8M users' AI conversations sold for profit by "privacy" extensions
Posted by takira 1 day ago
Comments
Comment by GeekyBear 1 day ago
> Firefox is committed to helping protect you against third-party software that may inadvertently compromise your data – or worse – breach your privacy with malicious intent. Before an extension receives Recommended status, it undergoes rigorous technical review by staff security experts.
https://support.mozilla.org/en-US/kb/recommended-extensions-...
I know that Google hates to pay human beings, but this is an area that needs human eyes on code, not just automated scans.
Comment by Santosh83 1 day ago
Comment by Terr_ 23 hours ago
If you're feeling extra-paranoid, the XPI file can be unpacked (ZIP) and to check over the code for anything suspicious or unreasonably-complex, particularly if the browser-extension is supposed to be something simple like "move the up/down vote arrows further apart on HN". :P
While that doesn't solve the overall ecosystem issue, every little bit helps. You'll know it's time to run away if extensions become closed-source blobs.
Comment by dvratil 22 hours ago
Comment by tuetuopay 21 hours ago
Comment by GeekyBear 12 hours ago
Yes.
Comment by pacifika 22 hours ago
> Before an extension receives Recommended status, it undergoes rigorous technical review by staff security experts.
https://support.mozilla.org/en-US/kb/recommended-extensions-...
Comment by nevon 22 hours ago
Comment by insin 19 hours ago
This is what the Firefox add-ons team sent to me when one of my extensions was invited to the Recommended program:
> If you’re interested in Control Panel for Twitter becoming a Firefox Recommended Extension there are a couple of conditions to consider:
> 1) Mozilla staff security experts manually review every new submission of all Recommended extensions; this ensures all Recommended extensions remain compliant with AMO’s privacy and security standards. Due to this rigorous monitoring you can expect slightly longer review wait times for new version submissions (up to two weeks in some cases, though it’s usually just a few days).
> 2) Developers agree to actively maintain their Recommended extension (i.e. make timely bug fixes and/or generally tend to its ongoing maintenance). Basically we don't want to include abandoned or otherwise decaying content, so if the day arrives you intend to no longer maintain Control Panel for Twitter, we simply ask you to communicate that to us so we can plan for its removal from the program.
Comment by nevon 19 hours ago
Comment by londons_explore 18 hours ago
Often they're compiled with typescript etc making manual review almost impossible.
And if you demand the developer send in the raw uncompiled stuff you have the difficulty of Google/Mozilla having to figure out how to compile an arbitrary project which could use custom compilers or compilation steps.
Remember that someone malicious wont hide their malicious code in main.ts... it's gonna be deep inside a chain of libraries (which they might control too, or might have vendored).
Comment by londons_explore 17 hours ago
I=c=>c.map?c[0]?c.reduce((a,b)=>a[b=I(b)]||a(b),self):c[1]:c
(How it works is an exercise to the reader)
The actual code to run can be delivered as an innocuous looking JavaScript array from some server, and potentially only delivered to one high value target.
Comment by ikekkdcjkfke 17 hours ago
Comment by londons_explore 6 hours ago
Comment by johnebgd 14 hours ago
Comment by arein3 14 hours ago
Wow, it deconstructed it beautifully
A Concrete Example Imagine you pass this array to the function: ['alert', 'Hello World'] Here is the step-by-step execution:
Initialization: The accumulator a starts as self (the window object).
Iteration 1 (b = "alert"):
I("alert") returns string "alert".
It tries a["alert"] (which is window["alert"]).
This finds the alert function.
New Accumulator a: The alert function.
Iteration 2 (b = "Hello World"):
I("Hello World") returns string "Hello World".
It tries a["Hello World"]. The alert function does not have a property named "Hello World", so this is undefined.
The || operator moves to the right side: a(b).
It executes alert("Hello World").
Result: A browser popup appears.Comment by cj 15 hours ago
Comment by electroly 14 hours ago
Mozilla allows minification but you're required to provide the original buildable source. Mozilla actually looks at the code and they reject updates all the time.
Comment by cj 14 hours ago
https://blog.chromium.org/2018/10/trustworthy-chrome-extensi...
Comment by sixtyj 16 hours ago
In JS this can be much harder to find anything suspicious when the code can be minified.
