frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Children with cancer scammed out of millions fundraised for their treatment

https://www.bbc.com/news/articles/ckgz318y8elo
148•1659447091•3h ago•86 comments

SHARP, an approach to photorealistic view synthesis from a single image

https://apple.github.io/ml-sharp/
284•dvrp•5h ago•58 comments

A linear-time alternative for Dimensionality Reduction and fast visualisation

https://medium.com/@roman.f/a-linear-time-alternative-to-t-sne-for-dimensionality-reduction-and-f...
48•romanfll•2h ago•8 comments

The biggest heat pumps in the world

https://www.bbc.com/news/articles/c17p44w87rno
16•rayhaanj•1h ago•5 comments

Erdős Problem #1026

https://terrytao.wordpress.com/2025/12/08/the-story-of-erdos-problem-126/
77•tzury•4h ago•7 comments

Quill OS: An open-source OS for Kobo's eReaders

https://quill-os.org/
258•Curiositry•8h ago•81 comments

Bonsai: A Voxel Engine, from scratch

https://github.com/scallyw4g/bonsai
38•jesse__•3h ago•4 comments

JetBlue flight averts mid-air collision with US Air Force jet

https://www.reuters.com/world/americas/jetblue-flight-averts-mid-air-collision-with-us-air-force-...
250•divbzero•10h ago•139 comments

O'saasy License Agreement

https://osaasy.dev/
31•d3w1tt•2h ago•28 comments

8M users' AI conversations sold for profit by "privacy" extensions

https://www.koi.ai/blog/urban-vpn-browser-extension-ai-conversations-data-collection
455•takira•6h ago•143 comments

Creating C closures from Lua closures

https://lowkpro.com/blog/creating-c-closures-from-lua-closures.html
24•publicdebates•4d ago•2 comments

Native vs. emulation: World of Warcraft game performance on Snapdragon X Elite

https://rkblog.dev/posts/pc-hardware/pc-on-arm/x86_versus_arm_native_game/
74•geekman7473•9h ago•27 comments

“Are you the one?” is free money

https://blog.owenlacey.dev/posts/are-you-the-one-is-free-money/
328•samwho•4d ago•61 comments

7 Years, 2 Rebuilds, 40K+ Stars: Milvus Recap and Roadmap

https://milvus.io/blog/milvus-exceeds-40k-github-stars.md
13•Fendy•5d ago•3 comments

Mark V Shaney

https://en.wikipedia.org/wiki/Mark_V._Shaney
8•djoldman•4d ago•1 comments

Economics of Orbital vs. Terrestrial Data Centers

https://andrewmccalip.com/space-datacenters
109•flinner•11h ago•160 comments

Show HN: I designed my own 3D printer motherboard

https://github.com/KaiPereira/Cheetah-MX4-Mini
61•kaipereira•1w ago•14 comments

Essential Semiconductor Physics [pdf]

https://nanohub.org/resources/43623/download/Essential_Semiconductor_Physics.pdf
183•akshatjiwan•2d ago•7 comments

Rollstack (YC W23) is hiring multiple software engineers (TypeScript) US/Canada

https://www.ycombinator.com/companies/rollstack-2/jobs/QPqpb1n-software-engineer-typescript-us-ca...
1•yjallouli•7h ago

Umbrel – Personal Cloud

https://umbrel.com
183•oldfuture•13h ago•98 comments

Chafa: Terminal Graphics for the 21st Century

https://hpjansson.org/chafa/
158•birdculture•15h ago•24 comments

The Bob Dylan concert for just one person

https://www.flaggingdown.com/p/the-bob-dylan-concert-for-just-one
82•NaOH•9h ago•18 comments

Light intensity steers molecular assemblies into 1D, 2D or 3D structures

https://phys.org/news/2025-11-intensity-molecular-1d-2d-3d.html
24•PaulHoule•5d ago•3 comments

In Defense of Matlab Code

https://runmat.org/blog/in-defense-of-matlab-whiteboard-style-code
119•finbarr1987•3d ago•125 comments

Nature's many attempts to evolve a Nostr

https://newsletter.squishy.computer/p/natures-many-attempts-to-evolve-a
183•fiatjaf•5d ago•116 comments

The appropriate amount of effort is zero

https://expandingawareness.org/blog/the-appropriate-amount-of-effort-is-zero/
120•gmays•13h ago•70 comments

Understanding carriage

https://seths.blog/2025/12/understanding-carriage/
50•herbertl•5d ago•11 comments

A kernel bug froze my machine: Debugging an async-profiler deadlock

https://questdb.com/blog/async-profiler-kernel-bug/
94•bluestreak•12h ago•16 comments

Secret Documents Show Pepsi and Walmart Colluded to Raise Food Prices

https://www.thebignewsletter.com/p/secret-documents-show-pepsi-and-walmart
400•connor11528•11h ago•99 comments

Ford kills the All-Electric F-150

https://www.wired.com/story/ford-kills-electric-f-150-lightning-for-hybrid/
345•sacred-rat•11h ago•554 comments
Open in hackernews

8M users' AI conversations sold for profit by "privacy" extensions

https://www.koi.ai/blog/urban-vpn-browser-extension-ai-conversations-data-collection
453•takira•6h ago

Comments

miladyincontrol•5h ago
Oh, a free of cost vpn extension that requires access to all sites and data is somehow spyware, color me surprised.

With those extensions the user's data and internet are the product, most if not all are also selling residential IP access for scrapers, bots, etc.

Good thing Google is protecting users by taking down such harmful extensions as ublock origin instead.

SoftTalker•5h ago
ublock requires access to all sites and data. Maybe they are trustworthy but who really knows?
fylo•5h ago
Let's say we don't trust ublock. At the very least it is still blocking ad networks which do reduce internet performance and are vectors of exploitation, so it is still adding value whether you trust it or not.
Retr0id•5h ago
Under the hypothetical that we don't trust ublock, it would be foolish to grant it full access to all data on all websites. It would not be adding value.
DrewADesign•5h ago
Yeah — they’d be selling enhanced versions of that data to every site they blocked, and then some. I very much doubt they are.
bandrami•3h ago
I mean, I don't trust ublock, for what it's worth. I just disable javascript by default with has pretty much the same effect.
netbioserror•5h ago
I treat extensions like they're all capable of privileged local code execution. My selection is very vetted and very small.
andersa•5h ago
The only extensions I have installed are dark reader and ublock origin. Would be nice if I could disable auto updating for them somehow and run local pinned versions...
cluckindan•5h ago
Get the source code and manually pack your own unsigned web-ext’s.
temp0826•5h ago
Add-ons Manager -> (click the add-on in question) -> change "Allow automatic updates" to "Off"

(for firefox/derivatives anyways...)

matheusmoreira•5h ago
Same here, uBlock Origin and EFF's Privacy Badger are the only extensions I trust enough to install.
eszed•4h ago
Ditto, plus 1pass / BitWarden.
bennydog224•5h ago
Google needs to act on removing these extensions/doing more thorough code reviews. Reputability is everything, and they can be actually valuable (e.g. LastPass, my own extension Ward)

There has to be a better system. Maybe a public extension safety directory?

H8crilA•5h ago
Do you think Google wants to have the extensions system, given that this is how people block ads?
Liquix•5h ago
adblockers on chromium-based browsers were severely crippled by manifest V3. they're fine with extenisons (and apparently malware) as long as users can't effectively block their tracking/ads.
Legend2440•5h ago
Adblockers are still working fine though? I’m on chrome with ublock and I’m not seeing any ads.
anonym29•5h ago
you're not using ublock, you're using ublock lite. it cannot do dynamic filtering, script blocking, or url parameter removal, among other limitations.
charcircuit•2h ago
Why does that matter if he's not seeing ads. A severely crippled adblocker means that you would see ads during regular usage.

Additionally, Brave a chromium based browser has adblocking built into the browser itself meaning it is not affected by webextention changes and does not require trusting an additional 3rd party.

ozgrakkurt•1h ago
Tracking is also very important. Blocking scripts is very useful
bennydog224•5h ago
I wouldn’t be surprised if it goes away - it’s very “old Google”. We’re moving more towards walled gardens.
est•5h ago
Google is doing code review on extensions?
bennydog224•5h ago
I’m not sure, but whenever I cut a new release I upload my extension code and it goes through a review period before they publish.
johncolanduoni•4h ago
I’m not sure there’s much more juice to squeeze here via automated or semi-automated means. They could perhaps be doing these kind of human-in-the-loop reviews themselves for all extensions that hit a certain install count, but that’s not a popular technique at Google.
bandrami•3h ago
Is this even a problem that code review could find? Once they have your conversation data what happens then isn't part of the plug-in.
free_bip•5h ago
Is the use of WebAssembly going to make spotting these malicious extensions harder?
pyrolistical•5h ago
Probably not. All side effects need to go through the js side. So you can alway see where http calls are made
x-complexity•5h ago
> Probably not. All side effects need to go through the js side. So you can alway see where http calls are made

That can be circumnavigated by bundling the conversations into one POST to an API endpoint, along with a few hundred calls to several dummy endpoints to muddy the waters. Bonus points if you can make it look like an normal-passing update script.

