9 ways to make the most of your Chromecast

The year 2013: when we were all snacking on endless fro-yo, discussing season three of “Game of Thrones” with anyone who would listen and laughing out loud to the best clips on Vine. But did you know it was also the year we introduced Chromecast to the world?

Since then, Chromecast continues to be the one of the simplest options for you to see your photos on the big screen, gather round a virtual fireplace on YouTube over the holidays or catch up on your favorite show — all with one device.

So to celebrate nine years of our favorite streamer that's only getting better with age (we're a little biased), we're rounding up nine features to help you to make the most of your Chromecast:

  1. See who’s at your door. Today we’re announcing Chromecast with Google TV is rolling out support for live video streaming from Nest Cam (outdoor or indoor, battery), Nest Cam (indoor, wired), Nest Cam with floodlight and Nest Doorbell (battery) – which means all your Nest Cams and Nest doorbells are supported. Now you can quickly see a live view of your cameras from the comfort of your couch – so you can know for sure when your pizza delivery shows up at your front door on movie night.
  2. Mirror your Android screen or Chrome tab to the big screen. Looking at a menu with your family before heading out to dinner? Or planning your next vacation destination with your friends? No matter what information you’re sharing, you can easily cast to a TV or other screen.
  3. Show off your photos on a TV with Chromecast. When you’re back from that vacation, show off your photos with the Google Photos app. Just select the photo or album you want to cast and display it on your TV. Then you can swipe between photos to change what’s displayed.
  4. Cast your meetings to the big screen. With the Google Meet app, you can cast your meeting to the TV while continuing to use your computer's camera, microphone and audio. Perfect for virtual family reunions.
  5. The control is yours with Chromecast. Chromecast with Google TV comes with a physical remote, which has been one of our most requested features since Chromecast’s early days. But you can also use your phone, your TV remote or your voice - just say, “Hey Google, play ‘The Umbrella Academy’ on the living room TV” to your Assistant-enabled device.
  6. Continue casting even when you leave the room. You don’t need to worry about playback being interrupted if you need to leave the house for a bit, or if you walk outside of your Wi-Fi coverage area. So if you need to run to the store to grab more ice, the party inside can continue.
  7. Let your friends and family join in on the party with a shared queue. In the YouTube app, anyone connected to the same Wi-Fi as your Chromecast can tap the Cast icon on a YouTube video and add it to a shared playlist so everyone can contribute to what you’re watching or listening to.
  8. Move your media from room to room. Ready to move to another room but don’t want to stop listening to the latest episode of your favorite podcast? You can easily move music, podcasts or radio currently streaming from your Google Nest or Home speaker or display, or Chromecast device to another Nest speaker, speaker group, display, or Chromecast-connected device so you don’t have to worry about missing a thing. You can also move YouTube videos between Google Nest displays and Chromecast devices.
  9. Cast with Android, iOS or Chrome on PC and Mac. We wanted to make it easy to cast from as many devices as possible, whether you’re on Android, iOS or on your computer. It’s as simple as tapping Cast from a compatible app, selecting your Chromecast and tapping play.

Google’s efforts to identify and counter spyware

The following testimony was delivered to the U.S. House Intelligence Committeeby Shane Huntley, Senior Director of Google’s Threat Analysis Group (TAG) on July 27, 2022.

Chairman Schiff, Ranking Member Turner, and esteemed Members of the Committee:

Thank you for the opportunity to appear before the Committee to discuss Google’s efforts to protect users from commercial spyware. We appreciate the Committee’s efforts to raise awareness about the commercial spyware industry that is thriving and growing, creating risks to Americans and Internet users across the globe.

Our expert teams

Google has been tracking the activities of commercial spyware vendors for years, and we have been taking critical steps to protect our users. We take the security of our users very seriously, and we have dedicated teams in place to protect against attacks from a wide range of sources. Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats. TAG actively monitors threat actors and the evolution of their tactics and techniques. For example, TAG has been closely tracking and disrupting campaigns targeting individuals and organizations in Ukraine, and frequently publishes reports on Russian threat actors.

We use our research to continuously improve the safety and security of our products and share this intelligence with our industry peers. We also publicly release information about the operations we disrupt, which is available to our government partners and the general public. TAG tracks and proactively counters serious state-sponsored and financially motivated information cyber criminal activities, such as hacking and the use of spyware. And we don’t just plug security holes – we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet. We are joined in this effort by many other security teams at Google, including Project Zero, our team of security researchers at Google who study zero-day vulnerabilities in the hardware and software systems that are depended upon by users around the world.

Our ongoing work

Google has a long track record combating commercial surveillance tools targeting our users. In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware. At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices. We observed fewer than three dozen installs of this spyware. We remediated the compromises for these users and implemented controls to protect all Android users.

