
Discover the Key Features and Security Improvements in Google Chrome 135 Stable Release
Exciting news for Google Chrome users! The highly anticipated Google Chrome 135 Stable version is now accessible across all supported platforms. This latest iteration of Google’s renowned browser is not just an update but rather a significant upgrade that enhances both security and user experience.
The rollout is designed for automatic updates for users on unmanaged devices. If you’re a desktop user eager to expedite the installation, simply head to Menu > Help > About Google Chrome or type chrome://settings/help
directly into your address bar. Chrome will automatically check and install the update as soon as this page loads, but remember: a restart of the browser is essential to complete the update process.
Enhancements in Security with Chrome 135

In a crucial security update, Google has addressed a total of 14 vulnerabilities in both the desktop and Android mobile versions of Chrome. Of these, nine vulnerabilities were reported by external researchers, although specific details about these issues have only been disclosed for those that posed a significant threat, all rated with high severity. Notably, Google has not reported any live exploits targeting these vulnerabilities, which is a positive sign for users’ safety.
Among the standout features of this release is the introduction of HSTS Tracking Prevention. This new feature utilizes HTTP Strict Transport Security
(HSTS) to ensure that websites only communicate through secure connections, thereby enhancing overall privacy. However, Chrome has implemented measures to prevent third-party trackers from misusing this feature. Here’s a brief outline of how this could have potentially been exploited for tracking:
- Any domain can declare HSTS.
- Trackers might source content from multiple subresources on a page, constructing unique identifiers based on these declarations.
- By observing the connections made via HTTP versus HTTPS, trackers could effectively identify users visiting the site.
Fun Fact: We highlighted the implications of HSTS tracking in Firefox back in 2015!
Additional Changes and Features in Chrome 135
Beyond security enhancements, Chrome 135 introduces several noteworthy features that improve the browsing experience:
- Enhanced Protection: Users will now see warnings related to scam websites, thanks to
on-device Large Language Models (LLMs)
that collect security indicators from webpages, sending them to Google’s Safe Browsing service. - Improved Password Form Detection: With new client-side Machine Learning capabilities, Chrome now parses web forms with greater accuracy, enhancing user security and convenience.
- Storage for Extensions: Users can now save their extensions to their Google Account, although this is being rolled out gradually and will only appear when new extensions are installed.
- Enhanced Incognito Mode: Chrome now blocks third-party cookies in Incognito Mode, fostering a more private browsing experience. Pro tip: consider blocking all third-party cookies for better security!
Your Thoughts?
Now that Chrome 135 is here, how do you feel about these updates? Have you installed the latest version yet? We invite you to share your impressions and any new features you find valuable in the comments below!
Frequently Asked Questions
1. What is HSTS Tracking Prevention in Chrome 135?
HSTS Tracking Prevention is a newly introduced privacy feature that prevents third-party trackers from utilizing HTTP Strict Transport Security (HSTS) to identify users. It enhances user privacy by blocking unauthorized tracking attempts.
2. How can I manually update Google Chrome to version 135?
To manually update Chrome, go to the Menu, select Help, and then About Google Chrome. Or you can type chrome://settings/help
in the address bar. This will trigger Chrome to check for available updates.
3. Are there any critical security issues in this version?
No critical security issues have been reported in this release. Google has fixed 14 vulnerabilities, but they are rated with high severity, with no live exploits identified in the wild.
Leave a Reply ▼