It'll still show up in the end, but at this point your main goal is to delay the discovery as much as you can.

g947o•3h ago
As soon as you hijack the fetch function (which cannot be done with WebAssembly alone), it's going to look suspicious, and someone who looks at this carefully enough will flag it.
notjonheyman•5h ago
From my experience, Google does not do a thorough app review. Reviewers get maybe a few minutes to review and move on due to the volume of apps awaiting review.
Oarch•4h ago
I imagine this would be a great use case for AI helping out?
free_bip•4h ago
No way that could backfire... Prompt injection is a solved problem right?
automatedideas•3h ago
“There’s too much human harmful code to review and too few human reviewers.”

“I know, let’s have an AI do all the work for us instead. Let’s take a coffee break.”

lodovic•2h ago
I'm thinking of installing the extension in a sandbox and then use a local agent to have endless fake conversations with it
umrashrf•5h ago
I am surprised because google review team rejects half of my extensions and apps.

Sometimes things don't make sense to me, like how "Uber Driver app access background location and there is no way to change that from settings" - https://developer.apple.com/forums/thread/783227

marcellus23•5h ago
I think what's going on there is that "While using" includes when a navigation app is running in the background, which is visible to the user (via e.g. a blue status bar pill). "Always" allows access even when it's not clear to the user that an app is running.

The developer documentation is actually pretty clear about this: https://developer.apple.com/documentation/bundleresources/ch...

qwertox•1h ago
If Google would care at all for their users, they'd tell WhatsApp to not require the use of the Contacts permission only to add names to numbers when you don't share the Contacts with the App.

Or they'd tell WhatsApp to allow granting microphone permissions for one single call, instead of requesting permanent microphone permissions. All apps that I know of respect the flow of "Ask every time", all but Meta's app.

Google just doesn't care.

chmod775•5h ago
The company behind this appears to be "real" and incorporated in Delaware.

> Urban Cyber Security INC

https://opencorporates.com/companies/us_de/5136044

https://www.urbancybersec.com/about-us/

I found two addresses:

> 1007 North Orange Street 4th floor Wilmington, DE 19801 US

> 510 5th Ave 3rd floor New York, NY 10036 United States

and even a phone number: +1 917-690-8380

https://www.manhattan-nyc.com/businesses/urban-cyber-securit...

They look really legitimate on the outside, to the point that there's a fair chance they're not aware what their extension is doing. Possibly they're "victim" of this as well.

ch2026•5h ago
https://www.manhattanvirtualoffice.com/

The NY address is a virtual office.

https://themillspace.com/wilmington/

The DE address is a virtual office plus coworking facility.

azinman2•2h ago
Wow the virtual office concept is so beyond shady. I wonder if there are any legitimate uses of it?
ryanjshaw•2h ago
Many:

You run a business from home but do not want to reveal you personal address to the world.

You are from a country that Stripe doesn’t support but need to make use of their unique capabilities like Stripe Connect, then you might sign up for Stripe Atlas to incorporate in the USA so you can do business directly with Stripe. Your US business then needs a US physical address ie virtual office.

Etc

victorbjorklund•2h ago
That you don’t need an office if your company works remotely? Kind of overkill with a whole office for a company with 3 people working at it and everyone works remotely.
Mistletoe•2h ago
Amazing.
swatcoder•5h ago
> They look really legitimate on the outside

If that looks use-italics "really legitimate" to you, then you might be easily scammed. I'm not saying they're not legitimate, but nothing that you shared is a strong signal of legitimacy.

It would take a perhaps a few hundred dollars a month to maintain a business that looked exactly like this, and maybe a couple thousand to buy one that somebody else had aged ahead of time. You wouldn't have to have any actual operations. Just continuously filed corporate papers, a simple brochure website, and a couple virtual office accounts in places so dense that people don't know the virtual address sites by heart.

Old advice, but be careful believing what you encounter on the internet!

chmod775•4h ago
Don't be silly. If you wanted to sue these guys you'll have a better shot at dragging an actual person in front of a judge than for 99% of the other crap that's on the chrome web store and doesn't provide you with more than an e-mail address.

> Old advice, but be careful believing what you encounter on the internet!

Try to not be terminally cringe either?

Egor3f•4h ago
Don't be rude. "Real person" here might live in any country of the world.

