Browser can identify my AppVM name and probably more

@rustybird
Yes and even with all that disabled (history, etc) that particular website will let me login without 2fa (sms) after a couple of logins over a time span of several days. I never get a message your logging in from a new device. I only got that AFTER changing my hostname.

I sent you a pm with the website name as it I prefer not to have it listed in a public post - sorry :anguished:

But in any case anyone can check this in the Vivaldi browser too (i used a platpak) just create an account and you can see your appvm name - or at least I can.

Thanks, I’ll check it out.

You can actually see the VM name / hostname in the website content (not in the browser UI)? Does that happen with other browsers too besides Vivaldi?

Correct: in the website content in the Vivaldi browser.
In the Qubes native Firefox browser my appvm got registered as a new device after changing my hostname but I could not see the hostname in the browser content - but I believe that website can read it.

So, what is the goal of hiding AppVM name?

You don’t want to became a easy target of some imperator equipped by full chain of 0day vulnerabilities. You only die once (by accident of course) :joy:

Hi everyone, Vivaldi only shows the appvm name in the UI which seems to be safe. I didn’t know that was safe. As for the other website I retested it by changing my AppVM name and it didn’t tell me I was logging in from a new machine. So I don’t know what caused it. But It’s not the appvm name.

So classic mistake here of not enough knowledge and not double checking. My fault. :flushed:

In any case, if for some reason you don’t want your browser to know your AppVM name and use a different name on the inside your qube, you can follow the mini hostnamectl tutorial above and check out @parulin and @rzg posted links :slight_smile:

Thank you for all your responses and help and especially thanks to @rustybird for helping me to figure out what was going on.

1 Like

If all your appvm’s use uniform identifiable names like Qube-1A, Qube-1B, Qube-2A, Qube-2B
it becomes a pattern. And since there is AI, everywhere these patterns can become recognizable - even if your in a different AppVM. Just providing another clue to your identity. So the goal here is security trough obscurity. All the small things you can do help in the end of the day, even if it doesn’t seem like a big deal. Of course it depends on your threat model if this is useful for you or not.

Did you try to check your audio and mouse fingerprinting across your qubes: Firefox, tor, Vivaldi, etc…?

Oh, and its ā€œsecurity through compartmentalizationā€. This topic looks like it’s about anonymity, to be honest, and it might lead less experienced users to a false sense of security, if I’m asked. And it would be good to emphasize the fact in the OP.

Even Qubes Os advertises itself on the very front page as ā€œReasonably secure OSā€. It’s not shaming, it’s the fact of life…

the fear increases the discipline, but in Qubes we could achive a meticulous tactical compartmentalization

Thanks for your input! You raise some solid points, especially regarding the distinction between security through obscurity and compartmentalization — that’s definitely crucial to consider. But can’t they work together and compliment each other?

What I aimed to emphasize is understanding what websites can see about your system. A part of newcomers to Qubes, like myself, come from tough situations and have perhaps dealt with cybercrime. Suddenly, you find yourself in a completely new environment, where you become aware of an invisible world—like what can be seen at the other end of the connection. Not knowing what’s visible can create a lot of anxiety and stress.

So, for me personally this isn’t just about anonymity; it’s about grasping what can be seen and how that visibility might impact your threat model.

I hope that clarifies my perspective a bit better. I’m open to renaming the post to highlight these nuances—any suggestions would be great!

PS. no mouse & audio here.

https://doc.qubes-os.org/en/latest/introduction/faq.html#what-about-privacy-in-non-whonix-qubes

1 Like