For years, tech behemoth Google threatened to crack down on browser extension activity within its Chrome browser to improve security. Now, the company is making good on its threats and disabling browser extensions that don't comply with Manifest V3, its browser extension framework. Security experts, such as those at the Electronic Frontier Foundation (EFF), argue that Manifest V3 is not a viable solution for addressing real security concerns, including browser extensions that scrape users' browsing histories and sell the data to the highest bidder.
"Users think they're getting a free VPN or SEO widget; in reality, their most private queries - health scares, finances, identity crises - are being slurped, anonymized, and resold," Dryburgh explained in an email. " Onavo and Jumpshot déjà vu, only worse: this time it's your inner dialogue." "We have access to 150+ million real user conversations. This is primarily clickstream data where a user has opted in to be tracked and automatically shared their ChatGPT conversations."
Popular password manager plugins for web browsers have been found susceptible to clickjacking security vulnerabilities that could be exploited to steal account credentials, two-factor authentication (2FA) codes, and credit card details under certain conditions. The technique has been dubbed Document Object Model ( DOM)-based extension clickjacking by independent security researcher Marek Tóth, who presented the findings at the DEF CON 33 security conference earlier this month.
Compatibility issues with browser extensions highlight the vulnerability of our digital workflows. When updates occur unexpectedly, relying on tools without backup plans can disrupt productivity.