Close Menu

    Subscribe to Updates

    What's Hot

    SEC knocks down DeFi Development Corp’s ‘$1 Billion Solana Investment Plan’

    June 12, 2025

    Interview | SingularityNET’s Dr. Ben Goertzel on AGI, crypto and the end of jobs

    June 12, 2025

    Pudgy Penguins partners with NASCAR to reach new audience

    June 12, 2025
    Facebook X (Twitter) Instagram
    laicryptolaicrypto
    Demo
    • Ethereum
    • Crypto
    • Altcoins
    • Blockchain
    • Bitcoin
    • Lithosphere News Releases
    laicryptolaicrypto
    Home Security alert — Chromium vulnerability affecting Mist Browser Beta
    Ethereum

    Security alert — Chromium vulnerability affecting Mist Browser Beta

    Michael JohnsonBy Michael JohnsonDecember 20, 2024No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Due to a Chromium vulnerability affecting all released versions of the Mist Browser Beta v0.9.3 and below, we are issuing this alert warning users not to browse untrusted websites with Mist Browser Beta at this time. Users of “Ethereum Wallet” desktop app are not affected.

    Affected configurations: Mist Browser Beta v0.9.3 and below
    Likelihood: Medium
    Severity: High

    Malicious websites can potentially steal your private keys.

    As Ethereum Wallet desktop app does not qualify as a browser — it accesses only the local Wallet Dapp — it is not subject to the same category of issues present in Mist. For now, it is recommended to use Ethereum Wallet to manage funds and interact with smart contracts instead.

    Mist Browser’s vision is to be a complete user-facing bridge to the ethereum blockchain and set of technologies that compose the Web3. The browser paves a significant path for the next Web our ecosystem is proudly building.

    Security-wise, making a browser (an app that loads untrusted code) that handles private keys is a challenging task. Over the course of the last year, we have had Cure53 conduct an extensive security audit of Mist, and vastly improved the security of both the Mist browser and the underlying platform, Electron. We’ve promptly fixed found security issues.

    But that is not enough. Security in the browser space is a never-ending battle. The Mist browser is based on Electron, which is based on Chromium. Each new Chromium release fixes numerous security issues.

    The layer between Mist and Chromium, Electron, is a project led by GitHub that aims to ease the creation of cross-platform applications using JavaScript. Recently, Electron hasn’t kept up to date with Chromium, leading to an increasing potential attack surface as time passes.

    A core problem with the current architecture is that any 0-day Chromium vulnerability is several patch-steps away from Mist: first Chromium needs to be patched, then Electron needs to update the Chromium version, and finally, Mist needs to update to the new Electron version.

    We’re examining how we could deal with Electron’s not-so-frequent release schedule, to reduce the gap between Chromium versions we use. From preliminary studies, Brave’s Muon (an Electron fork) follows Chromium updates closely and is one potential option. The Brave browser, which also contains a cryptocurrency wallet integration, has a similar threat-model and demands for security as Mist.

    An important reminder: Mist is still beta software, and you must treat it as such. The Mist Browser beta is provided on an “as is” and “as available” basis and there are no warranties of any kind, expressed or implied, including, but not limited to, warranties of merchantability or fitness of purpose.
    Quick security checklist:

    • Avoid keeping large quantities of ether or tokens in private keys on an online computer. Instead, use a hardware wallet, an offline device or a contract-based solution (preferably a mix of those).
    • Back up your private keys — Cloud services are not the best option to store it.
    • Do not visit untrusted websites with Mist.
    • Do not use Mist on untrusted networks.
    • Keep your day-to-day browser updated.
    • Keep track of your Operating System and anti-virus updates.
    • Learn how to verify file checksums (link).

    Lastly, we would like to thank the security researchers that worked hard on reproducing and making invaluable submissions through the Ethereum Bounty program.

    If you need further information, get in touch here: mist[at]ethereum dot org.

    [We’ll update this post as the situation evolves].

    @evertonfraga
    Mist Team






    Source link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Michael Johnson

    Related Posts

    Ethereum price prediction as ETH reclaims $2,800 level

    June 11, 2025

    Tickets are live for the Ethereum World’s Fair! And we’re launching the Supporter Program

    June 10, 2025

    BTC trades at $109.7K after weekend surge; Ethereum’s Pectra upgrade boosts institutional staking

    June 10, 2025
    Leave A Reply Cancel Reply

    Demo
    Don't Miss
    Crypto

    SEC knocks down DeFi Development Corp’s ‘$1 Billion Solana Investment Plan’

    By John SmithJune 12, 20250

    Key Takeaways The capital raise, originally filed via Form S-3 in April 2025, was intended…

    Interview | SingularityNET’s Dr. Ben Goertzel on AGI, crypto and the end of jobs

    June 12, 2025

    Pudgy Penguins partners with NASCAR to reach new audience

    June 12, 2025

    France makes new arrests in ongoing crypto kidnapping case

    June 12, 2025

    LAI Crypto is a user-friendly platform that empowers individuals to navigate the world of cryptocurrency trading and investment with ease and confidence.

    Our Posts
    • Altcoins (567)
    • Bitcoin (27)
    • Blockchain (136)
    • Crypto (8,567)
    • Ethereum (622)
    • Lithosphere News Releases (142)

    Subscribe to Updates

    • Twitter
    • Instagram
    • YouTube
    • LinkedIn

    Type above and press Enter to search. Press Esc to cancel.