this post was submitted on 14 Apr 2024
51 points (96.4% liked)
LibreWolf
3163 readers
1 users here now
Welcome to the official community for LibreWolf.
LibreWolf is designed to increase protection against tracking and fingerprinting techniques, while also including a few security improvements. LibreWolf also aims to remove all the telemetry, data collection and annoyances, as well as disabling anti-freedom features like DRM. If you have any question please visit our FAQ first: https://librewolf.net/docs/faq/
To learn more or to download the browser visit the website: https://librewolf.net/
If you want to contribute head over to our Codeberg: https://codeberg.org/librewolf
founded 3 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I would also like to know how it got through the firewall. LibreWolf is not running as root, is it?
No, of course not.
I'd never run any service as root unless it's absolutey necessary.
I'm actually still baffled by this because I have no idea how this could happen.
A friend of mine suggested that Librewolf may have edited my ufw rules, but unless my understanding of how file permisions in Linux work is fundamentally flawed (without me ever running into problems because of it) that shouldn't be possible. Especially because
ufw status
still shows the IP as denied.I'm thinking about filing a bug report to ufw about this.
My career has primarily been in IT support so I had to ask haha 😅 Baffling is the word, for sure. If you do figure it out and you remember to update here I'd be appreciative! I think, after xz, we should all be on high alert to investigate minor-seeming-but-still-very-weird behaviours like this.
I very much doubt that this is even anywhere close to the level of xz. If, big IF, this is some kind of backdoor, then whoever made it didn't put nearly as much effort into hiding it as they did with xz and it would've probably been found already.