Stable Channel Update for Desktop

The Stable channel has been updated to 106.0.5249.119 for Windows,Mac and Linux,   which will roll out over the coming days/weeks. A full list of changes in this build is available in the log.

Extended stable channel has been updated to 106.0.5249.119 for Windows,Mac which will roll out over the coming days/weeks.



Security Fixes and Rewards

Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.




This update includes 6 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information.




[$15000][1364604] High CVE-2022-3445: Use after free in Skia. Reported by Nan Wang (@eternalsakura13) and Yong Liu of 360 Vulnerability Research Institute on 2022-09-16

[$13000][1368076] High CVE-2022-3446: Heap buffer overflow in WebSQL. Reported by Kaijie Xu (@kaijieguigui) on 2022-09-26

[$7500][1366582] High CVE-2022-3447: Inappropriate implementation in Custom Tabs. Reported by Narendra Bhati of Suma Soft Pvt. Ltd. Pune (India) on 2022-09-22

[$2500][1363040] High CVE-2022-3448: Use after free in Permissions API. Reported by raven at KunLun lab on 2022-09-13

[$TBD][1364662] High CVE-2022-3449: Use after free in Safe Browsing. Reported by asnine on 2022-09-17

[$TBD][1369882] High CVE-2022-3450: Use after free in Peer Connection. Reported by Anonymous on 2022-09-30




We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.





Many of our security bugs are detected using AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.


Interested in switching release channels?  Find out how here. If you find a new issue, please let us know by filing a bug. The community help forum is also a great place to reach out for help or learn about common issues.



Srinivas Sista
Google Chrome

Stable Channel Update for Desktop

The Stable channel has been updated to 106.0.5249.119 for Windows,Mac and Linux,   which will roll out over the coming days/weeks. A full list of changes in this build is available in the log.

Extended stable channel has been updated to 106.0.5249.119 for Windows,Mac which will roll out over the coming days/weeks.



Security Fixes and Rewards

Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.




This update includes 6 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information.




[$15000][1364604] High CVE-2022-3445: Use after free in Skia. Reported by Nan Wang (@eternalsakura13) and Yong Liu of 360 Vulnerability Research Institute on 2022-09-16

[$13000][1368076] High CVE-2022-3446: Heap buffer overflow in WebSQL. Reported by Kaijie Xu (@kaijieguigui) on 2022-09-26

[$7500][1366582] High CVE-2022-3447: Inappropriate implementation in Custom Tabs. Reported by Narendra Bhati of Suma Soft Pvt. Ltd. Pune (India) on 2022-09-22

[$2500][1363040] High CVE-2022-3448: Use after free in Permissions API. Reported by raven at KunLun lab on 2022-09-13

[$TBD][1364662] High CVE-2022-3449: Use after free in Safe Browsing. Reported by asnine on 2022-09-17

[$TBD][1369882] High CVE-2022-3450: Use after free in Peer Connection. Reported by Anonymous on 2022-09-30




We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.





Many of our security bugs are detected using AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.


Interested in switching release channels?  Find out how here. If you find a new issue, please let us know by filing a bug. The community help forum is also a great place to reach out for help or learn about common issues.



Srinivas Sista
Google Chrome

How to restore a browser window you just closed by accident

Most browser tabs are full of good intentions, from articles you meant to finish reading to emails deserving of a reply. And it makes sense to feel anxiety over accidentally losing them: One wrong click or errant keystroke and you might trigger an extinction-level event on your precious tabs.

Chrome users, thankfully, have a built-in safety net designed to instantly reverse this panic-inducing outcome. Follow these simple steps to restore a recently closed browser window — and all of your tabs with it — that you may have shut by mistake:

  1. Click the three dots in the top right corner of an open Chrome window.
  2. Hover over “History.”
  3. Click the first option on the drop-down menu under “Recently Closed" to open the last window you shut. (If a recently closed window had multiple tabs, the number of tabs will show in the drop-down menu.)
  4. Click on “Restore Window.”

To make this process even simpler, you can use the keyboard shortcut Control/Command + Shift + T, which will bring up a window of all the tabs you just closed out.

Image of the restore window function in Google Chrome with blue spotlights on "History" and the "7 Tabs" window option

Restoring recently closed windows takes just a few clicks.

