The Mozilla Project Fission team is preparing to implement a new security feature in Firefox that will isolate websites. Google is using something similar in version 67 of the Chrome browser to mitigate side-channel attacks from malicious websites.
The flaws security from which the Mozilla Foundation wants to protect the Firefox user with Project Fission were reported on Project Zero of Google on 3 January of 2018.
The Specter (variants 1 and 2) and Meltdown (variant 3) vulnerabilities allow attackers to misuse CPU data storage time "to leak information."
The security gaps mentioned above were immediately patched by Firefox's security teams, but it was noticed that with new attacks through other channels (side-channels) they may affect Firefox users when they visit a malicious website.
According to Nika Layzell of Mozilla Project Fission:
Our goal is to create a browser that will not only be secure against known security vulnerabilities, but will also have layers of built-in defense against potential future vulnerabilities. To achieve this, we need to refresh the Firefox architecture to support the complete isolation of the site.
We call this the next step in the evolution of Firefox process model "Project Fission". With Project Fission, we will "split the individual", dividing the cross-site iframes into different processes from the parent frame (s.s .: the frame that contains them).
“This means that even if a Specter attack is launched by a malicious website, the data from other sites would generally not be loaded in the same process, so there would be much less data available to the attacker,” according to Google's Charlie Reis.
The first application of Project Fission in Firefox we should see it at the end of February 2019. Let's wait and see if all this affects the performance of the browser.