And also, why extension for vpn? I live in country where almost everybody uses vpn just to watch YouTube and read twitter, and none of my friends uses some strange extensions. There are open source software for that - from real vpn like wireguard, to proxy software like nekoray/v2raytun. Browser extension is the last thing I would install to be private.

chmod775•4h ago
> Don't be rude.

What, there's an issue because I'm not being underhanded about it like that swatcoder guy?

> And also, why extension for vpn?

Why are you asking me that?

nothrabannosir•3h ago
>> Don't be rude.

> What, there's an issue because I'm not being underhanded about it like [that] guy?

Wow you’ve put something into words here I never consciously realized is an unwritten rule. Sounds silly but yea you’re 100% right; that seems to be exactly the game we play.

For better or for worse.

weird-eye-issue•4h ago
> you'll have a better shot at dragging an actual person in front of a judge than for 99% of the other crap that's on the chrome web store

Based on what? The same instinct that told you having an address and phone number makes an entity legitimate? The chance the people behind this company live in the US is incredibly low. And even if they do live in the US what exactly would they be getting charged with and who would care enough to charge them?

bix6•5h ago
Is the agent address real?

1000 N. WEST ST. STE. 1501, WILMINGTON, New Castle, DE, 19801

It almost matches this law firms address but not quite.

https://www.skjlaw.com/contact-us/

Brandywine Building 1000 N. West Street, Suite 1501 Wilmington DE 19801

weird-eye-issue•4h ago
You can get a mailing address and phone number for like $15/mo. You can incorporate a US business for only a couple hundred dollars.
Nevermark•4h ago
> Urban VPN is operated by Urban Cyber Security Inc., which is affiliated with BiScience (B.I Science (2009) Ltd.), a data broker company.

> This company has been on researchers' radar before. Security researchers Wladimir Palant and John Tuckner at Secure Annex have previously documented BiScience's data collection practices. Their research established that:

> BiScience collects clickstream data (browsing history) from millions of users Data is tied to persistent device identifiers, enabling re-identification The company provides an SDK to third-party extension developers to collect and sell user data

> BiScience sells this data through products like AdClarity and Clickstream OS

> The identical AI harvesting functionality appears in seven other extensions from the same publisher, across both Chrome and Edge:

Hmm.

> They look really legitimate on the outside

Hmm, what, no.

We have a data collection company, thriving financially on lack of privacy protections, indiscriminant collection and collating of data, connected to eight data siphoning "Violate Privacy Network" apps.

And those apps are free... Which is seriously default sketchy if you can't otherwise identify some obviously noble incentives to offer free services/candy to strangers.

Once is happenstance, twice is coincidence, three (or eight) times is enemy action.

The only thing that could possibly make this look any worse is discovering a connection to Facebook.

elisbce•4h ago
Judging from their website, all links eventually point to either the VPN extension download website, or a signup link. I'm not surprised if some nation state supported APT is behind this shit.
throw310822•2h ago
> Urban VPN is operated by Urban Cyber Security Inc., which is affiliated with BiScience (B.I Science (2009) Ltd.), a data broker company.

BiScience is an Israeli company.

thayne•2h ago
Being a real business doesn't necessarily mean they can be trusted. Real companies do shady stuff all the time.
varenc•5h ago
What is the economic value of all these AI chat logs? I can see it useful for developing advertising profile. But I wonder if it's also just sold as training data for people try to build their own models?
stevenjgarner•3h ago
Pretty easy to match up those logs with browser fingerprinting to identify the actual user. Then you have "do you want to purchase what Mr. Foo Bar is prompting the LLM?"
wnevets•5h ago
I thought manifest v3 was supposed to make chrome extensions secure?
tlogan•5h ago
Let me ask you this way: How do you think they make money?
PeterHolzwarth•4h ago
I believe you may be missing the sarcasm of the post you are responding to.
johncolanduoni•4h ago
I’m here to inform you that you perhaps missed the second-order sarcasm of the post you responded to. Hopefully the chain ends here.
CafeRacer•3h ago
I am afraid you may have missed a third order of sarcasm. It sometimes called Incepticasm.
droopyEyelids•4h ago
He may have understood it, but the feelings of anger about it are so overwhelming he had to post anyway, even if it didn't perfectly flow with the conversation.
adrr•3h ago
Its the reason why they found it because the code was in extension. Before manifest v3, extensions could just load external scripts and there's no way you could tell what they were actually doing.
g947o•3h ago
> extensions could just load external scripts and there's no way you could tell what they were actually doing.

