Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Google Chrome Security IT

Google's Safe Browsing Protection in Chrome Goes Real-Time (techcrunch.com) 49

Google announced a major change to its Safe Browsing feature in Chrome today that will make the service work in real time by checking against a server-side list -- all without sharing your browsing habits with Google. From a report: Previously, Chrome downloaded a list of known sites that harbor malware, unwanted software and phishing scams once or twice per hour. Now, Chrome will move to a system that will send the URLs you are visiting to its servers and check against a rapidly updated list there. The advantage of this is that it doesn't take up to an hour to get an updated list because, as Google notes, the average malicious site doesn't exist for more than 10 minutes.

The company claims that this new server-side system can catch up to 25 percent more phishing attacks than using local lists. These local lists have also grown in size, putting more of a strain on low-end machines and low-bandwidth connections. Google is rolling out this new system to desktop and iOS users now, with Android support coming later this month.

This discussion has been archived. No new comments can be posted.

Google's Safe Browsing Protection in Chrome Goes Real-Time

Comments Filter:
  • by Rosco P. Coltrane ( 209368 ) on Thursday March 14, 2024 @12:51PM (#64315365)

    How can this be disabled?

    • Re: (Score:3, Informative)

      by serafean ( 4896143 )

      Chromium

    • by Grokew ( 8384065 ) on Thursday March 14, 2024 @12:57PM (#64315371)
      We are being spied on, in the name of safety, and privacy. ðY
      • by AmiMoJo ( 196126 )

        We aren't. TFA explains how this works:

        1. When you visit a site, Chrome first checks its cache to see if the address (URL) of the site is already known to be safe (see the âoeStaying speedy and reliableâ section for details).
        2. If the visited URL is not in the cache, it may be unsafe, so a real-time check is necessary.
        3. Chrome obfuscates the URL by following the URL hashing guidance to convert the URL into 32-byte full hashes.
        4. Chrome truncates the full hashes into 4-byte long hash prefixes.
        5. C

    • I have "safe browsing" turned off which somehow makes their safety net more intrusive. Chrome will complain my file is unverified and make me click on keep. You would think disabling safe browsing would disable this, but nope. God forbid a file isn't sent via https either.

      • by thegarbz ( 1787294 ) on Thursday March 14, 2024 @01:48PM (#64315529)

        Chrome will complain my file is unverified and make me click on keep.

        Oh noes, god forbid a user is warned about downloading a file from an insecure connection. How horrible!

        Google is implementing a stop gap given a safety was disabled. If you don't want your hand held when browsing the internet then why the everloving **** are you using Chrome? If you're the type of person to disable safe browsing then this is not a browser designed for you.

        Use appropriate software to your needs.

        • Oh noes, god forbid a user is warned about downloading a file from an insecure connection. How horrible!

          Have you ever seen a heavy handed authoritarian solution backed by a government or big nasty fascist corporation you didn't like? Weren't you cheerleading all the mandates for CV19, too? I bet you're great fun at parties.

          • authoritarian solution backed by a government

            People can't choose authoritarian governments (that's the point of them). People can choose their software. Google Chrome is designed for the common idiot and has features targeted at protecting the common idiot. It's use is optional. Use something else.

            Weren't you cheerleading all the mandates for CV19, too?

            Absolutely. I fully support health mandates that reduce death and long term suffering for fellow humans, even if it does come at the minor cost of you being slightly inconvenienced. And I'm glad I lived in a country where it was taken seriously.

            I bet you're great fun at parties.

            I have been t

            • People can't choose authoritarian governments

              ... and this is why you love them?

              Absolutely. I fully support health mandates

              I'm shocked. Yes, yes, I got all the tripe about "preventing death". That's typical of safety-cult folks like yourself. You always have a reason you find adequate to tell others how to live and what to do. You were all for the censorship and heavy handed authoritarian tactics and seemed to celebrate the more draconian they got.

              I have been told I'm very fun at parties.

              Your mom does not count.

        • by AmiMoJo ( 196126 )

          The unsecure connection warnings had a massive, positive effect on the web.

          Before, your browsing habits were regularly monitored by your ISP and security services. Now it is 99% HTTPS, they can not long do mass surveillance. I'm sure that the NSA and GCHQ can get the data if they really want to, but there is a cost and they need to target rather than indiscriminately spy on everyone.

          Most web hosts now offer free SSL certificates via an automated system, and there is also Let's Encrypt free and easy to use c

    • How can this be disabled?

      The fact that you're asking this shows that you're okay with it. You don't disable things in Chrome to protect your privacy, you just reach for another bottle of lube.

      • It was a rhetorical question. I don't run Chrome, as I trust dodgy websites more than I trust anything Google comes up with.

