WebUSB Extension for Firefox

(github.com)

113 points | by tuananh 6 hours ago

15 comments

  • sva_ 4 hours ago
    I recently flashed GrapheneOS on a Pixel for a friend. I was very surprised that you can do this entire process from the browser using WebUSB - the only downside being that it required me to launch Chromium.
    • infogulch 4 hours ago
      You can flash GrapheneOS on a Pixel from another pixel, no pc required at all. I've done it several times, this is what sold me on the utility of WebUSB. You can use GOS' own distribution of chromium, Vanadium, if you have a GOS device and you want to avoid Chrome.
      • embedding-shape 1 hour ago
        Is there something specific in that process that required WebUSB vs just normal USB? Sounds like phone makers could have done this since forever if they wanted to, what makes WebUSB particularly useful for this?
        • Retr0id 1 hour ago
          Native android apps can talk to regular USB devices, if granted the necessary permissions. But it's exposed through a Java api (and Kotlin I suppose, these days), which is fine, but it means you need to write your client logic twice. If you target the web, you can do it once.

          (Yes, you could try to bulid some common interface, libusb-style, but I think you'll have a bad time with minor behavioural differences, especially around permissions. libusb itself does ostensibly support Android but there are several caveats: https://github.com/libusb/libusb/wiki/Android#does-libusb-su... )

    • lxgr 3 hours ago
      Web USB and Web Bluetooth are amazing. I've used the former for the excellent Web MiniDisc [1], and the latter to flash custom firmware [2] on cheap Xiaomi Bluetooth LE thermometer/hygrometer devices that Home Assistant can pick up.

      Truly opening new possibilities, since I wouldn't have been comfortable running some sketchy script or local binary.

      [1] https://web.minidisc.wiki/ [2] https://github.com/pvvx/ATC_MiThermometer

      • dylan604 1 hour ago
        > Web USB and Web Bluetooth are amazing.

        Comments like this scare me. Things look amazing when people with benevolent intentions are making interesting things, but as soon as someone with malevolent intentions does something that becomes the reason we can't have nice things people will start asking if this is something we should have actually done.

        I just have no faith in humanity, and do not understand why we think this is a good idea to give a browser this much access to local system resources.

        • Shalomboy 40 minutes ago
          There isn't much to fear here. Web Bluetooth has been around nearly ten years now and nothing monumental has sprung forth from it. It is wonderfully convenient to have at your fingertips, especially in the ChromeOS world, but it's not gonna turn everyone's devices into Flipper Zero targets.
        • suryajena 1 hour ago
          What if we implement them but hide them deep in the settings or as experimental feature inside the hidden developer menu, behind multiple warning messages and password prompts? Only the very determined developers and advanced users would be able to unlock them. Then it's safe enough?
          • lxgr 1 hour ago
            Users will unfortunately click on absolutely anything that a trusted (deservedly or otherwise) source tells them to, and you won’t be able to reliable convince them otherwise with UX alone. This includes all “developers only”, “click 5 times” etc. UX interventions.

            You have to decide whether the feature warrants the remaining risk after all mitigations, or at least exceeds other, simpler attack vectors.

            I think in this case it does, but it’s not an easy decision and I can understand most opposing positions as well.

            • skybrian 25 minutes ago
              I suppose if it’s being actively exploited, the next step would be to make users wait a day, like the plan to change how Android side loading works.
        • lxgr 1 hour ago
          > Comments like this scare me.

          Sorry to hear that. I thought this was a safe space for hackers to express enthusiasm about pushing their own hardware and software further (and in this case even in a comparatively safe way).

          > I just have no faith in humanity, and do not understand why we think this is a good idea to give a browser this much access to local system resources.

          The browser already has all that access, it's just further granting it to web apps, and on a page-by-page, device-by-device, explicitly user opt-in basis at that.

          And as I've mentioned, the alternative here is to install a potentially untrusted native application that gets the same access and so much more.

          If that's what the Github page tells users to do, many of them will just do it without thinking twice. Is that better?

          • dylan604 1 hour ago
            > I thought this was a safe space for hackers to express enthusiasm about pushing their own hardware and software further (and in this case even in a comparatively safe way).

            Nothing is preventing said experimentation nor discussion of it. I am merely offering my more conservative views of the situation as a contrast to the echo chamber gungho nature of the experimentation. Just because we can doesn't mean we should is often left out of the conversation. At some point, the net negative that comes from the use of something "cool" is never contemplated by those creating the something "cool" simply because they would never fathom using the "cool" for "uncool" purposes. Sadly, someone else will and weaponize it in an uncontrollable manner. If the creators can't think of how it can happen, it is vital that those not so involved in the creation speak up when there are potential issues.

            • concinds 27 minutes ago
              I wouldn't describe it as "conservative" but as "pro-native-apps and anti-web-apps", which seems irrational in this day and age where "native apps" means platform lock-in by monopolies, less sandboxing and user-control than on the web, much more gatekeeping and control over published binaries, and these days the web app is usually a more private/secure alternative to the native app (which also bundles a marketing SDK, now, and fingerprints you invisibly via iCloud Keychain, tracks you with various identifiers, and more).

              If native platforms removed USB or Bluetooth, the "control over my own hardware" crowd would flip a table. I just wish they also understood the benefits of the web compared to native. The Chrome/Project Fugu team's dream of making the web platform as powerful as native platforms is the correct one from a user freedom standpoint, or at bare minimum a "user choice" standpoint.

            • leptons 32 minutes ago
              >Sadly, someone else will and weaponize it in an uncontrollable manner.

              Except it isn't "uncontrollable". You have to explicitly allow every single website to use WebUSB. Without that explicit allowance, the website can't access anything.

              Plenty of things can be weaponized, even household utensils. Should we ban all forks?

              The sky is not falling, and WebUSB is not going to cause it to fall.

        • leptons 38 minutes ago
          You can press a simple button on a webpage and it will install malware on your iPhone. Plenty of exploits have been out there for a long time.

          Should we disallow clicking on anything on a webpage too?

          WebUSB is no more risky than any other tech. You have to explicitly opt-in to use WebUSB on any site requesting access to it. And I'm sorry if someone's grandfather trusts a malicious website and gets hacked, but that isn't a reason to prevent the rest of us from using tech that enables functionality on non-malicious websites that serves a useful purpose.

    • donclark 1 hour ago
      I've used Firefox successfully twice. I have nextdns on my router, not sure if that helped.
  • nezza-_- 3 hours ago
    WebUSB is so great.

    I can ship a cross-platform application that accesses a hardware device without having to deal with all the platform specifics, and with decent sandboxing of my driver.

    I think one way to make it more "secure" against unwitting users would be to only support WebUSB for devices that have a WebUSB descriptor - would allow "origin" checking.

    • scottbez1 2 hours ago
      Yep, I’ve bought a few thermal printers recently and webusb support (marketed as Chromebook support) was a major deciding factor. Thermal printers aren’t well supported by built in printer drivers, so it’s nice to not have to install some questionable driver software with access to my whole computer and instead have a sandboxed chrome extension with enumerated permissions. I’ve also poked around the extensions’ minified js source out of curiosity and as a basic security audit

      It was also nice trying out some RTL-SDR apps as soon as I got it without having to figure out how to build and install the Debian packages from source first.

      It drives me nuts every time I have to switch from Firefox to Chrome to use webusb or webserial.

    • lxgr 1 hour ago
      Let's please not (or at most, add a scary warning for non-tagged devices), as this would break the use case for at least all retrocomputing.
    • gear54rus 2 hours ago
      Yep. FlipperZero, Android, now some random chinese handheld radio - just some of the things I didn't have to install some crap unsandboxed app to flash in the last 3 months. Absolutely revolutionary.
  • Brian_K_White 3 hours ago
    People are starting to ship even local apps only in the form of some html & js that only works on Chrome because only Chrome has webusb.

    Whether we like the idea of the browser having access to usb or not, I at least like even less the idea of being forced to install and use Chrome for the same reasons as the bad old days of being forced to use IE.

    • colechristensen 5 minutes ago
      I still want to reinvent the web with a hypertext document reader that doesn't include the kitchen sink. I suppose with LLMs these days this is actually an achievable prototype.
  • Orygin 4 hours ago
    No thanks. I'll accept it in my browser when they fix the security implications this raises, and when the Spec is no longer in draft.
    • Retr0id 4 hours ago
      The security implications of not having WebUSB are having to install untrustworthy native drivers every time you want to interface with a USB device.
      • tjoff 3 hours ago
        The security implications if this goes mainstream is that you are expected to do this for all kinds of hardware.

        Right now that isn't the case and I can't remember last the time I had to uninstall untrustworthy native drivers.

        A lot to lose, very little to gain?

        • mzmzmzm 2 hours ago
          I felt that way too, but having used it a few devices as an end user I enjoy being able to close the browser and have the whole stack disappear. Instead of having to install a creepy Logitech tool to pair a mouse with a receiver, as soon as that task is done, goodbye Logitech. I guess a real concern is manufacturers stop offering native drivers, but for the majority of hardware the PnP or the Linux kernel just handle it.
        • kid64 2 hours ago
          So what is an example use case where you'd prefer to do X without using this particular tech?
      • 1313ed01 4 hours ago
        Sounds like something that could have a standalone usb-driver-container or special chromium fork for the 0.00001% of users that need it instead of bloating every browser with yet another niche API and the inevitable security holes it will bring.
        • mschuster91 2 hours ago
          People are already doing that in the experimental embedded world, and let me tell you, it's pain. True and utter pain. You're going to fight different versions of libusb's userland being installed, Windows/macOS/Linux kernel occupying the device with a default driver (cough rtl_sdr) and a whole lot of other messes.

          Or some things aren't even available made using libusb. Think control applications for RGB lights in keyboard and mice. There's a certain manufacturer all but mandating installation of its slopware. Being able to provide all of this as WebUSB has advantages.

          • xeonmc 48 minutes ago
            Let me guess, Razer which is known for auto-downloading kernel rootkits as soon you plug in your mouse? They’re basically the Riot Games of gaming peripherals.
      • rafram 4 hours ago
        On macOS, I think I've installed device drivers exactly once in the last decade, and they were for a weird printer.
        • lxgr 1 hour ago
          macOS allows USB access without installing a driver, so that's probably why. The "driver" is just part of the app.
          • otterley 1 hour ago
            That’s how most operating systems have worked for over two decades. Most OSes support USB devices that present themselves as HID, mass storage, audio, etc. without any dedicated drivers needed. It’s only specialized devices or functionality that tends to need additional drivers.
        • kristofferR 3 hours ago
          Most device drivers nowadays aint necessary to solely get the device working, but to get it working well. All keyboards will work out of the box without any drivers/webusb-pages, but good luck configuring rapid triggers on your Wooting keyboard or a DPI-switching macro on your Logitech mouse without it.
      • ozgrakkurt 31 minutes ago
        Doesn't linux have the drivers already?
      • fhn 3 hours ago
        why would you be using untrustworthy hardware to begin with?
        • jazzyjackson 3 hours ago
          everyone has a different threshold at which they would consider something 'untrustworthy'

          Curious what your floor is for 'trustworthy', a company with a US headquarters? Personally I feel sketched out by any silicon not made in Sweden or Japan, so, pretty much all of it.

      • skydhash 4 hours ago
        That sounds like a Windows problem.
        • Retr0id 4 hours ago
          I'm not familiar with the Windows platform but although you can have userspace USB drivers on linux, you still need to be able to run code that can talk to the sysfs interface.
        • monegator 4 hours ago
          Not really, as long as the firmware developers used OS 2.0 descriptors

          (For the rare occurences that our customer is using 7 or earlier, we tell them to use zadig and be done with it.)

        • Lerc 4 hours ago
          The Linux problem is more

          Hope every time you want to interface with a USB device.

      • monegator 4 hours ago
        you do know microsoft OS 2.0 descriptors are a thing, right? or that you can force the unknown device to use WinUSB

        but really most devices you want to interface to via webusb are CDC and DFU so.. problem solved?

        • Retr0id 4 hours ago
          I'm unfamiliar with the Windows platform but that sounds like something that still requires executing code locally.
          • monegator 4 hours ago
            Not sure what you mean.

            Anyway OS 2.0 descriptors are a custom USB descriptor that basically tells the device to use WinUSB as the driver. The burden then is in the application that will have to implement the read/writes to the endpoints instead of using higher level functions provided by the custom driver.

            If you ever developed software with libUSB, using WinUSB on the windows side makes things super easy for cross platform development, and you don't have to go through all the pain to have a signed driver. Win-win in my book.

        • pjc50 4 hours ago
          .. or HID ( https://usevia.app/ , for programmable keyboards)
          • monegator 4 hours ago
            yes, you can always use some nasty protocol over HID for your devices. But really most of what i do is one or multiple bulk endpoints so i can achieve full bandwidth (downloading firmware, streaming data, ...) OS2.0 made it possible to do it without having to write and sign a driver
      • PunchyHamster 4 hours ago
        You can have userspace drivers for usb devices in Linux
        • scottbez1 3 hours ago
          How does the security of userspace drivers compare to having drivers within a sandboxed web environment with access to only the devices you’ve explicitly allowlisted?
          • bigfishrunning 2 hours ago
            It's about the same. People will blindly click allow on a webpage in the same way that they blindly run libusb binaries with `sudo` that they copied from some webpage. Security is possible in all of these scenarios, but always undermined by the users.
    • zb3 4 hours ago
      What are the security implications this raises that downloading native programs (needed for example to flash my smartphone) doesn't raise?
      • barnabee 3 hours ago
        None. People will follow any instruction presented to them when they think it will get them something they want. Mozilla’s stance here is infuriating.
      • troupo 3 hours ago
        > What are the security implications this raises that downloading native programs (needed for example to flash my smartphone) doesn't raise?

        1. Permission popups fatigue

        2. Usually users select the apps they install, most sites are ephemeral. And yes, even with apps, especially on Android, people click through permission dialogs without looking because they are often too broad and confusing. With expected results such as exfiltrating user data.

    • leptons 24 minutes ago
      The spec is still in draft because Apple refuses to let it move forward - because WebUSB, WebBluetooth and other APIs would compete with their app store, where they can make money from purchases made through apps. They prioritize profits over progress.

      It has nothing to do with security, as WebUSB has no ability to interact with any device unless the user explicitly allows each and every website that requests access to do so. It's the same security as any other browser API that requests access.

      • JimDabell 15 minutes ago
        > The spec is still in draft because Apple refuses to let it move forward

        This is untrue. Web standards need two independent implementations. Google can’t convince any other rendering engine besides their own to implement it.

        It doesn't take a single no from Apple to veto it; it takes a single yes from anybody outside of Blink to move it forward. Nobody is doing that.

        Here is what Mozilla have to say about WebUSB:

        > Because many USB devices are not designed to handle potentially-malicious interactions over the USB protocols and because those devices can have significant effects on the computer they're connected to, we believe that the security risks of exposing USB devices to the Web are too broad to risk exposing users to them or to explain properly to end users to obtain meaningful informed consent. It also poses risks that sites could use USB device identity or data stored on USB devices as tracking identifiers.

        https://mozilla.github.io/standards-positions/#webusb

        Until Google can convince anybody outside of Blink to implement it, it is not a standard it’s a Blink-only API.

    • gear54rus 4 hours ago
      And I'll just fire up a chrome instance which I specifically keep for when my daily driver firefox decides to spazz out and not implement basics in 2026 :'(
      • yjftsjthsd-h 3 hours ago
        Are you calling WebUSB a basic feature? Because I'm willing to discuss whether we should have it, but that seems like an exaggeration.
      • lpcvoid 4 hours ago
        How do you make sure that technically illiterate people don't just click away the requestDevice() popup? IMHO a browser offering device level USB access is a security nightmare and there is no way this can ever be made safe and convenient at the same time.
        • limagnolia 4 hours ago
          Isn't that the same excuse Gooogle is using to lrevent folks from installing what they want on Android phones?
          • baby_souffle 4 hours ago
            Essentially, yeah.
          • skydhash 3 hours ago
            I do not agree with Google on preventing apk installation. But unknown apk is a different risk profile than letting unknown entities to access local usb devices.

            The main issue in the former case is that google is posing itself as a gatekeeper instead of following a repo model like Debian or FreeBSD. That’s wanting control over people’s device.

            Allowing USB access is just asking to break the browser sandbox, by equating the browser with the operating system.

        • exe34 4 hours ago
          You can ask them to type one of the following sentences:

          "I know what I'm doing, and giving a random website access to my USB host is the right thing to do."

          "I'm an idiot."

          • jayd16 2 hours ago
            I love this because the idiots would type out that they know what they're doing and the pros would save time by typing "I'm an idiot."
            • exe34 1 hour ago
              hah I did think of the second one, but the first didn't occur to me.
        • gear54rus 4 hours ago
          You simply don't. This quest of saving idiots from themselves is not gaining anyone anything and meanwhile other people get more and more useless restrictions.
          • Orygin 3 hours ago
            Or you can just not give a loaded shotgun to every browser user on the off chance they need to interact with 1 (one) usb device per year.
        • zb3 4 hours ago
          They can click everything away, so maybe educate them or buy an ios device for your relatives instead of breaking computing for everyone else.
          • lpcvoid 4 hours ago
            Fair, but remember that we are the <~1% of people who even know what webusb is. I'm not sure I share your view on this.

            Maybe an about:config switch to enable it would be enough to stop casuals from pwning their peripherals.

            • barnabee 3 hours ago
              I’d be ok with an about:config switch, but given that many people will install anything, paste arbitrary text into terminals, and share their password/pin code with complete strangers for almost no reason, I think we need to stop making our tools less powerful in pursuit of an impossible goal.
          • Orygin 3 hours ago
            > breaking computing for everyone else

            How is not implementing a Draft spec, which may compromise security badly, breaking computing?

