Connect with us
Chrome will stop supporting Manifest V2 extensions from January 2023 Chrome will stop supporting Manifest V2 extensions from January 2023

Security

Chrome will stop supporting Manifest V2 extensions from January 2023

Published

on

After the end of support for the Manifest V2 specification, ad blockers may stop working.

Earlier this month, Google announced that all Chrome browser extensions written to its Manifest V2 specification would stop working in January 2023 and only Manifest V3 extensions would be supported.

How reported Product Manager, Extensions and Chrome Web Store David Li, the Manifest V3 specification, which has been in development for several years, is more secure, performant and privacy-focused than Manifest V2.

“This is an evolution of the extension platform that addresses both the changing web landscape and the future of browser extensions,” Lee said.

From January 17, 2022, new Manifest V2 extensions will no longer be accepted in the Chrome Web Store (existing V2 extensions can be upgraded), Lee said. In January 2023, Chrome will no longer run or receive updates for Manifest V2 extensions. In Chrome running under corporate policies, Manifest V2 extensions will stop working in June 2023.

Google began work on Manifest V3, a revised set of APIs for extension developers, in 2018. In early 2019, the developer of the popular ad blocker uBlock Origin, Raymond Hill, drew attention to the upcoming changes in the API and warned that in the form in which Google described them, the changes would block uBlock Origin. Then the developers of other ad blockers also realized that they needed to bring their extensions in line with Manifest v3 and, possibly, revise the functionality that will no longer be available.

As Google reassures its investors that ad blocking is a potential threat to their earnings, it is likely that it has an ulterior motive for moving to Manifest V3 – the elimination of content / ad blockers and privacy extensions.

Click to comment

Leave a Reply

Your email address will not be published.

Security

Hackers hacked Europe’s largest missile manufacturer

Published

on

Hackers hacked Europes largest missile manufacturer

Unknown hackers, acting under the nickname Adrastea, hacked into the database of the largest European missile manufacturer – MBDA, formed as a result of the merger of the French Aérospatiale-Matra Missiles, the British Matra BAe Dynamics and the Italian Finmeccanica-Leonardo. This was reported by Security Affairs.

Hackers hacked Europe's largest missile manufacturer

The attackers’ message about gaining access to the company’s network appeared on one of the forums. As evidence, a link to an archive with demo files was attached.

The total amount of stolen data was estimated by hackers at 60 GB. “The uploaded data contains confidential and confidential information about your company’s employees who took part in the development of closed military projects MBDA (PLANCTON, CRONOS, CA SIRIUS, EMADS, MCDS, B1NT, etc..) and about your company’s commercial activities in the interests of the EU Ministry of Defense (design documentation for air defense systems, missile systems and coastal defense systems, drawings, presentations, video and photo (3D) materials, contract agreements and correspondence with other companies Rampini Carlo, Netcomgroup, Rafael, Thales, ST Electronics, etc.”, the hackers wrote.

Adrastea is ready to discuss the cost of the stolen data array. MBDA has not yet commented on the incident.

MBDA manufactures a wide variety of missiles and related installations. For example, the company produces air-to-air missiles AIM-132 ASRAAM (short range, with IR guidance), MBDA Meteor (long range), MICA (medium range, with IR and radar guidance). The company’s product range also includes surface-to-air missiles – Mistral (MANPADS), MBDA Aster (medium and long range), Aspide Mk.1 (medium range), Sea Wolf (SAM), anti-ship (Exocet, Otomat, Marte, Sea Skua) and anti-tank (ERYX, Brimstone, HOT) missiles.

Continue Reading

Security

Samsung is ahead of the curve again. The company released the August security patch for three flagship lines at once

Published

on

Samsung is ahead of the curve again The company released

Samsung was the first company in the market to release the August security patch for its smartphones. Moreover, for three flagship lines at once: Galaxy S20, S21 and S22.

Samsung is ahead of the curve again.  The company released the August security patch for three flagship lines at once

Today, owners of these smartphones in Germany began to receive updates, including a security patch. Usually, users from other countries do not have to wait long. The August security patch fixes dozens of vulnerabilities, so it’s quite important.

Samsung has sometimes been ahead of even Google in recent years, releasing security patches earlier and offering longer support for its flagships, although just three or four years ago, Samsung was almost the worst in this matter.

Continue Reading

Security

Hacker withdrew about $6 million worth of ETH from decentralized streaming platform Audius

Published

on

Hacker withdrew about 6 million worth of ETH from decentralized

Audius (AUDIO) is an artist-run, community-owned music streaming platform that aims to enable anyone to freely distribute, monetize, and stream audio.

Hacker withdrew about $6 million worth of ETH from decentralized streaming platform Audius

Audius aims to return money and power to artists by connecting them directly to listeners and removing record labels and middlemen from the equation.

If bitcoin can be called the digital analogue of gold, then, according to the developers, Audius aims to be the next Spotify or SoundCloud on the blockchain. “The cryptocurrency music app aims to decentralize and democratize the music industry and give artists back more money and control.”

An unknown person was able to change the configuration of the smart contract for managing Audius, and then created a malicious offer to withdraw $6 million in AUDIO tokens.

Hacker withdrew about $6 million worth of ETH from decentralized streaming platform Audius

An unknown person was able to change data on the voting time for the proposal in the Audius smart contract, as well as the delay in the execution of the voting result. As a result of the fraud, the attacker brought the stolen cryptocurrency for sale, however, due to market slippage, he was able to sell a cryptocurrency worth $6 million for only $1.1 million in Ethereum.

According to the attacker’s address transfer history, the cryptocurrency received from the sale was “laundered” at 100 ETH per transaction through the Tornado Cash mixer.

Audius representatives confirmed the hack. The project developers claim that the functionality of the smart contract has been resumed after a detailed study. Whether Audius will compensate investors for losses remains unclear.

Continue Reading

Most Popular