frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Chrome extensions spying on 37M users' browsing data

https://qcontinuum.substack.com/p/spying-chrome-extensions-287-extensions-495
163•qcontinuum1•3h ago•62 comments

Windows Notepad App Remote Code Execution Vulnerability

https://www.cve.org/CVERecord?id=CVE-2026-20841
428•riffraff•7h ago•247 comments

It's all a blur

https://lcamtuf.substack.com/p/its-all-a-blur
113•zdw•5d ago•17 comments

FAA closes airspace around El Paso, Texas, for 10 days, grounding all flights

https://apnews.com/article/faa-el-paso-texas-air-space-closed-1f774bdfd46f5986ff0e7003df709caa
237•EwanG•2h ago•116 comments

Show HN: AI agents play SimCity through a REST API

https://hallucinatingsplines.com
18•aed•1d ago•1 comments

Exposure Simulator

http://www.andersenimages.com/tutorials/exposure-simulator/
36•sneela•2h ago•10 comments

A Cosmic Miracle: A Remarkably Luminous Galaxy at z=14.44 Confirmed with JWST

https://astro.theoj.org/article/156033-a-cosmic-miracle-a-remarkably-luminous-galaxy-at-_z_-sub-s...
47•yread•4h ago•22 comments

Do not apologize for replying late to my email

https://ploum.net/2026-02-11-do_not_apologize_for_replying_to_my_email.html
19•validatori•2h ago•4 comments

The Feynman Lectures on Physics (1961-1964)

https://www.feynmanlectures.caltech.edu/
375•rramadass•1d ago•92 comments

The Singularity will occur on a Tuesday

https://campedersen.com/singularity
1191•ecto•20h ago•644 comments

Ex-GitHub CEO launches a new developer platform for AI agents

https://entire.io/blog/hello-entire-world/
540•meetpateltech•21h ago•499 comments

Show HN: Itsyhome – Control HomeKit from your Mac menu bar (open source)

https://itsyhome.app
29•nixus76•15h ago•28 comments

Exploring a Modern SMTPE 2110 Broadcast Truck

https://www.jeffgeerling.com/blog/2026/exploring-a-modern-smpte-2110-broadcast-truck-with-my-dad/
116•assimpleaspossi•2d ago•19 comments

Show HN: CodeMic

https://codemic.io/#hn
31•seansh•3d ago•16 comments

Visualize MySQL query execution plans as interactive FlameGraphs

https://github.com/vgrippa/myflames
14•tanelpoder•4d ago•1 comments

The Day the Telnet Died

https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/
392•pjf•15h ago•276 comments

CoLoop (YC S21) Is Hiring Ex Technical Founders in London

https://www.workatastartup.com/jobs/90016
1•mrlowlevel•6h ago

Clean-room implementation of Half-Life 2 on the Quake 1 engine

https://code.idtech.space/fn/hl2
399•klaussilveira•1d ago•81 comments

Both GCC and Clang generate strange/inefficient code

https://codingmarginalia.blogspot.com/2026/02/both-gcc-and-clang-generate.html
25•rsf•4d ago•8 comments

Fun With Pinball

https://www.funwithpinball.com/exhibits/small-boards
111•jackwilsdon•13h ago•9 comments

My eighth year as a bootstrapped founder

https://mtlynch.io/bootstrapped-founder-year-8/
267•mtlynch•3d ago•77 comments

The Little Learner: A Straight Line to Deep Learning (2023)

https://mitpress.mit.edu/9780262546379/the-little-learner/
175•AlexeyBrin•2d ago•19 comments

Signy: Signed URLs for Small Devices

https://github.com/golioth/signy
48•hasheddan•5d ago•2 comments

Simplifying Vulkan one subsystem at a time

https://www.khronos.org/blog/simplifying-vulkan-one-subsystem-at-a-time
263•amazari•1d ago•177 comments

Show HN: I taught GPT-OSS-120B to see using Google Lens and OpenCV

37•vkaufmann•7h ago•20 comments

Mathematicians disagree on the essential structure of the complex numbers (2024)

https://www.infinitelymore.xyz/p/complex-numbers-essential-structure
219•FillMaths•20h ago•288 comments

Europe's $24T Breakup with Visa and Mastercard Has Begun

https://europeanbusinessmagazine.com/business/europes-24-trillion-breakup-with-visa-and-mastercar...
1001•NewCzech•1d ago•852 comments

Willow – Protocols for an uncertain future [video]

https://fosdem.org/2026/schedule/event/CVGZAV-willow/
78•todsacerdoti•3d ago•10 comments

