Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Browsers
Web Extensions
[Updated 29/12/2018] Browser extension comparison: Malwares and Phishings
Message
<blockquote data-quote="Windows_Security" data-source="post: 790729" data-attributes="member: 50782"><p>Assumption.</p><p>When Adguard does not decrypt HTTPS traffic, they can only see the TCP/IP data (IP address + domain name).</p><p></p><p>Observation</p><p>The Adguard desktop can do more advanced filterng (according to AdGuard's website) than the browser extension.</p><p></p><p>Question</p><p>When AdGuard extension is able filter HTML and Javascript (calls and scriptlests) and even CSS? How does AdGuard do its trick to read the encrypted HTTPS traffic when they can only see the underlaying TCP/IP data (which is limited to IP and domain name, see Wiki explanation below)?</p><p></p><p></p><p></p><p>I still don understand it. It also does makes no sense to me that AV companies are so stupid to use unsafe ways to read encrypted data and AdBlocking can do the same by just using API's? Why would not AV companies use those API's,? When those API's were sufficient, why would EMSISOFT develop an extension, just for the purpose to get more information from INSIDE the browser?</p></blockquote><p></p>
[QUOTE="Windows_Security, post: 790729, member: 50782"] Assumption. When Adguard does not decrypt HTTPS traffic, they can only see the TCP/IP data (IP address + domain name). Observation The Adguard desktop can do more advanced filterng (according to AdGuard's website) than the browser extension. Question When AdGuard extension is able filter HTML and Javascript (calls and scriptlests) and even CSS? How does AdGuard do its trick to read the encrypted HTTPS traffic when they can only see the underlaying TCP/IP data (which is limited to IP and domain name, see Wiki explanation below)? I still don understand it. It also does makes no sense to me that AV companies are so stupid to use unsafe ways to read encrypted data and AdBlocking can do the same by just using API's? Why would not AV companies use those API's,? When those API's were sufficient, why would EMSISOFT develop an extension, just for the purpose to get more information from INSIDE the browser? [/QUOTE]
Insert quotes…
Verification
Post reply
Top