this post was submitted on 27 Mar 2026
93 points (97.0% liked)
Technology
83098 readers
2779 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Remember folks, be skeptical of every single extension you add to your browser. Try to install only the absolutely necessary and if possible, only FOSS extensions.
This model of offering simple functionality together with malware is so widespread, you wouldn't believe.
the most annoying things is when extensions get sold.
In olden days of W2K I would just assume malware is everywhere, and while trying to be as clean as possible, I always have some malware and shouldn't do anything personal with computers that I can't accept being possibly compromised.
I was a kid, too.
Then that idea that you can be safe has gotten to me, both through switching to Linux and through stupidity.
OK, a bit before that porn and historical military music became too interesting.
So. Malware is everywhere. Some guy from India's malware is in a browser extension and a Google Play v2ray client, some guy from China's malware is in an ebook reader, and some government's malware is in the operating system you use, and some government's deep state's malware is in algorithms and protocols, as a backdoor hidden in the open.
Perhaps the Internet is one big compute cluster operated via such, providing free computation for US deep state, who the hell knows.
But even without conspiracy theories - IRL crooks hide traps in far simpler things.
The whole trust that most of what you use doesn't have backdoors stealing everything possible, that trust is reminiscent of Soviet people literate in the first generation, who blindly trusted everything printed in a typography. Well, the generation having such has naturally left us. I think that will also happen for attitude to working with computers in some 60 years or so.