Liliputing

  • Reviews
  • Deals
  • How To…
  • Mini PCs
  • Shop
  • About
    • About Liliputing
    • Contact us
    • Advertise on Liliputing
    • Support Liliputing
    • Privacy Policy

Google: Hack Chrome OS, please

02/03/2011 at 9:25 AM by Brad Linder 2 Comments

There are two schools of thought on cloud-based services. The first is that the most secure place to store your apps and data are in the cloud where you won’t lose anything if your computer crashes or gets stolen or if your house burns down, taking all of your backup hard drives with it. The second is that one of the least secure things you can do is to let a big company like Google (or Mozy) handle all of your data — where it can fall into the hands of hackers, or even worse, marketers.

Wherever you fall on the spectrum, we know Google’s stance. The company is a strong advocate of web-based services, whether you believe in the altruistic security defense or just that the more stuff you store online the more Google can anonymously analyze your data and personalize your experience (and sell some data to advertisers).

A few months ago Google showed how its Chrome operating system made the Cr-48 notebook and any upcoming Chrome OS notebooks virtually interchangeable. If one notebook is destroyed, you can pick up exactly where you left off just by logging into your Google account on another.

Now Google is taking another step, and effectively daring hackers to find a way to exploit the operating system to get at user data (presumably so the company can fix any security holes).

The company is offering a $20,000 bounty on exploits at this year’s Pwn2Own event. Since the OS is pretty tightly locked down so that essentially it only runs a web browser.

Sure, $20,000 isn’t that much to Google… but it’s a pretty good incentive for hackers to kick the tires, which should help make the OS even more secure.

via Download Squad

Share this:

  • Facebook
  • Twitter
  • Reddit
  • Email

Daily Deals (2-19-2019)

Sony's WH-1000XM3 wireless noise-canceling headphones are among the best around, but with a $350 price tag, they're not exactly cheap. Fortunately, … [Read More...]



Support Liliputing

Liliputing’s primary sources of revenue are advertising and affiliate links (if you click the “Shop” button at the top of the page and buy something on Amazon, for example, we’ll get a small commission).

But there are several ways you can support the site directly even if you’re using an ad blocker and hate online shopping.

Contribute via PayPal

  • donate monthly
  • donate once only
Select a Donation Option (USD)

Enter Donation Amount (USD)

Subscribe via Patreon

Become a Patron!

2
Leave a Reply

Login with
Facebook Google Twitter WordPress Yahoo! Disqus Reddit Stackoverflow GitHub
avatar
This comment form collects your name, email address, and content to allow us to keep track of comments placed on this website. Please read our privacy policy for more details.
Save my name, email, and website in this browser cookies for the next time I comment.
2 Comment threads
0 Thread replies
0 Followers
 
Most reacted comment
Hottest comment thread
2 Comment authors
Mutamaanimatio Recent comment authors
avatar
This comment form collects your name, email address, and content to allow us to keep track of comments placed on this website. Please read our privacy policy for more details.
Save my name, email, and website in this browser cookies for the next time I comment.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  Subscribe  
newest oldest most voted
Notify of
animatio
Guest
animatio
You can flag a comment by clicking its flag icon. Website admin will know that you reported it. Admins may or may not choose to remove the comment or block the author. And please don't worry, your report will be anonymous.

well it is well known that linux systems are hackable to …. so “running only a browser” is no argument for security. in the case of chrome os the only relevant question might be where and what to hack ….
therefore google might have a vital interest to find foul bubbles in the system

Vote Up0Vote Down  Reply
8 years ago
Mutama
Guest
Mutama
You can flag a comment by clicking its flag icon. Website admin will know that you reported it. Admins may or may not choose to remove the comment or block the author. And please don't worry, your report will be anonymous.

you know what, rather than distroying those CRs. They should just give it to me! I get teary eyes wathing this video *sob sob*

Vote Up0Vote Down  Reply
8 years ago

Follow Liliputing:

Facebook Twitter YouTube tumblr RSS Patreon

Latest News

Taihe Gemini portable monitor is still up for pre-order (through a second crowdfunding campaign)

Taihe's Kickstarter campaign for its Gemini portable monitor has ended, and the … [Read More...]

Nubia Red Magic Mars now available in the US for $399

Chinese phone maker Nubia is positioning the Red Magic Mars as an affordable … [Read More...]

Qualcomm announces second-gen 5G modem (before the first hits the streets)

The first smartphones with support for 5G networks are coming soon, many of … [Read More...]

Featured articles

GPD MicroPC handheld computer preview

It's been a good couple of years for handheld computer enthusiasts. Companies … [Read More...]

Taihe Gemini portable 1080p touchscreen monitor preview

The Taihe Gemini portable monitor has made quite a splash since going up for … [Read More...]

Zotac Pico PI470 is a pocket-sized PC with Intel Amber Lake

Zotac's latest pocket-sized computer is the company's most powerful to date. … [Read More...]

Disclosure: Some links on this page are monetized by Skimlinks and Amazon's and eBay's affiliate programs.

Login

  • Register
  • Log in
  • Entries RSS
  • Comments RSS
  • WordPress.org

Copyright © 2019 Liliputing · About Liliputing · Contact Us · Privacy Policy · Go to top of page

wpDiscuz
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.