Browser extensions are extremely useful and generally just make life on the web more convenient, but they have the potential to be a serious security risk. wired.trib.al/Mmn3yZd 1/
But don’t let that discourage you from using your favorite extensions. To help you make sure your browser extensions are safe, here's how to run an effective audit. 2/
Always do your research before installing an add-on—check the reviews from other users and reviews on the web. See when the extension was last updated and be sure to look for indications that the add-on has changed hands recently. 3/
To see the extensions you have installed in Chrome, click the three dots (top right), then choose More Tools and Extensions. For Details, click next to any extension to reveal more information about it. Extensions can be temporarily disabled or removed completely. 4/
Microsoft Edge is based on the same code as Google Chrome, so the process will look about the same. You’ll click on Details to see the permissions granted to an extension, which sites it has access to, and whether or not an extension can run in Edge's InPrivate mode. 5/
For Firefox, simply click the menu button (three horizontal lines, top right), then tap Add-ons and Themes and Extensions to get to your extensions. Click on any extension toggle switch to disable or enable it. 6/
In Safari on macOS, open the Safari menu and select Preferences, then switch to the Extensions tab. This is where all of your installed add-ons are, the currently active ones will have a blue tick next to them. Change as desired. 7/
In addition to these tips, be sure to keep your computer and its applications up to date. Run regular malware scans. That'll go a long way toward minimizing the risk posed by potentially dodgy extensions. Happy browsing. wired.trib.al/Mmn3yZd 8/
Fourth of July Sale! Subscribe to WIRED today for just $5 & get unlimited access to all the stories on WIRED.com. wired.trib.al/f3r0g6N
End of thread
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Two agents involved in the shooting deaths of US citizens in Minneapolis are reportedly part of highly militarized DHS units whose extreme tactics are generally reserved for war zones. wired.com/story/ice-cbp-…
The units include ICE’s two Special Response Teams (SRT), CBP’s one SRT, and the Border Patrol Tactical Unit (BORTAC). wired.com/story/ice-cbp-…
The tactics used by SRT and BORTAC vastly differ from those of local police or sheriffs. They use explosives to breach the doors of homes, and team members are equipped with full tactical gear, assault rifles, and heavy-duty crowd-control weapons. wired.com/story/ice-cbp-…
Since last year, we’ve been reporting on ICE extensively. But every week brings new information, and it’s getting harder to keep track of what’s happening, let alone remember what’s already happened.
So here’s a quick thread to help.
Back in June (we know, it honestly feels like a lifetime ago), WIRED obtained hundreds of emergency calls from ICE detention centers. wired.com/story/ice-dete…
The data showed that at least 60 percent of the centers analyzed had reported serious pregnancy complications, suicide attempts, or sexual assault allegations. wired.com/story/ice-dete…
Criminals posing as US immigration officers have carried out robberies, kidnappings and sexual assaults in several states, warns an FBI bulletin to law enforcement agencies issued last month. wired.com/story/fbi-warn…
Citing five 2025 incidents involving fake immigration officers, the bulletin says criminals are using ICE’s heightened profile to target vulnerable communities, making it harder to distinguish between lawful officers and imposters. wired.com/story/fbi-warn…
Federal rules require immigration officers to identify themselves and state the reason for an arrest “as soon as it is practical and safe to do so.” The standard has not changed since it was codified, yet advocates say it is increasingly ignored. wired.com/story/fbi-warn…
Thirty years ago, an Austrian theologian spoke to Peter Thiel about the theories of Carl Schmitt, the theorist tapped by the Nazis to justify Germany's slip from democracy to dictatorship. Those theories have been a roadmap for the billionaire ever since. wired.com/story/the-real…
Schmitt is remembered for two theories: his incisive Weimar-era critique of liberalism and his decision to join the Nazi party in the run-up to the Second World War.
In 1996, theologian Wolfgang Palaver introduced Thiel to these ideas at a conference. wired.com/story/the-real…
Also, some terms we gotta break down:
Mimetic Rivalry: Violence that results from humans’ fundamental tendency to imitate each other—specifically to mimic each other’s desires. A key concept for Rene Girard, Thiel’s biggest intellectual influence. wired.com/story/the-real…
In an industry once known for cushy perks, some founders are now asking staff to commit to a 72-hour weekly schedule. You’re either in or you’re out. wired.com/story/silicon-…
Would you like to work nearly double the standard 40-hour week? It’s a question that many startups in the US are asking prospective employees—and to get the job, the answer needs to be an unequivocal yes. wired.com/story/silicon-…
These companies are embracing an intense schedule, first popularized in mainland China, known as “996,” or 9 am to 9 pm, six days a week. That’s a 72-hour work week, in case you’re doing the math. wired.com/story/silicon-…
Generative AI has put data centers under the spotlight, and surging electricity needs could increase risk of fires. wired.com/story/x-data-c…
A recent, hours-long fire at a data center used by Elon Musk’s X may have begun after an electrical or mechanical issue in a power system, according to an official fire investigation. wired.com/story/x-data-c…
Data center giant Digital Realty operates the 13-acre site, and multiple people familiar with the matter previously told WIRED that the Musk-run social platform X has servers there. wired.com/story/x-data-c…