{"id":16557,"date":"2019-10-10T08:30:07","date_gmt":"2019-10-10T16:30:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/10\/news-10296\/"},"modified":"2019-10-10T08:30:07","modified_gmt":"2019-10-10T16:30:07","slug":"news-10296","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/10\/news-10296\/","title":{"rendered":"A Chrome security setting you shouldn&#039;t overlook"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/10\/chrome-security-setting-100813489-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: JR Raphael| Date: Thu, 10 Oct 2019 09:09:00 -0700<\/strong><\/p>\n<p>We spend tons o&#8217; time talking about <a href=\"https:\/\/www.computerworld.com\/article\/3268079\/android-security-settings.html\">Android security settings<\/a> \u2014 like the <a href=\"https:\/\/www.computerworld.com\/article\/3437337\/android-10-privacy.html\">added Android 10 option<\/a> to limit how and when apps are able to access your location. Often lost in the shuffle, though, is the fact that the Chrome desktop browser has some significant security options of its own, and they&#8217;re just as critical to consider.<\/p>\n<p>In fact, Chrome has an easily overlooked setting that&#8217;s somewhat similar to that new location control feature in Android. It&#8217;s attached to every Chrome extension you install, as of not that long ago, and it lets you decide exactly when an extension should be able to see what you&#8217;re doing on the web and be made privy to all the details (yes, even <em>those<\/em> details) of your browsing activity.<\/p>\n<p>Suffice it to say, the setting&#8217;s incredibly important. And if you&#8217;re anything like me, you might find a few eyebrow-raising surprises when you take the time to look into it.<\/p>\n<p>So don&#8217;t wait any longer: Here&#8217;s how to see precisely how much of your web browsing data different Chrome extensions are accessing \u2014 and then to take back control so they&#8217;re shown <em>only<\/em> what&#8217;s genuinely needed.<\/p>\n<p>All right, first step: Type <strong>chrome:extensions<\/strong> into your browser&#8217;s address bar, then one by one, click the Details box for every extension listed on the page.<\/p>\n<p>That&#8217;ll pull up each extension&#8217;s full information rundown. And that brings us to our second step: On each extension&#8217;s page, look for a line labeled &#8220;Site access.&#8221; With some extensions, you&#8217;ll simply see text saying &#8220;This extension has no additional site access&#8221; \u2014 meaning the extension isn&#8217;t ever able to see what you&#8217;re doing as you browse this wobly, wacky web of ours. Easy enough. Move on.<\/p>\n<p>But with other extensions, you&#8217;ll see one of three levels of access listed:<\/p>\n<p>Now, depending on what an extension is supposed to do, it may or may not legitimately need access to see and change your browsing data on any of those levels. An ad-blocking or script-blocking extension, for instance, clearly needs to be able to see and alter every page you open if it&#8217;s gonna detect and then block certain types of content for you.<\/p>\n<p>But realistically, the vast majority of extensions don&#8217;t need <em>that<\/em> much access. If anything, they need to see what you&#8217;re browsing either only on a specific URL or only when you actively click &#8217;em to activate their function. And yet, quite a few Chrome extensions request unlimited ongoing access to your web browsing data \u2014 more than a third of all extensions, according to <a href=\"https:\/\/www.zdnet.com\/article\/a-third-of-all-chrome-extensions-request-access-to-user-data-on-any-site\/\" rel=\"noopener nofollow\" target=\"_blank\">an analysis<\/a> conducted earlier this year \u2014 and when looking through my own list of installed Chrome extensions, I found some pretty perplexing examples.<\/p>\n<p>For instance: The official <a href=\"https:\/\/chrome.google.com\/webstore\/detail\/save-to-pocket\/niloccemoadcdkdjlinkgdfekeahmflj\" rel=\"noopener nofollow\" target=\"_blank\">Save to Pocket<\/a> extension, whose entire purpose is to save an article to my Pocket account for later reading whenever I click its icon, gives itself access to read my data on all websites, all the time. Let me repeat: <em>The extension&#8217;s only actual function is to save an article when I click its icon<\/em>. There is absolutely no reason the software needs to be able to see and access everything I&#8217;m doing on every web page, all of the time. And yet \u2014 well:<\/p>\n<p>No bueno.<\/p>\n<p>Another one that caught me off-guard: the official <a href=\"https:\/\/chrome.google.com\/webstore\/detail\/authy-chrome-extension\/fhgenkpocbhhddlgkjnfghpjanffonno\" rel=\"noopener nofollow\" target=\"_blank\">Authy Chrome extension<\/a>, which exists solely as a shortcut to open the full Authy app for two-factor authentication code management. This thing has no business knowing what I&#8217;m doing on the web at any given moment. And yet \u2014 here we go again&#8230;<\/p>\n<p>That&#8217;s where step three comes into play: When you come across an extension like that \u2014 and when you&#8217;ve thought it through carefully and concluded that lowering the access level won&#8217;t affect any legitimate function the software needs in order to operate \u2014 adjust its permissions by clicking one of the lower-access options in that same area.<\/p>\n<p>Here&#8217;s the catch: You may run into some instances where an extension will fail to work without the level of access it initially requires. With Pocket, for instance, I changed the extension to be able to access my site data only when I click its icon \u2014 which should, in theory, be all the thing needs to perform its limited job \u2014 and now, whenever I click its icon, I get an error informing me the page I&#8217;m viewing can&#8217;t be saved. That means I&#8217;ll have to decide whether to keep using the extension despite this apparent overreach or to ditch it entirely and replace it with an alternate solution (like the service&#8217;s <a href=\"https:\/\/getpocket.com\/add\/?ep=1\" rel=\"noopener nofollow\" target=\"_blank\">simple bookmarket<\/a> that accomplishes basically the same thing without asking for <em>any <\/em>access to my web browsing data).<\/p>\n<p>With most extensions, though, you shouldn&#8217;t see any difference in how things work after decreasing their permissions in a sensible manner. With Authy, I changed the extension to be able to access my site data only when I&#8217;m on the website authy.com (because, curiously enough, there&#8217;s no way to <em>disable<\/em> the permission entirely, so that seemed like the best way to effectively remove it). And then I directed a few choice curse words at the company for claiming such wildly unnecessary broad access in the first place. Aside from feeling disproportionately pleased with myself for my creative choice of profanity (which, regrettably, I can&#8217;t reprint here), my situation now is identical to what it was before, practically speaking.<\/p>\n<p>Other extensions whose permissions I adjusted without issue included a simple utility for identifying color codes, a tool for saving any image on the web as a PNG, and \u2014 how &#8217;bout this? \u2014 Google&#8217;s own official <a href=\"https:\/\/chrome.google.com\/webstore\/detail\/save-to-google-drive\/gmbmikajjgmnabiglmofipeabaddhgne\" rel=\"noopener nofollow\" target=\"_blank\">Save to Google Drive<\/a> extension. All of those extensions claimed the ability to read site data <em>all<\/em> the time by default, when all they really need to function (and all that&#8217;s really justifiable for them to have) is the &#8220;read on click&#8221; setting.<\/p>\n<p>Now, to be fair, it&#8217;s pretty unlikely most of these extensions did this for nefarious reasons. This granular approach to Chrome extension security settings has only existed <a href=\"https:\/\/blog.chromium.org\/2018\/10\/trustworthy-chrome-extensions-by-default.html\" rel=\"noopener nofollow\" target=\"_blank\">since last October<\/a> \u2014 and before that point, extensions were given just the binary option of requiring access to all browsing data or none. The three extensions I just mentioned were last updated prior to the point of that switch (which is a problem in and of itself, too, but we&#8217;ll save that subject for another day), so it&#8217;s likely their broad default site access permission was just a legacy carryover sort of thing. (The same is true for Authy \u2014 though notably not for Pocket, whose extension was last updated this past July.)<\/p>\n<p>Regardless, though, I now have the ability to correct that in most cases. And so I did. And so should you.<\/p>\n<p>One more thing: I&#8217;d be remiss if I didn&#8217;t mention that anytime you install a new extension from the Chrome Web Store, you&#8217;re shown a pop-up with a list of the permissions the extension requires. And, yes, included in that collection are the extension&#8217;s default settings for when it&#8217;ll be able to read and change data on sites you&#8217;re viewing.<\/p>\n<p>But look: Even the most astute of us is prone to occasionally clicking through such screens without carefully considering their implications. We&#8217;ve all done it. We&#8217;re only human. (Well, most of us are, anyway. No offense, but I&#8217;m not 100 percent sure about you.)<\/p>\n<p>So, step four: Once you finish cleaning up your <em>current <\/em>Chrome extensions&#8217; security settings, make it a personal policy from now on: Don&#8217;t just click through those disclosures. Closely review the permissions for every new extension you install \u2014 then think about whether you should change the data-viewing permission any given extension claims by default.<\/p>\n<p>The beauty of Chrome&#8217;s current setup is that you don&#8217;t <em>have<\/em> to give any extension the full level of data-viewing access it tries to demand. But it&#8217;s up to <em>you<\/em> to think it through every time \u2014 and then to take action to reclaim control over your personal data when needed.<\/p>\n<p><i>Sign up for <a href=\"https:\/\/www.androidintel.net\" rel=\"noopener nofollow\" target=\"_blank\">my weekly newsletter<\/a> to get more practical tips, personal recommendations, and plain-English perspective on the news that matters.<\/i><\/p>\n<p><strong>[<a href=\"https:\/\/www.computerworld.com\/video\/series\/8536\/android\">Android Intelligence videos at Computerworld<\/a>]<\/strong><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3445158\/chrome-security-setting.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/10\/chrome-security-setting-100813489-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: JR Raphael| Date: Thu, 10 Oct 2019 09:09:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>We spend tons o&#8217; time talking about <a href=\"https:\/\/www.computerworld.com\/article\/3268079\/android-security-settings.html\">Android security settings<\/a> \u2014 like the <a href=\"https:\/\/www.computerworld.com\/article\/3437337\/android-10-privacy.html\">added Android 10 option<\/a> to limit how and when apps are able to access your location. Often lost in the shuffle, though, is the fact that the Chrome desktop browser has some significant security options of its own, and they&#8217;re just as critical to consider.<\/p>\n<p>In fact, Chrome has an easily overlooked setting that&#8217;s somewhat similar to that new location control feature in Android. It&#8217;s attached to every Chrome extension you install, as of not that long ago, and it lets you decide exactly when an extension should be able to see what you&#8217;re doing on the web and be made privy to all the details (yes, even <em>those<\/em> details) of your browsing activity.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3445158\/chrome-security-setting.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[12014,10699,714,11619],"class_list":["post-16557","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-browsers","tag-chrome","tag-security","tag-software"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16557"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16557\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16557"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}