There is much worse thing nobody care about for a long time in Chrome and Firefox. It named Goolge Safe Browsing. And it is not an extension you have to install, it is a feature turned on by default. Both browsers and all their forks without exception have that feature in its code.
Google Safe Browsing already fully used to limit access to alternative news sites - f.e. https://support.mozilla.org/en-US/questions/1319310
There is another censorship tool in browsers - the system of "Trusted CA". It declared to provide "privacy" and "protection", however that is not true at all. Formally, there are some "Trusted CA"'s that sign sites certificates and that should be some kind of guarantee that certificate belongs to that site. Of course "Trusted CA" is mostly big companies and government institutions. So, if site have HTTPS ceritficate signed by one of that "Trusted CA", then it is assumed that it is good valid site. That system could be working if any "Trusted CA" who sign a certificate of some site for a third-party immidiately and forever removed from list of "Trusted CA". However, episode with China Trusted CA CNNIC, who was caught by hand for sigining popular sites certificates for some murky organizations and China surveillance agencies, absolutely proves that declared system does not work at all, since CNNIC is still in list of that "Trusted CA". It is also interesting, that if such "Trusted CA" sign a certificate for, say, conspiracies.win for third-patry and that third-party do a MitM attack using that certificate, user will not be notified at all, since that "Trusted CA" is in browser "Trusted CA" list. On the same time both Google and Mozilla overcomplicated use of self-signed certificates, they show scary warning and there are no easy for regular user way to allow visiting sites with self-signed certificates. Interesting, that if you turn that crap off and add self-signed certificate to "known", there will be no way for third-paty to make a MitM unnoticed, browser will show a warning that certificate changed and you will know that something goes wrong. Also, that dumb fraudulent warning about plain HTTP sites without any form fields that "could steal your password" is also kind of censoship.
They tie every site to some bigmoney or government "Trusted CA" that could revoke site certificate at any moment without any reason and if you want to use self-signed certificate, or don't want to use engryption at all, most users will see scary fraudlent warning that pose your site as malicious.
So, some stupid extension is the least problem with modern browsers.
However, there is attempts to create independent browaser without all that bigbrother crap, and that is not any Crome or Firefox forks. However, the task of full HTML5 support is not very easy, so that projects is far from perfect. Most advanced independent browser is NetSurf. It is hardly could be used to hang on facebook, even conspiracy.win looks weird, but it could be useful if you really concerned about privacy and censorship.
There is much worse thing nobody care about for a long time in Chrome and Firefox. It named Goolge Safe Browsing. And it is not an extension you have to install, it is a feature turned on by default. Both browsers and all their forks without exception have that feature in its code.
Google Safe Browsing already fully used to limit access to alternative news sites - f.e. https://support.mozilla.org/en-US/questions/1319310
There is another censorship tool in browsers - the system of "Trusted CA". It declared to provide "privacy" and "protection", however that is not true at all. Formally, there are some "Trusted CA"'s that sign sites certificates and that should be some kind of guarantee that certificate belongs to that site. Of course "Trusted CA" is mostly big companies and government institutions. So, if site have HTTPS ceritficate signed by one of that "Trusted CA", then it is assumed that it is good valid site. That system could be working if any "Trusted CA" who sign a certificate of some site for a third-party immidiately and forever removed from list of "Trusted CA". However, episode with China Trusted CA CNNIC, who was caught by hand for sigining popular sites certificates for some murky organizations and China surveillance agencies, shows that system does not work at all, since CNNIC is still in list of that "Trusted CA". It is also interesting, that if such "Trusted CA" sign a certificate for, say, conspiracies.win for third-patry and that third-party do a MitM attack using that certificate, user will not be notified at all, since that "Trusted CA" is in browser "Trusted CA" list. On the same time both Google and Mozilla overcomplicated use of self-signed certificates, they show scary warning and there are no easy for regular user way to allow visiting sites with self-signed certificates. Interesting, that if you turn that crap off and add self-signed certificate to "known", there will be no way for third-paty to make a MitM unnoticed, browser will show a warning that certificate changed and you will know that something goes wrong. Also, that dumb fraudulent warning about plain HTTP sites without any form fields that "could steal your password" is also kind of censoship.
They tie every site to some bigmoney or government "Trusted CA" that could revoke site certificate at any moment without any reason and if you want to use self-signed certificate, or don't want to use engryption at all, most users will see scary fraudlent warning that pose your site as malicious.
So, some stupid extension is the least problem with modern browsers.
However, there is attempts to create independent browaser without all that bigbrother crap, and that is not any Crome or Firefox forks. However, the task of full HTML5 support is not very easy, so that projects is far from perfect. Most advanced independent browser is NetSurf. It is hardly could be used to hang on facebook, even conspiracy.win looks weird, but it could be useful if you really concerned about privacy and censorship.
There is much worse thing nobody care about for a long time in Chrome and Firefox. It named Goolge Safe Browsing. And it is not an extension you have to install, it is a feature turned on by default. Both browsers and all their forks without exception have that feature in its code.
Google Safe Browsing already fully used to limit access to alternative news sites - f.e. https://support.mozilla.org/en-US/questions/1319310
There is another censorship tool in browsers - the system of "Trusted CA". It declared to provide "privacy" and "protection", however that is not true at all. Formally, there are some "Trusted CA"'s that sign sites certificates and that should be some kind of guarantee that certificate belongs to that site. Of course "Trusted CA" is mostly big companies and government institutions. So, if site have HTTPS ceritficate signed by one of that "Trusted CA", then it is assumed that it is good valid site. That system could be working if any "Trusted CA" who sign a certificate of some site for a third-party immidiately and forever removed from list of "Trusted CA". However, episode with China Trusted CA CNNIC, who was caught by hand for sigining certificates for some murky organizations and China surveillance agencies, shows that system does not work at all, since CNNIC is still in list of that "Trusted CA". It is also interesting, that if such "Trusted CA" sign a certificate for, say, conspiracies.win for third-patry and that third-party do a MitM attack using that certificate, user will not be notified at all, since that "Trusted CA" is in browser "Trusted CA" list. On the same time both Google and Mozilla overcomplicated use of self-signed certificates, they show scary warning and there are no easy for regular user way to allow visiting sites with self-signed certificates. Interesting, that if you turn that crap off and add self-signed certificate to "known", there will be no way for third-paty to make a MitM unnoticed, browser will show a warning that certificate changed and you will know that something goes wrong. Also, that dumb fraudulent warning about plain HTTP sites without any form fields that "could steal your password" is also kind of censoship.
They tie every site to some bigmoney or government "Trusted CA" that could revoke site certificate at any moment without any reason and if you want to use self-signed certificate, or don't want to use engryption at all, most users will see scary fraudlent warning that pose your site as malicious.
So, some stupid extension is the least problem with modern browsers.
However, there is attempts to create independent browaser without all that bigbrother crap, and that is not any Crome or Firefox forks. However, the task of full HTML5 support is not very easy, so that projects is far from perfect. Most advanced independent browser is NetSurf. It is hardly could be used to hang on facebook, even conspiracy.win looks weird, but it could be useful if you really concerned about privacy and censorship.
There is much worse thing nobody care about for a long time in Chrome and Firefox. It named Goolge Safe Browsing. And it is not an extension you have to install, it is a feature turned on by default. Both browsers and all their forks without exception have that feature in its code.
