I had an alarming realization a moment ago. I, like many of you, am using Google's DNS servers (18.104.22.168 and 22.214.171.124). This actually means Google DOES know every website I visit, even if I type it directly into my browser bar. Google could log all requests made to their DNS servers, and use that data to know exactly who controls websites/PBNs, etc. For example, if G suspected www.pbnsite.com was a PBN site, they need only to trawl their logs to see who requested pbnsite.com/wp-admin, and then trawl their logs again to see what other /wp-admin requests that user made...! This theory, when expanded, also can mean that with sufficient data retention and analysis, they could in fact easily discover which individual users made which 2.0 properties, forums posts, tweets, etc. This theory relies on my assumption that the entire URL is transmitted to the DNS server. It seems logical that it would, otherwise the browser would have to strip the request to the root domain level, query the DNS for the IP address of the web server, then re-send the entire page-level request to the web server. I don't imagine that's very efficient, so I presume that's not how it works. so... changing DNS settings now. I suggest you do the same. I also presume some people will say "the connection is HTTPS secure, so they can't see what you're requesting"... but, I would make the point that in order to establish the secure connection, the URL first needs to resolve to a destination, and it does so via the DNS server.