Hacker Newsnew | past | comments | ask | show | jobs | submit | kimos's commentslogin

It isn’t exactly. They created a list of known extensions by their id and a file which is known to exist in that extension. The site iterates over each pair and tries to load that file, if it doesn’t error it knows the extension is installed. It’s a clever and difficult manual process, but it does bypass the security trying to prevent this kind of thing.

I read that their reasoning is it exists to block users that use known scraper extensions which bypass their terms of use. But don’t entirely buy that.


So the follow up question, is why is a random website, allowed to try and load arbitrary files?

This is how I interpreted the original question and indeed it makes no sense, JavaScript from a website should not be allowed to interact with extensions like this.

It's actually the extension injecting itself into the webpage, often to interact with it. (I imagine much of this is just looking for global ExtensionName objects.)

Actually, the article is clear about what is happening technically, and it’s both. Chrome does, in fact, allow the page to make requests for resources stored in the extension bundle, and this is one of the two fingerprinting methods that the article describes.

>JavaScript from a website should not be allowed

Agreed 100%.


I agree, and this is why I built 404. If you poke around the page a bit, you'll see a tool that prevents browser fingerprinting.

404 catches JS calls in JS proxies and returns mocked-up values (assigned by a profile), it also has protections against TLS fingerprinting, canvas fingerprinting, device enumeration, TCP/IP fingerprinting, HTTP header fingerprinting, and more.

The predatory practices that browser fingerprinting have enabled guised behind "fraud protection" are atrocious. Even with a VPN, even in incognito mode, a website can track me and see what I've been doing EVEN IF ITS NOT ON THEIR SITE.

Then a data broker buys all this data and uses an AI model to put it all into a pretty little package and sell it to Google, or the gov't, or something. It's scary.


Because extensions can and often do contain stuff like images or JS bundles that they inject into a target page's DOM. Not allowing a tab's context to load files from the chrome-extension:// namespace would break a lot of things.

True, but you'd expect the same CORS rules to apply for extensions. Only pages originating from an extension are by default able to load resources from said extension.

Chrome exposes these files via a URL that you can fetch in javascript like you would any other file on a normal website. These local extension files usually contain code, styles or images that your browser needs to run the extensions.

Why is it not a CORS violation?

The browser needing access and a random website having access are quite different. Seems like a big ol' pile of vulns waiting to happen.


CORS is a server setting to tell the browser not to load its data from potentially unsafe origins. If you set a server to send access-control-allow-origin: *, then your browser will happily load these resources for you regardless of where you currently are. And chrome extensions need to be loadable from everywhere to be able to inject code or images into pages, so enabling CORS for them would defeat their main purpose. The extensions themselves might even need to bypass an existing CORS setup for the website you are currently on to fetch additional data.

From the other end, yes extensions access all page data, but pages shouldn't access extension data at all; it feels like that should be the CORS violation.

You have it backwards. For an extension to work on a page, it's data/code needs to be accessible from said page. If your extension server in chrome enforced CORS to prevent access from tabs on other websites, extensions wouldn't work anywhere.

Firefox at least randomizes extension IDs per install. Chrome hands all of that to extension devs, basically a "your problem now".

If that were the case, the list wouldn't have extensions that relate to a users religion, income, demographics, and more.

Does the same scan is happening on firefox? Random websites invoking extensions do seem to be a security hole to me.

This was posted before and it seems that Firefox randomizes the extension URLs.

This is partially why search is doomed. Sure LLMs are overtaking search, because search has been enshitified to the point you need an LLM to even get thr answer you’re looking for.

I keep thinking how often LLMs are used to “solve” problems we created.

“Meeting starts at 3” gets fed into an LLM to turn it into a 3 paragraph email, only to be summarized by a different LLM on the other email client end as “Meeting starts at 3”. What a waste.


I clicked the link out of interest but am quite happy that the article had no image.

This removes a large portion of the magic of Ruby.

I do use class_eval quite a bit but I could pivot to precomputed script generators for those use cases going forward

I completely understand how this game is brilliant and a perfect puzzle game. But it was so hard and frustrating I could not play it.

Yeah same. I got to like the 3rd puzzle, got stuck, and never went back. I respect it, but just not for me.

I think it’s trying to demonstrate intent. “This is cool and hacking is fun” vs “Here is a tool to do bad things”. I don’t think it would much protect you from consequences, but it can change perception of the intent of the project.

I think you are right, it just feels useless.

Maybe! It won’t change liability. But perception is important too.

This makes no sense and has nothing to do with serving traffic.

More EC2 workers means more parallelism means tests map to more workers and the CI build finishes faster. It’s just CI perceived complete time.


I’m in Canada. I’ve had a couple of Kobos and I’ve loved every single one of them. The Kobo bookstore works fine. No complaints.


Yes. But to be fair there are plenty of websites that are bad enough they’re not adapted for me to be able to use it.


A subreddit or forum like this is a good resource:

https://old.reddit.com/r/BuyItForLife/

But it turns every decision into an exhausting research and optimization project.


It's only a good resource until unscrupulous marketers catch up. Which probably already happened.

Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: