| About me | Chrome Security security bug wrangler. Champion of zapping whole classes of bug too (π¦). Mountain biker, rock climber, snowboarder. Occasionally plays with model railways and goes gliding. Lives near Cambridge, UK |
| About me | Chrome Security security bug wrangler. Champion of zapping whole classes of bug too (π¦). Mountain biker, rock climber, snowboarder. Occasionally plays with model railways and goes gliding. Lives near Cambridge, UK |
In Chrome we've been working on what I think is a pretty cool new web API called DBSC. It'll help mitigate a threat that's actually outside of Chrome's traditional threat model, but one that my team has focused heavily on in recent years -- cookie theft from local malware. DBSC wil let you replace long-lived bearer tokens in cookies with a session that's bound to the device so it can't be stolen.
https://blog.chromium.org/2024/04/fighting-cookie-theft-using-device.html
Lars Bergstrom (Google Director of Engineering): "Rust teams are twice as productive as teams using C++."
https://www.reddit.com/r/rust/comments/1bpwmud/media_lars_bergstrom_google_director_of/
Discussions: https://discu.eu/q/https://www.reddit.com/r/rust/comments/1bpwmud/media_lars_bergstrom_google_director_of/
Thanks to @adetaylor, Comprehensive Rust
now has a course on how to add #rust to #chromium!
You can read the new section here: https://google.github.io/comprehensive-rust/chromium.html
If you do the final exercise, you will end up with a browser that speaks funny! π
Like the Rust in Android course, this is mostly relevant to the engineers who work on Chromium itself. Others are welcome to play along, but you should already know how to build Chromium.