The extensions route all web traffic through attacker-controlled proxy servers using hardcoded credentials hidden with a custom encoding scheme.

The extensions route all web traffic through attacker-controlled proxy servers using hardcoded credentials hidden with a custom encoding scheme.