DoubleClick Workaround: IDcide 241
No cookies with offsite GIFs: that's the privacy solution implemented by
IDcide
(take a moment to register the pun, OK, there ya go). Here's
technical background on offsite cookies;
here's the
CNNstory;
here's the software
FAQ
(it's only available for Windows/MSIE). If you're not sure why offsite cookies matter,
you must read this.
And, not to rain on IDcide's revenue model -- their product does other stuff too -- but why isn't offsite cookie rejection built into all browsers? Anyone from Mozilla want to talk about this?
Similar program (Score:1)
Anyone notice... (Score:1)
Also I like the quote from their president...
"We found out that this is a big issue when we started working on another personalization tool that infringed on privacy," says co-founder Ron Perry.
Am I the only one who has doubts about installing this thing? Closed source, patent-pending technology from a group that was involved in infringing-now-protecting our privacy(I'll be honest I didn't see any mention of the license on their website, but I didn't see any source offered either). Sure there are ways of finding out if this thing works, and I'm sure I'll hear about it if they don't via a Slashdot headline, but screw being an early adopter for this one...
Re:That's not what it says, nor what it does... (Score:1)
Sometimes you might want to set more than one cookie. The cookie spec doesn't allow for more than one per set of headers.
But the whole off-site/originating server thing is nonsense anyway; a simple workaround for sites would be to have some proxy happening on their server to a Doubleshit or whatever server, simply passing info between the two. Your browser would then accept the cookie but the data is still getting to and from Doubleclick.
Cookies suck anyway - find a web site with a real designer who can make your session last for the whole time you're at the site without using cookies. Cookies were only for per-session permanence anyway.
Ciao
Re:Give us built-in cookie-management tools! (Score:1)
--
On off-site/non-image cookies (Was: That's not...) (Score:1)
Otto wrote:
Actually, I co-maintain a small site [xoom.com] which uses cookies in off-site non-html files. This is used to customize the style sheet used in some otherwise static HTML documents placed on a separate server. The style sheet doesn't set any cookies, of course, but it does rely on the browser to send the cookies as part of the HTTP request. I can think of similar uses of cookies to choose between different image files based on the cookies set in the browser.
Ignoring "SetCookie" headers in off-site/image file responses, as you suggested, is probably okay, although someone could probably think of a non-advertising related case where that functionality is useful. Just make sure not to kill the (IMHO very) useful functionality described in the previous paragraph.
Patents (Score:1)
Re:No, not really... (Score:1)
The Preferences dialog box in Netscape 4.x reads "Only accept cookies originating from the same server as the page being viewed." So, let's say that the page's URL is http://foo.com/qux.html. qux.html has an IMG tag that refers to http://bar.com/cgi-bin/adcrap?blahblah, causing Netscape to open a new HTTP connection to bar.com. bar.com may send a cookie to Netscape, but if you chose the option mentioned above (not the default, BTW), this cookie won't be accepted, because the page came from foo.com, not bar.com.
This is only theory. I hope this is how Nutscrape actually works. If it doesn't, screw Nutscrape.
Mozilla and offsite cookie refusal? (Score:1)
Anyone else got M14 installed and can check?
Re:invalid word play! (Score:1)
For example, stating "I hate school because it sucks" is begging the question.
Kythe
(Remove "x"'s from
Re:Better solution - Junkbuster (Score:1)
---
Re:Give us built-in cookie-management tools! (Score:1)
That means the only thing they are missing is you writing the code. Go to it!
Mozilla does this (Score:1)
What we really need is a list of domains and subnets to which we may silently refuse cookies.
Mozilla does this. In the Preferences, under Advanced->Cookies I choose "Accept only cookies that get sent back to the original server" AND "Warn me before accepting cookies." This will enable the cookie manager. Now when ANYONE offers you a cookie, not only can you accept or reject the cookie, you can tell Mozilla to remember your decision.
You can then go to Tasks->Personal Managers->Cookie Manager to manager your cookies. From there you can view and delete cookies under the "Stored Cookies" tab. Under the "Website Settings" tab you can see which sites can or can't set cookies. By deleting entries from here you will be questioned about it the next time the site tries to set a cookie.
