4 Security Tips Before Installing Plugins on Google Chrome

Nov

3

2017

As a user of the Google Chrome browser you may install some important additions from time to time in accordance with your daily use.

Recently, however, there have been some doubts about the permissions required by some plugins at installation, especially after reports of developers ‘exploitation of some additions to users’ hardware in the field of digital currency mining.

As with some sites, such as some torrent sites, certain codes are used for digital currency mining using the processor power of the user’s device as a way of making money rather than ads.

You may notice when you install to add a certain amount of permissions required, which may be illogical sometimes compared to the nature of the add-on.

In short, permissions are a message that appears when you install the extension telling you that you need permission to access certain powers or read and change your data, which is a matter of varying add-ons.

So here are 4 security tips to avoid problems caused by Google Chrome Add-ons

See user feedback
Before you install the add-in, try to devote several minutes of your time to reading the views of the users who installed the add-on by you, in this way you will be aware of the problems that may cause the add-on without having to install them, especially in terms of security or exploitation of the processor.

caution
When you install an add-on on Google Chrome, make sure to read the permissions you require. If you see that the add-on requires permissions that are unrelated to the intended purpose, it is best not to install them, it ultimately depends on your good sense and your view of the order and whether it is worth the risk.

Adhere to the Chrome E-Market
Although relying on Chrome’s e-mail server to install extensions does not alone help you overcome security problems, it will save you a lot of the risk of installing extra-market add-ons that include malicious software.

Depends on reliable sources
Before installing the extensions, it’s important to verify that they’re from trusted or verified sources. Many of the extensions on Chrome are affiliated with known sites or just a browser extension for a particular application on smartphones.

Conclusion
The add-on is not necessarily safe to use if you request to read and change all of your data, and in the end it depends on you to give it the necessary powers or to prevent it.

In most cases, you may have to sacrifice some privacy when you install important plug-ins on Google Chrome, which may not cause much inconvenience if the add-on is worth the information being shared and is a security-friendly addition.

But at the same time you should be careful and know the permissions required by the add-in before installing them, and look for alternatives in case you are concerned about the powers you require.

Viewing:-66

In: Technology & Gadgets Asked By: [17518 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »