Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Privacy & Compliance » Google users are automatically logged in to Chrome
2 min Privacy & Compliance

Google users are automatically logged in to Chrome

Jim PeddSeptember 24, 2018 1:39 pmSeptember 8, 2019
Google users are automatically logged in to Chrome

Google is strongly criticized for a feature that has recently been enabled on the web browser Chrome. Users who have Chrome 69 or newer and log in to a Google service are also automatically logged in to the web browser. It’s an update that Google hasn’t released and one that has serious consequences for user privacy.

This is the Google Sync feature, a system that allows users to log into Chrome with their Google Account. If desired, they can upload local browser data (including history, passwords, favorites and other data) to, and synchronize with, the search giant’s servers.

Automatically logged in

Sync has been present in Chrome for several years, but until now the system worked independently of Google accounts. This made it possible for users to be logged in to a Google Account, without uploading Chrome browser data to the Google servers. The browse data can be linked to the user account.

But the new Chrome has an automatic system for logging in users. In this way, Google can map the browsing behaviour of a user, linked to a specific browser and specific device. With emphasis on the can, because according to Google employees, after automatically logging in, no local data is synchronized with the company’s servers. This still requires explicit permission.

Precisely for privacy

Although the mechanism may have serious implications for the privacy of users, the technicians on Twitter claim that the system was introduced precisely in order to improve privacy. This has to do with shared computers and browsers. If one or more users use the same browser, it can happen that incorrect information is linked.

Nevertheless, criticism persists. Professor Matthew Green of John Hopkins University, for example, writes that Google has also completely redesigned the Sync account interface. As a result, it would no longer be clear to users whether they are logged in and which button they should use to start synchronizing. According to him, it is a dark pattern, a term that is used for interfaces that are deliberately designed to be misleading.

This news article was automatically translated from Dutch to give Techzine.eu a head start. All news articles after September 1, 2019 are written in native English and NOT translated. All our background stories are written in native English as well. For more information read our launch article.

Tags:

Chrome / Google / interface / Login / Privacy

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

AI conversations of 8 million users leaked via browser extensions

3 out of 10 password managers aren’t secure enough, including Chrome’s

Proton launches privacy-first alternative to Excel and Google Sheets

After retaining Chrome, Google fears split from advertising service

Editor picks

What Microsoft Azure Local can and cannot do

There is a pressing demand for all the benefits the cloud has in stor...

Mandiant security tool AuraInspector prevents Salesforce problems

Mandiant has released AuraInspector, an open-source tool for identify...

From vulnerability whack-a-mole to strategic risk operations

Vulnerability management badly needs a risk upgrade

CraftStory writes the script for image-to-video AI

Logically named San Francisco-based CraftStory is a specialist in rea...

Techzine.tv

Infor's industry-specific ERP strategy and Velocity Suite deep dive

Infor's industry-specific ERP strategy and Velocity Suite deep dive

Atlassian CTO on realistic AI: Rovo, data privacy & adoption

Atlassian CTO on realistic AI: Rovo, data privacy & adoption

Qualcomm tells us how ARM chips will disrupt the enterprise PC market

Qualcomm tells us how ARM chips will disrupt the enterprise PC market

Why this CIO ditched Microsoft for Google and Slack

Why this CIO ditched Microsoft for Google and Slack

Read more on Privacy & Compliance

China tries its hand at advanced AI chips without Nvidia: will it succeed?
Top story

China tries its hand at advanced AI chips without Nvidia: will it succeed?

Vendor lock-in is a ubiquitous problem. Anyone looking for AI chips will find it difficult to bypass Nvidia. ...

Erik van Klinken September 2, 2025
Meta didn’t do all it could to fend off scam ads, report claims

Meta didn’t do all it could to fend off scam ads, report claims

Meta developed internal strategies to limit the visibility of fraudulent ads to regulators, while delaying st...

Mels Dees January 2, 2026
EU Data Act in force as of today: companies free from cloud lock-in
Top story

EU Data Act in force as of today: companies free from cloud lock-in

The EU Data Act comes into force today in all member states. The legislation gives companies and consumers mo...

Berry Zwets September 12, 2025
European Commission investigates X for illegal deepfakes

European Commission investigates X for illegal deepfakes

The European Commission is intensifying its investigation into X due to the way in which the AI tool Grok is ...

Mels Dees January 6, 2026

Expert Talks

AI audit trails: the next step toward responsible AI for businesses

AI audit trails: the next step toward responsible AI for businesses

Brian Pugh, CTO at Lucid Software, believes that AI will be even more...

6 predictions for the AI economy: 2026’s new rules of cybersecurity

6 predictions for the AI economy: 2026’s new rules of cybersecurity

For much of its history, corporate automation adoption has been a slo...

Cybersecurity in 2026 demands managing human behavior and agentic AI

Most organizations today have more security technology at their dispo...

Digital sovereignty: from buzzword to business imperative

Digital sovereignty has outgrown its niche as an IT concern and is no...

Tech calendar

Rocket Fuel Factory

January 27, 2026 Den Haag

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

De IT Afdeling van de toekomst

March 31, 2026 Naaldwijk

GITEX ASIA 2026

April 8, 2026 Singapore

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement