LayerX: Enterprise Browser Security
  • Platform
  • Use Cases

    AI Usage Security

    AI Discovery

    Discover and enforce security guardrails on all AI apps 

    AI DLP

    Prevent leakage of sensitive data on AI tools

    AI Access Control

    Restrict user access to unsanctioned AI tools or accounts

    AI Misuse Prevention

    Protect against prompt injection, compliance violations, and more

    AI Browsers

    Protect AI browsers against attack and exploitation

    Enterprise Browser Security

    Web/SaaS DLP

    Threat Prevent data leakage across all web channels

    BYOD/Remote Access

    Secure SaaS remote access by contractors and BYOD

    Identity Protection

    Discover and secure corporate and personal SaaS identities

    Safe Browsing

    Detect and block risky browser extensions on any browser

    Shadow SaaS/SaaS Security

    Discover ‘shadow’ SaaS and enforce SaaS security controls

    Protect Against Malicious Browser Extensions

    Detect and block risky browser extensions on any browser

    LayerX Enterprise GenAI Security Report 2025

    The LayerX Enterprise GenAI Security Report 2025 offers one-of-a-kind insights on GenAI security risks in organizations.

    Download Now
  • Partners

    Partners

    Partners

    Partner program overview

    Technology Partners

    Explore LayerX integrations

     

    Google icon
    LayerX + Google Partnership
  • About Us

    About us

    About Us

    LayerX mission and leadership

    Newsroom

    Get updates about LayerX

    Events

    Learn which events we attend

     

    Careers

    Apply for open positions

    Contact Us

    Submit your inquiry

    LayerX Enterprise GenAI Security Report 2025

    The LayerX Enterprise GenAI Security Report 2025 offers one-of-a-kind insights on GenAI security risks in organizations.

    Download Now
  • Resources

    Resources

    LayerX Library

    Datasheets, whitepapers, case studies and more

    Glossary

    All the terminology you need to know

    Extensions Database

    Extensionpedia

    The browser extensions hub

    Blog & Podcast

    Our Blog

    Latest research, trends and company news

    Podcasts

    #1 podcast for browser security

     

    Enterprise Browser

    Browser Exploits Explained
    Secure Enterprise Browser
    Browser Extension Security Risks and Best Practices
    What is Browser Isolation?
    ChatGPT Security Risks

    AI Security

    What is AI usage control?
    What is GenAI Governance? Tips and Best Practices
    What is Generative AI Security?
    What is ChatGPT Data Leak?
    AI Data Breaches: Root Causes & Real-World Impact

    LayerX vs Competitors

    LayerX vs Island Enterprise Browser
    LayerX vs Prisma Access Browser
    LayerX vs Prisma Access Browser Extension
    LayerX vs Netskope SASE/SSE
    LayerX vs Netskope One Enterprise Browser
    LayerX vs Palo Alto SSE
  • Request a Demo
  • Login
Home Blog Extension Developers Sell The Data of At Least 6.5 Million Users – And It’s All Completely Legal

Extension Developers Sell The Data of At Least 6.5 Million Users – And It’s All Completely Legal

Executive Summary:

New research by LayerX Security uncovers multiple networks of browser extensions that collect user data and resell it for profit – and it’s all completely legal. For, unlike malicious extensions that disguise themselves as legitimate extensions and do their bidding in the dark, these extensions explicitly tell users that they’re going to collect and sell their data. It’s right there in the Privacy Policy; except that nobody reads it.

LayerX analyzed the privacy policies of thousands of extensions and uncovered over 80 different extensions that collect and sell customer data. Some of these extensions include:

  • A network of 24 media extensions that are installed on 800,000 users and collected viewing data and demographic information on major streaming platforms such as Netflix, Hulu, Disney+, Amazon Prime Video, HBO, Apple TV, and others
  • 12 separate ad blockers with a combined install base of over 5.5 million users openliy selling user data
  • Nearly 50 other extensions, with over 100,000 users in aggregate, that collected and resold users’ browsing data

While browser extensions may seem innocent, these findings highlight the privacy exposure that can arise from unregulated usage of extensions.

