• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

NoScript and other popular Firefox add-ons open millions to new attack

The vulnerability still needs a malicious extension to be installed. Not huge problem for people who only install the bare minimum like https everywhere, ublock, noscript, MAF. But many people don't realize malware/privacy implications of installing browser extensions.
 
Wow. Not too surprising though. JavaScript itself wasn't exactly designed with high security in mind.

Couldn't they introduce some sort of JS private namespace for each extension, and it would require explicitly importing the namespaces of functions and variables that it accesses, so that this sort of cross-extension programming could be more easily detected and controlled?

Or would that require too much of a revision to JavaScript's functionality itself?
 
Back
Top