The Falkirk Wheel

https://www.scottishcanals.co.uk/visit/canals/visit-the-forth-clyde-canal/attractions/the-falkirk...
91•scapecast•16h ago•54 comments

Flirt: The Native Backend

https://blog.buenzli.dev/flirt-native-backend/
29•senekor•4d ago•10 comments
Open in hackernews

Chrome extensions spying on 37M users' browsing data

https://qcontinuum.substack.com/p/spying-chrome-extensions-287-extensions-495
160•qcontinuum1•3h ago

Comments

mentalgear•1h ago
Browser extensions have much looser security than you would think: any extension, even if it just claims to change a style of a website, can see your input type=password fields - it's ludicrous that access to those does not need its own permission !
sebzim4500•1h ago
It's hard to see how you would implement that, any script run within the context of the page needs access to these fields for backwards compatibility reasons, so the context script of the extension would just need to find a way of running code in the context of the page to exfiltrate the data. It could do this by adding script tags, etc.
throwaway0665•1h ago
Browsers break backwards compatibility for security all the time. Most recently Chrome made accessing devices on a local network require a permission. They completely changed the behavior of cookies. They break loads of things for cross origin isolation.
sebzim4500•1h ago
Sure, but this would break a significant portion of sign in UIs.
matheusmoreira•1h ago
And the ones that are not will probably get bought out at some point and become malware as well.

The only extension I trust enough to install on any browser is uBlock Origin.

mcjiggerlog•1h ago
I have published an extension [1] that has 100k+ users and I've probably received hundreds of emails over the years asking me to sell out in one way or another. It's honestly relentless. For that reason I also only trust uBlock Origin, Bitwarden and my own extensions.

I'd also note that all this spam is via the public email address you're forced to add to your extension listing by Google. I don't think I've ever had a single legitimate email sent to it. So yeh, thanks Google.

[1] https://chromewebstore.google.com/detail/old-reddit-redirect...

Hard_Space•1h ago
Just to say thanks for this extension, and keeping Reddit usable (at least for me).
rat9988•59m ago
Just curious how much does it sell? It gives an idea about how much my personal data is worth
mcjiggerlog•47m ago
I was just having a quick search and the only email I can find that offered a price range up front was for $0.1-0.4 per user, and that was from 2023. So I assume up to a dollar per user these days?
xnorswap•43m ago
I imagine it must be very tempting to take that bag while old reddit is still usable.

Thank you for not doing so.

mcjiggerlog•37m ago
No, fortunately in my case it's not tempting at all.

It's easy to see how many people in less advantaged positions would end up selling out, though.

cebert•1h ago
Hopefully people will start learning that you want to install as few browser extensions as possible.
probably_wrong•40m ago
My honest reaction to your comment is "What? No!".

I want to block ads, block trackers, auto-deny tracking, download videos, customize websites, keep videos playing in the background, change all instances of "car" to "cat" [1], and a whole bunch of weird stuff that probably shouldn't be included in the browser by default. Just because the browser extension system is broken it doesn't mean that extensions themselves are a problem - if anything, I wish people would install more extensions, not less.

[1] https://xkcd.com/1288/

mrweasel•7m ago
In principle I agree with you, there is just so much crap online that it's tempting to just add this one more extension to fix something.

Looking at my own installed extensions, I have a password manager, Privacy Badger and Firefox Multi-Account Containers, which I suppose is the three I really need. Then I have one that puts the RSS icon back in the address bar, because Mozilla feels that RSS is less important than having the address bar show me special dates, and two that removes very specific things: One for cookie popups and one for removing sign in with Google.

The only one of these I feel should actually be a plugin is my password manager. Privacy management (including cookies), RSS and containers could just be baked into Firefox. All of those seems more relevant to me than AI.

Maybe adding a GreaseMonkey lite could fix the rest of my problem, using code I write and control.

Pacers31Colts18•1h ago
I think the industry needs to rethink extensions in general. VSCode and browser extensions seem to have very little thorough review or thought into them. A lot of enterprises aren't managing them properly.
kgwxd•1h ago
Yo dawg...
wormpilled•49m ago
I heard you wanted spyware in your spyware
hackinthebochs•1h ago
Load extensions in developer mode so they can't silently install malware on you
singularfutur•1h ago
This is why I only run open source extensions that I can actually audit. uBlock Origin, SponsorBlock, the kind of tools where the code is available and the developer isn't anonymous. The Chrome Web Store is basically unregulated and Google doesn't care as long as they get their cut. Open source at least gives you a chance to see what you're installing before it starts exfiltrating your data to some server in a country you've never heard of.
randunel•59m ago
How do you check that the open sourced code is the same one that you are installing from the extension repository and actually running?
fn-mote•54m ago
This kind of nihilistic comment doesn’t do anything for me.