For example, The only cookie I have stored is the user cookie from /., also /. is the only site allowed to set cookies. For the first several sessions the user has to make a bunch of choices on who can and can't set cookies. But since these are remembered between sessions, eventually you don't have to bother with cookie choices to much.
I think this is a great method of managing cookies, I don't see need for anything else, nor can I think of anything else that could be added.
JungleBoyWho decides? (Score:1)
As another poster noticed, this program modifies your cookies with something about "qbots.com", which turns out to be a parent company.
I'm sure a little packet sniffing could turn up something...
Re:Doesn't work under Linux :-( (Score:1)
Re:Mozilla From the mouth of a developer. (Score:1)
It is not useful (at least until it is possible to fine tune it), because many of the web sites (like /.) have a separate server for images, highly tuned for a static data (khttpd?). So with these sites it would be the same like disabling loading the images at all.
I think there should be a more fine-grained solution. And why implement any in browser, when there is a separate one (JunkBuster [waldherr.org], available even in RPM format).
--
Re:Funny! (Score:1)
Re:Funny! (Score:1)
As for my logic, I know... It can get rather twisted logic sometimes.
But a LOT of websites exist only because of monies they get from DoubleClick. You may not like it, but it's the simple truth.
Re:Funny! (Score:1)
Anyways, did you hear that DoubleClicks CEO stepped forward publicly and put his foot in his mouth by saying that he had grossly miscalculated the effects that his company's actions would have on people's fears about losing their privacy and vowed to discontinue all of their data merging/matching programs?
Yes, DoubleClicks site isn't the best place to find commentary about what they were doing wrong, but its' a great place to look to find out 1- their side of the story, and 2 - what they're doing about it.
Re:iCab/Mac's Cookies features (Score:1)
I'd never thought of that. I'll try it :)
Re:iCab/Mac's Cookies features (Score:1)
BTW, can sites read all cookies... or are they somehow limited by the browser to the ones they themselves set?
Re:iCab/Mac's Cookies features (Score:1)
BTW, have you ever, ever ever seen iCab smile?
Re:Am I missing something? (Score:1)
Re:Rejecting offsite cookies (Score:1)
I use Internet Junkbuster witch is OSS. IJB home [junkbuster.com] I can specify domains that are banned as well as regular expressions to ban anything from a site.
I do not see anything from doubleclick, blockstackers etc. That keeps my privacy as well as speed up my page loading...
Re:word play (Score:1)
Re:Not in M14 (Score:1)
M14 is ancient history. They are old pretty much already the next day after they get released. That's why you should always get a nightly build. Especially if it's a long time since the last milestone.
In my Mozilla build 2000031715 the cookie setting is: "Accept only cookies that get sent back to the originating server" while M14 had that old setting you mentioned.
/dev/null (Score:1)
Cookies?
Sure, I'll take you're cookies. I just put them right over here...
HTTP referer vs. cookies (Score:1)
First of all, has anyone gathered a list of site using doubleclick? This should be easy enough to get, given the fact that said sites will reference doubleclick in some IMG tag. Soon we could have a complete list of all their business relations, and potentially use that data for something, maybe. Anyway, I figure it just might be interesting to turn the tables on them, and since it would be a new compilation of information, the copyright ownership would not be theirs.
Now, if the browsers didn't pass cross-domain or cross-host HTTP referer information on requests that also had a cookie, we could could still get the benefits of cookies within a site, but the request for the ad image would have no referer data. What would DoubleClick do with no referer info? Refuse to give is the ad image? :-)
Since I just happen to be setting up a squid proxy this week, and I always compile primary services from the latest source code, I figure I'll take a peek under the hood and see how easy it would be to make it modify the request so that if the domain of the cookie and the domain of the referer do not match, discard one or the other, or both, of them before sending on the request.
IDCide may be the next Amazon, so I'll pass: (Score:1)
So IDCide? No, I decided already -- skip it, and find some prior art to defeat their patent as well.
Re:Rejecting offsite cookies (Score:1)
There's a "Accept only cookies that get sent back to the originating server" option, but if the GIF comes from another server, then it's all good.
This should actually be real simple to implement. In your cookie routine, do something like: if (cookie.hostname != address_bar.hostname) return without_setting_the_damn_cookie..
Or something like that...
---
Junkbuster (again) (Score:1)
Re:From passive resistance to Active Disruption (Score:1)
Re:Cookies were a good idea but.. (Score:1)
sig should say "Not all those who wander are lost" instead of "Not all those who wonder are lost".
Disable them without causing problems.... (Score:1)
I have stuck my Slashdot cookie and one or two more for sites I want to autologin to and then read onlyify (sic) my
just my two euros...
tom
Junkbuster Proxy (Score:1)
Re:Doesn't work under Linux :-( (Score:1)
And this sometimes happens with Slashdot, of all places! Anyone know why? Ideas for a fix? (Junkbuster is out, only 64MB RAM here :-(
64MB is *PLENTY* of RAM for Junkbuster. I run it on my work machine, a PII-266 Linux box with only 32MB. I just checked with top, and Junkbuster is only using a little over a meg of RAM (1332K). And that overhead is more than made up for by the bandwidth, memory, and disk space that was formerly being used to load and display banner ads. I can't recommend Junkbuster highly enough.
Not good enough ! (Score:1)
Already in Netscape? (Score:1)
Better solution - proxy filter! (Score:1)
I like sleezeball [linux.kz] but the idea is generally understood and sound.
Are there any publicly available proxies that filter ads? Has anyone written a filter that specifically looks for image cookies and filters them?
What a public service this would be!
Junkbuster and cookies (Score:1)
--
Proxomitron Rocks (Score:1)
It's only for Windows (which I use) as far as I know, but the idea should be easily implementable on any platform. The real brains are the configuration file (i.e., what tags to filter).
Re:Not in M14 (Score:1)
Can you test the version of Mozilla that you are running? I would be interested to find out if they changed this "originating server" business to mean what everyone assumes it does instead of what it actually means.
Actually, now that I think about it, I am more scared than ever. Does that radio button mean that cookies are normally allowed to be sent to a non-originating server? I fail to see why anyone would ever want to allow that.
Mike
Re:My method (for IE) (Score:1)
Actually, I allow per-session cookies but not persistent ones. Most well-behaved web sites are ok with this, but I wish more people would follow a more polite cookie checking scheme:
if (!set_persistent_cookie)
if (!set_temp_cookie)
show_the_you_need_cookie_page
Mike
Easier solution (Score:1)
-jfedor
Re:Better solution - Junkbuster (Score:2)
Cookies are broken (Score:2)
Cookies are broken. They've outlived their usefulness, and are hopelessly open for abuse.
I have two suggestions:
The first suggestion would allow cookies to be used to track navigation and state through a single session at a site. The functionality is already available in a browser such as Netscape Navigator if you link your cookie file to /dev/null (Linux/Unix) or to a directory (Windows). Cookies are accepted but not permanently stored on your system. The upside is that cookie-dependant features of sites work. The downside is that state such as user ID and passwords have to be re-entered for each browser session.
PKE/CRA would work based on public/private key pairs, as with PGP. A user could generate as many or few of these key pairs, and optionally share them (both public and private) with other users, as desired. On entering a site requiring registration, the user could choose the key (the session identity) to send the site. If a private, secret identity is chosen, the session is personal. If a generally known key (say, cypherpunks) is sent, the session is authenticated, but not private. The remainder of the session is transacted over secure links (SSL), and cookie or other state-tracking could be used to register and/or log activity.
The strength of this scheme is allowing a user to specify both the degree of authentication, and identity authenticated used when browsing sites. If desired, keys could be generated and destroyed on a regular basis, reducing the utility of any tracking of keys. Control over whether to authenticate, who to authenticate to, and who to authenticate as, is left to the user.
Existing browser technology has been driven very strongly by server-side interestes -- user tracking, profiling, and e-commerce vendor desires. The interests of the user have not been represented, and are only partially filled by such patches as IDcide and Junkbuster [junkbuster.com] (I'm another satisfied JB user). We've got the source, and with it the ability to reclaim the power.
