Google is temporarily increasing the rewards it pays for hacks that exploit holes in a beefed-up security protection that debuted in desktop versions of Chrome last month. Chrome for Android, meanwhile, is receiving a slimmed-down version of the same protection.
For a limited time, Google will boost its normal bounty amounts for exploits that allow one site the browser is interacting with to steal passwords or other sensitive data from another accessed site. Google is also broadening its vulnerability reward program to include bugs in Blink—the core software that Chrome uses to render HTML and other resources—that allow similar types of cross-site data thefts.
Fortress of solitude
The changes come a month after the release of Chrome 77, which quietly strengthened an existing protection known as site isolation. Google developers first added site isolation in July 2018 in a highly ambitious engineering feat that required major architectural changes to the way the browser worked under the hood.
Like other browsers, Chrome previously mixed JavaScript and other content from two or more open sites into a single process. That design left open the possibility of an attacker website accessing sensitive data associated with another website through vulnerabilities known as Spectre and Meltdown. These vulnerabilities reside in virtually every modern processor, and they exploit a performance enhancement known as speculative execution.
As its name suggests, site isolation limits each Blink renderer process to contents from a single site. That way—even if a malicious site is able to bypass Spectre and Meltdown mitigations processor makers have added to their chips over the past 20 months—attacking websites won’t be able to access any data that’s worth stealing.
Beginning in desktop versions of Chrome 77, site isolation now protects not just against attacks targeting speculative execution, it also protects against even more severe attacks that occur when Blink is fully compromised through a memory corruption flaw or some other sort of security bug.


Loading comments...