Thursday, November 6, 2025

Polaris of Enlightenment

The most dangerous thing in your browser

The dark side of browser extensions.

Updated July 15, 2025, Published April 26, 2025 – By Naomi Brockwell
You’re browsing the web, trying to make life a little easier. Maybe you install an extension to block annoying popups, write better emails, or even just save a few bucks with coupon codes.

Seems harmless, right?

Extensions are way more permissive and dangerous than people realize.

They might be spying on you, logging your browsing history, injecting malicious code, even stealing your passwords and cookies – all without you even realizing it.

Let’s talk about the dark side of browser extensions. Because once you see what they’re capable of, you might think twice before installing another one.

DON'T Install That Extension

Real-world attacks: From spyware to crypto theft

This isn’t a "worst-case scenario". It’s already happening.

  • North Korean hackers have used malicious browser extensions to spy on inboxes and exfiltrate sensitive emails.
  • The DataSpii scandal exposed the private data of over 4 million users—collected and sold by innocent-looking productivity tools.
  • Mega.nz, a privacy-respecting file storage service, had its Chrome extension hacked. Malicious code was pushed to users, silently stealing passwords and crypto wallet keys. It took them four hours to catch it—more than enough time for real damage.
  • Cyberhaven, a cybersecurity company, was breached in late 2024. Their extension was hijacked and used to scrape cookies, session tokens, and authentication credentials—compromising over 400,000 users.

How is this even allowed to happen?

  1. Extensions can silently update themselves. The code running on your device can change at any time—without your knowledge or approval.
  2. Permissions are ridiculously broad. Even if a malicious extension has the same permissions as a good one, it can abuse them in ways the browser can’t distinguish. Once you grant access, it’s basically an honor system.
  3. Extensions can’t monitor each other. If you think that installing a malware-blocking extension is going to protect you, think again. Your defense extensions have no way of knowing what your other extensions are up to. Malicious ones can lurk undetected, even alongside security tools.

A Shadow market for extensions

Extensions aren’t just targets for hackers—they’re targets for buyers. Once an extension gets popular, developers often start getting flooded with offers to sell. And because extensions can silently update, a change in ownership can mean a complete change in behavior—without you ever knowing.

Got an extension with 2 million Facebook users? Buy it, slip in some malicious code, and suddenly you’re siphoning data from 2 million people.

There are entire marketplaces for buying and selling browser extensions—and a thriving underground market too.

Take The Great Suspender, for example. It started as a widely trusted tool that saved memory by suspending unused tabs. Then the developer quietly sold it. The new owner injected spyware, turning it into a surveillance tool. Millions of users were compromised before it was finally flagged and removed.

The danger is in the permissions

One of the biggest challenges? Malicious extensions often ask for the same permissions as good ones. So it’s helpful to understand exactly what each permission is capable of, so that you realize how vulnerable it could make you in the wrong hands.

We spoke to Matt Frisbie, author of Building Browser Extensions, to explain the capabilities of some of these permissions:

Browsing history

Matt Frisbie:

The browser will happily dump out your history as an array.

The browsing history permission grants full access to every site you visit—URLs, timestamps, and frequency. This can help build out a detailed profile on you.

Cookies

The cookie permission exposes your browser’s cookies—including authentication tokens. That means a malicious extension can impersonate you and access your accounts without needing a password or 2FA.

Matt Frisbie:

“If someone steals your cookies, they can pretend to be you in all sorts of nasty ways.”

This is exactly how Linus Tech Tips had their YouTube account hijacked.

Screen capture

Allows extensions to take screenshots of what you're viewing. Some types trigger a popup, but tab capture does not—it silently records the visible browser tab, even sensitive pages like banking or crypto dashboards.

Matt Frisbie:

“It just takes a screengrab and sends it off, and you will never know what’s happening.”

Web requests

This lets the extension monitor all your browser’s traffic, including data sent to and from websites. Even if the data is being sent over HTTPS, to the extension it’s all in the clear. They can read form data, credit card details, everything.

Matt Frisbie:

“It’s basically a man-in-the-middle… I can see what you’re sending to stripe.com—even if their security is immaculate.”

Web navigation

Provides a live feed of your browsing behavior—what pages you visit, how you get there, and when.

Keystroke logging

Records everything you type—searches, passwords, messages—without needing any special permissions. All it takes is a content script, which runs invisibly on websites.

Matt Frisbie:

“It’s incredibly dangerous and very easy to do.”

Input capture

Watches for changes in form fields, allowing extensions to steal autofilled passwords or credit card numbers—even if you don’t type anything.

Matt Frisbie:

“Anytime an input changes—login box, search bar, credit card entry—this extension can capture what’s changed.”

Geolocation

Extensions can’t access your location in the background. But they can render a user interface—like a popup window—and collect your location when you interact with it. If you’ve granted the extension geolocation permission, it can capture your location every time you open that popup.

Even sneakier? Extensions can piggyback off websites that already have location access. If you’ve allowed a site like maps.google.com or hulu.com to use your location, an extension running on that site can silently grab it—no popup required.

Matt Frisbie:

“If the user goes to maps.google.com and they’ve previously said maps.google.com can read my location… then the extension can piggyback on that and grab their location. No pop-ups generated.”

Other Piggybacking

If you’ve granted a site permission—like location, notifications, or potentially even camera and microphone—an extension running on that same site can sometimes piggyback off that access and silently collect the same data.

Matt Frisbie:

“It is actually possible to piggyback off the page’s permissions. … It really shouldn’t work that way.”

So… How Do You Protect Yourself?

Here are some smart rules to follow:

  • Understand permissions
    Know what you’re granting access to, and what that permission might be capable of.
  • Be careful granting any permissions
    Whether it’s a browser setting, a site request, or an extension prompt, even a single permission can open the door to surveillance.
  • Use extensions sparingly
    The more extensions you install, the larger your attack surface—and the more unique your browser fingerprint becomes.
  • Use a privacy-first browser instead
    Browsers like Brave build privacy protections—like ad and tracker blocking—directly into the browser itself, so you don’t need extensions just to stay private.
  • Follow the principle of least privilege
    Only allow an extension to run when you click it, instead of “on all websites.”
  • Use code review tools
    Sites like Extension Total and Secure Annex can help you vet extensions before you install them.

Takeaway

We all want our browser to be faster, cleaner, and more functional. Extensions can help—but they can also turn into powerful surveillance tools. Even a single line of malicious code, slipped in through an update or new owner, can put your most sensitive information at risk.

So before you install that next extension, ask yourself:
Do I really trust this extension not to be hacked, sold, or misused—and is the extra risk worth it?

Stay sharp. Stay private. Stay safe out there.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

Swedish police secretly using Palantir’s surveillance system for years

Mass surveillance

Published November 4, 2025 – By Editorial staff
Palantir Technologies headquarters in Silicon Valley.

The Swedish Police Authority has for at least five years been using an AI-based analysis tool from the notorious American security company Palantir.

The program, which has been specially adapted for Swedish conditions, can within seconds compile comprehensive profiles of individuals by combining data from various registers.

Behind the system stands the American tech company Palantir, which is internationally controversial and has been accused of involvement in surveillance activities. This summer, the company was identified in a UN report as complicit in genocide in Gaza.

The Swedish version of Palantir's Gotham platform is called Acus and uses artificial intelligence to compile, analyze and visualize large amounts of information. According to an investigation by the left-wing newspaper Dagens ETC, investigators using the system can quickly obtain detailed personal profiles that combine data from surveillance and criminal registers with information from Bank-id (Sweden's national digital identification system), mobile operators and social media.

A former analyst employed by the police, who chooses to remain anonymous, describes to the newspaper how the system was surrounded by great secrecy:

— There was very much hush-hush around that program.

Rejection of document requests

When the newspaper requested information about the system and how it is used, they were met with rejection. The Swedish Police Authority cited confidentiality and stated that they can neither "confirm nor deny relationships with Palantir" citing "danger to national security".

