Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Privacy & Compliance » Google users are automatically logged in to Chrome
2 min Privacy & Compliance

Google users are automatically logged in to Chrome

Jim PeddSeptember 24, 2018 1:39 pmSeptember 8, 2019
Google users are automatically logged in to Chrome

Google is strongly criticized for a feature that has recently been enabled on the web browser Chrome. Users who have Chrome 69 or newer and log in to a Google service are also automatically logged in to the web browser. It’s an update that Google hasn’t released and one that has serious consequences for user privacy.

This is the Google Sync feature, a system that allows users to log into Chrome with their Google Account. If desired, they can upload local browser data (including history, passwords, favorites and other data) to, and synchronize with, the search giant’s servers.

Automatically logged in

Sync has been present in Chrome for several years, but until now the system worked independently of Google accounts. This made it possible for users to be logged in to a Google Account, without uploading Chrome browser data to the Google servers. The browse data can be linked to the user account.

But the new Chrome has an automatic system for logging in users. In this way, Google can map the browsing behaviour of a user, linked to a specific browser and specific device. With emphasis on the can, because according to Google employees, after automatically logging in, no local data is synchronized with the company’s servers. This still requires explicit permission.

Precisely for privacy

Although the mechanism may have serious implications for the privacy of users, the technicians on Twitter claim that the system was introduced precisely in order to improve privacy. This has to do with shared computers and browsers. If one or more users use the same browser, it can happen that incorrect information is linked.

Nevertheless, criticism persists. Professor Matthew Green of John Hopkins University, for example, writes that Google has also completely redesigned the Sync account interface. As a result, it would no longer be clear to users whether they are logged in and which button they should use to start synchronizing. According to him, it is a dark pattern, a term that is used for interfaces that are deliberately designed to be misleading.

This news article was automatically translated from Dutch to give Techzine.eu a head start. All news articles after September 1, 2019 are written in native English and NOT translated. All our background stories are written in native English as well. For more information read our launch article.

Tags:

Chrome / Google / interface / Login / Privacy

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

AI conversations of 8 million users leaked via browser extensions

3 out of 10 password managers aren’t secure enough, including Chrome’s

Proton launches privacy-first alternative to Excel and Google Sheets

After retaining Chrome, Google fears split from advertising service

Editor picks

IBM FlashSystem: ‘Autonomous AI takes over 90% of storage management’

IBM is launching a new generation of FlashSystem storage with agentic...

Western Europe is a hotbed for cybercriminals’ servers (update)

Update February 9: rdp.monster has informed us that it is surprised t...

Imec opens NanoIC line for ultra-advanced chips

The Belgian research institute imec opened the NanoIC pilot on Monday...

Everyone works with AI agents, but who controls the agents?

86% of IT decision-makers believe AI agents will add more complexity from integration challenges

Techzine.tv

Why Salesforce built three levels of AI commerce agents

Why Salesforce built three levels of AI commerce agents

Why your SOC needs a ROC, according to Qualys

Why your SOC needs a ROC, according to Qualys

What makes Salesforce agents reliable? Architecture explained

What makes Salesforce agents reliable? Architecture explained

Why this CIO ditched Microsoft for Google and Slack

Why this CIO ditched Microsoft for Google and Slack

Read more on Privacy & Compliance

CM.com and VOLT build sovereign AI environment for Europe

CM.com and VOLT build sovereign AI environment for Europe

CM.com will use VOLT's AI infrastructure to offer solutions for various sectors with sovereignty requirements...

Erik van Klinken February 5, 2026
Rapid AI adoption increases risk of shadow IT

Rapid AI adoption increases risk of shadow IT

More than 80 percent of the world's largest companies now use AI in software development, but many organizati...

Mels Dees 12 hours ago
China tries its hand at advanced AI chips without Nvidia: will it succeed?
Top story

China tries its hand at advanced AI chips without Nvidia: will it succeed?

Vendor lock-in is a ubiquitous problem. Anyone looking for AI chips will find it difficult to bypass Nvidia. ...

Erik van Klinken September 2, 2025
EU Data Act in force as of today: companies free from cloud lock-in
Top story

EU Data Act in force as of today: companies free from cloud lock-in

The EU Data Act comes into force today in all member states. The legislation gives companies and consumers mo...

Berry Zwets September 12, 2025

Expert Talks

4 steps to create a future-proof data infrastructure

4 steps to create a future-proof data infrastructure

A future-proof IT infrastructure is often positioned as a universal s...

Secure networking: the foundation for the AI era

Secure networking: the foundation for the AI era

As organizations get ready to roll out AI to change their business pr...

Why AI adoption requires a dedicated approach to cyber governance

AI tools are spreading through the enterprise ecosystem at an astonis...

Professional print materials for European tech events, why booth design still makes the difference

When you participate in a major tech event, you naturally want to sta...

Tech calendar

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

De IT Afdeling van de toekomst

March 31, 2026 Naaldwijk

GITEX ASIA 2026

April 8, 2026 Singapore

Southeast Asia AI Application Summit 2026

April 23, 2026 Bangkok

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement