Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Privacy & Compliance » Google users are automatically logged in to Chrome
2 min Privacy & Compliance

Google users are automatically logged in to Chrome

Jim PeddSeptember 24, 2018 1:39 pmSeptember 8, 2019
Google users are automatically logged in to Chrome

Google is strongly criticized for a feature that has recently been enabled on the web browser Chrome. Users who have Chrome 69 or newer and log in to a Google service are also automatically logged in to the web browser. It’s an update that Google hasn’t released and one that has serious consequences for user privacy.

This is the Google Sync feature, a system that allows users to log into Chrome with their Google Account. If desired, they can upload local browser data (including history, passwords, favorites and other data) to, and synchronize with, the search giant’s servers.

Automatically logged in

Sync has been present in Chrome for several years, but until now the system worked independently of Google accounts. This made it possible for users to be logged in to a Google Account, without uploading Chrome browser data to the Google servers. The browse data can be linked to the user account.

But the new Chrome has an automatic system for logging in users. In this way, Google can map the browsing behaviour of a user, linked to a specific browser and specific device. With emphasis on the can, because according to Google employees, after automatically logging in, no local data is synchronized with the company’s servers. This still requires explicit permission.

Precisely for privacy

Although the mechanism may have serious implications for the privacy of users, the technicians on Twitter claim that the system was introduced precisely in order to improve privacy. This has to do with shared computers and browsers. If one or more users use the same browser, it can happen that incorrect information is linked.

Nevertheless, criticism persists. Professor Matthew Green of John Hopkins University, for example, writes that Google has also completely redesigned the Sync account interface. As a result, it would no longer be clear to users whether they are logged in and which button they should use to start synchronizing. According to him, it is a dark pattern, a term that is used for interfaces that are deliberately designed to be misleading.

This news article was automatically translated from Dutch to give Techzine.eu a head start. All news articles after September 1, 2019 are written in native English and NOT translated. All our background stories are written in native English as well. For more information read our launch article.

Tags:

Chrome / Google / interface / Login / Privacy

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

AI conversations of 8 million users leaked via browser extensions

3 out of 10 password managers aren’t secure enough, including Chrome’s

Proton launches privacy-first alternative to Excel and Google Sheets

After retaining Chrome, Google fears split from advertising service

Editor picks

Silicon One is the engine under the hood of Cisco’s AI story

Doubling throughput for AI networks

How Cisco CX transforms customer experience with AI

CX has become a key pillar of the Cisco story

ISO 27001 inspires confidence, but it is only the beginning

ISO 27001 certification is anything but easy. Nevertheless, security ...

Kyndryl stock drops by 55 percent in a single day as SEC investigates

Executive exodus followed by document request

Techzine.tv

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

How Cisco's AI Canvas is revolutionizing network troubleshooting

How Cisco's AI Canvas is revolutionizing network troubleshooting

Workday Rising EMEA: platform transformation: Pipedream, AI agents and sovereignty

Workday Rising EMEA: platform transformation: Pipedream, AI agents and sovereignty

What makes Salesforce agents reliable? Architecture explained

What makes Salesforce agents reliable? Architecture explained

Read more on Privacy & Compliance

OpenAI accuses DeepSeek of misusing AI models

OpenAI accuses DeepSeek of misusing AI models

OpenAI informed US policymakers of suspicions that Chinese AI company DeepSeek is using techniques to mimic e...

Mels Dees 2 days ago
European regulators criticize weakening GDPR

European regulators criticize weakening GDPR

In a joint opinion, the European privacy regulators EDPB and EDPS have expressed serious concerns about key e...

Berry Zwets 3 days ago
China tries its hand at advanced AI chips without Nvidia: will it succeed?
Top story

China tries its hand at advanced AI chips without Nvidia: will it succeed?

Vendor lock-in is a ubiquitous problem. Anyone looking for AI chips will find it difficult to bypass Nvidia. ...

Erik van Klinken September 2, 2025
EU Data Act in force as of today: companies free from cloud lock-in
Top story

EU Data Act in force as of today: companies free from cloud lock-in

The EU Data Act comes into force today in all member states. The legislation gives companies and consumers mo...

Berry Zwets September 12, 2025

Expert Talks

4 steps to create a future-proof data infrastructure

4 steps to create a future-proof data infrastructure

A future-proof IT infrastructure is often positioned as a universal s...

Secure networking: the foundation for the AI era

Secure networking: the foundation for the AI era

As organizations get ready to roll out AI to change their business pr...

Why AI adoption requires a dedicated approach to cyber governance

AI tools are spreading through the enterprise ecosystem at an astonis...

Professional print materials for European tech events, why booth design still makes the difference

When you participate in a major tech event, you naturally want to sta...

Tech calendar

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

De IT Afdeling van de toekomst

March 31, 2026 Naaldwijk

GITEX ASIA 2026

April 8, 2026 Singapore

Southeast Asia AI Application Summit 2026

April 23, 2026 Bangkok

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement