![]() Safe Browsing provides a list for each threat it protects users against on the internet. ![]() Chrome with Safe Browsing checks all URLs, redirects or included resources, to identify such threats and protect users. Each of these URLs can potentially host threats such as phishing websites, malware, unwanted downloads, malicious software, unfair billing practices, and more. Further, URLs may redirect to other URLs when being loaded. These objects, also called resources, have a web address which is called their URL (Uniform Resource Locator). These objects include the structure of the webpage (HTML), the styling (CSS), dynamic behavior in the browser (Javascript), images, downloads initiated by the navigation, and other webpages embedded in the main webpage. When a user navigates to a webpage on the internet, their browser fetches objects hosted on the internet. We will cover the APIs used for Enhanced Protection users in a future post. This should be useful for users to understand how Safe Browsing protects them, and for interested developers to browse through and understand the implementation. This post describes how Chrome implements the Update API, with appropriate pointers to the technical implementation and details about the privacy-conscious aspects of the Update API. If the user has opted-in to « Enhanced Protection» (covered in an earlier post) or « Make Searches and Browsing Better«, Chrome shares limited additional data with Safe Browsing only to further improve user protection. This API was developed with user privacy in mind and ensures Google gets as little information about the user’s browsing history as possible. In the most common case, Chrome uses the privacy-conscious Update API (Application Programming Interface) from the Safe Browsing service. Safe Browsing works in different ways depending on the user’s preferences. When Chrome users browse the web with Safe Browsing protections, Chrome uses the Safe Browsing service from Google to identify and ward off various threats. Google Chrome, henceforth called Chrome, enables its users to protect themselves from such threats on the internet. They may also be led into installing malicious software on their machines, called malware, which can collect personal data and also hold it for ransom. Users may be tricked into sharing sensitive information like their passwords with a misleading or fake website, also called phishing. There are various threats a user faces when browsing the web. By Rohit Bhatia, Mollie Bates, Google Chrome Security
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |