0 Followers
0 Following
1 Posts
Click here: https://news.ycombinator.com/user?id=roblabla

[ my public key: https://keybase.io/roblabla; my proof: https://keybase.io/roblabla/sigs/dHVC2Jm2HgxiZRm0LlHdZ4B8lfYIXT8qY3A-hoHs89M ]

hnchat:UWnZd20LafKJcpuGyLTI
This account is a replica from Hacker News. Its author can't see your replies. If you find this service useful, please consider supporting us via our Patreon.

Officialhttps://
Support this servicehttps://www.patreon.com/birddotmakeup

It does two things:

1. Do a request to `chrome-extension://<extension_id>/<file>`. It's unclear to me why this is allowed.

2. Scan the DOM, look for nodes containing "chrome-extension://" within them (for instance because they link to an internal resource)

It's pretty obvious why the second one works, and that "feels alright" - if an extension modifies the DOM, then it's going to leave traces behind that the page might be able to pick up on.

The first one is super problematic to me though, as it means that even extensions that don't interact with the page at all can be detected. It's unclear to me whether an extension can protect itself against it.