That’s it. But if you want to rest even easier, you can build in an additional safeguard to preserve and restore the tabs you visit most frequently using Chrome’s “bookmark all tabs” feature.

To do that:

  1. Open your browser window and arrange your tabs the way you want.
  2. Navigate to the same Chrome drop-down menu as above and hover over “Bookmarks.”
  3. Click “Bookmark All Tabs.”
  4. Chrome will open a prompt to bookmark all the tabs into a new or existing bookmark folder.
Image of Google Chrome's bookmark all tabs feature with blue spotlights on "Bookmarks" and "Bookmark All Tabs"

Bookmarking all your tabs in Chrome is one easy way to keep your browsing organized.

Now you can restore any browser window in seconds, any time, with your favorite tabs arranged just the way you like them.

Helpful as these features are, they’re just the beginning of what Chrome can do to keep you organized. See for yourself: Five members of Google’s Chrome team recently revealed the beginner-friendly tricks they use to restore hours of productivity every week. And now you can feel safe opening that article in a tab to read later.

Stable Channel Update for ChromeOS

The Stable channel is being updated to 106.0.5249.112 (Platform version: 15054.98.0) for most ChromeOS devices and will be rolled out over the next few days.

For Chrome browser fixes, see the Chrome Desktop release announcement.

If you find new issues, please let us know one of the following ways:

Interested in switching channels? Find out how. 


Please see the bug fixes and security updates:

Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.

[$3000] [1343104] High CVE-2022-3201 Insufficient validation of untrusted input in DevTools. Reported by NDevTK

[$2000] [1320139] High CVE-2022-3306 Use-after-free in Ash. Reported by [email protected]

[$3000] [1319229] High CVE-2022-3305 Use-after-free in Ash. Reported by [email protected]

[$4000] [1348415] Medium CVE-2022-3309 Use-after-free in ChromOS. Reported by zh1x1an1221 of Ant Group Tianqiong Security Lab.

[$TBD] [1363030] Medium CVE-TBD Use-after-free in OverlayManager. Reported by [email protected].

[$5000] [1343219] Medium CVE-TBD Use-after-free in Ash. Reported by OP!.

[$2000] [1328708] Medium CVE-2022-3314 Use-after-free in ChromeOS. Reported by Anonymous.

[$TBD] [1303306] Medium CVE-2022-3312 Security: Locked devices. Reported by [email protected].

[$TBD] [1314674] Medium CVE-TBD Security: Use-after-free in ARC Reported by

[email protected]

[$TBD] [1318791] Low CVE-2022-3318 Use-after-free in ChromeOS. Reported by GraVity0


We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.


Matt Nelson

Google ChromeOS

Chrome for Android Update

Hi, everyone! We've just released Chrome 106 (106.0.5249.118) for Android: it'll become available on Google Play over the next few days.

This release includes stability and performance improvements. You can see a full list of the changes in the Git log. If you find a new issue, please let us know by filing a bug.

Android releases contain the same security fixes as their corresponding Desktop release, unless otherwise noted.



Krishna Govind
Google Chrome

How we’re using machine learning to understand proteins

When most people think of proteins, their mind typically goes to protein-rich foods such as steak or tofu. But proteins are so much more. They’re essential to how living things operate and thrive, and studying them can help improve lives. For example, insulin treatments are life-changing for people with diabetes that are based on years of studying proteins.

There is a world of information yet to discover when it comes to proteins — from helping people get the healthcare they need to finding ways to protect plant species. Teams at Google are focused on studying proteins so we can realize Google Health’s mission to help billions of people live healthier lives.

Back in March, we published apost about a model we developed at Google that predicts protein function and a tool that allows scientists to use this model. Since then, the protein function team has accomplished more work in this space. We chatted with software engineer Max Bileschi to find out more about studying proteins and the work Google is doing.

Can you give us a quick crash course in proteins?

Proteins dictate so much of what happens in and around us, like how we and other organisms function.

Two things determine what a protein does: its chemical formula and its environment. For example, we know that human hemoglobin, a protein inside your blood, carries oxygen to your organs. We also know that if there are particular tiny changes to the chemical formula of hemoglobin in your body, it can trigger sickle cell anemia. Further, we know that blood behaves differently at different temperatures because proteins behave differently at higher temperatures.

So why did a team at Google start studying proteins?

We have the opportunity to look at how machine learning can help various scientific fields. Proteins are an obvious choice because of the amazing breadth of functions they have in our bodies and in the world. There is an enormous amount of public data, and while individual researchers have done excellent work studying specific proteins, we know that we’ve just scratched the surface of fully understanding the protein universe. It’s highly aligned to Google’s mission of organizing information and making it accessible and useful.

This sounds exciting! Tell us more about the use of machine learning in identifying what proteins do and how it improves upon the status quo.

Only around 1% of proteins have been studied in a laboratory setting. We want to see how machine learning can help us learn about the other 99%.

It’s difficult work. There are at least a billion proteins in the world, and they’ve evolved throughout history and have been shaped by the same forces of natural selection we normally think of as acting on DNA. It’s useful to understand this evolutionary relatedness among proteins. The presence of a similar protein in two or more distantly related organisms (say humans and zebrafish) can be indicative that it’s useful for survival. Proteins that are closely related can have similar functions but with small differences, like encouraging the same chemical reaction but doing so at different temperatures. Sometimes it’s easy to determine that two proteins are closely related, but other times it's difficult. This was the first problem in protein function annotation that we tackled with machine learning.

Machine learning helps best when it truly helps, not replaces, current techniques. For example, we demonstrated that about 300 previously-uncharacterized proteins are related to “phage capsid” proteins. These capsid proteins can help us deliver medicines to the cells that really need them. We worked with a trusted protein database, Pfam, to confirm our hypothesis, and now these proteins are listed as being related to phage capsid proteins — for all the public to see — including researchers.

Back up a bit. Can you explain what the protein family database Pfam is? How has your team contributed to this database?

A community of scientists built a number of tools and databases, over decades, to help classify what each different protein does. Pfam is one of the most-used databases, and it classifies proteins into about 20,000 types of proteins.

This work of classifying proteins requires both computer models and experts (called curators) to validate and improve the computer models.

Graph showing how the Pfam region coverage over time, depicting that machine learning helped grow the database and add several years of progress.

We used machine learning to add classifications for human proteins that previously lacked Pfam classifications — helping grow the database and adding several years of progress.

Since the publication of your paper ‘Using deep learning to annotate the protein universe’ in June, what has your team been up to?

We’re focused on identifying more proteins and sharing that knowledge with the science and research community. At the end of July, we released more data jointly with Pfam. And this month we’re making Pfam data and Mgnify data, another database that catalogs microbiome data, available on Google Cloud Platform so more people can have access to it. Later this year, we’ll launch an initiative with UniProt, a prominent database in our field, to use language models to name uncharacterized proteins in UniProt. We’re excited about the progress we’re making and how sharing this data can help solve challenging problems.

Data loss prevention for Google Chat now generally available

This announcement was made at Google Cloud Next ‘22. Check out Next OnAir to tune into the livestream or watch session recordings following the event. Visit the Cloud Blog to learn more about the latest Google Workspace innovations for the ever-changing world of work. 


What’s changing

In July 2022, we announced data loss prevention (DLP) rules for Google Chat as an open beta. Over the next several weeks, this feature will become generally available for select Google Workspace editions. 


Data protection rules for Chat help admins and security experts build a stronger framework around sensitive data to prevent personal or proprietary information from ending up in the wrong hands. These leaks, whether accidental or malicious, are a top concern for our customers. 


Admins can selectively apply data protection rules to: 
  • Messages in group conversations, spaces, and/or direct messages 
  • Messages between internal and/or external participants 
  • Message text and/or attachments 

Once DLP rules are applied, messages and files in relevant conversations will automatically be scanned for sensitive information. Admins can configure the action to be taken in response to sensitive data being detected, such as: block from sending, warn before sending, and log for audit. 


In the Security Investigation Tool, we’ve added additional tabs which contain more information on incidents, such as Incident Details, containing information about the message, sender and a triggered rule, and Chat Transcript, showing preceding and following messages to the triggering one, providing a detailed context for investigation.