            Overreacting much?

            • zb3 3 hours ago
              This is not just an isolated incident, it's the whole trend of limiting capabilities in the name of security and that's what I was referring to.

              However in this particular case, even the security argument doesn't hold, either I:

              a) know that I want to use USB - in that case I'll switch browsers or download a native binary (even more unsafe), it's not that I'd decide that I no longer want to flash my smartphone

              b) I don't understand what's happening but I follow arbitrary instructions anyway - WebUSB changes nothing.

              • Orygin 1 hour ago
                A native binary can be verified by anti malware systems, and once installed and working, poses no security risk.

                A 0day in a browser for the WebUSB system would allow any website to mess with arbitrary USB devices connected to your computer.

                While the browser sandbox is generally safe, it is also a huge target, and with a security risk like that, it wouldn't surprise me if it's a prime target for black hats.

              • skydhash 2 hours ago
                So instead of using trusted vendors or requiring tools with auditable code, we just allow everyone to be able to access the user’s devices?
                • CamperBob2 1 hour ago
                  What a concept. We could call it "Personal Computing."
                  • skydhash 1 hour ago
                    Not really that personal when every webpage is itching to put their hands on it.
          • troupo 3 hours ago
            > They can click everything away, so maybe

            So maybe don't populate the browser with dozens of features requiring permission popups?

  • chillfox 3 hours ago
    Well, this seems like a terrible idea. I really don't want websites to be able to access hardware. I am already uncomfortable with the webcam access.
    • Brian_K_White 3 hours ago
      Whether we like it or not, the distinction between an app and a web page has already eroded, and is, and only will be, eroding more.

      Even for local apps it's starting to become common to ship the app in an interpreted language where the interpreter is a browser instead of say python & qt.

    • q3k 3 hours ago
      Then don't select the device and don't press the 'allow' button when prompted.
  • afavour 4 hours ago
    Looks to be a great proof of concept. No, running a standalone executable alongside the browser is not the way you'd want to do WebUSB. But it's great to see someone working on it.
    • Orygin 3 hours ago
      Running directly in the browser is also not how I'd want to do USB.
      • afavour 3 hours ago
        When the alternative is downloading arbitrary executables I find the browser sandbox to be a reassurance.
        • Orygin 1 hour ago
          Except the sandbox is a huge target already, and breaking it means any website can now access and mess with your usb devices. If you can develop an exploit for Chrome's WebUSB system, you potentially have millions upon millions of targets available.

          Downloading an arbitrary executable can be made safe (via multiple avenues: trust, anti virus software, audits, artifact signing, reproducible builds, etc) and once the software is vetted, it exposes (or it should at least) little to no attack vector during daily use.

  • coupdejarnac 2 hours ago
    Having WebUSB and WebBle everywhere would allow me to ship my IoT application via web only. That would be a win for my productivity, no more messing about with app store shenanigans.
  • MisterTea 2 hours ago
    As much as I understand the ease of deployment this brings people, it puts a massive amount of code between the device and the user. Will webusb software written today work in 5, 10, 15 years? Personally, I think webusb is a giant contraption.
    • charcircuit 1 hour ago
      In 5, 10, and 15 years LLMs will make maintaining the massive amount of code trivial.
  • suryajena 1 hour ago
    Will this work on Firefox Android? I recently wanted to try the printervention.app website to print from my phone over an OTG cable.
  • Devasta 2 hours ago
    I really don't understand the use case. Why would I want hardware that I own to be managed by a web app that could disappear?
  • jonhohle 2 hours ago
    So we can’t trust simple things like back-button hijacking, so let’s open up access to all attached hardware. Sounds stupid.
  • Zopieux 3 hours ago
    And Web Serial reached mainline Firefox last week.

    I hope Mozilla can eventually stop playing their silly role in the security theater of “but what if our users are dumb” and actually deliver those "power-user" features that would allow me to uninstall Chrome for good. Oh, and also, --app= flag please.

    • troupo 3 hours ago
      > their silly role in the security theater of “but what if our users are dumb”

      It's not security theater. If you go to Chromium settings -> Site settings -> permissions, and expand "additional permissions", you will see a total of 26 different permissions, each gated by the same generic "you want to use this" popup.

      Permission popup fatigue is quite real, and not a security theater. And that's on top of the usual questions of implementation complexity etc.

  • npodbielski 3 hours ago
    Interesting. So I could use that to install Graphene OS?
  • dreknows 3 hours ago
    [dead]
  • shevy-java 3 hours ago
    Can't Mozilla hand over Firefox to another team?