{"id":29765,"date":"2019-10-18T04:53:12","date_gmt":"2019-10-18T04:53:12","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/"},"modified":"2019-10-18T04:53:12","modified_gmt":"2019-10-18T04:53:12","slug":"google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/","title":{"rendered":"Google slings websites into Chrome&#8217;s solitary confinement on Android to thwart Spectre-style data snooping"},"content":{"rendered":"<p>Last year, Google <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/07\/12\/chrome_site_isolation\/\" rel=\"noopener noreferrer\">deployed Site Isolation<\/a> in desktop versions of its Chrome browser as a defense against CPU side-channel attacks like Spectre. The technique renders websites in separate processes to prevent one from interfering with or snooping on another, augmenting browser sandboxing defenses.<\/p>\n<p>On Thursday this week, the Chocolate Factory said it has activated the security mechanism in the Android version of Chrome 77, which debuted last month. The ad biz also extended Site Isolation defenses to protect against fully compromised renderer processes and universal cross-site scripting bugs on desktop versions of Chrome.<\/p>\n<p>The Site Isolation in Android comes with some qualifications because the technique imposes memory overhead of about 3 to 5 per cent. So mobile devices must have at least 2GB of RAM to use Site Isolation, and even then, the defense is only activated when visiting websites with a login mechanism and only for 99 per cent of Chrome for Android users \u2013 1 per cent of devices are excluded to provide a monitoring and performance baseline.<\/p>\n<p>&#8220;Once Chrome observes a password interaction on a website, future visits to that site will be protected by Site Isolation,&#8221; said Google software engineers Alex Moshchuk and \u0141ukasz Anforowicz in a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.chromium.org\/2019\/10\/recent-site-isolation-improvements.html\">blog post<\/a>. &#8220;That means the site will be rendered in its own dedicated renderer process, walled off from other sites.&#8221;<\/p>\n<p>Users not content with devoting such a small portion of memory to better security can set a flag (via <code>chrome:\/\/flags\/#enable-site-per-proces<\/code>) to activate Site Isolation for all sites, not just sites with login forms.<\/p>\n<p>Doing so is likely to bring Chrome for Android closer to desktop Chrome levels of memory overhead \u2013 10 per cent to 13 per cent, as tested on Chrome 67, when Site Isolation is applied to many browser tabs.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/08\/12\/chrome-logo.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"The Google Chrome web browser\"><\/p>\n<h2 title=\"Warns site owners: Images, audio, video will be barred in gradual process\">Nix to the mix: Chrome to block passive HTTP content swirled into HTTPS pages<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2019\/10\/08\/google_chrome_will_block_http_content_mixed_into_https_pages\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>The desktop versions of Chrome have been beefed up to do more than just prevent data leakage from a render process. Site Isolation in desktop Chrome can now defend effectively even if an attacker is able to exploit a memory corruption bug in Chrome&#8217;s rendering engine, Blink.<\/p>\n<p>It&#8217;s able to do so because Chrome&#8217;s browser process can identify the website associated with a given render process and can limit the cookies, passwords, and site data available, thereby preventing cross-site data grabs.<\/p>\n<p>And that&#8217;s for the best. As Google observes, bugs in Chrome&#8217;s Blink engine turn up regularly, despite considerable efforts to avoid them, including fuzzing, bug bounty programs, and developer education. There were 10 potentially exploitable bugs in renderer components in Chrome 69, five in Chrome 70, 13 in Chrome 71, 13 in Chrome 72, and 15 in Chrome 73.<\/p>\n<p>Beyond memory overhead, Site Isolation has implications for web developers in terms of how they craft websites. Google warns that the unload handlers \u2013 implemented to trigger a when a document or child resource is closed or unloaded \u2013 <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/developers.google.com\/web\/updates\/2018\/07\/site-isolation#unload_handlers_might_time_out_more_often\">may not run reliably<\/a>. Also, full-page layout under Site Isolation is no longer synchronous, which could mess up calculations pegged to not yet rendered page elements. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1858\/-7800\/what-next-after-netezza?td=wptl1858\">What next after Netezza?<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/10\/18\/chrome_solitary_confinement\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ignore the overhead, enjoy Site Isolation \u2013 a defense against side-channel attacks Last year, Google deployed Site Isolation in desktop versions of its Chrome browser as a defense against CPU side-channel attacks like Spectre. The technique renders websites in separate processes to prevent one from interfering with or snooping on another, augmenting browser sandboxing defenses.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29766,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-29765","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google slings websites into Chrome&#039;s solitary confinement on Android to thwart Spectre-style data snooping 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google slings websites into Chrome&#039;s solitary confinement on Android to thwart Spectre-style data snooping 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-18T04:53:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google slings websites into Chrome&#8217;s solitary confinement on Android to thwart Spectre-style data snooping\",\"datePublished\":\"2019-10-18T04:53:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\\\/\"},\"wordCount\":520,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\\\/\",\"name\":\"Google slings websites into Chrome's solitary confinement on Android to thwart Spectre-style data snooping 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping.jpg\",\"datePublished\":\"2019-10-18T04:53:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google slings websites into Chrome&#8217;s solitary confinement on Android to thwart Spectre-style data snooping\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google slings websites into Chrome's solitary confinement on Android to thwart Spectre-style data snooping 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/","og_locale":"en_US","og_type":"article","og_title":"Google slings websites into Chrome's solitary confinement on Android to thwart Spectre-style data snooping 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-18T04:53:12+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google slings websites into Chrome&#8217;s solitary confinement on Android to thwart Spectre-style data snooping","datePublished":"2019-10-18T04:53:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/"},"wordCount":520,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/","url":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/","name":"Google slings websites into Chrome's solitary confinement on Android to thwart Spectre-style data snooping 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping.jpg","datePublished":"2019-10-18T04:53:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/google-slings-websites-into-chromes-solitary-confinement-on-android-to-thwart-spectre-style-data-snooping\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Google slings websites into Chrome&#8217;s solitary confinement on Android to thwart Spectre-style data snooping"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29765"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29765\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29766"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}