This is not the first time Palantir's tools have been used in Swedish law enforcement. In the high-profile Operation Trojan Shield, the FBI, with support from Palantir's technology, managed to infiltrate and intercept the encrypted messaging app Anom.

The operation led to the arrest of a large number of people connected to serious crime, both in Sweden and internationally. The FBI called the operation "a shining example of innovative law enforcement".

But the method has also received criticism. Attorney Johan Grahn, who has represented defendants in several Anom-related cases, is critical of the approach.

— In these cases, it has been indiscriminate mass surveillance, he states.

Mapping dissidents

Palantir has long sparked debate due to its assignments and methods. The company works with both American agencies and foreign security services.

In the United States, the surveillance company's systems are used to map undocumented immigrants. In the United Kingdom, British police have been criticized for using the company's technology to build registers of citizens' sex lives, political views, religious affiliation, ethnicity and union involvement – information that according to observers violates fundamental privacy principles.

This summer, a UN report also identified Palantir as co-responsible for acts of genocide in Gaza, after the company's analysis tools were allegedly used in attacks where Palestinian civilians were killed.

How extensive the Swedish police's use of the system is, and what legal frameworks govern the handling of Swedish citizens' personal data in the platform, remains unclear as long as the Swedish Police Authority chooses to keep the information classified.

OpenAI shifts from Microsoft to Amazon in new partnership

Published November 4, 2025 – By Editorial staff
OpenAI logo. The AI company has signed a seven-year cloud agreement with Amazon Web Services worth $38 billion.

AI company OpenAI has entered into a comprehensive agreement with Amazon Web Services worth $38 billion. The deal marks a clear step away from Microsoft's previous monopoly position as cloud provider.

According to the agreement announced on Monday, OpenAI gains immediate access to hundreds of thousands of graphics cards from Nvidia in American data centers.

Scaling frontier AI requires massive, reliable compute. Our partnership with AWS strengthens the broad compute ecosystem that will power this next era and bring advanced AI to everyone, says OpenAI CEO Sam Altman to CNBC.

Amazon's stock closed four percent higher on Monday and reached a record high closing value. Over the past two trading days, the e-commerce giant has risen 14 percent, the best two-day period since November 2022.

Seven-year agreement

Until this year, OpenAI had an exclusive cloud agreement with Microsoft, which first backed the company in 2019 and has invested a total of $13 billion. In January, Microsoft announced that they would no longer be the exclusive cloud provider, but instead have right of first refusal on new requests.

Last week, Microsoft's preferential status expired according to renegotiated commercial terms, which freed OpenAI to collaborate more broadly with other major cloud providers. However, OpenAI will continue to spend large sums with Microsoft, which was confirmed last week when the company announced they will purchase additional Azure services for $250 billion.

For Amazon, the agreement is significant both in size and scope, but also somewhat sensitive since the cloud giant has close ties with OpenAI's rival Anthropic. Amazon has invested billions of dollars in Anthropic and is currently building an $11 billion data center in Indiana that is designed exclusively for Anthropic.

The agreement between OpenAI and Amazon is valid for seven years, but at present, no plans beyond 2026 have been finalized.

IT expert warns: ID requirements online bring us closer to totalitarian surveillance

Mass surveillance

Published November 3, 2025 – By Editorial staff
Swedish Liberal Party politician Nina Larsson wants to introduce age verification – but IT experts warn of serious consequences

IT security specialist Karl Emil Nikka advises Sweden against following the UK's example of mandatory age verification on pornographic websites. The risk of data breaches and increased surveillance is too great, he argues.

Swedish Gender Equality Minister Nina Larsson wants Sweden to introduce technical barriers requiring age verification on pornographic websites to protect children from explicit sexual content.

The proposal is based on the British model where websites must verify users' age or identity, for example through authentication with ID cards or credit cards.

But Karl Emil Nikka, an IT security specialist, is strongly critical of the proposal. He points to serious flaws in the British solution, not least the risk of data breaches.

