{"id":3899,"date":"2012-02-28T11:36:38","date_gmt":"2012-02-28T16:36:38","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=3899"},"modified":"2012-02-28T11:36:38","modified_gmt":"2012-02-28T16:36:38","slug":"google-chrome-is-the-only-browser-that-has-never-been-exploited","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/google-chrome-is-the-only-browser-that-has-never-been-exploited\/","title":{"rendered":"Google Chrome is the Only Browser That Has Never Been Exploited"},"content":{"rendered":"<p><a href=\"http:\/\/thundercloud.net\/infoave\/new\/wp-content\/uploads\/2012\/02\/achrome-challenge.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3901\" title=\"Google will pay you if you can exploit Chrome\" src=\"http:\/\/thundercloud.net\/infoave\/new\/wp-content\/uploads\/2012\/02\/achrome-challenge.jpg\" alt=\"Google will pay you if you can exploit Chrome\" width=\"184\" height=\"122\" srcset=\"https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2012\/02\/achrome-challenge.jpg 439w, https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2012\/02\/achrome-challenge-300x198.jpg 300w\" sizes=\"(max-width: 184px) 100vw, 184px\" \/><\/a>About 60% of you use Internet Explorer. And about 90% of you have heard about the new Google Privacy Policy. As we&#8217;ve said many times before &#8212; if you&#8217;re worrying about tracking cookies, you really need to stop. Worrying about advertisers tracking you and trying\u00a0to sell you something is distracting. Tracking cookies which try to gather information about your tastes, likes and dislikes, for the purpose of trying to get you to buy something, is not inherently dangerous; using a browser than can be exploited by criminals or hackers is.<\/p>\n<p>So here&#8217;s the question: \u00a0What is more dangerous to your privacy: a.) Tracking cookies? Or b.) An browser which can be exploited and manipulated by criminals and hooligans who create Web sites to take advantage of known vulnerabilities in your Web browser? If you answered &#8220;b&#8221; &#8212; you&#8217;re right. A toothpaste ad from DoubleClick might drop tracking cookies on your computer and you may see a lot of cosmetic-oriented ads, but the main purpose of tracking cookies isn&#8217;t to find out who you are or install keyloggers or botnets or Trojans on your computer; the purpose of tracking cookies is to show you ads you&#8217;re more likely to click on and buy something.<\/p>\n<p>What&#8217;s the main purpose of exploiting your browser? Not to sell you legitimate products or show you ads you&#8217;re more likely to click on &#8211; the purpose of exploitation is almost always sinister. The miscreants who are devoted to exploiting your browser would love nothing more than to turn your computer into a spam-bot, or install a keylogger on your computer to record your key strokes (key strokes include keystrokes you make when you type in your home address, phone number, Social Security number, credit care numbers &#8212; and the like), or to control you computer to use in Denial of Service attacks against government sites or other site with whom the \u00a0misanthropes have a gripe or two.<\/p>\n<p>As we&#8217;ve said so many times &#8212; while the bloggers and tech writers are whipping up a frenzy over tracking cookies &#8212; there are much more sinister activities going on you should be concerned about. And that&#8217;s why all the fuss over tracking-cookies is so dangerous: it distracts you from more important and vastly more dangerous things.<\/p>\n<p>If you&#8217;re not using Google Chrome &#8212; you&#8217;re using an exploitable browser. That&#8217;s not opinion, that&#8217; fact. Over the last six years, Google Chrome has offered money to any hacker who could exploit it. This year it&#8217;s offering a cash prizes to anyone who can exploit Google Chrome. Have you seen Microsoft offering\u00a0\u00a0prize money and daring people to exploit Internet Explorer?<\/p>\n<p>Anyway, I&#8217;m sure you&#8217;re going to want more information about the Google Chrome challenge. No one&#8217;s exploited Chrome over the last six years &#8212; and Google seems pretty sure no one will be able to exploit it this year either. Which browser should you use? Whichever one you want. But if you&#8217;re one of those who worries about tracking cookies and you use Internet Explorer &#8212; maybe you should give it some thought.<\/p>\n<h3>Google\u2019s Giving $60,000 to Whoever Can Exploit Chrome<\/h3>\n<p><em>While both Safari and IE collapsed under the pressure from hackers at last year&#8217;s Pwn2Own contest, not one person was able to crack Chrome. This year, Google&#8217;s sweetening the pot with a million dollars in prizes to successful exploiters.<\/em><\/p>\n<p><em>In fact, Chrome is the only browser in the contest&#8217;s six year history to not be exploited\u2014like, at all. Therefore Google will hand out prizes of $60,000, $40,000, and $20,000 for contestants able to remotely commandeer a fully-patched browser running on Windows 7. Finding a &#8220;Full Chrome Exploit,&#8221; obtaining user account persistence using only bugs in the browser itself will net the $60k prize. Using webkits, flash, or a driver-based exploit can only earn the lesser amounts&#8230; <\/em><a href=\"http:\/\/goo.gl\/c5mo1\"><span style=\"text-decoration: underline;\"><strong>read more here.<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>About 60% of you use Internet Explorer. And about 90% of you have heard about the new Google Privacy Policy. As we&#8217;ve said many times before &#8212; if you&#8217;re worrying about tracking cookies, you really need to stop. Worrying about advertisers tracking you and trying\u00a0to sell you something is distracting. Tracking cookies which try to gather information about\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/google-chrome-is-the-only-browser-that-has-never-been-exploited\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":3901,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1462,1656,10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/3899"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=3899"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/3899\/revisions"}],"predecessor-version":[{"id":3903,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/3899\/revisions\/3903"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/3901"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=3899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=3899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=3899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}