Thursday, April 3, 2025

Real-time Online Safety Blog: Privacy-Protecting URL Security What do you think about online safety?

Since its inception over 15 years ago, Google Safe Browsing has been safeguarding users against phishing, malware, and unwanted software by identifying and alerting them to potentially harmful sites across more than 5 billion devices worldwide. As cyberattacks evolve in sophistication, we’ve witnessed a pressing need for adaptive defenses that can keep pace with the ever-changing threats they seek to counteract. We’re thrilled to introduce a cutting-edge innovation: real-time, privacy-enhanced URL safety, now available with our latest Protected Browsing model, designed specifically for Chrome users who leverage Protected Browsing mode.

Present panorama

Google Chrome regularly safeguards users by identifying potentially harmful websites and files, complementing Safe Browsing, which daily detects thousands of unsafe sites and adds them to its list of dangerous websites and files.

To ensure privacy and efficiency, Google’s Chrome browser initially evaluates the websites you visit against a locally cached list of known malicious sites, updated every 30 to 60 minutes through .

Despite efforts to keep pace with emerging threats, nearly all unsafe websites have a relatively short lifespan, often existing for less than 10 minutes. This means that by the time the database of recognized unsafe sites is updated, many potentially harmful websites may have already slipped through and had an opportunity to cause harm if users visited them during this brief window of vulnerability. Additional features and protections within our safeguarding tool’s comprehensive list of potentially harmful online destinations continue to evolve rapidly. Not all gadgets possess the necessary resources to effectively manage the growing list, nor can they consistently access and implement updates to the list with the required frequency to ensure optimal security.

Protected Looking’s mode proactively safeguards against emerging threats through the integration of cutting-edge technologies, including real-time list checks and AI-powered classification of malicious URLs and web pages. We designed this feature as an opt-in option to empower customers by providing them with access to additional security-related information, ultimately fostering a more robust security posture. By demonstrating the value of real-time list checking, we’ve decided to integrate this functionality into our default Normal safety mode through a novel API that respects users’ privacy by not sharing website URLs with Google.

Introducing real-time, privacy-preserving Protected Looking

The way it works

To facilitate seamless real-time safety transitions, checks are now conducted concurrently with reference to a comprehensive inventory hosted on the secure Protected Look server. The server-side checklist can promptly identify and blacklist unsafe websites as soon as they’re discovered, thereby allowing for swift removal of newly compromised sites. As such, it has the potential to scale up to any desired size due to the fact that the Protected Looking server is not limited in the same manner as individual devices are.

Here’s what’s happening behind the scenes in Chrome:

  1. When you visit a website, Google Chrome initially verifies whether the URL’s cache already contains information about the page’s protection status.
  2. If the visited URL is not cached, it may pose safety concerns, underscoring the importance of conducting a timely verification process.
  3. Chrome obfuscates URLs by hashing them using a cryptographic hash function to generate 32-byte full hashes.
  4. Chrome limits the display of total hashes to 4-byte long hash prefix summaries.
  5. Chrome encrypts the hash prefixes and transmits them to a dedicated privacy server, as detailed in the “Safeguarding Your Personal Information” section.
  6. The privacy server anonymizes user data by stripping out identifiable information, then encrypts and prefixes the remaining data before transmitting it securely over a TLS connection to the Protected Looking server, which blends requests from numerous Chrome users to ensure obscurity.

  7. The protected looking server decrypts and compares the received hash prefixes with its server-side database, responding with full hashes for any unsafe URLs matching the transmitted prefix data provided by Chrome.
  8. Upon receipt of the unsafe full hashes, Chrome verifies their consistency with the cumulative hash values of the accessed URL.
  9. When a matching pattern is detected, Google Chrome will promptly display a cautionary alert.

Protecting your knowledge personal

To safeguard individual privacy, we have collaborated with Fastly, a cutting-edge cloud platform offering content delivery, edge computing, security, and observability services, to operate an Open HTTP (OHTTP) privacy server between Chrome and Safe Browsing – learn more about Fastly’s commitment to user privacy on their website. With OHTTP, Protected Looking ensures that your IP address remains anonymous, as it blends your requests with those sent by other Chrome users, effectively hiding your unique identifier. Protected browsing cannot ensure that the URLs you access while surfing the internet are secure and trustworthy.

Prior to hashing, Chrome removes system earlier prefixes using a public key from the Protected Library. The encrypted hash prefixes are subsequently dispatched to the privacy server. Because the privacy server lacks knowledge of the personal key, it is unable to decrypt the hash prefixes, thereby providing protection from the privacy server itself?

The privacy server subsequently strips away potential identifying features akin to an individual’s IP address, and transmits the encrypted hash prefixes to the Secure Viewing server. The privacy-preserving server operates autonomously under Fastly’s management, ensuring that Google does not gain access to individualized user information, including IP addresses and consumer agents, from the original request. As soon as the Protected Looking server receives the encrypted hash prefixes from the privacy server, it decrypts the hash prefixes using its private key and then proceeds to verify the server-side list.

Ultimately, the privacy service observes the hash prefixes of your URL but not your IP address, while the private browsing mode sees your IP address but not the hash prefixes? No individual or group gains access to all of your identity and the hash prefixes simultaneously. As a result, your searching experience remains intimate.

Staying speedy and dependable

While hash-based tests rely solely on local computations, real-time tests necessitate actual requests being sent to servers, thereby introducing additional latency. Now, we’ve employed just a handful of methods to confirm the ongoing ease and responsiveness of your search skills.

Before conducting real-time testing, Chrome first verifies its compatibility against both global and local caches on your system to minimize unnecessary delays.

  • The Worldwide Content Cache serves as a repository of pre-computed hashes for known-safe Uniform Resource Locators (URLs), delivered by Protected Lookout. Chrome fetches data in the background seamlessly. If a full hash of the URL is detected in the global cache, Chrome considers it significantly safer and conducts a hash-based verification instead.
  • The native cache serves as a repository of precomputed hash values gathered from previous protected queries. If a match is found within the native cache and the cache hasn’t yet expired, Chrome won’t initiate a real-time request to the server.

Each cache is stored in memory, making it significantly faster to retrieve than issuing a real-time request across the network.

If requests are unsuccessful or sluggish, Chrome employs a fallback mechanism to ensure a seamless user experience. When consecutive real-time requests fail, Chrome temporarily shifts into a back-off strategy, degrading the verification process to hash-based authentication for a specified period.

We’re also considering introducing an option that enables the site to load while a real-time test is underway. This approach may significantly boost the individual’s expertise by allowing real-time testing without hindering webpage loading times.

As technology advances, the notion of online security has become increasingly vital. The concept of real-time, privacy-preserving URL safety signifies a significant leap forward in safeguarding our digital lives. It involves scrutinizing URLs in real-time to detect and block malicious links, thereby shielding users from potential cyber threats.

Chrome customers

With the latest release of Chrome on desktop, Android, and iOS, we’re enhancing the Normal safety mode of Incognito browsing to now detect websites using our real-time safety protocol without sharing your search history with Google. No further action is required to benefit from this enhanced demonstration.

To ensure your added security, we strongly recommend enabling the Protected View feature. Here’s a revised version: Why do you desire improved security when you’ll already have real-time URL safety in Normal mode? It’s because Normal mode only protects you from websites that have been previously verified as unsafe by Protected Looking, whereas enhanced safety offers additional defense against unknown threats. However, Enhanced safety mode leverages additional data and advanced machine learning models to safeguard users by identifying potentially hazardous websites that may not yet be recognized by traditional detection methods, such as recently created sites or those employing cloaking tactics to evade detection.

The enhanced safety features also provide sustained protection beyond real-time URL checks, including comprehensive scans for malicious files and robust shielding against potentially harmful Chrome extensions.

Enterprises

The True-Time feature of the Normal Safety Mode in Protected Lookout is enabled by default for Google Chrome. If desired, it can be customised using the coverage tool. To fully utilize this feature in Chrome, enterprises may need to explicitly grant users access to the Fastly privacy server, ensuring seamless functionality. When a server becomes unavailable, Chrome automatically degrades its security checks to rely on hash-based verification instead.

Builders

While our primary focus remains on Chrome, we intend to extend this protection framework to eligible developers for non-commercial purposes through the Protected View API. By leveraging the API, collaboration between builders and privacy-focused server operators enables them to collectively safeguard their customers’ data against rapidly evolving malicious threats through a privacy-protective approach. Stay tuned for the release of our comprehensive developer documentation, which will soon be available on our website.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles