The JR Protection plugin (h/t: WP Jedi) purports to add content-scraping protection to one's blog posts - namely, by using javascript to block right-click and highlight functionality, and by disabling the RSS feed.
Personally, I think the plugin's functionality is ineffective toward its purported objective; but that's not the biggest complaint I have with this plugin. Despite being ineffective, the plugin is an SEO/spam Trojan horse.
Plugin Options Admin Page Spam
First up: spam injected in the plugin's options admin page.
Take a look at Line 280 of the plugin file:
<iframe src="http://www.jakeruston.co.uk/plugins/index.php" width="100%" height="20%">iframe support is required to see this.</iframe>
The contents of the linked page currently displays the following in the plugin's options admin page:
And it's a huge banner, too: it takes up 100% of screen width, and 20% of screen height. In other words, on my screen, it takes up about three times the space taken up by the actual options presented on the page.
And that this advertising spam is injected using an iframe, rather than an image bundled with the plugin, presents a huge, potential vector for security threats. For one, the plugin author has complete control over the contents of the URL linked by the iframe. I subscribe to the TNO - Trust No One - security model. Besides, even if the plugin developer has only benevolent intent with this iframe, his site could get hacked, giving the hacker potential access to every site on which the plugin is installed.
wp_footer SEO/Spam Link Injection
Moving on to the even-more-spammy links injected into wp_footer.
The guidelines for hosting a plugin in the wordpress.org plugin repository are quite clear. Here is Restriction #4:
The plugin must not embed external links on the public site (like a "powered by" link) without explicitly asking the user's permission.
In the not-too-distant past, much discussion and argument have taken place around these restrictions, which led Mark Jaquith to clarify and expound upon them. Although his post was written in a somewhat tongue-in-cheek manner, everything he lists will, in fact, result in getting your plugin removed from the wordpress.org plugin repository. Here are two such offenses (#4-6):
- #4. Insert SEO spam links into people’s blogs (like <a href=”http://example.com/”>video poker</a>).
- #5. Insert external links (like a credit link, <a href=”http://example.com/”>My Awesome Plugin by Awesome Sauce</a>) into their blog without explicitly asking their permission, or make the default option be to insert the link.
- #6. Load portions of the code from an external site for no valid reason, or use any other trick to work around #3, #4 and #5.
Loading portions of code from an external site for no valid reason, Inserting SEO spam links
Taking a look at the JR Protection plugin, Line 449:
add_action('wp_footer', 'protection_footer_plugin_support');
So let's take a look at the protection_footer_plugin_support function, on Line 453:
function protection_footer_plugin_support() {
$linkper=utf8_decode(get_option('jr_protection_link_personal'));
...
The plugin goes through a lot of motions to populate jr_protection_link_personal, including pulling a link from the developers website every so often, based on a defined refresh rate. Here's the link, from Line 468:
$content = curl_get_contents("http://www.jakeruston.co.uk/plugins/links.php?url=".$url."&pname=".$pname);
Currently, that URL pulls the following content:
But in case the plugin is unable to pull from the above-specified URL, it conveniently hard-codes some similar, fall-back spam links. See Line 109:
$content = "Powered by <a href='http://arcade.xeromi.com'>Free Online Games</a> and <a href='http://directory.xeromi.com'>General Web Directory</a>.";
And here's some more (including the only legitimate credit link the plugin provides), from Lines 118-130:
if (get_option("jr_protection_link_personal")=="") {
$rand=rand(2,2);switch ($rand) {
case 1:
$anch="Jake Ruston's <a href="http://www.jakeruston.co.uk">Wordpress Plugins</a>";
break;
case 2:
$anch="<a href="http://www.xeromi.net">Cheap Web Hosting</a>";
break;
}update_option("jr_protection_link_personal", $anch);
Inserting external links without explicitly asking permission, or setting option to display links to default to enabled
And going even further, these wp_footer links are injected by default. Here are the default settings. The key option is "Show Plugin Support?":
And especially annoying, when the user clicks the "No" option for "Show Plugin Support?", the plugin displays a nag dialogue:
Now that's just tacky.
An Ineffective Plugin
And here's the kicker: after putting up with all of that, what do you get? A totally ineffective plugin!
Broken Functionality
First, when testing out the plugin, I noted that, while the right-click disable appeared to be working, the text-highlight disable wasn't. I was able to select text both using the mouse to select specific text, and using CTRL-A to select all text.
Faulty Assumptions
But even more problematic are the plugin's faulty assumptions. The plugin assumes that anyone right-clicking or highlighting text on your site is attempting to steal your content, and that anyone using your RSS feed is attempting to scrape your content. In fact, the majority of people right-clicking and highlighting text on your site are doing so in order to link to/comment on your content, and the majority of users of your RSS are doing so for its intended purpose (to read your content).
Use of this plugin will result in the loss of all of your RSS subscribers, and a sharp reduction in people extending the conversation by writing about/commenting on your blog posts.
Gaping Holes
And it still won't do a think to prevent content theft! Due to two especially glaring holes, anyone intent on stealing your content will still be able to do so, despite use of this plugin:
Reliance on Javascript
The plugin relies on javascript to disable right-clicks and text-highlighting. Any user who browses your site with javascript disabled will be completely unaffected by this plugin, with respect to right-clicking and text-highlighting.
Browser Source
The plugin has absolutely no way to disable website visitors from using the view-source functionality built into every web browser. Even with the plugin enabled, one needs merely to invoke the browser's view-source functionality (in Firefox or Chrome, type "CTRL-U"; in Internet Explorer, select "View" from the menu, then "View Source"), which presents the entire contents in text format.
Conclusion
For all the reasons above, I would recommend against using the JR Protection plugin. Further, unless the plugin is modified to address the plugin repository restriction violations listed above, the plugin should be removed from the wordpress.org plugin repository.