Understanding secure systems: The Chromium extension example

This very brief Google Chromium blog posting gives a lovely view into modern secure system design …

Chromium Blog: Security in Depth: The Extension System

… To help protect against vulnerabilities in benign-but-buggy extensions, we employ the time-tested principles of least privilege and privilege separation…

The original has wikipedia* links to relevant articles. These principles are broader than computer security. Think of them when you provide access to your Facebook information.

Least privilege” and “Privilege Separation” should be a part of grade school and high school curriculum.
If you want lots more detail, the authors refer us to their academic treatise on securing browser extensions.
I love blogs.
*Yeah, Knol was a bad idea.

My Google Reader Shared items (feed)