![]() ![]() They don’t even have real site isolation (different parent domains can still share the same content process) or a sandbox over there, making escapes and exploits child’s play. Firefox has shoddy security practices and is 5 years behind Chromium minimum in terms of security. It’s easy to find nothing when nobody uses your shit or bases any kind of software on it. Who uses the Firefox codebase? Just Mozilla and the undermanned Tor Project, LOL. You know who works with Chromium code? Not just Google, but also Microsoft, Opera, Amazon, Brave Software, Vivaldi Technologies, Intel, and thousands upon thousands of Electron apps. There’s a better chance to catch zero days if the codebase is actually being used and scrutinized. > if they’re patching 20 to 30 security exploits a month, and zero-day in-the-wild’s every month or two, just imagine how many they HAVEN’T caught The security issue that is patched in the new version of Chrome is rated high, the second highest rating after just another zero-day patch day at chromium you guys The official post on the Chrome releases blog offers little information. A restart is required to complete the process.The browser should pick up the latest update and install it automatically. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |