BotBeat
...
← Back

> ▌

Google / AlphabetGoogle / Alphabet
PRODUCT LAUNCHGoogle / Alphabet2026-04-06

Google Chrome Introduces Device Bound Session Credentials on Windows to Combat Cookie Theft

Key Takeaways

  • ▸Device Bound Session Credentials use public/private key cryptography to bind user sessions to specific devices, making stolen cookies unusable on other devices
  • ▸Private keys are protected by hardware-based security (TPM) on Windows, providing strong cryptographic protection against extraction
  • ▸Integration requires only two new endpoints (registration and refresh) with minimal changes to existing authentication flows
Source:
Hacker Newshttps://developer.chrome.com/blog/dbsc-windows-announcement↗

Summary

Google has announced the availability of Device Bound Session Credentials (DBSC) in Chrome 145 on Windows, a new security feature designed to protect users from cookie theft and account compromise. DBSC works by cryptographically binding authentication sessions to a specific device through a public/private key pair, with the private keys secured in hardware using the device's Trusted Platform Module (TPM). This approach makes it significantly harder for attackers to misuse stolen cookies, as they would need access to the private key stored on the user's device to maintain a valid session.

The implementation is designed for ease of integration, requiring minimal changes to existing authentication workflows. Website developers can enable DBSC by serving a Secure-Session-Registration HTTP response header during user login, which prompts the browser to register the session's public key. When a bound cookie expires, Chrome contacts a refresh endpoint where servers can verify the browser still possesses the corresponding private key. If verification fails—such as when an attacker attempts to use a stolen cookie on a different device—the server can deny the request, effectively preventing unauthorized access.

  • The feature is now live in Chrome 145 on Windows and helps address a long-standing attack vector where stolen session cookies allow account impersonation

Editorial Opinion

Device Bound Session Credentials represent a meaningful step forward in session security, addressing one of the web's persistent vulnerabilities by leveraging hardware-backed cryptography available on modern devices. The low-friction implementation approach—requiring only two lightweight endpoints—removes a major barrier to adoption that has plagued previous session-binding proposals. However, the feature's initial Windows-only availability may limit its effectiveness until similar implementations arrive on macOS and Linux, where a significant portion of web users operate.

AI HardwareCybersecurityPrivacy & Data

More from Google / Alphabet

Google / AlphabetGoogle / Alphabet
PRODUCT LAUNCH

Google DeepMind Launches Gemma 4: Open-Source Multimodal Models with On-Device Capabilities

2026-04-06
Google / AlphabetGoogle / Alphabet
INDUSTRY REPORT

SEO Industry Pivots to AI Manipulation as Search Landscape Shifts

2026-04-06
Google / AlphabetGoogle / Alphabet
RESEARCH

Deep Dive: Optimizing Sharded Matrix Multiplication on TPU with Pallas

2026-04-05

Comments

Suggested

NVIDIANVIDIA
RESEARCH

NVIDIA Leverages AI to Revolutionize Chip Design Process

2026-04-06
Meridian LabMeridian Lab
RESEARCH

Study Reveals Widespread API Abuse Patterns in AI Agent Ecosystems by 2026

2026-04-06
Not ApplicableNot Applicable
INDUSTRY REPORT

Maine Data Center Project Collapses After Secret Planning and Public Backlash

2026-04-06
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us