• 2Xtreme21@lemmy.world
      link
      fedilink
      English
      arrow-up
      31
      ·
      1 year ago

      I think the point is that even if an extension comes from a trusted source, the developer could fairly easily push out an update that turns the extension into malware. Check the GitHub link in another comment below where the developer posts the solicitation emails he gets on a regular basis offering to monetize his extension. He isn’t selling out, but maybe not every dev is as willing as he is to forgo a potentially lucrative offer.

    • TheEntity@kbin.social
      link
      fedilink
      arrow-up
      14
      ·
      1 year ago

      To be specific: from trusted developers. Installing them only from the official repository (is it still possible to reasonably install them any other way?) won’t help if a dev sells such an addon. On the other hand I cannot imagine someone like Raymond Hill (the uBlock Origin dev) doing it, considering his track record.

  • No Face@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    10
    ·
    1 year ago

    To add to the blog post, if you use user scripts, utilize your manager’s blacklist and learn REGEX.

    If needed, use Group Policy, Regedit or .plists on macOS to blacklist domains to prevent an extension from running on them. As an example, I use Shutup.css to block comments online, but on something like Lemmy, I want to see comments as that’s primarily how content is created and adding it to my extension domain blacklist prevents the extension from running on the website or any lemmy domains.

    • Coolcoder360@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      I love the offer of almost $15k to then say they can bargain if the users are active, like if it’s worth that much without active users then that’s definitely shady.

  • Dariusmiles2123@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    8
    ·
    1 year ago

    It’s interesting to read as I never thought about the vulnerability these extensions are.

    I guess you should limit the number of extensions you have.

  • djsaskdja@reddthat.com
    link
    fedilink
    English
    arrow-up
    7
    ·
    1 year ago

    Exactly why most enterprise organizations disable them. You should too if you’re doing anything sensitive data.

    • munderzi@feddit.ch
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 year ago

      That’s why on my work PC I use a completely vanilla Firefox, gotta live with the ads. But I’m not risking giving full access to website content to any extension

  • Franzia
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 year ago

    I thought my ISP already had this data and is selling it. Should I go make sure all my extensions are 100% kosher?

    • beaubbe@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      1 year ago

      Your ISP cannot read https data in transit. Extensions can because the page is now rendered on your local browser.