Chrome browser developers continue to workover the creation of reliable protection of users from computer intruders. To ensure the identification of dangerous extensions will help the activity log, individual for each extension. Fixing processes will be held separately for each expansion in real time.
The user will be able to observe the processeswhich performs the extension and will be able to manually terminate the application. If there are suspicious actions related to sending data to a third-party server, the user can interrupt work by clicking the "Stop" button.
The test version of Chrome Canary has already received this feature (–Enable-extension-activity-logging), activated in hidden settings. The developers have not yet announced the time of the appearance of such a function in the beta version of Chrome.