Google announced that Chrome will block risky downloads, soon. This step is set in order to make browsing more secure. Thus, Google considers “mixed content downloads” initiated on HTTPS web pages but which originate from HTTP pages, as unsafe.
So, starting Chrome 83, which should be released in June, the browser will automatically block any downloads. Still, Google will not block HTTP downloads initiated from HTTP pages. Usually, HTTP pages are less secure than those that use the HTTPS protocol. In order to trick users into downloading malicious content, some website try to trick them.
At this moment, Chrome does not issue a warning when a user is about to download content that might be unsafe. But, with the release of Chrome 82 in April, it will start warning them when they initiate a mixed content download. At first, the browser will warn users of the most harmful file types, such as executable files. Then, the warning system will extend to more files.
According to Google, this feature will be first introduced to the browser on desktop platforms including Windows, macOS, Chrome and Linux. The company will delay the rollout on mobile platforms, iOS and Android, by one release. So, mobile users will begin to receive warnings from Chrome 83 build. Still, the automatic block will come into effect later on.
The update may not apply to enterprise consumers who use controlled environments like Intranet, where HTTP content may be less risky. Google’s decision that Chrome will block risky downloads comes after it had announced less intrusive ads in videos. The company will apply this rule both on its Chrome browser and on YouTube.
This is how the things will go with the new builds :
Allow us to introduce you to a list of the best ROM sites for downloading…
If you are looking for the best safe browser for kids, you have come to…
If you want to enhance the performance of your printer by way of the HP…
If you wish to install the contents on any Windows PC to another PC, you…
If you are looking for server-based tools for database management using SQL, you can take…
If you want to ascertain the most vulnerable files, areas, and sectors in your data,…