Author: Joe Dilla Date: To: segfault CC: tails-testers Subject: Re: [Tails-testers] ***Urgent possible major security flaw,
Thanks for both of your prompt replies, after reading the blog post about
the developer that discovered it and seeing the extension still actively
used within tor caused concern that there may be integrated malicious
software that could compromise security.
Apologies for emailing wrong location -- Appreciate the work you all do and
will most definitely donate
On Wed, Oct 23, 2019, 10:24 AM segfault <segfault@???> wrote:
> Joe Dilla:
> > Hello, recently a couple very popular mainstream adblocking extensions
> > exposed as scams - the developers were using the plugins to make millions
> > off of unsuspecting users. One of these extensions is Ublock origin,
> > we currently have enabled in TAILS/TOR.
> > Here's an article:
> https://threatpost.com/malicious-ad-blockers-for-chrome-caught-in-ad-fraud-scheme/148591/ >
> The article states that Raymond Hill's uBlock Origin (which we ship in
> Tails) is not affected:
> The two extensions in question–AdBlock by AdBlock Inc. and uBlock by
> Charlie Lee—have names similar to existing ad blockers AdBlock by
> getadblockand uBlock.org’s uBlock or Raymond Hill’s uBlock Origin,
> Meshkov wrote.
> Also, as Muri wrote, this is not the appropiate mailinglist, I think
> tails-dev would be appropriate.
This message was posted to the following mailing lists: