Google Chrome does not need to do things in the core of the computer, things that might be exploited by a malicious application. It does not need to manipulate the process table, every process is clearly marked as running under Google Chrome. It does not need to modify system files which affect other applications. It does not need to directly interact with hardware. Google Chrome only need access to the network, render things in a window on the screen, and read user input to this window. This is all things that can be done in a secure way through existing interfaces.
Latest Answers