process isolation

Inside The Google Chrome OS Security Model

Google plans to use a combination of system hardening, process isolation, verified boot, secure auto-update and encryption to thwart malicious hackers from planting malware on its new Google Chrome OS.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.