{"id":101726,"date":"2009-12-15T13:36:00","date_gmt":"2009-12-15T18:36:00","guid":{"rendered":"tag:blogger.com,1999:blog-5587346.post-7732466925274440679"},"modified":"2009-12-15T13:41:31","modified_gmt":"2009-12-15T18:41:31","slug":"understanding-secure-systems-the-chromium-extension-example","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/101726","title":{"rendered":"Understanding secure systems: The Chromium extension example"},"content":{"rendered":"<p>This very brief Google Chromium blog posting gives a lovely view into modern secure system design &#8230;<\/p>\n<div>\n<blockquote><p><a href=\"http:\/\/blog.chromium.org\/2009\/12\/security-in-depth-extension-system.html\">Chromium Blog: Security in Depth: The Extension System<\/a><\/p><\/blockquote>\n<blockquote><p><a href=\"http:\/\/blog.chromium.org\/2009\/12\/security-in-depth-extension-system.html\"><\/a>&#8230; To help protect against vulnerabilities in benign-but-buggy extensions, we employ the time-tested principles of least privilege and privilege separation&#8230;<\/p><\/blockquote>\n<p>The original has wikipedia* links to relevant articles. These principles are broader than computer security. Think of them when you provide access to your Facebook information.<\/p><\/div>\n<div><\/div>\n<div>&#8220;<a href=\"http:\/\/en.wikipedia.org\/wiki\/Principle_of_least_privilege\">Least privilege<\/a>&#8221; and &#8220;<a href=\"http:\/\/en.wikipedia.org\/wiki\/Privilege_separation\">Privilege Separation<\/a>&#8221; should be a part of grade school and high school curriculum.<\/div>\n<div><\/div>\n<div>If you want lots more detail, the authors refer us to their <a href=\"http:\/\/webblaze.cs.berkeley.edu\/2010\/secureextensions\/\">academic treatise on securing browser extensions<\/a>.<\/div>\n<div><\/div>\n<div>I love blogs.<\/div>\n<div><\/div>\n<div>*Yeah, Knol was a bad idea.<br \/>&#8212;<br \/><small><a href=\"feed:\/\/www.google.com\/reader\/public\/atom\/user\/06457543619879090746\/state\/com.google\/broadcast\">My Google Reader Shared items (feed)<\/a><\/small><\/div>\n<div class=\"blogger-post-footer\"><img width='1' height='1' src='https:\/\/blogger.googleusercontent.com\/tracker\/5587346-7732466925274440679?l=notes.kateva.org' alt='' \/><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This very brief Google Chromium blog posting gives a lovely view into modern secure system design &#8230; Chromium Blog: Security in Depth: The Extension System &#8230; To help protect against vulnerabilities in benign-but-buggy extensions, we employ the time-tested principles of least privilege and privilege separation&#8230; The original has wikipedia* links to relevant articles. These principles [&hellip;]<\/p>\n","protected":false},"author":711,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-101726","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/101726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/711"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=101726"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/101726\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=101726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=101726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=101726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}