

Nice, thanks for discovering that. I wasn’t aware there was a rip off version of it.
2023 Reddit Refugee
On Decentralization:
“We no longer have choice. We no longer have voice. And what is left when you have no choice and no voice? Exit.” - Andreas Antonopoulos
Nice, thanks for discovering that. I wasn’t aware there was a rip off version of it.
These extensions use MellowTel-js. After this article from ArsTechnica went live, the developer responded in full detail and transparency.
If you’re a Dark Reader user (as that’s one of the most widely used extensions), definitely read MellowTel’s response on how their technology works. It made me realize the Ars article was not fully vetted.
https://www.mellowtel.com/blog/responding-to-ars-technica-and-mellow-drama-article
Edit: Dark Reader on this list is actually a knock off version just for Edge browser only - it’s not the widely used Dark Reader that’s on multiple browser engines. See another user’s comment that replied to me.
HTTPS with no VPN:
You trust the web site to encrypt your data if and only if the web site has properly implemented encryption along with encrypted DNS traffic. Sometimes you make a connection to HTTP before you’re redirected to HTTPS. Your ISP can see what web sites you visit, but the ISP can’t see what you’re doing because the traffic is encrypted so long as encryption is implemented correctly. ISP knows you went to https://www.website.com/.
Conclusion: Your ISP knows exactly what web sites you visit, but can’t see what you’re doing on the web site (if encryption is properly configured by the web site provider).
HTTP or HTTPS with trusted VPN (e.g., Mullvad):
You trust the VPN provider. Your connections are encrypted entirely. Your ISP can’t see what web sites you’re visiting nor can they interpret your traffic.
Conclusion: Your ISP is completely blind to what you’re doing and where you’re going.
ExpressVPN:
"HTTPS is essential for security, but it can only do so much. Don’t fall into a false sense of security—there are limitations to HTTPS protection:
- HTTPS doesn’t hide what websites you visit. Your ISP or network provider can still see which sites you access, even if they can’t view what you do on them.
- HTTPS won’t protect data stored on a website. If a site suffers a data breach, HTTPS won’t prevent hackers from accessing your saved information.
- HTTPS cannot encrypt all your internet traffic. It only secures connections between your browser and a site—not your entire internet activity.
- You have no control over HTTPS. The protocol is set by website owners, so if you visit a website without HTTPS protection, there is no way for you to enable it." Source: https://www.expressvpn.com/blog/https-vs-vpn/
PureVPN:
"HTTPS:
- Encrypts data between your browser and websites.
- Protects against eavesdropping on web transactions.
- Activated automatically with ‘https://’ VPN:
- Encrypts and routes all internet traffic, including from apps.
- Protects the entire internet connection. A VPN is used to establish an encrypted connection - also referred to as tunnel - between your device and unsecure network like the Internet. Since all your traffic goes through the VPN’s server rather than that of your ISP, nobody can find out what you’re up to online. What HTTPS Cannot Do?
- Hide Your IP Address: HTTPS doesn’t mask your IP address. Websites and your ISP can still see your IP and location, whereas a VPN hides your IP, making your online presence more anonymous.
- Encrypt All Internet Traffic: HTTPS only secures data between your browser and websites. A VPN encrypts all your internet traffic, including apps and services outside your browser.
- Prevent ISP Tracking: Your ISP can still see which sites you visit with HTTPS, they just can’t see the exact content. A VPN encrypts all your traffic, preventing ISPs from tracking your web activities. https://www.purevpn.com/blog/https-vs-vpn/
Here are more sources I won’t quote, but you can read:
Use of a VPN depends on your privacy threat model.
Using VPN at all times while using the internet like one normally does is beneficial only to the extent that you encrypt your traffic and prevent your ISP from spying on you… mostly. But if you’re logging into known accounts associated with you, then it’s a moot point. Your traffic is encrypted, but your use of services leaves an easy to follow cookie trail of where you’ve been.
If your privacy threat model is much more serious, then you wouldn’t login to any known accounts while on your VPN. You wouldn’t use services that can be pinpointed to you.
Hence, use a VPN to your discretion. If you generally don’t want your ISP spying on you, keeping it on is always best practice. If you have more things to hide, you’d want to use Tor while on VPN and of course don’t use any services that could be linked to you.
Nothing much you can do except make it harder for nefarious parties to get your information. If you’re in the U.S. most of your information is public. With two pieces of info about you, you’re one Google search away from your name, physical address, schools you went to, where you’re employed, etc. You can’t stop this, so just make it harder when your data does get leaked.
Here are my best practices:
Response from the developer:
On User Consent:
In other words, users are opted-out by default. They can also go to that web site, and when they click the link, the page checks which extensions are installed in the browser and whether or not you opted in.
On Opt-In Enforcement:
Ars Technica article states there are “no checks to determine if a real user knows what they are approving or to determine if the developer just opts all users in on their behalf”.
In other words, the Mellow.tel developer has it set to always opt-out by default. However, developers of extensions may just opt-in the users without consent - which, I agree with you is gross. It’s possible those developers don’t explain the full implications. Now, the Mellow.tel developer is putting in remediations to ensure that the opt-in policy is enforced, and users will have more exposure to knowing whether or not this is happening. Meaning, they’re going to try to enforce default opt-out (as they stated this was always their policy), and make it easier for users to know they get opted in.
On Personally Identifiable Information and Monetisation:
The developers basically claims everything is anonymized. And the way they make money is, if you opt-in, you share “a fraction of your bandwidth” when browsing the web, fetching from a server, etc. They don’t collect or sell your user data because they aren’t advertising, and their business model is not advertising.
So my conclusion - I care about my privacy. I don’t like being opted into things without my consent. According to this developer’s response, they never did. They’re trying to come up with a model to help the web stay free. Who knows if this will be viable or not. Developers of extensions can leverage this stuff, and in the past, some of those developers may have opted users in without their consent (or without full transparency or understanding of how this was happening). Even if a user was “opted in”, it doesn’t appear to be a significant impact to privacy as they have their source code published, processing happens locally on the user’s device, and the data that gets process is not transmitted, sold, or even have any identifiers. In fact, the data they claim is quite sparse to the extent that it’s limited to bandwidth allotment, country, and simple “keep alive” checks (heartbeat). Now I don’t have any association with this company, know this developer, nor do I have any stakes at all in this. This just caught my attention and I Had to read and learn more about it, and assess whether or not it affects my privacy threat model (it doesn’t for me, simply because none of the extensions I use have this thing).
For my background - I’m a software engineer for a SaaS provider. My company processes observability telemetry, and we assist customers to instrument agents in their environments (server, machines, clusters, DB, and end-user devices like browsers and mobile devices) to collect metrics to enable observability of their platform, and generate automatic application topology. Also a suite of tools to examine metrics and dynamic baselines, health rules for baseline deviations or other anomalies, analytics, user queries, complete business transaction view, incident remediation, etc. However, I have no background whatsoever in security. So I can’t comment on the security point because I don’t have a cyber security background. I’m only going off what the developer said, and it made sense to me. But I’d defer to a person with cyber security expertise to comment here.
Edit: Added some additional context, fixed some spelling.