Google Chrome will check for leaked credentials every time you sign in anywhere

Double-encrypted. That said, if you're worried about over-sharing, what are you doing on Chrome?

A new feature in Google's Chrome browser will warn you if your username and password matches a known combination in a security breach every time you type credentials into any website.

This credential check is "gradually rolling out for everyone signed into Chrome" as part of the Safe Browsing option, according to the announcement.

The potential worry here is that sending your credentials to Google for checking could itself be a security risk. The technology used was announced nine months ago, when the Password Checkup extension was introduced. At the time it was described as an "early experiment". The way it works is as follows:

  1. Google maintains a database of breached usernames and passwords, hashed and encrypted. In other words, the username/password combinations are not stored, only the encrypted hash.
  2. When you type in your credentials, the browser sends a hashed and encrypted copy of the credentials to Google, where the key used for encryption is private to the user. In addition, it sends a "hash prefix" of the account details, not the full details.
  3. Google searches the breach database for all credentials matching the hash prefix and sends the results back to the browser. These are encrypted with a key known only to Google. In addition, Google encrypts your credentials with this same key – so it is now doubly encrypted.
  4. The final check is local. Chrome decrypts the credentials using your private key, yielding a copy encrypted only with Google's key. This is then compared to the values in the database. If a match is found, an alert is raised.
The process by which Google checks credentials against a database of breached usernames and passwords

The process by which Google checks credentials against a database of breached usernames and passwords (Click to enlarge)

The idea is that your credentials are never sent to Google in a form it can read, and that details of other people's breached credentials are never sent to you in a form you can read. The procedure, we are told, "reflects the work of a large group of Google engineers and research scientists".

Even though users may still feel uncomfortable enabling this kind of check, the risks are likely lower than that of being unaware that your credentials have been stolen. The bigger snag, perhaps, is that you have to sign into Chrome with all that implies in terms of giving the data-grabbing giant more information about your digital life.

In addition, Google says it is improving its phishing site protection, with 30 per cent more cases being spotted. A further protection is that if you use Chrome's password manager, you will be alerted if you enter credentials stored there into a suspected phishing site.

What about if someone else signs into Chrome on a shared computer, and you inadvertently save your password into someone else's profile? If this can happen you probably already have some potential security issues to worry about, but Google is trying to make it less likely by a more prominent indication of the current profile. ®

Other stories you might like

  • DigitalOcean sets sail for serverless seas with Functions feature
    Might be something for those who find AWS, Azure, GCP overly complex

    DigitalOcean dipped its toes in the serverless seas Tuesday with the launch of a Functions service it's positioning as a developer-friendly alternative to Amazon Web Services Lambda, Microsoft Azure Functions, and Google Cloud Functions.

    The platform enables developers to deploy blocks or snippets of code without concern for the underlying infrastructure, hence the name serverless. However, according to DigitalOcean Chief Product Officer Gabe Monroy, most serverless platforms are challenging to use and require developers to rewrite their apps for the new architecture. The ultimate goal being to structure, or restructure, an application into bits of code that only run when events occur, without having to provision servers and stand up and leave running a full stack.

    "Competing solutions are not doing a great job at meeting developers where they are with workloads that are already running today," Monroy told The Register.

    Continue reading
  • Patch now: Zoom chat messages can infect PCs, Macs, phones with malware
    Google Project Zero blows lid off bug involving that old chestnut: XML parsing

    Zoom has fixed a security flaw in its video-conferencing software that a miscreant could exploit with chat messages to potentially execute malicious code on a victim's device.

    The bug, tracked as CVE-2022-22787, received a CVSS severity score of 5.9 out of 10, making it a medium-severity vulnerability. It affects Zoom Client for Meetings running on Android, iOS, Linux, macOS and Windows systems before version 5.10.0, and users should download the latest version of the software to protect against this arbitrary remote-code-execution vulnerability.

    The upshot is that someone who can send you chat messages could cause your vulnerable Zoom client app to install malicious code, such as malware and spyware, from an arbitrary server. Exploiting this is a bit involved, so crooks may not jump on it, but you should still update your app.

    Continue reading
  • Google says it would release its photorealistic DALL-E 2 rival – but this AI is too prejudiced for you to use
    It has this weird habit of drawing stereotyped White people, team admit

    DALL·E 2 may have to cede its throne as the most impressive image-generating AI to Google, which has revealed its own text-to-image model called Imagen.

    Like OpenAI's DALL·E 2, Google's system outputs images of stuff based on written prompts from users. Ask it for a vulture flying off with a laptop in its claws and you'll perhaps get just that, all generated on the fly.

    A quick glance at Imagen's website shows off some of the pictures it's created (and Google has carefully curated), such as a blue jay perched on a pile of macarons, a robot couple enjoying wine in front of the Eiffel Tower, or Imagen's own name sprouting from a book. According to the team, "human raters exceedingly prefer Imagen over all other models in both image-text alignment and image fidelity," but they would say that, wouldn't they.

    Continue reading

Biting the hand that feeds IT © 1998–2022