Feeds

Mozilla rages at MS, Apple and Google's 'trojan horse' tactics

Shove your plug-ins where the sun don't shine

Beginner's guide to SSL certificates

A well-respected Mozilla man has attacked Apple, Google and Microsoft for installing plug-ins without first asking for a web surfer’s permission.

Open web advocate Asa Dotzler, who co-founded the Spread Firefox project for the open source browser outfit in 2004, slammed the three tech titans for making sneaky installs of plug-ins into the popular surfing tool.

He complained that Microsoft, Google and Apple were all guilty of adding stealth plug-ins to Firefox when he installed various bits of their software.

“When I installed iTunes, in order to manage my music collection and sync to my iPod, why did Apple think it was OK to add the iTunes Application Detector plug-in to my Firefox web browser without asking me?” he pondered on his blog yesterday.

“Why did Microsoft think it was OK to sneak their Windows Live Photo Gallery or Office Live Plug-in for Firefox into my browser (presumably) when I installed Microsoft Office? What makes Google think it's reasonable behavior for them to slip a Google Update plug-in into Firefox when I installed Google Earth or Google Chrome (not sure which one caused this) without asking me first?”

Dotzler then likened the behaviour of those vendors to setting off unauthorised malware on his computer.

“This is not OK behaviour… These additional pieces of software installed without my consent may not be malicious but the means by which they were installed was sneaky, underhanded, and wrong.”

The Mozilla man, who is the organisation's director of community development, also pinpointed new browser kid-on-the-block RockMelt as a stealth plug-in offender.

“Microsoft, stop being evil. Apple, stop being evil. Google, stop being evil. And you upstarts like RockMelt, don't follow in those evil footsteps. It's not worth it,” he said before signing off with: “It's really simple. ASK first!”

Nearly a year ago Dotzler encouraged Firefox users to switch their search engine from Google to Microsoft Bing in the wake of Eric Schmidt's now infamous words on net privacy. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
'People have forgotten just how late the first iPhone arrived ...'
Plus: 'Google's IDEALISM is an injudicious justification for inappropriate biz practices'
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.