I’m Hursh, cofounder and CTO of The Browser Company (the company that makes Arc). Even though no users were affected and we patched it right away, the hypothetical depth of this vulnerability is unacceptable. We’ve written up some technical details and how we’ll improve in the future (including moving off Firebase and setting up a proper bug bounty program) here: https://arc.net/blog/CVE-2024-45489-incident-response.I'm really sorry about this, both the vuln itself and the delayed comms around it, and really appreciate all the feedback here – everything from disappointment to outrage to encouragement. It holds us accountable to do better, and makes sure we prioritize this moving forward. Thank you so much.
ayhanfuat|1 year ago
sushid|1 year ago
titaniumtown|1 year ago
unknown|1 year ago
[deleted]
tomjakubowski|1 year ago
By the way, I don't know for sure, but given the severity I suspect on the black market this bug would have gone for a _lot_ more than $2k.
poincaredisk|1 year ago
JumpCrisscross|1 year ago
The case is redeemable. It may still be an opportunity if handled deftly. But it would require an almost theatrical display of generosity to the white hat (together, likely, with a re-constituting of the engineering team).
ljm|1 year ago
tengbretson|1 year ago
keepamovin|1 year ago
rachofsunshine|1 year ago
mthoms|1 year ago
>We’ve fixed the issues with leaking your current website on navigation while you had the Boost editor open. We don’t log these requests anywhere, and if you didn’t have the Boosts editor open these requests were not made. Regardless this is against our privacy policy and should have never been in the product to begin with.
Given the context (boosts need to know the URL they apply to after all) this indeed was a "deliberate design choice" but not in the manner you appear to be suggesting. It's still very worrisome, I agree.
tyho|1 year ago
I think this should be a resigning matter for the CTO.
avarun|1 year ago
pembrook|1 year ago
Pro tip: if stuff like this violently upsets you, never be an early adopter of anything. Wait 5-10 years and then make your move.
Personally, I expect stuff like this from challenger alternatives, this is the way it should be. There is no such thing as a new, bug-free software product. Software gets good by gaining adoption and going through battle testing, it’s never the other way around like some big company worker would imagine.
Insanity|1 year ago
But it's also likely part of the startup mentally of "move fast and break things", which is not entirely compatible with the goal of the browser.
bloopernova|1 year ago
You've been handed a golden opportunity to set the right course.
JumpCrisscross|1 year ago
The Browser Company raises $50mm at a $550mm post-money valuation in March [1]. They’ve raised $125mm altogether.
Unless they’re absolute asshats, they’ll increase the bug payout. But people act truly when they don’t think they’re being watched—a vulnerability of this magnitude was worth $2k to this company. That’s…eyebrow raising.
[1] https://techcrunch.com/2024/03/21/the-browser-company-raises...
rattray|1 year ago
https://news.ycombinator.com/item?id=41606219
Laaas|1 year ago
unknown|1 year ago
[deleted]
qwertox|1 year ago
Firebase is not to blame here. It's a solid technology which just has to be used properly. Google highlights the fact that setting up ACLs is critical and provides examples on how to set them up correctly.
If none of the developers who were integrating the product into Arc bothered about dealing with the ACLs, then they are either noobs or simply didn't care about security.
com2kid|1 year ago
Firebase ACLs are a constant source of vulnerabilities largely because they are confusing and don't have enough documentation around them.
tanx16|1 year ago
Is there a reason why you don’t have any security-specific positions open on your careers site?
ha470|1 year ago
zo1|1 year ago
exdsq|1 year ago
radicaldreamer|1 year ago
Also, there's the whole notion of every URL you visit being sent to Firebase -- were these logged? Awful for a browser.
ha470|1 year ago
FleetAdmiralJa|1 year ago
liendolucas|1 year ago
What is also unacceptable is to pay 2000 dollars for something like this AND have to create user accounts to use your browser. Will definitely stay away from it.
_kidlike|1 year ago
__turbobrew__|1 year ago
NegativeLatency|1 year ago
markandrewj|1 year ago
benreesman|1 year ago
To explore a constructive angle both for the industry generally and the Browser Company specifically: hire this clever hacker who pwned your shit in a well-remunerated and high-profile way.
The Browser Company is trying to break tradition with a lot of obsolete Web norms, how about paying bullshit bounties under pressure rather than posting the underground experts to guard the henhouse.
If the Browser Company started a small but aggressive internal red team on the biohazard that is the modern web?
I’ll learn some new keyboard shortcuts and I bet a lot of people will.
nixosbestos|1 year ago
kernal|1 year ago
Bringing the chaos back like it's 1999.
msephton|1 year ago
metadat|1 year ago
To be honest, I'm a bit disappointed. For future reference, this doesn't seem like a good strategy to contain reputational damage.
FactKnower69|1 year ago
ycombinatrix|1 year ago
exabrial|1 year ago
mirzap|1 year ago
JumpCrisscross|1 year ago
Maybe not. If the browser is that buggy, there may be plenty of these lying around. The company itself is pricing the vulnerability at $2k. That should speak volumes to their internal view of their product.
unknown|1 year ago
[deleted]
unknown|1 year ago
[deleted]
bobmcnamara|1 year ago
[deleted]
ibash|1 year ago
While people might nitpick on how things were handled, the fact that you checked if anyone was affected and fixed it promptly is a good thing.
ziddoap|1 year ago
Being prompt on a vulnerability of this magnitude should be considered "meeting the standard" at best.
metadat|1 year ago