

“Dev mode out of the box does several things that compromise security, including disabling verified boot, enabling VT2, and activating passwordless root shell access. David Schneider, the Crouton maintainer, who works for Google but was unable to get permission to speak to Ars for this article, outlines the security trade offs on the Crouton wiki: Once in developer mode, your Chromebook will offer a warning message every time you boot-up that the device is now vulnerable. Hit Ctrl-D, Enter, and wait five minutes or so for the Chromebook to wipe. Doing so will erase all local data on your Chromebook (in the unlikely event that you have any locally stored data on a cloud-focused device, granted).

Enter developer mode on your Chromebook, which for most users means holding down the Esc and Refresh keys while tapping the power button. Trying out Crouton is easy, and worth an evening’s tinkering. The project name is an acronym for "ChRomium Os Universal chrooT envirONment," according to the witty GitHub README, and currently supports Debian Linux and derivatives like Ubuntu and Kali Linux.

Crouton: Linux crunch for your Chrome saladĬrouton installed in less than half an hour on our 2016-era Acer Chromebook ( buy here), and runs in a chroot side-by-side with Chrome OS. Geeky users willing to engage in some entry-level hackery, however, can install Linux on their Chromebook and unleash the Power of Torvalds™. Chromebooks are one of the most secure devices you can give a non-technical end user, and at a price point few can argue with, but that security comes with a privacy trade off: you have to trust Google, which is part of the NSA's Prism programme, with your data in the cloud.Įven those who put their faith in the company's rusty "don’t be evil" mantra may find Chromebook functionality limiting-if you want more than Google services, Netflix, some other Web apps, and maybe the Android app store, then you're out of luck.
