8M users' AI conversations sold for profit by "privacy" extensions
Posted by takira 15 hours ago
Comments
Comment by GeekyBear 13 hours ago
> Firefox is committed to helping protect you against third-party software that may inadvertently compromise your data – or worse – breach your privacy with malicious intent. Before an extension receives Recommended status, it undergoes rigorous technical review by staff security experts.
https://support.mozilla.org/en-US/kb/recommended-extensions-...
I know that Google hates to pay human beings, but this is an area that needs human eyes on code, not just automated scans.
Comment by Santosh83 12 hours ago
Comment by Terr_ 12 hours ago
If you're feeling extra-paranoid, the XPI file can be unpacked (ZIP) and to check over the code for anything suspicious or unreasonably-complex, particularly if the browser-extension is supposed to be something simple like "move the up/down vote arrows further apart on HN". :P
While that doesn't solve the overall ecosystem issue, every little bit helps. You'll know it's time to run away if extensions become closed-source blobs.
Comment by londons_explore 6 hours ago
Often they're compiled with typescript etc making manual review almost impossible.
And if you demand the developer send in the raw uncompiled stuff you have the difficulty of Google/Mozilla having to figure out how to compile an arbitrary project which could use custom compilers or compilation steps.
Remember that someone malicious wont hide their malicious code in main.ts... it's gonna be deep inside a chain of libraries (which they might control too, or might have vendored).
Comment by londons_explore 5 hours ago
I=c=>c.map?c[0]?c.reduce((a,b)=>a[b=I(b)]||a(b),self):c[1]:c
(How it works is an exercise to the reader)
The actual code to run can be delivered as an innocuous looking JavaScript array from some server, and potentially only delivered to one high value target.
Comment by ikekkdcjkfke 5 hours ago
Comment by johnebgd 3 hours ago
Comment by arein3 2 hours ago
Wow, it deconstructed it beautifully
A Concrete Example Imagine you pass this array to the function: ['alert', 'Hello World'] Here is the step-by-step execution:
Initialization: The accumulator a starts as self (the window object).
Iteration 1 (b = "alert"):
I("alert") returns string "alert".
It tries a["alert"] (which is window["alert"]).
This finds the alert function.
New Accumulator a: The alert function.
Iteration 2 (b = "Hello World"):
I("Hello World") returns string "Hello World".
It tries a["Hello World"]. The alert function does not have a property named "Hello World", so this is undefined.
The || operator moves to the right side: a(b).
It executes alert("Hello World").
Result: A browser popup appears.Comment by cj 3 hours ago
Comment by electroly 2 hours ago
Mozilla allows minification but you're required to provide the original buildable source. Mozilla actually looks at the code and they reject updates all the time.
Comment by cj 2 hours ago
https://blog.chromium.org/2018/10/trustworthy-chrome-extensi...
Comment by sixtyj 5 hours ago
In JS this can be much harder to find anything suspicious when the code can be minified.
But back to Firefox: My house, my rules. So let external developers set some more strict rules that discourage the bad actors a little.
Comment by sixtyj 5 hours ago
When a survey was conducted on the misuse of finances and powers, it was found that managers who did not sign the code (because they had to study it and then "forgot" to do so) were more likely to cheat than those who actually signed the documents.
Comment by dvratil 11 hours ago
Comment by GeekyBear 17 minutes ago
Yes.
Comment by tuetuopay 9 hours ago
Comment by pacifika 11 hours ago
> Before an extension receives Recommended status, it undergoes rigorous technical review by staff security experts.
https://support.mozilla.org/en-US/kb/recommended-extensions-...
Comment by nevon 10 hours ago
Comment by insin 7 hours ago
This is what the Firefox add-ons team sent to me when one of my extensions was invited to the Recommended program:
> If you’re interested in Control Panel for Twitter becoming a Firefox Recommended Extension there are a couple of conditions to consider:
> 1) Mozilla staff security experts manually review every new submission of all Recommended extensions; this ensures all Recommended extensions remain compliant with AMO’s privacy and security standards. Due to this rigorous monitoring you can expect slightly longer review wait times for new version submissions (up to two weeks in some cases, though it’s usually just a few days).
> 2) Developers agree to actively maintain their Recommended extension (i.e. make timely bug fixes and/or generally tend to its ongoing maintenance). Basically we don't want to include abandoned or otherwise decaying content, so if the day arrives you intend to no longer maintain Control Panel for Twitter, we simply ask you to communicate that to us so we can plan for its removal from the program.
Comment by nevon 7 hours ago
Comment by j-bos 7 hours ago
Comment by megous 7 hours ago
What I saw in Mozilla extensions store was anything from using minified code (what is this? it might have been useful in the late 90's on the web, but it surely is not necessary as part of an extension, that doesn't download its code from anywhere), to just full on data stealing code (reported, and mozilla removed it after 2 weeks or so).
I don't trust the review process one bit if they allow minified code in the store. For the same reason, "manual" review doesn't fill me with any extra warm confidence feeling. I can look at minified code manually myself, but it's just gibberish, and suspicious code is much harder to discern.
Also, I just stopped using third party extensions, except for 2 (violentmonkey, ublock), so I no longer do reviews. I had a script that would extract the XPI into a git repository before update, do a commit and show me a diff.
Friendly extension store for security conscious users would make it easy to review source code of the extension before hitting install or update. This is like the most security sensitive code that exists in the browser.
Comment by Llamamoe 13 hours ago
I think we need both human review and for somebody to create an antivirus engine for code that's on par with the heuristics of good AV programs.
You could probably do even better than that since you could actually execute the code, whole or piecewise, with debugging, tracing, coverage testing, fuzzing and so on.
Comment by jwr 4 hours ago
Comment by tremon 3 hours ago
Comment by wzdd 7 hours ago
Comment by alfiedotwtf 10 hours ago
Comment by chmod775 14 hours ago
> Urban Cyber Security INC
https://opencorporates.com/companies/us_de/5136044
https://www.urbancybersec.com/about-us/
I found two addresses:
> 1007 North Orange Street 4th floor Wilmington, DE 19801 US
> 510 5th Ave 3rd floor New York, NY 10036 United States
and even a phone number: +1 917-690-8380
https://www.manhattan-nyc.com/businesses/urban-cyber-securit...
They look really legitimate on the outside, to the point that there's a fair chance they're not aware what their extension is doing. Possibly they're "victim" of this as well.
Comment by swatcoder 14 hours ago
If that looks use-italics "really legitimate" to you, then you might be easily scammed. I'm not saying they're not legitimate, but nothing that you shared is a strong signal of legitimacy.
It would take a perhaps a few hundred dollars a month to maintain a business that looked exactly like this, and maybe a couple thousand to buy one that somebody else had aged ahead of time. You wouldn't have to have any actual operations. Just continuously filed corporate papers, a simple brochure website, and a couple virtual office accounts in places so dense that people don't know the virtual address sites by heart.
Old advice, but be careful believing what you encounter on the internet!
Comment by chmod775 13 hours ago
Comment by Egor3f 13 hours ago
And also, why extension for vpn? I live in country where almost everybody uses vpn just to watch YouTube and read twitter, and none of my friends uses some strange extensions. There are open source software for that - from real vpn like wireguard, to proxy software like nekoray/v2raytun. Browser extension is the last thing I would install to be private.
Comment by chmod775 13 hours ago
Comment by nothrabannosir 12 hours ago
> What, there's an issue because I'm not being underhanded about it like [that] guy?
Wow you’ve put something into words here I never consciously realized is an unwritten rule. Sounds silly but yea you’re 100% right; that seems to be exactly the game we play.
For better or for worse.
Comment by j-bos 7 hours ago
HN guidelines: Assume good faith.
Comment by weird-eye-issue 13 hours ago
Based on what? The same instinct that told you having an address and phone number makes an entity legitimate? The chance the people behind this company live in the US is incredibly low. And even if they do live in the US what exactly would they be getting charged with and who would care enough to charge them?
Comment by chmod775 13 hours ago
Comment by ch2026 14 hours ago
The NY address is a virtual office.
https://themillspace.com/wilmington/
The DE address is a virtual office plus coworking facility.
Comment by azinman2 12 hours ago
Comment by ryanjshaw 11 hours ago
You run a business from home but do not want to reveal you personal address to the world.
You are from a country that Stripe doesn’t support but need to make use of their unique capabilities like Stripe Connect, then you might sign up for Stripe Atlas to incorporate in the USA so you can do business directly with Stripe. Your US business then needs a US physical address ie virtual office.
Etc
Comment by nl 6 hours ago
Comment by victorbjorklund 11 hours ago
Comment by SoftTalker 3 hours ago
Comment by Mistletoe 11 hours ago
Comment by Nevermark 13 hours ago
> This company has been on researchers' radar before. Security researchers Wladimir Palant and John Tuckner at Secure Annex have previously documented BiScience's data collection practices. Their research established that:
> BiScience collects clickstream data (browsing history) from millions of users Data is tied to persistent device identifiers, enabling re-identification The company provides an SDK to third-party extension developers to collect and sell user data
> BiScience sells this data through products like AdClarity and Clickstream OS
> The identical AI harvesting functionality appears in seven other extensions from the same publisher, across both Chrome and Edge:
Hmm.
> They look really legitimate on the outside
Hmm, what, no.
We have a data collection company, thriving financially on lack of privacy protections, indiscriminant collection and collating of data, connected to eight data siphoning "Violate Privacy Network" apps.
And those apps are free... Which is seriously default sketchy if you can't otherwise identify some obviously noble incentives to offer free services/candy to strangers.
Once is happenstance, twice is coincidence, three (or eight) times is enemy action.
The only thing that could possibly make this look any worse is discovering a connection to Facebook.
Comment by mortarion 6 hours ago
Comment by weird-eye-issue 14 hours ago
Comment by bix6 14 hours ago
1000 N. WEST ST. STE. 1501, WILMINGTON, New Castle, DE, 19801
It almost matches this law firms address but not quite.
https://www.skjlaw.com/contact-us/
Brandywine Building 1000 N. West Street, Suite 1501 Wilmington DE 19801
Comment by thayne 11 hours ago
Comment by consp 7 hours ago
Comment by throw310822 11 hours ago
BiScience is an Israeli company.
Comment by hnbad 7 hours ago
Comment by elisbce 13 hours ago
Comment by jackfranklyn 10 hours ago
What we actually need is runtime permissions that fire when the extension tries to do something suspicious - like exfiltrating data to domains that aren't related to its stated function. iOS does this reasonably well for apps. Extensions should too.
The "Recommended" badge helps but it's a bandaid. If an extension needs "read and change all data on all websites" to work, maybe it shouldn't work.
Comment by hnbad 7 hours ago
For example there's no need for the "inject custom JS or CSS into websites" extensions to need permission to read and write data on every single website you visit. If you only want to use them to make a few specific sites more accessible to you that doesn't mean you're okay with them touching your online banking. Especially when most of these already let you define specific URLs or patterns each rule/script should apply to.
I understand that there are still vectors for data exfiltration when the same extension has permissions on two different sites and that "code injection as a service" is inherently risky (although cross-origin policies can already lock this down somewhat) but in 2025 I'd hope we could have a more granular permission model for browser extensions that actually supports sandboxing.
Comment by valicord 2 hours ago
Comment by umrashrf 14 hours ago
Sometimes things don't make sense to me, like how "Uber Driver app access background location and there is no way to change that from settings" - https://developer.apple.com/forums/thread/783227
Comment by qwertox 10 hours ago
Or they'd tell WhatsApp to allow granting microphone permissions for one single call, instead of requesting permanent microphone permissions. All apps that I know of respect the flow of "Ask every time", all but Meta's app.
Google just doesn't care.
Comment by uyzstvqs 7 hours ago
Comment by qwertox 6 minutes ago
Comment by donohoe 6 hours ago
Comment by josephg 6 hours ago
Or even better, mix in some real names and phone numbers but change all the other details. I want data brokers to think I live in 8 different countries. I want my email address to show up for 50 different identities. Good luck sorting that out.
Comment by marcellus23 14 hours ago
The developer documentation is actually pretty clear about this: https://developer.apple.com/documentation/bundleresources/ch...
Comment by hnbad 7 hours ago
Comment by naian 1 hour ago
Comment by murillians 9 hours ago
Is this where we’re at with AI?
Comment by nacozarina 7 hours ago
Putting a token predictor in the mix — especially one incapable of any actual understanding — seems like a natural evolution.
Absolved of burden of navigating our noisy, incomplete and dissonant thoughts, we can surrender ourselves to the oracle and just obey.
Comment by lionkor 2 hours ago
Comment by SoftTalker 3 hours ago
Comment by meindnoch 7 hours ago
Comment by ACCount37 4 hours ago
For all we know, it's just two paths the brain can take to arrive at the same destination.
Comment by ga_to 3 hours ago
Comment by AlecSchueler 9 minutes ago
Comment by nl 6 hours ago
For example HBR recently reported the number 1 use for ChatGPT is "Therapy/companionship"
Comment by Miraltar 9 hours ago
Comment by senordevnyc 2 hours ago
Here's an example of the kinds of things I've talked with ChatGPT about in the last few weeks:
- I'm moving to a new area and I share custody of my daughter, so this adds a lot of complications around logistics. Talked through all that.
- Had it research niche podcasts and youtube channels for advertising / sponsorship opportunities for my SaaS
- Talked through a really complex architecture decision that's a mix of technical info and big tradeoffs for cost and customer experience.
- Did some research and talked through options for buying two new vehicles for the upcoming move, and what kinds work best for use cases (which are complex)
- Lots and lots of discussions around complex tax planning for 2026 and beyond
Again, these models have vast knowledge, as well as access to search and other tools to gather up-to-date info and sift through it far faster than I can. Why wouldn't I talk through these things with them? In my experience, with a little guardrails ("double check this" or "search and verify that X..."), I'm finding it more trustworthy than most experts in those fields. For example, I've gotten all kinds of incorrect tax advice from CPAs. Sometimes ChatGPT is out of date, but it's generally pretty accurate around taxes ime, especially if I have it search to verify things.
Comment by skywhopper 8 hours ago
Comment by haar 7 hours ago
Comment by mat_b 14 hours ago
"Let us handle all your internet traffic.. you can trust us.. we're free!"
No thank you.
Comment by akimbostrawman 8 hours ago
Meanwhile reputable VPN provider like mullvad offer there service without KYC and leave feds empty handed when they knock on there doors.
https://mullvad.net/en/blog/mullvad-vpn-was-subject-to-a-sea...
Comment by Joker_vD 13 hours ago
That's why TLS exists, after all. All Internet traffic is wiretapped.
Comment by 1718627440 9 hours ago
Comment by Dylan16807 12 hours ago
> That's why TLS exists, after all.
That protects you if you're using standard methods to connect. Installed software gets to bypass it.
Comment by psychoslave 5 hours ago
Maybe some
Comment by Joker_vD 10 hours ago
But it's cumbersome.
Comment by silverwind 8 hours ago
Comment by bluepuma77 10 hours ago
> "Let us handle all your internet traffic.. you can trust us.. []"
TLS does not help, when most Internet traffic is passed through a single entity, which by default will use an edge TLS certificate and re-encrypt all data passing through, so will have decrypted plain text visibility to all data transmitted.
Comment by gkbrk 9 hours ago
Comment by Joker_vD 9 hours ago
Comment by nrhrjrjrjtntbt 12 hours ago
Comment by SamDc73 12 hours ago
but other than that I would never trust anything other than Mullvad/IVPN/ProtonVPN
Comment by lodovic 11 hours ago
VPNs are just one example. How many chrome extensions do you have that you don't use all the time, like adblockers, cookie consent form handlers or dark mode?
Comment by fragmede 13 hours ago
Comment by Egor3f 13 hours ago
Comment by bsaul 13 hours ago
Comment by bandrami 13 hours ago
Comment by notpushkin 12 hours ago
But considering those are browser extensions, I think they can just inspect any traffic they want on the client side (if they can get such broad permissions approved, which is probably not too hard).