As an example, he mentions the leak from the messaging platform Discord, where photos of 70,000 users ended up in the wrong hands after a cyberattack in connection with the law change. Additionally, the barriers are easy to circumvent using VPN services, which caused the use of such services to skyrocket when the British law came into effect.

Risks surveillance

Nikka also warns that requirements for online identification bring Sweden closer to a type of surveillance that otherwise only exists in totalitarian states.

— It's a small problem as long as we live in a democracy, but it's damn dangerous to believe we always will, he says.

Instead, parents should be encouraged to use the controls already built into phones and other devices, where one can easily choose which sites to block.

— From a security perspective, it's the only reasonable solution, Nikka states.

Foreign sites attract

An additional risk with technical barriers is that young users turn to lesser-known foreign sites that don't care about legal requirements, Nikka argues. Jannike Tillå, head of communications and social benefit at the Swedish Internet Foundation, confirms this picture.

— According to experts in various countries, it seems that people have turned to other lesser-known websites abroad, she says.

However, Tillå believes that technical solutions can have a place, provided they are more anonymous than the British ones and combined with other measures.

— It can help raise thresholds and reduce exposure.

Conversations crucial

At the same time, she emphasizes the importance of complementing any technical solutions with investments in digital literacy and, above all, conversations between parents and children.

— That's where real protection begins. We know that many parents find it difficult to have the porn conversation, but you should do it early, says Jannike Tillå.

She stresses that the question of privacy and freedom online must not be set against child protection.

— We must find that balance and manage both things, she concludes.

Musk plans data centers in space using Starlink satellites

The future of AI

Published November 2, 2025 – By Editorial staff
Photo: Space X

Elon Musk's space company SpaceX announces plans to build data centers in space based on Starlink satellites. Interest in space-based data storage is surging among tech giants as artificial intelligence demands increasingly more computing power.

Artificial intelligence is driving a growing need for data storage and processing power, prompting several tech companies to turn their attention to space. After former Google CEO Eric Schmidt acquired space company Relativity Space in May, and Amazon founder Jeff Bezos predicted gigawatt-scale data centers in space within 10 to 20 years, Elon Musk is now entering the race.

In a post on social media platform X, Musk explained that SpaceX satellites could be used for this purpose. "Simply scaling up Starlink V3 satellites, which have high speed laser links would work. SpaceX will be doing this", he wrote in response to an article about the potential for space-based data centers.

Musk's announcement dramatically raises the profile of this emerging industry. SpaceX's Starlink constellation is already the world's dominant space-based infrastructure, and the company has demonstrated it can profitably deliver high-speed broadband to millions of customers worldwide.

Free energy and no environmental costs

Advocates for space-based data centers highlight clear advantages: unlimited and free energy from the sun, as well as the absence of environmental costs associated with building these facilities on Earth, where opposition to energy-intensive data centers has begun to grow.

Critics argue, however, that it is economically impractical to build such facilities in space and that proponents underestimate the technology required to make it work.

Caleb Henry, research director at analytics firm Quilty Space, believes the development is worth watching closely.

— The amount of momentum from heavyweights in the tech industry is very much worth paying attention to. If they start putting money behind it, we could see another transformation of what's done in space, he says in an interview.

Tenfold capacity

SpaceX's current Starlink V2 mini satellites have a maximum download capacity of approximately 100 Gbps. The upcoming V3 satellite is expected to increase this capacity tenfold, to 1 Tbps. This is not an unprecedented capacity for individual satellites – telecom company Viasat has built a geostationary satellite with the same capacity that will soon be launched – but it is unprecedented at the scale SpaceX is planning.

The company intends to launch around 60 Starlink V3 satellites with each Starship rocket launch. These launches could occur as early as the first half of 2026, as SpaceX has already tested a satellite dispenser on Starship.

— Nothing else in the rest of the satellite industry that comes close to that amount of capacity, Henry notes.

Exactly what a "scaling up" of Starlink V3 satellites would look like is not clear, but the development speaks for itself. The first operational Starlink satellites were launched just over five years ago with a mass of approximately 300 kg and a capacity of 15 Gbps. Starlink V3 satellites will likely weigh 1,500 kg.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.