51 Matching Annotations
  1. Apr 2026
    1. Some privacy related extensions may cause issues on x.com.

      这句话暗示了隐私保护工具与主流社交平台之间的潜在冲突。这反映了数字隐私与平台商业利益之间的张力。用户安装隐私扩展通常是为了保护数据不被收集,但平台可能将这些工具视为干扰其数据收集和分析的障碍。这种冲突预示着未来网络环境中隐私保护与平台功能之间的持续博弈。

    1. Some privacy related extensions may cause issues on x.com.

      这句话暗示了隐私保护工具与主流网站服务之间的潜在冲突。这反映了数字时代的一个核心矛盾:用户想要保护自己的隐私,而平台则需要收集数据来提供个性化服务。这种冲突可能导致用户在隐私和便利性之间做出艰难选择。

    1. Some privacy related extensions may cause issues on x.com.

      这是一个令人惊讶的声明,暗示社交媒体平台可能主动阻止用户使用隐私保护工具。这可能表明X平台的数据收集策略与用户隐私保护之间存在根本冲突,值得深入研究其商业模式与用户权利的平衡问题。

    1. Some privacy related extensions may cause issues on x.com.

      这是一个令人深思的矛盾点:本应保护用户隐私的浏览器扩展反而可能导致平台功能失效。这暗示了X(前Twitter)的某些功能可能依赖于数据收集,与用户隐私保护存在根本性冲突,反映了数字服务中隐私与功能的持续博弈。

    1. Some privacy related extensions may cause issues on x.com.

      这句话暗示了一个令人深思的悖论:用户安装隐私保护工具(如广告拦截器、隐私增强扩展)来保护自己的数据,但这些工具反而可能阻止他们访问平台。这揭示了平台利益与用户隐私保护之间的冲突,以及现代互联网服务对用户数据的依赖程度。

  2. Feb 2025
  3. May 2024
  4. Jan 2023
  5. Nov 2022
  6. Aug 2022
  7. Jun 2022
  8. May 2022
  9. Mar 2022
  10. Feb 2022
  11. May 2021
    1. The NoScript extension for Firefox mitigates CSRF threats by distinguishing trusted from untrusted sites, and removing authentication & payloads from POST requests sent by untrusted sites to trusted ones. The Application Boundary Enforcer module in NoScript also blocks requests sent from internet pages to local sites (e.g. localhost), preventing CSRF attacks on local services (such as uTorrent) or routers.
  12. Apr 2021
  13. Feb 2021
  14. Jan 2021
  15. Dec 2020
    1. website developers and extension authors

      Like, for example, Google having a problem with ad-blockers in Google Chrome. This is an example of why monopolies aren't great; Google makes money selling ads but they also control a browser that most people use. There's a conflict here when the users of the browser install extensions that limit Google's ability to show you ads.

  16. Jul 2020
  17. May 2020
    1. 1. Disabling concrete extension update. That's what I wanted! You can do this by editing the extensions manifest json-file on Windows: C:\Users\<USERNAME>\AppData\Local\Google\Chrome\User Data\Default\Extensions\<EXTENSION-ID>\<VERSION>\manifest.json (find out the extensions ID by enabling developer mode in the extension settings page) on Ubuntu for Chromium: ${HOME}/.config/chromium/Default/Preferences In this file set "update_url" property to something invalid like "https://localhost" for example. For now according to given url updating of that extension is simply impossible.
  18. Apr 2020
  19. Mar 2020
  20. Jan 2020
  21. Dec 2019
  22. Nov 2019
  23. Oct 2019
  24. Aug 2017
    1. 6.2 Extension IDs Each extension has an extension ID that follows the browserext:// protocol. For example browserext://MyExtension_c1wakc4j0nefm/options.html browserext://dfcijpibodeoenkablikbkiobbdnkfki/options.html The algorithms that generate these IDs are different for each browser. To access these resources, do not hardcode the ID generated by a particular browser. Instead, use the runtime.getURL() method to convert a relative file name or path to the absolute name or path, which includes the extension ID.

      Vivaldi, as you know, I love your browser and use it primary and multiple times a day, despite it's quirks deviating from Chrome.

      Having said this, can we eliminate the generated file names for extensions, screenshots, and notes?

  25. Aug 2015
    1. When we first set out to identify malicious extensionsour expectation was to find banking trojans and pass-word stealers that duplicated the strategies pioneered byZeus and SpyEye. In practice, the abusive extensionecosystem is drastically different from malicious bina-ries. Monetization hinges on direct or indirect relation-ships with syndicated search partners and ad injection af-filiate programs, some of which earn millions of dollarsfrom infected users [37]. Miscreants derive wealth fromtrafficanduser targetingrather than the computing re-sources or privileged access mediated via the browser. Itmay simply be that the authors of malicious binaries havelittle incentive (or external pressure) to change, leavingextensions to a distinct set of actors. This uncertainty isa strong motivation for exploring the extension ecosys-tem further.

      This is the section that identifies the motives and economics around malicious extensions