Hello privacyguides. I have a question:
Talking strictly about security, how would you rate multi-account-containers for compartmentalizing internet activity? By compartmentalizing, I mean if, for example, I click on link “xyz” on container “a”, and this link is somehow capable of accessing account “b” and compromise it. Except I have this account “b” logged in another container. Would the website be able to compromise the account? I know zero-days exist, but in a typical situation, would this extension improve security in this example or not?
Thanks in advance for your time and any answers!
Even without containers cookies are separated between sites: https://blog.mozilla.org/en/products/firefox/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/
So from a privacy perspective from a site in the browser looking at cookies, with or without containers it should not be able to see cookies from other websites.
However from a security standpoint if something breaks out of the browser with an exploit and infects the host system, it can read all of the browser data easily from any site in any container.
Total cookie protection (called “State partitioning” under the hood) is not totally total.
In order to resolve these compatibility issues of State Partitioning, we allow the state to be unpartitioned in certain cases. When unpartitioning is taking effect, we will stop using double-keying and revert the ordinary (first-party) key…
There are two scenarios in which Firefox might unpartition states for websites to allow for access to first-party (cross-site) cookies and other state:
- When an embedded iframe calls the Storage Access API.
- Based on a set of automated heuristics.
Good to know! Annoying that it doesn’t tell you that.
The documentation is… Confusing. This was the third time I tried looking into it, and the last two times I was much more wrong about how it actually worked.
Total Cookie Protection also protects more than cookies, FWIW.