But back to Firefox: My house, my rules. So let external developers set some more strict rules that discourage the bad actors a little.
Comment by sixtyj 16 hours ago
When a survey was conducted on the misuse of finances and powers, it was found that managers who did not sign the code (because they had to study it and then "forgot" to do so) were more likely to cheat than those who actually signed the documents.
Comment by j-bos 19 hours ago
Comment by megous 18 hours ago
What I saw in Mozilla extensions store was anything from using minified code (what is this? it might have been useful in the late 90's on the web, but it surely is not necessary as part of an extension, that doesn't download its code from anywhere), to just full on data stealing code (reported, and mozilla removed it after 2 weeks or so).
I don't trust the review process one bit if they allow minified code in the store. For the same reason, "manual" review doesn't fill me with any extra warm confidence feeling. I can look at minified code manually myself, but it's just gibberish, and suspicious code is much harder to discern.
Also, I just stopped using third party extensions, except for 2 (violentmonkey, ublock), so I no longer do reviews. I had a script that would extract the XPI into a git repository before update, do a commit and show me a diff.
Friendly extension store for security conscious users would make it easy to review source code of the extension before hitting install or update. This is like the most security sensitive code that exists in the browser.
Comment by Llamamoe 1 day ago
I think we need both human review and for somebody to create an antivirus engine for code that's on par with the heuristics of good AV programs.
You could probably do even better than that since you could actually execute the code, whole or piecewise, with debugging, tracing, coverage testing, fuzzing and so on.
Comment by wzdd 19 hours ago
Comment by jwr 16 hours ago
Comment by tremon 15 hours ago
Comment by alfiedotwtf 22 hours ago
Comment by chmod775 1 day ago
> Urban Cyber Security INC
https://opencorporates.com/companies/us_de/5136044
https://www.urbancybersec.com/about-us/
I found two addresses:
> 1007 North Orange Street 4th floor Wilmington, DE 19801 US
> 510 5th Ave 3rd floor New York, NY 10036 United States
and even a phone number: +1 917-690-8380
https://www.manhattan-nyc.com/businesses/urban-cyber-securit...
They look really legitimate on the outside, to the point that there's a fair chance they're not aware what their extension is doing. Possibly they're "victim" of this as well.
Comment by swatcoder 1 day ago
If that looks use-italics "really legitimate" to you, then you might be easily scammed. I'm not saying they're not legitimate, but nothing that you shared is a strong signal of legitimacy.
It would take a perhaps a few hundred dollars a month to maintain a business that looked exactly like this, and maybe a couple thousand to buy one that somebody else had aged ahead of time. You wouldn't have to have any actual operations. Just continuously filed corporate papers, a simple brochure website, and a couple virtual office accounts in places so dense that people don't know the virtual address sites by heart.
Old advice, but be careful believing what you encounter on the internet!
Comment by chmod775 1 day ago
Comment by Egor3f 1 day ago
And also, why extension for vpn? I live in country where almost everybody uses vpn just to watch YouTube and read twitter, and none of my friends uses some strange extensions. There are open source software for that - from real vpn like wireguard, to proxy software like nekoray/v2raytun. Browser extension is the last thing I would install to be private.
Comment by chmod775 1 day ago
Comment by nothrabannosir 1 day ago
> What, there's an issue because I'm not being underhanded about it like [that] guy?
Wow you’ve put something into words here I never consciously realized is an unwritten rule. Sounds silly but yea you’re 100% right; that seems to be exactly the game we play.
For better or for worse.
Comment by j-bos 19 hours ago
HN guidelines: Assume good faith.
Comment by weird-eye-issue 1 day ago
Based on what? The same instinct that told you having an address and phone number makes an entity legitimate? The chance the people behind this company live in the US is incredibly low. And even if they do live in the US what exactly would they be getting charged with and who would care enough to charge them?
Comment by chmod775 1 day ago
Comment by ch2026 1 day ago
The NY address is a virtual office.
https://themillspace.com/wilmington/
The DE address is a virtual office plus coworking facility.
Comment by azinman2 1 day ago
Comment by ryanjshaw 23 hours ago
You run a business from home but do not want to reveal you personal address to the world.
