A massive vulnerability in Firefox's IndexedDB just shattered Tor's privacy promises. Dive into the Hacker News drama, the tech breakdown, and dev takeaways.

What's up, fellow code monkeys? Just when you thought you could browse the dark web in peace or stash some cryptocurrency without the feds snooping, Tor gets slapped with a massive privacy reality check. A recent post exploded on Hacker News (hitting a massive 829 score), revealing that Tor's holy grail of anonymity has a gigantic leak. Grab your coffee, let's dissect this dumpster fire.
The drama started when Fingerprint.com—a company that literally sells browser fingerprinting solutions—dropped a tactical nuke on the privacy community. They discovered a stable identifier vulnerability utilizing the IndexedDB API in Firefox.
Here is the kicker: Tor Browser is essentially Firefox wearing a trench coat. When you click "New Identity" or request a new Tor circuit, you expect to be reborn as a completely new, untraceable user. But nope! Because Firefox failed to properly isolate and clear the IndexedDB state across different private sessions, this stable ID persists.
It links all your pristine, supposedly isolated anonymous identities into one neat little profile. It's like putting on an invisibility cloak but forgetting to take off your GPS-enabled smart shoes.
The HN comment section turned into an absolute warzone:
There is no silver bullet for online privacy. Trusting a single tool to protect you is like trusting a PM who says "there will be no scope creep." Pure fiction.
For the dev folks in the room: If you're messing with client-side storage (LocalStorage, IndexedDB), pay damn good attention to isolation and lifecycle management. State leaking isn't just a backend database problem; it happens right in the browser. Leaking a user's state across sessions is a massive YIKES.
If you were doing anything highly sensitive on Tor recently... well, good luck out there. If you just need to scrape data anonymously without the Tor drama, maybe just invest in a proper Proxy to unlock limitless web data collection instead.
Source: Fingerprint.com Blog