        I run LibreWolf with resist-fingerprinting and all privacy options turned on, uBlock Origin in hard mode, I make extensive use of multi account containers to compartmentalize my browsing, and I'm generall very anal about which sites I browse and how.

        And while Chromium is open-source and there are plenty of excellent Chromium-based privacy-oriented browsers out there, I refuse to run an

        • by AmiMoJo ( 196126 )

          That's great but you are not getting protection from malware that way. In fact you are taking a risk because Librewolf releases lag behind Firefox ones, i.e. security patches take longer to get to you, and because Librewolf doesn't have a built-in auto-updater so there is even more lag as you either become aware of updates or wait for your package manager to distribute them.

          Librewolf does actually support Google's safe browsing tech: https://librewolf.net/docs/set... [librewolf.net]

          That's the one which downloads a database

    • How can this be disabled?

      You can find the answer here [mozilla.org].

    • This can be disabled using the setting described here: Choose your Safe Browsing protection level in Chrome [google.com]

      Settings > Privacy and Security > Security > Safe Browsing

    • by vbdasc ( 146051 )

      Have something to hide, citizen?

  • by backslashdot ( 95548 ) on Thursday March 14, 2024 @12:58PM (#64315375)

    Why doesn't WhatsApp/Skype etc. have anything remotely like this to catch all its scammers?

  • Privacy implications (Score:4, Interesting)

    by jddimarco ( 1754954 ) on Thursday March 14, 2024 @01:10PM (#64315399)
    There is some pretty nice thought put into this system to allow Google to use a server-side list, but hinder Google from being able to record which websites are being browsed. One problem, though, is that it normalizes Chrome sending encrypted data regularly to Google each time a new site is visited, making it more difficult, if Google were to later add surveillance to Chrome, for that fact to be uncovered through unusual traffic patterns, because said patterns would not be unusual. That being said, the benefit may be worth the risk, as phishing is an absolute plague right now.
    • by mysidia ( 191772 )

      if Google were to later add surveillance to Chrome, for that fact to be uncovered through unusual traffic patterns, because said patterns would not be unusual

      With this it doesn't seem like they even need to add surveillance to Chrome; just get the nature of the "Privacy servers" tweaked on the backend; which can't be verified from your web browser.

      The second they can log the hashes reported with your IP Address it's game over, As they can start building a database to reverse the hash codes --- they

      • Isn't it using hash prefixes though, not a full hash?

        Also, Google isn't the one running the privacy server that sits in the middle between your client and their secure browsing server in this case: Fastly is.

    • by thegarbz ( 1787294 ) on Thursday March 14, 2024 @01:54PM (#64315557)

      One problem, though, is that it normalizes Chrome sending encrypted data regularly to Google each time a new site is visited, making it more difficult, if Google were to later add surveillance to Chrome

      I'm sorry but WTF? Normalises? It's 2024 mate. Your browser ... *ALL BROWSERS* are constantly sending encrypted data back and forth between servers. Heck it's says right there in the summary that this transmission of data replaces another previously hourly transmission of data. Have you ever wondered why your browser is up to date? Didn't Google introduce a system level service back in 2007 that automatically communicated with its servers in an encrypted way, and keep your data up to date?

      This *IS* normalised. Fire up wireshark on your computer one day if you want to have a freakout.

      • by AmiMoJo ( 196126 )

        This is untrue. Neither Firefox nor Chrome are "constantly sending encrypted data back and forth between (Mozilla/Google) servers".

        By default, they come with browser sync disabled. For malware, they download a database every half an hour, and the only thing sent is a version number for the existing database so that the server can respond with just diffs.

        They both periodically check for new versions, and Chrome sends an installation ID along with that check. I think the check is once per day, it might be mor

        • They both periodically check for new versions

          What part of a browser making an encrypted communication with a server that you are unable to independently verify is so confusing to you?

          Data is being sent and received over an encrypted channel. That is normalised. Your post gave an example of it happening despite you saying it's not. I never said all browsers phone home with your data, I said "encrypted data". Unless you think opening an encrypted connection to a foreign server is somehow able to be done without sending any data (in which case I suggest

          • by AmiMoJo ( 196126 )

            You can understand it. Just look at the source code. Build it and verify that the binary matches the released one. Both Firefox and Chromium are open source.

    • by Shakrai ( 717556 )

      One problem, though, is that it normalizes Chrome sending encrypted data regularly to Google each time a new site is visited, making it more difficult

      It's pretty trivial to install your own certificate authority and perform MITM attacks [wikipedia.org] against all encrypted traffic coming from a particular endpoint over which you have control. It's less trivial but still doable to decompile a program and look through the source for hidden processes like you describe. All of which is to say I doubt Google could keep something like you describe a secret for very long, if they were inclined to try it, which seems unlikely. Why risk the bad PR and inevitable lawsuits whe

  • I put in a URL, you take me there. That's the job of a browser.