What part of "Gestalt" don't you understand?
iCab/Mac's Cookies features (Score:2)
http://www.icab.de/
What's the big deal? It's not like it's spam. (Score:2)
--
Don't Opt Out -- Make It Worthless (Score:2)
Why not just feed their database with bogus data?
Just write a perl script to change the ID number for doubleclick and all the other ad sites to some random value. Change it early and often. Soon, the data will be worth little to nothing.
Screwing with the data is the only way to be sure!
Re: Rejecting offsite cookies (Score:2)
It's good you bring this up. The language:
is misleading and wrong. That's why it was changed to "accept only cookies that get sent back to the originating server" in the latest Netscape. More techically accurate. Doesn't solve the problem.
Jamie McCarthy
FYI-- actually, you can set multiple cookies (Score:2)
Now, whether that runs into problems with HTTP header restrictions (section 4.2 of either HTTP spec), that's another question. Multiple Set-Cookie: headers *may* be collapsed into one header with comma-separated cookies, which is a problem if any cookie field has a comma in it (expires, path). But such an event is unlikely, so you're probably safe to send multiple Set-Cookie: headers.
Re:No, not really... (Score:2)
You forgot one! (Score:2)
127.0.0.1 goatse.cx
Jay (=
Junkbusters.com -- more flexible solution (Score:2)
www.ctc.123hostme.com
ads.1for1.com
www.adbucks.com
www.adclub.net
ads.admonitor.net
a8.g.akamaitech.net
ads.web.aol.com
[ many hosts and domains snipped, including *.doubleclick.com]
bannervip.webjump.com
ads.ztnet.com
# LA Times and others
*.*/RealMedia
# CNN, C|Net.. etc
*.*/adclick.html
*.*/adclick
*.*/ads
*.*/Ads
*.*/*/banners
*.*/BannerAds
*.*/banner1.gif
*.*/groupbanners.phtml
# the nation
*.thenation.com/images/aj
# slashdot.org
209.207.224.220
# salon.com
208.178.101.41
208.178.101.42
208.178.101.43
208.178.101.44
208.178.101.45
~> cat
slashdot.org
slashcode.com
www.fcmail.com
>yahoo.com
>baiting.org
# note that putting a > means no new cookies will be accepted, but old ones will be reported back (useful to be able to play yahoo games, but avoid yahoo ad tracking
Re:Doesn't work under Linux :-( (Score:2)
Re:Mozilla From the mouth of a developer. (Score:2)
The server www.news.com
wishes to set a cookie that will be sent
to any server in the domain
The name and value of the cookie are:
s_cur_1_0=0101sisi09537483561aecd3Jx4+POyJakrM2
This cookie will persist until Wed Dec 30 17:00:03 2037
Do you wish to allow the cookie to be set?
What the fuck? 2037? There is no rational reason to expect that this cookie would be useful in any way whatsoever in 2037. If more sites (any sites??) used rational expiration dates I might have more respect for cookies. As it is, I only accept them when there is a direct benefit to me personally.
Re:NFS Mount the Cookies (Score:2)
Or vice versa depending on your particular cares and concerns. :)
Mozilla lets you say whose cookies you accept (Score:2)
Re:Why stop there. Compound this with "smart house (Score:2)
Some time ago, reading one of those alternative-energy magazines, I read speculations that not only was the time coming when people could live "off-the-grid", but that it'd be quite an industry. I wasn't sure at the time, but when I think about this in the context of going off the grid being a decentralization, I can suddenly see a parallel between that idea and the Personal Computer revolution. And PCs have spawned quite an industry...
Just a thought. So, does anyone know anything about getting off the grid?
And keeping an internet connection at the same time?
Doesn't work under Linux :-( (Score:2)
For some reason, however, whenever I hit a site with a DoubleClick banner (ad.doubleclick.net is included in the kill list) the browser immediately forwards to a 404 Not Found page, served up by the webserver on my machine. I hit Back, and immediately it returns to the 404.
