List of Interesting Experimental Flags for Google Chrome to Try Out


Level 64
Thread author
Honorary Member
Top Poster
Apr 25, 2013
If you are a regular here you know that you can modify quite a few Google Chrome settings on the chrome://flags/ page.

The majority of settings that you find there are not yet ready for prime time. Some technologies may still be in active development, other features are tested by Google and made available to a wider audience through flags.

Since you find more than a hundred flags on the page at any time, it can be quite time consuming to go through all them regularly to find out what is new.

Since the flags don't appear to be in any kind of chronological order, it is difficult to make the distinction between old and new.

This article looks at several flags that are interesting from a user point of view. Each experiment is listed with its title and internal link at the top. You need to copy and paste the link into the address bar manually to get right to the preference on the flags' page.

Experimental Chrome flags
Mark non-secure origins as non-secure

  • chrome://flags/#mark-non-secure-as

Google considers marking all http websites that you visit in Chrome as insecure at one point in time. The flag allows you to enable this feature right now in the browser. You can set them to neutral, non-secure or dubious currently using the flag.

Enable extension toolbar redesign

  • chrome://flags/#enable-extension-action-redesign

Google is working on a redesign of the extension toolbar currently. It is displayed to the right of the address bar.

If you enable the flag, extension icons are displayed for all installed extensions there.

Remember decisions to proceed through SSL errors for a specified length of time

  • chrome://flags/#remember-cert-error-decisions
When you encounter an SSL error you get options to handle it in one way or the other. You can use this setting to remember that decision for up to three months.

Enable fast tab/window close

  • chrome://flags/#enable-fast-unload
This one may speed up the closing of tabs or Chrome browser windows when enabled.

Save Page as MHTML

  • chrome://flags/#save-page-as-mhtml

Instead of saving most web pages as multiple files that depend on each other, the web page is saved as a single file.

Enable Automatic Spelling Correction

  • chrome://flags/#spellcheck-autocorrect
If you enable this feature, Chrome will auto-correct text while you are still typing.

Enable Download Resumption

  • chrome://flags/#enable-download-resumption
When a download stops for whatever reason, be it server error, transfer error, a flaky Internet connection or you closing the browser by accident, it will be restarted from the very beginning. With this set to enable, downloads are resumed from the position they stopped provided that the server supports this as well.

Only Auto-Reload Visible Tabs

  • chrome://flags/#enable-offline-auto-reload-visible-only
When tabs cannot be loaded by Chrome, for instance if the computer is offline, then they will automatically be reloaded when the browser is online again.

If you enable this feature, Chrome will only load visible tabs and not all of them.

Enable Developer Tools experiments

  • chrome://flags/#enable-devtools-experiments

This enables a new option in the Chrome Developer Tool settings that you can use to enable experimental features there.


Staff Member
Jan 8, 2011
Without opening a new topic, here are some I have configured in Chrome 64.0 64-bit.

Unsorted mix of security, privacy, usability, interface etc. Some are set to disable.
Smooth Scrolling

Site settings with All sites and Site details

Material Design in the rest of the browser's native UI

Password generation

Force-saving of passwords

Manual password generation

New style notification

Memory coordinator

Tab audio muting UI control

Mark non-secure origins as non-secure (Always mark HTTP..)

Show in-form warnings for sensitive fields when the top-level page is not HTTPS
Attaches a warning UI to any password or credit card fields detected when the top-level page is not HTTPS.

Strict site isolation
Highly experimental security mode that ensures each renderer process contains pages from at most one site. In this mode, out-of-process iframes will be used whenever an iframe is cross-site.

App Banners
Enable the display of Progressive Web App banners, which prompt a user to add a web app to their shelf, or other platform-specific equivalent.

Experimental app banners

Desktop PWAs
Experimental windowing and install banner treatment for Progressive Web Apps on desktop platforms. Implies #enable-experimental-app-banners.

Experimental keyboard lock UI.
An experimental full screen with keyboard lock mode requiring users to hold Esc to exit.

Enable AppContainer Lockdown.
Enables the use of an AppContainer on sandboxed processes to improve security.

Enable Material Design extensions

Automatic tab discarding

Google branding in the context menu
Shows a Google icon next to context menu items powered by Google services.

Generic Sensor (Disabled)
Enables motion sensor classes based on Generic Sensor API, i.e. Accelerometer, LinearAccelerationSensor, Gyroscope, AbsoluteOrientationSensor and RelativeOrientationSensor interfaces.

