Fear not, for they even track you on uninstall, by setting what page opens when you uninstall the extension and tacking on a ton of tracking parameters. They add:
- the install date
- your *unique* install ID
- the browser extension ID (which is Firefox *is unique to each install; in Chromium it is unique to each extension, and thus meaningless)
- some of the tracking stuff from my earlier toot (specifically the campaign ID, affiliate ID, the "install source" - which is set by the affiliate, bundle ID, and offer ID)
All of this is tacked onto hxxps://www.surveymonkey.com/r/AdawareAdBlock_Uninstallation?
I am not sure if Survey Monkey actually records the content of these tracking parameters, but it's still not great to have that data sent to a remote server
> The oddest change, however, is in the "Trusted sites": They have completely disabled uBo on a long list of websites including but not limited to Yahoo, OutLook, Microsoft, and Google
For others that is about to misunderstand this sentence...
Then, This Malicious software have disabled Ublock Ogirin as a "Trusted site" WHILE they have ADDED malicious and very dangerous site like #Google #Micrsoft and #Yahoo
Sorry for writing this addendum @iampytest1 but I got confused and thought something else.
PS: is this the addon from adaware\.com (https://0xacab.org/my-privacy-dns/matrix/-/issues/7604) or something else we should have stopped ASAP?
@iampytest1 Come to revisit the domain as I found I've forgotten to add it to our malicious category (Was on the source lists, don't worry) but then I come to stumble on the link for "buying" the malicious software... Never seen this much tracking code for buying a product
https\://store\.adaware\.com/clickgate/join.aspx?ref=adaware.com/free-antivirus-download&ujid=0VXbFykx2LA%3D&mkey3=web_body
Damned, and that should be a "Antivirus + Privacy + PC Performance" product...
Leaving the picture for other to judge for them self 😏
UPDATE:
Oh it is just getting better and better 😄 have a smile and a 🍪