And this sometimes happens with Slashdot, of all places! Anyone know why? Ideas for a fix? (Junkbuster is out, only 64MB RAM here
Actually, Netscape does this... (Score:2)
So if I'm at foo.com, and foo.com/index.html has an IMG tag linking to doubleclick.net, doubleclick.net's cookie will not be sent back to doubleclick.net.
I don't recall if it will just be sent back to foo.com, or if it goes into the bit bucket...
Re:Rejecting offsite cookies (Score:2)
Re:A simple lightweight solution to dblClick (Score:2)
Web Ad Blocking Under Linux/Unix, BeOS, MacOS, and Windows [csuchico.edu]
No, not really... (Score:2)
I need to open an HTTP connection to get an image from doubleclick.net. At that time, any cookies I have for doubleclick.net are sent to them, and new cookies can be set for doubleclick.net because I have an HTTP connection to doubleclick.net. The browser doesn't care where it's chasing the IMG tag from, it just knows that on this HTTP connection, it's talking to doubleclick.net. The fact that foo.com pointed me there is irrelevant.
What we really need is a list of domains and subnets to which we may silently refuse cookies. Banning cookies on IMG requests isn't enough, as many of these sites use mini-javascript bits or other embedded crap in addition to images.
Re:Not in M14 (Score:2)
Also, if you manually edit the site list, you can enter a domain name and it will include all the sites in that domain. For example, if you want to block www1.company.com and www2.company.com, you can just enter *.company.com and it will block everything in that domain.
Unfortunately, it only works for domains with one period. You can't block *.ads.company.com.
Mike
Not in M14 (Score:2)
I tested this as follows(in M14 on win95):
On Linux I have to use netscape, so I have some cron jobs that clean out my cookies.txt file. This is far from safe, but at least they can't track me for days.
mike
Re:Better solution - Junkbuster (Score:2)
Wanted to use it for proxying the whole LAN, but I guess one machine is better then none
-- iCEBaLM
Re:Also see CookiePal for win machines (Score:2)
You make the settings once, it applies them regardless of the browser you are using.
Here's a review [zdnet.com] of version 1.0 (version 1.5 current). Its not free, but its cheap. $15 USD.
Not in fact (Score:2)
% diff cookies cookies.old
5d4
< www.msnbc.com FALSE
8a8,9
<
<
V=2&GUID=8A1A06F7A9C54784B38990B4DC73444D
<
Note the second to last cookie from msn.com, which is not in the msnbc.com domain. I have also noticed this phenomenon with doubleckick cookies (before I started blocking them). Maybe netscape intended the "only from originating domain" to work as you describe, but clearly it only checks to see if the cookie is being set for the domain to which the HTTP request is being sent, which is useless for blocking cookies attatched to images.
-rpl
Re:Funny! (Score:2)
Re:Doesn't work under Linux :-( (Score:2)
Funny! (Score:2)
Here is my hosts file:
127.0.0.1 localhost
127.0.0.1 www.doubleclick.net
127.0.0.1 ad.doubleclick.com
127.0.0.1 ad.doubleclick.net
127.0.0.1 ad.uk.doubleclick.net
127.0.0.1 ad.uk.doubleclick.com
127.0.0.1 ad.preferences.com
127.0.0.1 ad.washingtonpost.com
127.0.0.1 adbot.theonion.com
127.0.0.1 adpick.switchboard.com
127.0.0.1 ads.doubleclick.com
127.0.0.1 ads.doubleclick.net
127.0.0.1 ads.i33.com
127.0.0.1 ads.infospace.com
127.0.0.1 ads.msn.com
127.0.0.1 ads.switchboard.com
127.0.0.1 ads.washingtonpost.com
127.0.0.1 *.doubleclick.net
127.0.0.1 *.doubleclick.com
Helps sometimes, but not all the time, and I have to hit ESC when loading The Register... :-(
*mmmm cookies (Score:2)
1. It allows deny, accept, or allow for session on all cookies
2. you can set it to deny cookies from certain domains, or _only accept_ cookies from certain domains (slashdot anyone
As an added bonus, iCab also allows you to filter images.
Cookie and image filtering are at the top of my pretty please list for mozilla. Any browser that supports these is the one I'll use. Is it easier for my mother to set up junkbuster , or set it up in her already existing browser program?
Re:That's not what it says, nor what it does... (Score:2)
Well, guess what, that was the intent of that option. Only trouble: it only worked with image tags. However, there are other ways than img tags that can be used to include ads in pages. One way, which has become very popular lately is to use <script src="http://ad.doubleclick.net/..."> tags. These have unfortunately been forgotten by netscape, and can still be used for those pesky offsite cookies. Hopefully, a fix will be included in one of the next versions.
Re:*mmmm cookies (Score:2)
Another obvious patent? (Score:2)
Microsoft is blackmailing DoubleClick. :-)
There's a thread [w3.org] on the www-talk list about this at the moment. Though it's easy to remove cookies from <img>-derived HTTP requests, other features such as frames are not as easy. For example, a banner ad frame at the top of the page is likely, and could easily be passed URI information from the frameset. Disallowing cookies on subframes, however, would break sites running under the likes of AskJeeves, where the 'real' site is viewed as part of a frameset.
I don't know if IDcide prevents cookies being passed to sites in subframes, or just images. Probably the latter since it's the most common case at the moment. But frame, layer, object, embed and applet have the same problems.
Given that we were discussing embedded-object-cookie-rejection on www-talk as an obvious way to circumvent cookie abuse, it's somewhat worrying that IDcide Inc. might have a patent on it:
(From the FAQ.)
Alternative answer: because IDcide have patented it?
I can't see anything on www.patents.ibm.com yet, so it's unclear whether IDcide have indeed applied for a patent on cookie rejection, or whether it's some technical implementation detail.
--
This comment was brought to you by And Clover.
Junkbuster? Kinda useless... (Score:2)
e.g. those pops up a window when you leave a site, those obfuscate the status bar with junk messages, those who does not allow right-clicking to reveal source, etc.
There is Proxomitron on Windows. How about us? Is there anything as powerful as that? I've heard that Webfilter (formerly known as NoShit) does it but people says it takes an aweful amount of CPU. Anyone with the experience?
Don't want to admit, but Junkbuster is child's play compared to Proxomitron. Only if they release the source....
Re:Junkbuster and cookies (Score:2)
Hurrah! (Score:2)
I promise you this - if no one else codes this by the time Mozilla is beyond beta, I WILL get this done.
Hurrah! Three cheers for Mozilla! (Score:2)
Great idea, IF ... (Score:2)
All this would guarantee is that the advertiser's profiles on you would be senseless, and would probably result in you getting your Aunt Susie's mass emails about crocheting and little puppy sweaters. Eeeeww. *grin*
Here's how I solved the cookie problem (Score:2)
It works under AIX, anyway... after doing that, I went to www.userfriendly.org [userfriendly.org] and clicked on the doubleclick banner ad. After I came back here, I double-checked: no doubleclick cookies (I edited my cookies file to get rid of all the doubleclick cookies first!).
If I want to accept a cookie, I'll have to undo that temporarily, I suppose.
Nels
Re:Better solution - Junkbuster (Score:2)
That e-mail address again is support@idcide.com so you can remind them that they need to do better about cross-platform and cross-browser support.
A better way--offisite cookies have some legit use (Score:2)
--- Speaking only for myself,
Re:A simple lightweight solution to dblClick (Score:3)
It'd be possible to have it not rewrite if it was pointing to one of your real pages.
I just havn't gotten around to setting up junkbuster, because this works so well. (And most of the time from home I browse with images off, which helps alot)
/etc/hosts hack (Score:3)
Of course, I did this on Linux, but it should work the same under Windows. I just set my 404 error document to be the transparent gif.
I suppose I should set the error document to be a redirect to http://localhost/null.gif, which would keep my web cache from getting so cluttered.
Now we just need a good comprehensive list of advertising sites that we can all use.
