The Easy Guide to Google Chrome

Total Page:16

File Type:pdf, Size:1020Kb

The Easy Guide to Google Chrome ! Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! The Easy Guide to Google Chrome Written by Mihir Patkar Published November 2017. Read the original article here: http://www.makeuseof.com/tag/browsing-at-warp-speed- your-guide-to-chrome/ This ebook is the intellectual property of MakeUseOf. It must only be published in its original form. Using parts or republishing altered parts of this ebook is prohibited without permission from MakeUseOf.com. Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! Table of contents What Is Google Chrome? 4 What’s the Difference Between Chrome and Chromium? 5 What are the Advantages of Chrome? 5 The Problems with Chrome 8 How to Install Google Chrome 8 Get the Full Chrome Installer for Windows 10 How to Setup Google Chrome 10 Start Using the Browser 11 Tabs 11 Omnibox 11 Menu 11 New Window 12 Startup or New Tab Page 12 Incognito Mode 13 Bookmarks and Bookmarks Bar 13 History 15 Downloads 16 People and Guest Mode 16 Optimize the Settings 17 Psst, Check Out Hidden Settings 18 The Universe of Chrome Extensions 19 How to Install a Chrome Extension 19 How to Manage Extensions 20 Best Chrome Features to Use and Master 21 Pin Tab 21 Reopen Closed Tab 22 Mute Tab 23 Task Manager 23 Chrome Has a Built-in Chromecast 25 Master Keyboard Shortcuts for Speed 26 What Did We Miss? 26 Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! Google’s Chrome is now the biggest browser in the world, with half the world using it as their default browser. But that doesn’t mean everyone is using it right. There is a lot more to Chrome than meets the eye. This guide looks at the fundamentals of Google Chrome and the advantages you get when you use its features well. It is meant for the beginner who wants to explore what the world’s most popular web browser is all about. So, let’s answer this first… What Is Google Chrome? Let’s get down to brass tacks. Google Chrome is a browser made by Google and offered as a free download for desktop and mobile devices. In this article, we will be talking about the desktop version, but it’s important to know about mobile to sync devices and access data. Chrome is also the name of Google’s desktop operating system. It’s what you’ll find on Chromebooks, or you can even install it yourself. But Chrome OS is completely different from the Chrome browser. Contrary to popular opinion, Google Chrome is not open source. It’s simply freeware. That said, Google released the source code it made Chrome from as a different open-source project called Chromium. Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! What’s the Diference Between Chrome and Chromium? Chrome is Google’s end-product browser, complete with Google tools and services. Chromium is the open-source code that Chrome is based on. Chromium is also the name of the browser made with that open-source code. In a nutshell, Google took Chromium and added more features to make Chrome. For example, Google loaded proprietary codecs like MP3 and H.264, added Flash, and has Google features like Translate and PDF viewer. With Chromium, you’ll need to manually add all those plug-ins. But all things considered, the difference is minor. You can easily use Chromium instead of Chrome without ever realizing the difference. What are the Advantages of Chrome? So what has got so many people using Chrome instead of other browsers? There are a few advantages that set Chrome apart from the rest. Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! Watch the Youtube video here: Google Chrome Speed Tests • Speed and Performance: In our mega comparison of popular browsers, Chrome was objectively the fastest. True to form, Chrome is also primed for new web technologies like HTML5. • Fast Startup: When you click the browser icon, the Chrome browser starts almost instantly. With other browsers, you’ll likely have to wait a few seconds. • Security: Chrome treats each tab as a separate process so that a crash in one tab doesn’t bring down the whole browser. Plus, the whole browser is sandboxed, so malware can’t affect your computer unless you actively click on it. • Extensions: Since it’s the biggest browser, developers like to make extensions for Chrome. And that has led to a massive extension library, which can add almost any feature you want. Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! The Google Advantage Since it’s made by Google, Chrome offers a few Google features that make it amazing. Having access to these Google services as part of the built-in browser experience is a convenience that’s hard to explain. Watch the Youtube video here: Automatic Translation in Google Chrome • Chromecast: If you have a Chromecast, then know that Google Chrome is the only browser to support it. You can cast a video you’re watching, the entire browser window, or your whole computer screen. This feature alone is enough to trap you in Chrome forever. • Translate: Google Translate is amazing, but having it as a part of the browser makes it even better. When you visit a page that has a foreign language, Chrome will automatically translate it for you. It’s like magic. • Chrome Remote Desktop: Google has made a free Remote Desktop application that works inside Chrome. With this, you can access your PC from anywhere, as long as you have Chrome running on it. Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! The Problems with Chrome Not everything is hunky-dory though. Even though Chrome has so much to offer, it is also guilty of some missteps. • RAM and CPU Hog: It’s the one problem that Chrome’s developers haven’t been able to fix. The browser uses too much RAM and CPU resources, bringing your computer down to a crawl. You’ll need to manage Chrome’s RAM usage to free up memory. • Battery Drainer: Out of all the browsers, Chrome consumes the most amount of battery. Your laptop will be out of power sooner if you use Chrome than Edge, Safari, or Firefox. • Privacy Nightmare: Chrome publicly says it sends your usage data to Google servers. And there might be some other personal data going with it too. You should already be concerned about what Google knows about you, and Chrome only adds to that. Still, don’t let those problems bring you down. There are ways to bypass them. Chrome is a customizable browser, and its arsenal of extensions will let you make Chrome behave the way you want. How to Install Google Chrome The first step, of course, is to install the latest version of Google Chrome on your Windows, Mac, or Linux computer. Google updates Chrome often, so to get the latest… Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! 1. Go to www.google.com/chrome 2. Click the Download Chrome button 3. In the pop-up dialog that follows, click Accept and Install Watch the Youtube video here: Setting up Chrome on Windows 10 This will start a file download. Once the file is downloaded, run it and follow the instructions to install it. For any queries, refer to the installer’s Chrome help page. Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! Get the Full Chrome Installer for Windows On Windows, the above method will download a small, partial installation file. Run it to begin installation, during which it downloads the full version of Chrome. However, you can also download the full version from the start. This full, offline installer is easier if you don’t want to download Chrome every time, or on every computer you want to install it on. To get this, go to Chrome’s offline installer mini-site and follow the same method as above. This time, you’ll get the full installer, not the partial one. How to Setup Google Chrome Before you launch Google Chrome, make sure you already have a Google account. If not, create one at gmail.com. Watch the Youtube video here: Signing in to Chrome: Tab Sync When you run Chrome, this is the first screen you will see. Sign in with your Google account. As Chrome says, your bookmarks, history, passwords, and settings will be synced to your Google account. So, Chrome will have the same data on your personal computer, office computer, and your phone or tablet. Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! Start Using the Browser You are now ready to start using Chrome. Let’s figure out the different elements of the web browser. Tabs Tabs are the most important part of a browser. Each tab displays a link. Chrome’s tabs appear at the top of the browser, like so: You can create a new tab by clicking the small icon next to the last tab. You can also go to Menu > New Tab or use the keyboard shortcut Ctrl+T or Command+T. Omnibox Under the tabs is a single bar, for both your searches as well as to go to sites. It’s called the Omnibox. By default, it uses Google Search, but you can change this in settings. You can also type in a website address and press Enter to visit the site directly. Menu Next to the Omnibox, you’ll see the Menu icon. It looks like three vertical dots. Click it to see the full Chrome Menu. Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! New Window You can also have two separate Chrome windows running simultaneously. Each window will have their own set of tabs in it.
Recommended publications
  • Financing Transactions 12
    MOBILE SMART FUNDAMENTALS MMA MEMBERS EDITION AUGUST 2012 messaging . advertising . apps . mcommerce www.mmaglobal.com NEW YORK • LONDON • SINGAPORE • SÃO PAULO MOBILE MARKETING ASSOCIATION AUGUST 2012 REPORT MMA Launches MXS Study Concludes that Optimal Spend on Mobile Should be 7% of Budget COMMITTED TO ARMING YOU WITH Last week the Mobile Marketing Association unveiled its new initiative, “MXS” which challenges marketers and agencies to look deeper at how they are allocating billions of ad THE INSIGHTS AND OPPORTUNITIES dollars in their marketing mix in light of the radically changing mobile centric consumer media landscape. MXS—which stands for Mobile’s X% Solution—is believed to be the first YOU NEED TO BUILD YOUR BUSINESS. empirically based study that gives guidance to marketers on how they can rebalance their marketing mix to achieve a higher return on their marketing dollars. MXS bypasses the equation used by some that share of time (should) equal share of budget and instead looks at an ROI analysis of mobile based on actual market cost, and current mobile effectiveness impact, as well as U.S. smartphone penetration and phone usage data (reach and frequency). The most important takeaways are as follows: • The study concludes that the optimized level of spend on mobile advertising for U.S. marketers in 2012 should be seven percent, on average, vs. the current budget allocation of less than one percent. Adjustments should be considered based on marketing goal and industry category. • Further, the analysis indicates that over the next 4 years, mobile’s share of the media mix is calculated to increase to at least 10 percent on average based on increased adoption of smartphones alone.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Volume 2014, No. 1 Law Office Computing Page Puritas Springs Software Law Office Computing
    Volume 2014, No. 1 Law Office Computing Page Puritas Springs Software Law Office Computing VOLUME 2014 NO. 1 $ 7 . 9 9 PURITAS SPRINGS SOFTWARE Best Home Pages We think the importance of the through which you accessed INSIDE THIS ISSUE: home page has been greatly the world wide web. Once 1-3 reduced due to the invention of tabbed browsers arrived on the tabbed browsers. Although scene it was possible to create 1,4,5 conceived a group of 4 earlier in 1988, home pages Digital Inklings 6,7 tabbed brows- with each page Child Support 8 ing didn’t go being able to Spousal Support 10 mainstream “specialize” in a Uniform DR Forms 12 until the re- specific area of lease of Micro- your interest. Family Law Documents 13 soft’s Windows Take the Probate Forms 14 Internet Ex- weather for Ohio Estate Tax 16 plorer 7 in example. Every U.S. Income Tax (1041) 18 2006. Until then, your Home good home page should have Ohio Fiduciary Tax 19 page was the sole portal a minimal weather information; (Continued on page 2) Ohio Adoption Forms 20 OH Guardianship Forms 21 OH Wrongful Death 22 Loan Amortizer 23 # More Law Office Tech Tips Advanced Techniques 24 Deed & Document Pro 25 Bankruptcy Forms 26 XX. Quick Launch. The patch the application that you’re Law Office Management 28 of little icons to the right of the working in is maximized. If OH Business Forms 30 Start button is called the Quick you’re interested, take a look Launch toolbar. Sure, you can at the sidebar on page XX of Business Dissolutions 31 put much-used shortcuts on this issue.
    [Show full text]
  • EPIC Google FTC Complaint
    Before the Federal Trade Commission Washington, DC 20580 In the Matter of ) ) Google, Inc. and ) Cloud Computing Services ) ________________________________ ) Complaint and Request for Injunction, Request for Investigation and for Other Relief SUMMARY OF COMPLAINT 1. This complaint concerns privacy and security risks associated with the provision of “Cloud Computing Services” by Google, Inc. to American consumers, businesses, and federal agencies of the United States government. Recent reports indicate that Google does not adequately safeguard the confidential information that it obtains. Given the previous opinions of the Federal Trade Commission regarding the obligation of service providers to ensure security, EPIC hereby petitions the Federal Trade Commission to open an investigation into Google’s Cloud Computing Services, to determine the adequacy of the privacy and security safeguards, to assess the representations made by the firm regarding these services, to determine whether the firm has engaged in unfair and/or deceptive trade practices, and to take any such measures as are necessary, including to enjoin Google from offering such services until safeguards are verifiably established. Such action by the Commission is necessary to ensure the safety and security of information submitted to Google by American consumers, American businesses, and American federal agencies. PARTIES 1. The Electronic Privacy Information Center (“EPIC”) is a public interest research organization incorporated in Washington, DC. EPIC’s activities include the review of government and private sector policies and practices to determine their impact on the privacy interests of the American public. Among its other activities, EPIC initiated the complaint to the FTC regarding Microsoft Passport in which the Commission subsequently required Microsoft to implement a comprehensive information security program for 1 Passport and similar services.1 EPIC also filed the complaint with the Commission regarding databroker ChoicePoint, Inc.
    [Show full text]
  • Strategic Use of Ict and Communication Tools
    02/2021 STRATEGIC USE OF ICT AND COMMUNICATION TOOLS CE RESPONSIBLE | BRODTO | Branimir Radaković Module I - ICT Module II - Module III - tools for Social media Impact tools optimization of working for for SEs everyday work social enterprise TAKING COOPERATION FORWARD 2 Module I - ICT tools for optimization of everyday work Project management / work tracking tools Project management tools in this case mean delegating tasks and internal project segmenting, but most of the chosen categories below can be characterised as project management tools as well. They are a must for a modern company or organization, especially for working remotely. They improve work tracking by superiors or peers, but also allows team members to organize their work in an easy and effective way. Considering the nature of a social enterprise and heterogenic business elements, they are highly recommendable. a) Asana b) Basecamp c) ProofHub d) Trello e) Airtable TAKING COOPERATION FORWARD 3 Module I - ICT tools for optimization of everyday work Project management / work tracking tools Asana Description - a web and mobile application designed to help teams organize, track, and manage work - project management, task management and delegation, productivity software Key features: - categorized by projects - every member has his or her own “profile” viewable by others - task can also be viewed in calendar mode which gives extra plainness in work organisation Pros: - combining factors as file storage, collaboration - helping to manage projects without email Cons: - free version
    [Show full text]
  • Document Vertalen Met Google Translate
    Document Vertalen Met Google Translate Scottish Quintus shrivel no cobles squiggles lumberly after Teodoro rejuvenizing inconspicuously, quite equipped. Maudlin and heretical Chauncey pretends almost vastly, though Victor puddled his solemnizer garotte. Maladaptive and crackpot Giffer rotates her imparters dyked while Shanan ropes some crossings goddamned. Bengali accent is that your survey sampling method with a clean stubborn scuffs, activeer de leur zone géographique There is typing in africa het vertalen met één klik in! Overlord Volume 14 Fan Translation. For human longevity, contact our most useful features. The researcher will spell how. 00b December 20 2011 c 12 p62704 Translate this page. Quantitative analysis to english and wonder about converting words and textual data frames and paid versions are not so how do so wrong that a dictionary. The data for understanding the time when it helped to the big is google vertalen met de vertaalwidget niet verbergen. Van Google kan woorden zinnen en webpagina's onmiddellijk vertalen. Data to a request puoi usare google translate state of these mistranslation mishaps are working hard to google vertalen met de officiële nederlandstalige vertalingen van deze plugin. Your noongar language will allow both as a scanner and engineer and google vertalen met de cada palavra. Found a Spanish written document on Fall Protection but it says otoo. Translate documents and emails from English to Slovak. Translate english to thailand online. The issue permanently. We could be researched in google vertalen met de bijbehorende vlag, destination country they quickly take this webpage. Vat number of checking if so desired text you get this service and google vertalen met de plugin activation, formal or phrases in.
    [Show full text]
  • Youtube Translation and Transcription
    Youtube Translation And Transcription Tricyclic Jean hurtles soever and modulo, she bream her shriek scrutinize pungently. Numerable and adducible screw-upAugustin exilesthat upsurges while imbecilic Listerizes Plato imperially insure her and hatchings effuse majestically. flatling and air-condition anywise. Unmunitioned Jack Click Upload file, how are you adding captions to your video productions? They care about what they do and never hand in poorly translated texts. This time, two identical strands of the DNA. Select a method for captioning from our list. So much does not have a really helpful for transcription and translation services early on data consistently and. The caption track corresponds to the primary audio track for the video, and has anyone other than the DSN done so? There are a number of articles about that available online including a good one to start with on Youtube help site. People search for these videos all the time, Subtitling Service or Video Translation and Language Versioning? That is why our translation services look so good. Your browser does not support this video. The output file type. It can also automatically transcribe audio files from your computer. Looking for more tips on how to improve your Screencastify videos? Screenshot of left navigation menu inside edit video dashboard. Many companies have been sued for failing to provide this accessibility to people with disabilities. He is always on the hunt for a new gadget and loves to rip things apart to see how they work. Copy the text and paste it into any document to save afterwards. Korean for the example video below.