NSO Group continues to pose risks across the Internet ecosystem. In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups’s marketing information suggesting that they had a 0-day exploit for Android. Google was able to identify the vulnerability in use and fix the exploit quickly. In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users. iPhone users could be compromised by receiving a malicious iMessage text, without ever needing to click a malicious link. Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense. Based on our research and findings, we assessed this to be one of the most technically sophisticated exploits we had ever seen, further demonstrating that the capabilities NSO provides rival those previously thought to be accessible to only a handful of nation states.

Although this Committee must be concerned with the exploits of NSO Group, it is not the only entity posing risks to our users. For example, TAG discovered campaigns targeting Armenian users which utilized zero-day vulnerabilities in Chrome and Internet Explorer. We assessed that a surveillance vendor packaged and sold these technologies. Reporting by CitizenLab linked this activity to Candiru, an Israeli spyware vendor. Other reporting from Microsoft has linked this spyware to the compromise of dozens of victims, including political dissidents, human rights activists, journalists, and academics.

Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users. We assess with high confidence that commercial surveillance company Cytrox packaged these vulnerabilities, and sold the hacking software to at least eight governments. Among other targets, this spyware was used to compromise journalists and opposition politicians. Our reporting is consistent with earlier analysis produced by CitizenLab and Meta.

TAG also recently released information on a segment of attackers we call “hack-for-hire” that focuses on compromising accounts and exfiltrating data as a service. In contrast to commercial surveillance vendors, who we generally observe selling a capability for the end user to operate, hack-for-hire firms conduct attacks themselves. They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns. In June, we provided examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates.

The growth of commercial spyware vendors and hack-for-hire groups has necessitated growth in TAG to counter these threats. Where once we only needed substreams to focus on threat actors such as China, Russia, and North Korea, TAG now has a dedicated analysis subteam dedicated to commercial vendors and operators.

Risks posed by commercial spyware are increasing

Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments. These vendors operate with deep technical expertise to develop and operationalize exploits. We believe its use is growing, fueled by demand from governments.

Seven of the nine zero-day vulnerabilities our Threat Analysis Group discovered in 2021 were originally developed by commercial providers and sold to and used by state-sponsored actors. TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to state-sponsored actors.

This industry appears to be thriving. In fact, there was recently a large industry conference in Europe, sponsored by many of the commercial spyware vendors we track. This trend should be concerning to the United States and all citizens. These vendors are enabling the proliferation of dangerous hacking tools, arming nation state actors that would not otherwise be able to develop these capabilities in-house. While use of surveillance technologies may be legal under national or international laws, they are found to be used by some state actors for purposes antithetical to democratic values: targeting dissidents, journalists, human rights workers, and opposition party politicians.

We have also observed proliferation risk from nation state actors attempting to gain access to the exploits of these vendors. Last year, TAG identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations. The actors behind this campaign, which we attributed to a government-backed entity based in North Korea, have employed a number of means to target researchers.

In addition to these concerns, there are other reasons why this industry presents a risk more broadly across the Internet. While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised. This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.

The proliferation of commercial hacking tools is a threat to national security, making the Internet less safe and undermining the trust on which a vibrant, inclusive digital society depends. This is why when Google discovers these activities, we not only take steps to protect users, but also disclose that information publicly to raise awareness and help the entire ecosystem, in line with our historical commitment to openness and democratic values.

Google’s work to protect users

Across all Google products, we incorporate industry-leading security features and protections to keep our users safe. On Search, Google’s Safe Browsing is an industry-leading service to identify unsafe websites across the web and notify users and website owners of potential harm. Google Safe Browsing helps protect over four billion devices every day by showing warnings to users when they attempt to navigate to unsafe sites or download harmful files. Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem so that their visitors stay safer.

On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam. Spoofers may send forged messages using an organization’s real name or domain to subvert authentication measures. We use email authentication to protect against email spoofing, which is when email content is changed to make the message appear from someone or somewhere other than the actual source. And we offer other advanced phishing and malware protection to administrators to better protect their users. By default, Gmail displays warnings and moves untrustworthy emails to the user’s spam folder. However administrators can also use advanced security settings to enhance their users’ protection against suspicious attachments and scripts from untrusted senders.

For Android, through its entire development lifecycle, we subject the products to a rigorous security program. The Android security process begins early in the development lifecycle, and each major feature of the platform is reviewed by engineering and security resources. We ensure appropriate controls are built into the architecture of the system. During the development stage, Android-created and open source components are subject to vigorous security reviews For users, Android provides safety and control over how apps and third parties can access the data from their devices. For example, users are provided visibility into the permissions requested by each app, and they are able to control those permissions.

We have also built additional tools to prevent successful attacks on devices that run Android once those devices are in users’ hands. For example, Google Play Protect, our built-in malware protection for Android, continuously scans devices for potentially harmful applications.

Although our security precautions are robust, security issues can still occur, which is why we created a comprehensive security response process to respond to incidents. Google manages a vulnerability rewards program (VRP), rewarding researchers millions of dollars for their contributions in securing our devices and platforms. We also provide research grants to security researchers to help fund and support the research community. This is all part of a larger strategy to keep Google products and users, as well as the Internet at large more secure. Project Zero is also a critical component of this strategy, pushing transparency and more timely patching of vulnerabilities.

Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations – in other words, the users who are frequently targeted by surveillance tools. Google developed Project Shield, a free protection against distributed denial of service (DDoS) attacks, to protect news media and human rights organization websites. We recently expanded eligibility to protect Ukraine government organizations, and we are currently protecting over 200 Ukraine websites today. To protect high risk user accounts, we offer the Advanced Protection Program (APP), which is our highest form of account security. APP has a strong track record protecting users – since the program’s inception, there are no documented cases of an account compromise via phishing.

Whole of Society response necessary to tackle spyware

We believe it is time for government, industry and civil society to come together to change the incentive structure which has allowed these technologies to spread in secret. The first step is to understand the scope of the problem. We appreciate the Committee’s focus on this issue, and recommend the U.S. Intelligence Community prioritize identifying and analyzing threats from foreign commercial spyware providers as being on par with other major advanced threat actors. The U.S. should also consider ways to foster greater transparency in the marketplace, including setting heightened transparency requirements for the domestic surveillance industry. The U.S. could also set an example to other governments by reviewing and disclosing its own historical use of these tools.

We welcome recent steps taken by the government in applying sanctions to the NSO Group and Candiru, and we believe other governments should consider expanding these restrictions. Additionally, the U.S. government should consider a full ban on Federal procurement of commercial spyware technologies and contemplate imposing further sanctions to limit spyware vendors’ ability to operate in the U.S. and receive U.S. investment. The harms from this industry are amply evident by this point, and we believe they outweigh any benefit to continued use.

Finally, we urge the United States to lead a diplomatic effort to work with the governments of the countries who harbor problematic vendors, as well as those who employ these tools, to build support for measures that limit harms caused by this industry. Any one government’s ability to meaningfully impact this market is limited; only through a concerted international effort can this serious risk to online safety be mitigated.

Google is investing heavily as a company and as an industry to counter serious threats to our users. In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits. While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries. Google is committed to leading the industry in detecting and disrupting these threats.

I thank the Committee for this attention on this critical issue.

Google’s efforts to identify and counter spyware

The following testimony was delivered to the U.S. House Intelligence Committeeby Shane Huntley, Senior Director of Google’s Threat Analysis Group (TAG) on July 27, 2022.

Chairman Schiff, Ranking Member Turner, and esteemed Members of the Committee:

Thank you for the opportunity to appear before the Committee to discuss Google’s efforts to protect users from commercial spyware. We appreciate the Committee’s efforts to raise awareness about the commercial spyware industry that is thriving and growing, creating risks to Americans and Internet users across the globe.

Our expert teams

Google has been tracking the activities of commercial spyware vendors for years, and we have been taking critical steps to protect our users. We take the security of our users very seriously, and we have dedicated teams in place to protect against attacks from a wide range of sources. Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats. TAG actively monitors threat actors and the evolution of their tactics and techniques. For example, TAG has been closely tracking and disrupting campaigns targeting individuals and organizations in Ukraine, and frequently publishes reports on Russian threat actors.

We use our research to continuously improve the safety and security of our products and share this intelligence with our industry peers. We also publicly release information about the operations we disrupt, which is available to our government partners and the general public. TAG tracks and proactively counters serious state-sponsored and financially motivated information cyber criminal activities, such as hacking and the use of spyware. And we don’t just plug security holes – we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet. We are joined in this effort by many other security teams at Google, including Project Zero, our team of security researchers at Google who study zero-day vulnerabilities in the hardware and software systems that are depended upon by users around the world.

Our ongoing work

Google has a long track record combating commercial surveillance tools targeting our users. In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware. At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices. We observed fewer than three dozen installs of this spyware. We remediated the compromises for these users and implemented controls to protect all Android users.

NSO Group continues to pose risks across the Internet ecosystem. In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups’s marketing information suggesting that they had a 0-day exploit for Android. Google was able to identify the vulnerability in use and fix the exploit quickly. In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users. iPhone users could be compromised by receiving a malicious iMessage text, without ever needing to click a malicious link. Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense. Based on our research and findings, we assessed this to be one of the most technically sophisticated exploits we had ever seen, further demonstrating that the capabilities NSO provides rival those previously thought to be accessible to only a handful of nation states.

Although this Committee must be concerned with the exploits of NSO Group, it is not the only entity posing risks to our users. For example, TAG discovered campaigns targeting Armenian users which utilized zero-day vulnerabilities in Chrome and Internet Explorer. We assessed that a surveillance vendor packaged and sold these technologies. Reporting by CitizenLab linked this activity to Candiru, an Israeli spyware vendor. Other reporting from Microsoft has linked this spyware to the compromise of dozens of victims, including political dissidents, human rights activists, journalists, and academics.

Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users. We assess with high confidence that commercial surveillance company Cytrox packaged these vulnerabilities, and sold the hacking software to at least eight governments. Among other targets, this spyware was used to compromise journalists and opposition politicians. Our reporting is consistent with earlier analysis produced by CitizenLab and Meta.

TAG also recently released information on a segment of attackers we call “hack-for-hire” that focuses on compromising accounts and exfiltrating data as a service. In contrast to commercial surveillance vendors, who we generally observe selling a capability for the end user to operate, hack-for-hire firms conduct attacks themselves. They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns. In June, we provided examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates.

The growth of commercial spyware vendors and hack-for-hire groups has necessitated growth in TAG to counter these threats. Where once we only needed substreams to focus on threat actors such as China, Russia, and North Korea, TAG now has a dedicated analysis subteam dedicated to commercial vendors and operators.

Risks posed by commercial spyware are increasing

Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments. These vendors operate with deep technical expertise to develop and operationalize exploits. We believe its use is growing, fueled by demand from governments.

Seven of the nine zero-day vulnerabilities our Threat Analysis Group discovered in 2021 were originally developed by commercial providers and sold to and used by state-sponsored actors. TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to state-sponsored actors.

This industry appears to be thriving. In fact, there was recently a large industry conference in Europe, sponsored by many of the commercial spyware vendors we track. This trend should be concerning to the United States and all citizens. These vendors are enabling the proliferation of dangerous hacking tools, arming nation state actors that would not otherwise be able to develop these capabilities in-house. While use of surveillance technologies may be legal under national or international laws, they are found to be used by some state actors for purposes antithetical to democratic values: targeting dissidents, journalists, human rights workers, and opposition party politicians.

We have also observed proliferation risk from nation state actors attempting to gain access to the exploits of these vendors. Last year, TAG identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations. The actors behind this campaign, which we attributed to a government-backed entity based in North Korea, have employed a number of means to target researchers.

In addition to these concerns, there are other reasons why this industry presents a risk more broadly across the Internet. While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised. This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.

The proliferation of commercial hacking tools is a threat to national security, making the Internet less safe and undermining the trust on which a vibrant, inclusive digital society depends. This is why when Google discovers these activities, we not only take steps to protect users, but also disclose that information publicly to raise awareness and help the entire ecosystem, in line with our historical commitment to openness and democratic values.

Google’s work to protect users

Across all Google products, we incorporate industry-leading security features and protections to keep our users safe. On Search, Google’s Safe Browsing is an industry-leading service to identify unsafe websites across the web and notify users and website owners of potential harm. Google Safe Browsing helps protect over four billion devices every day by showing warnings to users when they attempt to navigate to unsafe sites or download harmful files. Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem so that their visitors stay safer.

On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam. Spoofers may send forged messages using an organization’s real name or domain to subvert authentication measures. We use email authentication to protect against email spoofing, which is when email content is changed to make the message appear from someone or somewhere other than the actual source. And we offer other advanced phishing and malware protection to administrators to better protect their users. By default, Gmail displays warnings and moves untrustworthy emails to the user’s spam folder. However administrators can also use advanced security settings to enhance their users’ protection against suspicious attachments and scripts from untrusted senders.

For Android, through its entire development lifecycle, we subject the products to a rigorous security program. The Android security process begins early in the development lifecycle, and each major feature of the platform is reviewed by engineering and security resources. We ensure appropriate controls are built into the architecture of the system. During the development stage, Android-created and open source components are subject to vigorous security reviews For users, Android provides safety and control over how apps and third parties can access the data from their devices. For example, users are provided visibility into the permissions requested by each app, and they are able to control those permissions.

We have also built additional tools to prevent successful attacks on devices that run Android once those devices are in users’ hands. For example, Google Play Protect, our built-in malware protection for Android, continuously scans devices for potentially harmful applications.

Although our security precautions are robust, security issues can still occur, which is why we created a comprehensive security response process to respond to incidents. Google manages a vulnerability rewards program (VRP), rewarding researchers millions of dollars for their contributions in securing our devices and platforms. We also provide research grants to security researchers to help fund and support the research community. This is all part of a larger strategy to keep Google products and users, as well as the Internet at large more secure. Project Zero is also a critical component of this strategy, pushing transparency and more timely patching of vulnerabilities.

Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations – in other words, the users who are frequently targeted by surveillance tools. Google developed Project Shield, a free protection against distributed denial of service (DDoS) attacks, to protect news media and human rights organization websites. We recently expanded eligibility to protect Ukraine government organizations, and we are currently protecting over 200 Ukraine websites today. To protect high risk user accounts, we offer the Advanced Protection Program (APP), which is our highest form of account security. APP has a strong track record protecting users – since the program’s inception, there are no documented cases of an account compromise via phishing.

Whole of Society response necessary to tackle spyware

We believe it is time for government, industry and civil society to come together to change the incentive structure which has allowed these technologies to spread in secret. The first step is to understand the scope of the problem. We appreciate the Committee’s focus on this issue, and recommend the U.S. Intelligence Community prioritize identifying and analyzing threats from foreign commercial spyware providers as being on par with other major advanced threat actors. The U.S. should also consider ways to foster greater transparency in the marketplace, including setting heightened transparency requirements for the domestic surveillance industry. The U.S. could also set an example to other governments by reviewing and disclosing its own historical use of these tools.

We welcome recent steps taken by the government in applying sanctions to the NSO Group and Candiru, and we believe other governments should consider expanding these restrictions. Additionally, the U.S. government should consider a full ban on Federal procurement of commercial spyware technologies and contemplate imposing further sanctions to limit spyware vendors’ ability to operate in the U.S. and receive U.S. investment. The harms from this industry are amply evident by this point, and we believe they outweigh any benefit to continued use.

Finally, we urge the United States to lead a diplomatic effort to work with the governments of the countries who harbor problematic vendors, as well as those who employ these tools, to build support for measures that limit harms caused by this industry. Any one government’s ability to meaningfully impact this market is limited; only through a concerted international effort can this serious risk to online safety be mitigated.

Google is investing heavily as a company and as an industry to counter serious threats to our users. In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits. While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries. Google is committed to leading the industry in detecting and disrupting these threats.

I thank the Committee for this attention on this critical issue.

Our new office is a love letter to Atlanta

Google has been a part of Atlanta for more than 20 years. There are more than 1,000 full-time Google employees in Georgia — in two offices in Atlanta and a data center in Douglas County — helping to build and support our products, and help our partners and customers across the South and nationally.

We recently opened our doors to the newest office space in Midtown Atlanta at the 1105 West Peachtree building. This new Google office encompasses 19 floors spanning 500,000 square feet, and is a part of our broader investment in local communities across the U.S.

Atlanta has a rich civil rights history and is home to top Historically Black Colleges and Universities (HBCUs) and tech talent. Continuing our long-term investment here will help support our Black Googler community in Atlanta, in line with our racial equity commitments.

Inspired by the city’s legacy for social change, our office was designed as an homage to the people of Atlanta, with each floor an ode to Atlanta’s cultural, musical and artistic history. We worked with more than 50 local and diverse companies to design and build the new space, including artwork from more than 20 local artists.

A giant heart outlining the Google Atlanta sign greets you in the lobby. One of the staircases features a rainbow design — in support and celebration of the LGBTQ+ community — inspired by the city’s nearby rainbow crosswalks. The WERD Cafe, our Googler cafeteria, is named for the first Black-owned and programmed U.S. radio station.

Our commitment to Atlanta extends far beyond the walls of our new office. In 2021, Google products helped provide $13.21 billion of economic activity for tens of thousands of Georgia businesses, nonprofits, publishers, creators and developers.

Today, we’re announcing a $1 million commitment to the Urban League of Atlanta to support their work in training underserved communities throughout Georgia. This grant will help jobseekers get digital skills training and place them in high-growth jobs.

On top of this, to bring equitable opportunities to more Georgians, we’re partnering with local community organizations and universities. We’re working with HBCUs like Clark Atlanta University and Spelman College to attract top talent, and partnering with the Technical College System of Georgia to offer Google Career Certificates to 22 colleges across the state at no cost.

Lastly, we are partnering with Mayor Andre Dickens and the Atlanta BeltLine to launch the Atlanta BeltLine Marketplace, an effort to help local Black, Latino and women-owned small businesses reach new customers by retrofitting rail cars into office spaces. We’re providing Wi-Fi for the rail containers, a complete suite of Google Nest products, Chromebooks and free digital skills training.

We look forward to continuing to support and partner with our customers, employees and local communities in Atlanta for years to come.

Our new office is a love letter to Atlanta

Google has been a part of Atlanta for more than 20 years. There are more than 1,000 full-time Google employees in Georgia — in two offices in Atlanta and a data center in Douglas County — helping to build and support our products, and help our partners and customers across the South and nationally.

We recently opened our doors to the newest office space in Midtown Atlanta at the 1105 West Peachtree building. This new Google office encompasses 19 floors spanning 500,000 square feet, and is a part of our broader investment in local communities across the U.S.

Atlanta has a rich civil rights history and is home to top Historically Black Colleges and Universities (HBCUs) and tech talent. Continuing our long-term investment here will help support our Black Googler community in Atlanta, in line with our racial equity commitments.

Inspired by the city’s legacy for social change, our office was designed as an homage to the people of Atlanta, with each floor an ode to Atlanta’s cultural, musical and artistic history. We worked with more than 50 local and diverse companies to design and build the new space, including artwork from more than 20 local artists.

A giant heart outlining the Google Atlanta sign greets you in the lobby. One of the staircases features a rainbow design — in support and celebration of the LGBTQ+ community — inspired by the city’s nearby rainbow crosswalks. The WERD Cafe, our Googler cafeteria, is named for the first Black-owned and programmed U.S. radio station.

Our commitment to Atlanta extends far beyond the walls of our new office. In 2021, Google products helped provide $13.21 billion of economic activity for tens of thousands of Georgia businesses, nonprofits, publishers, creators and developers.

Today, we’re announcing a $1 million commitment to the Urban League of Atlanta to support their work in training underserved communities throughout Georgia. This grant will help jobseekers get digital skills training and place them in high-growth jobs.

On top of this, to bring equitable opportunities to more Georgians, we’re partnering with local community organizations and universities. We’re working with HBCUs like Clark Atlanta University and Spelman College to attract top talent, and partnering with the Technical College System of Georgia to offer Google Career Certificates to 22 colleges across the state at no cost.

Lastly, we are partnering with Mayor Andre Dickens and the Atlanta BeltLine to launch the Atlanta BeltLine Marketplace, an effort to help local Black, Latino and women-owned small businesses reach new customers by retrofitting rail cars into office spaces. We’re providing Wi-Fi for the rail containers, a complete suite of Google Nest products, Chromebooks and free digital skills training.

We look forward to continuing to support and partner with our customers, employees and local communities in Atlanta for years to come.

Chrome Beta for Android Update

Hi everyone! We've just released Chrome Beta 104 (104.0.5112.69) for Android. It's now available on Google Play.

You can see a partial list of the changes in the Git log. For details on new features, check out the Chromium blog, and for details on web platform updates, check here.

If you find a new issue, please let us know by filing a bug.

Erhu Akpobaro
Google Chrome

Bringing Google to Chicago’s Thompson Center

In 2000, Google’s Chicago office consisted of two people in River North. Now, that presence has grown to more than 1,800 employees in Fulton Market. And today, we’re announcing we intend to buy the iconic James R. Thompson Center building in Chicago’s Loop upon future renovation, which deepens our commitment to Google’s long-term presence in the city. The cost of the existing unrenovated building is $105 million.

This will support engineering work in Chicago and helps advance the growth of Google’s partners and customers across the Midwest and nationally. It also helps us meet the future needs of our flexible hybrid workforce. By establishing a presence in Chicago’s central business district, we will be getting in on the ground floor of a broader revitalization of the Loop.

The Thompson Center will provide employees with unparalleled public transit access as the only building in the city where six L train lines converge, easily connecting Chicago’s South, West and North sides. Once renovated to a Class A environmentally friendly office building, we anticipate occupying the Thompson Center starting in 2026.

Image of the Thompson Center’s existing interior space, which will be renovated.

Google will occupy the Thompson Center once renovations are completed. (Photo credit: Courtesy of Jahn)

The tech sector’s economic impact in Chicago has been significant. The city has become a global tech hub generating new jobs and top talent. A recent economic impact study shows creating one high-tech job generates another 4.4 jobs in the local economy. In 2020, Google’s employees in Chicago supported over 4,600 indirect jobs in Illinois, for a total economic impact of $2 billion.

We love being part of Chicago’s diverse and vibrant community. It’s important to us to be good neighbors and continue to focus on helping local communities, organizations and people emerge stronger from the pandemic:

  • Since 2007, Google.org has awarded over $18 million in grants to a wide range of nonprofits and organizations based in Illinois, including grants that help place jobseekers from under-resourced Chicago communities into in-demand careers.
  • Grow with Google has trained more than 358,000 people across Illinois in digital skills.
  • Google for Startups partners with leading startups that support the state's technology entrepreneurs, like 1871 and Bunker Labs. For example, as part of our inaugural Google for Startups Latino Founders Fund, five Chicago startups founded by Latino entrepreneurs each recently received $100,000 in cash awards to help fuel their businesses. And over the past two years, the Google for Startups Black Founders Fund has provided cash awards and support to promising entrepreneurs across the country, including to Chicago-based companies A.M Money, Five to Nine, 4Degrees, LifeWeb 360, Cyber Pop-Up and GoLogic.

We look forward to continuing to be an active part of Chicago’s community for many years to come.

Bringing Google to Chicago’s Thompson Center

In 2000, Google’s Chicago office consisted of two people in River North. Now, that presence has grown to more than 1,800 employees in Fulton Market. And today, we’re announcing we intend to buy the iconic James R. Thompson Center building in Chicago’s Loop upon future renovation, which deepens our commitment to Google’s long-term presence in the city. The cost of the existing unrenovated building is $105 million.

This will support engineering work in Chicago and helps advance the growth of Google’s partners and customers across the Midwest and nationally. It also helps us meet the future needs of our flexible hybrid workforce. By establishing a presence in Chicago’s central business district, we will be getting in on the ground floor of a broader revitalization of the Loop.

The Thompson Center will provide employees with unparalleled public transit access as the only building in the city where six L train lines converge, easily connecting Chicago’s South, West and North sides. Once renovated to a Class A environmentally friendly office building, we anticipate occupying the Thompson Center starting in 2026.

Image of the Thompson Center’s existing interior space, which will be renovated.

Google will occupy the Thompson Center once renovations are completed. (Photo credit: Courtesy of Jahn)

The tech sector’s economic impact in Chicago has been significant. The city has become a global tech hub generating new jobs and top talent. A recent economic impact study shows creating one high-tech job generates another 4.4 jobs in the local economy. In 2020, Google’s employees in Chicago supported over 4,600 indirect jobs in Illinois, for a total economic impact of $2 billion.

We love being part of Chicago’s diverse and vibrant community. It’s important to us to be good neighbors and continue to focus on helping local communities, organizations and people emerge stronger from the pandemic:

  • Since 2007, Google.org has awarded over $18 million in grants to a wide range of nonprofits and organizations based in Illinois, including grants that help place jobseekers from under-resourced Chicago communities into in-demand careers.
  • Grow with Google has trained more than 358,000 people across Illinois in digital skills.
  • Google for Startups partners with leading startups that support the state's technology entrepreneurs, like 1871 and Bunker Labs. For example, as part of our inaugural Google for Startups Latino Founders Fund, five Chicago startups founded by Latino entrepreneurs each recently received $100,000 in cash awards to help fuel their businesses. And over the past two years, the Google for Startups Black Founders Fund has provided cash awards and support to promising entrepreneurs across the country, including to Chicago-based companies A.M Money, Five to Nine, 4Degrees, LifeWeb 360, Cyber Pop-Up and GoLogic.

We look forward to continuing to be an active part of Chicago’s community for many years to come.

Find back-to-school deals for 2000s throwback trends

This fall, for the first time in years, many students across the U.S. will return to the classroom in person. With a new (in-real-life) school year fast approaching, students and their families are already on the lookout for new gear: In fact, searches for “back to school supplies'' increased by 80% in the last month versus the same period last year, while searches for “back to school deals” grew 40%.

Two search bars show the queries “back to school supplies” and “back to school deals.” The “back to school supplies” bar has illustrations of a notebook, a calculator, pens and pencils, with the text “+80%” next to it in blue. The “back to school deals” bar has an illustration of a backpack with a price tag, with the text “+40%” next to it in green.

We looked into what items back-to-school shoppers are searching for and found that the early 2000s are having a moment. One of this season’s hottest shopping trends is the Y2K aesthetic — with butterfly hair clips, trucker hats and inflatable dorm furniture making a comeback.

So as you get ready for the school year, we’re sharing the top-trending Y2K back-to-school items and Google tools to help you get the most bang for your buck.

Top Y2K trends

Search interest for school supplies spikes every August in the U.S., and it's driven by searches for the usual suspects: file folders, pencil cases, notebooks and three-ring binders. This year, trending product searches are leaning into the Y2K style.

Back(pack) to the 2000s

As students head to the physical classroom, they’re ready to shop for the back-to-school staple: a brand new backpack. Searches for playful Y2K styles like “butterfly backpacks” spiked 190% over the last month and “metallic backpacks,” another iconic Y2K look, grew by 90% during the same period. Meanwhile, searches for “vintage backpack” reached a record high in the U.S. this month.

A clear favorite

Translucent and clear accessories were a trademark of early 2000s style. Now, the clear aesthetic is finding its way into school supplies: Searches for "clear post it notes" increased by more than 250% ahead of the back-to-school season, “clear bento boxes” are currently trending and searches for “clear pencil case” are at an all-time high.

Throwback threads

Y2K is also breaking through in back-to-school apparel trends. Search interest for “baggy jeans outfits” is up 650% this month, while searches for “claw clips,” “crochet top” and “trucker hats” are at an all-time high. You can also expect to see students sporting other early 2000s classics — like the “baby tee,” up 40% this year, and “butterfly hair clips,” up 80%.