I do think security researchers would be able to figure out what scripts are downloaded and run.

Regardless, none of this seems to matter to end users whether the script is in the extension or external.

reddozen•2h ago
nothing stopping server side logic: if request.ip != myvictim, serve no malicious payload.
creatonez•56m ago
Wait, does that mean Manifest v3 is so neutered that it can't load a `<script>` tag into the page if an extension needed to?

If so, I feel like something that limited is hardly even a browser extension interface in the traditional sense.

QuadrupleA•5h ago
So much of what's aimed at nontechnical consumers these days is full of dishonesty and abuse. Microsoft kinda turned Windows into something like this, you need OneDrive "for your protection", new telemetry and ads with every update, etc.

In much of the physical world thankfully there's laws and pretty-effective enforcement against people clubbing you on the head and taking your stuff, retail stores selling fake products and empty boxes, etc.

But the tech world is this ever-boiling global cauldron of intangible software processes and code - hard to get a handle on what to even regulate. Wish people would just be decent to each other, and that that would be culturally valued over materialism and moneymaking by any possible means. Perhaps it'll make a comeback.

rkagerer•5h ago
This was a nearly poetic way to put it. Thank you for ascribing words to a problem that equally frustrates me.

I spend a lot of time trying to think of concrete ways to improve the situation, and would love to hear people's ideas. Instinctively I tend to agree it largely comes down to treating your users like human beings.

therobots927•4h ago
The situation won’t be improved for as long as an incentive structure exists that drives the degradation of the user experience.

Get as off-grid as you possibly can. Try to make your everyday use of technology as deterministic as possible. The free market punishes anyone who “respects their users”. Your best bet is some type of tech co-op funded partially by a billionaire who decided to be nice one day.

pksebben•3h ago
We're not totally unempowered here, as folks who know how to tech. We can build open source alternatives that are as easy to use and install as the <epithet>-ware we are trying to combat.

Part of the problem has been that there's a mountain to climb vis a vis that extra ten miles to take something that 'works for me' and turn it into 'gramps can install this and it doesn't trigger his alopecia'.

Rather, that was the problem. If you're looking for a use case for LLMs, look no further. We do actually have the capacity to build user-friendly stuff at a fraction of the time cost that we used to.

We can make the world a better place if we actually give a shit. Make things out in the open, for free, that benefit people who aren't in tech. Chip away at the monopolies by offering a competitive service because it's the right thing to do and history will vindicate you instead of trying to squeeze a buck out of each and every thing.

I'm not saying "don't do a thing for money". You need to do that. We all need to do that. But instead of your next binge watch or fiftieth foray into Zandronum on brutal difficulty, maybe badger your llm to do all the UX/UI tweaks you could never be assed to do for that app you made that one time, so real people can use it. I'm dead certain that there are folks reading this now who have VPN or privacy solutions they've cooked up that don't steal all your data and aren't going to cost you an arm and a leg. At the very least, someone reading this has a network plugin that can sniff for exfiltrated data to known compromised networks (including data brokers) - it's probably just finicky to install, highly technical, and delicate outside of your machine. Tell claude to package that shit so larry luddite can install it and reap the benefits without learning what a bash is or how to emacs.

jacquesm•4h ago
And still, there is plenty of software that you can't run on anything but Windows. That's a major blocker at this point and projects like 'mono' and 'wine', while extremely impressive, are still not good enough to run that same software on Linux.
2bird3•5h ago
As someone who has witnessed BiScience tracking in the past, I am not surprised to to hear that they might be involved in all this. They came up in the past when researchers investigated the cyberhaven compromise [1][2]. Though the correlation might not all be there its kind of disappointing

[1] https://secureannex.com/blog/cyberhaven-extension-compromise.... [2] https://secureannex.com/blog/sclpfybn-moneitization-scheme/ (referenced in the article)

tlogan•5h ago
Deleted.
atmosx•5h ago
There is a “contradictions” section that clearly explains why this is a scam of the highest order.

There are honest ways to make a living. In this case honest is “being transparent” about the way data is handled instead of using newspeak.

jrochkind1•5h ago
The guy that holds up people for money in the alley is a human too, people forget, and needs to pay for food and a place to live. Of course they do too.
cycomanic•4h ago
What sort of argument is that? Just because I need to eat (also let's be real the developers/owners behind this app are not struggling to get food on the table), does excuse me doing unethical/illegal things (and this behaviour is almost certainly illegal in the EU at least).
jrochkind1•5h ago
Is this criminally prosecutable?
mat_b•4h ago
I don't understand why so many people are using / trusting VPNs

"Let us handle all your internet traffic.. you can trust us.. we're free!"

No thank you.

fragmede•4h ago
Yeah free VPN is totally a problem, but there's TLS so at least those users aren't getting their bank account information stolen.
Egor3f•4h ago
TLS works when app is installed somewhere else, but not in browser itself. Browser actually handles TLS termination.
bsaul•4h ago
Does tls means certificate pinning ? Can't a vpn alter dns queries to return a proxy website to your bank, using a forged certificate ?
bandrami•3h ago
Only if you've added a signing certificate the VPN controls to your CA chain. But at that point they don't have to do anything as complicated as you described.
notpushkin•3h ago
TLS means “there’s a certificate”. Yeah, if a VPN/proxy can forge a certificate that the user’s browser would trust, it’s an issue.

But considering those are browser extensions, I think they can just inspect any traffic they want on the client side (if they can get such broad permissions approved, which is probably not too hard).

Joker_vD•3h ago
For the same reason you trust your ISP? It handles all your internet traffic; and depending on where you live, probably has government-mandated back doors, or is willing to cooperate with arbitrary requests from law-enforcement agencies.

That's why TLS exists, after all. All Internet traffic is wiretapped.

Dylan16807•3h ago
I'd be significantly more suspicious by default of ISPs that charge no money.

> That's why TLS exists, after all.

That protects you if you're using standard methods to connect. Installed software gets to bypass it.

Joker_vD•59m ago
And that's why I, personally, rent a VPS, run "ssh -D 9010 myvps" in a background, and selectively point my browser at it via proxy.pac (other apps get socksified as needed; although some stubbornly resist it, sigh).

But it's cumbersome.

nrhrjrjrjtntbt•3h ago
TLS doesnt hide IP addresses
bluepuma77•40m ago
> I don't understand why so many people are using [Cloudflare].

> "Let us handle all your internet traffic.. you can trust us.. []"

TLS does not help, when most Internet traffic is passed through a single entity, which by default will use an edge TLS certificate and re-encrypt all data passing through, so will have decrypted plain text visibility to all data transmitted.

gkbrk•5m ago
I have a contract with my ISP, I can know who runs the company and I can sue the company if they violate anything they promised.
Joker_vD•1m ago
Yeah, and in your contract with ISP you explicitly agree to file any lawsuit against them in small claims court only. Although you can probably go and complain to FCC about them?
SamDc73•2h ago
A lot of people from poor countries where they can't access a lot of websites/services and also can't pay for a VPN use these "free" VPNs

but other than that I would never trust anything other than Mullvad/IVPN/ProtonVPN

lodovic•2h ago
The use case is people that are urged to view something that is blocked (torrent / adult / gambling). They want it now, and they don't want to get involved with some shady company that slaps on a 2 year contract and keeps extending indefinitely. These people instead find "free vpn" in the web store and decide to give it a try.

VPNs are just one example. How many chrome extensions do you have that you don't use all the time, like adblockers, cookie consent form handlers or dark mode?

why-o-why•4h ago
I'm glad the extension system isn't broken (e.g. extensions being hacked). This is just scammy extensions to begin with. I've been scared of extensions since they were first offered (I did like useing greasemonkey to customize everything back in the 2000's/2010's), but I can't resist privacy badger and Ublock Origin since they are open source (but even then it's still a risk).
daniel_iversen•4h ago
Would using native AI apps only prevent this? I think so right?
deepfriedbits•4h ago
Correct. The article is about Chrome and MS Edge browser extensions.
awaymazdacx5•4h ago
There were these two people.

And um, a boy and a girl.

...

Anyway, the thing was that one day they started acting kinda funny. Kinda, weird.

They started being seen exchanging tokens of affection.

And it was rumoured they were engaging in...

GeekyBear•4h ago
I stick to extensions that Mozilla has manually vetted as part of the Firefox recommended extensions program.

> Firefox is committed to helping protect you against third-party software that may inadvertently compromise your data – or worse – breach your privacy with malicious intent. Before an extension receives Recommended status, it undergoes rigorous technical review by staff security experts.

https://support.mozilla.org/en-US/kb/recommended-extensions-...

I know that Google hates to pay human beings, but this is an area that needs human eyes on code, not just automated scans.

Llamamoe•3h ago
> I know that Google hates to pay human beings, but this is an area that needs human eyes on code, not automated scans.

I think we need both human review and for somebody to create an antivirus engine for code that's on par with the heuristics of good AV programs.