Comment by 2bird3 14 hours ago
[1] https://secureannex.com/blog/cyberhaven-extension-compromise.... [2] https://secureannex.com/blog/sclpfybn-moneitization-scheme/ (referenced in the article)
Comment by bennydog224 15 hours ago
There has to be a better system. Maybe a public extension safety directory?
Comment by yetanotherjosh 2 hours ago
Comment by johncolanduoni 13 hours ago
Comment by bennydog224 3 hours ago
Comment by H8crilA 15 hours ago
Comment by Liquix 15 hours ago
Comment by Legend2440 14 hours ago
Comment by anonym29 14 hours ago
Comment by charcircuit 12 hours ago
Additionally, Brave a chromium based browser has adblocking built into the browser itself meaning it is not affected by webextention changes and does not require trusting an additional 3rd party.
Comment by ozgrakkurt 10 hours ago
Comment by bennydog224 14 hours ago
Comment by est 15 hours ago
Comment by bennydog224 15 hours ago
Comment by bandrami 13 hours ago
Comment by bennydog224 3 hours ago
Comment by wnevets 14 hours ago
Comment by adrr 13 hours ago
Comment by g947o 12 hours ago
I do think security researchers would be able to figure out what scripts are downloaded and run.
Regardless, none of this seems to matter to end users whether the script is in the extension or external.
Comment by johncolanduoni 8 hours ago
Comment by reddozen 11 hours ago
Comment by creatonez 10 hours ago
If so, I feel like something that limited is hardly even a browser extension interface in the traditional sense.
Comment by johncolanduoni 8 hours ago
Comment by moi2388 8 hours ago
So you can still do everything you could before, but it’s not as hidden anymore
Comment by tlogan 14 hours ago
Comment by PeterHolzwarth 14 hours ago
Comment by johncolanduoni 13 hours ago
Comment by CafeRacer 13 hours ago
Comment by droopyEyelids 13 hours ago
Comment by why-o-why 14 hours ago
Comment by varenc 14 hours ago
Comment by stevenjgarner 13 hours ago
Comment by AznHisoka 6 hours ago
Comment by QuadrupleA 14 hours ago
In much of the physical world thankfully there's laws and pretty-effective enforcement against people clubbing you on the head and taking your stuff, retail stores selling fake products and empty boxes, etc.
But the tech world is this ever-boiling global cauldron of intangible software processes and code - hard to get a handle on what to even regulate. Wish people would just be decent to each other, and that that would be culturally valued over materialism and moneymaking by any possible means. Perhaps it'll make a comeback.
Comment by rkagerer 14 hours ago
I spend a lot of time trying to think of concrete ways to improve the situation, and would love to hear people's ideas. Instinctively I tend to agree it largely comes down to treating your users like human beings.
Comment by therobots927 13 hours ago
Get as off-grid as you possibly can. Try to make your everyday use of technology as deterministic as possible. The free market punishes anyone who “respects their users”. Your best bet is some type of tech co-op funded partially by a billionaire who decided to be nice one day.
Comment by pksebben 12 hours ago
Part of the problem has been that there's a mountain to climb vis a vis that extra ten miles to take something that 'works for me' and turn it into 'gramps can install this and it doesn't trigger his alopecia'.
Rather, that was the problem. If you're looking for a use case for LLMs, look no further. We do actually have the capacity to build user-friendly stuff at a fraction of the time cost that we used to.
We can make the world a better place if we actually give a shit. Make things out in the open, for free, that benefit people who aren't in tech. Chip away at the monopolies by offering a competitive service because it's the right thing to do and history will vindicate you instead of trying to squeeze a buck out of each and every thing.
I'm not saying "don't do a thing for money". You need to do that. We all need to do that. But instead of your next binge watch or fiftieth foray into Zandronum on brutal difficulty, maybe badger your llm to do all the UX/UI tweaks you could never be assed to do for that app you made that one time, so real people can use it. I'm dead certain that there are folks reading this now who have VPN or privacy solutions they've cooked up that don't steal all your data and aren't going to cost you an arm and a leg. At the very least, someone reading this has a network plugin that can sniff for exfiltrated data to known compromised networks (including data brokers) - it's probably just finicky to install, highly technical, and delicate outside of your machine. Tell claude to package that shit so larry luddite can install it and reap the benefits without learning what a bash is or how to emacs.
Comment by jacquesm 14 hours ago
Comment by yoan9224 6 hours ago
The scary part is these extensions had Google's "Featured" badge. Manual review clearly isn't enough when companies can update code post-approval. We need continuous monitoring, not just one-time vetting.
For anyone building privacy-focused tools: making your data collection transparent and your business model clear upfront is the only way to build trust. Users are getting savvier about this.
Comment by throw310822 13 hours ago
Comment by banku_brougham 12 hours ago
Comment by onion2k 12 hours ago
Comment by Leptonmaniac 12 hours ago
Comment by omnicognate 12 hours ago
Comment by XorNot 12 hours ago
Brave New World was apathy: the system was comfortable, Soma was freely available and there was a whole system to give disruptive elements comfortable but non disruptive engagement.
The protagonist in Brave New World spends a lot of time resenting the system but really he just resents his deformity, wanted what it denied him in society, and had no real higher criticisms of it beyond what he felt he couldn't have.
Comment by omnicognate 11 hours ago
You might even imagine 1984's society evolving into Brave New World's as the mechanisms of oppression are gradually refined. Indeed, Aldous Huxley himself suggested as much in a letter to Orwell [1].
[1] https://gizmodo.com/read-aldous-huxleys-review-of-1984-he-se...
Comment by Terr_ 12 hours ago
Bonus points if the government agency can leave most of the work to an ostensibly separate private company, while maintaining a "mutual understanding" of government favors for access.
Comment by vasco 12 hours ago
Comment by GaryBluto 12 hours ago
Comment by chhxdjsj 10 hours ago
Comment by talhof8 2 hours ago
Comment by hnbad 7 hours ago
Comment by chhxdjsj 9 hours ago
Comment by antipaul 3 hours ago
Remember FaceBook x Onavo?
"Facebook used a Virtual Private Network (VPN) application it acquired, called Onavo Protect, as a surveillance tool to monitor user activity on competing apps and websites"
Comment by smallerfish 6 hours ago
Comment by yalogin 4 hours ago
Comment by estimator7292 4 hours ago
Comment by mjmas 12 hours ago
Or that the review happened before the code harvested all the LLM conversations and never got reviewed after it was updated.
Comment by growt 12 hours ago
Comment by Rakshath_1 4 hours ago
Comment by jukkat 1 hour ago
Comment by hexagonwin 12 hours ago
Comment by Agraillo 8 hours ago
A review page [2] mentions that this add-on is a peer-to-peer vpn, not having its own dedicated servers that already makes it suspicious.
[1] https://web.archive.org/web/20250126133131/https://addons.mo...
Comment by free_bip 15 hours ago
Comment by pyrolistical 14 hours ago
Comment by x-complexity 14 hours ago
That can be circumnavigated by bundling the conversations into one POST to an API endpoint, along with a few hundred calls to several dummy endpoints to muddy the waters. Bonus points if you can make it look like an normal-passing update script.
It'll still show up in the end, but at this point your main goal is to delay the discovery as much as you can.
Comment by g947o 12 hours ago
Comment by phkahler 7 hours ago
Sometimes knowing tech makes us think we're somehow better and can bypass high level wisdom.
Comment by sothatsit 6 hours ago
> We asked Wings, our agentic-AI risk engine, to scan for browser extensions with the capability to read and exfiltrate conversations from AI chat platforms.
Comment by kvam 11 hours ago
The island states have been dethroned.
Comment by miladyincontrol 15 hours ago
With those extensions the user's data and internet are the product, most if not all are also selling residential IP access for scrapers, bots, etc.
Good thing Google is protecting users by taking down such harmful extensions as ublock origin instead.
Comment by SoftTalker 15 hours ago
Comment by fylo 14 hours ago
Comment by Retr0id 14 hours ago
Comment by DrewADesign 14 hours ago
Comment by bandrami 13 hours ago
Comment by AznHisoka 6 hours ago
Articles like this do a decent job of bringing awareness, but we all know Google will do absolutely nothing
Comment by jmward01 3 hours ago
Comment by nwellinghoff 10 hours ago
Could one just feed the extension and a good prompt to claude to do this? Seems like automation CAN sniff this kind of stuff out pretty easily.
Comment by dgellow 9 hours ago
Comment by AznHisoka 6 hours ago
Think: is my brand getting mentioned more in AI chats? Are people associating positive or negative feelings towards it? Are more people asking about this topic lately?
Comment by pxtail 8 hours ago
Comment by daniel_iversen 13 hours ago
Comment by nottorp 8 hours ago
Or you mean the web sites packed with a copy of chromium?
Comment by deepfriedbits 13 hours ago
Comment by raincole 10 hours ago
Comment by metaphorproj 10 hours ago
Comment by xeeeeeeeeeeenu 9 hours ago
They take a 5.5% fee whenever you buy credits. There's also a discount for opting-in to share your prompts for training.
Comment by jrochkind1 14 hours ago
Comment by matt3210 11 hours ago
Comment by tasuki 11 hours ago
> The thought didn't let go. As a security researcher, I have the tools to answer that question.
What huh, no you don't! As a security researcher you should know better!
Comment by tasuki 10 hours ago
No. When you want to increase your security, you install fewer tools.
Each tool increases your exposure. Why is the security industry full of people who don't get this?
Comment by ericand 11 hours ago
Comment by drnick1 13 hours ago
Trusting Google with your privacy is like putting the fox in charge of the henhouse.
Comment by torginus 9 hours ago
How is it possible to have extensions this egregiously malicious in the new system?
Comment by 4ndrewl 10 hours ago
If you really are a security researcher then that's not true. You already know all this.
Comment by dguido 13 hours ago
Comment by bluepuma77 9 hours ago
Comment by meindnoch 7 hours ago
Comment by cmiles8 5 hours ago
Comment by netbioserror 15 hours ago
Comment by andersa 15 hours ago
Comment by cluckindan 14 hours ago
Comment by temp0826 14 hours ago
(for firefox/derivatives anyways...)
Comment by matheusmoreira 14 hours ago
Comment by eszed 13 hours ago
Comment by 2OEH8eoCRo0 2 hours ago
Comment by notjonheyman 14 hours ago
Comment by Oarch 14 hours ago
Comment by lodovic 11 hours ago
Comment by automatedideas 12 hours ago
“I know, let’s have an AI do all the work for us instead. Let’s take a coffee break.”
Comment by free_bip 13 hours ago
Comment by saretup 11 hours ago
Comment by ArtRichards 10 hours ago
Comment by Dylan16807 12 hours ago
70 thousand users on what I would actually call "privacy" extensions.
Bit of a misleading title then.
Comment by RataNova 8 hours ago
Comment by lionkor 2 hours ago
I hate to be that guy, but I am having a difficult time verifying any of this. How likely is it that this is entirely hallucinated? Can anyone independently verify this?
Comment by cryptoegorophy 3 hours ago
Comment by andsoitis 12 hours ago
If you are not paying for the product, you are the product.
Comment by frm88 5 hours ago
Comment by danielfalbo 9 hours ago
Comment by msdgfkjsfg 7 hours ago
Comment by msdgfkjsfg 7 hours ago
Comment by awaymazdacx5 13 hours ago
And um, a boy and a girl.
...
Anyway, the thing was that one day they started acting kinda funny. Kinda, weird.
They started being seen exchanging tokens of affection.
And it was rumoured they were engaging in...
Comment by hnbad 7 hours ago
If Urban VPN is indeed closely affiliated with the data broker, a GDPR fine might also affect that company too given how these fines work. There is a high bar for the kind of misconduct that would result in a fine but it seems plausible that they're being knowingly and deliberately deceptive and engaging in widespread data collection that is intentionally invasive and covert. That would be a textbook example for the kind of behavior the GDPR is meant to target with fines.
