Sunday, June 10, 2012

Cookies? What are They? Can I Avoid Them?

 We’ve all heard about “cookies”, but not everyone knows what they are.  Sometimes, they’re called “HTTP cookies”, “browser cookies” or “web cookies”.  Sometimes, they’re just “cookies”.  It doesn’t matter what name you call them; cookies are what websites use to store and identify actions performed by people on their browsers.  Each time a person uses their computer to read a news article, log into a website, shop online, or even if that person simply clicks the “Like” button on Facebook, that person’s information is stored on those sites for an indefinite amount of time.  This is why, when you log into your favorite sites, you no longer have to input your personal information.  The visits are “remembered” by the browser, so your “username”, and even your password, automatically pop up.  You can delete these cookies, but sometimes, even deleting them won’t ensure your safety on the internet.

Websites using “tracking cookies” and “third-party tracking cookies” caused significant privacy concerns, prompting lawmakers in the US and Europe to take a stand against the use of cookies.  Cookies do not carry “viruses”, nor do they install malicious software (or malware) on computers, but they DO store the browsing and purchasing histories of internet users for many, many years.  According to privacy advocates, this is not acceptable.

There are many different kinds of cookies.  They all perform particular tasks, but they all center on storing sensitive information.  Examples of cookies are as follows:

  • Session Cookies stay on the computer only as long as the user is on a certain website.  Normally, the browser deletes these cookies as soon as the session is finished.
  • Third-Party Cookies are used by advertisers to gather information in order to build a detailed profile on a specific user.  For example:  if a user signs into a site that was targeted by an advertisement, then signs into another site which has the same targeted advertisement, both visits are tracked by the advertiser. 
  • Authentication Cookies are said to be the most important kind of cookie.  These cookies are used by servers to identify if a user is logged on.  These cookies can also identify which specific account the computer is logged onto.  With this device, the website recognizes if it is safe to transmit personal information.  If the user cannot be identified by the cookie, a “You Must Log In” message is shown.  If a website or browser does not have a high security level, it’s possible that the user’s information could be captured by hackers.  In other words, authentication cookies are only as safe as the user’s browser and website being logged into. 
  • Persistent Cookies are also known as “tracking cookies” because they stay on the computer and are re-sent to the server each time a user visits the particular site.  They record significant information, including how the user first found that particular website. 
  • HTTP-Only Cookies are only used when the user is sending HTTP or HTTPS data.  APIs (Application Programming Interface), including JavaScript are not allowed access to this data.  The possibility of data theft isn’t fully removed, but the chances of this happening are lessened.
  • Secure Cookies are only used when a person visits a site through HTTPS (Hypertext Transfer Protocol Secure).  The user is guaranteed that their information is always encrypted when it’s being transmitted.  Electronic “snooping” is just about impossible with these secure cookies.
  • Zombie Cookies can recreate themselves even after the user deletes them.  They store their content in other areas, then “resurrect” from these storage areas as soon as the deletion is realized.

There is a variety of uses for cookies.  For example, they can be used to manage sessions for on-line shopping.  Whenever you shop on-line, you may have noticed the “Shopping Cart”.  You select an item to purchase and move it to your digital shopping cart.  You then have the option to either continue shopping, or proceed on to the checkout area.  If you continue shopping, each item you purchase is stored in your shopping cart and retrieved when you are ready to complete your transaction.

Cookies also enable the site to “guesstimate” what other items you may be interested in purchasing just by “looking” at the items in your shopping cart.  Once an item goes into your shopping cart, on a sidebar, there is usually an area that says, “People who bought this item also bought….” along with a list of related items.  Even if you don’t choose one of those items on this on-line shopping trip, they will be remembered for the next time you visit that particular site.

When you visit the same websites repeatedly, cookies are used to store your personal information, such as username and password, on your computer.  Once you register for that site, any subsequent visits you make from your computer will not need you to “re-register”.  All you need to do is go to the site, and your log-in information is already there.  The only thing left for you to do is click “Log On”.  You will notice that if you are using someone else’s computer, you will need to enter your username and password.  That is because the cookies are only stored on your computer and browser.  

Cookies are also the tools that make it possible for you to personalize certain web pages by adding your own “theme”.  For instance, Google allows more than one Gmail account on a computer.  Each person can choose a different theme, making the Gmail account their own.  When the account is selected, it pops up with the particular color scheme or wallpaper assigned by the cookies.

Tracking cookies are used to keep track of all of a user’s on-line actions.  These cookies keep track of all the websites a user has ever visited, how many times the user visited that site and how long each session on that site lasted.  Data mining companies are able to target specific advertisements to specific individuals by using this information.  This is why most privacy concerns center around these tracking cookies.

There are so many free public hotspots around, but how “free” are these Wi-Fi connections?  Whenever you use one of these connections, your information is not encrypted.  This gives cyber-crooks the opportunity to intercept your data stream and make your information his.  Once he has your information, he can pose as you on any website and perform actions including transferring money from your bank accounts.

Cookies can be a huge convenience, but they can also be harmful, as demonstrated in the situation above.  If a particular user’s information is correctly entered on a site, it’s impossible for that site to know if it is truly that person, or an identity thief.   

So, how is it possible to be fully protected?  

The best way to protect yourself and your personal information is by using a proxy server.  When a proxy server is utilized, your IP address is hidden from everyone.  This is important, but the most valuable way a proxy server protects you is by encrypting all of your information.  Each time you sign on to your computer, whether it’s at home or in a public hotspot, by encrypting your information, it would be worthless to a cyber-crook.  No one can use information that is virtually “unreadable”, therefore, you will be safe from becoming a victim of identity theft.

You can learn more about proxy servers and how you can be protected on line by visiting www.privateproxysoftware.com.  The site will explain fully, and in a way that is understandable to all, how using a proxy server to change your IP address will keep you safe and allow you to use the internet without worry. 

No comments: