Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Privacy & Compliance » Google users are automatically logged in to Chrome
2 min Privacy & Compliance

Google users are automatically logged in to Chrome

Jim PeddSeptember 24, 2018 1:39 pmSeptember 8, 2019
Google users are automatically logged in to Chrome

Google is strongly criticized for a feature that has recently been enabled on the web browser Chrome. Users who have Chrome 69 or newer and log in to a Google service are also automatically logged in to the web browser. It’s an update that Google hasn’t released and one that has serious consequences for user privacy.

This is the Google Sync feature, a system that allows users to log into Chrome with their Google Account. If desired, they can upload local browser data (including history, passwords, favorites and other data) to, and synchronize with, the search giant’s servers.

Automatically logged in

Sync has been present in Chrome for several years, but until now the system worked independently of Google accounts. This made it possible for users to be logged in to a Google Account, without uploading Chrome browser data to the Google servers. The browse data can be linked to the user account.

But the new Chrome has an automatic system for logging in users. In this way, Google can map the browsing behaviour of a user, linked to a specific browser and specific device. With emphasis on the can, because according to Google employees, after automatically logging in, no local data is synchronized with the company’s servers. This still requires explicit permission.

Precisely for privacy

Although the mechanism may have serious implications for the privacy of users, the technicians on Twitter claim that the system was introduced precisely in order to improve privacy. This has to do with shared computers and browsers. If one or more users use the same browser, it can happen that incorrect information is linked.

Nevertheless, criticism persists. Professor Matthew Green of John Hopkins University, for example, writes that Google has also completely redesigned the Sync account interface. As a result, it would no longer be clear to users whether they are logged in and which button they should use to start synchronizing. According to him, it is a dark pattern, a term that is used for interfaces that are deliberately designed to be misleading.

This news article was automatically translated from Dutch to give Techzine.eu a head start. All news articles after September 1, 2019 are written in native English and NOT translated. All our background stories are written in native English as well. For more information read our launch article.

Tags:

Chrome / Google / interface / Login / Privacy

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

After retaining Chrome, Google fears split from advertising service

Google launches VaultGemma: privacy AI without compromising performance

Google can keep Chrome and Android, avoiding a messy breakup

Is Chrome being acquired by Perplexity for 30 billion?

Editor picks

Why your SOC needs a ROC

Qualys CEO Sumedh Thakar dives into vulnerability, risk and the ROC

Cisco IQ adds brains (and a face) to CX

Cisco IQ turns documentation into action

Celonis frees business processes through real-time MRI scans

Celonis uses its annual Celosphere event to sharpen its vision of ent...

Qualcomm is entering the B2B market with Snapdragon innovations

Can Qualcomm become a B2B player?

Techzine.tv

Qualcomm tells us how ARM chips will disrupt the enterprise PC market

Qualcomm tells us how ARM chips will disrupt the enterprise PC market

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

Nutanix CTO explains their VMware alternative and multi-cloud strategy

Nutanix CTO explains their VMware alternative and multi-cloud strategy

SAP Business Network: $6.5 trillion B2B collaboration platform

SAP Business Network: $6.5 trillion B2B collaboration platform

Read more on Privacy & Compliance

EU Data Act in force as of today: companies free from cloud lock-in
Top story

EU Data Act in force as of today: companies free from cloud lock-in

The EU Data Act comes into force today in all member states. The legislation gives companies and consumers mo...

Berry Zwets September 12, 2025
China tries its hand at advanced AI chips without Nvidia: will it succeed?
Top story

China tries its hand at advanced AI chips without Nvidia: will it succeed?

Vendor lock-in is a ubiquitous problem. Anyone looking for AI chips will find it difficult to bypass Nvidia. ...

Erik van Klinken September 2, 2025
Google’s $32B Wiz deal gets green light from DOJ

Google’s $32B Wiz deal gets green light from DOJ

The US Department of Justice has concluded its investigation into Google's acquisition of cybersecurity compa...

Erik van Klinken 2 days ago
China calls the Netherlands “unconstructive” in Nexperia conflict

China calls the Netherlands “unconstructive” in Nexperia conflict

The Chinese Ministry of Commerce accuses the Netherlands of not cooperating constructively in finding a solut...

Erik van Klinken 3 days ago

Expert Talks

AI Integrity: The Invisible Threat Organizations Can’t Ignore

AI Integrity: The Invisible Threat Organizations Can’t Ignore

AI systems are increasingly making decisions that impact people, proc...

Three Ways Secure Modern Networks Unlock the True Power of AI

Three Ways Secure Modern Networks Unlock the True Power of AI

AI is rapidly becoming the main driver of innovation for businesses, ...

Data Governance in the Cloud: Balancing Innovation and Regulation

The cloud has become the backbone of modern business, enabling rapid ...

How to Safeguard and Prepare Exchange Server against Natural Disasters?

It is critical to make sure that the Exchange Server is protected fro...

Tech calendar

Discover Why Northern Europe Chooses Redgate Monitor

November 13, 2025

Dell Technologies Forum

November 13, 2025 Nieuwegein

BrickCon The Databricks Community Conference

December 3, 2025 Orlando, Florida

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement