Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Privacy & Compliance » Google users are automatically logged in to Chrome
2 min Privacy & Compliance

Google users are automatically logged in to Chrome

Jim PeddSeptember 24, 2018 1:39 pmSeptember 8, 2019
Google users are automatically logged in to Chrome

Google is strongly criticized for a feature that has recently been enabled on the web browser Chrome. Users who have Chrome 69 or newer and log in to a Google service are also automatically logged in to the web browser. It’s an update that Google hasn’t released and one that has serious consequences for user privacy.

This is the Google Sync feature, a system that allows users to log into Chrome with their Google Account. If desired, they can upload local browser data (including history, passwords, favorites and other data) to, and synchronize with, the search giant’s servers.

Automatically logged in

Sync has been present in Chrome for several years, but until now the system worked independently of Google accounts. This made it possible for users to be logged in to a Google Account, without uploading Chrome browser data to the Google servers. The browse data can be linked to the user account.

But the new Chrome has an automatic system for logging in users. In this way, Google can map the browsing behaviour of a user, linked to a specific browser and specific device. With emphasis on the can, because according to Google employees, after automatically logging in, no local data is synchronized with the company’s servers. This still requires explicit permission.

Precisely for privacy

Although the mechanism may have serious implications for the privacy of users, the technicians on Twitter claim that the system was introduced precisely in order to improve privacy. This has to do with shared computers and browsers. If one or more users use the same browser, it can happen that incorrect information is linked.

Nevertheless, criticism persists. Professor Matthew Green of John Hopkins University, for example, writes that Google has also completely redesigned the Sync account interface. As a result, it would no longer be clear to users whether they are logged in and which button they should use to start synchronizing. According to him, it is a dark pattern, a term that is used for interfaces that are deliberately designed to be misleading.

This news article was automatically translated from Dutch to give Techzine.eu a head start. All news articles after September 1, 2019 are written in native English and NOT translated. All our background stories are written in native English as well. For more information read our launch article.

Tags:

Chrome / Google / interface / Login / Privacy

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Chrome will receive biweekly updates starting in September

Google patches first Chrome zero-day of 2026

AI conversations of 8 million users leaked via browser extensions

3 out of 10 password managers aren’t secure enough, including Chrome’s

Editor picks

Microsoft Copilot Cowork takes on multi-step AI automation

Microsoft has launched Copilot Cowork within the Microsoft 365 Fronti...

Securing agentic AI is still about getting the basics right

As agentic AI workflows spread across enterprises, security leaders f...

Blind trust in hardware vendors is always a bad idea

Supply chain security now more important than ever

Iran lashes out on the digital front as attacks go global

Palo Alto Networks' Unit 42 has published an updated threat brief tra...

Techzine.tv

Salesforce reveals its own Agentic IT Service Platform

Salesforce reveals its own Agentic IT Service Platform

Workday Rising EMEA: platform transformation: Pipedream, AI agents and sovereignty

Workday Rising EMEA: platform transformation: Pipedream, AI agents and sovereignty

EU digital sovereignty and policy: Cisco's perspective

EU digital sovereignty and policy: Cisco's perspective

How Falco catches threats that static analysis misses

How Falco catches threats that static analysis misses

Read more on Privacy & Compliance

OutSystems focuses on control and consistency in AI projects

OutSystems focuses on control and consistency in AI projects

OutSystems is introducing a new approach to AI development designed to address a growing problem within organ...

Mels Dees 12 hours ago
EU Data Act in force as of today: companies free from cloud lock-in
Top story

EU Data Act in force as of today: companies free from cloud lock-in

The EU Data Act comes into force today in all member states. The legislation gives companies and consumers mo...

Berry Zwets September 12, 2025
Metadata, cloud sovereignty’s weak spot
Top story

Metadata, cloud sovereignty’s weak spot

US authorities could access the metadata of public cloud users, even if they use the sovereign offering of an...

Erik van Klinken February 20, 2026
Dutch cloud providers join forces to create a sovereign alternative

Dutch cloud providers join forces to create a sovereign alternative

Seven Dutch cloud providers are actively seeking to collaborate in order to counterbalance the dominant posit...

Mels Dees 1 day ago

Expert Talks

Infosecurity Europe announces first wave of keynote speakers for 2026

Infosecurity Europe announces first wave of keynote speakers for 2026

Infosecurity Europe, the most influential information security event...

Better connected business technology is essential for prosperity in the Netherlands 

Better connected business technology is essential for prosperity in the Netherlands 

According to PwC, the Netherlands ranks fourth in Europe for producin...

The zero-drift frontier: modern edge demands on Kubernetes

Edge computing has come to the fore. Too often, edge computing gets c...

When is an SBOM not an SBOM? CISA’s Minimum Elements

In August 2025, CISA (the US Cybersecurity Infrastructure & Infra...

Tech calendar

GITEX ASIA 2026

April 8, 2026 Singapore

Southeast Asia AI Application Summit 2026

April 23, 2026 Bangkok

SAS Innovate 2026

April 27, 2026 Grapevine

Team '26

May 5, 2026 Anaheim

GISEC GLOBAL 2026

May 5, 2026 DUBAI

Red Hat Summit

May 11, 2026 Atlanta

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement