There is no such thing as an extrepo repository. extrepo is a method of enabling an already available repository (such as deb.torproject.org, deb.whonix.org, …) in an easier way. Instead of following third party instructions on how to enable the third party repository (add apt signing key + add apt sources.list.d snippet) it simplifies that process. No third party repository with alternative Chromium versions to being with → extrepo repository cannot help either. Similar explanation:
Iridium uses an ancient version of Chromium and is therefore publicly vulnerable to known vulnerabilities, all whilst the developers blatantly lie to its users on Github about this. It also severely weakens the browsers exploit mitigations by e.g. switching from Clang to GCC (so no CFI, etc.) for seemingly no reason; they just apply dangerous patches for the sake of it.
Counter measures In response to a report that a tracker was using CNAMEs to circumvent privacyblocklists4, uBlock Origin released an update for its Firefox version that thwarts CNAME cloaking [23]. The extension blocks requests to CNAME trackers by resolving the domain names using the browser.dns.resolve API method to obtain the last CNAME record (if there is any) before each request is sent. Subsequently, the extension checks whether the domain name matches any of the rules in its block lists, and blocks requests with matching domains while adding the outcome to a local cache. Although uBlock Origin also has a version for Chromium-based browsers, the same defense cannot be applied because Chromium-based browser extensions do not have access to an API to performDNS queries. As such, at the time of this writing, it is technically impossible for these extensions to block requests to trackers that leverage CNAME records to avoid detection
Indeed. This is good news. The transition isn’t nice for users but from Freedom Software viewpoint, it is good that Open Source code interacting with proprietary API has been removed.
Both, FlatHub and Snap Store had a more than 2 weeks gap between Google reporting a security vulnerability being exploited in the wild and these software stores pushing an upgrade.
Debian chromium package is still vulnerable.
Exploited in the wild is a crucial difference here. That’s the line between theoretic considerations and security in the real world.
It sounds right in theory but all the security mitigation in Chromium didn’t help to avoid this vulnerability being exploited in the wild. We should prioritize security in the real world over theoretic considerations. Despite all security innovations in Chrome / Chromium, that didn’t actually help users in the real world if Chromium maintenance (new releases with security fixes) lags behind Chrome. Maintenance is unfortunately something that cannot be excluded from the security comparison.
Now for more than 2 weeks Kicksecure would have had the choice to either install by default:
Firefox: No security vulnerabilities reported being exploited in the wild.
Chromium: At least 1 vulnerability reported being exploited in the wild.
More theoretic considerations…
Additionally, users on the Linux platform [1] had to choice:
Kicksecure Freedom Software doesn’t have the chance to install Chrome by default because it would then become non-freedom software. Even when mixing Freedom Software with non-freedom software, I wouldn’t know if Chrome could be legally re-distributed. I haven’t found license agreement for Chrome yet.
The question of the Kicksecure default browser, Debian’s Firefox ESR (or from any other Firefox from alternative sources) versus any Chromium unfortunately now got less clear to me.
[1] Leaving out Windows from considerations since this is about what to do in Kicksecure, Freedom Software, Linux based.
Everything in the article still applies to Chromium. Independent parties packaging it insecurely doesn’t affect the security of it upstream.
Worth mentioning distribution issues, though. Since it makes a big
difference for theory/practice.
Then Chromium upstream doesn’t really act like a usual upstream. No
stable releases. That link goes to Chrome instead. As mentioned earlier.
No (gpg) signed releases.
Since Chromium doesn’t really maintain a stable release upstream, that
results in this insecure situation in downstream Debian.
I find too many unresolved vulnerabilities in Debian’s Chromium security tracker. For now, is it better to use Firefox instead?
I don’t think Chromium from Debian will get any better soon, is it better to switch to a decent Chromium stable upstream? (I’m not aware of any stable upstream though) Maybe use Brave?
Firefox isn’t much better. Even assuming that Debian’s packaging of Firefox is flawless (it almost certainly is not), it’s still using an ESR build which inherently has many public, unfixed vulnerabilities upstream that can’t be patched even if Debian were to keep the package updated.