Privacy Ninja

Microsoft Edge Adds Super Duper Secure Mode to Stable Channel

Microsoft Edge Adds Super Duper Secure Mode to Stable Channel

Microsoft has quietly added a ‘Super Duper Secure Mode’ to the Microsoft Edge web browser, a new feature that brings security improvements without significant performance losses.

Users can enable Super Duper Secure Mode after upgrading Edge to stable version 96.0.1054.29 or later, and they can toggle between Balanced and Strict modes for different levels of security increase.

The new feature, under testing by the Edge Vulnerability Research team since August, removes Just-In-Time Compilation (JIT) from the V8 processing pipeline, thus reducing the attack surface threat actors can exploit to hack into Edge users’ systems. 

Microsoft describes Super Duper Secure Mode as “a browsing mode in Microsoft Edge where the security of your browser takes priority, providing you an extra layer of protection when browsing the web.”

Also Read: What You Need to Know About Singapore’s Data Sharing Arrangements

“We quietly released Super Duper Secure Mode to stable (96.0.1054.29),” said Johnathan Norman, Microsoft Edge Vulnerability Research Lead.

“Balanced learns what sites you use often and trusts those, strict is well.. strict 🙂 Users can now add their own exceptions.”

Enabling Super Duper Secure Mode in Microsoft Edge
Enabling Super Duper Secure Mode in Microsoft Edge (BleepingComputer)

When toggled on, Super Duper Secure Mode disables JIT (TurboFan/Sparkplug) and enables Intel’s Control-flow Enforcement Technology (CET), a hardware-based exploit mitigation that provides a more secure browsing experience.

As Norman revealed in August when the feature was first announced, roughly 45% of all security vulnerabilities found in the V8 JavaScript and WebAssembly engine were related to the JIT engine, accounting for over half of all ‘in the wild’ Chrome exploits abusing JIT bugs.

By disabling JIT, the attack surface is drastically reduced by removing almost half of the V8 bugs that should be fixed.

“This reduction in attack surface kills half of the bugs we see in exploits and every remaining bug becomes more difficult to exploit. To put it another way, we lower costs for users but increase costs for attackers,” Norman explained.

In the future, Microsoft aims to include support for Arbitrary Code Guard (ACG) in Super Duper Secure Mode, another security mitigation that would block attackers from loading malicious code into memory, a known technique used by most web browser exploits.

The Edge Vulnerability Research team also plans to ship the new feature with the Android and macOS Edge versions.

Also Read: PDPA Compliance for HR Managers in Singapore: A Must



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us