Additional information regarding Chat events

Getting started 

  • Admins: 
    • This feature will be OFF by default and can be enabled at the domain, OU, or group level. You can create DLP rules in the Admin console under Security > Data Protection
      • Note: You can modify existing DLP rules for Drive and Chrome to also apply to Chat. 
    • Visit the Help Center to learn more about turning data loss prevention in Chat on for your organization
    • If admins opt to log these events, they can be accessed in the Security Investigation Tool
  • End users: There is no action required. 

Rollout pace 


Availability 

  • Available to Google Workspace Enterprise Standard, Enterprise Plus, Education Standard, Education Plus. 
  • DLP for Chat is also available to Cloud Identity Premium users who are also licensed for Workspace editions that include Google Chat and Audit and investigation. Visit the Help Center for more information. 
  • Not available to Google Workspace Essentials, Business Starter, Business Standard, Business Plus, Enterprise Essentials, Frontline, and Nonprofits, as well as legacy G Suite Basic and Business customers 

Resources 

Join or start a meeting directly from Jamboard on the web to kickstart collaboration

What’s changing 

We’re expanding interoperability with Google Meet and Jamboard with the option to join or start a meeting directly from Jamboard on the web. This makes it easier for you to seamlessly present your jam and start collaborating. This feature is available on the web. 



Who’s impacted 

End users 

Why you’d use it 

Effective team meetings are a critical component to unlocking innovation facilitated by human connection and collaboration. A key component of this is the ability to communicate seamlessly whether you’re joining in a meeting room or remotely. Bringing Google Meet into Jamboard allows everyone in the meeting to collaborate while having a conversation. 


This is particularly helpful for presenters, who can share their Jam to illustrate a new idea or concept, and receive their audience's reaction in one place. Collaboration is even easier, allowing everyone in the meeting to co-create on a whiteboard without switching between tabs or apps. 


As with other capabilities, such as Meet in Google Docs, Sheets, and Slides, we hope this update empowers teams working together in-real time, regardless of location. 

Getting started 


Rollout pace 


Availability 

  • Available to all Google Workspace customers, as well as legacy G Suite Basic and Business customers 

Resources 

Expanding smart chips to include events in Google Sheets

This announcement was made at Google Cloud Next ‘22. Check out Next OnAir to tune into the livestream or watch session recordings following the event. Visit the Cloud Blog to learn more about the latest Google Workspace innovations for the ever-changing world of work. 


What’s changing

In addition to the recent announcement of adding files to Google Sheets using smart chips, we're also making it easier for you to quickly insert Calendar events into Sheets.

This additional smart canvas feature allows you to search for events from Calendar or copy Calendar links and place them directly into Sheets. You will then see the event name and an actionable hover card in the cell.

event chips v2

Who’s impacted


End users 


Why you’d use it 


When creating analysis, tracking progress, or updating data in Sheets, your Calendar is now at your fingertips. In addition, through the hovercard view, you can review attendees, times, and other meeting metadata. 



Getting started 

  • Admins: There is no admin control for this feature. 
  • End users: To add Calendar events into Sheets, type "@" in any cell and search for your Calendar events or navigate to Insert>Chips>Events. Visit the Help Center to learn more about inserting smart chips in Google Sheets.

Rollout pace 


Availability 

  • Available to all Google Workspace customers, as well as legacy G Suite Basic and Business customers 
  • Available to users with personal Google Accounts 


Resources 

Google Pixel 7 and Pixel 7 Pro: The next evolution in mobile security

Every day, billions of people around the world trust Google products to enrich their lives and provide helpful features – across mobile devices, smart home devices, health and fitness devices, and more. We keep more people safe online than anyone else in the world, with products that are secure by default, private by design and that put you in control. As our advancements in knowledge and computing grow to deliver more help across contexts, locations and languages, our unwavering commitment to protecting your information remains.

That’s why Pixel phones are designed from the ground up to help protect you and your sensitive data while keeping you in control. We’re taking our industry-leading approach to security and privacy to the next level with Google Pixel 7 and Pixel 7 Pro, our most secure and private phones yet, which were recently recognized as the highest rated for security when tested among other smartphones by a third-party global research firm.1

Pixel phones also get better every few months with Feature Drops that provide the latest product updates, tips and tricks from Google. And Pixel 7 and Pixel 7 Pro users will receive at least five years of security updates2, so your Pixel gets even more secure over time.

Your protection, built into Pixel

Your digital life and most sensitive information lives on your phone: financial information, passwords, personal data, photos – you name it. With Google Tensor G2 and our custom Titan M2 security chip, Pixel 7 and Pixel 7 Pro have multiple layers of hardware security to help keep you and your personal information safe. We take a comprehensive, end-to-end approach to security with verifiable protections at each layer - the network, application, operating system and multiple layers on the silicon itself. If you use Pixel for your business, this approach helps protect your company data, too.

Google Tensor G2 is Pixel’s newest powerful processor custom built with Google AI, and makes Pixel 7 faster, more efficient and secure3. Every aspect of Tensor G2 was designed to improve Pixel's performance and efficiency for great battery life, amazing photos and videos.

Tensor’s built-in security core works with our Titan M2 security chip to keep your personal information, PINs and passwords safe. Titan family chips are also used to protect Google Cloud data centers and Chromebooks, so the same hardware that protects Google servers also secures your sensitive information stored on Pixel.

And, in a first for Google, Titan M2 hardware has now been certified under Common Criteria PP0084: the international gold standard for hardware security components also used for identity, SIM cards, and bankcard security chips.4 This means that the Titan M2 hardware meets the same rigorous protection guidelines trusted by banks, carriers, and governments.

To achieve the certification we went through rigorous third party lab testing by SGS Brightsight, a leading international security lab, and received certification against CC PP0084 with AVA_VAN.5 for the Titan M2 hardware and cryptography library from the Netherlands scheme for Certification in the Area of IT Security (NSCIB). Of all those numbers and acronyms the part we’re most proud of is that Titan hardware passed the highest level of vulnerability assessment (AVA_VAN.5) - the truest measure of resilience to advanced, methodical attacks.

This process took us more than three years to complete. The certification not only requires chip hardware to resist invasive penetration testing, but also mandates audits of the chip design and manufacturing process itself. The benefit for consumers? The now certified Titan M2 chip makes your phone even more resilient to sophisticated attacks.5

Private by design

Evolving our security and privacy standards to our fast-paced world requires new approaches as well. Earlier this year at I/O, we introduced Protected Computing, a toolkit of technologies that transforms how, when, and where personal data is processed to protect your privacy and security. Our approach focuses on:

  1. Minimizing your data footprint, by shrinking the amount of personally identifiable data altogether
  2. De-identifying data, with a range of anonymization techniques so it’s not linked to you
  3. Restricting data access using technologies like end-to-end encryption and secure enclaves.

Many elements of Protected Computing can be found on the new Pixel 7:

On Android, Private Compute Core keeps your information and AI-driven personalizations private with on-device processing. Data from features like Now Playing, Live Caption and Smart Reply in Messages are all processed on device and are never sent to Google to maintain your privacy. And even your device backups to the cloud are end-to-end encrypted using Titan in the cloud.6

With Google Tensor G2, Pixel’s advanced privacy protection also now covers audio data from events like cough and snore detection on Pixel 7.7 Audio data from cough and snore detection is never stored by or sent to Google to maintain your privacy.

On Pixel 7, Tensor G2 helps safeguard your system with the Android Virtualization Framework, unlocking improved security protections like enabling system update integrity checking to occur on-the-fly, reducing boot time after an update.

Extra protection when you’re online

Helping to keep you safe when you use your phone to browse the web and use apps is also critical. This is where a Virtual Private Network (VPN) comes in. A VPN helps protect your online activity from anyone who might try to access it by encrypting your network traffic to turn it into an unreadable format, and masking your original IP address. Typically, if you want a VPN on your phone, you need to get one from a third party.

To ensure more people have access to enhanced security, later this year, Pixel 7 and Pixel 7 Pro owners will be able to use VPN by Google One, at no extra cost.8 VPN by Google One is verifiably private, and will allow you to tap into Google’s world-class security for peace of mind when you connect online. With VPN by Google One, Pixel helps protect your online activity at a network level. Think of it like an extra layer of protection for your online security.

VPN by Google One creates a high-performance secure connection to the web so your browsing and app data is sent and received via an encrypted pathway. A few simple taps will activate the VPN to help keep your network traffic private from internet providers and hackers, giving you peace of mind when using cellular data, home Wi-Fi, and especially when connected to public networks, like a café or airport Wi-Fi. No need to worry about online intruders, hackers, or unsecure networks.

Unlike traditional VPN services, VPN by Google One uses Protected Computing to technically make it impossible for anyone at a network level, even VPN by Google One, to link your online traffic with your account or identity. VPN by Google One will be available at no extra cost as long as your phone continues to receive security updates. See here to learn more about VPN by Google One.

More protection and privacy with Android 13

Pixel 7 and Pixel 7 Pro have built-in anti-phishing protections from Android that scan for potential threats from phone calls, text messages and emails, and more anti-phishing protections enabled out-of-the-box than smartphones from leading competitors.9 In fact, Messages alone protects consumers against 1.5 billion spam messages per month.

Android also resets permissions for apps you haven’t used for an extended time. In a typical month, Android automatically resets more than 3 billion permissions affecting more than 1 billion installed apps. Similarly, if you use clipboard on Android 13, your history is automatically deleted after a period of time. This blocks apps running in the foreground from seeing old information that you previously copied.

You’re in control


Core to your safety is knowing that you’re in control. You always have control over your settings and devices across all of our products. With Android 13, coming soon through a Feature Drop, Pixel 7 and Pixel 7 Pro will give you additional ways to stay in control of your privacy and what you share with first and third-party apps. With Quick Settings, you can act on security issues as they arise, or review which apps are running in the background and easily stop them. You’ll have a single destination for reviewing your security and privacy settings, risk levels and information, making it easier to manage your safety status.

With this new experience, you can review actionable steps to improve your safety status, like revoking a permission or app. This page will also have new action cards to notify you of any safety risks and provide timely recommendations on how to enhance your privacy. And with a single tap, you can grant or remove permissions to data that you don’t want to share with compatible apps. This will be coming soon first to Pixel devices later this year, and other Android phones soon after.

Verifiably secure

As computing extends to more devices and use cases, Google is committed to innovating in security and being transparent about the processes that we take to get there. We are leading the industry in verifiable security by not only having products that are tested against real-world threats (like advanced spam, phishing and malware attacks), but also in publishing the results of penetration tests, security audits, and industry certifications across our Pixel and Nest products.

Another way to verify our security is through our Android and Google Devices Security Reward Program where we reward security researchers who find vulnerabilities across products, including Pixel, Nest and Fitbit. Last year on Android, we awarded nearly $3 million dollars, creating a valuable feedback loop between us and the security research community and, most importantly, helping us keep our users safe.

To learn more about Pixel 7 and Pixel 7 Pro, check out the Google Store.

Notes


  1. Based on third-party global research firm. Evaluation considered features that may not be available in all countries. See here for more information.  

  2. Android version updates and feature drops for at least 3 years from when the device first became available on the Google Store in the US. Android security updates for at least 5 years from when the device first became available on the Google Store in the US. See g.co/pixel/updates for details. 

  3. Compared to Pixel 6. Speed and efficiency claims based on internal testing on pre-production devices.  

  4. Common Criteria certification for hardware and cryptographic library (CC PP0084 EAL4+, AVA_VAN.5 and ALC_DVS.2). See g.co/pixel/certifications for details. 

  5. Compared to Pixel 5a and earlier Pixel phones.  

  6. Excludes MMS attachments and Google Photos. 

  7. Not intended to diagnose, cure, mitigate, prevent or treat any disease or condition. Consult your healthcare professional if you have questions about your health. See g.co/pixel/digitalwellbeing for more information.  

  8. Coming soon. Restrictions apply. Some data is not transmitted through VPN. Not available in all countries. All other Google One membership benefits sold separately. This VPN offer does not impact price or benefits of Google One Premium plan. Use of VPN may increase data costs depending on your plan. See g.co/pixel/vpn for details. 

  9. Based on third-party research funded by Google LLC in June 2022. Evaluation based on no-cost smartphone features enabled by default. Some features may not be available in all countries. See here for more information.