Brave fixed DNS leaks on onion addresses

The Tor feature included in the Brave web browser allows users to access .onion dark web domains within Brave private browser windows without having to install Tor as separate software.

The Tor feature was added in June 2018, and allowed Brave users to have increased privacy while browsing the web, allowing them to access .onion versions of legitimate websites such as Facebook, Wikipedia and major news portals.

However, in a published research on the internet this week, an anonymous security researcher claims to have found that Brave's Tor function sends queries for .onion domains to public internet DNS parsers and not to Tor nodes.

The researcher's findings were initially challenged, but several prominent security researchers were able to replicate his findings, including James Kettle, PortSwigger Web Security Research Director, and Will Dormann, a vulnerability analyst for the CERT / CC team.

The risks of this DNS leak are significant, as any leaks create traces in the log files of DNS servers for Tor traffic of browser users Brave.

While this may not be a problem in some western countries with healthy democracies, using Brave to browse Tor sites by oppressive regimes can be a big problem for some browser users.

Brave Software today announced an official fix on Twitter. The patch has already been released in the Brave Nightly version, and will soon be upgraded to the stable version probably in the next Brave browser update.

The source of the error was identified as an internal ad blocking feature of Brave, which used DNS queries to detect sites that were trying to bypass ad blocking features. But the developers had forgotten to exclude .onion domains from these controls.

Read them Technology News from all over the world, with the validity of

Follow us on Google News at Google news