Or maybe only install extensions from trusted
sourcesdevelopers.To be specific: from trusted developers. Installing them only from the official repository (is it still possible to reasonably install them any other way?) won’t help if a dev sells such an addon. On the other hand I cannot imagine someone like Raymond Hill (the uBlock Origin dev) doing it, considering his track record.
Yeah, that’s what I meant.
Firefox will disable extensions in private mode if you want to
deleted by creator
Exactly why most enterprise organizations disable them. You should too if you’re doing anything sensitive data.
That’s why on my work PC I use a completely vanilla Firefox, gotta live with the ads. But I’m not risking giving full access to website content to any extension
To add to the blog post, if you use user scripts, utilize your manager’s blacklist and learn REGEX.
If needed, use Group Policy, Regedit or .plists on macOS to blacklist domains to prevent an extension from running on them. As an example, I use Shutup.css to block comments online, but on something like Lemmy, I want to see comments as that’s primarily how content is created and adding it to my extension domain blacklist prevents the extension from running on the website or any lemmy domains.
I think i remember a post not to far back with a similar topic. Not sure if it was from the developer of the hooverzoom extension itself, but it definitly referenced some offers they collected.
edit: just noticed, that the article also references the offers (ref. https://github.com/extesy/hoverzoom/discussions/670 )
I thought my ISP already had this data and is selling it. Should I go make sure all my extensions are 100% kosher?
It’s interesting to read as I never thought about the vulnerability these extensions are.
I guess you should limit the number of extensions you have.