You are from a country that Stripe doesn’t support but need to make use of their unique capabilities like Stripe Connect, then you might sign up for Stripe Atlas to incorporate in the USA so you can do business directly with Stripe. Your US business then needs a US physical address ie virtual office.
Etc
Comment by nl 18 hours ago
Comment by victorbjorklund 23 hours ago
Comment by SoftTalker 14 hours ago
Comment by fc417fc802 7 hours ago
Comment by SoftTalker 5 hours ago
Comment by Mistletoe 23 hours ago
Comment by Nevermark 1 day ago
> This company has been on researchers' radar before. Security researchers Wladimir Palant and John Tuckner at Secure Annex have previously documented BiScience's data collection practices. Their research established that:
> BiScience collects clickstream data (browsing history) from millions of users Data is tied to persistent device identifiers, enabling re-identification The company provides an SDK to third-party extension developers to collect and sell user data
> BiScience sells this data through products like AdClarity and Clickstream OS
> The identical AI harvesting functionality appears in seven other extensions from the same publisher, across both Chrome and Edge:
Hmm.
> They look really legitimate on the outside
Hmm, what, no.
We have a data collection company, thriving financially on lack of privacy protections, indiscriminant collection and collating of data, connected to eight data siphoning "Violate Privacy Network" apps.
And those apps are free... Which is seriously default sketchy if you can't otherwise identify some obviously noble incentives to offer free services/candy to strangers.
Once is happenstance, twice is coincidence, three (or eight) times is enemy action.
The only thing that could possibly make this look any worse is discovering a connection to Facebook.
Comment by mortarion 18 hours ago
Comment by weird-eye-issue 1 day ago
Comment by bix6 1 day ago
1000 N. WEST ST. STE. 1501, WILMINGTON, New Castle, DE, 19801
It almost matches this law firms address but not quite.
https://www.skjlaw.com/contact-us/
Brandywine Building 1000 N. West Street, Suite 1501 Wilmington DE 19801
Comment by thayne 23 hours ago
Comment by consp 19 hours ago
Comment by throw310822 23 hours ago
BiScience is an Israeli company.
Comment by hnbad 19 hours ago
Comment by elisbce 1 day ago
Comment by umrashrf 1 day ago
Sometimes things don't make sense to me, like how "Uber Driver app access background location and there is no way to change that from settings" - https://developer.apple.com/forums/thread/783227
Comment by qwertox 22 hours ago
Or they'd tell WhatsApp to allow granting microphone permissions for one single call, instead of requesting permanent microphone permissions. All apps that I know of respect the flow of "Ask every time", all but Meta's app.
Google just doesn't care.
Comment by uyzstvqs 19 hours ago
Comment by qwertox 11 hours ago
Comment by donohoe 18 hours ago
Comment by josephg 18 hours ago
Or even better, mix in some real names and phone numbers but change all the other details. I want data brokers to think I live in 8 different countries. I want my email address to show up for 50 different identities. Good luck sorting that out.
Comment by marcellus23 1 day ago
The developer documentation is actually pretty clear about this: https://developer.apple.com/documentation/bundleresources/ch...
Comment by hnbad 19 hours ago
Comment by naian 13 hours ago
Comment by jackfranklyn 22 hours ago
What we actually need is runtime permissions that fire when the extension tries to do something suspicious - like exfiltrating data to domains that aren't related to its stated function. iOS does this reasonably well for apps. Extensions should too.
The "Recommended" badge helps but it's a bandaid. If an extension needs "read and change all data on all websites" to work, maybe it shouldn't work.
Comment by miguelspizza 5 minutes ago
I agree though, runtime permissions should be the default
Comment by hnbad 19 hours ago
For example there's no need for the "inject custom JS or CSS into websites" extensions to need permission to read and write data on every single website you visit. If you only want to use them to make a few specific sites more accessible to you that doesn't mean you're okay with them touching your online banking. Especially when most of these already let you define specific URLs or patterns each rule/script should apply to.
I understand that there are still vectors for data exfiltration when the same extension has permissions on two different sites and that "code injection as a service" is inherently risky (although cross-origin policies can already lock this down somewhat) but in 2025 I'd hope we could have a more granular permission model for browser extensions that actually supports sandboxing.
Comment by valicord 14 hours ago
Comment by murillians 20 hours ago
Is this where we’re at with AI?
Comment by nacozarina 19 hours ago
Putting a token predictor in the mix — especially one incapable of any actual understanding — seems like a natural evolution.
Absolved of burden of navigating our noisy, incomplete and dissonant thoughts, we can surrender ourselves to the oracle and just obey.
Comment by lionkor 14 hours ago
Comment by meindnoch 19 hours ago
Comment by ACCount37 15 hours ago
For all we know, it's just two paths the brain can take to arrive at the same destination.
Comment by ga_to 15 hours ago
Comment by AlecSchueler 11 hours ago
Comment by hxstroy2 11 hours ago
Comment by nl 18 hours ago
For example HBR recently reported the number 1 use for ChatGPT is "Therapy/companionship"
Comment by SoftTalker 14 hours ago
Comment by Miraltar 20 hours ago
Comment by skywhopper 19 hours ago
Comment by haar 18 hours ago
Comment by senordevnyc 14 hours ago
Here's an example of the kinds of things I've talked with ChatGPT about in the last few weeks:
- I'm moving to a new area and I share custody of my daughter, so this adds a lot of complications around logistics. Talked through all that.
- Had it research niche podcasts and youtube channels for advertising / sponsorship opportunities for my SaaS
- Talked through a really complex architecture decision that's a mix of technical info and big tradeoffs for cost and customer experience.
- Did some research and talked through options for buying two new vehicles for the upcoming move, and what kinds work best for use cases (which are complex)
- Lots and lots of discussions around complex tax planning for 2026 and beyond
Again, these models have vast knowledge, as well as access to search and other tools to gather up-to-date info and sift through it far faster than I can. Why wouldn't I talk through these things with them? In my experience, with a little guardrails ("double check this" or "search and verify that X..."), I'm finding it more trustworthy than most experts in those fields. For example, I've gotten all kinds of incorrect tax advice from CPAs. Sometimes ChatGPT is out of date, but it's generally pretty accurate around taxes ime, especially if I have it search to verify things.
Comment by 2bird3 1 day ago
[1] https://secureannex.com/blog/cyberhaven-extension-compromise.... [2] https://secureannex.com/blog/sclpfybn-moneitization-scheme/ (referenced in the article)
Comment by mat_b 1 day ago
"Let us handle all your internet traffic.. you can trust us.. we're free!"
No thank you.
Comment by akimbostrawman 20 hours ago
Meanwhile reputable VPN provider like mullvad offer there service without KYC and leave feds empty handed when they knock on there doors.
https://mullvad.net/en/blog/mullvad-vpn-was-subject-to-a-sea...
Comment by Joker_vD 1 day ago
That's why TLS exists, after all. All Internet traffic is wiretapped.
Comment by Dylan16807 1 day ago
> That's why TLS exists, after all.
That protects you if you're using standard methods to connect. Installed software gets to bypass it.
Comment by psychoslave 17 hours ago
Maybe some
Comment by Joker_vD 22 hours ago
But it's cumbersome.
Comment by silverwind 20 hours ago
Comment by 1718627440 20 hours ago
Comment by bluepuma77 21 hours ago
> "Let us handle all your internet traffic.. you can trust us.. []"
TLS does not help, when most Internet traffic is passed through a single entity, which by default will use an edge TLS certificate and re-encrypt all data passing through, so will have decrypted plain text visibility to all data transmitted.
Comment by gkbrk 21 hours ago
Comment by Joker_vD 21 hours ago
Comment by nrhrjrjrjtntbt 1 day ago
Comment by SamDc73 23 hours ago
but other than that I would never trust anything other than Mullvad/IVPN/ProtonVPN
Comment by lodovic 23 hours ago
VPNs are just one example. How many chrome extensions do you have that you don't use all the time, like adblockers, cookie consent form handlers or dark mode?
Comment by mat_b 10 hours ago
Comment by fragmede 1 day ago
Comment by Egor3f 1 day ago
Comment by bsaul 1 day ago
Comment by bandrami 1 day ago
Comment by notpushkin 1 day ago
But considering those are browser extensions, I think they can just inspect any traffic they want on the client side (if they can get such broad permissions approved, which is probably not too hard).