    This nanny state needs to stop.

    • by russty ( 7398610 )

      You can quit "this nanny state" anytime by downloading Firefox or another browser. Stop complaining about things entirely under your control.

      • Firefox does the same thing. It checks the site you're going to and throws up a scary warning if it thinks it's not safe.

        • >"Firefox does the same thing. It checks the site you're going to and throws up a scary warning if it thinks it's not safe."

          What you described is called "Deceptive Content and Dangerous Software Protection"

          1) This protection is ENTIRELY configurable by the user by settings you can CHOOSE. It is enabled by default.

          2) It uses downloaded list of malware sites, firefox is not sending real-time "I am going here" data to anyone with any setting. It is simply checking against a LOCAL list.

          https://support.mozi [mozilla.org]

    • Why are you using an advertising company's browser anyway?

      • >"Why are you using an advertising company's browser anyway?"

        Bingo. And the longer version would be:

        "Why are you using a browser pushed by an advertising company, who has a vested interest in collecting as much information you as possible, who wants to set all the "standards" to ensure they have full control, that has no community oversight, that is pushing a binary blob, and that has caused all other multiplatform browsers to die or use their code... except Firefox?"

    • This nanny state is needed because many users won't or can't maintain their own security. Things like warnings about unsafe sites, password checkups, and more help protect people from not just getting their accounts or devices compromised but also protect other people's data that they have in those accounts or devices (like the 23andMe 'breach'/credential stuffing).

  • Can China use this for censorship? Actually, is Chrome even allowed in China?

  • Clearly a scam (Score:5, Interesting)

    by peterww ( 6558522 ) on Thursday March 14, 2024 @02:46PM (#64315703)

    I think it's obvious they've designed this to make Google money.

    The big tell is that this is supposedly because it takes too long to get an update. The story goes, we don't download lists of malware except once an hour, but we want you to get updates sooner, so we will push your requested URLs to our server where we'll check them in real time. Why don't they just download the list more frequently? Because that would be a lot of traffic, and make your own connection slower as well as Google's.

    So then, if the problem with sending you updates constantly is too many updates, can't they just send the individual changes to the malware list to your browser? The answer is: yes, they can. They can send you compressed deltas of malware lists as they are updated in real time, which is a small, fast update. This will actually be less traffic than sending every one of your browser requests to them. So why don't they just send your browser the compressed deltas?

    Simple: that wouldn't allow them to monitor what sites you're going to. They still need you to send them that list of sites so they can mine it for money.

    Now, they're claiming that Google and Fastly have designed a complex system to prevent anyone from figuring out what you're sending them. But we already know from above that this complex system isn't even necessary, and would actually be more efficient than what they've created. And the only reason for them to receive the updates is so they can have more information to make money off of.

    What are they actually using this for? I don't know. But it's clearly not just to help the users.

    • >"Why don't they just download the list more frequently?"

      And exactly how long/big/difficult is it to push a diff?
      And why should Google be in control of that list?
      And what controls will users have?
      And what happens when the list is weaponized?
      And how can it be audited?

      >"Now, they're claiming that Google and Fastly have designed a complex system to prevent anyone from figuring out what you're sending them."

      Which we have no way to confirm and which can change at any time.

      >"What are they actually using

      • > And exactly how long/big/difficult is it to push a diff?

        long, big, and difficult are 3 different things:

        1. Long: latency is fast to Google datacenters

        2. Big: let's just assume a compressed delta of a single site update is 20 bytes data payload, and 16 bytes TCP overhead. Compare that to the 4 byte hash payload + 16 byte TCP overhead of sending every single one of your website requests to Google. All you would have to do is look at 4 web pages within the time frame of the Malware list changing, for it t

    • by AmiMoJo ( 196126 )

      They already do send compressed deltas, so your conspiracy theory falls apart. Here's the API documentation if you don't believe me: https://developers.google.com/... [google.com]

      Not also how the whole system works using 4 byte partial hashes, which can't be reversed into URLs. It's a well established practice for checking things against a list without revealing what the thing is. You calculate a longer hash of the thing, but only send part of it, and the server responds with all the hashes that match that part. You the

      • That's an insanely fat request/response protocol. They could cut that down to a dozen bytes per update.

        Yes, it would *appear* their system is "unreversible", but statistical analysis has long proved that you only need a little bit of metadata (not even necessarily the payload) to determine the content to a high probability. I don't have time to explain how it works, but it's a very old practice. Among other things it's how Tor connections are tracked by 5 Eyes.

  • next, the system will "protect" us from dissenting opinion on the new thing.

Dynamically binding, you realize the magic. Statically binding, you see only the hierarchy.

Working...