1 Million Browsers Turned Into Bots - Is Yours One of Them?

00:13:17
https://www.youtube.com/watch?v=IxtwKJTp7jI

Resumo

TLDRThe video explores the security and ethical concerns surrounding browser extensions, particularly highlighting an incident where nearly 1 million browsers were turned into website scraping bots. It discusses the implications of using certain extensions, such as privacy violations and security vulnerabilities, and emphasizes the need for users to audit their extensions and practice digital minimalism. The video also introduces Melotellgs, an open-source library for monetizing browser plugins, raising questions about sustainable revenue models for developers. Viewers are encouraged to reflect on their digital hygiene and consider tools like redact.dev for managing their online privacy.

Conclusões

  • 🔍 Be aware of the risks associated with browser extensions.
  • 🛡️ Audit your extensions regularly to ensure they are safe.
  • 🚫 Remove unnecessary extensions to minimize security risks.
  • 💡 Understand the permissions you grant to extensions.
  • 📊 Consider the business model behind the extensions you use.
  • 🔒 Use tools like redact.dev to manage your digital privacy.
  • 🤔 Reflect on the ethical implications of monetizing browser extensions.
  • 📉 Digital minimalism can enhance your online security.
  • 🔗 Trust but verify: don't assume all extensions are safe.
  • 👥 Share this information with friends and family to raise awareness.

Linha do tempo

  • 00:00:00 - 00:05:00

    The video discusses the ethical implications and security risks associated with browser extensions, highlighting a report from Ars Technica that revealed nearly one million browsers were turned into website scraping bots due to certain extensions. The speaker emphasizes the need for users to be aware of the permissions granted to these extensions, as many may not realize they are contributing their bandwidth and data without explicit consent. The discussion also touches on the potential vulnerabilities introduced by these extensions, which can bypass standard web security measures, making users more susceptible to attacks.

  • 00:05:00 - 00:13:17

    The speaker advises viewers to audit their browser extensions, recommending the removal of unnecessary ones and opting for those tied to reputable business models. They stress the importance of digital minimalism and being cautious about the permissions granted to extensions. The video concludes by raising ethical questions about the monetization of browser extensions and the challenges developers face in creating sustainable revenue models while respecting user privacy. Viewers are encouraged to reflect on these issues and engage in discussions about the future of digital privacy.

Mapa mental

Vídeo de perguntas e respostas

  • What incident is discussed in the video?

    The video discusses an incident where nearly 1 million browsers were turned into website scraping bots due to certain browser extensions.

  • What are some examples of problematic browser extensions?

    Examples include extensions like Extra Dim, Mimic AI, and Blue Sky Media Downloader.

  • What is Melotellgs?

    Melotellgs is an open-source library that allows developers to monetize their browser plugins.

  • What are the privacy implications of using certain extensions?

    Using these extensions can lead to unauthorized data transmission and potential privacy violations.

  • How can users protect themselves from these risks?

    Users should audit their extensions, remove unnecessary ones, and be cautious about the permissions granted to extensions.

  • What is the recommended approach to browser extensions?

    The video recommends digital minimalism, only installing necessary extensions and ensuring they have a trustworthy business model.

  • What ethical questions does the video raise?

    The video raises questions about sustainable revenue models for developers and the balance between monetization and user privacy.

  • What tool is recommended for managing digital privacy?

    Redact.dev is recommended for automatically finding and deleting old messages and attachments on social media.

  • What should users do with their browser extensions?

    Users should check their extensions, remove those they don't use, and ensure they are from trustworthy sources.

  • What is the overall message of the video?

    The video emphasizes the importance of being aware of the risks associated with browser extensions and encourages viewers to take control of their digital privacy.

Ver mais resumos de vídeos

Obtenha acesso instantâneo a resumos gratuitos de vídeos do YouTube com tecnologia de IA!
Legendas
en
Rolagem automática:
  • 00:00:00
    If you use browser extensions, which is
  • 00:00:01
    probably almost all of you watching this
  • 00:00:03
    video, you need to listen up because
  • 00:00:05
    this incident exposed some really
  • 00:00:07
    interesting things that a browsers
  • 00:00:09
    extensions can do, as well as some
  • 00:00:11
    interesting ethical questions that maybe
  • 00:00:14
    we should be asking ourselves. SARS
  • 00:00:15
    Technica put out this uh paper that
  • 00:00:17
    pretty much said browser extensions turn
  • 00:00:19
    nearly 1 million browsers into website
  • 00:00:21
    scraping bots. And I'm going to show you
  • 00:00:23
    why that is and what to do about it.
  • 00:00:25
    First, I want to walk you through the
  • 00:00:27
    extensions that this specific problem
  • 00:00:29
    impacted even before I cover the problem
  • 00:00:31
    because this sets the the scene a little
  • 00:00:33
    bit better. Some of these look like
  • 00:00:35
    obvious issues like extra dim or mimic
  • 00:00:39
    AI chrome compare. I don't know what
  • 00:00:41
    these do, but they just look like
  • 00:00:43
    problems. Some of these though look like
  • 00:00:46
    pretty reasonable things like Netflix
  • 00:00:49
    1080p light. No, I'm kidding. Like Blue
  • 00:00:51
    Sky Media Downloader. Uh, also idle
  • 00:00:54
    forest is one that I feel like I've seen
  • 00:00:56
    before and also some of these are
  • 00:00:58
    privacy oriented like user agent
  • 00:01:00
    switcher. Now these uh change your user
  • 00:01:02
    agent to try to you know get rid of
  • 00:01:04
    fingerprinting. I've covered
  • 00:01:04
    fingerprinting in this whole master
  • 00:01:06
    class to see if those are even
  • 00:01:07
    effective. Uh sneak preview they're
  • 00:01:09
    mostly not. But my point is this is a
  • 00:01:12
    huge list of a variety of extensions and
  • 00:01:15
    any of you could have at least installed
  • 00:01:17
    one of these at some point. I don't keep
  • 00:01:18
    up with these but some of these are
  • 00:01:20
    extensions I might have installed 5
  • 00:01:21
    years ago. Some of these allow you to
  • 00:01:22
    use dark mode on sites that don't
  • 00:01:24
    support dark mode. Some of these add
  • 00:01:26
    functionality to sites that don't
  • 00:01:27
    support certain features. Now, here's
  • 00:01:29
    where things get really interesting.
  • 00:01:31
    This isn't formally malware because this
  • 00:01:35
    actually comes from something called
  • 00:01:36
    Melotellgs.
  • 00:01:38
    And this was covered by someone called
  • 00:01:40
    Secure Annex. Um, and what this is, they
  • 00:01:43
    have a whole response, but this is
  • 00:01:44
    actually an open- source library that uh
  • 00:01:47
    essentially allows developers to
  • 00:01:49
    monetize their browser plugins. Now, you
  • 00:01:52
    might already start to see the ethical
  • 00:01:54
    considerations here because they are
  • 00:01:56
    very much in the camp that they're doing
  • 00:01:58
    something good and they're offering a
  • 00:01:59
    monetization strategy for developers
  • 00:02:01
    that doesn't otherwise really exist. And
  • 00:02:03
    so, this is a good alternative to the
  • 00:02:05
    maybe advertising industry or the
  • 00:02:08
    surveillance industry. So, here's how
  • 00:02:09
    Melat works. So, you as a developer
  • 00:02:12
    essentially implement this so that you
  • 00:02:13
    can monetize off of your users. What
  • 00:02:16
    this does, it declares a couple
  • 00:02:17
    permissions that you need to add. Um,
  • 00:02:19
    and then those permissions are used to
  • 00:02:21
    essentially uh generate incognito
  • 00:02:23
    windows without you seeing. And this all
  • 00:02:26
    happens in the background. And you can
  • 00:02:28
    see the example here of idle forest is
  • 00:02:30
    what they use. Um, what you do is you
  • 00:02:32
    click start planting. And that now
  • 00:02:34
    allows you to contribute your unused
  • 00:02:37
    bandwidth to this extension. And then
  • 00:02:39
    the researcher says that it sends device
  • 00:02:40
    info like location, bandwidth,
  • 00:02:42
    available, heartbeats, and status. Now
  • 00:02:44
    what's interesting is this loads an
  • 00:02:46
    iframe. Now, if you don't know what
  • 00:02:47
    iframes are, uh, all you really need to
  • 00:02:49
    know is that they can be manipulated in
  • 00:02:51
    a lot of ways to steal data about you or
  • 00:02:53
    a lot of security vulnerabilities can
  • 00:02:55
    actually utilize iframes. And so,
  • 00:02:57
    websites a lot of times, properly
  • 00:02:59
    designed websites will have things
  • 00:03:00
    called content security policies and
  • 00:03:02
    x-frame options and different things
  • 00:03:03
    that are designed to prevent this kind
  • 00:03:05
    of stuff from happening. And the way
  • 00:03:07
    that this works, the way that this these
  • 00:03:09
    extensions work actually bypass um the
  • 00:03:12
    way that web browsing is supposed to
  • 00:03:14
    work so that sites can be properly
  • 00:03:15
    secure. So, when you use extensions like
  • 00:03:18
    this, not only is there this potential
  • 00:03:20
    privacy issue that we're going to talk
  • 00:03:21
    about shortly, but there's this security
  • 00:03:23
    issue as well because sites are actually
  • 00:03:25
    not being utilized in a way that they're
  • 00:03:27
    intended to be utilized based on their
  • 00:03:29
    own security policies. The way the
  • 00:03:30
    author describes this is the weakening
  • 00:03:32
    of all web browsing can open users up to
  • 00:03:34
    attacks like cross-sight scripting that
  • 00:03:36
    would generally be prevented under
  • 00:03:37
    normal conditions. Not only are your
  • 00:03:39
    users unintentionally becoming bots, but
  • 00:03:41
    their actual web browsing is more
  • 00:03:42
    vulnerable as well. The researcher
  • 00:03:44
    actually dives a little bit more into
  • 00:03:46
    like the personal stuff and covers how
  • 00:03:48
    the owner of this extension also owns a
  • 00:03:50
    lot of the extensions that it doesn't
  • 00:03:52
    seem like it's owned by them, which is a
  • 00:03:54
    bit sketchy. And actually, they came
  • 00:03:56
    forward and gave a lot of the rebuttals
  • 00:03:57
    and pretty much addressed like, oh yeah,
  • 00:03:59
    we do do this. We don't do this. Here's
  • 00:04:01
    context behind why we do this. I
  • 00:04:03
    recommend reading all of it cuz it's a
  • 00:04:05
    pretty complicated situation. But here's
  • 00:04:07
    my problem. Actually, multiple problems
  • 00:04:10
    that I have with this story. One, I
  • 00:04:12
    don't think a lot of people understand
  • 00:04:13
    what contributing bandwidth means if
  • 00:04:15
    they were actually trying to contribute
  • 00:04:16
    bandwidth. But most likely, like most
  • 00:04:19
    people, if you're using one of these
  • 00:04:20
    extensions, um, you're not actually
  • 00:04:22
    freaking aware that stuff is happening
  • 00:04:24
    in the background, which is this entire
  • 00:04:26
    consent problem that really needs to be
  • 00:04:28
    addressed. This seriously matters and
  • 00:04:30
    could impact a lot of people. Not only
  • 00:04:33
    is there a potential performance impact
  • 00:04:34
    if again you're not opting in to use a
  • 00:04:37
    service like this where you're
  • 00:04:38
    contributing your bandwidth to a
  • 00:04:39
    developer's paycheck which fully
  • 00:04:41
    understandable. I know it's hard to be a
  • 00:04:42
    developer but if you weren't aware you
  • 00:04:44
    were doing that that's a bit shady.
  • 00:04:46
    There are of course privacy implications
  • 00:04:48
    with this as well. Um like we said there
  • 00:04:50
    is some sort of data transmission that's
  • 00:04:52
    happening here and they do say that
  • 00:04:53
    they're more private um and they are
  • 00:04:56
    better for privacy than the traditional
  • 00:04:57
    advertising industry but I don't think
  • 00:04:59
    that's the best bar for us to try to
  • 00:05:00
    shoot for. Now, as for the actual
  • 00:05:03
    privacy implications, it seems to be
  • 00:05:04
    pretty hard to figure out what's going
  • 00:05:06
    on. So, either way, the fact that this
  • 00:05:09
    is in question should be a concern for
  • 00:05:11
    many of you. And of course, we talked
  • 00:05:12
    about the security risks, how the entire
  • 00:05:14
    way that this extension works actually
  • 00:05:16
    breaks the model of how you're supposed
  • 00:05:18
    to have proper security on websites.
  • 00:05:20
    Now, before I touch on uh what to do
  • 00:05:21
    about this and how to make sure your
  • 00:05:23
    extensions aren't caught in this, I want
  • 00:05:24
    to also touch on another important tool
  • 00:05:26
    that's also the sponsor of our video,
  • 00:05:28
    where we're death. I'm a firm believer
  • 00:05:30
    there is no magic bullet for privacy and
  • 00:05:32
    security and that you need to use
  • 00:05:34
    multiple tools in different areas of
  • 00:05:36
    your life for maximum effectiveness. And
  • 00:05:39
    I think redact.dev is a perfect solution
  • 00:05:41
    that fits into a lot of people's
  • 00:05:43
    workflows. If you've ever wanted to
  • 00:05:45
    delete any social media accounts or
  • 00:05:46
    specific messages or maybe just
  • 00:05:48
    attachments in your DMs, redact.dev
  • 00:05:51
    helps you automatically find and delete
  • 00:05:53
    old messages, attachments, images. The
  • 00:05:56
    customization just lets you do whatever
  • 00:05:58
    you want. so you can actually take
  • 00:05:59
    control of your data. It works with
  • 00:06:01
    major platforms like Twitter and
  • 00:06:03
    Discord. It has automated services so
  • 00:06:05
    that you can just run it in the
  • 00:06:07
    background. And my personal favorite
  • 00:06:08
    feature is it lets you do things like
  • 00:06:10
    ephemeral timelines so that maybe your
  • 00:06:12
    tweets get automatically deleted after a
  • 00:06:15
    month. My favorite thing about Redact 2
  • 00:06:16
    is that it's trustless. They don't
  • 00:06:18
    actually store your credentials on their
  • 00:06:20
    end. It's all done locally on your
  • 00:06:22
    machine. In fact, if you set up Redact
  • 00:06:23
    on a second device, you have to sign
  • 00:06:25
    into your accounts again on that device
  • 00:06:27
    because it's all done locally on each
  • 00:06:29
    device, so they never get your
  • 00:06:30
    credentials. To put it simply, if you're
  • 00:06:32
    trying to improve your digital
  • 00:06:33
    footprint, make yourself a little more
  • 00:06:35
    minimal, make it harder for data brokers
  • 00:06:37
    to track you, redact.dev is probably the
  • 00:06:39
    best thing you can use. Visit them using
  • 00:06:41
    the link here on the screen or down in
  • 00:06:43
    the description. And now, back to the
  • 00:06:45
    video. Before I get into the protection
  • 00:06:47
    tips, I want to just cover some basic
  • 00:06:49
    things that are pretty much staples in
  • 00:06:51
    the tech lore community, which is this
  • 00:06:52
    channel. It's a digital rights
  • 00:06:54
    community. Um, always advocated for
  • 00:06:56
    digital minimalism. And what this means
  • 00:06:58
    in the context of extensions is you only
  • 00:07:00
    should be installing extensions you
  • 00:07:01
    absolutely need. And if you actually go
  • 00:07:03
    up here, you're going to see that uh my
  • 00:07:06
    browser right here literally has one
  • 00:07:08
    extension that comes pre-installed, and
  • 00:07:09
    it's Ublock Origin, which is a very safe
  • 00:07:11
    and trusted extension. And then I have
  • 00:07:13
    another browser that has Ublock Origin
  • 00:07:15
    as well as a password manager, but
  • 00:07:17
    that's it. Now, why I recommend keeping
  • 00:07:19
    extensions to a minimum besides this
  • 00:07:21
    story, extensions are notoriously not
  • 00:07:24
    very security first nor privacy first.
  • 00:07:26
    And so, it's one of the things that we
  • 00:07:28
    want to reduce um the usage as much as
  • 00:07:30
    possible. On top of that, extensions
  • 00:07:32
    have a lot of access to your system,
  • 00:07:34
    especially if you grant it access to
  • 00:07:36
    every website you're on. So, you want to
  • 00:07:38
    be very aware of this and make sure
  • 00:07:39
    you're reducing the amount of people
  • 00:07:41
    that have access to that data to lower
  • 00:07:43
    the likelihood that someone's doing
  • 00:07:45
    something wrong with it. With that said,
  • 00:07:47
    let's talk about what you should do.
  • 00:07:48
    First, go through this list and see if
  • 00:07:51
    your extensions are impacted by this
  • 00:07:53
    specific problem. But realistically,
  • 00:07:56
    there are so many issues that extensions
  • 00:07:58
    can pose that aren't only represented in
  • 00:08:01
    this problem. So, what I would do, and
  • 00:08:03
    this is step one, go through your
  • 00:08:04
    extensions and just remove things that
  • 00:08:06
    you literally never use. Um, I know a
  • 00:08:09
    lot of people that are like, "Oh, I
  • 00:08:10
    don't know why I have this extension
  • 00:08:11
    anymore. I haven't used it in months."
  • 00:08:13
    That's the extension to remove right
  • 00:08:14
    now. Next, you want to have a little bit
  • 00:08:17
    of discomfort and apply like remove a
  • 00:08:19
    few extra ones beyond that. Uh in terms
  • 00:08:22
    of how to choose the ones to go from
  • 00:08:24
    there, I like to look for extensions
  • 00:08:26
    that are tied to um some kind of broader
  • 00:08:29
    business model where it's not just the
  • 00:08:31
    extension. A really good example of this
  • 00:08:33
    is password managers. Your password
  • 00:08:35
    manager, if you're using something like
  • 00:08:37
    Proton Pass, if you're using something
  • 00:08:38
    like Bit Warden, if you're using
  • 00:08:40
    something like One Password, these all
  • 00:08:42
    have their own business model that's
  • 00:08:44
    independent of their extension. And
  • 00:08:46
    their extension is just an extension
  • 00:08:49
    of their service. And that's what they
  • 00:08:52
    should be. What you need to avoid is
  • 00:08:54
    extensions. That is their whole product.
  • 00:08:56
    This reminds me of Shark Tank where
  • 00:08:58
    sometimes they say like, "Oh, this is a
  • 00:09:01
    product, not a business." And this is
  • 00:09:02
    the same situation. An extension should
  • 00:09:04
    be the equivalent of a product, uh, but
  • 00:09:06
    not the entire business. So, try to go
  • 00:09:08
    through your extensions, uninstall what
  • 00:09:10
    you don't need, see what actually has a
  • 00:09:12
    real business model with a real company
  • 00:09:14
    behind it that doesn't need to just
  • 00:09:15
    monetize off of your browsing data. And
  • 00:09:18
    of course, if you need something done,
  • 00:09:20
    see if there's a better dedicated
  • 00:09:21
    solution for it. In the context of dark
  • 00:09:24
    mode readers, maybe what that means is
  • 00:09:26
    moving over to a browser that just has a
  • 00:09:28
    better dark mode support. Bray, for
  • 00:09:30
    example, has a reader mode that you can
  • 00:09:32
    use to read articles in dark mode, even
  • 00:09:33
    if the site doesn't have a dark mode.
  • 00:09:35
    And Safari, I believe, has something
  • 00:09:37
    similar as well nowadays. But that's an
  • 00:09:39
    example of how you can repurpose uh
  • 00:09:41
    different tools to avoid needing to
  • 00:09:43
    install an extension that has access to
  • 00:09:45
    a lot of sites and can cause a lot of
  • 00:09:47
    damage. So, please pause this video
  • 00:09:49
    right now, go check your extensions, and
  • 00:09:51
    do it on all your browsers. But keep in
  • 00:09:53
    mind that this also has broader
  • 00:09:54
    implications that I really want to
  • 00:09:56
    remind people about. First, this really
  • 00:09:59
    implicates extension stores, right?
  • 00:10:02
    because there's a lot of trust that you
  • 00:10:03
    give when you go to the Google Chrome
  • 00:10:05
    store or the Misilla Firefox store and
  • 00:10:07
    you say install extension, it's assumed
  • 00:10:09
    that extension is safe and it's not
  • 00:10:10
    doing anything nefarious. But it's not
  • 00:10:13
    really always the case as we see over
  • 00:10:16
    and over and over. So this story is a
  • 00:10:19
    good reminder to not have absolute faith
  • 00:10:21
    in browser extension stores and that
  • 00:10:24
    they need to step up their game in terms
  • 00:10:26
    of being transparent about what each
  • 00:10:27
    extension actually does on your system.
  • 00:10:29
    Browsers are also moving in a positive
  • 00:10:31
    direction in this way because browsers
  • 00:10:33
    are developing extension systems that uh
  • 00:10:35
    reduce the amount of permissions and
  • 00:10:37
    things extensions can do which does have
  • 00:10:39
    some benefits to security. And of course
  • 00:10:41
    this isn't an issue just for extensions.
  • 00:10:44
    Uh this is a good reminder that you need
  • 00:10:45
    to really watch your digital hygiene
  • 00:10:48
    everywhere. These issues I'm talking
  • 00:10:49
    about plague apps on the app store.
  • 00:10:51
    There are third party SDKs that
  • 00:10:54
    essentially just are there to track your
  • 00:10:56
    data, share it with data brokers and
  • 00:10:57
    that's purchased by either governments
  • 00:10:59
    or private companies and that's all
  • 00:11:01
    through just kind of whatever apps that
  • 00:11:03
    you wouldn't think twice about using
  • 00:11:05
    also programs in your computer and
  • 00:11:06
    really everything else you do on your
  • 00:11:08
    systems. So I really want all of you to
  • 00:11:10
    treat this incident as a reminder to
  • 00:11:12
    audit everything on your devices, remove
  • 00:11:14
    things you don't need and really see if
  • 00:11:15
    you have trustworthy solutions in place
  • 00:11:17
    for the rest of it. Now, I want to take
  • 00:11:19
    a minute to address the ethical
  • 00:11:20
    questions because this is something that
  • 00:11:22
    I think everybody should reflect on. I
  • 00:11:24
    don't have answers, but as a content
  • 00:11:26
    creator and somebody who publishes to
  • 00:11:28
    the internet and does make money off of
  • 00:11:30
    this, um, it's a really tough place to
  • 00:11:33
    be in because Templar makes money off of
  • 00:11:35
    YouTube advertising. Not a huge amount,
  • 00:11:37
    but some of the money that we make comes
  • 00:11:39
    from YouTube advertising. But also uh we
  • 00:11:41
    make money from the community, we make
  • 00:11:43
    money from sponsors, we make money from
  • 00:11:45
    affiliates and uh we have this really
  • 00:11:47
    diverse source of income. But if you're
  • 00:11:49
    a developer, it's you know of an
  • 00:11:51
    extension. It's really hard to have that
  • 00:11:53
    kind of diversity and all these
  • 00:11:55
    different revenue models that hold each
  • 00:11:56
    other accountable and also ensure that
  • 00:11:58
    you're not over prioritizing just one
  • 00:12:01
    thing over all the others. Maybe Melo
  • 00:12:03
    has a point. They are trying to build an
  • 00:12:05
    alternative to the you know traditional
  • 00:12:07
    surveillance system. At minimum, it's
  • 00:12:10
    open source. They try to be more privacy
  • 00:12:12
    respecting. Um, and they're trying to
  • 00:12:14
    essentially create a new revenue revenue
  • 00:12:16
    model for developers. And that mission
  • 00:12:18
    in itself is a noble one. What's worth
  • 00:12:21
    asking though is is that the correct
  • 00:12:23
    one? And really, what is the best
  • 00:12:25
    long-term sustainable solution for
  • 00:12:27
    situations like this? How are we going
  • 00:12:29
    to allow developers to grow and be
  • 00:12:31
    sustainable and build the cool stuff
  • 00:12:32
    that we enjoy using while making sure
  • 00:12:34
    they still get food on their plates?
  • 00:12:36
    This whole story has really introduced a
  • 00:12:38
    lot of questions for me and I don't have
  • 00:12:40
    that many answers but I think it's
  • 00:12:41
    really worth all of us reflecting on um
  • 00:12:43
    what this means for the digital
  • 00:12:45
    landscape and I would love to hear your
  • 00:12:47
    comments. So like please it's not just
  • 00:12:49
    like a engagement thing like no please
  • 00:12:51
    leave your comments down below. I'd love
  • 00:12:52
    to read them and kind of get some third
  • 00:12:54
    party perspectives on this. Check your
  • 00:12:56
    extensions right now. Share this with
  • 00:12:57
    friends or family cuz a lot of people
  • 00:12:59
    don't know that extensions do this
  • 00:13:00
    stuff. And of course join our community
  • 00:13:02
    for more security updates. Uh we have a
  • 00:13:04
    good forum. It's open source and it's
  • 00:13:06
    all down in the description. And uh I
  • 00:13:08
    also want to thank redact.dev for
  • 00:13:10
    sponsoring our content and making this
  • 00:13:11
    stuff possible. Thank you all for
  • 00:13:13
    watching and I'll see you next time on
  • 00:13:15
    Techlorore. Stay safe out there.
Etiquetas
  • browser extensions
  • privacy
  • security
  • digital minimalism
  • Melotellgs
  • data transmission
  • ethical questions
  • digital hygiene
  • Redact.dev
  • user awareness