Comment by bennydog224 1 day ago
There has to be a better system. Maybe a public extension safety directory?
Comment by yetanotherjosh 13 hours ago
Comment by johncolanduoni 1 day ago
Comment by bennydog224 15 hours ago
Comment by H8crilA 1 day ago
Comment by Liquix 1 day ago
Comment by Legend2440 1 day ago
Comment by anonym29 1 day ago
Comment by charcircuit 23 hours ago
Additionally, Brave a chromium based browser has adblocking built into the browser itself meaning it is not affected by webextention changes and does not require trusting an additional 3rd party.
Comment by ozgrakkurt 22 hours ago
Comment by bennydog224 1 day ago
Comment by est 1 day ago
Comment by bennydog224 1 day ago
Comment by bandrami 1 day ago
Comment by bennydog224 15 hours ago
Comment by wnevets 1 day ago
Comment by adrr 1 day ago
Comment by g947o 1 day ago
I do think security researchers would be able to figure out what scripts are downloaded and run.
Regardless, none of this seems to matter to end users whether the script is in the extension or external.
Comment by johncolanduoni 20 hours ago
Comment by reddozen 23 hours ago
Comment by creatonez 22 hours ago
If so, I feel like something that limited is hardly even a browser extension interface in the traditional sense.
Comment by johncolanduoni 20 hours ago
Comment by moi2388 20 hours ago
So you can still do everything you could before, but it’s not as hidden anymore
Comment by tlogan 1 day ago
Comment by PeterHolzwarth 1 day ago
Comment by johncolanduoni 1 day ago
Comment by CafeRacer 1 day ago
Comment by droopyEyelids 1 day ago
Comment by varenc 1 day ago
Comment by stevenjgarner 1 day ago
Comment by AznHisoka 18 hours ago
Comment by why-o-why 1 day ago
Comment by QuadrupleA 1 day ago
In much of the physical world thankfully there's laws and pretty-effective enforcement against people clubbing you on the head and taking your stuff, retail stores selling fake products and empty boxes, etc.
But the tech world is this ever-boiling global cauldron of intangible software processes and code - hard to get a handle on what to even regulate. Wish people would just be decent to each other, and that that would be culturally valued over materialism and moneymaking by any possible means. Perhaps it'll make a comeback.
Comment by rkagerer 1 day ago
I spend a lot of time trying to think of concrete ways to improve the situation, and would love to hear people's ideas. Instinctively I tend to agree it largely comes down to treating your users like human beings.
Comment by therobots927 1 day ago
Get as off-grid as you possibly can. Try to make your everyday use of technology as deterministic as possible. The free market punishes anyone who “respects their users”. Your best bet is some type of tech co-op funded partially by a billionaire who decided to be nice one day.
Comment by pksebben 1 day ago
Part of the problem has been that there's a mountain to climb vis a vis that extra ten miles to take something that 'works for me' and turn it into 'gramps can install this and it doesn't trigger his alopecia'.
Rather, that was the problem. If you're looking for a use case for LLMs, look no further. We do actually have the capacity to build user-friendly stuff at a fraction of the time cost that we used to.
We can make the world a better place if we actually give a shit. Make things out in the open, for free, that benefit people who aren't in tech. Chip away at the monopolies by offering a competitive service because it's the right thing to do and history will vindicate you instead of trying to squeeze a buck out of each and every thing.
I'm not saying "don't do a thing for money". You need to do that. We all need to do that. But instead of your next binge watch or fiftieth foray into Zandronum on brutal difficulty, maybe badger your llm to do all the UX/UI tweaks you could never be assed to do for that app you made that one time, so real people can use it. I'm dead certain that there are folks reading this now who have VPN or privacy solutions they've cooked up that don't steal all your data and aren't going to cost you an arm and a leg. At the very least, someone reading this has a network plugin that can sniff for exfiltrated data to known compromised networks (including data brokers) - it's probably just finicky to install, highly technical, and delicate outside of your machine. Tell claude to package that shit so larry luddite can install it and reap the benefits without learning what a bash is or how to emacs.
