Check your Google account settings
open allIf you use Chrome with a Google account, privacy and safety of your data in the browser depends directly on your account's security. Therefore, check your Google account settings in addition to your Chrome settings.
How to protect yourself from malicious websites and programs
open allWhat for: To keep your protection up to date.
Chrome developers consistently add new features and fix vulnerabilities, so it is important to use the latest version of the app. Make sure you have automatic update installation enabled on your smartphone:
- Open Play Store;
- Tap your avatar in the right part of the search field;
- Go to the Settings section and select Network preferences;
- Tap Auto-update apps;
- Choose if updates should be downloaded: while connected to any network or over Wi-Fi only;
- Tap Done.
Downside: All apps, not just Chrome, will be updated automatically. This may use a lot of traffic.
What for: To leave no tracks.
Google Chrome usually saves information about the pages you visit, the passwords you enter, the permissions you give, cookie, and some other website data. If you want to hide these — for example, when using someone else's phone — browse in incognito mode. While in this mode, Google Chrome will delete all passwords, browser history, and site data immediately after you close all program windows launched in incognito mode.
To turn on incognito mode on your Android device:
- Tap the three dots in the upper right corner of the screen;
- Select New Incognito tab.
How to protect your data
open allWhat for: To protect against leaks.
When you sign in to a website, Google Chrome prompts you to save your password. This allows it to fill in your login credentials for you next time. Chrome can check whether your passwords have been exposed in a data leak. How to start a scan:
- Tap the three dots in the upper right corner of the screen;
- Select Settings;
- Go to the Passwords section;
- Tap Check passwords.
If your passwords have been leaked, you'll see a message about it. If so, change the vulnerable passwords as soon as possible.