You could probably do even better than that since you could actually execute the code, whole or piecewise, with debugging, tracing, coverage testing, fuzzing and so on.

Santosh83•3h ago
Yeah IT pros and tech aware "power" users can always take these measures but the very availability of poor or maliciously coded extensions and apps in popular app stores makes it a problem considering normies will get swayed by the swanky features the software promises and will click past all misgivings and warnings. Social engineering attacks are impossible to prevent using technical means alone. Either a critical mass of ordinary people need to become more safety/privacy conscious or general purpose computing devices will become more & more niche as the very industry which creates these problems in the first place by poor review will also sell the solution of universal thin-clients and locked down devices, of course with the very happy cooperation of govts everywhere.
Terr_•2h ago
> I stick to extensions that Mozilla has manually vetted as part of the Firefox recommended extensions program.

If you're feeling extra-paranoid, the XPI file can be unpacked (ZIP) and to check over the code for anything suspicious or unreasonably-complex, particularly if the browser-extension is supposed to be something simple like "move the up/down vote arrows further apart on HN". :P

While that doesn't solve the overall ecosystem issue, every little bit helps. You'll know it's time to run away if extensions become closed-source blobs.

dvratil•1h ago
The question is, does Mozilla rigorously review every single update of every featured extension? Or did they just vet it once, and a malicious developer may now introduce data collection or similar "features" though a minor update of the extension and keep enjoying the "recommended" badge by Mozilla?
pacifika•1h ago
This is just spreading FUD where an answer could have been provided.

> Before an extension receives Recommended status, it undergoes rigorous technical review by staff security experts.

https://support.mozilla.org/en-US/kb/recommended-extensions-...

nevon•1h ago
That link doesn't answer the question though. It states that the extension is reviewed before receiving the recommended status. It does not state that updates are reviewed.
tuetuopay•21m ago
This may also be the reason for the extension begin "Featured" on the Chrome Web Store: Google vetted it once, and didn't think about it for each update.
alfiedotwtf•53m ago
The same applies to code editor extensions!
dguido•3h ago
If you want a VPN you can trust, deploy your own with AlgoVPN: https://github.com/trailofbits/algo
bluepuma77•28m ago
I prefer WG-Easy (https://github.com/wg-easy/wg-easy), which uses a Docker container, not ansible.
throw310822•3h ago
[flagged]
banku_brougham•3h ago
I would figure state actors don’t need to go through the trouble of a browser extension. But, yeah.
onion2k•3h ago
I'm not a spy so I don't know, but surely in most scenarios it's a lot easier to just ask someone for some data than it is hack/steal it. 25 years of social media has shown that people really don't care about what they do with their data.
Leptonmaniac•3h ago
Wasn't there a comment on this phenomenon along the lines "we were so afraid of 1984 but what we really got was Brave New World"?
omnicognate•2h ago
The apathy of the oppressed is a core theme of 1984.
XorNot•2h ago
Not really? In 1984 you were made an active participant of the oppression. The thought police and 5 minutes hate all required your active, enthusiastic participation.

Brave New World was apathy: the system was comfortable, Soma was freely available and there was a whole system to give disruptive elements comfortable but non disruptive engagement.

The protagonist in Brave New World spends a lot of time resenting the system but really he just resents his deformity, wanted what it denied him in society, and had no real higher criticisms of it beyond what he felt he couldn't have.

omnicognate•1h ago
1984 has coercive elements lacking from Brave New World, but the lack of any political awareness or desire to change things among the proles was critical to the mechanisms of oppression. They were generally content with their lot, and some of the ways of ensuring that have parallels to Brave New World. Violence and hate were used more than sex and drugs but still very much as opiates of the masses: encourage and satisfy base urges to quell any desire to rebel. And sex was used to some extent: although sex was officially for procreation only, prostitution was quietly encouraged among the proles.

You might even imagine 1984's society evolving into Brave New World's as the mechanisms of oppression are gradually refined. Indeed, Aldous Huxley himself suggested as much in a letter to Orwell [1].

[1] https://gizmodo.com/read-aldous-huxleys-review-of-1984-he-se...

vasco•3h ago
Why wouldn't they? It isn't that you need to, just that obviously you would. You engage with the extension owners by sending an email from a director of a data company instead of as a captain of some military operation. The hit rate is going to be much higher with one of the strategies.
Terr_•2h ago
Huh? Of course they would: It's way less work than defeating TLS/SSL encryption or hacking into a bunch of different servers.

Bonus points if the government agency can leave most of the work to an ostensibly separate private company, while maintaining a "mutual understanding" of government favors for access.

GaryBluto•3h ago
Download Valley strikes again!
drnick1•3h ago
> A "Featured" badge from Google, meaning it had passed manual review and met what Google describes as "a high standard of user experience and design."

Trusting Google with your privacy is like putting the fox in charge of the henhouse.

Dylan16807•3h ago
8 million users on sketchy VPN extensions.

70 thousand users on what I would actually call "privacy" extensions.

Bit of a misleading title then.

mjmas•3h ago
> This means a human at Google reviewed Urban VPN Proxy and concluded it met their standards.

Or that the review happened before the code harvested all the LLM conversations and never got reviewed after it was updated.

growt•3h ago
I think this is most likely what happened. The update/review process for extensions is broken. Apparently you can add any malicious functionality after you’re in and also keep any badges and recommendations.
andsoitis•3h ago
> A free VPN promising privacy and security.

If you are not paying for the product, you are the product.

hexagonwin•2h ago
lol, this Urban VPN addon was available for Firefox too but got removed at some point. https://old.reddit.com/r/firefox/comments/1jb4ura/what_happe...
hathym•2h ago
ctrl-f israel: 1 result found
jsrozner•2h ago
TLDR: AI company uses AI to write blog post about abusive AI chrome extension

(Yes it really is AI-written / AI-assisted. If your AI detectors don’t go off when you read it you need to be retrained.)

kvam•2h ago
Some people have mentioned that this is a U.S incorporated company (Delaware). Recommend reading Moneyland by Oliver Bullough if you want to know more about the U.S role as the new shell company haven.

The island states have been dethroned.

saretup•2h ago
With hardcoded flags like “sendClaudeMessages” and “sendChatgptMessages”, they weren’t even trying to hide it.
ericand•2h ago
Can someone just AI all the privacy policies please and tell us who else is pranking?
matt3210•2h ago
What would the fallout look like if too many people start to have horror stories about how much their life is destroyed by incriminating or down right nasty or wrong ai chat history. It'll suddenly become a tool where you can't be honest. If it's not already.
tasuki•2h ago
> And then an uncomfortable thought: what if someone was reading all of this?

> The thought didn't let go. As a security researcher, I have the tools to answer that question.

What huh, no you don't! As a security researcher you should know better!

tasuki•1h ago
> Exactly the kind of tool someone installs when they want to protect themselves online.

No. When you want to increase your security, you install fewer tools.

Each tool increases your exposure. Why is the security industry full of people who don't get this?

brikym•1h ago
It's ridiculous how many comments are being removed.
ArtRichards•1h ago
Is this the same Google that is preventing us from installing unapproved software on our phones?
raincole•1h ago
Am I just paranoid or open router is the next bomb ticking to a privacy explosion? What is their business model anyway?
metaphorproj•53m ago
Note that in the profile of a model in Openrouter, under Data Policy, there is a statement as "Prompt Training". Some of model will clearly stated that prompt training is true, even for paid models.
4ndrewl•1h ago
"And then an uncomfortable thought: what if someone was reading all of this?"

If you really are a security researcher then that's not true. You already know all this.

jackfranklyn•56m ago
The permissions model for browser extensions has always been backwards. You grant full access at install time, then cross your fingers that nothing changes in an update.

What we actually need is runtime permissions that fire when the extension tries to do something suspicious - like exfiltrating data to domains that aren't related to its stated function. iOS does this reasonably well for apps. Extensions should too.

The "Recommended" badge helps but it's a bandaid. If an extension needs "read and change all data on all websites" to work, maybe it shouldn't work.

nwellinghoff•51m ago
Nice write up. It would be great if the authors could follow up with a detailed technical walk through of how to use the various tooling to figure out what an extension is really doing.

Could one just feed the extension and a good prompt to claude to do this? Seems like automation CAN sniff this kind of stuff out pretty easily.

chhxdjsj•47m ago
How did I know this was an israeli company just by how unethical they are at scale?
chhxdjsj•39m ago
And what are the odds that mossad are getting access to this data?
torginus•17m ago
Wasn't the whole coercion Google did around Manifest V3 in the name of security?

How is it possible to have extensions this egregiously malicious in the new system?

danielfalbo•15m ago
The footer animation of koi.ai is so cool.
dgellow•11m ago
Do we know for how much that type of content sells? Not that I'm interested in entering the market, but the economics of that kind of thing are always fascinating. How much are buyers willing to pay for AI conversations? I would expect the value to be pretty low