Security/Fusion: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
(Update the acronym.)
(update to known version of next esr)
 
(20 intermediate revisions by 2 users not shown)
Line 1: Line 1:
[[File:fusion2.png|thumb|200px]]
'''Fusion''' ('''F'''irefox '''USI'''ng '''ON'''ions) is a Mozilla project, in collaboration with [https://www.torproject.org/ the Tor Project], to bring the cutting-edge security and privacy features to Firefox users by leveraging the technologies of Tor Browser and Tor Proxy.


[[File:fusion.jpeg|thumb|200px]]
Current pages:
'''Fusion''' ('''F'''irefox '''USI'''ng '''ON'''ions) is a Mozilla's project to build the cutting-edge security and privacy features for Firefox users. <br>
Fusion will leverage the technologies of Tor Project, especially the ones in the Tor Browser and Tor Proxy, to bring more defense options for users.


Fusion was initiated in 2018.  Mozilla and [https://www.torproject.org/ Tor Project] are working closely on this project.
* [[Security/Fusion/Esr140|Fusion for Esr140]]
* [[Security/Fusion/Esr153|Fusion for Esr153]]
* [[Security/Fusion/Resources|Resources]]


== Background ==
[[File:Fusion3_small.jpg|right|400px|thumb|Fox protected by onion (not ai generated lol)]]


= Background =
The Firefox and Tor Browser teams are long-time collaboratorsThe Tor Browser team builds [https://www.torproject.org/download/ Tor Browser] by adding privacy-enhancing patches to [https://www.mozilla.org/en-US/firefox/organizations/ Firefox ESR].  When this process first began, the Tor Browser team would have to update these patches each time a new version of Firefox was released, which was very time intensive.
The Firefox and Tor Browser teams have collaborated for a long time.  In 2016, we started the [https://wiki.mozilla.org/Security/Tor_Uplift Tor Uplift project] to take this collaboration to the next level, bringing Firefox and Tor Browser closer together than ever before.


The Tor Browser team builds [https://www.torproject.org/projects/torbrowser.html Tor Browser] by taking [https://www.mozilla.org/en-US/firefox/organizations/ Firefox ESR] and applying some patches to it.  These changes add valuable privacy features for Tor Browser usersBut having these changes means that every time the Tor Browser team wants to use a new version of Firefox, they have to update the patches to work with the new version.  These updates take up a substantial fraction of the effort involved in producing Tor Browser.
In 2016, we started the [[Security/Tor_Uplift|'''Tor Uplift project''']] to take the Tor Browser patches and "uplift" them to Firefox. When a patch gets uplifted, the Firefox team takes the change Tor Browser needs and adds it to Firefox.  These changes in Firefox are disabled by default but can be enabled in preferencesBecause preferences can be changed rather than updating each patch, the Tor Uplift project saves the Tor Browser team a lot of work.


In 2016, we started the Tor Uplift project to take the Tor Browser patches and "uplift" them to FirefoxWhen a patch gets uplifted, we take the change that Tor Browser needs and we add it to Firefox in such a way that it is disabled by default, but can be enabled by changing a preference value.  The Tor Uplift project saves the Tor Browser team work since they can just change preferences instead of updating patches.  It also gives the Firefox team a way to experiment with the advanced privacy features that Tor Browser team is building, to see if we can bring them to a much wider audience.
The primary targets of the Tor Uplift project were two features: [[Security/FirstPartyIsolation|'''First Party Isolation''']] and [[Security/Fingerprinting|'''Fingerprinting Resistance''']]First Party Isolation was shipped in Firefox 52 (off by default); the MVP of Fingerprinting Resistance will be shipped in Firefox 59 (also off by default).


The primary target of the Tor Uplift project was two features: [https://wiki.mozilla.org/Security/FirstPartyIsolation '''First Party Isolation'''] and [https://wiki.mozilla.org/Security/Fingerprinting '''Fingerprinting Resistance'''].  First Party Isolation was shipped in Firefox 52 (off by default); the MVP of Fingerprinting Resistance will be shipped in Firefox 59 (also off by default).
Tor Uplift also gives the Firefox team a way to experiment with the advanced privacy features that Tor Browser team is building, to see if we can bring them to a much wider audience. That's the goal of '''Fusion''', the next big step of the collaboration between Mozilla and Tor.