Comment by therobots927 11 hours ago
Comment by rkagerer 10 hours ago
Personally I feel it's everything from the ground up - silicon IC's through to device platforms and cloud services. But we need a plan to chip away at the problem one bite at a time.
Comment by therobots927 8 hours ago
But if you’re talking about building hardware… that feels like something the NSA would be happy to be involved with whether you want them to be or not. I’d vote for an 80/20 solution that gets people protected from some of the most rampant data mining going on by corporations vs. state actors.
The other issue to keep in mind is that the tech ecosystem absolutely will suffocate anything like this by disabling access to their apps / website with this OS. So at the end of the day I really don’t know if there’s a solution to any of this.
Comment by jacquesm 1 day ago
Comment by throw310822 1 day ago
Comment by banku_brougham 1 day ago
Comment by onion2k 1 day ago
Comment by Leptonmaniac 1 day ago
Comment by omnicognate 1 day ago
Comment by XorNot 23 hours ago
Brave New World was apathy: the system was comfortable, Soma was freely available and there was a whole system to give disruptive elements comfortable but non disruptive engagement.
The protagonist in Brave New World spends a lot of time resenting the system but really he just resents his deformity, wanted what it denied him in society, and had no real higher criticisms of it beyond what he felt he couldn't have.
Comment by omnicognate 23 hours ago
You might even imagine 1984's society evolving into Brave New World's as the mechanisms of oppression are gradually refined. Indeed, Aldous Huxley himself suggested as much in a letter to Orwell [1].
[1] https://gizmodo.com/read-aldous-huxleys-review-of-1984-he-se...
Comment by Terr_ 1 day ago
Bonus points if the government agency can leave most of the work to an ostensibly separate private company, while maintaining a "mutual understanding" of government favors for access.
Comment by vasco 1 day ago
Comment by GaryBluto 1 day ago
Comment by yoan9224 18 hours ago
The scary part is these extensions had Google's "Featured" badge. Manual review clearly isn't enough when companies can update code post-approval. We need continuous monitoring, not just one-time vetting.
For anyone building privacy-focused tools: making your data collection transparent and your business model clear upfront is the only way to build trust. Users are getting savvier about this.
Comment by chhxdjsj 21 hours ago
Comment by talhof8 14 hours ago
Comment by hnbad 19 hours ago
Comment by chhxdjsj 21 hours ago
Comment by kvam 23 hours ago
The island states have been dethroned.
Comment by mjmas 1 day ago
Or that the review happened before the code harvested all the LLM conversations and never got reviewed after it was updated.
Comment by growt 1 day ago
Comment by antipaul 14 hours ago
Remember FaceBook x Onavo?
"Facebook used a Virtual Private Network (VPN) application it acquired, called Onavo Protect, as a surveillance tool to monitor user activity on competing apps and websites"
Comment by smallerfish 17 hours ago
Comment by free_bip 1 day ago
Comment by pyrolistical 1 day ago
Comment by x-complexity 1 day ago
That can be circumnavigated by bundling the conversations into one POST to an API endpoint, along with a few hundred calls to several dummy endpoints to muddy the waters. Bonus points if you can make it look like an normal-passing update script.
It'll still show up in the end, but at this point your main goal is to delay the discovery as much as you can.
Comment by g947o 1 day ago
Comment by hexagonwin 23 hours ago
Comment by Agraillo 20 hours ago
A review page [2] mentions that this add-on is a peer-to-peer vpn, not having its own dedicated servers that already makes it suspicious.
[1] https://web.archive.org/web/20250126133131/https://addons.mo...
Comment by ttldlinhtm 5 hours ago
Comment by miladyincontrol 1 day ago
With those extensions the user's data and internet are the product, most if not all are also selling residential IP access for scrapers, bots, etc.
Good thing Google is protecting users by taking down such harmful extensions as ublock origin instead.
Comment by SoftTalker 1 day ago
Comment by fylo 1 day ago
Comment by Retr0id 1 day ago
Comment by DrewADesign 1 day ago
Comment by bandrami 1 day ago
Comment by yalogin 15 hours ago
Comment by estimator7292 15 hours ago
Comment by Rakshath_1 16 hours ago
Comment by phkahler 19 hours ago
Sometimes knowing tech makes us think we're somehow better and can bypass high level wisdom.
