We’ve all heard about
“cookies”, but not everyone knows what they are. Sometimes, they’re called “HTTP cookies”,
“browser cookies” or “web cookies”.
Sometimes, they’re just “cookies”.
It doesn’t matter what name you call them; cookies are what websites use
to store and identify actions performed by people on their browsers. Each time a person uses their computer to
read a news article, log into a website, shop online, or even if that person
simply clicks the “Like” button on Facebook, that person’s information is
stored on those sites for an indefinite amount of time. This is why, when you log into your favorite
sites, you no longer have to input your personal information. The visits are “remembered” by the browser,
so your “username”, and even your password, automatically pop up. You can delete these cookies, but sometimes,
even deleting them won’t ensure your safety on the internet.
Websites using
“tracking cookies” and “third-party tracking cookies” caused significant
privacy concerns, prompting lawmakers in the US and Europe to take a stand
against the use of cookies. Cookies do
not carry “viruses”, nor do they install malicious software (or malware) on
computers, but they DO store the browsing and purchasing histories of internet
users for many, many years. According to
privacy advocates, this is not acceptable.
There are many
different kinds of cookies. They all
perform particular tasks, but they all center on storing sensitive
information. Examples of cookies are as
follows:
- Session Cookies stay on the computer only as long as the user is on a certain website. Normally, the browser deletes these cookies as soon as the session is finished.
- Third-Party Cookies are used by advertisers to gather information in order to build a detailed profile on a specific user. For example: if a user signs into a site that was targeted by an advertisement, then signs into another site which has the same targeted advertisement, both visits are tracked by the advertiser.
- Authentication Cookies are said to be the most important kind of cookie. These cookies are used by servers to identify if a user is logged on. These cookies can also identify which specific account the computer is logged onto. With this device, the website recognizes if it is safe to transmit personal information. If the user cannot be identified by the cookie, a “You Must Log In” message is shown. If a website or browser does not have a high security level, it’s possible that the user’s information could be captured by hackers. In other words, authentication cookies are only as safe as the user’s browser and website being logged into.
- Persistent Cookies are also known as “tracking cookies” because they stay on the computer and are re-sent to the server each time a user visits the particular site. They record significant information, including how the user first found that particular website.
- HTTP-Only Cookies are only used when the user is sending HTTP or HTTPS data. APIs (Application Programming Interface), including JavaScript are not allowed access to this data. The possibility of data theft isn’t fully removed, but the chances of this happening are lessened.
- Secure Cookies are only used when a person visits a site through HTTPS (Hypertext Transfer Protocol Secure). The user is guaranteed that their information is always encrypted when it’s being transmitted. Electronic “snooping” is just about impossible with these secure cookies.
- Zombie Cookies can recreate themselves even after the user deletes them. They store their content in other areas, then “resurrect” from these storage areas as soon as the deletion is realized.
There is a variety of
uses for cookies. For example, they can
be used to manage sessions for on-line shopping. Whenever you shop on-line, you may have
noticed the “Shopping Cart”. You select
an item to purchase and move it to your digital shopping cart. You then have the option to either continue
shopping, or proceed on to the checkout area.
If you continue shopping, each item you purchase is stored in your
shopping cart and retrieved when you are ready to complete your transaction.
Cookies also enable
the site to “guesstimate” what other items you may be interested in purchasing
just by “looking” at the items in your shopping cart. Once an item goes into your shopping cart, on
a sidebar, there is usually an area that says, “People who bought this item
also bought….” along with a list of related items. Even if you don’t choose one of those items
on this on-line shopping trip, they will be remembered for the next time you
visit that particular site.
When you visit the
same websites repeatedly, cookies are used to store your personal information,
such as username and password, on your computer. Once you register for that site, any
subsequent visits you make from your computer will not need you to
“re-register”. All you need to do is go
to the site, and your log-in information is already there. The only thing left for you to do is click
“Log On”. You will notice that if you
are using someone else’s computer, you will need to enter your username and
password. That is because the cookies
are only stored on your computer and browser.
Cookies are also the
tools that make it possible for you to personalize certain web pages by adding
your own “theme”. For instance, Google
allows more than one Gmail account on a computer. Each person can choose a different theme,
making the Gmail account their own. When
the account is selected, it pops up with the particular color scheme or
wallpaper assigned by the cookies.
Tracking cookies are
used to keep track of all of a user’s on-line actions. These cookies keep track of all the websites
a user has ever visited, how many times the user visited that site and how long
each session on that site lasted. Data
mining companies are able to target specific advertisements to specific
individuals by using this information.
This is why most privacy concerns center around these tracking cookies.
There are so many
free public hotspots around, but how “free” are these Wi-Fi connections? Whenever you use one of these connections,
your information is not encrypted. This
gives cyber-crooks the opportunity to intercept your data stream and make your
information his. Once he has your
information, he can pose as you on any website and perform actions including
transferring money from your bank accounts.
Cookies can be a huge
convenience, but they can also be harmful, as demonstrated in the situation
above. If a particular user’s
information is correctly entered on a site, it’s impossible for that site to
know if it is truly that person, or an identity thief.
So, how is it possible to be fully protected?
The best way to
protect yourself and your personal information is by using a proxy server. When a proxy server is utilized, your IP
address is hidden from everyone. This is
important, but the most valuable way a proxy server protects you is by
encrypting all of your information. Each
time you sign on to your computer, whether it’s at home or in a public hotspot,
by encrypting your information, it would be worthless to a cyber-crook. No one can use information that is virtually
“unreadable”, therefore, you will be safe from becoming a victim of identity
theft.
No comments:
Post a Comment