I feel mixed about browser cookies in terms of the tradeoff between network accessing speeds vs security methods, layers, levels of authentication, login complexity vs password identity recovery speeds, network latency in high transaction rate networks, and other network functional attributes.
Consider browser cookies!
According to wikipedia a HTTP or Browser Cookie consists of "a small piece of data sent from a website into the user's web browser while the user engages in accessing the internet and connecting to websites that store cookies on the users computer.
Product & Service companies want you user data so they can market things to the correct demographic. If the advertising company "Google" wants to understand what ad's to show each different person, then Google has to have a lot of detailed information about that person : and in so collecting data onto servers that intelligences agencies from many countries regularly hack to clone all the data into intelligence database software for high level surveillance of the most complex nuanced & sophisticated technology, especially the use of artificial intelligence with massive computational networking throughput capacity * computational power + massive big data storage archives of unimaginably large capacity relative to the computational memory sized measured by the gigabyte.
Given their ability to connect a given humans mind to products & services that they might actually be interested in. How could the computer or browser know you well enough to give you custom tailored search results ? History, your computer history feeds into the predictive statistical analytic performed with the use of browser cookies and other deeply embedded components of operating systems and hardware designs that are far more insidious in nature with respect to their privacy violation at a deep level signed away to the devil in details every time you ever agree to a EULA by "reading" and "agreeing" to the terms of and conditions of use or end user licensing agreement
Google issued the following notice
"European Union laws require you to give European Union visitors information about cookies used and data collected on your blog. In many cases, these laws also require you to obtain consent.
As a courtesy, we have added a notice on your blog to explain Google's use of certain Blogger and Google cookies, including use of Google Analytics and AdSense cookies, and other data collected by Google.
You are responsible for confirming this notice actually works for your blog, and that it displays. If you employ other cookies, for example by adding third party features, this notice may not work for you. If you include functionality from other providers there may be extra information collected from your users.
According to Wikipedia
Cookies designed as a mechanism for websites to remember stateful information
(items added in the shopping cart in an online store) or to record the user's browsing activity (including clicking particular buttons, logging in, or recording which pages were visited in the past).
Cookies can also be used to remember arbitrary pieces of information that the user previously entered into form fields such as names, addresses, passwords, and credit card numbers.
Cookies Support a Diverse Productive Web that connects more people to the right kinds of products and services available to them. Better browsers will become the most intelligent software you interact with aside from voice digital assistances like Microsoft Cortana, Apple Siri, Hey Google, & Amazon Alexa
Cookies perform essential functions in the modern world wide web. An authentication cookies for example, a method on web servers to know if user logged in or not, & which account they are logging into.
Authenticating Transactions E-Commerce Security Cookies
Without such a mechanism, the site would not know whether to send a page containing sensitive information, or require the user to authenticate themselves by logging in. The security of an authentication cookie generally depends on the security of the issuing website and the user's web browser, and on whether the cookie data is encrypted.
Cookies perform essential functions in the modern world wide web. An authentication cookies for example, a method on web servers to know if user logged in or not, & which account they are logging into.
Authenticating Transactions E-Commerce Security Cookies
Without such a mechanism, the site would not know whether to send a page containing sensitive information, or require the user to authenticate themselves by logging in. The security of an authentication cookie generally depends on the security of the issuing website and the user's web browser, and on whether the cookie data is encrypted.
Hacker Cookie Problem
Security vulnerabilities may allow a cookie's data to be read by a hacker, used to gain access to user data, or used to gain access (with the user's credentials) to the website to which the cookie belongs (see cross-site scripting and cross-site request forgery for examples).
Privacy Violation Tracking Cookies & European Law
The tracking cookies, and especially third-party tracking cookies, are commonly used as ways to compile long-term records of individuals' browsing histories – a potential privacy concern that prompted European and U.S. lawmakers to take action in 2011.
Privacy Violation Tracking Cookies & European Law
The tracking cookies, and especially third-party tracking cookies, are commonly used as ways to compile long-term records of individuals' browsing histories – a potential privacy concern that prompted European and U.S. lawmakers to take action in 2011.
European law requires that all websites targeting European Union member states gain "informed consent" from users before storing non-essential cookies on their device.
Using Privacy Browser Modes
Google Project Zero researcher Jann Horn describes ways cookies can be read by intermediaries, like Wi-Fi hostspot providers. He recommends to use the browser in incognito mode in such circumstances.
Google Project Zero researcher Jann Horn describes ways cookies can be read by intermediaries, like Wi-Fi hostspot providers. He recommends to use the browser in incognito mode in such circumstances.
No comments:
Post a Comment