Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Here's How to Enable Chrome "Strict Site Isolation" Experimental Security Mode
#1
Google Chrome 63, which shipped yesterday evening, arrived with a new experimental feature called Strict Site Isolation that according to Google engineers is an additional security layer on top of Chrome's built-in sandboxing technology.
While Google engineers have not explained the intricate differences between the default Chrome sandbox and Site Isolation, according to Google, the Strict Site Isolation feature puts "even stronger security boundaries between websites than Chrome’s existing sandboxing technology."
Quote:
Step 1: Type chrome://flags and press Enter.

Step 2: Scroll down the page and find "Strict site isolation" and press the Enablebutton. Alternatively, copy and access the following URL to take you to the Site Isolation flag directly: chrome://flags/#enable-site-per-process
Step 3: Restart the Chrome browser.


Source: https://www.bleepingcomputer.com/news/go...rity-mode/
Reply
#2
I havit enabled for a long time.
Reply
#3
(12-08-2017 , 06:36 PM)monstertruckpa Wrote: I havit enabled for a long time.
You're using this feature how's your experience with it?
Reply
#4
Will this interfere if you are running chrome in Sandboxie?
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Chrome use subject to restrictions in Dutch schools over data security concerns mrtrout 0 655 07-24-2022 , 01:47 AM
Last Post: mrtrout
  Google releases Chrome 90 with HTTPS by default and security fixes Imran 0 975 04-15-2021 , 03:00 PM
Last Post: Imran
  Unread Content Mark site read Home News Security & Privacy News Fortune 5 Bjyda 0 3,832 03-07-2021 , 12:13 AM
Last Post: Bjyda
  Unread Content Mark site read Home News Security & Privacy News AWS: Sola Bjyda 0 961 02-26-2021 , 11:07 PM
Last Post: Bjyda
  Google Chrome 78 is out: Forced dark mode, DoH trials, no more XSS Auditor Herran 0 1,666 10-23-2019 , 04:31 PM
Last Post: Herran

Forum Jump:


Users browsing this thread: 1 Guest(s)