{"id":27328,"date":"2019-06-17T10:03:07","date_gmt":"2019-06-17T10:03:07","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/"},"modified":"2019-06-17T10:03:07","modified_gmt":"2019-06-17T10:03:07","slug":"why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/","title":{"rendered":"Why are fervid Googlers making ad-blocker-breaking changes to Chrome? Because they created a monster. And are fighting to secure it"},"content":{"rendered":"<p><strong class=\"trailer\">Analysis<\/strong> In a mild PR blitz, Google engineers <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/security.googleblog.com\/2019\/06\/improving-security-and-privacy-for.html\">this month insisted<\/a> the ad giant&#8217;s shake up of Chrome browser extensions won&#8217;t kill advert blockers. Instead, we&#8217;re told, Googlers are making the plugins safer. Those engineers have more work to do than it may seem.<\/p>\n<p>Setting aside for a moment Google&#8217;s public <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.sec.gov\/Archives\/edgar\/data\/1652044\/000165204419000004\/goog10-kq42018.htm\">filings<\/a> about the revenue threat posed by web ad blockers, and actions the corporation has taken in the Google Play Store to limit interference with mobile app ads, the internet goliath has reason to overhaul its Chrome Extension ecosystem \u2013 because it&#8217;s as fragile as a house of cards.<\/p>\n<p>Google insists it&#8217;s dealing with the situation, noting that malicious extension installations have declined 89 per cent since early 2018. But the tech titan&#8217;s coders are still addressing the root cause \u2013 a platform with few guardrails.<\/p>\n<p>Chrome Extensions have obvious utility, for developers and users. They can enhance privacy, add functionality and improve the web browsing experience. But they&#8217;re so powerful they can be easily abused and the security process Google has in place for the Chrome Web Store isn&#8217;t foolproof.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/06\/12\/shutterstock_1397746271.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Overprotective parent illustration, a child under glass\"><\/p>\n<h2 title=\"We want to make Chrome safer... by taking away the API we used to race Firefox\">Google: We&#8217;re not killing ad blockers. Translation: We made them too powerful, we&#8217;ll cram this genie back in its bottle<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2019\/06\/13\/google_chrome_ad_blockers\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>The primary problem is that Chrome Extensions can undo the browser&#8217;s security model and grab sensitive data. A reader who wrote in to elaborate on this issue suggested that if people really understood how unconstrained Chrome Extensions are, they would be given a 10.0 CVE score and banned from enterprises.<\/p>\n<p>That may be something of an overstatement given that <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/developer.chrome.com\/extensions\/webRequest\">the API at the center of this mess<\/a>, specifically blocking capability of the <code>webRequest<\/code> API, will continue to be available to enterprises after the pending platform renovation is completed because it&#8217;s so useful.<\/p>\n<p>Raymond Hill, the developer of <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/github.com\/gorhill\/uBlock\">uBlock Origin<\/a>, disagrees with that characterization because, he says, the ability to change headers is intrinsically part of the design of the <code>webRequest<\/code> API \u2013 not an oversight.<\/p>\n<p>&#8220;There is no CVE issue here because extensions are opt-in, and what they can do is disclosed to the users choosing to install them,&#8221; he said in an email to <em>The Register<\/em>.<\/p>\n<p>But Google&#8217;s platform design decisions have security implications. And Mozilla&#8217;s too, since Firefox also supports the <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Add-ons\/WebExtensions\/API\/webRequest\"><code>webRequest<\/code> API<\/a> for Add-ons (aka extensions).<\/p>\n<p>At Canadian security conference SecTor in October last year \u2013 coincidentally the same month that Google <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.chromium.org\/2018\/10\/trustworthy-chrome-extensions-by-default.html\">announced<\/a> its Chrome Extensions revision plan, known as Manifest v3 \u2013 Lilly Chalupowski, security application developer at GoSecure, gave <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/sector.ca\/sessions\/the-chrome-crusader\/\">a presentation<\/a> called The Chrome Crusader.<\/p>\n<h3 class=\"crosshead\"><span>Security stripped<\/span><\/h3>\n<p>Chalupowski demonstrated that Chrome Extensions have the ability to strip away HTTP headers, including <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/CORS\">security headers<\/a>, from website interactions. The result is that it&#8217;s trivial to craft an extension that breaks the browser&#8217;s Same-Origin security model.<\/p>\n<p>As she put in a phone interview with <em>The Register<\/em>, &#8220;Injection is a feature.&#8221;<\/p>\n<p>&#8220;When you have injection as a feature, that&#8217;s when you have to start being concerned,&#8221; Chalupowski said, &#8220;especially when you&#8217;re handing over functionality to modify secure headers on the fly and change them to literally whatever you want.&#8221;<\/p>\n<p>During her demonstration, Chalupowski showed how to craft a basic Chrome Extension that interacts with Flask command-and-control server \u2013 running locally for the demo \u2013 to steal passwords from an online banking website.<\/p>\n<p>Google, it should be said, keeps an eye out for malicious extensions, but Chalupowski suggested a few ways miscreants might avoid detection.<\/p>\n<p>Chalupowski has posted <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/github.com\/lillypad\/chrome-crusader\">PoC code on GitHub<\/a>; <em>The Register<\/em> hasn&#8217;t yet determined whether any changes made to Chrome since the initial publication of the PoC code affect its functionality.<\/p>\n<p>&#8220;uBlock Origin and a few others use this capability to modify headers for good purposes, for security,&#8221; she said. &#8220;At the same time, those same features will be used in Chrome and Firefox for malicious purposes.&#8221;<\/p>\n<p>And therein lies the problem: A developer with good intentions can craft extension code that&#8217;s beneficial and a developer with bad intentions can use the same API to abuse trust and steal information.<\/p>\n<p>Back in 2010, when the <code>webRequest<\/code> API was being developed, there was <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/groups.google.com\/a\/chromium.org\/forum\/#!topic\/chromium-extensions\/F-pu-hW_6go\">some discussion<\/a> of privacy and security implications, but it wasn&#8217;t the overriding concern. The design document mentions the issue in passing:<\/p>\n<p>Chrome Extensions used to be even more open. Hills said that back in 2013, Chrome extensions could see the network requests of other extensions via the <code>webRequest<\/code> API. It was a useful feature but also an abusable one and so <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=510802\">was removed<\/a>.<\/p>\n<p>Google may need to make <code>webRequest<\/code> less of a risk but among those who develop extensions, there&#8217;s hope that the price of security isn&#8217;t ineffective content blocking and subpar privacy controls.<\/p>\n<p>Hill argues that Google should implement a more finely grained permission model for loosening CORS and CSP headers. That way, extensions requiring certain capabilities could ask for them directly rather than settle for a less capable API. He also suggested Google could deny the <code>webRequest<\/code> API access to a broader range of request headers, as it <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/developer.chrome.com\/extensions\/webRequest#life_cycle_footnote\">already does in some instances<\/a>.<\/p>\n<p>&#8220;Right now the browser just inherently trust the browser extensions will be nice,&#8221; said Chalupowski. Changing that, she said, &#8220;is nothing but good news for users.&#8221;<\/p>\n<p>For developers and users capable of making responsible choices about the software they install, it&#8217;s a bit more complicated. \u00ae<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/06\/17\/chrome_extensions_security\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We said engineers made the API too powerful. We weren&#8217;t wrong Analysis\u00a0 In a mild PR blitz, Google engineers this month insisted the ad giant&#8217;s shake up of Chrome browser extensions won&#8217;t kill advert blockers. Instead, we&#8217;re told, Googlers are making the plugins safer. Those engineers have more work to do than it may seem.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27329,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-27328","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why are fervid Googlers making ad-blocker-breaking changes to Chrome? Because they created a monster. And are fighting to secure it 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why are fervid Googlers making ad-blocker-breaking changes to Chrome? Because they created a monster. And are fighting to secure it 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-17T10:03:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Why are fervid Googlers making ad-blocker-breaking changes to Chrome? Because they created a monster. And are fighting to secure it\",\"datePublished\":\"2019-06-17T10:03:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\\\/\"},\"wordCount\":908,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\\\/\",\"name\":\"Why are fervid Googlers making ad-blocker-breaking changes to Chrome? Because they created a monster. And are fighting to secure it 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it.jpg\",\"datePublished\":\"2019-06-17T10:03:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why are fervid Googlers making ad-blocker-breaking changes to Chrome? Because they created a monster. And are fighting to secure it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why are fervid Googlers making ad-blocker-breaking changes to Chrome? Because they created a monster. And are fighting to secure it 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/","og_locale":"en_US","og_type":"article","og_title":"Why are fervid Googlers making ad-blocker-breaking changes to Chrome? Because they created a monster. And are fighting to secure it 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-06-17T10:03:07+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Why are fervid Googlers making ad-blocker-breaking changes to Chrome? Because they created a monster. And are fighting to secure it","datePublished":"2019-06-17T10:03:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/"},"wordCount":908,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/","url":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/","name":"Why are fervid Googlers making ad-blocker-breaking changes to Chrome? Because they created a monster. And are fighting to secure it 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it.jpg","datePublished":"2019-06-17T10:03:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/why-are-fervid-googlers-making-ad-blocker-breaking-changes-to-chrome-because-they-created-a-monster-and-are-fighting-to-secure-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Why are fervid Googlers making ad-blocker-breaking changes to Chrome? Because they created a monster. And are fighting to secure it"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27328"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27328\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27329"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}