zlacker

[parent] [thread] 10 comments
1. Spoom+(OP)[view] [source] 2017-01-05 15:39:40
If true, that would be a bit more disappointing. Can someone verify?

Edit: Keep in mind I'm referring to developer mode installation per the link above, not directly installing the extension package from the store or a file.

replies(1): >>Artemi+X2
2. Artemi+X2[view] [source] 2017-01-05 15:58:30
>>Spoom+(OP)
I tried earlier today in Chrome Canary in developer mode and after a short while the extension disabled itself. When I try to enable it back again the console on the Extensions page says "Unchecked runtime.lastError while running management.setEnabled: Extension kkendhmcacabobepidajpejenjinojhp cannot be modified by user."
replies(1): >>malka+h4
◧◩
3. malka+h4[view] [source] [discussion] 2017-01-05 16:06:34
>>Artemi+X2
100% assholish on google side to disable side loading for a very specific extension.

The good thing of course is that it shows that they are afraid of such an extension.

replies(4): >>ashark+B8 >>em3rge+Ea >>fixerm+Mf >>_audak+jr
◧◩◪
4. ashark+B8[view] [source] [discussion] 2017-01-05 16:30:20
>>malka+h4
> The good thing of course is that it shows that they are afraid of such an extension.

Seriously. I'd figured they'd filter these "clicks" out easily server-side and didn't bother to install this thing, but this ban has hinted otherwise. I'll be installing it everywhere I can now.

replies(1): >>nine_k+Ie
◧◩◪
5. em3rge+Ea[view] [source] [discussion] 2017-01-05 16:42:27
>>malka+h4
Fortunately Chromium is open source. I would hope that linux distros downstream would patch this anti-feature.
◧◩◪◨
6. nine_k+Ie[view] [source] [discussion] 2017-01-05 17:01:40
>>ashark+B8
Why such "clicks" would be easy to filter on the server side? What distinguishes them so clearly?
replies(1): >>ashark+hf
◧◩◪◨⬒
7. ashark+hf[view] [source] [discussion] 2017-01-05 17:05:00
>>nine_k+Ie
Well, tons of them coming from one IP address, on seemingly every site that address visits, for one thing.
replies(1): >>nine_k+Qj
◧◩◪
8. fixerm+Mf[view] [source] [discussion] 2017-01-05 17:08:03
>>malka+h4
I'd imagine that if it's flagged as malware, this is correct procedure; you don't want to let users accidentally side-load malware either (too many real-world examples of people falling for "Go to this dialog, click this option, NOW click the link and it should work" attacks).
◧◩◪◨⬒⬓
9. nine_k+Qj[view] [source] [discussion] 2017-01-05 17:27:35
>>ashark+hf
"One IP address" as in "the address of the same NAT box"?

With IPv6 it could work, or maybe with the local IP address passed by the script at click time, but the latter would be trivial to forge.

replies(1): >>ashark+4l
◧◩◪◨⬒⬓⬔
10. ashark+4l[view] [source] [discussion] 2017-01-05 17:34:28
>>nine_k+Qj
Sure, but most or all ads on every page visited by a given IPV4 address surely throws up red flags, NAT notwithstanding. And all this is assuming that the extension bypasses session tracking and makes resorting to IP address necessary in the first place.

Then again maybe it doesn't, since they bothered to ban this extension. They did seemingly more-or-less give up trying to sort spam search results from low-traffic but high-value sites a few years back, so I guess they can't algorithm their way out of every abuse problem.

[EDIT] all ads on some pages visited by a given IP over some shortish span of time, I should say, in the case of NAT.

◧◩◪
11. _audak+jr[view] [source] [discussion] 2017-01-05 18:09:00
>>malka+h4
Can't you just Firefox with the extension? And then browse Google from there
[go to top]