Re:A simple lightweight solution to dblClick (Score:3)
> 127.0.0.1 [adserver] # fsck 'em all
Better yet, try:
The Ultimate HOSTS file [deja.com]
I dunno about the IP address the original USENET poster put in there. I replaced it with 127.0.0.1 and run a "web server" on my own box that responds only to requests from localhost and returns a 1x1 transparent .GIF instead.
One addendum: I was surprised to see an ad one day, and also had to add ad-adex[0-9].flycast.com instead of just ad-adex3.flycast.com to the list.
Seriously, when was the last time you ever wanted to see "content" from any of these sites? Blackhole 'em all.
Re:A simple lightweight solution to dblClick (Score:3)
On the other hand, if someone has a solution to this, I would be highly interested in hearing it.
Cookies were a good idea but.. (Score:3)
Privacy should be by default not something that you have to beg for or opt out of programs to get. "Opt out", people should have to Opt in. Ad companies say that consumers want targeted adds. I don't, if I want to buy something I don't mind searching a little or doing some research. If your a company that uses banner advertising I choose not to buy from you more then I might otherwise.
When I want to buy a product I want to buy it for the right reasons. It should be the best quality and value around. I don't want to buy something because company foo has better phsychologists then company bar. If you don't think advertising works your wrong. Companies that will downsize to save a few bucks will continue with costly advertizing campaigns because they know that they work.
There are things in life and yes even things on the internet that are worse then cookies. Losing my privacy is one of the things that I hate the most about this new "information age" we live in. I have emails that I don't want, phone calls that I don't want, mail that I don't want, and tv commercials that I don't want. All of them trying to sell me services or things that I really don't want.
What is a domain? (Score:3)
Once you get out of
This issue came up on bugtraq when someone found an "evil" cookie on their machine that was sent to all sites in *.com.au. (or *.co.au -- whatever). Two top level domains is insufficient to distinguish different sites in
Anomalous: inconsistent with or deviating from what is usual, normal, or expected
What's going on with IDcide? (Score:4)
For example, I previously had a cookie for "moviefone.com" which contained my zip code. Now I have one for "moviefone.com.role1.jar.qbots.com" which seems to have some additional information it it.
qbots.com is owned by IDcide (just go to www.qbots.com [qbots.com]).
Maybe I'm just being paranoid...
Mozilla From the mouth of a developer. (Score:4)
Not only does it slice and dice, Mozilla allows you to view your stored cookies - and delete them wholesale or individually.
You can also ad whole domains that you would like to block images from. And, although the interface isn't quite complete, you can ad domains that you will <b>always</B> block cookies from too. One post I saw wanted the ability to view cookies and delete them real time in the sidebar. It would be trivially easy to skin a new Mozilla that has the Cookie Manager window in the sidebar so that you could actively watch cookies and delete them in real time.
Joseph Elwell.
<A HREF="http://www.mozilla.org">Make it better.</A>
Has anyone looked at the latest Opera Win32 beta? (Score:4)
It also notifies you of invalid cookies being set and why they're invalid. I tried using Hotmail and Opera reported 4 or 5 invalid cookies.
And if that's not enough, you can always turn to the Internet Junkbuster [junkbusters.org] for the ultimate filtering solution.
--
That's not what it says, nor what it does... (Score:4)
Okay. I didn't know what to believe, so I tried a little test. I don't normally use netscape anyway, but I do have it installed.
I killed the cookie text file. Just deleted it. Start up Netscape (blank home page), so no cookies yet. Change the setting in the preferences. This is Communicator 4.6 for Windows, BTW. Go to a page I know had a doubleclick banner: http://www.userfriendly.org/static/
Look again, voila, a cookie file. Open it up: There's the doubleclick cookie all right.
They may have changed the behavior in later versions, I dunno. But the behavior I see is exactly what the option says. Allow cookies that get sent back only to originating server. The cookie originated at doubleclick.net, NOT at userfriendly.org.
A cookie is not set in HTML, it's set in the HTTP headers. You get those headers with every single web request, be it GIF or HTML.
The option they NEED, and the one I described, is simple: Only accept cookies originating from the same server as the page being viewed. Or perhaps, disallow cookies with non-HTML files. I can't think of any good reason, other than ads, to send a cookie with a graphic image.
---
Free protection against *all* bad cookies (Score:4)
Second, copy the cookies file somewhere else.
Third, write a script, batch file, etc. to copy the copied cookies.txt into your browser's directory before you run your browser.
Fourth, if you find a site thta gives you a cookie you want, copy that line to the cookies.txt file that gets copied over.
That way, while you *do* get cookies, and they *do* get set and sent back to whatever site, every time you open up your browser, you effectively become a new person since there's no cookie to track you between sessions anymore.
My method (for IE) (Score:4)
I set my "Internet Zone" security settings to prompt before accepting cookies. Whenever somebody tries to send me a cookie, the cookie dialog comes up. If it's coming from the site that I'm actually visiting, I accept it (and I never have to see it again.) If it's coming from doubleclick.net or the like, I refuse it, and then I add that domain to the "Restricted Zone". From then on, IE automatically refuses cookies from that domain (and also disables Javascript, ActiveX, etc.)
My only complaint is that adding the domain to my "restricted" list is a separate step; it would be nice if I could just click "No, and block all future cookies," and be done with it. But if you're using IE anyway, and you don't want to mess with third party programs, this method works pretty well.
Give us built-in cookie-management tools! (Score:4)
Have a small text sidebar or window that displays changes to cookies AS THEY HAPPEN, and allow us to delete these cookies from this interface. This could be a small, simple text window built in to, say, the button bar. A small floating independant text box would work well too. The key here is, it's small and out of the way so that we can have it on WHILE we browse, and it gives us dynamic information on our cookies which we can intelligently control.
Of course this would NOT be on by default, since the average user would just mess up their web-based email cookies and complain. But give us advanced users something to work with here.
A simple lightweight solution to dblClick (Score:4)
127.0.0.1 ad.doubleclick.net #spamfilter
127.0.0.1 m.doubleclick.net #spamfilter
127.0.0.1 ad.webprovider.com #spamfilter
127.0.0.1 image.linkexchange.com #spamfilter
127.0.0.1 jeeves.flycast.com #spamfilter
127.0.0.1 www.flycast.com #spamfilter
127.0.0.1 www.burstmedia.com #spamfilter
127.0.0.1 www.247media.com #spamfilter
127.0.0.1 www.ad-venture.com #spamfilter
127.0.0.1 www.adauction.com #spamfilter
127.0.0.1 www.adsdaq.com #spamfilter
127.0.0.1 a32.g.a.yimg.com #spamfilter YahooAds
127.0.0.1 www.pagecount.com #spamfilter
127.0.0.1 www1.pagecount.com #spamfilter
127.0.0.1 www2.pagecount.com #spamfilter
127.0.0.1 www3.pagecount.com #spamfilter
127.0.0.1 www4.pagecount.com #spamfilter
127.0.0.1 ad.linkexchange.com.com #spamfilter
127.0.0.1 www.smartclicks.com #spamfilter
127.0.0.1 mojofarm.mediaplex.com #spamfilter
127.0.0.1 www.etour.com #spamfilter ads in GetRight
____________
TomV
Why stop there. Compound this with "smart houses" (Score:4)
Better solution - Junkbuster (Score:5)
---
From passive resistance to Active Disruption (Score:5)
Why not go one step further? If companies like DoubleClick want to collect information on you through cookies, let them.
One thing I imagine you could is actively contaminate the personal information that they are managing to collect on you. How would you do that? You could set up a shared cookie repository somewhere on the web. Everytime a banner network plants a cookie on your machine, you could submit it to the repository. Everytime you are about to send a cookie back to the same banner network, you would get grab someone else's cookie from the repository and send it to the unsuspecting banner ad server.
To reiterate, if you were to send your Aunt Susie's cookie to DoubleClick everytime their banner ad displays on your page, you would contaminate Aunt Susie's personal profile in the DoubleClick database.
If a lot of people were to cooperate in this way, they could render their personal profiles totally useless to advertisers, because the signal to noise ratio would be very low.