![]() |
| Google Chrome starts blocking Flash tracking for better battery life and performance |
Google Chrome starts blocking Flash tracking for better battery life and performance
Google has paid $56,500 for Chrome security bugs addressed in version fifty three of the browser, that conjointly stamps out the employment of Flash for trailing users.
Google has updated Chrome for UNIX, Mac, and Windows to mend thirty three security flaws and scale back its reliance on Flash.
Chrome 53, that rolled-out on Wed, introduces another effort from the search company to snuff out Flash on the desktop and push the online towards exploitation trendy HTML5-based school instead.
While Chrome continues to ship with the Flash Player plugin for currently, Chrome fifty three puts associate degree finish to the employment of Flash within the background for page analytics.
"This reasonably Flash slows you down, and beginning this Sept, Chrome fifty three can begin to dam it. HTML5 is way lighter and quicker, and publishers ar change over to hurry up page loading and prevent additional battery life. you will see associate degree improvement in responsiveness and potency for several sites," Google declared in August.
This restraint on Flash is associate degree extension to changes introduced in Chrome forty two last year, that reduced non-central Flash content to click-to-play. By Chrome fifty five, that is due go into Dec, Google expects to form HTML5 the default expertise, apart from sites that solely support Flash. Users are going to be prompted to alter Flash for those sites, otherwise it'll stay disabled.
Sidelining Flash ought to alter performance enhancements and can facilitate downgrade a platform that's close to not possible to avoid, nonetheless a continuing supply of risk attributable to its uncounted bugs that ar ofttimes exploited by attackers.
Chrome fifty three conjointly includes thirty three security fixes covering thirteen high-severity problems, six medium-severity problems, and one low severity issue.
The most serious of those were 2 universal cross-site scripting bugs in Google's Blink rendering engine, and one script injection that affected Chrome's extensions. Google paid security researchers $7,500 a bit for every of those 3 bugs.
So far, for Chrome fifty three bug fixes, Google has paid $56,500 beneath its bug bounty program. However, that figure could rise when Google determines the worth of 3 outstanding high severity bugs that were mounted in Chrome's integral PDF reader, PDFium.

No comments:
Post a Comment