The same likely applies to the other extensions mentioned in the article. Yes, "if the product is free, you are the product" but that is exactly why the GDPR exists. The problem isn't that they're harvesting user data but that they're being intentionally deceptive and misleading in their statements about this, claim they are using consent as the legal basis without having obtained it[0], and they're explicitly contradicting themselves in their claims ("we're not collecting sensitive information that would need special consideration but if we do we make sure to find it and remove it before sharing your information but don't worry because it's mostly used in aggregate except when it isn't"). Just because you except some bruising when picking up martial arts as a hobby doesn't mean your sparring partner gets to pummel your face in when you're already knocked out.
[0]: Because "consent" seems to be a hard concept for some people to grasp: it's literally analogous to what you'd want to establish before having sex with someone (though to be fair: the laws are much more lenient about unclear consent for sex because it's less reasonable to expect it to be documented with a paper trail like you can easily do for software). I'll try to keep it SFW but my place of work is not your place of work so think carefully if you want to copy this into your next Powerpoint presentation.
Does your prospective sexual partner have any reason to strongly believe that they can't refuse your advances because doing so would limit their access to something else (e.g. you took them on a date in your car and they can't afford a taxi/uber and public transport isn't available so they rely on you to get back home, aka "the implication")? Then they can't give you voluntary consent because you're (intentionally or not) pressuring them into it. The same goes if you make it much harder for them to refuse than to agree (I can't think of a sex analogy for this because this seems obvious in direct human interactions but somehow some people still think hiding "reject all non-essential" is an option you are allowed to hide between two more steps when the "accept all" button is right there even if the law explicitly prohibits these shenanigans).
Is your prospective sexual partner underage or do they appear extremely naive (e.g. you suspect they've never had any sex ed and don't know what having sex might entail or the risks involved like pregnancy, STIs or, depending on the acts, potential injuries)? Then they probably can't give you informed consent because they don't fully understand what they're consenting to. For data processing this would be failure to disclose the nature of the collection/processing/storage that's about to happen. And no, throwing the entire 100 page privacy policy at them with a consent dialog at the start hardly counts the same way throwing a biology textbook at a minor doesn't make them able to consent.
Is your prospective sexual partner giving you mixed signals but seems to be generally okay with the idea of "taking things further"? Then you're still missing specific consent and better take things one step at a time checking in on them if they're still comfortable with the direction you're taking things before you decide to raw dog their butt (even if they might turn out to be into that). Or in software terms, it's probably better to limit the things you seek consent for to what's currently happening for the user (e.g. a checkbox on a contact form that informs them what you actually intend to do with that data specifically) rather than try to get it all in one big consent modal at the start - this also comes with the advantage that you can directly demonstrate when and how the specific consent relevant to that data was obtained when later having to justify how that data was used in case something goes wrong.
Is your now-active sexual partner in a position where they can no longer tell you to stop (e.g. because they're tied up and ball-gagged)? Then the consent you did obtain isn't revokable (and thus again invalid) because they need to be able to opt out (this is what "safe words" are for and why your dentist tells you to raise your hand where they can see it if you need them to stop during a procedure - given that it's hard to talk with someone's hands in your mouth). In software this means withdrawing consent (or "opting out") should be as easy as it was to give it in the first place - an easy solution is having a "privacy settings" screen easily accessible in the same place as the privacy policy and other mandatory information that at the very least covers everything you stuffed in that consent dialog I told you not to use, as well as anything you tucked away in other forms downstream. This also gives you a nice place to link to at every opportunity to keep your user at ease and relaxed to make the journey more enjoyable for both of you.
Comment by deaux 4 hours ago
Comment by jsrozner 11 hours ago
(Yes it really is AI-written / AI-assisted. If your AI detectors don’t go off when you read it you need to be retrained.)
Comment by hathym 12 hours ago
Comment by tlogan 14 hours ago
Comment by cycomanic 14 hours ago
Comment by atmosx 14 hours ago
There are honest ways to make a living. In this case honest is “being transparent” about the way data is handled instead of using newspeak.
Comment by jrochkind1 14 hours ago
Comment by brikym 10 hours ago