Is this behavior expected? I would imagine it would be a privacy violation in a multi-user system. I thought they had some sort of encryption for hiding the sites that I visit.

BTW, FF does not do this on private mode. But still it is concerning, that any program can know about the sites I visit just by looking at ~/.mozilla/profile/storage/default.

  • thingsiplay@beehaw.org
    link
    fedilink
    arrow-up
    2
    ·
    2 hours ago

    If you are concerned about a program you installed spying on you, then why do you use that program? If it can access a personal directory in Mozilla, what does it stop from accessing all the other files on your system?

  • observantTrapezium@lemmy.ca
    link
    fedilink
    arrow-up
    11
    ·
    5 hours ago

    still it is concerning, that any program can know about the sites I visit

    As other noted, that’s the case in Linux, by default all processes are equal, so if your shell process can access a file, the Firefox process can access that file.

    But there are in fact many ways to sandbox processes and prevent exactly what you are worried about. One way is to install applications via Flatpak (or Snap), that can limit what files the app can see, while still running as your user.

    If there is an app you need and don’t trust that’s not available as a flatpak (or snap), there are ways to sanbox it manually. It does require some tinkering, but people can help you on !linux@lemmy.ml

  • TerribleTortoise@lemmy.world
    link
    fedilink
    English
    arrow-up
    34
    ·
    edit-2
    8 hours ago

    The tilde (~) means that path is located in the per-user home directory. The default behaviour is for user home directories to be only accessible by that specific user.

    The encryption you’re referring to is likely specific to Firefox Sync (i.e. syncing your FF settings, history, etc. across devices). Sync is end-to-end encrypted. But I’m not surprised that it’s unencrypted on disk.

      • dormedas@lemmy.dormedas.com
        link
        fedilink
        arrow-up
        14
        ·
        5 hours ago

        Generally, no. If a person has access to your home folder, it doesn’t matter if site-data is site-data or some UUID, the person can still look around and find that data. How to do so would be on the internet, in the source code for Firefox.

        Firefox simplifies its engineering efforts and makes site-data clearly visible to the proper user by relying on the system’s security measures instead of inventing its own bespoke ones.

        • naeap@sopuli.xyz
          link
          fedilink
          arrow-up
          1
          ·
          3 hours ago

          You could hash the duckduckgo URL for example

          But yeah, the data would be there, not sure how much that would help

  • folekaule@lemmy.world
    link
    fedilink
    arrow-up
    24
    ·
    8 hours ago

    It’s a pretty common assumption in software, especially on Linux, that if anyone can access your home directory, then you can’t have any expectation of privacy. Some apps make the explicit statement that secrets are stored in plain text because obfuscation would just give you a false sense of security.

    The solution is to encrypt the data on a system level, e.g., with encrypted home directories. You could also create an encrypted volume in a file and store the profile in there. Make sure to protect your private keys with good passphrases.

  • Branquinho@lemmy.eco.br
    link
    fedilink
    English
    arrow-up
    20
    ·
    8 hours ago

    This behavior is expected.

    On a multi-user system, this is not a problem, because other users (except root) are not allowed to list directories within your home directory.

    For processes that run on your system, this is the same: Usually, only your own processes are allowed to list your files. Then, they can also read your browsing history and all kind of personal files. So, you should not run processes that you don’t trust in respecting your privacy.

    And for all site visits that you don’t want to leave traces on your hard drive, you use the private browsing mode. (Keep in mind, that you still leave traces for persons that can read the traffic - even if the traffic is encrypted.)

    • Branquinho@lemmy.eco.br
      link
      fedilink
      arrow-up
      8
      ·
      8 hours ago

      I forgot to mention:

      If you want/need to restrict processes that you run, you can, for example, use AppArmor or SELinux to restrict paths that they are allowed to access.

      Or you use containers (Podman, Docker) to run low-privileged containers without access to your home directory.