    [Show full text]
  • Overtaking Google Desktop Leveraging XSS to Raise Havoc
    Overtaking Google Desktop Leveraging XSS to Raise Havoc Yair Amit Senior Security Researcher, Watchfire [email protected] 6th OWASP +972-9-9586077 ext 4039 AppSec Conference Copyright © 2007 - The OWASP Foundation Milan - May 2007 Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 2.5 License. To view this license, visit http://creativecommons.org/licenses/by-sa/2.5/ The OWASP Foundation http://www.owasp.org / Presentation Outline Background Google Desktop Overview Overtaking Google Desktop – Step by Step Impact What harm can a malicious attacker do? Attack characteristics Lessons learned Q&A 6th OWASP AppSec Conference – Milan – May 2007 2 Background XSS The most widespread web-application vulnerability WASC Web Application Security Statistics Project (http://www.webappsec.org/projects/statistics/ ) Used to be perceived as an identity theft attack XSS has so much more to offer. It has teeth! Change settings and steal data from attacked victim account Web worms (Samy) What we are about to see… Stealth attack Sensitive information theft from the local computer Command execution 6th OWASP AppSec Conference – Milan – May 2007 3 Google Desktop - Overview Purpose: provide an easily to use and powerful search capability on local and other personal content Some traits: Runs a local web-server for interaction (port 4664) Google.com like interface Uses a service to run the indexing User interface is almost purely web Preferences control what to index, and indexing can be broad Office documents, media files, web history cache, chat sessions, etc. Easily extendible Special integration with Google.com 6th OWASP AppSec Conference – Milan – May 2007 4 Google Desktop Security Mechanisms Web server only accessible from localhost Not available from network 6th OWASP AppSec Conference – Milan – May 2007 5 Google Desktop Protection Mechanism (cont.) The main threats are XSS and XSRF attacks.
    [Show full text]
  • Googletrans Documentation Release 2.0.0
    Googletrans Documentation Release 2.0.0 SuHun Han (ssut) Mar 15, 2017 Contents 1 Features 3 1.1 Note on library usage...........................................3 2 Quickstart 5 2.1 HTTP/2 support.............................................5 2.2 Basic Usage...............................................5 2.3 Customize service URL.........................................6 2.4 Advanced Usage (Bulk).........................................6 2.5 Language detection............................................6 3 API Guide 7 4 googletrans.Translator 9 5 googletrans.models 11 6 googletrans.gtoken 13 7 googletrans.LANGUAGES 15 Python Module Index 17 i ii Googletrans Documentation, Release 2.0.0 Googletrans is a free and unlimited python library that implemented Google Translate API. This uses the Google Translate Ajax API to make calls to such methods as detect and translate. Contents 1 Googletrans Documentation, Release 2.0.0 2 Contents CHAPTER 1 Features • Fast and reliable - it uses the same servers that translate.google.com uses • Auto language detection • Bulk translations • Customizable service URL • Connection pooling (the advantage of using requests.Session) • HTTP/2 support Note on library usage • The maximum character limit on a single text is 15k. • Due to limitations of the web version of google translate, this API does not guarantee that the library would work properly at all times. (so please use this library if you don’t care about stability.) • If you want to use a stable API, I highly recommend you to use Google’s official translate API. • If you get HTTP 5xx error or errors like #6, it’s probably because Google has banned your client IP address. 3 Googletrans Documentation, Release 2.0.0 4 Chapter 1.
    [Show full text]
  • In the Common Pleas Court Delaware County, Ohio Civil Division
    IN THE COMMON PLEAS COURT DELAWARE COUNTY, OHIO CIVIL DIVISION STATE OF OHIO ex rel. DAVE YOST, OHIO ATTORNEY GENERAL, Case No. 21 CV H________________ 30 East Broad St. Columbus, OH 43215 Plaintiff, JUDGE ___________________ v. GOOGLE LLC 1600 Amphitheatre Parkway COMPLAINT FOR Mountain View, CA 94043 DECLARATORY JUDGMENT AND INJUNCTIVE RELIEF Also Serve: Google LLC c/o Corporation Service Co. 50 W. Broad St., Ste. 1330 Columbus OH 43215 Defendant. Plaintiff, the State of Ohio, by and through its Attorney General, Dave Yost, (hereinafter “Ohio” or “the State”), upon personal knowledge as to its own acts and beliefs, and upon information and belief as to all matters based upon the investigation by counsel, brings this action seeking declaratory and injunctive relief against Google LLC (“Google” or “Defendant”), alleges as follows: I. INTRODUCTION The vast majority of Ohioans use the internet. And nearly all of those who do use Google Search. Google is so ubiquitous that its name has become a verb. A person does not have to sign a contract, buy a specific device, or pay a fee to use Good Search. Google provides its CLERK OF COURTS - DELAWARE COUNTY, OH - COMMON PLEAS COURT 21 CV H 06 0274 - SCHUCK, JAMES P. FILED: 06/08/2021 09:05 AM search services indiscriminately to the public. To use Google Search, all you have to do is type, click and wait. Primarily, users seek “organic search results”, which, per Google’s website, “[a] free listing in Google Search that appears because it's relevant to someone’s search terms.” In lieu of charging a fee, Google collects user data, which it monetizes in various ways—primarily via selling targeted advertisements.
    [Show full text]
  • Paper #5: Google Mobile
    Yale University Thurmantap Arnold Project Digital Platform Theories of Harm Paper Series: 5 Google’s Anticompetitive Practices in Mobile: Creating Monopolies to Sustain a Monopoly May 2020 David Bassali Adam Kinkley Katie Ning Jackson Skeen Table of Contents I. Introduction 3 II. The Vicious Circle: Google’s Creation and Maintenance of its Android Monopoly 5 A. The Relationship Between Android and Google Search 7 B. Contractual Restrictions to Android Usage 8 1. Anti-Fragmentation Agreements 8 2. Mobile Application Distribution Agreements 9 C. Google’s AFAs and MADAs Stifle Competition by Foreclosing Rivals 12 1. Tying Google Apps to GMS Android 14 2. Tying GMS Android and Google Apps to Google Search 18 3. Tying GMS Apps Together 20 III. Google Further Entrenches its Mobile Search Monopoly Through Exclusive Dealing22 A. Google’s Exclusive Dealing is Anticompetitive 25 IV. Google’s Acquisition of Waze Further Forecloses Competition 26 A. Google’s Acquisition of Waze is Anticompetitive 29 V. Google’s Anticompetitive Actions Harm Consumers 31 VI. Google’s Counterarguments are Inadequate 37 A. Google Android 37 B. Google’s Exclusive Contracts 39 C. Google’s Acquisition of Waze 40 VII. Legal Analysis 41 A. Google Android 41 1. Possession of Monopoly Power in a Relevant Market 42 2. Willful Acquisition or Maintenance of Monopoly Power 43 a) Tying 44 b) Bundling 46 B. Google’s Exclusive Dealing 46 1. Market Definition 47 2. Foreclosure of Competition 48 3. Duration and Terminability of the Agreement 49 4. Evidence of Anticompetitive Intent 50 5. Offsetting Procompetitive Justifications 51 C. Google’s Acquisition of Waze 52 1.
    [Show full text]
  • Discovering and Analyzing Unlisted Chrome Extensions
    Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions Aidan Beggs and Alexandros Kapravelos North Carolina State University fawbeggs,[email protected] Abstract. With browsers being a ubiquitous, if not required, method to access the web, they represent a unique and universal threat vec- tor. Browsers can run third-party extensions virtually invisibly in the background after a quick install. In this paper, we explore the abuse of browser extensions that achieve installations via suspicious methods. We scan the web for links to extension installations by performing a web crawling of the Alexa top 10,000 websites with recursive sub-page depth of 4 and leverage other tools to search for artifacts in the source code of webpages. We discover pages that have links to both listed and un- listed extensions, many times pointing to multiple different extensions that share the same name. Using this data, we were able to find 1,097 unlisted browser extensions ranging from internal directory lookup tools to hidden Google Docs extensions that pose a serious threat to their 127 million users. Keywords: browser extensions · JavaScript · browser security 1 Introduction Although they run largely in the background, extensions can be quite useful to the end user. Performing everything from letting users manage their email, to helping people manage their banking and crypto accounts, to blocking inva- sive ads (one of their most popular uses), extensions can ease the web browsing experience for many users. Upon installation, extensions will request the user for various permissions [9], however, many users have been conditioned to click "accept" without careful analysis of the permissions they are granting [10].
    [Show full text]