Google blocks inline installations of Chrome Extensions from third-party websites
Google Inc. today announced that it will stop support for inline installations of Chrome extensions from outside websites as part of an ongoing push to improve the security of its market-leading web browser.
The announcement, interestingly described as bringing “transparency” to Chrome extensions, means users can directly install extensions from the Chrome Web Store only when users “can view all information about an extension’s functionality prior to installing.”
The new restrictions are being rolled out in three stages. The first stage is an immediate ban on the ability to install new extensions from third-party sites by blocking access to the chrome.webstore.install function. That’s a call that all extensions must make to be installed. Users will be redirected to the Chrome Web Store.
The second stage, to be implemented starting Sept. 12, extends the ban to existing Chrome extensions on outside websites using the same block-and-redirect function. The final stage, coming in early December, will see the inline installation API removed from Chrome 71 altogether.
“It’s crucial that users have robust information about extensions prior to installation, so that they fully understand how their browsing experience will be impacted,” Extensions Platform Product Manager James Wagner said in a blog post. “We’re confident this change will improve transparency for all users about their extension choices in Chrome.”
Although Wagner noted that the decision was motivated by complaints from users who had installed problematic Chrome extensions from third-party sites, what he doesn’t mention is that on occasion, it’s the Chrome Web Store itself, like its sibling Google Play, that’s often the distribution point for dubious extensions.
In April, AdGuard Software Ltd. researcher Andrey Meshkov revealed that there were numerous fake ad blocking Chrome extensions in the Chrome Web Store that used code stolen from legitimate ad blocking services bundled with additional malicious code. Although the code among the different fake ad blockers varied, they all had a similar theme in that they all facilitated data theft.
Google’s blocking of malicious extensions from third-party sites makes sense for users, but in security, the company also needs to look in its own backyard as well.
Image: badosa/Flickr
Since you’re here …
… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.