Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    text
    copied!<p>I too had concerns about this, specifically a Chrome app extension called <a href="https://chrome.google.com/webstore/detail/bdglbbcbmgnimogcmcdenggkpdmihlga" rel="nofollow">Bookmark Sentry</a> as while it does do a great job of managing your bookmarks, it also injects itself and intercepts advertisements replacing it with it's own affiliate network. </p> <p>Specifically in viewing the source code it appeared to contain a 'whitelist' and 'blacklist' of sites to intercept advertising while navigating. The user is given the choice to opt-out of advertising in settings but it is poorly explained as 'marketing' with no explanation as to what it is doing.</p> <p>I raised concerns to Google Chrome through flagging of abuse. Through a contact I was informed however that:</p> <blockquote> <p>"Ad injections are not in violation of the Chrome Web Store <a href="https://developers.google.com/chrome/web-store/program_policies" rel="nofollow">program policies</a>. The policy requires that ads must be presented in the context of the extension or, when present within another page, ads must be outside the page's normal flow and clearly state which extension they are bundled with. We believe that ads are a legitimate way to monetize, but that they should be a known cost to the extension user."</p> </blockquote> <p>So in this particular case at least, Google viewed it as acceptable, curiously both Kaspersky Labs and Microsoft Security Essentials reported this immediately to me as malware and removed the Extension.</p>
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload