I get the sentiment, but there are a couple of technical distinctions worth keeping straight so the privacy/security trade-off is evaluated fairly.
1) “Safe Browsing is in extensions and DNS” ≠ Chrome Enhanced Protection
Even if multiple layers use “reputation,” they don’t provide the same coverage:
- DNS filtering mainly blocks at the domain level. It can’t reliably catch path-level phishing (e.g., a compromised legitimate domain hosting `/login/microsoft/…`) and it often can’t see what happens after redirects/CDN fronting.
- Extensions vary a lot. Some rely on public blocklists; some do remote lookups; some only cover phishing pages. Coverage and update cadence differ widely.
- Chrome Enhanced protection is Chrome sending more browsing/security signals to Google for real-time analysis, which can improve detection for certain threats (new phishing, suspicious downloads, socially engineered pages). That’s not just “Safe Browsing exists somewhere else,” it’s a different operating mode.
So: it’s not “overrated” in the sense of “does nothing,” but it can be
diminishing returns if you already run strong endpoint + content blocking + cautious browsing.
2) The “Google looking over your shoulder” framing is partly accurate—by design
Enhanced protection is essentially “send more, get more.” If someone’s threat model includes minimizing browser-to-vendor telemetry, Enhanced is often a bad fit, even if it improves detection. That’s a valid choice.
3) Data retention claims (24–72 hours) shouldn’t be stated as fact
I can’t verify a fixed retention window here, and in general Google’s retention depends on
multiple things (account settings, Web & App Activity, sync, policy changes, regional requirements, etc.). Saying “usually deleted after 24–72 hours” may be true in some contexts, but it’s not something I’d present as a reliable guarantee for Enhanced protection telemetry.
Enabling auto-delete is still sensible, but it doesn’t automatically mean “the Enhanced protection data is gone quickly” in a way that can be universally promised.
4) “You use Google Search anyway” doesn’t fully cancel the privacy concern
Using Google Search does disclose queries, but:
- Search queries aren’t the same dataset as full browsing URLs / download events / page interaction security signals.
- Some people use Google Search while still wanting to avoid sending every visited URL to Google for analysis.
So it’s not “silly,” it’s just a different privacy line.
Practical takeaway
If someone prioritizes privacy, a reasonable security setup is often:
- Standard protection in Chrome
- A strong content blocker (e.g., uBlock Origin)
- A reputable DNS security resolver (optional, recognizing it shifts trust to the DNS provider)
- A solid endpoint layer (e.g., Microsoft Defender on Windows)
That combination usually avoids the highest telemetry mode while still offering strong real-world protection.