account in order to sync, and thats if they don't strip google entirely. there's brave, but I haven't had the best of experiences with that browser.

I can still self host something like floccus to "sync" bookmarks, and use kde connect to send browser tabs from one device to another, but I still wish it was as convenient as firefox; which iirc, let's you self host their sync service

load more comments (5 replies)
[–] Shape4985@lemmy.ml 88 points 6 days ago (1 children)

Mull is a good choice for android at the moment

[–] Enkers@sh.itjust.works 25 points 6 days ago* (last edited 6 days ago) (3 children)

Oh, cool. I hadn't heard of this one before. I use Fennec. I wonder what the main differences are. I noticed Mull mentions fennec in their F-droid page:

It [Mull] is compiled from source and proprietary blobs are removed using scripts by Relan from [https://gitlab.com/relan/fennecbuild here].

It seems like Mull is more privacy focused?

[–] seang96@spgrn.com 12 points 6 days ago* (last edited 6 days ago) (1 children)

I just swapped to mull today. Fennec is only on fdroid or build it yourself. Fdroid updates take a week for official repo. Mull can get faster updates through DivestOS repo. Firefox just had a huge 0day and fennec is currently vulnerable.

[–] Enkers@sh.itjust.works 3 points 6 days ago

Ahh, cool! Good to know. I just checked that 0day, and they're both JS exploits (which I imagine most probably are), so NoScript will probably protect me unless some of my trusted domains get compromised. It's not ideal, but it's within my comfort tolerance.

load more comments (2 replies)
[–] blibla@slrpnk.net 42 points 6 days ago

android already has fennec and mull though

[–] fl42v@lemmy.ml 22 points 6 days ago (2 children)

Soo, what "own problems" does mull have? I mean, pretty much fennec with some tor patches

load more comments (2 replies)
[–] chottomatte@lemdro.id 14 points 5 days ago

Surprisingly, I thought about the same thing a few days ago ... but we have mull browser

[–] RustyNova@lemmy.world 14 points 6 days ago (2 children)

True. For now I got a combo of Firefox and Firefox focus. Set focus as default browser, and if you do need cookies, copy the link.

[–] uzay@infosec.pub 5 points 5 days ago

I recommend a combo of Mull and Mulch or Cromite instead. Configure one of them to delete cookies and history on exit. Use URLCheck as your default browser. Then you can see the actual link when you click on one, you can remove tracking parameters, and then choose which browser to open it in.

[–] Stomata@buddyverse.one 7 points 6 days ago (2 children)

The problem is that they both have telemetry.

[–] bluelion@sh.itjust.works 17 points 6 days ago

Firefox Klar has telemetry disabled to comply with stricter German regulation

[–] shadeless@discuss.tchncs.de 6 points 6 days ago (1 children)
[–] Enkers@sh.itjust.works 12 points 6 days ago* (last edited 6 days ago) (1 children)

Just to mention, Fennec's F-droid page does list the following as an anti-feature:

This app tracks and reports your activity
Connects to various Mozilla services that can track users.

It does say that telemetry has been removed, but that it still connects to services (like Firefox Sync, for example) which could still potentially be used to track you.

That's not a dealbreaker for me personally, but if it bothers anyone else, it seems like Mull might be the more privacy conscious choice, at the cost of some convenience features.

load more comments (1 replies)
[–] Rikj000@discuss.tchncs.de 10 points 6 days ago (1 children)

It's not LibreWolf, but how about IceRaven?
https://github.com/fork-maintainers/iceraven-browser

Has been my goto FireFox fork for Android for years.

[–] Stomata@buddyverse.one 3 points 6 days ago (1 children)

It still has telemetry. Devs also mentioned it in the github repo

[–] lime@feddit.nu 9 points 5 days ago (12 children)

ok but like... telemetry is not automatically bad. a vast majority of users never report bugs in software, and are trained to just click through popups. this means the bugs don't get fixed, and the crash reports don't get sent.

scrutinizing what actually gets sent from your browser is how you keep yourself safe, blocking all telemetry is how you get unpatched security holes.

load more comments (12 replies)
[–] mashbooq@lemmy.world 7 points 6 days ago
[–] FutileRecipe@lemmy.world 2 points 6 days ago (3 children)

My thing against Firefox/Librewolf is lack of security...unless it's improved?

Avoid Gecko-based browsers like Firefox as they're currently much more vulnerable to exploitation and inherently add a huge amount of attack surface. Gecko doesn't have a WebView implementation (GeckoView is not a WebView implementation), so it has to be used alongside the Chromium-based WebView rather than instead of Chromium, which means having the remote attack surface of two separate browser engines instead of only one. Firefox / Gecko also bypass or cripple a fair bit of the upstream and GrapheneOS hardening work for apps. Worst of all, Firefox does not have internal sandboxing on Android. This is despite the fact that Chromium semantic sandbox layer on Android is implemented via the OS isolatedProcess feature, which is a very easy to use boolean property for app service processes to provide strong isolation with only the ability to communicate with the app running them via the standard service API. Even in the desktop version, Firefox's sandbox is still substantially weaker (especially on Linux) and lacks full support for isolating sites from each other rather than only containing content as a whole. The sandbox has been gradually improving on the desktop but it isn't happening for their Android browser yet.

Ref: https://grapheneos.org/usage#web-browsing

load more comments (3 replies)
load more comments
view more: next ›