'''Fusion''' is the next big step of the Mozilla and Tor collaboration.  We hope to move the needle on Web privacy based on the success of the Tor Uplift work.
Fusion was initiated in 2018.  Mozilla and the Tor Project are working closely on this project.


= Project Vision =
Fusion is being revived in 2025. Exact goals are still to be figured out.
Mozilla and Tor Project are aligned with each other on the mission to protect user privacy on the Web.
 
== Project Vision ==
Mozilla and the Tor Project are aligned with each other on the mission to protect user privacy on the Web.
* The fourth principle of [https://www.mozilla.org/en-US/about/manifesto/ The Mozilla Manifesto] is '''"Individuals’ security and privacy on the Internet are fundamental and must not be treated as optional."'''
* The fourth principle of [https://www.mozilla.org/en-US/about/manifesto/ The Mozilla Manifesto] is '''"Individuals’ security and privacy on the Internet are fundamental and must not be treated as optional."'''
* One of the Tor Project vision is '''"to advance human rights and freedoms by creating and deploying free and open anonymity and privacy technologies."'''
* The Tor Project's mission is '''"to advance human rights and freedoms by creating and deploying free and open anonymity and privacy technologies."'''
 
We believe the collaboration between Mozilla and Tor can create a positive, significant impact on the world by bringing cutting-edge privacy enhancing technology to more users.


We believe the collaboration between Mozilla and Tor can create a positive, significant impact on the world, and help users to regain their privacy.
== Motives ==
Further incentives for working together for Mozilla:
* Leverage engineering effort Tor Browser developers put into Tor Browsers on building the fingerprinting protection to include these protections for a wider audience
* Collaborate with experts on browser privacy to advance privacy protections in Firefox
* Eventually provide a mode with same privacy guarantees as Tor Browser
Incentives for Tor Browser folks:
* Being able to bring more protections to Tor Browser that currently wouldn't be feasible with the rebase workflow
* Reduce rebasing efforts for shipping Tor Browser freeing up engineering resources for other tasks
* Eliminate barriers for landing patches in Firefox to contribute directly to mozilla-central


= Project Goals =
== Project Goals ==
Ultimately, we hope to integrate full Tor Browser features in Firefox. There are many potential paths to this.  For example, enabling some features by default and but other options only in [https://support.mozilla.org/en-US/kb/private-browsing-use-firefox-without-history Private Browsing Mode].
The ultimate long-term goal of Fusion is to integrate full Tor Browser features in Firefox. There are many potential paths for our project, including enabling some features by default, others only in [https://support.mozilla.org/en-US/kb/private-browsing-use-firefox-without-history Private Browsing Mode] while some only in [https://support.mozilla.org/en-US/kb/enhanced-tracking-protection-firefox-desktop ETP-Strict]. If the protection doesn't fit in any category, it is possible to land it behind a pref disabled in all Mozilla channels.


We need a lot of research and experiments to support the decision-making for the final solution.  However, the clear short and mid-term goals are:
We need a lot of research and experiments to support the decision-making for the final solution.  However, the clear short and mid-term goals are:
Line 37: Line 52:
* '''We will allow First Party Isolation and Fingerprinting Resistance to be enabled only in Private Browsing Mode'''
* '''We will allow First Party Isolation and Fingerprinting Resistance to be enabled only in Private Browsing Mode'''


= Project Lists =
== Project Lists ==
== Tor Uplift ==
=== Tor Uplift ===
The [https://wiki.mozilla.org/Security/Tor_Uplift '''Tor Uplift'''] project is aimed at landing all Tor Browser patches so that Tor can directly use Firefox main trunk instead of a fork.
The [[Security/Tor_Uplift|'''Tor Uplift''']] project is aimed at landing all Tor Browser patches so that Tor can directly use Firefox main trunk instead of a fork.


== First Party Isolation ==
=== First Party Isolation ===
The [https://wiki.mozilla.org/Security/FirstPartyIsolation '''First Party Isolation'''] project is part of the Tor Uplift initiative. <br>
The [[Security/FirstPartyIsolation|'''First Party Isolation''']] project is part of the Tor Uplift initiative. <br>
It implements one of the Tor Browser core features ([https://www.torproject.org/projects/torbrowser/design/#identifier-linkability Cross-Origin Identifier Unlinkability]). <br>
It implements one of the Tor Browser core features ([https://www.torproject.org/projects/torbrowser/design/#identifier-linkability Cross-Origin Identifier Unlinkability]). <br>
First Party Isolation (also called "double keying") was incorporated in Firefox 52 with the preference '''"privacy.firstparty.isolate"'''.  It provides a very strong anti-tracking protection by preventing third parties from tracking users across multiple sites.
First Party Isolation (also called "double keying") was incorporated in Firefox 52 with the preference '''"privacy.firstparty.isolate"'''.  It provides a very strong anti-tracking protection by preventing third parties from tracking users across multiple sites.


== Fingerprinting Resistance ==  
=== Fingerprinting Resistance ===
The [https://wiki.mozilla.org/Security/Fingerprinting '''Fingerprinting Resistance'''] project is part of the Tor Uplift initiative. <br>
The [[Security/Fingerprinting|'''Fingerprinting Resistance''']] project is part of the Tor Uplift initiative. <br>
It implements another Tor Browser core feature ([https://www.torproject.org/projects/torbrowser/design/#fingerprinting-linkability Cross-Origin Fingerprinting Unlinkability]). <br>
It implements another Tor Browser core feature ([https://www.torproject.org/projects/torbrowser/design/#fingerprinting-linkability Cross-Origin Fingerprinting Unlinkability]). <br>
Fingerprinting Resistance (also called "anti-fingerprinting") was incorporated in Firefox 59 with the preference '''"privacy.resistFingerprinting"'''.  It is a defense against browser fingerprinting, which is a widely used Web tracking technology to identify individuals.
Fingerprinting Resistance (also called "anti-fingerprinting") was incorporated in Firefox 59 with the preference '''"privacy.resistFingerprinting"'''.  It is a defense against browser fingerprinting, which is a widely used Web tracking technology to identify individuals.


= Getting Involved =
== Getting Involved ==
The easiest way to get involved in the Fusion project is to help us writing code, running tests and filing bugs.
The easiest way to get involved in the Fusion project is to help us writing code, running tests and filing bugs.


If you are interested in contributing to Fusion, drop by:
If you are interested in contributing to Fusion, drop by:
* the mailing list: '''fusion@mozilla.com'''
* the '''#tor-browser-dev''' [https://gitlab.torproject.org/tpo/team/-/wikis/IRC IRC channel], also bridged to matrix on '''#tor-browser-dev:matrix.org''', or
* the '''#tor''' or '''#security''' IRC channels on [https://wiki.mozilla.org/IRC Mozilla's IRC server]
* the '''#anti-tracking:mozilla.org''' matrix channel


= External Links =
== External Links ==
* [https://www.youtube.com/watch?v=JWII85UlzKw Video: How Tor Browser Protects Your Privacy and Identity Online]
* [https://www.youtube.com/watch?v=JWII85UlzKw Video: How Tor Browser Protects Your Privacy and Identity Online]
* [https://www.torproject.org/projects/torbrowser/design/ The Design and Implementation of the Tor Browser]
* [https://www.torproject.org/projects/torbrowser/design/ The Design and Implementation of the Tor Browser]
* [https://blog.torproject.org/tor-heart-firefox Tor Blog, Tor at the Heart: Firefox]
* [https://blog.torproject.org/tor-heart-firefox Tor Blog, Tor at the Heart: Firefox]
* [https://gitlab.torproject.org/legacy/trac/-/wikis/org/meetings/2018Rome/Notes/FusionProject wiki page from Tor project]


https://arthuredelstein.net/fusion2_small.jpg
[[File:Fusion2_small.jpg]]

Latest revision as of 11:48, 5 September 2025

Fusion2.png

Fusion (Firefox USIng ONions) is a Mozilla project, in collaboration with the Tor Project, to bring the cutting-edge security and privacy features to Firefox users by leveraging the technologies of Tor Browser and Tor Proxy.

Current pages:

Background

Fox protected by onion (not ai generated lol)

The Firefox and Tor Browser teams are long-time collaborators. The Tor Browser team builds Tor Browser by adding privacy-enhancing patches to Firefox ESR. When this process first began, the Tor Browser team would have to update these patches each time a new version of Firefox was released, which was very time intensive.

In 2016, we started the Tor Uplift project to take the Tor Browser patches and "uplift" them to Firefox. When a patch gets uplifted, the Firefox team takes the change Tor Browser needs and adds it to Firefox. These changes in Firefox are disabled by default but can be enabled in preferences. Because preferences can be changed rather than updating each patch, the Tor Uplift project saves the Tor Browser team a lot of work.

The primary targets of the Tor Uplift project were two features: First Party Isolation and Fingerprinting Resistance. First Party Isolation was shipped in Firefox 52 (off by default); the MVP of Fingerprinting Resistance will be shipped in Firefox 59 (also off by default).

Tor Uplift also gives the Firefox team a way to experiment with the advanced privacy features that Tor Browser team is building, to see if we can bring them to a much wider audience. That's the goal of Fusion, the next big step of the collaboration between Mozilla and Tor.

Fusion was initiated in 2018. Mozilla and the Tor Project are working closely on this project.

Fusion is being revived in 2025. Exact goals are still to be figured out.

Project Vision

Mozilla and the Tor Project are aligned with each other on the mission to protect user privacy on the Web.

  • The fourth principle of The Mozilla Manifesto is "Individuals’ security and privacy on the Internet are fundamental and must not be treated as optional."
  • The Tor Project's mission is "to advance human rights and freedoms by creating and deploying free and open anonymity and privacy technologies."

We believe the collaboration between Mozilla and Tor can create a positive, significant impact on the world by bringing cutting-edge privacy enhancing technology to more users.

Motives

Further incentives for working together for Mozilla:

  • Leverage engineering effort Tor Browser developers put into Tor Browsers on building the fingerprinting protection to include these protections for a wider audience
  • Collaborate with experts on browser privacy to advance privacy protections in Firefox
  • Eventually provide a mode with same privacy guarantees as Tor Browser

Incentives for Tor Browser folks:

  • Being able to bring more protections to Tor Browser that currently wouldn't be feasible with the rebase workflow
  • Reduce rebasing efforts for shipping Tor Browser freeing up engineering resources for other tasks
  • Eliminate barriers for landing patches in Firefox to contribute directly to mozilla-central

Project Goals

The ultimate long-term goal of Fusion is to integrate full Tor Browser features in Firefox. There are many potential paths for our project, including enabling some features by default, others only in Private Browsing Mode while some only in ETP-Strict. If the protection doesn't fit in any category, it is possible to land it behind a pref disabled in all Mozilla channels.

We need a lot of research and experiments to support the decision-making for the final solution. However, the clear short and mid-term goals are:

  • We will improve Fingerprinting Resistance by
    • making fingerprinting resistance more user-friendly,
    • minimizing Web breakages caused by fingerprinting resistance, and
    • conducting a browser fingerprinting analysis research project to help us figure out the best defense strategy
  • We will implement a proxy bypass testing framework for Firefox
  • We will determine how best to integrate the Tor proxy into Firefox
  • We will allow First Party Isolation and Fingerprinting Resistance to be enabled only in Private Browsing Mode

Project Lists

Tor Uplift

The Tor Uplift project is aimed at landing all Tor Browser patches so that Tor can directly use Firefox main trunk instead of a fork.

First Party Isolation

The First Party Isolation project is part of the Tor Uplift initiative.
It implements one of the Tor Browser core features (Cross-Origin Identifier Unlinkability).
First Party Isolation (also called "double keying") was incorporated in Firefox 52 with the preference "privacy.firstparty.isolate". It provides a very strong anti-tracking protection by preventing third parties from tracking users across multiple sites.

Fingerprinting Resistance

The Fingerprinting Resistance project is part of the Tor Uplift initiative.
It implements another Tor Browser core feature (Cross-Origin Fingerprinting Unlinkability).
Fingerprinting Resistance (also called "anti-fingerprinting") was incorporated in Firefox 59 with the preference "privacy.resistFingerprinting". It is a defense against browser fingerprinting, which is a widely used Web tracking technology to identify individuals.

Getting Involved

The easiest way to get involved in the Fusion project is to help us writing code, running tests and filing bugs.

If you are interested in contributing to Fusion, drop by:

  • the #tor-browser-dev IRC channel, also bridged to matrix on #tor-browser-dev:matrix.org, or
  • the #anti-tracking:mozilla.org matrix channel

External Links

Fusion2 small.jpg