{"id":123583,"date":"2026-04-20T20:57:07","date_gmt":"2026-04-20T20:57:07","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/"},"modified":"2026-04-20T20:59:04","modified_gmt":"2026-04-20T20:59:04","slug":"claude-desktop-changes-software-permissions-without-consent-the-register","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/","title":{"rendered":"Claude Desktop changes software permissions without consent \u2022 The Register"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div id=\"body\">\n<p>One app mustn&#8217;t modify one other app with out asking for and receiving your specific consent. But Anthropic&#8217;s Claude Desktop for macOS installs information that have an effect on different distributors&#8217; purposes with out disclosure, even earlier than these purposes have been put in, and authorizes browser extensions with out consent.<\/p>\n<p>Alexander Hanff, a privateness advisor and occasional contributor to <em>The Register,<\/em> contends this makes Claude Desktop &#8220;spyware and adware&#8221; and quantities to a violation of European privateness regulation.<\/p>\n<p>&#8220;I wish to be blunt,&#8221; Hanff wrote in a <a href=\"https:\/\/www.thatprivacyguy.com\/blog\/anthropic-spyware\/\" rel=\"nofollow\">blog post<\/a> over the weekend. &#8220;It is a darkish sample. Additionally it is, in my skilled opinion, a direct breach of Article 5(3) of <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:02002L0058-20091219\" rel=\"nofollow\">Directive 2002\/58\/EC<\/a> (the ePrivacy Directive) in addition to a mess of laptop entry and misuse legal guidelines (normally felony regulation), on a scale giant sufficient to matter, in a vendor which has spent appreciable effort on being perceived as the protection aware AI lab.&#8221;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,dmpu,\" data-sm=\",fluid,mpu,dmpu,\" data-md=\",fluid,mpu,dmpu,\">\n        <noscript><br \/>\n            <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2aeaTI921DOinUKcbZ_b5EgAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\"><br \/>\n                <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2aeaTI921DOinUKcbZ_b5EgAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt=\"\"\/><br \/>\n            <\/a><br \/>\n        <\/noscript>\n    <\/div>\n<p>Article 5(3) requires service suppliers in search of entry to an individual&#8217;s information to supply clear particulars in regards to the information entry request and to acquire consent except entry is strictly mandatory to supply the service.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44aeaTI921DOinUKcbZ_b5EgAAAJQ&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44aeaTI921DOinUKcbZ_b5EgAAAJQ&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                <\/a><br \/>\n            <\/noscript>\n        <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\">\n                <noscript><br \/>\n                    <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33aeaTI921DOinUKcbZ_b5EgAAAJQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\"><br \/>\n                        <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33aeaTI921DOinUKcbZ_b5EgAAAJQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                    <\/a><br \/>\n                <\/noscript>\n            <\/div>\n<\/p><\/div>\n<p>Hanff explains that he discovered the undisclosed file set up whereas making an attempt to debug one other software that used <a href=\"https:\/\/developer.chrome.com\/docs\/extensions\/develop\/concepts\/native-messaging\" rel=\"nofollow\">Native Messaging<\/a>, an API for speaking between Chrome and different purposes. Claude Desktop depends on the cross-platform Electron framework, which in flip depends on a bundled model of Chromium.<\/p>\n<p>The file that Claude Desktop put in was:<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,dmpu,\" data-sm=\",fluid,mpu,dmpu,\" data-md=\",fluid,mpu,dmpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44aeaTI921DOinUKcbZ_b5EgAAAJQ&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44aeaTI921DOinUKcbZ_b5EgAAAJQ&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                <\/a><br \/>\n            <\/noscript>\n        <\/div>\n<p>\n  <code>com.anthropic.claude_browser_extension.json<\/code>\n<\/p>\n<p>It is a Native Messaging manifest file that will get known as when Chromium-based browsers wish to run a neighborhood executable. The file pre-authorizes three completely different Chrome extension identifiers (e.g. <a href=\"https:\/\/chromewebstore.google.com\/detail\/Claude\/fcoeoabgfenejglbffodgkkbkcdhcgfn?hl=en-US\" rel=\"nofollow\">Claude in Chrome extension<\/a>) in order that related browsers will run the binary recognized within the manifest file.<\/p>\n<p>Principally, Claude Desktop is establishing its AI mannequin&#8217;s capability to entry numerous browsers for automated operation. And it does this for browsers not but current on the consumer&#8217;s system, in order that these browsers will grant Claude entry if they&#8217;re put in in some unspecified time in the future sooner or later.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33aeaTI921DOinUKcbZ_b5EgAAAJQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33aeaTI921DOinUKcbZ_b5EgAAAJQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                <\/a><br \/>\n            <\/noscript>\n        <\/div>\n<p>However Hanff claims he by no means put in any Anthropic browser extensions as a consequence of privateness and safety issues. Claude Desktop did so for him, with out disclosure or permission.<\/p>\n<p>Browser extensions amplify safety and privateness challenges as a result of they typically request overly broad permissions. Hanff observes that Claude in Chrome has authenticated session entry and might learn net pages, fill out types, and seize the display screen. What&#8217;s extra, he says, the binary bridge software runs outdoors of the browser&#8217;s sandbox at consumer privilege stage, with out surfacing any permission prompts.