Protecting Chrome users from malicious extensions

Discussion in 'other software & services' started by pegas, May 28, 2014.

Thread Status:
Not open for further replies.
  1. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
  2. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
    Sure, and nobody would point it out.
    More likely possibility, but still escapism.

    Absolutely lacking counterpoints. And people say I'm a Google fanboy.
     
  3. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  4. Jarmo P

    Jarmo P Registered Member

    Joined:
    Aug 27, 2005
    Posts:
    1,207
    You should always not to install extensions unless really for some reasons compelled to do so!
    My only extension active is HTTP Switchboard.
    If some extension is really needed and not found on Chrome "shop", stay away. Stay away also from many there.
     
  5. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
    Right, I forgot you were ignoring me. Sorry, but I cannot simply avoid the topic just cause you're here.

    Staying away is far too much generalizing to be accurate. It's the wrong mentality to trust only the official source (though you're right to only do so to an extent), while treating everywhere else as malicious.

    Let me give you an example: X-Notifier, a relatively popular and essential extension that was kicked out of the Chrome store for no apparent reason. I just got a Chromebook, but syncing data doesn't install that extension. Where else would I find it other than the developer's own site?
     
  6. gorhill

    gorhill Guest

    Last edited by a moderator: May 31, 2014
  7. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
  8. gorhill

    gorhill Guest

    There is a library related to wips.com which is hooked onto chrome.webRequest.onErrorOccurred() for main_frame for <all_urls>. The code fails before I can trace far enough, as the `client_id` is not set on my side (maybe because linux or chromium). But I can see there is some kind of information sent to wips.com. Errors on main_frame request can occur when someone blocks sub_frame (like for ads, although redirecting to a blank doc prevents an error from being fired)). I would need to investigate further to find out, but I am not that interested.
     
  9. TheWindBringeth

    TheWindBringeth Registered Member

    Joined:
    Feb 29, 2012
    Posts:
    2,171
    In light of gorhill's comment I'm open to the idea that you ran into a well-intentioned impediment, but that doesn't mean the mechanisms involved are implemented in the way that is best for security.

    Do you happen to know how/where the detection was done? Does Google have visibility into the sync data proper and block extensions based on that? Does Chrome phone home information about the extensions you are about to install [while syncing] so that Google can respond with an "allow/deny"? Was the detection purely client side with zero information about the extension flowing to Google? One way or another, there should be some way for you to disable Google's restrictions. Even if that means shooting yourself in the foot.
     
    Last edited: Jun 2, 2014
  10. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
    I'm not sure about the details, but whenever an app/extension is removed from the Chrome store for whatever reason, it cannot be synced to another device and of course yours won't be updated. I presume entire extension aren't synced, only automatic "download links" to those in the Chrome store. That makes manually installing/updating extensions a hassle without an updater built-in, but Google wants to ban it altogether for "safety" (more like money).
     
  11. TheWindBringeth

    TheWindBringeth Registered Member

    Joined:
    Feb 29, 2012
    Posts:
    2,171
    What about the methods mentioned at https://support.google.com/chrome/a/answer/188453 ? I'm not in a position to try them and develop first hand knowledge of the ins/outs, but a glimpse suggests there is some possibility of instructing chrome to install/update extensions from a URL of your choosing. Maybe you can configure your Chromes to pull your own crx derivative from a server other than Google's?

    FWIW, I've noticed similar looking functionality in Firefox extensions/manifests. For now, it is easy enough just to drag/drop my extensions onto Firefox when needed. However, I'm getting the itch to try for better isolation from AMO. It is only a matter of time I suspect, if you know what I mean.
     
  12. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
    Sorry, I don't know the ind/outs either or what to add.

    I'm just glad this nonsense wasn't enforced on my computer yet.
     
  13. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
    **** **** stack, it's here. I'm honestly glad I got X-Notifier on Windows before it was removed from the Chrome store. As for the other ones, I can live without them, but it's a serious inconvenience and loss of control.
     
  14. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
    So this is yet another example of taking things for granted and not noticing when your freedom is being slowly abolished.
     
  15. Banzi

    Banzi Registered Member

    Joined:
    Oct 21, 2013
    Posts:
    397
    Location:
    Scotland
    Well Chrome disabled 360IS web shield plugin last night for my safety, basically disabled the AV programs browser protection with no way of re-enabling it, the irony is the message said they were disabling it for my safety.
     
  16. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
  17. TairikuOkami

    TairikuOkami Registered Member

    Joined:
    Oct 10, 2005
    Posts:
    3,440
    Location:
    Slovakia
    Install, yes, works without problems, not really, but it works more less. But the most annoying part is the popup, which can not be disabled.
    They recommend using dev channel, but since I do not use Chrome, I do not have that option and I would not like to use dev version. :doubt:
     

    Attached Files:

  18. Pinga

    Pinga Registered Member

    Joined:
    Aug 31, 2006
    Posts:
    1,420
    Location:
    Europe
    Fascinating, the way they are trying to spin this. Google appears to have replaced its corporate motto 'don't be evil' by 'just say the others are evil'. A little context analysis:

    Google Chrome
    The rest of the world
     
  19. TairikuOkami

    TairikuOkami Registered Member

    Joined:
    Oct 10, 2005
    Posts:
    3,440
    Location:
    Slovakia
    A little update, it did not really help to stop malicious extensions from appearing in Chrome's Web Store. :rolleyes:

    http://www.computerworld.com/s/article/9250498/Many_Chrome_browser_extensions_do_sneaky_things

     
  20. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    @ TairikuOkami

    Yes like I said before, extensions are a huge risk, and the consumer should be educated about it. Another option for browser-makers is to put more restrictions on what extensions are able to do, but that would probably break things. :)
     
  21. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,066
    Location:
    Canada
    Thanks for the update. Interesting stats. About 0.2% of the 48k are malicious and almost 10% suspicious. I breezed through the pdf document and suspicious/malicious extension names they listed were ones I never heard of before, nor would ever use, based on what they do. The feeling I get is stick with the highly popular ones, especially one that have been long-term tenants in the store, and you'll probably be ok.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.