The user loses control, the user loses.
>> This model can work since the web was built for each site to be independent and self-contained...
https://developer.chrome.com/extensions/samples "Content Script Cross-Domain XMLHttpRequest Example"
>> whereas the program only has to be verified once after downloading.
Opening the door to hackers who find ways to infiltrate that program _after_ that check has been done.
The user loses control, the user loses.
>> This model can work since the web was built for each site to be independent and self-contained...
https://developer.chrome.com/extensions/samples "Content Script Cross-Domain XMLHttpRequest Example"
>> whereas the program only has to be verified once after downloading.
Opening the door to hackers who find ways to infiltrate that program _after_ that check has been done.