Funky dorm decor

For students headed off to college, dorm room decorations are top of mind. Search interest for “Y2K room decor” increased 80% in the last month versus the same time period last year. Classic styles from the early 2000s are showing up in home goods — for example, searches for “smiley face rugs” increased 15% in the past month. Playful decor is on the rise too, with “inflatable furniture” searches up 10%, and “glow in the dark stars for ceiling” searches more than doubling over the past month.

Get the best back-to-school deals

Shoppers aren’t just looking for the coolest styles, they’re looking for the best deals. When you start back-to-school shopping on Google, our tools can help you find inspiration, research and compare products for the best value.

On sale filter

Tap the “on sale” filter when you’re searching for a back-to-school product on the Shopping tab to see recent price drops, deals and products on sale — making it simple to factor price into your search from the start.

Price insights

Ever wonder if you’re getting a good deal? Click into the product details page on Google Shopping for a price insights graph. It’ll show you whether a product price is high, low or typical compared to others across the web and in nearby stores.

Price tracking tool

If you’re getting a head start on shopping, our price tracking tool can help you monitor price changes leading up to the school year. When you find a product you’re interested in, tap the “Track Price” toggle on Google to get a notification when the price drops.

Find back-to-school deals for 2000s throwback trends

This fall, for the first time in years, many students across the U.S. will return to the classroom in person. With a new (in-real-life) school year fast approaching, students and their families are already on the lookout for new gear: In fact, searches for “back to school supplies'' increased by 80% in the last month versus the same period last year, while searches for “back to school deals” grew 40%.

Two search bars show the queries “back to school supplies” and “back to school deals.” The “back to school supplies” bar has illustrations of a notebook, a calculator, pens and pencils, with the text “+80%” next to it in blue. The “back to school deals” bar has an illustration of a backpack with a price tag, with the text “+40%” next to it in green.

We looked into what items back-to-school shoppers are searching for and found that the early 2000s are having a moment. One of this season’s hottest shopping trends is the Y2K aesthetic — with butterfly hair clips, trucker hats and inflatable dorm furniture making a comeback.

So as you get ready for the school year, we’re sharing the top-trending Y2K back-to-school items and Google tools to help you get the most bang for your buck.

Top Y2K trends

Search interest for school supplies spikes every August in the U.S., and it's driven by searches for the usual suspects: file folders, pencil cases, notebooks and three-ring binders. This year, trending product searches are leaning into the Y2K style.

Back(pack) to the 2000s

As students head to the physical classroom, they’re ready to shop for the back-to-school staple: a brand new backpack. Searches for playful Y2K styles like “butterfly backpacks” spiked 190% over the last month and “metallic backpacks,” another iconic Y2K look, grew by 90% during the same period. Meanwhile, searches for “vintage backpack” reached a record high in the U.S. this month.

A clear favorite

Translucent and clear accessories were a trademark of early 2000s style. Now, the clear aesthetic is finding its way into school supplies: Searches for "clear post it notes" increased by more than 250% ahead of the back-to-school season, “clear bento boxes” are currently trending and searches for “clear pencil case” are at an all-time high.

Throwback threads

Y2K is also breaking through in back-to-school apparel trends. Search interest for “baggy jeans outfits” is up 650% this month, while searches for “claw clips,” “crochet top” and “trucker hats” are at an all-time high. You can also expect to see students sporting other early 2000s classics — like the “baby tee,” up 40% this year, and “butterfly hair clips,” up 80%.

Funky dorm decor

For students headed off to college, dorm room decorations are top of mind. Search interest for “Y2K room decor” increased 80% in the last month versus the same time period last year. Classic styles from the early 2000s are showing up in home goods — for example, searches for “smiley face rugs” increased 15% in the past month. Playful decor is on the rise too, with “inflatable furniture” searches up 10%, and “glow in the dark stars for ceiling” searches more than doubling over the past month.

Get the best back-to-school deals

Shoppers aren’t just looking for the coolest styles, they’re looking for the best deals. When you start back-to-school shopping on Google, our tools can help you find inspiration, research and compare products for the best value.

On sale filter

Tap the “on sale” filter when you’re searching for a back-to-school product on the Shopping tab to see recent price drops, deals and products on sale — making it simple to factor price into your search from the start.

Price insights

Ever wonder if you’re getting a good deal? Click into the product details page on Google Shopping for a price insights graph. It’ll show you whether a product price is high, low or typical compared to others across the web and in nearby stores.

Price tracking tool

If you’re getting a head start on shopping, our price tracking tool can help you monitor price changes leading up to the school year. When you find a product you’re interested in, tap the “Track Price” toggle on Google to get a notification when the price drops.