Én vigyáznék vele, kínai fejlesztés.
In 2016, computer security researchers from Fidelis Cybersecurity and Exatel discovered the browser surreptitiously sending sensitive browsing and system data, such as ad blocker status, websites visited, searches conducted, and applications installed with their version numbers, to remote servers located in Beijing, China. According to Maxthon, the data is sent as part of the firm's 'User Experience Improvement Program' and it is "voluntary and totally anonymous." However, researchers found the data still being collected and sent to remote servers even after users explicitly opt out of the program. The researchers further found the data being sent over an unencrypted connection (HTTP), leaving users vulnerable to man-in-the-middle attacks. Fidelis' Chief Security Officer, Justin Harvey, noted the data "contains almost everything you would want in conducting a reconnaissance operation to know exactly where to attack. Knowing the exact operating system and installed applications, and browsing habits it would be trivial to send a perfectly crafted spear phish to the victim or perhaps set up a watering hole attack on one of their most frequented websites.