I think people that are still using brave browser for bitcoin and other crypto reasons need to read this, a DNS vulnerability that creates a trail in server logs that can be followed by law enforcement, hackers or really anyone that has high-level network access. Those using the Tor mode service in the Brave browser expect their traffic to be protected against exactly the sort of DNS server logs that occurred as a result of this leak, which could reveal what websites they are accessing.
“Fundamentally, your ISP would know if you had visited .onion websites and if they track a log of all the websites you visited, they might report you as ‘suspicious,’” said pseudonymous security researcher SerHack in a direct message.
The data leak for nightly brave build which is used by developers before incorporating updates on brave stable build takes 113 days while the brave stable build data leak takes 91 days.
“Brave warns users that Tor windows and tabs in its browser do not provide the same level of privacy as Tor Browser, which is developed directly by the Tor Project,” said O’Brien. “However, this DNS leak was properly described as ‘egregious’ by Brave’s CSO.”
Using the right Tor is better than risky your information to be leaked. I am also thinking if this is truly a bug or an intentional vulnerability from brave that are trying towards exposing people using Tor windows and tabs through their browser?
https://www.coindesk.com/brave-browser-leak-exposed-user-domain-info-months