Google Safe Browsing already fully used to limit access to alternative news sites - f.e. https://support.mozilla.org/en-US/questions/1319310
There is another censorship tool in browsers - the system of "Trusted CA". It declared to provide "privacy" and "protection", however that is not true at all. Formally, there are some "Trusted CA"'s that sign sites certificates and that should be some kind of guarantee that certificate belongs to that site. Of course "Trusted CA" is mostly big companies and government institutions. So, if site have HTTPS ceritficate signed by one of that "Trusted CA", then it is assumed that it is good valid site. That system could be working if any "Trusted CA" who sign a certificate of some site for a third-party immidiately and forever removed from list of "Trusted CA". However, episode with China Trusted CA CNNIC, who was caught by hand for sigining certificates for some murky organizations and China surveillance agencies is still in list of that "Trusted CA". It is also interesting, that if such "Trusted CA" sign a certificate for, say, conspiracies.win for third-patry and that third-party do a MitM attack using that certificate, user will not be notified at all, since that "Trusted CA" is in browser "Trusted CA" list. On the same time both Google and Mozilla overcomplicated use of self-signed certificates, they show scary warning and there are no easy for regular user way to allow visiting sites with self-signed certificates. Interesting, that if you turn that crap off and add self-signed certificate to "known", there will be no way for third-paty to make a MitM unnoticed, browser will show a warning that certificate changed and you will know that something goes wrong. Also, that dumb fraudulent warning about plain HTTP sites without any form fields that "could steal your password" is also kind of censoship.
They tie every site to some bigmoney or government "Trusted CA" that could revoke site certificate at any moment without any reason and if you want to use self-signed certificate, or don't want to use engryption at all, most users will see scary fraudlent warning that pose your site as malicious.
So, some stupid extension is the least problem with modern browsers.
However, there is attempts to create independent browaser without all that bigbrother crap, and that is not any Crome or Firefox forks. However, the task of full HTML5 support is not very easy, so that projects is far from perfect. Most advanced independent browser is NetSurf. It is hardly could be used to hang on facebook, even conspiracy.win looks weird, but it could be useful if you really concerned about privacy and censorship.
There is much worse thing nobody care about for a long time in Chrome and Mozilla. It named Goolge Safe Browsing. And it is not an extension you have to install, it is a feature turned on by default.
Google Safe Browsing already fully used to limit access to alternative news sites - f.e. https://support.mozilla.org/en-US/questions/1319310
There is another censorship tool in browsers - the system of "Trusted CA". It declared to provide "privacy" and "protection", however that is not true at all. Formally, there are some "Trusted CA"'s that sign sites certificates and that should be some kind of guarantee that certificate belongs to that site. Of course "Trusted CA" is mostly big companies and government institutions. So, if site have HTTPS ceritficate signed by one of that "Trusted CA", then it is assumed that it is good valid site. That system could be working if any "Trusted CA" who sign a certificate of some site for a third-party immidiately and forever removed from list of "Trusted CA". However, episode with China Trusted CA CNNIC, who was caught by hand for sigining certificates for some murky organizations and China surveillance agencies is still in list of that "Trusted CA". It is also interesting, that if such "Trusted CA" sign a certificate for, say, conspiracies.win for third-patry and that third-party do a MitM attack using that certificate, user will not be notified at all, since that "Trusted CA" is in browser "Trusted CA" list. On the same time both Google and Mozilla overcomplicated use of self-signed certificates, they show scary warning and there are no easy for regular user way to allow visiting sites with self-signed certificates. Interesting, that if you turn that crap off and add self-signed certificate to "known", there will be no way for third-paty to make a MitM unnoticed, browser will show a warning that certificate changed and you will know that something goes wrong. Also, that dumb fraudulent warning about plain HTTP sites without any form fields that "could steal your password" is also kind of censoship.
They tie every site to some bigmoney or government "Trusted CA" that could revoke site certificate at any moment without any reason and if you want to use self-signed certificate, or don't want to use engryption at all, most users will see scary fraudlent warning that pose your site as malicious.
So, some stupid extension is the least problem with modern browsers.
However, there is attempts to create independent browaser without all that bigbrother crap, and that is not any Crome or Firefox forks. However, the task of full HTML5 support is not very easy, so that projects is far from perfect. Most advanced independent browser is NetSurf. It is hardly could be used to hang on facebook, even conspiracy.win looks weird, but it could be useful if you really concerned about privacy and censorship.