Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

9/27/2018
08:05 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Google to Let Users Disable Automatic Login to Chrome

The decision comes days after security researcher had blasted company for jeopardizing user privacy with browser update.

This story was updated on September 28 to clarify that with Chrome 70 Google will, by default, still automatically sign in users to Chrome when they sign in to a Google account, but users will get the option to disable the link.

Google has reversed course on a controversial recent browser update it introduced with little notice that automatically logs users in to Chrome whenever they sign in to any Google web account.

Starting with the next release of Chrome — Version 70 — Google is adding a control that gives users the choice of linking web-based sign-in with browser-based sign-in. Instead of automatically logging users in to Chrome when they sign in to a Gmail or other Google account, Chrome will let users decide if they want to be automatically signed in to the browser or not.

"For users that disable this feature, signing into a Google website will not sign them into Chrome," Chrome product manager Zach Koch announced in a blog post on September 26.

Importantly, though, the default setting in Chrome 70 will continue to be for users to get automatically signed in to Chrome when they log in to a Google account. What Google is making available with the next Chrome release is an option that lets users disable that setting, a Google spokeswoman clarified to Dark Reading Thursday. "Once the feature is disabled, it will stay disabled," the spokeswoman said.

The decision essentially restores the status that existed before Chrome 69, where users had the choice of keeping their sign-in to Google accounts completely separate from their sign-in for Chrome. A Gmail user concerned about Google collecting their browsing data, for instance, could use Chrome in basic browser mode without being signed in to it.

Google's change of heart comes days after security researcher Matthew Green from Johns Hopkins University had blasted the update in Chrome 69 as being sneaky and posing a substantial threat to user privacy. In a searing and widely quoted blog post, Green described the update as being unnecessary and deliberately putting users at risk of mistakenly allowing Google to collect their browsing data.

Google, meanwhile, described the update as harmless and providing a way to simplify the way Chrome handles logins. The company has maintained that when automatically signing users in to Chrome, it would only collect browsing data if a user explicitly consents to that collection.

Currently with Chrome 69, when a user signs into a Google account, his or her account picture or icon will appear in the Chrome user interface (UI). This enables the user to easily verify their sign-in status, according to Google. Signing out of Chrome will automatically log the user out of all their Google accounts.

In the Google blog post, Koch claimed that Google had introduced that update in response to feedback from users on shared devices who were confused about their sign-in state. "We think these UI changes help prevent users from inadvertently performing searches or navigating to websites that could be saved to a different user's synced account," he wrote.

Koch's post made no reference to the concerns raised by Green and others over the recent update. He merely noted that Google had heard "feedback" and was making changes to Chrome 70 to give users back the control they had over Chrome logins.

Google is also updating its Chrome UIs so users can more easily understand if their browsing data is being synced — or collected. "We want to be clearer about your sign-in state and whether or not you're syncing data to your Google Account," Koch wrote.

Related Content:

 

 

Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
colad1930
50%
50%
colad1930,
User Rank: Strategist
9/28/2018 | 9:53:10 PM
Re: Yet another reason to use passwords on your device.
Good idea but Chrome is best for me. 

 

With this update, I think Google will fix the new unwanted things.

 

Let's see what comes out of the update next month.
ANON1251724318124
50%
50%
ANON1251724318124,
User Rank: Apprentice
9/28/2018 | 5:06:53 PM
Yet another reason to use passwords on your device.
If you use passwords to access your windows account, cell phone table etc, then the only way you will lose control of your automatic google chrome login is to lose your device.  

 

Always use some form of authenication for every computer device used to transmit or update personal information.   Stop using chrome browswer if you like.   There aare other browsers.

 
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
A Lawyer's Guide to Cyber Insurance: 4 Basic Tips
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  7/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13951
PUBLISHED: 2019-07-18
The set_ipv4() function in zscan_rfc1035.rl in gdnsd 3.2.0 has a stack-based buffer overflow via a long and malformed IPv4 address in zone data.
CVE-2019-13952
PUBLISHED: 2019-07-18
The set_ipv6() function in zscan_rfc1035.rl in gdnsd 3.2.0 has a stack-based buffer overflow via a long and malformed IPv6 address in zone data.
CVE-2019-10100
PUBLISHED: 2019-07-18
The Sleuth Kit 4.6.0 and earlier is affected by: Integer Overflow. The impact is: Opening crafted disk image triggers crash in tsk/fs/hfs_dent.c:237. The component is: Overflow in fls tool used on HFS image. Bug is in tsk/fs/hfs.c file in function hfs_cat_traverse() in lines: 952, 1062. The attack v...
CVE-2019-10102
PUBLISHED: 2019-07-18
SaltStack Salt 2018.3, 2019.2 is affected by: SQL Injection. The impact is: An attacker could escalate privileges on MySQL server deployed by cloud provider. It leads to RCE. The component is: The mysql.user_chpass function from the MySQL module for Salt (https://github.com/saltstack/salt/blob/devel...
CVE-2019-10102
PUBLISHED: 2019-07-18
Gitea 1.7.0 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Attacker is able to have victim execute arbitrary JS in browser. The component is: go-get URL generation - PR to fix: https://github.com/go-gitea/gitea/pull/5905. The attack vector is: victim must open a specifically ...