Comment by sothatsit 18 hours ago
> We asked Wings, our agentic-AI risk engine, to scan for browser extensions with the capability to read and exfiltrate conversations from AI chat platforms.
Comment by daniel_iversen 1 day ago
Comment by nottorp 20 hours ago
Or you mean the web sites packed with a copy of chromium?
Comment by deepfriedbits 1 day ago
Comment by jrochkind1 1 day ago
Comment by nwellinghoff 21 hours ago
Could one just feed the extension and a good prompt to claude to do this? Seems like automation CAN sniff this kind of stuff out pretty easily.
Comment by raincole 22 hours ago
Comment by metaphorproj 22 hours ago
Comment by xeeeeeeeeeeenu 20 hours ago
They take a 5.5% fee whenever you buy credits. There's also a discount for opting-in to share your prompts for training.
Comment by dgellow 21 hours ago
Comment by AznHisoka 18 hours ago
Think: is my brand getting mentioned more in AI chats? Are people associating positive or negative feelings towards it? Are more people asking about this topic lately?
Comment by pxtail 20 hours ago
Comment by AznHisoka 18 hours ago
Articles like this do a decent job of bringing awareness, but we all know Google will do absolutely nothing
Comment by matt3210 23 hours ago
Comment by tasuki 23 hours ago
> The thought didn't let go. As a security researcher, I have the tools to answer that question.
What huh, no you don't! As a security researcher you should know better!
Comment by tasuki 22 hours ago
No. When you want to increase your security, you install fewer tools.
Each tool increases your exposure. Why is the security industry full of people who don't get this?
Comment by ericand 23 hours ago
Comment by drnick1 1 day ago
Trusting Google with your privacy is like putting the fox in charge of the henhouse.
Comment by dguido 1 day ago
Comment by bluepuma77 21 hours ago
Comment by 4ndrewl 22 hours ago
If you really are a security researcher then that's not true. You already know all this.
Comment by torginus 21 hours ago
How is it possible to have extensions this egregiously malicious in the new system?
Comment by netbioserror 1 day ago
Comment by andersa 1 day ago
Comment by cluckindan 1 day ago
Comment by temp0826 1 day ago
(for firefox/derivatives anyways...)
Comment by matheusmoreira 1 day ago
Comment by eszed 1 day ago
Comment by jukkat 13 hours ago
Comment by notjonheyman 1 day ago
Comment by Oarch 1 day ago
Comment by automatedideas 1 day ago
“I know, let’s have an AI do all the work for us instead. Let’s take a coffee break.”
Comment by lodovic 23 hours ago
Comment by free_bip 1 day ago
Comment by jmward01 14 hours ago
Comment by meindnoch 19 hours ago
Comment by Dylan16807 1 day ago
70 thousand users on what I would actually call "privacy" extensions.
Bit of a misleading title then.
Comment by saretup 23 hours ago
Comment by ArtRichards 22 hours ago
Comment by andsoitis 1 day ago
If you are not paying for the product, you are the product.
Comment by frm88 17 hours ago
Comment by andsoitis 7 hours ago
Perhaps a better proverb would be: there ain’t no free lunch.
Comment by RataNova 20 hours ago
Comment by cmiles8 16 hours ago
Comment by danielfalbo 21 hours ago
Comment by cryptoegorophy 14 hours ago
Comment by lionkor 14 hours ago
I hate to be that guy, but I am having a difficult time verifying any of this. How likely is it that this is entirely hallucinated? Can anyone independently verify this?
Comment by 2OEH8eoCRo0 13 hours ago
Comment by awaymazdacx5 1 day ago
And um, a boy and a girl.
...
Anyway, the thing was that one day they started acting kinda funny. Kinda, weird.
They started being seen exchanging tokens of affection.
And it was rumoured they were engaging in...
Comment by msdgfkjsfg 19 hours ago
Comment by msdgfkjsfg 19 hours ago
Comment by hnbad 19 hours ago
If Urban VPN is indeed closely affiliated with the data broker, a GDPR fine might also affect that company too given how these fines work. There is a high bar for the kind of misconduct that would result in a fine but it seems plausible that they're being knowingly and deliberately deceptive and engaging in widespread data collection that is intentionally invasive and covert. That would be a textbook example for the kind of behavior the GDPR is meant to target with fines.
The same likely applies to the other extensions mentioned in the article. Yes, "if the product is free, you are the product" but that is exactly why the GDPR exists. The problem isn't that they're harvesting user data but that they're being intentionally deceptive and misleading in their statements about this, claim they are using consent as the legal basis without having obtained it[0], and they're explicitly contradicting themselves in their claims ("we're not collecting sensitive information that would need special consideration but if we do we make sure to find it and remove it before sharing your information but don't worry because it's mostly used in aggregate except when it isn't"). Just because you except some bruising when picking up martial arts as a hobby doesn't mean your sparring partner gets to pummel your face in when you're already knocked out.
[0]: Because "consent" seems to be a hard concept for some people to grasp: it's literally analogous to what you'd want to establish before having sex with someone (though to be fair: the laws are much more lenient about unclear consent for sex because it's less reasonable to expect it to be documented with a paper trail like you can easily do for software). I'll try to keep it SFW but my place of work is not your place of work so think carefully if you want to copy this into your next Powerpoint presentation.
Does your prospective sexual partner have any reason to strongly believe that they can't refuse your advances because doing so would limit their access to something else (e.g. you took them on a date in your car and they can't afford a taxi/uber and public transport isn't available so they rely on you to get back home, aka "the implication")? Then they can't give you voluntary consent because you're (intentionally or not) pressuring them into it. The same goes if you make it much harder for them to refuse than to agree (I can't think of a sex analogy for this because this seems obvious in direct human interactions but somehow some people still think hiding "reject all non-essential" is an option you are allowed to hide between two more steps when the "accept all" button is right there even if the law explicitly prohibits these shenanigans).
Is your prospective sexual partner underage or do they appear extremely naive (e.g. you suspect they've never had any sex ed and don't know what having sex might entail or the risks involved like pregnancy, STIs or, depending on the acts, potential injuries)? Then they probably can't give you informed consent because they don't fully understand what they're consenting to. For data processing this would be failure to disclose the nature of the collection/processing/storage that's about to happen. And no, throwing the entire 100 page privacy policy at them with a consent dialog at the start hardly counts the same way throwing a biology textbook at a minor doesn't make them able to consent.
Is your prospective sexual partner giving you mixed signals but seems to be generally okay with the idea of "taking things further"? Then you're still missing specific consent and better take things one step at a time checking in on them if they're still comfortable with the direction you're taking things before you decide to raw dog their butt (even if they might turn out to be into that). Or in software terms, it's probably better to limit the things you seek consent for to what's currently happening for the user (e.g. a checkbox on a contact form that informs them what you actually intend to do with that data specifically) rather than try to get it all in one big consent modal at the start - this also comes with the advantage that you can directly demonstrate when and how the specific consent relevant to that data was obtained when later having to justify how that data was used in case something goes wrong.
Is your now-active sexual partner in a position where they can no longer tell you to stop (e.g. because they're tied up and ball-gagged)? Then the consent you did obtain isn't revokable (and thus again invalid) because they need to be able to opt out (this is what "safe words" are for and why your dentist tells you to raise your hand where they can see it if you need them to stop during a procedure - given that it's hard to talk with someone's hands in your mouth). In software this means withdrawing consent (or "opting out") should be as easy as it was to give it in the first place - an easy solution is having a "privacy settings" screen easily accessible in the same place as the privacy policy and other mandatory information that at the very least covers everything you stuffed in that consent dialog I told you not to use, as well as anything you tucked away in other forms downstream. This also gives you a nice place to link to at every opportunity to keep your user at ease and relaxed to make the journey more enjoyable for both of you.
Comment by deaux 16 hours ago
Comment by jsrozner 23 hours ago
(Yes it really is AI-written / AI-assisted. If your AI detectors don’t go off when you read it you need to be retrained.)
Comment by hathym 23 hours ago
Comment by tlogan 1 day ago
Comment by cycomanic 1 day ago
Comment by atmosx 1 day ago
There are honest ways to make a living. In this case honest is “being transparent” about the way data is handled instead of using newspeak.
Comment by jrochkind1 1 day ago
Comment by brikym 22 hours ago