There’s always a possibility of problems along the chain. You are reducing your risk not eliminating it.

endsandmeans•48m ago
I agree but let me play the devil's advocate. I'll channel Stallman:

Same argument can be applied to all closed source software.

In the end its about who you trust and who needs to be verified and that is relative, subjective, and contextual... always.

So unless you can read the source code and compile yourself on a system you built on an OS you also built from source on a machine built before server management backdoors were built into every server... you are putting your trust somewhere and you cannot really validate it beyond wider public percetptions.

nickjj•40m ago
> How do you check that the open sourced code is the same one that you are installing from the extension repository and actually running?

Extensions are local files on disk. After installing it, you can audit it locally.

I don't know about all operating systems but on Linux they are stored as .xpi files which are zip files. You can unzip it.

On my machine they are installed to $HOME/.mozilla/firefox/52xz2p7e.default-release/extensions but I think that string in the middle could be different for everyone.

Diffing it vs what's released in its open source repo would be a quick way to see if anything has been adjusted.

insin•35m ago
CRX Viewer is handy for quickly checking what's been published:

https://robwu.nl/crxviewer/

pbhjpbhj•18m ago
I'm running Uniget on Win11 and this is my worry there. Provenance of installs vs the actually released files.
pezgrande•14m ago
I wish we had something like "source hash" available in all repositories.
mixedbit•51m ago
An extension from a trusted, non anonymous developer which is released as open source is a good signal that the extension can be trusted. But keep in mind that distribution channels for browser extensions, similarly to distribution channels for most other open source packages (pip, npm, rpm), do not provide any guarantee that the package you install and run is actually build verbatim from the code which is open sourced.
jakub_g•33m ago
Actually, npm supports "provenance" and as it eliminated long lived access tokens for publishing, it encourages people to use "trusted publishing" which over time should make majority of packages be auto-provenance-vefified.

https://docs.npmjs.com/trusted-publishers#automatic-provenan...

lapcat•24m ago
> This is why I only run open source extensions that I can actually audit.

How far does your principle extend? To your web browser too? Google Chrome itself is partly but not entirely open source. Your operating system? Only Linux? Mac and Windows include closed source.

nemomarx•14m ago
On HN of all places it's not that implausible that someone might be running Linux and Chromium or Firefox, surely?
NamlchakKhandro•12m ago
If they live in California, they're most assuredly borrowing prestige through licenced usage of apple hardware.

Because let's get real, no one ever gets a job in tech if they're not an iPhone user right?

bennydog224•14m ago
This is the safest way. You also want to disable auto update to version lock, which means using Firefox or Safari or loading unpacked if you use Chrome.
Rebuff5007•10m ago
Do you also audit every part of every car you buy or medicine you take? Or do you rely on large well-established institutions to do that for you?

"Dont trust google" imo is the wrong response here. We are at the mercy of our institutions, and if they are failing us we need mechanisms to keep them in check.

Angostura•8m ago
It’s one of the reasons I run Safari, which strictly limits what extensions can do for these reasons
PurpleRamen•1h ago
I don't really understand the complaint here. It seems for most of those extensions have it in their literal purpose to send the active URL and get additional information back, for doing something locally with it.

And why does this site has no scrollbar?? WTF, is Webdsign finally that broken?

moebrowne•34m ago
> And why does this site has no scrollbar

Seems someone decided it was a good idea to make the scrollbar tiny and basically the same colour as the background:

    scrollbar-width: thin;
    scrollbar-color: rgb(219,219,219) rgb(255,255,255);
PlatoIsADisease•1h ago
My initial solution was:

>Before installing, make each user click a checkbox what access the extension has

However, as I've seen on android, updates do happen, and you are not asked if new permissions are granted. (Maybe they do ask, but this is after an update automatically is taken place, new code is installed)

Here are the two solutions I have, neither are perfect:

>Do not let updates automatically happen for security reasons. This prevents a change in an App becoming malware, but leaves the app open to Pegasus-like exploits.

>Let updates automatically happen, but leaves you open to remote, unapproved installs.

endsandmeans•54m ago
Most of them jump out as immediately dodgy -- except Stylsh. That is the only one I've ever used on the list but it's been several years.
Cyuonut•30m ago
Stylish was sold in 2016, and has had spyware from at least 2018 on.
fusslo•30m ago
"zoom", "LibreOffice Editor", "Enhanced Image Viewer", "Video Downloader PLUS"

I guess I shouldnt be surprised on how many use "LibreOffice" or other legit company names to lend legitimacy to themselves. I'm wondering if companies like Zoom don't audit the extension store for copyright claims

I for sure used to use Video Downloader PLUS when I still used chrome (and before youtube-dl)

insin•26m ago
HN story about what Stylish was up to 7 and a bit years ago:

https://news.ycombinator.com/item?id=17447816

I'd assumed most people would have jumped ship to Stylus [1] after that, but most people probably never heard anything about what Stylish was/is doing.

[1] https://chromewebstore.google.com/detail/stylus/clngdbkpkpee...

deanc•54m ago
Over 15 years ago now, I had a popular chrome extension that did a very specific thing. I sold it for a few thousand bucks and moved on. It seemed a bit strange at the time, and I was very cautious in the sale, but sold it and moved on.

It's abundantly obvious to me now that bad actors are purchasing legitimate chrome extensions to add this functionality and earn money off the user's data (or even worse). I have seen multiple reports of this pattern.

RupertSalt•29m ago
It is a classic supply-chain attack. The same modality is used by gamers to sell off their high-level characters, and social media accounts do "switcheroos" on posts, Pages, and Groups all the time.

You know, a lot of consumer cybersecurity focuses on malware, browser security, LAN services, but I propose that the new frontier of breaches involves browser extensions, "cloud integrations", and "app access" granted from accounts.

If I gave permission for Joe Random Developer's app to read, write, and delete everything in Gmail and Google Drive, that just set me up for ransomware or worse. Without a trace on any local OS. A virus scanner will never catch such attacks. The "Security Checkup" processes are slow and arduous. I often find myself laboriously revoking access and signing out obsolete sessions, one by one by one. There has got to be a better way.

dalmo3•11m ago
Pardon the ignorance but what's being exploited by someone buying a video game character?
gilrain•27m ago
> It seemed a bit strange at the time, and I was very cautious in the sale, but sold it and moved on.

What a mensch! I wonder how many other people your payday hurt.

Forgeties79•10m ago
How were they supposed to know that was going to happen? You think they walked up and said, “Hi. I’m here to buy your software and hurt people with it”?
l72•37m ago
The fact that most of these are capturing query parameters:

  "u": "https://www.google.com/search?q=target",
indicates that are capturing tons of authentication tokens. So this goes way beyond just spying on your browser history.
lapcat•35m ago
> We built an automated scanning pipeline that runs Chrome inside a Docker container, routes all traffic through a man‑in‑the‑middle (MITM) proxy, and watches for outbound requests that correlate with the length of the URLs we feed it.

The biggest problem here is that "We" does not refer to Google itself, who are supposed to be policing their own Chrome Web Store. One of the most profitable corporations in world history is totally negligent.

bell-cot•18m ago
GOOG didn't get to be one of the most profitable corporations in the world by spending big on cost centers.
GuestFAUniverse•33m ago
And why didn't one of the wealthiest companies of the world capture this themselves?

Considering the barriers they build to prevent adblockers, that doesn't shine a good light on them.

chrisjj•11m ago
[delayed]
nanobuilds•32m ago
The browsing data itself is only half the problem. Even if you remove the spying extension, the profile it helped build persists and keeps shaping what you see as it gets sold and changes hands.

We focus a lot on blocking data collection and spyware.. but not enough about what happens after the data is already collected/stolen and baked into your algorithmic identity. So much of our data is already out there.

Grom_PE•25m ago
It seems crazy to me that the offered way to install an extension on Chrome is to click a button on a privileged website, and then the installed extension autoupdates without an option to turn it off.

I hate the idea of installing stuff without an ability to look at what's inside first, so what I did was patch Chromium binary, replacing all strings "chromewebstore.google.com" with something else, so I can inject custom JS into that website and turn "Install" button into "Download CRX" button. After downloading, I can unpack the .crx file and look at the code, then install via "Load unpacked" and it never updates automatically. This way I'm sure only the code I've looked at gets executed.

captn3m0•18m ago
If someone would like to replicate, a good approach would be to reduce the cost by removing a full-chromium engine. I doubt these extensions are trying to do environment detection and won’t run under (for eg) JSDOM+Bun with a Chrome API shim.
kwar13•18m ago
The code is usually minified and heavily obfuscated but you CAN view the source code for any extension:

https://kaveh.page/snippets/chrome-extensions-source-code

Even a tiny extension like this one I wrote with 2k users gets buyout offers all the time to turn it into malware: https://chromewebstore.google.com/detail/one-click-image-sav...

bennydog224•14m ago
It’s obvious CWS has given up on oversight of these extensions. It’s a minefield.
croes•13m ago
Just create an AI service and users will voluntarily send you all their data.

No need for such complicated attacks /s