![]() ![]() ![]() The second best bet is employee training, coaching, and (last-resort) consequences - if this is a workplace.Īnother possibility, if you have money and time to burn, is to fork the Chromium source code and make your own browser. Although I'm not sure if this would prevent them from clicking Tampermonkey off. If you have full control of the target machines, and depending on details you haven't provided, you may be able to place the machines in "Kiosk Mode". This still wouldn't stop them from being to disable a Tampermonkey script, but you could write a custom extension that does the same thing. If you have inflicted Google Chrome Enterprise on your users, you can force-install extensions that they can't disable. It should never, ever, trust what is coming from a "browser" anyway (Always verify your app inputs). Your best bet is to alter the web portal app to deal with the issue. The browser developers are very diligent about blocking all vectors for such attacks that they discover (within reason). ![]() Nor can even an extension interfere directly with other extensions. No userscript can alter any extension nor browser settings. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |