Google has revised its Chrome Web Store Terms of Service.
Under the new order, users of the popular browser will no longer be able to download plugins and applications from sources other than the company's store itself. Google explains its policy by protecting the security of user devices.
Only through the Chrome Web Store
Google representatives said they have revised a previously existing practice that allowed the installation of plugins for chromium through external resources. This kind of embedded installation (or, in other words, inline installation) gave the creators of all kinds of extensions the right to promote their products not only through the official Chrome Web Store, but also through other sites. The user only had to give their consent and the new plugin was installed without the Chrome web resource tools.
In June 2018, Google imposed a ban on the placement of new plugins and applications through third-party resources. Now, if they wish to download something to their device, the user will be automatically redirected to the official site of the Google store. Later, by the release of a new version of the browser, the corporation plans to prohibit third-party installation for all add-ons.
Everything for safety
The inline installation technology allowed the creator of the extension to independently promote their own product, and its consumer could use the plugin effortlessly. However, malware developers could not help but take advantage of this. Over the past years, hackers have actively used the method of creating advertising links and dubious sites (similar to real resources) offering the installation of dubious applications. Google has also actively fought this activity by prohibiting such extensions from embedded installations. However, the widespread spread of the problem forced the company to use a radical solution and finally prohibit the installation of third-party products.
Plugins and applications promoted in this way were not always malicious and did damage to the user's software. Even though they spread virally, such add-ons could have some benefit, but some of them could still harm the security of user data. For example, a malicious plugin gained access to the clipboard, from where it could get information about passwords, bank card codes, etc.
Due to the growing interest in cryptocurrencies over the past year, the activity of hacker programs for implementation into parent software for the further mining of virtual money has increased significantly. Browser extensions have become one of the most common methods of hidden installation of mining programs.
To prevent this kind of attacks on user devices, in the spring of 2018, Google prepared an updated way of using the Chrome Web Store. According to the new rules, the company began to remove all add-ons if they have built-in miner programs, even those whose developers do not hide their presence.
The Topic of Article: Google has restricted the installation of third-party plugins in the Chrome browser.