The Fine Print That Makes Everything Legal

Privacy policies. Reading them is like watching paint dry. For most users, it’s worse than reading the fine print in their mortgage agreements; and that’s saying something.

Except we did.

LayerX Security researchers Dar Kahllon and Guy Erez analyzed the privacy policies of thousands of browser extensions available in official stores. They were looking for one thing: whether the publisher explicitly reserved the right to sell user data.

And we found them. Our analysis showed at least 80 such extensions, some of them working in collusion, and developed by the same developer across all extensions.  They range from ad blockers and streaming tools to job application helpers, new-tab extensions, and B2B sales intelligence platforms.

Most of these policies don’t say “we sell your data.” They say “we may sell.” It’s a legal hedge — but it means your data can be sold at any time, and you already agreed to it. Here’s what that looks like in practice:

“We may sell or share your personal information with third parties.”

“This information may be sold to or shared with business partners.”

 

What? Browser Extensions Have Privacy Policies?!

Well, to be fair, most don’t. According to our Enterprise Browser Extension Security Report 2026, 71% of all extensions in the Chrome Web Store don’t even publish a privacy policy. 

As a result, more than 73% of users have at least one extension installed without a privacy policy, with no transparency into how their data is handled. This means our analysis could only rely on the 29% that do have a privacy policy. 

And if we assume that some of those extensions with no privacy policy at all will also resell your data — and there’s no reason to assume they’re better — the real number of extensions that may sell your data across the Chrome Web Store is in the tens of thousands.

 

How We Analyzed The Data

We built a pipeline to analyze privacy policies associated with browser extensions in official stores, combining automated classification with manual verification.

Starting from roughly 9,000 extensions with privacy policy URLs in our database, we successfully fetched and parsed 6,666 policies.

The pipeline ran in three stages:

  1. First, AI classification flagged policies disclosing the selling, licensing, or commercial transfer of user data. We then marked high-confidence matches for review and verified every flagged policy by hand.
  2. After the initial AI scan, we did manual review and eliminated false-positives. Common false positives included enterprise security tools like Fortinet and CrowdStrike that transfer browsing data to their own servers (and that’s just we expect from web filtering to work), standard CCPA ad-retargeting boilerplate from companies like HubSpot and Calendly (where sharing a cookie with Google Ads technically qualifies as a “sale” under CCPA’s broad definition), and consensual data monetization platforms like Swash where users opt in and get paid. Which is exactly why you can’t just run an AI scan and publish the results.

We excluded all of these. What remained were extensions whose privacy policies describe genuine commercial sale of user data to third parties.

  1. In the final count, we found 82 unique extensions across 94 store listings. 75 are currently live in the Chrome Web Store. The remaining 7 have been removed — but “removed” doesn’t mean “uninstalled.” Extensions pulled from the store can stay active in browsers that already have them. 

While these figures may seem low, bear in mind that these figures are only for extensions with privacy policies to begin with (less than one-third of all extensions), and those extensions that actually tell you what they’re doing with your data. The true number is almost certainly higher.

Here are a few of our key findings:

 

The QVI Empire: One Anonymous Publisher, 24 Extensions, 800,000 Users

While reviewing confirmed sellers, a pattern kept surfacing. Different extensions, different streaming platforms, but the same three-letter prefix: QVI — short for “Quality Viewership Initiative.”

What looked like unrelated tools turned out to be a single operation: 24 browser extensions — 21 currently live, 3 removed — covering nearly every major streaming service.

  • Netflix
  • Hulu
  • Disney+
  • Amazon Prime Video
  • HBO Max
  • Peacock
  • Paramount+
  • Tubi
  • Apple TV+
  • Crunchyroll

All published by HideApp LLC, registered at 1021 East Lincolnway, Cheyenne, Wyoming — an address shared by hundreds of other LLCs through a registered agent service — and operating under the brand “dogooodapp.”

The largest extensions in the network: 

  • Custom Profile Picture for Netflix (200K users)
  • Hulu Ad Skipper (100K)
  • Netflix Picture in Picture (100K)
  • Ad Skipper for Prime Video (60K)
  • Netflix Extended (60K)

Across all 21 live extensions, the network reaches nearly 800,000 users.

But their privacy policy says something the store listings don’t. These extensions collect extensive information, including:

  • Viewing history
  • Content preferences
  • Platform subscriptions
  • Downloaded content
  • Streaming behavior 

They also collect age and gender — and if you don’t provide demographics, they match your email against third-party demographic databases to fill in the gaps.

The policy describes selling reports to content creators and studios, streaming platforms, media research firms, and marketing agencies — along with “organizations that purchase anonymized viewing data.”

Put it all together and you’re looking at a distributed audience-measurement system running inside users’ browsers. One anonymous publisher pulling viewing behavior across every major streaming platform, building intelligence about what nearly 800,000 people watch, when, and how they engage with content. None of those users signed up for that. Legally, they accepted the terms when they clicked “Add to Chrome.” Practically, nobody read them.

 

Ad Blockers That Block Some Ads, And Sell Your Data to Other Ads

We confirmed eight ad blockers that reserve the right to sell or share user information with third parties. Tools people install to stop tracking — selling tracking data instead. Combined, they reach over 5.5 million users.

  • Stands AdBlocker (3M users) sells browsing data to third parties for “market analytics purposes.”
  • Poper Blocker (2M users) discloses selling identifiers, browsing activity, behavioral profiles, and inferred sensitive data — including health conditions, religious beliefs, and sexual orientation, all inferred from the URLs you visit.
  • All Block, an ad blocker for YouTube (500K users), sells anonymized data “for analytical and commercial purposes.” Published by an entity called Curly Doggo Limited, based in London.
  • TwiBlocker (80K users) discloses transferring browsing data to third parties who “process or sell it for analytical purposes.”
  • Urban AdBlocker (10K users) routes browsing data and AI conversations through the BiScience data broker.

If your ad blocker has a privacy policy longer than two paragraphs, read it.

Independent Operators Can Also Sell Your Data

These aren’t the biggest extensions on the list, but they show how far the data-selling model reaches.

  • Career.io Job Auto Apply (10K users) states in its policy that it may use personal data collected from your resume to sell to third parties, including data brokers, for targeted advertising and profiling. A job application tool that sells your resume.
  • Dog Cuties (6K users) is a cute dog wallpaper new-tab extension. Confirmed data seller through the Apex Media network.
  • EmailOnDeck (10K users) is a temporary email service — a tool people use specifically when they don’t want to share their real information. Its policy states it may sell, rent, or share its mailing list.
  • Survey Junkie discloses selling URLs visited, clickstream data, and “modeled information” about consumer preferences to market research agencies, ad agencies, and data analytics providers.
  • Dashy New Tab (10K users) has its Chrome Web Store listing marked “does not sell your data.” Its actual privacy policy marks data as “Sold or Shared: Yes.” We believe this is CCPA compliance language for standard analytics, not commercial data sales — which is why we left it out. But the contradiction between the store listing and the privacy policy is real. If a publisher’s own policy says “Sold or Shared: Yes” and the store listing says the opposite, which one should users trust?

 

When Your Employees’ Extensions Are Selling Data

Of the 82 confirmed sellers, 29 of them are B2B sales intelligence tools. Their business is data, so the disclosure itself isn’t a surprise. We’re not counting them alongside the consumer-facing extensions.

But they belong in this conversation. These extensions sit on corporate machines. This means that employee browsing behavior, such as internal URLs, SaaS dashboards, and research activity, flows into commercial databases that your competitors can purchase. The risk isn’t about users being deceived. It’s about corporate data leaving through a channel nobody is watching.