<\/p>\n<p>Anthropic&#8217;s strategy has quite a few issues, in line with Hanff. It quantities to pressured bundling throughout belief boundaries by writing configuration information for different distributors&#8217; browsers. It is invisible by default, with no opt-in. It is troublesome to take away. It pre-authorizes browser extensions that have not been put in. Its file is called in a approach that fails to make clear the scope of what&#8217;s being allowed. And it pre-authorizes non-present browsers to make use of the Native Messaging binary, amongst different issues.<\/p>\n<p>Hanff says, &#8220;Anthropic&#8217;s personal security information states <a href=\"https:\/\/claude.com\/blog\/claude-for-chrome\" rel=\"nofollow\">Claude for Chrome<\/a> is weak to immediate injection at a 23.6 p.c success fee with out mitigations, and 11.2 p.c with their present mitigations. \u2026 With the bridge pre-installed on the consumer&#8217;s laptop computer, a profitable immediate injection in opposition to Claude for Chrome has a path, by way of the extension, by way of the bridge, to a helper binary working outdoors the browser sandbox at consumer privilege.&#8221;<\/p>\n<p>Anthropic didn&#8217;t reply to a request for remark.<\/p>\n<p>We be aware that the Claude Desktop native messaging host has <a href=\"https:\/\/github.com\/anthropics\/claude-code\/issues\/20341\" rel=\"nofollow\">an unfixed bug<\/a> that was auto-closed on February twenty eighth by a GitHub Actions bot. The issue is that the Claude Code and Claude Desktop native messaging host registrations battle with each other, so the related Chrome extension fails with Claude Code.<\/p>\n<p>Noah M. Kenney, founder and principal advisor for advisory agency <a href=\"https:\/\/digital520.com\" rel=\"nofollow\">Digital 520<\/a>, takes situation with Hanff&#8217;s use of the time period &#8220;spyware and adware&#8221; however says his findings seem to help his authorized reasoning.<\/p>\n<p>&#8220;The technical claims listed below are largely testable and, as described, reproducible,&#8221; stated Kenney in an e mail to <em>The Register<\/em>. &#8220;Impartial reviewers can confirm that similar Native Messaging manifests are written throughout a number of Chromium-based browser paths, that the exercise is attributed on the OS stage to the desktop software, and that set up occasions are recorded within the app&#8217;s personal logs. If these artifacts maintain, the core conduct is troublesome to dispute: the desktop app is registering a Native Messaging host throughout a number of browser environments, together with ones the consumer has not actively chosen to combine, and sustaining that registration persistently.&#8221;<\/p>\n<p>With the disclaimer that he isn&#8217;t an legal professional, Kenney stated the authorized framing is extra sophisticated.<\/p>\n<p>&#8220;Article 5(3) of the ePrivacy Directive clearly applies to storing info on a consumer&#8217;s system, so the act of writing these manifests is in scope. The important thing query is whether or not that motion is &#8216;strictly mandatory&#8217; for a service the consumer really requested.\u00a0<\/p>\n<p>&#8220;Distributors will argue that is a part of a unified product expertise, however regulators, notably in Europe, are inclined to interpret &#8216;strictly mandatory&#8217; narrowly. Silently putting in cross-application integrations, particularly into browsers the consumer has not opted into, is prone to fall outdoors that exemption, which carries credible regulatory threat.&#8221;<\/p>\n<p>Kenney stated he would push again on the time period &#8220;spyware and adware&#8221; as a result of it historically implies energetic and covert information exfiltration.<\/p>\n<p>&#8220;What&#8217;s described right here is completely different,&#8221; he stated. &#8220;It&#8217;s a pre-positioned integration layer that is still dormant till triggered by a browser extension, which is a vital distinction. Regardless, the chance continues to be actual as this creates a persistent, pre-authorized bridge from browser extensions into a neighborhood executable working outdoors the browser sandbox, put in with out clear consumer consciousness and immune to removing. From a safety perspective, that meaningfully expands the assault floor.&#8221;<\/p>\n<p>Kenney agrees that the way in which Anthropic has designed its software program on this occasion breaks a broadly understood belief boundary.<\/p>\n<p>&#8220;Customers don&#8217;t count on a desktop software to silently modify different purposes, particularly throughout distributors,&#8221; he stated. &#8220;European regulators, particularly, count on specific opt-in, set up scoped solely to user-selected integrations, and clear persistent controls with actual revocation. This implementation falls wanting that baseline. European enforcement is transferring towards demonstrable, user-visible management reasonably than implied or deferred consent. Silent system modification throughout software boundaries is strictly the sort of sample regulators are more and more targeted on.&#8221;<\/p>\n<p>Hanff advised <em>The Register<\/em> that Anthropic has but to reply to his submit. He stated he hasn&#8217;t filed a proper grievance however intends to if the corporate fails to repair the Claude for Desktop set up course of.<\/p>\n<p>Kenney stated, &#8220;Placing the authorized ramifications apart, there may be substantial reputational harm and lack of consumer belief that comes from an organization that customers understand as being dedicated to security and privateness releasing instruments that seemingly undercut that posture.&#8221; \u00ae<\/p>\n<\/p><\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2026\/04\/20\/anthropic_claude_desktop_spyware_allegation\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One app mustn&#8217;t modify one other app with out asking for and receiving your specific consent. But Anthropic&#8217;s Claude Desktop for macOS installs information that&#8230;<\/p>\n","protected":false},"author":1,"featured_media":123584,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-123583","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Claude Desktop changes software permissions without consent \u2022 The Register - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Claude Desktop changes software permissions without consent \u2022 The Register - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-20T20:57:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-20T20:59:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/04\/shutterstock_generic_claude.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/04\\\/20\\\/claude-desktop-changes-software-permissions-without-consent-the-register\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/04\\\/20\\\/claude-desktop-changes-software-permissions-without-consent-the-register\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Claude Desktop changes software permissions without consent \u2022 The Register\",\"datePublished\":\"2026-04-20T20:57:07+00:00\",\"dateModified\":\"2026-04-20T20:59:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/04\\\/20\\\/claude-desktop-changes-software-permissions-without-consent-the-register\\\/\"},\"wordCount\":1230,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/04\\\/20\\\/claude-desktop-changes-software-permissions-without-consent-the-register\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_generic_claude.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/04\\\/20\\\/claude-desktop-changes-software-permissions-without-consent-the-register\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/04\\\/20\\\/claude-desktop-changes-software-permissions-without-consent-the-register\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/04\\\/20\\\/claude-desktop-changes-software-permissions-without-consent-the-register\\\/\",\"name\":\"Claude Desktop changes software permissions without consent \u2022 The Register - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/04\\\/20\\\/claude-desktop-changes-software-permissions-without-consent-the-register\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/04\\\/20\\\/claude-desktop-changes-software-permissions-without-consent-the-register\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_generic_claude.jpg\",\"datePublished\":\"2026-04-20T20:57:07+00:00\",\"dateModified\":\"2026-04-20T20:59:04+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/04\\\/20\\\/claude-desktop-changes-software-permissions-without-consent-the-register\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/04\\\/20\\\/claude-desktop-changes-software-permissions-without-consent-the-register\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/04\\\/20\\\/claude-desktop-changes-software-permissions-without-consent-the-register\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_generic_claude.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_generic_claude.jpg\",\"width\":1800,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/04\\\/20\\\/claude-desktop-changes-software-permissions-without-consent-the-register\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Claude Desktop changes software permissions without consent \u2022 The Register\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Claude Desktop changes software permissions without consent \u2022 The Register - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/","og_locale":"en_US","og_type":"article","og_title":"Claude Desktop changes software permissions without consent \u2022 The Register - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2026-04-20T20:57:07+00:00","article_modified_time":"2026-04-20T20:59:04+00:00","og_image":[{"width":1800,"height":900,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/04\/shutterstock_generic_claude.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Claude Desktop changes software permissions without consent \u2022 The Register","datePublished":"2026-04-20T20:57:07+00:00","dateModified":"2026-04-20T20:59:04+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/"},"wordCount":1230,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/04\/shutterstock_generic_claude.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/","url":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/","name":"Claude Desktop changes software permissions without consent \u2022 The Register - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/04\/shutterstock_generic_claude.jpg","datePublished":"2026-04-20T20:57:07+00:00","dateModified":"2026-04-20T20:59:04+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/04\/shutterstock_generic_claude.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/04\/shutterstock_generic_claude.jpg","width":1800,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2026\/04\/20\/claude-desktop-changes-software-permissions-without-consent-the-register\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Claude Desktop changes software permissions without consent \u2022 The Register"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/123583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=123583"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/123583\/revisions"}],"predecessor-version":[{"id":123585,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/123583\/revisions\/123585"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/123584"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=123583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=123583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=123583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}