Generic Sensor Extra Classes (Disabled)
Enables an extra set of sensor classes based on Generic Sensor API, which expose previously unavailable platform features, i.e. AmbientLightSensor and Magnetometer interfaces.

Throttle expensive background timers
Enables intervention to limit CPU usage of background timers to 1%.

Enable new Print Preview UI

Custom-drawn Windows 10 Titlebar
If enabled, Chrome will draw the titlebar and caption buttons instead of deferring to Windows.

Desktop to iOS promotions (Disabled)
Enable Desktop to iOS promotions, and allow users to see them if they are eligible.

Enable the New App Menu Icon

Pause background tabs
Pause timers in background tabs after 5 minutes on desktop.

Autoplay policy (User gesture is required..)
Policy used when deciding if audio or video is allowed to autoplay.

Enable using the Google local NTP

Enable the OneGoogleBar on the local NTP
Show a OneGoogleBar on the local New Tab page if Google is the default search engine.

Enable picture in picture.

Enable Voice Search on the local NTP (Disabled)
Show a microphone for voice search on the local New Tab page if Google is the default search engine.

Click to open embedded PDFs

Enable doodles on the local NTP

Sound content setting
Enable site-wide muting in content settings and tab strip context menu.


Level 24
Honorary Member
Top Poster
Content Creator
Mar 13, 2016
Enhanced privacy settings
- Disable hyperlink auditing (chrome://flags/#disable-hyperlink-auditing)
- Reduce default 'referer' header granularity (chrome://flags/#reduced-referrer-granularity)

Enhanced security settings
- Permissions blacklist (chrome://flags/#enable-permissions-blacklist)
- Extension Content Verification -(chrome://flags/#extension-content-verification) ENABLE STRICT
- Block scripts loaded via document.write (chrome://flags/#disallow-doc-written-script-loads)
- Strict site isolation (chrome://flags/#enable-site-per-process)

Enhanced performance settings
- Parallel downloading (chrome://flags/#enable-parallel-downloading)

Note: Parallel downloading enabled since Chrome 63, all others I have set before leaving Wilders and joining MalwareTips (so at least two years now, without running into errors or site incompatibility problems).
Last edited:


Level 24
Honorary Member
Top Poster
Content Creator
Mar 13, 2016
Sorry to complicated to explain, also I don't know how to set them for Yandex and Opera

I only use three policies

Policy List - The Chromium Projects
(only allow extension)

Policy List - The Chromium Projects
(block flash)

Policy List - The Chromium Projects
(lock download directory)

You have to hack the registry, see for example text below for Chrome (installed in Program Files\Google\Chrome)

Windows Registry Editor Version 5.00




I unzip Chromium to Program Files\Chromium, so regsitry hack would be

Windows Registry Editor Version 5.00




Level 7
Jan 25, 2018
@Windows_Security Do you know about policies in chrome(browser://policy-tool)?if yes then some tutorials thanks :)
Policy List - The Chromium Projects
@Windows_Security Do you know about policies in chrome(browser://policy-tool)?if yes then some tutorials thanks :)
Policy List - The Chromium Projects


do you mean this?
  • Like
Reactions: simmerskool


Staff Member
Jan 8, 2011
Set as Enabled - Framebusting requires same-origin or a user gesture
  • Don't permit an iframe to navigate the top level browsing context unless they are same-origin or the iframe is processing a user gesture. – Mac, Windows, Linux, Chrome OS, Android
Paste into omnibar

Third-party redirection Test site - Pass if not redirected.


Deleted member 65228

Is there a way of inserting the above *All-At-Once* instead of inserting them *one-by-one*? :unsure:
There sure is buddy, try doing them two by two :ROFLMAO::p

On the serious side though, there isn't AFAIK... Although if you can find out where the config file for the flags are (and assuming it is not encrypted) then you probably could but you would still risk messing something up.

The list of flags you want to change, it will take you hardly any time. Cutting corners never helped anyone in the long run, you just think it did but that is short term. Just do it yourself... Problem solved! I recon it would take you about a minute max and that is a stretch.


Level 2
Nov 11, 2017
@212eta If you have a text editor supporting regular expressions, you *could* copy the links to a new text file, replace every instance of chrome://flags/# with a single dash following a space, remove all the \r\ns and copy the new text to the end of the target of your Chrome shortcut's properties window, but as @Opcode said, this screams of doing more work to avoid less. Instead of having to list the flags you want in the first place, enabling them as you go is better. Unless you worry about accidentally changing the wrong flags, or are procrastinating, that is. ;)
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.