Risk
5/4/2009
06:00 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

NoScript Developer Apologizes For Meddling With AdBlock

His methods caused a furor in the Mozilla community over the weekend because he did not provide clear notification about what his software was doing.

The developer of the popular NoScript add-on for Firefox on Monday issued a sweeping apology for abusing the trust of those who had installed his software and for violating Mozilla's rules for add-on developers.

"I beg you to accept my most sincere apologies and believe in my shame and contrition," concluded Giorgio Maone, creator of the JavaScript-blocking extension NoScript, at the end of a lengthy statement of regret. "I know I've done something horrible, creating a scandal like the Mozilla community never had faced before and betraying the trust of many, many people. Please help me to repair the damage I've caused with my errors."

Maone's sin was to interfere with the operation of another popular Firefox extension, Adblock Plus, through JavaScript code added to his NoScript extension. He created a version of NoScript that altered Adblock Plus to whitelist the ads on his site, NoScript.net, so that they would not be blocked, thereby ensuring his continued ability to earn revenue from the ads.

Maone is not the first Web site owner to seek a way to prevent ads on his site from being blocked. But his methods caused a furor in the Mozilla community over the weekend because he did not provide clear notification about what his software was doing and because he did not seek user consent.

In so doing, Maone's actions became indistinguishable from those of a malware author. "Clearly, NoScript is moving from the gray area of adware into dark black area of scareware, making money at user's expense at any cost," observed Wladimir Palant, author of Adblock Plus, in a blog post about the incident.

Maone takes issue with Palant's claim that his code was obfuscated -- written to be difficult to read, a practice common among malware authors. But he states in his post that he wants to focus on apologizing rather than rebutting alleged inaccuracies.

It remains to be seen how much damage Maone's actions have done to the viability of NoScript. Many users posting about the incident promised to uninstall the extension. But some have accepted Maone's apology. Others took the opportunity to question the ethics of ad blocking.

"It must be particularly hard to have a lesson in ethics from Adblock, that charmingly unethical piece of software based on the principle that 'other people should look at ads so that *I* can enjoy content without inconvenience,' " reads one comment posted beneath Maone's mea culpa.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0279
Published: 2015-03-26
JBoss RichFaces before 4.5.4 allows remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via the do parameter.

CVE-2015-0635
Published: 2015-03-26
The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to spoof Autonomic Networking Registration Authority (ANRA) responses, and consequently bypass intended device an...

CVE-2015-0636
Published: 2015-03-26
The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (disrupted domain access) via spoofed AN messages that reset a finite state machine,...

CVE-2015-0637
Published: 2015-03-26
The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (device reload) via spoofed AN messages, aka Bug ID CSCup62315.

CVE-2015-0638
Published: 2015-03-26
Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3, when a VRF interface is configured, allows remote attackers to cause a denial of service (interface queue wedge) via crafted ICMPv4 packets, aka Bug ID CSCsi02145.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.