 

What Security Teams Should Do About This

Most extension security evaluations focus on permissions or known malicious indicators — flagging extensions that request excessive access or match threat intelligence. That catches malware. It doesn’t catch an extension that openly reserves the right to sell your browsing data.

An extension with a data-selling disclosure isn’t a hypothetical risk. It’s a stated business practice, sitting in a document your employees accepted without reading.

Three questions worth asking: 

  1. What extensions are installed across employee browsers? 
  2. What data do those publishers claim the right to collect or sell? 
  3. Could corporate browsing activity be flowing into commercial datasets?

Most browsers already support centralized extension management through enterprise policies — Chrome’s ExtensionSettings, Edge’s group policies, Firefox’s enterprise configurations. If you don’t have an extension governance policy, that’s the first step. If you do, add privacy policy review to the evaluation criteria. Permissions alone don’t tell you enough.

To that end, LayerX added a new filter to detect and filter (and block, if so desired) extensions that either don’t have a privacy policy at all, or reserve the right to sell personal data.

Consider blocking extensions that either disclose selling user data or don’t publish a privacy policy at all.

The Bottom Line

Browser extensions are among the web’s most powerful and least scrutinized tools. While much of the focus is on malicious that actively steal user and corporate data, privacy violations may sound mundane, but can also be risky.

Going through and reading the Privacy Policy of every extension that every user has in your organization can lead to hundreds or thousands of individual extensions; clearly, that’s not feasible.

Instead, organizations need to start deploying automated tools that can restrict suspicious extensions and account for privacy settings.

Dar Kahllon Published - April 26, 2026

  • Share:
  • Share:
Dar Kahllon

Dar Kahllon

The All-in-One AI & Browser Security Platform

Browser Extension Management Web/SaaS DLP Identity Protection GenAI Security Shadow SaaS Safe Browsing Secure Access

Table of Contents

    Get the Latest from LayerX

    Related Resources

    StealTok: 130k Users Compromised by Data Stealing TikTok Video “Downloaders”
    Blog Post

    StealTok: 130k Users Compromised by Data Stealing TikTok Video “Downloaders”

      LayerX security researchers have uncovered a campaign of at least 12 interrelated browser extensions that masquerade as TikTok video downloaders but in reality track user activity and collect data. The extensions share a common codebase and are all clones or lightly modified versions of each other, indicating that this is a long-standing and persistent […]

    Natalie Zargarov - April 04, 2026 Read more
    The AI Tool in Your Browser Is Probably the Biggest Security Risk You’re Not Thinking About
    Blog Post

    The AI Tool in Your Browser Is Probably the Biggest Security Risk You’re Not Thinking About

      There’s a good chance that right now, as you read this, you have somewhere between three and fifteen browser extensions installed. A grammar checker. A password manager. Maybe a couple of AI assistants. You installed most of them quickly, clicked “Add to Chrome,” and never thought about them again. That’s exactly the problem. We […]

    Or Eshed - April 04, 2026 Read more
    Vibe Hacking: Claude Code Can Be Turned Into A Nation-State-Level Attack Tool With No Coding At All
    Blog Post

    Vibe Hacking: Claude Code Can Be Turned Into A Nation-State-Level Attack Tool With No Coding At All

      LayerX researchers have found how Claude Code can be turned from a ‘vibe’ coding tool into a nation-state-level offensive hacking tool that can be used to hack websites, launch cyberattacks, and research new vulnerabilities. Our research demonstrates how trivially easy it is to convince Claude Code to abandon its safety guardrails and remove its […]

    Roy Paz - April 04, 2026 Read more
    LayerX Logo
    • Platform
    • Partners
    • Resources
      • LayerX Library
      • Blog
      • Glossary
      • Browser Security Explained
      • What is Browser Isolation?
      • What Are Enterprise Browsers?
    • Company
      • About Us
      • Careers
      • Vulnerability Disclosure Program
    Request Demo

    Copyright © 2026 LayerX Terms & Conditions Privacy Policy Vulnerability Disclosure Program