That's not necessarily true.
With a firewall.
Sensor Tower (https://sensortower.com/) makes a lot of popular extensions, like StayFocusd https://www.stayfocusd.com/. They seem to resell ad data (in violation of [1]?) and ship likely obfuscated code [2] (in violation of [3]?), but there's no enforcement or even clear reporting mechanism.
[1] https://developer.chrome.com/docs/webstore/program-policies/...
[2] https://robwu.nl/crxviewer/?crx=https%3A%2F%2Fclients2.googl...
[3] https://developer.chrome.com/docs/webstore/program-policies/...
I don't think the solution is technical. The solution would be a strict policy, and nuke every extension and publisher from the store who even hints at doing this kind of BS.
MV3 makes it considerably harder to introduce a security vulnerability, but it doesn’t really help with outright malicious extensions. In the end this isn’t an issue which can be solved by technical means. It’s a moderation issue, and Google currently seems to be scaling back moderation despite not being great at it to start with.
In its most innocuous form, this is stuff like SimilarWeb (which is like a more advanced Google Trends), but in the B2B world, it's also custom enterprise reports that are like "how many people that use our bank at xyz also use any other bank at this array of domains and which are most common?"
That question is answered, in the last section of the article. And: yes, they are selling it, as they admit in the privacy policy.
And then from time to time I have a dedicated profile on Chrome to use other extensions that might be useful, but I don't do day-to-day browsing there.
I have all relatives set up with a separate browser for e.g. banking, and it has no extensions at all
then the usual internet browsing one with the security nightmare than is the chrome/firefox app store
How is it, in 2024, users can still blindly install malicious software directly into their browser from a web store with Google’s name at the top of it?
This goes to show even the most cautious and conscientious of users can get caught out by their extension changing hands. What, is Google expecting us to review our extensions, and their permissions, and their authors, and their authors’ associated businesses, every time we want to use our computer?
Additionally, are we even able to review the source code of extensions if they are not open source?
A Chrome extension is basically a zip archive with a bunch of JavaScript inside. There's no safeguarding of the code within.
Does that only cover the background/web-worker or does it also include the UI parts (popup, content-ui, dev-tools...) ? That would make using something like React or Vue almost impossible.
There's a difference between minification and obfuscation, but again, I'm not sure how they adjudicate it or how much they enforce it.
This is definitely not enforced. I’ve downloaded multiple extensions in the past when I wanted to learn how they worked. All of them were obfuscated.
edit: saw the below comment and editing before this gets questioned. I’m not talking about minification. It was definitely obfuscation.
It's crazy and it's not even a "Google Scale" problem. There are only around 2,000 extensions that are popular (100k+ users) and the co-ordinated malicious activity is super blatant.
> Additionally, are we even able to review the source code of extensions if they are not open source?
Yes and you can even do this without installing the code by downloading the zip file (that contains the extension code) by using the extensionId + a get request (or using a browser)
That's why on chromium I only install extensions that have their source on GitHub, as unpacked extensions.
The problem is the organization isn't set up to promote people for proactively managing these risks. Similar to why Twitter never got rid of the bots
More importantly, they're not getting paid for any of the malicious addons. Sure, they might be getting a cut when they show fake download button (because they run the ad network), but what are they getting when sensor tower exfiltrates your browsing history? At best they're helping their competitors get better targeting data.
Making money off them didn't incentivize the grifts from coming about, but it slows down getting rid of it
???
How does this apply to a malicious third party addon?
The extensions engage in affiliate fraud (ie. injecting affiliate code/cookies to links/sessions) and collect user data. That hardly counts as "engagement on Google's properties", which are mostly search ads and youtube. To my knowledge google doesn't have an affiliate network, so they're not getting anything there either.
You seem to imply that the extensions are engaging in ad fraud (eg. viewing/clicking on ads), but there's no evidence of that presented in the OP or in this comment section.
Again not saying they are profiting off of it as much as those are numbers you get promoted for moving up and to right in the OKR, not down.
Can share some receipts if you send me an email.
Now I regularly get offered ~5 figures a month in recurring revenue to turn my extension into malware & I've see how blatant the abuses are by other extensions / the sellouts.