Beware of the new features of Chrome WebUSB and WebBluetooth: Browsers use more and more APIs for more functionality.
But this is not always good.
Two recent additions to Chrome, the WebUSB and WebBluetooth APIs, allow websites to interact with devices connected to the computer running the Browser.
This can be very useful, but sometimes the addition of new features has unpredictable consequences.
WebUSB and WebBluetooth APIs, for example, leave vulnerabilities that allow for highly sophisticated phishing attacks. These attacks could bypass two-factor authentication devices that use USB ports, such as the Yubikey device.
Security researchers have recently shown that Chrome browser WebUSB functionality can also be used to communicate directly with two-factor authentication devices, not just the Google U2F API.
The attack bypasses any protection offered by two-factor identity devices.
Chrome prompts you when it encounters a page that is trying to use the WebUSB or WebBluetooth API. The user must allow the login request and type or paste the username and password of the account on the page he wants to log in.
Users should pay due attention to dialogs that appear asking for permissions. The websites που έχουν σχεδιαστεί για επιθέσεις θα μπορούσαν να παρέχουν διαβεβαιώσεις και προτροπές ότι τα δικαιώματα που ζητούν είναι απαραίτητα για την καλύτερη λειτουργικότητα της externaldevice.
So if you want to disable the two features from Chrome that useste, you should install them extensions Disable WebUSB and Disable WebBluetooth .
The two add-ons block APIs in the browser.
So if you don't use WebUSB and WebBluetooth features, these extensions are a temporary solution until Google fixes security issues.
____________________________________
- Made from artificial intelligence. None of these people exists
- uBlock Origin is the popular ad blocker in Chrome?
- New law Right to repair. What it means;